[Kernel-packages] [Bug 1355470] [NEW] linux: 3.13.0-34.59 -proposed tracker

2014-08-11 Thread Joseph Salisbury
Public bug reported:

This bug is for tracking the 3.13.0-34.59 upload package. This bug will
contain status and testing results related to that upload.

For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-Prepare-package-start:Monday, 11. August 2014 22:08 UTC
kernel-phase-changed:Monday, 11. August 2014 22:08 UTC
kernel-phase:Prepare

** Affects: kernel-development-workflow
 Importance: Medium
 Status: In Progress

** Affects: kernel-development-workflow/package-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-development-workflow/prepare-package
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-development-workflow/prepare-package-meta
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-development-workflow/prepare-package-signed
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-development-workflow/promote-to-release
 Importance: Medium
 Assignee: Ubuntu Package Archive Administrators (ubuntu-archive)
 Status: New

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux (Ubuntu Trusty)
 Importance: Medium
 Status: New


** Tags: kernel-release-tracking-bug trusty

** Tags added: kernel-release-tracking-bug

** Also affects: linux (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Tags added: trusty

** Also affects: kernel-development-workflow/package-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-development-workflow/prepare-package
   Importance: Undecided
   Status: New

** Also affects: kernel-development-workflow/prepare-package-meta
   Importance: Undecided
   Status: New

** Also affects: kernel-development-workflow/prepare-package-signed
   Importance: Undecided
   Status: New

** Also affects: kernel-development-workflow/promote-to-release
   Importance: Undecided
   Status: New

** Changed in: kernel-development-workflow
   Status: New = In Progress

** Changed in: kernel-development-workflow
   Importance: Undecided = Medium

** Changed in: kernel-development-workflow/package-testing
   Importance: Undecided = Medium

** Changed in: kernel-development-workflow/package-testing
 Assignee: (unassigned) = Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-development-workflow/prepare-package
   Importance: Undecided = Medium

** Changed in: kernel-development-workflow/prepare-package
 Assignee: (unassigned) = Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-development-workflow/prepare-package-meta
   Importance: Undecided = Medium

** Changed in: kernel-development-workflow/prepare-package-meta
 Assignee: (unassigned) = Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-development-workflow/prepare-package-signed
   Importance: Undecided = Medium

** Changed in: kernel-development-workflow/prepare-package-signed
 Assignee: (unassigned) = Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-development-workflow/promote-to-release
   Importance: Undecided = Medium

** Changed in: kernel-development-workflow/promote-to-release
 Assignee: (unassigned) = Ubuntu Package Archive Administrators 
(ubuntu-archive)

** Changed in: linux (Ubuntu)
   Status: New = Invalid

** Changed in: linux (Ubuntu Trusty)
   Importance: Undecided = Medium

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1355470

Title:
  linux: 3.13.0-34.59 -proposed tracker

Status in Kernel Development Workflow:
  In Progress
Status in Kernel Development Workflow package-testing series:
  New
Status in Kernel Development Workflow prepare-package series:
  New
Status in Kernel Development Workflow prepare-package-meta series:
  New
Status in Kernel Development Workflow prepare-package-signed series:
  New
Status in Kernel Development Workflow promote-to-release series:
  New
Status in “linux” package in Ubuntu:
  Invalid
Status in “linux” source package in Trusty:
  New

Bug description:
  This bug is for tracking the 3.13.0-34.59 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-Prepare-package-start:Monday, 11. August 2014 22:08 UTC
  kernel-phase-changed:Monday, 11. August 2014 22:08 UTC
  kernel-phase:Prepare

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-development-workflow/+bug/1355470/+subscriptions

-- 

[Kernel-packages] [Bug 1351653] Re: Suspend fails

2014-08-11 Thread khink
I tested with v3.16-utopic, it was the ne on top of the page at ...

Couldn't install linux-headers, got this:

$ sudo dpkg -i linux-*.deb
Selecting previously unselected package linux-headers-3.16.0-031600-generic.
(Reading database ... 373797 files and directories currently installed.)
Preparing to unpack 
linux-headers-3.16.0-031600-generic_3.16.0-031600.201408031935_amd64.deb ...
Unpacking linux-headers-3.16.0-031600-generic (3.16.0-031600.201408031935) ...
Selecting previously unselected package linux-image-3.16.0-031600-generic.
Preparing to unpack 
linux-image-3.16.0-031600-generic_3.16.0-031600.201408031935_amd64.deb ...
Done.
Unpacking linux-image-3.16.0-031600-generic (3.16.0-031600.201408031935) ...
dpkg: dependency problems prevent configuration of 
linux-headers-3.16.0-031600-generic:
 linux-headers-3.16.0-031600-generic depends on linux-headers-3.16.0-031600; 
however:
  Package linux-headers-3.16.0-031600 is not installed.

dpkg: error processing package linux-headers-3.16.0-031600-generic (--install):
 dependency problems - leaving unconfigured
Setting up linux-image-3.16.0-031600-generic (3.16.0-031600.201408031935) ...
Running depmod.
update-initramfs: deferring update (hook will be called later)
Examining /etc/kernel/postinst.d.
run-parts: executing /etc/kernel/postinst.d/apt-auto-removal 
3.16.0-031600-generic /boot/vmlinuz-3.16.0-031600-generic
run-parts: executing /etc/kernel/postinst.d/dkms 3.16.0-031600-generic 
/boot/vmlinuz-3.16.0-031600-generic
Error! Could not locate dkms.conf file.
File:  does not exist.
Error! Bad return status for module build on kernel: 3.16.0-031600-generic 
(x86_64)
Consult /var/lib/dkms/acpi-call/20130623/build/make.log for more information.
Error! Bad return status for module build on kernel: 3.16.0-031600-generic 
(x86_64)
Consult /var/lib/dkms/vboxhost/4.3.10/build/make.log for more information.
Error! Bad return status for module build on kernel: 3.16.0-031600-generic 
(x86_64)
Consult /var/lib/dkms/tp-smapi/0.41/build/make.log for more information.
run-parts: executing /etc/kernel/postinst.d/initramfs-tools 
3.16.0-031600-generic /boot/vmlinuz-3.16.0-031600-generic
update-initramfs: Generating /boot/initrd.img-3.16.0-031600-generic
run-parts: executing /etc/kernel/postinst.d/pm-utils 3.16.0-031600-generic 
/boot/vmlinuz-3.16.0-031600-generic
run-parts: executing /etc/kernel/postinst.d/update-notifier 
3.16.0-031600-generic /boot/vmlinuz-3.16.0-031600-generic
run-parts: executing /etc/kernel/postinst.d/zz-update-grub 
3.16.0-031600-generic /boot/vmlinuz-3.16.0-031600-generic
Generating grub configuration file ...
Warning: Setting GRUB_TIMEOUT to a non-zero value when GRUB_HIDDEN_TIMEOUT is 
set is no longer supported.
Found linux image: /boot/vmlinuz-3.16.0-031600-generic
Found initrd image: /boot/initrd.img-3.16.0-031600-generic
Found linux image: /boot/vmlinuz-3.13.0-32-generic
Found initrd image: /boot/initrd.img-3.13.0-32-generic
Found linux image: /boot/vmlinuz-3.13.0-30-generic
Found initrd image: /boot/initrd.img-3.13.0-30-generic
done
Errors were encountered while processing:
 linux-headers-3.16.0-031600-generic

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1351653

Title:
  Suspend fails

Status in “linux” package in Ubuntu:
  Incomplete

Bug description:
  When suspending the machine (clicking cogwheel in upper right corner):
  * the computer starts doing what it does before suspending
  * the screen goes black (which is the way it used to be)
  * some message about failure is displayed briefly, and i get the login screen.

  The attached (i believe) syslog shows the error, it's:

  Aug  2 19:17:05 zeno kernel: [58750.458713] PM: Entering mem sleep
  Aug  2 19:17:05 zeno kernel: [58750.458759] Suspending console(s) (use 
no_console_suspend to debug)
  Aug  2 19:17:05 zeno kernel: [58750.458936] sd 2:0:0:0: [sdb] Synchronizing 
SCSI cache
  Aug  2 19:17:05 zeno kernel: [58750.458946] sd 0:0:0:0: [sda] Synchronizing 
SCSI cache
  Aug  2 19:17:05 zeno kernel: [58750.458982] sd 2:0:0:0: [sdb] Stopping disk
  Aug  2 19:17:05 zeno kernel: [58750.459063] sd 0:0:0:0: [sda] Stopping disk
  Aug  2 19:17:05 zeno kernel: [58750.895746] nouveau  [ DRM] suspending 
display...
  Aug  2 19:17:05 zeno kernel: [58750.895768] nouveau  [ DRM] unpinning 
framebuffer(s)...
  Aug  2 19:17:05 zeno kernel: [58750.895776] nouveau  [ DRM] evicting 
buffers...
  Aug  2 19:17:05 zeno kernel: [58750.895777] nouveau  [ DRM] waiting for 
kernel channels to go idle...
  Aug  2 19:17:05 zeno kernel: [58750.895824] nouveau  [ DRM] suspending 
client object trees...
  Aug  2 19:17:05 zeno kernel: [58750.896278] nouveau  [ DRM] suspending 
kernel object tree...
  Aug  2 19:17:05 zeno kernel: [58752.898898] nouveau E[   
PDISP][:01:00.0][0xc000857c][88026d15d300] fini timeout, 0xc2061008
  Aug  2 19:17:05 zeno kernel: [58752.898900] 

[Kernel-packages] [Bug 1351653] Re: Suspend fails

2014-08-11 Thread khink
But the kernel itself is installed:
$ uname -a
Linux zeno 3.16.0-031600-generic #201408031935 SMP Sun Aug 3 23:36:11 UTC 2014 
x86_64 x86_64 x86_64 GNU/Linux

Suspend gives the same error, so i tagged it as kernel-bug-exists-
upstream-3.16.0:

Aug 12 00:29:01 zeno kernel: [   57.354813] nouveau  [ DRM] suspending 
display...
Aug 12 00:29:01 zeno kernel: [   57.354818] nouveau  [ DRM] unpinning 
framebuffer(s)...
Aug 12 00:29:01 zeno kernel: [   57.354843] nouveau  [ DRM] evicting 
buffers...
Aug 12 00:29:01 zeno kernel: [   57.367662] nouveau  [ DRM] waiting for 
kernel channels to go idle...
Aug 12 00:29:01 zeno kernel: [   57.367689] nouveau  [ DRM] suspending 
client object trees...
Aug 12 00:29:01 zeno kernel: [   57.367935] nouveau  [ DRM] suspending 
kernel object tree...
Aug 12 00:29:01 zeno kernel: [   59.370367] nouveau E[   
PDISP][:01:00.0][0xc000857c][880269c7a680] fini timeout, 0xc2061008
Aug 12 00:29:01 zeno kernel: [   59.370369] nouveau E[   
PDISP][:01:00.0][0xc000857c][880269c7a680] failed suspend, -16
Aug 12 00:29:01 zeno kernel: [   59.370370] nouveau E[ DRM] 
0xd150:0xd15c7c00 suspend failed with -16
Aug 12 00:29:01 zeno kernel: [   59.370401] nouveau E[ DRM] 
0x:0xd150 suspend failed with -16
Aug 12 00:29:01 zeno kernel: [   59.370495] nouveau E[ DRM] 
0x:0x suspend failed with -16
Aug 12 00:29:01 zeno kernel: [   59.370985] nouveau E[ DRM] 
0x:0x suspend failed with -16
Aug 12 00:29:01 zeno kernel: [   59.371019] nouveau  [ DRM] resuming 
display...
Aug 12 00:29:01 zeno kernel: [   59.406048] pci_pm_suspend(): 
nouveau_pmops_suspend+0x0/0xc0 [nouveau] returns -16
Aug 12 00:29:01 zeno kernel: [   59.406051] dpm_run_callback(): 
pci_pm_suspend+0x0/0x140 returns -16
Aug 12 00:29:01 zeno kernel: [   59.406053] PM: Device :01:00.0 failed to 
suspend async: error -16
Aug 12 00:29:01 zeno kernel: [   59.406097] PM: Some devices failed to suspend, 
or early wake event detected


** Tags added: kernel-bug-exists-upstream-3.16.0

** Changed in: linux (Ubuntu)
   Status: Incomplete = Confirmed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1351653

Title:
  Suspend fails

Status in “linux” package in Ubuntu:
  Confirmed

Bug description:
  When suspending the machine (clicking cogwheel in upper right corner):
  * the computer starts doing what it does before suspending
  * the screen goes black (which is the way it used to be)
  * some message about failure is displayed briefly, and i get the login screen.

  The attached (i believe) syslog shows the error, it's:

  Aug  2 19:17:05 zeno kernel: [58750.458713] PM: Entering mem sleep
  Aug  2 19:17:05 zeno kernel: [58750.458759] Suspending console(s) (use 
no_console_suspend to debug)
  Aug  2 19:17:05 zeno kernel: [58750.458936] sd 2:0:0:0: [sdb] Synchronizing 
SCSI cache
  Aug  2 19:17:05 zeno kernel: [58750.458946] sd 0:0:0:0: [sda] Synchronizing 
SCSI cache
  Aug  2 19:17:05 zeno kernel: [58750.458982] sd 2:0:0:0: [sdb] Stopping disk
  Aug  2 19:17:05 zeno kernel: [58750.459063] sd 0:0:0:0: [sda] Stopping disk
  Aug  2 19:17:05 zeno kernel: [58750.895746] nouveau  [ DRM] suspending 
display...
  Aug  2 19:17:05 zeno kernel: [58750.895768] nouveau  [ DRM] unpinning 
framebuffer(s)...
  Aug  2 19:17:05 zeno kernel: [58750.895776] nouveau  [ DRM] evicting 
buffers...
  Aug  2 19:17:05 zeno kernel: [58750.895777] nouveau  [ DRM] waiting for 
kernel channels to go idle...
  Aug  2 19:17:05 zeno kernel: [58750.895824] nouveau  [ DRM] suspending 
client object trees...
  Aug  2 19:17:05 zeno kernel: [58750.896278] nouveau  [ DRM] suspending 
kernel object tree...
  Aug  2 19:17:05 zeno kernel: [58752.898898] nouveau E[   
PDISP][:01:00.0][0xc000857c][88026d15d300] fini timeout, 0xc2061008
  Aug  2 19:17:05 zeno kernel: [58752.898900] nouveau E[   
PDISP][:01:00.0][0xc000857c][88026d15d300] failed suspend, -16
  Aug  2 19:17:05 zeno kernel: [58752.898901] nouveau E[ DRM] 
0xd150:0xd15c7c00 suspend failed with -16
  Aug  2 19:17:05 zeno kernel: [58752.898919] nouveau E[ DRM] 
0x:0xd150 suspend failed with -16
  Aug  2 19:17:05 zeno kernel: [58752.899009] nouveau E[ DRM] 
0x:0x suspend failed with -16
  Aug  2 19:17:05 zeno kernel: [58752.899648] nouveau E[ DRM] 
0x:0x suspend failed with -16
  Aug  2 19:17:05 zeno kernel: [58752.899748] nouveau  [ DRM] resuming 
display...
  Aug  2 19:17:05 zeno kernel: [58752.899767] nouveau E[ DRM] bo 
88026c624000 pinned elsewhere: 0x0002 vs 0x0004
  Aug  2 19:17:05 zeno kernel: [58752.899768] 
[drm:drm_helper_resume_force_mode] *ERROR* failed to set mode on crtc 
88027256a000
  Aug  2 19:17:05 zeno kernel: [58752.907842] pci_pm_suspend(): 

[Kernel-packages] [Bug 1349897] Update Released

2014-08-11 Thread Adam Conrad
The verification of the Stable Release Update for linux has completed
successfully and the package has now been released to -updates.
Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report.  In
the event that you encounter a regression using the package from
-updates please report a new bug using ubuntu-bug and tag the bug report
regression-update so we can easily find any regressions.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1349897

Title:
  linux: 3.13.0-33.58 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow package-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Fix Released
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Confirmed
Status in Kernel SRU Workflow security-signoff series:
  In Progress
Status in Kernel SRU Workflow verification-testing series:
  In Progress
Status in “linux” package in Ubuntu:
  Invalid
Status in “linux” source package in Trusty:
  Fix Released

Bug description:
  This bug is for tracking the 3.13.0-33.58 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 29. July 2014 15:09 UTC
  kernel-stable-Prepare-package-end:Wednesday, 30. July 2014 21:05 UTC
  kernel-stable-Promote-to-proposed-start:Wednesday, 30. July 2014 21:05 UTC
  ppa-package-testing-start:Wednesday, 30. July 2014 21:05 UTC
  kernel-stable-Promote-to-proposed-end:Friday, 08. August 2014 22:00 UTC
  kernel-stable-phase:Verification  Testing
  kernel-stable-phase-changed:Friday, 08. August 2014 23:01 UTC
  kernel-stable-Verification-testing-start:Friday, 08. August 2014 23:01 UTC
  kernel-stable-Certification-testing-start:Friday, 08. August 2014 23:01 UTC
  kernel-stable-Security-signoff-start:Friday, 08. August 2014 23:01 UTC
  kernel-stable-Regression-testing-start:Friday, 08. August 2014 23:01 UTC
  kernel-stable-Certification-testing-end:Monday, 11. August 2014 20:00 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1349897/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1347088] Update Released

2014-08-11 Thread Adam Conrad
The verification of the Stable Release Update for linux-lts-trusty has
completed successfully and the package has now been released to
-updates.  Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report.  In
the event that you encounter a regression using the package from
-updates please report a new bug using ubuntu-bug and tag the bug report
regression-update so we can easily find any regressions.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1347088

Title:
  Trusty update to 3.13.11.5 stable release

Status in “linux” package in Ubuntu:
  Confirmed
Status in “linux” source package in Trusty:
  Fix Released

Bug description:
  SRU Justification

  Impact:
     The upstream process for stable tree updates is quite similar
     in scope to the Ubuntu SRU process, e.g., each patch has to
     demonstrably fix a bug, and each patch is vetted by upstream
     by originating either directly from Linus' tree or in a minimally
     backported form of that patch. The 3.13.11.5 upstream stable
     patch set is now available. It should be included in the Ubuntu
     kernel as well.

