[Kernel-packages] [Bug 1355470] [NEW] linux: 3.13.0-34.59 -proposed tracker
Public bug reported: This bug is for tracking the 3.13.0-34.59 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-Prepare-package-start:Monday, 11. August 2014 22:08 UTC kernel-phase-changed:Monday, 11. August 2014 22:08 UTC kernel-phase:Prepare ** Affects: kernel-development-workflow Importance: Medium Status: In Progress ** Affects: kernel-development-workflow/package-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-development-workflow/prepare-package Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-development-workflow/prepare-package-meta Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-development-workflow/prepare-package-signed Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-development-workflow/promote-to-release Importance: Medium Assignee: Ubuntu Package Archive Administrators (ubuntu-archive) Status: New ** Affects: linux (Ubuntu) Importance: Undecided Status: Invalid ** Affects: linux (Ubuntu Trusty) Importance: Medium Status: New ** Tags: kernel-release-tracking-bug trusty ** Tags added: kernel-release-tracking-bug ** Also affects: linux (Ubuntu Trusty) Importance: Undecided Status: New ** Tags added: trusty ** Also affects: kernel-development-workflow/package-testing Importance: Undecided Status: New ** Also affects: kernel-development-workflow/prepare-package Importance: Undecided Status: New ** Also affects: kernel-development-workflow/prepare-package-meta Importance: Undecided Status: New ** Also affects: kernel-development-workflow/prepare-package-signed Importance: Undecided Status: New ** Also affects: kernel-development-workflow/promote-to-release Importance: Undecided Status: New ** Changed in: kernel-development-workflow Status: New = In Progress ** Changed in: kernel-development-workflow Importance: Undecided = Medium ** Changed in: kernel-development-workflow/package-testing Importance: Undecided = Medium ** Changed in: kernel-development-workflow/package-testing Assignee: (unassigned) = Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-development-workflow/prepare-package Importance: Undecided = Medium ** Changed in: kernel-development-workflow/prepare-package Assignee: (unassigned) = Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-development-workflow/prepare-package-meta Importance: Undecided = Medium ** Changed in: kernel-development-workflow/prepare-package-meta Assignee: (unassigned) = Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-development-workflow/prepare-package-signed Importance: Undecided = Medium ** Changed in: kernel-development-workflow/prepare-package-signed Assignee: (unassigned) = Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-development-workflow/promote-to-release Importance: Undecided = Medium ** Changed in: kernel-development-workflow/promote-to-release Assignee: (unassigned) = Ubuntu Package Archive Administrators (ubuntu-archive) ** Changed in: linux (Ubuntu) Status: New = Invalid ** Changed in: linux (Ubuntu Trusty) Importance: Undecided = Medium -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1355470 Title: linux: 3.13.0-34.59 -proposed tracker Status in Kernel Development Workflow: In Progress Status in Kernel Development Workflow package-testing series: New Status in Kernel Development Workflow prepare-package series: New Status in Kernel Development Workflow prepare-package-meta series: New Status in Kernel Development Workflow prepare-package-signed series: New Status in Kernel Development Workflow promote-to-release series: New Status in “linux” package in Ubuntu: Invalid Status in “linux” source package in Trusty: New Bug description: This bug is for tracking the 3.13.0-34.59 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-Prepare-package-start:Monday, 11. August 2014 22:08 UTC kernel-phase-changed:Monday, 11. August 2014 22:08 UTC kernel-phase:Prepare To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-development-workflow/+bug/1355470/+subscriptions --
[Kernel-packages] [Bug 1351653] Re: Suspend fails
I tested with v3.16-utopic, it was the ne on top of the page at ... Couldn't install linux-headers, got this: $ sudo dpkg -i linux-*.deb Selecting previously unselected package linux-headers-3.16.0-031600-generic. (Reading database ... 373797 files and directories currently installed.) Preparing to unpack linux-headers-3.16.0-031600-generic_3.16.0-031600.201408031935_amd64.deb ... Unpacking linux-headers-3.16.0-031600-generic (3.16.0-031600.201408031935) ... Selecting previously unselected package linux-image-3.16.0-031600-generic. Preparing to unpack linux-image-3.16.0-031600-generic_3.16.0-031600.201408031935_amd64.deb ... Done. Unpacking linux-image-3.16.0-031600-generic (3.16.0-031600.201408031935) ... dpkg: dependency problems prevent configuration of linux-headers-3.16.0-031600-generic: linux-headers-3.16.0-031600-generic depends on linux-headers-3.16.0-031600; however: Package linux-headers-3.16.0-031600 is not installed. dpkg: error processing package linux-headers-3.16.0-031600-generic (--install): dependency problems - leaving unconfigured Setting up linux-image-3.16.0-031600-generic (3.16.0-031600.201408031935) ... Running depmod. update-initramfs: deferring update (hook will be called later) Examining /etc/kernel/postinst.d. run-parts: executing /etc/kernel/postinst.d/apt-auto-removal 3.16.0-031600-generic /boot/vmlinuz-3.16.0-031600-generic run-parts: executing /etc/kernel/postinst.d/dkms 3.16.0-031600-generic /boot/vmlinuz-3.16.0-031600-generic Error! Could not locate dkms.conf file. File: does not exist. Error! Bad return status for module build on kernel: 3.16.0-031600-generic (x86_64) Consult /var/lib/dkms/acpi-call/20130623/build/make.log for more information. Error! Bad return status for module build on kernel: 3.16.0-031600-generic (x86_64) Consult /var/lib/dkms/vboxhost/4.3.10/build/make.log for more information. Error! Bad return status for module build on kernel: 3.16.0-031600-generic (x86_64) Consult /var/lib/dkms/tp-smapi/0.41/build/make.log for more information. run-parts: executing /etc/kernel/postinst.d/initramfs-tools 3.16.0-031600-generic /boot/vmlinuz-3.16.0-031600-generic update-initramfs: Generating /boot/initrd.img-3.16.0-031600-generic run-parts: executing /etc/kernel/postinst.d/pm-utils 3.16.0-031600-generic /boot/vmlinuz-3.16.0-031600-generic run-parts: executing /etc/kernel/postinst.d/update-notifier 3.16.0-031600-generic /boot/vmlinuz-3.16.0-031600-generic run-parts: executing /etc/kernel/postinst.d/zz-update-grub 3.16.0-031600-generic /boot/vmlinuz-3.16.0-031600-generic Generating grub configuration file ... Warning: Setting GRUB_TIMEOUT to a non-zero value when GRUB_HIDDEN_TIMEOUT is set is no longer supported. Found linux image: /boot/vmlinuz-3.16.0-031600-generic Found initrd image: /boot/initrd.img-3.16.0-031600-generic Found linux image: /boot/vmlinuz-3.13.0-32-generic Found initrd image: /boot/initrd.img-3.13.0-32-generic Found linux image: /boot/vmlinuz-3.13.0-30-generic Found initrd image: /boot/initrd.img-3.13.0-30-generic done Errors were encountered while processing: linux-headers-3.16.0-031600-generic -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1351653 Title: Suspend fails Status in “linux” package in Ubuntu: Incomplete Bug description: When suspending the machine (clicking cogwheel in upper right corner): * the computer starts doing what it does before suspending * the screen goes black (which is the way it used to be) * some message about failure is displayed briefly, and i get the login screen. The attached (i believe) syslog shows the error, it's: Aug 2 19:17:05 zeno kernel: [58750.458713] PM: Entering mem sleep Aug 2 19:17:05 zeno kernel: [58750.458759] Suspending console(s) (use no_console_suspend to debug) Aug 2 19:17:05 zeno kernel: [58750.458936] sd 2:0:0:0: [sdb] Synchronizing SCSI cache Aug 2 19:17:05 zeno kernel: [58750.458946] sd 0:0:0:0: [sda] Synchronizing SCSI cache Aug 2 19:17:05 zeno kernel: [58750.458982] sd 2:0:0:0: [sdb] Stopping disk Aug 2 19:17:05 zeno kernel: [58750.459063] sd 0:0:0:0: [sda] Stopping disk Aug 2 19:17:05 zeno kernel: [58750.895746] nouveau [ DRM] suspending display... Aug 2 19:17:05 zeno kernel: [58750.895768] nouveau [ DRM] unpinning framebuffer(s)... Aug 2 19:17:05 zeno kernel: [58750.895776] nouveau [ DRM] evicting buffers... Aug 2 19:17:05 zeno kernel: [58750.895777] nouveau [ DRM] waiting for kernel channels to go idle... Aug 2 19:17:05 zeno kernel: [58750.895824] nouveau [ DRM] suspending client object trees... Aug 2 19:17:05 zeno kernel: [58750.896278] nouveau [ DRM] suspending kernel object tree... Aug 2 19:17:05 zeno kernel: [58752.898898] nouveau E[ PDISP][:01:00.0][0xc000857c][88026d15d300] fini timeout, 0xc2061008 Aug 2 19:17:05 zeno kernel: [58752.898900]
[Kernel-packages] [Bug 1351653] Re: Suspend fails
But the kernel itself is installed: $ uname -a Linux zeno 3.16.0-031600-generic #201408031935 SMP Sun Aug 3 23:36:11 UTC 2014 x86_64 x86_64 x86_64 GNU/Linux Suspend gives the same error, so i tagged it as kernel-bug-exists- upstream-3.16.0: Aug 12 00:29:01 zeno kernel: [ 57.354813] nouveau [ DRM] suspending display... Aug 12 00:29:01 zeno kernel: [ 57.354818] nouveau [ DRM] unpinning framebuffer(s)... Aug 12 00:29:01 zeno kernel: [ 57.354843] nouveau [ DRM] evicting buffers... Aug 12 00:29:01 zeno kernel: [ 57.367662] nouveau [ DRM] waiting for kernel channels to go idle... Aug 12 00:29:01 zeno kernel: [ 57.367689] nouveau [ DRM] suspending client object trees... Aug 12 00:29:01 zeno kernel: [ 57.367935] nouveau [ DRM] suspending kernel object tree... Aug 12 00:29:01 zeno kernel: [ 59.370367] nouveau E[ PDISP][:01:00.0][0xc000857c][880269c7a680] fini timeout, 0xc2061008 Aug 12 00:29:01 zeno kernel: [ 59.370369] nouveau E[ PDISP][:01:00.0][0xc000857c][880269c7a680] failed suspend, -16 Aug 12 00:29:01 zeno kernel: [ 59.370370] nouveau E[ DRM] 0xd150:0xd15c7c00 suspend failed with -16 Aug 12 00:29:01 zeno kernel: [ 59.370401] nouveau E[ DRM] 0x:0xd150 suspend failed with -16 Aug 12 00:29:01 zeno kernel: [ 59.370495] nouveau E[ DRM] 0x:0x suspend failed with -16 Aug 12 00:29:01 zeno kernel: [ 59.370985] nouveau E[ DRM] 0x:0x suspend failed with -16 Aug 12 00:29:01 zeno kernel: [ 59.371019] nouveau [ DRM] resuming display... Aug 12 00:29:01 zeno kernel: [ 59.406048] pci_pm_suspend(): nouveau_pmops_suspend+0x0/0xc0 [nouveau] returns -16 Aug 12 00:29:01 zeno kernel: [ 59.406051] dpm_run_callback(): pci_pm_suspend+0x0/0x140 returns -16 Aug 12 00:29:01 zeno kernel: [ 59.406053] PM: Device :01:00.0 failed to suspend async: error -16 Aug 12 00:29:01 zeno kernel: [ 59.406097] PM: Some devices failed to suspend, or early wake event detected ** Tags added: kernel-bug-exists-upstream-3.16.0 ** Changed in: linux (Ubuntu) Status: Incomplete = Confirmed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1351653 Title: Suspend fails Status in “linux” package in Ubuntu: Confirmed Bug description: When suspending the machine (clicking cogwheel in upper right corner): * the computer starts doing what it does before suspending * the screen goes black (which is the way it used to be) * some message about failure is displayed briefly, and i get the login screen. The attached (i believe) syslog shows the error, it's: Aug 2 19:17:05 zeno kernel: [58750.458713] PM: Entering mem sleep Aug 2 19:17:05 zeno kernel: [58750.458759] Suspending console(s) (use no_console_suspend to debug) Aug 2 19:17:05 zeno kernel: [58750.458936] sd 2:0:0:0: [sdb] Synchronizing SCSI cache Aug 2 19:17:05 zeno kernel: [58750.458946] sd 0:0:0:0: [sda] Synchronizing SCSI cache Aug 2 19:17:05 zeno kernel: [58750.458982] sd 2:0:0:0: [sdb] Stopping disk Aug 2 19:17:05 zeno kernel: [58750.459063] sd 0:0:0:0: [sda] Stopping disk Aug 2 19:17:05 zeno kernel: [58750.895746] nouveau [ DRM] suspending display... Aug 2 19:17:05 zeno kernel: [58750.895768] nouveau [ DRM] unpinning framebuffer(s)... Aug 2 19:17:05 zeno kernel: [58750.895776] nouveau [ DRM] evicting buffers... Aug 2 19:17:05 zeno kernel: [58750.895777] nouveau [ DRM] waiting for kernel channels to go idle... Aug 2 19:17:05 zeno kernel: [58750.895824] nouveau [ DRM] suspending client object trees... Aug 2 19:17:05 zeno kernel: [58750.896278] nouveau [ DRM] suspending kernel object tree... Aug 2 19:17:05 zeno kernel: [58752.898898] nouveau E[ PDISP][:01:00.0][0xc000857c][88026d15d300] fini timeout, 0xc2061008 Aug 2 19:17:05 zeno kernel: [58752.898900] nouveau E[ PDISP][:01:00.0][0xc000857c][88026d15d300] failed suspend, -16 Aug 2 19:17:05 zeno kernel: [58752.898901] nouveau E[ DRM] 0xd150:0xd15c7c00 suspend failed with -16 Aug 2 19:17:05 zeno kernel: [58752.898919] nouveau E[ DRM] 0x:0xd150 suspend failed with -16 Aug 2 19:17:05 zeno kernel: [58752.899009] nouveau E[ DRM] 0x:0x suspend failed with -16 Aug 2 19:17:05 zeno kernel: [58752.899648] nouveau E[ DRM] 0x:0x suspend failed with -16 Aug 2 19:17:05 zeno kernel: [58752.899748] nouveau [ DRM] resuming display... Aug 2 19:17:05 zeno kernel: [58752.899767] nouveau E[ DRM] bo 88026c624000 pinned elsewhere: 0x0002 vs 0x0004 Aug 2 19:17:05 zeno kernel: [58752.899768] [drm:drm_helper_resume_force_mode] *ERROR* failed to set mode on crtc 88027256a000 Aug 2 19:17:05 zeno kernel: [58752.907842] pci_pm_suspend():
[Kernel-packages] [Bug 1349897] Update Released
The verification of the Stable Release Update for linux has completed successfully and the package has now been released to -updates. Subsequently, the Ubuntu Stable Release Updates Team is being unsubscribed and will not receive messages about this bug report. In the event that you encounter a regression using the package from -updates please report a new bug using ubuntu-bug and tag the bug report regression-update so we can easily find any regressions. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1349897 Title: linux: 3.13.0-33.58 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow package-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Fix Released Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Confirmed Status in Kernel SRU Workflow security-signoff series: In Progress Status in Kernel SRU Workflow verification-testing series: In Progress Status in “linux” package in Ubuntu: Invalid Status in “linux” source package in Trusty: Fix Released Bug description: This bug is for tracking the 3.13.0-33.58 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 29. July 2014 15:09 UTC kernel-stable-Prepare-package-end:Wednesday, 30. July 2014 21:05 UTC kernel-stable-Promote-to-proposed-start:Wednesday, 30. July 2014 21:05 UTC ppa-package-testing-start:Wednesday, 30. July 2014 21:05 UTC kernel-stable-Promote-to-proposed-end:Friday, 08. August 2014 22:00 UTC kernel-stable-phase:Verification Testing kernel-stable-phase-changed:Friday, 08. August 2014 23:01 UTC kernel-stable-Verification-testing-start:Friday, 08. August 2014 23:01 UTC kernel-stable-Certification-testing-start:Friday, 08. August 2014 23:01 UTC kernel-stable-Security-signoff-start:Friday, 08. August 2014 23:01 UTC kernel-stable-Regression-testing-start:Friday, 08. August 2014 23:01 UTC kernel-stable-Certification-testing-end:Monday, 11. August 2014 20:00 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1349897/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1347088] Update Released
