This bug was fixed in the package linux - 3.19.0-61.69
---
linux (3.19.0-61.69) vivid; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesystems on top
- SAUCE: ecryptfs: forb
This bug was fixed in the package linux - 4.2.0-38.45
---
linux (4.2.0-38.45) wily; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesystems on top
- SAUCE: ecryptfs: forbid
This bug was fixed in the package linux-raspi2 - 4.4.0-1012.16
---
linux-raspi2 (4.4.0-1012.16) xenial; urgency=low
[ Andy Whitcroft ]
* Rebase against Ubuntu-4.4.0-23.41
[ Ubuntu: 4.4.0-24.43 ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory openin
This bug was fixed in the package linux-snapdragon - 4.4.0-1015.18
---
linux-snapdragon (4.4.0-1015.18) xenial; urgency=low
[ Kamal Mostafa ]
[ Ubuntu: 4.4.0-24.42 ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent sta
This bug was fixed in the package linux-raspi2 - 4.2.0-1031.41
---
linux-raspi2 (4.2.0-1031.41) wily; urgency=low
[ Kamal Mostafa ]
[ Ubuntu: 4.2.0-38.45 ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking file
This bug was fixed in the package linux-lts-xenial - 4.4.0-24.43~14.04.1
---
linux-lts-xenial (4.4.0-24.43~14.04.1) trusty; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesyste
This bug was fixed in the package linux - 4.2.0-38.45
---
linux (4.2.0-38.45) wily; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesystems on top
- SAUCE: ecryptfs: forbid
This bug was fixed in the package linux - 4.4.0-24.43
---
linux (4.4.0-24.43) xenial; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesystems on top
- SAUCE: ecryptfs: forbi
This bug was fixed in the package linux-lts-utopic -
3.16.0-73.95~14.04.1
---
linux-lts-utopic (3.16.0-73.95~14.04.1) trusty; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesys
This bug was fixed in the package linux-snapdragon - 4.4.0-1015.18
---
linux-snapdragon (4.4.0-1015.18) xenial; urgency=low
[ Kamal Mostafa ]
[ Ubuntu: 4.4.0-24.42 ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent sta
This bug was fixed in the package linux - 4.2.0-38.45
---
linux (4.2.0-38.45) wily; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesystems on top
- SAUCE: ecryptfs: forbid
This bug was fixed in the package linux - 4.2.0-38.45
---
linux (4.2.0-38.45) wily; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesystems on top
- SAUCE: ecryptfs: forbid
This bug was fixed in the package linux - 4.4.0-24.43
---
linux (4.4.0-24.43) xenial; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesystems on top
- SAUCE: ecryptfs: forbi
This bug was fixed in the package linux - 4.4.0-24.43
---
linux (4.4.0-24.43) xenial; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesystems on top
- SAUCE: ecryptfs: forbi
This bug was fixed in the package linux - 4.4.0-24.43
---
linux (4.4.0-24.43) xenial; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesystems on top
- SAUCE: ecryptfs: forbi
This bug was fixed in the package linux-lts-xenial - 4.4.0-24.43~14.04.1
---
linux-lts-xenial (4.4.0-24.43~14.04.1) trusty; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesyste
This bug was fixed in the package linux-lts-xenial - 4.4.0-24.43~14.04.1
---
linux-lts-xenial (4.4.0-24.43~14.04.1) trusty; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesyste
This bug was fixed in the package linux - 4.4.0-24.43
---
linux (4.4.0-24.43) xenial; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesystems on top
- SAUCE: ecryptfs: forbi
This bug was fixed in the package linux-lts-trusty -
3.13.0-88.135~precise1
---
linux-lts-trusty (3.13.0-88.135~precise1) precise; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking fi
This bug was fixed in the package linux-lts-trusty -
3.13.0-88.135~precise1
---
linux-lts-trusty (3.13.0-88.135~precise1) precise; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking fi