     git://git.kernel.org/

  TEST CASE: TBD

     The following patches are in the 3.13.11.5 stable release:
  Linux 3.13.11.5
  iscsi-target: fix iscsit_del_np deadlock on unload
  iscsi-target: Avoid rejecting incorrect ITT for Data-Out
  lz4: fix another possible overrun
  efi-pstore: Fix an overflow on 32-bit builds
  iscsi-target: Explicily clear login response PDU in exception 
path
  target: Fix left-over se_lun-lun_sep pointer OOPs
  ALSA: hda - restore BCLK M/N values when resuming HSW/BDW 
display controller
  MIPS: MSC: Prevent out-of-bounds writes to MIPS SC ioremap'd 
region
  recordmcount/MIPS: Fix possible incorrect mcount_loc table 
entries in modules
  ALSA: usb-audio: Fix races at disconnection and PCM closing
  net: allwinner: emac: Add missing free_irq
  powerpc: Don't skip ePAPR spin-table CPUs
  nfs: Fix cache_validity check in nfs_write_pageuptodate()
  aio: fix kernel memory disclosure in io_getevents() 
introduced in v3.10
  aio: fix aio request leak when events are reaped by userspace
  [CIFS] fix mount failure with broken pathnames when smb3 
mount with mapchars option
  drm/i915: Hold the table lock whilst walking the file's idr 
and counting the objects in debugfs
  mm: fix crashes from mbind() merging vmas
  DMA, CMA: fix possible memory leak
  mm, pcp: allow restoring percpu_pagelist_fraction default
  kernel/watchdog.c: remove preemption restrictions when 
restarting lockup detector
  hugetlb: fix copy_hugetlb_page_range() to handle 
migration/hwpoisoned entry
  x86_32, entry: Do syscall exit work on badsys (CVE-2014-4508)
  lz4: ensure length does not wrap
  lzo: properly check for overruns
  ALSA: hda - hdmi: call overridden init on resume
  rbd: handle parent_overlap on writes correctly
  blkcg: fix use-after-free in __blkg_release_rcu() by making 
blkcg_gq refcnt an atomic_t
  rt2x00: fix rfkill regression on rt2500pci
  b43: fix frequency reported on G-PHY with /new/ firmware
  rt2x00: disable TKIP on USB
  Bluetooth: Allow change security level on ATT_CID in slave 
role
  Bluetooth: Fix locking of hdev when calling into SMP code
  Bluetooth: Fix indicating discovery state when canceling 
inquiry
  Bluetooth: Fix setting correct authentication information for 
SMP STK
  Bluetooth: Fix SSP acceptor just-works confirmation without 
MITM
  ALSA: control: Make sure that id-index does not overflow
  ALSA: control: Handle numid overflow
  ALSA: control: Don't access controls outside of protected 
regions
  ALSA: control: Fix replacing user controls
  ALSA: control: Protect user controls against concurrent access
  arm64/dma: Removing ARCH_HAS_DMA_GET_REQUIRED_MASK macro
  arm64: ptrace: fix empty registers set in prstatus of aarch32 
process core
  arm64: uid16: fix __kernel_old_{gid,uid}_t definitions
  arm64: ptrace: change fs when passing kernel pointer to 
regset code
  arm64: Bug fix in stack alignment exception
  USB: 

[Kernel-packages] [Bug 1331219] Re: Kernel Bug at skb_segment + 0x95a

2014-08-11 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.13.0-33.58

---
linux (3.13.0-33.58) trusty; urgency=low

  [ Brad Figg ]

  * Release Tracking Bug
- LP: #1349897

  [ Upstream Kernel Changes ]

  * mm: numa: do not automatically migrate KSM pages
- LP: #1346917
  * net: fix UDP tunnel GSO of frag_list GRO packets
- LP: #1331219
  * auditsc: audit_krule mask accesses need bounds checking
- LP: #1347088
  * n_tty: Fix buffer overruns with larger-than-4k pastes
- LP: #1208740
 -- Tim Gardner tim.gard...@canonical.com   Fri, 18 Jul 2014 14:57:50 +

** Changed in: linux (Ubuntu Trusty)
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1331219

Title:
  Kernel Bug at skb_segment + 0x95a

Status in “linux” package in Ubuntu:
  Fix Released
Status in “linux” source package in Trusty:
  Fix Released
Status in “linux” source package in Utopic:
  Fix Released

Bug description:
  SRU Justification:
  Impact: A crash occurs with VXLAN packets when using GSO capable hardware 
such as the case with openstack neutron.

  Fix: Upstream fix 5882a07c7 fixes a locking error that previously allowed
  certain timings to hit this bug.

  Testcase: Create and run a Neutron gateway with VXLANs, and stress the
  network for an extended period of time.

  
  Kernel Bug affects 3.11-3.15 on machines using gso offload.

  Stack trace
  [ 871.025524] [ cut here ]
  [ 871.030742] kernel BUG at /build/buildd/linux-3.13.0/net/core/skbuff.c:2903!
  [ 871.038669] invalid opcode:  [#1] SMP
  [ 871.043318] Modules linked in: xt_nat xt_REDIRECT dccp_diag dccp tcp_diag 
udp_diag inet_diag unix_diag ipt_MASQUERADE iptable_nat nf_nat_ipv4 nf_nat 
nf_conntrack_ipv4 nf_defrag_ipv4 xt_conn
  track nf_conntrack ipt_REJECT xt_CHECKSUM iptable_mangle xt_tcpudp bridge 
ip6table_filter ip6_tables iptable_filter ip_tables ebtable_nat ebtables 
x_tables veth openvswitch gre vxlan ip_tunnel
   dm_crypt 8021q garp stp mrp llc bonding nfsd auth_rpcgss nfs_acl nfs lockd 
sunrpc fscache sb_edac gpio_ich joydev edac_core x86_pkg_temp_thermal 
intel_powerclamp coretemp lpc_ich acpi_power_m
  eter kvm_intel kvm crct10dif_pclmul crc32_pclmul ghash_clmulni_intel 
aesni_intel aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd ipmi_si 
mac_hid lp parport btrfs xor raid6_pq libcrc32c
  hid_generic qla2xxx fnic libfcoe megaraid_sas
  [ 871.124025] igb usbhid libfc hid dca scsi_transport_fc ptp enic scsi_tgt 
pps_core i2c_algo_bit wmi
  [ 871.132967] CPU: 7 PID: 0 Comm: swapper/7 Not tainted 3.13.0-29-generic 
#53-Ubuntu
  [ 871.141500] Hardware name: Cisco Systems Inc UCSC-C220-M3S/UCSC-C220-M3S, 
BIOS C220M3.1.5.4f.0.111320130449 11/13/2013
  [ 871.153541] task: 881fd2d117f0 ti: 881fd2d18000 task.ti: 
881fd2d18000
  [ 871.161975] RIP: 0010:[81612a6a] [81612a6a] 
skb_segment+0x95a/0x980
  [ 871.171124] RSP: 0018:881fffce3498 EFLAGS: 00010206
  [ 871.177099] RAX:  RBX: 881fb8929700 RCX: 
881fcfba32f0
  [ 871.185120] RDX: 0050 RSI: 881fcfba3200 RDI: 
881fcfba2200
  [ 871.193140] RBP: 881fffce3560 R08: 0042 R09: 

  [ 871.201160] R10: 881fb8929e00 R11: 05ea R12: 
881fcfba22f0
  [ 871.209171] R13:  R14: 881fd09a8400 R15: 
0050
  [ 871.217191] FS: () GS:881fffce() 
knlGS:
  [ 871.226307] CS: 0010 DS:  ES:  CR0: 80050033
  [ 871.232772] CR2: 7fbd1ccb4000 CR3: 01c0e000 CR4: 
001407e0
  [ 871.240793] Stack:
  [ 871.243079]   0042 
ffbe
  [ 871.251470] 000105ea 0040 881fb8929e00 
0001
  [ 871.259864] ffce 0074 003205a8 
881fb8929700
  [ 871.268257] Call Trace:
  [ 871.271032] IRQ
  [ 871.273193]
  [ 871.274913] [8167cfbd] tcp_gso_segment+0x10d/0x3f0
  [ 871.279926] [a03740f0] ? vxlan_set_owner+0x60/0x60 [vxlan]
  [ 871.287178] [8168d422] inet_gso_segment+0x132/0x360
  [ 871.293749] [a045c701] ? bond_mode_name+0x21/0x30 [bonding]
  [ 871.301097] [8161fdac] skb_mac_gso_segment+0x9c/0x180
  [ 871.307858] [816840d7] skb_udp_tunnel_segment+0xd7/0x390
  [ 871.314906] [816847f0] udp4_ufo_fragment+0x120/0x130
  [ 871.321566] [8168d422] inet_gso_segment+0x132/0x360
  [ 871.328132] [a0563f67] ? ipt_do_table+0x317/0x6aa [ip_tables]
  [ 871.335669] [a05a3500] ? 
nf_conntrack_hash_check_insert+0x280/0x2e0 [nf_conntrack]
  [ 871.345268] [8161fdac] skb_mac_gso_segment+0x9c/0x180
  [ 871.352026] [8161feed] __skb_gso_segment+0x5d/0xb0
  [ 871.358494] [816201fa] dev_hard_start_xmit+0x18a/0x560
  [ 871.365351] 

[Kernel-packages] [Bug 1346917] Update Released

2014-08-11 Thread Adam Conrad
The verification of the Stable Release Update for linux-lts-trusty has
completed successfully and the package has now been released to
-updates.  Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report.  In
the event that you encounter a regression using the package from
-updates please report a new bug using ubuntu-bug and tag the bug report
regression-update so we can easily find any regressions.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1346917

Title:
  Using KSM on NUMA capable machines can cause KVM guest performance and
  stability issues

Status in “linux” package in Ubuntu:
  Fix Released
Status in “linux” source package in Trusty:
  Fix Released

Bug description:
  [Impact]

  When using KVM on NUMA machines, both Linux and Windows guests can
  exhibit very poor performance and potential crashes. Disabling KSM is
  a known workaround to fix this issue.

  [Fix]

  The following patch fixes the issue in our testing:
  
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=64a9a34e22896dad430e21a28ad8cb00a756fefc

  This patch is present in v3.14-rc1 and onwards.

  [Test Case]

  General test case:
  1) On a NUMA capable machine, setup the machine as a KVM hypervisor
    - lscpu should show more than 1 NUMA node
  2) Install 4 KVM VMs
  3) Run the following in another terminal to ensure that pages_shared and 
pages_sharing is increasing
   - watch 'tail /sys/kernel/mm/ksm/*'
  4) In another terminal run a program that continually pings each node and 
alerts on high latencies

  What we've observed is that in Linux guests, the ping latencies can go
  into the ~2 second range for a few pings, then return back to the 
  1ms range. (This is machine dependent.) In addition, occasionally when
  running this test with Windows guests we observe BSODs during this
  test.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1346917/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1346917] Re: Using KSM on NUMA capable machines can cause KVM guest performance and stability issues

2014-08-11 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.13.0-33.58

---
linux (3.13.0-33.58) trusty; urgency=low

  [ Brad Figg ]

  * Release Tracking Bug
- LP: #1349897

  [ Upstream Kernel Changes ]

  * mm: numa: do not automatically migrate KSM pages
- LP: #1346917
  * net: fix UDP tunnel GSO of frag_list GRO packets
- LP: #1331219
  * auditsc: audit_krule mask accesses need bounds checking
- LP: #1347088
  * n_tty: Fix buffer overruns with larger-than-4k pastes
- LP: #1208740
 -- Tim Gardner tim.gard...@canonical.com   Fri, 18 Jul 2014 14:57:50 +

** Changed in: linux (Ubuntu Trusty)
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1346917

Title:
  Using KSM on NUMA capable machines can cause KVM guest performance and
  stability issues

Status in “linux” package in Ubuntu:
  Fix Released
Status in “linux” source package in Trusty:
  Fix Released

Bug description:
  [Impact]

  When using KVM on NUMA machines, both Linux and Windows guests can
  exhibit very poor performance and potential crashes. Disabling KSM is
  a known workaround to fix this issue.

  [Fix]

  The following patch fixes the issue in our testing:
  
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=64a9a34e22896dad430e21a28ad8cb00a756fefc

  This patch is present in v3.14-rc1 and onwards.

  [Test Case]

  General test case:
  1) On a NUMA capable machine, setup the machine as a KVM hypervisor
    - lscpu should show more than 1 NUMA node
  2) Install 4 KVM VMs
  3) Run the following in another terminal to ensure that pages_shared and 
pages_sharing is increasing
   - watch 'tail /sys/kernel/mm/ksm/*'
  4) In another terminal run a program that continually pings each node and 
alerts on high latencies

  What we've observed is that in Linux guests, the ping latencies can go
  into the ~2 second range for a few pings, then return back to the 
  1ms range. (This is machine dependent.) In addition, occasionally when
  running this test with Windows guests we observe BSODs during this
  test.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1346917/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1349897] Re: linux: 3.13.0-33.58 -proposed tracker

2014-08-11 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.13.0-33.58

---
linux (3.13.0-33.58) trusty; urgency=low

  [ Brad Figg ]

  * Release Tracking Bug
- LP: #1349897

  [ Upstream Kernel Changes ]

  * mm: numa: do not automatically migrate KSM pages
- LP: #1346917
  * net: fix UDP tunnel GSO of frag_list GRO packets
- LP: #1331219
  * auditsc: audit_krule mask accesses need bounds checking
- LP: #1347088
  * n_tty: Fix buffer overruns with larger-than-4k pastes
- LP: #1208740
 -- Tim Gardner tim.gard...@canonical.com   Fri, 18 Jul 2014 14:57:50 +

** Changed in: linux (Ubuntu Trusty)
   Status: New = Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1349897

Title:
  linux: 3.13.0-33.58 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow package-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Fix Released
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Confirmed
Status in Kernel SRU Workflow security-signoff series:
  In Progress
Status in Kernel SRU Workflow verification-testing series:
  In Progress
Status in “linux” package in Ubuntu:
  Invalid
Status in “linux” source package in Trusty:
  Fix Released

Bug description:
  This bug is for tracking the 3.13.0-33.58 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 29. July 2014 15:09 UTC
  kernel-stable-Prepare-package-end:Wednesday, 30. July 2014 21:05 UTC
  kernel-stable-Promote-to-proposed-start:Wednesday, 30. July 2014 21:05 UTC
  ppa-package-testing-start:Wednesday, 30. July 2014 21:05 UTC
  kernel-stable-Promote-to-proposed-end:Friday, 08. August 2014 22:00 UTC
  kernel-stable-phase:Verification  Testing
  kernel-stable-phase-changed:Friday, 08. August 2014 23:01 UTC
  kernel-stable-Verification-testing-start:Friday, 08. August 2014 23:01 UTC
  kernel-stable-Certification-testing-start:Friday, 08. August 2014 23:01 UTC
  kernel-stable-Security-signoff-start:Friday, 08. August 2014 23:01 UTC
  kernel-stable-Regression-testing-start:Friday, 08. August 2014 23:01 UTC
  kernel-stable-Certification-testing-end:Monday, 11. August 2014 20:00 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1349897/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1331219] Update Released

2014-08-11 Thread Adam Conrad
The verification of the Stable Release Update for linux-lts-trusty has
completed successfully and the package has now been released to
-updates.  Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report.  In
the event that you encounter a regression using the package from
-updates please report a new bug using ubuntu-bug and tag the bug report
regression-update so we can easily find any regressions.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1331219

Title:
  Kernel Bug at skb_segment + 0x95a

Status in “linux” package in Ubuntu:
  Fix Released
Status in “linux” source package in Trusty:
  Fix Released
Status in “linux” source package in Utopic:
  Fix Released

Bug description:
  SRU Justification:
  Impact: A crash occurs with VXLAN packets when using GSO capable hardware 
such as the case with openstack neutron.

  Fix: Upstream fix 5882a07c7 fixes a locking error that previously allowed
  certain timings to hit this bug.

  Testcase: Create and run a Neutron gateway with VXLANs, and stress the
  network for an extended period of time.

  
  Kernel Bug affects 3.11-3.15 on machines using gso offload.

  Stack trace
  [ 871.025524] [ cut here ]
  [ 871.030742] kernel BUG at /build/buildd/linux-3.13.0/net/core/skbuff.c:2903!
  [ 871.038669] invalid opcode:  [#1] SMP
  [ 871.043318] Modules linked in: xt_nat xt_REDIRECT dccp_diag dccp tcp_diag 
udp_diag inet_diag unix_diag ipt_MASQUERADE iptable_nat nf_nat_ipv4 nf_nat 
nf_conntrack_ipv4 nf_defrag_ipv4 xt_conn
  track nf_conntrack ipt_REJECT xt_CHECKSUM iptable_mangle xt_tcpudp bridge 
ip6table_filter ip6_tables iptable_filter ip_tables ebtable_nat ebtables 
x_tables veth openvswitch gre vxlan ip_tunnel
   dm_crypt 8021q garp stp mrp llc bonding nfsd auth_rpcgss nfs_acl nfs lockd 
sunrpc fscache sb_edac gpio_ich joydev edac_core x86_pkg_temp_thermal 
intel_powerclamp coretemp lpc_ich acpi_power_m
  eter kvm_intel kvm crct10dif_pclmul crc32_pclmul ghash_clmulni_intel 
aesni_intel aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd ipmi_si 
mac_hid lp parport btrfs xor raid6_pq libcrc32c
  hid_generic qla2xxx fnic libfcoe megaraid_sas
  [ 871.124025] igb usbhid libfc hid dca scsi_transport_fc ptp enic scsi_tgt 
pps_core i2c_algo_bit wmi
  [ 871.132967] CPU: 7 PID: 0 Comm: swapper/7 Not tainted 3.13.0-29-generic 
#53-Ubuntu
  [ 871.141500] Hardware name: Cisco Systems Inc UCSC-C220-M3S/UCSC-C220-M3S, 
BIOS C220M3.1.5.4f.0.111320130449 11/13/2013
  [ 871.153541] task: 881fd2d117f0 ti: 881fd2d18000 task.ti: 
881fd2d18000
  [ 871.161975] RIP: 0010:[81612a6a] [81612a6a] 
skb_segment+0x95a/0x980
  [ 871.171124] RSP: 0018:881fffce3498 EFLAGS: 00010206
  [ 871.177099] RAX:  RBX: 881fb8929700 RCX: 
881fcfba32f0
  [ 871.185120] RDX: 0050 RSI: 881fcfba3200 RDI: 
881fcfba2200
  [ 871.193140] RBP: 881fffce3560 R08: 0042 R09: 

