View Bazaar branches
Get this repository:
git clone https://git.launchpad.net/ubuntu/+source/linux-lts-utopic
Members of Ubuntu Server Dev import team can upload to this repository. Log in for directions.

Branches

Name Last Modified Last Commit
importer/ubuntu/dsc 2018-04-08 11:59:42 UTC 2018-04-08
DSC file for 3.16.0-77.99~14.04.1

Author: Ubuntu Git Importer
Author Date: 2018-04-08 11:59:42 UTC

DSC file for 3.16.0-77.99~14.04.1

importer/ubuntu/pristine-tar 2018-04-08 08:05:15 UTC 2018-04-08
pristine-tar data for linux-lts-utopic_3.16.0.orig.tar.gz

Author: Ubuntu Git Importer
Author Date: 2018-04-08 08:05:15 UTC

pristine-tar data for linux-lts-utopic_3.16.0.orig.tar.gz

importer/debian/pristine-tar 2018-04-08 07:14:51 UTC 2018-04-08
Initial Debian pristine-tar branch.

Author: Ubuntu Git Importer
Author Date: 2018-04-08 07:14:51 UTC

Initial Debian pristine-tar branch.

ubuntu/trusty-updates 2016-06-29 13:53:54 UTC 2016-06-29
Import patches-unapplied version 3.16.0-77.99~14.04.1 to ubuntu/trusty-proposed

Author: Kamal Mostafa
Author Date: 2016-06-28 18:43:10 UTC

Import patches-unapplied version 3.16.0-77.99~14.04.1 to ubuntu/trusty-proposed

Imported using git-ubuntu import.

Changelog parent: ef4cfdb1534e65ec515a301562c21b921a9c23da

New changelog entries:
  [ Kamal Mostafa ]
  * Release Tracking Bug
    - LP: #1597047
  [ Josh Boyer ]
  * SAUCE: UEFI: acpi: Ignore acpi_rsdp kernel parameter when module
    loading is restricted
    - LP: #1566221
  * SAUCE: UEFI: efi: Make EFI_SECURE_BOOT_SIG_ENFORCE depend on EFI
    - LP: #1566221
  * SAUCE: UEFI MODSIGN: Import certificates from UEFI Secure Boot
    - LP: #1571691
  * SAUCE: UEFI: efi: Disable secure boot if shim is in insecure mode
    - LP: #1571691
  [ Matthew Garrett ]
  * SAUCE: UEFI: Add secure_modules() call
    - LP: #1566221
  * SAUCE: UEFI: PCI: Lock down BAR access when module security is enabled
    - LP: #1566221
  * SAUCE: UEFI: x86: Lock down IO port access when module security is
    enabled
    - LP: #1566221
  * SAUCE: UEFI: ACPI: Limit access to custom_method
    - LP: #1566221
  * SAUCE: UEFI: asus-wmi: Restrict debugfs interface when module loading
    is restricted
    - LP: #1566221
  * SAUCE: UEFI: Restrict /dev/mem and /dev/kmem when module loading is
    restricted
    - LP: #1566221
  * SAUCE: UEFI: kexec: Disable at runtime if the kernel enforces module
    loading restrictions
    - LP: #1566221
  * SAUCE: UEFI: x86: Restrict MSR access when module loading is restricted
    - LP: #1566221
  * SAUCE: UEFI: Add option to automatically enforce module signatures when
    in Secure Boot mode
    - LP: #1566221
  [ Stefan Bader ]
  * [Config] Add pm80xx scsi driver to d-i
    - LP: #1595628
  [ Tim Gardner ]
  * [Config] CONFIG_EFI_SECURE_BOOT_SIG_ENFORCE=y
  * SAUCE: UEFI: Display MOKSBState when disabled
    - LP: #1571691
  * SAUCE: UEFI: Add secure boot and MOK SB State disabled sysctl
    - LP: #1593075
  [ Upstream Kernel Changes ]
  * HID: core: prevent out-of-bound readings
    - LP: #1579190
  * mm: migrate dirty page without clear_page_dirty_for_io etc
    - LP: #1581865
    - CVE-2016-3070
  * virtio_balloon: return the amount of freed memory from leak_balloon()
    - LP: #1587087
  * virtio_balloon: free some memory from balloon on OOM
    - LP: #1587087

ubuntu/trusty-devel 2016-06-29 13:53:54 UTC 2016-06-29
Import patches-unapplied version 3.16.0-77.99~14.04.1 to ubuntu/trusty-proposed

Author: Kamal Mostafa
Author Date: 2016-06-28 18:43:10 UTC

Import patches-unapplied version 3.16.0-77.99~14.04.1 to ubuntu/trusty-proposed

Imported using git-ubuntu import.

