[Kernel-packages] [Bug 1409890] Re: linux: 3.16.0-30.40 -proposed tracker
All builds are complete, packages in this bug can be copied to -proposed. Backport packages from packages here can be worked on, the following tracking bugs were opened for them: linux-lts-utopic (14.04.1) - bug 1410070 ** Changed in: kernel-sru-workflow/prepare-package Status: New => Fix Released ** Changed in: kernel-sru-workflow/prepare-package Assignee: Canonical Kernel Team (canonical-kernel-team) => Seth Forshee (sforshee) ** Changed in: kernel-sru-workflow/promote-to-proposed Status: New => Confirmed ** Changed in: kernel-sru-workflow/package-testing Status: New => In Progress ** Changed in: kernel-sru-workflow/package-testing Status: In Progress => Confirmed ** Description changed: This bug is for tracking the 3.16.0-30.40 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Monday, 12. January 2015 20:07 UTC - kernel-stable-phase:Prepare - kernel-stable-phase-changed:Monday, 12. January 2015 20:07 UTC + kernel-stable-phase:PPA Testing + kernel-stable-phase-changed:Tuesday, 13. January 2015 07:03 UTC + kernel-stable-Prepare-package-end:Tuesday, 13. January 2015 07:03 UTC + kernel-stable-Promote-to-proposed-start:Tuesday, 13. January 2015 07:03 UTC + ppa-package-testing-start:Tuesday, 13. January 2015 07:03 UTC -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1409890 Title: linux: 3.16.0-30.40 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: New Status in Kernel SRU Workflow package-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Confirmed Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: New Status in Kernel SRU Workflow verification-testing series: New Status in linux package in Ubuntu: Invalid Bug description: This bug is for tracking the 3.16.0-30.40 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Monday, 12. January 2015 20:07 UTC kernel-stable-phase:PPA Testing kernel-stable-phase-changed:Tuesday, 13. January 2015 07:03 UTC kernel-stable-Prepare-package-end:Tuesday, 13. January 2015 07:03 UTC kernel-stable-Promote-to-proposed-start:Tuesday, 13. January 2015 07:03 UTC ppa-package-testing-start:Tuesday, 13. January 2015 07:03 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1409890/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1392071] Re: sane (scanimage -L) hangs
[Expired for linux (Ubuntu) because there has been no activity for 60 days.] ** Changed in: linux (Ubuntu) Status: Incomplete => Expired -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1392071 Title: sane (scanimage -L) hangs Status in linux package in Ubuntu: Expired Bug description: dmesg: [ 3600.928077] INFO: task saned:8150 blocked for more than 120 seconds. [ 3600.928089] Not tainted 3.13.0-39-generic #66-Ubuntu [ 3600.928091] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 3600.928094] saned D da5d1540 0 8150 1185 0x [ 3600.928102] c649fec8 00200086 c108a36a da5d1540 c1a92540 4a81b2d8 02bb [ 3600.928109] c1a92540 d67a4e00 da23c100 da5d1540 da23c144 da23c144 241d [ 3600.928115] c649fecc c1088fab da5d1540 da5d1540 da08a700 da5d1540 da5d1540 c649feb4 [ 3600.928122] Call Trace: [ 3600.928140] [] ? check_preempt_wakeup+0x1aa/0x250 [ 3600.928145] [] ? update_curr+0x12b/0x1e0 [ 3600.928154] [] ? __enqueue_entity+0x6d/0x80 [ 3600.928179] [] schedule_preempt_disabled+0x23/0x60 [ 3600.928184] [] __mutex_lock_slowpath+0x10d/0x171 [ 3600.928190] [] mutex_lock+0x1c/0x28 [ 3600.928198] [] pp_ioctl+0x1b/0x40 [ppdev] [ 3600.928203] [] ? pp_do_ioctl+0x860/0x860 [ppdev] [ 3600.928211] [] do_vfs_ioctl+0x2e2/0x4d0 [ 3600.928215] [] ? __schedule+0x358/0x770 [ 3600.928219] [] ? final_putname+0x1d/0x40 [ 3600.928223] [] ? putname+0x24/0x40 [ 3600.928234] [] ? do_sys_open+0x196/0x260 [ 3600.928238] [] SyS_ioctl+0x60/0x80 [ 3600.928248] [] sysenter_do_call+0x12/0x12 [ 3600.928254] INFO: task scanimage:8549 blocked for more than 120 seconds. [ 3600.928256] Not tainted 3.13.0-39-generic #66-Ubuntu [ 3600.928258] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 3600.928260] scanimage D d467db00 0 8549 8422 0x [ 3600.928264] d52dfec8 0082 d467db00 d467db00 d52dfef4 c1a92540 c1924a00 0024 [ 3600.928270] c1a92540 c1924a00 d467db00 da5d1540 0008 db026aa4 [ 3600.928276] d52dfef4 c0190d20 d52dfee0 c1186d00 d52dff80 d52dfec0 daf01000 [ 3600.928282] Call Trace: [ 3600.928287] [] ? path_openat+0xb0/0x520 [ 3600.928293] [] schedule_preempt_disabled+0x23/0x60 [ 3600.928297] [] __mutex_lock_slowpath+0x10d/0x171 [ 3600.928302] [] mutex_lock+0x1c/0x28 [ 3600.928307] [] pp_ioctl+0x1b/0x40 [ppdev] [ 3600.928312] [] ? pp_do_ioctl+0x860/0x860 [ppdev] [ 3600.928316] [] do_vfs_ioctl+0x2e2/0x4d0 [ 3600.928320] [] ? final_putname+0x1d/0x40 [ 3600.928324] [] ? final_putname+0x1d/0x40 [ 3600.928327] [] ? putname+0x24/0x40 [ 3600.928331] [] ? do_sys_open+0x196/0x260 [ 3600.928336] [] SyS_ioctl+0x60/0x80 [ 3600.928340] [] sysenter_do_call+0x12/0x12 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1392071/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1391732] Re: Ubuntu 14.4 problem
[Expired for linux (Ubuntu) because there has been no activity for 60 days.] ** Changed in: linux (Ubuntu) Status: Incomplete => Expired -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1391732 Title: Ubuntu 14.4 problem Status in linux package in Ubuntu: Expired Bug description: My touchpad is not working ever since I installed ubuntu 14.4 . However connecting mouse works. On running the command "cat /proc/bus/input/devices" , touchpad is not shown up too. I am using Dell Inpiron 3521 model. Synaptics touchpad Touchpad not working ever since I installed ubuntu 14.4 . Please help me. I am attaching the required files. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1391732/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1388415] Re: jstest-gtk doesn't detect my joystick
[Expired for linux (Ubuntu) because there has been no activity for 60 days.] ** Changed in: linux (Ubuntu) Status: Incomplete => Expired -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1388415 Title: jstest-gtk doesn't detect my joystick Status in linux package in Ubuntu: Expired Bug description: I installed the program, plugged in my joystick, and started the program. No Joystick is listed by program. So I hit refresh and preferences. Nothing happens. So I close and look for updates. i find none. Please fix this bug in ubuntu 14.10. ProblemType: Bug DistroRelease: Ubuntu 14.10 Package: jstest-gtk 0.1.1~git20140501-1 ProcVersionSignature: Ubuntu 3.16.0-24.32-generic 3.16.4 Uname: Linux 3.16.0-24-generic x86_64 ApportVersion: 2.14.7-0ubuntu8 Architecture: amd64 CurrentDesktop: Unity Date: Sat Nov 1 12:35:10 2014 ExecutablePath: /usr/bin/jstest-gtk InstallationDate: Installed on 2014-11-01 (0 days ago) InstallationMedia: Ubuntu 14.10 "Utopic Unicorn" - Release amd64 (20141022.1) ProcEnviron: PATH=(custom, no user) LANGUAGE=en_US XDG_RUNTIME_DIR= LANG=en_US.UTF-8 SHELL=/bin/bash SourcePackage: jstest-gtk UpgradeStatus: No upgrade log present (probably fresh install) --- ApportVersion: 2.14.7-0ubuntu8 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC3: sleek 3211 F pulseaudio /dev/snd/controlC2: sleek 3211 F pulseaudio /dev/snd/controlC1: sleek 3211 F pulseaudio /dev/snd/controlC0: sleek 3211 F pulseaudio CurrentDesktop: Unity DistroRelease: Ubuntu 14.10 HibernationDevice: RESUME=UUID=797c8ad1-472a-4053-9fec-ce2921ae5a58 InstallationDate: Installed on 2014-11-06 (7 days ago) InstallationMedia: Ubuntu 14.10 "Utopic Unicorn" - Release amd64 (20141022.1) IwConfig: eth0 no wireless extensions. lono wireless extensions. MachineType: To be filled by O.E.M. To be filled by O.E.M. Package: linux (not installed) ProcFB: 0 radeondrmfb 1 radeondrmfb ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.16.0-24-generic root=UUID=f3d7f8a3-8642-4a40-a0e5-2082aaa0e887 ro quiet splash vt.handoff=7 ProcVersionSignature: Ubuntu 3.16.0-24.32-generic 3.16.4 RelatedPackageVersions: linux-restricted-modules-3.16.0-24-generic N/A linux-backports-modules-3.16.0-24-generic N/A linux-firmware 1.138 RfKill: Tags: utopic Uname: Linux 3.16.0-24-generic x86_64 UpgradeStatus: No upgrade log present (probably fresh install) UserGroups: adm autopilot cdrom dip lpadmin plugdev sambashare sudo _MarkForUpload: True dmi.bios.date: 04/03/2014 dmi.bios.vendor: American Megatrends Inc. dmi.bios.version: 2501 dmi.board.asset.tag: To be filled by O.E.M. dmi.board.name: M5A99X EVO R2.0 dmi.board.vendor: ASUSTeK COMPUTER INC. dmi.board.version: Rev 1.xx dmi.chassis.asset.tag: To Be Filled By O.E.M. dmi.chassis.type: 3 dmi.chassis.vendor: To Be Filled By O.E.M. dmi.chassis.version: To Be Filled By O.E.M. dmi.modalias: dmi:bvnAmericanMegatrendsInc.:bvr2501:bd04/03/2014:svnTobefilledbyO.E.M.:pnTobefilledbyO.E.M.:pvrTobefilledbyO.E.M.:rvnASUSTeKCOMPUTERINC.:rnM5A99XEVOR2.0:rvrRev1.xx:cvnToBeFilledByO.E.M.:ct3:cvrToBeFilledByO.E.M.: dmi.product.name: To be filled by O.E.M. dmi.product.version: To be filled by O.E.M. dmi.sys.vendor: To be filled by O.E.M. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1388415/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1388038] Re: iwl-3945 wi-fi driver crashes when docking my laptop running linux-image-3.16.0
[Expired for linux (Ubuntu) because there has been no activity for 60 days.] ** Changed in: linux (Ubuntu) Status: Incomplete => Expired -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1388038 Title: iwl-3945 wi-fi driver crashes when docking my laptop running linux- image-3.16.0 Status in linux package in Ubuntu: Expired Bug description: When I dock my Thinkpad T60 into an Advanced Docking Station, wifi driver crashes. Digging the issue, problem also occurs with linux-image-3.16.0-23. No bug with 3.13.0-37-generic ProblemType: Bug DistroRelease: Ubuntu 14.10 Package: linux-image-3.16.0-24-generic 3.16.0-24.32 ProcVersionSignature: Ubuntu 3.16.0-23.31-generic 3.16.4 Uname: Linux 3.16.0-23-generic i686 ApportVersion: 2.14.7-0ubuntu8 Architecture: i386 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: eric 2732 F pulseaudio CurrentDesktop: Unity Date: Fri Oct 31 11:52:47 2014 HibernationDevice: RESUME=UUID=146611d8-df02-40f2-a999-dbab535f81f9 InstallationDate: Installed on 2012-06-18 (864 days ago) InstallationMedia: Ubuntu 11.10 "Oneiric Ocelot" - Release i386 (20111012) MachineType: LENOVO 1952AT7 PccardctlIdent: Socket 0: no product info available PccardctlStatus: Socket 0: no card ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.16.0-23-generic root=UUID=35910738-c8fc-48e5-8b80-5c7766a720fc ro quiet splash enable_mtrr_cleanup mtrr_spare_reg_nr=2 RelatedPackageVersions: linux-restricted-modules-3.16.0-23-generic N/A linux-backports-modules-3.16.0-23-generic N/A linux-firmware 1.138 SourcePackage: linux UpgradeStatus: Upgraded to utopic on 2014-10-30 (0 days ago) dmi.bios.date: 03/21/2011 dmi.bios.vendor: LENOVO dmi.bios.version: 79ETE7WW (2.27 ) dmi.board.name: 1952AT7 dmi.board.vendor: LENOVO dmi.board.version: Not Available dmi.chassis.asset.tag: 1952at7l3a9167 dmi.chassis.type: 10 dmi.chassis.vendor: LENOVO dmi.chassis.version: Not Available dmi.modalias: dmi:bvnLENOVO:bvr79ETE7WW(2.27):bd03/21/2011:svnLENOVO:pn1952AT7:pvrThinkPadT60:rvnLENOVO:rn1952AT7:rvrNotAvailable:cvnLENOVO:ct10:cvrNotAvailable: dmi.product.name: 1952AT7 dmi.product.version: ThinkPad T60 dmi.sys.vendor: LENOVO To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1388038/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1392119] Re: pm-hibernate causes "Freezing of tasks failed after 20.01 seconds (1 tasks refusing to freeze, wq_busy=0)" then resumption of session after about 15 seconds
[Expired for linux (Ubuntu) because there has been no activity for 60 days.] ** Changed in: linux (Ubuntu) Status: Incomplete => Expired -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1392119 Title: pm-hibernate causes "Freezing of tasks failed after 20.01 seconds (1 tasks refusing to freeze, wq_busy=0)" then resumption of session after about 15 seconds Status in linux package in Ubuntu: Expired Bug description: Syslog contents: Nov 12 17:33:06 Lenovo-laptop kernel: [ 174.024253] PM: Marking nosave pages: 0009f000 - 0010 Nov 12 17:33:06 Lenovo-laptop kernel: [ 174.024262] PM: Basic memory bitmaps created Nov 12 17:33:27 Lenovo-laptop kernel: [ 174.024264] PM: Syncing filesystems ... done. Nov 12 17:33:27 Lenovo-laptop kernel: [ 174.172074] Freezing user space processes ... Nov 12 17:33:27 Lenovo-laptop kernel: [ 194.188103] Freezing of tasks failed after 20.01 seconds (1 tasks refusing to freeze, wq_busy=0): Nov 12 17:33:27 Lenovo-laptop kernel: [ 194.188260] pci_devices D c186b7e4 0 1293 1189 0x0084 Nov 12 17:33:27 Lenovo-laptop kernel: [ 194.188267] f21e1ec4 0086 f21e1e50 c186b7e4 f58c0ca0 c1930e00 c1930e00 Nov 12 17:33:27 Lenovo-laptop kernel: [ 194.188278] f51a9570 0007 f6307e00 f521e500 f3abf1a0 c186b7c0 0246 c186b7c0 Nov 12 17:33:27 Lenovo-laptop kernel: [ 194.188289] 0001 f521e500 f21e1f24 c10fd79c c186c180 0001 0041 Nov 12 17:33:27 Lenovo-laptop kernel: [ 194.188299] Call Trace: Nov 12 17:33:27 Lenovo-laptop kernel: [ 194.188311] [] ? __alloc_pages_nodemask+0xfc/0x6e0 Nov 12 17:33:27 Lenovo-laptop kernel: [ 194.188319] [] schedule+0x35/0x50 Nov 12 17:33:27 Lenovo-laptop kernel: [ 194.188323] [] __mutex_lock_slowpath+0xc6/0x120 Nov 12 17:33:27 Lenovo-laptop kernel: [ 194.188328] [] mutex_lock+0x24/0x40 Nov 12 17:33:27 Lenovo-laptop kernel: [ 194.188334] [] control_store+0x43/0xc0 Nov 12 17:33:27 Lenovo-laptop kernel: [ 194.188339] [] ? rtpm_active_time_show+0x70/0x70 Nov 12 17:33:27 Lenovo-laptop kernel: [ 194.188345] [] dev_attr_store+0x23/0x40 Nov 12 17:33:27 Lenovo-laptop kernel: [ 194.188352] [] sysfs_write_file+0xa6/0x100 Nov 12 17:33:27 Lenovo-laptop kernel: [ 194.188357] [] vfs_write+0x8f/0x160 Nov 12 17:33:27 Lenovo-laptop kernel: [ 194.188362] [] ? sysfs_poll+0x80/0x80 Nov 12 17:33:27 Lenovo-laptop kernel: [ 194.188366] [] sys_write+0x3d/0x70 Nov 12 17:33:27 Lenovo-laptop kernel: [ 194.188372] [] sysenter_do_call+0x12/0x28 Nov 12 17:33:27 Lenovo-laptop kernel: [ 194.188460] Nov 12 17:33:27 Lenovo-laptop rtkit-daemon[1523]: The canary thread is apparently starving. Taking action. Nov 12 17:33:27 Lenovo-laptop rtkit-daemon[1523]: Demoting known real-time threads. Nov 12 17:33:27 Lenovo-laptop rtkit-daemon[1523]: Successfully demoted thread 1712 of process 1708 (n/a). Nov 12 17:33:27 Lenovo-laptop rtkit-daemon[1523]: Successfully demoted thread 1711 of process 1708 (n/a). Nov 12 17:33:27 Lenovo-laptop rtkit-daemon[1523]: Successfully demoted thread 1708 of process 1708 (n/a). Nov 12 17:33:27 Lenovo-laptop rtkit-daemon[1523]: Demoted 3 threads. Nov 12 17:33:27 Lenovo-laptop kernel: [ 194.188462] Restarting tasks ... done. Nov 12 17:33:27 Lenovo-laptop kernel: [ 194.198787] PM: Basic memory bitmaps freed Nov 12 17:33:27 Lenovo-laptop kernel: [ 194.292501] video LNXVIDEO:01: Restoring backlight state Nov 12 17:33:27 Lenovo-laptop acpid: client 1078[0:0] has disconnected Nov 12 17:33:27 Lenovo-laptop acpid: client connected from 1078[0:0] Nov 12 17:33:27 Lenovo-laptop acpid: 1 client rule loaded Nov 12 17:33:27 Lenovo-laptop anacron[2504]: Anacron 2.3 started on 2014-11-12 Nov 12 17:33:27 Lenovo-laptop anacron[2504]: Normal exit (0 jobs run) Nov 12 17:33:35 Lenovo-laptop acpid: client 1078[0:0] has disconnected Nov 12 17:33:35 Lenovo-laptop acpid: client connected from 1078[0:0] Nov 12 17:33:35 Lenovo-laptop acpid: 1 client rule loaded Nov 12 17:37:27 Lenovo-laptop AptDaemon: INFO: Quitting due to inactivity Nov 12 17:37:27 Lenovo-laptop AptDaemon: INFO: Quitting was requested ProblemType: Bug DistroRelease: Ubuntu 12.04 Package: linux-image-3.2.0-23-generic-pae 3.2.0-23.36 ProcVersionSignature: Ubuntu 3.2.0-23.36-generic-pae 3.2.14 Uname: Linux 3.2.0-23-generic-pae i686 NonfreeKernelModules: wl AlsaVersion: Advanced Linux Sound Architecture Driver Version 1.0.24. AplayDevices: List of PLAYBACK Hardware Devices card 0: Intel [HDA Intel], device 0: ALC861-VD Analog [ALC861-VD Analog] Subdevices: 1/1 Subdevice #0: subdevice #0 ApportVersion: 2.0.1-0ubuntu17.8 Architecture: i386 ArecordDevices: List of CAPTURE Hardware Devices card 0: Intel [HDA Intel], device 0: ALC861-VD Analo
[Kernel-packages] [Bug 1010337] Re: Boot instead of resume after suspending
I no longer run Ubuntu so I can not run the apport-collect command, sorry. Please read the upstream bug report for further data. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1010337 Title: Boot instead of resume after suspending Status in linux package in Ubuntu: Incomplete Bug description: This bug might not be in pm-utils but in Linux. After issuing a "suspend" of my laptop, if I resume within a certain amount of time (usually 10-20min) it will resume correctly and the system will be usable. If I resume soon after suspending, the computer will boot up normally instead. There are work arounds for similar bugs around the Internet, such as the "acpi_sleep=nonvs" kernel parameter. None of these have any affect. I have tried Linux 3.4 with no improvement. I also have applied most of the fixes in http://help.ubuntu.com/community/Asus_U36SD . A while back running Ubuntu 11.10 I tried debugging resuming/suspending and as far as I can remember there were nothing relevant that I could find out. It just didn't manage to boot up. Hardware details are: ASUS U36SD laptop with a Intel i7-2620M (Sandy Bridge). Rest should be in attached files. ProblemType: Bug DistroRelease: Ubuntu 12.04 Package: pm-utils 1.4.1-9 Uname: Linux 3.4.0-030400-generic x86_64 ApportVersion: 2.0.1-0ubuntu7 Architecture: amd64 CheckboxSubmission: 633c30c88957e357f73c867180ace90f CheckboxSystem: b8f3ec504801f13fc208edb5c785b099 Date: Fri Jun 8 08:21:22 2012 InstallationMedia: Ubuntu 11.04 "Natty Narwhal" - Release amd64 (20110427.1) PackageArchitecture: all ProcEnviron: TERM=xterm PATH=(custom, user) LANG=en_US.UTF-8 SHELL=/bin/bash SourcePackage: pm-utils UpgradeStatus: Upgraded to precise on 2012-04-27 (41 days ago) --- ApportVersion: 2.0.1-0ubuntu7 Architecture: amd64 CheckboxSubmission: 633c30c88957e357f73c867180ace90f CheckboxSystem: b8f3ec504801f13fc208edb5c785b099 DistroRelease: Ubuntu 12.04 InstallationMedia: Ubuntu 11.04 "Natty Narwhal" - Release amd64 (20110427.1) Package: pm-utils 1.4.1-9 PackageArchitecture: all ProcEnviron: TERM=rxvt-unicode PATH=(custom, user) LANG=en_US.UTF-8 SHELL=/bin/bash Tags: precise Uname: Linux 3.4.0-030400-generic x86_64 UpgradeStatus: Upgraded to precise on 2012-04-27 (41 days ago) UserGroups: adm admin cdrom dialout lpadmin plugdev sambashare To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1010337/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1409584] Re: ThinkPad X1 Carbon 3rd(2015 version) fails to suspend from the second time
** Tags added: kernel-fixed-upstream ** Changed in: linux (Ubuntu) Status: Incomplete => Confirmed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1409584 Title: ThinkPad X1 Carbon 3rd(2015 version) fails to suspend from the second time Status in linux package in Ubuntu: Confirmed Bug description: version: 3rd(2015 version) on Trusty(14.04) It suspends and resumes successfully at the first time, then WWAN devices disappear and fails to suspend. workaround 0: BIOS, Always On USB to disable, USB 3.0 mode to enable workaround 1: disable cdc* modules in rootfs and initramfs(you will lose WWAN feature) workaround 2: reset that WWAN device from xHCI(USB 3.0) port to EHCI(USB 2.0) We still need a fix. --- ApportVersion: 2.14.1-0ubuntu3.6 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: u 1490 F pulseaudio /dev/snd/controlC1: u 1490 F pulseaudio CurrentDesktop: Unity DistroRelease: Ubuntu 14.04 HibernationDevice: RESUME=UUID=53af0423-2b7d-48f8-a1eb-19ef371b2aea InstallationDate: Installed on 2015-01-12 (0 days ago) InstallationMedia: Ubuntu 14.04.1 LTS "Trusty Tahr" - Release amd64 (20140722.2) MachineType: LENOVO 20BTZ09ZUS Package: linux (not installed) ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-43-generic root=UUID=7b0bf38c-9b8d-4349-b992-074cbddd2f13 ro quiet splash vt.handoff=7 ProcVersionSignature: Ubuntu 3.13.0-43.72-generic 3.13.11.11 RelatedPackageVersions: linux-restricted-modules-3.13.0-43-generic N/A linux-backports-modules-3.13.0-43-generic N/A linux-firmware 1.127.11 Tags: trusty Uname: Linux 3.13.0-43-generic x86_64 UpgradeStatus: No upgrade log present (probably fresh install) UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo _MarkForUpload: True dmi.bios.date: 10/27/2014 dmi.bios.vendor: LENOVO dmi.bios.version: N14ET24W (1.02 ) dmi.board.asset.tag: Not Available dmi.board.name: 20BTZ09ZUS dmi.board.vendor: LENOVO dmi.board.version: SDK0E50510 WIN dmi.chassis.asset.tag: No Asset Information dmi.chassis.type: 10 dmi.chassis.vendor: LENOVO dmi.chassis.version: None dmi.modalias: dmi:bvnLENOVO:bvrN14ET24W(1.02):bd10/27/2014:svnLENOVO:pn20BTZ09ZUS:pvrThinkPadX1Carbon3rd:rvnLENOVO:rn20BTZ09ZUS:rvrSDK0E50510WIN:cvnLENOVO:ct10:cvrNone: dmi.product.name: 20BTZ09ZUS dmi.product.version: ThinkPad X1 Carbon 3rd dmi.sys.vendor: LENOVO To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1409584/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1398497] Re: HP Proliant Serverrs - DL360 and DL380 Gen8 - Precise Kernel Panic - General Protection Fault and X2APIC/XAPIC boot parameters
Esel, Could you please follow instructions from: https://sites.google.com/site/inaddyorg/texts/installing-ubuntu-crash- dump Taking the opportunity to leave comments if you find anything wrong in the procedure ? Tks, looking forward to receiving core from you. Tks -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1398497 Title: HP Proliant Serverrs - DL360 and DL380 Gen8 - Precise Kernel Panic - General Protection Fault and X2APIC/XAPIC boot parameters Status in linux package in Ubuntu: In Progress Status in linux source package in Precise: In Progress Bug description: It was brought to my attention the following situation: """ We massively upgraded our Ubuntu 12.04 servers (most of them are HP DL360p Gen8 or DL380 Gen8) to 3.2.0-67 kernel And in the last 2-3 days we already had to reboot 5 of them because they completely hang Some of them had the following messages under syslog : kernel: [384707.675479] general protection fault: [#5666] SMP others had : kernel: [950725.612724] BUG: unable to handle kernel paging request All of them have this also : your BIOS is broken and requested that x2apic be disabled """ Comments bellow To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1398497/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1341027] Re: init: Failed to obtain startpar-bridge instance: Unknown parameter: INSTANCE
*** This bug is a duplicate of bug 1295596 *** https://bugs.launchpad.net/bugs/1295596 ** This bug has been marked a duplicate of bug 1295596 init: Failed to obtain startpar-bridge instance: Unknown parameter: INSTANCE -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1341027 Title: init: Failed to obtain startpar-bridge instance: Unknown parameter: INSTANCE Status in linux package in Ubuntu: Expired Bug description: [6.768712] init: Failed to obtain startpar-bridge instance: Unknown parameter: INSTANCE ProblemType: Bug DistroRelease: Ubuntu 14.10 Package: linux-image-3.16.0-3-lowlatency 3.16.0-3.8 ProcVersionSignature: Ubuntu 3.16.0-3.8-lowlatency 3.16.0-rc4 Uname: Linux 3.16.0-3-lowlatency x86_64 ApportVersion: 2.14.4-0ubuntu2 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/pcmC1D0p: caravena 2878 F...m pulseaudio /dev/snd/controlC1: caravena 2878 F pulseaudio /dev/snd/controlC0: caravena 2878 F pulseaudio CurrentDesktop: GNOME Date: Fri Jul 11 20:10:48 2014 HibernationDevice: RESUME=UUID=360bd2d2-4f44-4311-86d6-4781ac81ee87 InstallationDate: Installed on 2014-04-27 (75 days ago) InstallationMedia: Ubuntu-GNOME 14.04 LTS "Trusty Tahr" - Release amd64 (20140416.2) MachineType: SAMSUNG ELECTRONICS CO., LTD. 530U3C/530U4C ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.16.0-3-lowlatency root=UUID=13144268-2374-4154-83f1-c35d81306190 ro quiet splash vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-3.16.0-3-lowlatency N/A linux-backports-modules-3.16.0-3-lowlatency N/A linux-firmware 1.132 SourcePackage: linux UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 04/15/2013 dmi.bios.vendor: Phoenix Technologies Ltd. dmi.bios.version: P14AAJ dmi.board.asset.tag: Base Board Asset Tag dmi.board.name: SAMSUNG_NP1234567890 dmi.board.vendor: SAMSUNG ELECTRONICS CO., LTD. dmi.board.version: FAB1 dmi.chassis.asset.tag: No Asset Tag dmi.chassis.type: 9 dmi.chassis.vendor: SAMSUNG ELECTRONICS CO., LTD. dmi.chassis.version: 0.1 dmi.modalias: dmi:bvnPhoenixTechnologiesLtd.:bvrP14AAJ:bd04/15/2013:svnSAMSUNGELECTRONICSCO.,LTD.:pn530U3C/530U4C:pvr0.1:rvnSAMSUNGELECTRONICSCO.,LTD.:rnSAMSUNG_NP1234567890:rvrFAB1:cvnSAMSUNGELECTRONICSCO.,LTD.:ct9:cvr0.1: dmi.product.name: 530U3C/530U4C dmi.product.version: 0.1 dmi.sys.vendor: SAMSUNG ELECTRONICS CO., LTD. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1341027/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1409890] Re: linux: 3.16.0-30.40 -proposed tracker
** Changed in: kernel-sru-workflow/prepare-package-signed Status: New => Fix Released ** Changed in: kernel-sru-workflow/prepare-package-signed Assignee: Canonical Kernel Team (canonical-kernel-team) => Seth Forshee (sforshee) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1409890 Title: linux: 3.16.0-30.40 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: New Status in Kernel SRU Workflow package-testing series: New Status in Kernel SRU Workflow prepare-package series: New Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: New Status in Kernel SRU Workflow verification-testing series: New Status in linux package in Ubuntu: Invalid Bug description: This bug is for tracking the 3.16.0-30.40 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Monday, 12. January 2015 20:07 UTC kernel-stable-phase:Prepare kernel-stable-phase-changed:Monday, 12. January 2015 20:07 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1409890/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1400827] Re: BlueZ crashing when connecting input channel to a keyboard
** Changed in: bluez (Ubuntu) Status: New => Incomplete -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to bluez in Ubuntu. https://bugs.launchpad.net/bugs/1400827 Title: BlueZ crashing when connecting input channel to a keyboard Status in bluez package in Ubuntu: Incomplete Bug description: On the phone, pairing a keyboard makes BlueZ crash when connecting the input channel (either by calling org.bluez.Input.Connect() on D-Bus or by pressing some keys on the keyboard to make the keyboard open the channel. In order to pair a keyboard with an Ubuntu phone, you need to either apply this branch to ubuntu-system-settings [1] or do it manually with bluez-simple-agent and dbus-send/qdbus. [1] https://code.launchpad.net/~mzanetti/ubuntu-system-settings/bt-input To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/bluez/+bug/1400827/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1318218] Re: SATA problems on MacBook Pro 11, 1?
