[Kernel-packages] [Bug 1409890] Re: linux: 3.16.0-30.40 -proposed tracker

2015-01-12 Thread Brad Figg
All builds are complete, packages in this bug can be copied to
-proposed.

Backport packages from packages here can be worked on, the following tracking 
bugs were opened for them:
linux-lts-utopic (14.04.1) - bug 1410070

** Changed in: kernel-sru-workflow/prepare-package
   Status: New => Fix Released

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Seth Forshee 
(sforshee)

** Changed in: kernel-sru-workflow/promote-to-proposed
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/package-testing
   Status: New => In Progress

** Changed in: kernel-sru-workflow/package-testing
   Status: In Progress => Confirmed

** Description changed:

  This bug is for tracking the 3.16.0-30.40 upload package. This bug will
  contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Monday, 12. January 2015 20:07 UTC
- kernel-stable-phase:Prepare
- kernel-stable-phase-changed:Monday, 12. January 2015 20:07 UTC
+ kernel-stable-phase:PPA Testing
+ kernel-stable-phase-changed:Tuesday, 13. January 2015 07:03 UTC
+ kernel-stable-Prepare-package-end:Tuesday, 13. January 2015 07:03 UTC
+ kernel-stable-Promote-to-proposed-start:Tuesday, 13. January 2015 07:03 UTC
+ ppa-package-testing-start:Tuesday, 13. January 2015 07:03 UTC

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1409890

Title:
  linux: 3.16.0-30.40 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  New
Status in Kernel SRU Workflow package-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Confirmed
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux package in Ubuntu:
  Invalid

Bug description:
  This bug is for tracking the 3.16.0-30.40 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Monday, 12. January 2015 20:07 UTC
  kernel-stable-phase:PPA Testing
  kernel-stable-phase-changed:Tuesday, 13. January 2015 07:03 UTC
  kernel-stable-Prepare-package-end:Tuesday, 13. January 2015 07:03 UTC
  kernel-stable-Promote-to-proposed-start:Tuesday, 13. January 2015 07:03 UTC
  ppa-package-testing-start:Tuesday, 13. January 2015 07:03 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1409890/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1392071] Re: sane (scanimage -L) hangs

2015-01-12 Thread Launchpad Bug Tracker
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]

** Changed in: linux (Ubuntu)
   Status: Incomplete => Expired

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1392071

Title:
  sane (scanimage -L) hangs

Status in linux package in Ubuntu:
  Expired

Bug description:
  dmesg:

  [ 3600.928077] INFO: task saned:8150 blocked for more than 120 seconds.
  [ 3600.928089]   Not tainted 3.13.0-39-generic #66-Ubuntu
  [ 3600.928091] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables 
this message.
  [ 3600.928094] saned   D da5d1540 0  8150   1185 0x
  [ 3600.928102]  c649fec8 00200086 c108a36a da5d1540  c1a92540 
4a81b2d8 02bb
  [ 3600.928109]  c1a92540 d67a4e00 da23c100 da5d1540  da23c144 
da23c144 241d
  [ 3600.928115]  c649fecc c1088fab da5d1540 da5d1540 da08a700 da5d1540 
da5d1540 c649feb4
  [ 3600.928122] Call Trace:
  [ 3600.928140]  [] ? check_preempt_wakeup+0x1aa/0x250
  [ 3600.928145]  [] ? update_curr+0x12b/0x1e0
  [ 3600.928154]  [] ? __enqueue_entity+0x6d/0x80
  [ 3600.928179]  [] schedule_preempt_disabled+0x23/0x60
  [ 3600.928184]  [] __mutex_lock_slowpath+0x10d/0x171
  [ 3600.928190]  [] mutex_lock+0x1c/0x28
  [ 3600.928198]  [] pp_ioctl+0x1b/0x40 [ppdev]
  [ 3600.928203]  [] ? pp_do_ioctl+0x860/0x860 [ppdev]
  [ 3600.928211]  [] do_vfs_ioctl+0x2e2/0x4d0
  [ 3600.928215]  [] ? __schedule+0x358/0x770
  [ 3600.928219]  [] ? final_putname+0x1d/0x40
  [ 3600.928223]  [] ? putname+0x24/0x40
  [ 3600.928234]  [] ? do_sys_open+0x196/0x260
  [ 3600.928238]  [] SyS_ioctl+0x60/0x80
  [ 3600.928248]  [] sysenter_do_call+0x12/0x12
  [ 3600.928254] INFO: task scanimage:8549 blocked for more than 120 seconds.
  [ 3600.928256]   Not tainted 3.13.0-39-generic #66-Ubuntu
  [ 3600.928258] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables 
this message.
  [ 3600.928260] scanimage   D d467db00 0  8549   8422 0x
  [ 3600.928264]  d52dfec8 0082 d467db00 d467db00 d52dfef4 c1a92540 
c1924a00 0024
  [ 3600.928270]  c1a92540 c1924a00 d467db00 da5d1540  0008 
db026aa4 
  [ 3600.928276]  d52dfef4 c0190d20 d52dfee0 c1186d00 d52dff80 d52dfec0 
daf01000 
  [ 3600.928282] Call Trace:
  [ 3600.928287]  [] ? path_openat+0xb0/0x520
  [ 3600.928293]  [] schedule_preempt_disabled+0x23/0x60
  [ 3600.928297]  [] __mutex_lock_slowpath+0x10d/0x171
  [ 3600.928302]  [] mutex_lock+0x1c/0x28
  [ 3600.928307]  [] pp_ioctl+0x1b/0x40 [ppdev]
  [ 3600.928312]  [] ? pp_do_ioctl+0x860/0x860 [ppdev]
  [ 3600.928316]  [] do_vfs_ioctl+0x2e2/0x4d0
  [ 3600.928320]  [] ? final_putname+0x1d/0x40
  [ 3600.928324]  [] ? final_putname+0x1d/0x40
  [ 3600.928327]  [] ? putname+0x24/0x40
  [ 3600.928331]  [] ? do_sys_open+0x196/0x260
  [ 3600.928336]  [] SyS_ioctl+0x60/0x80
  [ 3600.928340]  [] sysenter_do_call+0x12/0x12

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1392071/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1391732] Re: Ubuntu 14.4 problem

2015-01-12 Thread Launchpad Bug Tracker
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]

** Changed in: linux (Ubuntu)
   Status: Incomplete => Expired

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1391732

Title:
  Ubuntu 14.4 problem

Status in linux package in Ubuntu:
  Expired

Bug description:
  My touchpad is not working ever since I installed ubuntu 14.4 . However 
connecting mouse works.
  On running the command "cat /proc/bus/input/devices" , touchpad is not shown 
up too.
  I am using Dell Inpiron 3521 model.
  Synaptics touchpad
  Touchpad not working ever since I installed ubuntu 14.4 .
  Please help me.
  I am attaching the required files.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1391732/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1388415] Re: jstest-gtk doesn't detect my joystick

2015-01-12 Thread Launchpad Bug Tracker
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]

** Changed in: linux (Ubuntu)
   Status: Incomplete => Expired

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1388415

Title:
  jstest-gtk doesn't detect my joystick

Status in linux package in Ubuntu:
  Expired

Bug description:
  I installed the program, plugged in my joystick, and started the
  program. No Joystick is listed by program. So I hit refresh and
  preferences. Nothing happens. So I close and look for updates. i find
  none. Please fix this bug in ubuntu 14.10.

  ProblemType: Bug
  DistroRelease: Ubuntu 14.10
  Package: jstest-gtk 0.1.1~git20140501-1
  ProcVersionSignature: Ubuntu 3.16.0-24.32-generic 3.16.4
  Uname: Linux 3.16.0-24-generic x86_64
  ApportVersion: 2.14.7-0ubuntu8
  Architecture: amd64
  CurrentDesktop: Unity
  Date: Sat Nov  1 12:35:10 2014
  ExecutablePath: /usr/bin/jstest-gtk
  InstallationDate: Installed on 2014-11-01 (0 days ago)
  InstallationMedia: Ubuntu 14.10 "Utopic Unicorn" - Release amd64 (20141022.1)
  ProcEnviron:
   PATH=(custom, no user)
   LANGUAGE=en_US
   XDG_RUNTIME_DIR=
   LANG=en_US.UTF-8
   SHELL=/bin/bash
  SourcePackage: jstest-gtk
  UpgradeStatus: No upgrade log present (probably fresh install)
  --- 
  ApportVersion: 2.14.7-0ubuntu8
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC3:  sleek  3211 F pulseaudio
   /dev/snd/controlC2:  sleek  3211 F pulseaudio
   /dev/snd/controlC1:  sleek  3211 F pulseaudio
   /dev/snd/controlC0:  sleek  3211 F pulseaudio
  CurrentDesktop: Unity
  DistroRelease: Ubuntu 14.10
  HibernationDevice: RESUME=UUID=797c8ad1-472a-4053-9fec-ce2921ae5a58
  InstallationDate: Installed on 2014-11-06 (7 days ago)
  InstallationMedia: Ubuntu 14.10 "Utopic Unicorn" - Release amd64 (20141022.1)
  IwConfig:
   eth0  no wireless extensions.
   
   lono wireless extensions.
  MachineType: To be filled by O.E.M. To be filled by O.E.M.
  Package: linux (not installed)
  ProcFB:
   0 radeondrmfb
   1 radeondrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.16.0-24-generic 
root=UUID=f3d7f8a3-8642-4a40-a0e5-2082aaa0e887 ro quiet splash vt.handoff=7
  ProcVersionSignature: Ubuntu 3.16.0-24.32-generic 3.16.4
  RelatedPackageVersions:
   linux-restricted-modules-3.16.0-24-generic N/A
   linux-backports-modules-3.16.0-24-generic  N/A
   linux-firmware 1.138
  RfKill:
   
  Tags:  utopic
  Uname: Linux 3.16.0-24-generic x86_64
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: adm autopilot cdrom dip lpadmin plugdev sambashare sudo
  _MarkForUpload: True
  dmi.bios.date: 04/03/2014
  dmi.bios.vendor: American Megatrends Inc.
  dmi.bios.version: 2501
  dmi.board.asset.tag: To be filled by O.E.M.
  dmi.board.name: M5A99X EVO R2.0
  dmi.board.vendor: ASUSTeK COMPUTER INC.
  dmi.board.version: Rev 1.xx
  dmi.chassis.asset.tag: To Be Filled By O.E.M.
  dmi.chassis.type: 3
  dmi.chassis.vendor: To Be Filled By O.E.M.
  dmi.chassis.version: To Be Filled By O.E.M.
  dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvr2501:bd04/03/2014:svnTobefilledbyO.E.M.:pnTobefilledbyO.E.M.:pvrTobefilledbyO.E.M.:rvnASUSTeKCOMPUTERINC.:rnM5A99XEVOR2.0:rvrRev1.xx:cvnToBeFilledByO.E.M.:ct3:cvrToBeFilledByO.E.M.:
  dmi.product.name: To be filled by O.E.M.
  dmi.product.version: To be filled by O.E.M.
  dmi.sys.vendor: To be filled by O.E.M.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1388415/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1388038] Re: iwl-3945 wi-fi driver crashes when docking my laptop running linux-image-3.16.0

2015-01-12 Thread Launchpad Bug Tracker
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]

** Changed in: linux (Ubuntu)
   Status: Incomplete => Expired

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1388038

Title:
  iwl-3945 wi-fi driver crashes when docking my laptop running linux-
  image-3.16.0

Status in linux package in Ubuntu:
  Expired

Bug description:
  When I dock my Thinkpad T60 into an Advanced Docking Station, wifi
  driver crashes.

  Digging the issue, problem also occurs with linux-image-3.16.0-23.
  No bug with 3.13.0-37-generic

  
  ProblemType: Bug
  DistroRelease: Ubuntu 14.10
  Package: linux-image-3.16.0-24-generic 3.16.0-24.32
  ProcVersionSignature: Ubuntu 3.16.0-23.31-generic 3.16.4
  Uname: Linux 3.16.0-23-generic i686
  ApportVersion: 2.14.7-0ubuntu8
  Architecture: i386
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  eric   2732 F pulseaudio
  CurrentDesktop: Unity
  Date: Fri Oct 31 11:52:47 2014
  HibernationDevice: RESUME=UUID=146611d8-df02-40f2-a999-dbab535f81f9
  InstallationDate: Installed on 2012-06-18 (864 days ago)
  InstallationMedia: Ubuntu 11.10 "Oneiric Ocelot" - Release i386 (20111012)
  MachineType: LENOVO 1952AT7
  PccardctlIdent:
   Socket 0:
     no product info available
  PccardctlStatus:
   Socket 0:
     no card
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.16.0-23-generic 
root=UUID=35910738-c8fc-48e5-8b80-5c7766a720fc ro quiet splash 
enable_mtrr_cleanup mtrr_spare_reg_nr=2
  RelatedPackageVersions:
   linux-restricted-modules-3.16.0-23-generic N/A
   linux-backports-modules-3.16.0-23-generic  N/A
   linux-firmware 1.138
  SourcePackage: linux
  UpgradeStatus: Upgraded to utopic on 2014-10-30 (0 days ago)
  dmi.bios.date: 03/21/2011
  dmi.bios.vendor: LENOVO
  dmi.bios.version: 79ETE7WW (2.27 )
  dmi.board.name: 1952AT7
  dmi.board.vendor: LENOVO
  dmi.board.version: Not Available
  dmi.chassis.asset.tag: 1952at7l3a9167
  dmi.chassis.type: 10
  dmi.chassis.vendor: LENOVO
  dmi.chassis.version: Not Available
  dmi.modalias: 
dmi:bvnLENOVO:bvr79ETE7WW(2.27):bd03/21/2011:svnLENOVO:pn1952AT7:pvrThinkPadT60:rvnLENOVO:rn1952AT7:rvrNotAvailable:cvnLENOVO:ct10:cvrNotAvailable:
  dmi.product.name: 1952AT7
  dmi.product.version: ThinkPad T60
  dmi.sys.vendor: LENOVO

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1388038/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1392119] Re: pm-hibernate causes "Freezing of tasks failed after 20.01 seconds (1 tasks refusing to freeze, wq_busy=0)" then resumption of session after about 15 seconds

2015-01-12 Thread Launchpad Bug Tracker
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]

** Changed in: linux (Ubuntu)
   Status: Incomplete => Expired

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1392119

Title:
  pm-hibernate causes "Freezing of tasks failed after 20.01 seconds (1
  tasks refusing to freeze, wq_busy=0)" then resumption of session after
  about 15 seconds

Status in linux package in Ubuntu:
  Expired

Bug description:
  Syslog contents:

  Nov 12 17:33:06 Lenovo-laptop kernel: [  174.024253] PM: Marking nosave 
pages: 0009f000 - 0010
  Nov 12 17:33:06 Lenovo-laptop kernel: [  174.024262] PM: Basic memory bitmaps 
created
  Nov 12 17:33:27 Lenovo-laptop kernel: [  174.024264] PM: Syncing filesystems 
... done.
  Nov 12 17:33:27 Lenovo-laptop kernel: [  174.172074] Freezing user space 
processes ... 
  Nov 12 17:33:27 Lenovo-laptop kernel: [  194.188103] Freezing of tasks failed 
after 20.01 seconds (1 tasks refusing to freeze, wq_busy=0):
  Nov 12 17:33:27 Lenovo-laptop kernel: [  194.188260] pci_devices D 
c186b7e4 0  1293   1189 0x0084
  Nov 12 17:33:27 Lenovo-laptop kernel: [  194.188267]  f21e1ec4 0086 
f21e1e50 c186b7e4  f58c0ca0 c1930e00 c1930e00
  Nov 12 17:33:27 Lenovo-laptop kernel: [  194.188278]  f51a9570 0007 
f6307e00 f521e500 f3abf1a0 c186b7c0 0246 c186b7c0
  Nov 12 17:33:27 Lenovo-laptop kernel: [  194.188289]  0001 f521e500 
 f21e1f24 c10fd79c c186c180 0001 0041
  Nov 12 17:33:27 Lenovo-laptop kernel: [  194.188299] Call Trace:
  Nov 12 17:33:27 Lenovo-laptop kernel: [  194.188311]  [] ? 
__alloc_pages_nodemask+0xfc/0x6e0
  Nov 12 17:33:27 Lenovo-laptop kernel: [  194.188319]  [] 
schedule+0x35/0x50
  Nov 12 17:33:27 Lenovo-laptop kernel: [  194.188323]  [] 
__mutex_lock_slowpath+0xc6/0x120
  Nov 12 17:33:27 Lenovo-laptop kernel: [  194.188328]  [] 
mutex_lock+0x24/0x40
  Nov 12 17:33:27 Lenovo-laptop kernel: [  194.188334]  [] 
control_store+0x43/0xc0
  Nov 12 17:33:27 Lenovo-laptop kernel: [  194.188339]  [] ? 
rtpm_active_time_show+0x70/0x70
  Nov 12 17:33:27 Lenovo-laptop kernel: [  194.188345]  [] 
dev_attr_store+0x23/0x40
  Nov 12 17:33:27 Lenovo-laptop kernel: [  194.188352]  [] 
sysfs_write_file+0xa6/0x100
  Nov 12 17:33:27 Lenovo-laptop kernel: [  194.188357]  [] 
vfs_write+0x8f/0x160
  Nov 12 17:33:27 Lenovo-laptop kernel: [  194.188362]  [] ? 
sysfs_poll+0x80/0x80
  Nov 12 17:33:27 Lenovo-laptop kernel: [  194.188366]  [] 
sys_write+0x3d/0x70
  Nov 12 17:33:27 Lenovo-laptop kernel: [  194.188372]  [] 
sysenter_do_call+0x12/0x28
  Nov 12 17:33:27 Lenovo-laptop kernel: [  194.188460] 
  Nov 12 17:33:27 Lenovo-laptop rtkit-daemon[1523]: The canary thread is 
apparently starving. Taking action.
  Nov 12 17:33:27 Lenovo-laptop rtkit-daemon[1523]: Demoting known real-time 
threads.
  Nov 12 17:33:27 Lenovo-laptop rtkit-daemon[1523]: Successfully demoted thread 
1712 of process 1708 (n/a).
  Nov 12 17:33:27 Lenovo-laptop rtkit-daemon[1523]: Successfully demoted thread 
1711 of process 1708 (n/a).
  Nov 12 17:33:27 Lenovo-laptop rtkit-daemon[1523]: Successfully demoted thread 
1708 of process 1708 (n/a).
  Nov 12 17:33:27 Lenovo-laptop rtkit-daemon[1523]: Demoted 3 threads.
  Nov 12 17:33:27 Lenovo-laptop kernel: [  194.188462] Restarting tasks ... 
done.
  Nov 12 17:33:27 Lenovo-laptop kernel: [  194.198787] PM: Basic memory bitmaps 
freed
  Nov 12 17:33:27 Lenovo-laptop kernel: [  194.292501] video LNXVIDEO:01: 
Restoring backlight state
  Nov 12 17:33:27 Lenovo-laptop acpid: client 1078[0:0] has disconnected
  Nov 12 17:33:27 Lenovo-laptop acpid: client connected from 1078[0:0]
  Nov 12 17:33:27 Lenovo-laptop acpid: 1 client rule loaded
  Nov 12 17:33:27 Lenovo-laptop anacron[2504]: Anacron 2.3 started on 2014-11-12
  Nov 12 17:33:27 Lenovo-laptop anacron[2504]: Normal exit (0 jobs run)
  Nov 12 17:33:35 Lenovo-laptop acpid: client 1078[0:0] has disconnected
  Nov 12 17:33:35 Lenovo-laptop acpid: client connected from 1078[0:0]
  Nov 12 17:33:35 Lenovo-laptop acpid: 1 client rule loaded
  Nov 12 17:37:27 Lenovo-laptop AptDaemon: INFO: Quitting due to inactivity
  Nov 12 17:37:27 Lenovo-laptop AptDaemon: INFO: Quitting was requested

  ProblemType: Bug
  DistroRelease: Ubuntu 12.04
  Package: linux-image-3.2.0-23-generic-pae 3.2.0-23.36
  ProcVersionSignature: Ubuntu 3.2.0-23.36-generic-pae 3.2.14
  Uname: Linux 3.2.0-23-generic-pae i686
  NonfreeKernelModules: wl
  AlsaVersion: Advanced Linux Sound Architecture Driver Version 1.0.24.
  AplayDevices:
    List of PLAYBACK Hardware Devices 
   card 0: Intel [HDA Intel], device 0: ALC861-VD Analog [ALC861-VD Analog]
 Subdevices: 1/1
 Subdevice #0: subdevice #0
  ApportVersion: 2.0.1-0ubuntu17.8
  Architecture: i386
  ArecordDevices:
    List of CAPTURE Hardware Devices 
   card 0: Intel [HDA Intel], device 0: ALC861-VD Analo

[Kernel-packages] [Bug 1010337] Re: Boot instead of resume after suspending

2015-01-12 Thread Jonas Ådahl
I no longer run Ubuntu so I can not run the apport-collect command,
sorry. Please read the upstream bug report for further data.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1010337

Title:
  Boot instead of resume after suspending

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  This bug might not be in pm-utils but in Linux.

  After issuing a "suspend" of my laptop, if I resume within a certain
  amount of time (usually 10-20min) it will resume correctly and the
  system will be usable. If I resume soon after suspending, the computer
  will boot up normally instead. There are work arounds for similar bugs
  around the Internet, such as the "acpi_sleep=nonvs" kernel parameter.
  None of these have any affect. I have tried Linux 3.4 with no
  improvement. I also have applied most of the fixes in
  http://help.ubuntu.com/community/Asus_U36SD .

  A while back running Ubuntu 11.10 I tried debugging
  resuming/suspending and as far as I can remember there were nothing
  relevant that I could find out. It just didn't manage to boot up.

  Hardware details are: ASUS U36SD laptop with a Intel i7-2620M (Sandy
  Bridge). Rest should be in attached files.

  ProblemType: Bug
  DistroRelease: Ubuntu 12.04
  Package: pm-utils 1.4.1-9
  Uname: Linux 3.4.0-030400-generic x86_64
  ApportVersion: 2.0.1-0ubuntu7
  Architecture: amd64
  CheckboxSubmission: 633c30c88957e357f73c867180ace90f
  CheckboxSystem: b8f3ec504801f13fc208edb5c785b099
  Date: Fri Jun  8 08:21:22 2012
  InstallationMedia: Ubuntu 11.04 "Natty Narwhal" - Release amd64 (20110427.1)
  PackageArchitecture: all
  ProcEnviron:
   TERM=xterm
   PATH=(custom, user)
   LANG=en_US.UTF-8
   SHELL=/bin/bash
  SourcePackage: pm-utils
  UpgradeStatus: Upgraded to precise on 2012-04-27 (41 days ago)
  ---
  ApportVersion: 2.0.1-0ubuntu7
  Architecture: amd64
  CheckboxSubmission: 633c30c88957e357f73c867180ace90f
  CheckboxSystem: b8f3ec504801f13fc208edb5c785b099
  DistroRelease: Ubuntu 12.04
  InstallationMedia: Ubuntu 11.04 "Natty Narwhal" - Release amd64 (20110427.1)
  Package: pm-utils 1.4.1-9
  PackageArchitecture: all
  ProcEnviron:
   TERM=rxvt-unicode
   PATH=(custom, user)
   LANG=en_US.UTF-8
   SHELL=/bin/bash
  Tags:  precise
  Uname: Linux 3.4.0-030400-generic x86_64
  UpgradeStatus: Upgraded to precise on 2012-04-27 (41 days ago)
  UserGroups: adm admin cdrom dialout lpadmin plugdev sambashare

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1010337/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1409584] Re: ThinkPad X1 Carbon 3rd(2015 version) fails to suspend from the second time

2015-01-12 Thread Adam Lee
** Tags added: kernel-fixed-upstream

** Changed in: linux (Ubuntu)
   Status: Incomplete => Confirmed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1409584

Title:
  ThinkPad X1 Carbon 3rd(2015 version) fails to suspend from the second
  time

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  version: 3rd(2015 version) on Trusty(14.04)

  It suspends and resumes successfully at the first time, then WWAN
  devices disappear and fails to suspend.

  workaround 0:
  BIOS, Always On USB to disable, USB 3.0 mode to enable

  workaround 1:
  disable cdc* modules in rootfs and initramfs(you will lose WWAN feature)

  workaround 2:
  reset that WWAN device from xHCI(USB 3.0) port to EHCI(USB 2.0)

  We still need a fix.
  --- 
  ApportVersion: 2.14.1-0ubuntu3.6
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  u  1490 F pulseaudio
   /dev/snd/controlC1:  u  1490 F pulseaudio
  CurrentDesktop: Unity
  DistroRelease: Ubuntu 14.04
  HibernationDevice: RESUME=UUID=53af0423-2b7d-48f8-a1eb-19ef371b2aea
  InstallationDate: Installed on 2015-01-12 (0 days ago)
  InstallationMedia: Ubuntu 14.04.1 LTS "Trusty Tahr" - Release amd64 
(20140722.2)
  MachineType: LENOVO 20BTZ09ZUS
  Package: linux (not installed)
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-43-generic 
root=UUID=7b0bf38c-9b8d-4349-b992-074cbddd2f13 ro quiet splash vt.handoff=7
  ProcVersionSignature: Ubuntu 3.13.0-43.72-generic 3.13.11.11
  RelatedPackageVersions:
   linux-restricted-modules-3.13.0-43-generic N/A
   linux-backports-modules-3.13.0-43-generic  N/A
   linux-firmware 1.127.11
  Tags:  trusty
  Uname: Linux 3.13.0-43-generic x86_64
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo
  _MarkForUpload: True
  dmi.bios.date: 10/27/2014
  dmi.bios.vendor: LENOVO
  dmi.bios.version: N14ET24W (1.02 )
  dmi.board.asset.tag: Not Available
  dmi.board.name: 20BTZ09ZUS
  dmi.board.vendor: LENOVO
  dmi.board.version: SDK0E50510 WIN
  dmi.chassis.asset.tag: No Asset Information
  dmi.chassis.type: 10
  dmi.chassis.vendor: LENOVO
  dmi.chassis.version: None
  dmi.modalias: 
dmi:bvnLENOVO:bvrN14ET24W(1.02):bd10/27/2014:svnLENOVO:pn20BTZ09ZUS:pvrThinkPadX1Carbon3rd:rvnLENOVO:rn20BTZ09ZUS:rvrSDK0E50510WIN:cvnLENOVO:ct10:cvrNone:
  dmi.product.name: 20BTZ09ZUS
  dmi.product.version: ThinkPad X1 Carbon 3rd
  dmi.sys.vendor: LENOVO

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1409584/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1398497] Re: HP Proliant Serverrs - DL360 and DL380 Gen8 - Precise Kernel Panic - General Protection Fault and X2APIC/XAPIC boot parameters

2015-01-12 Thread Rafael David Tinoco
Esel,

Could you please follow instructions from:

https://sites.google.com/site/inaddyorg/texts/installing-ubuntu-crash-
dump

Taking the opportunity to leave comments if you find anything wrong in
the procedure ?

Tks, looking forward to receiving core from you.

Tks

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1398497

Title:
  HP Proliant Serverrs - DL360 and DL380 Gen8 - Precise Kernel Panic -
  General Protection Fault and X2APIC/XAPIC boot parameters

Status in linux package in Ubuntu:
  In Progress
Status in linux source package in Precise:
  In Progress

Bug description:
  It was brought to my attention the following situation:

  """
  We massively upgraded our Ubuntu 12.04 servers (most of them are HP
  DL360p Gen8 or DL380 Gen8) to 3.2.0-67 kernel And in the last 2-3
  days we already had to reboot 5 of them because they completely hang

  Some of them had the following messages under syslog :
  kernel: [384707.675479] general protection fault:  [#5666] SMP

  others had :
  kernel: [950725.612724] BUG: unable to handle kernel paging request

  All of them have this also :
  your BIOS is broken and requested that x2apic be disabled
  """

  Comments bellow

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1398497/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1341027] Re: init: Failed to obtain startpar-bridge instance: Unknown parameter: INSTANCE

2015-01-12 Thread Oliver Joos
*** This bug is a duplicate of bug 1295596 ***
https://bugs.launchpad.net/bugs/1295596

** This bug has been marked a duplicate of bug 1295596
   init: Failed to obtain startpar-bridge instance: Unknown parameter: INSTANCE

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1341027

Title:
  init: Failed to obtain startpar-bridge instance: Unknown parameter:
  INSTANCE

Status in linux package in Ubuntu:
  Expired

Bug description:
  [6.768712] init: Failed to obtain startpar-bridge instance:
  Unknown parameter: INSTANCE

  ProblemType: Bug
  DistroRelease: Ubuntu 14.10
  Package: linux-image-3.16.0-3-lowlatency 3.16.0-3.8
  ProcVersionSignature: Ubuntu 3.16.0-3.8-lowlatency 3.16.0-rc4
  Uname: Linux 3.16.0-3-lowlatency x86_64
  ApportVersion: 2.14.4-0ubuntu2
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/pcmC1D0p:   caravena   2878 F...m pulseaudio
   /dev/snd/controlC1:  caravena   2878 F pulseaudio
   /dev/snd/controlC0:  caravena   2878 F pulseaudio
  CurrentDesktop: GNOME
  Date: Fri Jul 11 20:10:48 2014
  HibernationDevice: RESUME=UUID=360bd2d2-4f44-4311-86d6-4781ac81ee87
  InstallationDate: Installed on 2014-04-27 (75 days ago)
  InstallationMedia: Ubuntu-GNOME 14.04 LTS "Trusty Tahr" - Release amd64 
(20140416.2)
  MachineType: SAMSUNG ELECTRONICS CO., LTD. 530U3C/530U4C
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.16.0-3-lowlatency 
root=UUID=13144268-2374-4154-83f1-c35d81306190 ro quiet splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-3.16.0-3-lowlatency N/A
   linux-backports-modules-3.16.0-3-lowlatency  N/A
   linux-firmware   1.132
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 04/15/2013
  dmi.bios.vendor: Phoenix Technologies Ltd.
  dmi.bios.version: P14AAJ
  dmi.board.asset.tag: Base Board Asset Tag
  dmi.board.name: SAMSUNG_NP1234567890
  dmi.board.vendor: SAMSUNG ELECTRONICS CO., LTD.
  dmi.board.version: FAB1
  dmi.chassis.asset.tag: No Asset Tag
  dmi.chassis.type: 9
  dmi.chassis.vendor: SAMSUNG ELECTRONICS CO., LTD.
  dmi.chassis.version: 0.1
  dmi.modalias: 
dmi:bvnPhoenixTechnologiesLtd.:bvrP14AAJ:bd04/15/2013:svnSAMSUNGELECTRONICSCO.,LTD.:pn530U3C/530U4C:pvr0.1:rvnSAMSUNGELECTRONICSCO.,LTD.:rnSAMSUNG_NP1234567890:rvrFAB1:cvnSAMSUNGELECTRONICSCO.,LTD.:ct9:cvr0.1:
  dmi.product.name: 530U3C/530U4C
  dmi.product.version: 0.1
  dmi.sys.vendor: SAMSUNG ELECTRONICS CO., LTD.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1341027/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1409890] Re: linux: 3.16.0-30.40 -proposed tracker

2015-01-12 Thread Brad Figg
** Changed in: kernel-sru-workflow/prepare-package-signed
   Status: New => Fix Released

** Changed in: kernel-sru-workflow/prepare-package-signed
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Seth Forshee 
(sforshee)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1409890

Title:
  linux: 3.16.0-30.40 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  New
Status in Kernel SRU Workflow package-testing series:
  New
Status in Kernel SRU Workflow prepare-package series:
  New
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux package in Ubuntu:
  Invalid

Bug description:
  This bug is for tracking the 3.16.0-30.40 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Monday, 12. January 2015 20:07 UTC
  kernel-stable-phase:Prepare
  kernel-stable-phase-changed:Monday, 12. January 2015 20:07 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1409890/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1400827] Re: BlueZ crashing when connecting input channel to a keyboard

2015-01-12 Thread Ricardo Salveti
** Changed in: bluez (Ubuntu)
   Status: New => Incomplete

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to bluez in Ubuntu.
https://bugs.launchpad.net/bugs/1400827

Title:
  BlueZ crashing when connecting input channel to a keyboard

Status in bluez package in Ubuntu:
  Incomplete

Bug description:
  On the phone, pairing a keyboard makes BlueZ crash when connecting the
  input channel (either by calling org.bluez.Input.Connect() on D-Bus or
  by pressing some keys on the keyboard to make the keyboard open the
  channel.

  In order to pair a keyboard with an Ubuntu phone, you need to either
  apply this branch to ubuntu-system-settings [1] or do it manually with
  bluez-simple-agent and dbus-send/qdbus.

  
  [1] https://code.launchpad.net/~mzanetti/ubuntu-system-settings/bt-input

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/bluez/+bug/1400827/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1318218] Re: SATA problems on MacBook Pro 11, 1?

2015-01-12 Thread Matt Hanyok
So, I used gparted to format the drive with a single ext4 partition,
rebooted the system, mounted it, and the errors came back.

It's not a hardware issue. It's some combination of the OS, chipset,
file system in use, and maybe (?) drive type. I can use the same drive
on a Gigabyte board that uses the B85 chipset and have zero issues, so
it doesn't seem to be the entire lynx point chipset family. The Z87 on
this board is the revised C2 stepping.

Anecdotal evidence from web searches might indicate some relation to
ASrock Z87 boards in particular, but then, user reports of the error go
back several years, and earlier reports were oftentimes hardware issues.
And obviously, in the case of the initial bug report here, it was a
Macbook Pro.

I'm attaching dmesg output from the same system, this is from a fresh
boot to a live environment and mounting the drive by clicking it in
nautilus. The errors were back, just as they were before.

After reinstalling the Windows 8 Trial on the system, it's back to
working without any errors in a live ubuntu environment. Not really sure
what to make of this, aside from it not being a hardware problem.

** Attachment added: "dmesg-errors.txt"
   
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1318218/+attachment/4296899/+files/dmesg-errors.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1318218

Title:
  SATA problems on MacBook Pro 11,1?

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  I installed Ubuntu 14.04 next to MacOS following the guide at
  https://help.ubuntu.com/community/MacBookPro11-1/Saucy/

  Looking into dmesg, I constantlz get entries like
  [  276.380934] ata1: SError: { PHYRdyChg }
  [  276.380943] ata1: hard resetting link
  [  277.103527] ata1: SATA link up 1.5 Gbps (SStatus 113 SControl 310)
  [  277.103999] ata1.00: unexpected _GTF length (8)
  [  277.104504] ata1.00: unexpected _GTF length (8)
  [  277.104507] ata1.00: configured for UDMA/33
  [  277.104629] ata1: EH complete
  [  277.206319] ata1: exception Emask 0x10 SAct 0x0 SErr 0x1 action 0xe 
frozen
  [  277.206328] ata1: irq_stat 0x0040, PHY RDY changed
  [  277.206333] ata1: SError: { PHYRdyChg }
  [  277.206343] ata1: hard resetting link
  [  277.927757] ata1: SATA link up 1.5 Gbps (SStatus 113 SControl 310)
  [  277.928425] ata1.00: unexpected _GTF length (8)
  [  277.929040] ata1.00: unexpected _GTF length (8)
  [  277.929051] ata1.00: configured for UDMA/33
  [  277.929168] ata1: EH complete
  [  278.030944] ata1: exception Emask 0x10 SAct 0x0 SErr 0x1 action 0xe 
frozen
  [  278.030952] ata1: irq_stat 0x0040, PHY RDY changed
  [  278.030957] ata1: SError: { PHYRdyChg }
  [  278.030965] ata1: hard resetting link
  [  278.752008] ata1: SATA link up 1.5 Gbps (SStatus 113 SControl 310)
  [  278.752582] ata1.00: unexpected _GTF length (8)
  [  278.753140] ata1.00: unexpected _GTF length (8)
  [  278.753147] ata1.00: configured for UDMA/33
  [  278.753231] ata1: EH complete
  [  278.853417] ata1: exception Emask 0x10 SAct 0x0 SErr 0x1 action 0xe 
frozen
  [  278.853424] ata1: irq_stat 0x0040, PHY RDY changed
  [  278.853427] ata1: SError: { PHYRdyChg }
  [  278.853434] ata1: hard resetting link
  [  279.576258] ata1: SATA link up 1.5 Gbps (SStatus 113 SControl 310)
  [  279.576881] ata1.00: unexpected _GTF length (8)
  [  279.577417] ata1.00: unexpected _GTF length (8)
  [  279.577427] ata1.00: configured for UDMA/33
  [  279.577491] ata1: EH complete
  [  279.677753] ata1: exception Emask 0x10 SAct 0x0 SErr 0x1 action 0xe 
frozen
  [  279.677762] ata1: irq_stat 0x0040, PHY RDY changed
  [  279.677767] ata1: SError: { PHYRdyChg }
  [  279.66] ata1: hard resetting link
  [  280.400449] ata1: SATA link up 1.5 Gbps (SStatus 113 SControl 310)
  [  280.401147] ata1.00: unexpected _GTF length (8)
  [  280.401722] ata1.00: unexpected _GTF length (8)
  [  280.401733] ata1.00: configured for UDMA/33
  [  280.401809] ata1: EH complete
  [  280.502117] ata1: exception Emask 0x10 SAct 0x0 SErr 0x1 action 0xe 
frozen
  [  280.502127] ata1: irq_stat 0x0040, PHY RDY changed
  [  280.502132] ata1: SError: { PHYRdyChg }

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.13.0-24-generic 3.13.0-24.47
  ProcVersionSignature: Ubuntu 3.13.0-24.47-generic 3.13.9
  Uname: Linux 3.13.0-24-generic x86_64
  NonfreeKernelModules: wl
  ApportVersion: 2.14.1-0ubuntu3
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  markus 1663 F pulseaudio
   /dev/snd/controlC1:  markus 1663 F pulseaudio
  CurrentDesktop: Unity
  Date: Sat May 10 19:33:44 2014
  HibernationDevice: RESUME=UUID=c71381d2-e2f3-4c96-94ea-57b8986afd08
  InstallationDate: Installed on 2014-05-09 (0 days ago)
  InstallationMedia: Ubuntu 14.04 LTS "Trusty Tahr" - Release amd64 (20140417)
  MachineTy

[Kernel-packages] [Bug 1409959] [NEW] after upgrade from 3.13.0-43 to -44, UEFI system will not boot past grub

2015-01-12 Thread MattW (seattle)
Public bug reported:


I upgaded to -44 from -43 and my UEFI system (Dell Optiplex 3020) wont boot - i 
see grub, it starts, then collapses
back to the initramfs prompt

I downgraded to -43 and it works again

ProblemType: Bug
DistroRelease: Ubuntu 14.04
Package: linux-image-3.13.0-44-generic (not installed)
ProcVersionSignature: Ubuntu 3.13.0-43.72-generic 3.13.11.11
Uname: Linux 3.13.0-43-generic x86_64
ApportVersion: 2.14.1-0ubuntu3.6
Architecture: amd64
AudioDevicesInUse:
 USERPID ACCESS COMMAND
 /dev/snd/controlC2:  mbw2829 F pulseaudio
 /dev/snd/controlC0:  mbw2829 F pulseaudio
 /dev/snd/controlC1:  mbw2829 F pulseaudio
CurrentDesktop: Unity
Date: Mon Jan 12 15:51:45 2015
HibernationDevice: RESUME=UUID=ad3d0446-a2b9-4af5-8e88-3cdf6e9fd23d
InstallationDate: Installed on 2015-01-07 (5 days ago)
InstallationMedia: Ubuntu 14.04.1 LTS "Trusty Tahr" - Release amd64 (20140722.2)
IwConfig:
 eth0  no wireless extensions.
 
 lono wireless extensions.
MachineType: Dell Inc. OptiPlex 3020
ProcFB: 0 inteldrmfb
ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.13.0-43-generic.efi.signed 
root=/dev/mapper/ubuntu--vg-root ro quiet splash
PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: Daemon not 
responding.
RelatedPackageVersions:
 linux-restricted-modules-3.13.0-43-generic N/A
 linux-backports-modules-3.13.0-43-generic  N/A
 linux-firmware 1.127.11
RfKill:
 
SourcePackage: linux
UpgradeStatus: No upgrade log present (probably fresh install)
dmi.bios.date: 04/14/2014
dmi.bios.vendor: Dell Inc.
dmi.bios.version: A03
dmi.board.name: 04YP6J
dmi.board.vendor: Dell Inc.
dmi.board.version: A01
dmi.chassis.type: 15
dmi.chassis.vendor: Dell Inc.
dmi.modalias: 
dmi:bvnDellInc.:bvrA03:bd04/14/2014:svnDellInc.:pnOptiPlex3020:pvr01:rvnDellInc.:rn04YP6J:rvrA01:cvnDellInc.:ct15:cvr:
dmi.product.name: OptiPlex 3020
dmi.product.version: 01
dmi.sys.vendor: Dell Inc.