This bug was fixed in the package linux-lts-vivid - 3.19.0-61.69~14.04.1
---
linux-lts-vivid (3.19.0-61.69~14.04.1) trusty; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesyste
This bug was fixed in the package linux-lts-utopic -
3.16.0-73.95~14.04.1
---
linux-lts-utopic (3.16.0-73.95~14.04.1) trusty; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesys
This bug was fixed in the package linux-lts-wily - 4.2.0-38.45~14.04.1
---
linux-lts-wily (4.2.0-38.45~14.04.1) trusty; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesystems o
This bug was fixed in the package linux-lts-wily - 4.2.0-38.45~14.04.1
---
linux-lts-wily (4.2.0-38.45~14.04.1) trusty; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesystems o
This bug was fixed in the package linux-raspi2 - 4.2.0-1031.41
---
linux-raspi2 (4.2.0-1031.41) wily; urgency=low
[ Kamal Mostafa ]
[ Ubuntu: 4.2.0-38.45 ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking file
This bug was fixed in the package linux - 3.19.0-61.69
---
linux (3.19.0-61.69) vivid; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesystems on top
- SAUCE: ecryptfs: forb
This bug was fixed in the package linux-raspi2 - 4.2.0-1031.41
---
linux-raspi2 (4.2.0-1031.41) wily; urgency=low
[ Kamal Mostafa ]
[ Ubuntu: 4.2.0-38.45 ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking file
This bug was fixed in the package linux - 4.2.0-38.45
---
linux (4.2.0-38.45) wily; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesystems on top
- SAUCE: ecryptfs: forbid
This bug was fixed in the package linux - 4.4.0-24.43
---
linux (4.4.0-24.43) xenial; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesystems on top
- SAUCE: ecryptfs: forbi
This bug was fixed in the package linux - 4.4.0-24.43
---
linux (4.4.0-24.43) xenial; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesystems on top
- SAUCE: ecryptfs: forbi
please forward this upstream
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1590081
Title:
twisted's conch does not support ed25519 and ecdsa ssh public keys
To manage notifications about this bug g
I also have the same symptoms (Kubuntu 16.04, all packages up to date):
Upon login the progress bar fills quickly (3-4 seconds to reach 100%)
and then there is a long pause (>20 seconds) before the desktop finally
appears. However, when I run systemd-analyze blame there is no obvious
culprit:
** Tags removed: bugnameltc-137710 severity-medium verification-done-
vivid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1572624
Title:
Backport patch to abort syscalls in active transactions
To m
Thank you for bringing this to my attention.
I updated the BIOS to 1.11.
I still reproduce the problem: system completely frozen after resume.
1) The output of the command:
N78 Ver. 01.11
05/09/2016
2) No improvement with this BIOS.
3) Setting the bug to confirmed.
Thanks.
** Changed in: linux
** Summary changed:
- Slow login to kde5 waiting on networkmanager
+ Slow login to kde5 waiting on ?networkmanager
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1584604
Title:
Slow login to kde5 wa
Public bug reported:
Ubuntu 16.10 Developer Preveiw: After keyboard selection, I expected it
to install but it crashed after a minite or so.
ProblemType: Bug
DistroRelease: Ubuntu 16.10
Package: ubiquity 16.10.1
ProcVersionSignature: Ubuntu 4.4.0-23.41-generic 4.4.10
Uname: Linux 4.4.0-23-generic
This is a show-stopper. Mplayer won't even start because of this bug.
And Importance is set to Medium? REALLY? What kind of show are you
guys running here?
Why can't we just fix this real quick and release a new package?
--
You received this bug notification because you are a member of Ubuntu
Guntbert Reiter, to clarify, what was the most recent release of Ubuntu
this last worked in?