  [ 871.201160] R10: 881fb8929e00 R11: 05ea R12: 
881fcfba22f0
  [ 871.209171] R13:  R14: 881fd09a8400 R15: 
0050
  [ 871.217191] FS: () GS:881fffce() 
knlGS:
  [ 871.226307] CS: 0010 DS:  ES:  CR0: 80050033
  [ 871.232772] CR2: 7fbd1ccb4000 CR3: 01c0e000 CR4: 
001407e0
  [ 871.240793] Stack:
  [ 871.243079]   0042 
ffbe
  [ 871.251470] 000105ea 0040 881fb8929e00 
0001
  [ 871.259864] ffce 0074 003205a8 
881fb8929700
  [ 871.268257] Call Trace:
  [ 871.271032] IRQ
  [ 871.273193]
  [ 871.274913] [8167cfbd] tcp_gso_segment+0x10d/0x3f0
  [ 871.279926] [a03740f0] ? vxlan_set_owner+0x60/0x60 [vxlan]
  [ 871.287178] [8168d422] inet_gso_segment+0x132/0x360
  [ 871.293749] [a045c701] ? bond_mode_name+0x21/0x30 [bonding]
  [ 871.301097] [8161fdac] skb_mac_gso_segment+0x9c/0x180
  [ 871.307858] [816840d7] skb_udp_tunnel_segment+0xd7/0x390
  [ 871.314906] [816847f0] udp4_ufo_fragment+0x120/0x130
  [ 871.321566] [8168d422] inet_gso_segment+0x132/0x360
  [ 871.328132] [a0563f67] ? ipt_do_table+0x317/0x6aa [ip_tables]
  [ 871.335669] [a05a3500] ? 
nf_conntrack_hash_check_insert+0x280/0x2e0 [nf_conntrack]
  [ 871.345268] [8161fdac] skb_mac_gso_segment+0x9c/0x180
  [ 871.352026] [8161feed] __skb_gso_segment+0x5d/0xb0
  [ 871.358494] [816201fa] dev_hard_start_xmit+0x18a/0x560
  [ 871.365351] [816208e8] __dev_queue_xmit+0x318/0x500
  [ 871.371910] [a05c0238] ? ipv4_confirm+0x78/0x100 
[nf_conntrack_ipv4]
  [ 871.380156] [8163e03b] ? eth_header+0x2b/0xd0
  [ 

[Kernel-packages] [Bug 1347088] Re: Trusty update to 3.13.11.5 stable release

2014-08-11 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.13.0-33.58

---
linux (3.13.0-33.58) trusty; urgency=low

  [ Brad Figg ]

  * Release Tracking Bug
- LP: #1349897

  [ Upstream Kernel Changes ]

  * mm: numa: do not automatically migrate KSM pages
- LP: #1346917
  * net: fix UDP tunnel GSO of frag_list GRO packets
- LP: #1331219
  * auditsc: audit_krule mask accesses need bounds checking
- LP: #1347088
  * n_tty: Fix buffer overruns with larger-than-4k pastes
- LP: #1208740
 -- Tim Gardner tim.gard...@canonical.com   Fri, 18 Jul 2014 14:57:50 +

** Changed in: linux (Ubuntu Trusty)
   Status: Confirmed = Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1347088

Title:
  Trusty update to 3.13.11.5 stable release

Status in “linux” package in Ubuntu:
  Confirmed
Status in “linux” source package in Trusty:
  Fix Released

Bug description:
  SRU Justification

  Impact:
     The upstream process for stable tree updates is quite similar
     in scope to the Ubuntu SRU process, e.g., each patch has to
     demonstrably fix a bug, and each patch is vetted by upstream
     by originating either directly from Linus' tree or in a minimally
     backported form of that patch. The 3.13.11.5 upstream stable
     patch set is now available. It should be included in the Ubuntu
     kernel as well.

     git://git.kernel.org/

  TEST CASE: TBD

     The following patches are in the 3.13.11.5 stable release:
  Linux 3.13.11.5
  iscsi-target: fix iscsit_del_np deadlock on unload
  iscsi-target: Avoid rejecting incorrect ITT for Data-Out
  lz4: fix another possible overrun
  efi-pstore: Fix an overflow on 32-bit builds
  iscsi-target: Explicily clear login response PDU in exception 
path
  target: Fix left-over se_lun-lun_sep pointer OOPs
  ALSA: hda - restore BCLK M/N values when resuming HSW/BDW 
display controller
  MIPS: MSC: Prevent out-of-bounds writes to MIPS SC ioremap'd 
region
  recordmcount/MIPS: Fix possible incorrect mcount_loc table 
entries in modules
  ALSA: usb-audio: Fix races at disconnection and PCM closing
  net: allwinner: emac: Add missing free_irq
  powerpc: Don't skip ePAPR spin-table CPUs
  nfs: Fix cache_validity check in nfs_write_pageuptodate()
  aio: fix kernel memory disclosure in io_getevents() 
introduced in v3.10
  aio: fix aio request leak when events are reaped by userspace
  [CIFS] fix mount failure with broken pathnames when smb3 
mount with mapchars option
  drm/i915: Hold the table lock whilst walking the file's idr 
and counting the objects in debugfs
  mm: fix crashes from mbind() merging vmas
  DMA, CMA: fix possible memory leak
  mm, pcp: allow restoring percpu_pagelist_fraction default
  kernel/watchdog.c: remove preemption restrictions when 
restarting lockup detector
  hugetlb: fix copy_hugetlb_page_range() to handle 
migration/hwpoisoned entry
  x86_32, entry: Do syscall exit work on badsys (CVE-2014-4508)
  lz4: ensure length does not wrap
  lzo: properly check for overruns
  ALSA: hda - hdmi: call overridden init on resume
  rbd: handle parent_overlap on writes correctly
  blkcg: fix use-after-free in __blkg_release_rcu() by making 
blkcg_gq refcnt an atomic_t
  rt2x00: fix rfkill regression on rt2500pci
  b43: fix frequency reported on G-PHY with /new/ firmware
  rt2x00: disable TKIP on USB
  Bluetooth: Allow change security level on ATT_CID in slave 
role
  Bluetooth: Fix locking of hdev when calling into SMP code
  Bluetooth: Fix indicating discovery state when canceling 
inquiry
  Bluetooth: Fix setting correct authentication information for 
SMP STK
  Bluetooth: Fix SSP acceptor just-works confirmation without 
MITM
  ALSA: control: Make sure that id-index does not overflow
  ALSA: control: Handle numid overflow
  ALSA: control: Don't access controls outside of protected 
regions
  ALSA: control: Fix replacing user controls
  ALSA: control: Protect user controls against concurrent access
  arm64/dma: Removing ARCH_HAS_DMA_GET_REQUIRED_MASK macro
  arm64: ptrace: fix empty registers set in prstatus of aarch32 
process core
  arm64: uid16: fix __kernel_old_{gid,uid}_t 

[Kernel-packages] [Bug 1208740] Re: Large pastes into readline enabled programs causes breakage from kernels v2.6.31 onwards

2014-08-11 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.13.0-33.58

---
linux (3.13.0-33.58) trusty; urgency=low

  [ Brad Figg ]

  * Release Tracking Bug
- LP: #1349897

  [ Upstream Kernel Changes ]

  * mm: numa: do not automatically migrate KSM pages
- LP: #1346917
  * net: fix UDP tunnel GSO of frag_list GRO packets
- LP: #1331219
  * auditsc: audit_krule mask accesses need bounds checking
- LP: #1347088
  * n_tty: Fix buffer overruns with larger-than-4k pastes
- LP: #1208740
 -- Tim Gardner tim.gard...@canonical.com   Fri, 18 Jul 2014 14:57:50 +

** Changed in: linux (Ubuntu Trusty)
   Status: Fix Committed = Fix Released

** Changed in: linux (Ubuntu Trusty)
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1208740

Title:
  Large pastes into readline enabled programs causes breakage from
  kernels v2.6.31 onwards

Status in “linux” package in Ubuntu:
  Fix Released
Status in “linux” source package in Precise:
  Fix Released
Status in “linux” source package in Quantal:
  Fix Released
Status in “linux” source package in Raring:
  Fix Released
Status in “linux” source package in Saucy:
  Fix Released
Status in “linux” source package in Trusty:
  Fix Released

Bug description:
  SRU Justification:

  Impact: Large pastes over 4KB in a console may not be pasted
  correctly.

  Fix: A patch was posted here https://lkml.org/lkml/2013/9/3/539, that
  resolves the issue. It is not upstreamed yet, pending additional
  analysis.

  Testcase:
  1. gedit /usr/share/common-licenses/GPL (replace  with blanks)
  2. select all and copy contents
  3. open a terminal type 
  4. paste contents

  If the whole contents are pasted without any errors then we pass.

  Additional Notes:
  While this isn't upstreamed yet, this has already been accepted into Saucy 
and no additional bug reports or regressions have been detected yet. It would 
be useful to continue to monitor the upstream thread, and/or more deeply review 
this patch for potential deadlocks and contribute to the upstream discussion. 

  --

  The bug is described in detail in this mail:
  https://lkml.org/lkml/2013/7/25/205

  This bug affects any readline enabled program, like bash or psql.  A
  large paste is any paste of more than 4kb of data (4kb is the size
  of the kernel buffer for reading from the console).

  As can be found in the lkml thread, the issue is caused by the
  constant change between canonical mode and non-canonical mode, done by
  readline for each line being read.  This change means that when the
  buffer is full, some characters might get lost.

  This has been happening for a long time (starting with kernel
  v2.6.31-rc5), but it was barely noticeable for a while.  Some changes
  done in the way the kernel schedules character reading in v2.6.39-rc1
  made it much more noticeable.  Even the most recent kernels are
  affected.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1208740/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1208740] Update Released

2014-08-11 Thread Adam Conrad
The verification of the Stable Release Update for linux-lts-trusty has
completed successfully and the package has now been released to
-updates.  Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report.  In
the event that you encounter a regression using the package from
-updates please report a new bug using ubuntu-bug and tag the bug report
regression-update so we can easily find any regressions.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1208740

Title:
  Large pastes into readline enabled programs causes breakage from
  kernels v2.6.31 onwards

Status in “linux” package in Ubuntu:
  Fix Released
Status in “linux” source package in Precise:
  Fix Released
Status in “linux” source package in Quantal:
  Fix Released
Status in “linux” source package in Raring:
  Fix Released
Status in “linux” source package in Saucy:
  Fix Released
Status in “linux” source package in Trusty:
  Fix Released

Bug description:
  SRU Justification:

  Impact: Large pastes over 4KB in a console may not be pasted
  correctly.

  Fix: A patch was posted here https://lkml.org/lkml/2013/9/3/539, that
  resolves the issue. It is not upstreamed yet, pending additional
  analysis.

  Testcase:
  1. gedit /usr/share/common-licenses/GPL (replace  with blanks)
  2. select all and copy contents
  3. open a terminal type 
  4. paste contents

  If the whole contents are pasted without any errors then we pass.

  Additional Notes:
  While this isn't upstreamed yet, this has already been accepted into Saucy 
and no additional bug reports or regressions have been detected yet. It would 
be useful to continue to monitor the upstream thread, and/or more deeply review 
this patch for potential deadlocks and contribute to the upstream discussion. 

  --

  The bug is described in detail in this mail:
  https://lkml.org/lkml/2013/7/25/205

  This bug affects any readline enabled program, like bash or psql.  A
  large paste is any paste of more than 4kb of data (4kb is the size
  of the kernel buffer for reading from the console).

  As can be found in the lkml thread, the issue is caused by the
  constant change between canonical mode and non-canonical mode, done by
  readline for each line being read.  This change means that when the
  buffer is full, some characters might get lost.

  This has been happening for a long time (starting with kernel
  v2.6.31-rc5), but it was barely noticeable for a while.  Some changes
  done in the way the kernel schedules character reading in v2.6.39-rc1
  made it much more noticeable.  Even the most recent kernels are
  affected.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1208740/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1208740] Re: Large pastes into readline enabled programs causes breakage from kernels v2.6.31 onwards

2014-08-11 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.13.0-33.58

---
linux (3.13.0-33.58) trusty; urgency=low

  [ Brad Figg ]

  * Release Tracking Bug
- LP: #1349897

  [ Upstream Kernel Changes ]

  * mm: numa: do not automatically migrate KSM pages
- LP: #1346917
  * net: fix UDP tunnel GSO of frag_list GRO packets
- LP: #1331219
  * auditsc: audit_krule mask accesses need bounds checking
- LP: #1347088
  * n_tty: Fix buffer overruns with larger-than-4k pastes
- LP: #1208740
 -- Tim Gardner tim.gard...@canonical.com   Fri, 18 Jul 2014 14:57:50 +

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1208740

Title:
  Large pastes into readline enabled programs causes breakage from
  kernels v2.6.31 onwards

Status in “linux” package in Ubuntu:
  Fix Released
Status in “linux” source package in Precise:
  Fix Released
Status in “linux” source package in Quantal:
  Fix Released
Status in “linux” source package in Raring:
  Fix Released
Status in “linux” source package in Saucy:
  Fix Released
Status in “linux” source package in Trusty:
  Fix Released

Bug description:
  SRU Justification:

  Impact: Large pastes over 4KB in a console may not be pasted
  correctly.

  Fix: A patch was posted here https://lkml.org/lkml/2013/9/3/539, that
  resolves the issue. It is not upstreamed yet, pending additional
  analysis.

  Testcase:
  1. gedit /usr/share/common-licenses/GPL (replace  with blanks)
  2. select all and copy contents
  3. open a terminal type 
  4. paste contents

  If the whole contents are pasted without any errors then we pass.

  Additional Notes:
  While this isn't upstreamed yet, this has already been accepted into Saucy 
and no additional bug reports or regressions have been detected yet. It would 
be useful to continue to monitor the upstream thread, and/or more deeply review 
this patch for potential deadlocks and contribute to the upstream discussion. 

  --

  The bug is described in detail in this mail:
  https://lkml.org/lkml/2013/7/25/205

  This bug affects any readline enabled program, like bash or psql.  A
  large paste is any paste of more than 4kb of data (4kb is the size
  of the kernel buffer for reading from the console).

  As can be found in the lkml thread, the issue is caused by the
  constant change between canonical mode and non-canonical mode, done by
  readline for each line being read.  This change means that when the
  buffer is full, some characters might get lost.

  This has been happening for a long time (starting with kernel
  v2.6.31-rc5), but it was barely noticeable for a while.  Some changes
  done in the way the kernel schedules character reading in v2.6.39-rc1
  made it much more noticeable.  Even the most recent kernels are
  affected.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1208740/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1347088] Re: Trusty update to 3.13.11.5 stable release

2014-08-11 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/precise-security/linux-lts-trusty

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1347088

Title:
  Trusty update to 3.13.11.5 stable release

Status in “linux” package in Ubuntu:
  Confirmed
Status in “linux” source package in Trusty:
  Fix Released

Bug description:
  SRU Justification

  Impact:
     The upstream process for stable tree updates is quite similar
     in scope to the Ubuntu SRU process, e.g., each patch has to
     demonstrably fix a bug, and each patch is vetted by upstream
     by originating either directly from Linus' tree or in a minimally
     backported form of that patch. The 3.13.11.5 upstream stable
     patch set is now available. It should be included in the Ubuntu
     kernel as well.

     git://git.kernel.org/

  TEST CASE: TBD

     The following patches are in the 3.13.11.5 stable release:
  Linux 3.13.11.5
  iscsi-target: fix iscsit_del_np deadlock on unload
  iscsi-target: Avoid rejecting incorrect ITT for Data-Out
  lz4: fix another possible overrun
  efi-pstore: Fix an overflow on 32-bit builds
  iscsi-target: Explicily clear login response PDU in exception 
path
  target: Fix left-over se_lun-lun_sep pointer OOPs
  ALSA: hda - restore BCLK M/N values when resuming HSW/BDW 
display controller
  MIPS: MSC: Prevent out-of-bounds writes to MIPS SC ioremap'd 
region
  recordmcount/MIPS: Fix possible incorrect mcount_loc table 
entries in modules
  ALSA: usb-audio: Fix races at disconnection and PCM closing
  net: allwinner: emac: Add missing free_irq
  powerpc: Don't skip ePAPR spin-table CPUs
  nfs: Fix cache_validity check in nfs_write_pageuptodate()
  aio: fix kernel memory disclosure in io_getevents() 
introduced in v3.10
  aio: fix aio request leak when events are reaped by userspace
  [CIFS] fix mount failure with broken pathnames when smb3 
mount with mapchars option
  drm/i915: Hold the table lock whilst walking the file's idr 
and counting the objects in debugfs
  mm: fix crashes from mbind() merging vmas
  DMA, CMA: fix possible memory leak
  mm, pcp: allow restoring percpu_pagelist_fraction default
  kernel/watchdog.c: remove preemption restrictions when 
restarting lockup detector
  hugetlb: fix copy_hugetlb_page_range() to handle 
migration/hwpoisoned entry
  x86_32, entry: Do syscall exit work on badsys (CVE-2014-4508)
  lz4: ensure length does not wrap
  lzo: properly check for overruns
  ALSA: hda - hdmi: call overridden init on resume
  rbd: handle parent_overlap on writes correctly
  blkcg: fix use-after-free in __blkg_release_rcu() by making 
blkcg_gq refcnt an atomic_t
  rt2x00: fix rfkill regression on rt2500pci
  b43: fix frequency reported on G-PHY with /new/ firmware
  rt2x00: disable TKIP on USB
  Bluetooth: Allow change security level on ATT_CID in slave 
role
  Bluetooth: Fix locking of hdev when calling into SMP code
  Bluetooth: Fix indicating discovery state when canceling 
inquiry
  Bluetooth: Fix setting correct authentication information for 
SMP STK
  Bluetooth: Fix SSP acceptor just-works confirmation without 
MITM
  ALSA: control: Make sure that id-index does not overflow
  ALSA: control: Handle numid overflow
  ALSA: control: Don't access controls outside of protected 
regions
  ALSA: control: Fix replacing user controls
  ALSA: control: Protect user controls against concurrent access
  arm64/dma: Removing ARCH_HAS_DMA_GET_REQUIRED_MASK macro
  arm64: ptrace: fix empty registers set in prstatus of aarch32 
process core
  arm64: uid16: fix __kernel_old_{gid,uid}_t definitions
  arm64: ptrace: change fs when passing kernel pointer to 
regset code
  arm64: Bug fix in stack alignment exception
  USB: EHCI: avoid BIOS handover on the HASEE E200
  ARM: mvebu: DT: fix OpenBlocks AX3-4 RAM size
  drm/nouveau/kms: reference vblank for crtc during pageflip.
  epoll: fix use-after-free in eventpoll_release_file
  ACPI / ia64 / sba_iommu: Restore the working initialization 
ordering
  Revert offb: Add palette hack for little endian
  

[Kernel-packages] [Bug 1355469] [NEW] large bar patch for 14.10's kernel

2014-08-11 Thread Launchpad Bug Tracker
You have been subscribed to a public bug:

-- Problem Description --
Please, apply the following patch to the utopic's kernel:

https://git.kernel.org/cgit/linux/kernel/git/benh/powerpc.git/commit/?h=nextid=262af557dd750e94adcee3f450782c743f9a92d6

This is going to solve the 'large bar' feature for Ubuntu 14.10

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Confirmed


** Tags: architecture-ppc64le bugnameltc-114498 severity-high 
targetmilestone-inin---
-- 
large bar patch for 14.10's kernel
https://bugs.launchpad.net/bugs/1355469
You received this bug notification because you are a member of Kernel Packages, 
which is subscribed to linux in Ubuntu.

