and here how it looks like on normal boot:
..
[drm] Initialized drm 1.1.0 20060810
Oct 29 09:09:30 spb-office kernel: [6.100409] mei_me :00:16.0: irq 45
for MSI/MSI-X
Oct 29 09:09:30 spb-office kernel: [6.166581] [drm] Memory usable by
graphics device = 2048M
Oct 29 09:09:30 spb-o
This bug still exists on 3.17.1-031701-generic #201410150735
As a workaround you can unbind and bind the xhci drivers -
http://www.geekdevs.com/2010/04/solved-unable-to-enumerate-usb-device-
disabling-ehci_hcd/. Instead of ehci_hcd, I used xhci_hcd and USB
started working again.
--
You received
also hit this bug:
...
Oct 29 09:04:14 spb-office kernel: [8.299240] [drm] Initialized drm 1.1.0
20060810
Oct 29 09:04:14 spb-office kernel: [8.337211] mei_me :00:16.0: irq 45
for MSI/MSI-X
Oct 29 09:04:14 spb-office kernel: [8.537626] [drm] Memory usable by
graphics device =
Please install this dkms and test again.
** Attachment added: "oem-audio-hda-daily-dkms_0.1_all.deb"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1381856/+attachment/4247749/+files/oem-audio-hda-daily-dkms_0.1_all.deb
--
You received this bug notification because you are a member of
[Expired for linux (Ubuntu Trusty) because there has been no activity
for 60 days.]
** Changed in: linux (Ubuntu Trusty)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.la
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]
** Changed in: linux (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bu
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]
** Changed in: linux (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bu
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]
** Changed in: linux (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bu
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]
** Changed in: linux (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bu
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]
** Changed in: linux (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bu
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]
** Changed in: linux (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bu
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]
** Changed in: linux (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bu
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]
** Changed in: linux (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bu
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]
** Changed in: linux (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bu
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]
** Changed in: linux (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bu
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug is for tracking the 3.13.0-39.66 upload package. This bug will
contain status and testing results related to
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug is for tracking the 3.16.0-24.32 upload package. This bug will
contain status and testing results related to
Andreas' fix is mentioned officially as part of Mesa 10.3.1. I'm yet to test it
on an i945 system though...
http://lists.freedesktop.org/archives/mesa-dev/2014-October/069253.html
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in U
John Moser, thank you for reporting this and helping make Ubuntu better. As per
http://global.shuttle.com/products/productsDownload?productId=1477 an update to
your BIOS is available (206). If you update to this following
https://help.ubuntu.com/community/BiosUpdate does it change anything? If
** Description changed:
This bug is for tracking the 3.16.0-24.32 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-P
** Description changed:
This bug is for tracking the 3.13.0-39.66 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-P
*** This bug is a duplicate of bug 1386629 ***
https://bugs.launchpad.net/bugs/1386629
** This bug has been marked a duplicate of bug 1386629
linux: 3.13.0-39.66 -proposed tracker
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to lin
** Changed in: kernel-sru-workflow/promote-to-security
Status: Confirmed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad
(adconrad)