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Confirmed


** Tags: amd64 apport-bug trusty

** Summary changed:

- after upgrade, UEFI system will not boot
+ after upgrade from 3.13.0-43 to -44, UEFI system will not boot past grub

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1409959

Title:
  after upgrade from 3.13.0-43 to -44, UEFI system will not boot past
  grub

Status in linux package in Ubuntu:
  Confirmed

Bug description:

  I upgaded to -44 from -43 and my UEFI system (Dell Optiplex 3020) wont boot - 
i see grub, it starts, then collapses
  back to the initramfs prompt

  I downgraded to -43 and it works again

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.13.0-44-generic (not installed)
  ProcVersionSignature: Ubuntu 3.13.0-43.72-generic 3.13.11.11
  Uname: Linux 3.13.0-43-generic x86_64
  ApportVersion: 2.14.1-0ubuntu3.6
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC2:  mbw2829 F pulseaudio
   /dev/snd/controlC0:  mbw2829 F pulseaudio
   /dev/snd/controlC1:  mbw2829 F pulseaudio
  CurrentDesktop: Unity
  Date: Mon Jan 12 15:51:45 2015
  HibernationDevice: RESUME=UUID=ad3d0446-a2b9-4af5-8e88-3cdf6e9fd23d
  InstallationDate: Installed on 2015-01-07 (5 days ago)
  InstallationMedia: Ubuntu 14.04.1 LTS "Trusty Tahr" - Release amd64 
(20140722.2)
  IwConfig:
   eth0  no wireless extensions.
   
   lono wireless extensions.
  MachineType: Dell Inc. OptiPlex 3020
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.13.0-43-generic.efi.signed 
root=/dev/mapper/ubuntu--vg-root ro quiet splash
  PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: Daemon 
not responding.
  RelatedPackageVersions:
   linux-restricted-modules-3.13.0-43-generic N/A
   linux-backports-modules-3.13.0-43-generic  N/A
   linux-firmware 1.127.11
  RfKill:
   
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 04/14/2014
  dmi.bios.vendor: Dell Inc.
  dmi.bios.version: A03
  dmi.board.name: 04YP6J
  dmi.board.vendor: Dell Inc.
  dmi.board.version: A01
  dmi.chassis.type: 15
  dmi.chassis.vendor: Dell Inc.
  dmi.modalias: 
dmi:bvnDellInc.:bvrA03:bd04/14/2014:svnDellInc.:pnOptiPlex3020:pvr01:rvnDellInc.:rn04YP6J:rvrA01:cvnDellInc.:ct15:cvr:
  dmi.product.name: OptiPlex 3020
  dmi.product.version: 01
  dmi.sys.vendor: Dell Inc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1409959/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1409959] Status changed to Confirmed

2015-01-12 Thread Brad Figg
This change was made by a bot.

** Changed in: linux (Ubuntu)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1409959

Title:
  after upgrade from 3.13.0-43 to -44, UEFI system will not boot past
  grub

Status in linux package in Ubuntu:
  Confirmed

Bug description:

  I upgaded to -44 from -43 and my UEFI system (Dell Optiplex 3020) wont boot - 
i see grub, it starts, then collapses
  back to the initramfs prompt

  I downgraded to -43 and it works again

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.13.0-44-generic (not installed)
  ProcVersionSignature: Ubuntu 3.13.0-43.72-generic 3.13.11.11
  Uname: Linux 3.13.0-43-generic x86_64
  ApportVersion: 2.14.1-0ubuntu3.6
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC2:  mbw2829 F pulseaudio
   /dev/snd/controlC0:  mbw2829 F pulseaudio
   /dev/snd/controlC1:  mbw2829 F pulseaudio
  CurrentDesktop: Unity
  Date: Mon Jan 12 15:51:45 2015
  HibernationDevice: RESUME=UUID=ad3d0446-a2b9-4af5-8e88-3cdf6e9fd23d
  InstallationDate: Installed on 2015-01-07 (5 days ago)
  InstallationMedia: Ubuntu 14.04.1 LTS "Trusty Tahr" - Release amd64 
(20140722.2)
  IwConfig:
   eth0  no wireless extensions.
   
   lono wireless extensions.
  MachineType: Dell Inc. OptiPlex 3020
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.13.0-43-generic.efi.signed 
root=/dev/mapper/ubuntu--vg-root ro quiet splash
  PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: Daemon 
not responding.
  RelatedPackageVersions:
   linux-restricted-modules-3.13.0-43-generic N/A
   linux-backports-modules-3.13.0-43-generic  N/A
   linux-firmware 1.127.11
  RfKill:
   
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 04/14/2014
  dmi.bios.vendor: Dell Inc.
  dmi.bios.version: A03
  dmi.board.name: 04YP6J
  dmi.board.vendor: Dell Inc.
  dmi.board.version: A01
  dmi.chassis.type: 15
  dmi.chassis.vendor: Dell Inc.
  dmi.modalias: 
dmi:bvnDellInc.:bvrA03:bd04/14/2014:svnDellInc.:pnOptiPlex3020:pvr01:rvnDellInc.:rn04YP6J:rvrA01:cvnDellInc.:ct15:cvr:
  dmi.product.name: OptiPlex 3020
  dmi.product.version: 01
  dmi.sys.vendor: Dell Inc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1409959/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1408118] Re: hama uzzano keyboard do not work properly

2015-01-12 Thread paumarc
pau@traveller:~$ lsusb 
Bus 004 Device 002: ID 8087:0024 Intel Corp. Integrated Rate Matching Hub
Bus 004 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
Bus 003 Device 004: ID 04ca:7012 Lite-On Technology Corp. 
Bus 003 Device 002: ID 8087:0024 Intel Corp. Integrated Rate Matching Hub
Bus 003 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
Bus 002 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub
Bus 001 Device 003: ID 0930:021d Toshiba Corp. 
Bus 001 Device 002: ID 04d9:a01c Holtek Semiconductor, Inc. 
Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
pau@traveller:~$ 

pau@traveller:~$ dmesg | grep usb
[0.853148] usbcore: registered new interface driver usbfs
[0.853156] usbcore: registered new interface driver hub
[0.853175] usbcore: registered new device driver usb
[1.319604] usb usb1: New USB device found, idVendor=1d6b, idProduct=0002
[1.319606] usb usb1: New USB device strings: Mfr=3, Product=2, 
SerialNumber=1
[1.319607] usb usb1: Product: xHCI Host Controller
[1.319609] usb usb1: Manufacturer: Linux 3.19.0-031900rc3-generic xhci-hcd
[1.319610] usb usb1: SerialNumber: :00:14.0
[1.320039] usb usb2: New USB device found, idVendor=1d6b, idProduct=0003
[1.320041] usb usb2: New USB device strings: Mfr=3, Product=2, 
SerialNumber=1
[1.320042] usb usb2: Product: xHCI Host Controller
[1.320044] usb usb2: Manufacturer: Linux 3.19.0-031900rc3-generic xhci-hcd
[1.320045] usb usb2: SerialNumber: :00:14.0
[1.333879] usb usb3: New USB device found, idVendor=1d6b, idProduct=0002
[1.333881] usb usb3: New USB device strings: Mfr=3, Product=2, 
SerialNumber=1
[1.333882] usb usb3: Product: EHCI Host Controller
[1.333884] usb usb3: Manufacturer: Linux 3.19.0-031900rc3-generic ehci_hcd
[1.333885] usb usb3: SerialNumber: :00:1a.0
[1.349950] usb usb4: New USB device found, idVendor=1d6b, idProduct=0002
[1.349952] usb usb4: New USB device strings: Mfr=3, Product=2, 
SerialNumber=1
[1.349954] usb usb4: Product: EHCI Host Controller
[1.349955] usb usb4: Manufacturer: Linux 3.19.0-031900rc3-generic ehci_hcd
[1.349957] usb usb4: SerialNumber: :00:1d.0
[1.630241] usb 1-1: new low-speed USB device number 2 using xhci_hcd
[1.646258] usb 3-1: new high-speed USB device number 2 using ehci-pci
[1.662271] usb 4-1: new high-speed USB device number 2 using ehci-pci
[1.778824] usb 3-1: New USB device found, idVendor=8087, idProduct=0024
[1.778842] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0
[1.794836] usb 4-1: New USB device found, idVendor=8087, idProduct=0024
[1.794842] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0
[1.826097] usb 1-1: New USB device found, idVendor=04d9, idProduct=a01c
[1.826103] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=0
[1.826120] usb 1-1: Product: Wireless USB Device
[1.826121] usb 1-1: Manufacturer: HOLTEK
[1.826227] usb 1-1: ep 0x81 - rounding interval to 64 microframes, ep desc 
says 80 microframes
[1.826232] usb 1-1: ep 0x82 - rounding interval to 64 microframes, ep desc 
says 80 microframes
[1.849892] usbcore: registered new interface driver usbhid
[1.849894] usbhid: USB HID core driver
[1.851236] input: HOLTEK Wireless USB Device as 
/devices/pci:00/:00:14.0/usb1/1-1/1-1:1.0/0003:04D9:A01C.0001/input/input8
[1.906736] hid-generic 0003:04D9:A01C.0001: input,hidraw0: USB HID v1.10 
Keyboard [HOLTEK Wireless USB Device] on usb-:00:14.0-1/input0
[1.906883] input: HOLTEK Wireless USB Device as 
/devices/pci:00/:00:14.0/usb1/1-1/1-1:1.1/0003:04D9:A01C.0002/input/input11
[1.938594] usb 1-3: new full-speed USB device number 3 using xhci_hcd
[1.962855] hid-generic 0003:04D9:A01C.0002: input,hidraw1: USB HID v1.10 
Mouse [HOLTEK Wireless USB Device] on usb-:00:14.0-1/input1
[2.050915] usb 3-1.1: new high-speed USB device number 3 using ehci-pci
[2.067745] usb 1-3: New USB device found, idVendor=0930, idProduct=021d
[2.067748] usb 1-3: New USB device strings: Mfr=1, Product=2, SerialNumber=3
[2.067750] usb 1-3: Product: RT Bluetooth Radio
[2.067751] usb 1-3: Manufacturer: Realtek
[2.067752] usb 1-3: SerialNumber: 00e04c01
[2.399882] usb 3-1.1: New USB device found, idVendor=0bda, idProduct=0138
[2.399885] usb 3-1.1: New USB device strings: Mfr=1, Product=2, 
SerialNumber=3
[2.399887] usb 3-1.1: Product: USB2.0-CRW
[2.399888] usb 3-1.1: Manufacturer: Generic
[2.399890] usb 3-1.1: SerialNumber: 2009051638820
[2.408245] usbcore: registered new interface driver usb-storage
[2.409412] usbcore: registered new interface driver uas
[2.429321] scsi host6: usb-storage 3-1.1:1.0
[2.429388] usbcore: registered new interface driver ums-realtek
[2.475415] usb 3-1.3: new high-speed USB device number 4 using ehci-pci
[2.618922] usb 3-1.3: New USB device fou

[Kernel-packages] [Bug 1409890] Re: linux: 3.16.0-30.40 -proposed tracker

2015-01-12 Thread Brad Figg
** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New => Fix Released

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Seth Forshee 
(sforshee)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1409890

Title:
  linux: 3.16.0-30.40 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  New
Status in Kernel SRU Workflow package-testing series:
  New
Status in Kernel SRU Workflow prepare-package series:
  New
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  New
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux package in Ubuntu:
  Invalid

Bug description:
  This bug is for tracking the 3.16.0-30.40 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Monday, 12. January 2015 20:07 UTC
  kernel-stable-phase:Prepare
  kernel-stable-phase-changed:Monday, 12. January 2015 20:07 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1409890/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1403239] Re: linux-ti-omap4: 3.2.0-1458.78 -proposed tracker

2015-01-12 Thread Brad Figg
The package has been published and the bug is being set to Fix Released


** Changed in: kernel-sru-workflow
   Status: In Progress => Fix Released

** Description changed:

  This bug is for tracking the 3.2.0-1458.78 upload package. This bug will
  contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 16. December 2014 23:03 UTC
  kernel-stable-master-bug:1403154
  kernel-stable-Certification-testing-end:Thursday, 18. December 2014 12:02 UTC
  kernel-stable-Prepare-package-end:Thursday, 18. December 2014 16:02 UTC
  kernel-stable-Promote-to-proposed-start:Thursday, 18. December 2014 16:02 UTC
  ppa-package-testing-start:Thursday, 18. December 2014 16:02 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 18. December 2014 22:02 UTC
  kernel-stable-Security-signoff-start:Friday, 19. December 2014 00:03 UTC
  kernel-stable-Verification-testing-start:Friday, 19. December 2014 00:02 UTC
  kernel-stable-Regression-testing-start:Friday, 19. December 2014 00:03 UTC
  kernel-stable-Verification-testing-end:Friday, 19. December 2014 12:01 UTC
  kernel-stable-Security-signoff-end:Friday, 19. December 2014 14:01 UTC
- kernel-stable-phase:CopyToUpdates
- kernel-stable-phase-changed:Monday, 12. January 2015 18:29 UTC
  kernel-stable-Promote-to-updates-start:Monday, 12. January 2015 18:29 UTC
  kernel-stable-Regression-testing-end:Monday, 12. January 2015 18:29 UTC
  kernel-stable-Promote-to-updates-end:Monday, 12. January 2015 20:45 UTC
+ kernel-stable-phase:Released
+ kernel-stable-phase-changed:Monday, 12. January 2015 22:01 UTC

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-ti-omap4 in Ubuntu.
https://bugs.launchpad.net/bugs/1403239

Title:
  linux-ti-omap4: 3.2.0-1458.78 -proposed tracker

Status in Kernel SRU Workflow:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow package-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Fix Released
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow upload-to-ppa series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  Fix Released

Bug description:
  This bug is for tracking the 3.2.0-1458.78 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 16. December 2014 23:03 UTC
  kernel-stable-master-bug:1403154
  kernel-stable-Certification-testing-end:Thursday, 18. December 2014 12:02 UTC
  kernel-stable-Prepare-package-end:Thursday, 18. December 2014 16:02 UTC
  kernel-stable-Promote-to-proposed-start:Thursday, 18. December 2014 16:02 UTC
  ppa-package-testing-start:Thursday, 18. December 2014 16:02 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 18. December 2014 22:02 UTC
  kernel-stable-Security-signoff-start:Friday, 19. December 2014 00:03 UTC
  kernel-stable-Verification-testing-start:Friday, 19. December 2014 00:02 UTC
  kernel-stable-Regression-testing-start:Friday, 19. December 2014 00:03 UTC
  kernel-stable-Verification-testing-end:Friday, 19. December 2014 12:01 UTC
  kernel-stable-Security-signoff-end:Friday, 19. December 2014 14:01 UTC
  kernel-stable-Promote-to-updates-start:Monday, 12. January 2015 18:29 UTC
  kernel-stable-Regression-testing-end:Monday, 12. January 2015 18:29 UTC
  kernel-stable-Promote-to-updates-end:Monday, 12. January 2015 20:45 UTC
  kernel-stable-phase:Released
  kernel-stable-phase-changed:Monday, 12. January 2015 22:01 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1403239/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1409794] Re: linux: 3.18.0-9.10 -proposed tracker

2015-01-12 Thread Brad Figg
** Changed in: kernel-development-workflow/prepare-package-meta
   Status: New => Fix Released

** Changed in: kernel-development-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Leann Ogasawara 
(leannogasawara)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1409794

Title:
  linux: 3.18.0-9.10 -proposed tracker

Status in Kernel Development Workflow:
  In Progress
Status in Kernel Development Workflow package-testing series:
  New
Status in Kernel Development Workflow prepare-package series:
  New
Status in Kernel Development Workflow prepare-package-meta series:
  Fix Released
Status in Kernel Development Workflow prepare-package-signed series:
  New
Status in Kernel Development Workflow promote-to-release series:
  New
Status in linux package in Ubuntu:
  New
Status in linux source package in Vivid:
  New

Bug description:
  This bug is for tracking the 3.18.0-9.10 upload package. This bug will
  contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-Prepare-package-start:Monday, 12. January 2015 16:51 UTC
  kernel-phase-changed:Monday, 12. January 2015 16:51 UTC
  kernel-phase:Prepare

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-development-workflow/+bug/1409794/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1408118] Re: hama uzzano keyboard do not work properly

2015-01-12 Thread Joseph Salisbury
Also, can you attach the apport data per comment #1?  This will provide
some details of the hardware.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1408118

Title:
  hama uzzano keyboard do not work properly

Status in linux package in Ubuntu:
  Triaged

Bug description:
  Hello

   I recently tried to  use a hama uzzano keyboard on ubuntu 14.10. This
  is a wireless keyboard. Some times starts working and then suddenly
  stops, but mostly it does not work.

   i looked if it was recognized and it is:

  lsusb:

  pau@traveller:~$ lsusb
  Bus 002 Device 002: ID 8087:0024 Intel Corp. Integrated Rate Matching Hub
  Bus 002 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
  Bus 001 Device 003: ID 04ca:7012 Lite-On Technology Corp. 
  Bus 001 Device 002: ID 8087:0024 Intel Corp. Integrated Rate Matching Hub
  Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
  Bus 004 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub
  Bus 003 Device 003: ID 0930:021d Toshiba Corp. 
  Bus 003 Device 008: ID 04d9:a01c Holtek Semiconductor, Inc. 
  Bus 003 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub

  and

  dmesg | grep usb (partial)

  [ 8974.179356] input: HOLTEK Wireless USB Device as 
/devices/pci:00/:00:14.0/usb3/3-1/3-1:1.0/0003:04D9:A01C.000D/input/input29
  [ 8974.179587] hid-generic 0003:04D9:A01C.000D: input,hidraw0: USB HID v1.10 
Keyboard [HOLTEK Wireless USB Device] on usb-:00:14.0-1/input0
  [ 8974.191755] input: HOLTEK Wireless USB Device as 
/devices/pci:00/:00:14.0/usb3/3-1/3-1:1.1/0003:04D9:A01C.000E/input/input30
  [ 8974.192062] hid-generic 0003:04D9:A01C.000E: input,hidraw1: USB HID v1.10 
Mouse [HOLTEK Wireless USB Device] on usb-:00:14.0-1/input1

  i tried to solve the problem as it is explained here

  http://askubuntu.com/questions/160329/usb-keyboard-works-occasionally

  but it did not works. What can i do, i suppose this is a bug, do you
  need extra information?

  (it works with windows)

  thanks

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1408118/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1408118] Re: hama uzzano keyboard do not work properly

2015-01-12 Thread Joseph Salisbury
This issue appears to be an upstream bug, since you tested the latest
upstream kernel. Would it be possible for you to open an upstream bug
report[0]? That will allow the upstream Developers to examine the issue,
and may provide a quicker resolution to the bug.

Please follow the instructions on the wiki page[0]. The first step is to
email the appropriate mailing list. If no response is received, then a
bug may be opened on bugzilla.kernel.org.

Once this bug is reported upstream, please add the tag: 'kernel-bug-
reported-upstream'.

[0] https://wiki.ubuntu.com/Bugs/Upstream/kernel

** Changed in: linux (Ubuntu)
   Status: Incomplete => Triaged

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1408118

Title:
  hama uzzano keyboard do not work properly

Status in linux package in Ubuntu:
  Triaged

Bug description:
  Hello

   I recently tried to  use a hama uzzano keyboard on ubuntu 14.10. This
  is a wireless keyboard. Some times starts working and then suddenly
  stops, but mostly it does not work.

   i looked if it was recognized and it is:

  lsusb:

  pau@traveller:~$ lsusb
  Bus 002 Device 002: ID 8087:0024 Intel Corp. Integrated Rate Matching Hub
  Bus 002 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
  Bus 001 Device 003: ID 04ca:7012 Lite-On Technology Corp. 
  Bus 001 Device 002: ID 8087:0024 Intel Corp. Integrated Rate Matching Hub
  Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
  Bus 004 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub
  Bus 003 Device 003: ID 0930:021d Toshiba Corp. 
  Bus 003 Device 008: ID 04d9:a01c Holtek Semiconductor, Inc. 
  Bus 003 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub

  and

  dmesg | grep usb (partial)

  [ 8974.179356] input: HOLTEK Wireless USB Device as 
/devices/pci:00/:00:14.0/usb3/3-1/3-1:1.0/0003:04D9:A01C.000D/input/input29
  [ 8974.179587] hid-generic 0003:04D9:A01C.000D: input,hidraw0: USB HID v1.10 
Keyboard [HOLTEK Wireless USB Device] on usb-:00:14.0-1/input0
  [ 8974.191755] input: HOLTEK Wireless USB Device as 
/devices/pci:00/:00:14.0/usb3/3-1/3-1:1.1/0003:04D9:A01C.000E/input/input30
  [ 8974.192062] hid-generic 0003:04D9:A01C.000E: input,hidraw1: USB HID v1.10 
Mouse [HOLTEK Wireless USB Device] on usb-:00:14.0-1/input1

  i tried to solve the problem as it is explained here

  http://askubuntu.com/questions/160329/usb-keyboard-works-occasionally

  but it did not works. What can i do, i suppose this is a bug, do you
  need extra information?

  (it works with windows)

  thanks

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1408118/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1403943] Re: linux: 2.6.32-71.138 -proposed tracker

2015-01-12 Thread Brad Figg
The package has been published and the bug is being set to Fix Released


** Changed in: kernel-sru-workflow
   Status: In Progress => Fix Released

** Description changed:

  This bug is for tracking the 2.6.32-71.138 upload package. This bug will
  contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Thursday, 18. December 2014 16:18 UTC
  kernel-stable-Prepare-package-end:Friday, 19. December 2014 00:07 UTC
  kernel-stable-Promote-to-proposed-start:Friday, 19. December 2014 00:07 UTC
  ppa-package-testing-start:Friday, 19. December 2014 00:07 UTC
  kernel-stable-Promote-to-proposed-end:Friday, 19. December 2014 08:02 UTC
  kernel-stable-Verification-testing-start:Friday, 19. December 2014 10:03 UTC
  kernel-stable-Certification-testing-start:Friday, 19. December 2014 10:03 UTC
  kernel-stable-Security-signoff-start:Friday, 19. December 2014 10:03 UTC
  kernel-stable-Regression-testing-start:Friday, 19. December 2014 10:03 UTC
  kernel-stable-Security-signoff-end:Friday, 19. December 2014 14:02 UTC
  kernel-stable-Certification-testing-end:Wednesday, 07. January 2015 09:01 UTC
  kernel-stable-Verification-testing-end:Thursday, 08. January 2015 16:02 UTC
- kernel-stable-phase:CopyToUpdates
- kernel-stable-phase-changed:Friday, 09. January 2015 16:01 UTC
  kernel-stable-Promote-to-updates-start:Friday, 09. January 2015 16:01 UTC
  kernel-stable-Regression-testing-end:Friday, 09. January 2015 16:01 UTC
  kernel-stable-Promote-to-updates-end:Monday, 12. January 2015 19:07 UTC
+ kernel-stable-phase:Released
+ kernel-stable-phase-changed:Monday, 12. January 2015 21:03 UTC

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1403943

Title:
  linux: 2.6.32-71.138 -proposed tracker

Status in Kernel SRU Workflow:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Fix Released
Status in Kernel SRU Workflow package-testing series:
  Fix Released
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-lbm series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-ports-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Fix Released
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Fix Released

Bug description:
  This bug is for tracking the 2.6.32-71.138 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Thursday, 18. December 2014 16:18 UTC
  kernel-stable-Prepare-package-end:Friday, 19. December 2014 00:07 UTC
  kernel-stable-Promote-to-proposed-start:Friday, 19. December 2014 00:07 UTC
  ppa-package-testing-start:Friday, 19. December 2014 00:07 UTC
  kernel-stable-Promote-to-proposed-end:Friday, 19. December 2014 08:02 UTC
  kernel-stable-Verification-testing-start:Friday, 19. December 2014 10:03 UTC
  kernel-stable-Certification-testing-start:Friday, 19. December 2014 10:03 UTC
  kernel-stable-Security-signoff-start:Friday, 19. December 2014 10:03 UTC
  kernel-stable-Regression-testing-start:Friday, 19. December 2014 10:03 UTC
  kernel-stable-Security-signoff-end:Friday, 19. December 2014 14:02 UTC
  kernel-stable-Certification-testing-end:Wednesday, 07. January 2015 09:01 UTC
  kernel-stable-Verification-testing-end:Thursday, 08. January 2015 16:02 UTC
  kernel-stable-Promote-to-updates-start:Friday, 09. January 2015 16:01 UTC
  kernel-stable-Regression-testing-end:Friday, 09. January 2015 16:01 UTC
  kernel-stable-Promote-to-updates-end:Monday, 12. January 2015 19:07 UTC
  kernel-stable-phase:Released
  kernel-stable-phase-changed:Monday, 12. January 2015 21:03 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1403943/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1403239] Re: linux-ti-omap4: 3.2.0-1458.78 -proposed tracker

2015-01-12 Thread Brad Figg
** Description changed:

  This bug is for tracking the 3.2.0-1458.78 upload package. This bug will
  contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 16. December 2014 23:03 UTC
  kernel-stable-master-bug:1403154
  kernel-stable-Certification-testing-end:Thursday, 18. December 2014 12:02 UTC
  kernel-stable-Prepare-package-end:Thursday, 18. December 2014 16:02 UTC
  kernel-stable-Promote-to-proposed-start:Thursday, 18. December 2014 16:02 UTC
  ppa-package-testing-start:Thursday, 18. December 2014 16:02 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 18. December 2014 22:02 UTC
  kernel-stable-Security-signoff-start:Friday, 19. December 2014 00:03 UTC
  kernel-stable-Verification-testing-start:Friday, 19. December 2014 00:02 UTC
  kernel-stable-Regression-testing-start:Friday, 19. December 2014 00:03 UTC
  kernel-stable-Verification-testing-end:Friday, 19. December 2014 12:01 UTC
  kernel-stable-Security-signoff-end:Friday, 19. December 2014 14:01 UTC
  kernel-stable-phase:CopyToUpdates
  kernel-stable-phase-changed:Monday, 12. January 2015 18:29 UTC
  kernel-stable-Promote-to-updates-start:Monday, 12. January 2015 18:29 UTC
  kernel-stable-Regression-testing-end:Monday, 12. January 2015 18:29 UTC
+ kernel-stable-Promote-to-updates-end:Monday, 12. January 2015 20:45 UTC

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-ti-omap4 in Ubuntu.
https://bugs.launchpad.net/bugs/1403239

Title:
  linux-ti-omap4: 3.2.0-1458.78 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow package-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Fix Released
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow upload-to-ppa series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  Fix Released

Bug description:
  This bug is for tracking the 3.2.0-1458.78 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 16. December 2014 23:03 UTC
  kernel-stable-master-bug:1403154
  kernel-stable-Certification-testing-end:Thursday, 18. December 2014 12:02 UTC
  kernel-stable-Prepare-package-end:Thursday, 18. December 2014 16:02 UTC
  kernel-stable-Promote-to-proposed-start:Thursday, 18. December 2014 16:02 UTC
  ppa-package-testing-start:Thursday, 18. December 2014 16:02 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 18. December 2014 22:02 UTC
  kernel-stable-Security-signoff-start:Friday, 19. December 2014 00:03 UTC
  kernel-stable-Verification-testing-start:Friday, 19. December 2014 00:02 UTC
  kernel-stable-Regression-testing-start:Friday, 19. December 2014 00:03 UTC
  kernel-stable-Verification-testing-end:Friday, 19. December 2014 12:01 UTC
  kernel-stable-Security-signoff-end:Friday, 19. December 2014 14:01 UTC
  kernel-stable-phase:CopyToUpdates
  kernel-stable-phase-changed:Monday, 12. January 2015 18:29 UTC
  kernel-stable-Promote-to-updates-start:Monday, 12. January 2015 18:29 UTC
  kernel-stable-Regression-testing-end:Monday, 12. January 2015 18:29 UTC
  kernel-stable-Promote-to-updates-end:Monday, 12. January 2015 20:45 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1403239/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1403239] Re: linux-ti-omap4: 3.2.0-1458.78 -proposed tracker

2015-01-12 Thread Chris J Arges
Promoted to Updates:
 linux-ti-omap4  | 3.2.0-1458.78 | precise-security | source
 linux-ti-omap4  | 3.2.0-1458.78 | precise-updates  | source
 linux-meta-ti-omap4 | 3.2.0.1458.53 | precise-security | source
 linux-meta-ti-omap4 | 3.2.0.1458.53 | precise-updates  | source

** Changed in: kernel-sru-workflow/promote-to-security
   Status: Confirmed => Fix Released

** Changed in: kernel-sru-workflow/promote-to-updates
   Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-ti-omap4 in Ubuntu.
https://bugs.launchpad.net/bugs/1403239

Title:
  linux-ti-omap4: 3.2.0-1458.78 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow package-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Fix Released
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow upload-to-ppa series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  Fix Released

Bug description:
  This bug is for tracking the 3.2.0-1458.78 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 16. December 2014 23:03 UTC
  kernel-stable-master-bug:1403154
  kernel-stable-Certification-testing-end:Thursday, 18. December 2014 12:02 UTC
  kernel-stable-Prepare-package-end:Thursday, 18. December 2014 16:02 UTC
  kernel-stable-Promote-to-proposed-start:Thursday, 18. December 2014 16:02 UTC
  ppa-package-testing-start:Thursday, 18. December 2014 16:02 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 18. December 2014 22:02 UTC
  kernel-stable-Security-signoff-start:Friday, 19. December 2014 00:03 UTC
  kernel-stable-Verification-testing-start:Friday, 19. December 2014 00:02 UTC
  kernel-stable-Regression-testing-start:Friday, 19. December 2014 00:03 UTC
  kernel-stable-Verification-testing-end:Friday, 19. December 2014 12:01 UTC
  kernel-stable-Security-signoff-end:Friday, 19. December 2014 14:01 UTC
  kernel-stable-phase:CopyToUpdates
  kernel-stable-phase-changed:Monday, 12. January 2015 18:29 UTC
  kernel-stable-Promote-to-updates-start:Monday, 12. January 2015 18:29 UTC
  kernel-stable-Regression-testing-end:Monday, 12. January 2015 18:29 UTC
  kernel-stable-Promote-to-updates-end:Monday, 12. January 2015 20:45 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1403239/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1408118] Re: hama uzzano keyboard do not work properly

2015-01-12 Thread paumarc
Yes, the kernel panic stop happening, as i suspected i installed a wrong
version. I'm sorry for the inconveniences

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1408118

Title:
  hama uzzano keyboard do not work properly

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  Hello

   I recently tried to  use a hama uzzano keyboard on ubuntu 14.10. This
  is a wireless keyboard. Some times starts working and then suddenly
  stops, but mostly it does not work.

   i looked if it was recognized and it is:

  lsusb:

  pau@traveller:~$ lsusb
  Bus 002 Device 002: ID 8087:0024 Intel Corp. Integrated Rate Matching Hub
  Bus 002 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
  Bus 001 Device 003: ID 04ca:7012 Lite-On Technology Corp. 
  Bus 001 Device 002: ID 8087:0024 Intel Corp. Integrated Rate Matching Hub
  Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
  Bus 004 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub
  Bus 003 Device 003: ID 0930:021d Toshiba Corp. 
  Bus 003 Device 008: ID 04d9:a01c Holtek Semiconductor, Inc. 
  Bus 003 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub

  and

  dmesg | grep usb (partial)

  [ 8974.179356] input: HOLTEK Wireless USB Device as 
/devices/pci:00/:00:14.0/usb3/3-1/3-1:1.0/0003:04D9:A01C.000D/input/input29
  [ 8974.179587] hid-generic 0003:04D9:A01C.000D: input,hidraw0: USB HID v1.10 
Keyboard [HOLTEK Wireless USB Device] on usb-:00:14.0-1/input0
  [ 8974.191755] input: HOLTEK Wireless USB Device as 
/devices/pci:00/:00:14.0/usb3/3-1/3-1:1.1/0003:04D9:A01C.000E/input/input30
  [ 8974.192062] hid-generic 0003:04D9:A01C.000E: input,hidraw1: USB HID v1.10 
Mouse [HOLTEK Wireless USB Device] on usb-:00:14.0-1/input1

  i tried to solve the problem as it is explained here

  http://askubuntu.com/questions/160329/usb-keyboard-works-occasionally

  but it did not works. What can i do, i suppose this is a bug, do you
  need extra information?

  (it works with windows)

  thanks

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1408118/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1409379] Status changed to Confirmed

2015-01-12 Thread Brad Figg
This change was made by a bot.

** Changed in: linux (Ubuntu)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1409379

Title:
  [Acer Aspire 5733Z] suspend/resume failure

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  not recognizing iPad

  ProblemType: KernelOops
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.13.0-43-generic 3.13.0-43.72
  ProcVersionSignature: Ubuntu 3.13.0-43.72-generic 3.13.11.11
  Uname: Linux 3.13.0-43-generic x86_64
  Annotation: This occured during a previous suspend and prevented it from 
resuming properly.
  ApportVersion: 2.14.4-0ubuntu1~ubuntu14.04.1~c42.ppa1
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  jeffrey2505 F pulseaudio
  Date: Thu Jan  8 23:34:04 2015
  DuplicateSignature: suspend/resume:Acer Aspire 5733Z:V1.07
  ExecutablePath: /usr/share/apport/apportcheckresume
  Failure: suspend/resume
  HibernationDevice: RESUME=UUID=617ecff1-710e-4615-8fa5-630b97b458b8
  InterpreterPath: /usr/bin/python3.4
  MachineType: Acer Aspire 5733Z
  ProcCmdline: /usr/bin/python3 /usr/share/apport/apportcheckresume
  ProcEnviron:
   TERM=linux
   PATH=(custom, no user)
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: placeholder root=UUID=13aad992-0f2c-4566-b8ae-88f48802490a 
ro quiet splash
  PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No 
PulseAudio daemon running, or not running as session daemon.
  RelatedPackageVersions:
   linux-restricted-modules-3.13.0-43-generic N/A
   linux-backports-modules-3.13.0-43-generic  N/A
   linux-firmware 1.127.10
  SourcePackage: linux
  Title: [Acer Aspire 5733Z] suspend/resume failure
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups:
   
  dmi.bios.date: 11/07/2011
  dmi.bios.vendor: Acer
  dmi.bios.version: V1.07
  dmi.board.asset.tag: Base Board Asset Tag
  dmi.board.name: Aspire 5733Z
  dmi.board.vendor: Acer
  dmi.board.version: V1.07
  dmi.chassis.type: 10
  dmi.chassis.vendor: Acer
  dmi.chassis.version: V1.07
  dmi.modalias: 
dmi:bvnAcer:bvrV1.07:bd11/07/2011:svnAcer:pnAspire5733Z:pvrV1.07:rvnAcer:rnAspire5733Z:rvrV1.07:cvnAcer:ct10:cvrV1.07:
  dmi.product.name: Aspire 5733Z
  dmi.product.version: V1.07
  dmi.sys.vendor: Acer

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1409379/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1409379] Re: [Acer Aspire 5733Z] suspend/resume failure

2015-01-12 Thread Apport retracing service
** Tags removed: need-duplicate-check

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1409379

Title:
  [Acer Aspire 5733Z] suspend/resume failure

Status in linux package in Ubuntu:
  New

Bug description:
  not recognizing iPad

  ProblemType: KernelOops
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.13.0-43-generic 3.13.0-43.72
  ProcVersionSignature: Ubuntu 3.13.0-43.72-generic 3.13.11.11
  Uname: Linux 3.13.0-43-generic x86_64
  Annotation: This occured during a previous suspend and prevented it from 
resuming properly.
  ApportVersion: 2.14.4-0ubuntu1~ubuntu14.04.1~c42.ppa1
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  jeffrey2505 F pulseaudio
  Date: Thu Jan  8 23:34:04 2015
  DuplicateSignature: suspend/resume:Acer Aspire 5733Z:V1.07
  ExecutablePath: /usr/share/apport/apportcheckresume
  Failure: suspend/resume
  HibernationDevice: RESUME=UUID=617ecff1-710e-4615-8fa5-630b97b458b8
  InterpreterPath: /usr/bin/python3.4
  MachineType: Acer Aspire 5733Z
  ProcCmdline: /usr/bin/python3 /usr/share/apport/apportcheckresume
  ProcEnviron:
   TERM=linux
   PATH=(custom, no user)
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: placeholder root=UUID=13aad992-0f2c-4566-b8ae-88f48802490a 
ro quiet splash
  PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No 
PulseAudio daemon running, or not running as session daemon.
  RelatedPackageVersions:
   linux-restricted-modules-3.13.0-43-generic N/A
   linux-backports-modules-3.13.0-43-generic  N/A
   linux-firmware 1.127.10
  SourcePackage: linux
  Title: [Acer Aspire 5733Z] suspend/resume failure
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups:
   
  dmi.bios.date: 11/07/2011
  dmi.bios.vendor: Acer
  dmi.bios.version: V1.07
  dmi.board.asset.tag: Base Board Asset Tag
  dmi.board.name: Aspire 5733Z
  dmi.board.vendor: Acer
  dmi.board.version: V1.07
  dmi.chassis.type: 10
  dmi.chassis.vendor: Acer
  dmi.chassis.version: V1.07
  dmi.modalias: 
dmi:bvnAcer:bvrV1.07:bd11/07/2011:svnAcer:pnAspire5733Z:pvrV1.07:rvnAcer:rnAspire5733Z:rvrV1.07:cvnAcer:ct10:cvrV1.07:
  dmi.product.name: Aspire 5733Z
  dmi.product.version: V1.07
  dmi.sys.vendor: Acer

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1409379/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1409379] Re: [Acer Aspire 5733Z] suspend/resume failure

2015-01-12 Thread Seth Arnold
** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1409379

Title:
  [Acer Aspire 5733Z] suspend/resume failure

Status in linux package in Ubuntu:
  New

Bug description:
  not recognizing iPad

  ProblemType: KernelOops
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.13.0-43-generic 3.13.0-43.72
  ProcVersionSignature: Ubuntu 3.13.0-43.72-generic 3.13.11.11
  Uname: Linux 3.13.0-43-generic x86_64
  Annotation: This occured during a previous suspend and prevented it from 
resuming properly.
  ApportVersion: 2.14.4-0ubuntu1~ubuntu14.04.1~c42.ppa1
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  jeffrey2505 F pulseaudio
  Date: Thu Jan  8 23:34:04 2015
  DuplicateSignature: suspend/resume:Acer Aspire 5733Z:V1.07
  ExecutablePath: /usr/share/apport/apportcheckresume
  Failure: suspend/resume
  HibernationDevice: RESUME=UUID=617ecff1-710e-4615-8fa5-630b97b458b8
  InterpreterPath: /usr/bin/python3.4
  MachineType: Acer Aspire 5733Z
  ProcCmdline: /usr/bin/python3 /usr/share/apport/apportcheckresume
  ProcEnviron:
   TERM=linux
   PATH=(custom, no user)
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: placeholder root=UUID=13aad992-0f2c-4566-b8ae-88f48802490a 
ro quiet splash
  PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No 
PulseAudio daemon running, or not running as session daemon.
  RelatedPackageVersions:
   linux-restricted-modules-3.13.0-43-generic N/A
   linux-backports-modules-3.13.0-43-generic  N/A
   linux-firmware 1.127.10
  SourcePackage: linux
  Title: [Acer Aspire 5733Z] suspend/resume failure
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups:
   
  dmi.bios.date: 11/07/2011
  dmi.bios.vendor: Acer
  dmi.bios.version: V1.07
  dmi.board.asset.tag: Base Board Asset Tag
  dmi.board.name: Aspire 5733Z
  dmi.board.vendor: Acer
  dmi.board.version: V1.07
  dmi.chassis.type: 10
  dmi.chassis.vendor: Acer
  dmi.chassis.version: V1.07
  dmi.modalias: 
dmi:bvnAcer:bvrV1.07:bd11/07/2011:svnAcer:pnAspire5733Z:pvrV1.07:rvnAcer:rnAspire5733Z:rvrV1.07:cvnAcer:ct10:cvrV1.07:
  dmi.product.name: Aspire 5733Z
  dmi.product.version: V1.07
  dmi.sys.vendor: Acer

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1409379/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1409890] [NEW] linux: 3.16.0-30.40 -proposed tracker

2015-01-12 Thread Seth Forshee
Public bug reported:

This bug is for tracking the 3.16.0-30.40 upload package. This bug will
contain status and testing results related to that upload.