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1354530] Re: linux: 3.16.0-7.12 -proposed tracker

2014-08-11 Thread Brad Figg
The package has been published and the bug is being set to Fix Released


** Changed in: kernel-development-workflow
   Status: In Progress = Fix Released

** Description changed:

  This bug is for tracking the 3.16.0-7.12 upload package. This bug will
  contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-Prepare-package-start:Friday, 08. August 2014 17:05 UTC
- kernel-phase-changed:Monday, 11. August 2014 14:00 UTC
  kernel-Prepare-package-end:Monday, 11. August 2014 14:00 UTC
  kernel-Package-testing-start:Monday, 11. August 2014 14:00 UTC
- kernel-phase:PPA Testing
  ppa-package-testing-start:Monday, 11. August 2014 14:00 UTC
  kernel-Promote-to-release-end:Monday, 11. August 2014 22:01 UTC
+ kernel-phase:Released
+ kernel-phase-changed:Tuesday, 12. August 2014 00:00 UTC

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1354530

Title:
  linux: 3.16.0-7.12 -proposed tracker

Status in Kernel Development Workflow:
  Fix Released
Status in Kernel Development Workflow package-testing series:
  Won't Fix
Status in Kernel Development Workflow prepare-package series:
  Fix Released
Status in Kernel Development Workflow prepare-package-meta series:
  Fix Released
Status in Kernel Development Workflow prepare-package-signed series:
  Fix Released
Status in Kernel Development Workflow promote-to-release series:
  Fix Released
Status in “linux” package in Ubuntu:
  Fix Released
Status in “linux” source package in Utopic:
  Fix Released

Bug description:
  This bug is for tracking the 3.16.0-7.12 upload package. This bug will
  contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-Prepare-package-start:Friday, 08. August 2014 17:05 UTC
  kernel-Prepare-package-end:Monday, 11. August 2014 14:00 UTC
  kernel-Package-testing-start:Monday, 11. August 2014 14:00 UTC
  ppa-package-testing-start:Monday, 11. August 2014 14:00 UTC
  kernel-Promote-to-release-end:Monday, 11. August 2014 22:01 UTC
  kernel-phase:Released
  kernel-phase-changed:Tuesday, 12. August 2014 00:00 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-development-workflow/+bug/1354530/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1355469] Re: large bar patch for 14.10's kernel

2014-08-11 Thread Luciano Chavez
** Changed in: ubuntu
   Status: New = Confirmed

** Package changed: ubuntu = linux (Ubuntu)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1355469

Title:
  large bar patch for 14.10's kernel

Status in “linux” package in Ubuntu:
  Confirmed

Bug description:
  -- Problem Description --
  Please, apply the following patch to the utopic's kernel:

  
https://git.kernel.org/cgit/linux/kernel/git/benh/powerpc.git/commit/?h=nextid=262af557dd750e94adcee3f450782c743f9a92d6

  This is going to solve the 'large bar' feature for Ubuntu 14.10

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1355469/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1349897] Re: linux: 3.13.0-33.58 -proposed tracker

2014-08-11 Thread Brad Figg
** Description changed:

  This bug is for tracking the 3.13.0-33.58 upload package. This bug will
  contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 29. July 2014 15:09 UTC
  kernel-stable-Prepare-package-end:Wednesday, 30. July 2014 21:05 UTC
  kernel-stable-Promote-to-proposed-start:Wednesday, 30. July 2014 21:05 UTC
  ppa-package-testing-start:Wednesday, 30. July 2014 21:05 UTC
  kernel-stable-Promote-to-proposed-end:Friday, 08. August 2014 22:00 UTC
  kernel-stable-phase:Verification  Testing
  kernel-stable-phase-changed:Friday, 08. August 2014 23:01 UTC
  kernel-stable-Verification-testing-start:Friday, 08. August 2014 23:01 UTC
  kernel-stable-Certification-testing-start:Friday, 08. August 2014 23:01 UTC
  kernel-stable-Security-signoff-start:Friday, 08. August 2014 23:01 UTC
  kernel-stable-Regression-testing-start:Friday, 08. August 2014 23:01 UTC
  kernel-stable-Certification-testing-end:Monday, 11. August 2014 20:00 UTC
+ kernel-stable-Promote-to-updates-end:Tuesday, 12. August 2014 00:01 UTC

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1349897

Title:
  linux: 3.13.0-33.58 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow package-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Fix Released
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Confirmed
Status in Kernel SRU Workflow security-signoff series:
  In Progress
Status in Kernel SRU Workflow verification-testing series:
  In Progress
Status in “linux” package in Ubuntu:
  Invalid
Status in “linux” source package in Trusty:
  Fix Released

Bug description:
  This bug is for tracking the 3.13.0-33.58 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 29. July 2014 15:09 UTC
  kernel-stable-Prepare-package-end:Wednesday, 30. July 2014 21:05 UTC
  kernel-stable-Promote-to-proposed-start:Wednesday, 30. July 2014 21:05 UTC
  ppa-package-testing-start:Wednesday, 30. July 2014 21:05 UTC
  kernel-stable-Promote-to-proposed-end:Friday, 08. August 2014 22:00 UTC
  kernel-stable-phase:Verification  Testing
  kernel-stable-phase-changed:Friday, 08. August 2014 23:01 UTC
  kernel-stable-Verification-testing-start:Friday, 08. August 2014 23:01 UTC
  kernel-stable-Certification-testing-start:Friday, 08. August 2014 23:01 UTC
  kernel-stable-Security-signoff-start:Friday, 08. August 2014 23:01 UTC
  kernel-stable-Regression-testing-start:Friday, 08. August 2014 23:01 UTC
  kernel-stable-Certification-testing-end:Monday, 11. August 2014 20:00 UTC
  kernel-stable-Promote-to-updates-end:Tuesday, 12. August 2014 00:01 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1349897/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1355445] Re: linux: 2.6.32-65.129 -proposed tracker

2014-08-11 Thread Brad Figg
** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New = Fix Released

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) = Brad Figg 
(brad-figg)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1355445

Title:
  linux: 2.6.32-65.129 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  New
Status in Kernel SRU Workflow package-testing series:
  New
Status in Kernel SRU Workflow prepare-package series:
  New
Status in Kernel SRU Workflow prepare-package-lbm series:
  New
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-ports-meta series:
  New
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in “linux” package in Ubuntu:
  Invalid
Status in “linux” source package in Lucid:
  New

Bug description:
  This bug is for tracking the 2.6.32-65.129 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Monday, 11. August 2014 21:00 UTC
  kernel-stable-phase:Prepare
  kernel-stable-phase-changed:Monday, 11. August 2014 21:00 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1355445/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1035431] Re: bluetooh-wizard failed to connect to a keyboard(logitech)

2014-08-11 Thread Pascal Morin
According to last email from Ara:

Still waiting on cyphermox. I just pinged him today again.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to bluez in Ubuntu.
https://bugs.launchpad.net/bugs/1035431

Title:
  bluetooh-wizard failed to connect to a keyboard(logitech)

Status in GNOME Bluetooth:
  New
Status in OEM Priority Project:
  In Progress
Status in OEM Priority Project trusty series:
  New
Status in “bluez” package in Ubuntu:
  Confirmed
Status in “gnome-bluetooth” package in Ubuntu:
  Confirmed
Status in “bluez” source package in Precise:
  New
Status in “gnome-bluetooth” source package in Precise:
  New
Status in “bluez” source package in Trusty:
  New
Status in “gnome-bluetooth” source package in Trusty:
  New

Bug description:
  When I try to connect my bluetooth keyboard using bluetooth-wizard, it
  ever fails:

  ** (bluetooth-wizard:11367): WARNING **: Setting up 'Logitech K760'
  failed: Authentication Failed

  This keyboard works fine with another computer under ubuntu 11.04.
  This keyboard works fine with this computer and Windows 7 (arghhh).
  This computer ubuntu 12.04 works fine with my bluetooth mouse.

  I can attach manually this keyboard to this computer using :

  sudo hidd --search

  My computer is a Samsung 305U1A
  My bluetooth interface is :

  Bus 003 Device 002: ID 0a5c:219c Broadcom Corp.

To manage notifications about this bug go to:
https://bugs.launchpad.net/gnome-bluetooth/+bug/1035431/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1355445] Re: linux: 2.6.32-65.129 -proposed tracker

2014-08-11 Thread Brad Figg
** Changed in: kernel-sru-workflow/prepare-package-lbm
   Status: New = Fix Released

** Changed in: kernel-sru-workflow/prepare-package-lbm
 Assignee: Canonical Kernel Team (canonical-kernel-team) = Brad Figg 
(brad-figg)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1355445

Title:
  linux: 2.6.32-65.129 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  New
Status in Kernel SRU Workflow package-testing series:
  New
Status in Kernel SRU Workflow prepare-package series:
  New
Status in Kernel SRU Workflow prepare-package-lbm series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-ports-meta series:
  New
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in “linux” package in Ubuntu:
  Invalid
Status in “linux” source package in Lucid:
  New

Bug description:
  This bug is for tracking the 2.6.32-65.129 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Monday, 11. August 2014 21:00 UTC
  kernel-stable-phase:Prepare
  kernel-stable-phase-changed:Monday, 11. August 2014 21:00 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1355445/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1349897] Re: linux: 3.13.0-33.58 -proposed tracker

2014-08-11 Thread Brad Figg
The package has been published and the bug is being set to Fix Released


** Changed in: kernel-sru-workflow
   Status: In Progress = Fix Released

** Description changed:

  This bug is for tracking the 3.13.0-33.58 upload package. This bug will
  contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 29. July 2014 15:09 UTC
  kernel-stable-Prepare-package-end:Wednesday, 30. July 2014 21:05 UTC
  kernel-stable-Promote-to-proposed-start:Wednesday, 30. July 2014 21:05 UTC
  ppa-package-testing-start:Wednesday, 30. July 2014 21:05 UTC
  kernel-stable-Promote-to-proposed-end:Friday, 08. August 2014 22:00 UTC
- kernel-stable-phase:Verification  Testing
- kernel-stable-phase-changed:Friday, 08. August 2014 23:01 UTC
  kernel-stable-Verification-testing-start:Friday, 08. August 2014 23:01 UTC
  kernel-stable-Certification-testing-start:Friday, 08. August 2014 23:01 UTC
  kernel-stable-Security-signoff-start:Friday, 08. August 2014 23:01 UTC
  kernel-stable-Regression-testing-start:Friday, 08. August 2014 23:01 UTC
  kernel-stable-Certification-testing-end:Monday, 11. August 2014 20:00 UTC
  kernel-stable-Promote-to-updates-end:Tuesday, 12. August 2014 00:01 UTC
+ kernel-stable-phase:Released
+ kernel-stable-phase-changed:Tuesday, 12. August 2014 02:01 UTC

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1349897

Title:
  linux: 3.13.0-33.58 -proposed tracker

Status in Kernel SRU Workflow:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow package-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Fix Released
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Confirmed
Status in Kernel SRU Workflow security-signoff series:
  In Progress
Status in Kernel SRU Workflow verification-testing series:
  In Progress
Status in “linux” package in Ubuntu:
  Invalid
Status in “linux” source package in Trusty:
  Fix Released

Bug description:
  This bug is for tracking the 3.13.0-33.58 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 29. July 2014 15:09 UTC
  kernel-stable-Prepare-package-end:Wednesday, 30. July 2014 21:05 UTC
  kernel-stable-Promote-to-proposed-start:Wednesday, 30. July 2014 21:05 UTC
  ppa-package-testing-start:Wednesday, 30. July 2014 21:05 UTC
  kernel-stable-Promote-to-proposed-end:Friday, 08. August 2014 22:00 UTC
  kernel-stable-Verification-testing-start:Friday, 08. August 2014 23:01 UTC
  kernel-stable-Certification-testing-start:Friday, 08. August 2014 23:01 UTC
  kernel-stable-Security-signoff-start:Friday, 08. August 2014 23:01 UTC
  kernel-stable-Regression-testing-start:Friday, 08. August 2014 23:01 UTC
  kernel-stable-Certification-testing-end:Monday, 11. August 2014 20:00 UTC
  kernel-stable-Promote-to-updates-end:Tuesday, 12. August 2014 00:01 UTC
  kernel-stable-phase:Released
  kernel-stable-phase-changed:Tuesday, 12. August 2014 02:01 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1349897/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1349897] Re: linux: 3.13.0-33.58 -proposed tracker

2014-08-11 Thread Paul Larson
** Changed in: kernel-sru-workflow/regression-testing
   Status: Confirmed = In Progress

** Changed in: kernel-sru-workflow/regression-testing
 Assignee: Canonical Platform QA Team (canonical-platform-qa) = Paul 
Larson (pwlars)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1349897

Title:
  linux: 3.13.0-33.58 -proposed tracker

Status in Kernel SRU Workflow:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow package-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Fix Released
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  In Progress
Status in Kernel SRU Workflow security-signoff series:
  In Progress
Status in Kernel SRU Workflow verification-testing series:
  In Progress
Status in “linux” package in Ubuntu:
  Invalid
Status in “linux” source package in Trusty:
  Fix Released

Bug description:
  This bug is for tracking the 3.13.0-33.58 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 29. July 2014 15:09 UTC
  kernel-stable-Prepare-package-end:Wednesday, 30. July 2014 21:05 UTC
  kernel-stable-Promote-to-proposed-start:Wednesday, 30. July 2014 21:05 UTC
  ppa-package-testing-start:Wednesday, 30. July 2014 21:05 UTC
  kernel-stable-Promote-to-proposed-end:Friday, 08. August 2014 22:00 UTC
  kernel-stable-Verification-testing-start:Friday, 08. August 2014 23:01 UTC
  kernel-stable-Certification-testing-start:Friday, 08. August 2014 23:01 UTC
  kernel-stable-Security-signoff-start:Friday, 08. August 2014 23:01 UTC
  kernel-stable-Regression-testing-start:Friday, 08. August 2014 23:01 UTC
  kernel-stable-Certification-testing-end:Monday, 11. August 2014 20:00 UTC
  kernel-stable-Promote-to-updates-end:Tuesday, 12. August 2014 00:01 UTC
  kernel-stable-phase:Released
  kernel-stable-phase-changed:Tuesday, 12. August 2014 02:01 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1349897/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1341988] Re: [Dell Inspiron 11 - 3147] Brightness control does not work on this system

2014-08-11 Thread Anthony Wong
** Changed in: linux (Ubuntu)
 Assignee: Anthony Wong (anthonywong) = Edward Lin (airken)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1341988

Title:
  [Dell Inspiron 11 - 3147] Brightness control does not work on this
  system

Status in “linux” package in Ubuntu:
  Confirmed

Bug description:
  CID: 201403-14888 Dell Inspiron 11 - 3147

  The screen brightness cannot be controlled by the hotkey.

  Steps:
  1. Install 14.04 + update (3.13.0-30), boot to desktop
  2. Try to control brightness with the hotkey
  3. Try to control brightness with Brightness and Lock applet

  Expected result:
  * Brightness could be controlled by the hotkey or the applet

  Actual result:
  * Brightness level indicator changed along with the hotkey, but the 
brightness won't be changed at all.

  Debugging information:
  ubuntu@201403-14888:~$ grep -r . /proc/acpi
  /proc/acpi/button/lid/LID0/state:state:  open
  /proc/acpi/wakeup:Device  S-state   Status   Sysfs node
  /proc/acpi/wakeup:XHC1  S0*enabled   pci::00:14.0
  /proc/acpi/wakeup:RP01  S4*disabled  pci::00:1c.0
  /proc/acpi/wakeup:PXSX  S4*disabled
  /proc/acpi/wakeup:RP02  S4*disabled
  /proc/acpi/wakeup:PXSX  S4*disabled
  /proc/acpi/wakeup:RP03  S4*disabled
  /proc/acpi/wakeup:PXSX  S4*disabled
  /proc/acpi/wakeup:RP04  S4*disabled
  /proc/acpi/wakeup:PXSX  S4*disabled
  /proc/acpi/wakeup:PWRB  S4*enabled
  /proc/acpi/wakeup:LID0  S3*enabled

  ubuntu@201403-14888:~$ ls /sys/class/backlight/
  acpi_video0  intel_backlight

  ubuntu@201403-14888:~$ dmesg | grep 'ACPI: Video'
  [   10.409549] ACPI: Video Device [PEGP] (multi-head: yes  rom: no  post: no)
  [   10.435109] ACPI: Video Device [GFX0] (multi-head: yes  rom: no  post: no)

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.13.0-30-generic 3.13.0-30.55
  ProcVersionSignature: Ubuntu 3.13.0-30.55-generic 3.13.11.2
  Uname: Linux 3.13.0-30-generic x86_64
  ApportVersion: 2.14.1-0ubuntu3.2
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  ubuntu 1563 F pulseaudio
  CRDA:
   country TW:
    (2402 - 2472 @ 40), (3, 27)
    (5270 - 5330 @ 40), (3, 17), DFS
    (5735 - 5815 @ 40), (3, 30)
  CurrentDesktop: Unity
  Date: Tue Jul 15 02:04:08 2014
  HibernationDevice: RESUME=UUID=b30f45e9-6fc7-4aa0-adff-37e7c87c19cd
  InstallationDate: Installed on 2014-07-15 (0 days ago)
  InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Release amd64 (20140417)
  MachineType: Dell Inc. Inspiron 11 - 3147
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-30-generic.efi.signed 
root=UUID=cc246aa9-85c1-49ac-b06b-6c0f4e37dbea ro quiet splash
  RelatedPackageVersions:
   linux-restricted-modules-3.13.0-30-generic N/A
   linux-backports-modules-3.13.0-30-generic  N/A
   linux-firmware 1.127.4
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 05/05/2014
  dmi.bios.vendor: Dell Inc.
  dmi.bios.version: A01
  dmi.board.name: 00K010
  dmi.board.vendor: Dell Inc.
  dmi.board.version: D02
  dmi.chassis.type: 8
  dmi.chassis.vendor: Dell Inc.
  dmi.chassis.version: A01
  dmi.modalias: 
dmi:bvnDellInc.:bvrA01:bd05/05/2014:svnDellInc.:pnInspiron11-3147:pvr:rvnDellInc.:rn00K010:rvrD02:cvnDellInc.:ct8:cvrA01:
  dmi.product.name: Inspiron 11 - 3147
  dmi.sys.vendor: Dell Inc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1341988/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1348020] Re: [Dell Latitude 3540] Unable to control brightness

2014-08-11 Thread Anthony Wong
Right, is it acceptable?