** Changed in: kernel-sru-workflow/promote-to-updates
** Changed in: kernel-sru-workflow/promote-to-security
Status: Confirmed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad
(adconrad)
** Changed in: kernel-sru-workflow/promote-to-updates
This bug was fixed in the package linux - 3.13.0-39.66
---
linux (3.13.0-39.66) trusty; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1386629
[ Upstream Kernel Changes ]
* KVM: x86: Check non-canonical addresses upon WRMSR
- LP: #1384539
- CVE-201
This bug was fixed in the package linux - 3.13.0-39.66
---
linux (3.13.0-39.66) trusty; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1386629
[ Upstream Kernel Changes ]
* KVM: x86: Check non-canonical addresses upon WRMSR
- LP: #1384539
- CVE-201
This bug was fixed in the package linux-meta - 3.13.0.39.46
---
linux-meta (3.13.0.39.46) trusty; urgency=medium
* linux ABI 3.13.0-39
linux-meta (3.13.0.38.45) trusty; urgency=medium
[ Tim Gardner ]
* UBUNTU: Make linux-crashdump build for ppc64el
-LP: #1341475
[ Luis
This bug was fixed in the package linux - 3.13.0-39.66
---
linux (3.13.0-39.66) trusty; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1386629
[ Upstream Kernel Changes ]
* KVM: x86: Check non-canonical addresses upon WRMSR
- LP: #1384539
- CVE-201
This bug was fixed in the package linux - 3.13.0-39.66
---
linux (3.13.0-39.66) trusty; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1386629
[ Upstream Kernel Changes ]
* KVM: x86: Check non-canonical addresses upon WRMSR
- LP: #1384539
- CVE-201
This bug was fixed in the package linux - 3.13.0-39.66
---
linux (3.13.0-39.66) trusty; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1386629
[ Upstream Kernel Changes ]
* KVM: x86: Check non-canonical addresses upon WRMSR
- LP: #1384539
- CVE-201
This bug was fixed in the package linux - 3.13.0-39.66
---
linux (3.13.0-39.66) trusty; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1386629
[ Upstream Kernel Changes ]
* KVM: x86: Check non-canonical addresses upon WRMSR
- LP: #1384539
- CVE-201
This bug was fixed in the package linux - 3.13.0-39.66
---
linux (3.13.0-39.66) trusty; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1386629
[ Upstream Kernel Changes ]
* KVM: x86: Check non-canonical addresses upon WRMSR
- LP: #1384539
- CVE-201
This bug was fixed in the package linux - 3.13.0-39.66
---
linux (3.13.0-39.66) trusty; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1386629
[ Upstream Kernel Changes ]
* KVM: x86: Check non-canonical addresses upon WRMSR
- LP: #1384539
- CVE-201
This bug was fixed in the package linux - 3.13.0-39.66
---
linux (3.13.0-39.66) trusty; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1386629
[ Upstream Kernel Changes ]
* KVM: x86: Check non-canonical addresses upon WRMSR
- LP: #1384539
- CVE-201
This bug was fixed in the package linux - 3.13.0-39.66
---
linux (3.13.0-39.66) trusty; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1386629
[ Upstream Kernel Changes ]
* KVM: x86: Check non-canonical addresses upon WRMSR
- LP: #1384539
- CVE-201
This bug was fixed in the package linux - 3.13.0-39.66
---
linux (3.13.0-39.66) trusty; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1386629
[ Upstream Kernel Changes ]
* KVM: x86: Check non-canonical addresses upon WRMSR
- LP: #1384539
- CVE-201
*** This bug is a duplicate of bug 1386629 ***
https://bugs.launchpad.net/bugs/1386629
This bug was fixed in the package linux - 3.13.0-39.66
---
linux (3.13.0-39.66) trusty; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1386629
[ Upstream Kernel Change
This bug was fixed in the package linux - 3.13.0-39.66
---
linux (3.13.0-39.66) trusty; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1386629
[ Upstream Kernel Changes ]
* KVM: x86: Check non-canonical addresses upon WRMSR
- LP: #1384539
- CVE-201
This bug was fixed in the package linux - 3.13.0-39.66
---
linux (3.13.0-39.66) trusty; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1386629
[ Upstream Kernel Changes ]
* KVM: x86: Check non-canonical addresses upon WRMSR
- LP: #1384539
- CVE-201
This bug was fixed in the package linux - 3.13.0-39.66
---
linux (3.13.0-39.66) trusty; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1386629
