This bug was fixed in the package linux-raspi2 - 4.4.0-1016.22
---
linux-raspi2 (4.4.0-1016.22) xenial; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1595881
* Rebase against Ubuntu-4.4.0-28.47
[ Ubuntu: 4.4.0-28.47 ]
* Release Tracking Bug
- LP:
This bug was fixed in the package linux - 4.4.0-28.47
---
linux (4.4.0-28.47) xenial; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1595874
* Linux netfilter local privilege escalation issues (LP: #1595350)
- netfilter: x_tables: don't move to
This bug was fixed in the package linux - 4.4.0-28.47
---
linux (4.4.0-28.47) xenial; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1595874
* Linux netfilter local privilege escalation issues (LP: #1595350)
- netfilter: x_tables: don't move to
This bug was fixed in the package linux - 4.4.0-28.47
---
linux (4.4.0-28.47) xenial; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1595874
* Linux netfilter local privilege escalation issues (LP: #1595350)
- netfilter: x_tables: don't move to
This bug was fixed in the package linux - 4.4.0-28.47
---
linux (4.4.0-28.47) xenial; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1595874
* Linux netfilter local privilege escalation issues (LP: #1595350)
- netfilter: x_tables: don't move to
This bug was fixed in the package linux-raspi2 - 4.4.0-1016.22
---
linux-raspi2 (4.4.0-1016.22) xenial; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1595881
* Rebase against Ubuntu-4.4.0-28.47
[ Ubuntu: 4.4.0-28.47 ]
* Release Tracking Bug
- LP:
This bug was fixed in the package linux-snapdragon - 4.4.0-1019.22
---
linux-snapdragon (4.4.0-1019.22) xenial; urgency=low
[ Kamal Mostafa ]
* Release Tracking Bug
- LP: #1595882
[ Ubuntu: 4.4.0-28.47 ]
* Linux netfilter local privilege escalation issues (LP:
This bug was fixed in the package linux - 4.4.0-28.47
---
linux (4.4.0-28.47) xenial; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1595874
* Linux netfilter local privilege escalation issues (LP: #1595350)
- netfilter: x_tables: don't move to
This bug was fixed in the package linux - 4.4.0-28.47
---
linux (4.4.0-28.47) xenial; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1595874
* Linux netfilter local privilege escalation issues (LP: #1595350)
- netfilter: x_tables: don't move to
This bug was fixed in the package linux - 4.4.0-28.47
---
linux (4.4.0-28.47) xenial; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1595874
* Linux netfilter local privilege escalation issues (LP: #1595350)
- netfilter: x_tables: don't move to
This bug was fixed in the package linux - 4.4.0-28.47
---
linux (4.4.0-28.47) xenial; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1595874
* Linux netfilter local privilege escalation issues (LP: #1595350)
- netfilter: x_tables: don't move to
This bug was fixed in the package linux - 4.4.0-28.47
---
linux (4.4.0-28.47) xenial; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1595874
* Linux netfilter local privilege escalation issues (LP: #1595350)
- netfilter: x_tables: don't move to
This bug was fixed in the package linux - 4.4.0-28.47
---
linux (4.4.0-28.47) xenial; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1595874
* Linux netfilter local privilege escalation issues (LP: #1595350)
- netfilter: x_tables: don't move to
This bug was fixed in the package linux - 4.4.0-28.47
---
linux (4.4.0-28.47) xenial; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1595874
* Linux netfilter local privilege escalation issues (LP: #1595350)
- netfilter: x_tables: don't move to
This bug was fixed in the package linux - 4.4.0-28.47
---
linux (4.4.0-28.47) xenial; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1595874
* Linux netfilter local privilege escalation issues (LP: #1595350)
- netfilter: x_tables: don't move to
This bug was fixed in the package linux - 4.4.0-28.47
---
linux (4.4.0-28.47) xenial; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1595874
* Linux netfilter local privilege escalation issues (LP: #1595350)
- netfilter: x_tables: don't move to
This bug was fixed in the package linux - 4.4.0-28.47
---
linux (4.4.0-28.47) xenial; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1595874
* Linux netfilter local privilege escalation issues (LP: #1595350)
- netfilter: x_tables: don't move to
*** This bug is a duplicate of bug 1595874 ***
https://bugs.launchpad.net/bugs/1595874