** Tags added: kernel-bug-exists-upstream kernel-bug-exists-
upstream-4.7-rc2
** Changed in: linux (Ubuntu)
Status: Confirmed => Incomplete
--
You received this bug notification because you are a
Public bug reported:
This is with secure boot disabled and uefi only
ProblemType: Bug
DistroRelease: Ubuntu 16.04
Package: ubiquity 2.21.63
ProcVersionSignature: Ubuntu 4.4.0-21.37-generic 4.4.6
Uname: Linux 4.4.0-21-generic x86_64
ApportVersion: 2.20.1-0ubuntu2
Architecture: amd64
CasperVersion:
Nope, just in xenial. Did not happen in wily.
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1587594
Title:
mouse lost sync byte,
Public bug reported:
Often, but not always, on resume from suspend my wifi does not connect.
Usually in the networking tray drop-down I can see one wifi network
listed (out of dozens).
I clear it with the hammer of:
sudo rmmod iwldvm && sudo modprobe iwldvm
I'm not sure what would be more a
Hello,
I can also confirm that with Uuntugnome 16.04 latest onboard version doesn't
auto show in Chrome or chromium. With now days convertible '2 in 1' netbooks,
luck of this feature becomes big problem.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is s
I assume you're talking about the "Actions" keyword. Perhaps it's a
moot issue, due to Ubuntu's hostile attitude toward xterm's desktop
file: I can change it upstream, and it will not get installed.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribe
Also looking at https://lists.launchpad.net/kernel-
packages/msg17719.html, my governor is set to powersave. And I can
confirm that scaling is actively happening in the background when I see
this issue of the sync bytes lost (well at least /proc/cpuinfo shows
different MHz before and after I see th
I'm also facing the kswap0 99% CPU issue. Typically, I notice it start
minutes after boot time, but restarting the MongoDB process on the
server will temporarily fix it, however the process will usually pop up
again randomly.
I used to run test instances of MongoDB on AWS t2.micros with no issues
Public bug reported:
I don't know.
ProblemType: Package
DistroRelease: Ubuntu 16.04
Package: samba-libs:amd64 2:4.3.8+dfsg-0ubuntu1
ProcVersionSignature: Ubuntu 4.4.0-21.37-generic 4.4.6
Uname: Linux 4.4.0-21-generic x86_64
ApportVersion: 2.20.1-0ubuntu2
Architecture: amd64
Date: Fri Jun 10 01:20
I completed the bisection and googling the resulting commit ID revealed
that this bug has already been reported upstream.
** Bug watch added: Linux Kernel Bug Tracker #107151
http://bugzilla.kernel.org/show_bug.cgi?id=107151
** Also affects: linux via
http://bugzilla.kernel.org/show_bug.cgi
Public bug reported:
When setting "Scale for menu and title bars" to (2) in screen / display
settings && setting Onboard on screen keyboard to "Show when unlocking
the screen" (tick) in Onboard general preferences, the on screen
keyboard is tiny and very difficult to use on the lock screen, but fi
This change was made by a bot.
** Changed in: linux (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1590985
Title:
Wifi non-functional after suspend (Intel 62
Broken. I'm running a mirror for many different oses on ubuntu 12.04.
Upgrading the server is a chore as I'm serving scientific linux, debian,
and ubuntu mirrors as well as private repos for debian software build by
myself. This broke our ability to run mirrors for xenial hosts. Bad
ubuntu. What we
I don't think this is a problem with systemd. I switched to using KDE
neon from the regular Unity release and the suspend issue is not there.
Maybe it has to do with the desktop environments, not systemd itself.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which
Finally figured out why upgrades to 16.04 are prevented on many of my
computers. The trick is to run this after a failed upgrade:
> cd /var/log/dist-upgrade/
> tail -100 main.log
In my case, this was the problem:
> 2016-06-09 15:48:07,039 DEBUG blacklist expr '^postgresql-.*[0-9]\.[0-9].*'
> m
This impacts upstream; I've submitted a bug (stuck in moderation) and a
pull request. I'll give upstream a day or so to digest to see if we can
incorporate an upstream-accepted fix.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https
Public bug reported:
[Impact]
lshw crashes when run as non-root:
Though it does warn before crashing that it should be run as super-user,
it should fail gracefully - not abort and dump core. A number of users
have been hitting this since the regression has been introduced:
https://errors.ubuntu.
Public bug reported:
The Ubuntu Error Tracker has been receiving reports about a problem
regarding libreoffice. This problem was most recently seen with version
1:5.1.3-0ubuntu1, the problem page at
https://errors.ubuntu.com/problem/1ac0b1e4089b8321763cb80a35acc01052582796
contains more details.
Public bug reported:
The Ubuntu Error Tracker has been receiving reports about a problem
regarding grsync. This problem was most recently seen with version
1.2.5-1, the problem page at
https://errors.ubuntu.com/problem/a07a77d1b496657c5f6109116208cafe0be5ecce
contains more details.
** Affects: g
Public bug reported:
The Ubuntu Error Tracker has been receiving reports about a problem
regarding qtdeclarative-opensource-src. This problem was most recently
seen with version 5.4.1-1ubuntu11~overlay6~1, the problem page at
https://errors.ubuntu.com/problem/2ba1aea738776b99c29a7f2a8cb2769e61d48
Public bug reported:
The Ubuntu Error Tracker has been receiving reports about a problem
regarding gnome-mplayer. This problem was most recently seen with
version 1.0.9-3ubuntu1, the problem page at
https://errors.ubuntu.com/problem/089bedff93b371465c558b0eacfb172e38a80480
contains more details.
Public bug reported:
The Ubuntu Error Tracker has been receiving reports about a problem
regarding atop. This problem was most recently seen with version
1.26-2build1, the problem page at
https://errors.ubuntu.com/problem/41e85440af89cfb5515009068abd1f87dc569c8a
contains more details.
** Affects
Public bug reported:
The Ubuntu Error Tracker has been receiving reports about a problem
regarding grsync. This problem was most recently seen with version
1.2.5-1, the problem page at
https://errors.ubuntu.com/problem/40219e67626e864bdc540072f91dbc856d0380d0
contains more details.
** Affects: g
Setting governor to performance did not help. Problem also evident with
Xenial installation media (kernel 4.4.0.21 I believe). Going to try with
Wily installation media to ensure it is not there and it is not a newly
found hardware issue (like if I bumped my laptop touchpad cable loose).
--
You r
LXC/LXD should be removed! The default server installation doesn't even
install ssh by default and LXC/LXD is certainly not the de-facto choice
of admins to use for a virtualization platform. It should not be foisted
upon users.
--
You received this bug notification because you are a member of Ub
** Description changed:
This adds more snapcraft projects to the tour
+
+ [Impact]
+
+ * The tour is the point of entry for new users. This change means ore
+ content explaining more features of snapcraft.
+
+ [Test Case]
+
+ * Run through the tour following the instructions.
+
+ [Regress
This bug also breaks gammaray on arm64:
21/21 Test #21: quickinspectortest ...***Exception: Other 1.40 sec
* Start testing of QuickInspectorTest *
Config: Using QtTest library 5.5.1, Qt 5.5.1 (arm64-little_endian-lp64 shared
(dynamic) release build; by GCC 5.3.1 20160
** Description changed:
W: snapcraft-parser: description-synopsis-starts-with-article
I: snapcraft-parser: description-synopsis-might-not-be-phrased-properly
I: snapcraft-parser: extended-description-is-probably-too-short
W: snapcraft-parser: binary-without-manpage usr/bin/snapcraft-parser
** Tags added: xenial
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/830915
Title:
[Oneiric] Error during kernel upgrade: Could not locate dkms.conf file
To manage notifications about this bug go to
** Description changed:
The `snapcraft tour` command is currently not exposed.
+
+ [Impact]
+
+ * The tour is the point of entry for new users. This change will make
+ it available to users.
