[Kernel-packages] [Bug 1293569] Re: iwlwifi-7260-8.ucode causes network disconnections problems
Same problem on Lenovo Carbon X1 gen2 with Intel Wireless 7260 (rev 83). Using Ubuntu 15.04 with 3.19.0-21 kernel (x86_64). Bluetooth is soft-blocked with rfkill but this does not solve the problem. I constantly get disconnects: wlan0: deauthenticating from ... by local choice (Reason: 3=DEAUTH_LEAVING) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-firmware in Ubuntu. https://bugs.launchpad.net/bugs/1293569 Title: iwlwifi-7260-8.ucode causes network disconnections problems Status in The Linux Mint Distribution: New Status in linux-firmware package in Ubuntu: Invalid Status in linux-firmware source package in Precise: Fix Released Status in linux-firmware source package in Trusty: Fix Released Bug description: Running 14.04 (beta) with Kernel 3.13.0-17-generic I've encountered a strange and reproducible error with the iwlwifi-7260-8.ucode firmware. This laptop is a Dell XPS 12 (haswell). With the -8 firmware, it will connect fine to wifi for 30 or 40 mins at a time, then will start dropping connections repeatedly. Even modprobe -r unloading and reloading doesn't fix the issue, only a reboot will temporarily solve it for 40 mins at a time. Moreover, here is what's strange, is during these episodes of disconnection it seems to affect the actual router (2Wire), as the other devices in the house will also start to have issues (very slow connections, limited range,etc). Once I reboot this laptop everything and all devices will return to normal. This issue has been fixed by me manually removing the -8 firware from /lib/firmware and letting the -7 firmware load instead. Since that has been done there has not been a single issue of this happening (now going on 4 days). let me know if there is any other information you would like me to provide. ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-firmware 1.126 ProcVersionSignature: Ubuntu 3.13.0-17.37-generic 3.13.6 Uname: Linux 3.13.0-17-generic x86_64 ApportVersion: 2.13.3-0ubuntu1 Architecture: amd64 CurrentDesktop: Unity Date: Mon Mar 17 08:13:25 2014 Dependencies: EcryptfsInUse: Yes InstallationDate: Installed on 2014-03-07 (9 days ago) InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Alpha amd64 (20140307) PackageArchitecture: all SourcePackage: linux-firmware UpgradeStatus: No upgrade log present (probably fresh install) To manage notifications about this bug go to: https://bugs.launchpad.net/linuxmint/+bug/1293569/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1454975] Re: AMD Radeon HD 8570 / R7 240/340 OEM] [1002:6611] No DP audio with the open source driver
** Changed in: hwe-next Status: New = Incomplete -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-lts-utopic in Ubuntu. https://bugs.launchpad.net/bugs/1454975 Title: AMD Radeon HD 8570 / R7 240/340 OEM] [1002:6611] No DP audio with the open source driver Status in HWE Next Project: Incomplete Status in linux-lts-utopic package in Ubuntu: New Bug description: CID: 201302-12679 Dell OptiPlex 9020 There is no audio output available from the DisplayPort with the open source driver. There are two output options here in the Sound Settings: Analog Output and Speaker Non of them could make the DP audio device (the speaker on the monitor) work. Also, this is a desktop system, I can't hear anything with the Speaker option. Since we're unable to install the fglrx now, I will mark this one as a blocker. ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-image-3.16.0-37-generic 3.16.0-37.51~14.04.1 ProcVersionSignature: Ubuntu 3.16.0-37.51~14.04.1-generic 3.16.7-ckt9 Uname: Linux 3.16.0-37-generic x86_64 ApportVersion: 2.14.1-0ubuntu3.10 Architecture: amd64 CurrentDesktop: Unity Date: Wed May 13 23:52:37 2015 InstallationDate: Installed on 2015-05-13 (0 days ago) InstallationMedia: Ubuntu 14.04.2 LTS Trusty Tahr - Release amd64 (20150218.1) SourcePackage: linux-lts-utopic UpgradeStatus: No upgrade log present (probably fresh install) --- ApportVersion: 2.14.1-0ubuntu3.10 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: ubuntu 1697 F pulseaudio /dev/snd/controlC1: ubuntu 1697 F pulseaudio CurrentDesktop: Unity DistroRelease: Ubuntu 14.04 HibernationDevice: RESUME=UUID=9201b911-af8a-4fe9-a8b1-544f1f394b6a InstallationDate: Installed on 2015-05-13 (0 days ago) InstallationMedia: Ubuntu 14.04.2 LTS Trusty Tahr - Release amd64 (20150218.1) IwConfig: eth0 no wireless extensions. lono wireless extensions. MachineType: Dell Inc. OptiPlex 9020 Package: linux (not installed) ProcFB: 0 radeondrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.16.0-37-generic root=UUID=9d6f549c-046c-4193-b58e-5ee4df6c0e0b ro quiet splash vt.handoff=7 ProcVersionSignature: Ubuntu 3.16.0-37.51~14.04.1-generic 3.16.7-ckt9 RelatedPackageVersions: linux-restricted-modules-3.16.0-37-generic N/A linux-backports-modules-3.16.0-37-generic N/A linux-firmware 1.127.11 RfKill: Tags: trusty Uname: Linux 3.16.0-37-generic x86_64 UpgradeStatus: No upgrade log present (probably fresh install) UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo _MarkForUpload: True dmi.bios.date: 09/17/2013 dmi.bios.vendor: Dell Inc. dmi.bios.version: A03 dmi.board.vendor: Dell Inc. dmi.chassis.type: 15 dmi.chassis.vendor: Dell Inc. dmi.modalias: dmi:bvnDellInc.:bvrA03:bd09/17/2013:svnDellInc.:pnOptiPlex9020:pvr01:rvnDellInc.:rn:rvr:cvnDellInc.:ct15:cvr: dmi.product.name: OptiPlex 9020 dmi.product.version: 01 dmi.sys.vendor: Dell Inc. To manage notifications about this bug go to: https://bugs.launchpad.net/hwe-next/+bug/1454975/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1338706] Re: Samsung SSD 840 failed to get NCQ Send/Recv Log Emask 0x1 failed to set xfermode (err_mask=0x40) on upstream kernels = 3.12
There are problems with the 850 Pro as well, see, e.g.: http://ubuntuforums.org/showthread.php?t=2282808p=13305283 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1338706 Title: Samsung SSD 840 failed to get NCQ Send/Recv Log Emask 0x1 failed to set xfermode (err_mask=0x40) on upstream kernels = 3.12 Status in linux package in Ubuntu: Invalid Status in linux source package in Trusty: Fix Committed Status in linux source package in Utopic: Fix Committed Status in linux source package in Vivid: Fix Committed Status in linux source package in Wily: Invalid Bug description: [Impact] * Users with Samsung 8** SSD drives see miscellaneous errors and warning messages in the logs depending on the firmware level of the drive while booting or after running trim. [Test Case] * Run this script, and then check logs for errors. #!/bin/bash git clone git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git for i in {0..10} ; do cp -r linux linux$i done rm -rf linux* echo sudo fstrim requires your password sudo fstrim ./ [Regression Potential] * There is very little regression potential as this change simply prevents NCQ trim from being used on Samsung 8** drives. [Other Info] * Commit is upstream. * Greatly increasing the timeout for the drives seems to relieve the timeout errors. This may be due to trimming large numbers of sectors with single commands. It may be prudent for future upstream to break up large trims into multiple requests on smaller regions. ===Original Bug description == Samsung SSD 840 Series failed to get NCQ Send/Recv Log Emask 0x1. ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-30-generic 3.13.0-30.55 ProcVersionSignature: Ubuntu 3.13.0-30.55-generic 3.13.11.2 Uname: Linux 3.13.0-30-generic x86_64 ApportVersion: 2.14.1-0ubuntu3.2 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: user 2131 F pulseaudio CurrentDesktop: Unity Date: Mon Jul 7 20:01:28 2014 HibernationDevice: RESUME=UUID=685afcb7-7aa6-4048-af15-091d3bcd3b35 InstallationDate: Installed on 2014-06-22 (14 days ago) InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Release amd64 (20140417) IwConfig: eth0 no wireless extensions. lono wireless extensions. MachineType: System manufacturer System Product Name ProcFB: 0 nouveaufb ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.13.0-30-generic root=UUID=d7c2e1cb-d046-460c-83b8-0cfbb330d095 ro quiet splash vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-3.13.0-30-generic N/A linux-backports-modules-3.13.0-30-generic N/A linux-firmware 1.127.4 RfKill: SourcePackage: linux UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 09/10/2010 dmi.bios.vendor: American Megatrends Inc. dmi.bios.version: 0901 dmi.board.asset.tag: To Be Filled By O.E.M. dmi.board.name: M3N78-EM dmi.board.vendor: ASUSTeK Computer INC. dmi.board.version: Rev X.0x dmi.chassis.asset.tag: Asset-1234567890 dmi.chassis.type: 3 dmi.chassis.vendor: Chassis Manufacture dmi.chassis.version: Chassis Version dmi.modalias: dmi:bvnAmericanMegatrendsInc.:bvr0901:bd09/10/2010:svnSystemmanufacturer:pnSystemProductName:pvrSystemVersion:rvnASUSTeKComputerINC.:rnM3N78-EM:rvrRevX.0x:cvnChassisManufacture:ct3:cvrChassisVersion: dmi.product.name: System Product Name dmi.product.version: System Version dmi.sys.vendor: System manufacturer To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1338706/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1297049] Re: [Dell Inc. Latitude E6420] suspend/resume failure [non-free: nvidia]
** This bug is no longer a duplicate of bug 1275621 [Hewlett-Packard HP Pavilion dv6 Notebook PC] suspend/resume failure -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1297049 Title: [Dell Inc. Latitude E6420] suspend/resume failure [non-free: nvidia] Status in linux package in Ubuntu: Confirmed Bug description: apport detected this error on a fresh boot. ProblemType: KernelOops DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-19-generic 3.13.0-19.40 ProcVersionSignature: Ubuntu 3.13.0-19.40-generic 3.13.6 Uname: Linux 3.13.0-19-generic x86_64 NonfreeKernelModules: nvidia Annotation: This occured during a previous suspend and prevented it from resuming properly. ApportVersion: 2.13.3-0ubuntu1 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC1: rgarner2756 F pulseaudio /dev/snd/pcmC1D0c: rgarner2756 F...m pulseaudio /dev/snd/controlC2: rgarner2756 F pulseaudio /dev/snd/controlC0: rgarner2756 F pulseaudio Date: Tue Mar 25 10:20:28 2014 ExecutablePath: /usr/share/apport/apportcheckresume Failure: suspend/resume HibernationDevice: RESUME=UUID=c7ef60d1-697d-4495-bb69-10665128efd3 InstallationDate: Installed on 2014-01-27 (55 days ago) InstallationMedia: Xubuntu 14.04 LTS Trusty Tahr - Alpha amd64 (20140121.1) InterpreterPath: /usr/bin/python3.4 MachineType: Dell Inc. Latitude E6420 ProcCmdline: /usr/bin/python3 /usr/share/apport/apportcheckresume ProcEnviron: TERM=linux PATH=(custom, no user) ProcFB: ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-19-generic root=UUID=e960e3c7-aa3d-43d3-9178-7719d9023e08 ro quiet splash PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No PulseAudio daemon running, or not running as session daemon. RelatedPackageVersions: linux-restricted-modules-3.13.0-19-generic N/A linux-backports-modules-3.13.0-19-generic N/A linux-firmware 1.126 SourcePackage: linux Title: [Dell Inc. Latitude E6420] suspend/resume failure [non-free: nvidia] UpgradeStatus: No upgrade log present (probably fresh install) UserGroups: dmi.bios.date: 01/01/2013 dmi.bios.vendor: Dell Inc. dmi.bios.version: A16 dmi.board.name: 032T9K dmi.board.vendor: Dell Inc. dmi.board.version: A02 dmi.chassis.type: 9 dmi.chassis.vendor: Dell Inc. dmi.modalias: dmi:bvnDellInc.:bvrA16:bd01/01/2013:svnDellInc.:pnLatitudeE6420:pvr01:rvnDellInc.:rn032T9K:rvrA02:cvnDellInc.:ct9:cvr: dmi.product.name: Latitude E6420 dmi.product.version: 01 dmi.sys.vendor: Dell Inc. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1297049/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1466349] Re: linux-lts-trusty: 3.13.0-55.94~precise1 -proposed tracker
** Changed in: kernel-sru-workflow/prepare-package-signed Status: New = Fix Released ** Changed in: kernel-sru-workflow/prepare-package-signed Assignee: Canonical Kernel Team (canonical-kernel-team) = Luis Henriques (henrix) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-lts-trusty in Ubuntu. https://bugs.launchpad.net/bugs/1466349 Title: linux-lts-trusty: 3.13.0-55.94~precise1 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: New Status in Kernel SRU Workflow package-testing series: New Status in Kernel SRU Workflow prepare-package series: New Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: New Status in Kernel SRU Workflow verification-testing series: New Status in linux-lts-trusty package in Ubuntu: Invalid Status in linux-lts-trusty source package in Precise: New Bug description: This bug is for tracking the 3.13.0-55.94~precise1 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Thursday, 18. June 2015 07:02 UTC kernel-stable-phase:Prepare kernel-stable-phase-changed:Thursday, 18. June 2015 07:02 UTC kernel-stable-master-bug:1466237 To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1466349/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1466267] Re: linux-armadaxp: 3.2.0-1652.73 -proposed tracker
** Changed in: kernel-sru-workflow/prepare-package-meta Status: Fix Released = Invalid -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1466267 Title: linux-armadaxp: 3.2.0-1652.73 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow package-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Invalid Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: Invalid Status in Kernel SRU Workflow upload-to-ppa series: Invalid Status in Kernel SRU Workflow verification-testing series: New Status in linux-armadaxp package in Ubuntu: Invalid Status in linux-armadaxp source package in Precise: In Progress Bug description: This bug is for tracking the 3.2.0-1652.73 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Thursday, 18. June 2015 01:02 UTC kernel-stable-master-bug:1466215 kernel-stable-Certification-testing-end:Thursday, 18. June 2015 04:01 UTC kernel-stable-Security-signoff-end:Thursday, 18. June 2015 04:01 UTC kernel-stable-phase:CopyToProposed kernel-stable-Prepare-package-end:Thursday, 18. June 2015 06:01 UTC kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 06:01 UTC kernel-stable-phase-changed:Thursday, 18. June 2015 06:01 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1466267/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1466349] Re: linux-lts-trusty: 3.13.0-55.94~precise1 -proposed tracker
Security Sign-off: This kernel is a 1-commit respin for a regression from a security update. ** Changed in: kernel-sru-workflow/prepare-package-meta Status: Fix Released = Invalid ** Changed in: kernel-sru-workflow/security-signoff Status: New = Fix Released ** Changed in: kernel-sru-workflow/security-signoff Assignee: Canonical Security Team (canonical-security) = Adam Conrad (adconrad) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-lts-trusty in Ubuntu. https://bugs.launchpad.net/bugs/1466349 Title: linux-lts-trusty: 3.13.0-55.94~precise1 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: New Status in Kernel SRU Workflow package-testing series: New Status in Kernel SRU Workflow prepare-package series: New Status in Kernel SRU Workflow prepare-package-meta series: Invalid Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: New Status in linux-lts-trusty package in Ubuntu: Invalid Status in linux-lts-trusty source package in Precise: New Bug description: This bug is for tracking the 3.13.0-55.94~precise1 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Thursday, 18. June 2015 07:02 UTC kernel-stable-phase:Prepare kernel-stable-phase-changed:Thursday, 18. June 2015 07:02 UTC kernel-stable-master-bug:1466237 kernel-stable-Security-signoff-end:Thursday, 18. June 2015 13:32 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1466349/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1354975] Re: iwlwifi Intel 7260 Wifi disconnects
Same problem on Lenovo Carbon X1 gen2 with Intel Wireless 7260 (rev 83). Using Ubuntu 15.04 with 3.19.0-21 kernel (x86_64). Bluetooth is soft-blocked with rfkill but this does not solve the problem. I constantly get disconnects: wlan0: deauthenticating from ... by local choice (Reason: 3=DEAUTH_LEAVING) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-firmware in Ubuntu. https://bugs.launchpad.net/bugs/1354975 Title: iwlwifi Intel 7260 Wifi disconnects Status in Unity Linux: New Status in linux-firmware package in Ubuntu: Fix Released Bug description: I experience frequent disconnects and auth issues, never more than 30 minutes without a disconnect. Sometimes dozens of disconnects in a few minutes. This happens with the default 7260-8 firmware. Tried replacing the -8 with -9 ucode. Failed to load due to API version. This loaded the -7 driver which seems to be more stable. Tested against 2.4ghz APs (Apple, Netgear, Linksys). ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-32-generic 3.13.0-32.57 ProcVersionSignature: Ubuntu 3.13.0-32.57-generic 3.13.11.4 Uname: Linux 3.13.0-32-generic x86_64 ApportVersion: 2.14.1-0ubuntu3.3 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: steve 2577 F pulseaudio /dev/snd/controlC1: steve 2577 F pulseaudio CurrentDesktop: Unity Date: Sun Aug 10 17:49:06 2014 HibernationDevice: RESUME=UUID=374a0c1c-4ac2-456b-a67e-9ea54fe11fe6 InstallationDate: Installed on 2013-12-28 (225 days ago) InstallationMedia: Ubuntu 13.10 Saucy Salamander - Release amd64 (20131016.1) MachineType: Dell Inc. XPS 12-9Q33 ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-32-generic root=UUID=58deb355-7a09-440b-ade2-69a84fd74460 ro ipv6.disable=1 quiet splash vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-3.13.0-32-generic N/A linux-backports-modules-3.13.0-32-generic N/A linux-firmware 1.127.5 SourcePackage: linux UpgradeStatus: Upgraded to trusty on 2014-07-06 (35 days ago) dmi.bios.date: 05/06/2013 dmi.bios.vendor: Dell Inc. dmi.bios.version: A00 dmi.board.name: XPS 12-9Q33 dmi.board.vendor: Dell Inc. dmi.board.version: A00 dmi.chassis.type: 8 dmi.chassis.vendor: Dell Inc. dmi.chassis.version: Not Specified dmi.modalias: dmi:bvnDellInc.:bvrA00:bd05/06/2013:svnDellInc.:pnXPS12-9Q33:pvrA00:rvnDellInc.:rnXPS12-9Q33:rvrA00:cvnDellInc.:ct8:cvrNotSpecified: dmi.product.name: XPS 12-9Q33 dmi.product.version: A00 dmi.sys.vendor: Dell Inc. To manage notifications about this bug go to: https://bugs.launchpad.net/unitylinux/+bug/1354975/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1297049] Re: [Dell Inc. Latitude E6420] suspend/resume failure [non-free: nvidia]
Note I removed the duplicate link (to #1275621) as the other link doesn't mention NVIDIA and it isn't a Dell machine, I suspect that the NVIDIA chipset is the problem. For the 4 years I've owned my E6420 I've failed to get reliable suspend/hibernate behaviour, I always turn the laptop off when I want to change location. Sometimes it'll suspend once or twice, sometimes it fails the first time. A failure can mean that it tries to suspend and then wakes up (sometimes having completely shut down - power light off, no activity...then a few seconds later it wakes up) or it'll start to suspend and then freeze on the console screen (having shut down Cinnamon). After a suspend it is hit or miss whether wifi is working. On occasion the Suspend does work correctly but I can't narrow down the conditions that make it work, it can fail (either re-awakening or freezing) if I try to Suspend just from a fresh boot. A year back I changed the behaviour so it'll only Suspend if I hit the power button and click Suspend (if I close the lid it'll just keep running), that way I can't accidentally close it thinking it might suspend correctly. Since it only Suspends if I click a button I'm confident that there's no odd hardware interactions (e.g. a laptop- closed sensor that's dodgy), as after I click Suspend I wait to see what happens without trying to close the lid. I'm using E6420 Bios A19 (from late 2013). This bug affects me right now (I tried Suspend again last week - same problems occurred). I'm running Linux Mint 17.1 (I've been using Mint for 2.5 years). I started with the official Ubuntu 10.10 Dell installation from 2011 when I bought the machine, that never successfully Hibernated or Suspended either. I've never used apport or other crash report tools, I'd be happy to do so if this might help? -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1297049 Title: [Dell Inc. Latitude E6420] suspend/resume failure [non-free: nvidia] Status in linux package in Ubuntu: Confirmed Bug description: apport detected this error on a fresh boot. ProblemType: KernelOops DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-19-generic 3.13.0-19.40 ProcVersionSignature: Ubuntu 3.13.0-19.40-generic 3.13.6 Uname: Linux 3.13.0-19-generic x86_64 NonfreeKernelModules: nvidia Annotation: This occured during a previous suspend and prevented it from resuming properly. ApportVersion: 2.13.3-0ubuntu1 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC1: rgarner2756 F pulseaudio /dev/snd/pcmC1D0c: rgarner2756 F...m pulseaudio /dev/snd/controlC2: rgarner2756 F pulseaudio /dev/snd/controlC0: rgarner2756 F pulseaudio Date: Tue Mar 25 10:20:28 2014 ExecutablePath: /usr/share/apport/apportcheckresume Failure: suspend/resume HibernationDevice: RESUME=UUID=c7ef60d1-697d-4495-bb69-10665128efd3 InstallationDate: Installed on 2014-01-27 (55 days ago) InstallationMedia: Xubuntu 14.04 LTS Trusty Tahr - Alpha amd64 (20140121.1) InterpreterPath: /usr/bin/python3.4 MachineType: Dell Inc. Latitude E6420 ProcCmdline: /usr/bin/python3 /usr/share/apport/apportcheckresume ProcEnviron: TERM=linux PATH=(custom, no user) ProcFB: ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-19-generic root=UUID=e960e3c7-aa3d-43d3-9178-7719d9023e08 ro quiet splash PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No PulseAudio daemon running, or not running as session daemon. RelatedPackageVersions: linux-restricted-modules-3.13.0-19-generic N/A linux-backports-modules-3.13.0-19-generic N/A linux-firmware 1.126 SourcePackage: linux Title: [Dell Inc. Latitude E6420] suspend/resume failure [non-free: nvidia] UpgradeStatus: No upgrade log present (probably fresh install) UserGroups: dmi.bios.date: 01/01/2013 dmi.bios.vendor: Dell Inc. dmi.bios.version: A16 dmi.board.name: 032T9K dmi.board.vendor: Dell Inc. dmi.board.version: A02 dmi.chassis.type: 9 dmi.chassis.vendor: Dell Inc. dmi.modalias: dmi:bvnDellInc.:bvrA16:bd01/01/2013:svnDellInc.:pnLatitudeE6420:pvr01:rvnDellInc.:rn032T9K:rvrA02:cvnDellInc.:ct9:cvr: dmi.product.name: Latitude E6420 dmi.product.version: 01 dmi.sys.vendor: Dell Inc. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1297049/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1466267] Re: linux-armadaxp: 3.2.0-1652.73 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-proposed Status: Confirmed = Fix Released ** Changed in: kernel-sru-workflow/promote-to-proposed Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Adam Conrad (adconrad) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1466267 Title: linux-armadaxp: 3.2.0-1652.73 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow package-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Invalid Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: Invalid Status in Kernel SRU Workflow upload-to-ppa series: Invalid Status in Kernel SRU Workflow verification-testing series: New Status in linux-armadaxp package in Ubuntu: Invalid Status in linux-armadaxp source package in Precise: In Progress Bug description: This bug is for tracking the 3.2.0-1652.73 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Thursday, 18. June 2015 01:02 UTC kernel-stable-master-bug:1466215 kernel-stable-Certification-testing-end:Thursday, 18. June 2015 04:01 UTC kernel-stable-Security-signoff-end:Thursday, 18. June 2015 04:01 UTC kernel-stable-phase:CopyToProposed kernel-stable-Prepare-package-end:Thursday, 18. June 2015 06:01 UTC kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 06:01 UTC kernel-stable-phase-changed:Thursday, 18. June 2015 06:01 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1466267/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1354975] Re: iwlwifi Intel 7260 Wifi disconnects
I have worked around the issue by setting my wifi router to the 'up to 54 Mbit/s' mode instead of 300 Mbit/s as it was initially. A proper fix would still be much appreciated, but this way it at least stopped constantly disconnecting. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-firmware in Ubuntu. https://bugs.launchpad.net/bugs/1354975 Title: iwlwifi Intel 7260 Wifi disconnects Status in Unity Linux: New Status in linux-firmware package in Ubuntu: Fix Released Bug description: I experience frequent disconnects and auth issues, never more than 30 minutes without a disconnect. Sometimes dozens of disconnects in a few minutes. This happens with the default 7260-8 firmware. Tried replacing the -8 with -9 ucode. Failed to load due to API version. This loaded the -7 driver which seems to be more stable. Tested against 2.4ghz APs (Apple, Netgear, Linksys). ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-32-generic 3.13.0-32.57 ProcVersionSignature: Ubuntu 3.13.0-32.57-generic 3.13.11.4 Uname: Linux 3.13.0-32-generic x86_64 ApportVersion: 2.14.1-0ubuntu3.3 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: steve 2577 F pulseaudio /dev/snd/controlC1: steve 2577 F pulseaudio CurrentDesktop: Unity Date: Sun Aug 10 17:49:06 2014 HibernationDevice: RESUME=UUID=374a0c1c-4ac2-456b-a67e-9ea54fe11fe6 InstallationDate: Installed on 2013-12-28 (225 days ago) InstallationMedia: Ubuntu 13.10 Saucy Salamander - Release amd64 (20131016.1) MachineType: Dell Inc. XPS 12-9Q33 ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-32-generic root=UUID=58deb355-7a09-440b-ade2-69a84fd74460 ro ipv6.disable=1 quiet splash vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-3.13.0-32-generic N/A linux-backports-modules-3.13.0-32-generic N/A linux-firmware 1.127.5 SourcePackage: linux UpgradeStatus: Upgraded to trusty on 2014-07-06 (35 days ago) dmi.bios.date: 05/06/2013 dmi.bios.vendor: Dell Inc. dmi.bios.version: A00 dmi.board.name: XPS 12-9Q33 dmi.board.vendor: Dell Inc. dmi.board.version: A00 dmi.chassis.type: 8 dmi.chassis.vendor: Dell Inc. dmi.chassis.version: Not Specified dmi.modalias: dmi:bvnDellInc.:bvrA00:bd05/06/2013:svnDellInc.:pnXPS12-9Q33:pvrA00:rvnDellInc.:rnXPS12-9Q33:rvrA00:cvnDellInc.:ct8:cvrNotSpecified: dmi.product.name: XPS 12-9Q33 dmi.product.version: A00 dmi.sys.vendor: Dell Inc. To manage notifications about this bug go to: https://bugs.launchpad.net/unitylinux/+bug/1354975/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1466237] Re: linux: 3.13.0-55.94 -proposed tracker
Security Sign-off: This kernel is a 1-commit respin for a regression from a security update. ** Changed in: kernel-sru-workflow/prepare-package-meta Status: Fix Released = Invalid ** Changed in: kernel-sru-workflow/security-signoff Status: New = Fix Released ** Changed in: kernel-sru-workflow/security-signoff Assignee: Canonical Security Team (canonical-security) = Adam Conrad (adconrad) ** Changed in: kernel-sru-workflow/promote-to-proposed Status: Confirmed = Fix Released ** Changed in: kernel-sru-workflow/promote-to-proposed Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Adam Conrad (adconrad) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1466237 Title: linux: 3.13.0-55.94 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: New Status in Kernel SRU Workflow package-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Invalid Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: New Status in linux package in Ubuntu: Invalid Status in linux source package in Trusty: New Bug description: This bug is for tracking the 3.13.0-56.93 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Wednesday, 17. June 2015 21:56 UTC kernel-stable-phase:CopyToProposed kernel-stable-Prepare-package-end:Thursday, 18. June 2015 07:03 UTC kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 07:03 UTC kernel-stable-phase-changed:Thursday, 18. June 2015 07:03 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1466237/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1466215] Re: linux: 3.2.0-86.124 -proposed tracker
Security Sign-off: This kernel is a 1-commit respin for a regression from a security update. ** Changed in: kernel-sru-workflow/security-signoff Status: New = Fix Released ** Changed in: kernel-sru-workflow/security-signoff Assignee: Canonical Security Team (canonical-security) = Adam Conrad (adconrad) ** Changed in: kernel-sru-workflow/promote-to-proposed Status: Confirmed = Fix Released ** Changed in: kernel-sru-workflow/promote-to-proposed Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Adam Conrad (adconrad) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1466215 Title: linux: 3.2.0-86.124 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: New Status in Kernel SRU Workflow package-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-lbm series: Invalid Status in Kernel SRU Workflow prepare-package-meta series: Invalid Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: New Status in linux package in Ubuntu: Invalid Status in linux source package in Precise: New Bug description: This bug is for tracking the 3.2.0-86.124 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Wednesday, 17. June 2015 20:33 UTC kernel-stable-phase:CopyToProposed kernel-stable-Prepare-package-end:Thursday, 18. June 2015 01:03 UTC kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 01:03 UTC kernel-stable-phase-changed:Thursday, 18. June 2015 01:03 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1466215/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1338706] Re: Samsung SSD 840 failed to get NCQ Send/Recv Log Emask 0x1 failed to set xfermode (err_mask=0x40) on upstream kernels = 3.12
Through, script in OP doesn't work correctly. fstrim: ./: FITRIM ioctl failed: input/output error -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1338706 Title: Samsung SSD 840 failed to get NCQ Send/Recv Log Emask 0x1 failed to set xfermode (err_mask=0x40) on upstream kernels = 3.12 Status in linux package in Ubuntu: Invalid Status in linux source package in Trusty: Fix Committed Status in linux source package in Utopic: Fix Committed Status in linux source package in Vivid: Fix Committed Status in linux source package in Wily: Invalid Bug description: [Impact] * Users with Samsung 8** SSD drives see miscellaneous errors and warning messages in the logs depending on the firmware level of the drive while booting or after running trim. [Test Case] * Run this script, and then check logs for errors. #!/bin/bash git clone git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git for i in {0..10} ; do cp -r linux linux$i done rm -rf linux* echo sudo fstrim requires your password sudo fstrim ./ [Regression Potential] * There is very little regression potential as this change simply prevents NCQ trim from being used on Samsung 8** drives. [Other Info] * Commit is upstream. * Greatly increasing the timeout for the drives seems to relieve the timeout errors. This may be due to trimming large numbers of sectors with single commands. It may be prudent for future upstream to break up large trims into multiple requests on smaller regions. ===Original Bug description == Samsung SSD 840 Series failed to get NCQ Send/Recv Log Emask 0x1. ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-30-generic 3.13.0-30.55 ProcVersionSignature: Ubuntu 3.13.0-30.55-generic 3.13.11.2 Uname: Linux 3.13.0-30-generic x86_64 ApportVersion: 2.14.1-0ubuntu3.2 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: user 2131 F pulseaudio CurrentDesktop: Unity Date: Mon Jul 7 20:01:28 2014 HibernationDevice: RESUME=UUID=685afcb7-7aa6-4048-af15-091d3bcd3b35 InstallationDate: Installed on 2014-06-22 (14 days ago) InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Release amd64 (20140417) IwConfig: eth0 no wireless extensions. lono wireless extensions. MachineType: System manufacturer System Product Name ProcFB: 0 nouveaufb ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.13.0-30-generic root=UUID=d7c2e1cb-d046-460c-83b8-0cfbb330d095 ro quiet splash vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-3.13.0-30-generic N/A linux-backports-modules-3.13.0-30-generic N/A linux-firmware 1.127.4 RfKill: SourcePackage: linux UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 09/10/2010 dmi.bios.vendor: American Megatrends Inc. dmi.bios.version: 0901 dmi.board.asset.tag: To Be Filled By O.E.M. dmi.board.name: M3N78-EM dmi.board.vendor: ASUSTeK Computer INC. dmi.board.version: Rev X.0x dmi.chassis.asset.tag: Asset-1234567890 dmi.chassis.type: 3 dmi.chassis.vendor: Chassis Manufacture dmi.chassis.version: Chassis Version dmi.modalias: dmi:bvnAmericanMegatrendsInc.:bvr0901:bd09/10/2010:svnSystemmanufacturer:pnSystemProductName:pvrSystemVersion:rvnASUSTeKComputerINC.:rnM3N78-EM:rvrRevX.0x:cvnChassisManufacture:ct3:cvrChassisVersion: dmi.product.name: System Product Name dmi.product.version: System Version dmi.sys.vendor: System manufacturer To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1338706/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1466013] Re: kdump-tools does not have an upstart job