Changelog parent: ef4cfdb1534e65ec515a301562c21b921a9c23da

New changelog entries:
  [ Kamal Mostafa ]
  * Release Tracking Bug
    - LP: #1597047
  [ Josh Boyer ]
  * SAUCE: UEFI: acpi: Ignore acpi_rsdp kernel parameter when module
    loading is restricted
    - LP: #1566221
  * SAUCE: UEFI: efi: Make EFI_SECURE_BOOT_SIG_ENFORCE depend on EFI
    - LP: #1566221
  * SAUCE: UEFI MODSIGN: Import certificates from UEFI Secure Boot
    - LP: #1571691
  * SAUCE: UEFI: efi: Disable secure boot if shim is in insecure mode
    - LP: #1571691
  [ Matthew Garrett ]
  * SAUCE: UEFI: Add secure_modules() call
    - LP: #1566221
  * SAUCE: UEFI: PCI: Lock down BAR access when module security is enabled
    - LP: #1566221
  * SAUCE: UEFI: x86: Lock down IO port access when module security is
    enabled
    - LP: #1566221
  * SAUCE: UEFI: ACPI: Limit access to custom_method
    - LP: #1566221
  * SAUCE: UEFI: asus-wmi: Restrict debugfs interface when module loading
    is restricted
    - LP: #1566221
  * SAUCE: UEFI: Restrict /dev/mem and /dev/kmem when module loading is
    restricted
    - LP: #1566221
  * SAUCE: UEFI: kexec: Disable at runtime if the kernel enforces module
    loading restrictions
    - LP: #1566221
  * SAUCE: UEFI: x86: Restrict MSR access when module loading is restricted
    - LP: #1566221
  * SAUCE: UEFI: Add option to automatically enforce module signatures when
    in Secure Boot mode
    - LP: #1566221
  [ Stefan Bader ]
  * [Config] Add pm80xx scsi driver to d-i
    - LP: #1595628
  [ Tim Gardner ]
  * [Config] CONFIG_EFI_SECURE_BOOT_SIG_ENFORCE=y
  * SAUCE: UEFI: Display MOKSBState when disabled
    - LP: #1571691
  * SAUCE: UEFI: Add secure boot and MOK SB State disabled sysctl
    - LP: #1593075
  [ Upstream Kernel Changes ]
  * HID: core: prevent out-of-bound readings
    - LP: #1579190
  * mm: migrate dirty page without clear_page_dirty_for_io etc
    - LP: #1581865
    - CVE-2016-3070
  * virtio_balloon: return the amount of freed memory from leak_balloon()
    - LP: #1587087
  * virtio_balloon: free some memory from balloon on OOM
    - LP: #1587087

ubuntu/trusty-proposed 2016-06-29 13:53:54 UTC 2016-06-29
Import patches-unapplied version 3.16.0-77.99~14.04.1 to ubuntu/trusty-proposed

Author: Kamal Mostafa
Author Date: 2016-06-28 18:43:10 UTC

Import patches-unapplied version 3.16.0-77.99~14.04.1 to ubuntu/trusty-proposed

Imported using git-ubuntu import.

Changelog parent: ef4cfdb1534e65ec515a301562c21b921a9c23da

New changelog entries:
  [ Kamal Mostafa ]
  * Release Tracking Bug
    - LP: #1597047
  [ Josh Boyer ]
  * SAUCE: UEFI: acpi: Ignore acpi_rsdp kernel parameter when module
    loading is restricted
    - LP: #1566221
  * SAUCE: UEFI: efi: Make EFI_SECURE_BOOT_SIG_ENFORCE depend on EFI
    - LP: #1566221
  * SAUCE: UEFI MODSIGN: Import certificates from UEFI Secure Boot
    - LP: #1571691
  * SAUCE: UEFI: efi: Disable secure boot if shim is in insecure mode
    - LP: #1571691
  [ Matthew Garrett ]
  * SAUCE: UEFI: Add secure_modules() call
    - LP: #1566221
  * SAUCE: UEFI: PCI: Lock down BAR access when module security is enabled
    - LP: #1566221
  * SAUCE: UEFI: x86: Lock down IO port access when module security is
    enabled
    - LP: #1566221
  * SAUCE: UEFI: ACPI: Limit access to custom_method
    - LP: #1566221
  * SAUCE: UEFI: asus-wmi: Restrict debugfs interface when module loading
    is restricted
    - LP: #1566221
  * SAUCE: UEFI: Restrict /dev/mem and /dev/kmem when module loading is
    restricted
    - LP: #1566221
  * SAUCE: UEFI: kexec: Disable at runtime if the kernel enforces module
    loading restrictions
    - LP: #1566221
  * SAUCE: UEFI: x86: Restrict MSR access when module loading is restricted
    - LP: #1566221
  * SAUCE: UEFI: Add option to automatically enforce module signatures when
    in Secure Boot mode
    - LP: #1566221
  [ Stefan Bader ]
  * [Config] Add pm80xx scsi driver to d-i
    - LP: #1595628
  [ Tim Gardner ]
  * [Config] CONFIG_EFI_SECURE_BOOT_SIG_ENFORCE=y
  * SAUCE: UEFI: Display MOKSBState when disabled
    - LP: #1571691
  * SAUCE: UEFI: Add secure boot and MOK SB State disabled sysctl
    - LP: #1593075
  [ Upstream Kernel Changes ]
  * HID: core: prevent out-of-bound readings
    - LP: #1579190
  * mm: migrate dirty page without clear_page_dirty_for_io etc
    - LP: #1581865
    - CVE-2016-3070
  * virtio_balloon: return the amount of freed memory from leak_balloon()
    - LP: #1587087
  * virtio_balloon: free some memory from balloon on OOM
    - LP: #1587087