[ Upstream Kernel Changes ]
* KVM: x86: Check non-canonical addresses upon WRMSR
- LP: #1384539
- CVE-201
This bug was fixed in the package linux - 3.13.0-39.66
---
linux (3.13.0-39.66) trusty; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1386629
[ Upstream Kernel Changes ]
* KVM: x86: Check non-canonical addresses upon WRMSR
- LP: #1384539
- CVE-201
This bug was fixed in the package linux - 3.16.0-24.32
---
linux (3.16.0-24.32) utopic; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1386635
[ Upstream Kernel Changes ]
* KVM: x86: Check non-canonical addresses upon WRMSR
- LP: #1384539
- CVE-201
This bug was fixed in the package linux - 3.13.0-39.66
---
linux (3.13.0-39.66) trusty; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1386629
[ Upstream Kernel Changes ]
* KVM: x86: Check non-canonical addresses upon WRMSR
- LP: #1384539
- CVE-201
This bug was fixed in the package linux - 3.13.0-39.66
---
linux (3.13.0-39.66) trusty; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1386629
[ Upstream Kernel Changes ]
* KVM: x86: Check non-canonical addresses upon WRMSR
- LP: #1384539
- CVE-201
This bug was fixed in the package linux - 3.16.0-24.32
---
linux (3.16.0-24.32) utopic; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1386635
[ Upstream Kernel Changes ]
* KVM: x86: Check non-canonical addresses upon WRMSR
- LP: #1384539
- CVE-201
This bug was fixed in the package linux - 3.16.0-24.32
---
linux (3.16.0-24.32) utopic; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1386635
[ Upstream Kernel Changes ]
* KVM: x86: Check non-canonical addresses upon WRMSR
- LP: #1384539
- CVE-201
This bug was fixed in the package linux - 3.13.0-39.66
---
linux (3.13.0-39.66) trusty; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1386629
[ Upstream Kernel Changes ]
* KVM: x86: Check non-canonical addresses upon WRMSR
- LP: #1384539
- CVE-201
This bug was fixed in the package linux - 3.16.0-24.32
---
linux (3.16.0-24.32) utopic; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1386635
[ Upstream Kernel Changes ]
* KVM: x86: Check non-canonical addresses upon WRMSR
- LP: #1384539
- CVE-201
This bug was fixed in the package linux - 3.13.0-39.66
---
linux (3.13.0-39.66) trusty; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1386629
[ Upstream Kernel Changes ]
* KVM: x86: Check non-canonical addresses upon WRMSR
- LP: #1384539
- CVE-201
This bug was fixed in the package linux - 3.16.0-24.32
---
linux (3.16.0-24.32) utopic; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1386635
[ Upstream Kernel Changes ]
* KVM: x86: Check non-canonical addresses upon WRMSR
- LP: #1384539
- CVE-201
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Description changed:
This bug is for tracking the 3.13.0-39.66 upload package. This bug will
contain status and test
There is a similar bug in the RedHat bugzilla
(https://bugzilla.redhat.com/show_bug.cgi?id=1110011). There is a
driver posted there, if anyone is up for testing.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bug
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Description changed:
This bug is for tracking the 3.16.0-24.32 upload package. This bug will
contain status and test
The certification-testing task was set to Fix Released but neither the
certification-testing-passed or certification-testing-failed tag was
applied
** Changed in: kernel-sru-workflow/certification-testing
Status: Fix Released => Incomplete
** Description changed:
This bug is for tracki
** Changed in: kernel-sru-workflow/certification-testing
Status: Incomplete => Fix Released
** Tags added: certification-testing-passed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bug
** Tags added: certification-testing-passed
** Changed in: kernel-sru-workflow/certification-testing
Status: Incomplete => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bug
Hello, what is the status of this?
I am using the 3.16.2 kernel and the firmware from #97 - but I am still
experiencing those disconnections and kernel oops. Is the 3.18rc2 including the
latest version supposed to be more stable?
Will there be significant changes before the final release of 3.18?
