[Kernel-packages] [Bug 1334968] Re: [HP ProBook 445 G1] Microphone mute key does not work

2014-07-16 Thread Po-Hsu Lin
Oh, for -s, sorry I didn't catch that

Will do this after it get back to us.

** Changed in: linux (Ubuntu)
   Status: Confirmed = Incomplete

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1334968

Title:
  [HP ProBook 445 G1] Microphone mute key does not work

Status in HWE Next Project:
  New
Status in “linux” package in Ubuntu:
  Incomplete

Bug description:
  CID: 201307-13919 HP ProBook 445 G1

  The microphone mute key does not work on this system
  Keystroke cannot be detected by xev, but it shows:
  keycode 465 press
  keycode 465 release
  from sudo showkey -k

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.13.0-30-generic 3.13.0-30.54
  ProcVersionSignature: Ubuntu 3.13.0-30.54-generic 3.13.11.2
  Uname: Linux 3.13.0-30-generic x86_64
  ApportVersion: 2.14.1-0ubuntu3.2
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC1:  ubuntu 1508 F pulseaudio
   /dev/snd/pcmC1D0c:   ubuntu 1508 F...m pulseaudio
   /dev/snd/controlC0:  ubuntu 1508 F pulseaudio
  CRDA:
   country TW:
(2402 - 2472 @ 40), (3, 27)
(5270 - 5330 @ 40), (3, 17), DFS
(5735 - 5815 @ 40), (3, 30)
  CurrentDesktop: Unity
  Date: Fri Jun 27 01:10:10 2014
  HibernationDevice: RESUME=UUID=be96939f-ffde-4407-a99e-17beebf60ad5
  InstallationDate: Installed on 2014-06-27 (0 days ago)
  InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Release amd64 (20140417)
  MachineType: Hewlett-Packard HP ProBook 445 G1 Notebook PC
  ProcFB:
   0 radeondrmfb
   1 radeondrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-30-generic 
root=UUID=fd8269ec-b9ab-4f08-8eaf-6c3bfa26a4e1 ro quiet splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-3.13.0-30-generic N/A
   linux-backports-modules-3.13.0-30-generic  N/A
   linux-firmware 1.127.4
  RfKill:
   0: phy0: Wireless LAN
Soft blocked: no
Hard blocked: no
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 09/05/2013
  dmi.bios.vendor: Hewlett-Packard
  dmi.bios.version: 68CPE Ver. F.21
  dmi.board.asset.tag: Base Board Asset Tag
  dmi.board.name: 1950
  dmi.board.vendor: Hewlett-Packard
  dmi.board.version: KBC Version 91.0B
  dmi.chassis.type: 10
  dmi.chassis.vendor: Hewlett-Packard
  dmi.modalias: 
dmi:bvnHewlett-Packard:bvr68CPEVer.F.21:bd09/05/2013:svnHewlett-Packard:pnHPProBook445G1NotebookPC:pvrA201BC1203:rvnHewlett-Packard:rn1950:rvrKBCVersion91.0B:cvnHewlett-Packard:ct10:cvr:
  dmi.product.name: HP ProBook 445 G1 Notebook PC
  dmi.product.version: A201BC1203
  dmi.sys.vendor: Hewlett-Packard

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1334968/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1179010] Re: No battery present

2014-07-16 Thread CRAFT
Have same trouble in Ubuntu 13.10 , 14.04 and later alpha 14.10

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1179010

Title:
  No battery present

Status in “linux” package in Ubuntu:
  Expired

Bug description:
  There is absolutly no battery present on my system.
  Its started when i noticed there was no battery indicator. Then i tried 
running some system commands and they couldnt find any battery either. 

  $ upower -i /org/freedesktop/UPower/battery_BAT0
  nothing

  $ acpi -b
  nothing

  trying cat in /proc/acpi/battery
  nothing

  ProblemType: Bug
  DistroRelease: Ubuntu 13.04
  Package: linux-image-3.8.0-19-generic 3.8.0-19.30
  ProcVersionSignature: Ubuntu 3.8.0-19.30-generic 3.8.8
  Uname: Linux 3.8.0-19-generic x86_64
  ApportVersion: 2.9.2-0ubuntu8
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  charles2048 F pulseaudio
  Date: Sat May 11 18:11:12 2013
  HibernationDevice: RESUME=UUID=e6e53928-9f5d-41c1-97ec-abf5b11a8b16
  InstallationDate: Installed on 2013-04-28 (12 days ago)
  InstallationMedia: Ubuntu 13.04 Raring Ringtail - Release amd64 (20130424)
  MachineType: Acer Aspire 5553G
  MarkForUpload: True
  ProcEnviron:
   PATH=(custom, no user)
   XDG_RUNTIME_DIR=set
   LANG=sv_SE.UTF-8
   SHELL=/bin/bash
  ProcFB:
   0 radeondrmfb
   1 radeondrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.8.0-19-generic 
root=UUID=ea88e58a-6514-44a0-a7c0-9ff5b627d848 ro quiet splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-3.8.0-19-generic N/A
   linux-backports-modules-3.8.0-19-generic  N/A
   linux-firmware1.106
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 04/27/2010
  dmi.bios.vendor: Phoenix Technologies LTD
  dmi.bios.version: V1.08
  dmi.board.name: JV51_DN
  dmi.board.vendor: Acer
  dmi.board.version: Not Applicable
  dmi.chassis.type: 10
  dmi.chassis.vendor: Acer
  dmi.chassis.version: N/A
  dmi.modalias: 
dmi:bvnPhoenixTechnologiesLTD:bvrV1.08:bd04/27/2010:svnAcer:pnAspire5553G:pvrNotApplicable:rvnAcer:rnJV51_DN:rvrNotApplicable:cvnAcer:ct10:cvrN/A:
  dmi.product.name: Aspire 5553G
  dmi.product.version: Not Applicable
  dmi.sys.vendor: Acer

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1179010/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1041790]

2014-07-16 Thread Chris Wilson
*** Bug 81402 has been marked as a duplicate of this bug. ***

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1041790

Title:
  [snb] GPU lockup  IPEHR: 0x0b160001 IPEHR: 0x0b140001, workaround
  i915.semaphores=0

Status in X.org xf86-video-intel:
  In Progress
Status in “linux” package in Ubuntu:
  Incomplete
Status in “sandybridge-meta” package in Ubuntu:
  Confirmed
Status in “xserver-xorg-video-intel” package in Ubuntu:
  Triaged

Bug description:
  X locks up periodically for a 2 to ten seconds at a time and this
  crash log gets generated. It's significantly more than several times a
  day but not quite continuous. If you indeed have this bug, that should
  stop the lockups from happening. Irrespective, please file a new bug
  report so your hardware may be tracked.

  WORKAROUND: Edit your /etc/default/grub from:
  GRUB_CMDLINE_LINUX_DEFAULT=quiet splash

  to:
  GRUB_CMDLINE_LINUX_DEFAULT=quiet splash i915.semaphores=0

  run the following and reboot:
  sudo update-grub

  The side effects of this is rendering throughput is dropped by 10%
  with SNA, or as much as 3x with UXA. OpenGL performance is likely to
  be reduced by about 30%. More CPU time is spent waiting for the GPU
  with rc6 disabled, so increased power consumption.

  ProblemType: Crash
  DistroRelease: Ubuntu 12.10
  Package: xserver-xorg-video-intel 2:2.20.3-0ubuntu1
  Uname: Linux 3.6.0-rc3-git-20120826.1015 x86_64
  ApportVersion: 2.5.1-0ubuntu2
  Architecture: amd64
  Chipset: sandybridge-m-gt2
  Date: Sun Aug 26 16:06:32 2012
  DistroCodename: quantal
  DistroVariant: ubuntu
  DuplicateSignature: [sandybridge-m-gt2] GPU lockup  IPEHR: 0x0b160001 IPEHR: 
0x0b140001 Ubuntu 12.10
  EcryptfsInUse: Yes
  ExecutablePath: /usr/share/apport/apport-gpu-error-intel.py
  GpuHangFrequency: Continuously
  InstallationMedia: Ubuntu 12.10 Quantal Quetzal - Alpha amd64 (20120724.2)
  InterpreterPath: /usr/bin/python3.2mu
  MachineType: Dell Inc. Dell System XPS L502X
  ProcCmdline: /usr/bin/python3 /usr/share/apport/apport-gpu-error-intel.py
  ProcEnviron:

  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.6.0-rc3-git-20120826.1015 
root=UUID=135c8090-427c-460a-909d-eff262cd44b6 ro quiet splash vt.handoff=7
  RelatedPackageVersions:
   xserver-xorg 1:7.7+1ubuntu3
   libdrm2  2.4.38-0ubuntu2
   xserver-xorg-video-intel 2:2.20.3-0ubuntu1
  SourcePackage: xserver-xorg-video-intel
  Title: [sandybridge-m-gt2] GPU lockup  IPEHR: 0x0b160001 IPEHR: 0x0b140001
  UdevDb: Error: [Errno 2] No such file or directory: 'udevadm'
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups:

  dmi.bios.date: 05/29/2012
  dmi.bios.vendor: Dell Inc.
  dmi.bios.version: A11
  dmi.board.name: 0NJT03
  dmi.board.vendor: Dell Inc.
  dmi.board.version: A00
  dmi.chassis.type: 8
  dmi.chassis.vendor: Dell Inc.
  dmi.chassis.version: 0.1
  dmi.modalias: 
dmi:bvnDellInc.:bvrA11:bd05/29/2012:svnDellInc.:pnDellSystemXPSL502X:pvr:rvnDellInc.:rn0NJT03:rvrA00:cvnDellInc.:ct8:cvr0.1:
  dmi.product.name: Dell System XPS L502X
  dmi.sys.vendor: Dell Inc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/xserver-xorg-video-intel/+bug/1041790/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1234541] Re: 1814:3290 Ralink corp. RT3290 Bluetooth not toggling on

2014-07-16 Thread Geoff Kelsall
I do not understand why this bug is not a duplicate of bug 1189721.
Surely the cause of it not toggling on is that there is no driver?
Please could you explain.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1234541

Title:
  1814:3290 Ralink corp. RT3290 Bluetooth not toggling on

Status in “linux” package in Ubuntu:
  Triaged

Bug description:
  When I try to toggle my Novatech nfinity laptop bluetooth via Fn+F11
  nothing happens.

  geoff@geoff-laptop:~$ lspci|grep Bluetooth
  01:00.1 Bluetooth: Ralink corp. RT3290 Bluetooth
  geoff@geoff-laptop:~$ ps aux| grep bluetooth
  geoff 2090  0.0  0.1 490248  6648 ?Sl   09:02   0:00 
/usr/lib/x86_64-linux-gnu/indicator-bluetooth/indicator-bluetooth-service
  root  3328  0.0  0.0  19240  1752 ?Ss   09:41   0:00 
/usr/sbin/bluetoothd
  geoff 3371  0.0  0.0  14984  1004 pts/3R+   09:52   0:00 grep 
--color=auto bluetooth

  ProblemType: Bug
  DistroRelease: Ubuntu 13.04
  Package: linux-image-3.8.0-19-generic 3.8.0-19.29 [modified: 
boot/vmlinuz-3.8.0-19-generic]
  ProcVersionSignature: Ubuntu 3.8.0-19.29-generic 3.8.8
  Uname: Linux 3.8.0-19-generic x86_64
  ApportVersion: 2.9.2-0ubuntu8
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  geoff  1957 F pulseaudio
  Date: Thu Oct  3 09:58:04 2013
  HibernationDevice: RESUME=UUID=75bcd0bb-68ec-4ee2-a80d-e6cd4aa1d39d
  InstallationDate: Installed on 2013-10-03 (0 days ago)
  InstallationMedia: Ubuntu 13.04 Raring Ringtail - Release amd64 (20130424)
  MachineType: To be filled by O.E.M. To be filled by O.E.M.
  MarkForUpload: True
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.8.0-19-generic 
root=UUID=286ca2cc-f79e-446b-9746-3865b1bfc022 ro quiet splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-3.8.0-19-generic N/A
   linux-backports-modules-3.8.0-19-generic  N/A
   linux-firmware1.106
  RfKill:
   0: phy0: Wireless LAN
    Soft blocked: no
    Hard blocked: no
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 06/11/2012
  dmi.bios.vendor: American Megatrends Inc.
  dmi.bios.version: 4.6.5
  dmi.board.asset.tag: To be filled by O.E.M.
  dmi.board.name: ChiefRiver
  dmi.board.vendor: INTEL Corporation
  dmi.board.version: To be filled by O.E.M.
  dmi.chassis.asset.tag: To Be Filled By O.E.M.
  dmi.chassis.type: 3
  dmi.chassis.vendor: To Be Filled By O.E.M.
  dmi.chassis.version: To Be Filled By O.E.M.
  dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvr4.6.5:bd06/11/2012:svnTobefilledbyO.E.M.:pnTobefilledbyO.E.M.:pvrTobefilledbyO.E.M.:rvnINTELCorporation:rnChiefRiver:rvrTobefilledbyO.E.M.:cvnToBeFilledByO.E.M.:ct3:cvrToBeFilledByO.E.M.:
  dmi.product.name: To be filled by O.E.M.
  dmi.product.version: To be filled by O.E.M.
  dmi.sys.vendor: To be filled by O.E.M.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1234541/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1189721] Re: Ralink RT3290 needs bluetooth driver

2014-07-16 Thread Geoff Kelsall
I do not understand why Bug #1234541 is not a duplicate of this bug.
Surely the cause of bluetooth not toggling on is that there is no
driver? Please could you explain.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1189721

Title:
  Ralink RT3290 needs bluetooth driver

Status in “linux” package in Ubuntu:
  Confirmed

Bug description:
  As of Raring Ubuntu has a wifi driver for the RT3290 that works out of
  the box.

  It still does not have bluetooth support.

  This thread in the Ubuntu forums links to a driver that is claimed to
  work:

  http://ubuntuforums.org/showthread.php?t=2115570
  --- 
  ApportVersion: 2.9.2-0ubuntu8.3
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  graeme 2412 F pulseaudio
  CRDA:
   country GB:
(2402 - 2482 @ 40), (N/A, 20)
(5170 - 5250 @ 40), (N/A, 20)
(5250 - 5330 @ 40), (N/A, 20), DFS
(5490 - 5710 @ 40), (N/A, 27), DFS
  DistroRelease: Ubuntu 13.04
  EcryptfsInUse: Yes
  HibernationDevice: RESUME=UUID=2d107179-35e2-4b1f-8bdd-90a01132ec70
  InstallationDate: Installed on 2013-05-17 (144 days ago)
  InstallationMedia: Ubuntu 13.04 Raring Ringtail - Release amd64 (20130424)
  MachineType: Hewlett-Packard HP ProBook 4540s
  MarkForUpload: True
  Package: linux (not installed)
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.8.0-31-generic 
root=UUID=ac74fd89-3445-4a6d-b91b-ae4987867afe ro quiet splash 
acpi_backlight=vendor vt.handoff=7
  ProcVersionSignature: Ubuntu 3.8.0-31.46-generic 3.8.13.8
  RelatedPackageVersions:
   linux-restricted-modules-3.8.0-31-generic N/A
   linux-backports-modules-3.8.0-31-generic  N/A
   linux-firmware1.106
  RfKill:
   0: phy0: Wireless LAN
Soft blocked: no
Hard blocked: no
  Tags:  raring
  Uname: Linux 3.8.0-31-generic x86_64
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: adm cdrom dialout dip lpadmin plugdev sambashare sudo
  dmi.bios.date: 11/06/2012
  dmi.bios.vendor: Hewlett-Packard
  dmi.bios.version: 68IRR Ver. F.32
  dmi.board.name: 17F6
  dmi.board.vendor: Hewlett-Packard
  dmi.board.version: KBC Version 58.1D
  dmi.chassis.type: 10
  dmi.chassis.vendor: Hewlett-Packard
  dmi.modalias: 
dmi:bvnHewlett-Packard:bvr68IRRVer.F.32:bd11/06/2012:svnHewlett-Packard:pnHPProBook4540s:pvrA1018C1100:rvnHewlett-Packard:rn17F6:rvrKBCVersion58.1D:cvnHewlett-Packard:ct10:cvr:
  dmi.product.name: HP ProBook 4540s
  dmi.product.version: A1018C1100
  dmi.sys.vendor: Hewlett-Packard

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1189721/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1342548] [NEW] [Dell Inspiron 5437] Wireless key does not work on this system

2014-07-16 Thread Po-Hsu Lin
Public bug reported:

CID: 201305-13673 Dell Inspiron 5437

The wireless hotkey does not work on this system

Steps:
1. Install 14.04 + update (3.13.0-30), boot to desktop
2. Try to control wireless / BT with the hotkey

Expected result:
* Wireless / BT could be controlled by the hotkey

Actual result:
* Hotkey is not working

Debugging information:
ubuntu@201305-13673:~$ sudo showkey -k
kb mode was ?UNKNOWN?
[ if you are trying this under X, it might not work
since the X server is also reading /dev/console ]

press any key (program terminates 10s after last keypress)...
keycode  28 release
keycode 240 press
keycode 240 release
keycode 240 press
keycode 240 release
^Ccaught signal 2, cleaning up...

KeyPress event, serial 37, synthetic NO, window 0x3a1,
root 0x2c0, subw 0x0, time 199006, (-357,353), root:(430,405),
state 0x0, keycode 248 (keysym 0x0, NoSymbol), same_screen YES,
XLookupString gives 0 bytes: 
XmbLookupString gives 0 bytes: 
XFilterEvent returns: False

KeyRelease event, serial 37, synthetic NO, window 0x3a1,
root 0x2c0, subw 0x0, time 199006, (-357,353), root:(430,405),
state 0x0, keycode 248 (keysym 0x0, NoSymbol), same_screen YES,
XLookupString gives 0 bytes: 
XFilterEvent returns: False

nothing from sudo showkey -s

ProblemType: Bug
DistroRelease: Ubuntu 14.04
Package: linux-image-3.13.0-30-generic 3.13.0-30.55
ProcVersionSignature: Ubuntu 3.13.0-30.55-generic 3.13.11.2
Uname: Linux 3.13.0-30-generic x86_64
NonfreeKernelModules: nvidia
ApportVersion: 2.14.1-0ubuntu3.2
Architecture: amd64
AudioDevicesInUse:
 USERPID ACCESS COMMAND
 /dev/snd/controlC0:  ubuntu 1638 F pulseaudio
 /dev/snd/controlC1:  ubuntu 1638 F pulseaudio
CRDA:
 country TW:
(2402 - 2472 @ 40), (3, 27)
(5270 - 5330 @ 40), (3, 17), DFS
(5735 - 5815 @ 40), (3, 30)
CurrentDesktop: Unity
Date: Wed Jul 16 01:56:06 2014
HibernationDevice: RESUME=UUID=67674077-ce03-4513-b8be-b3e9bdd8840d
InstallationDate: Installed on 2014-07-16 (0 days ago)
InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Release amd64 (20140417)
MachineType: Dell Inc. Inspiron 5437
ProcFB: 0 inteldrmfb
ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-30-generic.efi.signed 
root=UUID=e56f47e4-b04b-4702-b89f-59e1c08572c4 ro quiet splash vt.handoff=7
RelatedPackageVersions:
 linux-restricted-modules-3.13.0-30-generic N/A
 linux-backports-modules-3.13.0-30-generic  N/A
 linux-firmware 1.127.4
SourcePackage: linux
UpgradeStatus: No upgrade log present (probably fresh install)
dmi.bios.date: 11/14/2013
dmi.bios.vendor: Dell Inc.
dmi.bios.version: A07
dmi.board.vendor: Dell Inc.
dmi.board.version: A07
dmi.chassis.type: 8
dmi.chassis.vendor: Dell Inc.
dmi.chassis.version: Not Specified
dmi.modalias: 
dmi:bvnDellInc.:bvrA07:bd11/14/2013:svnDellInc.:pnInspiron5437:pvrNotSpecified:rvnDellInc.:rn:rvrA07:cvnDellInc.:ct8:cvrNotSpecified:
dmi.product.name: Inspiron 5437
dmi.product.version: Not Specified
dmi.sys.vendor: Dell Inc.

** Affects: linux (Ubuntu)
 Importance: Medium
 Assignee: Anthony Wong (anthonywong)
 Status: New


** Tags: 201305-13673 amd64 apport-bug taipei-lab trusty

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1342548

Title:
  [Dell Inspiron 5437] Wireless key does not work on this system

Status in “linux” package in Ubuntu:
  New

Bug description:
  CID: 201305-13673 Dell Inspiron 5437

  The wireless hotkey does not work on this system

  Steps:
  1. Install 14.04 + update (3.13.0-30), boot to desktop
  2. Try to control wireless / BT with the hotkey

  Expected result:
  * Wireless / BT could be controlled by the hotkey

  Actual result:
  * Hotkey is not working

  Debugging information:
  ubuntu@201305-13673:~$ sudo showkey -k
  kb mode was ?UNKNOWN?
  [ if you are trying this under X, it might not work
  since the X server is also reading /dev/console ]

  press any key (program terminates 10s after last keypress)...
  keycode  28 release
  keycode 240 press
  keycode 240 release
  keycode 240 press
  keycode 240 release
  ^Ccaught signal 2, cleaning up...

  KeyPress event, serial 37, synthetic NO, window 0x3a1,
  root 0x2c0, subw 0x0, time 199006, (-357,353), root:(430,405),
  state 0x0, keycode 248 (keysym 0x0, NoSymbol), same_screen YES,
  XLookupString gives 0 bytes: 
  XmbLookupString gives 0 bytes: 
  XFilterEvent returns: False

  KeyRelease event, serial 37, synthetic NO, window 0x3a1,
  root 0x2c0, subw 0x0, time 199006, (-357,353), root:(430,405),
  state 0x0, keycode 248 (keysym 0x0, NoSymbol), same_screen YES,
  XLookupString gives 0 bytes: 
  XFilterEvent returns: False

  nothing from sudo showkey -s

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.13.0-30-generic 3.13.0-30.55
  ProcVersionSignature: Ubuntu 

[Kernel-packages] [Bug 1313830] Re: [Lenovo ThinkPad X230] LCD Backlight dims completely when disconnecting external monitor

2014-07-16 Thread Yang Kun (YK)
** Changed in: linux (Ubuntu Trusty)
 Assignee: (unassigned) = Liming Wang (wangliming)

** Changed in: linux (Ubuntu Trusty)
   Importance: Medium = High

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1313830

Title:
  [Lenovo ThinkPad X230] LCD Backlight dims completely when
  disconnecting external monitor

Status in “linux” package in Ubuntu:
  Fix Released
Status in “linux” source package in Trusty:
  Confirmed

Bug description:
  After undocking with external DVI monitor connected to dock the
  laptop's internal LCD dims all the way (backlight still on, but as dim
  as it goes). Keyboard backlight controls cause OSD indicator to show
  backlight changing but no affect on LCD brightness.

  Issue also reported for RedHat here:
  https://bugzilla.redhat.com/show_bug.cgi?id=1067071

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.13.0-24-generic 3.13.0-24.46
  ProcVersionSignature: Ubuntu 3.13.0-24.46-generic 3.13.9
  Uname: Linux 3.13.0-24-generic x86_64
  ApportVersion: 2.14.1-0ubuntu3
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  dustin 2683 F pulseaudio
  CurrentDesktop: Unity
  Date: Mon Apr 28 10:13:42 2014
  EcryptfsInUse: Yes
  HibernationDevice: RESUME=UUID=79c0f3ac-bda7-4a28-9ae1-6bb19ab0fd0d
  InstallationDate: Installed on 2013-10-08 (201 days ago)
  InstallationMedia: Ubuntu 13.10 Saucy Salamander - Beta amd64 (20130925.1)
  MachineType: LENOVO 2306CTO
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-24-generic.efi.signed 
root=UUID=2f1bbe89-ca2f-4884-8fc6-8a476dd1a475 ro
  RelatedPackageVersions:
   linux-restricted-modules-3.13.0-24-generic N/A
   linux-backports-modules-3.13.0-24-generic  N/A
   linux-firmware 1.127
  SourcePackage: linux
  UpgradeStatus: Upgraded to trusty on 2014-01-08 (109 days ago)
  dmi.bios.date: 03/05/2013
  dmi.bios.vendor: LENOVO
  dmi.bios.version: G2ETA0WW (2.60 )
  dmi.board.asset.tag: Not Available
  dmi.board.name: 2306CTO
  dmi.board.vendor: LENOVO
  dmi.board.version: Not Defined
  dmi.chassis.asset.tag: No Asset Information
  dmi.chassis.type: 10
  dmi.chassis.vendor: LENOVO
  dmi.chassis.version: Not Available
  dmi.modalias: 
dmi:bvnLENOVO:bvrG2ETA0WW(2.60):bd03/05/2013:svnLENOVO:pn2306CTO:pvrThinkPadX230:rvnLENOVO:rn2306CTO:rvrNotDefined:cvnLENOVO:ct10:cvrNotAvailable:
  dmi.product.name: 2306CTO
  dmi.product.version: ThinkPad X230
  dmi.sys.vendor: LENOVO

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1313830/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1342548] Status changed to Confirmed

2014-07-16 Thread Brad Figg
This change was made by a bot.

** Changed in: linux (Ubuntu)
   Status: New = Confirmed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1342548

Title:
  [Dell Inspiron 5437] Wireless key does not work on this system

Status in “linux” package in Ubuntu:
  Confirmed

Bug description:
  CID: 201305-13673 Dell Inspiron 5437

  The wireless hotkey does not work on this system

  Steps:
  1. Install 14.04 + update (3.13.0-30), boot to desktop
  2. Try to control wireless / BT with the hotkey

  Expected result:
  * Wireless / BT could be controlled by the hotkey

  Actual result:
  * Hotkey is not working

  Debugging information:
  ubuntu@201305-13673:~$ sudo showkey -k
  kb mode was ?UNKNOWN?
  [ if you are trying this under X, it might not work
  since the X server is also reading /dev/console ]

  press any key (program terminates 10s after last keypress)...
  keycode  28 release
  keycode 240 press
  keycode 240 release
  keycode 240 press
  keycode 240 release
  ^Ccaught signal 2, cleaning up...

  KeyPress event, serial 37, synthetic NO, window 0x3a1,
  root 0x2c0, subw 0x0, time 199006, (-357,353), root:(430,405),
  state 0x0, keycode 248 (keysym 0x0, NoSymbol), same_screen YES,
  XLookupString gives 0 bytes: 
  XmbLookupString gives 0 bytes: 
  XFilterEvent returns: False

  KeyRelease event, serial 37, synthetic NO, window 0x3a1,
  root 0x2c0, subw 0x0, time 199006, (-357,353), root:(430,405),
  state 0x0, keycode 248 (keysym 0x0, NoSymbol), same_screen YES,
  XLookupString gives 0 bytes: 
  XFilterEvent returns: False

  nothing from sudo showkey -s

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.13.0-30-generic 3.13.0-30.55
  ProcVersionSignature: Ubuntu 3.13.0-30.55-generic 3.13.11.2
  Uname: Linux 3.13.0-30-generic x86_64
  NonfreeKernelModules: nvidia
  ApportVersion: 2.14.1-0ubuntu3.2
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  ubuntu 1638 F pulseaudio
   /dev/snd/controlC1:  ubuntu 1638 F pulseaudio
  CRDA:
   country TW:
(2402 - 2472 @ 40), (3, 27)
(5270 - 5330 @ 40), (3, 17), DFS
(5735 - 5815 @ 40), (3, 30)
  CurrentDesktop: Unity
  Date: Wed Jul 16 01:56:06 2014
  HibernationDevice: RESUME=UUID=67674077-ce03-4513-b8be-b3e9bdd8840d
  InstallationDate: Installed on 2014-07-16 (0 days ago)
  InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Release amd64 (20140417)
  MachineType: Dell Inc. Inspiron 5437
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-30-generic.efi.signed 
root=UUID=e56f47e4-b04b-4702-b89f-59e1c08572c4 ro quiet splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-3.13.0-30-generic N/A
   linux-backports-modules-3.13.0-30-generic  N/A
   linux-firmware 1.127.4
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 11/14/2013
  dmi.bios.vendor: Dell Inc.
  dmi.bios.version: A07
  dmi.board.vendor: Dell Inc.
  dmi.board.version: A07
  dmi.chassis.type: 8
  dmi.chassis.vendor: Dell Inc.
  dmi.chassis.version: Not Specified
  dmi.modalias: 
dmi:bvnDellInc.:bvrA07:bd11/14/2013:svnDellInc.:pnInspiron5437:pvrNotSpecified:rvnDellInc.:rn:rvrA07:cvnDellInc.:ct8:cvrNotSpecified:
  dmi.product.name: Inspiron 5437
  dmi.product.version: Not Specified
  dmi.sys.vendor: Dell Inc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1342548/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1342561] [NEW] Touchpad not recognized + Fn Keys not working (ACPI errors)

2014-07-16 Thread verion GmbH
Public bug reported:

The touchpad is not recognized.
The psmouse.proto=bare hotfix does not work.
The i8042.noaux i8042.reset does not work, even though the touchpad would 
work in PS2 compat mode (under Win7).

The FN keys are not working at all, probably due to some strange ACPI
decode errors in the syslog.

Affected models: ASUS X750LN, ASUS X750LB, ASUS P750L (all models)

Ubuntu Version:  Ubuntu 3.13.0-24.46-generic 3.13.9

ProblemType: Bug
DistroRelease: Ubuntu 14.04
Package: linux-image-3.13.0-24-generic 3.13.0-24.46
ProcVersionSignature: Ubuntu 3.13.0-24.46-generic 3.13.9
Uname: Linux 3.13.0-24-generic x86_64
ApportVersion: 2.14.1-0ubuntu3
Architecture: amd64
AudioDevicesInUse:
 USERPID ACCESS COMMAND
 /dev/snd/controlC1:  ubuntu 3866 F pulseaudio
 /dev/snd/controlC0:  ubuntu 3866 F pulseaudio
CasperVersion: 1.340
CurrentDesktop: Unity
Date: Wed Jul 16 06:59:29 2014
LiveMediaBuild: Ubuntu 14.04 LTS Trusty Tahr - Release amd64 (20140417)
MachineType: ASUSTeK COMPUTER INC. X750LN
ProcEnviron:
 TERM=xterm
 PATH=(custom, no user)
 XDG_RUNTIME_DIR=set
 LANG=de_DE.UTF-8
 SHELL=/bin/bash
ProcFB: 0 inteldrmfb
ProcKernelCmdLine: file=/preseed/username.seed boot=casper persistent 
initrd=/casper/initrd.lz quiet splash -- debian-installer/language=de 
keyboard-configuration/layoutcode?=de
RelatedPackageVersions:
 linux-restricted-modules-3.13.0-24-generic N/A
 linux-backports-modules-3.13.0-24-generic  N/A
 linux-firmware 1.127
RfKill:
 0: phy0: Wireless LAN
Soft blocked: no
Hard blocked: no
SourcePackage: linux
UpgradeStatus: No upgrade log present (probably fresh install)
dmi.bios.date: 04/01/2014
dmi.bios.vendor: American Megatrends Inc.
dmi.bios.version: 202
dmi.board.asset.tag: To be filled by O.E.M.
dmi.board.name: X750LN
dmi.board.vendor: ASUSTeK COMPUTER INC.
dmi.board.version: 1.0
dmi.chassis.asset.tag: To Be Filled By O.E.M.
dmi.chassis.type: 3
dmi.chassis.vendor: To Be Filled By O.E.M.
dmi.chassis.version: To Be Filled By O.E.M.
dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvr202:bd04/01/2014:svnASUSTeKCOMPUTERINC.:pnX750LN:pvr1.0:rvnASUSTeKCOMPUTERINC.:rnX750LN:rvr1.0:cvnToBeFilledByO.E.M.:ct3:cvrToBeFilledByO.E.M.:
dmi.product.name: X750LN
dmi.product.version: 1.0
dmi.sys.vendor: ASUSTeK COMPUTER INC.

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: amd64 apport-bug trusty

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1342561

Title:
  Touchpad not recognized + Fn Keys not working (ACPI errors)

Status in “linux” package in Ubuntu:
  New

Bug description:
  The touchpad is not recognized.
  The psmouse.proto=bare hotfix does not work.
  The i8042.noaux i8042.reset does not work, even though the touchpad would 
work in PS2 compat mode (under Win7).

  The FN keys are not working at all, probably due to some strange ACPI
  decode errors in the syslog.

  Affected models: ASUS X750LN, ASUS X750LB, ASUS P750L (all models)

  Ubuntu Version:  Ubuntu 3.13.0-24.46-generic 3.13.9

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.13.0-24-generic 3.13.0-24.46
  ProcVersionSignature: Ubuntu 3.13.0-24.46-generic 3.13.9
  Uname: Linux 3.13.0-24-generic x86_64
  ApportVersion: 2.14.1-0ubuntu3
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC1:  ubuntu 3866 F pulseaudio
   /dev/snd/controlC0:  ubuntu 3866 F pulseaudio
  CasperVersion: 1.340
  CurrentDesktop: Unity
  Date: Wed Jul 16 06:59:29 2014
  LiveMediaBuild: Ubuntu 14.04 LTS Trusty Tahr - Release amd64 (20140417)
  MachineType: ASUSTeK COMPUTER INC. X750LN
  ProcEnviron:
   TERM=xterm
   PATH=(custom, no user)
   XDG_RUNTIME_DIR=set
   LANG=de_DE.UTF-8
   SHELL=/bin/bash
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: file=/preseed/username.seed boot=casper persistent 
initrd=/casper/initrd.lz quiet splash -- debian-installer/language=de 
keyboard-configuration/layoutcode?=de
  RelatedPackageVersions:
   linux-restricted-modules-3.13.0-24-generic N/A
   linux-backports-modules-3.13.0-24-generic  N/A
   linux-firmware 1.127
  RfKill:
   0: phy0: Wireless LAN
Soft blocked: no
Hard blocked: no
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 04/01/2014
  dmi.bios.vendor: American Megatrends Inc.
  dmi.bios.version: 202
  dmi.board.asset.tag: To be filled by O.E.M.
  dmi.board.name: X750LN
  dmi.board.vendor: ASUSTeK COMPUTER INC.
  dmi.board.version: 1.0
  dmi.chassis.asset.tag: To Be Filled By O.E.M.
  dmi.chassis.type: 3
  dmi.chassis.vendor: To Be Filled By O.E.M.
  dmi.chassis.version: To Be Filled By O.E.M.
  dmi.modalias: 

[Kernel-packages] [Bug 1342561] Status changed to Confirmed

2014-07-16 Thread Brad Figg
This change was made by a bot.

** Changed in: linux (Ubuntu)
   Status: New = Confirmed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1342561

Title:
  Touchpad not recognized + Fn Keys not working (ACPI errors)

Status in “linux” package in Ubuntu:
  Confirmed

Bug description:
  The touchpad is not recognized.
  The psmouse.proto=bare hotfix does not work.
  The i8042.noaux i8042.reset does not work, even though the touchpad would 
work in PS2 compat mode (under Win7).

  The FN keys are not working at all, probably due to some strange ACPI
  decode errors in the syslog.

  Affected models: ASUS X750LN, ASUS X750LB, ASUS P750L (all models)

  Ubuntu Version:  Ubuntu 3.13.0-24.46-generic 3.13.9

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.13.0-24-generic 3.13.0-24.46
  ProcVersionSignature: Ubuntu 3.13.0-24.46-generic 3.13.9
  Uname: Linux 3.13.0-24-generic x86_64
  ApportVersion: 2.14.1-0ubuntu3
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC1:  ubuntu 3866 F pulseaudio
   /dev/snd/controlC0:  ubuntu 3866 F pulseaudio
  CasperVersion: 1.340
  CurrentDesktop: Unity
  Date: Wed Jul 16 06:59:29 2014
  LiveMediaBuild: Ubuntu 14.04 LTS Trusty Tahr - Release amd64 (20140417)
  MachineType: ASUSTeK COMPUTER INC. X750LN
  ProcEnviron:
   TERM=xterm
   PATH=(custom, no user)
   XDG_RUNTIME_DIR=set
   LANG=de_DE.UTF-8
   SHELL=/bin/bash
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: file=/preseed/username.seed boot=casper persistent 
initrd=/casper/initrd.lz quiet splash -- debian-installer/language=de 
keyboard-configuration/layoutcode?=de
  RelatedPackageVersions:
   linux-restricted-modules-3.13.0-24-generic N/A
   linux-backports-modules-3.13.0-24-generic  N/A
   linux-firmware 1.127
  RfKill:
   0: phy0: Wireless LAN
Soft blocked: no
Hard blocked: no
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 04/01/2014
  dmi.bios.vendor: American Megatrends Inc.
  dmi.bios.version: 202
  dmi.board.asset.tag: To be filled by O.E.M.
  dmi.board.name: X750LN
  dmi.board.vendor: ASUSTeK COMPUTER INC.
  dmi.board.version: 1.0
  dmi.chassis.asset.tag: To Be Filled By O.E.M.
  dmi.chassis.type: 3
  dmi.chassis.vendor: To Be Filled By O.E.M.
  dmi.chassis.version: To Be Filled By O.E.M.
  dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvr202:bd04/01/2014:svnASUSTeKCOMPUTERINC.:pnX750LN:pvr1.0:rvnASUSTeKCOMPUTERINC.:rnX750LN:rvr1.0:cvnToBeFilledByO.E.M.:ct3:cvrToBeFilledByO.E.M.:
  dmi.product.name: X750LN
  dmi.product.version: 1.0
  dmi.sys.vendor: ASUSTeK COMPUTER INC.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1342561/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1342568] [NEW] bluetooth connect fails

2014-07-16 Thread JPTTEST
Public bug reported:

I want to connect to a BT-serial adapter. Always get the error Unknown
command complete for opcode 37.

If I supply the correct pin, connection is reported successful, but the
device immediately disappears.

I tried three different host BT hardware and two different PCs. always
the same.

Kubuntu 14.04
Bluez-4.101-ubuntu13

syslog: First with correct pin, second using wrong pin:

bluetoothd[1107]: Discovery session 0x7f66d5221040 with :1.117 activated
bluetoothd[1107]: Unknown command complete for opcode 37
bluetoothd[1107]: Stopping discovery

bluetoothd[1107]: Discovery session 0x7f66d52209a0 with :1.118 activated
bluetoothd[1107]: Unknown command complete for opcode 37
bluetoothd[1107]: Stopping discovery
bluetoothd[1107]: hci0: Cancel Pair Device (0x001a) failed: Invalid Parameters 
(0x0d) 

How do I enable more detailed logging?

I am quite sure this is no duplicate of those BT-suspend bugs. Because
it always fails and the rfkill workaround doesn't help.

** Affects: bluez (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to bluez in Ubuntu.
https://bugs.launchpad.net/bugs/1342568

Title:
  bluetooth connect fails

Status in “bluez” package in Ubuntu:
  New

Bug description:
  I want to connect to a BT-serial adapter. Always get the error
  Unknown command complete for opcode 37.

  If I supply the correct pin, connection is reported successful, but
  the device immediately disappears.

  I tried three different host BT hardware and two different PCs. always
  the same.

  Kubuntu 14.04
  Bluez-4.101-ubuntu13

  syslog: First with correct pin, second using wrong pin:

  bluetoothd[1107]: Discovery session 0x7f66d5221040 with :1.117 activated
  bluetoothd[1107]: Unknown command complete for opcode 37
  bluetoothd[1107]: Stopping discovery

  bluetoothd[1107]: Discovery session 0x7f66d52209a0 with :1.118 activated
  bluetoothd[1107]: Unknown command complete for opcode 37
  bluetoothd[1107]: Stopping discovery
  bluetoothd[1107]: hci0: Cancel Pair Device (0x001a) failed: Invalid 
Parameters (0x0d) 

  How do I enable more detailed logging?

  I am quite sure this is no duplicate of those BT-suspend bugs. Because
  it always fails and the rfkill workaround doesn't help.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/bluez/+bug/1342568/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1331251] Re: [Dell Studio 1558] kernel is missing support for i8k module

2014-07-16 Thread jesus ofnazareth
I think this solves the problem for me, at least temporarily on my
Studio 1558. I am now able to compile a scientific library (from Julia
REPL) and not have too many issues...will repost if I find problems.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1331251

Title:
  [Dell Studio 1558] kernel is missing support for i8k module

Status in “linux” package in Ubuntu:
  In Progress

Bug description:
  On previous versions of Ubuntu, I could use i8kfan to control the fans
  on my laptop. I am usually up to compiling lp:inkscape , and when my
  fan speed decreases while compiling, that is a problem. A big problem,
  in fact.

  Now, on 14.04 with kernel 3.13.0-29-generic, I can no longer use
  anything from the package belonging to the branch lp:i8kutils, instead
  receiving this error message:

  ~# i8kfan 2 2
  can't open /proc/i8k: No such file or directory

  Manually inserting the module also returns an error, to make it seem such as 
that the kernel was not compiled with i8k support.
  ~# modprobe i8k
  modprobe: ERROR: could not insert 'i8k': No such device

  ~# insmod /lib/modules/3.13.0-29-generic/kernel/drivers/char/i8k.ko
  insmod: ERROR: could not insert module 
/lib/modules/3.13.0-29-generic/kernel/drivers/char/i8k.ko: No such device

  I also tested this with archived kernel versions on the same device:
  - 3.0.0-12-generic
  - 3.2.0-60-generic
  - 3.13.0-24-generic
  - 3.13.0-27-generic
  - 3.13.0-29-generic (default)
  I could not regain control of i8k on any of these kernels running Ubuntu 
14.04. 

  Related bug #1324372 [Dell XPS 15 (L502X)] i8k kernel module crashes
  system

  Upstream kernel (3.15.0-031500rc7-generic) does not truly fix the
  issue either: while I can control the fan, it appears as though the
  kernel is not effectively blocking the SMM BIOS control mechanisms
  from regaining control in about 5 seconds.

  To put it more simply: running i8kfan to control the fans works — for
  5 seconds. Then the fans turn off completely again. Not good for a
  machine that is at a severe overheating risk. There is no way to keep
  the fans on, even during intensive CPU usage. Reaching its maximum
  operating temperature, the machine shuts down to avoid serious damage
  to the processor.

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.13.0-29-generic 3.13.0-29.53
  ProcVersionSignature: Ubuntu 3.13.0-29.53-generic 3.13.11.2
  Uname: Linux 3.13.0-29-generic x86_64
  ApportVersion: 2.14.1-0ubuntu3.2
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  liam   1661 F pulseaudio
  CurrentDesktop: GNOME
  Date: Tue Jun 17 20:07:39 2014
  HibernationDevice: RESUME=UUID=c869f245-8053-4b24-ac59-317cdddc1f67
  InstallationDate: Installed on 2014-04-21 (57 days ago)
  InstallationMedia: Ubuntu-GNOME 14.04 LTS Trusty Tahr - Release amd64 
(20140416.2)
  Lsusb:
   Bus 002 Device 002: ID 8087:0020 Intel Corp. Integrated Rate Matching Hub
   Bus 002 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
   Bus 001 Device 003: ID 0c45:6416 Microdia 
   Bus 001 Device 002: ID 8087:0020 Intel Corp. Integrated Rate Matching Hub
   Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
  MachineType: Dell Inc. Studio 1558
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-29-generic 
root=UUID=61428a05-4276-43bc-acc1-88079fc166b3 ro quiet splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-3.13.0-29-generic N/A
   linux-backports-modules-3.13.0-29-generic  N/A
   linux-firmware 1.127.2
  RfKill:
   0: phy0: Wireless LAN
Soft blocked: no
Hard blocked: no
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 03/30/2011
  dmi.bios.vendor: Dell Inc.
  dmi.bios.version: A12
  dmi.board.name: 0G939P
  dmi.board.vendor: Dell Inc.
  dmi.board.version: A12
  dmi.chassis.type: 8
  dmi.chassis.vendor: Dell Inc.
  dmi.chassis.version: A12
  dmi.modalias: 
dmi:bvnDellInc.:bvrA12:bd03/30/2011:svnDellInc.:pnStudio1558:pvrA12:rvnDellInc.:rn0G939P:rvrA12:cvnDellInc.:ct8:cvrA12:
  dmi.product.name: Studio 1558
  dmi.product.version: A12
  dmi.sys.vendor: Dell Inc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1331251/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1342570] [NEW] Bluetooth RFCOMM: Transport endpoint not connected (kernel regression)

2014-07-16 Thread Petr Stehlik
Public bug reported:

Ubuntu 12.04's Hardware Enablement Stack (HWE) check forced me to upgrade to 
trusty's kernel:
* Install a newer HWE version by running:
sudo apt-get install linux-generic-lts-trusty linux-image-generic-lts-trusty

Since then bluetooth communication fails with Transport endpoint not
connected. It does work OK if I reboot back to soon-to-be unsupported
kernel 3.5.0.x

This is a known kernel 3.13 regression, please see
https://bugzilla.redhat.com/show_bug.cgi?id=1060457

If it is indeed fixed in kernel 3.14 please backport the fix to trusty's
kernel, or perhaps get 3.14 kernel into trusty. The current 3.13 is not
a good upgrade.