So, I used gparted to format the drive with a single ext4 partition, rebooted the system, mounted it, and the errors came back. It's not a hardware issue. It's some combination of the OS, chipset, file system in use, and maybe (?) drive type. I can use the same drive on a Gigabyte board that uses the B85 chipset and have zero issues, so it doesn't seem to be the entire lynx point chipset family. The Z87 on this board is the revised C2 stepping. Anecdotal evidence from web searches might indicate some relation to ASrock Z87 boards in particular, but then, user reports of the error go back several years, and earlier reports were oftentimes hardware issues. And obviously, in the case of the initial bug report here, it was a Macbook Pro. I'm attaching dmesg output from the same system, this is from a fresh boot to a live environment and mounting the drive by clicking it in nautilus. The errors were back, just as they were before. After reinstalling the Windows 8 Trial on the system, it's back to working without any errors in a live ubuntu environment. Not really sure what to make of this, aside from it not being a hardware problem. ** Attachment added: "dmesg-errors.txt" https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1318218/+attachment/4296899/+files/dmesg-errors.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1318218 Title: SATA problems on MacBook Pro 11,1? Status in linux package in Ubuntu: Confirmed Bug description: I installed Ubuntu 14.04 next to MacOS following the guide at https://help.ubuntu.com/community/MacBookPro11-1/Saucy/ Looking into dmesg, I constantlz get entries like [ 276.380934] ata1: SError: { PHYRdyChg } [ 276.380943] ata1: hard resetting link [ 277.103527] ata1: SATA link up 1.5 Gbps (SStatus 113 SControl 310) [ 277.103999] ata1.00: unexpected _GTF length (8) [ 277.104504] ata1.00: unexpected _GTF length (8) [ 277.104507] ata1.00: configured for UDMA/33 [ 277.104629] ata1: EH complete [ 277.206319] ata1: exception Emask 0x10 SAct 0x0 SErr 0x1 action 0xe frozen [ 277.206328] ata1: irq_stat 0x0040, PHY RDY changed [ 277.206333] ata1: SError: { PHYRdyChg } [ 277.206343] ata1: hard resetting link [ 277.927757] ata1: SATA link up 1.5 Gbps (SStatus 113 SControl 310) [ 277.928425] ata1.00: unexpected _GTF length (8) [ 277.929040] ata1.00: unexpected _GTF length (8) [ 277.929051] ata1.00: configured for UDMA/33 [ 277.929168] ata1: EH complete [ 278.030944] ata1: exception Emask 0x10 SAct 0x0 SErr 0x1 action 0xe frozen [ 278.030952] ata1: irq_stat 0x0040, PHY RDY changed [ 278.030957] ata1: SError: { PHYRdyChg } [ 278.030965] ata1: hard resetting link [ 278.752008] ata1: SATA link up 1.5 Gbps (SStatus 113 SControl 310) [ 278.752582] ata1.00: unexpected _GTF length (8) [ 278.753140] ata1.00: unexpected _GTF length (8) [ 278.753147] ata1.00: configured for UDMA/33 [ 278.753231] ata1: EH complete [ 278.853417] ata1: exception Emask 0x10 SAct 0x0 SErr 0x1 action 0xe frozen [ 278.853424] ata1: irq_stat 0x0040, PHY RDY changed [ 278.853427] ata1: SError: { PHYRdyChg } [ 278.853434] ata1: hard resetting link [ 279.576258] ata1: SATA link up 1.5 Gbps (SStatus 113 SControl 310) [ 279.576881] ata1.00: unexpected _GTF length (8) [ 279.577417] ata1.00: unexpected _GTF length (8) [ 279.577427] ata1.00: configured for UDMA/33 [ 279.577491] ata1: EH complete [ 279.677753] ata1: exception Emask 0x10 SAct 0x0 SErr 0x1 action 0xe frozen [ 279.677762] ata1: irq_stat 0x0040, PHY RDY changed [ 279.677767] ata1: SError: { PHYRdyChg } [ 279.66] ata1: hard resetting link [ 280.400449] ata1: SATA link up 1.5 Gbps (SStatus 113 SControl 310) [ 280.401147] ata1.00: unexpected _GTF length (8) [ 280.401722] ata1.00: unexpected _GTF length (8) [ 280.401733] ata1.00: configured for UDMA/33 [ 280.401809] ata1: EH complete [ 280.502117] ata1: exception Emask 0x10 SAct 0x0 SErr 0x1 action 0xe frozen [ 280.502127] ata1: irq_stat 0x0040, PHY RDY changed [ 280.502132] ata1: SError: { PHYRdyChg } ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-24-generic 3.13.0-24.47 ProcVersionSignature: Ubuntu 3.13.0-24.47-generic 3.13.9 Uname: Linux 3.13.0-24-generic x86_64 NonfreeKernelModules: wl ApportVersion: 2.14.1-0ubuntu3 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: markus 1663 F pulseaudio /dev/snd/controlC1: markus 1663 F pulseaudio CurrentDesktop: Unity Date: Sat May 10 19:33:44 2014 HibernationDevice: RESUME=UUID=c71381d2-e2f3-4c96-94ea-57b8986afd08 InstallationDate: Installed on 2014-05-09 (0 days ago) InstallationMedia: Ubuntu 14.04 LTS "Trusty Tahr" - Release amd64 (20140417) MachineTy
[Kernel-packages] [Bug 1409959] [NEW] after upgrade from 3.13.0-43 to -44, UEFI system will not boot past grub
Public bug reported: I upgaded to -44 from -43 and my UEFI system (Dell Optiplex 3020) wont boot - i see grub, it starts, then collapses back to the initramfs prompt I downgraded to -43 and it works again ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-44-generic (not installed) ProcVersionSignature: Ubuntu 3.13.0-43.72-generic 3.13.11.11 Uname: Linux 3.13.0-43-generic x86_64 ApportVersion: 2.14.1-0ubuntu3.6 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC2: mbw2829 F pulseaudio /dev/snd/controlC0: mbw2829 F pulseaudio /dev/snd/controlC1: mbw2829 F pulseaudio CurrentDesktop: Unity Date: Mon Jan 12 15:51:45 2015 HibernationDevice: RESUME=UUID=ad3d0446-a2b9-4af5-8e88-3cdf6e9fd23d InstallationDate: Installed on 2015-01-07 (5 days ago) InstallationMedia: Ubuntu 14.04.1 LTS "Trusty Tahr" - Release amd64 (20140722.2) IwConfig: eth0 no wireless extensions. lono wireless extensions. MachineType: Dell Inc. OptiPlex 3020 ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.13.0-43-generic.efi.signed root=/dev/mapper/ubuntu--vg-root ro quiet splash PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: Daemon not responding. RelatedPackageVersions: linux-restricted-modules-3.13.0-43-generic N/A linux-backports-modules-3.13.0-43-generic N/A linux-firmware 1.127.11 RfKill: SourcePackage: linux UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 04/14/2014 dmi.bios.vendor: Dell Inc. dmi.bios.version: A03 dmi.board.name: 04YP6J dmi.board.vendor: Dell Inc. dmi.board.version: A01 dmi.chassis.type: 15 dmi.chassis.vendor: Dell Inc. dmi.modalias: dmi:bvnDellInc.:bvrA03:bd04/14/2014:svnDellInc.:pnOptiPlex3020:pvr01:rvnDellInc.:rn04YP6J:rvrA01:cvnDellInc.:ct15:cvr: dmi.product.name: OptiPlex 3020 dmi.product.version: 01 dmi.sys.vendor: Dell Inc. ** Affects: linux (Ubuntu) Importance: Undecided Status: Confirmed ** Tags: amd64 apport-bug trusty ** Summary changed: - after upgrade, UEFI system will not boot + after upgrade from 3.13.0-43 to -44, UEFI system will not boot past grub -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1409959 Title: after upgrade from 3.13.0-43 to -44, UEFI system will not boot past grub Status in linux package in Ubuntu: Confirmed Bug description: I upgaded to -44 from -43 and my UEFI system (Dell Optiplex 3020) wont boot - i see grub, it starts, then collapses back to the initramfs prompt I downgraded to -43 and it works again ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-44-generic (not installed) ProcVersionSignature: Ubuntu 3.13.0-43.72-generic 3.13.11.11 Uname: Linux 3.13.0-43-generic x86_64 ApportVersion: 2.14.1-0ubuntu3.6 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC2: mbw2829 F pulseaudio /dev/snd/controlC0: mbw2829 F pulseaudio /dev/snd/controlC1: mbw2829 F pulseaudio CurrentDesktop: Unity Date: Mon Jan 12 15:51:45 2015 HibernationDevice: RESUME=UUID=ad3d0446-a2b9-4af5-8e88-3cdf6e9fd23d InstallationDate: Installed on 2015-01-07 (5 days ago) InstallationMedia: Ubuntu 14.04.1 LTS "Trusty Tahr" - Release amd64 (20140722.2) IwConfig: eth0 no wireless extensions. lono wireless extensions. MachineType: Dell Inc. OptiPlex 3020 ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.13.0-43-generic.efi.signed root=/dev/mapper/ubuntu--vg-root ro quiet splash PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: Daemon not responding. RelatedPackageVersions: linux-restricted-modules-3.13.0-43-generic N/A linux-backports-modules-3.13.0-43-generic N/A linux-firmware 1.127.11 RfKill: SourcePackage: linux UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 04/14/2014 dmi.bios.vendor: Dell Inc. dmi.bios.version: A03 dmi.board.name: 04YP6J dmi.board.vendor: Dell Inc. dmi.board.version: A01 dmi.chassis.type: 15 dmi.chassis.vendor: Dell Inc. dmi.modalias: dmi:bvnDellInc.:bvrA03:bd04/14/2014:svnDellInc.:pnOptiPlex3020:pvr01:rvnDellInc.:rn04YP6J:rvrA01:cvnDellInc.:ct15:cvr: dmi.product.name: OptiPlex 3020 dmi.product.version: 01 dmi.sys.vendor: Dell Inc. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1409959/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1409959] Status changed to Confirmed
This change was made by a bot. ** Changed in: linux (Ubuntu) Status: New => Confirmed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1409959 Title: after upgrade from 3.13.0-43 to -44, UEFI system will not boot past grub Status in linux package in Ubuntu: Confirmed Bug description: I upgaded to -44 from -43 and my UEFI system (Dell Optiplex 3020) wont boot - i see grub, it starts, then collapses back to the initramfs prompt I downgraded to -43 and it works again ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-44-generic (not installed) ProcVersionSignature: Ubuntu 3.13.0-43.72-generic 3.13.11.11 Uname: Linux 3.13.0-43-generic x86_64 ApportVersion: 2.14.1-0ubuntu3.6 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC2: mbw2829 F pulseaudio /dev/snd/controlC0: mbw2829 F pulseaudio /dev/snd/controlC1: mbw2829 F pulseaudio CurrentDesktop: Unity Date: Mon Jan 12 15:51:45 2015 HibernationDevice: RESUME=UUID=ad3d0446-a2b9-4af5-8e88-3cdf6e9fd23d InstallationDate: Installed on 2015-01-07 (5 days ago) InstallationMedia: Ubuntu 14.04.1 LTS "Trusty Tahr" - Release amd64 (20140722.2) IwConfig: eth0 no wireless extensions. lono wireless extensions. MachineType: Dell Inc. OptiPlex 3020 ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.13.0-43-generic.efi.signed root=/dev/mapper/ubuntu--vg-root ro quiet splash PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: Daemon not responding. RelatedPackageVersions: linux-restricted-modules-3.13.0-43-generic N/A linux-backports-modules-3.13.0-43-generic N/A linux-firmware 1.127.11 RfKill: SourcePackage: linux UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 04/14/2014 dmi.bios.vendor: Dell Inc. dmi.bios.version: A03 dmi.board.name: 04YP6J dmi.board.vendor: Dell Inc. dmi.board.version: A01 dmi.chassis.type: 15 dmi.chassis.vendor: Dell Inc. dmi.modalias: dmi:bvnDellInc.:bvrA03:bd04/14/2014:svnDellInc.:pnOptiPlex3020:pvr01:rvnDellInc.:rn04YP6J:rvrA01:cvnDellInc.:ct15:cvr: dmi.product.name: OptiPlex 3020 dmi.product.version: 01 dmi.sys.vendor: Dell Inc. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1409959/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1408118] Re: hama uzzano keyboard do not work properly
pau@traveller:~$ lsusb Bus 004 Device 002: ID 8087:0024 Intel Corp. Integrated Rate Matching Hub Bus 004 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub Bus 003 Device 004: ID 04ca:7012 Lite-On Technology Corp. Bus 003 Device 002: ID 8087:0024 Intel Corp. Integrated Rate Matching Hub Bus 003 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub Bus 002 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub Bus 001 Device 003: ID 0930:021d Toshiba Corp. Bus 001 Device 002: ID 04d9:a01c Holtek Semiconductor, Inc. Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub pau@traveller:~$ pau@traveller:~$ dmesg | grep usb [0.853148] usbcore: registered new interface driver usbfs [0.853156] usbcore: registered new interface driver hub [0.853175] usbcore: registered new device driver usb [1.319604] usb usb1: New USB device found, idVendor=1d6b, idProduct=0002 [1.319606] usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [1.319607] usb usb1: Product: xHCI Host Controller [1.319609] usb usb1: Manufacturer: Linux 3.19.0-031900rc3-generic xhci-hcd [1.319610] usb usb1: SerialNumber: :00:14.0 [1.320039] usb usb2: New USB device found, idVendor=1d6b, idProduct=0003 [1.320041] usb usb2: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [1.320042] usb usb2: Product: xHCI Host Controller [1.320044] usb usb2: Manufacturer: Linux 3.19.0-031900rc3-generic xhci-hcd [1.320045] usb usb2: SerialNumber: :00:14.0 [1.333879] usb usb3: New USB device found, idVendor=1d6b, idProduct=0002 [1.333881] usb usb3: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [1.333882] usb usb3: Product: EHCI Host Controller [1.333884] usb usb3: Manufacturer: Linux 3.19.0-031900rc3-generic ehci_hcd [1.333885] usb usb3: SerialNumber: :00:1a.0 [1.349950] usb usb4: New USB device found, idVendor=1d6b, idProduct=0002 [1.349952] usb usb4: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [1.349954] usb usb4: Product: EHCI Host Controller [1.349955] usb usb4: Manufacturer: Linux 3.19.0-031900rc3-generic ehci_hcd [1.349957] usb usb4: SerialNumber: :00:1d.0 [1.630241] usb 1-1: new low-speed USB device number 2 using xhci_hcd [1.646258] usb 3-1: new high-speed USB device number 2 using ehci-pci [1.662271] usb 4-1: new high-speed USB device number 2 using ehci-pci [1.778824] usb 3-1: New USB device found, idVendor=8087, idProduct=0024 [1.778842] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [1.794836] usb 4-1: New USB device found, idVendor=8087, idProduct=0024 [1.794842] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [1.826097] usb 1-1: New USB device found, idVendor=04d9, idProduct=a01c [1.826103] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=0 [1.826120] usb 1-1: Product: Wireless USB Device [1.826121] usb 1-1: Manufacturer: HOLTEK [1.826227] usb 1-1: ep 0x81 - rounding interval to 64 microframes, ep desc says 80 microframes [1.826232] usb 1-1: ep 0x82 - rounding interval to 64 microframes, ep desc says 80 microframes [1.849892] usbcore: registered new interface driver usbhid [1.849894] usbhid: USB HID core driver [1.851236] input: HOLTEK Wireless USB Device as /devices/pci:00/:00:14.0/usb1/1-1/1-1:1.0/0003:04D9:A01C.0001/input/input8 [1.906736] hid-generic 0003:04D9:A01C.0001: input,hidraw0: USB HID v1.10 Keyboard [HOLTEK Wireless USB Device] on usb-:00:14.0-1/input0 [1.906883] input: HOLTEK Wireless USB Device as /devices/pci:00/:00:14.0/usb1/1-1/1-1:1.1/0003:04D9:A01C.0002/input/input11 [1.938594] usb 1-3: new full-speed USB device number 3 using xhci_hcd [1.962855] hid-generic 0003:04D9:A01C.0002: input,hidraw1: USB HID v1.10 Mouse [HOLTEK Wireless USB Device] on usb-:00:14.0-1/input1 [2.050915] usb 3-1.1: new high-speed USB device number 3 using ehci-pci [2.067745] usb 1-3: New USB device found, idVendor=0930, idProduct=021d [2.067748] usb 1-3: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [2.067750] usb 1-3: Product: RT Bluetooth Radio [2.067751] usb 1-3: Manufacturer: Realtek [2.067752] usb 1-3: SerialNumber: 00e04c01 [2.399882] usb 3-1.1: New USB device found, idVendor=0bda, idProduct=0138 [2.399885] usb 3-1.1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [2.399887] usb 3-1.1: Product: USB2.0-CRW [2.399888] usb 3-1.1: Manufacturer: Generic [2.399890] usb 3-1.1: SerialNumber: 2009051638820 [2.408245] usbcore: registered new interface driver usb-storage [2.409412] usbcore: registered new interface driver uas [2.429321] scsi host6: usb-storage 3-1.1:1.0 [2.429388] usbcore: registered new interface driver ums-realtek [2.475415] usb 3-1.3: new high-speed USB device number 4 using ehci-pci [2.618922] usb 3-1.3: New USB device fou
[Kernel-packages] [Bug 1409890] Re: linux: 3.16.0-30.40 -proposed tracker
** Changed in: kernel-sru-workflow/prepare-package-meta Status: New => Fix Released ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: Canonical Kernel Team (canonical-kernel-team) => Seth Forshee (sforshee) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1409890 Title: linux: 3.16.0-30.40 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: New Status in Kernel SRU Workflow package-testing series: New Status in Kernel SRU Workflow prepare-package series: New Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: New Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: New Status in Kernel SRU Workflow verification-testing series: New Status in linux package in Ubuntu: Invalid Bug description: This bug is for tracking the 3.16.0-30.40 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Monday, 12. January 2015 20:07 UTC kernel-stable-phase:Prepare kernel-stable-phase-changed:Monday, 12. January 2015 20:07 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1409890/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1403239] Re: linux-ti-omap4: 3.2.0-1458.78 -proposed tracker
The package has been published and the bug is being set to Fix Released ** Changed in: kernel-sru-workflow Status: In Progress => Fix Released ** Description changed: This bug is for tracking the 3.2.0-1458.78 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 16. December 2014 23:03 UTC kernel-stable-master-bug:1403154 kernel-stable-Certification-testing-end:Thursday, 18. December 2014 12:02 UTC kernel-stable-Prepare-package-end:Thursday, 18. December 2014 16:02 UTC kernel-stable-Promote-to-proposed-start:Thursday, 18. December 2014 16:02 UTC ppa-package-testing-start:Thursday, 18. December 2014 16:02 UTC kernel-stable-Promote-to-proposed-end:Thursday, 18. December 2014 22:02 UTC kernel-stable-Security-signoff-start:Friday, 19. December 2014 00:03 UTC kernel-stable-Verification-testing-start:Friday, 19. December 2014 00:02 UTC kernel-stable-Regression-testing-start:Friday, 19. December 2014 00:03 UTC kernel-stable-Verification-testing-end:Friday, 19. December 2014 12:01 UTC kernel-stable-Security-signoff-end:Friday, 19. December 2014 14:01 UTC - kernel-stable-phase:CopyToUpdates - kernel-stable-phase-changed:Monday, 12. January 2015 18:29 UTC kernel-stable-Promote-to-updates-start:Monday, 12. January 2015 18:29 UTC kernel-stable-Regression-testing-end:Monday, 12. January 2015 18:29 UTC kernel-stable-Promote-to-updates-end:Monday, 12. January 2015 20:45 UTC + kernel-stable-phase:Released + kernel-stable-phase-changed:Monday, 12. January 2015 22:01 UTC -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-ti-omap4 in Ubuntu. https://bugs.launchpad.net/bugs/1403239 Title: linux-ti-omap4: 3.2.0-1458.78 -proposed tracker Status in Kernel SRU Workflow: Fix Released Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow package-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Fix Released Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow upload-to-ppa series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux-ti-omap4 source package in Precise: Fix Released Bug description: This bug is for tracking the 3.2.0-1458.78 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 16. December 2014 23:03 UTC kernel-stable-master-bug:1403154 kernel-stable-Certification-testing-end:Thursday, 18. December 2014 12:02 UTC kernel-stable-Prepare-package-end:Thursday, 18. December 2014 16:02 UTC kernel-stable-Promote-to-proposed-start:Thursday, 18. December 2014 16:02 UTC ppa-package-testing-start:Thursday, 18. December 2014 16:02 UTC kernel-stable-Promote-to-proposed-end:Thursday, 18. December 2014 22:02 UTC kernel-stable-Security-signoff-start:Friday, 19. December 2014 00:03 UTC kernel-stable-Verification-testing-start:Friday, 19. December 2014 00:02 UTC kernel-stable-Regression-testing-start:Friday, 19. December 2014 00:03 UTC kernel-stable-Verification-testing-end:Friday, 19. December 2014 12:01 UTC kernel-stable-Security-signoff-end:Friday, 19. December 2014 14:01 UTC kernel-stable-Promote-to-updates-start:Monday, 12. January 2015 18:29 UTC kernel-stable-Regression-testing-end:Monday, 12. January 2015 18:29 UTC kernel-stable-Promote-to-updates-end:Monday, 12. January 2015 20:45 UTC kernel-stable-phase:Released kernel-stable-phase-changed:Monday, 12. January 2015 22:01 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1403239/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1409794] Re: linux: 3.18.0-9.10 -proposed tracker
** Changed in: kernel-development-workflow/prepare-package-meta Status: New => Fix Released ** Changed in: kernel-development-workflow/prepare-package-meta Assignee: Canonical Kernel Team (canonical-kernel-team) => Leann Ogasawara (leannogasawara) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1409794 Title: linux: 3.18.0-9.10 -proposed tracker Status in Kernel Development Workflow: In Progress Status in Kernel Development Workflow package-testing series: New Status in Kernel Development Workflow prepare-package series: New Status in Kernel Development Workflow prepare-package-meta series: Fix Released Status in Kernel Development Workflow prepare-package-signed series: New Status in Kernel Development Workflow promote-to-release series: New Status in linux package in Ubuntu: New Status in linux source package in Vivid: New Bug description: This bug is for tracking the 3.18.0-9.10 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-Prepare-package-start:Monday, 12. January 2015 16:51 UTC kernel-phase-changed:Monday, 12. January 2015 16:51 UTC kernel-phase:Prepare To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-development-workflow/+bug/1409794/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1408118] Re: hama uzzano keyboard do not work properly
Also, can you attach the apport data per comment #1? This will provide some details of the hardware. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1408118 Title: hama uzzano keyboard do not work properly Status in linux package in Ubuntu: Triaged Bug description: Hello I recently tried to use a hama uzzano keyboard on ubuntu 14.10. This is a wireless keyboard. Some times starts working and then suddenly stops, but mostly it does not work. i looked if it was recognized and it is: lsusb: pau@traveller:~$ lsusb Bus 002 Device 002: ID 8087:0024 Intel Corp. Integrated Rate Matching Hub Bus 002 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub Bus 001 Device 003: ID 04ca:7012 Lite-On Technology Corp. Bus 001 Device 002: ID 8087:0024 Intel Corp. Integrated Rate Matching Hub Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub Bus 004 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub Bus 003 Device 003: ID 0930:021d Toshiba Corp. Bus 003 Device 008: ID 04d9:a01c Holtek Semiconductor, Inc. Bus 003 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub and dmesg | grep usb (partial) [ 8974.179356] input: HOLTEK Wireless USB Device as /devices/pci:00/:00:14.0/usb3/3-1/3-1:1.0/0003:04D9:A01C.000D/input/input29 [ 8974.179587] hid-generic 0003:04D9:A01C.000D: input,hidraw0: USB HID v1.10 Keyboard [HOLTEK Wireless USB Device] on usb-:00:14.0-1/input0 [ 8974.191755] input: HOLTEK Wireless USB Device as /devices/pci:00/:00:14.0/usb3/3-1/3-1:1.1/0003:04D9:A01C.000E/input/input30 [ 8974.192062] hid-generic 0003:04D9:A01C.000E: input,hidraw1: USB HID v1.10 Mouse [HOLTEK Wireless USB Device] on usb-:00:14.0-1/input1 i tried to solve the problem as it is explained here http://askubuntu.com/questions/160329/usb-keyboard-works-occasionally but it did not works. What can i do, i suppose this is a bug, do you need extra information? (it works with windows) thanks To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1408118/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1408118] Re: hama uzzano keyboard do not work properly
This issue appears to be an upstream bug, since you tested the latest upstream kernel. Would it be possible for you to open an upstream bug report[0]? That will allow the upstream Developers to examine the issue, and may provide a quicker resolution to the bug. Please follow the instructions on the wiki page[0]. The first step is to email the appropriate mailing list. If no response is received, then a bug may be opened on bugzilla.kernel.org. Once this bug is reported upstream, please add the tag: 'kernel-bug- reported-upstream'. [0] https://wiki.ubuntu.com/Bugs/Upstream/kernel ** Changed in: linux (Ubuntu) Status: Incomplete => Triaged -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1408118 Title: hama uzzano keyboard do not work properly Status in linux package in Ubuntu: Triaged Bug description: Hello I recently tried to use a hama uzzano keyboard on ubuntu 14.10. This is a wireless keyboard. Some times starts working and then suddenly stops, but mostly it does not work. i looked if it was recognized and it is: lsusb: pau@traveller:~$ lsusb Bus 002 Device 002: ID 8087:0024 Intel Corp. Integrated Rate Matching Hub Bus 002 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub Bus 001 Device 003: ID 04ca:7012 Lite-On Technology Corp. Bus 001 Device 002: ID 8087:0024 Intel Corp. Integrated Rate Matching Hub Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub Bus 004 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub Bus 003 Device 003: ID 0930:021d Toshiba Corp. Bus 003 Device 008: ID 04d9:a01c Holtek Semiconductor, Inc. Bus 003 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub and dmesg | grep usb (partial) [ 8974.179356] input: HOLTEK Wireless USB Device as /devices/pci:00/:00:14.0/usb3/3-1/3-1:1.0/0003:04D9:A01C.000D/input/input29 [ 8974.179587] hid-generic 0003:04D9:A01C.000D: input,hidraw0: USB HID v1.10 Keyboard [HOLTEK Wireless USB Device] on usb-:00:14.0-1/input0 [ 8974.191755] input: HOLTEK Wireless USB Device as /devices/pci:00/:00:14.0/usb3/3-1/3-1:1.1/0003:04D9:A01C.000E/input/input30 [ 8974.192062] hid-generic 0003:04D9:A01C.000E: input,hidraw1: USB HID v1.10 Mouse [HOLTEK Wireless USB Device] on usb-:00:14.0-1/input1 i tried to solve the problem as it is explained here http://askubuntu.com/questions/160329/usb-keyboard-works-occasionally but it did not works. What can i do, i suppose this is a bug, do you need extra information? (it works with windows) thanks To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1408118/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1403943] Re: linux: 2.6.32-71.138 -proposed tracker
The package has been published and the bug is being set to Fix Released ** Changed in: kernel-sru-workflow Status: In Progress => Fix Released ** Description changed: This bug is for tracking the 2.6.32-71.138 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Thursday, 18. December 2014 16:18 UTC kernel-stable-Prepare-package-end:Friday, 19. December 2014 00:07 UTC kernel-stable-Promote-to-proposed-start:Friday, 19. December 2014 00:07 UTC ppa-package-testing-start:Friday, 19. December 2014 00:07 UTC kernel-stable-Promote-to-proposed-end:Friday, 19. December 2014 08:02 UTC kernel-stable-Verification-testing-start:Friday, 19. December 2014 10:03 UTC kernel-stable-Certification-testing-start:Friday, 19. December 2014 10:03 UTC kernel-stable-Security-signoff-start:Friday, 19. December 2014 10:03 UTC kernel-stable-Regression-testing-start:Friday, 19. December 2014 10:03 UTC kernel-stable-Security-signoff-end:Friday, 19. December 2014 14:02 UTC kernel-stable-Certification-testing-end:Wednesday, 07. January 2015 09:01 UTC kernel-stable-Verification-testing-end:Thursday, 08. January 2015 16:02 UTC - kernel-stable-phase:CopyToUpdates - kernel-stable-phase-changed:Friday, 09. January 2015 16:01 UTC kernel-stable-Promote-to-updates-start:Friday, 09. January 2015 16:01 UTC kernel-stable-Regression-testing-end:Friday, 09. January 2015 16:01 UTC kernel-stable-Promote-to-updates-end:Monday, 12. January 2015 19:07 UTC + kernel-stable-phase:Released + kernel-stable-phase-changed:Monday, 12. January 2015 21:03 UTC -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1403943 Title: linux: 2.6.32-71.138 -proposed tracker Status in Kernel SRU Workflow: Fix Released Status in Kernel SRU Workflow certification-testing series: Fix Released Status in Kernel SRU Workflow package-testing series: Fix Released Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-lbm series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-ports-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Fix Released Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux package in Ubuntu: Invalid Status in linux source package in Lucid: Fix Released Bug description: This bug is for tracking the 2.6.32-71.138 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Thursday, 18. December 2014 16:18 UTC kernel-stable-Prepare-package-end:Friday, 19. December 2014 00:07 UTC kernel-stable-Promote-to-proposed-start:Friday, 19. December 2014 00:07 UTC ppa-package-testing-start:Friday, 19. December 2014 00:07 UTC kernel-stable-Promote-to-proposed-end:Friday, 19. December 2014 08:02 UTC kernel-stable-Verification-testing-start:Friday, 19. December 2014 10:03 UTC kernel-stable-Certification-testing-start:Friday, 19. December 2014 10:03 UTC kernel-stable-Security-signoff-start:Friday, 19. December 2014 10:03 UTC kernel-stable-Regression-testing-start:Friday, 19. December 2014 10:03 UTC kernel-stable-Security-signoff-end:Friday, 19. December 2014 14:02 UTC kernel-stable-Certification-testing-end:Wednesday, 07. January 2015 09:01 UTC kernel-stable-Verification-testing-end:Thursday, 08. January 2015 16:02 UTC kernel-stable-Promote-to-updates-start:Friday, 09. January 2015 16:01 UTC kernel-stable-Regression-testing-end:Friday, 09. January 2015 16:01 UTC kernel-stable-Promote-to-updates-end:Monday, 12. January 2015 19:07 UTC kernel-stable-phase:Released kernel-stable-phase-changed:Monday, 12. January 2015 21:03 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1403943/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1403239] Re: linux-ti-omap4: 3.2.0-1458.78 -proposed tracker
** Description changed: This bug is for tracking the 3.2.0-1458.78 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 16. December 2014 23:03 UTC kernel-stable-master-bug:1403154 kernel-stable-Certification-testing-end:Thursday, 18. December 2014 12:02 UTC kernel-stable-Prepare-package-end:Thursday, 18. December 2014 16:02 UTC kernel-stable-Promote-to-proposed-start:Thursday, 18. December 2014 16:02 UTC ppa-package-testing-start:Thursday, 18. December 2014 16:02 UTC kernel-stable-Promote-to-proposed-end:Thursday, 18. December 2014 22:02 UTC kernel-stable-Security-signoff-start:Friday, 19. December 2014 00:03 UTC kernel-stable-Verification-testing-start:Friday, 19. December 2014 00:02 UTC kernel-stable-Regression-testing-start:Friday, 19. December 2014 00:03 UTC kernel-stable-Verification-testing-end:Friday, 19. December 2014 12:01 UTC kernel-stable-Security-signoff-end:Friday, 19. December 2014 14:01 UTC kernel-stable-phase:CopyToUpdates kernel-stable-phase-changed:Monday, 12. January 2015 18:29 UTC kernel-stable-Promote-to-updates-start:Monday, 12. January 2015 18:29 UTC kernel-stable-Regression-testing-end:Monday, 12. January 2015 18:29 UTC + kernel-stable-Promote-to-updates-end:Monday, 12. January 2015 20:45 UTC -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-ti-omap4 in Ubuntu. https://bugs.launchpad.net/bugs/1403239 Title: linux-ti-omap4: 3.2.0-1458.78 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow package-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Fix Released Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow upload-to-ppa series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux-ti-omap4 source package in Precise: Fix Released Bug description: This bug is for tracking the 3.2.0-1458.78 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 16. December 2014 23:03 UTC kernel-stable-master-bug:1403154 kernel-stable-Certification-testing-end:Thursday, 18. December 2014 12:02 UTC kernel-stable-Prepare-package-end:Thursday, 18. December 2014 16:02 UTC kernel-stable-Promote-to-proposed-start:Thursday, 18. December 2014 16:02 UTC ppa-package-testing-start:Thursday, 18. December 2014 16:02 UTC kernel-stable-Promote-to-proposed-end:Thursday, 18. December 2014 22:02 UTC kernel-stable-Security-signoff-start:Friday, 19. December 2014 00:03 UTC kernel-stable-Verification-testing-start:Friday, 19. December 2014 00:02 UTC kernel-stable-Regression-testing-start:Friday, 19. December 2014 00:03 UTC kernel-stable-Verification-testing-end:Friday, 19. December 2014 12:01 UTC kernel-stable-Security-signoff-end:Friday, 19. December 2014 14:01 UTC kernel-stable-phase:CopyToUpdates kernel-stable-phase-changed:Monday, 12. January 2015 18:29 UTC kernel-stable-Promote-to-updates-start:Monday, 12. January 2015 18:29 UTC kernel-stable-Regression-testing-end:Monday, 12. January 2015 18:29 UTC kernel-stable-Promote-to-updates-end:Monday, 12. January 2015 20:45 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1403239/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1403239] Re: linux-ti-omap4: 3.2.0-1458.78 -proposed tracker
Promoted to Updates: linux-ti-omap4 | 3.2.0-1458.78 | precise-security | source linux-ti-omap4 | 3.2.0-1458.78 | precise-updates | source linux-meta-ti-omap4 | 3.2.0.1458.53 | precise-security | source linux-meta-ti-omap4 | 3.2.0.1458.53 | precise-updates | source ** Changed in: kernel-sru-workflow/promote-to-security Status: Confirmed => Fix Released ** Changed in: kernel-sru-workflow/promote-to-updates Status: Confirmed => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-ti-omap4 in Ubuntu. https://bugs.launchpad.net/bugs/1403239 Title: linux-ti-omap4: 3.2.0-1458.78 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow package-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Fix Released Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow upload-to-ppa series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux-ti-omap4 source package in Precise: Fix Released Bug description: This bug is for tracking the 3.2.0-1458.78 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 16. December 2014 23:03 UTC kernel-stable-master-bug:1403154 kernel-stable-Certification-testing-end:Thursday, 18. December 2014 12:02 UTC kernel-stable-Prepare-package-end:Thursday, 18. December 2014 16:02 UTC kernel-stable-Promote-to-proposed-start:Thursday, 18. December 2014 16:02 UTC ppa-package-testing-start:Thursday, 18. December 2014 16:02 UTC kernel-stable-Promote-to-proposed-end:Thursday, 18. December 2014 22:02 UTC kernel-stable-Security-signoff-start:Friday, 19. December 2014 00:03 UTC kernel-stable-Verification-testing-start:Friday, 19. December 2014 00:02 UTC kernel-stable-Regression-testing-start:Friday, 19. December 2014 00:03 UTC kernel-stable-Verification-testing-end:Friday, 19. December 2014 12:01 UTC kernel-stable-Security-signoff-end:Friday, 19. December 2014 14:01 UTC kernel-stable-phase:CopyToUpdates kernel-stable-phase-changed:Monday, 12. January 2015 18:29 UTC kernel-stable-Promote-to-updates-start:Monday, 12. January 2015 18:29 UTC kernel-stable-Regression-testing-end:Monday, 12. January 2015 18:29 UTC kernel-stable-Promote-to-updates-end:Monday, 12. January 2015 20:45 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1403239/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1408118] Re: hama uzzano keyboard do not work properly
Yes, the kernel panic stop happening, as i suspected i installed a wrong version. I'm sorry for the inconveniences -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1408118 Title: hama uzzano keyboard do not work properly Status in linux package in Ubuntu: Incomplete Bug description: Hello I recently tried to use a hama uzzano keyboard on ubuntu 14.10. This is a wireless keyboard. Some times starts working and then suddenly stops, but mostly it does not work. i looked if it was recognized and it is: lsusb: pau@traveller:~$ lsusb Bus 002 Device 002: ID 8087:0024 Intel Corp. Integrated Rate Matching Hub Bus 002 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub Bus 001 Device 003: ID 04ca:7012 Lite-On Technology Corp. Bus 001 Device 002: ID 8087:0024 Intel Corp. Integrated Rate Matching Hub Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub Bus 004 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub Bus 003 Device 003: ID 0930:021d Toshiba Corp. Bus 003 Device 008: ID 04d9:a01c Holtek Semiconductor, Inc. Bus 003 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub and dmesg | grep usb (partial) [ 8974.179356] input: HOLTEK Wireless USB Device as /devices/pci:00/:00:14.0/usb3/3-1/3-1:1.0/0003:04D9:A01C.000D/input/input29 [ 8974.179587] hid-generic 0003:04D9:A01C.000D: input,hidraw0: USB HID v1.10 Keyboard [HOLTEK Wireless USB Device] on usb-:00:14.0-1/input0 [ 8974.191755] input: HOLTEK Wireless USB Device as /devices/pci:00/:00:14.0/usb3/3-1/3-1:1.1/0003:04D9:A01C.000E/input/input30 [ 8974.192062] hid-generic 0003:04D9:A01C.000E: input,hidraw1: USB HID v1.10 Mouse [HOLTEK Wireless USB Device] on usb-:00:14.0-1/input1 i tried to solve the problem as it is explained here http://askubuntu.com/questions/160329/usb-keyboard-works-occasionally but it did not works. What can i do, i suppose this is a bug, do you need extra information? (it works with windows) thanks To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1408118/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1409379] Status changed to Confirmed
This change was made by a bot. ** Changed in: linux (Ubuntu) Status: New => Confirmed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1409379 Title: [Acer Aspire 5733Z] suspend/resume failure Status in linux package in Ubuntu: Confirmed Bug description: not recognizing iPad ProblemType: KernelOops DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-43-generic 3.13.0-43.72 ProcVersionSignature: Ubuntu 3.13.0-43.72-generic 3.13.11.11 Uname: Linux 3.13.0-43-generic x86_64 Annotation: This occured during a previous suspend and prevented it from resuming properly. ApportVersion: 2.14.4-0ubuntu1~ubuntu14.04.1~c42.ppa1 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: jeffrey2505 F pulseaudio Date: Thu Jan 8 23:34:04 2015 DuplicateSignature: suspend/resume:Acer Aspire 5733Z:V1.07 ExecutablePath: /usr/share/apport/apportcheckresume Failure: suspend/resume HibernationDevice: RESUME=UUID=617ecff1-710e-4615-8fa5-630b97b458b8 InterpreterPath: /usr/bin/python3.4 MachineType: Acer Aspire 5733Z ProcCmdline: /usr/bin/python3 /usr/share/apport/apportcheckresume ProcEnviron: TERM=linux PATH=(custom, no user) ProcFB: 0 inteldrmfb ProcKernelCmdLine: placeholder root=UUID=13aad992-0f2c-4566-b8ae-88f48802490a ro quiet splash PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No PulseAudio daemon running, or not running as session daemon. RelatedPackageVersions: linux-restricted-modules-3.13.0-43-generic N/A linux-backports-modules-3.13.0-43-generic N/A linux-firmware 1.127.10 SourcePackage: linux Title: [Acer Aspire 5733Z] suspend/resume failure UpgradeStatus: No upgrade log present (probably fresh install) UserGroups: dmi.bios.date: 11/07/2011 dmi.bios.vendor: Acer dmi.bios.version: V1.07 dmi.board.asset.tag: Base Board Asset Tag dmi.board.name: Aspire 5733Z dmi.board.vendor: Acer dmi.board.version: V1.07 dmi.chassis.type: 10 dmi.chassis.vendor: Acer dmi.chassis.version: V1.07 dmi.modalias: dmi:bvnAcer:bvrV1.07:bd11/07/2011:svnAcer:pnAspire5733Z:pvrV1.07:rvnAcer:rnAspire5733Z:rvrV1.07:cvnAcer:ct10:cvrV1.07: dmi.product.name: Aspire 5733Z dmi.product.version: V1.07 dmi.sys.vendor: Acer To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1409379/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1409379] Re: [Acer Aspire 5733Z] suspend/resume failure
