[Kernel-packages] [Bug 1334968] Re: [HP ProBook 445 G1] Microphone mute key does not work
Oh, for -s, sorry I didn't catch that Will do this after it get back to us. ** Changed in: linux (Ubuntu) Status: Confirmed = Incomplete -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1334968 Title: [HP ProBook 445 G1] Microphone mute key does not work Status in HWE Next Project: New Status in “linux” package in Ubuntu: Incomplete Bug description: CID: 201307-13919 HP ProBook 445 G1 The microphone mute key does not work on this system Keystroke cannot be detected by xev, but it shows: keycode 465 press keycode 465 release from sudo showkey -k ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-30-generic 3.13.0-30.54 ProcVersionSignature: Ubuntu 3.13.0-30.54-generic 3.13.11.2 Uname: Linux 3.13.0-30-generic x86_64 ApportVersion: 2.14.1-0ubuntu3.2 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC1: ubuntu 1508 F pulseaudio /dev/snd/pcmC1D0c: ubuntu 1508 F...m pulseaudio /dev/snd/controlC0: ubuntu 1508 F pulseaudio CRDA: country TW: (2402 - 2472 @ 40), (3, 27) (5270 - 5330 @ 40), (3, 17), DFS (5735 - 5815 @ 40), (3, 30) CurrentDesktop: Unity Date: Fri Jun 27 01:10:10 2014 HibernationDevice: RESUME=UUID=be96939f-ffde-4407-a99e-17beebf60ad5 InstallationDate: Installed on 2014-06-27 (0 days ago) InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Release amd64 (20140417) MachineType: Hewlett-Packard HP ProBook 445 G1 Notebook PC ProcFB: 0 radeondrmfb 1 radeondrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-30-generic root=UUID=fd8269ec-b9ab-4f08-8eaf-6c3bfa26a4e1 ro quiet splash vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-3.13.0-30-generic N/A linux-backports-modules-3.13.0-30-generic N/A linux-firmware 1.127.4 RfKill: 0: phy0: Wireless LAN Soft blocked: no Hard blocked: no SourcePackage: linux UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 09/05/2013 dmi.bios.vendor: Hewlett-Packard dmi.bios.version: 68CPE Ver. F.21 dmi.board.asset.tag: Base Board Asset Tag dmi.board.name: 1950 dmi.board.vendor: Hewlett-Packard dmi.board.version: KBC Version 91.0B dmi.chassis.type: 10 dmi.chassis.vendor: Hewlett-Packard dmi.modalias: dmi:bvnHewlett-Packard:bvr68CPEVer.F.21:bd09/05/2013:svnHewlett-Packard:pnHPProBook445G1NotebookPC:pvrA201BC1203:rvnHewlett-Packard:rn1950:rvrKBCVersion91.0B:cvnHewlett-Packard:ct10:cvr: dmi.product.name: HP ProBook 445 G1 Notebook PC dmi.product.version: A201BC1203 dmi.sys.vendor: Hewlett-Packard To manage notifications about this bug go to: https://bugs.launchpad.net/hwe-next/+bug/1334968/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1179010] Re: No battery present
Have same trouble in Ubuntu 13.10 , 14.04 and later alpha 14.10 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1179010 Title: No battery present Status in “linux” package in Ubuntu: Expired Bug description: There is absolutly no battery present on my system. Its started when i noticed there was no battery indicator. Then i tried running some system commands and they couldnt find any battery either. $ upower -i /org/freedesktop/UPower/battery_BAT0 nothing $ acpi -b nothing trying cat in /proc/acpi/battery nothing ProblemType: Bug DistroRelease: Ubuntu 13.04 Package: linux-image-3.8.0-19-generic 3.8.0-19.30 ProcVersionSignature: Ubuntu 3.8.0-19.30-generic 3.8.8 Uname: Linux 3.8.0-19-generic x86_64 ApportVersion: 2.9.2-0ubuntu8 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: charles2048 F pulseaudio Date: Sat May 11 18:11:12 2013 HibernationDevice: RESUME=UUID=e6e53928-9f5d-41c1-97ec-abf5b11a8b16 InstallationDate: Installed on 2013-04-28 (12 days ago) InstallationMedia: Ubuntu 13.04 Raring Ringtail - Release amd64 (20130424) MachineType: Acer Aspire 5553G MarkForUpload: True ProcEnviron: PATH=(custom, no user) XDG_RUNTIME_DIR=set LANG=sv_SE.UTF-8 SHELL=/bin/bash ProcFB: 0 radeondrmfb 1 radeondrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.8.0-19-generic root=UUID=ea88e58a-6514-44a0-a7c0-9ff5b627d848 ro quiet splash vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-3.8.0-19-generic N/A linux-backports-modules-3.8.0-19-generic N/A linux-firmware1.106 SourcePackage: linux UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 04/27/2010 dmi.bios.vendor: Phoenix Technologies LTD dmi.bios.version: V1.08 dmi.board.name: JV51_DN dmi.board.vendor: Acer dmi.board.version: Not Applicable dmi.chassis.type: 10 dmi.chassis.vendor: Acer dmi.chassis.version: N/A dmi.modalias: dmi:bvnPhoenixTechnologiesLTD:bvrV1.08:bd04/27/2010:svnAcer:pnAspire5553G:pvrNotApplicable:rvnAcer:rnJV51_DN:rvrNotApplicable:cvnAcer:ct10:cvrN/A: dmi.product.name: Aspire 5553G dmi.product.version: Not Applicable dmi.sys.vendor: Acer To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1179010/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1041790]
*** Bug 81402 has been marked as a duplicate of this bug. *** -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1041790 Title: [snb] GPU lockup IPEHR: 0x0b160001 IPEHR: 0x0b140001, workaround i915.semaphores=0 Status in X.org xf86-video-intel: In Progress Status in “linux” package in Ubuntu: Incomplete Status in “sandybridge-meta” package in Ubuntu: Confirmed Status in “xserver-xorg-video-intel” package in Ubuntu: Triaged Bug description: X locks up periodically for a 2 to ten seconds at a time and this crash log gets generated. It's significantly more than several times a day but not quite continuous. If you indeed have this bug, that should stop the lockups from happening. Irrespective, please file a new bug report so your hardware may be tracked. WORKAROUND: Edit your /etc/default/grub from: GRUB_CMDLINE_LINUX_DEFAULT=quiet splash to: GRUB_CMDLINE_LINUX_DEFAULT=quiet splash i915.semaphores=0 run the following and reboot: sudo update-grub The side effects of this is rendering throughput is dropped by 10% with SNA, or as much as 3x with UXA. OpenGL performance is likely to be reduced by about 30%. More CPU time is spent waiting for the GPU with rc6 disabled, so increased power consumption. ProblemType: Crash DistroRelease: Ubuntu 12.10 Package: xserver-xorg-video-intel 2:2.20.3-0ubuntu1 Uname: Linux 3.6.0-rc3-git-20120826.1015 x86_64 ApportVersion: 2.5.1-0ubuntu2 Architecture: amd64 Chipset: sandybridge-m-gt2 Date: Sun Aug 26 16:06:32 2012 DistroCodename: quantal DistroVariant: ubuntu DuplicateSignature: [sandybridge-m-gt2] GPU lockup IPEHR: 0x0b160001 IPEHR: 0x0b140001 Ubuntu 12.10 EcryptfsInUse: Yes ExecutablePath: /usr/share/apport/apport-gpu-error-intel.py GpuHangFrequency: Continuously InstallationMedia: Ubuntu 12.10 Quantal Quetzal - Alpha amd64 (20120724.2) InterpreterPath: /usr/bin/python3.2mu MachineType: Dell Inc. Dell System XPS L502X ProcCmdline: /usr/bin/python3 /usr/share/apport/apport-gpu-error-intel.py ProcEnviron: ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.6.0-rc3-git-20120826.1015 root=UUID=135c8090-427c-460a-909d-eff262cd44b6 ro quiet splash vt.handoff=7 RelatedPackageVersions: xserver-xorg 1:7.7+1ubuntu3 libdrm2 2.4.38-0ubuntu2 xserver-xorg-video-intel 2:2.20.3-0ubuntu1 SourcePackage: xserver-xorg-video-intel Title: [sandybridge-m-gt2] GPU lockup IPEHR: 0x0b160001 IPEHR: 0x0b140001 UdevDb: Error: [Errno 2] No such file or directory: 'udevadm' UpgradeStatus: No upgrade log present (probably fresh install) UserGroups: dmi.bios.date: 05/29/2012 dmi.bios.vendor: Dell Inc. dmi.bios.version: A11 dmi.board.name: 0NJT03 dmi.board.vendor: Dell Inc. dmi.board.version: A00 dmi.chassis.type: 8 dmi.chassis.vendor: Dell Inc. dmi.chassis.version: 0.1 dmi.modalias: dmi:bvnDellInc.:bvrA11:bd05/29/2012:svnDellInc.:pnDellSystemXPSL502X:pvr:rvnDellInc.:rn0NJT03:rvrA00:cvnDellInc.:ct8:cvr0.1: dmi.product.name: Dell System XPS L502X dmi.sys.vendor: Dell Inc. To manage notifications about this bug go to: https://bugs.launchpad.net/xserver-xorg-video-intel/+bug/1041790/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1234541] Re: 1814:3290 Ralink corp. RT3290 Bluetooth not toggling on
I do not understand why this bug is not a duplicate of bug 1189721. Surely the cause of it not toggling on is that there is no driver? Please could you explain. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1234541 Title: 1814:3290 Ralink corp. RT3290 Bluetooth not toggling on Status in “linux” package in Ubuntu: Triaged Bug description: When I try to toggle my Novatech nfinity laptop bluetooth via Fn+F11 nothing happens. geoff@geoff-laptop:~$ lspci|grep Bluetooth 01:00.1 Bluetooth: Ralink corp. RT3290 Bluetooth geoff@geoff-laptop:~$ ps aux| grep bluetooth geoff 2090 0.0 0.1 490248 6648 ?Sl 09:02 0:00 /usr/lib/x86_64-linux-gnu/indicator-bluetooth/indicator-bluetooth-service root 3328 0.0 0.0 19240 1752 ?Ss 09:41 0:00 /usr/sbin/bluetoothd geoff 3371 0.0 0.0 14984 1004 pts/3R+ 09:52 0:00 grep --color=auto bluetooth ProblemType: Bug DistroRelease: Ubuntu 13.04 Package: linux-image-3.8.0-19-generic 3.8.0-19.29 [modified: boot/vmlinuz-3.8.0-19-generic] ProcVersionSignature: Ubuntu 3.8.0-19.29-generic 3.8.8 Uname: Linux 3.8.0-19-generic x86_64 ApportVersion: 2.9.2-0ubuntu8 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: geoff 1957 F pulseaudio Date: Thu Oct 3 09:58:04 2013 HibernationDevice: RESUME=UUID=75bcd0bb-68ec-4ee2-a80d-e6cd4aa1d39d InstallationDate: Installed on 2013-10-03 (0 days ago) InstallationMedia: Ubuntu 13.04 Raring Ringtail - Release amd64 (20130424) MachineType: To be filled by O.E.M. To be filled by O.E.M. MarkForUpload: True ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.8.0-19-generic root=UUID=286ca2cc-f79e-446b-9746-3865b1bfc022 ro quiet splash vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-3.8.0-19-generic N/A linux-backports-modules-3.8.0-19-generic N/A linux-firmware1.106 RfKill: 0: phy0: Wireless LAN Soft blocked: no Hard blocked: no SourcePackage: linux UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 06/11/2012 dmi.bios.vendor: American Megatrends Inc. dmi.bios.version: 4.6.5 dmi.board.asset.tag: To be filled by O.E.M. dmi.board.name: ChiefRiver dmi.board.vendor: INTEL Corporation dmi.board.version: To be filled by O.E.M. dmi.chassis.asset.tag: To Be Filled By O.E.M. dmi.chassis.type: 3 dmi.chassis.vendor: To Be Filled By O.E.M. dmi.chassis.version: To Be Filled By O.E.M. dmi.modalias: dmi:bvnAmericanMegatrendsInc.:bvr4.6.5:bd06/11/2012:svnTobefilledbyO.E.M.:pnTobefilledbyO.E.M.:pvrTobefilledbyO.E.M.:rvnINTELCorporation:rnChiefRiver:rvrTobefilledbyO.E.M.:cvnToBeFilledByO.E.M.:ct3:cvrToBeFilledByO.E.M.: dmi.product.name: To be filled by O.E.M. dmi.product.version: To be filled by O.E.M. dmi.sys.vendor: To be filled by O.E.M. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1234541/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1189721] Re: Ralink RT3290 needs bluetooth driver
I do not understand why Bug #1234541 is not a duplicate of this bug. Surely the cause of bluetooth not toggling on is that there is no driver? Please could you explain. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1189721 Title: Ralink RT3290 needs bluetooth driver Status in “linux” package in Ubuntu: Confirmed Bug description: As of Raring Ubuntu has a wifi driver for the RT3290 that works out of the box. It still does not have bluetooth support. This thread in the Ubuntu forums links to a driver that is claimed to work: http://ubuntuforums.org/showthread.php?t=2115570 --- ApportVersion: 2.9.2-0ubuntu8.3 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: graeme 2412 F pulseaudio CRDA: country GB: (2402 - 2482 @ 40), (N/A, 20) (5170 - 5250 @ 40), (N/A, 20) (5250 - 5330 @ 40), (N/A, 20), DFS (5490 - 5710 @ 40), (N/A, 27), DFS DistroRelease: Ubuntu 13.04 EcryptfsInUse: Yes HibernationDevice: RESUME=UUID=2d107179-35e2-4b1f-8bdd-90a01132ec70 InstallationDate: Installed on 2013-05-17 (144 days ago) InstallationMedia: Ubuntu 13.04 Raring Ringtail - Release amd64 (20130424) MachineType: Hewlett-Packard HP ProBook 4540s MarkForUpload: True Package: linux (not installed) ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.8.0-31-generic root=UUID=ac74fd89-3445-4a6d-b91b-ae4987867afe ro quiet splash acpi_backlight=vendor vt.handoff=7 ProcVersionSignature: Ubuntu 3.8.0-31.46-generic 3.8.13.8 RelatedPackageVersions: linux-restricted-modules-3.8.0-31-generic N/A linux-backports-modules-3.8.0-31-generic N/A linux-firmware1.106 RfKill: 0: phy0: Wireless LAN Soft blocked: no Hard blocked: no Tags: raring Uname: Linux 3.8.0-31-generic x86_64 UpgradeStatus: No upgrade log present (probably fresh install) UserGroups: adm cdrom dialout dip lpadmin plugdev sambashare sudo dmi.bios.date: 11/06/2012 dmi.bios.vendor: Hewlett-Packard dmi.bios.version: 68IRR Ver. F.32 dmi.board.name: 17F6 dmi.board.vendor: Hewlett-Packard dmi.board.version: KBC Version 58.1D dmi.chassis.type: 10 dmi.chassis.vendor: Hewlett-Packard dmi.modalias: dmi:bvnHewlett-Packard:bvr68IRRVer.F.32:bd11/06/2012:svnHewlett-Packard:pnHPProBook4540s:pvrA1018C1100:rvnHewlett-Packard:rn17F6:rvrKBCVersion58.1D:cvnHewlett-Packard:ct10:cvr: dmi.product.name: HP ProBook 4540s dmi.product.version: A1018C1100 dmi.sys.vendor: Hewlett-Packard To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1189721/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1342548] [NEW] [Dell Inspiron 5437] Wireless key does not work on this system
Public bug reported: CID: 201305-13673 Dell Inspiron 5437 The wireless hotkey does not work on this system Steps: 1. Install 14.04 + update (3.13.0-30), boot to desktop 2. Try to control wireless / BT with the hotkey Expected result: * Wireless / BT could be controlled by the hotkey Actual result: * Hotkey is not working Debugging information: ubuntu@201305-13673:~$ sudo showkey -k kb mode was ?UNKNOWN? [ if you are trying this under X, it might not work since the X server is also reading /dev/console ] press any key (program terminates 10s after last keypress)... keycode 28 release keycode 240 press keycode 240 release keycode 240 press keycode 240 release ^Ccaught signal 2, cleaning up... KeyPress event, serial 37, synthetic NO, window 0x3a1, root 0x2c0, subw 0x0, time 199006, (-357,353), root:(430,405), state 0x0, keycode 248 (keysym 0x0, NoSymbol), same_screen YES, XLookupString gives 0 bytes: XmbLookupString gives 0 bytes: XFilterEvent returns: False KeyRelease event, serial 37, synthetic NO, window 0x3a1, root 0x2c0, subw 0x0, time 199006, (-357,353), root:(430,405), state 0x0, keycode 248 (keysym 0x0, NoSymbol), same_screen YES, XLookupString gives 0 bytes: XFilterEvent returns: False nothing from sudo showkey -s ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-30-generic 3.13.0-30.55 ProcVersionSignature: Ubuntu 3.13.0-30.55-generic 3.13.11.2 Uname: Linux 3.13.0-30-generic x86_64 NonfreeKernelModules: nvidia ApportVersion: 2.14.1-0ubuntu3.2 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: ubuntu 1638 F pulseaudio /dev/snd/controlC1: ubuntu 1638 F pulseaudio CRDA: country TW: (2402 - 2472 @ 40), (3, 27) (5270 - 5330 @ 40), (3, 17), DFS (5735 - 5815 @ 40), (3, 30) CurrentDesktop: Unity Date: Wed Jul 16 01:56:06 2014 HibernationDevice: RESUME=UUID=67674077-ce03-4513-b8be-b3e9bdd8840d InstallationDate: Installed on 2014-07-16 (0 days ago) InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Release amd64 (20140417) MachineType: Dell Inc. Inspiron 5437 ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-30-generic.efi.signed root=UUID=e56f47e4-b04b-4702-b89f-59e1c08572c4 ro quiet splash vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-3.13.0-30-generic N/A linux-backports-modules-3.13.0-30-generic N/A linux-firmware 1.127.4 SourcePackage: linux UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 11/14/2013 dmi.bios.vendor: Dell Inc. dmi.bios.version: A07 dmi.board.vendor: Dell Inc. dmi.board.version: A07 dmi.chassis.type: 8 dmi.chassis.vendor: Dell Inc. dmi.chassis.version: Not Specified dmi.modalias: dmi:bvnDellInc.:bvrA07:bd11/14/2013:svnDellInc.:pnInspiron5437:pvrNotSpecified:rvnDellInc.:rn:rvrA07:cvnDellInc.:ct8:cvrNotSpecified: dmi.product.name: Inspiron 5437 dmi.product.version: Not Specified dmi.sys.vendor: Dell Inc. ** Affects: linux (Ubuntu) Importance: Medium Assignee: Anthony Wong (anthonywong) Status: New ** Tags: 201305-13673 amd64 apport-bug taipei-lab trusty -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1342548 Title: [Dell Inspiron 5437] Wireless key does not work on this system Status in “linux” package in Ubuntu: New Bug description: CID: 201305-13673 Dell Inspiron 5437 The wireless hotkey does not work on this system Steps: 1. Install 14.04 + update (3.13.0-30), boot to desktop 2. Try to control wireless / BT with the hotkey Expected result: * Wireless / BT could be controlled by the hotkey Actual result: * Hotkey is not working Debugging information: ubuntu@201305-13673:~$ sudo showkey -k kb mode was ?UNKNOWN? [ if you are trying this under X, it might not work since the X server is also reading /dev/console ] press any key (program terminates 10s after last keypress)... keycode 28 release keycode 240 press keycode 240 release keycode 240 press keycode 240 release ^Ccaught signal 2, cleaning up... KeyPress event, serial 37, synthetic NO, window 0x3a1, root 0x2c0, subw 0x0, time 199006, (-357,353), root:(430,405), state 0x0, keycode 248 (keysym 0x0, NoSymbol), same_screen YES, XLookupString gives 0 bytes: XmbLookupString gives 0 bytes: XFilterEvent returns: False KeyRelease event, serial 37, synthetic NO, window 0x3a1, root 0x2c0, subw 0x0, time 199006, (-357,353), root:(430,405), state 0x0, keycode 248 (keysym 0x0, NoSymbol), same_screen YES, XLookupString gives 0 bytes: XFilterEvent returns: False nothing from sudo showkey -s ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-30-generic 3.13.0-30.55 ProcVersionSignature: Ubuntu
[Kernel-packages] [Bug 1313830] Re: [Lenovo ThinkPad X230] LCD Backlight dims completely when disconnecting external monitor
** Changed in: linux (Ubuntu Trusty) Assignee: (unassigned) = Liming Wang (wangliming) ** Changed in: linux (Ubuntu Trusty) Importance: Medium = High -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1313830 Title: [Lenovo ThinkPad X230] LCD Backlight dims completely when disconnecting external monitor Status in “linux” package in Ubuntu: Fix Released Status in “linux” source package in Trusty: Confirmed Bug description: After undocking with external DVI monitor connected to dock the laptop's internal LCD dims all the way (backlight still on, but as dim as it goes). Keyboard backlight controls cause OSD indicator to show backlight changing but no affect on LCD brightness. Issue also reported for RedHat here: https://bugzilla.redhat.com/show_bug.cgi?id=1067071 ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-24-generic 3.13.0-24.46 ProcVersionSignature: Ubuntu 3.13.0-24.46-generic 3.13.9 Uname: Linux 3.13.0-24-generic x86_64 ApportVersion: 2.14.1-0ubuntu3 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: dustin 2683 F pulseaudio CurrentDesktop: Unity Date: Mon Apr 28 10:13:42 2014 EcryptfsInUse: Yes HibernationDevice: RESUME=UUID=79c0f3ac-bda7-4a28-9ae1-6bb19ab0fd0d InstallationDate: Installed on 2013-10-08 (201 days ago) InstallationMedia: Ubuntu 13.10 Saucy Salamander - Beta amd64 (20130925.1) MachineType: LENOVO 2306CTO ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-24-generic.efi.signed root=UUID=2f1bbe89-ca2f-4884-8fc6-8a476dd1a475 ro RelatedPackageVersions: linux-restricted-modules-3.13.0-24-generic N/A linux-backports-modules-3.13.0-24-generic N/A linux-firmware 1.127 SourcePackage: linux UpgradeStatus: Upgraded to trusty on 2014-01-08 (109 days ago) dmi.bios.date: 03/05/2013 dmi.bios.vendor: LENOVO dmi.bios.version: G2ETA0WW (2.60 ) dmi.board.asset.tag: Not Available dmi.board.name: 2306CTO dmi.board.vendor: LENOVO dmi.board.version: Not Defined dmi.chassis.asset.tag: No Asset Information dmi.chassis.type: 10 dmi.chassis.vendor: LENOVO dmi.chassis.version: Not Available dmi.modalias: dmi:bvnLENOVO:bvrG2ETA0WW(2.60):bd03/05/2013:svnLENOVO:pn2306CTO:pvrThinkPadX230:rvnLENOVO:rn2306CTO:rvrNotDefined:cvnLENOVO:ct10:cvrNotAvailable: dmi.product.name: 2306CTO dmi.product.version: ThinkPad X230 dmi.sys.vendor: LENOVO To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1313830/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1342548] Status changed to Confirmed
This change was made by a bot. ** Changed in: linux (Ubuntu) Status: New = Confirmed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1342548 Title: [Dell Inspiron 5437] Wireless key does not work on this system Status in “linux” package in Ubuntu: Confirmed Bug description: CID: 201305-13673 Dell Inspiron 5437 The wireless hotkey does not work on this system Steps: 1. Install 14.04 + update (3.13.0-30), boot to desktop 2. Try to control wireless / BT with the hotkey Expected result: * Wireless / BT could be controlled by the hotkey Actual result: * Hotkey is not working Debugging information: ubuntu@201305-13673:~$ sudo showkey -k kb mode was ?UNKNOWN? [ if you are trying this under X, it might not work since the X server is also reading /dev/console ] press any key (program terminates 10s after last keypress)... keycode 28 release keycode 240 press keycode 240 release keycode 240 press keycode 240 release ^Ccaught signal 2, cleaning up... KeyPress event, serial 37, synthetic NO, window 0x3a1, root 0x2c0, subw 0x0, time 199006, (-357,353), root:(430,405), state 0x0, keycode 248 (keysym 0x0, NoSymbol), same_screen YES, XLookupString gives 0 bytes: XmbLookupString gives 0 bytes: XFilterEvent returns: False KeyRelease event, serial 37, synthetic NO, window 0x3a1, root 0x2c0, subw 0x0, time 199006, (-357,353), root:(430,405), state 0x0, keycode 248 (keysym 0x0, NoSymbol), same_screen YES, XLookupString gives 0 bytes: XFilterEvent returns: False nothing from sudo showkey -s ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-30-generic 3.13.0-30.55 ProcVersionSignature: Ubuntu 3.13.0-30.55-generic 3.13.11.2 Uname: Linux 3.13.0-30-generic x86_64 NonfreeKernelModules: nvidia ApportVersion: 2.14.1-0ubuntu3.2 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: ubuntu 1638 F pulseaudio /dev/snd/controlC1: ubuntu 1638 F pulseaudio CRDA: country TW: (2402 - 2472 @ 40), (3, 27) (5270 - 5330 @ 40), (3, 17), DFS (5735 - 5815 @ 40), (3, 30) CurrentDesktop: Unity Date: Wed Jul 16 01:56:06 2014 HibernationDevice: RESUME=UUID=67674077-ce03-4513-b8be-b3e9bdd8840d InstallationDate: Installed on 2014-07-16 (0 days ago) InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Release amd64 (20140417) MachineType: Dell Inc. Inspiron 5437 ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-30-generic.efi.signed root=UUID=e56f47e4-b04b-4702-b89f-59e1c08572c4 ro quiet splash vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-3.13.0-30-generic N/A linux-backports-modules-3.13.0-30-generic N/A linux-firmware 1.127.4 SourcePackage: linux UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 11/14/2013 dmi.bios.vendor: Dell Inc. dmi.bios.version: A07 dmi.board.vendor: Dell Inc. dmi.board.version: A07 dmi.chassis.type: 8 dmi.chassis.vendor: Dell Inc. dmi.chassis.version: Not Specified dmi.modalias: dmi:bvnDellInc.:bvrA07:bd11/14/2013:svnDellInc.:pnInspiron5437:pvrNotSpecified:rvnDellInc.:rn:rvrA07:cvnDellInc.:ct8:cvrNotSpecified: dmi.product.name: Inspiron 5437 dmi.product.version: Not Specified dmi.sys.vendor: Dell Inc. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1342548/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1342561] [NEW] Touchpad not recognized + Fn Keys not working (ACPI errors)
Public bug reported: The touchpad is not recognized. The psmouse.proto=bare hotfix does not work. The i8042.noaux i8042.reset does not work, even though the touchpad would work in PS2 compat mode (under Win7). The FN keys are not working at all, probably due to some strange ACPI decode errors in the syslog. Affected models: ASUS X750LN, ASUS X750LB, ASUS P750L (all models) Ubuntu Version: Ubuntu 3.13.0-24.46-generic 3.13.9 ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-24-generic 3.13.0-24.46 ProcVersionSignature: Ubuntu 3.13.0-24.46-generic 3.13.9 Uname: Linux 3.13.0-24-generic x86_64 ApportVersion: 2.14.1-0ubuntu3 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC1: ubuntu 3866 F pulseaudio /dev/snd/controlC0: ubuntu 3866 F pulseaudio CasperVersion: 1.340 CurrentDesktop: Unity Date: Wed Jul 16 06:59:29 2014 LiveMediaBuild: Ubuntu 14.04 LTS Trusty Tahr - Release amd64 (20140417) MachineType: ASUSTeK COMPUTER INC. X750LN ProcEnviron: TERM=xterm PATH=(custom, no user) XDG_RUNTIME_DIR=set LANG=de_DE.UTF-8 SHELL=/bin/bash ProcFB: 0 inteldrmfb ProcKernelCmdLine: file=/preseed/username.seed boot=casper persistent initrd=/casper/initrd.lz quiet splash -- debian-installer/language=de keyboard-configuration/layoutcode?=de RelatedPackageVersions: linux-restricted-modules-3.13.0-24-generic N/A linux-backports-modules-3.13.0-24-generic N/A linux-firmware 1.127 RfKill: 0: phy0: Wireless LAN Soft blocked: no Hard blocked: no SourcePackage: linux UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 04/01/2014 dmi.bios.vendor: American Megatrends Inc. dmi.bios.version: 202 dmi.board.asset.tag: To be filled by O.E.M. dmi.board.name: X750LN dmi.board.vendor: ASUSTeK COMPUTER INC. dmi.board.version: 1.0 dmi.chassis.asset.tag: To Be Filled By O.E.M. dmi.chassis.type: 3 dmi.chassis.vendor: To Be Filled By O.E.M. dmi.chassis.version: To Be Filled By O.E.M. dmi.modalias: dmi:bvnAmericanMegatrendsInc.:bvr202:bd04/01/2014:svnASUSTeKCOMPUTERINC.:pnX750LN:pvr1.0:rvnASUSTeKCOMPUTERINC.:rnX750LN:rvr1.0:cvnToBeFilledByO.E.M.:ct3:cvrToBeFilledByO.E.M.: dmi.product.name: X750LN dmi.product.version: 1.0 dmi.sys.vendor: ASUSTeK COMPUTER INC. ** Affects: linux (Ubuntu) Importance: Undecided Status: New ** Tags: amd64 apport-bug trusty -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1342561 Title: Touchpad not recognized + Fn Keys not working (ACPI errors) Status in “linux” package in Ubuntu: New Bug description: The touchpad is not recognized. The psmouse.proto=bare hotfix does not work. The i8042.noaux i8042.reset does not work, even though the touchpad would work in PS2 compat mode (under Win7). The FN keys are not working at all, probably due to some strange ACPI decode errors in the syslog. Affected models: ASUS X750LN, ASUS X750LB, ASUS P750L (all models) Ubuntu Version: Ubuntu 3.13.0-24.46-generic 3.13.9 ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-24-generic 3.13.0-24.46 ProcVersionSignature: Ubuntu 3.13.0-24.46-generic 3.13.9 Uname: Linux 3.13.0-24-generic x86_64 ApportVersion: 2.14.1-0ubuntu3 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC1: ubuntu 3866 F pulseaudio /dev/snd/controlC0: ubuntu 3866 F pulseaudio CasperVersion: 1.340 CurrentDesktop: Unity Date: Wed Jul 16 06:59:29 2014 LiveMediaBuild: Ubuntu 14.04 LTS Trusty Tahr - Release amd64 (20140417) MachineType: ASUSTeK COMPUTER INC. X750LN ProcEnviron: TERM=xterm PATH=(custom, no user) XDG_RUNTIME_DIR=set LANG=de_DE.UTF-8 SHELL=/bin/bash ProcFB: 0 inteldrmfb ProcKernelCmdLine: file=/preseed/username.seed boot=casper persistent initrd=/casper/initrd.lz quiet splash -- debian-installer/language=de keyboard-configuration/layoutcode?=de RelatedPackageVersions: linux-restricted-modules-3.13.0-24-generic N/A linux-backports-modules-3.13.0-24-generic N/A linux-firmware 1.127 RfKill: 0: phy0: Wireless LAN Soft blocked: no Hard blocked: no SourcePackage: linux UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 04/01/2014 dmi.bios.vendor: American Megatrends Inc. dmi.bios.version: 202 dmi.board.asset.tag: To be filled by O.E.M. dmi.board.name: X750LN dmi.board.vendor: ASUSTeK COMPUTER INC. dmi.board.version: 1.0 dmi.chassis.asset.tag: To Be Filled By O.E.M. dmi.chassis.type: 3 dmi.chassis.vendor: To Be Filled By O.E.M. dmi.chassis.version: To Be Filled By O.E.M. dmi.modalias:
[Kernel-packages] [Bug 1342561] Status changed to Confirmed
This change was made by a bot. ** Changed in: linux (Ubuntu) Status: New = Confirmed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1342561 Title: Touchpad not recognized + Fn Keys not working (ACPI errors) Status in “linux” package in Ubuntu: Confirmed Bug description: The touchpad is not recognized. The psmouse.proto=bare hotfix does not work. The i8042.noaux i8042.reset does not work, even though the touchpad would work in PS2 compat mode (under Win7). The FN keys are not working at all, probably due to some strange ACPI decode errors in the syslog. Affected models: ASUS X750LN, ASUS X750LB, ASUS P750L (all models) Ubuntu Version: Ubuntu 3.13.0-24.46-generic 3.13.9 ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-24-generic 3.13.0-24.46 ProcVersionSignature: Ubuntu 3.13.0-24.46-generic 3.13.9 Uname: Linux 3.13.0-24-generic x86_64 ApportVersion: 2.14.1-0ubuntu3 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC1: ubuntu 3866 F pulseaudio /dev/snd/controlC0: ubuntu 3866 F pulseaudio CasperVersion: 1.340 CurrentDesktop: Unity Date: Wed Jul 16 06:59:29 2014 LiveMediaBuild: Ubuntu 14.04 LTS Trusty Tahr - Release amd64 (20140417) MachineType: ASUSTeK COMPUTER INC. X750LN ProcEnviron: TERM=xterm PATH=(custom, no user) XDG_RUNTIME_DIR=set LANG=de_DE.UTF-8 SHELL=/bin/bash ProcFB: 0 inteldrmfb ProcKernelCmdLine: file=/preseed/username.seed boot=casper persistent initrd=/casper/initrd.lz quiet splash -- debian-installer/language=de keyboard-configuration/layoutcode?=de RelatedPackageVersions: linux-restricted-modules-3.13.0-24-generic N/A linux-backports-modules-3.13.0-24-generic N/A linux-firmware 1.127 RfKill: 0: phy0: Wireless LAN Soft blocked: no Hard blocked: no SourcePackage: linux UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 04/01/2014 dmi.bios.vendor: American Megatrends Inc. dmi.bios.version: 202 dmi.board.asset.tag: To be filled by O.E.M. dmi.board.name: X750LN dmi.board.vendor: ASUSTeK COMPUTER INC. dmi.board.version: 1.0 dmi.chassis.asset.tag: To Be Filled By O.E.M. dmi.chassis.type: 3 dmi.chassis.vendor: To Be Filled By O.E.M. dmi.chassis.version: To Be Filled By O.E.M. dmi.modalias: dmi:bvnAmericanMegatrendsInc.:bvr202:bd04/01/2014:svnASUSTeKCOMPUTERINC.:pnX750LN:pvr1.0:rvnASUSTeKCOMPUTERINC.:rnX750LN:rvr1.0:cvnToBeFilledByO.E.M.:ct3:cvrToBeFilledByO.E.M.: dmi.product.name: X750LN dmi.product.version: 1.0 dmi.sys.vendor: ASUSTeK COMPUTER INC. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1342561/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1342568] [NEW] bluetooth connect fails
Public bug reported: I want to connect to a BT-serial adapter. Always get the error Unknown command complete for opcode 37. If I supply the correct pin, connection is reported successful, but the device immediately disappears. I tried three different host BT hardware and two different PCs. always the same. Kubuntu 14.04 Bluez-4.101-ubuntu13 syslog: First with correct pin, second using wrong pin: bluetoothd[1107]: Discovery session 0x7f66d5221040 with :1.117 activated bluetoothd[1107]: Unknown command complete for opcode 37 bluetoothd[1107]: Stopping discovery bluetoothd[1107]: Discovery session 0x7f66d52209a0 with :1.118 activated bluetoothd[1107]: Unknown command complete for opcode 37 bluetoothd[1107]: Stopping discovery bluetoothd[1107]: hci0: Cancel Pair Device (0x001a) failed: Invalid Parameters (0x0d) How do I enable more detailed logging? I am quite sure this is no duplicate of those BT-suspend bugs. Because it always fails and the rfkill workaround doesn't help. ** Affects: bluez (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to bluez in Ubuntu. https://bugs.launchpad.net/bugs/1342568 Title: bluetooth connect fails Status in “bluez” package in Ubuntu: New Bug description: I want to connect to a BT-serial adapter. Always get the error Unknown command complete for opcode 37. If I supply the correct pin, connection is reported successful, but the device immediately disappears. I tried three different host BT hardware and two different PCs. always the same. Kubuntu 14.04 Bluez-4.101-ubuntu13 syslog: First with correct pin, second using wrong pin: bluetoothd[1107]: Discovery session 0x7f66d5221040 with :1.117 activated bluetoothd[1107]: Unknown command complete for opcode 37 bluetoothd[1107]: Stopping discovery bluetoothd[1107]: Discovery session 0x7f66d52209a0 with :1.118 activated bluetoothd[1107]: Unknown command complete for opcode 37 bluetoothd[1107]: Stopping discovery bluetoothd[1107]: hci0: Cancel Pair Device (0x001a) failed: Invalid Parameters (0x0d) How do I enable more detailed logging? I am quite sure this is no duplicate of those BT-suspend bugs. Because it always fails and the rfkill workaround doesn't help. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/bluez/+bug/1342568/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1331251] Re: [Dell Studio 1558] kernel is missing support for i8k module
I think this solves the problem for me, at least temporarily on my Studio 1558. I am now able to compile a scientific library (from Julia REPL) and not have too many issues...will repost if I find problems. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1331251 Title: [Dell Studio 1558] kernel is missing support for i8k module Status in “linux” package in Ubuntu: In Progress Bug description: On previous versions of Ubuntu, I could use i8kfan to control the fans on my laptop. I am usually up to compiling lp:inkscape , and when my fan speed decreases while compiling, that is a problem. A big problem, in fact. Now, on 14.04 with kernel 3.13.0-29-generic, I can no longer use anything from the package belonging to the branch lp:i8kutils, instead receiving this error message: ~# i8kfan 2 2 can't open /proc/i8k: No such file or directory Manually inserting the module also returns an error, to make it seem such as that the kernel was not compiled with i8k support. ~# modprobe i8k modprobe: ERROR: could not insert 'i8k': No such device ~# insmod /lib/modules/3.13.0-29-generic/kernel/drivers/char/i8k.ko insmod: ERROR: could not insert module /lib/modules/3.13.0-29-generic/kernel/drivers/char/i8k.ko: No such device I also tested this with archived kernel versions on the same device: - 3.0.0-12-generic - 3.2.0-60-generic - 3.13.0-24-generic - 3.13.0-27-generic - 3.13.0-29-generic (default) I could not regain control of i8k on any of these kernels running Ubuntu 14.04. Related bug #1324372 [Dell XPS 15 (L502X)] i8k kernel module crashes system Upstream kernel (3.15.0-031500rc7-generic) does not truly fix the issue either: while I can control the fan, it appears as though the kernel is not effectively blocking the SMM BIOS control mechanisms from regaining control in about 5 seconds. To put it more simply: running i8kfan to control the fans works — for 5 seconds. Then the fans turn off completely again. Not good for a machine that is at a severe overheating risk. There is no way to keep the fans on, even during intensive CPU usage. Reaching its maximum operating temperature, the machine shuts down to avoid serious damage to the processor. ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-29-generic 3.13.0-29.53 ProcVersionSignature: Ubuntu 3.13.0-29.53-generic 3.13.11.2 Uname: Linux 3.13.0-29-generic x86_64 ApportVersion: 2.14.1-0ubuntu3.2 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: liam 1661 F pulseaudio CurrentDesktop: GNOME Date: Tue Jun 17 20:07:39 2014 HibernationDevice: RESUME=UUID=c869f245-8053-4b24-ac59-317cdddc1f67 InstallationDate: Installed on 2014-04-21 (57 days ago) InstallationMedia: Ubuntu-GNOME 14.04 LTS Trusty Tahr - Release amd64 (20140416.2) Lsusb: Bus 002 Device 002: ID 8087:0020 Intel Corp. Integrated Rate Matching Hub Bus 002 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub Bus 001 Device 003: ID 0c45:6416 Microdia Bus 001 Device 002: ID 8087:0020 Intel Corp. Integrated Rate Matching Hub Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub MachineType: Dell Inc. Studio 1558 ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-29-generic root=UUID=61428a05-4276-43bc-acc1-88079fc166b3 ro quiet splash vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-3.13.0-29-generic N/A linux-backports-modules-3.13.0-29-generic N/A linux-firmware 1.127.2 RfKill: 0: phy0: Wireless LAN Soft blocked: no Hard blocked: no SourcePackage: linux UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 03/30/2011 dmi.bios.vendor: Dell Inc. dmi.bios.version: A12 dmi.board.name: 0G939P dmi.board.vendor: Dell Inc. dmi.board.version: A12 dmi.chassis.type: 8 dmi.chassis.vendor: Dell Inc. dmi.chassis.version: A12 dmi.modalias: dmi:bvnDellInc.:bvrA12:bd03/30/2011:svnDellInc.:pnStudio1558:pvrA12:rvnDellInc.:rn0G939P:rvrA12:cvnDellInc.:ct8:cvrA12: dmi.product.name: Studio 1558 dmi.product.version: A12 dmi.sys.vendor: Dell Inc. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1331251/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1342570] [NEW] Bluetooth RFCOMM: Transport endpoint not connected (kernel regression)
Public bug reported: Ubuntu 12.04's Hardware Enablement Stack (HWE) check forced me to upgrade to trusty's kernel: * Install a newer HWE version by running: sudo apt-get install linux-generic-lts-trusty linux-image-generic-lts-trusty Since then bluetooth communication fails with Transport endpoint not connected. It does work OK if I reboot back to soon-to-be unsupported kernel 3.5.0.x This is a known kernel 3.13 regression, please see https://bugzilla.redhat.com/show_bug.cgi?id=1060457 If it is indeed fixed in kernel 3.14 please backport the fix to trusty's kernel, or perhaps get 3.14 kernel into trusty. The current 3.13 is not a good upgrade. Thanks! ** Affects: linux (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1342570 Title: Bluetooth RFCOMM: Transport endpoint not connected (kernel regression) Status in “linux” package in Ubuntu: New Bug description: Ubuntu 12.04's Hardware Enablement Stack (HWE) check forced me to upgrade to trusty's kernel: * Install a newer HWE version by running: sudo apt-get install linux-generic-lts-trusty linux-image-generic-lts-trusty Since then bluetooth communication fails with Transport endpoint not connected. It does work OK if I reboot back to soon-to-be unsupported kernel 3.5.0.x This is a known kernel 3.13 regression, please see https://bugzilla.redhat.com/show_bug.cgi?id=1060457 If it is indeed fixed in kernel 3.14 please backport the fix to trusty's kernel, or perhaps get 3.14 kernel into trusty. The current 3.13 is not a good upgrade. Thanks! To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1342570/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1342573] [NEW] nVidia GK208M [GeForce GT 740M][10de:1292] unable to use all available resolutions with the proprietary driver
Public bug reported: CID: 201305-13673 Dell Inspiron 5437 CID: 201307-14038 Dell Vostro 5470 The graphic card NVIDIA Corporation GK208M [GeForce GT 740M] does not work well with the proprietary driver Before installing the proprietary driver, there are 4 resolutions available: 1366 x 768 1360 x 768 1024 x 768 800 x 600 They all work fine. After the proprietary nVidia driver was installed, the available resolutions become: 1366 x 768* 1360 x 768* 1024 x 768* 960 x 720 960 x 600 960 x 540 928 x 696 896 x 672 800 x 600* But only the one with asterisk works, see attached photo for what happened to other resolution options. And if you switch from a not working resolution to 1024 x 768 or 800 x 600, it might have some issues. ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-30-generic 3.13.0-30.55 ProcVersionSignature: Ubuntu 3.13.0-30.55-generic 3.13.11.2 Uname: Linux 3.13.0-30-generic x86_64 NonfreeKernelModules: nvidia ApportVersion: 2.14.1-0ubuntu3.2 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC1: ubuntu 1730 F pulseaudio /dev/snd/controlC0: ubuntu 1730 F pulseaudio CRDA: country TW: (2402 - 2472 @ 40), (3, 27) (5270 - 5330 @ 40), (3, 17), DFS (5735 - 5815 @ 40), (3, 30) CurrentDesktop: Unity Date: Wed Jul 16 03:03:50 2014 HibernationDevice: RESUME=UUID=67674077-ce03-4513-b8be-b3e9bdd8840d InstallationDate: Installed on 2014-07-16 (0 days ago) InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Release amd64 (20140417) MachineType: Dell Inc. Inspiron 5437 ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-30-generic.efi.signed root=UUID=e56f47e4-b04b-4702-b89f-59e1c08572c4 ro quiet splash vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-3.13.0-30-generic N/A linux-backports-modules-3.13.0-30-generic N/A linux-firmware 1.127.4 SourcePackage: linux UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 11/14/2013 dmi.bios.vendor: Dell Inc. dmi.bios.version: A07 dmi.board.vendor: Dell Inc. dmi.board.version: A07 dmi.chassis.type: 8 dmi.chassis.vendor: Dell Inc. dmi.chassis.version: Not Specified dmi.modalias: dmi:bvnDellInc.:bvrA07:bd11/14/2013:svnDellInc.:pnInspiron5437:pvrNotSpecified:rvnDellInc.:rn:rvrA07:cvnDellInc.:ct8:cvrNotSpecified: dmi.product.name: Inspiron 5437 dmi.product.version: Not Specified dmi.sys.vendor: Dell Inc. ** Affects: hwe-next Importance: Undecided Status: New ** Affects: nvidia-graphics-drivers-331 (Ubuntu) Importance: Undecided Assignee: Anthony Wong (anthonywong) Status: New ** Tags: 201305-13673 201307-14038 amd64 apport-bug blocks-hwcert taipei-lab trusty ** Attachment added: pic.png https://bugs.launchpad.net/bugs/1342573/+attachment/4153741/+files/pic.png ** Also affects: hwe-next Importance: Undecided Status: New -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1342573 Title: nVidia GK208M [GeForce GT 740M][10de:1292] unable to use all available resolutions with the proprietary driver Status in HWE Next Project: New Status in “nvidia-graphics-drivers-331” package in Ubuntu: New Bug description: CID: 201305-13673 Dell Inspiron 5437 CID: 201307-14038 Dell Vostro 5470 The graphic card NVIDIA Corporation GK208M [GeForce GT 740M] does not work well with the proprietary driver Before installing the proprietary driver, there are 4 resolutions available: 1366 x 768 1360 x 768 1024 x 768 800 x 600 They all work fine. After the proprietary nVidia driver was installed, the available resolutions become: 1366 x 768* 1360 x 768* 1024 x 768* 960 x 720 960 x 600 960 x 540 928 x 696 896 x 672 800 x 600* But only the one with asterisk works, see attached photo for what happened to other resolution options. And if you switch from a not working resolution to 1024 x 768 or 800 x 600, it might have some issues. ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-30-generic 3.13.0-30.55 ProcVersionSignature: Ubuntu 3.13.0-30.55-generic 3.13.11.2 Uname: Linux 3.13.0-30-generic x86_64 NonfreeKernelModules: nvidia ApportVersion: 2.14.1-0ubuntu3.2 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC1: ubuntu 1730 F pulseaudio /dev/snd/controlC0: ubuntu 1730 F pulseaudio CRDA: country TW: (2402 - 2472 @ 40), (3, 27) (5270 - 5330 @ 40), (3, 17), DFS (5735 - 5815 @ 40), (3, 30) CurrentDesktop: Unity Date: Wed Jul 16 03:03:50 2014 HibernationDevice: RESUME=UUID=67674077-ce03-4513-b8be-b3e9bdd8840d InstallationDate: Installed on 2014-07-16 (0 days ago) InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Release amd64 (20140417) MachineType: Dell
[Kernel-packages] [Bug 1342573] Re: nVidia GK208M [GeForce GT 740M][10de:1292] unable to use all available resolutions with the proprietary driver
** Attachment added: Xorg.0.log https://bugs.launchpad.net/hwe-next/+bug/1342573/+attachment/4153758/+files/Xorg.0.log ** Tags added: 201307-14038 taipei-lab ** Package changed: linux (Ubuntu) = nvidia-graphics-drivers-331 (Ubuntu) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1342573 Title: nVidia GK208M [GeForce GT 740M][10de:1292] unable to use all available resolutions with the proprietary driver Status in HWE Next Project: New Status in “nvidia-graphics-drivers-331” package in Ubuntu: New Bug description: CID: 201305-13673 Dell Inspiron 5437 CID: 201307-14038 Dell Vostro 5470 The graphic card NVIDIA Corporation GK208M [GeForce GT 740M] does not work well with the proprietary driver Before installing the proprietary driver, there are 4 resolutions available: 1366 x 768 1360 x 768 1024 x 768 800 x 600 They all work fine. After the proprietary nVidia driver was installed, the available resolutions become: 1366 x 768* 1360 x 768* 1024 x 768* 960 x 720 960 x 600 960 x 540 928 x 696 896 x 672 800 x 600* But only the one with asterisk works, see attached photo for what happened to other resolution options. And if you switch from a not working resolution to 1024 x 768 or 800 x 600, it might have some issues. ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-30-generic 3.13.0-30.55 ProcVersionSignature: Ubuntu 3.13.0-30.55-generic 3.13.11.2 Uname: Linux 3.13.0-30-generic x86_64 NonfreeKernelModules: nvidia ApportVersion: 2.14.1-0ubuntu3.2 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC1: ubuntu 1730 F pulseaudio /dev/snd/controlC0: ubuntu 1730 F pulseaudio CRDA: country TW: (2402 - 2472 @ 40), (3, 27) (5270 - 5330 @ 40), (3, 17), DFS (5735 - 5815 @ 40), (3, 30) CurrentDesktop: Unity Date: Wed Jul 16 03:03:50 2014 HibernationDevice: RESUME=UUID=67674077-ce03-4513-b8be-b3e9bdd8840d InstallationDate: Installed on 2014-07-16 (0 days ago) InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Release amd64 (20140417) MachineType: Dell Inc. Inspiron 5437 ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-30-generic.efi.signed root=UUID=e56f47e4-b04b-4702-b89f-59e1c08572c4 ro quiet splash vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-3.13.0-30-generic N/A linux-backports-modules-3.13.0-30-generic N/A linux-firmware 1.127.4 SourcePackage: linux UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 11/14/2013 dmi.bios.vendor: Dell Inc. dmi.bios.version: A07 dmi.board.vendor: Dell Inc. dmi.board.version: A07 dmi.chassis.type: 8 dmi.chassis.vendor: Dell Inc. dmi.chassis.version: Not Specified dmi.modalias: dmi:bvnDellInc.:bvrA07:bd11/14/2013:svnDellInc.:pnInspiron5437:pvrNotSpecified:rvnDellInc.:rn:rvrA07:cvnDellInc.:ct8:cvrNotSpecified: dmi.product.name: Inspiron 5437 dmi.product.version: Not Specified dmi.sys.vendor: Dell Inc. To manage notifications about this bug go to: https://bugs.launchpad.net/hwe-next/+bug/1342573/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1342570] Missing required logs.