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1348020

Title:
  [Dell Latitude 3540] Unable to control brightness

Status in “linux” package in Ubuntu:
  Fix Released

Bug description:
  CIDL 201306-13866 Dell Latitude 3540

  The brightness control does not work on this system

  Steps:
  1. Install 14.04 + update (3.13.0-32), boot to desktop
  2. Try to change the brightness by using the hotkeys
  3. Try to change the brightness by using the Brightness and Lock applet

  Expect result:
  * Brightness control works fine

  Actual result:
  * Brightness level indicator changes with the hotkey, but not the brightness.
  * Brightness cannot be changed by the applet

  Debugging information:
  ubuntu@201306-13866:~$ ls /sys/class/backlight
  acpi_video0  intel_backlight

  ubuntu@201306-13866:~$ grep -r . /proc/acpi
  /proc/acpi/battery/BAT1/alarm:alarm:   unsupported
  /proc/acpi/battery/BAT1/state:present: yes
  /proc/acpi/battery/BAT1/state:capacity state:  ok
  /proc/acpi/battery/BAT1/state:charging state:  charged
  /proc/acpi/battery/BAT1/state:present rate:1 mA
  /proc/acpi/battery/BAT1/state:remaining capacity:  5900 mAh
  /proc/acpi/battery/BAT1/state:present voltage: 12972 mV
  /proc/acpi/battery/BAT1/info:present: yes
  /proc/acpi/battery/BAT1/info:design capacity: 5900 mAh
  /proc/acpi/battery/BAT1/info:last full capacity:  5900 mAh
  /proc/acpi/battery/BAT1/info:battery technology:  rechargeable
  /proc/acpi/battery/BAT1/info:design voltage:  11100 mV
  /proc/acpi/battery/BAT1/info:design capacity warning: 590 mAh
  /proc/acpi/battery/BAT1/info:design capacity low: 177 mAh
  /proc/acpi/battery/BAT1/info:cycle count:   0
  /proc/acpi/battery/BAT1/info:capacity granularity 1:  264 mAh
  /proc/acpi/battery/BAT1/info:capacity granularity 2:  3780 mAh
  /proc/acpi/battery/BAT1/info:model number:DELL G019Y35H
  /proc/acpi/battery/BAT1/info:serial number:   0C45
  /proc/acpi/battery/BAT1/info:battery type:Li-Ion
  /proc/acpi/battery/BAT1/info:OEM info:SDI
  /proc/acpi/button/lid/LID0/state:state:  open
  /proc/acpi/wakeup:Device  S-state   Status   Sysfs node
  /proc/acpi/wakeup:P0P1  S4*disabled
  /proc/acpi/wakeup:LID0  S3*enabled 
  /proc/acpi/wakeup:EHC1  S0*enabled   pci::00:1d.0
  /proc/acpi/wakeup:XHC   S0*enabled   pci::00:14.0
  /proc/acpi/wakeup:PXSX  S4*disabled
  /proc/acpi/wakeup:RP03  S3*disabled  pci::00:1c.0
  /proc/acpi/wakeup:PEG0  S4*disabled
  /proc/acpi/wakeup:PEGP  S4*disabled
  /proc/acpi/wakeup:PEG1  S4*disabled
  /proc/acpi/wakeup:PEG2  S4*disabled

  ubuntu@201306-13866:~$ dmesg | grep 'ACPI: Video' 
  [   11.036337] ACPI: Video Device [GFX0] (multi-head: yes  rom: no  post: no)

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.13.0-32-generic 3.13.0-32.57
  ProcVersionSignature: Ubuntu 3.13.0-32.57-generic 3.13.11.4
  Uname: Linux 3.13.0-32-generic x86_64
  ApportVersion: 2.14.1-0ubuntu3.2
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  ubuntu 1586 F pulseaudio
  CRDA:
   country TW:
(2402 - 2472 @ 40), (3, 27)
(5270 - 5330 @ 40), (3, 17), DFS
(5735 - 5815 @ 40), (3, 30)
  CurrentDesktop: Unity
  Date: Wed Jul 23 23:35:09 2014
  HibernationDevice: RESUME=UUID=bce2a764-eac9-4044-b879-caa497463b91
  InstallationDate: Installed on 2014-07-24 (0 days ago)
  InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Release amd64 (20140417)
  MachineType: Dell Inc. Latitude 3540
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-32-generic.efi.signed 
root=UUID=1dd2f74b-d1f1-42e1-9c35-6675a578b71e ro quiet splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-3.13.0-32-generic N/A
   linux-backports-modules-3.13.0-32-generic  N/A
   linux-firmware 1.127.5
  SourcePackage: linux
  StagingDrivers: rts5139
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 08/06/2013
  dmi.bios.vendor: Dell Inc.
  dmi.bios.version: A01
  dmi.board.name: 0992HC
  dmi.board.vendor: Dell Inc.
  dmi.board.version: X01
  dmi.chassis.type: 8
  dmi.chassis.vendor: Dell Inc.
  dmi.chassis.version: A01
  dmi.modalias: 
dmi:bvnDellInc.:bvrA01:bd08/06/2013:svnDellInc.:pnLatitude3540:pvrA01:rvnDellInc.:rn0992HC:rvrX01:cvnDellInc.:ct8:cvrA01:
  dmi.product.name: Latitude 3540
  dmi.product.version: A01
  dmi.sys.vendor: Dell Inc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1348020/+subscriptions

-- 
Mailing list: 

[Kernel-packages] [Bug 1339998] Re: [Dell Latitude 12 Rugged Extreme 7204] Microphone mute key does not work

2014-08-11 Thread Anthony Wong
** Changed in: hwe-next
   Status: New = Triaged

** Also affects: linux (Ubuntu)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu)
   Status: New = Fix Released

** Changed in: hwe-next
   Status: Triaged = Fix Released

** Also affects: hwe-next/utopic
   Importance: Medium
 Assignee: Hui Wang (hui.wang)
   Status: Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1339998

Title:
  [Dell Latitude 12 Rugged Extreme 7204] Microphone mute key does not
  work

Status in HWE Next Project:
  Fix Released
Status in HWE Next utopic series:
  Fix Released
Status in “linux” package in Ubuntu:
  Fix Released
Status in “systemd” package in Ubuntu:
  Fix Released

Bug description:
  CID: 201402-14663 Dell Latitude 12 Rugged Extreme

  The microphone mute key does not work on this system, so as its LED

  Steps:
  1. Install 14.04 + update (3.13.0-30), boot to desktop
  2. Try to mute the microphone with the hotkey (fn+F4)

  Expected results:
  * Mic mute key should work, its LED should be lit and the Mute option for 
input device should be ticked after you press the mic mute key.

  Actual result:
  * Nothing happened.

  Debugging information:
  ubuntu@201402-14663:~$ sudo showkey -k
  kb mode was ?UNKNOWN?
  [ if you are trying this under X, it might not work
  since the X server is also reading /dev/console ]

  press any key (program terminates 10s after last keypress)...
  keycode  28 release
  keycode 248 press
  keycode 248 release
  keycode 248 press
  keycode 248 release
  keycode 248 press
  keycode 248 release
  keycode  29 press
  ^Ccaught signal 2, cleaning up...

  xev cannot detect any microphone mute key event

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.13.0-30-generic 3.13.0-30.55
  ProcVersionSignature: Ubuntu 3.13.0-30.55-generic 3.13.11.2
  Uname: Linux 3.13.0-30-generic x86_64
  ApportVersion: 2.14.1-0ubuntu3.2
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC1:  ubuntu 1501 F pulseaudio
   /dev/snd/controlC0:  ubuntu 1501 F pulseaudio
  CRDA:
   country TW:
    (2402 - 2472 @ 40), (3, 27)
    (5270 - 5330 @ 40), (3, 17), DFS
    (5735 - 5815 @ 40), (3, 30)
  CurrentDesktop: Unity
  Date: Wed Jul  9 23:57:11 2014
  HibernationDevice: RESUME=UUID=b68f02ad-f5e4-4eb9-b88d-e85f60666734
  InstallationDate: Installed on 2014-07-10 (0 days ago)
  InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Release amd64 (20140417)
  MachineType: Dell Inc. Latitude 12 Rugged Extreme (7204)
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-30-generic.efi.signed 
root=UUID=bdd00fe9-0df9-4b71-92c5-5f94c533f725 ro quiet splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-3.13.0-30-generic N/A
   linux-backports-modules-3.13.0-30-generic  N/A
   linux-firmware 1.127.4
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 05/12/2014
  dmi.bios.vendor: Dell Inc.
  dmi.bios.version: A00
  dmi.board.name: 0TH1GJ
  dmi.board.vendor: Dell Inc.
  dmi.board.version: X02
  dmi.chassis.type: 9
  dmi.chassis.vendor: Dell Inc.
  dmi.modalias: 
dmi:bvnDellInc.:bvrA00:bd05/12/2014:svnDellInc.:pnLatitude12RuggedExtreme(7204):pvr01:rvnDellInc.:rn0TH1GJ:rvrX02:cvnDellInc.:ct9:cvr:
  dmi.product.name: Latitude 12 Rugged Extreme (7204)
  dmi.product.version: 01
  dmi.sys.vendor: Dell Inc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1339998/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1341988] Re: [Dell Inspiron 11 - 3147] Brightness control does not work on this system

2014-08-11 Thread Anthony Wong
** Changed in: linux (Ubuntu)
 Assignee: Edward Lin (airken) = Anthony Wong (anthonywong)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1341988

Title:
  [Dell Inspiron 11 - 3147] Brightness control does not work on this
  system

Status in “linux” package in Ubuntu:
  Confirmed

Bug description:
  CID: 201403-14888 Dell Inspiron 11 - 3147

  The screen brightness cannot be controlled by the hotkey.

  Steps:
  1. Install 14.04 + update (3.13.0-30), boot to desktop
  2. Try to control brightness with the hotkey
  3. Try to control brightness with Brightness and Lock applet

  Expected result:
  * Brightness could be controlled by the hotkey or the applet

  Actual result:
  * Brightness level indicator changed along with the hotkey, but the 
brightness won't be changed at all.

  Debugging information:
  ubuntu@201403-14888:~$ grep -r . /proc/acpi
  /proc/acpi/button/lid/LID0/state:state:  open
  /proc/acpi/wakeup:Device  S-state   Status   Sysfs node
  /proc/acpi/wakeup:XHC1  S0*enabled   pci::00:14.0
  /proc/acpi/wakeup:RP01  S4*disabled  pci::00:1c.0
  /proc/acpi/wakeup:PXSX  S4*disabled
  /proc/acpi/wakeup:RP02  S4*disabled
  /proc/acpi/wakeup:PXSX  S4*disabled
  /proc/acpi/wakeup:RP03  S4*disabled
  /proc/acpi/wakeup:PXSX  S4*disabled
  /proc/acpi/wakeup:RP04  S4*disabled
  /proc/acpi/wakeup:PXSX  S4*disabled
  /proc/acpi/wakeup:PWRB  S4*enabled
  /proc/acpi/wakeup:LID0  S3*enabled

  ubuntu@201403-14888:~$ ls /sys/class/backlight/
  acpi_video0  intel_backlight

  ubuntu@201403-14888:~$ dmesg | grep 'ACPI: Video'
  [   10.409549] ACPI: Video Device [PEGP] (multi-head: yes  rom: no  post: no)
  [   10.435109] ACPI: Video Device [GFX0] (multi-head: yes  rom: no  post: no)

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.13.0-30-generic 3.13.0-30.55
  ProcVersionSignature: Ubuntu 3.13.0-30.55-generic 3.13.11.2
  Uname: Linux 3.13.0-30-generic x86_64
  ApportVersion: 2.14.1-0ubuntu3.2
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  ubuntu 1563 F pulseaudio
  CRDA:
   country TW:
    (2402 - 2472 @ 40), (3, 27)
    (5270 - 5330 @ 40), (3, 17), DFS
    (5735 - 5815 @ 40), (3, 30)
  CurrentDesktop: Unity
  Date: Tue Jul 15 02:04:08 2014
  HibernationDevice: RESUME=UUID=b30f45e9-6fc7-4aa0-adff-37e7c87c19cd
  InstallationDate: Installed on 2014-07-15 (0 days ago)
  InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Release amd64 (20140417)
  MachineType: Dell Inc. Inspiron 11 - 3147
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-30-generic.efi.signed 
root=UUID=cc246aa9-85c1-49ac-b06b-6c0f4e37dbea ro quiet splash
  RelatedPackageVersions:
   linux-restricted-modules-3.13.0-30-generic N/A
   linux-backports-modules-3.13.0-30-generic  N/A
   linux-firmware 1.127.4
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 05/05/2014
  dmi.bios.vendor: Dell Inc.
  dmi.bios.version: A01
  dmi.board.name: 00K010
  dmi.board.vendor: Dell Inc.
  dmi.board.version: D02
  dmi.chassis.type: 8
  dmi.chassis.vendor: Dell Inc.
  dmi.chassis.version: A01
  dmi.modalias: 
dmi:bvnDellInc.:bvrA01:bd05/05/2014:svnDellInc.:pnInspiron11-3147:pvr:rvnDellInc.:rn00K010:rvrD02:cvnDellInc.:ct8:cvrA01:
  dmi.product.name: Inspiron 11 - 3147
  dmi.sys.vendor: Dell Inc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1341988/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1327752] Re: Call Trace after suspend to RAM

2014-08-11 Thread Launchpad Bug Tracker
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]

** Changed in: linux (Ubuntu)
   Status: Incomplete = Expired

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1327752

Title:
  Call Trace after suspend to RAM

Status in “linux” package in Ubuntu:
  Expired

Bug description:
  In 12.04 LTS suspend to RAM worked. After the dist-upgrade to 14.04 I get 
this error.
  Before closing the lid I usually type
  sudo rmmod libertas-sdio libertas sdhci-pci sdhci mmc-block

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.13.0-29-generic 3.13.0-29.53
  ProcVersionSignature: Ubuntu 3.13.0-29.53-generic 3.13.11.2
  Uname: Linux 3.13.0-29-generic x86_64
  ApportVersion: 2.14.1-0ubuntu3.2
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  chris  3709 F pulseaudio
  Date: Sun Jun  8 11:47:38 2014
  HibernationDevice: RESUME=UUID=1fb4cd17-471b-4258-940d-6c22129b5f22
  InstallationDate: Installed on 2010-02-01 (1587 days ago)
  InstallationMedia: Kubuntu 9.10 Karmic Koala - Release amd64 (20091027)
  MachineType: ATI Herring
  ProcEnviron:
   LANGUAGE=de_DE
   TERM=xterm
   PATH=(custom, no user)
   LANG=de_DE.UTF-8
   SHELL=/bin/bash
  ProcFB: 0 radeondrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-29-generic 
root=UUID=88d9b5d2-d674-47ee-b863-ac3b0195a7cb ro vt.handoff=7
  PulseList:
   Error: command ['pacmd', 'list'] failed with exit code 1: Home directory not 
accessible: Permission denied
   No PulseAudio daemon running, or not running as session daemon.
  RelatedPackageVersions:
   linux-restricted-modules-3.13.0-29-generic N/A
   linux-backports-modules-3.13.0-29-generic  N/A
   linux-firmware 1.127.2
  SourcePackage: linux
  UpgradeStatus: Upgraded to trusty on 2014-04-24 (44 days ago)
  dmi.bios.date: 08/13/2008
  dmi.bios.vendor: Phoenix Technologies LTD
  dmi.bios.version: 4.06
  dmi.board.name: Herring
  dmi.board.vendor: ATI
  dmi.board.version: Rev 1
  dmi.chassis.asset.tag: None
  dmi.chassis.type: 1
  dmi.chassis.vendor: AMD
  dmi.chassis.version: None
  dmi.modalias: 
dmi:bvnPhoenixTechnologiesLTD:bvr4.06:bd08/13/2008:svnATI:pnHerring:pvrRev1:rvnATI:rnHerring:rvrRev1:cvnAMD:ct1:cvrNone:
  dmi.product.name: Herring
  dmi.product.version: Rev 1
  dmi.sys.vendor: ATI

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1327752/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1329328] Re: wifi goes up and down fequently

2014-08-11 Thread Launchpad Bug Tracker
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]

** Changed in: linux (Ubuntu)
   Status: Incomplete = Expired

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1329328

Title:
  wifi goes up and down fequently

Status in “linux” package in Ubuntu:
  Expired

Bug description:
  wifi goes up and down fequently.  As least with this kernel version I get a 
notification, and I can see the new authentication in dmesg.
  [15891.495890] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
  [15891.510620] wlan0: deauthenticating from 00:1d:6a:72:38:63 by local choice 
(reason=2)
  [15891.534132] wlan0: authenticate with 00:1d:6a:72:38:63
  [15891.534214] wlan0: send auth to 00:1d:6a:72:38:63 (try 1/3)
  [15891.534653] cfg80211: Calling CRDA to update world regulatory domain
  [15891.536199] wlan0: authenticated
  [15891.536307] rtl8188ee :08:00.0 wlan0: disabling HT/VHT due to WEP/TKIP 
use
  [15891.536310] rtl8188ee :08:00.0 wlan0: disabling HT as WMM/QoS is not 
supported by the AP
  [15891.536312] rtl8188ee :08:00.0 wlan0: disabling VHT as WMM/QoS is not 
supported by the AP
  [15891.537236] cfg80211: World regulatory domain updated:
  [15891.537239] cfg80211:   (start_freq - end_freq @ bandwidth), 
(max_antenna_gain, max_eirp)
  [15891.537241] cfg80211:   (2402000 KHz - 2472000 KHz @ 4 KHz), (300 mBi, 
2000 mBm)
  [15891.537242] cfg80211:   (2457000 KHz - 2482000 KHz @ 4 KHz), (300 mBi, 
2000 mBm)
  [15891.537243] cfg80211:   (2474000 KHz - 2494000 KHz @ 2 KHz), (300 mBi, 
2000 mBm)
  [15891.537244] cfg80211:   (517 KHz - 525 KHz @ 4 KHz), (300 mBi, 
2000 mBm)
  [15891.537245] cfg80211:   (5735000 KHz - 5835000 KHz @ 4 KHz), (300 mBi, 
2000 mBm)
  [15891.537938] wlan0: associate with 00:1d:6a:72:38:63 (try 1/3)
  [15891.540687] wlan0: RX AssocResp from 00:1d:6a:72:38:63 (capab=0x431 
status=0 aid=1)
  [15891.540799] wlan0: associated
  [16643.87] wlan0: Connection to AP 00:1d:6a:72:38:63 lost
  [16643.870668] cfg80211: Calling CRDA to update world regulatory domain
  [16643.898315] cfg80211: World regulatory domain updated:
  [16643.898322] cfg80211:   (start_freq - end_freq @ bandwidth), 
(max_antenna_gain, max_eirp)
  [16643.898326] cfg80211:   (2402000 KHz - 2472000 KHz @ 4 KHz), (300 mBi, 
2000 mBm)
  [16643.898328] cfg80211:   (2457000 KHz - 2482000 KHz @ 4 KHz), (300 mBi, 
2000 mBm)
  [16643.898331] cfg80211:   (2474000 KHz - 2494000 KHz @ 2 KHz), (300 mBi, 
2000 mBm)
  [16643.898333] cfg80211:   (517 KHz - 525 KHz @ 4 KHz), (300 mBi, 
2000 mBm)
  [16643.898335] cfg80211:   (5735000 KHz - 5835000 KHz @ 4 KHz), (300 mBi, 
2000 mBm)
  [16645.224408] wlan0: authenticate with 00:1d:6a:72:38:63
  [16645.233594] wlan0: send auth to 00:1d:6a:72:38:63 (try 1/3)
  [16645.235649] wlan0: authenticated
  [16645.235811] rtl8188ee :08:00.0 wlan0: disabling HT/VHT due to WEP/TKIP 
use
  [16645.235815] rtl8188ee :08:00.0 wlan0: disabling HT as WMM/QoS is not 
supported by the AP
  [16645.235818] rtl8188ee :08:00.0 wlan0: disabling VHT as WMM/QoS is not 
supported by the AP
  [16645.239347] wlan0: associate with 00:1d:6a:72:38:63 (try 1/3)
  [16645.242101] wlan0: RX AssocResp from 00:1d:6a:72:38:63 (capab=0x431 
status=0 aid=1)
  [16645.242218] wlan0: associated