For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-Prepare-package-start:Monday, 12. January 2015 20:07 UTC
kernel-stable-phase:Prepare
kernel-stable-phase-changed:Monday, 12. January 2015 20:07 UTC

** Affects: kernel-sru-workflow
 Importance: Medium
 Status: In Progress

** Affects: kernel-sru-workflow/certification-testing
 Importance: Medium
 Assignee: Canonical Hardware Certification (canonical-hw-cert)
 Status: New

** Affects: kernel-sru-workflow/package-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/prepare-package
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/prepare-package-meta
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/prepare-package-signed
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/promote-to-proposed
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-security
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-updates
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/regression-testing
 Importance: Medium
 Assignee: Canonical Platform QA Team (canonical-platform-qa)
 Status: New

** Affects: kernel-sru-workflow/security-signoff
 Importance: Medium
 Assignee: Canonical Security Team (canonical-security)
 Status: New

** Affects: kernel-sru-workflow/verification-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Invalid


** Tags: kernel-release-tracking-bug utopic

** Tags added: kernel-release-tracking-bug

** Tags added: utopic

** Also affects: kernel-sru-workflow/certification-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/package-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package-signed
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-proposed
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-security
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-updates
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/regression-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/security-signoff
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/verification-testing
   Importance: Undecided
   Status: New

** Changed in: kernel-sru-workflow
   Status: New => In Progress

** Changed in: kernel-sru-workflow
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/certification-testing
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/certification-testing
 Assignee: (unassigned) => Canonical Hardware Certification 
(canonical-hw-cert)

** Changed in: kernel-sru-workflow/package-testing
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/package-testing
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/prepare-package
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/prepare-package-signed
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/prepare-package-signed
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/promote-to-proposed
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/promote-to-proposed

[Kernel-packages] [Bug 1386395] Re: CVE-2014-8369

2015-01-12 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1458.78

---
linux-ti-omap4 (3.2.0-1458.78) precise; urgency=low

  * Release Tracking Bug
- LP: #1403239

  [ Luis Henriques ]

  * rebased on Ubuntu-3.2.0-75.110

  [ Ubuntu: 3.2.0-75.110 ]

  * Release Tracking Bug
- LP: #1403154
  * kvm: fix excessive pages un-pinning in kvm_iommu_map error path.
- LP: #1386395
- CVE-2014-8369
  * KVM: x86: Don't report guest userspace emulation error to userspace
- LP: #1392823
- CVE-2014-7842
  * drivers:scsi:storvsc: Fix a bug in handling ring buffer failures that
may result in I/O freeze
- LP: #1400289
  * net:socket: set msg_namelen to 0 if msg_name is passed as NULL in
msghdr struct from userland.
- LP: #1335478

  [ Ubuntu: 3.2.0-74.109 ]

  * Release Tracking Bug
- LP: #1400709
  * x86_64, traps: Stop using IST for #SS
- LP: #1398795
- CVE-2014-9090
  * x86_64, traps: Fix the espfix64 #DF fixup and rewrite it in C
- LP: #1398795
- CVE-2014-9090
  * x86_64, traps: Rework bad_iret
- LP: #1398795
- CVE-2014-9090
  * x86, kvm: Clear paravirt_enabled on KVM guests for espfix32's benefit
- LP: #1400314
- CVE-2014-8134
 -- Luis HenriquesThu, 18 Dec 2014 10:59:10 
+

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1386395

Title:
  CVE-2014-8369

Status in linux package in Ubuntu:
  Fix Committed
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-ec2 package in Ubuntu:
  Invalid
Status in linux-fsl-imx51 package in Ubuntu:
  Invalid
Status in linux-lts-backport-maverick package in Ubuntu:
  New
Status in linux-lts-backport-natty package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-mvl-dove package in Ubuntu:
  Invalid
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Invalid
Status in linux-armadaxp source package in Lucid:
  Invalid
Status in linux-ec2 source package in Lucid:
  Invalid
Status in linux-fsl-imx51 source package in Lucid:
  Invalid
Status in linux-lts-backport-maverick source package in Lucid:
  New
Status in linux-lts-backport-natty source package in Lucid:
  New
Status in linux-lts-quantal source package in Lucid:
  Invalid
Status in linux-lts-raring source package in Lucid:
  Invalid
Status in linux-lts-saucy source package in Lucid:
  Invalid
Status in linux-lts-trusty source package in Lucid:
  Invalid
Status in linux-lts-utopic source package in Lucid:
  Invalid
Status in linux-mvl-dove source package in Lucid:
  Invalid
Status in linux-ti-omap4 source package in Lucid:
  Invalid
Status in linux source package in Precise:
  Fix Released
Status in linux-armadaxp source package in Precise:
  Fix Released
Status in linux-ec2 source package in Precise:
  Invalid
Status in linux-fsl-imx51 source package in Precise:
  Invalid
Status in linux-lts-backport-maverick source package in Precise:
  New
Status in linux-lts-backport-natty source package in Precise:
  New
Status in linux-lts-quantal source package in Precise:
  Fix Committed
Status in linux-lts-raring source package in Precise:
  Invalid
Status in linux-lts-saucy source package in Precise:
  Fix Committed
Status in linux-lts-trusty source package in Precise:
  Fix Released
Status in linux-lts-utopic source package in Precise:
  Invalid
Status in linux-mvl-dove source package in Precise:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  Fix Released
Status in linux source package in Trusty:
  Fix Released
Status in linux-armadaxp source package in Trusty:
  Invalid
Status in linux-ec2 source package in Trusty:
  Invalid
Status in linux-fsl-imx51 source package in Trusty:
  Invalid
Status in linux-lts-backport-maverick source package in Trusty:
  New
Status in linux-lts-backport-natty source package in Trusty:
  New
Status in linux-lts-quantal source package in Trusty:
  Invalid
Status in linux-lts-raring source package in Trusty:
  Invalid
Status in linux-lts-saucy source package in Trusty:
  Invalid
Status in linux-lts-trusty source package in Trusty:
  Invalid
Status in linux-lts-utopic source package in Trusty:
  Fix Released
Status in linux-mvl-dove source package in Trusty:
  Invalid
Status in linux-ti-omap4 source package in Trusty:
  Invalid
Status in linux source package in Utopic:
  Fix Released
Status in linux-armadaxp source package in Utopic:
  Invalid
Status in linux-ec2 source package in Utopic:
  Invalid
Status in linux-fsl-imx51 source package in Utopic:
  Invalid
Status in linux-lts-backport-maverick source package in Utopic:
  New
Status in linux-lts-backport-natty source p

[Kernel-packages] [Bug 1403239] Re: linux-ti-omap4: 3.2.0-1458.78 -proposed tracker

2015-01-12 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1458.78

---
linux-ti-omap4 (3.2.0-1458.78) precise; urgency=low

  * Release Tracking Bug
- LP: #1403239

  [ Luis Henriques ]

  * rebased on Ubuntu-3.2.0-75.110

  [ Ubuntu: 3.2.0-75.110 ]

  * Release Tracking Bug
- LP: #1403154
  * kvm: fix excessive pages un-pinning in kvm_iommu_map error path.
- LP: #1386395
- CVE-2014-8369
  * KVM: x86: Don't report guest userspace emulation error to userspace
- LP: #1392823
- CVE-2014-7842
  * drivers:scsi:storvsc: Fix a bug in handling ring buffer failures that
may result in I/O freeze
- LP: #1400289
  * net:socket: set msg_namelen to 0 if msg_name is passed as NULL in
msghdr struct from userland.
- LP: #1335478

  [ Ubuntu: 3.2.0-74.109 ]

  * Release Tracking Bug
- LP: #1400709
  * x86_64, traps: Stop using IST for #SS
- LP: #1398795
- CVE-2014-9090
  * x86_64, traps: Fix the espfix64 #DF fixup and rewrite it in C
- LP: #1398795
- CVE-2014-9090
  * x86_64, traps: Rework bad_iret
- LP: #1398795
- CVE-2014-9090
  * x86, kvm: Clear paravirt_enabled on KVM guests for espfix32's benefit
- LP: #1400314
- CVE-2014-8134
 -- Luis HenriquesThu, 18 Dec 2014 10:59:10 
+

** Changed in: linux-ti-omap4 (Ubuntu Precise)
   Status: New => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-7842

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-8134

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-8369

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-9090

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-ti-omap4 in Ubuntu.
https://bugs.launchpad.net/bugs/1403239

Title:
  linux-ti-omap4: 3.2.0-1458.78 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow package-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Confirmed
Status in Kernel SRU Workflow promote-to-updates series:
  Confirmed
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow upload-to-ppa series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  Fix Released

Bug description:
  This bug is for tracking the 3.2.0-1458.78 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 16. December 2014 23:03 UTC
  kernel-stable-master-bug:1403154
  kernel-stable-Certification-testing-end:Thursday, 18. December 2014 12:02 UTC
  kernel-stable-Prepare-package-end:Thursday, 18. December 2014 16:02 UTC
  kernel-stable-Promote-to-proposed-start:Thursday, 18. December 2014 16:02 UTC
  ppa-package-testing-start:Thursday, 18. December 2014 16:02 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 18. December 2014 22:02 UTC
  kernel-stable-Security-signoff-start:Friday, 19. December 2014 00:03 UTC
  kernel-stable-Verification-testing-start:Friday, 19. December 2014 00:02 UTC
  kernel-stable-Regression-testing-start:Friday, 19. December 2014 00:03 UTC
  kernel-stable-Verification-testing-end:Friday, 19. December 2014 12:01 UTC
  kernel-stable-Security-signoff-end:Friday, 19. December 2014 14:01 UTC
  kernel-stable-phase:CopyToUpdates
  kernel-stable-phase-changed:Monday, 12. January 2015 18:29 UTC
  kernel-stable-Promote-to-updates-start:Monday, 12. January 2015 18:29 UTC
  kernel-stable-Regression-testing-end:Monday, 12. January 2015 18:29 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1403239/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1392823] Re: CVE-2014-7842

2015-01-12 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1458.78

---
linux-ti-omap4 (3.2.0-1458.78) precise; urgency=low

  * Release Tracking Bug
- LP: #1403239

  [ Luis Henriques ]

  * rebased on Ubuntu-3.2.0-75.110

  [ Ubuntu: 3.2.0-75.110 ]

  * Release Tracking Bug
- LP: #1403154
  * kvm: fix excessive pages un-pinning in kvm_iommu_map error path.
- LP: #1386395
- CVE-2014-8369
  * KVM: x86: Don't report guest userspace emulation error to userspace
- LP: #1392823
- CVE-2014-7842
  * drivers:scsi:storvsc: Fix a bug in handling ring buffer failures that
may result in I/O freeze
- LP: #1400289
  * net:socket: set msg_namelen to 0 if msg_name is passed as NULL in
msghdr struct from userland.
- LP: #1335478

  [ Ubuntu: 3.2.0-74.109 ]

  * Release Tracking Bug
- LP: #1400709
  * x86_64, traps: Stop using IST for #SS
- LP: #1398795
- CVE-2014-9090
  * x86_64, traps: Fix the espfix64 #DF fixup and rewrite it in C
- LP: #1398795
- CVE-2014-9090
  * x86_64, traps: Rework bad_iret
- LP: #1398795
- CVE-2014-9090
  * x86, kvm: Clear paravirt_enabled on KVM guests for espfix32's benefit
- LP: #1400314
- CVE-2014-8134
 -- Luis HenriquesThu, 18 Dec 2014 10:59:10 
+

** Changed in: linux-ti-omap4 (Ubuntu Precise)
   Status: Fix Committed => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-8134

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-9090

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1392823

Title:
  CVE-2014-7842

Status in linux package in Ubuntu:
  Fix Committed
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-ec2 package in Ubuntu:
  Invalid
Status in linux-fsl-imx51 package in Ubuntu:
  Invalid
Status in linux-lts-backport-maverick package in Ubuntu:
  New
Status in linux-lts-backport-natty package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-mvl-dove package in Ubuntu:
  Invalid
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Invalid
Status in linux-armadaxp source package in Lucid:
  Invalid
Status in linux-ec2 source package in Lucid:
  Invalid
Status in linux-fsl-imx51 source package in Lucid:
  Invalid
Status in linux-lts-backport-maverick source package in Lucid:
  New
Status in linux-lts-backport-natty source package in Lucid:
  New
Status in linux-lts-quantal source package in Lucid:
  Invalid
Status in linux-lts-raring source package in Lucid:
  Invalid
Status in linux-lts-saucy source package in Lucid:
  Invalid
Status in linux-lts-trusty source package in Lucid:
  Invalid
Status in linux-lts-utopic source package in Lucid:
  Invalid
Status in linux-mvl-dove source package in Lucid:
  Invalid
Status in linux-ti-omap4 source package in Lucid:
  Invalid
Status in linux source package in Precise:
  Fix Released
Status in linux-armadaxp source package in Precise:
  Fix Released
Status in linux-ec2 source package in Precise:
  Invalid
Status in linux-fsl-imx51 source package in Precise:
  Invalid
Status in linux-lts-backport-maverick source package in Precise:
  New
Status in linux-lts-backport-natty source package in Precise:
  New
Status in linux-lts-quantal source package in Precise:
  Fix Committed
Status in linux-lts-raring source package in Precise:
  Invalid
Status in linux-lts-saucy source package in Precise:
  Fix Committed
Status in linux-lts-trusty source package in Precise:
  Fix Committed
Status in linux-lts-utopic source package in Precise:
  Invalid
Status in linux-mvl-dove source package in Precise:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  Fix Released
Status in linux source package in Trusty:
  Fix Committed
Status in linux-armadaxp source package in Trusty:
  Invalid
Status in linux-ec2 source package in Trusty:
  Invalid
Status in linux-fsl-imx51 source package in Trusty:
  Invalid
Status in linux-lts-backport-maverick source package in Trusty:
  New
Status in linux-lts-backport-natty source package in Trusty:
  New
Status in linux-lts-quantal source package in Trusty:
  Invalid
Status in linux-lts-raring source package in Trusty:
  Invalid
Status in linux-lts-saucy source package in Trusty:
  Invalid
Status in linux-lts-trusty source package in Trusty:
  Invalid
Status in linux-lts-utopic source package in Trusty:
  Fix Committed
Status in linux-mvl-dove source package in Trusty:
  Invalid
Status in linux-ti-omap4 source package in Trusty:
  Invalid
Status in linux source package in Utopic:
  Fix Committed
Status in linux-armadaxp source package in 

[Kernel-packages] [Bug 1386395] Re: CVE-2014-8369

2015-01-12 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1458.78

---
linux-ti-omap4 (3.2.0-1458.78) precise; urgency=low

  * Release Tracking Bug
- LP: #1403239

  [ Luis Henriques ]

  * rebased on Ubuntu-3.2.0-75.110

  [ Ubuntu: 3.2.0-75.110 ]

  * Release Tracking Bug
- LP: #1403154
  * kvm: fix excessive pages un-pinning in kvm_iommu_map error path.
- LP: #1386395
- CVE-2014-8369
  * KVM: x86: Don't report guest userspace emulation error to userspace
- LP: #1392823
- CVE-2014-7842
  * drivers:scsi:storvsc: Fix a bug in handling ring buffer failures that
may result in I/O freeze
- LP: #1400289
  * net:socket: set msg_namelen to 0 if msg_name is passed as NULL in
msghdr struct from userland.
- LP: #1335478

  [ Ubuntu: 3.2.0-74.109 ]

  * Release Tracking Bug
- LP: #1400709
  * x86_64, traps: Stop using IST for #SS
- LP: #1398795
- CVE-2014-9090
  * x86_64, traps: Fix the espfix64 #DF fixup and rewrite it in C
- LP: #1398795
- CVE-2014-9090
  * x86_64, traps: Rework bad_iret
- LP: #1398795
- CVE-2014-9090
  * x86, kvm: Clear paravirt_enabled on KVM guests for espfix32's benefit
- LP: #1400314
- CVE-2014-8134
 -- Luis HenriquesThu, 18 Dec 2014 10:59:10 
+

** Changed in: linux-ti-omap4 (Ubuntu Precise)
   Status: Fix Committed => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-8134

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-9090

** Changed in: linux-ti-omap4 (Ubuntu Precise)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1386395

Title:
  CVE-2014-8369

Status in linux package in Ubuntu:
  Fix Committed
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-ec2 package in Ubuntu:
  Invalid
Status in linux-fsl-imx51 package in Ubuntu:
  Invalid
Status in linux-lts-backport-maverick package in Ubuntu:
  New
Status in linux-lts-backport-natty package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-mvl-dove package in Ubuntu:
  Invalid
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Invalid
Status in linux-armadaxp source package in Lucid:
  Invalid
Status in linux-ec2 source package in Lucid:
  Invalid
Status in linux-fsl-imx51 source package in Lucid:
  Invalid
Status in linux-lts-backport-maverick source package in Lucid:
  New
Status in linux-lts-backport-natty source package in Lucid:
  New
Status in linux-lts-quantal source package in Lucid:
  Invalid
Status in linux-lts-raring source package in Lucid:
  Invalid
Status in linux-lts-saucy source package in Lucid:
  Invalid
Status in linux-lts-trusty source package in Lucid:
  Invalid
Status in linux-lts-utopic source package in Lucid:
  Invalid
Status in linux-mvl-dove source package in Lucid:
  Invalid
Status in linux-ti-omap4 source package in Lucid:
  Invalid
Status in linux source package in Precise:
  Fix Released
Status in linux-armadaxp source package in Precise:
  Fix Released
Status in linux-ec2 source package in Precise:
  Invalid
Status in linux-fsl-imx51 source package in Precise:
  Invalid
Status in linux-lts-backport-maverick source package in Precise:
  New
Status in linux-lts-backport-natty source package in Precise:
  New
Status in linux-lts-quantal source package in Precise:
  Fix Committed
Status in linux-lts-raring source package in Precise:
  Invalid
Status in linux-lts-saucy source package in Precise:
  Fix Committed
Status in linux-lts-trusty source package in Precise:
  Fix Released
Status in linux-lts-utopic source package in Precise:
  Invalid
Status in linux-mvl-dove source package in Precise:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  Fix Released
Status in linux source package in Trusty:
  Fix Released
Status in linux-armadaxp source package in Trusty:
  Invalid
Status in linux-ec2 source package in Trusty:
  Invalid
Status in linux-fsl-imx51 source package in Trusty:
  Invalid
Status in linux-lts-backport-maverick source package in Trusty:
  New
Status in linux-lts-backport-natty source package in Trusty:
  New
Status in linux-lts-quantal source package in Trusty:
  Invalid
Status in linux-lts-raring source package in Trusty:
  Invalid
Status in linux-lts-saucy source package in Trusty:
  Invalid
Status in linux-lts-trusty source package in Trusty:
  Invalid
Status in linux-lts-utopic source package in Trusty:
  Fix Released
Status in linux-mvl-dove source package in Trusty:
  Invalid
Status in linux-ti-omap4 source package in Trusty:
  Invalid
Status in l

[Kernel-packages] [Bug 1403239] Re: linux-ti-omap4: 3.2.0-1458.78 -proposed tracker

2015-01-12 Thread Chris J Arges
** Changed in: kernel-sru-workflow/promote-to-security
 Assignee: (unassigned) => Chris J Arges (arges)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-ti-omap4 in Ubuntu.
https://bugs.launchpad.net/bugs/1403239

Title:
  linux-ti-omap4: 3.2.0-1458.78 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow package-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Confirmed
Status in Kernel SRU Workflow promote-to-updates series:
  Confirmed
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow upload-to-ppa series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  New

Bug description:
  This bug is for tracking the 3.2.0-1458.78 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 16. December 2014 23:03 UTC
  kernel-stable-master-bug:1403154
  kernel-stable-Certification-testing-end:Thursday, 18. December 2014 12:02 UTC
  kernel-stable-Prepare-package-end:Thursday, 18. December 2014 16:02 UTC
  kernel-stable-Promote-to-proposed-start:Thursday, 18. December 2014 16:02 UTC
  ppa-package-testing-start:Thursday, 18. December 2014 16:02 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 18. December 2014 22:02 UTC
  kernel-stable-Security-signoff-start:Friday, 19. December 2014 00:03 UTC
  kernel-stable-Verification-testing-start:Friday, 19. December 2014 00:02 UTC
  kernel-stable-Regression-testing-start:Friday, 19. December 2014 00:03 UTC
  kernel-stable-Verification-testing-end:Friday, 19. December 2014 12:01 UTC
  kernel-stable-Security-signoff-end:Friday, 19. December 2014 14:01 UTC
  kernel-stable-phase:CopyToUpdates
  kernel-stable-phase-changed:Monday, 12. January 2015 18:29 UTC
  kernel-stable-Promote-to-updates-start:Monday, 12. January 2015 18:29 UTC
  kernel-stable-Regression-testing-end:Monday, 12. January 2015 18:29 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1403239/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1403154] Re: linux: 3.2.0-75.110 -proposed tracker

2015-01-12 Thread Brad Figg
The package has been published and the bug is being set to Fix Released


** Changed in: kernel-sru-workflow
   Status: In Progress => Fix Released

** Description changed:

  This bug is for tracking the 3.2.0-75.110 upload package. This bug will
  contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 16. December 2014 17:50 UTC
  kernel-stable-Prepare-package-end:Tuesday, 16. December 2014 23:08 UTC
  kernel-stable-Promote-to-proposed-start:Tuesday, 16. December 2014 23:08 UTC
  ppa-package-testing-start:Tuesday, 16. December 2014 23:08 UTC
  kernel-stable-Promote-to-proposed-end:Wednesday, 17. December 2014 18:20 UTC
  kernel-stable-Verification-testing-start:Wednesday, 17. December 2014 20:01 
UTC
  kernel-stable-Certification-testing-start:Wednesday, 17. December 2014 20:02 
UTC
  kernel-stable-Security-signoff-start:Wednesday, 17. December 2014 20:02 UTC
  kernel-stable-Regression-testing-start:Wednesday, 17. December 2014 20:02 UTC
  kernel-stable-Security-signoff-end:Thursday, 18. December 2014 14:01 UTC
  kernel-stable-Certification-testing-end:Wednesday, 07. January 2015 10:01 UTC
  kernel-stable-Regression-testing-end:Friday, 09. January 2015 16:10 UTC
- kernel-stable-phase:CopyToUpdates
- kernel-stable-phase-changed:Friday, 09. January 2015 16:20 UTC
  kernel-stable-Promote-to-updates-start:Friday, 09. January 2015 16:20 UTC
  kernel-stable-Promote-to-updates-end:Monday, 12. January 2015 17:35 UTC
+ kernel-stable-phase:Released
+ kernel-stable-phase-changed:Monday, 12. January 2015 19:05 UTC

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1403154

Title:
  linux: 3.2.0-75.110 -proposed tracker

Status in Kernel SRU Workflow:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Fix Released
Status in Kernel SRU Workflow package-testing series:
  Fix Released
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-lbm series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Fix Released
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Precise:
  Fix Released

Bug description:
  This bug is for tracking the 3.2.0-75.110 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 16. December 2014 17:50 UTC
  kernel-stable-Prepare-package-end:Tuesday, 16. December 2014 23:08 UTC
  kernel-stable-Promote-to-proposed-start:Tuesday, 16. December 2014 23:08 UTC
  ppa-package-testing-start:Tuesday, 16. December 2014 23:08 UTC
  kernel-stable-Promote-to-proposed-end:Wednesday, 17. December 2014 18:20 UTC
  kernel-stable-Verification-testing-start:Wednesday, 17. December 2014 20:01 
UTC
  kernel-stable-Certification-testing-start:Wednesday, 17. December 2014 20:02 
UTC
  kernel-stable-Security-signoff-start:Wednesday, 17. December 2014 20:02 UTC
  kernel-stable-Regression-testing-start:Wednesday, 17. December 2014 20:02 UTC
  kernel-stable-Security-signoff-end:Thursday, 18. December 2014 14:01 UTC
  kernel-stable-Certification-testing-end:Wednesday, 07. January 2015 10:01 UTC
  kernel-stable-Regression-testing-end:Friday, 09. January 2015 16:10 UTC
  kernel-stable-Promote-to-updates-start:Friday, 09. January 2015 16:20 UTC
  kernel-stable-Promote-to-updates-end:Monday, 12. January 2015 17:35 UTC
  kernel-stable-phase:Released
  kernel-stable-phase-changed:Monday, 12. January 2015 19:05 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1403154/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1403240] Re: linux-armadaxp: 3.2.0-1643.62 -proposed tracker

2015-01-12 Thread Brad Figg
The package has been published and the bug is being set to Fix Released


** Changed in: kernel-sru-workflow
   Status: In Progress => Fix Released

** Description changed:

  This bug is for tracking the 3.2.0-1643.62 upload package. This bug will
  contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 16. December 2014 23:05 UTC
  kernel-stable-master-bug:1403154
  kernel-stable-Certification-testing-end:Wednesday, 17. December 2014 03:02 UTC
  kernel-stable-Security-signoff-end:Wednesday, 17. December 2014 03:02 UTC
  kernel-stable-Prepare-package-end:Wednesday, 17. December 2014 06:03 UTC
  kernel-stable-Promote-to-proposed-start:Wednesday, 17. December 2014 06:03 UTC
  ppa-package-testing-start:Wednesday, 17. December 2014 06:03 UTC
  kernel-stable-Promote-to-proposed-end:Wednesday, 17. December 2014 19:09 UTC
  kernel-stable-Verification-testing-start:Wednesday, 17. December 2014 21:01 
UTC
  kernel-stable-Regression-testing-start:Wednesday, 17. December 2014 21:01 UTC
  kernel-stable-Regression-testing-end:Thursday, 18. December 2014 05:02 UTC
- kernel-stable-phase:CopyToUpdates
- kernel-stable-phase-changed:Friday, 09. January 2015 16:20 UTC
  kernel-stable-Promote-to-updates-start:Friday, 09. January 2015 16:20 UTC
  kernel-stable-Promote-to-updates-end:Monday, 12. January 2015 17:44 UTC
+ kernel-stable-phase:Released
+ kernel-stable-phase-changed:Monday, 12. January 2015 19:06 UTC

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1403240

Title:
  linux-armadaxp: 3.2.0-1643.62 -proposed tracker

Status in Kernel SRU Workflow:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow package-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Fix Released
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow upload-to-ppa series:
  Invalid
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-armadaxp source package in Precise:
  Fix Released

Bug description:
  This bug is for tracking the 3.2.0-1643.62 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 16. December 2014 23:05 UTC
  kernel-stable-master-bug:1403154
  kernel-stable-Certification-testing-end:Wednesday, 17. December 2014 03:02 UTC
  kernel-stable-Security-signoff-end:Wednesday, 17. December 2014 03:02 UTC
  kernel-stable-Prepare-package-end:Wednesday, 17. December 2014 06:03 UTC
  kernel-stable-Promote-to-proposed-start:Wednesday, 17. December 2014 06:03 UTC
  ppa-package-testing-start:Wednesday, 17. December 2014 06:03 UTC
  kernel-stable-Promote-to-proposed-end:Wednesday, 17. December 2014 19:09 UTC
  kernel-stable-Verification-testing-start:Wednesday, 17. December 2014 21:01 
UTC
  kernel-stable-Regression-testing-start:Wednesday, 17. December 2014 21:01 UTC
  kernel-stable-Regression-testing-end:Thursday, 18. December 2014 05:02 UTC
  kernel-stable-Promote-to-updates-start:Friday, 09. January 2015 16:20 UTC
  kernel-stable-Promote-to-updates-end:Monday, 12. January 2015 17:44 UTC
  kernel-stable-phase:Released
  kernel-stable-phase-changed:Monday, 12. January 2015 19:06 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1403240/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1403943] Re: linux: 2.6.32-71.138 -proposed tracker

2015-01-12 Thread Brad Figg
** Description changed:

  This bug is for tracking the 2.6.32-71.138 upload package. This bug will
  contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Thursday, 18. December 2014 16:18 UTC
  kernel-stable-Prepare-package-end:Friday, 19. December 2014 00:07 UTC
  kernel-stable-Promote-to-proposed-start:Friday, 19. December 2014 00:07 UTC
  ppa-package-testing-start:Friday, 19. December 2014 00:07 UTC
  kernel-stable-Promote-to-proposed-end:Friday, 19. December 2014 08:02 UTC
  kernel-stable-Verification-testing-start:Friday, 19. December 2014 10:03 UTC
  kernel-stable-Certification-testing-start:Friday, 19. December 2014 10:03 UTC
  kernel-stable-Security-signoff-start:Friday, 19. December 2014 10:03 UTC
  kernel-stable-Regression-testing-start:Friday, 19. December 2014 10:03 UTC
  kernel-stable-Security-signoff-end:Friday, 19. December 2014 14:02 UTC
  kernel-stable-Certification-testing-end:Wednesday, 07. January 2015 09:01 UTC
  kernel-stable-Verification-testing-end:Thursday, 08. January 2015 16:02 UTC
  kernel-stable-phase:CopyToUpdates
  kernel-stable-phase-changed:Friday, 09. January 2015 16:01 UTC
  kernel-stable-Promote-to-updates-start:Friday, 09. January 2015 16:01 UTC
  kernel-stable-Regression-testing-end:Friday, 09. January 2015 16:01 UTC
+ kernel-stable-Promote-to-updates-end:Monday, 12. January 2015 19:07 UTC

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1403943

Title:
  linux: 2.6.32-71.138 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Fix Released
Status in Kernel SRU Workflow package-testing series:
  Fix Released
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-lbm series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-ports-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Fix Released
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Fix Released

Bug description:
  This bug is for tracking the 2.6.32-71.138 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Thursday, 18. December 2014 16:18 UTC
  kernel-stable-Prepare-package-end:Friday, 19. December 2014 00:07 UTC
  kernel-stable-Promote-to-proposed-start:Friday, 19. December 2014 00:07 UTC
  ppa-package-testing-start:Friday, 19. December 2014 00:07 UTC
  kernel-stable-Promote-to-proposed-end:Friday, 19. December 2014 08:02 UTC
  kernel-stable-Verification-testing-start:Friday, 19. December 2014 10:03 UTC
  kernel-stable-Certification-testing-start:Friday, 19. December 2014 10:03 UTC
  kernel-stable-Security-signoff-start:Friday, 19. December 2014 10:03 UTC
  kernel-stable-Regression-testing-start:Friday, 19. December 2014 10:03 UTC
  kernel-stable-Security-signoff-end:Friday, 19. December 2014 14:02 UTC
  kernel-stable-Certification-testing-end:Wednesday, 07. January 2015 09:01 UTC
  kernel-stable-Verification-testing-end:Thursday, 08. January 2015 16:02 UTC
  kernel-stable-phase:CopyToUpdates
  kernel-stable-phase-changed:Friday, 09. January 2015 16:01 UTC
  kernel-stable-Promote-to-updates-start:Friday, 09. January 2015 16:01 UTC
  kernel-stable-Regression-testing-end:Friday, 09. January 2015 16:01 UTC
  kernel-stable-Promote-to-updates-end:Monday, 12. January 2015 19:07 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1403943/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1402822] Re: linux: 3.16.0-29.39 -proposed tracker

2015-01-12 Thread Brad Figg
The package has been published and the bug is being set to Fix Released


** Changed in: kernel-sru-workflow
   Status: In Progress => Fix Released

** Description changed:

  This bug is for tracking the 3.16.0-29.39 upload package. This bug will
  contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Monday, 15. December 2014 20:29 UTC
  kernel-stable-Prepare-package-end:Tuesday, 16. December 2014 07:03 UTC
  kernel-stable-Promote-to-proposed-start:Tuesday, 16. December 2014 07:03 UTC
  ppa-package-testing-start:Tuesday, 16. December 2014 07:03 UTC
  kernel-stable-Promote-to-proposed-end:Wednesday, 17. December 2014 20:06 UTC
  kernel-stable-Verification-testing-start:Wednesday, 17. December 2014 22:00 
UTC
  kernel-stable-Certification-testing-start:Wednesday, 17. December 2014 22:00 
UTC
  kernel-stable-Security-signoff-start:Wednesday, 17. December 2014 22:00 UTC
  kernel-stable-Regression-testing-start:Wednesday, 17. December 2014 22:00 UTC
  kernel-stable-Security-signoff-end:Thursday, 18. December 2014 14:00 UTC
  kernel-stable-Certification-testing-end:Wednesday, 07. January 2015 16:00 UTC
  kernel-stable-Regression-testing-end:Friday, 09. January 2015 16:06 UTC
- kernel-stable-phase:CopyToUpdates
- kernel-stable-phase-changed:Friday, 09. January 2015 16:18 UTC
  kernel-stable-Promote-to-updates-start:Friday, 09. January 2015 16:18 UTC
  kernel-stable-Promote-to-updates-end:Monday, 12. January 2015 17:02 UTC
+ kernel-stable-phase:Released
+ kernel-stable-phase-changed:Monday, 12. January 2015 19:01 UTC

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1402822

Title:
  linux: 3.16.0-29.39 -proposed tracker

Status in Kernel SRU Workflow:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Fix Released
Status in Kernel SRU Workflow package-testing series:
  In Progress
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Fix Released
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Utopic:
  Fix Released

Bug description:
  This bug is for tracking the 3.16.0-29.39 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Monday, 15. December 2014 20:29 UTC
  kernel-stable-Prepare-package-end:Tuesday, 16. December 2014 07:03 UTC
  kernel-stable-Promote-to-proposed-start:Tuesday, 16. December 2014 07:03 UTC
  ppa-package-testing-start:Tuesday, 16. December 2014 07:03 UTC
  kernel-stable-Promote-to-proposed-end:Wednesday, 17. December 2014 20:06 UTC
  kernel-stable-Verification-testing-start:Wednesday, 17. December 2014 22:00 
UTC
  kernel-stable-Certification-testing-start:Wednesday, 17. December 2014 22:00 
UTC
  kernel-stable-Security-signoff-start:Wednesday, 17. December 2014 22:00 UTC
  kernel-stable-Regression-testing-start:Wednesday, 17. December 2014 22:00 UTC
  kernel-stable-Security-signoff-end:Thursday, 18. December 2014 14:00 UTC
  kernel-stable-Certification-testing-end:Wednesday, 07. January 2015 16:00 UTC
  kernel-stable-Regression-testing-end:Friday, 09. January 2015 16:06 UTC
  kernel-stable-Promote-to-updates-start:Friday, 09. January 2015 16:18 UTC
  kernel-stable-Promote-to-updates-end:Monday, 12. January 2015 17:02 UTC
  kernel-stable-phase:Released
  kernel-stable-phase-changed:Monday, 12. January 2015 19:01 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1402822/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1402872] Re: linux: 3.13.0-44.73 -proposed tracker

2015-01-12 Thread Brad Figg
The package has been published and the bug is being set to Fix Released


** Changed in: kernel-sru-workflow
   Status: In Progress => Fix Released

** Description changed:

  This bug is for tracking the 3.13.0-44.73 upload package. This bug will
  contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Monday, 15. December 2014 23:54 UTC
  kernel-stable-Prepare-package-end:Tuesday, 16. December 2014 07:08 UTC
  kernel-stable-Promote-to-proposed-start:Tuesday, 16. December 2014 07:08 UTC
  ppa-package-testing-start:Tuesday, 16. December 2014 07:08 UTC
  kernel-stable-Promote-to-proposed-end:Tuesday, 16. December 2014 22:00 UTC
  kernel-stable-Verification-testing-start:Tuesday, 16. December 2014 23:01 UTC
  kernel-stable-Certification-testing-start:Tuesday, 16. December 2014 23:01 UTC
  kernel-stable-Security-signoff-start:Tuesday, 16. December 2014 23:01 UTC
  kernel-stable-Regression-testing-start:Tuesday, 16. December 2014 23:01 UTC
  kernel-stable-Security-signoff-end:Thursday, 18. December 2014 14:00 UTC
  kernel-stable-Certification-testing-end:Wednesday, 07. January 2015 16:00 UTC
  kernel-stable-Regression-testing-end:Friday, 09. January 2015 16:06 UTC
- kernel-stable-phase:CopyToUpdates
- kernel-stable-phase-changed:Friday, 09. January 2015 16:18 UTC
  kernel-stable-Promote-to-updates-start:Friday, 09. January 2015 16:18 UTC
  kernel-stable-Promote-to-updates-end:Monday, 12. January 2015 17:34 UTC
+ kernel-stable-phase:Released
+ kernel-stable-phase-changed:Monday, 12. January 2015 19:02 UTC

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1402872

Title:
  linux: 3.13.0-44.73 -proposed tracker

Status in Kernel SRU Workflow:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Fix Released
Status in Kernel SRU Workflow package-testing series:
  Fix Released
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Fix Released
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Trusty:
  Fix Released

Bug description:
  This bug is for tracking the 3.13.0-44.73 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Monday, 15. December 2014 23:54 UTC
  kernel-stable-Prepare-package-end:Tuesday, 16. December 2014 07:08 UTC
  kernel-stable-Promote-to-proposed-start:Tuesday, 16. December 2014 07:08 UTC
  ppa-package-testing-start:Tuesday, 16. December 2014 07:08 UTC
  kernel-stable-Promote-to-proposed-end:Tuesday, 16. December 2014 22:00 UTC
  kernel-stable-Verification-testing-start:Tuesday, 16. December 2014 23:01 UTC
  kernel-stable-Certification-testing-start:Tuesday, 16. December 2014 23:01 UTC
  kernel-stable-Security-signoff-start:Tuesday, 16. December 2014 23:01 UTC
  kernel-stable-Regression-testing-start:Tuesday, 16. December 2014 23:01 UTC
  kernel-stable-Security-signoff-end:Thursday, 18. December 2014 14:00 UTC
  kernel-stable-Certification-testing-end:Wednesday, 07. January 2015 16:00 UTC
  kernel-stable-Regression-testing-end:Friday, 09. January 2015 16:06 UTC
  kernel-stable-Promote-to-updates-start:Friday, 09. January 2015 16:18 UTC
  kernel-stable-Promote-to-updates-end:Monday, 12. January 2015 17:34 UTC
  kernel-stable-phase:Released
  kernel-stable-phase-changed:Monday, 12. January 2015 19:02 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1402872/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1409750] Re: grub2/kernel EFI firware size interface

2015-01-12 Thread Phillip Susi
Looking at the patch, it appears to fall back to the previous behavior
if it fails to read the new sysfs knob, so including it won't cause any
harm, but without the corresponding kernel patch, it won't do what it is
supposed to do either.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1409750

Title:
  grub2/kernel EFI firware size interface

Status in grub2 package in Ubuntu:
  Triaged
Status in linux package in Ubuntu:
  Triaged

Bug description:
  Seems that grub2 needs the ability to "size" the EFI implementation it
  is running on.  This is being exposed via the kernel in a patch queued
  for v3.20 (http://comments.gmane.org/gmane.linux.kernel.efi/5229).
  This is being taken early in debian under debian #775191 (linux) and
  debian #775202 (grub2) (https://bugs.debian.org/775191,
  https://bugs.debian.org/775202).  Additional discussion is available
  here:  http://blog.einval.com/2015/01/11#Jessie-EFI_5

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/grub2/+bug/1409750/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1302268] Re: hyper-v: Unable to perform kernel crash dump on trusty

2015-01-12 Thread Chris Valean
Same as 1317697, we've re-tested this on 14.04.1 and kernel panic and dump file 
creation is working as expected.
Kernel:  3.13.0-35

Please close this thread.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1302268

Title:
  hyper-v: Unable to perform kernel crash dump on trusty

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Trusty:
  Fix Released

Bug description:
  Hi folks,

  I know we are past kernel freeze now but this is a very important
  issue to fix as kernel crash dump is a fundamental requirement for all
  our customers. I am attaching two patches. Both of them need to be
  applied to take care of this issue. Please accommodate in this release
  if possible otherwise please let me know how we can provide these as
  an update.

  Thanks,
  Abhishek

  
  break-fix: - 03367ef5ea811475187a0732aada068919e14d61
  break-fix: - e179f6914152eca9b338e7d8445684062f560c55

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1302268/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1317697] Re: hyper-v: Unable to dump core for Ubuntu 14.04 virtual machines.

2015-01-12 Thread Chris Valean
We've re-tested this on 14.04.1 and kernel panic and dump file creation is 
working as expected.
Please close this thread.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1317697

Title:
  hyper-v: Unable to dump core for Ubuntu 14.04 virtual machines.