This bug is missing log files that will aid in diagnosing the problem. From a terminal window please run: apport-collect 1342570 and then change the status of the bug to 'Confirmed'. If, due to the nature of the issue you have encountered, you are unable to run this command, please add a comment stating that fact and change the bug status to 'Confirmed'. This change has been made by an automated script, maintained by the Ubuntu Kernel Team. ** Changed in: linux (Ubuntu) Status: New = Incomplete -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1342570 Title: Bluetooth RFCOMM: Transport endpoint not connected (kernel regression) Status in “linux” package in Ubuntu: Incomplete Bug description: Ubuntu 12.04's Hardware Enablement Stack (HWE) check forced me to upgrade to trusty's kernel: * Install a newer HWE version by running: sudo apt-get install linux-generic-lts-trusty linux-image-generic-lts-trusty Since then bluetooth communication fails with Transport endpoint not connected. It does work OK if I reboot back to soon-to-be unsupported kernel 3.5.0.x This is a known kernel 3.13 regression, please see https://bugzilla.redhat.com/show_bug.cgi?id=1060457 If it is indeed fixed in kernel 3.14 please backport the fix to trusty's kernel, or perhaps get 3.14 kernel into trusty. The current 3.13 is not a good upgrade. Thanks! To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1342570/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1331251] Re: [Dell Studio 1558] kernel is missing support for i8k module
oh nvm. fan shuts off repeatedly after i8kfan 2 2 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1331251 Title: [Dell Studio 1558] kernel is missing support for i8k module Status in “linux” package in Ubuntu: In Progress Bug description: On previous versions of Ubuntu, I could use i8kfan to control the fans on my laptop. I am usually up to compiling lp:inkscape , and when my fan speed decreases while compiling, that is a problem. A big problem, in fact. Now, on 14.04 with kernel 3.13.0-29-generic, I can no longer use anything from the package belonging to the branch lp:i8kutils, instead receiving this error message: ~# i8kfan 2 2 can't open /proc/i8k: No such file or directory Manually inserting the module also returns an error, to make it seem such as that the kernel was not compiled with i8k support. ~# modprobe i8k modprobe: ERROR: could not insert 'i8k': No such device ~# insmod /lib/modules/3.13.0-29-generic/kernel/drivers/char/i8k.ko insmod: ERROR: could not insert module /lib/modules/3.13.0-29-generic/kernel/drivers/char/i8k.ko: No such device I also tested this with archived kernel versions on the same device: - 3.0.0-12-generic - 3.2.0-60-generic - 3.13.0-24-generic - 3.13.0-27-generic - 3.13.0-29-generic (default) I could not regain control of i8k on any of these kernels running Ubuntu 14.04. Related bug #1324372 [Dell XPS 15 (L502X)] i8k kernel module crashes system Upstream kernel (3.15.0-031500rc7-generic) does not truly fix the issue either: while I can control the fan, it appears as though the kernel is not effectively blocking the SMM BIOS control mechanisms from regaining control in about 5 seconds. To put it more simply: running i8kfan to control the fans works — for 5 seconds. Then the fans turn off completely again. Not good for a machine that is at a severe overheating risk. There is no way to keep the fans on, even during intensive CPU usage. Reaching its maximum operating temperature, the machine shuts down to avoid serious damage to the processor. ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-29-generic 3.13.0-29.53 ProcVersionSignature: Ubuntu 3.13.0-29.53-generic 3.13.11.2 Uname: Linux 3.13.0-29-generic x86_64 ApportVersion: 2.14.1-0ubuntu3.2 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: liam 1661 F pulseaudio CurrentDesktop: GNOME Date: Tue Jun 17 20:07:39 2014 HibernationDevice: RESUME=UUID=c869f245-8053-4b24-ac59-317cdddc1f67 InstallationDate: Installed on 2014-04-21 (57 days ago) InstallationMedia: Ubuntu-GNOME 14.04 LTS Trusty Tahr - Release amd64 (20140416.2) Lsusb: Bus 002 Device 002: ID 8087:0020 Intel Corp. Integrated Rate Matching Hub Bus 002 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub Bus 001 Device 003: ID 0c45:6416 Microdia Bus 001 Device 002: ID 8087:0020 Intel Corp. Integrated Rate Matching Hub Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub MachineType: Dell Inc. Studio 1558 ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-29-generic root=UUID=61428a05-4276-43bc-acc1-88079fc166b3 ro quiet splash vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-3.13.0-29-generic N/A linux-backports-modules-3.13.0-29-generic N/A linux-firmware 1.127.2 RfKill: 0: phy0: Wireless LAN Soft blocked: no Hard blocked: no SourcePackage: linux UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 03/30/2011 dmi.bios.vendor: Dell Inc. dmi.bios.version: A12 dmi.board.name: 0G939P dmi.board.vendor: Dell Inc. dmi.board.version: A12 dmi.chassis.type: 8 dmi.chassis.vendor: Dell Inc. dmi.chassis.version: A12 dmi.modalias: dmi:bvnDellInc.:bvrA12:bd03/30/2011:svnDellInc.:pnStudio1558:pvrA12:rvnDellInc.:rn0G939P:rvrA12:cvnDellInc.:ct8:cvrA12: dmi.product.name: Studio 1558 dmi.product.version: A12 dmi.sys.vendor: Dell Inc. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1331251/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1296066] Re: [Lenovo ThinkPad X1 Carbon 20A7] suspend/resume failure
** Changed in: linux (Ubuntu) Status: Expired = Confirmed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1296066 Title: [Lenovo ThinkPad X1 Carbon 20A7] suspend/resume failure Status in “linux” package in Ubuntu: Confirmed Bug description: system does not wake up after sudo pm-suspend. ProblemType: KernelOops DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-18-generic 3.13.0-18.38 ProcVersionSignature: Ubuntu 3.13.0-18.38-generic 3.13.6 Uname: Linux 3.13.0-18-generic x86_64 Annotation: This occured during a previous suspend and prevented it from resuming properly. ApportVersion: 2.13.3-0ubuntu1 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC1: lightdm1502 F pulseaudio plejaden 2151 F pulseaudio /dev/snd/controlC0: lightdm1502 F pulseaudio plejaden 2151 F pulseaudio Date: Fri Mar 21 23:26:37 2014 ExecutablePath: /usr/share/apport/apportcheckresume Failure: suspend/resume InstallationDate: Installed on 2014-03-20 (2 days ago) InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Alpha amd64+mac (20140318) InterpreterPath: /usr/bin/python3.4 MachineType: LENOVO 20A7005JGE ProcCmdline: /usr/bin/python3 /usr/share/apport/apportcheckresume ProcEnviron: TERM=linux PATH=(custom, no user) ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-18-generic root=UUID=59ec0854-9dc0-41fd-a7b9-da9df8969a7f ro quiet splash vt.handoff=7 PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No PulseAudio daemon running, or not running as session daemon. RelatedPackageVersions: linux-restricted-modules-3.13.0-18-generic N/A linux-backports-modules-3.13.0-18-generic N/A linux-firmware 1.126 SourcePackage: linux Title: [LENOVO 20A7005JGE] suspend/resume failure UpgradeStatus: No upgrade log present (probably fresh install) UserGroups: dmi.bios.date: 01/13/2014 dmi.bios.vendor: LENOVO dmi.bios.version: GRET30WW (1.07 ) dmi.board.asset.tag: Not Available dmi.board.name: 20A7005JGE dmi.board.vendor: LENOVO dmi.board.version: SDK0E50510 Pro dmi.chassis.asset.tag: No Asset Information dmi.chassis.type: 10 dmi.chassis.vendor: LENOVO dmi.chassis.version: Not Available dmi.modalias: dmi:bvnLENOVO:bvrGRET30WW(1.07):bd01/13/2014:svnLENOVO:pn20A7005JGE:pvrThinkPadX1Carbon2nd:rvnLENOVO:rn20A7005JGE:rvrSDK0E50510Pro:cvnLENOVO:ct10:cvrNotAvailable: dmi.product.name: 20A7005JGE dmi.product.version: ThinkPad X1 Carbon 2nd dmi.sys.vendor: LENOVO To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1296066/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1321421] Re: 8086:8ca0 Sound output distorted/unusable with Intel Z97/H97
#28 works for me too. Linux Mint 17 3.13.0-24-generic with MSI Z97-43 Gaming motherboard. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1321421 Title: 8086:8ca0 Sound output distorted/unusable with Intel Z97/H97 Status in “linux” package in Ubuntu: Triaged Bug description: I get horribly cracking sound and distortion with my ne AS Rock Fatal1ty H97 Performance Mainboard. This MB is using PuritySound 2 Engine powered by the Realtek ALC1150 Chipset. Here is some ALSA Info: http://www.alsa- project.org/db/?f=44b12e252a2cf7ebb75ab3e23d5cef072af6c328 Following commit fixes this problem: https://kernel.googlesource.com/pub/scm/linux/kernel/git/tiwai/sound/+/77f07800cb456bed6e5c345e6e4e83e8eda62437 WORKAROUND: Create a modprobe.d file with command: echo options snd-hda-intel vid=8086 pid=8ca0 snoop=0 | sudo tee /etc/modprobe.d/fix-sound-intel97.conf ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: alsa-base 1.0.25+dfsg-0ubuntu4 ProcVersionSignature: Ubuntu 3.13.0-24.46-generic 3.13.9 Uname: Linux 3.13.0-24-generic x86_64 ApportVersion: 2.14.1-0ubuntu3.1 Architecture: amd64 CurrentDesktop: Unity Date: Tue May 20 21:03:18 2014 InstallationDate: Installed on 2014-05-20 (0 days ago) InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Release amd64 (20140417) PackageArchitecture: all SourcePackage: alsa-driver UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 04/28/2014 dmi.bios.vendor: American Megatrends Inc. dmi.bios.version: P1.10 dmi.board.name: H97 Performance dmi.board.vendor: ASRock dmi.chassis.asset.tag: To Be Filled By O.E.M. dmi.chassis.type: 3 dmi.chassis.vendor: To Be Filled By O.E.M. dmi.chassis.version: To Be Filled By O.E.M. dmi.modalias: dmi:bvnAmericanMegatrendsInc.:bvrP1.10:bd04/28/2014:svnToBeFilledByO.E.M.:pnToBeFilledByO.E.M.:pvrToBeFilledByO.E.M.:rvnASRock:rnH97Performance:rvr:cvnToBeFilledByO.E.M.:ct3:cvrToBeFilledByO.E.M.: dmi.product.name: To Be Filled By O.E.M. dmi.product.version: To Be Filled By O.E.M. dmi.sys.vendor: To Be Filled By O.E.M. --- ApportVersion: 2.14.1-0ubuntu3.1 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC1: ben1445 F pulseaudio /dev/snd/controlC0: ben1445 F pulseaudio CurrentDesktop: Unity DistroRelease: Ubuntu 14.04 HibernationDevice: RESUME=UUID=f35e4cc7-52c2-4fe7-9e4b-405280ed487f InstallationDate: Installed on 2014-05-20 (2 days ago) InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Release amd64 (20140417) MachineType: To Be Filled By O.E.M. To Be Filled By O.E.M. NonfreeKernelModules: nvidia Package: linux (not installed) ProcFB: 0 EFI VGA ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.13.0-24-generic.efi.signed root=/dev/mapper/ubuntu--vg-root ro ProcVersionSignature: Ubuntu 3.13.0-24.47-generic 3.13.9 RelatedPackageVersions: linux-restricted-modules-3.13.0-24-generic N/A linux-backports-modules-3.13.0-24-generic N/A linux-firmware 1.127.2 Tags: trusty Uname: Linux 3.13.0-24-generic x86_64 UpgradeStatus: No upgrade log present (probably fresh install) UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo _MarkForUpload: True dmi.bios.date: 04/28/2014 dmi.bios.vendor: American Megatrends Inc. dmi.bios.version: P1.10 dmi.board.name: H97 Performance dmi.board.vendor: ASRock dmi.chassis.asset.tag: To Be Filled By O.E.M. dmi.chassis.type: 3 dmi.chassis.vendor: To Be Filled By O.E.M. dmi.chassis.version: To Be Filled By O.E.M. dmi.modalias: dmi:bvnAmericanMegatrendsInc.:bvrP1.10:bd04/28/2014:svnToBeFilledByO.E.M.:pnToBeFilledByO.E.M.:pvrToBeFilledByO.E.M.:rvnASRock:rnH97Performance:rvr:cvnToBeFilledByO.E.M.:ct3:cvrToBeFilledByO.E.M.: dmi.product.name: To Be Filled By O.E.M. dmi.product.version: To Be Filled By O.E.M. dmi.sys.vendor: To Be Filled By O.E.M. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1321421/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1342570] Re: Bluetooth RFCOMM: Transport endpoint not connected (kernel regression)
apport-collect failed when run over ssh on the server so I am changing the bug status to confirmed. ** Changed in: linux (Ubuntu) Status: Incomplete = Confirmed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1342570 Title: Bluetooth RFCOMM: Transport endpoint not connected (kernel regression) Status in “linux” package in Ubuntu: Confirmed Bug description: Ubuntu 12.04's Hardware Enablement Stack (HWE) check forced me to upgrade to trusty's kernel: * Install a newer HWE version by running: sudo apt-get install linux-generic-lts-trusty linux-image-generic-lts-trusty Since then bluetooth communication fails with Transport endpoint not connected. It does work OK if I reboot back to soon-to-be unsupported kernel 3.5.0.x This is a known kernel 3.13 regression, please see https://bugzilla.redhat.com/show_bug.cgi?id=1060457 If it is indeed fixed in kernel 3.14 please backport the fix to trusty's kernel, or perhaps get 3.14 kernel into trusty. The current 3.13 is not a good upgrade. Thanks! To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1342570/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1336659] Re: Boot fails after installing updates, error: “cryptsetup: evms_activate is not available
Yes, moving the drive that was on the PCI-X controller to the main board solved the problem. Does this mean that a driver disappeared between the -60 and -64 kernels? Or is it that somehow the driver is just not available on boot? Any thoughts on how to correct this? -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1336659 Title: Boot fails after installing updates, error: “cryptsetup: evms_activate is not available Status in “linux” package in Ubuntu: Confirmed Bug description: I am having the same problem as bug #1003309, though in my case I am not running in a virtual machine. Ubuntu 12.04 with lvm on top of an encrypted mirrored system. After running an update, which updated the kernel from 3.2.0-60 to -64, on reboot I was met with: “cryptsetup: evms_activate is not available. Booting with the previous kernel works fine. I am including my apt logs, here. Let me know if I should add anything else. Tyan-S3970:~$ lsb_release -a LSB Version: core-2.0-amd64:core-2.0-noarch:core-3.0-amd64:core-3.0-noarch:core-3.1-amd64:core-3.1-noarch:core-3.2-amd64:core-3.2-noarch:core-4.0-amd64:core-4.0-noarch Distributor ID: Ubuntu Description:Ubuntu 12.04.4 LTS Release:12.04 Codename: precise Tyan-S3970:~$ uname -a Linux Tyan-S3970 3.2.0-60-generic #91-Ubuntu SMP Wed Feb 19 03:54:44 UTC 2014 x86_64 x86_64 x86_64 GNU/Linux --- AlsaVersion: Advanced Linux Sound Architecture Driver Version 1.0.24. ApportVersion: 2.0.1-0ubuntu17.6 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: dev2733 F pulseaudio /dev/snd/controlC1: dev2733 F pulseaudio CRDA: Error: command ['iw', 'reg', 'get'] failed with exit code 1: nl80211 not found. Card0.Amixer.info: Card hw:0 'NVidia'/'HDA NVidia at 0xfd77c000 irq 17' Mixer name : 'Nvidia GPU 0b HDMI/DP' Components : 'HDA:10de000b,10de0101,00100200' Controls : 24 Simple ctrls : 4 Card1.Amixer.info: Card hw:1 'Audigy'/'SB Audigy 1 [SB0092] (rev.3, serial:0x531102) at 0xd480, irq 30' Mixer name : 'TriTech TR28602' Components : 'AC97a:54524123' Controls : 194 Simple ctrls : 30 DistroRelease: Ubuntu 12.04 HibernationDevice: RESUME=UUID=bdbecead-fce1-4f50-ba0e-e523c0762ed1 InstallationMedia: Ubuntu 11.04 Natty Narwhal - Release amd64 (20110426) IwConfig: lono wireless extensions. eth1 no wireless extensions. eth0 no wireless extensions. MachineType: empty empty MarkForUpload: True NonfreeKernelModules: nvidia Package: linux (not installed) ProcEnviron: TERM=xterm PATH=(custom, no user) LANG=en_US.UTF-8 SHELL=/bin/bash ProcFB: ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.2.0-60-generic root=/username/mapper/tyan--s3970-root ro quiet splash ProcVersionSignature: Ubuntu 3.2.0-60.91-generic 3.2.55 RelatedPackageVersions: linux-restricted-modules-3.2.0-60-generic N/A linux-backports-modules-3.2.0-60-generic N/A linux-firmware1.79.15 RfKill: StagingDrivers: zram Tags: precise running-unity staging Uname: Linux 3.2.0-60-generic x86_64 UpgradeStatus: Upgraded to precise on 2012-06-17 (744 days ago) UserGroups: adm admin apt-mirror cdrom dialout kismet lpadmin plugdev sambashare src vboxusers WifiSyslog: dmi.bios.date: 10/25/2007 dmi.bios.vendor: American Megatrends Inc. dmi.bios.version: 080011 dmi.board.asset.tag: empty dmi.board.name: S3970 dmi.board.vendor: TYAN Computer Corporation dmi.board.version: empty dmi.chassis.asset.tag: empty dmi.chassis.type: 3 dmi.chassis.vendor: empty dmi.chassis.version: empty dmi.modalias: dmi:bvnAmericanMegatrendsInc.:bvr080011:bd10/25/2007:svnempty:pnempty:pvrempty:rvnTYANComputerCorporation:rnS3970:rvrempty:cvnempty:ct3:cvrempty: dmi.product.name: empty dmi.product.version: empty dmi.sys.vendor: empty To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1336659/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1342568] Re: bluetooth connect fails
Enabled debugging by adding -d to /etc/init/bluetooth.conf But I don't understand what exactly is going on and why it fails. I stripped pid, date (except secs) and hostname from log. ** Attachment added: debug log https://bugs.launchpad.net/ubuntu/+source/bluez/+bug/1342568/+attachment/4153829/+files/bluetooth.log -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to bluez in Ubuntu. https://bugs.launchpad.net/bugs/1342568 Title: bluetooth connect fails Status in “bluez” package in Ubuntu: New Bug description: I want to connect to a BT-serial adapter. Always get the error Unknown command complete for opcode 37. If I supply the correct pin, connection is reported successful, but the device immediately disappears. I tried three different host BT hardware and two different PCs. always the same. Kubuntu 14.04 Bluez-4.101-ubuntu13 syslog: First with correct pin, second using wrong pin: bluetoothd[1107]: Discovery session 0x7f66d5221040 with :1.117 activated bluetoothd[1107]: Unknown command complete for opcode 37 bluetoothd[1107]: Stopping discovery bluetoothd[1107]: Discovery session 0x7f66d52209a0 with :1.118 activated bluetoothd[1107]: Unknown command complete for opcode 37 bluetoothd[1107]: Stopping discovery bluetoothd[1107]: hci0: Cancel Pair Device (0x001a) failed: Invalid Parameters (0x0d) How do I enable more detailed logging? I am quite sure this is no duplicate of those BT-suspend bugs. Because it always fails and the rfkill workaround doesn't help. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/bluez/+bug/1342568/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1342568] Re: bluetooth connect fails
Another log using different BT-dongle on host. ** Attachment added: bluetooth2.log https://bugs.launchpad.net/ubuntu/+source/bluez/+bug/1342568/+attachment/4153834/+files/bluetooth2.log -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to bluez in Ubuntu. https://bugs.launchpad.net/bugs/1342568 Title: bluetooth connect fails Status in “bluez” package in Ubuntu: New Bug description: I want to connect to a BT-serial adapter. Always get the error Unknown command complete for opcode 37. If I supply the correct pin, connection is reported successful, but the device immediately disappears. I tried three different host BT hardware and two different PCs. always the same. Kubuntu 14.04 Bluez-4.101-ubuntu13 syslog: First with correct pin, second using wrong pin: bluetoothd[1107]: Discovery session 0x7f66d5221040 with :1.117 activated bluetoothd[1107]: Unknown command complete for opcode 37 bluetoothd[1107]: Stopping discovery bluetoothd[1107]: Discovery session 0x7f66d52209a0 with :1.118 activated bluetoothd[1107]: Unknown command complete for opcode 37 bluetoothd[1107]: Stopping discovery bluetoothd[1107]: hci0: Cancel Pair Device (0x001a) failed: Invalid Parameters (0x0d) How do I enable more detailed logging? I am quite sure this is no duplicate of those BT-suspend bugs. Because it always fails and the rfkill workaround doesn't help. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/bluez/+bug/1342568/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1256158] Re: BCM4360 High packet loss at 5GHz
I am experiencing this as well; same macbook pro (11,1) as Julien. I experience many occurrences of this in /var/log/syslog: ERROR @wl_cfg80211_get_station : Wrong Mac address Eventually, the card disassociates, and fails repeatedly to reconnect to the AP. Sometimes it succeeds, but will fail again soon after (the driver remains in a bad state). I have a very rough workaround, reloading the wl module, but it's time-consuming and is no real fix. After running this, the card reassociates on its first try, then works well until the problem re-occurs. This indicates to me that it's a problem in the driver, not something to do with any state on the card. sudo service network-manager stop sudo pkill wpa_supplicant sudo rmmod wl sudo modprobe wl sudo service network-manager restart -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to bcmwl in Ubuntu. https://bugs.launchpad.net/bugs/1256158 Title: BCM4360 High packet loss at 5GHz Status in “bcmwl” package in Ubuntu: Confirmed Bug description: I have an ASUS PCE-AC68 adapter (BCM4360 chipset), running under 13.10, kernel 3.11.0-13-generic x86_64, bcmwl-kernel-source 6.30.223.141+bdcom-0ubuntu1. The AP supports 802.11a/b/g/n/ac. The card and adapter work perfectly when connected in the 2.4GHz band and 5GHz low channels (36-48). When connecting at 5GHz high channels (149-161), there are no obvious errors, but packet loss to the gateway is extremely high (50-80%). This behavior is very bursty, alternating between no, and total packet loss on a timescale ranging from a few seconds to a few minutes. Power management is off, and syslog/kern.log don't provide any useful clues. Based on the observed pattern of the packet loss, and the performance of other 5GHz devices connected to the same AP, I don't think it is an interference issue. I'm unsure as to how to proceed with generating some more useful logging, so any suggestions would be appreciated. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/bcmwl/+bug/1256158/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1342645] [NEW] upgrade bcmwl-kernel-source to 6.30.223.248
Public bug reported: The latest version from broadcom is 6.30.223.248 http://www.broadcom.com/support/802.11/linux_sta.php Release notes: WHAT'S NEW IN RELEASE 6.30.223.23X - + Upgraded to Support 3.11 kernels + Added cfg80211 wowlan support for Magic Packets and Disconnect WHAT'S NEW IN RELEASE 6.30.223.126 -- + Upgraded to Support 3.8.x + Added 43142 support + Added 4352 support + Dropped WEXT support ** Affects: bcmwl (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to bcmwl in Ubuntu. https://bugs.launchpad.net/bugs/1342645 Title: upgrade bcmwl-kernel-source to 6.30.223.248 Status in “bcmwl” package in Ubuntu: New Bug description: The latest version from broadcom is 6.30.223.248 http://www.broadcom.com/support/802.11/linux_sta.php Release notes: WHAT'S NEW IN RELEASE 6.30.223.23X - + Upgraded to Support 3.11 kernels + Added cfg80211 wowlan support for Magic Packets and Disconnect WHAT'S NEW IN RELEASE 6.30.223.126 -- + Upgraded to Support 3.8.x + Added 43142 support + Added 4352 support + Dropped WEXT support To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/bcmwl/+bug/1342645/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1338666] Re: ppc64le kernel module nx_crypto blocks loading other kernel modules
** Tags added: targetmilestone-inin1410 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1338666 Title: ppc64le kernel module nx_crypto blocks loading other kernel modules Status in “linux” package in Ubuntu: Fix Released Status in “linux” source package in Trusty: Fix Committed Status in “linux” source package in Utopic: Fix Released Bug description: == Comment: #0 - David A. Harnett dober...@us.ibm.com - 2014-03-12 20:43:09 == ---Problem Description--- On Ubuntu 14.04 ppc64le in a Power7 LPAR , if kernel module nx_crypto is already loaded , attempts to load additional kernel modules fail with this message : modprobe: ERROR: could not insert 'xxx': Invalid argument where xxx is the name of module we tried to load . dmesg shows: [ 33.012917] nx: scatter/gather list overflow, pid: 806 ---uname output--- Linux c277f3u1crash2 3.13.0-17-generic #37-Ubuntu SMP Mon Mar 10 21:47:19 UTC 2014 ppc64le ppc64le ppc64le GNU/Linux ---Additional Hardware Info--- special PowerVM Little Endian firmware level b0108l_1446.780 Machine Type = Power 780+ 9179-MHD LPAR ---Debugger--- A debugger is not configured ---Steps to Reproduce--- lsmod , if nx_crypto module not loaded , then modprobe nx_crypto ; try to load any kernel module , modprobe nfs Stack trace output: no Oops output: no System Dump Info: The system is not configured to capture a system dump. *Additional Instructions for Dave Harnett/dober...@us.ibm.com , no backup: -Post a private note with access information to the machine that the bug is occuring on. -Attach sysctl -a output output to the bug. == Comment: #3 - David A. Harnett dober...@us.ibm.com - 2014-03-12 21:19:42 == Circumvention : add directive blacklist nx_crypto to a file in directory /etc/modprobe.d Problem does not occur on Ubuntu 14.04 powerpc64 Big Endian image running in LPAR on same hardware . == Comment: #5 - Leonidas Da Silva Barbosa leosi...@br.ibm.com - 2014-03-13 14:48:17 == David, can you provide us with a cat /etc/issue cat /proc/cpuinfo uname -a from the system where the problem does not happen? == Comment: #6 - David A. Harnett dober...@us.ibm.com - 2014-03-13 15:24:55 == This is the requested output from the BE image in another LPAR on the same physical machine . $ cat /etc/issue Ubuntu Trusty Tahr (development branch) \n \l $ cat /proc/cpuinfo processor : 0 cpu : POWER7 (architected), altivec supported clock : 3724.00MHz revision: 2.0 (pvr 004a 0200) processor : 1 cpu : POWER7 (architected), altivec supported clock : 3724.00MHz revision: 2.0 (pvr 004a 0200) processor : 2 cpu : POWER7 (architected), altivec supported clock : 3724.00MHz revision: 2.0 (pvr 004a 0200) processor : 3 cpu : POWER7 (architected), altivec supported clock : 3724.00MHz revision: 2.0 (pvr 004a 0200) timebase: 51200 platform: pSeries model : IBM,9179-MHD machine : CHRP IBM,9179-MHD $ uname -a Linux c277f3u1admin2 3.13.0-17-powerpc64-smp #37-Ubuntu SMP Mon Mar 10 21:58:15 UTC 2014 ppc64 ppc64 ppc64 GNU/Linux == Comment: #10 - Leonidas Da Silva Barbosa leosi...@br.ibm.com - 2014-03-14 13:19:42 == David, The hardware that are you running both image is over a PowerVM LE ? == Comment: #11 - David A. Harnett dober...@us.ibm.com - 2014-03-14 13:32:42 == This model Power 780 (Saturn MR class) Power7 machine has special IBM internal use only firmware that permits both LE and BE OS images to run in separate PowerVM LPARs simultaneously . Our contact for the firmware is David Larson , lars...@us.ibm.com This is the third problem I observed on this machine where LE OS has problems but the same function works correctly on a nearly equivalent level of BE OS on the same physical machine . 1) nvram command fails with segfault - to be fixed in powerpc-utils package 2) ibmveth kernel driver for PowerVM virtual ethernet device - fixed in an Ubuntu 14.04 kernel 3) this problem Common thread seems to be drivers that interface with firmware/hardware platform features . == Comment: #17 - Cody P. Schafer cpsch...@us.ibm.com - 2014-05-14 14:02:52 == I've seen issues on POWER8-PowerVM-ppc64le with nx-crypto, dmesg attached. note: this is still LE, but is also on P8 (not P7 as this bug was originally reported). == Comment: #18 - Cody P. Schafer cpsch...@us.ibm.com - 2014-05-14 14:04:55 == Also, in my case further modules load without issue. The only problem is the log spam. == Comment: #19 - Cody P. Schafer cpsch...@us.ibm.com - 2014-05-14 14:05:17 == kernel is
[Kernel-packages] [Bug 1317979] Re: 8086:0162 [System76 Sable Complete] backlight stops working after suspend
Traxtopel, could you please provide the information with the latest mainline kernel via http://kernel.ubuntu.com/~kernel- ppa/mainline/v3.16-rc5-utopic/ ? -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1317979 Title: 8086:0162 [System76 Sable Complete] backlight stops working after suspend Status in “linux” package in Ubuntu: Incomplete Bug description: Add debug information from kernel debug inform from https://wiki.ubuntu.com/Kernel/Debugging/Backlight ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-24-generic 3.13.0-24.47 ProcVersionSignature: Ubuntu 3.13.0-24.47-generic 3.13.9 Uname: Linux 3.13.0-24-generic x86_64 ApportVersion: 2.14.1-0ubuntu3 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: traxtopel 3077 F pulseaudio /dev/snd/controlC1: traxtopel 3077 F pulseaudio CurrentDesktop: Unity Date: Fri May 9 18:29:41 2014 HibernationDevice: RESUME=UUID=de5a6c32-5d89-4cb3-aee1-a8b32c416a1d InstallationDate: Installed on 2014-04-04 (35 days ago) InstallationMedia: Ubuntu 13.10 Saucy Salamander - Release amd64 (20131016.1) MachineType: System76, Inc. Sable Complete ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-24-generic root=UUID=27287be2-654a-4c7a-9c5b-cc37df0adc0a ro quiet splash acpi_backlight=vendor vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-3.13.0-24-generic N/A linux-backports-modules-3.13.0-24-generic N/A linux-firmware 1.127 SourcePackage: linux StagingDrivers: keucr UpgradeStatus: Upgraded to trusty on 2014-04-18 (21 days ago) dmi.bios.date: 10/09/2013 dmi.bios.vendor: Intel Corp. dmi.bios.version: AGH6120H.86A.0023.2013.1009.1142 dmi.board.asset.tag: To be filled by O.E.M. dmi.board.name: DH61AGL dmi.board.vendor: Intel Corporation dmi.board.version: G71256-202 dmi.chassis.type: 3 dmi.chassis.vendor: System76, Inc. dmi.chassis.version: sabc1 dmi.modalias: dmi:bvnIntelCorp.:bvrAGH6120H.86A.0023.2013.1009.1142:bd10/09/2013:svnSystem76,Inc.:pnSableComplete:pvrsabc1:rvnIntelCorporation:rnDH61AGL:rvrG71256-202:cvnSystem76,Inc.:ct3:cvrsabc1: dmi.product.name: Sable Complete dmi.product.version: sabc1 dmi.sys.vendor: System76, Inc. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1317979/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1327741] Re: Kernel panic on driver rtl8821ae
** This bug is no longer a duplicate of bug 1341275 [Gigabyte GB-BXi7-4470R] Kernel panic in rtl8821ae -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1327741 Title: Kernel panic on driver rtl8821ae Status in “linux” package in Ubuntu: Incomplete Bug description: Since kernel version 3.13.0-27, my Asus VM40B goes into kernel panic during boot, seemingly due to an error with the WiFi driver, rtl8821ae. The attached screenshot of the screen (I have no idea how to otherwise capture the output of a kernel panic) shows the error with kernel version 3.13.0-29, but it happens exactly the same with -27. WORKAROUND: Disabling the WiFi card or using version 3.13.0-24 does not cause any problem. Please bear in mind, while reading the generated report, that I have disabled the WiFi card to be able to boot with kernel -29. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1327741/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1341270] Re: Ubuntu 14.04 freezes on resume from suspend: GeForce GT 520 GPU with nouveau or proprietary nvidia-331 drivers, even when booted nosplash noquiet
TEN, using the nvidia drivers narrows the scope of people who may help you on graphics driver issues to nvidia only. As well, please do not mix two different drivers (nvidia and nouveau) into one report. Instead, please create one per driver, not per symptom. ** Description changed: - Generating individual reports as requested by Christopher M. Penalver - and Chris Bainbridge in - https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1283938 via - ubuntu-bug linux. - - After forcing switch from nouveau to nvidia-331 (a sad story in itself - as the System Settings pretend to handle that: - https://bugs.launchpad.net/ubuntu/+source/nvidia-graphics- - drivers-331/+bug/1315156) at least apportcheckresume does catch the - issue as attached, but after Continue gives no further indication what - data has been sent where (if at all) and how it may be commented or - complemented, i.e. nothing opens in the browser, only local password - prompt(s). - Sometimes the screen shows a blinking text console mode prompt and the NumLock key can still turn its LED on and off for a few seconds under nivida-331 before the machine freezes with fans running after resume, while nouveau would even permit Ctrl-Alt-F1 occasionally (but then has - other log-flooding issues as indicated at the prior link). - - Not being able to resume after suspend has kept my Ubuntu 14.04 LTS installation unusable for 3 months already. - This is a recurring issue already exhibited by 12.04 LTS, affecting numerous systems even back then (cf. references from https://bugs.launchpad.net/ubuntu/+source/pm-utils/+bug/999638) on kernels before 3.2.0-25-generic-pae, as well as with Intel graphics - but in spite of the regression users continue to be isolated into individual bugs (hardly cross-linked with the major ones) and sent through BIOS upgrades and mainline kernel testing while the bugs in spite of their Heat continue to lack the requisite Importance and Assignment (or orchestrated testing for potential Mode Setting implications). + other log-flooding issues as indicated at the prior link). This is a + recurring issue already exhibited by 12.04.? LTS. ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-30-generic 3.13.0-30.55 ProcVersionSignature: Ubuntu 3.13.0-30.55-generic 3.13.11.2 Uname: Linux 3.13.0-30-generic x86_64 NonfreeKernelModules: nvidia ApportVersion: 2.14.1-0ubuntu3.2 Architecture: amd64 AudioDevicesInUse: - USERPID ACCESS COMMAND - /dev/snd/controlC1: user 2417 F pulseaudio - /dev/snd/controlC2: user 2417 F pulseaudio - /dev/snd/controlC3: user 2417 F pulseaudio - /dev/snd/controlC0: user 2417 F pulseaudio + USERPID ACCESS COMMAND + /dev/snd/controlC1: user 2417 F pulseaudio + /dev/snd/controlC2: user 2417 F pulseaudio + /dev/snd/controlC3: user 2417 F pulseaudio + /dev/snd/controlC0: user 2417 F pulseaudio CurrentDesktop: Unity Date: Sun Jul 13 12:20:23 2014 HibernationDevice: RESUME=UUID=268e28b5-d1d2-41ba-96cd-dbc77d8ec2ad InstallationDate: Installed on 2014-04-22 (81 days ago) InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Release amd64 (20140417) IwConfig: - eth0 no wireless extensions. - - lono wireless extensions. + eth0 no wireless extensions. + + lono wireless extensions. MachineType: Hewlett-Packard HP Compaq dc7800p Convertible Minitower ProcFB: - + ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.13.0-30-generic root=UUID=dbc867b7-24fc-40ab-93bd-b34f10eb7044 ro RelatedPackageVersions: - linux-restricted-modules-3.13.0-30-generic N/A - linux-backports-modules-3.13.0-30-generic N/A - linux-firmware 1.127.4 + linux-restricted-modules-3.13.0-30-generic N/A + linux-backports-modules-3.13.0-30-generic N/A + linux-firmware 1.127.4 RfKill: - 1: hci0: Bluetooth - Soft blocked: no - Hard blocked: no + 1: hci0: Bluetooth + Soft blocked: no + Hard blocked: no SourcePackage: linux UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 07/21/2011 dmi.bios.vendor: Hewlett-Packard dmi.bios.version: 786F1 v01.32 dmi.board.asset.tag: CZC8277VRK dmi.board.name: 0AACh dmi.board.vendor: Hewlett-Packard dmi.chassis.asset.tag: CZC8277VRK dmi.chassis.type: 6 dmi.chassis.vendor: Hewlett-Packard dmi.modalias: dmi:bvnHewlett-Packard:bvr786F1v01.32:bd07/21/2011:svnHewlett-Packard:pnHPCompaqdc7800pConvertibleMinitower:pvr:rvnHewlett-Packard:rn0AACh:rvr:cvnHewlett-Packard:ct6:cvr: dmi.product.name: HP Compaq dc7800p Convertible Minitower dmi.sys.vendor: Hewlett-Packard ** Tags removed: precise ** Tags added: latest-bios-1.32 ** Summary changed: - Ubuntu 14.04 freezes on resume from suspend: GeForce GT 520 GPU with nouveau or proprietary nvidia-331 drivers, even when booted nosplash noquiet +
[Kernel-packages] [Bug 1340110] Re: [Dell Latitude 12 Rugged Extreme 7204] Touchscreen 3-finger / 4-finger gestures does not work
Po-Hsu Lin, the issue you are reporting is an upstream one. Could you please report this problem through the appropriate channel by following the instructions _verbatim_ at https://wiki.ubuntu.com/Bugs/Upstream/kernel ? Please provide a direct URL to your e-mail to the mailing list once you have made it so that it may be tracked. Thank you for your understanding. ** Changed in: linux (Ubuntu) Status: Confirmed = Triaged -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1340110 Title: [Dell Latitude 12 Rugged Extreme 7204] Touchscreen 3-finger / 4-finger gestures does not work Status in HWE Next Project: New Status in “linux” package in Ubuntu: Triaged Bug description: CID: 201402-14663 Dell Latitude 12 Rugged Extreme According to Dell's website[1], this system comes with a multi-touch screen But only two-finger pinch / expand zoom is supported on this system Steps: 1. Install 14.04 + update (3.13.0-30), boot to desktop 2. Try to open Dash with 4 fingers tap 3. Try to move a window with 3 fingers tap Expected results: * 3 / 4-finger gesture should work Actual result: * Nothing happened [1] 11.6” HD (1366 x 768) 16:9 Direct-View outdoor-readable display with resistive multi-touch http://www.dell.com/us/business/p/latitude-7204-laptop/pd ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-30-generic 3.13.0-30.55 ProcVersionSignature: Ubuntu 3.13.0-30.55-generic 3.13.11.2 Uname: Linux 3.13.0-30-generic x86_64 ApportVersion: 2.14.1-0ubuntu3.2 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC1: ubuntu 1501 F pulseaudio /dev/snd/controlC0: ubuntu 1501 F pulseaudio CRDA: country TW: (2402 - 2472 @ 40), (3, 27) (5270 - 5330 @ 40), (3, 17), DFS (5735 - 5815 @ 40), (3, 30) CurrentDesktop: Unity Date: Thu Jul 10 05:36:18 2014 HibernationDevice: RESUME=UUID=b68f02ad-f5e4-4eb9-b88d-e85f60666734 InstallationDate: Installed on 2014-07-10 (0 days ago) InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Release amd64 (20140417) MachineType: Dell Inc. Latitude 12 Rugged Extreme (7204) ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-30-generic.efi.signed root=UUID=bdd00fe9-0df9-4b71-92c5-5f94c533f725 ro quiet splash vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-3.13.0-30-generic N/A linux-backports-modules-3.13.0-30-generic N/A linux-firmware 1.127.4 SourcePackage: linux UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 05/12/2014 dmi.bios.vendor: Dell Inc. dmi.bios.version: A00 dmi.board.name: 0TH1GJ dmi.board.vendor: Dell Inc. dmi.board.version: X02 dmi.chassis.type: 9 dmi.chassis.vendor: Dell Inc. dmi.modalias: dmi:bvnDellInc.:bvrA00:bd05/12/2014:svnDellInc.:pnLatitude12RuggedExtreme(7204):pvr01:rvnDellInc.:rn0TH1GJ:rvrX02:cvnDellInc.:ct9:cvr: dmi.product.name: Latitude 12 Rugged Extreme (7204) dmi.product.version: 01 dmi.sys.vendor: Dell Inc. To manage notifications about this bug go to: https://bugs.launchpad.net/hwe-next/+bug/1340110/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1339998] Re: [Dell Latitude 12 Rugged Extreme 7204] Microphone mute key does not work