** Tags removed: need-duplicate-check -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1409379 Title: [Acer Aspire 5733Z] suspend/resume failure Status in linux package in Ubuntu: New Bug description: not recognizing iPad ProblemType: KernelOops DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-43-generic 3.13.0-43.72 ProcVersionSignature: Ubuntu 3.13.0-43.72-generic 3.13.11.11 Uname: Linux 3.13.0-43-generic x86_64 Annotation: This occured during a previous suspend and prevented it from resuming properly. ApportVersion: 2.14.4-0ubuntu1~ubuntu14.04.1~c42.ppa1 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: jeffrey2505 F pulseaudio Date: Thu Jan 8 23:34:04 2015 DuplicateSignature: suspend/resume:Acer Aspire 5733Z:V1.07 ExecutablePath: /usr/share/apport/apportcheckresume Failure: suspend/resume HibernationDevice: RESUME=UUID=617ecff1-710e-4615-8fa5-630b97b458b8 InterpreterPath: /usr/bin/python3.4 MachineType: Acer Aspire 5733Z ProcCmdline: /usr/bin/python3 /usr/share/apport/apportcheckresume ProcEnviron: TERM=linux PATH=(custom, no user) ProcFB: 0 inteldrmfb ProcKernelCmdLine: placeholder root=UUID=13aad992-0f2c-4566-b8ae-88f48802490a ro quiet splash PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No PulseAudio daemon running, or not running as session daemon. RelatedPackageVersions: linux-restricted-modules-3.13.0-43-generic N/A linux-backports-modules-3.13.0-43-generic N/A linux-firmware 1.127.10 SourcePackage: linux Title: [Acer Aspire 5733Z] suspend/resume failure UpgradeStatus: No upgrade log present (probably fresh install) UserGroups: dmi.bios.date: 11/07/2011 dmi.bios.vendor: Acer dmi.bios.version: V1.07 dmi.board.asset.tag: Base Board Asset Tag dmi.board.name: Aspire 5733Z dmi.board.vendor: Acer dmi.board.version: V1.07 dmi.chassis.type: 10 dmi.chassis.vendor: Acer dmi.chassis.version: V1.07 dmi.modalias: dmi:bvnAcer:bvrV1.07:bd11/07/2011:svnAcer:pnAspire5733Z:pvrV1.07:rvnAcer:rnAspire5733Z:rvrV1.07:cvnAcer:ct10:cvrV1.07: dmi.product.name: Aspire 5733Z dmi.product.version: V1.07 dmi.sys.vendor: Acer To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1409379/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1409379] Re: [Acer Aspire 5733Z] suspend/resume failure
** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1409379 Title: [Acer Aspire 5733Z] suspend/resume failure Status in linux package in Ubuntu: New Bug description: not recognizing iPad ProblemType: KernelOops DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-43-generic 3.13.0-43.72 ProcVersionSignature: Ubuntu 3.13.0-43.72-generic 3.13.11.11 Uname: Linux 3.13.0-43-generic x86_64 Annotation: This occured during a previous suspend and prevented it from resuming properly. ApportVersion: 2.14.4-0ubuntu1~ubuntu14.04.1~c42.ppa1 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: jeffrey2505 F pulseaudio Date: Thu Jan 8 23:34:04 2015 DuplicateSignature: suspend/resume:Acer Aspire 5733Z:V1.07 ExecutablePath: /usr/share/apport/apportcheckresume Failure: suspend/resume HibernationDevice: RESUME=UUID=617ecff1-710e-4615-8fa5-630b97b458b8 InterpreterPath: /usr/bin/python3.4 MachineType: Acer Aspire 5733Z ProcCmdline: /usr/bin/python3 /usr/share/apport/apportcheckresume ProcEnviron: TERM=linux PATH=(custom, no user) ProcFB: 0 inteldrmfb ProcKernelCmdLine: placeholder root=UUID=13aad992-0f2c-4566-b8ae-88f48802490a ro quiet splash PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No PulseAudio daemon running, or not running as session daemon. RelatedPackageVersions: linux-restricted-modules-3.13.0-43-generic N/A linux-backports-modules-3.13.0-43-generic N/A linux-firmware 1.127.10 SourcePackage: linux Title: [Acer Aspire 5733Z] suspend/resume failure UpgradeStatus: No upgrade log present (probably fresh install) UserGroups: dmi.bios.date: 11/07/2011 dmi.bios.vendor: Acer dmi.bios.version: V1.07 dmi.board.asset.tag: Base Board Asset Tag dmi.board.name: Aspire 5733Z dmi.board.vendor: Acer dmi.board.version: V1.07 dmi.chassis.type: 10 dmi.chassis.vendor: Acer dmi.chassis.version: V1.07 dmi.modalias: dmi:bvnAcer:bvrV1.07:bd11/07/2011:svnAcer:pnAspire5733Z:pvrV1.07:rvnAcer:rnAspire5733Z:rvrV1.07:cvnAcer:ct10:cvrV1.07: dmi.product.name: Aspire 5733Z dmi.product.version: V1.07 dmi.sys.vendor: Acer To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1409379/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1409890] [NEW] linux: 3.16.0-30.40 -proposed tracker
Public bug reported: This bug is for tracking the 3.16.0-30.40 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Monday, 12. January 2015 20:07 UTC kernel-stable-phase:Prepare kernel-stable-phase-changed:Monday, 12. January 2015 20:07 UTC ** Affects: kernel-sru-workflow Importance: Medium Status: In Progress ** Affects: kernel-sru-workflow/certification-testing Importance: Medium Assignee: Canonical Hardware Certification (canonical-hw-cert) Status: New ** Affects: kernel-sru-workflow/package-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/prepare-package Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/prepare-package-meta Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/prepare-package-signed Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/promote-to-proposed Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-security Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-updates Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/regression-testing Importance: Medium Assignee: Canonical Platform QA Team (canonical-platform-qa) Status: New ** Affects: kernel-sru-workflow/security-signoff Importance: Medium Assignee: Canonical Security Team (canonical-security) Status: New ** Affects: kernel-sru-workflow/verification-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: linux (Ubuntu) Importance: Undecided Status: Invalid ** Tags: kernel-release-tracking-bug utopic ** Tags added: kernel-release-tracking-bug ** Tags added: utopic ** Also affects: kernel-sru-workflow/certification-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/package-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-meta Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-signed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-proposed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-security Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-updates Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/regression-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/security-signoff Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/verification-testing Importance: Undecided Status: New ** Changed in: kernel-sru-workflow Status: New => In Progress ** Changed in: kernel-sru-workflow Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/certification-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/certification-testing Assignee: (unassigned) => Canonical Hardware Certification (canonical-hw-cert) ** Changed in: kernel-sru-workflow/package-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/package-testing Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/prepare-package Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/prepare-package-meta Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/prepare-package-signed Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package-signed Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/promote-to-proposed Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/promote-to-proposed
[Kernel-packages] [Bug 1386395] Re: CVE-2014-8369
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1458.78 --- linux-ti-omap4 (3.2.0-1458.78) precise; urgency=low * Release Tracking Bug - LP: #1403239 [ Luis Henriques ] * rebased on Ubuntu-3.2.0-75.110 [ Ubuntu: 3.2.0-75.110 ] * Release Tracking Bug - LP: #1403154 * kvm: fix excessive pages un-pinning in kvm_iommu_map error path. - LP: #1386395 - CVE-2014-8369 * KVM: x86: Don't report guest userspace emulation error to userspace - LP: #1392823 - CVE-2014-7842 * drivers:scsi:storvsc: Fix a bug in handling ring buffer failures that may result in I/O freeze - LP: #1400289 * net:socket: set msg_namelen to 0 if msg_name is passed as NULL in msghdr struct from userland. - LP: #1335478 [ Ubuntu: 3.2.0-74.109 ] * Release Tracking Bug - LP: #1400709 * x86_64, traps: Stop using IST for #SS - LP: #1398795 - CVE-2014-9090 * x86_64, traps: Fix the espfix64 #DF fixup and rewrite it in C - LP: #1398795 - CVE-2014-9090 * x86_64, traps: Rework bad_iret - LP: #1398795 - CVE-2014-9090 * x86, kvm: Clear paravirt_enabled on KVM guests for espfix32's benefit - LP: #1400314 - CVE-2014-8134 -- Luis HenriquesThu, 18 Dec 2014 10:59:10 + -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1386395 Title: CVE-2014-8369 Status in linux package in Ubuntu: Fix Committed Status in linux-armadaxp package in Ubuntu: Invalid Status in linux-ec2 package in Ubuntu: Invalid Status in linux-fsl-imx51 package in Ubuntu: Invalid Status in linux-lts-backport-maverick package in Ubuntu: New Status in linux-lts-backport-natty package in Ubuntu: New Status in linux-lts-quantal package in Ubuntu: Invalid Status in linux-lts-raring package in Ubuntu: Invalid Status in linux-lts-saucy package in Ubuntu: Invalid Status in linux-lts-trusty package in Ubuntu: Invalid Status in linux-lts-utopic package in Ubuntu: Invalid Status in linux-mvl-dove package in Ubuntu: Invalid Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux source package in Lucid: Invalid Status in linux-armadaxp source package in Lucid: Invalid Status in linux-ec2 source package in Lucid: Invalid Status in linux-fsl-imx51 source package in Lucid: Invalid Status in linux-lts-backport-maverick source package in Lucid: New Status in linux-lts-backport-natty source package in Lucid: New Status in linux-lts-quantal source package in Lucid: Invalid Status in linux-lts-raring source package in Lucid: Invalid Status in linux-lts-saucy source package in Lucid: Invalid Status in linux-lts-trusty source package in Lucid: Invalid Status in linux-lts-utopic source package in Lucid: Invalid Status in linux-mvl-dove source package in Lucid: Invalid Status in linux-ti-omap4 source package in Lucid: Invalid Status in linux source package in Precise: Fix Released Status in linux-armadaxp source package in Precise: Fix Released Status in linux-ec2 source package in Precise: Invalid Status in linux-fsl-imx51 source package in Precise: Invalid Status in linux-lts-backport-maverick source package in Precise: New Status in linux-lts-backport-natty source package in Precise: New Status in linux-lts-quantal source package in Precise: Fix Committed Status in linux-lts-raring source package in Precise: Invalid Status in linux-lts-saucy source package in Precise: Fix Committed Status in linux-lts-trusty source package in Precise: Fix Released Status in linux-lts-utopic source package in Precise: Invalid Status in linux-mvl-dove source package in Precise: Invalid Status in linux-ti-omap4 source package in Precise: Fix Released Status in linux source package in Trusty: Fix Released Status in linux-armadaxp source package in Trusty: Invalid Status in linux-ec2 source package in Trusty: Invalid Status in linux-fsl-imx51 source package in Trusty: Invalid Status in linux-lts-backport-maverick source package in Trusty: New Status in linux-lts-backport-natty source package in Trusty: New Status in linux-lts-quantal source package in Trusty: Invalid Status in linux-lts-raring source package in Trusty: Invalid Status in linux-lts-saucy source package in Trusty: Invalid Status in linux-lts-trusty source package in Trusty: Invalid Status in linux-lts-utopic source package in Trusty: Fix Released Status in linux-mvl-dove source package in Trusty: Invalid Status in linux-ti-omap4 source package in Trusty: Invalid Status in linux source package in Utopic: Fix Released Status in linux-armadaxp source package in Utopic: Invalid Status in linux-ec2 source package in Utopic: Invalid Status in linux-fsl-imx51 source package in Utopic: Invalid Status in linux-lts-backport-maverick source package in Utopic: New Status in linux-lts-backport-natty source p
[Kernel-packages] [Bug 1403239] Re: linux-ti-omap4: 3.2.0-1458.78 -proposed tracker
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1458.78 --- linux-ti-omap4 (3.2.0-1458.78) precise; urgency=low * Release Tracking Bug - LP: #1403239 [ Luis Henriques ] * rebased on Ubuntu-3.2.0-75.110 [ Ubuntu: 3.2.0-75.110 ] * Release Tracking Bug - LP: #1403154 * kvm: fix excessive pages un-pinning in kvm_iommu_map error path. - LP: #1386395 - CVE-2014-8369 * KVM: x86: Don't report guest userspace emulation error to userspace - LP: #1392823 - CVE-2014-7842 * drivers:scsi:storvsc: Fix a bug in handling ring buffer failures that may result in I/O freeze - LP: #1400289 * net:socket: set msg_namelen to 0 if msg_name is passed as NULL in msghdr struct from userland. - LP: #1335478 [ Ubuntu: 3.2.0-74.109 ] * Release Tracking Bug - LP: #1400709 * x86_64, traps: Stop using IST for #SS - LP: #1398795 - CVE-2014-9090 * x86_64, traps: Fix the espfix64 #DF fixup and rewrite it in C - LP: #1398795 - CVE-2014-9090 * x86_64, traps: Rework bad_iret - LP: #1398795 - CVE-2014-9090 * x86, kvm: Clear paravirt_enabled on KVM guests for espfix32's benefit - LP: #1400314 - CVE-2014-8134 -- Luis HenriquesThu, 18 Dec 2014 10:59:10 + ** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: New => Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-7842 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-8134 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-8369 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-9090 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-ti-omap4 in Ubuntu. https://bugs.launchpad.net/bugs/1403239 Title: linux-ti-omap4: 3.2.0-1458.78 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow package-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Confirmed Status in Kernel SRU Workflow promote-to-updates series: Confirmed Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow upload-to-ppa series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux-ti-omap4 source package in Precise: Fix Released Bug description: This bug is for tracking the 3.2.0-1458.78 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 16. December 2014 23:03 UTC kernel-stable-master-bug:1403154 kernel-stable-Certification-testing-end:Thursday, 18. December 2014 12:02 UTC kernel-stable-Prepare-package-end:Thursday, 18. December 2014 16:02 UTC kernel-stable-Promote-to-proposed-start:Thursday, 18. December 2014 16:02 UTC ppa-package-testing-start:Thursday, 18. December 2014 16:02 UTC kernel-stable-Promote-to-proposed-end:Thursday, 18. December 2014 22:02 UTC kernel-stable-Security-signoff-start:Friday, 19. December 2014 00:03 UTC kernel-stable-Verification-testing-start:Friday, 19. December 2014 00:02 UTC kernel-stable-Regression-testing-start:Friday, 19. December 2014 00:03 UTC kernel-stable-Verification-testing-end:Friday, 19. December 2014 12:01 UTC kernel-stable-Security-signoff-end:Friday, 19. December 2014 14:01 UTC kernel-stable-phase:CopyToUpdates kernel-stable-phase-changed:Monday, 12. January 2015 18:29 UTC kernel-stable-Promote-to-updates-start:Monday, 12. January 2015 18:29 UTC kernel-stable-Regression-testing-end:Monday, 12. January 2015 18:29 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1403239/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1392823] Re: CVE-2014-7842
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1458.78 --- linux-ti-omap4 (3.2.0-1458.78) precise; urgency=low * Release Tracking Bug - LP: #1403239 [ Luis Henriques ] * rebased on Ubuntu-3.2.0-75.110 [ Ubuntu: 3.2.0-75.110 ] * Release Tracking Bug - LP: #1403154 * kvm: fix excessive pages un-pinning in kvm_iommu_map error path. - LP: #1386395 - CVE-2014-8369 * KVM: x86: Don't report guest userspace emulation error to userspace - LP: #1392823 - CVE-2014-7842 * drivers:scsi:storvsc: Fix a bug in handling ring buffer failures that may result in I/O freeze - LP: #1400289 * net:socket: set msg_namelen to 0 if msg_name is passed as NULL in msghdr struct from userland. - LP: #1335478 [ Ubuntu: 3.2.0-74.109 ] * Release Tracking Bug - LP: #1400709 * x86_64, traps: Stop using IST for #SS - LP: #1398795 - CVE-2014-9090 * x86_64, traps: Fix the espfix64 #DF fixup and rewrite it in C - LP: #1398795 - CVE-2014-9090 * x86_64, traps: Rework bad_iret - LP: #1398795 - CVE-2014-9090 * x86, kvm: Clear paravirt_enabled on KVM guests for espfix32's benefit - LP: #1400314 - CVE-2014-8134 -- Luis HenriquesThu, 18 Dec 2014 10:59:10 + ** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: Fix Committed => Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-8134 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-9090 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1392823 Title: CVE-2014-7842 Status in linux package in Ubuntu: Fix Committed Status in linux-armadaxp package in Ubuntu: Invalid Status in linux-ec2 package in Ubuntu: Invalid Status in linux-fsl-imx51 package in Ubuntu: Invalid Status in linux-lts-backport-maverick package in Ubuntu: New Status in linux-lts-backport-natty package in Ubuntu: New Status in linux-lts-quantal package in Ubuntu: Invalid Status in linux-lts-raring package in Ubuntu: Invalid Status in linux-lts-saucy package in Ubuntu: Invalid Status in linux-lts-trusty package in Ubuntu: Invalid Status in linux-lts-utopic package in Ubuntu: Invalid Status in linux-mvl-dove package in Ubuntu: Invalid Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux source package in Lucid: Invalid Status in linux-armadaxp source package in Lucid: Invalid Status in linux-ec2 source package in Lucid: Invalid Status in linux-fsl-imx51 source package in Lucid: Invalid Status in linux-lts-backport-maverick source package in Lucid: New Status in linux-lts-backport-natty source package in Lucid: New Status in linux-lts-quantal source package in Lucid: Invalid Status in linux-lts-raring source package in Lucid: Invalid Status in linux-lts-saucy source package in Lucid: Invalid Status in linux-lts-trusty source package in Lucid: Invalid Status in linux-lts-utopic source package in Lucid: Invalid Status in linux-mvl-dove source package in Lucid: Invalid Status in linux-ti-omap4 source package in Lucid: Invalid Status in linux source package in Precise: Fix Released Status in linux-armadaxp source package in Precise: Fix Released Status in linux-ec2 source package in Precise: Invalid Status in linux-fsl-imx51 source package in Precise: Invalid Status in linux-lts-backport-maverick source package in Precise: New Status in linux-lts-backport-natty source package in Precise: New Status in linux-lts-quantal source package in Precise: Fix Committed Status in linux-lts-raring source package in Precise: Invalid Status in linux-lts-saucy source package in Precise: Fix Committed Status in linux-lts-trusty source package in Precise: Fix Committed Status in linux-lts-utopic source package in Precise: Invalid Status in linux-mvl-dove source package in Precise: Invalid Status in linux-ti-omap4 source package in Precise: Fix Released Status in linux source package in Trusty: Fix Committed Status in linux-armadaxp source package in Trusty: Invalid Status in linux-ec2 source package in Trusty: Invalid Status in linux-fsl-imx51 source package in Trusty: Invalid Status in linux-lts-backport-maverick source package in Trusty: New Status in linux-lts-backport-natty source package in Trusty: New Status in linux-lts-quantal source package in Trusty: Invalid Status in linux-lts-raring source package in Trusty: Invalid Status in linux-lts-saucy source package in Trusty: Invalid Status in linux-lts-trusty source package in Trusty: Invalid Status in linux-lts-utopic source package in Trusty: Fix Committed Status in linux-mvl-dove source package in Trusty: Invalid Status in linux-ti-omap4 source package in Trusty: Invalid Status in linux source package in Utopic: Fix Committed Status in linux-armadaxp source package in
[Kernel-packages] [Bug 1386395] Re: CVE-2014-8369
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1458.78 --- linux-ti-omap4 (3.2.0-1458.78) precise; urgency=low * Release Tracking Bug - LP: #1403239 [ Luis Henriques ] * rebased on Ubuntu-3.2.0-75.110 [ Ubuntu: 3.2.0-75.110 ] * Release Tracking Bug - LP: #1403154 * kvm: fix excessive pages un-pinning in kvm_iommu_map error path. - LP: #1386395 - CVE-2014-8369 * KVM: x86: Don't report guest userspace emulation error to userspace - LP: #1392823 - CVE-2014-7842 * drivers:scsi:storvsc: Fix a bug in handling ring buffer failures that may result in I/O freeze - LP: #1400289 * net:socket: set msg_namelen to 0 if msg_name is passed as NULL in msghdr struct from userland. - LP: #1335478 [ Ubuntu: 3.2.0-74.109 ] * Release Tracking Bug - LP: #1400709 * x86_64, traps: Stop using IST for #SS - LP: #1398795 - CVE-2014-9090 * x86_64, traps: Fix the espfix64 #DF fixup and rewrite it in C - LP: #1398795 - CVE-2014-9090 * x86_64, traps: Rework bad_iret - LP: #1398795 - CVE-2014-9090 * x86, kvm: Clear paravirt_enabled on KVM guests for espfix32's benefit - LP: #1400314 - CVE-2014-8134 -- Luis HenriquesThu, 18 Dec 2014 10:59:10 + ** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: Fix Committed => Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-8134 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-9090 ** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1386395 Title: CVE-2014-8369 Status in linux package in Ubuntu: Fix Committed Status in linux-armadaxp package in Ubuntu: Invalid Status in linux-ec2 package in Ubuntu: Invalid Status in linux-fsl-imx51 package in Ubuntu: Invalid Status in linux-lts-backport-maverick package in Ubuntu: New Status in linux-lts-backport-natty package in Ubuntu: New Status in linux-lts-quantal package in Ubuntu: Invalid Status in linux-lts-raring package in Ubuntu: Invalid Status in linux-lts-saucy package in Ubuntu: Invalid Status in linux-lts-trusty package in Ubuntu: Invalid Status in linux-lts-utopic package in Ubuntu: Invalid Status in linux-mvl-dove package in Ubuntu: Invalid Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux source package in Lucid: Invalid Status in linux-armadaxp source package in Lucid: Invalid Status in linux-ec2 source package in Lucid: Invalid Status in linux-fsl-imx51 source package in Lucid: Invalid Status in linux-lts-backport-maverick source package in Lucid: New Status in linux-lts-backport-natty source package in Lucid: New Status in linux-lts-quantal source package in Lucid: Invalid Status in linux-lts-raring source package in Lucid: Invalid Status in linux-lts-saucy source package in Lucid: Invalid Status in linux-lts-trusty source package in Lucid: Invalid Status in linux-lts-utopic source package in Lucid: Invalid Status in linux-mvl-dove source package in Lucid: Invalid Status in linux-ti-omap4 source package in Lucid: Invalid Status in linux source package in Precise: Fix Released Status in linux-armadaxp source package in Precise: Fix Released Status in linux-ec2 source package in Precise: Invalid Status in linux-fsl-imx51 source package in Precise: Invalid Status in linux-lts-backport-maverick source package in Precise: New Status in linux-lts-backport-natty source package in Precise: New Status in linux-lts-quantal source package in Precise: Fix Committed Status in linux-lts-raring source package in Precise: Invalid Status in linux-lts-saucy source package in Precise: Fix Committed Status in linux-lts-trusty source package in Precise: Fix Released Status in linux-lts-utopic source package in Precise: Invalid Status in linux-mvl-dove source package in Precise: Invalid Status in linux-ti-omap4 source package in Precise: Fix Released Status in linux source package in Trusty: Fix Released Status in linux-armadaxp source package in Trusty: Invalid Status in linux-ec2 source package in Trusty: Invalid Status in linux-fsl-imx51 source package in Trusty: Invalid Status in linux-lts-backport-maverick source package in Trusty: New Status in linux-lts-backport-natty source package in Trusty: New Status in linux-lts-quantal source package in Trusty: Invalid Status in linux-lts-raring source package in Trusty: Invalid Status in linux-lts-saucy source package in Trusty: Invalid Status in linux-lts-trusty source package in Trusty: Invalid Status in linux-lts-utopic source package in Trusty: Fix Released Status in linux-mvl-dove source package in Trusty: Invalid Status in linux-ti-omap4 source package in Trusty: Invalid Status in l
[Kernel-packages] [Bug 1403239] Re: linux-ti-omap4: 3.2.0-1458.78 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Assignee: (unassigned) => Chris J Arges (arges) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-ti-omap4 in Ubuntu. https://bugs.launchpad.net/bugs/1403239 Title: linux-ti-omap4: 3.2.0-1458.78 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow package-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Confirmed Status in Kernel SRU Workflow promote-to-updates series: Confirmed Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow upload-to-ppa series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux-ti-omap4 source package in Precise: New Bug description: This bug is for tracking the 3.2.0-1458.78 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 16. December 2014 23:03 UTC kernel-stable-master-bug:1403154 kernel-stable-Certification-testing-end:Thursday, 18. December 2014 12:02 UTC kernel-stable-Prepare-package-end:Thursday, 18. December 2014 16:02 UTC kernel-stable-Promote-to-proposed-start:Thursday, 18. December 2014 16:02 UTC ppa-package-testing-start:Thursday, 18. December 2014 16:02 UTC kernel-stable-Promote-to-proposed-end:Thursday, 18. December 2014 22:02 UTC kernel-stable-Security-signoff-start:Friday, 19. December 2014 00:03 UTC kernel-stable-Verification-testing-start:Friday, 19. December 2014 00:02 UTC kernel-stable-Regression-testing-start:Friday, 19. December 2014 00:03 UTC kernel-stable-Verification-testing-end:Friday, 19. December 2014 12:01 UTC kernel-stable-Security-signoff-end:Friday, 19. December 2014 14:01 UTC kernel-stable-phase:CopyToUpdates kernel-stable-phase-changed:Monday, 12. January 2015 18:29 UTC kernel-stable-Promote-to-updates-start:Monday, 12. January 2015 18:29 UTC kernel-stable-Regression-testing-end:Monday, 12. January 2015 18:29 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1403239/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1403154] Re: linux: 3.2.0-75.110 -proposed tracker
The package has been published and the bug is being set to Fix Released ** Changed in: kernel-sru-workflow Status: In Progress => Fix Released ** Description changed: This bug is for tracking the 3.2.0-75.110 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 16. December 2014 17:50 UTC kernel-stable-Prepare-package-end:Tuesday, 16. December 2014 23:08 UTC kernel-stable-Promote-to-proposed-start:Tuesday, 16. December 2014 23:08 UTC ppa-package-testing-start:Tuesday, 16. December 2014 23:08 UTC kernel-stable-Promote-to-proposed-end:Wednesday, 17. December 2014 18:20 UTC kernel-stable-Verification-testing-start:Wednesday, 17. December 2014 20:01 UTC kernel-stable-Certification-testing-start:Wednesday, 17. December 2014 20:02 UTC kernel-stable-Security-signoff-start:Wednesday, 17. December 2014 20:02 UTC kernel-stable-Regression-testing-start:Wednesday, 17. December 2014 20:02 UTC kernel-stable-Security-signoff-end:Thursday, 18. December 2014 14:01 UTC kernel-stable-Certification-testing-end:Wednesday, 07. January 2015 10:01 UTC kernel-stable-Regression-testing-end:Friday, 09. January 2015 16:10 UTC - kernel-stable-phase:CopyToUpdates - kernel-stable-phase-changed:Friday, 09. January 2015 16:20 UTC kernel-stable-Promote-to-updates-start:Friday, 09. January 2015 16:20 UTC kernel-stable-Promote-to-updates-end:Monday, 12. January 2015 17:35 UTC + kernel-stable-phase:Released + kernel-stable-phase-changed:Monday, 12. January 2015 19:05 UTC -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1403154 Title: linux: 3.2.0-75.110 -proposed tracker Status in Kernel SRU Workflow: Fix Released Status in Kernel SRU Workflow certification-testing series: Fix Released Status in Kernel SRU Workflow package-testing series: Fix Released Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-lbm series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Fix Released Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux package in Ubuntu: Invalid Status in linux source package in Precise: Fix Released Bug description: This bug is for tracking the 3.2.0-75.110 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 16. December 2014 17:50 UTC kernel-stable-Prepare-package-end:Tuesday, 16. December 2014 23:08 UTC kernel-stable-Promote-to-proposed-start:Tuesday, 16. December 2014 23:08 UTC ppa-package-testing-start:Tuesday, 16. December 2014 23:08 UTC kernel-stable-Promote-to-proposed-end:Wednesday, 17. December 2014 18:20 UTC kernel-stable-Verification-testing-start:Wednesday, 17. December 2014 20:01 UTC kernel-stable-Certification-testing-start:Wednesday, 17. December 2014 20:02 UTC kernel-stable-Security-signoff-start:Wednesday, 17. December 2014 20:02 UTC kernel-stable-Regression-testing-start:Wednesday, 17. December 2014 20:02 UTC kernel-stable-Security-signoff-end:Thursday, 18. December 2014 14:01 UTC kernel-stable-Certification-testing-end:Wednesday, 07. January 2015 10:01 UTC kernel-stable-Regression-testing-end:Friday, 09. January 2015 16:10 UTC kernel-stable-Promote-to-updates-start:Friday, 09. January 2015 16:20 UTC kernel-stable-Promote-to-updates-end:Monday, 12. January 2015 17:35 UTC kernel-stable-phase:Released kernel-stable-phase-changed:Monday, 12. January 2015 19:05 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1403154/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1403240] Re: linux-armadaxp: 3.2.0-1643.62 -proposed tracker
The package has been published and the bug is being set to Fix Released ** Changed in: kernel-sru-workflow Status: In Progress => Fix Released ** Description changed: This bug is for tracking the 3.2.0-1643.62 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 16. December 2014 23:05 UTC kernel-stable-master-bug:1403154 kernel-stable-Certification-testing-end:Wednesday, 17. December 2014 03:02 UTC kernel-stable-Security-signoff-end:Wednesday, 17. December 2014 03:02 UTC kernel-stable-Prepare-package-end:Wednesday, 17. December 2014 06:03 UTC kernel-stable-Promote-to-proposed-start:Wednesday, 17. December 2014 06:03 UTC ppa-package-testing-start:Wednesday, 17. December 2014 06:03 UTC kernel-stable-Promote-to-proposed-end:Wednesday, 17. December 2014 19:09 UTC kernel-stable-Verification-testing-start:Wednesday, 17. December 2014 21:01 UTC kernel-stable-Regression-testing-start:Wednesday, 17. December 2014 21:01 UTC kernel-stable-Regression-testing-end:Thursday, 18. December 2014 05:02 UTC - kernel-stable-phase:CopyToUpdates - kernel-stable-phase-changed:Friday, 09. January 2015 16:20 UTC kernel-stable-Promote-to-updates-start:Friday, 09. January 2015 16:20 UTC kernel-stable-Promote-to-updates-end:Monday, 12. January 2015 17:44 UTC + kernel-stable-phase:Released + kernel-stable-phase-changed:Monday, 12. January 2015 19:06 UTC -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1403240 Title: linux-armadaxp: 3.2.0-1643.62 -proposed tracker Status in Kernel SRU Workflow: Fix Released Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow package-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Fix Released Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Invalid Status in Kernel SRU Workflow upload-to-ppa series: Invalid Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux-armadaxp package in Ubuntu: Invalid Status in linux-armadaxp source package in Precise: Fix Released Bug description: This bug is for tracking the 3.2.0-1643.62 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 16. December 2014 23:05 UTC kernel-stable-master-bug:1403154 kernel-stable-Certification-testing-end:Wednesday, 17. December 2014 03:02 UTC kernel-stable-Security-signoff-end:Wednesday, 17. December 2014 03:02 UTC kernel-stable-Prepare-package-end:Wednesday, 17. December 2014 06:03 UTC kernel-stable-Promote-to-proposed-start:Wednesday, 17. December 2014 06:03 UTC ppa-package-testing-start:Wednesday, 17. December 2014 06:03 UTC kernel-stable-Promote-to-proposed-end:Wednesday, 17. December 2014 19:09 UTC kernel-stable-Verification-testing-start:Wednesday, 17. December 2014 21:01 UTC kernel-stable-Regression-testing-start:Wednesday, 17. December 2014 21:01 UTC kernel-stable-Regression-testing-end:Thursday, 18. December 2014 05:02 UTC kernel-stable-Promote-to-updates-start:Friday, 09. January 2015 16:20 UTC kernel-stable-Promote-to-updates-end:Monday, 12. January 2015 17:44 UTC kernel-stable-phase:Released kernel-stable-phase-changed:Monday, 12. January 2015 19:06 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1403240/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1403943] Re: linux: 2.6.32-71.138 -proposed tracker
** Description changed: This bug is for tracking the 2.6.32-71.138 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Thursday, 18. December 2014 16:18 UTC kernel-stable-Prepare-package-end:Friday, 19. December 2014 00:07 UTC kernel-stable-Promote-to-proposed-start:Friday, 19. December 2014 00:07 UTC ppa-package-testing-start:Friday, 19. December 2014 00:07 UTC kernel-stable-Promote-to-proposed-end:Friday, 19. December 2014 08:02 UTC kernel-stable-Verification-testing-start:Friday, 19. December 2014 10:03 UTC kernel-stable-Certification-testing-start:Friday, 19. December 2014 10:03 UTC kernel-stable-Security-signoff-start:Friday, 19. December 2014 10:03 UTC kernel-stable-Regression-testing-start:Friday, 19. December 2014 10:03 UTC kernel-stable-Security-signoff-end:Friday, 19. December 2014 14:02 UTC kernel-stable-Certification-testing-end:Wednesday, 07. January 2015 09:01 UTC kernel-stable-Verification-testing-end:Thursday, 08. January 2015 16:02 UTC kernel-stable-phase:CopyToUpdates kernel-stable-phase-changed:Friday, 09. January 2015 16:01 UTC kernel-stable-Promote-to-updates-start:Friday, 09. January 2015 16:01 UTC kernel-stable-Regression-testing-end:Friday, 09. January 2015 16:01 UTC + kernel-stable-Promote-to-updates-end:Monday, 12. January 2015 19:07 UTC -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1403943 Title: linux: 2.6.32-71.138 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: Fix Released Status in Kernel SRU Workflow package-testing series: Fix Released Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-lbm series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-ports-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Fix Released Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux package in Ubuntu: Invalid Status in linux source package in Lucid: Fix Released Bug description: This bug is for tracking the 2.6.32-71.138 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Thursday, 18. December 2014 16:18 UTC kernel-stable-Prepare-package-end:Friday, 19. December 2014 00:07 UTC kernel-stable-Promote-to-proposed-start:Friday, 19. December 2014 00:07 UTC ppa-package-testing-start:Friday, 19. December 2014 00:07 UTC kernel-stable-Promote-to-proposed-end:Friday, 19. December 2014 08:02 UTC kernel-stable-Verification-testing-start:Friday, 19. December 2014 10:03 UTC kernel-stable-Certification-testing-start:Friday, 19. December 2014 10:03 UTC kernel-stable-Security-signoff-start:Friday, 19. December 2014 10:03 UTC kernel-stable-Regression-testing-start:Friday, 19. December 2014 10:03 UTC kernel-stable-Security-signoff-end:Friday, 19. December 2014 14:02 UTC kernel-stable-Certification-testing-end:Wednesday, 07. January 2015 09:01 UTC kernel-stable-Verification-testing-end:Thursday, 08. January 2015 16:02 UTC kernel-stable-phase:CopyToUpdates kernel-stable-phase-changed:Friday, 09. January 2015 16:01 UTC kernel-stable-Promote-to-updates-start:Friday, 09. January 2015 16:01 UTC kernel-stable-Regression-testing-end:Friday, 09. January 2015 16:01 UTC kernel-stable-Promote-to-updates-end:Monday, 12. January 2015 19:07 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1403943/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1402822] Re: linux: 3.16.0-29.39 -proposed tracker
The package has been published and the bug is being set to Fix Released ** Changed in: kernel-sru-workflow Status: In Progress => Fix Released ** Description changed: This bug is for tracking the 3.16.0-29.39 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Monday, 15. December 2014 20:29 UTC kernel-stable-Prepare-package-end:Tuesday, 16. December 2014 07:03 UTC kernel-stable-Promote-to-proposed-start:Tuesday, 16. December 2014 07:03 UTC ppa-package-testing-start:Tuesday, 16. December 2014 07:03 UTC kernel-stable-Promote-to-proposed-end:Wednesday, 17. December 2014 20:06 UTC kernel-stable-Verification-testing-start:Wednesday, 17. December 2014 22:00 UTC kernel-stable-Certification-testing-start:Wednesday, 17. December 2014 22:00 UTC kernel-stable-Security-signoff-start:Wednesday, 17. December 2014 22:00 UTC kernel-stable-Regression-testing-start:Wednesday, 17. December 2014 22:00 UTC kernel-stable-Security-signoff-end:Thursday, 18. December 2014 14:00 UTC kernel-stable-Certification-testing-end:Wednesday, 07. January 2015 16:00 UTC kernel-stable-Regression-testing-end:Friday, 09. January 2015 16:06 UTC - kernel-stable-phase:CopyToUpdates - kernel-stable-phase-changed:Friday, 09. January 2015 16:18 UTC kernel-stable-Promote-to-updates-start:Friday, 09. January 2015 16:18 UTC kernel-stable-Promote-to-updates-end:Monday, 12. January 2015 17:02 UTC + kernel-stable-phase:Released + kernel-stable-phase-changed:Monday, 12. January 2015 19:01 UTC -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1402822 Title: linux: 3.16.0-29.39 -proposed tracker Status in Kernel SRU Workflow: Fix Released Status in Kernel SRU Workflow certification-testing series: Fix Released Status in Kernel SRU Workflow package-testing series: In Progress Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Fix Released Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux package in Ubuntu: Invalid Status in linux source package in Utopic: Fix Released Bug description: This bug is for tracking the 3.16.0-29.39 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Monday, 15. December 2014 20:29 UTC kernel-stable-Prepare-package-end:Tuesday, 16. December 2014 07:03 UTC kernel-stable-Promote-to-proposed-start:Tuesday, 16. December 2014 07:03 UTC ppa-package-testing-start:Tuesday, 16. December 2014 07:03 UTC kernel-stable-Promote-to-proposed-end:Wednesday, 17. December 2014 20:06 UTC kernel-stable-Verification-testing-start:Wednesday, 17. December 2014 22:00 UTC kernel-stable-Certification-testing-start:Wednesday, 17. December 2014 22:00 UTC kernel-stable-Security-signoff-start:Wednesday, 17. December 2014 22:00 UTC kernel-stable-Regression-testing-start:Wednesday, 17. December 2014 22:00 UTC kernel-stable-Security-signoff-end:Thursday, 18. December 2014 14:00 UTC kernel-stable-Certification-testing-end:Wednesday, 07. January 2015 16:00 UTC kernel-stable-Regression-testing-end:Friday, 09. January 2015 16:06 UTC kernel-stable-Promote-to-updates-start:Friday, 09. January 2015 16:18 UTC kernel-stable-Promote-to-updates-end:Monday, 12. January 2015 17:02 UTC kernel-stable-phase:Released kernel-stable-phase-changed:Monday, 12. January 2015 19:01 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1402822/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1402872] Re: linux: 3.13.0-44.73 -proposed tracker
The package has been published and the bug is being set to Fix Released ** Changed in: kernel-sru-workflow Status: In Progress => Fix Released ** Description changed: This bug is for tracking the 3.13.0-44.73 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Monday, 15. December 2014 23:54 UTC kernel-stable-Prepare-package-end:Tuesday, 16. December 2014 07:08 UTC kernel-stable-Promote-to-proposed-start:Tuesday, 16. December 2014 07:08 UTC ppa-package-testing-start:Tuesday, 16. December 2014 07:08 UTC kernel-stable-Promote-to-proposed-end:Tuesday, 16. December 2014 22:00 UTC kernel-stable-Verification-testing-start:Tuesday, 16. December 2014 23:01 UTC kernel-stable-Certification-testing-start:Tuesday, 16. December 2014 23:01 UTC kernel-stable-Security-signoff-start:Tuesday, 16. December 2014 23:01 UTC kernel-stable-Regression-testing-start:Tuesday, 16. December 2014 23:01 UTC kernel-stable-Security-signoff-end:Thursday, 18. December 2014 14:00 UTC kernel-stable-Certification-testing-end:Wednesday, 07. January 2015 16:00 UTC kernel-stable-Regression-testing-end:Friday, 09. January 2015 16:06 UTC - kernel-stable-phase:CopyToUpdates - kernel-stable-phase-changed:Friday, 09. January 2015 16:18 UTC kernel-stable-Promote-to-updates-start:Friday, 09. January 2015 16:18 UTC kernel-stable-Promote-to-updates-end:Monday, 12. January 2015 17:34 UTC + kernel-stable-phase:Released + kernel-stable-phase-changed:Monday, 12. January 2015 19:02 UTC -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1402872 Title: linux: 3.13.0-44.73 -proposed tracker Status in Kernel SRU Workflow: Fix Released Status in Kernel SRU Workflow certification-testing series: Fix Released Status in Kernel SRU Workflow package-testing series: Fix Released Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Fix Released Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux package in Ubuntu: Invalid Status in linux source package in Trusty: Fix Released Bug description: This bug is for tracking the 3.13.0-44.73 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Monday, 15. December 2014 23:54 UTC kernel-stable-Prepare-package-end:Tuesday, 16. December 2014 07:08 UTC kernel-stable-Promote-to-proposed-start:Tuesday, 16. December 2014 07:08 UTC ppa-package-testing-start:Tuesday, 16. December 2014 07:08 UTC kernel-stable-Promote-to-proposed-end:Tuesday, 16. December 2014 22:00 UTC kernel-stable-Verification-testing-start:Tuesday, 16. December 2014 23:01 UTC kernel-stable-Certification-testing-start:Tuesday, 16. December 2014 23:01 UTC kernel-stable-Security-signoff-start:Tuesday, 16. December 2014 23:01 UTC kernel-stable-Regression-testing-start:Tuesday, 16. December 2014 23:01 UTC kernel-stable-Security-signoff-end:Thursday, 18. December 2014 14:00 UTC kernel-stable-Certification-testing-end:Wednesday, 07. January 2015 16:00 UTC kernel-stable-Regression-testing-end:Friday, 09. January 2015 16:06 UTC kernel-stable-Promote-to-updates-start:Friday, 09. January 2015 16:18 UTC kernel-stable-Promote-to-updates-end:Monday, 12. January 2015 17:34 UTC kernel-stable-phase:Released kernel-stable-phase-changed:Monday, 12. January 2015 19:02 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1402872/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1409750] Re: grub2/kernel EFI firware size interface
Looking at the patch, it appears to fall back to the previous behavior if it fails to read the new sysfs knob, so including it won't cause any harm, but without the corresponding kernel patch, it won't do what it is supposed to do either. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1409750 Title: grub2/kernel EFI firware size interface Status in grub2 package in Ubuntu: Triaged Status in linux package in Ubuntu: Triaged Bug description: Seems that grub2 needs the ability to "size" the EFI implementation it is running on. This is being exposed via the kernel in a patch queued for v3.20 (http://comments.gmane.org/gmane.linux.kernel.efi/5229). This is being taken early in debian under debian #775191 (linux) and debian #775202 (grub2) (https://bugs.debian.org/775191, https://bugs.debian.org/775202). Additional discussion is available here: http://blog.einval.com/2015/01/11#Jessie-EFI_5 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/grub2/+bug/1409750/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1302268] Re: hyper-v: Unable to perform kernel crash dump on trusty
Same as 1317697, we've re-tested this on 14.04.1 and kernel panic and dump file creation is working as expected. Kernel: 3.13.0-35 Please close this thread. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1302268 Title: hyper-v: Unable to perform kernel crash dump on trusty Status in linux package in Ubuntu: Fix Released Status in linux source package in Trusty: Fix Released Bug description: Hi folks, I know we are past kernel freeze now but this is a very important issue to fix as kernel crash dump is a fundamental requirement for all our customers. I am attaching two patches. Both of them need to be applied to take care of this issue. Please accommodate in this release if possible otherwise please let me know how we can provide these as an update. Thanks, Abhishek break-fix: - 03367ef5ea811475187a0732aada068919e14d61 break-fix: - e179f6914152eca9b338e7d8445684062f560c55 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1302268/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1317697] Re: hyper-v: Unable to dump core for Ubuntu 14.04 virtual machines.