This bug was fixed in the package linux - 4.4.0-28.47
---
linux (4.4.0-28.47) xenial; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1595874
* Linux netfilter local
This bug was fixed in the package linux - 4.4.0-28.47
---
linux (4.4.0-28.47) xenial; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1595874
* Linux netfilter local privilege escalation issues (LP: #1595350)
- netfilter: x_tables: don't move to
This bug was fixed in the package linux - 4.4.0-28.47
---
linux (4.4.0-28.47) xenial; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1595874
* Linux netfilter local privilege escalation issues (LP: #1595350)
- netfilter: x_tables: don't move to
This bug was fixed in the package linux - 4.4.0-28.47
---
linux (4.4.0-28.47) xenial; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1595874
* Linux netfilter local privilege escalation issues (LP: #1595350)
- netfilter: x_tables: don't move to
This bug was fixed in the package linux - 4.4.0-28.47
---
linux (4.4.0-28.47) xenial; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1595874
* Linux netfilter local privilege escalation issues (LP: #1595350)
- netfilter: x_tables: don't move to
*** This bug is a duplicate of bug 1595874 ***
https://bugs.launchpad.net/bugs/1595874
This bug was fixed in the package linux - 4.4.0-28.47
---
linux (4.4.0-28.47) xenial; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1595874
* Linux netfilter local
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy
Whitcroft (apw)
** Changed in: kernel-sru-workflow/promote-to-security
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/promote-to-updates
*** This bug is a duplicate of bug 1595874 ***
https://bugs.launchpad.net/bugs/1595874
This bug was fixed in the package linux - 4.4.0-28.47
---
linux (4.4.0-28.47) xenial; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1595874
* Linux netfilter local
This bug was fixed in the package linux - 4.4.0-28.47
---
linux (4.4.0-28.47) xenial; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1595874
* Linux netfilter local privilege escalation issues (LP: #1595350)
- netfilter: x_tables: don't move to
** Changed in: kernel-sru-workflow/security-signoff
Status: New => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-vivid in Ubuntu.
https://bugs.launchpad.net/bugs/1595990
Title:
linux-lts-vivid:
** Changed in: kernel-sru-workflow/security-signoff
Status: New => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-trusty in Ubuntu.
https://bugs.launchpad.net/bugs/1596012
Title:
linux-lts-trusty:
** Changed in: linux (Ubuntu)
Importance: Undecided => High
** Changed in: linux (Ubuntu)
Status: New => Triaged
** Changed in: linux (Ubuntu)
Assignee: Taco Screen team (taco-screen-team) => Canonical Kernel Team
(canonical-kernel-team)
--
You received this bug notification
** Description changed:
This bug is for tracking the 3.19.0-65.73~14.04.1 upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm
Backport packages from packages here can be worked on, the following tracking
bugs were opened for them:
linux-lts-vivid (14.04.1) - bug 1596643
** Changed in: kernel-sru-workflow/prepare-package
Status: New => Confirmed
** Changed in: kernel-sru-workflow/prepare-package-meta
Public bug reported:
This bug is for tracking the 3.19.0-65.73~14.04.1 upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties
** Changed in: kernel-sru-workflow/verification-testing
Status: Confirmed => Fix Released
** Changed in: kernel-sru-workflow/regression-testing
Status: Confirmed => Fix Released
** Tags added: qa-testing-passed
--
You received this bug notification because you are a member of
** Changed in: kernel-sru-workflow/automated-testing
Status: Incomplete => Fix Released
** Changed in: kernel-sru-workflow/certification-testing
Status: Confirmed => Invalid
** Changed in: kernel-sru-workflow/verification-testing
Status: Confirmed => Fix Released
** Changed
** Changed in: kernel-sru-workflow/certification-testing
Status: In Progress => Invalid
** Changed in: kernel-sru-workflow/verification-testing
Status: Confirmed => Fix Released
** Changed in: kernel-sru-workflow/regression-testing
Status: Confirmed => Fix Released
** Tags
** Changed in: kernel-sru-workflow/certification-testing
Status: Confirmed => Invalid
** Changed in: kernel-sru-workflow/verification-testing
Status: Confirmed => Fix Released