** Description changed: + [SRU justification] + The upstart job avoids the sysVinit scripts to be run while kdump-tools is doing the kernel crash dump capture + + [Impact] + Potential impossibility to capture a kernel crash dump + + [Fix] + Add kdump-tools.conf upstart job + + [Test Case] + With the upstart job, the kdump-tools kernel dump capture will run before any of the tasks triggered by RUNLEVEL [2345] will run. + + [Regression] + Minimal; The job uses the same syntax as the sysVinit job currently in use. + + [Original description of the problem] + kdump-tools relies on a sysVinit script to capture the kernel dump. It sometimes gets interference from other jobs starting at runlevels 2 to 5. An upstart job starting before RUNLEVEL is emitted would alleviate that. ** Tags added: sts -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to makedumpfile in Ubuntu. https://bugs.launchpad.net/bugs/1466013 Title: kdump-tools does not have an upstart job Status in makedumpfile package in Ubuntu: Invalid Status in makedumpfile source package in Trusty: In Progress Bug description: [SRU justification] The upstart job avoids the sysVinit scripts to be run while kdump-tools is doing the kernel crash dump capture [Impact] Potential impossibility to capture a kernel crash dump [Fix] Add kdump-tools.conf upstart job [Test Case] With the upstart job, the kdump-tools kernel dump capture will run before any of the tasks triggered by RUNLEVEL [2345] will run. [Regression] Minimal; The job uses the same syntax as the sysVinit job currently in use. [Original description of the problem] kdump-tools relies on a sysVinit script to capture the kernel dump. It sometimes gets interference from other jobs starting at runlevels 2 to 5. An upstart job starting before RUNLEVEL is emitted would alleviate that. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/makedumpfile/+bug/1466013/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1466250] Re: linux: 3.16.0-41.57 -proposed tracker
** Changed in: kernel-sru-workflow/prepare-package-signed Status: New = Fix Released ** Changed in: kernel-sru-workflow/prepare-package-signed Assignee: Canonical Kernel Team (canonical-kernel-team) = Brad Figg (brad-figg) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1466250 Title: linux: 3.16.0-41.57 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: New Status in Kernel SRU Workflow package-testing series: New Status in Kernel SRU Workflow prepare-package series: New Status in Kernel SRU Workflow prepare-package-meta series: Invalid Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: New Status in Kernel SRU Workflow verification-testing series: New Status in linux package in Ubuntu: Invalid Status in linux source package in Utopic: New Bug description: This bug is for tracking the 3.16.0-41.57 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Wednesday, 17. June 2015 23:34 UTC kernel-stable-phase:Prepare kernel-stable-phase-changed:Wednesday, 17. June 2015 23:34 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1466250/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1466349] Re: linux-lts-trusty: 3.13.0-55.94~precise1 -proposed tracker
** Description changed: This bug is for tracking the 3.13.0-55.94~precise1 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Thursday, 18. June 2015 07:02 UTC kernel-stable-phase:Prepare kernel-stable-phase-changed:Thursday, 18. June 2015 07:02 UTC kernel-stable-master-bug:1466237 + kernel-stable-Security-signoff-end:Thursday, 18. June 2015 13:32 UTC -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-lts-trusty in Ubuntu. https://bugs.launchpad.net/bugs/1466349 Title: linux-lts-trusty: 3.13.0-55.94~precise1 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: New Status in Kernel SRU Workflow package-testing series: New Status in Kernel SRU Workflow prepare-package series: New Status in Kernel SRU Workflow prepare-package-meta series: Invalid Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: New Status in linux-lts-trusty package in Ubuntu: Invalid Status in linux-lts-trusty source package in Precise: New Bug description: This bug is for tracking the 3.13.0-55.94~precise1 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Thursday, 18. June 2015 07:02 UTC kernel-stable-phase:Prepare kernel-stable-phase-changed:Thursday, 18. June 2015 07:02 UTC kernel-stable-master-bug:1466237 kernel-stable-Security-signoff-end:Thursday, 18. June 2015 13:32 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1466349/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1466266] Re: linux-ti-omap4: 3.2.0-1466.87 -proposed tracker
** Summary changed: - linux-ti-omap4: version to be filled -proposed tracker + linux-ti-omap4: 3.2.0-1466.87 -proposed tracker ** Changed in: kernel-sru-workflow/prepare-package-meta Status: New = Invalid ** Changed in: linux-ti-omap4 (Ubuntu) Status: New = Invalid -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-ti-omap4 in Ubuntu. https://bugs.launchpad.net/bugs/1466266 Title: linux-ti-omap4: 3.2.0-1466.87 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow package-testing series: New Status in Kernel SRU Workflow prepare-package series: New Status in Kernel SRU Workflow prepare-package-meta series: Invalid Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: New Status in Kernel SRU Workflow upload-to-ppa series: New Status in Kernel SRU Workflow verification-testing series: New Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux-ti-omap4 source package in Precise: New Bug description: This bug is for tracking the version to be filled upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Thursday, 18. June 2015 01:00 UTC kernel-stable-phase:Prepare kernel-stable-phase-changed:Thursday, 18. June 2015 01:00 UTC kernel-stable-master-bug:1466215 To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1466266/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1466266] Re: linux-ti-omap4: 3.2.0-1466.87 -proposed tracker
** Description changed: This bug is for tracking the version to be filled upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Thursday, 18. June 2015 01:00 UTC kernel-stable-phase:Prepare kernel-stable-phase-changed:Thursday, 18. June 2015 01:00 UTC kernel-stable-master-bug:1466215 + kernel-stable-Certification-testing-end:Thursday, 18. June 2015 15:01 UTC + kernel-stable-Security-signoff-end:Thursday, 18. June 2015 15:01 UTC -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-ti-omap4 in Ubuntu. https://bugs.launchpad.net/bugs/1466266 Title: linux-ti-omap4: 3.2.0-1466.87 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow package-testing series: New Status in Kernel SRU Workflow prepare-package series: New Status in Kernel SRU Workflow prepare-package-meta series: Invalid Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow upload-to-ppa series: New Status in Kernel SRU Workflow verification-testing series: New Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux-ti-omap4 source package in Precise: New Bug description: This bug is for tracking the version to be filled upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Thursday, 18. June 2015 01:00 UTC kernel-stable-phase:Prepare kernel-stable-phase-changed:Thursday, 18. June 2015 01:00 UTC kernel-stable-master-bug:1466215 kernel-stable-Certification-testing-end:Thursday, 18. June 2015 15:01 UTC kernel-stable-Security-signoff-end:Thursday, 18. June 2015 15:01 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1466266/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1425576] Re: Occasional crash in APM xgene enet driver on kernels prior to v3.19
** Description changed: - This crash was submitted upstream and a fix was already present, but it - didn't land until the 3.19 kernel. This bug is to track getting that fix - into trusty and utopic. + [Impact] + System panics every few hours under constant network load - Unable to handle kernel NULL pointer dereference at virtual address 00c0 - pgd = ffc3e639a000 - [00c0] *pgd=0043e629d003, *pud=0043e629d003, *pmd= - Internal error: Oops: 9606 [#1] PREEMPT SMP - Modules linked in: - CPU: 0 PID: 6643 Comm: qemu-system-aar Not tainted 3.19.0-rc7+ #254 - Hardware name: APM X-Gene Mustang board (DT) - task: ffc3ee3aee00 ti: ffc3c044c000 task.ti: ffc3c044c000 - PC is at xgene_enet_process_ring+0x94/0x328 - LR is at xgene_enet_process_ring+0x78/0x328 - pc : [ffc0003f9058] lr : [ffc0003f903c] pstate: 8145 - sp : ffc3c044fa00 - x29: ffc3c044fa00 x28: ffc0fe8aa218 - x27: x26: - x25: ffc3ee2b7000 x24: 0040 - x23: ffc0fe8aa418 x22: 01ff - x21: 0001 x20: ffc0ff058380 - x19: 001c x18: 007f82d1c1f0 - x17: 007f84afbc90 x16: ffc0001a6a8c - x15: 007f84b805a0 x14: - x13: d0d03820 x12: - x11: 0024 x10: d0d30a20 - x9 : ffc00031da28 x8 : ffbdc000 - x7 : ffc3cae0285e x6 : 0040fec0 - x5 : 0c08100801400148 x4 : 0040ff00 - x3 : 000200d1 x2 : 0066 - x1 : 0043cae0285e x0 : ffc3ee2bb818 + [Test Case] + On the X-Gene system, start an iperf server: + $ iperf -s + Connect to it from another system (1Gbps is sufficient) + $ iperf -t 10 -c xgene host - Process qemu-system-aar (pid: 6643, stack limit = 0xffc3c044c058) - Stack: (0xffc3c044fa00 to 0xffc3c045) - fa00: c044fa70 ffc3 003f93d0 ffc0 fe8aa290 ffc0 - fa20: 0040 0078e000 ffc0 0016cac3 0001 c044fb20 ffc3 - fa40: ff7d4000 0003 007825c0 ffc0 012c fff565c0 ffc3 - fa60: ffc0 ee2b7000 ffc3 c044faa0 ffc3 004a5cec ffc0 - fa80: fe8aa290 ffc0 0040 84b805a0 007f - faa0: c044fb40 ffc3 000b5da0 ffc0 c044c000 ffc3 0078e000 ffc0 - fac0: 0077faa0 ffc0 c044fb40 ffc3 0018 0101 - fae0: 0003 0078e0c0 ffc0 0078e0d8 ffc0 - fb00: 0008 006fbd90 ffc0 006fb9f0 ffc0 007e3d74 ffc0 - fb20: c044fb20 ffc3 c044fb20 ffc3 c044fb30 ffc3 c044fb30 ffc3 - fb40: c044fbc0 ffc3 000b6134 ffc0 0078 ffc0 - fb60: 2010 ff80 6145 - fb80: 011a 001d 0079e000 ffc0 c044c000 ffc3 - fba0: 000a 0016cac2 0001 00570c08 ffc0 084040c0 000a - fbc0: c044fbe0 ffc3 000ecb2c ffc0 0078 ffc0 000ecafc ffc0 - fbe0: c044fc20 ffc3 00082420 ffc0 00797000 ffc0 c044fc50 ffc3 - fc00: 200c ff80 000fc014 ffc0 ee01 ffc3 000a253c 005c - fc20: c044fd70 ffc3 00085da8 ffc0 fd024c90 ffc0 - fc40: c044fd70 ffc3 000d0938 ffc0 fd024c98 ffc0 ee3aee00 ffc3 - fc60: ae80 - fc80: c7e8ed00 5df42439 001d 0092 - fca0: 001b 0092 - fcc0: 84b805a0 007f 001a6a8c ffc0 84afbc90 007f - fce0: 82d1c1f0 007f fd024c90 ffc0 - fd00: feabe300 ffc0 ae80 011a - fd20: 001d 0079e000 ffc0 c044c000 ffc3 c044fd70 ffc3 - fd40: 0009c1d0 ffc0 c044fd70 ffc3 000d0938 ffc0 6145 - fd60: c044fd70 ffc3 0009c1a4 ffc0 c044fda0 ffc3 0009c2e0 ffc0 - fd80: feabe300 ffc0 fd024c90 ffc0 0079e000 ffc0 c044c000 - fda0: c044fe10 ffc3 001a6824 ffc0 feabe300 ffc0 - fdc0: edc06f70 ffc3 000b ae80 0015 - fde0: 011a 0040 ae80 c044fe20 ffc3 0019772c ffc0 - fe00: edb3 ffc3 0001 c044fe90 ffc3 001a6b10 ffc0 - fe20: feabe301 ffc0 feabe300 ffc0 - fe40: c044fe70 ffc3 001b0a2c ffc0 ed3ea300 ffc3 - fe60: c044fe80 000b feabe300 ffc0 c044fe80 ffc3 001b0a80 ffc0 - fe80: c044fe90 ffc3 001a6acc ffc0 82d1c600 007f 00086430 ffc0 - fea0: 15b1cea0 84afbc9c 007f - fec0: 6000 0015 000b
[Kernel-packages] [Bug 1466266] Re: linux-ti-omap4: 3.2.0-1466.87 -proposed tracker
Security Sign-off: This kernel is a 1-commit respin for a regression from a security update. ** Changed in: kernel-sru-workflow/security-signoff Status: New = Fix Released ** Changed in: kernel-sru-workflow/security-signoff Assignee: Canonical Security Team (canonical-security) = Adam Conrad (adconrad) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-ti-omap4 in Ubuntu. https://bugs.launchpad.net/bugs/1466266 Title: linux-ti-omap4: 3.2.0-1466.87 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow package-testing series: New Status in Kernel SRU Workflow prepare-package series: New Status in Kernel SRU Workflow prepare-package-meta series: Invalid Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow upload-to-ppa series: New Status in Kernel SRU Workflow verification-testing series: New Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux-ti-omap4 source package in Precise: New Bug description: This bug is for tracking the version to be filled upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Thursday, 18. June 2015 01:00 UTC kernel-stable-phase:Prepare kernel-stable-phase-changed:Thursday, 18. June 2015 01:00 UTC kernel-stable-master-bug:1466215 To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1466266/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1445195] Re: [Hyper-V] Kernel patches for storvsc
Yes that is the correct kernel. I've moved the files to the utopic directory now. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1445195 Title: [Hyper-V] Kernel patches for storvsc Status in linux package in Ubuntu: Triaged Status in linux source package in Precise: Triaged Status in linux source package in Trusty: Triaged Status in linux source package in Utopic: Triaged Status in linux source package in Vivid: Fix Committed Status in linux source package in Wily: Triaged Bug description: Storage driver performance updates for vivid K. Y. Srinivasan (7): scsi: storvsc: Increase the ring buffer size scsi: storvsc: Size the queue depth based on the ringbuffer size scsi: storvsc: Always send on the selected outgoing channel scsi: storvsc: Retrieve information about the capability of the target scsi: storvsc: Fix a bug in copy_from_bounce_buffer() scsi: storvsc: Don't assume that the scatterlist is not chained scsi: storvsc: Set the tablesize based on the information given by the host To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1445195/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1458042] Re: [SRU] xgene-enet: add SGMII based 1GbE support for the second port
** Also affects: linux (Ubuntu Wily) Importance: Undecided Assignee: Craig Magina (craig.magina) Status: In Progress ** Also affects: linux (Ubuntu Vivid) Importance: Undecided Status: New -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1458042 Title: [SRU] xgene-enet: add SGMII based 1GbE support for the second port Status in linux package in Ubuntu: In Progress Status in linux source package in Trusty: Fix Committed Status in linux source package in Utopic: Fix Committed Status in linux source package in Vivid: New Status in linux source package in Wily: In Progress Bug description: [Impact] APM's Mustang boards have a second SGMII based 1GbE interface that is currently unsupported by Ubuntu. [Test Case] Verify that the previously non-working SGMII based 1GbE interface now works. [Regression Risk] Since the changes touch the driver that supports the existing GbE and first SGMII support, it is possible that that support has become impacted. The changes also impact drivers/of/of_net.c, which could impact other users of the interface. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1458042/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1466267] Re: linux-armadaxp: 3.2.0-1652.73 -proposed tracker
** Changed in: kernel-sru-workflow/verification-testing Status: New = In Progress ** Changed in: kernel-sru-workflow/regression-testing Status: New = Confirmed ** Description changed: This bug is for tracking the 3.2.0-1652.73 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Thursday, 18. June 2015 01:02 UTC kernel-stable-master-bug:1466215 kernel-stable-Certification-testing-end:Thursday, 18. June 2015 04:01 UTC kernel-stable-Security-signoff-end:Thursday, 18. June 2015 04:01 UTC - kernel-stable-phase:CopyToProposed kernel-stable-Prepare-package-end:Thursday, 18. June 2015 06:01 UTC kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 06:01 UTC - kernel-stable-phase-changed:Thursday, 18. June 2015 06:01 UTC kernel-stable-Promote-to-proposed-end:Thursday, 18. June 2015 13:32 UTC + kernel-stable-phase:Verification Testing + kernel-stable-phase-changed:Thursday, 18. June 2015 15:01 UTC + kernel-stable-Verification-testing-start:Thursday, 18. June 2015 15:01 UTC + proposed-announcement-sent:True + kernel-stable-Regression-testing-start:Thursday, 18. June 2015 15:01 UTC -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1466267 Title: linux-armadaxp: 3.2.0-1652.73 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow package-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Invalid Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Confirmed Status in Kernel SRU Workflow security-signoff series: Invalid Status in Kernel SRU Workflow upload-to-ppa series: Invalid Status in Kernel SRU Workflow verification-testing series: In Progress Status in linux-armadaxp package in Ubuntu: Invalid Status in linux-armadaxp source package in Precise: In Progress Bug description: This bug is for tracking the 3.2.0-1652.73 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Thursday, 18. June 2015 01:02 UTC kernel-stable-master-bug:1466215 kernel-stable-Certification-testing-end:Thursday, 18. June 2015 04:01 UTC kernel-stable-Security-signoff-end:Thursday, 18. June 2015 04:01 UTC kernel-stable-Prepare-package-end:Thursday, 18. June 2015 06:01 UTC kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 06:01 UTC kernel-stable-Promote-to-proposed-end:Thursday, 18. June 2015 13:32 UTC kernel-stable-phase:Verification Testing kernel-stable-phase-changed:Thursday, 18. June 2015 15:01 UTC kernel-stable-Verification-testing-start:Thursday, 18. June 2015 15:01 UTC proposed-announcement-sent:True kernel-stable-Regression-testing-start:Thursday, 18. June 2015 15:01 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1466267/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1466237] Re: linux: 3.13.0-55.94 -proposed tracker
** Changed in: kernel-sru-workflow/verification-testing Status: New = In Progress ** Changed in: kernel-sru-workflow/certification-testing Status: New = Confirmed ** Changed in: kernel-sru-workflow/regression-testing Status: New = Confirmed ** Description changed: This bug is for tracking the 3.13.0-56.93 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Wednesday, 17. June 2015 21:56 UTC - kernel-stable-phase:CopyToProposed kernel-stable-Prepare-package-end:Thursday, 18. June 2015 07:03 UTC kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 07:03 UTC - kernel-stable-phase-changed:Thursday, 18. June 2015 07:03 UTC kernel-stable-Promote-to-proposed-end:Thursday, 18. June 2015 13:32 UTC kernel-stable-Security-signoff-end:Thursday, 18. June 2015 13:32 UTC + kernel-stable-phase:Verification Testing + kernel-stable-phase-changed:Thursday, 18. June 2015 15:01 UTC + kernel-stable-Verification-testing-start:Thursday, 18. June 2015 15:01 UTC + kernel-stable-Certification-testing-start:Thursday, 18. June 2015 15:01 UTC + proposed-announcement-sent:True + kernel-stable-Regression-testing-start:Thursday, 18. June 2015 15:01 UTC -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1466237 Title: linux: 3.13.0-55.94 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: Confirmed Status in Kernel SRU Workflow package-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Invalid Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Confirmed Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: In Progress Status in linux package in Ubuntu: Invalid Status in linux source package in Trusty: New Bug description: This bug is for tracking the 3.13.0-56.93 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Wednesday, 17. June 2015 21:56 UTC kernel-stable-Prepare-package-end:Thursday, 18. June 2015 07:03 UTC kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 07:03 UTC kernel-stable-Promote-to-proposed-end:Thursday, 18. June 2015 13:32 UTC kernel-stable-Security-signoff-end:Thursday, 18. June 2015 13:32 UTC kernel-stable-phase:Verification Testing kernel-stable-phase-changed:Thursday, 18. June 2015 15:01 UTC kernel-stable-Verification-testing-start:Thursday, 18. June 2015 15:01 UTC kernel-stable-Certification-testing-start:Thursday, 18. June 2015 15:01 UTC proposed-announcement-sent:True kernel-stable-Regression-testing-start:Thursday, 18. June 2015 15:01 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1466237/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1465909] Re: linux-lts-trusty: 3.13.0-56.93~precise1 -proposed tracker
*** This bug is a duplicate of bug 1466349 *** https://bugs.launchpad.net/bugs/1466349 ** This bug has been marked a duplicate of bug 1466349 linux-lts-trusty: 3.13.0-55.94~precise1 -proposed tracker -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-lts-trusty in Ubuntu. https://bugs.launchpad.net/bugs/1465909 Title: linux-lts-trusty: 3.13.0-56.93~precise1 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: New Status in Kernel SRU Workflow package-testing series: New Status in Kernel SRU Workflow prepare-package series: New Status in Kernel SRU Workflow prepare-package-meta series: New Status in Kernel SRU Workflow prepare-package-signed series: New Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: New Status in Kernel SRU Workflow verification-testing series: New Status in linux-lts-trusty package in Ubuntu: New Status in linux-lts-trusty source package in Precise: New Bug description: This bug is for tracking the 3.13.0-56.93~precise1 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Wednesday, 17. June 2015 02:04 UTC kernel-stable-phase:Prepare kernel-stable-phase-changed:Wednesday, 17. June 2015 02:04 UTC kernel-stable-master-bug:1465798 To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1465909/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1466364] Re: Kernel crash on running mercurial clone on a btrfs file system on a SSD Ubuntu 14.04
Did this issue start happening after an update/upgrade? Was there a prior kernel version where you were not having this particular problem? Would it be possible for you to test the latest upstream kernel? Refer to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest v4.1 kernel[0]. If this bug is fixed in the mainline kernel, please add the following tag 'kernel-fixed-upstream'. If the mainline kernel does not fix this bug, please add the tag: 'kernel-bug-exists-upstream'. If you are unable to test the mainline kernel, for example it will not boot, please add the tag: 'kernel-unable-to-test-upstream'. Once testing of the upstream kernel is complete, please mark this bug as Confirmed. Thanks in advance. [0] http://kernel.ubuntu.com/~kernel-ppa/mainline/v4.1-rc8-unstable/ ** Changed in: linux (Ubuntu) Importance: Undecided = High ** Changed in: linux (Ubuntu) Status: Confirmed = Incomplete -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1466364 Title: Kernel crash on running mercurial clone on a btrfs file system on a SSD Ubuntu 14.04 Status in linux package in Ubuntu: Incomplete Bug description: On running mercurial commands which add/remove lots of files from the disk (typically hard linked) the following error shows up. Since btrfs doesn't really have a fsck utility not sure what I should be running Jun 18 12:57:27 one kernel: [151416.037158] CPU: 0 PID: 8362 Comm: hg Not tainted 3.13.0-55-generic #92-Ubuntu Jun 18 12:57:27 one kernel: [151416.038376] Hardware name: /DH61WW, BIOS BEH6110H.86A.0035.2012.0112.2206 01/12/2012 Jun 18 12:57:27 one kernel: [151416.039594] task: 880082fd6000 ti: 8801023d2000 task.ti: 8801023d2000 Jun 18 12:57:27 one kernel: [151416.040812] RIP: 0010:[8137287d] [8137287d] memcpy+0xd/0x110 Jun 18 12:57:27 one kernel: [151416.042036] RSP: 0018:8801023d3910 EFLAGS: 00010202 Jun 18 12:57:27 one kernel: [151416.043258] RAX: 880168d67dfe RBX: 009f RCX: 0013 Jun 18 12:57:27 one kernel: [151416.044491] RDX: 0007 RSI: 00050800 RDI: 880168d67dfe Jun 18 12:57:27 one kernel: [151416.045727] RBP: 8801023d3948 R08: 1000 R09: 8801023d3918 Jun 18 12:57:27 one kernel: [151416.046970] R10: R11: 0003 R12: 88008f53bb28 Jun 18 12:57:27 one kernel: [151416.048225] R13: 1600 R14: 880168d67e9d R15: 009f Jun 18 12:57:27 one kernel: [151416.049482] FS: 7fa796d7c740() GS:88021fa0() knlGS: Jun 18 12:57:27 one kernel: [151416.050737] CS: 0010 DS: ES: CR0: 80050033 Jun 18 12:57:27 one kernel: [151416.051994] CR2: 7fa796d9d000 CR3: 00017f6dd000 CR4: 000407f0 Jun 18 12:57:27 one kernel: [151416.053268] Stack: Jun 18 12:57:27 one kernel: [151416.054536] a028049c 1000 88020ebcf800 88020d8273f0 Jun 18 12:57:27 one kernel: [151416.055820] 88017125f640 880193263720 8801023d3a08 Jun 18 12:57:27 one kernel: [151416.057103] a02653dc 3188 1000 Jun 18 12:57:27 one kernel: [151416.058391] Call Trace: Jun 18 12:57:27 one kernel: [151416.059686] [a028049c] ? read_extent_buffer+0xbc/0x110 [btrfs] Jun 18 12:57:27 one kernel: [151416.061114] [a02653dc] btrfs_get_extent+0x91c/0x970 [btrfs] Jun 18 12:57:27 one kernel: [151416.062471] [a027c697] __do_readpage+0x357/0x730 [btrfs] Jun 18 12:57:27 one kernel: [151416.063792] [a0264ac0] ? btrfs_real_readdir+0x5b0/0x5b0 [btrfs] Jun 18 12:57:27 one kernel: [151416.065110] [a027cdf2] __extent_readpages.constprop.41+0x2a2/0x2c0 [btrfs] Jun 18 12:57:27 one kernel: [151416.066441] [a0264ac0] ? btrfs_real_readdir+0x5b0/0x5b0 [btrfs] Jun 18 12:57:27 one kernel: [151416.067756] [a027ec76] extent_readpages+0x1b6/0x1c0 [btrfs] Jun 18 12:57:27 one kernel: [151416.069084] [a0264ac0] ? btrfs_real_readdir+0x5b0/0x5b0 [btrfs] Jun 18 12:57:27 one kernel: [151416.070385] [81197dc3] ? alloc_pages_current+0xa3/0x160 Jun 18 12:57:27 one kernel: [151416.071699] [a0262c1f] btrfs_readpages+0x1f/0x30 [btrfs] Jun 18 12:57:27 one kernel: [151416.072969] [8115bb99] __do_page_cache_readahead+0x1b9/0x260 Jun 18 12:57:27 one kernel: [151416.074213] [8115c072] ondemand_readahead+0x152/0x2a0 Jun 18 12:57:27 one kernel: [151416.075455] [8117ecc8] ? __vma_link_rb+0xb8/0xe0 Jun 18 12:57:27 one kernel: [151416.076694] [8115c1f1] page_cache_sync_readahead+0x31/0x50 Jun 18 12:57:27 one kernel: [151416.077930] [81151cb5] generic_file_aio_read+0x4c5/0x700 Jun 18 12:57:27 one
[Kernel-packages] [Bug 1466215] Re: linux: 3.2.0-86.124 -proposed tracker
** Changed in: kernel-sru-workflow/verification-testing Status: New = In Progress ** Changed in: kernel-sru-workflow/certification-testing Status: New = Confirmed ** Changed in: kernel-sru-workflow/regression-testing Status: New = Confirmed ** Description changed: This bug is for tracking the 3.2.0-86.124 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Wednesday, 17. June 2015 20:33 UTC - kernel-stable-phase:CopyToProposed kernel-stable-Prepare-package-end:Thursday, 18. June 2015 01:03 UTC kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 01:03 UTC - kernel-stable-phase-changed:Thursday, 18. June 2015 01:03 UTC kernel-stable-Promote-to-proposed-end:Thursday, 18. June 2015 13:31 UTC kernel-stable-Security-signoff-end:Thursday, 18. June 2015 13:31 UTC + kernel-stable-phase:Verification Testing + kernel-stable-phase-changed:Thursday, 18. June 2015 15:00 UTC + kernel-stable-Verification-testing-start:Thursday, 18. June 2015 15:00 UTC + kernel-stable-Certification-testing-start:Thursday, 18. June 2015 15:00 UTC + proposed-announcement-sent:True + kernel-stable-Regression-testing-start:Thursday, 18. June 2015 15:00 UTC -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1466215 Title: linux: 3.2.0-86.124 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: Confirmed Status in Kernel SRU Workflow package-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-lbm series: Invalid Status in Kernel SRU Workflow prepare-package-meta series: Invalid Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Confirmed Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: In Progress Status in linux package in Ubuntu: Invalid Status in linux source package in Precise: New Bug description: This bug is for tracking the 3.2.0-86.124 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Wednesday, 17. June 2015 20:33 UTC kernel-stable-Prepare-package-end:Thursday, 18. June 2015 01:03 UTC kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 01:03 UTC kernel-stable-Promote-to-proposed-end:Thursday, 18. June 2015 13:31 UTC kernel-stable-Security-signoff-end:Thursday, 18. June 2015 13:31 UTC kernel-stable-phase:Verification Testing kernel-stable-phase-changed:Thursday, 18. June 2015 15:00 UTC kernel-stable-Verification-testing-start:Thursday, 18. June 2015 15:00 UTC kernel-stable-Certification-testing-start:Thursday, 18. June 2015 15:00 UTC proposed-announcement-sent:True kernel-stable-Regression-testing-start:Thursday, 18. June 2015 15:00 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1466215/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1425576] Re: Occasional crash in APM xgene enet driver on kernels prior to v3.19
After testing with the proposed backport[1], I was able to run the iperf test overnight on a trusty kernel w/o any crashes. [1]http://kernel.ubuntu.com/git/ming/ubuntu-utopic.git/commit/?h=arm64 -net-backportid=d46456e3ed9153e743f2add6e01d06c56eb2ceb7 ** Changed in: linux (Ubuntu Trusty) Status: New = In Progress ** Changed in: linux (Ubuntu Utopic) Status: Triaged = In Progress -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1425576 Title: Occasional crash in APM xgene enet driver on kernels prior to v3.19 Status in linux package in Ubuntu: Triaged Status in linux source package in Trusty: In Progress Status in linux source package in Utopic: In Progress Bug description: This crash was submitted upstream and a fix was already present, but it didn't land until the 3.19 kernel. This bug is to track getting that fix into trusty and utopic. Unable to handle kernel NULL pointer dereference at virtual address 00c0 pgd = ffc3e639a000 [00c0] *pgd=0043e629d003, *pud=0043e629d003, *pmd= Internal error: Oops: 9606 [#1] PREEMPT SMP Modules linked in: CPU: 0 PID: 6643 Comm: qemu-system-aar Not tainted 3.19.0-rc7+ #254 Hardware name: APM X-Gene Mustang board (DT) task: ffc3ee3aee00 ti: ffc3c044c000 task.ti: ffc3c044c000 PC is at xgene_enet_process_ring+0x94/0x328 LR is at xgene_enet_process_ring+0x78/0x328 pc : [ffc0003f9058] lr : [ffc0003f903c] pstate: 8145 sp : ffc3c044fa00 x29: ffc3c044fa00 x28: ffc0fe8aa218 x27: x26: x25: ffc3ee2b7000 x24: 0040 x23: ffc0fe8aa418 x22: 01ff x21: 0001 x20: ffc0ff058380 x19: 001c x18: 007f82d1c1f0 x17: 007f84afbc90 x16: ffc0001a6a8c x15: 007f84b805a0 x14: x13: d0d03820 x12: x11: 0024 x10: d0d30a20 x9 : ffc00031da28 x8 : ffbdc000 x7 : ffc3cae0285e x6 : 0040fec0 x5 : 0c08100801400148 x4 : 0040ff00 x3 : 000200d1 x2 : 0066 x1 : 0043cae0285e x0 : ffc3ee2bb818 Process qemu-system-aar (pid: 6643, stack limit = 0xffc3c044c058) Stack: (0xffc3c044fa00 to 0xffc3c045) fa00: c044fa70 ffc3 003f93d0 ffc0 fe8aa290 ffc0 fa20: 0040 0078e000 ffc0 0016cac3 0001 c044fb20 ffc3 fa40: ff7d4000 0003 007825c0 ffc0 012c fff565c0 ffc3 fa60: ffc0 ee2b7000 ffc3 c044faa0 ffc3 004a5cec ffc0 fa80: fe8aa290 ffc0 0040 84b805a0 007f faa0: c044fb40 ffc3 000b5da0 ffc0 c044c000 ffc3 0078e000 ffc0 fac0: 0077faa0 ffc0 c044fb40 ffc3 0018 0101 fae0: 0003 0078e0c0 ffc0 0078e0d8 ffc0 fb00: 0008 006fbd90 ffc0 006fb9f0 ffc0 007e3d74 ffc0 fb20: c044fb20 ffc3 c044fb20 ffc3 c044fb30 ffc3 c044fb30 ffc3 fb40: c044fbc0 ffc3 000b6134 ffc0 0078 ffc0 fb60: 2010 ff80 6145 fb80: 011a 001d 0079e000 ffc0 c044c000 ffc3 fba0: 000a 0016cac2 0001 00570c08 ffc0 084040c0 000a fbc0: c044fbe0 ffc3 000ecb2c ffc0 0078 ffc0 000ecafc ffc0 fbe0: c044fc20 ffc3 00082420 ffc0 00797000 ffc0 c044fc50 ffc3 fc00: 200c ff80 000fc014 ffc0 ee01 ffc3 000a253c 005c fc20: c044fd70 ffc3 00085da8 ffc0 fd024c90 ffc0 fc40: c044fd70 ffc3 000d0938 ffc0 fd024c98 ffc0 ee3aee00 ffc3 fc60: ae80 fc80: c7e8ed00 5df42439 001d 0092 fca0: 001b 0092 fcc0: 84b805a0 007f 001a6a8c ffc0 84afbc90 007f fce0: 82d1c1f0 007f fd024c90 ffc0 fd00: feabe300 ffc0 ae80 011a fd20: 001d 0079e000 ffc0 c044c000 ffc3 c044fd70 ffc3 fd40: 0009c1d0 ffc0 c044fd70 ffc3 000d0938 ffc0 6145 fd60: c044fd70 ffc3 0009c1a4 ffc0 c044fda0 ffc3 0009c2e0 ffc0 fd80: feabe300 ffc0 fd024c90 ffc0 0079e000 ffc0 c044c000 fda0: c044fe10 ffc3 001a6824 ffc0 feabe300 ffc0 fdc0: edc06f70 ffc3 000b ae80 0015 fde0: 011a 0040 ae80 c044fe20 ffc3 0019772c ffc0
[Kernel-packages] [Bug 1354975] Re: iwlwifi Intel 7260 Wifi disconnects
I can confirm that 802.11ac mode seems to make the link more unstable - especially the 5 GHz network. However, I discovered that with Ubuntu 15.04 and the 3.19.0-21 kernel, turning off power management improves the stability a lot. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-firmware in Ubuntu. https://bugs.launchpad.net/bugs/1354975 Title: iwlwifi Intel 7260 Wifi disconnects Status in Unity Linux: New Status in linux-firmware package in Ubuntu: Fix Released Bug description: I experience frequent disconnects and auth issues, never more than 30 minutes without a disconnect. Sometimes dozens of disconnects in a few minutes. This happens with the default 7260-8 firmware. Tried replacing the -8 with -9 ucode. Failed to load due to API version. This loaded the -7 driver which seems to be more stable. Tested against 2.4ghz APs (Apple, Netgear, Linksys). ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-32-generic 3.13.0-32.57 ProcVersionSignature: Ubuntu 3.13.0-32.57-generic 3.13.11.4 Uname: Linux 3.13.0-32-generic x86_64 ApportVersion: 2.14.1-0ubuntu3.3 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: steve 2577 F pulseaudio /dev/snd/controlC1: steve 2577 F pulseaudio CurrentDesktop: Unity Date: Sun Aug 10 17:49:06 2014 HibernationDevice: RESUME=UUID=374a0c1c-4ac2-456b-a67e-9ea54fe11fe6 InstallationDate: Installed on 2013-12-28 (225 days ago) InstallationMedia: Ubuntu 13.10 Saucy Salamander - Release amd64 (20131016.1) MachineType: Dell Inc. XPS 12-9Q33 ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-32-generic root=UUID=58deb355-7a09-440b-ade2-69a84fd74460 ro ipv6.disable=1 quiet splash vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-3.13.0-32-generic N/A linux-backports-modules-3.13.0-32-generic N/A linux-firmware 1.127.5 SourcePackage: linux UpgradeStatus: Upgraded to trusty on 2014-07-06 (35 days ago) dmi.bios.date: 05/06/2013 dmi.bios.vendor: Dell Inc. dmi.bios.version: A00 dmi.board.name: XPS 12-9Q33 dmi.board.vendor: Dell Inc. dmi.board.version: A00 dmi.chassis.type: 8 dmi.chassis.vendor: Dell Inc. dmi.chassis.version: Not Specified dmi.modalias: dmi:bvnDellInc.:bvrA00:bd05/06/2013:svnDellInc.:pnXPS12-9Q33:pvrA00:rvnDellInc.:rnXPS12-9Q33:rvrA00:cvnDellInc.:ct8:cvrNotSpecified: dmi.product.name: XPS 12-9Q33 dmi.product.version: A00 dmi.sys.vendor: Dell Inc. To manage notifications about this bug go to: https://bugs.launchpad.net/unitylinux/+bug/1354975/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1466215] Re: linux: 3.2.0-86.124 -proposed tracker
** Description changed: This bug is for tracking the 3.2.0-86.124 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Wednesday, 17. June 2015 20:33 UTC kernel-stable-phase:CopyToProposed kernel-stable-Prepare-package-end:Thursday, 18. June 2015 01:03 UTC kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 01:03 UTC kernel-stable-phase-changed:Thursday, 18. June 2015 01:03 UTC + kernel-stable-Promote-to-proposed-end:Thursday, 18. June 2015 13:31 UTC + kernel-stable-Security-signoff-end:Thursday, 18. June 2015 13:31 UTC -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1466215 Title: linux: 3.2.0-86.124 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: New Status in Kernel SRU Workflow package-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-lbm series: Invalid Status in Kernel SRU Workflow prepare-package-meta series: Invalid Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: New Status in linux package in Ubuntu: Invalid Status in linux source package in Precise: New Bug description: This bug is for tracking the 3.2.0-86.124 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Wednesday, 17. June 2015 20:33 UTC kernel-stable-phase:CopyToProposed kernel-stable-Prepare-package-end:Thursday, 18. June 2015 01:03 UTC kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 01:03 UTC kernel-stable-phase-changed:Thursday, 18. June 2015 01:03 UTC kernel-stable-Promote-to-proposed-end:Thursday, 18. June 2015 13:31 UTC kernel-stable-Security-signoff-end:Thursday, 18. June 2015 13:31 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1466215/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1466237] Re: linux: 3.13.0-55.94 -proposed tracker
** Description changed: This bug is for tracking the 3.13.0-56.93 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Wednesday, 17. June 2015 21:56 UTC kernel-stable-phase:CopyToProposed kernel-stable-Prepare-package-end:Thursday, 18. June 2015 07:03 UTC kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 07:03 UTC kernel-stable-phase-changed:Thursday, 18. June 2015 07:03 UTC + kernel-stable-Promote-to-proposed-end:Thursday, 18. June 2015 13:32 UTC + kernel-stable-Security-signoff-end:Thursday, 18. June 2015 13:32 UTC -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1466237 Title: linux: 3.13.0-55.94 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: New Status in Kernel SRU Workflow package-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Invalid Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: New Status in linux package in Ubuntu: Invalid Status in linux source package in Trusty: New Bug description: This bug is for tracking the 3.13.0-56.93 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Wednesday, 17. June 2015 21:56 UTC kernel-stable-phase:CopyToProposed kernel-stable-Prepare-package-end:Thursday, 18. June 2015 07:03 UTC kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 07:03 UTC kernel-stable-phase-changed:Thursday, 18. June 2015 07:03 UTC kernel-stable-Promote-to-proposed-end:Thursday, 18. June 2015 13:32 UTC kernel-stable-Security-signoff-end:Thursday, 18. June 2015 13:32 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1466237/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1466267] Re: linux-armadaxp: 3.2.0-1652.73 -proposed tracker
** Description changed: This bug is for tracking the 3.2.0-1652.73 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Thursday, 18. June 2015 01:02 UTC kernel-stable-master-bug:1466215 kernel-stable-Certification-testing-end:Thursday, 18. June 2015 04:01 UTC kernel-stable-Security-signoff-end:Thursday, 18. June 2015 04:01 UTC kernel-stable-phase:CopyToProposed kernel-stable-Prepare-package-end:Thursday, 18. June 2015 06:01 UTC kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 06:01 UTC kernel-stable-phase-changed:Thursday, 18. June 2015 06:01 UTC + kernel-stable-Promote-to-proposed-end:Thursday, 18. June 2015 13:32 UTC -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1466267 Title: linux-armadaxp: 3.2.0-1652.73 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow package-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Invalid Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: Invalid Status in Kernel SRU Workflow upload-to-ppa series: Invalid Status in Kernel SRU Workflow verification-testing series: New Status in linux-armadaxp package in Ubuntu: Invalid Status in linux-armadaxp source package in Precise: In Progress Bug description: This bug is for tracking the 3.2.0-1652.73 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Thursday, 18. June 2015 01:02 UTC kernel-stable-master-bug:1466215 kernel-stable-Certification-testing-end:Thursday, 18. June 2015 04:01 UTC kernel-stable-Security-signoff-end:Thursday, 18. June 2015 04:01 UTC kernel-stable-phase:CopyToProposed kernel-stable-Prepare-package-end:Thursday, 18. June 2015 06:01 UTC kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 06:01 UTC kernel-stable-phase-changed:Thursday, 18. June 2015 06:01 UTC kernel-stable-Promote-to-proposed-end:Thursday, 18. June 2015 13:32 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1466267/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1465322] Re: regression: df: `/sys/kernel/debug': Function not implemented with 3.2.0-85.122
** Also affects: linux (Ubuntu Precise) Importance: Undecided Status: New ** Changed in: linux (Ubuntu Precise) Status: New = Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1465322 Title: regression: df: `/sys/kernel/debug': Function not implemented with 3.2.0-85.122 Status in linux package in Ubuntu: In Progress Status in linux source package in Precise: Fix Committed Bug description: $ cat /proc/version_signature Ubuntu 3.2.0-84.121-generic 3.2.68 $ df | head -3 Filesystem 1K-blocksUsed Available Use% Mounted on /dev/vda17481832 4262872 2838904 61% / udev 371920 4371916 1% /dev $ cat /proc/version_signature Ubuntu 3.2.0-85.122-generic 3.2.69 $ df | head -3 df: `/sys/kernel/debug': Function not implemented Filesystem 1K-blocksUsed Available Use% Mounted on /dev/vda17481832 4263012 2838764 61% / udev 371920 4371916 1% /dev This is confirmed in an amd64 VM and on an amd64 system. It doesn't make a difference if I use sudo. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1465322/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1466349] Re: linux-lts-trusty: 3.13.0-55.94~precise1 -proposed tracker
All builds are complete, packages in this bug can be copied to -proposed. ** Changed in: kernel-sru-workflow/prepare-package Status: New = Fix Released ** Changed in: kernel-sru-workflow/prepare-package Assignee: Canonical Kernel Team (canonical-kernel-team) = Luis Henriques (henrix) ** Changed in: kernel-sru-workflow/promote-to-proposed Status: New = Confirmed ** Changed in: kernel-sru-workflow/package-testing Status: New = Confirmed ** Description changed: This bug is for tracking the 3.13.0-55.94~precise1 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Thursday, 18. June 2015 07:02 UTC - kernel-stable-phase:Prepare - kernel-stable-phase-changed:Thursday, 18. June 2015 07:02 UTC kernel-stable-master-bug:1466237 kernel-stable-Security-signoff-end:Thursday, 18. June 2015 13:32 UTC + kernel-stable-phase:CopyToProposed + kernel-stable-Prepare-package-end:Thursday, 18. June 2015 16:23 UTC + kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 16:23 UTC + kernel-stable-phase-changed:Thursday, 18. June 2015 16:23 UTC -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-lts-trusty in Ubuntu. https://bugs.launchpad.net/bugs/1466349 Title: linux-lts-trusty: 3.13.0-55.94~precise1 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: New Status in Kernel SRU Workflow package-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Invalid Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: New Status in linux-lts-trusty package in Ubuntu: Invalid Status in linux-lts-trusty source package in Precise: New Bug description: This bug is for tracking the 3.13.0-55.94~precise1 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Thursday, 18. June 2015 07:02 UTC kernel-stable-master-bug:1466237 kernel-stable-Security-signoff-end:Thursday, 18. June 2015 13:32 UTC kernel-stable-phase:CopyToProposed kernel-stable-Prepare-package-end:Thursday, 18. June 2015 16:23 UTC kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 16:23 UTC kernel-stable-phase-changed:Thursday, 18. June 2015 16:23 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1466349/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1466349] Re: linux-lts-trusty: 3.13.0-55.94~precise1 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-proposed Status: Confirmed = Fix Released ** Changed in: kernel-sru-workflow/promote-to-proposed Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Adam Conrad (adconrad) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-lts-trusty in Ubuntu. https://bugs.launchpad.net/bugs/1466349 Title: linux-lts-trusty: 3.13.0-55.94~precise1 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: New Status in Kernel SRU Workflow package-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Invalid Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: New Status in linux-lts-trusty package in Ubuntu: Invalid Status in linux-lts-trusty source package in Precise: New Bug description: This bug is for tracking the 3.13.0-55.94~precise1 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Thursday, 18. June 2015 07:02 UTC kernel-stable-master-bug:1466237 kernel-stable-Security-signoff-end:Thursday, 18. June 2015 13:32 UTC kernel-stable-phase:CopyToProposed kernel-stable-Prepare-package-end:Thursday, 18. June 2015 16:23 UTC kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 16:23 UTC kernel-stable-phase-changed:Thursday, 18. June 2015 16:23 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1466349/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1466575] [NEW] linux: 3.2.0-87.125 -proposed tracker