We've re-tested this on 14.04.1 and kernel panic and dump file creation is working as expected. Please close this thread. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1317697 Title: hyper-v: Unable to dump core for Ubuntu 14.04 virtual machines. Status in linux package in Ubuntu: Fix Released Status in linux source package in Trusty: Fix Released Status in linux source package in Utopic: Fix Released Bug description: Hi, We need to include two new patches: http://git.kernel.org/cgit/linux/kernel/git/next/linux- next.git/commit/arch/x86/kernel/cpu/mshyperv.c?id=e179f6914152eca9b338e7d8445684062f560c55 http://git.kernel.org/cgit/linux/kernel/git/next/linux- next.git/commit/drivers/hv/connection.c?id=03367ef5ea811475187a0732aada068919e14d61 Without these patches we are unable to dump core for Ubuntu 14.04 virtual machines. Please include. Thanks, Abhishek To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1317697/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1403239] Re: linux-ti-omap4: 3.2.0-1458.78 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Status: New => Confirmed ** Changed in: kernel-sru-workflow/promote-to-updates Status: New => Confirmed ** Description changed: This bug is for tracking the 3.2.0-1458.78 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 16. December 2014 23:03 UTC kernel-stable-master-bug:1403154 kernel-stable-Certification-testing-end:Thursday, 18. December 2014 12:02 UTC kernel-stable-Prepare-package-end:Thursday, 18. December 2014 16:02 UTC kernel-stable-Promote-to-proposed-start:Thursday, 18. December 2014 16:02 UTC ppa-package-testing-start:Thursday, 18. December 2014 16:02 UTC kernel-stable-Promote-to-proposed-end:Thursday, 18. December 2014 22:02 UTC kernel-stable-Security-signoff-start:Friday, 19. December 2014 00:03 UTC kernel-stable-Verification-testing-start:Friday, 19. December 2014 00:02 UTC kernel-stable-Regression-testing-start:Friday, 19. December 2014 00:03 UTC - kernel-stable-phase:Testing - kernel-stable-phase-changed:Friday, 19. December 2014 12:01 UTC kernel-stable-Verification-testing-end:Friday, 19. December 2014 12:01 UTC kernel-stable-Security-signoff-end:Friday, 19. December 2014 14:01 UTC + kernel-stable-phase:CopyToUpdates + kernel-stable-phase-changed:Monday, 12. January 2015 18:29 UTC + kernel-stable-Promote-to-updates-start:Monday, 12. January 2015 18:29 UTC + kernel-stable-Regression-testing-end:Monday, 12. January 2015 18:29 UTC -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-ti-omap4 in Ubuntu. https://bugs.launchpad.net/bugs/1403239 Title: linux-ti-omap4: 3.2.0-1458.78 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow package-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Confirmed Status in Kernel SRU Workflow promote-to-updates series: Confirmed Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow upload-to-ppa series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux-ti-omap4 source package in Precise: New Bug description: This bug is for tracking the 3.2.0-1458.78 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 16. December 2014 23:03 UTC kernel-stable-master-bug:1403154 kernel-stable-Certification-testing-end:Thursday, 18. December 2014 12:02 UTC kernel-stable-Prepare-package-end:Thursday, 18. December 2014 16:02 UTC kernel-stable-Promote-to-proposed-start:Thursday, 18. December 2014 16:02 UTC ppa-package-testing-start:Thursday, 18. December 2014 16:02 UTC kernel-stable-Promote-to-proposed-end:Thursday, 18. December 2014 22:02 UTC kernel-stable-Security-signoff-start:Friday, 19. December 2014 00:03 UTC kernel-stable-Verification-testing-start:Friday, 19. December 2014 00:02 UTC kernel-stable-Regression-testing-start:Friday, 19. December 2014 00:03 UTC kernel-stable-Verification-testing-end:Friday, 19. December 2014 12:01 UTC kernel-stable-Security-signoff-end:Friday, 19. December 2014 14:01 UTC kernel-stable-phase:CopyToUpdates kernel-stable-phase-changed:Monday, 12. January 2015 18:29 UTC kernel-stable-Promote-to-updates-start:Monday, 12. January 2015 18:29 UTC kernel-stable-Regression-testing-end:Monday, 12. January 2015 18:29 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1403239/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1403239] Re: linux-ti-omap4: 3.2.0-1458.78 -proposed tracker
Paolo tested this kernel; adding "qa-testing-passed" tag and setting "Regression-testing " task to 'fix-released'. ** Tags added: qa-testing-passed ** Changed in: kernel-sru-workflow/regression-testing Status: Confirmed => Fix Released ** Changed in: kernel-sru-workflow/regression-testing Assignee: (unassigned) => Paolo Pisati (p-pisati) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-ti-omap4 in Ubuntu. https://bugs.launchpad.net/bugs/1403239 Title: linux-ti-omap4: 3.2.0-1458.78 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow package-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Confirmed Status in Kernel SRU Workflow promote-to-updates series: Confirmed Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow upload-to-ppa series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux-ti-omap4 source package in Precise: New Bug description: This bug is for tracking the 3.2.0-1458.78 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 16. December 2014 23:03 UTC kernel-stable-master-bug:1403154 kernel-stable-Certification-testing-end:Thursday, 18. December 2014 12:02 UTC kernel-stable-Prepare-package-end:Thursday, 18. December 2014 16:02 UTC kernel-stable-Promote-to-proposed-start:Thursday, 18. December 2014 16:02 UTC ppa-package-testing-start:Thursday, 18. December 2014 16:02 UTC kernel-stable-Promote-to-proposed-end:Thursday, 18. December 2014 22:02 UTC kernel-stable-Security-signoff-start:Friday, 19. December 2014 00:03 UTC kernel-stable-Verification-testing-start:Friday, 19. December 2014 00:02 UTC kernel-stable-Regression-testing-start:Friday, 19. December 2014 00:03 UTC kernel-stable-Verification-testing-end:Friday, 19. December 2014 12:01 UTC kernel-stable-Security-signoff-end:Friday, 19. December 2014 14:01 UTC kernel-stable-phase:CopyToUpdates kernel-stable-phase-changed:Monday, 12. January 2015 18:29 UTC kernel-stable-Promote-to-updates-start:Monday, 12. January 2015 18:29 UTC kernel-stable-Regression-testing-end:Monday, 12. January 2015 18:29 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1403239/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1335478] Re: A new instance of IBM Domino 'bindsock' cannot bind to ports <1024 Kernel 3.13.0-29 and above
This bug was fixed in the package linux - 2.6.32-71.138 --- linux (2.6.32-71.138) lucid; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1403943 [ Luis Henriques ] * [Config] updateconfigs CONFIG_X86_16BIT=y after v2.6.32.65 update [ Upstream Kernel Changes ] * KVM: x86: Check non-canonical addresses upon WRMSR - LP: #1384539 - CVE-2014-3610 * KVM: x86: Improve thread safety in pit - LP: #1384540 - CVE-2014-3611 * net:socket: set msg_namelen to 0 if msg_name is passed as NULL in msghdr struct from userland. - LP: #1335478 * x86, 64-bit: Move K8 B step iret fixup to fault entry asm - LP: #1403918 * x86-64: Adjust frame type at paranoid_exit: - LP: #1403918 * x86-64, modify_ldt: Ban 16-bit segments on 64-bit kernels - LP: #1403918 * x86-32, espfix: Remove filter for espfix32 due to race - LP: #1403918 * x86-64, espfix: Don't leak bits 31:16 of %esp returning to 16-bit stack - LP: #1403918 * x86, espfix: Move espfix definitions into a separate header file - LP: #1403918 * x86, espfix: Fix broken header guard - LP: #1403918 * x86, espfix: Make espfix64 a Kconfig option, fix UML - LP: #1403918 * x86, espfix: Make it possible to disable 16-bit support - LP: #1403918 * x86_64/entry/xen: Do not invoke espfix64 on Xen - LP: #1403918 * x86/espfix/xen: Fix allocation of pages for paravirt page tables - LP: #1403918 * x86_64, traps: Fix the espfix64 #DF fixup and rewrite it in C - LP: #1403918 * x86_64, traps: Rework bad_iret - LP: #1403918 -- Luis HenriquesThu, 18 Dec 2014 16:22:56 + -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1335478 Title: A new instance of IBM Domino 'bindsock' cannot bind to ports <1024 Kernel 3.13.0-29 and above Status in linux package in Ubuntu: Fix Released Status in linux-lts-trusty package in Ubuntu: Invalid Status in linux-lts-utopic package in Ubuntu: Invalid Status in linux source package in Lucid: Fix Released Status in linux-lts-trusty source package in Lucid: Invalid Status in linux-lts-utopic source package in Lucid: Invalid Status in linux source package in Precise: Fix Released Status in linux-lts-trusty source package in Precise: Fix Released Status in linux-lts-utopic source package in Precise: Invalid Status in linux source package in Trusty: Fix Released Status in linux-lts-trusty source package in Trusty: Invalid Status in linux-lts-utopic source package in Trusty: Fix Released Status in linux source package in Utopic: Fix Released Status in linux-lts-trusty source package in Utopic: Invalid Status in linux-lts-utopic source package in Utopic: Invalid Status in linux source package in Vivid: Fix Released Status in linux-lts-trusty source package in Vivid: Invalid Status in linux-lts-utopic source package in Vivid: Invalid Bug description: Starting with kernels 3.2.0-64 and 3.13.0-29 Something has changed to once again that prevents IBM Domino's "/opt/ibm/domino/notes/latest/linux/bindsock" binary that runs as root (setuid) to get ports lower than 1024 for it's LDAP, SMTP, IMAP, POP3, and HTTP processes. The Domino server reports the following: : "Listener failure: 'bindsock' is missing, not executable, not owned by root, not setuid root or user needs net_privaddr privilege." This is the same behaviour that was reported and subsequently corrected in Bug # 1269053 === break-fix: dbb490b96584d4e958533fb637f08b557f505657 6a2a2b3ae0759843b22c929881cc184b00cc63ff To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1335478/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1335478] Re: A new instance of IBM Domino 'bindsock' cannot bind to ports <1024 Kernel 3.13.0-29 and above
This bug was fixed in the package linux - 2.6.32-71.138 --- linux (2.6.32-71.138) lucid; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1403943 [ Luis Henriques ] * [Config] updateconfigs CONFIG_X86_16BIT=y after v2.6.32.65 update [ Upstream Kernel Changes ] * KVM: x86: Check non-canonical addresses upon WRMSR - LP: #1384539 - CVE-2014-3610 * KVM: x86: Improve thread safety in pit - LP: #1384540 - CVE-2014-3611 * net:socket: set msg_namelen to 0 if msg_name is passed as NULL in msghdr struct from userland. - LP: #1335478 * x86, 64-bit: Move K8 B step iret fixup to fault entry asm - LP: #1403918 * x86-64: Adjust frame type at paranoid_exit: - LP: #1403918 * x86-64, modify_ldt: Ban 16-bit segments on 64-bit kernels - LP: #1403918 * x86-32, espfix: Remove filter for espfix32 due to race - LP: #1403918 * x86-64, espfix: Don't leak bits 31:16 of %esp returning to 16-bit stack - LP: #1403918 * x86, espfix: Move espfix definitions into a separate header file - LP: #1403918 * x86, espfix: Fix broken header guard - LP: #1403918 * x86, espfix: Make espfix64 a Kconfig option, fix UML - LP: #1403918 * x86, espfix: Make it possible to disable 16-bit support - LP: #1403918 * x86_64/entry/xen: Do not invoke espfix64 on Xen - LP: #1403918 * x86/espfix/xen: Fix allocation of pages for paravirt page tables - LP: #1403918 * x86_64, traps: Fix the espfix64 #DF fixup and rewrite it in C - LP: #1403918 * x86_64, traps: Rework bad_iret - LP: #1403918 -- Luis HenriquesThu, 18 Dec 2014 16:22:56 + ** Changed in: linux (Ubuntu Lucid) Status: Fix Committed => Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-3610 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-3611 ** Changed in: linux (Ubuntu Lucid) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1335478 Title: A new instance of IBM Domino 'bindsock' cannot bind to ports <1024 Kernel 3.13.0-29 and above Status in linux package in Ubuntu: Fix Released Status in linux-lts-trusty package in Ubuntu: Invalid Status in linux-lts-utopic package in Ubuntu: Invalid Status in linux source package in Lucid: Fix Released Status in linux-lts-trusty source package in Lucid: Invalid Status in linux-lts-utopic source package in Lucid: Invalid Status in linux source package in Precise: Fix Released Status in linux-lts-trusty source package in Precise: Fix Released Status in linux-lts-utopic source package in Precise: Invalid Status in linux source package in Trusty: Fix Released Status in linux-lts-trusty source package in Trusty: Invalid Status in linux-lts-utopic source package in Trusty: Fix Released Status in linux source package in Utopic: Fix Released Status in linux-lts-trusty source package in Utopic: Invalid Status in linux-lts-utopic source package in Utopic: Invalid Status in linux source package in Vivid: Fix Released Status in linux-lts-trusty source package in Vivid: Invalid Status in linux-lts-utopic source package in Vivid: Invalid Bug description: Starting with kernels 3.2.0-64 and 3.13.0-29 Something has changed to once again that prevents IBM Domino's "/opt/ibm/domino/notes/latest/linux/bindsock" binary that runs as root (setuid) to get ports lower than 1024 for it's LDAP, SMTP, IMAP, POP3, and HTTP processes. The Domino server reports the following: : "Listener failure: 'bindsock' is missing, not executable, not owned by root, not setuid root or user needs net_privaddr privilege." This is the same behaviour that was reported and subsequently corrected in Bug # 1269053 === break-fix: dbb490b96584d4e958533fb637f08b557f505657 6a2a2b3ae0759843b22c929881cc184b00cc63ff To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1335478/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1384540] Re: CVE-2014-3611
This bug was fixed in the package linux - 2.6.32-71.138 --- linux (2.6.32-71.138) lucid; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1403943 [ Luis Henriques ] * [Config] updateconfigs CONFIG_X86_16BIT=y after v2.6.32.65 update [ Upstream Kernel Changes ] * KVM: x86: Check non-canonical addresses upon WRMSR - LP: #1384539 - CVE-2014-3610 * KVM: x86: Improve thread safety in pit - LP: #1384540 - CVE-2014-3611 * net:socket: set msg_namelen to 0 if msg_name is passed as NULL in msghdr struct from userland. - LP: #1335478 * x86, 64-bit: Move K8 B step iret fixup to fault entry asm - LP: #1403918 * x86-64: Adjust frame type at paranoid_exit: - LP: #1403918 * x86-64, modify_ldt: Ban 16-bit segments on 64-bit kernels - LP: #1403918 * x86-32, espfix: Remove filter for espfix32 due to race - LP: #1403918 * x86-64, espfix: Don't leak bits 31:16 of %esp returning to 16-bit stack - LP: #1403918 * x86, espfix: Move espfix definitions into a separate header file - LP: #1403918 * x86, espfix: Fix broken header guard - LP: #1403918 * x86, espfix: Make espfix64 a Kconfig option, fix UML - LP: #1403918 * x86, espfix: Make it possible to disable 16-bit support - LP: #1403918 * x86_64/entry/xen: Do not invoke espfix64 on Xen - LP: #1403918 * x86/espfix/xen: Fix allocation of pages for paravirt page tables - LP: #1403918 * x86_64, traps: Fix the espfix64 #DF fixup and rewrite it in C - LP: #1403918 * x86_64, traps: Rework bad_iret - LP: #1403918 -- Luis HenriquesThu, 18 Dec 2014 16:22:56 + ** Changed in: linux (Ubuntu Lucid) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1384540 Title: CVE-2014-3611 Status in linux package in Ubuntu: Fix Released Status in linux-armadaxp package in Ubuntu: Invalid Status in linux-ec2 package in Ubuntu: Invalid Status in linux-fsl-imx51 package in Ubuntu: Invalid Status in linux-lts-backport-maverick package in Ubuntu: New Status in linux-lts-backport-natty package in Ubuntu: New Status in linux-lts-quantal package in Ubuntu: Invalid Status in linux-lts-raring package in Ubuntu: Invalid Status in linux-lts-saucy package in Ubuntu: Invalid Status in linux-lts-trusty package in Ubuntu: Invalid Status in linux-lts-utopic package in Ubuntu: Invalid Status in linux-mvl-dove package in Ubuntu: Invalid Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux source package in Lucid: Fix Released Status in linux-armadaxp source package in Lucid: Invalid Status in linux-ec2 source package in Lucid: New Status in linux-fsl-imx51 source package in Lucid: Invalid Status in linux-lts-backport-maverick source package in Lucid: New Status in linux-lts-backport-natty source package in Lucid: New Status in linux-lts-quantal source package in Lucid: Invalid Status in linux-lts-raring source package in Lucid: Invalid Status in linux-lts-saucy source package in Lucid: Invalid Status in linux-lts-trusty source package in Lucid: Invalid Status in linux-lts-utopic source package in Lucid: Invalid Status in linux-mvl-dove source package in Lucid: Invalid Status in linux-ti-omap4 source package in Lucid: Invalid Status in linux source package in Precise: Fix Released Status in linux-armadaxp source package in Precise: Fix Released Status in linux-ec2 source package in Precise: Invalid Status in linux-fsl-imx51 source package in Precise: Invalid Status in linux-lts-backport-maverick source package in Precise: New Status in linux-lts-backport-natty source package in Precise: New Status in linux-lts-quantal source package in Precise: Fix Committed Status in linux-lts-raring source package in Precise: Invalid Status in linux-lts-saucy source package in Precise: Fix Committed Status in linux-lts-trusty source package in Precise: Fix Released Status in linux-lts-utopic source package in Precise: Invalid Status in linux-mvl-dove source package in Precise: Invalid Status in linux-ti-omap4 source package in Precise: Fix Released Status in linux source package in Trusty: Fix Released Status in linux-armadaxp source package in Trusty: Invalid Status in linux-ec2 source package in Trusty: Invalid Status in linux-fsl-imx51 source package in Trusty: Invalid Status in linux-lts-backport-maverick source package in Trusty: New Status in linux-lts-backport-natty source package in Trusty: New Status in linux-lts-quantal source package in Trusty: Invalid Status in linux-lts-raring source package in Trusty: Invalid Status in linux-lts-saucy source package in Trusty: Invalid Status in linux-lts-trusty source package in Trusty: Invalid Status in linux-lts-utopic source package in Trusty: Invalid Status
[Kernel-packages] [Bug 1384539] Re: CVE-2014-3610
This bug was fixed in the package linux - 2.6.32-71.138 --- linux (2.6.32-71.138) lucid; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1403943 [ Luis Henriques ] * [Config] updateconfigs CONFIG_X86_16BIT=y after v2.6.32.65 update [ Upstream Kernel Changes ] * KVM: x86: Check non-canonical addresses upon WRMSR - LP: #1384539 - CVE-2014-3610 * KVM: x86: Improve thread safety in pit - LP: #1384540 - CVE-2014-3611 * net:socket: set msg_namelen to 0 if msg_name is passed as NULL in msghdr struct from userland. - LP: #1335478 * x86, 64-bit: Move K8 B step iret fixup to fault entry asm - LP: #1403918 * x86-64: Adjust frame type at paranoid_exit: - LP: #1403918 * x86-64, modify_ldt: Ban 16-bit segments on 64-bit kernels - LP: #1403918 * x86-32, espfix: Remove filter for espfix32 due to race - LP: #1403918 * x86-64, espfix: Don't leak bits 31:16 of %esp returning to 16-bit stack - LP: #1403918 * x86, espfix: Move espfix definitions into a separate header file - LP: #1403918 * x86, espfix: Fix broken header guard - LP: #1403918 * x86, espfix: Make espfix64 a Kconfig option, fix UML - LP: #1403918 * x86, espfix: Make it possible to disable 16-bit support - LP: #1403918 * x86_64/entry/xen: Do not invoke espfix64 on Xen - LP: #1403918 * x86/espfix/xen: Fix allocation of pages for paravirt page tables - LP: #1403918 * x86_64, traps: Fix the espfix64 #DF fixup and rewrite it in C - LP: #1403918 * x86_64, traps: Rework bad_iret - LP: #1403918 -- Luis HenriquesThu, 18 Dec 2014 16:22:56 + ** Changed in: linux (Ubuntu Lucid) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1384539 Title: CVE-2014-3610 Status in linux package in Ubuntu: Fix Released Status in linux-armadaxp package in Ubuntu: Invalid Status in linux-ec2 package in Ubuntu: Invalid Status in linux-fsl-imx51 package in Ubuntu: Invalid Status in linux-lts-backport-maverick package in Ubuntu: New Status in linux-lts-backport-natty package in Ubuntu: New Status in linux-lts-quantal package in Ubuntu: Invalid Status in linux-lts-raring package in Ubuntu: Invalid Status in linux-lts-saucy package in Ubuntu: Invalid Status in linux-lts-trusty package in Ubuntu: Invalid Status in linux-lts-utopic package in Ubuntu: Invalid Status in linux-mvl-dove package in Ubuntu: Invalid Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux source package in Lucid: Fix Released Status in linux-armadaxp source package in Lucid: Invalid Status in linux-ec2 source package in Lucid: New Status in linux-fsl-imx51 source package in Lucid: Invalid Status in linux-lts-backport-maverick source package in Lucid: New Status in linux-lts-backport-natty source package in Lucid: New Status in linux-lts-quantal source package in Lucid: Invalid Status in linux-lts-raring source package in Lucid: Invalid Status in linux-lts-saucy source package in Lucid: Invalid Status in linux-lts-trusty source package in Lucid: Invalid Status in linux-lts-utopic source package in Lucid: Invalid Status in linux-mvl-dove source package in Lucid: Invalid Status in linux-ti-omap4 source package in Lucid: Invalid Status in linux source package in Precise: Fix Released Status in linux-armadaxp source package in Precise: Fix Released Status in linux-ec2 source package in Precise: Invalid Status in linux-fsl-imx51 source package in Precise: Invalid Status in linux-lts-backport-maverick source package in Precise: New Status in linux-lts-backport-natty source package in Precise: New Status in linux-lts-quantal source package in Precise: Fix Committed Status in linux-lts-raring source package in Precise: Invalid Status in linux-lts-saucy source package in Precise: Fix Committed Status in linux-lts-trusty source package in Precise: Fix Released Status in linux-lts-utopic source package in Precise: Invalid Status in linux-mvl-dove source package in Precise: Invalid Status in linux-ti-omap4 source package in Precise: Fix Released Status in linux source package in Trusty: Fix Released Status in linux-armadaxp source package in Trusty: Invalid Status in linux-ec2 source package in Trusty: Invalid Status in linux-fsl-imx51 source package in Trusty: Invalid Status in linux-lts-backport-maverick source package in Trusty: New Status in linux-lts-backport-natty source package in Trusty: New Status in linux-lts-quantal source package in Trusty: Invalid Status in linux-lts-raring source package in Trusty: Invalid Status in linux-lts-saucy source package in Trusty: Invalid Status in linux-lts-trusty source package in Trusty: Invalid Status in linux-lts-utopic source package in Trusty: Invalid Status
[Kernel-packages] [Bug 1403943] Re: linux: 2.6.32-71.138 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Status: Confirmed => Fix Released ** Changed in: kernel-sru-workflow/promote-to-security Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad (adconrad) ** Changed in: kernel-sru-workflow/promote-to-updates Status: Confirmed => Fix Released ** Changed in: kernel-sru-workflow/promote-to-updates Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad (adconrad) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1403943 Title: linux: 2.6.32-71.138 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: Fix Released Status in Kernel SRU Workflow package-testing series: Fix Released Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-lbm series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-ports-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Fix Released Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux package in Ubuntu: Invalid Status in linux source package in Lucid: Fix Released Bug description: This bug is for tracking the 2.6.32-71.138 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Thursday, 18. December 2014 16:18 UTC kernel-stable-Prepare-package-end:Friday, 19. December 2014 00:07 UTC kernel-stable-Promote-to-proposed-start:Friday, 19. December 2014 00:07 UTC ppa-package-testing-start:Friday, 19. December 2014 00:07 UTC kernel-stable-Promote-to-proposed-end:Friday, 19. December 2014 08:02 UTC kernel-stable-Verification-testing-start:Friday, 19. December 2014 10:03 UTC kernel-stable-Certification-testing-start:Friday, 19. December 2014 10:03 UTC kernel-stable-Security-signoff-start:Friday, 19. December 2014 10:03 UTC kernel-stable-Regression-testing-start:Friday, 19. December 2014 10:03 UTC kernel-stable-Security-signoff-end:Friday, 19. December 2014 14:02 UTC kernel-stable-Certification-testing-end:Wednesday, 07. January 2015 09:01 UTC kernel-stable-Verification-testing-end:Thursday, 08. January 2015 16:02 UTC kernel-stable-phase:CopyToUpdates kernel-stable-phase-changed:Friday, 09. January 2015 16:01 UTC kernel-stable-Promote-to-updates-start:Friday, 09. January 2015 16:01 UTC kernel-stable-Regression-testing-end:Friday, 09. January 2015 16:01 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1403943/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1403918] Re: Lucid update to 2.6.32.65 stable release
This bug was fixed in the package linux - 2.6.32-71.138 --- linux (2.6.32-71.138) lucid; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1403943 [ Luis Henriques ] * [Config] updateconfigs CONFIG_X86_16BIT=y after v2.6.32.65 update [ Upstream Kernel Changes ] * KVM: x86: Check non-canonical addresses upon WRMSR - LP: #1384539 - CVE-2014-3610 * KVM: x86: Improve thread safety in pit - LP: #1384540 - CVE-2014-3611 * net:socket: set msg_namelen to 0 if msg_name is passed as NULL in msghdr struct from userland. - LP: #1335478 * x86, 64-bit: Move K8 B step iret fixup to fault entry asm - LP: #1403918 * x86-64: Adjust frame type at paranoid_exit: - LP: #1403918 * x86-64, modify_ldt: Ban 16-bit segments on 64-bit kernels - LP: #1403918 * x86-32, espfix: Remove filter for espfix32 due to race - LP: #1403918 * x86-64, espfix: Don't leak bits 31:16 of %esp returning to 16-bit stack - LP: #1403918 * x86, espfix: Move espfix definitions into a separate header file - LP: #1403918 * x86, espfix: Fix broken header guard - LP: #1403918 * x86, espfix: Make espfix64 a Kconfig option, fix UML - LP: #1403918 * x86, espfix: Make it possible to disable 16-bit support - LP: #1403918 * x86_64/entry/xen: Do not invoke espfix64 on Xen - LP: #1403918 * x86/espfix/xen: Fix allocation of pages for paravirt page tables - LP: #1403918 * x86_64, traps: Fix the espfix64 #DF fixup and rewrite it in C - LP: #1403918 * x86_64, traps: Rework bad_iret - LP: #1403918 -- Luis HenriquesThu, 18 Dec 2014 16:22:56 + ** Changed in: linux (Ubuntu Lucid) Status: Fix Committed => Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-3610 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-3611 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1403918 Title: Lucid update to 2.6.32.65 stable release Status in linux package in Ubuntu: New Status in linux source package in Lucid: Fix Released Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from Linus' tree or in a minimally backported form of that patch. The 2.6.32.65 upstream stable patch set is now available. It should be included in the Ubuntu kernel as well. git://git.kernel.org/ TEST CASE: TBD The following patches are in the 2.6.32.65 stable release: x86, 64-bit: Move K8 B step iret fixup to fault entry asm x86-64: Adjust frame type at paranoid_exit: x86-64, modify_ldt: Ban 16-bit segments on 64-bit kernels x86-32, espfix: Remove filter for espfix32 due to race x86-64, espfix: Don't leak bits 31:16 of %esp returning to 16-bit stack x86, espfix: Move espfix definitions into a separate header file x86, espfix: Fix broken header guard x86, espfix: Make espfix64 a Kconfig option, fix UML x86, espfix: Make it possible to disable 16-bit support x86_64/entry/xen: Do not invoke espfix64 on Xen x86/espfix/xen: Fix allocation of pages for paravirt page tables x86_64, traps: Stop using IST for #SS x86_64, traps: Fix the espfix64 #DF fixup and rewrite it in C x86_64, traps: Rework bad_iret The following patches from the stable release have been dropped (some were actually already applied to Lucid): net: sendmsg: fix failed backport of "fix NULL pointer dereference" net/l2tp: don't fall back on UDP [get|set]sockopt ALSA: control: Don't access controls outside of protected regions ALSA: control: Fix replacing user controls USB: whiteheat: Added bounds checking for bulk command response net: sctp: fix panic on duplicate ASCONF chunks net: sctp: fix remote memory pressure from excessive queueing udf: Avoid infinite loop when processing indirect ICBs net: sctp: fix NULL pointer dereference in af->from_addr_param on malformed packet mac80211: fix fragmentation code, particularly for encryption ttusb-dec: buffer overflow in ioctl vlan: Don't propagate flag changes on down interfaces. sctp: Fix double-free introduced by bad backport in 2.6.32.62 md/raid6: Fix misapplied backport in 2.6.32.64 block: add missing blk_queue_dead() checks block: Fix blk_execute_rq_nowait() dead queue handling cciss: Fix misapplied "cciss: fix info leak in cciss_ioctl32_passthru()" proc connector: Delete spurious memset in proc_exit_connector() Linux 2.6.32.65 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1403918/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages
[Kernel-packages] [Bug 1403943] Re: linux: 2.6.32-71.138 -proposed tracker
This bug was fixed in the package linux - 2.6.32-71.138 --- linux (2.6.32-71.138) lucid; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1403943 [ Luis Henriques ] * [Config] updateconfigs CONFIG_X86_16BIT=y after v2.6.32.65 update [ Upstream Kernel Changes ] * KVM: x86: Check non-canonical addresses upon WRMSR - LP: #1384539 - CVE-2014-3610 * KVM: x86: Improve thread safety in pit - LP: #1384540 - CVE-2014-3611 * net:socket: set msg_namelen to 0 if msg_name is passed as NULL in msghdr struct from userland. - LP: #1335478 * x86, 64-bit: Move K8 B step iret fixup to fault entry asm - LP: #1403918 * x86-64: Adjust frame type at paranoid_exit: - LP: #1403918 * x86-64, modify_ldt: Ban 16-bit segments on 64-bit kernels - LP: #1403918 * x86-32, espfix: Remove filter for espfix32 due to race - LP: #1403918 * x86-64, espfix: Don't leak bits 31:16 of %esp returning to 16-bit stack - LP: #1403918 * x86, espfix: Move espfix definitions into a separate header file - LP: #1403918 * x86, espfix: Fix broken header guard - LP: #1403918 * x86, espfix: Make espfix64 a Kconfig option, fix UML - LP: #1403918 * x86, espfix: Make it possible to disable 16-bit support - LP: #1403918 * x86_64/entry/xen: Do not invoke espfix64 on Xen - LP: #1403918 * x86/espfix/xen: Fix allocation of pages for paravirt page tables - LP: #1403918 * x86_64, traps: Fix the espfix64 #DF fixup and rewrite it in C - LP: #1403918 * x86_64, traps: Rework bad_iret - LP: #1403918 -- Luis HenriquesThu, 18 Dec 2014 16:22:56 + ** Changed in: linux (Ubuntu Lucid) Status: New => Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-3610 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-3611 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1403943 Title: linux: 2.6.32-71.138 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: Fix Released Status in Kernel SRU Workflow package-testing series: Fix Released Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-lbm series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-ports-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Fix Released Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux package in Ubuntu: Invalid Status in linux source package in Lucid: Fix Released Bug description: This bug is for tracking the 2.6.32-71.138 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Thursday, 18. December 2014 16:18 UTC kernel-stable-Prepare-package-end:Friday, 19. December 2014 00:07 UTC kernel-stable-Promote-to-proposed-start:Friday, 19. December 2014 00:07 UTC ppa-package-testing-start:Friday, 19. December 2014 00:07 UTC kernel-stable-Promote-to-proposed-end:Friday, 19. December 2014 08:02 UTC kernel-stable-Verification-testing-start:Friday, 19. December 2014 10:03 UTC kernel-stable-Certification-testing-start:Friday, 19. December 2014 10:03 UTC kernel-stable-Security-signoff-start:Friday, 19. December 2014 10:03 UTC kernel-stable-Regression-testing-start:Friday, 19. December 2014 10:03 UTC kernel-stable-Security-signoff-end:Friday, 19. December 2014 14:02 UTC kernel-stable-Certification-testing-end:Wednesday, 07. January 2015 09:01 UTC kernel-stable-Verification-testing-end:Thursday, 08. January 2015 16:02 UTC kernel-stable-phase:CopyToUpdates kernel-stable-phase-changed:Friday, 09. January 2015 16:01 UTC kernel-stable-Promote-to-updates-start:Friday, 09. January 2015 16:01 UTC kernel-stable-Regression-testing-end:Friday, 09. January 2015 16:01 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1403943/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1408118] Re: hama uzzano keyboard do not work properly
It sounds like the keyboard is not working, but did the kernel panics stop happening? ** Tags added: vivid ** Tags added: utopic -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1408118 Title: hama uzzano keyboard do not work properly Status in linux package in Ubuntu: Incomplete Bug description: Hello I recently tried to use a hama uzzano keyboard on ubuntu 14.10. This is a wireless keyboard. Some times starts working and then suddenly stops, but mostly it does not work. i looked if it was recognized and it is: lsusb: pau@traveller:~$ lsusb Bus 002 Device 002: ID 8087:0024 Intel Corp. Integrated Rate Matching Hub Bus 002 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub Bus 001 Device 003: ID 04ca:7012 Lite-On Technology Corp. Bus 001 Device 002: ID 8087:0024 Intel Corp. Integrated Rate Matching Hub Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub Bus 004 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub Bus 003 Device 003: ID 0930:021d Toshiba Corp. Bus 003 Device 008: ID 04d9:a01c Holtek Semiconductor, Inc. Bus 003 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub and dmesg | grep usb (partial) [ 8974.179356] input: HOLTEK Wireless USB Device as /devices/pci:00/:00:14.0/usb3/3-1/3-1:1.0/0003:04D9:A01C.000D/input/input29 [ 8974.179587] hid-generic 0003:04D9:A01C.000D: input,hidraw0: USB HID v1.10 Keyboard [HOLTEK Wireless USB Device] on usb-:00:14.0-1/input0 [ 8974.191755] input: HOLTEK Wireless USB Device as /devices/pci:00/:00:14.0/usb3/3-1/3-1:1.1/0003:04D9:A01C.000E/input/input30 [ 8974.192062] hid-generic 0003:04D9:A01C.000E: input,hidraw1: USB HID v1.10 Mouse [HOLTEK Wireless USB Device] on usb-:00:14.0-1/input1 i tried to solve the problem as it is explained here http://askubuntu.com/questions/160329/usb-keyboard-works-occasionally but it did not works. What can i do, i suppose this is a bug, do you need extra information? (it works with windows) thanks To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1408118/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1376509] Re: [HP Pavilion 11-n038ca x360] touchscreen not working
Fixed in linux-image-generic-lts-utopic. ** Changed in: linux (Ubuntu) Status: Expired => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1376509 Title: [HP Pavilion 11-n038ca x360] touchscreen not working Status in linux package in Ubuntu: Fix Released Bug description: I have installed Ubuntu 14.04 on an HP Pavilion 11-n038ca x360 laptop and the touchscreen is not working. --- ApportVersion: 2.14.1-0ubuntu3.4 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: silvia 1966 F pulseaudio CurrentDesktop: Unity DistroRelease: Ubuntu 14.04 HibernationDevice: RESUME=UUID=a1058756-8c41-4b5d-b1e0-b8691380e076 InstallationDate: Installed on 2014-08-14 (48 days ago) InstallationMedia: Ubuntu 14.04.1 LTS "Trusty Tahr" - Release amd64 (20140722.2) Lsusb: Bus 002 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub Bus 001 Device 003: ID 1a40:0101 Terminus Technology Inc. 4-Port HUB Bus 001 Device 002: ID 0bda:5776 Realtek Semiconductor Corp. Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub MachineType: Hewlett-Packard HP Pavilion 11 x360 PC Package: linux (not installed) ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-36-generic.efi.signed root=UUID=7601ee0e-6862-4bf3-8851-374adfbf5efa ro quiet splash acpi=force apm=power_off vt.handoff=7 ProcVersionSignature: Ubuntu 3.13.0-36.63-generic 3.13.11.6 RelatedPackageVersions: linux-restricted-modules-3.13.0-36-generic N/A linux-backports-modules-3.13.0-36-generic N/A linux-firmware 1.127.7 RfKill: 0: phy0: Wireless LAN Soft blocked: no Hard blocked: no Tags: trusty Uname: Linux 3.13.0-36-generic x86_64 UpgradeStatus: No upgrade log present (probably fresh install) UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo _MarkForUpload: True dmi.bios.date: 06/04/2014 dmi.bios.vendor: Insyde dmi.bios.version: F.12 dmi.board.asset.tag: Type2 - Board Asset Tag dmi.board.name: 2209 dmi.board.vendor: Hewlett-Packard dmi.board.version: 57.34 dmi.chassis.asset.tag: Chassis Asset Tag dmi.chassis.type: 10 dmi.chassis.vendor: Hewlett-Packard dmi.chassis.version: Chassis Version dmi.modalias: dmi:bvnInsyde:bvrF.12:bd06/04/2014:svnHewlett-Packard:pnHPPavilion11x360PC:pvr097710405F00010420180:rvnHewlett-Packard:rn2209:rvr57.34:cvnHewlett-Packard:ct10:cvrChassisVersion: dmi.product.name: HP Pavilion 11 x360 PC dmi.product.version: 097710405F00010420180 dmi.sys.vendor: Hewlett-Packard To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1376509/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1366120] Re: [Hyper-V] reloading LIS Hyper-V modules can result in a kernel panic on Ubuntu 14.10
This has been re-tested and the bug is no longer present, please close the thread. Thank you! -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1366120 Title: [Hyper-V] reloading LIS Hyper-V modules can result in a kernel panic on Ubuntu 14.10 Status in linux package in Ubuntu: Fix Released Status in linux-lts-utopic package in Ubuntu: Invalid Status in linux source package in Trusty: Fix Released Status in linux-lts-utopic source package in Trusty: Invalid Status in linux source package in Utopic: Fix Released Status in linux-lts-utopic source package in Utopic: Invalid Status in linux source package in Vivid: Fix Released Status in linux-lts-utopic source package in Vivid: Invalid Bug description: Reloading the Hyper-V LIS modules can sometime result in a kernel panic. Technical details: a hypercall can return “invalid alignment” error if the input parameter spans a page boundary. Updated LIS code handles properly the error without returning bug(). We've triaged this issue internally and the following 2 patches have been created. Please include them in 14.10 (Utopic Unicorn) daily builds and let us know when we can test. https://lkml.org/lkml/2014/8/27/725 https://lkml.org/lkml/2014/8/28/649 === break-fix: - 45d727cee9e200f5b351528b9fb063b69cf702c8 break-fix: - b29ef3546aecb253a5552b198cef23750d56e1e4 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1366120/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1352821] Re: 0489:e078 - Qualcom Atheros - Ubuntu 14.04 bluetooth not working
Can you see if this issue also occurs with the latest 3.13 upstream version? It can be downloaded from: http://kernel.ubuntu.com/~kernel-ppa/mainline/v3.13.11-ckt13-trusty/ If the bug does still exist, we can perform a reverse bisect to identify the commit that fixes this in 3.19. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1352821 Title: 0489:e078 - Qualcom Atheros - Ubuntu 14.04 bluetooth not working Status in linux package in Ubuntu: Confirmed Bug description: Hi, Nature of peoblem : Bluetooth not wotrking under Ubuntu 14.04 but wifi working fine. pls help to provide the solution Vendor ID : 0489:e078 Make of Wifi BT combo : Qualcom Atheros QCA9565 /AR9565 Regds, Bala S To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1352821/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1402764] Re: WARNING: CPU: 1 PID: 4940 at /build/buildd/linux-3.13.0/mm/truncate.c:652 pagecache_isize_extended+0xfd/0x110() in 3.13.0-43-generic