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Trusty:
  Fix Released
Status in linux source package in Utopic:
  Fix Released

Bug description:
  Hi,

  We need to include two new patches:

  http://git.kernel.org/cgit/linux/kernel/git/next/linux-
  
next.git/commit/arch/x86/kernel/cpu/mshyperv.c?id=e179f6914152eca9b338e7d8445684062f560c55

  http://git.kernel.org/cgit/linux/kernel/git/next/linux-
  
next.git/commit/drivers/hv/connection.c?id=03367ef5ea811475187a0732aada068919e14d61

  Without these patches we are unable to dump core for Ubuntu 14.04 virtual 
machines. Please include.
  Thanks,
  Abhishek

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1317697/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1403239] Re: linux-ti-omap4: 3.2.0-1458.78 -proposed tracker

2015-01-12 Thread Brad Figg
** Changed in: kernel-sru-workflow/promote-to-security
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/promote-to-updates
   Status: New => Confirmed

** Description changed:

  This bug is for tracking the 3.2.0-1458.78 upload package. This bug will
  contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 16. December 2014 23:03 UTC
  kernel-stable-master-bug:1403154
  kernel-stable-Certification-testing-end:Thursday, 18. December 2014 12:02 UTC
  kernel-stable-Prepare-package-end:Thursday, 18. December 2014 16:02 UTC
  kernel-stable-Promote-to-proposed-start:Thursday, 18. December 2014 16:02 UTC
  ppa-package-testing-start:Thursday, 18. December 2014 16:02 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 18. December 2014 22:02 UTC
  kernel-stable-Security-signoff-start:Friday, 19. December 2014 00:03 UTC
  kernel-stable-Verification-testing-start:Friday, 19. December 2014 00:02 UTC
  kernel-stable-Regression-testing-start:Friday, 19. December 2014 00:03 UTC
- kernel-stable-phase:Testing
- kernel-stable-phase-changed:Friday, 19. December 2014 12:01 UTC
  kernel-stable-Verification-testing-end:Friday, 19. December 2014 12:01 UTC
  kernel-stable-Security-signoff-end:Friday, 19. December 2014 14:01 UTC
+ kernel-stable-phase:CopyToUpdates
+ kernel-stable-phase-changed:Monday, 12. January 2015 18:29 UTC
+ kernel-stable-Promote-to-updates-start:Monday, 12. January 2015 18:29 UTC
+ kernel-stable-Regression-testing-end:Monday, 12. January 2015 18:29 UTC

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-ti-omap4 in Ubuntu.
https://bugs.launchpad.net/bugs/1403239

Title:
  linux-ti-omap4: 3.2.0-1458.78 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow package-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Confirmed
Status in Kernel SRU Workflow promote-to-updates series:
  Confirmed
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow upload-to-ppa series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  New

Bug description:
  This bug is for tracking the 3.2.0-1458.78 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 16. December 2014 23:03 UTC
  kernel-stable-master-bug:1403154
  kernel-stable-Certification-testing-end:Thursday, 18. December 2014 12:02 UTC
  kernel-stable-Prepare-package-end:Thursday, 18. December 2014 16:02 UTC
  kernel-stable-Promote-to-proposed-start:Thursday, 18. December 2014 16:02 UTC
  ppa-package-testing-start:Thursday, 18. December 2014 16:02 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 18. December 2014 22:02 UTC
  kernel-stable-Security-signoff-start:Friday, 19. December 2014 00:03 UTC
  kernel-stable-Verification-testing-start:Friday, 19. December 2014 00:02 UTC
  kernel-stable-Regression-testing-start:Friday, 19. December 2014 00:03 UTC
  kernel-stable-Verification-testing-end:Friday, 19. December 2014 12:01 UTC
  kernel-stable-Security-signoff-end:Friday, 19. December 2014 14:01 UTC
  kernel-stable-phase:CopyToUpdates
  kernel-stable-phase-changed:Monday, 12. January 2015 18:29 UTC
  kernel-stable-Promote-to-updates-start:Monday, 12. January 2015 18:29 UTC
  kernel-stable-Regression-testing-end:Monday, 12. January 2015 18:29 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1403239/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1403239] Re: linux-ti-omap4: 3.2.0-1458.78 -proposed tracker

2015-01-12 Thread Luis Henriques
Paolo tested this kernel; adding "qa-testing-passed" tag and setting
"Regression-testing " task to 'fix-released'.

** Tags added: qa-testing-passed

** Changed in: kernel-sru-workflow/regression-testing
   Status: Confirmed => Fix Released

** Changed in: kernel-sru-workflow/regression-testing
 Assignee: (unassigned) => Paolo Pisati (p-pisati)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-ti-omap4 in Ubuntu.
https://bugs.launchpad.net/bugs/1403239

Title:
  linux-ti-omap4: 3.2.0-1458.78 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow package-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Confirmed
Status in Kernel SRU Workflow promote-to-updates series:
  Confirmed
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow upload-to-ppa series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  New

Bug description:
  This bug is for tracking the 3.2.0-1458.78 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 16. December 2014 23:03 UTC
  kernel-stable-master-bug:1403154
  kernel-stable-Certification-testing-end:Thursday, 18. December 2014 12:02 UTC
  kernel-stable-Prepare-package-end:Thursday, 18. December 2014 16:02 UTC
  kernel-stable-Promote-to-proposed-start:Thursday, 18. December 2014 16:02 UTC
  ppa-package-testing-start:Thursday, 18. December 2014 16:02 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 18. December 2014 22:02 UTC
  kernel-stable-Security-signoff-start:Friday, 19. December 2014 00:03 UTC
  kernel-stable-Verification-testing-start:Friday, 19. December 2014 00:02 UTC
  kernel-stable-Regression-testing-start:Friday, 19. December 2014 00:03 UTC
  kernel-stable-Verification-testing-end:Friday, 19. December 2014 12:01 UTC
  kernel-stable-Security-signoff-end:Friday, 19. December 2014 14:01 UTC
  kernel-stable-phase:CopyToUpdates
  kernel-stable-phase-changed:Monday, 12. January 2015 18:29 UTC
  kernel-stable-Promote-to-updates-start:Monday, 12. January 2015 18:29 UTC
  kernel-stable-Regression-testing-end:Monday, 12. January 2015 18:29 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1403239/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1335478] Re: A new instance of IBM Domino 'bindsock' cannot bind to ports <1024 Kernel 3.13.0-29 and above

2015-01-12 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 2.6.32-71.138

---
linux (2.6.32-71.138) lucid; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1403943

  [ Luis Henriques ]

  * [Config] updateconfigs CONFIG_X86_16BIT=y after v2.6.32.65 update

  [ Upstream Kernel Changes ]

  * KVM: x86: Check non-canonical addresses upon WRMSR
- LP: #1384539
- CVE-2014-3610
  * KVM: x86: Improve thread safety in pit
- LP: #1384540
- CVE-2014-3611
  * net:socket: set msg_namelen to 0 if msg_name is passed as NULL in
msghdr struct from userland.
- LP: #1335478
  * x86, 64-bit: Move K8 B step iret fixup to fault entry asm
- LP: #1403918
  * x86-64: Adjust frame type at paranoid_exit:
- LP: #1403918
  * x86-64, modify_ldt: Ban 16-bit segments on 64-bit kernels
- LP: #1403918
  * x86-32, espfix: Remove filter for espfix32 due to race
- LP: #1403918
  * x86-64, espfix: Don't leak bits 31:16 of %esp returning to 16-bit stack
- LP: #1403918
  * x86, espfix: Move espfix definitions into a separate header file
- LP: #1403918
  * x86, espfix: Fix broken header guard
- LP: #1403918
  * x86, espfix: Make espfix64 a Kconfig option, fix UML
- LP: #1403918
  * x86, espfix: Make it possible to disable 16-bit support
- LP: #1403918
  * x86_64/entry/xen: Do not invoke espfix64 on Xen
- LP: #1403918
  * x86/espfix/xen: Fix allocation of pages for paravirt page tables
- LP: #1403918
  * x86_64, traps: Fix the espfix64 #DF fixup and rewrite it in C
- LP: #1403918
  * x86_64, traps: Rework bad_iret
- LP: #1403918
 -- Luis HenriquesThu, 18 Dec 2014 16:22:56 
+

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1335478

Title:
  A new instance of IBM Domino 'bindsock' cannot bind to ports <1024
  Kernel  3.13.0-29 and above

Status in linux package in Ubuntu:
  Fix Released
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Fix Released
Status in linux-lts-trusty source package in Lucid:
  Invalid
Status in linux-lts-utopic source package in Lucid:
  Invalid
Status in linux source package in Precise:
  Fix Released
Status in linux-lts-trusty source package in Precise:
  Fix Released
Status in linux-lts-utopic source package in Precise:
  Invalid
Status in linux source package in Trusty:
  Fix Released
Status in linux-lts-trusty source package in Trusty:
  Invalid
Status in linux-lts-utopic source package in Trusty:
  Fix Released
Status in linux source package in Utopic:
  Fix Released
Status in linux-lts-trusty source package in Utopic:
  Invalid
Status in linux-lts-utopic source package in Utopic:
  Invalid
Status in linux source package in Vivid:
  Fix Released
Status in linux-lts-trusty source package in Vivid:
  Invalid
Status in linux-lts-utopic source package in Vivid:
  Invalid

Bug description:
  Starting  with kernels  3.2.0-64 and 3.13.0-29  Something has changed
  to once again that prevents IBM Domino's
  "/opt/ibm/domino/notes/latest/linux/bindsock" binary that runs as root
  (setuid) to get ports lower than 1024 for it's LDAP, SMTP, IMAP, POP3,
  and HTTP processes.

  The Domino server reports  the following: :
    "Listener failure: 'bindsock' is missing, not executable, not owned by 
root, not setuid root or user needs net_privaddr privilege."

  This is the same behaviour that was reported and subsequently
  corrected in Bug # 1269053

  ===
  break-fix: dbb490b96584d4e958533fb637f08b557f505657 
6a2a2b3ae0759843b22c929881cc184b00cc63ff

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1335478/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1335478] Re: A new instance of IBM Domino 'bindsock' cannot bind to ports <1024 Kernel 3.13.0-29 and above

2015-01-12 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 2.6.32-71.138

---
linux (2.6.32-71.138) lucid; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1403943

  [ Luis Henriques ]

  * [Config] updateconfigs CONFIG_X86_16BIT=y after v2.6.32.65 update

  [ Upstream Kernel Changes ]

  * KVM: x86: Check non-canonical addresses upon WRMSR
- LP: #1384539
- CVE-2014-3610
  * KVM: x86: Improve thread safety in pit
- LP: #1384540
- CVE-2014-3611
  * net:socket: set msg_namelen to 0 if msg_name is passed as NULL in
msghdr struct from userland.
- LP: #1335478
  * x86, 64-bit: Move K8 B step iret fixup to fault entry asm
- LP: #1403918
  * x86-64: Adjust frame type at paranoid_exit:
- LP: #1403918
  * x86-64, modify_ldt: Ban 16-bit segments on 64-bit kernels
- LP: #1403918
  * x86-32, espfix: Remove filter for espfix32 due to race
- LP: #1403918
  * x86-64, espfix: Don't leak bits 31:16 of %esp returning to 16-bit stack
- LP: #1403918
  * x86, espfix: Move espfix definitions into a separate header file
- LP: #1403918
  * x86, espfix: Fix broken header guard
- LP: #1403918
  * x86, espfix: Make espfix64 a Kconfig option, fix UML
- LP: #1403918
  * x86, espfix: Make it possible to disable 16-bit support
- LP: #1403918
  * x86_64/entry/xen: Do not invoke espfix64 on Xen
- LP: #1403918
  * x86/espfix/xen: Fix allocation of pages for paravirt page tables
- LP: #1403918
  * x86_64, traps: Fix the espfix64 #DF fixup and rewrite it in C
- LP: #1403918
  * x86_64, traps: Rework bad_iret
- LP: #1403918
 -- Luis HenriquesThu, 18 Dec 2014 16:22:56 
+

** Changed in: linux (Ubuntu Lucid)
   Status: Fix Committed => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-3610

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-3611

** Changed in: linux (Ubuntu Lucid)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1335478

Title:
  A new instance of IBM Domino 'bindsock' cannot bind to ports <1024
  Kernel  3.13.0-29 and above

Status in linux package in Ubuntu:
  Fix Released
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Fix Released
Status in linux-lts-trusty source package in Lucid:
  Invalid
Status in linux-lts-utopic source package in Lucid:
  Invalid
Status in linux source package in Precise:
  Fix Released
Status in linux-lts-trusty source package in Precise:
  Fix Released
Status in linux-lts-utopic source package in Precise:
  Invalid
Status in linux source package in Trusty:
  Fix Released
Status in linux-lts-trusty source package in Trusty:
  Invalid
Status in linux-lts-utopic source package in Trusty:
  Fix Released
Status in linux source package in Utopic:
  Fix Released
Status in linux-lts-trusty source package in Utopic:
  Invalid
Status in linux-lts-utopic source package in Utopic:
  Invalid
Status in linux source package in Vivid:
  Fix Released
Status in linux-lts-trusty source package in Vivid:
  Invalid
Status in linux-lts-utopic source package in Vivid:
  Invalid

Bug description:
  Starting  with kernels  3.2.0-64 and 3.13.0-29  Something has changed
  to once again that prevents IBM Domino's
  "/opt/ibm/domino/notes/latest/linux/bindsock" binary that runs as root
  (setuid) to get ports lower than 1024 for it's LDAP, SMTP, IMAP, POP3,
  and HTTP processes.

  The Domino server reports  the following: :
    "Listener failure: 'bindsock' is missing, not executable, not owned by 
root, not setuid root or user needs net_privaddr privilege."

  This is the same behaviour that was reported and subsequently
  corrected in Bug # 1269053

  ===
  break-fix: dbb490b96584d4e958533fb637f08b557f505657 
6a2a2b3ae0759843b22c929881cc184b00cc63ff

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1335478/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1384540] Re: CVE-2014-3611

2015-01-12 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 2.6.32-71.138

---
linux (2.6.32-71.138) lucid; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1403943

  [ Luis Henriques ]

  * [Config] updateconfigs CONFIG_X86_16BIT=y after v2.6.32.65 update

  [ Upstream Kernel Changes ]

  * KVM: x86: Check non-canonical addresses upon WRMSR
- LP: #1384539
- CVE-2014-3610
  * KVM: x86: Improve thread safety in pit
- LP: #1384540
- CVE-2014-3611
  * net:socket: set msg_namelen to 0 if msg_name is passed as NULL in
msghdr struct from userland.
- LP: #1335478
  * x86, 64-bit: Move K8 B step iret fixup to fault entry asm
- LP: #1403918
  * x86-64: Adjust frame type at paranoid_exit:
- LP: #1403918
  * x86-64, modify_ldt: Ban 16-bit segments on 64-bit kernels
- LP: #1403918
  * x86-32, espfix: Remove filter for espfix32 due to race
- LP: #1403918
  * x86-64, espfix: Don't leak bits 31:16 of %esp returning to 16-bit stack
- LP: #1403918
  * x86, espfix: Move espfix definitions into a separate header file
- LP: #1403918
  * x86, espfix: Fix broken header guard
- LP: #1403918
  * x86, espfix: Make espfix64 a Kconfig option, fix UML
- LP: #1403918
  * x86, espfix: Make it possible to disable 16-bit support
- LP: #1403918
  * x86_64/entry/xen: Do not invoke espfix64 on Xen
- LP: #1403918
  * x86/espfix/xen: Fix allocation of pages for paravirt page tables
- LP: #1403918
  * x86_64, traps: Fix the espfix64 #DF fixup and rewrite it in C
- LP: #1403918
  * x86_64, traps: Rework bad_iret
- LP: #1403918
 -- Luis HenriquesThu, 18 Dec 2014 16:22:56 
+

** Changed in: linux (Ubuntu Lucid)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1384540

Title:
  CVE-2014-3611

Status in linux package in Ubuntu:
  Fix Released
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-ec2 package in Ubuntu:
  Invalid
Status in linux-fsl-imx51 package in Ubuntu:
  Invalid
Status in linux-lts-backport-maverick package in Ubuntu:
  New
Status in linux-lts-backport-natty package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-mvl-dove package in Ubuntu:
  Invalid
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Fix Released
Status in linux-armadaxp source package in Lucid:
  Invalid
Status in linux-ec2 source package in Lucid:
  New
Status in linux-fsl-imx51 source package in Lucid:
  Invalid
Status in linux-lts-backport-maverick source package in Lucid:
  New
Status in linux-lts-backport-natty source package in Lucid:
  New
Status in linux-lts-quantal source package in Lucid:
  Invalid
Status in linux-lts-raring source package in Lucid:
  Invalid
Status in linux-lts-saucy source package in Lucid:
  Invalid
Status in linux-lts-trusty source package in Lucid:
  Invalid
Status in linux-lts-utopic source package in Lucid:
  Invalid
Status in linux-mvl-dove source package in Lucid:
  Invalid
Status in linux-ti-omap4 source package in Lucid:
  Invalid
Status in linux source package in Precise:
  Fix Released
Status in linux-armadaxp source package in Precise:
  Fix Released
Status in linux-ec2 source package in Precise:
  Invalid
Status in linux-fsl-imx51 source package in Precise:
  Invalid
Status in linux-lts-backport-maverick source package in Precise:
  New
Status in linux-lts-backport-natty source package in Precise:
  New
Status in linux-lts-quantal source package in Precise:
  Fix Committed
Status in linux-lts-raring source package in Precise:
  Invalid
Status in linux-lts-saucy source package in Precise:
  Fix Committed
Status in linux-lts-trusty source package in Precise:
  Fix Released
Status in linux-lts-utopic source package in Precise:
  Invalid
Status in linux-mvl-dove source package in Precise:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  Fix Released
Status in linux source package in Trusty:
  Fix Released
Status in linux-armadaxp source package in Trusty:
  Invalid
Status in linux-ec2 source package in Trusty:
  Invalid
Status in linux-fsl-imx51 source package in Trusty:
  Invalid
Status in linux-lts-backport-maverick source package in Trusty:
  New
Status in linux-lts-backport-natty source package in Trusty:
  New
Status in linux-lts-quantal source package in Trusty:
  Invalid
Status in linux-lts-raring source package in Trusty:
  Invalid
Status in linux-lts-saucy source package in Trusty:
  Invalid
Status in linux-lts-trusty source package in Trusty:
  Invalid
Status in linux-lts-utopic source package in Trusty:
  Invalid
Status

[Kernel-packages] [Bug 1384539] Re: CVE-2014-3610

2015-01-12 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 2.6.32-71.138

---
linux (2.6.32-71.138) lucid; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1403943

  [ Luis Henriques ]

  * [Config] updateconfigs CONFIG_X86_16BIT=y after v2.6.32.65 update

  [ Upstream Kernel Changes ]

  * KVM: x86: Check non-canonical addresses upon WRMSR
- LP: #1384539
- CVE-2014-3610
  * KVM: x86: Improve thread safety in pit
- LP: #1384540
- CVE-2014-3611
  * net:socket: set msg_namelen to 0 if msg_name is passed as NULL in
msghdr struct from userland.
- LP: #1335478
  * x86, 64-bit: Move K8 B step iret fixup to fault entry asm
- LP: #1403918
  * x86-64: Adjust frame type at paranoid_exit:
- LP: #1403918
  * x86-64, modify_ldt: Ban 16-bit segments on 64-bit kernels
- LP: #1403918
  * x86-32, espfix: Remove filter for espfix32 due to race
- LP: #1403918
  * x86-64, espfix: Don't leak bits 31:16 of %esp returning to 16-bit stack
- LP: #1403918
  * x86, espfix: Move espfix definitions into a separate header file
- LP: #1403918
  * x86, espfix: Fix broken header guard
- LP: #1403918
  * x86, espfix: Make espfix64 a Kconfig option, fix UML
- LP: #1403918
  * x86, espfix: Make it possible to disable 16-bit support
- LP: #1403918
  * x86_64/entry/xen: Do not invoke espfix64 on Xen
- LP: #1403918
  * x86/espfix/xen: Fix allocation of pages for paravirt page tables
- LP: #1403918
  * x86_64, traps: Fix the espfix64 #DF fixup and rewrite it in C
- LP: #1403918
  * x86_64, traps: Rework bad_iret
- LP: #1403918
 -- Luis HenriquesThu, 18 Dec 2014 16:22:56 
+

** Changed in: linux (Ubuntu Lucid)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1384539

Title:
  CVE-2014-3610

Status in linux package in Ubuntu:
  Fix Released
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-ec2 package in Ubuntu:
  Invalid
Status in linux-fsl-imx51 package in Ubuntu:
  Invalid
Status in linux-lts-backport-maverick package in Ubuntu:
  New
Status in linux-lts-backport-natty package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-mvl-dove package in Ubuntu:
  Invalid
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Fix Released
Status in linux-armadaxp source package in Lucid:
  Invalid
Status in linux-ec2 source package in Lucid:
  New
Status in linux-fsl-imx51 source package in Lucid:
  Invalid
Status in linux-lts-backport-maverick source package in Lucid:
  New
Status in linux-lts-backport-natty source package in Lucid:
  New
Status in linux-lts-quantal source package in Lucid:
  Invalid
Status in linux-lts-raring source package in Lucid:
  Invalid
Status in linux-lts-saucy source package in Lucid:
  Invalid
Status in linux-lts-trusty source package in Lucid:
  Invalid
Status in linux-lts-utopic source package in Lucid:
  Invalid
Status in linux-mvl-dove source package in Lucid:
  Invalid
Status in linux-ti-omap4 source package in Lucid:
  Invalid
Status in linux source package in Precise:
  Fix Released
Status in linux-armadaxp source package in Precise:
  Fix Released
Status in linux-ec2 source package in Precise:
  Invalid
Status in linux-fsl-imx51 source package in Precise:
  Invalid
Status in linux-lts-backport-maverick source package in Precise:
  New
Status in linux-lts-backport-natty source package in Precise:
  New
Status in linux-lts-quantal source package in Precise:
  Fix Committed
Status in linux-lts-raring source package in Precise:
  Invalid
Status in linux-lts-saucy source package in Precise:
  Fix Committed
Status in linux-lts-trusty source package in Precise:
  Fix Released
Status in linux-lts-utopic source package in Precise:
  Invalid
Status in linux-mvl-dove source package in Precise:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  Fix Released
Status in linux source package in Trusty:
  Fix Released
Status in linux-armadaxp source package in Trusty:
  Invalid
Status in linux-ec2 source package in Trusty:
  Invalid
Status in linux-fsl-imx51 source package in Trusty:
  Invalid
Status in linux-lts-backport-maverick source package in Trusty:
  New
Status in linux-lts-backport-natty source package in Trusty:
  New
Status in linux-lts-quantal source package in Trusty:
  Invalid
Status in linux-lts-raring source package in Trusty:
  Invalid
Status in linux-lts-saucy source package in Trusty:
  Invalid
Status in linux-lts-trusty source package in Trusty:
  Invalid
Status in linux-lts-utopic source package in Trusty:
  Invalid
Status

[Kernel-packages] [Bug 1403943] Re: linux: 2.6.32-71.138 -proposed tracker

2015-01-12 Thread Adam Conrad
** Changed in: kernel-sru-workflow/promote-to-security
   Status: Confirmed => Fix Released

** Changed in: kernel-sru-workflow/promote-to-security
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad 
(adconrad)

** Changed in: kernel-sru-workflow/promote-to-updates
   Status: Confirmed => Fix Released

** Changed in: kernel-sru-workflow/promote-to-updates
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad 
(adconrad)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1403943

Title:
  linux: 2.6.32-71.138 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Fix Released
Status in Kernel SRU Workflow package-testing series:
  Fix Released
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-lbm series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-ports-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Fix Released
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Fix Released

Bug description:
  This bug is for tracking the 2.6.32-71.138 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Thursday, 18. December 2014 16:18 UTC
  kernel-stable-Prepare-package-end:Friday, 19. December 2014 00:07 UTC
  kernel-stable-Promote-to-proposed-start:Friday, 19. December 2014 00:07 UTC
  ppa-package-testing-start:Friday, 19. December 2014 00:07 UTC
  kernel-stable-Promote-to-proposed-end:Friday, 19. December 2014 08:02 UTC
  kernel-stable-Verification-testing-start:Friday, 19. December 2014 10:03 UTC
  kernel-stable-Certification-testing-start:Friday, 19. December 2014 10:03 UTC
  kernel-stable-Security-signoff-start:Friday, 19. December 2014 10:03 UTC
  kernel-stable-Regression-testing-start:Friday, 19. December 2014 10:03 UTC
  kernel-stable-Security-signoff-end:Friday, 19. December 2014 14:02 UTC
  kernel-stable-Certification-testing-end:Wednesday, 07. January 2015 09:01 UTC
  kernel-stable-Verification-testing-end:Thursday, 08. January 2015 16:02 UTC
  kernel-stable-phase:CopyToUpdates
  kernel-stable-phase-changed:Friday, 09. January 2015 16:01 UTC
  kernel-stable-Promote-to-updates-start:Friday, 09. January 2015 16:01 UTC
  kernel-stable-Regression-testing-end:Friday, 09. January 2015 16:01 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1403943/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1403918] Re: Lucid update to 2.6.32.65 stable release

2015-01-12 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 2.6.32-71.138

---
linux (2.6.32-71.138) lucid; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1403943

  [ Luis Henriques ]

  * [Config] updateconfigs CONFIG_X86_16BIT=y after v2.6.32.65 update

  [ Upstream Kernel Changes ]

  * KVM: x86: Check non-canonical addresses upon WRMSR
- LP: #1384539
- CVE-2014-3610
  * KVM: x86: Improve thread safety in pit
- LP: #1384540
- CVE-2014-3611
  * net:socket: set msg_namelen to 0 if msg_name is passed as NULL in
msghdr struct from userland.
- LP: #1335478
  * x86, 64-bit: Move K8 B step iret fixup to fault entry asm
- LP: #1403918
  * x86-64: Adjust frame type at paranoid_exit:
- LP: #1403918
  * x86-64, modify_ldt: Ban 16-bit segments on 64-bit kernels
- LP: #1403918
  * x86-32, espfix: Remove filter for espfix32 due to race
- LP: #1403918
  * x86-64, espfix: Don't leak bits 31:16 of %esp returning to 16-bit stack
- LP: #1403918
  * x86, espfix: Move espfix definitions into a separate header file
- LP: #1403918
  * x86, espfix: Fix broken header guard
- LP: #1403918
  * x86, espfix: Make espfix64 a Kconfig option, fix UML
- LP: #1403918
  * x86, espfix: Make it possible to disable 16-bit support
- LP: #1403918
  * x86_64/entry/xen: Do not invoke espfix64 on Xen
- LP: #1403918
  * x86/espfix/xen: Fix allocation of pages for paravirt page tables
- LP: #1403918
  * x86_64, traps: Fix the espfix64 #DF fixup and rewrite it in C
- LP: #1403918
  * x86_64, traps: Rework bad_iret
- LP: #1403918
 -- Luis HenriquesThu, 18 Dec 2014 16:22:56 
+

** Changed in: linux (Ubuntu Lucid)
   Status: Fix Committed => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-3610

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-3611

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1403918

Title:
  Lucid update to 2.6.32.65 stable release

Status in linux package in Ubuntu:
  New
Status in linux source package in Lucid:
  Fix Released

Bug description:
  SRU Justification

  Impact:
     The upstream process for stable tree updates is quite similar
     in scope to the Ubuntu SRU process, e.g., each patch has to
     demonstrably fix a bug, and each patch is vetted by upstream
     by originating either directly from Linus' tree or in a minimally
     backported form of that patch. The 2.6.32.65 upstream stable
     patch set is now available. It should be included in the Ubuntu
     kernel as well.

     git://git.kernel.org/

  TEST CASE: TBD

     The following patches are in the 2.6.32.65 stable release:

  x86, 64-bit: Move K8 B step iret fixup to fault entry asm
  x86-64: Adjust frame type at paranoid_exit:
  x86-64, modify_ldt: Ban 16-bit segments on 64-bit kernels
  x86-32, espfix: Remove filter for espfix32 due to race
  x86-64, espfix: Don't leak bits 31:16 of %esp returning to 16-bit stack
  x86, espfix: Move espfix definitions into a separate header file
  x86, espfix: Fix broken header guard
  x86, espfix: Make espfix64 a Kconfig option, fix UML
  x86, espfix: Make it possible to disable 16-bit support
  x86_64/entry/xen: Do not invoke espfix64 on Xen
  x86/espfix/xen: Fix allocation of pages for paravirt page tables
  x86_64, traps: Stop using IST for #SS
  x86_64, traps: Fix the espfix64 #DF fixup and rewrite it in C
  x86_64, traps: Rework bad_iret

  The following patches from the stable release have been dropped (some
  were actually already applied to Lucid):

  net: sendmsg: fix failed backport of "fix NULL pointer dereference"
  net/l2tp: don't fall back on UDP [get|set]sockopt
  ALSA: control: Don't access controls outside of protected regions
  ALSA: control: Fix replacing user controls
  USB: whiteheat: Added bounds checking for bulk command response
  net: sctp: fix panic on duplicate ASCONF chunks
  net: sctp: fix remote memory pressure from excessive queueing
  udf: Avoid infinite loop when processing indirect ICBs
  net: sctp: fix NULL pointer dereference in af->from_addr_param on malformed 
packet
  mac80211: fix fragmentation code, particularly for encryption
  ttusb-dec: buffer overflow in ioctl
  vlan: Don't propagate flag changes on down interfaces.
  sctp: Fix double-free introduced by bad backport in 2.6.32.62
  md/raid6: Fix misapplied backport in 2.6.32.64
  block: add missing blk_queue_dead() checks
  block: Fix blk_execute_rq_nowait() dead queue handling
  cciss: Fix misapplied "cciss: fix info leak in cciss_ioctl32_passthru()"
  proc connector: Delete spurious memset in proc_exit_connector()
  Linux 2.6.32.65

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1403918/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages

[Kernel-packages] [Bug 1403943] Re: linux: 2.6.32-71.138 -proposed tracker

2015-01-12 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 2.6.32-71.138

---
linux (2.6.32-71.138) lucid; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1403943

  [ Luis Henriques ]

  * [Config] updateconfigs CONFIG_X86_16BIT=y after v2.6.32.65 update

  [ Upstream Kernel Changes ]

  * KVM: x86: Check non-canonical addresses upon WRMSR
- LP: #1384539
- CVE-2014-3610
  * KVM: x86: Improve thread safety in pit
- LP: #1384540
- CVE-2014-3611
  * net:socket: set msg_namelen to 0 if msg_name is passed as NULL in
msghdr struct from userland.
- LP: #1335478
  * x86, 64-bit: Move K8 B step iret fixup to fault entry asm
- LP: #1403918
  * x86-64: Adjust frame type at paranoid_exit:
- LP: #1403918
  * x86-64, modify_ldt: Ban 16-bit segments on 64-bit kernels
- LP: #1403918
  * x86-32, espfix: Remove filter for espfix32 due to race
- LP: #1403918
  * x86-64, espfix: Don't leak bits 31:16 of %esp returning to 16-bit stack
- LP: #1403918
  * x86, espfix: Move espfix definitions into a separate header file
- LP: #1403918
  * x86, espfix: Fix broken header guard
- LP: #1403918
  * x86, espfix: Make espfix64 a Kconfig option, fix UML
- LP: #1403918
  * x86, espfix: Make it possible to disable 16-bit support
- LP: #1403918
  * x86_64/entry/xen: Do not invoke espfix64 on Xen
- LP: #1403918
  * x86/espfix/xen: Fix allocation of pages for paravirt page tables
- LP: #1403918
  * x86_64, traps: Fix the espfix64 #DF fixup and rewrite it in C
- LP: #1403918
  * x86_64, traps: Rework bad_iret
- LP: #1403918
 -- Luis HenriquesThu, 18 Dec 2014 16:22:56 
+

** Changed in: linux (Ubuntu Lucid)
   Status: New => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-3610

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-3611

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1403943

Title:
  linux: 2.6.32-71.138 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Fix Released
Status in Kernel SRU Workflow package-testing series:
  Fix Released
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-lbm series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-ports-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Fix Released
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Fix Released

Bug description:
  This bug is for tracking the 2.6.32-71.138 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Thursday, 18. December 2014 16:18 UTC
  kernel-stable-Prepare-package-end:Friday, 19. December 2014 00:07 UTC
  kernel-stable-Promote-to-proposed-start:Friday, 19. December 2014 00:07 UTC
  ppa-package-testing-start:Friday, 19. December 2014 00:07 UTC
  kernel-stable-Promote-to-proposed-end:Friday, 19. December 2014 08:02 UTC
  kernel-stable-Verification-testing-start:Friday, 19. December 2014 10:03 UTC
  kernel-stable-Certification-testing-start:Friday, 19. December 2014 10:03 UTC
  kernel-stable-Security-signoff-start:Friday, 19. December 2014 10:03 UTC
  kernel-stable-Regression-testing-start:Friday, 19. December 2014 10:03 UTC
  kernel-stable-Security-signoff-end:Friday, 19. December 2014 14:02 UTC
  kernel-stable-Certification-testing-end:Wednesday, 07. January 2015 09:01 UTC
  kernel-stable-Verification-testing-end:Thursday, 08. January 2015 16:02 UTC
  kernel-stable-phase:CopyToUpdates
  kernel-stable-phase-changed:Friday, 09. January 2015 16:01 UTC
  kernel-stable-Promote-to-updates-start:Friday, 09. January 2015 16:01 UTC
  kernel-stable-Regression-testing-end:Friday, 09. January 2015 16:01 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1403943/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1408118] Re: hama uzzano keyboard do not work properly

2015-01-12 Thread Joseph Salisbury
It sounds like the keyboard is not working, but did the kernel panics
stop happening?

** Tags added: vivid

** Tags added: utopic

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1408118

Title:
  hama uzzano keyboard do not work properly

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  Hello

   I recently tried to  use a hama uzzano keyboard on ubuntu 14.10. This
  is a wireless keyboard. Some times starts working and then suddenly
  stops, but mostly it does not work.

   i looked if it was recognized and it is:

  lsusb:

  pau@traveller:~$ lsusb
  Bus 002 Device 002: ID 8087:0024 Intel Corp. Integrated Rate Matching Hub
  Bus 002 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
  Bus 001 Device 003: ID 04ca:7012 Lite-On Technology Corp. 
  Bus 001 Device 002: ID 8087:0024 Intel Corp. Integrated Rate Matching Hub
  Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
  Bus 004 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub
  Bus 003 Device 003: ID 0930:021d Toshiba Corp. 
  Bus 003 Device 008: ID 04d9:a01c Holtek Semiconductor, Inc. 
  Bus 003 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub

  and

  dmesg | grep usb (partial)

  [ 8974.179356] input: HOLTEK Wireless USB Device as 
/devices/pci:00/:00:14.0/usb3/3-1/3-1:1.0/0003:04D9:A01C.000D/input/input29
  [ 8974.179587] hid-generic 0003:04D9:A01C.000D: input,hidraw0: USB HID v1.10 
Keyboard [HOLTEK Wireless USB Device] on usb-:00:14.0-1/input0
  [ 8974.191755] input: HOLTEK Wireless USB Device as 
/devices/pci:00/:00:14.0/usb3/3-1/3-1:1.1/0003:04D9:A01C.000E/input/input30
  [ 8974.192062] hid-generic 0003:04D9:A01C.000E: input,hidraw1: USB HID v1.10 
Mouse [HOLTEK Wireless USB Device] on usb-:00:14.0-1/input1

  i tried to solve the problem as it is explained here

  http://askubuntu.com/questions/160329/usb-keyboard-works-occasionally

  but it did not works. What can i do, i suppose this is a bug, do you
  need extra information?

  (it works with windows)

  thanks

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1408118/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1376509] Re: [HP Pavilion 11-n038ca x360] touchscreen not working

2015-01-12 Thread Jonathan Davies
Fixed in linux-image-generic-lts-utopic.

** Changed in: linux (Ubuntu)
   Status: Expired => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1376509

Title:
  [HP Pavilion 11-n038ca x360] touchscreen not working

Status in linux package in Ubuntu:
  Fix Released

Bug description:
  I have installed Ubuntu 14.04 on an HP Pavilion 11-n038ca x360  laptop and 
the touchscreen is not working.
  --- 
  ApportVersion: 2.14.1-0ubuntu3.4
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  silvia 1966 F pulseaudio
  CurrentDesktop: Unity
  DistroRelease: Ubuntu 14.04
  HibernationDevice: RESUME=UUID=a1058756-8c41-4b5d-b1e0-b8691380e076
  InstallationDate: Installed on 2014-08-14 (48 days ago)
  InstallationMedia: Ubuntu 14.04.1 LTS "Trusty Tahr" - Release amd64 
(20140722.2)
  Lsusb:
   Bus 002 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub
   Bus 001 Device 003: ID 1a40:0101 Terminus Technology Inc. 4-Port HUB
   Bus 001 Device 002: ID 0bda:5776 Realtek Semiconductor Corp. 
   Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
  MachineType: Hewlett-Packard HP Pavilion 11 x360 PC
  Package: linux (not installed)
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-36-generic.efi.signed 
root=UUID=7601ee0e-6862-4bf3-8851-374adfbf5efa ro quiet splash acpi=force 
apm=power_off vt.handoff=7
  ProcVersionSignature: Ubuntu 3.13.0-36.63-generic 3.13.11.6
  RelatedPackageVersions:
   linux-restricted-modules-3.13.0-36-generic N/A
   linux-backports-modules-3.13.0-36-generic  N/A
   linux-firmware 1.127.7
  RfKill:
   0: phy0: Wireless LAN
Soft blocked: no
Hard blocked: no
  Tags:  trusty
  Uname: Linux 3.13.0-36-generic x86_64
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo
  _MarkForUpload: True
  dmi.bios.date: 06/04/2014
  dmi.bios.vendor: Insyde
  dmi.bios.version: F.12
  dmi.board.asset.tag: Type2 - Board Asset Tag
  dmi.board.name: 2209
  dmi.board.vendor: Hewlett-Packard
  dmi.board.version: 57.34
  dmi.chassis.asset.tag: Chassis Asset Tag
  dmi.chassis.type: 10
  dmi.chassis.vendor: Hewlett-Packard
  dmi.chassis.version: Chassis Version
  dmi.modalias: 
dmi:bvnInsyde:bvrF.12:bd06/04/2014:svnHewlett-Packard:pnHPPavilion11x360PC:pvr097710405F00010420180:rvnHewlett-Packard:rn2209:rvr57.34:cvnHewlett-Packard:ct10:cvrChassisVersion:
  dmi.product.name: HP Pavilion 11 x360 PC
  dmi.product.version: 097710405F00010420180
  dmi.sys.vendor: Hewlett-Packard

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1376509/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1366120] Re: [Hyper-V] reloading LIS Hyper-V modules can result in a kernel panic on Ubuntu 14.10

2015-01-12 Thread Chris Valean
This has been re-tested and the bug is no longer present, please close the 
thread.
Thank you!

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1366120

Title:
  [Hyper-V] reloading LIS Hyper-V modules can result in a kernel panic
  on Ubuntu 14.10

Status in linux package in Ubuntu:
  Fix Released
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux source package in Trusty:
  Fix Released
Status in linux-lts-utopic source package in Trusty:
  Invalid
Status in linux source package in Utopic:
  Fix Released
Status in linux-lts-utopic source package in Utopic:
  Invalid
Status in linux source package in Vivid:
  Fix Released
Status in linux-lts-utopic source package in Vivid:
  Invalid

Bug description:
  Reloading the Hyper-V LIS modules can sometime result in a kernel panic.
  Technical details: a hypercall can return “invalid alignment”  error if the 
input parameter spans a page boundary. Updated LIS code handles properly the 
error without returning bug().