Public bug reported: This bug is for tracking the 3.2.0-87.125 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Thursday, 18. June 2015 16:21 UTC kernel-stable-phase:Prepare kernel-stable-phase-changed:Thursday, 18. June 2015 16:21 UTC ** Affects: kernel-sru-workflow Importance: Medium Status: In Progress ** Affects: kernel-sru-workflow/certification-testing Importance: Medium Assignee: Canonical Hardware Certification (canonical-hw-cert) Status: New ** Affects: kernel-sru-workflow/package-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/prepare-package Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/prepare-package-lbm Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/prepare-package-meta Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/promote-to-proposed Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-security Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-updates Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/regression-testing Importance: Medium Assignee: Canonical Platform QA Team (canonical-platform-qa) Status: New ** Affects: kernel-sru-workflow/security-signoff Importance: Medium Assignee: Canonical Security Team (canonical-security) Status: New ** Affects: kernel-sru-workflow/verification-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: linux (Ubuntu) Importance: Undecided Status: Invalid ** Affects: linux (Ubuntu Precise) Importance: Medium Status: New ** Tags: block-proposed-precise kernel-release-tracking-bug precise ** Tags added: kernel-release-tracking-bug ** Tags added: block-proposed-precise ** Also affects: linux (Ubuntu Precise) Importance: Undecided Status: New ** Tags added: precise ** Also affects: kernel-sru-workflow/certification-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/package-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-lbm Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-meta Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-proposed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-security Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-updates Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/regression-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/security-signoff Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/verification-testing Importance: Undecided Status: New ** Changed in: kernel-sru-workflow Status: New = In Progress ** Changed in: kernel-sru-workflow Importance: Undecided = Medium ** Changed in: kernel-sru-workflow/certification-testing Importance: Undecided = Medium ** Changed in: kernel-sru-workflow/certification-testing Assignee: (unassigned) = Canonical Hardware Certification (canonical-hw-cert) ** Changed in: kernel-sru-workflow/package-testing Importance: Undecided = Medium ** Changed in: kernel-sru-workflow/package-testing Assignee: (unassigned) = Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/prepare-package Importance: Undecided = Medium ** Changed in: kernel-sru-workflow/prepare-package Assignee: (unassigned) = Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/prepare-package-lbm Importance: Undecided = Medium ** Changed in: kernel-sru-workflow/prepare-package-lbm Assignee: (unassigned) = Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/prepare-package-meta Importance: Undecided = Medium ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee:
[Kernel-packages] [Bug 1466266] Re: linux-ti-omap4: 3.2.0-1466.87 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-proposed Status: Confirmed = Fix Released ** Changed in: kernel-sru-workflow/promote-to-proposed Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Adam Conrad (adconrad) ** Changed in: kernel-sru-workflow/upload-to-ppa Status: New = Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-ti-omap4 in Ubuntu. https://bugs.launchpad.net/bugs/1466266 Title: linux-ti-omap4: 3.2.0-1466.87 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow package-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Invalid Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow upload-to-ppa series: Fix Released Status in Kernel SRU Workflow verification-testing series: New Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux-ti-omap4 source package in Precise: New Bug description: This bug is for tracking the version to be filled upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Thursday, 18. June 2015 01:00 UTC kernel-stable-master-bug:1466215 kernel-stable-Certification-testing-end:Thursday, 18. June 2015 15:01 UTC kernel-stable-Security-signoff-end:Thursday, 18. June 2015 15:01 UTC kernel-stable-phase:CopyToProposed kernel-stable-Prepare-package-end:Thursday, 18. June 2015 16:26 UTC kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 16:26 UTC kernel-stable-phase-changed:Thursday, 18. June 2015 16:26 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1466266/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1466266] Re: linux-ti-omap4: 3.2.0-1466.87 -proposed tracker
All builds are complete, packages in this bug can be copied to -proposed. ** Changed in: kernel-sru-workflow/prepare-package Status: New = Fix Released ** Changed in: kernel-sru-workflow/prepare-package Assignee: ubuntu-armel-kernel (ubuntu-armel-kernel) = Luis Henriques (henrix) ** Changed in: kernel-sru-workflow/promote-to-proposed Status: New = Confirmed ** Changed in: kernel-sru-workflow/package-testing Status: New = Confirmed ** Description changed: This bug is for tracking the version to be filled upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Thursday, 18. June 2015 01:00 UTC - kernel-stable-phase:Prepare - kernel-stable-phase-changed:Thursday, 18. June 2015 01:00 UTC kernel-stable-master-bug:1466215 kernel-stable-Certification-testing-end:Thursday, 18. June 2015 15:01 UTC kernel-stable-Security-signoff-end:Thursday, 18. June 2015 15:01 UTC + kernel-stable-phase:CopyToProposed + kernel-stable-Prepare-package-end:Thursday, 18. June 2015 16:26 UTC + kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 16:26 UTC + kernel-stable-phase-changed:Thursday, 18. June 2015 16:26 UTC -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-ti-omap4 in Ubuntu. https://bugs.launchpad.net/bugs/1466266 Title: linux-ti-omap4: 3.2.0-1466.87 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow package-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Invalid Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow upload-to-ppa series: Fix Released Status in Kernel SRU Workflow verification-testing series: New Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux-ti-omap4 source package in Precise: New Bug description: This bug is for tracking the version to be filled upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Thursday, 18. June 2015 01:00 UTC kernel-stable-master-bug:1466215 kernel-stable-Certification-testing-end:Thursday, 18. June 2015 15:01 UTC kernel-stable-Security-signoff-end:Thursday, 18. June 2015 15:01 UTC kernel-stable-phase:CopyToProposed kernel-stable-Prepare-package-end:Thursday, 18. June 2015 16:26 UTC kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 16:26 UTC kernel-stable-phase-changed:Thursday, 18. June 2015 16:26 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1466266/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1416503] Re: CVE-2015-1420
** Changed in: linux (Ubuntu Precise) Status: New = Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1416503 Title: CVE-2015-1420 Status in linux package in Ubuntu: Fix Committed Status in linux-armadaxp package in Ubuntu: Invalid Status in linux-ec2 package in Ubuntu: Invalid Status in linux-flo package in Ubuntu: New Status in linux-fsl-imx51 package in Ubuntu: Invalid Status in linux-goldfish package in Ubuntu: New Status in linux-lts-backport-maverick package in Ubuntu: New Status in linux-lts-backport-natty package in Ubuntu: New Status in linux-lts-quantal package in Ubuntu: Invalid Status in linux-lts-raring package in Ubuntu: Invalid Status in linux-lts-saucy package in Ubuntu: Invalid Status in linux-lts-trusty package in Ubuntu: Invalid Status in linux-lts-utopic package in Ubuntu: Invalid Status in linux-lts-vivid package in Ubuntu: Invalid Status in linux-mako package in Ubuntu: New Status in linux-manta package in Ubuntu: New Status in linux-mvl-dove package in Ubuntu: Invalid Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux-lts-backport-maverick source package in Lucid: Won't Fix Status in linux-lts-backport-natty source package in Lucid: Won't Fix Status in linux source package in Precise: Fix Committed Status in linux-armadaxp source package in Precise: New Status in linux-ec2 source package in Precise: Invalid Status in linux-flo source package in Precise: Invalid Status in linux-fsl-imx51 source package in Precise: Invalid Status in linux-goldfish source package in Precise: Invalid Status in linux-lts-backport-maverick source package in Precise: New Status in linux-lts-backport-natty source package in Precise: New Status in linux-lts-quantal source package in Precise: New Status in linux-lts-raring source package in Precise: Invalid Status in linux-lts-saucy source package in Precise: New Status in linux-lts-trusty source package in Precise: New Status in linux-lts-utopic source package in Precise: Invalid Status in linux-lts-vivid source package in Precise: Invalid Status in linux-mako source package in Precise: Invalid Status in linux-manta source package in Precise: Invalid Status in linux-mvl-dove source package in Precise: Invalid Status in linux-ti-omap4 source package in Precise: New Status in linux source package in Trusty: Fix Committed Status in linux-armadaxp source package in Trusty: Invalid Status in linux-ec2 source package in Trusty: Invalid Status in linux-flo source package in Trusty: Invalid Status in linux-fsl-imx51 source package in Trusty: Invalid Status in linux-goldfish source package in Trusty: Invalid Status in linux-lts-backport-maverick source package in Trusty: New Status in linux-lts-backport-natty source package in Trusty: New Status in linux-lts-quantal source package in Trusty: Invalid Status in linux-lts-raring source package in Trusty: Invalid Status in linux-lts-saucy source package in Trusty: Invalid Status in linux-lts-trusty source package in Trusty: Invalid Status in linux-lts-utopic source package in Trusty: New Status in linux-lts-vivid source package in Trusty: New Status in linux-mako source package in Trusty: Invalid Status in linux-manta source package in Trusty: Invalid Status in linux-mvl-dove source package in Trusty: Invalid Status in linux-ti-omap4 source package in Trusty: Invalid Status in linux source package in Utopic: Fix Committed Status in linux-armadaxp source package in Utopic: Invalid Status in linux-ec2 source package in Utopic: Invalid Status in linux-flo source package in Utopic: New Status in linux-fsl-imx51 source package in Utopic: Invalid Status in linux-goldfish source package in Utopic: New Status in linux-lts-backport-maverick source package in Utopic: New Status in linux-lts-backport-natty source package in Utopic: New Status in linux-lts-quantal source package in Utopic: Invalid Status in linux-lts-raring source package in Utopic: Invalid Status in linux-lts-saucy source package in Utopic: Invalid Status in linux-lts-trusty source package in Utopic: Invalid Status in linux-lts-utopic source package in Utopic: Invalid Status in linux-lts-vivid source package in Utopic: Invalid Status in linux-mako source package in Utopic: New Status in linux-manta source package in Utopic: New Status in linux-mvl-dove source package in Utopic: Invalid Status in linux-ti-omap4 source package in Utopic: Invalid Status in linux source package in Vivid: Fix Committed Status in linux-armadaxp source package in Vivid: Invalid Status in linux-ec2 source package in Vivid: Invalid Status in linux-flo source package in Vivid: New Status in linux-fsl-imx51 source package in Vivid: Invalid Status in linux-goldfish source package in
[Kernel-packages] [Bug 1453299] Re: Screen doesn't turn on after suspend
k, bear with me, never done that before. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1453299 Title: Screen doesn't turn on after suspend Status in linux package in Ubuntu: Incomplete Bug description: If I close my laptop lid to initiate suspend, everything comes back except the screen. This worked in 12.04. I have to just shut off the whole thing and restart. --- ApportVersion: 2.17.2-0ubuntu1 Architecture: amd64 CompizPlugins: No value set for `/apps/compiz-1/general/screen0/options/active_plugins' CompositorRunning: None CurrentDesktop: XFCE DistUpgraded: Fresh install DistroCodename: vivid DistroRelease: Ubuntu 15.04 DistroVariant: ubuntu DkmsStatus: bcmwl, 6.30.223.248+bdcom, 3.19.0-15-generic, x86_64: installed bcmwl, 6.30.223.248+bdcom, 3.19.0-16-generic, x86_64: installed ExtraDebuggingInterest: Yes, if not too technical GraphicsCard: Advanced Micro Devices, Inc. [AMD/ATI] Trinity [Radeon HD 7500G] [1002:990a] (prog-if 00 [VGA controller]) Subsystem: Hewlett-Packard Company Device [103c:18de] InstallationDate: Installed on 2015-05-08 (2 days ago) InstallationMedia: Xubuntu 15.04 Vivid Vervet - Release amd64 (20150422.1) MachineType: Hewlett-Packard HP ENVY 6 Notebook PC NonfreeKernelModules: wl Package: xorg 1:7.7+7ubuntu4 PackageArchitecture: amd64 ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.19.0-16-generic.efi.signed root=UUID=eba69796-db6c-4963-a575-946f695e89d7 ro quiet splash vt.handoff=7 ProcVersionSignature: Ubuntu 3.19.0-16.16-generic 3.19.3 Tags: vivid ubuntu UdevLog: Error: [Errno 2] No such file or directory: '/var/log/udev' Uname: Linux 3.19.0-16-generic x86_64 UpgradeStatus: No upgrade log present (probably fresh install) UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo _MarkForUpload: True dmi.bios.date: 01/22/2013 dmi.bios.vendor: Insyde dmi.bios.version: F.15 dmi.board.asset.tag: Base Board Asset Tag dmi.board.name: 18DE dmi.board.vendor: Hewlett-Packard dmi.board.version: 77.47 dmi.chassis.asset.tag: Chassis Asset Tag dmi.chassis.type: 10 dmi.chassis.vendor: Hewlett-Packard dmi.chassis.version: Chassis Version dmi.modalias: dmi:bvnInsyde:bvrF.15:bd01/22/2013:svnHewlett-Packard:pnHPENVY6NotebookPC:pvr07951020560320100:rvnHewlett-Packard:rn18DE:rvr77.47:cvnHewlett-Packard:ct10:cvrChassisVersion: dmi.product.name: HP ENVY 6 Notebook PC dmi.product.version: 07951020560320100 dmi.sys.vendor: Hewlett-Packard version.compiz: compiz N/A version.ia32-libs: ia32-libs N/A version.libdrm2: libdrm2 2.4.60-2 version.libgl1-mesa-dri: libgl1-mesa-dri 10.5.2-0ubuntu1 version.libgl1-mesa-dri-experimental: libgl1-mesa-dri-experimental N/A version.libgl1-mesa-glx: libgl1-mesa-glx 10.5.2-0ubuntu1 version.xserver-xorg-core: xserver-xorg-core 2:1.17.1-0ubuntu3 version.xserver-xorg-input-evdev: xserver-xorg-input-evdev 1:2.9.0-1ubuntu2 version.xserver-xorg-video-ati: xserver-xorg-video-ati 1:7.5.0-1ubuntu2 version.xserver-xorg-video-intel: xserver-xorg-video-intel 2:2.99.917-1~exp1ubuntu2.1 version.xserver-xorg-video-nouveau: xserver-xorg-video-nouveau 1:1.0.11-1ubuntu2build1 xserver.bootTime: Mon May 11 09:06:53 2015 xserver.configfile: default xserver.errors: xserver.logfile: /var/log/Xorg.0.log xserver.version: 2:1.17.1-0ubuntu3 xserver.video_driver: radeon To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1453299/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1465755] Re: linux: 3.19.0-22.22 -proposed tracker
** Changed in: kernel-sru-workflow Status: Invalid = In Progress -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1465755 Title: linux: 3.19.0-22.22 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: New Status in Kernel SRU Workflow package-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Confirmed Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: New Status in Kernel SRU Workflow verification-testing series: New Status in linux package in Ubuntu: Invalid Status in linux source package in Vivid: New Bug description: This bug is for tracking the 3.19.0-22.22 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 16. June 2015 16:18 UTC kernel-stable-phase:CopyToProposed kernel-stable-Prepare-package-end:Wednesday, 17. June 2015 02:02 UTC kernel-stable-Promote-to-proposed-start:Wednesday, 17. June 2015 02:02 UTC kernel-stable-phase-changed:Wednesday, 17. June 2015 02:02 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1465755/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1466266] Re: linux-ti-omap4: 3.2.0-1466.87 -proposed tracker
** Description changed: This bug is for tracking the version to be filled upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Thursday, 18. June 2015 01:00 UTC kernel-stable-master-bug:1466215 kernel-stable-Certification-testing-end:Thursday, 18. June 2015 15:01 UTC kernel-stable-Security-signoff-end:Thursday, 18. June 2015 15:01 UTC kernel-stable-phase:CopyToProposed kernel-stable-Prepare-package-end:Thursday, 18. June 2015 16:26 UTC kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 16:26 UTC kernel-stable-phase-changed:Thursday, 18. June 2015 16:26 UTC + kernel-stable-Promote-to-proposed-end:Thursday, 18. June 2015 17:00 UTC -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-ti-omap4 in Ubuntu. https://bugs.launchpad.net/bugs/1466266 Title: linux-ti-omap4: 3.2.0-1466.87 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow package-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Invalid Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow upload-to-ppa series: Fix Released Status in Kernel SRU Workflow verification-testing series: New Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux-ti-omap4 source package in Precise: New Bug description: This bug is for tracking the version to be filled upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Thursday, 18. June 2015 01:00 UTC kernel-stable-master-bug:1466215 kernel-stable-Certification-testing-end:Thursday, 18. June 2015 15:01 UTC kernel-stable-Security-signoff-end:Thursday, 18. June 2015 15:01 UTC kernel-stable-phase:CopyToProposed kernel-stable-Prepare-package-end:Thursday, 18. June 2015 16:26 UTC kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 16:26 UTC kernel-stable-phase-changed:Thursday, 18. June 2015 16:26 UTC kernel-stable-Promote-to-proposed-end:Thursday, 18. June 2015 17:00 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1466266/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1466349] Re: linux-lts-trusty: 3.13.0-55.94~precise1 -proposed tracker
** Description changed: This bug is for tracking the 3.13.0-55.94~precise1 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Thursday, 18. June 2015 07:02 UTC kernel-stable-master-bug:1466237 kernel-stable-Security-signoff-end:Thursday, 18. June 2015 13:32 UTC kernel-stable-phase:CopyToProposed kernel-stable-Prepare-package-end:Thursday, 18. June 2015 16:23 UTC kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 16:23 UTC kernel-stable-phase-changed:Thursday, 18. June 2015 16:23 UTC + kernel-stable-Promote-to-proposed-end:Thursday, 18. June 2015 17:01 UTC -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-lts-trusty in Ubuntu. https://bugs.launchpad.net/bugs/1466349 Title: linux-lts-trusty: 3.13.0-55.94~precise1 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: New Status in Kernel SRU Workflow package-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Invalid Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: New Status in linux-lts-trusty package in Ubuntu: Invalid Status in linux-lts-trusty source package in Precise: New Bug description: This bug is for tracking the 3.13.0-55.94~precise1 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Thursday, 18. June 2015 07:02 UTC kernel-stable-master-bug:1466237 kernel-stable-Security-signoff-end:Thursday, 18. June 2015 13:32 UTC kernel-stable-phase:CopyToProposed kernel-stable-Prepare-package-end:Thursday, 18. June 2015 16:23 UTC kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 16:23 UTC kernel-stable-phase-changed:Thursday, 18. June 2015 16:23 UTC kernel-stable-Promote-to-proposed-end:Thursday, 18. June 2015 17:01 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1466349/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1404409] Re: [regression] Intel 10Gb NIC Crashes
** Changed in: linux (Ubuntu) Assignee: (unassigned) = Chris J Arges (arges) ** Changed in: linux (Ubuntu) Status: Triaged = In Progress -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1404409 Title: [regression] Intel 10Gb NIC Crashes Status in linux package in Ubuntu: In Progress Bug description: I posted this to net...@vger.kernel.org as well: http://www.spinics.net/lists/netdev/msg309110.html I think the next step is to try to bisect this down to a specific commit. I'm starting to look at the instructions here: https://wiki.ubuntu.com/Kernel/KernelBisection - Previous history of this thread: http://thread.gmane.org/gmane.linux.network/326672 On 2014-11-04 22:57:19, Tom Herbert wrote: Using vlan and bonding? vlan_dev_hard_start_xmit called. A possible cause is that bonding interface is out of sync with slave interface w.r.t. GSO features. Do we know if this worked in 3.14, 3.15? I'm seeing the same sort of crash/warning (skb_war_bad_offload). It's happening on Intel 10 Gig NICs using the ixgbe driver. I'm using bridges (for virtual machines) on top of VLANs on top of 802.3ad bonding. I'm using an MTU of 9000 on the bond0 interface, but 1500 everywhere else. I'm always bonding two ports: one one system, I'm bonding two ports on identical one-port NICs; on another system, I'm bonding two ports on a single two-port NIC. Both systems exhibit the same behavior. Everything has worked fine for a couple years on Ubuntu 12.04 Precise (Linux 3.2.0). It immediately broke when I upgraded to Ubuntu 14.04 Trusty (Linux 3.13.0). I can also reproduce this using the packaged version of Linux 3.16.0 on Trusty. In contrast to other reports of this bug, disabling scatter gather on the physical interfaces (e.g. eth0) does *not* stop the crashes (assuming I disabled it correctly). I currently have two systems (one with Precise, one with Trusty) available to do any testing that you'd find helpful. Here's a first pass at getting some debugging data. The broken system (Ubuntu 14.04 Trusty): rlaager@BROKEN:~$ uname -a Linux BROKEN 3.13.0-43-generic #72-Ubuntu SMP Mon Dec 8 19:35:06 UTC 2014 x86_64 x86_64 x86_64 GNU/Linux rlaager@BROKEN:~$ ethtool -k p6p1 Features for p6p1: rx-checksumming: on tx-checksumming: on tx-checksum-ipv4: on tx-checksum-ip-generic: off [fixed] tx-checksum-ipv6: on tx-checksum-fcoe-crc: on [fixed] tx-checksum-sctp: on scatter-gather: on tx-scatter-gather: on tx-scatter-gather-fraglist: off [fixed] tcp-segmentation-offload: on tx-tcp-segmentation: on tx-tcp-ecn-segmentation: off [fixed] tx-tcp6-segmentation: on udp-fragmentation-offload: off [fixed] generic-segmentation-offload: on generic-receive-offload: on large-receive-offload: off rx-vlan-offload: on tx-vlan-offload: on ntuple-filters: off receive-hashing: on highdma: on [fixed] rx-vlan-filter: on vlan-challenged: off [fixed] tx-lockless: off [fixed] netns-local: off [fixed] tx-gso-robust: off [fixed] tx-fcoe-segmentation: on [fixed] tx-gre-segmentation: off [fixed] tx-ipip-segmentation: off [fixed] tx-sit-segmentation: off [fixed] tx-udp_tnl-segmentation: off [fixed] tx-mpls-segmentation: off [fixed] fcoe-mtu: off [fixed] tx-nocache-copy: on loopback: off [fixed] rx-fcs: off [fixed] rx-all: off tx-vlan-stag-hw-insert: off [fixed] rx-vlan-stag-hw-parse: off [fixed] rx-vlan-stag-filter: off [fixed] l2-fwd-offload: off rlaager@BROKEN:~$ ethtool -k bond0 Features for bond0: rx-checksumming: off [fixed] tx-checksumming: on tx-checksum-ipv4: off [fixed] tx-checksum-ip-generic: on tx-checksum-ipv6: off [fixed] tx-checksum-fcoe-crc: off [fixed] tx-checksum-sctp: off [fixed] scatter-gather: on tx-scatter-gather: on tx-scatter-gather-fraglist: off [requested on] tcp-segmentation-offload: on tx-tcp-segmentation: on tx-tcp-ecn-segmentation: on tx-tcp6-segmentation: on udp-fragmentation-offload: off [fixed] generic-segmentation-offload: on generic-receive-offload: on large-receive-offload: off rx-vlan-offload: on tx-vlan-offload: on ntuple-filters: off [fixed] receive-hashing: off [fixed] highdma: on rx-vlan-filter: on vlan-challenged: off [fixed] tx-lockless: on [fixed] netns-local: off [fixed] tx-gso-robust: off [fixed] tx-fcoe-segmentation: off [fixed] tx-gre-segmentation: off [fixed] tx-ipip-segmentation: off [fixed] tx-sit-segmentation: off [fixed] tx-udp_tnl-segmentation: on tx-mpls-segmentation: off [fixed] fcoe-mtu: off [fixed] tx-nocache-copy: off [requested on] loopback: off [fixed] rx-fcs: off [fixed] rx-all: off
[Kernel-packages] [Bug 1458042] Re: [SRU] xgene-enet: add SGMII based 1GbE support for the second port
** Changed in: linux (Ubuntu Vivid) Assignee: (unassigned) = Ming Lei (tom-leiming) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1458042 Title: [SRU] xgene-enet: add SGMII based 1GbE support for the second port Status in linux package in Ubuntu: In Progress Status in linux source package in Trusty: Fix Committed Status in linux source package in Utopic: Fix Committed Status in linux source package in Vivid: New Status in linux source package in Wily: In Progress Bug description: [Impact] APM's Mustang boards have a second SGMII based 1GbE interface that is currently unsupported by Ubuntu. [Test Case] Verify that the previously non-working SGMII based 1GbE interface now works. [Regression Risk] Since the changes touch the driver that supports the existing GbE and first SGMII support, it is possible that that support has become impacted. The changes also impact drivers/of/of_net.c, which could impact other users of the interface. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1458042/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1466591] Re: linux-lts-utopic: 3.16.0-41.57~14.04.1 -proposed tracker
All builds are complete, packages in this bug can be copied to -proposed. ** Changed in: kernel-sru-workflow/prepare-package Status: New = Fix Released ** Changed in: kernel-sru-workflow/prepare-package Assignee: Canonical Kernel Team (canonical-kernel-team) = Luis Henriques (henrix) ** Changed in: kernel-sru-workflow/promote-to-proposed Status: New = Confirmed ** Changed in: kernel-sru-workflow/package-testing Status: New = Confirmed ** Description changed: This bug is for tracking the 3.16.0-41.57~14.04.1 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Thursday, 18. June 2015 17:17 UTC - kernel-stable-phase:Prepare - kernel-stable-phase-changed:Thursday, 18. June 2015 17:17 UTC kernel-stable-master-bug:1466250 kernel-stable-Security-signoff-end:Thursday, 18. June 2015 20:02 UTC + kernel-stable-phase:CopyToProposed + kernel-stable-Prepare-package-end:Friday, 19. June 2015 03:02 UTC + kernel-stable-Promote-to-proposed-start:Friday, 19. June 2015 03:02 UTC + kernel-stable-phase-changed:Friday, 19. June 2015 03:02 UTC -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-lts-utopic in Ubuntu. https://bugs.launchpad.net/bugs/1466591 Title: linux-lts-utopic: 3.16.0-41.57~14.04.1 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: New Status in Kernel SRU Workflow package-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Invalid Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Confirmed Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: New Status in linux-lts-utopic package in Ubuntu: Invalid Status in linux-lts-utopic source package in Trusty: New Bug description: This bug is for tracking the 3.16.0-41.57~14.04.1 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Thursday, 18. June 2015 17:17 UTC kernel-stable-master-bug:1466250 kernel-stable-Security-signoff-end:Thursday, 18. June 2015 20:02 UTC kernel-stable-phase:CopyToProposed kernel-stable-Prepare-package-end:Friday, 19. June 2015 03:02 UTC kernel-stable-Promote-to-proposed-start:Friday, 19. June 2015 03:02 UTC kernel-stable-phase-changed:Friday, 19. June 2015 03:02 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1466591/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1359117] Re: lightdm and xorg fails to start after kernel update, voltage errors
[Expired for linux (Ubuntu) because there has been no activity for 60 days.] ** Changed in: linux (Ubuntu) Status: Incomplete = Expired -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1359117 Title: lightdm and xorg fails to start after kernel update, voltage errors Status in linux package in Ubuntu: Expired Bug description: Hardware: ASUS UX32VD (zenbook prime) Software: Ubuntu 14.04 I see following errors on dmesg after kernel updated to 3.13.0-34: [drm:intel_dp_start_link_train] *ERROR* too many voltage retries, give up Lightdm won't start, startx did not help also. Tried linux-image-3.16.1 from Utopic - same issue. Last working kernel where there is no such problem: 3.13.0-32-generic Upstream bug reports: https://bugs.freedesktop.org/show_bug.cgi?id=70117 https://bugzilla.kernel.org/show_bug.cgi?id=74931 ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: xorg 1:7.7+1ubuntu8 ProcVersionSignature: Ubuntu 3.13.0-32.57-generic 3.13.11.4 Uname: Linux 3.13.0-32-generic x86_64 .tmp.unity.support.test.0: ApportVersion: 2.14.1-0ubuntu3.3 Architecture: amd64 CompizPlugins: No value set for `/apps/compiz-1/general/screen0/options/active_plugins' CompositorRunning: compiz CompositorUnredirectDriverBlacklist: '(nouveau|Intel).*Mesa 8.0' CompositorUnredirectFSW: true CurrentDesktop: Unity Date: Wed Aug 20 12:57:32 2014 DistUpgraded: Fresh install DistroCodename: trusty DistroVariant: ubuntu EcryptfsInUse: Yes ExtraDebuggingInterest: Yes GraphicsCard: Intel Corporation 3rd Gen Core processor Graphics Controller [8086:0166] (rev 09) (prog-if 00 [VGA controller]) Subsystem: ASUSTeK Computer Inc. Device [1043:1507] Subsystem: ASUSTeK Computer Inc. GeForce GT 620M [1043:1507] MachineType: ASUSTeK COMPUTER INC. UX32VD ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-32-generic.efi.signed root=UUID=69b256f1-59c3-4193-a1e0-b7c0e333cfbd ro quiet splash pcie_aspm=force drm.vblankoffdelay=1 i915.semaphores=1 nmi_watchdog=0 vt.handoff=7 SourcePackage: xorg Symptom: display UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 01/29/2013 dmi.bios.vendor: American Megatrends Inc. dmi.bios.version: UX32VD.214 dmi.board.asset.tag: ATN12345678901234567 dmi.board.name: UX32VD dmi.board.vendor: ASUSTeK COMPUTER INC. dmi.board.version: 1.0 dmi.chassis.asset.tag: No Asset Tag dmi.chassis.type: 10 dmi.chassis.vendor: ASUSTeK COMPUTER INC. dmi.chassis.version: 1.0 dmi.modalias: dmi:bvnAmericanMegatrendsInc.:bvrUX32VD.214:bd01/29/2013:svnASUSTeKCOMPUTERINC.:pnUX32VD:pvr1.0:rvnASUSTeKCOMPUTERINC.:rnUX32VD:rvr1.0:cvnASUSTeKCOMPUTERINC.:ct10:cvr1.0: dmi.product.name: UX32VD dmi.product.version: 1.0 dmi.sys.vendor: ASUSTeK COMPUTER INC. version.compiz: compiz 1:0.9.11.2+14.04.20140714-0ubuntu1 version.ia32-libs: ia32-libs N/A version.libdrm2: libdrm2 2.4.52-1 version.libgl1-mesa-dri: libgl1-mesa-dri 10.1.3-0ubuntu0.1 version.libgl1-mesa-dri-experimental: libgl1-mesa-dri-experimental N/A version.libgl1-mesa-glx: libgl1-mesa-glx 10.1.3-0ubuntu0.1 version.xserver-xorg-core: xserver-xorg-core 2:1.15.1-0ubuntu2 version.xserver-xorg-input-evdev: xserver-xorg-input-evdev 1:2.8.2-1ubuntu2 version.xserver-xorg-video-ati: xserver-xorg-video-ati 1:7.3.0-1ubuntu3.1 version.xserver-xorg-video-intel: xserver-xorg-video-intel 2:2.99.910-0ubuntu1 version.xserver-xorg-video-nouveau: xserver-xorg-video-nouveau N/A xserver.bootTime: Wed Aug 20 11:19:17 2014 xserver.configfile: default xserver.errors: xserver.logfile: /var/log/Xorg.0.log xserver.outputs: product id4931 vendor CMN xserver.version: 2:1.15.1-0ubuntu2 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1359117/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1460657] Re: possible infinite loop when parsing CDC headers