The verification of the Stable Release Update for linux-lts-trusty has completed successfully and the package has now been released to -updates. Subsequently, the Ubuntu Stable Release Updates Team is being unsubscribed and will not receive messages about this bug report. In the event that you encounter a regression using the package from -updates please report a new bug using ubuntu-bug and tag the bug report regression-update so we can easily find any regressions. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1347088 Title: Trusty update to 3.13.11.5 stable release Status in “linux” package in Ubuntu: Confirmed Status in “linux” source package in Trusty: Fix Released Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from Linus' tree or in a minimally backported form of that patch. The 3.13.11.5 upstream stable patch set is now available. It should be included in the Ubuntu kernel as well. git://git.kernel.org/ TEST CASE: TBD The following patches are in the 3.13.11.5 stable release: Linux 3.13.11.5 iscsi-target: fix iscsit_del_np deadlock on unload iscsi-target: Avoid rejecting incorrect ITT for Data-Out lz4: fix another possible overrun efi-pstore: Fix an overflow on 32-bit builds iscsi-target: Explicily clear login response PDU in exception path target: Fix left-over se_lun-lun_sep pointer OOPs ALSA: hda - restore BCLK M/N values when resuming HSW/BDW display controller MIPS: MSC: Prevent out-of-bounds writes to MIPS SC ioremap'd region recordmcount/MIPS: Fix possible incorrect mcount_loc table entries in modules ALSA: usb-audio: Fix races at disconnection and PCM closing net: allwinner: emac: Add missing free_irq powerpc: Don't skip ePAPR spin-table CPUs nfs: Fix cache_validity check in nfs_write_pageuptodate() aio: fix kernel memory disclosure in io_getevents() introduced in v3.10 aio: fix aio request leak when events are reaped by userspace [CIFS] fix mount failure with broken pathnames when smb3 mount with mapchars option drm/i915: Hold the table lock whilst walking the file's idr and counting the objects in debugfs mm: fix crashes from mbind() merging vmas DMA, CMA: fix possible memory leak mm, pcp: allow restoring percpu_pagelist_fraction default kernel/watchdog.c: remove preemption restrictions when restarting lockup detector hugetlb: fix copy_hugetlb_page_range() to handle migration/hwpoisoned entry x86_32, entry: Do syscall exit work on badsys (CVE-2014-4508) lz4: ensure length does not wrap lzo: properly check for overruns ALSA: hda - hdmi: call overridden init on resume rbd: handle parent_overlap on writes correctly blkcg: fix use-after-free in __blkg_release_rcu() by making blkcg_gq refcnt an atomic_t rt2x00: fix rfkill regression on rt2500pci b43: fix frequency reported on G-PHY with /new/ firmware rt2x00: disable TKIP on USB Bluetooth: Allow change security level on ATT_CID in slave role Bluetooth: Fix locking of hdev when calling into SMP code Bluetooth: Fix indicating discovery state when canceling inquiry Bluetooth: Fix setting correct authentication information for SMP STK Bluetooth: Fix SSP acceptor just-works confirmation without MITM ALSA: control: Make sure that id-index does not overflow ALSA: control: Handle numid overflow ALSA: control: Don't access controls outside of protected regions ALSA: control: Fix replacing user controls ALSA: control: Protect user controls against concurrent access arm64/dma: Removing ARCH_HAS_DMA_GET_REQUIRED_MASK macro arm64: ptrace: fix empty registers set in prstatus of aarch32 process core arm64: uid16: fix __kernel_old_{gid,uid}_t definitions arm64: ptrace: change fs when passing kernel pointer to regset code arm64: Bug fix in stack alignment exception USB:
[Kernel-packages] [Bug 1331219] Re: Kernel Bug at skb_segment + 0x95a
This bug was fixed in the package linux - 3.13.0-33.58 --- linux (3.13.0-33.58) trusty; urgency=low [ Brad Figg ] * Release Tracking Bug - LP: #1349897 [ Upstream Kernel Changes ] * mm: numa: do not automatically migrate KSM pages - LP: #1346917 * net: fix UDP tunnel GSO of frag_list GRO packets - LP: #1331219 * auditsc: audit_krule mask accesses need bounds checking - LP: #1347088 * n_tty: Fix buffer overruns with larger-than-4k pastes - LP: #1208740 -- Tim Gardner tim.gard...@canonical.com Fri, 18 Jul 2014 14:57:50 + ** Changed in: linux (Ubuntu Trusty) Status: Fix Committed = Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1331219 Title: Kernel Bug at skb_segment + 0x95a Status in “linux” package in Ubuntu: Fix Released Status in “linux” source package in Trusty: Fix Released Status in “linux” source package in Utopic: Fix Released Bug description: SRU Justification: Impact: A crash occurs with VXLAN packets when using GSO capable hardware such as the case with openstack neutron. Fix: Upstream fix 5882a07c7 fixes a locking error that previously allowed certain timings to hit this bug. Testcase: Create and run a Neutron gateway with VXLANs, and stress the network for an extended period of time. Kernel Bug affects 3.11-3.15 on machines using gso offload. Stack trace [ 871.025524] [ cut here ] [ 871.030742] kernel BUG at /build/buildd/linux-3.13.0/net/core/skbuff.c:2903! [ 871.038669] invalid opcode: [#1] SMP [ 871.043318] Modules linked in: xt_nat xt_REDIRECT dccp_diag dccp tcp_diag udp_diag inet_diag unix_diag ipt_MASQUERADE iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conn track nf_conntrack ipt_REJECT xt_CHECKSUM iptable_mangle xt_tcpudp bridge ip6table_filter ip6_tables iptable_filter ip_tables ebtable_nat ebtables x_tables veth openvswitch gre vxlan ip_tunnel dm_crypt 8021q garp stp mrp llc bonding nfsd auth_rpcgss nfs_acl nfs lockd sunrpc fscache sb_edac gpio_ich joydev edac_core x86_pkg_temp_thermal intel_powerclamp coretemp lpc_ich acpi_power_m eter kvm_intel kvm crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd ipmi_si mac_hid lp parport btrfs xor raid6_pq libcrc32c hid_generic qla2xxx fnic libfcoe megaraid_sas [ 871.124025] igb usbhid libfc hid dca scsi_transport_fc ptp enic scsi_tgt pps_core i2c_algo_bit wmi [ 871.132967] CPU: 7 PID: 0 Comm: swapper/7 Not tainted 3.13.0-29-generic #53-Ubuntu [ 871.141500] Hardware name: Cisco Systems Inc UCSC-C220-M3S/UCSC-C220-M3S, BIOS C220M3.1.5.4f.0.111320130449 11/13/2013 [ 871.153541] task: 881fd2d117f0 ti: 881fd2d18000 task.ti: 881fd2d18000 [ 871.161975] RIP: 0010:[81612a6a] [81612a6a] skb_segment+0x95a/0x980 [ 871.171124] RSP: 0018:881fffce3498 EFLAGS: 00010206 [ 871.177099] RAX: RBX: 881fb8929700 RCX: 881fcfba32f0 [ 871.185120] RDX: 0050 RSI: 881fcfba3200 RDI: 881fcfba2200 [ 871.193140] RBP: 881fffce3560 R08: 0042 R09: [ 871.201160] R10: 881fb8929e00 R11: 05ea R12: 881fcfba22f0 [ 871.209171] R13: R14: 881fd09a8400 R15: 0050 [ 871.217191] FS: () GS:881fffce() knlGS: [ 871.226307] CS: 0010 DS: ES: CR0: 80050033 [ 871.232772] CR2: 7fbd1ccb4000 CR3: 01c0e000 CR4: 001407e0 [ 871.240793] Stack: [ 871.243079] 0042 ffbe [ 871.251470] 000105ea 0040 881fb8929e00 0001 [ 871.259864] ffce 0074 003205a8 881fb8929700 [ 871.268257] Call Trace: [ 871.271032] IRQ [ 871.273193] [ 871.274913] [8167cfbd] tcp_gso_segment+0x10d/0x3f0 [ 871.279926] [a03740f0] ? vxlan_set_owner+0x60/0x60 [vxlan] [ 871.287178] [8168d422] inet_gso_segment+0x132/0x360 [ 871.293749] [a045c701] ? bond_mode_name+0x21/0x30 [bonding] [ 871.301097] [8161fdac] skb_mac_gso_segment+0x9c/0x180 [ 871.307858] [816840d7] skb_udp_tunnel_segment+0xd7/0x390 [ 871.314906] [816847f0] udp4_ufo_fragment+0x120/0x130 [ 871.321566] [8168d422] inet_gso_segment+0x132/0x360 [ 871.328132] [a0563f67] ? ipt_do_table+0x317/0x6aa [ip_tables] [ 871.335669] [a05a3500] ? nf_conntrack_hash_check_insert+0x280/0x2e0 [nf_conntrack] [ 871.345268] [8161fdac] skb_mac_gso_segment+0x9c/0x180 [ 871.352026] [8161feed] __skb_gso_segment+0x5d/0xb0 [ 871.358494] [816201fa] dev_hard_start_xmit+0x18a/0x560 [ 871.365351]
[Kernel-packages] [Bug 1346917] Update Released
The verification of the Stable Release Update for linux-lts-trusty has completed successfully and the package has now been released to -updates. Subsequently, the Ubuntu Stable Release Updates Team is being unsubscribed and will not receive messages about this bug report. In the event that you encounter a regression using the package from -updates please report a new bug using ubuntu-bug and tag the bug report regression-update so we can easily find any regressions. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1346917 Title: Using KSM on NUMA capable machines can cause KVM guest performance and stability issues Status in “linux” package in Ubuntu: Fix Released Status in “linux” source package in Trusty: Fix Released Bug description: [Impact] When using KVM on NUMA machines, both Linux and Windows guests can exhibit very poor performance and potential crashes. Disabling KSM is a known workaround to fix this issue. [Fix] The following patch fixes the issue in our testing: http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=64a9a34e22896dad430e21a28ad8cb00a756fefc This patch is present in v3.14-rc1 and onwards. [Test Case] General test case: 1) On a NUMA capable machine, setup the machine as a KVM hypervisor - lscpu should show more than 1 NUMA node 2) Install 4 KVM VMs 3) Run the following in another terminal to ensure that pages_shared and pages_sharing is increasing - watch 'tail /sys/kernel/mm/ksm/*' 4) In another terminal run a program that continually pings each node and alerts on high latencies What we've observed is that in Linux guests, the ping latencies can go into the ~2 second range for a few pings, then return back to the 1ms range. (This is machine dependent.) In addition, occasionally when running this test with Windows guests we observe BSODs during this test. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1346917/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1346917] Re: Using KSM on NUMA capable machines can cause KVM guest performance and stability issues
This bug was fixed in the package linux - 3.13.0-33.58 --- linux (3.13.0-33.58) trusty; urgency=low [ Brad Figg ] * Release Tracking Bug - LP: #1349897 [ Upstream Kernel Changes ] * mm: numa: do not automatically migrate KSM pages - LP: #1346917 * net: fix UDP tunnel GSO of frag_list GRO packets - LP: #1331219 * auditsc: audit_krule mask accesses need bounds checking - LP: #1347088 * n_tty: Fix buffer overruns with larger-than-4k pastes - LP: #1208740 -- Tim Gardner tim.gard...@canonical.com Fri, 18 Jul 2014 14:57:50 + ** Changed in: linux (Ubuntu Trusty) Status: Fix Committed = Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1346917 Title: Using KSM on NUMA capable machines can cause KVM guest performance and stability issues Status in “linux” package in Ubuntu: Fix Released Status in “linux” source package in Trusty: Fix Released Bug description: [Impact] When using KVM on NUMA machines, both Linux and Windows guests can exhibit very poor performance and potential crashes. Disabling KSM is a known workaround to fix this issue. [Fix] The following patch fixes the issue in our testing: http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=64a9a34e22896dad430e21a28ad8cb00a756fefc This patch is present in v3.14-rc1 and onwards. [Test Case] General test case: 1) On a NUMA capable machine, setup the machine as a KVM hypervisor - lscpu should show more than 1 NUMA node 2) Install 4 KVM VMs 3) Run the following in another terminal to ensure that pages_shared and pages_sharing is increasing - watch 'tail /sys/kernel/mm/ksm/*' 4) In another terminal run a program that continually pings each node and alerts on high latencies What we've observed is that in Linux guests, the ping latencies can go into the ~2 second range for a few pings, then return back to the 1ms range. (This is machine dependent.) In addition, occasionally when running this test with Windows guests we observe BSODs during this test. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1346917/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1349897] Re: linux: 3.13.0-33.58 -proposed tracker
This bug was fixed in the package linux - 3.13.0-33.58 --- linux (3.13.0-33.58) trusty; urgency=low [ Brad Figg ] * Release Tracking Bug - LP: #1349897 [ Upstream Kernel Changes ] * mm: numa: do not automatically migrate KSM pages - LP: #1346917 * net: fix UDP tunnel GSO of frag_list GRO packets - LP: #1331219 * auditsc: audit_krule mask accesses need bounds checking - LP: #1347088 * n_tty: Fix buffer overruns with larger-than-4k pastes - LP: #1208740 -- Tim Gardner tim.gard...@canonical.com Fri, 18 Jul 2014 14:57:50 + ** Changed in: linux (Ubuntu Trusty) Status: New = Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1349897 Title: linux: 3.13.0-33.58 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow package-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Fix Released Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Confirmed Status in Kernel SRU Workflow security-signoff series: In Progress Status in Kernel SRU Workflow verification-testing series: In Progress Status in “linux” package in Ubuntu: Invalid Status in “linux” source package in Trusty: Fix Released Bug description: This bug is for tracking the 3.13.0-33.58 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 29. July 2014 15:09 UTC kernel-stable-Prepare-package-end:Wednesday, 30. July 2014 21:05 UTC kernel-stable-Promote-to-proposed-start:Wednesday, 30. July 2014 21:05 UTC ppa-package-testing-start:Wednesday, 30. July 2014 21:05 UTC kernel-stable-Promote-to-proposed-end:Friday, 08. August 2014 22:00 UTC kernel-stable-phase:Verification Testing kernel-stable-phase-changed:Friday, 08. August 2014 23:01 UTC kernel-stable-Verification-testing-start:Friday, 08. August 2014 23:01 UTC kernel-stable-Certification-testing-start:Friday, 08. August 2014 23:01 UTC kernel-stable-Security-signoff-start:Friday, 08. August 2014 23:01 UTC kernel-stable-Regression-testing-start:Friday, 08. August 2014 23:01 UTC kernel-stable-Certification-testing-end:Monday, 11. August 2014 20:00 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1349897/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1331219] Update Released
The verification of the Stable Release Update for linux-lts-trusty has completed successfully and the package has now been released to -updates. Subsequently, the Ubuntu Stable Release Updates Team is being unsubscribed and will not receive messages about this bug report. In the event that you encounter a regression using the package from -updates please report a new bug using ubuntu-bug and tag the bug report regression-update so we can easily find any regressions. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1331219 Title: Kernel Bug at skb_segment + 0x95a Status in “linux” package in Ubuntu: Fix Released Status in “linux” source package in Trusty: Fix Released Status in “linux” source package in Utopic: Fix Released Bug description: SRU Justification: Impact: A crash occurs with VXLAN packets when using GSO capable hardware such as the case with openstack neutron. Fix: Upstream fix 5882a07c7 fixes a locking error that previously allowed certain timings to hit this bug. Testcase: Create and run a Neutron gateway with VXLANs, and stress the network for an extended period of time. Kernel Bug affects 3.11-3.15 on machines using gso offload. Stack trace [ 871.025524] [ cut here ] [ 871.030742] kernel BUG at /build/buildd/linux-3.13.0/net/core/skbuff.c:2903! [ 871.038669] invalid opcode: [#1] SMP [ 871.043318] Modules linked in: xt_nat xt_REDIRECT dccp_diag dccp tcp_diag udp_diag inet_diag unix_diag ipt_MASQUERADE iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conn track nf_conntrack ipt_REJECT xt_CHECKSUM iptable_mangle xt_tcpudp bridge ip6table_filter ip6_tables iptable_filter ip_tables ebtable_nat ebtables x_tables veth openvswitch gre vxlan ip_tunnel dm_crypt 8021q garp stp mrp llc bonding nfsd auth_rpcgss nfs_acl nfs lockd sunrpc fscache sb_edac gpio_ich joydev edac_core x86_pkg_temp_thermal intel_powerclamp coretemp lpc_ich acpi_power_m eter kvm_intel kvm crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd ipmi_si mac_hid lp parport btrfs xor raid6_pq libcrc32c hid_generic qla2xxx fnic libfcoe megaraid_sas [ 871.124025] igb usbhid libfc hid dca scsi_transport_fc ptp enic scsi_tgt pps_core i2c_algo_bit wmi [ 871.132967] CPU: 7 PID: 0 Comm: swapper/7 Not tainted 3.13.0-29-generic #53-Ubuntu [ 871.141500] Hardware name: Cisco Systems Inc UCSC-C220-M3S/UCSC-C220-M3S, BIOS C220M3.1.5.4f.0.111320130449 11/13/2013 [ 871.153541] task: 881fd2d117f0 ti: 881fd2d18000 task.ti: 881fd2d18000 [ 871.161975] RIP: 0010:[81612a6a] [81612a6a] skb_segment+0x95a/0x980 [ 871.171124] RSP: 0018:881fffce3498 EFLAGS: 00010206 [ 871.177099] RAX: RBX: 881fb8929700 RCX: 881fcfba32f0 [ 871.185120] RDX: 0050 RSI: 881fcfba3200 RDI: 881fcfba2200 [ 871.193140] RBP: 881fffce3560 R08: 0042 R09: [ 871.201160] R10: 881fb8929e00 R11: 05ea R12: 881fcfba22f0 [ 871.209171] R13: R14: 881fd09a8400 R15: 0050 [ 871.217191] FS: () GS:881fffce() knlGS: [ 871.226307] CS: 0010 DS: ES: CR0: 80050033 [ 871.232772] CR2: 7fbd1ccb4000 CR3: 01c0e000 CR4: 001407e0 [ 871.240793] Stack: [ 871.243079] 0042 ffbe [ 871.251470] 000105ea 0040 881fb8929e00 0001 [ 871.259864] ffce 0074 003205a8 881fb8929700 [ 871.268257] Call Trace: [ 871.271032] IRQ [ 871.273193] [ 871.274913] [8167cfbd] tcp_gso_segment+0x10d/0x3f0 [ 871.279926] [a03740f0] ? vxlan_set_owner+0x60/0x60 [vxlan] [ 871.287178] [8168d422] inet_gso_segment+0x132/0x360 [ 871.293749] [a045c701] ? bond_mode_name+0x21/0x30 [bonding] [ 871.301097] [8161fdac] skb_mac_gso_segment+0x9c/0x180 [ 871.307858] [816840d7] skb_udp_tunnel_segment+0xd7/0x390 [ 871.314906] [816847f0] udp4_ufo_fragment+0x120/0x130 [ 871.321566] [8168d422] inet_gso_segment+0x132/0x360 [ 871.328132] [a0563f67] ? ipt_do_table+0x317/0x6aa [ip_tables] [ 871.335669] [a05a3500] ? nf_conntrack_hash_check_insert+0x280/0x2e0 [nf_conntrack] [ 871.345268] [8161fdac] skb_mac_gso_segment+0x9c/0x180 [ 871.352026] [8161feed] __skb_gso_segment+0x5d/0xb0 [ 871.358494] [816201fa] dev_hard_start_xmit+0x18a/0x560 [ 871.365351] [816208e8] __dev_queue_xmit+0x318/0x500 [ 871.371910] [a05c0238] ? ipv4_confirm+0x78/0x100 [nf_conntrack_ipv4] [ 871.380156] [8163e03b] ? eth_header+0x2b/0xd0 [