** Tags removed: kernel-bug-break-fix -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1402764 Title: WARNING: CPU: 1 PID: 4940 at /build/buildd/linux-3.13.0/mm/truncate.c:652 pagecache_isize_extended+0xfd/0x110() in 3.13.0-43-generic Status in linux package in Ubuntu: Invalid Status in linux-lts-trusty package in Ubuntu: Invalid Status in linux source package in Precise: Invalid Status in linux-lts-trusty source package in Precise: Fix Released Status in linux source package in Trusty: Fix Released Status in linux-lts-trusty source package in Trusty: Invalid Status in linux source package in Utopic: Invalid Status in linux-lts-trusty source package in Utopic: Invalid Status in linux source package in Vivid: Invalid Status in linux-lts-trusty source package in Vivid: Invalid Bug description: Hi all, I have updated my ubuntu 14.04 LTS server this morning. Until then I am seeing a lot of errors like: [ 4174.782378] WARNING: CPU: 1 PID: 4940 at /build/buildd/linux-3.13.0/mm/truncate.c:652 pagecache_isize_extended+0xfd/0x110() [ 4174.782381] Modules linked in: ctr ccm ipt_MASQUERADE iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack iptable_filter ip_tables x_tables bridge stp llc snd_hda_codec_hdmi arc4 nvidia(POX) rtl8187 snd_hda_intel snd_hda_codec snd_hwdep snd_pcm snd_page_alloc mac80211 snd_seq_midi snd_seq_midi_event cfg80211 eeprom_93cx6 snd_rawmidi joydev snd_seq snd_seq_device kvm_amd snd_timer kvm drm snd sp5100_tco amd64_edac_mod soundcore edac_core edac_mce_amd i2c_piix4 k10temp mac_hid xfs lp parport libcrc32c pata_acpi hid_logitech_dj usbhid hid pata_atiixp tg3 ptp pps_core ahci libahci [ 4174.782433] CPU: 1 PID: 4940 Comm: URL Classifier Tainted: P W OX 3.13.0-43-generic #72-Ubuntu [ 4174.782436] Hardware name: HP ProLiant MicroServer, BIOS O41 10/01/2013 [ 4174.782439] 0009 88006a90bd70 81720bf6 [ 4174.782443] 88006a90bda8 810677cd 1000 88012e12f598 [ 4174.782447] 0008 000dd9d0 88006a90bdb8 [ 4174.782451] Call Trace: [ 4174.782459] [] dump_stack+0x45/0x56 [ 4174.782464] [] warn_slowpath_common+0x7d/0xa0 [ 4174.782467] [] warn_slowpath_null+0x1a/0x20 [ 4174.782472] [] pagecache_isize_extended+0xfd/0x110 [ 4174.782476] [] truncate_setsize+0x27/0x40 [ 4174.782515] [] xfs_setattr_size+0x182/0x3e0 [xfs] [ 4174.782540] [] xfs_file_fallocate+0x19c/0x260 [xfs] [ 4174.782546] [] ? __sb_start_write+0x49/0xe0 [ 4174.782550] [] do_fallocate+0xf9/0x190 [ 4174.782554] [] SyS_fallocate+0x4c/0x80 [ 4174.782558] [] system_call_fastpath+0x1a/0x1f [ 4174.782561] ---[ end trace aeb446f67bc8e89e ]--- === break-fix: 90a8020278c1598fafd071736a0846b38510309c f55fefd1a5a339b1bd08c120b93312d6eb64a9fb To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1402764/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1403240] Re: linux-armadaxp: 3.2.0-1643.62 -proposed tracker
Promoted to Updates: linux-armadaxp | 3.2.0-1643.62 | precise-security | source linux-armadaxp | 3.2.0-1643.62 | precise-updates | source linux-meta-armadaxp | 3.2.0.1643.49 | precise-security | source linux-meta-armadaxp | 3.2.0.1643.49 | precise-updates | source ** Changed in: kernel-sru-workflow/promote-to-security Status: Confirmed => Fix Released ** Changed in: kernel-sru-workflow/promote-to-updates Status: Confirmed => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1403240 Title: linux-armadaxp: 3.2.0-1643.62 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow package-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Fix Released Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Invalid Status in Kernel SRU Workflow upload-to-ppa series: Invalid Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux-armadaxp package in Ubuntu: Invalid Status in linux-armadaxp source package in Precise: Fix Released Bug description: This bug is for tracking the 3.2.0-1643.62 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 16. December 2014 23:05 UTC kernel-stable-master-bug:1403154 kernel-stable-Certification-testing-end:Wednesday, 17. December 2014 03:02 UTC kernel-stable-Security-signoff-end:Wednesday, 17. December 2014 03:02 UTC kernel-stable-Prepare-package-end:Wednesday, 17. December 2014 06:03 UTC kernel-stable-Promote-to-proposed-start:Wednesday, 17. December 2014 06:03 UTC ppa-package-testing-start:Wednesday, 17. December 2014 06:03 UTC kernel-stable-Promote-to-proposed-end:Wednesday, 17. December 2014 19:09 UTC kernel-stable-Verification-testing-start:Wednesday, 17. December 2014 21:01 UTC kernel-stable-Regression-testing-start:Wednesday, 17. December 2014 21:01 UTC kernel-stable-Regression-testing-end:Thursday, 18. December 2014 05:02 UTC kernel-stable-phase:CopyToUpdates kernel-stable-phase-changed:Friday, 09. January 2015 16:20 UTC kernel-stable-Promote-to-updates-start:Friday, 09. January 2015 16:20 UTC kernel-stable-Promote-to-updates-end:Monday, 12. January 2015 17:44 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1403240/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1040557] Re: UEFI boot live-usb bricks SAMSUNG 530U3C, np700z5c laptop
I installed ubuntu 14.04 and f2 doesnt work. it just takes me to to the grub menu. also booting from a cd/dvd/usb is not working. i thought right away to reset the bios but my laptop 300e5c doesnt have a way to do that. it says a fix was released. i also saw something about flashing the bios using a usb but how the heck is that going to work if my machine cant boot usbs. ugh. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1040557 Title: UEFI boot live-usb bricks SAMSUNG 530U3C,np700z5c laptop Status in Ubuntu CD image build software: Fix Released Status in Release Notes for Ubuntu: Fix Released Status in Release Notes for Ubuntu quantal series: Fix Released Status in linux package in Ubuntu: Fix Released Status in linux source package in Oneiric: Fix Released Status in linux source package in Precise: Fix Released Status in linux source package in Quantal: Fix Released Bug description: I cannot provide detailed log massages because laptop is bricked right now. If you have courage to try it select UEFI boot from bios and than try to boot laptop using liveusb (made form Precise Pangolin 12.04.1 amd64). Laptop hangs up in black screen. If you force power-off, after it, laptop wont start. I mean it not event start bios, just black screen no sounds nothing. I filing this report, because i already bricked second laptop. At first i thought it was unrelated issue and laptop was fixed by warranty service (replaced motherboard), but after second time i quite sure. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-cdimage/+bug/1040557/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1403240] Re: linux-armadaxp: 3.2.0-1643.62 -proposed tracker
Promoted to Updates: linux-armadaxp | 3.2.0-1643.62 | precise-security | source linux-armadaxp | 3.2.0-1643.62 | precise-updates | source linux-meta-armadaxp | 3.2.0.1643.49 | precise-security | source linux-meta-armadaxp | 3.2.0.1643.49 | precise-updates | source -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1403240 Title: linux-armadaxp: 3.2.0-1643.62 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow package-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Fix Released Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Invalid Status in Kernel SRU Workflow upload-to-ppa series: Invalid Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux-armadaxp package in Ubuntu: Invalid Status in linux-armadaxp source package in Precise: Fix Released Bug description: This bug is for tracking the 3.2.0-1643.62 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 16. December 2014 23:05 UTC kernel-stable-master-bug:1403154 kernel-stable-Certification-testing-end:Wednesday, 17. December 2014 03:02 UTC kernel-stable-Security-signoff-end:Wednesday, 17. December 2014 03:02 UTC kernel-stable-Prepare-package-end:Wednesday, 17. December 2014 06:03 UTC kernel-stable-Promote-to-proposed-start:Wednesday, 17. December 2014 06:03 UTC ppa-package-testing-start:Wednesday, 17. December 2014 06:03 UTC kernel-stable-Promote-to-proposed-end:Wednesday, 17. December 2014 19:09 UTC kernel-stable-Verification-testing-start:Wednesday, 17. December 2014 21:01 UTC kernel-stable-Regression-testing-start:Wednesday, 17. December 2014 21:01 UTC kernel-stable-Regression-testing-end:Thursday, 18. December 2014 05:02 UTC kernel-stable-phase:CopyToUpdates kernel-stable-phase-changed:Friday, 09. January 2015 16:20 UTC kernel-stable-Promote-to-updates-start:Friday, 09. January 2015 16:20 UTC kernel-stable-Promote-to-updates-end:Monday, 12. January 2015 17:44 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1403240/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1401903] Re: [Hyper-V] FileCopy data loss after fcopy finish (X86 Only) Ubuntu 14.10
** Changed in: linux (Ubuntu Utopic) Status: Confirmed => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1401903 Title: [Hyper-V] FileCopy data loss after fcopy finish (X86 Only) Ubuntu 14.10 Status in linux package in Ubuntu: Fix Committed Status in linux-lts-utopic package in Ubuntu: Invalid Status in linux source package in Trusty: Invalid Status in linux-lts-utopic source package in Trusty: Confirmed Status in linux source package in Utopic: Fix Committed Status in linux-lts-utopic source package in Utopic: Invalid Status in linux source package in Vivid: Fix Committed Status in linux-lts-utopic source package in Vivid: Invalid Bug description: Please include this patch for the bug detailed below. https://git.kernel.org/cgit/linux/kernel/git/gregkh/char-misc.git/commit/?h=char-misc-next&id=31d4ea1a093fcf668d5f95af44b8d41488bdb7ec The hv_fcopy_daemon must also be recompiled with this header. Description of problem: after fcopy from the host to guest check it in guest,no data in the file Version-Release number of selected component (if applicable): Host: hyperv server 2012 R2 Guest VM: Ubuntu 14.10 (final release) How reproducible: 100% Steps to Reproduce: 1.input data in Test.txt(host) 2.install hypervfcopyd(guest) 3.service hypervfcopyd start(guest) 4.(host)C:\> Copy-VMFile "Test VM" -SourcePath "C:\Test.txt" -DestinationPath "/test" -CreateFullPath -FileSource Host(host) 5.check data in test.txt what fcopyed from host(guest) Actual results: all the data is lost Expected results: the same with the original file Additional info: - x64 builds are not affected - this bug has been initially found and patched in a RHEL bug thread, details above are from it. === break-fix: bc5a5b02331a3175a5fca20a4beba249e573b672 31d4ea1a093fcf668d5f95af44b8d41488bdb7ec To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1401903/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1403240] Re: linux-armadaxp: 3.2.0-1643.62 -proposed tracker
** Description changed: This bug is for tracking the 3.2.0-1643.62 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 16. December 2014 23:05 UTC kernel-stable-master-bug:1403154 kernel-stable-Certification-testing-end:Wednesday, 17. December 2014 03:02 UTC kernel-stable-Security-signoff-end:Wednesday, 17. December 2014 03:02 UTC kernel-stable-Prepare-package-end:Wednesday, 17. December 2014 06:03 UTC kernel-stable-Promote-to-proposed-start:Wednesday, 17. December 2014 06:03 UTC ppa-package-testing-start:Wednesday, 17. December 2014 06:03 UTC kernel-stable-Promote-to-proposed-end:Wednesday, 17. December 2014 19:09 UTC kernel-stable-Verification-testing-start:Wednesday, 17. December 2014 21:01 UTC kernel-stable-Regression-testing-start:Wednesday, 17. December 2014 21:01 UTC kernel-stable-Regression-testing-end:Thursday, 18. December 2014 05:02 UTC kernel-stable-phase:CopyToUpdates kernel-stable-phase-changed:Friday, 09. January 2015 16:20 UTC kernel-stable-Promote-to-updates-start:Friday, 09. January 2015 16:20 UTC + kernel-stable-Promote-to-updates-end:Monday, 12. January 2015 17:44 UTC -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1403240 Title: linux-armadaxp: 3.2.0-1643.62 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow package-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Fix Released Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Invalid Status in Kernel SRU Workflow upload-to-ppa series: Invalid Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux-armadaxp package in Ubuntu: Invalid Status in linux-armadaxp source package in Precise: Fix Released Bug description: This bug is for tracking the 3.2.0-1643.62 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 16. December 2014 23:05 UTC kernel-stable-master-bug:1403154 kernel-stable-Certification-testing-end:Wednesday, 17. December 2014 03:02 UTC kernel-stable-Security-signoff-end:Wednesday, 17. December 2014 03:02 UTC kernel-stable-Prepare-package-end:Wednesday, 17. December 2014 06:03 UTC kernel-stable-Promote-to-proposed-start:Wednesday, 17. December 2014 06:03 UTC ppa-package-testing-start:Wednesday, 17. December 2014 06:03 UTC kernel-stable-Promote-to-proposed-end:Wednesday, 17. December 2014 19:09 UTC kernel-stable-Verification-testing-start:Wednesday, 17. December 2014 21:01 UTC kernel-stable-Regression-testing-start:Wednesday, 17. December 2014 21:01 UTC kernel-stable-Regression-testing-end:Thursday, 18. December 2014 05:02 UTC kernel-stable-phase:CopyToUpdates kernel-stable-phase-changed:Friday, 09. January 2015 16:20 UTC kernel-stable-Promote-to-updates-start:Friday, 09. January 2015 16:20 UTC kernel-stable-Promote-to-updates-end:Monday, 12. January 2015 17:44 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1403240/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1406867] Re: Hyper-V TRIM Feature Broken in current LTS trusty kernel
** Changed in: linux (Ubuntu Trusty) Status: In Progress => Fix Committed ** Changed in: linux (Ubuntu Utopic) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1406867 Title: Hyper-V TRIM Feature Broken in current LTS trusty kernel Status in linux package in Ubuntu: Fix Committed Status in linux source package in Trusty: Fix Committed Status in linux source package in Utopic: Fix Committed Status in linux source package in Vivid: Fix Committed Bug description: The TRIM/UNMAP feature is broken in the current trusty kernel with Hyper-V because of the reversion of this commit: http://kernel.ubuntu.com/git?p=ubuntu/ubuntu- trusty.git;a=commit;h=81a73bce0c7b86fbf51004cb171387e73e082784 However a proposed storvsc patch has been submitted to the upstream kernel mailing list which could be found here: https://patchwork.kernel.org/patch/5503381/ In Hyper-V TRIM/UNMAP allows the user to reclaim allocated storage that is no longer in use inside a thin provisioned VHDX volume. --- AlsaDevices: total 0 crw-rw 1 root audio 116, 1 Jan 1 03:42 seq crw-rw 1 root audio 116, 33 Jan 1 03:42 timer AplayDevices: Error: [Errno 2] No such file or directory ApportVersion: 2.14.1-0ubuntu3.6 Architecture: amd64 ArecordDevices: Error: [Errno 2] No such file or directory AudioDevicesInUse: Error: command ['fuser', '-v', '/dev/snd/seq', '/dev/snd/timer'] failed with exit code 1: CRDA: Error: [Errno 2] No such file or directory CurrentDmesg: [ 10.846694] init: plymouth-upstart-bridge main process ended, respawning DistroRelease: Ubuntu 14.04 IwConfig: Error: [Errno 2] No such file or directory Lspci: Error: [Errno 2] No such file or directory Lsusb: Error: [Errno 2] No such file or directory MachineType: Microsoft Corporation Virtual Machine Package: linux (not installed) PciMultimedia: ProcEnviron: TERM=xterm PATH=(custom, no user) XDG_RUNTIME_DIR= LANG=en_US.UTF-8 SHELL=/bin/bash ProcFB: 0 VESA VGA ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.13.0-43-generic root=/dev/mapper/trusty--201412122541-root ro quiet elevator=noop video=hyperv_fb:800x600 splash vt.handoff=7 ProcVersionSignature: Ubuntu 3.13.0-43.72-generic 3.13.11.11 RelatedPackageVersions: linux-restricted-modules-3.13.0-43-generic N/A linux-backports-modules-3.13.0-43-generic N/A linux-firmware N/A RfKill: Error: [Errno 2] No such file or directory Tags: trusty Uname: Linux 3.13.0-43-generic x86_64 UpgradeStatus: No upgrade log present (probably fresh install) UserGroups: _MarkForUpload: True dmi.bios.date: 05/23/2012 dmi.bios.vendor: American Megatrends Inc. dmi.bios.version: 090006 dmi.board.name: Virtual Machine dmi.board.vendor: Microsoft Corporation dmi.board.version: 7.0 dmi.chassis.asset.tag: 3060-1254-0945-5202-9816-4673-85 dmi.chassis.type: 3 dmi.chassis.vendor: Microsoft Corporation dmi.chassis.version: 7.0 dmi.modalias: dmi:bvnAmericanMegatrendsInc.:bvr090006:bd05/23/2012:svnMicrosoftCorporation:pnVirtualMachine:pvr7.0:rvnMicrosoftCorporation:rnVirtualMachine:rvr7.0:cvnMicrosoftCorporation:ct3:cvr7.0: dmi.product.name: Virtual Machine dmi.product.version: 7.0 dmi.sys.vendor: Microsoft Corporation To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1406867/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1403154] Re: linux: 3.2.0-75.110 -proposed tracker
** Description changed: This bug is for tracking the 3.2.0-75.110 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 16. December 2014 17:50 UTC kernel-stable-Prepare-package-end:Tuesday, 16. December 2014 23:08 UTC kernel-stable-Promote-to-proposed-start:Tuesday, 16. December 2014 23:08 UTC ppa-package-testing-start:Tuesday, 16. December 2014 23:08 UTC kernel-stable-Promote-to-proposed-end:Wednesday, 17. December 2014 18:20 UTC kernel-stable-Verification-testing-start:Wednesday, 17. December 2014 20:01 UTC kernel-stable-Certification-testing-start:Wednesday, 17. December 2014 20:02 UTC kernel-stable-Security-signoff-start:Wednesday, 17. December 2014 20:02 UTC kernel-stable-Regression-testing-start:Wednesday, 17. December 2014 20:02 UTC kernel-stable-Security-signoff-end:Thursday, 18. December 2014 14:01 UTC kernel-stable-Certification-testing-end:Wednesday, 07. January 2015 10:01 UTC kernel-stable-Regression-testing-end:Friday, 09. January 2015 16:10 UTC kernel-stable-phase:CopyToUpdates kernel-stable-phase-changed:Friday, 09. January 2015 16:20 UTC kernel-stable-Promote-to-updates-start:Friday, 09. January 2015 16:20 UTC + kernel-stable-Promote-to-updates-end:Monday, 12. January 2015 17:35 UTC -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1403154 Title: linux: 3.2.0-75.110 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: Fix Released Status in Kernel SRU Workflow package-testing series: Fix Released Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-lbm series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Fix Released Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux package in Ubuntu: Invalid Status in linux source package in Precise: Fix Released Bug description: This bug is for tracking the 3.2.0-75.110 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 16. December 2014 17:50 UTC kernel-stable-Prepare-package-end:Tuesday, 16. December 2014 23:08 UTC kernel-stable-Promote-to-proposed-start:Tuesday, 16. December 2014 23:08 UTC ppa-package-testing-start:Tuesday, 16. December 2014 23:08 UTC kernel-stable-Promote-to-proposed-end:Wednesday, 17. December 2014 18:20 UTC kernel-stable-Verification-testing-start:Wednesday, 17. December 2014 20:01 UTC kernel-stable-Certification-testing-start:Wednesday, 17. December 2014 20:02 UTC kernel-stable-Security-signoff-start:Wednesday, 17. December 2014 20:02 UTC kernel-stable-Regression-testing-start:Wednesday, 17. December 2014 20:02 UTC kernel-stable-Security-signoff-end:Thursday, 18. December 2014 14:01 UTC kernel-stable-Certification-testing-end:Wednesday, 07. January 2015 10:01 UTC kernel-stable-Regression-testing-end:Friday, 09. January 2015 16:10 UTC kernel-stable-phase:CopyToUpdates kernel-stable-phase-changed:Friday, 09. January 2015 16:20 UTC kernel-stable-Promote-to-updates-start:Friday, 09. January 2015 16:20 UTC kernel-stable-Promote-to-updates-end:Monday, 12. January 2015 17:35 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1403154/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
Re: [Kernel-packages] [Bug 1409531] Re: Wifi Drops
Pretty much been going on since I installed it. It seems random. The only thing I can figure out is that out tends to happen more often when the network is under load. I had a download going and the wireless turned off 3 times during that process. On Jan 12, 2015 10:45 AM, "Joseph Salisbury" wrote: > Did this issue start happening after an update/upgrade? Was there a > prior kernel version where you were not having this particular problem? > > Would it be possible for you to test the latest upstream kernel? Refer > to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest > v3.19 kernel[0]. > > If this bug is fixed in the mainline kernel, please add the following > tag 'kernel-fixed-upstream'. > > If the mainline kernel does not fix this bug, please add the tag: > 'kernel-bug-exists-upstream'. > > If you are unable to test the mainline kernel, for example it will not > boot, please add the tag: 'kernel-unable-to-test-upstream'. > Once testing of the upstream kernel is complete, please mark this bug as > "Confirmed". > > > Thanks in advance. > > [0] http://kernel.ubuntu.com/~kernel-ppa/mainline/v3.19-rc4-vivid/ > > ** Changed in: linux (Ubuntu) >Importance: Undecided => Medium > > ** Changed in: linux (Ubuntu) >Status: Confirmed => Incomplete > > -- > You received this bug notification because you are subscribed to the bug > report. > https://bugs.launchpad.net/bugs/1409531 > > Title: > Wifi Drops > > Status in linux package in Ubuntu: > Incomplete > > Bug description: > Wireless adapter randomly stops working and drops signal. Ubuntu > still registers that it exists, but doesn't find any wireless signals. > I have to disable and enable the adapter to reconnect it. > > ProblemType: Bug > DistroRelease: Ubuntu 14.04 > Package: linux-image-3.13.0-43-generic 3.13.0-43.72 > ProcVersionSignature: Ubuntu 3.13.0-43.72-generic 3.13.11.11 > Uname: Linux 3.13.0-43-generic x86_64 > ApportVersion: 2.14.1-0ubuntu3.6 > Architecture: amd64 > AudioDevicesInUse: >USERPID ACCESS COMMAND >/dev/snd/controlC1: rusty 2003 F pulseaudio >/dev/snd/controlC0: rusty 2003 F pulseaudio > CurrentDesktop: Unity > Date: Sun Jan 11 15:06:03 2015 > EcryptfsInUse: Yes > InstallationDate: Installed on 2014-09-11 (122 days ago) > InstallationMedia: Ubuntu 14.04.1 LTS "Trusty Tahr" - Release amd64 > (20140722.2) > Lsusb: >Bus 001 Device 003: ID 0bda:8187 Realtek Semiconductor Corp. RTL8187 > Wireless Adapter >Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub >Bus 002 Device 002: ID 046d:c52b Logitech, Inc. Unifying Receiver >Bus 002 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub > MachineType: System manufacturer System Product Name > ProcFB: 0 radeondrmfb > ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-43-generic > root=UUID=ec1cc0a1-628a-414a-95c2-1585ed7f7271 ro quiet splash vt.handoff=7 > RelatedPackageVersions: >linux-restricted-modules-3.13.0-43-generic N/A >linux-backports-modules-3.13.0-43-generic N/A >linux-firmware 1.127.11 > RfKill: >0: phy0: Wireless LAN > Soft blocked: no > Hard blocked: no > SourcePackage: linux > UpgradeStatus: No upgrade log present (probably fresh install) > dmi.bios.date: 06/20/2007 > dmi.bios.vendor: Phoenix Technologies, LTD > dmi.bios.version: ASUS M2N32-SLI DELUXE ACPI BIOS Revision 1201 > dmi.board.name: M2N32-SLI DELUXE > dmi.board.vendor: ASUSTeK Computer INC. > dmi.board.version: 1.XX > dmi.chassis.asset.tag: 123456789000 > dmi.chassis.type: 3 > dmi.chassis.vendor: Chassis Manufacture > dmi.chassis.version: Chassis Version > dmi.modalias: > dmi:bvnPhoenixTechnologies,LTD:bvrASUSM2N32-SLIDELUXEACPIBIOSRevision1201:bd06/20/2007:svnSystemmanufacturer:pnSystemProductName:pvrSystemVersion:rvnASUSTeKComputerINC.:rnM2N32-SLIDELUXE:rvr1.XX:cvnChassisManufacture:ct3:cvrChassisVersion: > dmi.product.name: System Product Name > dmi.product.version: System Version > dmi.sys.vendor: System manufacturer > > To manage notifications about this bug go to: > https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1409531/+subscriptions > -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1409531 Title: Wifi Drops Status in linux package in Ubuntu: Incomplete Bug description: Wireless adapter randomly stops working and drops signal. Ubuntu still registers that it exists, but doesn't find any wireless signals. I have to disable and enable the adapter to reconnect it. ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-43-generic 3.13.0-43.72 ProcVersionSignature: Ubuntu 3.13.0-43.72-generic 3.13.11.11 Uname: Linux 3.13.0-43-generic x86_64 ApportVersion: 2.14.1-0ubuntu3.6 Architecture: amd64 AudioDevicesInUse: USER
Re: [Kernel-packages] [Bug 1409582] Re: Touch screen and touch pad not working
This isn't an upgrade. I just purchased the laptop and stripped windows off of it and loaded the 64 bit Ubuntu desktop that is available from the website onto it. It may be a few hours before I can get to more testing, but I will try. On Mon, Jan 12, 2015, 10:45 Joseph Salisbury wrote: > Did this issue start happening after an update/upgrade? Was there a > prior kernel version where you were not having this particular problem? > > Would it be possible for you to test the latest upstream kernel? Refer > to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest > v3.19 kernel[0]. > > If this bug is fixed in the mainline kernel, please add the following > tag 'kernel-fixed-upstream'. > > If the mainline kernel does not fix this bug, please add the tag: > 'kernel-bug-exists-upstream'. > > If you are unable to test the mainline kernel, for example it will not > boot, please add the tag: 'kernel-unable-to-test-upstream'. > Once testing of the upstream kernel is complete, please mark this bug as > "Confirmed". > > > Thanks in advance. > > [0] http://kernel.ubuntu.com/~kernel-ppa/mainline/v3.19-rc4-vivid/ > > ** Changed in: linux (Ubuntu) >Importance: Undecided => Medium > > ** Changed in: linux (Ubuntu) >Status: Confirmed => Incomplete > > -- > You received this bug notification because you are subscribed to the bug > report. > https://bugs.launchpad.net/bugs/1409582 > > Title: > Touch screen and touch pad not working > > Status in linux package in Ubuntu: > Incomplete > > Bug description: > in a Lenovo Yoga 3 Pro > > ProblemType: Bug > DistroRelease: Ubuntu 14.04 > Package: linux-image-3.13.0-43-generic 3.13.0-43.72 > ProcVersionSignature: Ubuntu 3.13.0-43.72-generic 3.13.11.11 > Uname: Linux 3.13.0-43-generic x86_64 > NonfreeKernelModules: wl > ApportVersion: 2.14.1-0ubuntu3.6 > Architecture: amd64 > AudioDevicesInUse: >USERPID ACCESS COMMAND >/dev/snd/controlC0: lividium 1772 F pulseaudio >/dev/snd/controlC1: lividium 1772 F pulseaudio > CurrentDesktop: Unity > Date: Sun Jan 11 21:02:07 2015 > HibernationDevice: RESUME=UUID=d4dd0015-38ca-4d6b-9c29-9c3f3f0271c9 > InstallationDate: Installed on 2015-01-06 (5 days ago) > InstallationMedia: Ubuntu 14.04.1 LTS "Trusty Tahr" - Release amd64 > (20140722.2) > MachineType: LENOVO 80HE > ProcFB: 0 inteldrmfb > ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-43-generic > root=UUID=2fd25d46-3932-4d2d-9bff-18bb5e732c4b ro quiet splash > vt.handoff=7 > RelatedPackageVersions: >linux-restricted-modules-3.13.0-43-generic N/A >linux-backports-modules-3.13.0-43-generic N/A >linux-firmware 1.127.11 > SourcePackage: linux > UpgradeStatus: No upgrade log present (probably fresh install) > WifiSyslog: > > dmi.bios.date: 09/30/2014 > dmi.bios.vendor: LENOVO > dmi.bios.version: A6CN38WW > dmi.board.asset.tag: NO Asset Tag > dmi.board.name: VIUU4 > dmi.board.vendor: LENOVO > dmi.board.version: 31900058 WIN > dmi.chassis.asset.tag: NO Asset Tag > dmi.chassis.type: 10 > dmi.chassis.vendor: LENOVO > dmi.chassis.version: Lenovo YOGA 3 Pro-1370 > dmi.modalias: dmi:bvnLENOVO:bvrA6CN38WW:bd09/30/2014:svnLENOVO:pn80HE: > pvrLenovoYOGA3Pro-1370:rvnLENOVO:rnVIUU4:rvr31900058WIN:cvnLENOVO:ct10: > cvrLenovoYOGA3Pro-1370: > dmi.product.name: 80HE > dmi.product.version: Lenovo YOGA 3 Pro-1370 > dmi.sys.vendor: LENOVO > > To manage notifications about this bug go to: > https://bugs.launchpad.net/ubuntu/+source/linux/+bug/ > 1409582/+subscriptions > -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1409582 Title: Touch screen and touch pad not working Status in linux package in Ubuntu: Incomplete Bug description: in a Lenovo Yoga 3 Pro ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-43-generic 3.13.0-43.72 ProcVersionSignature: Ubuntu 3.13.0-43.72-generic 3.13.11.11 Uname: Linux 3.13.0-43-generic x86_64 NonfreeKernelModules: wl ApportVersion: 2.14.1-0ubuntu3.6 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: lividium 1772 F pulseaudio /dev/snd/controlC1: lividium 1772 F pulseaudio CurrentDesktop: Unity Date: Sun Jan 11 21:02:07 2015 HibernationDevice: RESUME=UUID=d4dd0015-38ca-4d6b-9c29-9c3f3f0271c9 InstallationDate: Installed on 2015-01-06 (5 days ago) InstallationMedia: Ubuntu 14.04.1 LTS "Trusty Tahr" - Release amd64 (20140722.2) MachineType: LENOVO 80HE ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-43-generic root=UUID=2fd25d46-3932-4d2d-9bff-18bb5e732c4b ro quiet splash vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-3.13.0-43-generic N/A linux-backports-modules-3.13.0-43-generic N/A linux-firmware
[Kernel-packages] [Bug 1402872] Re: linux: 3.13.0-44.73 -proposed tracker
** Description changed: This bug is for tracking the 3.13.0-44.73 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Monday, 15. December 2014 23:54 UTC kernel-stable-Prepare-package-end:Tuesday, 16. December 2014 07:08 UTC kernel-stable-Promote-to-proposed-start:Tuesday, 16. December 2014 07:08 UTC ppa-package-testing-start:Tuesday, 16. December 2014 07:08 UTC kernel-stable-Promote-to-proposed-end:Tuesday, 16. December 2014 22:00 UTC kernel-stable-Verification-testing-start:Tuesday, 16. December 2014 23:01 UTC kernel-stable-Certification-testing-start:Tuesday, 16. December 2014 23:01 UTC kernel-stable-Security-signoff-start:Tuesday, 16. December 2014 23:01 UTC kernel-stable-Regression-testing-start:Tuesday, 16. December 2014 23:01 UTC kernel-stable-Security-signoff-end:Thursday, 18. December 2014 14:00 UTC kernel-stable-Certification-testing-end:Wednesday, 07. January 2015 16:00 UTC kernel-stable-Regression-testing-end:Friday, 09. January 2015 16:06 UTC kernel-stable-phase:CopyToUpdates kernel-stable-phase-changed:Friday, 09. January 2015 16:18 UTC kernel-stable-Promote-to-updates-start:Friday, 09. January 2015 16:18 UTC + kernel-stable-Promote-to-updates-end:Monday, 12. January 2015 17:34 UTC -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1402872 Title: linux: 3.13.0-44.73 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: Fix Released Status in Kernel SRU Workflow package-testing series: Fix Released Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Fix Released Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux package in Ubuntu: Invalid Status in linux source package in Trusty: Fix Released Bug description: This bug is for tracking the 3.13.0-44.73 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Monday, 15. December 2014 23:54 UTC kernel-stable-Prepare-package-end:Tuesday, 16. December 2014 07:08 UTC kernel-stable-Promote-to-proposed-start:Tuesday, 16. December 2014 07:08 UTC ppa-package-testing-start:Tuesday, 16. December 2014 07:08 UTC kernel-stable-Promote-to-proposed-end:Tuesday, 16. December 2014 22:00 UTC kernel-stable-Verification-testing-start:Tuesday, 16. December 2014 23:01 UTC kernel-stable-Certification-testing-start:Tuesday, 16. December 2014 23:01 UTC kernel-stable-Security-signoff-start:Tuesday, 16. December 2014 23:01 UTC kernel-stable-Regression-testing-start:Tuesday, 16. December 2014 23:01 UTC kernel-stable-Security-signoff-end:Thursday, 18. December 2014 14:00 UTC kernel-stable-Certification-testing-end:Wednesday, 07. January 2015 16:00 UTC kernel-stable-Regression-testing-end:Friday, 09. January 2015 16:06 UTC kernel-stable-phase:CopyToUpdates kernel-stable-phase-changed:Friday, 09. January 2015 16:18 UTC kernel-stable-Promote-to-updates-start:Friday, 09. January 2015 16:18 UTC kernel-stable-Promote-to-updates-end:Monday, 12. January 2015 17:34 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1402872/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1403154] Re: linux: 3.2.0-75.110 -proposed tracker
Promoted to Updates: linux | 3.2.0-75.110 | precise-security | source linux | 3.2.0-75.110 | precise-updates | source linux-meta| 3.2.0.75.89 | precise-security | source linux-meta| 3.2.0.75.89 | precise-updates | source linux-backports-modules-3.2.0 | 3.2.0-75.67 | precise-security | source linux-backports-modules-3.2.0 | 3.2.0-75.67 | precise-updates | source ** Changed in: kernel-sru-workflow/promote-to-security Status: Confirmed => Fix Released ** Changed in: kernel-sru-workflow/promote-to-updates Status: Confirmed => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1403154 Title: linux: 3.2.0-75.110 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: Fix Released Status in Kernel SRU Workflow package-testing series: Fix Released Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-lbm series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Fix Released Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux package in Ubuntu: Invalid Status in linux source package in Precise: Fix Released Bug description: This bug is for tracking the 3.2.0-75.110 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 16. December 2014 17:50 UTC kernel-stable-Prepare-package-end:Tuesday, 16. December 2014 23:08 UTC kernel-stable-Promote-to-proposed-start:Tuesday, 16. December 2014 23:08 UTC ppa-package-testing-start:Tuesday, 16. December 2014 23:08 UTC kernel-stable-Promote-to-proposed-end:Wednesday, 17. December 2014 18:20 UTC kernel-stable-Verification-testing-start:Wednesday, 17. December 2014 20:01 UTC kernel-stable-Certification-testing-start:Wednesday, 17. December 2014 20:02 UTC kernel-stable-Security-signoff-start:Wednesday, 17. December 2014 20:02 UTC kernel-stable-Regression-testing-start:Wednesday, 17. December 2014 20:02 UTC kernel-stable-Security-signoff-end:Thursday, 18. December 2014 14:01 UTC kernel-stable-Certification-testing-end:Wednesday, 07. January 2015 10:01 UTC kernel-stable-Regression-testing-end:Friday, 09. January 2015 16:10 UTC kernel-stable-phase:CopyToUpdates kernel-stable-phase-changed:Friday, 09. January 2015 16:20 UTC kernel-stable-Promote-to-updates-start:Friday, 09. January 2015 16:20 UTC kernel-stable-Promote-to-updates-end:Monday, 12. January 2015 17:35 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1403154/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1402872] Re: linux: 3.13.0-44.73 -proposed tracker
Promote to Updates: linux| 3.13.0-44.73 | trusty-security | source linux| 3.13.0-44.73 | trusty-updates | source linux-meta | 3.13.0.44.51 | trusty-security | source linux-meta | 3.13.0.44.51 | trusty-updates | source linux-signed | 3.13.0-44.73 | trusty-security | source linux-signed | 3.13.0-44.73 | trusty-updates | source ** Changed in: kernel-sru-workflow/promote-to-security Status: Confirmed => Fix Released ** Changed in: kernel-sru-workflow/promote-to-updates Status: Confirmed => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1402872 Title: linux: 3.13.0-44.73 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: Fix Released Status in Kernel SRU Workflow package-testing series: Fix Released Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Fix Released Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux package in Ubuntu: Invalid Status in linux source package in Trusty: Fix Released Bug description: This bug is for tracking the 3.13.0-44.73 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Monday, 15. December 2014 23:54 UTC kernel-stable-Prepare-package-end:Tuesday, 16. December 2014 07:08 UTC kernel-stable-Promote-to-proposed-start:Tuesday, 16. December 2014 07:08 UTC ppa-package-testing-start:Tuesday, 16. December 2014 07:08 UTC kernel-stable-Promote-to-proposed-end:Tuesday, 16. December 2014 22:00 UTC kernel-stable-Verification-testing-start:Tuesday, 16. December 2014 23:01 UTC kernel-stable-Certification-testing-start:Tuesday, 16. December 2014 23:01 UTC kernel-stable-Security-signoff-start:Tuesday, 16. December 2014 23:01 UTC kernel-stable-Regression-testing-start:Tuesday, 16. December 2014 23:01 UTC kernel-stable-Security-signoff-end:Thursday, 18. December 2014 14:00 UTC kernel-stable-Certification-testing-end:Wednesday, 07. January 2015 16:00 UTC kernel-stable-Regression-testing-end:Friday, 09. January 2015 16:06 UTC kernel-stable-phase:CopyToUpdates kernel-stable-phase-changed:Friday, 09. January 2015 16:18 UTC kernel-stable-Promote-to-updates-start:Friday, 09. January 2015 16:18 UTC kernel-stable-Promote-to-updates-end:Monday, 12. January 2015 17:34 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1402872/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1409811] [NEW] CVE-2014-9585
*** This bug is a security vulnerability *** Public security bug reported: PIE bypass using VDSO ASLR weakness Break-Fix: - 394f56fe480140877304d342dec46d50dc823d46 ** Affects: linux (Ubuntu) Importance: Medium Status: New ** Affects: linux-armadaxp (Ubuntu) Importance: Medium Status: Invalid ** Affects: linux-ec2 (Ubuntu) Importance: Medium Status: Invalid ** Affects: linux-fsl-imx51 (Ubuntu) Importance: Medium Status: Invalid ** Affects: linux-lts-backport-maverick (Ubuntu) Importance: Undecided Status: New ** Affects: linux-lts-backport-natty (Ubuntu) Importance: Undecided Status: New ** Affects: linux-lts-quantal (Ubuntu) Importance: Medium Status: Invalid ** Affects: linux-lts-raring (Ubuntu) Importance: Medium Status: Invalid ** Affects: linux-lts-saucy (Ubuntu) Importance: Medium Status: Invalid ** Affects: linux-lts-trusty (Ubuntu) Importance: Medium Status: Invalid ** Affects: linux-lts-utopic (Ubuntu) Importance: Medium Status: Invalid ** Affects: linux-mvl-dove (Ubuntu) Importance: Medium Status: Invalid ** Affects: linux-ti-omap4 (Ubuntu) Importance: Medium Status: Invalid ** Affects: linux (Ubuntu Lucid) Importance: Medium Status: New ** Affects: linux-armadaxp (Ubuntu Lucid) Importance: Medium Status: Invalid ** Affects: linux-ec2 (Ubuntu Lucid) Importance: Medium Status: New ** Affects: linux-fsl-imx51 (Ubuntu Lucid) Importance: Medium Status: Invalid ** Affects: linux-lts-backport-maverick (Ubuntu Lucid) Importance: Undecided Status: New ** Affects: linux-lts-backport-natty (Ubuntu Lucid) Importance: Undecided Status: New ** Affects: linux-lts-quantal (Ubuntu Lucid) Importance: Medium Status: Invalid ** Affects: linux-lts-raring (Ubuntu Lucid) Importance: Medium Status: Invalid ** Affects: linux-lts-saucy (Ubuntu Lucid) Importance: Medium Status: Invalid ** Affects: linux-lts-trusty (Ubuntu Lucid) Importance: Medium Status: Invalid ** Affects: linux-lts-utopic (Ubuntu Lucid) Importance: Medium Status: Invalid ** Affects: linux-mvl-dove (Ubuntu Lucid) Importance: Medium Status: Invalid ** Affects: linux-ti-omap4 (Ubuntu Lucid) Importance: Medium Status: Invalid ** Affects: linux (Ubuntu Precise) Importance: Medium Status: New ** Affects: linux-armadaxp (Ubuntu Precise) Importance: Medium Status: New ** Affects: linux-ec2 (Ubuntu Precise) Importance: Medium Status: Invalid ** Affects: linux-fsl-imx51 (Ubuntu Precise) Importance: Medium Status: Invalid ** Affects: linux-lts-backport-maverick (Ubuntu Precise) Importance: Undecided Status: New ** Affects: linux-lts-backport-natty (Ubuntu Precise) Importance: Undecided Status: New ** Affects: linux-lts-quantal (Ubuntu Precise) Importance: Medium Status: New ** Affects: linux-lts-raring (Ubuntu Precise) Importance: Medium Status: New ** Affects: linux-lts-saucy (Ubuntu Precise) Importance: Medium Status: New ** Affects: linux-lts-trusty (Ubuntu Precise) Importance: Medium Status: New ** Affects: linux-lts-utopic (Ubuntu Precise) Importance: Medium Status: Invalid ** Affects: linux-mvl-dove (Ubuntu Precise) Importance: Medium Status: Invalid ** Affects: linux-ti-omap4 (Ubuntu Precise) Importance: Medium Status: New ** Affects: linux (Ubuntu Trusty) Importance: Medium Status: New ** Affects: linux-armadaxp (Ubuntu Trusty) Importance: Medium Status: Invalid ** Affects: linux-ec2 (Ubuntu Trusty) Importance: Medium Status: Invalid ** Affects: linux-fsl-imx51 (Ubuntu Trusty) Importance: Medium Status: Invalid ** Affects: linux-lts-backport-maverick (Ubuntu Trusty) Importance: Undecided Status: New ** Affects: linux-lts-backport-natty (Ubuntu Trusty) Importance: Undecided Status: New ** Affects: linux-lts-quantal (Ubuntu Trusty) Importance: Medium Status: Invalid ** Affects: linux-lts-raring (Ubuntu Trusty) Importance: Medium Status: Invalid ** Affects: linux-lts-saucy (Ubuntu Trusty) Importance: Medium Status: Invalid ** Affects: linux-lts-trusty (Ubuntu Trusty) Importance: Medium Status: Invalid ** Affects: linux-lts-utopic (Ubuntu Trusty) Importance: Medium Status: New ** Affects: linux-mvl-dove (Ubuntu Trusty) Importance: Medium Status: Invalid ** Affects: linux-ti-omap4 (Ubuntu Trusty) Importance: Medium Status: Invalid ** Affects: linux (Ubuntu Utopic) Importance: Medium
[Kernel-packages] [Bug 1409811] Re: CVE-2014-9585
CVE-2014-9585 ** Also affects: linux (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Lucid) Importance: Undecided Status: New ** Changed in: linux-lts-trusty (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-lts-trusty (Ubuntu Lucid) Status: New => Invalid ** Changed in: linux-lts-trusty (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-lts-trusty (Ubuntu Utopic) Status: New => Invalid ** Changed in: linux-armadaxp (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-armadaxp (Ubuntu Lucid) Status: New => Invalid ** Changed in: linux-armadaxp (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-armadaxp (Ubuntu Utopic) Status: New => Invalid ** Changed in: linux-lts-utopic (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-utopic (Ubuntu Lucid) Status: New => Invalid ** Changed in: linux-lts-utopic (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-lts-utopic (Ubuntu Utopic) Status: New => Invalid ** Changed in: linux-ec2 (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-ec2 (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-ec2 (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-ec2 (Ubuntu Utopic) Status: New => Invalid ** Changed in: linux-lts-quantal (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-lts-quantal (Ubuntu Lucid) Status: New => Invalid ** Changed in: linux-lts-quantal (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-lts-quantal (Ubuntu Utopic) Status: New => Invalid ** Changed in: linux-mvl-dove (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-mvl-dove (Ubuntu Trusty) Status: New =>
[Kernel-packages] [Bug 1409808] [NEW] CVE-2014-9584
*** This bug is a security vulnerability *** Public security bug reported: isofs: unchecked printing of ER records Break-Fix: - 4e2024624e678f0ebb916e6192bd23c1f9fdf696 ** Affects: linux (Ubuntu) Importance: Medium Status: New ** Affects: linux-armadaxp (Ubuntu) Importance: Medium Status: Invalid ** Affects: linux-ec2 (Ubuntu) Importance: Medium Status: Invalid ** Affects: linux-fsl-imx51 (Ubuntu) Importance: Medium Status: Invalid ** Affects: linux-lts-backport-maverick (Ubuntu) Importance: Undecided Status: New ** Affects: linux-lts-backport-natty (Ubuntu) Importance: Undecided Status: New ** Affects: linux-lts-quantal (Ubuntu) Importance: Medium Status: Invalid ** Affects: linux-lts-raring (Ubuntu) Importance: Medium Status: Invalid ** Affects: linux-lts-saucy (Ubuntu) Importance: Medium Status: Invalid ** Affects: linux-lts-trusty (Ubuntu) Importance: Medium Status: Invalid ** Affects: linux-lts-utopic (Ubuntu) Importance: Medium Status: Invalid ** Affects: linux-mvl-dove (Ubuntu) Importance: Medium Status: Invalid ** Affects: linux-ti-omap4 (Ubuntu) Importance: Medium Status: Invalid ** Affects: linux (Ubuntu Lucid) Importance: Medium Status: New ** Affects: linux-armadaxp (Ubuntu Lucid) Importance: Medium Status: Invalid ** Affects: linux-ec2 (Ubuntu Lucid) Importance: Medium Status: New ** Affects: linux-fsl-imx51 (Ubuntu Lucid) Importance: Medium Status: Invalid ** Affects: linux-lts-backport-maverick (Ubuntu Lucid) Importance: Undecided Status: New ** Affects: linux-lts-backport-natty (Ubuntu Lucid) Importance: Undecided Status: New ** Affects: linux-lts-quantal (Ubuntu Lucid) Importance: Medium Status: Invalid ** Affects: linux-lts-raring (Ubuntu Lucid) Importance: Medium Status: Invalid ** Affects: linux-lts-saucy (Ubuntu Lucid) Importance: Medium Status: Invalid ** Affects: linux-lts-trusty (Ubuntu Lucid) Importance: Medium Status: Invalid ** Affects: linux-lts-utopic (Ubuntu Lucid) Importance: Medium Status: Invalid ** Affects: linux-mvl-dove (Ubuntu Lucid) Importance: Medium Status: Invalid ** Affects: linux-ti-omap4 (Ubuntu Lucid) Importance: Medium Status: Invalid ** Affects: linux (Ubuntu Precise) Importance: Medium Status: New ** Affects: linux-armadaxp (Ubuntu Precise) Importance: Medium Status: New ** Affects: linux-ec2 (Ubuntu Precise) Importance: Medium Status: Invalid ** Affects: linux-fsl-imx51 (Ubuntu Precise) Importance: Medium Status: Invalid ** Affects: linux-lts-backport-maverick (Ubuntu Precise) Importance: Undecided Status: New ** Affects: linux-lts-backport-natty (Ubuntu Precise) Importance: Undecided Status: New ** Affects: linux-lts-quantal (Ubuntu Precise) Importance: Medium Status: New ** Affects: linux-lts-raring (Ubuntu Precise) Importance: Medium Status: New ** Affects: linux-lts-saucy (Ubuntu Precise) Importance: Medium Status: New ** Affects: linux-lts-trusty (Ubuntu Precise) Importance: Medium Status: New ** Affects: linux-lts-utopic (Ubuntu Precise) Importance: Medium Status: Invalid ** Affects: linux-mvl-dove (Ubuntu Precise) Importance: Medium Status: Invalid ** Affects: linux-ti-omap4 (Ubuntu Precise) Importance: Medium Status: New ** Affects: linux (Ubuntu Trusty) Importance: Medium Status: New ** Affects: linux-armadaxp (Ubuntu Trusty) Importance: Medium Status: Invalid ** Affects: linux-ec2 (Ubuntu Trusty) Importance: Medium Status: Invalid ** Affects: linux-fsl-imx51 (Ubuntu Trusty) Importance: Medium Status: Invalid ** Affects: linux-lts-backport-maverick (Ubuntu Trusty) Importance: Undecided Status: New ** Affects: linux-lts-backport-natty (Ubuntu Trusty) Importance: Undecided Status: New ** Affects: linux-lts-quantal (Ubuntu Trusty) Importance: Medium Status: Invalid ** Affects: linux-lts-raring (Ubuntu Trusty) Importance: Medium Status: Invalid ** Affects: linux-lts-saucy (Ubuntu Trusty) Importance: Medium Status: Invalid ** Affects: linux-lts-trusty (Ubuntu Trusty) Importance: Medium Status: Invalid ** Affects: linux-lts-utopic (Ubuntu Trusty) Importance: Medium Status: New ** Affects: linux-mvl-dove (Ubuntu Trusty) Importance: Medium Status: Invalid ** Affects: linux-ti-omap4 (Ubuntu Trusty) Importance: Medium Status: Invalid ** Affects: linux (Ubuntu Utopic) Importance: Medium
[Kernel-packages] [Bug 1409808] Re: CVE-2014-9584
CVE-2014-9584 ** Also affects: linux (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Lucid) Importance: Undecided Status: New ** Changed in: linux-lts-trusty (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-lts-trusty (Ubuntu Lucid) Status: New => Invalid ** Changed in: linux-lts-trusty (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-lts-trusty (Ubuntu Utopic) Status: New => Invalid ** Changed in: linux-armadaxp (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-armadaxp (Ubuntu Lucid) Status: New => Invalid ** Changed in: linux-armadaxp (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-armadaxp (Ubuntu Utopic) Status: New => Invalid ** Changed in: linux-lts-utopic (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-utopic (Ubuntu Lucid) Status: New => Invalid ** Changed in: linux-lts-utopic (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-lts-utopic (Ubuntu Utopic) Status: New => Invalid ** Changed in: linux-ec2 (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-ec2 (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-ec2 (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-ec2 (Ubuntu Utopic) Status: New => Invalid ** Changed in: linux-lts-quantal (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-lts-quantal (Ubuntu Lucid) Status: New => Invalid ** Changed in: linux-lts-quantal (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-lts-quantal (Ubuntu Utopic) Status: New => Invalid ** Changed in: linux-mvl-dove (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-mvl-dove (Ubuntu Trusty) Status: New =>
[Kernel-packages] [Bug 1402822] Re: linux: 3.16.0-29.39 -proposed tracker
** Description changed: This bug is for tracking the 3.16.0-29.39 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Monday, 15. December 2014 20:29 UTC kernel-stable-Prepare-package-end:Tuesday, 16. December 2014 07:03 UTC kernel-stable-Promote-to-proposed-start:Tuesday, 16. December 2014 07:03 UTC ppa-package-testing-start:Tuesday, 16. December 2014 07:03 UTC kernel-stable-Promote-to-proposed-end:Wednesday, 17. December 2014 20:06 UTC kernel-stable-Verification-testing-start:Wednesday, 17. December 2014 22:00 UTC kernel-stable-Certification-testing-start:Wednesday, 17. December 2014 22:00 UTC kernel-stable-Security-signoff-start:Wednesday, 17. December 2014 22:00 UTC kernel-stable-Regression-testing-start:Wednesday, 17. December 2014 22:00 UTC kernel-stable-Security-signoff-end:Thursday, 18. December 2014 14:00 UTC kernel-stable-Certification-testing-end:Wednesday, 07. January 2015 16:00 UTC kernel-stable-Regression-testing-end:Friday, 09. January 2015 16:06 UTC kernel-stable-phase:CopyToUpdates kernel-stable-phase-changed:Friday, 09. January 2015 16:18 UTC kernel-stable-Promote-to-updates-start:Friday, 09. January 2015 16:18 UTC + kernel-stable-Promote-to-updates-end:Monday, 12. January 2015 17:02 UTC -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1402822 Title: linux: 3.16.0-29.39 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: Fix Released Status in Kernel SRU Workflow package-testing series: In Progress Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Fix Released Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux package in Ubuntu: Invalid Status in linux source package in Utopic: Fix Released Bug description: This bug is for tracking the 3.16.0-29.39 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Monday, 15. December 2014 20:29 UTC kernel-stable-Prepare-package-end:Tuesday, 16. December 2014 07:03 UTC kernel-stable-Promote-to-proposed-start:Tuesday, 16. December 2014 07:03 UTC ppa-package-testing-start:Tuesday, 16. December 2014 07:03 UTC kernel-stable-Promote-to-proposed-end:Wednesday, 17. December 2014 20:06 UTC kernel-stable-Verification-testing-start:Wednesday, 17. December 2014 22:00 UTC kernel-stable-Certification-testing-start:Wednesday, 17. December 2014 22:00 UTC kernel-stable-Security-signoff-start:Wednesday, 17. December 2014 22:00 UTC kernel-stable-Regression-testing-start:Wednesday, 17. December 2014 22:00 UTC kernel-stable-Security-signoff-end:Thursday, 18. December 2014 14:00 UTC kernel-stable-Certification-testing-end:Wednesday, 07. January 2015 16:00 UTC kernel-stable-Regression-testing-end:Friday, 09. January 2015 16:06 UTC kernel-stable-phase:CopyToUpdates kernel-stable-phase-changed:Friday, 09. January 2015 16:18 UTC kernel-stable-Promote-to-updates-start:Friday, 09. January 2015 16:18 UTC kernel-stable-Promote-to-updates-end:Monday, 12. January 2015 17:02 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1402822/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1402822] Re: linux: 3.16.0-29.39 -proposed tracker
Promoted to updates: linux| 3.16.0-29.39 | utopic-security | source linux| 3.16.0-29.39 | utopic-updates | source linux-meta | 3.16.0.29.30 | utopic-security | source linux-meta | 3.16.0.29.30 | utopic-updates | source linux-signed | 3.16.0-29.39 | utopic-security | source linux-signed | 3.16.0-29.39 | utopic-updates | source ** Changed in: kernel-sru-workflow/promote-to-security Status: Confirmed => Fix Released ** Changed in: kernel-sru-workflow/promote-to-updates Status: Confirmed => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1402822 Title: linux: 3.16.0-29.39 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: Fix Released Status in Kernel SRU Workflow package-testing series: In Progress Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Fix Released Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux package in Ubuntu: Invalid Status in linux source package in Utopic: Fix Released Bug description: This bug is for tracking the 3.16.0-29.39 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Monday, 15. December 2014 20:29 UTC kernel-stable-Prepare-package-end:Tuesday, 16. December 2014 07:03 UTC kernel-stable-Promote-to-proposed-start:Tuesday, 16. December 2014 07:03 UTC ppa-package-testing-start:Tuesday, 16. December 2014 07:03 UTC kernel-stable-Promote-to-proposed-end:Wednesday, 17. December 2014 20:06 UTC kernel-stable-Verification-testing-start:Wednesday, 17. December 2014 22:00 UTC kernel-stable-Certification-testing-start:Wednesday, 17. December 2014 22:00 UTC kernel-stable-Security-signoff-start:Wednesday, 17. December 2014 22:00 UTC kernel-stable-Regression-testing-start:Wednesday, 17. December 2014 22:00 UTC kernel-stable-Security-signoff-end:Thursday, 18. December 2014 14:00 UTC kernel-stable-Certification-testing-end:Wednesday, 07. January 2015 16:00 UTC kernel-stable-Regression-testing-end:Friday, 09. January 2015 16:06 UTC kernel-stable-phase:CopyToUpdates kernel-stable-phase-changed:Friday, 09. January 2015 16:18 UTC kernel-stable-Promote-to-updates-start:Friday, 09. January 2015 16:18 UTC kernel-stable-Promote-to-updates-end:Monday, 12. January 2015 17:02 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1402822/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1393317] Re: Intel 7265 [8086:095b] Wireless disconnect automatically
** Changed in: linux (Ubuntu) Status: Fix Committed => Fix Released ** Changed in: hwe-next Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1393317 Title: Intel 7265 [8086:095b] Wireless disconnect automatically Status in HWE Next Project: Fix Released Status in linux package in Ubuntu: Fix Released Status in linux-firmware package in Ubuntu: Fix Released Status in linux source package in Trusty: Fix Released Status in linux-firmware source package in Trusty: Fix Released Status in linux source package in Utopic: Fix Released Status in linux-firmware source package in Utopic: Fix Released Bug description: SRU Justification: Impact: Intel's latest wireless adapter will disconnect automatically Fix: bump firmware API version to 9(the version 9 firmwares of 3160, 7260 and 7265 were already in trusty, but need an upgrade from 23.214.9.0 to the latest 25.222.9.0) Testcase: already tested with Intel 7265 [8086:095b] in OEM projects. To manage notifications about this bug go to: https://bugs.launchpad.net/hwe-next/+bug/1393317/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1346067] Re: [Dell Latitude E5440] O2 Card reader [1217:8520] could not be detected after rebooting this system
** Changed in: hwe-next Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1346067 Title: [Dell Latitude E5440] O2 Card reader [1217:8520] could not be detected after rebooting this system Status in HWE Next Project: Fix Released Status in linux package in Ubuntu: Fix Released Status in linux source package in Trusty: Fix Released Status in linux source package in Utopic: Fix Released Status in linux source package in Vivid: Fix Released Bug description: SRU Justification: Impact: the card reader does not work on this system after rebooting. Fix: cherry pick a simple one line patch Testcase: already tested in OEM projects CID: 201307-14017 Dell Latitude E5440 The O2 card reader, O2 Micro, Inc. SD/MMC Card Reader Controller [1217:8520] (rev 01) is not stable on this system, the card reader cannot be detected. It works normally after reboot, but will be gone if you reboot it one more time Steps: 1. Install 14.04 + update (3.13.0-32), boot to desktop 2. Run lspci -nn to see if the card reader is there 3. Insert a SD card 4. Reboot, go through step 2 and 3 again Expected result: * Card reader should be found in lspci output, SD card should be mounted automatically Actual result: * Nothing happened, the card was not detected at all * On step 4, the card reader works, if rebooted again, it will be gone. ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-32-generic 3.13.0-32.57 ProcVersionSignature: Ubuntu 3.13.0-32.57-generic 3.13.11.4 Uname: Linux 3.13.0-32-generic x86_64 ApportVersion: 2.14.1-0ubuntu3.2 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: ubuntu 1398 F pulseaudio /dev/snd/controlC1: ubuntu 1398 F pulseaudio CurrentDesktop: Unity Date: Mon Jul 21 04:07:31 2014 HibernationDevice: RESUME=UUID=730e0474-ac0b-4fc6-a321-6203c9b07a19 InstallationDate: Installed on 2014-07-21 (0 days ago) InstallationMedia: Ubuntu 14.04 LTS "Trusty Tahr" - Release amd64 (20140417) MachineType: Dell Inc. Latitude E5440 ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-32-generic.efi.signed root=UUID=b55056b7-f859-4273-9793-12757a75c5ee ro quiet splash vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-3.13.0-32-generic N/A linux-backports-modules-3.13.0-32-generic N/A linux-firmware 1.127.4 SourcePackage: linux UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 06/26/2014 dmi.bios.vendor: Dell Inc. dmi.bios.version: A07 dmi.board.name: 01348S dmi.board.vendor: Dell Inc. dmi.board.version: X02 dmi.chassis.type: 9 dmi.chassis.vendor: Dell Inc. dmi.modalias: dmi:bvnDellInc.:bvrA07:bd06/26/2014:svnDellInc.:pnLatitudeE5440:pvr01:rvnDellInc.:rn01348S:rvrX02:cvnDellInc.:ct9:cvr: dmi.product.name: Latitude E5440 dmi.product.version: 01 dmi.sys.vendor: Dell Inc. To manage notifications about this bug go to: https://bugs.launchpad.net/hwe-next/+bug/1346067/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1383589] Re: [Dell Vostro 3546] Wireless key does not work on 14.04
** Changed in: hwe-next Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1383589 Title: [Dell Vostro 3546] Wireless key does not work on 14.04 Status in HWE Next Project: Fix Released Status in linux package in Ubuntu: Fix Released Status in linux source package in Trusty: Fix Released Status in linux source package in Utopic: Fix Released Bug description: SRU Justification: Impact: the wireless key does not work on this system. Fix: cherry pick a simple blacklist patch Testcase: already tested in OEM projects CID: 201404-14998 Dell Vostro 3546 The wireless key does not work on this system. With wireless key press, keycode 240 could be captured by sudo showkey -k, but the scancode can't be detected with sudo showkey -s With xev: KeyPress event, serial 34, synthetic NO, window 0x3e1, root 0x9c, subw 0x0, time 9313601, (-66,498), root:(721,550), state 0x10, keycode 248 (keysym 0x0, NoSymbol), same_screen YES, XLookupString gives 0 bytes: XmbLookupString gives 0 bytes: XFilterEvent returns: False KeyRelease event, serial 34, synthetic NO, window 0x3e1, root 0x9c, subw 0x0, time 9313601, (-66,498), root:(721,550), state 0x10, keycode 248 (keysym 0x0, NoSymbol), same_screen YES, XLookupString gives 0 bytes: XFilterEvent returns: False ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-37-generic 3.13.0-37.64 ProcVersionSignature: Ubuntu 3.13.0-37.64-generic 3.13.11.7 Uname: Linux 3.13.0-37-generic x86_64 ApportVersion: 2.14.1-0ubuntu3.5 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC1: ubuntu 1822 F pulseaudio /dev/snd/controlC0: ubuntu 1822 F pulseaudio CRDA: country TW: (2402 - 2472 @ 40), (3, 27) (5270 - 5330 @ 40), (3, 17), DFS (5735 - 5815 @ 40), (3, 30) CurrentDesktop: Unity Date: Tue Oct 21 02:35:48 2014 HibernationDevice: RESUME=UUID=d93dea8f-2e64-47af-bd90-9671a077bc8f InstallationDate: Installed on 2014-10-21 (0 days ago) InstallationMedia: Ubuntu 14.04.1 LTS "Trusty Tahr" - Release amd64 (20140722.2) MachineType: Dell Inc. Vostro 3546 ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-37-generic.efi.signed root=UUID=8cb5999b-23f7-4b24-aa9f-e70e7645129f ro quiet splash vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-3.13.0-37-generic N/A linux-backports-modules-3.13.0-37-generic N/A linux-firmware 1.127.7 SourcePackage: linux StagingDrivers: rts5139 UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 08/05/2014 dmi.bios.vendor: Dell Inc. dmi.bios.version: A04 dmi.board.name: 02R010 dmi.board.vendor: Dell Inc. dmi.board.version: A04 dmi.chassis.type: 8 dmi.chassis.vendor: Dell Inc. dmi.chassis.version: Not Specified dmi.modalias: dmi:bvnDellInc.:bvrA04:bd08/05/2014:svnDellInc.:pnVostro3546:pvrNotSpecified:rvnDellInc.:rn02R010:rvrA04:cvnDellInc.:ct8:cvrNotSpecified: dmi.product.name: Vostro 3546 dmi.product.version: Not Specified dmi.sys.vendor: Dell Inc. To manage notifications about this bug go to: https://bugs.launchpad.net/hwe-next/+bug/1383589/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1359052] Re: [HP Z1-G2] Realtek card reader [10ec:5249] does not work after suspended on this system
** Changed in: hwe-next/vivid Status: Fix Committed => Fix Released ** Changed in: hwe-next/utopic Status: Fix Committed => Fix Released ** Changed in: hwe-next/trusty Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1359052 Title: [HP Z1-G2] Realtek card reader [10ec:5249] does not work after suspended on this system Status in HWE Next Project: Fix Released Status in HWE Next trusty series: Fix Released Status in HWE Next utopic series: Fix Released Status in HWE Next vivid series: Fix Released Status in linux package in Ubuntu: Fix Released Status in linux source package in Trusty: Fix Released Status in linux source package in Utopic: Fix Released Status in linux source package in Vivid: Fix Released Bug description: SRU Justification: Impact: the card reader does not work on this system after s3. Fix: cherry pick a simple patchset only for the certain driver module. Testcase: already tested in OEM projects Before suspend [ 12.896116] rtsx_pci :03:00.0: irq 47 for MSI/MSI-X [ 12.896128] rtsx_pci :03:00.0: rtsx_pci_acquire_irq: pcr->msi_en = 1, pci->irq = 47 After resume [ 89.354583] rtsx_pci :03:00.0: no hotplug settings from platform rmmod rtsx_pci modprobe rtsx_pci doesn't work Reboot [ 12.358093] rtsx_pci :03:00.0: irq 47 for MSI/MSI-X [ 12.358103] rtsx_pci :03:00.0: rtsx_pci_acquire_irq: pcr->msi_en = 1, pci->irq = 47 [ 12.455971] rtsx_pci: probe of :03:00.0 failed with error -110 Then driver cannot be loaded To manage notifications about this bug go to: https://bugs.launchpad.net/hwe-next/+bug/1359052/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1409794] [NEW] linux: 3.18.0-9.10 -proposed tracker
Public bug reported: This bug is for tracking the 3.18.0-9.10 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-Prepare-package-start:Monday, 12. January 2015 16:51 UTC kernel-phase-changed:Monday, 12. January 2015 16:51 UTC kernel-phase:Prepare ** Affects: kernel-development-workflow Importance: Medium Status: In Progress ** Affects: kernel-development-workflow/package-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-development-workflow/prepare-package Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-development-workflow/prepare-package-meta Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-development-workflow/prepare-package-signed Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-development-workflow/promote-to-release Importance: Medium Assignee: Ubuntu Package Archive Administrators (ubuntu-archive) Status: New ** Affects: linux (Ubuntu) Importance: Medium Status: New ** Affects: linux (Ubuntu Vivid) Importance: Medium Status: New ** Tags: kernel-release-tracking-bug vivid ** Tags added: kernel-release-tracking-bug ** Also affects: linux (Ubuntu Vivid) Importance: Undecided Status: New ** Tags added: vivid ** Also affects: kernel-development-workflow/package-testing Importance: Undecided Status: New ** Also affects: kernel-development-workflow/prepare-package Importance: Undecided Status: New ** Also affects: kernel-development-workflow/prepare-package-meta Importance: Undecided Status: New ** Also affects: kernel-development-workflow/prepare-package-signed Importance: Undecided Status: New ** Also affects: kernel-development-workflow/promote-to-release Importance: Undecided Status: New ** Changed in: kernel-development-workflow Status: New => In Progress ** Changed in: kernel-development-workflow Importance: Undecided => Medium ** Changed in: kernel-development-workflow/package-testing Importance: Undecided => Medium ** Changed in: kernel-development-workflow/package-testing Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-development-workflow/prepare-package Importance: Undecided => Medium ** Changed in: kernel-development-workflow/prepare-package Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-development-workflow/prepare-package-meta Importance: Undecided => Medium ** Changed in: kernel-development-workflow/prepare-package-meta Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-development-workflow/prepare-package-signed Importance: Undecided => Medium ** Changed in: kernel-development-workflow/prepare-package-signed Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-development-workflow/promote-to-release Importance: Undecided => Medium ** Changed in: kernel-development-workflow/promote-to-release Assignee: (unassigned) => Ubuntu Package Archive Administrators (ubuntu-archive) ** Changed in: linux (Ubuntu Vivid) Importance: Undecided => Medium -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1409794 Title: linux: 3.18.0-9.10 -proposed tracker Status in Kernel Development Workflow: In Progress Status in Kernel Development Workflow package-testing series: New Status in Kernel Development Workflow prepare-package series: New Status in Kernel Development Workflow prepare-package-meta series: New Status in Kernel Development Workflow prepare-package-signed series: New Status in Kernel Development Workflow promote-to-release series: New Status in linux package in Ubuntu: New Status in linux source package in Vivid: New Bug description: This bug is for tracking the 3.18.0-9.10 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-Prepare-package-start:Monday, 12. January 2015 16:51 UTC kernel-phase-changed:Monday, 12. January 2015 16:51 UTC kernel-phase:Prepare To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-development-workflow/+bug/1409794/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kerne
[Kernel-packages] [Bug 1403240] Re: linux-armadaxp: 3.2.0-1643.62 -proposed tracker
This bug was fixed in the package linux-armadaxp - 3.2.0-1643.62 --- linux-armadaxp (3.2.0-1643.62) precise; urgency=low [ Ike Panhc ] * Release Tracking Bug - LP: #1403240 * Rebase to Ubuntu-3.2.0-75.110 [ Ubuntu: 3.2.0-75.110 ] * Release Tracking Bug - LP: #1403154 * kvm: fix excessive pages un-pinning in kvm_iommu_map error path. - LP: #1386395 - CVE-2014-8369 * KVM: x86: Don't report guest userspace emulation error to userspace - LP: #1392823 - CVE-2014-7842 * drivers:scsi:storvsc: Fix a bug in handling ring buffer failures that may result in I/O freeze - LP: #1400289 * net:socket: set msg_namelen to 0 if msg_name is passed as NULL in msghdr struct from userland. - LP: #1335478 -- Ike PanhcWed, 17 Dec 2014 10:39:21 +0800 ** Changed in: linux-armadaxp (Ubuntu Precise) Status: In Progress => Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-7842 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-8369 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1403240 Title: linux-armadaxp: 3.2.0-1643.62 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow package-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Confirmed Status in Kernel SRU Workflow promote-to-updates series: Confirmed Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Invalid Status in Kernel SRU Workflow upload-to-ppa series: Invalid Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux-armadaxp package in Ubuntu: Invalid Status in linux-armadaxp source package in Precise: Fix Released Bug description: This bug is for tracking the 3.2.0-1643.62 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 16. December 2014 23:05 UTC kernel-stable-master-bug:1403154 kernel-stable-Certification-testing-end:Wednesday, 17. December 2014 03:02 UTC kernel-stable-Security-signoff-end:Wednesday, 17. December 2014 03:02 UTC kernel-stable-Prepare-package-end:Wednesday, 17. December 2014 06:03 UTC kernel-stable-Promote-to-proposed-start:Wednesday, 17. December 2014 06:03 UTC ppa-package-testing-start:Wednesday, 17. December 2014 06:03 UTC kernel-stable-Promote-to-proposed-end:Wednesday, 17. December 2014 19:09 UTC kernel-stable-Verification-testing-start:Wednesday, 17. December 2014 21:01 UTC kernel-stable-Regression-testing-start:Wednesday, 17. December 2014 21:01 UTC kernel-stable-Regression-testing-end:Thursday, 18. December 2014 05:02 UTC kernel-stable-phase:CopyToUpdates kernel-stable-phase-changed:Friday, 09. January 2015 16:20 UTC kernel-stable-Promote-to-updates-start:Friday, 09. January 2015 16:20 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1403240/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1335478] Re: A new instance of IBM Domino 'bindsock' cannot bind to ports <1024 Kernel 3.13.0-29 and above
This bug was fixed in the package linux-lts-utopic - 3.16.0-29.39~14.04.1 --- linux-lts-utopic (3.16.0-29.39~14.04.1) trusty; urgency=low [ Kamal Mostafa ] * Release Tracking Bug - LP: #1402946 [ AceLan Kao ] * SAUCE: Add use_native_backlight quirk for HP ProBook 6570b - LP: #1359010 [ Andy Whitcroft ] * Revert "SAUCE: (no-up) arm64: optimized copy_to_user and copy_from_user assembly code" - LP: #1398596 * [Config] updateconfigs to balance CONFIG_SCOM_DEBUGFS [ Paolo Pisati ] * [Config] armhf: VIRTIO_[BALLOON|MMIO]=y [ Upstream Kernel Changes ] * Revert "arm64: Make default dma_ops to be noncoherent" - LP: #1386490 * Revert "percpu: free percpu allocation info for uniprocessor system" - LP: #1401079 * ath3k: Add support of MCI 13d3:3408 bt device - LP: #1395465 * x86: kvm: use alternatives for VMCALL vs. VMMCALL if kernel text is read-only - LP: #1379340 * cpufreq: Allow stop CPU callback to be used by all cpufreq drivers - LP: #1397928 * cpufreq: powernv: Set the pstate of the last hotplugged out cpu in policy->cpus to minimum - LP: #1397928 * cpufreq: powernv: Set the cpus to nominal frequency during reboot/kexec - LP: #1397928 * xen-netfront: Remove BUGs on paged skb data which crosses a page boundary - LP: #1275879 * ACPI / blacklist: blacklist Win8 OSI for Dell Vostro 3546 - LP: #1383589 * iwlwifi: add device / firmware to fw-error-dump file - LP: #1399440 * iwlwifi: rename iwl_mvm_fw_error_next_data - LP: #1399440 * iwlwifi: pcie: add firmware monitor capabilities - LP: #1399440 * iwlwifi: remove wrong comment about alignment in iwl-fw-error-dump.h - LP: #1399440 * iwlwifi: mvm: don't collect logs in the interrupt thread - LP: #1399440 * iwlwifi: mvm: kill iwl_mvm_fw_error_rxf_dump - LP: #1399440 * iwlwifi: mvm: update layout of firmware error dump - LP: #1399440 * powerpc/pseries: Fix endiannes issue in RTAS call from xmon - LP: #1396235 * mmc: sdhci-pci-o2micro: Fix Dell E5440 issue - LP: #1346067 * mfd: rtsx: Fix PM suspend for 5227 & 5249 - LP: #1359052 * samsung-laptop: Add broken-acpi-video quirk for NC210/NC110 - LP: #1401079 * acer-wmi: Add acpi_backlight=video quirk for the Acer KAV80 - LP: #1401079 * pinctrl: baytrail: show output gpio state correctly on Intel Baytrail - LP: #1401079 * ALSA: hda - Add dock support for Thinkpad T440 (17aa:2212) - LP: #1401079 * ALSA: hda - Add ultra dock support for Thinkpad X240. - LP: #1401079 * rbd: Fix error recovery in rbd_obj_read_sync() - LP: #1401079 * ds3000: fix LNB supply voltage on Tevii S480 on initialization - LP: #1401079 * powerpc: do_notify_resume can be called with bad thread_info flags argument - LP: #1401079 * powerpc/powernv: Properly fix LPC debugfs endianness - LP: #1401079 * irqchip: armada-370-xp: Fix MSI interrupt handling - LP: #1401079 * irqchip: armada-370-xp: Fix MPIC interrupt handling - LP: #1401079 * USB: kobil_sct: fix non-atomic allocation in write path - LP: #1401079 * USB: opticon: fix non-atomic allocation in write path - LP: #1401079 * regulator: max77693: Fix use of uninitialized regulator config - LP: #1401079 * USB: cdc-acm: add device id for GW Instek AFG-2225 - LP: #1401079 * usb: Do not allow usb_alloc_streams on unconfigured devices - LP: #1401079 * usb-storage: handle a skipped data phase - LP: #1401079 * uas: Add US_FL_NO_ATA_1X quirk for 1 more Seagate model - LP: #1401079 * xhci: Disable streams on Asmedia 1042 xhci controllers - LP: #1401079 * uas: Add NO_ATA_1X for VIA VL711 devices - LP: #1401079 * USB: core: add device-qualifier quirk - LP: #1401079 * USB: quirks: enable device-qualifier quirk for Elan Touchscreen - LP: #1401079 * USB: quirks: enable device-qualifier quirk for another Elan touchscreen - LP: #1401079 * USB: quirks: enable device-qualifier quirk for yet another Elan touchscreen - LP: #1401079 * xhci: no switching back on non-ULT Haswell - LP: #1401079 * uas: Add US_FL_NO_ATA_1X quirk for 2 more Seagate models - LP: #1401079 * of: Fix overflow bug in string property parsing functions - LP: #1401079 * spi: fsl-dspi: Fix CTAR selection - LP: #1401079 * Btrfs: fix kfree on list_head in btrfs_lookup_csums_range error cleanup - LP: #1401079 * ALSA: usb-audio: Fix device_del() sysfs warnings at disconnect - LP: #1401079 * iio: as3935: allocate correct iio_device size - LP: #1401079 * staging:iio:ade7758: Fix NULL pointer deref when enabling buffer - LP: #1401079 * staging:iio:ade7758: Fix check if channels are enabled in prenable - LP: #1401079 * staging:iio:ade7758: Remove "raw" from channel name - LP: #1401079 * USB: cdc-acm: only raise DTR on transitions from B0 - LP: #1401079 * fix breakage in o2
[Kernel-packages] [Bug 1174169] Re: Minimum and maximum cpu frequency are equal
For anyone that might have this problem: I finally noticed what was lagging my PC, probably for ages. Duh. This solved it - either the kernel boot parameter to disable the BIOS imposed limit as above, or what is noted down here: http://blog.patshead.com/2013/04/my-bios-is-limiting-my-cpu-clock- speed.html (as root) echo 1 > /sys/module/processor/parameters/ignore_ppc (this will not persist) It's on a Lenovo X220. My battery's in a poor shape + my charger cable is (poorly) DIY fixed, which are probably connected. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1174169 Title: Minimum and maximum cpu frequency are equal Status in linux package in Ubuntu: Invalid Bug description: I just noticed my laptop stared working considerably slower. I am using an updated 13.04, though the issue did not start right after the upgrade. After tracking down the issue I noticed that both processors operate at 800 MHz instead of the maximum 1800 MHz. Irrespective of the load, the frequency remains 800. Here are some stats: $ cpufreq-info cpufrequtils 008: cpufreq-info (C) Dominik Brodowski 2004-2009 Report errors and bugs to cpuf...@vger.kernel.org, please. analyzing CPU 0: driver: powernow-k8 CPUs which run at the same hardware frequency: 0 1 CPUs which need to have their frequency coordinated by software: 0 1 maximum transition latency: 109 us. hardware limits: 800 MHz - 1.80 GHz available frequency steps: 1.80 GHz, 1.60 GHz, 800 MHz available cpufreq governors: conservative, ondemand, userspace, powersave, performance current policy: frequency should be within 800 MHz and 800 MHz. The governor "performance" may decide which speed to use within this range. current CPU frequency is 800 MHz. cpufreq stats: 1.80 GHz:0.00%, 1.60 GHz:0.00%, 800 MHz:100.00% analyzing CPU 1: driver: powernow-k8 CPUs which run at the same hardware frequency: 0 1 CPUs which need to have their frequency coordinated by software: 0 1 maximum transition latency: 109 us. hardware limits: 800 MHz - 1.80 GHz available frequency steps: 1.80 GHz, 1.60 GHz, 800 MHz available cpufreq governors: conservative, ondemand, userspace, powersave, performance current policy: frequency should be within 800 MHz and 800 MHz. The governor "performance" may decide which speed to use within this range. current CPU frequency is 800 MHz. cpufreq stats: 1.80 GHz:0.00%, 1.60 GHz:0.00%, 800 MHz:100.00% Note the "current policy" says the frequency is between 800 and 800 irrespective of the hardware limits. The original governor was "ondemand", so I changed it to "performance" in order to see if that makes a difference which it didn't. No amount of invoking cpufreq-set or cpufreq-selector changes the frequency. Looking around, I noticed several people reported similar issues in the past though no favorable answer exists. Any help would be greatly appreciated. ProblemType: Bug DistroRelease: Ubuntu 13.04 Package: linux-image-3.8.0-19-generic 3.8.0-19.29 ProcVersionSignature: Ubuntu 3.8.0-19.29-generic 3.8.8 Uname: Linux 3.8.0-19-generic x86_64 NonfreeKernelModules: wl ApportVersion: 2.9.2-0ubuntu8 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: nasko 2398 F pulseaudio CurrentDmesg: [ 39.683389] vboxdrv: fAsync=1 offMin=0x10104a4 offMax=0x10104a4 [ 39.683848] vboxdrv: TSC mode is 'asynchronous', kernel timer mode is 'normal'. [ 39.683860] vboxdrv: Successfully loaded version 4.2.10_Ubuntu (interface 0x001a0004). [ 39.985701] vboxpci: IOMMU not found (not registered) [ 42.446439] init: plymouth-stop pre-start process (1891) terminated with status 1 Date: Mon Apr 29 01:45:06 2013 HibernationDevice: RESUME=UUID=f31bb83c-fcb0-4ec5-81cc-40fee0d3d80f InstallationDate: Installed on 2012-11-13 (166 days ago) InstallationMedia: Ubuntu 12.10 "Quantal Quetzal" - Release amd64 (20121017.5) MachineType: Dell Inc. Inspiron 1721 MarkForUpload: True ProcEnviron: TERM=xterm PATH=(custom, no user) XDG_RUNTIME_DIR= LANG=en_US.UTF-8 SHELL=/bin/bash ProcFB: 0 radeondrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.8.0-19-generic root=UUID=f649c2c6-c308-4d41-a92c-f75a3aac68de ro quiet splash vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-3.8.0-19-generic N/A linux-backports-modules-3.8.0-19-generic N/A linux-firmware1.106 SourcePackage: linux StagingDrivers: zram UpgradeStatus: Upgraded to raring on 2013-04-26 (3 days ago) dmi.bios.date: 05/16/2007 dmi.bios.vendor: De
[Kernel-packages] [Bug 1335478] Re: A new instance of IBM Domino 'bindsock' cannot bind to ports <1024 Kernel 3.13.0-29 and above
This bug was fixed in the package linux-lts-utopic - 3.16.0-29.39~14.04.1 --- linux-lts-utopic (3.16.0-29.39~14.04.1) trusty; urgency=low [ Kamal Mostafa ] * Release Tracking Bug - LP: #1402946 [ AceLan Kao ] * SAUCE: Add use_native_backlight quirk for HP ProBook 6570b - LP: #1359010 [ Andy Whitcroft ] * Revert "SAUCE: (no-up) arm64: optimized copy_to_user and copy_from_user assembly code" - LP: #1398596 * [Config] updateconfigs to balance CONFIG_SCOM_DEBUGFS [ Paolo Pisati ] * [Config] armhf: VIRTIO_[BALLOON|MMIO]=y [ Upstream Kernel Changes ] * Revert "arm64: Make default dma_ops to be noncoherent" - LP: #1386490 * Revert "percpu: free percpu allocation info for uniprocessor system" - LP: #1401079 * ath3k: Add support of MCI 13d3:3408 bt device - LP: #1395465 * x86: kvm: use alternatives for VMCALL vs. VMMCALL if kernel text is read-only - LP: #1379340 * cpufreq: Allow stop CPU callback to be used by all cpufreq drivers - LP: #1397928 * cpufreq: powernv: Set the pstate of the last hotplugged out cpu in policy->cpus to minimum - LP: #1397928 * cpufreq: powernv: Set the cpus to nominal frequency during reboot/kexec - LP: #1397928 * xen-netfront: Remove BUGs on paged skb data which crosses a page boundary - LP: #1275879 * ACPI / blacklist: blacklist Win8 OSI for Dell Vostro 3546 - LP: #1383589 * iwlwifi: add device / firmware to fw-error-dump file - LP: #1399440 * iwlwifi: rename iwl_mvm_fw_error_next_data - LP: #1399440 * iwlwifi: pcie: add firmware monitor capabilities - LP: #1399440 * iwlwifi: remove wrong comment about alignment in iwl-fw-error-dump.h - LP: #1399440 * iwlwifi: mvm: don't collect logs in the interrupt thread - LP: #1399440 * iwlwifi: mvm: kill iwl_mvm_fw_error_rxf_dump - LP: #1399440 * iwlwifi: mvm: update layout of firmware error dump - LP: #1399440 * powerpc/pseries: Fix endiannes issue in RTAS call from xmon - LP: #1396235 * mmc: sdhci-pci-o2micro: Fix Dell E5440 issue - LP: #1346067 * mfd: rtsx: Fix PM suspend for 5227 & 5249 - LP: #1359052 * samsung-laptop: Add broken-acpi-video quirk for NC210/NC110 - LP: #1401079 * acer-wmi: Add acpi_backlight=video quirk for the Acer KAV80 - LP: #1401079 * pinctrl: baytrail: show output gpio state correctly on Intel Baytrail - LP: #1401079 * ALSA: hda - Add dock support for Thinkpad T440 (17aa:2212) - LP: #1401079 * ALSA: hda - Add ultra dock support for Thinkpad X240. - LP: #1401079 * rbd: Fix error recovery in rbd_obj_read_sync() - LP: #1401079 * ds3000: fix LNB supply voltage on Tevii S480 on initialization - LP: #1401079 * powerpc: do_notify_resume can be called with bad thread_info flags argument - LP: #1401079 * powerpc/powernv: Properly fix LPC debugfs endianness - LP: #1401079 * irqchip: armada-370-xp: Fix MSI interrupt handling - LP: #1401079 * irqchip: armada-370-xp: Fix MPIC interrupt handling - LP: #1401079 * USB: kobil_sct: fix non-atomic allocation in write path - LP: #1401079 * USB: opticon: fix non-atomic allocation in write path - LP: #1401079 * regulator: max77693: Fix use of uninitialized regulator config - LP: #1401079 * USB: cdc-acm: add device id for GW Instek AFG-2225 - LP: #1401079 * usb: Do not allow usb_alloc_streams on unconfigured devices - LP: #1401079 * usb-storage: handle a skipped data phase - LP: #1401079 * uas: Add US_FL_NO_ATA_1X quirk for 1 more Seagate model - LP: #1401079 * xhci: Disable streams on Asmedia 1042 xhci controllers - LP: #1401079 * uas: Add NO_ATA_1X for VIA VL711 devices - LP: #1401079 * USB: core: add device-qualifier quirk - LP: #1401079 * USB: quirks: enable device-qualifier quirk for Elan Touchscreen - LP: #1401079 * USB: quirks: enable device-qualifier quirk for another Elan touchscreen - LP: #1401079 * USB: quirks: enable device-qualifier quirk for yet another Elan touchscreen - LP: #1401079 * xhci: no switching back on non-ULT Haswell - LP: #1401079 * uas: Add US_FL_NO_ATA_1X quirk for 2 more Seagate models - LP: #1401079 * of: Fix overflow bug in string property parsing functions - LP: #1401079 * spi: fsl-dspi: Fix CTAR selection - LP: #1401079 * Btrfs: fix kfree on list_head in btrfs_lookup_csums_range error cleanup - LP: #1401079 * ALSA: usb-audio: Fix device_del() sysfs warnings at disconnect - LP: #1401079 * iio: as3935: allocate correct iio_device size - LP: #1401079 * staging:iio:ade7758: Fix NULL pointer deref when enabling buffer - LP: #1401079 * staging:iio:ade7758: Fix check if channels are enabled in prenable - LP: #1401079 * staging:iio:ade7758: Remove "raw" from channel name - LP: #1401079 * USB: cdc-acm: only raise DTR on transitions from B0 - LP: #1401079 * fix breakage in o2
[Kernel-packages] [Bug 1396383] Re: why signed kernels call update-grub?
** Changed in: linux (Ubuntu) Milestone: ubuntu-15.01 => ubuntu-15.02 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1396383 Title: why signed kernels call update-grub? Status in linux package in Ubuntu: In Progress Bug description: Looking at the postrm of linux-signed-image-* it looks very different from linux-image-* ones $ cat linux-signed-image-3.16.0-20-generic.postrm #!/bin/sh -e kernel='vmlinuz-3.16.0-20-generic' case "$0-$1" in *.postinst-configure) rm -f /boot/$kernel.efi.signed cp /boot/$kernel /boot/$kernel.efi.signed sbattach --attach /usr/lib/linux/$kernel.efi.signature /boot/$kernel.efi.signed if which update-grub >/dev/null 2>&1; then update-grub || true fi ;; *.postrm-remove) rm -f /boot/$kernel.efi.signed if which update-grub >/dev/null 2>&1; then update-grub || true fi ;; esac Why does it call update-grub direct instead of calling into /etc/kernel like the normal kernel packages do? In essence on amd64 the amount of calls to update-grub is duplicated on both installation and removal of kernel packages, since -signed version is installed by default. Why can't we just install signed version and make it modify kernel image in-place? ProblemType: Bug DistroRelease: Ubuntu 14.10 Package: linux-signed-generic 3.16.0.25.26 ProcVersionSignature: Ubuntu 3.16.0-25.33-generic 3.16.7 Uname: Linux 3.16.0-25-generic x86_64 ApportVersion: 2.14.7-0ubuntu8 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: xnox 4525 F pulseaudio CurrentDesktop: Unity Date: Tue Nov 25 23:08:41 2014 HibernationDevice: RESUME=UUID=2bf263f1-753f-4b2e-92a6-b00381515e0c InstallationDate: Installed on 2012-01-12 (1048 days ago) InstallationMedia: Ubuntu 13.04 "Raring Ringtail" - Alpha amd64 (20130318) MachineType: Gigabyte Technology Co., Ltd. To be filled by O.E.M. ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.16.0-25-generic.efi.signed root=UUID=6669d411-80c3-41cc-a629-ad84e1ee6854 ro quiet splash nomdmonddf nomdmonisw crashkernel=384M-:128M nomdmonddf nomdmonisw crashkernel=384M-:128M nomdmonddf nomdmonisw crashkernel=384M-:128M nomdmonddf nomdmonisw crashkernel=384M-:128M nomdmonddf nomdmonisw crashkernel=384M-:128M nomdmonddf nomdmonisw crashkernel=384M-:128M nomdmonddf nomdmonisw crashkernel=384M-:128M nomdmonddf nomdmonisw crashkernel=384M-:128M vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-3.16.0-25-generic N/A linux-backports-modules-3.16.0-25-generic N/A linux-firmware 1.138 RfKill: SourcePackage: linux SystemImageInfo: current build number: 0 device name: ? channel: daily last update: Unknown UpgradeStatus: No upgrade log present (probably fresh install) WifiSyslog: dmi.bios.date: 08/13/2013 dmi.bios.vendor: American Megatrends Inc. dmi.bios.version: F18g dmi.board.asset.tag: To be filled by O.E.M. dmi.board.name: Z77X-D3H dmi.board.vendor: Gigabyte Technology Co., Ltd. dmi.board.version: x.x dmi.chassis.asset.tag: To Be Filled By O.E.M. dmi.chassis.type: 3 dmi.chassis.vendor: Gigabyte Technology Co., Ltd. dmi.chassis.version: To Be Filled By O.E.M. dmi.modalias: dmi:bvnAmericanMegatrendsInc.:bvrF18g:bd08/13/2013:svnGigabyteTechnologyCo.,Ltd.:pnTobefilledbyO.E.M.:pvrTobefilledbyO.E.M.:rvnGigabyteTechnologyCo.,Ltd.:rnZ77X-D3H:rvrx.x:cvnGigabyteTechnologyCo.,Ltd.:ct3:cvrToBeFilledByO.E.M.: dmi.product.name: To be filled by O.E.M. dmi.product.version: To be filled by O.E.M. dmi.sys.vendor: Gigabyte Technology Co., Ltd. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1396383/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1335478] Re: A new instance of IBM Domino 'bindsock' cannot bind to ports <1024 Kernel 3.13.0-29 and above
This bug was fixed in the package linux-lts-trusty - 3.13.0-44.73~precise1 --- linux-lts-trusty (3.13.0-44.73~precise1) precise; urgency=low [ Kamal Mostafa ] * Release Tracking Bug - LP: #1402952 [ AceLan Kao ] * SAUCE: Add use_native_backlight quirk for HP ProBook 6570b - LP: #1359010 [ Andy Whitcroft ] * Revert "SAUCE: (no-up) arm64: optimized copy_to_user and copy_from_user assembly code" - LP: #1398596 * [Config] updateconfigs to balance CONFIG_SCOM_DEBUGFS [ Upstream Kernel Changes ] * iwlwifi: mvm: fix merge damage - LP: #1393317 * iwlwifi: remove IWL_UCODE_TLV_FLAGS_SCHED_SCAN flag - LP: #1393317 * iwlwifi: mvm: disable scheduled scan to prevent firmware crash - LP: #1393317 * iwlwifi: mvm: enable scheduled scan on newest firmware - LP: #1393317 * x86: kvm: use alternatives for VMCALL vs. VMMCALL if kernel text is read-only - LP: #1379340 * phylib: introduce PHY_INTERFACE_MODE_XGMII for 10G PHY - LP: #1381084 * of: make of_get_phy_mode parse 'phy-connection-type' - LP: #1381084 * xen-netfront: Remove BUGs on paged skb data which crosses a page boundary - LP: #1275879 * ACPI / blacklist: blacklist Win8 OSI for Dell Vostro 3546 - LP: #1383589 * powerpc/pseries: Fix endiannes issue in RTAS call from xmon - LP: #1396235 * mmc: sdhci-pci-o2micro: Fix Dell E5440 issue - LP: #1346067 * mfd: rtsx: Fix PM suspend for 5227 & 5249 - LP: #1359052 * drivers:scsi:storvsc: Fix a bug in handling ring buffer failures that may result in I/O freeze - LP: #1400289 * arm64: optimized copy_to_user and copy_from_user assembly code - LP: #1400349 * net:socket: set msg_namelen to 0 if msg_name is passed as NULL in msghdr struct from userland. - LP: #1335478 * drm/radeon: initialize sadb to NULL in the audio code - LP: #1402714 * powerpc/vphn: NUMA node code expects big-endian - LP: #1401150 * ALSA: usb-audio: Fix device_del() sysfs warnings at disconnect - LP: #1402853 * ALSA: hda - Add mute LED pin quirk for HP 15 touchsmart - LP: #1334950, #1402853 * rcu: Make callers awaken grace-period kthread - LP: #1402853 * rcu: Use rcu_gp_kthread_wake() to wake up grace period kthreads - LP: #1402853 * net: sctp: fix NULL pointer dereference in af->from_addr_param on malformed packet - LP: #1402853 * KVM: x86: Don't report guest userspace emulation error to userspace - LP: #1402853 * [media] ttusb-dec: buffer overflow in ioctl - LP: #1402853 * arm64: __clear_user: handle exceptions on strb - LP: #1402853 * ARM: pxa: fix hang on startup with DEBUG_LL - LP: #1402853 * samsung-laptop: Add broken-acpi-video quirk for NC210/NC110 - LP: #1402853 * acer-wmi: Add Aspire 5741 to video_vendor_dmi_table - LP: #1402853 * acer-wmi: Add acpi_backlight=video quirk for the Acer KAV80 - LP: #1402853 * rbd: Fix error recovery in rbd_obj_read_sync() - LP: #1402853 * [media] ds3000: fix LNB supply voltage on Tevii S480 on initialization - LP: #1402853 * powerpc: do_notify_resume can be called with bad thread_info flags argument - LP: #1402853 * USB: kobil_sct: fix non-atomic allocation in write path - LP: #1402853 * USB: opticon: fix non-atomic allocation in write path - LP: #1402853 * regulator: max77693: Fix use of uninitialized regulator config - LP: #1402853 * USB: cdc-acm: add device id for GW Instek AFG-2225 - LP: #1402853 * usb: Do not allow usb_alloc_streams on unconfigured devices - LP: #1402853 * usb-storage: handle a skipped data phase - LP: #1402853 * xhci: Switch only Intel Lynx Point-LP ports to EHCI on shutdown. - LP: #1402853 * xhci: no switching back on non-ULT Haswell - LP: #1402853 * of: Fix overflow bug in string property parsing functions - LP: #1402853 * spi: fsl-dspi: Fix CTAR selection - LP: #1402853 * Btrfs: fix kfree on list_head in btrfs_lookup_csums_range error cleanup - LP: #1402853 * staging:iio:ade7758: Fix NULL pointer deref when enabling buffer - LP: #1402853 * staging:iio:ade7758: Fix check if channels are enabled in prenable - LP: #1402853 * staging:iio:ade7758: Remove "raw" from channel name - LP: #1402853 * USB: cdc-acm: only raise DTR on transitions from B0 - LP: #1402853 * serial: Fix divide-by-zero fault in uart_get_divisor() - LP: #1402853 * tty: Fix high cpu load if tty is unreleaseable - LP: #1402853 * tty: Prevent "read/write wait queue active!" log flooding - LP: #1402853 * tty/vt: don't set font mappings on vc not supporting this - LP: #1402853 * spi: pxa2xx: toggle clocks on suspend if not disabled by runtime PM - LP: #1402853 * sysfs: driver core: Fix glue dir race condition by gdp_mutex - LP: #1402853 * i2c: at91: don't account as iowait - LP: #1402853 * nfsd: don't try to reuse an expired DRC entry off the
[Kernel-packages] [Bug 1401903] Re: [Hyper-V] FileCopy data loss after fcopy finish (X86 Only) Ubuntu 14.10
** Changed in: linux (Ubuntu Vivid) Status: Confirmed => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1401903 Title: [Hyper-V] FileCopy data loss after fcopy finish (X86 Only) Ubuntu 14.10 Status in linux package in Ubuntu: Fix Committed Status in linux-lts-utopic package in Ubuntu: Invalid Status in linux source package in Trusty: Invalid Status in linux-lts-utopic source package in Trusty: Confirmed Status in linux source package in Utopic: Confirmed Status in linux-lts-utopic source package in Utopic: Invalid Status in linux source package in Vivid: Fix Committed Status in linux-lts-utopic source package in Vivid: Invalid Bug description: Please include this patch for the bug detailed below. https://git.kernel.org/cgit/linux/kernel/git/gregkh/char-misc.git/commit/?h=char-misc-next&id=31d4ea1a093fcf668d5f95af44b8d41488bdb7ec The hv_fcopy_daemon must also be recompiled with this header. Description of problem: after fcopy from the host to guest check it in guest,no data in the file Version-Release number of selected component (if applicable): Host: hyperv server 2012 R2 Guest VM: Ubuntu 14.10 (final release) How reproducible: 100% Steps to Reproduce: 1.input data in Test.txt(host) 2.install hypervfcopyd(guest) 3.service hypervfcopyd start(guest) 4.(host)C:\> Copy-VMFile "Test VM" -SourcePath "C:\Test.txt" -DestinationPath "/test" -CreateFullPath -FileSource Host(host) 5.check data in test.txt what fcopyed from host(guest) Actual results: all the data is lost Expected results: the same with the original file Additional info: - x64 builds are not affected - this bug has been initially found and patched in a RHEL bug thread, details above are from it. === break-fix: bc5a5b02331a3175a5fca20a4beba249e573b672 31d4ea1a093fcf668d5f95af44b8d41488bdb7ec To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1401903/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1335478] Re: A new instance of IBM Domino 'bindsock' cannot bind to ports <1024 Kernel 3.13.0-29 and above
This bug was fixed in the package linux-lts-trusty - 3.13.0-44.73~precise1 --- linux-lts-trusty (3.13.0-44.73~precise1) precise; urgency=low [ Kamal Mostafa ] * Release Tracking Bug - LP: #1402952 [ AceLan Kao ] * SAUCE: Add use_native_backlight quirk for HP ProBook 6570b - LP: #1359010 [ Andy Whitcroft ] * Revert "SAUCE: (no-up) arm64: optimized copy_to_user and copy_from_user assembly code" - LP: #1398596 * [Config] updateconfigs to balance CONFIG_SCOM_DEBUGFS [ Upstream Kernel Changes ] * iwlwifi: mvm: fix merge damage - LP: #1393317 * iwlwifi: remove IWL_UCODE_TLV_FLAGS_SCHED_SCAN flag - LP: #1393317 * iwlwifi: mvm: disable scheduled scan to prevent firmware crash - LP: #1393317 * iwlwifi: mvm: enable scheduled scan on newest firmware - LP: #1393317 * x86: kvm: use alternatives for VMCALL vs. VMMCALL if kernel text is read-only - LP: #1379340 * phylib: introduce PHY_INTERFACE_MODE_XGMII for 10G PHY - LP: #1381084 * of: make of_get_phy_mode parse 'phy-connection-type' - LP: #1381084 * xen-netfront: Remove BUGs on paged skb data which crosses a page boundary - LP: #1275879 * ACPI / blacklist: blacklist Win8 OSI for Dell Vostro 3546 - LP: #1383589 * powerpc/pseries: Fix endiannes issue in RTAS call from xmon - LP: #1396235 * mmc: sdhci-pci-o2micro: Fix Dell E5440 issue - LP: #1346067 * mfd: rtsx: Fix PM suspend for 5227 & 5249 - LP: #1359052 * drivers:scsi:storvsc: Fix a bug in handling ring buffer failures that may result in I/O freeze - LP: #1400289 * arm64: optimized copy_to_user and copy_from_user assembly code - LP: #1400349 * net:socket: set msg_namelen to 0 if msg_name is passed as NULL in msghdr struct from userland. - LP: #1335478 * drm/radeon: initialize sadb to NULL in the audio code - LP: #1402714 * powerpc/vphn: NUMA node code expects big-endian - LP: #1401150 * ALSA: usb-audio: Fix device_del() sysfs warnings at disconnect - LP: #1402853 * ALSA: hda - Add mute LED pin quirk for HP 15 touchsmart - LP: #1334950, #1402853 * rcu: Make callers awaken grace-period kthread - LP: #1402853 * rcu: Use rcu_gp_kthread_wake() to wake up grace period kthreads - LP: #1402853 * net: sctp: fix NULL pointer dereference in af->from_addr_param on malformed packet - LP: #1402853 * KVM: x86: Don't report guest userspace emulation error to userspace - LP: #1402853 * [media] ttusb-dec: buffer overflow in ioctl - LP: #1402853 * arm64: __clear_user: handle exceptions on strb - LP: #1402853 * ARM: pxa: fix hang on startup with DEBUG_LL - LP: #1402853 * samsung-laptop: Add broken-acpi-video quirk for NC210/NC110 - LP: #1402853 * acer-wmi: Add Aspire 5741 to video_vendor_dmi_table - LP: #1402853 * acer-wmi: Add acpi_backlight=video quirk for the Acer KAV80 - LP: #1402853 * rbd: Fix error recovery in rbd_obj_read_sync() - LP: #1402853 * [media] ds3000: fix LNB supply voltage on Tevii S480 on initialization - LP: #1402853 * powerpc: do_notify_resume can be called with bad thread_info flags argument - LP: #1402853 * USB: kobil_sct: fix non-atomic allocation in write path - LP: #1402853 * USB: opticon: fix non-atomic allocation in write path - LP: #1402853 * regulator: max77693: Fix use of uninitialized regulator config - LP: #1402853 * USB: cdc-acm: add device id for GW Instek AFG-2225 - LP: #1402853 * usb: Do not allow usb_alloc_streams on unconfigured devices - LP: #1402853 * usb-storage: handle a skipped data phase - LP: #1402853 * xhci: Switch only Intel Lynx Point-LP ports to EHCI on shutdown. - LP: #1402853 * xhci: no switching back on non-ULT Haswell - LP: #1402853 * of: Fix overflow bug in string property parsing functions - LP: #1402853 * spi: fsl-dspi: Fix CTAR selection - LP: #1402853 * Btrfs: fix kfree on list_head in btrfs_lookup_csums_range error cleanup - LP: #1402853 * staging:iio:ade7758: Fix NULL pointer deref when enabling buffer - LP: #1402853 * staging:iio:ade7758: Fix check if channels are enabled in prenable - LP: #1402853 * staging:iio:ade7758: Remove "raw" from channel name - LP: #1402853 * USB: cdc-acm: only raise DTR on transitions from B0 - LP: #1402853 * serial: Fix divide-by-zero fault in uart_get_divisor() - LP: #1402853 * tty: Fix high cpu load if tty is unreleaseable - LP: #1402853 * tty: Prevent "read/write wait queue active!" log flooding - LP: #1402853 * tty/vt: don't set font mappings on vc not supporting this - LP: #1402853 * spi: pxa2xx: toggle clocks on suspend if not disabled by runtime PM - LP: #1402853 * sysfs: driver core: Fix glue dir race condition by gdp_mutex - LP: #1402853 * i2c: at91: don't account as iowait - LP: #1402853 * nfsd: don't try to reuse an expired DRC entry off the
[Kernel-packages] [Bug 1402764] Re: WARNING: CPU: 1 PID: 4940 at /build/buildd/linux-3.13.0/mm/truncate.c:652 pagecache_isize_extended+0xfd/0x110() in 3.13.0-43-generic
This bug was fixed in the package linux-lts-trusty - 3.13.0-44.73~precise1 --- linux-lts-trusty (3.13.0-44.73~precise1) precise; urgency=low [ Kamal Mostafa ] * Release Tracking Bug - LP: #1402952 [ AceLan Kao ] * SAUCE: Add use_native_backlight quirk for HP ProBook 6570b - LP: #1359010 [ Andy Whitcroft ] * Revert "SAUCE: (no-up) arm64: optimized copy_to_user and copy_from_user assembly code" - LP: #1398596 * [Config] updateconfigs to balance CONFIG_SCOM_DEBUGFS [ Upstream Kernel Changes ] * iwlwifi: mvm: fix merge damage - LP: #1393317 * iwlwifi: remove IWL_UCODE_TLV_FLAGS_SCHED_SCAN flag - LP: #1393317 * iwlwifi: mvm: disable scheduled scan to prevent firmware crash - LP: #1393317 * iwlwifi: mvm: enable scheduled scan on newest firmware - LP: #1393317 * x86: kvm: use alternatives for VMCALL vs. VMMCALL if kernel text is read-only - LP: #1379340 * phylib: introduce PHY_INTERFACE_MODE_XGMII for 10G PHY - LP: #1381084 * of: make of_get_phy_mode parse 'phy-connection-type' - LP: #1381084 * xen-netfront: Remove BUGs on paged skb data which crosses a page boundary - LP: #1275879 * ACPI / blacklist: blacklist Win8 OSI for Dell Vostro 3546 - LP: #1383589 * powerpc/pseries: Fix endiannes issue in RTAS call from xmon - LP: #1396235 * mmc: sdhci-pci-o2micro: Fix Dell E5440 issue - LP: #1346067 * mfd: rtsx: Fix PM suspend for 5227 & 5249 - LP: #1359052 * drivers:scsi:storvsc: Fix a bug in handling ring buffer failures that may result in I/O freeze - LP: #1400289 * arm64: optimized copy_to_user and copy_from_user assembly code - LP: #1400349 * net:socket: set msg_namelen to 0 if msg_name is passed as NULL in msghdr struct from userland. - LP: #1335478 * drm/radeon: initialize sadb to NULL in the audio code - LP: #1402714 * powerpc/vphn: NUMA node code expects big-endian - LP: #1401150 * ALSA: usb-audio: Fix device_del() sysfs warnings at disconnect - LP: #1402853 * ALSA: hda - Add mute LED pin quirk for HP 15 touchsmart - LP: #1334950, #1402853 * rcu: Make callers awaken grace-period kthread - LP: #1402853 * rcu: Use rcu_gp_kthread_wake() to wake up grace period kthreads - LP: #1402853 * net: sctp: fix NULL pointer dereference in af->from_addr_param on malformed packet - LP: #1402853 * KVM: x86: Don't report guest userspace emulation error to userspace - LP: #1402853 * [media] ttusb-dec: buffer overflow in ioctl - LP: #1402853 * arm64: __clear_user: handle exceptions on strb - LP: #1402853 * ARM: pxa: fix hang on startup with DEBUG_LL - LP: #1402853 * samsung-laptop: Add broken-acpi-video quirk for NC210/NC110 - LP: #1402853 * acer-wmi: Add Aspire 5741 to video_vendor_dmi_table - LP: #1402853 * acer-wmi: Add acpi_backlight=video quirk for the Acer KAV80 - LP: #1402853 * rbd: Fix error recovery in rbd_obj_read_sync() - LP: #1402853 * [media] ds3000: fix LNB supply voltage on Tevii S480 on initialization - LP: #1402853 * powerpc: do_notify_resume can be called with bad thread_info flags argument - LP: #1402853 * USB: kobil_sct: fix non-atomic allocation in write path - LP: #1402853 * USB: opticon: fix non-atomic allocation in write path - LP: #1402853 * regulator: max77693: Fix use of uninitialized regulator config - LP: #1402853 * USB: cdc-acm: add device id for GW Instek AFG-2225 - LP: #1402853 * usb: Do not allow usb_alloc_streams on unconfigured devices - LP: #1402853 * usb-storage: handle a skipped data phase - LP: #1402853 * xhci: Switch only Intel Lynx Point-LP ports to EHCI on shutdown. - LP: #1402853 * xhci: no switching back on non-ULT Haswell - LP: #1402853 * of: Fix overflow bug in string property parsing functions - LP: #1402853 * spi: fsl-dspi: Fix CTAR selection - LP: #1402853 * Btrfs: fix kfree on list_head in btrfs_lookup_csums_range error cleanup - LP: #1402853 * staging:iio:ade7758: Fix NULL pointer deref when enabling buffer - LP: #1402853 * staging:iio:ade7758: Fix check if channels are enabled in prenable - LP: #1402853 * staging:iio:ade7758: Remove "raw" from channel name - LP: #1402853 * USB: cdc-acm: only raise DTR on transitions from B0 - LP: #1402853 * serial: Fix divide-by-zero fault in uart_get_divisor() - LP: #1402853 * tty: Fix high cpu load if tty is unreleaseable - LP: #1402853 * tty: Prevent "read/write wait queue active!" log flooding - LP: #1402853 * tty/vt: don't set font mappings on vc not supporting this - LP: #1402853 * spi: pxa2xx: toggle clocks on suspend if not disabled by runtime PM - LP: #1402853 * sysfs: driver core: Fix glue dir race condition by gdp_mutex - LP: #1402853 * i2c: at91: don't account as iowait - LP: #1402853 * nfsd: don't try to reuse an expired DRC entry off the
[Kernel-packages] [Bug 1403239] Re: linux-ti-omap4: 3.2.0-1458.78 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Chris J Arges (arges) ** Changed in: kernel-sru-workflow/promote-to-updates Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Chris J Arges (arges) ** Changed in: kernel-sru-workflow/promote-to-security Assignee: Chris J Arges (arges) => (unassigned) ** Changed in: kernel-sru-workflow/regression-testing Assignee: Canonical Platform QA Team (canonical-platform-qa) => (unassigned) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-ti-omap4 in Ubuntu. https://bugs.launchpad.net/bugs/1403239 Title: linux-ti-omap4: 3.2.0-1458.78 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow package-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Confirmed Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow upload-to-ppa series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux-ti-omap4 source package in Precise: New Bug description: This bug is for tracking the 3.2.0-1458.78 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 16. December 2014 23:03 UTC kernel-stable-master-bug:1403154 kernel-stable-Certification-testing-end:Thursday, 18. December 2014 12:02 UTC kernel-stable-Prepare-package-end:Thursday, 18. December 2014 16:02 UTC kernel-stable-Promote-to-proposed-start:Thursday, 18. December 2014 16:02 UTC ppa-package-testing-start:Thursday, 18. December 2014 16:02 UTC kernel-stable-Promote-to-proposed-end:Thursday, 18. December 2014 22:02 UTC kernel-stable-Security-signoff-start:Friday, 19. December 2014 00:03 UTC kernel-stable-Verification-testing-start:Friday, 19. December 2014 00:02 UTC kernel-stable-Regression-testing-start:Friday, 19. December 2014 00:03 UTC kernel-stable-phase:Testing kernel-stable-phase-changed:Friday, 19. December 2014 12:01 UTC kernel-stable-Verification-testing-end:Friday, 19. December 2014 12:01 UTC kernel-stable-Security-signoff-end:Friday, 19. December 2014 14:01 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1403239/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1409582] Re: Touch screen and touch pad not working
Did this issue start happening after an update/upgrade? Was there a prior kernel version where you were not having this particular problem? Would it be possible for you to test the latest upstream kernel? Refer to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest v3.19 kernel[0]. If this bug is fixed in the mainline kernel, please add the following tag 'kernel-fixed-upstream'. If the mainline kernel does not fix this bug, please add the tag: 'kernel-bug-exists-upstream'. If you are unable to test the mainline kernel, for example it will not boot, please add the tag: 'kernel-unable-to-test-upstream'. Once testing of the upstream kernel is complete, please mark this bug as "Confirmed". Thanks in advance. [0] http://kernel.ubuntu.com/~kernel-ppa/mainline/v3.19-rc4-vivid/ ** Changed in: linux (Ubuntu) Importance: Undecided => Medium ** Changed in: linux (Ubuntu) Status: Confirmed => Incomplete -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1409582 Title: Touch screen and touch pad not working Status in linux package in Ubuntu: Incomplete Bug description: in a Lenovo Yoga 3 Pro ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-43-generic 3.13.0-43.72 ProcVersionSignature: Ubuntu 3.13.0-43.72-generic 3.13.11.11 Uname: Linux 3.13.0-43-generic x86_64 NonfreeKernelModules: wl ApportVersion: 2.14.1-0ubuntu3.6 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: lividium 1772 F pulseaudio /dev/snd/controlC1: lividium 1772 F pulseaudio CurrentDesktop: Unity Date: Sun Jan 11 21:02:07 2015 HibernationDevice: RESUME=UUID=d4dd0015-38ca-4d6b-9c29-9c3f3f0271c9 InstallationDate: Installed on 2015-01-06 (5 days ago) InstallationMedia: Ubuntu 14.04.1 LTS "Trusty Tahr" - Release amd64 (20140722.2) MachineType: LENOVO 80HE ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-43-generic root=UUID=2fd25d46-3932-4d2d-9bff-18bb5e732c4b ro quiet splash vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-3.13.0-43-generic N/A linux-backports-modules-3.13.0-43-generic N/A linux-firmware 1.127.11 SourcePackage: linux UpgradeStatus: No upgrade log present (probably fresh install) WifiSyslog: dmi.bios.date: 09/30/2014 dmi.bios.vendor: LENOVO dmi.bios.version: A6CN38WW dmi.board.asset.tag: NO Asset Tag dmi.board.name: VIUU4 dmi.board.vendor: LENOVO dmi.board.version: 31900058 WIN dmi.chassis.asset.tag: NO Asset Tag dmi.chassis.type: 10 dmi.chassis.vendor: LENOVO dmi.chassis.version: Lenovo YOGA 3 Pro-1370 dmi.modalias: dmi:bvnLENOVO:bvrA6CN38WW:bd09/30/2014:svnLENOVO:pn80HE:pvrLenovoYOGA3Pro-1370:rvnLENOVO:rnVIUU4:rvr31900058WIN:cvnLENOVO:ct10:cvrLenovoYOGA3Pro-1370: dmi.product.name: 80HE dmi.product.version: Lenovo YOGA 3 Pro-1370 dmi.sys.vendor: LENOVO To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1409582/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1409444] Re: Laptop froze when power cord was pulled out accidentally during resume from sleep
Would it be possible for you to test the latest upstream kernel? Refer to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest v3.19 kernel[0]. If this bug is fixed in the mainline kernel, please add the following tag 'kernel-fixed-upstream'. If the mainline kernel does not fix this bug, please add the tag: 'kernel-bug-exists-upstream'. If you are unable to test the mainline kernel, for example it will not boot, please add the tag: 'kernel-unable-to-test-upstream'. Once testing of the upstream kernel is complete, please mark this bug as "Confirmed". Thanks in advance. [0] http://kernel.ubuntu.com/~kernel-ppa/mainline/v3.19-rc4-vivid/ ** Changed in: linux (Ubuntu) Importance: Undecided => Medium ** Changed in: linux (Ubuntu) Status: Confirmed => Incomplete -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1409444 Title: Laptop froze when power cord was pulled out accidentally during resume from sleep Status in linux package in Ubuntu: Incomplete Bug description: The title says it all: Laptop froze when power cord was pulled out accidentally during resume from sleep. The screen was black with the mouse pointer in it. control+alt+F2 or other attempts to get to a TTY did not work. ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-43-generic 3.13.0-43.72 ProcVersionSignature: Ubuntu 3.13.0-43.72-generic 3.13.11.11 Uname: Linux 3.13.0-43-generic x86_64 NonfreeKernelModules: wl ApportVersion: 2.14.1-0ubuntu3.6 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: albert 2025 F pulseaudio /dev/snd/controlC1: albert 2025 F pulseaudio CurrentDesktop: Unity Date: Sun Jan 11 08:20:24 2015 EcryptfsInUse: Yes InstallationDate: Installed on 2014-09-16 (117 days ago) InstallationMedia: Ubuntu 14.04.1 LTS "Trusty Tahr" - Release amd64 (20140722.2) MachineType: Apple Inc. MacBookPro11,1 ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-43-generic root=UUID=1fe82ec9-9c83-4e33-9506-2f7afb8d9d64 ro libata.force=noncq quiet splash vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-3.13.0-43-generic N/A linux-backports-modules-3.13.0-43-generic N/A linux-firmware 1.127.11 SourcePackage: linux UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 02/12/2014 dmi.bios.vendor: Apple Inc. dmi.bios.version: MBP111.88Z.0138.B07.1402121134 dmi.board.asset.tag: Base Board Asset Tag# dmi.board.name: Mac-189A3D4F975D5FFC dmi.board.vendor: Apple Inc. dmi.board.version: MacBookPro11,1 dmi.chassis.type: 10 dmi.chassis.vendor: Apple Inc. dmi.chassis.version: Mac-189A3D4F975D5FFC dmi.modalias: dmi:bvnAppleInc.:bvrMBP111.88Z.0138.B07.1402121134:bd02/12/2014:svnAppleInc.:pnMacBookPro11,1:pvr1.0:rvnAppleInc.:rnMac-189A3D4F975D5FFC:rvrMacBookPro11,1:cvnAppleInc.:ct10:cvrMac-189A3D4F975D5FFC: dmi.product.name: MacBookPro11,1 dmi.product.version: 1.0 dmi.sys.vendor: Apple Inc. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1409444/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1386395] Re: CVE-2014-8369
This bug was fixed in the package linux-armadaxp - 3.2.0-1643.62 --- linux-armadaxp (3.2.0-1643.62) precise; urgency=low [ Ike Panhc ] * Release Tracking Bug - LP: #1403240 * Rebase to Ubuntu-3.2.0-75.110 [ Ubuntu: 3.2.0-75.110 ] * Release Tracking Bug - LP: #1403154 * kvm: fix excessive pages un-pinning in kvm_iommu_map error path. - LP: #1386395 - CVE-2014-8369 * KVM: x86: Don't report guest userspace emulation error to userspace - LP: #1392823 - CVE-2014-7842 * drivers:scsi:storvsc: Fix a bug in handling ring buffer failures that may result in I/O freeze - LP: #1400289 * net:socket: set msg_namelen to 0 if msg_name is passed as NULL in msghdr struct from userland. - LP: #1335478 -- Ike PanhcWed, 17 Dec 2014 10:39:21 +0800 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1386395 Title: CVE-2014-8369 Status in linux package in Ubuntu: Fix Committed Status in linux-armadaxp package in Ubuntu: Invalid Status in linux-ec2 package in Ubuntu: Invalid Status in linux-fsl-imx51 package in Ubuntu: Invalid Status in linux-lts-backport-maverick package in Ubuntu: New Status in linux-lts-backport-natty package in Ubuntu: New Status in linux-lts-quantal package in Ubuntu: Invalid Status in linux-lts-raring package in Ubuntu: Invalid Status in linux-lts-saucy package in Ubuntu: Invalid Status in linux-lts-trusty package in Ubuntu: Invalid Status in linux-lts-utopic package in Ubuntu: Invalid Status in linux-mvl-dove package in Ubuntu: Invalid Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux source package in Lucid: Invalid Status in linux-armadaxp source package in Lucid: Invalid Status in linux-ec2 source package in Lucid: Invalid Status in linux-fsl-imx51 source package in Lucid: Invalid Status in linux-lts-backport-maverick source package in Lucid: New Status in linux-lts-backport-natty source package in Lucid: New Status in linux-lts-quantal source package in Lucid: Invalid Status in linux-lts-raring source package in Lucid: Invalid Status in linux-lts-saucy source package in Lucid: Invalid Status in linux-lts-trusty source package in Lucid: Invalid Status in linux-lts-utopic source package in Lucid: Invalid Status in linux-mvl-dove source package in Lucid: Invalid Status in linux-ti-omap4 source package in Lucid: Invalid Status in linux source package in Precise: Fix Released Status in linux-armadaxp source package in Precise: Fix Released Status in linux-ec2 source package in Precise: Invalid Status in linux-fsl-imx51 source package in Precise: Invalid Status in linux-lts-backport-maverick source package in Precise: New Status in linux-lts-backport-natty source package in Precise: New Status in linux-lts-quantal source package in Precise: Fix Committed Status in linux-lts-raring source package in Precise: Invalid Status in linux-lts-saucy source package in Precise: Fix Committed Status in linux-lts-trusty source package in Precise: Fix Released Status in linux-lts-utopic source package in Precise: Invalid Status in linux-mvl-dove source package in Precise: Invalid Status in linux-ti-omap4 source package in Precise: Fix Committed Status in linux source package in Trusty: Fix Released Status in linux-armadaxp source package in Trusty: Invalid Status in linux-ec2 source package in Trusty: Invalid Status in linux-fsl-imx51 source package in Trusty: Invalid Status in linux-lts-backport-maverick source package in Trusty: New Status in linux-lts-backport-natty source package in Trusty: New Status in linux-lts-quantal source package in Trusty: Invalid Status in linux-lts-raring source package in Trusty: Invalid Status in linux-lts-saucy source package in Trusty: Invalid Status in linux-lts-trusty source package in Trusty: Invalid Status in linux-lts-utopic source package in Trusty: Fix Released Status in linux-mvl-dove source package in Trusty: Invalid Status in linux-ti-omap4 source package in Trusty: Invalid Status in linux source package in Utopic: Fix Released Status in linux-armadaxp source package in Utopic: Invalid Status in linux-ec2 source package in Utopic: Invalid Status in linux-fsl-imx51 source package in Utopic: Invalid Status in linux-lts-backport-maverick source package in Utopic: New Status in linux-lts-backport-natty source package in Utopic: New Status in linux-lts-quantal source package in Utopic: Invalid Status in linux-lts-raring source package in Utopic: Invalid Status in linux-lts-saucy source package in Utopic: Invalid Status in linux-lts-trusty source package in Utopic: Invalid Status in linux-lts-utopic source package in Utopic: Invalid Status in linux-mvl-dove source package in Utopic: Invalid Status in linux-ti-omap4 source package in Utopic: Inval