Thanks!

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1342570

Title:
  Bluetooth RFCOMM: Transport endpoint not connected (kernel regression)

Status in “linux” package in Ubuntu:
  New

Bug description:
  Ubuntu 12.04's Hardware Enablement Stack (HWE) check forced me to upgrade 
to trusty's kernel:
  * Install a newer HWE version by running:
  sudo apt-get install linux-generic-lts-trusty linux-image-generic-lts-trusty

  Since then bluetooth communication fails with Transport endpoint not
  connected. It does work OK if I reboot back to soon-to-be unsupported
  kernel 3.5.0.x

  This is a known kernel 3.13 regression, please see
  https://bugzilla.redhat.com/show_bug.cgi?id=1060457

  If it is indeed fixed in kernel 3.14 please backport the fix to
  trusty's kernel, or perhaps get 3.14 kernel into trusty. The current
  3.13 is not a good upgrade.

  Thanks!

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1342570/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1342573] [NEW] nVidia GK208M [GeForce GT 740M][10de:1292] unable to use all available resolutions with the proprietary driver

2014-07-16 Thread Po-Hsu Lin
Public bug reported:

CID: 201305-13673 Dell Inspiron 5437
CID: 201307-14038 Dell Vostro 5470

The graphic card NVIDIA Corporation GK208M [GeForce GT 740M]
does not work well with the proprietary driver

Before installing the proprietary driver, there are 4 resolutions available:
1366 x 768
1360 x 768
1024 x 768
800 x 600
They all work fine.

After the proprietary nVidia driver was installed, the available resolutions 
become:
1366 x 768*
1360 x 768*
1024 x 768*
960 x 720
960 x 600
960 x 540
928 x 696
896 x 672
800 x 600*

But only the one with asterisk works, see attached photo for what happened to 
other resolution options.
And if you switch from a not working resolution to 1024 x 768 or 800 x 600, it 
might have some issues.

ProblemType: Bug
DistroRelease: Ubuntu 14.04
Package: linux-image-3.13.0-30-generic 3.13.0-30.55
ProcVersionSignature: Ubuntu 3.13.0-30.55-generic 3.13.11.2
Uname: Linux 3.13.0-30-generic x86_64
NonfreeKernelModules: nvidia
ApportVersion: 2.14.1-0ubuntu3.2
Architecture: amd64
AudioDevicesInUse:
 USERPID ACCESS COMMAND
 /dev/snd/controlC1:  ubuntu 1730 F pulseaudio
 /dev/snd/controlC0:  ubuntu 1730 F pulseaudio
CRDA:
 country TW:
(2402 - 2472 @ 40), (3, 27)
(5270 - 5330 @ 40), (3, 17), DFS
(5735 - 5815 @ 40), (3, 30)
CurrentDesktop: Unity
Date: Wed Jul 16 03:03:50 2014
HibernationDevice: RESUME=UUID=67674077-ce03-4513-b8be-b3e9bdd8840d
InstallationDate: Installed on 2014-07-16 (0 days ago)
InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Release amd64 (20140417)
MachineType: Dell Inc. Inspiron 5437
ProcFB: 0 inteldrmfb
ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-30-generic.efi.signed 
root=UUID=e56f47e4-b04b-4702-b89f-59e1c08572c4 ro quiet splash vt.handoff=7
RelatedPackageVersions:
 linux-restricted-modules-3.13.0-30-generic N/A
 linux-backports-modules-3.13.0-30-generic  N/A
 linux-firmware 1.127.4
SourcePackage: linux
UpgradeStatus: No upgrade log present (probably fresh install)
dmi.bios.date: 11/14/2013
dmi.bios.vendor: Dell Inc.
dmi.bios.version: A07
dmi.board.vendor: Dell Inc.
dmi.board.version: A07
dmi.chassis.type: 8
dmi.chassis.vendor: Dell Inc.
dmi.chassis.version: Not Specified
dmi.modalias: 
dmi:bvnDellInc.:bvrA07:bd11/14/2013:svnDellInc.:pnInspiron5437:pvrNotSpecified:rvnDellInc.:rn:rvrA07:cvnDellInc.:ct8:cvrNotSpecified:
dmi.product.name: Inspiron 5437
dmi.product.version: Not Specified
dmi.sys.vendor: Dell Inc.

** Affects: hwe-next
 Importance: Undecided
 Status: New

** Affects: nvidia-graphics-drivers-331 (Ubuntu)
 Importance: Undecided
 Assignee: Anthony Wong (anthonywong)
 Status: New


** Tags: 201305-13673 201307-14038 amd64 apport-bug blocks-hwcert taipei-lab 
trusty

** Attachment added: pic.png
   https://bugs.launchpad.net/bugs/1342573/+attachment/4153741/+files/pic.png

** Also affects: hwe-next
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1342573

Title:
  nVidia GK208M [GeForce GT 740M][10de:1292] unable to use all available
  resolutions with the proprietary driver

Status in HWE Next Project:
  New
Status in “nvidia-graphics-drivers-331” package in Ubuntu:
  New

Bug description:
  CID: 201305-13673 Dell Inspiron 5437
  CID: 201307-14038 Dell Vostro 5470

  The graphic card NVIDIA Corporation GK208M [GeForce GT 740M]
  does not work well with the proprietary driver

  Before installing the proprietary driver, there are 4 resolutions available:
  1366 x 768
  1360 x 768
  1024 x 768
  800 x 600
  They all work fine.

  After the proprietary nVidia driver was installed, the available resolutions 
become:
  1366 x 768*
  1360 x 768*
  1024 x 768*
  960 x 720
  960 x 600
  960 x 540
  928 x 696
  896 x 672
  800 x 600*

  But only the one with asterisk works, see attached photo for what happened to 
other resolution options.
  And if you switch from a not working resolution to 1024 x 768 or 800 x 600, 
it might have some issues.

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.13.0-30-generic 3.13.0-30.55
  ProcVersionSignature: Ubuntu 3.13.0-30.55-generic 3.13.11.2
  Uname: Linux 3.13.0-30-generic x86_64
  NonfreeKernelModules: nvidia
  ApportVersion: 2.14.1-0ubuntu3.2
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC1:  ubuntu 1730 F pulseaudio
   /dev/snd/controlC0:  ubuntu 1730 F pulseaudio
  CRDA:
   country TW:
(2402 - 2472 @ 40), (3, 27)
(5270 - 5330 @ 40), (3, 17), DFS
(5735 - 5815 @ 40), (3, 30)
  CurrentDesktop: Unity
  Date: Wed Jul 16 03:03:50 2014
  HibernationDevice: RESUME=UUID=67674077-ce03-4513-b8be-b3e9bdd8840d
  InstallationDate: Installed on 2014-07-16 (0 days ago)
  InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Release amd64 (20140417)
  MachineType: Dell 

[Kernel-packages] [Bug 1342573] Re: nVidia GK208M [GeForce GT 740M][10de:1292] unable to use all available resolutions with the proprietary driver

2014-07-16 Thread Po-Hsu Lin
** Attachment added: Xorg.0.log
   
https://bugs.launchpad.net/hwe-next/+bug/1342573/+attachment/4153758/+files/Xorg.0.log

** Tags added: 201307-14038 taipei-lab

** Package changed: linux (Ubuntu) = nvidia-graphics-drivers-331
(Ubuntu)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1342573

Title:
  nVidia GK208M [GeForce GT 740M][10de:1292] unable to use all available
  resolutions with the proprietary driver

Status in HWE Next Project:
  New
Status in “nvidia-graphics-drivers-331” package in Ubuntu:
  New

Bug description:
  CID: 201305-13673 Dell Inspiron 5437
  CID: 201307-14038 Dell Vostro 5470

  The graphic card NVIDIA Corporation GK208M [GeForce GT 740M]
  does not work well with the proprietary driver

  Before installing the proprietary driver, there are 4 resolutions available:
  1366 x 768
  1360 x 768
  1024 x 768
  800 x 600
  They all work fine.

  After the proprietary nVidia driver was installed, the available resolutions 
become:
  1366 x 768*
  1360 x 768*
  1024 x 768*
  960 x 720
  960 x 600
  960 x 540
  928 x 696
  896 x 672
  800 x 600*

  But only the one with asterisk works, see attached photo for what happened to 
other resolution options.
  And if you switch from a not working resolution to 1024 x 768 or 800 x 600, 
it might have some issues.

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.13.0-30-generic 3.13.0-30.55
  ProcVersionSignature: Ubuntu 3.13.0-30.55-generic 3.13.11.2
  Uname: Linux 3.13.0-30-generic x86_64
  NonfreeKernelModules: nvidia
  ApportVersion: 2.14.1-0ubuntu3.2
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC1:  ubuntu 1730 F pulseaudio
   /dev/snd/controlC0:  ubuntu 1730 F pulseaudio
  CRDA:
   country TW:
(2402 - 2472 @ 40), (3, 27)
(5270 - 5330 @ 40), (3, 17), DFS
(5735 - 5815 @ 40), (3, 30)
  CurrentDesktop: Unity
  Date: Wed Jul 16 03:03:50 2014
  HibernationDevice: RESUME=UUID=67674077-ce03-4513-b8be-b3e9bdd8840d
  InstallationDate: Installed on 2014-07-16 (0 days ago)
  InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Release amd64 (20140417)
  MachineType: Dell Inc. Inspiron 5437
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-30-generic.efi.signed 
root=UUID=e56f47e4-b04b-4702-b89f-59e1c08572c4 ro quiet splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-3.13.0-30-generic N/A
   linux-backports-modules-3.13.0-30-generic  N/A
   linux-firmware 1.127.4
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 11/14/2013
  dmi.bios.vendor: Dell Inc.
  dmi.bios.version: A07
  dmi.board.vendor: Dell Inc.
  dmi.board.version: A07
  dmi.chassis.type: 8
  dmi.chassis.vendor: Dell Inc.
  dmi.chassis.version: Not Specified
  dmi.modalias: 
dmi:bvnDellInc.:bvrA07:bd11/14/2013:svnDellInc.:pnInspiron5437:pvrNotSpecified:rvnDellInc.:rn:rvrA07:cvnDellInc.:ct8:cvrNotSpecified:
  dmi.product.name: Inspiron 5437
  dmi.product.version: Not Specified
  dmi.sys.vendor: Dell Inc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1342573/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1342570] Missing required logs.

2014-07-16 Thread Brad Figg
This bug is missing log files that will aid in diagnosing the problem.
From a terminal window please run:

apport-collect 1342570

and then change the status of the bug to 'Confirmed'.

If, due to the nature of the issue you have encountered, you are unable
to run this command, please add a comment stating that fact and change
the bug status to 'Confirmed'.

This change has been made by an automated script, maintained by the
Ubuntu Kernel Team.

** Changed in: linux (Ubuntu)
   Status: New = Incomplete

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1342570

Title:
  Bluetooth RFCOMM: Transport endpoint not connected (kernel regression)

Status in “linux” package in Ubuntu:
  Incomplete

Bug description:
  Ubuntu 12.04's Hardware Enablement Stack (HWE) check forced me to upgrade 
to trusty's kernel:
  * Install a newer HWE version by running:
  sudo apt-get install linux-generic-lts-trusty linux-image-generic-lts-trusty

  Since then bluetooth communication fails with Transport endpoint not
  connected. It does work OK if I reboot back to soon-to-be unsupported
  kernel 3.5.0.x

  This is a known kernel 3.13 regression, please see
  https://bugzilla.redhat.com/show_bug.cgi?id=1060457

  If it is indeed fixed in kernel 3.14 please backport the fix to
  trusty's kernel, or perhaps get 3.14 kernel into trusty. The current
  3.13 is not a good upgrade.

  Thanks!

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1342570/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1331251] Re: [Dell Studio 1558] kernel is missing support for i8k module

2014-07-16 Thread jesus ofnazareth
oh nvm. fan shuts off repeatedly after i8kfan 2 2

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1331251

Title:
  [Dell Studio 1558] kernel is missing support for i8k module

Status in “linux” package in Ubuntu:
  In Progress

Bug description:
  On previous versions of Ubuntu, I could use i8kfan to control the fans
  on my laptop. I am usually up to compiling lp:inkscape , and when my
  fan speed decreases while compiling, that is a problem. A big problem,
  in fact.

  Now, on 14.04 with kernel 3.13.0-29-generic, I can no longer use
  anything from the package belonging to the branch lp:i8kutils, instead
  receiving this error message:

  ~# i8kfan 2 2
  can't open /proc/i8k: No such file or directory

  Manually inserting the module also returns an error, to make it seem such as 
that the kernel was not compiled with i8k support.
  ~# modprobe i8k
  modprobe: ERROR: could not insert 'i8k': No such device

  ~# insmod /lib/modules/3.13.0-29-generic/kernel/drivers/char/i8k.ko
  insmod: ERROR: could not insert module 
/lib/modules/3.13.0-29-generic/kernel/drivers/char/i8k.ko: No such device

  I also tested this with archived kernel versions on the same device:
  - 3.0.0-12-generic
  - 3.2.0-60-generic
  - 3.13.0-24-generic
  - 3.13.0-27-generic
  - 3.13.0-29-generic (default)
  I could not regain control of i8k on any of these kernels running Ubuntu 
14.04. 

  Related bug #1324372 [Dell XPS 15 (L502X)] i8k kernel module crashes
  system

  Upstream kernel (3.15.0-031500rc7-generic) does not truly fix the
  issue either: while I can control the fan, it appears as though the
  kernel is not effectively blocking the SMM BIOS control mechanisms
  from regaining control in about 5 seconds.

  To put it more simply: running i8kfan to control the fans works — for
  5 seconds. Then the fans turn off completely again. Not good for a
  machine that is at a severe overheating risk. There is no way to keep
  the fans on, even during intensive CPU usage. Reaching its maximum
  operating temperature, the machine shuts down to avoid serious damage
  to the processor.

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.13.0-29-generic 3.13.0-29.53
  ProcVersionSignature: Ubuntu 3.13.0-29.53-generic 3.13.11.2
  Uname: Linux 3.13.0-29-generic x86_64
  ApportVersion: 2.14.1-0ubuntu3.2
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  liam   1661 F pulseaudio
  CurrentDesktop: GNOME
  Date: Tue Jun 17 20:07:39 2014
  HibernationDevice: RESUME=UUID=c869f245-8053-4b24-ac59-317cdddc1f67
  InstallationDate: Installed on 2014-04-21 (57 days ago)
  InstallationMedia: Ubuntu-GNOME 14.04 LTS Trusty Tahr - Release amd64 
(20140416.2)
  Lsusb:
   Bus 002 Device 002: ID 8087:0020 Intel Corp. Integrated Rate Matching Hub
   Bus 002 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
   Bus 001 Device 003: ID 0c45:6416 Microdia 
   Bus 001 Device 002: ID 8087:0020 Intel Corp. Integrated Rate Matching Hub
   Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
  MachineType: Dell Inc. Studio 1558
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-29-generic 
root=UUID=61428a05-4276-43bc-acc1-88079fc166b3 ro quiet splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-3.13.0-29-generic N/A
   linux-backports-modules-3.13.0-29-generic  N/A
   linux-firmware 1.127.2
  RfKill:
   0: phy0: Wireless LAN
Soft blocked: no
Hard blocked: no
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 03/30/2011
  dmi.bios.vendor: Dell Inc.
  dmi.bios.version: A12
  dmi.board.name: 0G939P
  dmi.board.vendor: Dell Inc.
  dmi.board.version: A12
  dmi.chassis.type: 8
  dmi.chassis.vendor: Dell Inc.
  dmi.chassis.version: A12
  dmi.modalias: 
dmi:bvnDellInc.:bvrA12:bd03/30/2011:svnDellInc.:pnStudio1558:pvrA12:rvnDellInc.:rn0G939P:rvrA12:cvnDellInc.:ct8:cvrA12:
  dmi.product.name: Studio 1558
  dmi.product.version: A12
  dmi.sys.vendor: Dell Inc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1331251/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1296066] Re: [Lenovo ThinkPad X1 Carbon 20A7] suspend/resume failure

2014-07-16 Thread Rémi D
** Changed in: linux (Ubuntu)
   Status: Expired = Confirmed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1296066

Title:
  [Lenovo ThinkPad X1 Carbon 20A7] suspend/resume failure

Status in “linux” package in Ubuntu:
  Confirmed

Bug description:
  system does not wake up after sudo pm-suspend.

  ProblemType: KernelOops
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.13.0-18-generic 3.13.0-18.38
  ProcVersionSignature: Ubuntu 3.13.0-18.38-generic 3.13.6
  Uname: Linux 3.13.0-18-generic x86_64
  Annotation: This occured during a previous suspend and prevented it from 
resuming properly.
  ApportVersion: 2.13.3-0ubuntu1
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC1:  lightdm1502 F pulseaudio
plejaden   2151 F pulseaudio
   /dev/snd/controlC0:  lightdm1502 F pulseaudio
plejaden   2151 F pulseaudio
  Date: Fri Mar 21 23:26:37 2014
  ExecutablePath: /usr/share/apport/apportcheckresume
  Failure: suspend/resume
  InstallationDate: Installed on 2014-03-20 (2 days ago)
  InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Alpha amd64+mac (20140318)
  InterpreterPath: /usr/bin/python3.4
  MachineType: LENOVO 20A7005JGE
  ProcCmdline: /usr/bin/python3 /usr/share/apport/apportcheckresume
  ProcEnviron:
   TERM=linux
   PATH=(custom, no user)
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-18-generic 
root=UUID=59ec0854-9dc0-41fd-a7b9-da9df8969a7f ro quiet splash vt.handoff=7
  PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No 
PulseAudio daemon running, or not running as session daemon.
  RelatedPackageVersions:
   linux-restricted-modules-3.13.0-18-generic N/A
   linux-backports-modules-3.13.0-18-generic  N/A
   linux-firmware 1.126
  SourcePackage: linux
  Title: [LENOVO 20A7005JGE] suspend/resume failure
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups:
   
  dmi.bios.date: 01/13/2014
  dmi.bios.vendor: LENOVO
  dmi.bios.version: GRET30WW (1.07 )
  dmi.board.asset.tag: Not Available
  dmi.board.name: 20A7005JGE
  dmi.board.vendor: LENOVO
  dmi.board.version: SDK0E50510 Pro
  dmi.chassis.asset.tag: No Asset Information
  dmi.chassis.type: 10
  dmi.chassis.vendor: LENOVO
  dmi.chassis.version: Not Available
  dmi.modalias: 
dmi:bvnLENOVO:bvrGRET30WW(1.07):bd01/13/2014:svnLENOVO:pn20A7005JGE:pvrThinkPadX1Carbon2nd:rvnLENOVO:rn20A7005JGE:rvrSDK0E50510Pro:cvnLENOVO:ct10:cvrNotAvailable:
  dmi.product.name: 20A7005JGE
  dmi.product.version: ThinkPad X1 Carbon 2nd
  dmi.sys.vendor: LENOVO

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1296066/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1321421] Re: 8086:8ca0 Sound output distorted/unusable with Intel Z97/H97

2014-07-16 Thread Domantas Jackūnas
#28 works for me too.

Linux Mint 17 3.13.0-24-generic with MSI Z97-43 Gaming motherboard.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1321421

Title:
  8086:8ca0 Sound output distorted/unusable with Intel Z97/H97

Status in “linux” package in Ubuntu:
  Triaged

Bug description:
  I get horribly cracking sound and distortion with my ne AS Rock
  Fatal1ty H97 Performance Mainboard. This MB is using PuritySound 2
  Engine powered by the Realtek ALC1150 Chipset. Here is some ALSA Info:
  http://www.alsa-
  project.org/db/?f=44b12e252a2cf7ebb75ab3e23d5cef072af6c328

  Following commit fixes this problem:
  
https://kernel.googlesource.com/pub/scm/linux/kernel/git/tiwai/sound/+/77f07800cb456bed6e5c345e6e4e83e8eda62437

  WORKAROUND: Create a modprobe.d file with command:
  echo options snd-hda-intel vid=8086 pid=8ca0 snoop=0 | sudo tee 
/etc/modprobe.d/fix-sound-intel97.conf

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: alsa-base 1.0.25+dfsg-0ubuntu4
  ProcVersionSignature: Ubuntu 3.13.0-24.46-generic 3.13.9
  Uname: Linux 3.13.0-24-generic x86_64
  ApportVersion: 2.14.1-0ubuntu3.1
  Architecture: amd64
  CurrentDesktop: Unity
  Date: Tue May 20 21:03:18 2014
  InstallationDate: Installed on 2014-05-20 (0 days ago)
  InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Release amd64 (20140417)
  PackageArchitecture: all
  SourcePackage: alsa-driver
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 04/28/2014
  dmi.bios.vendor: American Megatrends Inc.
  dmi.bios.version: P1.10
  dmi.board.name: H97 Performance
  dmi.board.vendor: ASRock
  dmi.chassis.asset.tag: To Be Filled By O.E.M.
  dmi.chassis.type: 3
  dmi.chassis.vendor: To Be Filled By O.E.M.
  dmi.chassis.version: To Be Filled By O.E.M.
  dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvrP1.10:bd04/28/2014:svnToBeFilledByO.E.M.:pnToBeFilledByO.E.M.:pvrToBeFilledByO.E.M.:rvnASRock:rnH97Performance:rvr:cvnToBeFilledByO.E.M.:ct3:cvrToBeFilledByO.E.M.:
  dmi.product.name: To Be Filled By O.E.M.
  dmi.product.version: To Be Filled By O.E.M.
  dmi.sys.vendor: To Be Filled By O.E.M.
  ---
  ApportVersion: 2.14.1-0ubuntu3.1
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC1:  ben1445 F pulseaudio
   /dev/snd/controlC0:  ben1445 F pulseaudio
  CurrentDesktop: Unity
  DistroRelease: Ubuntu 14.04
  HibernationDevice: RESUME=UUID=f35e4cc7-52c2-4fe7-9e4b-405280ed487f
  InstallationDate: Installed on 2014-05-20 (2 days ago)
  InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Release amd64 (20140417)
  MachineType: To Be Filled By O.E.M. To Be Filled By O.E.M.
  NonfreeKernelModules: nvidia
  Package: linux (not installed)
  ProcFB: 0 EFI VGA
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.13.0-24-generic.efi.signed 
root=/dev/mapper/ubuntu--vg-root ro
  ProcVersionSignature: Ubuntu 3.13.0-24.47-generic 3.13.9
  RelatedPackageVersions:
   linux-restricted-modules-3.13.0-24-generic N/A
   linux-backports-modules-3.13.0-24-generic  N/A
   linux-firmware 1.127.2
  Tags:  trusty
  Uname: Linux 3.13.0-24-generic x86_64
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo
  _MarkForUpload: True
  dmi.bios.date: 04/28/2014
  dmi.bios.vendor: American Megatrends Inc.
  dmi.bios.version: P1.10
  dmi.board.name: H97 Performance
  dmi.board.vendor: ASRock
  dmi.chassis.asset.tag: To Be Filled By O.E.M.
  dmi.chassis.type: 3
  dmi.chassis.vendor: To Be Filled By O.E.M.
  dmi.chassis.version: To Be Filled By O.E.M.
  dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvrP1.10:bd04/28/2014:svnToBeFilledByO.E.M.:pnToBeFilledByO.E.M.:pvrToBeFilledByO.E.M.:rvnASRock:rnH97Performance:rvr:cvnToBeFilledByO.E.M.:ct3:cvrToBeFilledByO.E.M.:
  dmi.product.name: To Be Filled By O.E.M.
  dmi.product.version: To Be Filled By O.E.M.
  dmi.sys.vendor: To Be Filled By O.E.M.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1321421/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1342570] Re: Bluetooth RFCOMM: Transport endpoint not connected (kernel regression)

2014-07-16 Thread Petr Stehlik
apport-collect failed when run over ssh on the server so I am changing
the bug status to confirmed.

** Changed in: linux (Ubuntu)
   Status: Incomplete = Confirmed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1342570

Title:
  Bluetooth RFCOMM: Transport endpoint not connected (kernel regression)

Status in “linux” package in Ubuntu:
  Confirmed

Bug description:
  Ubuntu 12.04's Hardware Enablement Stack (HWE) check forced me to upgrade 
to trusty's kernel:
  * Install a newer HWE version by running:
  sudo apt-get install linux-generic-lts-trusty linux-image-generic-lts-trusty

  Since then bluetooth communication fails with Transport endpoint not
  connected. It does work OK if I reboot back to soon-to-be unsupported
  kernel 3.5.0.x

  This is a known kernel 3.13 regression, please see
  https://bugzilla.redhat.com/show_bug.cgi?id=1060457

  If it is indeed fixed in kernel 3.14 please backport the fix to
  trusty's kernel, or perhaps get 3.14 kernel into trusty. The current
  3.13 is not a good upgrade.

  Thanks!

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1342570/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1336659] Re: Boot fails after installing updates, error: “cryptsetup: evms_activate is not available

2014-07-16 Thread DiagonalArg
Yes, moving the drive that was on the PCI-X controller to the main board
solved the problem.  Does this mean that a driver disappeared between
the -60 and -64 kernels?  Or is it that somehow the driver is just not
available on boot?

Any thoughts on how to correct this?

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1336659

Title:
  Boot fails after installing updates, error: “cryptsetup: evms_activate
  is not available

Status in “linux” package in Ubuntu:
  Confirmed

Bug description:
  I am having the same problem as bug #1003309, though in my case I am
  not running in a virtual machine.  Ubuntu 12.04 with lvm on top of an
  encrypted mirrored system.  After running an update, which updated the
  kernel from 3.2.0-60 to -64, on reboot I was met with: “cryptsetup:
  evms_activate is not available.  Booting with the previous kernel
  works fine.  I am including my apt logs, here.  Let me know if I
  should add anything else.

  Tyan-S3970:~$ lsb_release -a
  LSB Version:
core-2.0-amd64:core-2.0-noarch:core-3.0-amd64:core-3.0-noarch:core-3.1-amd64:core-3.1-noarch:core-3.2-amd64:core-3.2-noarch:core-4.0-amd64:core-4.0-noarch
  Distributor ID: Ubuntu
  Description:Ubuntu 12.04.4 LTS
  Release:12.04
  Codename:   precise

  Tyan-S3970:~$ uname -a
  Linux Tyan-S3970 3.2.0-60-generic #91-Ubuntu SMP Wed Feb 19 03:54:44 UTC 2014 
x86_64 x86_64 x86_64 GNU/Linux
  --- 
  AlsaVersion: Advanced Linux Sound Architecture Driver Version 1.0.24.
  ApportVersion: 2.0.1-0ubuntu17.6
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  dev2733 F pulseaudio
   /dev/snd/controlC1:  dev2733 F pulseaudio
  CRDA: Error: command ['iw', 'reg', 'get'] failed with exit code 1: nl80211 
not found.
  Card0.Amixer.info:
   Card hw:0 'NVidia'/'HDA NVidia at 0xfd77c000 irq 17'
 Mixer name : 'Nvidia GPU 0b HDMI/DP'
 Components : 'HDA:10de000b,10de0101,00100200'
 Controls  : 24
 Simple ctrls  : 4
  Card1.Amixer.info:
   Card hw:1 'Audigy'/'SB Audigy 1 [SB0092] (rev.3, serial:0x531102) at 0xd480, 
irq 30'
 Mixer name : 'TriTech TR28602'
 Components : 'AC97a:54524123'
 Controls  : 194
 Simple ctrls  : 30
  DistroRelease: Ubuntu 12.04
  HibernationDevice: RESUME=UUID=bdbecead-fce1-4f50-ba0e-e523c0762ed1
  InstallationMedia: Ubuntu 11.04 Natty Narwhal - Release amd64 (20110426)
  IwConfig:
   lono wireless extensions.
   
   eth1  no wireless extensions.
   
   eth0  no wireless extensions.
  MachineType: empty empty
  MarkForUpload: True
  NonfreeKernelModules: nvidia
  Package: linux (not installed)
  ProcEnviron:
   TERM=xterm
   PATH=(custom, no user)
   LANG=en_US.UTF-8
   SHELL=/bin/bash
  ProcFB:
   
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.2.0-60-generic 
root=/username/mapper/tyan--s3970-root ro quiet splash
  ProcVersionSignature: Ubuntu 3.2.0-60.91-generic 3.2.55
  RelatedPackageVersions:
   linux-restricted-modules-3.2.0-60-generic N/A
   linux-backports-modules-3.2.0-60-generic  N/A
   linux-firmware1.79.15
  RfKill:
   
  StagingDrivers: zram
  Tags:  precise running-unity staging
  Uname: Linux 3.2.0-60-generic x86_64
  UpgradeStatus: Upgraded to precise on 2012-06-17 (744 days ago)
  UserGroups: adm admin apt-mirror cdrom dialout kismet lpadmin plugdev 
sambashare src vboxusers
  WifiSyslog:
   
  dmi.bios.date: 10/25/2007
  dmi.bios.vendor: American Megatrends Inc.
  dmi.bios.version: 080011
  dmi.board.asset.tag: empty
  dmi.board.name: S3970
  dmi.board.vendor: TYAN Computer Corporation
  dmi.board.version: empty
  dmi.chassis.asset.tag: empty
  dmi.chassis.type: 3
  dmi.chassis.vendor: empty
  dmi.chassis.version: empty
  dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvr080011:bd10/25/2007:svnempty:pnempty:pvrempty:rvnTYANComputerCorporation:rnS3970:rvrempty:cvnempty:ct3:cvrempty:
  dmi.product.name: empty
  dmi.product.version: empty
  dmi.sys.vendor: empty

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1336659/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1342568] Re: bluetooth connect fails

2014-07-16 Thread JPTTEST
Enabled debugging by adding -d to /etc/init/bluetooth.conf
But I don't understand what exactly is going on and why it fails.

I stripped pid, date (except secs) and hostname from log.

** Attachment added: debug log
   
https://bugs.launchpad.net/ubuntu/+source/bluez/+bug/1342568/+attachment/4153829/+files/bluetooth.log

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to bluez in Ubuntu.
https://bugs.launchpad.net/bugs/1342568

Title:
  bluetooth connect fails

Status in “bluez” package in Ubuntu:
  New

Bug description:
  I want to connect to a BT-serial adapter. Always get the error
  Unknown command complete for opcode 37.

  If I supply the correct pin, connection is reported successful, but
  the device immediately disappears.

  I tried three different host BT hardware and two different PCs. always
  the same.

  Kubuntu 14.04
  Bluez-4.101-ubuntu13

  syslog: First with correct pin, second using wrong pin:

  bluetoothd[1107]: Discovery session 0x7f66d5221040 with :1.117 activated
  bluetoothd[1107]: Unknown command complete for opcode 37
  bluetoothd[1107]: Stopping discovery

  bluetoothd[1107]: Discovery session 0x7f66d52209a0 with :1.118 activated
  bluetoothd[1107]: Unknown command complete for opcode 37
  bluetoothd[1107]: Stopping discovery
  bluetoothd[1107]: hci0: Cancel Pair Device (0x001a) failed: Invalid 
Parameters (0x0d) 

  How do I enable more detailed logging?

  I am quite sure this is no duplicate of those BT-suspend bugs. Because
  it always fails and the rfkill workaround doesn't help.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/bluez/+bug/1342568/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1342568] Re: bluetooth connect fails

2014-07-16 Thread JPTTEST
Another log using different BT-dongle on host.

** Attachment added: bluetooth2.log
   
https://bugs.launchpad.net/ubuntu/+source/bluez/+bug/1342568/+attachment/4153834/+files/bluetooth2.log

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to bluez in Ubuntu.
https://bugs.launchpad.net/bugs/1342568

Title:
  bluetooth connect fails

Status in “bluez” package in Ubuntu:
  New

Bug description:
  I want to connect to a BT-serial adapter. Always get the error
  Unknown command complete for opcode 37.

  If I supply the correct pin, connection is reported successful, but
  the device immediately disappears.

  I tried three different host BT hardware and two different PCs. always
  the same.

  Kubuntu 14.04
  Bluez-4.101-ubuntu13

  syslog: First with correct pin, second using wrong pin:

  bluetoothd[1107]: Discovery session 0x7f66d5221040 with :1.117 activated
  bluetoothd[1107]: Unknown command complete for opcode 37
  bluetoothd[1107]: Stopping discovery

  bluetoothd[1107]: Discovery session 0x7f66d52209a0 with :1.118 activated
  bluetoothd[1107]: Unknown command complete for opcode 37
  bluetoothd[1107]: Stopping discovery
  bluetoothd[1107]: hci0: Cancel Pair Device (0x001a) failed: Invalid 
Parameters (0x0d) 

  How do I enable more detailed logging?

  I am quite sure this is no duplicate of those BT-suspend bugs. Because
  it always fails and the rfkill workaround doesn't help.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/bluez/+bug/1342568/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1256158] Re: BCM4360 High packet loss at 5GHz

2014-07-16 Thread James Broadhead
I am experiencing this as well; same macbook pro (11,1) as Julien.

I experience many occurrences of this in /var/log/syslog: 
 ERROR @wl_cfg80211_get_station : Wrong Mac address

Eventually, the card disassociates, and fails repeatedly to reconnect to
the AP. Sometimes it succeeds, but will fail again soon after (the
driver remains in a bad state).

I have a very rough workaround, reloading the wl module, but it's 
time-consuming and is no real fix. 
After running this, the card reassociates on its first try, then works well 
until the problem re-occurs. 
This indicates to me that it's a problem in the driver, not something to do 
with any state on the card. 

sudo service network-manager stop
sudo pkill wpa_supplicant
sudo rmmod wl

sudo modprobe wl
sudo service network-manager restart

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to bcmwl in Ubuntu.
https://bugs.launchpad.net/bugs/1256158

Title:
  BCM4360 High packet loss at 5GHz

Status in “bcmwl” package in Ubuntu:
  Confirmed

Bug description:
  I have an ASUS PCE-AC68 adapter (BCM4360 chipset), running under
  13.10, kernel 3.11.0-13-generic x86_64, bcmwl-kernel-source
  6.30.223.141+bdcom-0ubuntu1. The AP supports 802.11a/b/g/n/ac.

  The card and adapter work perfectly when connected in the 2.4GHz band
  and 5GHz low channels (36-48). When connecting at 5GHz high channels
  (149-161), there are no obvious errors, but packet loss to the gateway
  is extremely high (50-80%). This behavior is very bursty, alternating
  between no, and total packet loss on a timescale ranging from a few
  seconds to a few minutes.

  Power management is off, and syslog/kern.log don't provide any useful
  clues. Based on the observed pattern of the packet loss, and the
  performance of other 5GHz devices connected to the same AP, I don't
  think it is an interference issue.

  I'm unsure as to how to proceed with generating some more useful
  logging, so any suggestions would be appreciated.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/bcmwl/+bug/1256158/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1342645] [NEW] upgrade bcmwl-kernel-source to 6.30.223.248

2014-07-16 Thread James Broadhead
Public bug reported:

The latest version from broadcom is 6.30.223.248
http://www.broadcom.com/support/802.11/linux_sta.php

Release notes:
WHAT'S NEW IN RELEASE 6.30.223.23X
-
+ Upgraded to Support 3.11 kernels
+ Added cfg80211 wowlan support for Magic Packets and Disconnect

WHAT'S NEW IN RELEASE 6.30.223.126
--
+ Upgraded to Support 3.8.x
+ Added 43142 support
+ Added 4352 support
+ Dropped WEXT support

** Affects: bcmwl (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to bcmwl in Ubuntu.
https://bugs.launchpad.net/bugs/1342645

Title:
  upgrade bcmwl-kernel-source to 6.30.223.248

Status in “bcmwl” package in Ubuntu:
  New

Bug description:
  The latest version from broadcom is 6.30.223.248
  http://www.broadcom.com/support/802.11/linux_sta.php

  Release notes:
  WHAT'S NEW IN RELEASE 6.30.223.23X
  -
  + Upgraded to Support 3.11 kernels
  + Added cfg80211 wowlan support for Magic Packets and Disconnect

  WHAT'S NEW IN RELEASE 6.30.223.126
  --
  + Upgraded to Support 3.8.x
  + Added 43142 support
  + Added 4352 support
  + Dropped WEXT support

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/bcmwl/+bug/1342645/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1338666] Re: ppc64le kernel module nx_crypto blocks loading other kernel modules

2014-07-16 Thread bugproxy
** Tags added: targetmilestone-inin1410

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1338666

Title:
  ppc64le kernel module nx_crypto blocks loading other kernel modules

Status in “linux” package in Ubuntu:
  Fix Released
Status in “linux” source package in Trusty:
  Fix Committed
Status in “linux” source package in Utopic:
  Fix Released

Bug description:
  == Comment: #0 - David A. Harnett dober...@us.ibm.com - 2014-03-12 20:43:09 
==
  ---Problem Description---
  On Ubuntu 14.04 ppc64le in a Power7 LPAR , if kernel module nx_crypto is 
already loaded ,
  attempts to load additional kernel modules fail with this message :

  modprobe: ERROR: could not insert 'xxx': Invalid argument

  where xxx is the name of module we tried to load .
  dmesg shows:
  [   33.012917] nx: scatter/gather list overflow, pid: 806

  ---uname output---
  Linux c277f3u1crash2 3.13.0-17-generic #37-Ubuntu SMP Mon Mar 10 21:47:19 UTC 
2014 ppc64le ppc64le ppc64le GNU/Linux
   
  ---Additional Hardware Info---
  special PowerVM Little Endian firmware level b0108l_1446.780 
   
  Machine Type = Power 780+ 9179-MHD LPAR 
   
  ---Debugger---
  A debugger is not configured
   
  ---Steps to Reproduce---
   lsmod , if nx_crypto module not loaded , then modprobe nx_crypto ;
  try to load any kernel module , modprobe nfs

   
  Stack trace output:
   no
   
  Oops output:
   no
   
  System Dump Info:
The system is not configured to capture a system dump.
   
  *Additional Instructions for Dave Harnett/dober...@us.ibm.com , no backup: 
  -Post a private note with access information to the machine that the bug is 
occuring on. 
  -Attach sysctl -a output output to the bug.

  == Comment: #3 - David A. Harnett dober...@us.ibm.com - 2014-03-12 21:19:42 
==
  Circumvention : add directive blacklist nx_crypto to a file in directory 
/etc/modprobe.d

  Problem does not occur on Ubuntu 14.04 powerpc64 Big Endian image
  running in LPAR on same hardware .

  == Comment: #5 - Leonidas Da Silva Barbosa leosi...@br.ibm.com - 2014-03-13 
14:48:17 ==
  David, 

  can you provide us with a

  cat /etc/issue 
  cat /proc/cpuinfo
  uname -a 

  from the system where the problem does not happen?

  == Comment: #6 - David A. Harnett dober...@us.ibm.com - 2014-03-13 15:24:55 
==
  This is the requested output from the BE image in another LPAR on the same 
physical machine .

  $ cat /etc/issue
  Ubuntu Trusty Tahr (development branch) \n \l

  $ cat /proc/cpuinfo
  processor   : 0
  cpu : POWER7 (architected), altivec supported
  clock   : 3724.00MHz
  revision: 2.0 (pvr 004a 0200)

  processor   : 1
  cpu : POWER7 (architected), altivec supported
  clock   : 3724.00MHz
  revision: 2.0 (pvr 004a 0200)

  processor   : 2
  cpu : POWER7 (architected), altivec supported
  clock   : 3724.00MHz
  revision: 2.0 (pvr 004a 0200)

  processor   : 3
  cpu : POWER7 (architected), altivec supported
  clock   : 3724.00MHz
  revision: 2.0 (pvr 004a 0200)

  timebase: 51200
  platform: pSeries
  model   : IBM,9179-MHD
  machine : CHRP IBM,9179-MHD

  $ uname -a
  Linux c277f3u1admin2 3.13.0-17-powerpc64-smp #37-Ubuntu SMP Mon Mar 10 
21:58:15 UTC 2014 ppc64 ppc64 ppc64 GNU/Linux

  == Comment: #10 - Leonidas Da Silva Barbosa leosi...@br.ibm.com - 
2014-03-14 13:19:42 ==
  David,

  The hardware that are you running both image is over a PowerVM LE ?

  == Comment: #11 - David A. Harnett dober...@us.ibm.com - 2014-03-14 
13:32:42 ==
  This model Power 780 (Saturn MR class) Power7 machine has special IBM 
internal use only firmware  that permits both LE and BE OS images to run in 
separate PowerVM LPARs simultaneously .  Our contact for the firmware is David 
Larson , lars...@us.ibm.com

  This is the third problem I observed on this machine where LE OS has
  problems but the same function works correctly on a nearly equivalent
  level of BE OS on the same physical machine .

  1) nvram command fails with segfault - to be fixed in powerpc-utils package
  2) ibmveth kernel driver for PowerVM virtual ethernet device - fixed in an 
Ubuntu 14.04 kernel
  3) this problem
  Common thread seems to be drivers that interface with firmware/hardware 
platform features .

  == Comment: #17 - Cody P. Schafer cpsch...@us.ibm.com - 2014-05-14 14:02:52 
==
  I've seen issues on POWER8-PowerVM-ppc64le with nx-crypto, dmesg attached.

  note: this is still LE, but is also on P8 (not P7 as this bug was
  originally reported).

  == Comment: #18 - Cody P. Schafer cpsch...@us.ibm.com - 2014-05-14 14:04:55 
==
  Also, in my case further modules load without issue. The only problem is the 
log spam.

  == Comment: #19 - Cody P. Schafer cpsch...@us.ibm.com - 2014-05-14 14:05:17 
==
  kernel is 

[Kernel-packages] [Bug 1317979] Re: 8086:0162 [System76 Sable Complete] backlight stops working after suspend

2014-07-16 Thread Christopher M. Penalver
Traxtopel, could you please provide the information with the latest
mainline kernel via http://kernel.ubuntu.com/~kernel-
ppa/mainline/v3.16-rc5-utopic/ ?