  We've triaged this issue internally and the following 2 patches have been 
created.
  Please include them in 14.10 (Utopic Unicorn)  daily builds and let us know 
when we can test.

  https://lkml.org/lkml/2014/8/27/725
  https://lkml.org/lkml/2014/8/28/649

  ===
  break-fix: - 45d727cee9e200f5b351528b9fb063b69cf702c8
  break-fix: - b29ef3546aecb253a5552b198cef23750d56e1e4

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1366120/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1352821] Re: 0489:e078 - Qualcom Atheros - Ubuntu 14.04 bluetooth not working

2015-01-12 Thread Joseph Salisbury
Can you see if this issue also occurs with the latest 3.13 upstream
version?  It can be downloaded from:

http://kernel.ubuntu.com/~kernel-ppa/mainline/v3.13.11-ckt13-trusty/

If the bug does still exist, we can perform a reverse bisect to identify
the commit that fixes this in 3.19.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1352821

Title:
  0489:e078 - Qualcom Atheros - Ubuntu 14.04 bluetooth not working

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  Hi,

  Nature of peoblem : Bluetooth not wotrking under Ubuntu 14.04 but wifi
  working fine. pls help to provide the solution

  Vendor ID : 0489:e078
  Make of Wifi BT combo : Qualcom Atheros QCA9565 /AR9565 

  Regds,
  Bala S

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1352821/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1402764] Re: WARNING: CPU: 1 PID: 4940 at /build/buildd/linux-3.13.0/mm/truncate.c:652 pagecache_isize_extended+0xfd/0x110() in 3.13.0-43-generic

2015-01-12 Thread Andy Whitcroft
** Tags removed: kernel-bug-break-fix

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1402764

Title:
  WARNING: CPU: 1 PID: 4940 at
  /build/buildd/linux-3.13.0/mm/truncate.c:652
  pagecache_isize_extended+0xfd/0x110() in 3.13.0-43-generic

Status in linux package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux source package in Precise:
  Invalid
Status in linux-lts-trusty source package in Precise:
  Fix Released
Status in linux source package in Trusty:
  Fix Released
Status in linux-lts-trusty source package in Trusty:
  Invalid
Status in linux source package in Utopic:
  Invalid
Status in linux-lts-trusty source package in Utopic:
  Invalid
Status in linux source package in Vivid:
  Invalid
Status in linux-lts-trusty source package in Vivid:
  Invalid

Bug description:
  Hi all,

   I have updated my ubuntu 14.04 LTS server this morning. Until then I
  am seeing a lot of errors like:

  [ 4174.782378] WARNING: CPU: 1 PID: 4940 at
  /build/buildd/linux-3.13.0/mm/truncate.c:652
  pagecache_isize_extended+0xfd/0x110()
  [ 4174.782381] Modules linked in: ctr ccm ipt_MASQUERADE iptable_nat
  nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack
  iptable_filter ip_tables x_tables bridge stp llc snd_hda_codec_hdmi
  arc4 nvidia(POX) rtl8187 snd_hda_intel snd_hda_codec snd_hwdep snd_pcm
  snd_page_alloc mac80211 snd_seq_midi snd_seq_midi_event cfg80211
  eeprom_93cx6 snd_rawmidi joydev snd_seq snd_seq_device kvm_amd
  snd_timer kvm drm snd sp5100_tco amd64_edac_mod soundcore edac_core
  edac_mce_amd i2c_piix4 k10temp mac_hid xfs lp parport libcrc32c
  pata_acpi hid_logitech_dj usbhid hid pata_atiixp tg3 ptp pps_core ahci
  libahci
  [ 4174.782433] CPU: 1 PID: 4940 Comm: URL Classifier Tainted: P
  W  OX 3.13.0-43-generic #72-Ubuntu
  [ 4174.782436] Hardware name: HP ProLiant MicroServer, BIOS O41 10/01/2013
  [ 4174.782439]  0009 88006a90bd70 81720bf6
  
  [ 4174.782443]  88006a90bda8 810677cd 1000
  88012e12f598
  [ 4174.782447]   0008 000dd9d0
  88006a90bdb8
  [ 4174.782451] Call Trace:
  [ 4174.782459]  [] dump_stack+0x45/0x56
  [ 4174.782464]  [] warn_slowpath_common+0x7d/0xa0
  [ 4174.782467]  [] warn_slowpath_null+0x1a/0x20
  [ 4174.782472]  [] pagecache_isize_extended+0xfd/0x110
  [ 4174.782476]  [] truncate_setsize+0x27/0x40
  [ 4174.782515]  [] xfs_setattr_size+0x182/0x3e0 [xfs]
  [ 4174.782540]  [] xfs_file_fallocate+0x19c/0x260 [xfs]
  [ 4174.782546]  [] ? __sb_start_write+0x49/0xe0
  [ 4174.782550]  [] do_fallocate+0xf9/0x190
  [ 4174.782554]  [] SyS_fallocate+0x4c/0x80
  [ 4174.782558]  [] system_call_fastpath+0x1a/0x1f
  [ 4174.782561] ---[ end trace aeb446f67bc8e89e ]---

  ===
  break-fix: 90a8020278c1598fafd071736a0846b38510309c 
f55fefd1a5a339b1bd08c120b93312d6eb64a9fb

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1402764/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1403240] Re: linux-armadaxp: 3.2.0-1643.62 -proposed tracker

2015-01-12 Thread Chris J Arges
Promoted to Updates:
 linux-armadaxp  | 3.2.0-1643.62 | precise-security | source
 linux-armadaxp  | 3.2.0-1643.62 | precise-updates  | source
 linux-meta-armadaxp | 3.2.0.1643.49 | precise-security | source
 linux-meta-armadaxp | 3.2.0.1643.49 | precise-updates  | source

** Changed in: kernel-sru-workflow/promote-to-security
   Status: Confirmed => Fix Released

** Changed in: kernel-sru-workflow/promote-to-updates
   Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1403240

Title:
  linux-armadaxp: 3.2.0-1643.62 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow package-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Fix Released
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow upload-to-ppa series:
  Invalid
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-armadaxp source package in Precise:
  Fix Released

Bug description:
  This bug is for tracking the 3.2.0-1643.62 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 16. December 2014 23:05 UTC
  kernel-stable-master-bug:1403154
  kernel-stable-Certification-testing-end:Wednesday, 17. December 2014 03:02 UTC
  kernel-stable-Security-signoff-end:Wednesday, 17. December 2014 03:02 UTC
  kernel-stable-Prepare-package-end:Wednesday, 17. December 2014 06:03 UTC
  kernel-stable-Promote-to-proposed-start:Wednesday, 17. December 2014 06:03 UTC
  ppa-package-testing-start:Wednesday, 17. December 2014 06:03 UTC
  kernel-stable-Promote-to-proposed-end:Wednesday, 17. December 2014 19:09 UTC
  kernel-stable-Verification-testing-start:Wednesday, 17. December 2014 21:01 
UTC
  kernel-stable-Regression-testing-start:Wednesday, 17. December 2014 21:01 UTC
  kernel-stable-Regression-testing-end:Thursday, 18. December 2014 05:02 UTC
  kernel-stable-phase:CopyToUpdates
  kernel-stable-phase-changed:Friday, 09. January 2015 16:20 UTC
  kernel-stable-Promote-to-updates-start:Friday, 09. January 2015 16:20 UTC
  kernel-stable-Promote-to-updates-end:Monday, 12. January 2015 17:44 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1403240/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1040557] Re: UEFI boot live-usb bricks SAMSUNG 530U3C, np700z5c laptop

2015-01-12 Thread Alex SImon
I installed ubuntu 14.04 and f2 doesnt work.  it just takes me to to the
grub menu. also booting from a cd/dvd/usb is not working.  i thought
right away to reset the bios but my laptop 300e5c doesnt have a way to
do that.  it says a fix was released.  i also saw something about
flashing the bios using a usb but how the heck is that going to work if
my machine cant boot usbs.

ugh.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1040557

Title:
  UEFI boot live-usb bricks SAMSUNG 530U3C,np700z5c laptop

Status in Ubuntu CD image build software:
  Fix Released
Status in Release Notes for Ubuntu:
  Fix Released
Status in Release Notes for Ubuntu quantal series:
  Fix Released
Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Oneiric:
  Fix Released
Status in linux source package in Precise:
  Fix Released
Status in linux source package in Quantal:
  Fix Released

Bug description:
  I cannot provide detailed log massages because laptop is bricked right
  now.

  If you have courage to try it select UEFI boot from bios and than try
  to boot laptop using liveusb (made form Precise Pangolin 12.04.1
  amd64).

  Laptop hangs up in black screen. If you force power-off, after it,
  laptop wont start. I mean it not event start bios, just black screen
  no sounds nothing.

  I filing this report, because i already bricked second laptop. At
  first i thought it was unrelated issue and laptop was fixed by
  warranty service (replaced motherboard), but after second time i quite
  sure.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-cdimage/+bug/1040557/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1403240] Re: linux-armadaxp: 3.2.0-1643.62 -proposed tracker

2015-01-12 Thread Chris J Arges
Promoted to Updates:
 linux-armadaxp  | 3.2.0-1643.62 | precise-security | source
 linux-armadaxp  | 3.2.0-1643.62 | precise-updates  | source
 linux-meta-armadaxp | 3.2.0.1643.49 | precise-security | source
 linux-meta-armadaxp | 3.2.0.1643.49 | precise-updates  | source

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1403240

Title:
  linux-armadaxp: 3.2.0-1643.62 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow package-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Fix Released
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow upload-to-ppa series:
  Invalid
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-armadaxp source package in Precise:
  Fix Released

Bug description:
  This bug is for tracking the 3.2.0-1643.62 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 16. December 2014 23:05 UTC
  kernel-stable-master-bug:1403154
  kernel-stable-Certification-testing-end:Wednesday, 17. December 2014 03:02 UTC
  kernel-stable-Security-signoff-end:Wednesday, 17. December 2014 03:02 UTC
  kernel-stable-Prepare-package-end:Wednesday, 17. December 2014 06:03 UTC
  kernel-stable-Promote-to-proposed-start:Wednesday, 17. December 2014 06:03 UTC
  ppa-package-testing-start:Wednesday, 17. December 2014 06:03 UTC
  kernel-stable-Promote-to-proposed-end:Wednesday, 17. December 2014 19:09 UTC
  kernel-stable-Verification-testing-start:Wednesday, 17. December 2014 21:01 
UTC
  kernel-stable-Regression-testing-start:Wednesday, 17. December 2014 21:01 UTC
  kernel-stable-Regression-testing-end:Thursday, 18. December 2014 05:02 UTC
  kernel-stable-phase:CopyToUpdates
  kernel-stable-phase-changed:Friday, 09. January 2015 16:20 UTC
  kernel-stable-Promote-to-updates-start:Friday, 09. January 2015 16:20 UTC
  kernel-stable-Promote-to-updates-end:Monday, 12. January 2015 17:44 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1403240/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1401903] Re: [Hyper-V] FileCopy data loss after fcopy finish (X86 Only) Ubuntu 14.10

2015-01-12 Thread Brad Figg
** Changed in: linux (Ubuntu Utopic)
   Status: Confirmed => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1401903

Title:
  [Hyper-V] FileCopy data loss after fcopy finish (X86 Only) Ubuntu
  14.10

Status in linux package in Ubuntu:
  Fix Committed
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux source package in Trusty:
  Invalid
Status in linux-lts-utopic source package in Trusty:
  Confirmed
Status in linux source package in Utopic:
  Fix Committed
Status in linux-lts-utopic source package in Utopic:
  Invalid
Status in linux source package in Vivid:
  Fix Committed
Status in linux-lts-utopic source package in Vivid:
  Invalid

Bug description:
  Please include this patch for the bug detailed below.
  
https://git.kernel.org/cgit/linux/kernel/git/gregkh/char-misc.git/commit/?h=char-misc-next&id=31d4ea1a093fcf668d5f95af44b8d41488bdb7ec

  The hv_fcopy_daemon must also be recompiled with this header.

  Description of problem:
  after fcopy from the host to guest check it in guest,no data in the file

  Version-Release number of selected component (if applicable):
  Host: hyperv server 2012 R2
  Guest VM: Ubuntu 14.10 (final release)

  How reproducible:
  100%

  Steps to Reproduce:
  1.input data in Test.txt(host)
  2.install hypervfcopyd(guest)
  3.service hypervfcopyd start(guest)
  4.(host)C:\> Copy-VMFile "Test VM" -SourcePath "C:\Test.txt" -DestinationPath 
"/test" -CreateFullPath -FileSource Host(host)
  5.check data in test.txt what fcopyed from host(guest)

  Actual results:
  all the data is lost

  Expected results:
  the same with the original file

  Additional info:
  - x64 builds are not affected
  - this bug has been initially found and patched in a RHEL bug thread, details 
above are from it.

  
  ===
  break-fix: bc5a5b02331a3175a5fca20a4beba249e573b672 
31d4ea1a093fcf668d5f95af44b8d41488bdb7ec

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1401903/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1403240] Re: linux-armadaxp: 3.2.0-1643.62 -proposed tracker

2015-01-12 Thread Brad Figg
** Description changed:

  This bug is for tracking the 3.2.0-1643.62 upload package. This bug will
  contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 16. December 2014 23:05 UTC
  kernel-stable-master-bug:1403154
  kernel-stable-Certification-testing-end:Wednesday, 17. December 2014 03:02 UTC
  kernel-stable-Security-signoff-end:Wednesday, 17. December 2014 03:02 UTC
  kernel-stable-Prepare-package-end:Wednesday, 17. December 2014 06:03 UTC
  kernel-stable-Promote-to-proposed-start:Wednesday, 17. December 2014 06:03 UTC
  ppa-package-testing-start:Wednesday, 17. December 2014 06:03 UTC
  kernel-stable-Promote-to-proposed-end:Wednesday, 17. December 2014 19:09 UTC
  kernel-stable-Verification-testing-start:Wednesday, 17. December 2014 21:01 
UTC
  kernel-stable-Regression-testing-start:Wednesday, 17. December 2014 21:01 UTC
  kernel-stable-Regression-testing-end:Thursday, 18. December 2014 05:02 UTC
  kernel-stable-phase:CopyToUpdates
  kernel-stable-phase-changed:Friday, 09. January 2015 16:20 UTC
  kernel-stable-Promote-to-updates-start:Friday, 09. January 2015 16:20 UTC
+ kernel-stable-Promote-to-updates-end:Monday, 12. January 2015 17:44 UTC

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1403240

Title:
  linux-armadaxp: 3.2.0-1643.62 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow package-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Fix Released
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow upload-to-ppa series:
  Invalid
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-armadaxp source package in Precise:
  Fix Released

Bug description:
  This bug is for tracking the 3.2.0-1643.62 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 16. December 2014 23:05 UTC
  kernel-stable-master-bug:1403154
  kernel-stable-Certification-testing-end:Wednesday, 17. December 2014 03:02 UTC
  kernel-stable-Security-signoff-end:Wednesday, 17. December 2014 03:02 UTC
  kernel-stable-Prepare-package-end:Wednesday, 17. December 2014 06:03 UTC
  kernel-stable-Promote-to-proposed-start:Wednesday, 17. December 2014 06:03 UTC
  ppa-package-testing-start:Wednesday, 17. December 2014 06:03 UTC
  kernel-stable-Promote-to-proposed-end:Wednesday, 17. December 2014 19:09 UTC
  kernel-stable-Verification-testing-start:Wednesday, 17. December 2014 21:01 
UTC
  kernel-stable-Regression-testing-start:Wednesday, 17. December 2014 21:01 UTC
  kernel-stable-Regression-testing-end:Thursday, 18. December 2014 05:02 UTC
  kernel-stable-phase:CopyToUpdates
  kernel-stable-phase-changed:Friday, 09. January 2015 16:20 UTC
  kernel-stable-Promote-to-updates-start:Friday, 09. January 2015 16:20 UTC
  kernel-stable-Promote-to-updates-end:Monday, 12. January 2015 17:44 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1403240/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1406867] Re: Hyper-V TRIM Feature Broken in current LTS trusty kernel

2015-01-12 Thread Brad Figg
** Changed in: linux (Ubuntu Trusty)
   Status: In Progress => Fix Committed

** Changed in: linux (Ubuntu Utopic)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1406867

Title:
  Hyper-V TRIM Feature Broken in current LTS trusty kernel

Status in linux package in Ubuntu:
  Fix Committed
Status in linux source package in Trusty:
  Fix Committed
Status in linux source package in Utopic:
  Fix Committed
Status in linux source package in Vivid:
  Fix Committed

Bug description:
  The TRIM/UNMAP feature is broken in the current trusty kernel with
  Hyper-V because of the reversion of this commit:

  http://kernel.ubuntu.com/git?p=ubuntu/ubuntu-
  trusty.git;a=commit;h=81a73bce0c7b86fbf51004cb171387e73e082784

  However a proposed storvsc patch has been submitted to the upstream
  kernel mailing list which could be found here:

  https://patchwork.kernel.org/patch/5503381/

  In Hyper-V TRIM/UNMAP allows the user to reclaim allocated storage that is no 
longer in use inside a thin provisioned VHDX volume.
  --- 
  AlsaDevices:
   total 0
   crw-rw 1 root audio 116,  1 Jan  1 03:42 seq
   crw-rw 1 root audio 116, 33 Jan  1 03:42 timer
  AplayDevices: Error: [Errno 2] No such file or directory
  ApportVersion: 2.14.1-0ubuntu3.6
  Architecture: amd64
  ArecordDevices: Error: [Errno 2] No such file or directory
  AudioDevicesInUse: Error: command ['fuser', '-v', '/dev/snd/seq', 
'/dev/snd/timer'] failed with exit code 1:
  CRDA: Error: [Errno 2] No such file or directory
  CurrentDmesg: [   10.846694] init: plymouth-upstart-bridge main process 
ended, respawning
  DistroRelease: Ubuntu 14.04
  IwConfig: Error: [Errno 2] No such file or directory
  Lspci: Error: [Errno 2] No such file or directory
  Lsusb: Error: [Errno 2] No such file or directory
  MachineType: Microsoft Corporation Virtual Machine
  Package: linux (not installed)
  PciMultimedia:
   
  ProcEnviron:
   TERM=xterm
   PATH=(custom, no user)
   XDG_RUNTIME_DIR=
   LANG=en_US.UTF-8
   SHELL=/bin/bash
  ProcFB: 0 VESA VGA
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.13.0-43-generic 
root=/dev/mapper/trusty--201412122541-root ro quiet elevator=noop 
video=hyperv_fb:800x600 splash vt.handoff=7
  ProcVersionSignature: Ubuntu 3.13.0-43.72-generic 3.13.11.11
  RelatedPackageVersions:
   linux-restricted-modules-3.13.0-43-generic N/A
   linux-backports-modules-3.13.0-43-generic  N/A
   linux-firmware N/A
  RfKill: Error: [Errno 2] No such file or directory
  Tags:  trusty
  Uname: Linux 3.13.0-43-generic x86_64
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups:
   
  _MarkForUpload: True
  dmi.bios.date: 05/23/2012
  dmi.bios.vendor: American Megatrends Inc.
  dmi.bios.version: 090006
  dmi.board.name: Virtual Machine
  dmi.board.vendor: Microsoft Corporation
  dmi.board.version: 7.0
  dmi.chassis.asset.tag: 3060-1254-0945-5202-9816-4673-85
  dmi.chassis.type: 3
  dmi.chassis.vendor: Microsoft Corporation
  dmi.chassis.version: 7.0
  dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvr090006:bd05/23/2012:svnMicrosoftCorporation:pnVirtualMachine:pvr7.0:rvnMicrosoftCorporation:rnVirtualMachine:rvr7.0:cvnMicrosoftCorporation:ct3:cvr7.0:
  dmi.product.name: Virtual Machine
  dmi.product.version: 7.0
  dmi.sys.vendor: Microsoft Corporation

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1406867/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1403154] Re: linux: 3.2.0-75.110 -proposed tracker

2015-01-12 Thread Brad Figg
** Description changed:

  This bug is for tracking the 3.2.0-75.110 upload package. This bug will
  contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 16. December 2014 17:50 UTC
  kernel-stable-Prepare-package-end:Tuesday, 16. December 2014 23:08 UTC
  kernel-stable-Promote-to-proposed-start:Tuesday, 16. December 2014 23:08 UTC
  ppa-package-testing-start:Tuesday, 16. December 2014 23:08 UTC
  kernel-stable-Promote-to-proposed-end:Wednesday, 17. December 2014 18:20 UTC
  kernel-stable-Verification-testing-start:Wednesday, 17. December 2014 20:01 
UTC
  kernel-stable-Certification-testing-start:Wednesday, 17. December 2014 20:02 
UTC
  kernel-stable-Security-signoff-start:Wednesday, 17. December 2014 20:02 UTC
  kernel-stable-Regression-testing-start:Wednesday, 17. December 2014 20:02 UTC
  kernel-stable-Security-signoff-end:Thursday, 18. December 2014 14:01 UTC
  kernel-stable-Certification-testing-end:Wednesday, 07. January 2015 10:01 UTC
  kernel-stable-Regression-testing-end:Friday, 09. January 2015 16:10 UTC
  kernel-stable-phase:CopyToUpdates
  kernel-stable-phase-changed:Friday, 09. January 2015 16:20 UTC
  kernel-stable-Promote-to-updates-start:Friday, 09. January 2015 16:20 UTC
+ kernel-stable-Promote-to-updates-end:Monday, 12. January 2015 17:35 UTC

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1403154

Title:
  linux: 3.2.0-75.110 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Fix Released
Status in Kernel SRU Workflow package-testing series:
  Fix Released
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-lbm series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Fix Released
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Precise:
  Fix Released

Bug description:
  This bug is for tracking the 3.2.0-75.110 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 16. December 2014 17:50 UTC
  kernel-stable-Prepare-package-end:Tuesday, 16. December 2014 23:08 UTC
  kernel-stable-Promote-to-proposed-start:Tuesday, 16. December 2014 23:08 UTC
  ppa-package-testing-start:Tuesday, 16. December 2014 23:08 UTC
  kernel-stable-Promote-to-proposed-end:Wednesday, 17. December 2014 18:20 UTC
  kernel-stable-Verification-testing-start:Wednesday, 17. December 2014 20:01 
UTC
  kernel-stable-Certification-testing-start:Wednesday, 17. December 2014 20:02 
UTC
  kernel-stable-Security-signoff-start:Wednesday, 17. December 2014 20:02 UTC
  kernel-stable-Regression-testing-start:Wednesday, 17. December 2014 20:02 UTC
  kernel-stable-Security-signoff-end:Thursday, 18. December 2014 14:01 UTC
  kernel-stable-Certification-testing-end:Wednesday, 07. January 2015 10:01 UTC
  kernel-stable-Regression-testing-end:Friday, 09. January 2015 16:10 UTC
  kernel-stable-phase:CopyToUpdates
  kernel-stable-phase-changed:Friday, 09. January 2015 16:20 UTC
  kernel-stable-Promote-to-updates-start:Friday, 09. January 2015 16:20 UTC
  kernel-stable-Promote-to-updates-end:Monday, 12. January 2015 17:35 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1403154/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


Re: [Kernel-packages] [Bug 1409531] Re: Wifi Drops

2015-01-12 Thread Christopher Restemayer
Pretty much been going on since I installed it. It seems random. The only
thing I can figure out is that out tends to happen more often when the
network is under load.  I had a download going and the wireless turned off
3 times during that process.
On Jan 12, 2015 10:45 AM, "Joseph Salisbury" 
wrote:

> Did this issue start happening after an update/upgrade?  Was there a
> prior kernel version where you were not having this particular problem?
>
> Would it be possible for you to test the latest upstream kernel? Refer
> to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest
> v3.19 kernel[0].
>
> If this bug is fixed in the mainline kernel, please add the following
> tag 'kernel-fixed-upstream'.
>
> If the mainline kernel does not fix this bug, please add the tag:
> 'kernel-bug-exists-upstream'.
>
> If you are unable to test the mainline kernel, for example it will not
> boot, please add the tag: 'kernel-unable-to-test-upstream'.
> Once testing of the upstream kernel is complete, please mark this bug as
> "Confirmed".
>
>
> Thanks in advance.
>
> [0] http://kernel.ubuntu.com/~kernel-ppa/mainline/v3.19-rc4-vivid/
>
> ** Changed in: linux (Ubuntu)
>Importance: Undecided => Medium
>
> ** Changed in: linux (Ubuntu)
>Status: Confirmed => Incomplete
>
> --
> You received this bug notification because you are subscribed to the bug
> report.
> https://bugs.launchpad.net/bugs/1409531
>
> Title:
>   Wifi Drops
>
> Status in linux package in Ubuntu:
>   Incomplete
>
> Bug description:
>   Wireless adapter randomly stops working and drops signal.  Ubuntu
>   still registers that it exists, but doesn't find any wireless signals.
>   I have to disable and enable the adapter to reconnect it.
>
>   ProblemType: Bug
>   DistroRelease: Ubuntu 14.04
>   Package: linux-image-3.13.0-43-generic 3.13.0-43.72
>   ProcVersionSignature: Ubuntu 3.13.0-43.72-generic 3.13.11.11
>   Uname: Linux 3.13.0-43-generic x86_64
>   ApportVersion: 2.14.1-0ubuntu3.6
>   Architecture: amd64
>   AudioDevicesInUse:
>USERPID ACCESS COMMAND
>/dev/snd/controlC1:  rusty  2003 F pulseaudio
>/dev/snd/controlC0:  rusty  2003 F pulseaudio
>   CurrentDesktop: Unity
>   Date: Sun Jan 11 15:06:03 2015
>   EcryptfsInUse: Yes
>   InstallationDate: Installed on 2014-09-11 (122 days ago)
>   InstallationMedia: Ubuntu 14.04.1 LTS "Trusty Tahr" - Release amd64
> (20140722.2)
>   Lsusb:
>Bus 001 Device 003: ID 0bda:8187 Realtek Semiconductor Corp. RTL8187
> Wireless Adapter
>Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
>Bus 002 Device 002: ID 046d:c52b Logitech, Inc. Unifying Receiver
>Bus 002 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
>   MachineType: System manufacturer System Product Name
>   ProcFB: 0 radeondrmfb
>   ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-43-generic
> root=UUID=ec1cc0a1-628a-414a-95c2-1585ed7f7271 ro quiet splash vt.handoff=7
>   RelatedPackageVersions:
>linux-restricted-modules-3.13.0-43-generic N/A
>linux-backports-modules-3.13.0-43-generic  N/A
>linux-firmware 1.127.11
>   RfKill:
>0: phy0: Wireless LAN
> Soft blocked: no
> Hard blocked: no
>   SourcePackage: linux
>   UpgradeStatus: No upgrade log present (probably fresh install)
>   dmi.bios.date: 06/20/2007
>   dmi.bios.vendor: Phoenix Technologies, LTD
>   dmi.bios.version: ASUS M2N32-SLI DELUXE ACPI BIOS Revision 1201
>   dmi.board.name: M2N32-SLI DELUXE
>   dmi.board.vendor: ASUSTeK Computer INC.
>   dmi.board.version: 1.XX
>   dmi.chassis.asset.tag: 123456789000
>   dmi.chassis.type: 3
>   dmi.chassis.vendor: Chassis Manufacture
>   dmi.chassis.version: Chassis Version
>   dmi.modalias:
> dmi:bvnPhoenixTechnologies,LTD:bvrASUSM2N32-SLIDELUXEACPIBIOSRevision1201:bd06/20/2007:svnSystemmanufacturer:pnSystemProductName:pvrSystemVersion:rvnASUSTeKComputerINC.:rnM2N32-SLIDELUXE:rvr1.XX:cvnChassisManufacture:ct3:cvrChassisVersion:
>   dmi.product.name: System Product Name
>   dmi.product.version: System Version
>   dmi.sys.vendor: System manufacturer
>
> To manage notifications about this bug go to:
> https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1409531/+subscriptions
>

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1409531

Title:
  Wifi Drops

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  Wireless adapter randomly stops working and drops signal.  Ubuntu
  still registers that it exists, but doesn't find any wireless signals.
  I have to disable and enable the adapter to reconnect it.

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.13.0-43-generic 3.13.0-43.72
  ProcVersionSignature: Ubuntu 3.13.0-43.72-generic 3.13.11.11
  Uname: Linux 3.13.0-43-generic x86_64
  ApportVersion: 2.14.1-0ubuntu3.6
  Architecture: amd64
  AudioDevicesInUse:
   USER   

Re: [Kernel-packages] [Bug 1409582] Re: Touch screen and touch pad not working

2015-01-12 Thread Lividium
This isn't an upgrade. I just purchased the laptop and stripped windows off
of it and loaded the 64 bit Ubuntu desktop that is available from the
website onto it.

It may be a few hours before I can get to more testing, but I will try.

On Mon, Jan 12, 2015, 10:45 Joseph Salisbury 
wrote:

> Did this issue start happening after an update/upgrade?  Was there a
> prior kernel version where you were not having this particular problem?
>
> Would it be possible for you to test the latest upstream kernel? Refer
> to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest
> v3.19 kernel[0].
>
> If this bug is fixed in the mainline kernel, please add the following
> tag 'kernel-fixed-upstream'.
>
> If the mainline kernel does not fix this bug, please add the tag:
> 'kernel-bug-exists-upstream'.
>
> If you are unable to test the mainline kernel, for example it will not
> boot, please add the tag: 'kernel-unable-to-test-upstream'.
> Once testing of the upstream kernel is complete, please mark this bug as
> "Confirmed".
>
>
> Thanks in advance.
>
> [0] http://kernel.ubuntu.com/~kernel-ppa/mainline/v3.19-rc4-vivid/
>
> ** Changed in: linux (Ubuntu)
>Importance: Undecided => Medium
>
> ** Changed in: linux (Ubuntu)
>Status: Confirmed => Incomplete
>
> --
> You received this bug notification because you are subscribed to the bug
> report.
> https://bugs.launchpad.net/bugs/1409582
>
> Title:
>   Touch screen and touch pad not working
>
> Status in linux package in Ubuntu:
>   Incomplete
>
> Bug description:
>   in a Lenovo Yoga 3 Pro
>
>   ProblemType: Bug
>   DistroRelease: Ubuntu 14.04
>   Package: linux-image-3.13.0-43-generic 3.13.0-43.72
>   ProcVersionSignature: Ubuntu 3.13.0-43.72-generic 3.13.11.11
>   Uname: Linux 3.13.0-43-generic x86_64
>   NonfreeKernelModules: wl
>   ApportVersion: 2.14.1-0ubuntu3.6
>   Architecture: amd64
>   AudioDevicesInUse:
>USERPID ACCESS COMMAND
>/dev/snd/controlC0:  lividium   1772 F pulseaudio
>/dev/snd/controlC1:  lividium   1772 F pulseaudio
>   CurrentDesktop: Unity
>   Date: Sun Jan 11 21:02:07 2015
>   HibernationDevice: RESUME=UUID=d4dd0015-38ca-4d6b-9c29-9c3f3f0271c9
>   InstallationDate: Installed on 2015-01-06 (5 days ago)
>   InstallationMedia: Ubuntu 14.04.1 LTS "Trusty Tahr" - Release amd64
> (20140722.2)
>   MachineType: LENOVO 80HE
>   ProcFB: 0 inteldrmfb
>   ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-43-generic
> root=UUID=2fd25d46-3932-4d2d-9bff-18bb5e732c4b ro quiet splash
> vt.handoff=7
>   RelatedPackageVersions:
>linux-restricted-modules-3.13.0-43-generic N/A
>linux-backports-modules-3.13.0-43-generic  N/A
>linux-firmware 1.127.11
>   SourcePackage: linux
>   UpgradeStatus: No upgrade log present (probably fresh install)
>   WifiSyslog:
>
>   dmi.bios.date: 09/30/2014
>   dmi.bios.vendor: LENOVO
>   dmi.bios.version: A6CN38WW
>   dmi.board.asset.tag: NO Asset Tag
>   dmi.board.name: VIUU4
>   dmi.board.vendor: LENOVO
>   dmi.board.version: 31900058 WIN
>   dmi.chassis.asset.tag: NO Asset Tag
>   dmi.chassis.type: 10
>   dmi.chassis.vendor: LENOVO
>   dmi.chassis.version: Lenovo YOGA 3 Pro-1370
>   dmi.modalias: dmi:bvnLENOVO:bvrA6CN38WW:bd09/30/2014:svnLENOVO:pn80HE:
> pvrLenovoYOGA3Pro-1370:rvnLENOVO:rnVIUU4:rvr31900058WIN:cvnLENOVO:ct10:
> cvrLenovoYOGA3Pro-1370:
>   dmi.product.name: 80HE
>   dmi.product.version: Lenovo YOGA 3 Pro-1370
>   dmi.sys.vendor: LENOVO
>
> To manage notifications about this bug go to:
> https://bugs.launchpad.net/ubuntu/+source/linux/+bug/
> 1409582/+subscriptions
>

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1409582

Title:
  Touch screen and touch pad not working

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  in a Lenovo Yoga 3 Pro

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.13.0-43-generic 3.13.0-43.72
  ProcVersionSignature: Ubuntu 3.13.0-43.72-generic 3.13.11.11
  Uname: Linux 3.13.0-43-generic x86_64
  NonfreeKernelModules: wl
  ApportVersion: 2.14.1-0ubuntu3.6
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  lividium   1772 F pulseaudio
   /dev/snd/controlC1:  lividium   1772 F pulseaudio
  CurrentDesktop: Unity
  Date: Sun Jan 11 21:02:07 2015
  HibernationDevice: RESUME=UUID=d4dd0015-38ca-4d6b-9c29-9c3f3f0271c9
  InstallationDate: Installed on 2015-01-06 (5 days ago)
  InstallationMedia: Ubuntu 14.04.1 LTS "Trusty Tahr" - Release amd64 
(20140722.2)
  MachineType: LENOVO 80HE
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-43-generic 
root=UUID=2fd25d46-3932-4d2d-9bff-18bb5e732c4b ro quiet splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-3.13.0-43-generic N/A
   linux-backports-modules-3.13.0-43-generic  N/A
   linux-firmware 

[Kernel-packages] [Bug 1402872] Re: linux: 3.13.0-44.73 -proposed tracker

2015-01-12 Thread Brad Figg
** Description changed:

  This bug is for tracking the 3.13.0-44.73 upload package. This bug will
  contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Monday, 15. December 2014 23:54 UTC
  kernel-stable-Prepare-package-end:Tuesday, 16. December 2014 07:08 UTC
  kernel-stable-Promote-to-proposed-start:Tuesday, 16. December 2014 07:08 UTC
  ppa-package-testing-start:Tuesday, 16. December 2014 07:08 UTC
  kernel-stable-Promote-to-proposed-end:Tuesday, 16. December 2014 22:00 UTC
  kernel-stable-Verification-testing-start:Tuesday, 16. December 2014 23:01 UTC
  kernel-stable-Certification-testing-start:Tuesday, 16. December 2014 23:01 UTC
  kernel-stable-Security-signoff-start:Tuesday, 16. December 2014 23:01 UTC
  kernel-stable-Regression-testing-start:Tuesday, 16. December 2014 23:01 UTC
  kernel-stable-Security-signoff-end:Thursday, 18. December 2014 14:00 UTC
  kernel-stable-Certification-testing-end:Wednesday, 07. January 2015 16:00 UTC
  kernel-stable-Regression-testing-end:Friday, 09. January 2015 16:06 UTC
  kernel-stable-phase:CopyToUpdates
  kernel-stable-phase-changed:Friday, 09. January 2015 16:18 UTC
  kernel-stable-Promote-to-updates-start:Friday, 09. January 2015 16:18 UTC
+ kernel-stable-Promote-to-updates-end:Monday, 12. January 2015 17:34 UTC

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1402872

Title:
  linux: 3.13.0-44.73 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Fix Released
Status in Kernel SRU Workflow package-testing series:
  Fix Released
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Fix Released
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Trusty:
  Fix Released

Bug description:
  This bug is for tracking the 3.13.0-44.73 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Monday, 15. December 2014 23:54 UTC
  kernel-stable-Prepare-package-end:Tuesday, 16. December 2014 07:08 UTC
  kernel-stable-Promote-to-proposed-start:Tuesday, 16. December 2014 07:08 UTC
  ppa-package-testing-start:Tuesday, 16. December 2014 07:08 UTC
  kernel-stable-Promote-to-proposed-end:Tuesday, 16. December 2014 22:00 UTC
  kernel-stable-Verification-testing-start:Tuesday, 16. December 2014 23:01 UTC
  kernel-stable-Certification-testing-start:Tuesday, 16. December 2014 23:01 UTC
  kernel-stable-Security-signoff-start:Tuesday, 16. December 2014 23:01 UTC
  kernel-stable-Regression-testing-start:Tuesday, 16. December 2014 23:01 UTC
  kernel-stable-Security-signoff-end:Thursday, 18. December 2014 14:00 UTC
  kernel-stable-Certification-testing-end:Wednesday, 07. January 2015 16:00 UTC
  kernel-stable-Regression-testing-end:Friday, 09. January 2015 16:06 UTC
  kernel-stable-phase:CopyToUpdates
  kernel-stable-phase-changed:Friday, 09. January 2015 16:18 UTC
  kernel-stable-Promote-to-updates-start:Friday, 09. January 2015 16:18 UTC
  kernel-stable-Promote-to-updates-end:Monday, 12. January 2015 17:34 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1402872/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1403154] Re: linux: 3.2.0-75.110 -proposed tracker

2015-01-12 Thread Chris J Arges
Promoted to Updates:
 linux | 3.2.0-75.110  | precise-security | source
 linux | 3.2.0-75.110  | precise-updates  | source
 linux-meta| 3.2.0.75.89   | precise-security | source
 linux-meta| 3.2.0.75.89   | precise-updates  | source
 linux-backports-modules-3.2.0 | 3.2.0-75.67   | precise-security | source
 linux-backports-modules-3.2.0 | 3.2.0-75.67   | precise-updates  | source

** Changed in: kernel-sru-workflow/promote-to-security
   Status: Confirmed => Fix Released

** Changed in: kernel-sru-workflow/promote-to-updates
   Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1403154

Title:
  linux: 3.2.0-75.110 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Fix Released
Status in Kernel SRU Workflow package-testing series:
  Fix Released
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-lbm series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Fix Released
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Precise:
  Fix Released

Bug description:
  This bug is for tracking the 3.2.0-75.110 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 16. December 2014 17:50 UTC
  kernel-stable-Prepare-package-end:Tuesday, 16. December 2014 23:08 UTC
  kernel-stable-Promote-to-proposed-start:Tuesday, 16. December 2014 23:08 UTC
  ppa-package-testing-start:Tuesday, 16. December 2014 23:08 UTC
  kernel-stable-Promote-to-proposed-end:Wednesday, 17. December 2014 18:20 UTC
  kernel-stable-Verification-testing-start:Wednesday, 17. December 2014 20:01 
UTC
  kernel-stable-Certification-testing-start:Wednesday, 17. December 2014 20:02 
UTC
  kernel-stable-Security-signoff-start:Wednesday, 17. December 2014 20:02 UTC
  kernel-stable-Regression-testing-start:Wednesday, 17. December 2014 20:02 UTC
  kernel-stable-Security-signoff-end:Thursday, 18. December 2014 14:01 UTC
  kernel-stable-Certification-testing-end:Wednesday, 07. January 2015 10:01 UTC
  kernel-stable-Regression-testing-end:Friday, 09. January 2015 16:10 UTC
  kernel-stable-phase:CopyToUpdates
  kernel-stable-phase-changed:Friday, 09. January 2015 16:20 UTC
  kernel-stable-Promote-to-updates-start:Friday, 09. January 2015 16:20 UTC
  kernel-stable-Promote-to-updates-end:Monday, 12. January 2015 17:35 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1403154/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1402872] Re: linux: 3.13.0-44.73 -proposed tracker

2015-01-12 Thread Chris J Arges
Promote to Updates:
 linux| 3.13.0-44.73  | trusty-security  | source
 linux| 3.13.0-44.73  | trusty-updates   | source
 linux-meta   | 3.13.0.44.51  | trusty-security  | source
 linux-meta   | 3.13.0.44.51  | trusty-updates   | source
 linux-signed | 3.13.0-44.73  | trusty-security  | source
 linux-signed | 3.13.0-44.73  | trusty-updates   | source

** Changed in: kernel-sru-workflow/promote-to-security
   Status: Confirmed => Fix Released

** Changed in: kernel-sru-workflow/promote-to-updates
   Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1402872

Title:
  linux: 3.13.0-44.73 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Fix Released
Status in Kernel SRU Workflow package-testing series:
  Fix Released
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Fix Released
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Trusty:
  Fix Released

Bug description:
  This bug is for tracking the 3.13.0-44.73 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Monday, 15. December 2014 23:54 UTC
  kernel-stable-Prepare-package-end:Tuesday, 16. December 2014 07:08 UTC
  kernel-stable-Promote-to-proposed-start:Tuesday, 16. December 2014 07:08 UTC
  ppa-package-testing-start:Tuesday, 16. December 2014 07:08 UTC
  kernel-stable-Promote-to-proposed-end:Tuesday, 16. December 2014 22:00 UTC
  kernel-stable-Verification-testing-start:Tuesday, 16. December 2014 23:01 UTC
  kernel-stable-Certification-testing-start:Tuesday, 16. December 2014 23:01 UTC
  kernel-stable-Security-signoff-start:Tuesday, 16. December 2014 23:01 UTC
  kernel-stable-Regression-testing-start:Tuesday, 16. December 2014 23:01 UTC
  kernel-stable-Security-signoff-end:Thursday, 18. December 2014 14:00 UTC
  kernel-stable-Certification-testing-end:Wednesday, 07. January 2015 16:00 UTC
  kernel-stable-Regression-testing-end:Friday, 09. January 2015 16:06 UTC
  kernel-stable-phase:CopyToUpdates
  kernel-stable-phase-changed:Friday, 09. January 2015 16:18 UTC
  kernel-stable-Promote-to-updates-start:Friday, 09. January 2015 16:18 UTC
  kernel-stable-Promote-to-updates-end:Monday, 12. January 2015 17:34 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1402872/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1409811] [NEW] CVE-2014-9585