[Kernel-packages] [Bug 1347088] Re: Trusty update to 3.13.11.5 stable release
This bug was fixed in the package linux - 3.13.0-33.58 --- linux (3.13.0-33.58) trusty; urgency=low [ Brad Figg ] * Release Tracking Bug - LP: #1349897 [ Upstream Kernel Changes ] * mm: numa: do not automatically migrate KSM pages - LP: #1346917 * net: fix UDP tunnel GSO of frag_list GRO packets - LP: #1331219 * auditsc: audit_krule mask accesses need bounds checking - LP: #1347088 * n_tty: Fix buffer overruns with larger-than-4k pastes - LP: #1208740 -- Tim Gardner tim.gard...@canonical.com Fri, 18 Jul 2014 14:57:50 + ** Changed in: linux (Ubuntu Trusty) Status: Confirmed = Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1347088 Title: Trusty update to 3.13.11.5 stable release Status in “linux” package in Ubuntu: Confirmed Status in “linux” source package in Trusty: Fix Released Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from Linus' tree or in a minimally backported form of that patch. The 3.13.11.5 upstream stable patch set is now available. It should be included in the Ubuntu kernel as well. git://git.kernel.org/ TEST CASE: TBD The following patches are in the 3.13.11.5 stable release: Linux 3.13.11.5 iscsi-target: fix iscsit_del_np deadlock on unload iscsi-target: Avoid rejecting incorrect ITT for Data-Out lz4: fix another possible overrun efi-pstore: Fix an overflow on 32-bit builds iscsi-target: Explicily clear login response PDU in exception path target: Fix left-over se_lun-lun_sep pointer OOPs ALSA: hda - restore BCLK M/N values when resuming HSW/BDW display controller MIPS: MSC: Prevent out-of-bounds writes to MIPS SC ioremap'd region recordmcount/MIPS: Fix possible incorrect mcount_loc table entries in modules ALSA: usb-audio: Fix races at disconnection and PCM closing net: allwinner: emac: Add missing free_irq powerpc: Don't skip ePAPR spin-table CPUs nfs: Fix cache_validity check in nfs_write_pageuptodate() aio: fix kernel memory disclosure in io_getevents() introduced in v3.10 aio: fix aio request leak when events are reaped by userspace [CIFS] fix mount failure with broken pathnames when smb3 mount with mapchars option drm/i915: Hold the table lock whilst walking the file's idr and counting the objects in debugfs mm: fix crashes from mbind() merging vmas DMA, CMA: fix possible memory leak mm, pcp: allow restoring percpu_pagelist_fraction default kernel/watchdog.c: remove preemption restrictions when restarting lockup detector hugetlb: fix copy_hugetlb_page_range() to handle migration/hwpoisoned entry x86_32, entry: Do syscall exit work on badsys (CVE-2014-4508) lz4: ensure length does not wrap lzo: properly check for overruns ALSA: hda - hdmi: call overridden init on resume rbd: handle parent_overlap on writes correctly blkcg: fix use-after-free in __blkg_release_rcu() by making blkcg_gq refcnt an atomic_t rt2x00: fix rfkill regression on rt2500pci b43: fix frequency reported on G-PHY with /new/ firmware rt2x00: disable TKIP on USB Bluetooth: Allow change security level on ATT_CID in slave role Bluetooth: Fix locking of hdev when calling into SMP code Bluetooth: Fix indicating discovery state when canceling inquiry Bluetooth: Fix setting correct authentication information for SMP STK Bluetooth: Fix SSP acceptor just-works confirmation without MITM ALSA: control: Make sure that id-index does not overflow ALSA: control: Handle numid overflow ALSA: control: Don't access controls outside of protected regions ALSA: control: Fix replacing user controls ALSA: control: Protect user controls against concurrent access arm64/dma: Removing ARCH_HAS_DMA_GET_REQUIRED_MASK macro arm64: ptrace: fix empty registers set in prstatus of aarch32 process core arm64: uid16: fix __kernel_old_{gid,uid}_t
[Kernel-packages] [Bug 1208740] Re: Large pastes into readline enabled programs causes breakage from kernels v2.6.31 onwards
This bug was fixed in the package linux - 3.13.0-33.58 --- linux (3.13.0-33.58) trusty; urgency=low [ Brad Figg ] * Release Tracking Bug - LP: #1349897 [ Upstream Kernel Changes ] * mm: numa: do not automatically migrate KSM pages - LP: #1346917 * net: fix UDP tunnel GSO of frag_list GRO packets - LP: #1331219 * auditsc: audit_krule mask accesses need bounds checking - LP: #1347088 * n_tty: Fix buffer overruns with larger-than-4k pastes - LP: #1208740 -- Tim Gardner tim.gard...@canonical.com Fri, 18 Jul 2014 14:57:50 + ** Changed in: linux (Ubuntu Trusty) Status: Fix Committed = Fix Released ** Changed in: linux (Ubuntu Trusty) Status: Fix Committed = Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1208740 Title: Large pastes into readline enabled programs causes breakage from kernels v2.6.31 onwards Status in “linux” package in Ubuntu: Fix Released Status in “linux” source package in Precise: Fix Released Status in “linux” source package in Quantal: Fix Released Status in “linux” source package in Raring: Fix Released Status in “linux” source package in Saucy: Fix Released Status in “linux” source package in Trusty: Fix Released Bug description: SRU Justification: Impact: Large pastes over 4KB in a console may not be pasted correctly. Fix: A patch was posted here https://lkml.org/lkml/2013/9/3/539, that resolves the issue. It is not upstreamed yet, pending additional analysis. Testcase: 1. gedit /usr/share/common-licenses/GPL (replace with blanks) 2. select all and copy contents 3. open a terminal type 4. paste contents If the whole contents are pasted without any errors then we pass. Additional Notes: While this isn't upstreamed yet, this has already been accepted into Saucy and no additional bug reports or regressions have been detected yet. It would be useful to continue to monitor the upstream thread, and/or more deeply review this patch for potential deadlocks and contribute to the upstream discussion. -- The bug is described in detail in this mail: https://lkml.org/lkml/2013/7/25/205 This bug affects any readline enabled program, like bash or psql. A large paste is any paste of more than 4kb of data (4kb is the size of the kernel buffer for reading from the console). As can be found in the lkml thread, the issue is caused by the constant change between canonical mode and non-canonical mode, done by readline for each line being read. This change means that when the buffer is full, some characters might get lost. This has been happening for a long time (starting with kernel v2.6.31-rc5), but it was barely noticeable for a while. Some changes done in the way the kernel schedules character reading in v2.6.39-rc1 made it much more noticeable. Even the most recent kernels are affected. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1208740/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1208740] Update Released
The verification of the Stable Release Update for linux-lts-trusty has completed successfully and the package has now been released to -updates. Subsequently, the Ubuntu Stable Release Updates Team is being unsubscribed and will not receive messages about this bug report. In the event that you encounter a regression using the package from -updates please report a new bug using ubuntu-bug and tag the bug report regression-update so we can easily find any regressions. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1208740 Title: Large pastes into readline enabled programs causes breakage from kernels v2.6.31 onwards Status in “linux” package in Ubuntu: Fix Released Status in “linux” source package in Precise: Fix Released Status in “linux” source package in Quantal: Fix Released Status in “linux” source package in Raring: Fix Released Status in “linux” source package in Saucy: Fix Released Status in “linux” source package in Trusty: Fix Released Bug description: SRU Justification: Impact: Large pastes over 4KB in a console may not be pasted correctly. Fix: A patch was posted here https://lkml.org/lkml/2013/9/3/539, that resolves the issue. It is not upstreamed yet, pending additional analysis. Testcase: 1. gedit /usr/share/common-licenses/GPL (replace with blanks) 2. select all and copy contents 3. open a terminal type 4. paste contents If the whole contents are pasted without any errors then we pass. Additional Notes: While this isn't upstreamed yet, this has already been accepted into Saucy and no additional bug reports or regressions have been detected yet. It would be useful to continue to monitor the upstream thread, and/or more deeply review this patch for potential deadlocks and contribute to the upstream discussion. -- The bug is described in detail in this mail: https://lkml.org/lkml/2013/7/25/205 This bug affects any readline enabled program, like bash or psql. A large paste is any paste of more than 4kb of data (4kb is the size of the kernel buffer for reading from the console). As can be found in the lkml thread, the issue is caused by the constant change between canonical mode and non-canonical mode, done by readline for each line being read. This change means that when the buffer is full, some characters might get lost. This has been happening for a long time (starting with kernel v2.6.31-rc5), but it was barely noticeable for a while. Some changes done in the way the kernel schedules character reading in v2.6.39-rc1 made it much more noticeable. Even the most recent kernels are affected. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1208740/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1208740] Re: Large pastes into readline enabled programs causes breakage from kernels v2.6.31 onwards
This bug was fixed in the package linux - 3.13.0-33.58 --- linux (3.13.0-33.58) trusty; urgency=low [ Brad Figg ] * Release Tracking Bug - LP: #1349897 [ Upstream Kernel Changes ] * mm: numa: do not automatically migrate KSM pages - LP: #1346917 * net: fix UDP tunnel GSO of frag_list GRO packets - LP: #1331219 * auditsc: audit_krule mask accesses need bounds checking - LP: #1347088 * n_tty: Fix buffer overruns with larger-than-4k pastes - LP: #1208740 -- Tim Gardner tim.gard...@canonical.com Fri, 18 Jul 2014 14:57:50 + -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1208740 Title: Large pastes into readline enabled programs causes breakage from kernels v2.6.31 onwards Status in “linux” package in Ubuntu: Fix Released Status in “linux” source package in Precise: Fix Released Status in “linux” source package in Quantal: Fix Released Status in “linux” source package in Raring: Fix Released Status in “linux” source package in Saucy: Fix Released Status in “linux” source package in Trusty: Fix Released Bug description: SRU Justification: Impact: Large pastes over 4KB in a console may not be pasted correctly. Fix: A patch was posted here https://lkml.org/lkml/2013/9/3/539, that resolves the issue. It is not upstreamed yet, pending additional analysis. Testcase: 1. gedit /usr/share/common-licenses/GPL (replace with blanks) 2. select all and copy contents 3. open a terminal type 4. paste contents If the whole contents are pasted without any errors then we pass. Additional Notes: While this isn't upstreamed yet, this has already been accepted into Saucy and no additional bug reports or regressions have been detected yet. It would be useful to continue to monitor the upstream thread, and/or more deeply review this patch for potential deadlocks and contribute to the upstream discussion. -- The bug is described in detail in this mail: https://lkml.org/lkml/2013/7/25/205 This bug affects any readline enabled program, like bash or psql. A large paste is any paste of more than 4kb of data (4kb is the size of the kernel buffer for reading from the console). As can be found in the lkml thread, the issue is caused by the constant change between canonical mode and non-canonical mode, done by readline for each line being read. This change means that when the buffer is full, some characters might get lost. This has been happening for a long time (starting with kernel v2.6.31-rc5), but it was barely noticeable for a while. Some changes done in the way the kernel schedules character reading in v2.6.39-rc1 made it much more noticeable. Even the most recent kernels are affected. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1208740/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1347088] Re: Trusty update to 3.13.11.5 stable release
** Branch linked: lp:ubuntu/precise-security/linux-lts-trusty -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1347088 Title: Trusty update to 3.13.11.5 stable release Status in “linux” package in Ubuntu: Confirmed Status in “linux” source package in Trusty: Fix Released Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from Linus' tree or in a minimally backported form of that patch. The 3.13.11.5 upstream stable patch set is now available. It should be included in the Ubuntu kernel as well. git://git.kernel.org/ TEST CASE: TBD The following patches are in the 3.13.11.5 stable release: Linux 3.13.11.5 iscsi-target: fix iscsit_del_np deadlock on unload iscsi-target: Avoid rejecting incorrect ITT for Data-Out lz4: fix another possible overrun efi-pstore: Fix an overflow on 32-bit builds iscsi-target: Explicily clear login response PDU in exception path target: Fix left-over se_lun-lun_sep pointer OOPs ALSA: hda - restore BCLK M/N values when resuming HSW/BDW display controller MIPS: MSC: Prevent out-of-bounds writes to MIPS SC ioremap'd region recordmcount/MIPS: Fix possible incorrect mcount_loc table entries in modules ALSA: usb-audio: Fix races at disconnection and PCM closing net: allwinner: emac: Add missing free_irq powerpc: Don't skip ePAPR spin-table CPUs nfs: Fix cache_validity check in nfs_write_pageuptodate() aio: fix kernel memory disclosure in io_getevents() introduced in v3.10 aio: fix aio request leak when events are reaped by userspace [CIFS] fix mount failure with broken pathnames when smb3 mount with mapchars option drm/i915: Hold the table lock whilst walking the file's idr and counting the objects in debugfs mm: fix crashes from mbind() merging vmas DMA, CMA: fix possible memory leak mm, pcp: allow restoring percpu_pagelist_fraction default kernel/watchdog.c: remove preemption restrictions when restarting lockup detector hugetlb: fix copy_hugetlb_page_range() to handle migration/hwpoisoned entry x86_32, entry: Do syscall exit work on badsys (CVE-2014-4508) lz4: ensure length does not wrap lzo: properly check for overruns ALSA: hda - hdmi: call overridden init on resume rbd: handle parent_overlap on writes correctly blkcg: fix use-after-free in __blkg_release_rcu() by making blkcg_gq refcnt an atomic_t rt2x00: fix rfkill regression on rt2500pci b43: fix frequency reported on G-PHY with /new/ firmware rt2x00: disable TKIP on USB Bluetooth: Allow change security level on ATT_CID in slave role Bluetooth: Fix locking of hdev when calling into SMP code Bluetooth: Fix indicating discovery state when canceling inquiry Bluetooth: Fix setting correct authentication information for SMP STK Bluetooth: Fix SSP acceptor just-works confirmation without MITM ALSA: control: Make sure that id-index does not overflow ALSA: control: Handle numid overflow ALSA: control: Don't access controls outside of protected regions ALSA: control: Fix replacing user controls ALSA: control: Protect user controls against concurrent access arm64/dma: Removing ARCH_HAS_DMA_GET_REQUIRED_MASK macro arm64: ptrace: fix empty registers set in prstatus of aarch32 process core arm64: uid16: fix __kernel_old_{gid,uid}_t definitions arm64: ptrace: change fs when passing kernel pointer to regset code arm64: Bug fix in stack alignment exception USB: EHCI: avoid BIOS handover on the HASEE E200 ARM: mvebu: DT: fix OpenBlocks AX3-4 RAM size drm/nouveau/kms: reference vblank for crtc during pageflip. epoll: fix use-after-free in eventpoll_release_file ACPI / ia64 / sba_iommu: Restore the working initialization ordering Revert offb: Add palette hack for little endian
[Kernel-packages] [Bug 1355469] [NEW] large bar patch for 14.10's kernel
You have been subscribed to a public bug: -- Problem Description -- Please, apply the following patch to the utopic's kernel: https://git.kernel.org/cgit/linux/kernel/git/benh/powerpc.git/commit/?h=nextid=262af557dd750e94adcee3f450782c743f9a92d6 This is going to solve the 'large bar' feature for Ubuntu 14.10 ** Affects: linux (Ubuntu) Importance: Undecided Status: Confirmed ** Tags: architecture-ppc64le bugnameltc-114498 severity-high targetmilestone-inin--- -- large bar patch for 14.10's kernel https://bugs.launchpad.net/bugs/1355469 You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1354530] Re: linux: 3.16.0-7.12 -proposed tracker
The package has been published and the bug is being set to Fix Released ** Changed in: kernel-development-workflow Status: In Progress = Fix Released ** Description changed: This bug is for tracking the 3.16.0-7.12 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-Prepare-package-start:Friday, 08. August 2014 17:05 UTC - kernel-phase-changed:Monday, 11. August 2014 14:00 UTC kernel-Prepare-package-end:Monday, 11. August 2014 14:00 UTC kernel-Package-testing-start:Monday, 11. August 2014 14:00 UTC - kernel-phase:PPA Testing ppa-package-testing-start:Monday, 11. August 2014 14:00 UTC kernel-Promote-to-release-end:Monday, 11. August 2014 22:01 UTC + kernel-phase:Released + kernel-phase-changed:Tuesday, 12. August 2014 00:00 UTC -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1354530 Title: linux: 3.16.0-7.12 -proposed tracker Status in Kernel Development Workflow: Fix Released Status in Kernel Development Workflow package-testing series: Won't Fix Status in Kernel Development Workflow prepare-package series: Fix Released Status in Kernel Development Workflow prepare-package-meta series: Fix Released Status in Kernel Development Workflow prepare-package-signed series: Fix Released Status in Kernel Development Workflow promote-to-release series: Fix Released Status in “linux” package in Ubuntu: Fix Released Status in “linux” source package in Utopic: Fix Released Bug description: This bug is for tracking the 3.16.0-7.12 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-Prepare-package-start:Friday, 08. August 2014 17:05 UTC kernel-Prepare-package-end:Monday, 11. August 2014 14:00 UTC kernel-Package-testing-start:Monday, 11. August 2014 14:00 UTC ppa-package-testing-start:Monday, 11. August 2014 14:00 UTC kernel-Promote-to-release-end:Monday, 11. August 2014 22:01 UTC kernel-phase:Released kernel-phase-changed:Tuesday, 12. August 2014 00:00 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-development-workflow/+bug/1354530/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1355469] Re: large bar patch for 14.10's kernel
** Changed in: ubuntu Status: New = Confirmed ** Package changed: ubuntu = linux (Ubuntu) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1355469 Title: large bar patch for 14.10's kernel Status in “linux” package in Ubuntu: Confirmed Bug description: -- Problem Description -- Please, apply the following patch to the utopic's kernel: https://git.kernel.org/cgit/linux/kernel/git/benh/powerpc.git/commit/?h=nextid=262af557dd750e94adcee3f450782c743f9a92d6 This is going to solve the 'large bar' feature for Ubuntu 14.10 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1355469/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1349897] Re: linux: 3.13.0-33.58 -proposed tracker
** Description changed: This bug is for tracking the 3.13.0-33.58 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 29. July 2014 15:09 UTC kernel-stable-Prepare-package-end:Wednesday, 30. July 2014 21:05 UTC kernel-stable-Promote-to-proposed-start:Wednesday, 30. July 2014 21:05 UTC ppa-package-testing-start:Wednesday, 30. July 2014 21:05 UTC kernel-stable-Promote-to-proposed-end:Friday, 08. August 2014 22:00 UTC kernel-stable-phase:Verification Testing kernel-stable-phase-changed:Friday, 08. August 2014 23:01 UTC kernel-stable-Verification-testing-start:Friday, 08. August 2014 23:01 UTC kernel-stable-Certification-testing-start:Friday, 08. August 2014 23:01 UTC kernel-stable-Security-signoff-start:Friday, 08. August 2014 23:01 UTC kernel-stable-Regression-testing-start:Friday, 08. August 2014 23:01 UTC kernel-stable-Certification-testing-end:Monday, 11. August 2014 20:00 UTC + kernel-stable-Promote-to-updates-end:Tuesday, 12. August 2014 00:01 UTC -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1349897 Title: linux: 3.13.0-33.58 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow package-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Fix Released Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Confirmed Status in Kernel SRU Workflow security-signoff series: In Progress Status in Kernel SRU Workflow verification-testing series: In Progress Status in “linux” package in Ubuntu: Invalid Status in “linux” source package in Trusty: Fix Released Bug description: This bug is for tracking the 3.13.0-33.58 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 29. July 2014 15:09 UTC kernel-stable-Prepare-package-end:Wednesday, 30. July 2014 21:05 UTC kernel-stable-Promote-to-proposed-start:Wednesday, 30. July 2014 21:05 UTC ppa-package-testing-start:Wednesday, 30. July 2014 21:05 UTC kernel-stable-Promote-to-proposed-end:Friday, 08. August 2014 22:00 UTC kernel-stable-phase:Verification Testing kernel-stable-phase-changed:Friday, 08. August 2014 23:01 UTC kernel-stable-Verification-testing-start:Friday, 08. August 2014 23:01 UTC kernel-stable-Certification-testing-start:Friday, 08. August 2014 23:01 UTC kernel-stable-Security-signoff-start:Friday, 08. August 2014 23:01 UTC kernel-stable-Regression-testing-start:Friday, 08. August 2014 23:01 UTC kernel-stable-Certification-testing-end:Monday, 11. August 2014 20:00 UTC kernel-stable-Promote-to-updates-end:Tuesday, 12. August 2014 00:01 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1349897/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1355445] Re: linux: 2.6.32-65.129 -proposed tracker
** Changed in: kernel-sru-workflow/prepare-package-meta Status: New = Fix Released ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: Canonical Kernel Team (canonical-kernel-team) = Brad Figg (brad-figg) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1355445 Title: linux: 2.6.32-65.129 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: New Status in Kernel SRU Workflow package-testing series: New Status in Kernel SRU Workflow prepare-package series: New Status in Kernel SRU Workflow prepare-package-lbm series: New Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-ports-meta series: New Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: New Status in Kernel SRU Workflow verification-testing series: New Status in “linux” package in Ubuntu: Invalid Status in “linux” source package in Lucid: New Bug description: This bug is for tracking the 2.6.32-65.129 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Monday, 11. August 2014 21:00 UTC kernel-stable-phase:Prepare kernel-stable-phase-changed:Monday, 11. August 2014 21:00 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1355445/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1035431] Re: bluetooh-wizard failed to connect to a keyboard(logitech)
According to last email from Ara: Still waiting on cyphermox. I just pinged him today again. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to bluez in Ubuntu. https://bugs.launchpad.net/bugs/1035431 Title: bluetooh-wizard failed to connect to a keyboard(logitech) Status in GNOME Bluetooth: New Status in OEM Priority Project: In Progress Status in OEM Priority Project trusty series: New Status in “bluez” package in Ubuntu: Confirmed Status in “gnome-bluetooth” package in Ubuntu: Confirmed Status in “bluez” source package in Precise: New Status in “gnome-bluetooth” source package in Precise: New Status in “bluez” source package in Trusty: New Status in “gnome-bluetooth” source package in Trusty: New Bug description: When I try to connect my bluetooth keyboard using bluetooth-wizard, it ever fails: ** (bluetooth-wizard:11367): WARNING **: Setting up 'Logitech K760' failed: Authentication Failed This keyboard works fine with another computer under ubuntu 11.04. This keyboard works fine with this computer and Windows 7 (arghhh). This computer ubuntu 12.04 works fine with my bluetooth mouse. I can attach manually this keyboard to this computer using : sudo hidd --search My computer is a Samsung 305U1A My bluetooth interface is : Bus 003 Device 002: ID 0a5c:219c Broadcom Corp. To manage notifications about this bug go to: https://bugs.launchpad.net/gnome-bluetooth/+bug/1035431/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1355445] Re: linux: 2.6.32-65.129 -proposed tracker
** Changed in: kernel-sru-workflow/prepare-package-lbm Status: New = Fix Released ** Changed in: kernel-sru-workflow/prepare-package-lbm Assignee: Canonical Kernel Team (canonical-kernel-team) = Brad Figg (brad-figg) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1355445 Title: linux: 2.6.32-65.129 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: New Status in Kernel SRU Workflow package-testing series: New Status in Kernel SRU Workflow prepare-package series: New Status in Kernel SRU Workflow prepare-package-lbm series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-ports-meta series: New Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: New Status in Kernel SRU Workflow verification-testing series: New Status in “linux” package in Ubuntu: Invalid Status in “linux” source package in Lucid: New Bug description: This bug is for tracking the 2.6.32-65.129 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Monday, 11. August 2014 21:00 UTC kernel-stable-phase:Prepare kernel-stable-phase-changed:Monday, 11. August 2014 21:00 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1355445/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1349897] Re: linux: 3.13.0-33.58 -proposed tracker
The package has been published and the bug is being set to Fix Released ** Changed in: kernel-sru-workflow Status: In Progress = Fix Released ** Description changed: This bug is for tracking the 3.13.0-33.58 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 29. July 2014 15:09 UTC kernel-stable-Prepare-package-end:Wednesday, 30. July 2014 21:05 UTC kernel-stable-Promote-to-proposed-start:Wednesday, 30. July 2014 21:05 UTC ppa-package-testing-start:Wednesday, 30. July 2014 21:05 UTC kernel-stable-Promote-to-proposed-end:Friday, 08. August 2014 22:00 UTC - kernel-stable-phase:Verification Testing - kernel-stable-phase-changed:Friday, 08. August 2014 23:01 UTC kernel-stable-Verification-testing-start:Friday, 08. August 2014 23:01 UTC kernel-stable-Certification-testing-start:Friday, 08. August 2014 23:01 UTC kernel-stable-Security-signoff-start:Friday, 08. August 2014 23:01 UTC kernel-stable-Regression-testing-start:Friday, 08. August 2014 23:01 UTC kernel-stable-Certification-testing-end:Monday, 11. August 2014 20:00 UTC kernel-stable-Promote-to-updates-end:Tuesday, 12. August 2014 00:01 UTC + kernel-stable-phase:Released + kernel-stable-phase-changed:Tuesday, 12. August 2014 02:01 UTC -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1349897 Title: linux: 3.13.0-33.58 -proposed tracker Status in Kernel SRU Workflow: Fix Released Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow package-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Fix Released Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Confirmed Status in Kernel SRU Workflow security-signoff series: In Progress Status in Kernel SRU Workflow verification-testing series: In Progress Status in “linux” package in Ubuntu: Invalid Status in “linux” source package in Trusty: Fix Released Bug description: This bug is for tracking the 3.13.0-33.58 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 29. July 2014 15:09 UTC kernel-stable-Prepare-package-end:Wednesday, 30. July 2014 21:05 UTC kernel-stable-Promote-to-proposed-start:Wednesday, 30. July 2014 21:05 UTC ppa-package-testing-start:Wednesday, 30. July 2014 21:05 UTC kernel-stable-Promote-to-proposed-end:Friday, 08. August 2014 22:00 UTC kernel-stable-Verification-testing-start:Friday, 08. August 2014 23:01 UTC kernel-stable-Certification-testing-start:Friday, 08. August 2014 23:01 UTC kernel-stable-Security-signoff-start:Friday, 08. August 2014 23:01 UTC kernel-stable-Regression-testing-start:Friday, 08. August 2014 23:01 UTC kernel-stable-Certification-testing-end:Monday, 11. August 2014 20:00 UTC kernel-stable-Promote-to-updates-end:Tuesday, 12. August 2014 00:01 UTC kernel-stable-phase:Released kernel-stable-phase-changed:Tuesday, 12. August 2014 02:01 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1349897/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1349897] Re: linux: 3.13.0-33.58 -proposed tracker
** Changed in: kernel-sru-workflow/regression-testing Status: Confirmed = In Progress ** Changed in: kernel-sru-workflow/regression-testing Assignee: Canonical Platform QA Team (canonical-platform-qa) = Paul Larson (pwlars) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1349897 Title: linux: 3.13.0-33.58 -proposed tracker Status in Kernel SRU Workflow: Fix Released Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow package-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Fix Released Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: In Progress Status in Kernel SRU Workflow security-signoff series: In Progress Status in Kernel SRU Workflow verification-testing series: In Progress Status in “linux” package in Ubuntu: Invalid Status in “linux” source package in Trusty: Fix Released Bug description: This bug is for tracking the 3.13.0-33.58 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 29. July 2014 15:09 UTC kernel-stable-Prepare-package-end:Wednesday, 30. July 2014 21:05 UTC kernel-stable-Promote-to-proposed-start:Wednesday, 30. July 2014 21:05 UTC ppa-package-testing-start:Wednesday, 30. July 2014 21:05 UTC kernel-stable-Promote-to-proposed-end:Friday, 08. August 2014 22:00 UTC kernel-stable-Verification-testing-start:Friday, 08. August 2014 23:01 UTC kernel-stable-Certification-testing-start:Friday, 08. August 2014 23:01 UTC kernel-stable-Security-signoff-start:Friday, 08. August 2014 23:01 UTC kernel-stable-Regression-testing-start:Friday, 08. August 2014 23:01 UTC kernel-stable-Certification-testing-end:Monday, 11. August 2014 20:00 UTC kernel-stable-Promote-to-updates-end:Tuesday, 12. August 2014 00:01 UTC kernel-stable-phase:Released kernel-stable-phase-changed:Tuesday, 12. August 2014 02:01 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1349897/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1341988] Re: [Dell Inspiron 11 - 3147] Brightness control does not work on this system
** Changed in: linux (Ubuntu) Assignee: Anthony Wong (anthonywong) = Edward Lin (airken) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1341988 Title: [Dell Inspiron 11 - 3147] Brightness control does not work on this system Status in “linux” package in Ubuntu: Confirmed Bug description: CID: 201403-14888 Dell Inspiron 11 - 3147 The screen brightness cannot be controlled by the hotkey. Steps: 1. Install 14.04 + update (3.13.0-30), boot to desktop 2. Try to control brightness with the hotkey 3. Try to control brightness with Brightness and Lock applet Expected result: * Brightness could be controlled by the hotkey or the applet Actual result: * Brightness level indicator changed along with the hotkey, but the brightness won't be changed at all. Debugging information: ubuntu@201403-14888:~$ grep -r . /proc/acpi /proc/acpi/button/lid/LID0/state:state: open /proc/acpi/wakeup:Device S-state Status Sysfs node /proc/acpi/wakeup:XHC1 S0*enabled pci::00:14.0 /proc/acpi/wakeup:RP01 S4*disabled pci::00:1c.0 /proc/acpi/wakeup:PXSX S4*disabled /proc/acpi/wakeup:RP02 S4*disabled /proc/acpi/wakeup:PXSX S4*disabled /proc/acpi/wakeup:RP03 S4*disabled /proc/acpi/wakeup:PXSX S4*disabled /proc/acpi/wakeup:RP04 S4*disabled /proc/acpi/wakeup:PXSX S4*disabled /proc/acpi/wakeup:PWRB S4*enabled /proc/acpi/wakeup:LID0 S3*enabled ubuntu@201403-14888:~$ ls /sys/class/backlight/ acpi_video0 intel_backlight ubuntu@201403-14888:~$ dmesg | grep 'ACPI: Video' [ 10.409549] ACPI: Video Device [PEGP] (multi-head: yes rom: no post: no) [ 10.435109] ACPI: Video Device [GFX0] (multi-head: yes rom: no post: no) ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-30-generic 3.13.0-30.55 ProcVersionSignature: Ubuntu 3.13.0-30.55-generic 3.13.11.2 Uname: Linux 3.13.0-30-generic x86_64 ApportVersion: 2.14.1-0ubuntu3.2 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: ubuntu 1563 F pulseaudio CRDA: country TW: (2402 - 2472 @ 40), (3, 27) (5270 - 5330 @ 40), (3, 17), DFS (5735 - 5815 @ 40), (3, 30) CurrentDesktop: Unity Date: Tue Jul 15 02:04:08 2014 HibernationDevice: RESUME=UUID=b30f45e9-6fc7-4aa0-adff-37e7c87c19cd InstallationDate: Installed on 2014-07-15 (0 days ago) InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Release amd64 (20140417) MachineType: Dell Inc. Inspiron 11 - 3147 ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-30-generic.efi.signed root=UUID=cc246aa9-85c1-49ac-b06b-6c0f4e37dbea ro quiet splash RelatedPackageVersions: linux-restricted-modules-3.13.0-30-generic N/A linux-backports-modules-3.13.0-30-generic N/A linux-firmware 1.127.4 SourcePackage: linux UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 05/05/2014 dmi.bios.vendor: Dell Inc. dmi.bios.version: A01 dmi.board.name: 00K010 dmi.board.vendor: Dell Inc. dmi.board.version: D02 dmi.chassis.type: 8 dmi.chassis.vendor: Dell Inc. dmi.chassis.version: A01 dmi.modalias: dmi:bvnDellInc.:bvrA01:bd05/05/2014:svnDellInc.:pnInspiron11-3147:pvr:rvnDellInc.:rn00K010:rvrD02:cvnDellInc.:ct8:cvrA01: dmi.product.name: Inspiron 11 - 3147 dmi.sys.vendor: Dell Inc. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1341988/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1348020] Re: [Dell Latitude 3540] Unable to control brightness
Right, is it acceptable? -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1348020 Title: [Dell Latitude 3540] Unable to control brightness Status in “linux” package in Ubuntu: Fix Released Bug description: CIDL 201306-13866 Dell Latitude 3540 The brightness control does not work on this system Steps: 1. Install 14.04 + update (3.13.0-32), boot to desktop 2. Try to change the brightness by using the hotkeys 3. Try to change the brightness by using the Brightness and Lock applet Expect result: * Brightness control works fine Actual result: * Brightness level indicator changes with the hotkey, but not the brightness. * Brightness cannot be changed by the applet Debugging information: ubuntu@201306-13866:~$ ls /sys/class/backlight acpi_video0 intel_backlight ubuntu@201306-13866:~$ grep -r . /proc/acpi /proc/acpi/battery/BAT1/alarm:alarm: unsupported /proc/acpi/battery/BAT1/state:present: yes /proc/acpi/battery/BAT1/state:capacity state: ok /proc/acpi/battery/BAT1/state:charging state: charged /proc/acpi/battery/BAT1/state:present rate:1 mA /proc/acpi/battery/BAT1/state:remaining capacity: 5900 mAh /proc/acpi/battery/BAT1/state:present voltage: 12972 mV /proc/acpi/battery/BAT1/info:present: yes /proc/acpi/battery/BAT1/info:design capacity: 5900 mAh /proc/acpi/battery/BAT1/info:last full capacity: 5900 mAh /proc/acpi/battery/BAT1/info:battery technology: rechargeable /proc/acpi/battery/BAT1/info:design voltage: 11100 mV /proc/acpi/battery/BAT1/info:design capacity warning: 590 mAh /proc/acpi/battery/BAT1/info:design capacity low: 177 mAh /proc/acpi/battery/BAT1/info:cycle count: 0 /proc/acpi/battery/BAT1/info:capacity granularity 1: 264 mAh /proc/acpi/battery/BAT1/info:capacity granularity 2: 3780 mAh /proc/acpi/battery/BAT1/info:model number:DELL G019Y35H /proc/acpi/battery/BAT1/info:serial number: 0C45 /proc/acpi/battery/BAT1/info:battery type:Li-Ion /proc/acpi/battery/BAT1/info:OEM info:SDI /proc/acpi/button/lid/LID0/state:state: open /proc/acpi/wakeup:Device S-state Status Sysfs node /proc/acpi/wakeup:P0P1 S4*disabled /proc/acpi/wakeup:LID0 S3*enabled /proc/acpi/wakeup:EHC1 S0*enabled pci::00:1d.0 /proc/acpi/wakeup:XHC S0*enabled pci::00:14.0 /proc/acpi/wakeup:PXSX S4*disabled /proc/acpi/wakeup:RP03 S3*disabled pci::00:1c.0 /proc/acpi/wakeup:PEG0 S4*disabled /proc/acpi/wakeup:PEGP S4*disabled /proc/acpi/wakeup:PEG1 S4*disabled /proc/acpi/wakeup:PEG2 S4*disabled ubuntu@201306-13866:~$ dmesg | grep 'ACPI: Video' [ 11.036337] ACPI: Video Device [GFX0] (multi-head: yes rom: no post: no) ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-32-generic 3.13.0-32.57 ProcVersionSignature: Ubuntu 3.13.0-32.57-generic 3.13.11.4 Uname: Linux 3.13.0-32-generic x86_64 ApportVersion: 2.14.1-0ubuntu3.2 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: ubuntu 1586 F pulseaudio CRDA: country TW: (2402 - 2472 @ 40), (3, 27) (5270 - 5330 @ 40), (3, 17), DFS (5735 - 5815 @ 40), (3, 30) CurrentDesktop: Unity Date: Wed Jul 23 23:35:09 2014 HibernationDevice: RESUME=UUID=bce2a764-eac9-4044-b879-caa497463b91 InstallationDate: Installed on 2014-07-24 (0 days ago) InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Release amd64 (20140417) MachineType: Dell Inc. Latitude 3540 ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-32-generic.efi.signed root=UUID=1dd2f74b-d1f1-42e1-9c35-6675a578b71e ro quiet splash vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-3.13.0-32-generic N/A linux-backports-modules-3.13.0-32-generic N/A linux-firmware 1.127.5 SourcePackage: linux StagingDrivers: rts5139 UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 08/06/2013 dmi.bios.vendor: Dell Inc. dmi.bios.version: A01 dmi.board.name: 0992HC dmi.board.vendor: Dell Inc. dmi.board.version: X01 dmi.chassis.type: 8 dmi.chassis.vendor: Dell Inc. dmi.chassis.version: A01 dmi.modalias: dmi:bvnDellInc.:bvrA01:bd08/06/2013:svnDellInc.:pnLatitude3540:pvrA01:rvnDellInc.:rn0992HC:rvrX01:cvnDellInc.:ct8:cvrA01: dmi.product.name: Latitude 3540 dmi.product.version: A01 dmi.sys.vendor: Dell Inc. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1348020/+subscriptions -- Mailing list:
[Kernel-packages] [Bug 1339998] Re: [Dell Latitude 12 Rugged Extreme 7204] Microphone mute key does not work
** Changed in: hwe-next Status: New = Triaged ** Also affects: linux (Ubuntu) Importance: Undecided Status: New ** Changed in: linux (Ubuntu) Status: New = Fix Released ** Changed in: hwe-next Status: Triaged = Fix Released ** Also affects: hwe-next/utopic Importance: Medium Assignee: Hui Wang (hui.wang) Status: Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1339998 Title: [Dell Latitude 12 Rugged Extreme 7204] Microphone mute key does not work Status in HWE Next Project: Fix Released Status in HWE Next utopic series: Fix Released Status in “linux” package in Ubuntu: Fix Released Status in “systemd” package in Ubuntu: Fix Released Bug description: CID: 201402-14663 Dell Latitude 12 Rugged Extreme The microphone mute key does not work on this system, so as its LED Steps: 1. Install 14.04 + update (3.13.0-30), boot to desktop 2. Try to mute the microphone with the hotkey (fn+F4) Expected results: * Mic mute key should work, its LED should be lit and the Mute option for input device should be ticked after you press the mic mute key. Actual result: * Nothing happened. Debugging information: ubuntu@201402-14663:~$ sudo showkey -k kb mode was ?UNKNOWN? [ if you are trying this under X, it might not work since the X server is also reading /dev/console ] press any key (program terminates 10s after last keypress)... keycode 28 release keycode 248 press keycode 248 release keycode 248 press keycode 248 release keycode 248 press keycode 248 release keycode 29 press ^Ccaught signal 2, cleaning up... xev cannot detect any microphone mute key event ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-30-generic 3.13.0-30.55 ProcVersionSignature: Ubuntu 3.13.0-30.55-generic 3.13.11.2 Uname: Linux 3.13.0-30-generic x86_64 ApportVersion: 2.14.1-0ubuntu3.2 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC1: ubuntu 1501 F pulseaudio /dev/snd/controlC0: ubuntu 1501 F pulseaudio CRDA: country TW: (2402 - 2472 @ 40), (3, 27) (5270 - 5330 @ 40), (3, 17), DFS (5735 - 5815 @ 40), (3, 30) CurrentDesktop: Unity Date: Wed Jul 9 23:57:11 2014 HibernationDevice: RESUME=UUID=b68f02ad-f5e4-4eb9-b88d-e85f60666734 InstallationDate: Installed on 2014-07-10 (0 days ago) InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Release amd64 (20140417) MachineType: Dell Inc. Latitude 12 Rugged Extreme (7204) ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-30-generic.efi.signed root=UUID=bdd00fe9-0df9-4b71-92c5-5f94c533f725 ro quiet splash vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-3.13.0-30-generic N/A linux-backports-modules-3.13.0-30-generic N/A linux-firmware 1.127.4 SourcePackage: linux UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 05/12/2014 dmi.bios.vendor: Dell Inc. dmi.bios.version: A00 dmi.board.name: 0TH1GJ dmi.board.vendor: Dell Inc. dmi.board.version: X02 dmi.chassis.type: 9 dmi.chassis.vendor: Dell Inc. dmi.modalias: dmi:bvnDellInc.:bvrA00:bd05/12/2014:svnDellInc.:pnLatitude12RuggedExtreme(7204):pvr01:rvnDellInc.:rn0TH1GJ:rvrX02:cvnDellInc.:ct9:cvr: dmi.product.name: Latitude 12 Rugged Extreme (7204) dmi.product.version: 01 dmi.sys.vendor: Dell Inc. To manage notifications about this bug go to: https://bugs.launchpad.net/hwe-next/+bug/1339998/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1341988] Re: [Dell Inspiron 11 - 3147] Brightness control does not work on this system
** Changed in: linux (Ubuntu) Assignee: Edward Lin (airken) = Anthony Wong (anthonywong) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1341988 Title: [Dell Inspiron 11 - 3147] Brightness control does not work on this system Status in “linux” package in Ubuntu: Confirmed Bug description: CID: 201403-14888 Dell Inspiron 11 - 3147 The screen brightness cannot be controlled by the hotkey. Steps: 1. Install 14.04 + update (3.13.0-30), boot to desktop 2. Try to control brightness with the hotkey 3. Try to control brightness with Brightness and Lock applet Expected result: * Brightness could be controlled by the hotkey or the applet Actual result: * Brightness level indicator changed along with the hotkey, but the brightness won't be changed at all. Debugging information: ubuntu@201403-14888:~$ grep -r . /proc/acpi /proc/acpi/button/lid/LID0/state:state: open /proc/acpi/wakeup:Device S-state Status Sysfs node /proc/acpi/wakeup:XHC1 S0*enabled pci::00:14.0 /proc/acpi/wakeup:RP01 S4*disabled pci::00:1c.0 /proc/acpi/wakeup:PXSX S4*disabled /proc/acpi/wakeup:RP02 S4*disabled /proc/acpi/wakeup:PXSX S4*disabled /proc/acpi/wakeup:RP03 S4*disabled /proc/acpi/wakeup:PXSX S4*disabled /proc/acpi/wakeup:RP04 S4*disabled /proc/acpi/wakeup:PXSX S4*disabled /proc/acpi/wakeup:PWRB S4*enabled /proc/acpi/wakeup:LID0 S3*enabled ubuntu@201403-14888:~$ ls /sys/class/backlight/ acpi_video0 intel_backlight ubuntu@201403-14888:~$ dmesg | grep 'ACPI: Video' [ 10.409549] ACPI: Video Device [PEGP] (multi-head: yes rom: no post: no) [ 10.435109] ACPI: Video Device [GFX0] (multi-head: yes rom: no post: no) ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-30-generic 3.13.0-30.55 ProcVersionSignature: Ubuntu 3.13.0-30.55-generic 3.13.11.2 Uname: Linux 3.13.0-30-generic x86_64 ApportVersion: 2.14.1-0ubuntu3.2 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: ubuntu 1563 F pulseaudio CRDA: country TW: (2402 - 2472 @ 40), (3, 27) (5270 - 5330 @ 40), (3, 17), DFS (5735 - 5815 @ 40), (3, 30) CurrentDesktop: Unity Date: Tue Jul 15 02:04:08 2014 HibernationDevice: RESUME=UUID=b30f45e9-6fc7-4aa0-adff-37e7c87c19cd InstallationDate: Installed on 2014-07-15 (0 days ago) InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Release amd64 (20140417) MachineType: Dell Inc. Inspiron 11 - 3147 ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-30-generic.efi.signed root=UUID=cc246aa9-85c1-49ac-b06b-6c0f4e37dbea ro quiet splash RelatedPackageVersions: linux-restricted-modules-3.13.0-30-generic N/A linux-backports-modules-3.13.0-30-generic N/A linux-firmware 1.127.4 SourcePackage: linux UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 05/05/2014 dmi.bios.vendor: Dell Inc. dmi.bios.version: A01 dmi.board.name: 00K010 dmi.board.vendor: Dell Inc. dmi.board.version: D02 dmi.chassis.type: 8 dmi.chassis.vendor: Dell Inc. dmi.chassis.version: A01 dmi.modalias: dmi:bvnDellInc.:bvrA01:bd05/05/2014:svnDellInc.:pnInspiron11-3147:pvr:rvnDellInc.:rn00K010:rvrD02:cvnDellInc.:ct8:cvrA01: dmi.product.name: Inspiron 11 - 3147 dmi.sys.vendor: Dell Inc. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1341988/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1327752] Re: Call Trace after suspend to RAM
[Expired for linux (Ubuntu) because there has been no activity for 60 days.] ** Changed in: linux (Ubuntu) Status: Incomplete = Expired -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1327752 Title: Call Trace after suspend to RAM Status in “linux” package in Ubuntu: Expired Bug description: In 12.04 LTS suspend to RAM worked. After the dist-upgrade to 14.04 I get this error. Before closing the lid I usually type sudo rmmod libertas-sdio libertas sdhci-pci sdhci mmc-block ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-29-generic 3.13.0-29.53 ProcVersionSignature: Ubuntu 3.13.0-29.53-generic 3.13.11.2 Uname: Linux 3.13.0-29-generic x86_64 ApportVersion: 2.14.1-0ubuntu3.2 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: chris 3709 F pulseaudio Date: Sun Jun 8 11:47:38 2014 HibernationDevice: RESUME=UUID=1fb4cd17-471b-4258-940d-6c22129b5f22 InstallationDate: Installed on 2010-02-01 (1587 days ago) InstallationMedia: Kubuntu 9.10 Karmic Koala - Release amd64 (20091027) MachineType: ATI Herring ProcEnviron: LANGUAGE=de_DE TERM=xterm PATH=(custom, no user) LANG=de_DE.UTF-8 SHELL=/bin/bash ProcFB: 0 radeondrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-29-generic root=UUID=88d9b5d2-d674-47ee-b863-ac3b0195a7cb ro vt.handoff=7 PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: Home directory not accessible: Permission denied No PulseAudio daemon running, or not running as session daemon. RelatedPackageVersions: linux-restricted-modules-3.13.0-29-generic N/A linux-backports-modules-3.13.0-29-generic N/A linux-firmware 1.127.2 SourcePackage: linux UpgradeStatus: Upgraded to trusty on 2014-04-24 (44 days ago) dmi.bios.date: 08/13/2008 dmi.bios.vendor: Phoenix Technologies LTD dmi.bios.version: 4.06 dmi.board.name: Herring dmi.board.vendor: ATI dmi.board.version: Rev 1 dmi.chassis.asset.tag: None dmi.chassis.type: 1 dmi.chassis.vendor: AMD dmi.chassis.version: None dmi.modalias: dmi:bvnPhoenixTechnologiesLTD:bvr4.06:bd08/13/2008:svnATI:pnHerring:pvrRev1:rvnATI:rnHerring:rvrRev1:cvnAMD:ct1:cvrNone: dmi.product.name: Herring dmi.product.version: Rev 1 dmi.sys.vendor: ATI To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1327752/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1329328] Re: wifi goes up and down fequently