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1317979

Title:
  8086:0162 [System76 Sable Complete] backlight stops working after
  suspend

Status in “linux” package in Ubuntu:
  Incomplete

Bug description:
  Add debug information from kernel debug inform from
  https://wiki.ubuntu.com/Kernel/Debugging/Backlight

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.13.0-24-generic 3.13.0-24.47
  ProcVersionSignature: Ubuntu 3.13.0-24.47-generic 3.13.9
  Uname: Linux 3.13.0-24-generic x86_64
  ApportVersion: 2.14.1-0ubuntu3
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  traxtopel   3077 F pulseaudio
   /dev/snd/controlC1:  traxtopel   3077 F pulseaudio
  CurrentDesktop: Unity
  Date: Fri May  9 18:29:41 2014
  HibernationDevice: RESUME=UUID=de5a6c32-5d89-4cb3-aee1-a8b32c416a1d
  InstallationDate: Installed on 2014-04-04 (35 days ago)
  InstallationMedia: Ubuntu 13.10 Saucy Salamander - Release amd64 
(20131016.1)
  MachineType: System76, Inc. Sable Complete
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-24-generic 
root=UUID=27287be2-654a-4c7a-9c5b-cc37df0adc0a ro quiet splash 
acpi_backlight=vendor vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-3.13.0-24-generic N/A
   linux-backports-modules-3.13.0-24-generic  N/A
   linux-firmware 1.127
  SourcePackage: linux
  StagingDrivers: keucr
  UpgradeStatus: Upgraded to trusty on 2014-04-18 (21 days ago)
  dmi.bios.date: 10/09/2013
  dmi.bios.vendor: Intel Corp.
  dmi.bios.version: AGH6120H.86A.0023.2013.1009.1142
  dmi.board.asset.tag: To be filled by O.E.M.
  dmi.board.name: DH61AGL
  dmi.board.vendor: Intel Corporation
  dmi.board.version: G71256-202
  dmi.chassis.type: 3
  dmi.chassis.vendor: System76, Inc.
  dmi.chassis.version: sabc1
  dmi.modalias: 
dmi:bvnIntelCorp.:bvrAGH6120H.86A.0023.2013.1009.1142:bd10/09/2013:svnSystem76,Inc.:pnSableComplete:pvrsabc1:rvnIntelCorporation:rnDH61AGL:rvrG71256-202:cvnSystem76,Inc.:ct3:cvrsabc1:
  dmi.product.name: Sable Complete
  dmi.product.version: sabc1
  dmi.sys.vendor: System76, Inc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1317979/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1327741] Re: Kernel panic on driver rtl8821ae

2014-07-16 Thread Christopher M. Penalver
** This bug is no longer a duplicate of bug 1341275
   [Gigabyte GB-BXi7-4470R] Kernel panic in rtl8821ae

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1327741

Title:
  Kernel panic on driver rtl8821ae

Status in “linux” package in Ubuntu:
  Incomplete

Bug description:
  Since kernel version 3.13.0-27, my Asus VM40B goes into kernel panic
  during boot, seemingly due to an error with the WiFi driver,
  rtl8821ae. The attached screenshot of the screen (I have no idea how
  to otherwise capture the output of a kernel panic) shows the error
  with kernel version 3.13.0-29, but it happens exactly the same with
  -27.

  WORKAROUND: Disabling the WiFi card or using version 3.13.0-24 does
  not cause any problem.

  Please bear in mind, while reading the generated report, that I have
  disabled the WiFi card to be able to boot with kernel -29.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1327741/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1341270] Re: Ubuntu 14.04 freezes on resume from suspend: GeForce GT 520 GPU with nouveau or proprietary nvidia-331 drivers, even when booted nosplash noquiet

2014-07-16 Thread Christopher M. Penalver
TEN, using the nvidia drivers narrows the scope of people who may help
you on graphics driver issues to nvidia only.

As well, please do not mix two different drivers (nvidia and nouveau)
into one report. Instead, please create one per driver, not per symptom.

** Description changed:

- Generating individual reports as requested by Christopher M. Penalver
- and Chris Bainbridge in
- https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1283938 via
- ubuntu-bug linux.
- 
- After forcing switch from nouveau to nvidia-331 (a sad story in itself
- as the System Settings pretend to handle that:
- https://bugs.launchpad.net/ubuntu/+source/nvidia-graphics-
- drivers-331/+bug/1315156) at least apportcheckresume does catch the
- issue as attached, but after Continue gives no further indication what
- data has been sent where (if at all) and how it may be commented or
- complemented, i.e. nothing opens in the browser, only local password
- prompt(s).
- 
  Sometimes the screen shows a blinking text console mode prompt and the
  NumLock key can still turn its LED on and off for a few seconds under
  nivida-331 before the machine freezes with fans running after resume,
  while nouveau would even permit Ctrl-Alt-F1 occasionally (but then has
- other log-flooding issues as indicated at the prior link).
- 
- Not being able to resume after suspend has kept my Ubuntu 14.04 LTS 
installation unusable for 3 months already.
- This is a recurring issue already exhibited by 12.04 LTS, affecting numerous 
systems even back then (cf. references from 
https://bugs.launchpad.net/ubuntu/+source/pm-utils/+bug/999638) on kernels 
before 3.2.0-25-generic-pae, as well as with Intel graphics - but in spite of 
the regression users continue to be isolated into individual bugs (hardly 
cross-linked with the major ones) and sent through BIOS upgrades and mainline 
kernel testing while the bugs in spite of their Heat continue to lack the 
requisite Importance and Assignment (or orchestrated testing for potential Mode 
Setting implications).
+ other log-flooding issues as indicated at the prior link). This is a
+ recurring issue already exhibited by 12.04.? LTS.
  
  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.13.0-30-generic 3.13.0-30.55
  ProcVersionSignature: Ubuntu 3.13.0-30.55-generic 3.13.11.2
  Uname: Linux 3.13.0-30-generic x86_64
  NonfreeKernelModules: nvidia
  ApportVersion: 2.14.1-0ubuntu3.2
  Architecture: amd64
  AudioDevicesInUse:
-  USERPID ACCESS COMMAND
-  /dev/snd/controlC1:  user   2417 F pulseaudio
-  /dev/snd/controlC2:  user   2417 F pulseaudio
-  /dev/snd/controlC3:  user   2417 F pulseaudio
-  /dev/snd/controlC0:  user   2417 F pulseaudio
+  USERPID ACCESS COMMAND
+  /dev/snd/controlC1:  user   2417 F pulseaudio
+  /dev/snd/controlC2:  user   2417 F pulseaudio
+  /dev/snd/controlC3:  user   2417 F pulseaudio
+  /dev/snd/controlC0:  user   2417 F pulseaudio
  CurrentDesktop: Unity
  Date: Sun Jul 13 12:20:23 2014
  HibernationDevice: RESUME=UUID=268e28b5-d1d2-41ba-96cd-dbc77d8ec2ad
  InstallationDate: Installed on 2014-04-22 (81 days ago)
  InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Release amd64 (20140417)
  IwConfig:
-  eth0  no wireless extensions.
-  
-  lono wireless extensions.
+  eth0  no wireless extensions.
+ 
+  lono wireless extensions.
  MachineType: Hewlett-Packard HP Compaq dc7800p Convertible Minitower
  ProcFB:
-  
+ 
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.13.0-30-generic 
root=UUID=dbc867b7-24fc-40ab-93bd-b34f10eb7044 ro
  RelatedPackageVersions:
-  linux-restricted-modules-3.13.0-30-generic N/A
-  linux-backports-modules-3.13.0-30-generic  N/A
-  linux-firmware 1.127.4
+  linux-restricted-modules-3.13.0-30-generic N/A
+  linux-backports-modules-3.13.0-30-generic  N/A
+  linux-firmware 1.127.4
  RfKill:
-  1: hci0: Bluetooth
-   Soft blocked: no
-   Hard blocked: no
+  1: hci0: Bluetooth
+   Soft blocked: no
+   Hard blocked: no
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 07/21/2011
  dmi.bios.vendor: Hewlett-Packard
  dmi.bios.version: 786F1 v01.32
  dmi.board.asset.tag: CZC8277VRK
  dmi.board.name: 0AACh
  dmi.board.vendor: Hewlett-Packard
  dmi.chassis.asset.tag: CZC8277VRK
  dmi.chassis.type: 6
  dmi.chassis.vendor: Hewlett-Packard
  dmi.modalias: 
dmi:bvnHewlett-Packard:bvr786F1v01.32:bd07/21/2011:svnHewlett-Packard:pnHPCompaqdc7800pConvertibleMinitower:pvr:rvnHewlett-Packard:rn0AACh:rvr:cvnHewlett-Packard:ct6:cvr:
  dmi.product.name: HP Compaq dc7800p Convertible Minitower
  dmi.sys.vendor: Hewlett-Packard

** Tags removed: precise
** Tags added: latest-bios-1.32

** Summary changed:

- Ubuntu 14.04 freezes on resume from suspend: GeForce GT 520 GPU with nouveau 
or proprietary nvidia-331 drivers, even when booted nosplash noquiet
+ 

[Kernel-packages] [Bug 1340110] Re: [Dell Latitude 12 Rugged Extreme 7204] Touchscreen 3-finger / 4-finger gestures does not work

2014-07-16 Thread Christopher M. Penalver
Po-Hsu Lin, the issue you are reporting is an upstream one. Could you
please report this problem through the appropriate channel by following
the instructions _verbatim_ at
https://wiki.ubuntu.com/Bugs/Upstream/kernel ?

Please provide a direct URL to your e-mail to the mailing list once you
have made it so that it may be tracked.

Thank you for your understanding.

** Changed in: linux (Ubuntu)
   Status: Confirmed = Triaged

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1340110

Title:
  [Dell Latitude 12 Rugged Extreme 7204] Touchscreen 3-finger / 4-finger
  gestures does not work

Status in HWE Next Project:
  New
Status in “linux” package in Ubuntu:
  Triaged

Bug description:
  CID: 201402-14663 Dell Latitude 12 Rugged Extreme

  According to Dell's website[1], this system comes with a multi-touch screen
  But only two-finger pinch / expand zoom is supported on this system

  Steps:
  1. Install 14.04 + update (3.13.0-30), boot to desktop
  2. Try to open Dash with 4 fingers tap
  3. Try to move a window with 3 fingers tap

  Expected results:
  * 3 / 4-finger gesture should work

  Actual result:
  * Nothing happened

  [1] 11.6” HD (1366 x 768) 16:9 Direct-View outdoor-readable display with 
resistive multi-touch
  http://www.dell.com/us/business/p/latitude-7204-laptop/pd

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.13.0-30-generic 3.13.0-30.55
  ProcVersionSignature: Ubuntu 3.13.0-30.55-generic 3.13.11.2
  Uname: Linux 3.13.0-30-generic x86_64
  ApportVersion: 2.14.1-0ubuntu3.2
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC1:  ubuntu 1501 F pulseaudio
   /dev/snd/controlC0:  ubuntu 1501 F pulseaudio
  CRDA:
   country TW:
    (2402 - 2472 @ 40), (3, 27)
    (5270 - 5330 @ 40), (3, 17), DFS
    (5735 - 5815 @ 40), (3, 30)
  CurrentDesktop: Unity
  Date: Thu Jul 10 05:36:18 2014
  HibernationDevice: RESUME=UUID=b68f02ad-f5e4-4eb9-b88d-e85f60666734
  InstallationDate: Installed on 2014-07-10 (0 days ago)
  InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Release amd64 (20140417)
  MachineType: Dell Inc. Latitude 12 Rugged Extreme (7204)
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-30-generic.efi.signed 
root=UUID=bdd00fe9-0df9-4b71-92c5-5f94c533f725 ro quiet splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-3.13.0-30-generic N/A
   linux-backports-modules-3.13.0-30-generic  N/A
   linux-firmware 1.127.4
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 05/12/2014
  dmi.bios.vendor: Dell Inc.
  dmi.bios.version: A00
  dmi.board.name: 0TH1GJ
  dmi.board.vendor: Dell Inc.
  dmi.board.version: X02
  dmi.chassis.type: 9
  dmi.chassis.vendor: Dell Inc.
  dmi.modalias: 
dmi:bvnDellInc.:bvrA00:bd05/12/2014:svnDellInc.:pnLatitude12RuggedExtreme(7204):pvr01:rvnDellInc.:rn0TH1GJ:rvrX02:cvnDellInc.:ct9:cvr:
  dmi.product.name: Latitude 12 Rugged Extreme (7204)
  dmi.product.version: 01
  dmi.sys.vendor: Dell Inc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1340110/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1339998] Re: [Dell Latitude 12 Rugged Extreme 7204] Microphone mute key does not work

2014-07-16 Thread Christopher M. Penalver
Po-Hsu Lin, the issue you are reporting is an upstream one. Could you
please report this problem through the appropriate channel by following
the instructions _verbatim_ at
https://wiki.ubuntu.com/Bugs/Upstream/kernel ?

Please provide a direct URL to your e-mail to the mailing list once you
have made it so that it may be tracked.

Thank you for your understanding.

** Changed in: linux (Ubuntu)
   Status: Confirmed = Triaged

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1339998

Title:
  [Dell Latitude 12 Rugged Extreme 7204] Microphone mute key does not
  work

Status in HWE Next Project:
  New
Status in “linux” package in Ubuntu:
  Triaged

Bug description:
  CID: 201402-14663 Dell Latitude 12 Rugged Extreme

  The microphone mute key does not work on this system, so as its LED

  Steps:
  1. Install 14.04 + update (3.13.0-30), boot to desktop
  2. Try to mute the microphone with the hotkey (fn+F4)

  Expected results:
  * Mic mute key should work, its LED should be lit and the Mute option for 
input device should be ticked after you press the mic mute key.

  Actual result:
  * Nothing happened.

  Debugging information:
  ubuntu@201402-14663:~$ sudo showkey -k
  kb mode was ?UNKNOWN?
  [ if you are trying this under X, it might not work
  since the X server is also reading /dev/console ]

  press any key (program terminates 10s after last keypress)...
  keycode  28 release
  keycode 248 press
  keycode 248 release
  keycode 248 press
  keycode 248 release
  keycode 248 press
  keycode 248 release
  keycode  29 press
  ^Ccaught signal 2, cleaning up...

  xev cannot detect any microphone mute key event

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.13.0-30-generic 3.13.0-30.55
  ProcVersionSignature: Ubuntu 3.13.0-30.55-generic 3.13.11.2
  Uname: Linux 3.13.0-30-generic x86_64
  ApportVersion: 2.14.1-0ubuntu3.2
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC1:  ubuntu 1501 F pulseaudio
   /dev/snd/controlC0:  ubuntu 1501 F pulseaudio
  CRDA:
   country TW:
    (2402 - 2472 @ 40), (3, 27)
    (5270 - 5330 @ 40), (3, 17), DFS
    (5735 - 5815 @ 40), (3, 30)
  CurrentDesktop: Unity
  Date: Wed Jul  9 23:57:11 2014
  HibernationDevice: RESUME=UUID=b68f02ad-f5e4-4eb9-b88d-e85f60666734
  InstallationDate: Installed on 2014-07-10 (0 days ago)
  InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Release amd64 (20140417)
  MachineType: Dell Inc. Latitude 12 Rugged Extreme (7204)
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-30-generic.efi.signed 
root=UUID=bdd00fe9-0df9-4b71-92c5-5f94c533f725 ro quiet splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-3.13.0-30-generic N/A
   linux-backports-modules-3.13.0-30-generic  N/A
   linux-firmware 1.127.4
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 05/12/2014
  dmi.bios.vendor: Dell Inc.
  dmi.bios.version: A00
  dmi.board.name: 0TH1GJ
  dmi.board.vendor: Dell Inc.
  dmi.board.version: X02
  dmi.chassis.type: 9
  dmi.chassis.vendor: Dell Inc.
  dmi.modalias: 
dmi:bvnDellInc.:bvrA00:bd05/12/2014:svnDellInc.:pnLatitude12RuggedExtreme(7204):pvr01:rvnDellInc.:rn0TH1GJ:rvrX02:cvnDellInc.:ct9:cvr:
  dmi.product.name: Latitude 12 Rugged Extreme (7204)
  dmi.product.version: 01
  dmi.sys.vendor: Dell Inc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1339998/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1328973] Re: GSO segmentation in zero-copy mode is broken

2014-07-16 Thread Anton Nayshtut
Verified by both me and Victor Tapia (vtapia) - with
3.11.0-26.44~precise1 kernel the MS HCK Offload LSO test passes.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1328973

Title:
  GSO segmentation in zero-copy mode is broken

Status in “linux” package in Ubuntu:
  Fix Released

Bug description:
  [SRU Justification]

  [Setup]
   - 2 or more QEMU Guest VMs sharing the the same host
   - the Guests are communicating using virtio-net-pci devices
   - vhost-net is enabled

  [Explanation]
  If one Guest VM sends GSO packets to another while GRO is disabled for 
receiver, so these packets are segmented by net/core.
  In this case, if zero-copy is enabled in vhost-net, the GSO packets TX 
completion is reported to userspace as before the TX is actually done.
  The vhost-net's zero-copy mechanism is enabled by default since v3.8-rc1 
(f9611c43).

  [Impact]
  Incorrect/junk data sent in case the transmitting Guest OS re-uses/frees the 
TX buffer immediately upon TX completion.

  [Test Case]
  Windows 2008R2 Guest VMs running MS HCK Offload LSO test.
  NOTE1: GRO is always disabled in this case because it's not supported by 
Windows Guest virtio-net-pci drivers.
  NOTE2: MS HCK re-uses the GSO (LSO) buffers, so it reproduces the issue every 
time.

  [Note]
  This bug has been fixed in v3.14-rc7 by 1fd819ec 
(https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/commit/?id=1fd819ecb90cc9b822cd84d3056ddba315d3340f).
  The fix actually disables zero copy for this case since it forces 
unconditional fragments copying, but it resolves the issue mentioned.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1328973/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1331251] Re: [Dell Studio 1558] kernel is missing support for i8k module

2014-07-16 Thread Liam P. White
@jesus

Do
# sudo service i8kmon stop

That will allow you to regain control of the fans with i8kfan.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1331251

Title:
  [Dell Studio 1558] kernel is missing support for i8k module

Status in “linux” package in Ubuntu:
  In Progress

Bug description:
  On previous versions of Ubuntu, I could use i8kfan to control the fans
  on my laptop. I am usually up to compiling lp:inkscape , and when my
  fan speed decreases while compiling, that is a problem. A big problem,
  in fact.

  Now, on 14.04 with kernel 3.13.0-29-generic, I can no longer use
  anything from the package belonging to the branch lp:i8kutils, instead
  receiving this error message:

  ~# i8kfan 2 2
  can't open /proc/i8k: No such file or directory

  Manually inserting the module also returns an error, to make it seem such as 
that the kernel was not compiled with i8k support.
  ~# modprobe i8k
  modprobe: ERROR: could not insert 'i8k': No such device

  ~# insmod /lib/modules/3.13.0-29-generic/kernel/drivers/char/i8k.ko
  insmod: ERROR: could not insert module 
/lib/modules/3.13.0-29-generic/kernel/drivers/char/i8k.ko: No such device

  I also tested this with archived kernel versions on the same device:
  - 3.0.0-12-generic
  - 3.2.0-60-generic
  - 3.13.0-24-generic
  - 3.13.0-27-generic
  - 3.13.0-29-generic (default)
  I could not regain control of i8k on any of these kernels running Ubuntu 
14.04. 

  Related bug #1324372 [Dell XPS 15 (L502X)] i8k kernel module crashes
  system

  Upstream kernel (3.15.0-031500rc7-generic) does not truly fix the
  issue either: while I can control the fan, it appears as though the
  kernel is not effectively blocking the SMM BIOS control mechanisms
  from regaining control in about 5 seconds.

  To put it more simply: running i8kfan to control the fans works — for
  5 seconds. Then the fans turn off completely again. Not good for a
  machine that is at a severe overheating risk. There is no way to keep
  the fans on, even during intensive CPU usage. Reaching its maximum
  operating temperature, the machine shuts down to avoid serious damage
  to the processor.

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.13.0-29-generic 3.13.0-29.53
  ProcVersionSignature: Ubuntu 3.13.0-29.53-generic 3.13.11.2
  Uname: Linux 3.13.0-29-generic x86_64
  ApportVersion: 2.14.1-0ubuntu3.2
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  liam   1661 F pulseaudio
  CurrentDesktop: GNOME
  Date: Tue Jun 17 20:07:39 2014
  HibernationDevice: RESUME=UUID=c869f245-8053-4b24-ac59-317cdddc1f67
  InstallationDate: Installed on 2014-04-21 (57 days ago)
  InstallationMedia: Ubuntu-GNOME 14.04 LTS Trusty Tahr - Release amd64 
(20140416.2)
  Lsusb:
   Bus 002 Device 002: ID 8087:0020 Intel Corp. Integrated Rate Matching Hub
   Bus 002 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
   Bus 001 Device 003: ID 0c45:6416 Microdia 
   Bus 001 Device 002: ID 8087:0020 Intel Corp. Integrated Rate Matching Hub
   Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
  MachineType: Dell Inc. Studio 1558
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-29-generic 
root=UUID=61428a05-4276-43bc-acc1-88079fc166b3 ro quiet splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-3.13.0-29-generic N/A
   linux-backports-modules-3.13.0-29-generic  N/A
   linux-firmware 1.127.2
  RfKill:
   0: phy0: Wireless LAN
Soft blocked: no
Hard blocked: no
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 03/30/2011
  dmi.bios.vendor: Dell Inc.
  dmi.bios.version: A12
  dmi.board.name: 0G939P
  dmi.board.vendor: Dell Inc.
  dmi.board.version: A12
  dmi.chassis.type: 8
  dmi.chassis.vendor: Dell Inc.
  dmi.chassis.version: A12
  dmi.modalias: 
dmi:bvnDellInc.:bvrA12:bd03/30/2011:svnDellInc.:pnStudio1558:pvrA12:rvnDellInc.:rn0G939P:rvrA12:cvnDellInc.:ct8:cvrA12:
  dmi.product.name: Studio 1558
  dmi.product.version: A12
  dmi.sys.vendor: Dell Inc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1331251/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1317979] Re: 8086:0162 [System76 Sable Complete] backlight stops working after suspend

2014-07-16 Thread Traxtopel
Same results.

** Attachment added: cat /proc/acpi/wakeup  wakeup
   
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1317979/+attachment/4153949/+files/wakeup-3.16.0-031600rc5-generic

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1317979

Title:
  8086:0162 [System76 Sable Complete] backlight stops working after
  suspend

Status in “linux” package in Ubuntu:
  Incomplete

Bug description:
  Add debug information from kernel debug inform from
  https://wiki.ubuntu.com/Kernel/Debugging/Backlight

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.13.0-24-generic 3.13.0-24.47
  ProcVersionSignature: Ubuntu 3.13.0-24.47-generic 3.13.9
  Uname: Linux 3.13.0-24-generic x86_64
  ApportVersion: 2.14.1-0ubuntu3
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  traxtopel   3077 F pulseaudio
   /dev/snd/controlC1:  traxtopel   3077 F pulseaudio
  CurrentDesktop: Unity
  Date: Fri May  9 18:29:41 2014
  HibernationDevice: RESUME=UUID=de5a6c32-5d89-4cb3-aee1-a8b32c416a1d
  InstallationDate: Installed on 2014-04-04 (35 days ago)
  InstallationMedia: Ubuntu 13.10 Saucy Salamander - Release amd64 
(20131016.1)
  MachineType: System76, Inc. Sable Complete
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-24-generic 
root=UUID=27287be2-654a-4c7a-9c5b-cc37df0adc0a ro quiet splash 
acpi_backlight=vendor vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-3.13.0-24-generic N/A
   linux-backports-modules-3.13.0-24-generic  N/A
   linux-firmware 1.127
  SourcePackage: linux
  StagingDrivers: keucr
  UpgradeStatus: Upgraded to trusty on 2014-04-18 (21 days ago)
  dmi.bios.date: 10/09/2013
  dmi.bios.vendor: Intel Corp.
  dmi.bios.version: AGH6120H.86A.0023.2013.1009.1142
  dmi.board.asset.tag: To be filled by O.E.M.
  dmi.board.name: DH61AGL
  dmi.board.vendor: Intel Corporation
  dmi.board.version: G71256-202
  dmi.chassis.type: 3
  dmi.chassis.vendor: System76, Inc.
  dmi.chassis.version: sabc1
  dmi.modalias: 
dmi:bvnIntelCorp.:bvrAGH6120H.86A.0023.2013.1009.1142:bd10/09/2013:svnSystem76,Inc.:pnSableComplete:pvrsabc1:rvnIntelCorporation:rnDH61AGL:rvrG71256-202:cvnSystem76,Inc.:ct3:cvrsabc1:
  dmi.product.name: Sable Complete
  dmi.product.version: sabc1
  dmi.sys.vendor: System76, Inc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1317979/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1317979] Re: 8086:0162 [System76 Sable Complete] backlight stops working after suspend

2014-07-16 Thread Traxtopel
** Attachment added: dmesg-3.16.0-031600rc5-generic.txt
   
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1317979/+attachment/4153950/+files/dmesg-3.16.0-031600rc5-generic.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1317979

Title:
  8086:0162 [System76 Sable Complete] backlight stops working after
  suspend

Status in “linux” package in Ubuntu:
  Incomplete

Bug description:
  Add debug information from kernel debug inform from
  https://wiki.ubuntu.com/Kernel/Debugging/Backlight

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.13.0-24-generic 3.13.0-24.47
  ProcVersionSignature: Ubuntu 3.13.0-24.47-generic 3.13.9
  Uname: Linux 3.13.0-24-generic x86_64
  ApportVersion: 2.14.1-0ubuntu3
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  traxtopel   3077 F pulseaudio
   /dev/snd/controlC1:  traxtopel   3077 F pulseaudio
  CurrentDesktop: Unity
  Date: Fri May  9 18:29:41 2014
  HibernationDevice: RESUME=UUID=de5a6c32-5d89-4cb3-aee1-a8b32c416a1d
  InstallationDate: Installed on 2014-04-04 (35 days ago)
  InstallationMedia: Ubuntu 13.10 Saucy Salamander - Release amd64 
(20131016.1)
  MachineType: System76, Inc. Sable Complete
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-24-generic 
root=UUID=27287be2-654a-4c7a-9c5b-cc37df0adc0a ro quiet splash 
acpi_backlight=vendor vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-3.13.0-24-generic N/A
   linux-backports-modules-3.13.0-24-generic  N/A
   linux-firmware 1.127
  SourcePackage: linux
  StagingDrivers: keucr
  UpgradeStatus: Upgraded to trusty on 2014-04-18 (21 days ago)
  dmi.bios.date: 10/09/2013
  dmi.bios.vendor: Intel Corp.
  dmi.bios.version: AGH6120H.86A.0023.2013.1009.1142
  dmi.board.asset.tag: To be filled by O.E.M.
  dmi.board.name: DH61AGL
  dmi.board.vendor: Intel Corporation
  dmi.board.version: G71256-202
  dmi.chassis.type: 3
  dmi.chassis.vendor: System76, Inc.
  dmi.chassis.version: sabc1
  dmi.modalias: 
dmi:bvnIntelCorp.:bvrAGH6120H.86A.0023.2013.1009.1142:bd10/09/2013:svnSystem76,Inc.:pnSableComplete:pvrsabc1:rvnIntelCorporation:rnDH61AGL:rvrG71256-202:cvnSystem76,Inc.:ct3:cvrsabc1:
  dmi.product.name: Sable Complete
  dmi.product.version: sabc1
  dmi.sys.vendor: System76, Inc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1317979/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1317979] Re: 8086:0162 [System76 Sable Complete] backlight stops working after suspend

2014-07-16 Thread Traxtopel
dmesg  dmesg.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1317979

Title:
  8086:0162 [System76 Sable Complete] backlight stops working after
  suspend

Status in “linux” package in Ubuntu:
  Incomplete

Bug description:
  Add debug information from kernel debug inform from
  https://wiki.ubuntu.com/Kernel/Debugging/Backlight

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.13.0-24-generic 3.13.0-24.47
  ProcVersionSignature: Ubuntu 3.13.0-24.47-generic 3.13.9
  Uname: Linux 3.13.0-24-generic x86_64
  ApportVersion: 2.14.1-0ubuntu3
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  traxtopel   3077 F pulseaudio
   /dev/snd/controlC1:  traxtopel   3077 F pulseaudio
  CurrentDesktop: Unity
  Date: Fri May  9 18:29:41 2014
  HibernationDevice: RESUME=UUID=de5a6c32-5d89-4cb3-aee1-a8b32c416a1d
  InstallationDate: Installed on 2014-04-04 (35 days ago)
  InstallationMedia: Ubuntu 13.10 Saucy Salamander - Release amd64 
(20131016.1)
  MachineType: System76, Inc. Sable Complete
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-24-generic 
root=UUID=27287be2-654a-4c7a-9c5b-cc37df0adc0a ro quiet splash 
acpi_backlight=vendor vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-3.13.0-24-generic N/A
   linux-backports-modules-3.13.0-24-generic  N/A
   linux-firmware 1.127
  SourcePackage: linux
  StagingDrivers: keucr
  UpgradeStatus: Upgraded to trusty on 2014-04-18 (21 days ago)
  dmi.bios.date: 10/09/2013
  dmi.bios.vendor: Intel Corp.
  dmi.bios.version: AGH6120H.86A.0023.2013.1009.1142
  dmi.board.asset.tag: To be filled by O.E.M.
  dmi.board.name: DH61AGL
  dmi.board.vendor: Intel Corporation
  dmi.board.version: G71256-202
  dmi.chassis.type: 3
  dmi.chassis.vendor: System76, Inc.
  dmi.chassis.version: sabc1
  dmi.modalias: 
dmi:bvnIntelCorp.:bvrAGH6120H.86A.0023.2013.1009.1142:bd10/09/2013:svnSystem76,Inc.:pnSableComplete:pvrsabc1:rvnIntelCorporation:rnDH61AGL:rvrG71256-202:cvnSystem76,Inc.:ct3:cvrsabc1:
  dmi.product.name: Sable Complete
  dmi.product.version: sabc1
  dmi.sys.vendor: System76, Inc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1317979/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1342717] [NEW] package linux-image-3.16.0-3-generic (not installed) failed to install/upgrade: subprocess new pre-installation script returned error exit status 128

2014-07-16 Thread Cliff Carson
Public bug reported:

System failure while running Software Updater.

ProblemType: Package
DistroRelease: Ubuntu 14.10
Package: linux-image-3.16.0-3-generic (not installed)
ProcVersionSignature: Ubuntu 3.15.0-6.11-generic 3.15.0
Uname: Linux 3.15.0-6-generic x86_64
ApportVersion: 2.14.4-0ubuntu2
Architecture: amd64
AudioDevicesInUse:
 USERPID ACCESS COMMAND
 /dev/snd/controlC1:  cliff  2113 F pulseaudio
 /dev/snd/controlC0:  cliff  2113 F pulseaudio
Date: Wed Jul 16 09:08:06 2014
DuplicateSignature: package:linux-image-3.16.0-3-generic:(not 
installed):subprocess new pre-installation script returned error exit status 128
ErrorMessage: subprocess new pre-installation script returned error exit status 
128
HibernationDevice: RESUME=UUID=cc23d289-9aa8-4b46-a128-b1634ce01751
InstallationDate: Installed on 2014-06-28 (17 days ago)
InstallationMedia: Ubuntu-GNOME 14.10 Utopic Unicorn - Alpha amd64 (20140624)
IwConfig:
 eth0  no wireless extensions.
 
 lono wireless extensions.
MachineType: Si G41M-P33
ProcFB: 0 inteldrmfb
ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.15.0-6-generic 
root=UUID=76eac418-9e1e-41d6-974c-43e5429fe506 ro init=/lib/systemd/systemd
PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No 
PulseAudio daemon running, or not running as session daemon.
RelatedPackageVersions: grub-pc 2.02~beta2-10
RfKill:
 
SourcePackage: linux
Title: package linux-image-3.16.0-3-generic (not installed) failed to 
install/upgrade: subprocess new pre-installation script returned error exit 
status 128
UpgradeStatus: No upgrade log present (probably fresh install)
WifiSyslog:
 
dmi.bios.date: 01/05/2010
dmi.bios.vendor: American Megatrends Inc.
dmi.bios.version: V7.7
dmi.board.asset.tag: To Be Filled By O.E.M.
dmi.board.name: G41M-P33 (MS-7592)
dmi.board.vendor: MSI
dmi.board.version: 3.0
dmi.chassis.asset.tag: To Be Filled By O.E.M.
dmi.chassis.type: 3
dmi.chassis.vendor: MSI
dmi.chassis.version: 3.0
dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvrV7.7:bd01/05/2010:svnSi:pnG41M-P33:pvr3.0:rvnMSI:rnG41M-P33(MS-7592):rvr3.0:cvnMSI:ct3:cvr3.0:
dmi.product.name: G41M-P33
dmi.product.version: 3.0
dmi.sys.vendor: Si

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: amd64 apport-package utopic

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1342717

Title:
  package linux-image-3.16.0-3-generic (not installed) failed to
  install/upgrade: subprocess new pre-installation script returned error
  exit status 128

Status in “linux” package in Ubuntu:
  New

Bug description:
  System failure while running Software Updater.

  ProblemType: Package
  DistroRelease: Ubuntu 14.10
  Package: linux-image-3.16.0-3-generic (not installed)
  ProcVersionSignature: Ubuntu 3.15.0-6.11-generic 3.15.0
  Uname: Linux 3.15.0-6-generic x86_64
  ApportVersion: 2.14.4-0ubuntu2
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC1:  cliff  2113 F pulseaudio
   /dev/snd/controlC0:  cliff  2113 F pulseaudio
  Date: Wed Jul 16 09:08:06 2014
  DuplicateSignature: package:linux-image-3.16.0-3-generic:(not 
installed):subprocess new pre-installation script returned error exit status 128
  ErrorMessage: subprocess new pre-installation script returned error exit 
status 128
  HibernationDevice: RESUME=UUID=cc23d289-9aa8-4b46-a128-b1634ce01751
  InstallationDate: Installed on 2014-06-28 (17 days ago)
  InstallationMedia: Ubuntu-GNOME 14.10 Utopic Unicorn - Alpha amd64 
(20140624)
  IwConfig:
   eth0  no wireless extensions.
   
   lono wireless extensions.
  MachineType: Si G41M-P33
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.15.0-6-generic 
root=UUID=76eac418-9e1e-41d6-974c-43e5429fe506 ro init=/lib/systemd/systemd
  PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No 
PulseAudio daemon running, or not running as session daemon.
  RelatedPackageVersions: grub-pc 2.02~beta2-10
  RfKill:
   
  SourcePackage: linux
  Title: package linux-image-3.16.0-3-generic (not installed) failed to 
install/upgrade: subprocess new pre-installation script returned error exit 
status 128
  UpgradeStatus: No upgrade log present (probably fresh install)
  WifiSyslog:
   
  dmi.bios.date: 01/05/2010
  dmi.bios.vendor: American Megatrends Inc.
  dmi.bios.version: V7.7
  dmi.board.asset.tag: To Be Filled By O.E.M.
  dmi.board.name: G41M-P33 (MS-7592)
  dmi.board.vendor: MSI
  dmi.board.version: 3.0
  dmi.chassis.asset.tag: To Be Filled By O.E.M.
  dmi.chassis.type: 3
  dmi.chassis.vendor: MSI
  dmi.chassis.version: 3.0
  dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvrV7.7:bd01/05/2010:svnSi:pnG41M-P33:pvr3.0:rvnMSI:rnG41M-P33(MS-7592):rvr3.0:cvnMSI:ct3:cvr3.0:
  dmi.product.name: G41M-P33
  dmi.product.version: 3.0
  dmi.sys.vendor: Si

To manage 

[Kernel-packages] [Bug 1342717] Re: package linux-image-3.16.0-3-generic (not installed) failed to install/upgrade: subprocess new pre-installation script returned error exit status 128

2014-07-16 Thread Apport retracing service
** Tags removed: need-duplicate-check

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1342717

Title:
  package linux-image-3.16.0-3-generic (not installed) failed to
  install/upgrade: subprocess new pre-installation script returned error
  exit status 128

Status in “linux” package in Ubuntu:
  New

Bug description:
  System failure while running Software Updater.

  ProblemType: Package
  DistroRelease: Ubuntu 14.10
  Package: linux-image-3.16.0-3-generic (not installed)
  ProcVersionSignature: Ubuntu 3.15.0-6.11-generic 3.15.0
  Uname: Linux 3.15.0-6-generic x86_64
  ApportVersion: 2.14.4-0ubuntu2
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC1:  cliff  2113 F pulseaudio
   /dev/snd/controlC0:  cliff  2113 F pulseaudio
  Date: Wed Jul 16 09:08:06 2014
  DuplicateSignature: package:linux-image-3.16.0-3-generic:(not 
installed):subprocess new pre-installation script returned error exit status 128
  ErrorMessage: subprocess new pre-installation script returned error exit 
status 128
  HibernationDevice: RESUME=UUID=cc23d289-9aa8-4b46-a128-b1634ce01751
  InstallationDate: Installed on 2014-06-28 (17 days ago)
  InstallationMedia: Ubuntu-GNOME 14.10 Utopic Unicorn - Alpha amd64 
(20140624)
  IwConfig:
   eth0  no wireless extensions.
   
   lono wireless extensions.
  MachineType: Si G41M-P33
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.15.0-6-generic 
root=UUID=76eac418-9e1e-41d6-974c-43e5429fe506 ro init=/lib/systemd/systemd
  PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No 
PulseAudio daemon running, or not running as session daemon.
  RelatedPackageVersions: grub-pc 2.02~beta2-10
  RfKill:
   
  SourcePackage: linux
  Title: package linux-image-3.16.0-3-generic (not installed) failed to 
install/upgrade: subprocess new pre-installation script returned error exit 
status 128
  UpgradeStatus: No upgrade log present (probably fresh install)
  WifiSyslog:
   
  dmi.bios.date: 01/05/2010
  dmi.bios.vendor: American Megatrends Inc.
  dmi.bios.version: V7.7
  dmi.board.asset.tag: To Be Filled By O.E.M.
  dmi.board.name: G41M-P33 (MS-7592)
  dmi.board.vendor: MSI
  dmi.board.version: 3.0
  dmi.chassis.asset.tag: To Be Filled By O.E.M.
  dmi.chassis.type: 3
  dmi.chassis.vendor: MSI
  dmi.chassis.version: 3.0
  dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvrV7.7:bd01/05/2010:svnSi:pnG41M-P33:pvr3.0:rvnMSI:rnG41M-P33(MS-7592):rvr3.0:cvnMSI:ct3:cvr3.0:
  dmi.product.name: G41M-P33
  dmi.product.version: 3.0
  dmi.sys.vendor: Si

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1342717/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1342717] Status changed to Confirmed

2014-07-16 Thread Brad Figg
This change was made by a bot.

** Changed in: linux (Ubuntu)
   Status: New = Confirmed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1342717

Title:
  package linux-image-3.16.0-3-generic (not installed) failed to
  install/upgrade: subprocess new pre-installation script returned error
  exit status 128

Status in “linux” package in Ubuntu:
  Confirmed

Bug description:
  System failure while running Software Updater.

  ProblemType: Package
  DistroRelease: Ubuntu 14.10
  Package: linux-image-3.16.0-3-generic (not installed)
  ProcVersionSignature: Ubuntu 3.15.0-6.11-generic 3.15.0
  Uname: Linux 3.15.0-6-generic x86_64
  ApportVersion: 2.14.4-0ubuntu2
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC1:  cliff  2113 F pulseaudio
   /dev/snd/controlC0:  cliff  2113 F pulseaudio
  Date: Wed Jul 16 09:08:06 2014
  DuplicateSignature: package:linux-image-3.16.0-3-generic:(not 
installed):subprocess new pre-installation script returned error exit status 128
  ErrorMessage: subprocess new pre-installation script returned error exit 
status 128
  HibernationDevice: RESUME=UUID=cc23d289-9aa8-4b46-a128-b1634ce01751
  InstallationDate: Installed on 2014-06-28 (17 days ago)
  InstallationMedia: Ubuntu-GNOME 14.10 Utopic Unicorn - Alpha amd64 
(20140624)
  IwConfig:
   eth0  no wireless extensions.
   
   lono wireless extensions.
  MachineType: Si G41M-P33
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.15.0-6-generic 
root=UUID=76eac418-9e1e-41d6-974c-43e5429fe506 ro init=/lib/systemd/systemd
  PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No 
PulseAudio daemon running, or not running as session daemon.
  RelatedPackageVersions: grub-pc 2.02~beta2-10
  RfKill:
   
  SourcePackage: linux
  Title: package linux-image-3.16.0-3-generic (not installed) failed to 
install/upgrade: subprocess new pre-installation script returned error exit 
status 128
  UpgradeStatus: No upgrade log present (probably fresh install)
  WifiSyslog:
   
  dmi.bios.date: 01/05/2010
  dmi.bios.vendor: American Megatrends Inc.
  dmi.bios.version: V7.7
  dmi.board.asset.tag: To Be Filled By O.E.M.
  dmi.board.name: G41M-P33 (MS-7592)
  dmi.board.vendor: MSI
  dmi.board.version: 3.0
  dmi.chassis.asset.tag: To Be Filled By O.E.M.
  dmi.chassis.type: 3
  dmi.chassis.vendor: MSI
  dmi.chassis.version: 3.0
  dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvrV7.7:bd01/05/2010:svnSi:pnG41M-P33:pvr3.0:rvnMSI:rnG41M-P33(MS-7592):rvr3.0:cvnMSI:ct3:cvr3.0:
  dmi.product.name: G41M-P33
  dmi.product.version: 3.0
  dmi.sys.vendor: Si

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1342717/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1307198] Re: Bluetooth shuts down contact with mouse

2014-07-16 Thread Mathieu Trudel-Lapierre
Closing as Invalid since the issue is reportedly solve, but we don't
know why/how the other mouse does not work.

Sorry for the delay in responding.

** Changed in: bluez (Ubuntu)
   Status: New = Invalid

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to bluez in Ubuntu.
https://bugs.launchpad.net/bugs/1307198

Title:
  Bluetooth shuts down contact with mouse

Status in “bluez” package in Ubuntu:
  Invalid
Status in “unity” package in Ubuntu:
  Invalid

Bug description:
  My Dell Vostro 3555 purchased in Sept 2011 is equipped with Bluetooth.

   I used a bluetooth mouse from then on and never lost contact between
  computer and mouse, not even when changing the battery in the mouse.
  Since installing 1404LTS Beta 2 the connection is shut down when the
  computer is shut down and sometimes when the computer goes into
  hibernation.  This results in having to manually goto the Bluetooth
  GUI and the mouse and force the connection.

   The Bluetooth GUI has three on/off buttons,  bluetooth , visibility
  on Ubuntu-0 and mouse. The mouse button is off wenever I start the
  system.  This did not happen in any Ubuntu version of Linux I have had
  on this computer, other than in 14.04LTS.  This is a nuisance, and
  prevents me from demonstrating how good Ubuntu Linux really is.

   Having to sit in a demo and manually pressing a button on the mouse
  until the on/off button turns on immediately turns off any interest a
  newbie might have.

  A quick fix would be appreciated.

  At this point I have no idea od what corroborating info I need to
  provide, but will send anything asked for.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/bluez/+bug/1307198/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1342153] Re: Enable CONFIG_GPIO_SYSFS option in the Kernel

2014-07-16 Thread Tim Gardner
** Also affects: linux (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Utopic)
   Importance: Undecided
   Status: Confirmed

** Changed in: linux (Ubuntu Trusty)
   Status: New = In Progress

** Changed in: linux (Ubuntu Trusty)
 Assignee: (unassigned) = Kent Baxley (kentb)

** Changed in: linux (Ubuntu Utopic)
   Status: Confirmed = In Progress

** Changed in: linux (Ubuntu Utopic)
 Assignee: (unassigned) = Tim Gardner (timg-tpi)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1342153

Title:
  Enable CONFIG_GPIO_SYSFS option in the Kernel

Status in “linux” package in Ubuntu:
  In Progress
Status in “linux” source package in Trusty:
  In Progress
Status in “linux” source package in Utopic:
  In Progress

Bug description:
  It appears we don't set the CONFIG_GPIO_SYSFS on Trusty (or Utopic?)
  for x86.

  By enabled, I mean:

  CONFIG_GPIO_SYSFS=y

  This option (along with a few gpio devices) is needed to enable
  programming of such things as the I2C Mux through via the CPLDs on
  some OEM 'whitebox' switches that will leverage Software Defined
  Networking.

  This option can, of course, be set and users can build their own
  kernels, but, if at all possible they'd like to keep this as stock as
  they can.

  config GPIO_SYSFS
  bool /sys/class/gpio/... (sysfs interface)
  depends on SYSFS
  help
Say Y here to add a sysfs interface for GPIOs.

This is mostly useful to work around omissions in a system's
kernel support.  Those are common in custom and semicustom
hardware assembled using standard kernels with a minimum of
custom patches.  In those cases, userspace code may import
a given GPIO from the kernel, if no kernel driver requested it.

Kernel drivers may also request that a particular GPIO be
exported to userspace; this can be useful when debugging.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1342153/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1342153] Re: Enable CONFIG_GPIO_SYSFS option in the Kernel

2014-07-16 Thread Tim Gardner
** Changed in: linux (Ubuntu Trusty)
   Status: In Progress = Fix Committed

** Changed in: linux (Ubuntu Utopic)
   Status: In Progress = Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1342153

Title:
  Enable CONFIG_GPIO_SYSFS option in the Kernel

Status in “linux” package in Ubuntu:
  Fix Committed
Status in “linux” source package in Trusty:
  Fix Committed
Status in “linux” source package in Utopic:
  Fix Committed

Bug description:
  It appears we don't set the CONFIG_GPIO_SYSFS on Trusty (or Utopic?)
  for x86.

  By enabled, I mean:

  CONFIG_GPIO_SYSFS=y

  This option (along with a few gpio devices) is needed to enable
  programming of such things as the I2C Mux through via the CPLDs on
  some OEM 'whitebox' switches that will leverage Software Defined
  Networking.

  This option can, of course, be set and users can build their own
  kernels, but, if at all possible they'd like to keep this as stock as
  they can.

  config GPIO_SYSFS
  bool /sys/class/gpio/... (sysfs interface)
  depends on SYSFS
  help
Say Y here to add a sysfs interface for GPIOs.

This is mostly useful to work around omissions in a system's
kernel support.  Those are common in custom and semicustom
hardware assembled using standard kernels with a minimum of
custom patches.  In those cases, userspace code may import
a given GPIO from the kernel, if no kernel driver requested it.

Kernel drivers may also request that a particular GPIO be
exported to userspace; this can be useful when debugging.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1342153/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1327563] Re: Long delay when mounting NFS shares

2014-07-16 Thread Stefan Bader
To add a bit of debugging I did (using two VMs):
- There server side kernel version does not matter (tested trusty and utopic)
- A client  with a 3.13 kernel will have the delay, while the 3.16 kernel is ok

Enabling NFS debugging on both clients (as root echo 32767
/proc/sys/sunrpc/nfs_debug) shows an interesting fact:

3.13 client:
 7581.776148] NFS: nfs4_discover_server_trunking: testing 'lam-utopic6401'
 7581.776154] NFS call  setclientid auth=RPCSEC_GSS, 'Linux NFSv4.0 192.168.2.19
 7596.776086] RPC: AUTH_GSS upcall timed out.
 7596.776086] Please check user daemon is running.
 7596.776110] NFS reply setclientid: -13
 7596.776121] NFS call  setclientid auth=RPCSEC_GSS, 'Linux NFSv4.0 192.168.2.19
 7597.024109] NFS reply setclientid: -13
 7597.024766] NFS call  setclientid auth=UNIX, 'Linux NFSv4.0 192.168.2.192/192.
 7597.025506] NFS reply setclientid: 0
 7597.025512] NFS call  setclientid_confirm auth=UNIX, (client ID fb69c65304
 7597.026068] NFS reply setclientid_confirm: 0

3.16 client:
 2137.866775] NFS: nfs4_discover_server_trunking: testing 'lam-utopic6401'
 2137.866783] NFS call  setclientid auth=UNIX, 'Linux NFSv4.0 192.168.2.120/192.
 2137.867420] NFS reply setclientid: 0
 2137.867426] NFS call  setclientid_confirm auth=UNIX, (client ID fb69c65305
 2137.867727] NFS reply setclientid_confirm: 0

So the newer kernel seems to skip the other authentication methods. And
of those two AUTH_GSS is causing the delay because it times out.
Unfortunately I did not spot any commits in between 3.13 and now that
would immediately sound like a good candidate for fixing this.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1327563

Title:
  Long delay when mounting NFS shares

Status in “linux” package in Ubuntu:
  Confirmed

Bug description:
  Summary:

  After upgrading the kernel on Ubuntu 14.04 to 3.13.0-29-generic I
  found that it can take a considerably longer amount of time to mount
  NFS shares.

  How to reproduce:

  1. Install Ubuntu 14.04 on two machines. A minimal server install should be 
fine. One will act as a server, the other as a client.
  2. Upgrade the kernel on the client machine to at least 3.13.0-27-generic.
  3. Install the nfs-kernel-server package on the server.
  4. Add a directory to /etc/exports and run service nfs-kernel-server start.
  5. Install the nfs-common package on the client.
  6. Attempt to mount the shared directory on the client.

  Expected result:

  The shared directory should be mounted on the client more or less
  immediately.

  Actual result:

  The mount command hangs and eventually completes. In this test case it
  takes 16 seconds consistently. On a production machine where the
  problem was first discovered the time is considerably longer and
  essentially makes it impossible to mount NFS shares.

  Regression:

  I have been able to reproduce the problem on clients running Linux
  3.13.0-27-generic and later. The problem is not reproducible on
  clients running Linux 3.13.0-24-generic. The problem is reproducible
  no matter which kernel version is used on the server.

  Tested client kernel versions:

  Linux 3.13.0-29-generic #53-Ubuntu  FAIL
  Linux 3.13.0-27-generic #50-Ubuntu  FAIL
  Linux 3.13.0-24-generic #47-Ubuntu  OK

  Tested server kernel versions:

  Linux 3.13.0-29-generic #53-Ubuntu  OK
  Linux 3.13.0-27-generic #50-Ubuntu  OK
  Linux 3.13.0-24-generic #47-Ubuntu  OK

  lsb_release -rd:

  Description:  Ubuntu 14.04 LTS
  Release:  14.04

  apt-cache policy linux-image-generic:

  linux-image-generic:
Installed: (none)
Candidate: 3.13.0.29.35
Version table:
   3.13.0.29.35 0
  500 http://se.archive.ubuntu.com/ubuntu/ trusty-updates/main amd64 
Packages
  500 http://security.ubuntu.com/ubuntu/ trusty-security/main amd64 
Packages
   3.13.0.24.28 0
  500 http://se.archive.ubuntu.com/ubuntu/ trusty/main amd64 Packages

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.13.0-29-generic 3.13.0-29.53
  ProcVersionSignature: Ubuntu 3.13.0-29.53-generic 3.13.11.2
  Uname: Linux 3.13.0-29-generic x86_64
  AlsaDevices:
   total 0
   crw-rw 1 root audio 116,  1 Jun  7 16:26 seq
   crw-rw 1 root audio 116, 33 Jun  7 16:26 timer
  AplayDevices: Error: [Errno 2] No such file or directory: 'aplay'
  ApportVersion: 2.14.1-0ubuntu3.2
  Architecture: amd64
  ArecordDevices: Error: [Errno 2] No such file or directory: 'arecord'
  AudioDevicesInUse: Error: [Errno 2] No such file or directory: 'fuser'
  CRDA: Error: [Errno 2] No such file or directory: 'iw'
  Date: Sat Jun  7 16:30:02 2014
  HibernationDevice: RESUME=UUID=9c13108b-d40a-4881-b563-c477ed2e6804
  InstallationDate: Installed on 2014-06-07 (0 days ago)
  InstallationMedia: Ubuntu-Server 14.04 LTS Trusty Tahr - Release amd64 
(20140416.2)
  IwConfig: Error: [Errno 2] No such file or directory: 'iwconfig'
  

[Kernel-packages] [Bug 1341543] Re: linux: 3.16.0-4.9 -proposed tracker

2014-07-16 Thread Brad Figg
** Changed in: kernel-development-workflow/prepare-package
   Status: New = Fix Released

** Changed in: kernel-development-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) = Tim Gardner 
(timg-tpi)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1341543

Title:
  linux: 3.16.0-4.9 -proposed tracker

Status in Kernel Development Workflow:
  In Progress
Status in Kernel Development Workflow package-testing series:
  New
Status in Kernel Development Workflow prepare-package series:
  Fix Released
Status in Kernel Development Workflow prepare-package-meta series:
  Fix Released
Status in Kernel Development Workflow prepare-package-signed series:
  New
Status in Kernel Development Workflow promote-to-release series:
  New
Status in “linux” package in Ubuntu:
  New
Status in “linux” source package in Utopic:
  New

Bug description:
  This bug is for tracking the 3.16.0-4.9 upload package. This bug will
  contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-Prepare-package-start:Monday, 14. July 2014 11:40 UTC
  kernel-phase-changed:Monday, 14. July 2014 11:40 UTC
  kernel-phase:Prepare

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-development-workflow/+bug/1341543/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1342776] [NEW] [3.16.0.4][nvidia 340.24] ERROR: Kernel configuration is invalid.;

2014-07-16 Thread dino99
Public bug reported:

Installing the latest kernel, i've got:

run-parts: executing /etc/kernel/postinst.d/dkms 3.16.0-4-generic 
/boot/vmlinuz-3.16.0-4-generic
Error! Bad return status for module build on kernel: 3.16.0-4-generic (i686)
Consult /var/lib/dkms/nvidia-340/340.24/build/make.log for more information.

note that the real path is:
/var/lib/dkms/nvidia-340/340.24/3.16.0-4-generic/i686/log/make.log

note2: system booted with systemd-boot

ProblemType: Bug
DistroRelease: Ubuntu 14.10
Package: linux-image-3.16.0-3-generic 3.16.0-3.8
ProcVersionSignature: Ubuntu 3.16.0-3.8-generic 3.16.0-rc4
Uname: Linux 3.16.0-3-generic i686
NonfreeKernelModules: nvidia
ApportVersion: 2.14.4-0ubuntu2
Architecture: i386
AudioDevicesInUse:
 USERPID ACCESS COMMAND
 /dev/snd/controlC1:  oem   25080 F pulseaudio
 /dev/snd/controlC0:  oem   25080 F pulseaudio
CurrentDesktop: GNOME
Date: Wed Jul 16 17:03:26 2014
HibernationDevice: RESUME=UUID=0a9ca7f0-6eeb-4b21-b70f-670fa600de16
IwConfig:
 lono wireless extensions.

 eth0  no wireless extensions.

 eth1  no wireless extensions.
Lsusb:
 Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
 Bus 003 Device 002: ID 046d:c50e Logitech, Inc. Cordless Mouse Receiver
 Bus 003 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
 Bus 002 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
MachineType: ASUSTEK COMPUTER INC P5W DH Deluxe
ProcFB:

ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.16.0-3-generic 
root=UUID=83f51130-24a6-4486-9284-f8d6700df293 ro recovery nomodeset
RelatedPackageVersions:
 linux-restricted-modules-3.16.0-3-generic N/A
 linux-backports-modules-3.16.0-3-generic  N/A
 linux-firmware1.132
RfKill:

SourcePackage: linux
UpgradeStatus: No upgrade log present (probably fresh install)
WifiSyslog:

dmi.bios.date: 07/22/2010
dmi.bios.vendor: American Megatrends Inc.
dmi.bios.version: 3002
dmi.board.asset.tag: To Be Filled By O.E.M.
dmi.board.name: P5W DH Deluxe
dmi.board.vendor: ASUSTeK Computer INC.
dmi.board.version: Rev 1.xx
dmi.chassis.asset.tag: Asset-1234567890
dmi.chassis.type: 3
dmi.chassis.vendor: Chassis Manufacture
dmi.chassis.version: Chassis Version
dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvr3002:bd07/22/2010:svnASUSTEKCOMPUTERINC:pnP5WDHDeluxe:pvrSystemVersion:rvnASUSTeKComputerINC.:rnP5WDHDeluxe:rvrRev1.xx:cvnChassisManufacture:ct3:cvrChassisVersion:
dmi.product.name: P5W DH Deluxe
dmi.product.version: System Version
dmi.sys.vendor: ASUSTEK COMPUTER INC

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: apport-bug i386 third-party-packages utopic

** Attachment added: make.log
   https://bugs.launchpad.net/bugs/1342776/+attachment/4154092/+files/make.log

** Description changed:

  Installing the latest kernel, i've got:
  
  run-parts: executing /etc/kernel/postinst.d/dkms 3.16.0-4-generic 
/boot/vmlinuz-3.16.0-4-generic
  Error! Bad return status for module build on kernel: 3.16.0-4-generic (i686)
  Consult /var/lib/dkms/nvidia-340/340.24/build/make.log for more information.
  
  note that the real path is:
  /var/lib/dkms/nvidia-340/340.24/3.16.0-4-generic/i686/log/make.log
+ 
+ note2: system booted with systemd-boot
  
  ProblemType: Bug
  DistroRelease: Ubuntu 14.10
  Package: linux-image-3.16.0-3-generic 3.16.0-3.8
  ProcVersionSignature: Ubuntu 3.16.0-3.8-generic 3.16.0-rc4
  Uname: Linux 3.16.0-3-generic i686
  NonfreeKernelModules: nvidia
  ApportVersion: 2.14.4-0ubuntu2
  Architecture: i386
  AudioDevicesInUse:
-  USERPID ACCESS COMMAND
-  /dev/snd/controlC1:  oem   25080 F pulseaudio
-  /dev/snd/controlC0:  oem   25080 F pulseaudio
+  USERPID ACCESS COMMAND
+  /dev/snd/controlC1:  oem   25080 F pulseaudio
+  /dev/snd/controlC0:  oem   25080 F pulseaudio
  CurrentDesktop: GNOME
  Date: Wed Jul 16 17:03:26 2014
  HibernationDevice: RESUME=UUID=0a9ca7f0-6eeb-4b21-b70f-670fa600de16
  IwConfig:
-  lono wireless extensions.
-  
-  eth0  no wireless extensions.
-  
-  eth1  no wireless extensions.
+  lono wireless extensions.
+ 
+  eth0  no wireless extensions.
+ 
+  eth1  no wireless extensions.
  Lsusb:
-  Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
-  Bus 003 Device 002: ID 046d:c50e Logitech, Inc. Cordless Mouse Receiver
-  Bus 003 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
-  Bus 002 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
+  Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
+  Bus 003 Device 002: ID 046d:c50e Logitech, Inc. Cordless Mouse Receiver
+  Bus 003 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
+  Bus 002 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
  MachineType: ASUSTEK COMPUTER INC P5W DH Deluxe
  ProcFB:
-  
+ 
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.16.0-3-generic 
root=UUID=83f51130-24a6-4486-9284-f8d6700df293 ro recovery nomodeset
  

Re: [Kernel-packages] [Bug 1341195] Re: KVM guests getting slow by time

2014-07-16 Thread Tamas Papp
On 07/14/2014 05:13 PM, Serge Hallyn wrote:
 Since switching to saucy kernel is a good workaround, marking this as
 affecting the kernel.

 Could you try disabling KSM and see if that avoids the issue?

I set KSM_ENABLED=0 in /etc/default/qemu-kvm and restarted the server.

Also today after 3 weeks it started the same thing with Saucy kernel
too.


tamas

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1341195

Title:
  KVM guests getting slow by time

Status in “linux” package in Ubuntu:
  Incomplete
Status in “qemu” package in Ubuntu:
  Incomplete

Bug description:
  There is a post with very similar symptoms on serverfault:

  http://serverfault.com/questions/609881/windows-server-2012-on-kvm-on-
  ubuntu-14-04-runs-well-for-a-while-and-then-slows/612084#612084

  
  Basically all kind of KVM guests are getting slow by time, both windows or 
linux. The more running guests, it happens sooner.
  Switching back to Saucy kernel is a good workaround.

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: qemu-kvm 2.0.0+dfsg-2ubuntu1.1
  ProcVersionSignature: Ubuntu 3.13.0-29.53-generic 3.13.11.2
  Uname: Linux 3.13.0-29-generic x86_64
  NonfreeKernelModules: zfs zunicode zavl zcommon znvpair
  ApportVersion: 2.14.1-0ubuntu3.2
  Architecture: amd64
  Date: Sat Jul 12 22:18:49 2014
  SourcePackage: qemu
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1341195/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1342776] Status changed to Confirmed

2014-07-16 Thread Brad Figg
This change was made by a bot.

** Changed in: linux (Ubuntu)
   Status: New = Confirmed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1342776

Title:
  [3.16.0.4][nvidia 340.24] ERROR: Kernel configuration is invalid.;

Status in “linux” package in Ubuntu:
  Confirmed

Bug description:
  Installing the latest kernel, i've got:

  run-parts: executing /etc/kernel/postinst.d/dkms 3.16.0-4-generic 
/boot/vmlinuz-3.16.0-4-generic
  Error! Bad return status for module build on kernel: 3.16.0-4-generic (i686)
  Consult /var/lib/dkms/nvidia-340/340.24/build/make.log for more information.

  note that the real path is:
  /var/lib/dkms/nvidia-340/340.24/3.16.0-4-generic/i686/log/make.log

  note2: system booted with systemd-boot

  ProblemType: Bug
  DistroRelease: Ubuntu 14.10
  Package: linux-image-3.16.0-3-generic 3.16.0-3.8
  ProcVersionSignature: Ubuntu 3.16.0-3.8-generic 3.16.0-rc4
  Uname: Linux 3.16.0-3-generic i686
  NonfreeKernelModules: nvidia
  ApportVersion: 2.14.4-0ubuntu2
  Architecture: i386
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC1:  oem   25080 F pulseaudio
   /dev/snd/controlC0:  oem   25080 F pulseaudio
  CurrentDesktop: GNOME
  Date: Wed Jul 16 17:03:26 2014
  HibernationDevice: RESUME=UUID=0a9ca7f0-6eeb-4b21-b70f-670fa600de16
  IwConfig:
   lono wireless extensions.

   eth0  no wireless extensions.

   eth1  no wireless extensions.
  Lsusb:
   Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
   Bus 003 Device 002: ID 046d:c50e Logitech, Inc. Cordless Mouse Receiver
   Bus 003 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
   Bus 002 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
  MachineType: ASUSTEK COMPUTER INC P5W DH Deluxe
  ProcFB:

  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.16.0-3-generic 
root=UUID=83f51130-24a6-4486-9284-f8d6700df293 ro recovery nomodeset
  RelatedPackageVersions:
   linux-restricted-modules-3.16.0-3-generic N/A
   linux-backports-modules-3.16.0-3-generic  N/A
   linux-firmware1.132
  RfKill:

  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  WifiSyslog:

  dmi.bios.date: 07/22/2010
  dmi.bios.vendor: American Megatrends Inc.
  dmi.bios.version: 3002
  dmi.board.asset.tag: To Be Filled By O.E.M.
  dmi.board.name: P5W DH Deluxe
  dmi.board.vendor: ASUSTeK Computer INC.
  dmi.board.version: Rev 1.xx
  dmi.chassis.asset.tag: Asset-1234567890
  dmi.chassis.type: 3
  dmi.chassis.vendor: Chassis Manufacture
  dmi.chassis.version: Chassis Version
  dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvr3002:bd07/22/2010:svnASUSTEKCOMPUTERINC:pnP5WDHDeluxe:pvrSystemVersion:rvnASUSTeKComputerINC.:rnP5WDHDeluxe:rvrRev1.xx:cvnChassisManufacture:ct3:cvrChassisVersion:
  dmi.product.name: P5W DH Deluxe
  dmi.product.version: System Version
  dmi.sys.vendor: ASUSTEK COMPUTER INC

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1342776/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1318218] Re: SATA problems on MacBook Pro 11, 1?

2014-07-16 Thread Alex
Nils' workaround also works for me, as does setting the
link_power_management_policy to medium_power.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1318218

Title:
  SATA problems on MacBook Pro 11,1?

Status in “linux” package in Ubuntu:
  Confirmed

Bug description:
  I installed Ubuntu 14.04 next to MacOS following the guide at
  https://help.ubuntu.com/community/MacBookPro11-1/Saucy/

  Looking into dmesg, I constantlz get entries like
  [  276.380934] ata1: SError: { PHYRdyChg }
  [  276.380943] ata1: hard resetting link
  [  277.103527] ata1: SATA link up 1.5 Gbps (SStatus 113 SControl 310)
  [  277.103999] ata1.00: unexpected _GTF length (8)
  [  277.104504] ata1.00: unexpected _GTF length (8)
  [  277.104507] ata1.00: configured for UDMA/33
  [  277.104629] ata1: EH complete
  [  277.206319] ata1: exception Emask 0x10 SAct 0x0 SErr 0x1 action 0xe 
frozen
  [  277.206328] ata1: irq_stat 0x0040, PHY RDY changed
  [  277.206333] ata1: SError: { PHYRdyChg }
  [  277.206343] ata1: hard resetting link
  [  277.927757] ata1: SATA link up 1.5 Gbps (SStatus 113 SControl 310)
  [  277.928425] ata1.00: unexpected _GTF length (8)
  [  277.929040] ata1.00: unexpected _GTF length (8)
  [  277.929051] ata1.00: configured for UDMA/33
  [  277.929168] ata1: EH complete
  [  278.030944] ata1: exception Emask 0x10 SAct 0x0 SErr 0x1 action 0xe 
frozen
  [  278.030952] ata1: irq_stat 0x0040, PHY RDY changed
  [  278.030957] ata1: SError: { PHYRdyChg }
  [  278.030965] ata1: hard resetting link
  [  278.752008] ata1: SATA link up 1.5 Gbps (SStatus 113 SControl 310)
  [  278.752582] ata1.00: unexpected _GTF length (8)
  [  278.753140] ata1.00: unexpected _GTF length (8)
  [  278.753147] ata1.00: configured for UDMA/33
  [  278.753231] ata1: EH complete
  [  278.853417] ata1: exception Emask 0x10 SAct 0x0 SErr 0x1 action 0xe 
frozen
  [  278.853424] ata1: irq_stat 0x0040, PHY RDY changed
  [  278.853427] ata1: SError: { PHYRdyChg }
  [  278.853434] ata1: hard resetting link
  [  279.576258] ata1: SATA link up 1.5 Gbps (SStatus 113 SControl 310)
  [  279.576881] ata1.00: unexpected _GTF length (8)
  [  279.577417] ata1.00: unexpected _GTF length (8)
  [  279.577427] ata1.00: configured for UDMA/33
  [  279.577491] ata1: EH complete
  [  279.677753] ata1: exception Emask 0x10 SAct 0x0 SErr 0x1 action 0xe 
frozen
  [  279.677762] ata1: irq_stat 0x0040, PHY RDY changed
  [  279.677767] ata1: SError: { PHYRdyChg }
  [  279.66] ata1: hard resetting link
  [  280.400449] ata1: SATA link up 1.5 Gbps (SStatus 113 SControl 310)
  [  280.401147] ata1.00: unexpected _GTF length (8)
  [  280.401722] ata1.00: unexpected _GTF length (8)
  [  280.401733] ata1.00: configured for UDMA/33
  [  280.401809] ata1: EH complete
  [  280.502117] ata1: exception Emask 0x10 SAct 0x0 SErr 0x1 action 0xe 
frozen
  [  280.502127] ata1: irq_stat 0x0040, PHY RDY changed
  [  280.502132] ata1: SError: { PHYRdyChg }

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.13.0-24-generic 3.13.0-24.47
  ProcVersionSignature: Ubuntu 3.13.0-24.47-generic 3.13.9
  Uname: Linux 3.13.0-24-generic x86_64
  NonfreeKernelModules: wl
  ApportVersion: 2.14.1-0ubuntu3
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  markus 1663 F pulseaudio
   /dev/snd/controlC1:  markus 1663 F pulseaudio
  CurrentDesktop: Unity
  Date: Sat May 10 19:33:44 2014
  HibernationDevice: RESUME=UUID=c71381d2-e2f3-4c96-94ea-57b8986afd08
  InstallationDate: Installed on 2014-05-09 (0 days ago)
  InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Release amd64 (20140417)
  MachineType: Apple Inc. MacBookPro11,1
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-24-generic.efi.signed 
root=UUID=7584bc70-893a-4291-a1cb-4680f5e09d22 ro libata.force=noncq quiet 
splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-3.13.0-24-generic N/A
   linux-backports-modules-3.13.0-24-generic  N/A
   linux-firmware 1.127
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 10/29/2013
  dmi.bios.vendor: Apple Inc.
  dmi.bios.version: MBP111.88Z.0138.B03.1310291227
  dmi.board.asset.tag: Base Board Asset Tag#
  dmi.board.name: Mac-189A3D4F975D5FFC
  dmi.board.vendor: Apple Inc.
  dmi.board.version: MacBookPro11,1
  dmi.chassis.type: 10
  dmi.chassis.vendor: Apple Inc.
  dmi.chassis.version: Mac-189A3D4F975D5FFC
  dmi.modalias: 
dmi:bvnAppleInc.:bvrMBP111.88Z.0138.B03.1310291227:bd10/29/2013:svnAppleInc.:pnMacBookPro11,1:pvr1.0:rvnAppleInc.:rnMac-189A3D4F975D5FFC:rvrMacBookPro11,1:cvnAppleInc.:ct10:cvrMac-189A3D4F975D5FFC:
  dmi.product.name: MacBookPro11,1
  dmi.product.version: 1.0
  dmi.sys.vendor: Apple Inc.

To manage notifications about this bug 

[Kernel-packages] [Bug 1341543] Re: linux: 3.16.0-4.9 -proposed tracker

2014-07-16 Thread Brad Figg
All builds are complete, packages in this bug are available in
-proposed.

** Changed in: kernel-development-workflow/prepare-package-signed
   Status: New = Fix Released

** Changed in: kernel-development-workflow/prepare-package-signed
 Assignee: Canonical Kernel Team (canonical-kernel-team) = Tim Gardner 
(timg-tpi)

** Changed in: kernel-development-workflow/package-testing
   Status: New = Confirmed

** Changed in: kernel-development-workflow/package-testing
   Status: Confirmed = In Progress

** Changed in: kernel-development-workflow/package-testing
   Status: In Progress = Confirmed

** Description changed:

  This bug is for tracking the 3.16.0-4.9 upload package. This bug will
  contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-Prepare-package-start:Monday, 14. July 2014 11:40 UTC
- kernel-phase-changed:Monday, 14. July 2014 11:40 UTC
- kernel-phase:Prepare
+ kernel-phase-changed:Wednesday, 16. July 2014 16:00 UTC
+ kernel-Prepare-package-end:Wednesday, 16. July 2014 16:00 UTC
+ kernel-Package-testing-start:Wednesday, 16. July 2014 16:00 UTC
+ kernel-phase:PPA Testing
+ ppa-package-testing-start:Wednesday, 16. July 2014 16:00 UTC

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1341543

Title:
  linux: 3.16.0-4.9 -proposed tracker

Status in Kernel Development Workflow:
  In Progress
Status in Kernel Development Workflow package-testing series:
  Confirmed
Status in Kernel Development Workflow prepare-package series:
  Fix Released
Status in Kernel Development Workflow prepare-package-meta series:
  Fix Released
Status in Kernel Development Workflow prepare-package-signed series:
  Fix Released
Status in Kernel Development Workflow promote-to-release series:
  New
Status in “linux” package in Ubuntu:
  New
Status in “linux” source package in Utopic:
  New

Bug description:
  This bug is for tracking the 3.16.0-4.9 upload package. This bug will
  contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-Prepare-package-start:Monday, 14. July 2014 11:40 UTC
  kernel-phase-changed:Wednesday, 16. July 2014 16:00 UTC
  kernel-Prepare-package-end:Wednesday, 16. July 2014 16:00 UTC
  kernel-Package-testing-start:Wednesday, 16. July 2014 16:00 UTC
  kernel-phase:PPA Testing
  ppa-package-testing-start:Wednesday, 16. July 2014 16:00 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-development-workflow/+bug/1341543/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1239578] Re: No wireless support for Realtek RTL8192EE [10ec:818b]

2014-07-16 Thread Larry Finger
Realtek has never been good at writing clear module parameter
descriptions. My current working version has the following:

MODULE_PARM_DESC(swenc, Set to 1 for software crypto (default 0)\n);
MODULE_PARM_DESC(ips, Set to 0 to not use link power save (default 1)\n);
MODULE_PARM_DESC(swlps, Set to 1 to use SW control power save (default 0)\n);
MODULE_PARM_DESC(fwlps, Set to 1 to use FW control power save (default 1)\n);
MODULE_PARM_DESC(msi, Set to 1 to use MSI interrupts mode (default 1)\n);
MODULE_PARM_DESC(debug, Set debug level (0-5) (default 0));

In other words, link power save is ON by default, firmware power control
is also ON, and software power control is off.

My test computer refuses to hibernate or suspend, thus I have not tested
standby, whatever that means. In fact, in the days preceeding the
closing of changes for 3.16, I was so busy trying to provide help for
the Lenovo T440s users, and getting the code into the kernel that I
barely had time for testing.

I am afraid that someone else will need to test and debug these
problems.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1239578

Title:
  No wireless support for Realtek RTL8192EE [10ec:818b]

Status in HWE Next Project:
  Confirmed
Status in HWE Next trusty series:
  Confirmed
Status in “linux” package in Ubuntu:
  Confirmed

Bug description:
  Open this bug to trace device driver RTL8192EE.

  We have seen this wireless card on some laptops, id is [10ec:818b],
  driver is RTL8192EE.

  Status: waiting for this driver being moved out of staging directory.

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1239578/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1309578] Re: Ubuntu 14.04 suddenly reboots when booting from Live USB AMD A8 6600k

2014-07-16 Thread Rick Robinson
Solution to my problem - (Thank you Rick Forberg!)
Linux Mint 17 Qiana won't install - keeps rebooting. It doesn't matter if the 
installation medium is a flash drive or CD. Once the live version loads it 
immediately reboots. There isn't enough time to install it. Once I managed to 
actually install it after dozens of tries. The result was it would get to the 
login, accept my credentials then reboot before actually loading. Thankfully 
after reading several of the posts on this page I was able to work out a 
procedure to install the OS, then fix the issue for my MSI desktops.

Most of the Desktops at work running Linux Mint are custom built MSI boards 
with the following configurations:
Motherboard: MSI A78M-E45
BIOS: AMI BIOS 25.1 (2013-12-09)  25.3 (2014-03-19)
APU: AMD A10-5800K (quad core) Trinity 3.8 GHz
RAM: Patriot Viper DDR3 2133 (PC3 17000) 4x4GB

and

Motherboard: MSI FM2-A55M-E33
BIOS: E7721AMS v11.4 (2013-10-23)
APU: AMD A8-5600K (quad core) 3.60GHz
RAM: HyperX DDR3 1600 (PC3 12800) 2x4GB

Both desktop configurations had the same problem. They were running
Linux Mint 15 and 16. I have now replaced some of them with Qiana 17.
Installing Linux Mint 17 on them had been a problem. Here is what I did
to fix it:

Once the live version started to load I kept the mouse constantly moving
with one hand. With the other hand, using the keyboard, I started the
installation utility and answered all the questions for the installation
(I kept the mouse moving the entire time). Once the installation was
finished the utility requested a restart. When the OS restarted I kept
the mouse moving again, put in my login credentials and when Mint loaded
I launched the terminal with ctr+alt+t.

In the terminal I updated the advanced packaging tool: apt-get update  
apt-get upgrade
(This takes quite a while, but it is important to keep the mouse moving the 
entire time)

Then, I updated the display drivers: apt-get install fglrx-updates
(you will need to prepend these commands with sudo if you are not root when you 
run them)

After the the two commands (above) finished. I restarted the desktop and
installation on the desktop has been stable ever since. This is true of
all the desktops (configurations above). I hope this post will be
helpful to anyone having problems with MSI motherboards. They are my
systemboards of choice and I am very grateful to all the contributors of
this forum. Your posts and insights have made this fix possible.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1309578

Title:
  Ubuntu 14.04 suddenly reboots when booting from Live USB AMD A8 6600k

Status in “linux” package in Ubuntu:
  Incomplete

Bug description:
  I have a custom built AMD System with the following hardware currently
  running on Linux Mint 16 :

  AMD A8 6600k with Integrated graphics | MSI-FM2-A55M-E33 Motherboard |
  Kingston Hyperx Blu 4GB RAM | Corsair VS450 PSU

  Today when I tried to install 14.04 amd64 iso using a bootable USB,
  then the system rebooted. Any further attempts in installing it
  resulted in the same bug. As soon as I open the Ubuntu installer
  application and click Continue button then the system restarts after
  2-3 seconds.

  I asked the same on AskUbuntu and some more guys reported the same
  problem with AMD APU, so I believe it to be a genuine bug and not just
  with me.

  The BIOS version is the latest one downloaded from MSI official
  website which is version 11.5.

  Also an Interesting thing is that this bug is common with the latest
  iso of Arch Linux too, but when booting older distros like Linux Mint
  16 from USB, then everything works like it should, so it might have
  something to do with the newer 3.13 Kernel version.

  I am not an expert, but I can surely tell that only the newer distros
  are affected by this bug as reported by some other guys at AskUbuntu
  and the fact that Arch which is running the newer Kernel is having the
  same bug, so it probably has something to do with the newer Kernel,
  but I could be wrong.

  This bug is not letting me install Ubuntu 14.04 on my hardware and it
  is affecting a few more users too. Here is the AskUbuntu thread :
  http://askubuntu.com/questions/449391/unable-to-install-ubuntu-14-04
  -pc-restarts-after-i-click-continue-button-in

  I hope this gets fixed soon or with the 14.04.1 upcoming July release.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1309578/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1341195] Re: KVM guests getting slow by time

2014-07-16 Thread Serge Hallyn
Hi Tamas,

To be clear, you have not yet gotten the bug since you've set
KSM_ENABLED to 0, or have you?

Interesting about the saucy kernel.  Ideally we could reproduce this
reliably enough to really bisect.

I wonder if we can reproduce without qemu.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1341195

Title:
  KVM guests getting slow by time

Status in “linux” package in Ubuntu:
  Incomplete
Status in “qemu” package in Ubuntu:
  Incomplete

Bug description:
  There is a post with very similar symptoms on serverfault:

  http://serverfault.com/questions/609881/windows-server-2012-on-kvm-on-
  ubuntu-14-04-runs-well-for-a-while-and-then-slows/612084#612084

  
  Basically all kind of KVM guests are getting slow by time, both windows or 
linux. The more running guests, it happens sooner.
  Switching back to Saucy kernel is a good workaround.

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: qemu-kvm 2.0.0+dfsg-2ubuntu1.1
  ProcVersionSignature: Ubuntu 3.13.0-29.53-generic 3.13.11.2
  Uname: Linux 3.13.0-29-generic x86_64
  NonfreeKernelModules: zfs zunicode zavl zcommon znvpair
  ApportVersion: 2.14.1-0ubuntu3.2
  Architecture: amd64
  Date: Sat Jul 12 22:18:49 2014
  SourcePackage: qemu
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1341195/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1041790]

2014-07-16 Thread Matteo Croce
same happens with 3.15.0 on Ubuntu 14.04 64 bit

Jul 11 12:43:41 localhost kernel: [42049.462542] [drm] stuck on render ring
Jul 11 12:43:41 localhost kernel: [42049.463330] [drm] GPU HANG: ecode 
0:0x00ff, in chrome [2172], reason: Ring hung, action: reset
Jul 11 12:43:41 localhost kernel: [42049.463334] [drm] GPU hangs can indicate a 
bug anywhere in the entire gfx stack, including userspace.
Jul 11 12:43:41 localhost kernel: [42049.463335] [drm] Please file a _new_ bug 
report on bugs.freedesktop.org against DRI - DRM/Intel
Jul 11 12:43:41 localhost kernel: [42049.463336] [drm] drm/i915 developers can 
then reassign to the right component if it's not a kernel issue.
Jul 11 12:43:41 localhost kernel: [42049.463337] [drm] The gpu crash dump is 
required to analyze gpu hangs, so please always attach it.
Jul 11 12:43:41 localhost kernel: [42049.463338] [drm] GPU crash dump saved to 
/sys/class/drm/card0/error
Jul 11 12:43:43 localhost kernel: [42051.464623] [drm] Enabling RC6 states: RC6 
on, RC6p off, RC6pp off
Jul 11 12:43:47 localhost kernel: [42055.468816] [drm] stuck on render ring
Jul 11 12:43:47 localhost kernel: [42055.469614] [drm] GPU HANG: ecode 
0:0x00ff, in chrome [2172], reason: Ring hung, action: reset
Jul 11 12:43:49 localhost kernel: [42057.470899] [drm] Enabling RC6 states: RC6 
on, RC6p off, RC6pp off
Jul 11 12:43:53 localhost kernel: [42061.439056] [drm] stuck on render ring
Jul 11 12:43:53 localhost kernel: [42061.439867] [drm] GPU HANG: ecode 
0:0xfeff, in chrome [2172], reason: Ring hung, action: reset

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1041790

Title:
  [snb] GPU lockup  IPEHR: 0x0b160001 IPEHR: 0x0b140001, workaround
  i915.semaphores=0

Status in X.org xf86-video-intel:
  In Progress
Status in “linux” package in Ubuntu:
  Incomplete
Status in “sandybridge-meta” package in Ubuntu:
  Confirmed
Status in “xserver-xorg-video-intel” package in Ubuntu:
  Triaged

Bug description:
  X locks up periodically for a 2 to ten seconds at a time and this
  crash log gets generated. It's significantly more than several times a
  day but not quite continuous. If you indeed have this bug, that should
  stop the lockups from happening. Irrespective, please file a new bug
  report so your hardware may be tracked.

  WORKAROUND: Edit your /etc/default/grub from:
  GRUB_CMDLINE_LINUX_DEFAULT=quiet splash

  to:
  GRUB_CMDLINE_LINUX_DEFAULT=quiet splash i915.semaphores=0

  run the following and reboot:
  sudo update-grub

  The side effects of this is rendering throughput is dropped by 10%
  with SNA, or as much as 3x with UXA. OpenGL performance is likely to
  be reduced by about 30%. More CPU time is spent waiting for the GPU
  with rc6 disabled, so increased power consumption.

  ProblemType: Crash
  DistroRelease: Ubuntu 12.10
  Package: xserver-xorg-video-intel 2:2.20.3-0ubuntu1
  Uname: Linux 3.6.0-rc3-git-20120826.1015 x86_64
  ApportVersion: 2.5.1-0ubuntu2
  Architecture: amd64
  Chipset: sandybridge-m-gt2
  Date: Sun Aug 26 16:06:32 2012
  DistroCodename: quantal
  DistroVariant: ubuntu
  DuplicateSignature: [sandybridge-m-gt2] GPU lockup  IPEHR: 0x0b160001 IPEHR: 
0x0b140001 Ubuntu 12.10
  EcryptfsInUse: Yes
  ExecutablePath: /usr/share/apport/apport-gpu-error-intel.py
  GpuHangFrequency: Continuously
  InstallationMedia: Ubuntu 12.10 Quantal Quetzal - Alpha amd64 (20120724.2)
  InterpreterPath: /usr/bin/python3.2mu
  MachineType: Dell Inc. Dell System XPS L502X
  ProcCmdline: /usr/bin/python3 /usr/share/apport/apport-gpu-error-intel.py
  ProcEnviron:

  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.6.0-rc3-git-20120826.1015 
root=UUID=135c8090-427c-460a-909d-eff262cd44b6 ro quiet splash vt.handoff=7
  RelatedPackageVersions:
   xserver-xorg 1:7.7+1ubuntu3
   libdrm2  2.4.38-0ubuntu2
   xserver-xorg-video-intel 2:2.20.3-0ubuntu1
  SourcePackage: xserver-xorg-video-intel
  Title: [sandybridge-m-gt2] GPU lockup  IPEHR: 0x0b160001 IPEHR: 0x0b140001
  UdevDb: Error: [Errno 2] No such file or directory: 'udevadm'
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups:

  dmi.bios.date: 05/29/2012
  dmi.bios.vendor: Dell Inc.
  dmi.bios.version: A11
  dmi.board.name: 0NJT03
  dmi.board.vendor: Dell Inc.
  dmi.board.version: A00
  dmi.chassis.type: 8
  dmi.chassis.vendor: Dell Inc.
  dmi.chassis.version: 0.1
  dmi.modalias: 
dmi:bvnDellInc.:bvrA11:bd05/29/2012:svnDellInc.:pnDellSystemXPSL502X:pvr:rvnDellInc.:rn0NJT03:rvrA00:cvnDellInc.:ct8:cvr0.1:
  dmi.product.name: Dell System XPS L502X
  dmi.sys.vendor: Dell Inc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/xserver-xorg-video-intel/+bug/1041790/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : 

Re: [Kernel-packages] [Bug 1341195] Re: KVM guests getting slow by time

2014-07-16 Thread Tamas Papp
On 07/16/2014 06:35 PM, Serge Hallyn wrote:


 To be clear, you have not yet gotten the bug since you've set
 KSM_ENABLED to 0, or have you?

I just did it, so no, not yet.

This happened by time:

Saucy (everything is fine) - Trusty (issue happened) - Trusty with 
Saucy kernel 3 weeks ago (no issue) - today with 3 weeks uptime (issue 
happened) - KSM_ENABLED=0 + reboot with Trusty kernel - now

I just want to be clear, that both of us understand the same on this.


 Interesting about the saucy kernel.  Ideally we could reproduce this
 reliably enough to really bisect.

 I wonder if we can reproduce without qemu.


I have a some other servers with LXC with no issue, If there is KVM, 
then issue happens.
Does it really not show up anywhere else?

sysctl.conf:

kernel.printk = 3 4 1 3
net.ipv4.conf.default.rp_filter=1
net.ipv4.conf.all.rp_filter=1
net.ipv4.tcp_syncookies=1
net.ipv4.conf.all.secure_redirects = 1
net.ipv4.conf.all.send_redirects = 0
net.ipv4.conf.all.accept_source_route = 0
net.ipv6.conf.all.accept_source_route = 0
kernel.shmmax=33554432
net.ipv4.tcp_rmem = 4096 16777216 33554432
net.ipv4.tcp_wmem = 4096 16777216 33554432
net.ipv4.tcp_mem = 4096 16777216 33554432
net.core.rmem_default = 16777216
net.core.wmem_default = 16777216
net.core.rmem_max = 16777216
net.core.wmem_max = 16777216
net.core.netdev_max_backlog = 3
net.core.netdev_max_backlog = 3
net.ipv6.neigh.default.gc_thresh1 = 512
net.ipv6.neigh.default.gc_thresh2 = 2048
net.ipv6.neigh.default.gc_thresh3 = 4096
vm.swappiness = 1

fs.inotify.max_user_watches = 81920
fs.inotify.max_user_instances = 1024

May that be important?


tamas

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1341195

Title:
  KVM guests getting slow by time

Status in “linux” package in Ubuntu:
  Incomplete
Status in “qemu” package in Ubuntu:
  Incomplete

Bug description:
  There is a post with very similar symptoms on serverfault:

  http://serverfault.com/questions/609881/windows-server-2012-on-kvm-on-
  ubuntu-14-04-runs-well-for-a-while-and-then-slows/612084#612084

  
  Basically all kind of KVM guests are getting slow by time, both windows or 
linux. The more running guests, it happens sooner.
  Switching back to Saucy kernel is a good workaround.

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: qemu-kvm 2.0.0+dfsg-2ubuntu1.1
  ProcVersionSignature: Ubuntu 3.13.0-29.53-generic 3.13.11.2
  Uname: Linux 3.13.0-29-generic x86_64
  NonfreeKernelModules: zfs zunicode zavl zcommon znvpair
  ApportVersion: 2.14.1-0ubuntu3.2
  Architecture: amd64
  Date: Sat Jul 12 22:18:49 2014
  SourcePackage: qemu
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1341195/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1338706] Re: Samsung SSD 840 failed to get NCQ Send/Recv Log Emask 0x1 failed to set xfermode (err_mask=0x40) on Trusty with upstream kernel

2014-07-16 Thread Augusto Bortoluzzi
** Summary changed:

- Samsung SSD 840 Series failed to set xfermode (err_mask=0x40) on Trusty with 
upstream kernel
+ Samsung SSD 840 failed to get NCQ Send/Recv Log Emask 0x1 failed to set 
xfermode (err_mask=0x40) on Trusty with upstream kernel

** Summary changed:

- Samsung SSD 840 failed to get NCQ Send/Recv Log Emask 0x1 failed to set 
xfermode (err_mask=0x40) on Trusty with upstream kernel
+ Samsung SSD 840 failed to get NCQ Send/Recv Log Emask 0x1 failed to set 
xfermode (err_mask=0x40) on upstream kernels = 3.12

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1338706

Title:
  Samsung SSD 840 failed to get NCQ Send/Recv Log Emask 0x1 failed to
  set xfermode (err_mask=0x40) on upstream kernels = 3.12

Status in “linux” package in Ubuntu:
  Triaged

Bug description:
  Samsung SSD 840 Series failed to get NCQ Send/Recv Log Emask 0x1.

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.13.0-30-generic 3.13.0-30.55
  ProcVersionSignature: Ubuntu 3.13.0-30.55-generic 3.13.11.2
  Uname: Linux 3.13.0-30-generic x86_64
  ApportVersion: 2.14.1-0ubuntu3.2
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  user   2131 F pulseaudio
  CurrentDesktop: Unity
  Date: Mon Jul  7 20:01:28 2014
  HibernationDevice: RESUME=UUID=685afcb7-7aa6-4048-af15-091d3bcd3b35
  InstallationDate: Installed on 2014-06-22 (14 days ago)
  InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Release amd64 (20140417)
  IwConfig:
   eth0  no wireless extensions.

   lono wireless extensions.
  MachineType: System manufacturer System Product Name
  ProcFB: 0 nouveaufb
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.13.0-30-generic 
root=UUID=d7c2e1cb-d046-460c-83b8-0cfbb330d095 ro quiet splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-3.13.0-30-generic N/A
   linux-backports-modules-3.13.0-30-generic  N/A
   linux-firmware 1.127.4
  RfKill:

  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 09/10/2010
  dmi.bios.vendor: American Megatrends Inc.
  dmi.bios.version: 0901
  dmi.board.asset.tag: To Be Filled By O.E.M.
  dmi.board.name: M3N78-EM
  dmi.board.vendor: ASUSTeK Computer INC.
  dmi.board.version: Rev X.0x
  dmi.chassis.asset.tag: Asset-1234567890
  dmi.chassis.type: 3
  dmi.chassis.vendor: Chassis Manufacture
  dmi.chassis.version: Chassis Version
  dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvr0901:bd09/10/2010:svnSystemmanufacturer:pnSystemProductName:pvrSystemVersion:rvnASUSTeKComputerINC.:rnM3N78-EM:rvrRevX.0x:cvnChassisManufacture:ct3:cvrChassisVersion:
  dmi.product.name: System Product Name
  dmi.product.version: System Version
  dmi.sys.vendor: System manufacturer

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1338706/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1338946] Re: linux: 2.6.32-64.128 -proposed tracker

2014-07-16 Thread Luis Henriques
** Summary changed:

- linux: 2.6.32-64.127 -proposed tracker
+ linux: 2.6.32-64.128 -proposed tracker

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1338946

Title:
  linux: 2.6.32-64.128 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Confirmed
Status in Kernel SRU Workflow package-testing series:
  Fix Released
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-lbm series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-ports-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  In Progress
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in “linux” package in Ubuntu:
  Invalid
Status in “linux” source package in Lucid:
  New

Bug description:
  This bug is for tracking the 2.6.32-64.127 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 08. July 2014 08:49 UTC
  kernel-stable-Prepare-package-end:Tuesday, 08. July 2014 17:10 UTC
  kernel-stable-Promote-to-proposed-start:Tuesday, 08. July 2014 17:10 UTC
  ppa-package-testing-start:Tuesday, 08. July 2014 17:10 UTC
  kernel-stable-Promote-to-proposed-end:Wednesday, 09. July 2014 16:05 UTC
  kernel-stable-Verification-testing-start:Wednesday, 09. July 2014 18:04 UTC
  kernel-stable-Certification-testing-start:Wednesday, 09. July 2014 18:05 UTC
  kernel-stable-Security-signoff-start:Wednesday, 09. July 2014 18:06 UTC
  kernel-stable-Regression-testing-start:Wednesday, 09. July 2014 18:06 UTC
  kernel-stable-Regression-testing-end:Saturday, 12. July 2014 16:02 UTC
  kernel-stable-phase:Testing
  kernel-stable-phase-changed:Monday, 14. July 2014 13:05 UTC
  kernel-stable-Verification-testing-end:Monday, 14. July 2014 13:05 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1338946/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1338870] Re: linux-armadaxp: 3.2.0-1636.53 -proposed tracker

2014-07-16 Thread Luis Henriques
** Summary changed:

- linux-armadaxp: 3.2.0-1636.52 -proposed tracker
+ linux-armadaxp: 3.2.0-1636.53 -proposed tracker

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1338870

Title:
  linux-armadaxp: 3.2.0-1636.53 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow package-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow upload-to-ppa series:
  Invalid
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in “linux-armadaxp” package in Ubuntu:
  Invalid
Status in “linux-armadaxp” source package in Precise:
  In Progress

Bug description:
  This bug is for tracking the 3.2.0-1636.52 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 08. July 2014 04:06 UTC
  kernel-stable-master-bug:1338654
  kernel-stable-Certification-testing-end:Wednesday, 09. July 2014 07:05 UTC
  kernel-stable-Security-signoff-end:Wednesday, 09. July 2014 07:05 UTC
  kernel-stable-Prepare-package-end:Wednesday, 09. July 2014 11:04 UTC
  kernel-stable-Promote-to-proposed-start:Wednesday, 09. July 2014 11:04 UTC
  ppa-package-testing-start:Wednesday, 09. July 2014 11:04 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 10. July 2014 08:09 UTC
  kernel-stable-phase:Verification  Testing
  kernel-stable-phase-changed:Thursday, 10. July 2014 09:47 UTC
  kernel-stable-Verification-testing-start:Thursday, 10. July 2014 09:47 UTC
  kernel-stable-Regression-testing-start:Thursday, 10. July 2014 09:47 UTC
  kernel-stable-Regression-testing-end:Saturday, 12. July 2014 15:04 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1338870/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1338654] Re: linux: 3.2.0-67.101 -proposed tracker

2014-07-16 Thread Luis Henriques
** Summary changed:

- linux: 3.2.0-67.100 -proposed tracker
+ linux: 3.2.0-67.101 -proposed tracker

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1338654

Title:
  linux: 3.2.0-67.101 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Confirmed
Status in Kernel SRU Workflow package-testing series:
  Fix Released
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-lbm series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  In Progress
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in “linux” package in Ubuntu:
  Invalid
Status in “linux” source package in Precise:
  Confirmed

Bug description:
  This bug is for tracking the 3.2.0-67.100 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Monday, 07. July 2014 16:11 UTC
  kernel-stable-Prepare-package-end:Tuesday, 08. July 2014 04:12 UTC
  kernel-stable-Promote-to-proposed-start:Tuesday, 08. July 2014 04:12 UTC
  ppa-package-testing-start:Tuesday, 08. July 2014 04:12 UTC
  kernel-stable-Promote-to-proposed-end:Wednesday, 09. July 2014 22:01 UTC
  kernel-stable-Verification-testing-start:Wednesday, 09. July 2014 23:01 UTC
  kernel-stable-Certification-testing-start:Wednesday, 09. July 2014 23:01 UTC
  kernel-stable-Security-signoff-start:Wednesday, 09. July 2014 23:01 UTC
  kernel-stable-Regression-testing-start:Wednesday, 09. July 2014 23:01 UTC
  kernel-stable-Regression-testing-end:Friday, 11. July 2014 22:03 UTC
  kernel-stable-phase:Testing
  kernel-stable-phase-changed:Monday, 14. July 2014 13:04 UTC
  kernel-stable-Verification-testing-end:Monday, 14. July 2014 13:04 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1338654/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1336143] Re: linux-ti-omap4: 3.2.0-1451.71 -proposed tracker

2014-07-16 Thread Luis Henriques
** Summary changed:

- linux-ti-omap4: 3.2.0-1451.70 -proposed tracker
+ linux-ti-omap4: 3.2.0-1451.71 -proposed tracker

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-ti-omap4 in Ubuntu.
https://bugs.launchpad.net/bugs/1336143

Title:
  linux-ti-omap4: 3.2.0-1451.71 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow package-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  In Progress
Status in Kernel SRU Workflow upload-to-ppa series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  In Progress
Status in “linux-ti-omap4” package in Ubuntu:
  Invalid
Status in “linux-ti-omap4” source package in Precise:
  New

Bug description:
  This bug is for tracking the version to be filled upload package.
  This bug will contain status and testing results related to that
  upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 01. July 2014 04:53 UTC
  kernel-stable-master-bug:1338654
  kernel-stable-Certification-testing-end:Thursday, 03. July 2014 01:55 UTC
  kernel-stable-Prepare-package-end:Wednesday, 09. July 2014 17:00 UTC
  kernel-stable-Promote-to-proposed-start:Wednesday, 09. July 2014 17:00 UTC
  ppa-package-testing-start:Wednesday, 09. July 2014 17:00 UTC
  kernel-stable-Promote-to-proposed-end:Friday, 11. July 2014 16:17 UTC
  kernel-stable-phase:Verification  Testing
  kernel-stable-phase-changed:Friday, 11. July 2014 18:01 UTC
  kernel-stable-Security-signoff-start:Friday, 11. July 2014 18:01 UTC
  kernel-stable-Verification-testing-start:Friday, 11. July 2014 18:01 UTC
  kernel-stable-Regression-testing-start:Friday, 11. July 2014 18:01 UTC
  kernel-stable-Regression-testing-end:Tuesday, 15. July 2014 16:00 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1336143/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1338556] Re: linux: 3.11.0-26.45 -proposed tracker

2014-07-16 Thread Luis Henriques
** Summary changed:

- linux: 3.11.0-26.44 -proposed tracker
+ linux: 3.11.0-26.45 -proposed tracker

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1338556

Title:
  linux: 3.11.0-26.45 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Confirmed
Status in Kernel SRU Workflow package-testing series:
  Fix Released
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  In Progress
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in “linux” package in Ubuntu:
  Invalid
Status in “linux” source package in Saucy:
  New

Bug description:
  This bug is for tracking the 3.11.0-26.44 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Monday, 07. July 2014 12:18 UTC
  kernel-stable-Prepare-package-end:Monday, 07. July 2014 20:10 UTC
  kernel-stable-Promote-to-proposed-start:Monday, 07. July 2014 20:10 UTC
  ppa-package-testing-start:Monday, 07. July 2014 20:10 UTC
  kernel-stable-Promote-to-proposed-end:Wednesday, 09. July 2014 14:36 UTC
  kernel-stable-Verification-testing-start:Wednesday, 09. July 2014 16:02 UTC
  kernel-stable-Certification-testing-start:Wednesday, 09. July 2014 16:02 UTC
  kernel-stable-Security-signoff-start:Wednesday, 09. July 2014 16:03 UTC
  kernel-stable-Regression-testing-start:Wednesday, 09. July 2014 16:03 UTC
  kernel-stable-Regression-testing-end:Thursday, 10. July 2014 05:01 UTC
  kernel-stable-phase:Testing
  kernel-stable-phase-changed:Monday, 14. July 2014 13:01 UTC
  kernel-stable-Verification-testing-end:Monday, 14. July 2014 13:01 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1338556/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1338524] Re: linux: 3.13.0-32.57 -proposed tracker

2014-07-16 Thread Luis Henriques
** Summary changed:

- linux: 3.13.0-32.56 -proposed tracker
+ linux: 3.13.0-32.57 -proposed tracker

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1338524

Title:
  linux: 3.13.0-32.57 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Confirmed
Status in Kernel SRU Workflow package-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  In Progress
Status in Kernel SRU Workflow verification-testing series:
  In Progress
Status in “linux” package in Ubuntu:
  Invalid
Status in “linux” source package in Trusty:
  New

Bug description:
  This bug is for tracking the 3.13.0-32.56 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Monday, 07. July 2014 10:33 UTC
  kernel-stable-Prepare-package-end:Monday, 07. July 2014 18:08 UTC
  kernel-stable-Promote-to-proposed-start:Monday, 07. July 2014 18:08 UTC
  ppa-package-testing-start:Monday, 07. July 2014 18:08 UTC
  kernel-stable-Promote-to-proposed-end:Wednesday, 09. July 2014 13:57 UTC
  kernel-stable-phase:Verification  Testing
  kernel-stable-phase-changed:Wednesday, 09. July 2014 15:01 UTC
  kernel-stable-Verification-testing-start:Wednesday, 09. July 2014 15:01 UTC
  kernel-stable-Certification-testing-start:Wednesday, 09. July 2014 15:01 UTC
  kernel-stable-Security-signoff-start:Wednesday, 09. July 2014 15:01 UTC
  kernel-stable-Regression-testing-start:Wednesday, 09. July 2014 15:01 UTC
  kernel-stable-Regression-testing-end:Wednesday, 09. July 2014 22:00 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1338524/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1336143] Re: linux-ti-omap4: 3.2.0-1451.71 -proposed tracker

2014-07-16 Thread John Johansen
** Changed in: kernel-sru-workflow/security-signoff
   Status: Confirmed = In Progress

** Changed in: kernel-sru-workflow/security-signoff
 Assignee: Canonical Security Team (canonical-security) = John Johansen 
(jjohansen)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-ti-omap4 in Ubuntu.
https://bugs.launchpad.net/bugs/1336143

Title:
  linux-ti-omap4: 3.2.0-1451.71 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow package-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  In Progress
Status in Kernel SRU Workflow upload-to-ppa series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  In Progress
Status in “linux-ti-omap4” package in Ubuntu:
  Invalid
Status in “linux-ti-omap4” source package in Precise:
  New

Bug description:
  This bug is for tracking the version to be filled upload package.
  This bug will contain status and testing results related to that
  upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 01. July 2014 04:53 UTC
  kernel-stable-master-bug:1338654
  kernel-stable-Certification-testing-end:Thursday, 03. July 2014 01:55 UTC
  kernel-stable-Prepare-package-end:Wednesday, 09. July 2014 17:00 UTC
  kernel-stable-Promote-to-proposed-start:Wednesday, 09. July 2014 17:00 UTC
  ppa-package-testing-start:Wednesday, 09. July 2014 17:00 UTC
  kernel-stable-Promote-to-proposed-end:Friday, 11. July 2014 16:17 UTC
  kernel-stable-phase:Verification  Testing
  kernel-stable-phase-changed:Friday, 11. July 2014 18:01 UTC
  kernel-stable-Security-signoff-start:Friday, 11. July 2014 18:01 UTC
  kernel-stable-Verification-testing-start:Friday, 11. July 2014 18:01 UTC
  kernel-stable-Regression-testing-start:Friday, 11. July 2014 18:01 UTC
  kernel-stable-Regression-testing-end:Tuesday, 15. July 2014 16:00 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1336143/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1338946] Re: linux: 2.6.32-64.128 -proposed tracker

2014-07-16 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 2.6.32-64.128

---
linux (2.6.32-64.128) lucid; urgency=low

  [ Upstream Kernel Changes ]

  * l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943

linux (2.6.32-64.127) lucid; urgency=low

  [ Luis Henriques ]

  * Merged back Ubuntu-2.6.32-62.126 security release
  * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699)
- LP: #1337339
  * Release Tracking Bug
- LP: #1338946

  [ Upstream Kernel Changes ]

  * ptrace,x86: force IRET path after a ptrace_stop()
- LP: #1337339
- CVE-2014-4699

linux (2.6.32-63.126) lucid; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1335875

  [ Upstream Kernel Changes ]

  * net: check net.core.somaxconn sysctl values
- LP: #1321293
  * sysctl net: Keep tcp_syn_retries inside the boundary
- LP: #1321293
  * ethtool: Report link-down while interface is down
- LP: #1335049
  * futex: Prevent attaching to kernel threads
- LP: #1335049
  * auditsc: audit_krule mask accesses need bounds checking
- LP: #1335049
  * net: fix regression introduced in 2.6.32.62 by sysctl fixes
- LP: #1335049
  * Linux 2.6.32.63
- LP: #1335049
  * lib/lzo: Rename lzo1x_decompress.c to lzo1x_decompress_safe.c
- LP: #1335313
- CVE-2014-4608
  * lib/lzo: Update LZO compression to current upstream version
- LP: #1335313
- CVE-2014-4608
  * lzo: properly check for overruns
- LP: #1335313
- CVE-2014-4608
 -- Luis Henriques luis.henriq...@canonical.com   Mon, 14 Jul 2014 16:33:33 
+0100

** Changed in: linux (Ubuntu Lucid)
   Status: New = Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-4608

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-4699

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-4943

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1338946

Title:
  linux: 2.6.32-64.128 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Confirmed
Status in Kernel SRU Workflow package-testing series:
  Fix Released
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-lbm series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-ports-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  In Progress
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in “linux” package in Ubuntu:
  Invalid
Status in “linux” source package in Lucid:
  Fix Released

Bug description:
  This bug is for tracking the 2.6.32-64.127 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 08. July 2014 08:49 UTC
  kernel-stable-Prepare-package-end:Tuesday, 08. July 2014 17:10 UTC
  kernel-stable-Promote-to-proposed-start:Tuesday, 08. July 2014 17:10 UTC
  ppa-package-testing-start:Tuesday, 08. July 2014 17:10 UTC
  kernel-stable-Promote-to-proposed-end:Wednesday, 09. July 2014 16:05 UTC
  kernel-stable-Verification-testing-start:Wednesday, 09. July 2014 18:04 UTC
  kernel-stable-Certification-testing-start:Wednesday, 09. July 2014 18:05 UTC
  kernel-stable-Security-signoff-start:Wednesday, 09. July 2014 18:06 UTC
  kernel-stable-Regression-testing-start:Wednesday, 09. July 2014 18:06 UTC
  kernel-stable-Regression-testing-end:Saturday, 12. July 2014 16:02 UTC
  kernel-stable-phase:Testing
  kernel-stable-phase-changed:Monday, 14. July 2014 13:05 UTC
  kernel-stable-Verification-testing-end:Monday, 14. July 2014 13:05 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1338946/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1335049] Re: Lucid update to 2.6.32.63 stable release

2014-07-16 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 2.6.32-64.128

---
linux (2.6.32-64.128) lucid; urgency=low

  [ Upstream Kernel Changes ]

  * l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943

linux (2.6.32-64.127) lucid; urgency=low

  [ Luis Henriques ]

  * Merged back Ubuntu-2.6.32-62.126 security release
  * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699)
- LP: #1337339
  * Release Tracking Bug
- LP: #1338946

  [ Upstream Kernel Changes ]

  * ptrace,x86: force IRET path after a ptrace_stop()
- LP: #1337339
- CVE-2014-4699

linux (2.6.32-63.126) lucid; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1335875

  [ Upstream Kernel Changes ]

  * net: check net.core.somaxconn sysctl values
- LP: #1321293
  * sysctl net: Keep tcp_syn_retries inside the boundary
- LP: #1321293
  * ethtool: Report link-down while interface is down
- LP: #1335049
  * futex: Prevent attaching to kernel threads
- LP: #1335049
  * auditsc: audit_krule mask accesses need bounds checking
- LP: #1335049
  * net: fix regression introduced in 2.6.32.62 by sysctl fixes
- LP: #1335049
  * Linux 2.6.32.63
- LP: #1335049
  * lib/lzo: Rename lzo1x_decompress.c to lzo1x_decompress_safe.c
- LP: #1335313
- CVE-2014-4608
  * lib/lzo: Update LZO compression to current upstream version
- LP: #1335313
- CVE-2014-4608
  * lzo: properly check for overruns
- LP: #1335313
- CVE-2014-4608
 -- Luis Henriques luis.henriq...@canonical.com   Mon, 14 Jul 2014 16:33:33 
+0100

** Changed in: linux (Ubuntu Lucid)
   Status: Fix Committed = Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-4608

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-4699

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-4943

** Changed in: linux (Ubuntu Lucid)
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1335049

Title:
  Lucid update to 2.6.32.63 stable release

Status in “linux” package in Ubuntu:
  New
Status in “linux” source package in Lucid:
  Fix Released

Bug description:
  SRU Justification

  Impact:
     The upstream process for stable tree updates is quite similar
     in scope to the Ubuntu SRU process, e.g., each patch has to
     demonstrably fix a bug, and each patch is vetted by upstream
     by originating either directly from Linus' tree or in a minimally
     backported form of that patch. The 2.6.32.63 upstream stable
     patch set is now available. It should be included in the Ubuntu
     kernel as well.

     git://git.kernel.org/

  TEST CASE: TBD

     The following patches are in the 2.6.32.63 stable release:

  Linux 2.6.32.63
  net: fix regression introduced in 2.6.32.62 by sysctl fixes
  auditsc: audit_krule mask accesses need bounds checking
  futex: Prevent attaching to kernel threads
  ethtool: Report link-down while interface is down

  The following patches from 2.6.32.63 were not applied as they were
  already present in the Lucid kernel:

  futex: Make lookup_pi_state more robust
  futex: Always cleanup owner tid in unlock_pi
  futex: Validate atomic acquisition in futex_lock_pi_atomic()
  futex-prevent-requeue-pi-on-same-futex.patch futex: Forbid uaddr == uaddr2 in 
futex_requeue(..., requeue_pi=1)

  The following patch from 2.6.32.63 was dropped as one of futex patches
  in Lucid seem to implement a slightly different security fix that
  prevents it from being applied:

  futex: Add another early deadlock detection check

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1335049/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1335049] Re: Lucid update to 2.6.32.63 stable release

2014-07-16 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 2.6.32-64.128

---
linux (2.6.32-64.128) lucid; urgency=low

  [ Upstream Kernel Changes ]

  * l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943

linux (2.6.32-64.127) lucid; urgency=low

  [ Luis Henriques ]

  * Merged back Ubuntu-2.6.32-62.126 security release
  * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699)
- LP: #1337339
  * Release Tracking Bug
- LP: #1338946

  [ Upstream Kernel Changes ]

  * ptrace,x86: force IRET path after a ptrace_stop()
- LP: #1337339
- CVE-2014-4699

linux (2.6.32-63.126) lucid; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1335875

  [ Upstream Kernel Changes ]

  * net: check net.core.somaxconn sysctl values
- LP: #1321293
  * sysctl net: Keep tcp_syn_retries inside the boundary
- LP: #1321293
  * ethtool: Report link-down while interface is down
- LP: #1335049
  * futex: Prevent attaching to kernel threads
- LP: #1335049
  * auditsc: audit_krule mask accesses need bounds checking
- LP: #1335049
  * net: fix regression introduced in 2.6.32.62 by sysctl fixes
- LP: #1335049
  * Linux 2.6.32.63
- LP: #1335049
  * lib/lzo: Rename lzo1x_decompress.c to lzo1x_decompress_safe.c
- LP: #1335313
- CVE-2014-4608
  * lib/lzo: Update LZO compression to current upstream version
- LP: #1335313
- CVE-2014-4608
  * lzo: properly check for overruns
- LP: #1335313
- CVE-2014-4608
 -- Luis Henriques luis.henriq...@canonical.com   Mon, 14 Jul 2014 16:33:33 
+0100

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1335049

Title:
  Lucid update to 2.6.32.63 stable release

Status in “linux” package in Ubuntu:
  New
Status in “linux” source package in Lucid:
  Fix Released

Bug description:
  SRU Justification

  Impact:
     The upstream process for stable tree updates is quite similar
     in scope to the Ubuntu SRU process, e.g., each patch has to
     demonstrably fix a bug, and each patch is vetted by upstream
     by originating either directly from Linus' tree or in a minimally
     backported form of that patch. The 2.6.32.63 upstream stable
     patch set is now available. It should be included in the Ubuntu
     kernel as well.

     git://git.kernel.org/

  TEST CASE: TBD

     The following patches are in the 2.6.32.63 stable release:

  Linux 2.6.32.63
  net: fix regression introduced in 2.6.32.62 by sysctl fixes
  auditsc: audit_krule mask accesses need bounds checking
  futex: Prevent attaching to kernel threads
  ethtool: Report link-down while interface is down

  The following patches from 2.6.32.63 were not applied as they were
  already present in the Lucid kernel:

  futex: Make lookup_pi_state more robust
  futex: Always cleanup owner tid in unlock_pi
  futex: Validate atomic acquisition in futex_lock_pi_atomic()
  futex-prevent-requeue-pi-on-same-futex.patch futex: Forbid uaddr == uaddr2 in 
futex_requeue(..., requeue_pi=1)

  The following patch from 2.6.32.63 was dropped as one of futex patches
  in Lucid seem to implement a slightly different security fix that
  prevents it from being applied:

  futex: Add another early deadlock detection check

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1335049/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1335875] Re: linux: 2.6.32-63.126 -proposed tracker

2014-07-16 Thread Launchpad Bug Tracker
*** This bug is a duplicate of bug 1338946 ***
https://bugs.launchpad.net/bugs/1338946

This bug was fixed in the package linux - 2.6.32-64.128

---
linux (2.6.32-64.128) lucid; urgency=low

  [ Upstream Kernel Changes ]

  * l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943

linux (2.6.32-64.127) lucid; urgency=low

  [ Luis Henriques ]

  * Merged back Ubuntu-2.6.32-62.126 security release
  * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699)
- LP: #1337339
  * Release Tracking Bug
- LP: #1338946

  [ Upstream Kernel Changes ]

  * ptrace,x86: force IRET path after a ptrace_stop()
- LP: #1337339
- CVE-2014-4699

linux (2.6.32-63.126) lucid; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1335875

  [ Upstream Kernel Changes ]

  * net: check net.core.somaxconn sysctl values
- LP: #1321293
  * sysctl net: Keep tcp_syn_retries inside the boundary
- LP: #1321293
  * ethtool: Report link-down while interface is down
- LP: #1335049
  * futex: Prevent attaching to kernel threads
- LP: #1335049
  * auditsc: audit_krule mask accesses need bounds checking
- LP: #1335049
  * net: fix regression introduced in 2.6.32.62 by sysctl fixes
- LP: #1335049
  * Linux 2.6.32.63
- LP: #1335049
  * lib/lzo: Rename lzo1x_decompress.c to lzo1x_decompress_safe.c
- LP: #1335313
- CVE-2014-4608
  * lib/lzo: Update LZO compression to current upstream version
- LP: #1335313
- CVE-2014-4608
  * lzo: properly check for overruns
- LP: #1335313
- CVE-2014-4608
 -- Luis Henriques luis.henriq...@canonical.com   Mon, 14 Jul 2014 16:33:33 
+0100

** Changed in: linux (Ubuntu Lucid)
   Status: New = Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-4608

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-4699

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-4943

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1335875

Title:
  linux: 2.6.32-63.126 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Confirmed
Status in Kernel SRU Workflow package-testing series:
  In Progress
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-lbm series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-ports-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  In Progress
Status in Kernel SRU Workflow security-signoff series:
  In Progress
Status in Kernel SRU Workflow verification-testing series:
  In Progress
Status in “linux” package in Ubuntu:
  Invalid
Status in “linux” source package in Lucid:
  Fix Released

Bug description:
  This bug is for tracking the 2.6.32-63.126 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Monday, 30. June 2014 14:25 UTC
  kernel-stable-Prepare-package-end:Tuesday, 01. July 2014 04:52 UTC
  kernel-stable-Promote-to-proposed-start:Tuesday, 01. July 2014 04:52 UTC
  kernel-stable-Promote-to-proposed-end:Wednesday, 02. July 2014 00:23 UTC
  kernel-stable-phase:Verification  Testing
  kernel-stable-phase-changed:Wednesday, 02. July 2014 01:37 UTC
  kernel-stable-Verification-testing-start:Wednesday, 02. July 2014 01:37 UTC
  kernel-stable-Certification-testing-start:Wednesday, 02. July 2014 01:37 UTC
  kernel-stable-Security-signoff-start:Wednesday, 02. July 2014 01:37 UTC
  kernel-stable-Regression-testing-start:Wednesday, 02. July 2014 01:37 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1335875/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


Re: [Kernel-packages] [Bug 1341195] Re: KVM guests getting slow by time

2014-07-16 Thread Serge Hallyn
Quoting Tamas Papp (1341...@bugs.launchpad.net):
 On 07/16/2014 06:35 PM, Serge Hallyn wrote:
 
 
  To be clear, you have not yet gotten the bug since you've set
  KSM_ENABLED to 0, or have you?
 
 I just did it, so no, not yet.
 
 This happened by time:
 
 Saucy (everything is fine) - Trusty (issue happened) - Trusty with 
 Saucy kernel 3 weeks ago (no issue) - today with 3 weeks uptime (issue 
 happened) - KSM_ENABLED=0 + reboot with Trusty kernel - now
 
 I just want to be clear, that both of us understand the same on this.
 
 
  Interesting about the saucy kernel.  Ideally we could reproduce this
  reliably enough to really bisect.
 
  I wonder if we can reproduce without qemu.
 
 
 I have a some other servers with LXC with no issue, If there is KVM, 
 then issue happens.
 Does it really not show up anywhere else?

I've personally not seen it, and noone on my team, who use a lot of
kvm instances, has seen it.  Our two current theories are that (a) it
has to do with ksm page migration across numa-nodes, or (b) it has to
do with a race with transparent hugepages versus ksm.  For (b) there is
already a commit in Linus' tree (f72e7dcd).  For (a), you can probably
test by setting /sys/kernel/mm/ksm/merge_across_nodes to 0.  (We are
trying these as well, but as the testcases are not 100% positive
it'd be good to have you try as well)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1341195

Title:
  KVM guests getting slow by time

Status in “linux” package in Ubuntu:
  Incomplete
Status in “qemu” package in Ubuntu:
  Incomplete

Bug description:
  There is a post with very similar symptoms on serverfault:

  http://serverfault.com/questions/609881/windows-server-2012-on-kvm-on-
  ubuntu-14-04-runs-well-for-a-while-and-then-slows/612084#612084

  
  Basically all kind of KVM guests are getting slow by time, both windows or 
linux. The more running guests, it happens sooner.
  Switching back to Saucy kernel is a good workaround.

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: qemu-kvm 2.0.0+dfsg-2ubuntu1.1
  ProcVersionSignature: Ubuntu 3.13.0-29.53-generic 3.13.11.2
  Uname: Linux 3.13.0-29-generic x86_64
  NonfreeKernelModules: zfs zunicode zavl zcommon znvpair
  ApportVersion: 2.14.1-0ubuntu3.2
  Architecture: amd64
  Date: Sat Jul 12 22:18:49 2014
  SourcePackage: qemu
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1341195/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1335313] Re: CVE-2014-4608

2014-07-16 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 2.6.32-64.128

---
linux (2.6.32-64.128) lucid; urgency=low

  [ Upstream Kernel Changes ]

  * l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943

linux (2.6.32-64.127) lucid; urgency=low

  [ Luis Henriques ]

  * Merged back Ubuntu-2.6.32-62.126 security release
  * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699)
- LP: #1337339
  * Release Tracking Bug
- LP: #1338946

  [ Upstream Kernel Changes ]

  * ptrace,x86: force IRET path after a ptrace_stop()
- LP: #1337339
- CVE-2014-4699

linux (2.6.32-63.126) lucid; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1335875

  [ Upstream Kernel Changes ]

  * net: check net.core.somaxconn sysctl values
- LP: #1321293
  * sysctl net: Keep tcp_syn_retries inside the boundary
- LP: #1321293
  * ethtool: Report link-down while interface is down
- LP: #1335049
  * futex: Prevent attaching to kernel threads
- LP: #1335049
  * auditsc: audit_krule mask accesses need bounds checking
- LP: #1335049
  * net: fix regression introduced in 2.6.32.62 by sysctl fixes
- LP: #1335049
  * Linux 2.6.32.63
- LP: #1335049
  * lib/lzo: Rename lzo1x_decompress.c to lzo1x_decompress_safe.c
- LP: #1335313
- CVE-2014-4608
  * lib/lzo: Update LZO compression to current upstream version
- LP: #1335313
- CVE-2014-4608
  * lzo: properly check for overruns
- LP: #1335313
- CVE-2014-4608
 -- Luis Henriques luis.henriq...@canonical.com   Mon, 14 Jul 2014 16:33:33 
+0100

** Changed in: linux (Ubuntu Lucid)
   Status: Fix Committed = Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-4699

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-4943

** Changed in: linux-ec2 (Ubuntu Lucid)
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1335313

Title:
  CVE-2014-4608

Status in “linux” package in Ubuntu:
  Fix Committed
Status in “linux-armadaxp” package in Ubuntu:
  Invalid
Status in “linux-ec2” package in Ubuntu:
  Invalid
Status in “linux-fsl-imx51” package in Ubuntu:
  Invalid
Status in “linux-lts-backport-maverick” package in Ubuntu:
  New
Status in “linux-lts-backport-natty” package in Ubuntu:
  New
Status in “linux-lts-quantal” package in Ubuntu:
  Invalid
Status in “linux-lts-raring” package in Ubuntu:
  Invalid
Status in “linux-lts-saucy” package in Ubuntu:
  Invalid
Status in “linux-mvl-dove” package in Ubuntu:
  Invalid
Status in “linux-ti-omap4” package in Ubuntu:
  Invalid
Status in “linux” source package in Lucid:
  Fix Released
Status in “linux-armadaxp” source package in Lucid:
  Invalid
Status in “linux-ec2” source package in Lucid:
  Fix Released
Status in “linux-fsl-imx51” source package in Lucid:
  Invalid
Status in “linux-lts-backport-maverick” source package in Lucid:
  New
Status in “linux-lts-backport-natty” source package in Lucid:
  New
Status in “linux-lts-quantal” source package in Lucid:
  Invalid
Status in “linux-lts-raring” source package in Lucid:
  Invalid
Status in “linux-lts-saucy” source package in Lucid:
  Invalid
Status in “linux-mvl-dove” source package in Lucid:
  Invalid
Status in “linux-ti-omap4” source package in Lucid:
  Invalid
Status in “linux” source package in Precise:
  Fix Committed
Status in “linux-armadaxp” source package in Precise:
  Fix Committed
Status in “linux-ec2” source package in Precise:
  Invalid
Status in “linux-fsl-imx51” source package in Precise:
  Invalid
Status in “linux-lts-backport-maverick” source package in Precise:
  New
Status in “linux-lts-backport-natty” source package in Precise:
  New
Status in “linux-lts-quantal” source package in Precise:
  Fix Committed
Status in “linux-lts-raring” source package in Precise:
  Fix Committed
Status in “linux-lts-saucy” source package in Precise:
  Fix Released
Status in “linux-mvl-dove” source package in Precise:
  Invalid
Status in “linux-ti-omap4” source package in Precise:
  New
Status in “linux” source package in Saucy:
  Fix Committed
Status in “linux-armadaxp” source package in Saucy:
  Invalid
Status in “linux-ec2” source package in Saucy:
  Invalid
Status in “linux-fsl-imx51” source package in Saucy:
  Invalid
Status in “linux-lts-backport-maverick” source package in Saucy:
  New
Status in “linux-lts-backport-natty” source package in Saucy:
  New
Status in “linux-lts-quantal” source package in Saucy:
  Invalid
Status in “linux-lts-raring” source package in Saucy:
  Invalid
Status in “linux-lts-saucy” source package in Saucy:
  Invalid
Status in “linux-mvl-dove” source package in Saucy:
  Invalid
Status in “linux-ti-omap4” source package in Saucy:
  New
Status in “linux” source package in Trusty:
  Fix Committed
Status in “linux-armadaxp” source package in Trusty:
 

[Kernel-packages] [Bug 1335313] Re: CVE-2014-4608

2014-07-16 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ec2 - 2.6.32-368.84

---
linux-ec2 (2.6.32-368.84) lucid; urgency=low

  [ Andy Whitcroft ]

  * pull in missing CVE changelog
  * Ubuntu-2.6.32-368.84

  [ Ubuntu: 2.6.32-64.128 ]

  * l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943

linux-ec2 (2.6.32-368.83) lucid; urgency=low

  [ Stefan Bader ]

  * Rebased to Ubuntu-2.6.32-64.127
  * Release Tracking Bug
- LP: #1339215

  [ Ubuntu: 2.6.32-64.127 ]

  * Merged back Ubuntu-2.6.32-62.126 security release
  * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699)
- LP: #1337339
  * ptrace,x86: force IRET path after a ptrace_stop()
- LP: #1337339
- CVE-2014-4699

linux-ec2 (2.6.32-367.82) lucid; urgency=low

  [ Stefan Bader ]

  * Rebased to Ubuntu-2.6.32-63.126
  * Release Tracking Bug
- LP: #1336142

  [ Ubuntu: 2.6.32-63.126 ]

  * net: check net.core.somaxconn sysctl values
- LP: #1321293
  * sysctl net: Keep tcp_syn_retries inside the boundary
- LP: #1321293
  * ethtool: Report link-down while interface is down
- LP: #1335049
  * futex: Prevent attaching to kernel threads
- LP: #1335049
  * auditsc: audit_krule mask accesses need bounds checking
- LP: #1335049
  * net: fix regression introduced in 2.6.32.62 by sysctl fixes
- LP: #1335049
  * Linux 2.6.32.63
- LP: #1335049
  * lib/lzo: Rename lzo1x_decompress.c to lzo1x_decompress_safe.c
- LP: #1335313
- CVE-2014-4608
  * lib/lzo: Update LZO compression to current upstream version
- LP: #1335313
- CVE-2014-4608
  * lzo: properly check for overruns
- LP: #1335313
- CVE-2014-4608
 -- Andy Whitcroft a...@canonical.com   Mon, 14 Jul 2014 17:31:51 +0100

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1335313

Title:
  CVE-2014-4608

Status in “linux” package in Ubuntu:
  Fix Committed
Status in “linux-armadaxp” package in Ubuntu:
  Invalid
Status in “linux-ec2” package in Ubuntu:
  Invalid
Status in “linux-fsl-imx51” package in Ubuntu:
  Invalid
Status in “linux-lts-backport-maverick” package in Ubuntu:
  New
Status in “linux-lts-backport-natty” package in Ubuntu:
  New
Status in “linux-lts-quantal” package in Ubuntu:
  Invalid
Status in “linux-lts-raring” package in Ubuntu:
  Invalid
Status in “linux-lts-saucy” package in Ubuntu:
  Invalid
Status in “linux-mvl-dove” package in Ubuntu:
  Invalid
Status in “linux-ti-omap4” package in Ubuntu:
  Invalid
Status in “linux” source package in Lucid:
  Fix Released
Status in “linux-armadaxp” source package in Lucid:
  Invalid
Status in “linux-ec2” source package in Lucid:
  Fix Released
Status in “linux-fsl-imx51” source package in Lucid:
  Invalid
Status in “linux-lts-backport-maverick” source package in Lucid:
  New
Status in “linux-lts-backport-natty” source package in Lucid:
  New
Status in “linux-lts-quantal” source package in Lucid:
  Invalid
Status in “linux-lts-raring” source package in Lucid:
  Invalid
Status in “linux-lts-saucy” source package in Lucid:
  Invalid
Status in “linux-mvl-dove” source package in Lucid:
  Invalid
Status in “linux-ti-omap4” source package in Lucid:
  Invalid
Status in “linux” source package in Precise:
  Fix Committed
Status in “linux-armadaxp” source package in Precise:
  Fix Committed
Status in “linux-ec2” source package in Precise:
  Invalid
Status in “linux-fsl-imx51” source package in Precise:
  Invalid
Status in “linux-lts-backport-maverick” source package in Precise:
  New
Status in “linux-lts-backport-natty” source package in Precise:
  New
Status in “linux-lts-quantal” source package in Precise:
  Fix Committed
Status in “linux-lts-raring” source package in Precise:
  Fix Committed
Status in “linux-lts-saucy” source package in Precise:
  Fix Released
Status in “linux-mvl-dove” source package in Precise:
  Invalid
Status in “linux-ti-omap4” source package in Precise:
  New
Status in “linux” source package in Saucy:
  Fix Committed
Status in “linux-armadaxp” source package in Saucy:
  Invalid
Status in “linux-ec2” source package in Saucy:
  Invalid
Status in “linux-fsl-imx51” source package in Saucy:
  Invalid
Status in “linux-lts-backport-maverick” source package in Saucy:
  New
Status in “linux-lts-backport-natty” source package in Saucy:
  New
Status in “linux-lts-quantal” source package in Saucy:
  Invalid
Status in “linux-lts-raring” source package in Saucy:
  Invalid
Status in “linux-lts-saucy” source package in Saucy:
  Invalid
Status in “linux-mvl-dove” source package in Saucy:
  Invalid
Status in “linux-ti-omap4” source package in Saucy:
  New
Status in “linux” source package in Trusty:
  Fix Committed
Status in “linux-armadaxp” source package in Trusty:
  Invalid
Status in “linux-ec2” source package in Trusty:
  Invalid
Status in “linux-fsl-imx51” source package in Trusty:
  Invalid
Status in 

[Kernel-packages] [Bug 1338654] Re: linux: 3.2.0-67.101 -proposed tracker

2014-07-16 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.2.0-67.101

---
linux (3.2.0-67.101) precise; urgency=low

  [ Upstream Kernel Changes ]

  * l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943

linux (3.2.0-67.100) precise; urgency=low

  [ Luis Henriques ]

  * Merged back Ubuntu-3.2.0-65.99 security release
  * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699)
- LP: #1337339
  * Release Tracking Bug
- LP: #1338654

  [ Upstream Kernel Changes ]

  * ptrace,x86: force IRET path after a ptrace_stop()
- LP: #1337339
- CVE-2014-4699

linux (3.2.0-66.99) precise; urgency=low

  * Release Tracking Bug
- LP: #1335906

  [ Upstream Kernel Changes ]

  * skbuff: export skb_copy_ubufs
- LP: #1298119
- CVE-2014-0131
  * skbuff: add an api to orphan frags
- LP: #1298119
- CVE-2014-0131
  * skbuff: skb_segment: orphan frags before copying
- LP: #1298119
- CVE-2014-0131
  * lib/lzo: Rename lzo1x_decompress.c to lzo1x_decompress_safe.c
- CVE-2014-4608
  * lib/lzo: Update LZO compression to current upstream version
- CVE-2014-4608
  * lzo: properly check for overruns
- CVE-2014-4608
  * KVM: x86 emulator: add support for vector alignment
- LP: #1330177
  * KVM: x86: emulate movdqa
- LP: #1330177
 -- Luis Henriques luis.henriq...@canonical.com   Mon, 14 Jul 2014 16:07:35 
+0100

** Changed in: linux (Ubuntu Precise)
   Status: Confirmed = Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-0131

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-4608

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-4699

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-4943

** Changed in: linux (Ubuntu Precise)
   Status: Confirmed = Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1338654

Title:
  linux: 3.2.0-67.101 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Confirmed
Status in Kernel SRU Workflow package-testing series:
  Fix Released
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-lbm series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  In Progress
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in “linux” package in Ubuntu:
  Invalid
Status in “linux” source package in Precise:
  Fix Released

Bug description:
  This bug is for tracking the 3.2.0-67.100 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Monday, 07. July 2014 16:11 UTC
  kernel-stable-Prepare-package-end:Tuesday, 08. July 2014 04:12 UTC
  kernel-stable-Promote-to-proposed-start:Tuesday, 08. July 2014 04:12 UTC
  ppa-package-testing-start:Tuesday, 08. July 2014 04:12 UTC
  kernel-stable-Promote-to-proposed-end:Wednesday, 09. July 2014 22:01 UTC
  kernel-stable-Verification-testing-start:Wednesday, 09. July 2014 23:01 UTC
  kernel-stable-Certification-testing-start:Wednesday, 09. July 2014 23:01 UTC
  kernel-stable-Security-signoff-start:Wednesday, 09. July 2014 23:01 UTC
  kernel-stable-Regression-testing-start:Wednesday, 09. July 2014 23:01 UTC
  kernel-stable-Regression-testing-end:Friday, 11. July 2014 22:03 UTC
  kernel-stable-phase:Testing
  kernel-stable-phase-changed:Monday, 14. July 2014 13:04 UTC
  kernel-stable-Verification-testing-end:Monday, 14. July 2014 13:04 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1338654/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1335313] Re: CVE-2014-4608

2014-07-16 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ec2 - 2.6.32-368.84

---
linux-ec2 (2.6.32-368.84) lucid; urgency=low

  [ Andy Whitcroft ]

  * pull in missing CVE changelog
  * Ubuntu-2.6.32-368.84

  [ Ubuntu: 2.6.32-64.128 ]

  * l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943

linux-ec2 (2.6.32-368.83) lucid; urgency=low

  [ Stefan Bader ]

  * Rebased to Ubuntu-2.6.32-64.127
  * Release Tracking Bug
- LP: #1339215

  [ Ubuntu: 2.6.32-64.127 ]

  * Merged back Ubuntu-2.6.32-62.126 security release
  * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699)
- LP: #1337339
  * ptrace,x86: force IRET path after a ptrace_stop()
- LP: #1337339
- CVE-2014-4699

linux-ec2 (2.6.32-367.82) lucid; urgency=low

  [ Stefan Bader ]

  * Rebased to Ubuntu-2.6.32-63.126
  * Release Tracking Bug
- LP: #1336142

  [ Ubuntu: 2.6.32-63.126 ]

  * net: check net.core.somaxconn sysctl values
- LP: #1321293
  * sysctl net: Keep tcp_syn_retries inside the boundary
- LP: #1321293
  * ethtool: Report link-down while interface is down
- LP: #1335049
  * futex: Prevent attaching to kernel threads
- LP: #1335049
  * auditsc: audit_krule mask accesses need bounds checking
- LP: #1335049
  * net: fix regression introduced in 2.6.32.62 by sysctl fixes
- LP: #1335049
  * Linux 2.6.32.63
- LP: #1335049
  * lib/lzo: Rename lzo1x_decompress.c to lzo1x_decompress_safe.c
- LP: #1335313
- CVE-2014-4608
  * lib/lzo: Update LZO compression to current upstream version
- LP: #1335313
- CVE-2014-4608
  * lzo: properly check for overruns
- LP: #1335313
- CVE-2014-4608
 -- Andy Whitcroft a...@canonical.com   Mon, 14 Jul 2014 17:31:51 +0100

** Changed in: linux-ec2 (Ubuntu Lucid)
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1335313

Title:
  CVE-2014-4608

Status in “linux” package in Ubuntu:
  Fix Committed
Status in “linux-armadaxp” package in Ubuntu:
  Invalid
Status in “linux-ec2” package in Ubuntu:
  Invalid
Status in “linux-fsl-imx51” package in Ubuntu:
  Invalid
Status in “linux-lts-backport-maverick” package in Ubuntu:
  New
Status in “linux-lts-backport-natty” package in Ubuntu:
  New
Status in “linux-lts-quantal” package in Ubuntu:
  Invalid
Status in “linux-lts-raring” package in Ubuntu:
  Invalid
Status in “linux-lts-saucy” package in Ubuntu:
  Invalid
Status in “linux-mvl-dove” package in Ubuntu:
  Invalid
Status in “linux-ti-omap4” package in Ubuntu:
  Invalid
Status in “linux” source package in Lucid:
  Fix Released
Status in “linux-armadaxp” source package in Lucid:
  Invalid
Status in “linux-ec2” source package in Lucid:
  Fix Released
Status in “linux-fsl-imx51” source package in Lucid:
  Invalid
Status in “linux-lts-backport-maverick” source package in Lucid:
  New
Status in “linux-lts-backport-natty” source package in Lucid:
  New
Status in “linux-lts-quantal” source package in Lucid:
  Invalid
Status in “linux-lts-raring” source package in Lucid:
  Invalid
Status in “linux-lts-saucy” source package in Lucid:
  Invalid
Status in “linux-mvl-dove” source package in Lucid:
  Invalid
Status in “linux-ti-omap4” source package in Lucid:
  Invalid
Status in “linux” source package in Precise:
  Fix Committed
Status in “linux-armadaxp” source package in Precise:
  Fix Committed
Status in “linux-ec2” source package in Precise:
  Invalid
Status in “linux-fsl-imx51” source package in Precise:
  Invalid
Status in “linux-lts-backport-maverick” source package in Precise:
  New
Status in “linux-lts-backport-natty” source package in Precise:
  New
Status in “linux-lts-quantal” source package in Precise:
  Fix Committed
Status in “linux-lts-raring” source package in Precise:
  Fix Committed
Status in “linux-lts-saucy” source package in Precise:
  Fix Released
Status in “linux-mvl-dove” source package in Precise:
  Invalid
Status in “linux-ti-omap4” source package in Precise:
  New
Status in “linux” source package in Saucy:
  Fix Committed
Status in “linux-armadaxp” source package in Saucy:
  Invalid
Status in “linux-ec2” source package in Saucy:
  Invalid
Status in “linux-fsl-imx51” source package in Saucy:
  Invalid
Status in “linux-lts-backport-maverick” source package in Saucy:
  New
Status in “linux-lts-backport-natty” source package in Saucy:
  New
Status in “linux-lts-quantal” source package in Saucy:
  Invalid
Status in “linux-lts-raring” source package in Saucy:
  Invalid
Status in “linux-lts-saucy” source package in Saucy:
  Invalid
Status in “linux-mvl-dove” source package in Saucy:
  Invalid
Status in “linux-ti-omap4” source package in Saucy:
  New
Status in “linux” source package in Trusty:
  Fix Committed
Status in “linux-armadaxp” source package in Trusty:
  Invalid
Status in “linux-ec2” source package in Trusty:
  Invalid
Status in 

[Kernel-packages] [Bug 1338654] Re: linux: 3.2.0-67.101 -proposed tracker

2014-07-16 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.2.0-67.101

---
linux (3.2.0-67.101) precise; urgency=low

  [ Upstream Kernel Changes ]

  * l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943

linux (3.2.0-67.100) precise; urgency=low

  [ Luis Henriques ]

  * Merged back Ubuntu-3.2.0-65.99 security release
  * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699)
- LP: #1337339
  * Release Tracking Bug
- LP: #1338654

  [ Upstream Kernel Changes ]

  * ptrace,x86: force IRET path after a ptrace_stop()
- LP: #1337339
- CVE-2014-4699

linux (3.2.0-66.99) precise; urgency=low

  * Release Tracking Bug
- LP: #1335906

  [ Upstream Kernel Changes ]

  * skbuff: export skb_copy_ubufs
- LP: #1298119
- CVE-2014-0131
  * skbuff: add an api to orphan frags
- LP: #1298119
- CVE-2014-0131
  * skbuff: skb_segment: orphan frags before copying
- LP: #1298119
- CVE-2014-0131
  * lib/lzo: Rename lzo1x_decompress.c to lzo1x_decompress_safe.c
- CVE-2014-4608
  * lib/lzo: Update LZO compression to current upstream version
- CVE-2014-4608
  * lzo: properly check for overruns
- CVE-2014-4608
  * KVM: x86 emulator: add support for vector alignment
- LP: #1330177
  * KVM: x86: emulate movdqa
- LP: #1330177
 -- Luis Henriques luis.henriq...@canonical.com   Mon, 14 Jul 2014 16:07:35 
+0100

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1338654

Title:
  linux: 3.2.0-67.101 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Confirmed
Status in Kernel SRU Workflow package-testing series:
  Fix Released
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-lbm series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  In Progress
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in “linux” package in Ubuntu:
  Invalid
Status in “linux” source package in Precise:
  Fix Released

Bug description:
  This bug is for tracking the 3.2.0-67.100 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Monday, 07. July 2014 16:11 UTC
  kernel-stable-Prepare-package-end:Tuesday, 08. July 2014 04:12 UTC
  kernel-stable-Promote-to-proposed-start:Tuesday, 08. July 2014 04:12 UTC
  ppa-package-testing-start:Tuesday, 08. July 2014 04:12 UTC
  kernel-stable-Promote-to-proposed-end:Wednesday, 09. July 2014 22:01 UTC
  kernel-stable-Verification-testing-start:Wednesday, 09. July 2014 23:01 UTC
  kernel-stable-Certification-testing-start:Wednesday, 09. July 2014 23:01 UTC
  kernel-stable-Security-signoff-start:Wednesday, 09. July 2014 23:01 UTC
  kernel-stable-Regression-testing-start:Wednesday, 09. July 2014 23:01 UTC
  kernel-stable-Regression-testing-end:Friday, 11. July 2014 22:03 UTC
  kernel-stable-phase:Testing
  kernel-stable-phase-changed:Monday, 14. July 2014 13:04 UTC
  kernel-stable-Verification-testing-end:Monday, 14. July 2014 13:04 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1338654/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1338946] Re: linux: 2.6.32-64.128 -proposed tracker

2014-07-16 Thread Adam Conrad
** Changed in: kernel-sru-workflow/promote-to-security
   Status: New = Fix Released

** Changed in: kernel-sru-workflow/promote-to-security
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Adam Conrad 
(adconrad)

** Changed in: kernel-sru-workflow/promote-to-updates
   Status: New = Fix Released

** Changed in: kernel-sru-workflow/promote-to-updates
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Adam Conrad 
(adconrad)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1338946

Title:
  linux: 2.6.32-64.128 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Confirmed
Status in Kernel SRU Workflow package-testing series:
  Fix Released
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-lbm series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-ports-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Fix Released
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  In Progress
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in “linux” package in Ubuntu:
  Invalid
Status in “linux” source package in Lucid:
  Fix Released

Bug description:
  This bug is for tracking the 2.6.32-64.127 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 08. July 2014 08:49 UTC
  kernel-stable-Prepare-package-end:Tuesday, 08. July 2014 17:10 UTC
  kernel-stable-Promote-to-proposed-start:Tuesday, 08. July 2014 17:10 UTC
  ppa-package-testing-start:Tuesday, 08. July 2014 17:10 UTC
  kernel-stable-Promote-to-proposed-end:Wednesday, 09. July 2014 16:05 UTC
  kernel-stable-Verification-testing-start:Wednesday, 09. July 2014 18:04 UTC
  kernel-stable-Certification-testing-start:Wednesday, 09. July 2014 18:05 UTC
  kernel-stable-Security-signoff-start:Wednesday, 09. July 2014 18:06 UTC
  kernel-stable-Regression-testing-start:Wednesday, 09. July 2014 18:06 UTC
  kernel-stable-Regression-testing-end:Saturday, 12. July 2014 16:02 UTC
  kernel-stable-phase:Testing
  kernel-stable-phase-changed:Monday, 14. July 2014 13:05 UTC
  kernel-stable-Verification-testing-end:Monday, 14. July 2014 13:05 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1338946/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1337339] Re: x86_64, ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699)

2014-07-16 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-armadaxp - 3.2.0-1636.53

---
linux-armadaxp (3.2.0-1636.53) precise; urgency=low

  [ Andy Whitcroft ]

  * rebase to Ubuntu-3.2.0-67.101

  [ Ubuntu: 3.2.0-67.101 ]

  * l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943

linux-armadaxp (3.2.0-1636.52) precise; urgency=low

  [ Ike Panhc ]

  * Release Tracking Bug
- LP: #1338870
  * Rebase to Ubuntu-3.2.0-67.100

  [ Ubuntu: 3.2.0-67.100 ]

  * Merged back Ubuntu-3.2.0-65.99 security release
  * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699)
- LP: #1337339
  * Release Tracking Bug
- LP: #1338654
  * ptrace,x86: force IRET path after a ptrace_stop()
- LP: #1337339
- CVE-2014-4699

linux-armadaxp (3.2.0-1636.51) precise-proposed; urgency=low

  [ Ike Panhc ]

  * Release Tracking Bug
- LP: #1336144
  * Rebase to Ubuntu-3.2.0-66.99

  [ Ubuntu: 3.2.0-66.99 ]

  * Release Tracking Bug
- LP: #1335906
  * skbuff: export skb_copy_ubufs
- LP: #1298119
- CVE-2014-0131
  * skbuff: add an api to orphan frags
- LP: #1298119
- CVE-2014-0131
  * skbuff: skb_segment: orphan frags before copying
- LP: #1298119
- CVE-2014-0131
  * lib/lzo: Rename lzo1x_decompress.c to lzo1x_decompress_safe.c
- CVE-2014-4608
  * lib/lzo: Update LZO compression to current upstream version
- CVE-2014-4608
  * lzo: properly check for overruns
- CVE-2014-4608
  * KVM: x86 emulator: add support for vector alignment
- LP: #1330177
  * KVM: x86: emulate movdqa
- LP: #1330177
 -- Andy Whitcroft a...@canonical.com   Tue, 15 Jul 2014 10:19:39 +0100

** Changed in: linux-armadaxp (Ubuntu)
   Status: New = Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-0131

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-4608

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-4943

** Changed in: linux-ti-omap4 (Ubuntu)
   Status: New = Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1337339

Title:
  x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699)

Status in “linux” package in Ubuntu:
  New
Status in “linux-armadaxp” package in Ubuntu:
  Fix Released
Status in “linux-ec2” package in Ubuntu:
  Fix Released
Status in “linux-fsl-imx51” package in Ubuntu:
  New
Status in “linux-lts-quantal” package in Ubuntu:
  Fix Released
Status in “linux-lts-raring” package in Ubuntu:
  Fix Released
Status in “linux-lts-saucy” package in Ubuntu:
  Fix Released
Status in “linux-mvl-dove” package in Ubuntu:
  New
Status in “linux-ti-omap4” package in Ubuntu:
  Fix Released
Status in “linux” source package in Lucid:
  Fix Released
Status in “linux” source package in Precise:
  Fix Released
Status in “linux” source package in Saucy:
  Fix Released
Status in “linux” source package in Trusty:
  Fix Released
Status in “linux” source package in Utopic:
  New

Bug description:
  The Linux kernel before 3.15.4 on Intel processors does not properly
  restrict use of a non-canonical value for the saved RIP address in the
  case of a system call that does not use IRET, which allows local users
  to leverage a race condition and gain privileges, or cause a denial of
  service (double fault), via a crafted application that makes ptrace
  and fork system calls.

  Break-Fix: 427abfa28afedffadfca9dd8b067eb6d36bac53f
  b9cd18de4db3c9ffa7e17b0dc0ca99ed5aa4d43a

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1337339/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1337339] Re: x86_64, ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699)

2014-07-16 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1451.71

---
linux-ti-omap4 (3.2.0-1451.71) precise; urgency=low

  [ Luis Henriques ]

  * Rebased to 3.2.0-67.101

  [ Ubuntu: 3.2.0-67.101 ]

  * l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943

  [ Ubuntu: 3.2.0-67.100 ]

  * Merged back Ubuntu-3.2.0-65.99 security release
  * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699)
- LP: #1337339
  * Release Tracking Bug
- LP: #1338654
  * ptrace,x86: force IRET path after a ptrace_stop()
- LP: #1337339
- CVE-2014-4699

linux-ti-omap4 (3.2.0-1451.70) precise; urgency=low

  * Release Tracking Bug
- LP: #1336143

  [ Paolo Pisati ]

  * rebased on Ubuntu-3.2.0-66.99

  [ Ubuntu: 3.2.0-66.99 ]

  * Release Tracking Bug
- LP: #1335906
  * skbuff: export skb_copy_ubufs
- LP: #1298119
- CVE-2014-0131
  * skbuff: add an api to orphan frags
- LP: #1298119
- CVE-2014-0131
  * skbuff: skb_segment: orphan frags before copying
- LP: #1298119
- CVE-2014-0131
  * lib/lzo: Rename lzo1x_decompress.c to lzo1x_decompress_safe.c
- CVE-2014-4608
  * lib/lzo: Update LZO compression to current upstream version
- CVE-2014-4608
  * lzo: properly check for overruns
- CVE-2014-4608
  * KVM: x86 emulator: add support for vector alignment
- LP: #1330177
  * KVM: x86: emulate movdqa
- LP: #1330177
 -- Luis Henriques luis.henriq...@canonical.com   Tue, 15 Jul 2014 10:12:30 
+0100

** Changed in: linux-ti-omap4 (Ubuntu)
   Status: New = Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1337339

Title:
  x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699)

Status in “linux” package in Ubuntu:
  New
Status in “linux-armadaxp” package in Ubuntu:
  Fix Released
Status in “linux-ec2” package in Ubuntu:
  Fix Released
Status in “linux-fsl-imx51” package in Ubuntu:
  New
Status in “linux-lts-quantal” package in Ubuntu:
  Fix Released
Status in “linux-lts-raring” package in Ubuntu:
  Fix Released
Status in “linux-lts-saucy” package in Ubuntu:
  Fix Released
Status in “linux-mvl-dove” package in Ubuntu:
  New
Status in “linux-ti-omap4” package in Ubuntu:
  Fix Released
Status in “linux” source package in Lucid:
  Fix Released
Status in “linux” source package in Precise:
  Fix Released
Status in “linux” source package in Saucy:
  Fix Released
Status in “linux” source package in Trusty:
  Fix Released
Status in “linux” source package in Utopic:
  New

Bug description:
  The Linux kernel before 3.15.4 on Intel processors does not properly
  restrict use of a non-canonical value for the saved RIP address in the
  case of a system call that does not use IRET, which allows local users
  to leverage a race condition and gain privileges, or cause a denial of
  service (double fault), via a crafted application that makes ptrace
  and fork system calls.

  Break-Fix: 427abfa28afedffadfca9dd8b067eb6d36bac53f
  b9cd18de4db3c9ffa7e17b0dc0ca99ed5aa4d43a

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1337339/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1338870] Re: linux-armadaxp: 3.2.0-1636.53 -proposed tracker

2014-07-16 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-armadaxp - 3.2.0-1636.53

---
linux-armadaxp (3.2.0-1636.53) precise; urgency=low

  [ Andy Whitcroft ]

  * rebase to Ubuntu-3.2.0-67.101

  [ Ubuntu: 3.2.0-67.101 ]

  * l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943

linux-armadaxp (3.2.0-1636.52) precise; urgency=low

  [ Ike Panhc ]

  * Release Tracking Bug
- LP: #1338870
  * Rebase to Ubuntu-3.2.0-67.100

  [ Ubuntu: 3.2.0-67.100 ]

  * Merged back Ubuntu-3.2.0-65.99 security release
  * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699)
- LP: #1337339
  * Release Tracking Bug
- LP: #1338654
  * ptrace,x86: force IRET path after a ptrace_stop()
- LP: #1337339
- CVE-2014-4699

linux-armadaxp (3.2.0-1636.51) precise-proposed; urgency=low

  [ Ike Panhc ]

  * Release Tracking Bug
- LP: #1336144
  * Rebase to Ubuntu-3.2.0-66.99

  [ Ubuntu: 3.2.0-66.99 ]

  * Release Tracking Bug
- LP: #1335906
  * skbuff: export skb_copy_ubufs
- LP: #1298119
- CVE-2014-0131
  * skbuff: add an api to orphan frags
- LP: #1298119
- CVE-2014-0131
  * skbuff: skb_segment: orphan frags before copying
- LP: #1298119
- CVE-2014-0131
  * lib/lzo: Rename lzo1x_decompress.c to lzo1x_decompress_safe.c
- CVE-2014-4608
  * lib/lzo: Update LZO compression to current upstream version
- CVE-2014-4608
  * lzo: properly check for overruns
- CVE-2014-4608
  * KVM: x86 emulator: add support for vector alignment
- LP: #1330177
  * KVM: x86: emulate movdqa
- LP: #1330177
 -- Andy Whitcroft a...@canonical.com   Tue, 15 Jul 2014 10:19:39 +0100

** Changed in: linux-armadaxp (Ubuntu Precise)
   Status: In Progress = Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-0131

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-4608

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-4699

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-4943

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1338870

Title:
  linux-armadaxp: 3.2.0-1636.53 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow package-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Fix Released
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow upload-to-ppa series:
  Invalid
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in “linux-armadaxp” package in Ubuntu:
  Invalid
Status in “linux-armadaxp” source package in Precise:
  Fix Released

Bug description:
  This bug is for tracking the 3.2.0-1636.52 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 08. July 2014 04:06 UTC
  kernel-stable-master-bug:1338654
  kernel-stable-Certification-testing-end:Wednesday, 09. July 2014 07:05 UTC
  kernel-stable-Security-signoff-end:Wednesday, 09. July 2014 07:05 UTC
  kernel-stable-Prepare-package-end:Wednesday, 09. July 2014 11:04 UTC
  kernel-stable-Promote-to-proposed-start:Wednesday, 09. July 2014 11:04 UTC
  ppa-package-testing-start:Wednesday, 09. July 2014 11:04 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 10. July 2014 08:09 UTC
  kernel-stable-phase:Verification  Testing
  kernel-stable-phase-changed:Thursday, 10. July 2014 09:47 UTC
  kernel-stable-Verification-testing-start:Thursday, 10. July 2014 09:47 UTC
  kernel-stable-Regression-testing-start:Thursday, 10. July 2014 09:47 UTC
  kernel-stable-Regression-testing-end:Saturday, 12. July 2014 15:04 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1338870/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1336144] Re: linux-armadaxp: 3.2.0-1636.51 -proposed tracker

2014-07-16 Thread Launchpad Bug Tracker
*** This bug is a duplicate of bug 1338870 ***
https://bugs.launchpad.net/bugs/1338870

This bug was fixed in the package linux-armadaxp - 3.2.0-1636.53

---
linux-armadaxp (3.2.0-1636.53) precise; urgency=low

  [ Andy Whitcroft ]

  * rebase to Ubuntu-3.2.0-67.101

  [ Ubuntu: 3.2.0-67.101 ]

  * l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943

linux-armadaxp (3.2.0-1636.52) precise; urgency=low

  [ Ike Panhc ]

  * Release Tracking Bug
- LP: #1338870
  * Rebase to Ubuntu-3.2.0-67.100

  [ Ubuntu: 3.2.0-67.100 ]

  * Merged back Ubuntu-3.2.0-65.99 security release
  * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699)
- LP: #1337339
  * Release Tracking Bug
- LP: #1338654
  * ptrace,x86: force IRET path after a ptrace_stop()
- LP: #1337339
- CVE-2014-4699

linux-armadaxp (3.2.0-1636.51) precise-proposed; urgency=low

  [ Ike Panhc ]

  * Release Tracking Bug
- LP: #1336144
  * Rebase to Ubuntu-3.2.0-66.99

  [ Ubuntu: 3.2.0-66.99 ]

  * Release Tracking Bug
- LP: #1335906
  * skbuff: export skb_copy_ubufs
- LP: #1298119
- CVE-2014-0131
  * skbuff: add an api to orphan frags
- LP: #1298119
- CVE-2014-0131
  * skbuff: skb_segment: orphan frags before copying
- LP: #1298119
- CVE-2014-0131
  * lib/lzo: Rename lzo1x_decompress.c to lzo1x_decompress_safe.c
- CVE-2014-4608
  * lib/lzo: Update LZO compression to current upstream version
- CVE-2014-4608
  * lzo: properly check for overruns
- CVE-2014-4608
  * KVM: x86 emulator: add support for vector alignment
- LP: #1330177
  * KVM: x86: emulate movdqa
- LP: #1330177
 -- Andy Whitcroft a...@canonical.com   Tue, 15 Jul 2014 10:19:39 +0100

** Changed in: linux-armadaxp (Ubuntu Precise)
   Status: New = Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-0131

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-4608

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-4699

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-4943

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1336144

Title:
  linux-armadaxp: 3.2.0-1636.51 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow package-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  In Progress
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow upload-to-ppa series:
  Invalid
Status in Kernel SRU Workflow verification-testing series:
  In Progress
Status in “linux-armadaxp” package in Ubuntu:
  Invalid
Status in “linux-armadaxp” source package in Precise:
  Fix Released

Bug description:
  This bug is for tracking the 3.2.0-1636.51 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 01. July 2014 04:57 UTC
  kernel-stable-master-bug:1335906
  kernel-stable-Certification-testing-end:Tuesday, 01. July 2014 12:46 UTC
  kernel-stable-Security-signoff-end:Tuesday, 01. July 2014 12:47 UTC
  kernel-stable-phase:PPA Testing
  kernel-stable-phase-changed:Wednesday, 02. July 2014 02:11 UTC
  kernel-stable-Prepare-package-end:Wednesday, 02. July 2014 02:11 UTC
  kernel-stable-Promote-to-proposed-start:Wednesday, 02. July 2014 02:11 UTC
  ppa-package-testing-start:Wednesday, 02. July 2014 02:11 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 03. July 2014 18:01 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1336144/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1337339] Re: x86_64, ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699)

2014-07-16 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1451.71

---
linux-ti-omap4 (3.2.0-1451.71) precise; urgency=low

  [ Luis Henriques ]

  * Rebased to 3.2.0-67.101

  [ Ubuntu: 3.2.0-67.101 ]

  * l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943

  [ Ubuntu: 3.2.0-67.100 ]

  * Merged back Ubuntu-3.2.0-65.99 security release
  * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699)
- LP: #1337339
  * Release Tracking Bug
- LP: #1338654
  * ptrace,x86: force IRET path after a ptrace_stop()
- LP: #1337339
- CVE-2014-4699

linux-ti-omap4 (3.2.0-1451.70) precise; urgency=low

  * Release Tracking Bug
- LP: #1336143

  [ Paolo Pisati ]

  * rebased on Ubuntu-3.2.0-66.99

  [ Ubuntu: 3.2.0-66.99 ]

  * Release Tracking Bug
- LP: #1335906
  * skbuff: export skb_copy_ubufs
- LP: #1298119
- CVE-2014-0131
  * skbuff: add an api to orphan frags
- LP: #1298119
- CVE-2014-0131
  * skbuff: skb_segment: orphan frags before copying
- LP: #1298119
- CVE-2014-0131
  * lib/lzo: Rename lzo1x_decompress.c to lzo1x_decompress_safe.c
- CVE-2014-4608
  * lib/lzo: Update LZO compression to current upstream version
- CVE-2014-4608
  * lzo: properly check for overruns
- CVE-2014-4608
  * KVM: x86 emulator: add support for vector alignment
- LP: #1330177
  * KVM: x86: emulate movdqa
- LP: #1330177
 -- Luis Henriques luis.henriq...@canonical.com   Tue, 15 Jul 2014 10:12:30 
+0100

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1337339

Title:
  x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699)

Status in “linux” package in Ubuntu:
  New
Status in “linux-armadaxp” package in Ubuntu:
  Fix Released
Status in “linux-ec2” package in Ubuntu:
  Fix Released
Status in “linux-fsl-imx51” package in Ubuntu:
  New
Status in “linux-lts-quantal” package in Ubuntu:
  Fix Released
Status in “linux-lts-raring” package in Ubuntu:
  Fix Released
Status in “linux-lts-saucy” package in Ubuntu:
  Fix Released
Status in “linux-mvl-dove” package in Ubuntu:
  New
Status in “linux-ti-omap4” package in Ubuntu:
  Fix Released
Status in “linux” source package in Lucid:
  Fix Released
Status in “linux” source package in Precise:
  Fix Released
Status in “linux” source package in Saucy:
  Fix Released
Status in “linux” source package in Trusty:
  Fix Released
Status in “linux” source package in Utopic:
  New

Bug description:
  The Linux kernel before 3.15.4 on Intel processors does not properly
  restrict use of a non-canonical value for the saved RIP address in the
  case of a system call that does not use IRET, which allows local users
  to leverage a race condition and gain privileges, or cause a denial of
  service (double fault), via a crafted application that makes ptrace
  and fork system calls.

  Break-Fix: 427abfa28afedffadfca9dd8b067eb6d36bac53f
  b9cd18de4db3c9ffa7e17b0dc0ca99ed5aa4d43a

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1337339/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1335313] Re: CVE-2014-4608

2014-07-16 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-saucy -
3.11.0-26.45~precise1

---
linux-lts-saucy (3.11.0-26.45~precise1) precise; urgency=low

  [ Upstream Kernel Changes ]

  * l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943

linux (3.11.0-26.44) saucy; urgency=low

  [ Luis Henriques ]

  * Merged back Ubuntu-3.11.0-24.42 security release
  * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699)
- LP: #1337339
  * Release Tracking Bug
- LP: #1338556

  [ Upstream Kernel Changes ]

  * ptrace,x86: force IRET path after a ptrace_stop()
- LP: #1337339
- CVE-2014-4699

linux (3.11.0-25.43) saucy; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1336203

  [ Upstream Kernel Changes ]

  * cfg80211: free sme on connection failures
- LP: #1335084
  * sched: Sanitize irq accounting madness
- LP: #1335084
  * sched: Use CPUPRI_NR_PRIORITIES instead of MAX_RT_PRIO in cpupri check
- LP: #1335084
  * net: cpsw: fix null dereference at probe
- LP: #1335084
  * mac80211: fix suspend vs. association race
- LP: #1335084
  * mac80211: fix on-channel remain-on-channel
- LP: #1335084
  * af_iucv: wrong mapping of sent and confirmed skbs
- LP: #1335084
  * net: filter: s390: fix JIT address randomization
- LP: #1335084
  * perf: Limit perf_event_attr::sample_period to 63 bits
- LP: #1335084
  * perf: Prevent false warning in perf_swevent_add
- LP: #1335084
  * drm/gf119-/disp: fix nasty bug which can clobber SOR0's clock setup
- LP: #1335084
  * drm/radeon: also try GART for CPU accessed buffers
- LP: #1335084
  * drm/radeon: handle non-VGA class pci devices with ATRM
- LP: #1335084
  * drm/radeon: fix register typo on si
- LP: #1335084
  * drm/radeon: avoid segfault on device open when accel is not working.
- LP: #1335084
  * can: peak_pci: prevent use after free at netdev removal
- LP: #1335084
  * nfsd4: remove lockowner when removing lock stateid
- LP: #1335084
  * nfsd4: warn on finding lockowner without stateid's
- LP: #1335084
  * hwpoison, hugetlb: lock_page/unlock_page does not match for handling a
free hugepage
- LP: #1335084
  * mm/memory-failure.c: fix memory leak by race between poison and
unpoison
- LP: #1335084
  * netfilter: ipv4: defrag: set local_df flag on defragmented skb
- LP: #1335084
  * ARM: OMAP3: clock: Back-propagate rate change from cam_mclk to dpll4_m5
on all OMAP3 platforms
- LP: #1335084
  * dma: dw: allow shared interrupts
- LP: #1335084
  * dmaengine: dw: went back to plain {request,free}_irq() calls
- LP: #1335084
  * ARM: omap5: hwmod_data: Correct IDLEMODE for McPDM
- LP: #1335084
  * Input: synaptics - add min/max quirk for the ThinkPad W540
- LP: #1335084
  * futex: Add another early deadlock detection check
- LP: #1335084
  * futex: Prevent attaching to kernel threads
- LP: #1335084
  * ARM: OMAP4: Fix the boot regression with CPU_IDLE enabled
- LP: #1335084
  * cpufreq: remove race while accessing cur_policy
- LP: #1335084
  * cpufreq: cpu0: drop wrong devm usage
- LP: #1335084
  * ARM: imx: fix error handling in ipu device registration
- LP: #1335084
  * ALSA: hda - Fix onboard audio on Intel H97/Z97 chipsets
- LP: #1335084
  * ARM: 8051/1: put_user: fix possible data corruption in put_user
- LP: #1335084
  * ARM: 8064/1: fix v7-M signal return
- LP: #1335084
  * Input: synaptics - T540p - unify with other LEN0034 models
- LP: #1335084
  * drm/i915: Only copy back the modified fields to userspace from
execbuffer
- LP: #1335084
  * dm cache: always split discards on cache block boundaries
- LP: #1335084
  * powerpc: Fix 64 bit builds with binutils 2.24
- LP: #1335084
  * powerpc, kexec: Fix Processor X is stuck issue during kexec from ST
mode
- LP: #1335084
  * rtmutex: Fix deadlock detector for real
- LP: #1335084
  * drm/radeon: don't allow RADEON_GEM_DOMAIN_CPU for command submission
- LP: #1335084
  * audit: restore order of tty and ses fields in log output
- LP: #1335084
  * drm/nouveau/pm/fan: drop the fan lock in fan_update() before
rescheduling
- LP: #1335084
  * leds: leds-pwm: properly clean up after probe failure
- LP: #1335084
  * clk: vexpress: NULL dereference on error path
- LP: #1335084
  * fix our current target reap infrastructure
- LP: #1335084
  * dual scan thread bug fix
- LP: #1335084
  * genirq: Provide irq_force_affinity fallback for non-SMP
- LP: #1335084
  * i2c: designware: Mask all interrupts during i2c controller enable
- LP: #1335084
  * crypto: s390 - fix aes,des ctr mode concurrency finding.
- LP: #1335084
  * Staging: speakup: Move pasting into a work item
- LP: #1335084
  * USB: Avoid runtime suspend loops for HCDs that can't handle
suspend/resume
- LP: #1335084
  * can: only rename enabled led triggers when 

[Kernel-packages] [Bug 1335314] Re: CVE-2014-4611

2014-07-16 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-saucy -
3.11.0-26.45~precise1

---
linux-lts-saucy (3.11.0-26.45~precise1) precise; urgency=low

  [ Upstream Kernel Changes ]

  * l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943

linux (3.11.0-26.44) saucy; urgency=low

  [ Luis Henriques ]

  * Merged back Ubuntu-3.11.0-24.42 security release
  * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699)
- LP: #1337339
  * Release Tracking Bug
- LP: #1338556

  [ Upstream Kernel Changes ]

  * ptrace,x86: force IRET path after a ptrace_stop()
- LP: #1337339
- CVE-2014-4699

linux (3.11.0-25.43) saucy; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1336203

  [ Upstream Kernel Changes ]

  * cfg80211: free sme on connection failures
- LP: #1335084
  * sched: Sanitize irq accounting madness
- LP: #1335084
  * sched: Use CPUPRI_NR_PRIORITIES instead of MAX_RT_PRIO in cpupri check
- LP: #1335084
  * net: cpsw: fix null dereference at probe
- LP: #1335084
  * mac80211: fix suspend vs. association race
- LP: #1335084
  * mac80211: fix on-channel remain-on-channel
- LP: #1335084
  * af_iucv: wrong mapping of sent and confirmed skbs
- LP: #1335084
  * net: filter: s390: fix JIT address randomization
- LP: #1335084
  * perf: Limit perf_event_attr::sample_period to 63 bits
- LP: #1335084
  * perf: Prevent false warning in perf_swevent_add
- LP: #1335084
  * drm/gf119-/disp: fix nasty bug which can clobber SOR0's clock setup
- LP: #1335084
  * drm/radeon: also try GART for CPU accessed buffers
- LP: #1335084
  * drm/radeon: handle non-VGA class pci devices with ATRM
- LP: #1335084
  * drm/radeon: fix register typo on si
- LP: #1335084
  * drm/radeon: avoid segfault on device open when accel is not working.
- LP: #1335084
  * can: peak_pci: prevent use after free at netdev removal
- LP: #1335084
  * nfsd4: remove lockowner when removing lock stateid
- LP: #1335084
  * nfsd4: warn on finding lockowner without stateid's
- LP: #1335084
  * hwpoison, hugetlb: lock_page/unlock_page does not match for handling a
free hugepage
- LP: #1335084
  * mm/memory-failure.c: fix memory leak by race between poison and
unpoison
- LP: #1335084
  * netfilter: ipv4: defrag: set local_df flag on defragmented skb
- LP: #1335084
  * ARM: OMAP3: clock: Back-propagate rate change from cam_mclk to dpll4_m5
on all OMAP3 platforms
- LP: #1335084
  * dma: dw: allow shared interrupts
- LP: #1335084
  * dmaengine: dw: went back to plain {request,free}_irq() calls
- LP: #1335084
  * ARM: omap5: hwmod_data: Correct IDLEMODE for McPDM
- LP: #1335084
  * Input: synaptics - add min/max quirk for the ThinkPad W540
- LP: #1335084
  * futex: Add another early deadlock detection check
- LP: #1335084
  * futex: Prevent attaching to kernel threads
- LP: #1335084
  * ARM: OMAP4: Fix the boot regression with CPU_IDLE enabled
- LP: #1335084
  * cpufreq: remove race while accessing cur_policy
- LP: #1335084
  * cpufreq: cpu0: drop wrong devm usage
- LP: #1335084
  * ARM: imx: fix error handling in ipu device registration
- LP: #1335084
  * ALSA: hda - Fix onboard audio on Intel H97/Z97 chipsets
- LP: #1335084
  * ARM: 8051/1: put_user: fix possible data corruption in put_user
- LP: #1335084
  * ARM: 8064/1: fix v7-M signal return
- LP: #1335084
  * Input: synaptics - T540p - unify with other LEN0034 models
- LP: #1335084
  * drm/i915: Only copy back the modified fields to userspace from
execbuffer
- LP: #1335084
  * dm cache: always split discards on cache block boundaries
- LP: #1335084
  * powerpc: Fix 64 bit builds with binutils 2.24
- LP: #1335084
  * powerpc, kexec: Fix Processor X is stuck issue during kexec from ST
mode
- LP: #1335084
  * rtmutex: Fix deadlock detector for real
- LP: #1335084
  * drm/radeon: don't allow RADEON_GEM_DOMAIN_CPU for command submission
- LP: #1335084
  * audit: restore order of tty and ses fields in log output
- LP: #1335084
  * drm/nouveau/pm/fan: drop the fan lock in fan_update() before
rescheduling
- LP: #1335084
  * leds: leds-pwm: properly clean up after probe failure
- LP: #1335084
  * clk: vexpress: NULL dereference on error path
- LP: #1335084
  * fix our current target reap infrastructure
- LP: #1335084
  * dual scan thread bug fix
- LP: #1335084
  * genirq: Provide irq_force_affinity fallback for non-SMP
- LP: #1335084
  * i2c: designware: Mask all interrupts during i2c controller enable
- LP: #1335084
  * crypto: s390 - fix aes,des ctr mode concurrency finding.
- LP: #1335084
  * Staging: speakup: Move pasting into a work item
- LP: #1335084
  * USB: Avoid runtime suspend loops for HCDs that can't handle
suspend/resume
- LP: #1335084
  * can: only rename enabled led triggers when 

[Kernel-packages] [Bug 1298119] Re: CVE-2014-0131

2014-07-16 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-armadaxp - 3.2.0-1636.53

---
linux-armadaxp (3.2.0-1636.53) precise; urgency=low

  [ Andy Whitcroft ]

  * rebase to Ubuntu-3.2.0-67.101

  [ Ubuntu: 3.2.0-67.101 ]

  * l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943

linux-armadaxp (3.2.0-1636.52) precise; urgency=low

  [ Ike Panhc ]

  * Release Tracking Bug
- LP: #1338870
  * Rebase to Ubuntu-3.2.0-67.100

  [ Ubuntu: 3.2.0-67.100 ]

  * Merged back Ubuntu-3.2.0-65.99 security release
  * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699)
- LP: #1337339
  * Release Tracking Bug
- LP: #1338654
  * ptrace,x86: force IRET path after a ptrace_stop()
- LP: #1337339
- CVE-2014-4699

linux-armadaxp (3.2.0-1636.51) precise-proposed; urgency=low

  [ Ike Panhc ]

  * Release Tracking Bug
- LP: #1336144
  * Rebase to Ubuntu-3.2.0-66.99

  [ Ubuntu: 3.2.0-66.99 ]

  * Release Tracking Bug
- LP: #1335906
  * skbuff: export skb_copy_ubufs
- LP: #1298119
- CVE-2014-0131
  * skbuff: add an api to orphan frags
- LP: #1298119
- CVE-2014-0131
  * skbuff: skb_segment: orphan frags before copying
- LP: #1298119
- CVE-2014-0131
  * lib/lzo: Rename lzo1x_decompress.c to lzo1x_decompress_safe.c
- CVE-2014-4608
  * lib/lzo: Update LZO compression to current upstream version
- CVE-2014-4608
  * lzo: properly check for overruns
- CVE-2014-4608
  * KVM: x86 emulator: add support for vector alignment
- LP: #1330177
  * KVM: x86: emulate movdqa
- LP: #1330177
 -- Andy Whitcroft a...@canonical.com   Tue, 15 Jul 2014 10:19:39 +0100

** Changed in: linux-armadaxp (Ubuntu Precise)
   Status: Fix Committed = Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-4608

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-4699

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-4943

** Changed in: linux-lts-quantal (Ubuntu Precise)
   Status: Fix Committed = Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-1739

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-3917

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-4014

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-4027

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1298119

Title:
  CVE-2014-0131

Status in “linux” package in Ubuntu:
  Invalid
Status in “linux-armadaxp” package in Ubuntu:
  Invalid
Status in “linux-ec2” package in Ubuntu:
  Invalid
Status in “linux-fsl-imx51” package in Ubuntu:
  Invalid
Status in “linux-lts-backport-maverick” package in Ubuntu:
  Won't Fix
Status in “linux-lts-backport-natty” package in Ubuntu:
  Won't Fix
Status in “linux-lts-quantal” package in Ubuntu:
  Invalid
Status in “linux-lts-raring” package in Ubuntu:
  Invalid
Status in “linux-lts-saucy” package in Ubuntu:
  Invalid
Status in “linux-mvl-dove” package in Ubuntu:
  Invalid
Status in “linux-ti-omap4” package in Ubuntu:
  Invalid
Status in “linux” source package in Lucid:
  Invalid
Status in “linux-armadaxp” source package in Lucid:
  Invalid
Status in “linux-ec2” source package in Lucid:
  Invalid
Status in “linux-fsl-imx51” source package in Lucid:
  Invalid
Status in “linux-lts-backport-maverick” source package in Lucid:
  Won't Fix
Status in “linux-lts-backport-natty” source package in Lucid:
  Won't Fix
Status in “linux-lts-quantal” source package in Lucid:
  Invalid
Status in “linux-lts-raring” source package in Lucid:
  Invalid
Status in “linux-lts-saucy” source package in Lucid:
  Invalid
Status in “linux-mvl-dove” source package in Lucid:
  Invalid
Status in “linux-ti-omap4” source package in Lucid:
  Invalid
Status in “linux” source package in Precise:
  Fix Committed
Status in “linux-armadaxp” source package in Precise:
  Fix Released
Status in “linux-ec2” source package in Precise:
  Invalid
Status in “linux-fsl-imx51” source package in Precise:
  Invalid
Status in “linux-lts-backport-maverick” source package in Precise:
  Won't Fix
Status in “linux-lts-backport-natty” source package in Precise:
  Won't Fix
Status in “linux-lts-quantal” source package in Precise:
  Fix Released
Status in “linux-lts-raring” source package in Precise:
  Fix Released
Status in “linux-lts-saucy” source package in Precise:
  Fix Committed
Status in “linux-mvl-dove” source package in Precise:
  Invalid
Status in “linux-ti-omap4” source package in Precise:
  New
Status in “linux-lts-backport-maverick” source package in Quantal:
  Won't Fix
Status in “linux-lts-backport-natty” source package in Quantal:
  Won't Fix
Status in “linux” source package in Saucy:
  Fix Committed
Status in “linux-armadaxp” source package in Saucy:
  Invalid
Status in “linux-ec2” source package in Saucy:
  

[Kernel-packages] [Bug 1298119] Re: CVE-2014-0131

2014-07-16 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-quantal -
3.5.0-54.81~precise1

---
linux-lts-quantal (3.5.0-54.81~precise1) precise; urgency=low

  [ Upstream Kernel Changes ]

  * l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943

linux-lts-quantal (3.5.0-54.80~precise1) precise; urgency=low

  [ Luis Henriques ]

  * Merged back Ubuntu-lts-3.5.0-52.79 security release
  * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699)
- LP: #1337339
  * Release Tracking Bug
- LP: #1338611

  [ Upstream Kernel Changes ]

  * ptrace,x86: force IRET path after a ptrace_stop()
- LP: #1337339
- CVE-2014-4699

linux-lts-quantal (3.5.0-53.79~precise1) precise; urgency=low

  [ Joseph Salisbury ]

  * Release Tracking Bug
- LP: #1336400

  [ Upstream Kernel Changes ]

  * skbuff: export skb_copy_ubufs
- LP: #1298119
- CVE-2014-0131
  * skbuff: add an api to orphan frags
- LP: #1298119
- CVE-2014-0131
  * skbuff: skb_segment: orphan frags before copying
- LP: #1298119
- CVE-2014-0131
  * media-device: fix infoleak in ioctl media_enum_entities()
- LP: #1333609
- CVE-2014-1739
  * auditsc: audit_krule mask accesses need bounds checking
- LP: #1325941
- CVE-2014-3917
  * userns: Allow chown and setgid preservation
- LP: #1329103
- CVE-2014-4014
  * fs,userns: Change inode_capable to capable_wrt_inode_uidgid
- LP: #1329103
- CVE-2014-4014
  * target/rd: Refactor rd_build_device_space + rd_release_device_space
- LP: #1333612
- CVE-2014-4027
  * lib/lzo: Rename lzo1x_decompress.c to lzo1x_decompress_safe.c
- CVE-2014-4608
  * lib/lzo: Update LZO compression to current upstream version
- CVE-2014-4608
  * lzo: properly check for overruns
- CVE-2014-4608
 -- Luis Henriques luis.henriq...@canonical.com   Mon, 14 Jul 2014 15:28:36 
+0100

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1298119

Title:
  CVE-2014-0131

Status in “linux” package in Ubuntu:
  Invalid
Status in “linux-armadaxp” package in Ubuntu:
  Invalid
Status in “linux-ec2” package in Ubuntu:
  Invalid
Status in “linux-fsl-imx51” package in Ubuntu:
  Invalid
Status in “linux-lts-backport-maverick” package in Ubuntu:
  Won't Fix
Status in “linux-lts-backport-natty” package in Ubuntu:
  Won't Fix
Status in “linux-lts-quantal” package in Ubuntu:
  Invalid
Status in “linux-lts-raring” package in Ubuntu:
  Invalid
Status in “linux-lts-saucy” package in Ubuntu:
  Invalid
Status in “linux-mvl-dove” package in Ubuntu:
  Invalid
Status in “linux-ti-omap4” package in Ubuntu:
  Invalid
Status in “linux” source package in Lucid:
  Invalid
Status in “linux-armadaxp” source package in Lucid:
  Invalid
Status in “linux-ec2” source package in Lucid:
  Invalid
Status in “linux-fsl-imx51” source package in Lucid:
  Invalid
Status in “linux-lts-backport-maverick” source package in Lucid:
  Won't Fix
Status in “linux-lts-backport-natty” source package in Lucid:
  Won't Fix
Status in “linux-lts-quantal” source package in Lucid:
  Invalid
Status in “linux-lts-raring” source package in Lucid:
  Invalid
Status in “linux-lts-saucy” source package in Lucid:
  Invalid
Status in “linux-mvl-dove” source package in Lucid:
  Invalid
Status in “linux-ti-omap4” source package in Lucid:
  Invalid
Status in “linux” source package in Precise:
  Fix Committed
Status in “linux-armadaxp” source package in Precise:
  Fix Released
Status in “linux-ec2” source package in Precise:
  Invalid
Status in “linux-fsl-imx51” source package in Precise:
  Invalid
Status in “linux-lts-backport-maverick” source package in Precise:
  Won't Fix
Status in “linux-lts-backport-natty” source package in Precise:
  Won't Fix
Status in “linux-lts-quantal” source package in Precise:
  Fix Released
Status in “linux-lts-raring” source package in Precise:
  Fix Released
Status in “linux-lts-saucy” source package in Precise:
  Fix Committed
Status in “linux-mvl-dove” source package in Precise:
  Invalid
Status in “linux-ti-omap4” source package in Precise:
  New
Status in “linux-lts-backport-maverick” source package in Quantal:
  Won't Fix
Status in “linux-lts-backport-natty” source package in Quantal:
  Won't Fix
Status in “linux” source package in Saucy:
  Fix Committed
Status in “linux-armadaxp” source package in Saucy:
  Invalid
Status in “linux-ec2” source package in Saucy:
  Invalid
Status in “linux-fsl-imx51” source package in Saucy:
  Invalid
Status in “linux-lts-backport-maverick” source package in Saucy:
  Won't Fix
Status in “linux-lts-backport-natty” source package in Saucy:
  Won't Fix
Status in “linux-lts-quantal” source package in Saucy:
  Invalid
Status in “linux-lts-raring” source package in Saucy:
  Invalid
Status in “linux-lts-saucy” source package in Saucy:
  Invalid
Status in “linux-mvl-dove” source package in Saucy:
  Invalid
Status in 

[Kernel-packages] [Bug 1333609] Re: CVE-2014-1739

2014-07-16 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-quantal -
3.5.0-54.81~precise1

---
linux-lts-quantal (3.5.0-54.81~precise1) precise; urgency=low

  [ Upstream Kernel Changes ]

  * l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943

linux-lts-quantal (3.5.0-54.80~precise1) precise; urgency=low

  [ Luis Henriques ]

  * Merged back Ubuntu-lts-3.5.0-52.79 security release
  * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699)
- LP: #1337339
  * Release Tracking Bug
- LP: #1338611

  [ Upstream Kernel Changes ]

  * ptrace,x86: force IRET path after a ptrace_stop()
- LP: #1337339
- CVE-2014-4699

linux-lts-quantal (3.5.0-53.79~precise1) precise; urgency=low

  [ Joseph Salisbury ]

  * Release Tracking Bug
- LP: #1336400

  [ Upstream Kernel Changes ]

  * skbuff: export skb_copy_ubufs
- LP: #1298119
- CVE-2014-0131
  * skbuff: add an api to orphan frags
- LP: #1298119
- CVE-2014-0131
  * skbuff: skb_segment: orphan frags before copying
- LP: #1298119
- CVE-2014-0131
  * media-device: fix infoleak in ioctl media_enum_entities()
- LP: #1333609
- CVE-2014-1739
  * auditsc: audit_krule mask accesses need bounds checking
- LP: #1325941
- CVE-2014-3917
  * userns: Allow chown and setgid preservation
- LP: #1329103
- CVE-2014-4014
  * fs,userns: Change inode_capable to capable_wrt_inode_uidgid
- LP: #1329103
- CVE-2014-4014
  * target/rd: Refactor rd_build_device_space + rd_release_device_space
- LP: #1333612
- CVE-2014-4027
  * lib/lzo: Rename lzo1x_decompress.c to lzo1x_decompress_safe.c
- CVE-2014-4608
  * lib/lzo: Update LZO compression to current upstream version
- CVE-2014-4608
  * lzo: properly check for overruns
- CVE-2014-4608
 -- Luis Henriques luis.henriq...@canonical.com   Mon, 14 Jul 2014 15:28:36 
+0100

** Changed in: linux-lts-quantal (Ubuntu Precise)
   Status: Fix Committed = Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-0131

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-3917

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-4014

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-4027

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-4608

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-4699

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-4943

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1333609

Title:
  CVE-2014-1739

Status in “linux” package in Ubuntu:
  Invalid
Status in “linux-armadaxp” package in Ubuntu:
  Invalid
Status in “linux-ec2” package in Ubuntu:
  Invalid
Status in “linux-fsl-imx51” package in Ubuntu:
  Invalid
Status in “linux-lts-backport-maverick” package in Ubuntu:
  New
Status in “linux-lts-backport-natty” package in Ubuntu:
  New
Status in “linux-lts-quantal” package in Ubuntu:
  Invalid
Status in “linux-lts-raring” package in Ubuntu:
  Invalid
Status in “linux-lts-saucy” package in Ubuntu:
  Invalid
Status in “linux-mvl-dove” package in Ubuntu:
  Invalid
Status in “linux-ti-omap4” package in Ubuntu:
  Invalid
Status in “linux” source package in Lucid:
  Invalid
Status in “linux-armadaxp” source package in Lucid:
  Invalid
Status in “linux-ec2” source package in Lucid:
  Invalid
Status in “linux-fsl-imx51” source package in Lucid:
  Invalid
Status in “linux-lts-backport-maverick” source package in Lucid:
  Won't Fix
Status in “linux-lts-backport-natty” source package in Lucid:
  Won't Fix
Status in “linux-lts-quantal” source package in Lucid:
  Invalid
Status in “linux-lts-raring” source package in Lucid:
  Invalid
Status in “linux-lts-saucy” source package in Lucid:
  Invalid
Status in “linux-mvl-dove” source package in Lucid:
  Invalid
Status in “linux-ti-omap4” source package in Lucid:
  Invalid
Status in “linux” source package in Precise:
  Fix Released
Status in “linux-armadaxp” source package in Precise:
  Fix Released
Status in “linux-ec2” source package in Precise:
  Invalid
Status in “linux-fsl-imx51” source package in Precise:
  Invalid
Status in “linux-lts-backport-maverick” source package in Precise:
  Won't Fix
Status in “linux-lts-backport-natty” source package in Precise:
  Won't Fix
Status in “linux-lts-quantal” source package in Precise:
  Fix Released
Status in “linux-lts-raring” source package in Precise:
  Fix Committed
Status in “linux-lts-saucy” source package in Precise:
  Fix Released
Status in “linux-mvl-dove” source package in Precise:
  Invalid
Status in “linux-ti-omap4” source package in Precise:
  Fix Released
Status in “linux” source package in Saucy:
  Fix Released
Status in “linux-armadaxp” source package in Saucy:
  Invalid
Status in “linux-ec2” source package in Saucy:
  Invalid
Status in 

[Kernel-packages] [Bug 1329103] Re: CVE-2014-4014

2014-07-16 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-quantal -
3.5.0-54.81~precise1

---
linux-lts-quantal (3.5.0-54.81~precise1) precise; urgency=low

  [ Upstream Kernel Changes ]

  * l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943

linux-lts-quantal (3.5.0-54.80~precise1) precise; urgency=low

  [ Luis Henriques ]

  * Merged back Ubuntu-lts-3.5.0-52.79 security release
  * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699)
- LP: #1337339
  * Release Tracking Bug
- LP: #1338611

  [ Upstream Kernel Changes ]

  * ptrace,x86: force IRET path after a ptrace_stop()
- LP: #1337339
- CVE-2014-4699

linux-lts-quantal (3.5.0-53.79~precise1) precise; urgency=low

  [ Joseph Salisbury ]

  * Release Tracking Bug
- LP: #1336400

  [ Upstream Kernel Changes ]

  * skbuff: export skb_copy_ubufs
- LP: #1298119
- CVE-2014-0131
  * skbuff: add an api to orphan frags
- LP: #1298119
- CVE-2014-0131
  * skbuff: skb_segment: orphan frags before copying
- LP: #1298119
- CVE-2014-0131
  * media-device: fix infoleak in ioctl media_enum_entities()
- LP: #1333609
- CVE-2014-1739
  * auditsc: audit_krule mask accesses need bounds checking
- LP: #1325941
- CVE-2014-3917
  * userns: Allow chown and setgid preservation
- LP: #1329103
- CVE-2014-4014
  * fs,userns: Change inode_capable to capable_wrt_inode_uidgid
- LP: #1329103
- CVE-2014-4014
  * target/rd: Refactor rd_build_device_space + rd_release_device_space
- LP: #1333612
- CVE-2014-4027
  * lib/lzo: Rename lzo1x_decompress.c to lzo1x_decompress_safe.c
- CVE-2014-4608
  * lib/lzo: Update LZO compression to current upstream version
- CVE-2014-4608
  * lzo: properly check for overruns
- CVE-2014-4608
 -- Luis Henriques luis.henriq...@canonical.com   Mon, 14 Jul 2014 15:28:36 
+0100

** Changed in: linux-lts-quantal (Ubuntu Precise)
   Status: Fix Committed = Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-0131

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-1739

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-3917

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-4027

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-4608

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-4699

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-4943

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1329103

Title:
  CVE-2014-4014

Status in “linux” package in Ubuntu:
  Fix Committed
Status in “linux-armadaxp” package in Ubuntu:
  Invalid
Status in “linux-ec2” package in Ubuntu:
  Invalid
Status in “linux-fsl-imx51” package in Ubuntu:
  Invalid
Status in “linux-lts-backport-maverick” package in Ubuntu:
  New
Status in “linux-lts-backport-natty” package in Ubuntu:
  New
Status in “linux-lts-quantal” package in Ubuntu:
  Invalid
Status in “linux-lts-raring” package in Ubuntu:
  Invalid
Status in “linux-lts-saucy” package in Ubuntu:
  Invalid
Status in “linux-mvl-dove” package in Ubuntu:
  Invalid
Status in “linux-ti-omap4” package in Ubuntu:
  Invalid
Status in “linux” source package in Lucid:
  New
Status in “linux-armadaxp” source package in Lucid:
  Invalid
Status in “linux-ec2” source package in Lucid:
  New
Status in “linux-fsl-imx51” source package in Lucid:
  Invalid
Status in “linux-lts-backport-maverick” source package in Lucid:
  Won't Fix
Status in “linux-lts-backport-natty” source package in Lucid:
  Won't Fix
Status in “linux-lts-quantal” source package in Lucid:
  Invalid
Status in “linux-lts-raring” source package in Lucid:
  Invalid
Status in “linux-lts-saucy” source package in Lucid:
  Invalid
Status in “linux-mvl-dove” source package in Lucid:
  Invalid
Status in “linux-ti-omap4” source package in Lucid:
  Invalid
Status in “linux” source package in Precise:
  New
Status in “linux-armadaxp” source package in Precise:
  New
Status in “linux-ec2” source package in Precise:
  Invalid
Status in “linux-fsl-imx51” source package in Precise:
  Invalid
Status in “linux-lts-backport-maverick” source package in Precise:
  Won't Fix
Status in “linux-lts-backport-natty” source package in Precise:
  Won't Fix
Status in “linux-lts-quantal” source package in Precise:
  Fix Released
Status in “linux-lts-raring” source package in Precise:
  Fix Released
Status in “linux-lts-saucy” source package in Precise:
  Fix Committed
Status in “linux-mvl-dove” source package in Precise:
  Invalid
Status in “linux-ti-omap4” source package in Precise:
  New
Status in “linux” source package in Saucy:
  Fix Committed
Status in “linux-armadaxp” source package in Saucy:
  Invalid
Status in “linux-ec2” source package in Saucy:
  Invalid
Status in “linux-fsl-imx51” source package 

[Kernel-packages] [Bug 1333612] Re: CVE-2014-4027

2014-07-16 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-quantal -
3.5.0-54.81~precise1

---
linux-lts-quantal (3.5.0-54.81~precise1) precise; urgency=low

  [ Upstream Kernel Changes ]

  * l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943

linux-lts-quantal (3.5.0-54.80~precise1) precise; urgency=low

  [ Luis Henriques ]

  * Merged back Ubuntu-lts-3.5.0-52.79 security release
  * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699)
- LP: #1337339
  * Release Tracking Bug
- LP: #1338611

  [ Upstream Kernel Changes ]

  * ptrace,x86: force IRET path after a ptrace_stop()
- LP: #1337339
- CVE-2014-4699

linux-lts-quantal (3.5.0-53.79~precise1) precise; urgency=low

  [ Joseph Salisbury ]

  * Release Tracking Bug
- LP: #1336400

  [ Upstream Kernel Changes ]

  * skbuff: export skb_copy_ubufs
- LP: #1298119
- CVE-2014-0131
  * skbuff: add an api to orphan frags
- LP: #1298119
- CVE-2014-0131
  * skbuff: skb_segment: orphan frags before copying
- LP: #1298119
- CVE-2014-0131
  * media-device: fix infoleak in ioctl media_enum_entities()
- LP: #1333609
- CVE-2014-1739
  * auditsc: audit_krule mask accesses need bounds checking
- LP: #1325941
- CVE-2014-3917
  * userns: Allow chown and setgid preservation
- LP: #1329103
- CVE-2014-4014
  * fs,userns: Change inode_capable to capable_wrt_inode_uidgid
- LP: #1329103
- CVE-2014-4014
  * target/rd: Refactor rd_build_device_space + rd_release_device_space
- LP: #1333612
- CVE-2014-4027
  * lib/lzo: Rename lzo1x_decompress.c to lzo1x_decompress_safe.c
- CVE-2014-4608
  * lib/lzo: Update LZO compression to current upstream version
- CVE-2014-4608
  * lzo: properly check for overruns
- CVE-2014-4608
 -- Luis Henriques luis.henriq...@canonical.com   Mon, 14 Jul 2014 15:28:36 
+0100

** Changed in: linux-lts-quantal (Ubuntu Precise)
   Status: Fix Committed = Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-0131

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-1739

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-3917

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-4014

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-4608

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-4699

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-4943

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1333612

Title:
  CVE-2014-4027

Status in “linux” package in Ubuntu:
  Invalid
Status in “linux-armadaxp” package in Ubuntu:
  Invalid
Status in “linux-ec2” package in Ubuntu:
  Invalid
Status in “linux-fsl-imx51” package in Ubuntu:
  Invalid
Status in “linux-lts-backport-maverick” package in Ubuntu:
  New
Status in “linux-lts-backport-natty” package in Ubuntu:
  New
Status in “linux-lts-quantal” package in Ubuntu:
  Invalid
Status in “linux-lts-raring” package in Ubuntu:
  Invalid
Status in “linux-lts-saucy” package in Ubuntu:
  Invalid
Status in “linux-mvl-dove” package in Ubuntu:
  Invalid
Status in “linux-ti-omap4” package in Ubuntu:
  Invalid
Status in “linux” source package in Lucid:
  New
Status in “linux-armadaxp” source package in Lucid:
  Invalid
Status in “linux-ec2” source package in Lucid:
  New
Status in “linux-fsl-imx51” source package in Lucid:
  Invalid
Status in “linux-lts-backport-maverick” source package in Lucid:
  Won't Fix
Status in “linux-lts-backport-natty” source package in Lucid:
  Won't Fix
Status in “linux-lts-quantal” source package in Lucid:
  Invalid
Status in “linux-lts-raring” source package in Lucid:
  Invalid
Status in “linux-lts-saucy” source package in Lucid:
  Invalid
Status in “linux-mvl-dove” source package in Lucid:
  Invalid
Status in “linux-ti-omap4” source package in Lucid:
  Invalid
Status in “linux” source package in Precise:
  New
Status in “linux-armadaxp” source package in Precise:
  New
Status in “linux-ec2” source package in Precise:
  Invalid
Status in “linux-fsl-imx51” source package in Precise:
  Invalid
Status in “linux-lts-backport-maverick” source package in Precise:
  Won't Fix
Status in “linux-lts-backport-natty” source package in Precise:
  Won't Fix
Status in “linux-lts-quantal” source package in Precise:
  Fix Released
Status in “linux-lts-raring” source package in Precise:
  New
Status in “linux-lts-saucy” source package in Precise:
  New
Status in “linux-mvl-dove” source package in Precise:
  Invalid
Status in “linux-ti-omap4” source package in Precise:
  New
Status in “linux” source package in Saucy:
  New
Status in “linux-armadaxp” source package in Saucy:
  Invalid
Status in “linux-ec2” source package in Saucy:
  Invalid
Status in “linux-fsl-imx51” source package in Saucy:
  Invalid
Status in 

[Kernel-packages] [Bug 1325941] Re: CVE-2014-3917

2014-07-16 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-quantal -
3.5.0-54.81~precise1

---
linux-lts-quantal (3.5.0-54.81~precise1) precise; urgency=low

  [ Upstream Kernel Changes ]

  * l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943

linux-lts-quantal (3.5.0-54.80~precise1) precise; urgency=low

  [ Luis Henriques ]

  * Merged back Ubuntu-lts-3.5.0-52.79 security release
  * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699)
- LP: #1337339
  * Release Tracking Bug
- LP: #1338611

  [ Upstream Kernel Changes ]

  * ptrace,x86: force IRET path after a ptrace_stop()
- LP: #1337339
- CVE-2014-4699

linux-lts-quantal (3.5.0-53.79~precise1) precise; urgency=low

  [ Joseph Salisbury ]

  * Release Tracking Bug
- LP: #1336400

  [ Upstream Kernel Changes ]

  * skbuff: export skb_copy_ubufs
- LP: #1298119
- CVE-2014-0131
  * skbuff: add an api to orphan frags
- LP: #1298119
- CVE-2014-0131
  * skbuff: skb_segment: orphan frags before copying
- LP: #1298119
- CVE-2014-0131
  * media-device: fix infoleak in ioctl media_enum_entities()
- LP: #1333609
- CVE-2014-1739
  * auditsc: audit_krule mask accesses need bounds checking
- LP: #1325941
- CVE-2014-3917
  * userns: Allow chown and setgid preservation
- LP: #1329103
- CVE-2014-4014
  * fs,userns: Change inode_capable to capable_wrt_inode_uidgid
- LP: #1329103
- CVE-2014-4014
  * target/rd: Refactor rd_build_device_space + rd_release_device_space
- LP: #1333612
- CVE-2014-4027
  * lib/lzo: Rename lzo1x_decompress.c to lzo1x_decompress_safe.c
- CVE-2014-4608
  * lib/lzo: Update LZO compression to current upstream version
- CVE-2014-4608
  * lzo: properly check for overruns
- CVE-2014-4608
 -- Luis Henriques luis.henriq...@canonical.com   Mon, 14 Jul 2014 15:28:36 
+0100

** Changed in: linux-lts-quantal (Ubuntu Precise)
   Status: Fix Committed = Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-0131

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-1739

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-4014

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-4027

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-4608

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-4699

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-4943

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1325941

Title:
  CVE-2014-3917

Status in “linux” package in Ubuntu:
  Fix Committed
Status in “linux-armadaxp” package in Ubuntu:
  Invalid
Status in “linux-ec2” package in Ubuntu:
  Invalid
Status in “linux-fsl-imx51” package in Ubuntu:
  Invalid
Status in “linux-lts-backport-maverick” package in Ubuntu:
  New
Status in “linux-lts-backport-natty” package in Ubuntu:
  New
Status in “linux-lts-quantal” package in Ubuntu:
  Invalid
Status in “linux-lts-raring” package in Ubuntu:
  Invalid
Status in “linux-lts-saucy” package in Ubuntu:
  Invalid
Status in “linux-lts-trusty” package in Ubuntu:
  Invalid
Status in “linux-mvl-dove” package in Ubuntu:
  Invalid
Status in “linux-ti-omap4” package in Ubuntu:
  Invalid
Status in “linux” source package in Lucid:
  Fix Committed
Status in “linux-armadaxp” source package in Lucid:
  Invalid
Status in “linux-ec2” source package in Lucid:
  Fix Committed
Status in “linux-fsl-imx51” source package in Lucid:
  Invalid
Status in “linux-lts-backport-maverick” source package in Lucid:
  Won't Fix
Status in “linux-lts-backport-natty” source package in Lucid:
  Won't Fix
Status in “linux-lts-quantal” source package in Lucid:
  Invalid
Status in “linux-lts-raring” source package in Lucid:
  Invalid
Status in “linux-lts-saucy” source package in Lucid:
  Invalid
Status in “linux-lts-trusty” source package in Lucid:
  Invalid
Status in “linux-mvl-dove” source package in Lucid:
  Invalid
Status in “linux-ti-omap4” source package in Lucid:
  Invalid
Status in “linux” source package in Precise:
  New
Status in “linux-armadaxp” source package in Precise:
  New
Status in “linux-ec2” source package in Precise:
  Invalid
Status in “linux-fsl-imx51” source package in Precise:
  Invalid
Status in “linux-lts-backport-maverick” source package in Precise:
  Won't Fix
Status in “linux-lts-backport-natty” source package in Precise:
  Won't Fix
Status in “linux-lts-quantal” source package in Precise:
  Fix Released
Status in “linux-lts-raring” source package in Precise:
  Fix Released
Status in “linux-lts-saucy” source package in Precise:
  Fix Committed
Status in “linux-lts-trusty” source package in Precise:
  New
Status in “linux-mvl-dove” source package in Precise:
  Invalid
Status in “linux-ti-omap4” source package in Precise:
  New
Status in 

[Kernel-packages] [Bug 1298119] Re: CVE-2014-0131

2014-07-16 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-quantal -
3.5.0-54.81~precise1

---
linux-lts-quantal (3.5.0-54.81~precise1) precise; urgency=low

  [ Upstream Kernel Changes ]

  * l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943

linux-lts-quantal (3.5.0-54.80~precise1) precise; urgency=low

  [ Luis Henriques ]

  * Merged back Ubuntu-lts-3.5.0-52.79 security release
  * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699)
- LP: #1337339
  * Release Tracking Bug
- LP: #1338611

  [ Upstream Kernel Changes ]

  * ptrace,x86: force IRET path after a ptrace_stop()
- LP: #1337339
- CVE-2014-4699

linux-lts-quantal (3.5.0-53.79~precise1) precise; urgency=low

  [ Joseph Salisbury ]

  * Release Tracking Bug
- LP: #1336400

  [ Upstream Kernel Changes ]

  * skbuff: export skb_copy_ubufs
- LP: #1298119
- CVE-2014-0131
  * skbuff: add an api to orphan frags
- LP: #1298119
- CVE-2014-0131
  * skbuff: skb_segment: orphan frags before copying
- LP: #1298119
- CVE-2014-0131
  * media-device: fix infoleak in ioctl media_enum_entities()
- LP: #1333609
- CVE-2014-1739
  * auditsc: audit_krule mask accesses need bounds checking
- LP: #1325941
- CVE-2014-3917
  * userns: Allow chown and setgid preservation
- LP: #1329103
- CVE-2014-4014
  * fs,userns: Change inode_capable to capable_wrt_inode_uidgid
- LP: #1329103
- CVE-2014-4014
  * target/rd: Refactor rd_build_device_space + rd_release_device_space
- LP: #1333612
- CVE-2014-4027
  * lib/lzo: Rename lzo1x_decompress.c to lzo1x_decompress_safe.c
- CVE-2014-4608
  * lib/lzo: Update LZO compression to current upstream version
- CVE-2014-4608
  * lzo: properly check for overruns
- CVE-2014-4608
 -- Luis Henriques luis.henriq...@canonical.com   Mon, 14 Jul 2014 15:28:36 
+0100

** Changed in: linux-lts-quantal (Ubuntu Precise)
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1298119

Title:
  CVE-2014-0131

Status in “linux” package in Ubuntu:
  Invalid
Status in “linux-armadaxp” package in Ubuntu:
  Invalid
Status in “linux-ec2” package in Ubuntu:
  Invalid
Status in “linux-fsl-imx51” package in Ubuntu:
  Invalid
Status in “linux-lts-backport-maverick” package in Ubuntu:
  Won't Fix
Status in “linux-lts-backport-natty” package in Ubuntu:
  Won't Fix
Status in “linux-lts-quantal” package in Ubuntu:
  Invalid
Status in “linux-lts-raring” package in Ubuntu:
  Invalid
Status in “linux-lts-saucy” package in Ubuntu:
  Invalid
Status in “linux-mvl-dove” package in Ubuntu:
  Invalid
Status in “linux-ti-omap4” package in Ubuntu:
  Invalid
Status in “linux” source package in Lucid:
  Invalid
Status in “linux-armadaxp” source package in Lucid:
  Invalid
Status in “linux-ec2” source package in Lucid:
  Invalid
Status in “linux-fsl-imx51” source package in Lucid:
  Invalid
Status in “linux-lts-backport-maverick” source package in Lucid:
  Won't Fix
Status in “linux-lts-backport-natty” source package in Lucid:
  Won't Fix
Status in “linux-lts-quantal” source package in Lucid:
  Invalid
Status in “linux-lts-raring” source package in Lucid:
  Invalid
Status in “linux-lts-saucy” source package in Lucid:
  Invalid
Status in “linux-mvl-dove” source package in Lucid:
  Invalid
Status in “linux-ti-omap4” source package in Lucid:
  Invalid
Status in “linux” source package in Precise:
  Fix Committed
Status in “linux-armadaxp” source package in Precise:
  Fix Released
Status in “linux-ec2” source package in Precise:
  Invalid
Status in “linux-fsl-imx51” source package in Precise:
  Invalid
Status in “linux-lts-backport-maverick” source package in Precise:
  Won't Fix
Status in “linux-lts-backport-natty” source package in Precise:
  Won't Fix
Status in “linux-lts-quantal” source package in Precise:
  Fix Released
Status in “linux-lts-raring” source package in Precise:
  Fix Released
Status in “linux-lts-saucy” source package in Precise:
  Fix Committed
Status in “linux-mvl-dove” source package in Precise:
  Invalid
Status in “linux-ti-omap4” source package in Precise:
  New
Status in “linux-lts-backport-maverick” source package in Quantal:
  Won't Fix
Status in “linux-lts-backport-natty” source package in Quantal:
  Won't Fix
Status in “linux” source package in Saucy:
  Fix Committed
Status in “linux-armadaxp” source package in Saucy:
  Invalid
Status in “linux-ec2” source package in Saucy:
  Invalid
Status in “linux-fsl-imx51” source package in Saucy:
  Invalid
Status in “linux-lts-backport-maverick” source package in Saucy:
  Won't Fix
Status in “linux-lts-backport-natty” source package in Saucy:
  Won't Fix
Status in “linux-lts-quantal” source package in Saucy:
  Invalid
Status in “linux-lts-raring” source package in Saucy:
  Invalid
Status in “linux-lts-saucy” source package 

[Kernel-packages] [Bug 1298119] Re: CVE-2014-0131

2014-07-16 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-raring -
3.8.0-44.66~precise1

---
linux-lts-raring (3.8.0-44.66~precise1) precise; urgency=low

  [ Upstream Kernel Changes ]

  * l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943

linux-lts-raring (3.8.0-44.65~precise1) precise; urgency=low

  [ Luis Henriques ]

  * Merged back Ubuntu-lts-3.8.0-42.63 security release
  * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699)
- LP: #1337339
  * Release Tracking Bug
- LP: #1338579

  [ Upstream Kernel Changes ]

  * ptrace,x86: force IRET path after a ptrace_stop()
- LP: #1337339
- CVE-2014-4699

linux-lts-raring (3.8.0-43.64~precise1) precise; urgency=low

  [ Kamal Mostafa ]

  * Revert ARM: OMAP3: clock: Back-propagate rate change from
cam_mclk to dpll4_m5 on all OMAP3 platforms
  * Release Tracking Bug
- re-used previous tracking bug

linux-lts-raring (3.8.0-43.63~precise1) precise; urgency=low

  [ Kamal Mostafa ]

  * [Config] add debian/gbp.conf
  * Release Tracking Bug
- LP: #1335912

  [ Upstream Kernel Changes ]

  * Revert USB: serial: add usbid for dell wwan card to sierra.c
- LP: #1333900
  * Revert macvlan : fix checksums error when we are in bridge mode
- LP: #1333900
  * auditsc: audit_krule mask accesses need bounds checking
- LP: #1325941
- CVE-2014-3917
  * fs, userns: Change inode_capable to capable_wrt_inode_uidgid
- LP: #1329103
- CVE-2014-4014
  * ACPI / EC: Clear stale EC events on Samsung systems
- LP: #1333900
  * ACPI / EC: Process rather than discard events in acpi_ec_clear
- LP: #1333900
  * mac80211: fix software remain-on-channel implementation
- LP: #1333900
  * mac80211: exclude AP_VLAN interfaces from tx power calculation
- LP: #1333900
  * parisc: fix epoll_pwait syscall on compat kernel
- LP: #1333900
  * ALSA: hda/realtek - Add support of ALC288 codec
- LP: #1333900
  * user namespace: fix incorrect memory barriers
- LP: #1333900
  * mlx4_en: don't use napi_synchronize inside mlx4_en_netpoll
- LP: #1333900
  * mei: ignore client writing state during cb completion
- LP: #1333900
  * staging: r8712u: Fix case where ethtype was never obtained and always
be checked against 0
- LP: #1333900
  * USB: serial: ftdi_sio: add id for Brainboxes serial cards
- LP: #1333900
  * usb: option driver, add support for Telit UE910v2
- LP: #1333900
  * USB: cp210x: Add 8281 (Nanotec Plug  Drive)
- LP: #1333900
  * USB: pl2303: add ids for Hewlett-Packard HP POS pole displays
- LP: #1333900
  * USB: usb_wwan: fix handling of missing bulk endpoints
- LP: #1333900
  * USB: fix crash during hotplug of PCI USB controller card
- LP: #1333900
  * USB: cdc-acm: Remove Motorola/Telit H24 serial interfaces from ACM
driver
- LP: #1333900
  * drm/radeon: memory leak on bo reservation failure. v2
- LP: #1333900
  * drm/radeon/si: make sure mc ucode is loaded before checking the size
- LP: #1333900
  * mm/hugetlb.c: add cond_resched_lock() in return_unused_surplus_pages()
- LP: #1333900
  * mm: use paravirt friendly ops for NUMA hinting ptes
- LP: #1333900
  * iio: querying buffer scan_mask should return 0/1
- LP: #1333900
  * pata_at91: fix ata_host_activate() failure handling
- LP: #1333900
  * ext4: note the error in ext4_end_bio()
- LP: #1333900
  * ext4: fix jbd2 warning under heavy xattr load
- LP: #1333900
  * ext4: use i_size_read in ext4_unaligned_aio()
- LP: #1333900
  * locks: allow __break_lease to sleep even when break_time is 0
- LP: #1333900
  * genirq: Allow forcing cpu affinity of interrupts
- LP: #1333900
  * nfsd: set timeparms.to_maxval in setup_callback_client
- LP: #1333900
  * libata/ahci: accommodate tag ordered controllers
- LP: #1333900
  * Input: synaptics - add min/max quirk for ThinkPad T431s, L440, L540, S1
Yoga and X1
- LP: #1333900
  * drm/radeon: fix ATPX detection on non-VGA GPUs
- LP: #1333900
  * mm: make fixup_user_fault() check the vma access rights too
- LP: #1333900
  * ARM: 8027/1: fix do_div() bug in big-endian systems
- LP: #1333900
  * ARM: 8030/1: ARM : kdump : add arch_crash_save_vmcoreinfo
- LP: #1333900
  * USB: serial: fix sysfs-attribute removal deadlock
- LP: #1333900
  * Btrfs: fix inode caching vs tree log
- LP: #1333900
  * xhci: Switch Intel Lynx Point ports to EHCI on shutdown.
- LP: #1333900
  * USB: io_ti: fix firmware download on big-endian machines
- LP: #1333900
  * usb: qcserial: add Sierra Wireless EM7355
- LP: #1333900
  * usb: qcserial: add Sierra Wireless MC73xx
- LP: #1333900
  * usb: qcserial: add Sierra Wireless MC7305/MC7355
- LP: #1333900
  * usb: option: add Olivetti Olicard 500
- LP: #1333900
  * usb: option: add Alcatel L800MA
- LP: #1333900
  * usb: option: add and update a number of CMOTech devices
- LP: #1333900
  * list: 

[Kernel-packages] [Bug 1329103] Re: CVE-2014-4014

2014-07-16 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-raring -
3.8.0-44.66~precise1

---
linux-lts-raring (3.8.0-44.66~precise1) precise; urgency=low

  [ Upstream Kernel Changes ]

  * l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943

linux-lts-raring (3.8.0-44.65~precise1) precise; urgency=low

  [ Luis Henriques ]

  * Merged back Ubuntu-lts-3.8.0-42.63 security release
  * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699)
- LP: #1337339
  * Release Tracking Bug
- LP: #1338579

  [ Upstream Kernel Changes ]

  * ptrace,x86: force IRET path after a ptrace_stop()
- LP: #1337339
- CVE-2014-4699

linux-lts-raring (3.8.0-43.64~precise1) precise; urgency=low

  [ Kamal Mostafa ]

  * Revert ARM: OMAP3: clock: Back-propagate rate change from
cam_mclk to dpll4_m5 on all OMAP3 platforms
  * Release Tracking Bug
- re-used previous tracking bug

linux-lts-raring (3.8.0-43.63~precise1) precise; urgency=low

  [ Kamal Mostafa ]

  * [Config] add debian/gbp.conf
  * Release Tracking Bug
- LP: #1335912

  [ Upstream Kernel Changes ]

  * Revert USB: serial: add usbid for dell wwan card to sierra.c
- LP: #1333900
  * Revert macvlan : fix checksums error when we are in bridge mode
- LP: #1333900
  * auditsc: audit_krule mask accesses need bounds checking
- LP: #1325941
- CVE-2014-3917
  * fs, userns: Change inode_capable to capable_wrt_inode_uidgid
- LP: #1329103
- CVE-2014-4014
  * ACPI / EC: Clear stale EC events on Samsung systems
- LP: #1333900
  * ACPI / EC: Process rather than discard events in acpi_ec_clear
- LP: #1333900
  * mac80211: fix software remain-on-channel implementation
- LP: #1333900
  * mac80211: exclude AP_VLAN interfaces from tx power calculation
- LP: #1333900
  * parisc: fix epoll_pwait syscall on compat kernel
- LP: #1333900
  * ALSA: hda/realtek - Add support of ALC288 codec
- LP: #1333900
  * user namespace: fix incorrect memory barriers
- LP: #1333900
  * mlx4_en: don't use napi_synchronize inside mlx4_en_netpoll
- LP: #1333900
  * mei: ignore client writing state during cb completion
- LP: #1333900
  * staging: r8712u: Fix case where ethtype was never obtained and always
be checked against 0
- LP: #1333900
  * USB: serial: ftdi_sio: add id for Brainboxes serial cards
- LP: #1333900
  * usb: option driver, add support for Telit UE910v2
- LP: #1333900
  * USB: cp210x: Add 8281 (Nanotec Plug  Drive)
- LP: #1333900
  * USB: pl2303: add ids for Hewlett-Packard HP POS pole displays
- LP: #1333900
  * USB: usb_wwan: fix handling of missing bulk endpoints
- LP: #1333900
  * USB: fix crash during hotplug of PCI USB controller card
- LP: #1333900
  * USB: cdc-acm: Remove Motorola/Telit H24 serial interfaces from ACM
driver
- LP: #1333900
  * drm/radeon: memory leak on bo reservation failure. v2
- LP: #1333900
  * drm/radeon/si: make sure mc ucode is loaded before checking the size
- LP: #1333900
  * mm/hugetlb.c: add cond_resched_lock() in return_unused_surplus_pages()
- LP: #1333900
  * mm: use paravirt friendly ops for NUMA hinting ptes
- LP: #1333900
  * iio: querying buffer scan_mask should return 0/1
- LP: #1333900
  * pata_at91: fix ata_host_activate() failure handling
- LP: #1333900
  * ext4: note the error in ext4_end_bio()
- LP: #1333900
  * ext4: fix jbd2 warning under heavy xattr load
- LP: #1333900
  * ext4: use i_size_read in ext4_unaligned_aio()
- LP: #1333900
  * locks: allow __break_lease to sleep even when break_time is 0
- LP: #1333900
  * genirq: Allow forcing cpu affinity of interrupts
- LP: #1333900
  * nfsd: set timeparms.to_maxval in setup_callback_client
- LP: #1333900
  * libata/ahci: accommodate tag ordered controllers
- LP: #1333900
  * Input: synaptics - add min/max quirk for ThinkPad T431s, L440, L540, S1
Yoga and X1
- LP: #1333900
  * drm/radeon: fix ATPX detection on non-VGA GPUs
- LP: #1333900
  * mm: make fixup_user_fault() check the vma access rights too
- LP: #1333900
  * ARM: 8027/1: fix do_div() bug in big-endian systems
- LP: #1333900
  * ARM: 8030/1: ARM : kdump : add arch_crash_save_vmcoreinfo
- LP: #1333900
  * USB: serial: fix sysfs-attribute removal deadlock
- LP: #1333900
  * Btrfs: fix inode caching vs tree log
- LP: #1333900
  * xhci: Switch Intel Lynx Point ports to EHCI on shutdown.
- LP: #1333900
  * USB: io_ti: fix firmware download on big-endian machines
- LP: #1333900
  * usb: qcserial: add Sierra Wireless EM7355
- LP: #1333900
  * usb: qcserial: add Sierra Wireless MC73xx
- LP: #1333900
  * usb: qcserial: add Sierra Wireless MC7305/MC7355
- LP: #1333900
  * usb: option: add Olivetti Olicard 500
- LP: #1333900
  * usb: option: add Alcatel L800MA
- LP: #1333900
  * usb: option: add and update a number of CMOTech devices
- LP: #1333900
  * list: 

[Kernel-packages] [Bug 1338654] Re: linux: 3.2.0-67.101 -proposed tracker

2014-07-16 Thread Adam Conrad
** Changed in: kernel-sru-workflow/promote-to-security
   Status: New = Fix Released

** Changed in: kernel-sru-workflow/promote-to-security
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Adam Conrad 
(adconrad)

** Changed in: kernel-sru-workflow/promote-to-updates
   Status: New = Fix Released

** Changed in: kernel-sru-workflow/promote-to-updates
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Adam Conrad 
(adconrad)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1338654

Title:
  linux: 3.2.0-67.101 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Confirmed
Status in Kernel SRU Workflow package-testing series:
  Fix Released
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-lbm series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Fix Released
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  In Progress
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in “linux” package in Ubuntu:
  Invalid
Status in “linux” source package in Precise:
  Fix Released

Bug description:
  This bug is for tracking the 3.2.0-67.100 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Monday, 07. July 2014 16:11 UTC
  kernel-stable-Prepare-package-end:Tuesday, 08. July 2014 04:12 UTC
  kernel-stable-Promote-to-proposed-start:Tuesday, 08. July 2014 04:12 UTC
  ppa-package-testing-start:Tuesday, 08. July 2014 04:12 UTC
  kernel-stable-Promote-to-proposed-end:Wednesday, 09. July 2014 22:01 UTC
  kernel-stable-Verification-testing-start:Wednesday, 09. July 2014 23:01 UTC
  kernel-stable-Certification-testing-start:Wednesday, 09. July 2014 23:01 UTC
  kernel-stable-Security-signoff-start:Wednesday, 09. July 2014 23:01 UTC
  kernel-stable-Regression-testing-start:Wednesday, 09. July 2014 23:01 UTC
  kernel-stable-Regression-testing-end:Friday, 11. July 2014 22:03 UTC
  kernel-stable-phase:Testing
  kernel-stable-phase-changed:Monday, 14. July 2014 13:04 UTC
  kernel-stable-Verification-testing-end:Monday, 14. July 2014 13:04 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1338654/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1335084] Re: Saucy update to 3.11.10.12 stable release

2014-07-16 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.11.0-26.45

---
linux (3.11.0-26.45) saucy; urgency=low

  [ Upstream Kernel Changes ]

  * l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943

linux (3.11.0-26.44) saucy; urgency=low

  [ Luis Henriques ]

  * Merged back Ubuntu-3.11.0-24.42 security release
  * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699)
- LP: #1337339
  * Release Tracking Bug
- LP: #1338556

  [ Upstream Kernel Changes ]

  * ptrace,x86: force IRET path after a ptrace_stop()
- LP: #1337339
- CVE-2014-4699

linux (3.11.0-25.43) saucy; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1336203

  [ Upstream Kernel Changes ]

  * cfg80211: free sme on connection failures
- LP: #1335084
  * sched: Sanitize irq accounting madness
- LP: #1335084
  * sched: Use CPUPRI_NR_PRIORITIES instead of MAX_RT_PRIO in cpupri check
- LP: #1335084
  * net: cpsw: fix null dereference at probe
- LP: #1335084
  * mac80211: fix suspend vs. association race
- LP: #1335084
  * mac80211: fix on-channel remain-on-channel
- LP: #1335084
  * af_iucv: wrong mapping of sent and confirmed skbs
- LP: #1335084
  * net: filter: s390: fix JIT address randomization
- LP: #1335084
  * perf: Limit perf_event_attr::sample_period to 63 bits
- LP: #1335084
  * perf: Prevent false warning in perf_swevent_add
- LP: #1335084
  * drm/gf119-/disp: fix nasty bug which can clobber SOR0's clock setup
- LP: #1335084
  * drm/radeon: also try GART for CPU accessed buffers
- LP: #1335084
  * drm/radeon: handle non-VGA class pci devices with ATRM
- LP: #1335084
  * drm/radeon: fix register typo on si
- LP: #1335084
  * drm/radeon: avoid segfault on device open when accel is not working.
- LP: #1335084
  * can: peak_pci: prevent use after free at netdev removal
- LP: #1335084
  * nfsd4: remove lockowner when removing lock stateid
- LP: #1335084
  * nfsd4: warn on finding lockowner without stateid's
- LP: #1335084
  * hwpoison, hugetlb: lock_page/unlock_page does not match for handling a
free hugepage
- LP: #1335084
  * mm/memory-failure.c: fix memory leak by race between poison and
unpoison
- LP: #1335084
  * netfilter: ipv4: defrag: set local_df flag on defragmented skb
- LP: #1335084
  * ARM: OMAP3: clock: Back-propagate rate change from cam_mclk to dpll4_m5
on all OMAP3 platforms
- LP: #1335084
  * dma: dw: allow shared interrupts
- LP: #1335084
  * dmaengine: dw: went back to plain {request,free}_irq() calls
- LP: #1335084
  * ARM: omap5: hwmod_data: Correct IDLEMODE for McPDM
- LP: #1335084
  * Input: synaptics - add min/max quirk for the ThinkPad W540
- LP: #1335084
  * futex: Add another early deadlock detection check
- LP: #1335084
  * futex: Prevent attaching to kernel threads
- LP: #1335084
  * ARM: OMAP4: Fix the boot regression with CPU_IDLE enabled
- LP: #1335084
  * cpufreq: remove race while accessing cur_policy
- LP: #1335084
  * cpufreq: cpu0: drop wrong devm usage
- LP: #1335084
  * ARM: imx: fix error handling in ipu device registration
- LP: #1335084
  * ALSA: hda - Fix onboard audio on Intel H97/Z97 chipsets
- LP: #1335084
  * ARM: 8051/1: put_user: fix possible data corruption in put_user
- LP: #1335084
  * ARM: 8064/1: fix v7-M signal return
- LP: #1335084
  * Input: synaptics - T540p - unify with other LEN0034 models
- LP: #1335084
  * drm/i915: Only copy back the modified fields to userspace from
execbuffer
- LP: #1335084
  * dm cache: always split discards on cache block boundaries
- LP: #1335084
  * powerpc: Fix 64 bit builds with binutils 2.24
- LP: #1335084
  * powerpc, kexec: Fix Processor X is stuck issue during kexec from ST
mode
- LP: #1335084
  * rtmutex: Fix deadlock detector for real
- LP: #1335084
  * drm/radeon: don't allow RADEON_GEM_DOMAIN_CPU for command submission
- LP: #1335084
  * audit: restore order of tty and ses fields in log output
- LP: #1335084
  * drm/nouveau/pm/fan: drop the fan lock in fan_update() before
rescheduling
- LP: #1335084
  * leds: leds-pwm: properly clean up after probe failure
- LP: #1335084
  * clk: vexpress: NULL dereference on error path
- LP: #1335084
  * fix our current target reap infrastructure
- LP: #1335084
  * dual scan thread bug fix
- LP: #1335084
  * genirq: Provide irq_force_affinity fallback for non-SMP
- LP: #1335084
  * i2c: designware: Mask all interrupts during i2c controller enable
- LP: #1335084
  * crypto: s390 - fix aes,des ctr mode concurrency finding.
- LP: #1335084
  * Staging: speakup: Move pasting into a work item
- LP: #1335084
  * USB: Avoid runtime suspend loops for HCDs that can't handle
suspend/resume
- LP: #1335084
  * can: only rename enabled led triggers when changing the netdev name
- LP: #1335084
  

[Kernel-packages] [Bug 1335084] Re: Saucy update to 3.11.10.12 stable release

2014-07-16 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.11.0-26.45

---
linux (3.11.0-26.45) saucy; urgency=low

  [ Upstream Kernel Changes ]

  * l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943

linux (3.11.0-26.44) saucy; urgency=low

  [ Luis Henriques ]

  * Merged back Ubuntu-3.11.0-24.42 security release
  * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699)
- LP: #1337339
  * Release Tracking Bug
- LP: #1338556

  [ Upstream Kernel Changes ]

  * ptrace,x86: force IRET path after a ptrace_stop()
- LP: #1337339
- CVE-2014-4699

linux (3.11.0-25.43) saucy; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1336203

  [ Upstream Kernel Changes ]

  * cfg80211: free sme on connection failures
- LP: #1335084
  * sched: Sanitize irq accounting madness
- LP: #1335084
  * sched: Use CPUPRI_NR_PRIORITIES instead of MAX_RT_PRIO in cpupri check
- LP: #1335084
  * net: cpsw: fix null dereference at probe
- LP: #1335084
  * mac80211: fix suspend vs. association race
- LP: #1335084
  * mac80211: fix on-channel remain-on-channel
- LP: #1335084
  * af_iucv: wrong mapping of sent and confirmed skbs
- LP: #1335084
  * net: filter: s390: fix JIT address randomization
- LP: #1335084
  * perf: Limit perf_event_attr::sample_period to 63 bits
- LP: #1335084
  * perf: Prevent false warning in perf_swevent_add
- LP: #1335084
  * drm/gf119-/disp: fix nasty bug which can clobber SOR0's clock setup
- LP: #1335084
  * drm/radeon: also try GART for CPU accessed buffers
- LP: #1335084
  * drm/radeon: handle non-VGA class pci devices with ATRM
- LP: #1335084
  * drm/radeon: fix register typo on si
- LP: #1335084
  * drm/radeon: avoid segfault on device open when accel is not working.
- LP: #1335084
  * can: peak_pci: prevent use after free at netdev removal
- LP: #1335084
  * nfsd4: remove lockowner when removing lock stateid
- LP: #1335084
  * nfsd4: warn on finding lockowner without stateid's
- LP: #1335084
  * hwpoison, hugetlb: lock_page/unlock_page does not match for handling a
free hugepage
- LP: #1335084
  * mm/memory-failure.c: fix memory leak by race between poison and
unpoison
- LP: #1335084
  * netfilter: ipv4: defrag: set local_df flag on defragmented skb
- LP: #1335084
  * ARM: OMAP3: clock: Back-propagate rate change from cam_mclk to dpll4_m5
on all OMAP3 platforms
- LP: #1335084
  * dma: dw: allow shared interrupts
- LP: #1335084
  * dmaengine: dw: went back to plain {request,free}_irq() calls
- LP: #1335084
  * ARM: omap5: hwmod_data: Correct IDLEMODE for McPDM
- LP: #1335084
  * Input: synaptics - add min/max quirk for the ThinkPad W540
- LP: #1335084
  * futex: Add another early deadlock detection check
- LP: #1335084
  * futex: Prevent attaching to kernel threads
- LP: #1335084
  * ARM: OMAP4: Fix the boot regression with CPU_IDLE enabled
- LP: #1335084
  * cpufreq: remove race while accessing cur_policy
- LP: #1335084
  * cpufreq: cpu0: drop wrong devm usage
- LP: #1335084
  * ARM: imx: fix error handling in ipu device registration
- LP: #1335084
  * ALSA: hda - Fix onboard audio on Intel H97/Z97 chipsets
- LP: #1335084
  * ARM: 8051/1: put_user: fix possible data corruption in put_user
- LP: #1335084
  * ARM: 8064/1: fix v7-M signal return
- LP: #1335084
  * Input: synaptics - T540p - unify with other LEN0034 models
- LP: #1335084
  * drm/i915: Only copy back the modified fields to userspace from
execbuffer
- LP: #1335084
  * dm cache: always split discards on cache block boundaries
- LP: #1335084
  * powerpc: Fix 64 bit builds with binutils 2.24
- LP: #1335084
  * powerpc, kexec: Fix Processor X is stuck issue during kexec from ST
mode
- LP: #1335084
  * rtmutex: Fix deadlock detector for real
- LP: #1335084
  * drm/radeon: don't allow RADEON_GEM_DOMAIN_CPU for command submission
- LP: #1335084
  * audit: restore order of tty and ses fields in log output
- LP: #1335084
  * drm/nouveau/pm/fan: drop the fan lock in fan_update() before
rescheduling
- LP: #1335084
  * leds: leds-pwm: properly clean up after probe failure
- LP: #1335084
  * clk: vexpress: NULL dereference on error path
- LP: #1335084
  * fix our current target reap infrastructure
- LP: #1335084
  * dual scan thread bug fix
- LP: #1335084
  * genirq: Provide irq_force_affinity fallback for non-SMP
- LP: #1335084
  * i2c: designware: Mask all interrupts during i2c controller enable
- LP: #1335084
  * crypto: s390 - fix aes,des ctr mode concurrency finding.
- LP: #1335084
  * Staging: speakup: Move pasting into a work item
- LP: #1335084
  * USB: Avoid runtime suspend loops for HCDs that can't handle
suspend/resume
- LP: #1335084
  * can: only rename enabled led triggers when changing the netdev name
- LP: #1335084
  

[Kernel-packages] [Bug 1336143] Re: linux-ti-omap4: 3.2.0-1451.71 -proposed tracker

2014-07-16 Thread Adam Conrad
** Changed in: kernel-sru-workflow/promote-to-security
   Status: New = Fix Released

** Changed in: kernel-sru-workflow/promote-to-security
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Adam Conrad 
(adconrad)

** Changed in: kernel-sru-workflow/promote-to-updates
   Status: New = Fix Released

** Changed in: kernel-sru-workflow/promote-to-updates
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Adam Conrad 
(adconrad)

** Changed in: linux-ti-omap4 (Ubuntu Precise)
   Status: New = Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-ti-omap4 in Ubuntu.
https://bugs.launchpad.net/bugs/1336143

Title:
  linux-ti-omap4: 3.2.0-1451.71 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow package-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Fix Released
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  In Progress
Status in Kernel SRU Workflow upload-to-ppa series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  In Progress
Status in “linux-ti-omap4” package in Ubuntu:
  Invalid
Status in “linux-ti-omap4” source package in Precise:
  Fix Released

Bug description:
  This bug is for tracking the version to be filled upload package.
  This bug will contain status and testing results related to that
  upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 01. July 2014 04:53 UTC
  kernel-stable-master-bug:1338654
  kernel-stable-Certification-testing-end:Thursday, 03. July 2014 01:55 UTC
  kernel-stable-Prepare-package-end:Wednesday, 09. July 2014 17:00 UTC
  kernel-stable-Promote-to-proposed-start:Wednesday, 09. July 2014 17:00 UTC
  ppa-package-testing-start:Wednesday, 09. July 2014 17:00 UTC
  kernel-stable-Promote-to-proposed-end:Friday, 11. July 2014 16:17 UTC
  kernel-stable-phase:Verification  Testing
  kernel-stable-phase-changed:Friday, 11. July 2014 18:01 UTC
  kernel-stable-Security-signoff-start:Friday, 11. July 2014 18:01 UTC
  kernel-stable-Verification-testing-start:Friday, 11. July 2014 18:01 UTC
  kernel-stable-Regression-testing-start:Friday, 11. July 2014 18:01 UTC
  kernel-stable-Regression-testing-end:Tuesday, 15. July 2014 16:00 UTC
  kernel-stable-Promote-to-updates-end:Wednesday, 16. July 2014 20:00 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1336143/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1338556] Re: linux: 3.11.0-26.45 -proposed tracker

2014-07-16 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.11.0-26.45

---
linux (3.11.0-26.45) saucy; urgency=low

  [ Upstream Kernel Changes ]

  * l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943

linux (3.11.0-26.44) saucy; urgency=low

  [ Luis Henriques ]

  * Merged back Ubuntu-3.11.0-24.42 security release
  * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699)
- LP: #1337339
  * Release Tracking Bug
- LP: #1338556

  [ Upstream Kernel Changes ]

  * ptrace,x86: force IRET path after a ptrace_stop()
- LP: #1337339
- CVE-2014-4699

linux (3.11.0-25.43) saucy; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1336203

  [ Upstream Kernel Changes ]

  * cfg80211: free sme on connection failures
- LP: #1335084
  * sched: Sanitize irq accounting madness
- LP: #1335084
  * sched: Use CPUPRI_NR_PRIORITIES instead of MAX_RT_PRIO in cpupri check
- LP: #1335084
  * net: cpsw: fix null dereference at probe
- LP: #1335084
  * mac80211: fix suspend vs. association race
- LP: #1335084
  * mac80211: fix on-channel remain-on-channel
- LP: #1335084
  * af_iucv: wrong mapping of sent and confirmed skbs
- LP: #1335084
  * net: filter: s390: fix JIT address randomization
- LP: #1335084
  * perf: Limit perf_event_attr::sample_period to 63 bits
- LP: #1335084
  * perf: Prevent false warning in perf_swevent_add
- LP: #1335084
  * drm/gf119-/disp: fix nasty bug which can clobber SOR0's clock setup
- LP: #1335084
  * drm/radeon: also try GART for CPU accessed buffers
- LP: #1335084
  * drm/radeon: handle non-VGA class pci devices with ATRM
- LP: #1335084
  * drm/radeon: fix register typo on si
- LP: #1335084
  * drm/radeon: avoid segfault on device open when accel is not working.
- LP: #1335084
  * can: peak_pci: prevent use after free at netdev removal
- LP: #1335084
  * nfsd4: remove lockowner when removing lock stateid
- LP: #1335084
  * nfsd4: warn on finding lockowner without stateid's
- LP: #1335084
  * hwpoison, hugetlb: lock_page/unlock_page does not match for handling a
free hugepage
- LP: #1335084
  * mm/memory-failure.c: fix memory leak by race between poison and
unpoison
- LP: #1335084
  * netfilter: ipv4: defrag: set local_df flag on defragmented skb
- LP: #1335084
  * ARM: OMAP3: clock: Back-propagate rate change from cam_mclk to dpll4_m5
on all OMAP3 platforms
- LP: #1335084
  * dma: dw: allow shared interrupts
- LP: #1335084
  * dmaengine: dw: went back to plain {request,free}_irq() calls
- LP: #1335084
  * ARM: omap5: hwmod_data: Correct IDLEMODE for McPDM
- LP: #1335084
  * Input: synaptics - add min/max quirk for the ThinkPad W540
- LP: #1335084
  * futex: Add another early deadlock detection check
- LP: #1335084
  * futex: Prevent attaching to kernel threads
- LP: #1335084
  * ARM: OMAP4: Fix the boot regression with CPU_IDLE enabled
- LP: #1335084
  * cpufreq: remove race while accessing cur_policy
- LP: #1335084
  * cpufreq: cpu0: drop wrong devm usage
- LP: #1335084
  * ARM: imx: fix error handling in ipu device registration
- LP: #1335084
  * ALSA: hda - Fix onboard audio on Intel H97/Z97 chipsets
- LP: #1335084
  * ARM: 8051/1: put_user: fix possible data corruption in put_user
- LP: #1335084
  * ARM: 8064/1: fix v7-M signal return
- LP: #1335084
  * Input: synaptics - T540p - unify with other LEN0034 models
- LP: #1335084
  * drm/i915: Only copy back the modified fields to userspace from
execbuffer
- LP: #1335084
  * dm cache: always split discards on cache block boundaries
- LP: #1335084
  * powerpc: Fix 64 bit builds with binutils 2.24
- LP: #1335084
  * powerpc, kexec: Fix Processor X is stuck issue during kexec from ST
mode
- LP: #1335084
  * rtmutex: Fix deadlock detector for real
- LP: #1335084
  * drm/radeon: don't allow RADEON_GEM_DOMAIN_CPU for command submission
- LP: #1335084
  * audit: restore order of tty and ses fields in log output
- LP: #1335084
  * drm/nouveau/pm/fan: drop the fan lock in fan_update() before
rescheduling
- LP: #1335084
  * leds: leds-pwm: properly clean up after probe failure
- LP: #1335084
  * clk: vexpress: NULL dereference on error path
- LP: #1335084
  * fix our current target reap infrastructure
- LP: #1335084
  * dual scan thread bug fix
- LP: #1335084
  * genirq: Provide irq_force_affinity fallback for non-SMP
- LP: #1335084
  * i2c: designware: Mask all interrupts during i2c controller enable
- LP: #1335084
  * crypto: s390 - fix aes,des ctr mode concurrency finding.
- LP: #1335084
  * Staging: speakup: Move pasting into a work item
- LP: #1335084
  * USB: Avoid runtime suspend loops for HCDs that can't handle
suspend/resume
- LP: #1335084
  * can: only rename enabled led triggers when changing the netdev name
- LP: #1335084
  

[Kernel-packages] [Bug 1336203] Re: linux: 3.11.0-25.43 -proposed tracker

2014-07-16 Thread Launchpad Bug Tracker
*** This bug is a duplicate of bug 1338556 ***
https://bugs.launchpad.net/bugs/1338556

This bug was fixed in the package linux - 3.11.0-26.45

---
linux (3.11.0-26.45) saucy; urgency=low

  [ Upstream Kernel Changes ]

  * l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943

linux (3.11.0-26.44) saucy; urgency=low

  [ Luis Henriques ]

  * Merged back Ubuntu-3.11.0-24.42 security release
  * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699)
- LP: #1337339
  * Release Tracking Bug
- LP: #1338556

  [ Upstream Kernel Changes ]

  * ptrace,x86: force IRET path after a ptrace_stop()
- LP: #1337339
- CVE-2014-4699

linux (3.11.0-25.43) saucy; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1336203

  [ Upstream Kernel Changes ]

  * cfg80211: free sme on connection failures
- LP: #1335084
  * sched: Sanitize irq accounting madness
- LP: #1335084
  * sched: Use CPUPRI_NR_PRIORITIES instead of MAX_RT_PRIO in cpupri check
- LP: #1335084
  * net: cpsw: fix null dereference at probe
- LP: #1335084
  * mac80211: fix suspend vs. association race
- LP: #1335084
  * mac80211: fix on-channel remain-on-channel
- LP: #1335084
  * af_iucv: wrong mapping of sent and confirmed skbs
- LP: #1335084
  * net: filter: s390: fix JIT address randomization
- LP: #1335084
  * perf: Limit perf_event_attr::sample_period to 63 bits
- LP: #1335084
  * perf: Prevent false warning in perf_swevent_add
- LP: #1335084
  * drm/gf119-/disp: fix nasty bug which can clobber SOR0's clock setup
- LP: #1335084
  * drm/radeon: also try GART for CPU accessed buffers
- LP: #1335084
  * drm/radeon: handle non-VGA class pci devices with ATRM
- LP: #1335084
  * drm/radeon: fix register typo on si
- LP: #1335084
  * drm/radeon: avoid segfault on device open when accel is not working.
- LP: #1335084
  * can: peak_pci: prevent use after free at netdev removal
- LP: #1335084
  * nfsd4: remove lockowner when removing lock stateid
- LP: #1335084
  * nfsd4: warn on finding lockowner without stateid's
- LP: #1335084
  * hwpoison, hugetlb: lock_page/unlock_page does not match for handling a
free hugepage
- LP: #1335084
  * mm/memory-failure.c: fix memory leak by race between poison and
unpoison
- LP: #1335084
  * netfilter: ipv4: defrag: set local_df flag on defragmented skb
- LP: #1335084
  * ARM: OMAP3: clock: Back-propagate rate change from cam_mclk to dpll4_m5
on all OMAP3 platforms
- LP: #1335084
  * dma: dw: allow shared interrupts
- LP: #1335084
  * dmaengine: dw: went back to plain {request,free}_irq() calls
- LP: #1335084
  * ARM: omap5: hwmod_data: Correct IDLEMODE for McPDM
- LP: #1335084
  * Input: synaptics - add min/max quirk for the ThinkPad W540
- LP: #1335084
  * futex: Add another early deadlock detection check
- LP: #1335084
  * futex: Prevent attaching to kernel threads
- LP: #1335084
  * ARM: OMAP4: Fix the boot regression with CPU_IDLE enabled
- LP: #1335084
  * cpufreq: remove race while accessing cur_policy
- LP: #1335084
  * cpufreq: cpu0: drop wrong devm usage
- LP: #1335084
  * ARM: imx: fix error handling in ipu device registration
- LP: #1335084
  * ALSA: hda - Fix onboard audio on Intel H97/Z97 chipsets
- LP: #1335084
  * ARM: 8051/1: put_user: fix possible data corruption in put_user
- LP: #1335084
  * ARM: 8064/1: fix v7-M signal return
- LP: #1335084
  * Input: synaptics - T540p - unify with other LEN0034 models
- LP: #1335084
  * drm/i915: Only copy back the modified fields to userspace from
execbuffer
- LP: #1335084
  * dm cache: always split discards on cache block boundaries
- LP: #1335084
  * powerpc: Fix 64 bit builds with binutils 2.24
- LP: #1335084
  * powerpc, kexec: Fix Processor X is stuck issue during kexec from ST
mode
- LP: #1335084
  * rtmutex: Fix deadlock detector for real
- LP: #1335084
  * drm/radeon: don't allow RADEON_GEM_DOMAIN_CPU for command submission
- LP: #1335084
  * audit: restore order of tty and ses fields in log output
- LP: #1335084
  * drm/nouveau/pm/fan: drop the fan lock in fan_update() before
rescheduling
- LP: #1335084
  * leds: leds-pwm: properly clean up after probe failure
- LP: #1335084
  * clk: vexpress: NULL dereference on error path
- LP: #1335084
  * fix our current target reap infrastructure
- LP: #1335084
  * dual scan thread bug fix
- LP: #1335084
  * genirq: Provide irq_force_affinity fallback for non-SMP
- LP: #1335084
  * i2c: designware: Mask all interrupts during i2c controller enable
- LP: #1335084
  * crypto: s390 - fix aes,des ctr mode concurrency finding.
- LP: #1335084
  * Staging: speakup: Move pasting into a work item
- LP: #1335084
  * USB: Avoid runtime suspend loops for HCDs that can't handle
suspend/resume
- LP: #1335084
 

[Kernel-packages] [Bug 1335313] Re: CVE-2014-4608

2014-07-16 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.11.0-26.45

---
linux (3.11.0-26.45) saucy; urgency=low

  [ Upstream Kernel Changes ]

  * l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943

linux (3.11.0-26.44) saucy; urgency=low

  [ Luis Henriques ]

  * Merged back Ubuntu-3.11.0-24.42 security release
  * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699)
- LP: #1337339
  * Release Tracking Bug
- LP: #1338556

  [ Upstream Kernel Changes ]

  * ptrace,x86: force IRET path after a ptrace_stop()
- LP: #1337339
- CVE-2014-4699

linux (3.11.0-25.43) saucy; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1336203

  [ Upstream Kernel Changes ]

  * cfg80211: free sme on connection failures
- LP: #1335084
  * sched: Sanitize irq accounting madness
- LP: #1335084
  * sched: Use CPUPRI_NR_PRIORITIES instead of MAX_RT_PRIO in cpupri check
- LP: #1335084
  * net: cpsw: fix null dereference at probe
- LP: #1335084
  * mac80211: fix suspend vs. association race
- LP: #1335084
  * mac80211: fix on-channel remain-on-channel
- LP: #1335084
  * af_iucv: wrong mapping of sent and confirmed skbs
- LP: #1335084
  * net: filter: s390: fix JIT address randomization
- LP: #1335084
  * perf: Limit perf_event_attr::sample_period to 63 bits
- LP: #1335084
  * perf: Prevent false warning in perf_swevent_add
- LP: #1335084
  * drm/gf119-/disp: fix nasty bug which can clobber SOR0's clock setup
- LP: #1335084
  * drm/radeon: also try GART for CPU accessed buffers
- LP: #1335084
  * drm/radeon: handle non-VGA class pci devices with ATRM
- LP: #1335084
  * drm/radeon: fix register typo on si
- LP: #1335084
  * drm/radeon: avoid segfault on device open when accel is not working.
- LP: #1335084
  * can: peak_pci: prevent use after free at netdev removal
- LP: #1335084
  * nfsd4: remove lockowner when removing lock stateid
- LP: #1335084
  * nfsd4: warn on finding lockowner without stateid's
- LP: #1335084
  * hwpoison, hugetlb: lock_page/unlock_page does not match for handling a
free hugepage
- LP: #1335084
  * mm/memory-failure.c: fix memory leak by race between poison and
unpoison
- LP: #1335084
  * netfilter: ipv4: defrag: set local_df flag on defragmented skb
- LP: #1335084
  * ARM: OMAP3: clock: Back-propagate rate change from cam_mclk to dpll4_m5
on all OMAP3 platforms
- LP: #1335084
  * dma: dw: allow shared interrupts
- LP: #1335084
  * dmaengine: dw: went back to plain {request,free}_irq() calls
- LP: #1335084
  * ARM: omap5: hwmod_data: Correct IDLEMODE for McPDM
- LP: #1335084
  * Input: synaptics - add min/max quirk for the ThinkPad W540
- LP: #1335084
  * futex: Add another early deadlock detection check
- LP: #1335084
  * futex: Prevent attaching to kernel threads
- LP: #1335084
  * ARM: OMAP4: Fix the boot regression with CPU_IDLE enabled
- LP: #1335084
  * cpufreq: remove race while accessing cur_policy
- LP: #1335084
  * cpufreq: cpu0: drop wrong devm usage
- LP: #1335084
  * ARM: imx: fix error handling in ipu device registration
- LP: #1335084
  * ALSA: hda - Fix onboard audio on Intel H97/Z97 chipsets
- LP: #1335084
  * ARM: 8051/1: put_user: fix possible data corruption in put_user
- LP: #1335084
  * ARM: 8064/1: fix v7-M signal return
- LP: #1335084
  * Input: synaptics - T540p - unify with other LEN0034 models
- LP: #1335084
  * drm/i915: Only copy back the modified fields to userspace from
execbuffer
- LP: #1335084
  * dm cache: always split discards on cache block boundaries
- LP: #1335084
  * powerpc: Fix 64 bit builds with binutils 2.24
- LP: #1335084
  * powerpc, kexec: Fix Processor X is stuck issue during kexec from ST
mode
- LP: #1335084
  * rtmutex: Fix deadlock detector for real
- LP: #1335084
  * drm/radeon: don't allow RADEON_GEM_DOMAIN_CPU for command submission
- LP: #1335084
  * audit: restore order of tty and ses fields in log output
- LP: #1335084
  * drm/nouveau/pm/fan: drop the fan lock in fan_update() before
rescheduling
- LP: #1335084
  * leds: leds-pwm: properly clean up after probe failure
- LP: #1335084
  * clk: vexpress: NULL dereference on error path
- LP: #1335084
  * fix our current target reap infrastructure
- LP: #1335084
  * dual scan thread bug fix
- LP: #1335084
  * genirq: Provide irq_force_affinity fallback for non-SMP
- LP: #1335084
  * i2c: designware: Mask all interrupts during i2c controller enable
- LP: #1335084
  * crypto: s390 - fix aes,des ctr mode concurrency finding.
- LP: #1335084
  * Staging: speakup: Move pasting into a work item
- LP: #1335084
  * USB: Avoid runtime suspend loops for HCDs that can't handle
suspend/resume
- LP: #1335084
  * can: only rename enabled led triggers when changing the netdev name
- LP: #1335084
  

[Kernel-packages] [Bug 1338870] Re: linux-armadaxp: 3.2.0-1636.53 -proposed tracker

2014-07-16 Thread Adam Conrad
** Changed in: kernel-sru-workflow/promote-to-security
   Status: New = Fix Released

** Changed in: kernel-sru-workflow/promote-to-security
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Adam Conrad 
(adconrad)

** Changed in: kernel-sru-workflow/promote-to-updates
   Status: New = Fix Released

** Changed in: kernel-sru-workflow/promote-to-updates
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Adam Conrad 
(adconrad)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1338870

Title:
  linux-armadaxp: 3.2.0-1636.53 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow package-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Fix Released
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow upload-to-ppa series:
  Invalid
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in “linux-armadaxp” package in Ubuntu:
  Invalid
Status in “linux-armadaxp” source package in Precise:
  Fix Released

Bug description:
  This bug is for tracking the 3.2.0-1636.52 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 08. July 2014 04:06 UTC
  kernel-stable-master-bug:1338654
  kernel-stable-Certification-testing-end:Wednesday, 09. July 2014 07:05 UTC
  kernel-stable-Security-signoff-end:Wednesday, 09. July 2014 07:05 UTC
  kernel-stable-Prepare-package-end:Wednesday, 09. July 2014 11:04 UTC
  kernel-stable-Promote-to-proposed-start:Wednesday, 09. July 2014 11:04 UTC
  ppa-package-testing-start:Wednesday, 09. July 2014 11:04 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 10. July 2014 08:09 UTC
  kernel-stable-phase:Verification  Testing
  kernel-stable-phase-changed:Thursday, 10. July 2014 09:47 UTC
  kernel-stable-Verification-testing-start:Thursday, 10. July 2014 09:47 UTC
  kernel-stable-Regression-testing-start:Thursday, 10. July 2014 09:47 UTC
  kernel-stable-Regression-testing-end:Saturday, 12. July 2014 15:04 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1338870/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1325941] Re: CVE-2014-3917

2014-07-16 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-raring -
3.8.0-44.66~precise1

---
linux-lts-raring (3.8.0-44.66~precise1) precise; urgency=low

  [ Upstream Kernel Changes ]

  * l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943

linux-lts-raring (3.8.0-44.65~precise1) precise; urgency=low

  [ Luis Henriques ]

  * Merged back Ubuntu-lts-3.8.0-42.63 security release
  * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699)
- LP: #1337339
  * Release Tracking Bug
- LP: #1338579

  [ Upstream Kernel Changes ]

  * ptrace,x86: force IRET path after a ptrace_stop()
- LP: #1337339
- CVE-2014-4699

linux-lts-raring (3.8.0-43.64~precise1) precise; urgency=low

  [ Kamal Mostafa ]

  * Revert ARM: OMAP3: clock: Back-propagate rate change from
cam_mclk to dpll4_m5 on all OMAP3 platforms
  * Release Tracking Bug
- re-used previous tracking bug

linux-lts-raring (3.8.0-43.63~precise1) precise; urgency=low

  [ Kamal Mostafa ]

  * [Config] add debian/gbp.conf
  * Release Tracking Bug
- LP: #1335912

  [ Upstream Kernel Changes ]

  * Revert USB: serial: add usbid for dell wwan card to sierra.c
- LP: #1333900
  * Revert macvlan : fix checksums error when we are in bridge mode
- LP: #1333900
  * auditsc: audit_krule mask accesses need bounds checking
- LP: #1325941
- CVE-2014-3917
  * fs, userns: Change inode_capable to capable_wrt_inode_uidgid
- LP: #1329103
- CVE-2014-4014
  * ACPI / EC: Clear stale EC events on Samsung systems
- LP: #1333900
  * ACPI / EC: Process rather than discard events in acpi_ec_clear
- LP: #1333900
  * mac80211: fix software remain-on-channel implementation
- LP: #1333900
  * mac80211: exclude AP_VLAN interfaces from tx power calculation
- LP: #1333900
  * parisc: fix epoll_pwait syscall on compat kernel
- LP: #1333900
  * ALSA: hda/realtek - Add support of ALC288 codec
- LP: #1333900
  * user namespace: fix incorrect memory barriers
- LP: #1333900
  * mlx4_en: don't use napi_synchronize inside mlx4_en_netpoll
- LP: #1333900
  * mei: ignore client writing state during cb completion
- LP: #1333900
  * staging: r8712u: Fix case where ethtype was never obtained and always
be checked against 0
- LP: #1333900
  * USB: serial: ftdi_sio: add id for Brainboxes serial cards
- LP: #1333900
  * usb: option driver, add support for Telit UE910v2
- LP: #1333900
  * USB: cp210x: Add 8281 (Nanotec Plug  Drive)
- LP: #1333900
  * USB: pl2303: add ids for Hewlett-Packard HP POS pole displays
- LP: #1333900
  * USB: usb_wwan: fix handling of missing bulk endpoints
- LP: #1333900
  * USB: fix crash during hotplug of PCI USB controller card
- LP: #1333900
  * USB: cdc-acm: Remove Motorola/Telit H24 serial interfaces from ACM
driver
- LP: #1333900
  * drm/radeon: memory leak on bo reservation failure. v2
- LP: #1333900
  * drm/radeon/si: make sure mc ucode is loaded before checking the size
- LP: #1333900
  * mm/hugetlb.c: add cond_resched_lock() in return_unused_surplus_pages()
- LP: #1333900
  * mm: use paravirt friendly ops for NUMA hinting ptes
- LP: #1333900
  * iio: querying buffer scan_mask should return 0/1
- LP: #1333900
  * pata_at91: fix ata_host_activate() failure handling
- LP: #1333900
  * ext4: note the error in ext4_end_bio()
- LP: #1333900
  * ext4: fix jbd2 warning under heavy xattr load
- LP: #1333900
  * ext4: use i_size_read in ext4_unaligned_aio()
- LP: #1333900
  * locks: allow __break_lease to sleep even when break_time is 0
- LP: #1333900
  * genirq: Allow forcing cpu affinity of interrupts
- LP: #1333900
  * nfsd: set timeparms.to_maxval in setup_callback_client
- LP: #1333900
  * libata/ahci: accommodate tag ordered controllers
- LP: #1333900
  * Input: synaptics - add min/max quirk for ThinkPad T431s, L440, L540, S1
Yoga and X1
- LP: #1333900
  * drm/radeon: fix ATPX detection on non-VGA GPUs
- LP: #1333900
  * mm: make fixup_user_fault() check the vma access rights too
- LP: #1333900
  * ARM: 8027/1: fix do_div() bug in big-endian systems
- LP: #1333900
  * ARM: 8030/1: ARM : kdump : add arch_crash_save_vmcoreinfo
- LP: #1333900
  * USB: serial: fix sysfs-attribute removal deadlock
- LP: #1333900
  * Btrfs: fix inode caching vs tree log
- LP: #1333900
  * xhci: Switch Intel Lynx Point ports to EHCI on shutdown.
- LP: #1333900
  * USB: io_ti: fix firmware download on big-endian machines
- LP: #1333900
  * usb: qcserial: add Sierra Wireless EM7355
- LP: #1333900
  * usb: qcserial: add Sierra Wireless MC73xx
- LP: #1333900
  * usb: qcserial: add Sierra Wireless MC7305/MC7355
- LP: #1333900
  * usb: option: add Olivetti Olicard 500
- LP: #1333900
  * usb: option: add Alcatel L800MA
- LP: #1333900
  * usb: option: add and update a number of CMOTech devices
- LP: #1333900
  * list: 

[Kernel-packages] [Bug 1335314] Re: CVE-2014-4611

2014-07-16 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.11.0-26.45

---
linux (3.11.0-26.45) saucy; urgency=low

  [ Upstream Kernel Changes ]

  * l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943

linux (3.11.0-26.44) saucy; urgency=low

  [ Luis Henriques ]

  * Merged back Ubuntu-3.11.0-24.42 security release
  * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699)
- LP: #1337339
  * Release Tracking Bug
- LP: #1338556

  [ Upstream Kernel Changes ]

  * ptrace,x86: force IRET path after a ptrace_stop()
- LP: #1337339
- CVE-2014-4699

linux (3.11.0-25.43) saucy; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1336203

  [ Upstream Kernel Changes ]

  * cfg80211: free sme on connection failures
- LP: #1335084
  * sched: Sanitize irq accounting madness
- LP: #1335084
  * sched: Use CPUPRI_NR_PRIORITIES instead of MAX_RT_PRIO in cpupri check
- LP: #1335084
  * net: cpsw: fix null dereference at probe
- LP: #1335084
  * mac80211: fix suspend vs. association race
- LP: #1335084
  * mac80211: fix on-channel remain-on-channel
- LP: #1335084
  * af_iucv: wrong mapping of sent and confirmed skbs
- LP: #1335084
  * net: filter: s390: fix JIT address randomization
- LP: #1335084
  * perf: Limit perf_event_attr::sample_period to 63 bits
- LP: #1335084
  * perf: Prevent false warning in perf_swevent_add
- LP: #1335084
  * drm/gf119-/disp: fix nasty bug which can clobber SOR0's clock setup
- LP: #1335084
  * drm/radeon: also try GART for CPU accessed buffers
- LP: #1335084
  * drm/radeon: handle non-VGA class pci devices with ATRM
- LP: #1335084
  * drm/radeon: fix register typo on si
- LP: #1335084
  * drm/radeon: avoid segfault on device open when accel is not working.
- LP: #1335084
  * can: peak_pci: prevent use after free at netdev removal
- LP: #1335084
  * nfsd4: remove lockowner when removing lock stateid
- LP: #1335084
  * nfsd4: warn on finding lockowner without stateid's
- LP: #1335084
  * hwpoison, hugetlb: lock_page/unlock_page does not match for handling a
free hugepage
- LP: #1335084
  * mm/memory-failure.c: fix memory leak by race between poison and
unpoison
- LP: #1335084
  * netfilter: ipv4: defrag: set local_df flag on defragmented skb
- LP: #1335084
  * ARM: OMAP3: clock: Back-propagate rate change from cam_mclk to dpll4_m5
on all OMAP3 platforms
- LP: #1335084
  * dma: dw: allow shared interrupts
- LP: #1335084
  * dmaengine: dw: went back to plain {request,free}_irq() calls
- LP: #1335084
  * ARM: omap5: hwmod_data: Correct IDLEMODE for McPDM
- LP: #1335084
  * Input: synaptics - add min/max quirk for the ThinkPad W540
- LP: #1335084
  * futex: Add another early deadlock detection check
- LP: #1335084
  * futex: Prevent attaching to kernel threads
- LP: #1335084
  * ARM: OMAP4: Fix the boot regression with CPU_IDLE enabled
- LP: #1335084
  * cpufreq: remove race while accessing cur_policy
- LP: #1335084
  * cpufreq: cpu0: drop wrong devm usage
- LP: #1335084
  * ARM: imx: fix error handling in ipu device registration
- LP: #1335084
  * ALSA: hda - Fix onboard audio on Intel H97/Z97 chipsets
- LP: #1335084
  * ARM: 8051/1: put_user: fix possible data corruption in put_user
- LP: #1335084
  * ARM: 8064/1: fix v7-M signal return
- LP: #1335084
  * Input: synaptics - T540p - unify with other LEN0034 models
- LP: #1335084
  * drm/i915: Only copy back the modified fields to userspace from
execbuffer
- LP: #1335084
  * dm cache: always split discards on cache block boundaries
- LP: #1335084
  * powerpc: Fix 64 bit builds with binutils 2.24
- LP: #1335084
  * powerpc, kexec: Fix Processor X is stuck issue during kexec from ST
mode
- LP: #1335084
  * rtmutex: Fix deadlock detector for real
- LP: #1335084
  * drm/radeon: don't allow RADEON_GEM_DOMAIN_CPU for command submission
- LP: #1335084
  * audit: restore order of tty and ses fields in log output
- LP: #1335084
  * drm/nouveau/pm/fan: drop the fan lock in fan_update() before
rescheduling
- LP: #1335084
  * leds: leds-pwm: properly clean up after probe failure
- LP: #1335084
  * clk: vexpress: NULL dereference on error path
- LP: #1335084
  * fix our current target reap infrastructure
- LP: #1335084
  * dual scan thread bug fix
- LP: #1335084
  * genirq: Provide irq_force_affinity fallback for non-SMP
- LP: #1335084
  * i2c: designware: Mask all interrupts during i2c controller enable
- LP: #1335084
  * crypto: s390 - fix aes,des ctr mode concurrency finding.
- LP: #1335084
  * Staging: speakup: Move pasting into a work item
- LP: #1335084
  * USB: Avoid runtime suspend loops for HCDs that can't handle
suspend/resume
- LP: #1335084
  * can: only rename enabled led triggers when changing the netdev name
- LP: #1335084
  

[Kernel-packages] [Bug 1334823] Re: please add designware gpio support for x-gene

2014-07-16 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.13.0-32.57

---
linux (3.13.0-32.57) trusty; urgency=low

  [ Upstream Kernel Changes ]

  * l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943

linux (3.13.0-32.56) trusty; urgency=low

  [ Luis Henriques ]

  * Merged back Ubuntu-3.13.0-30.55 security release
  * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699)
- LP: #1337339
  * Release Tracking Bug
- LP: #1338524

  [ Upstream Kernel Changes ]

  * ptrace,x86: force IRET path after a ptrace_stop()
- LP: #1337339
- CVE-2014-4699
  * hpsa: add new Smart Array PCI IDs (May 2014)
- LP: #1337516

linux (3.13.0-31.55) trusty; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1336278

  [ Andy Whitcroft ]

  * [Config] switch hyper-keyboard to virtual
- LP: #1325306
  * [Packaging] linux-udeb-flavour -- standardise on linux prefix

  [ dann frazier ]

  * [Config] CONFIG_GPIO_DWAPB=m
- LP: #1334823

  [ Feng Kan ]

  * SAUCE: (no-up) arm64: dts: Add Designware GPIO dts binding to APM
X-Gene platform
- LP: #1334823

  [ John Johansen ]

  * SAUCE: (no-up) apparmor: fix apparmor spams log with warning message
- LP: #1308761

  [ Kamal Mostafa ]

  * [Config] updateconfigs ACPI_PROCFS_POWER=y after v3.13.11.4 rebase

  [ Loc Ho ]

  * SAUCE: (no-up) phy-xgene: Use correct tuning for Mustang
- LP: #1335636

  [ Michael Ellerman ]

  * SAUCE: (no-up) powerpc/perf: Ensure all EBB register state is cleared
on fork()
- LP: #1328914

  [ Ming Lei ]

  * Revert SAUCE: (no-up) rtc: Add X-Gene SoC Real Time Clock Driver
- LP: #1274305

  [ Suman Tripathi ]

  * SAUCE: (no-up) libahci: Implement the function ahci_restart_engine to
restart the port dma engine.
- LP: #1335645
  * SAUCE: (no-up) ata: Fix the dma state machine lockup for the IDENTIFY
DEVICE PIO mode command.
- LP: #1335645

  [ Tim Gardner ]

  * [Config] CONFIG_POWERNV_CPUFREQ=y for powerpc, ppc64el
- LP: #1324571
  * [Debian] Add UTS_UBUNTU_RELEASE_ABI to utsrelease.h
- LP: #1327619
  * [Config] CONFIG_HAVE_MEMORYLESS_NODES=y
- LP: #1332063
  * [Config] CONFIG_HID_RMI=m
- LP: #1305522

  [ Upstream Kernel Changes ]

  * Revert offb: Add palette hack for little endian
- LP: #1333430
  * Revert net: mvneta: fix usage as a module on RGMII configurations
- LP: #1333837
  * Revert USB: serial: add usbid for dell wwan card to sierra.c
- LP: #1333837
  * Revert macvlan : fix checksums error when we are in bridge mode
- LP: #1333838
  * serial: uart: add hw flow control support configuration
- LP: #1328295
  * mm/numa: Remove BUG_ON() in __handle_mm_fault()
- LP: #1323165
  * Tools: hv: Handle the case when the target file exists correctly
- LP: #1306215
  * Documentation/devicetree/bindings: add documentation for the APM X-Gene
SoC RTC DTS binding
- LP: #1274305
  * drivers/rtc: add APM X-Gene SoC RTC driver
- LP: #1274305
  * arm64: add APM X-Gene SoC RTC DTS entry
- LP: #1274305
  * powerpc/perf: Add Power8 cache  TLB events
- LP: #1328914
  * powerpc/perf: Configure BHRB filter before enabling PMU interrupts
- LP: #1328914
  * powerpc/perf: Define perf_event_print_debug() to print PMU register
values
- LP: #1328914
  * powerpc: Add a cpu feature CPU_FTR_PMAO_BUG
- LP: #1328914
  * powerpc/perf: Add lost exception workaround
- LP: #1328914
  * powerpc/perf: Reject EBB events which specify a sample_type
- LP: #1328914
  * powerpc/perf: Clean up the EBB hash defines a little
- LP: #1328914
  * powerpc/perf: Avoid mutating event in power8_get_constraint()
- LP: #1328914
  * powerpc/perf: Add BHRB constraint and IFM MMCRA handling for EBB
- LP: #1328914
  * powerpc/perf: Enable BHRB access for EBB events
- LP: #1328914
  * powerpc/perf: Fix handling of L3 events with bank == 1
- LP: #1328914
  * Bluetooth: Add support for Intel Bluetooth device [8087:0a2a]
- LP: #1329184
  * iwlwifi: mvm: disable beacon filtering
- LP: #1293569
  * SUNRPC: Ensure that call_connect times out correctly
- LP: #1322407
  * SUNRPC: Ensure call_connect_status() deals correctly with SOFTCONN
tasks
- LP: #1322407
  * bitops: Fix signedness of compile-time hweight implementations
- LP: #1321791
  * cpumask.h: silence warning with -Wsign-compare
- LP: #1321791
  * fbdev/fb.h: silence warning with -Wsign-compare
- LP: #1321791
  * rtlwifi: make MSI support a module parameter
- LP: #1296591
  * rtlwifi: rtl8188ee: add msi module parameter
- LP: #1296591
  * rtlwifi: rtl8723be: add msi module parameter
- LP: #1296591
  * net: avoid dependency of net_get_random_once on nop patching
- LP: #1330671
  * x86-64, modify_ldt: Make support for 16-bit segments a runtime option
- LP: #1328965
  * ALSA: usb-audio: Prevent printk ratelimiting from spamming kernel log
while DEBUG not defined
   

  1   2   >