** Changed in: linux (Ubuntu Vivid) Status: Fix Committed = Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1460657 Title: possible infinite loop when parsing CDC headers Status in linux package in Ubuntu: Fix Released Status in linux source package in Trusty: Fix Committed Status in linux source package in Utopic: Fix Committed Status in linux source package in Vivid: Fix Released Bug description: Bug #1413992 's patch introduced a possible infinite loop. commit 0d3bba0287d4e284c3ec7d3397e81eec920d5e7e Author: Quentin Casasnovas quentin.casasno...@oracle.com Date: Tue Apr 14 11:25:43 2015 +0200 cdc-acm: prevent infinite loop when parsing CDC headers. Phil and I found out a problem with commit: 7e860a6e7aa6 (cdc-acm: add sanity checks) It added some sanity checks to ignore potential garbage in CDC headers but also introduced a potential infinite loop. This can happen at the first loop iteration (elength = 0 in that case) if the description isn't a DT_CS_INTERFACE or later if 'buffer[0]' is zero. It should also be noted that the wrong length was being added to 'buffer' in case 'buffer[1]' was not a DT_CS_INTERFACE descriptor, since elength was assigned after that check in the loop. A specially crafted USB device could be used to trigger this infinite loop. Fixes: 7e860a6e7aa6 (cdc-acm: add sanity checks) Signed-off-by: Phil Turnbull phil.turnb...@oracle.com Signed-off-by: Quentin Casasnovas quentin.casasno...@oracle.com CC: Sergei Shtylyov sergei.shtyl...@cogentembedded.com CC: Oliver Neukum oneu...@suse.de CC: Adam Lee adam8...@gmail.com CC: sta...@vger.kernel.org Signed-off-by: Greg Kroah-Hartman gre...@linuxfoundation.org === break-fix: 7e860a6e7aa62b337a61110430cd633db5b0d2dd 0d3bba0287d4e284c3ec7d3397e81eec920d5e7e To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1460657/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1397885] Re: [Atheros AR9462] Bluetooth looks activated but cannot be used
*** This bug is a duplicate of bug 1394368 *** https://bugs.launchpad.net/bugs/1394368 More correct link. http://git.kernel.org/cgit/linux/kernel/git/bluetooth/bluetooth- next.git/commit/?id=7e730c7f3d1f39c25cf5f7cf70c0ff4c28d7bec7 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to bluez in Ubuntu. https://bugs.launchpad.net/bugs/1397885 Title: [Atheros AR9462] Bluetooth looks activated but cannot be used Status in bluez package in Ubuntu: In Progress Bug description: Ubuntu 14.10 System Information Manufacturer: Acer Product Name: Aspire VN7-591G Version: V1.08 SKU Number: Aspire VN7-591G_091B_1.08 Family: Sharkbay System lspci 07:00.0 Network controller: Qualcomm Atheros AR9462 Wireless Network Adapter (rev 01) lsusb -v Bus 003 Device 006: ID 04ca:300d Lite-On Technology Corp. Steps to reproduce: 1. Activate a Bluetooth device (for instance a mouse or a nearby device) 2. On the laptop, press the Bluetooth icon, then Set Up new Device… Expected result: 2. A list of available bluetooth devices is shown Actual result: 2. Nothing shows up and the spinning icon keeps spinning with Searching for devices... It looks like the bluetooth device does not work at all. Apparently, there have been previous bugs reported and corrected [1], but the situation still occurs with this module on my laptop... [1] https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1024884 ProblemType: Bug DistroRelease: Ubuntu 14.10 Package: bluez 4.101-0ubuntu20 ProcVersionSignature: Ubuntu 3.16.0-25.33-generic 3.16.7 Uname: Linux 3.16.0-25-generic x86_64 ApportVersion: 2.14.7-0ubuntu8 Architecture: amd64 CurrentDesktop: Unity Date: Mon Dec 1 16:35:17 2014 EcryptfsInUse: Yes InstallationDate: Installed on 2014-11-15 (15 days ago) InstallationMedia: Ubuntu 14.10 Utopic Unicorn - Release amd64 (20141022.1) InterestingModules: bnep rfcomm btusb bluetooth MachineType: Acer Aspire VN7-591G ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.16.0-25-generic.efi.signed root=/dev/mapper/ubuntu--vg-root ro quiet splash vt.handoff=7 SourcePackage: bluez UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 09/12/2014 dmi.bios.vendor: Insyde Corp. dmi.bios.version: V1.08 dmi.board.asset.tag: No Asset Tag dmi.board.name: Aspire VN7-591G dmi.board.vendor: Acer dmi.board.version: V1.08 dmi.chassis.asset.tag: No Asset Tag dmi.chassis.type: 10 dmi.chassis.vendor: Chassis Manufacturer dmi.chassis.version: V1.08 dmi.modalias: dmi:bvnInsydeCorp.:bvrV1.08:bd09/12/2014:svnAcer:pnAspireVN7-591G:pvrV1.08:rvnAcer:rnAspireVN7-591G:rvrV1.08:cvnChassisManufacturer:ct10:cvrV1.08: dmi.product.name: Aspire VN7-591G dmi.product.version: V1.08 dmi.sys.vendor: Acer hciconfig: hci0:Type: BR/EDR Bus: USB BD Address: 5C:93:A2:EB:FF:43 ACL MTU: 1022:8 SCO MTU: 183:5 UP RUNNING PSCAN ISCAN RX bytes:2751 acl:0 sco:0 events:351 errors:0 TX bytes:3779 acl:0 sco:0 commands:306 errors:0 syslog: Dec 1 16:21:16 Miles bluetoothd[631]: Discovery session 0x7fa5da51da30 with :1.228 activated Dec 1 16:27:43 Miles bluetoothd[631]: Discovery session 0x7fa5da530a50 with :1.230 activated To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/bluez/+bug/1397885/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1394368] Re: Bluetooth with AR9462 doesn't work (New ID /Firmware)
** Changed in: linux-firmware (Ubuntu) Status: Incomplete = In Progress ** Package changed: linux-firmware (Ubuntu) = linux (Ubuntu) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-firmware in Ubuntu. https://bugs.launchpad.net/bugs/1394368 Title: Bluetooth with AR9462 doesn't work (New ID /Firmware) Status in linux package in Ubuntu: In Progress Status in linux-firmware package in Ubuntu: Confirmed Bug description: This is (kind of) a duplicate of: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1024884 (please read) I can't use Bluetooth with my AR9462 WLAN/BT-Combo. In the link above, it has been fixed, but not for my Adapter ID/Firmware: System: Ubuntu 14.10 utopic 64bit - 3.16.0-24-generic x86_64 lspci -nnk 02:00.0 Network controller [0280]: Qualcomm Atheros AR9462 Wireless Network Adapter [168c:0034] (rev 01) Subsystem: Lite-On Communications Inc Device [11ad:0802] Kernel driver in use: ath9k lsusb (identified Bluetooth Device) Bus 002 Device 003: ID 04ca:300d Lite-On Technology Corp. ath9k.conf options ath9k btcoex_enable=1 The 04ca:300d ID is not in the Kernel, so i added it via dkms. I took ath3k.c and btusb.c out of the 3.16.0-24-generic source files and changed them: diff -urN ./linux-3.16.0/drivers/bluetooth/ath3k.c /usr/src/ar9462-1.5.1/ath3k.c --- ./linux-3.16.0/drivers/bluetooth/ath3k.c 2014-08-04 00:25:02.0 +0200 +++ /usr/src/ar9462-1.5.1/ath3k.c 2014-11-19 21:12:46.646265890 +0100 @@ -85,6 +85,7 @@ { USB_DEVICE(0x04CA, 0x3007) }, { USB_DEVICE(0x04CA, 0x3008) }, { USB_DEVICE(0x04CA, 0x300b) }, + { USB_DEVICE(0x04CA, 0x300d) }, { USB_DEVICE(0x0930, 0x0219) }, { USB_DEVICE(0x0930, 0x0220) }, { USB_DEVICE(0x0b05, 0x17d0) }, @@ -134,6 +135,7 @@ { USB_DEVICE(0x04ca, 0x3007), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x04ca, 0x3008), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x04ca, 0x300b), .driver_info = BTUSB_ATH3012 }, + { USB_DEVICE(0x04ca, 0x300d), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x0930, 0x0219), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x0930, 0x0220), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x0b05, 0x17d0), .driver_info = BTUSB_ATH3012 }, diff -urN ./linux-3.16.0/drivers/bluetooth/btusb.c /usr/src/ar9462-1.5.1/btusb.c --- ./linux-3.16.0/drivers/bluetooth/btusb.c 2014-08-04 00:25:02.0 +0200 +++ /usr/src/ar9462-1.5.1/btusb.c 2014-11-19 21:12:46.646265890 +0100 @@ -157,6 +157,7 @@ { USB_DEVICE(0x04ca, 0x3007), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x04ca, 0x3008), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x04ca, 0x300b), .driver_info = BTUSB_ATH3012 }, + { USB_DEVICE(0x04ca, 0x300d), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x0930, 0x0219), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x0930, 0x0220), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x0b05, 0x17d0), .driver_info = BTUSB_ATH3012 }, sudo dkms add -m ar9462 -v 1.5.1 sudo dkms build -m ar9462 -v 1.5.1 sudo dkms install -m ar9462 -v 1.5.1 (DKMS package in the same style/versioning as in the bug report above) dkms status ar9462, 1.5.1, 3.16.0-24-generic, x86_64: installed Now the new output: dmesg | egrep 'ath3|ar3|Bluet' [2.787819] Bluetooth: Core ver 2.19 [2.787833] Bluetooth: HCI device and connection manager initialized [2.787839] Bluetooth: HCI socket layer initialized [2.787842] Bluetooth: L2CAP socket layer initialized [2.787848] Bluetooth: SCO socket layer initialized [2.793551] Bluetooth: BNEP (Ethernet Emulation) ver 1.3 [2.793554] Bluetooth: BNEP filters: protocol multicast [2.793561] Bluetooth: BNEP socket layer initialized [3.130779] Bluetooth: Patch file not found ar3k/AthrBT_0x11020100.dfu [3.130783] Bluetooth: Loading patch file failed [3.130788] ath3k: probe of 2-5:1.0 failed with error -12 [3.130823] usbcore: registered new interface driver ath3k [9.776503] Bluetooth: RFCOMM TTY layer initialized [9.776512] Bluetooth: RFCOMM socket layer initialized [9.776517] Bluetooth: RFCOMM ver 1.11 My patch works, but just like in the bug report above, a Firmware file is missing: AthrBT_0x11020100.dfu I found it neither in linux-firmware (http://git.kernel.org/cgit/linux/kernel/git/firmware/linux-firmware.git/tree/ar3k) nor elsewhere. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1394368/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1466266] Re: linux-ti-omap4: 3.2.0-1466.87 -proposed tracker
** Changed in: kernel-sru-workflow/verification-testing Status: New = In Progress ** Changed in: kernel-sru-workflow/regression-testing Status: New = Confirmed ** Description changed: This bug is for tracking the version to be filled upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Thursday, 18. June 2015 01:00 UTC kernel-stable-master-bug:1466215 kernel-stable-Certification-testing-end:Thursday, 18. June 2015 15:01 UTC kernel-stable-Security-signoff-end:Thursday, 18. June 2015 15:01 UTC - kernel-stable-phase:CopyToProposed kernel-stable-Prepare-package-end:Thursday, 18. June 2015 16:26 UTC kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 16:26 UTC - kernel-stable-phase-changed:Thursday, 18. June 2015 16:26 UTC kernel-stable-Promote-to-proposed-end:Thursday, 18. June 2015 17:00 UTC + kernel-stable-phase:Verification Testing + kernel-stable-phase-changed:Thursday, 18. June 2015 18:00 UTC + kernel-stable-Verification-testing-start:Thursday, 18. June 2015 18:00 UTC + proposed-announcement-sent:True + kernel-stable-Regression-testing-start:Thursday, 18. June 2015 18:01 UTC -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-ti-omap4 in Ubuntu. https://bugs.launchpad.net/bugs/1466266 Title: linux-ti-omap4: 3.2.0-1466.87 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow package-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Invalid Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Confirmed Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow upload-to-ppa series: Fix Released Status in Kernel SRU Workflow verification-testing series: In Progress Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux-ti-omap4 source package in Precise: New Bug description: This bug is for tracking the version to be filled upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Thursday, 18. June 2015 01:00 UTC kernel-stable-master-bug:1466215 kernel-stable-Certification-testing-end:Thursday, 18. June 2015 15:01 UTC kernel-stable-Security-signoff-end:Thursday, 18. June 2015 15:01 UTC kernel-stable-Prepare-package-end:Thursday, 18. June 2015 16:26 UTC kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 16:26 UTC kernel-stable-Promote-to-proposed-end:Thursday, 18. June 2015 17:00 UTC kernel-stable-phase:Verification Testing kernel-stable-phase-changed:Thursday, 18. June 2015 18:00 UTC kernel-stable-Verification-testing-start:Thursday, 18. June 2015 18:00 UTC proposed-announcement-sent:True kernel-stable-Regression-testing-start:Thursday, 18. June 2015 18:01 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1466266/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1394368] Re: Bluetooth with AR9462 doesn't work (New ID /Firmware)
Sorry, i forgot on which machine i was on. With the correct firmware and the patch described in the initial post (thanks for sending it upstream!), it still hat the loading bug as described in https://bugs.launchpad.net/ubuntu/+source/linux-firmware/+bug/1394368/comments/10 dmesg | egrep 'ath3|ar3|Bluet' [3.198102] Bluetooth: Core ver 2.19 [3.198140] Bluetooth: HCI device and connection manager initialized [3.198147] Bluetooth: HCI socket layer initialized [3.198149] Bluetooth: L2CAP socket layer initialized [3.198157] Bluetooth: SCO socket layer initialized [3.205334] Bluetooth: BNEP (Ethernet Emulation) ver 1.3 [3.205336] Bluetooth: BNEP filters: protocol multicast [3.205342] Bluetooth: BNEP socket layer initialized [3.213183] Bluetooth: RFCOMM TTY layer initialized [3.213195] Bluetooth: RFCOMM socket layer initialized [3.213201] Bluetooth: RFCOMM ver 1.11 [3.295666] usbcore: registered new interface driver ath3k [6.794243] Bluetooth: Error in firmware loading err = -110,len = 448, size = 4096 [6.794265] Bluetooth: Loading patch file failed [6.794271] ath3k: probe of 2-5:1.0 failed with error -110 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1394368 Title: Bluetooth with AR9462 doesn't work (New ID /Firmware) Status in linux package in Ubuntu: In Progress Status in linux-firmware package in Ubuntu: Confirmed Bug description: This is (kind of) a duplicate of: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1024884 (please read) I can't use Bluetooth with my AR9462 WLAN/BT-Combo. In the link above, it has been fixed, but not for my Adapter ID/Firmware: System: Ubuntu 14.10 utopic 64bit - 3.16.0-24-generic x86_64 lspci -nnk 02:00.0 Network controller [0280]: Qualcomm Atheros AR9462 Wireless Network Adapter [168c:0034] (rev 01) Subsystem: Lite-On Communications Inc Device [11ad:0802] Kernel driver in use: ath9k lsusb (identified Bluetooth Device) Bus 002 Device 003: ID 04ca:300d Lite-On Technology Corp. ath9k.conf options ath9k btcoex_enable=1 The 04ca:300d ID is not in the Kernel, so i added it via dkms. I took ath3k.c and btusb.c out of the 3.16.0-24-generic source files and changed them: diff -urN ./linux-3.16.0/drivers/bluetooth/ath3k.c /usr/src/ar9462-1.5.1/ath3k.c --- ./linux-3.16.0/drivers/bluetooth/ath3k.c 2014-08-04 00:25:02.0 +0200 +++ /usr/src/ar9462-1.5.1/ath3k.c 2014-11-19 21:12:46.646265890 +0100 @@ -85,6 +85,7 @@ { USB_DEVICE(0x04CA, 0x3007) }, { USB_DEVICE(0x04CA, 0x3008) }, { USB_DEVICE(0x04CA, 0x300b) }, + { USB_DEVICE(0x04CA, 0x300d) }, { USB_DEVICE(0x0930, 0x0219) }, { USB_DEVICE(0x0930, 0x0220) }, { USB_DEVICE(0x0b05, 0x17d0) }, @@ -134,6 +135,7 @@ { USB_DEVICE(0x04ca, 0x3007), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x04ca, 0x3008), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x04ca, 0x300b), .driver_info = BTUSB_ATH3012 }, + { USB_DEVICE(0x04ca, 0x300d), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x0930, 0x0219), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x0930, 0x0220), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x0b05, 0x17d0), .driver_info = BTUSB_ATH3012 }, diff -urN ./linux-3.16.0/drivers/bluetooth/btusb.c /usr/src/ar9462-1.5.1/btusb.c --- ./linux-3.16.0/drivers/bluetooth/btusb.c 2014-08-04 00:25:02.0 +0200 +++ /usr/src/ar9462-1.5.1/btusb.c 2014-11-19 21:12:46.646265890 +0100 @@ -157,6 +157,7 @@ { USB_DEVICE(0x04ca, 0x3007), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x04ca, 0x3008), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x04ca, 0x300b), .driver_info = BTUSB_ATH3012 }, + { USB_DEVICE(0x04ca, 0x300d), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x0930, 0x0219), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x0930, 0x0220), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x0b05, 0x17d0), .driver_info = BTUSB_ATH3012 }, sudo dkms add -m ar9462 -v 1.5.1 sudo dkms build -m ar9462 -v 1.5.1 sudo dkms install -m ar9462 -v 1.5.1 (DKMS package in the same style/versioning as in the bug report above) dkms status ar9462, 1.5.1, 3.16.0-24-generic, x86_64: installed Now the new output: dmesg | egrep 'ath3|ar3|Bluet' [2.787819] Bluetooth: Core ver 2.19 [2.787833] Bluetooth: HCI device and connection manager initialized [2.787839] Bluetooth: HCI socket layer initialized [2.787842] Bluetooth: L2CAP socket layer initialized [2.787848] Bluetooth: SCO socket layer initialized [2.793551] Bluetooth: BNEP (Ethernet Emulation) ver 1.3 [2.793554] Bluetooth: BNEP filters: protocol multicast [2.793561] Bluetooth: BNEP socket layer initialized [3.130779] Bluetooth: Patch file not found ar3k/AthrBT_0x11020100.dfu [3.130783] Bluetooth:
[Kernel-packages] [Bug 1394368] Re: Bluetooth with AR9462 doesn't work (New ID /Firmware)
** Also affects: linux-firmware (Ubuntu) Importance: Undecided Status: New ** Changed in: linux-firmware (Ubuntu) Status: New = Confirmed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-firmware in Ubuntu. https://bugs.launchpad.net/bugs/1394368 Title: Bluetooth with AR9462 doesn't work (New ID /Firmware) Status in linux package in Ubuntu: In Progress Status in linux-firmware package in Ubuntu: Confirmed Bug description: This is (kind of) a duplicate of: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1024884 (please read) I can't use Bluetooth with my AR9462 WLAN/BT-Combo. In the link above, it has been fixed, but not for my Adapter ID/Firmware: System: Ubuntu 14.10 utopic 64bit - 3.16.0-24-generic x86_64 lspci -nnk 02:00.0 Network controller [0280]: Qualcomm Atheros AR9462 Wireless Network Adapter [168c:0034] (rev 01) Subsystem: Lite-On Communications Inc Device [11ad:0802] Kernel driver in use: ath9k lsusb (identified Bluetooth Device) Bus 002 Device 003: ID 04ca:300d Lite-On Technology Corp. ath9k.conf options ath9k btcoex_enable=1 The 04ca:300d ID is not in the Kernel, so i added it via dkms. I took ath3k.c and btusb.c out of the 3.16.0-24-generic source files and changed them: diff -urN ./linux-3.16.0/drivers/bluetooth/ath3k.c /usr/src/ar9462-1.5.1/ath3k.c --- ./linux-3.16.0/drivers/bluetooth/ath3k.c 2014-08-04 00:25:02.0 +0200 +++ /usr/src/ar9462-1.5.1/ath3k.c 2014-11-19 21:12:46.646265890 +0100 @@ -85,6 +85,7 @@ { USB_DEVICE(0x04CA, 0x3007) }, { USB_DEVICE(0x04CA, 0x3008) }, { USB_DEVICE(0x04CA, 0x300b) }, + { USB_DEVICE(0x04CA, 0x300d) }, { USB_DEVICE(0x0930, 0x0219) }, { USB_DEVICE(0x0930, 0x0220) }, { USB_DEVICE(0x0b05, 0x17d0) }, @@ -134,6 +135,7 @@ { USB_DEVICE(0x04ca, 0x3007), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x04ca, 0x3008), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x04ca, 0x300b), .driver_info = BTUSB_ATH3012 }, + { USB_DEVICE(0x04ca, 0x300d), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x0930, 0x0219), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x0930, 0x0220), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x0b05, 0x17d0), .driver_info = BTUSB_ATH3012 }, diff -urN ./linux-3.16.0/drivers/bluetooth/btusb.c /usr/src/ar9462-1.5.1/btusb.c --- ./linux-3.16.0/drivers/bluetooth/btusb.c 2014-08-04 00:25:02.0 +0200 +++ /usr/src/ar9462-1.5.1/btusb.c 2014-11-19 21:12:46.646265890 +0100 @@ -157,6 +157,7 @@ { USB_DEVICE(0x04ca, 0x3007), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x04ca, 0x3008), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x04ca, 0x300b), .driver_info = BTUSB_ATH3012 }, + { USB_DEVICE(0x04ca, 0x300d), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x0930, 0x0219), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x0930, 0x0220), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x0b05, 0x17d0), .driver_info = BTUSB_ATH3012 }, sudo dkms add -m ar9462 -v 1.5.1 sudo dkms build -m ar9462 -v 1.5.1 sudo dkms install -m ar9462 -v 1.5.1 (DKMS package in the same style/versioning as in the bug report above) dkms status ar9462, 1.5.1, 3.16.0-24-generic, x86_64: installed Now the new output: dmesg | egrep 'ath3|ar3|Bluet' [2.787819] Bluetooth: Core ver 2.19 [2.787833] Bluetooth: HCI device and connection manager initialized [2.787839] Bluetooth: HCI socket layer initialized [2.787842] Bluetooth: L2CAP socket layer initialized [2.787848] Bluetooth: SCO socket layer initialized [2.793551] Bluetooth: BNEP (Ethernet Emulation) ver 1.3 [2.793554] Bluetooth: BNEP filters: protocol multicast [2.793561] Bluetooth: BNEP socket layer initialized [3.130779] Bluetooth: Patch file not found ar3k/AthrBT_0x11020100.dfu [3.130783] Bluetooth: Loading patch file failed [3.130788] ath3k: probe of 2-5:1.0 failed with error -12 [3.130823] usbcore: registered new interface driver ath3k [9.776503] Bluetooth: RFCOMM TTY layer initialized [9.776512] Bluetooth: RFCOMM socket layer initialized [9.776517] Bluetooth: RFCOMM ver 1.11 My patch works, but just like in the bug report above, a Firmware file is missing: AthrBT_0x11020100.dfu I found it neither in linux-firmware (http://git.kernel.org/cgit/linux/kernel/git/firmware/linux-firmware.git/tree/ar3k) nor elsewhere. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1394368/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1397885] Re: [Atheros AR9462] Bluetooth looks activated but cannot be used
*** This bug is a duplicate of bug 1394368 *** https://bugs.launchpad.net/bugs/1394368 This device needs new firmware. I added it to ppa. Just install this deb. https://launchpad.net/~hanipouspilot/+archive/ubuntu/rtlwifi/+files /linux-firmware_1.144%2Bar3012_all.deb The patch has been applied upstream. http://git.kernel.org/cgit/linux/kernel/git/bluetooth/bluetooth- next.git/commit/drivers/bluetooth/ath3k.c?id=7e730c7f3d1f39c25cf5f7cf70c0ff4c28d7bec7 ** Changed in: bluez (Ubuntu) Status: Confirmed = In Progress ** This bug has been marked a duplicate of bug 1394368 Bluetooth with AR9462 doesn't work (New ID /Firmware) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to bluez in Ubuntu. https://bugs.launchpad.net/bugs/1397885 Title: [Atheros AR9462] Bluetooth looks activated but cannot be used Status in bluez package in Ubuntu: In Progress Bug description: Ubuntu 14.10 System Information Manufacturer: Acer Product Name: Aspire VN7-591G Version: V1.08 SKU Number: Aspire VN7-591G_091B_1.08 Family: Sharkbay System lspci 07:00.0 Network controller: Qualcomm Atheros AR9462 Wireless Network Adapter (rev 01) lsusb -v Bus 003 Device 006: ID 04ca:300d Lite-On Technology Corp. Steps to reproduce: 1. Activate a Bluetooth device (for instance a mouse or a nearby device) 2. On the laptop, press the Bluetooth icon, then Set Up new Device… Expected result: 2. A list of available bluetooth devices is shown Actual result: 2. Nothing shows up and the spinning icon keeps spinning with Searching for devices... It looks like the bluetooth device does not work at all. Apparently, there have been previous bugs reported and corrected [1], but the situation still occurs with this module on my laptop... [1] https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1024884 ProblemType: Bug DistroRelease: Ubuntu 14.10 Package: bluez 4.101-0ubuntu20 ProcVersionSignature: Ubuntu 3.16.0-25.33-generic 3.16.7 Uname: Linux 3.16.0-25-generic x86_64 ApportVersion: 2.14.7-0ubuntu8 Architecture: amd64 CurrentDesktop: Unity Date: Mon Dec 1 16:35:17 2014 EcryptfsInUse: Yes InstallationDate: Installed on 2014-11-15 (15 days ago) InstallationMedia: Ubuntu 14.10 Utopic Unicorn - Release amd64 (20141022.1) InterestingModules: bnep rfcomm btusb bluetooth MachineType: Acer Aspire VN7-591G ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.16.0-25-generic.efi.signed root=/dev/mapper/ubuntu--vg-root ro quiet splash vt.handoff=7 SourcePackage: bluez UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 09/12/2014 dmi.bios.vendor: Insyde Corp. dmi.bios.version: V1.08 dmi.board.asset.tag: No Asset Tag dmi.board.name: Aspire VN7-591G dmi.board.vendor: Acer dmi.board.version: V1.08 dmi.chassis.asset.tag: No Asset Tag dmi.chassis.type: 10 dmi.chassis.vendor: Chassis Manufacturer dmi.chassis.version: V1.08 dmi.modalias: dmi:bvnInsydeCorp.:bvrV1.08:bd09/12/2014:svnAcer:pnAspireVN7-591G:pvrV1.08:rvnAcer:rnAspireVN7-591G:rvrV1.08:cvnChassisManufacturer:ct10:cvrV1.08: dmi.product.name: Aspire VN7-591G dmi.product.version: V1.08 dmi.sys.vendor: Acer hciconfig: hci0:Type: BR/EDR Bus: USB BD Address: 5C:93:A2:EB:FF:43 ACL MTU: 1022:8 SCO MTU: 183:5 UP RUNNING PSCAN ISCAN RX bytes:2751 acl:0 sco:0 events:351 errors:0 TX bytes:3779 acl:0 sco:0 commands:306 errors:0 syslog: Dec 1 16:21:16 Miles bluetoothd[631]: Discovery session 0x7fa5da51da30 with :1.228 activated Dec 1 16:27:43 Miles bluetoothd[631]: Discovery session 0x7fa5da530a50 with :1.230 activated To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/bluez/+bug/1397885/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1394368] Re: Bluetooth with AR9462 doesn't work (New ID /Firmware)
Full patch, not just ath3k http://git.kernel.org/cgit/linux/kernel/git/bluetooth/bluetooth- next.git/commit/?id=7e730c7f3d1f39c25cf5f7cf70c0ff4c28d7bec7 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1394368 Title: Bluetooth with AR9462 doesn't work (New ID /Firmware) Status in linux package in Ubuntu: In Progress Status in linux-firmware package in Ubuntu: Confirmed Bug description: This is (kind of) a duplicate of: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1024884 (please read) I can't use Bluetooth with my AR9462 WLAN/BT-Combo. In the link above, it has been fixed, but not for my Adapter ID/Firmware: System: Ubuntu 14.10 utopic 64bit - 3.16.0-24-generic x86_64 lspci -nnk 02:00.0 Network controller [0280]: Qualcomm Atheros AR9462 Wireless Network Adapter [168c:0034] (rev 01) Subsystem: Lite-On Communications Inc Device [11ad:0802] Kernel driver in use: ath9k lsusb (identified Bluetooth Device) Bus 002 Device 003: ID 04ca:300d Lite-On Technology Corp. ath9k.conf options ath9k btcoex_enable=1 The 04ca:300d ID is not in the Kernel, so i added it via dkms. I took ath3k.c and btusb.c out of the 3.16.0-24-generic source files and changed them: diff -urN ./linux-3.16.0/drivers/bluetooth/ath3k.c /usr/src/ar9462-1.5.1/ath3k.c --- ./linux-3.16.0/drivers/bluetooth/ath3k.c 2014-08-04 00:25:02.0 +0200 +++ /usr/src/ar9462-1.5.1/ath3k.c 2014-11-19 21:12:46.646265890 +0100 @@ -85,6 +85,7 @@ { USB_DEVICE(0x04CA, 0x3007) }, { USB_DEVICE(0x04CA, 0x3008) }, { USB_DEVICE(0x04CA, 0x300b) }, + { USB_DEVICE(0x04CA, 0x300d) }, { USB_DEVICE(0x0930, 0x0219) }, { USB_DEVICE(0x0930, 0x0220) }, { USB_DEVICE(0x0b05, 0x17d0) }, @@ -134,6 +135,7 @@ { USB_DEVICE(0x04ca, 0x3007), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x04ca, 0x3008), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x04ca, 0x300b), .driver_info = BTUSB_ATH3012 }, + { USB_DEVICE(0x04ca, 0x300d), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x0930, 0x0219), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x0930, 0x0220), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x0b05, 0x17d0), .driver_info = BTUSB_ATH3012 }, diff -urN ./linux-3.16.0/drivers/bluetooth/btusb.c /usr/src/ar9462-1.5.1/btusb.c --- ./linux-3.16.0/drivers/bluetooth/btusb.c 2014-08-04 00:25:02.0 +0200 +++ /usr/src/ar9462-1.5.1/btusb.c 2014-11-19 21:12:46.646265890 +0100 @@ -157,6 +157,7 @@ { USB_DEVICE(0x04ca, 0x3007), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x04ca, 0x3008), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x04ca, 0x300b), .driver_info = BTUSB_ATH3012 }, + { USB_DEVICE(0x04ca, 0x300d), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x0930, 0x0219), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x0930, 0x0220), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x0b05, 0x17d0), .driver_info = BTUSB_ATH3012 }, sudo dkms add -m ar9462 -v 1.5.1 sudo dkms build -m ar9462 -v 1.5.1 sudo dkms install -m ar9462 -v 1.5.1 (DKMS package in the same style/versioning as in the bug report above) dkms status ar9462, 1.5.1, 3.16.0-24-generic, x86_64: installed Now the new output: dmesg | egrep 'ath3|ar3|Bluet' [2.787819] Bluetooth: Core ver 2.19 [2.787833] Bluetooth: HCI device and connection manager initialized [2.787839] Bluetooth: HCI socket layer initialized [2.787842] Bluetooth: L2CAP socket layer initialized [2.787848] Bluetooth: SCO socket layer initialized [2.793551] Bluetooth: BNEP (Ethernet Emulation) ver 1.3 [2.793554] Bluetooth: BNEP filters: protocol multicast [2.793561] Bluetooth: BNEP socket layer initialized [3.130779] Bluetooth: Patch file not found ar3k/AthrBT_0x11020100.dfu [3.130783] Bluetooth: Loading patch file failed [3.130788] ath3k: probe of 2-5:1.0 failed with error -12 [3.130823] usbcore: registered new interface driver ath3k [9.776503] Bluetooth: RFCOMM TTY layer initialized [9.776512] Bluetooth: RFCOMM socket layer initialized [9.776517] Bluetooth: RFCOMM ver 1.11 My patch works, but just like in the bug report above, a Firmware file is missing: AthrBT_0x11020100.dfu I found it neither in linux-firmware (http://git.kernel.org/cgit/linux/kernel/git/firmware/linux-firmware.git/tree/ar3k) nor elsewhere. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1394368/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1449730] Re: Bluetooth not working on Asus G56JK notebook (Ubtuntu 15.04)
Patch applied http://git.kernel.org/cgit/linux/kernel/git/bluetooth/bluetooth- next.git/commit/?id=ec0810d2ac1c932dad48f45da67e3adc5c5449a1 ** Changed in: linux (Ubuntu) Status: Triaged = In Progress ** Changed in: linux (Ubuntu) Assignee: (unassigned) = Pilot6 (hanipouspilot) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1449730 Title: Bluetooth not working on Asus G56JK notebook (Ubtuntu 15.04) Status in linux package in Ubuntu: In Progress Bug description: On Asus ROG G56JK the bluetooth doesn't work: I cannot find any device and no device can see the notebook. Attached there are logs and hw data. --- ApportVersion: 2.17.2-0ubuntu1 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: cosming1732 F pulseaudio /dev/snd/controlC1: cosming1732 F pulseaudio CurrentDesktop: Unity DistroRelease: Ubuntu 15.04 HibernationDevice: RESUME=UUID=31a02f02-4aa6-4487-bda1-d5fd068c60d9 InstallationDate: Installed on 2015-04-26 (3 days ago) InstallationMedia: Ubuntu 15.04 Vivid Vervet - Release amd64 (20150422) MachineType: ASUSTeK COMPUTER INC. G56JK NonfreeKernelModules: nvidia Package: linux (not installed) ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.19.0-15-generic root=UUID=cbc6202a-5564-4ec3-ae23-4204c2baded6 ro quiet splash ProcVersionSignature: Ubuntu 3.19.0-15.15-generic 3.19.3 RelatedPackageVersions: linux-restricted-modules-3.19.0-15-generic N/A linux-backports-modules-3.19.0-15-generic N/A linux-firmware 1.143 Tags: vivid UdevLog: Error: [Errno 2] No such file or directory: '/var/log/udev' Uname: Linux 3.19.0-15-generic x86_64 UpgradeStatus: No upgrade log present (probably fresh install) UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo _MarkForUpload: True dmi.bios.date: 09/26/2014 dmi.bios.vendor: American Megatrends Inc. dmi.bios.version: G56JK.202 dmi.board.asset.tag: ATN12345678901234567 dmi.board.name: G56JK dmi.board.vendor: ASUSTeK COMPUTER INC. dmi.board.version: 1.0 dmi.chassis.asset.tag: No Asset Tag dmi.chassis.type: 10 dmi.chassis.vendor: ASUSTeK COMPUTER INC. dmi.chassis.version: 1.0 dmi.modalias: dmi:bvnAmericanMegatrendsInc.:bvrG56JK.202:bd09/26/2014:svnASUSTeKCOMPUTERINC.:pnG56JK:pvr1.0:rvnASUSTeKCOMPUTERINC.:rnG56JK:rvr1.0:cvnASUSTeKCOMPUTERINC.:ct10:cvr1.0: dmi.product.name: G56JK dmi.product.version: 1.0 dmi.sys.vendor: ASUSTeK COMPUTER INC. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1449730/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1394368] Re: Bluetooth with AR9462 doesn't work (New ID /Firmware)
Applied upstream http://git.kernel.org/cgit/linux/kernel/git/bluetooth/bluetooth-next.git/commit/drivers/bluetooth/ath3k.c?id=7e730c7f3d1f39c25cf5f7cf70c0ff4c28d7bec7 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1394368 Title: Bluetooth with AR9462 doesn't work (New ID /Firmware) Status in linux package in Ubuntu: In Progress Status in linux-firmware package in Ubuntu: Confirmed Bug description: This is (kind of) a duplicate of: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1024884 (please read) I can't use Bluetooth with my AR9462 WLAN/BT-Combo. In the link above, it has been fixed, but not for my Adapter ID/Firmware: System: Ubuntu 14.10 utopic 64bit - 3.16.0-24-generic x86_64 lspci -nnk 02:00.0 Network controller [0280]: Qualcomm Atheros AR9462 Wireless Network Adapter [168c:0034] (rev 01) Subsystem: Lite-On Communications Inc Device [11ad:0802] Kernel driver in use: ath9k lsusb (identified Bluetooth Device) Bus 002 Device 003: ID 04ca:300d Lite-On Technology Corp. ath9k.conf options ath9k btcoex_enable=1 The 04ca:300d ID is not in the Kernel, so i added it via dkms. I took ath3k.c and btusb.c out of the 3.16.0-24-generic source files and changed them: diff -urN ./linux-3.16.0/drivers/bluetooth/ath3k.c /usr/src/ar9462-1.5.1/ath3k.c --- ./linux-3.16.0/drivers/bluetooth/ath3k.c 2014-08-04 00:25:02.0 +0200 +++ /usr/src/ar9462-1.5.1/ath3k.c 2014-11-19 21:12:46.646265890 +0100 @@ -85,6 +85,7 @@ { USB_DEVICE(0x04CA, 0x3007) }, { USB_DEVICE(0x04CA, 0x3008) }, { USB_DEVICE(0x04CA, 0x300b) }, + { USB_DEVICE(0x04CA, 0x300d) }, { USB_DEVICE(0x0930, 0x0219) }, { USB_DEVICE(0x0930, 0x0220) }, { USB_DEVICE(0x0b05, 0x17d0) }, @@ -134,6 +135,7 @@ { USB_DEVICE(0x04ca, 0x3007), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x04ca, 0x3008), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x04ca, 0x300b), .driver_info = BTUSB_ATH3012 }, + { USB_DEVICE(0x04ca, 0x300d), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x0930, 0x0219), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x0930, 0x0220), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x0b05, 0x17d0), .driver_info = BTUSB_ATH3012 }, diff -urN ./linux-3.16.0/drivers/bluetooth/btusb.c /usr/src/ar9462-1.5.1/btusb.c --- ./linux-3.16.0/drivers/bluetooth/btusb.c 2014-08-04 00:25:02.0 +0200 +++ /usr/src/ar9462-1.5.1/btusb.c 2014-11-19 21:12:46.646265890 +0100 @@ -157,6 +157,7 @@ { USB_DEVICE(0x04ca, 0x3007), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x04ca, 0x3008), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x04ca, 0x300b), .driver_info = BTUSB_ATH3012 }, + { USB_DEVICE(0x04ca, 0x300d), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x0930, 0x0219), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x0930, 0x0220), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x0b05, 0x17d0), .driver_info = BTUSB_ATH3012 }, sudo dkms add -m ar9462 -v 1.5.1 sudo dkms build -m ar9462 -v 1.5.1 sudo dkms install -m ar9462 -v 1.5.1 (DKMS package in the same style/versioning as in the bug report above) dkms status ar9462, 1.5.1, 3.16.0-24-generic, x86_64: installed Now the new output: dmesg | egrep 'ath3|ar3|Bluet' [2.787819] Bluetooth: Core ver 2.19 [2.787833] Bluetooth: HCI device and connection manager initialized [2.787839] Bluetooth: HCI socket layer initialized [2.787842] Bluetooth: L2CAP socket layer initialized [2.787848] Bluetooth: SCO socket layer initialized [2.793551] Bluetooth: BNEP (Ethernet Emulation) ver 1.3 [2.793554] Bluetooth: BNEP filters: protocol multicast [2.793561] Bluetooth: BNEP socket layer initialized [3.130779] Bluetooth: Patch file not found ar3k/AthrBT_0x11020100.dfu [3.130783] Bluetooth: Loading patch file failed [3.130788] ath3k: probe of 2-5:1.0 failed with error -12 [3.130823] usbcore: registered new interface driver ath3k [9.776503] Bluetooth: RFCOMM TTY layer initialized [9.776512] Bluetooth: RFCOMM socket layer initialized [9.776517] Bluetooth: RFCOMM ver 1.11 My patch works, but just like in the bug report above, a Firmware file is missing: AthrBT_0x11020100.dfu I found it neither in linux-firmware (http://git.kernel.org/cgit/linux/kernel/git/firmware/linux-firmware.git/tree/ar3k) nor elsewhere. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1394368/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1394368] Re: Bluetooth with AR9462 doesn't work (New ID /Firmware)
Kernel: 3.16.0-41-generic After installing the package with new firmware files: Output of dmesg | egrep 'ath3|ar3|Bluet': [2.557837] Bluetooth: Core ver 2.19 [2.557854] Bluetooth: HCI device and connection manager initialized [2.557861] Bluetooth: HCI socket layer initialized [2.557863] Bluetooth: L2CAP socket layer initialized [2.557870] Bluetooth: SCO socket layer initialized [2.570170] Bluetooth: BNEP (Ethernet Emulation) ver 1.3 [2.570173] Bluetooth: BNEP filters: protocol multicast [2.570180] Bluetooth: BNEP socket layer initialized [2.579359] Bluetooth: RFCOMM TTY layer initialized [2.579370] Bluetooth: RFCOMM socket layer initialized [2.579374] Bluetooth: RFCOMM ver 1.11 Output of awk -vRS= '/300d/' /sys/kernel/debug/usb/devices: T: Bus=02 Lev=01 Prnt=01 Port=04 Cnt=03 Dev#= 5 Spd=12 MxCh= 0 D: Ver= 1.10 Cls=e0(wlcon) Sub=01 Prot=01 MxPS=64 #Cfgs= 1 P: Vendor=04ca ProdID=300d Rev= 0.01 C:* #Ifs= 2 Cfg#= 1 Atr=e0 MxPwr=100mA I:* If#= 0 Alt= 0 #EPs= 3 Cls=e0(wlcon) Sub=01 Prot=01 Driver=btusb E: Ad=81(I) Atr=03(Int.) MxPS= 16 Ivl=1ms E: Ad=82(I) Atr=02(Bulk) MxPS= 64 Ivl=0ms E: Ad=02(O) Atr=02(Bulk) MxPS= 64 Ivl=0ms I:* If#= 1 Alt= 0 #EPs= 2 Cls=e0(wlcon) Sub=01 Prot=01 Driver=btusb E: Ad=83(I) Atr=01(Isoc) MxPS= 0 Ivl=1ms E: Ad=03(O) Atr=01(Isoc) MxPS= 0 Ivl=1ms I: If#= 1 Alt= 1 #EPs= 2 Cls=e0(wlcon) Sub=01 Prot=01 Driver=btusb E: Ad=83(I) Atr=01(Isoc) MxPS= 9 Ivl=1ms E: Ad=03(O) Atr=01(Isoc) MxPS= 9 Ivl=1ms I: If#= 1 Alt= 2 #EPs= 2 Cls=e0(wlcon) Sub=01 Prot=01 Driver=btusb E: Ad=83(I) Atr=01(Isoc) MxPS= 17 Ivl=1ms E: Ad=03(O) Atr=01(Isoc) MxPS= 17 Ivl=1ms I: If#= 1 Alt= 3 #EPs= 2 Cls=e0(wlcon) Sub=01 Prot=01 Driver=btusb E: Ad=83(I) Atr=01(Isoc) MxPS= 25 Ivl=1ms E: Ad=03(O) Atr=01(Isoc) MxPS= 25 Ivl=1ms I: If#= 1 Alt= 4 #EPs= 2 Cls=e0(wlcon) Sub=01 Prot=01 Driver=btusb E: Ad=83(I) Atr=01(Isoc) MxPS= 33 Ivl=1ms E: Ad=03(O) Atr=01(Isoc) MxPS= 33 Ivl=1ms I: If#= 1 Alt= 5 #EPs= 2 Cls=e0(wlcon) Sub=01 Prot=01 Driver=btusb E: Ad=83(I) Atr=01(Isoc) MxPS= 49 Ivl=1ms E: Ad=03(O) Atr=01(Isoc) MxPS= 49 Ivl=1ms Still not working ... -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-firmware in Ubuntu. https://bugs.launchpad.net/bugs/1394368 Title: Bluetooth with AR9462 doesn't work (New ID /Firmware) Status in linux-firmware package in Ubuntu: Incomplete Bug description: This is (kind of) a duplicate of: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1024884 (please read) I can't use Bluetooth with my AR9462 WLAN/BT-Combo. In the link above, it has been fixed, but not for my Adapter ID/Firmware: System: Ubuntu 14.10 utopic 64bit - 3.16.0-24-generic x86_64 lspci -nnk 02:00.0 Network controller [0280]: Qualcomm Atheros AR9462 Wireless Network Adapter [168c:0034] (rev 01) Subsystem: Lite-On Communications Inc Device [11ad:0802] Kernel driver in use: ath9k lsusb (identified Bluetooth Device) Bus 002 Device 003: ID 04ca:300d Lite-On Technology Corp. ath9k.conf options ath9k btcoex_enable=1 The 04ca:300d ID is not in the Kernel, so i added it via dkms. I took ath3k.c and btusb.c out of the 3.16.0-24-generic source files and changed them: diff -urN ./linux-3.16.0/drivers/bluetooth/ath3k.c /usr/src/ar9462-1.5.1/ath3k.c --- ./linux-3.16.0/drivers/bluetooth/ath3k.c 2014-08-04 00:25:02.0 +0200 +++ /usr/src/ar9462-1.5.1/ath3k.c 2014-11-19 21:12:46.646265890 +0100 @@ -85,6 +85,7 @@ { USB_DEVICE(0x04CA, 0x3007) }, { USB_DEVICE(0x04CA, 0x3008) }, { USB_DEVICE(0x04CA, 0x300b) }, + { USB_DEVICE(0x04CA, 0x300d) }, { USB_DEVICE(0x0930, 0x0219) }, { USB_DEVICE(0x0930, 0x0220) }, { USB_DEVICE(0x0b05, 0x17d0) }, @@ -134,6 +135,7 @@ { USB_DEVICE(0x04ca, 0x3007), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x04ca, 0x3008), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x04ca, 0x300b), .driver_info = BTUSB_ATH3012 }, + { USB_DEVICE(0x04ca, 0x300d), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x0930, 0x0219), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x0930, 0x0220), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x0b05, 0x17d0), .driver_info = BTUSB_ATH3012 }, diff -urN ./linux-3.16.0/drivers/bluetooth/btusb.c /usr/src/ar9462-1.5.1/btusb.c --- ./linux-3.16.0/drivers/bluetooth/btusb.c 2014-08-04 00:25:02.0 +0200 +++ /usr/src/ar9462-1.5.1/btusb.c 2014-11-19 21:12:46.646265890 +0100 @@ -157,6 +157,7 @@ { USB_DEVICE(0x04ca, 0x3007), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x04ca, 0x3008), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x04ca, 0x300b), .driver_info = BTUSB_ATH3012 }, + { USB_DEVICE(0x04ca, 0x300d), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x0930, 0x0219), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x0930, 0x0220), .driver_info = BTUSB_ATH3012 }, {
[Kernel-packages] [Bug 1466250] Re: linux: 3.16.0-41.57 -proposed tracker
Security Sign-off: This kernel is a 1-commit respin for a regression from a security update. ** Changed in: kernel-sru-workflow/promote-to-proposed Status: Confirmed = Fix Released ** Changed in: kernel-sru-workflow/promote-to-proposed Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Adam Conrad (adconrad) ** Changed in: kernel-sru-workflow/security-signoff Status: New = Fix Released ** Changed in: kernel-sru-workflow/security-signoff Assignee: Canonical Security Team (canonical-security) = Adam Conrad (adconrad) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1466250 Title: linux: 3.16.0-41.57 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: New Status in Kernel SRU Workflow package-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Invalid Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: New Status in linux package in Ubuntu: Invalid Status in linux source package in Utopic: New Bug description: This bug is for tracking the 3.16.0-41.57 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Wednesday, 17. June 2015 23:34 UTC kernel-stable-phase:CopyToProposed kernel-stable-Prepare-package-end:Thursday, 18. June 2015 17:19 UTC kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 17:19 UTC kernel-stable-phase-changed:Thursday, 18. June 2015 17:19 UTC kernel-stable-Promote-to-proposed-end:Thursday, 18. June 2015 17:22 UTC kernel-stable-Security-signoff-end:Thursday, 18. June 2015 17:22 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1466250/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1418140] Re: CONFIG_DEFAULT_MMAP_MIN_ADDR needs to match on armhf and arm64 otherwise arm64 cannot run armhf binaries