[Expired for linux (Ubuntu) because there has been no activity for 60 days.] ** Changed in: linux (Ubuntu) Status: Incomplete = Expired -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1329328 Title: wifi goes up and down fequently Status in “linux” package in Ubuntu: Expired Bug description: wifi goes up and down fequently. As least with this kernel version I get a notification, and I can see the new authentication in dmesg. [15891.495890] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [15891.510620] wlan0: deauthenticating from 00:1d:6a:72:38:63 by local choice (reason=2) [15891.534132] wlan0: authenticate with 00:1d:6a:72:38:63 [15891.534214] wlan0: send auth to 00:1d:6a:72:38:63 (try 1/3) [15891.534653] cfg80211: Calling CRDA to update world regulatory domain [15891.536199] wlan0: authenticated [15891.536307] rtl8188ee :08:00.0 wlan0: disabling HT/VHT due to WEP/TKIP use [15891.536310] rtl8188ee :08:00.0 wlan0: disabling HT as WMM/QoS is not supported by the AP [15891.536312] rtl8188ee :08:00.0 wlan0: disabling VHT as WMM/QoS is not supported by the AP [15891.537236] cfg80211: World regulatory domain updated: [15891.537239] cfg80211: (start_freq - end_freq @ bandwidth), (max_antenna_gain, max_eirp) [15891.537241] cfg80211: (2402000 KHz - 2472000 KHz @ 4 KHz), (300 mBi, 2000 mBm) [15891.537242] cfg80211: (2457000 KHz - 2482000 KHz @ 4 KHz), (300 mBi, 2000 mBm) [15891.537243] cfg80211: (2474000 KHz - 2494000 KHz @ 2 KHz), (300 mBi, 2000 mBm) [15891.537244] cfg80211: (517 KHz - 525 KHz @ 4 KHz), (300 mBi, 2000 mBm) [15891.537245] cfg80211: (5735000 KHz - 5835000 KHz @ 4 KHz), (300 mBi, 2000 mBm) [15891.537938] wlan0: associate with 00:1d:6a:72:38:63 (try 1/3) [15891.540687] wlan0: RX AssocResp from 00:1d:6a:72:38:63 (capab=0x431 status=0 aid=1) [15891.540799] wlan0: associated [16643.87] wlan0: Connection to AP 00:1d:6a:72:38:63 lost [16643.870668] cfg80211: Calling CRDA to update world regulatory domain [16643.898315] cfg80211: World regulatory domain updated: [16643.898322] cfg80211: (start_freq - end_freq @ bandwidth), (max_antenna_gain, max_eirp) [16643.898326] cfg80211: (2402000 KHz - 2472000 KHz @ 4 KHz), (300 mBi, 2000 mBm) [16643.898328] cfg80211: (2457000 KHz - 2482000 KHz @ 4 KHz), (300 mBi, 2000 mBm) [16643.898331] cfg80211: (2474000 KHz - 2494000 KHz @ 2 KHz), (300 mBi, 2000 mBm) [16643.898333] cfg80211: (517 KHz - 525 KHz @ 4 KHz), (300 mBi, 2000 mBm) [16643.898335] cfg80211: (5735000 KHz - 5835000 KHz @ 4 KHz), (300 mBi, 2000 mBm) [16645.224408] wlan0: authenticate with 00:1d:6a:72:38:63 [16645.233594] wlan0: send auth to 00:1d:6a:72:38:63 (try 1/3) [16645.235649] wlan0: authenticated [16645.235811] rtl8188ee :08:00.0 wlan0: disabling HT/VHT due to WEP/TKIP use [16645.235815] rtl8188ee :08:00.0 wlan0: disabling HT as WMM/QoS is not supported by the AP [16645.235818] rtl8188ee :08:00.0 wlan0: disabling VHT as WMM/QoS is not supported by the AP [16645.239347] wlan0: associate with 00:1d:6a:72:38:63 (try 1/3) [16645.242101] wlan0: RX AssocResp from 00:1d:6a:72:38:63 (capab=0x431 status=0 aid=1) [16645.242218] wlan0: associated ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-29-generic 3.13.0-29.53 ProcVersionSignature: Ubuntu 3.13.0-29.53-generic 3.13.11.2 Uname: Linux 3.13.0-29-generic x86_64 NonfreeKernelModules: nvidia ApportVersion: 2.14.1-0ubuntu3.2 Architecture: amd64 CurrentDesktop: KDE Date: Thu Jun 12 15:46:22 2014 EcryptfsInUse: Yes InstallationDate: Installed on 2014-04-16 (56 days ago) InstallationMedia: Kubuntu 14.04 LTS Trusty Tahr - Beta amd64 (20140326.2) MachineType: Hewlett-Packard HP Pavilion 15 Notebook PC ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.13.0-29-generic root=UUID=3c7560c5-c6da-4e1b-9be7-5658f0c00914 ro quiet splash vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-3.13.0-29-generic N/A linux-backports-modules-3.13.0-29-generic N/A linux-firmware 1.127.2 RfKill: 0: phy0: Wireless LAN Soft blocked: no Hard blocked: no SourcePackage: linux UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 10/31/2013 dmi.bios.vendor: Insyde dmi.bios.version: F.34 dmi.board.asset.tag: Type2 - Board Asset Tag dmi.board.name: 2166 dmi.board.vendor: Hewlett-Packard dmi.board.version: 29.34 dmi.chassis.type: 10 dmi.chassis.vendor: Hewlett-Packard dmi.chassis.version: Chassis Version dmi.modalias:
[Kernel-packages] [Bug 1328825] Re: Wired Network Crash
[Expired for linux (Ubuntu) because there has been no activity for 60 days.] ** Changed in: linux (Ubuntu) Status: Incomplete = Expired -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1328825 Title: Wired Network Crash Status in “linux” package in Ubuntu: Expired Bug description: Wired network is continuously fails to respond to ping, and network disconnects in Ubuntu 14.04 64 bit Desktop edition. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1328825/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1328470] Re: [Intel D945GCLF2] Kernel panic with 3.13.0-27-generic
[Expired for linux (Ubuntu) because there has been no activity for 60 days.] ** Changed in: linux (Ubuntu) Status: Incomplete = Expired -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1328470 Title: [Intel D945GCLF2] Kernel panic with 3.13.0-27-generic Status in “linux” package in Ubuntu: Expired Bug description: System does not boot after upgrade to kernel linux- image-3.13.0-27-generic. It crashes with a kernel panic. I was able to boot the default kernel from Ubuntu 14.04 (linux- image-3.13.0-24-generic). ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-24-generic 3.13.0-24.47 ProcVersionSignature: Ubuntu 3.13.0-24.47-generic 3.13.9 Uname: Linux 3.13.0-24-generic x86_64 AlsaVersion: Advanced Linux Sound Architecture Driver Version k3.13.0-24-generic. AplayDevices: Error: [Errno 2] No such file or directory: 'aplay' ApportVersion: 2.14.1-0ubuntu3.2 Architecture: amd64 ArecordDevices: Error: [Errno 2] No such file or directory: 'arecord' AudioDevicesInUse: Error: command ['fuser', '-v', '/dev/snd/by-path', '/dev/snd/controlC0', '/dev/snd/hwC0D2', '/dev/snd/pcmC0D0c', '/dev/snd/pcmC0D0p', '/dev/snd/pcmC0D1p', '/dev/snd/pcmC0D2c', '/dev/snd/seq', '/dev/snd/timer'] failed with exit code 1: CRDA: Error: [Errno 2] No such file or directory: 'iw' Card0.Amixer.info: Error: [Errno 2] No such file or directory: 'amixer' Card0.Amixer.values: Error: [Errno 2] No such file or directory: 'amixer' CurrentDmesg: [ 24.371313] init: plymouth-upstart-bridge main process ended, respawning Date: Tue Jun 10 11:54:29 2014 InstallationDate: Installed on 2014-04-26 (44 days ago) InstallationMedia: Ubuntu-Server 14.04 LTS Trusty Tahr - Release amd64 (20140416.2) IwConfig: tun0 no wireless extensions. eth0 no wireless extensions. lono wireless extensions. ProcEnviron: TERM=xterm PATH=(custom, no user) LANG=de_DE.UTF-8 SHELL=/bin/bash ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-24-generic root=UUID=8282ba3f-5f41-45e6-b9ef-4295c61b70e9 ro RelatedPackageVersions: linux-restricted-modules-3.13.0-24-generic N/A linux-backports-modules-3.13.0-24-generic N/A linux-firmware 1.127.2 RfKill: Error: [Errno 2] No such file or directory: 'rfkill' SourcePackage: linux UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 04/14/2010 dmi.bios.vendor: Intel Corp. dmi.bios.version: LF94510J.86A.0278.2010.0414.2000 dmi.board.asset.tag: Base Board Asset Tag dmi.board.name: D945GCLF2 dmi.board.vendor: Intel Corporation dmi.board.version: AAE46416-103 dmi.chassis.type: 3 dmi.modalias: dmi:bvnIntelCorp.:bvrLF94510J.86A.0278.2010.0414.2000:bd04/14/2010:svn:pn:pvr:rvnIntelCorporation:rnD945GCLF2:rvrAAE46416-103:cvn:ct3:cvr: To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1328470/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1314434] Re: 10ec:8179 (rev 01) RTL8188EE Wireless Network Adapter not working
[Expired for linux (Ubuntu) because there has been no activity for 60 days.] ** Changed in: linux (Ubuntu) Status: Incomplete = Expired -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1314434 Title: 10ec:8179 (rev 01) RTL8188EE Wireless Network Adapter not working Status in “linux” package in Ubuntu: Expired Bug description: I am using Ubuntu 14.04 and i was able to install everything using livecd and my wifi connection, but after install only the wired connection is working. I tried to use previous kernel version (3.13.0.19) but didnt work too. Please see the following for more information: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1314434/+attachment/4109886/+files/info ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-24-generic 3.13.0-24.46 ProcVersionSignature: Ubuntu 3.13.0-24.46-generic 3.13.9 Uname: Linux 3.13.0-24-generic i686 ApportVersion: 2.14.1-0ubuntu3 Architecture: i386 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: marcelo1462 F pulseaudio CurrentDesktop: Unity CurrentDmesg: [ 33.113077] init: plymouth-upstart-bridge main process ended, respawning Date: Tue Apr 29 21:50:00 2014 HibernationDevice: RESUME=UUID=e7a13320-446c-43e9-83ee-d19d9a35c8e8 InstallationDate: Installed on 2014-04-29 (0 days ago) InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Beta i386 (20140325.1) Lsusb: Bus 002 Device 002: ID 8087:0024 Intel Corp. Integrated Rate Matching Hub Bus 002 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub Bus 001 Device 003: ID 04f2:b351 Chicony Electronics Co., Ltd Bus 001 Device 002: ID 8087:0024 Intel Corp. Integrated Rate Matching Hub Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub MachineType: Positivo Informatica SA C14CU51 ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-24-generic root=UUID=5e246eba-d724-4e0a-ac42-cf84d90081d6 ro locale=pt_BR quiet splash vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-3.13.0-24-generic N/A linux-backports-modules-3.13.0-24-generic N/A linux-firmware 1.127 RfKill: 0: phy0: Wireless LAN Soft blocked: no Hard blocked: no SourcePackage: linux UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 05/31/2013 dmi.bios.vendor: American Megatrends Inc. dmi.bios.version: 1.01.U dmi.board.asset.tag: To be filled by O.E.M. dmi.board.name: C14CU51 dmi.board.vendor: Positivo Informatica SA dmi.board.version: POSITIVO dmi.chassis.asset.tag: To Be Filled By O.E.M. dmi.chassis.type: 10 dmi.chassis.vendor: Positivo Informatica SA dmi.chassis.version: POSITIVO dmi.modalias: dmi:bvnAmericanMegatrendsInc.:bvr1.01.U:bd05/31/2013:svnPositivoInformaticaSA:pnC14CU51:pvr1.01.U_POS:rvnPositivoInformaticaSA:rnC14CU51:rvrPOSITIVO:cvnPositivoInformaticaSA:ct10:cvrPOSITIVO: dmi.product.name: C14CU51 dmi.product.version: 1.01.U_POS dmi.sys.vendor: Positivo Informatica SA To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1314434/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1328632] Re: whole system can unrecoverably stall just because of a single misbehaving program that eats up too much memory (causing trashing)
[Expired for linux (Ubuntu) because there has been no activity for 60 days.] ** Changed in: linux (Ubuntu) Status: Incomplete = Expired -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1328632 Title: whole system can unrecoverably stall just because of a single misbehaving program that eats up too much memory (causing trashing) Status in “linux” package in Ubuntu: Expired Bug description: If a single program starts misbehaving (because of an error) and suddenly eating up a lot of memory, the whole system becomes unresponsive and you won't even be able to open a terminal, or switch to a virtual terminal (ctrl+alt+f1) and kill the offending process. It's absolutely unacceptable that the whole system can so easily stall into an unrecoverable state where the only option is a hardware shut down, just because of ONE misbehaving process (no matter whether faulty or malicious). You easily find yourself in this ridiculous and enraging situation: - you perfectly know what program is eating up all memory and hogging the system (or you have just a couple of candidates and could easily figure out by running top) - you perfectly know what to do to restore normal behavior: open a terminal, ps to find out the process id, and kill it. 3 easy steps - you can't do any of that because the system won't even respond to keystrokes and mouse clicks. Not even ctrl+alt+f1 to switch to virtual terminal works. You have no chance to run any command. The system should stop allocating the memory that process asks, or at least always keep in physical memory the essential processes that are needed to do the necessary tasks rescue the system from such a situation: open a terminal (or at least switch to a virtual console) and run commands. Also, responsiveness to mouse and keyboard should ALWAYS have the topmost priority, no matter what cpu-intensive or i/o-intensive task is being performed. An operating system that becomes unworkable just because of one single program's fault, is simply failing to do its most basic job. ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-29-generic 3.13.0-29.53 ProcVersionSignature: Ubuntu 3.13.0-29.53-generic 3.13.11.2 Uname: Linux 3.13.0-29-generic x86_64 ApportVersion: 2.14.1-0ubuntu3.2 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: teo2155 F pulseaudio CurrentDesktop: Unity Date: Tue Jun 10 19:55:17 2014 HibernationDevice: RESUME=UUID=ff7e702a-a05a-47fd-8c14-551e81f9e9e3 InstallationDate: Installed on 2013-10-11 (242 days ago) InstallationMedia: Ubuntu 13.04 Raring Ringtail - Release amd64 (20130424) MachineType: Acer Aspire V3-571G ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-29-generic.efi.signed root=UUID=5830b30e-69e8-4bb4-8a2b-bc2b43c7414a ro quiet splash vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-3.13.0-29-generic N/A linux-backports-modules-3.13.0-29-generic N/A linux-firmware 1.127.2 SourcePackage: linux UpgradeStatus: Upgraded to trusty on 2014-05-24 (17 days ago) dmi.bios.date: 10/15/2012 dmi.bios.vendor: Acer dmi.bios.version: V2.07 dmi.board.asset.tag: Type2 - Board Asset Tag dmi.board.name: VA50_HC_CR dmi.board.vendor: Acer dmi.board.version: Type2 - Board Version dmi.chassis.type: 10 dmi.chassis.vendor: Acer dmi.chassis.version: V2.07 dmi.modalias: dmi:bvnAcer:bvrV2.07:bd10/15/2012:svnAcer:pnAspireV3-571G:pvrV2.07:rvnAcer:rnVA50_HC_CR:rvrType2-BoardVersion:cvnAcer:ct10:cvrV2.07: dmi.product.name: Aspire V3-571G dmi.product.version: V2.07 dmi.sys.vendor: Acer To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1328632/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1328866] Re: rcu_bh detected stall alway occur
[Expired for linux (Ubuntu) because there has been no activity for 60 days.] ** Changed in: linux (Ubuntu) Status: Incomplete = Expired -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1328866 Title: rcu_bh detected stall alway occur Status in “linux” package in Ubuntu: Expired Bug description: I have many server running on Ubuntu 12.04 LTS kernel 3.2.0-23-generic, but something strange happened in recently. [rcu_bh detected stall] happend many times.Sometime kernel will die,sometime just a warning in dmesg when [rcu_bh detected stall] happen. ** server information: kernel: Ubuntu 3.2.0-23.36-generic 3.2.14 CPU: Intel(R) Xeon(R) CPU E5-2620 0 @ 2.00GHz Intel Corporation I350 Gigabit Network Connection ** Jun 11 15:44:10 [14380700.988692] INFO: rcu_bh detected stall on CPU 19 (t=0 jiffies) Jun 11 15:44:10 [14380700.994604] sending NMI to all CPUs: Jun 11 15:44:10 [14380701.000547] NMI backtrace for cpu 0 Jun 11 15:44:10 [14380701.006244] CPU 0 Jun 11 15:44:10 Jun 11 15:44:10 [14380701.006321] Modules linked in: . . . un 11 15:44:16 [14380702.300237] NMI backtrace for cpu 19 Jun 11 15:44:16 [14380702.300239] CPU 19 Jun 11 15:44:16 [14380702.300240] Modules linked in: iptable_raw netconsole configfs tcp_diag inet_diag mptctl mptbase xt_multiport nf_conntrack_ipv4 nf_defrag_ipv4 xt_state nf_conntrack iptable_filter ip_tables x_tables bnep rfcomm bluetooth vesafb ipmi_poweroff ipmi_watchdog ipmi_devintf ipmi_si ipmi_msghandler joydev sb_edac lp parport acpi_pad edac_core mac_hid ioatdma wmi usbhid hid mpt2sas scsi_transport_sas igb dca raid_class Jun 11 15:44:16 [14380702.300366] Jun 11 15:44:16 [14380702.300373] Pid: 0, comm: swapper/19 Tainted: G O 3.2.0-23-generic #36-Ubuntu / Jun 11 15:44:16 [14380702.300390] RIP: 0010:[81036b8b] [81036b8b] __x2apic_send_IPI_mask+0x15b/0x180 Jun 11 15:44:16 [14380702.300436] igb :05:00.0: Detected Tx Unit Hang Jun 11 15:44:16 [14380702.300439] Tx Queue 1 Jun 11 15:44:16 [14380702.300440] TDH f4b Jun 11 15:44:16 [14380702.300442] TDT f4b Jun 11 15:44:16 [14380702.300452] next_to_use f4b Jun 11 15:44:16 [14380702.300454] next_to_cleandfd Jun 11 15:44:16 [14380702.300455] buffer_info[next_to_clean] Jun 11 15:44:16 [14380702.300457] time_stamp 1d6b49a03 Jun 11 15:44:16 [14380702.300467] next_to_watch88084a14dfe0 Jun 11 15:44:16 [14380702.300469] jiffies 1d6b49b48 Jun 11 15:44:16 [14380702.300471] desc.status 108201 Jun 11 15:44:16 [14380702.300486] RSP: 0018:88107fce3d38 EFLAGS: 0087 Jun 11 15:44:16 [14380702.300500] RAX: 0100 RBX: 88107fcedb80 RCX: 0007 Jun 11 15:44:16 [14380702.300503] RDX: 0007 RSI: 0100 RDI: Jun 11 15:44:16 [14380702.300505] RBP: 88107fce3d98 R08: 88107fcedba0 R09: 0100 Jun 11 15:44:16 [14380702.300508] R10: 2b300055 R11: R12: 88107fc0dba0 Jun 11 15:44:16 [14380702.300510] R13: dbc0 R14: 0008 R15: 00020fff Jun 11 15:44:16 [14380702.300513] FS: () GS:88107fce() knlGS: Jun 11 15:44:16 [14380702.300516] CS: 0010 DS: ES: CR0: 8005003b Jun 11 15:44:16 [14380702.300518] CR2: 7ff939554be0 CR3: 01c05000 CR4: 000406e0 Jun 11 15:44:16 [14380702.300527] DR0: DR1: DR2: Jun 11 15:44:16 [14380702.300529] DR3: DR6: 0ff0 DR7: 0400 Jun 11 15:44:16 [14380702.300532] Process swapper/19 (pid: 0, threadinfo 88084c12, task 88084c118000) Jun 11 15:44:16 [14380702.300534] Stack: Jun 11 15:44:16 [14380702.300542] 88107fcee7c0 0092 00137fce3da8 dba0 Jun 11 15:44:16 [14380702.300559] 0102 0013 88107fce3db8 2710 Jun 11 15:44:16 [14380702.300582] 81c30900 81c30b00 88107fcee7c0 Jun 11 15:44:16 [14380702.300600] Call Trace: Jun 11 15:44:16 [14380702.300617] IRQ Jun 11 15:44:16 [14380702.300634] [81036bcc] x2apic_send_IPI_all+0x1c/0x20 Jun 11 15:44:16 [14380702.300640] [810326a1] arch_trigger_all_cpu_backtrace+0x61/0xa0 Jun 11 15:44:16 [14380702.300655] [810e0877] check_cpu_stall.isra.36+0x97/0xf0 Jun 11 15:44:16 [14380702.300667] [810e0908] __rcu_pending+0x38/0x1b0 Jun 11 15:44:16
[Kernel-packages] [Bug 1355593] [NEW] \_SB_.PCI0:_OSC invalid UUID
Public bug reported: [0.188239] \_SB_.PCI0:_OSC invalid UUID ProblemType: Bug DistroRelease: Ubuntu 14.10 Package: linux-image-3.16.0-7-generic 3.16.0-7.12 ProcVersionSignature: Ubuntu 3.16.0-7.12-generic 3.16.0 Uname: Linux 3.16.0-7-generic x86_64 ApportVersion: 2.14.5-0ubuntu4 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: caravena 2878 F pulseaudio CurrentDesktop: GNOME Date: Tue Aug 12 00:32:02 2014 HibernationDevice: RESUME=UUID=360bd2d2-4f44-4311-86d6-4781ac81ee87 InstallationDate: Installed on 2014-04-27 (106 days ago) InstallationMedia: Ubuntu-GNOME 14.04 LTS Trusty Tahr - Release amd64 (20140416.2) MachineType: SAMSUNG ELECTRONICS CO., LTD. 530U3C/530U4C ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.16.0-7-generic root=UUID=13144268-2374-4154-83f1-c35d81306190 ro quiet splash vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-3.16.0-7-generic N/A linux-backports-modules-3.16.0-7-generic N/A linux-firmware1.132 SourcePackage: linux UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 04/15/2013 dmi.bios.vendor: Phoenix Technologies Ltd. dmi.bios.version: P14AAJ dmi.board.asset.tag: Base Board Asset Tag dmi.board.name: SAMSUNG_NP1234567890 dmi.board.vendor: SAMSUNG ELECTRONICS CO., LTD. dmi.board.version: FAB1 dmi.chassis.asset.tag: No Asset Tag dmi.chassis.type: 9 dmi.chassis.vendor: SAMSUNG ELECTRONICS CO., LTD. dmi.chassis.version: 0.1 dmi.modalias: dmi:bvnPhoenixTechnologiesLtd.:bvrP14AAJ:bd04/15/2013:svnSAMSUNGELECTRONICSCO.,LTD.:pn530U3C/530U4C:pvr0.1:rvnSAMSUNGELECTRONICSCO.,LTD.:rnSAMSUNG_NP1234567890:rvrFAB1:cvnSAMSUNGELECTRONICSCO.,LTD.:ct9:cvr0.1: dmi.product.name: 530U3C/530U4C dmi.product.version: 0.1 dmi.sys.vendor: SAMSUNG ELECTRONICS CO., LTD. ** Affects: linux (Ubuntu) Importance: Undecided Status: New ** Tags: amd64 apport-bug utopic -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1355593 Title: \_SB_.PCI0:_OSC invalid UUID Status in “linux” package in Ubuntu: New Bug description: [0.188239] \_SB_.PCI0:_OSC invalid UUID ProblemType: Bug DistroRelease: Ubuntu 14.10 Package: linux-image-3.16.0-7-generic 3.16.0-7.12 ProcVersionSignature: Ubuntu 3.16.0-7.12-generic 3.16.0 Uname: Linux 3.16.0-7-generic x86_64 ApportVersion: 2.14.5-0ubuntu4 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: caravena 2878 F pulseaudio CurrentDesktop: GNOME Date: Tue Aug 12 00:32:02 2014 HibernationDevice: RESUME=UUID=360bd2d2-4f44-4311-86d6-4781ac81ee87 InstallationDate: Installed on 2014-04-27 (106 days ago) InstallationMedia: Ubuntu-GNOME 14.04 LTS Trusty Tahr - Release amd64 (20140416.2) MachineType: SAMSUNG ELECTRONICS CO., LTD. 530U3C/530U4C ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.16.0-7-generic root=UUID=13144268-2374-4154-83f1-c35d81306190 ro quiet splash vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-3.16.0-7-generic N/A linux-backports-modules-3.16.0-7-generic N/A linux-firmware1.132 SourcePackage: linux UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 04/15/2013 dmi.bios.vendor: Phoenix Technologies Ltd. dmi.bios.version: P14AAJ dmi.board.asset.tag: Base Board Asset Tag dmi.board.name: SAMSUNG_NP1234567890 dmi.board.vendor: SAMSUNG ELECTRONICS CO., LTD. dmi.board.version: FAB1 dmi.chassis.asset.tag: No Asset Tag dmi.chassis.type: 9 dmi.chassis.vendor: SAMSUNG ELECTRONICS CO., LTD. dmi.chassis.version: 0.1 dmi.modalias: dmi:bvnPhoenixTechnologiesLtd.:bvrP14AAJ:bd04/15/2013:svnSAMSUNGELECTRONICSCO.,LTD.:pn530U3C/530U4C:pvr0.1:rvnSAMSUNGELECTRONICSCO.,LTD.:rnSAMSUNG_NP1234567890:rvrFAB1:cvnSAMSUNGELECTRONICSCO.,LTD.:ct9:cvr0.1: dmi.product.name: 530U3C/530U4C dmi.product.version: 0.1 dmi.sys.vendor: SAMSUNG ELECTRONICS CO., LTD. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1355593/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1233602] Re: [Dell Latitude 2120] Realtek card reader [10ec:5208] does not work
Not planning to backport to 14.04 LTS 3.13 kernel at the moment, but there will be 14.04.2, which will use the Utopic kernel. By then, LTS users can choose to upgrade to the Utopic kernel/X/Mesa, so LTS users can also enjoy this driver. @xuedi, blug not doing so well these days after you left :( -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1233602 Title: [Dell Latitude 2120] Realtek card reader [10ec:5208] does not work Status in “linux” package in Ubuntu: Fix Released Status in “linux-lts-raring” package in Ubuntu: Won't Fix Bug description: CID: 201009-6529 Dell Latitude 2120 I found this bug by chance, the Realtek card reader [10ec:5208] is totally not working on 12.04.3 (3.8 kernel) This issue has been reported and fixed before, see bug 698006 It does work in 12.04.2 (3.5 kernel) ProblemType: Bug DistroRelease: Ubuntu 12.04 Package: linux-image-3.8.0-31-generic 3.8.0-31.46~precise1 ProcVersionSignature: Ubuntu 3.8.0-31.46~precise1-generic 3.8.13.8 Uname: Linux 3.8.0-31-generic x86_64 AlsaVersion: Advanced Linux Sound Architecture Driver Version k3.8.0-31-generic. AplayDevices: List of PLAYBACK Hardware Devices card 0: Intel [HDA Intel], device 0: ALC269VB Analog [ALC269VB Analog] Subdevices: 1/1 Subdevice #0: subdevice #0 ApportVersion: 2.0.1-0ubuntu17.5 Architecture: amd64 ArecordDevices: List of CAPTURE Hardware Devices card 0: Intel [HDA Intel], device 0: ALC269VB Analog [ALC269VB Analog] Subdevices: 1/1 Subdevice #0: subdevice #0 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: ubuntu 1923 F pulseaudio CRDA: Error: [Errno 2] No such file or directory Card0.Amixer.info: Card hw:0 'Intel'/'HDA Intel at 0xf6dfc000 irq 46' Mixer name : 'Realtek ALC269VB' Components : 'HDA:10ec0269,102804a5,00100100' Controls : 22 Simple ctrls : 10 Date: Tue Oct 1 18:21:42 2013 EcryptfsInUse: Yes HibernationDevice: RESUME=UUID=04a5b630-f1eb-4428-8e9a-2568152fd26a InstallationMedia: Ubuntu 12.04.3 LTS Precise Pangolin - Release amd64 (20130820.1) MachineType: Dell Inc. Latitude 2120 MarkForUpload: True ProcEnviron: TERM=xterm PATH=(custom, no user) LANG=en_US.UTF-8 SHELL=/bin/bash ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.8.0-31-generic root=UUID=39a27c46-b70e-40be-9511-e3fd25607fd2 ro quiet splash vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-3.8.0-31-generic N/A linux-backports-modules-3.8.0-31-generic N/A linux-firmware1.79.6 SourcePackage: linux-lts-raring UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 10/06/2010 dmi.bios.vendor: Dell Inc. dmi.bios.version: W06 dmi.board.name: DOE3C2 dmi.board.vendor: Dell Inc. dmi.chassis.type: 8 dmi.chassis.vendor: Dell Inc. dmi.modalias: dmi:bvnDellInc.:bvrW06:bd10/06/2010:svnDellInc.:pnLatitude2120:pvr:rvnDellInc.:rnDOE3C2:rvr:cvnDellInc.:ct8:cvr: dmi.product.name: Latitude 2120 dmi.sys.vendor: Dell Inc. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1233602/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1340116] Re: [Dell Latitude 12 Rugged Extreme 7204] Touchpad recognized as a wheel mouse, horizontal scrolling does not work with 1 or 2 fingers
** Changed in: hwe-next Status: New = Triaged -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1340116 Title: [Dell Latitude 12 Rugged Extreme 7204] Touchpad recognized as a wheel mouse, horizontal scrolling does not work with 1 or 2 fingers Status in HWE Next Project: Triaged Status in “linux” package in Ubuntu: Triaged Bug description: CID: 201402-14663 Dell Latitude 12 Rugged Extreme The touchpad on this system was recognized as a Wheel mouse, the vertical edge scrolling works, as well as the 2-finger vertical scrolling However, horizontal edge scrolling and 2-finger horizontal scrolling does not work. From the Mouse Touchpad settings, there is no option for changing scrolling behaviour. (Screenshot attached) ubuntu@201402-14663:~$ xinput list ⎡ Virtual core pointerid=2[master pointer (3)] ⎜ ↳ Virtual core XTEST pointer id=4[slave pointer (2)] ⎜ ↳ UltraChip UCI Touch id=10 [slave pointer (2)] ⎜ ↳ UltraChip UCI Touch id=11 [slave pointer (2)] ⎜ ↳ ImPS/2 Generic Wheel Mouse id=15 [slave pointer (2)] ⎣ Virtual core keyboard id=3[master keyboard (2)] ↳ Virtual core XTEST keyboard id=5[slave keyboard (3)] ↳ Power Buttonid=6[slave keyboard (3)] ↳ Video Bus id=7[slave keyboard (3)] ↳ Power Buttonid=8[slave keyboard (3)] ↳ Sleep Buttonid=9[slave keyboard (3)] ↳ Integrated_Webcam_HDid=12 [slave keyboard (3)] ↳ UVC Camera (114d:1001) id=13 [slave keyboard (3)] ↳ AT Translated Set 2 keyboardid=14 [slave keyboard (3)] ↳ Dell WMI hotkeysid=16 [slave keyboard (3)] ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-30-generic 3.13.0-30.55 ProcVersionSignature: Ubuntu 3.13.0-30.55-generic 3.13.11.2 Uname: Linux 3.13.0-30-generic x86_64 ApportVersion: 2.14.1-0ubuntu3.2 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC1: ubuntu 1501 F pulseaudio /dev/snd/controlC0: ubuntu 1501 F pulseaudio CRDA: country TW: (2402 - 2472 @ 40), (3, 27) (5270 - 5330 @ 40), (3, 17), DFS (5735 - 5815 @ 40), (3, 30) CurrentDesktop: Unity Date: Thu Jul 10 06:01:04 2014 HibernationDevice: RESUME=UUID=b68f02ad-f5e4-4eb9-b88d-e85f60666734 InstallationDate: Installed on 2014-07-10 (0 days ago) InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Release amd64 (20140417) MachineType: Dell Inc. Latitude 12 Rugged Extreme (7204) ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-30-generic.efi.signed root=UUID=bdd00fe9-0df9-4b71-92c5-5f94c533f725 ro quiet splash vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-3.13.0-30-generic N/A linux-backports-modules-3.13.0-30-generic N/A linux-firmware 1.127.4 SourcePackage: linux UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 05/12/2014 dmi.bios.vendor: Dell Inc. dmi.bios.version: A00 dmi.board.name: 0TH1GJ dmi.board.vendor: Dell Inc. dmi.board.version: X02 dmi.chassis.type: 9 dmi.chassis.vendor: Dell Inc. dmi.modalias: dmi:bvnDellInc.:bvrA00:bd05/12/2014:svnDellInc.:pnLatitude12RuggedExtreme(7204):pvr01:rvnDellInc.:rn0TH1GJ:rvrX02:cvnDellInc.:ct9:cvr: dmi.product.name: Latitude 12 Rugged Extreme (7204) dmi.product.version: 01 dmi.sys.vendor: Dell Inc. To manage notifications about this bug go to: https://bugs.launchpad.net/hwe-next/+bug/1340116/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1334968] Re: [HP ProBook 445 G1] Microphone mute key does not work
** Changed in: hwe-next Assignee: (unassigned) = Hui Wang (hui.wang) ** Changed in: hwe-next Importance: Undecided = Medium ** Changed in: hwe-next Status: New = Triaged -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1334968 Title: [HP ProBook 445 G1] Microphone mute key does not work Status in HWE Next Project: Triaged Status in “linux” package in Ubuntu: Incomplete Bug description: CID: 201307-13919 HP ProBook 445 G1 The microphone mute key does not work on this system Keystroke cannot be detected by xev, but it shows: keycode 465 press keycode 465 release from sudo showkey -k ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-30-generic 3.13.0-30.54 ProcVersionSignature: Ubuntu 3.13.0-30.54-generic 3.13.11.2 Uname: Linux 3.13.0-30-generic x86_64 ApportVersion: 2.14.1-0ubuntu3.2 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC1: ubuntu 1508 F pulseaudio /dev/snd/pcmC1D0c: ubuntu 1508 F...m pulseaudio /dev/snd/controlC0: ubuntu 1508 F pulseaudio CRDA: country TW: (2402 - 2472 @ 40), (3, 27) (5270 - 5330 @ 40), (3, 17), DFS (5735 - 5815 @ 40), (3, 30) CurrentDesktop: Unity Date: Fri Jun 27 01:10:10 2014 HibernationDevice: RESUME=UUID=be96939f-ffde-4407-a99e-17beebf60ad5 InstallationDate: Installed on 2014-06-27 (0 days ago) InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Release amd64 (20140417) MachineType: Hewlett-Packard HP ProBook 445 G1 Notebook PC ProcFB: 0 radeondrmfb 1 radeondrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-30-generic root=UUID=fd8269ec-b9ab-4f08-8eaf-6c3bfa26a4e1 ro quiet splash vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-3.13.0-30-generic N/A linux-backports-modules-3.13.0-30-generic N/A linux-firmware 1.127.4 RfKill: 0: phy0: Wireless LAN Soft blocked: no Hard blocked: no SourcePackage: linux UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 09/05/2013 dmi.bios.vendor: Hewlett-Packard dmi.bios.version: 68CPE Ver. F.21 dmi.board.asset.tag: Base Board Asset Tag dmi.board.name: 1950 dmi.board.vendor: Hewlett-Packard dmi.board.version: KBC Version 91.0B dmi.chassis.type: 10 dmi.chassis.vendor: Hewlett-Packard dmi.modalias: dmi:bvnHewlett-Packard:bvr68CPEVer.F.21:bd09/05/2013:svnHewlett-Packard:pnHPProBook445G1NotebookPC:pvrA201BC1203:rvnHewlett-Packard:rn1950:rvrKBCVersion91.0B:cvnHewlett-Packard:ct10:cvr: dmi.product.name: HP ProBook 445 G1 Notebook PC dmi.product.version: A201BC1203 dmi.sys.vendor: Hewlett-Packard To manage notifications about this bug go to: https://bugs.launchpad.net/hwe-next/+bug/1334968/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1342548] Re: [Dell Inspiron 5437] Wireless key does not work on this system
** Changed in: hwe-next Status: New = In Progress -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1342548 Title: [Dell Inspiron 5437] Wireless key does not work on this system Status in HWE Next Project: In Progress Status in “linux” package in Ubuntu: Confirmed Bug description: CID: 201305-13673 Dell Inspiron 5437 The wireless hotkey does not work on this system Steps: 1. Install 14.04 + update (3.13.0-30), boot to desktop 2. Try to control wireless / BT with the hotkey Expected result: * Wireless / BT could be controlled by the hotkey Actual result: * Hotkey is not working Debugging information: ubuntu@201305-13673:~$ sudo showkey -k kb mode was ?UNKNOWN? [ if you are trying this under X, it might not work since the X server is also reading /dev/console ] press any key (program terminates 10s after last keypress)... keycode 28 release keycode 240 press keycode 240 release keycode 240 press keycode 240 release ^Ccaught signal 2, cleaning up... KeyPress event, serial 37, synthetic NO, window 0x3a1, root 0x2c0, subw 0x0, time 199006, (-357,353), root:(430,405), state 0x0, keycode 248 (keysym 0x0, NoSymbol), same_screen YES, XLookupString gives 0 bytes: XmbLookupString gives 0 bytes: XFilterEvent returns: False KeyRelease event, serial 37, synthetic NO, window 0x3a1, root 0x2c0, subw 0x0, time 199006, (-357,353), root:(430,405), state 0x0, keycode 248 (keysym 0x0, NoSymbol), same_screen YES, XLookupString gives 0 bytes: XFilterEvent returns: False nothing from sudo showkey -s ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-30-generic 3.13.0-30.55 ProcVersionSignature: Ubuntu 3.13.0-30.55-generic 3.13.11.2 Uname: Linux 3.13.0-30-generic x86_64 NonfreeKernelModules: nvidia ApportVersion: 2.14.1-0ubuntu3.2 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: ubuntu 1638 F pulseaudio /dev/snd/controlC1: ubuntu 1638 F pulseaudio CRDA: country TW: (2402 - 2472 @ 40), (3, 27) (5270 - 5330 @ 40), (3, 17), DFS (5735 - 5815 @ 40), (3, 30) CurrentDesktop: Unity Date: Wed Jul 16 01:56:06 2014 HibernationDevice: RESUME=UUID=67674077-ce03-4513-b8be-b3e9bdd8840d InstallationDate: Installed on 2014-07-16 (0 days ago) InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Release amd64 (20140417) MachineType: Dell Inc. Inspiron 5437 ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-30-generic.efi.signed root=UUID=e56f47e4-b04b-4702-b89f-59e1c08572c4 ro quiet splash vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-3.13.0-30-generic N/A linux-backports-modules-3.13.0-30-generic N/A linux-firmware 1.127.4 SourcePackage: linux UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 11/14/2013 dmi.bios.vendor: Dell Inc. dmi.bios.version: A07 dmi.board.vendor: Dell Inc. dmi.board.version: A07 dmi.chassis.type: 8 dmi.chassis.vendor: Dell Inc. dmi.chassis.version: Not Specified dmi.modalias: dmi:bvnDellInc.:bvrA07:bd11/14/2013:svnDellInc.:pnInspiron5437:pvrNotSpecified:rvnDellInc.:rn:rvrA07:cvnDellInc.:ct8:cvrNotSpecified: dmi.product.name: Inspiron 5437 dmi.product.version: Not Specified dmi.sys.vendor: Dell Inc. To manage notifications about this bug go to: https://bugs.launchpad.net/hwe-next/+bug/1342548/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1355593] Status changed to Confirmed
This change was made by a bot. ** Changed in: linux (Ubuntu) Status: New = Confirmed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1355593 Title: \_SB_.PCI0:_OSC invalid UUID Status in “linux” package in Ubuntu: Confirmed Bug description: [0.188239] \_SB_.PCI0:_OSC invalid UUID ProblemType: Bug DistroRelease: Ubuntu 14.10 Package: linux-image-3.16.0-7-generic 3.16.0-7.12 ProcVersionSignature: Ubuntu 3.16.0-7.12-generic 3.16.0 Uname: Linux 3.16.0-7-generic x86_64 ApportVersion: 2.14.5-0ubuntu4 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: caravena 2878 F pulseaudio CurrentDesktop: GNOME Date: Tue Aug 12 00:32:02 2014 HibernationDevice: RESUME=UUID=360bd2d2-4f44-4311-86d6-4781ac81ee87 InstallationDate: Installed on 2014-04-27 (106 days ago) InstallationMedia: Ubuntu-GNOME 14.04 LTS Trusty Tahr - Release amd64 (20140416.2) MachineType: SAMSUNG ELECTRONICS CO., LTD. 530U3C/530U4C ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.16.0-7-generic root=UUID=13144268-2374-4154-83f1-c35d81306190 ro quiet splash vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-3.16.0-7-generic N/A linux-backports-modules-3.16.0-7-generic N/A linux-firmware1.132 SourcePackage: linux UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 04/15/2013 dmi.bios.vendor: Phoenix Technologies Ltd. dmi.bios.version: P14AAJ dmi.board.asset.tag: Base Board Asset Tag dmi.board.name: SAMSUNG_NP1234567890 dmi.board.vendor: SAMSUNG ELECTRONICS CO., LTD. dmi.board.version: FAB1 dmi.chassis.asset.tag: No Asset Tag dmi.chassis.type: 9 dmi.chassis.vendor: SAMSUNG ELECTRONICS CO., LTD. dmi.chassis.version: 0.1 dmi.modalias: dmi:bvnPhoenixTechnologiesLtd.:bvrP14AAJ:bd04/15/2013:svnSAMSUNGELECTRONICSCO.,LTD.:pn530U3C/530U4C:pvr0.1:rvnSAMSUNGELECTRONICSCO.,LTD.:rnSAMSUNG_NP1234567890:rvrFAB1:cvnSAMSUNGELECTRONICSCO.,LTD.:ct9:cvr0.1: dmi.product.name: 530U3C/530U4C dmi.product.version: 0.1 dmi.sys.vendor: SAMSUNG ELECTRONICS CO., LTD. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1355593/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1341925] Re: [Dell Inspiron 11 - 3147] System will hang on reboot / poweroff
** Changed in: hwe-next Assignee: (unassigned) = Jesse Sung (wenchien) ** Changed in: hwe-next Status: New = Triaged ** Changed in: hwe-next Importance: Undecided = Medium -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1341925 Title: [Dell Inspiron 11 - 3147] System will hang on reboot / poweroff Status in HWE Next Project: Triaged Status in “linux” package in Ubuntu: Confirmed Bug description: CID: 201403-14888 Dell Inspiron 11 - 3147 While rebooting this system, it will stuck on the Ubuntu splash screen, caps lock LED will be not responding. This issue happens right after 14.04 installation with USB stick. If you press F1 right after the Ubuntu splash screen appears, you will see the message indicating it's now rebooting: * Deactivating swap... [OK] * Unmounting local filesystems... [OK] * Will now restart Steps: 1. Install 14.04, reboot to desktop 2. Try to reboot again Expect result: * System could be reboot normally Actual result: * It will stuck on the Ubuntu splash screen, the only way to power it off is to hold the power button Same thing could be apply to Shut Down * Unmounting local filesystems... [OK] * Will now halt ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-24-generic 3.13.0-24.46 [modified: boot/vmlinuz-3.13.0-24-generic] ProcVersionSignature: Ubuntu 3.13.0-24.46-generic 3.13.9 Uname: Linux 3.13.0-24-generic x86_64 ApportVersion: 2.14.1-0ubuntu3 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: ubuntu 1431 F pulseaudio CRDA: country TW: (2402 - 2472 @ 40), (3, 27) (5270 - 5330 @ 40), (3, 17), DFS (5735 - 5815 @ 40), (3, 30) CurrentDesktop: Unity Date: Mon Jul 14 22:25:58 2014 HibernationDevice: RESUME=UUID=b30f45e9-6fc7-4aa0-adff-37e7c87c19cd InstallationDate: Installed on 2014-07-15 (0 days ago) InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Release amd64 (20140417) MachineType: Dell Inc. Inspiron 11 - 3147 ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-24-generic.efi.signed root=UUID=cc246aa9-85c1-49ac-b06b-6c0f4e37dbea ro quiet splash vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-3.13.0-24-generic N/A linux-backports-modules-3.13.0-24-generic N/A linux-firmware 1.127 SourcePackage: linux UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 05/05/2014 dmi.bios.vendor: Dell Inc. dmi.bios.version: A01 dmi.board.name: 00K010 dmi.board.vendor: Dell Inc. dmi.board.version: D02 dmi.chassis.type: 8 dmi.chassis.vendor: Dell Inc. dmi.chassis.version: A01 dmi.modalias: dmi:bvnDellInc.:bvrA01:bd05/05/2014:svnDellInc.:pnInspiron11-3147:pvr:rvnDellInc.:rn00K010:rvrD02:cvnDellInc.:ct8:cvrA01: dmi.product.name: Inspiron 11 - 3147 dmi.sys.vendor: Dell Inc. To manage notifications about this bug go to: https://bugs.launchpad.net/hwe-next/+bug/1341925/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1352821] Re: 0489:e078 - Qualcom Atheros - Ubuntu 14.04 bluetooth not working
Dear All, Pls help to provide the solution for the Bluetooth issue . Regds, Bala S -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to bluez in Ubuntu. https://bugs.launchpad.net/bugs/1352821 Title: 0489:e078 - Qualcom Atheros - Ubuntu 14.04 bluetooth not working Status in “bluez” package in Ubuntu: Confirmed Bug description: Hi, Nature of peoblem : Bluetooth not wotrking under Ubuntu 14.04 but wifi working fine. pls help to provide the solution Vendor ID : 0489:e078 Make of Wifi BT combo : Qualcom Atheros QCA9565 /AR9565 Regds, Bala S To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/bluez/+bug/1352821/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1355445] Re: linux: 2.6.32-65.129 -proposed tracker
** Changed in: kernel-sru-workflow/prepare-package Status: New = Fix Released ** Changed in: kernel-sru-workflow/prepare-package Assignee: Canonical Kernel Team (canonical-kernel-team) = Brad Figg (brad-figg) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1355445 Title: linux: 2.6.32-65.129 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: New Status in Kernel SRU Workflow package-testing series: New Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-lbm series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-ports-meta series: New Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: New Status in Kernel SRU Workflow verification-testing series: New Status in “linux” package in Ubuntu: Invalid Status in “linux” source package in Lucid: New Bug description: This bug is for tracking the 2.6.32-65.129 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Monday, 11. August 2014 21:00 UTC kernel-stable-phase:Prepare kernel-stable-phase-changed:Monday, 11. August 2014 21:00 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1355445/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1355595] Status changed to Confirmed
This change was made by a bot. ** Changed in: linux (Ubuntu) Status: New = Confirmed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1355595 Title: ACPI Warning: SystemIO range 0x0428-0x042f conflicts with OpRegion 0x0400-0x047f (\PMIO) (20140424/utaddress-258) Status in “linux” package in Ubuntu: Confirmed Bug description: [4.716997] ACPI Warning: SystemIO range 0x0428-0x042f conflicts with OpRegion 0x0400-0x047f (\PMIO) (20140424/utaddress-258) [4.717010] ACPI: If an ACPI driver is available for this device, you should use it instead of the native driver [4.717030] ACPI Warning: SystemIO range 0x0540-0x054f conflicts with OpRegion 0x0500-0x0563 (\GPIO) (20140424/utaddress-258) [4.717039] ACPI: If an ACPI driver is available for this device, you should use it instead of the native driver [4.717042] ACPI Warning: SystemIO range 0x0530-0x053f conflicts with OpRegion 0x0500-0x0563 (\GPIO) (20140424/utaddress-258) [4.717049] ACPI: If an ACPI driver is available for this device, you should use it instead of the native driver [4.717052] ACPI Warning: SystemIO range 0x0500-0x052f conflicts with OpRegion 0x0500-0x0563 (\GPIO) (20140424/utaddress-258) ProblemType: Bug DistroRelease: Ubuntu 14.10 Package: linux-image-3.16.0-7-generic 3.16.0-7.12 ProcVersionSignature: Ubuntu 3.16.0-7.12-generic 3.16.0 Uname: Linux 3.16.0-7-generic x86_64 ApportVersion: 2.14.5-0ubuntu4 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: caravena 2878 F pulseaudio CurrentDesktop: GNOME Date: Tue Aug 12 00:36:31 2014 HibernationDevice: RESUME=UUID=360bd2d2-4f44-4311-86d6-4781ac81ee87 InstallationDate: Installed on 2014-04-27 (106 days ago) InstallationMedia: Ubuntu-GNOME 14.04 LTS Trusty Tahr - Release amd64 (20140416.2) MachineType: SAMSUNG ELECTRONICS CO., LTD. 530U3C/530U4C ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.16.0-7-generic root=UUID=13144268-2374-4154-83f1-c35d81306190 ro quiet splash vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-3.16.0-7-generic N/A linux-backports-modules-3.16.0-7-generic N/A linux-firmware1.132 SourcePackage: linux UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 04/15/2013 dmi.bios.vendor: Phoenix Technologies Ltd. dmi.bios.version: P14AAJ dmi.board.asset.tag: Base Board Asset Tag dmi.board.name: SAMSUNG_NP1234567890 dmi.board.vendor: SAMSUNG ELECTRONICS CO., LTD. dmi.board.version: FAB1 dmi.chassis.asset.tag: No Asset Tag dmi.chassis.type: 9 dmi.chassis.vendor: SAMSUNG ELECTRONICS CO., LTD. dmi.chassis.version: 0.1 dmi.modalias: dmi:bvnPhoenixTechnologiesLtd.:bvrP14AAJ:bd04/15/2013:svnSAMSUNGELECTRONICSCO.,LTD.:pn530U3C/530U4C:pvr0.1:rvnSAMSUNGELECTRONICSCO.,LTD.:rnSAMSUNG_NP1234567890:rvrFAB1:cvnSAMSUNGELECTRONICSCO.,LTD.:ct9:cvr0.1: dmi.product.name: 530U3C/530U4C dmi.product.version: 0.1 dmi.sys.vendor: SAMSUNG ELECTRONICS CO., LTD. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1355595/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1338866] Re: [Compaq 15 Touchsmart] Wireless LED won't change color
** Changed in: linux (Ubuntu) Assignee: Musaab Jameel (mosaabjm) = Liming Wang (wangliming) ** Changed in: hwe-next Assignee: (unassigned) = Liming Wang (wangliming) ** Changed in: hwe-next Importance: Undecided = Medium ** Changed in: hwe-next Status: New = Triaged -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1338866 Title: [Compaq 15 Touchsmart] Wireless LED won't change color Status in HWE Next Project: Triaged Status in “linux” package in Ubuntu: Confirmed Bug description: CID: 201309-13164 Compaq 15 Touchsmart The wireless LED won't change color while disabled Steps: 1. Install 14.04 + update (3.13.0-30) 2. Test the wireless key Expected result: * Wireless key should work, and the LED should change color when the wireless is disabled Actual result: * Wireless would be disabled by the hotkey, but the LED won't change color. Note: the wireless key does not work at all before upgrading the system. ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-30-generic 3.13.0-30.55 ProcVersionSignature: Ubuntu 3.13.0-30.55-generic 3.13.11.2 Uname: Linux 3.13.0-30-generic x86_64 ApportVersion: 2.14.1-0ubuntu3.2 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: ubuntu 1451 F pulseaudio CurrentDesktop: Unity CurrentDmesg: [ 21.821955] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 48.284935] type=1400 audit(1404790545.469:74): apparmor=STATUS operation=profile_replace profile=unconfined name=/usr/lib/cups/backend/cups-pdf pid=2014 comm=apparmor_parser [ 48.284942] type=1400 audit(1404790545.469:75): apparmor=STATUS operation=profile_replace profile=unconfined name=/usr/sbin/cupsd pid=2014 comm=apparmor_parser [ 48.285354] type=1400 audit(1404790545.469:76): apparmor=STATUS operation=profile_replace profile=unconfined name=/usr/sbin/cupsd pid=2014 comm=apparmor_parser [ 106.599254] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready Date: Mon Jul 7 23:36:43 2014 HibernationDevice: RESUME=UUID=506e69ad-2133-4a43-9371-0ccac623c380 InstallationDate: Installed on 2014-07-08 (0 days ago) InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Release amd64 (20140417) MachineType: Hewlett-Packard Compaq 15 Notebook PC ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-30-generic.efi.signed root=UUID=8ac44edb-d2cd-4778-81c7-19b1a86d27bb ro quiet splash vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-3.13.0-30-generic N/A linux-backports-modules-3.13.0-30-generic N/A linux-firmware 1.127.4 SourcePackage: linux UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 11/20/2013 dmi.bios.vendor: Insyde dmi.bios.version: B.13.T02 dmi.board.asset.tag: Type2 - Board Asset Tag dmi.board.name: 218F dmi.board.vendor: Hewlett-Packard dmi.board.version: 39.21 dmi.chassis.asset.tag: Chassis Asset Tag dmi.chassis.type: 10 dmi.chassis.vendor: Hewlett-Packard dmi.chassis.version: Chassis Version dmi.modalias: dmi:bvnInsyde:bvrB.13.T02:bd11/20/2013:svnHewlett-Packard:pnCompaq15NotebookPC:pvr099B1002005000112:rvnHewlett-Packard:rn218F:rvr39.21:cvnHewlett-Packard:ct10:cvrChassisVersion: dmi.product.name: Compaq 15 Notebook PC dmi.product.version: 099B1002005000112 dmi.sys.vendor: Hewlett-Packard To manage notifications about this bug go to: https://bugs.launchpad.net/hwe-next/+bug/1338866/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp