** Tags removed: verification-needed-trusty
** Tags added: verification-done-trusty
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1359670
Title:
Unsigned oot modules are wrongly tainted and trace ev
This bug was fixed in the package linux - 3.13.0-36.63
---
linux (3.13.0-36.63) trusty; urgency=low
[ Joseph Salisbury ]
* Release Tracking Bug
- LP: #1365052
[ Feng Kan ]
* SAUCE: (no-up) irqchip:gic: change access of gicc_ctrl register to read
modify write.
-
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'.
If verification is not done by 5 working days from t
** Branch linked: lp:ubuntu/precise-proposed/linux-lts-trusty
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1359670
Title:
Unsigned oot modules are wrongly tainted and trace events disabled
To mana
** Branch linked: lp:ubuntu/trusty-proposed/linux-keystone
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1359670
Title:
Unsigned oot modules are wrongly tainted and trace events disabled
To manage
** Changed in: linux (Ubuntu Trusty)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1359670
Title:
Unsigned oot modules are wrongly tainted and trace event
With the above kernel loaded there are no warning messages in dmesg and
/proc/sys/kernel/tainted lists the correct taint flags (12288)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1359670
Title:
Un
** Description changed:
+ [Impact]
+
+ Developers are unable to unable to use kernel tracing functions on
+ kernel modules they have themselves compiled. This makes Ubuntu a poor
+ platform for module developement and debugging.
+
+ [Test Case]
+
+ Build an OOT or modified version of a module,
I have built test kernels with the above patch applied, could you test
those and confirm it differentiates the taint type and that tracing is
now possible. Kernels are at the URL below:
http://people.canonical.com/~apw/lp1359670-trusty/
Please report any testing back here.
--
You received
This was fixed up in:
commit 66cc69e34e86a231fbe68d8918c6119e3b7549a3
Author: Mathieu Desnoyers
Date: Thu Mar 13 12:11:30 2014 +1030
Fix: module signature vs tracepoints: add new TAINT_UNSIGNED_MODULE
In: v3.15-rc1~67^2~6
** Also affects: linux (Ubuntu Trusty)
Importance: Unde
10 matches
Mail list logo