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.13.0-29-generic 3.13.0-29.53
  ProcVersionSignature: Ubuntu 3.13.0-29.53-generic 3.13.11.2
  Uname: Linux 3.13.0-29-generic x86_64
  NonfreeKernelModules: nvidia
  ApportVersion: 2.14.1-0ubuntu3.2
  Architecture: amd64
  CurrentDesktop: KDE
  Date: Thu Jun 12 15:46:22 2014
  EcryptfsInUse: Yes
  InstallationDate: Installed on 2014-04-16 (56 days ago)
  InstallationMedia: Kubuntu 14.04 LTS Trusty Tahr - Beta amd64 (20140326.2)
  MachineType: Hewlett-Packard HP Pavilion 15 Notebook PC
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.13.0-29-generic 
root=UUID=3c7560c5-c6da-4e1b-9be7-5658f0c00914 ro quiet splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-3.13.0-29-generic N/A
   linux-backports-modules-3.13.0-29-generic  N/A
   linux-firmware 1.127.2
  RfKill:
   0: phy0: Wireless LAN
Soft blocked: no
Hard blocked: no
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 10/31/2013
  dmi.bios.vendor: Insyde
  dmi.bios.version: F.34
  dmi.board.asset.tag: Type2 - Board Asset Tag
  dmi.board.name: 2166
  dmi.board.vendor: Hewlett-Packard
  dmi.board.version: 29.34
  dmi.chassis.type: 10
  dmi.chassis.vendor: Hewlett-Packard
  dmi.chassis.version: Chassis Version
  dmi.modalias: 

[Kernel-packages] [Bug 1328825] Re: Wired Network Crash

2014-08-11 Thread Launchpad Bug Tracker
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]

** Changed in: linux (Ubuntu)
   Status: Incomplete = Expired

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1328825

Title:
  Wired Network Crash

Status in “linux” package in Ubuntu:
  Expired

Bug description:
  Wired network is continuously fails to respond to ping, and network
  disconnects in Ubuntu 14.04 64 bit Desktop edition.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1328825/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1328470] Re: [Intel D945GCLF2] Kernel panic with 3.13.0-27-generic

2014-08-11 Thread Launchpad Bug Tracker
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]

** Changed in: linux (Ubuntu)
   Status: Incomplete = Expired

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1328470

Title:
  [Intel D945GCLF2] Kernel panic with 3.13.0-27-generic

Status in “linux” package in Ubuntu:
  Expired

Bug description:
  System does not boot after upgrade to kernel linux-
  image-3.13.0-27-generic. It crashes with a kernel panic. I was able
  to boot the default kernel from Ubuntu 14.04 (linux-
  image-3.13.0-24-generic).

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.13.0-24-generic 3.13.0-24.47
  ProcVersionSignature: Ubuntu 3.13.0-24.47-generic 3.13.9
  Uname: Linux 3.13.0-24-generic x86_64
  AlsaVersion: Advanced Linux Sound Architecture Driver Version 
k3.13.0-24-generic.
  AplayDevices: Error: [Errno 2] No such file or directory: 'aplay'
  ApportVersion: 2.14.1-0ubuntu3.2
  Architecture: amd64
  ArecordDevices: Error: [Errno 2] No such file or directory: 'arecord'
  AudioDevicesInUse: Error: command ['fuser', '-v', '/dev/snd/by-path', 
'/dev/snd/controlC0', '/dev/snd/hwC0D2', '/dev/snd/pcmC0D0c', 
'/dev/snd/pcmC0D0p', '/dev/snd/pcmC0D1p', '/dev/snd/pcmC0D2c', '/dev/snd/seq', 
'/dev/snd/timer'] failed with exit code 1:
  CRDA: Error: [Errno 2] No such file or directory: 'iw'
  Card0.Amixer.info: Error: [Errno 2] No such file or directory: 'amixer'
  Card0.Amixer.values: Error: [Errno 2] No such file or directory: 'amixer'
  CurrentDmesg: [   24.371313] init: plymouth-upstart-bridge main process 
ended, respawning
  Date: Tue Jun 10 11:54:29 2014
  InstallationDate: Installed on 2014-04-26 (44 days ago)
  InstallationMedia: Ubuntu-Server 14.04 LTS Trusty Tahr - Release amd64 
(20140416.2)
  IwConfig:
   tun0  no wireless extensions.
   
   eth0  no wireless extensions.
   
   lono wireless extensions.
  ProcEnviron:
   TERM=xterm
   PATH=(custom, no user)
   LANG=de_DE.UTF-8
   SHELL=/bin/bash
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-24-generic 
root=UUID=8282ba3f-5f41-45e6-b9ef-4295c61b70e9 ro
  RelatedPackageVersions:
   linux-restricted-modules-3.13.0-24-generic N/A
   linux-backports-modules-3.13.0-24-generic  N/A
   linux-firmware 1.127.2
  RfKill: Error: [Errno 2] No such file or directory: 'rfkill'
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 04/14/2010
  dmi.bios.vendor: Intel Corp.
  dmi.bios.version: LF94510J.86A.0278.2010.0414.2000
  dmi.board.asset.tag: Base Board Asset Tag
  dmi.board.name: D945GCLF2
  dmi.board.vendor: Intel Corporation
  dmi.board.version: AAE46416-103
  dmi.chassis.type: 3
  dmi.modalias: 
dmi:bvnIntelCorp.:bvrLF94510J.86A.0278.2010.0414.2000:bd04/14/2010:svn:pn:pvr:rvnIntelCorporation:rnD945GCLF2:rvrAAE46416-103:cvn:ct3:cvr:

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1328470/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1314434] Re: 10ec:8179 (rev 01) RTL8188EE Wireless Network Adapter not working

2014-08-11 Thread Launchpad Bug Tracker
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]

** Changed in: linux (Ubuntu)
   Status: Incomplete = Expired

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1314434

Title:
  10ec:8179 (rev 01) RTL8188EE Wireless Network Adapter not working

Status in “linux” package in Ubuntu:
  Expired

Bug description:
  I am using Ubuntu 14.04 and i was able to install everything using
  livecd and my wifi connection, but after install only the wired
  connection is working. I tried to use previous kernel version
  (3.13.0.19) but didnt work too.

  Please see the following for more information:
  
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1314434/+attachment/4109886/+files/info

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.13.0-24-generic 3.13.0-24.46
  ProcVersionSignature: Ubuntu 3.13.0-24.46-generic 3.13.9
  Uname: Linux 3.13.0-24-generic i686
  ApportVersion: 2.14.1-0ubuntu3
  Architecture: i386
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  marcelo1462 F pulseaudio
  CurrentDesktop: Unity
  CurrentDmesg: [   33.113077] init: plymouth-upstart-bridge main process 
ended, respawning
  Date: Tue Apr 29 21:50:00 2014
  HibernationDevice: RESUME=UUID=e7a13320-446c-43e9-83ee-d19d9a35c8e8
  InstallationDate: Installed on 2014-04-29 (0 days ago)
  InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Beta i386 (20140325.1)
  Lsusb:
   Bus 002 Device 002: ID 8087:0024 Intel Corp. Integrated Rate Matching Hub
   Bus 002 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
   Bus 001 Device 003: ID 04f2:b351 Chicony Electronics Co., Ltd
   Bus 001 Device 002: ID 8087:0024 Intel Corp. Integrated Rate Matching Hub
   Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
  MachineType: Positivo Informatica SA C14CU51
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-24-generic 
root=UUID=5e246eba-d724-4e0a-ac42-cf84d90081d6 ro locale=pt_BR quiet splash 
vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-3.13.0-24-generic N/A
   linux-backports-modules-3.13.0-24-generic  N/A
   linux-firmware 1.127
  RfKill:
   0: phy0: Wireless LAN
    Soft blocked: no
    Hard blocked: no
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 05/31/2013
  dmi.bios.vendor: American Megatrends Inc.
  dmi.bios.version: 1.01.U
  dmi.board.asset.tag: To be filled by O.E.M.
  dmi.board.name: C14CU51
  dmi.board.vendor: Positivo Informatica SA
  dmi.board.version: POSITIVO
  dmi.chassis.asset.tag: To Be Filled By O.E.M.
  dmi.chassis.type: 10
  dmi.chassis.vendor: Positivo Informatica SA
  dmi.chassis.version: POSITIVO
  dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvr1.01.U:bd05/31/2013:svnPositivoInformaticaSA:pnC14CU51:pvr1.01.U_POS:rvnPositivoInformaticaSA:rnC14CU51:rvrPOSITIVO:cvnPositivoInformaticaSA:ct10:cvrPOSITIVO:
  dmi.product.name: C14CU51
  dmi.product.version: 1.01.U_POS
  dmi.sys.vendor: Positivo Informatica SA

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1314434/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1328632] Re: whole system can unrecoverably stall just because of a single misbehaving program that eats up too much memory (causing trashing)

2014-08-11 Thread Launchpad Bug Tracker
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]

** Changed in: linux (Ubuntu)
   Status: Incomplete = Expired

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1328632

Title:
  whole system can unrecoverably stall just because of a single
  misbehaving program that eats up too much memory (causing trashing)

Status in “linux” package in Ubuntu:
  Expired

Bug description:
  If a single program starts misbehaving (because of an error) and
  suddenly eating up a lot of memory, the whole system becomes
  unresponsive and you won't even be able to open a terminal, or switch
  to a virtual terminal (ctrl+alt+f1) and kill the offending process.

  It's absolutely unacceptable that the whole system can so easily stall into 
an unrecoverable state where the only option is a hardware shut down, just 
because of ONE misbehaving process (no matter whether faulty or malicious). You 
easily find yourself in this ridiculous and enraging situation:
  - you perfectly know what program is eating up all memory and hogging the 
system (or you have just a couple of candidates and could easily figure out by 
running top)
  - you perfectly know what to do to restore normal behavior: open a terminal, 
ps to find out the process id, and kill it. 3 easy steps
  - you can't do any of that because the system won't even respond to 
keystrokes and mouse clicks. Not even ctrl+alt+f1 to switch to virtual terminal 
works. You have no chance to run any command.

  The system should stop allocating the memory that process asks, or at least 
always keep in physical memory the essential processes that are needed to do 
the necessary tasks rescue the system from such a situation: open a terminal 
(or at least switch to a virtual console) and run commands.
  Also, responsiveness to mouse and keyboard should ALWAYS have the topmost 
priority, no matter what cpu-intensive or i/o-intensive task is being performed.

  An operating system that becomes unworkable just because of one single
  program's fault, is simply failing to do its most basic job.

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.13.0-29-generic 3.13.0-29.53
  ProcVersionSignature: Ubuntu 3.13.0-29.53-generic 3.13.11.2
  Uname: Linux 3.13.0-29-generic x86_64
  ApportVersion: 2.14.1-0ubuntu3.2
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  teo2155 F pulseaudio
  CurrentDesktop: Unity
  Date: Tue Jun 10 19:55:17 2014
  HibernationDevice: RESUME=UUID=ff7e702a-a05a-47fd-8c14-551e81f9e9e3
  InstallationDate: Installed on 2013-10-11 (242 days ago)
  InstallationMedia: Ubuntu 13.04 Raring Ringtail - Release amd64 (20130424)
  MachineType: Acer Aspire V3-571G
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-29-generic.efi.signed 
root=UUID=5830b30e-69e8-4bb4-8a2b-bc2b43c7414a ro quiet splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-3.13.0-29-generic N/A
   linux-backports-modules-3.13.0-29-generic  N/A
   linux-firmware 1.127.2
  SourcePackage: linux
  UpgradeStatus: Upgraded to trusty on 2014-05-24 (17 days ago)
  dmi.bios.date: 10/15/2012
  dmi.bios.vendor: Acer
  dmi.bios.version: V2.07
  dmi.board.asset.tag: Type2 - Board Asset Tag
  dmi.board.name: VA50_HC_CR
  dmi.board.vendor: Acer
  dmi.board.version: Type2 - Board Version
  dmi.chassis.type: 10
  dmi.chassis.vendor: Acer
  dmi.chassis.version: V2.07
  dmi.modalias: 
dmi:bvnAcer:bvrV2.07:bd10/15/2012:svnAcer:pnAspireV3-571G:pvrV2.07:rvnAcer:rnVA50_HC_CR:rvrType2-BoardVersion:cvnAcer:ct10:cvrV2.07:
  dmi.product.name: Aspire V3-571G
  dmi.product.version: V2.07
  dmi.sys.vendor: Acer

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1328632/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1328866] Re: rcu_bh detected stall alway occur

2014-08-11 Thread Launchpad Bug Tracker
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]

** Changed in: linux (Ubuntu)
   Status: Incomplete = Expired

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1328866

Title:
  rcu_bh detected stall alway occur

Status in “linux” package in Ubuntu:
  Expired

Bug description:
  I have many server running on Ubuntu 12.04 LTS kernel 3.2.0-23-generic,
  but something strange happened in recently. [rcu_bh detected stall]  happend 
  many times.Sometime kernel will die,sometime just a warning in dmesg when 
  [rcu_bh detected stall] happen.

  **
  server information:
  kernel: Ubuntu 3.2.0-23.36-generic 3.2.14
  CPU: Intel(R) Xeon(R) CPU E5-2620 0 @ 2.00GHz
  Intel Corporation I350 Gigabit Network Connection

  **
  Jun 11 15:44:10  [14380700.988692] INFO: rcu_bh detected stall on CPU 19 (t=0 
jiffies)
  Jun 11 15:44:10  [14380700.994604] sending NMI to all CPUs:
  Jun 11 15:44:10  [14380701.000547] NMI backtrace for cpu 0
  Jun 11 15:44:10  [14380701.006244] CPU 0 
  Jun 11 15:44:10  
  Jun 11 15:44:10  [14380701.006321] Modules linked in:
  .
  .
  .
  un 11 15:44:16  [14380702.300237] NMI backtrace for cpu 19
  Jun 11 15:44:16  [14380702.300239] CPU 19 
  Jun 11 15:44:16  [14380702.300240] Modules linked in: iptable_raw netconsole 
configfs tcp_diag inet_diag mptctl mptbase xt_multiport nf_conntrack_ipv4 
nf_defrag_ipv4 xt_state nf_conntrack iptable_filter ip_tables x_tables bnep 
rfcomm bluetooth vesafb ipmi_poweroff ipmi_watchdog ipmi_devintf ipmi_si 
ipmi_msghandler joydev sb_edac lp parport acpi_pad edac_core mac_hid ioatdma 
wmi usbhid hid mpt2sas scsi_transport_sas igb dca raid_class
  Jun 11 15:44:16  [14380702.300366] 
  Jun 11 15:44:16  [14380702.300373] Pid: 0, comm: swapper/19 Tainted: G
   O 3.2.0-23-generic #36-Ubuntu /
  Jun 11 15:44:16  [14380702.300390] RIP: 0010:[81036b8b]  
[81036b8b] __x2apic_send_IPI_mask+0x15b/0x180
  Jun 11 15:44:16  [14380702.300436] igb :05:00.0: Detected Tx Unit Hang
  Jun 11 15:44:16  [14380702.300439]   Tx Queue 1
  Jun 11 15:44:16  [14380702.300440]   TDH  f4b
  Jun 11 15:44:16  [14380702.300442]   TDT  f4b
  Jun 11 15:44:16  [14380702.300452]   next_to_use  f4b
  Jun 11 15:44:16  [14380702.300454]   next_to_cleandfd
  Jun 11 15:44:16  [14380702.300455] buffer_info[next_to_clean]
  Jun 11 15:44:16  [14380702.300457]   time_stamp   1d6b49a03
  Jun 11 15:44:16  [14380702.300467]   next_to_watch88084a14dfe0
  Jun 11 15:44:16  [14380702.300469]   jiffies  1d6b49b48
  Jun 11 15:44:16  [14380702.300471]   desc.status  108201
  Jun 11 15:44:16  [14380702.300486] RSP: 0018:88107fce3d38  EFLAGS: 
0087
  Jun 11 15:44:16  [14380702.300500] RAX: 0100 RBX: 
88107fcedb80 RCX: 0007
  Jun 11 15:44:16  [14380702.300503] RDX: 0007 RSI: 
0100 RDI: 
  Jun 11 15:44:16  [14380702.300505] RBP: 88107fce3d98 R08: 
88107fcedba0 R09: 0100
  Jun 11 15:44:16  [14380702.300508] R10: 2b300055 R11: 
 R12: 88107fc0dba0
  Jun 11 15:44:16  [14380702.300510] R13: dbc0 R14: 
0008 R15: 00020fff
  Jun 11 15:44:16  [14380702.300513] FS:  () 
GS:88107fce() knlGS:
  Jun 11 15:44:16  [14380702.300516] CS:  0010 DS:  ES:  CR0: 
8005003b
  Jun 11 15:44:16  [14380702.300518] CR2: 7ff939554be0 CR3: 
01c05000 CR4: 000406e0
  Jun 11 15:44:16  [14380702.300527] DR0:  DR1: 
 DR2: 
  Jun 11 15:44:16  [14380702.300529] DR3:  DR6: 
0ff0 DR7: 0400
  Jun 11 15:44:16  [14380702.300532] Process swapper/19 (pid: 0, threadinfo 
88084c12, task 88084c118000)
  Jun 11 15:44:16  [14380702.300534] Stack:
  Jun 11 15:44:16  [14380702.300542]  88107fcee7c0 0092 
00137fce3da8 dba0
  Jun 11 15:44:16  [14380702.300559]  0102 0013 
88107fce3db8 2710
  Jun 11 15:44:16  [14380702.300582]  81c30900 81c30b00 
88107fcee7c0 
  Jun 11 15:44:16  [14380702.300600] Call Trace:
  Jun 11 15:44:16  [14380702.300617]  IRQ 
  Jun 11 15:44:16  [14380702.300634]  [81036bcc] 
x2apic_send_IPI_all+0x1c/0x20
  Jun 11 15:44:16  [14380702.300640]  [810326a1] 
arch_trigger_all_cpu_backtrace+0x61/0xa0
  Jun 11 15:44:16  [14380702.300655]  [810e0877] 
check_cpu_stall.isra.36+0x97/0xf0
  Jun 11 15:44:16  [14380702.300667]  [810e0908] 
__rcu_pending+0x38/0x1b0
  Jun 11 15:44:16  

