fwts (14.02.00-0ubuntu0) trusty; urgency=low

  * acpi: method: fix ppc64el build failure (LP: #1272265)
  * acpi: acpidump: handle invalid MADT table data (LP: #1278422)
  * cpu: cpufreq: tidy code, show advice when cpu scaling unavailable
    (LP: #1267959)
  * lib: fwts_release: call lsb_release rather than parsing raw data
    (LP: #1266823)
  * ACPICA: update to version 20140214. (LP: #1281096)
  * lib: fwts_acpi_tables: fix parsing of empty data (LP: #1281197)

  * data: klog.json: lower the level of the failure when the _S1 and _S2 not
    implemented (LP: #1279714)

Date: Wed, 19 Feb 2014 11:48:01 +0800
Changed-By: Alex Hung <alex.h...@ubuntu.com>
Maintainer: Firmware Testing Team <fwts-de...@lists.ubuntu.com>
Signed-By: Keng-Yu Lin <keng-yu....@canonical.com>
https://launchpad.net/ubuntu/trusty/+source/fwts/14.02.00-0ubuntu0
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Wed, 19 Feb 2014 11:48:01 +0800
Source: fwts
Binary: fwts libfwtsiasl1 libfwtsacpica1 libfwts1 fwts-frontend 
fwts-efi-runtime-dkms
Architecture: source
Version: 14.02.00-0ubuntu0
Distribution: trusty
Urgency: low
Maintainer: Firmware Testing Team <fwts-de...@lists.ubuntu.com>
Changed-By: Alex Hung <alex.h...@ubuntu.com>
Description: 
 fwts       - FirmWare Test Suite
 fwts-efi-runtime-dkms - Firmware Test Suite UEFI Runtime Service kernel driver
 fwts-frontend - Firmware Test Suite frontend interface
 libfwts1   - FirmWare Test Suite core support library
 libfwtsacpica1 - FirmWare Test Suite ACPICA core built for acpiexec 
functionality
 libfwtsiasl1 - FirmWare Test Suite ACPICA core built for iasl functionality
Launchpad-Bugs-Fixed: 1266823 1267959 1272265 1278422 1279714 1281096 1281197
Changes: 
 fwts (14.02.00-0ubuntu0) trusty; urgency=low
 .
   * acpi: method: fix ppc64el build failure (LP: #1272265)
   * acpi: acpidump: handle invalid MADT table data (LP: #1278422)
   * cpu: cpufreq: tidy code, show advice when cpu scaling unavailable
     (LP: #1267959)
   * lib: fwts_release: call lsb_release rather than parsing raw data
     (LP: #1266823)
   * ACPICA: update to version 20140214. (LP: #1281096)
   * lib: fwts_acpi_tables: fix parsing of empty data (LP: #1281197)
 .
   * data: klog.json: lower the level of the failure when the _S1 and _S2 not
     implemented (LP: #1279714)
Checksums-Sha1: 
 ad6c49fe23d4e0d095d8f241d6c4b86745aacb5f 2277 fwts_14.02.00-0ubuntu0.dsc
 eaa179cfeb4079802de3c1f556c24b4ab7750434 1411357 fwts_14.02.00.orig.tar.gz
 999a55b10e54e3c0d361540ecef3a72782f7faf7 32676 
fwts_14.02.00-0ubuntu0.debian.tar.gz
Checksums-Sha256: 
 f8efd5b4b8dcd40534b4f6f63548cc7d8887cda8706b96cd25d4e0340cca6f9a 2277 
fwts_14.02.00-0ubuntu0.dsc
 0db73f2c118a76cc951777964eec9ef32bece053154505d4fdc644b5a0b51809 1411357 
fwts_14.02.00.orig.tar.gz
 05700ca6b8d1fe1a63c37dcd39a1ba5e011d0abf701876ea9e158ed8d5f1110f 32676 
fwts_14.02.00-0ubuntu0.debian.tar.gz
Files: 
 5cadc0bc0ad8849b6f7722132940ffda 2277 devel optional fwts_14.02.00-0ubuntu0.dsc
 c2acbd921733480e6d9b324383ab0554 1411357 devel optional 
fwts_14.02.00.orig.tar.gz
 e6b13593ecefae26cf81c6bef19cbee2 32676 devel optional 
fwts_14.02.00-0ubuntu0.debian.tar.gz

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iQIcBAEBAgAGBQJTBGvPAAoJEMYXhp8UeFBOE2QQAKSaZRvNhS/BzKhajMUqYuFI
ugZeiPj/g10fK9J5L8+SJ8rgpG12S5gz7Ni+9fxdNzvKj2Mq7bsPr1I62rd9aJzb
fkxtgx0df0vL9fNnd1VhLmiY/2CSkyur94mQ14im/oTQmeQVuMLp/mY5hwNBSBTd
Bug6WwVuluh9OmzLQeeC30Oy2Ke6rT3HdJDJ1ZqXCsdGP8+nDJ2Y+ZrPSHzbfXr0
ga8qe8729Rp+hC1BfIcEHWEgzTUd/FicmrsVQXJELTwEONLFSUigqOtQtLyE9wVE
ZbUGmcXSJHQHlOc9ker8PSYgMEhraEm3IrYaYu7cwnCstz+KYiDs4IzmSYmMN/RZ
tRxXG6hjKHOl95EvD/a/Tx2TbSMciKSwNIidcwvMPaMxD1Il8xYKLqZn+6cTMJOc
KTiERPhJoq43/oenrjns9n/ZX1rV2qj4iYARVbut8GtXLajqBhZiC+bonJju8neC
WZxFpSp+YgR6VNNz/g7SSZYBx6UH1FChjlAl1USE6PUwCN3L773yectzLF7eJum2
bkoozlttQQgfxc/zyPZ6OS+0ewdtd9+lDQpVKdUuraXvIUb30NSbLNCRGnjxBYkN
yOm/GTKcQuYk76ul5lffIEhbbivH7B5jHDqYrb8Pb5rTW+SslXpMfdteo2cMoyho
kNHLt1tPoSvEKkV1yKSy
=PHkM
-----END PGP SIGNATURE-----
-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes

Reply via email to