** Changed in: kernel-sru-workflow/regression-testing
Status: Confirmed => Fix Released
** Tags
** Changed in: kernel-sru-workflow/automated-testing
Status: Incomplete => Fix Released
** Changed in: kernel-sru-workflow/certification-testing
Status: Confirmed => Invalid
** Changed in: kernel-sru-workflow/verification-testing
Status: Confirmed => Fix Released
** Changed
** Changed in: kernel-sru-workflow/certification-testing
Status: Fix Released => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1591329
Title:
linux: 3.2.0-105.146
This bug was fixed in the package linux - 4.4.0-28.47
---
linux (4.4.0-28.47) xenial; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1595874
* Linux netfilter local privilege escalation issues (LP: #1595350)
- netfilter: x_tables: don't move to
This bug was fixed in the package linux - 4.4.0-28.47
---
linux (4.4.0-28.47) xenial; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1595874
* Linux netfilter local privilege escalation issues (LP: #1595350)
- netfilter: x_tables: don't move to
** Changed in: kernel-sru-workflow/automated-testing
Status: Invalid => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1591436
Title:
linux-armadaxp:
** Changed in: kernel-sru-workflow/automated-testing
Status: Incomplete => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1595874
Title:
linux: 4.4.0-28.47 -proposed
** Changed in: kernel-sru-workflow/automated-testing
Status: Invalid => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-ti-omap4 in Ubuntu.
https://bugs.launchpad.net/bugs/1591435
Title:
linux-ti-omap4:
** Changed in: kernel-sru-workflow/automated-testing
Status: Incomplete => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-utopic in Ubuntu.
https://bugs.launchpad.net/bugs/1596019
Title:
linux-lts-utopic:
Default Comment by Bridge
** Attachment added: "lspci -vv"
https://bugs.launchpad.net/bugs/1596635/+attachment/4691205/+files/lspci
** Changed in: ubuntu
Assignee: (unassigned) => Taco Screen team (taco-screen-team)
** Package changed: ubuntu => linux (Ubuntu)
--
You received this bug
You have been subscribed to a public bug:
== Comment: #0 - Chanh H. Nguyen - 2016-06-25 00:24:28 ==
We have Ubuntun 16.04.1 version on our SuperMicro system and some of the
virtual packages installed. Define a guest with a pci passthrough is fine but
then system crashes at xhci_irq+0x1bc/0xf50
Public bug reported:
This bug is for tracking the 3.19.0-65.73 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
** Affects:
** Tags added: testing-override
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which
I do have a wired icon regardless of connection type. However, it is
only the wired connection that actually works; disconnecting the cable
does not change the icon, but does remove connectivity altogether (so
there's a "wired-connection" icon even though networking is not
working).
It sounds
Sorry it took so long to get to this, but I was finally able to test on
my phone with OTA-8. The pairing worked as expected.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to bluez in Ubuntu.
https://bugs.launchpad.net/bugs/1552410
Title:
tests ran: 136, failed: 0;
http://kernel.ubuntu.com/testing/3.19.0-64.72/cavac__3.19.0-64.72__2016-06-27_16-23-00/results-index.html
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
** Description changed:
This bug is for tracking the 3.19.0-64.72~14.04.1 upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm
** Changed in: kernel-sru-workflow/regression-testing
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-utopic in Ubuntu.
https://bugs.launchpad.net/bugs/1596019
Title:
linux-lts-utopic:
** Changed in: kernel-sru-workflow/certification-testing
Status: In Progress => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1595991
Title:
linux: 3.13.0-91.138
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-trusty in Ubuntu.
https://bugs.launchpad.net/bugs/1596012
Title:
linux-lts-trusty:
This bug was fixed in the package linux-snapdragon - 4.4.0-1019.22
---
linux-snapdragon (4.4.0-1019.22) xenial; urgency=low
[ Kamal Mostafa ]
* Release Tracking Bug
- LP: #1595882
[ Ubuntu: 4.4.0-28.47 ]
* Linux netfilter local privilege escalation issues (LP:
Christopher M. Penalver (penalvch), I don't know. Yesterday (2016-06-25)
my laptop had freezed two times when I browsed the Internet. Is there a
solution for my issue? What do you think about it?
--
You received this bug notification because you are a member of Kernel
Packages, which is
** Changed in: kernel-sru-workflow/certification-testing
Status: Confirmed => Invalid
** Changed in: kernel-sru-workflow/verification-testing
Status: Confirmed => Fix Released
** Tags added: qa-testing-passed
--
You received this bug notification because you are a member of
kernel 4.6.2 still same
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1591044
Title:
Thunderbolt hotplug causes system hang
Status in linux package in Ubuntu:
Incomplete
Bug
** Changed in: linux (Ubuntu Trusty)
Status: Triaged => Fix Committed
** Changed in: linux (Ubuntu Xenial)
Status: Triaged => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
** Changed in: kernel-sru-workflow/verification-testing
Status: Confirmed => Fix Released
** Tags added: qa-testing-passed
** Changed in: kernel-sru-workflow/regression-testing
Status: Confirmed => Fix Released
** Changed in: kernel-sru-workflow/automated-testing
Status:
** Changed in: linux (Ubuntu Trusty)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1592429
Title:
trusty kernel crash in OOM killer related
upstream bug: https://bugs.freedesktop.org/show_bug.cgi?id=96214
** Bug watch added: freedesktop.org Bugzilla #96214
https://bugs.freedesktop.org/show_bug.cgi?id=96214
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
tests ran: 136, failed: 0;
http://kernel.ubuntu.com/testing/3.19.0-64.72/cavac__3.19.0-64.72__2016-06-27_15-14-00/results-index.html
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
[SRU Justification]
Impact: Existing scsi driver module which is not yet in the list which
is used to create the debian installer udeb packages.
Fix: Add module to scsi-modules file.
Testcase: Check scsi-modules*.udeb for containing pm80xx.ko (also should
allow for the scsi adapter to be used
*** This bug is a duplicate of bug 1586046 ***
https://bugs.launchpad.net/bugs/1586046
** This bug has been marked a duplicate of bug 1586046
Unclaimed register detected after reading register 0x65f10
--
You received this bug notification because you are a member of Kernel
Packages,
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1401741
Title:
rtl8188ee wireless driver high packet loss
Status in linux package in Ubuntu:
Incomplete
Bug description:
This is a
apport information
** Tags added: apport-collected ec2-images
** Description changed:
Dear Sirs,
We are using this AMI for our 9 exactly same d2.2xlarge instances deployed in
us-east-1:
ubuntu/images/hvm/ubuntu-trusty-14.04-amd64-server-20160314-2016-03-29_1459261902
(ami-93cfd9f9)
apport information
** Attachment added: "WifiSyslog.txt"
https://bugs.launchpad.net/bugs/1596033/+attachment/4691168/+files/WifiSyslog.txt
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages,
apport information
** Attachment added: "UdevLog.txt"
https://bugs.launchpad.net/bugs/1596033/+attachment/4691167/+files/UdevLog.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
apport information
** Attachment added: "ProcInterrupts.txt"
https://bugs.launchpad.net/bugs/1596033/+attachment/4691164/+files/ProcInterrupts.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
apport information
** Attachment added: "ProcModules.txt"
https://bugs.launchpad.net/bugs/1596033/+attachment/4691165/+files/ProcModules.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
apport information
** Attachment added: "ProcCpuinfo.txt"
https://bugs.launchpad.net/bugs/1596033/+attachment/4691163/+files/ProcCpuinfo.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
apport information
** Attachment added: "Lspci.txt"
https://bugs.launchpad.net/bugs/1596033/+attachment/4691162/+files/Lspci.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1596033
apport information
** Attachment added: "UdevDb.txt"
https://bugs.launchpad.net/bugs/1596033/+attachment/4691166/+files/UdevDb.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
Until now, the machine has stabilized its behaviour and no longer
freezes after the workaround applied.
Sadly, the suspend and shutdown functions remain in trouble, since when
the laptop lid is closed it remains turned on and unresponsive; and when
the equipment is instructed to shutdown, it
apport information
** Attachment added: "CurrentDmesg.txt"
https://bugs.launchpad.net/bugs/1596033/+attachment/4691161/+files/CurrentDmesg.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
This was fixed at least in 16.10 (and likely in 16.04 as well).
(kexec-tools no longer makes the change by default).
** Changed in: kexec-tools (Ubuntu)
Status: New => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to
** Description changed:
+ SRU Justification
- SRU Justification
+ Impact:
+ The upstream process for stable tree updates is quite similar
+ in scope to the Ubuntu SRU process, e.g., each patch has to
+ demonstrably fix a bug, and each patch is vetted by upstream
+
Does anyone still have this issue or should I close this?
** Changed in: linux (Ubuntu)
Status: Confirmed => Incomplete
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1401741
Public bug reported:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly
https://lists.ubuntu.com/archives/kernel-team/2016-June/078623.html
** Also affects: linux (Ubuntu Yakkety)
Importance: Undecided
Assignee: Taco Screen team (taco-screen-team)
Status: New
** Also affects: linux (Ubuntu Xenial)
Importance: Undecided
Status: New
**
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1591436
Title:
linux-armadaxp:
apport information
** Attachment added: "UdevDb.txt"
https://bugs.launchpad.net/bugs/1596550/+attachment/4691139/+files/UdevDb.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
apport information
** Attachment added: "ProcModules.txt"
https://bugs.launchpad.net/bugs/1596550/+attachment/4691138/+files/ProcModules.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
apport information
** Tags added: apport-collected
** Description changed:
We noticed a XFS metadata corruption once we ran a lot of small write
IOs on SSDs in our OpenStack swift environment:
[1468860.211158] XFS (sdax): Metadata corruption detected at
apport information
** Attachment added: "CurrentDmesg.txt"
https://bugs.launchpad.net/bugs/1596550/+attachment/4691133/+files/CurrentDmesg.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
apport information
** Attachment added: "Lsusb.txt"
https://bugs.launchpad.net/bugs/1596550/+attachment/4691135/+files/Lsusb.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1596550
apport information
** Attachment added: "ProcCpuinfo.txt"
https://bugs.launchpad.net/bugs/1596550/+attachment/4691136/+files/ProcCpuinfo.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
apport information
** Attachment added: "Lspci.txt"
https://bugs.launchpad.net/bugs/1596550/+attachment/4691134/+files/Lspci.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1596550
tests ran: 20, failed: 1;
http://kernel.ubuntu.com/testing/3.19.0-64.72/cavac__3.19.0-64.72__2016-06-27_13-24-00/results-index.html
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
apport information
** Attachment added: "WifiSyslog.txt"
https://bugs.launchpad.net/bugs/1596550/+attachment/4691141/+files/WifiSyslog.txt
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages,
apport information
** Attachment added: "UdevLog.txt"
https://bugs.launchpad.net/bugs/1596550/+attachment/4691140/+files/UdevLog.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
apport information
** Attachment added: "ProcInterrupts.txt"
https://bugs.launchpad.net/bugs/1596550/+attachment/4691137/+files/ProcInterrupts.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
I am lowering the importance to medium as this is neither loss of data
or loss of service class of bug (which I think is the classification for
high or critical). That does not mean it is not done asap.
** Summary changed:
- disk udeb should include pm80xx
+ scsi-modules udeb should include
** Changed in: kernel-sru-workflow/automated-testing
Status: Incomplete => Fix Released
** Changed in: kernel-sru-workflow/verification-testing
Status: Confirmed => Fix Released
** Changed in: kernel-sru-workflow/regression-testing
Status: Confirmed => Fix Released
** Tags
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-ti-omap4 in Ubuntu.
https://bugs.launchpad.net/bugs/1591435
Title:
linux-ti-omap4:
** Description changed:
We noticed a XFS metadata corruption once we ran a lot of small write
IOs on SSDs in our OpenStack swift environment:
-
[1468860.211158] XFS (sdax): Metadata corruption detected at
xfs_attr3_leaf_write_verify+0xd7/0xf0 [xfs], block 0x7c99480
[1468860.211195]
How do you figure verification needed? See comment #3.
** Tags removed: verification-needed-xenial
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1584163
Title:
cgroup namespace
This bug is missing log files that will aid in diagnosing the problem.
>From a terminal window please run:
apport-collect 1596550
and then change the status of the bug to 'Confirmed'.
If, due to the nature of the issue you have encountered, you are unable
to run this command, please add a
201 - 300 of 406 matches
Mail list logo