[Kernel-packages] [Bug 1355593] [NEW] \_SB_.PCI0:_OSC invalid UUID

2014-08-11 Thread Cristian Aravena Romero
Public bug reported:

[0.188239] \_SB_.PCI0:_OSC invalid UUID

ProblemType: Bug
DistroRelease: Ubuntu 14.10
Package: linux-image-3.16.0-7-generic 3.16.0-7.12
ProcVersionSignature: Ubuntu 3.16.0-7.12-generic 3.16.0
Uname: Linux 3.16.0-7-generic x86_64
ApportVersion: 2.14.5-0ubuntu4
Architecture: amd64
AudioDevicesInUse:
 USERPID ACCESS COMMAND
 /dev/snd/controlC0:  caravena   2878 F pulseaudio
CurrentDesktop: GNOME
Date: Tue Aug 12 00:32:02 2014
HibernationDevice: RESUME=UUID=360bd2d2-4f44-4311-86d6-4781ac81ee87
InstallationDate: Installed on 2014-04-27 (106 days ago)
InstallationMedia: Ubuntu-GNOME 14.04 LTS Trusty Tahr - Release amd64 
(20140416.2)
MachineType: SAMSUNG ELECTRONICS CO., LTD. 530U3C/530U4C
ProcFB: 0 inteldrmfb
ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.16.0-7-generic 
root=UUID=13144268-2374-4154-83f1-c35d81306190 ro quiet splash vt.handoff=7
RelatedPackageVersions:
 linux-restricted-modules-3.16.0-7-generic N/A
 linux-backports-modules-3.16.0-7-generic  N/A
 linux-firmware1.132
SourcePackage: linux
UpgradeStatus: No upgrade log present (probably fresh install)
dmi.bios.date: 04/15/2013
dmi.bios.vendor: Phoenix Technologies Ltd.
dmi.bios.version: P14AAJ
dmi.board.asset.tag: Base Board Asset Tag
dmi.board.name: SAMSUNG_NP1234567890
dmi.board.vendor: SAMSUNG ELECTRONICS CO., LTD.
dmi.board.version: FAB1
dmi.chassis.asset.tag: No Asset Tag
dmi.chassis.type: 9
dmi.chassis.vendor: SAMSUNG ELECTRONICS CO., LTD.
dmi.chassis.version: 0.1
dmi.modalias: 
dmi:bvnPhoenixTechnologiesLtd.:bvrP14AAJ:bd04/15/2013:svnSAMSUNGELECTRONICSCO.,LTD.:pn530U3C/530U4C:pvr0.1:rvnSAMSUNGELECTRONICSCO.,LTD.:rnSAMSUNG_NP1234567890:rvrFAB1:cvnSAMSUNGELECTRONICSCO.,LTD.:ct9:cvr0.1:
dmi.product.name: 530U3C/530U4C
dmi.product.version: 0.1
dmi.sys.vendor: SAMSUNG ELECTRONICS CO., LTD.

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: amd64 apport-bug utopic

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1355593

Title:
  \_SB_.PCI0:_OSC invalid UUID

Status in “linux” package in Ubuntu:
  New

Bug description:
  [0.188239] \_SB_.PCI0:_OSC invalid UUID

  ProblemType: Bug
  DistroRelease: Ubuntu 14.10
  Package: linux-image-3.16.0-7-generic 3.16.0-7.12
  ProcVersionSignature: Ubuntu 3.16.0-7.12-generic 3.16.0
  Uname: Linux 3.16.0-7-generic x86_64
  ApportVersion: 2.14.5-0ubuntu4
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  caravena   2878 F pulseaudio
  CurrentDesktop: GNOME
  Date: Tue Aug 12 00:32:02 2014
  HibernationDevice: RESUME=UUID=360bd2d2-4f44-4311-86d6-4781ac81ee87
  InstallationDate: Installed on 2014-04-27 (106 days ago)
  InstallationMedia: Ubuntu-GNOME 14.04 LTS Trusty Tahr - Release amd64 
(20140416.2)
  MachineType: SAMSUNG ELECTRONICS CO., LTD. 530U3C/530U4C
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.16.0-7-generic 
root=UUID=13144268-2374-4154-83f1-c35d81306190 ro quiet splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-3.16.0-7-generic N/A
   linux-backports-modules-3.16.0-7-generic  N/A
   linux-firmware1.132
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 04/15/2013
  dmi.bios.vendor: Phoenix Technologies Ltd.
  dmi.bios.version: P14AAJ
  dmi.board.asset.tag: Base Board Asset Tag
  dmi.board.name: SAMSUNG_NP1234567890
  dmi.board.vendor: SAMSUNG ELECTRONICS CO., LTD.
  dmi.board.version: FAB1
  dmi.chassis.asset.tag: No Asset Tag
  dmi.chassis.type: 9
  dmi.chassis.vendor: SAMSUNG ELECTRONICS CO., LTD.
  dmi.chassis.version: 0.1
  dmi.modalias: 
dmi:bvnPhoenixTechnologiesLtd.:bvrP14AAJ:bd04/15/2013:svnSAMSUNGELECTRONICSCO.,LTD.:pn530U3C/530U4C:pvr0.1:rvnSAMSUNGELECTRONICSCO.,LTD.:rnSAMSUNG_NP1234567890:rvrFAB1:cvnSAMSUNGELECTRONICSCO.,LTD.:ct9:cvr0.1:
  dmi.product.name: 530U3C/530U4C
  dmi.product.version: 0.1
  dmi.sys.vendor: SAMSUNG ELECTRONICS CO., LTD.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1355593/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1233602] Re: [Dell Latitude 2120] Realtek card reader [10ec:5208] does not work

2014-08-11 Thread Anthony Wong
Not planning to backport to 14.04 LTS 3.13 kernel at the moment, but
there will be 14.04.2, which will use the Utopic kernel. By then, LTS
users can choose to upgrade to the Utopic kernel/X/Mesa, so LTS users
can also enjoy this driver.

@xuedi, blug not doing so well these days after you left :(

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1233602

Title:
  [Dell Latitude 2120] Realtek card reader [10ec:5208] does not work

Status in “linux” package in Ubuntu:
  Fix Released
Status in “linux-lts-raring” package in Ubuntu:
  Won't Fix

Bug description:
  CID: 201009-6529 Dell Latitude 2120

  I found this bug by chance, the Realtek card reader [10ec:5208] is
  totally not working on 12.04.3 (3.8 kernel)

  This issue has been reported and fixed before, see bug 698006
  It does work in 12.04.2 (3.5 kernel)

  ProblemType: Bug
  DistroRelease: Ubuntu 12.04
  Package: linux-image-3.8.0-31-generic 3.8.0-31.46~precise1
  ProcVersionSignature: Ubuntu 3.8.0-31.46~precise1-generic 3.8.13.8
  Uname: Linux 3.8.0-31-generic x86_64
  AlsaVersion: Advanced Linux Sound Architecture Driver Version 
k3.8.0-31-generic.
  AplayDevices:
    List of PLAYBACK Hardware Devices 
   card 0: Intel [HDA Intel], device 0: ALC269VB Analog [ALC269VB Analog]
 Subdevices: 1/1
 Subdevice #0: subdevice #0
  ApportVersion: 2.0.1-0ubuntu17.5
  Architecture: amd64
  ArecordDevices:
    List of CAPTURE Hardware Devices 
   card 0: Intel [HDA Intel], device 0: ALC269VB Analog [ALC269VB Analog]
 Subdevices: 1/1
 Subdevice #0: subdevice #0
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  ubuntu 1923 F pulseaudio
  CRDA: Error: [Errno 2] No such file or directory
  Card0.Amixer.info:
   Card hw:0 'Intel'/'HDA Intel at 0xf6dfc000 irq 46'
 Mixer name : 'Realtek ALC269VB'
 Components : 'HDA:10ec0269,102804a5,00100100'
 Controls  : 22
 Simple ctrls  : 10
  Date: Tue Oct  1 18:21:42 2013
  EcryptfsInUse: Yes
  HibernationDevice: RESUME=UUID=04a5b630-f1eb-4428-8e9a-2568152fd26a
  InstallationMedia: Ubuntu 12.04.3 LTS Precise Pangolin - Release amd64 
(20130820.1)
  MachineType: Dell Inc. Latitude 2120
  MarkForUpload: True
  ProcEnviron:
   TERM=xterm
   PATH=(custom, no user)
   LANG=en_US.UTF-8
   SHELL=/bin/bash
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.8.0-31-generic 
root=UUID=39a27c46-b70e-40be-9511-e3fd25607fd2 ro quiet splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-3.8.0-31-generic N/A
   linux-backports-modules-3.8.0-31-generic  N/A
   linux-firmware1.79.6
  SourcePackage: linux-lts-raring
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 10/06/2010
  dmi.bios.vendor: Dell Inc.
  dmi.bios.version: W06
  dmi.board.name: DOE3C2
  dmi.board.vendor: Dell Inc.
  dmi.chassis.type: 8
  dmi.chassis.vendor: Dell Inc.
  dmi.modalias: 
dmi:bvnDellInc.:bvrW06:bd10/06/2010:svnDellInc.:pnLatitude2120:pvr:rvnDellInc.:rnDOE3C2:rvr:cvnDellInc.:ct8:cvr:
  dmi.product.name: Latitude 2120
  dmi.sys.vendor: Dell Inc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1233602/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1340116] Re: [Dell Latitude 12 Rugged Extreme 7204] Touchpad recognized as a wheel mouse, horizontal scrolling does not work with 1 or 2 fingers

2014-08-11 Thread Anthony Wong
** Changed in: hwe-next
   Status: New = Triaged

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1340116

Title:
  [Dell Latitude 12 Rugged Extreme 7204] Touchpad recognized as a wheel
  mouse, horizontal scrolling does not work with 1 or 2 fingers

Status in HWE Next Project:
  Triaged
Status in “linux” package in Ubuntu:
  Triaged

Bug description:
  CID: 201402-14663 Dell Latitude 12 Rugged Extreme

  The touchpad on this system was recognized as a Wheel mouse,
  the vertical edge scrolling works, as well as the 2-finger vertical scrolling

  However, horizontal edge scrolling and 2-finger horizontal scrolling does not 
work.
  From the Mouse  Touchpad settings, there is no option for changing 
scrolling behaviour. (Screenshot attached)

  ubuntu@201402-14663:~$ xinput list
  ⎡ Virtual core pointerid=2[master pointer  (3)]
  ⎜   ↳ Virtual core XTEST pointer  id=4[slave  pointer 
 (2)]
  ⎜   ↳ UltraChip UCI Touch id=10   [slave  pointer 
 (2)]
  ⎜   ↳ UltraChip UCI Touch id=11   [slave  pointer 
 (2)]
  ⎜   ↳ ImPS/2 Generic Wheel Mouse  id=15   [slave  pointer 
 (2)]
  ⎣ Virtual core keyboard   id=3[master keyboard (2)]
  ↳ Virtual core XTEST keyboard id=5[slave  
keyboard (3)]
  ↳ Power Buttonid=6[slave  
keyboard (3)]
  ↳ Video Bus   id=7[slave  
keyboard (3)]
  ↳ Power Buttonid=8[slave  
keyboard (3)]
  ↳ Sleep Buttonid=9[slave  
keyboard (3)]
  ↳ Integrated_Webcam_HDid=12   [slave  
keyboard (3)]
  ↳ UVC Camera (114d:1001)  id=13   [slave  
keyboard (3)]
  ↳ AT Translated Set 2 keyboardid=14   [slave  
keyboard (3)]
  ↳ Dell WMI hotkeysid=16   [slave  
keyboard (3)]

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.13.0-30-generic 3.13.0-30.55
  ProcVersionSignature: Ubuntu 3.13.0-30.55-generic 3.13.11.2
  Uname: Linux 3.13.0-30-generic x86_64
  ApportVersion: 2.14.1-0ubuntu3.2
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC1:  ubuntu 1501 F pulseaudio
   /dev/snd/controlC0:  ubuntu 1501 F pulseaudio
  CRDA:
   country TW:
    (2402 - 2472 @ 40), (3, 27)
    (5270 - 5330 @ 40), (3, 17), DFS
    (5735 - 5815 @ 40), (3, 30)
  CurrentDesktop: Unity
  Date: Thu Jul 10 06:01:04 2014
  HibernationDevice: RESUME=UUID=b68f02ad-f5e4-4eb9-b88d-e85f60666734
  InstallationDate: Installed on 2014-07-10 (0 days ago)
  InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Release amd64 (20140417)
  MachineType: Dell Inc. Latitude 12 Rugged Extreme (7204)
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-30-generic.efi.signed 
root=UUID=bdd00fe9-0df9-4b71-92c5-5f94c533f725 ro quiet splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-3.13.0-30-generic N/A
   linux-backports-modules-3.13.0-30-generic  N/A
   linux-firmware 1.127.4
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 05/12/2014
  dmi.bios.vendor: Dell Inc.
  dmi.bios.version: A00
  dmi.board.name: 0TH1GJ
  dmi.board.vendor: Dell Inc.
  dmi.board.version: X02
  dmi.chassis.type: 9
  dmi.chassis.vendor: Dell Inc.
  dmi.modalias: 
dmi:bvnDellInc.:bvrA00:bd05/12/2014:svnDellInc.:pnLatitude12RuggedExtreme(7204):pvr01:rvnDellInc.:rn0TH1GJ:rvrX02:cvnDellInc.:ct9:cvr:
  dmi.product.name: Latitude 12 Rugged Extreme (7204)
  dmi.product.version: 01
  dmi.sys.vendor: Dell Inc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1340116/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1334968] Re: [HP ProBook 445 G1] Microphone mute key does not work

2014-08-11 Thread Anthony Wong
** Changed in: hwe-next
 Assignee: (unassigned) = Hui Wang (hui.wang)

** Changed in: hwe-next
   Importance: Undecided = Medium

** Changed in: hwe-next
   Status: New = Triaged

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1334968

Title:
  [HP ProBook 445 G1] Microphone mute key does not work

Status in HWE Next Project:
  Triaged
Status in “linux” package in Ubuntu:
  Incomplete

Bug description:
  CID: 201307-13919 HP ProBook 445 G1

  The microphone mute key does not work on this system
  Keystroke cannot be detected by xev, but it shows:
  keycode 465 press
  keycode 465 release
  from sudo showkey -k

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.13.0-30-generic 3.13.0-30.54
  ProcVersionSignature: Ubuntu 3.13.0-30.54-generic 3.13.11.2
  Uname: Linux 3.13.0-30-generic x86_64
  ApportVersion: 2.14.1-0ubuntu3.2
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC1:  ubuntu 1508 F pulseaudio
   /dev/snd/pcmC1D0c:   ubuntu 1508 F...m pulseaudio
   /dev/snd/controlC0:  ubuntu 1508 F pulseaudio
  CRDA:
   country TW:
(2402 - 2472 @ 40), (3, 27)
(5270 - 5330 @ 40), (3, 17), DFS
(5735 - 5815 @ 40), (3, 30)
  CurrentDesktop: Unity
  Date: Fri Jun 27 01:10:10 2014
  HibernationDevice: RESUME=UUID=be96939f-ffde-4407-a99e-17beebf60ad5
  InstallationDate: Installed on 2014-06-27 (0 days ago)
  InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Release amd64 (20140417)
  MachineType: Hewlett-Packard HP ProBook 445 G1 Notebook PC
  ProcFB:
   0 radeondrmfb
   1 radeondrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-30-generic 
root=UUID=fd8269ec-b9ab-4f08-8eaf-6c3bfa26a4e1 ro quiet splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-3.13.0-30-generic N/A
   linux-backports-modules-3.13.0-30-generic  N/A
   linux-firmware 1.127.4
  RfKill:
   0: phy0: Wireless LAN
Soft blocked: no
Hard blocked: no
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 09/05/2013
  dmi.bios.vendor: Hewlett-Packard
  dmi.bios.version: 68CPE Ver. F.21
  dmi.board.asset.tag: Base Board Asset Tag
  dmi.board.name: 1950
  dmi.board.vendor: Hewlett-Packard
  dmi.board.version: KBC Version 91.0B
  dmi.chassis.type: 10
  dmi.chassis.vendor: Hewlett-Packard
  dmi.modalias: 
dmi:bvnHewlett-Packard:bvr68CPEVer.F.21:bd09/05/2013:svnHewlett-Packard:pnHPProBook445G1NotebookPC:pvrA201BC1203:rvnHewlett-Packard:rn1950:rvrKBCVersion91.0B:cvnHewlett-Packard:ct10:cvr:
  dmi.product.name: HP ProBook 445 G1 Notebook PC
  dmi.product.version: A201BC1203
  dmi.sys.vendor: Hewlett-Packard

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1334968/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1342548] Re: [Dell Inspiron 5437] Wireless key does not work on this system

2014-08-11 Thread Anthony Wong
** Changed in: hwe-next
   Status: New = In Progress

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1342548

Title:
  [Dell Inspiron 5437] Wireless key does not work on this system

Status in HWE Next Project:
  In Progress
Status in “linux” package in Ubuntu:
  Confirmed

Bug description:
  CID: 201305-13673 Dell Inspiron 5437

  The wireless hotkey does not work on this system

  Steps:
  1. Install 14.04 + update (3.13.0-30), boot to desktop
  2. Try to control wireless / BT with the hotkey

  Expected result:
  * Wireless / BT could be controlled by the hotkey

  Actual result:
  * Hotkey is not working

  Debugging information:
  ubuntu@201305-13673:~$ sudo showkey -k
  kb mode was ?UNKNOWN?
  [ if you are trying this under X, it might not work
  since the X server is also reading /dev/console ]

  press any key (program terminates 10s after last keypress)...
  keycode  28 release
  keycode 240 press
  keycode 240 release
  keycode 240 press
  keycode 240 release
  ^Ccaught signal 2, cleaning up...

  KeyPress event, serial 37, synthetic NO, window 0x3a1,
  root 0x2c0, subw 0x0, time 199006, (-357,353), root:(430,405),
  state 0x0, keycode 248 (keysym 0x0, NoSymbol), same_screen YES,
  XLookupString gives 0 bytes: 
  XmbLookupString gives 0 bytes: 
  XFilterEvent returns: False

  KeyRelease event, serial 37, synthetic NO, window 0x3a1,
  root 0x2c0, subw 0x0, time 199006, (-357,353), root:(430,405),
  state 0x0, keycode 248 (keysym 0x0, NoSymbol), same_screen YES,
  XLookupString gives 0 bytes: 
  XFilterEvent returns: False

  nothing from sudo showkey -s

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.13.0-30-generic 3.13.0-30.55
  ProcVersionSignature: Ubuntu 3.13.0-30.55-generic 3.13.11.2
  Uname: Linux 3.13.0-30-generic x86_64
  NonfreeKernelModules: nvidia
  ApportVersion: 2.14.1-0ubuntu3.2
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  ubuntu 1638 F pulseaudio
   /dev/snd/controlC1:  ubuntu 1638 F pulseaudio
  CRDA:
   country TW:
(2402 - 2472 @ 40), (3, 27)
(5270 - 5330 @ 40), (3, 17), DFS
(5735 - 5815 @ 40), (3, 30)
  CurrentDesktop: Unity
  Date: Wed Jul 16 01:56:06 2014
  HibernationDevice: RESUME=UUID=67674077-ce03-4513-b8be-b3e9bdd8840d
  InstallationDate: Installed on 2014-07-16 (0 days ago)
  InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Release amd64 (20140417)
  MachineType: Dell Inc. Inspiron 5437
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-30-generic.efi.signed 
root=UUID=e56f47e4-b04b-4702-b89f-59e1c08572c4 ro quiet splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-3.13.0-30-generic N/A
   linux-backports-modules-3.13.0-30-generic  N/A
   linux-firmware 1.127.4
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 11/14/2013
  dmi.bios.vendor: Dell Inc.
  dmi.bios.version: A07
  dmi.board.vendor: Dell Inc.
  dmi.board.version: A07
  dmi.chassis.type: 8
  dmi.chassis.vendor: Dell Inc.
  dmi.chassis.version: Not Specified
  dmi.modalias: 
dmi:bvnDellInc.:bvrA07:bd11/14/2013:svnDellInc.:pnInspiron5437:pvrNotSpecified:rvnDellInc.:rn:rvrA07:cvnDellInc.:ct8:cvrNotSpecified:
  dmi.product.name: Inspiron 5437
  dmi.product.version: Not Specified
  dmi.sys.vendor: Dell Inc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1342548/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1355593] Status changed to Confirmed

2014-08-11 Thread Brad Figg
This change was made by a bot.

** Changed in: linux (Ubuntu)
   Status: New = Confirmed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1355593

Title:
  \_SB_.PCI0:_OSC invalid UUID

Status in “linux” package in Ubuntu:
  Confirmed

Bug description:
  [0.188239] \_SB_.PCI0:_OSC invalid UUID

  ProblemType: Bug
  DistroRelease: Ubuntu 14.10
  Package: linux-image-3.16.0-7-generic 3.16.0-7.12
  ProcVersionSignature: Ubuntu 3.16.0-7.12-generic 3.16.0
  Uname: Linux 3.16.0-7-generic x86_64
  ApportVersion: 2.14.5-0ubuntu4
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  caravena   2878 F pulseaudio
  CurrentDesktop: GNOME
  Date: Tue Aug 12 00:32:02 2014
  HibernationDevice: RESUME=UUID=360bd2d2-4f44-4311-86d6-4781ac81ee87
  InstallationDate: Installed on 2014-04-27 (106 days ago)
  InstallationMedia: Ubuntu-GNOME 14.04 LTS Trusty Tahr - Release amd64 
(20140416.2)
  MachineType: SAMSUNG ELECTRONICS CO., LTD. 530U3C/530U4C
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.16.0-7-generic 
root=UUID=13144268-2374-4154-83f1-c35d81306190 ro quiet splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-3.16.0-7-generic N/A
   linux-backports-modules-3.16.0-7-generic  N/A
   linux-firmware1.132
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 04/15/2013
  dmi.bios.vendor: Phoenix Technologies Ltd.
  dmi.bios.version: P14AAJ
  dmi.board.asset.tag: Base Board Asset Tag
  dmi.board.name: SAMSUNG_NP1234567890
  dmi.board.vendor: SAMSUNG ELECTRONICS CO., LTD.
  dmi.board.version: FAB1
  dmi.chassis.asset.tag: No Asset Tag
  dmi.chassis.type: 9
  dmi.chassis.vendor: SAMSUNG ELECTRONICS CO., LTD.
  dmi.chassis.version: 0.1
  dmi.modalias: 
dmi:bvnPhoenixTechnologiesLtd.:bvrP14AAJ:bd04/15/2013:svnSAMSUNGELECTRONICSCO.,LTD.:pn530U3C/530U4C:pvr0.1:rvnSAMSUNGELECTRONICSCO.,LTD.:rnSAMSUNG_NP1234567890:rvrFAB1:cvnSAMSUNGELECTRONICSCO.,LTD.:ct9:cvr0.1:
  dmi.product.name: 530U3C/530U4C
  dmi.product.version: 0.1
  dmi.sys.vendor: SAMSUNG ELECTRONICS CO., LTD.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1355593/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1341925] Re: [Dell Inspiron 11 - 3147] System will hang on reboot / poweroff

2014-08-11 Thread Anthony Wong
** Changed in: hwe-next
 Assignee: (unassigned) = Jesse Sung (wenchien)

** Changed in: hwe-next
   Status: New = Triaged

** Changed in: hwe-next
   Importance: Undecided = Medium

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1341925

Title:
  [Dell Inspiron 11 - 3147] System will hang on reboot / poweroff

Status in HWE Next Project:
  Triaged
Status in “linux” package in Ubuntu:
  Confirmed

Bug description:
  CID: 201403-14888 Dell Inspiron 11 - 3147

  While rebooting this system, it will stuck on the Ubuntu splash screen, caps 
lock LED will be not responding.
  This issue happens right after 14.04 installation with USB stick.

  If you press F1 right after the Ubuntu splash screen appears, you will see 
the message indicating it's now rebooting:
  * Deactivating swap... [OK]
  * Unmounting local filesystems...  [OK]
  * Will now restart

  Steps:
  1. Install 14.04, reboot to desktop
  2. Try to reboot again

  Expect result:
  * System could be reboot normally

  Actual result:
  * It will stuck on the Ubuntu splash screen, the only way to power it off is 
to hold the power button

  Same thing could be apply to Shut Down
  * Unmounting local filesystems...  [OK]
  * Will now halt

  
  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.13.0-24-generic 3.13.0-24.46 [modified: 
boot/vmlinuz-3.13.0-24-generic]
  ProcVersionSignature: Ubuntu 3.13.0-24.46-generic 3.13.9
  Uname: Linux 3.13.0-24-generic x86_64
  ApportVersion: 2.14.1-0ubuntu3
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  ubuntu 1431 F pulseaudio
  CRDA:
   country TW:
    (2402 - 2472 @ 40), (3, 27)
    (5270 - 5330 @ 40), (3, 17), DFS
    (5735 - 5815 @ 40), (3, 30)
  CurrentDesktop: Unity
  Date: Mon Jul 14 22:25:58 2014
  HibernationDevice: RESUME=UUID=b30f45e9-6fc7-4aa0-adff-37e7c87c19cd
  InstallationDate: Installed on 2014-07-15 (0 days ago)
  InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Release amd64 (20140417)
  MachineType: Dell Inc. Inspiron 11 - 3147
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-24-generic.efi.signed 
root=UUID=cc246aa9-85c1-49ac-b06b-6c0f4e37dbea ro quiet splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-3.13.0-24-generic N/A
   linux-backports-modules-3.13.0-24-generic  N/A
   linux-firmware 1.127
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 05/05/2014
  dmi.bios.vendor: Dell Inc.
  dmi.bios.version: A01
  dmi.board.name: 00K010
  dmi.board.vendor: Dell Inc.
  dmi.board.version: D02
  dmi.chassis.type: 8
  dmi.chassis.vendor: Dell Inc.
  dmi.chassis.version: A01
  dmi.modalias: 
dmi:bvnDellInc.:bvrA01:bd05/05/2014:svnDellInc.:pnInspiron11-3147:pvr:rvnDellInc.:rn00K010:rvrD02:cvnDellInc.:ct8:cvrA01:
  dmi.product.name: Inspiron 11 - 3147
  dmi.sys.vendor: Dell Inc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1341925/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1352821] Re: 0489:e078 - Qualcom Atheros - Ubuntu 14.04 bluetooth not working

2014-08-11 Thread bala
Dear All,

Pls help to provide the solution for the Bluetooth issue .


Regds,
Bala S

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to bluez in Ubuntu.
https://bugs.launchpad.net/bugs/1352821

Title:
  0489:e078 - Qualcom Atheros - Ubuntu 14.04 bluetooth not working

Status in “bluez” package in Ubuntu:
  Confirmed

Bug description:
  Hi,

  Nature of peoblem : Bluetooth not wotrking under Ubuntu 14.04 but wifi
  working fine. pls help to provide the solution

  Vendor ID : 0489:e078
  Make of Wifi BT combo : Qualcom Atheros QCA9565 /AR9565 

  Regds,
  Bala S

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/bluez/+bug/1352821/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1355445] Re: linux: 2.6.32-65.129 -proposed tracker

2014-08-11 Thread Brad Figg
** Changed in: kernel-sru-workflow/prepare-package
   Status: New = Fix Released

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) = Brad Figg 
(brad-figg)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1355445

Title:
  linux: 2.6.32-65.129 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  New
Status in Kernel SRU Workflow package-testing series:
  New
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-lbm series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-ports-meta series:
  New
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in “linux” package in Ubuntu:
  Invalid
Status in “linux” source package in Lucid:
  New

Bug description:
  This bug is for tracking the 2.6.32-65.129 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Monday, 11. August 2014 21:00 UTC
  kernel-stable-phase:Prepare
  kernel-stable-phase-changed:Monday, 11. August 2014 21:00 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1355445/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1355595] Status changed to Confirmed

2014-08-11 Thread Brad Figg
This change was made by a bot.

** Changed in: linux (Ubuntu)
   Status: New = Confirmed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1355595

Title:
  ACPI Warning: SystemIO range 0x0428-0x042f
  conflicts with OpRegion 0x0400-0x047f (\PMIO)
  (20140424/utaddress-258)

Status in “linux” package in Ubuntu:
  Confirmed

Bug description:
  [4.716997] ACPI Warning: SystemIO range 
0x0428-0x042f conflicts with OpRegion 
0x0400-0x047f (\PMIO) (20140424/utaddress-258)
  [4.717010] ACPI: If an ACPI driver is available for this device, you 
should use it instead of the native driver
  [4.717030] ACPI Warning: SystemIO range 
0x0540-0x054f conflicts with OpRegion 
0x0500-0x0563 (\GPIO) (20140424/utaddress-258)
  [4.717039] ACPI: If an ACPI driver is available for this device, you 
should use it instead of the native driver
  [4.717042] ACPI Warning: SystemIO range 
0x0530-0x053f conflicts with OpRegion 
0x0500-0x0563 (\GPIO) (20140424/utaddress-258)
  [4.717049] ACPI: If an ACPI driver is available for this device, you 
should use it instead of the native driver
  [4.717052] ACPI Warning: SystemIO range 
0x0500-0x052f conflicts with OpRegion 
0x0500-0x0563 (\GPIO) (20140424/utaddress-258)

  ProblemType: Bug
  DistroRelease: Ubuntu 14.10
  Package: linux-image-3.16.0-7-generic 3.16.0-7.12
  ProcVersionSignature: Ubuntu 3.16.0-7.12-generic 3.16.0
  Uname: Linux 3.16.0-7-generic x86_64
  ApportVersion: 2.14.5-0ubuntu4
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  caravena   2878 F pulseaudio
  CurrentDesktop: GNOME
  Date: Tue Aug 12 00:36:31 2014
  HibernationDevice: RESUME=UUID=360bd2d2-4f44-4311-86d6-4781ac81ee87
  InstallationDate: Installed on 2014-04-27 (106 days ago)
  InstallationMedia: Ubuntu-GNOME 14.04 LTS Trusty Tahr - Release amd64 
(20140416.2)
  MachineType: SAMSUNG ELECTRONICS CO., LTD. 530U3C/530U4C
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.16.0-7-generic 
root=UUID=13144268-2374-4154-83f1-c35d81306190 ro quiet splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-3.16.0-7-generic N/A
   linux-backports-modules-3.16.0-7-generic  N/A
   linux-firmware1.132
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 04/15/2013
  dmi.bios.vendor: Phoenix Technologies Ltd.
  dmi.bios.version: P14AAJ
  dmi.board.asset.tag: Base Board Asset Tag
  dmi.board.name: SAMSUNG_NP1234567890
  dmi.board.vendor: SAMSUNG ELECTRONICS CO., LTD.
  dmi.board.version: FAB1
  dmi.chassis.asset.tag: No Asset Tag
  dmi.chassis.type: 9
  dmi.chassis.vendor: SAMSUNG ELECTRONICS CO., LTD.
  dmi.chassis.version: 0.1
  dmi.modalias: 
dmi:bvnPhoenixTechnologiesLtd.:bvrP14AAJ:bd04/15/2013:svnSAMSUNGELECTRONICSCO.,LTD.:pn530U3C/530U4C:pvr0.1:rvnSAMSUNGELECTRONICSCO.,LTD.:rnSAMSUNG_NP1234567890:rvrFAB1:cvnSAMSUNGELECTRONICSCO.,LTD.:ct9:cvr0.1:
  dmi.product.name: 530U3C/530U4C
  dmi.product.version: 0.1
  dmi.sys.vendor: SAMSUNG ELECTRONICS CO., LTD.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1355595/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1338866] Re: [Compaq 15 Touchsmart] Wireless LED won't change color

2014-08-11 Thread Anthony Wong
** Changed in: linux (Ubuntu)
 Assignee: Musaab Jameel (mosaabjm) = Liming Wang (wangliming)

** Changed in: hwe-next
 Assignee: (unassigned) = Liming Wang (wangliming)

** Changed in: hwe-next
   Importance: Undecided = Medium

** Changed in: hwe-next
   Status: New = Triaged

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1338866

Title:
  [Compaq 15 Touchsmart] Wireless LED won't change color

Status in HWE Next Project:
  Triaged
Status in “linux” package in Ubuntu:
  Confirmed

Bug description:
  CID: 201309-13164 Compaq 15 Touchsmart

  The wireless LED won't change color while disabled

  Steps:
  1. Install 14.04 + update (3.13.0-30)
  2. Test the wireless key

  Expected result:
  * Wireless key should work, and the LED should change color when the wireless 
is disabled

  Actual result:
  * Wireless would be disabled by the hotkey, but the LED won't change color.

  
  Note: the wireless key does not work at all before upgrading the system.

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.13.0-30-generic 3.13.0-30.55
  ProcVersionSignature: Ubuntu 3.13.0-30.55-generic 3.13.11.2
  Uname: Linux 3.13.0-30-generic x86_64
  ApportVersion: 2.14.1-0ubuntu3.2
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  ubuntu 1451 F pulseaudio
  CurrentDesktop: Unity
  CurrentDmesg:
   [   21.821955] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
   [   48.284935] type=1400 audit(1404790545.469:74): apparmor=STATUS 
operation=profile_replace profile=unconfined 
name=/usr/lib/cups/backend/cups-pdf pid=2014 comm=apparmor_parser
   [   48.284942] type=1400 audit(1404790545.469:75): apparmor=STATUS 
operation=profile_replace profile=unconfined name=/usr/sbin/cupsd 
pid=2014 comm=apparmor_parser
   [   48.285354] type=1400 audit(1404790545.469:76): apparmor=STATUS 
operation=profile_replace profile=unconfined name=/usr/sbin/cupsd 
pid=2014 comm=apparmor_parser
   [  106.599254] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready
  Date: Mon Jul  7 23:36:43 2014
  HibernationDevice: RESUME=UUID=506e69ad-2133-4a43-9371-0ccac623c380
  InstallationDate: Installed on 2014-07-08 (0 days ago)
  InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Release amd64 (20140417)
  MachineType: Hewlett-Packard Compaq 15 Notebook PC
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-30-generic.efi.signed 
root=UUID=8ac44edb-d2cd-4778-81c7-19b1a86d27bb ro quiet splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-3.13.0-30-generic N/A
   linux-backports-modules-3.13.0-30-generic  N/A
   linux-firmware 1.127.4
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 11/20/2013
  dmi.bios.vendor: Insyde
  dmi.bios.version: B.13.T02
  dmi.board.asset.tag: Type2 - Board Asset Tag
  dmi.board.name: 218F
  dmi.board.vendor: Hewlett-Packard
  dmi.board.version: 39.21
  dmi.chassis.asset.tag: Chassis Asset Tag
  dmi.chassis.type: 10
  dmi.chassis.vendor: Hewlett-Packard
  dmi.chassis.version: Chassis Version
  dmi.modalias: 
dmi:bvnInsyde:bvrB.13.T02:bd11/20/2013:svnHewlett-Packard:pnCompaq15NotebookPC:pvr099B1002005000112:rvnHewlett-Packard:rn218F:rvr39.21:cvnHewlett-Packard:ct10:cvrChassisVersion:
  dmi.product.name: Compaq 15 Notebook PC
  dmi.product.version: 099B1002005000112
  dmi.sys.vendor: Hewlett-Packard

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1338866/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


<    1   2