+
+ [Test Case]
+
+ * snapcraft tour
+
+ [Regression Potential]
+
+ * N/A, this command was not
Public bug reported:
Please sync systemtap 3.0-5 (universe) from Debian unstable (main)
Explanation of the Ubuntu delta and why it can be dropped:
* d/p/0001-Fix-PR9497-by-updating-the-runtime-to-handle-linux-4.patch:
Fix stap compilation after kernel 4.4 commit 7523e4dc50. (LP: #1557673)
** Attachment added: "buildlog"
https://bugs.launchpad.net/ubuntu/+source/systemtap/+bug/1591008/+attachment/4680667/+files/systemtap_3.0-5_amd64-20160609-2032.build
** Tags added: upgrade-software-version
--
You received this bug notification because you are a member of Ubuntu
B
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1588938
Title:
[UIFE] Replace gnome-taquin 3.18 CC-BY-SA 2.0 images
To manage notifications about this bug go to:
https://bugs.launchpad.net/gnome-taqui
Since this is a crash in the swrast driver, it's worth noting that mesa
is built with llvmpipe on armhf but not on arm64. This may account for
why the bug manifests on arm64+gles but not on armhf+gles.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscr
(The build log above looks kind of ugly for some reason, but it is more
readable if you use View Source in your browser or just open it with
your usual text editor.)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpa
Showed up when I tested with Wily, which I know did not previously have
the issue. Will consider it a hardware fault. Sorry for the
inconvenience.
** Changed in: linux (Ubuntu)
Status: Confirmed => Invalid
** Changed in: linux (Ubuntu)
Importance: High => Undecided
--
You received thi
Public bug reported:
[Impact]
As explained in
https://github.com/golang/go/issues/16021#issuecomment-225029684, the s390x
port for Go contains two bugs that prevent docker from operating correctly.
[Test Case]
Simply run "docker run s390x/ubuntu:16.04 echo hi" -- in the failing case this
will
This bug was fixed in the package php7.0 - 7.0.7-4ubuntu1
---
php7.0 (7.0.7-4ubuntu1) yakkety; urgency=medium
* Drop dh-php from Recommends to Suggests so it can be demoted to
universe (LP: #1590623).
- dh-php has gained a dependency on xml2 which is in universe.
-- Nishan
Public bug reported:
root@luweidong401:/home/howard/Downloads/libxml2-2.9.1+dfsg1# sudo apt-get
install --reinstall software-center
Reading package lists... Done
Building dependency tree
Reading state information... Done
The following packages were automatically installed and are no longer
Thanks for the explanation, it sound quite right.
However, the combination of the two makes things worse, and it's probably
what makes me react.
I guess I'm going to check the current bugs for Dekko as soon as I have the
time, seeing as it seems to be the real problem in my case.
Thanks, keep up
Jan Stutzki, to clarify, did you test hibernate (not suspend) with
4.7-rc2?
** Tags removed: latest-bios-1.2.13
** Tags added: latest-bios-1.2.14
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1568703
** Attachment added: "dmesg-after-devices.txt"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1576909/+attachment/4680680/+files/dmesg-after-devices.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.n
** Attachment added: "dmesg-after-none.txt"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1576909/+attachment/4680678/+files/dmesg-after-none.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bug
Hello.
Tested with Kernel 4.6.2-040602-generic. The problem happens when
closing the laptop lid. As mentioned, the screen goes black, but disks
and fans keep working and power led does not go off.
I am attaching the trace files according the debugging guide
** Attachment added: "wakeup"
http
** Attachment added: "suspend_stats"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1576909/+attachment/4680670/+files/suspend_stats
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1576909
Tit
** Attachment added: "dmesg-after-freezer.txt"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1576909/+attachment/4680679/+files/dmesg-after-freezer.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.n
** Attachment added: "dmesg-after-platform.txt"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1576909/+attachment/4680677/+files/dmesg-after-platform.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad
** Attachment added: "dmesg-after-processors.txt"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1576909/+attachment/4680671/+files/dmesg-after-processors.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launc
Both the suspension test after using core and platform commands
reproduced the problem
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1576909
Title:
Suspend not working on Ubuntu 16.04
To manage not
** Attachment added: "dmesg-after-core.txt"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1576909/+attachment/4680681/+files/dmesg-after-core.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bug
** Attachment added: "attachment"
https://bugs.launchpad.net/bugs/1590105/+attachment/4680682/+files/attachment
** Attachment removed: "attachment"
https://bugs.launchpad.net/ubuntu/+source/phpunit-mock-object/+bug/1590105/+attachment/4679214/+files/attachment
--
You received this bug not
Rebuilding mesa with llvmpipe enabled on arm64, I'm able to get this
test to pass as:
LIBGL_DRIVERS_PATH=../mesa-11.2.1/debian/libgl1-mesa-dri/usr/lib/aarch64
-linux-gnu/dri/ xvfb-run -a -s "-screen 0 640x480x24" ./obj-
qt5/bin/quickinspectortest
Not sure what negative impact there might be from
** Changed in: gnuplot (Ubuntu)
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1338890
Title:
package gnuplot 4.6.5-5 failed to install/upgrade: trying to ove
patch to enable llvmpipe (and opencl) on arm64.
** Patch added: "mesa-arm64-llvmpipe.diff"
https://bugs.launchpad.net/ubuntu/+source/mesa/+bug/1585942/+attachment/4680683/+files/mesa-arm64-llvmpipe.diff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is s
@Reinhard , I have also experienced same issue as you commented. After
downloading the samba version from 4.3.9 to 4.1.6, I can again access to
Ubuntu 14.04 samba server from windows 7.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
h
Hey, thanks for testing. I've reported the two issues you mention as
separate bugs
https://bugs.launchpad.net/ubuntu/+source/docker.io/+bug/1591021 and
https://bugs.launchpad.net/ubuntu/+source/docker.io/+bug/1591023, happy
to continue conversations there. I'll be asked you to do verification of
th
Public bug reported:
As reported in
https://bugs.launchpad.net/ubuntu/+source/docker.io/+bug/1574904/comments/10.
I don't understand at this time what writes to that file -- I guess the
systemd trigger?
** Affects: docker.io (Ubuntu)
Importance: Undecided
Status: New
--
You recei
Public bug reported:
Upgrading docker does not restart the daemon. This seems entirely
intentional (see
http://anonscm.debian.org/cgit/docker/docker.io.git/commit/debian/rules?h=ubuntu&id=777987c5b7b25b88a2b9be40c512cfc805c65ffa)
but is a bit confusing.
I guess the issue is that restarting the da
Just heard from a Reddit zfs thread inquery I made that the fix for grub
& zfs is aleady in 16.10 & will make it into 16.04 in perhaps a month..
The fix is being tracked with this bug:
https://bugs.launchpad.net/ubuntu/xenial/+source/grub2/+bug/1527727
So my bug report can be closed.
--
You re
In case anyone else hits this on their laptop and would like to disable
the auto-suspend, I installed dconf-editor, and changed critical-
battery-action to nothing.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad
alternative patch; this doesn't quite work, it lets the
quickinspectortest tests pass but when running the full test suite,
strangely, it fails as follows:
21/21 Test #21: quickinspectortest ...***Exception: Other 0.46 sec
libEGL warning: DRI2: failed to open swrast (search paths
../
Public bug reported:
this presents several minutes after I have logged in.
ProblemType: Package
DistroRelease: Ubuntu 14.04
Package: linux-image-3.13.0-71-generic 3.13.0-71.114
ProcVersionSignature: Ubuntu 3.13.0-87.133-generic 3.13.11-ckt39
Uname: Linux 3.13.0-87-generic x86_64
ApportVersion: 2.
This change was made by a bot.
** Changed in: linux (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1591030
Title:
package linux-image-3.13.0-71-generic 3.13.
801 - 900 of 966 matches
Mail list logo