2015-01-12 Thread John Johansen
*** This bug is a security vulnerability ***

Public security bug reported:

PIE bypass using VDSO ASLR weakness

Break-Fix: - 394f56fe480140877304d342dec46d50dc823d46

** Affects: linux (Ubuntu)
 Importance: Medium
 Status: New

** Affects: linux-armadaxp (Ubuntu)
 Importance: Medium
 Status: Invalid

** Affects: linux-ec2 (Ubuntu)
 Importance: Medium
 Status: Invalid

** Affects: linux-fsl-imx51 (Ubuntu)
 Importance: Medium
 Status: Invalid

** Affects: linux-lts-backport-maverick (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: linux-lts-backport-natty (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: linux-lts-quantal (Ubuntu)
 Importance: Medium
 Status: Invalid

** Affects: linux-lts-raring (Ubuntu)
 Importance: Medium
 Status: Invalid

** Affects: linux-lts-saucy (Ubuntu)
 Importance: Medium
 Status: Invalid

** Affects: linux-lts-trusty (Ubuntu)
 Importance: Medium
 Status: Invalid

** Affects: linux-lts-utopic (Ubuntu)
 Importance: Medium
 Status: Invalid

** Affects: linux-mvl-dove (Ubuntu)
 Importance: Medium
 Status: Invalid

** Affects: linux-ti-omap4 (Ubuntu)
 Importance: Medium
 Status: Invalid

** Affects: linux (Ubuntu Lucid)
 Importance: Medium
 Status: New

** Affects: linux-armadaxp (Ubuntu Lucid)
 Importance: Medium
 Status: Invalid

** Affects: linux-ec2 (Ubuntu Lucid)
 Importance: Medium
 Status: New

** Affects: linux-fsl-imx51 (Ubuntu Lucid)
 Importance: Medium
 Status: Invalid

** Affects: linux-lts-backport-maverick (Ubuntu Lucid)
 Importance: Undecided
 Status: New

** Affects: linux-lts-backport-natty (Ubuntu Lucid)
 Importance: Undecided
 Status: New

** Affects: linux-lts-quantal (Ubuntu Lucid)
 Importance: Medium
 Status: Invalid

** Affects: linux-lts-raring (Ubuntu Lucid)
 Importance: Medium
 Status: Invalid

** Affects: linux-lts-saucy (Ubuntu Lucid)
 Importance: Medium
 Status: Invalid

** Affects: linux-lts-trusty (Ubuntu Lucid)
 Importance: Medium
 Status: Invalid

** Affects: linux-lts-utopic (Ubuntu Lucid)
 Importance: Medium
 Status: Invalid

** Affects: linux-mvl-dove (Ubuntu Lucid)
 Importance: Medium
 Status: Invalid

** Affects: linux-ti-omap4 (Ubuntu Lucid)
 Importance: Medium
 Status: Invalid

** Affects: linux (Ubuntu Precise)
 Importance: Medium
 Status: New

** Affects: linux-armadaxp (Ubuntu Precise)
 Importance: Medium
 Status: New

** Affects: linux-ec2 (Ubuntu Precise)
 Importance: Medium
 Status: Invalid

** Affects: linux-fsl-imx51 (Ubuntu Precise)
 Importance: Medium
 Status: Invalid

** Affects: linux-lts-backport-maverick (Ubuntu Precise)
 Importance: Undecided
 Status: New

** Affects: linux-lts-backport-natty (Ubuntu Precise)
 Importance: Undecided
 Status: New

** Affects: linux-lts-quantal (Ubuntu Precise)
 Importance: Medium
 Status: New

** Affects: linux-lts-raring (Ubuntu Precise)
 Importance: Medium
 Status: New

** Affects: linux-lts-saucy (Ubuntu Precise)
 Importance: Medium
 Status: New

** Affects: linux-lts-trusty (Ubuntu Precise)
 Importance: Medium
 Status: New

** Affects: linux-lts-utopic (Ubuntu Precise)
 Importance: Medium
 Status: Invalid

** Affects: linux-mvl-dove (Ubuntu Precise)
 Importance: Medium
 Status: Invalid

** Affects: linux-ti-omap4 (Ubuntu Precise)
 Importance: Medium
 Status: New

** Affects: linux (Ubuntu Trusty)
 Importance: Medium
 Status: New

** Affects: linux-armadaxp (Ubuntu Trusty)
 Importance: Medium
 Status: Invalid

** Affects: linux-ec2 (Ubuntu Trusty)
 Importance: Medium
 Status: Invalid

** Affects: linux-fsl-imx51 (Ubuntu Trusty)
 Importance: Medium
 Status: Invalid

** Affects: linux-lts-backport-maverick (Ubuntu Trusty)
 Importance: Undecided
 Status: New

** Affects: linux-lts-backport-natty (Ubuntu Trusty)
 Importance: Undecided
 Status: New

** Affects: linux-lts-quantal (Ubuntu Trusty)
 Importance: Medium
 Status: Invalid

** Affects: linux-lts-raring (Ubuntu Trusty)
 Importance: Medium
 Status: Invalid

** Affects: linux-lts-saucy (Ubuntu Trusty)
 Importance: Medium
 Status: Invalid

** Affects: linux-lts-trusty (Ubuntu Trusty)
 Importance: Medium
 Status: Invalid

** Affects: linux-lts-utopic (Ubuntu Trusty)
 Importance: Medium
 Status: New

** Affects: linux-mvl-dove (Ubuntu Trusty)
 Importance: Medium
 Status: Invalid

** Affects: linux-ti-omap4 (Ubuntu Trusty)
 Importance: Medium
 Status: Invalid

** Affects: linux (Ubuntu Utopic)
 Importance: Medium
   

[Kernel-packages] [Bug 1409811] Re: CVE-2014-9585

2015-01-12 Thread John Johansen
CVE-2014-9585

** Also affects: linux (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Changed in: linux-lts-trusty (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-lts-trusty (Ubuntu Lucid)
   Status: New => Invalid

** Changed in: linux-lts-trusty (Ubuntu Vivid)
   Status: New => Invalid

** Changed in: linux-lts-trusty (Ubuntu Utopic)
   Status: New => Invalid

** Changed in: linux-armadaxp (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-armadaxp (Ubuntu Lucid)
   Status: New => Invalid

** Changed in: linux-armadaxp (Ubuntu Vivid)
   Status: New => Invalid

** Changed in: linux-armadaxp (Ubuntu Utopic)
   Status: New => Invalid

** Changed in: linux-lts-utopic (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-lts-utopic (Ubuntu Lucid)
   Status: New => Invalid

** Changed in: linux-lts-utopic (Ubuntu Vivid)
   Status: New => Invalid

** Changed in: linux-lts-utopic (Ubuntu Utopic)
   Status: New => Invalid

** Changed in: linux-ec2 (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-ec2 (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-ec2 (Ubuntu Vivid)
   Status: New => Invalid

** Changed in: linux-ec2 (Ubuntu Utopic)
   Status: New => Invalid

** Changed in: linux-lts-quantal (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-lts-quantal (Ubuntu Lucid)
   Status: New => Invalid

** Changed in: linux-lts-quantal (Ubuntu Vivid)
   Status: New => Invalid

** Changed in: linux-lts-quantal (Ubuntu Utopic)
   Status: New => Invalid

** Changed in: linux-mvl-dove (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-mvl-dove (Ubuntu Trusty)
   Status: New =>

[Kernel-packages] [Bug 1409808] [NEW] CVE-2014-9584

2015-01-12 Thread John Johansen
*** This bug is a security vulnerability ***

Public security bug reported:

isofs: unchecked printing of ER records

Break-Fix: - 4e2024624e678f0ebb916e6192bd23c1f9fdf696

** Affects: linux (Ubuntu)
 Importance: Medium
 Status: New

** Affects: linux-armadaxp (Ubuntu)
 Importance: Medium
 Status: Invalid

** Affects: linux-ec2 (Ubuntu)
 Importance: Medium
 Status: Invalid

** Affects: linux-fsl-imx51 (Ubuntu)
 Importance: Medium
 Status: Invalid

** Affects: linux-lts-backport-maverick (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: linux-lts-backport-natty (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: linux-lts-quantal (Ubuntu)
 Importance: Medium
 Status: Invalid

** Affects: linux-lts-raring (Ubuntu)
 Importance: Medium
 Status: Invalid

** Affects: linux-lts-saucy (Ubuntu)
 Importance: Medium
 Status: Invalid

** Affects: linux-lts-trusty (Ubuntu)
 Importance: Medium
 Status: Invalid

** Affects: linux-lts-utopic (Ubuntu)
 Importance: Medium
 Status: Invalid

** Affects: linux-mvl-dove (Ubuntu)
 Importance: Medium
 Status: Invalid

** Affects: linux-ti-omap4 (Ubuntu)
 Importance: Medium
 Status: Invalid

** Affects: linux (Ubuntu Lucid)
 Importance: Medium
 Status: New

** Affects: linux-armadaxp (Ubuntu Lucid)
 Importance: Medium
 Status: Invalid

** Affects: linux-ec2 (Ubuntu Lucid)
 Importance: Medium
 Status: New

** Affects: linux-fsl-imx51 (Ubuntu Lucid)
 Importance: Medium
 Status: Invalid

** Affects: linux-lts-backport-maverick (Ubuntu Lucid)
 Importance: Undecided
 Status: New

** Affects: linux-lts-backport-natty (Ubuntu Lucid)
 Importance: Undecided
 Status: New

** Affects: linux-lts-quantal (Ubuntu Lucid)
 Importance: Medium
 Status: Invalid

** Affects: linux-lts-raring (Ubuntu Lucid)
 Importance: Medium
 Status: Invalid

** Affects: linux-lts-saucy (Ubuntu Lucid)
 Importance: Medium
 Status: Invalid

** Affects: linux-lts-trusty (Ubuntu Lucid)
 Importance: Medium
 Status: Invalid

** Affects: linux-lts-utopic (Ubuntu Lucid)
 Importance: Medium
 Status: Invalid

** Affects: linux-mvl-dove (Ubuntu Lucid)
 Importance: Medium
 Status: Invalid

** Affects: linux-ti-omap4 (Ubuntu Lucid)
 Importance: Medium
 Status: Invalid

** Affects: linux (Ubuntu Precise)
 Importance: Medium
 Status: New

** Affects: linux-armadaxp (Ubuntu Precise)
 Importance: Medium
 Status: New

** Affects: linux-ec2 (Ubuntu Precise)
 Importance: Medium
 Status: Invalid

** Affects: linux-fsl-imx51 (Ubuntu Precise)
 Importance: Medium
 Status: Invalid

** Affects: linux-lts-backport-maverick (Ubuntu Precise)
 Importance: Undecided
 Status: New

** Affects: linux-lts-backport-natty (Ubuntu Precise)
 Importance: Undecided
 Status: New

** Affects: linux-lts-quantal (Ubuntu Precise)
 Importance: Medium
 Status: New

** Affects: linux-lts-raring (Ubuntu Precise)
 Importance: Medium
 Status: New

** Affects: linux-lts-saucy (Ubuntu Precise)
 Importance: Medium
 Status: New

** Affects: linux-lts-trusty (Ubuntu Precise)
 Importance: Medium
 Status: New

** Affects: linux-lts-utopic (Ubuntu Precise)
 Importance: Medium
 Status: Invalid

** Affects: linux-mvl-dove (Ubuntu Precise)
 Importance: Medium
 Status: Invalid

** Affects: linux-ti-omap4 (Ubuntu Precise)
 Importance: Medium
 Status: New

** Affects: linux (Ubuntu Trusty)
 Importance: Medium
 Status: New

** Affects: linux-armadaxp (Ubuntu Trusty)
 Importance: Medium
 Status: Invalid

** Affects: linux-ec2 (Ubuntu Trusty)
 Importance: Medium
 Status: Invalid

** Affects: linux-fsl-imx51 (Ubuntu Trusty)
 Importance: Medium
 Status: Invalid

** Affects: linux-lts-backport-maverick (Ubuntu Trusty)
 Importance: Undecided
 Status: New

** Affects: linux-lts-backport-natty (Ubuntu Trusty)
 Importance: Undecided
 Status: New

** Affects: linux-lts-quantal (Ubuntu Trusty)
 Importance: Medium
 Status: Invalid

** Affects: linux-lts-raring (Ubuntu Trusty)
 Importance: Medium
 Status: Invalid

** Affects: linux-lts-saucy (Ubuntu Trusty)
 Importance: Medium
 Status: Invalid

** Affects: linux-lts-trusty (Ubuntu Trusty)
 Importance: Medium
 Status: Invalid

** Affects: linux-lts-utopic (Ubuntu Trusty)
 Importance: Medium
 Status: New

** Affects: linux-mvl-dove (Ubuntu Trusty)
 Importance: Medium
 Status: Invalid

** Affects: linux-ti-omap4 (Ubuntu Trusty)
 Importance: Medium
 Status: Invalid

** Affects: linux (Ubuntu Utopic)
 Importance: Medium

[Kernel-packages] [Bug 1409808] Re: CVE-2014-9584

2015-01-12 Thread John Johansen
CVE-2014-9584

** Also affects: linux (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Changed in: linux-lts-trusty (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-lts-trusty (Ubuntu Lucid)
   Status: New => Invalid

** Changed in: linux-lts-trusty (Ubuntu Vivid)
   Status: New => Invalid

** Changed in: linux-lts-trusty (Ubuntu Utopic)
   Status: New => Invalid

** Changed in: linux-armadaxp (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-armadaxp (Ubuntu Lucid)
   Status: New => Invalid

** Changed in: linux-armadaxp (Ubuntu Vivid)
   Status: New => Invalid

** Changed in: linux-armadaxp (Ubuntu Utopic)
   Status: New => Invalid

** Changed in: linux-lts-utopic (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-lts-utopic (Ubuntu Lucid)
   Status: New => Invalid

** Changed in: linux-lts-utopic (Ubuntu Vivid)
   Status: New => Invalid

** Changed in: linux-lts-utopic (Ubuntu Utopic)
   Status: New => Invalid

** Changed in: linux-ec2 (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-ec2 (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-ec2 (Ubuntu Vivid)
   Status: New => Invalid

** Changed in: linux-ec2 (Ubuntu Utopic)
   Status: New => Invalid

** Changed in: linux-lts-quantal (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-lts-quantal (Ubuntu Lucid)
   Status: New => Invalid

** Changed in: linux-lts-quantal (Ubuntu Vivid)
   Status: New => Invalid

** Changed in: linux-lts-quantal (Ubuntu Utopic)
   Status: New => Invalid

** Changed in: linux-mvl-dove (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-mvl-dove (Ubuntu Trusty)
   Status: New =>

[Kernel-packages] [Bug 1402822] Re: linux: 3.16.0-29.39 -proposed tracker

2015-01-12 Thread Brad Figg
** Description changed:

  This bug is for tracking the 3.16.0-29.39 upload package. This bug will
  contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Monday, 15. December 2014 20:29 UTC
  kernel-stable-Prepare-package-end:Tuesday, 16. December 2014 07:03 UTC
  kernel-stable-Promote-to-proposed-start:Tuesday, 16. December 2014 07:03 UTC
  ppa-package-testing-start:Tuesday, 16. December 2014 07:03 UTC
  kernel-stable-Promote-to-proposed-end:Wednesday, 17. December 2014 20:06 UTC
  kernel-stable-Verification-testing-start:Wednesday, 17. December 2014 22:00 
UTC
  kernel-stable-Certification-testing-start:Wednesday, 17. December 2014 22:00 
UTC
  kernel-stable-Security-signoff-start:Wednesday, 17. December 2014 22:00 UTC
  kernel-stable-Regression-testing-start:Wednesday, 17. December 2014 22:00 UTC
  kernel-stable-Security-signoff-end:Thursday, 18. December 2014 14:00 UTC
  kernel-stable-Certification-testing-end:Wednesday, 07. January 2015 16:00 UTC
  kernel-stable-Regression-testing-end:Friday, 09. January 2015 16:06 UTC
  kernel-stable-phase:CopyToUpdates
  kernel-stable-phase-changed:Friday, 09. January 2015 16:18 UTC
  kernel-stable-Promote-to-updates-start:Friday, 09. January 2015 16:18 UTC
+ kernel-stable-Promote-to-updates-end:Monday, 12. January 2015 17:02 UTC

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1402822

Title:
  linux: 3.16.0-29.39 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Fix Released
Status in Kernel SRU Workflow package-testing series:
  In Progress
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Fix Released
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Utopic:
  Fix Released

Bug description:
  This bug is for tracking the 3.16.0-29.39 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Monday, 15. December 2014 20:29 UTC
  kernel-stable-Prepare-package-end:Tuesday, 16. December 2014 07:03 UTC
  kernel-stable-Promote-to-proposed-start:Tuesday, 16. December 2014 07:03 UTC
  ppa-package-testing-start:Tuesday, 16. December 2014 07:03 UTC
  kernel-stable-Promote-to-proposed-end:Wednesday, 17. December 2014 20:06 UTC
  kernel-stable-Verification-testing-start:Wednesday, 17. December 2014 22:00 
UTC
  kernel-stable-Certification-testing-start:Wednesday, 17. December 2014 22:00 
UTC
  kernel-stable-Security-signoff-start:Wednesday, 17. December 2014 22:00 UTC
  kernel-stable-Regression-testing-start:Wednesday, 17. December 2014 22:00 UTC
  kernel-stable-Security-signoff-end:Thursday, 18. December 2014 14:00 UTC
  kernel-stable-Certification-testing-end:Wednesday, 07. January 2015 16:00 UTC
  kernel-stable-Regression-testing-end:Friday, 09. January 2015 16:06 UTC
  kernel-stable-phase:CopyToUpdates
  kernel-stable-phase-changed:Friday, 09. January 2015 16:18 UTC
  kernel-stable-Promote-to-updates-start:Friday, 09. January 2015 16:18 UTC
  kernel-stable-Promote-to-updates-end:Monday, 12. January 2015 17:02 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1402822/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1402822] Re: linux: 3.16.0-29.39 -proposed tracker

2015-01-12 Thread Chris J Arges
Promoted to updates:
 linux| 3.16.0-29.39  | utopic-security  | source
 linux| 3.16.0-29.39  | utopic-updates   | source
 linux-meta   | 3.16.0.29.30  | utopic-security  | source
 linux-meta   | 3.16.0.29.30  | utopic-updates   | source
 linux-signed | 3.16.0-29.39  | utopic-security  | source
 linux-signed | 3.16.0-29.39  | utopic-updates   | source

** Changed in: kernel-sru-workflow/promote-to-security
   Status: Confirmed => Fix Released

** Changed in: kernel-sru-workflow/promote-to-updates
   Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1402822

Title:
  linux: 3.16.0-29.39 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Fix Released
Status in Kernel SRU Workflow package-testing series:
  In Progress
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Fix Released
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Utopic:
  Fix Released

Bug description:
  This bug is for tracking the 3.16.0-29.39 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Monday, 15. December 2014 20:29 UTC
  kernel-stable-Prepare-package-end:Tuesday, 16. December 2014 07:03 UTC
  kernel-stable-Promote-to-proposed-start:Tuesday, 16. December 2014 07:03 UTC
  ppa-package-testing-start:Tuesday, 16. December 2014 07:03 UTC
  kernel-stable-Promote-to-proposed-end:Wednesday, 17. December 2014 20:06 UTC
  kernel-stable-Verification-testing-start:Wednesday, 17. December 2014 22:00 
UTC
  kernel-stable-Certification-testing-start:Wednesday, 17. December 2014 22:00 
UTC
  kernel-stable-Security-signoff-start:Wednesday, 17. December 2014 22:00 UTC
  kernel-stable-Regression-testing-start:Wednesday, 17. December 2014 22:00 UTC
  kernel-stable-Security-signoff-end:Thursday, 18. December 2014 14:00 UTC
  kernel-stable-Certification-testing-end:Wednesday, 07. January 2015 16:00 UTC
  kernel-stable-Regression-testing-end:Friday, 09. January 2015 16:06 UTC
  kernel-stable-phase:CopyToUpdates
  kernel-stable-phase-changed:Friday, 09. January 2015 16:18 UTC
  kernel-stable-Promote-to-updates-start:Friday, 09. January 2015 16:18 UTC
  kernel-stable-Promote-to-updates-end:Monday, 12. January 2015 17:02 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1402822/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1393317] Re: Intel 7265 [8086:095b] Wireless disconnect automatically

2015-01-12 Thread Adam Lee
** Changed in: linux (Ubuntu)
   Status: Fix Committed => Fix Released

** Changed in: hwe-next
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1393317

Title:
  Intel 7265 [8086:095b] Wireless disconnect automatically

Status in HWE Next Project:
  Fix Released
Status in linux package in Ubuntu:
  Fix Released
Status in linux-firmware package in Ubuntu:
  Fix Released
Status in linux source package in Trusty:
  Fix Released
Status in linux-firmware source package in Trusty:
  Fix Released
Status in linux source package in Utopic:
  Fix Released
Status in linux-firmware source package in Utopic:
  Fix Released

Bug description:
  SRU Justification:

  Impact: Intel's latest wireless adapter will disconnect automatically
  Fix: bump firmware API version to 9(the version 9 firmwares of 3160, 7260 and 
7265 were already in trusty, but need an upgrade from 23.214.9.0 to the latest 
25.222.9.0)
  Testcase: already tested with Intel 7265 [8086:095b] in OEM projects.

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1393317/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1346067] Re: [Dell Latitude E5440] O2 Card reader [1217:8520] could not be detected after rebooting this system

2015-01-12 Thread Adam Lee
** Changed in: hwe-next
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1346067

Title:
  [Dell Latitude E5440] O2 Card reader [1217:8520] could not be detected
  after rebooting this system

Status in HWE Next Project:
  Fix Released
Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Trusty:
  Fix Released
Status in linux source package in Utopic:
  Fix Released
Status in linux source package in Vivid:
  Fix Released

Bug description:
  SRU Justification:

  Impact: the card reader does not work on this system after rebooting.
  Fix: cherry pick a simple one line patch
  Testcase: already tested in OEM projects

  
  CID: 201307-14017 Dell Latitude E5440

  The O2 card reader, O2 Micro, Inc. SD/MMC Card Reader Controller [1217:8520] 
(rev 01)
  is not stable on this system, the card reader cannot be detected.
  It works normally after reboot, but will be gone if you reboot it one more 
time

  Steps:
  1. Install 14.04 + update (3.13.0-32), boot to desktop
  2. Run lspci -nn to see if the card reader is there
  3. Insert a SD card
  4. Reboot, go through step 2 and 3 again

  Expected result:
  * Card reader should be found in lspci output, SD card should be mounted 
automatically

  Actual result:
  * Nothing happened, the card was not detected at all
  * On step 4, the card reader works, if rebooted again, it will be gone.

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.13.0-32-generic 3.13.0-32.57
  ProcVersionSignature: Ubuntu 3.13.0-32.57-generic 3.13.11.4
  Uname: Linux 3.13.0-32-generic x86_64
  ApportVersion: 2.14.1-0ubuntu3.2
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  ubuntu 1398 F pulseaudio
   /dev/snd/controlC1:  ubuntu 1398 F pulseaudio
  CurrentDesktop: Unity
  Date: Mon Jul 21 04:07:31 2014
  HibernationDevice: RESUME=UUID=730e0474-ac0b-4fc6-a321-6203c9b07a19
  InstallationDate: Installed on 2014-07-21 (0 days ago)
  InstallationMedia: Ubuntu 14.04 LTS "Trusty Tahr" - Release amd64 (20140417)
  MachineType: Dell Inc. Latitude E5440
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-32-generic.efi.signed 
root=UUID=b55056b7-f859-4273-9793-12757a75c5ee ro quiet splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-3.13.0-32-generic N/A
   linux-backports-modules-3.13.0-32-generic  N/A
   linux-firmware 1.127.4
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 06/26/2014
  dmi.bios.vendor: Dell Inc.
  dmi.bios.version: A07
  dmi.board.name: 01348S
  dmi.board.vendor: Dell Inc.
  dmi.board.version: X02
  dmi.chassis.type: 9
  dmi.chassis.vendor: Dell Inc.
  dmi.modalias: 
dmi:bvnDellInc.:bvrA07:bd06/26/2014:svnDellInc.:pnLatitudeE5440:pvr01:rvnDellInc.:rn01348S:rvrX02:cvnDellInc.:ct9:cvr:
  dmi.product.name: Latitude E5440
  dmi.product.version: 01
  dmi.sys.vendor: Dell Inc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1346067/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1383589] Re: [Dell Vostro 3546] Wireless key does not work on 14.04

2015-01-12 Thread Adam Lee
** Changed in: hwe-next
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1383589

Title:
  [Dell Vostro 3546] Wireless key does not work on 14.04

Status in HWE Next Project:
  Fix Released
Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Trusty:
  Fix Released
Status in linux source package in Utopic:
  Fix Released

Bug description:
  SRU Justification:

  Impact: the wireless key does not work on this system.
  Fix: cherry pick a simple blacklist patch
  Testcase: already tested in OEM projects


  CID: 201404-14998 Dell Vostro 3546

  The wireless key does not work on this system.
  With wireless key press, keycode 240 could be captured by sudo showkey -k, 
but the scancode can't be detected with sudo showkey -s

  With xev:
  KeyPress event, serial 34, synthetic NO, window 0x3e1,
  root 0x9c, subw 0x0, time 9313601, (-66,498), root:(721,550),
  state 0x10, keycode 248 (keysym 0x0, NoSymbol), same_screen YES,
  XLookupString gives 0 bytes:
  XmbLookupString gives 0 bytes:
  XFilterEvent returns: False

  KeyRelease event, serial 34, synthetic NO, window 0x3e1,
  root 0x9c, subw 0x0, time 9313601, (-66,498), root:(721,550),
  state 0x10, keycode 248 (keysym 0x0, NoSymbol), same_screen YES,
  XLookupString gives 0 bytes:
  XFilterEvent returns: False

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.13.0-37-generic 3.13.0-37.64
  ProcVersionSignature: Ubuntu 3.13.0-37.64-generic 3.13.11.7
  Uname: Linux 3.13.0-37-generic x86_64
  ApportVersion: 2.14.1-0ubuntu3.5
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC1:  ubuntu 1822 F pulseaudio
   /dev/snd/controlC0:  ubuntu 1822 F pulseaudio
  CRDA:
   country TW:
    (2402 - 2472 @ 40), (3, 27)
    (5270 - 5330 @ 40), (3, 17), DFS
    (5735 - 5815 @ 40), (3, 30)
  CurrentDesktop: Unity
  Date: Tue Oct 21 02:35:48 2014
  HibernationDevice: RESUME=UUID=d93dea8f-2e64-47af-bd90-9671a077bc8f
  InstallationDate: Installed on 2014-10-21 (0 days ago)
  InstallationMedia: Ubuntu 14.04.1 LTS "Trusty Tahr" - Release amd64 
(20140722.2)
  MachineType: Dell Inc. Vostro 3546
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-37-generic.efi.signed 
root=UUID=8cb5999b-23f7-4b24-aa9f-e70e7645129f ro quiet splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-3.13.0-37-generic N/A
   linux-backports-modules-3.13.0-37-generic  N/A
   linux-firmware 1.127.7
  SourcePackage: linux
  StagingDrivers: rts5139
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 08/05/2014
  dmi.bios.vendor: Dell Inc.
  dmi.bios.version: A04
  dmi.board.name: 02R010
  dmi.board.vendor: Dell Inc.
  dmi.board.version: A04
  dmi.chassis.type: 8
  dmi.chassis.vendor: Dell Inc.
  dmi.chassis.version: Not Specified
  dmi.modalias: 
dmi:bvnDellInc.:bvrA04:bd08/05/2014:svnDellInc.:pnVostro3546:pvrNotSpecified:rvnDellInc.:rn02R010:rvrA04:cvnDellInc.:ct8:cvrNotSpecified:
  dmi.product.name: Vostro 3546
  dmi.product.version: Not Specified
  dmi.sys.vendor: Dell Inc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1383589/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1359052] Re: [HP Z1-G2] Realtek card reader [10ec:5249] does not work after suspended on this system

2015-01-12 Thread Adam Lee
** Changed in: hwe-next/vivid
   Status: Fix Committed => Fix Released

** Changed in: hwe-next/utopic
   Status: Fix Committed => Fix Released

** Changed in: hwe-next/trusty
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1359052

Title:
  [HP Z1-G2] Realtek card reader [10ec:5249] does not work after
  suspended on this system

Status in HWE Next Project:
  Fix Released
Status in HWE Next trusty series:
  Fix Released
Status in HWE Next utopic series:
  Fix Released
Status in HWE Next vivid series:
  Fix Released
Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Trusty:
  Fix Released
Status in linux source package in Utopic:
  Fix Released
Status in linux source package in Vivid:
  Fix Released

Bug description:
  SRU Justification:

  Impact: the card reader does not work on this system after s3.
  Fix: cherry pick a simple patchset only for the certain driver module.
  Testcase: already tested in OEM projects

  Before suspend
  [ 12.896116] rtsx_pci :03:00.0: irq 47 for MSI/MSI-X
  [ 12.896128] rtsx_pci :03:00.0: rtsx_pci_acquire_irq: pcr->msi_en = 1, 
pci->irq = 47
  After resume
  [ 89.354583] rtsx_pci :03:00.0: no hotplug settings from platform

  rmmod rtsx_pci
  modprobe rtsx_pci
  doesn't work

  Reboot
  [ 12.358093] rtsx_pci :03:00.0: irq 47 for MSI/MSI-X
  [ 12.358103] rtsx_pci :03:00.0: rtsx_pci_acquire_irq: pcr->msi_en = 1, 
pci->irq = 47
  [ 12.455971] rtsx_pci: probe of :03:00.0 failed with error -110

  Then driver cannot be loaded

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1359052/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1409794] [NEW] linux: 3.18.0-9.10 -proposed tracker

2015-01-12 Thread Leann Ogasawara
Public bug reported:

This bug is for tracking the 3.18.0-9.10 upload package. This bug will
contain status and testing results related to that upload.

For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-Prepare-package-start:Monday, 12. January 2015 16:51 UTC
kernel-phase-changed:Monday, 12. January 2015 16:51 UTC
kernel-phase:Prepare

** Affects: kernel-development-workflow
 Importance: Medium
 Status: In Progress

** Affects: kernel-development-workflow/package-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-development-workflow/prepare-package
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-development-workflow/prepare-package-meta
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-development-workflow/prepare-package-signed
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-development-workflow/promote-to-release
 Importance: Medium
 Assignee: Ubuntu Package Archive Administrators (ubuntu-archive)
 Status: New

** Affects: linux (Ubuntu)
 Importance: Medium
 Status: New

** Affects: linux (Ubuntu Vivid)
 Importance: Medium
 Status: New


** Tags: kernel-release-tracking-bug vivid

** Tags added: kernel-release-tracking-bug

** Also affects: linux (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Tags added: vivid

** Also affects: kernel-development-workflow/package-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-development-workflow/prepare-package
   Importance: Undecided
   Status: New

** Also affects: kernel-development-workflow/prepare-package-meta
   Importance: Undecided
   Status: New

** Also affects: kernel-development-workflow/prepare-package-signed
   Importance: Undecided
   Status: New

** Also affects: kernel-development-workflow/promote-to-release
   Importance: Undecided
   Status: New

** Changed in: kernel-development-workflow
   Status: New => In Progress

** Changed in: kernel-development-workflow
   Importance: Undecided => Medium

** Changed in: kernel-development-workflow/package-testing
   Importance: Undecided => Medium

** Changed in: kernel-development-workflow/package-testing
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-development-workflow/prepare-package
   Importance: Undecided => Medium

** Changed in: kernel-development-workflow/prepare-package
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-development-workflow/prepare-package-meta
   Importance: Undecided => Medium

** Changed in: kernel-development-workflow/prepare-package-meta
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-development-workflow/prepare-package-signed
   Importance: Undecided => Medium

** Changed in: kernel-development-workflow/prepare-package-signed
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-development-workflow/promote-to-release
   Importance: Undecided => Medium

** Changed in: kernel-development-workflow/promote-to-release
 Assignee: (unassigned) => Ubuntu Package Archive Administrators 
(ubuntu-archive)

** Changed in: linux (Ubuntu Vivid)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1409794

Title:
  linux: 3.18.0-9.10 -proposed tracker

Status in Kernel Development Workflow:
  In Progress
Status in Kernel Development Workflow package-testing series:
  New
Status in Kernel Development Workflow prepare-package series:
  New
Status in Kernel Development Workflow prepare-package-meta series:
  New
Status in Kernel Development Workflow prepare-package-signed series:
  New
Status in Kernel Development Workflow promote-to-release series:
  New
Status in linux package in Ubuntu:
  New
Status in linux source package in Vivid:
  New

Bug description:
  This bug is for tracking the 3.18.0-9.10 upload package. This bug will
  contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-Prepare-package-start:Monday, 12. January 2015 16:51 UTC
  kernel-phase-changed:Monday, 12. January 2015 16:51 UTC
  kernel-phase:Prepare

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-development-workflow/+bug/1409794/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kerne

[Kernel-packages] [Bug 1403240] Re: linux-armadaxp: 3.2.0-1643.62 -proposed tracker

2015-01-12 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-armadaxp - 3.2.0-1643.62

---
linux-armadaxp (3.2.0-1643.62) precise; urgency=low

  [ Ike Panhc ]

  * Release Tracking Bug
- LP: #1403240
  * Rebase to Ubuntu-3.2.0-75.110

  [ Ubuntu: 3.2.0-75.110 ]

  * Release Tracking Bug
- LP: #1403154
  * kvm: fix excessive pages un-pinning in kvm_iommu_map error path.
- LP: #1386395
- CVE-2014-8369
  * KVM: x86: Don't report guest userspace emulation error to userspace
- LP: #1392823
- CVE-2014-7842
  * drivers:scsi:storvsc: Fix a bug in handling ring buffer failures that
may result in I/O freeze
- LP: #1400289
  * net:socket: set msg_namelen to 0 if msg_name is passed as NULL in
msghdr struct from userland.
- LP: #1335478
 -- Ike PanhcWed, 17 Dec 2014 10:39:21 +0800

** Changed in: linux-armadaxp (Ubuntu Precise)
   Status: In Progress => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-7842

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-8369

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1403240

Title:
  linux-armadaxp: 3.2.0-1643.62 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow package-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Confirmed
Status in Kernel SRU Workflow promote-to-updates series:
  Confirmed
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow upload-to-ppa series:
  Invalid
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-armadaxp source package in Precise:
  Fix Released

Bug description:
  This bug is for tracking the 3.2.0-1643.62 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 16. December 2014 23:05 UTC
  kernel-stable-master-bug:1403154
  kernel-stable-Certification-testing-end:Wednesday, 17. December 2014 03:02 UTC
  kernel-stable-Security-signoff-end:Wednesday, 17. December 2014 03:02 UTC
  kernel-stable-Prepare-package-end:Wednesday, 17. December 2014 06:03 UTC
  kernel-stable-Promote-to-proposed-start:Wednesday, 17. December 2014 06:03 UTC
  ppa-package-testing-start:Wednesday, 17. December 2014 06:03 UTC
  kernel-stable-Promote-to-proposed-end:Wednesday, 17. December 2014 19:09 UTC
  kernel-stable-Verification-testing-start:Wednesday, 17. December 2014 21:01 
UTC
  kernel-stable-Regression-testing-start:Wednesday, 17. December 2014 21:01 UTC
  kernel-stable-Regression-testing-end:Thursday, 18. December 2014 05:02 UTC
  kernel-stable-phase:CopyToUpdates
  kernel-stable-phase-changed:Friday, 09. January 2015 16:20 UTC
  kernel-stable-Promote-to-updates-start:Friday, 09. January 2015 16:20 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1403240/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1335478] Re: A new instance of IBM Domino 'bindsock' cannot bind to ports <1024 Kernel 3.13.0-29 and above

2015-01-12 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-utopic -
3.16.0-29.39~14.04.1

---
linux-lts-utopic (3.16.0-29.39~14.04.1) trusty; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1402946

  [ AceLan Kao ]

  * SAUCE: Add use_native_backlight quirk for HP ProBook 6570b
- LP: #1359010

  [ Andy Whitcroft ]

  * Revert "SAUCE: (no-up) arm64: optimized copy_to_user and copy_from_user
assembly code"
- LP: #1398596
  * [Config] updateconfigs to balance CONFIG_SCOM_DEBUGFS

  [ Paolo Pisati ]

  * [Config] armhf: VIRTIO_[BALLOON|MMIO]=y

  [ Upstream Kernel Changes ]

  * Revert "arm64: Make default dma_ops to be noncoherent"
- LP: #1386490
  * Revert "percpu: free percpu allocation info for uniprocessor system"
- LP: #1401079
  * ath3k: Add support of MCI 13d3:3408 bt device
- LP: #1395465
  * x86: kvm: use alternatives for VMCALL vs. VMMCALL if kernel text is
read-only
- LP: #1379340
  * cpufreq: Allow stop CPU callback to be used by all cpufreq drivers
- LP: #1397928
  * cpufreq: powernv: Set the pstate of the last hotplugged out cpu in
policy->cpus to minimum
- LP: #1397928
  * cpufreq: powernv: Set the cpus to nominal frequency during reboot/kexec
- LP: #1397928
  * xen-netfront: Remove BUGs on paged skb data which crosses a page
boundary
- LP: #1275879
  * ACPI / blacklist: blacklist Win8 OSI for Dell Vostro 3546
- LP: #1383589
  * iwlwifi: add device / firmware to fw-error-dump file
- LP: #1399440
  * iwlwifi: rename iwl_mvm_fw_error_next_data
- LP: #1399440
  * iwlwifi: pcie: add firmware monitor capabilities
- LP: #1399440
  * iwlwifi: remove wrong comment about alignment in iwl-fw-error-dump.h
- LP: #1399440
  * iwlwifi: mvm: don't collect logs in the interrupt thread
- LP: #1399440
  * iwlwifi: mvm: kill iwl_mvm_fw_error_rxf_dump
- LP: #1399440
  * iwlwifi: mvm: update layout of firmware error dump
- LP: #1399440
  * powerpc/pseries: Fix endiannes issue in RTAS call from xmon
- LP: #1396235
  * mmc: sdhci-pci-o2micro: Fix Dell E5440 issue
- LP: #1346067
  * mfd: rtsx: Fix PM suspend for 5227 & 5249
- LP: #1359052
  * samsung-laptop: Add broken-acpi-video quirk for NC210/NC110
- LP: #1401079
  * acer-wmi: Add acpi_backlight=video quirk for the Acer KAV80
- LP: #1401079
  * pinctrl: baytrail: show output gpio state correctly on Intel Baytrail
- LP: #1401079
  * ALSA: hda - Add dock support for Thinkpad T440 (17aa:2212)
- LP: #1401079
  * ALSA: hda - Add ultra dock support for Thinkpad X240.
- LP: #1401079
  * rbd: Fix error recovery in rbd_obj_read_sync()
- LP: #1401079
  * ds3000: fix LNB supply voltage on Tevii S480 on initialization
- LP: #1401079
  * powerpc: do_notify_resume can be called with bad thread_info flags
argument
- LP: #1401079
  * powerpc/powernv: Properly fix LPC debugfs endianness
- LP: #1401079
  * irqchip: armada-370-xp: Fix MSI interrupt handling
- LP: #1401079
  * irqchip: armada-370-xp: Fix MPIC interrupt handling
- LP: #1401079
  * USB: kobil_sct: fix non-atomic allocation in write path
- LP: #1401079
  * USB: opticon: fix non-atomic allocation in write path
- LP: #1401079
  * regulator: max77693: Fix use of uninitialized regulator config
- LP: #1401079
  * USB: cdc-acm: add device id for GW Instek AFG-2225
- LP: #1401079
  * usb: Do not allow usb_alloc_streams on unconfigured devices
- LP: #1401079
  * usb-storage: handle a skipped data phase
- LP: #1401079
  * uas: Add US_FL_NO_ATA_1X quirk for 1 more Seagate model
- LP: #1401079
  * xhci: Disable streams on Asmedia 1042 xhci controllers
- LP: #1401079
  * uas: Add NO_ATA_1X for VIA VL711 devices
- LP: #1401079
  * USB: core: add device-qualifier quirk
- LP: #1401079
  * USB: quirks: enable device-qualifier quirk for Elan Touchscreen
- LP: #1401079
  * USB: quirks: enable device-qualifier quirk for another Elan touchscreen
- LP: #1401079
  * USB: quirks: enable device-qualifier quirk for yet another Elan
touchscreen
- LP: #1401079
  * xhci: no switching back on non-ULT Haswell
- LP: #1401079
  * uas: Add US_FL_NO_ATA_1X quirk for 2 more Seagate models
- LP: #1401079
  * of: Fix overflow bug in string property parsing functions
- LP: #1401079
  * spi: fsl-dspi: Fix CTAR selection
- LP: #1401079
  * Btrfs: fix kfree on list_head in btrfs_lookup_csums_range error cleanup
- LP: #1401079
  * ALSA: usb-audio: Fix device_del() sysfs warnings at disconnect
- LP: #1401079
  * iio: as3935: allocate correct iio_device size
- LP: #1401079
  * staging:iio:ade7758: Fix NULL pointer deref when enabling buffer
- LP: #1401079
  * staging:iio:ade7758: Fix check if channels are enabled in prenable
- LP: #1401079
  * staging:iio:ade7758: Remove "raw" from channel name
- LP: #1401079
  * USB: cdc-acm: only raise DTR on transitions from B0
- LP: #1401079
  * fix breakage in o2

[Kernel-packages] [Bug 1174169] Re: Minimum and maximum cpu frequency are equal

2015-01-12 Thread David Dchtoo
For anyone that might have this problem: I finally noticed what was lagging my 
PC, probably for ages. Duh.
This solved it - either the kernel boot parameter to disable the BIOS imposed 
limit as above, or what is noted down here:

http://blog.patshead.com/2013/04/my-bios-is-limiting-my-cpu-clock-
speed.html

(as root)
echo 1 > /sys/module/processor/parameters/ignore_ppc
(this will not persist)

It's on a Lenovo X220. My battery's in a poor shape + my charger cable
is (poorly) DIY fixed, which are probably connected.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1174169

Title:
  Minimum and maximum cpu frequency are equal

Status in linux package in Ubuntu:
  Invalid

Bug description:
  I just noticed my laptop stared working considerably slower. I am
  using an updated 13.04, though the issue did not start right after the
  upgrade. After tracking down the issue I noticed that both processors
  operate at 800 MHz instead of the maximum 1800 MHz. Irrespective of
  the load, the frequency remains 800. Here are some stats:

  
  $ cpufreq-info 
  cpufrequtils 008: cpufreq-info (C) Dominik Brodowski 2004-2009
  Report errors and bugs to cpuf...@vger.kernel.org, please.
  analyzing CPU 0:
driver: powernow-k8
CPUs which run at the same hardware frequency: 0 1
CPUs which need to have their frequency coordinated by software: 0 1
maximum transition latency: 109 us.
hardware limits: 800 MHz - 1.80 GHz
available frequency steps: 1.80 GHz, 1.60 GHz, 800 MHz
available cpufreq governors: conservative, ondemand, userspace, 
powersave, performance
current policy: frequency should be within 800 MHz and 800 MHz.
The governor "performance" may decide which speed to use
within this range.
current CPU frequency is 800 MHz.
cpufreq stats: 1.80 GHz:0.00%, 1.60 GHz:0.00%, 800 MHz:100.00%
  analyzing CPU 1:
driver: powernow-k8
CPUs which run at the same hardware frequency: 0 1
CPUs which need to have their frequency coordinated by software: 0 1
maximum transition latency: 109 us.
hardware limits: 800 MHz - 1.80 GHz
available frequency steps: 1.80 GHz, 1.60 GHz, 800 MHz
available cpufreq governors: conservative, ondemand, userspace, 
powersave, performance
current policy: frequency should be within 800 MHz and 800 MHz.
The governor "performance" may decide which speed to use
within this range.
current CPU frequency is 800 MHz.
cpufreq stats: 1.80 GHz:0.00%, 1.60 GHz:0.00%, 800 MHz:100.00%

  Note the "current policy" says the frequency is between 800 and 800
  irrespective of the hardware limits. The original governor was
  "ondemand", so I changed it to "performance" in order to see if that
  makes a difference which it didn't. No amount of invoking cpufreq-set
  or cpufreq-selector changes the frequency.

  Looking around, I noticed several people reported similar issues in
  the past though no favorable answer exists. Any help would be greatly
  appreciated.

  ProblemType: Bug
  DistroRelease: Ubuntu 13.04
  Package: linux-image-3.8.0-19-generic 3.8.0-19.29
  ProcVersionSignature: Ubuntu 3.8.0-19.29-generic 3.8.8
  Uname: Linux 3.8.0-19-generic x86_64
  NonfreeKernelModules: wl
  ApportVersion: 2.9.2-0ubuntu8
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  nasko  2398 F pulseaudio
  CurrentDmesg:
   [   39.683389] vboxdrv: fAsync=1 offMin=0x10104a4 offMax=0x10104a4
   [   39.683848] vboxdrv: TSC mode is 'asynchronous', kernel timer mode is 
'normal'.
   [   39.683860] vboxdrv: Successfully loaded version 4.2.10_Ubuntu (interface 
0x001a0004).
   [   39.985701] vboxpci: IOMMU not found (not registered)
   [   42.446439] init: plymouth-stop pre-start process (1891) terminated with 
status 1
  Date: Mon Apr 29 01:45:06 2013
  HibernationDevice: RESUME=UUID=f31bb83c-fcb0-4ec5-81cc-40fee0d3d80f
  InstallationDate: Installed on 2012-11-13 (166 days ago)
  InstallationMedia: Ubuntu 12.10 "Quantal Quetzal" - Release amd64 (20121017.5)
  MachineType: Dell Inc. Inspiron 1721
  MarkForUpload: True
  ProcEnviron:
   TERM=xterm
   PATH=(custom, no user)
   XDG_RUNTIME_DIR=
   LANG=en_US.UTF-8
   SHELL=/bin/bash
  ProcFB: 0 radeondrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.8.0-19-generic 
root=UUID=f649c2c6-c308-4d41-a92c-f75a3aac68de ro quiet splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-3.8.0-19-generic N/A
   linux-backports-modules-3.8.0-19-generic  N/A
   linux-firmware1.106
  SourcePackage: linux
  StagingDrivers: zram
  UpgradeStatus: Upgraded to raring on 2013-04-26 (3 days ago)
  dmi.bios.date: 05/16/2007
  dmi.bios.vendor: De

[Kernel-packages] [Bug 1335478] Re: A new instance of IBM Domino 'bindsock' cannot bind to ports <1024 Kernel 3.13.0-29 and above

2015-01-12 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-utopic -
3.16.0-29.39~14.04.1

---
linux-lts-utopic (3.16.0-29.39~14.04.1) trusty; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1402946

  [ AceLan Kao ]

  * SAUCE: Add use_native_backlight quirk for HP ProBook 6570b
- LP: #1359010

  [ Andy Whitcroft ]

  * Revert "SAUCE: (no-up) arm64: optimized copy_to_user and copy_from_user
assembly code"
- LP: #1398596
  * [Config] updateconfigs to balance CONFIG_SCOM_DEBUGFS

  [ Paolo Pisati ]

  * [Config] armhf: VIRTIO_[BALLOON|MMIO]=y

  [ Upstream Kernel Changes ]

  * Revert "arm64: Make default dma_ops to be noncoherent"
- LP: #1386490
  * Revert "percpu: free percpu allocation info for uniprocessor system"
- LP: #1401079
  * ath3k: Add support of MCI 13d3:3408 bt device
- LP: #1395465
  * x86: kvm: use alternatives for VMCALL vs. VMMCALL if kernel text is
read-only
- LP: #1379340
  * cpufreq: Allow stop CPU callback to be used by all cpufreq drivers
- LP: #1397928
  * cpufreq: powernv: Set the pstate of the last hotplugged out cpu in
policy->cpus to minimum
- LP: #1397928
  * cpufreq: powernv: Set the cpus to nominal frequency during reboot/kexec
- LP: #1397928
  * xen-netfront: Remove BUGs on paged skb data which crosses a page
boundary
- LP: #1275879
  * ACPI / blacklist: blacklist Win8 OSI for Dell Vostro 3546
- LP: #1383589
  * iwlwifi: add device / firmware to fw-error-dump file
- LP: #1399440
  * iwlwifi: rename iwl_mvm_fw_error_next_data
- LP: #1399440
  * iwlwifi: pcie: add firmware monitor capabilities
- LP: #1399440
  * iwlwifi: remove wrong comment about alignment in iwl-fw-error-dump.h
- LP: #1399440
  * iwlwifi: mvm: don't collect logs in the interrupt thread
- LP: #1399440
  * iwlwifi: mvm: kill iwl_mvm_fw_error_rxf_dump
- LP: #1399440
  * iwlwifi: mvm: update layout of firmware error dump
- LP: #1399440
  * powerpc/pseries: Fix endiannes issue in RTAS call from xmon
- LP: #1396235
  * mmc: sdhci-pci-o2micro: Fix Dell E5440 issue
- LP: #1346067
  * mfd: rtsx: Fix PM suspend for 5227 & 5249
- LP: #1359052
  * samsung-laptop: Add broken-acpi-video quirk for NC210/NC110
- LP: #1401079
  * acer-wmi: Add acpi_backlight=video quirk for the Acer KAV80
- LP: #1401079
  * pinctrl: baytrail: show output gpio state correctly on Intel Baytrail
- LP: #1401079
  * ALSA: hda - Add dock support for Thinkpad T440 (17aa:2212)
- LP: #1401079
  * ALSA: hda - Add ultra dock support for Thinkpad X240.
- LP: #1401079
  * rbd: Fix error recovery in rbd_obj_read_sync()
- LP: #1401079
  * ds3000: fix LNB supply voltage on Tevii S480 on initialization
- LP: #1401079
  * powerpc: do_notify_resume can be called with bad thread_info flags
argument
- LP: #1401079
  * powerpc/powernv: Properly fix LPC debugfs endianness
- LP: #1401079
  * irqchip: armada-370-xp: Fix MSI interrupt handling
- LP: #1401079
  * irqchip: armada-370-xp: Fix MPIC interrupt handling
- LP: #1401079
  * USB: kobil_sct: fix non-atomic allocation in write path
- LP: #1401079
  * USB: opticon: fix non-atomic allocation in write path
- LP: #1401079
  * regulator: max77693: Fix use of uninitialized regulator config
- LP: #1401079
  * USB: cdc-acm: add device id for GW Instek AFG-2225
- LP: #1401079
  * usb: Do not allow usb_alloc_streams on unconfigured devices
- LP: #1401079
  * usb-storage: handle a skipped data phase
- LP: #1401079
  * uas: Add US_FL_NO_ATA_1X quirk for 1 more Seagate model
- LP: #1401079
  * xhci: Disable streams on Asmedia 1042 xhci controllers
- LP: #1401079
  * uas: Add NO_ATA_1X for VIA VL711 devices
- LP: #1401079
  * USB: core: add device-qualifier quirk
- LP: #1401079
  * USB: quirks: enable device-qualifier quirk for Elan Touchscreen
- LP: #1401079
  * USB: quirks: enable device-qualifier quirk for another Elan touchscreen
- LP: #1401079
  * USB: quirks: enable device-qualifier quirk for yet another Elan
touchscreen
- LP: #1401079
  * xhci: no switching back on non-ULT Haswell
- LP: #1401079
  * uas: Add US_FL_NO_ATA_1X quirk for 2 more Seagate models
- LP: #1401079
  * of: Fix overflow bug in string property parsing functions
- LP: #1401079
  * spi: fsl-dspi: Fix CTAR selection
- LP: #1401079
  * Btrfs: fix kfree on list_head in btrfs_lookup_csums_range error cleanup
- LP: #1401079
  * ALSA: usb-audio: Fix device_del() sysfs warnings at disconnect
- LP: #1401079
  * iio: as3935: allocate correct iio_device size
- LP: #1401079
  * staging:iio:ade7758: Fix NULL pointer deref when enabling buffer
- LP: #1401079
  * staging:iio:ade7758: Fix check if channels are enabled in prenable
- LP: #1401079
  * staging:iio:ade7758: Remove "raw" from channel name
- LP: #1401079
  * USB: cdc-acm: only raise DTR on transitions from B0
- LP: #1401079
  * fix breakage in o2

[Kernel-packages] [Bug 1396383] Re: why signed kernels call update-grub?

2015-01-12 Thread Andy Whitcroft
** Changed in: linux (Ubuntu)
Milestone: ubuntu-15.01 => ubuntu-15.02

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1396383

Title:
  why signed kernels call update-grub?

Status in linux package in Ubuntu:
  In Progress

Bug description:
  Looking at the postrm of linux-signed-image-* it looks very different
  from linux-image-* ones

  $ cat linux-signed-image-3.16.0-20-generic.postrm 
  #!/bin/sh -e

  kernel='vmlinuz-3.16.0-20-generic'

  case "$0-$1" in
  *.postinst-configure)
rm -f /boot/$kernel.efi.signed
cp /boot/$kernel /boot/$kernel.efi.signed
sbattach --attach /usr/lib/linux/$kernel.efi.signature 
/boot/$kernel.efi.signed

if which update-grub >/dev/null 2>&1; then
update-grub || true
fi
;;
  *.postrm-remove)
rm -f /boot/$kernel.efi.signed

if which update-grub >/dev/null 2>&1; then
update-grub || true
fi
;;
  esac

  
  Why does it call update-grub direct instead of calling into /etc/kernel like 
the normal kernel packages do?

  In essence on amd64 the amount of calls to update-grub is duplicated
  on both installation and removal of kernel packages, since -signed
  version is installed by default. Why can't we just install signed
  version and make it modify kernel image in-place?

  ProblemType: Bug
  DistroRelease: Ubuntu 14.10
  Package: linux-signed-generic 3.16.0.25.26
  ProcVersionSignature: Ubuntu 3.16.0-25.33-generic 3.16.7
  Uname: Linux 3.16.0-25-generic x86_64
  ApportVersion: 2.14.7-0ubuntu8
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  xnox   4525 F pulseaudio
  CurrentDesktop: Unity
  Date: Tue Nov 25 23:08:41 2014
  HibernationDevice: RESUME=UUID=2bf263f1-753f-4b2e-92a6-b00381515e0c
  InstallationDate: Installed on 2012-01-12 (1048 days ago)
  InstallationMedia: Ubuntu 13.04 "Raring Ringtail" - Alpha amd64 (20130318)
  MachineType: Gigabyte Technology Co., Ltd. To be filled by O.E.M.
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.16.0-25-generic.efi.signed 
root=UUID=6669d411-80c3-41cc-a629-ad84e1ee6854 ro quiet splash nomdmonddf 
nomdmonisw crashkernel=384M-:128M nomdmonddf nomdmonisw crashkernel=384M-:128M 
nomdmonddf nomdmonisw crashkernel=384M-:128M nomdmonddf nomdmonisw 
crashkernel=384M-:128M nomdmonddf nomdmonisw crashkernel=384M-:128M nomdmonddf 
nomdmonisw crashkernel=384M-:128M nomdmonddf nomdmonisw crashkernel=384M-:128M 
nomdmonddf nomdmonisw crashkernel=384M-:128M vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-3.16.0-25-generic N/A
   linux-backports-modules-3.16.0-25-generic  N/A
   linux-firmware 1.138
  RfKill:
   
  SourcePackage: linux
  SystemImageInfo:
   current build number: 0
   device name: ?
   channel: daily
   last update: Unknown
  UpgradeStatus: No upgrade log present (probably fresh install)
  WifiSyslog:
   
  dmi.bios.date: 08/13/2013
  dmi.bios.vendor: American Megatrends Inc.
  dmi.bios.version: F18g
  dmi.board.asset.tag: To be filled by O.E.M.
  dmi.board.name: Z77X-D3H
  dmi.board.vendor: Gigabyte Technology Co., Ltd.
  dmi.board.version: x.x
  dmi.chassis.asset.tag: To Be Filled By O.E.M.
  dmi.chassis.type: 3
  dmi.chassis.vendor: Gigabyte Technology Co., Ltd.
  dmi.chassis.version: To Be Filled By O.E.M.
  dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvrF18g:bd08/13/2013:svnGigabyteTechnologyCo.,Ltd.:pnTobefilledbyO.E.M.:pvrTobefilledbyO.E.M.:rvnGigabyteTechnologyCo.,Ltd.:rnZ77X-D3H:rvrx.x:cvnGigabyteTechnologyCo.,Ltd.:ct3:cvrToBeFilledByO.E.M.:
  dmi.product.name: To be filled by O.E.M.
  dmi.product.version: To be filled by O.E.M.
  dmi.sys.vendor: Gigabyte Technology Co., Ltd.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1396383/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1335478] Re: A new instance of IBM Domino 'bindsock' cannot bind to ports <1024 Kernel 3.13.0-29 and above

2015-01-12 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-trusty -
3.13.0-44.73~precise1

---
linux-lts-trusty (3.13.0-44.73~precise1) precise; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1402952

  [ AceLan Kao ]

  * SAUCE: Add use_native_backlight quirk for HP ProBook 6570b
- LP: #1359010

  [ Andy Whitcroft ]

  * Revert "SAUCE: (no-up) arm64: optimized copy_to_user and copy_from_user
assembly code"
- LP: #1398596
  * [Config] updateconfigs to balance CONFIG_SCOM_DEBUGFS

  [ Upstream Kernel Changes ]

  * iwlwifi: mvm: fix merge damage
- LP: #1393317
  * iwlwifi: remove IWL_UCODE_TLV_FLAGS_SCHED_SCAN flag
- LP: #1393317
  * iwlwifi: mvm: disable scheduled scan to prevent firmware crash
- LP: #1393317
  * iwlwifi: mvm: enable scheduled scan on newest firmware
- LP: #1393317
  * x86: kvm: use alternatives for VMCALL vs. VMMCALL if kernel text is
read-only
- LP: #1379340
  * phylib: introduce PHY_INTERFACE_MODE_XGMII for 10G PHY
- LP: #1381084
  * of: make of_get_phy_mode parse 'phy-connection-type'
- LP: #1381084
  * xen-netfront: Remove BUGs on paged skb data which crosses a page
boundary
- LP: #1275879
  * ACPI / blacklist: blacklist Win8 OSI for Dell Vostro 3546
- LP: #1383589
  * powerpc/pseries: Fix endiannes issue in RTAS call from xmon
- LP: #1396235
  * mmc: sdhci-pci-o2micro: Fix Dell E5440 issue
- LP: #1346067
  * mfd: rtsx: Fix PM suspend for 5227 & 5249
- LP: #1359052
  * drivers:scsi:storvsc: Fix a bug in handling ring buffer failures that
may result in I/O freeze
- LP: #1400289
  * arm64: optimized copy_to_user and copy_from_user assembly code
- LP: #1400349
  * net:socket: set msg_namelen to 0 if msg_name is passed as NULL in
msghdr struct from userland.
- LP: #1335478
  * drm/radeon: initialize sadb to NULL in the audio code
- LP: #1402714
  * powerpc/vphn: NUMA node code expects big-endian
- LP: #1401150
  * ALSA: usb-audio: Fix device_del() sysfs warnings at disconnect
- LP: #1402853
  * ALSA: hda - Add mute LED pin quirk for HP 15 touchsmart
- LP: #1334950, #1402853
  * rcu: Make callers awaken grace-period kthread
- LP: #1402853
  * rcu: Use rcu_gp_kthread_wake() to wake up grace period kthreads
- LP: #1402853
  * net: sctp: fix NULL pointer dereference in af->from_addr_param on
malformed packet
- LP: #1402853
  * KVM: x86: Don't report guest userspace emulation error to userspace
- LP: #1402853
  * [media] ttusb-dec: buffer overflow in ioctl
- LP: #1402853
  * arm64: __clear_user: handle exceptions on strb
- LP: #1402853
  * ARM: pxa: fix hang on startup with DEBUG_LL
- LP: #1402853
  * samsung-laptop: Add broken-acpi-video quirk for NC210/NC110
- LP: #1402853
  * acer-wmi: Add Aspire 5741 to video_vendor_dmi_table
- LP: #1402853
  * acer-wmi: Add acpi_backlight=video quirk for the Acer KAV80
- LP: #1402853
  * rbd: Fix error recovery in rbd_obj_read_sync()
- LP: #1402853
  * [media] ds3000: fix LNB supply voltage on Tevii S480 on initialization
- LP: #1402853
  * powerpc: do_notify_resume can be called with bad thread_info flags
argument
- LP: #1402853
  * USB: kobil_sct: fix non-atomic allocation in write path
- LP: #1402853
  * USB: opticon: fix non-atomic allocation in write path
- LP: #1402853
  * regulator: max77693: Fix use of uninitialized regulator config
- LP: #1402853
  * USB: cdc-acm: add device id for GW Instek AFG-2225
- LP: #1402853
  * usb: Do not allow usb_alloc_streams on unconfigured devices
- LP: #1402853
  * usb-storage: handle a skipped data phase
- LP: #1402853
  * xhci: Switch only Intel Lynx Point-LP ports to EHCI on shutdown.
- LP: #1402853
  * xhci: no switching back on non-ULT Haswell
- LP: #1402853
  * of: Fix overflow bug in string property parsing functions
- LP: #1402853
  * spi: fsl-dspi: Fix CTAR selection
- LP: #1402853
  * Btrfs: fix kfree on list_head in btrfs_lookup_csums_range error cleanup
- LP: #1402853
  * staging:iio:ade7758: Fix NULL pointer deref when enabling buffer
- LP: #1402853
  * staging:iio:ade7758: Fix check if channels are enabled in prenable
- LP: #1402853
  * staging:iio:ade7758: Remove "raw" from channel name
- LP: #1402853
  * USB: cdc-acm: only raise DTR on transitions from B0
- LP: #1402853
  * serial: Fix divide-by-zero fault in uart_get_divisor()
- LP: #1402853
  * tty: Fix high cpu load if tty is unreleaseable
- LP: #1402853
  * tty: Prevent "read/write wait queue active!" log flooding
- LP: #1402853
  * tty/vt: don't set font mappings on vc not supporting this
- LP: #1402853
  * spi: pxa2xx: toggle clocks on suspend if not disabled by runtime PM
- LP: #1402853
  * sysfs: driver core: Fix glue dir race condition by gdp_mutex
- LP: #1402853
  * i2c: at91: don't account as iowait
- LP: #1402853
  * nfsd: don't try to reuse an expired DRC entry off the 

[Kernel-packages] [Bug 1401903] Re: [Hyper-V] FileCopy data loss after fcopy finish (X86 Only) Ubuntu 14.10

2015-01-12 Thread Andy Whitcroft
** Changed in: linux (Ubuntu Vivid)
   Status: Confirmed => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1401903

Title:
  [Hyper-V] FileCopy data loss after fcopy finish (X86 Only) Ubuntu
  14.10

Status in linux package in Ubuntu:
  Fix Committed
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux source package in Trusty:
  Invalid
Status in linux-lts-utopic source package in Trusty:
  Confirmed
Status in linux source package in Utopic:
  Confirmed
Status in linux-lts-utopic source package in Utopic:
  Invalid
Status in linux source package in Vivid:
  Fix Committed
Status in linux-lts-utopic source package in Vivid:
  Invalid

Bug description:
  Please include this patch for the bug detailed below.
  
https://git.kernel.org/cgit/linux/kernel/git/gregkh/char-misc.git/commit/?h=char-misc-next&id=31d4ea1a093fcf668d5f95af44b8d41488bdb7ec

  The hv_fcopy_daemon must also be recompiled with this header.

  Description of problem:
  after fcopy from the host to guest check it in guest,no data in the file

  Version-Release number of selected component (if applicable):
  Host: hyperv server 2012 R2
  Guest VM: Ubuntu 14.10 (final release)

  How reproducible:
  100%

  Steps to Reproduce:
  1.input data in Test.txt(host)
  2.install hypervfcopyd(guest)
  3.service hypervfcopyd start(guest)
  4.(host)C:\> Copy-VMFile "Test VM" -SourcePath "C:\Test.txt" -DestinationPath 
"/test" -CreateFullPath -FileSource Host(host)
  5.check data in test.txt what fcopyed from host(guest)

  Actual results:
  all the data is lost

  Expected results:
  the same with the original file

  Additional info:
  - x64 builds are not affected
  - this bug has been initially found and patched in a RHEL bug thread, details 
above are from it.

  
  ===
  break-fix: bc5a5b02331a3175a5fca20a4beba249e573b672 
31d4ea1a093fcf668d5f95af44b8d41488bdb7ec

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1401903/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1335478] Re: A new instance of IBM Domino 'bindsock' cannot bind to ports <1024 Kernel 3.13.0-29 and above

2015-01-12 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-trusty -
3.13.0-44.73~precise1

---
linux-lts-trusty (3.13.0-44.73~precise1) precise; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1402952

  [ AceLan Kao ]

  * SAUCE: Add use_native_backlight quirk for HP ProBook 6570b
- LP: #1359010

  [ Andy Whitcroft ]

  * Revert "SAUCE: (no-up) arm64: optimized copy_to_user and copy_from_user
assembly code"
- LP: #1398596
  * [Config] updateconfigs to balance CONFIG_SCOM_DEBUGFS

  [ Upstream Kernel Changes ]

  * iwlwifi: mvm: fix merge damage
- LP: #1393317
  * iwlwifi: remove IWL_UCODE_TLV_FLAGS_SCHED_SCAN flag
- LP: #1393317
  * iwlwifi: mvm: disable scheduled scan to prevent firmware crash
- LP: #1393317
  * iwlwifi: mvm: enable scheduled scan on newest firmware
- LP: #1393317
  * x86: kvm: use alternatives for VMCALL vs. VMMCALL if kernel text is
read-only
- LP: #1379340
  * phylib: introduce PHY_INTERFACE_MODE_XGMII for 10G PHY
- LP: #1381084
  * of: make of_get_phy_mode parse 'phy-connection-type'
- LP: #1381084
  * xen-netfront: Remove BUGs on paged skb data which crosses a page
boundary
- LP: #1275879
  * ACPI / blacklist: blacklist Win8 OSI for Dell Vostro 3546
- LP: #1383589
  * powerpc/pseries: Fix endiannes issue in RTAS call from xmon
- LP: #1396235
  * mmc: sdhci-pci-o2micro: Fix Dell E5440 issue
- LP: #1346067
  * mfd: rtsx: Fix PM suspend for 5227 & 5249
- LP: #1359052
  * drivers:scsi:storvsc: Fix a bug in handling ring buffer failures that
may result in I/O freeze
- LP: #1400289
  * arm64: optimized copy_to_user and copy_from_user assembly code
- LP: #1400349
  * net:socket: set msg_namelen to 0 if msg_name is passed as NULL in
msghdr struct from userland.
- LP: #1335478
  * drm/radeon: initialize sadb to NULL in the audio code
- LP: #1402714
  * powerpc/vphn: NUMA node code expects big-endian
- LP: #1401150
  * ALSA: usb-audio: Fix device_del() sysfs warnings at disconnect
- LP: #1402853
  * ALSA: hda - Add mute LED pin quirk for HP 15 touchsmart
- LP: #1334950, #1402853
  * rcu: Make callers awaken grace-period kthread
- LP: #1402853
  * rcu: Use rcu_gp_kthread_wake() to wake up grace period kthreads
- LP: #1402853
  * net: sctp: fix NULL pointer dereference in af->from_addr_param on
malformed packet
- LP: #1402853
  * KVM: x86: Don't report guest userspace emulation error to userspace
- LP: #1402853
  * [media] ttusb-dec: buffer overflow in ioctl
- LP: #1402853
  * arm64: __clear_user: handle exceptions on strb
- LP: #1402853
  * ARM: pxa: fix hang on startup with DEBUG_LL
- LP: #1402853
  * samsung-laptop: Add broken-acpi-video quirk for NC210/NC110
- LP: #1402853
  * acer-wmi: Add Aspire 5741 to video_vendor_dmi_table
- LP: #1402853
  * acer-wmi: Add acpi_backlight=video quirk for the Acer KAV80
- LP: #1402853
  * rbd: Fix error recovery in rbd_obj_read_sync()
- LP: #1402853
  * [media] ds3000: fix LNB supply voltage on Tevii S480 on initialization
- LP: #1402853
  * powerpc: do_notify_resume can be called with bad thread_info flags
argument
- LP: #1402853
  * USB: kobil_sct: fix non-atomic allocation in write path
- LP: #1402853
  * USB: opticon: fix non-atomic allocation in write path
- LP: #1402853
  * regulator: max77693: Fix use of uninitialized regulator config
- LP: #1402853
  * USB: cdc-acm: add device id for GW Instek AFG-2225
- LP: #1402853
  * usb: Do not allow usb_alloc_streams on unconfigured devices
- LP: #1402853
  * usb-storage: handle a skipped data phase
- LP: #1402853
  * xhci: Switch only Intel Lynx Point-LP ports to EHCI on shutdown.
- LP: #1402853
  * xhci: no switching back on non-ULT Haswell
- LP: #1402853
  * of: Fix overflow bug in string property parsing functions
- LP: #1402853
  * spi: fsl-dspi: Fix CTAR selection
- LP: #1402853
  * Btrfs: fix kfree on list_head in btrfs_lookup_csums_range error cleanup
- LP: #1402853
  * staging:iio:ade7758: Fix NULL pointer deref when enabling buffer
- LP: #1402853
  * staging:iio:ade7758: Fix check if channels are enabled in prenable
- LP: #1402853
  * staging:iio:ade7758: Remove "raw" from channel name
- LP: #1402853
  * USB: cdc-acm: only raise DTR on transitions from B0
- LP: #1402853
  * serial: Fix divide-by-zero fault in uart_get_divisor()
- LP: #1402853
  * tty: Fix high cpu load if tty is unreleaseable
- LP: #1402853
  * tty: Prevent "read/write wait queue active!" log flooding
- LP: #1402853
  * tty/vt: don't set font mappings on vc not supporting this
- LP: #1402853
  * spi: pxa2xx: toggle clocks on suspend if not disabled by runtime PM
- LP: #1402853
  * sysfs: driver core: Fix glue dir race condition by gdp_mutex
- LP: #1402853
  * i2c: at91: don't account as iowait
- LP: #1402853
  * nfsd: don't try to reuse an expired DRC entry off the 

[Kernel-packages] [Bug 1402764] Re: WARNING: CPU: 1 PID: 4940 at /build/buildd/linux-3.13.0/mm/truncate.c:652 pagecache_isize_extended+0xfd/0x110() in 3.13.0-43-generic

2015-01-12 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-trusty -
3.13.0-44.73~precise1

---
linux-lts-trusty (3.13.0-44.73~precise1) precise; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1402952

  [ AceLan Kao ]

  * SAUCE: Add use_native_backlight quirk for HP ProBook 6570b
- LP: #1359010

  [ Andy Whitcroft ]

  * Revert "SAUCE: (no-up) arm64: optimized copy_to_user and copy_from_user
assembly code"
- LP: #1398596
  * [Config] updateconfigs to balance CONFIG_SCOM_DEBUGFS

  [ Upstream Kernel Changes ]

  * iwlwifi: mvm: fix merge damage
- LP: #1393317
  * iwlwifi: remove IWL_UCODE_TLV_FLAGS_SCHED_SCAN flag
- LP: #1393317
  * iwlwifi: mvm: disable scheduled scan to prevent firmware crash
- LP: #1393317
  * iwlwifi: mvm: enable scheduled scan on newest firmware
- LP: #1393317
  * x86: kvm: use alternatives for VMCALL vs. VMMCALL if kernel text is
read-only
- LP: #1379340
  * phylib: introduce PHY_INTERFACE_MODE_XGMII for 10G PHY
- LP: #1381084
  * of: make of_get_phy_mode parse 'phy-connection-type'
- LP: #1381084
  * xen-netfront: Remove BUGs on paged skb data which crosses a page
boundary
- LP: #1275879
  * ACPI / blacklist: blacklist Win8 OSI for Dell Vostro 3546
- LP: #1383589
  * powerpc/pseries: Fix endiannes issue in RTAS call from xmon
- LP: #1396235
  * mmc: sdhci-pci-o2micro: Fix Dell E5440 issue
- LP: #1346067
  * mfd: rtsx: Fix PM suspend for 5227 & 5249
- LP: #1359052
  * drivers:scsi:storvsc: Fix a bug in handling ring buffer failures that
may result in I/O freeze
- LP: #1400289
  * arm64: optimized copy_to_user and copy_from_user assembly code
- LP: #1400349
  * net:socket: set msg_namelen to 0 if msg_name is passed as NULL in
msghdr struct from userland.
- LP: #1335478
  * drm/radeon: initialize sadb to NULL in the audio code
- LP: #1402714
  * powerpc/vphn: NUMA node code expects big-endian
- LP: #1401150
  * ALSA: usb-audio: Fix device_del() sysfs warnings at disconnect
- LP: #1402853
  * ALSA: hda - Add mute LED pin quirk for HP 15 touchsmart
- LP: #1334950, #1402853
  * rcu: Make callers awaken grace-period kthread
- LP: #1402853
  * rcu: Use rcu_gp_kthread_wake() to wake up grace period kthreads
- LP: #1402853
  * net: sctp: fix NULL pointer dereference in af->from_addr_param on
malformed packet
- LP: #1402853
  * KVM: x86: Don't report guest userspace emulation error to userspace
- LP: #1402853
  * [media] ttusb-dec: buffer overflow in ioctl
- LP: #1402853
  * arm64: __clear_user: handle exceptions on strb
- LP: #1402853
  * ARM: pxa: fix hang on startup with DEBUG_LL
- LP: #1402853
  * samsung-laptop: Add broken-acpi-video quirk for NC210/NC110
- LP: #1402853
  * acer-wmi: Add Aspire 5741 to video_vendor_dmi_table
- LP: #1402853
  * acer-wmi: Add acpi_backlight=video quirk for the Acer KAV80
- LP: #1402853
  * rbd: Fix error recovery in rbd_obj_read_sync()
- LP: #1402853
  * [media] ds3000: fix LNB supply voltage on Tevii S480 on initialization
- LP: #1402853
  * powerpc: do_notify_resume can be called with bad thread_info flags
argument
- LP: #1402853
  * USB: kobil_sct: fix non-atomic allocation in write path
- LP: #1402853
  * USB: opticon: fix non-atomic allocation in write path
- LP: #1402853
  * regulator: max77693: Fix use of uninitialized regulator config
- LP: #1402853
  * USB: cdc-acm: add device id for GW Instek AFG-2225
- LP: #1402853
  * usb: Do not allow usb_alloc_streams on unconfigured devices
- LP: #1402853
  * usb-storage: handle a skipped data phase
- LP: #1402853
  * xhci: Switch only Intel Lynx Point-LP ports to EHCI on shutdown.
- LP: #1402853
  * xhci: no switching back on non-ULT Haswell
- LP: #1402853
  * of: Fix overflow bug in string property parsing functions
- LP: #1402853
  * spi: fsl-dspi: Fix CTAR selection
- LP: #1402853
  * Btrfs: fix kfree on list_head in btrfs_lookup_csums_range error cleanup
- LP: #1402853
  * staging:iio:ade7758: Fix NULL pointer deref when enabling buffer
- LP: #1402853
  * staging:iio:ade7758: Fix check if channels are enabled in prenable
- LP: #1402853
  * staging:iio:ade7758: Remove "raw" from channel name
- LP: #1402853
  * USB: cdc-acm: only raise DTR on transitions from B0
- LP: #1402853
  * serial: Fix divide-by-zero fault in uart_get_divisor()
- LP: #1402853
  * tty: Fix high cpu load if tty is unreleaseable
- LP: #1402853
  * tty: Prevent "read/write wait queue active!" log flooding
- LP: #1402853
  * tty/vt: don't set font mappings on vc not supporting this
- LP: #1402853
  * spi: pxa2xx: toggle clocks on suspend if not disabled by runtime PM
- LP: #1402853
  * sysfs: driver core: Fix glue dir race condition by gdp_mutex
- LP: #1402853
  * i2c: at91: don't account as iowait
- LP: #1402853
  * nfsd: don't try to reuse an expired DRC entry off the 

[Kernel-packages] [Bug 1403239] Re: linux-ti-omap4: 3.2.0-1458.78 -proposed tracker

2015-01-12 Thread Chris J Arges
** Changed in: kernel-sru-workflow/promote-to-security
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Chris J Arges 
(arges)

** Changed in: kernel-sru-workflow/promote-to-updates
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Chris J Arges 
(arges)

** Changed in: kernel-sru-workflow/promote-to-security
 Assignee: Chris J Arges (arges) => (unassigned)

** Changed in: kernel-sru-workflow/regression-testing
 Assignee: Canonical Platform QA Team (canonical-platform-qa) => 
(unassigned)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-ti-omap4 in Ubuntu.
https://bugs.launchpad.net/bugs/1403239

Title:
  linux-ti-omap4: 3.2.0-1458.78 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow package-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Confirmed
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow upload-to-ppa series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  New

Bug description:
  This bug is for tracking the 3.2.0-1458.78 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 16. December 2014 23:03 UTC
  kernel-stable-master-bug:1403154
  kernel-stable-Certification-testing-end:Thursday, 18. December 2014 12:02 UTC
  kernel-stable-Prepare-package-end:Thursday, 18. December 2014 16:02 UTC
  kernel-stable-Promote-to-proposed-start:Thursday, 18. December 2014 16:02 UTC
  ppa-package-testing-start:Thursday, 18. December 2014 16:02 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 18. December 2014 22:02 UTC
  kernel-stable-Security-signoff-start:Friday, 19. December 2014 00:03 UTC
  kernel-stable-Verification-testing-start:Friday, 19. December 2014 00:02 UTC
  kernel-stable-Regression-testing-start:Friday, 19. December 2014 00:03 UTC
  kernel-stable-phase:Testing
  kernel-stable-phase-changed:Friday, 19. December 2014 12:01 UTC
  kernel-stable-Verification-testing-end:Friday, 19. December 2014 12:01 UTC
  kernel-stable-Security-signoff-end:Friday, 19. December 2014 14:01 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1403239/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1409582] Re: Touch screen and touch pad not working

2015-01-12 Thread Joseph Salisbury
Did this issue start happening after an update/upgrade?  Was there a
prior kernel version where you were not having this particular problem?

Would it be possible for you to test the latest upstream kernel? Refer
to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest
v3.19 kernel[0].

If this bug is fixed in the mainline kernel, please add the following
tag 'kernel-fixed-upstream'.

If the mainline kernel does not fix this bug, please add the tag:
'kernel-bug-exists-upstream'.

If you are unable to test the mainline kernel, for example it will not boot, 
please add the tag: 'kernel-unable-to-test-upstream'.
Once testing of the upstream kernel is complete, please mark this bug as 
"Confirmed".


Thanks in advance.

[0] http://kernel.ubuntu.com/~kernel-ppa/mainline/v3.19-rc4-vivid/

** Changed in: linux (Ubuntu)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu)
   Status: Confirmed => Incomplete

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1409582

Title:
  Touch screen and touch pad not working

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  in a Lenovo Yoga 3 Pro

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.13.0-43-generic 3.13.0-43.72
  ProcVersionSignature: Ubuntu 3.13.0-43.72-generic 3.13.11.11
  Uname: Linux 3.13.0-43-generic x86_64
  NonfreeKernelModules: wl
  ApportVersion: 2.14.1-0ubuntu3.6
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  lividium   1772 F pulseaudio
   /dev/snd/controlC1:  lividium   1772 F pulseaudio
  CurrentDesktop: Unity
  Date: Sun Jan 11 21:02:07 2015
  HibernationDevice: RESUME=UUID=d4dd0015-38ca-4d6b-9c29-9c3f3f0271c9
  InstallationDate: Installed on 2015-01-06 (5 days ago)
  InstallationMedia: Ubuntu 14.04.1 LTS "Trusty Tahr" - Release amd64 
(20140722.2)
  MachineType: LENOVO 80HE
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-43-generic 
root=UUID=2fd25d46-3932-4d2d-9bff-18bb5e732c4b ro quiet splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-3.13.0-43-generic N/A
   linux-backports-modules-3.13.0-43-generic  N/A
   linux-firmware 1.127.11
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  WifiSyslog:
   
  dmi.bios.date: 09/30/2014
  dmi.bios.vendor: LENOVO
  dmi.bios.version: A6CN38WW
  dmi.board.asset.tag: NO Asset Tag
  dmi.board.name: VIUU4
  dmi.board.vendor: LENOVO
  dmi.board.version: 31900058 WIN
  dmi.chassis.asset.tag: NO Asset Tag
  dmi.chassis.type: 10
  dmi.chassis.vendor: LENOVO
  dmi.chassis.version: Lenovo YOGA 3 Pro-1370
  dmi.modalias: 
dmi:bvnLENOVO:bvrA6CN38WW:bd09/30/2014:svnLENOVO:pn80HE:pvrLenovoYOGA3Pro-1370:rvnLENOVO:rnVIUU4:rvr31900058WIN:cvnLENOVO:ct10:cvrLenovoYOGA3Pro-1370:
  dmi.product.name: 80HE
  dmi.product.version: Lenovo YOGA 3 Pro-1370
  dmi.sys.vendor: LENOVO

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1409582/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1409444] Re: Laptop froze when power cord was pulled out accidentally during resume from sleep

2015-01-12 Thread Joseph Salisbury
Would it be possible for you to test the latest upstream kernel? Refer to 
https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest v3.19 
kernel[0].