** Also affects: linux (Ubuntu Vivid) Importance: Undecided Status: New ** Changed in: linux (Ubuntu Vivid) Status: New = Fix Released ** Changed in: linux (Ubuntu Vivid) Importance: Undecided = Medium ** Changed in: linux (Ubuntu Vivid) Assignee: (unassigned) = Andy Whitcroft (apw) ** Changed in: linux (Ubuntu) Status: Fix Released = Fix Committed ** Changed in: linux (Ubuntu) Milestone: ubuntu-15.03 = None -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1418140 Title: CONFIG_DEFAULT_MMAP_MIN_ADDR needs to match on armhf and arm64 otherwise arm64 cannot run armhf binaries Status in linux package in Ubuntu: Fix Committed Status in linux source package in Trusty: Fix Released Status in linux source package in Utopic: Fix Released Status in linux source package in Vivid: Fix Released Bug description: Attempting to run 32bit binaries on arm64 triggers applications to be Killed, as the CONFIG_DEFAULT_MMAP_MIN_ADDR used on armhf is not valid on arm64. While this can be overriden via sysctl, the default should be sane. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1418140/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1466592] [NEW] linux: 3.13.0-57.95 -proposed tracker
Public bug reported: This bug is for tracking the 3.13.0-57.95 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Thursday, 18. June 2015 17:21 UTC kernel-stable-phase:Prepare kernel-stable-phase-changed:Thursday, 18. June 2015 17:21 UTC ** Affects: kernel-sru-workflow Importance: Medium Status: In Progress ** Affects: kernel-sru-workflow/certification-testing Importance: Medium Assignee: Canonical Hardware Certification (canonical-hw-cert) Status: New ** Affects: kernel-sru-workflow/package-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/prepare-package Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/prepare-package-meta Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/prepare-package-signed Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/promote-to-proposed Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-security Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-updates Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/regression-testing Importance: Medium Assignee: Canonical Platform QA Team (canonical-platform-qa) Status: New ** Affects: kernel-sru-workflow/security-signoff Importance: Medium Assignee: Canonical Security Team (canonical-security) Status: New ** Affects: kernel-sru-workflow/verification-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: linux (Ubuntu) Importance: Undecided Status: Invalid ** Affects: linux (Ubuntu Trusty) Importance: Medium Status: New ** Tags: block-proposed-trusty kernel-release-tracking-bug trusty ** Tags added: kernel-release-tracking-bug ** Tags added: block-proposed-trusty ** Also affects: linux (Ubuntu Trusty) Importance: Undecided Status: New ** Tags added: trusty ** Also affects: kernel-sru-workflow/certification-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/package-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-meta Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-signed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-proposed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-security Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-updates Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/regression-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/security-signoff Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/verification-testing Importance: Undecided Status: New ** Changed in: kernel-sru-workflow Status: New = In Progress ** Changed in: kernel-sru-workflow Importance: Undecided = Medium ** Changed in: kernel-sru-workflow/certification-testing Importance: Undecided = Medium ** Changed in: kernel-sru-workflow/certification-testing Assignee: (unassigned) = Canonical Hardware Certification (canonical-hw-cert) ** Changed in: kernel-sru-workflow/package-testing Importance: Undecided = Medium ** Changed in: kernel-sru-workflow/package-testing Assignee: (unassigned) = Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/prepare-package Importance: Undecided = Medium ** Changed in: kernel-sru-workflow/prepare-package Assignee: (unassigned) = Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/prepare-package-meta Importance: Undecided = Medium ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: (unassigned) = Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/prepare-package-signed Importance: Undecided = Medium ** Changed in: kernel-sru-workflow/prepare-package-signed
[Kernel-packages] [Bug 1466591] [NEW] linux-lts-utopic: 3.16.0-41.57~14.04.1 -proposed tracker
Public bug reported: This bug is for tracking the 3.16.0-41.57~14.04.1 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Thursday, 18. June 2015 17:17 UTC kernel-stable-phase:Prepare kernel-stable-phase-changed:Thursday, 18. June 2015 17:17 UTC kernel-stable-master-bug:1466250 ** Affects: kernel-sru-workflow Importance: Medium Status: In Progress ** Affects: kernel-sru-workflow/certification-testing Importance: Medium Assignee: Canonical Hardware Certification (canonical-hw-cert) Status: New ** Affects: kernel-sru-workflow/package-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/prepare-package Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/prepare-package-meta Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: Invalid ** Affects: kernel-sru-workflow/prepare-package-signed Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/promote-to-proposed Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-security Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-updates Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/regression-testing Importance: Medium Assignee: Canonical Platform QA Team (canonical-platform-qa) Status: New ** Affects: kernel-sru-workflow/security-signoff Importance: Medium Assignee: Canonical Security Team (canonical-security) Status: New ** Affects: kernel-sru-workflow/verification-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: linux-lts-utopic (Ubuntu) Importance: Medium Status: New ** Affects: linux-lts-utopic (Ubuntu Trusty) Importance: Medium Status: New ** Tags: block-proposed-trusty kernel-release-tracking-bug trusty ** Tags added: kernel-release-tracking-bug ** Tags added: block-proposed-trusty ** Also affects: linux-lts-utopic (Ubuntu Trusty) Importance: Undecided Status: New ** Tags added: trusty ** Also affects: kernel-sru-workflow/certification-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/package-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-meta Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-signed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-proposed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-security Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-updates Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/regression-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/security-signoff Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/verification-testing Importance: Undecided Status: New ** Changed in: kernel-sru-workflow Status: New = In Progress ** Changed in: kernel-sru-workflow Importance: Undecided = Medium ** Changed in: kernel-sru-workflow/certification-testing Importance: Undecided = Medium ** Changed in: kernel-sru-workflow/certification-testing Assignee: (unassigned) = Canonical Hardware Certification (canonical-hw-cert) ** Changed in: kernel-sru-workflow/package-testing Importance: Undecided = Medium ** Changed in: kernel-sru-workflow/package-testing Assignee: (unassigned) = Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/prepare-package Importance: Undecided = Medium ** Changed in: kernel-sru-workflow/prepare-package Assignee: (unassigned) = Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/prepare-package-meta Importance: Undecided = Medium ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: (unassigned) = Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/prepare-package-meta Status: New = Invalid **
[Kernel-packages] [Bug 1462614] Re: Atheros bluetooth doesn't find the devices
** Also affects: linux-firmware (Ubuntu) Importance: Undecided Status: New ** Changed in: linux-firmware (Ubuntu) Status: New = Confirmed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-firmware in Ubuntu. https://bugs.launchpad.net/bugs/1462614 Title: Atheros bluetooth doesn't find the devices Status in linux-firmware package in Ubuntu: Confirmed Status in linux-lts-utopic package in Ubuntu: In Progress Bug description: I have a laptop Acer v15 with Qualcom Atheros bluetooth and Logitech M557 mouse, which worked well initially. Then after disconnecting the mouse, my bluetooth adapter can't find any bluetooth devices nearby (I've also tried the Samsung s4). This bug is reproducable in Elementary OS 0.3, Ubuntu 15.04 and 14.04, Mint 17.1 and 17. Here are some outputs from terminal: $ lsusb Bus 002 Device 002: ID 8087:8000 Intel Corp. Bus 002 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub Bus 001 Device 002: ID 8087:8008 Intel Corp. Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub Bus 004 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub Bus 003 Device 004: ID 04f2:b474 Chicony Electronics Co., Ltd Bus 003 Device 003: ID 06cb:2970 Synaptics, Inc. Bus 003 Device 002: ID 0bda:0129 Realtek Semiconductor Corp. RTS5129 Card Reader Controller Bus 003 Device 005: ID 0489:e076 Foxconn / Hon Hai Bus 003 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub $ hciconfig hci0: Type: BR/EDR Bus: USB BD Address: C0:38:96:6C:06:7E ACL MTU: 1022:8 SCO MTU: 183:5 UP RUNNING PSCAN ISCAN RX bytes:1725 acl:0 sco:0 events:164 errors:0 TX bytes:3394 acl:0 sco:0 commands:151 errors:0 $ sudo awk -vRS= '/e076/' /sys/kernel/debug/usb/devices T: Bus=03 Lev=01 Prnt=01 Port=09 Cnt=05 Dev#= 5 Spd=12 MxCh= 0 D: Ver= 1.10 Cls=e0(wlcon) Sub=01 Prot=01 MxPS=64 #Cfgs= 1 P: Vendor=0489 ProdID=e076 Rev= 0.01 C:* #Ifs= 2 Cfg#= 1 Atr=e0 MxPwr=100mA I:* If#= 0 Alt= 0 #EPs= 3 Cls=e0(wlcon) Sub=01 Prot=01 Driver=btusb E: Ad=81(I) Atr=03(Int.) MxPS= 16 Ivl=1ms E: Ad=82(I) Atr=02(Bulk) MxPS= 64 Ivl=0ms E: Ad=02(O) Atr=02(Bulk) MxPS= 64 Ivl=0ms I:* If#= 1 Alt= 0 #EPs= 2 Cls=e0(wlcon) Sub=01 Prot=01 Driver=btusb E: Ad=83(I) Atr=01(Isoc) MxPS= 0 Ivl=1ms E: Ad=03(O) Atr=01(Isoc) MxPS= 0 Ivl=1ms I: If#= 1 Alt= 1 #EPs= 2 Cls=e0(wlcon) Sub=01 Prot=01 Driver=btusb E: Ad=83(I) Atr=01(Isoc) MxPS= 9 Ivl=1ms E: Ad=03(O) Atr=01(Isoc) MxPS= 9 Ivl=1ms I: If#= 1 Alt= 2 #EPs= 2 Cls=e0(wlcon) Sub=01 Prot=01 Driver=btusb E: Ad=83(I) Atr=01(Isoc) MxPS= 17 Ivl=1ms E: Ad=03(O) Atr=01(Isoc) MxPS= 17 Ivl=1ms I: If#= 1 Alt= 3 #EPs= 2 Cls=e0(wlcon) Sub=01 Prot=01 Driver=btusb E: Ad=83(I) Atr=01(Isoc) MxPS= 25 Ivl=1ms E: Ad=03(O) Atr=01(Isoc) MxPS= 25 Ivl=1ms I: If#= 1 Alt= 4 #EPs= 2 Cls=e0(wlcon) Sub=01 Prot=01 Driver=btusb E: Ad=83(I) Atr=01(Isoc) MxPS= 33 Ivl=1ms E: Ad=03(O) Atr=01(Isoc) MxPS= 33 Ivl=1ms I: If#= 1 Alt= 5 #EPs= 2 Cls=e0(wlcon) Sub=01 Prot=01 Driver=btusb E: Ad=83(I) Atr=01(Isoc) MxPS= 49 Ivl=1ms E: Ad=03(O) Atr=01(Isoc) MxPS= 49 Ivl=1ms Thanks to @Pilot6 for help with debugging this. Initial question started on askubuntu.com http://askubuntu.com/questions/632589/bluetooth-doesnt-find-the-devices ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-image-3.16.0-38-generic 3.16.0-38.52~14.04.1 ProcVersionSignature: Ubuntu 3.16.0-38.52~14.04.1-generic 3.16.7-ckt10 Uname: Linux 3.16.0-38-generic x86_64 ApportVersion: 2.14.1-0ubuntu3.11 Architecture: amd64 CurrentDesktop: Unity Date: Sat Jun 6 14:38:16 2015 InstallationDate: Installed on 2015-06-06 (0 days ago) InstallationMedia: Ubuntu 14.04.2 LTS Trusty Tahr - Release amd64 (20150218.1) SourcePackage: linux-lts-utopic UpgradeStatus: No upgrade log present (probably fresh install) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-firmware/+bug/1462614/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1466364] Re: Kernel crash on running mercurial clone on a btrfs file system on a SSD Ubuntu 14.04
This issue has occurred on a new installation of Ubuntu 14.04 on a SSD with btrfs filesystem on the full drive. I will try booting with the mainline kernel and update the results here -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1466364 Title: Kernel crash on running mercurial clone on a btrfs file system on a SSD Ubuntu 14.04 Status in linux package in Ubuntu: Incomplete Bug description: On running mercurial commands which add/remove lots of files from the disk (typically hard linked) the following error shows up. Since btrfs doesn't really have a fsck utility not sure what I should be running Jun 18 12:57:27 one kernel: [151416.037158] CPU: 0 PID: 8362 Comm: hg Not tainted 3.13.0-55-generic #92-Ubuntu Jun 18 12:57:27 one kernel: [151416.038376] Hardware name: /DH61WW, BIOS BEH6110H.86A.0035.2012.0112.2206 01/12/2012 Jun 18 12:57:27 one kernel: [151416.039594] task: 880082fd6000 ti: 8801023d2000 task.ti: 8801023d2000 Jun 18 12:57:27 one kernel: [151416.040812] RIP: 0010:[8137287d] [8137287d] memcpy+0xd/0x110 Jun 18 12:57:27 one kernel: [151416.042036] RSP: 0018:8801023d3910 EFLAGS: 00010202 Jun 18 12:57:27 one kernel: [151416.043258] RAX: 880168d67dfe RBX: 009f RCX: 0013 Jun 18 12:57:27 one kernel: [151416.044491] RDX: 0007 RSI: 00050800 RDI: 880168d67dfe Jun 18 12:57:27 one kernel: [151416.045727] RBP: 8801023d3948 R08: 1000 R09: 8801023d3918 Jun 18 12:57:27 one kernel: [151416.046970] R10: R11: 0003 R12: 88008f53bb28 Jun 18 12:57:27 one kernel: [151416.048225] R13: 1600 R14: 880168d67e9d R15: 009f Jun 18 12:57:27 one kernel: [151416.049482] FS: 7fa796d7c740() GS:88021fa0() knlGS: Jun 18 12:57:27 one kernel: [151416.050737] CS: 0010 DS: ES: CR0: 80050033 Jun 18 12:57:27 one kernel: [151416.051994] CR2: 7fa796d9d000 CR3: 00017f6dd000 CR4: 000407f0 Jun 18 12:57:27 one kernel: [151416.053268] Stack: Jun 18 12:57:27 one kernel: [151416.054536] a028049c 1000 88020ebcf800 88020d8273f0 Jun 18 12:57:27 one kernel: [151416.055820] 88017125f640 880193263720 8801023d3a08 Jun 18 12:57:27 one kernel: [151416.057103] a02653dc 3188 1000 Jun 18 12:57:27 one kernel: [151416.058391] Call Trace: Jun 18 12:57:27 one kernel: [151416.059686] [a028049c] ? read_extent_buffer+0xbc/0x110 [btrfs] Jun 18 12:57:27 one kernel: [151416.061114] [a02653dc] btrfs_get_extent+0x91c/0x970 [btrfs] Jun 18 12:57:27 one kernel: [151416.062471] [a027c697] __do_readpage+0x357/0x730 [btrfs] Jun 18 12:57:27 one kernel: [151416.063792] [a0264ac0] ? btrfs_real_readdir+0x5b0/0x5b0 [btrfs] Jun 18 12:57:27 one kernel: [151416.065110] [a027cdf2] __extent_readpages.constprop.41+0x2a2/0x2c0 [btrfs] Jun 18 12:57:27 one kernel: [151416.066441] [a0264ac0] ? btrfs_real_readdir+0x5b0/0x5b0 [btrfs] Jun 18 12:57:27 one kernel: [151416.067756] [a027ec76] extent_readpages+0x1b6/0x1c0 [btrfs] Jun 18 12:57:27 one kernel: [151416.069084] [a0264ac0] ? btrfs_real_readdir+0x5b0/0x5b0 [btrfs] Jun 18 12:57:27 one kernel: [151416.070385] [81197dc3] ? alloc_pages_current+0xa3/0x160 Jun 18 12:57:27 one kernel: [151416.071699] [a0262c1f] btrfs_readpages+0x1f/0x30 [btrfs] Jun 18 12:57:27 one kernel: [151416.072969] [8115bb99] __do_page_cache_readahead+0x1b9/0x260 Jun 18 12:57:27 one kernel: [151416.074213] [8115c072] ondemand_readahead+0x152/0x2a0 Jun 18 12:57:27 one kernel: [151416.075455] [8117ecc8] ? __vma_link_rb+0xb8/0xe0 Jun 18 12:57:27 one kernel: [151416.076694] [8115c1f1] page_cache_sync_readahead+0x31/0x50 Jun 18 12:57:27 one kernel: [151416.077930] [81151cb5] generic_file_aio_read+0x4c5/0x700 Jun 18 12:57:27 one kernel: [151416.079243] [81180f93] ? mmap_region+0x163/0x600 Jun 18 12:57:27 one kernel: [151416.080603] [811bda1a] do_sync_read+0x5a/0x90 Jun 18 12:57:27 one kernel: [151416.081825] [811be0b5] vfs_read+0x95/0x160 Jun 18 12:57:27 one kernel: [151416.083037] [811bebc9] SyS_read+0x49/0xa0 Jun 18 12:57:27 one kernel: [151416.084231] [81733d5d] system_call_fastpath+0x1a/0x1f Jun 18 12:57:27 one kernel: [151416.085408] Code: 43 4e 5b 5d c3 66 0f 1f 84 00 00 00 00 00 e8 fb fb ff ff eb e2 90 90 90 90 90 90 90 90 90 48 89 f8 48 89 d1 48 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 c3 20 4c 8b 06 4c 8b 4e 08 4c 8b 56 10 4c Jun 18 12:57:27 one kernel: [151416.088027] RIP [8137287d]
[Kernel-packages] [Bug 1394368] Re: Bluetooth with AR9462 doesn't work (New ID /Firmware)
Let's wait till it gets into mainline kernel, it may be soon to 4.1. Then you will test it and then I will report it to kernel maintainers if it persists. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1394368 Title: Bluetooth with AR9462 doesn't work (New ID /Firmware) Status in linux package in Ubuntu: In Progress Status in linux-firmware package in Ubuntu: Confirmed Bug description: This is (kind of) a duplicate of: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1024884 (please read) I can't use Bluetooth with my AR9462 WLAN/BT-Combo. In the link above, it has been fixed, but not for my Adapter ID/Firmware: System: Ubuntu 14.10 utopic 64bit - 3.16.0-24-generic x86_64 lspci -nnk 02:00.0 Network controller [0280]: Qualcomm Atheros AR9462 Wireless Network Adapter [168c:0034] (rev 01) Subsystem: Lite-On Communications Inc Device [11ad:0802] Kernel driver in use: ath9k lsusb (identified Bluetooth Device) Bus 002 Device 003: ID 04ca:300d Lite-On Technology Corp. ath9k.conf options ath9k btcoex_enable=1 The 04ca:300d ID is not in the Kernel, so i added it via dkms. I took ath3k.c and btusb.c out of the 3.16.0-24-generic source files and changed them: diff -urN ./linux-3.16.0/drivers/bluetooth/ath3k.c /usr/src/ar9462-1.5.1/ath3k.c --- ./linux-3.16.0/drivers/bluetooth/ath3k.c 2014-08-04 00:25:02.0 +0200 +++ /usr/src/ar9462-1.5.1/ath3k.c 2014-11-19 21:12:46.646265890 +0100 @@ -85,6 +85,7 @@ { USB_DEVICE(0x04CA, 0x3007) }, { USB_DEVICE(0x04CA, 0x3008) }, { USB_DEVICE(0x04CA, 0x300b) }, + { USB_DEVICE(0x04CA, 0x300d) }, { USB_DEVICE(0x0930, 0x0219) }, { USB_DEVICE(0x0930, 0x0220) }, { USB_DEVICE(0x0b05, 0x17d0) }, @@ -134,6 +135,7 @@ { USB_DEVICE(0x04ca, 0x3007), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x04ca, 0x3008), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x04ca, 0x300b), .driver_info = BTUSB_ATH3012 }, + { USB_DEVICE(0x04ca, 0x300d), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x0930, 0x0219), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x0930, 0x0220), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x0b05, 0x17d0), .driver_info = BTUSB_ATH3012 }, diff -urN ./linux-3.16.0/drivers/bluetooth/btusb.c /usr/src/ar9462-1.5.1/btusb.c --- ./linux-3.16.0/drivers/bluetooth/btusb.c 2014-08-04 00:25:02.0 +0200 +++ /usr/src/ar9462-1.5.1/btusb.c 2014-11-19 21:12:46.646265890 +0100 @@ -157,6 +157,7 @@ { USB_DEVICE(0x04ca, 0x3007), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x04ca, 0x3008), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x04ca, 0x300b), .driver_info = BTUSB_ATH3012 }, + { USB_DEVICE(0x04ca, 0x300d), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x0930, 0x0219), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x0930, 0x0220), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x0b05, 0x17d0), .driver_info = BTUSB_ATH3012 }, sudo dkms add -m ar9462 -v 1.5.1 sudo dkms build -m ar9462 -v 1.5.1 sudo dkms install -m ar9462 -v 1.5.1 (DKMS package in the same style/versioning as in the bug report above) dkms status ar9462, 1.5.1, 3.16.0-24-generic, x86_64: installed Now the new output: dmesg | egrep 'ath3|ar3|Bluet' [2.787819] Bluetooth: Core ver 2.19 [2.787833] Bluetooth: HCI device and connection manager initialized [2.787839] Bluetooth: HCI socket layer initialized [2.787842] Bluetooth: L2CAP socket layer initialized [2.787848] Bluetooth: SCO socket layer initialized [2.793551] Bluetooth: BNEP (Ethernet Emulation) ver 1.3 [2.793554] Bluetooth: BNEP filters: protocol multicast [2.793561] Bluetooth: BNEP socket layer initialized [3.130779] Bluetooth: Patch file not found ar3k/AthrBT_0x11020100.dfu [3.130783] Bluetooth: Loading patch file failed [3.130788] ath3k: probe of 2-5:1.0 failed with error -12 [3.130823] usbcore: registered new interface driver ath3k [9.776503] Bluetooth: RFCOMM TTY layer initialized [9.776512] Bluetooth: RFCOMM socket layer initialized [9.776517] Bluetooth: RFCOMM ver 1.11 My patch works, but just like in the bug report above, a Firmware file is missing: AthrBT_0x11020100.dfu I found it neither in linux-firmware (http://git.kernel.org/cgit/linux/kernel/git/firmware/linux-firmware.git/tree/ar3k) nor elsewhere. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1394368/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1466349] Re: linux-lts-trusty: 3.13.0-55.94~precise1 -proposed tracker
** Changed in: kernel-sru-workflow/verification-testing Status: New = In Progress ** Changed in: kernel-sru-workflow/certification-testing Status: New = Confirmed ** Changed in: kernel-sru-workflow/regression-testing Status: New = Confirmed ** Description changed: This bug is for tracking the 3.13.0-55.94~precise1 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Thursday, 18. June 2015 07:02 UTC kernel-stable-master-bug:1466237 kernel-stable-Security-signoff-end:Thursday, 18. June 2015 13:32 UTC - kernel-stable-phase:CopyToProposed kernel-stable-Prepare-package-end:Thursday, 18. June 2015 16:23 UTC kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 16:23 UTC - kernel-stable-phase-changed:Thursday, 18. June 2015 16:23 UTC kernel-stable-Promote-to-proposed-end:Thursday, 18. June 2015 17:01 UTC + kernel-stable-phase:Verification Testing + kernel-stable-phase-changed:Thursday, 18. June 2015 18:01 UTC + kernel-stable-Verification-testing-start:Thursday, 18. June 2015 18:01 UTC + kernel-stable-Certification-testing-start:Thursday, 18. June 2015 18:01 UTC + proposed-announcement-sent:True + kernel-stable-Regression-testing-start:Thursday, 18. June 2015 18:01 UTC -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-lts-trusty in Ubuntu. https://bugs.launchpad.net/bugs/1466349 Title: linux-lts-trusty: 3.13.0-55.94~precise1 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: Confirmed Status in Kernel SRU Workflow package-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Invalid Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Confirmed Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: In Progress Status in linux-lts-trusty package in Ubuntu: Invalid Status in linux-lts-trusty source package in Precise: New Bug description: This bug is for tracking the 3.13.0-55.94~precise1 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Thursday, 18. June 2015 07:02 UTC kernel-stable-master-bug:1466237 kernel-stable-Security-signoff-end:Thursday, 18. June 2015 13:32 UTC kernel-stable-Prepare-package-end:Thursday, 18. June 2015 16:23 UTC kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 16:23 UTC kernel-stable-Promote-to-proposed-end:Thursday, 18. June 2015 17:01 UTC kernel-stable-phase:Verification Testing kernel-stable-phase-changed:Thursday, 18. June 2015 18:01 UTC kernel-stable-Verification-testing-start:Thursday, 18. June 2015 18:01 UTC kernel-stable-Certification-testing-start:Thursday, 18. June 2015 18:01 UTC proposed-announcement-sent:True kernel-stable-Regression-testing-start:Thursday, 18. June 2015 18:01 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1466349/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1465755] Re: linux: 3.19.0-22.22 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-proposed Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Chris J Arges (arges) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1465755 Title: linux: 3.19.0-22.22 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: New Status in Kernel SRU Workflow package-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Confirmed Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: New Status in Kernel SRU Workflow verification-testing series: New Status in linux package in Ubuntu: Invalid Status in linux source package in Vivid: New Bug description: This bug is for tracking the 3.19.0-22.22 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 16. June 2015 16:18 UTC kernel-stable-phase:CopyToProposed kernel-stable-Prepare-package-end:Wednesday, 17. June 2015 02:02 UTC kernel-stable-Promote-to-proposed-start:Wednesday, 17. June 2015 02:02 UTC kernel-stable-phase-changed:Wednesday, 17. June 2015 02:02 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1465755/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1394368] Re: Bluetooth with AR9462 doesn't work (New ID /Firmware)
@Wallcom Does it work with patched bt? You mentioned in https://bugs.launchpad.net/ubuntu/+source/linux- firmware/+bug/1394368/comments/4 that it does. I will send the patch upsteram and it will get into stable kernels. But firmware should be installed either way. Only firmware won't work. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-firmware in Ubuntu. https://bugs.launchpad.net/bugs/1394368 Title: Bluetooth with AR9462 doesn't work (New ID /Firmware) Status in linux-firmware package in Ubuntu: Incomplete Bug description: This is (kind of) a duplicate of: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1024884 (please read) I can't use Bluetooth with my AR9462 WLAN/BT-Combo. In the link above, it has been fixed, but not for my Adapter ID/Firmware: System: Ubuntu 14.10 utopic 64bit - 3.16.0-24-generic x86_64 lspci -nnk 02:00.0 Network controller [0280]: Qualcomm Atheros AR9462 Wireless Network Adapter [168c:0034] (rev 01) Subsystem: Lite-On Communications Inc Device [11ad:0802] Kernel driver in use: ath9k lsusb (identified Bluetooth Device) Bus 002 Device 003: ID 04ca:300d Lite-On Technology Corp. ath9k.conf options ath9k btcoex_enable=1 The 04ca:300d ID is not in the Kernel, so i added it via dkms. I took ath3k.c and btusb.c out of the 3.16.0-24-generic source files and changed them: diff -urN ./linux-3.16.0/drivers/bluetooth/ath3k.c /usr/src/ar9462-1.5.1/ath3k.c --- ./linux-3.16.0/drivers/bluetooth/ath3k.c 2014-08-04 00:25:02.0 +0200 +++ /usr/src/ar9462-1.5.1/ath3k.c 2014-11-19 21:12:46.646265890 +0100 @@ -85,6 +85,7 @@ { USB_DEVICE(0x04CA, 0x3007) }, { USB_DEVICE(0x04CA, 0x3008) }, { USB_DEVICE(0x04CA, 0x300b) }, + { USB_DEVICE(0x04CA, 0x300d) }, { USB_DEVICE(0x0930, 0x0219) }, { USB_DEVICE(0x0930, 0x0220) }, { USB_DEVICE(0x0b05, 0x17d0) }, @@ -134,6 +135,7 @@ { USB_DEVICE(0x04ca, 0x3007), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x04ca, 0x3008), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x04ca, 0x300b), .driver_info = BTUSB_ATH3012 }, + { USB_DEVICE(0x04ca, 0x300d), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x0930, 0x0219), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x0930, 0x0220), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x0b05, 0x17d0), .driver_info = BTUSB_ATH3012 }, diff -urN ./linux-3.16.0/drivers/bluetooth/btusb.c /usr/src/ar9462-1.5.1/btusb.c --- ./linux-3.16.0/drivers/bluetooth/btusb.c 2014-08-04 00:25:02.0 +0200 +++ /usr/src/ar9462-1.5.1/btusb.c 2014-11-19 21:12:46.646265890 +0100 @@ -157,6 +157,7 @@ { USB_DEVICE(0x04ca, 0x3007), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x04ca, 0x3008), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x04ca, 0x300b), .driver_info = BTUSB_ATH3012 }, + { USB_DEVICE(0x04ca, 0x300d), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x0930, 0x0219), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x0930, 0x0220), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x0b05, 0x17d0), .driver_info = BTUSB_ATH3012 }, sudo dkms add -m ar9462 -v 1.5.1 sudo dkms build -m ar9462 -v 1.5.1 sudo dkms install -m ar9462 -v 1.5.1 (DKMS package in the same style/versioning as in the bug report above) dkms status ar9462, 1.5.1, 3.16.0-24-generic, x86_64: installed Now the new output: dmesg | egrep 'ath3|ar3|Bluet' [2.787819] Bluetooth: Core ver 2.19 [2.787833] Bluetooth: HCI device and connection manager initialized [2.787839] Bluetooth: HCI socket layer initialized [2.787842] Bluetooth: L2CAP socket layer initialized [2.787848] Bluetooth: SCO socket layer initialized [2.793551] Bluetooth: BNEP (Ethernet Emulation) ver 1.3 [2.793554] Bluetooth: BNEP filters: protocol multicast [2.793561] Bluetooth: BNEP socket layer initialized [3.130779] Bluetooth: Patch file not found ar3k/AthrBT_0x11020100.dfu [3.130783] Bluetooth: Loading patch file failed [3.130788] ath3k: probe of 2-5:1.0 failed with error -12 [3.130823] usbcore: registered new interface driver ath3k [9.776503] Bluetooth: RFCOMM TTY layer initialized [9.776512] Bluetooth: RFCOMM socket layer initialized [9.776517] Bluetooth: RFCOMM ver 1.11 My patch works, but just like in the bug report above, a Firmware file is missing: AthrBT_0x11020100.dfu I found it neither in linux-firmware (http://git.kernel.org/cgit/linux/kernel/git/firmware/linux-firmware.git/tree/ar3k) nor elsewhere. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-firmware/+bug/1394368/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1466250] Re: linux: 3.16.0-41.57 -proposed tracker
** Description changed: This bug is for tracking the 3.16.0-41.57 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Wednesday, 17. June 2015 23:34 UTC kernel-stable-phase:CopyToProposed kernel-stable-Prepare-package-end:Thursday, 18. June 2015 17:19 UTC kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 17:19 UTC kernel-stable-phase-changed:Thursday, 18. June 2015 17:19 UTC + kernel-stable-Promote-to-proposed-end:Thursday, 18. June 2015 17:22 UTC + kernel-stable-Security-signoff-end:Thursday, 18. June 2015 17:22 UTC -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1466250 Title: linux: 3.16.0-41.57 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: New Status in Kernel SRU Workflow package-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Invalid Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: New Status in linux package in Ubuntu: Invalid Status in linux source package in Utopic: New Bug description: This bug is for tracking the 3.16.0-41.57 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Wednesday, 17. June 2015 23:34 UTC kernel-stable-phase:CopyToProposed kernel-stable-Prepare-package-end:Thursday, 18. June 2015 17:19 UTC kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 17:19 UTC kernel-stable-phase-changed:Thursday, 18. June 2015 17:19 UTC kernel-stable-Promote-to-proposed-end:Thursday, 18. June 2015 17:22 UTC kernel-stable-Security-signoff-end:Thursday, 18. June 2015 17:22 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1466250/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1466250] Re: linux: 3.16.0-41.57 -proposed tracker
All builds are complete, packages in this bug can be copied to -proposed. Backport packages from packages here can be worked on, the following tracking bugs were opened for them: linux-lts-utopic (14.04.1) - bug 1466591 ** Changed in: kernel-sru-workflow/prepare-package Status: New = Fix Released ** Changed in: kernel-sru-workflow/prepare-package Assignee: Canonical Kernel Team (canonical-kernel-team) = Brad Figg (brad-figg) ** Changed in: kernel-sru-workflow/promote-to-proposed Status: New = Confirmed ** Changed in: kernel-sru-workflow/package-testing Status: New = Confirmed ** Description changed: This bug is for tracking the 3.16.0-41.57 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Wednesday, 17. June 2015 23:34 UTC - kernel-stable-phase:Prepare - kernel-stable-phase-changed:Wednesday, 17. June 2015 23:34 UTC + kernel-stable-phase:CopyToProposed + kernel-stable-Prepare-package-end:Thursday, 18. June 2015 17:19 UTC + kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 17:19 UTC + kernel-stable-phase-changed:Thursday, 18. June 2015 17:19 UTC -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1466250 Title: linux: 3.16.0-41.57 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: New Status in Kernel SRU Workflow package-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Invalid Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: New Status in linux package in Ubuntu: Invalid Status in linux source package in Utopic: New Bug description: This bug is for tracking the 3.16.0-41.57 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Wednesday, 17. June 2015 23:34 UTC kernel-stable-phase:CopyToProposed kernel-stable-Prepare-package-end:Thursday, 18. June 2015 17:19 UTC kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 17:19 UTC kernel-stable-phase-changed:Thursday, 18. June 2015 17:19 UTC kernel-stable-Promote-to-proposed-end:Thursday, 18. June 2015 17:22 UTC kernel-stable-Security-signoff-end:Thursday, 18. June 2015 17:22 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1466250/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1394368] Re: Bluetooth with AR9462 doesn't work (New ID /Firmware)
Patch has been sent and already applied to bluetooth-next. It should appear in kernel 4.2 and then be backported to all Ubuntu supported kernels. https://lkml.org/lkml/2015/6/18/596 ** Changed in: linux-firmware (Ubuntu) Assignee: Chris J Arges (arges) = Pilot6 (hanipouspilot) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-firmware in Ubuntu. https://bugs.launchpad.net/bugs/1394368 Title: Bluetooth with AR9462 doesn't work (New ID /Firmware) Status in linux-firmware package in Ubuntu: Incomplete Bug description: This is (kind of) a duplicate of: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1024884 (please read) I can't use Bluetooth with my AR9462 WLAN/BT-Combo. In the link above, it has been fixed, but not for my Adapter ID/Firmware: System: Ubuntu 14.10 utopic 64bit - 3.16.0-24-generic x86_64 lspci -nnk 02:00.0 Network controller [0280]: Qualcomm Atheros AR9462 Wireless Network Adapter [168c:0034] (rev 01) Subsystem: Lite-On Communications Inc Device [11ad:0802] Kernel driver in use: ath9k lsusb (identified Bluetooth Device) Bus 002 Device 003: ID 04ca:300d Lite-On Technology Corp. ath9k.conf options ath9k btcoex_enable=1 The 04ca:300d ID is not in the Kernel, so i added it via dkms. I took ath3k.c and btusb.c out of the 3.16.0-24-generic source files and changed them: diff -urN ./linux-3.16.0/drivers/bluetooth/ath3k.c /usr/src/ar9462-1.5.1/ath3k.c --- ./linux-3.16.0/drivers/bluetooth/ath3k.c 2014-08-04 00:25:02.0 +0200 +++ /usr/src/ar9462-1.5.1/ath3k.c 2014-11-19 21:12:46.646265890 +0100 @@ -85,6 +85,7 @@ { USB_DEVICE(0x04CA, 0x3007) }, { USB_DEVICE(0x04CA, 0x3008) }, { USB_DEVICE(0x04CA, 0x300b) }, + { USB_DEVICE(0x04CA, 0x300d) }, { USB_DEVICE(0x0930, 0x0219) }, { USB_DEVICE(0x0930, 0x0220) }, { USB_DEVICE(0x0b05, 0x17d0) }, @@ -134,6 +135,7 @@ { USB_DEVICE(0x04ca, 0x3007), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x04ca, 0x3008), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x04ca, 0x300b), .driver_info = BTUSB_ATH3012 }, + { USB_DEVICE(0x04ca, 0x300d), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x0930, 0x0219), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x0930, 0x0220), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x0b05, 0x17d0), .driver_info = BTUSB_ATH3012 }, diff -urN ./linux-3.16.0/drivers/bluetooth/btusb.c /usr/src/ar9462-1.5.1/btusb.c --- ./linux-3.16.0/drivers/bluetooth/btusb.c 2014-08-04 00:25:02.0 +0200 +++ /usr/src/ar9462-1.5.1/btusb.c 2014-11-19 21:12:46.646265890 +0100 @@ -157,6 +157,7 @@ { USB_DEVICE(0x04ca, 0x3007), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x04ca, 0x3008), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x04ca, 0x300b), .driver_info = BTUSB_ATH3012 }, + { USB_DEVICE(0x04ca, 0x300d), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x0930, 0x0219), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x0930, 0x0220), .driver_info = BTUSB_ATH3012 }, { USB_DEVICE(0x0b05, 0x17d0), .driver_info = BTUSB_ATH3012 }, sudo dkms add -m ar9462 -v 1.5.1 sudo dkms build -m ar9462 -v 1.5.1 sudo dkms install -m ar9462 -v 1.5.1 (DKMS package in the same style/versioning as in the bug report above) dkms status ar9462, 1.5.1, 3.16.0-24-generic, x86_64: installed Now the new output: dmesg | egrep 'ath3|ar3|Bluet' [2.787819] Bluetooth: Core ver 2.19 [2.787833] Bluetooth: HCI device and connection manager initialized [2.787839] Bluetooth: HCI socket layer initialized [2.787842] Bluetooth: L2CAP socket layer initialized [2.787848] Bluetooth: SCO socket layer initialized [2.793551] Bluetooth: BNEP (Ethernet Emulation) ver 1.3 [2.793554] Bluetooth: BNEP filters: protocol multicast [2.793561] Bluetooth: BNEP socket layer initialized [3.130779] Bluetooth: Patch file not found ar3k/AthrBT_0x11020100.dfu [3.130783] Bluetooth: Loading patch file failed [3.130788] ath3k: probe of 2-5:1.0 failed with error -12 [3.130823] usbcore: registered new interface driver ath3k [9.776503] Bluetooth: RFCOMM TTY layer initialized [9.776512] Bluetooth: RFCOMM socket layer initialized [9.776517] Bluetooth: RFCOMM ver 1.11 My patch works, but just like in the bug report above, a Firmware file is missing: AthrBT_0x11020100.dfu I found it neither in linux-firmware (http://git.kernel.org/cgit/linux/kernel/git/firmware/linux-firmware.git/tree/ar3k) nor elsewhere. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-firmware/+bug/1394368/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1466591] Re: linux-lts-utopic: 3.16.0-41.57~14.04.1 -proposed tracker
Security Sign-off: This kernel is a 1-commit respin for a regression from a security update. ** Changed in: linux-lts-utopic (Ubuntu) Status: New = Invalid ** Changed in: kernel-sru-workflow/security-signoff Status: New = Fix Released ** Changed in: kernel-sru-workflow/security-signoff Assignee: Canonical Security Team (canonical-security) = Adam Conrad (adconrad) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-lts-utopic in Ubuntu. https://bugs.launchpad.net/bugs/1466591 Title: linux-lts-utopic: 3.16.0-41.57~14.04.1 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: New Status in Kernel SRU Workflow package-testing series: New Status in Kernel SRU Workflow prepare-package series: New Status in Kernel SRU Workflow prepare-package-meta series: Invalid Status in Kernel SRU Workflow prepare-package-signed series: New Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: New Status in linux-lts-utopic package in Ubuntu: Invalid Status in linux-lts-utopic source package in Trusty: New Bug description: This bug is for tracking the 3.16.0-41.57~14.04.1 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Thursday, 18. June 2015 17:17 UTC kernel-stable-phase:Prepare kernel-stable-phase-changed:Thursday, 18. June 2015 17:17 UTC kernel-stable-master-bug:1466250 To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1466591/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1246981] Re: Bluetooth mouse fails to re-connect after sleep.