The certification-testing task was set to Fix Released but neither the
certification-testing-passed or certification-testing-failed tag was
applied
** Changed in: kernel-sru-workflow/certification-testing
Status: Fix Released => Incomplete
** Description changed:
This bug is for tracki
** Changed in: kernel-sru-workflow/certification-testing
Status: Confirmed => Fix Released
** Changed in: kernel-sru-workflow/regression-testing
Status: Confirmed => Fix Released
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => Fix Released
** Changed
** Changed in: kernel-sru-workflow/certification-testing
Status: Confirmed => Fix Released
** Changed in: kernel-sru-workflow/regression-testing
Status: Confirmed => Fix Released
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => Fix Released
** Changed
** Changed in: kernel-sru-workflow/verification-testing
Status: New => In Progress
** Changed in: kernel-sru-workflow/certification-testing
Status: New => Confirmed
** Changed in: kernel-sru-workflow/regression-testing
Status: New => Confirmed
** Changed in: kernel-sru-workf
** Changed in: kernel-sru-workflow/verification-testing
Status: New => In Progress
** Changed in: kernel-sru-workflow/certification-testing
Status: New => Confirmed
** Changed in: kernel-sru-workflow/regression-testing
Status: New => Confirmed
** Changed in: kernel-sru-workf
** Changed in: hwe-next/trusty
Status: In Progress => Fix Released
** Changed in: hwe-next
Status: Confirmed => Fix Released
** Changed in: linux (Ubuntu)
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, wh
apport information
** Attachment added: "ProcEnviron.txt"
https://bugs.launchpad.net/bugs/1386931/+attachment/4247709/+files/ProcEnviron.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/b
apport information
** Attachment added: "UdevDb.txt"
https://bugs.launchpad.net/bugs/1386931/+attachment/4247713/+files/UdevDb.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1386931
apport information
** Attachment added: "ProcModules.txt"
https://bugs.launchpad.net/bugs/1386931/+attachment/4247711/+files/ProcModules.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/b
apport information
** Attachment added: "UdevLog.txt"
https://bugs.launchpad.net/bugs/1386931/+attachment/4247714/+files/UdevLog.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1386
apport information
** Attachment added: "ProcInterrupts.txt"
https://bugs.launchpad.net/bugs/1386931/+attachment/4247710/+files/ProcInterrupts.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad
apport information
** Attachment added: "ProcCpuinfo.txt"
https://bugs.launchpad.net/bugs/1386931/+attachment/4247708/+files/ProcCpuinfo.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/b
apport information
** Attachment added: "PulseList.txt"
https://bugs.launchpad.net/bugs/1386931/+attachment/4247712/+files/PulseList.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/
apport information
** Attachment added: "WifiSyslog.txt"
https://bugs.launchpad.net/bugs/1386931/+attachment/4247715/+files/WifiSyslog.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bug
apport information
** Attachment added: "Lspci.txt"
https://bugs.launchpad.net/bugs/1386931/+attachment/4247706/+files/Lspci.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1386931
apport information
** Attachment added: "CurrentDmesg.txt"
https://bugs.launchpad.net/bugs/1386931/+attachment/4247705/+files/CurrentDmesg.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net
apport information
** Attachment added: "Lsusb.txt"
https://bugs.launchpad.net/bugs/1386931/+attachment/4247707/+files/Lsusb.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1386931
apport information
** Tags added: apport-collected
** Description changed:
Chromium was playing Youtube videos via HTML5 browser in Ubuntu 14.04.
I upgraded to Ubuntu 14.10 via Update-Manager.
Now Chromium only loads the video, shows that the video is/has loaded,
and shows the Paus
apport information
** Attachment added: "BootDmesg.txt"
https://bugs.launchpad.net/bugs/1386931/+attachment/4247703/+files/BootDmesg.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/
apport information
** Attachment added: "CRDA.txt"
https://bugs.launchpad.net/bugs/1386931/+attachment/4247704/+files/CRDA.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1386931
Ti
This bug is missing log files that will aid in diagnosing the problem.
>From a terminal window please run:
apport-collect 1386931
and then change the status of the bug to 'Confirmed'.
If, due to the nature of the issue you have encountered, you are unable
to run this command, please add a commen
I managed to install the rc1 kernel and this problem seems to be fixed
there! I will add the appropriate tag. Is there any ETA for the 3.18
kernel release in utopic?
** Tags removed: kernel-unable-to-test-upstream
** Tags added: kernel-fixed-upstream
** Changed in: linux (Ubuntu)
Status: I
** Description changed:
This bug is for tracking the 3.16.0-24.32 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-P
** Package changed: linux-meta (Ubuntu) => linux (Ubuntu)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1386931
Title:
Chromium won't play HTML5 video after 14.04 to 14.10 upgrade
Stat
** Description changed:
This bug is for tracking the 3.13.0-39.66 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-P
** Changed in: kernel-sru-workflow/promote-to-proposed
Status: Confirmed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-proposed
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad
(adconrad)
--
You received this bug notification because you are a
** Changed in: kernel-sru-workflow/promote-to-proposed
Status: Confirmed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-proposed
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad
(adconrad)
--
You received this bug notification because you are a
I installed the 3.18-rc2 packages but when I tried to boot into it I got
an error message saying that it couldn't find the root device. I
compared the ID of the root device in the boot options for the 3.18
kernel to the ones in the 3.16 kernel and couldn't find any differences.