[Kernel-packages] [Bug 1392823] Re: CVE-2014-7842
This bug was fixed in the package linux-armadaxp - 3.2.0-1643.62 --- linux-armadaxp (3.2.0-1643.62) precise; urgency=low [ Ike Panhc ] * Release Tracking Bug - LP: #1403240 * Rebase to Ubuntu-3.2.0-75.110 [ Ubuntu: 3.2.0-75.110 ] * Release Tracking Bug - LP: #1403154 * kvm: fix excessive pages un-pinning in kvm_iommu_map error path. - LP: #1386395 - CVE-2014-8369 * KVM: x86: Don't report guest userspace emulation error to userspace - LP: #1392823 - CVE-2014-7842 * drivers:scsi:storvsc: Fix a bug in handling ring buffer failures that may result in I/O freeze - LP: #1400289 * net:socket: set msg_namelen to 0 if msg_name is passed as NULL in msghdr struct from userland. - LP: #1335478 -- Ike PanhcWed, 17 Dec 2014 10:39:21 +0800 ** Changed in: linux-armadaxp (Ubuntu Precise) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1392823 Title: CVE-2014-7842 Status in linux package in Ubuntu: Fix Committed Status in linux-armadaxp package in Ubuntu: Invalid Status in linux-ec2 package in Ubuntu: Invalid Status in linux-fsl-imx51 package in Ubuntu: Invalid Status in linux-lts-backport-maverick package in Ubuntu: New Status in linux-lts-backport-natty package in Ubuntu: New Status in linux-lts-quantal package in Ubuntu: Invalid Status in linux-lts-raring package in Ubuntu: Invalid Status in linux-lts-saucy package in Ubuntu: Invalid Status in linux-lts-trusty package in Ubuntu: Invalid Status in linux-lts-utopic package in Ubuntu: Invalid Status in linux-mvl-dove package in Ubuntu: Invalid Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux source package in Lucid: Invalid Status in linux-armadaxp source package in Lucid: Invalid Status in linux-ec2 source package in Lucid: Invalid Status in linux-fsl-imx51 source package in Lucid: Invalid Status in linux-lts-backport-maverick source package in Lucid: New Status in linux-lts-backport-natty source package in Lucid: New Status in linux-lts-quantal source package in Lucid: Invalid Status in linux-lts-raring source package in Lucid: Invalid Status in linux-lts-saucy source package in Lucid: Invalid Status in linux-lts-trusty source package in Lucid: Invalid Status in linux-lts-utopic source package in Lucid: Invalid Status in linux-mvl-dove source package in Lucid: Invalid Status in linux-ti-omap4 source package in Lucid: Invalid Status in linux source package in Precise: Fix Released Status in linux-armadaxp source package in Precise: Fix Released Status in linux-ec2 source package in Precise: Invalid Status in linux-fsl-imx51 source package in Precise: Invalid Status in linux-lts-backport-maverick source package in Precise: New Status in linux-lts-backport-natty source package in Precise: New Status in linux-lts-quantal source package in Precise: Fix Committed Status in linux-lts-raring source package in Precise: Invalid Status in linux-lts-saucy source package in Precise: Fix Committed Status in linux-lts-trusty source package in Precise: Fix Committed Status in linux-lts-utopic source package in Precise: Invalid Status in linux-mvl-dove source package in Precise: Invalid Status in linux-ti-omap4 source package in Precise: Fix Committed Status in linux source package in Trusty: Fix Committed Status in linux-armadaxp source package in Trusty: Invalid Status in linux-ec2 source package in Trusty: Invalid Status in linux-fsl-imx51 source package in Trusty: Invalid Status in linux-lts-backport-maverick source package in Trusty: New Status in linux-lts-backport-natty source package in Trusty: New Status in linux-lts-quantal source package in Trusty: Invalid Status in linux-lts-raring source package in Trusty: Invalid Status in linux-lts-saucy source package in Trusty: Invalid Status in linux-lts-trusty source package in Trusty: Invalid Status in linux-lts-utopic source package in Trusty: Fix Committed Status in linux-mvl-dove source package in Trusty: Invalid Status in linux-ti-omap4 source package in Trusty: Invalid Status in linux source package in Utopic: Fix Committed Status in linux-armadaxp source package in Utopic: Invalid Status in linux-ec2 source package in Utopic: Invalid Status in linux-fsl-imx51 source package in Utopic: Invalid Status in linux-lts-backport-maverick source package in Utopic: New Status in linux-lts-backport-natty source package in Utopic: New Status in linux-lts-quantal source package in Utopic: Invalid Status in linux-lts-raring source package in Utopic: Invalid Status in linux-lts-saucy source package in Utopic: Invalid Status in linux-lts-trusty source package in Utopic: Invalid Status in linux-lts-utopic source package in Utopic: Invalid Status in linux-mvl-do
[Kernel-packages] [Bug 1409584] Re: ThinkPad X1 Carbon 3rd(2015 version) fails to suspend from the second time
Would it be possible for you to test the latest upstream kernel? Refer to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest v3.19 kernel[0]. If this bug is fixed in the mainline kernel, please add the following tag 'kernel-fixed-upstream'. If the mainline kernel does not fix this bug, please add the tag: 'kernel-bug-exists-upstream'. If you are unable to test the mainline kernel, for example it will not boot, please add the tag: 'kernel-unable-to-test-upstream'. Once testing of the upstream kernel is complete, please mark this bug as "Confirmed". Thanks in advance. [0] http://kernel.ubuntu.com/~kernel-ppa/mainline/v3.19-rc4-vivid/ ** Tags added: kernel-key ** Tags removed: kernel-key ** Tags added: kernel-da-key ** Changed in: linux (Ubuntu) Status: Confirmed => Incomplete -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1409584 Title: ThinkPad X1 Carbon 3rd(2015 version) fails to suspend from the second time Status in linux package in Ubuntu: Incomplete Bug description: version: 3rd(2015 version) on Trusty(14.04) It suspends and resumes successfully at the first time, then WWAN devices disappear and fails to suspend. workaround 0: BIOS, Always On USB to disable, USB 3.0 mode to enable workaround 1: disable cdc* modules in rootfs and initramfs(you will lose WWAN feature) workaround 2: reset that WWAN device from xHCI(USB 3.0) port to EHCI(USB 2.0) We still need a fix. --- ApportVersion: 2.14.1-0ubuntu3.6 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: u 1490 F pulseaudio /dev/snd/controlC1: u 1490 F pulseaudio CurrentDesktop: Unity DistroRelease: Ubuntu 14.04 HibernationDevice: RESUME=UUID=53af0423-2b7d-48f8-a1eb-19ef371b2aea InstallationDate: Installed on 2015-01-12 (0 days ago) InstallationMedia: Ubuntu 14.04.1 LTS "Trusty Tahr" - Release amd64 (20140722.2) MachineType: LENOVO 20BTZ09ZUS Package: linux (not installed) ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-43-generic root=UUID=7b0bf38c-9b8d-4349-b992-074cbddd2f13 ro quiet splash vt.handoff=7 ProcVersionSignature: Ubuntu 3.13.0-43.72-generic 3.13.11.11 RelatedPackageVersions: linux-restricted-modules-3.13.0-43-generic N/A linux-backports-modules-3.13.0-43-generic N/A linux-firmware 1.127.11 Tags: trusty Uname: Linux 3.13.0-43-generic x86_64 UpgradeStatus: No upgrade log present (probably fresh install) UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo _MarkForUpload: True dmi.bios.date: 10/27/2014 dmi.bios.vendor: LENOVO dmi.bios.version: N14ET24W (1.02 ) dmi.board.asset.tag: Not Available dmi.board.name: 20BTZ09ZUS dmi.board.vendor: LENOVO dmi.board.version: SDK0E50510 WIN dmi.chassis.asset.tag: No Asset Information dmi.chassis.type: 10 dmi.chassis.vendor: LENOVO dmi.chassis.version: None dmi.modalias: dmi:bvnLENOVO:bvrN14ET24W(1.02):bd10/27/2014:svnLENOVO:pn20BTZ09ZUS:pvrThinkPadX1Carbon3rd:rvnLENOVO:rn20BTZ09ZUS:rvrSDK0E50510WIN:cvnLENOVO:ct10:cvrNone: dmi.product.name: 20BTZ09ZUS dmi.product.version: ThinkPad X1 Carbon 3rd dmi.sys.vendor: LENOVO To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1409584/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1386395] Re: CVE-2014-8369
This bug was fixed in the package linux-armadaxp - 3.2.0-1643.62 --- linux-armadaxp (3.2.0-1643.62) precise; urgency=low [ Ike Panhc ] * Release Tracking Bug - LP: #1403240 * Rebase to Ubuntu-3.2.0-75.110 [ Ubuntu: 3.2.0-75.110 ] * Release Tracking Bug - LP: #1403154 * kvm: fix excessive pages un-pinning in kvm_iommu_map error path. - LP: #1386395 - CVE-2014-8369 * KVM: x86: Don't report guest userspace emulation error to userspace - LP: #1392823 - CVE-2014-7842 * drivers:scsi:storvsc: Fix a bug in handling ring buffer failures that may result in I/O freeze - LP: #1400289 * net:socket: set msg_namelen to 0 if msg_name is passed as NULL in msghdr struct from userland. - LP: #1335478 -- Ike PanhcWed, 17 Dec 2014 10:39:21 +0800 ** Changed in: linux-armadaxp (Ubuntu Precise) Status: Fix Committed => Fix Released ** Changed in: linux-armadaxp (Ubuntu Precise) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1386395 Title: CVE-2014-8369 Status in linux package in Ubuntu: Fix Committed Status in linux-armadaxp package in Ubuntu: Invalid Status in linux-ec2 package in Ubuntu: Invalid Status in linux-fsl-imx51 package in Ubuntu: Invalid Status in linux-lts-backport-maverick package in Ubuntu: New Status in linux-lts-backport-natty package in Ubuntu: New Status in linux-lts-quantal package in Ubuntu: Invalid Status in linux-lts-raring package in Ubuntu: Invalid Status in linux-lts-saucy package in Ubuntu: Invalid Status in linux-lts-trusty package in Ubuntu: Invalid Status in linux-lts-utopic package in Ubuntu: Invalid Status in linux-mvl-dove package in Ubuntu: Invalid Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux source package in Lucid: Invalid Status in linux-armadaxp source package in Lucid: Invalid Status in linux-ec2 source package in Lucid: Invalid Status in linux-fsl-imx51 source package in Lucid: Invalid Status in linux-lts-backport-maverick source package in Lucid: New Status in linux-lts-backport-natty source package in Lucid: New Status in linux-lts-quantal source package in Lucid: Invalid Status in linux-lts-raring source package in Lucid: Invalid Status in linux-lts-saucy source package in Lucid: Invalid Status in linux-lts-trusty source package in Lucid: Invalid Status in linux-lts-utopic source package in Lucid: Invalid Status in linux-mvl-dove source package in Lucid: Invalid Status in linux-ti-omap4 source package in Lucid: Invalid Status in linux source package in Precise: Fix Released Status in linux-armadaxp source package in Precise: Fix Released Status in linux-ec2 source package in Precise: Invalid Status in linux-fsl-imx51 source package in Precise: Invalid Status in linux-lts-backport-maverick source package in Precise: New Status in linux-lts-backport-natty source package in Precise: New Status in linux-lts-quantal source package in Precise: Fix Committed Status in linux-lts-raring source package in Precise: Invalid Status in linux-lts-saucy source package in Precise: Fix Committed Status in linux-lts-trusty source package in Precise: Fix Released Status in linux-lts-utopic source package in Precise: Invalid Status in linux-mvl-dove source package in Precise: Invalid Status in linux-ti-omap4 source package in Precise: Fix Committed Status in linux source package in Trusty: Fix Released Status in linux-armadaxp source package in Trusty: Invalid Status in linux-ec2 source package in Trusty: Invalid Status in linux-fsl-imx51 source package in Trusty: Invalid Status in linux-lts-backport-maverick source package in Trusty: New Status in linux-lts-backport-natty source package in Trusty: New Status in linux-lts-quantal source package in Trusty: Invalid Status in linux-lts-raring source package in Trusty: Invalid Status in linux-lts-saucy source package in Trusty: Invalid Status in linux-lts-trusty source package in Trusty: Invalid Status in linux-lts-utopic source package in Trusty: Fix Released Status in linux-mvl-dove source package in Trusty: Invalid Status in linux-ti-omap4 source package in Trusty: Invalid Status in linux source package in Utopic: Fix Released Status in linux-armadaxp source package in Utopic: Invalid Status in linux-ec2 source package in Utopic: Invalid Status in linux-fsl-imx51 source package in Utopic: Invalid Status in linux-lts-backport-maverick source package in Utopic: New Status in linux-lts-backport-natty source package in Utopic: New Status in linux-lts-quantal source package in Utopic: Invalid Status in linux-lts-raring source package in Utopic: Invalid Status in linux-lts-saucy source package in Utopic: Invalid Status in linux-lts-trusty source package in Utopic: Inva
[Kernel-packages] [Bug 1409403] Re: kernel issue - trackpad not working at all
Would it be possible for you to test the latest upstream kernel? Refer to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest v3.19 kernel[0]. If this bug is fixed in the mainline kernel, please add the following tag 'kernel-fixed-upstream'. If the mainline kernel does not fix this bug, please add the tag: 'kernel-bug-exists-upstream'. If you are unable to test the mainline kernel, for example it will not boot, please add the tag: 'kernel-unable-to-test-upstream'. Once testing of the upstream kernel is complete, please mark this bug as "Confirmed". Thanks in advance. [0] http://kernel.ubuntu.com/~kernel-ppa/mainline/v3.19-rc4-vivid/ ** Changed in: linux (Ubuntu) Importance: Undecided => Medium -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1409403 Title: kernel issue - trackpad not working at all Status in linux package in Ubuntu: Incomplete Bug description: trackpad on Acer Chromebook C720, not working at all after doing both Chrubuntu install and complete install of Ubuntu 14.10. Tried running script to build prior kernels, didn't work. Tried updating packages, didn't work. Used 'xinput list' command in terminal and synaptic trackpad doesn't appear on list. Acer Chromebook C720 Running Ubuntu 14.10 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1409403/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1409625] Re: [HP EliteBook 725 G2 Notebook PC] brightness could not be controlled by the function key and the slider of "System settings -> Brightness and Lock" but sysfs works
Would it be possible for you to test the latest upstream kernel? Refer to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest v3.19 kernel[0]. If this bug is fixed in the mainline kernel, please add the following tag 'kernel-fixed-upstream'. If the mainline kernel does not fix this bug, please add the tag: 'kernel-bug-exists-upstream'. If you are unable to test the mainline kernel, for example it will not boot, please add the tag: 'kernel-unable-to-test-upstream'. Once testing of the upstream kernel is complete, please mark this bug as "Confirmed". Thanks in advance. [0] http://kernel.ubuntu.com/~kernel-ppa/mainline/v3.19-rc4-vivid/ ** Changed in: linux (Ubuntu) Status: Confirmed => Incomplete -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1409625 Title: [HP EliteBook 725 G2 Notebook PC] brightness could not be controlled by the function key and the slider of "System settings -> Brightness and Lock" but sysfs works Status in HWE Next Project: New Status in linux package in Ubuntu: Incomplete Bug description: HP EliteBook 725 G2 Notebook PC (CID 201405-15214) updated Ubuntu 14.04.1 3.13.0-43-generic #72 Steps to reproduce the bug: 1. install 12.04.3 on this machine 2. update the system via update manager to make the system up-to-date 3. click the upper-right indicator to launch the "System settings -> Brightness and Lock" applet 4. try to adjust the brightness slider to control the brightness 5. try to adjust the brightness by the function key fn+F8 or fn+F9 Expected result: The brightness could be adjusted Actual result: screen brightness has no response More information: brightness has no response by using this command: echo 4 | sudo tee -a /sys/class/backlight/acpi_video0/brightness brightness HAS response by using this command: echo 4 | sudo tee -a /sys/class/backlight/radeon_bl0/brightness ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-43-generic 3.13.0-43.72 ProcVersionSignature: Ubuntu 3.13.0-43.72-generic 3.13.11.11 Uname: Linux 3.13.0-43-generic x86_64 ApportVersion: 2.14.1-0ubuntu3.6 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC1: ubuntu 1417 F pulseaudio /dev/snd/controlC0: ubuntu 1417 F pulseaudio CurrentDesktop: Unity Date: Mon Jan 12 02:50:55 2015 HibernationDevice: RESUME=UUID=e24b803a-e217-4d6d-a35c-dbe0c033966a InstallationDate: Installed on 2015-01-08 (3 days ago) InstallationMedia: Ubuntu 14.04.1 LTS "Trusty Tahr" - Release amd64 (20140722.2) IwConfig: eth0 no wireless extensions. lono wireless extensions. MachineType: Hewlett-Packard HP Licrice ProcFB: 0 radeondrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-43-generic root=UUID=c1e0a265-8c75-4427-ad25-f0c76f003ce7 ro quiet splash vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-3.13.0-43-generic N/A linux-backports-modules-3.13.0-43-generic N/A linux-firmware 1.127.11 RfKill: 0: hci0: Bluetooth Soft blocked: no Hard blocked: no SourcePackage: linux UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 09/03/2014 dmi.bios.vendor: Hewlett-Packard dmi.bios.version: M84 Ver. 97.35 dmi.board.asset.tag: Base Board Asset Tag dmi.board.name: 221D dmi.board.vendor: Hewlett-Packard dmi.board.version: KBC Version 63.14 dmi.chassis.asset.tag: 73612P10CU dmi.chassis.type: 10 dmi.chassis.vendor: Hewlett-Packard dmi.modalias: dmi:bvnHewlett-Packard:bvrM84Ver.97.35:bd09/03/2014:svnHewlett-Packard:pnHPLicrice:pvrA3009CD10002:rvnHewlett-Packard:rn221D:rvrKBCVersion63.14:cvnHewlett-Packard:ct10:cvr: dmi.product.name: HP Licrice dmi.product.version: A3009CD10002 dmi.sys.vendor: Hewlett-Packard To manage notifications about this bug go to: https://bugs.launchpad.net/hwe-next/+bug/1409625/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1409531] Re: Wifi Drops
Did this issue start happening after an update/upgrade? Was there a prior kernel version where you were not having this particular problem? Would it be possible for you to test the latest upstream kernel? Refer to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest v3.19 kernel[0]. If this bug is fixed in the mainline kernel, please add the following tag 'kernel-fixed-upstream'. If the mainline kernel does not fix this bug, please add the tag: 'kernel-bug-exists-upstream'. If you are unable to test the mainline kernel, for example it will not boot, please add the tag: 'kernel-unable-to-test-upstream'. Once testing of the upstream kernel is complete, please mark this bug as "Confirmed". Thanks in advance. [0] http://kernel.ubuntu.com/~kernel-ppa/mainline/v3.19-rc4-vivid/ ** Changed in: linux (Ubuntu) Importance: Undecided => Medium ** Changed in: linux (Ubuntu) Status: Confirmed => Incomplete -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1409531 Title: Wifi Drops Status in linux package in Ubuntu: Incomplete Bug description: Wireless adapter randomly stops working and drops signal. Ubuntu still registers that it exists, but doesn't find any wireless signals. I have to disable and enable the adapter to reconnect it. ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-43-generic 3.13.0-43.72 ProcVersionSignature: Ubuntu 3.13.0-43.72-generic 3.13.11.11 Uname: Linux 3.13.0-43-generic x86_64 ApportVersion: 2.14.1-0ubuntu3.6 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC1: rusty 2003 F pulseaudio /dev/snd/controlC0: rusty 2003 F pulseaudio CurrentDesktop: Unity Date: Sun Jan 11 15:06:03 2015 EcryptfsInUse: Yes InstallationDate: Installed on 2014-09-11 (122 days ago) InstallationMedia: Ubuntu 14.04.1 LTS "Trusty Tahr" - Release amd64 (20140722.2) Lsusb: Bus 001 Device 003: ID 0bda:8187 Realtek Semiconductor Corp. RTL8187 Wireless Adapter Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub Bus 002 Device 002: ID 046d:c52b Logitech, Inc. Unifying Receiver Bus 002 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub MachineType: System manufacturer System Product Name ProcFB: 0 radeondrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-43-generic root=UUID=ec1cc0a1-628a-414a-95c2-1585ed7f7271 ro quiet splash vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-3.13.0-43-generic N/A linux-backports-modules-3.13.0-43-generic N/A linux-firmware 1.127.11 RfKill: 0: phy0: Wireless LAN Soft blocked: no Hard blocked: no SourcePackage: linux UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 06/20/2007 dmi.bios.vendor: Phoenix Technologies, LTD dmi.bios.version: ASUS M2N32-SLI DELUXE ACPI BIOS Revision 1201 dmi.board.name: M2N32-SLI DELUXE dmi.board.vendor: ASUSTeK Computer INC. dmi.board.version: 1.XX dmi.chassis.asset.tag: 123456789000 dmi.chassis.type: 3 dmi.chassis.vendor: Chassis Manufacture dmi.chassis.version: Chassis Version dmi.modalias: dmi:bvnPhoenixTechnologies,LTD:bvrASUSM2N32-SLIDELUXEACPIBIOSRevision1201:bd06/20/2007:svnSystemmanufacturer:pnSystemProductName:pvrSystemVersion:rvnASUSTeKComputerINC.:rnM2N32-SLIDELUXE:rvr1.XX:cvnChassisManufacture:ct3:cvrChassisVersion: dmi.product.name: System Product Name dmi.product.version: System Version dmi.sys.vendor: System manufacturer To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1409531/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1409721] Re: [HP EliteBook 725 G2 Notebook PC] mic mute key (Fn+F8), mic mute LED and mute LED do not work
Would it be possible for you to test the latest upstream kernel? Refer to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest v3.19 kernel[0]. If this bug is fixed in the mainline kernel, please add the following tag 'kernel-fixed-upstream'. If the mainline kernel does not fix this bug, please add the tag: 'kernel-bug-exists-upstream'. If you are unable to test the mainline kernel, for example it will not boot, please add the tag: 'kernel-unable-to-test-upstream'. Once testing of the upstream kernel is complete, please mark this bug as "Confirmed". Thanks in advance. [0] http://kernel.ubuntu.com/~kernel-ppa/mainline/v3.19-rc4-vivid/ ** Changed in: linux (Ubuntu) Importance: Undecided => Medium ** Changed in: linux (Ubuntu) Status: Confirmed => Incomplete -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1409721 Title: [HP EliteBook 725 G2 Notebook PC] mic mute key (Fn+F8), mic mute LED and mute LED do not work Status in HWE Next Project: New Status in linux package in Ubuntu: Incomplete Bug description: HP EliteBook 725 G2 Notebook PC (CID 201405-15214) updated ubuntu 14.04.1 3.13.0-43-generic #72 Steps to reproduce this bug: 1. install 14.04.1 and use the updater to update the system. Reboot. 2. Get into the desktop and ready to use the system. 3. sudo apt-get install sox 4. apply command 'sox -t alsa default tmp.wav' to record the sound. Press Fn F8 at the same time. 5. use 'ctrl+c' to stop recording. use 'play tmp.wav' to playback 6. during the playback, press the mute fhunction key. Expected result: of step 5. : The recorded sound was muted. The LED indicate the mic was muted. of step 6. : The speaker was muted and the mute LED indicate it was muted. Actual result: of step 5. : nothing happened. of step 6 : the sound was muted but the LED did not change color. More information: sudo hda-verb /dev/snd/hwC1D0 0x18 SET_PIN_WIDGET_CONTROL 0x20 could turn off the mic mute LED sudo hda-verb /dev/snd/hwC1D0 0x18 SET_PIN_WIDGET_CONTROL 0x24 could turn on the mic mute LED -- ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-43-generic 3.13.0-43.72 ProcVersionSignature: Ubuntu 3.13.0-43.72-generic 3.13.11.11 Uname: Linux 3.13.0-43-generic x86_64 NonfreeKernelModules: wl ApportVersion: 2.14.1-0ubuntu3.6 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC1: ubuntu 1404 F pulseaudio /dev/snd/controlC0: ubuntu 1404 F pulseaudio CurrentDesktop: Unity Date: Mon Jan 12 07:36:28 2015 HibernationDevice: RESUME=UUID=e24b803a-e217-4d6d-a35c-dbe0c033966a InstallationDate: Installed on 2015-01-08 (4 days ago) InstallationMedia: Ubuntu 14.04.1 LTS "Trusty Tahr" - Release amd64 (20140722.2) MachineType: Hewlett-Packard HP Licrice ProcFB: 0 radeondrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-43-generic root=UUID=c1e0a265-8c75-4427-ad25-f0c76f003ce7 ro quiet splash vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-3.13.0-43-generic N/A linux-backports-modules-3.13.0-43-generic N/A linux-firmware 1.127.11 SourcePackage: linux UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 09/03/2014 dmi.bios.vendor: Hewlett-Packard dmi.bios.version: M84 Ver. 97.35 dmi.board.asset.tag: Base Board Asset Tag dmi.board.name: 221D dmi.board.vendor: Hewlett-Packard dmi.board.version: KBC Version 63.14 dmi.chassis.asset.tag: 73612P10CU dmi.chassis.type: 10 dmi.chassis.vendor: Hewlett-Packard dmi.modalias: dmi:bvnHewlett-Packard:bvrM84Ver.97.35:bd09/03/2014:svnHewlett-Packard:pnHPLicrice:pvrA3009CD10002:rvnHewlett-Packard:rn221D:rvrKBCVersion63.14:cvnHewlett-Packard:ct10:cvr: dmi.product.name: HP Licrice dmi.product.version: A3009CD10002 dmi.sys.vendor: Hewlett-Packard To manage notifications about this bug go to: https://bugs.launchpad.net/hwe-next/+bug/1409721/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1409388] Re: iwlwifi 0000:01:00.0: Microcode SW error detected. Restarting 0x2000000.
** Changed in: linux (Ubuntu) Importance: Undecided => Medium -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1409388 Title: iwlwifi :01:00.0: Microcode SW error detected. Restarting 0x200. Status in linux package in Ubuntu: Incomplete Bug description: [ 80.615933] iwlwifi :01:00.0: Microcode SW error detected. Restarting 0x200. [ 80.615942] iwlwifi :01:00.0: CSR values: [ 80.615947] iwlwifi :01:00.0: (2nd byte of CSR_INT_COALESCING is CSR_INT_PERIODIC_REG) [ 80.615954] iwlwifi :01:00.0:CSR_HW_IF_CONFIG_REG: 0X00484b00 [ 80.615962] iwlwifi :01:00.0: CSR_INT_COALESCING: 0Xff40 [ 80.615970] iwlwifi :01:00.0: CSR_INT: 0X [ 80.615977] iwlwifi :01:00.0:CSR_INT_MASK: 0X [ 80.615984] iwlwifi :01:00.0: CSR_FH_INT_STATUS: 0X [ 80.615991] iwlwifi :01:00.0: CSR_GPIO_IN: 0X003c [ 80.615997] iwlwifi :01:00.0: CSR_RESET: 0X [ 80.616004] iwlwifi :01:00.0:CSR_GP_CNTRL: 0X080403c5 [ 80.616011] iwlwifi :01:00.0: CSR_HW_REV: 0X00b0 [ 80.616018] iwlwifi :01:00.0: CSR_EEPROM_REG: 0Xc6540ffd [ 80.616024] iwlwifi :01:00.0: CSR_EEPROM_GP: 0X9801 [ 80.616032] iwlwifi :01:00.0: CSR_OTP_GP_REG: 0X00030001 [ 80.616038] iwlwifi :01:00.0: CSR_GIO_REG: 0X00080044 [ 80.616045] iwlwifi :01:00.0:CSR_GP_UCODE_REG: 0X3a26 [ 80.616052] iwlwifi :01:00.0: CSR_GP_DRIVER_REG: 0X [ 80.616060] iwlwifi :01:00.0: CSR_UCODE_DRV_GP1: 0X [ 80.616068] iwlwifi :01:00.0: CSR_UCODE_DRV_GP2: 0X [ 80.616074] iwlwifi :01:00.0: CSR_LED_REG: 0X0040 [ 80.616081] iwlwifi :01:00.0:CSR_DRAM_INT_TBL_REG: 0X88118858 [ 80.616088] iwlwifi :01:00.0:CSR_GIO_CHICKEN_BITS: 0X27800200 [ 80.616095] iwlwifi :01:00.0: CSR_ANA_PLL_CFG: 0X [ 80.616102] iwlwifi :01:00.0: CSR_MONITOR_STATUS_REG: 0X43f7f757 [ 80.616108] iwlwifi :01:00.0: CSR_HW_REV_WA_REG: 0X0001001a [ 80.616115] iwlwifi :01:00.0:CSR_DBG_HPET_MEM_REG: 0X [ 80.616119] iwlwifi :01:00.0: FH register values: [ 80.616136] iwlwifi :01:00.0: FH_RSCSR_CHNL0_STTS_WPTR_REG: 0X11810500 [ 80.616153] iwlwifi :01:00.0:FH_RSCSR_CHNL0_RBDCB_BASE_REG: 0X01181040 [ 80.616169] iwlwifi :01:00.0: FH_RSCSR_CHNL0_WPTR: 0X0068 [ 80.616185] iwlwifi :01:00.0: FH_MEM_RCSR_CHNL0_CONFIG_REG: 0X80801114 [ 80.616202] iwlwifi :01:00.0: FH_MEM_RSSR_SHARED_CTRL_REG: 0X00fc [ 80.616220] iwlwifi :01:00.0:FH_MEM_RSSR_RX_STATUS_REG: 0X0703 [ 80.616237] iwlwifi :01:00.0:FH_MEM_RSSR_RX_ENABLE_ERR_IRQ2DRV: 0X [ 80.616253] iwlwifi :01:00.0:FH_TSSR_TX_STATUS_REG: 0X07ff0001 [ 80.616270] iwlwifi :01:00.0: FH_TSSR_TX_ERROR_REG: 0X [ 80.616274] iwlwifi :01:00.0: Loaded firmware version: 18.168.6.1 [ 80.616394] iwlwifi :01:00.0: Start IWL Error Log Dump: [ 80.616397] iwlwifi :01:00.0: Status: 0x02CC, count: 6 [ 80.616400] iwlwifi :01:00.0: 0x198A | ADVANCED_SYSASSERT [ 80.616403] iwlwifi :01:00.0: 0x00015920 | uPc [ 80.616405] iwlwifi :01:00.0: 0x00015910 | branchlink1 [ 80.616408] iwlwifi :01:00.0: 0x00015910 | branchlink2 [ 80.616410] iwlwifi :01:00.0: 0xDBEA | interruptlink1 [ 80.616412] iwlwifi :01:00.0: 0x | interruptlink2 [ 80.616415] iwlwifi :01:00.0: 0x007F | data1 [ 80.616417] iwlwifi :01:00.0: 0x0005 | data2 [ 80.616419] iwlwifi :01:00.0: 0x01DC | line [ 80.616422] iwlwifi :01:00.0: 0x9AC0F98D | beacon time [ 80.616424] iwlwifi :01:00.0: 0xC00C1673 | tsf low [ 80.616427] iwlwifi :01:00.0: 0x038D | tsf hi [ 80.616429] iwlwifi :01:00.0: 0x | time gp1 [ 80.616431] iwlwifi :01:00.0: 0x03FB8C36 | time gp2 [ 80.616434] iwlwifi :01:00.0: 0x | time gp3 [ 80.616436] iwlwifi :01:00.0: 0x754312A8 | uCode version [ 80.616438] iwlwifi :01:00.0: 0x00B0 | hw version [ 80.616441] iwlwifi :01:00.0: 0x00484B00 | board version [ 80.616443] iwlwifi :01:00.0: 0x001C | hcmd [ 80.616445] iwlwifi :01:00.0: 0x27863840 | isr0 [ 80.616448] iwlwifi :01:00.0: 0x1189F800 | isr1 [ 80.616450] iwlwifi :01:00.0: 0x0E07 | isr2 [ 80.616453] iwlwifi :01:00.0: 0x0143FCC3 |