** Changed in: bluez (Ubuntu) Status: Invalid = Confirmed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to bluez in Ubuntu. https://bugs.launchpad.net/bugs/1246981 Title: Bluetooth mouse fails to re-connect after sleep. Status in bluez package in Ubuntu: Confirmed Bug description: This exact harware was working faultlessly in 13.04. Since re- installing at 13.10 the mouse consistently failes to reconnect after the device either hybernates or ever goes to screen saver sleep. I have to remove the dive and re-add it each time (which works well). There are other issues with the bluetooth stack as well in that I have not found any way to use bluetooth tethering to my mobile which again worked well and was easy to configure in 13.04 Peter. ProblemType: Bug DistroRelease: Ubuntu 13.10 Package: bluetooth 4.101-0ubuntu8b1 ProcVersionSignature: Ubuntu 3.11.0-12.19-generic 3.11.3 Uname: Linux 3.11.0-12-generic x86_64 NonfreeKernelModules: nvidia ApportVersion: 2.12.5-0ubuntu2.1 Architecture: amd64 Date: Fri Nov 1 16:44:37 2013 InstallationDate: Installed on 2013-10-19 (13 days ago) InstallationMedia: Kubuntu 13.10 Saucy Salamander - Release amd64 (20131016.1) InterestingModules: bnep rfcomm btusb bluetooth MachineType: Dell Inc. Latitude E6530 MarkForUpload: True PackageArchitecture: all ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.11.0-12-generic root=UUID=8283de78-9264-42bf-a8b4-25643fa1475f ro quiet splash SourcePackage: bluez UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 12/13/2012 dmi.bios.vendor: Dell Inc. dmi.bios.version: A09 dmi.board.name: 07Y85M dmi.board.vendor: Dell Inc. dmi.board.version: A01 dmi.chassis.type: 9 dmi.chassis.vendor: Dell Inc. dmi.modalias: dmi:bvnDellInc.:bvrA09:bd12/13/2012:svnDellInc.:pnLatitudeE6530:pvr01:rvnDellInc.:rn07Y85M:rvrA01:cvnDellInc.:ct9:cvr: dmi.product.name: Latitude E6530 dmi.product.version: 01 dmi.sys.vendor: Dell Inc. hciconfig: hci0:Type: BR/EDR Bus: USB BD Address: 20:16:D8:9C:38:E5 ACL MTU: 1021:8 SCO MTU: 64:1 UP RUNNING PSCAN ISCAN RX bytes:1817731 acl:117432 sco:0 events:5271 errors:0 TX bytes:37955 acl:131 sco:0 commands:5096 errors:0 syslog: Nov 1 14:50:19 pnunn-Latitude-E6530 bluetoothd[1015]: Discovery session 0x7f6489f7b450 with :1.582 activated Nov 1 14:50:25 pnunn-Latitude-E6530 bluetoothd[1015]: Unknown command complete for opcode 37 Nov 1 14:50:28 pnunn-Latitude-E6530 bluetoothd[1015]: Stopping discovery Nov 1 14:50:36 pnunn-Latitude-E6530 kernel: [60934.211132] input: Microsoft Bluetooth Notebook Mouse 5000 as /devices/pci:00/:00:1a.0/usb1/1-1/1-1.4/1-1.4:1.0/bluetooth/hci0/hci0:11/input29 Nov 1 14:50:36 pnunn-Latitude-E6530 kernel: [60934.211646] hid-generic 0005:045E:0700.000C: input,hidraw3: BLUETOOTH HID v1.00 Mouse [Microsoft Bluetooth Notebook Mouse 5000] on 20:16:d8:9c:38:e5 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/bluez/+bug/1246981/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1338706] Re: Samsung SSD 840 failed to get NCQ Send/Recv Log Emask 0x1 failed to set xfermode (err_mask=0x40) on upstream kernels = 3.12
** Changed in: linux (Ubuntu Wily) Status: Invalid = Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1338706 Title: Samsung SSD 840 failed to get NCQ Send/Recv Log Emask 0x1 failed to set xfermode (err_mask=0x40) on upstream kernels = 3.12 Status in linux package in Ubuntu: Fix Committed Status in linux source package in Trusty: Fix Committed Status in linux source package in Utopic: Fix Committed Status in linux source package in Vivid: Fix Committed Status in linux source package in Wily: Fix Committed Bug description: [Impact] * Users with Samsung 8** SSD drives see miscellaneous errors and warning messages in the logs depending on the firmware level of the drive while booting or after running trim. [Test Case] * Run this script, and then check logs for errors. #!/bin/bash git clone git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git for i in {0..10} ; do cp -r linux linux$i done rm -rf linux* echo sudo fstrim requires your password sudo fstrim ./ [Regression Potential] * There is very little regression potential as this change simply prevents NCQ trim from being used on Samsung 8** drives. [Other Info] * Commit is upstream. * Greatly increasing the timeout for the drives seems to relieve the timeout errors. This may be due to trimming large numbers of sectors with single commands. It may be prudent for future upstream to break up large trims into multiple requests on smaller regions. ===Original Bug description == Samsung SSD 840 Series failed to get NCQ Send/Recv Log Emask 0x1. ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-30-generic 3.13.0-30.55 ProcVersionSignature: Ubuntu 3.13.0-30.55-generic 3.13.11.2 Uname: Linux 3.13.0-30-generic x86_64 ApportVersion: 2.14.1-0ubuntu3.2 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: user 2131 F pulseaudio CurrentDesktop: Unity Date: Mon Jul 7 20:01:28 2014 HibernationDevice: RESUME=UUID=685afcb7-7aa6-4048-af15-091d3bcd3b35 InstallationDate: Installed on 2014-06-22 (14 days ago) InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Release amd64 (20140417) IwConfig: eth0 no wireless extensions. lono wireless extensions. MachineType: System manufacturer System Product Name ProcFB: 0 nouveaufb ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.13.0-30-generic root=UUID=d7c2e1cb-d046-460c-83b8-0cfbb330d095 ro quiet splash vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-3.13.0-30-generic N/A linux-backports-modules-3.13.0-30-generic N/A linux-firmware 1.127.4 RfKill: SourcePackage: linux UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 09/10/2010 dmi.bios.vendor: American Megatrends Inc. dmi.bios.version: 0901 dmi.board.asset.tag: To Be Filled By O.E.M. dmi.board.name: M3N78-EM dmi.board.vendor: ASUSTeK Computer INC. dmi.board.version: Rev X.0x dmi.chassis.asset.tag: Asset-1234567890 dmi.chassis.type: 3 dmi.chassis.vendor: Chassis Manufacture dmi.chassis.version: Chassis Version dmi.modalias: dmi:bvnAmericanMegatrendsInc.:bvr0901:bd09/10/2010:svnSystemmanufacturer:pnSystemProductName:pvrSystemVersion:rvnASUSTeKComputerINC.:rnM3N78-EM:rvrRevX.0x:cvnChassisManufacture:ct3:cvrChassisVersion: dmi.product.name: System Product Name dmi.product.version: System Version dmi.sys.vendor: System manufacturer To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1338706/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1354975] Re: iwlwifi Intel 7260 Wifi disconnects
https://wireless.wiki.kernel.org/en/users/drivers/iwlwifi/core_release -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-firmware in Ubuntu. https://bugs.launchpad.net/bugs/1354975 Title: iwlwifi Intel 7260 Wifi disconnects Status in Unity Linux: New Status in linux-firmware package in Ubuntu: Fix Released Bug description: I experience frequent disconnects and auth issues, never more than 30 minutes without a disconnect. Sometimes dozens of disconnects in a few minutes. This happens with the default 7260-8 firmware. Tried replacing the -8 with -9 ucode. Failed to load due to API version. This loaded the -7 driver which seems to be more stable. Tested against 2.4ghz APs (Apple, Netgear, Linksys). ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-32-generic 3.13.0-32.57 ProcVersionSignature: Ubuntu 3.13.0-32.57-generic 3.13.11.4 Uname: Linux 3.13.0-32-generic x86_64 ApportVersion: 2.14.1-0ubuntu3.3 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: steve 2577 F pulseaudio /dev/snd/controlC1: steve 2577 F pulseaudio CurrentDesktop: Unity Date: Sun Aug 10 17:49:06 2014 HibernationDevice: RESUME=UUID=374a0c1c-4ac2-456b-a67e-9ea54fe11fe6 InstallationDate: Installed on 2013-12-28 (225 days ago) InstallationMedia: Ubuntu 13.10 Saucy Salamander - Release amd64 (20131016.1) MachineType: Dell Inc. XPS 12-9Q33 ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-32-generic root=UUID=58deb355-7a09-440b-ade2-69a84fd74460 ro ipv6.disable=1 quiet splash vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-3.13.0-32-generic N/A linux-backports-modules-3.13.0-32-generic N/A linux-firmware 1.127.5 SourcePackage: linux UpgradeStatus: Upgraded to trusty on 2014-07-06 (35 days ago) dmi.bios.date: 05/06/2013 dmi.bios.vendor: Dell Inc. dmi.bios.version: A00 dmi.board.name: XPS 12-9Q33 dmi.board.vendor: Dell Inc. dmi.board.version: A00 dmi.chassis.type: 8 dmi.chassis.vendor: Dell Inc. dmi.chassis.version: Not Specified dmi.modalias: dmi:bvnDellInc.:bvrA00:bd05/06/2013:svnDellInc.:pnXPS12-9Q33:pvrA00:rvnDellInc.:rnXPS12-9Q33:rvrA00:cvnDellInc.:ct8:cvrNotSpecified: dmi.product.name: XPS 12-9Q33 dmi.product.version: A00 dmi.sys.vendor: Dell Inc. To manage notifications about this bug go to: https://bugs.launchpad.net/unitylinux/+bug/1354975/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1465755] Re: linux: 3.19.0-22.22 -proposed tracker
** Changed in: kernel-sru-workflow/verification-testing Status: New = In Progress ** Changed in: kernel-sru-workflow/certification-testing Status: New = Confirmed ** Changed in: kernel-sru-workflow/regression-testing Status: New = Confirmed ** Changed in: kernel-sru-workflow/security-signoff Status: New = Confirmed ** Description changed: This bug is for tracking the 3.19.0-22.22 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 16. June 2015 16:18 UTC - kernel-stable-phase:CopyToProposed kernel-stable-Prepare-package-end:Wednesday, 17. June 2015 02:02 UTC kernel-stable-Promote-to-proposed-start:Wednesday, 17. June 2015 02:02 UTC - kernel-stable-phase-changed:Wednesday, 17. June 2015 02:02 UTC kernel-stable-Promote-to-proposed-end:Thursday, 18. June 2015 18:59 UTC + kernel-stable-phase:Verification Testing + kernel-stable-phase-changed:Thursday, 18. June 2015 20:00 UTC + kernel-stable-Verification-testing-start:Thursday, 18. June 2015 20:00 UTC + kernel-stable-Certification-testing-start:Thursday, 18. June 2015 20:00 UTC + kernel-stable-Security-signoff-start:Thursday, 18. June 2015 20:00 UTC + proposed-announcement-sent:True + kernel-stable-Regression-testing-start:Thursday, 18. June 2015 20:00 UTC -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1465755 Title: linux: 3.19.0-22.22 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: Confirmed Status in Kernel SRU Workflow package-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Confirmed Status in Kernel SRU Workflow security-signoff series: Confirmed Status in Kernel SRU Workflow verification-testing series: In Progress Status in linux package in Ubuntu: Invalid Status in linux source package in Vivid: New Bug description: This bug is for tracking the 3.19.0-22.22 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 16. June 2015 16:18 UTC kernel-stable-Prepare-package-end:Wednesday, 17. June 2015 02:02 UTC kernel-stable-Promote-to-proposed-start:Wednesday, 17. June 2015 02:02 UTC kernel-stable-Promote-to-proposed-end:Thursday, 18. June 2015 18:59 UTC kernel-stable-phase:Verification Testing kernel-stable-phase-changed:Thursday, 18. June 2015 20:00 UTC kernel-stable-Verification-testing-start:Thursday, 18. June 2015 20:00 UTC kernel-stable-Certification-testing-start:Thursday, 18. June 2015 20:00 UTC kernel-stable-Security-signoff-start:Thursday, 18. June 2015 20:00 UTC proposed-announcement-sent:True kernel-stable-Regression-testing-start:Thursday, 18. June 2015 20:00 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1465755/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1459934] Re: Support bluetooth device 0cf3:e006
This bug was fixed in the package linux - 3.19.0-22.22 --- linux (3.19.0-22.22) vivid; urgency=low [ Brad Figg ] * Release Tracking Bug - LP: #1465755 [ Tai Nguyen ] * SAUCE: power: reset: Add syscon reboot device node for APM X-Gene platform - LP: #1463211 [ Upstream Kernel Changes ] * Revert dm crypt: fix deadlock when async crypto algorithm returns -EBUSY - LP: #1465696 * Bluetooth: ath3k: Add a new ID 0cf3:e006 to ath3k list - LP: #1459934 * cdc-acm: prevent infinite loop when parsing CDC headers. - LP: #1460657 * (upstream) libata: Blacklist queued TRIM on all Samsung 800-series - LP: #1338706, #1449005 * powerpc/powernv: Check image loaded or not before calling flash - LP: #1461553 * ahci: avoton port-disable reset-quirk - LP: #1458617 * Bluetooth: btusb: support public address configuration for ath3012 - LP: #1459937 * Bluetooth: btusb: Add setup callback for chip init on USB - LP: #1459937 * Bluetooth: btusb: Add support for QCA ROME chipset family - LP: #1459937 * Bluetooth: btusb: Fix incorrect type in qca_device_info - LP: #1459937 * Bluetooth: btusb: Fix minor whitespace issue in QCA ROME device entries - LP: #1459937 * Bluetooth: btusb: Add support for 0cf3:e007 - LP: #1459937 * storvsc: Set the SRB flags correctly when no data transfer is needed - LP: #1439780 * vfs: read file_handle only once in handle_to_path - LP: #1416503 - CVE-2015-1420 * ozwpan: Use unsigned ints to prevent heap overflow - LP: #1463442 - CVE-2015-4001 * ozwpan: divide-by-zero leading to panic - LP: #1463445 - CVE-2015-4003 * ozwpan: Use proper check to prevent heap overflow - LP: #1463444 - CVE-2015-4002 * ozwpan: unchecked signed subtraction leads to DoS - LP: #1463444 - CVE-2015-4002 * enclosure: fix WARN_ON removing an adapter in multi-path devices - LP: #1415178 * ASoC: tfa9879: Fix return value check in tfa9879_i2c_probe() - LP: #1465696 * ASoC: samsung: s3c24xx-i2s: Fix return value check in s3c24xx_iis_dev_probe() - LP: #1465696 * ASoC: dapm: Enable autodisable on SOC_DAPM_SINGLE_TLV_AUTODISABLE - LP: #1465696 * ASoC: rt5677: add register patch for PLL - LP: #1465696 * btrfs: unlock i_mutex after attempting to delete subvolume during send - LP: #1465696 * ALSA: hda - Fix mute-LED fixed mode - LP: #1465696 * ALSA: hda - Add mute-LED mode control to Thinkpad - LP: #1465696 * arm64: dma-mapping: always clear allocated buffers - LP: #1465696 * ALSA: emu10k1: Fix card shortname string buffer overflow - LP: #1465696 * ALSA: emux: Fix mutex deadlock at unloading - LP: #1465696 * drm/radeon: Use drm_calloc_ab for CS relocs - LP: #1465696 * drm/radeon: adjust pll when audio is not enabled - LP: #1465696 * drm/radeon: add SI DPM quirk for Sapphire R9 270 Dual-X 2G GDDR5 - LP: #1465696 * drm/radeon: fix lockup when BOs aren't part of the VM on release - LP: #1465696 * drm/radeon: reset BOs address after clearing it. - LP: #1465696 * drm/radeon: check new address before removing old one - LP: #1465696 * SCSI: add 1024 max sectors black list flag - LP: #1465696 * 3w-sas: fix command completion race - LP: #1465696 * 3w-: fix command completion race - LP: #1465696 * 3w-9xxx: fix command completion race - LP: #1465696 * uas: Allow uas_use_uas_driver to return usb-storage flags - LP: #1465696 * uas: Add US_FL_MAX_SECTORS_240 flag - LP: #1465696 * uas: Set max_sectors_240 quirk for ASM1053 devices - LP: #1465696 * usb: chipidea: otg: remove mutex unlock and lock while stop and start role - LP: #1465696 * serial: xilinx: Use platform_get_irq to get irq description structure - LP: #1465696 * serial: of-serial: Remove device_type = serial registration - LP: #1465696 * tty/serial: at91: maxburst was missing for dma transfers - LP: #1465696 * ALSA: emux: Fix mutex deadlock in OSS emulation - LP: #1465696 * ACPI / SBS: Enable battery manager when present - LP: #1465696 * ALSA: emu10k1: Emu10k2 32 bit DMA mode - LP: #1465696 * ASoC: rt5677: fixed wrong DMIC ref clock - LP: #1465696 * rbd: end I/O the entire obj_request on error - LP: #1465696 * ext4: fix data corruption caused by unwritten and delayed extents - LP: #1465696 * ext4: move check under lock scope to close a race. - LP: #1465696 * powerpc/pseries: Correct cpu affinity for dlpar added cpus - LP: #1465696 * powerpc/powernv: Restore non-volatile CRs after nap - LP: #1465696 * efivarfs: Ensure VariableName is NUL-terminated - LP: #1465696 * x86/efi: Store upper bits of command line buffer address in ext_cmd_line_ptr - LP: #1465696 * blk-mq: fix race between timeout and CPU hotplug - LP: #1465696 * blk-mq: fix CPU hotplug handling - LP: #1465696 *
[Kernel-packages] [Bug 1463442] Re: CVE-2015-4001
This bug was fixed in the package linux - 3.19.0-22.22 --- linux (3.19.0-22.22) vivid; urgency=low [ Brad Figg ] * Release Tracking Bug - LP: #1465755 [ Tai Nguyen ] * SAUCE: power: reset: Add syscon reboot device node for APM X-Gene platform - LP: #1463211 [ Upstream Kernel Changes ] * Revert dm crypt: fix deadlock when async crypto algorithm returns -EBUSY - LP: #1465696 * Bluetooth: ath3k: Add a new ID 0cf3:e006 to ath3k list - LP: #1459934 * cdc-acm: prevent infinite loop when parsing CDC headers. - LP: #1460657 * (upstream) libata: Blacklist queued TRIM on all Samsung 800-series - LP: #1338706, #1449005 * powerpc/powernv: Check image loaded or not before calling flash - LP: #1461553 * ahci: avoton port-disable reset-quirk - LP: #1458617 * Bluetooth: btusb: support public address configuration for ath3012 - LP: #1459937 * Bluetooth: btusb: Add setup callback for chip init on USB - LP: #1459937 * Bluetooth: btusb: Add support for QCA ROME chipset family - LP: #1459937 * Bluetooth: btusb: Fix incorrect type in qca_device_info - LP: #1459937 * Bluetooth: btusb: Fix minor whitespace issue in QCA ROME device entries - LP: #1459937 * Bluetooth: btusb: Add support for 0cf3:e007 - LP: #1459937 * storvsc: Set the SRB flags correctly when no data transfer is needed - LP: #1439780 * vfs: read file_handle only once in handle_to_path - LP: #1416503 - CVE-2015-1420 * ozwpan: Use unsigned ints to prevent heap overflow - LP: #1463442 - CVE-2015-4001 * ozwpan: divide-by-zero leading to panic - LP: #1463445 - CVE-2015-4003 * ozwpan: Use proper check to prevent heap overflow - LP: #1463444 - CVE-2015-4002 * ozwpan: unchecked signed subtraction leads to DoS - LP: #1463444 - CVE-2015-4002 * enclosure: fix WARN_ON removing an adapter in multi-path devices - LP: #1415178 * ASoC: tfa9879: Fix return value check in tfa9879_i2c_probe() - LP: #1465696 * ASoC: samsung: s3c24xx-i2s: Fix return value check in s3c24xx_iis_dev_probe() - LP: #1465696 * ASoC: dapm: Enable autodisable on SOC_DAPM_SINGLE_TLV_AUTODISABLE - LP: #1465696 * ASoC: rt5677: add register patch for PLL - LP: #1465696 * btrfs: unlock i_mutex after attempting to delete subvolume during send - LP: #1465696 * ALSA: hda - Fix mute-LED fixed mode - LP: #1465696 * ALSA: hda - Add mute-LED mode control to Thinkpad - LP: #1465696 * arm64: dma-mapping: always clear allocated buffers - LP: #1465696 * ALSA: emu10k1: Fix card shortname string buffer overflow - LP: #1465696 * ALSA: emux: Fix mutex deadlock at unloading - LP: #1465696 * drm/radeon: Use drm_calloc_ab for CS relocs - LP: #1465696 * drm/radeon: adjust pll when audio is not enabled - LP: #1465696 * drm/radeon: add SI DPM quirk for Sapphire R9 270 Dual-X 2G GDDR5 - LP: #1465696 * drm/radeon: fix lockup when BOs aren't part of the VM on release - LP: #1465696 * drm/radeon: reset BOs address after clearing it. - LP: #1465696 * drm/radeon: check new address before removing old one - LP: #1465696 * SCSI: add 1024 max sectors black list flag - LP: #1465696 * 3w-sas: fix command completion race - LP: #1465696 * 3w-: fix command completion race - LP: #1465696 * 3w-9xxx: fix command completion race - LP: #1465696 * uas: Allow uas_use_uas_driver to return usb-storage flags - LP: #1465696 * uas: Add US_FL_MAX_SECTORS_240 flag - LP: #1465696 * uas: Set max_sectors_240 quirk for ASM1053 devices - LP: #1465696 * usb: chipidea: otg: remove mutex unlock and lock while stop and start role - LP: #1465696 * serial: xilinx: Use platform_get_irq to get irq description structure - LP: #1465696 * serial: of-serial: Remove device_type = serial registration - LP: #1465696 * tty/serial: at91: maxburst was missing for dma transfers - LP: #1465696 * ALSA: emux: Fix mutex deadlock in OSS emulation - LP: #1465696 * ACPI / SBS: Enable battery manager when present - LP: #1465696 * ALSA: emu10k1: Emu10k2 32 bit DMA mode - LP: #1465696 * ASoC: rt5677: fixed wrong DMIC ref clock - LP: #1465696 * rbd: end I/O the entire obj_request on error - LP: #1465696 * ext4: fix data corruption caused by unwritten and delayed extents - LP: #1465696 * ext4: move check under lock scope to close a race. - LP: #1465696 * powerpc/pseries: Correct cpu affinity for dlpar added cpus - LP: #1465696 * powerpc/powernv: Restore non-volatile CRs after nap - LP: #1465696 * efivarfs: Ensure VariableName is NUL-terminated - LP: #1465696 * x86/efi: Store upper bits of command line buffer address in ext_cmd_line_ptr - LP: #1465696 * blk-mq: fix race between timeout and CPU hotplug - LP: #1465696 * blk-mq: fix CPU hotplug handling - LP: #1465696 *
[Kernel-packages] [Bug 1463444] Re: CVE-2015-4002
This bug was fixed in the package linux - 3.19.0-22.22 --- linux (3.19.0-22.22) vivid; urgency=low [ Brad Figg ] * Release Tracking Bug - LP: #1465755 [ Tai Nguyen ] * SAUCE: power: reset: Add syscon reboot device node for APM X-Gene platform - LP: #1463211 [ Upstream Kernel Changes ] * Revert dm crypt: fix deadlock when async crypto algorithm returns -EBUSY - LP: #1465696 * Bluetooth: ath3k: Add a new ID 0cf3:e006 to ath3k list - LP: #1459934 * cdc-acm: prevent infinite loop when parsing CDC headers. - LP: #1460657 * (upstream) libata: Blacklist queued TRIM on all Samsung 800-series - LP: #1338706, #1449005 * powerpc/powernv: Check image loaded or not before calling flash - LP: #1461553 * ahci: avoton port-disable reset-quirk - LP: #1458617 * Bluetooth: btusb: support public address configuration for ath3012 - LP: #1459937 * Bluetooth: btusb: Add setup callback for chip init on USB - LP: #1459937 * Bluetooth: btusb: Add support for QCA ROME chipset family - LP: #1459937 * Bluetooth: btusb: Fix incorrect type in qca_device_info - LP: #1459937 * Bluetooth: btusb: Fix minor whitespace issue in QCA ROME device entries - LP: #1459937 * Bluetooth: btusb: Add support for 0cf3:e007 - LP: #1459937 * storvsc: Set the SRB flags correctly when no data transfer is needed - LP: #1439780 * vfs: read file_handle only once in handle_to_path - LP: #1416503 - CVE-2015-1420 * ozwpan: Use unsigned ints to prevent heap overflow - LP: #1463442 - CVE-2015-4001 * ozwpan: divide-by-zero leading to panic - LP: #1463445 - CVE-2015-4003 * ozwpan: Use proper check to prevent heap overflow - LP: #1463444 - CVE-2015-4002 * ozwpan: unchecked signed subtraction leads to DoS - LP: #1463444 - CVE-2015-4002 * enclosure: fix WARN_ON removing an adapter in multi-path devices - LP: #1415178 * ASoC: tfa9879: Fix return value check in tfa9879_i2c_probe() - LP: #1465696 * ASoC: samsung: s3c24xx-i2s: Fix return value check in s3c24xx_iis_dev_probe() - LP: #1465696 * ASoC: dapm: Enable autodisable on SOC_DAPM_SINGLE_TLV_AUTODISABLE - LP: #1465696 * ASoC: rt5677: add register patch for PLL - LP: #1465696 * btrfs: unlock i_mutex after attempting to delete subvolume during send - LP: #1465696 * ALSA: hda - Fix mute-LED fixed mode - LP: #1465696 * ALSA: hda - Add mute-LED mode control to Thinkpad - LP: #1465696 * arm64: dma-mapping: always clear allocated buffers - LP: #1465696 * ALSA: emu10k1: Fix card shortname string buffer overflow - LP: #1465696 * ALSA: emux: Fix mutex deadlock at unloading - LP: #1465696 * drm/radeon: Use drm_calloc_ab for CS relocs - LP: #1465696 * drm/radeon: adjust pll when audio is not enabled - LP: #1465696 * drm/radeon: add SI DPM quirk for Sapphire R9 270 Dual-X 2G GDDR5 - LP: #1465696 * drm/radeon: fix lockup when BOs aren't part of the VM on release - LP: #1465696 * drm/radeon: reset BOs address after clearing it. - LP: #1465696 * drm/radeon: check new address before removing old one - LP: #1465696 * SCSI: add 1024 max sectors black list flag - LP: #1465696 * 3w-sas: fix command completion race - LP: #1465696 * 3w-: fix command completion race - LP: #1465696 * 3w-9xxx: fix command completion race - LP: #1465696 * uas: Allow uas_use_uas_driver to return usb-storage flags - LP: #1465696 * uas: Add US_FL_MAX_SECTORS_240 flag - LP: #1465696 * uas: Set max_sectors_240 quirk for ASM1053 devices - LP: #1465696 * usb: chipidea: otg: remove mutex unlock and lock while stop and start role - LP: #1465696 * serial: xilinx: Use platform_get_irq to get irq description structure - LP: #1465696 * serial: of-serial: Remove device_type = serial registration - LP: #1465696 * tty/serial: at91: maxburst was missing for dma transfers - LP: #1465696 * ALSA: emux: Fix mutex deadlock in OSS emulation - LP: #1465696 * ACPI / SBS: Enable battery manager when present - LP: #1465696 * ALSA: emu10k1: Emu10k2 32 bit DMA mode - LP: #1465696 * ASoC: rt5677: fixed wrong DMIC ref clock - LP: #1465696 * rbd: end I/O the entire obj_request on error - LP: #1465696 * ext4: fix data corruption caused by unwritten and delayed extents - LP: #1465696 * ext4: move check under lock scope to close a race. - LP: #1465696 * powerpc/pseries: Correct cpu affinity for dlpar added cpus - LP: #1465696 * powerpc/powernv: Restore non-volatile CRs after nap - LP: #1465696 * efivarfs: Ensure VariableName is NUL-terminated - LP: #1465696 * x86/efi: Store upper bits of command line buffer address in ext_cmd_line_ptr - LP: #1465696 * blk-mq: fix race between timeout and CPU hotplug - LP: #1465696 * blk-mq: fix CPU hotplug handling - LP: #1465696 *
[Kernel-packages] [Bug 1459937] Re: Support bluetooth device 0cf3:e007
This bug was fixed in the package linux - 3.19.0-22.22 --- linux (3.19.0-22.22) vivid; urgency=low [ Brad Figg ] * Release Tracking Bug - LP: #1465755 [ Tai Nguyen ] * SAUCE: power: reset: Add syscon reboot device node for APM X-Gene platform - LP: #1463211 [ Upstream Kernel Changes ] * Revert dm crypt: fix deadlock when async crypto algorithm returns -EBUSY - LP: #1465696 * Bluetooth: ath3k: Add a new ID 0cf3:e006 to ath3k list - LP: #1459934 * cdc-acm: prevent infinite loop when parsing CDC headers. - LP: #1460657 * (upstream) libata: Blacklist queued TRIM on all Samsung 800-series - LP: #1338706, #1449005 * powerpc/powernv: Check image loaded or not before calling flash - LP: #1461553 * ahci: avoton port-disable reset-quirk - LP: #1458617 * Bluetooth: btusb: support public address configuration for ath3012 - LP: #1459937 * Bluetooth: btusb: Add setup callback for chip init on USB - LP: #1459937 * Bluetooth: btusb: Add support for QCA ROME chipset family - LP: #1459937 * Bluetooth: btusb: Fix incorrect type in qca_device_info - LP: #1459937 * Bluetooth: btusb: Fix minor whitespace issue in QCA ROME device entries - LP: #1459937 * Bluetooth: btusb: Add support for 0cf3:e007 - LP: #1459937 * storvsc: Set the SRB flags correctly when no data transfer is needed - LP: #1439780 * vfs: read file_handle only once in handle_to_path - LP: #1416503 - CVE-2015-1420 * ozwpan: Use unsigned ints to prevent heap overflow - LP: #1463442 - CVE-2015-4001 * ozwpan: divide-by-zero leading to panic - LP: #1463445 - CVE-2015-4003 * ozwpan: Use proper check to prevent heap overflow - LP: #1463444 - CVE-2015-4002 * ozwpan: unchecked signed subtraction leads to DoS - LP: #1463444 - CVE-2015-4002 * enclosure: fix WARN_ON removing an adapter in multi-path devices - LP: #1415178 * ASoC: tfa9879: Fix return value check in tfa9879_i2c_probe() - LP: #1465696 * ASoC: samsung: s3c24xx-i2s: Fix return value check in s3c24xx_iis_dev_probe() - LP: #1465696 * ASoC: dapm: Enable autodisable on SOC_DAPM_SINGLE_TLV_AUTODISABLE - LP: #1465696 * ASoC: rt5677: add register patch for PLL - LP: #1465696 * btrfs: unlock i_mutex after attempting to delete subvolume during send - LP: #1465696 * ALSA: hda - Fix mute-LED fixed mode - LP: #1465696 * ALSA: hda - Add mute-LED mode control to Thinkpad - LP: #1465696 * arm64: dma-mapping: always clear allocated buffers - LP: #1465696 * ALSA: emu10k1: Fix card shortname string buffer overflow - LP: #1465696 * ALSA: emux: Fix mutex deadlock at unloading - LP: #1465696 * drm/radeon: Use drm_calloc_ab for CS relocs - LP: #1465696 * drm/radeon: adjust pll when audio is not enabled - LP: #1465696 * drm/radeon: add SI DPM quirk for Sapphire R9 270 Dual-X 2G GDDR5 - LP: #1465696 * drm/radeon: fix lockup when BOs aren't part of the VM on release - LP: #1465696 * drm/radeon: reset BOs address after clearing it. - LP: #1465696 * drm/radeon: check new address before removing old one - LP: #1465696 * SCSI: add 1024 max sectors black list flag - LP: #1465696 * 3w-sas: fix command completion race - LP: #1465696 * 3w-: fix command completion race - LP: #1465696 * 3w-9xxx: fix command completion race - LP: #1465696 * uas: Allow uas_use_uas_driver to return usb-storage flags - LP: #1465696 * uas: Add US_FL_MAX_SECTORS_240 flag - LP: #1465696 * uas: Set max_sectors_240 quirk for ASM1053 devices - LP: #1465696 * usb: chipidea: otg: remove mutex unlock and lock while stop and start role - LP: #1465696 * serial: xilinx: Use platform_get_irq to get irq description structure - LP: #1465696 * serial: of-serial: Remove device_type = serial registration - LP: #1465696 * tty/serial: at91: maxburst was missing for dma transfers - LP: #1465696 * ALSA: emux: Fix mutex deadlock in OSS emulation - LP: #1465696 * ACPI / SBS: Enable battery manager when present - LP: #1465696 * ALSA: emu10k1: Emu10k2 32 bit DMA mode - LP: #1465696 * ASoC: rt5677: fixed wrong DMIC ref clock - LP: #1465696 * rbd: end I/O the entire obj_request on error - LP: #1465696 * ext4: fix data corruption caused by unwritten and delayed extents - LP: #1465696 * ext4: move check under lock scope to close a race. - LP: #1465696 * powerpc/pseries: Correct cpu affinity for dlpar added cpus - LP: #1465696 * powerpc/powernv: Restore non-volatile CRs after nap - LP: #1465696 * efivarfs: Ensure VariableName is NUL-terminated - LP: #1465696 * x86/efi: Store upper bits of command line buffer address in ext_cmd_line_ptr - LP: #1465696 * blk-mq: fix race between timeout and CPU hotplug - LP: #1465696 * blk-mq: fix CPU hotplug handling - LP: #1465696 *
[Kernel-packages] [Bug 1460657] Re: possible infinite loop when parsing CDC headers
This bug was fixed in the package linux - 3.19.0-22.22 --- linux (3.19.0-22.22) vivid; urgency=low [ Brad Figg ] * Release Tracking Bug - LP: #1465755 [ Tai Nguyen ] * SAUCE: power: reset: Add syscon reboot device node for APM X-Gene platform - LP: #1463211 [ Upstream Kernel Changes ] * Revert dm crypt: fix deadlock when async crypto algorithm returns -EBUSY - LP: #1465696 * Bluetooth: ath3k: Add a new ID 0cf3:e006 to ath3k list - LP: #1459934 * cdc-acm: prevent infinite loop when parsing CDC headers. - LP: #1460657 * (upstream) libata: Blacklist queued TRIM on all Samsung 800-series - LP: #1338706, #1449005 * powerpc/powernv: Check image loaded or not before calling flash - LP: #1461553 * ahci: avoton port-disable reset-quirk - LP: #1458617 * Bluetooth: btusb: support public address configuration for ath3012 - LP: #1459937 * Bluetooth: btusb: Add setup callback for chip init on USB - LP: #1459937 * Bluetooth: btusb: Add support for QCA ROME chipset family - LP: #1459937 * Bluetooth: btusb: Fix incorrect type in qca_device_info - LP: #1459937 * Bluetooth: btusb: Fix minor whitespace issue in QCA ROME device entries - LP: #1459937 * Bluetooth: btusb: Add support for 0cf3:e007 - LP: #1459937 * storvsc: Set the SRB flags correctly when no data transfer is needed - LP: #1439780 * vfs: read file_handle only once in handle_to_path - LP: #1416503 - CVE-2015-1420 * ozwpan: Use unsigned ints to prevent heap overflow - LP: #1463442 - CVE-2015-4001 * ozwpan: divide-by-zero leading to panic - LP: #1463445 - CVE-2015-4003 * ozwpan: Use proper check to prevent heap overflow - LP: #1463444 - CVE-2015-4002 * ozwpan: unchecked signed subtraction leads to DoS - LP: #1463444 - CVE-2015-4002 * enclosure: fix WARN_ON removing an adapter in multi-path devices - LP: #1415178 * ASoC: tfa9879: Fix return value check in tfa9879_i2c_probe() - LP: #1465696 * ASoC: samsung: s3c24xx-i2s: Fix return value check in s3c24xx_iis_dev_probe() - LP: #1465696 * ASoC: dapm: Enable autodisable on SOC_DAPM_SINGLE_TLV_AUTODISABLE - LP: #1465696 * ASoC: rt5677: add register patch for PLL - LP: #1465696 * btrfs: unlock i_mutex after attempting to delete subvolume during send - LP: #1465696 * ALSA: hda - Fix mute-LED fixed mode - LP: #1465696 * ALSA: hda - Add mute-LED mode control to Thinkpad - LP: #1465696 * arm64: dma-mapping: always clear allocated buffers - LP: #1465696 * ALSA: emu10k1: Fix card shortname string buffer overflow - LP: #1465696 * ALSA: emux: Fix mutex deadlock at unloading - LP: #1465696 * drm/radeon: Use drm_calloc_ab for CS relocs - LP: #1465696 * drm/radeon: adjust pll when audio is not enabled - LP: #1465696 * drm/radeon: add SI DPM quirk for Sapphire R9 270 Dual-X 2G GDDR5 - LP: #1465696 * drm/radeon: fix lockup when BOs aren't part of the VM on release - LP: #1465696 * drm/radeon: reset BOs address after clearing it. - LP: #1465696 * drm/radeon: check new address before removing old one - LP: #1465696 * SCSI: add 1024 max sectors black list flag - LP: #1465696 * 3w-sas: fix command completion race - LP: #1465696 * 3w-: fix command completion race - LP: #1465696 * 3w-9xxx: fix command completion race - LP: #1465696 * uas: Allow uas_use_uas_driver to return usb-storage flags - LP: #1465696 * uas: Add US_FL_MAX_SECTORS_240 flag - LP: #1465696 * uas: Set max_sectors_240 quirk for ASM1053 devices - LP: #1465696 * usb: chipidea: otg: remove mutex unlock and lock while stop and start role - LP: #1465696 * serial: xilinx: Use platform_get_irq to get irq description structure - LP: #1465696 * serial: of-serial: Remove device_type = serial registration - LP: #1465696 * tty/serial: at91: maxburst was missing for dma transfers - LP: #1465696 * ALSA: emux: Fix mutex deadlock in OSS emulation - LP: #1465696 * ACPI / SBS: Enable battery manager when present - LP: #1465696 * ALSA: emu10k1: Emu10k2 32 bit DMA mode - LP: #1465696 * ASoC: rt5677: fixed wrong DMIC ref clock - LP: #1465696 * rbd: end I/O the entire obj_request on error - LP: #1465696 * ext4: fix data corruption caused by unwritten and delayed extents - LP: #1465696 * ext4: move check under lock scope to close a race. - LP: #1465696 * powerpc/pseries: Correct cpu affinity for dlpar added cpus - LP: #1465696 * powerpc/powernv: Restore non-volatile CRs after nap - LP: #1465696 * efivarfs: Ensure VariableName is NUL-terminated - LP: #1465696 * x86/efi: Store upper bits of command line buffer address in ext_cmd_line_ptr - LP: #1465696 * blk-mq: fix race between timeout and CPU hotplug - LP: #1465696 * blk-mq: fix CPU hotplug handling - LP: #1465696 *