It seems to be refer
Launchpad has imported 14 comments from the remote bug at
https://bugs.freedesktop.org/show_bug.cgi?id=81136.
If you reply to an imported comment from within Launchpad, your comment
will be sent to the remote bug automatically. Read more about
Launchpad's inter-bugtracker facilities at
https://hel
Appears to be Kernel bug in graphics driver:
[196179.037371] [ cut here ]
[196179.037408] WARNING: CPU: 2 PID: 1548 at
/build/buildd/linux-3.16.0/drivers/gpu/drm/i915/intel_display.c:3324
intel_crtc_wait_for_pending_flips+0x16c/0x180 [i915]()
[196179.037410] Modules linke
** Tags added: kernel-unable-to-test-upstream
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1386473
Title:
Not using all cores after upgrade to 14.10
Status in “linux” package in Ubunt
You have been subscribed to a public bug:
Chromium was playing Youtube videos via HTML5 browser in Ubuntu 14.04.
I upgraded to Ubuntu 14.10 via Update-Manager.
Now Chromium only loads the video, shows that the video is/has loaded,
and shows the Pause button (as the video is playing). The video
I am willing to run the newer kernel but I need a refresher on how to
create the initramfs to support my setup. The kernel is having an issue
discovering the MD raid arrays I have configured. The boot disk is on a
standard volume on an SSD. The remaining filesystems are all LVMs on the
encrypted
Michael Heuberger, as per
http://www.asus.com/Motherboards/P6X58DE/HelpDesk_Download/ an update to your
BIOS is available (0803). If you update to this following
https://help.ubuntu.com/community/BiosUpdate does it change anything? If it
doesn't, could you please both specify what happened, an
The new kernel does not boot on my computer (blank screen).
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
** Tags added: kernel-unable-to-test-upstream
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubunt
Nik. Th. the next step is to fully reverse commit bisect the kernel in
order to identify the fix commit. Could you please do this following
https://wiki.ubuntu.com/Kernel/KernelBisection#How_do_I_reverse_bisect_the_upstream_kernel.3F
?
** Tags removed: kernel-bug-fixed-upstream
** Tags added: kern
I need to generate an initramfs as I run encrypted multidisks that host
LVM2. I am trying to find again the documentation on how to do this.
- jss
On Tue, Oct 28, 2014 at 7:23 PM, Jon Stumpf <1386...@bugs.launchpad.net>
wrote:
> Installed linux-image-3.18-rc2-generic-amd64. Also installed
> c
I really cannot spot any difference in logs, but maybe it's just me.
Here is the log from the 3.17.1 kernel, where resume works as it should.
** Attachment added: "3.17.1-resume-succeeded.txt"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1386695/+attachment/4247637/+files/3.17.1-resu
Unfortunately it does not work with 3.16.6 . I've tested with and
without the "nouveau.nofbaccel=1" parameter, but in both cases I had the
same behavior as of 3.16.4 (Ubuntu 3.16.0-23-generic).
I'm attaching the part of the log with the hibernation and resume
messages.
** Attachment added: "3.1
Brendan, would 3.18-rc1 provide an opportunity to test to the problem?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1385679
Title:
zd1211rw Stops working after some time
Status in “li
Janus, please do not add bug tasks to a closed report. If you are having a
problem with blueman, file a new report with Ubuntu by executing the following
in a terminal:
ubuntu-bug blueman
As well, please do not announce in this report you created a new bug
report.
Thank you for your understandi
Thanks. Looks like you selected the right two versions:
v3.13.11.6: everything works
v3.13.11.7: USB is dead after resume
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1384041
Title:
[
Colin Taylor, the issue you are reporting is an upstream one. Could you
please report this problem to the linux-input mailing list by following
the instructions _verbatim_ at
https://wiki.ubuntu.com/Bugs/Upstream/kernel ?
Please provide a direct URL to your e-mail to the mailing list once you
have
1 - 100 of 311 matches
Mail list logo