group.of.nepali.translators team mailing list archive
-
group.of.nepali.translators team
-
Mailing list archive
-
Message #07644
[Bug 1587714] Re: MacBookPro11, 4 fails to poweroff or suspend
This bug was fixed in the package linux - 3.13.0-96.143
---------------
linux (3.13.0-96.143) trusty; urgency=low
[ Tim Gardner ]
* Release Tracking Bug
- LP: #1618083
* CVE-2015-8767
- sctp: Prevent soft lockup when sctp_accept() is called during a timeout
event
* MacBookPro11,4 fails to poweroff or suspend (LP: #1587714)
- SAUCE: PCI: Workaround to enable poweroff on Mac Pro 11
* 3.13: libvirtd: page allocation failure: order:4, mode:0x1040d0
(LP: #1616193)
- vhost-net: extend device allocation to vmalloc
- vhost-net: don't open-code kvfree
* [arm64] nova instances can't boot with 3.13.0-92 (LP: #1608854)
- Revert "UBUNTU: [Config] CONFIG_EFI=n for arm64"
- Revert "UBUNTU: SAUCE: UEFI: Set EFI_SECURE_BOOT bit in x86_efi_facility"
- Revert "UBUNTU: SAUCE: UEFI: Add secure boot and MOK SB State disabled
sysctl"
- Revert "UBUNTU: SAUCE: UEFI: Display MOKSBState when disabled"
- Revert "UBUNTU: SAUCE: UEFI: efi: Disable secure boot if shim is in insecure
mode"
- Revert "UBUNTU: SAUCE: UEFI MODSIGN: Import certificates from UEFI Secure
Boot"
- Revert "UBUNTU: SAUCE: UEFI: efi: Make EFI_SECURE_BOOT_SIG_ENFORCE depend on
EFI"
- Revert "UBUNTU: SAUCE: UEFI: Add option to automatically enforce module
signatures when in Secure Boot mode"
- Revert "UBUNTU: [Config] CONFIG_EFI_SECURE_BOOT_SIG_ENFORCE=y"
- Revert "UBUNTU: SAUCE: UEFI: x86: Restrict MSR access when module loading is
restricted"
- Revert "UBUNTU: SAUCE: UEFI: kexec: Disable at runtime if the kernel
enforces module loading restrictions"
- Revert "UBUNTU: SAUCE: UEFI: acpi: Ignore acpi_rsdp kernel parameter when
module loading is restricted"
- Revert "UBUNTU: SAUCE: UEFI: Restrict /dev/mem and /dev/kmem when module
loading is restricted"
- Revert "UBUNTU: SAUCE: UEFI: asus-wmi: Restrict debugfs interface when
module loading is restricted"
- Revert "UBUNTU: SAUCE: UEFI: ACPI: Limit access to custom_method"
- Revert "UBUNTU: SAUCE: UEFI: x86: Lock down IO port access when module
security is enabled"
- Revert "UBUNTU: SAUCE: UEFI: PCI: Lock down BAR access when module security
is enabled"
- Revert "UBUNTU: SAUCE: UEFI: Add secure_modules() call"
- Revert "x86/efi: Build our own EFI services pointer table"
- Revert "efi: Add separate 32-bit/64-bit definitions"
* [Hyper-V] storvsc messages for CD-ROM medium not present tray closed
(LP: #1590655)
- scsi: storvsc: Filter out storvsc messages CD-ROM medium not present
* CVE-2016-3841
- ipv6: add complete rcu protection around np->opt
-- Kamal Mostafa <kamal@xxxxxxxxxxxxx> Tue, 16 Aug 2016 10:20:51 -0700
** Changed in: linux (Ubuntu Trusty)
Status: Fix Committed => Fix Released
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-8767
** Changed in: linux (Ubuntu Trusty)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1587714
Title:
MacBookPro11,4 fails to poweroff or suspend
Status in Linux:
Unknown
Status in linux package in Ubuntu:
Fix Committed
Status in linux source package in Precise:
Fix Committed
Status in linux source package in Trusty:
Fix Released
Status in linux source package in Vivid:
Fix Released
Status in linux source package in Xenial:
Fix Released
Status in linux source package in Yakkety:
Fix Committed
Bug description:
Since the release of the 2015 MacBookPro11,4 (15" retina), it has been
unable to suspend or poweroff on linux. Recently,
https://bugzilla.kernel.org/show_bug.cgi?id=103211 has received a
patch that works to fix these issues. The patch is in comment #172,
and is also attached to this bugreport, and reported to work very well
by users of other distributions. In addition, I can confirm that
building the latest xenial 4.4.0-22-generic kernel with this patch
applied fixes the issue. Can this be added to the official xenial
kernel?
Thanks!
To manage notifications about this bug go to:
https://bugs.launchpad.net/linux/+bug/1587714/+subscriptions