ubuntu/trusty-security 2016-06-29 13:53:54 UTC 2016-06-29
Import patches-unapplied version 3.16.0-77.99~14.04.1 to ubuntu/trusty-proposed

Author: Kamal Mostafa
Author Date: 2016-06-28 18:43:10 UTC

Import patches-unapplied version 3.16.0-77.99~14.04.1 to ubuntu/trusty-proposed

Imported using git-ubuntu import.

Changelog parent: ef4cfdb1534e65ec515a301562c21b921a9c23da

New changelog entries:
  [ Kamal Mostafa ]
  * Release Tracking Bug
    - LP: #1597047
  [ Josh Boyer ]
  * SAUCE: UEFI: acpi: Ignore acpi_rsdp kernel parameter when module
    loading is restricted
    - LP: #1566221
  * SAUCE: UEFI: efi: Make EFI_SECURE_BOOT_SIG_ENFORCE depend on EFI
    - LP: #1566221
  * SAUCE: UEFI MODSIGN: Import certificates from UEFI Secure Boot
    - LP: #1571691
  * SAUCE: UEFI: efi: Disable secure boot if shim is in insecure mode
    - LP: #1571691
  [ Matthew Garrett ]
  * SAUCE: UEFI: Add secure_modules() call
    - LP: #1566221
  * SAUCE: UEFI: PCI: Lock down BAR access when module security is enabled
    - LP: #1566221
  * SAUCE: UEFI: x86: Lock down IO port access when module security is
    enabled
    - LP: #1566221
  * SAUCE: UEFI: ACPI: Limit access to custom_method
    - LP: #1566221
  * SAUCE: UEFI: asus-wmi: Restrict debugfs interface when module loading
    is restricted
    - LP: #1566221
  * SAUCE: UEFI: Restrict /dev/mem and /dev/kmem when module loading is
    restricted
    - LP: #1566221
  * SAUCE: UEFI: kexec: Disable at runtime if the kernel enforces module
    loading restrictions
    - LP: #1566221
  * SAUCE: UEFI: x86: Restrict MSR access when module loading is restricted
    - LP: #1566221
  * SAUCE: UEFI: Add option to automatically enforce module signatures when
    in Secure Boot mode
    - LP: #1566221
  [ Stefan Bader ]
  * [Config] Add pm80xx scsi driver to d-i
    - LP: #1595628
  [ Tim Gardner ]
  * [Config] CONFIG_EFI_SECURE_BOOT_SIG_ENFORCE=y
  * SAUCE: UEFI: Display MOKSBState when disabled
    - LP: #1571691
  * SAUCE: UEFI: Add secure boot and MOK SB State disabled sysctl
    - LP: #1593075
  [ Upstream Kernel Changes ]
  * HID: core: prevent out-of-bound readings
    - LP: #1579190
  * mm: migrate dirty page without clear_page_dirty_for_io etc
    - LP: #1581865
    - CVE-2016-3070
  * virtio_balloon: return the amount of freed memory from leak_balloon()
    - LP: #1587087
  * virtio_balloon: free some memory from balloon on OOM
    - LP: #1587087

ubuntu/devel 2016-06-29 13:53:54 UTC 2016-06-29
Import patches-unapplied version 3.16.0-77.99~14.04.1 to ubuntu/trusty-proposed

Author: Kamal Mostafa
Author Date: 2016-06-28 18:43:10 UTC

Import patches-unapplied version 3.16.0-77.99~14.04.1 to ubuntu/trusty-proposed

Imported using git-ubuntu import.