[Kernel-packages] [Bug 1416503] Re: CVE-2015-1420
This bug was fixed in the package linux - 3.19.0-22.22 --- linux (3.19.0-22.22) vivid; urgency=low [ Brad Figg ] * Release Tracking Bug - LP: #1465755 [ Tai Nguyen ] * SAUCE: power: reset: Add syscon reboot device node for APM X-Gene platform - LP: #1463211 [ Upstream Kernel Changes ] * Revert dm crypt: fix deadlock when async crypto algorithm returns -EBUSY - LP: #1465696 * Bluetooth: ath3k: Add a new ID 0cf3:e006 to ath3k list - LP: #1459934 * cdc-acm: prevent infinite loop when parsing CDC headers. - LP: #1460657 * (upstream) libata: Blacklist queued TRIM on all Samsung 800-series - LP: #1338706, #1449005 * powerpc/powernv: Check image loaded or not before calling flash - LP: #1461553 * ahci: avoton port-disable reset-quirk - LP: #1458617 * Bluetooth: btusb: support public address configuration for ath3012 - LP: #1459937 * Bluetooth: btusb: Add setup callback for chip init on USB - LP: #1459937 * Bluetooth: btusb: Add support for QCA ROME chipset family - LP: #1459937 * Bluetooth: btusb: Fix incorrect type in qca_device_info - LP: #1459937 * Bluetooth: btusb: Fix minor whitespace issue in QCA ROME device entries - LP: #1459937 * Bluetooth: btusb: Add support for 0cf3:e007 - LP: #1459937 * storvsc: Set the SRB flags correctly when no data transfer is needed - LP: #1439780 * vfs: read file_handle only once in handle_to_path - LP: #1416503 - CVE-2015-1420 * ozwpan: Use unsigned ints to prevent heap overflow - LP: #1463442 - CVE-2015-4001 * ozwpan: divide-by-zero leading to panic - LP: #1463445 - CVE-2015-4003 * ozwpan: Use proper check to prevent heap overflow - LP: #1463444 - CVE-2015-4002 * ozwpan: unchecked signed subtraction leads to DoS - LP: #1463444 - CVE-2015-4002 * enclosure: fix WARN_ON removing an adapter in multi-path devices - LP: #1415178 * ASoC: tfa9879: Fix return value check in tfa9879_i2c_probe() - LP: #1465696 * ASoC: samsung: s3c24xx-i2s: Fix return value check in s3c24xx_iis_dev_probe() - LP: #1465696 * ASoC: dapm: Enable autodisable on SOC_DAPM_SINGLE_TLV_AUTODISABLE - LP: #1465696 * ASoC: rt5677: add register patch for PLL - LP: #1465696 * btrfs: unlock i_mutex after attempting to delete subvolume during send - LP: #1465696 * ALSA: hda - Fix mute-LED fixed mode - LP: #1465696 * ALSA: hda - Add mute-LED mode control to Thinkpad - LP: #1465696 * arm64: dma-mapping: always clear allocated buffers - LP: #1465696 * ALSA: emu10k1: Fix card shortname string buffer overflow - LP: #1465696 * ALSA: emux: Fix mutex deadlock at unloading - LP: #1465696 * drm/radeon: Use drm_calloc_ab for CS relocs - LP: #1465696 * drm/radeon: adjust pll when audio is not enabled - LP: #1465696 * drm/radeon: add SI DPM quirk for Sapphire R9 270 Dual-X 2G GDDR5 - LP: #1465696 * drm/radeon: fix lockup when BOs aren't part of the VM on release - LP: #1465696 * drm/radeon: reset BOs address after clearing it. - LP: #1465696 * drm/radeon: check new address before removing old one - LP: #1465696 * SCSI: add 1024 max sectors black list flag - LP: #1465696 * 3w-sas: fix command completion race - LP: #1465696 * 3w-: fix command completion race - LP: #1465696 * 3w-9xxx: fix command completion race - LP: #1465696 * uas: Allow uas_use_uas_driver to return usb-storage flags - LP: #1465696 * uas: Add US_FL_MAX_SECTORS_240 flag - LP: #1465696 * uas: Set max_sectors_240 quirk for ASM1053 devices - LP: #1465696 * usb: chipidea: otg: remove mutex unlock and lock while stop and start role - LP: #1465696 * serial: xilinx: Use platform_get_irq to get irq description structure - LP: #1465696 * serial: of-serial: Remove device_type = serial registration - LP: #1465696 * tty/serial: at91: maxburst was missing for dma transfers - LP: #1465696 * ALSA: emux: Fix mutex deadlock in OSS emulation - LP: #1465696 * ACPI / SBS: Enable battery manager when present - LP: #1465696 * ALSA: emu10k1: Emu10k2 32 bit DMA mode - LP: #1465696 * ASoC: rt5677: fixed wrong DMIC ref clock - LP: #1465696 * rbd: end I/O the entire obj_request on error - LP: #1465696 * ext4: fix data corruption caused by unwritten and delayed extents - LP: #1465696 * ext4: move check under lock scope to close a race. - LP: #1465696 * powerpc/pseries: Correct cpu affinity for dlpar added cpus - LP: #1465696 * powerpc/powernv: Restore non-volatile CRs after nap - LP: #1465696 * efivarfs: Ensure VariableName is NUL-terminated - LP: #1465696 * x86/efi: Store upper bits of command line buffer address in ext_cmd_line_ptr - LP: #1465696 * blk-mq: fix race between timeout and CPU hotplug - LP: #1465696 * blk-mq: fix CPU hotplug handling - LP: #1465696 *
[Kernel-packages] [Bug 1461553] Re: [Ubuntu 14.04.3] kernel patches for RAS tools
This bug was fixed in the package linux - 3.19.0-22.22 --- linux (3.19.0-22.22) vivid; urgency=low [ Brad Figg ] * Release Tracking Bug - LP: #1465755 [ Tai Nguyen ] * SAUCE: power: reset: Add syscon reboot device node for APM X-Gene platform - LP: #1463211 [ Upstream Kernel Changes ] * Revert dm crypt: fix deadlock when async crypto algorithm returns -EBUSY - LP: #1465696 * Bluetooth: ath3k: Add a new ID 0cf3:e006 to ath3k list - LP: #1459934 * cdc-acm: prevent infinite loop when parsing CDC headers. - LP: #1460657 * (upstream) libata: Blacklist queued TRIM on all Samsung 800-series - LP: #1338706, #1449005 * powerpc/powernv: Check image loaded or not before calling flash - LP: #1461553 * ahci: avoton port-disable reset-quirk - LP: #1458617 * Bluetooth: btusb: support public address configuration for ath3012 - LP: #1459937 * Bluetooth: btusb: Add setup callback for chip init on USB - LP: #1459937 * Bluetooth: btusb: Add support for QCA ROME chipset family - LP: #1459937 * Bluetooth: btusb: Fix incorrect type in qca_device_info - LP: #1459937 * Bluetooth: btusb: Fix minor whitespace issue in QCA ROME device entries - LP: #1459937 * Bluetooth: btusb: Add support for 0cf3:e007 - LP: #1459937 * storvsc: Set the SRB flags correctly when no data transfer is needed - LP: #1439780 * vfs: read file_handle only once in handle_to_path - LP: #1416503 - CVE-2015-1420 * ozwpan: Use unsigned ints to prevent heap overflow - LP: #1463442 - CVE-2015-4001 * ozwpan: divide-by-zero leading to panic - LP: #1463445 - CVE-2015-4003 * ozwpan: Use proper check to prevent heap overflow - LP: #1463444 - CVE-2015-4002 * ozwpan: unchecked signed subtraction leads to DoS - LP: #1463444 - CVE-2015-4002 * enclosure: fix WARN_ON removing an adapter in multi-path devices - LP: #1415178 * ASoC: tfa9879: Fix return value check in tfa9879_i2c_probe() - LP: #1465696 * ASoC: samsung: s3c24xx-i2s: Fix return value check in s3c24xx_iis_dev_probe() - LP: #1465696 * ASoC: dapm: Enable autodisable on SOC_DAPM_SINGLE_TLV_AUTODISABLE - LP: #1465696 * ASoC: rt5677: add register patch for PLL - LP: #1465696 * btrfs: unlock i_mutex after attempting to delete subvolume during send - LP: #1465696 * ALSA: hda - Fix mute-LED fixed mode - LP: #1465696 * ALSA: hda - Add mute-LED mode control to Thinkpad - LP: #1465696 * arm64: dma-mapping: always clear allocated buffers - LP: #1465696 * ALSA: emu10k1: Fix card shortname string buffer overflow - LP: #1465696 * ALSA: emux: Fix mutex deadlock at unloading - LP: #1465696 * drm/radeon: Use drm_calloc_ab for CS relocs - LP: #1465696 * drm/radeon: adjust pll when audio is not enabled - LP: #1465696 * drm/radeon: add SI DPM quirk for Sapphire R9 270 Dual-X 2G GDDR5 - LP: #1465696 * drm/radeon: fix lockup when BOs aren't part of the VM on release - LP: #1465696 * drm/radeon: reset BOs address after clearing it. - LP: #1465696 * drm/radeon: check new address before removing old one - LP: #1465696 * SCSI: add 1024 max sectors black list flag - LP: #1465696 * 3w-sas: fix command completion race - LP: #1465696 * 3w-: fix command completion race - LP: #1465696 * 3w-9xxx: fix command completion race - LP: #1465696 * uas: Allow uas_use_uas_driver to return usb-storage flags - LP: #1465696 * uas: Add US_FL_MAX_SECTORS_240 flag - LP: #1465696 * uas: Set max_sectors_240 quirk for ASM1053 devices - LP: #1465696 * usb: chipidea: otg: remove mutex unlock and lock while stop and start role - LP: #1465696 * serial: xilinx: Use platform_get_irq to get irq description structure - LP: #1465696 * serial: of-serial: Remove device_type = serial registration - LP: #1465696 * tty/serial: at91: maxburst was missing for dma transfers - LP: #1465696 * ALSA: emux: Fix mutex deadlock in OSS emulation - LP: #1465696 * ACPI / SBS: Enable battery manager when present - LP: #1465696 * ALSA: emu10k1: Emu10k2 32 bit DMA mode - LP: #1465696 * ASoC: rt5677: fixed wrong DMIC ref clock - LP: #1465696 * rbd: end I/O the entire obj_request on error - LP: #1465696 * ext4: fix data corruption caused by unwritten and delayed extents - LP: #1465696 * ext4: move check under lock scope to close a race. - LP: #1465696 * powerpc/pseries: Correct cpu affinity for dlpar added cpus - LP: #1465696 * powerpc/powernv: Restore non-volatile CRs after nap - LP: #1465696 * efivarfs: Ensure VariableName is NUL-terminated - LP: #1465696 * x86/efi: Store upper bits of command line buffer address in ext_cmd_line_ptr - LP: #1465696 * blk-mq: fix race between timeout and CPU hotplug - LP: #1465696 * blk-mq: fix CPU hotplug handling - LP: #1465696 *
[Kernel-packages] [Bug 1449005] Re: trim does not work with Samsung 840 EVO after firmware update (EXT0DB6Q)
*** This bug is a duplicate of bug 1338706 *** https://bugs.launchpad.net/bugs/1338706 This bug was fixed in the package linux - 3.19.0-22.22 --- linux (3.19.0-22.22) vivid; urgency=low [ Brad Figg ] * Release Tracking Bug - LP: #1465755 [ Tai Nguyen ] * SAUCE: power: reset: Add syscon reboot device node for APM X-Gene platform - LP: #1463211 [ Upstream Kernel Changes ] * Revert dm crypt: fix deadlock when async crypto algorithm returns -EBUSY - LP: #1465696 * Bluetooth: ath3k: Add a new ID 0cf3:e006 to ath3k list - LP: #1459934 * cdc-acm: prevent infinite loop when parsing CDC headers. - LP: #1460657 * (upstream) libata: Blacklist queued TRIM on all Samsung 800-series - LP: #1338706, #1449005 * powerpc/powernv: Check image loaded or not before calling flash - LP: #1461553 * ahci: avoton port-disable reset-quirk - LP: #1458617 * Bluetooth: btusb: support public address configuration for ath3012 - LP: #1459937 * Bluetooth: btusb: Add setup callback for chip init on USB - LP: #1459937 * Bluetooth: btusb: Add support for QCA ROME chipset family - LP: #1459937 * Bluetooth: btusb: Fix incorrect type in qca_device_info - LP: #1459937 * Bluetooth: btusb: Fix minor whitespace issue in QCA ROME device entries - LP: #1459937 * Bluetooth: btusb: Add support for 0cf3:e007 - LP: #1459937 * storvsc: Set the SRB flags correctly when no data transfer is needed - LP: #1439780 * vfs: read file_handle only once in handle_to_path - LP: #1416503 - CVE-2015-1420 * ozwpan: Use unsigned ints to prevent heap overflow - LP: #1463442 - CVE-2015-4001 * ozwpan: divide-by-zero leading to panic - LP: #1463445 - CVE-2015-4003 * ozwpan: Use proper check to prevent heap overflow - LP: #1463444 - CVE-2015-4002 * ozwpan: unchecked signed subtraction leads to DoS - LP: #1463444 - CVE-2015-4002 * enclosure: fix WARN_ON removing an adapter in multi-path devices - LP: #1415178 * ASoC: tfa9879: Fix return value check in tfa9879_i2c_probe() - LP: #1465696 * ASoC: samsung: s3c24xx-i2s: Fix return value check in s3c24xx_iis_dev_probe() - LP: #1465696 * ASoC: dapm: Enable autodisable on SOC_DAPM_SINGLE_TLV_AUTODISABLE - LP: #1465696 * ASoC: rt5677: add register patch for PLL - LP: #1465696 * btrfs: unlock i_mutex after attempting to delete subvolume during send - LP: #1465696 * ALSA: hda - Fix mute-LED fixed mode - LP: #1465696 * ALSA: hda - Add mute-LED mode control to Thinkpad - LP: #1465696 * arm64: dma-mapping: always clear allocated buffers - LP: #1465696 * ALSA: emu10k1: Fix card shortname string buffer overflow - LP: #1465696 * ALSA: emux: Fix mutex deadlock at unloading - LP: #1465696 * drm/radeon: Use drm_calloc_ab for CS relocs - LP: #1465696 * drm/radeon: adjust pll when audio is not enabled - LP: #1465696 * drm/radeon: add SI DPM quirk for Sapphire R9 270 Dual-X 2G GDDR5 - LP: #1465696 * drm/radeon: fix lockup when BOs aren't part of the VM on release - LP: #1465696 * drm/radeon: reset BOs address after clearing it. - LP: #1465696 * drm/radeon: check new address before removing old one - LP: #1465696 * SCSI: add 1024 max sectors black list flag - LP: #1465696 * 3w-sas: fix command completion race - LP: #1465696 * 3w-: fix command completion race - LP: #1465696 * 3w-9xxx: fix command completion race - LP: #1465696 * uas: Allow uas_use_uas_driver to return usb-storage flags - LP: #1465696 * uas: Add US_FL_MAX_SECTORS_240 flag - LP: #1465696 * uas: Set max_sectors_240 quirk for ASM1053 devices - LP: #1465696 * usb: chipidea: otg: remove mutex unlock and lock while stop and start role - LP: #1465696 * serial: xilinx: Use platform_get_irq to get irq description structure - LP: #1465696 * serial: of-serial: Remove device_type = serial registration - LP: #1465696 * tty/serial: at91: maxburst was missing for dma transfers - LP: #1465696 * ALSA: emux: Fix mutex deadlock in OSS emulation - LP: #1465696 * ACPI / SBS: Enable battery manager when present - LP: #1465696 * ALSA: emu10k1: Emu10k2 32 bit DMA mode - LP: #1465696 * ASoC: rt5677: fixed wrong DMIC ref clock - LP: #1465696 * rbd: end I/O the entire obj_request on error - LP: #1465696 * ext4: fix data corruption caused by unwritten and delayed extents - LP: #1465696 * ext4: move check under lock scope to close a race. - LP: #1465696 * powerpc/pseries: Correct cpu affinity for dlpar added cpus - LP: #1465696 * powerpc/powernv: Restore non-volatile CRs after nap - LP: #1465696 * efivarfs: Ensure VariableName is NUL-terminated - LP: #1465696 * x86/efi: Store upper bits of command line buffer address in ext_cmd_line_ptr - LP: #1465696 * blk-mq: fix race between timeout and
[Kernel-packages] [Bug 1458617] Re: Avoton server occasionally fails to boot when using SSD disks connected using ahci driver
This bug was fixed in the package linux - 3.19.0-22.22 --- linux (3.19.0-22.22) vivid; urgency=low [ Brad Figg ] * Release Tracking Bug - LP: #1465755 [ Tai Nguyen ] * SAUCE: power: reset: Add syscon reboot device node for APM X-Gene platform - LP: #1463211 [ Upstream Kernel Changes ] * Revert dm crypt: fix deadlock when async crypto algorithm returns -EBUSY - LP: #1465696 * Bluetooth: ath3k: Add a new ID 0cf3:e006 to ath3k list - LP: #1459934 * cdc-acm: prevent infinite loop when parsing CDC headers. - LP: #1460657 * (upstream) libata: Blacklist queued TRIM on all Samsung 800-series - LP: #1338706, #1449005 * powerpc/powernv: Check image loaded or not before calling flash - LP: #1461553 * ahci: avoton port-disable reset-quirk - LP: #1458617 * Bluetooth: btusb: support public address configuration for ath3012 - LP: #1459937 * Bluetooth: btusb: Add setup callback for chip init on USB - LP: #1459937 * Bluetooth: btusb: Add support for QCA ROME chipset family - LP: #1459937 * Bluetooth: btusb: Fix incorrect type in qca_device_info - LP: #1459937 * Bluetooth: btusb: Fix minor whitespace issue in QCA ROME device entries - LP: #1459937 * Bluetooth: btusb: Add support for 0cf3:e007 - LP: #1459937 * storvsc: Set the SRB flags correctly when no data transfer is needed - LP: #1439780 * vfs: read file_handle only once in handle_to_path - LP: #1416503 - CVE-2015-1420 * ozwpan: Use unsigned ints to prevent heap overflow - LP: #1463442 - CVE-2015-4001 * ozwpan: divide-by-zero leading to panic - LP: #1463445 - CVE-2015-4003 * ozwpan: Use proper check to prevent heap overflow - LP: #1463444 - CVE-2015-4002 * ozwpan: unchecked signed subtraction leads to DoS - LP: #1463444 - CVE-2015-4002 * enclosure: fix WARN_ON removing an adapter in multi-path devices - LP: #1415178 * ASoC: tfa9879: Fix return value check in tfa9879_i2c_probe() - LP: #1465696 * ASoC: samsung: s3c24xx-i2s: Fix return value check in s3c24xx_iis_dev_probe() - LP: #1465696 * ASoC: dapm: Enable autodisable on SOC_DAPM_SINGLE_TLV_AUTODISABLE - LP: #1465696 * ASoC: rt5677: add register patch for PLL - LP: #1465696 * btrfs: unlock i_mutex after attempting to delete subvolume during send - LP: #1465696 * ALSA: hda - Fix mute-LED fixed mode - LP: #1465696 * ALSA: hda - Add mute-LED mode control to Thinkpad - LP: #1465696 * arm64: dma-mapping: always clear allocated buffers - LP: #1465696 * ALSA: emu10k1: Fix card shortname string buffer overflow - LP: #1465696 * ALSA: emux: Fix mutex deadlock at unloading - LP: #1465696 * drm/radeon: Use drm_calloc_ab for CS relocs - LP: #1465696 * drm/radeon: adjust pll when audio is not enabled - LP: #1465696 * drm/radeon: add SI DPM quirk for Sapphire R9 270 Dual-X 2G GDDR5 - LP: #1465696 * drm/radeon: fix lockup when BOs aren't part of the VM on release - LP: #1465696 * drm/radeon: reset BOs address after clearing it. - LP: #1465696 * drm/radeon: check new address before removing old one - LP: #1465696 * SCSI: add 1024 max sectors black list flag - LP: #1465696 * 3w-sas: fix command completion race - LP: #1465696 * 3w-: fix command completion race - LP: #1465696 * 3w-9xxx: fix command completion race - LP: #1465696 * uas: Allow uas_use_uas_driver to return usb-storage flags - LP: #1465696 * uas: Add US_FL_MAX_SECTORS_240 flag - LP: #1465696 * uas: Set max_sectors_240 quirk for ASM1053 devices - LP: #1465696 * usb: chipidea: otg: remove mutex unlock and lock while stop and start role - LP: #1465696 * serial: xilinx: Use platform_get_irq to get irq description structure - LP: #1465696 * serial: of-serial: Remove device_type = serial registration - LP: #1465696 * tty/serial: at91: maxburst was missing for dma transfers - LP: #1465696 * ALSA: emux: Fix mutex deadlock in OSS emulation - LP: #1465696 * ACPI / SBS: Enable battery manager when present - LP: #1465696 * ALSA: emu10k1: Emu10k2 32 bit DMA mode - LP: #1465696 * ASoC: rt5677: fixed wrong DMIC ref clock - LP: #1465696 * rbd: end I/O the entire obj_request on error - LP: #1465696 * ext4: fix data corruption caused by unwritten and delayed extents - LP: #1465696 * ext4: move check under lock scope to close a race. - LP: #1465696 * powerpc/pseries: Correct cpu affinity for dlpar added cpus - LP: #1465696 * powerpc/powernv: Restore non-volatile CRs after nap - LP: #1465696 * efivarfs: Ensure VariableName is NUL-terminated - LP: #1465696 * x86/efi: Store upper bits of command line buffer address in ext_cmd_line_ptr - LP: #1465696 * blk-mq: fix race between timeout and CPU hotplug - LP: #1465696 * blk-mq: fix CPU hotplug handling - LP: #1465696 *
[Kernel-packages] [Bug 1415178] Re: Kernel trace message when the ipr driver is rmmod from Ubuntu 14.10 guest (GTO - PCI Passthrough)
This bug was fixed in the package linux - 3.19.0-22.22 --- linux (3.19.0-22.22) vivid; urgency=low [ Brad Figg ] * Release Tracking Bug - LP: #1465755 [ Tai Nguyen ] * SAUCE: power: reset: Add syscon reboot device node for APM X-Gene platform - LP: #1463211 [ Upstream Kernel Changes ] * Revert dm crypt: fix deadlock when async crypto algorithm returns -EBUSY - LP: #1465696 * Bluetooth: ath3k: Add a new ID 0cf3:e006 to ath3k list - LP: #1459934 * cdc-acm: prevent infinite loop when parsing CDC headers. - LP: #1460657 * (upstream) libata: Blacklist queued TRIM on all Samsung 800-series - LP: #1338706, #1449005 * powerpc/powernv: Check image loaded or not before calling flash - LP: #1461553 * ahci: avoton port-disable reset-quirk - LP: #1458617 * Bluetooth: btusb: support public address configuration for ath3012 - LP: #1459937 * Bluetooth: btusb: Add setup callback for chip init on USB - LP: #1459937 * Bluetooth: btusb: Add support for QCA ROME chipset family - LP: #1459937 * Bluetooth: btusb: Fix incorrect type in qca_device_info - LP: #1459937 * Bluetooth: btusb: Fix minor whitespace issue in QCA ROME device entries - LP: #1459937 * Bluetooth: btusb: Add support for 0cf3:e007 - LP: #1459937 * storvsc: Set the SRB flags correctly when no data transfer is needed - LP: #1439780 * vfs: read file_handle only once in handle_to_path - LP: #1416503 - CVE-2015-1420 * ozwpan: Use unsigned ints to prevent heap overflow - LP: #1463442 - CVE-2015-4001 * ozwpan: divide-by-zero leading to panic - LP: #1463445 - CVE-2015-4003 * ozwpan: Use proper check to prevent heap overflow - LP: #1463444 - CVE-2015-4002 * ozwpan: unchecked signed subtraction leads to DoS - LP: #1463444 - CVE-2015-4002 * enclosure: fix WARN_ON removing an adapter in multi-path devices - LP: #1415178 * ASoC: tfa9879: Fix return value check in tfa9879_i2c_probe() - LP: #1465696 * ASoC: samsung: s3c24xx-i2s: Fix return value check in s3c24xx_iis_dev_probe() - LP: #1465696 * ASoC: dapm: Enable autodisable on SOC_DAPM_SINGLE_TLV_AUTODISABLE - LP: #1465696 * ASoC: rt5677: add register patch for PLL - LP: #1465696 * btrfs: unlock i_mutex after attempting to delete subvolume during send - LP: #1465696 * ALSA: hda - Fix mute-LED fixed mode - LP: #1465696 * ALSA: hda - Add mute-LED mode control to Thinkpad - LP: #1465696 * arm64: dma-mapping: always clear allocated buffers - LP: #1465696 * ALSA: emu10k1: Fix card shortname string buffer overflow - LP: #1465696 * ALSA: emux: Fix mutex deadlock at unloading - LP: #1465696 * drm/radeon: Use drm_calloc_ab for CS relocs - LP: #1465696 * drm/radeon: adjust pll when audio is not enabled - LP: #1465696 * drm/radeon: add SI DPM quirk for Sapphire R9 270 Dual-X 2G GDDR5 - LP: #1465696 * drm/radeon: fix lockup when BOs aren't part of the VM on release - LP: #1465696 * drm/radeon: reset BOs address after clearing it. - LP: #1465696 * drm/radeon: check new address before removing old one - LP: #1465696 * SCSI: add 1024 max sectors black list flag - LP: #1465696 * 3w-sas: fix command completion race - LP: #1465696 * 3w-: fix command completion race - LP: #1465696 * 3w-9xxx: fix command completion race - LP: #1465696 * uas: Allow uas_use_uas_driver to return usb-storage flags - LP: #1465696 * uas: Add US_FL_MAX_SECTORS_240 flag - LP: #1465696 * uas: Set max_sectors_240 quirk for ASM1053 devices - LP: #1465696 * usb: chipidea: otg: remove mutex unlock and lock while stop and start role - LP: #1465696 * serial: xilinx: Use platform_get_irq to get irq description structure - LP: #1465696 * serial: of-serial: Remove device_type = serial registration - LP: #1465696 * tty/serial: at91: maxburst was missing for dma transfers - LP: #1465696 * ALSA: emux: Fix mutex deadlock in OSS emulation - LP: #1465696 * ACPI / SBS: Enable battery manager when present - LP: #1465696 * ALSA: emu10k1: Emu10k2 32 bit DMA mode - LP: #1465696 * ASoC: rt5677: fixed wrong DMIC ref clock - LP: #1465696 * rbd: end I/O the entire obj_request on error - LP: #1465696 * ext4: fix data corruption caused by unwritten and delayed extents - LP: #1465696 * ext4: move check under lock scope to close a race. - LP: #1465696 * powerpc/pseries: Correct cpu affinity for dlpar added cpus - LP: #1465696 * powerpc/powernv: Restore non-volatile CRs after nap - LP: #1465696 * efivarfs: Ensure VariableName is NUL-terminated - LP: #1465696 * x86/efi: Store upper bits of command line buffer address in ext_cmd_line_ptr - LP: #1465696 * blk-mq: fix race between timeout and CPU hotplug - LP: #1465696 * blk-mq: fix CPU hotplug handling - LP: #1465696 *
[Kernel-packages] [Bug 1463211] Re: mustang board doesn't reboot
This bug was fixed in the package linux - 3.19.0-22.22 --- linux (3.19.0-22.22) vivid; urgency=low [ Brad Figg ] * Release Tracking Bug - LP: #1465755 [ Tai Nguyen ] * SAUCE: power: reset: Add syscon reboot device node for APM X-Gene platform - LP: #1463211 [ Upstream Kernel Changes ] * Revert dm crypt: fix deadlock when async crypto algorithm returns -EBUSY - LP: #1465696 * Bluetooth: ath3k: Add a new ID 0cf3:e006 to ath3k list - LP: #1459934 * cdc-acm: prevent infinite loop when parsing CDC headers. - LP: #1460657 * (upstream) libata: Blacklist queued TRIM on all Samsung 800-series - LP: #1338706, #1449005 * powerpc/powernv: Check image loaded or not before calling flash - LP: #1461553 * ahci: avoton port-disable reset-quirk - LP: #1458617 * Bluetooth: btusb: support public address configuration for ath3012 - LP: #1459937 * Bluetooth: btusb: Add setup callback for chip init on USB - LP: #1459937 * Bluetooth: btusb: Add support for QCA ROME chipset family - LP: #1459937 * Bluetooth: btusb: Fix incorrect type in qca_device_info - LP: #1459937 * Bluetooth: btusb: Fix minor whitespace issue in QCA ROME device entries - LP: #1459937 * Bluetooth: btusb: Add support for 0cf3:e007 - LP: #1459937 * storvsc: Set the SRB flags correctly when no data transfer is needed - LP: #1439780 * vfs: read file_handle only once in handle_to_path - LP: #1416503 - CVE-2015-1420 * ozwpan: Use unsigned ints to prevent heap overflow - LP: #1463442 - CVE-2015-4001 * ozwpan: divide-by-zero leading to panic - LP: #1463445 - CVE-2015-4003 * ozwpan: Use proper check to prevent heap overflow - LP: #1463444 - CVE-2015-4002 * ozwpan: unchecked signed subtraction leads to DoS - LP: #1463444 - CVE-2015-4002 * enclosure: fix WARN_ON removing an adapter in multi-path devices - LP: #1415178 * ASoC: tfa9879: Fix return value check in tfa9879_i2c_probe() - LP: #1465696 * ASoC: samsung: s3c24xx-i2s: Fix return value check in s3c24xx_iis_dev_probe() - LP: #1465696 * ASoC: dapm: Enable autodisable on SOC_DAPM_SINGLE_TLV_AUTODISABLE - LP: #1465696 * ASoC: rt5677: add register patch for PLL - LP: #1465696 * btrfs: unlock i_mutex after attempting to delete subvolume during send - LP: #1465696 * ALSA: hda - Fix mute-LED fixed mode - LP: #1465696 * ALSA: hda - Add mute-LED mode control to Thinkpad - LP: #1465696 * arm64: dma-mapping: always clear allocated buffers - LP: #1465696 * ALSA: emu10k1: Fix card shortname string buffer overflow - LP: #1465696 * ALSA: emux: Fix mutex deadlock at unloading - LP: #1465696 * drm/radeon: Use drm_calloc_ab for CS relocs - LP: #1465696 * drm/radeon: adjust pll when audio is not enabled - LP: #1465696 * drm/radeon: add SI DPM quirk for Sapphire R9 270 Dual-X 2G GDDR5 - LP: #1465696 * drm/radeon: fix lockup when BOs aren't part of the VM on release - LP: #1465696 * drm/radeon: reset BOs address after clearing it. - LP: #1465696 * drm/radeon: check new address before removing old one - LP: #1465696 * SCSI: add 1024 max sectors black list flag - LP: #1465696 * 3w-sas: fix command completion race - LP: #1465696 * 3w-: fix command completion race - LP: #1465696 * 3w-9xxx: fix command completion race - LP: #1465696 * uas: Allow uas_use_uas_driver to return usb-storage flags - LP: #1465696 * uas: Add US_FL_MAX_SECTORS_240 flag - LP: #1465696 * uas: Set max_sectors_240 quirk for ASM1053 devices - LP: #1465696 * usb: chipidea: otg: remove mutex unlock and lock while stop and start role - LP: #1465696 * serial: xilinx: Use platform_get_irq to get irq description structure - LP: #1465696 * serial: of-serial: Remove device_type = serial registration - LP: #1465696 * tty/serial: at91: maxburst was missing for dma transfers - LP: #1465696 * ALSA: emux: Fix mutex deadlock in OSS emulation - LP: #1465696 * ACPI / SBS: Enable battery manager when present - LP: #1465696 * ALSA: emu10k1: Emu10k2 32 bit DMA mode - LP: #1465696 * ASoC: rt5677: fixed wrong DMIC ref clock - LP: #1465696 * rbd: end I/O the entire obj_request on error - LP: #1465696 * ext4: fix data corruption caused by unwritten and delayed extents - LP: #1465696 * ext4: move check under lock scope to close a race. - LP: #1465696 * powerpc/pseries: Correct cpu affinity for dlpar added cpus - LP: #1465696 * powerpc/powernv: Restore non-volatile CRs after nap - LP: #1465696 * efivarfs: Ensure VariableName is NUL-terminated - LP: #1465696 * x86/efi: Store upper bits of command line buffer address in ext_cmd_line_ptr - LP: #1465696 * blk-mq: fix race between timeout and CPU hotplug - LP: #1465696 * blk-mq: fix CPU hotplug handling - LP: #1465696 *
[Kernel-packages] [Bug 1338706] Re: Samsung SSD 840 failed to get NCQ Send/Recv Log Emask 0x1 failed to set xfermode (err_mask=0x40) on upstream kernels = 3.12
This bug was fixed in the package linux - 3.19.0-22.22 --- linux (3.19.0-22.22) vivid; urgency=low [ Brad Figg ] * Release Tracking Bug - LP: #1465755 [ Tai Nguyen ] * SAUCE: power: reset: Add syscon reboot device node for APM X-Gene platform - LP: #1463211 [ Upstream Kernel Changes ] * Revert dm crypt: fix deadlock when async crypto algorithm returns -EBUSY - LP: #1465696 * Bluetooth: ath3k: Add a new ID 0cf3:e006 to ath3k list - LP: #1459934 * cdc-acm: prevent infinite loop when parsing CDC headers. - LP: #1460657 * (upstream) libata: Blacklist queued TRIM on all Samsung 800-series - LP: #1338706, #1449005 * powerpc/powernv: Check image loaded or not before calling flash - LP: #1461553 * ahci: avoton port-disable reset-quirk - LP: #1458617 * Bluetooth: btusb: support public address configuration for ath3012 - LP: #1459937 * Bluetooth: btusb: Add setup callback for chip init on USB - LP: #1459937 * Bluetooth: btusb: Add support for QCA ROME chipset family - LP: #1459937 * Bluetooth: btusb: Fix incorrect type in qca_device_info - LP: #1459937 * Bluetooth: btusb: Fix minor whitespace issue in QCA ROME device entries - LP: #1459937 * Bluetooth: btusb: Add support for 0cf3:e007 - LP: #1459937 * storvsc: Set the SRB flags correctly when no data transfer is needed - LP: #1439780 * vfs: read file_handle only once in handle_to_path - LP: #1416503 - CVE-2015-1420 * ozwpan: Use unsigned ints to prevent heap overflow - LP: #1463442 - CVE-2015-4001 * ozwpan: divide-by-zero leading to panic - LP: #1463445 - CVE-2015-4003 * ozwpan: Use proper check to prevent heap overflow - LP: #1463444 - CVE-2015-4002 * ozwpan: unchecked signed subtraction leads to DoS - LP: #1463444 - CVE-2015-4002 * enclosure: fix WARN_ON removing an adapter in multi-path devices - LP: #1415178 * ASoC: tfa9879: Fix return value check in tfa9879_i2c_probe() - LP: #1465696 * ASoC: samsung: s3c24xx-i2s: Fix return value check in s3c24xx_iis_dev_probe() - LP: #1465696 * ASoC: dapm: Enable autodisable on SOC_DAPM_SINGLE_TLV_AUTODISABLE - LP: #1465696 * ASoC: rt5677: add register patch for PLL - LP: #1465696 * btrfs: unlock i_mutex after attempting to delete subvolume during send - LP: #1465696 * ALSA: hda - Fix mute-LED fixed mode - LP: #1465696 * ALSA: hda - Add mute-LED mode control to Thinkpad - LP: #1465696 * arm64: dma-mapping: always clear allocated buffers - LP: #1465696 * ALSA: emu10k1: Fix card shortname string buffer overflow - LP: #1465696 * ALSA: emux: Fix mutex deadlock at unloading - LP: #1465696 * drm/radeon: Use drm_calloc_ab for CS relocs - LP: #1465696 * drm/radeon: adjust pll when audio is not enabled - LP: #1465696 * drm/radeon: add SI DPM quirk for Sapphire R9 270 Dual-X 2G GDDR5 - LP: #1465696 * drm/radeon: fix lockup when BOs aren't part of the VM on release - LP: #1465696 * drm/radeon: reset BOs address after clearing it. - LP: #1465696 * drm/radeon: check new address before removing old one - LP: #1465696 * SCSI: add 1024 max sectors black list flag - LP: #1465696 * 3w-sas: fix command completion race - LP: #1465696 * 3w-: fix command completion race - LP: #1465696 * 3w-9xxx: fix command completion race - LP: #1465696 * uas: Allow uas_use_uas_driver to return usb-storage flags - LP: #1465696 * uas: Add US_FL_MAX_SECTORS_240 flag - LP: #1465696 * uas: Set max_sectors_240 quirk for ASM1053 devices - LP: #1465696 * usb: chipidea: otg: remove mutex unlock and lock while stop and start role - LP: #1465696 * serial: xilinx: Use platform_get_irq to get irq description structure - LP: #1465696 * serial: of-serial: Remove device_type = serial registration - LP: #1465696 * tty/serial: at91: maxburst was missing for dma transfers - LP: #1465696 * ALSA: emux: Fix mutex deadlock in OSS emulation - LP: #1465696 * ACPI / SBS: Enable battery manager when present - LP: #1465696 * ALSA: emu10k1: Emu10k2 32 bit DMA mode - LP: #1465696 * ASoC: rt5677: fixed wrong DMIC ref clock - LP: #1465696 * rbd: end I/O the entire obj_request on error - LP: #1465696 * ext4: fix data corruption caused by unwritten and delayed extents - LP: #1465696 * ext4: move check under lock scope to close a race. - LP: #1465696 * powerpc/pseries: Correct cpu affinity for dlpar added cpus - LP: #1465696 * powerpc/powernv: Restore non-volatile CRs after nap - LP: #1465696 * efivarfs: Ensure VariableName is NUL-terminated - LP: #1465696 * x86/efi: Store upper bits of command line buffer address in ext_cmd_line_ptr - LP: #1465696 * blk-mq: fix race between timeout and CPU hotplug - LP: #1465696 * blk-mq: fix CPU hotplug handling - LP: #1465696 *