Po-Hsu Lin, the issue you are reporting is an upstream one. Could you please report this problem through the appropriate channel by following the instructions _verbatim_ at https://wiki.ubuntu.com/Bugs/Upstream/kernel ? Please provide a direct URL to your e-mail to the mailing list once you have made it so that it may be tracked. Thank you for your understanding. ** Changed in: linux (Ubuntu) Status: Confirmed = Triaged -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1339998 Title: [Dell Latitude 12 Rugged Extreme 7204] Microphone mute key does not work Status in HWE Next Project: New Status in “linux” package in Ubuntu: Triaged Bug description: CID: 201402-14663 Dell Latitude 12 Rugged Extreme The microphone mute key does not work on this system, so as its LED Steps: 1. Install 14.04 + update (3.13.0-30), boot to desktop 2. Try to mute the microphone with the hotkey (fn+F4) Expected results: * Mic mute key should work, its LED should be lit and the Mute option for input device should be ticked after you press the mic mute key. Actual result: * Nothing happened. Debugging information: ubuntu@201402-14663:~$ sudo showkey -k kb mode was ?UNKNOWN? [ if you are trying this under X, it might not work since the X server is also reading /dev/console ] press any key (program terminates 10s after last keypress)... keycode 28 release keycode 248 press keycode 248 release keycode 248 press keycode 248 release keycode 248 press keycode 248 release keycode 29 press ^Ccaught signal 2, cleaning up... xev cannot detect any microphone mute key event ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-30-generic 3.13.0-30.55 ProcVersionSignature: Ubuntu 3.13.0-30.55-generic 3.13.11.2 Uname: Linux 3.13.0-30-generic x86_64 ApportVersion: 2.14.1-0ubuntu3.2 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC1: ubuntu 1501 F pulseaudio /dev/snd/controlC0: ubuntu 1501 F pulseaudio CRDA: country TW: (2402 - 2472 @ 40), (3, 27) (5270 - 5330 @ 40), (3, 17), DFS (5735 - 5815 @ 40), (3, 30) CurrentDesktop: Unity Date: Wed Jul 9 23:57:11 2014 HibernationDevice: RESUME=UUID=b68f02ad-f5e4-4eb9-b88d-e85f60666734 InstallationDate: Installed on 2014-07-10 (0 days ago) InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Release amd64 (20140417) MachineType: Dell Inc. Latitude 12 Rugged Extreme (7204) ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-30-generic.efi.signed root=UUID=bdd00fe9-0df9-4b71-92c5-5f94c533f725 ro quiet splash vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-3.13.0-30-generic N/A linux-backports-modules-3.13.0-30-generic N/A linux-firmware 1.127.4 SourcePackage: linux UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 05/12/2014 dmi.bios.vendor: Dell Inc. dmi.bios.version: A00 dmi.board.name: 0TH1GJ dmi.board.vendor: Dell Inc. dmi.board.version: X02 dmi.chassis.type: 9 dmi.chassis.vendor: Dell Inc. dmi.modalias: dmi:bvnDellInc.:bvrA00:bd05/12/2014:svnDellInc.:pnLatitude12RuggedExtreme(7204):pvr01:rvnDellInc.:rn0TH1GJ:rvrX02:cvnDellInc.:ct9:cvr: dmi.product.name: Latitude 12 Rugged Extreme (7204) dmi.product.version: 01 dmi.sys.vendor: Dell Inc. To manage notifications about this bug go to: https://bugs.launchpad.net/hwe-next/+bug/1339998/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1328973] Re: GSO segmentation in zero-copy mode is broken
Verified by both me and Victor Tapia (vtapia) - with 3.11.0-26.44~precise1 kernel the MS HCK Offload LSO test passes. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1328973 Title: GSO segmentation in zero-copy mode is broken Status in “linux” package in Ubuntu: Fix Released Bug description: [SRU Justification] [Setup] - 2 or more QEMU Guest VMs sharing the the same host - the Guests are communicating using virtio-net-pci devices - vhost-net is enabled [Explanation] If one Guest VM sends GSO packets to another while GRO is disabled for receiver, so these packets are segmented by net/core. In this case, if zero-copy is enabled in vhost-net, the GSO packets TX completion is reported to userspace as before the TX is actually done. The vhost-net's zero-copy mechanism is enabled by default since v3.8-rc1 (f9611c43). [Impact] Incorrect/junk data sent in case the transmitting Guest OS re-uses/frees the TX buffer immediately upon TX completion. [Test Case] Windows 2008R2 Guest VMs running MS HCK Offload LSO test. NOTE1: GRO is always disabled in this case because it's not supported by Windows Guest virtio-net-pci drivers. NOTE2: MS HCK re-uses the GSO (LSO) buffers, so it reproduces the issue every time. [Note] This bug has been fixed in v3.14-rc7 by 1fd819ec (https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/commit/?id=1fd819ecb90cc9b822cd84d3056ddba315d3340f). The fix actually disables zero copy for this case since it forces unconditional fragments copying, but it resolves the issue mentioned. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1328973/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1331251] Re: [Dell Studio 1558] kernel is missing support for i8k module
@jesus Do # sudo service i8kmon stop That will allow you to regain control of the fans with i8kfan. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1331251 Title: [Dell Studio 1558] kernel is missing support for i8k module Status in “linux” package in Ubuntu: In Progress Bug description: On previous versions of Ubuntu, I could use i8kfan to control the fans on my laptop. I am usually up to compiling lp:inkscape , and when my fan speed decreases while compiling, that is a problem. A big problem, in fact. Now, on 14.04 with kernel 3.13.0-29-generic, I can no longer use anything from the package belonging to the branch lp:i8kutils, instead receiving this error message: ~# i8kfan 2 2 can't open /proc/i8k: No such file or directory Manually inserting the module also returns an error, to make it seem such as that the kernel was not compiled with i8k support. ~# modprobe i8k modprobe: ERROR: could not insert 'i8k': No such device ~# insmod /lib/modules/3.13.0-29-generic/kernel/drivers/char/i8k.ko insmod: ERROR: could not insert module /lib/modules/3.13.0-29-generic/kernel/drivers/char/i8k.ko: No such device I also tested this with archived kernel versions on the same device: - 3.0.0-12-generic - 3.2.0-60-generic - 3.13.0-24-generic - 3.13.0-27-generic - 3.13.0-29-generic (default) I could not regain control of i8k on any of these kernels running Ubuntu 14.04. Related bug #1324372 [Dell XPS 15 (L502X)] i8k kernel module crashes system Upstream kernel (3.15.0-031500rc7-generic) does not truly fix the issue either: while I can control the fan, it appears as though the kernel is not effectively blocking the SMM BIOS control mechanisms from regaining control in about 5 seconds. To put it more simply: running i8kfan to control the fans works — for 5 seconds. Then the fans turn off completely again. Not good for a machine that is at a severe overheating risk. There is no way to keep the fans on, even during intensive CPU usage. Reaching its maximum operating temperature, the machine shuts down to avoid serious damage to the processor. ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-29-generic 3.13.0-29.53 ProcVersionSignature: Ubuntu 3.13.0-29.53-generic 3.13.11.2 Uname: Linux 3.13.0-29-generic x86_64 ApportVersion: 2.14.1-0ubuntu3.2 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: liam 1661 F pulseaudio CurrentDesktop: GNOME Date: Tue Jun 17 20:07:39 2014 HibernationDevice: RESUME=UUID=c869f245-8053-4b24-ac59-317cdddc1f67 InstallationDate: Installed on 2014-04-21 (57 days ago) InstallationMedia: Ubuntu-GNOME 14.04 LTS Trusty Tahr - Release amd64 (20140416.2) Lsusb: Bus 002 Device 002: ID 8087:0020 Intel Corp. Integrated Rate Matching Hub Bus 002 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub Bus 001 Device 003: ID 0c45:6416 Microdia Bus 001 Device 002: ID 8087:0020 Intel Corp. Integrated Rate Matching Hub Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub MachineType: Dell Inc. Studio 1558 ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-29-generic root=UUID=61428a05-4276-43bc-acc1-88079fc166b3 ro quiet splash vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-3.13.0-29-generic N/A linux-backports-modules-3.13.0-29-generic N/A linux-firmware 1.127.2 RfKill: 0: phy0: Wireless LAN Soft blocked: no Hard blocked: no SourcePackage: linux UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 03/30/2011 dmi.bios.vendor: Dell Inc. dmi.bios.version: A12 dmi.board.name: 0G939P dmi.board.vendor: Dell Inc. dmi.board.version: A12 dmi.chassis.type: 8 dmi.chassis.vendor: Dell Inc. dmi.chassis.version: A12 dmi.modalias: dmi:bvnDellInc.:bvrA12:bd03/30/2011:svnDellInc.:pnStudio1558:pvrA12:rvnDellInc.:rn0G939P:rvrA12:cvnDellInc.:ct8:cvrA12: dmi.product.name: Studio 1558 dmi.product.version: A12 dmi.sys.vendor: Dell Inc. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1331251/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1317979] Re: 8086:0162 [System76 Sable Complete] backlight stops working after suspend
Same results. ** Attachment added: cat /proc/acpi/wakeup wakeup https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1317979/+attachment/4153949/+files/wakeup-3.16.0-031600rc5-generic -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1317979 Title: 8086:0162 [System76 Sable Complete] backlight stops working after suspend Status in “linux” package in Ubuntu: Incomplete Bug description: Add debug information from kernel debug inform from https://wiki.ubuntu.com/Kernel/Debugging/Backlight ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-24-generic 3.13.0-24.47 ProcVersionSignature: Ubuntu 3.13.0-24.47-generic 3.13.9 Uname: Linux 3.13.0-24-generic x86_64 ApportVersion: 2.14.1-0ubuntu3 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: traxtopel 3077 F pulseaudio /dev/snd/controlC1: traxtopel 3077 F pulseaudio CurrentDesktop: Unity Date: Fri May 9 18:29:41 2014 HibernationDevice: RESUME=UUID=de5a6c32-5d89-4cb3-aee1-a8b32c416a1d InstallationDate: Installed on 2014-04-04 (35 days ago) InstallationMedia: Ubuntu 13.10 Saucy Salamander - Release amd64 (20131016.1) MachineType: System76, Inc. Sable Complete ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-24-generic root=UUID=27287be2-654a-4c7a-9c5b-cc37df0adc0a ro quiet splash acpi_backlight=vendor vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-3.13.0-24-generic N/A linux-backports-modules-3.13.0-24-generic N/A linux-firmware 1.127 SourcePackage: linux StagingDrivers: keucr UpgradeStatus: Upgraded to trusty on 2014-04-18 (21 days ago) dmi.bios.date: 10/09/2013 dmi.bios.vendor: Intel Corp. dmi.bios.version: AGH6120H.86A.0023.2013.1009.1142 dmi.board.asset.tag: To be filled by O.E.M. dmi.board.name: DH61AGL dmi.board.vendor: Intel Corporation dmi.board.version: G71256-202 dmi.chassis.type: 3 dmi.chassis.vendor: System76, Inc. dmi.chassis.version: sabc1 dmi.modalias: dmi:bvnIntelCorp.:bvrAGH6120H.86A.0023.2013.1009.1142:bd10/09/2013:svnSystem76,Inc.:pnSableComplete:pvrsabc1:rvnIntelCorporation:rnDH61AGL:rvrG71256-202:cvnSystem76,Inc.:ct3:cvrsabc1: dmi.product.name: Sable Complete dmi.product.version: sabc1 dmi.sys.vendor: System76, Inc. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1317979/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1317979] Re: 8086:0162 [System76 Sable Complete] backlight stops working after suspend
** Attachment added: dmesg-3.16.0-031600rc5-generic.txt https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1317979/+attachment/4153950/+files/dmesg-3.16.0-031600rc5-generic.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1317979 Title: 8086:0162 [System76 Sable Complete] backlight stops working after suspend Status in “linux” package in Ubuntu: Incomplete Bug description: Add debug information from kernel debug inform from https://wiki.ubuntu.com/Kernel/Debugging/Backlight ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-24-generic 3.13.0-24.47 ProcVersionSignature: Ubuntu 3.13.0-24.47-generic 3.13.9 Uname: Linux 3.13.0-24-generic x86_64 ApportVersion: 2.14.1-0ubuntu3 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: traxtopel 3077 F pulseaudio /dev/snd/controlC1: traxtopel 3077 F pulseaudio CurrentDesktop: Unity Date: Fri May 9 18:29:41 2014 HibernationDevice: RESUME=UUID=de5a6c32-5d89-4cb3-aee1-a8b32c416a1d InstallationDate: Installed on 2014-04-04 (35 days ago) InstallationMedia: Ubuntu 13.10 Saucy Salamander - Release amd64 (20131016.1) MachineType: System76, Inc. Sable Complete ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-24-generic root=UUID=27287be2-654a-4c7a-9c5b-cc37df0adc0a ro quiet splash acpi_backlight=vendor vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-3.13.0-24-generic N/A linux-backports-modules-3.13.0-24-generic N/A linux-firmware 1.127 SourcePackage: linux StagingDrivers: keucr UpgradeStatus: Upgraded to trusty on 2014-04-18 (21 days ago) dmi.bios.date: 10/09/2013 dmi.bios.vendor: Intel Corp. dmi.bios.version: AGH6120H.86A.0023.2013.1009.1142 dmi.board.asset.tag: To be filled by O.E.M. dmi.board.name: DH61AGL dmi.board.vendor: Intel Corporation dmi.board.version: G71256-202 dmi.chassis.type: 3 dmi.chassis.vendor: System76, Inc. dmi.chassis.version: sabc1 dmi.modalias: dmi:bvnIntelCorp.:bvrAGH6120H.86A.0023.2013.1009.1142:bd10/09/2013:svnSystem76,Inc.:pnSableComplete:pvrsabc1:rvnIntelCorporation:rnDH61AGL:rvrG71256-202:cvnSystem76,Inc.:ct3:cvrsabc1: dmi.product.name: Sable Complete dmi.product.version: sabc1 dmi.sys.vendor: System76, Inc. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1317979/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1317979] Re: 8086:0162 [System76 Sable Complete] backlight stops working after suspend
dmesg dmesg.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1317979 Title: 8086:0162 [System76 Sable Complete] backlight stops working after suspend Status in “linux” package in Ubuntu: Incomplete Bug description: Add debug information from kernel debug inform from https://wiki.ubuntu.com/Kernel/Debugging/Backlight ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-24-generic 3.13.0-24.47 ProcVersionSignature: Ubuntu 3.13.0-24.47-generic 3.13.9 Uname: Linux 3.13.0-24-generic x86_64 ApportVersion: 2.14.1-0ubuntu3 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: traxtopel 3077 F pulseaudio /dev/snd/controlC1: traxtopel 3077 F pulseaudio CurrentDesktop: Unity Date: Fri May 9 18:29:41 2014 HibernationDevice: RESUME=UUID=de5a6c32-5d89-4cb3-aee1-a8b32c416a1d InstallationDate: Installed on 2014-04-04 (35 days ago) InstallationMedia: Ubuntu 13.10 Saucy Salamander - Release amd64 (20131016.1) MachineType: System76, Inc. Sable Complete ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-24-generic root=UUID=27287be2-654a-4c7a-9c5b-cc37df0adc0a ro quiet splash acpi_backlight=vendor vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-3.13.0-24-generic N/A linux-backports-modules-3.13.0-24-generic N/A linux-firmware 1.127 SourcePackage: linux StagingDrivers: keucr UpgradeStatus: Upgraded to trusty on 2014-04-18 (21 days ago) dmi.bios.date: 10/09/2013 dmi.bios.vendor: Intel Corp. dmi.bios.version: AGH6120H.86A.0023.2013.1009.1142 dmi.board.asset.tag: To be filled by O.E.M. dmi.board.name: DH61AGL dmi.board.vendor: Intel Corporation dmi.board.version: G71256-202 dmi.chassis.type: 3 dmi.chassis.vendor: System76, Inc. dmi.chassis.version: sabc1 dmi.modalias: dmi:bvnIntelCorp.:bvrAGH6120H.86A.0023.2013.1009.1142:bd10/09/2013:svnSystem76,Inc.:pnSableComplete:pvrsabc1:rvnIntelCorporation:rnDH61AGL:rvrG71256-202:cvnSystem76,Inc.:ct3:cvrsabc1: dmi.product.name: Sable Complete dmi.product.version: sabc1 dmi.sys.vendor: System76, Inc. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1317979/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1342717] [NEW] package linux-image-3.16.0-3-generic (not installed) failed to install/upgrade: subprocess new pre-installation script returned error exit status 128
Public bug reported: System failure while running Software Updater. ProblemType: Package DistroRelease: Ubuntu 14.10 Package: linux-image-3.16.0-3-generic (not installed) ProcVersionSignature: Ubuntu 3.15.0-6.11-generic 3.15.0 Uname: Linux 3.15.0-6-generic x86_64 ApportVersion: 2.14.4-0ubuntu2 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC1: cliff 2113 F pulseaudio /dev/snd/controlC0: cliff 2113 F pulseaudio Date: Wed Jul 16 09:08:06 2014 DuplicateSignature: package:linux-image-3.16.0-3-generic:(not installed):subprocess new pre-installation script returned error exit status 128 ErrorMessage: subprocess new pre-installation script returned error exit status 128 HibernationDevice: RESUME=UUID=cc23d289-9aa8-4b46-a128-b1634ce01751 InstallationDate: Installed on 2014-06-28 (17 days ago) InstallationMedia: Ubuntu-GNOME 14.10 Utopic Unicorn - Alpha amd64 (20140624) IwConfig: eth0 no wireless extensions. lono wireless extensions. MachineType: Si G41M-P33 ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.15.0-6-generic root=UUID=76eac418-9e1e-41d6-974c-43e5429fe506 ro init=/lib/systemd/systemd PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No PulseAudio daemon running, or not running as session daemon. RelatedPackageVersions: grub-pc 2.02~beta2-10 RfKill: SourcePackage: linux Title: package linux-image-3.16.0-3-generic (not installed) failed to install/upgrade: subprocess new pre-installation script returned error exit status 128 UpgradeStatus: No upgrade log present (probably fresh install) WifiSyslog: dmi.bios.date: 01/05/2010 dmi.bios.vendor: American Megatrends Inc. dmi.bios.version: V7.7 dmi.board.asset.tag: To Be Filled By O.E.M. dmi.board.name: G41M-P33 (MS-7592) dmi.board.vendor: MSI dmi.board.version: 3.0 dmi.chassis.asset.tag: To Be Filled By O.E.M. dmi.chassis.type: 3 dmi.chassis.vendor: MSI dmi.chassis.version: 3.0 dmi.modalias: dmi:bvnAmericanMegatrendsInc.:bvrV7.7:bd01/05/2010:svnSi:pnG41M-P33:pvr3.0:rvnMSI:rnG41M-P33(MS-7592):rvr3.0:cvnMSI:ct3:cvr3.0: dmi.product.name: G41M-P33 dmi.product.version: 3.0 dmi.sys.vendor: Si ** Affects: linux (Ubuntu) Importance: Undecided Status: New ** Tags: amd64 apport-package utopic -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1342717 Title: package linux-image-3.16.0-3-generic (not installed) failed to install/upgrade: subprocess new pre-installation script returned error exit status 128 Status in “linux” package in Ubuntu: New Bug description: System failure while running Software Updater. ProblemType: Package DistroRelease: Ubuntu 14.10 Package: linux-image-3.16.0-3-generic (not installed) ProcVersionSignature: Ubuntu 3.15.0-6.11-generic 3.15.0 Uname: Linux 3.15.0-6-generic x86_64 ApportVersion: 2.14.4-0ubuntu2 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC1: cliff 2113 F pulseaudio /dev/snd/controlC0: cliff 2113 F pulseaudio Date: Wed Jul 16 09:08:06 2014 DuplicateSignature: package:linux-image-3.16.0-3-generic:(not installed):subprocess new pre-installation script returned error exit status 128 ErrorMessage: subprocess new pre-installation script returned error exit status 128 HibernationDevice: RESUME=UUID=cc23d289-9aa8-4b46-a128-b1634ce01751 InstallationDate: Installed on 2014-06-28 (17 days ago) InstallationMedia: Ubuntu-GNOME 14.10 Utopic Unicorn - Alpha amd64 (20140624) IwConfig: eth0 no wireless extensions. lono wireless extensions. MachineType: Si G41M-P33 ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.15.0-6-generic root=UUID=76eac418-9e1e-41d6-974c-43e5429fe506 ro init=/lib/systemd/systemd PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No PulseAudio daemon running, or not running as session daemon. RelatedPackageVersions: grub-pc 2.02~beta2-10 RfKill: SourcePackage: linux Title: package linux-image-3.16.0-3-generic (not installed) failed to install/upgrade: subprocess new pre-installation script returned error exit status 128 UpgradeStatus: No upgrade log present (probably fresh install) WifiSyslog: dmi.bios.date: 01/05/2010 dmi.bios.vendor: American Megatrends Inc. dmi.bios.version: V7.7 dmi.board.asset.tag: To Be Filled By O.E.M. dmi.board.name: G41M-P33 (MS-7592) dmi.board.vendor: MSI dmi.board.version: 3.0 dmi.chassis.asset.tag: To Be Filled By O.E.M. dmi.chassis.type: 3 dmi.chassis.vendor: MSI dmi.chassis.version: 3.0 dmi.modalias: dmi:bvnAmericanMegatrendsInc.:bvrV7.7:bd01/05/2010:svnSi:pnG41M-P33:pvr3.0:rvnMSI:rnG41M-P33(MS-7592):rvr3.0:cvnMSI:ct3:cvr3.0: dmi.product.name: G41M-P33 dmi.product.version: 3.0 dmi.sys.vendor: Si To manage
[Kernel-packages] [Bug 1342717] Re: package linux-image-3.16.0-3-generic (not installed) failed to install/upgrade: subprocess new pre-installation script returned error exit status 128
** Tags removed: need-duplicate-check -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1342717 Title: package linux-image-3.16.0-3-generic (not installed) failed to install/upgrade: subprocess new pre-installation script returned error exit status 128 Status in “linux” package in Ubuntu: New Bug description: System failure while running Software Updater. ProblemType: Package DistroRelease: Ubuntu 14.10 Package: linux-image-3.16.0-3-generic (not installed) ProcVersionSignature: Ubuntu 3.15.0-6.11-generic 3.15.0 Uname: Linux 3.15.0-6-generic x86_64 ApportVersion: 2.14.4-0ubuntu2 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC1: cliff 2113 F pulseaudio /dev/snd/controlC0: cliff 2113 F pulseaudio Date: Wed Jul 16 09:08:06 2014 DuplicateSignature: package:linux-image-3.16.0-3-generic:(not installed):subprocess new pre-installation script returned error exit status 128 ErrorMessage: subprocess new pre-installation script returned error exit status 128 HibernationDevice: RESUME=UUID=cc23d289-9aa8-4b46-a128-b1634ce01751 InstallationDate: Installed on 2014-06-28 (17 days ago) InstallationMedia: Ubuntu-GNOME 14.10 Utopic Unicorn - Alpha amd64 (20140624) IwConfig: eth0 no wireless extensions. lono wireless extensions. MachineType: Si G41M-P33 ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.15.0-6-generic root=UUID=76eac418-9e1e-41d6-974c-43e5429fe506 ro init=/lib/systemd/systemd PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No PulseAudio daemon running, or not running as session daemon. RelatedPackageVersions: grub-pc 2.02~beta2-10 RfKill: SourcePackage: linux Title: package linux-image-3.16.0-3-generic (not installed) failed to install/upgrade: subprocess new pre-installation script returned error exit status 128 UpgradeStatus: No upgrade log present (probably fresh install) WifiSyslog: dmi.bios.date: 01/05/2010 dmi.bios.vendor: American Megatrends Inc. dmi.bios.version: V7.7 dmi.board.asset.tag: To Be Filled By O.E.M. dmi.board.name: G41M-P33 (MS-7592) dmi.board.vendor: MSI dmi.board.version: 3.0 dmi.chassis.asset.tag: To Be Filled By O.E.M. dmi.chassis.type: 3 dmi.chassis.vendor: MSI dmi.chassis.version: 3.0 dmi.modalias: dmi:bvnAmericanMegatrendsInc.:bvrV7.7:bd01/05/2010:svnSi:pnG41M-P33:pvr3.0:rvnMSI:rnG41M-P33(MS-7592):rvr3.0:cvnMSI:ct3:cvr3.0: dmi.product.name: G41M-P33 dmi.product.version: 3.0 dmi.sys.vendor: Si To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1342717/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1342717] Status changed to Confirmed
This change was made by a bot. ** Changed in: linux (Ubuntu) Status: New = Confirmed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1342717 Title: package linux-image-3.16.0-3-generic (not installed) failed to install/upgrade: subprocess new pre-installation script returned error exit status 128 Status in “linux” package in Ubuntu: Confirmed Bug description: System failure while running Software Updater. ProblemType: Package DistroRelease: Ubuntu 14.10 Package: linux-image-3.16.0-3-generic (not installed) ProcVersionSignature: Ubuntu 3.15.0-6.11-generic 3.15.0 Uname: Linux 3.15.0-6-generic x86_64 ApportVersion: 2.14.4-0ubuntu2 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC1: cliff 2113 F pulseaudio /dev/snd/controlC0: cliff 2113 F pulseaudio Date: Wed Jul 16 09:08:06 2014 DuplicateSignature: package:linux-image-3.16.0-3-generic:(not installed):subprocess new pre-installation script returned error exit status 128 ErrorMessage: subprocess new pre-installation script returned error exit status 128 HibernationDevice: RESUME=UUID=cc23d289-9aa8-4b46-a128-b1634ce01751 InstallationDate: Installed on 2014-06-28 (17 days ago) InstallationMedia: Ubuntu-GNOME 14.10 Utopic Unicorn - Alpha amd64 (20140624) IwConfig: eth0 no wireless extensions. lono wireless extensions. MachineType: Si G41M-P33 ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.15.0-6-generic root=UUID=76eac418-9e1e-41d6-974c-43e5429fe506 ro init=/lib/systemd/systemd PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No PulseAudio daemon running, or not running as session daemon. RelatedPackageVersions: grub-pc 2.02~beta2-10 RfKill: SourcePackage: linux Title: package linux-image-3.16.0-3-generic (not installed) failed to install/upgrade: subprocess new pre-installation script returned error exit status 128 UpgradeStatus: No upgrade log present (probably fresh install) WifiSyslog: dmi.bios.date: 01/05/2010 dmi.bios.vendor: American Megatrends Inc. dmi.bios.version: V7.7 dmi.board.asset.tag: To Be Filled By O.E.M. dmi.board.name: G41M-P33 (MS-7592) dmi.board.vendor: MSI dmi.board.version: 3.0 dmi.chassis.asset.tag: To Be Filled By O.E.M. dmi.chassis.type: 3 dmi.chassis.vendor: MSI dmi.chassis.version: 3.0 dmi.modalias: dmi:bvnAmericanMegatrendsInc.:bvrV7.7:bd01/05/2010:svnSi:pnG41M-P33:pvr3.0:rvnMSI:rnG41M-P33(MS-7592):rvr3.0:cvnMSI:ct3:cvr3.0: dmi.product.name: G41M-P33 dmi.product.version: 3.0 dmi.sys.vendor: Si To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1342717/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1307198] Re: Bluetooth shuts down contact with mouse
Closing as Invalid since the issue is reportedly solve, but we don't know why/how the other mouse does not work. Sorry for the delay in responding. ** Changed in: bluez (Ubuntu) Status: New = Invalid -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to bluez in Ubuntu. https://bugs.launchpad.net/bugs/1307198 Title: Bluetooth shuts down contact with mouse Status in “bluez” package in Ubuntu: Invalid Status in “unity” package in Ubuntu: Invalid Bug description: My Dell Vostro 3555 purchased in Sept 2011 is equipped with Bluetooth. I used a bluetooth mouse from then on and never lost contact between computer and mouse, not even when changing the battery in the mouse. Since installing 1404LTS Beta 2 the connection is shut down when the computer is shut down and sometimes when the computer goes into hibernation. This results in having to manually goto the Bluetooth GUI and the mouse and force the connection. The Bluetooth GUI has three on/off buttons, bluetooth , visibility on Ubuntu-0 and mouse. The mouse button is off wenever I start the system. This did not happen in any Ubuntu version of Linux I have had on this computer, other than in 14.04LTS. This is a nuisance, and prevents me from demonstrating how good Ubuntu Linux really is. Having to sit in a demo and manually pressing a button on the mouse until the on/off button turns on immediately turns off any interest a newbie might have. A quick fix would be appreciated. At this point I have no idea od what corroborating info I need to provide, but will send anything asked for. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/bluez/+bug/1307198/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1342153] Re: Enable CONFIG_GPIO_SYSFS option in the Kernel
** Also affects: linux (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Utopic) Importance: Undecided Status: Confirmed ** Changed in: linux (Ubuntu Trusty) Status: New = In Progress ** Changed in: linux (Ubuntu Trusty) Assignee: (unassigned) = Kent Baxley (kentb) ** Changed in: linux (Ubuntu Utopic) Status: Confirmed = In Progress ** Changed in: linux (Ubuntu Utopic) Assignee: (unassigned) = Tim Gardner (timg-tpi) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1342153 Title: Enable CONFIG_GPIO_SYSFS option in the Kernel Status in “linux” package in Ubuntu: In Progress Status in “linux” source package in Trusty: In Progress Status in “linux” source package in Utopic: In Progress Bug description: It appears we don't set the CONFIG_GPIO_SYSFS on Trusty (or Utopic?) for x86. By enabled, I mean: CONFIG_GPIO_SYSFS=y This option (along with a few gpio devices) is needed to enable programming of such things as the I2C Mux through via the CPLDs on some OEM 'whitebox' switches that will leverage Software Defined Networking. This option can, of course, be set and users can build their own kernels, but, if at all possible they'd like to keep this as stock as they can. config GPIO_SYSFS bool /sys/class/gpio/... (sysfs interface) depends on SYSFS help Say Y here to add a sysfs interface for GPIOs. This is mostly useful to work around omissions in a system's kernel support. Those are common in custom and semicustom hardware assembled using standard kernels with a minimum of custom patches. In those cases, userspace code may import a given GPIO from the kernel, if no kernel driver requested it. Kernel drivers may also request that a particular GPIO be exported to userspace; this can be useful when debugging. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1342153/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1342153] Re: Enable CONFIG_GPIO_SYSFS option in the Kernel
** Changed in: linux (Ubuntu Trusty) Status: In Progress = Fix Committed ** Changed in: linux (Ubuntu Utopic) Status: In Progress = Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1342153 Title: Enable CONFIG_GPIO_SYSFS option in the Kernel Status in “linux” package in Ubuntu: Fix Committed Status in “linux” source package in Trusty: Fix Committed Status in “linux” source package in Utopic: Fix Committed Bug description: It appears we don't set the CONFIG_GPIO_SYSFS on Trusty (or Utopic?) for x86. By enabled, I mean: CONFIG_GPIO_SYSFS=y This option (along with a few gpio devices) is needed to enable programming of such things as the I2C Mux through via the CPLDs on some OEM 'whitebox' switches that will leverage Software Defined Networking. This option can, of course, be set and users can build their own kernels, but, if at all possible they'd like to keep this as stock as they can. config GPIO_SYSFS bool /sys/class/gpio/... (sysfs interface) depends on SYSFS help Say Y here to add a sysfs interface for GPIOs. This is mostly useful to work around omissions in a system's kernel support. Those are common in custom and semicustom hardware assembled using standard kernels with a minimum of custom patches. In those cases, userspace code may import a given GPIO from the kernel, if no kernel driver requested it. Kernel drivers may also request that a particular GPIO be exported to userspace; this can be useful when debugging. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1342153/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1327563] Re: Long delay when mounting NFS shares
To add a bit of debugging I did (using two VMs): - There server side kernel version does not matter (tested trusty and utopic) - A client with a 3.13 kernel will have the delay, while the 3.16 kernel is ok Enabling NFS debugging on both clients (as root echo 32767 /proc/sys/sunrpc/nfs_debug) shows an interesting fact: 3.13 client: 7581.776148] NFS: nfs4_discover_server_trunking: testing 'lam-utopic6401' 7581.776154] NFS call setclientid auth=RPCSEC_GSS, 'Linux NFSv4.0 192.168.2.19 7596.776086] RPC: AUTH_GSS upcall timed out. 7596.776086] Please check user daemon is running. 7596.776110] NFS reply setclientid: -13 7596.776121] NFS call setclientid auth=RPCSEC_GSS, 'Linux NFSv4.0 192.168.2.19 7597.024109] NFS reply setclientid: -13 7597.024766] NFS call setclientid auth=UNIX, 'Linux NFSv4.0 192.168.2.192/192. 7597.025506] NFS reply setclientid: 0 7597.025512] NFS call setclientid_confirm auth=UNIX, (client ID fb69c65304 7597.026068] NFS reply setclientid_confirm: 0 3.16 client: 2137.866775] NFS: nfs4_discover_server_trunking: testing 'lam-utopic6401' 2137.866783] NFS call setclientid auth=UNIX, 'Linux NFSv4.0 192.168.2.120/192. 2137.867420] NFS reply setclientid: 0 2137.867426] NFS call setclientid_confirm auth=UNIX, (client ID fb69c65305 2137.867727] NFS reply setclientid_confirm: 0 So the newer kernel seems to skip the other authentication methods. And of those two AUTH_GSS is causing the delay because it times out. Unfortunately I did not spot any commits in between 3.13 and now that would immediately sound like a good candidate for fixing this. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1327563 Title: Long delay when mounting NFS shares Status in “linux” package in Ubuntu: Confirmed Bug description: Summary: After upgrading the kernel on Ubuntu 14.04 to 3.13.0-29-generic I found that it can take a considerably longer amount of time to mount NFS shares. How to reproduce: 1. Install Ubuntu 14.04 on two machines. A minimal server install should be fine. One will act as a server, the other as a client. 2. Upgrade the kernel on the client machine to at least 3.13.0-27-generic. 3. Install the nfs-kernel-server package on the server. 4. Add a directory to /etc/exports and run service nfs-kernel-server start. 5. Install the nfs-common package on the client. 6. Attempt to mount the shared directory on the client. Expected result: The shared directory should be mounted on the client more or less immediately. Actual result: The mount command hangs and eventually completes. In this test case it takes 16 seconds consistently. On a production machine where the problem was first discovered the time is considerably longer and essentially makes it impossible to mount NFS shares. Regression: I have been able to reproduce the problem on clients running Linux 3.13.0-27-generic and later. The problem is not reproducible on clients running Linux 3.13.0-24-generic. The problem is reproducible no matter which kernel version is used on the server. Tested client kernel versions: Linux 3.13.0-29-generic #53-Ubuntu FAIL Linux 3.13.0-27-generic #50-Ubuntu FAIL Linux 3.13.0-24-generic #47-Ubuntu OK Tested server kernel versions: Linux 3.13.0-29-generic #53-Ubuntu OK Linux 3.13.0-27-generic #50-Ubuntu OK Linux 3.13.0-24-generic #47-Ubuntu OK lsb_release -rd: Description: Ubuntu 14.04 LTS Release: 14.04 apt-cache policy linux-image-generic: linux-image-generic: Installed: (none) Candidate: 3.13.0.29.35 Version table: 3.13.0.29.35 0 500 http://se.archive.ubuntu.com/ubuntu/ trusty-updates/main amd64 Packages 500 http://security.ubuntu.com/ubuntu/ trusty-security/main amd64 Packages 3.13.0.24.28 0 500 http://se.archive.ubuntu.com/ubuntu/ trusty/main amd64 Packages ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-29-generic 3.13.0-29.53 ProcVersionSignature: Ubuntu 3.13.0-29.53-generic 3.13.11.2 Uname: Linux 3.13.0-29-generic x86_64 AlsaDevices: total 0 crw-rw 1 root audio 116, 1 Jun 7 16:26 seq crw-rw 1 root audio 116, 33 Jun 7 16:26 timer AplayDevices: Error: [Errno 2] No such file or directory: 'aplay' ApportVersion: 2.14.1-0ubuntu3.2 Architecture: amd64 ArecordDevices: Error: [Errno 2] No such file or directory: 'arecord' AudioDevicesInUse: Error: [Errno 2] No such file or directory: 'fuser' CRDA: Error: [Errno 2] No such file or directory: 'iw' Date: Sat Jun 7 16:30:02 2014 HibernationDevice: RESUME=UUID=9c13108b-d40a-4881-b563-c477ed2e6804 InstallationDate: Installed on 2014-06-07 (0 days ago) InstallationMedia: Ubuntu-Server 14.04 LTS Trusty Tahr - Release amd64 (20140416.2) IwConfig: Error: [Errno 2] No such file or directory: 'iwconfig'
[Kernel-packages] [Bug 1341543] Re: linux: 3.16.0-4.9 -proposed tracker
** Changed in: kernel-development-workflow/prepare-package Status: New = Fix Released ** Changed in: kernel-development-workflow/prepare-package Assignee: Canonical Kernel Team (canonical-kernel-team) = Tim Gardner (timg-tpi) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1341543 Title: linux: 3.16.0-4.9 -proposed tracker Status in Kernel Development Workflow: In Progress Status in Kernel Development Workflow package-testing series: New Status in Kernel Development Workflow prepare-package series: Fix Released Status in Kernel Development Workflow prepare-package-meta series: Fix Released Status in Kernel Development Workflow prepare-package-signed series: New Status in Kernel Development Workflow promote-to-release series: New Status in “linux” package in Ubuntu: New Status in “linux” source package in Utopic: New Bug description: This bug is for tracking the 3.16.0-4.9 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-Prepare-package-start:Monday, 14. July 2014 11:40 UTC kernel-phase-changed:Monday, 14. July 2014 11:40 UTC kernel-phase:Prepare To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-development-workflow/+bug/1341543/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1342776] [NEW] [3.16.0.4][nvidia 340.24] ERROR: Kernel configuration is invalid.;
Public bug reported: Installing the latest kernel, i've got: run-parts: executing /etc/kernel/postinst.d/dkms 3.16.0-4-generic /boot/vmlinuz-3.16.0-4-generic Error! Bad return status for module build on kernel: 3.16.0-4-generic (i686) Consult /var/lib/dkms/nvidia-340/340.24/build/make.log for more information. note that the real path is: /var/lib/dkms/nvidia-340/340.24/3.16.0-4-generic/i686/log/make.log note2: system booted with systemd-boot ProblemType: Bug DistroRelease: Ubuntu 14.10 Package: linux-image-3.16.0-3-generic 3.16.0-3.8 ProcVersionSignature: Ubuntu 3.16.0-3.8-generic 3.16.0-rc4 Uname: Linux 3.16.0-3-generic i686 NonfreeKernelModules: nvidia ApportVersion: 2.14.4-0ubuntu2 Architecture: i386 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC1: oem 25080 F pulseaudio /dev/snd/controlC0: oem 25080 F pulseaudio CurrentDesktop: GNOME Date: Wed Jul 16 17:03:26 2014 HibernationDevice: RESUME=UUID=0a9ca7f0-6eeb-4b21-b70f-670fa600de16 IwConfig: lono wireless extensions. eth0 no wireless extensions. eth1 no wireless extensions. Lsusb: Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub Bus 003 Device 002: ID 046d:c50e Logitech, Inc. Cordless Mouse Receiver Bus 003 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub Bus 002 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub MachineType: ASUSTEK COMPUTER INC P5W DH Deluxe ProcFB: ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.16.0-3-generic root=UUID=83f51130-24a6-4486-9284-f8d6700df293 ro recovery nomodeset RelatedPackageVersions: linux-restricted-modules-3.16.0-3-generic N/A linux-backports-modules-3.16.0-3-generic N/A linux-firmware1.132 RfKill: SourcePackage: linux UpgradeStatus: No upgrade log present (probably fresh install) WifiSyslog: dmi.bios.date: 07/22/2010 dmi.bios.vendor: American Megatrends Inc. dmi.bios.version: 3002 dmi.board.asset.tag: To Be Filled By O.E.M. dmi.board.name: P5W DH Deluxe dmi.board.vendor: ASUSTeK Computer INC. dmi.board.version: Rev 1.xx dmi.chassis.asset.tag: Asset-1234567890 dmi.chassis.type: 3 dmi.chassis.vendor: Chassis Manufacture dmi.chassis.version: Chassis Version dmi.modalias: dmi:bvnAmericanMegatrendsInc.:bvr3002:bd07/22/2010:svnASUSTEKCOMPUTERINC:pnP5WDHDeluxe:pvrSystemVersion:rvnASUSTeKComputerINC.:rnP5WDHDeluxe:rvrRev1.xx:cvnChassisManufacture:ct3:cvrChassisVersion: dmi.product.name: P5W DH Deluxe dmi.product.version: System Version dmi.sys.vendor: ASUSTEK COMPUTER INC ** Affects: linux (Ubuntu) Importance: Undecided Status: New ** Tags: apport-bug i386 third-party-packages utopic ** Attachment added: make.log https://bugs.launchpad.net/bugs/1342776/+attachment/4154092/+files/make.log ** Description changed: Installing the latest kernel, i've got: run-parts: executing /etc/kernel/postinst.d/dkms 3.16.0-4-generic /boot/vmlinuz-3.16.0-4-generic Error! Bad return status for module build on kernel: 3.16.0-4-generic (i686) Consult /var/lib/dkms/nvidia-340/340.24/build/make.log for more information. note that the real path is: /var/lib/dkms/nvidia-340/340.24/3.16.0-4-generic/i686/log/make.log + + note2: system booted with systemd-boot ProblemType: Bug DistroRelease: Ubuntu 14.10 Package: linux-image-3.16.0-3-generic 3.16.0-3.8 ProcVersionSignature: Ubuntu 3.16.0-3.8-generic 3.16.0-rc4 Uname: Linux 3.16.0-3-generic i686 NonfreeKernelModules: nvidia ApportVersion: 2.14.4-0ubuntu2 Architecture: i386 AudioDevicesInUse: - USERPID ACCESS COMMAND - /dev/snd/controlC1: oem 25080 F pulseaudio - /dev/snd/controlC0: oem 25080 F pulseaudio + USERPID ACCESS COMMAND + /dev/snd/controlC1: oem 25080 F pulseaudio + /dev/snd/controlC0: oem 25080 F pulseaudio CurrentDesktop: GNOME Date: Wed Jul 16 17:03:26 2014 HibernationDevice: RESUME=UUID=0a9ca7f0-6eeb-4b21-b70f-670fa600de16 IwConfig: - lono wireless extensions. - - eth0 no wireless extensions. - - eth1 no wireless extensions. + lono wireless extensions. + + eth0 no wireless extensions. + + eth1 no wireless extensions. Lsusb: - Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub - Bus 003 Device 002: ID 046d:c50e Logitech, Inc. Cordless Mouse Receiver - Bus 003 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub - Bus 002 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub + Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub + Bus 003 Device 002: ID 046d:c50e Logitech, Inc. Cordless Mouse Receiver + Bus 003 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub + Bus 002 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub MachineType: ASUSTEK COMPUTER INC P5W DH Deluxe ProcFB: - + ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.16.0-3-generic root=UUID=83f51130-24a6-4486-9284-f8d6700df293 ro recovery nomodeset
Re: [Kernel-packages] [Bug 1341195] Re: KVM guests getting slow by time
On 07/14/2014 05:13 PM, Serge Hallyn wrote: Since switching to saucy kernel is a good workaround, marking this as affecting the kernel. Could you try disabling KSM and see if that avoids the issue? I set KSM_ENABLED=0 in /etc/default/qemu-kvm and restarted the server. Also today after 3 weeks it started the same thing with Saucy kernel too. tamas -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1341195 Title: KVM guests getting slow by time Status in “linux” package in Ubuntu: Incomplete Status in “qemu” package in Ubuntu: Incomplete Bug description: There is a post with very similar symptoms on serverfault: http://serverfault.com/questions/609881/windows-server-2012-on-kvm-on- ubuntu-14-04-runs-well-for-a-while-and-then-slows/612084#612084 Basically all kind of KVM guests are getting slow by time, both windows or linux. The more running guests, it happens sooner. Switching back to Saucy kernel is a good workaround. ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: qemu-kvm 2.0.0+dfsg-2ubuntu1.1 ProcVersionSignature: Ubuntu 3.13.0-29.53-generic 3.13.11.2 Uname: Linux 3.13.0-29-generic x86_64 NonfreeKernelModules: zfs zunicode zavl zcommon znvpair ApportVersion: 2.14.1-0ubuntu3.2 Architecture: amd64 Date: Sat Jul 12 22:18:49 2014 SourcePackage: qemu UpgradeStatus: No upgrade log present (probably fresh install) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1341195/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1342776] Status changed to Confirmed
This change was made by a bot. ** Changed in: linux (Ubuntu) Status: New = Confirmed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1342776 Title: [3.16.0.4][nvidia 340.24] ERROR: Kernel configuration is invalid.; Status in “linux” package in Ubuntu: Confirmed Bug description: Installing the latest kernel, i've got: run-parts: executing /etc/kernel/postinst.d/dkms 3.16.0-4-generic /boot/vmlinuz-3.16.0-4-generic Error! Bad return status for module build on kernel: 3.16.0-4-generic (i686) Consult /var/lib/dkms/nvidia-340/340.24/build/make.log for more information. note that the real path is: /var/lib/dkms/nvidia-340/340.24/3.16.0-4-generic/i686/log/make.log note2: system booted with systemd-boot ProblemType: Bug DistroRelease: Ubuntu 14.10 Package: linux-image-3.16.0-3-generic 3.16.0-3.8 ProcVersionSignature: Ubuntu 3.16.0-3.8-generic 3.16.0-rc4 Uname: Linux 3.16.0-3-generic i686 NonfreeKernelModules: nvidia ApportVersion: 2.14.4-0ubuntu2 Architecture: i386 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC1: oem 25080 F pulseaudio /dev/snd/controlC0: oem 25080 F pulseaudio CurrentDesktop: GNOME Date: Wed Jul 16 17:03:26 2014 HibernationDevice: RESUME=UUID=0a9ca7f0-6eeb-4b21-b70f-670fa600de16 IwConfig: lono wireless extensions. eth0 no wireless extensions. eth1 no wireless extensions. Lsusb: Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub Bus 003 Device 002: ID 046d:c50e Logitech, Inc. Cordless Mouse Receiver Bus 003 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub Bus 002 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub MachineType: ASUSTEK COMPUTER INC P5W DH Deluxe ProcFB: ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.16.0-3-generic root=UUID=83f51130-24a6-4486-9284-f8d6700df293 ro recovery nomodeset RelatedPackageVersions: linux-restricted-modules-3.16.0-3-generic N/A linux-backports-modules-3.16.0-3-generic N/A linux-firmware1.132 RfKill: SourcePackage: linux UpgradeStatus: No upgrade log present (probably fresh install) WifiSyslog: dmi.bios.date: 07/22/2010 dmi.bios.vendor: American Megatrends Inc. dmi.bios.version: 3002 dmi.board.asset.tag: To Be Filled By O.E.M. dmi.board.name: P5W DH Deluxe dmi.board.vendor: ASUSTeK Computer INC. dmi.board.version: Rev 1.xx dmi.chassis.asset.tag: Asset-1234567890 dmi.chassis.type: 3 dmi.chassis.vendor: Chassis Manufacture dmi.chassis.version: Chassis Version dmi.modalias: dmi:bvnAmericanMegatrendsInc.:bvr3002:bd07/22/2010:svnASUSTEKCOMPUTERINC:pnP5WDHDeluxe:pvrSystemVersion:rvnASUSTeKComputerINC.:rnP5WDHDeluxe:rvrRev1.xx:cvnChassisManufacture:ct3:cvrChassisVersion: dmi.product.name: P5W DH Deluxe dmi.product.version: System Version dmi.sys.vendor: ASUSTEK COMPUTER INC To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1342776/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1318218] Re: SATA problems on MacBook Pro 11, 1?
Nils' workaround also works for me, as does setting the link_power_management_policy to medium_power. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1318218 Title: SATA problems on MacBook Pro 11,1? Status in “linux” package in Ubuntu: Confirmed Bug description: I installed Ubuntu 14.04 next to MacOS following the guide at https://help.ubuntu.com/community/MacBookPro11-1/Saucy/ Looking into dmesg, I constantlz get entries like [ 276.380934] ata1: SError: { PHYRdyChg } [ 276.380943] ata1: hard resetting link [ 277.103527] ata1: SATA link up 1.5 Gbps (SStatus 113 SControl 310) [ 277.103999] ata1.00: unexpected _GTF length (8) [ 277.104504] ata1.00: unexpected _GTF length (8) [ 277.104507] ata1.00: configured for UDMA/33 [ 277.104629] ata1: EH complete [ 277.206319] ata1: exception Emask 0x10 SAct 0x0 SErr 0x1 action 0xe frozen [ 277.206328] ata1: irq_stat 0x0040, PHY RDY changed [ 277.206333] ata1: SError: { PHYRdyChg } [ 277.206343] ata1: hard resetting link [ 277.927757] ata1: SATA link up 1.5 Gbps (SStatus 113 SControl 310) [ 277.928425] ata1.00: unexpected _GTF length (8) [ 277.929040] ata1.00: unexpected _GTF length (8) [ 277.929051] ata1.00: configured for UDMA/33 [ 277.929168] ata1: EH complete [ 278.030944] ata1: exception Emask 0x10 SAct 0x0 SErr 0x1 action 0xe frozen [ 278.030952] ata1: irq_stat 0x0040, PHY RDY changed [ 278.030957] ata1: SError: { PHYRdyChg } [ 278.030965] ata1: hard resetting link [ 278.752008] ata1: SATA link up 1.5 Gbps (SStatus 113 SControl 310) [ 278.752582] ata1.00: unexpected _GTF length (8) [ 278.753140] ata1.00: unexpected _GTF length (8) [ 278.753147] ata1.00: configured for UDMA/33 [ 278.753231] ata1: EH complete [ 278.853417] ata1: exception Emask 0x10 SAct 0x0 SErr 0x1 action 0xe frozen [ 278.853424] ata1: irq_stat 0x0040, PHY RDY changed [ 278.853427] ata1: SError: { PHYRdyChg } [ 278.853434] ata1: hard resetting link [ 279.576258] ata1: SATA link up 1.5 Gbps (SStatus 113 SControl 310) [ 279.576881] ata1.00: unexpected _GTF length (8) [ 279.577417] ata1.00: unexpected _GTF length (8) [ 279.577427] ata1.00: configured for UDMA/33 [ 279.577491] ata1: EH complete [ 279.677753] ata1: exception Emask 0x10 SAct 0x0 SErr 0x1 action 0xe frozen [ 279.677762] ata1: irq_stat 0x0040, PHY RDY changed [ 279.677767] ata1: SError: { PHYRdyChg } [ 279.66] ata1: hard resetting link [ 280.400449] ata1: SATA link up 1.5 Gbps (SStatus 113 SControl 310) [ 280.401147] ata1.00: unexpected _GTF length (8) [ 280.401722] ata1.00: unexpected _GTF length (8) [ 280.401733] ata1.00: configured for UDMA/33 [ 280.401809] ata1: EH complete [ 280.502117] ata1: exception Emask 0x10 SAct 0x0 SErr 0x1 action 0xe frozen [ 280.502127] ata1: irq_stat 0x0040, PHY RDY changed [ 280.502132] ata1: SError: { PHYRdyChg } ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-24-generic 3.13.0-24.47 ProcVersionSignature: Ubuntu 3.13.0-24.47-generic 3.13.9 Uname: Linux 3.13.0-24-generic x86_64 NonfreeKernelModules: wl ApportVersion: 2.14.1-0ubuntu3 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: markus 1663 F pulseaudio /dev/snd/controlC1: markus 1663 F pulseaudio CurrentDesktop: Unity Date: Sat May 10 19:33:44 2014 HibernationDevice: RESUME=UUID=c71381d2-e2f3-4c96-94ea-57b8986afd08 InstallationDate: Installed on 2014-05-09 (0 days ago) InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Release amd64 (20140417) MachineType: Apple Inc. MacBookPro11,1 ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-24-generic.efi.signed root=UUID=7584bc70-893a-4291-a1cb-4680f5e09d22 ro libata.force=noncq quiet splash vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-3.13.0-24-generic N/A linux-backports-modules-3.13.0-24-generic N/A linux-firmware 1.127 SourcePackage: linux UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 10/29/2013 dmi.bios.vendor: Apple Inc. dmi.bios.version: MBP111.88Z.0138.B03.1310291227 dmi.board.asset.tag: Base Board Asset Tag# dmi.board.name: Mac-189A3D4F975D5FFC dmi.board.vendor: Apple Inc. dmi.board.version: MacBookPro11,1 dmi.chassis.type: 10 dmi.chassis.vendor: Apple Inc. dmi.chassis.version: Mac-189A3D4F975D5FFC dmi.modalias: dmi:bvnAppleInc.:bvrMBP111.88Z.0138.B03.1310291227:bd10/29/2013:svnAppleInc.:pnMacBookPro11,1:pvr1.0:rvnAppleInc.:rnMac-189A3D4F975D5FFC:rvrMacBookPro11,1:cvnAppleInc.:ct10:cvrMac-189A3D4F975D5FFC: dmi.product.name: MacBookPro11,1 dmi.product.version: 1.0 dmi.sys.vendor: Apple Inc. To manage notifications about this bug
[Kernel-packages] [Bug 1341543] Re: linux: 3.16.0-4.9 -proposed tracker
All builds are complete, packages in this bug are available in -proposed. ** Changed in: kernel-development-workflow/prepare-package-signed Status: New = Fix Released ** Changed in: kernel-development-workflow/prepare-package-signed Assignee: Canonical Kernel Team (canonical-kernel-team) = Tim Gardner (timg-tpi) ** Changed in: kernel-development-workflow/package-testing Status: New = Confirmed ** Changed in: kernel-development-workflow/package-testing Status: Confirmed = In Progress ** Changed in: kernel-development-workflow/package-testing Status: In Progress = Confirmed ** Description changed: This bug is for tracking the 3.16.0-4.9 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-Prepare-package-start:Monday, 14. July 2014 11:40 UTC - kernel-phase-changed:Monday, 14. July 2014 11:40 UTC - kernel-phase:Prepare + kernel-phase-changed:Wednesday, 16. July 2014 16:00 UTC + kernel-Prepare-package-end:Wednesday, 16. July 2014 16:00 UTC + kernel-Package-testing-start:Wednesday, 16. July 2014 16:00 UTC + kernel-phase:PPA Testing + ppa-package-testing-start:Wednesday, 16. July 2014 16:00 UTC -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1341543 Title: linux: 3.16.0-4.9 -proposed tracker Status in Kernel Development Workflow: In Progress Status in Kernel Development Workflow package-testing series: Confirmed Status in Kernel Development Workflow prepare-package series: Fix Released Status in Kernel Development Workflow prepare-package-meta series: Fix Released Status in Kernel Development Workflow prepare-package-signed series: Fix Released Status in Kernel Development Workflow promote-to-release series: New Status in “linux” package in Ubuntu: New Status in “linux” source package in Utopic: New Bug description: This bug is for tracking the 3.16.0-4.9 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-Prepare-package-start:Monday, 14. July 2014 11:40 UTC kernel-phase-changed:Wednesday, 16. July 2014 16:00 UTC kernel-Prepare-package-end:Wednesday, 16. July 2014 16:00 UTC kernel-Package-testing-start:Wednesday, 16. July 2014 16:00 UTC kernel-phase:PPA Testing ppa-package-testing-start:Wednesday, 16. July 2014 16:00 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-development-workflow/+bug/1341543/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1239578] Re: No wireless support for Realtek RTL8192EE [10ec:818b]
Realtek has never been good at writing clear module parameter descriptions. My current working version has the following: MODULE_PARM_DESC(swenc, Set to 1 for software crypto (default 0)\n); MODULE_PARM_DESC(ips, Set to 0 to not use link power save (default 1)\n); MODULE_PARM_DESC(swlps, Set to 1 to use SW control power save (default 0)\n); MODULE_PARM_DESC(fwlps, Set to 1 to use FW control power save (default 1)\n); MODULE_PARM_DESC(msi, Set to 1 to use MSI interrupts mode (default 1)\n); MODULE_PARM_DESC(debug, Set debug level (0-5) (default 0)); In other words, link power save is ON by default, firmware power control is also ON, and software power control is off. My test computer refuses to hibernate or suspend, thus I have not tested standby, whatever that means. In fact, in the days preceeding the closing of changes for 3.16, I was so busy trying to provide help for the Lenovo T440s users, and getting the code into the kernel that I barely had time for testing. I am afraid that someone else will need to test and debug these problems. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1239578 Title: No wireless support for Realtek RTL8192EE [10ec:818b] Status in HWE Next Project: Confirmed Status in HWE Next trusty series: Confirmed Status in “linux” package in Ubuntu: Confirmed Bug description: Open this bug to trace device driver RTL8192EE. We have seen this wireless card on some laptops, id is [10ec:818b], driver is RTL8192EE. Status: waiting for this driver being moved out of staging directory. To manage notifications about this bug go to: https://bugs.launchpad.net/hwe-next/+bug/1239578/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1309578] Re: Ubuntu 14.04 suddenly reboots when booting from Live USB AMD A8 6600k
Solution to my problem - (Thank you Rick Forberg!) Linux Mint 17 Qiana won't install - keeps rebooting. It doesn't matter if the installation medium is a flash drive or CD. Once the live version loads it immediately reboots. There isn't enough time to install it. Once I managed to actually install it after dozens of tries. The result was it would get to the login, accept my credentials then reboot before actually loading. Thankfully after reading several of the posts on this page I was able to work out a procedure to install the OS, then fix the issue for my MSI desktops. Most of the Desktops at work running Linux Mint are custom built MSI boards with the following configurations: Motherboard: MSI A78M-E45 BIOS: AMI BIOS 25.1 (2013-12-09) 25.3 (2014-03-19) APU: AMD A10-5800K (quad core) Trinity 3.8 GHz RAM: Patriot Viper DDR3 2133 (PC3 17000) 4x4GB and Motherboard: MSI FM2-A55M-E33 BIOS: E7721AMS v11.4 (2013-10-23) APU: AMD A8-5600K (quad core) 3.60GHz RAM: HyperX DDR3 1600 (PC3 12800) 2x4GB Both desktop configurations had the same problem. They were running Linux Mint 15 and 16. I have now replaced some of them with Qiana 17. Installing Linux Mint 17 on them had been a problem. Here is what I did to fix it: Once the live version started to load I kept the mouse constantly moving with one hand. With the other hand, using the keyboard, I started the installation utility and answered all the questions for the installation (I kept the mouse moving the entire time). Once the installation was finished the utility requested a restart. When the OS restarted I kept the mouse moving again, put in my login credentials and when Mint loaded I launched the terminal with ctr+alt+t. In the terminal I updated the advanced packaging tool: apt-get update apt-get upgrade (This takes quite a while, but it is important to keep the mouse moving the entire time) Then, I updated the display drivers: apt-get install fglrx-updates (you will need to prepend these commands with sudo if you are not root when you run them) After the the two commands (above) finished. I restarted the desktop and installation on the desktop has been stable ever since. This is true of all the desktops (configurations above). I hope this post will be helpful to anyone having problems with MSI motherboards. They are my systemboards of choice and I am very grateful to all the contributors of this forum. Your posts and insights have made this fix possible. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1309578 Title: Ubuntu 14.04 suddenly reboots when booting from Live USB AMD A8 6600k Status in “linux” package in Ubuntu: Incomplete Bug description: I have a custom built AMD System with the following hardware currently running on Linux Mint 16 : AMD A8 6600k with Integrated graphics | MSI-FM2-A55M-E33 Motherboard | Kingston Hyperx Blu 4GB RAM | Corsair VS450 PSU Today when I tried to install 14.04 amd64 iso using a bootable USB, then the system rebooted. Any further attempts in installing it resulted in the same bug. As soon as I open the Ubuntu installer application and click Continue button then the system restarts after 2-3 seconds. I asked the same on AskUbuntu and some more guys reported the same problem with AMD APU, so I believe it to be a genuine bug and not just with me. The BIOS version is the latest one downloaded from MSI official website which is version 11.5. Also an Interesting thing is that this bug is common with the latest iso of Arch Linux too, but when booting older distros like Linux Mint 16 from USB, then everything works like it should, so it might have something to do with the newer 3.13 Kernel version. I am not an expert, but I can surely tell that only the newer distros are affected by this bug as reported by some other guys at AskUbuntu and the fact that Arch which is running the newer Kernel is having the same bug, so it probably has something to do with the newer Kernel, but I could be wrong. This bug is not letting me install Ubuntu 14.04 on my hardware and it is affecting a few more users too. Here is the AskUbuntu thread : http://askubuntu.com/questions/449391/unable-to-install-ubuntu-14-04 -pc-restarts-after-i-click-continue-button-in I hope this gets fixed soon or with the 14.04.1 upcoming July release. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1309578/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1341195] Re: KVM guests getting slow by time
Hi Tamas, To be clear, you have not yet gotten the bug since you've set KSM_ENABLED to 0, or have you? Interesting about the saucy kernel. Ideally we could reproduce this reliably enough to really bisect. I wonder if we can reproduce without qemu. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1341195 Title: KVM guests getting slow by time Status in “linux” package in Ubuntu: Incomplete Status in “qemu” package in Ubuntu: Incomplete Bug description: There is a post with very similar symptoms on serverfault: http://serverfault.com/questions/609881/windows-server-2012-on-kvm-on- ubuntu-14-04-runs-well-for-a-while-and-then-slows/612084#612084 Basically all kind of KVM guests are getting slow by time, both windows or linux. The more running guests, it happens sooner. Switching back to Saucy kernel is a good workaround. ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: qemu-kvm 2.0.0+dfsg-2ubuntu1.1 ProcVersionSignature: Ubuntu 3.13.0-29.53-generic 3.13.11.2 Uname: Linux 3.13.0-29-generic x86_64 NonfreeKernelModules: zfs zunicode zavl zcommon znvpair ApportVersion: 2.14.1-0ubuntu3.2 Architecture: amd64 Date: Sat Jul 12 22:18:49 2014 SourcePackage: qemu UpgradeStatus: No upgrade log present (probably fresh install) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1341195/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1041790]
same happens with 3.15.0 on Ubuntu 14.04 64 bit Jul 11 12:43:41 localhost kernel: [42049.462542] [drm] stuck on render ring Jul 11 12:43:41 localhost kernel: [42049.463330] [drm] GPU HANG: ecode 0:0x00ff, in chrome [2172], reason: Ring hung, action: reset Jul 11 12:43:41 localhost kernel: [42049.463334] [drm] GPU hangs can indicate a bug anywhere in the entire gfx stack, including userspace. Jul 11 12:43:41 localhost kernel: [42049.463335] [drm] Please file a _new_ bug report on bugs.freedesktop.org against DRI - DRM/Intel Jul 11 12:43:41 localhost kernel: [42049.463336] [drm] drm/i915 developers can then reassign to the right component if it's not a kernel issue. Jul 11 12:43:41 localhost kernel: [42049.463337] [drm] The gpu crash dump is required to analyze gpu hangs, so please always attach it. Jul 11 12:43:41 localhost kernel: [42049.463338] [drm] GPU crash dump saved to /sys/class/drm/card0/error Jul 11 12:43:43 localhost kernel: [42051.464623] [drm] Enabling RC6 states: RC6 on, RC6p off, RC6pp off Jul 11 12:43:47 localhost kernel: [42055.468816] [drm] stuck on render ring Jul 11 12:43:47 localhost kernel: [42055.469614] [drm] GPU HANG: ecode 0:0x00ff, in chrome [2172], reason: Ring hung, action: reset Jul 11 12:43:49 localhost kernel: [42057.470899] [drm] Enabling RC6 states: RC6 on, RC6p off, RC6pp off Jul 11 12:43:53 localhost kernel: [42061.439056] [drm] stuck on render ring Jul 11 12:43:53 localhost kernel: [42061.439867] [drm] GPU HANG: ecode 0:0xfeff, in chrome [2172], reason: Ring hung, action: reset -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1041790 Title: [snb] GPU lockup IPEHR: 0x0b160001 IPEHR: 0x0b140001, workaround i915.semaphores=0 Status in X.org xf86-video-intel: In Progress Status in “linux” package in Ubuntu: Incomplete Status in “sandybridge-meta” package in Ubuntu: Confirmed Status in “xserver-xorg-video-intel” package in Ubuntu: Triaged Bug description: X locks up periodically for a 2 to ten seconds at a time and this crash log gets generated. It's significantly more than several times a day but not quite continuous. If you indeed have this bug, that should stop the lockups from happening. Irrespective, please file a new bug report so your hardware may be tracked. WORKAROUND: Edit your /etc/default/grub from: GRUB_CMDLINE_LINUX_DEFAULT=quiet splash to: GRUB_CMDLINE_LINUX_DEFAULT=quiet splash i915.semaphores=0 run the following and reboot: sudo update-grub The side effects of this is rendering throughput is dropped by 10% with SNA, or as much as 3x with UXA. OpenGL performance is likely to be reduced by about 30%. More CPU time is spent waiting for the GPU with rc6 disabled, so increased power consumption. ProblemType: Crash DistroRelease: Ubuntu 12.10 Package: xserver-xorg-video-intel 2:2.20.3-0ubuntu1 Uname: Linux 3.6.0-rc3-git-20120826.1015 x86_64 ApportVersion: 2.5.1-0ubuntu2 Architecture: amd64 Chipset: sandybridge-m-gt2 Date: Sun Aug 26 16:06:32 2012 DistroCodename: quantal DistroVariant: ubuntu DuplicateSignature: [sandybridge-m-gt2] GPU lockup IPEHR: 0x0b160001 IPEHR: 0x0b140001 Ubuntu 12.10 EcryptfsInUse: Yes ExecutablePath: /usr/share/apport/apport-gpu-error-intel.py GpuHangFrequency: Continuously InstallationMedia: Ubuntu 12.10 Quantal Quetzal - Alpha amd64 (20120724.2) InterpreterPath: /usr/bin/python3.2mu MachineType: Dell Inc. Dell System XPS L502X ProcCmdline: /usr/bin/python3 /usr/share/apport/apport-gpu-error-intel.py ProcEnviron: ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.6.0-rc3-git-20120826.1015 root=UUID=135c8090-427c-460a-909d-eff262cd44b6 ro quiet splash vt.handoff=7 RelatedPackageVersions: xserver-xorg 1:7.7+1ubuntu3 libdrm2 2.4.38-0ubuntu2 xserver-xorg-video-intel 2:2.20.3-0ubuntu1 SourcePackage: xserver-xorg-video-intel Title: [sandybridge-m-gt2] GPU lockup IPEHR: 0x0b160001 IPEHR: 0x0b140001 UdevDb: Error: [Errno 2] No such file or directory: 'udevadm' UpgradeStatus: No upgrade log present (probably fresh install) UserGroups: dmi.bios.date: 05/29/2012 dmi.bios.vendor: Dell Inc. dmi.bios.version: A11 dmi.board.name: 0NJT03 dmi.board.vendor: Dell Inc. dmi.board.version: A00 dmi.chassis.type: 8 dmi.chassis.vendor: Dell Inc. dmi.chassis.version: 0.1 dmi.modalias: dmi:bvnDellInc.:bvrA11:bd05/29/2012:svnDellInc.:pnDellSystemXPSL502X:pvr:rvnDellInc.:rn0NJT03:rvrA00:cvnDellInc.:ct8:cvr0.1: dmi.product.name: Dell System XPS L502X dmi.sys.vendor: Dell Inc. To manage notifications about this bug go to: https://bugs.launchpad.net/xserver-xorg-video-intel/+bug/1041790/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help :
Re: [Kernel-packages] [Bug 1341195] Re: KVM guests getting slow by time
On 07/16/2014 06:35 PM, Serge Hallyn wrote: To be clear, you have not yet gotten the bug since you've set KSM_ENABLED to 0, or have you? I just did it, so no, not yet. This happened by time: Saucy (everything is fine) - Trusty (issue happened) - Trusty with Saucy kernel 3 weeks ago (no issue) - today with 3 weeks uptime (issue happened) - KSM_ENABLED=0 + reboot with Trusty kernel - now I just want to be clear, that both of us understand the same on this. Interesting about the saucy kernel. Ideally we could reproduce this reliably enough to really bisect. I wonder if we can reproduce without qemu. I have a some other servers with LXC with no issue, If there is KVM, then issue happens. Does it really not show up anywhere else? sysctl.conf: kernel.printk = 3 4 1 3 net.ipv4.conf.default.rp_filter=1 net.ipv4.conf.all.rp_filter=1 net.ipv4.tcp_syncookies=1 net.ipv4.conf.all.secure_redirects = 1 net.ipv4.conf.all.send_redirects = 0 net.ipv4.conf.all.accept_source_route = 0 net.ipv6.conf.all.accept_source_route = 0 kernel.shmmax=33554432 net.ipv4.tcp_rmem = 4096 16777216 33554432 net.ipv4.tcp_wmem = 4096 16777216 33554432 net.ipv4.tcp_mem = 4096 16777216 33554432 net.core.rmem_default = 16777216 net.core.wmem_default = 16777216 net.core.rmem_max = 16777216 net.core.wmem_max = 16777216 net.core.netdev_max_backlog = 3 net.core.netdev_max_backlog = 3 net.ipv6.neigh.default.gc_thresh1 = 512 net.ipv6.neigh.default.gc_thresh2 = 2048 net.ipv6.neigh.default.gc_thresh3 = 4096 vm.swappiness = 1 fs.inotify.max_user_watches = 81920 fs.inotify.max_user_instances = 1024 May that be important? tamas -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1341195 Title: KVM guests getting slow by time Status in “linux” package in Ubuntu: Incomplete Status in “qemu” package in Ubuntu: Incomplete Bug description: There is a post with very similar symptoms on serverfault: http://serverfault.com/questions/609881/windows-server-2012-on-kvm-on- ubuntu-14-04-runs-well-for-a-while-and-then-slows/612084#612084 Basically all kind of KVM guests are getting slow by time, both windows or linux. The more running guests, it happens sooner. Switching back to Saucy kernel is a good workaround. ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: qemu-kvm 2.0.0+dfsg-2ubuntu1.1 ProcVersionSignature: Ubuntu 3.13.0-29.53-generic 3.13.11.2 Uname: Linux 3.13.0-29-generic x86_64 NonfreeKernelModules: zfs zunicode zavl zcommon znvpair ApportVersion: 2.14.1-0ubuntu3.2 Architecture: amd64 Date: Sat Jul 12 22:18:49 2014 SourcePackage: qemu UpgradeStatus: No upgrade log present (probably fresh install) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1341195/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1338706] Re: Samsung SSD 840 failed to get NCQ Send/Recv Log Emask 0x1 failed to set xfermode (err_mask=0x40) on Trusty with upstream kernel
** Summary changed: - Samsung SSD 840 Series failed to set xfermode (err_mask=0x40) on Trusty with upstream kernel + Samsung SSD 840 failed to get NCQ Send/Recv Log Emask 0x1 failed to set xfermode (err_mask=0x40) on Trusty with upstream kernel ** Summary changed: - Samsung SSD 840 failed to get NCQ Send/Recv Log Emask 0x1 failed to set xfermode (err_mask=0x40) on Trusty with upstream kernel + Samsung SSD 840 failed to get NCQ Send/Recv Log Emask 0x1 failed to set xfermode (err_mask=0x40) on upstream kernels = 3.12 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1338706 Title: Samsung SSD 840 failed to get NCQ Send/Recv Log Emask 0x1 failed to set xfermode (err_mask=0x40) on upstream kernels = 3.12 Status in “linux” package in Ubuntu: Triaged Bug description: Samsung SSD 840 Series failed to get NCQ Send/Recv Log Emask 0x1. ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-30-generic 3.13.0-30.55 ProcVersionSignature: Ubuntu 3.13.0-30.55-generic 3.13.11.2 Uname: Linux 3.13.0-30-generic x86_64 ApportVersion: 2.14.1-0ubuntu3.2 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: user 2131 F pulseaudio CurrentDesktop: Unity Date: Mon Jul 7 20:01:28 2014 HibernationDevice: RESUME=UUID=685afcb7-7aa6-4048-af15-091d3bcd3b35 InstallationDate: Installed on 2014-06-22 (14 days ago) InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Release amd64 (20140417) IwConfig: eth0 no wireless extensions. lono wireless extensions. MachineType: System manufacturer System Product Name ProcFB: 0 nouveaufb ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.13.0-30-generic root=UUID=d7c2e1cb-d046-460c-83b8-0cfbb330d095 ro quiet splash vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-3.13.0-30-generic N/A linux-backports-modules-3.13.0-30-generic N/A linux-firmware 1.127.4 RfKill: SourcePackage: linux UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 09/10/2010 dmi.bios.vendor: American Megatrends Inc. dmi.bios.version: 0901 dmi.board.asset.tag: To Be Filled By O.E.M. dmi.board.name: M3N78-EM dmi.board.vendor: ASUSTeK Computer INC. dmi.board.version: Rev X.0x dmi.chassis.asset.tag: Asset-1234567890 dmi.chassis.type: 3 dmi.chassis.vendor: Chassis Manufacture dmi.chassis.version: Chassis Version dmi.modalias: dmi:bvnAmericanMegatrendsInc.:bvr0901:bd09/10/2010:svnSystemmanufacturer:pnSystemProductName:pvrSystemVersion:rvnASUSTeKComputerINC.:rnM3N78-EM:rvrRevX.0x:cvnChassisManufacture:ct3:cvrChassisVersion: dmi.product.name: System Product Name dmi.product.version: System Version dmi.sys.vendor: System manufacturer To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1338706/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1338946] Re: linux: 2.6.32-64.128 -proposed tracker
** Summary changed: - linux: 2.6.32-64.127 -proposed tracker + linux: 2.6.32-64.128 -proposed tracker -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1338946 Title: linux: 2.6.32-64.128 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: Confirmed Status in Kernel SRU Workflow package-testing series: Fix Released Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-lbm series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-ports-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: In Progress Status in Kernel SRU Workflow verification-testing series: Fix Released Status in “linux” package in Ubuntu: Invalid Status in “linux” source package in Lucid: New Bug description: This bug is for tracking the 2.6.32-64.127 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 08. July 2014 08:49 UTC kernel-stable-Prepare-package-end:Tuesday, 08. July 2014 17:10 UTC kernel-stable-Promote-to-proposed-start:Tuesday, 08. July 2014 17:10 UTC ppa-package-testing-start:Tuesday, 08. July 2014 17:10 UTC kernel-stable-Promote-to-proposed-end:Wednesday, 09. July 2014 16:05 UTC kernel-stable-Verification-testing-start:Wednesday, 09. July 2014 18:04 UTC kernel-stable-Certification-testing-start:Wednesday, 09. July 2014 18:05 UTC kernel-stable-Security-signoff-start:Wednesday, 09. July 2014 18:06 UTC kernel-stable-Regression-testing-start:Wednesday, 09. July 2014 18:06 UTC kernel-stable-Regression-testing-end:Saturday, 12. July 2014 16:02 UTC kernel-stable-phase:Testing kernel-stable-phase-changed:Monday, 14. July 2014 13:05 UTC kernel-stable-Verification-testing-end:Monday, 14. July 2014 13:05 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1338946/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1338870] Re: linux-armadaxp: 3.2.0-1636.53 -proposed tracker
** Summary changed: - linux-armadaxp: 3.2.0-1636.52 -proposed tracker + linux-armadaxp: 3.2.0-1636.53 -proposed tracker -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1338870 Title: linux-armadaxp: 3.2.0-1636.53 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow package-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Invalid Status in Kernel SRU Workflow upload-to-ppa series: Invalid Status in Kernel SRU Workflow verification-testing series: Fix Released Status in “linux-armadaxp” package in Ubuntu: Invalid Status in “linux-armadaxp” source package in Precise: In Progress Bug description: This bug is for tracking the 3.2.0-1636.52 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 08. July 2014 04:06 UTC kernel-stable-master-bug:1338654 kernel-stable-Certification-testing-end:Wednesday, 09. July 2014 07:05 UTC kernel-stable-Security-signoff-end:Wednesday, 09. July 2014 07:05 UTC kernel-stable-Prepare-package-end:Wednesday, 09. July 2014 11:04 UTC kernel-stable-Promote-to-proposed-start:Wednesday, 09. July 2014 11:04 UTC ppa-package-testing-start:Wednesday, 09. July 2014 11:04 UTC kernel-stable-Promote-to-proposed-end:Thursday, 10. July 2014 08:09 UTC kernel-stable-phase:Verification Testing kernel-stable-phase-changed:Thursday, 10. July 2014 09:47 UTC kernel-stable-Verification-testing-start:Thursday, 10. July 2014 09:47 UTC kernel-stable-Regression-testing-start:Thursday, 10. July 2014 09:47 UTC kernel-stable-Regression-testing-end:Saturday, 12. July 2014 15:04 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1338870/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1338654] Re: linux: 3.2.0-67.101 -proposed tracker
** Summary changed: - linux: 3.2.0-67.100 -proposed tracker + linux: 3.2.0-67.101 -proposed tracker -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1338654 Title: linux: 3.2.0-67.101 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: Confirmed Status in Kernel SRU Workflow package-testing series: Fix Released Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-lbm series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: In Progress Status in Kernel SRU Workflow verification-testing series: Fix Released Status in “linux” package in Ubuntu: Invalid Status in “linux” source package in Precise: Confirmed Bug description: This bug is for tracking the 3.2.0-67.100 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Monday, 07. July 2014 16:11 UTC kernel-stable-Prepare-package-end:Tuesday, 08. July 2014 04:12 UTC kernel-stable-Promote-to-proposed-start:Tuesday, 08. July 2014 04:12 UTC ppa-package-testing-start:Tuesday, 08. July 2014 04:12 UTC kernel-stable-Promote-to-proposed-end:Wednesday, 09. July 2014 22:01 UTC kernel-stable-Verification-testing-start:Wednesday, 09. July 2014 23:01 UTC kernel-stable-Certification-testing-start:Wednesday, 09. July 2014 23:01 UTC kernel-stable-Security-signoff-start:Wednesday, 09. July 2014 23:01 UTC kernel-stable-Regression-testing-start:Wednesday, 09. July 2014 23:01 UTC kernel-stable-Regression-testing-end:Friday, 11. July 2014 22:03 UTC kernel-stable-phase:Testing kernel-stable-phase-changed:Monday, 14. July 2014 13:04 UTC kernel-stable-Verification-testing-end:Monday, 14. July 2014 13:04 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1338654/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1336143] Re: linux-ti-omap4: 3.2.0-1451.71 -proposed tracker
** Summary changed: - linux-ti-omap4: 3.2.0-1451.70 -proposed tracker + linux-ti-omap4: 3.2.0-1451.71 -proposed tracker -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-ti-omap4 in Ubuntu. https://bugs.launchpad.net/bugs/1336143 Title: linux-ti-omap4: 3.2.0-1451.71 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow package-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: In Progress Status in Kernel SRU Workflow upload-to-ppa series: Fix Released Status in Kernel SRU Workflow verification-testing series: In Progress Status in “linux-ti-omap4” package in Ubuntu: Invalid Status in “linux-ti-omap4” source package in Precise: New Bug description: This bug is for tracking the version to be filled upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 01. July 2014 04:53 UTC kernel-stable-master-bug:1338654 kernel-stable-Certification-testing-end:Thursday, 03. July 2014 01:55 UTC kernel-stable-Prepare-package-end:Wednesday, 09. July 2014 17:00 UTC kernel-stable-Promote-to-proposed-start:Wednesday, 09. July 2014 17:00 UTC ppa-package-testing-start:Wednesday, 09. July 2014 17:00 UTC kernel-stable-Promote-to-proposed-end:Friday, 11. July 2014 16:17 UTC kernel-stable-phase:Verification Testing kernel-stable-phase-changed:Friday, 11. July 2014 18:01 UTC kernel-stable-Security-signoff-start:Friday, 11. July 2014 18:01 UTC kernel-stable-Verification-testing-start:Friday, 11. July 2014 18:01 UTC kernel-stable-Regression-testing-start:Friday, 11. July 2014 18:01 UTC kernel-stable-Regression-testing-end:Tuesday, 15. July 2014 16:00 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1336143/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1338556] Re: linux: 3.11.0-26.45 -proposed tracker
** Summary changed: - linux: 3.11.0-26.44 -proposed tracker + linux: 3.11.0-26.45 -proposed tracker -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1338556 Title: linux: 3.11.0-26.45 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: Confirmed Status in Kernel SRU Workflow package-testing series: Fix Released Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: In Progress Status in Kernel SRU Workflow verification-testing series: Fix Released Status in “linux” package in Ubuntu: Invalid Status in “linux” source package in Saucy: New Bug description: This bug is for tracking the 3.11.0-26.44 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Monday, 07. July 2014 12:18 UTC kernel-stable-Prepare-package-end:Monday, 07. July 2014 20:10 UTC kernel-stable-Promote-to-proposed-start:Monday, 07. July 2014 20:10 UTC ppa-package-testing-start:Monday, 07. July 2014 20:10 UTC kernel-stable-Promote-to-proposed-end:Wednesday, 09. July 2014 14:36 UTC kernel-stable-Verification-testing-start:Wednesday, 09. July 2014 16:02 UTC kernel-stable-Certification-testing-start:Wednesday, 09. July 2014 16:02 UTC kernel-stable-Security-signoff-start:Wednesday, 09. July 2014 16:03 UTC kernel-stable-Regression-testing-start:Wednesday, 09. July 2014 16:03 UTC kernel-stable-Regression-testing-end:Thursday, 10. July 2014 05:01 UTC kernel-stable-phase:Testing kernel-stable-phase-changed:Monday, 14. July 2014 13:01 UTC kernel-stable-Verification-testing-end:Monday, 14. July 2014 13:01 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1338556/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1338524] Re: linux: 3.13.0-32.57 -proposed tracker
** Summary changed: - linux: 3.13.0-32.56 -proposed tracker + linux: 3.13.0-32.57 -proposed tracker -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1338524 Title: linux: 3.13.0-32.57 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: Confirmed Status in Kernel SRU Workflow package-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: In Progress Status in Kernel SRU Workflow verification-testing series: In Progress Status in “linux” package in Ubuntu: Invalid Status in “linux” source package in Trusty: New Bug description: This bug is for tracking the 3.13.0-32.56 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Monday, 07. July 2014 10:33 UTC kernel-stable-Prepare-package-end:Monday, 07. July 2014 18:08 UTC kernel-stable-Promote-to-proposed-start:Monday, 07. July 2014 18:08 UTC ppa-package-testing-start:Monday, 07. July 2014 18:08 UTC kernel-stable-Promote-to-proposed-end:Wednesday, 09. July 2014 13:57 UTC kernel-stable-phase:Verification Testing kernel-stable-phase-changed:Wednesday, 09. July 2014 15:01 UTC kernel-stable-Verification-testing-start:Wednesday, 09. July 2014 15:01 UTC kernel-stable-Certification-testing-start:Wednesday, 09. July 2014 15:01 UTC kernel-stable-Security-signoff-start:Wednesday, 09. July 2014 15:01 UTC kernel-stable-Regression-testing-start:Wednesday, 09. July 2014 15:01 UTC kernel-stable-Regression-testing-end:Wednesday, 09. July 2014 22:00 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1338524/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1336143] Re: linux-ti-omap4: 3.2.0-1451.71 -proposed tracker
** Changed in: kernel-sru-workflow/security-signoff Status: Confirmed = In Progress ** Changed in: kernel-sru-workflow/security-signoff Assignee: Canonical Security Team (canonical-security) = John Johansen (jjohansen) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-ti-omap4 in Ubuntu. https://bugs.launchpad.net/bugs/1336143 Title: linux-ti-omap4: 3.2.0-1451.71 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow package-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: In Progress Status in Kernel SRU Workflow upload-to-ppa series: Fix Released Status in Kernel SRU Workflow verification-testing series: In Progress Status in “linux-ti-omap4” package in Ubuntu: Invalid Status in “linux-ti-omap4” source package in Precise: New Bug description: This bug is for tracking the version to be filled upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 01. July 2014 04:53 UTC kernel-stable-master-bug:1338654 kernel-stable-Certification-testing-end:Thursday, 03. July 2014 01:55 UTC kernel-stable-Prepare-package-end:Wednesday, 09. July 2014 17:00 UTC kernel-stable-Promote-to-proposed-start:Wednesday, 09. July 2014 17:00 UTC ppa-package-testing-start:Wednesday, 09. July 2014 17:00 UTC kernel-stable-Promote-to-proposed-end:Friday, 11. July 2014 16:17 UTC kernel-stable-phase:Verification Testing kernel-stable-phase-changed:Friday, 11. July 2014 18:01 UTC kernel-stable-Security-signoff-start:Friday, 11. July 2014 18:01 UTC kernel-stable-Verification-testing-start:Friday, 11. July 2014 18:01 UTC kernel-stable-Regression-testing-start:Friday, 11. July 2014 18:01 UTC kernel-stable-Regression-testing-end:Tuesday, 15. July 2014 16:00 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1336143/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1338946] Re: linux: 2.6.32-64.128 -proposed tracker
This bug was fixed in the package linux - 2.6.32-64.128 --- linux (2.6.32-64.128) lucid; urgency=low [ Upstream Kernel Changes ] * l2tp: Privilege escalation in ppp over l2tp sockets - LP: #1341472 - CVE-2014-4943 linux (2.6.32-64.127) lucid; urgency=low [ Luis Henriques ] * Merged back Ubuntu-2.6.32-62.126 security release * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699) - LP: #1337339 * Release Tracking Bug - LP: #1338946 [ Upstream Kernel Changes ] * ptrace,x86: force IRET path after a ptrace_stop() - LP: #1337339 - CVE-2014-4699 linux (2.6.32-63.126) lucid; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1335875 [ Upstream Kernel Changes ] * net: check net.core.somaxconn sysctl values - LP: #1321293 * sysctl net: Keep tcp_syn_retries inside the boundary - LP: #1321293 * ethtool: Report link-down while interface is down - LP: #1335049 * futex: Prevent attaching to kernel threads - LP: #1335049 * auditsc: audit_krule mask accesses need bounds checking - LP: #1335049 * net: fix regression introduced in 2.6.32.62 by sysctl fixes - LP: #1335049 * Linux 2.6.32.63 - LP: #1335049 * lib/lzo: Rename lzo1x_decompress.c to lzo1x_decompress_safe.c - LP: #1335313 - CVE-2014-4608 * lib/lzo: Update LZO compression to current upstream version - LP: #1335313 - CVE-2014-4608 * lzo: properly check for overruns - LP: #1335313 - CVE-2014-4608 -- Luis Henriques luis.henriq...@canonical.com Mon, 14 Jul 2014 16:33:33 +0100 ** Changed in: linux (Ubuntu Lucid) Status: New = Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-4608 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-4699 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-4943 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1338946 Title: linux: 2.6.32-64.128 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: Confirmed Status in Kernel SRU Workflow package-testing series: Fix Released Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-lbm series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-ports-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: In Progress Status in Kernel SRU Workflow verification-testing series: Fix Released Status in “linux” package in Ubuntu: Invalid Status in “linux” source package in Lucid: Fix Released Bug description: This bug is for tracking the 2.6.32-64.127 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 08. July 2014 08:49 UTC kernel-stable-Prepare-package-end:Tuesday, 08. July 2014 17:10 UTC kernel-stable-Promote-to-proposed-start:Tuesday, 08. July 2014 17:10 UTC ppa-package-testing-start:Tuesday, 08. July 2014 17:10 UTC kernel-stable-Promote-to-proposed-end:Wednesday, 09. July 2014 16:05 UTC kernel-stable-Verification-testing-start:Wednesday, 09. July 2014 18:04 UTC kernel-stable-Certification-testing-start:Wednesday, 09. July 2014 18:05 UTC kernel-stable-Security-signoff-start:Wednesday, 09. July 2014 18:06 UTC kernel-stable-Regression-testing-start:Wednesday, 09. July 2014 18:06 UTC kernel-stable-Regression-testing-end:Saturday, 12. July 2014 16:02 UTC kernel-stable-phase:Testing kernel-stable-phase-changed:Monday, 14. July 2014 13:05 UTC kernel-stable-Verification-testing-end:Monday, 14. July 2014 13:05 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1338946/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1335049] Re: Lucid update to 2.6.32.63 stable release
This bug was fixed in the package linux - 2.6.32-64.128 --- linux (2.6.32-64.128) lucid; urgency=low [ Upstream Kernel Changes ] * l2tp: Privilege escalation in ppp over l2tp sockets - LP: #1341472 - CVE-2014-4943 linux (2.6.32-64.127) lucid; urgency=low [ Luis Henriques ] * Merged back Ubuntu-2.6.32-62.126 security release * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699) - LP: #1337339 * Release Tracking Bug - LP: #1338946 [ Upstream Kernel Changes ] * ptrace,x86: force IRET path after a ptrace_stop() - LP: #1337339 - CVE-2014-4699 linux (2.6.32-63.126) lucid; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1335875 [ Upstream Kernel Changes ] * net: check net.core.somaxconn sysctl values - LP: #1321293 * sysctl net: Keep tcp_syn_retries inside the boundary - LP: #1321293 * ethtool: Report link-down while interface is down - LP: #1335049 * futex: Prevent attaching to kernel threads - LP: #1335049 * auditsc: audit_krule mask accesses need bounds checking - LP: #1335049 * net: fix regression introduced in 2.6.32.62 by sysctl fixes - LP: #1335049 * Linux 2.6.32.63 - LP: #1335049 * lib/lzo: Rename lzo1x_decompress.c to lzo1x_decompress_safe.c - LP: #1335313 - CVE-2014-4608 * lib/lzo: Update LZO compression to current upstream version - LP: #1335313 - CVE-2014-4608 * lzo: properly check for overruns - LP: #1335313 - CVE-2014-4608 -- Luis Henriques luis.henriq...@canonical.com Mon, 14 Jul 2014 16:33:33 +0100 ** Changed in: linux (Ubuntu Lucid) Status: Fix Committed = Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-4608 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-4699 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-4943 ** Changed in: linux (Ubuntu Lucid) Status: Fix Committed = Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1335049 Title: Lucid update to 2.6.32.63 stable release Status in “linux” package in Ubuntu: New Status in “linux” source package in Lucid: Fix Released Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from Linus' tree or in a minimally backported form of that patch. The 2.6.32.63 upstream stable patch set is now available. It should be included in the Ubuntu kernel as well. git://git.kernel.org/ TEST CASE: TBD The following patches are in the 2.6.32.63 stable release: Linux 2.6.32.63 net: fix regression introduced in 2.6.32.62 by sysctl fixes auditsc: audit_krule mask accesses need bounds checking futex: Prevent attaching to kernel threads ethtool: Report link-down while interface is down The following patches from 2.6.32.63 were not applied as they were already present in the Lucid kernel: futex: Make lookup_pi_state more robust futex: Always cleanup owner tid in unlock_pi futex: Validate atomic acquisition in futex_lock_pi_atomic() futex-prevent-requeue-pi-on-same-futex.patch futex: Forbid uaddr == uaddr2 in futex_requeue(..., requeue_pi=1) The following patch from 2.6.32.63 was dropped as one of futex patches in Lucid seem to implement a slightly different security fix that prevents it from being applied: futex: Add another early deadlock detection check To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1335049/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1335049] Re: Lucid update to 2.6.32.63 stable release
This bug was fixed in the package linux - 2.6.32-64.128 --- linux (2.6.32-64.128) lucid; urgency=low [ Upstream Kernel Changes ] * l2tp: Privilege escalation in ppp over l2tp sockets - LP: #1341472 - CVE-2014-4943 linux (2.6.32-64.127) lucid; urgency=low [ Luis Henriques ] * Merged back Ubuntu-2.6.32-62.126 security release * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699) - LP: #1337339 * Release Tracking Bug - LP: #1338946 [ Upstream Kernel Changes ] * ptrace,x86: force IRET path after a ptrace_stop() - LP: #1337339 - CVE-2014-4699 linux (2.6.32-63.126) lucid; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1335875 [ Upstream Kernel Changes ] * net: check net.core.somaxconn sysctl values - LP: #1321293 * sysctl net: Keep tcp_syn_retries inside the boundary - LP: #1321293 * ethtool: Report link-down while interface is down - LP: #1335049 * futex: Prevent attaching to kernel threads - LP: #1335049 * auditsc: audit_krule mask accesses need bounds checking - LP: #1335049 * net: fix regression introduced in 2.6.32.62 by sysctl fixes - LP: #1335049 * Linux 2.6.32.63 - LP: #1335049 * lib/lzo: Rename lzo1x_decompress.c to lzo1x_decompress_safe.c - LP: #1335313 - CVE-2014-4608 * lib/lzo: Update LZO compression to current upstream version - LP: #1335313 - CVE-2014-4608 * lzo: properly check for overruns - LP: #1335313 - CVE-2014-4608 -- Luis Henriques luis.henriq...@canonical.com Mon, 14 Jul 2014 16:33:33 +0100 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1335049 Title: Lucid update to 2.6.32.63 stable release Status in “linux” package in Ubuntu: New Status in “linux” source package in Lucid: Fix Released Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from Linus' tree or in a minimally backported form of that patch. The 2.6.32.63 upstream stable patch set is now available. It should be included in the Ubuntu kernel as well. git://git.kernel.org/ TEST CASE: TBD The following patches are in the 2.6.32.63 stable release: Linux 2.6.32.63 net: fix regression introduced in 2.6.32.62 by sysctl fixes auditsc: audit_krule mask accesses need bounds checking futex: Prevent attaching to kernel threads ethtool: Report link-down while interface is down The following patches from 2.6.32.63 were not applied as they were already present in the Lucid kernel: futex: Make lookup_pi_state more robust futex: Always cleanup owner tid in unlock_pi futex: Validate atomic acquisition in futex_lock_pi_atomic() futex-prevent-requeue-pi-on-same-futex.patch futex: Forbid uaddr == uaddr2 in futex_requeue(..., requeue_pi=1) The following patch from 2.6.32.63 was dropped as one of futex patches in Lucid seem to implement a slightly different security fix that prevents it from being applied: futex: Add another early deadlock detection check To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1335049/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1335875] Re: linux: 2.6.32-63.126 -proposed tracker
*** This bug is a duplicate of bug 1338946 *** https://bugs.launchpad.net/bugs/1338946 This bug was fixed in the package linux - 2.6.32-64.128 --- linux (2.6.32-64.128) lucid; urgency=low [ Upstream Kernel Changes ] * l2tp: Privilege escalation in ppp over l2tp sockets - LP: #1341472 - CVE-2014-4943 linux (2.6.32-64.127) lucid; urgency=low [ Luis Henriques ] * Merged back Ubuntu-2.6.32-62.126 security release * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699) - LP: #1337339 * Release Tracking Bug - LP: #1338946 [ Upstream Kernel Changes ] * ptrace,x86: force IRET path after a ptrace_stop() - LP: #1337339 - CVE-2014-4699 linux (2.6.32-63.126) lucid; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1335875 [ Upstream Kernel Changes ] * net: check net.core.somaxconn sysctl values - LP: #1321293 * sysctl net: Keep tcp_syn_retries inside the boundary - LP: #1321293 * ethtool: Report link-down while interface is down - LP: #1335049 * futex: Prevent attaching to kernel threads - LP: #1335049 * auditsc: audit_krule mask accesses need bounds checking - LP: #1335049 * net: fix regression introduced in 2.6.32.62 by sysctl fixes - LP: #1335049 * Linux 2.6.32.63 - LP: #1335049 * lib/lzo: Rename lzo1x_decompress.c to lzo1x_decompress_safe.c - LP: #1335313 - CVE-2014-4608 * lib/lzo: Update LZO compression to current upstream version - LP: #1335313 - CVE-2014-4608 * lzo: properly check for overruns - LP: #1335313 - CVE-2014-4608 -- Luis Henriques luis.henriq...@canonical.com Mon, 14 Jul 2014 16:33:33 +0100 ** Changed in: linux (Ubuntu Lucid) Status: New = Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-4608 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-4699 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-4943 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1335875 Title: linux: 2.6.32-63.126 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: Confirmed Status in Kernel SRU Workflow package-testing series: In Progress Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-lbm series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-ports-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: In Progress Status in Kernel SRU Workflow security-signoff series: In Progress Status in Kernel SRU Workflow verification-testing series: In Progress Status in “linux” package in Ubuntu: Invalid Status in “linux” source package in Lucid: Fix Released Bug description: This bug is for tracking the 2.6.32-63.126 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Monday, 30. June 2014 14:25 UTC kernel-stable-Prepare-package-end:Tuesday, 01. July 2014 04:52 UTC kernel-stable-Promote-to-proposed-start:Tuesday, 01. July 2014 04:52 UTC kernel-stable-Promote-to-proposed-end:Wednesday, 02. July 2014 00:23 UTC kernel-stable-phase:Verification Testing kernel-stable-phase-changed:Wednesday, 02. July 2014 01:37 UTC kernel-stable-Verification-testing-start:Wednesday, 02. July 2014 01:37 UTC kernel-stable-Certification-testing-start:Wednesday, 02. July 2014 01:37 UTC kernel-stable-Security-signoff-start:Wednesday, 02. July 2014 01:37 UTC kernel-stable-Regression-testing-start:Wednesday, 02. July 2014 01:37 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1335875/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
Re: [Kernel-packages] [Bug 1341195] Re: KVM guests getting slow by time
Quoting Tamas Papp (1341...@bugs.launchpad.net): On 07/16/2014 06:35 PM, Serge Hallyn wrote: To be clear, you have not yet gotten the bug since you've set KSM_ENABLED to 0, or have you? I just did it, so no, not yet. This happened by time: Saucy (everything is fine) - Trusty (issue happened) - Trusty with Saucy kernel 3 weeks ago (no issue) - today with 3 weeks uptime (issue happened) - KSM_ENABLED=0 + reboot with Trusty kernel - now I just want to be clear, that both of us understand the same on this. Interesting about the saucy kernel. Ideally we could reproduce this reliably enough to really bisect. I wonder if we can reproduce without qemu. I have a some other servers with LXC with no issue, If there is KVM, then issue happens. Does it really not show up anywhere else? I've personally not seen it, and noone on my team, who use a lot of kvm instances, has seen it. Our two current theories are that (a) it has to do with ksm page migration across numa-nodes, or (b) it has to do with a race with transparent hugepages versus ksm. For (b) there is already a commit in Linus' tree (f72e7dcd). For (a), you can probably test by setting /sys/kernel/mm/ksm/merge_across_nodes to 0. (We are trying these as well, but as the testcases are not 100% positive it'd be good to have you try as well) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1341195 Title: KVM guests getting slow by time Status in “linux” package in Ubuntu: Incomplete Status in “qemu” package in Ubuntu: Incomplete Bug description: There is a post with very similar symptoms on serverfault: http://serverfault.com/questions/609881/windows-server-2012-on-kvm-on- ubuntu-14-04-runs-well-for-a-while-and-then-slows/612084#612084 Basically all kind of KVM guests are getting slow by time, both windows or linux. The more running guests, it happens sooner. Switching back to Saucy kernel is a good workaround. ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: qemu-kvm 2.0.0+dfsg-2ubuntu1.1 ProcVersionSignature: Ubuntu 3.13.0-29.53-generic 3.13.11.2 Uname: Linux 3.13.0-29-generic x86_64 NonfreeKernelModules: zfs zunicode zavl zcommon znvpair ApportVersion: 2.14.1-0ubuntu3.2 Architecture: amd64 Date: Sat Jul 12 22:18:49 2014 SourcePackage: qemu UpgradeStatus: No upgrade log present (probably fresh install) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1341195/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1335313] Re: CVE-2014-4608
This bug was fixed in the package linux - 2.6.32-64.128 --- linux (2.6.32-64.128) lucid; urgency=low [ Upstream Kernel Changes ] * l2tp: Privilege escalation in ppp over l2tp sockets - LP: #1341472 - CVE-2014-4943 linux (2.6.32-64.127) lucid; urgency=low [ Luis Henriques ] * Merged back Ubuntu-2.6.32-62.126 security release * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699) - LP: #1337339 * Release Tracking Bug - LP: #1338946 [ Upstream Kernel Changes ] * ptrace,x86: force IRET path after a ptrace_stop() - LP: #1337339 - CVE-2014-4699 linux (2.6.32-63.126) lucid; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1335875 [ Upstream Kernel Changes ] * net: check net.core.somaxconn sysctl values - LP: #1321293 * sysctl net: Keep tcp_syn_retries inside the boundary - LP: #1321293 * ethtool: Report link-down while interface is down - LP: #1335049 * futex: Prevent attaching to kernel threads - LP: #1335049 * auditsc: audit_krule mask accesses need bounds checking - LP: #1335049 * net: fix regression introduced in 2.6.32.62 by sysctl fixes - LP: #1335049 * Linux 2.6.32.63 - LP: #1335049 * lib/lzo: Rename lzo1x_decompress.c to lzo1x_decompress_safe.c - LP: #1335313 - CVE-2014-4608 * lib/lzo: Update LZO compression to current upstream version - LP: #1335313 - CVE-2014-4608 * lzo: properly check for overruns - LP: #1335313 - CVE-2014-4608 -- Luis Henriques luis.henriq...@canonical.com Mon, 14 Jul 2014 16:33:33 +0100 ** Changed in: linux (Ubuntu Lucid) Status: Fix Committed = Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-4699 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-4943 ** Changed in: linux-ec2 (Ubuntu Lucid) Status: Fix Committed = Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1335313 Title: CVE-2014-4608 Status in “linux” package in Ubuntu: Fix Committed Status in “linux-armadaxp” package in Ubuntu: Invalid Status in “linux-ec2” package in Ubuntu: Invalid Status in “linux-fsl-imx51” package in Ubuntu: Invalid Status in “linux-lts-backport-maverick” package in Ubuntu: New Status in “linux-lts-backport-natty” package in Ubuntu: New Status in “linux-lts-quantal” package in Ubuntu: Invalid Status in “linux-lts-raring” package in Ubuntu: Invalid Status in “linux-lts-saucy” package in Ubuntu: Invalid Status in “linux-mvl-dove” package in Ubuntu: Invalid Status in “linux-ti-omap4” package in Ubuntu: Invalid Status in “linux” source package in Lucid: Fix Released Status in “linux-armadaxp” source package in Lucid: Invalid Status in “linux-ec2” source package in Lucid: Fix Released Status in “linux-fsl-imx51” source package in Lucid: Invalid Status in “linux-lts-backport-maverick” source package in Lucid: New Status in “linux-lts-backport-natty” source package in Lucid: New Status in “linux-lts-quantal” source package in Lucid: Invalid Status in “linux-lts-raring” source package in Lucid: Invalid Status in “linux-lts-saucy” source package in Lucid: Invalid Status in “linux-mvl-dove” source package in Lucid: Invalid Status in “linux-ti-omap4” source package in Lucid: Invalid Status in “linux” source package in Precise: Fix Committed Status in “linux-armadaxp” source package in Precise: Fix Committed Status in “linux-ec2” source package in Precise: Invalid Status in “linux-fsl-imx51” source package in Precise: Invalid Status in “linux-lts-backport-maverick” source package in Precise: New Status in “linux-lts-backport-natty” source package in Precise: New Status in “linux-lts-quantal” source package in Precise: Fix Committed Status in “linux-lts-raring” source package in Precise: Fix Committed Status in “linux-lts-saucy” source package in Precise: Fix Released Status in “linux-mvl-dove” source package in Precise: Invalid Status in “linux-ti-omap4” source package in Precise: New Status in “linux” source package in Saucy: Fix Committed Status in “linux-armadaxp” source package in Saucy: Invalid Status in “linux-ec2” source package in Saucy: Invalid Status in “linux-fsl-imx51” source package in Saucy: Invalid Status in “linux-lts-backport-maverick” source package in Saucy: New Status in “linux-lts-backport-natty” source package in Saucy: New Status in “linux-lts-quantal” source package in Saucy: Invalid Status in “linux-lts-raring” source package in Saucy: Invalid Status in “linux-lts-saucy” source package in Saucy: Invalid Status in “linux-mvl-dove” source package in Saucy: Invalid Status in “linux-ti-omap4” source package in Saucy: New Status in “linux” source package in Trusty: Fix Committed Status in “linux-armadaxp” source package in Trusty:
[Kernel-packages] [Bug 1335313] Re: CVE-2014-4608
This bug was fixed in the package linux-ec2 - 2.6.32-368.84 --- linux-ec2 (2.6.32-368.84) lucid; urgency=low [ Andy Whitcroft ] * pull in missing CVE changelog * Ubuntu-2.6.32-368.84 [ Ubuntu: 2.6.32-64.128 ] * l2tp: Privilege escalation in ppp over l2tp sockets - LP: #1341472 - CVE-2014-4943 linux-ec2 (2.6.32-368.83) lucid; urgency=low [ Stefan Bader ] * Rebased to Ubuntu-2.6.32-64.127 * Release Tracking Bug - LP: #1339215 [ Ubuntu: 2.6.32-64.127 ] * Merged back Ubuntu-2.6.32-62.126 security release * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699) - LP: #1337339 * ptrace,x86: force IRET path after a ptrace_stop() - LP: #1337339 - CVE-2014-4699 linux-ec2 (2.6.32-367.82) lucid; urgency=low [ Stefan Bader ] * Rebased to Ubuntu-2.6.32-63.126 * Release Tracking Bug - LP: #1336142 [ Ubuntu: 2.6.32-63.126 ] * net: check net.core.somaxconn sysctl values - LP: #1321293 * sysctl net: Keep tcp_syn_retries inside the boundary - LP: #1321293 * ethtool: Report link-down while interface is down - LP: #1335049 * futex: Prevent attaching to kernel threads - LP: #1335049 * auditsc: audit_krule mask accesses need bounds checking - LP: #1335049 * net: fix regression introduced in 2.6.32.62 by sysctl fixes - LP: #1335049 * Linux 2.6.32.63 - LP: #1335049 * lib/lzo: Rename lzo1x_decompress.c to lzo1x_decompress_safe.c - LP: #1335313 - CVE-2014-4608 * lib/lzo: Update LZO compression to current upstream version - LP: #1335313 - CVE-2014-4608 * lzo: properly check for overruns - LP: #1335313 - CVE-2014-4608 -- Andy Whitcroft a...@canonical.com Mon, 14 Jul 2014 17:31:51 +0100 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1335313 Title: CVE-2014-4608 Status in “linux” package in Ubuntu: Fix Committed Status in “linux-armadaxp” package in Ubuntu: Invalid Status in “linux-ec2” package in Ubuntu: Invalid Status in “linux-fsl-imx51” package in Ubuntu: Invalid Status in “linux-lts-backport-maverick” package in Ubuntu: New Status in “linux-lts-backport-natty” package in Ubuntu: New Status in “linux-lts-quantal” package in Ubuntu: Invalid Status in “linux-lts-raring” package in Ubuntu: Invalid Status in “linux-lts-saucy” package in Ubuntu: Invalid Status in “linux-mvl-dove” package in Ubuntu: Invalid Status in “linux-ti-omap4” package in Ubuntu: Invalid Status in “linux” source package in Lucid: Fix Released Status in “linux-armadaxp” source package in Lucid: Invalid Status in “linux-ec2” source package in Lucid: Fix Released Status in “linux-fsl-imx51” source package in Lucid: Invalid Status in “linux-lts-backport-maverick” source package in Lucid: New Status in “linux-lts-backport-natty” source package in Lucid: New Status in “linux-lts-quantal” source package in Lucid: Invalid Status in “linux-lts-raring” source package in Lucid: Invalid Status in “linux-lts-saucy” source package in Lucid: Invalid Status in “linux-mvl-dove” source package in Lucid: Invalid Status in “linux-ti-omap4” source package in Lucid: Invalid Status in “linux” source package in Precise: Fix Committed Status in “linux-armadaxp” source package in Precise: Fix Committed Status in “linux-ec2” source package in Precise: Invalid Status in “linux-fsl-imx51” source package in Precise: Invalid Status in “linux-lts-backport-maverick” source package in Precise: New Status in “linux-lts-backport-natty” source package in Precise: New Status in “linux-lts-quantal” source package in Precise: Fix Committed Status in “linux-lts-raring” source package in Precise: Fix Committed Status in “linux-lts-saucy” source package in Precise: Fix Released Status in “linux-mvl-dove” source package in Precise: Invalid Status in “linux-ti-omap4” source package in Precise: New Status in “linux” source package in Saucy: Fix Committed Status in “linux-armadaxp” source package in Saucy: Invalid Status in “linux-ec2” source package in Saucy: Invalid Status in “linux-fsl-imx51” source package in Saucy: Invalid Status in “linux-lts-backport-maverick” source package in Saucy: New Status in “linux-lts-backport-natty” source package in Saucy: New Status in “linux-lts-quantal” source package in Saucy: Invalid Status in “linux-lts-raring” source package in Saucy: Invalid Status in “linux-lts-saucy” source package in Saucy: Invalid Status in “linux-mvl-dove” source package in Saucy: Invalid Status in “linux-ti-omap4” source package in Saucy: New Status in “linux” source package in Trusty: Fix Committed Status in “linux-armadaxp” source package in Trusty: Invalid Status in “linux-ec2” source package in Trusty: Invalid Status in “linux-fsl-imx51” source package in Trusty: Invalid Status in
[Kernel-packages] [Bug 1338654] Re: linux: 3.2.0-67.101 -proposed tracker
This bug was fixed in the package linux - 3.2.0-67.101 --- linux (3.2.0-67.101) precise; urgency=low [ Upstream Kernel Changes ] * l2tp: Privilege escalation in ppp over l2tp sockets - LP: #1341472 - CVE-2014-4943 linux (3.2.0-67.100) precise; urgency=low [ Luis Henriques ] * Merged back Ubuntu-3.2.0-65.99 security release * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699) - LP: #1337339 * Release Tracking Bug - LP: #1338654 [ Upstream Kernel Changes ] * ptrace,x86: force IRET path after a ptrace_stop() - LP: #1337339 - CVE-2014-4699 linux (3.2.0-66.99) precise; urgency=low * Release Tracking Bug - LP: #1335906 [ Upstream Kernel Changes ] * skbuff: export skb_copy_ubufs - LP: #1298119 - CVE-2014-0131 * skbuff: add an api to orphan frags - LP: #1298119 - CVE-2014-0131 * skbuff: skb_segment: orphan frags before copying - LP: #1298119 - CVE-2014-0131 * lib/lzo: Rename lzo1x_decompress.c to lzo1x_decompress_safe.c - CVE-2014-4608 * lib/lzo: Update LZO compression to current upstream version - CVE-2014-4608 * lzo: properly check for overruns - CVE-2014-4608 * KVM: x86 emulator: add support for vector alignment - LP: #1330177 * KVM: x86: emulate movdqa - LP: #1330177 -- Luis Henriques luis.henriq...@canonical.com Mon, 14 Jul 2014 16:07:35 +0100 ** Changed in: linux (Ubuntu Precise) Status: Confirmed = Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-0131 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-4608 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-4699 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-4943 ** Changed in: linux (Ubuntu Precise) Status: Confirmed = Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1338654 Title: linux: 3.2.0-67.101 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: Confirmed Status in Kernel SRU Workflow package-testing series: Fix Released Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-lbm series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: In Progress Status in Kernel SRU Workflow verification-testing series: Fix Released Status in “linux” package in Ubuntu: Invalid Status in “linux” source package in Precise: Fix Released Bug description: This bug is for tracking the 3.2.0-67.100 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Monday, 07. July 2014 16:11 UTC kernel-stable-Prepare-package-end:Tuesday, 08. July 2014 04:12 UTC kernel-stable-Promote-to-proposed-start:Tuesday, 08. July 2014 04:12 UTC ppa-package-testing-start:Tuesday, 08. July 2014 04:12 UTC kernel-stable-Promote-to-proposed-end:Wednesday, 09. July 2014 22:01 UTC kernel-stable-Verification-testing-start:Wednesday, 09. July 2014 23:01 UTC kernel-stable-Certification-testing-start:Wednesday, 09. July 2014 23:01 UTC kernel-stable-Security-signoff-start:Wednesday, 09. July 2014 23:01 UTC kernel-stable-Regression-testing-start:Wednesday, 09. July 2014 23:01 UTC kernel-stable-Regression-testing-end:Friday, 11. July 2014 22:03 UTC kernel-stable-phase:Testing kernel-stable-phase-changed:Monday, 14. July 2014 13:04 UTC kernel-stable-Verification-testing-end:Monday, 14. July 2014 13:04 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1338654/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1335313] Re: CVE-2014-4608
This bug was fixed in the package linux-ec2 - 2.6.32-368.84 --- linux-ec2 (2.6.32-368.84) lucid; urgency=low [ Andy Whitcroft ] * pull in missing CVE changelog * Ubuntu-2.6.32-368.84 [ Ubuntu: 2.6.32-64.128 ] * l2tp: Privilege escalation in ppp over l2tp sockets - LP: #1341472 - CVE-2014-4943 linux-ec2 (2.6.32-368.83) lucid; urgency=low [ Stefan Bader ] * Rebased to Ubuntu-2.6.32-64.127 * Release Tracking Bug - LP: #1339215 [ Ubuntu: 2.6.32-64.127 ] * Merged back Ubuntu-2.6.32-62.126 security release * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699) - LP: #1337339 * ptrace,x86: force IRET path after a ptrace_stop() - LP: #1337339 - CVE-2014-4699 linux-ec2 (2.6.32-367.82) lucid; urgency=low [ Stefan Bader ] * Rebased to Ubuntu-2.6.32-63.126 * Release Tracking Bug - LP: #1336142 [ Ubuntu: 2.6.32-63.126 ] * net: check net.core.somaxconn sysctl values - LP: #1321293 * sysctl net: Keep tcp_syn_retries inside the boundary - LP: #1321293 * ethtool: Report link-down while interface is down - LP: #1335049 * futex: Prevent attaching to kernel threads - LP: #1335049 * auditsc: audit_krule mask accesses need bounds checking - LP: #1335049 * net: fix regression introduced in 2.6.32.62 by sysctl fixes - LP: #1335049 * Linux 2.6.32.63 - LP: #1335049 * lib/lzo: Rename lzo1x_decompress.c to lzo1x_decompress_safe.c - LP: #1335313 - CVE-2014-4608 * lib/lzo: Update LZO compression to current upstream version - LP: #1335313 - CVE-2014-4608 * lzo: properly check for overruns - LP: #1335313 - CVE-2014-4608 -- Andy Whitcroft a...@canonical.com Mon, 14 Jul 2014 17:31:51 +0100 ** Changed in: linux-ec2 (Ubuntu Lucid) Status: Fix Committed = Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1335313 Title: CVE-2014-4608 Status in “linux” package in Ubuntu: Fix Committed Status in “linux-armadaxp” package in Ubuntu: Invalid Status in “linux-ec2” package in Ubuntu: Invalid Status in “linux-fsl-imx51” package in Ubuntu: Invalid Status in “linux-lts-backport-maverick” package in Ubuntu: New Status in “linux-lts-backport-natty” package in Ubuntu: New Status in “linux-lts-quantal” package in Ubuntu: Invalid Status in “linux-lts-raring” package in Ubuntu: Invalid Status in “linux-lts-saucy” package in Ubuntu: Invalid Status in “linux-mvl-dove” package in Ubuntu: Invalid Status in “linux-ti-omap4” package in Ubuntu: Invalid Status in “linux” source package in Lucid: Fix Released Status in “linux-armadaxp” source package in Lucid: Invalid Status in “linux-ec2” source package in Lucid: Fix Released Status in “linux-fsl-imx51” source package in Lucid: Invalid Status in “linux-lts-backport-maverick” source package in Lucid: New Status in “linux-lts-backport-natty” source package in Lucid: New Status in “linux-lts-quantal” source package in Lucid: Invalid Status in “linux-lts-raring” source package in Lucid: Invalid Status in “linux-lts-saucy” source package in Lucid: Invalid Status in “linux-mvl-dove” source package in Lucid: Invalid Status in “linux-ti-omap4” source package in Lucid: Invalid Status in “linux” source package in Precise: Fix Committed Status in “linux-armadaxp” source package in Precise: Fix Committed Status in “linux-ec2” source package in Precise: Invalid Status in “linux-fsl-imx51” source package in Precise: Invalid Status in “linux-lts-backport-maverick” source package in Precise: New Status in “linux-lts-backport-natty” source package in Precise: New Status in “linux-lts-quantal” source package in Precise: Fix Committed Status in “linux-lts-raring” source package in Precise: Fix Committed Status in “linux-lts-saucy” source package in Precise: Fix Released Status in “linux-mvl-dove” source package in Precise: Invalid Status in “linux-ti-omap4” source package in Precise: New Status in “linux” source package in Saucy: Fix Committed Status in “linux-armadaxp” source package in Saucy: Invalid Status in “linux-ec2” source package in Saucy: Invalid Status in “linux-fsl-imx51” source package in Saucy: Invalid Status in “linux-lts-backport-maverick” source package in Saucy: New Status in “linux-lts-backport-natty” source package in Saucy: New Status in “linux-lts-quantal” source package in Saucy: Invalid Status in “linux-lts-raring” source package in Saucy: Invalid Status in “linux-lts-saucy” source package in Saucy: Invalid Status in “linux-mvl-dove” source package in Saucy: Invalid Status in “linux-ti-omap4” source package in Saucy: New Status in “linux” source package in Trusty: Fix Committed Status in “linux-armadaxp” source package in Trusty: Invalid Status in “linux-ec2” source package in Trusty: Invalid Status in
[Kernel-packages] [Bug 1338654] Re: linux: 3.2.0-67.101 -proposed tracker
This bug was fixed in the package linux - 3.2.0-67.101 --- linux (3.2.0-67.101) precise; urgency=low [ Upstream Kernel Changes ] * l2tp: Privilege escalation in ppp over l2tp sockets - LP: #1341472 - CVE-2014-4943 linux (3.2.0-67.100) precise; urgency=low [ Luis Henriques ] * Merged back Ubuntu-3.2.0-65.99 security release * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699) - LP: #1337339 * Release Tracking Bug - LP: #1338654 [ Upstream Kernel Changes ] * ptrace,x86: force IRET path after a ptrace_stop() - LP: #1337339 - CVE-2014-4699 linux (3.2.0-66.99) precise; urgency=low * Release Tracking Bug - LP: #1335906 [ Upstream Kernel Changes ] * skbuff: export skb_copy_ubufs - LP: #1298119 - CVE-2014-0131 * skbuff: add an api to orphan frags - LP: #1298119 - CVE-2014-0131 * skbuff: skb_segment: orphan frags before copying - LP: #1298119 - CVE-2014-0131 * lib/lzo: Rename lzo1x_decompress.c to lzo1x_decompress_safe.c - CVE-2014-4608 * lib/lzo: Update LZO compression to current upstream version - CVE-2014-4608 * lzo: properly check for overruns - CVE-2014-4608 * KVM: x86 emulator: add support for vector alignment - LP: #1330177 * KVM: x86: emulate movdqa - LP: #1330177 -- Luis Henriques luis.henriq...@canonical.com Mon, 14 Jul 2014 16:07:35 +0100 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1338654 Title: linux: 3.2.0-67.101 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: Confirmed Status in Kernel SRU Workflow package-testing series: Fix Released Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-lbm series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: In Progress Status in Kernel SRU Workflow verification-testing series: Fix Released Status in “linux” package in Ubuntu: Invalid Status in “linux” source package in Precise: Fix Released Bug description: This bug is for tracking the 3.2.0-67.100 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Monday, 07. July 2014 16:11 UTC kernel-stable-Prepare-package-end:Tuesday, 08. July 2014 04:12 UTC kernel-stable-Promote-to-proposed-start:Tuesday, 08. July 2014 04:12 UTC ppa-package-testing-start:Tuesday, 08. July 2014 04:12 UTC kernel-stable-Promote-to-proposed-end:Wednesday, 09. July 2014 22:01 UTC kernel-stable-Verification-testing-start:Wednesday, 09. July 2014 23:01 UTC kernel-stable-Certification-testing-start:Wednesday, 09. July 2014 23:01 UTC kernel-stable-Security-signoff-start:Wednesday, 09. July 2014 23:01 UTC kernel-stable-Regression-testing-start:Wednesday, 09. July 2014 23:01 UTC kernel-stable-Regression-testing-end:Friday, 11. July 2014 22:03 UTC kernel-stable-phase:Testing kernel-stable-phase-changed:Monday, 14. July 2014 13:04 UTC kernel-stable-Verification-testing-end:Monday, 14. July 2014 13:04 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1338654/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1338946] Re: linux: 2.6.32-64.128 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Status: New = Fix Released ** Changed in: kernel-sru-workflow/promote-to-security Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Adam Conrad (adconrad) ** Changed in: kernel-sru-workflow/promote-to-updates Status: New = Fix Released ** Changed in: kernel-sru-workflow/promote-to-updates Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Adam Conrad (adconrad) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1338946 Title: linux: 2.6.32-64.128 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: Confirmed Status in Kernel SRU Workflow package-testing series: Fix Released Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-lbm series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-ports-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Fix Released Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: In Progress Status in Kernel SRU Workflow verification-testing series: Fix Released Status in “linux” package in Ubuntu: Invalid Status in “linux” source package in Lucid: Fix Released Bug description: This bug is for tracking the 2.6.32-64.127 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 08. July 2014 08:49 UTC kernel-stable-Prepare-package-end:Tuesday, 08. July 2014 17:10 UTC kernel-stable-Promote-to-proposed-start:Tuesday, 08. July 2014 17:10 UTC ppa-package-testing-start:Tuesday, 08. July 2014 17:10 UTC kernel-stable-Promote-to-proposed-end:Wednesday, 09. July 2014 16:05 UTC kernel-stable-Verification-testing-start:Wednesday, 09. July 2014 18:04 UTC kernel-stable-Certification-testing-start:Wednesday, 09. July 2014 18:05 UTC kernel-stable-Security-signoff-start:Wednesday, 09. July 2014 18:06 UTC kernel-stable-Regression-testing-start:Wednesday, 09. July 2014 18:06 UTC kernel-stable-Regression-testing-end:Saturday, 12. July 2014 16:02 UTC kernel-stable-phase:Testing kernel-stable-phase-changed:Monday, 14. July 2014 13:05 UTC kernel-stable-Verification-testing-end:Monday, 14. July 2014 13:05 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1338946/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1337339] Re: x86_64, ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699)
This bug was fixed in the package linux-armadaxp - 3.2.0-1636.53 --- linux-armadaxp (3.2.0-1636.53) precise; urgency=low [ Andy Whitcroft ] * rebase to Ubuntu-3.2.0-67.101 [ Ubuntu: 3.2.0-67.101 ] * l2tp: Privilege escalation in ppp over l2tp sockets - LP: #1341472 - CVE-2014-4943 linux-armadaxp (3.2.0-1636.52) precise; urgency=low [ Ike Panhc ] * Release Tracking Bug - LP: #1338870 * Rebase to Ubuntu-3.2.0-67.100 [ Ubuntu: 3.2.0-67.100 ] * Merged back Ubuntu-3.2.0-65.99 security release * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699) - LP: #1337339 * Release Tracking Bug - LP: #1338654 * ptrace,x86: force IRET path after a ptrace_stop() - LP: #1337339 - CVE-2014-4699 linux-armadaxp (3.2.0-1636.51) precise-proposed; urgency=low [ Ike Panhc ] * Release Tracking Bug - LP: #1336144 * Rebase to Ubuntu-3.2.0-66.99 [ Ubuntu: 3.2.0-66.99 ] * Release Tracking Bug - LP: #1335906 * skbuff: export skb_copy_ubufs - LP: #1298119 - CVE-2014-0131 * skbuff: add an api to orphan frags - LP: #1298119 - CVE-2014-0131 * skbuff: skb_segment: orphan frags before copying - LP: #1298119 - CVE-2014-0131 * lib/lzo: Rename lzo1x_decompress.c to lzo1x_decompress_safe.c - CVE-2014-4608 * lib/lzo: Update LZO compression to current upstream version - CVE-2014-4608 * lzo: properly check for overruns - CVE-2014-4608 * KVM: x86 emulator: add support for vector alignment - LP: #1330177 * KVM: x86: emulate movdqa - LP: #1330177 -- Andy Whitcroft a...@canonical.com Tue, 15 Jul 2014 10:19:39 +0100 ** Changed in: linux-armadaxp (Ubuntu) Status: New = Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-0131 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-4608 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-4943 ** Changed in: linux-ti-omap4 (Ubuntu) Status: New = Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1337339 Title: x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699) Status in “linux” package in Ubuntu: New Status in “linux-armadaxp” package in Ubuntu: Fix Released Status in “linux-ec2” package in Ubuntu: Fix Released Status in “linux-fsl-imx51” package in Ubuntu: New Status in “linux-lts-quantal” package in Ubuntu: Fix Released Status in “linux-lts-raring” package in Ubuntu: Fix Released Status in “linux-lts-saucy” package in Ubuntu: Fix Released Status in “linux-mvl-dove” package in Ubuntu: New Status in “linux-ti-omap4” package in Ubuntu: Fix Released Status in “linux” source package in Lucid: Fix Released Status in “linux” source package in Precise: Fix Released Status in “linux” source package in Saucy: Fix Released Status in “linux” source package in Trusty: Fix Released Status in “linux” source package in Utopic: New Bug description: The Linux kernel before 3.15.4 on Intel processors does not properly restrict use of a non-canonical value for the saved RIP address in the case of a system call that does not use IRET, which allows local users to leverage a race condition and gain privileges, or cause a denial of service (double fault), via a crafted application that makes ptrace and fork system calls. Break-Fix: 427abfa28afedffadfca9dd8b067eb6d36bac53f b9cd18de4db3c9ffa7e17b0dc0ca99ed5aa4d43a To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1337339/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1337339] Re: x86_64, ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699)
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1451.71 --- linux-ti-omap4 (3.2.0-1451.71) precise; urgency=low [ Luis Henriques ] * Rebased to 3.2.0-67.101 [ Ubuntu: 3.2.0-67.101 ] * l2tp: Privilege escalation in ppp over l2tp sockets - LP: #1341472 - CVE-2014-4943 [ Ubuntu: 3.2.0-67.100 ] * Merged back Ubuntu-3.2.0-65.99 security release * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699) - LP: #1337339 * Release Tracking Bug - LP: #1338654 * ptrace,x86: force IRET path after a ptrace_stop() - LP: #1337339 - CVE-2014-4699 linux-ti-omap4 (3.2.0-1451.70) precise; urgency=low * Release Tracking Bug - LP: #1336143 [ Paolo Pisati ] * rebased on Ubuntu-3.2.0-66.99 [ Ubuntu: 3.2.0-66.99 ] * Release Tracking Bug - LP: #1335906 * skbuff: export skb_copy_ubufs - LP: #1298119 - CVE-2014-0131 * skbuff: add an api to orphan frags - LP: #1298119 - CVE-2014-0131 * skbuff: skb_segment: orphan frags before copying - LP: #1298119 - CVE-2014-0131 * lib/lzo: Rename lzo1x_decompress.c to lzo1x_decompress_safe.c - CVE-2014-4608 * lib/lzo: Update LZO compression to current upstream version - CVE-2014-4608 * lzo: properly check for overruns - CVE-2014-4608 * KVM: x86 emulator: add support for vector alignment - LP: #1330177 * KVM: x86: emulate movdqa - LP: #1330177 -- Luis Henriques luis.henriq...@canonical.com Tue, 15 Jul 2014 10:12:30 +0100 ** Changed in: linux-ti-omap4 (Ubuntu) Status: New = Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1337339 Title: x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699) Status in “linux” package in Ubuntu: New Status in “linux-armadaxp” package in Ubuntu: Fix Released Status in “linux-ec2” package in Ubuntu: Fix Released Status in “linux-fsl-imx51” package in Ubuntu: New Status in “linux-lts-quantal” package in Ubuntu: Fix Released Status in “linux-lts-raring” package in Ubuntu: Fix Released Status in “linux-lts-saucy” package in Ubuntu: Fix Released Status in “linux-mvl-dove” package in Ubuntu: New Status in “linux-ti-omap4” package in Ubuntu: Fix Released Status in “linux” source package in Lucid: Fix Released Status in “linux” source package in Precise: Fix Released Status in “linux” source package in Saucy: Fix Released Status in “linux” source package in Trusty: Fix Released Status in “linux” source package in Utopic: New Bug description: The Linux kernel before 3.15.4 on Intel processors does not properly restrict use of a non-canonical value for the saved RIP address in the case of a system call that does not use IRET, which allows local users to leverage a race condition and gain privileges, or cause a denial of service (double fault), via a crafted application that makes ptrace and fork system calls. Break-Fix: 427abfa28afedffadfca9dd8b067eb6d36bac53f b9cd18de4db3c9ffa7e17b0dc0ca99ed5aa4d43a To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1337339/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1338870] Re: linux-armadaxp: 3.2.0-1636.53 -proposed tracker
This bug was fixed in the package linux-armadaxp - 3.2.0-1636.53 --- linux-armadaxp (3.2.0-1636.53) precise; urgency=low [ Andy Whitcroft ] * rebase to Ubuntu-3.2.0-67.101 [ Ubuntu: 3.2.0-67.101 ] * l2tp: Privilege escalation in ppp over l2tp sockets - LP: #1341472 - CVE-2014-4943 linux-armadaxp (3.2.0-1636.52) precise; urgency=low [ Ike Panhc ] * Release Tracking Bug - LP: #1338870 * Rebase to Ubuntu-3.2.0-67.100 [ Ubuntu: 3.2.0-67.100 ] * Merged back Ubuntu-3.2.0-65.99 security release * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699) - LP: #1337339 * Release Tracking Bug - LP: #1338654 * ptrace,x86: force IRET path after a ptrace_stop() - LP: #1337339 - CVE-2014-4699 linux-armadaxp (3.2.0-1636.51) precise-proposed; urgency=low [ Ike Panhc ] * Release Tracking Bug - LP: #1336144 * Rebase to Ubuntu-3.2.0-66.99 [ Ubuntu: 3.2.0-66.99 ] * Release Tracking Bug - LP: #1335906 * skbuff: export skb_copy_ubufs - LP: #1298119 - CVE-2014-0131 * skbuff: add an api to orphan frags - LP: #1298119 - CVE-2014-0131 * skbuff: skb_segment: orphan frags before copying - LP: #1298119 - CVE-2014-0131 * lib/lzo: Rename lzo1x_decompress.c to lzo1x_decompress_safe.c - CVE-2014-4608 * lib/lzo: Update LZO compression to current upstream version - CVE-2014-4608 * lzo: properly check for overruns - CVE-2014-4608 * KVM: x86 emulator: add support for vector alignment - LP: #1330177 * KVM: x86: emulate movdqa - LP: #1330177 -- Andy Whitcroft a...@canonical.com Tue, 15 Jul 2014 10:19:39 +0100 ** Changed in: linux-armadaxp (Ubuntu Precise) Status: In Progress = Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-0131 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-4608 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-4699 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-4943 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1338870 Title: linux-armadaxp: 3.2.0-1636.53 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow package-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Fix Released Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Invalid Status in Kernel SRU Workflow upload-to-ppa series: Invalid Status in Kernel SRU Workflow verification-testing series: Fix Released Status in “linux-armadaxp” package in Ubuntu: Invalid Status in “linux-armadaxp” source package in Precise: Fix Released Bug description: This bug is for tracking the 3.2.0-1636.52 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 08. July 2014 04:06 UTC kernel-stable-master-bug:1338654 kernel-stable-Certification-testing-end:Wednesday, 09. July 2014 07:05 UTC kernel-stable-Security-signoff-end:Wednesday, 09. July 2014 07:05 UTC kernel-stable-Prepare-package-end:Wednesday, 09. July 2014 11:04 UTC kernel-stable-Promote-to-proposed-start:Wednesday, 09. July 2014 11:04 UTC ppa-package-testing-start:Wednesday, 09. July 2014 11:04 UTC kernel-stable-Promote-to-proposed-end:Thursday, 10. July 2014 08:09 UTC kernel-stable-phase:Verification Testing kernel-stable-phase-changed:Thursday, 10. July 2014 09:47 UTC kernel-stable-Verification-testing-start:Thursday, 10. July 2014 09:47 UTC kernel-stable-Regression-testing-start:Thursday, 10. July 2014 09:47 UTC kernel-stable-Regression-testing-end:Saturday, 12. July 2014 15:04 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1338870/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1336144] Re: linux-armadaxp: 3.2.0-1636.51 -proposed tracker
*** This bug is a duplicate of bug 1338870 *** https://bugs.launchpad.net/bugs/1338870 This bug was fixed in the package linux-armadaxp - 3.2.0-1636.53 --- linux-armadaxp (3.2.0-1636.53) precise; urgency=low [ Andy Whitcroft ] * rebase to Ubuntu-3.2.0-67.101 [ Ubuntu: 3.2.0-67.101 ] * l2tp: Privilege escalation in ppp over l2tp sockets - LP: #1341472 - CVE-2014-4943 linux-armadaxp (3.2.0-1636.52) precise; urgency=low [ Ike Panhc ] * Release Tracking Bug - LP: #1338870 * Rebase to Ubuntu-3.2.0-67.100 [ Ubuntu: 3.2.0-67.100 ] * Merged back Ubuntu-3.2.0-65.99 security release * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699) - LP: #1337339 * Release Tracking Bug - LP: #1338654 * ptrace,x86: force IRET path after a ptrace_stop() - LP: #1337339 - CVE-2014-4699 linux-armadaxp (3.2.0-1636.51) precise-proposed; urgency=low [ Ike Panhc ] * Release Tracking Bug - LP: #1336144 * Rebase to Ubuntu-3.2.0-66.99 [ Ubuntu: 3.2.0-66.99 ] * Release Tracking Bug - LP: #1335906 * skbuff: export skb_copy_ubufs - LP: #1298119 - CVE-2014-0131 * skbuff: add an api to orphan frags - LP: #1298119 - CVE-2014-0131 * skbuff: skb_segment: orphan frags before copying - LP: #1298119 - CVE-2014-0131 * lib/lzo: Rename lzo1x_decompress.c to lzo1x_decompress_safe.c - CVE-2014-4608 * lib/lzo: Update LZO compression to current upstream version - CVE-2014-4608 * lzo: properly check for overruns - CVE-2014-4608 * KVM: x86 emulator: add support for vector alignment - LP: #1330177 * KVM: x86: emulate movdqa - LP: #1330177 -- Andy Whitcroft a...@canonical.com Tue, 15 Jul 2014 10:19:39 +0100 ** Changed in: linux-armadaxp (Ubuntu Precise) Status: New = Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-0131 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-4608 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-4699 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-4943 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1336144 Title: linux-armadaxp: 3.2.0-1636.51 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow package-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: In Progress Status in Kernel SRU Workflow security-signoff series: Invalid Status in Kernel SRU Workflow upload-to-ppa series: Invalid Status in Kernel SRU Workflow verification-testing series: In Progress Status in “linux-armadaxp” package in Ubuntu: Invalid Status in “linux-armadaxp” source package in Precise: Fix Released Bug description: This bug is for tracking the 3.2.0-1636.51 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 01. July 2014 04:57 UTC kernel-stable-master-bug:1335906 kernel-stable-Certification-testing-end:Tuesday, 01. July 2014 12:46 UTC kernel-stable-Security-signoff-end:Tuesday, 01. July 2014 12:47 UTC kernel-stable-phase:PPA Testing kernel-stable-phase-changed:Wednesday, 02. July 2014 02:11 UTC kernel-stable-Prepare-package-end:Wednesday, 02. July 2014 02:11 UTC kernel-stable-Promote-to-proposed-start:Wednesday, 02. July 2014 02:11 UTC ppa-package-testing-start:Wednesday, 02. July 2014 02:11 UTC kernel-stable-Promote-to-proposed-end:Thursday, 03. July 2014 18:01 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1336144/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1337339] Re: x86_64, ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699)
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1451.71 --- linux-ti-omap4 (3.2.0-1451.71) precise; urgency=low [ Luis Henriques ] * Rebased to 3.2.0-67.101 [ Ubuntu: 3.2.0-67.101 ] * l2tp: Privilege escalation in ppp over l2tp sockets - LP: #1341472 - CVE-2014-4943 [ Ubuntu: 3.2.0-67.100 ] * Merged back Ubuntu-3.2.0-65.99 security release * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699) - LP: #1337339 * Release Tracking Bug - LP: #1338654 * ptrace,x86: force IRET path after a ptrace_stop() - LP: #1337339 - CVE-2014-4699 linux-ti-omap4 (3.2.0-1451.70) precise; urgency=low * Release Tracking Bug - LP: #1336143 [ Paolo Pisati ] * rebased on Ubuntu-3.2.0-66.99 [ Ubuntu: 3.2.0-66.99 ] * Release Tracking Bug - LP: #1335906 * skbuff: export skb_copy_ubufs - LP: #1298119 - CVE-2014-0131 * skbuff: add an api to orphan frags - LP: #1298119 - CVE-2014-0131 * skbuff: skb_segment: orphan frags before copying - LP: #1298119 - CVE-2014-0131 * lib/lzo: Rename lzo1x_decompress.c to lzo1x_decompress_safe.c - CVE-2014-4608 * lib/lzo: Update LZO compression to current upstream version - CVE-2014-4608 * lzo: properly check for overruns - CVE-2014-4608 * KVM: x86 emulator: add support for vector alignment - LP: #1330177 * KVM: x86: emulate movdqa - LP: #1330177 -- Luis Henriques luis.henriq...@canonical.com Tue, 15 Jul 2014 10:12:30 +0100 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1337339 Title: x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699) Status in “linux” package in Ubuntu: New Status in “linux-armadaxp” package in Ubuntu: Fix Released Status in “linux-ec2” package in Ubuntu: Fix Released Status in “linux-fsl-imx51” package in Ubuntu: New Status in “linux-lts-quantal” package in Ubuntu: Fix Released Status in “linux-lts-raring” package in Ubuntu: Fix Released Status in “linux-lts-saucy” package in Ubuntu: Fix Released Status in “linux-mvl-dove” package in Ubuntu: New Status in “linux-ti-omap4” package in Ubuntu: Fix Released Status in “linux” source package in Lucid: Fix Released Status in “linux” source package in Precise: Fix Released Status in “linux” source package in Saucy: Fix Released Status in “linux” source package in Trusty: Fix Released Status in “linux” source package in Utopic: New Bug description: The Linux kernel before 3.15.4 on Intel processors does not properly restrict use of a non-canonical value for the saved RIP address in the case of a system call that does not use IRET, which allows local users to leverage a race condition and gain privileges, or cause a denial of service (double fault), via a crafted application that makes ptrace and fork system calls. Break-Fix: 427abfa28afedffadfca9dd8b067eb6d36bac53f b9cd18de4db3c9ffa7e17b0dc0ca99ed5aa4d43a To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1337339/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1335313] Re: CVE-2014-4608
This bug was fixed in the package linux-lts-saucy - 3.11.0-26.45~precise1 --- linux-lts-saucy (3.11.0-26.45~precise1) precise; urgency=low [ Upstream Kernel Changes ] * l2tp: Privilege escalation in ppp over l2tp sockets - LP: #1341472 - CVE-2014-4943 linux (3.11.0-26.44) saucy; urgency=low [ Luis Henriques ] * Merged back Ubuntu-3.11.0-24.42 security release * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699) - LP: #1337339 * Release Tracking Bug - LP: #1338556 [ Upstream Kernel Changes ] * ptrace,x86: force IRET path after a ptrace_stop() - LP: #1337339 - CVE-2014-4699 linux (3.11.0-25.43) saucy; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1336203 [ Upstream Kernel Changes ] * cfg80211: free sme on connection failures - LP: #1335084 * sched: Sanitize irq accounting madness - LP: #1335084 * sched: Use CPUPRI_NR_PRIORITIES instead of MAX_RT_PRIO in cpupri check - LP: #1335084 * net: cpsw: fix null dereference at probe - LP: #1335084 * mac80211: fix suspend vs. association race - LP: #1335084 * mac80211: fix on-channel remain-on-channel - LP: #1335084 * af_iucv: wrong mapping of sent and confirmed skbs - LP: #1335084 * net: filter: s390: fix JIT address randomization - LP: #1335084 * perf: Limit perf_event_attr::sample_period to 63 bits - LP: #1335084 * perf: Prevent false warning in perf_swevent_add - LP: #1335084 * drm/gf119-/disp: fix nasty bug which can clobber SOR0's clock setup - LP: #1335084 * drm/radeon: also try GART for CPU accessed buffers - LP: #1335084 * drm/radeon: handle non-VGA class pci devices with ATRM - LP: #1335084 * drm/radeon: fix register typo on si - LP: #1335084 * drm/radeon: avoid segfault on device open when accel is not working. - LP: #1335084 * can: peak_pci: prevent use after free at netdev removal - LP: #1335084 * nfsd4: remove lockowner when removing lock stateid - LP: #1335084 * nfsd4: warn on finding lockowner without stateid's - LP: #1335084 * hwpoison, hugetlb: lock_page/unlock_page does not match for handling a free hugepage - LP: #1335084 * mm/memory-failure.c: fix memory leak by race between poison and unpoison - LP: #1335084 * netfilter: ipv4: defrag: set local_df flag on defragmented skb - LP: #1335084 * ARM: OMAP3: clock: Back-propagate rate change from cam_mclk to dpll4_m5 on all OMAP3 platforms - LP: #1335084 * dma: dw: allow shared interrupts - LP: #1335084 * dmaengine: dw: went back to plain {request,free}_irq() calls - LP: #1335084 * ARM: omap5: hwmod_data: Correct IDLEMODE for McPDM - LP: #1335084 * Input: synaptics - add min/max quirk for the ThinkPad W540 - LP: #1335084 * futex: Add another early deadlock detection check - LP: #1335084 * futex: Prevent attaching to kernel threads - LP: #1335084 * ARM: OMAP4: Fix the boot regression with CPU_IDLE enabled - LP: #1335084 * cpufreq: remove race while accessing cur_policy - LP: #1335084 * cpufreq: cpu0: drop wrong devm usage - LP: #1335084 * ARM: imx: fix error handling in ipu device registration - LP: #1335084 * ALSA: hda - Fix onboard audio on Intel H97/Z97 chipsets - LP: #1335084 * ARM: 8051/1: put_user: fix possible data corruption in put_user - LP: #1335084 * ARM: 8064/1: fix v7-M signal return - LP: #1335084 * Input: synaptics - T540p - unify with other LEN0034 models - LP: #1335084 * drm/i915: Only copy back the modified fields to userspace from execbuffer - LP: #1335084 * dm cache: always split discards on cache block boundaries - LP: #1335084 * powerpc: Fix 64 bit builds with binutils 2.24 - LP: #1335084 * powerpc, kexec: Fix Processor X is stuck issue during kexec from ST mode - LP: #1335084 * rtmutex: Fix deadlock detector for real - LP: #1335084 * drm/radeon: don't allow RADEON_GEM_DOMAIN_CPU for command submission - LP: #1335084 * audit: restore order of tty and ses fields in log output - LP: #1335084 * drm/nouveau/pm/fan: drop the fan lock in fan_update() before rescheduling - LP: #1335084 * leds: leds-pwm: properly clean up after probe failure - LP: #1335084 * clk: vexpress: NULL dereference on error path - LP: #1335084 * fix our current target reap infrastructure - LP: #1335084 * dual scan thread bug fix - LP: #1335084 * genirq: Provide irq_force_affinity fallback for non-SMP - LP: #1335084 * i2c: designware: Mask all interrupts during i2c controller enable - LP: #1335084 * crypto: s390 - fix aes,des ctr mode concurrency finding. - LP: #1335084 * Staging: speakup: Move pasting into a work item - LP: #1335084 * USB: Avoid runtime suspend loops for HCDs that can't handle suspend/resume - LP: #1335084 * can: only rename enabled led triggers when
[Kernel-packages] [Bug 1335314] Re: CVE-2014-4611
This bug was fixed in the package linux-lts-saucy - 3.11.0-26.45~precise1 --- linux-lts-saucy (3.11.0-26.45~precise1) precise; urgency=low [ Upstream Kernel Changes ] * l2tp: Privilege escalation in ppp over l2tp sockets - LP: #1341472 - CVE-2014-4943 linux (3.11.0-26.44) saucy; urgency=low [ Luis Henriques ] * Merged back Ubuntu-3.11.0-24.42 security release * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699) - LP: #1337339 * Release Tracking Bug - LP: #1338556 [ Upstream Kernel Changes ] * ptrace,x86: force IRET path after a ptrace_stop() - LP: #1337339 - CVE-2014-4699 linux (3.11.0-25.43) saucy; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1336203 [ Upstream Kernel Changes ] * cfg80211: free sme on connection failures - LP: #1335084 * sched: Sanitize irq accounting madness - LP: #1335084 * sched: Use CPUPRI_NR_PRIORITIES instead of MAX_RT_PRIO in cpupri check - LP: #1335084 * net: cpsw: fix null dereference at probe - LP: #1335084 * mac80211: fix suspend vs. association race - LP: #1335084 * mac80211: fix on-channel remain-on-channel - LP: #1335084 * af_iucv: wrong mapping of sent and confirmed skbs - LP: #1335084 * net: filter: s390: fix JIT address randomization - LP: #1335084 * perf: Limit perf_event_attr::sample_period to 63 bits - LP: #1335084 * perf: Prevent false warning in perf_swevent_add - LP: #1335084 * drm/gf119-/disp: fix nasty bug which can clobber SOR0's clock setup - LP: #1335084 * drm/radeon: also try GART for CPU accessed buffers - LP: #1335084 * drm/radeon: handle non-VGA class pci devices with ATRM - LP: #1335084 * drm/radeon: fix register typo on si - LP: #1335084 * drm/radeon: avoid segfault on device open when accel is not working. - LP: #1335084 * can: peak_pci: prevent use after free at netdev removal - LP: #1335084 * nfsd4: remove lockowner when removing lock stateid - LP: #1335084 * nfsd4: warn on finding lockowner without stateid's - LP: #1335084 * hwpoison, hugetlb: lock_page/unlock_page does not match for handling a free hugepage - LP: #1335084 * mm/memory-failure.c: fix memory leak by race between poison and unpoison - LP: #1335084 * netfilter: ipv4: defrag: set local_df flag on defragmented skb - LP: #1335084 * ARM: OMAP3: clock: Back-propagate rate change from cam_mclk to dpll4_m5 on all OMAP3 platforms - LP: #1335084 * dma: dw: allow shared interrupts - LP: #1335084 * dmaengine: dw: went back to plain {request,free}_irq() calls - LP: #1335084 * ARM: omap5: hwmod_data: Correct IDLEMODE for McPDM - LP: #1335084 * Input: synaptics - add min/max quirk for the ThinkPad W540 - LP: #1335084 * futex: Add another early deadlock detection check - LP: #1335084 * futex: Prevent attaching to kernel threads - LP: #1335084 * ARM: OMAP4: Fix the boot regression with CPU_IDLE enabled - LP: #1335084 * cpufreq: remove race while accessing cur_policy - LP: #1335084 * cpufreq: cpu0: drop wrong devm usage - LP: #1335084 * ARM: imx: fix error handling in ipu device registration - LP: #1335084 * ALSA: hda - Fix onboard audio on Intel H97/Z97 chipsets - LP: #1335084 * ARM: 8051/1: put_user: fix possible data corruption in put_user - LP: #1335084 * ARM: 8064/1: fix v7-M signal return - LP: #1335084 * Input: synaptics - T540p - unify with other LEN0034 models - LP: #1335084 * drm/i915: Only copy back the modified fields to userspace from execbuffer - LP: #1335084 * dm cache: always split discards on cache block boundaries - LP: #1335084 * powerpc: Fix 64 bit builds with binutils 2.24 - LP: #1335084 * powerpc, kexec: Fix Processor X is stuck issue during kexec from ST mode - LP: #1335084 * rtmutex: Fix deadlock detector for real - LP: #1335084 * drm/radeon: don't allow RADEON_GEM_DOMAIN_CPU for command submission - LP: #1335084 * audit: restore order of tty and ses fields in log output - LP: #1335084 * drm/nouveau/pm/fan: drop the fan lock in fan_update() before rescheduling - LP: #1335084 * leds: leds-pwm: properly clean up after probe failure - LP: #1335084 * clk: vexpress: NULL dereference on error path - LP: #1335084 * fix our current target reap infrastructure - LP: #1335084 * dual scan thread bug fix - LP: #1335084 * genirq: Provide irq_force_affinity fallback for non-SMP - LP: #1335084 * i2c: designware: Mask all interrupts during i2c controller enable - LP: #1335084 * crypto: s390 - fix aes,des ctr mode concurrency finding. - LP: #1335084 * Staging: speakup: Move pasting into a work item - LP: #1335084 * USB: Avoid runtime suspend loops for HCDs that can't handle suspend/resume - LP: #1335084 * can: only rename enabled led triggers when
[Kernel-packages] [Bug 1298119] Re: CVE-2014-0131
This bug was fixed in the package linux-armadaxp - 3.2.0-1636.53 --- linux-armadaxp (3.2.0-1636.53) precise; urgency=low [ Andy Whitcroft ] * rebase to Ubuntu-3.2.0-67.101 [ Ubuntu: 3.2.0-67.101 ] * l2tp: Privilege escalation in ppp over l2tp sockets - LP: #1341472 - CVE-2014-4943 linux-armadaxp (3.2.0-1636.52) precise; urgency=low [ Ike Panhc ] * Release Tracking Bug - LP: #1338870 * Rebase to Ubuntu-3.2.0-67.100 [ Ubuntu: 3.2.0-67.100 ] * Merged back Ubuntu-3.2.0-65.99 security release * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699) - LP: #1337339 * Release Tracking Bug - LP: #1338654 * ptrace,x86: force IRET path after a ptrace_stop() - LP: #1337339 - CVE-2014-4699 linux-armadaxp (3.2.0-1636.51) precise-proposed; urgency=low [ Ike Panhc ] * Release Tracking Bug - LP: #1336144 * Rebase to Ubuntu-3.2.0-66.99 [ Ubuntu: 3.2.0-66.99 ] * Release Tracking Bug - LP: #1335906 * skbuff: export skb_copy_ubufs - LP: #1298119 - CVE-2014-0131 * skbuff: add an api to orphan frags - LP: #1298119 - CVE-2014-0131 * skbuff: skb_segment: orphan frags before copying - LP: #1298119 - CVE-2014-0131 * lib/lzo: Rename lzo1x_decompress.c to lzo1x_decompress_safe.c - CVE-2014-4608 * lib/lzo: Update LZO compression to current upstream version - CVE-2014-4608 * lzo: properly check for overruns - CVE-2014-4608 * KVM: x86 emulator: add support for vector alignment - LP: #1330177 * KVM: x86: emulate movdqa - LP: #1330177 -- Andy Whitcroft a...@canonical.com Tue, 15 Jul 2014 10:19:39 +0100 ** Changed in: linux-armadaxp (Ubuntu Precise) Status: Fix Committed = Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-4608 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-4699 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-4943 ** Changed in: linux-lts-quantal (Ubuntu Precise) Status: Fix Committed = Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-1739 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-3917 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-4014 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-4027 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1298119 Title: CVE-2014-0131 Status in “linux” package in Ubuntu: Invalid Status in “linux-armadaxp” package in Ubuntu: Invalid Status in “linux-ec2” package in Ubuntu: Invalid Status in “linux-fsl-imx51” package in Ubuntu: Invalid Status in “linux-lts-backport-maverick” package in Ubuntu: Won't Fix Status in “linux-lts-backport-natty” package in Ubuntu: Won't Fix Status in “linux-lts-quantal” package in Ubuntu: Invalid Status in “linux-lts-raring” package in Ubuntu: Invalid Status in “linux-lts-saucy” package in Ubuntu: Invalid Status in “linux-mvl-dove” package in Ubuntu: Invalid Status in “linux-ti-omap4” package in Ubuntu: Invalid Status in “linux” source package in Lucid: Invalid Status in “linux-armadaxp” source package in Lucid: Invalid Status in “linux-ec2” source package in Lucid: Invalid Status in “linux-fsl-imx51” source package in Lucid: Invalid Status in “linux-lts-backport-maverick” source package in Lucid: Won't Fix Status in “linux-lts-backport-natty” source package in Lucid: Won't Fix Status in “linux-lts-quantal” source package in Lucid: Invalid Status in “linux-lts-raring” source package in Lucid: Invalid Status in “linux-lts-saucy” source package in Lucid: Invalid Status in “linux-mvl-dove” source package in Lucid: Invalid Status in “linux-ti-omap4” source package in Lucid: Invalid Status in “linux” source package in Precise: Fix Committed Status in “linux-armadaxp” source package in Precise: Fix Released Status in “linux-ec2” source package in Precise: Invalid Status in “linux-fsl-imx51” source package in Precise: Invalid Status in “linux-lts-backport-maverick” source package in Precise: Won't Fix Status in “linux-lts-backport-natty” source package in Precise: Won't Fix Status in “linux-lts-quantal” source package in Precise: Fix Released Status in “linux-lts-raring” source package in Precise: Fix Released Status in “linux-lts-saucy” source package in Precise: Fix Committed Status in “linux-mvl-dove” source package in Precise: Invalid Status in “linux-ti-omap4” source package in Precise: New Status in “linux-lts-backport-maverick” source package in Quantal: Won't Fix Status in “linux-lts-backport-natty” source package in Quantal: Won't Fix Status in “linux” source package in Saucy: Fix Committed Status in “linux-armadaxp” source package in Saucy: Invalid Status in “linux-ec2” source package in Saucy:
[Kernel-packages] [Bug 1298119] Re: CVE-2014-0131
This bug was fixed in the package linux-lts-quantal - 3.5.0-54.81~precise1 --- linux-lts-quantal (3.5.0-54.81~precise1) precise; urgency=low [ Upstream Kernel Changes ] * l2tp: Privilege escalation in ppp over l2tp sockets - LP: #1341472 - CVE-2014-4943 linux-lts-quantal (3.5.0-54.80~precise1) precise; urgency=low [ Luis Henriques ] * Merged back Ubuntu-lts-3.5.0-52.79 security release * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699) - LP: #1337339 * Release Tracking Bug - LP: #1338611 [ Upstream Kernel Changes ] * ptrace,x86: force IRET path after a ptrace_stop() - LP: #1337339 - CVE-2014-4699 linux-lts-quantal (3.5.0-53.79~precise1) precise; urgency=low [ Joseph Salisbury ] * Release Tracking Bug - LP: #1336400 [ Upstream Kernel Changes ] * skbuff: export skb_copy_ubufs - LP: #1298119 - CVE-2014-0131 * skbuff: add an api to orphan frags - LP: #1298119 - CVE-2014-0131 * skbuff: skb_segment: orphan frags before copying - LP: #1298119 - CVE-2014-0131 * media-device: fix infoleak in ioctl media_enum_entities() - LP: #1333609 - CVE-2014-1739 * auditsc: audit_krule mask accesses need bounds checking - LP: #1325941 - CVE-2014-3917 * userns: Allow chown and setgid preservation - LP: #1329103 - CVE-2014-4014 * fs,userns: Change inode_capable to capable_wrt_inode_uidgid - LP: #1329103 - CVE-2014-4014 * target/rd: Refactor rd_build_device_space + rd_release_device_space - LP: #1333612 - CVE-2014-4027 * lib/lzo: Rename lzo1x_decompress.c to lzo1x_decompress_safe.c - CVE-2014-4608 * lib/lzo: Update LZO compression to current upstream version - CVE-2014-4608 * lzo: properly check for overruns - CVE-2014-4608 -- Luis Henriques luis.henriq...@canonical.com Mon, 14 Jul 2014 15:28:36 +0100 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1298119 Title: CVE-2014-0131 Status in “linux” package in Ubuntu: Invalid Status in “linux-armadaxp” package in Ubuntu: Invalid Status in “linux-ec2” package in Ubuntu: Invalid Status in “linux-fsl-imx51” package in Ubuntu: Invalid Status in “linux-lts-backport-maverick” package in Ubuntu: Won't Fix Status in “linux-lts-backport-natty” package in Ubuntu: Won't Fix Status in “linux-lts-quantal” package in Ubuntu: Invalid Status in “linux-lts-raring” package in Ubuntu: Invalid Status in “linux-lts-saucy” package in Ubuntu: Invalid Status in “linux-mvl-dove” package in Ubuntu: Invalid Status in “linux-ti-omap4” package in Ubuntu: Invalid Status in “linux” source package in Lucid: Invalid Status in “linux-armadaxp” source package in Lucid: Invalid Status in “linux-ec2” source package in Lucid: Invalid Status in “linux-fsl-imx51” source package in Lucid: Invalid Status in “linux-lts-backport-maverick” source package in Lucid: Won't Fix Status in “linux-lts-backport-natty” source package in Lucid: Won't Fix Status in “linux-lts-quantal” source package in Lucid: Invalid Status in “linux-lts-raring” source package in Lucid: Invalid Status in “linux-lts-saucy” source package in Lucid: Invalid Status in “linux-mvl-dove” source package in Lucid: Invalid Status in “linux-ti-omap4” source package in Lucid: Invalid Status in “linux” source package in Precise: Fix Committed Status in “linux-armadaxp” source package in Precise: Fix Released Status in “linux-ec2” source package in Precise: Invalid Status in “linux-fsl-imx51” source package in Precise: Invalid Status in “linux-lts-backport-maverick” source package in Precise: Won't Fix Status in “linux-lts-backport-natty” source package in Precise: Won't Fix Status in “linux-lts-quantal” source package in Precise: Fix Released Status in “linux-lts-raring” source package in Precise: Fix Released Status in “linux-lts-saucy” source package in Precise: Fix Committed Status in “linux-mvl-dove” source package in Precise: Invalid Status in “linux-ti-omap4” source package in Precise: New Status in “linux-lts-backport-maverick” source package in Quantal: Won't Fix Status in “linux-lts-backport-natty” source package in Quantal: Won't Fix Status in “linux” source package in Saucy: Fix Committed Status in “linux-armadaxp” source package in Saucy: Invalid Status in “linux-ec2” source package in Saucy: Invalid Status in “linux-fsl-imx51” source package in Saucy: Invalid Status in “linux-lts-backport-maverick” source package in Saucy: Won't Fix Status in “linux-lts-backport-natty” source package in Saucy: Won't Fix Status in “linux-lts-quantal” source package in Saucy: Invalid Status in “linux-lts-raring” source package in Saucy: Invalid Status in “linux-lts-saucy” source package in Saucy: Invalid Status in “linux-mvl-dove” source package in Saucy: Invalid Status in
[Kernel-packages] [Bug 1333609] Re: CVE-2014-1739
This bug was fixed in the package linux-lts-quantal - 3.5.0-54.81~precise1 --- linux-lts-quantal (3.5.0-54.81~precise1) precise; urgency=low [ Upstream Kernel Changes ] * l2tp: Privilege escalation in ppp over l2tp sockets - LP: #1341472 - CVE-2014-4943 linux-lts-quantal (3.5.0-54.80~precise1) precise; urgency=low [ Luis Henriques ] * Merged back Ubuntu-lts-3.5.0-52.79 security release * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699) - LP: #1337339 * Release Tracking Bug - LP: #1338611 [ Upstream Kernel Changes ] * ptrace,x86: force IRET path after a ptrace_stop() - LP: #1337339 - CVE-2014-4699 linux-lts-quantal (3.5.0-53.79~precise1) precise; urgency=low [ Joseph Salisbury ] * Release Tracking Bug - LP: #1336400 [ Upstream Kernel Changes ] * skbuff: export skb_copy_ubufs - LP: #1298119 - CVE-2014-0131 * skbuff: add an api to orphan frags - LP: #1298119 - CVE-2014-0131 * skbuff: skb_segment: orphan frags before copying - LP: #1298119 - CVE-2014-0131 * media-device: fix infoleak in ioctl media_enum_entities() - LP: #1333609 - CVE-2014-1739 * auditsc: audit_krule mask accesses need bounds checking - LP: #1325941 - CVE-2014-3917 * userns: Allow chown and setgid preservation - LP: #1329103 - CVE-2014-4014 * fs,userns: Change inode_capable to capable_wrt_inode_uidgid - LP: #1329103 - CVE-2014-4014 * target/rd: Refactor rd_build_device_space + rd_release_device_space - LP: #1333612 - CVE-2014-4027 * lib/lzo: Rename lzo1x_decompress.c to lzo1x_decompress_safe.c - CVE-2014-4608 * lib/lzo: Update LZO compression to current upstream version - CVE-2014-4608 * lzo: properly check for overruns - CVE-2014-4608 -- Luis Henriques luis.henriq...@canonical.com Mon, 14 Jul 2014 15:28:36 +0100 ** Changed in: linux-lts-quantal (Ubuntu Precise) Status: Fix Committed = Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-0131 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-3917 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-4014 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-4027 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-4608 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-4699 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-4943 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1333609 Title: CVE-2014-1739 Status in “linux” package in Ubuntu: Invalid Status in “linux-armadaxp” package in Ubuntu: Invalid Status in “linux-ec2” package in Ubuntu: Invalid Status in “linux-fsl-imx51” package in Ubuntu: Invalid Status in “linux-lts-backport-maverick” package in Ubuntu: New Status in “linux-lts-backport-natty” package in Ubuntu: New Status in “linux-lts-quantal” package in Ubuntu: Invalid Status in “linux-lts-raring” package in Ubuntu: Invalid Status in “linux-lts-saucy” package in Ubuntu: Invalid Status in “linux-mvl-dove” package in Ubuntu: Invalid Status in “linux-ti-omap4” package in Ubuntu: Invalid Status in “linux” source package in Lucid: Invalid Status in “linux-armadaxp” source package in Lucid: Invalid Status in “linux-ec2” source package in Lucid: Invalid Status in “linux-fsl-imx51” source package in Lucid: Invalid Status in “linux-lts-backport-maverick” source package in Lucid: Won't Fix Status in “linux-lts-backport-natty” source package in Lucid: Won't Fix Status in “linux-lts-quantal” source package in Lucid: Invalid Status in “linux-lts-raring” source package in Lucid: Invalid Status in “linux-lts-saucy” source package in Lucid: Invalid Status in “linux-mvl-dove” source package in Lucid: Invalid Status in “linux-ti-omap4” source package in Lucid: Invalid Status in “linux” source package in Precise: Fix Released Status in “linux-armadaxp” source package in Precise: Fix Released Status in “linux-ec2” source package in Precise: Invalid Status in “linux-fsl-imx51” source package in Precise: Invalid Status in “linux-lts-backport-maverick” source package in Precise: Won't Fix Status in “linux-lts-backport-natty” source package in Precise: Won't Fix Status in “linux-lts-quantal” source package in Precise: Fix Released Status in “linux-lts-raring” source package in Precise: Fix Committed Status in “linux-lts-saucy” source package in Precise: Fix Released Status in “linux-mvl-dove” source package in Precise: Invalid Status in “linux-ti-omap4” source package in Precise: Fix Released Status in “linux” source package in Saucy: Fix Released Status in “linux-armadaxp” source package in Saucy: Invalid Status in “linux-ec2” source package in Saucy: Invalid Status in
[Kernel-packages] [Bug 1329103] Re: CVE-2014-4014
This bug was fixed in the package linux-lts-quantal - 3.5.0-54.81~precise1 --- linux-lts-quantal (3.5.0-54.81~precise1) precise; urgency=low [ Upstream Kernel Changes ] * l2tp: Privilege escalation in ppp over l2tp sockets - LP: #1341472 - CVE-2014-4943 linux-lts-quantal (3.5.0-54.80~precise1) precise; urgency=low [ Luis Henriques ] * Merged back Ubuntu-lts-3.5.0-52.79 security release * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699) - LP: #1337339 * Release Tracking Bug - LP: #1338611 [ Upstream Kernel Changes ] * ptrace,x86: force IRET path after a ptrace_stop() - LP: #1337339 - CVE-2014-4699 linux-lts-quantal (3.5.0-53.79~precise1) precise; urgency=low [ Joseph Salisbury ] * Release Tracking Bug - LP: #1336400 [ Upstream Kernel Changes ] * skbuff: export skb_copy_ubufs - LP: #1298119 - CVE-2014-0131 * skbuff: add an api to orphan frags - LP: #1298119 - CVE-2014-0131 * skbuff: skb_segment: orphan frags before copying - LP: #1298119 - CVE-2014-0131 * media-device: fix infoleak in ioctl media_enum_entities() - LP: #1333609 - CVE-2014-1739 * auditsc: audit_krule mask accesses need bounds checking - LP: #1325941 - CVE-2014-3917 * userns: Allow chown and setgid preservation - LP: #1329103 - CVE-2014-4014 * fs,userns: Change inode_capable to capable_wrt_inode_uidgid - LP: #1329103 - CVE-2014-4014 * target/rd: Refactor rd_build_device_space + rd_release_device_space - LP: #1333612 - CVE-2014-4027 * lib/lzo: Rename lzo1x_decompress.c to lzo1x_decompress_safe.c - CVE-2014-4608 * lib/lzo: Update LZO compression to current upstream version - CVE-2014-4608 * lzo: properly check for overruns - CVE-2014-4608 -- Luis Henriques luis.henriq...@canonical.com Mon, 14 Jul 2014 15:28:36 +0100 ** Changed in: linux-lts-quantal (Ubuntu Precise) Status: Fix Committed = Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-0131 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-1739 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-3917 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-4027 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-4608 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-4699 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-4943 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1329103 Title: CVE-2014-4014 Status in “linux” package in Ubuntu: Fix Committed Status in “linux-armadaxp” package in Ubuntu: Invalid Status in “linux-ec2” package in Ubuntu: Invalid Status in “linux-fsl-imx51” package in Ubuntu: Invalid Status in “linux-lts-backport-maverick” package in Ubuntu: New Status in “linux-lts-backport-natty” package in Ubuntu: New Status in “linux-lts-quantal” package in Ubuntu: Invalid Status in “linux-lts-raring” package in Ubuntu: Invalid Status in “linux-lts-saucy” package in Ubuntu: Invalid Status in “linux-mvl-dove” package in Ubuntu: Invalid Status in “linux-ti-omap4” package in Ubuntu: Invalid Status in “linux” source package in Lucid: New Status in “linux-armadaxp” source package in Lucid: Invalid Status in “linux-ec2” source package in Lucid: New Status in “linux-fsl-imx51” source package in Lucid: Invalid Status in “linux-lts-backport-maverick” source package in Lucid: Won't Fix Status in “linux-lts-backport-natty” source package in Lucid: Won't Fix Status in “linux-lts-quantal” source package in Lucid: Invalid Status in “linux-lts-raring” source package in Lucid: Invalid Status in “linux-lts-saucy” source package in Lucid: Invalid Status in “linux-mvl-dove” source package in Lucid: Invalid Status in “linux-ti-omap4” source package in Lucid: Invalid Status in “linux” source package in Precise: New Status in “linux-armadaxp” source package in Precise: New Status in “linux-ec2” source package in Precise: Invalid Status in “linux-fsl-imx51” source package in Precise: Invalid Status in “linux-lts-backport-maverick” source package in Precise: Won't Fix Status in “linux-lts-backport-natty” source package in Precise: Won't Fix Status in “linux-lts-quantal” source package in Precise: Fix Released Status in “linux-lts-raring” source package in Precise: Fix Released Status in “linux-lts-saucy” source package in Precise: Fix Committed Status in “linux-mvl-dove” source package in Precise: Invalid Status in “linux-ti-omap4” source package in Precise: New Status in “linux” source package in Saucy: Fix Committed Status in “linux-armadaxp” source package in Saucy: Invalid Status in “linux-ec2” source package in Saucy: Invalid Status in “linux-fsl-imx51” source package
[Kernel-packages] [Bug 1333612] Re: CVE-2014-4027
This bug was fixed in the package linux-lts-quantal - 3.5.0-54.81~precise1 --- linux-lts-quantal (3.5.0-54.81~precise1) precise; urgency=low [ Upstream Kernel Changes ] * l2tp: Privilege escalation in ppp over l2tp sockets - LP: #1341472 - CVE-2014-4943 linux-lts-quantal (3.5.0-54.80~precise1) precise; urgency=low [ Luis Henriques ] * Merged back Ubuntu-lts-3.5.0-52.79 security release * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699) - LP: #1337339 * Release Tracking Bug - LP: #1338611 [ Upstream Kernel Changes ] * ptrace,x86: force IRET path after a ptrace_stop() - LP: #1337339 - CVE-2014-4699 linux-lts-quantal (3.5.0-53.79~precise1) precise; urgency=low [ Joseph Salisbury ] * Release Tracking Bug - LP: #1336400 [ Upstream Kernel Changes ] * skbuff: export skb_copy_ubufs - LP: #1298119 - CVE-2014-0131 * skbuff: add an api to orphan frags - LP: #1298119 - CVE-2014-0131 * skbuff: skb_segment: orphan frags before copying - LP: #1298119 - CVE-2014-0131 * media-device: fix infoleak in ioctl media_enum_entities() - LP: #1333609 - CVE-2014-1739 * auditsc: audit_krule mask accesses need bounds checking - LP: #1325941 - CVE-2014-3917 * userns: Allow chown and setgid preservation - LP: #1329103 - CVE-2014-4014 * fs,userns: Change inode_capable to capable_wrt_inode_uidgid - LP: #1329103 - CVE-2014-4014 * target/rd: Refactor rd_build_device_space + rd_release_device_space - LP: #1333612 - CVE-2014-4027 * lib/lzo: Rename lzo1x_decompress.c to lzo1x_decompress_safe.c - CVE-2014-4608 * lib/lzo: Update LZO compression to current upstream version - CVE-2014-4608 * lzo: properly check for overruns - CVE-2014-4608 -- Luis Henriques luis.henriq...@canonical.com Mon, 14 Jul 2014 15:28:36 +0100 ** Changed in: linux-lts-quantal (Ubuntu Precise) Status: Fix Committed = Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-0131 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-1739 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-3917 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-4014 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-4608 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-4699 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-4943 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1333612 Title: CVE-2014-4027 Status in “linux” package in Ubuntu: Invalid Status in “linux-armadaxp” package in Ubuntu: Invalid Status in “linux-ec2” package in Ubuntu: Invalid Status in “linux-fsl-imx51” package in Ubuntu: Invalid Status in “linux-lts-backport-maverick” package in Ubuntu: New Status in “linux-lts-backport-natty” package in Ubuntu: New Status in “linux-lts-quantal” package in Ubuntu: Invalid Status in “linux-lts-raring” package in Ubuntu: Invalid Status in “linux-lts-saucy” package in Ubuntu: Invalid Status in “linux-mvl-dove” package in Ubuntu: Invalid Status in “linux-ti-omap4” package in Ubuntu: Invalid Status in “linux” source package in Lucid: New Status in “linux-armadaxp” source package in Lucid: Invalid Status in “linux-ec2” source package in Lucid: New Status in “linux-fsl-imx51” source package in Lucid: Invalid Status in “linux-lts-backport-maverick” source package in Lucid: Won't Fix Status in “linux-lts-backport-natty” source package in Lucid: Won't Fix Status in “linux-lts-quantal” source package in Lucid: Invalid Status in “linux-lts-raring” source package in Lucid: Invalid Status in “linux-lts-saucy” source package in Lucid: Invalid Status in “linux-mvl-dove” source package in Lucid: Invalid Status in “linux-ti-omap4” source package in Lucid: Invalid Status in “linux” source package in Precise: New Status in “linux-armadaxp” source package in Precise: New Status in “linux-ec2” source package in Precise: Invalid Status in “linux-fsl-imx51” source package in Precise: Invalid Status in “linux-lts-backport-maverick” source package in Precise: Won't Fix Status in “linux-lts-backport-natty” source package in Precise: Won't Fix Status in “linux-lts-quantal” source package in Precise: Fix Released Status in “linux-lts-raring” source package in Precise: New Status in “linux-lts-saucy” source package in Precise: New Status in “linux-mvl-dove” source package in Precise: Invalid Status in “linux-ti-omap4” source package in Precise: New Status in “linux” source package in Saucy: New Status in “linux-armadaxp” source package in Saucy: Invalid Status in “linux-ec2” source package in Saucy: Invalid Status in “linux-fsl-imx51” source package in Saucy: Invalid Status in
[Kernel-packages] [Bug 1325941] Re: CVE-2014-3917
This bug was fixed in the package linux-lts-quantal - 3.5.0-54.81~precise1 --- linux-lts-quantal (3.5.0-54.81~precise1) precise; urgency=low [ Upstream Kernel Changes ] * l2tp: Privilege escalation in ppp over l2tp sockets - LP: #1341472 - CVE-2014-4943 linux-lts-quantal (3.5.0-54.80~precise1) precise; urgency=low [ Luis Henriques ] * Merged back Ubuntu-lts-3.5.0-52.79 security release * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699) - LP: #1337339 * Release Tracking Bug - LP: #1338611 [ Upstream Kernel Changes ] * ptrace,x86: force IRET path after a ptrace_stop() - LP: #1337339 - CVE-2014-4699 linux-lts-quantal (3.5.0-53.79~precise1) precise; urgency=low [ Joseph Salisbury ] * Release Tracking Bug - LP: #1336400 [ Upstream Kernel Changes ] * skbuff: export skb_copy_ubufs - LP: #1298119 - CVE-2014-0131 * skbuff: add an api to orphan frags - LP: #1298119 - CVE-2014-0131 * skbuff: skb_segment: orphan frags before copying - LP: #1298119 - CVE-2014-0131 * media-device: fix infoleak in ioctl media_enum_entities() - LP: #1333609 - CVE-2014-1739 * auditsc: audit_krule mask accesses need bounds checking - LP: #1325941 - CVE-2014-3917 * userns: Allow chown and setgid preservation - LP: #1329103 - CVE-2014-4014 * fs,userns: Change inode_capable to capable_wrt_inode_uidgid - LP: #1329103 - CVE-2014-4014 * target/rd: Refactor rd_build_device_space + rd_release_device_space - LP: #1333612 - CVE-2014-4027 * lib/lzo: Rename lzo1x_decompress.c to lzo1x_decompress_safe.c - CVE-2014-4608 * lib/lzo: Update LZO compression to current upstream version - CVE-2014-4608 * lzo: properly check for overruns - CVE-2014-4608 -- Luis Henriques luis.henriq...@canonical.com Mon, 14 Jul 2014 15:28:36 +0100 ** Changed in: linux-lts-quantal (Ubuntu Precise) Status: Fix Committed = Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-0131 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-1739 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-4014 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-4027 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-4608 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-4699 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-4943 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1325941 Title: CVE-2014-3917 Status in “linux” package in Ubuntu: Fix Committed Status in “linux-armadaxp” package in Ubuntu: Invalid Status in “linux-ec2” package in Ubuntu: Invalid Status in “linux-fsl-imx51” package in Ubuntu: Invalid Status in “linux-lts-backport-maverick” package in Ubuntu: New Status in “linux-lts-backport-natty” package in Ubuntu: New Status in “linux-lts-quantal” package in Ubuntu: Invalid Status in “linux-lts-raring” package in Ubuntu: Invalid Status in “linux-lts-saucy” package in Ubuntu: Invalid Status in “linux-lts-trusty” package in Ubuntu: Invalid Status in “linux-mvl-dove” package in Ubuntu: Invalid Status in “linux-ti-omap4” package in Ubuntu: Invalid Status in “linux” source package in Lucid: Fix Committed Status in “linux-armadaxp” source package in Lucid: Invalid Status in “linux-ec2” source package in Lucid: Fix Committed Status in “linux-fsl-imx51” source package in Lucid: Invalid Status in “linux-lts-backport-maverick” source package in Lucid: Won't Fix Status in “linux-lts-backport-natty” source package in Lucid: Won't Fix Status in “linux-lts-quantal” source package in Lucid: Invalid Status in “linux-lts-raring” source package in Lucid: Invalid Status in “linux-lts-saucy” source package in Lucid: Invalid Status in “linux-lts-trusty” source package in Lucid: Invalid Status in “linux-mvl-dove” source package in Lucid: Invalid Status in “linux-ti-omap4” source package in Lucid: Invalid Status in “linux” source package in Precise: New Status in “linux-armadaxp” source package in Precise: New Status in “linux-ec2” source package in Precise: Invalid Status in “linux-fsl-imx51” source package in Precise: Invalid Status in “linux-lts-backport-maverick” source package in Precise: Won't Fix Status in “linux-lts-backport-natty” source package in Precise: Won't Fix Status in “linux-lts-quantal” source package in Precise: Fix Released Status in “linux-lts-raring” source package in Precise: Fix Released Status in “linux-lts-saucy” source package in Precise: Fix Committed Status in “linux-lts-trusty” source package in Precise: New Status in “linux-mvl-dove” source package in Precise: Invalid Status in “linux-ti-omap4” source package in Precise: New Status in
[Kernel-packages] [Bug 1298119] Re: CVE-2014-0131
This bug was fixed in the package linux-lts-quantal - 3.5.0-54.81~precise1 --- linux-lts-quantal (3.5.0-54.81~precise1) precise; urgency=low [ Upstream Kernel Changes ] * l2tp: Privilege escalation in ppp over l2tp sockets - LP: #1341472 - CVE-2014-4943 linux-lts-quantal (3.5.0-54.80~precise1) precise; urgency=low [ Luis Henriques ] * Merged back Ubuntu-lts-3.5.0-52.79 security release * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699) - LP: #1337339 * Release Tracking Bug - LP: #1338611 [ Upstream Kernel Changes ] * ptrace,x86: force IRET path after a ptrace_stop() - LP: #1337339 - CVE-2014-4699 linux-lts-quantal (3.5.0-53.79~precise1) precise; urgency=low [ Joseph Salisbury ] * Release Tracking Bug - LP: #1336400 [ Upstream Kernel Changes ] * skbuff: export skb_copy_ubufs - LP: #1298119 - CVE-2014-0131 * skbuff: add an api to orphan frags - LP: #1298119 - CVE-2014-0131 * skbuff: skb_segment: orphan frags before copying - LP: #1298119 - CVE-2014-0131 * media-device: fix infoleak in ioctl media_enum_entities() - LP: #1333609 - CVE-2014-1739 * auditsc: audit_krule mask accesses need bounds checking - LP: #1325941 - CVE-2014-3917 * userns: Allow chown and setgid preservation - LP: #1329103 - CVE-2014-4014 * fs,userns: Change inode_capable to capable_wrt_inode_uidgid - LP: #1329103 - CVE-2014-4014 * target/rd: Refactor rd_build_device_space + rd_release_device_space - LP: #1333612 - CVE-2014-4027 * lib/lzo: Rename lzo1x_decompress.c to lzo1x_decompress_safe.c - CVE-2014-4608 * lib/lzo: Update LZO compression to current upstream version - CVE-2014-4608 * lzo: properly check for overruns - CVE-2014-4608 -- Luis Henriques luis.henriq...@canonical.com Mon, 14 Jul 2014 15:28:36 +0100 ** Changed in: linux-lts-quantal (Ubuntu Precise) Status: Fix Committed = Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1298119 Title: CVE-2014-0131 Status in “linux” package in Ubuntu: Invalid Status in “linux-armadaxp” package in Ubuntu: Invalid Status in “linux-ec2” package in Ubuntu: Invalid Status in “linux-fsl-imx51” package in Ubuntu: Invalid Status in “linux-lts-backport-maverick” package in Ubuntu: Won't Fix Status in “linux-lts-backport-natty” package in Ubuntu: Won't Fix Status in “linux-lts-quantal” package in Ubuntu: Invalid Status in “linux-lts-raring” package in Ubuntu: Invalid Status in “linux-lts-saucy” package in Ubuntu: Invalid Status in “linux-mvl-dove” package in Ubuntu: Invalid Status in “linux-ti-omap4” package in Ubuntu: Invalid Status in “linux” source package in Lucid: Invalid Status in “linux-armadaxp” source package in Lucid: Invalid Status in “linux-ec2” source package in Lucid: Invalid Status in “linux-fsl-imx51” source package in Lucid: Invalid Status in “linux-lts-backport-maverick” source package in Lucid: Won't Fix Status in “linux-lts-backport-natty” source package in Lucid: Won't Fix Status in “linux-lts-quantal” source package in Lucid: Invalid Status in “linux-lts-raring” source package in Lucid: Invalid Status in “linux-lts-saucy” source package in Lucid: Invalid Status in “linux-mvl-dove” source package in Lucid: Invalid Status in “linux-ti-omap4” source package in Lucid: Invalid Status in “linux” source package in Precise: Fix Committed Status in “linux-armadaxp” source package in Precise: Fix Released Status in “linux-ec2” source package in Precise: Invalid Status in “linux-fsl-imx51” source package in Precise: Invalid Status in “linux-lts-backport-maverick” source package in Precise: Won't Fix Status in “linux-lts-backport-natty” source package in Precise: Won't Fix Status in “linux-lts-quantal” source package in Precise: Fix Released Status in “linux-lts-raring” source package in Precise: Fix Released Status in “linux-lts-saucy” source package in Precise: Fix Committed Status in “linux-mvl-dove” source package in Precise: Invalid Status in “linux-ti-omap4” source package in Precise: New Status in “linux-lts-backport-maverick” source package in Quantal: Won't Fix Status in “linux-lts-backport-natty” source package in Quantal: Won't Fix Status in “linux” source package in Saucy: Fix Committed Status in “linux-armadaxp” source package in Saucy: Invalid Status in “linux-ec2” source package in Saucy: Invalid Status in “linux-fsl-imx51” source package in Saucy: Invalid Status in “linux-lts-backport-maverick” source package in Saucy: Won't Fix Status in “linux-lts-backport-natty” source package in Saucy: Won't Fix Status in “linux-lts-quantal” source package in Saucy: Invalid Status in “linux-lts-raring” source package in Saucy: Invalid Status in “linux-lts-saucy” source package
[Kernel-packages] [Bug 1298119] Re: CVE-2014-0131
This bug was fixed in the package linux-lts-raring - 3.8.0-44.66~precise1 --- linux-lts-raring (3.8.0-44.66~precise1) precise; urgency=low [ Upstream Kernel Changes ] * l2tp: Privilege escalation in ppp over l2tp sockets - LP: #1341472 - CVE-2014-4943 linux-lts-raring (3.8.0-44.65~precise1) precise; urgency=low [ Luis Henriques ] * Merged back Ubuntu-lts-3.8.0-42.63 security release * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699) - LP: #1337339 * Release Tracking Bug - LP: #1338579 [ Upstream Kernel Changes ] * ptrace,x86: force IRET path after a ptrace_stop() - LP: #1337339 - CVE-2014-4699 linux-lts-raring (3.8.0-43.64~precise1) precise; urgency=low [ Kamal Mostafa ] * Revert ARM: OMAP3: clock: Back-propagate rate change from cam_mclk to dpll4_m5 on all OMAP3 platforms * Release Tracking Bug - re-used previous tracking bug linux-lts-raring (3.8.0-43.63~precise1) precise; urgency=low [ Kamal Mostafa ] * [Config] add debian/gbp.conf * Release Tracking Bug - LP: #1335912 [ Upstream Kernel Changes ] * Revert USB: serial: add usbid for dell wwan card to sierra.c - LP: #1333900 * Revert macvlan : fix checksums error when we are in bridge mode - LP: #1333900 * auditsc: audit_krule mask accesses need bounds checking - LP: #1325941 - CVE-2014-3917 * fs, userns: Change inode_capable to capable_wrt_inode_uidgid - LP: #1329103 - CVE-2014-4014 * ACPI / EC: Clear stale EC events on Samsung systems - LP: #1333900 * ACPI / EC: Process rather than discard events in acpi_ec_clear - LP: #1333900 * mac80211: fix software remain-on-channel implementation - LP: #1333900 * mac80211: exclude AP_VLAN interfaces from tx power calculation - LP: #1333900 * parisc: fix epoll_pwait syscall on compat kernel - LP: #1333900 * ALSA: hda/realtek - Add support of ALC288 codec - LP: #1333900 * user namespace: fix incorrect memory barriers - LP: #1333900 * mlx4_en: don't use napi_synchronize inside mlx4_en_netpoll - LP: #1333900 * mei: ignore client writing state during cb completion - LP: #1333900 * staging: r8712u: Fix case where ethtype was never obtained and always be checked against 0 - LP: #1333900 * USB: serial: ftdi_sio: add id for Brainboxes serial cards - LP: #1333900 * usb: option driver, add support for Telit UE910v2 - LP: #1333900 * USB: cp210x: Add 8281 (Nanotec Plug Drive) - LP: #1333900 * USB: pl2303: add ids for Hewlett-Packard HP POS pole displays - LP: #1333900 * USB: usb_wwan: fix handling of missing bulk endpoints - LP: #1333900 * USB: fix crash during hotplug of PCI USB controller card - LP: #1333900 * USB: cdc-acm: Remove Motorola/Telit H24 serial interfaces from ACM driver - LP: #1333900 * drm/radeon: memory leak on bo reservation failure. v2 - LP: #1333900 * drm/radeon/si: make sure mc ucode is loaded before checking the size - LP: #1333900 * mm/hugetlb.c: add cond_resched_lock() in return_unused_surplus_pages() - LP: #1333900 * mm: use paravirt friendly ops for NUMA hinting ptes - LP: #1333900 * iio: querying buffer scan_mask should return 0/1 - LP: #1333900 * pata_at91: fix ata_host_activate() failure handling - LP: #1333900 * ext4: note the error in ext4_end_bio() - LP: #1333900 * ext4: fix jbd2 warning under heavy xattr load - LP: #1333900 * ext4: use i_size_read in ext4_unaligned_aio() - LP: #1333900 * locks: allow __break_lease to sleep even when break_time is 0 - LP: #1333900 * genirq: Allow forcing cpu affinity of interrupts - LP: #1333900 * nfsd: set timeparms.to_maxval in setup_callback_client - LP: #1333900 * libata/ahci: accommodate tag ordered controllers - LP: #1333900 * Input: synaptics - add min/max quirk for ThinkPad T431s, L440, L540, S1 Yoga and X1 - LP: #1333900 * drm/radeon: fix ATPX detection on non-VGA GPUs - LP: #1333900 * mm: make fixup_user_fault() check the vma access rights too - LP: #1333900 * ARM: 8027/1: fix do_div() bug in big-endian systems - LP: #1333900 * ARM: 8030/1: ARM : kdump : add arch_crash_save_vmcoreinfo - LP: #1333900 * USB: serial: fix sysfs-attribute removal deadlock - LP: #1333900 * Btrfs: fix inode caching vs tree log - LP: #1333900 * xhci: Switch Intel Lynx Point ports to EHCI on shutdown. - LP: #1333900 * USB: io_ti: fix firmware download on big-endian machines - LP: #1333900 * usb: qcserial: add Sierra Wireless EM7355 - LP: #1333900 * usb: qcserial: add Sierra Wireless MC73xx - LP: #1333900 * usb: qcserial: add Sierra Wireless MC7305/MC7355 - LP: #1333900 * usb: option: add Olivetti Olicard 500 - LP: #1333900 * usb: option: add Alcatel L800MA - LP: #1333900 * usb: option: add and update a number of CMOTech devices - LP: #1333900 * list:
[Kernel-packages] [Bug 1329103] Re: CVE-2014-4014
This bug was fixed in the package linux-lts-raring - 3.8.0-44.66~precise1 --- linux-lts-raring (3.8.0-44.66~precise1) precise; urgency=low [ Upstream Kernel Changes ] * l2tp: Privilege escalation in ppp over l2tp sockets - LP: #1341472 - CVE-2014-4943 linux-lts-raring (3.8.0-44.65~precise1) precise; urgency=low [ Luis Henriques ] * Merged back Ubuntu-lts-3.8.0-42.63 security release * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699) - LP: #1337339 * Release Tracking Bug - LP: #1338579 [ Upstream Kernel Changes ] * ptrace,x86: force IRET path after a ptrace_stop() - LP: #1337339 - CVE-2014-4699 linux-lts-raring (3.8.0-43.64~precise1) precise; urgency=low [ Kamal Mostafa ] * Revert ARM: OMAP3: clock: Back-propagate rate change from cam_mclk to dpll4_m5 on all OMAP3 platforms * Release Tracking Bug - re-used previous tracking bug linux-lts-raring (3.8.0-43.63~precise1) precise; urgency=low [ Kamal Mostafa ] * [Config] add debian/gbp.conf * Release Tracking Bug - LP: #1335912 [ Upstream Kernel Changes ] * Revert USB: serial: add usbid for dell wwan card to sierra.c - LP: #1333900 * Revert macvlan : fix checksums error when we are in bridge mode - LP: #1333900 * auditsc: audit_krule mask accesses need bounds checking - LP: #1325941 - CVE-2014-3917 * fs, userns: Change inode_capable to capable_wrt_inode_uidgid - LP: #1329103 - CVE-2014-4014 * ACPI / EC: Clear stale EC events on Samsung systems - LP: #1333900 * ACPI / EC: Process rather than discard events in acpi_ec_clear - LP: #1333900 * mac80211: fix software remain-on-channel implementation - LP: #1333900 * mac80211: exclude AP_VLAN interfaces from tx power calculation - LP: #1333900 * parisc: fix epoll_pwait syscall on compat kernel - LP: #1333900 * ALSA: hda/realtek - Add support of ALC288 codec - LP: #1333900 * user namespace: fix incorrect memory barriers - LP: #1333900 * mlx4_en: don't use napi_synchronize inside mlx4_en_netpoll - LP: #1333900 * mei: ignore client writing state during cb completion - LP: #1333900 * staging: r8712u: Fix case where ethtype was never obtained and always be checked against 0 - LP: #1333900 * USB: serial: ftdi_sio: add id for Brainboxes serial cards - LP: #1333900 * usb: option driver, add support for Telit UE910v2 - LP: #1333900 * USB: cp210x: Add 8281 (Nanotec Plug Drive) - LP: #1333900 * USB: pl2303: add ids for Hewlett-Packard HP POS pole displays - LP: #1333900 * USB: usb_wwan: fix handling of missing bulk endpoints - LP: #1333900 * USB: fix crash during hotplug of PCI USB controller card - LP: #1333900 * USB: cdc-acm: Remove Motorola/Telit H24 serial interfaces from ACM driver - LP: #1333900 * drm/radeon: memory leak on bo reservation failure. v2 - LP: #1333900 * drm/radeon/si: make sure mc ucode is loaded before checking the size - LP: #1333900 * mm/hugetlb.c: add cond_resched_lock() in return_unused_surplus_pages() - LP: #1333900 * mm: use paravirt friendly ops for NUMA hinting ptes - LP: #1333900 * iio: querying buffer scan_mask should return 0/1 - LP: #1333900 * pata_at91: fix ata_host_activate() failure handling - LP: #1333900 * ext4: note the error in ext4_end_bio() - LP: #1333900 * ext4: fix jbd2 warning under heavy xattr load - LP: #1333900 * ext4: use i_size_read in ext4_unaligned_aio() - LP: #1333900 * locks: allow __break_lease to sleep even when break_time is 0 - LP: #1333900 * genirq: Allow forcing cpu affinity of interrupts - LP: #1333900 * nfsd: set timeparms.to_maxval in setup_callback_client - LP: #1333900 * libata/ahci: accommodate tag ordered controllers - LP: #1333900 * Input: synaptics - add min/max quirk for ThinkPad T431s, L440, L540, S1 Yoga and X1 - LP: #1333900 * drm/radeon: fix ATPX detection on non-VGA GPUs - LP: #1333900 * mm: make fixup_user_fault() check the vma access rights too - LP: #1333900 * ARM: 8027/1: fix do_div() bug in big-endian systems - LP: #1333900 * ARM: 8030/1: ARM : kdump : add arch_crash_save_vmcoreinfo - LP: #1333900 * USB: serial: fix sysfs-attribute removal deadlock - LP: #1333900 * Btrfs: fix inode caching vs tree log - LP: #1333900 * xhci: Switch Intel Lynx Point ports to EHCI on shutdown. - LP: #1333900 * USB: io_ti: fix firmware download on big-endian machines - LP: #1333900 * usb: qcserial: add Sierra Wireless EM7355 - LP: #1333900 * usb: qcserial: add Sierra Wireless MC73xx - LP: #1333900 * usb: qcserial: add Sierra Wireless MC7305/MC7355 - LP: #1333900 * usb: option: add Olivetti Olicard 500 - LP: #1333900 * usb: option: add Alcatel L800MA - LP: #1333900 * usb: option: add and update a number of CMOTech devices - LP: #1333900 * list:
[Kernel-packages] [Bug 1338654] Re: linux: 3.2.0-67.101 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Status: New = Fix Released ** Changed in: kernel-sru-workflow/promote-to-security Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Adam Conrad (adconrad) ** Changed in: kernel-sru-workflow/promote-to-updates Status: New = Fix Released ** Changed in: kernel-sru-workflow/promote-to-updates Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Adam Conrad (adconrad) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1338654 Title: linux: 3.2.0-67.101 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: Confirmed Status in Kernel SRU Workflow package-testing series: Fix Released Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-lbm series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Fix Released Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: In Progress Status in Kernel SRU Workflow verification-testing series: Fix Released Status in “linux” package in Ubuntu: Invalid Status in “linux” source package in Precise: Fix Released Bug description: This bug is for tracking the 3.2.0-67.100 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Monday, 07. July 2014 16:11 UTC kernel-stable-Prepare-package-end:Tuesday, 08. July 2014 04:12 UTC kernel-stable-Promote-to-proposed-start:Tuesday, 08. July 2014 04:12 UTC ppa-package-testing-start:Tuesday, 08. July 2014 04:12 UTC kernel-stable-Promote-to-proposed-end:Wednesday, 09. July 2014 22:01 UTC kernel-stable-Verification-testing-start:Wednesday, 09. July 2014 23:01 UTC kernel-stable-Certification-testing-start:Wednesday, 09. July 2014 23:01 UTC kernel-stable-Security-signoff-start:Wednesday, 09. July 2014 23:01 UTC kernel-stable-Regression-testing-start:Wednesday, 09. July 2014 23:01 UTC kernel-stable-Regression-testing-end:Friday, 11. July 2014 22:03 UTC kernel-stable-phase:Testing kernel-stable-phase-changed:Monday, 14. July 2014 13:04 UTC kernel-stable-Verification-testing-end:Monday, 14. July 2014 13:04 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1338654/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1335084] Re: Saucy update to 3.11.10.12 stable release
This bug was fixed in the package linux - 3.11.0-26.45 --- linux (3.11.0-26.45) saucy; urgency=low [ Upstream Kernel Changes ] * l2tp: Privilege escalation in ppp over l2tp sockets - LP: #1341472 - CVE-2014-4943 linux (3.11.0-26.44) saucy; urgency=low [ Luis Henriques ] * Merged back Ubuntu-3.11.0-24.42 security release * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699) - LP: #1337339 * Release Tracking Bug - LP: #1338556 [ Upstream Kernel Changes ] * ptrace,x86: force IRET path after a ptrace_stop() - LP: #1337339 - CVE-2014-4699 linux (3.11.0-25.43) saucy; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1336203 [ Upstream Kernel Changes ] * cfg80211: free sme on connection failures - LP: #1335084 * sched: Sanitize irq accounting madness - LP: #1335084 * sched: Use CPUPRI_NR_PRIORITIES instead of MAX_RT_PRIO in cpupri check - LP: #1335084 * net: cpsw: fix null dereference at probe - LP: #1335084 * mac80211: fix suspend vs. association race - LP: #1335084 * mac80211: fix on-channel remain-on-channel - LP: #1335084 * af_iucv: wrong mapping of sent and confirmed skbs - LP: #1335084 * net: filter: s390: fix JIT address randomization - LP: #1335084 * perf: Limit perf_event_attr::sample_period to 63 bits - LP: #1335084 * perf: Prevent false warning in perf_swevent_add - LP: #1335084 * drm/gf119-/disp: fix nasty bug which can clobber SOR0's clock setup - LP: #1335084 * drm/radeon: also try GART for CPU accessed buffers - LP: #1335084 * drm/radeon: handle non-VGA class pci devices with ATRM - LP: #1335084 * drm/radeon: fix register typo on si - LP: #1335084 * drm/radeon: avoid segfault on device open when accel is not working. - LP: #1335084 * can: peak_pci: prevent use after free at netdev removal - LP: #1335084 * nfsd4: remove lockowner when removing lock stateid - LP: #1335084 * nfsd4: warn on finding lockowner without stateid's - LP: #1335084 * hwpoison, hugetlb: lock_page/unlock_page does not match for handling a free hugepage - LP: #1335084 * mm/memory-failure.c: fix memory leak by race between poison and unpoison - LP: #1335084 * netfilter: ipv4: defrag: set local_df flag on defragmented skb - LP: #1335084 * ARM: OMAP3: clock: Back-propagate rate change from cam_mclk to dpll4_m5 on all OMAP3 platforms - LP: #1335084 * dma: dw: allow shared interrupts - LP: #1335084 * dmaengine: dw: went back to plain {request,free}_irq() calls - LP: #1335084 * ARM: omap5: hwmod_data: Correct IDLEMODE for McPDM - LP: #1335084 * Input: synaptics - add min/max quirk for the ThinkPad W540 - LP: #1335084 * futex: Add another early deadlock detection check - LP: #1335084 * futex: Prevent attaching to kernel threads - LP: #1335084 * ARM: OMAP4: Fix the boot regression with CPU_IDLE enabled - LP: #1335084 * cpufreq: remove race while accessing cur_policy - LP: #1335084 * cpufreq: cpu0: drop wrong devm usage - LP: #1335084 * ARM: imx: fix error handling in ipu device registration - LP: #1335084 * ALSA: hda - Fix onboard audio on Intel H97/Z97 chipsets - LP: #1335084 * ARM: 8051/1: put_user: fix possible data corruption in put_user - LP: #1335084 * ARM: 8064/1: fix v7-M signal return - LP: #1335084 * Input: synaptics - T540p - unify with other LEN0034 models - LP: #1335084 * drm/i915: Only copy back the modified fields to userspace from execbuffer - LP: #1335084 * dm cache: always split discards on cache block boundaries - LP: #1335084 * powerpc: Fix 64 bit builds with binutils 2.24 - LP: #1335084 * powerpc, kexec: Fix Processor X is stuck issue during kexec from ST mode - LP: #1335084 * rtmutex: Fix deadlock detector for real - LP: #1335084 * drm/radeon: don't allow RADEON_GEM_DOMAIN_CPU for command submission - LP: #1335084 * audit: restore order of tty and ses fields in log output - LP: #1335084 * drm/nouveau/pm/fan: drop the fan lock in fan_update() before rescheduling - LP: #1335084 * leds: leds-pwm: properly clean up after probe failure - LP: #1335084 * clk: vexpress: NULL dereference on error path - LP: #1335084 * fix our current target reap infrastructure - LP: #1335084 * dual scan thread bug fix - LP: #1335084 * genirq: Provide irq_force_affinity fallback for non-SMP - LP: #1335084 * i2c: designware: Mask all interrupts during i2c controller enable - LP: #1335084 * crypto: s390 - fix aes,des ctr mode concurrency finding. - LP: #1335084 * Staging: speakup: Move pasting into a work item - LP: #1335084 * USB: Avoid runtime suspend loops for HCDs that can't handle suspend/resume - LP: #1335084 * can: only rename enabled led triggers when changing the netdev name - LP: #1335084
[Kernel-packages] [Bug 1335084] Re: Saucy update to 3.11.10.12 stable release
This bug was fixed in the package linux - 3.11.0-26.45 --- linux (3.11.0-26.45) saucy; urgency=low [ Upstream Kernel Changes ] * l2tp: Privilege escalation in ppp over l2tp sockets - LP: #1341472 - CVE-2014-4943 linux (3.11.0-26.44) saucy; urgency=low [ Luis Henriques ] * Merged back Ubuntu-3.11.0-24.42 security release * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699) - LP: #1337339 * Release Tracking Bug - LP: #1338556 [ Upstream Kernel Changes ] * ptrace,x86: force IRET path after a ptrace_stop() - LP: #1337339 - CVE-2014-4699 linux (3.11.0-25.43) saucy; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1336203 [ Upstream Kernel Changes ] * cfg80211: free sme on connection failures - LP: #1335084 * sched: Sanitize irq accounting madness - LP: #1335084 * sched: Use CPUPRI_NR_PRIORITIES instead of MAX_RT_PRIO in cpupri check - LP: #1335084 * net: cpsw: fix null dereference at probe - LP: #1335084 * mac80211: fix suspend vs. association race - LP: #1335084 * mac80211: fix on-channel remain-on-channel - LP: #1335084 * af_iucv: wrong mapping of sent and confirmed skbs - LP: #1335084 * net: filter: s390: fix JIT address randomization - LP: #1335084 * perf: Limit perf_event_attr::sample_period to 63 bits - LP: #1335084 * perf: Prevent false warning in perf_swevent_add - LP: #1335084 * drm/gf119-/disp: fix nasty bug which can clobber SOR0's clock setup - LP: #1335084 * drm/radeon: also try GART for CPU accessed buffers - LP: #1335084 * drm/radeon: handle non-VGA class pci devices with ATRM - LP: #1335084 * drm/radeon: fix register typo on si - LP: #1335084 * drm/radeon: avoid segfault on device open when accel is not working. - LP: #1335084 * can: peak_pci: prevent use after free at netdev removal - LP: #1335084 * nfsd4: remove lockowner when removing lock stateid - LP: #1335084 * nfsd4: warn on finding lockowner without stateid's - LP: #1335084 * hwpoison, hugetlb: lock_page/unlock_page does not match for handling a free hugepage - LP: #1335084 * mm/memory-failure.c: fix memory leak by race between poison and unpoison - LP: #1335084 * netfilter: ipv4: defrag: set local_df flag on defragmented skb - LP: #1335084 * ARM: OMAP3: clock: Back-propagate rate change from cam_mclk to dpll4_m5 on all OMAP3 platforms - LP: #1335084 * dma: dw: allow shared interrupts - LP: #1335084 * dmaengine: dw: went back to plain {request,free}_irq() calls - LP: #1335084 * ARM: omap5: hwmod_data: Correct IDLEMODE for McPDM - LP: #1335084 * Input: synaptics - add min/max quirk for the ThinkPad W540 - LP: #1335084 * futex: Add another early deadlock detection check - LP: #1335084 * futex: Prevent attaching to kernel threads - LP: #1335084 * ARM: OMAP4: Fix the boot regression with CPU_IDLE enabled - LP: #1335084 * cpufreq: remove race while accessing cur_policy - LP: #1335084 * cpufreq: cpu0: drop wrong devm usage - LP: #1335084 * ARM: imx: fix error handling in ipu device registration - LP: #1335084 * ALSA: hda - Fix onboard audio on Intel H97/Z97 chipsets - LP: #1335084 * ARM: 8051/1: put_user: fix possible data corruption in put_user - LP: #1335084 * ARM: 8064/1: fix v7-M signal return - LP: #1335084 * Input: synaptics - T540p - unify with other LEN0034 models - LP: #1335084 * drm/i915: Only copy back the modified fields to userspace from execbuffer - LP: #1335084 * dm cache: always split discards on cache block boundaries - LP: #1335084 * powerpc: Fix 64 bit builds with binutils 2.24 - LP: #1335084 * powerpc, kexec: Fix Processor X is stuck issue during kexec from ST mode - LP: #1335084 * rtmutex: Fix deadlock detector for real - LP: #1335084 * drm/radeon: don't allow RADEON_GEM_DOMAIN_CPU for command submission - LP: #1335084 * audit: restore order of tty and ses fields in log output - LP: #1335084 * drm/nouveau/pm/fan: drop the fan lock in fan_update() before rescheduling - LP: #1335084 * leds: leds-pwm: properly clean up after probe failure - LP: #1335084 * clk: vexpress: NULL dereference on error path - LP: #1335084 * fix our current target reap infrastructure - LP: #1335084 * dual scan thread bug fix - LP: #1335084 * genirq: Provide irq_force_affinity fallback for non-SMP - LP: #1335084 * i2c: designware: Mask all interrupts during i2c controller enable - LP: #1335084 * crypto: s390 - fix aes,des ctr mode concurrency finding. - LP: #1335084 * Staging: speakup: Move pasting into a work item - LP: #1335084 * USB: Avoid runtime suspend loops for HCDs that can't handle suspend/resume - LP: #1335084 * can: only rename enabled led triggers when changing the netdev name - LP: #1335084
[Kernel-packages] [Bug 1336143] Re: linux-ti-omap4: 3.2.0-1451.71 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Status: New = Fix Released ** Changed in: kernel-sru-workflow/promote-to-security Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Adam Conrad (adconrad) ** Changed in: kernel-sru-workflow/promote-to-updates Status: New = Fix Released ** Changed in: kernel-sru-workflow/promote-to-updates Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Adam Conrad (adconrad) ** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: New = Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-ti-omap4 in Ubuntu. https://bugs.launchpad.net/bugs/1336143 Title: linux-ti-omap4: 3.2.0-1451.71 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow package-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Fix Released Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: In Progress Status in Kernel SRU Workflow upload-to-ppa series: Fix Released Status in Kernel SRU Workflow verification-testing series: In Progress Status in “linux-ti-omap4” package in Ubuntu: Invalid Status in “linux-ti-omap4” source package in Precise: Fix Released Bug description: This bug is for tracking the version to be filled upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 01. July 2014 04:53 UTC kernel-stable-master-bug:1338654 kernel-stable-Certification-testing-end:Thursday, 03. July 2014 01:55 UTC kernel-stable-Prepare-package-end:Wednesday, 09. July 2014 17:00 UTC kernel-stable-Promote-to-proposed-start:Wednesday, 09. July 2014 17:00 UTC ppa-package-testing-start:Wednesday, 09. July 2014 17:00 UTC kernel-stable-Promote-to-proposed-end:Friday, 11. July 2014 16:17 UTC kernel-stable-phase:Verification Testing kernel-stable-phase-changed:Friday, 11. July 2014 18:01 UTC kernel-stable-Security-signoff-start:Friday, 11. July 2014 18:01 UTC kernel-stable-Verification-testing-start:Friday, 11. July 2014 18:01 UTC kernel-stable-Regression-testing-start:Friday, 11. July 2014 18:01 UTC kernel-stable-Regression-testing-end:Tuesday, 15. July 2014 16:00 UTC kernel-stable-Promote-to-updates-end:Wednesday, 16. July 2014 20:00 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1336143/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1338556] Re: linux: 3.11.0-26.45 -proposed tracker
This bug was fixed in the package linux - 3.11.0-26.45 --- linux (3.11.0-26.45) saucy; urgency=low [ Upstream Kernel Changes ] * l2tp: Privilege escalation in ppp over l2tp sockets - LP: #1341472 - CVE-2014-4943 linux (3.11.0-26.44) saucy; urgency=low [ Luis Henriques ] * Merged back Ubuntu-3.11.0-24.42 security release * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699) - LP: #1337339 * Release Tracking Bug - LP: #1338556 [ Upstream Kernel Changes ] * ptrace,x86: force IRET path after a ptrace_stop() - LP: #1337339 - CVE-2014-4699 linux (3.11.0-25.43) saucy; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1336203 [ Upstream Kernel Changes ] * cfg80211: free sme on connection failures - LP: #1335084 * sched: Sanitize irq accounting madness - LP: #1335084 * sched: Use CPUPRI_NR_PRIORITIES instead of MAX_RT_PRIO in cpupri check - LP: #1335084 * net: cpsw: fix null dereference at probe - LP: #1335084 * mac80211: fix suspend vs. association race - LP: #1335084 * mac80211: fix on-channel remain-on-channel - LP: #1335084 * af_iucv: wrong mapping of sent and confirmed skbs - LP: #1335084 * net: filter: s390: fix JIT address randomization - LP: #1335084 * perf: Limit perf_event_attr::sample_period to 63 bits - LP: #1335084 * perf: Prevent false warning in perf_swevent_add - LP: #1335084 * drm/gf119-/disp: fix nasty bug which can clobber SOR0's clock setup - LP: #1335084 * drm/radeon: also try GART for CPU accessed buffers - LP: #1335084 * drm/radeon: handle non-VGA class pci devices with ATRM - LP: #1335084 * drm/radeon: fix register typo on si - LP: #1335084 * drm/radeon: avoid segfault on device open when accel is not working. - LP: #1335084 * can: peak_pci: prevent use after free at netdev removal - LP: #1335084 * nfsd4: remove lockowner when removing lock stateid - LP: #1335084 * nfsd4: warn on finding lockowner without stateid's - LP: #1335084 * hwpoison, hugetlb: lock_page/unlock_page does not match for handling a free hugepage - LP: #1335084 * mm/memory-failure.c: fix memory leak by race between poison and unpoison - LP: #1335084 * netfilter: ipv4: defrag: set local_df flag on defragmented skb - LP: #1335084 * ARM: OMAP3: clock: Back-propagate rate change from cam_mclk to dpll4_m5 on all OMAP3 platforms - LP: #1335084 * dma: dw: allow shared interrupts - LP: #1335084 * dmaengine: dw: went back to plain {request,free}_irq() calls - LP: #1335084 * ARM: omap5: hwmod_data: Correct IDLEMODE for McPDM - LP: #1335084 * Input: synaptics - add min/max quirk for the ThinkPad W540 - LP: #1335084 * futex: Add another early deadlock detection check - LP: #1335084 * futex: Prevent attaching to kernel threads - LP: #1335084 * ARM: OMAP4: Fix the boot regression with CPU_IDLE enabled - LP: #1335084 * cpufreq: remove race while accessing cur_policy - LP: #1335084 * cpufreq: cpu0: drop wrong devm usage - LP: #1335084 * ARM: imx: fix error handling in ipu device registration - LP: #1335084 * ALSA: hda - Fix onboard audio on Intel H97/Z97 chipsets - LP: #1335084 * ARM: 8051/1: put_user: fix possible data corruption in put_user - LP: #1335084 * ARM: 8064/1: fix v7-M signal return - LP: #1335084 * Input: synaptics - T540p - unify with other LEN0034 models - LP: #1335084 * drm/i915: Only copy back the modified fields to userspace from execbuffer - LP: #1335084 * dm cache: always split discards on cache block boundaries - LP: #1335084 * powerpc: Fix 64 bit builds with binutils 2.24 - LP: #1335084 * powerpc, kexec: Fix Processor X is stuck issue during kexec from ST mode - LP: #1335084 * rtmutex: Fix deadlock detector for real - LP: #1335084 * drm/radeon: don't allow RADEON_GEM_DOMAIN_CPU for command submission - LP: #1335084 * audit: restore order of tty and ses fields in log output - LP: #1335084 * drm/nouveau/pm/fan: drop the fan lock in fan_update() before rescheduling - LP: #1335084 * leds: leds-pwm: properly clean up after probe failure - LP: #1335084 * clk: vexpress: NULL dereference on error path - LP: #1335084 * fix our current target reap infrastructure - LP: #1335084 * dual scan thread bug fix - LP: #1335084 * genirq: Provide irq_force_affinity fallback for non-SMP - LP: #1335084 * i2c: designware: Mask all interrupts during i2c controller enable - LP: #1335084 * crypto: s390 - fix aes,des ctr mode concurrency finding. - LP: #1335084 * Staging: speakup: Move pasting into a work item - LP: #1335084 * USB: Avoid runtime suspend loops for HCDs that can't handle suspend/resume - LP: #1335084 * can: only rename enabled led triggers when changing the netdev name - LP: #1335084
[Kernel-packages] [Bug 1336203] Re: linux: 3.11.0-25.43 -proposed tracker
*** This bug is a duplicate of bug 1338556 *** https://bugs.launchpad.net/bugs/1338556 This bug was fixed in the package linux - 3.11.0-26.45 --- linux (3.11.0-26.45) saucy; urgency=low [ Upstream Kernel Changes ] * l2tp: Privilege escalation in ppp over l2tp sockets - LP: #1341472 - CVE-2014-4943 linux (3.11.0-26.44) saucy; urgency=low [ Luis Henriques ] * Merged back Ubuntu-3.11.0-24.42 security release * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699) - LP: #1337339 * Release Tracking Bug - LP: #1338556 [ Upstream Kernel Changes ] * ptrace,x86: force IRET path after a ptrace_stop() - LP: #1337339 - CVE-2014-4699 linux (3.11.0-25.43) saucy; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1336203 [ Upstream Kernel Changes ] * cfg80211: free sme on connection failures - LP: #1335084 * sched: Sanitize irq accounting madness - LP: #1335084 * sched: Use CPUPRI_NR_PRIORITIES instead of MAX_RT_PRIO in cpupri check - LP: #1335084 * net: cpsw: fix null dereference at probe - LP: #1335084 * mac80211: fix suspend vs. association race - LP: #1335084 * mac80211: fix on-channel remain-on-channel - LP: #1335084 * af_iucv: wrong mapping of sent and confirmed skbs - LP: #1335084 * net: filter: s390: fix JIT address randomization - LP: #1335084 * perf: Limit perf_event_attr::sample_period to 63 bits - LP: #1335084 * perf: Prevent false warning in perf_swevent_add - LP: #1335084 * drm/gf119-/disp: fix nasty bug which can clobber SOR0's clock setup - LP: #1335084 * drm/radeon: also try GART for CPU accessed buffers - LP: #1335084 * drm/radeon: handle non-VGA class pci devices with ATRM - LP: #1335084 * drm/radeon: fix register typo on si - LP: #1335084 * drm/radeon: avoid segfault on device open when accel is not working. - LP: #1335084 * can: peak_pci: prevent use after free at netdev removal - LP: #1335084 * nfsd4: remove lockowner when removing lock stateid - LP: #1335084 * nfsd4: warn on finding lockowner without stateid's - LP: #1335084 * hwpoison, hugetlb: lock_page/unlock_page does not match for handling a free hugepage - LP: #1335084 * mm/memory-failure.c: fix memory leak by race between poison and unpoison - LP: #1335084 * netfilter: ipv4: defrag: set local_df flag on defragmented skb - LP: #1335084 * ARM: OMAP3: clock: Back-propagate rate change from cam_mclk to dpll4_m5 on all OMAP3 platforms - LP: #1335084 * dma: dw: allow shared interrupts - LP: #1335084 * dmaengine: dw: went back to plain {request,free}_irq() calls - LP: #1335084 * ARM: omap5: hwmod_data: Correct IDLEMODE for McPDM - LP: #1335084 * Input: synaptics - add min/max quirk for the ThinkPad W540 - LP: #1335084 * futex: Add another early deadlock detection check - LP: #1335084 * futex: Prevent attaching to kernel threads - LP: #1335084 * ARM: OMAP4: Fix the boot regression with CPU_IDLE enabled - LP: #1335084 * cpufreq: remove race while accessing cur_policy - LP: #1335084 * cpufreq: cpu0: drop wrong devm usage - LP: #1335084 * ARM: imx: fix error handling in ipu device registration - LP: #1335084 * ALSA: hda - Fix onboard audio on Intel H97/Z97 chipsets - LP: #1335084 * ARM: 8051/1: put_user: fix possible data corruption in put_user - LP: #1335084 * ARM: 8064/1: fix v7-M signal return - LP: #1335084 * Input: synaptics - T540p - unify with other LEN0034 models - LP: #1335084 * drm/i915: Only copy back the modified fields to userspace from execbuffer - LP: #1335084 * dm cache: always split discards on cache block boundaries - LP: #1335084 * powerpc: Fix 64 bit builds with binutils 2.24 - LP: #1335084 * powerpc, kexec: Fix Processor X is stuck issue during kexec from ST mode - LP: #1335084 * rtmutex: Fix deadlock detector for real - LP: #1335084 * drm/radeon: don't allow RADEON_GEM_DOMAIN_CPU for command submission - LP: #1335084 * audit: restore order of tty and ses fields in log output - LP: #1335084 * drm/nouveau/pm/fan: drop the fan lock in fan_update() before rescheduling - LP: #1335084 * leds: leds-pwm: properly clean up after probe failure - LP: #1335084 * clk: vexpress: NULL dereference on error path - LP: #1335084 * fix our current target reap infrastructure - LP: #1335084 * dual scan thread bug fix - LP: #1335084 * genirq: Provide irq_force_affinity fallback for non-SMP - LP: #1335084 * i2c: designware: Mask all interrupts during i2c controller enable - LP: #1335084 * crypto: s390 - fix aes,des ctr mode concurrency finding. - LP: #1335084 * Staging: speakup: Move pasting into a work item - LP: #1335084 * USB: Avoid runtime suspend loops for HCDs that can't handle suspend/resume - LP: #1335084
[Kernel-packages] [Bug 1335313] Re: CVE-2014-4608
This bug was fixed in the package linux - 3.11.0-26.45 --- linux (3.11.0-26.45) saucy; urgency=low [ Upstream Kernel Changes ] * l2tp: Privilege escalation in ppp over l2tp sockets - LP: #1341472 - CVE-2014-4943 linux (3.11.0-26.44) saucy; urgency=low [ Luis Henriques ] * Merged back Ubuntu-3.11.0-24.42 security release * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699) - LP: #1337339 * Release Tracking Bug - LP: #1338556 [ Upstream Kernel Changes ] * ptrace,x86: force IRET path after a ptrace_stop() - LP: #1337339 - CVE-2014-4699 linux (3.11.0-25.43) saucy; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1336203 [ Upstream Kernel Changes ] * cfg80211: free sme on connection failures - LP: #1335084 * sched: Sanitize irq accounting madness - LP: #1335084 * sched: Use CPUPRI_NR_PRIORITIES instead of MAX_RT_PRIO in cpupri check - LP: #1335084 * net: cpsw: fix null dereference at probe - LP: #1335084 * mac80211: fix suspend vs. association race - LP: #1335084 * mac80211: fix on-channel remain-on-channel - LP: #1335084 * af_iucv: wrong mapping of sent and confirmed skbs - LP: #1335084 * net: filter: s390: fix JIT address randomization - LP: #1335084 * perf: Limit perf_event_attr::sample_period to 63 bits - LP: #1335084 * perf: Prevent false warning in perf_swevent_add - LP: #1335084 * drm/gf119-/disp: fix nasty bug which can clobber SOR0's clock setup - LP: #1335084 * drm/radeon: also try GART for CPU accessed buffers - LP: #1335084 * drm/radeon: handle non-VGA class pci devices with ATRM - LP: #1335084 * drm/radeon: fix register typo on si - LP: #1335084 * drm/radeon: avoid segfault on device open when accel is not working. - LP: #1335084 * can: peak_pci: prevent use after free at netdev removal - LP: #1335084 * nfsd4: remove lockowner when removing lock stateid - LP: #1335084 * nfsd4: warn on finding lockowner without stateid's - LP: #1335084 * hwpoison, hugetlb: lock_page/unlock_page does not match for handling a free hugepage - LP: #1335084 * mm/memory-failure.c: fix memory leak by race between poison and unpoison - LP: #1335084 * netfilter: ipv4: defrag: set local_df flag on defragmented skb - LP: #1335084 * ARM: OMAP3: clock: Back-propagate rate change from cam_mclk to dpll4_m5 on all OMAP3 platforms - LP: #1335084 * dma: dw: allow shared interrupts - LP: #1335084 * dmaengine: dw: went back to plain {request,free}_irq() calls - LP: #1335084 * ARM: omap5: hwmod_data: Correct IDLEMODE for McPDM - LP: #1335084 * Input: synaptics - add min/max quirk for the ThinkPad W540 - LP: #1335084 * futex: Add another early deadlock detection check - LP: #1335084 * futex: Prevent attaching to kernel threads - LP: #1335084 * ARM: OMAP4: Fix the boot regression with CPU_IDLE enabled - LP: #1335084 * cpufreq: remove race while accessing cur_policy - LP: #1335084 * cpufreq: cpu0: drop wrong devm usage - LP: #1335084 * ARM: imx: fix error handling in ipu device registration - LP: #1335084 * ALSA: hda - Fix onboard audio on Intel H97/Z97 chipsets - LP: #1335084 * ARM: 8051/1: put_user: fix possible data corruption in put_user - LP: #1335084 * ARM: 8064/1: fix v7-M signal return - LP: #1335084 * Input: synaptics - T540p - unify with other LEN0034 models - LP: #1335084 * drm/i915: Only copy back the modified fields to userspace from execbuffer - LP: #1335084 * dm cache: always split discards on cache block boundaries - LP: #1335084 * powerpc: Fix 64 bit builds with binutils 2.24 - LP: #1335084 * powerpc, kexec: Fix Processor X is stuck issue during kexec from ST mode - LP: #1335084 * rtmutex: Fix deadlock detector for real - LP: #1335084 * drm/radeon: don't allow RADEON_GEM_DOMAIN_CPU for command submission - LP: #1335084 * audit: restore order of tty and ses fields in log output - LP: #1335084 * drm/nouveau/pm/fan: drop the fan lock in fan_update() before rescheduling - LP: #1335084 * leds: leds-pwm: properly clean up after probe failure - LP: #1335084 * clk: vexpress: NULL dereference on error path - LP: #1335084 * fix our current target reap infrastructure - LP: #1335084 * dual scan thread bug fix - LP: #1335084 * genirq: Provide irq_force_affinity fallback for non-SMP - LP: #1335084 * i2c: designware: Mask all interrupts during i2c controller enable - LP: #1335084 * crypto: s390 - fix aes,des ctr mode concurrency finding. - LP: #1335084 * Staging: speakup: Move pasting into a work item - LP: #1335084 * USB: Avoid runtime suspend loops for HCDs that can't handle suspend/resume - LP: #1335084 * can: only rename enabled led triggers when changing the netdev name - LP: #1335084
[Kernel-packages] [Bug 1338870] Re: linux-armadaxp: 3.2.0-1636.53 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Status: New = Fix Released ** Changed in: kernel-sru-workflow/promote-to-security Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Adam Conrad (adconrad) ** Changed in: kernel-sru-workflow/promote-to-updates Status: New = Fix Released ** Changed in: kernel-sru-workflow/promote-to-updates Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Adam Conrad (adconrad) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1338870 Title: linux-armadaxp: 3.2.0-1636.53 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow package-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Fix Released Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Invalid Status in Kernel SRU Workflow upload-to-ppa series: Invalid Status in Kernel SRU Workflow verification-testing series: Fix Released Status in “linux-armadaxp” package in Ubuntu: Invalid Status in “linux-armadaxp” source package in Precise: Fix Released Bug description: This bug is for tracking the 3.2.0-1636.52 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 08. July 2014 04:06 UTC kernel-stable-master-bug:1338654 kernel-stable-Certification-testing-end:Wednesday, 09. July 2014 07:05 UTC kernel-stable-Security-signoff-end:Wednesday, 09. July 2014 07:05 UTC kernel-stable-Prepare-package-end:Wednesday, 09. July 2014 11:04 UTC kernel-stable-Promote-to-proposed-start:Wednesday, 09. July 2014 11:04 UTC ppa-package-testing-start:Wednesday, 09. July 2014 11:04 UTC kernel-stable-Promote-to-proposed-end:Thursday, 10. July 2014 08:09 UTC kernel-stable-phase:Verification Testing kernel-stable-phase-changed:Thursday, 10. July 2014 09:47 UTC kernel-stable-Verification-testing-start:Thursday, 10. July 2014 09:47 UTC kernel-stable-Regression-testing-start:Thursday, 10. July 2014 09:47 UTC kernel-stable-Regression-testing-end:Saturday, 12. July 2014 15:04 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1338870/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1325941] Re: CVE-2014-3917
This bug was fixed in the package linux-lts-raring - 3.8.0-44.66~precise1 --- linux-lts-raring (3.8.0-44.66~precise1) precise; urgency=low [ Upstream Kernel Changes ] * l2tp: Privilege escalation in ppp over l2tp sockets - LP: #1341472 - CVE-2014-4943 linux-lts-raring (3.8.0-44.65~precise1) precise; urgency=low [ Luis Henriques ] * Merged back Ubuntu-lts-3.8.0-42.63 security release * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699) - LP: #1337339 * Release Tracking Bug - LP: #1338579 [ Upstream Kernel Changes ] * ptrace,x86: force IRET path after a ptrace_stop() - LP: #1337339 - CVE-2014-4699 linux-lts-raring (3.8.0-43.64~precise1) precise; urgency=low [ Kamal Mostafa ] * Revert ARM: OMAP3: clock: Back-propagate rate change from cam_mclk to dpll4_m5 on all OMAP3 platforms * Release Tracking Bug - re-used previous tracking bug linux-lts-raring (3.8.0-43.63~precise1) precise; urgency=low [ Kamal Mostafa ] * [Config] add debian/gbp.conf * Release Tracking Bug - LP: #1335912 [ Upstream Kernel Changes ] * Revert USB: serial: add usbid for dell wwan card to sierra.c - LP: #1333900 * Revert macvlan : fix checksums error when we are in bridge mode - LP: #1333900 * auditsc: audit_krule mask accesses need bounds checking - LP: #1325941 - CVE-2014-3917 * fs, userns: Change inode_capable to capable_wrt_inode_uidgid - LP: #1329103 - CVE-2014-4014 * ACPI / EC: Clear stale EC events on Samsung systems - LP: #1333900 * ACPI / EC: Process rather than discard events in acpi_ec_clear - LP: #1333900 * mac80211: fix software remain-on-channel implementation - LP: #1333900 * mac80211: exclude AP_VLAN interfaces from tx power calculation - LP: #1333900 * parisc: fix epoll_pwait syscall on compat kernel - LP: #1333900 * ALSA: hda/realtek - Add support of ALC288 codec - LP: #1333900 * user namespace: fix incorrect memory barriers - LP: #1333900 * mlx4_en: don't use napi_synchronize inside mlx4_en_netpoll - LP: #1333900 * mei: ignore client writing state during cb completion - LP: #1333900 * staging: r8712u: Fix case where ethtype was never obtained and always be checked against 0 - LP: #1333900 * USB: serial: ftdi_sio: add id for Brainboxes serial cards - LP: #1333900 * usb: option driver, add support for Telit UE910v2 - LP: #1333900 * USB: cp210x: Add 8281 (Nanotec Plug Drive) - LP: #1333900 * USB: pl2303: add ids for Hewlett-Packard HP POS pole displays - LP: #1333900 * USB: usb_wwan: fix handling of missing bulk endpoints - LP: #1333900 * USB: fix crash during hotplug of PCI USB controller card - LP: #1333900 * USB: cdc-acm: Remove Motorola/Telit H24 serial interfaces from ACM driver - LP: #1333900 * drm/radeon: memory leak on bo reservation failure. v2 - LP: #1333900 * drm/radeon/si: make sure mc ucode is loaded before checking the size - LP: #1333900 * mm/hugetlb.c: add cond_resched_lock() in return_unused_surplus_pages() - LP: #1333900 * mm: use paravirt friendly ops for NUMA hinting ptes - LP: #1333900 * iio: querying buffer scan_mask should return 0/1 - LP: #1333900 * pata_at91: fix ata_host_activate() failure handling - LP: #1333900 * ext4: note the error in ext4_end_bio() - LP: #1333900 * ext4: fix jbd2 warning under heavy xattr load - LP: #1333900 * ext4: use i_size_read in ext4_unaligned_aio() - LP: #1333900 * locks: allow __break_lease to sleep even when break_time is 0 - LP: #1333900 * genirq: Allow forcing cpu affinity of interrupts - LP: #1333900 * nfsd: set timeparms.to_maxval in setup_callback_client - LP: #1333900 * libata/ahci: accommodate tag ordered controllers - LP: #1333900 * Input: synaptics - add min/max quirk for ThinkPad T431s, L440, L540, S1 Yoga and X1 - LP: #1333900 * drm/radeon: fix ATPX detection on non-VGA GPUs - LP: #1333900 * mm: make fixup_user_fault() check the vma access rights too - LP: #1333900 * ARM: 8027/1: fix do_div() bug in big-endian systems - LP: #1333900 * ARM: 8030/1: ARM : kdump : add arch_crash_save_vmcoreinfo - LP: #1333900 * USB: serial: fix sysfs-attribute removal deadlock - LP: #1333900 * Btrfs: fix inode caching vs tree log - LP: #1333900 * xhci: Switch Intel Lynx Point ports to EHCI on shutdown. - LP: #1333900 * USB: io_ti: fix firmware download on big-endian machines - LP: #1333900 * usb: qcserial: add Sierra Wireless EM7355 - LP: #1333900 * usb: qcserial: add Sierra Wireless MC73xx - LP: #1333900 * usb: qcserial: add Sierra Wireless MC7305/MC7355 - LP: #1333900 * usb: option: add Olivetti Olicard 500 - LP: #1333900 * usb: option: add Alcatel L800MA - LP: #1333900 * usb: option: add and update a number of CMOTech devices - LP: #1333900 * list:
[Kernel-packages] [Bug 1335314] Re: CVE-2014-4611
This bug was fixed in the package linux - 3.11.0-26.45 --- linux (3.11.0-26.45) saucy; urgency=low [ Upstream Kernel Changes ] * l2tp: Privilege escalation in ppp over l2tp sockets - LP: #1341472 - CVE-2014-4943 linux (3.11.0-26.44) saucy; urgency=low [ Luis Henriques ] * Merged back Ubuntu-3.11.0-24.42 security release * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699) - LP: #1337339 * Release Tracking Bug - LP: #1338556 [ Upstream Kernel Changes ] * ptrace,x86: force IRET path after a ptrace_stop() - LP: #1337339 - CVE-2014-4699 linux (3.11.0-25.43) saucy; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1336203 [ Upstream Kernel Changes ] * cfg80211: free sme on connection failures - LP: #1335084 * sched: Sanitize irq accounting madness - LP: #1335084 * sched: Use CPUPRI_NR_PRIORITIES instead of MAX_RT_PRIO in cpupri check - LP: #1335084 * net: cpsw: fix null dereference at probe - LP: #1335084 * mac80211: fix suspend vs. association race - LP: #1335084 * mac80211: fix on-channel remain-on-channel - LP: #1335084 * af_iucv: wrong mapping of sent and confirmed skbs - LP: #1335084 * net: filter: s390: fix JIT address randomization - LP: #1335084 * perf: Limit perf_event_attr::sample_period to 63 bits - LP: #1335084 * perf: Prevent false warning in perf_swevent_add - LP: #1335084 * drm/gf119-/disp: fix nasty bug which can clobber SOR0's clock setup - LP: #1335084 * drm/radeon: also try GART for CPU accessed buffers - LP: #1335084 * drm/radeon: handle non-VGA class pci devices with ATRM - LP: #1335084 * drm/radeon: fix register typo on si - LP: #1335084 * drm/radeon: avoid segfault on device open when accel is not working. - LP: #1335084 * can: peak_pci: prevent use after free at netdev removal - LP: #1335084 * nfsd4: remove lockowner when removing lock stateid - LP: #1335084 * nfsd4: warn on finding lockowner without stateid's - LP: #1335084 * hwpoison, hugetlb: lock_page/unlock_page does not match for handling a free hugepage - LP: #1335084 * mm/memory-failure.c: fix memory leak by race between poison and unpoison - LP: #1335084 * netfilter: ipv4: defrag: set local_df flag on defragmented skb - LP: #1335084 * ARM: OMAP3: clock: Back-propagate rate change from cam_mclk to dpll4_m5 on all OMAP3 platforms - LP: #1335084 * dma: dw: allow shared interrupts - LP: #1335084 * dmaengine: dw: went back to plain {request,free}_irq() calls - LP: #1335084 * ARM: omap5: hwmod_data: Correct IDLEMODE for McPDM - LP: #1335084 * Input: synaptics - add min/max quirk for the ThinkPad W540 - LP: #1335084 * futex: Add another early deadlock detection check - LP: #1335084 * futex: Prevent attaching to kernel threads - LP: #1335084 * ARM: OMAP4: Fix the boot regression with CPU_IDLE enabled - LP: #1335084 * cpufreq: remove race while accessing cur_policy - LP: #1335084 * cpufreq: cpu0: drop wrong devm usage - LP: #1335084 * ARM: imx: fix error handling in ipu device registration - LP: #1335084 * ALSA: hda - Fix onboard audio on Intel H97/Z97 chipsets - LP: #1335084 * ARM: 8051/1: put_user: fix possible data corruption in put_user - LP: #1335084 * ARM: 8064/1: fix v7-M signal return - LP: #1335084 * Input: synaptics - T540p - unify with other LEN0034 models - LP: #1335084 * drm/i915: Only copy back the modified fields to userspace from execbuffer - LP: #1335084 * dm cache: always split discards on cache block boundaries - LP: #1335084 * powerpc: Fix 64 bit builds with binutils 2.24 - LP: #1335084 * powerpc, kexec: Fix Processor X is stuck issue during kexec from ST mode - LP: #1335084 * rtmutex: Fix deadlock detector for real - LP: #1335084 * drm/radeon: don't allow RADEON_GEM_DOMAIN_CPU for command submission - LP: #1335084 * audit: restore order of tty and ses fields in log output - LP: #1335084 * drm/nouveau/pm/fan: drop the fan lock in fan_update() before rescheduling - LP: #1335084 * leds: leds-pwm: properly clean up after probe failure - LP: #1335084 * clk: vexpress: NULL dereference on error path - LP: #1335084 * fix our current target reap infrastructure - LP: #1335084 * dual scan thread bug fix - LP: #1335084 * genirq: Provide irq_force_affinity fallback for non-SMP - LP: #1335084 * i2c: designware: Mask all interrupts during i2c controller enable - LP: #1335084 * crypto: s390 - fix aes,des ctr mode concurrency finding. - LP: #1335084 * Staging: speakup: Move pasting into a work item - LP: #1335084 * USB: Avoid runtime suspend loops for HCDs that can't handle suspend/resume - LP: #1335084 * can: only rename enabled led triggers when changing the netdev name - LP: #1335084
[Kernel-packages] [Bug 1334823] Re: please add designware gpio support for x-gene
This bug was fixed in the package linux - 3.13.0-32.57 --- linux (3.13.0-32.57) trusty; urgency=low [ Upstream Kernel Changes ] * l2tp: Privilege escalation in ppp over l2tp sockets - LP: #1341472 - CVE-2014-4943 linux (3.13.0-32.56) trusty; urgency=low [ Luis Henriques ] * Merged back Ubuntu-3.13.0-30.55 security release * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699) - LP: #1337339 * Release Tracking Bug - LP: #1338524 [ Upstream Kernel Changes ] * ptrace,x86: force IRET path after a ptrace_stop() - LP: #1337339 - CVE-2014-4699 * hpsa: add new Smart Array PCI IDs (May 2014) - LP: #1337516 linux (3.13.0-31.55) trusty; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1336278 [ Andy Whitcroft ] * [Config] switch hyper-keyboard to virtual - LP: #1325306 * [Packaging] linux-udeb-flavour -- standardise on linux prefix [ dann frazier ] * [Config] CONFIG_GPIO_DWAPB=m - LP: #1334823 [ Feng Kan ] * SAUCE: (no-up) arm64: dts: Add Designware GPIO dts binding to APM X-Gene platform - LP: #1334823 [ John Johansen ] * SAUCE: (no-up) apparmor: fix apparmor spams log with warning message - LP: #1308761 [ Kamal Mostafa ] * [Config] updateconfigs ACPI_PROCFS_POWER=y after v3.13.11.4 rebase [ Loc Ho ] * SAUCE: (no-up) phy-xgene: Use correct tuning for Mustang - LP: #1335636 [ Michael Ellerman ] * SAUCE: (no-up) powerpc/perf: Ensure all EBB register state is cleared on fork() - LP: #1328914 [ Ming Lei ] * Revert SAUCE: (no-up) rtc: Add X-Gene SoC Real Time Clock Driver - LP: #1274305 [ Suman Tripathi ] * SAUCE: (no-up) libahci: Implement the function ahci_restart_engine to restart the port dma engine. - LP: #1335645 * SAUCE: (no-up) ata: Fix the dma state machine lockup for the IDENTIFY DEVICE PIO mode command. - LP: #1335645 [ Tim Gardner ] * [Config] CONFIG_POWERNV_CPUFREQ=y for powerpc, ppc64el - LP: #1324571 * [Debian] Add UTS_UBUNTU_RELEASE_ABI to utsrelease.h - LP: #1327619 * [Config] CONFIG_HAVE_MEMORYLESS_NODES=y - LP: #1332063 * [Config] CONFIG_HID_RMI=m - LP: #1305522 [ Upstream Kernel Changes ] * Revert offb: Add palette hack for little endian - LP: #1333430 * Revert net: mvneta: fix usage as a module on RGMII configurations - LP: #1333837 * Revert USB: serial: add usbid for dell wwan card to sierra.c - LP: #1333837 * Revert macvlan : fix checksums error when we are in bridge mode - LP: #1333838 * serial: uart: add hw flow control support configuration - LP: #1328295 * mm/numa: Remove BUG_ON() in __handle_mm_fault() - LP: #1323165 * Tools: hv: Handle the case when the target file exists correctly - LP: #1306215 * Documentation/devicetree/bindings: add documentation for the APM X-Gene SoC RTC DTS binding - LP: #1274305 * drivers/rtc: add APM X-Gene SoC RTC driver - LP: #1274305 * arm64: add APM X-Gene SoC RTC DTS entry - LP: #1274305 * powerpc/perf: Add Power8 cache TLB events - LP: #1328914 * powerpc/perf: Configure BHRB filter before enabling PMU interrupts - LP: #1328914 * powerpc/perf: Define perf_event_print_debug() to print PMU register values - LP: #1328914 * powerpc: Add a cpu feature CPU_FTR_PMAO_BUG - LP: #1328914 * powerpc/perf: Add lost exception workaround - LP: #1328914 * powerpc/perf: Reject EBB events which specify a sample_type - LP: #1328914 * powerpc/perf: Clean up the EBB hash defines a little - LP: #1328914 * powerpc/perf: Avoid mutating event in power8_get_constraint() - LP: #1328914 * powerpc/perf: Add BHRB constraint and IFM MMCRA handling for EBB - LP: #1328914 * powerpc/perf: Enable BHRB access for EBB events - LP: #1328914 * powerpc/perf: Fix handling of L3 events with bank == 1 - LP: #1328914 * Bluetooth: Add support for Intel Bluetooth device [8087:0a2a] - LP: #1329184 * iwlwifi: mvm: disable beacon filtering - LP: #1293569 * SUNRPC: Ensure that call_connect times out correctly - LP: #1322407 * SUNRPC: Ensure call_connect_status() deals correctly with SOFTCONN tasks - LP: #1322407 * bitops: Fix signedness of compile-time hweight implementations - LP: #1321791 * cpumask.h: silence warning with -Wsign-compare - LP: #1321791 * fbdev/fb.h: silence warning with -Wsign-compare - LP: #1321791 * rtlwifi: make MSI support a module parameter - LP: #1296591 * rtlwifi: rtl8188ee: add msi module parameter - LP: #1296591 * rtlwifi: rtl8723be: add msi module parameter - LP: #1296591 * net: avoid dependency of net_get_random_once on nop patching - LP: #1330671 * x86-64, modify_ldt: Make support for 16-bit segments a runtime option - LP: #1328965 * ALSA: usb-audio: Prevent printk ratelimiting from spamming kernel log while DEBUG not defined