If this bug is fixed in the mainline kernel, please add the following
tag 'kernel-fixed-upstream'.

If the mainline kernel does not fix this bug, please add the tag:
'kernel-bug-exists-upstream'.

If you are unable to test the mainline kernel, for example it will not boot, 
please add the tag: 'kernel-unable-to-test-upstream'.
Once testing of the upstream kernel is complete, please mark this bug as 
"Confirmed".


Thanks in advance.

[0] http://kernel.ubuntu.com/~kernel-ppa/mainline/v3.19-rc4-vivid/


** Changed in: linux (Ubuntu)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu)
   Status: Confirmed => Incomplete

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1409444

Title:
  Laptop froze when power cord was pulled out accidentally during resume
  from sleep

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  The title says it all: Laptop froze when power cord was pulled out
  accidentally during resume from sleep.

  The screen was black with the mouse pointer in it. control+alt+F2 or
  other attempts to get to a TTY did not work.

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.13.0-43-generic 3.13.0-43.72
  ProcVersionSignature: Ubuntu 3.13.0-43.72-generic 3.13.11.11
  Uname: Linux 3.13.0-43-generic x86_64
  NonfreeKernelModules: wl
  ApportVersion: 2.14.1-0ubuntu3.6
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  albert 2025 F pulseaudio
   /dev/snd/controlC1:  albert 2025 F pulseaudio
  CurrentDesktop: Unity
  Date: Sun Jan 11 08:20:24 2015
  EcryptfsInUse: Yes
  InstallationDate: Installed on 2014-09-16 (117 days ago)
  InstallationMedia: Ubuntu 14.04.1 LTS "Trusty Tahr" - Release amd64 
(20140722.2)
  MachineType: Apple Inc. MacBookPro11,1
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-43-generic 
root=UUID=1fe82ec9-9c83-4e33-9506-2f7afb8d9d64 ro libata.force=noncq quiet 
splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-3.13.0-43-generic N/A
   linux-backports-modules-3.13.0-43-generic  N/A
   linux-firmware 1.127.11
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 02/12/2014
  dmi.bios.vendor: Apple Inc.
  dmi.bios.version: MBP111.88Z.0138.B07.1402121134
  dmi.board.asset.tag: Base Board Asset Tag#
  dmi.board.name: Mac-189A3D4F975D5FFC
  dmi.board.vendor: Apple Inc.
  dmi.board.version: MacBookPro11,1
  dmi.chassis.type: 10
  dmi.chassis.vendor: Apple Inc.
  dmi.chassis.version: Mac-189A3D4F975D5FFC
  dmi.modalias: 
dmi:bvnAppleInc.:bvrMBP111.88Z.0138.B07.1402121134:bd02/12/2014:svnAppleInc.:pnMacBookPro11,1:pvr1.0:rvnAppleInc.:rnMac-189A3D4F975D5FFC:rvrMacBookPro11,1:cvnAppleInc.:ct10:cvrMac-189A3D4F975D5FFC:
  dmi.product.name: MacBookPro11,1
  dmi.product.version: 1.0
  dmi.sys.vendor: Apple Inc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1409444/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1386395] Re: CVE-2014-8369

2015-01-12 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-armadaxp - 3.2.0-1643.62

---
linux-armadaxp (3.2.0-1643.62) precise; urgency=low

  [ Ike Panhc ]

  * Release Tracking Bug
- LP: #1403240
  * Rebase to Ubuntu-3.2.0-75.110

  [ Ubuntu: 3.2.0-75.110 ]

  * Release Tracking Bug
- LP: #1403154
  * kvm: fix excessive pages un-pinning in kvm_iommu_map error path.
- LP: #1386395
- CVE-2014-8369
  * KVM: x86: Don't report guest userspace emulation error to userspace
- LP: #1392823
- CVE-2014-7842
  * drivers:scsi:storvsc: Fix a bug in handling ring buffer failures that
may result in I/O freeze
- LP: #1400289
  * net:socket: set msg_namelen to 0 if msg_name is passed as NULL in
msghdr struct from userland.
- LP: #1335478
 -- Ike PanhcWed, 17 Dec 2014 10:39:21 +0800

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1386395

Title:
  CVE-2014-8369

Status in linux package in Ubuntu:
  Fix Committed
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-ec2 package in Ubuntu:
  Invalid
Status in linux-fsl-imx51 package in Ubuntu:
  Invalid
Status in linux-lts-backport-maverick package in Ubuntu:
  New
Status in linux-lts-backport-natty package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-mvl-dove package in Ubuntu:
  Invalid
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Invalid
Status in linux-armadaxp source package in Lucid:
  Invalid
Status in linux-ec2 source package in Lucid:
  Invalid
Status in linux-fsl-imx51 source package in Lucid:
  Invalid
Status in linux-lts-backport-maverick source package in Lucid:
  New
Status in linux-lts-backport-natty source package in Lucid:
  New
Status in linux-lts-quantal source package in Lucid:
  Invalid
Status in linux-lts-raring source package in Lucid:
  Invalid
Status in linux-lts-saucy source package in Lucid:
  Invalid
Status in linux-lts-trusty source package in Lucid:
  Invalid
Status in linux-lts-utopic source package in Lucid:
  Invalid
Status in linux-mvl-dove source package in Lucid:
  Invalid
Status in linux-ti-omap4 source package in Lucid:
  Invalid
Status in linux source package in Precise:
  Fix Released
Status in linux-armadaxp source package in Precise:
  Fix Released
Status in linux-ec2 source package in Precise:
  Invalid
Status in linux-fsl-imx51 source package in Precise:
  Invalid
Status in linux-lts-backport-maverick source package in Precise:
  New
Status in linux-lts-backport-natty source package in Precise:
  New
Status in linux-lts-quantal source package in Precise:
  Fix Committed
Status in linux-lts-raring source package in Precise:
  Invalid
Status in linux-lts-saucy source package in Precise:
  Fix Committed
Status in linux-lts-trusty source package in Precise:
  Fix Released
Status in linux-lts-utopic source package in Precise:
  Invalid
Status in linux-mvl-dove source package in Precise:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  Fix Committed
Status in linux source package in Trusty:
  Fix Released
Status in linux-armadaxp source package in Trusty:
  Invalid
Status in linux-ec2 source package in Trusty:
  Invalid
Status in linux-fsl-imx51 source package in Trusty:
  Invalid
Status in linux-lts-backport-maverick source package in Trusty:
  New
Status in linux-lts-backport-natty source package in Trusty:
  New
Status in linux-lts-quantal source package in Trusty:
  Invalid
Status in linux-lts-raring source package in Trusty:
  Invalid
Status in linux-lts-saucy source package in Trusty:
  Invalid
Status in linux-lts-trusty source package in Trusty:
  Invalid
Status in linux-lts-utopic source package in Trusty:
  Fix Released
Status in linux-mvl-dove source package in Trusty:
  Invalid
Status in linux-ti-omap4 source package in Trusty:
  Invalid
Status in linux source package in Utopic:
  Fix Released
Status in linux-armadaxp source package in Utopic:
  Invalid
Status in linux-ec2 source package in Utopic:
  Invalid
Status in linux-fsl-imx51 source package in Utopic:
  Invalid
Status in linux-lts-backport-maverick source package in Utopic:
  New
Status in linux-lts-backport-natty source package in Utopic:
  New
Status in linux-lts-quantal source package in Utopic:
  Invalid
Status in linux-lts-raring source package in Utopic:
  Invalid
Status in linux-lts-saucy source package in Utopic:
  Invalid
Status in linux-lts-trusty source package in Utopic:
  Invalid
Status in linux-lts-utopic source package in Utopic:
  Invalid
Status in linux-mvl-dove source package in Utopic:
  Invalid
Status in linux-ti-omap4 source package in Utopic:
  Inval

[Kernel-packages] [Bug 1392823] Re: CVE-2014-7842

2015-01-12 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-armadaxp - 3.2.0-1643.62

---
linux-armadaxp (3.2.0-1643.62) precise; urgency=low

  [ Ike Panhc ]

  * Release Tracking Bug
- LP: #1403240
  * Rebase to Ubuntu-3.2.0-75.110

  [ Ubuntu: 3.2.0-75.110 ]

  * Release Tracking Bug
- LP: #1403154
  * kvm: fix excessive pages un-pinning in kvm_iommu_map error path.
- LP: #1386395
- CVE-2014-8369
  * KVM: x86: Don't report guest userspace emulation error to userspace
- LP: #1392823
- CVE-2014-7842
  * drivers:scsi:storvsc: Fix a bug in handling ring buffer failures that
may result in I/O freeze
- LP: #1400289
  * net:socket: set msg_namelen to 0 if msg_name is passed as NULL in
msghdr struct from userland.
- LP: #1335478
 -- Ike PanhcWed, 17 Dec 2014 10:39:21 +0800

** Changed in: linux-armadaxp (Ubuntu Precise)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1392823

Title:
  CVE-2014-7842

Status in linux package in Ubuntu:
  Fix Committed
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-ec2 package in Ubuntu:
  Invalid
Status in linux-fsl-imx51 package in Ubuntu:
  Invalid
Status in linux-lts-backport-maverick package in Ubuntu:
  New
Status in linux-lts-backport-natty package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-mvl-dove package in Ubuntu:
  Invalid
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Invalid
Status in linux-armadaxp source package in Lucid:
  Invalid
Status in linux-ec2 source package in Lucid:
  Invalid
Status in linux-fsl-imx51 source package in Lucid:
  Invalid
Status in linux-lts-backport-maverick source package in Lucid:
  New
Status in linux-lts-backport-natty source package in Lucid:
  New
Status in linux-lts-quantal source package in Lucid:
  Invalid
Status in linux-lts-raring source package in Lucid:
  Invalid
Status in linux-lts-saucy source package in Lucid:
  Invalid
Status in linux-lts-trusty source package in Lucid:
  Invalid
Status in linux-lts-utopic source package in Lucid:
  Invalid
Status in linux-mvl-dove source package in Lucid:
  Invalid
Status in linux-ti-omap4 source package in Lucid:
  Invalid
Status in linux source package in Precise:
  Fix Released
Status in linux-armadaxp source package in Precise:
  Fix Released
Status in linux-ec2 source package in Precise:
  Invalid
Status in linux-fsl-imx51 source package in Precise:
  Invalid
Status in linux-lts-backport-maverick source package in Precise:
  New
Status in linux-lts-backport-natty source package in Precise:
  New
Status in linux-lts-quantal source package in Precise:
  Fix Committed
Status in linux-lts-raring source package in Precise:
  Invalid
Status in linux-lts-saucy source package in Precise:
  Fix Committed
Status in linux-lts-trusty source package in Precise:
  Fix Committed
Status in linux-lts-utopic source package in Precise:
  Invalid
Status in linux-mvl-dove source package in Precise:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  Fix Committed
Status in linux source package in Trusty:
  Fix Committed
Status in linux-armadaxp source package in Trusty:
  Invalid
Status in linux-ec2 source package in Trusty:
  Invalid
Status in linux-fsl-imx51 source package in Trusty:
  Invalid
Status in linux-lts-backport-maverick source package in Trusty:
  New
Status in linux-lts-backport-natty source package in Trusty:
  New
Status in linux-lts-quantal source package in Trusty:
  Invalid
Status in linux-lts-raring source package in Trusty:
  Invalid
Status in linux-lts-saucy source package in Trusty:
  Invalid
Status in linux-lts-trusty source package in Trusty:
  Invalid
Status in linux-lts-utopic source package in Trusty:
  Fix Committed
Status in linux-mvl-dove source package in Trusty:
  Invalid
Status in linux-ti-omap4 source package in Trusty:
  Invalid
Status in linux source package in Utopic:
  Fix Committed
Status in linux-armadaxp source package in Utopic:
  Invalid
Status in linux-ec2 source package in Utopic:
  Invalid
Status in linux-fsl-imx51 source package in Utopic:
  Invalid
Status in linux-lts-backport-maverick source package in Utopic:
  New
Status in linux-lts-backport-natty source package in Utopic:
  New
Status in linux-lts-quantal source package in Utopic:
  Invalid
Status in linux-lts-raring source package in Utopic:
  Invalid
Status in linux-lts-saucy source package in Utopic:
  Invalid
Status in linux-lts-trusty source package in Utopic:
  Invalid
Status in linux-lts-utopic source package in Utopic:
  Invalid
Status in linux-mvl-do

[Kernel-packages] [Bug 1409584] Re: ThinkPad X1 Carbon 3rd(2015 version) fails to suspend from the second time

2015-01-12 Thread Joseph Salisbury
Would it be possible for you to test the latest upstream kernel? Refer
to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest
v3.19 kernel[0].

If this bug is fixed in the mainline kernel, please add the following
tag 'kernel-fixed-upstream'.

If the mainline kernel does not fix this bug, please add the tag:
'kernel-bug-exists-upstream'.

If you are unable to test the mainline kernel, for example it will not boot, 
please add the tag: 'kernel-unable-to-test-upstream'.
Once testing of the upstream kernel is complete, please mark this bug as 
"Confirmed".


Thanks in advance.

[0] http://kernel.ubuntu.com/~kernel-ppa/mainline/v3.19-rc4-vivid/

** Tags added: kernel-key

** Tags removed: kernel-key
** Tags added: kernel-da-key

** Changed in: linux (Ubuntu)
   Status: Confirmed => Incomplete

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1409584

Title:
  ThinkPad X1 Carbon 3rd(2015 version) fails to suspend from the second
  time

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  version: 3rd(2015 version) on Trusty(14.04)

  It suspends and resumes successfully at the first time, then WWAN
  devices disappear and fails to suspend.

  workaround 0:
  BIOS, Always On USB to disable, USB 3.0 mode to enable

  workaround 1:
  disable cdc* modules in rootfs and initramfs(you will lose WWAN feature)

  workaround 2:
  reset that WWAN device from xHCI(USB 3.0) port to EHCI(USB 2.0)

  We still need a fix.
  --- 
  ApportVersion: 2.14.1-0ubuntu3.6
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  u  1490 F pulseaudio
   /dev/snd/controlC1:  u  1490 F pulseaudio
  CurrentDesktop: Unity
  DistroRelease: Ubuntu 14.04
  HibernationDevice: RESUME=UUID=53af0423-2b7d-48f8-a1eb-19ef371b2aea
  InstallationDate: Installed on 2015-01-12 (0 days ago)
  InstallationMedia: Ubuntu 14.04.1 LTS "Trusty Tahr" - Release amd64 
(20140722.2)
  MachineType: LENOVO 20BTZ09ZUS
  Package: linux (not installed)
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-43-generic 
root=UUID=7b0bf38c-9b8d-4349-b992-074cbddd2f13 ro quiet splash vt.handoff=7
  ProcVersionSignature: Ubuntu 3.13.0-43.72-generic 3.13.11.11
  RelatedPackageVersions:
   linux-restricted-modules-3.13.0-43-generic N/A
   linux-backports-modules-3.13.0-43-generic  N/A
   linux-firmware 1.127.11
  Tags:  trusty
  Uname: Linux 3.13.0-43-generic x86_64
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo
  _MarkForUpload: True
  dmi.bios.date: 10/27/2014
  dmi.bios.vendor: LENOVO
  dmi.bios.version: N14ET24W (1.02 )
  dmi.board.asset.tag: Not Available
  dmi.board.name: 20BTZ09ZUS
  dmi.board.vendor: LENOVO
  dmi.board.version: SDK0E50510 WIN
  dmi.chassis.asset.tag: No Asset Information
  dmi.chassis.type: 10
  dmi.chassis.vendor: LENOVO
  dmi.chassis.version: None
  dmi.modalias: 
dmi:bvnLENOVO:bvrN14ET24W(1.02):bd10/27/2014:svnLENOVO:pn20BTZ09ZUS:pvrThinkPadX1Carbon3rd:rvnLENOVO:rn20BTZ09ZUS:rvrSDK0E50510WIN:cvnLENOVO:ct10:cvrNone:
  dmi.product.name: 20BTZ09ZUS
  dmi.product.version: ThinkPad X1 Carbon 3rd
  dmi.sys.vendor: LENOVO

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1409584/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1386395] Re: CVE-2014-8369

2015-01-12 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-armadaxp - 3.2.0-1643.62

---
linux-armadaxp (3.2.0-1643.62) precise; urgency=low

  [ Ike Panhc ]

  * Release Tracking Bug
- LP: #1403240
  * Rebase to Ubuntu-3.2.0-75.110

  [ Ubuntu: 3.2.0-75.110 ]

  * Release Tracking Bug
- LP: #1403154
  * kvm: fix excessive pages un-pinning in kvm_iommu_map error path.
- LP: #1386395
- CVE-2014-8369
  * KVM: x86: Don't report guest userspace emulation error to userspace
- LP: #1392823
- CVE-2014-7842
  * drivers:scsi:storvsc: Fix a bug in handling ring buffer failures that
may result in I/O freeze
- LP: #1400289
  * net:socket: set msg_namelen to 0 if msg_name is passed as NULL in
msghdr struct from userland.
- LP: #1335478
 -- Ike PanhcWed, 17 Dec 2014 10:39:21 +0800

** Changed in: linux-armadaxp (Ubuntu Precise)
   Status: Fix Committed => Fix Released

** Changed in: linux-armadaxp (Ubuntu Precise)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1386395

Title:
  CVE-2014-8369

Status in linux package in Ubuntu:
  Fix Committed
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-ec2 package in Ubuntu:
  Invalid
Status in linux-fsl-imx51 package in Ubuntu:
  Invalid
Status in linux-lts-backport-maverick package in Ubuntu:
  New
Status in linux-lts-backport-natty package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-mvl-dove package in Ubuntu:
  Invalid
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Invalid
Status in linux-armadaxp source package in Lucid:
  Invalid
Status in linux-ec2 source package in Lucid:
  Invalid
Status in linux-fsl-imx51 source package in Lucid:
  Invalid
Status in linux-lts-backport-maverick source package in Lucid:
  New
Status in linux-lts-backport-natty source package in Lucid:
  New
Status in linux-lts-quantal source package in Lucid:
  Invalid
Status in linux-lts-raring source package in Lucid:
  Invalid
Status in linux-lts-saucy source package in Lucid:
  Invalid
Status in linux-lts-trusty source package in Lucid:
  Invalid
Status in linux-lts-utopic source package in Lucid:
  Invalid
Status in linux-mvl-dove source package in Lucid:
  Invalid
Status in linux-ti-omap4 source package in Lucid:
  Invalid
Status in linux source package in Precise:
  Fix Released
Status in linux-armadaxp source package in Precise:
  Fix Released
Status in linux-ec2 source package in Precise:
  Invalid
Status in linux-fsl-imx51 source package in Precise:
  Invalid
Status in linux-lts-backport-maverick source package in Precise:
  New
Status in linux-lts-backport-natty source package in Precise:
  New
Status in linux-lts-quantal source package in Precise:
  Fix Committed
Status in linux-lts-raring source package in Precise:
  Invalid
Status in linux-lts-saucy source package in Precise:
  Fix Committed
Status in linux-lts-trusty source package in Precise:
  Fix Released
Status in linux-lts-utopic source package in Precise:
  Invalid
Status in linux-mvl-dove source package in Precise:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  Fix Committed
Status in linux source package in Trusty:
  Fix Released
Status in linux-armadaxp source package in Trusty:
  Invalid
Status in linux-ec2 source package in Trusty:
  Invalid
Status in linux-fsl-imx51 source package in Trusty:
  Invalid
Status in linux-lts-backport-maverick source package in Trusty:
  New
Status in linux-lts-backport-natty source package in Trusty:
  New
Status in linux-lts-quantal source package in Trusty:
  Invalid
Status in linux-lts-raring source package in Trusty:
  Invalid
Status in linux-lts-saucy source package in Trusty:
  Invalid
Status in linux-lts-trusty source package in Trusty:
  Invalid
Status in linux-lts-utopic source package in Trusty:
  Fix Released
Status in linux-mvl-dove source package in Trusty:
  Invalid
Status in linux-ti-omap4 source package in Trusty:
  Invalid
Status in linux source package in Utopic:
  Fix Released
Status in linux-armadaxp source package in Utopic:
  Invalid
Status in linux-ec2 source package in Utopic:
  Invalid
Status in linux-fsl-imx51 source package in Utopic:
  Invalid
Status in linux-lts-backport-maverick source package in Utopic:
  New
Status in linux-lts-backport-natty source package in Utopic:
  New
Status in linux-lts-quantal source package in Utopic:
  Invalid
Status in linux-lts-raring source package in Utopic:
  Invalid
Status in linux-lts-saucy source package in Utopic:
  Invalid
Status in linux-lts-trusty source package in Utopic:
  Inva

[Kernel-packages] [Bug 1409403] Re: kernel issue - trackpad not working at all

2015-01-12 Thread Joseph Salisbury
Would it be possible for you to test the latest upstream kernel? Refer
to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest
v3.19 kernel[0].

If this bug is fixed in the mainline kernel, please add the following
tag 'kernel-fixed-upstream'.

If the mainline kernel does not fix this bug, please add the tag:
'kernel-bug-exists-upstream'.

If you are unable to test the mainline kernel, for example it will not boot, 
please add the tag: 'kernel-unable-to-test-upstream'.
Once testing of the upstream kernel is complete, please mark this bug as 
"Confirmed".


Thanks in advance.

[0] http://kernel.ubuntu.com/~kernel-ppa/mainline/v3.19-rc4-vivid/


** Changed in: linux (Ubuntu)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1409403

Title:
  kernel issue - trackpad not working at all

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  trackpad on Acer Chromebook C720, not working at all after doing both 
Chrubuntu install and complete install of Ubuntu 14.10.
  Tried running script to build prior kernels, didn't work. Tried updating 
packages, didn't work. Used 'xinput list' command in terminal and synaptic 
trackpad doesn't appear on list.

  Acer Chromebook C720
  Running Ubuntu 14.10

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1409403/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1409625] Re: [HP EliteBook 725 G2 Notebook PC] brightness could not be controlled by the function key and the slider of "System settings -> Brightness and Lock" but sysfs works

2015-01-12 Thread Joseph Salisbury
Would it be possible for you to test the latest upstream kernel? Refer
to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest
v3.19 kernel[0].

If this bug is fixed in the mainline kernel, please add the following
tag 'kernel-fixed-upstream'.

If the mainline kernel does not fix this bug, please add the tag:
'kernel-bug-exists-upstream'.

If you are unable to test the mainline kernel, for example it will not boot, 
please add the tag: 'kernel-unable-to-test-upstream'.
Once testing of the upstream kernel is complete, please mark this bug as 
"Confirmed".


Thanks in advance.

[0] http://kernel.ubuntu.com/~kernel-ppa/mainline/v3.19-rc4-vivid/

** Changed in: linux (Ubuntu)
   Status: Confirmed => Incomplete

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1409625

Title:
  [HP EliteBook 725 G2 Notebook PC] brightness could not be controlled
  by the function key and the slider of "System settings -> Brightness
  and Lock" but sysfs works

Status in HWE Next Project:
  New
Status in linux package in Ubuntu:
  Incomplete

Bug description:
  HP EliteBook 725 G2 Notebook PC
  (CID 201405-15214)
  updated Ubuntu 14.04.1
  3.13.0-43-generic #72

  Steps to reproduce the bug:
  1. install 12.04.3 on this machine
  2. update the system via update manager to make the system up-to-date
  3. click the upper-right indicator to launch the "System settings -> 
Brightness and Lock" applet
  4. try to adjust the brightness slider to control the brightness
  5. try to adjust the brightness by the function key fn+F8 or fn+F9

  Expected result:
  The brightness could be adjusted

  Actual result:
  screen brightness has no response

  More information:
  brightness has no response by using this command:
  echo 4 | sudo tee -a /sys/class/backlight/acpi_video0/brightness

  brightness HAS response by using this command:
  echo 4 | sudo tee -a /sys/class/backlight/radeon_bl0/brightness

  

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.13.0-43-generic 3.13.0-43.72
  ProcVersionSignature: Ubuntu 3.13.0-43.72-generic 3.13.11.11
  Uname: Linux 3.13.0-43-generic x86_64
  ApportVersion: 2.14.1-0ubuntu3.6
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC1:  ubuntu 1417 F pulseaudio
   /dev/snd/controlC0:  ubuntu 1417 F pulseaudio
  CurrentDesktop: Unity
  Date: Mon Jan 12 02:50:55 2015
  HibernationDevice: RESUME=UUID=e24b803a-e217-4d6d-a35c-dbe0c033966a
  InstallationDate: Installed on 2015-01-08 (3 days ago)
  InstallationMedia: Ubuntu 14.04.1 LTS "Trusty Tahr" - Release amd64 
(20140722.2)
  IwConfig:
   eth0  no wireless extensions.
   
   lono wireless extensions.
  MachineType: Hewlett-Packard HP Licrice
  ProcFB: 0 radeondrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-43-generic 
root=UUID=c1e0a265-8c75-4427-ad25-f0c76f003ce7 ro quiet splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-3.13.0-43-generic N/A
   linux-backports-modules-3.13.0-43-generic  N/A
   linux-firmware 1.127.11
  RfKill:
   0: hci0: Bluetooth
Soft blocked: no
Hard blocked: no
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 09/03/2014
  dmi.bios.vendor: Hewlett-Packard
  dmi.bios.version: M84 Ver. 97.35
  dmi.board.asset.tag: Base Board Asset Tag
  dmi.board.name: 221D
  dmi.board.vendor: Hewlett-Packard
  dmi.board.version: KBC Version 63.14
  dmi.chassis.asset.tag: 73612P10CU
  dmi.chassis.type: 10
  dmi.chassis.vendor: Hewlett-Packard
  dmi.modalias: 
dmi:bvnHewlett-Packard:bvrM84Ver.97.35:bd09/03/2014:svnHewlett-Packard:pnHPLicrice:pvrA3009CD10002:rvnHewlett-Packard:rn221D:rvrKBCVersion63.14:cvnHewlett-Packard:ct10:cvr:
  dmi.product.name: HP Licrice
  dmi.product.version: A3009CD10002
  dmi.sys.vendor: Hewlett-Packard

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1409625/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1409531] Re: Wifi Drops

2015-01-12 Thread Joseph Salisbury
Did this issue start happening after an update/upgrade?  Was there a
prior kernel version where you were not having this particular problem?

Would it be possible for you to test the latest upstream kernel? Refer
to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest
v3.19 kernel[0].

If this bug is fixed in the mainline kernel, please add the following
tag 'kernel-fixed-upstream'.

If the mainline kernel does not fix this bug, please add the tag:
'kernel-bug-exists-upstream'.

If you are unable to test the mainline kernel, for example it will not boot, 
please add the tag: 'kernel-unable-to-test-upstream'.
Once testing of the upstream kernel is complete, please mark this bug as 
"Confirmed".


Thanks in advance.

[0] http://kernel.ubuntu.com/~kernel-ppa/mainline/v3.19-rc4-vivid/

** Changed in: linux (Ubuntu)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu)
   Status: Confirmed => Incomplete

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1409531

Title:
  Wifi Drops

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  Wireless adapter randomly stops working and drops signal.  Ubuntu
  still registers that it exists, but doesn't find any wireless signals.
  I have to disable and enable the adapter to reconnect it.

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.13.0-43-generic 3.13.0-43.72
  ProcVersionSignature: Ubuntu 3.13.0-43.72-generic 3.13.11.11
  Uname: Linux 3.13.0-43-generic x86_64
  ApportVersion: 2.14.1-0ubuntu3.6
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC1:  rusty  2003 F pulseaudio
   /dev/snd/controlC0:  rusty  2003 F pulseaudio
  CurrentDesktop: Unity
  Date: Sun Jan 11 15:06:03 2015
  EcryptfsInUse: Yes
  InstallationDate: Installed on 2014-09-11 (122 days ago)
  InstallationMedia: Ubuntu 14.04.1 LTS "Trusty Tahr" - Release amd64 
(20140722.2)
  Lsusb:
   Bus 001 Device 003: ID 0bda:8187 Realtek Semiconductor Corp. RTL8187 
Wireless Adapter
   Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
   Bus 002 Device 002: ID 046d:c52b Logitech, Inc. Unifying Receiver
   Bus 002 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
  MachineType: System manufacturer System Product Name
  ProcFB: 0 radeondrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-43-generic 
root=UUID=ec1cc0a1-628a-414a-95c2-1585ed7f7271 ro quiet splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-3.13.0-43-generic N/A
   linux-backports-modules-3.13.0-43-generic  N/A
   linux-firmware 1.127.11
  RfKill:
   0: phy0: Wireless LAN
Soft blocked: no
Hard blocked: no
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 06/20/2007
  dmi.bios.vendor: Phoenix Technologies, LTD
  dmi.bios.version: ASUS M2N32-SLI DELUXE ACPI BIOS Revision 1201
  dmi.board.name: M2N32-SLI DELUXE
  dmi.board.vendor: ASUSTeK Computer INC.
  dmi.board.version: 1.XX
  dmi.chassis.asset.tag: 123456789000
  dmi.chassis.type: 3
  dmi.chassis.vendor: Chassis Manufacture
  dmi.chassis.version: Chassis Version
  dmi.modalias: 
dmi:bvnPhoenixTechnologies,LTD:bvrASUSM2N32-SLIDELUXEACPIBIOSRevision1201:bd06/20/2007:svnSystemmanufacturer:pnSystemProductName:pvrSystemVersion:rvnASUSTeKComputerINC.:rnM2N32-SLIDELUXE:rvr1.XX:cvnChassisManufacture:ct3:cvrChassisVersion:
  dmi.product.name: System Product Name
  dmi.product.version: System Version
  dmi.sys.vendor: System manufacturer

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1409531/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1409721] Re: [HP EliteBook 725 G2 Notebook PC] mic mute key (Fn+F8), mic mute LED and mute LED do not work

2015-01-12 Thread Joseph Salisbury
Would it be possible for you to test the latest upstream kernel? Refer
to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest
v3.19 kernel[0].

If this bug is fixed in the mainline kernel, please add the following
tag 'kernel-fixed-upstream'.

If the mainline kernel does not fix this bug, please add the tag:
'kernel-bug-exists-upstream'.

If you are unable to test the mainline kernel, for example it will not boot, 
please add the tag: 'kernel-unable-to-test-upstream'.
Once testing of the upstream kernel is complete, please mark this bug as 
"Confirmed".


Thanks in advance.

[0] http://kernel.ubuntu.com/~kernel-ppa/mainline/v3.19-rc4-vivid/

** Changed in: linux (Ubuntu)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu)
   Status: Confirmed => Incomplete

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1409721

Title:
  [HP EliteBook 725 G2 Notebook PC] mic mute key (Fn+F8), mic mute LED
  and mute LED do not work

Status in HWE Next Project:
  New
Status in linux package in Ubuntu:
  Incomplete

Bug description:
  HP EliteBook 725 G2 Notebook PC
  (CID 201405-15214)
  updated ubuntu 14.04.1
  3.13.0-43-generic #72

  Steps to reproduce this bug:
  1. install 14.04.1 and use the updater to update the system. Reboot.
  2. Get into the desktop and ready to use the system.
  3. sudo apt-get install sox
  4. apply command 'sox -t alsa default tmp.wav' to record the sound. Press Fn 
F8 at the same time.
  5. use 'ctrl+c' to stop recording. use 'play tmp.wav' to playback
  6. during the playback, press the mute fhunction key.

  Expected result:
  of step 5. : The recorded sound was muted. The LED indicate the mic was muted.
  of step 6. : The speaker was muted and the mute LED indicate it was muted.

  Actual result:
  of step 5. : nothing happened.
  of step 6 : the sound was muted but the LED did not change color.

  More information:
  sudo hda-verb /dev/snd/hwC1D0 0x18 SET_PIN_WIDGET_CONTROL 0x20
  could turn off the mic mute LED

  sudo hda-verb /dev/snd/hwC1D0 0x18 SET_PIN_WIDGET_CONTROL 0x24
  could turn on the mic mute LED

  --

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.13.0-43-generic 3.13.0-43.72
  ProcVersionSignature: Ubuntu 3.13.0-43.72-generic 3.13.11.11
  Uname: Linux 3.13.0-43-generic x86_64
  NonfreeKernelModules: wl
  ApportVersion: 2.14.1-0ubuntu3.6
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC1:  ubuntu 1404 F pulseaudio
   /dev/snd/controlC0:  ubuntu 1404 F pulseaudio
  CurrentDesktop: Unity
  Date: Mon Jan 12 07:36:28 2015
  HibernationDevice: RESUME=UUID=e24b803a-e217-4d6d-a35c-dbe0c033966a
  InstallationDate: Installed on 2015-01-08 (4 days ago)
  InstallationMedia: Ubuntu 14.04.1 LTS "Trusty Tahr" - Release amd64 
(20140722.2)
  MachineType: Hewlett-Packard HP Licrice
  ProcFB: 0 radeondrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-43-generic 
root=UUID=c1e0a265-8c75-4427-ad25-f0c76f003ce7 ro quiet splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-3.13.0-43-generic N/A
   linux-backports-modules-3.13.0-43-generic  N/A
   linux-firmware 1.127.11
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 09/03/2014
  dmi.bios.vendor: Hewlett-Packard
  dmi.bios.version: M84 Ver. 97.35
  dmi.board.asset.tag: Base Board Asset Tag
  dmi.board.name: 221D
  dmi.board.vendor: Hewlett-Packard
  dmi.board.version: KBC Version 63.14
  dmi.chassis.asset.tag: 73612P10CU
  dmi.chassis.type: 10
  dmi.chassis.vendor: Hewlett-Packard
  dmi.modalias: 
dmi:bvnHewlett-Packard:bvrM84Ver.97.35:bd09/03/2014:svnHewlett-Packard:pnHPLicrice:pvrA3009CD10002:rvnHewlett-Packard:rn221D:rvrKBCVersion63.14:cvnHewlett-Packard:ct10:cvr:
  dmi.product.name: HP Licrice
  dmi.product.version: A3009CD10002
  dmi.sys.vendor: Hewlett-Packard

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1409721/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1409388] Re: iwlwifi 0000:01:00.0: Microcode SW error detected. Restarting 0x2000000.

2015-01-12 Thread Joseph Salisbury
** Changed in: linux (Ubuntu)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1409388

Title:
  iwlwifi :01:00.0: Microcode SW error detected.  Restarting
  0x200.

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  [   80.615933] iwlwifi :01:00.0: Microcode SW error detected.  Restarting 
0x200.
  [   80.615942] iwlwifi :01:00.0: CSR values:
  [   80.615947] iwlwifi :01:00.0: (2nd byte of CSR_INT_COALESCING is 
CSR_INT_PERIODIC_REG)
  [   80.615954] iwlwifi :01:00.0:CSR_HW_IF_CONFIG_REG: 0X00484b00
  [   80.615962] iwlwifi :01:00.0:  CSR_INT_COALESCING: 0Xff40
  [   80.615970] iwlwifi :01:00.0: CSR_INT: 0X
  [   80.615977] iwlwifi :01:00.0:CSR_INT_MASK: 0X
  [   80.615984] iwlwifi :01:00.0:   CSR_FH_INT_STATUS: 0X
  [   80.615991] iwlwifi :01:00.0: CSR_GPIO_IN: 0X003c
  [   80.615997] iwlwifi :01:00.0:   CSR_RESET: 0X
  [   80.616004] iwlwifi :01:00.0:CSR_GP_CNTRL: 0X080403c5
  [   80.616011] iwlwifi :01:00.0:  CSR_HW_REV: 0X00b0
  [   80.616018] iwlwifi :01:00.0:  CSR_EEPROM_REG: 0Xc6540ffd
  [   80.616024] iwlwifi :01:00.0:   CSR_EEPROM_GP: 0X9801
  [   80.616032] iwlwifi :01:00.0:  CSR_OTP_GP_REG: 0X00030001
  [   80.616038] iwlwifi :01:00.0: CSR_GIO_REG: 0X00080044
  [   80.616045] iwlwifi :01:00.0:CSR_GP_UCODE_REG: 0X3a26
  [   80.616052] iwlwifi :01:00.0:   CSR_GP_DRIVER_REG: 0X
  [   80.616060] iwlwifi :01:00.0:   CSR_UCODE_DRV_GP1: 0X
  [   80.616068] iwlwifi :01:00.0:   CSR_UCODE_DRV_GP2: 0X
  [   80.616074] iwlwifi :01:00.0: CSR_LED_REG: 0X0040
  [   80.616081] iwlwifi :01:00.0:CSR_DRAM_INT_TBL_REG: 0X88118858
  [   80.616088] iwlwifi :01:00.0:CSR_GIO_CHICKEN_BITS: 0X27800200
  [   80.616095] iwlwifi :01:00.0: CSR_ANA_PLL_CFG: 0X
  [   80.616102] iwlwifi :01:00.0:  CSR_MONITOR_STATUS_REG: 0X43f7f757
  [   80.616108] iwlwifi :01:00.0:   CSR_HW_REV_WA_REG: 0X0001001a
  [   80.616115] iwlwifi :01:00.0:CSR_DBG_HPET_MEM_REG: 0X
  [   80.616119] iwlwifi :01:00.0: FH register values:
  [   80.616136] iwlwifi :01:00.0: FH_RSCSR_CHNL0_STTS_WPTR_REG: 
0X11810500
  [   80.616153] iwlwifi :01:00.0:FH_RSCSR_CHNL0_RBDCB_BASE_REG: 
0X01181040
  [   80.616169] iwlwifi :01:00.0:  FH_RSCSR_CHNL0_WPTR: 
0X0068
  [   80.616185] iwlwifi :01:00.0: FH_MEM_RCSR_CHNL0_CONFIG_REG: 
0X80801114
  [   80.616202] iwlwifi :01:00.0:  FH_MEM_RSSR_SHARED_CTRL_REG: 
0X00fc
  [   80.616220] iwlwifi :01:00.0:FH_MEM_RSSR_RX_STATUS_REG: 
0X0703
  [   80.616237] iwlwifi :01:00.0:FH_MEM_RSSR_RX_ENABLE_ERR_IRQ2DRV: 
0X
  [   80.616253] iwlwifi :01:00.0:FH_TSSR_TX_STATUS_REG: 
0X07ff0001
  [   80.616270] iwlwifi :01:00.0: FH_TSSR_TX_ERROR_REG: 
0X
  [   80.616274] iwlwifi :01:00.0: Loaded firmware version: 18.168.6.1
  [   80.616394] iwlwifi :01:00.0: Start IWL Error Log Dump:
  [   80.616397] iwlwifi :01:00.0: Status: 0x02CC, count: 6
  [   80.616400] iwlwifi :01:00.0: 0x198A | ADVANCED_SYSASSERT  
  [   80.616403] iwlwifi :01:00.0: 0x00015920 | uPc
  [   80.616405] iwlwifi :01:00.0: 0x00015910 | branchlink1
  [   80.616408] iwlwifi :01:00.0: 0x00015910 | branchlink2
  [   80.616410] iwlwifi :01:00.0: 0xDBEA | interruptlink1
  [   80.616412] iwlwifi :01:00.0: 0x | interruptlink2
  [   80.616415] iwlwifi :01:00.0: 0x007F | data1
  [   80.616417] iwlwifi :01:00.0: 0x0005 | data2
  [   80.616419] iwlwifi :01:00.0: 0x01DC | line
  [   80.616422] iwlwifi :01:00.0: 0x9AC0F98D | beacon time
  [   80.616424] iwlwifi :01:00.0: 0xC00C1673 | tsf low
  [   80.616427] iwlwifi :01:00.0: 0x038D | tsf hi
  [   80.616429] iwlwifi :01:00.0: 0x | time gp1
  [   80.616431] iwlwifi :01:00.0: 0x03FB8C36 | time gp2
  [   80.616434] iwlwifi :01:00.0: 0x | time gp3
  [   80.616436] iwlwifi :01:00.0: 0x754312A8 | uCode version
  [   80.616438] iwlwifi :01:00.0: 0x00B0 | hw version
  [   80.616441] iwlwifi :01:00.0: 0x00484B00 | board version
  [   80.616443] iwlwifi :01:00.0: 0x001C | hcmd
  [   80.616445] iwlwifi :01:00.0: 0x27863840 | isr0
  [   80.616448] iwlwifi :01:00.0: 0x1189F800 | isr1
  [   80.616450] iwlwifi :01:00.0: 0x0E07 | isr2
  [   80.616453] iwlwifi :01:00.0: 0x0143FCC3 |

  1   2   >