Changelog parent: ef4cfdb1534e65ec515a301562c21b921a9c23da

New changelog entries:
  [ Kamal Mostafa ]
  * Release Tracking Bug
    - LP: #1597047
  [ Josh Boyer ]
  * SAUCE: UEFI: acpi: Ignore acpi_rsdp kernel parameter when module
    loading is restricted
    - LP: #1566221
  * SAUCE: UEFI: efi: Make EFI_SECURE_BOOT_SIG_ENFORCE depend on EFI
    - LP: #1566221
  * SAUCE: UEFI MODSIGN: Import certificates from UEFI Secure Boot
    - LP: #1571691
  * SAUCE: UEFI: efi: Disable secure boot if shim is in insecure mode
    - LP: #1571691
  [ Matthew Garrett ]
  * SAUCE: UEFI: Add secure_modules() call
    - LP: #1566221
  * SAUCE: UEFI: PCI: Lock down BAR access when module security is enabled
    - LP: #1566221
  * SAUCE: UEFI: x86: Lock down IO port access when module security is
    enabled
    - LP: #1566221
  * SAUCE: UEFI: ACPI: Limit access to custom_method
    - LP: #1566221
  * SAUCE: UEFI: asus-wmi: Restrict debugfs interface when module loading
    is restricted
    - LP: #1566221
  * SAUCE: UEFI: Restrict /dev/mem and /dev/kmem when module loading is
    restricted
    - LP: #1566221
  * SAUCE: UEFI: kexec: Disable at runtime if the kernel enforces module
    loading restrictions
    - LP: #1566221
  * SAUCE: UEFI: x86: Restrict MSR access when module loading is restricted
    - LP: #1566221
  * SAUCE: UEFI: Add option to automatically enforce module signatures when
    in Secure Boot mode
    - LP: #1566221
  [ Stefan Bader ]
  * [Config] Add pm80xx scsi driver to d-i
    - LP: #1595628
  [ Tim Gardner ]
  * [Config] CONFIG_EFI_SECURE_BOOT_SIG_ENFORCE=y
  * SAUCE: UEFI: Display MOKSBState when disabled
    - LP: #1571691
  * SAUCE: UEFI: Add secure boot and MOK SB State disabled sysctl
    - LP: #1593075
  [ Upstream Kernel Changes ]
  * HID: core: prevent out-of-bound readings
    - LP: #1579190
  * mm: migrate dirty page without clear_page_dirty_for_io etc
    - LP: #1581865
    - CVE-2016-3070
  * virtio_balloon: return the amount of freed memory from leak_balloon()
    - LP: #1587087
  * virtio_balloon: free some memory from balloon on OOM
    - LP: #1587087

applied/ubuntu/trusty-proposed 2014-09-02 23:07:50 UTC 2014-09-02
Import patches-applied version 3.16.0-13.19~14.04 to applied/ubuntu/trusty-pr...

Author: Tim Gardner
Author Date: 2014-09-02 23:07:50 UTC

Import patches-applied version 3.16.0-13.19~14.04 to applied/ubuntu/trusty-proposed

Imported using git-ubuntu import.

Unapplied parent: e0f25d77f6c7771e462d5b3b859801c69fccc505

applied/ubuntu/trusty-devel 2014-09-02 23:07:50 UTC 2014-09-02
Import patches-applied version 3.16.0-13.19~14.04 to applied/ubuntu/trusty-pr...

Author: Tim Gardner
Author Date: 2014-09-02 23:07:50 UTC

Import patches-applied version 3.16.0-13.19~14.04 to applied/ubuntu/trusty-proposed

Imported using git-ubuntu import.

Unapplied parent: e0f25d77f6c7771e462d5b3b859801c69fccc505

applied/ubuntu/devel 2014-09-02 23:07:50 UTC 2014-09-02
Import patches-applied version 3.16.0-13.19~14.04 to applied/ubuntu/trusty-pr...

Author: Tim Gardner
Author Date: 2014-09-02 23:07:50 UTC

Import patches-applied version 3.16.0-13.19~14.04 to applied/ubuntu/trusty-proposed

Imported using git-ubuntu import.

Unapplied parent: e0f25d77f6c7771e462d5b3b859801c69fccc505

111 of 11 results

Other repositories

Name Last Modified
lp:ubuntu/+source/linux-lts-utopic 2018-04-08
11 of 1 result
You can't create new repositories for linux-lts-utopic in Ubuntu.