[Kernel-packages] [Bug 1439780] Re: [Hyper-V] Fiber Channel critical target error
This bug was fixed in the package linux - 3.19.0-22.22 --- linux (3.19.0-22.22) vivid; urgency=low [ Brad Figg ] * Release Tracking Bug - LP: #1465755 [ Tai Nguyen ] * SAUCE: power: reset: Add syscon reboot device node for APM X-Gene platform - LP: #1463211 [ Upstream Kernel Changes ] * Revert dm crypt: fix deadlock when async crypto algorithm returns -EBUSY - LP: #1465696 * Bluetooth: ath3k: Add a new ID 0cf3:e006 to ath3k list - LP: #1459934 * cdc-acm: prevent infinite loop when parsing CDC headers. - LP: #1460657 * (upstream) libata: Blacklist queued TRIM on all Samsung 800-series - LP: #1338706, #1449005 * powerpc/powernv: Check image loaded or not before calling flash - LP: #1461553 * ahci: avoton port-disable reset-quirk - LP: #1458617 * Bluetooth: btusb: support public address configuration for ath3012 - LP: #1459937 * Bluetooth: btusb: Add setup callback for chip init on USB - LP: #1459937 * Bluetooth: btusb: Add support for QCA ROME chipset family - LP: #1459937 * Bluetooth: btusb: Fix incorrect type in qca_device_info - LP: #1459937 * Bluetooth: btusb: Fix minor whitespace issue in QCA ROME device entries - LP: #1459937 * Bluetooth: btusb: Add support for 0cf3:e007 - LP: #1459937 * storvsc: Set the SRB flags correctly when no data transfer is needed - LP: #1439780 * vfs: read file_handle only once in handle_to_path - LP: #1416503 - CVE-2015-1420 * ozwpan: Use unsigned ints to prevent heap overflow - LP: #1463442 - CVE-2015-4001 * ozwpan: divide-by-zero leading to panic - LP: #1463445 - CVE-2015-4003 * ozwpan: Use proper check to prevent heap overflow - LP: #1463444 - CVE-2015-4002 * ozwpan: unchecked signed subtraction leads to DoS - LP: #1463444 - CVE-2015-4002 * enclosure: fix WARN_ON removing an adapter in multi-path devices - LP: #1415178 * ASoC: tfa9879: Fix return value check in tfa9879_i2c_probe() - LP: #1465696 * ASoC: samsung: s3c24xx-i2s: Fix return value check in s3c24xx_iis_dev_probe() - LP: #1465696 * ASoC: dapm: Enable autodisable on SOC_DAPM_SINGLE_TLV_AUTODISABLE - LP: #1465696 * ASoC: rt5677: add register patch for PLL - LP: #1465696 * btrfs: unlock i_mutex after attempting to delete subvolume during send - LP: #1465696 * ALSA: hda - Fix mute-LED fixed mode - LP: #1465696 * ALSA: hda - Add mute-LED mode control to Thinkpad - LP: #1465696 * arm64: dma-mapping: always clear allocated buffers - LP: #1465696 * ALSA: emu10k1: Fix card shortname string buffer overflow - LP: #1465696 * ALSA: emux: Fix mutex deadlock at unloading - LP: #1465696 * drm/radeon: Use drm_calloc_ab for CS relocs - LP: #1465696 * drm/radeon: adjust pll when audio is not enabled - LP: #1465696 * drm/radeon: add SI DPM quirk for Sapphire R9 270 Dual-X 2G GDDR5 - LP: #1465696 * drm/radeon: fix lockup when BOs aren't part of the VM on release - LP: #1465696 * drm/radeon: reset BOs address after clearing it. - LP: #1465696 * drm/radeon: check new address before removing old one - LP: #1465696 * SCSI: add 1024 max sectors black list flag - LP: #1465696 * 3w-sas: fix command completion race - LP: #1465696 * 3w-: fix command completion race - LP: #1465696 * 3w-9xxx: fix command completion race - LP: #1465696 * uas: Allow uas_use_uas_driver to return usb-storage flags - LP: #1465696 * uas: Add US_FL_MAX_SECTORS_240 flag - LP: #1465696 * uas: Set max_sectors_240 quirk for ASM1053 devices - LP: #1465696 * usb: chipidea: otg: remove mutex unlock and lock while stop and start role - LP: #1465696 * serial: xilinx: Use platform_get_irq to get irq description structure - LP: #1465696 * serial: of-serial: Remove device_type = serial registration - LP: #1465696 * tty/serial: at91: maxburst was missing for dma transfers - LP: #1465696 * ALSA: emux: Fix mutex deadlock in OSS emulation - LP: #1465696 * ACPI / SBS: Enable battery manager when present - LP: #1465696 * ALSA: emu10k1: Emu10k2 32 bit DMA mode - LP: #1465696 * ASoC: rt5677: fixed wrong DMIC ref clock - LP: #1465696 * rbd: end I/O the entire obj_request on error - LP: #1465696 * ext4: fix data corruption caused by unwritten and delayed extents - LP: #1465696 * ext4: move check under lock scope to close a race. - LP: #1465696 * powerpc/pseries: Correct cpu affinity for dlpar added cpus - LP: #1465696 * powerpc/powernv: Restore non-volatile CRs after nap - LP: #1465696 * efivarfs: Ensure VariableName is NUL-terminated - LP: #1465696 * x86/efi: Store upper bits of command line buffer address in ext_cmd_line_ptr - LP: #1465696 * blk-mq: fix race between timeout and CPU hotplug - LP: #1465696 * blk-mq: fix CPU hotplug handling - LP: #1465696 *
[Kernel-packages] [Bug 1466591] Re: linux-lts-utopic: 3.16.0-41.57~14.04.1 -proposed tracker
** Description changed: This bug is for tracking the 3.16.0-41.57~14.04.1 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Thursday, 18. June 2015 17:17 UTC kernel-stable-phase:Prepare kernel-stable-phase-changed:Thursday, 18. June 2015 17:17 UTC kernel-stable-master-bug:1466250 + kernel-stable-Security-signoff-end:Thursday, 18. June 2015 20:02 UTC -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-lts-utopic in Ubuntu. https://bugs.launchpad.net/bugs/1466591 Title: linux-lts-utopic: 3.16.0-41.57~14.04.1 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: New Status in Kernel SRU Workflow package-testing series: New Status in Kernel SRU Workflow prepare-package series: New Status in Kernel SRU Workflow prepare-package-meta series: Invalid Status in Kernel SRU Workflow prepare-package-signed series: New Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: New Status in linux-lts-utopic package in Ubuntu: Invalid Status in linux-lts-utopic source package in Trusty: New Bug description: This bug is for tracking the 3.16.0-41.57~14.04.1 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Thursday, 18. June 2015 17:17 UTC kernel-stable-phase:Prepare kernel-stable-phase-changed:Thursday, 18. June 2015 17:17 UTC kernel-stable-master-bug:1466250 kernel-stable-Security-signoff-end:Thursday, 18. June 2015 20:02 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1466591/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1404409] Re: [regression] Intel 10Gb NIC Crashes
These commits may address the issue based on the stacktrace: d4bcef3fbe887ff93b58da4fcf6df1eee416e8fa 72b1405964c19b99ad9f75340249b16305cf31ab 0213668f060ea966ee8f4e6334f0fd27b6a1c428 10e4fb333c9ad72491f80bed018f8007e17060d1 53d6471cef17262d3ad1c7ce8982a234244f68ec I have test build here for 3.13, can you test with this and see if the issue happens? http://people.canonical.com/~arges/lp1404409/ Thanks, -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1404409 Title: [regression] Intel 10Gb NIC Crashes Status in linux package in Ubuntu: In Progress Bug description: I posted this to net...@vger.kernel.org as well: http://www.spinics.net/lists/netdev/msg309110.html I think the next step is to try to bisect this down to a specific commit. I'm starting to look at the instructions here: https://wiki.ubuntu.com/Kernel/KernelBisection - Previous history of this thread: http://thread.gmane.org/gmane.linux.network/326672 On 2014-11-04 22:57:19, Tom Herbert wrote: Using vlan and bonding? vlan_dev_hard_start_xmit called. A possible cause is that bonding interface is out of sync with slave interface w.r.t. GSO features. Do we know if this worked in 3.14, 3.15? I'm seeing the same sort of crash/warning (skb_war_bad_offload). It's happening on Intel 10 Gig NICs using the ixgbe driver. I'm using bridges (for virtual machines) on top of VLANs on top of 802.3ad bonding. I'm using an MTU of 9000 on the bond0 interface, but 1500 everywhere else. I'm always bonding two ports: one one system, I'm bonding two ports on identical one-port NICs; on another system, I'm bonding two ports on a single two-port NIC. Both systems exhibit the same behavior. Everything has worked fine for a couple years on Ubuntu 12.04 Precise (Linux 3.2.0). It immediately broke when I upgraded to Ubuntu 14.04 Trusty (Linux 3.13.0). I can also reproduce this using the packaged version of Linux 3.16.0 on Trusty. In contrast to other reports of this bug, disabling scatter gather on the physical interfaces (e.g. eth0) does *not* stop the crashes (assuming I disabled it correctly). I currently have two systems (one with Precise, one with Trusty) available to do any testing that you'd find helpful. Here's a first pass at getting some debugging data. The broken system (Ubuntu 14.04 Trusty): rlaager@BROKEN:~$ uname -a Linux BROKEN 3.13.0-43-generic #72-Ubuntu SMP Mon Dec 8 19:35:06 UTC 2014 x86_64 x86_64 x86_64 GNU/Linux rlaager@BROKEN:~$ ethtool -k p6p1 Features for p6p1: rx-checksumming: on tx-checksumming: on tx-checksum-ipv4: on tx-checksum-ip-generic: off [fixed] tx-checksum-ipv6: on tx-checksum-fcoe-crc: on [fixed] tx-checksum-sctp: on scatter-gather: on tx-scatter-gather: on tx-scatter-gather-fraglist: off [fixed] tcp-segmentation-offload: on tx-tcp-segmentation: on tx-tcp-ecn-segmentation: off [fixed] tx-tcp6-segmentation: on udp-fragmentation-offload: off [fixed] generic-segmentation-offload: on generic-receive-offload: on large-receive-offload: off rx-vlan-offload: on tx-vlan-offload: on ntuple-filters: off receive-hashing: on highdma: on [fixed] rx-vlan-filter: on vlan-challenged: off [fixed] tx-lockless: off [fixed] netns-local: off [fixed] tx-gso-robust: off [fixed] tx-fcoe-segmentation: on [fixed] tx-gre-segmentation: off [fixed] tx-ipip-segmentation: off [fixed] tx-sit-segmentation: off [fixed] tx-udp_tnl-segmentation: off [fixed] tx-mpls-segmentation: off [fixed] fcoe-mtu: off [fixed] tx-nocache-copy: on loopback: off [fixed] rx-fcs: off [fixed] rx-all: off tx-vlan-stag-hw-insert: off [fixed] rx-vlan-stag-hw-parse: off [fixed] rx-vlan-stag-filter: off [fixed] l2-fwd-offload: off rlaager@BROKEN:~$ ethtool -k bond0 Features for bond0: rx-checksumming: off [fixed] tx-checksumming: on tx-checksum-ipv4: off [fixed] tx-checksum-ip-generic: on tx-checksum-ipv6: off [fixed] tx-checksum-fcoe-crc: off [fixed] tx-checksum-sctp: off [fixed] scatter-gather: on tx-scatter-gather: on tx-scatter-gather-fraglist: off [requested on] tcp-segmentation-offload: on tx-tcp-segmentation: on tx-tcp-ecn-segmentation: on tx-tcp6-segmentation: on udp-fragmentation-offload: off [fixed] generic-segmentation-offload: on generic-receive-offload: on large-receive-offload: off rx-vlan-offload: on tx-vlan-offload: on ntuple-filters: off [fixed] receive-hashing: off [fixed] highdma: on rx-vlan-filter: on vlan-challenged: off [fixed] tx-lockless: on [fixed] netns-local: off [fixed] tx-gso-robust: off [fixed] tx-fcoe-segmentation: off [fixed] tx-gre-segmentation: off [fixed]
[Kernel-packages] [Bug 1354975] Re: iwlwifi Intel 7260 Wifi disconnects
Intel just released this page, which can be helpful. I don't think that replacing the supplicant is a must. But using the latest driver / firmware seems to be helpful -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-firmware in Ubuntu. https://bugs.launchpad.net/bugs/1354975 Title: iwlwifi Intel 7260 Wifi disconnects Status in Unity Linux: New Status in linux-firmware package in Ubuntu: Fix Released Bug description: I experience frequent disconnects and auth issues, never more than 30 minutes without a disconnect. Sometimes dozens of disconnects in a few minutes. This happens with the default 7260-8 firmware. Tried replacing the -8 with -9 ucode. Failed to load due to API version. This loaded the -7 driver which seems to be more stable. Tested against 2.4ghz APs (Apple, Netgear, Linksys). ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-32-generic 3.13.0-32.57 ProcVersionSignature: Ubuntu 3.13.0-32.57-generic 3.13.11.4 Uname: Linux 3.13.0-32-generic x86_64 ApportVersion: 2.14.1-0ubuntu3.3 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: steve 2577 F pulseaudio /dev/snd/controlC1: steve 2577 F pulseaudio CurrentDesktop: Unity Date: Sun Aug 10 17:49:06 2014 HibernationDevice: RESUME=UUID=374a0c1c-4ac2-456b-a67e-9ea54fe11fe6 InstallationDate: Installed on 2013-12-28 (225 days ago) InstallationMedia: Ubuntu 13.10 Saucy Salamander - Release amd64 (20131016.1) MachineType: Dell Inc. XPS 12-9Q33 ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-32-generic root=UUID=58deb355-7a09-440b-ade2-69a84fd74460 ro ipv6.disable=1 quiet splash vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-3.13.0-32-generic N/A linux-backports-modules-3.13.0-32-generic N/A linux-firmware 1.127.5 SourcePackage: linux UpgradeStatus: Upgraded to trusty on 2014-07-06 (35 days ago) dmi.bios.date: 05/06/2013 dmi.bios.vendor: Dell Inc. dmi.bios.version: A00 dmi.board.name: XPS 12-9Q33 dmi.board.vendor: Dell Inc. dmi.board.version: A00 dmi.chassis.type: 8 dmi.chassis.vendor: Dell Inc. dmi.chassis.version: Not Specified dmi.modalias: dmi:bvnDellInc.:bvrA00:bd05/06/2013:svnDellInc.:pnXPS12-9Q33:pvrA00:rvnDellInc.:rnXPS12-9Q33:rvrA00:cvnDellInc.:ct8:cvrNotSpecified: dmi.product.name: XPS 12-9Q33 dmi.product.version: A00 dmi.sys.vendor: Dell Inc. To manage notifications about this bug go to: https://bugs.launchpad.net/unitylinux/+bug/1354975/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1465755] Re: linux: 3.19.0-22.22 -proposed tracker
** Changed in: kernel-sru-workflow/security-signoff Status: Confirmed = In Progress ** Changed in: kernel-sru-workflow/security-signoff Assignee: Canonical Security Team (canonical-security) = John Johansen (jjohansen) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1465755 Title: linux: 3.19.0-22.22 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: Confirmed Status in Kernel SRU Workflow package-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Confirmed Status in Kernel SRU Workflow security-signoff series: In Progress Status in Kernel SRU Workflow verification-testing series: In Progress Status in linux package in Ubuntu: Invalid Status in linux source package in Vivid: New Bug description: This bug is for tracking the 3.19.0-22.22 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 16. June 2015 16:18 UTC kernel-stable-Prepare-package-end:Wednesday, 17. June 2015 02:02 UTC kernel-stable-Promote-to-proposed-start:Wednesday, 17. June 2015 02:02 UTC kernel-stable-Promote-to-proposed-end:Thursday, 18. June 2015 18:59 UTC kernel-stable-phase:Verification Testing kernel-stable-phase-changed:Thursday, 18. June 2015 20:00 UTC kernel-stable-Verification-testing-start:Thursday, 18. June 2015 20:00 UTC kernel-stable-Certification-testing-start:Thursday, 18. June 2015 20:00 UTC kernel-stable-Security-signoff-start:Thursday, 18. June 2015 20:00 UTC proposed-announcement-sent:True kernel-stable-Regression-testing-start:Thursday, 18. June 2015 20:00 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1465755/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1445195] Re: [Hyper-V] Kernel patches for storvsc
We tested the Utopic kernel and it works fine now. No crashes or issues and performance is better. Thanks! -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1445195 Title: [Hyper-V] Kernel patches for storvsc Status in linux package in Ubuntu: Triaged Status in linux source package in Precise: Triaged Status in linux source package in Trusty: Triaged Status in linux source package in Utopic: Triaged Status in linux source package in Vivid: Fix Committed Status in linux source package in Wily: Triaged Bug description: Storage driver performance updates for vivid K. Y. Srinivasan (7): scsi: storvsc: Increase the ring buffer size scsi: storvsc: Size the queue depth based on the ringbuffer size scsi: storvsc: Always send on the selected outgoing channel scsi: storvsc: Retrieve information about the capability of the target scsi: storvsc: Fix a bug in copy_from_bounce_buffer() scsi: storvsc: Don't assume that the scatterlist is not chained scsi: storvsc: Set the tablesize based on the information given by the host To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1445195/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1463445] Re: CVE-2015-4003
This bug was fixed in the package linux - 3.19.0-22.22 --- linux (3.19.0-22.22) vivid; urgency=low [ Brad Figg ] * Release Tracking Bug - LP: #1465755 [ Tai Nguyen ] * SAUCE: power: reset: Add syscon reboot device node for APM X-Gene platform - LP: #1463211 [ Upstream Kernel Changes ] * Revert dm crypt: fix deadlock when async crypto algorithm returns -EBUSY - LP: #1465696 * Bluetooth: ath3k: Add a new ID 0cf3:e006 to ath3k list - LP: #1459934 * cdc-acm: prevent infinite loop when parsing CDC headers. - LP: #1460657 * (upstream) libata: Blacklist queued TRIM on all Samsung 800-series - LP: #1338706, #1449005 * powerpc/powernv: Check image loaded or not before calling flash - LP: #1461553 * ahci: avoton port-disable reset-quirk - LP: #1458617 * Bluetooth: btusb: support public address configuration for ath3012 - LP: #1459937 * Bluetooth: btusb: Add setup callback for chip init on USB - LP: #1459937 * Bluetooth: btusb: Add support for QCA ROME chipset family - LP: #1459937 * Bluetooth: btusb: Fix incorrect type in qca_device_info - LP: #1459937 * Bluetooth: btusb: Fix minor whitespace issue in QCA ROME device entries - LP: #1459937 * Bluetooth: btusb: Add support for 0cf3:e007 - LP: #1459937 * storvsc: Set the SRB flags correctly when no data transfer is needed - LP: #1439780 * vfs: read file_handle only once in handle_to_path - LP: #1416503 - CVE-2015-1420 * ozwpan: Use unsigned ints to prevent heap overflow - LP: #1463442 - CVE-2015-4001 * ozwpan: divide-by-zero leading to panic - LP: #1463445 - CVE-2015-4003 * ozwpan: Use proper check to prevent heap overflow - LP: #1463444 - CVE-2015-4002 * ozwpan: unchecked signed subtraction leads to DoS - LP: #1463444 - CVE-2015-4002 * enclosure: fix WARN_ON removing an adapter in multi-path devices - LP: #1415178 * ASoC: tfa9879: Fix return value check in tfa9879_i2c_probe() - LP: #1465696 * ASoC: samsung: s3c24xx-i2s: Fix return value check in s3c24xx_iis_dev_probe() - LP: #1465696 * ASoC: dapm: Enable autodisable on SOC_DAPM_SINGLE_TLV_AUTODISABLE - LP: #1465696 * ASoC: rt5677: add register patch for PLL - LP: #1465696 * btrfs: unlock i_mutex after attempting to delete subvolume during send - LP: #1465696 * ALSA: hda - Fix mute-LED fixed mode - LP: #1465696 * ALSA: hda - Add mute-LED mode control to Thinkpad - LP: #1465696 * arm64: dma-mapping: always clear allocated buffers - LP: #1465696 * ALSA: emu10k1: Fix card shortname string buffer overflow - LP: #1465696 * ALSA: emux: Fix mutex deadlock at unloading - LP: #1465696 * drm/radeon: Use drm_calloc_ab for CS relocs - LP: #1465696 * drm/radeon: adjust pll when audio is not enabled - LP: #1465696 * drm/radeon: add SI DPM quirk for Sapphire R9 270 Dual-X 2G GDDR5 - LP: #1465696 * drm/radeon: fix lockup when BOs aren't part of the VM on release - LP: #1465696 * drm/radeon: reset BOs address after clearing it. - LP: #1465696 * drm/radeon: check new address before removing old one - LP: #1465696 * SCSI: add 1024 max sectors black list flag - LP: #1465696 * 3w-sas: fix command completion race - LP: #1465696 * 3w-: fix command completion race - LP: #1465696 * 3w-9xxx: fix command completion race - LP: #1465696 * uas: Allow uas_use_uas_driver to return usb-storage flags - LP: #1465696 * uas: Add US_FL_MAX_SECTORS_240 flag - LP: #1465696 * uas: Set max_sectors_240 quirk for ASM1053 devices - LP: #1465696 * usb: chipidea: otg: remove mutex unlock and lock while stop and start role - LP: #1465696 * serial: xilinx: Use platform_get_irq to get irq description structure - LP: #1465696 * serial: of-serial: Remove device_type = serial registration - LP: #1465696 * tty/serial: at91: maxburst was missing for dma transfers - LP: #1465696 * ALSA: emux: Fix mutex deadlock in OSS emulation - LP: #1465696 * ACPI / SBS: Enable battery manager when present - LP: #1465696 * ALSA: emu10k1: Emu10k2 32 bit DMA mode - LP: #1465696 * ASoC: rt5677: fixed wrong DMIC ref clock - LP: #1465696 * rbd: end I/O the entire obj_request on error - LP: #1465696 * ext4: fix data corruption caused by unwritten and delayed extents - LP: #1465696 * ext4: move check under lock scope to close a race. - LP: #1465696 * powerpc/pseries: Correct cpu affinity for dlpar added cpus - LP: #1465696 * powerpc/powernv: Restore non-volatile CRs after nap - LP: #1465696 * efivarfs: Ensure VariableName is NUL-terminated - LP: #1465696 * x86/efi: Store upper bits of command line buffer address in ext_cmd_line_ptr - LP: #1465696 * blk-mq: fix race between timeout and CPU hotplug - LP: #1465696 * blk-mq: fix CPU hotplug handling - LP: #1465696 *
[Kernel-packages] [Bug 1465755] Re: linux: 3.19.0-22.22 -proposed tracker
This bug was fixed in the package linux - 3.19.0-22.22 --- linux (3.19.0-22.22) vivid; urgency=low [ Brad Figg ] * Release Tracking Bug - LP: #1465755 [ Tai Nguyen ] * SAUCE: power: reset: Add syscon reboot device node for APM X-Gene platform - LP: #1463211 [ Upstream Kernel Changes ] * Revert dm crypt: fix deadlock when async crypto algorithm returns -EBUSY - LP: #1465696 * Bluetooth: ath3k: Add a new ID 0cf3:e006 to ath3k list - LP: #1459934 * cdc-acm: prevent infinite loop when parsing CDC headers. - LP: #1460657 * (upstream) libata: Blacklist queued TRIM on all Samsung 800-series - LP: #1338706, #1449005 * powerpc/powernv: Check image loaded or not before calling flash - LP: #1461553 * ahci: avoton port-disable reset-quirk - LP: #1458617 * Bluetooth: btusb: support public address configuration for ath3012 - LP: #1459937 * Bluetooth: btusb: Add setup callback for chip init on USB - LP: #1459937 * Bluetooth: btusb: Add support for QCA ROME chipset family - LP: #1459937 * Bluetooth: btusb: Fix incorrect type in qca_device_info - LP: #1459937 * Bluetooth: btusb: Fix minor whitespace issue in QCA ROME device entries - LP: #1459937 * Bluetooth: btusb: Add support for 0cf3:e007 - LP: #1459937 * storvsc: Set the SRB flags correctly when no data transfer is needed - LP: #1439780 * vfs: read file_handle only once in handle_to_path - LP: #1416503 - CVE-2015-1420 * ozwpan: Use unsigned ints to prevent heap overflow - LP: #1463442 - CVE-2015-4001 * ozwpan: divide-by-zero leading to panic - LP: #1463445 - CVE-2015-4003 * ozwpan: Use proper check to prevent heap overflow - LP: #1463444 - CVE-2015-4002 * ozwpan: unchecked signed subtraction leads to DoS - LP: #1463444 - CVE-2015-4002 * enclosure: fix WARN_ON removing an adapter in multi-path devices - LP: #1415178 * ASoC: tfa9879: Fix return value check in tfa9879_i2c_probe() - LP: #1465696 * ASoC: samsung: s3c24xx-i2s: Fix return value check in s3c24xx_iis_dev_probe() - LP: #1465696 * ASoC: dapm: Enable autodisable on SOC_DAPM_SINGLE_TLV_AUTODISABLE - LP: #1465696 * ASoC: rt5677: add register patch for PLL - LP: #1465696 * btrfs: unlock i_mutex after attempting to delete subvolume during send - LP: #1465696 * ALSA: hda - Fix mute-LED fixed mode - LP: #1465696 * ALSA: hda - Add mute-LED mode control to Thinkpad - LP: #1465696 * arm64: dma-mapping: always clear allocated buffers - LP: #1465696 * ALSA: emu10k1: Fix card shortname string buffer overflow - LP: #1465696 * ALSA: emux: Fix mutex deadlock at unloading - LP: #1465696 * drm/radeon: Use drm_calloc_ab for CS relocs - LP: #1465696 * drm/radeon: adjust pll when audio is not enabled - LP: #1465696 * drm/radeon: add SI DPM quirk for Sapphire R9 270 Dual-X 2G GDDR5 - LP: #1465696 * drm/radeon: fix lockup when BOs aren't part of the VM on release - LP: #1465696 * drm/radeon: reset BOs address after clearing it. - LP: #1465696 * drm/radeon: check new address before removing old one - LP: #1465696 * SCSI: add 1024 max sectors black list flag - LP: #1465696 * 3w-sas: fix command completion race - LP: #1465696 * 3w-: fix command completion race - LP: #1465696 * 3w-9xxx: fix command completion race - LP: #1465696 * uas: Allow uas_use_uas_driver to return usb-storage flags - LP: #1465696 * uas: Add US_FL_MAX_SECTORS_240 flag - LP: #1465696 * uas: Set max_sectors_240 quirk for ASM1053 devices - LP: #1465696 * usb: chipidea: otg: remove mutex unlock and lock while stop and start role - LP: #1465696 * serial: xilinx: Use platform_get_irq to get irq description structure - LP: #1465696 * serial: of-serial: Remove device_type = serial registration - LP: #1465696 * tty/serial: at91: maxburst was missing for dma transfers - LP: #1465696 * ALSA: emux: Fix mutex deadlock in OSS emulation - LP: #1465696 * ACPI / SBS: Enable battery manager when present - LP: #1465696 * ALSA: emu10k1: Emu10k2 32 bit DMA mode - LP: #1465696 * ASoC: rt5677: fixed wrong DMIC ref clock - LP: #1465696 * rbd: end I/O the entire obj_request on error - LP: #1465696 * ext4: fix data corruption caused by unwritten and delayed extents - LP: #1465696 * ext4: move check under lock scope to close a race. - LP: #1465696 * powerpc/pseries: Correct cpu affinity for dlpar added cpus - LP: #1465696 * powerpc/powernv: Restore non-volatile CRs after nap - LP: #1465696 * efivarfs: Ensure VariableName is NUL-terminated - LP: #1465696 * x86/efi: Store upper bits of command line buffer address in ext_cmd_line_ptr - LP: #1465696 * blk-mq: fix race between timeout and CPU hotplug - LP: #1465696 * blk-mq: fix CPU hotplug handling - LP: #1465696 *
[Kernel-packages] [Bug 1465696] Re: Vivid update to 3.19.8-ckt1 stable release
This bug was fixed in the package linux - 3.19.0-22.22 --- linux (3.19.0-22.22) vivid; urgency=low [ Brad Figg ] * Release Tracking Bug - LP: #1465755 [ Tai Nguyen ] * SAUCE: power: reset: Add syscon reboot device node for APM X-Gene platform - LP: #1463211 [ Upstream Kernel Changes ] * Revert dm crypt: fix deadlock when async crypto algorithm returns -EBUSY - LP: #1465696 * Bluetooth: ath3k: Add a new ID 0cf3:e006 to ath3k list - LP: #1459934 * cdc-acm: prevent infinite loop when parsing CDC headers. - LP: #1460657 * (upstream) libata: Blacklist queued TRIM on all Samsung 800-series - LP: #1338706, #1449005 * powerpc/powernv: Check image loaded or not before calling flash - LP: #1461553 * ahci: avoton port-disable reset-quirk - LP: #1458617 * Bluetooth: btusb: support public address configuration for ath3012 - LP: #1459937 * Bluetooth: btusb: Add setup callback for chip init on USB - LP: #1459937 * Bluetooth: btusb: Add support for QCA ROME chipset family - LP: #1459937 * Bluetooth: btusb: Fix incorrect type in qca_device_info - LP: #1459937 * Bluetooth: btusb: Fix minor whitespace issue in QCA ROME device entries - LP: #1459937 * Bluetooth: btusb: Add support for 0cf3:e007 - LP: #1459937 * storvsc: Set the SRB flags correctly when no data transfer is needed - LP: #1439780 * vfs: read file_handle only once in handle_to_path - LP: #1416503 - CVE-2015-1420 * ozwpan: Use unsigned ints to prevent heap overflow - LP: #1463442 - CVE-2015-4001 * ozwpan: divide-by-zero leading to panic - LP: #1463445 - CVE-2015-4003 * ozwpan: Use proper check to prevent heap overflow - LP: #1463444 - CVE-2015-4002 * ozwpan: unchecked signed subtraction leads to DoS - LP: #1463444 - CVE-2015-4002 * enclosure: fix WARN_ON removing an adapter in multi-path devices - LP: #1415178 * ASoC: tfa9879: Fix return value check in tfa9879_i2c_probe() - LP: #1465696 * ASoC: samsung: s3c24xx-i2s: Fix return value check in s3c24xx_iis_dev_probe() - LP: #1465696 * ASoC: dapm: Enable autodisable on SOC_DAPM_SINGLE_TLV_AUTODISABLE - LP: #1465696 * ASoC: rt5677: add register patch for PLL - LP: #1465696 * btrfs: unlock i_mutex after attempting to delete subvolume during send - LP: #1465696 * ALSA: hda - Fix mute-LED fixed mode - LP: #1465696 * ALSA: hda - Add mute-LED mode control to Thinkpad - LP: #1465696 * arm64: dma-mapping: always clear allocated buffers - LP: #1465696 * ALSA: emu10k1: Fix card shortname string buffer overflow - LP: #1465696 * ALSA: emux: Fix mutex deadlock at unloading - LP: #1465696 * drm/radeon: Use drm_calloc_ab for CS relocs - LP: #1465696 * drm/radeon: adjust pll when audio is not enabled - LP: #1465696 * drm/radeon: add SI DPM quirk for Sapphire R9 270 Dual-X 2G GDDR5 - LP: #1465696 * drm/radeon: fix lockup when BOs aren't part of the VM on release - LP: #1465696 * drm/radeon: reset BOs address after clearing it. - LP: #1465696 * drm/radeon: check new address before removing old one - LP: #1465696 * SCSI: add 1024 max sectors black list flag - LP: #1465696 * 3w-sas: fix command completion race - LP: #1465696 * 3w-: fix command completion race - LP: #1465696 * 3w-9xxx: fix command completion race - LP: #1465696 * uas: Allow uas_use_uas_driver to return usb-storage flags - LP: #1465696 * uas: Add US_FL_MAX_SECTORS_240 flag - LP: #1465696 * uas: Set max_sectors_240 quirk for ASM1053 devices - LP: #1465696 * usb: chipidea: otg: remove mutex unlock and lock while stop and start role - LP: #1465696 * serial: xilinx: Use platform_get_irq to get irq description structure - LP: #1465696 * serial: of-serial: Remove device_type = serial registration - LP: #1465696 * tty/serial: at91: maxburst was missing for dma transfers - LP: #1465696 * ALSA: emux: Fix mutex deadlock in OSS emulation - LP: #1465696 * ACPI / SBS: Enable battery manager when present - LP: #1465696 * ALSA: emu10k1: Emu10k2 32 bit DMA mode - LP: #1465696 * ASoC: rt5677: fixed wrong DMIC ref clock - LP: #1465696 * rbd: end I/O the entire obj_request on error - LP: #1465696 * ext4: fix data corruption caused by unwritten and delayed extents - LP: #1465696 * ext4: move check under lock scope to close a race. - LP: #1465696 * powerpc/pseries: Correct cpu affinity for dlpar added cpus - LP: #1465696 * powerpc/powernv: Restore non-volatile CRs after nap - LP: #1465696 * efivarfs: Ensure VariableName is NUL-terminated - LP: #1465696 * x86/efi: Store upper bits of command line buffer address in ext_cmd_line_ptr - LP: #1465696 * blk-mq: fix race between timeout and CPU hotplug - LP: #1465696 * blk-mq: fix CPU hotplug handling - LP: #1465696 *
[Kernel-packages] [Bug 1425576] Re: Occasional crash in APM xgene enet driver on kernels prior to v3.19
Finally I figured out one approach to reproduce it quickly, see the attachment log. ** Attachment added: crash log in trusty https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1425576/+attachment/4416913/+files/dmesg-trusty.log -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1425576 Title: Occasional crash in APM xgene enet driver on kernels prior to v3.19 Status in linux package in Ubuntu: Triaged Status in linux source package in Trusty: In Progress Status in linux source package in Utopic: In Progress Bug description: [Impact] System panics every few hours under constant network load [Test Case] On the X-Gene system, start an iperf server: $ iperf -s Connect to it from another system (1Gbps is sufficient) $ iperf -t 10 -c xgene host On failure, you'll get a panic within several hours. [Regression Risk] The proposed patch only touches the impacted driver. It is adding a memory barrier - albeit a lightweight one - so there is the risk of a performance degradation. Indeed, when measured using a 60s iperf run, I do see a performance drop, but by 0.5%. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1425576/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1425576] Re: Occasional crash in APM xgene enet driver on kernels prior to v3.19
** Attachment added: crash log in utopic https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1425576/+attachment/4416914/+files/dmesg-utopic.log -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1425576 Title: Occasional crash in APM xgene enet driver on kernels prior to v3.19 Status in linux package in Ubuntu: Triaged Status in linux source package in Trusty: In Progress Status in linux source package in Utopic: In Progress Bug description: [Impact] System panics every few hours under constant network load [Test Case] On the X-Gene system, start an iperf server: $ iperf -s Connect to it from another system (1Gbps is sufficient) $ iperf -t 10 -c xgene host On failure, you'll get a panic within several hours. [Regression Risk] The proposed patch only touches the impacted driver. It is adding a memory barrier - albeit a lightweight one - so there is the risk of a performance degradation. Indeed, when measured using a 60s iperf run, I do see a performance drop, but by 0.5%. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1425576/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp