[Kernel-packages] [Bug 1293569] Re: iwlwifi-7260-8.ucode causes network disconnections problems

2015-06-18 Thread spinxz
Same problem on Lenovo Carbon X1 gen2 with Intel Wireless 7260 (rev 83).
Using Ubuntu 15.04 with 3.19.0-21 kernel (x86_64).
Bluetooth is soft-blocked with rfkill but this does not solve the problem.

I constantly get disconnects:

wlan0: deauthenticating from ... by local choice (Reason:
3=DEAUTH_LEAVING)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launchpad.net/bugs/1293569

Title:
  iwlwifi-7260-8.ucode causes network disconnections problems

Status in The Linux Mint Distribution:
  New
Status in linux-firmware package in Ubuntu:
  Invalid
Status in linux-firmware source package in Precise:
  Fix Released
Status in linux-firmware source package in Trusty:
  Fix Released

Bug description:
  Running 14.04 (beta) with Kernel 3.13.0-17-generic

  I've encountered a strange and reproducible error with the
  iwlwifi-7260-8.ucode firmware.

  This laptop is a Dell XPS 12 (haswell). With the -8 firmware, it will
  connect fine to wifi for 30 or 40 mins at a time, then will start
  dropping connections repeatedly. Even modprobe -r unloading and
  reloading doesn't fix the issue, only a reboot will temporarily solve
  it for 40 mins at a time.

  Moreover, here is what's strange, is during these episodes of
  disconnection it seems to affect the actual router (2Wire), as the
  other devices in the house will also start to have issues (very slow
  connections, limited range,etc).  Once I reboot this laptop everything
  and all devices will return to normal.

  This issue has been fixed by me manually removing the -8 firware from
  /lib/firmware and letting the -7 firmware load instead. Since that has
  been done there has not been a single issue of this happening (now
  going on 4 days).

  let me know if there is any other information you would like me to
  provide.

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: linux-firmware 1.126
  ProcVersionSignature: Ubuntu 3.13.0-17.37-generic 3.13.6
  Uname: Linux 3.13.0-17-generic x86_64
  ApportVersion: 2.13.3-0ubuntu1
  Architecture: amd64
  CurrentDesktop: Unity
  Date: Mon Mar 17 08:13:25 2014
  Dependencies:
   
  EcryptfsInUse: Yes
  InstallationDate: Installed on 2014-03-07 (9 days ago)
  InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Alpha amd64 (20140307)
  PackageArchitecture: all
  SourcePackage: linux-firmware
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/linuxmint/+bug/1293569/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1454975] Re: AMD Radeon HD 8570 / R7 240/340 OEM] [1002:6611] No DP audio with the open source driver

2015-06-18 Thread David Henningsson
** Changed in: hwe-next
   Status: New = Incomplete

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-utopic in Ubuntu.
https://bugs.launchpad.net/bugs/1454975

Title:
  AMD Radeon HD 8570 / R7 240/340 OEM] [1002:6611] No DP audio with the
  open source driver

Status in HWE Next Project:
  Incomplete
Status in linux-lts-utopic package in Ubuntu:
  New

Bug description:
  CID: 201302-12679 Dell OptiPlex 9020

  There is no audio output available from the DisplayPort with the open source 
driver.
  There are two output options here in the Sound Settings: Analog Output and 
Speaker
  Non of them could make the DP audio device (the speaker on the monitor) work.

  Also, this is a desktop system, I can't hear anything with the Speaker
  option.

  Since we're unable to install the fglrx now, I will mark this one as a
  blocker.

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.16.0-37-generic 3.16.0-37.51~14.04.1
  ProcVersionSignature: Ubuntu 3.16.0-37.51~14.04.1-generic 3.16.7-ckt9
  Uname: Linux 3.16.0-37-generic x86_64
  ApportVersion: 2.14.1-0ubuntu3.10
  Architecture: amd64
  CurrentDesktop: Unity
  Date: Wed May 13 23:52:37 2015
  InstallationDate: Installed on 2015-05-13 (0 days ago)
  InstallationMedia: Ubuntu 14.04.2 LTS Trusty Tahr - Release amd64 
(20150218.1)
  SourcePackage: linux-lts-utopic
  UpgradeStatus: No upgrade log present (probably fresh install)
  --- 
  ApportVersion: 2.14.1-0ubuntu3.10
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  ubuntu 1697 F pulseaudio
   /dev/snd/controlC1:  ubuntu 1697 F pulseaudio
  CurrentDesktop: Unity
  DistroRelease: Ubuntu 14.04
  HibernationDevice: RESUME=UUID=9201b911-af8a-4fe9-a8b1-544f1f394b6a
  InstallationDate: Installed on 2015-05-13 (0 days ago)
  InstallationMedia: Ubuntu 14.04.2 LTS Trusty Tahr - Release amd64 
(20150218.1)
  IwConfig:
   eth0  no wireless extensions.
   
   lono wireless extensions.
  MachineType: Dell Inc. OptiPlex 9020
  Package: linux (not installed)
  ProcFB: 0 radeondrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.16.0-37-generic 
root=UUID=9d6f549c-046c-4193-b58e-5ee4df6c0e0b ro quiet splash vt.handoff=7
  ProcVersionSignature: Ubuntu 3.16.0-37.51~14.04.1-generic 3.16.7-ckt9
  RelatedPackageVersions:
   linux-restricted-modules-3.16.0-37-generic N/A
   linux-backports-modules-3.16.0-37-generic  N/A
   linux-firmware 1.127.11
  RfKill:
   
  Tags:  trusty
  Uname: Linux 3.16.0-37-generic x86_64
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo
  _MarkForUpload: True
  dmi.bios.date: 09/17/2013
  dmi.bios.vendor: Dell Inc.
  dmi.bios.version: A03
  dmi.board.vendor: Dell Inc.
  dmi.chassis.type: 15
  dmi.chassis.vendor: Dell Inc.
  dmi.modalias: 
dmi:bvnDellInc.:bvrA03:bd09/17/2013:svnDellInc.:pnOptiPlex9020:pvr01:rvnDellInc.:rn:rvr:cvnDellInc.:ct15:cvr:
  dmi.product.name: OptiPlex 9020
  dmi.product.version: 01
  dmi.sys.vendor: Dell Inc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1454975/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1338706] Re: Samsung SSD 840 failed to get NCQ Send/Recv Log Emask 0x1 failed to set xfermode (err_mask=0x40) on upstream kernels = 3.12

2015-06-18 Thread CvB
There are problems with the 850 Pro as well, see, e.g.:

http://ubuntuforums.org/showthread.php?t=2282808p=13305283

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1338706

Title:
  Samsung SSD 840 failed to get NCQ Send/Recv Log Emask 0x1 failed to
  set xfermode (err_mask=0x40) on upstream kernels = 3.12

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Trusty:
  Fix Committed
Status in linux source package in Utopic:
  Fix Committed
Status in linux source package in Vivid:
  Fix Committed
Status in linux source package in Wily:
  Invalid

Bug description:
  [Impact]

   * Users with Samsung 8** SSD drives see miscellaneous errors and
  warning messages in the logs depending on the firmware level of the
  drive while booting or after running trim.

  [Test Case]

   * Run this script, and then check logs for errors.
  #!/bin/bash

  git clone git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
  for i in {0..10} ; do
   cp -r linux linux$i
  done
  rm -rf linux*
  echo sudo fstrim requires your password
  sudo fstrim ./

  [Regression Potential]

   * There is very little regression potential as this change simply
  prevents NCQ trim from being used on Samsung 8** drives.

  [Other Info]

   * Commit is upstream.
   * Greatly increasing the timeout for the drives seems to relieve the timeout 
errors.  This may be due to trimming large numbers of sectors with single 
commands.  It may be prudent for future upstream to break up large trims into 
multiple requests on smaller regions.

  ===Original Bug description ==
  Samsung SSD 840 Series failed to get NCQ Send/Recv Log Emask 0x1.

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.13.0-30-generic 3.13.0-30.55
  ProcVersionSignature: Ubuntu 3.13.0-30.55-generic 3.13.11.2
  Uname: Linux 3.13.0-30-generic x86_64
  ApportVersion: 2.14.1-0ubuntu3.2
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  user   2131 F pulseaudio
  CurrentDesktop: Unity
  Date: Mon Jul  7 20:01:28 2014
  HibernationDevice: RESUME=UUID=685afcb7-7aa6-4048-af15-091d3bcd3b35
  InstallationDate: Installed on 2014-06-22 (14 days ago)
  InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Release amd64 (20140417)
  IwConfig:
   eth0  no wireless extensions.

   lono wireless extensions.
  MachineType: System manufacturer System Product Name
  ProcFB: 0 nouveaufb
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.13.0-30-generic 
root=UUID=d7c2e1cb-d046-460c-83b8-0cfbb330d095 ro quiet splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-3.13.0-30-generic N/A
   linux-backports-modules-3.13.0-30-generic  N/A
   linux-firmware 1.127.4
  RfKill:

  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 09/10/2010
  dmi.bios.vendor: American Megatrends Inc.
  dmi.bios.version: 0901
  dmi.board.asset.tag: To Be Filled By O.E.M.
  dmi.board.name: M3N78-EM
  dmi.board.vendor: ASUSTeK Computer INC.
  dmi.board.version: Rev X.0x
  dmi.chassis.asset.tag: Asset-1234567890
  dmi.chassis.type: 3
  dmi.chassis.vendor: Chassis Manufacture
  dmi.chassis.version: Chassis Version
  dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvr0901:bd09/10/2010:svnSystemmanufacturer:pnSystemProductName:pvrSystemVersion:rvnASUSTeKComputerINC.:rnM3N78-EM:rvrRevX.0x:cvnChassisManufacture:ct3:cvrChassisVersion:
  dmi.product.name: System Product Name
  dmi.product.version: System Version
  dmi.sys.vendor: System manufacturer

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1338706/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1297049] Re: [Dell Inc. Latitude E6420] suspend/resume failure [non-free: nvidia]

2015-06-18 Thread Ian Ozsvald
** This bug is no longer a duplicate of bug 1275621
   [Hewlett-Packard HP Pavilion dv6 Notebook PC] suspend/resume failure

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1297049

Title:
  [Dell Inc. Latitude E6420] suspend/resume failure [non-free: nvidia]

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  apport detected this error on a fresh boot.

  ProblemType: KernelOops
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.13.0-19-generic 3.13.0-19.40
  ProcVersionSignature: Ubuntu 3.13.0-19.40-generic 3.13.6
  Uname: Linux 3.13.0-19-generic x86_64
  NonfreeKernelModules: nvidia
  Annotation: This occured during a previous suspend and prevented it from 
resuming properly.
  ApportVersion: 2.13.3-0ubuntu1
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC1:  rgarner2756 F pulseaudio
   /dev/snd/pcmC1D0c:   rgarner2756 F...m pulseaudio
   /dev/snd/controlC2:  rgarner2756 F pulseaudio
   /dev/snd/controlC0:  rgarner2756 F pulseaudio
  Date: Tue Mar 25 10:20:28 2014
  ExecutablePath: /usr/share/apport/apportcheckresume
  Failure: suspend/resume
  HibernationDevice: RESUME=UUID=c7ef60d1-697d-4495-bb69-10665128efd3
  InstallationDate: Installed on 2014-01-27 (55 days ago)
  InstallationMedia: Xubuntu 14.04 LTS Trusty Tahr - Alpha amd64 (20140121.1)
  InterpreterPath: /usr/bin/python3.4
  MachineType: Dell Inc. Latitude E6420
  ProcCmdline: /usr/bin/python3 /usr/share/apport/apportcheckresume
  ProcEnviron:
   TERM=linux
   PATH=(custom, no user)
  ProcFB:
   
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-19-generic 
root=UUID=e960e3c7-aa3d-43d3-9178-7719d9023e08 ro quiet splash
  PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No 
PulseAudio daemon running, or not running as session daemon.
  RelatedPackageVersions:
   linux-restricted-modules-3.13.0-19-generic N/A
   linux-backports-modules-3.13.0-19-generic  N/A
   linux-firmware 1.126
  SourcePackage: linux
  Title: [Dell Inc. Latitude E6420] suspend/resume failure [non-free: nvidia]
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups:
   
  dmi.bios.date: 01/01/2013
  dmi.bios.vendor: Dell Inc.
  dmi.bios.version: A16
  dmi.board.name: 032T9K
  dmi.board.vendor: Dell Inc.
  dmi.board.version: A02
  dmi.chassis.type: 9
  dmi.chassis.vendor: Dell Inc.
  dmi.modalias: 
dmi:bvnDellInc.:bvrA16:bd01/01/2013:svnDellInc.:pnLatitudeE6420:pvr01:rvnDellInc.:rn032T9K:rvrA02:cvnDellInc.:ct9:cvr:
  dmi.product.name: Latitude E6420
  dmi.product.version: 01
  dmi.sys.vendor: Dell Inc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1297049/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1466349] Re: linux-lts-trusty: 3.13.0-55.94~precise1 -proposed tracker

2015-06-18 Thread Brad Figg
** Changed in: kernel-sru-workflow/prepare-package-signed
   Status: New = Fix Released

** Changed in: kernel-sru-workflow/prepare-package-signed
 Assignee: Canonical Kernel Team (canonical-kernel-team) = Luis Henriques 
(henrix)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-trusty in Ubuntu.
https://bugs.launchpad.net/bugs/1466349

Title:
  linux-lts-trusty: 3.13.0-55.94~precise1 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  New
Status in Kernel SRU Workflow package-testing series:
  New
Status in Kernel SRU Workflow prepare-package series:
  New
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-trusty source package in Precise:
  New

Bug description:
  This bug is for tracking the 3.13.0-55.94~precise1 upload package.
  This bug will contain status and testing results related to that
  upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Thursday, 18. June 2015 07:02 UTC
  kernel-stable-phase:Prepare
  kernel-stable-phase-changed:Thursday, 18. June 2015 07:02 UTC
  kernel-stable-master-bug:1466237

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1466349/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1466267] Re: linux-armadaxp: 3.2.0-1652.73 -proposed tracker

2015-06-18 Thread Adam Conrad
** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: Fix Released = Invalid

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1466267

Title:
  linux-armadaxp: 3.2.0-1652.73 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow package-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Invalid
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow upload-to-ppa series:
  Invalid
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-armadaxp source package in Precise:
  In Progress

Bug description:
  This bug is for tracking the 3.2.0-1652.73 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Thursday, 18. June 2015 01:02 UTC
  kernel-stable-master-bug:1466215
  kernel-stable-Certification-testing-end:Thursday, 18. June 2015 04:01 UTC
  kernel-stable-Security-signoff-end:Thursday, 18. June 2015 04:01 UTC
  kernel-stable-phase:CopyToProposed
  kernel-stable-Prepare-package-end:Thursday, 18. June 2015 06:01 UTC
  kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 06:01 UTC
  kernel-stable-phase-changed:Thursday, 18. June 2015 06:01 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1466267/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1466349] Re: linux-lts-trusty: 3.13.0-55.94~precise1 -proposed tracker

2015-06-18 Thread Adam Conrad
Security Sign-off: This kernel is a 1-commit respin for a regression
from a security update.

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: Fix Released = Invalid

** Changed in: kernel-sru-workflow/security-signoff
   Status: New = Fix Released

** Changed in: kernel-sru-workflow/security-signoff
 Assignee: Canonical Security Team (canonical-security) = Adam Conrad 
(adconrad)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-trusty in Ubuntu.
https://bugs.launchpad.net/bugs/1466349

Title:
  linux-lts-trusty: 3.13.0-55.94~precise1 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  New
Status in Kernel SRU Workflow package-testing series:
  New
Status in Kernel SRU Workflow prepare-package series:
  New
Status in Kernel SRU Workflow prepare-package-meta series:
  Invalid
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-trusty source package in Precise:
  New

Bug description:
  This bug is for tracking the 3.13.0-55.94~precise1 upload package.
  This bug will contain status and testing results related to that
  upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Thursday, 18. June 2015 07:02 UTC
  kernel-stable-phase:Prepare
  kernel-stable-phase-changed:Thursday, 18. June 2015 07:02 UTC
  kernel-stable-master-bug:1466237
  kernel-stable-Security-signoff-end:Thursday, 18. June 2015 13:32 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1466349/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1354975] Re: iwlwifi Intel 7260 Wifi disconnects

2015-06-18 Thread spinxz
Same problem on Lenovo Carbon X1 gen2 with Intel Wireless 7260 (rev 83).
Using Ubuntu 15.04 with 3.19.0-21 kernel (x86_64).
Bluetooth is soft-blocked with rfkill but this does not solve the problem.

I constantly get disconnects:

wlan0: deauthenticating from ... by local choice (Reason:
3=DEAUTH_LEAVING)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launchpad.net/bugs/1354975

Title:
  iwlwifi Intel 7260 Wifi disconnects

Status in Unity Linux:
  New
Status in linux-firmware package in Ubuntu:
  Fix Released

Bug description:
  I experience frequent disconnects and auth issues, never more than 30
  minutes without a disconnect. Sometimes dozens of disconnects in a few
  minutes.

  This happens with the default 7260-8 firmware.
  Tried replacing the -8 with -9 ucode. Failed to load due to API version. This 
loaded the -7 driver which seems to be more stable.

  Tested against 2.4ghz APs (Apple, Netgear, Linksys).

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.13.0-32-generic 3.13.0-32.57
  ProcVersionSignature: Ubuntu 3.13.0-32.57-generic 3.13.11.4
  Uname: Linux 3.13.0-32-generic x86_64
  ApportVersion: 2.14.1-0ubuntu3.3
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  steve  2577 F pulseaudio
   /dev/snd/controlC1:  steve  2577 F pulseaudio
  CurrentDesktop: Unity
  Date: Sun Aug 10 17:49:06 2014
  HibernationDevice: RESUME=UUID=374a0c1c-4ac2-456b-a67e-9ea54fe11fe6
  InstallationDate: Installed on 2013-12-28 (225 days ago)
  InstallationMedia: Ubuntu 13.10 Saucy Salamander - Release amd64 
(20131016.1)
  MachineType: Dell Inc. XPS 12-9Q33
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-32-generic 
root=UUID=58deb355-7a09-440b-ade2-69a84fd74460 ro ipv6.disable=1 quiet splash 
vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-3.13.0-32-generic N/A
   linux-backports-modules-3.13.0-32-generic  N/A
   linux-firmware 1.127.5
  SourcePackage: linux
  UpgradeStatus: Upgraded to trusty on 2014-07-06 (35 days ago)
  dmi.bios.date: 05/06/2013
  dmi.bios.vendor: Dell Inc.
  dmi.bios.version: A00
  dmi.board.name: XPS 12-9Q33
  dmi.board.vendor: Dell Inc.
  dmi.board.version: A00
  dmi.chassis.type: 8
  dmi.chassis.vendor: Dell Inc.
  dmi.chassis.version: Not Specified
  dmi.modalias: 
dmi:bvnDellInc.:bvrA00:bd05/06/2013:svnDellInc.:pnXPS12-9Q33:pvrA00:rvnDellInc.:rnXPS12-9Q33:rvrA00:cvnDellInc.:ct8:cvrNotSpecified:
  dmi.product.name: XPS 12-9Q33
  dmi.product.version: A00
  dmi.sys.vendor: Dell Inc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/unitylinux/+bug/1354975/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1297049] Re: [Dell Inc. Latitude E6420] suspend/resume failure [non-free: nvidia]

2015-06-18 Thread Ian Ozsvald
Note I removed the duplicate link (to #1275621) as the other link
doesn't mention NVIDIA and it isn't a Dell machine, I suspect that the
NVIDIA chipset is the problem.

For the 4 years I've owned my E6420 I've failed to get reliable
suspend/hibernate behaviour, I always turn the laptop off when I want to
change location. Sometimes it'll suspend once or twice, sometimes it
fails the first time. A failure can mean that it tries to suspend and
then wakes up (sometimes having completely shut down - power light off,
no activity...then a few seconds later it wakes up) or it'll start to
suspend and then freeze on the console screen (having shut down
Cinnamon).

After a suspend it is hit or miss whether wifi is working. On occasion
the Suspend does work correctly but I can't narrow down the conditions
that make it work, it can fail (either re-awakening or freezing) if I
try to Suspend just from a fresh boot.

A year back I changed the behaviour so it'll only Suspend if I hit the
power button and click Suspend (if I close the lid it'll just keep
running), that way I can't accidentally close it thinking it might
suspend correctly. Since it only Suspends if I click a button I'm
confident that there's no odd hardware interactions (e.g. a laptop-
closed sensor that's dodgy), as after I click Suspend I wait to see what
happens without trying to close the lid.

I'm using E6420 Bios A19 (from late 2013). This bug affects me right now
(I tried Suspend again last week - same problems occurred). I'm running
Linux Mint 17.1 (I've been using Mint for 2.5 years). I started with the
official Ubuntu 10.10 Dell installation from 2011 when I bought the
machine, that never successfully Hibernated or Suspended either.

I've never used apport or other crash report tools, I'd be happy to do
so if this might help?

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1297049

Title:
  [Dell Inc. Latitude E6420] suspend/resume failure [non-free: nvidia]

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  apport detected this error on a fresh boot.

  ProblemType: KernelOops
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.13.0-19-generic 3.13.0-19.40
  ProcVersionSignature: Ubuntu 3.13.0-19.40-generic 3.13.6
  Uname: Linux 3.13.0-19-generic x86_64
  NonfreeKernelModules: nvidia
  Annotation: This occured during a previous suspend and prevented it from 
resuming properly.
  ApportVersion: 2.13.3-0ubuntu1
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC1:  rgarner2756 F pulseaudio
   /dev/snd/pcmC1D0c:   rgarner2756 F...m pulseaudio
   /dev/snd/controlC2:  rgarner2756 F pulseaudio
   /dev/snd/controlC0:  rgarner2756 F pulseaudio
  Date: Tue Mar 25 10:20:28 2014
  ExecutablePath: /usr/share/apport/apportcheckresume
  Failure: suspend/resume
  HibernationDevice: RESUME=UUID=c7ef60d1-697d-4495-bb69-10665128efd3
  InstallationDate: Installed on 2014-01-27 (55 days ago)
  InstallationMedia: Xubuntu 14.04 LTS Trusty Tahr - Alpha amd64 (20140121.1)
  InterpreterPath: /usr/bin/python3.4
  MachineType: Dell Inc. Latitude E6420
  ProcCmdline: /usr/bin/python3 /usr/share/apport/apportcheckresume
  ProcEnviron:
   TERM=linux
   PATH=(custom, no user)
  ProcFB:
   
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-19-generic 
root=UUID=e960e3c7-aa3d-43d3-9178-7719d9023e08 ro quiet splash
  PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No 
PulseAudio daemon running, or not running as session daemon.
  RelatedPackageVersions:
   linux-restricted-modules-3.13.0-19-generic N/A
   linux-backports-modules-3.13.0-19-generic  N/A
   linux-firmware 1.126
  SourcePackage: linux
  Title: [Dell Inc. Latitude E6420] suspend/resume failure [non-free: nvidia]
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups:
   
  dmi.bios.date: 01/01/2013
  dmi.bios.vendor: Dell Inc.
  dmi.bios.version: A16
  dmi.board.name: 032T9K
  dmi.board.vendor: Dell Inc.
  dmi.board.version: A02
  dmi.chassis.type: 9
  dmi.chassis.vendor: Dell Inc.
  dmi.modalias: 
dmi:bvnDellInc.:bvrA16:bd01/01/2013:svnDellInc.:pnLatitudeE6420:pvr01:rvnDellInc.:rn032T9K:rvrA02:cvnDellInc.:ct9:cvr:
  dmi.product.name: Latitude E6420
  dmi.product.version: 01
  dmi.sys.vendor: Dell Inc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1297049/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1466267] Re: linux-armadaxp: 3.2.0-1652.73 -proposed tracker

2015-06-18 Thread Adam Conrad
** Changed in: kernel-sru-workflow/promote-to-proposed
   Status: Confirmed = Fix Released

** Changed in: kernel-sru-workflow/promote-to-proposed
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Adam Conrad 
(adconrad)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1466267

Title:
  linux-armadaxp: 3.2.0-1652.73 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow package-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Invalid
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow upload-to-ppa series:
  Invalid
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-armadaxp source package in Precise:
  In Progress

Bug description:
  This bug is for tracking the 3.2.0-1652.73 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Thursday, 18. June 2015 01:02 UTC
  kernel-stable-master-bug:1466215
  kernel-stable-Certification-testing-end:Thursday, 18. June 2015 04:01 UTC
  kernel-stable-Security-signoff-end:Thursday, 18. June 2015 04:01 UTC
  kernel-stable-phase:CopyToProposed
  kernel-stable-Prepare-package-end:Thursday, 18. June 2015 06:01 UTC
  kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 06:01 UTC
  kernel-stable-phase-changed:Thursday, 18. June 2015 06:01 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1466267/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1354975] Re: iwlwifi Intel 7260 Wifi disconnects

2015-06-18 Thread Alex
I have worked around the issue by setting my wifi router to the 'up to
54 Mbit/s' mode instead of 300 Mbit/s as it was initially. A proper fix
would still be much appreciated, but this way it at least stopped
constantly disconnecting.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launchpad.net/bugs/1354975

Title:
  iwlwifi Intel 7260 Wifi disconnects

Status in Unity Linux:
  New
Status in linux-firmware package in Ubuntu:
  Fix Released

Bug description:
  I experience frequent disconnects and auth issues, never more than 30
  minutes without a disconnect. Sometimes dozens of disconnects in a few
  minutes.

  This happens with the default 7260-8 firmware.
  Tried replacing the -8 with -9 ucode. Failed to load due to API version. This 
loaded the -7 driver which seems to be more stable.

  Tested against 2.4ghz APs (Apple, Netgear, Linksys).

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.13.0-32-generic 3.13.0-32.57
  ProcVersionSignature: Ubuntu 3.13.0-32.57-generic 3.13.11.4
  Uname: Linux 3.13.0-32-generic x86_64
  ApportVersion: 2.14.1-0ubuntu3.3
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  steve  2577 F pulseaudio
   /dev/snd/controlC1:  steve  2577 F pulseaudio
  CurrentDesktop: Unity
  Date: Sun Aug 10 17:49:06 2014
  HibernationDevice: RESUME=UUID=374a0c1c-4ac2-456b-a67e-9ea54fe11fe6
  InstallationDate: Installed on 2013-12-28 (225 days ago)
  InstallationMedia: Ubuntu 13.10 Saucy Salamander - Release amd64 
(20131016.1)
  MachineType: Dell Inc. XPS 12-9Q33
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-32-generic 
root=UUID=58deb355-7a09-440b-ade2-69a84fd74460 ro ipv6.disable=1 quiet splash 
vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-3.13.0-32-generic N/A
   linux-backports-modules-3.13.0-32-generic  N/A
   linux-firmware 1.127.5
  SourcePackage: linux
  UpgradeStatus: Upgraded to trusty on 2014-07-06 (35 days ago)
  dmi.bios.date: 05/06/2013
  dmi.bios.vendor: Dell Inc.
  dmi.bios.version: A00
  dmi.board.name: XPS 12-9Q33
  dmi.board.vendor: Dell Inc.
  dmi.board.version: A00
  dmi.chassis.type: 8
  dmi.chassis.vendor: Dell Inc.
  dmi.chassis.version: Not Specified
  dmi.modalias: 
dmi:bvnDellInc.:bvrA00:bd05/06/2013:svnDellInc.:pnXPS12-9Q33:pvrA00:rvnDellInc.:rnXPS12-9Q33:rvrA00:cvnDellInc.:ct8:cvrNotSpecified:
  dmi.product.name: XPS 12-9Q33
  dmi.product.version: A00
  dmi.sys.vendor: Dell Inc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/unitylinux/+bug/1354975/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1466237] Re: linux: 3.13.0-55.94 -proposed tracker

2015-06-18 Thread Adam Conrad
Security Sign-off: This kernel is a 1-commit respin for a regression
from a security update.

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: Fix Released = Invalid

** Changed in: kernel-sru-workflow/security-signoff
   Status: New = Fix Released

** Changed in: kernel-sru-workflow/security-signoff
 Assignee: Canonical Security Team (canonical-security) = Adam Conrad 
(adconrad)

** Changed in: kernel-sru-workflow/promote-to-proposed
   Status: Confirmed = Fix Released

** Changed in: kernel-sru-workflow/promote-to-proposed
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Adam Conrad 
(adconrad)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1466237

Title:
  linux: 3.13.0-55.94 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  New
Status in Kernel SRU Workflow package-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Invalid
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Trusty:
  New

Bug description:
  This bug is for tracking the 3.13.0-56.93 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Wednesday, 17. June 2015 21:56 UTC
  kernel-stable-phase:CopyToProposed
  kernel-stable-Prepare-package-end:Thursday, 18. June 2015 07:03 UTC
  kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 07:03 UTC
  kernel-stable-phase-changed:Thursday, 18. June 2015 07:03 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1466237/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1466215] Re: linux: 3.2.0-86.124 -proposed tracker

2015-06-18 Thread Adam Conrad
Security Sign-off: This kernel is a 1-commit respin for a regression
from a security update.

** Changed in: kernel-sru-workflow/security-signoff
   Status: New = Fix Released

** Changed in: kernel-sru-workflow/security-signoff
 Assignee: Canonical Security Team (canonical-security) = Adam Conrad 
(adconrad)

** Changed in: kernel-sru-workflow/promote-to-proposed
   Status: Confirmed = Fix Released

** Changed in: kernel-sru-workflow/promote-to-proposed
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Adam Conrad 
(adconrad)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1466215

Title:
  linux: 3.2.0-86.124 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  New
Status in Kernel SRU Workflow package-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-lbm series:
  Invalid
Status in Kernel SRU Workflow prepare-package-meta series:
  Invalid
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Precise:
  New

Bug description:
  This bug is for tracking the 3.2.0-86.124 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Wednesday, 17. June 2015 20:33 UTC
  kernel-stable-phase:CopyToProposed
  kernel-stable-Prepare-package-end:Thursday, 18. June 2015 01:03 UTC
  kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 01:03 UTC
  kernel-stable-phase-changed:Thursday, 18. June 2015 01:03 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1466215/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1338706] Re: Samsung SSD 840 failed to get NCQ Send/Recv Log Emask 0x1 failed to set xfermode (err_mask=0x40) on upstream kernels = 3.12

2015-06-18 Thread Andrei Demin
Through, script in OP doesn't work correctly. 
fstrim: ./: FITRIM ioctl failed: input/output error

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1338706

Title:
  Samsung SSD 840 failed to get NCQ Send/Recv Log Emask 0x1 failed to
  set xfermode (err_mask=0x40) on upstream kernels = 3.12

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Trusty:
  Fix Committed
Status in linux source package in Utopic:
  Fix Committed
Status in linux source package in Vivid:
  Fix Committed
Status in linux source package in Wily:
  Invalid

Bug description:
  [Impact]

   * Users with Samsung 8** SSD drives see miscellaneous errors and
  warning messages in the logs depending on the firmware level of the
  drive while booting or after running trim.

  [Test Case]

   * Run this script, and then check logs for errors.
  #!/bin/bash

  git clone git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
  for i in {0..10} ; do
   cp -r linux linux$i
  done
  rm -rf linux*
  echo sudo fstrim requires your password
  sudo fstrim ./

  [Regression Potential]

   * There is very little regression potential as this change simply
  prevents NCQ trim from being used on Samsung 8** drives.

  [Other Info]

   * Commit is upstream.
   * Greatly increasing the timeout for the drives seems to relieve the timeout 
errors.  This may be due to trimming large numbers of sectors with single 
commands.  It may be prudent for future upstream to break up large trims into 
multiple requests on smaller regions.

  ===Original Bug description ==
  Samsung SSD 840 Series failed to get NCQ Send/Recv Log Emask 0x1.

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.13.0-30-generic 3.13.0-30.55
  ProcVersionSignature: Ubuntu 3.13.0-30.55-generic 3.13.11.2
  Uname: Linux 3.13.0-30-generic x86_64
  ApportVersion: 2.14.1-0ubuntu3.2
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  user   2131 F pulseaudio
  CurrentDesktop: Unity
  Date: Mon Jul  7 20:01:28 2014
  HibernationDevice: RESUME=UUID=685afcb7-7aa6-4048-af15-091d3bcd3b35
  InstallationDate: Installed on 2014-06-22 (14 days ago)
  InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Release amd64 (20140417)
  IwConfig:
   eth0  no wireless extensions.

   lono wireless extensions.
  MachineType: System manufacturer System Product Name
  ProcFB: 0 nouveaufb
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.13.0-30-generic 
root=UUID=d7c2e1cb-d046-460c-83b8-0cfbb330d095 ro quiet splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-3.13.0-30-generic N/A
   linux-backports-modules-3.13.0-30-generic  N/A
   linux-firmware 1.127.4
  RfKill:

  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 09/10/2010
  dmi.bios.vendor: American Megatrends Inc.
  dmi.bios.version: 0901
  dmi.board.asset.tag: To Be Filled By O.E.M.
  dmi.board.name: M3N78-EM
  dmi.board.vendor: ASUSTeK Computer INC.
  dmi.board.version: Rev X.0x
  dmi.chassis.asset.tag: Asset-1234567890
  dmi.chassis.type: 3
  dmi.chassis.vendor: Chassis Manufacture
  dmi.chassis.version: Chassis Version
  dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvr0901:bd09/10/2010:svnSystemmanufacturer:pnSystemProductName:pvrSystemVersion:rvnASUSTeKComputerINC.:rnM3N78-EM:rvrRevX.0x:cvnChassisManufacture:ct3:cvrChassisVersion:
  dmi.product.name: System Product Name
  dmi.product.version: System Version
  dmi.sys.vendor: System manufacturer

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1338706/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1466013] Re: kdump-tools does not have an upstart job

2015-06-18 Thread Louis Bouchard
** Description changed:

+ [SRU justification]
+ The upstart job avoids the sysVinit scripts to be run while kdump-tools is 
doing the kernel crash dump capture
+ 
+ [Impact]
+ Potential impossibility to capture a kernel crash dump
+ 
+ [Fix]
+ Add kdump-tools.conf upstart job
+ 
+ [Test Case]
+ With the upstart job, the kdump-tools kernel dump capture will run before any 
of the tasks triggered by RUNLEVEL [2345] will run.
+ 
+ [Regression]
+ Minimal; The job uses the same syntax as the sysVinit job currently in use.
+ 
+ [Original description of the problem]
+ 
  kdump-tools relies on a sysVinit script to  capture the kernel dump.  It
  sometimes gets interference from other jobs starting at runlevels 2 to
  5.
  
  An upstart job starting before RUNLEVEL is emitted would alleviate that.

** Tags added: sts

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to makedumpfile in Ubuntu.
https://bugs.launchpad.net/bugs/1466013

Title:
  kdump-tools does not have an upstart job

Status in makedumpfile package in Ubuntu:
  Invalid
Status in makedumpfile source package in Trusty:
  In Progress

Bug description:
  [SRU justification]
  The upstart job avoids the sysVinit scripts to be run while kdump-tools is 
doing the kernel crash dump capture

  [Impact]
  Potential impossibility to capture a kernel crash dump

  [Fix]
  Add kdump-tools.conf upstart job

  [Test Case]
  With the upstart job, the kdump-tools kernel dump capture will run before any 
of the tasks triggered by RUNLEVEL [2345] will run.

  [Regression]
  Minimal; The job uses the same syntax as the sysVinit job currently in use.

  [Original description of the problem]

  kdump-tools relies on a sysVinit script to  capture the kernel dump.
  It sometimes gets interference from other jobs starting at runlevels 2
  to 5.

  An upstart job starting before RUNLEVEL is emitted would alleviate
  that.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/makedumpfile/+bug/1466013/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1466250] Re: linux: 3.16.0-41.57 -proposed tracker

2015-06-18 Thread Brad Figg
** Changed in: kernel-sru-workflow/prepare-package-signed
   Status: New = Fix Released

** Changed in: kernel-sru-workflow/prepare-package-signed
 Assignee: Canonical Kernel Team (canonical-kernel-team) = Brad Figg 
(brad-figg)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1466250

Title:
  linux: 3.16.0-41.57 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  New
Status in Kernel SRU Workflow package-testing series:
  New
Status in Kernel SRU Workflow prepare-package series:
  New
Status in Kernel SRU Workflow prepare-package-meta series:
  Invalid
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Utopic:
  New

Bug description:
  This bug is for tracking the 3.16.0-41.57 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Wednesday, 17. June 2015 23:34 UTC
  kernel-stable-phase:Prepare
  kernel-stable-phase-changed:Wednesday, 17. June 2015 23:34 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1466250/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1466349] Re: linux-lts-trusty: 3.13.0-55.94~precise1 -proposed tracker

2015-06-18 Thread Brad Figg
** Description changed:

  This bug is for tracking the 3.13.0-55.94~precise1 upload package. This
  bug will contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Thursday, 18. June 2015 07:02 UTC
  kernel-stable-phase:Prepare
  kernel-stable-phase-changed:Thursday, 18. June 2015 07:02 UTC
  kernel-stable-master-bug:1466237
+ kernel-stable-Security-signoff-end:Thursday, 18. June 2015 13:32 UTC

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-trusty in Ubuntu.
https://bugs.launchpad.net/bugs/1466349

Title:
  linux-lts-trusty: 3.13.0-55.94~precise1 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  New
Status in Kernel SRU Workflow package-testing series:
  New
Status in Kernel SRU Workflow prepare-package series:
  New
Status in Kernel SRU Workflow prepare-package-meta series:
  Invalid
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-trusty source package in Precise:
  New

Bug description:
  This bug is for tracking the 3.13.0-55.94~precise1 upload package.
  This bug will contain status and testing results related to that
  upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Thursday, 18. June 2015 07:02 UTC
  kernel-stable-phase:Prepare
  kernel-stable-phase-changed:Thursday, 18. June 2015 07:02 UTC
  kernel-stable-master-bug:1466237
  kernel-stable-Security-signoff-end:Thursday, 18. June 2015 13:32 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1466349/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1466266] Re: linux-ti-omap4: 3.2.0-1466.87 -proposed tracker

2015-06-18 Thread Luis Henriques
** Summary changed:

- linux-ti-omap4: version to be filled -proposed tracker
+ linux-ti-omap4: 3.2.0-1466.87 -proposed tracker

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New = Invalid

** Changed in: linux-ti-omap4 (Ubuntu)
   Status: New = Invalid

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-ti-omap4 in Ubuntu.
https://bugs.launchpad.net/bugs/1466266

Title:
  linux-ti-omap4: 3.2.0-1466.87 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow package-testing series:
  New
Status in Kernel SRU Workflow prepare-package series:
  New
Status in Kernel SRU Workflow prepare-package-meta series:
  Invalid
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow upload-to-ppa series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  New

Bug description:
  This bug is for tracking the version to be filled upload package.
  This bug will contain status and testing results related to that
  upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Thursday, 18. June 2015 01:00 UTC
  kernel-stable-phase:Prepare
  kernel-stable-phase-changed:Thursday, 18. June 2015 01:00 UTC
  kernel-stable-master-bug:1466215

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1466266/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1466266] Re: linux-ti-omap4: 3.2.0-1466.87 -proposed tracker

2015-06-18 Thread Brad Figg
** Description changed:

  This bug is for tracking the version to be filled upload package. This
  bug will contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Thursday, 18. June 2015 01:00 UTC
  kernel-stable-phase:Prepare
  kernel-stable-phase-changed:Thursday, 18. June 2015 01:00 UTC
  kernel-stable-master-bug:1466215
+ kernel-stable-Certification-testing-end:Thursday, 18. June 2015 15:01 UTC
+ kernel-stable-Security-signoff-end:Thursday, 18. June 2015 15:01 UTC

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-ti-omap4 in Ubuntu.
https://bugs.launchpad.net/bugs/1466266

Title:
  linux-ti-omap4: 3.2.0-1466.87 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow package-testing series:
  New
Status in Kernel SRU Workflow prepare-package series:
  New
Status in Kernel SRU Workflow prepare-package-meta series:
  Invalid
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow upload-to-ppa series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  New

Bug description:
  This bug is for tracking the version to be filled upload package.
  This bug will contain status and testing results related to that
  upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Thursday, 18. June 2015 01:00 UTC
  kernel-stable-phase:Prepare
  kernel-stable-phase-changed:Thursday, 18. June 2015 01:00 UTC
  kernel-stable-master-bug:1466215
  kernel-stable-Certification-testing-end:Thursday, 18. June 2015 15:01 UTC
  kernel-stable-Security-signoff-end:Thursday, 18. June 2015 15:01 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1466266/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1425576] Re: Occasional crash in APM xgene enet driver on kernels prior to v3.19

2015-06-18 Thread dann frazier
** Description changed:

- This crash was submitted upstream and a fix was already present, but it
- didn't land until the 3.19 kernel. This bug is to track getting that fix
- into trusty and utopic.
+ [Impact]
+ System panics every few hours under constant network load
  
- Unable to handle kernel NULL pointer dereference at virtual address 00c0
- pgd = ffc3e639a000
- [00c0] *pgd=0043e629d003, *pud=0043e629d003, *pmd=
- Internal error: Oops: 9606 [#1] PREEMPT SMP
- Modules linked in:
- CPU: 0 PID: 6643 Comm: qemu-system-aar Not tainted 3.19.0-rc7+ #254
- Hardware name: APM X-Gene Mustang board (DT)
- task: ffc3ee3aee00 ti: ffc3c044c000 task.ti: ffc3c044c000
- PC is at xgene_enet_process_ring+0x94/0x328
- LR is at xgene_enet_process_ring+0x78/0x328
- pc : [ffc0003f9058] lr : [ffc0003f903c] pstate: 8145
- sp : ffc3c044fa00
- x29: ffc3c044fa00 x28: ffc0fe8aa218
- x27:  x26: 
- x25: ffc3ee2b7000 x24: 0040
- x23: ffc0fe8aa418 x22: 01ff
- x21: 0001 x20: ffc0ff058380
- x19: 001c x18: 007f82d1c1f0
- x17: 007f84afbc90 x16: ffc0001a6a8c
- x15: 007f84b805a0 x14: 
- x13: d0d03820 x12: 
- x11: 0024 x10: d0d30a20
- x9 : ffc00031da28 x8 : ffbdc000
- x7 : ffc3cae0285e x6 : 0040fec0
- x5 : 0c08100801400148 x4 : 0040ff00
- x3 : 000200d1 x2 : 0066
- x1 : 0043cae0285e x0 : ffc3ee2bb818
+ [Test Case]
+ On the X-Gene system, start an iperf server:
+   $ iperf -s
+ Connect to it from another system (1Gbps is sufficient)
+   $ iperf -t 10 -c xgene host
  
- Process qemu-system-aar (pid: 6643, stack limit = 0xffc3c044c058)
- Stack: (0xffc3c044fa00 to 0xffc3c045)
- fa00: c044fa70 ffc3 003f93d0 ffc0 fe8aa290 ffc0  
- fa20: 0040  0078e000 ffc0 0016cac3 0001 c044fb20 ffc3
- fa40: ff7d4000 0003 007825c0 ffc0 012c  fff565c0 ffc3
- fa60: ffc0  ee2b7000 ffc3 c044faa0 ffc3 004a5cec ffc0
- fa80: fe8aa290 ffc0   0040  84b805a0 007f
- faa0: c044fb40 ffc3 000b5da0 ffc0 c044c000 ffc3 0078e000 ffc0
- fac0: 0077faa0 ffc0 c044fb40 ffc3 0018  0101 
- fae0: 0003  0078e0c0 ffc0 0078e0d8 ffc0  
- fb00: 0008  006fbd90 ffc0 006fb9f0 ffc0 007e3d74 ffc0
- fb20: c044fb20 ffc3 c044fb20 ffc3 c044fb30 ffc3 c044fb30 ffc3
- fb40: c044fbc0 ffc3 000b6134 ffc0 0078 ffc0  
- fb60:   2010 ff80 6145   
- fb80: 011a  001d  0079e000 ffc0 c044c000 ffc3
- fba0: 000a  0016cac2 0001 00570c08 ffc0 084040c0 000a
- fbc0: c044fbe0 ffc3 000ecb2c ffc0 0078 ffc0 000ecafc ffc0
- fbe0: c044fc20 ffc3 00082420 ffc0 00797000 ffc0 c044fc50 ffc3
- fc00: 200c ff80 000fc014 ffc0 ee01 ffc3 000a253c 005c
- fc20: c044fd70 ffc3 00085da8 ffc0   fd024c90 ffc0
- fc40: c044fd70 ffc3 000d0938 ffc0 fd024c98 ffc0 ee3aee00 ffc3
- fc60:     ae80   
- fc80:   c7e8ed00 5df42439 001d  0092 
- fca0:   001b    0092 
- fcc0:   84b805a0 007f 001a6a8c ffc0 84afbc90 007f
- fce0: 82d1c1f0 007f   fd024c90 ffc0  
- fd00: feabe300 ffc0 ae80    011a 
- fd20: 001d  0079e000 ffc0 c044c000 ffc3 c044fd70 ffc3
- fd40: 0009c1d0 ffc0 c044fd70 ffc3 000d0938 ffc0 6145 
- fd60: c044fd70 ffc3 0009c1a4 ffc0 c044fda0 ffc3 0009c2e0 ffc0
- fd80: feabe300 ffc0 fd024c90 ffc0 0079e000 ffc0 c044c000 
- fda0: c044fe10 ffc3 001a6824 ffc0 feabe300 ffc0  
- fdc0: edc06f70 ffc3 000b  ae80  0015 
- fde0: 011a  0040 ae80 c044fe20 ffc3 0019772c ffc0
- fe00: edb3 ffc3 0001  c044fe90 ffc3 001a6b10 ffc0
- fe20:   feabe301 ffc0 feabe300 ffc0  
- fe40: c044fe70 ffc3 001b0a2c ffc0   ed3ea300 ffc3
- fe60: c044fe80 000b feabe300 ffc0 c044fe80 ffc3 001b0a80 ffc0
- fe80: c044fe90 ffc3 001a6acc ffc0 82d1c600 007f 00086430 ffc0
- fea0:   15b1cea0    84afbc9c 007f
- fec0: 6000  0015  000b  

[Kernel-packages] [Bug 1466266] Re: linux-ti-omap4: 3.2.0-1466.87 -proposed tracker

2015-06-18 Thread Adam Conrad
Security Sign-off: This kernel is a 1-commit respin for a regression
from a security update.

** Changed in: kernel-sru-workflow/security-signoff
   Status: New = Fix Released

** Changed in: kernel-sru-workflow/security-signoff
 Assignee: Canonical Security Team (canonical-security) = Adam Conrad 
(adconrad)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-ti-omap4 in Ubuntu.
https://bugs.launchpad.net/bugs/1466266

Title:
  linux-ti-omap4: 3.2.0-1466.87 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow package-testing series:
  New
Status in Kernel SRU Workflow prepare-package series:
  New
Status in Kernel SRU Workflow prepare-package-meta series:
  Invalid
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow upload-to-ppa series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  New

Bug description:
  This bug is for tracking the version to be filled upload package.
  This bug will contain status and testing results related to that
  upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Thursday, 18. June 2015 01:00 UTC
  kernel-stable-phase:Prepare
  kernel-stable-phase-changed:Thursday, 18. June 2015 01:00 UTC
  kernel-stable-master-bug:1466215

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1466266/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1445195] Re: [Hyper-V] Kernel patches for storvsc

2015-06-18 Thread Joseph Salisbury
Yes that is the correct kernel.  I've moved the files to the utopic
directory now.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1445195

Title:
  [Hyper-V] Kernel patches for storvsc

Status in linux package in Ubuntu:
  Triaged
Status in linux source package in Precise:
  Triaged
Status in linux source package in Trusty:
  Triaged
Status in linux source package in Utopic:
  Triaged
Status in linux source package in Vivid:
  Fix Committed
Status in linux source package in Wily:
  Triaged

Bug description:
  Storage driver performance updates for vivid

  K. Y. Srinivasan (7):
scsi: storvsc: Increase the ring buffer size
scsi: storvsc: Size the queue depth based on the ringbuffer size
scsi: storvsc: Always send on the selected outgoing channel
scsi: storvsc: Retrieve information about the capability of the target
scsi: storvsc: Fix a bug in copy_from_bounce_buffer()
scsi: storvsc: Don't assume that the scatterlist is not chained
scsi: storvsc: Set the tablesize based on the information given by the host

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1445195/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1458042] Re: [SRU] xgene-enet: add SGMII based 1GbE support for the second port

2015-06-18 Thread dann frazier
** Also affects: linux (Ubuntu Wily)
   Importance: Undecided
 Assignee: Craig Magina (craig.magina)
   Status: In Progress

** Also affects: linux (Ubuntu Vivid)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1458042

Title:
  [SRU] xgene-enet: add SGMII based 1GbE support for the second port

Status in linux package in Ubuntu:
  In Progress
Status in linux source package in Trusty:
  Fix Committed
Status in linux source package in Utopic:
  Fix Committed
Status in linux source package in Vivid:
  New
Status in linux source package in Wily:
  In Progress

Bug description:
  [Impact]
  APM's Mustang boards have a second SGMII based 1GbE interface that is 
currently unsupported by Ubuntu.

  [Test Case]
  Verify that the previously non-working SGMII based 1GbE interface now works.

  [Regression Risk]
  Since the changes touch the driver that supports the existing GbE and first 
SGMII support, it is possible that that support has become impacted. The 
changes also impact drivers/of/of_net.c, which could impact other users of the 
interface.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1458042/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1466267] Re: linux-armadaxp: 3.2.0-1652.73 -proposed tracker

2015-06-18 Thread Brad Figg
** Changed in: kernel-sru-workflow/verification-testing
   Status: New = In Progress

** Changed in: kernel-sru-workflow/regression-testing
   Status: New = Confirmed

** Description changed:

  This bug is for tracking the 3.2.0-1652.73 upload package. This bug will
  contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Thursday, 18. June 2015 01:02 UTC
  kernel-stable-master-bug:1466215
  kernel-stable-Certification-testing-end:Thursday, 18. June 2015 04:01 UTC
  kernel-stable-Security-signoff-end:Thursday, 18. June 2015 04:01 UTC
- kernel-stable-phase:CopyToProposed
  kernel-stable-Prepare-package-end:Thursday, 18. June 2015 06:01 UTC
  kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 06:01 UTC
- kernel-stable-phase-changed:Thursday, 18. June 2015 06:01 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 18. June 2015 13:32 UTC
+ kernel-stable-phase:Verification  Testing
+ kernel-stable-phase-changed:Thursday, 18. June 2015 15:01 UTC
+ kernel-stable-Verification-testing-start:Thursday, 18. June 2015 15:01 UTC
+ proposed-announcement-sent:True
+ kernel-stable-Regression-testing-start:Thursday, 18. June 2015 15:01 UTC

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1466267

Title:
  linux-armadaxp: 3.2.0-1652.73 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow package-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Invalid
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Confirmed
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow upload-to-ppa series:
  Invalid
Status in Kernel SRU Workflow verification-testing series:
  In Progress
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-armadaxp source package in Precise:
  In Progress

Bug description:
  This bug is for tracking the 3.2.0-1652.73 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Thursday, 18. June 2015 01:02 UTC
  kernel-stable-master-bug:1466215
  kernel-stable-Certification-testing-end:Thursday, 18. June 2015 04:01 UTC
  kernel-stable-Security-signoff-end:Thursday, 18. June 2015 04:01 UTC
  kernel-stable-Prepare-package-end:Thursday, 18. June 2015 06:01 UTC
  kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 06:01 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 18. June 2015 13:32 UTC
  kernel-stable-phase:Verification  Testing
  kernel-stable-phase-changed:Thursday, 18. June 2015 15:01 UTC
  kernel-stable-Verification-testing-start:Thursday, 18. June 2015 15:01 UTC
  proposed-announcement-sent:True
  kernel-stable-Regression-testing-start:Thursday, 18. June 2015 15:01 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1466267/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1466237] Re: linux: 3.13.0-55.94 -proposed tracker

2015-06-18 Thread Brad Figg
** Changed in: kernel-sru-workflow/verification-testing
   Status: New = In Progress

** Changed in: kernel-sru-workflow/certification-testing
   Status: New = Confirmed

** Changed in: kernel-sru-workflow/regression-testing
   Status: New = Confirmed

** Description changed:

  This bug is for tracking the 3.13.0-56.93 upload package. This bug will
  contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Wednesday, 17. June 2015 21:56 UTC
- kernel-stable-phase:CopyToProposed
  kernel-stable-Prepare-package-end:Thursday, 18. June 2015 07:03 UTC
  kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 07:03 UTC
- kernel-stable-phase-changed:Thursday, 18. June 2015 07:03 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 18. June 2015 13:32 UTC
  kernel-stable-Security-signoff-end:Thursday, 18. June 2015 13:32 UTC
+ kernel-stable-phase:Verification  Testing
+ kernel-stable-phase-changed:Thursday, 18. June 2015 15:01 UTC
+ kernel-stable-Verification-testing-start:Thursday, 18. June 2015 15:01 UTC
+ kernel-stable-Certification-testing-start:Thursday, 18. June 2015 15:01 UTC
+ proposed-announcement-sent:True
+ kernel-stable-Regression-testing-start:Thursday, 18. June 2015 15:01 UTC

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1466237

Title:
  linux: 3.13.0-55.94 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Confirmed
Status in Kernel SRU Workflow package-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Invalid
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Confirmed
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  In Progress
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Trusty:
  New

Bug description:
  This bug is for tracking the 3.13.0-56.93 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Wednesday, 17. June 2015 21:56 UTC
  kernel-stable-Prepare-package-end:Thursday, 18. June 2015 07:03 UTC
  kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 07:03 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 18. June 2015 13:32 UTC
  kernel-stable-Security-signoff-end:Thursday, 18. June 2015 13:32 UTC
  kernel-stable-phase:Verification  Testing
  kernel-stable-phase-changed:Thursday, 18. June 2015 15:01 UTC
  kernel-stable-Verification-testing-start:Thursday, 18. June 2015 15:01 UTC
  kernel-stable-Certification-testing-start:Thursday, 18. June 2015 15:01 UTC
  proposed-announcement-sent:True
  kernel-stable-Regression-testing-start:Thursday, 18. June 2015 15:01 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1466237/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1465909] Re: linux-lts-trusty: 3.13.0-56.93~precise1 -proposed tracker

2015-06-18 Thread Adam Conrad
*** This bug is a duplicate of bug 1466349 ***
https://bugs.launchpad.net/bugs/1466349

** This bug has been marked a duplicate of bug 1466349
   linux-lts-trusty: 3.13.0-55.94~precise1 -proposed tracker

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-trusty in Ubuntu.
https://bugs.launchpad.net/bugs/1465909

Title:
  linux-lts-trusty: 3.13.0-56.93~precise1 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  New
Status in Kernel SRU Workflow package-testing series:
  New
Status in Kernel SRU Workflow prepare-package series:
  New
Status in Kernel SRU Workflow prepare-package-meta series:
  New
Status in Kernel SRU Workflow prepare-package-signed series:
  New
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux-lts-trusty package in Ubuntu:
  New
Status in linux-lts-trusty source package in Precise:
  New

Bug description:
  This bug is for tracking the 3.13.0-56.93~precise1 upload package.
  This bug will contain status and testing results related to that
  upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Wednesday, 17. June 2015 02:04 UTC
  kernel-stable-phase:Prepare
  kernel-stable-phase-changed:Wednesday, 17. June 2015 02:04 UTC
  kernel-stable-master-bug:1465798

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1465909/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1466364] Re: Kernel crash on running mercurial clone on a btrfs file system on a SSD Ubuntu 14.04

2015-06-18 Thread Joseph Salisbury
Did this issue start happening after an update/upgrade?  Was there a
prior kernel version where you were not having this particular problem?

Would it be possible for you to test the latest upstream kernel? Refer
to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest
v4.1 kernel[0].

If this bug is fixed in the mainline kernel, please add the following
tag 'kernel-fixed-upstream'.

If the mainline kernel does not fix this bug, please add the tag:
'kernel-bug-exists-upstream'.

If you are unable to test the mainline kernel, for example it will not boot, 
please add the tag: 'kernel-unable-to-test-upstream'.
Once testing of the upstream kernel is complete, please mark this bug as 
Confirmed.


Thanks in advance.

[0] http://kernel.ubuntu.com/~kernel-ppa/mainline/v4.1-rc8-unstable/

** Changed in: linux (Ubuntu)
   Importance: Undecided = High

** Changed in: linux (Ubuntu)
   Status: Confirmed = Incomplete

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1466364

Title:
  Kernel crash on running mercurial clone on a btrfs file system on a
  SSD Ubuntu 14.04

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  On running mercurial commands which add/remove lots of files from the
  disk (typically hard linked) the following error shows up. Since btrfs
  doesn't really have a fsck utility not sure what I should be running

  Jun 18 12:57:27 one kernel: [151416.037158] CPU: 0 PID: 8362 Comm: hg Not 
tainted 3.13.0-55-generic #92-Ubuntu
  Jun 18 12:57:27 one kernel: [151416.038376] Hardware name:  
/DH61WW, BIOS BEH6110H.86A.0035.2012.0112.2206 01/12/2012
  Jun 18 12:57:27 one kernel: [151416.039594] task: 880082fd6000 ti: 
8801023d2000 task.ti: 8801023d2000
  Jun 18 12:57:27 one kernel: [151416.040812] RIP: 0010:[8137287d]  
[8137287d] memcpy+0xd/0x110
  Jun 18 12:57:27 one kernel: [151416.042036] RSP: 0018:8801023d3910  
EFLAGS: 00010202
  Jun 18 12:57:27 one kernel: [151416.043258] RAX: 880168d67dfe RBX: 
009f RCX: 0013
  Jun 18 12:57:27 one kernel: [151416.044491] RDX: 0007 RSI: 
00050800 RDI: 880168d67dfe
  Jun 18 12:57:27 one kernel: [151416.045727] RBP: 8801023d3948 R08: 
1000 R09: 8801023d3918
  Jun 18 12:57:27 one kernel: [151416.046970] R10:  R11: 
0003 R12: 88008f53bb28
  Jun 18 12:57:27 one kernel: [151416.048225] R13: 1600 R14: 
880168d67e9d R15: 009f
  Jun 18 12:57:27 one kernel: [151416.049482] FS:  7fa796d7c740() 
GS:88021fa0() knlGS:
  Jun 18 12:57:27 one kernel: [151416.050737] CS:  0010 DS:  ES:  CR0: 
80050033
  Jun 18 12:57:27 one kernel: [151416.051994] CR2: 7fa796d9d000 CR3: 
00017f6dd000 CR4: 000407f0
  Jun 18 12:57:27 one kernel: [151416.053268] Stack:
  Jun 18 12:57:27 one kernel: [151416.054536]  a028049c 
1000 88020ebcf800 88020d8273f0
  Jun 18 12:57:27 one kernel: [151416.055820]   
88017125f640 880193263720 8801023d3a08
  Jun 18 12:57:27 one kernel: [151416.057103]  a02653dc 
3188  1000
  Jun 18 12:57:27 one kernel: [151416.058391] Call Trace:
  Jun 18 12:57:27 one kernel: [151416.059686]  [a028049c] ? 
read_extent_buffer+0xbc/0x110 [btrfs]
  Jun 18 12:57:27 one kernel: [151416.061114]  [a02653dc] 
btrfs_get_extent+0x91c/0x970 [btrfs]
  Jun 18 12:57:27 one kernel: [151416.062471]  [a027c697] 
__do_readpage+0x357/0x730 [btrfs]
  Jun 18 12:57:27 one kernel: [151416.063792]  [a0264ac0] ? 
btrfs_real_readdir+0x5b0/0x5b0 [btrfs]
  Jun 18 12:57:27 one kernel: [151416.065110]  [a027cdf2] 
__extent_readpages.constprop.41+0x2a2/0x2c0 [btrfs]
  Jun 18 12:57:27 one kernel: [151416.066441]  [a0264ac0] ? 
btrfs_real_readdir+0x5b0/0x5b0 [btrfs]
  Jun 18 12:57:27 one kernel: [151416.067756]  [a027ec76] 
extent_readpages+0x1b6/0x1c0 [btrfs]
  Jun 18 12:57:27 one kernel: [151416.069084]  [a0264ac0] ? 
btrfs_real_readdir+0x5b0/0x5b0 [btrfs]
  Jun 18 12:57:27 one kernel: [151416.070385]  [81197dc3] ? 
alloc_pages_current+0xa3/0x160
  Jun 18 12:57:27 one kernel: [151416.071699]  [a0262c1f] 
btrfs_readpages+0x1f/0x30 [btrfs]
  Jun 18 12:57:27 one kernel: [151416.072969]  [8115bb99] 
__do_page_cache_readahead+0x1b9/0x260
  Jun 18 12:57:27 one kernel: [151416.074213]  [8115c072] 
ondemand_readahead+0x152/0x2a0
  Jun 18 12:57:27 one kernel: [151416.075455]  [8117ecc8] ? 
__vma_link_rb+0xb8/0xe0
  Jun 18 12:57:27 one kernel: [151416.076694]  [8115c1f1] 
page_cache_sync_readahead+0x31/0x50
  Jun 18 12:57:27 one kernel: [151416.077930]  [81151cb5] 
generic_file_aio_read+0x4c5/0x700
  Jun 18 12:57:27 one 

[Kernel-packages] [Bug 1466215] Re: linux: 3.2.0-86.124 -proposed tracker

2015-06-18 Thread Brad Figg
** Changed in: kernel-sru-workflow/verification-testing
   Status: New = In Progress

** Changed in: kernel-sru-workflow/certification-testing
   Status: New = Confirmed

** Changed in: kernel-sru-workflow/regression-testing
   Status: New = Confirmed

** Description changed:

  This bug is for tracking the 3.2.0-86.124 upload package. This bug will
  contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Wednesday, 17. June 2015 20:33 UTC
- kernel-stable-phase:CopyToProposed
  kernel-stable-Prepare-package-end:Thursday, 18. June 2015 01:03 UTC
  kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 01:03 UTC
- kernel-stable-phase-changed:Thursday, 18. June 2015 01:03 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 18. June 2015 13:31 UTC
  kernel-stable-Security-signoff-end:Thursday, 18. June 2015 13:31 UTC
+ kernel-stable-phase:Verification  Testing
+ kernel-stable-phase-changed:Thursday, 18. June 2015 15:00 UTC
+ kernel-stable-Verification-testing-start:Thursday, 18. June 2015 15:00 UTC
+ kernel-stable-Certification-testing-start:Thursday, 18. June 2015 15:00 UTC
+ proposed-announcement-sent:True
+ kernel-stable-Regression-testing-start:Thursday, 18. June 2015 15:00 UTC

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1466215

Title:
  linux: 3.2.0-86.124 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Confirmed
Status in Kernel SRU Workflow package-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-lbm series:
  Invalid
Status in Kernel SRU Workflow prepare-package-meta series:
  Invalid
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Confirmed
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  In Progress
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Precise:
  New

Bug description:
  This bug is for tracking the 3.2.0-86.124 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Wednesday, 17. June 2015 20:33 UTC
  kernel-stable-Prepare-package-end:Thursday, 18. June 2015 01:03 UTC
  kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 01:03 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 18. June 2015 13:31 UTC
  kernel-stable-Security-signoff-end:Thursday, 18. June 2015 13:31 UTC
  kernel-stable-phase:Verification  Testing
  kernel-stable-phase-changed:Thursday, 18. June 2015 15:00 UTC
  kernel-stable-Verification-testing-start:Thursday, 18. June 2015 15:00 UTC
  kernel-stable-Certification-testing-start:Thursday, 18. June 2015 15:00 UTC
  proposed-announcement-sent:True
  kernel-stable-Regression-testing-start:Thursday, 18. June 2015 15:00 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1466215/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1425576] Re: Occasional crash in APM xgene enet driver on kernels prior to v3.19

2015-06-18 Thread dann frazier
After testing with the proposed backport[1], I was able to run the iperf
test overnight on a trusty kernel w/o any crashes.

[1]http://kernel.ubuntu.com/git/ming/ubuntu-utopic.git/commit/?h=arm64
-net-backportid=d46456e3ed9153e743f2add6e01d06c56eb2ceb7

** Changed in: linux (Ubuntu Trusty)
   Status: New = In Progress

** Changed in: linux (Ubuntu Utopic)
   Status: Triaged = In Progress

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1425576

Title:
  Occasional crash in APM xgene enet driver on kernels prior to v3.19

Status in linux package in Ubuntu:
  Triaged
Status in linux source package in Trusty:
  In Progress
Status in linux source package in Utopic:
  In Progress

Bug description:
  This crash was submitted upstream and a fix was already present, but
  it didn't land until the 3.19 kernel. This bug is to track getting
  that fix into trusty and utopic.

  Unable to handle kernel NULL pointer dereference at virtual address 00c0
  pgd = ffc3e639a000
  [00c0] *pgd=0043e629d003, *pud=0043e629d003, *pmd=
  Internal error: Oops: 9606 [#1] PREEMPT SMP
  Modules linked in:
  CPU: 0 PID: 6643 Comm: qemu-system-aar Not tainted 3.19.0-rc7+ #254
  Hardware name: APM X-Gene Mustang board (DT)
  task: ffc3ee3aee00 ti: ffc3c044c000 task.ti: ffc3c044c000
  PC is at xgene_enet_process_ring+0x94/0x328
  LR is at xgene_enet_process_ring+0x78/0x328
  pc : [ffc0003f9058] lr : [ffc0003f903c] pstate: 8145
  sp : ffc3c044fa00
  x29: ffc3c044fa00 x28: ffc0fe8aa218
  x27:  x26: 
  x25: ffc3ee2b7000 x24: 0040
  x23: ffc0fe8aa418 x22: 01ff
  x21: 0001 x20: ffc0ff058380
  x19: 001c x18: 007f82d1c1f0
  x17: 007f84afbc90 x16: ffc0001a6a8c
  x15: 007f84b805a0 x14: 
  x13: d0d03820 x12: 
  x11: 0024 x10: d0d30a20
  x9 : ffc00031da28 x8 : ffbdc000
  x7 : ffc3cae0285e x6 : 0040fec0
  x5 : 0c08100801400148 x4 : 0040ff00
  x3 : 000200d1 x2 : 0066
  x1 : 0043cae0285e x0 : ffc3ee2bb818

  Process qemu-system-aar (pid: 6643, stack limit = 0xffc3c044c058)
  Stack: (0xffc3c044fa00 to 0xffc3c045)
  fa00: c044fa70 ffc3 003f93d0 ffc0 fe8aa290 ffc0  
  fa20: 0040  0078e000 ffc0 0016cac3 0001 c044fb20 ffc3
  fa40: ff7d4000 0003 007825c0 ffc0 012c  fff565c0 ffc3
  fa60: ffc0  ee2b7000 ffc3 c044faa0 ffc3 004a5cec ffc0
  fa80: fe8aa290 ffc0   0040  84b805a0 007f
  faa0: c044fb40 ffc3 000b5da0 ffc0 c044c000 ffc3 0078e000 ffc0
  fac0: 0077faa0 ffc0 c044fb40 ffc3 0018  0101 
  fae0: 0003  0078e0c0 ffc0 0078e0d8 ffc0  
  fb00: 0008  006fbd90 ffc0 006fb9f0 ffc0 007e3d74 ffc0
  fb20: c044fb20 ffc3 c044fb20 ffc3 c044fb30 ffc3 c044fb30 ffc3
  fb40: c044fbc0 ffc3 000b6134 ffc0 0078 ffc0  
  fb60:   2010 ff80 6145   
  fb80: 011a  001d  0079e000 ffc0 c044c000 ffc3
  fba0: 000a  0016cac2 0001 00570c08 ffc0 084040c0 000a
  fbc0: c044fbe0 ffc3 000ecb2c ffc0 0078 ffc0 000ecafc ffc0
  fbe0: c044fc20 ffc3 00082420 ffc0 00797000 ffc0 c044fc50 ffc3
  fc00: 200c ff80 000fc014 ffc0 ee01 ffc3 000a253c 005c
  fc20: c044fd70 ffc3 00085da8 ffc0   fd024c90 ffc0
  fc40: c044fd70 ffc3 000d0938 ffc0 fd024c98 ffc0 ee3aee00 ffc3
  fc60:     ae80   
  fc80:   c7e8ed00 5df42439 001d  0092 
  fca0:   001b    0092 
  fcc0:   84b805a0 007f 001a6a8c ffc0 84afbc90 007f
  fce0: 82d1c1f0 007f   fd024c90 ffc0  
  fd00: feabe300 ffc0 ae80    011a 
  fd20: 001d  0079e000 ffc0 c044c000 ffc3 c044fd70 ffc3
  fd40: 0009c1d0 ffc0 c044fd70 ffc3 000d0938 ffc0 6145 
  fd60: c044fd70 ffc3 0009c1a4 ffc0 c044fda0 ffc3 0009c2e0 ffc0
  fd80: feabe300 ffc0 fd024c90 ffc0 0079e000 ffc0 c044c000 
  fda0: c044fe10 ffc3 001a6824 ffc0 feabe300 ffc0  
  fdc0: edc06f70 ffc3 000b  ae80  0015 
  fde0: 011a  0040 ae80 c044fe20 ffc3 0019772c ffc0
  

[Kernel-packages] [Bug 1354975] Re: iwlwifi Intel 7260 Wifi disconnects

2015-06-18 Thread spinxz
I can confirm that 802.11ac mode seems to make the link more unstable -
especially the 5 GHz network.

However, I discovered that with Ubuntu 15.04 and the 3.19.0-21 kernel,
turning off power management improves the stability a lot.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launchpad.net/bugs/1354975

Title:
  iwlwifi Intel 7260 Wifi disconnects

Status in Unity Linux:
  New
Status in linux-firmware package in Ubuntu:
  Fix Released

Bug description:
  I experience frequent disconnects and auth issues, never more than 30
  minutes without a disconnect. Sometimes dozens of disconnects in a few
  minutes.

  This happens with the default 7260-8 firmware.
  Tried replacing the -8 with -9 ucode. Failed to load due to API version. This 
loaded the -7 driver which seems to be more stable.

  Tested against 2.4ghz APs (Apple, Netgear, Linksys).

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.13.0-32-generic 3.13.0-32.57
  ProcVersionSignature: Ubuntu 3.13.0-32.57-generic 3.13.11.4
  Uname: Linux 3.13.0-32-generic x86_64
  ApportVersion: 2.14.1-0ubuntu3.3
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  steve  2577 F pulseaudio
   /dev/snd/controlC1:  steve  2577 F pulseaudio
  CurrentDesktop: Unity
  Date: Sun Aug 10 17:49:06 2014
  HibernationDevice: RESUME=UUID=374a0c1c-4ac2-456b-a67e-9ea54fe11fe6
  InstallationDate: Installed on 2013-12-28 (225 days ago)
  InstallationMedia: Ubuntu 13.10 Saucy Salamander - Release amd64 
(20131016.1)
  MachineType: Dell Inc. XPS 12-9Q33
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-32-generic 
root=UUID=58deb355-7a09-440b-ade2-69a84fd74460 ro ipv6.disable=1 quiet splash 
vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-3.13.0-32-generic N/A
   linux-backports-modules-3.13.0-32-generic  N/A
   linux-firmware 1.127.5
  SourcePackage: linux
  UpgradeStatus: Upgraded to trusty on 2014-07-06 (35 days ago)
  dmi.bios.date: 05/06/2013
  dmi.bios.vendor: Dell Inc.
  dmi.bios.version: A00
  dmi.board.name: XPS 12-9Q33
  dmi.board.vendor: Dell Inc.
  dmi.board.version: A00
  dmi.chassis.type: 8
  dmi.chassis.vendor: Dell Inc.
  dmi.chassis.version: Not Specified
  dmi.modalias: 
dmi:bvnDellInc.:bvrA00:bd05/06/2013:svnDellInc.:pnXPS12-9Q33:pvrA00:rvnDellInc.:rnXPS12-9Q33:rvrA00:cvnDellInc.:ct8:cvrNotSpecified:
  dmi.product.name: XPS 12-9Q33
  dmi.product.version: A00
  dmi.sys.vendor: Dell Inc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/unitylinux/+bug/1354975/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1466215] Re: linux: 3.2.0-86.124 -proposed tracker

2015-06-18 Thread Brad Figg
** Description changed:

  This bug is for tracking the 3.2.0-86.124 upload package. This bug will
  contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Wednesday, 17. June 2015 20:33 UTC
  kernel-stable-phase:CopyToProposed
  kernel-stable-Prepare-package-end:Thursday, 18. June 2015 01:03 UTC
  kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 01:03 UTC
  kernel-stable-phase-changed:Thursday, 18. June 2015 01:03 UTC
+ kernel-stable-Promote-to-proposed-end:Thursday, 18. June 2015 13:31 UTC
+ kernel-stable-Security-signoff-end:Thursday, 18. June 2015 13:31 UTC

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1466215

Title:
  linux: 3.2.0-86.124 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  New
Status in Kernel SRU Workflow package-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-lbm series:
  Invalid
Status in Kernel SRU Workflow prepare-package-meta series:
  Invalid
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Precise:
  New

Bug description:
  This bug is for tracking the 3.2.0-86.124 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Wednesday, 17. June 2015 20:33 UTC
  kernel-stable-phase:CopyToProposed
  kernel-stable-Prepare-package-end:Thursday, 18. June 2015 01:03 UTC
  kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 01:03 UTC
  kernel-stable-phase-changed:Thursday, 18. June 2015 01:03 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 18. June 2015 13:31 UTC
  kernel-stable-Security-signoff-end:Thursday, 18. June 2015 13:31 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1466215/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1466237] Re: linux: 3.13.0-55.94 -proposed tracker

2015-06-18 Thread Brad Figg
** Description changed:

  This bug is for tracking the 3.13.0-56.93 upload package. This bug will
  contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Wednesday, 17. June 2015 21:56 UTC
  kernel-stable-phase:CopyToProposed
  kernel-stable-Prepare-package-end:Thursday, 18. June 2015 07:03 UTC
  kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 07:03 UTC
  kernel-stable-phase-changed:Thursday, 18. June 2015 07:03 UTC
+ kernel-stable-Promote-to-proposed-end:Thursday, 18. June 2015 13:32 UTC
+ kernel-stable-Security-signoff-end:Thursday, 18. June 2015 13:32 UTC

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1466237

Title:
  linux: 3.13.0-55.94 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  New
Status in Kernel SRU Workflow package-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Invalid
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Trusty:
  New

Bug description:
  This bug is for tracking the 3.13.0-56.93 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Wednesday, 17. June 2015 21:56 UTC
  kernel-stable-phase:CopyToProposed
  kernel-stable-Prepare-package-end:Thursday, 18. June 2015 07:03 UTC
  kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 07:03 UTC
  kernel-stable-phase-changed:Thursday, 18. June 2015 07:03 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 18. June 2015 13:32 UTC
  kernel-stable-Security-signoff-end:Thursday, 18. June 2015 13:32 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1466237/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1466267] Re: linux-armadaxp: 3.2.0-1652.73 -proposed tracker

2015-06-18 Thread Brad Figg
** Description changed:

  This bug is for tracking the 3.2.0-1652.73 upload package. This bug will
  contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Thursday, 18. June 2015 01:02 UTC
  kernel-stable-master-bug:1466215
  kernel-stable-Certification-testing-end:Thursday, 18. June 2015 04:01 UTC
  kernel-stable-Security-signoff-end:Thursday, 18. June 2015 04:01 UTC
  kernel-stable-phase:CopyToProposed
  kernel-stable-Prepare-package-end:Thursday, 18. June 2015 06:01 UTC
  kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 06:01 UTC
  kernel-stable-phase-changed:Thursday, 18. June 2015 06:01 UTC
+ kernel-stable-Promote-to-proposed-end:Thursday, 18. June 2015 13:32 UTC

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1466267

Title:
  linux-armadaxp: 3.2.0-1652.73 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow package-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Invalid
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow upload-to-ppa series:
  Invalid
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-armadaxp source package in Precise:
  In Progress

Bug description:
  This bug is for tracking the 3.2.0-1652.73 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Thursday, 18. June 2015 01:02 UTC
  kernel-stable-master-bug:1466215
  kernel-stable-Certification-testing-end:Thursday, 18. June 2015 04:01 UTC
  kernel-stable-Security-signoff-end:Thursday, 18. June 2015 04:01 UTC
  kernel-stable-phase:CopyToProposed
  kernel-stable-Prepare-package-end:Thursday, 18. June 2015 06:01 UTC
  kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 06:01 UTC
  kernel-stable-phase-changed:Thursday, 18. June 2015 06:01 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 18. June 2015 13:32 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1466267/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1465322] Re: regression: df: `/sys/kernel/debug': Function not implemented with 3.2.0-85.122

2015-06-18 Thread Luis Henriques
** Also affects: linux (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Precise)
   Status: New = Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1465322

Title:
  regression: df: `/sys/kernel/debug': Function not implemented with
  3.2.0-85.122

Status in linux package in Ubuntu:
  In Progress
Status in linux source package in Precise:
  Fix Committed

Bug description:
  $ cat /proc/version_signature
  Ubuntu 3.2.0-84.121-generic 3.2.68

  $ df | head -3
  Filesystem 1K-blocksUsed Available Use% Mounted on
  /dev/vda17481832 4262872   2838904  61% /
  udev  371920   4371916   1% /dev

  $ cat /proc/version_signature
  Ubuntu 3.2.0-85.122-generic 3.2.69

  $ df | head -3
  df: `/sys/kernel/debug': Function not implemented
  Filesystem 1K-blocksUsed Available Use% Mounted on
  /dev/vda17481832 4263012   2838764  61% /
  udev  371920   4371916   1% /dev

  This is confirmed in an amd64 VM and on an amd64 system. It doesn't
  make a difference if I use sudo.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1465322/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1466349] Re: linux-lts-trusty: 3.13.0-55.94~precise1 -proposed tracker

2015-06-18 Thread Brad Figg
All builds are complete, packages in this bug can be copied to
-proposed.

** Changed in: kernel-sru-workflow/prepare-package
   Status: New = Fix Released

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) = Luis Henriques 
(henrix)

** Changed in: kernel-sru-workflow/promote-to-proposed
   Status: New = Confirmed

** Changed in: kernel-sru-workflow/package-testing
   Status: New = Confirmed

** Description changed:

  This bug is for tracking the 3.13.0-55.94~precise1 upload package. This
  bug will contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Thursday, 18. June 2015 07:02 UTC
- kernel-stable-phase:Prepare
- kernel-stable-phase-changed:Thursday, 18. June 2015 07:02 UTC
  kernel-stable-master-bug:1466237
  kernel-stable-Security-signoff-end:Thursday, 18. June 2015 13:32 UTC
+ kernel-stable-phase:CopyToProposed
+ kernel-stable-Prepare-package-end:Thursday, 18. June 2015 16:23 UTC
+ kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 16:23 UTC
+ kernel-stable-phase-changed:Thursday, 18. June 2015 16:23 UTC

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-trusty in Ubuntu.
https://bugs.launchpad.net/bugs/1466349

Title:
  linux-lts-trusty: 3.13.0-55.94~precise1 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  New
Status in Kernel SRU Workflow package-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Invalid
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-trusty source package in Precise:
  New

Bug description:
  This bug is for tracking the 3.13.0-55.94~precise1 upload package.
  This bug will contain status and testing results related to that
  upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Thursday, 18. June 2015 07:02 UTC
  kernel-stable-master-bug:1466237
  kernel-stable-Security-signoff-end:Thursday, 18. June 2015 13:32 UTC
  kernel-stable-phase:CopyToProposed
  kernel-stable-Prepare-package-end:Thursday, 18. June 2015 16:23 UTC
  kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 16:23 UTC
  kernel-stable-phase-changed:Thursday, 18. June 2015 16:23 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1466349/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1466349] Re: linux-lts-trusty: 3.13.0-55.94~precise1 -proposed tracker

2015-06-18 Thread Adam Conrad
** Changed in: kernel-sru-workflow/promote-to-proposed
   Status: Confirmed = Fix Released

** Changed in: kernel-sru-workflow/promote-to-proposed
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Adam Conrad 
(adconrad)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-trusty in Ubuntu.
https://bugs.launchpad.net/bugs/1466349

Title:
  linux-lts-trusty: 3.13.0-55.94~precise1 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  New
Status in Kernel SRU Workflow package-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Invalid
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-trusty source package in Precise:
  New

Bug description:
  This bug is for tracking the 3.13.0-55.94~precise1 upload package.
  This bug will contain status and testing results related to that
  upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Thursday, 18. June 2015 07:02 UTC
  kernel-stable-master-bug:1466237
  kernel-stable-Security-signoff-end:Thursday, 18. June 2015 13:32 UTC
  kernel-stable-phase:CopyToProposed
  kernel-stable-Prepare-package-end:Thursday, 18. June 2015 16:23 UTC
  kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 16:23 UTC
  kernel-stable-phase-changed:Thursday, 18. June 2015 16:23 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1466349/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1466575] [NEW] linux: 3.2.0-87.125 -proposed tracker

2015-06-18 Thread Luis Henriques
Public bug reported:

This bug is for tracking the 3.2.0-87.125 upload package. This bug will
contain status and testing results related to that upload.

For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-Prepare-package-start:Thursday, 18. June 2015 16:21 UTC
kernel-stable-phase:Prepare
kernel-stable-phase-changed:Thursday, 18. June 2015 16:21 UTC

** Affects: kernel-sru-workflow
 Importance: Medium
 Status: In Progress

** Affects: kernel-sru-workflow/certification-testing
 Importance: Medium
 Assignee: Canonical Hardware Certification (canonical-hw-cert)
 Status: New

** Affects: kernel-sru-workflow/package-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/prepare-package
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/prepare-package-lbm
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/prepare-package-meta
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/promote-to-proposed
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-security
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-updates
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/regression-testing
 Importance: Medium
 Assignee: Canonical Platform QA Team (canonical-platform-qa)
 Status: New

** Affects: kernel-sru-workflow/security-signoff
 Importance: Medium
 Assignee: Canonical Security Team (canonical-security)
 Status: New

** Affects: kernel-sru-workflow/verification-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux (Ubuntu Precise)
 Importance: Medium
 Status: New


** Tags: block-proposed-precise kernel-release-tracking-bug precise

** Tags added: kernel-release-tracking-bug

** Tags added: block-proposed-precise

** Also affects: linux (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Tags added: precise

** Also affects: kernel-sru-workflow/certification-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/package-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package-lbm
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-proposed
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-security
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-updates
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/regression-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/security-signoff
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/verification-testing
   Importance: Undecided
   Status: New

** Changed in: kernel-sru-workflow
   Status: New = In Progress

** Changed in: kernel-sru-workflow
   Importance: Undecided = Medium

** Changed in: kernel-sru-workflow/certification-testing
   Importance: Undecided = Medium

** Changed in: kernel-sru-workflow/certification-testing
 Assignee: (unassigned) = Canonical Hardware Certification 
(canonical-hw-cert)

** Changed in: kernel-sru-workflow/package-testing
   Importance: Undecided = Medium

** Changed in: kernel-sru-workflow/package-testing
 Assignee: (unassigned) = Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/prepare-package
   Importance: Undecided = Medium

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: (unassigned) = Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/prepare-package-lbm
   Importance: Undecided = Medium

** Changed in: kernel-sru-workflow/prepare-package-lbm
 Assignee: (unassigned) = Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided = Medium

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: 

[Kernel-packages] [Bug 1466266] Re: linux-ti-omap4: 3.2.0-1466.87 -proposed tracker

2015-06-18 Thread Adam Conrad
** Changed in: kernel-sru-workflow/promote-to-proposed
   Status: Confirmed = Fix Released

** Changed in: kernel-sru-workflow/promote-to-proposed
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Adam Conrad 
(adconrad)

** Changed in: kernel-sru-workflow/upload-to-ppa
   Status: New = Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-ti-omap4 in Ubuntu.
https://bugs.launchpad.net/bugs/1466266

Title:
  linux-ti-omap4: 3.2.0-1466.87 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow package-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Invalid
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow upload-to-ppa series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  New

Bug description:
  This bug is for tracking the version to be filled upload package.
  This bug will contain status and testing results related to that
  upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Thursday, 18. June 2015 01:00 UTC
  kernel-stable-master-bug:1466215
  kernel-stable-Certification-testing-end:Thursday, 18. June 2015 15:01 UTC
  kernel-stable-Security-signoff-end:Thursday, 18. June 2015 15:01 UTC
  kernel-stable-phase:CopyToProposed
  kernel-stable-Prepare-package-end:Thursday, 18. June 2015 16:26 UTC
  kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 16:26 UTC
  kernel-stable-phase-changed:Thursday, 18. June 2015 16:26 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1466266/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1466266] Re: linux-ti-omap4: 3.2.0-1466.87 -proposed tracker

2015-06-18 Thread Brad Figg
All builds are complete, packages in this bug can be copied to
-proposed.

** Changed in: kernel-sru-workflow/prepare-package
   Status: New = Fix Released

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: ubuntu-armel-kernel (ubuntu-armel-kernel) = Luis Henriques 
(henrix)

** Changed in: kernel-sru-workflow/promote-to-proposed
   Status: New = Confirmed

** Changed in: kernel-sru-workflow/package-testing
   Status: New = Confirmed

** Description changed:

  This bug is for tracking the version to be filled upload package. This
  bug will contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Thursday, 18. June 2015 01:00 UTC
- kernel-stable-phase:Prepare
- kernel-stable-phase-changed:Thursday, 18. June 2015 01:00 UTC
  kernel-stable-master-bug:1466215
  kernel-stable-Certification-testing-end:Thursday, 18. June 2015 15:01 UTC
  kernel-stable-Security-signoff-end:Thursday, 18. June 2015 15:01 UTC
+ kernel-stable-phase:CopyToProposed
+ kernel-stable-Prepare-package-end:Thursday, 18. June 2015 16:26 UTC
+ kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 16:26 UTC
+ kernel-stable-phase-changed:Thursday, 18. June 2015 16:26 UTC

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-ti-omap4 in Ubuntu.
https://bugs.launchpad.net/bugs/1466266

Title:
  linux-ti-omap4: 3.2.0-1466.87 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow package-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Invalid
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow upload-to-ppa series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  New

Bug description:
  This bug is for tracking the version to be filled upload package.
  This bug will contain status and testing results related to that
  upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Thursday, 18. June 2015 01:00 UTC
  kernel-stable-master-bug:1466215
  kernel-stable-Certification-testing-end:Thursday, 18. June 2015 15:01 UTC
  kernel-stable-Security-signoff-end:Thursday, 18. June 2015 15:01 UTC
  kernel-stable-phase:CopyToProposed
  kernel-stable-Prepare-package-end:Thursday, 18. June 2015 16:26 UTC
  kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 16:26 UTC
  kernel-stable-phase-changed:Thursday, 18. June 2015 16:26 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1466266/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1416503] Re: CVE-2015-1420

2015-06-18 Thread Luis Henriques
** Changed in: linux (Ubuntu Precise)
   Status: New = Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1416503

Title:
  CVE-2015-1420

Status in linux package in Ubuntu:
  Fix Committed
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-ec2 package in Ubuntu:
  Invalid
Status in linux-flo package in Ubuntu:
  New
Status in linux-fsl-imx51 package in Ubuntu:
  Invalid
Status in linux-goldfish package in Ubuntu:
  New
Status in linux-lts-backport-maverick package in Ubuntu:
  New
Status in linux-lts-backport-natty package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-mako package in Ubuntu:
  New
Status in linux-manta package in Ubuntu:
  New
Status in linux-mvl-dove package in Ubuntu:
  Invalid
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux-lts-backport-maverick source package in Lucid:
  Won't Fix
Status in linux-lts-backport-natty source package in Lucid:
  Won't Fix
Status in linux source package in Precise:
  Fix Committed
Status in linux-armadaxp source package in Precise:
  New
Status in linux-ec2 source package in Precise:
  Invalid
Status in linux-flo source package in Precise:
  Invalid
Status in linux-fsl-imx51 source package in Precise:
  Invalid
Status in linux-goldfish source package in Precise:
  Invalid
Status in linux-lts-backport-maverick source package in Precise:
  New
Status in linux-lts-backport-natty source package in Precise:
  New
Status in linux-lts-quantal source package in Precise:
  New
Status in linux-lts-raring source package in Precise:
  Invalid
Status in linux-lts-saucy source package in Precise:
  New
Status in linux-lts-trusty source package in Precise:
  New
Status in linux-lts-utopic source package in Precise:
  Invalid
Status in linux-lts-vivid source package in Precise:
  Invalid
Status in linux-mako source package in Precise:
  Invalid
Status in linux-manta source package in Precise:
  Invalid
Status in linux-mvl-dove source package in Precise:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  New
Status in linux source package in Trusty:
  Fix Committed
Status in linux-armadaxp source package in Trusty:
  Invalid
Status in linux-ec2 source package in Trusty:
  Invalid
Status in linux-flo source package in Trusty:
  Invalid
Status in linux-fsl-imx51 source package in Trusty:
  Invalid
Status in linux-goldfish source package in Trusty:
  Invalid
Status in linux-lts-backport-maverick source package in Trusty:
  New
Status in linux-lts-backport-natty source package in Trusty:
  New
Status in linux-lts-quantal source package in Trusty:
  Invalid
Status in linux-lts-raring source package in Trusty:
  Invalid
Status in linux-lts-saucy source package in Trusty:
  Invalid
Status in linux-lts-trusty source package in Trusty:
  Invalid
Status in linux-lts-utopic source package in Trusty:
  New
Status in linux-lts-vivid source package in Trusty:
  New
Status in linux-mako source package in Trusty:
  Invalid
Status in linux-manta source package in Trusty:
  Invalid
Status in linux-mvl-dove source package in Trusty:
  Invalid
Status in linux-ti-omap4 source package in Trusty:
  Invalid
Status in linux source package in Utopic:
  Fix Committed
Status in linux-armadaxp source package in Utopic:
  Invalid
Status in linux-ec2 source package in Utopic:
  Invalid
Status in linux-flo source package in Utopic:
  New
Status in linux-fsl-imx51 source package in Utopic:
  Invalid
Status in linux-goldfish source package in Utopic:
  New
Status in linux-lts-backport-maverick source package in Utopic:
  New
Status in linux-lts-backport-natty source package in Utopic:
  New
Status in linux-lts-quantal source package in Utopic:
  Invalid
Status in linux-lts-raring source package in Utopic:
  Invalid
Status in linux-lts-saucy source package in Utopic:
  Invalid
Status in linux-lts-trusty source package in Utopic:
  Invalid
Status in linux-lts-utopic source package in Utopic:
  Invalid
Status in linux-lts-vivid source package in Utopic:
  Invalid
Status in linux-mako source package in Utopic:
  New
Status in linux-manta source package in Utopic:
  New
Status in linux-mvl-dove source package in Utopic:
  Invalid
Status in linux-ti-omap4 source package in Utopic:
  Invalid
Status in linux source package in Vivid:
  Fix Committed
Status in linux-armadaxp source package in Vivid:
  Invalid
Status in linux-ec2 source package in Vivid:
  Invalid
Status in linux-flo source package in Vivid:
  New
Status in linux-fsl-imx51 source package in Vivid:
  Invalid
Status in linux-goldfish source package in 

[Kernel-packages] [Bug 1453299] Re: Screen doesn't turn on after suspend

2015-06-18 Thread Charles Ford
k, bear with me, never done that before.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1453299

Title:
  Screen doesn't turn on after suspend

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  If I close my laptop lid to initiate suspend, everything comes back
  except the screen. This worked in 12.04. I have to just shut off the
  whole thing and restart.

  ---
  ApportVersion: 2.17.2-0ubuntu1
  Architecture: amd64
  CompizPlugins: No value set for 
`/apps/compiz-1/general/screen0/options/active_plugins'
  CompositorRunning: None
  CurrentDesktop: XFCE
  DistUpgraded: Fresh install
  DistroCodename: vivid
  DistroRelease: Ubuntu 15.04
  DistroVariant: ubuntu
  DkmsStatus:
   bcmwl, 6.30.223.248+bdcom, 3.19.0-15-generic, x86_64: installed
   bcmwl, 6.30.223.248+bdcom, 3.19.0-16-generic, x86_64: installed
  ExtraDebuggingInterest: Yes, if not too technical
  GraphicsCard:
   Advanced Micro Devices, Inc. [AMD/ATI] Trinity [Radeon HD 7500G] [1002:990a] 
(prog-if 00 [VGA controller])
     Subsystem: Hewlett-Packard Company Device [103c:18de]
  InstallationDate: Installed on 2015-05-08 (2 days ago)
  InstallationMedia: Xubuntu 15.04 Vivid Vervet - Release amd64 (20150422.1)
  MachineType: Hewlett-Packard HP ENVY 6 Notebook PC
  NonfreeKernelModules: wl
  Package: xorg 1:7.7+7ubuntu4
  PackageArchitecture: amd64
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.19.0-16-generic.efi.signed 
root=UUID=eba69796-db6c-4963-a575-946f695e89d7 ro quiet splash vt.handoff=7
  ProcVersionSignature: Ubuntu 3.19.0-16.16-generic 3.19.3
  Tags:  vivid ubuntu
  UdevLog: Error: [Errno 2] No such file or directory: '/var/log/udev'
  Uname: Linux 3.19.0-16-generic x86_64
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo
  _MarkForUpload: True
  dmi.bios.date: 01/22/2013
  dmi.bios.vendor: Insyde
  dmi.bios.version: F.15
  dmi.board.asset.tag: Base Board Asset Tag
  dmi.board.name: 18DE
  dmi.board.vendor: Hewlett-Packard
  dmi.board.version: 77.47
  dmi.chassis.asset.tag: Chassis Asset Tag
  dmi.chassis.type: 10
  dmi.chassis.vendor: Hewlett-Packard
  dmi.chassis.version: Chassis Version
  dmi.modalias: 
dmi:bvnInsyde:bvrF.15:bd01/22/2013:svnHewlett-Packard:pnHPENVY6NotebookPC:pvr07951020560320100:rvnHewlett-Packard:rn18DE:rvr77.47:cvnHewlett-Packard:ct10:cvrChassisVersion:
  dmi.product.name: HP ENVY 6 Notebook PC
  dmi.product.version: 07951020560320100
  dmi.sys.vendor: Hewlett-Packard
  version.compiz: compiz N/A
  version.ia32-libs: ia32-libs N/A
  version.libdrm2: libdrm2 2.4.60-2
  version.libgl1-mesa-dri: libgl1-mesa-dri 10.5.2-0ubuntu1
  version.libgl1-mesa-dri-experimental: libgl1-mesa-dri-experimental N/A
  version.libgl1-mesa-glx: libgl1-mesa-glx 10.5.2-0ubuntu1
  version.xserver-xorg-core: xserver-xorg-core 2:1.17.1-0ubuntu3
  version.xserver-xorg-input-evdev: xserver-xorg-input-evdev 1:2.9.0-1ubuntu2
  version.xserver-xorg-video-ati: xserver-xorg-video-ati 1:7.5.0-1ubuntu2
  version.xserver-xorg-video-intel: xserver-xorg-video-intel 
2:2.99.917-1~exp1ubuntu2.1
  version.xserver-xorg-video-nouveau: xserver-xorg-video-nouveau 
1:1.0.11-1ubuntu2build1
  xserver.bootTime: Mon May 11 09:06:53 2015
  xserver.configfile: default
  xserver.errors:

  xserver.logfile: /var/log/Xorg.0.log
  xserver.version: 2:1.17.1-0ubuntu3
  xserver.video_driver: radeon

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1453299/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1465755] Re: linux: 3.19.0-22.22 -proposed tracker

2015-06-18 Thread Adam Conrad
** Changed in: kernel-sru-workflow
   Status: Invalid = In Progress

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1465755

Title:
  linux: 3.19.0-22.22 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  New
Status in Kernel SRU Workflow package-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Confirmed
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Vivid:
  New

Bug description:
  This bug is for tracking the 3.19.0-22.22 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 16. June 2015 16:18 UTC
  kernel-stable-phase:CopyToProposed
  kernel-stable-Prepare-package-end:Wednesday, 17. June 2015 02:02 UTC
  kernel-stable-Promote-to-proposed-start:Wednesday, 17. June 2015 02:02 UTC
  kernel-stable-phase-changed:Wednesday, 17. June 2015 02:02 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1465755/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1466266] Re: linux-ti-omap4: 3.2.0-1466.87 -proposed tracker

2015-06-18 Thread Brad Figg
** Description changed:

  This bug is for tracking the version to be filled upload package. This
  bug will contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Thursday, 18. June 2015 01:00 UTC
  kernel-stable-master-bug:1466215
  kernel-stable-Certification-testing-end:Thursday, 18. June 2015 15:01 UTC
  kernel-stable-Security-signoff-end:Thursday, 18. June 2015 15:01 UTC
  kernel-stable-phase:CopyToProposed
  kernel-stable-Prepare-package-end:Thursday, 18. June 2015 16:26 UTC
  kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 16:26 UTC
  kernel-stable-phase-changed:Thursday, 18. June 2015 16:26 UTC
+ kernel-stable-Promote-to-proposed-end:Thursday, 18. June 2015 17:00 UTC

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-ti-omap4 in Ubuntu.
https://bugs.launchpad.net/bugs/1466266

Title:
  linux-ti-omap4: 3.2.0-1466.87 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow package-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Invalid
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow upload-to-ppa series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  New

Bug description:
  This bug is for tracking the version to be filled upload package.
  This bug will contain status and testing results related to that
  upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Thursday, 18. June 2015 01:00 UTC
  kernel-stable-master-bug:1466215
  kernel-stable-Certification-testing-end:Thursday, 18. June 2015 15:01 UTC
  kernel-stable-Security-signoff-end:Thursday, 18. June 2015 15:01 UTC
  kernel-stable-phase:CopyToProposed
  kernel-stable-Prepare-package-end:Thursday, 18. June 2015 16:26 UTC
  kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 16:26 UTC
  kernel-stable-phase-changed:Thursday, 18. June 2015 16:26 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 18. June 2015 17:00 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1466266/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1466349] Re: linux-lts-trusty: 3.13.0-55.94~precise1 -proposed tracker

2015-06-18 Thread Brad Figg
** Description changed:

  This bug is for tracking the 3.13.0-55.94~precise1 upload package. This
  bug will contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Thursday, 18. June 2015 07:02 UTC
  kernel-stable-master-bug:1466237
  kernel-stable-Security-signoff-end:Thursday, 18. June 2015 13:32 UTC
  kernel-stable-phase:CopyToProposed
  kernel-stable-Prepare-package-end:Thursday, 18. June 2015 16:23 UTC
  kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 16:23 UTC
  kernel-stable-phase-changed:Thursday, 18. June 2015 16:23 UTC
+ kernel-stable-Promote-to-proposed-end:Thursday, 18. June 2015 17:01 UTC

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-trusty in Ubuntu.
https://bugs.launchpad.net/bugs/1466349

Title:
  linux-lts-trusty: 3.13.0-55.94~precise1 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  New
Status in Kernel SRU Workflow package-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Invalid
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-trusty source package in Precise:
  New

Bug description:
  This bug is for tracking the 3.13.0-55.94~precise1 upload package.
  This bug will contain status and testing results related to that
  upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Thursday, 18. June 2015 07:02 UTC
  kernel-stable-master-bug:1466237
  kernel-stable-Security-signoff-end:Thursday, 18. June 2015 13:32 UTC
  kernel-stable-phase:CopyToProposed
  kernel-stable-Prepare-package-end:Thursday, 18. June 2015 16:23 UTC
  kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 16:23 UTC
  kernel-stable-phase-changed:Thursday, 18. June 2015 16:23 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 18. June 2015 17:01 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1466349/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1404409] Re: [regression] Intel 10Gb NIC Crashes

2015-06-18 Thread Chris J Arges
** Changed in: linux (Ubuntu)
 Assignee: (unassigned) = Chris J Arges (arges)

** Changed in: linux (Ubuntu)
   Status: Triaged = In Progress

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1404409

Title:
  [regression] Intel 10Gb NIC Crashes

Status in linux package in Ubuntu:
  In Progress

Bug description:
  I posted this to net...@vger.kernel.org as well:
  http://www.spinics.net/lists/netdev/msg309110.html

  I think the next step is to try to bisect this down to a specific commit. I'm 
starting to look at the instructions here:
  https://wiki.ubuntu.com/Kernel/KernelBisection

  -

  Previous history of this thread:
  http://thread.gmane.org/gmane.linux.network/326672

  On 2014-11-04 22:57:19, Tom Herbert wrote:
   Using vlan and bonding? vlan_dev_hard_start_xmit called. A possible
   cause is that bonding interface is out of sync with slave interface
   w.r.t. GSO features. Do we know if this worked in 3.14, 3.15?

  I'm seeing the same sort of crash/warning (skb_war_bad_offload). It's
  happening on Intel 10 Gig NICs using the ixgbe driver. I'm using bridges
  (for virtual machines) on top of VLANs on top of 802.3ad bonding. I'm
  using an MTU of 9000 on the bond0 interface, but 1500 everywhere else.

  I'm always bonding two ports: one one system, I'm bonding two ports on
  identical one-port NICs; on another system, I'm bonding two ports on a
  single two-port NIC. Both systems exhibit the same behavior.

  Everything has worked fine for a couple years on Ubuntu 12.04 Precise
  (Linux 3.2.0). It immediately broke when I upgraded to Ubuntu 14.04
  Trusty (Linux 3.13.0). I can also reproduce this using the packaged
  version of Linux 3.16.0 on Trusty.

  In contrast to other reports of this bug, disabling scatter gather on
  the physical interfaces (e.g. eth0) does *not* stop the crashes
  (assuming I disabled it correctly).

  I currently have two systems (one with Precise, one with Trusty)
  available to do any testing that you'd find helpful.

  Here's a first pass at getting some debugging data.

  The broken system (Ubuntu 14.04 Trusty):

  rlaager@BROKEN:~$ uname -a
  Linux BROKEN 3.13.0-43-generic #72-Ubuntu SMP Mon Dec 8 19:35:06 UTC
  2014 x86_64 x86_64 x86_64 GNU/Linux

  rlaager@BROKEN:~$ ethtool -k p6p1
  Features for p6p1:
  rx-checksumming: on
  tx-checksumming: on
  tx-checksum-ipv4: on
  tx-checksum-ip-generic: off [fixed]
  tx-checksum-ipv6: on
  tx-checksum-fcoe-crc: on [fixed]
  tx-checksum-sctp: on
  scatter-gather: on
  tx-scatter-gather: on
  tx-scatter-gather-fraglist: off [fixed]
  tcp-segmentation-offload: on
  tx-tcp-segmentation: on
  tx-tcp-ecn-segmentation: off [fixed]
  tx-tcp6-segmentation: on
  udp-fragmentation-offload: off [fixed]
  generic-segmentation-offload: on
  generic-receive-offload: on
  large-receive-offload: off
  rx-vlan-offload: on
  tx-vlan-offload: on
  ntuple-filters: off
  receive-hashing: on
  highdma: on [fixed]
  rx-vlan-filter: on
  vlan-challenged: off [fixed]
  tx-lockless: off [fixed]
  netns-local: off [fixed]
  tx-gso-robust: off [fixed]
  tx-fcoe-segmentation: on [fixed]
  tx-gre-segmentation: off [fixed]
  tx-ipip-segmentation: off [fixed]
  tx-sit-segmentation: off [fixed]
  tx-udp_tnl-segmentation: off [fixed]
  tx-mpls-segmentation: off [fixed]
  fcoe-mtu: off [fixed]
  tx-nocache-copy: on
  loopback: off [fixed]
  rx-fcs: off [fixed]
  rx-all: off
  tx-vlan-stag-hw-insert: off [fixed]
  rx-vlan-stag-hw-parse: off [fixed]
  rx-vlan-stag-filter: off [fixed]
  l2-fwd-offload: off

  rlaager@BROKEN:~$ ethtool -k bond0
  Features for bond0:
  rx-checksumming: off [fixed]
  tx-checksumming: on
  tx-checksum-ipv4: off [fixed]
  tx-checksum-ip-generic: on
  tx-checksum-ipv6: off [fixed]
  tx-checksum-fcoe-crc: off [fixed]
  tx-checksum-sctp: off [fixed]
  scatter-gather: on
  tx-scatter-gather: on
  tx-scatter-gather-fraglist: off [requested on]
  tcp-segmentation-offload: on
  tx-tcp-segmentation: on
  tx-tcp-ecn-segmentation: on
  tx-tcp6-segmentation: on
  udp-fragmentation-offload: off [fixed]
  generic-segmentation-offload: on
  generic-receive-offload: on
  large-receive-offload: off
  rx-vlan-offload: on
  tx-vlan-offload: on
  ntuple-filters: off [fixed]
  receive-hashing: off [fixed]
  highdma: on
  rx-vlan-filter: on
  vlan-challenged: off [fixed]
  tx-lockless: on [fixed]
  netns-local: off [fixed]
  tx-gso-robust: off [fixed]
  tx-fcoe-segmentation: off [fixed]
  tx-gre-segmentation: off [fixed]
  tx-ipip-segmentation: off [fixed]
  tx-sit-segmentation: off [fixed]
  tx-udp_tnl-segmentation: on
  tx-mpls-segmentation: off [fixed]
  fcoe-mtu: off [fixed]
  tx-nocache-copy: off [requested on]
  loopback: off [fixed]
  rx-fcs: off [fixed]
  rx-all: off 

[Kernel-packages] [Bug 1458042] Re: [SRU] xgene-enet: add SGMII based 1GbE support for the second port

2015-06-18 Thread Ming Lei
** Changed in: linux (Ubuntu Vivid)
 Assignee: (unassigned) = Ming Lei (tom-leiming)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1458042

Title:
  [SRU] xgene-enet: add SGMII based 1GbE support for the second port

Status in linux package in Ubuntu:
  In Progress
Status in linux source package in Trusty:
  Fix Committed
Status in linux source package in Utopic:
  Fix Committed
Status in linux source package in Vivid:
  New
Status in linux source package in Wily:
  In Progress

Bug description:
  [Impact]
  APM's Mustang boards have a second SGMII based 1GbE interface that is 
currently unsupported by Ubuntu.

  [Test Case]
  Verify that the previously non-working SGMII based 1GbE interface now works.

  [Regression Risk]
  Since the changes touch the driver that supports the existing GbE and first 
SGMII support, it is possible that that support has become impacted. The 
changes also impact drivers/of/of_net.c, which could impact other users of the 
interface.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1458042/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1466591] Re: linux-lts-utopic: 3.16.0-41.57~14.04.1 -proposed tracker

2015-06-18 Thread Brad Figg
All builds are complete, packages in this bug can be copied to
-proposed.

** Changed in: kernel-sru-workflow/prepare-package
   Status: New = Fix Released

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) = Luis Henriques 
(henrix)

** Changed in: kernel-sru-workflow/promote-to-proposed
   Status: New = Confirmed

** Changed in: kernel-sru-workflow/package-testing
   Status: New = Confirmed

** Description changed:

  This bug is for tracking the 3.16.0-41.57~14.04.1 upload package. This
  bug will contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Thursday, 18. June 2015 17:17 UTC
- kernel-stable-phase:Prepare
- kernel-stable-phase-changed:Thursday, 18. June 2015 17:17 UTC
  kernel-stable-master-bug:1466250
  kernel-stable-Security-signoff-end:Thursday, 18. June 2015 20:02 UTC
+ kernel-stable-phase:CopyToProposed
+ kernel-stable-Prepare-package-end:Friday, 19. June 2015 03:02 UTC
+ kernel-stable-Promote-to-proposed-start:Friday, 19. June 2015 03:02 UTC
+ kernel-stable-phase-changed:Friday, 19. June 2015 03:02 UTC

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-utopic in Ubuntu.
https://bugs.launchpad.net/bugs/1466591

Title:
  linux-lts-utopic: 3.16.0-41.57~14.04.1 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  New
Status in Kernel SRU Workflow package-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Invalid
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Confirmed
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-utopic source package in Trusty:
  New

Bug description:
  This bug is for tracking the 3.16.0-41.57~14.04.1 upload package. This
  bug will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Thursday, 18. June 2015 17:17 UTC
  kernel-stable-master-bug:1466250
  kernel-stable-Security-signoff-end:Thursday, 18. June 2015 20:02 UTC
  kernel-stable-phase:CopyToProposed
  kernel-stable-Prepare-package-end:Friday, 19. June 2015 03:02 UTC
  kernel-stable-Promote-to-proposed-start:Friday, 19. June 2015 03:02 UTC
  kernel-stable-phase-changed:Friday, 19. June 2015 03:02 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1466591/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1359117] Re: lightdm and xorg fails to start after kernel update, voltage errors

2015-06-18 Thread Launchpad Bug Tracker
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]

** Changed in: linux (Ubuntu)
   Status: Incomplete = Expired

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1359117

Title:
  lightdm and xorg fails to start after kernel update, voltage errors

Status in linux package in Ubuntu:
  Expired

Bug description:
  Hardware: ASUS UX32VD (zenbook prime)
  Software: Ubuntu 14.04

  I see following errors on dmesg after kernel updated to 3.13.0-34:
  [drm:intel_dp_start_link_train] *ERROR* too many voltage retries, give up

  Lightdm won't start, startx did not help also.

  Tried linux-image-3.16.1 from Utopic - same issue.
  Last working kernel where there is no such problem: 3.13.0-32-generic

  Upstream bug reports:
  https://bugs.freedesktop.org/show_bug.cgi?id=70117
  https://bugzilla.kernel.org/show_bug.cgi?id=74931

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: xorg 1:7.7+1ubuntu8
  ProcVersionSignature: Ubuntu 3.13.0-32.57-generic 3.13.11.4
  Uname: Linux 3.13.0-32-generic x86_64
  .tmp.unity.support.test.0:
   
  ApportVersion: 2.14.1-0ubuntu3.3
  Architecture: amd64
  CompizPlugins: No value set for 
`/apps/compiz-1/general/screen0/options/active_plugins'
  CompositorRunning: compiz
  CompositorUnredirectDriverBlacklist: '(nouveau|Intel).*Mesa 8.0'
  CompositorUnredirectFSW: true
  CurrentDesktop: Unity
  Date: Wed Aug 20 12:57:32 2014
  DistUpgraded: Fresh install
  DistroCodename: trusty
  DistroVariant: ubuntu
  EcryptfsInUse: Yes
  ExtraDebuggingInterest: Yes
  GraphicsCard:
   Intel Corporation 3rd Gen Core processor Graphics Controller [8086:0166] 
(rev 09) (prog-if 00 [VGA controller])
 Subsystem: ASUSTeK Computer Inc. Device [1043:1507]
 Subsystem: ASUSTeK Computer Inc. GeForce GT 620M [1043:1507]
  MachineType: ASUSTeK COMPUTER INC. UX32VD
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-32-generic.efi.signed 
root=UUID=69b256f1-59c3-4193-a1e0-b7c0e333cfbd ro quiet splash pcie_aspm=force 
drm.vblankoffdelay=1 i915.semaphores=1 nmi_watchdog=0 vt.handoff=7
  SourcePackage: xorg
  Symptom: display
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 01/29/2013
  dmi.bios.vendor: American Megatrends Inc.
  dmi.bios.version: UX32VD.214
  dmi.board.asset.tag: ATN12345678901234567
  dmi.board.name: UX32VD
  dmi.board.vendor: ASUSTeK COMPUTER INC.
  dmi.board.version: 1.0
  dmi.chassis.asset.tag: No Asset Tag
  dmi.chassis.type: 10
  dmi.chassis.vendor: ASUSTeK COMPUTER INC.
  dmi.chassis.version: 1.0
  dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvrUX32VD.214:bd01/29/2013:svnASUSTeKCOMPUTERINC.:pnUX32VD:pvr1.0:rvnASUSTeKCOMPUTERINC.:rnUX32VD:rvr1.0:cvnASUSTeKCOMPUTERINC.:ct10:cvr1.0:
  dmi.product.name: UX32VD
  dmi.product.version: 1.0
  dmi.sys.vendor: ASUSTeK COMPUTER INC.
  version.compiz: compiz 1:0.9.11.2+14.04.20140714-0ubuntu1
  version.ia32-libs: ia32-libs N/A
  version.libdrm2: libdrm2 2.4.52-1
  version.libgl1-mesa-dri: libgl1-mesa-dri 10.1.3-0ubuntu0.1
  version.libgl1-mesa-dri-experimental: libgl1-mesa-dri-experimental N/A
  version.libgl1-mesa-glx: libgl1-mesa-glx 10.1.3-0ubuntu0.1
  version.xserver-xorg-core: xserver-xorg-core 2:1.15.1-0ubuntu2
  version.xserver-xorg-input-evdev: xserver-xorg-input-evdev 1:2.8.2-1ubuntu2
  version.xserver-xorg-video-ati: xserver-xorg-video-ati 1:7.3.0-1ubuntu3.1
  version.xserver-xorg-video-intel: xserver-xorg-video-intel 2:2.99.910-0ubuntu1
  version.xserver-xorg-video-nouveau: xserver-xorg-video-nouveau N/A
  xserver.bootTime: Wed Aug 20 11:19:17 2014
  xserver.configfile: default
  xserver.errors:
   
  xserver.logfile: /var/log/Xorg.0.log
  xserver.outputs:
   product id4931 
   vendor CMN
  xserver.version: 2:1.15.1-0ubuntu2

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1359117/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1460657] Re: possible infinite loop when parsing CDC headers

2015-06-18 Thread Adam Lee
** Changed in: linux (Ubuntu Vivid)
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1460657

Title:
  possible infinite loop when parsing CDC headers

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Trusty:
  Fix Committed
Status in linux source package in Utopic:
  Fix Committed
Status in linux source package in Vivid:
  Fix Released

Bug description:
  Bug #1413992 's patch introduced a possible infinite loop.

  commit 0d3bba0287d4e284c3ec7d3397e81eec920d5e7e
  Author: Quentin Casasnovas quentin.casasno...@oracle.com
  Date:   Tue Apr 14 11:25:43 2015 +0200

  cdc-acm: prevent infinite loop when parsing CDC headers.

  Phil and I found out a problem with commit:

    7e860a6e7aa6 (cdc-acm: add sanity checks)

  It added some sanity checks to ignore potential garbage in CDC headers but
  also introduced a potential infinite loop.  This can happen at the first
  loop iteration (elength = 0 in that case) if the description isn't a
  DT_CS_INTERFACE or later if 'buffer[0]' is zero.

  It should also be noted that the wrong length was being added to 'buffer'
  in case 'buffer[1]' was not a DT_CS_INTERFACE descriptor, since elength 
was
  assigned after that check in the loop.

  A specially crafted USB device could be used to trigger this
  infinite loop.

  Fixes: 7e860a6e7aa6 (cdc-acm: add sanity checks)
  Signed-off-by: Phil Turnbull phil.turnb...@oracle.com
  Signed-off-by: Quentin Casasnovas quentin.casasno...@oracle.com
  CC: Sergei Shtylyov sergei.shtyl...@cogentembedded.com
  CC: Oliver Neukum oneu...@suse.de
  CC: Adam Lee adam8...@gmail.com
  CC: sta...@vger.kernel.org
  Signed-off-by: Greg Kroah-Hartman gre...@linuxfoundation.org

  ===
  break-fix: 7e860a6e7aa62b337a61110430cd633db5b0d2dd 
0d3bba0287d4e284c3ec7d3397e81eec920d5e7e

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1460657/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1397885] Re: [Atheros AR9462] Bluetooth looks activated but cannot be used

2015-06-18 Thread Pilot6
*** This bug is a duplicate of bug 1394368 ***
https://bugs.launchpad.net/bugs/1394368

More correct link.

http://git.kernel.org/cgit/linux/kernel/git/bluetooth/bluetooth-
next.git/commit/?id=7e730c7f3d1f39c25cf5f7cf70c0ff4c28d7bec7

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to bluez in Ubuntu.
https://bugs.launchpad.net/bugs/1397885

Title:
  [Atheros AR9462] Bluetooth looks activated but cannot be used

Status in bluez package in Ubuntu:
  In Progress

Bug description:
  Ubuntu 14.10

  System Information
Manufacturer: Acer
Product Name: Aspire VN7-591G
Version: V1.08
SKU Number: Aspire VN7-591G_091B_1.08
Family: Sharkbay System

  lspci
  07:00.0 Network controller: Qualcomm Atheros AR9462 Wireless Network Adapter 
(rev 01)

  
  lsusb -v
  Bus 003 Device 006: ID 04ca:300d Lite-On Technology Corp. 

  
  Steps to reproduce:
  1. Activate a Bluetooth device (for instance a mouse or a nearby device)
  2. On the laptop, press the Bluetooth icon, then Set Up new Device…

  Expected result:
  2. A list of available bluetooth devices is shown

  Actual result:
  2. Nothing shows up and the spinning icon keeps spinning with Searching for 
devices...

  It looks like the bluetooth device does not work at all.

  Apparently, there have been previous bugs reported and corrected [1],
  but the situation still occurs with this module on my laptop...

  [1] https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1024884

  ProblemType: Bug
  DistroRelease: Ubuntu 14.10
  Package: bluez 4.101-0ubuntu20
  ProcVersionSignature: Ubuntu 3.16.0-25.33-generic 3.16.7
  Uname: Linux 3.16.0-25-generic x86_64
  ApportVersion: 2.14.7-0ubuntu8
  Architecture: amd64
  CurrentDesktop: Unity
  Date: Mon Dec  1 16:35:17 2014
  EcryptfsInUse: Yes
  InstallationDate: Installed on 2014-11-15 (15 days ago)
  InstallationMedia: Ubuntu 14.10 Utopic Unicorn - Release amd64 (20141022.1)
  InterestingModules: bnep rfcomm btusb bluetooth
  MachineType: Acer Aspire VN7-591G
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.16.0-25-generic.efi.signed 
root=/dev/mapper/ubuntu--vg-root ro quiet splash vt.handoff=7
  SourcePackage: bluez
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 09/12/2014
  dmi.bios.vendor: Insyde Corp.
  dmi.bios.version: V1.08
  dmi.board.asset.tag: No Asset Tag
  dmi.board.name: Aspire VN7-591G
  dmi.board.vendor: Acer
  dmi.board.version: V1.08
  dmi.chassis.asset.tag: No Asset Tag
  dmi.chassis.type: 10
  dmi.chassis.vendor: Chassis Manufacturer
  dmi.chassis.version: V1.08
  dmi.modalias: 
dmi:bvnInsydeCorp.:bvrV1.08:bd09/12/2014:svnAcer:pnAspireVN7-591G:pvrV1.08:rvnAcer:rnAspireVN7-591G:rvrV1.08:cvnChassisManufacturer:ct10:cvrV1.08:
  dmi.product.name: Aspire VN7-591G
  dmi.product.version: V1.08
  dmi.sys.vendor: Acer
  hciconfig:
   hci0:Type: BR/EDR  Bus: USB
BD Address: 5C:93:A2:EB:FF:43  ACL MTU: 1022:8  SCO MTU: 183:5
UP RUNNING PSCAN ISCAN 
RX bytes:2751 acl:0 sco:0 events:351 errors:0
TX bytes:3779 acl:0 sco:0 commands:306 errors:0
  syslog:
   Dec  1 16:21:16 Miles bluetoothd[631]: Discovery session 0x7fa5da51da30 with 
:1.228 activated
   Dec  1 16:27:43 Miles bluetoothd[631]: Discovery session 0x7fa5da530a50 with 
:1.230 activated

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/bluez/+bug/1397885/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1394368] Re: Bluetooth with AR9462 doesn't work (New ID /Firmware)

2015-06-18 Thread Pilot6
** Changed in: linux-firmware (Ubuntu)
   Status: Incomplete = In Progress

** Package changed: linux-firmware (Ubuntu) = linux (Ubuntu)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launchpad.net/bugs/1394368

Title:
  Bluetooth with AR9462 doesn't work (New ID /Firmware)

Status in linux package in Ubuntu:
  In Progress
Status in linux-firmware package in Ubuntu:
  Confirmed

Bug description:
  This is (kind of) a duplicate of:
  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1024884
  (please read)

  I can't use Bluetooth with my AR9462 WLAN/BT-Combo.
  In the link above, it has been fixed, but not for my Adapter ID/Firmware:

  System:
  Ubuntu 14.10 utopic 64bit - 3.16.0-24-generic x86_64

  lspci -nnk
  02:00.0 Network controller [0280]: Qualcomm Atheros AR9462
  Wireless Network Adapter [168c:0034] (rev 01)
   Subsystem: Lite-On Communications Inc Device [11ad:0802]
   Kernel driver in use: ath9k

  lsusb (identified Bluetooth Device)
  Bus 002 Device 003: ID 04ca:300d Lite-On Technology Corp.

  ath9k.conf
  options ath9k btcoex_enable=1

  The 04ca:300d ID is not in the Kernel, so i added it via dkms.

  I took ath3k.c and btusb.c out of the 3.16.0-24-generic source files
  and changed them:

  diff -urN ./linux-3.16.0/drivers/bluetooth/ath3k.c 
/usr/src/ar9462-1.5.1/ath3k.c
  --- ./linux-3.16.0/drivers/bluetooth/ath3k.c  2014-08-04 00:25:02.0 
+0200
  +++ /usr/src/ar9462-1.5.1/ath3k.c 2014-11-19 21:12:46.646265890 +0100
  @@ -85,6 +85,7 @@
    { USB_DEVICE(0x04CA, 0x3007) },
    { USB_DEVICE(0x04CA, 0x3008) },
    { USB_DEVICE(0x04CA, 0x300b) },
  + { USB_DEVICE(0x04CA, 0x300d) },
    { USB_DEVICE(0x0930, 0x0219) },
    { USB_DEVICE(0x0930, 0x0220) },
    { USB_DEVICE(0x0b05, 0x17d0) },
  @@ -134,6 +135,7 @@
    { USB_DEVICE(0x04ca, 0x3007), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x04ca, 0x3008), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x04ca, 0x300b), .driver_info = BTUSB_ATH3012 },
  + { USB_DEVICE(0x04ca, 0x300d), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x0930, 0x0219), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x0930, 0x0220), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x0b05, 0x17d0), .driver_info = BTUSB_ATH3012 },

  diff -urN ./linux-3.16.0/drivers/bluetooth/btusb.c 
/usr/src/ar9462-1.5.1/btusb.c
  --- ./linux-3.16.0/drivers/bluetooth/btusb.c  2014-08-04 00:25:02.0 
+0200
  +++ /usr/src/ar9462-1.5.1/btusb.c 2014-11-19 21:12:46.646265890 +0100
  @@ -157,6 +157,7 @@
    { USB_DEVICE(0x04ca, 0x3007), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x04ca, 0x3008), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x04ca, 0x300b), .driver_info = BTUSB_ATH3012 },
  + { USB_DEVICE(0x04ca, 0x300d), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x0930, 0x0219), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x0930, 0x0220), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x0b05, 0x17d0), .driver_info = BTUSB_ATH3012 },

  sudo dkms add -m ar9462 -v 1.5.1
  sudo dkms build -m ar9462 -v 1.5.1
  sudo dkms install -m ar9462 -v 1.5.1

  (DKMS package in the same style/versioning as in the bug report above)

  dkms status
  ar9462, 1.5.1, 3.16.0-24-generic, x86_64: installed

  Now the new output:

  dmesg | egrep 'ath3|ar3|Bluet'
  [2.787819] Bluetooth: Core ver 2.19
  [2.787833] Bluetooth: HCI device and connection manager initialized
  [2.787839] Bluetooth: HCI socket layer initialized
  [2.787842] Bluetooth: L2CAP socket layer initialized
  [2.787848] Bluetooth: SCO socket layer initialized
  [2.793551] Bluetooth: BNEP (Ethernet Emulation) ver 1.3
  [2.793554] Bluetooth: BNEP filters: protocol multicast
  [2.793561] Bluetooth: BNEP socket layer initialized
  [3.130779] Bluetooth: Patch file not found ar3k/AthrBT_0x11020100.dfu
  [3.130783] Bluetooth: Loading patch file failed
  [3.130788] ath3k: probe of 2-5:1.0 failed with error -12
  [3.130823] usbcore: registered new interface driver ath3k
  [9.776503] Bluetooth: RFCOMM TTY layer initialized
  [9.776512] Bluetooth: RFCOMM socket layer initialized
  [9.776517] Bluetooth: RFCOMM ver 1.11

  My patch works, but just like in the bug report above, a Firmware file is 
missing:
  AthrBT_0x11020100.dfu

  I found it neither in linux-firmware 
(http://git.kernel.org/cgit/linux/kernel/git/firmware/linux-firmware.git/tree/ar3k)
  nor elsewhere.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1394368/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1466266] Re: linux-ti-omap4: 3.2.0-1466.87 -proposed tracker

2015-06-18 Thread Brad Figg
** Changed in: kernel-sru-workflow/verification-testing
   Status: New = In Progress

** Changed in: kernel-sru-workflow/regression-testing
   Status: New = Confirmed

** Description changed:

  This bug is for tracking the version to be filled upload package. This
  bug will contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Thursday, 18. June 2015 01:00 UTC
  kernel-stable-master-bug:1466215
  kernel-stable-Certification-testing-end:Thursday, 18. June 2015 15:01 UTC
  kernel-stable-Security-signoff-end:Thursday, 18. June 2015 15:01 UTC
- kernel-stable-phase:CopyToProposed
  kernel-stable-Prepare-package-end:Thursday, 18. June 2015 16:26 UTC
  kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 16:26 UTC
- kernel-stable-phase-changed:Thursday, 18. June 2015 16:26 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 18. June 2015 17:00 UTC
+ kernel-stable-phase:Verification  Testing
+ kernel-stable-phase-changed:Thursday, 18. June 2015 18:00 UTC
+ kernel-stable-Verification-testing-start:Thursday, 18. June 2015 18:00 UTC
+ proposed-announcement-sent:True
+ kernel-stable-Regression-testing-start:Thursday, 18. June 2015 18:01 UTC

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-ti-omap4 in Ubuntu.
https://bugs.launchpad.net/bugs/1466266

Title:
  linux-ti-omap4: 3.2.0-1466.87 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow package-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Invalid
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Confirmed
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow upload-to-ppa series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  In Progress
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  New

Bug description:
  This bug is for tracking the version to be filled upload package.
  This bug will contain status and testing results related to that
  upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Thursday, 18. June 2015 01:00 UTC
  kernel-stable-master-bug:1466215
  kernel-stable-Certification-testing-end:Thursday, 18. June 2015 15:01 UTC
  kernel-stable-Security-signoff-end:Thursday, 18. June 2015 15:01 UTC
  kernel-stable-Prepare-package-end:Thursday, 18. June 2015 16:26 UTC
  kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 16:26 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 18. June 2015 17:00 UTC
  kernel-stable-phase:Verification  Testing
  kernel-stable-phase-changed:Thursday, 18. June 2015 18:00 UTC
  kernel-stable-Verification-testing-start:Thursday, 18. June 2015 18:00 UTC
  proposed-announcement-sent:True
  kernel-stable-Regression-testing-start:Thursday, 18. June 2015 18:01 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1466266/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1394368] Re: Bluetooth with AR9462 doesn't work (New ID /Firmware)

2015-06-18 Thread Wallcom
Sorry, i forgot on which machine i was on.

With the correct firmware and the patch described in the initial post  (thanks 
for sending it upstream!),
it still hat the loading bug as described in 
https://bugs.launchpad.net/ubuntu/+source/linux-firmware/+bug/1394368/comments/10


dmesg | egrep 'ath3|ar3|Bluet'
[3.198102] Bluetooth: Core ver 2.19
[3.198140] Bluetooth: HCI device and connection manager initialized
[3.198147] Bluetooth: HCI socket layer initialized
[3.198149] Bluetooth: L2CAP socket layer initialized
[3.198157] Bluetooth: SCO socket layer initialized
[3.205334] Bluetooth: BNEP (Ethernet Emulation) ver 1.3
[3.205336] Bluetooth: BNEP filters: protocol multicast
[3.205342] Bluetooth: BNEP socket layer initialized
[3.213183] Bluetooth: RFCOMM TTY layer initialized
[3.213195] Bluetooth: RFCOMM socket layer initialized
[3.213201] Bluetooth: RFCOMM ver 1.11
[3.295666] usbcore: registered new interface driver ath3k
[6.794243] Bluetooth: Error in firmware loading err = -110,len = 448, size 
= 4096
[6.794265] Bluetooth: Loading patch file failed
[6.794271] ath3k: probe of 2-5:1.0 failed with error -110

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1394368

Title:
  Bluetooth with AR9462 doesn't work (New ID /Firmware)

Status in linux package in Ubuntu:
  In Progress
Status in linux-firmware package in Ubuntu:
  Confirmed

Bug description:
  This is (kind of) a duplicate of:
  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1024884
  (please read)

  I can't use Bluetooth with my AR9462 WLAN/BT-Combo.
  In the link above, it has been fixed, but not for my Adapter ID/Firmware:

  System:
  Ubuntu 14.10 utopic 64bit - 3.16.0-24-generic x86_64

  lspci -nnk
  02:00.0 Network controller [0280]: Qualcomm Atheros AR9462
  Wireless Network Adapter [168c:0034] (rev 01)
   Subsystem: Lite-On Communications Inc Device [11ad:0802]
   Kernel driver in use: ath9k

  lsusb (identified Bluetooth Device)
  Bus 002 Device 003: ID 04ca:300d Lite-On Technology Corp.

  ath9k.conf
  options ath9k btcoex_enable=1

  The 04ca:300d ID is not in the Kernel, so i added it via dkms.

  I took ath3k.c and btusb.c out of the 3.16.0-24-generic source files
  and changed them:

  diff -urN ./linux-3.16.0/drivers/bluetooth/ath3k.c 
/usr/src/ar9462-1.5.1/ath3k.c
  --- ./linux-3.16.0/drivers/bluetooth/ath3k.c  2014-08-04 00:25:02.0 
+0200
  +++ /usr/src/ar9462-1.5.1/ath3k.c 2014-11-19 21:12:46.646265890 +0100
  @@ -85,6 +85,7 @@
    { USB_DEVICE(0x04CA, 0x3007) },
    { USB_DEVICE(0x04CA, 0x3008) },
    { USB_DEVICE(0x04CA, 0x300b) },
  + { USB_DEVICE(0x04CA, 0x300d) },
    { USB_DEVICE(0x0930, 0x0219) },
    { USB_DEVICE(0x0930, 0x0220) },
    { USB_DEVICE(0x0b05, 0x17d0) },
  @@ -134,6 +135,7 @@
    { USB_DEVICE(0x04ca, 0x3007), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x04ca, 0x3008), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x04ca, 0x300b), .driver_info = BTUSB_ATH3012 },
  + { USB_DEVICE(0x04ca, 0x300d), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x0930, 0x0219), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x0930, 0x0220), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x0b05, 0x17d0), .driver_info = BTUSB_ATH3012 },

  diff -urN ./linux-3.16.0/drivers/bluetooth/btusb.c 
/usr/src/ar9462-1.5.1/btusb.c
  --- ./linux-3.16.0/drivers/bluetooth/btusb.c  2014-08-04 00:25:02.0 
+0200
  +++ /usr/src/ar9462-1.5.1/btusb.c 2014-11-19 21:12:46.646265890 +0100
  @@ -157,6 +157,7 @@
    { USB_DEVICE(0x04ca, 0x3007), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x04ca, 0x3008), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x04ca, 0x300b), .driver_info = BTUSB_ATH3012 },
  + { USB_DEVICE(0x04ca, 0x300d), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x0930, 0x0219), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x0930, 0x0220), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x0b05, 0x17d0), .driver_info = BTUSB_ATH3012 },

  sudo dkms add -m ar9462 -v 1.5.1
  sudo dkms build -m ar9462 -v 1.5.1
  sudo dkms install -m ar9462 -v 1.5.1

  (DKMS package in the same style/versioning as in the bug report above)

  dkms status
  ar9462, 1.5.1, 3.16.0-24-generic, x86_64: installed

  Now the new output:

  dmesg | egrep 'ath3|ar3|Bluet'
  [2.787819] Bluetooth: Core ver 2.19
  [2.787833] Bluetooth: HCI device and connection manager initialized
  [2.787839] Bluetooth: HCI socket layer initialized
  [2.787842] Bluetooth: L2CAP socket layer initialized
  [2.787848] Bluetooth: SCO socket layer initialized
  [2.793551] Bluetooth: BNEP (Ethernet Emulation) ver 1.3
  [2.793554] Bluetooth: BNEP filters: protocol multicast
  [2.793561] Bluetooth: BNEP socket layer initialized
  [3.130779] Bluetooth: Patch file not found ar3k/AthrBT_0x11020100.dfu
  [3.130783] Bluetooth: 

[Kernel-packages] [Bug 1394368] Re: Bluetooth with AR9462 doesn't work (New ID /Firmware)

2015-06-18 Thread Pilot6
** Also affects: linux-firmware (Ubuntu)
   Importance: Undecided
   Status: New

** Changed in: linux-firmware (Ubuntu)
   Status: New = Confirmed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launchpad.net/bugs/1394368

Title:
  Bluetooth with AR9462 doesn't work (New ID /Firmware)

Status in linux package in Ubuntu:
  In Progress
Status in linux-firmware package in Ubuntu:
  Confirmed

Bug description:
  This is (kind of) a duplicate of:
  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1024884
  (please read)

  I can't use Bluetooth with my AR9462 WLAN/BT-Combo.
  In the link above, it has been fixed, but not for my Adapter ID/Firmware:

  System:
  Ubuntu 14.10 utopic 64bit - 3.16.0-24-generic x86_64

  lspci -nnk
  02:00.0 Network controller [0280]: Qualcomm Atheros AR9462
  Wireless Network Adapter [168c:0034] (rev 01)
   Subsystem: Lite-On Communications Inc Device [11ad:0802]
   Kernel driver in use: ath9k

  lsusb (identified Bluetooth Device)
  Bus 002 Device 003: ID 04ca:300d Lite-On Technology Corp.

  ath9k.conf
  options ath9k btcoex_enable=1

  The 04ca:300d ID is not in the Kernel, so i added it via dkms.

  I took ath3k.c and btusb.c out of the 3.16.0-24-generic source files
  and changed them:

  diff -urN ./linux-3.16.0/drivers/bluetooth/ath3k.c 
/usr/src/ar9462-1.5.1/ath3k.c
  --- ./linux-3.16.0/drivers/bluetooth/ath3k.c  2014-08-04 00:25:02.0 
+0200
  +++ /usr/src/ar9462-1.5.1/ath3k.c 2014-11-19 21:12:46.646265890 +0100
  @@ -85,6 +85,7 @@
    { USB_DEVICE(0x04CA, 0x3007) },
    { USB_DEVICE(0x04CA, 0x3008) },
    { USB_DEVICE(0x04CA, 0x300b) },
  + { USB_DEVICE(0x04CA, 0x300d) },
    { USB_DEVICE(0x0930, 0x0219) },
    { USB_DEVICE(0x0930, 0x0220) },
    { USB_DEVICE(0x0b05, 0x17d0) },
  @@ -134,6 +135,7 @@
    { USB_DEVICE(0x04ca, 0x3007), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x04ca, 0x3008), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x04ca, 0x300b), .driver_info = BTUSB_ATH3012 },
  + { USB_DEVICE(0x04ca, 0x300d), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x0930, 0x0219), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x0930, 0x0220), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x0b05, 0x17d0), .driver_info = BTUSB_ATH3012 },

  diff -urN ./linux-3.16.0/drivers/bluetooth/btusb.c 
/usr/src/ar9462-1.5.1/btusb.c
  --- ./linux-3.16.0/drivers/bluetooth/btusb.c  2014-08-04 00:25:02.0 
+0200
  +++ /usr/src/ar9462-1.5.1/btusb.c 2014-11-19 21:12:46.646265890 +0100
  @@ -157,6 +157,7 @@
    { USB_DEVICE(0x04ca, 0x3007), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x04ca, 0x3008), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x04ca, 0x300b), .driver_info = BTUSB_ATH3012 },
  + { USB_DEVICE(0x04ca, 0x300d), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x0930, 0x0219), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x0930, 0x0220), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x0b05, 0x17d0), .driver_info = BTUSB_ATH3012 },

  sudo dkms add -m ar9462 -v 1.5.1
  sudo dkms build -m ar9462 -v 1.5.1
  sudo dkms install -m ar9462 -v 1.5.1

  (DKMS package in the same style/versioning as in the bug report above)

  dkms status
  ar9462, 1.5.1, 3.16.0-24-generic, x86_64: installed

  Now the new output:

  dmesg | egrep 'ath3|ar3|Bluet'
  [2.787819] Bluetooth: Core ver 2.19
  [2.787833] Bluetooth: HCI device and connection manager initialized
  [2.787839] Bluetooth: HCI socket layer initialized
  [2.787842] Bluetooth: L2CAP socket layer initialized
  [2.787848] Bluetooth: SCO socket layer initialized
  [2.793551] Bluetooth: BNEP (Ethernet Emulation) ver 1.3
  [2.793554] Bluetooth: BNEP filters: protocol multicast
  [2.793561] Bluetooth: BNEP socket layer initialized
  [3.130779] Bluetooth: Patch file not found ar3k/AthrBT_0x11020100.dfu
  [3.130783] Bluetooth: Loading patch file failed
  [3.130788] ath3k: probe of 2-5:1.0 failed with error -12
  [3.130823] usbcore: registered new interface driver ath3k
  [9.776503] Bluetooth: RFCOMM TTY layer initialized
  [9.776512] Bluetooth: RFCOMM socket layer initialized
  [9.776517] Bluetooth: RFCOMM ver 1.11

  My patch works, but just like in the bug report above, a Firmware file is 
missing:
  AthrBT_0x11020100.dfu

  I found it neither in linux-firmware 
(http://git.kernel.org/cgit/linux/kernel/git/firmware/linux-firmware.git/tree/ar3k)
  nor elsewhere.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1394368/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1397885] Re: [Atheros AR9462] Bluetooth looks activated but cannot be used

2015-06-18 Thread Pilot6
*** This bug is a duplicate of bug 1394368 ***
https://bugs.launchpad.net/bugs/1394368

This device needs new firmware. I added it to ppa.

Just install this deb.

https://launchpad.net/~hanipouspilot/+archive/ubuntu/rtlwifi/+files
/linux-firmware_1.144%2Bar3012_all.deb

The patch has been applied upstream.

http://git.kernel.org/cgit/linux/kernel/git/bluetooth/bluetooth-
next.git/commit/drivers/bluetooth/ath3k.c?id=7e730c7f3d1f39c25cf5f7cf70c0ff4c28d7bec7

** Changed in: bluez (Ubuntu)
   Status: Confirmed = In Progress

** This bug has been marked a duplicate of bug 1394368
   Bluetooth with AR9462 doesn't work (New ID /Firmware)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to bluez in Ubuntu.
https://bugs.launchpad.net/bugs/1397885

Title:
  [Atheros AR9462] Bluetooth looks activated but cannot be used

Status in bluez package in Ubuntu:
  In Progress

Bug description:
  Ubuntu 14.10

  System Information
Manufacturer: Acer
Product Name: Aspire VN7-591G
Version: V1.08
SKU Number: Aspire VN7-591G_091B_1.08
Family: Sharkbay System

  lspci
  07:00.0 Network controller: Qualcomm Atheros AR9462 Wireless Network Adapter 
(rev 01)

  
  lsusb -v
  Bus 003 Device 006: ID 04ca:300d Lite-On Technology Corp. 

  
  Steps to reproduce:
  1. Activate a Bluetooth device (for instance a mouse or a nearby device)
  2. On the laptop, press the Bluetooth icon, then Set Up new Device…

  Expected result:
  2. A list of available bluetooth devices is shown

  Actual result:
  2. Nothing shows up and the spinning icon keeps spinning with Searching for 
devices...

  It looks like the bluetooth device does not work at all.

  Apparently, there have been previous bugs reported and corrected [1],
  but the situation still occurs with this module on my laptop...

  [1] https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1024884

  ProblemType: Bug
  DistroRelease: Ubuntu 14.10
  Package: bluez 4.101-0ubuntu20
  ProcVersionSignature: Ubuntu 3.16.0-25.33-generic 3.16.7
  Uname: Linux 3.16.0-25-generic x86_64
  ApportVersion: 2.14.7-0ubuntu8
  Architecture: amd64
  CurrentDesktop: Unity
  Date: Mon Dec  1 16:35:17 2014
  EcryptfsInUse: Yes
  InstallationDate: Installed on 2014-11-15 (15 days ago)
  InstallationMedia: Ubuntu 14.10 Utopic Unicorn - Release amd64 (20141022.1)
  InterestingModules: bnep rfcomm btusb bluetooth
  MachineType: Acer Aspire VN7-591G
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.16.0-25-generic.efi.signed 
root=/dev/mapper/ubuntu--vg-root ro quiet splash vt.handoff=7
  SourcePackage: bluez
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 09/12/2014
  dmi.bios.vendor: Insyde Corp.
  dmi.bios.version: V1.08
  dmi.board.asset.tag: No Asset Tag
  dmi.board.name: Aspire VN7-591G
  dmi.board.vendor: Acer
  dmi.board.version: V1.08
  dmi.chassis.asset.tag: No Asset Tag
  dmi.chassis.type: 10
  dmi.chassis.vendor: Chassis Manufacturer
  dmi.chassis.version: V1.08
  dmi.modalias: 
dmi:bvnInsydeCorp.:bvrV1.08:bd09/12/2014:svnAcer:pnAspireVN7-591G:pvrV1.08:rvnAcer:rnAspireVN7-591G:rvrV1.08:cvnChassisManufacturer:ct10:cvrV1.08:
  dmi.product.name: Aspire VN7-591G
  dmi.product.version: V1.08
  dmi.sys.vendor: Acer
  hciconfig:
   hci0:Type: BR/EDR  Bus: USB
BD Address: 5C:93:A2:EB:FF:43  ACL MTU: 1022:8  SCO MTU: 183:5
UP RUNNING PSCAN ISCAN 
RX bytes:2751 acl:0 sco:0 events:351 errors:0
TX bytes:3779 acl:0 sco:0 commands:306 errors:0
  syslog:
   Dec  1 16:21:16 Miles bluetoothd[631]: Discovery session 0x7fa5da51da30 with 
:1.228 activated
   Dec  1 16:27:43 Miles bluetoothd[631]: Discovery session 0x7fa5da530a50 with 
:1.230 activated

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/bluez/+bug/1397885/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1394368] Re: Bluetooth with AR9462 doesn't work (New ID /Firmware)

2015-06-18 Thread Pilot6
Full patch, not just ath3k

http://git.kernel.org/cgit/linux/kernel/git/bluetooth/bluetooth-
next.git/commit/?id=7e730c7f3d1f39c25cf5f7cf70c0ff4c28d7bec7

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1394368

Title:
  Bluetooth with AR9462 doesn't work (New ID /Firmware)

Status in linux package in Ubuntu:
  In Progress
Status in linux-firmware package in Ubuntu:
  Confirmed

Bug description:
  This is (kind of) a duplicate of:
  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1024884
  (please read)

  I can't use Bluetooth with my AR9462 WLAN/BT-Combo.
  In the link above, it has been fixed, but not for my Adapter ID/Firmware:

  System:
  Ubuntu 14.10 utopic 64bit - 3.16.0-24-generic x86_64

  lspci -nnk
  02:00.0 Network controller [0280]: Qualcomm Atheros AR9462
  Wireless Network Adapter [168c:0034] (rev 01)
   Subsystem: Lite-On Communications Inc Device [11ad:0802]
   Kernel driver in use: ath9k

  lsusb (identified Bluetooth Device)
  Bus 002 Device 003: ID 04ca:300d Lite-On Technology Corp.

  ath9k.conf
  options ath9k btcoex_enable=1

  The 04ca:300d ID is not in the Kernel, so i added it via dkms.

  I took ath3k.c and btusb.c out of the 3.16.0-24-generic source files
  and changed them:

  diff -urN ./linux-3.16.0/drivers/bluetooth/ath3k.c 
/usr/src/ar9462-1.5.1/ath3k.c
  --- ./linux-3.16.0/drivers/bluetooth/ath3k.c  2014-08-04 00:25:02.0 
+0200
  +++ /usr/src/ar9462-1.5.1/ath3k.c 2014-11-19 21:12:46.646265890 +0100
  @@ -85,6 +85,7 @@
    { USB_DEVICE(0x04CA, 0x3007) },
    { USB_DEVICE(0x04CA, 0x3008) },
    { USB_DEVICE(0x04CA, 0x300b) },
  + { USB_DEVICE(0x04CA, 0x300d) },
    { USB_DEVICE(0x0930, 0x0219) },
    { USB_DEVICE(0x0930, 0x0220) },
    { USB_DEVICE(0x0b05, 0x17d0) },
  @@ -134,6 +135,7 @@
    { USB_DEVICE(0x04ca, 0x3007), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x04ca, 0x3008), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x04ca, 0x300b), .driver_info = BTUSB_ATH3012 },
  + { USB_DEVICE(0x04ca, 0x300d), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x0930, 0x0219), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x0930, 0x0220), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x0b05, 0x17d0), .driver_info = BTUSB_ATH3012 },

  diff -urN ./linux-3.16.0/drivers/bluetooth/btusb.c 
/usr/src/ar9462-1.5.1/btusb.c
  --- ./linux-3.16.0/drivers/bluetooth/btusb.c  2014-08-04 00:25:02.0 
+0200
  +++ /usr/src/ar9462-1.5.1/btusb.c 2014-11-19 21:12:46.646265890 +0100
  @@ -157,6 +157,7 @@
    { USB_DEVICE(0x04ca, 0x3007), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x04ca, 0x3008), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x04ca, 0x300b), .driver_info = BTUSB_ATH3012 },
  + { USB_DEVICE(0x04ca, 0x300d), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x0930, 0x0219), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x0930, 0x0220), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x0b05, 0x17d0), .driver_info = BTUSB_ATH3012 },

  sudo dkms add -m ar9462 -v 1.5.1
  sudo dkms build -m ar9462 -v 1.5.1
  sudo dkms install -m ar9462 -v 1.5.1

  (DKMS package in the same style/versioning as in the bug report above)

  dkms status
  ar9462, 1.5.1, 3.16.0-24-generic, x86_64: installed

  Now the new output:

  dmesg | egrep 'ath3|ar3|Bluet'
  [2.787819] Bluetooth: Core ver 2.19
  [2.787833] Bluetooth: HCI device and connection manager initialized
  [2.787839] Bluetooth: HCI socket layer initialized
  [2.787842] Bluetooth: L2CAP socket layer initialized
  [2.787848] Bluetooth: SCO socket layer initialized
  [2.793551] Bluetooth: BNEP (Ethernet Emulation) ver 1.3
  [2.793554] Bluetooth: BNEP filters: protocol multicast
  [2.793561] Bluetooth: BNEP socket layer initialized
  [3.130779] Bluetooth: Patch file not found ar3k/AthrBT_0x11020100.dfu
  [3.130783] Bluetooth: Loading patch file failed
  [3.130788] ath3k: probe of 2-5:1.0 failed with error -12
  [3.130823] usbcore: registered new interface driver ath3k
  [9.776503] Bluetooth: RFCOMM TTY layer initialized
  [9.776512] Bluetooth: RFCOMM socket layer initialized
  [9.776517] Bluetooth: RFCOMM ver 1.11

  My patch works, but just like in the bug report above, a Firmware file is 
missing:
  AthrBT_0x11020100.dfu

  I found it neither in linux-firmware 
(http://git.kernel.org/cgit/linux/kernel/git/firmware/linux-firmware.git/tree/ar3k)
  nor elsewhere.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1394368/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1449730] Re: Bluetooth not working on Asus G56JK notebook (Ubtuntu 15.04)

2015-06-18 Thread Pilot6
Patch applied

http://git.kernel.org/cgit/linux/kernel/git/bluetooth/bluetooth-
next.git/commit/?id=ec0810d2ac1c932dad48f45da67e3adc5c5449a1

** Changed in: linux (Ubuntu)
   Status: Triaged = In Progress

** Changed in: linux (Ubuntu)
 Assignee: (unassigned) = Pilot6 (hanipouspilot)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1449730

Title:
  Bluetooth not working on Asus G56JK notebook (Ubtuntu 15.04)

Status in linux package in Ubuntu:
  In Progress

Bug description:
  On Asus ROG G56JK the bluetooth doesn't work: I cannot find any device and no 
device can see the notebook.
  Attached there are logs and hw data.
  --- 
  ApportVersion: 2.17.2-0ubuntu1
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  cosming1732 F pulseaudio
   /dev/snd/controlC1:  cosming1732 F pulseaudio
  CurrentDesktop: Unity
  DistroRelease: Ubuntu 15.04
  HibernationDevice: RESUME=UUID=31a02f02-4aa6-4487-bda1-d5fd068c60d9
  InstallationDate: Installed on 2015-04-26 (3 days ago)
  InstallationMedia: Ubuntu 15.04 Vivid Vervet - Release amd64 (20150422)
  MachineType: ASUSTeK COMPUTER INC. G56JK
  NonfreeKernelModules: nvidia
  Package: linux (not installed)
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.19.0-15-generic 
root=UUID=cbc6202a-5564-4ec3-ae23-4204c2baded6 ro quiet splash
  ProcVersionSignature: Ubuntu 3.19.0-15.15-generic 3.19.3
  RelatedPackageVersions:
   linux-restricted-modules-3.19.0-15-generic N/A
   linux-backports-modules-3.19.0-15-generic  N/A
   linux-firmware 1.143
  Tags:  vivid
  UdevLog: Error: [Errno 2] No such file or directory: '/var/log/udev'
  Uname: Linux 3.19.0-15-generic x86_64
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo
  _MarkForUpload: True
  dmi.bios.date: 09/26/2014
  dmi.bios.vendor: American Megatrends Inc.
  dmi.bios.version: G56JK.202
  dmi.board.asset.tag: ATN12345678901234567
  dmi.board.name: G56JK
  dmi.board.vendor: ASUSTeK COMPUTER INC.
  dmi.board.version: 1.0
  dmi.chassis.asset.tag: No Asset Tag
  dmi.chassis.type: 10
  dmi.chassis.vendor: ASUSTeK COMPUTER INC.
  dmi.chassis.version: 1.0
  dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvrG56JK.202:bd09/26/2014:svnASUSTeKCOMPUTERINC.:pnG56JK:pvr1.0:rvnASUSTeKCOMPUTERINC.:rnG56JK:rvr1.0:cvnASUSTeKCOMPUTERINC.:ct10:cvr1.0:
  dmi.product.name: G56JK
  dmi.product.version: 1.0
  dmi.sys.vendor: ASUSTeK COMPUTER INC.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1449730/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1394368] Re: Bluetooth with AR9462 doesn't work (New ID /Firmware)

2015-06-18 Thread Pilot6
Applied upstream
http://git.kernel.org/cgit/linux/kernel/git/bluetooth/bluetooth-next.git/commit/drivers/bluetooth/ath3k.c?id=7e730c7f3d1f39c25cf5f7cf70c0ff4c28d7bec7

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1394368

Title:
  Bluetooth with AR9462 doesn't work (New ID /Firmware)

Status in linux package in Ubuntu:
  In Progress
Status in linux-firmware package in Ubuntu:
  Confirmed

Bug description:
  This is (kind of) a duplicate of:
  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1024884
  (please read)

  I can't use Bluetooth with my AR9462 WLAN/BT-Combo.
  In the link above, it has been fixed, but not for my Adapter ID/Firmware:

  System:
  Ubuntu 14.10 utopic 64bit - 3.16.0-24-generic x86_64

  lspci -nnk
  02:00.0 Network controller [0280]: Qualcomm Atheros AR9462
  Wireless Network Adapter [168c:0034] (rev 01)
   Subsystem: Lite-On Communications Inc Device [11ad:0802]
   Kernel driver in use: ath9k

  lsusb (identified Bluetooth Device)
  Bus 002 Device 003: ID 04ca:300d Lite-On Technology Corp.

  ath9k.conf
  options ath9k btcoex_enable=1

  The 04ca:300d ID is not in the Kernel, so i added it via dkms.

  I took ath3k.c and btusb.c out of the 3.16.0-24-generic source files
  and changed them:

  diff -urN ./linux-3.16.0/drivers/bluetooth/ath3k.c 
/usr/src/ar9462-1.5.1/ath3k.c
  --- ./linux-3.16.0/drivers/bluetooth/ath3k.c  2014-08-04 00:25:02.0 
+0200
  +++ /usr/src/ar9462-1.5.1/ath3k.c 2014-11-19 21:12:46.646265890 +0100
  @@ -85,6 +85,7 @@
    { USB_DEVICE(0x04CA, 0x3007) },
    { USB_DEVICE(0x04CA, 0x3008) },
    { USB_DEVICE(0x04CA, 0x300b) },
  + { USB_DEVICE(0x04CA, 0x300d) },
    { USB_DEVICE(0x0930, 0x0219) },
    { USB_DEVICE(0x0930, 0x0220) },
    { USB_DEVICE(0x0b05, 0x17d0) },
  @@ -134,6 +135,7 @@
    { USB_DEVICE(0x04ca, 0x3007), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x04ca, 0x3008), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x04ca, 0x300b), .driver_info = BTUSB_ATH3012 },
  + { USB_DEVICE(0x04ca, 0x300d), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x0930, 0x0219), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x0930, 0x0220), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x0b05, 0x17d0), .driver_info = BTUSB_ATH3012 },

  diff -urN ./linux-3.16.0/drivers/bluetooth/btusb.c 
/usr/src/ar9462-1.5.1/btusb.c
  --- ./linux-3.16.0/drivers/bluetooth/btusb.c  2014-08-04 00:25:02.0 
+0200
  +++ /usr/src/ar9462-1.5.1/btusb.c 2014-11-19 21:12:46.646265890 +0100
  @@ -157,6 +157,7 @@
    { USB_DEVICE(0x04ca, 0x3007), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x04ca, 0x3008), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x04ca, 0x300b), .driver_info = BTUSB_ATH3012 },
  + { USB_DEVICE(0x04ca, 0x300d), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x0930, 0x0219), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x0930, 0x0220), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x0b05, 0x17d0), .driver_info = BTUSB_ATH3012 },

  sudo dkms add -m ar9462 -v 1.5.1
  sudo dkms build -m ar9462 -v 1.5.1
  sudo dkms install -m ar9462 -v 1.5.1

  (DKMS package in the same style/versioning as in the bug report above)

  dkms status
  ar9462, 1.5.1, 3.16.0-24-generic, x86_64: installed

  Now the new output:

  dmesg | egrep 'ath3|ar3|Bluet'
  [2.787819] Bluetooth: Core ver 2.19
  [2.787833] Bluetooth: HCI device and connection manager initialized
  [2.787839] Bluetooth: HCI socket layer initialized
  [2.787842] Bluetooth: L2CAP socket layer initialized
  [2.787848] Bluetooth: SCO socket layer initialized
  [2.793551] Bluetooth: BNEP (Ethernet Emulation) ver 1.3
  [2.793554] Bluetooth: BNEP filters: protocol multicast
  [2.793561] Bluetooth: BNEP socket layer initialized
  [3.130779] Bluetooth: Patch file not found ar3k/AthrBT_0x11020100.dfu
  [3.130783] Bluetooth: Loading patch file failed
  [3.130788] ath3k: probe of 2-5:1.0 failed with error -12
  [3.130823] usbcore: registered new interface driver ath3k
  [9.776503] Bluetooth: RFCOMM TTY layer initialized
  [9.776512] Bluetooth: RFCOMM socket layer initialized
  [9.776517] Bluetooth: RFCOMM ver 1.11

  My patch works, but just like in the bug report above, a Firmware file is 
missing:
  AthrBT_0x11020100.dfu

  I found it neither in linux-firmware 
(http://git.kernel.org/cgit/linux/kernel/git/firmware/linux-firmware.git/tree/ar3k)
  nor elsewhere.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1394368/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1394368] Re: Bluetooth with AR9462 doesn't work (New ID /Firmware)

2015-06-18 Thread Wallcom
Kernel: 3.16.0-41-generic

After installing the package with new firmware files:

Output of  dmesg | egrep 'ath3|ar3|Bluet':

[2.557837] Bluetooth: Core ver 2.19
[2.557854] Bluetooth: HCI device and connection manager initialized
[2.557861] Bluetooth: HCI socket layer initialized
[2.557863] Bluetooth: L2CAP socket layer initialized
[2.557870] Bluetooth: SCO socket layer initialized
[2.570170] Bluetooth: BNEP (Ethernet Emulation) ver 1.3
[2.570173] Bluetooth: BNEP filters: protocol multicast
[2.570180] Bluetooth: BNEP socket layer initialized
[2.579359] Bluetooth: RFCOMM TTY layer initialized
[2.579370] Bluetooth: RFCOMM socket layer initialized
[2.579374] Bluetooth: RFCOMM ver 1.11


Output of awk -vRS= '/300d/' /sys/kernel/debug/usb/devices:

T:  Bus=02 Lev=01 Prnt=01 Port=04 Cnt=03 Dev#=  5 Spd=12   MxCh= 0
D:  Ver= 1.10 Cls=e0(wlcon) Sub=01 Prot=01 MxPS=64 #Cfgs=  1
P:  Vendor=04ca ProdID=300d Rev= 0.01
C:* #Ifs= 2 Cfg#= 1 Atr=e0 MxPwr=100mA
I:* If#= 0 Alt= 0 #EPs= 3 Cls=e0(wlcon) Sub=01 Prot=01 Driver=btusb
E:  Ad=81(I) Atr=03(Int.) MxPS=  16 Ivl=1ms
E:  Ad=82(I) Atr=02(Bulk) MxPS=  64 Ivl=0ms
E:  Ad=02(O) Atr=02(Bulk) MxPS=  64 Ivl=0ms
I:* If#= 1 Alt= 0 #EPs= 2 Cls=e0(wlcon) Sub=01 Prot=01 Driver=btusb
E:  Ad=83(I) Atr=01(Isoc) MxPS=   0 Ivl=1ms
E:  Ad=03(O) Atr=01(Isoc) MxPS=   0 Ivl=1ms
I:  If#= 1 Alt= 1 #EPs= 2 Cls=e0(wlcon) Sub=01 Prot=01 Driver=btusb
E:  Ad=83(I) Atr=01(Isoc) MxPS=   9 Ivl=1ms
E:  Ad=03(O) Atr=01(Isoc) MxPS=   9 Ivl=1ms
I:  If#= 1 Alt= 2 #EPs= 2 Cls=e0(wlcon) Sub=01 Prot=01 Driver=btusb
E:  Ad=83(I) Atr=01(Isoc) MxPS=  17 Ivl=1ms
E:  Ad=03(O) Atr=01(Isoc) MxPS=  17 Ivl=1ms
I:  If#= 1 Alt= 3 #EPs= 2 Cls=e0(wlcon) Sub=01 Prot=01 Driver=btusb
E:  Ad=83(I) Atr=01(Isoc) MxPS=  25 Ivl=1ms
E:  Ad=03(O) Atr=01(Isoc) MxPS=  25 Ivl=1ms
I:  If#= 1 Alt= 4 #EPs= 2 Cls=e0(wlcon) Sub=01 Prot=01 Driver=btusb
E:  Ad=83(I) Atr=01(Isoc) MxPS=  33 Ivl=1ms
E:  Ad=03(O) Atr=01(Isoc) MxPS=  33 Ivl=1ms
I:  If#= 1 Alt= 5 #EPs= 2 Cls=e0(wlcon) Sub=01 Prot=01 Driver=btusb
E:  Ad=83(I) Atr=01(Isoc) MxPS=  49 Ivl=1ms
E:  Ad=03(O) Atr=01(Isoc) MxPS=  49 Ivl=1ms

Still not working ...

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launchpad.net/bugs/1394368

Title:
  Bluetooth with AR9462 doesn't work (New ID /Firmware)

Status in linux-firmware package in Ubuntu:
  Incomplete

Bug description:
  This is (kind of) a duplicate of:
  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1024884
  (please read)

  I can't use Bluetooth with my AR9462 WLAN/BT-Combo.
  In the link above, it has been fixed, but not for my Adapter ID/Firmware:

  System:
  Ubuntu 14.10 utopic 64bit - 3.16.0-24-generic x86_64

  lspci -nnk
  02:00.0 Network controller [0280]: Qualcomm Atheros AR9462
  Wireless Network Adapter [168c:0034] (rev 01)
   Subsystem: Lite-On Communications Inc Device [11ad:0802]
   Kernel driver in use: ath9k

  lsusb (identified Bluetooth Device)
  Bus 002 Device 003: ID 04ca:300d Lite-On Technology Corp.

  ath9k.conf
  options ath9k btcoex_enable=1

  The 04ca:300d ID is not in the Kernel, so i added it via dkms.

  I took ath3k.c and btusb.c out of the 3.16.0-24-generic source files
  and changed them:

  diff -urN ./linux-3.16.0/drivers/bluetooth/ath3k.c 
/usr/src/ar9462-1.5.1/ath3k.c
  --- ./linux-3.16.0/drivers/bluetooth/ath3k.c  2014-08-04 00:25:02.0 
+0200
  +++ /usr/src/ar9462-1.5.1/ath3k.c 2014-11-19 21:12:46.646265890 +0100
  @@ -85,6 +85,7 @@
    { USB_DEVICE(0x04CA, 0x3007) },
    { USB_DEVICE(0x04CA, 0x3008) },
    { USB_DEVICE(0x04CA, 0x300b) },
  + { USB_DEVICE(0x04CA, 0x300d) },
    { USB_DEVICE(0x0930, 0x0219) },
    { USB_DEVICE(0x0930, 0x0220) },
    { USB_DEVICE(0x0b05, 0x17d0) },
  @@ -134,6 +135,7 @@
    { USB_DEVICE(0x04ca, 0x3007), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x04ca, 0x3008), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x04ca, 0x300b), .driver_info = BTUSB_ATH3012 },
  + { USB_DEVICE(0x04ca, 0x300d), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x0930, 0x0219), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x0930, 0x0220), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x0b05, 0x17d0), .driver_info = BTUSB_ATH3012 },

  diff -urN ./linux-3.16.0/drivers/bluetooth/btusb.c 
/usr/src/ar9462-1.5.1/btusb.c
  --- ./linux-3.16.0/drivers/bluetooth/btusb.c  2014-08-04 00:25:02.0 
+0200
  +++ /usr/src/ar9462-1.5.1/btusb.c 2014-11-19 21:12:46.646265890 +0100
  @@ -157,6 +157,7 @@
    { USB_DEVICE(0x04ca, 0x3007), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x04ca, 0x3008), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x04ca, 0x300b), .driver_info = BTUSB_ATH3012 },
  + { USB_DEVICE(0x04ca, 0x300d), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x0930, 0x0219), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x0930, 0x0220), .driver_info = BTUSB_ATH3012 },
    { 

[Kernel-packages] [Bug 1466250] Re: linux: 3.16.0-41.57 -proposed tracker

2015-06-18 Thread Adam Conrad
Security Sign-off: This kernel is a 1-commit respin for a regression
from a security update.

** Changed in: kernel-sru-workflow/promote-to-proposed
   Status: Confirmed = Fix Released

** Changed in: kernel-sru-workflow/promote-to-proposed
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Adam Conrad 
(adconrad)

** Changed in: kernel-sru-workflow/security-signoff
   Status: New = Fix Released

** Changed in: kernel-sru-workflow/security-signoff
 Assignee: Canonical Security Team (canonical-security) = Adam Conrad 
(adconrad)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1466250

Title:
  linux: 3.16.0-41.57 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  New
Status in Kernel SRU Workflow package-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Invalid
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Utopic:
  New

Bug description:
  This bug is for tracking the 3.16.0-41.57 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Wednesday, 17. June 2015 23:34 UTC
  kernel-stable-phase:CopyToProposed
  kernel-stable-Prepare-package-end:Thursday, 18. June 2015 17:19 UTC
  kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 17:19 UTC
  kernel-stable-phase-changed:Thursday, 18. June 2015 17:19 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 18. June 2015 17:22 UTC
  kernel-stable-Security-signoff-end:Thursday, 18. June 2015 17:22 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1466250/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1418140] Re: CONFIG_DEFAULT_MMAP_MIN_ADDR needs to match on armhf and arm64 otherwise arm64 cannot run armhf binaries

2015-06-18 Thread Andy Whitcroft
** Also affects: linux (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Vivid)
   Status: New = Fix Released

** Changed in: linux (Ubuntu Vivid)
   Importance: Undecided = Medium

** Changed in: linux (Ubuntu Vivid)
 Assignee: (unassigned) = Andy Whitcroft (apw)

** Changed in: linux (Ubuntu)
   Status: Fix Released = Fix Committed

** Changed in: linux (Ubuntu)
Milestone: ubuntu-15.03 = None

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1418140

Title:
  CONFIG_DEFAULT_MMAP_MIN_ADDR needs to match on armhf and arm64
  otherwise arm64 cannot run armhf binaries

Status in linux package in Ubuntu:
  Fix Committed
Status in linux source package in Trusty:
  Fix Released
Status in linux source package in Utopic:
  Fix Released
Status in linux source package in Vivid:
  Fix Released

Bug description:
  Attempting to run 32bit binaries on arm64 triggers applications to be
  Killed, as the CONFIG_DEFAULT_MMAP_MIN_ADDR used on armhf is not valid
  on arm64.  While this can be overriden via sysctl, the default should
  be sane.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1418140/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1466592] [NEW] linux: 3.13.0-57.95 -proposed tracker

2015-06-18 Thread Luis Henriques
Public bug reported:

This bug is for tracking the 3.13.0-57.95 upload package. This bug will
contain status and testing results related to that upload.

For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-Prepare-package-start:Thursday, 18. June 2015 17:21 UTC
kernel-stable-phase:Prepare
kernel-stable-phase-changed:Thursday, 18. June 2015 17:21 UTC

** Affects: kernel-sru-workflow
 Importance: Medium
 Status: In Progress

** Affects: kernel-sru-workflow/certification-testing
 Importance: Medium
 Assignee: Canonical Hardware Certification (canonical-hw-cert)
 Status: New

** Affects: kernel-sru-workflow/package-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/prepare-package
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/prepare-package-meta
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/prepare-package-signed
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/promote-to-proposed
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-security
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-updates
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/regression-testing
 Importance: Medium
 Assignee: Canonical Platform QA Team (canonical-platform-qa)
 Status: New

** Affects: kernel-sru-workflow/security-signoff
 Importance: Medium
 Assignee: Canonical Security Team (canonical-security)
 Status: New

** Affects: kernel-sru-workflow/verification-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux (Ubuntu Trusty)
 Importance: Medium
 Status: New


** Tags: block-proposed-trusty kernel-release-tracking-bug trusty

** Tags added: kernel-release-tracking-bug

** Tags added: block-proposed-trusty

** Also affects: linux (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Tags added: trusty

** Also affects: kernel-sru-workflow/certification-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/package-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package-signed
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-proposed
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-security
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-updates
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/regression-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/security-signoff
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/verification-testing
   Importance: Undecided
   Status: New

** Changed in: kernel-sru-workflow
   Status: New = In Progress

** Changed in: kernel-sru-workflow
   Importance: Undecided = Medium

** Changed in: kernel-sru-workflow/certification-testing
   Importance: Undecided = Medium

** Changed in: kernel-sru-workflow/certification-testing
 Assignee: (unassigned) = Canonical Hardware Certification 
(canonical-hw-cert)

** Changed in: kernel-sru-workflow/package-testing
   Importance: Undecided = Medium

** Changed in: kernel-sru-workflow/package-testing
 Assignee: (unassigned) = Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/prepare-package
   Importance: Undecided = Medium

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: (unassigned) = Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided = Medium

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: (unassigned) = Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/prepare-package-signed
   Importance: Undecided = Medium

** Changed in: kernel-sru-workflow/prepare-package-signed
 

[Kernel-packages] [Bug 1466591] [NEW] linux-lts-utopic: 3.16.0-41.57~14.04.1 -proposed tracker

2015-06-18 Thread Brad Figg
Public bug reported:

This bug is for tracking the 3.16.0-41.57~14.04.1 upload package. This
bug will contain status and testing results related to that upload.

For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-Prepare-package-start:Thursday, 18. June 2015 17:17 UTC
kernel-stable-phase:Prepare
kernel-stable-phase-changed:Thursday, 18. June 2015 17:17 UTC
kernel-stable-master-bug:1466250

** Affects: kernel-sru-workflow
 Importance: Medium
 Status: In Progress

** Affects: kernel-sru-workflow/certification-testing
 Importance: Medium
 Assignee: Canonical Hardware Certification (canonical-hw-cert)
 Status: New

** Affects: kernel-sru-workflow/package-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/prepare-package
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/prepare-package-meta
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: Invalid

** Affects: kernel-sru-workflow/prepare-package-signed
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/promote-to-proposed
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-security
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-updates
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/regression-testing
 Importance: Medium
 Assignee: Canonical Platform QA Team (canonical-platform-qa)
 Status: New

** Affects: kernel-sru-workflow/security-signoff
 Importance: Medium
 Assignee: Canonical Security Team (canonical-security)
 Status: New

** Affects: kernel-sru-workflow/verification-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: linux-lts-utopic (Ubuntu)
 Importance: Medium
 Status: New

** Affects: linux-lts-utopic (Ubuntu Trusty)
 Importance: Medium
 Status: New


** Tags: block-proposed-trusty kernel-release-tracking-bug trusty

** Tags added: kernel-release-tracking-bug

** Tags added: block-proposed-trusty

** Also affects: linux-lts-utopic (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Tags added: trusty

** Also affects: kernel-sru-workflow/certification-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/package-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package-signed
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-proposed
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-security
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-updates
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/regression-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/security-signoff
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/verification-testing
   Importance: Undecided
   Status: New

** Changed in: kernel-sru-workflow
   Status: New = In Progress

** Changed in: kernel-sru-workflow
   Importance: Undecided = Medium

** Changed in: kernel-sru-workflow/certification-testing
   Importance: Undecided = Medium

** Changed in: kernel-sru-workflow/certification-testing
 Assignee: (unassigned) = Canonical Hardware Certification 
(canonical-hw-cert)

** Changed in: kernel-sru-workflow/package-testing
   Importance: Undecided = Medium

** Changed in: kernel-sru-workflow/package-testing
 Assignee: (unassigned) = Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/prepare-package
   Importance: Undecided = Medium

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: (unassigned) = Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided = Medium

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: (unassigned) = Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New = Invalid

** 

[Kernel-packages] [Bug 1462614] Re: Atheros bluetooth doesn't find the devices

2015-06-18 Thread Pilot6
** Also affects: linux-firmware (Ubuntu)
   Importance: Undecided
   Status: New

** Changed in: linux-firmware (Ubuntu)
   Status: New = Confirmed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launchpad.net/bugs/1462614

Title:
  Atheros bluetooth doesn't find the devices

Status in linux-firmware package in Ubuntu:
  Confirmed
Status in linux-lts-utopic package in Ubuntu:
  In Progress

Bug description:
  I have a laptop Acer v15 with Qualcom Atheros bluetooth and Logitech
  M557 mouse, which worked well initially. Then after disconnecting the
  mouse, my bluetooth adapter can't find any bluetooth devices nearby
  (I've also tried the Samsung s4).

  This bug is reproducable in Elementary OS 0.3,  Ubuntu 15.04 and 14.04, Mint 
17.1 and 17.
  Here are some outputs from terminal:

  $ lsusb
  Bus 002 Device 002: ID 8087:8000 Intel Corp. 
  Bus 002 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
  Bus 001 Device 002: ID 8087:8008 Intel Corp. 
  Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
  Bus 004 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub
  Bus 003 Device 004: ID 04f2:b474 Chicony Electronics Co., Ltd 
  Bus 003 Device 003: ID 06cb:2970 Synaptics, Inc. 
  Bus 003 Device 002: ID 0bda:0129 Realtek Semiconductor Corp. RTS5129 Card 
Reader Controller
  Bus 003 Device 005: ID 0489:e076 Foxconn / Hon Hai 
  Bus 003 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub

  $ hciconfig
  hci0:   Type: BR/EDR  Bus: USB
  BD Address: C0:38:96:6C:06:7E  ACL MTU: 1022:8  SCO MTU: 183:5
  UP RUNNING PSCAN ISCAN 
  RX bytes:1725 acl:0 sco:0 events:164 errors:0
  TX bytes:3394 acl:0 sco:0 commands:151 errors:0

  $ sudo awk -vRS= '/e076/' /sys/kernel/debug/usb/devices
  T:  Bus=03 Lev=01 Prnt=01 Port=09 Cnt=05 Dev#=  5 Spd=12   MxCh= 0
  D:  Ver= 1.10 Cls=e0(wlcon) Sub=01 Prot=01 MxPS=64 #Cfgs=  1
  P:  Vendor=0489 ProdID=e076 Rev= 0.01
  C:* #Ifs= 2 Cfg#= 1 Atr=e0 MxPwr=100mA
  I:* If#= 0 Alt= 0 #EPs= 3 Cls=e0(wlcon) Sub=01 Prot=01 Driver=btusb
  E:  Ad=81(I) Atr=03(Int.) MxPS=  16 Ivl=1ms
  E:  Ad=82(I) Atr=02(Bulk) MxPS=  64 Ivl=0ms
  E:  Ad=02(O) Atr=02(Bulk) MxPS=  64 Ivl=0ms
  I:* If#= 1 Alt= 0 #EPs= 2 Cls=e0(wlcon) Sub=01 Prot=01 Driver=btusb
  E:  Ad=83(I) Atr=01(Isoc) MxPS=   0 Ivl=1ms
  E:  Ad=03(O) Atr=01(Isoc) MxPS=   0 Ivl=1ms
  I:  If#= 1 Alt= 1 #EPs= 2 Cls=e0(wlcon) Sub=01 Prot=01 Driver=btusb
  E:  Ad=83(I) Atr=01(Isoc) MxPS=   9 Ivl=1ms
  E:  Ad=03(O) Atr=01(Isoc) MxPS=   9 Ivl=1ms
  I:  If#= 1 Alt= 2 #EPs= 2 Cls=e0(wlcon) Sub=01 Prot=01 Driver=btusb
  E:  Ad=83(I) Atr=01(Isoc) MxPS=  17 Ivl=1ms
  E:  Ad=03(O) Atr=01(Isoc) MxPS=  17 Ivl=1ms
  I:  If#= 1 Alt= 3 #EPs= 2 Cls=e0(wlcon) Sub=01 Prot=01 Driver=btusb
  E:  Ad=83(I) Atr=01(Isoc) MxPS=  25 Ivl=1ms
  E:  Ad=03(O) Atr=01(Isoc) MxPS=  25 Ivl=1ms
  I:  If#= 1 Alt= 4 #EPs= 2 Cls=e0(wlcon) Sub=01 Prot=01 Driver=btusb
  E:  Ad=83(I) Atr=01(Isoc) MxPS=  33 Ivl=1ms
  E:  Ad=03(O) Atr=01(Isoc) MxPS=  33 Ivl=1ms
  I:  If#= 1 Alt= 5 #EPs= 2 Cls=e0(wlcon) Sub=01 Prot=01 Driver=btusb
  E:  Ad=83(I) Atr=01(Isoc) MxPS=  49 Ivl=1ms
  E:  Ad=03(O) Atr=01(Isoc) MxPS=  49 Ivl=1ms

  
  Thanks to @Pilot6 for help with debugging this.
  Initial question started on askubuntu.com 
http://askubuntu.com/questions/632589/bluetooth-doesnt-find-the-devices

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.16.0-38-generic 3.16.0-38.52~14.04.1
  ProcVersionSignature: Ubuntu 3.16.0-38.52~14.04.1-generic 3.16.7-ckt10
  Uname: Linux 3.16.0-38-generic x86_64
  ApportVersion: 2.14.1-0ubuntu3.11
  Architecture: amd64
  CurrentDesktop: Unity
  Date: Sat Jun  6 14:38:16 2015
  InstallationDate: Installed on 2015-06-06 (0 days ago)
  InstallationMedia: Ubuntu 14.04.2 LTS Trusty Tahr - Release amd64 
(20150218.1)
  SourcePackage: linux-lts-utopic
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-firmware/+bug/1462614/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1466364] Re: Kernel crash on running mercurial clone on a btrfs file system on a SSD Ubuntu 14.04

2015-06-18 Thread Anshuman Aggarwal
This issue has occurred on a new installation of Ubuntu 14.04 on a SSD
with btrfs filesystem on the full drive.

I will try booting with the mainline kernel and update the results here

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1466364

Title:
  Kernel crash on running mercurial clone on a btrfs file system on a
  SSD Ubuntu 14.04

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  On running mercurial commands which add/remove lots of files from the
  disk (typically hard linked) the following error shows up. Since btrfs
  doesn't really have a fsck utility not sure what I should be running

  Jun 18 12:57:27 one kernel: [151416.037158] CPU: 0 PID: 8362 Comm: hg Not 
tainted 3.13.0-55-generic #92-Ubuntu
  Jun 18 12:57:27 one kernel: [151416.038376] Hardware name:  
/DH61WW, BIOS BEH6110H.86A.0035.2012.0112.2206 01/12/2012
  Jun 18 12:57:27 one kernel: [151416.039594] task: 880082fd6000 ti: 
8801023d2000 task.ti: 8801023d2000
  Jun 18 12:57:27 one kernel: [151416.040812] RIP: 0010:[8137287d]  
[8137287d] memcpy+0xd/0x110
  Jun 18 12:57:27 one kernel: [151416.042036] RSP: 0018:8801023d3910  
EFLAGS: 00010202
  Jun 18 12:57:27 one kernel: [151416.043258] RAX: 880168d67dfe RBX: 
009f RCX: 0013
  Jun 18 12:57:27 one kernel: [151416.044491] RDX: 0007 RSI: 
00050800 RDI: 880168d67dfe
  Jun 18 12:57:27 one kernel: [151416.045727] RBP: 8801023d3948 R08: 
1000 R09: 8801023d3918
  Jun 18 12:57:27 one kernel: [151416.046970] R10:  R11: 
0003 R12: 88008f53bb28
  Jun 18 12:57:27 one kernel: [151416.048225] R13: 1600 R14: 
880168d67e9d R15: 009f
  Jun 18 12:57:27 one kernel: [151416.049482] FS:  7fa796d7c740() 
GS:88021fa0() knlGS:
  Jun 18 12:57:27 one kernel: [151416.050737] CS:  0010 DS:  ES:  CR0: 
80050033
  Jun 18 12:57:27 one kernel: [151416.051994] CR2: 7fa796d9d000 CR3: 
00017f6dd000 CR4: 000407f0
  Jun 18 12:57:27 one kernel: [151416.053268] Stack:
  Jun 18 12:57:27 one kernel: [151416.054536]  a028049c 
1000 88020ebcf800 88020d8273f0
  Jun 18 12:57:27 one kernel: [151416.055820]   
88017125f640 880193263720 8801023d3a08
  Jun 18 12:57:27 one kernel: [151416.057103]  a02653dc 
3188  1000
  Jun 18 12:57:27 one kernel: [151416.058391] Call Trace:
  Jun 18 12:57:27 one kernel: [151416.059686]  [a028049c] ? 
read_extent_buffer+0xbc/0x110 [btrfs]
  Jun 18 12:57:27 one kernel: [151416.061114]  [a02653dc] 
btrfs_get_extent+0x91c/0x970 [btrfs]
  Jun 18 12:57:27 one kernel: [151416.062471]  [a027c697] 
__do_readpage+0x357/0x730 [btrfs]
  Jun 18 12:57:27 one kernel: [151416.063792]  [a0264ac0] ? 
btrfs_real_readdir+0x5b0/0x5b0 [btrfs]
  Jun 18 12:57:27 one kernel: [151416.065110]  [a027cdf2] 
__extent_readpages.constprop.41+0x2a2/0x2c0 [btrfs]
  Jun 18 12:57:27 one kernel: [151416.066441]  [a0264ac0] ? 
btrfs_real_readdir+0x5b0/0x5b0 [btrfs]
  Jun 18 12:57:27 one kernel: [151416.067756]  [a027ec76] 
extent_readpages+0x1b6/0x1c0 [btrfs]
  Jun 18 12:57:27 one kernel: [151416.069084]  [a0264ac0] ? 
btrfs_real_readdir+0x5b0/0x5b0 [btrfs]
  Jun 18 12:57:27 one kernel: [151416.070385]  [81197dc3] ? 
alloc_pages_current+0xa3/0x160
  Jun 18 12:57:27 one kernel: [151416.071699]  [a0262c1f] 
btrfs_readpages+0x1f/0x30 [btrfs]
  Jun 18 12:57:27 one kernel: [151416.072969]  [8115bb99] 
__do_page_cache_readahead+0x1b9/0x260
  Jun 18 12:57:27 one kernel: [151416.074213]  [8115c072] 
ondemand_readahead+0x152/0x2a0
  Jun 18 12:57:27 one kernel: [151416.075455]  [8117ecc8] ? 
__vma_link_rb+0xb8/0xe0
  Jun 18 12:57:27 one kernel: [151416.076694]  [8115c1f1] 
page_cache_sync_readahead+0x31/0x50
  Jun 18 12:57:27 one kernel: [151416.077930]  [81151cb5] 
generic_file_aio_read+0x4c5/0x700
  Jun 18 12:57:27 one kernel: [151416.079243]  [81180f93] ? 
mmap_region+0x163/0x600
  Jun 18 12:57:27 one kernel: [151416.080603]  [811bda1a] 
do_sync_read+0x5a/0x90
  Jun 18 12:57:27 one kernel: [151416.081825]  [811be0b5] 
vfs_read+0x95/0x160
  Jun 18 12:57:27 one kernel: [151416.083037]  [811bebc9] 
SyS_read+0x49/0xa0
  Jun 18 12:57:27 one kernel: [151416.084231]  [81733d5d] 
system_call_fastpath+0x1a/0x1f
  Jun 18 12:57:27 one kernel: [151416.085408] Code: 43 4e 5b 5d c3 66 0f 1f 84 
00 00 00 00 00 e8 fb fb ff ff eb e2 90 90 90 90 90 90 90 90 90 48 89 f8 48 89 
d1 48 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 c3 20 4c 8b 06 4c 8b 4e 08 4c 8b 
56 10 4c
  Jun 18 12:57:27 one kernel: [151416.088027] RIP  [8137287d] 

[Kernel-packages] [Bug 1394368] Re: Bluetooth with AR9462 doesn't work (New ID /Firmware)

2015-06-18 Thread Pilot6
Let's wait till it gets into mainline kernel, it may be soon to 4.1.
Then you will test it and then I will report it to kernel maintainers if
it persists.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1394368

Title:
  Bluetooth with AR9462 doesn't work (New ID /Firmware)

Status in linux package in Ubuntu:
  In Progress
Status in linux-firmware package in Ubuntu:
  Confirmed

Bug description:
  This is (kind of) a duplicate of:
  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1024884
  (please read)

  I can't use Bluetooth with my AR9462 WLAN/BT-Combo.
  In the link above, it has been fixed, but not for my Adapter ID/Firmware:

  System:
  Ubuntu 14.10 utopic 64bit - 3.16.0-24-generic x86_64

  lspci -nnk
  02:00.0 Network controller [0280]: Qualcomm Atheros AR9462
  Wireless Network Adapter [168c:0034] (rev 01)
   Subsystem: Lite-On Communications Inc Device [11ad:0802]
   Kernel driver in use: ath9k

  lsusb (identified Bluetooth Device)
  Bus 002 Device 003: ID 04ca:300d Lite-On Technology Corp.

  ath9k.conf
  options ath9k btcoex_enable=1

  The 04ca:300d ID is not in the Kernel, so i added it via dkms.

  I took ath3k.c and btusb.c out of the 3.16.0-24-generic source files
  and changed them:

  diff -urN ./linux-3.16.0/drivers/bluetooth/ath3k.c 
/usr/src/ar9462-1.5.1/ath3k.c
  --- ./linux-3.16.0/drivers/bluetooth/ath3k.c  2014-08-04 00:25:02.0 
+0200
  +++ /usr/src/ar9462-1.5.1/ath3k.c 2014-11-19 21:12:46.646265890 +0100
  @@ -85,6 +85,7 @@
    { USB_DEVICE(0x04CA, 0x3007) },
    { USB_DEVICE(0x04CA, 0x3008) },
    { USB_DEVICE(0x04CA, 0x300b) },
  + { USB_DEVICE(0x04CA, 0x300d) },
    { USB_DEVICE(0x0930, 0x0219) },
    { USB_DEVICE(0x0930, 0x0220) },
    { USB_DEVICE(0x0b05, 0x17d0) },
  @@ -134,6 +135,7 @@
    { USB_DEVICE(0x04ca, 0x3007), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x04ca, 0x3008), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x04ca, 0x300b), .driver_info = BTUSB_ATH3012 },
  + { USB_DEVICE(0x04ca, 0x300d), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x0930, 0x0219), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x0930, 0x0220), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x0b05, 0x17d0), .driver_info = BTUSB_ATH3012 },

  diff -urN ./linux-3.16.0/drivers/bluetooth/btusb.c 
/usr/src/ar9462-1.5.1/btusb.c
  --- ./linux-3.16.0/drivers/bluetooth/btusb.c  2014-08-04 00:25:02.0 
+0200
  +++ /usr/src/ar9462-1.5.1/btusb.c 2014-11-19 21:12:46.646265890 +0100
  @@ -157,6 +157,7 @@
    { USB_DEVICE(0x04ca, 0x3007), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x04ca, 0x3008), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x04ca, 0x300b), .driver_info = BTUSB_ATH3012 },
  + { USB_DEVICE(0x04ca, 0x300d), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x0930, 0x0219), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x0930, 0x0220), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x0b05, 0x17d0), .driver_info = BTUSB_ATH3012 },

  sudo dkms add -m ar9462 -v 1.5.1
  sudo dkms build -m ar9462 -v 1.5.1
  sudo dkms install -m ar9462 -v 1.5.1

  (DKMS package in the same style/versioning as in the bug report above)

  dkms status
  ar9462, 1.5.1, 3.16.0-24-generic, x86_64: installed

  Now the new output:

  dmesg | egrep 'ath3|ar3|Bluet'
  [2.787819] Bluetooth: Core ver 2.19
  [2.787833] Bluetooth: HCI device and connection manager initialized
  [2.787839] Bluetooth: HCI socket layer initialized
  [2.787842] Bluetooth: L2CAP socket layer initialized
  [2.787848] Bluetooth: SCO socket layer initialized
  [2.793551] Bluetooth: BNEP (Ethernet Emulation) ver 1.3
  [2.793554] Bluetooth: BNEP filters: protocol multicast
  [2.793561] Bluetooth: BNEP socket layer initialized
  [3.130779] Bluetooth: Patch file not found ar3k/AthrBT_0x11020100.dfu
  [3.130783] Bluetooth: Loading patch file failed
  [3.130788] ath3k: probe of 2-5:1.0 failed with error -12
  [3.130823] usbcore: registered new interface driver ath3k
  [9.776503] Bluetooth: RFCOMM TTY layer initialized
  [9.776512] Bluetooth: RFCOMM socket layer initialized
  [9.776517] Bluetooth: RFCOMM ver 1.11

  My patch works, but just like in the bug report above, a Firmware file is 
missing:
  AthrBT_0x11020100.dfu

  I found it neither in linux-firmware 
(http://git.kernel.org/cgit/linux/kernel/git/firmware/linux-firmware.git/tree/ar3k)
  nor elsewhere.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1394368/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1466349] Re: linux-lts-trusty: 3.13.0-55.94~precise1 -proposed tracker

2015-06-18 Thread Brad Figg
** Changed in: kernel-sru-workflow/verification-testing
   Status: New = In Progress

** Changed in: kernel-sru-workflow/certification-testing
   Status: New = Confirmed

** Changed in: kernel-sru-workflow/regression-testing
   Status: New = Confirmed

** Description changed:

  This bug is for tracking the 3.13.0-55.94~precise1 upload package. This
  bug will contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Thursday, 18. June 2015 07:02 UTC
  kernel-stable-master-bug:1466237
  kernel-stable-Security-signoff-end:Thursday, 18. June 2015 13:32 UTC
- kernel-stable-phase:CopyToProposed
  kernel-stable-Prepare-package-end:Thursday, 18. June 2015 16:23 UTC
  kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 16:23 UTC
- kernel-stable-phase-changed:Thursday, 18. June 2015 16:23 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 18. June 2015 17:01 UTC
+ kernel-stable-phase:Verification  Testing
+ kernel-stable-phase-changed:Thursday, 18. June 2015 18:01 UTC
+ kernel-stable-Verification-testing-start:Thursday, 18. June 2015 18:01 UTC
+ kernel-stable-Certification-testing-start:Thursday, 18. June 2015 18:01 UTC
+ proposed-announcement-sent:True
+ kernel-stable-Regression-testing-start:Thursday, 18. June 2015 18:01 UTC

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-trusty in Ubuntu.
https://bugs.launchpad.net/bugs/1466349

Title:
  linux-lts-trusty: 3.13.0-55.94~precise1 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Confirmed
Status in Kernel SRU Workflow package-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Invalid
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Confirmed
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  In Progress
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-trusty source package in Precise:
  New

Bug description:
  This bug is for tracking the 3.13.0-55.94~precise1 upload package.
  This bug will contain status and testing results related to that
  upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Thursday, 18. June 2015 07:02 UTC
  kernel-stable-master-bug:1466237
  kernel-stable-Security-signoff-end:Thursday, 18. June 2015 13:32 UTC
  kernel-stable-Prepare-package-end:Thursday, 18. June 2015 16:23 UTC
  kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 16:23 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 18. June 2015 17:01 UTC
  kernel-stable-phase:Verification  Testing
  kernel-stable-phase-changed:Thursday, 18. June 2015 18:01 UTC
  kernel-stable-Verification-testing-start:Thursday, 18. June 2015 18:01 UTC
  kernel-stable-Certification-testing-start:Thursday, 18. June 2015 18:01 UTC
  proposed-announcement-sent:True
  kernel-stable-Regression-testing-start:Thursday, 18. June 2015 18:01 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1466349/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1465755] Re: linux: 3.19.0-22.22 -proposed tracker

2015-06-18 Thread Chris J Arges
** Changed in: kernel-sru-workflow/promote-to-proposed
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Chris J Arges 
(arges)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1465755

Title:
  linux: 3.19.0-22.22 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  New
Status in Kernel SRU Workflow package-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Confirmed
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Vivid:
  New

Bug description:
  This bug is for tracking the 3.19.0-22.22 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 16. June 2015 16:18 UTC
  kernel-stable-phase:CopyToProposed
  kernel-stable-Prepare-package-end:Wednesday, 17. June 2015 02:02 UTC
  kernel-stable-Promote-to-proposed-start:Wednesday, 17. June 2015 02:02 UTC
  kernel-stable-phase-changed:Wednesday, 17. June 2015 02:02 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1465755/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1394368] Re: Bluetooth with AR9462 doesn't work (New ID /Firmware)

2015-06-18 Thread Pilot6
@Wallcom

Does it work with patched bt? You mentioned in
https://bugs.launchpad.net/ubuntu/+source/linux-
firmware/+bug/1394368/comments/4 that it does.

I will send the patch upsteram and it will get into stable kernels. But 
firmware should be installed either way.
Only firmware won't work.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launchpad.net/bugs/1394368

Title:
  Bluetooth with AR9462 doesn't work (New ID /Firmware)

Status in linux-firmware package in Ubuntu:
  Incomplete

Bug description:
  This is (kind of) a duplicate of:
  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1024884
  (please read)

  I can't use Bluetooth with my AR9462 WLAN/BT-Combo.
  In the link above, it has been fixed, but not for my Adapter ID/Firmware:

  System:
  Ubuntu 14.10 utopic 64bit - 3.16.0-24-generic x86_64

  lspci -nnk
  02:00.0 Network controller [0280]: Qualcomm Atheros AR9462
  Wireless Network Adapter [168c:0034] (rev 01)
   Subsystem: Lite-On Communications Inc Device [11ad:0802]
   Kernel driver in use: ath9k

  lsusb (identified Bluetooth Device)
  Bus 002 Device 003: ID 04ca:300d Lite-On Technology Corp.

  ath9k.conf
  options ath9k btcoex_enable=1

  The 04ca:300d ID is not in the Kernel, so i added it via dkms.

  I took ath3k.c and btusb.c out of the 3.16.0-24-generic source files
  and changed them:

  diff -urN ./linux-3.16.0/drivers/bluetooth/ath3k.c 
/usr/src/ar9462-1.5.1/ath3k.c
  --- ./linux-3.16.0/drivers/bluetooth/ath3k.c  2014-08-04 00:25:02.0 
+0200
  +++ /usr/src/ar9462-1.5.1/ath3k.c 2014-11-19 21:12:46.646265890 +0100
  @@ -85,6 +85,7 @@
    { USB_DEVICE(0x04CA, 0x3007) },
    { USB_DEVICE(0x04CA, 0x3008) },
    { USB_DEVICE(0x04CA, 0x300b) },
  + { USB_DEVICE(0x04CA, 0x300d) },
    { USB_DEVICE(0x0930, 0x0219) },
    { USB_DEVICE(0x0930, 0x0220) },
    { USB_DEVICE(0x0b05, 0x17d0) },
  @@ -134,6 +135,7 @@
    { USB_DEVICE(0x04ca, 0x3007), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x04ca, 0x3008), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x04ca, 0x300b), .driver_info = BTUSB_ATH3012 },
  + { USB_DEVICE(0x04ca, 0x300d), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x0930, 0x0219), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x0930, 0x0220), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x0b05, 0x17d0), .driver_info = BTUSB_ATH3012 },

  diff -urN ./linux-3.16.0/drivers/bluetooth/btusb.c 
/usr/src/ar9462-1.5.1/btusb.c
  --- ./linux-3.16.0/drivers/bluetooth/btusb.c  2014-08-04 00:25:02.0 
+0200
  +++ /usr/src/ar9462-1.5.1/btusb.c 2014-11-19 21:12:46.646265890 +0100
  @@ -157,6 +157,7 @@
    { USB_DEVICE(0x04ca, 0x3007), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x04ca, 0x3008), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x04ca, 0x300b), .driver_info = BTUSB_ATH3012 },
  + { USB_DEVICE(0x04ca, 0x300d), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x0930, 0x0219), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x0930, 0x0220), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x0b05, 0x17d0), .driver_info = BTUSB_ATH3012 },

  sudo dkms add -m ar9462 -v 1.5.1
  sudo dkms build -m ar9462 -v 1.5.1
  sudo dkms install -m ar9462 -v 1.5.1

  (DKMS package in the same style/versioning as in the bug report above)

  dkms status
  ar9462, 1.5.1, 3.16.0-24-generic, x86_64: installed

  Now the new output:

  dmesg | egrep 'ath3|ar3|Bluet'
  [2.787819] Bluetooth: Core ver 2.19
  [2.787833] Bluetooth: HCI device and connection manager initialized
  [2.787839] Bluetooth: HCI socket layer initialized
  [2.787842] Bluetooth: L2CAP socket layer initialized
  [2.787848] Bluetooth: SCO socket layer initialized
  [2.793551] Bluetooth: BNEP (Ethernet Emulation) ver 1.3
  [2.793554] Bluetooth: BNEP filters: protocol multicast
  [2.793561] Bluetooth: BNEP socket layer initialized
  [3.130779] Bluetooth: Patch file not found ar3k/AthrBT_0x11020100.dfu
  [3.130783] Bluetooth: Loading patch file failed
  [3.130788] ath3k: probe of 2-5:1.0 failed with error -12
  [3.130823] usbcore: registered new interface driver ath3k
  [9.776503] Bluetooth: RFCOMM TTY layer initialized
  [9.776512] Bluetooth: RFCOMM socket layer initialized
  [9.776517] Bluetooth: RFCOMM ver 1.11

  My patch works, but just like in the bug report above, a Firmware file is 
missing:
  AthrBT_0x11020100.dfu

  I found it neither in linux-firmware 
(http://git.kernel.org/cgit/linux/kernel/git/firmware/linux-firmware.git/tree/ar3k)
  nor elsewhere.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-firmware/+bug/1394368/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1466250] Re: linux: 3.16.0-41.57 -proposed tracker

2015-06-18 Thread Brad Figg
** Description changed:

  This bug is for tracking the 3.16.0-41.57 upload package. This bug will
  contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Wednesday, 17. June 2015 23:34 UTC
  kernel-stable-phase:CopyToProposed
  kernel-stable-Prepare-package-end:Thursday, 18. June 2015 17:19 UTC
  kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 17:19 UTC
  kernel-stable-phase-changed:Thursday, 18. June 2015 17:19 UTC
+ kernel-stable-Promote-to-proposed-end:Thursday, 18. June 2015 17:22 UTC
+ kernel-stable-Security-signoff-end:Thursday, 18. June 2015 17:22 UTC

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1466250

Title:
  linux: 3.16.0-41.57 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  New
Status in Kernel SRU Workflow package-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Invalid
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Utopic:
  New

Bug description:
  This bug is for tracking the 3.16.0-41.57 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Wednesday, 17. June 2015 23:34 UTC
  kernel-stable-phase:CopyToProposed
  kernel-stable-Prepare-package-end:Thursday, 18. June 2015 17:19 UTC
  kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 17:19 UTC
  kernel-stable-phase-changed:Thursday, 18. June 2015 17:19 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 18. June 2015 17:22 UTC
  kernel-stable-Security-signoff-end:Thursday, 18. June 2015 17:22 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1466250/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1466250] Re: linux: 3.16.0-41.57 -proposed tracker

2015-06-18 Thread Brad Figg
All builds are complete, packages in this bug can be copied to
-proposed.

Backport packages from packages here can be worked on, the following tracking 
bugs were opened for them:
linux-lts-utopic (14.04.1) - bug 1466591

** Changed in: kernel-sru-workflow/prepare-package
   Status: New = Fix Released

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) = Brad Figg 
(brad-figg)

** Changed in: kernel-sru-workflow/promote-to-proposed
   Status: New = Confirmed

** Changed in: kernel-sru-workflow/package-testing
   Status: New = Confirmed

** Description changed:

  This bug is for tracking the 3.16.0-41.57 upload package. This bug will
  contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Wednesday, 17. June 2015 23:34 UTC
- kernel-stable-phase:Prepare
- kernel-stable-phase-changed:Wednesday, 17. June 2015 23:34 UTC
+ kernel-stable-phase:CopyToProposed
+ kernel-stable-Prepare-package-end:Thursday, 18. June 2015 17:19 UTC
+ kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 17:19 UTC
+ kernel-stable-phase-changed:Thursday, 18. June 2015 17:19 UTC

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1466250

Title:
  linux: 3.16.0-41.57 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  New
Status in Kernel SRU Workflow package-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Invalid
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Utopic:
  New

Bug description:
  This bug is for tracking the 3.16.0-41.57 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Wednesday, 17. June 2015 23:34 UTC
  kernel-stable-phase:CopyToProposed
  kernel-stable-Prepare-package-end:Thursday, 18. June 2015 17:19 UTC
  kernel-stable-Promote-to-proposed-start:Thursday, 18. June 2015 17:19 UTC
  kernel-stable-phase-changed:Thursday, 18. June 2015 17:19 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 18. June 2015 17:22 UTC
  kernel-stable-Security-signoff-end:Thursday, 18. June 2015 17:22 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1466250/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1394368] Re: Bluetooth with AR9462 doesn't work (New ID /Firmware)

2015-06-18 Thread Pilot6
Patch has been sent and already applied to bluetooth-next.

It should appear in kernel 4.2 and then be backported to all Ubuntu
supported kernels.

https://lkml.org/lkml/2015/6/18/596

** Changed in: linux-firmware (Ubuntu)
 Assignee: Chris J Arges (arges) = Pilot6 (hanipouspilot)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launchpad.net/bugs/1394368

Title:
  Bluetooth with AR9462 doesn't work (New ID /Firmware)

Status in linux-firmware package in Ubuntu:
  Incomplete

Bug description:
  This is (kind of) a duplicate of:
  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1024884
  (please read)

  I can't use Bluetooth with my AR9462 WLAN/BT-Combo.
  In the link above, it has been fixed, but not for my Adapter ID/Firmware:

  System:
  Ubuntu 14.10 utopic 64bit - 3.16.0-24-generic x86_64

  lspci -nnk
  02:00.0 Network controller [0280]: Qualcomm Atheros AR9462
  Wireless Network Adapter [168c:0034] (rev 01)
   Subsystem: Lite-On Communications Inc Device [11ad:0802]
   Kernel driver in use: ath9k

  lsusb (identified Bluetooth Device)
  Bus 002 Device 003: ID 04ca:300d Lite-On Technology Corp.

  ath9k.conf
  options ath9k btcoex_enable=1

  The 04ca:300d ID is not in the Kernel, so i added it via dkms.

  I took ath3k.c and btusb.c out of the 3.16.0-24-generic source files
  and changed them:

  diff -urN ./linux-3.16.0/drivers/bluetooth/ath3k.c 
/usr/src/ar9462-1.5.1/ath3k.c
  --- ./linux-3.16.0/drivers/bluetooth/ath3k.c  2014-08-04 00:25:02.0 
+0200
  +++ /usr/src/ar9462-1.5.1/ath3k.c 2014-11-19 21:12:46.646265890 +0100
  @@ -85,6 +85,7 @@
    { USB_DEVICE(0x04CA, 0x3007) },
    { USB_DEVICE(0x04CA, 0x3008) },
    { USB_DEVICE(0x04CA, 0x300b) },
  + { USB_DEVICE(0x04CA, 0x300d) },
    { USB_DEVICE(0x0930, 0x0219) },
    { USB_DEVICE(0x0930, 0x0220) },
    { USB_DEVICE(0x0b05, 0x17d0) },
  @@ -134,6 +135,7 @@
    { USB_DEVICE(0x04ca, 0x3007), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x04ca, 0x3008), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x04ca, 0x300b), .driver_info = BTUSB_ATH3012 },
  + { USB_DEVICE(0x04ca, 0x300d), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x0930, 0x0219), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x0930, 0x0220), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x0b05, 0x17d0), .driver_info = BTUSB_ATH3012 },

  diff -urN ./linux-3.16.0/drivers/bluetooth/btusb.c 
/usr/src/ar9462-1.5.1/btusb.c
  --- ./linux-3.16.0/drivers/bluetooth/btusb.c  2014-08-04 00:25:02.0 
+0200
  +++ /usr/src/ar9462-1.5.1/btusb.c 2014-11-19 21:12:46.646265890 +0100
  @@ -157,6 +157,7 @@
    { USB_DEVICE(0x04ca, 0x3007), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x04ca, 0x3008), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x04ca, 0x300b), .driver_info = BTUSB_ATH3012 },
  + { USB_DEVICE(0x04ca, 0x300d), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x0930, 0x0219), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x0930, 0x0220), .driver_info = BTUSB_ATH3012 },
    { USB_DEVICE(0x0b05, 0x17d0), .driver_info = BTUSB_ATH3012 },

  sudo dkms add -m ar9462 -v 1.5.1
  sudo dkms build -m ar9462 -v 1.5.1
  sudo dkms install -m ar9462 -v 1.5.1

  (DKMS package in the same style/versioning as in the bug report above)

  dkms status
  ar9462, 1.5.1, 3.16.0-24-generic, x86_64: installed

  Now the new output:

  dmesg | egrep 'ath3|ar3|Bluet'
  [2.787819] Bluetooth: Core ver 2.19
  [2.787833] Bluetooth: HCI device and connection manager initialized
  [2.787839] Bluetooth: HCI socket layer initialized
  [2.787842] Bluetooth: L2CAP socket layer initialized
  [2.787848] Bluetooth: SCO socket layer initialized
  [2.793551] Bluetooth: BNEP (Ethernet Emulation) ver 1.3
  [2.793554] Bluetooth: BNEP filters: protocol multicast
  [2.793561] Bluetooth: BNEP socket layer initialized
  [3.130779] Bluetooth: Patch file not found ar3k/AthrBT_0x11020100.dfu
  [3.130783] Bluetooth: Loading patch file failed
  [3.130788] ath3k: probe of 2-5:1.0 failed with error -12
  [3.130823] usbcore: registered new interface driver ath3k
  [9.776503] Bluetooth: RFCOMM TTY layer initialized
  [9.776512] Bluetooth: RFCOMM socket layer initialized
  [9.776517] Bluetooth: RFCOMM ver 1.11

  My patch works, but just like in the bug report above, a Firmware file is 
missing:
  AthrBT_0x11020100.dfu

  I found it neither in linux-firmware 
(http://git.kernel.org/cgit/linux/kernel/git/firmware/linux-firmware.git/tree/ar3k)
  nor elsewhere.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-firmware/+bug/1394368/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1466591] Re: linux-lts-utopic: 3.16.0-41.57~14.04.1 -proposed tracker

2015-06-18 Thread Adam Conrad
Security Sign-off: This kernel is a 1-commit respin for a regression
from a security update.

** Changed in: linux-lts-utopic (Ubuntu)
   Status: New = Invalid

** Changed in: kernel-sru-workflow/security-signoff
   Status: New = Fix Released

** Changed in: kernel-sru-workflow/security-signoff
 Assignee: Canonical Security Team (canonical-security) = Adam Conrad 
(adconrad)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-utopic in Ubuntu.
https://bugs.launchpad.net/bugs/1466591

Title:
  linux-lts-utopic: 3.16.0-41.57~14.04.1 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  New
Status in Kernel SRU Workflow package-testing series:
  New
Status in Kernel SRU Workflow prepare-package series:
  New
Status in Kernel SRU Workflow prepare-package-meta series:
  Invalid
Status in Kernel SRU Workflow prepare-package-signed series:
  New
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-utopic source package in Trusty:
  New

Bug description:
  This bug is for tracking the 3.16.0-41.57~14.04.1 upload package. This
  bug will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Thursday, 18. June 2015 17:17 UTC
  kernel-stable-phase:Prepare
  kernel-stable-phase-changed:Thursday, 18. June 2015 17:17 UTC
  kernel-stable-master-bug:1466250

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1466591/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1246981] Re: Bluetooth mouse fails to re-connect after sleep.

2015-06-18 Thread Mike Neish
** Changed in: bluez (Ubuntu)
   Status: Invalid = Confirmed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to bluez in Ubuntu.
https://bugs.launchpad.net/bugs/1246981

Title:
  Bluetooth mouse fails to re-connect after sleep.

Status in bluez package in Ubuntu:
  Confirmed

Bug description:
  This exact harware was working faultlessly in 13.04. Since re-
  installing at 13.10 the mouse consistently failes to reconnect after
  the device either hybernates or ever goes to screen saver sleep.

  I have to remove the dive and re-add it each time (which works well).

  There are other issues with the bluetooth stack as well in that I have
  not found any way to use bluetooth tethering to my mobile which again
  worked well and was easy to configure in 13.04

  Peter.

  ProblemType: Bug
  DistroRelease: Ubuntu 13.10
  Package: bluetooth 4.101-0ubuntu8b1
  ProcVersionSignature: Ubuntu 3.11.0-12.19-generic 3.11.3
  Uname: Linux 3.11.0-12-generic x86_64
  NonfreeKernelModules: nvidia
  ApportVersion: 2.12.5-0ubuntu2.1
  Architecture: amd64
  Date: Fri Nov  1 16:44:37 2013
  InstallationDate: Installed on 2013-10-19 (13 days ago)
  InstallationMedia: Kubuntu 13.10 Saucy Salamander - Release amd64 
(20131016.1)
  InterestingModules: bnep rfcomm btusb bluetooth
  MachineType: Dell Inc. Latitude E6530
  MarkForUpload: True
  PackageArchitecture: all
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.11.0-12-generic 
root=UUID=8283de78-9264-42bf-a8b4-25643fa1475f ro quiet splash
  SourcePackage: bluez
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 12/13/2012
  dmi.bios.vendor: Dell Inc.
  dmi.bios.version: A09
  dmi.board.name: 07Y85M
  dmi.board.vendor: Dell Inc.
  dmi.board.version: A01
  dmi.chassis.type: 9
  dmi.chassis.vendor: Dell Inc.
  dmi.modalias: 
dmi:bvnDellInc.:bvrA09:bd12/13/2012:svnDellInc.:pnLatitudeE6530:pvr01:rvnDellInc.:rn07Y85M:rvrA01:cvnDellInc.:ct9:cvr:
  dmi.product.name: Latitude E6530
  dmi.product.version: 01
  dmi.sys.vendor: Dell Inc.
  hciconfig:
   hci0:Type: BR/EDR  Bus: USB
BD Address: 20:16:D8:9C:38:E5  ACL MTU: 1021:8  SCO MTU: 64:1
UP RUNNING PSCAN ISCAN 
RX bytes:1817731 acl:117432 sco:0 events:5271 errors:0
TX bytes:37955 acl:131 sco:0 commands:5096 errors:0
  syslog:
   Nov  1 14:50:19 pnunn-Latitude-E6530 bluetoothd[1015]: Discovery session 
0x7f6489f7b450 with :1.582 activated
   Nov  1 14:50:25 pnunn-Latitude-E6530 bluetoothd[1015]: Unknown command 
complete for opcode 37
   Nov  1 14:50:28 pnunn-Latitude-E6530 bluetoothd[1015]: Stopping discovery
   Nov  1 14:50:36 pnunn-Latitude-E6530 kernel: [60934.211132] input: Microsoft 
Bluetooth Notebook Mouse 5000 as 
/devices/pci:00/:00:1a.0/usb1/1-1/1-1.4/1-1.4:1.0/bluetooth/hci0/hci0:11/input29
   Nov  1 14:50:36 pnunn-Latitude-E6530 kernel: [60934.211646] hid-generic 
0005:045E:0700.000C: input,hidraw3: BLUETOOTH HID v1.00 Mouse [Microsoft 
Bluetooth Notebook Mouse 5000] on 20:16:d8:9c:38:e5

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/bluez/+bug/1246981/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1338706] Re: Samsung SSD 840 failed to get NCQ Send/Recv Log Emask 0x1 failed to set xfermode (err_mask=0x40) on upstream kernels = 3.12

2015-06-18 Thread Adam Conrad
** Changed in: linux (Ubuntu Wily)
   Status: Invalid = Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1338706

Title:
  Samsung SSD 840 failed to get NCQ Send/Recv Log Emask 0x1 failed to
  set xfermode (err_mask=0x40) on upstream kernels = 3.12

Status in linux package in Ubuntu:
  Fix Committed
Status in linux source package in Trusty:
  Fix Committed
Status in linux source package in Utopic:
  Fix Committed
Status in linux source package in Vivid:
  Fix Committed
Status in linux source package in Wily:
  Fix Committed

Bug description:
  [Impact]

   * Users with Samsung 8** SSD drives see miscellaneous errors and
  warning messages in the logs depending on the firmware level of the
  drive while booting or after running trim.

  [Test Case]

   * Run this script, and then check logs for errors.
  #!/bin/bash

  git clone git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
  for i in {0..10} ; do
   cp -r linux linux$i
  done
  rm -rf linux*
  echo sudo fstrim requires your password
  sudo fstrim ./

  [Regression Potential]

   * There is very little regression potential as this change simply
  prevents NCQ trim from being used on Samsung 8** drives.

  [Other Info]

   * Commit is upstream.
   * Greatly increasing the timeout for the drives seems to relieve the timeout 
errors.  This may be due to trimming large numbers of sectors with single 
commands.  It may be prudent for future upstream to break up large trims into 
multiple requests on smaller regions.

  ===Original Bug description ==
  Samsung SSD 840 Series failed to get NCQ Send/Recv Log Emask 0x1.

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.13.0-30-generic 3.13.0-30.55
  ProcVersionSignature: Ubuntu 3.13.0-30.55-generic 3.13.11.2
  Uname: Linux 3.13.0-30-generic x86_64
  ApportVersion: 2.14.1-0ubuntu3.2
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  user   2131 F pulseaudio
  CurrentDesktop: Unity
  Date: Mon Jul  7 20:01:28 2014
  HibernationDevice: RESUME=UUID=685afcb7-7aa6-4048-af15-091d3bcd3b35
  InstallationDate: Installed on 2014-06-22 (14 days ago)
  InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Release amd64 (20140417)
  IwConfig:
   eth0  no wireless extensions.

   lono wireless extensions.
  MachineType: System manufacturer System Product Name
  ProcFB: 0 nouveaufb
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.13.0-30-generic 
root=UUID=d7c2e1cb-d046-460c-83b8-0cfbb330d095 ro quiet splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-3.13.0-30-generic N/A
   linux-backports-modules-3.13.0-30-generic  N/A
   linux-firmware 1.127.4
  RfKill:

  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 09/10/2010
  dmi.bios.vendor: American Megatrends Inc.
  dmi.bios.version: 0901
  dmi.board.asset.tag: To Be Filled By O.E.M.
  dmi.board.name: M3N78-EM
  dmi.board.vendor: ASUSTeK Computer INC.
  dmi.board.version: Rev X.0x
  dmi.chassis.asset.tag: Asset-1234567890
  dmi.chassis.type: 3
  dmi.chassis.vendor: Chassis Manufacture
  dmi.chassis.version: Chassis Version
  dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvr0901:bd09/10/2010:svnSystemmanufacturer:pnSystemProductName:pvrSystemVersion:rvnASUSTeKComputerINC.:rnM3N78-EM:rvrRevX.0x:cvnChassisManufacture:ct3:cvrChassisVersion:
  dmi.product.name: System Product Name
  dmi.product.version: System Version
  dmi.sys.vendor: System manufacturer

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1338706/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1354975] Re: iwlwifi Intel 7260 Wifi disconnects

2015-06-18 Thread Emmanuel Grumbach
https://wireless.wiki.kernel.org/en/users/drivers/iwlwifi/core_release

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launchpad.net/bugs/1354975

Title:
  iwlwifi Intel 7260 Wifi disconnects

Status in Unity Linux:
  New
Status in linux-firmware package in Ubuntu:
  Fix Released

Bug description:
  I experience frequent disconnects and auth issues, never more than 30
  minutes without a disconnect. Sometimes dozens of disconnects in a few
  minutes.

  This happens with the default 7260-8 firmware.
  Tried replacing the -8 with -9 ucode. Failed to load due to API version. This 
loaded the -7 driver which seems to be more stable.

  Tested against 2.4ghz APs (Apple, Netgear, Linksys).

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.13.0-32-generic 3.13.0-32.57
  ProcVersionSignature: Ubuntu 3.13.0-32.57-generic 3.13.11.4
  Uname: Linux 3.13.0-32-generic x86_64
  ApportVersion: 2.14.1-0ubuntu3.3
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  steve  2577 F pulseaudio
   /dev/snd/controlC1:  steve  2577 F pulseaudio
  CurrentDesktop: Unity
  Date: Sun Aug 10 17:49:06 2014
  HibernationDevice: RESUME=UUID=374a0c1c-4ac2-456b-a67e-9ea54fe11fe6
  InstallationDate: Installed on 2013-12-28 (225 days ago)
  InstallationMedia: Ubuntu 13.10 Saucy Salamander - Release amd64 
(20131016.1)
  MachineType: Dell Inc. XPS 12-9Q33
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-32-generic 
root=UUID=58deb355-7a09-440b-ade2-69a84fd74460 ro ipv6.disable=1 quiet splash 
vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-3.13.0-32-generic N/A
   linux-backports-modules-3.13.0-32-generic  N/A
   linux-firmware 1.127.5
  SourcePackage: linux
  UpgradeStatus: Upgraded to trusty on 2014-07-06 (35 days ago)
  dmi.bios.date: 05/06/2013
  dmi.bios.vendor: Dell Inc.
  dmi.bios.version: A00
  dmi.board.name: XPS 12-9Q33
  dmi.board.vendor: Dell Inc.
  dmi.board.version: A00
  dmi.chassis.type: 8
  dmi.chassis.vendor: Dell Inc.
  dmi.chassis.version: Not Specified
  dmi.modalias: 
dmi:bvnDellInc.:bvrA00:bd05/06/2013:svnDellInc.:pnXPS12-9Q33:pvrA00:rvnDellInc.:rnXPS12-9Q33:rvrA00:cvnDellInc.:ct8:cvrNotSpecified:
  dmi.product.name: XPS 12-9Q33
  dmi.product.version: A00
  dmi.sys.vendor: Dell Inc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/unitylinux/+bug/1354975/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1465755] Re: linux: 3.19.0-22.22 -proposed tracker

2015-06-18 Thread Brad Figg
** Changed in: kernel-sru-workflow/verification-testing
   Status: New = In Progress

** Changed in: kernel-sru-workflow/certification-testing
   Status: New = Confirmed

** Changed in: kernel-sru-workflow/regression-testing
   Status: New = Confirmed

** Changed in: kernel-sru-workflow/security-signoff
   Status: New = Confirmed

** Description changed:

  This bug is for tracking the 3.19.0-22.22 upload package. This bug will
  contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 16. June 2015 16:18 UTC
- kernel-stable-phase:CopyToProposed
  kernel-stable-Prepare-package-end:Wednesday, 17. June 2015 02:02 UTC
  kernel-stable-Promote-to-proposed-start:Wednesday, 17. June 2015 02:02 UTC
- kernel-stable-phase-changed:Wednesday, 17. June 2015 02:02 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 18. June 2015 18:59 UTC
+ kernel-stable-phase:Verification  Testing
+ kernel-stable-phase-changed:Thursday, 18. June 2015 20:00 UTC
+ kernel-stable-Verification-testing-start:Thursday, 18. June 2015 20:00 UTC
+ kernel-stable-Certification-testing-start:Thursday, 18. June 2015 20:00 UTC
+ kernel-stable-Security-signoff-start:Thursday, 18. June 2015 20:00 UTC
+ proposed-announcement-sent:True
+ kernel-stable-Regression-testing-start:Thursday, 18. June 2015 20:00 UTC

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1465755

Title:
  linux: 3.19.0-22.22 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Confirmed
Status in Kernel SRU Workflow package-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Confirmed
Status in Kernel SRU Workflow security-signoff series:
  Confirmed
Status in Kernel SRU Workflow verification-testing series:
  In Progress
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Vivid:
  New

Bug description:
  This bug is for tracking the 3.19.0-22.22 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 16. June 2015 16:18 UTC
  kernel-stable-Prepare-package-end:Wednesday, 17. June 2015 02:02 UTC
  kernel-stable-Promote-to-proposed-start:Wednesday, 17. June 2015 02:02 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 18. June 2015 18:59 UTC
  kernel-stable-phase:Verification  Testing
  kernel-stable-phase-changed:Thursday, 18. June 2015 20:00 UTC
  kernel-stable-Verification-testing-start:Thursday, 18. June 2015 20:00 UTC
  kernel-stable-Certification-testing-start:Thursday, 18. June 2015 20:00 UTC
  kernel-stable-Security-signoff-start:Thursday, 18. June 2015 20:00 UTC
  proposed-announcement-sent:True
  kernel-stable-Regression-testing-start:Thursday, 18. June 2015 20:00 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1465755/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1459934] Re: Support bluetooth device 0cf3:e006

2015-06-18 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.19.0-22.22

---
linux (3.19.0-22.22) vivid; urgency=low

  [ Brad Figg ]

  * Release Tracking Bug
- LP: #1465755

  [ Tai Nguyen ]

  * SAUCE: power: reset: Add syscon reboot device node for APM X-Gene
platform
- LP: #1463211

  [ Upstream Kernel Changes ]

  * Revert dm crypt: fix deadlock when async crypto algorithm returns
-EBUSY
- LP: #1465696
  * Bluetooth: ath3k: Add a new ID 0cf3:e006 to ath3k list
- LP: #1459934
  * cdc-acm: prevent infinite loop when parsing CDC headers.
- LP: #1460657
  * (upstream) libata: Blacklist queued TRIM on all Samsung 800-series
- LP: #1338706, #1449005
  * powerpc/powernv: Check image loaded or not before calling flash
- LP: #1461553
  * ahci: avoton port-disable reset-quirk
- LP: #1458617
  * Bluetooth: btusb: support public address configuration for ath3012
- LP: #1459937
  * Bluetooth: btusb: Add setup callback for chip init on USB
- LP: #1459937
  * Bluetooth: btusb: Add support for QCA ROME chipset family
- LP: #1459937
  * Bluetooth: btusb: Fix incorrect type in qca_device_info
- LP: #1459937
  * Bluetooth: btusb: Fix minor whitespace issue in QCA ROME device entries
- LP: #1459937
  * Bluetooth: btusb: Add support for 0cf3:e007
- LP: #1459937
  * storvsc: Set the SRB flags correctly when no data transfer is needed
- LP: #1439780
  * vfs: read file_handle only once in handle_to_path
- LP: #1416503
- CVE-2015-1420
  * ozwpan: Use unsigned ints to prevent heap overflow
- LP: #1463442
- CVE-2015-4001
  * ozwpan: divide-by-zero leading to panic
- LP: #1463445
- CVE-2015-4003
  * ozwpan: Use proper check to prevent heap overflow
- LP: #1463444
- CVE-2015-4002
  * ozwpan: unchecked signed subtraction leads to DoS
- LP: #1463444
- CVE-2015-4002
  * enclosure: fix WARN_ON removing an adapter in multi-path devices
- LP: #1415178
  * ASoC: tfa9879: Fix return value check in tfa9879_i2c_probe()
- LP: #1465696
  * ASoC: samsung: s3c24xx-i2s: Fix return value check in
s3c24xx_iis_dev_probe()
- LP: #1465696
  * ASoC: dapm: Enable autodisable on SOC_DAPM_SINGLE_TLV_AUTODISABLE
- LP: #1465696
  * ASoC: rt5677: add register patch for PLL
- LP: #1465696
  * btrfs: unlock i_mutex after attempting to delete subvolume during send
- LP: #1465696
  * ALSA: hda - Fix mute-LED fixed mode
- LP: #1465696
  * ALSA: hda - Add mute-LED mode control to Thinkpad
- LP: #1465696
  * arm64: dma-mapping: always clear allocated buffers
- LP: #1465696
  * ALSA: emu10k1: Fix card shortname string buffer overflow
- LP: #1465696
  * ALSA: emux: Fix mutex deadlock at unloading
- LP: #1465696
  * drm/radeon: Use drm_calloc_ab for CS relocs
- LP: #1465696
  * drm/radeon: adjust pll when audio is not enabled
- LP: #1465696
  * drm/radeon: add SI DPM quirk for Sapphire R9 270 Dual-X 2G GDDR5
- LP: #1465696
  * drm/radeon: fix lockup when BOs aren't part of the VM on release
- LP: #1465696
  * drm/radeon: reset BOs address after clearing it.
- LP: #1465696
  * drm/radeon: check new address before removing old one
- LP: #1465696
  * SCSI: add 1024 max sectors black list flag
- LP: #1465696
  * 3w-sas: fix command completion race
- LP: #1465696
  * 3w-: fix command completion race
- LP: #1465696
  * 3w-9xxx: fix command completion race
- LP: #1465696
  * uas: Allow uas_use_uas_driver to return usb-storage flags
- LP: #1465696
  * uas: Add US_FL_MAX_SECTORS_240 flag
- LP: #1465696
  * uas: Set max_sectors_240 quirk for ASM1053 devices
- LP: #1465696
  * usb: chipidea: otg: remove mutex unlock and lock while stop and start
role
- LP: #1465696
  * serial: xilinx: Use platform_get_irq to get irq description structure
- LP: #1465696
  * serial: of-serial: Remove device_type = serial registration
- LP: #1465696
  * tty/serial: at91: maxburst was missing for dma transfers
- LP: #1465696
  * ALSA: emux: Fix mutex deadlock in OSS emulation
- LP: #1465696
  * ACPI / SBS: Enable battery manager when present
- LP: #1465696
  * ALSA: emu10k1: Emu10k2 32 bit DMA mode
- LP: #1465696
  * ASoC: rt5677: fixed wrong DMIC ref clock
- LP: #1465696
  * rbd: end I/O the entire obj_request on error
- LP: #1465696
  * ext4: fix data corruption caused by unwritten and delayed extents
- LP: #1465696
  * ext4: move check under lock scope to close a race.
- LP: #1465696
  * powerpc/pseries: Correct cpu affinity for dlpar added cpus
- LP: #1465696
  * powerpc/powernv: Restore non-volatile CRs after nap
- LP: #1465696
  * efivarfs: Ensure VariableName is NUL-terminated
- LP: #1465696
  * x86/efi: Store upper bits of command line buffer address in
ext_cmd_line_ptr
- LP: #1465696
  * blk-mq: fix race between timeout and CPU hotplug
- LP: #1465696
  * blk-mq: fix CPU hotplug handling
- LP: #1465696
  * 

[Kernel-packages] [Bug 1463442] Re: CVE-2015-4001

2015-06-18 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.19.0-22.22

---
linux (3.19.0-22.22) vivid; urgency=low

  [ Brad Figg ]

  * Release Tracking Bug
- LP: #1465755

  [ Tai Nguyen ]

  * SAUCE: power: reset: Add syscon reboot device node for APM X-Gene
platform
- LP: #1463211

  [ Upstream Kernel Changes ]

  * Revert dm crypt: fix deadlock when async crypto algorithm returns
-EBUSY
- LP: #1465696
  * Bluetooth: ath3k: Add a new ID 0cf3:e006 to ath3k list
- LP: #1459934
  * cdc-acm: prevent infinite loop when parsing CDC headers.
- LP: #1460657
  * (upstream) libata: Blacklist queued TRIM on all Samsung 800-series
- LP: #1338706, #1449005
  * powerpc/powernv: Check image loaded or not before calling flash
- LP: #1461553
  * ahci: avoton port-disable reset-quirk
- LP: #1458617
  * Bluetooth: btusb: support public address configuration for ath3012
- LP: #1459937
  * Bluetooth: btusb: Add setup callback for chip init on USB
- LP: #1459937
  * Bluetooth: btusb: Add support for QCA ROME chipset family
- LP: #1459937
  * Bluetooth: btusb: Fix incorrect type in qca_device_info
- LP: #1459937
  * Bluetooth: btusb: Fix minor whitespace issue in QCA ROME device entries
- LP: #1459937
  * Bluetooth: btusb: Add support for 0cf3:e007
- LP: #1459937
  * storvsc: Set the SRB flags correctly when no data transfer is needed
- LP: #1439780
  * vfs: read file_handle only once in handle_to_path
- LP: #1416503
- CVE-2015-1420
  * ozwpan: Use unsigned ints to prevent heap overflow
- LP: #1463442
- CVE-2015-4001
  * ozwpan: divide-by-zero leading to panic
- LP: #1463445
- CVE-2015-4003
  * ozwpan: Use proper check to prevent heap overflow
- LP: #1463444
- CVE-2015-4002
  * ozwpan: unchecked signed subtraction leads to DoS
- LP: #1463444
- CVE-2015-4002
  * enclosure: fix WARN_ON removing an adapter in multi-path devices
- LP: #1415178
  * ASoC: tfa9879: Fix return value check in tfa9879_i2c_probe()
- LP: #1465696
  * ASoC: samsung: s3c24xx-i2s: Fix return value check in
s3c24xx_iis_dev_probe()
- LP: #1465696
  * ASoC: dapm: Enable autodisable on SOC_DAPM_SINGLE_TLV_AUTODISABLE
- LP: #1465696
  * ASoC: rt5677: add register patch for PLL
- LP: #1465696
  * btrfs: unlock i_mutex after attempting to delete subvolume during send
- LP: #1465696
  * ALSA: hda - Fix mute-LED fixed mode
- LP: #1465696
  * ALSA: hda - Add mute-LED mode control to Thinkpad
- LP: #1465696
  * arm64: dma-mapping: always clear allocated buffers
- LP: #1465696
  * ALSA: emu10k1: Fix card shortname string buffer overflow
- LP: #1465696
  * ALSA: emux: Fix mutex deadlock at unloading
- LP: #1465696
  * drm/radeon: Use drm_calloc_ab for CS relocs
- LP: #1465696
  * drm/radeon: adjust pll when audio is not enabled
- LP: #1465696
  * drm/radeon: add SI DPM quirk for Sapphire R9 270 Dual-X 2G GDDR5
- LP: #1465696
  * drm/radeon: fix lockup when BOs aren't part of the VM on release
- LP: #1465696
  * drm/radeon: reset BOs address after clearing it.
- LP: #1465696
  * drm/radeon: check new address before removing old one
- LP: #1465696
  * SCSI: add 1024 max sectors black list flag
- LP: #1465696
  * 3w-sas: fix command completion race
- LP: #1465696
  * 3w-: fix command completion race
- LP: #1465696
  * 3w-9xxx: fix command completion race
- LP: #1465696
  * uas: Allow uas_use_uas_driver to return usb-storage flags
- LP: #1465696
  * uas: Add US_FL_MAX_SECTORS_240 flag
- LP: #1465696
  * uas: Set max_sectors_240 quirk for ASM1053 devices
- LP: #1465696
  * usb: chipidea: otg: remove mutex unlock and lock while stop and start
role
- LP: #1465696
  * serial: xilinx: Use platform_get_irq to get irq description structure
- LP: #1465696
  * serial: of-serial: Remove device_type = serial registration
- LP: #1465696
  * tty/serial: at91: maxburst was missing for dma transfers
- LP: #1465696
  * ALSA: emux: Fix mutex deadlock in OSS emulation
- LP: #1465696
  * ACPI / SBS: Enable battery manager when present
- LP: #1465696
  * ALSA: emu10k1: Emu10k2 32 bit DMA mode
- LP: #1465696
  * ASoC: rt5677: fixed wrong DMIC ref clock
- LP: #1465696
  * rbd: end I/O the entire obj_request on error
- LP: #1465696
  * ext4: fix data corruption caused by unwritten and delayed extents
- LP: #1465696
  * ext4: move check under lock scope to close a race.
- LP: #1465696
  * powerpc/pseries: Correct cpu affinity for dlpar added cpus
- LP: #1465696
  * powerpc/powernv: Restore non-volatile CRs after nap
- LP: #1465696
  * efivarfs: Ensure VariableName is NUL-terminated
- LP: #1465696
  * x86/efi: Store upper bits of command line buffer address in
ext_cmd_line_ptr
- LP: #1465696
  * blk-mq: fix race between timeout and CPU hotplug
- LP: #1465696
  * blk-mq: fix CPU hotplug handling
- LP: #1465696
  * 

[Kernel-packages] [Bug 1463444] Re: CVE-2015-4002

2015-06-18 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.19.0-22.22

---
linux (3.19.0-22.22) vivid; urgency=low

  [ Brad Figg ]

  * Release Tracking Bug
- LP: #1465755

  [ Tai Nguyen ]

  * SAUCE: power: reset: Add syscon reboot device node for APM X-Gene
platform
- LP: #1463211

  [ Upstream Kernel Changes ]

  * Revert dm crypt: fix deadlock when async crypto algorithm returns
-EBUSY
- LP: #1465696
  * Bluetooth: ath3k: Add a new ID 0cf3:e006 to ath3k list
- LP: #1459934
  * cdc-acm: prevent infinite loop when parsing CDC headers.
- LP: #1460657
  * (upstream) libata: Blacklist queued TRIM on all Samsung 800-series
- LP: #1338706, #1449005
  * powerpc/powernv: Check image loaded or not before calling flash
- LP: #1461553
  * ahci: avoton port-disable reset-quirk
- LP: #1458617
  * Bluetooth: btusb: support public address configuration for ath3012
- LP: #1459937
  * Bluetooth: btusb: Add setup callback for chip init on USB
- LP: #1459937
  * Bluetooth: btusb: Add support for QCA ROME chipset family
- LP: #1459937
  * Bluetooth: btusb: Fix incorrect type in qca_device_info
- LP: #1459937
  * Bluetooth: btusb: Fix minor whitespace issue in QCA ROME device entries
- LP: #1459937
  * Bluetooth: btusb: Add support for 0cf3:e007
- LP: #1459937
  * storvsc: Set the SRB flags correctly when no data transfer is needed
- LP: #1439780
  * vfs: read file_handle only once in handle_to_path
- LP: #1416503
- CVE-2015-1420
  * ozwpan: Use unsigned ints to prevent heap overflow
- LP: #1463442
- CVE-2015-4001
  * ozwpan: divide-by-zero leading to panic
- LP: #1463445
- CVE-2015-4003
  * ozwpan: Use proper check to prevent heap overflow
- LP: #1463444
- CVE-2015-4002
  * ozwpan: unchecked signed subtraction leads to DoS
- LP: #1463444
- CVE-2015-4002
  * enclosure: fix WARN_ON removing an adapter in multi-path devices
- LP: #1415178
  * ASoC: tfa9879: Fix return value check in tfa9879_i2c_probe()
- LP: #1465696
  * ASoC: samsung: s3c24xx-i2s: Fix return value check in
s3c24xx_iis_dev_probe()
- LP: #1465696
  * ASoC: dapm: Enable autodisable on SOC_DAPM_SINGLE_TLV_AUTODISABLE
- LP: #1465696
  * ASoC: rt5677: add register patch for PLL
- LP: #1465696
  * btrfs: unlock i_mutex after attempting to delete subvolume during send
- LP: #1465696
  * ALSA: hda - Fix mute-LED fixed mode
- LP: #1465696
  * ALSA: hda - Add mute-LED mode control to Thinkpad
- LP: #1465696
  * arm64: dma-mapping: always clear allocated buffers
- LP: #1465696
  * ALSA: emu10k1: Fix card shortname string buffer overflow
- LP: #1465696
  * ALSA: emux: Fix mutex deadlock at unloading
- LP: #1465696
  * drm/radeon: Use drm_calloc_ab for CS relocs
- LP: #1465696
  * drm/radeon: adjust pll when audio is not enabled
- LP: #1465696
  * drm/radeon: add SI DPM quirk for Sapphire R9 270 Dual-X 2G GDDR5
- LP: #1465696
  * drm/radeon: fix lockup when BOs aren't part of the VM on release
- LP: #1465696
  * drm/radeon: reset BOs address after clearing it.
- LP: #1465696
  * drm/radeon: check new address before removing old one
- LP: #1465696
  * SCSI: add 1024 max sectors black list flag
- LP: #1465696
  * 3w-sas: fix command completion race
- LP: #1465696
  * 3w-: fix command completion race
- LP: #1465696
  * 3w-9xxx: fix command completion race
- LP: #1465696
  * uas: Allow uas_use_uas_driver to return usb-storage flags
- LP: #1465696
  * uas: Add US_FL_MAX_SECTORS_240 flag
- LP: #1465696
  * uas: Set max_sectors_240 quirk for ASM1053 devices
- LP: #1465696
  * usb: chipidea: otg: remove mutex unlock and lock while stop and start
role
- LP: #1465696
  * serial: xilinx: Use platform_get_irq to get irq description structure
- LP: #1465696
  * serial: of-serial: Remove device_type = serial registration
- LP: #1465696
  * tty/serial: at91: maxburst was missing for dma transfers
- LP: #1465696
  * ALSA: emux: Fix mutex deadlock in OSS emulation
- LP: #1465696
  * ACPI / SBS: Enable battery manager when present
- LP: #1465696
  * ALSA: emu10k1: Emu10k2 32 bit DMA mode
- LP: #1465696
  * ASoC: rt5677: fixed wrong DMIC ref clock
- LP: #1465696
  * rbd: end I/O the entire obj_request on error
- LP: #1465696
  * ext4: fix data corruption caused by unwritten and delayed extents
- LP: #1465696
  * ext4: move check under lock scope to close a race.
- LP: #1465696
  * powerpc/pseries: Correct cpu affinity for dlpar added cpus
- LP: #1465696
  * powerpc/powernv: Restore non-volatile CRs after nap
- LP: #1465696
  * efivarfs: Ensure VariableName is NUL-terminated
- LP: #1465696
  * x86/efi: Store upper bits of command line buffer address in
ext_cmd_line_ptr
- LP: #1465696
  * blk-mq: fix race between timeout and CPU hotplug
- LP: #1465696
  * blk-mq: fix CPU hotplug handling
- LP: #1465696
  * 

[Kernel-packages] [Bug 1459937] Re: Support bluetooth device 0cf3:e007

2015-06-18 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.19.0-22.22

---
linux (3.19.0-22.22) vivid; urgency=low

  [ Brad Figg ]

  * Release Tracking Bug
- LP: #1465755

  [ Tai Nguyen ]

  * SAUCE: power: reset: Add syscon reboot device node for APM X-Gene
platform
- LP: #1463211

  [ Upstream Kernel Changes ]

  * Revert dm crypt: fix deadlock when async crypto algorithm returns
-EBUSY
- LP: #1465696
  * Bluetooth: ath3k: Add a new ID 0cf3:e006 to ath3k list
- LP: #1459934
  * cdc-acm: prevent infinite loop when parsing CDC headers.
- LP: #1460657
  * (upstream) libata: Blacklist queued TRIM on all Samsung 800-series
- LP: #1338706, #1449005
  * powerpc/powernv: Check image loaded or not before calling flash
- LP: #1461553
  * ahci: avoton port-disable reset-quirk
- LP: #1458617
  * Bluetooth: btusb: support public address configuration for ath3012
- LP: #1459937
  * Bluetooth: btusb: Add setup callback for chip init on USB
- LP: #1459937
  * Bluetooth: btusb: Add support for QCA ROME chipset family
- LP: #1459937
  * Bluetooth: btusb: Fix incorrect type in qca_device_info
- LP: #1459937
  * Bluetooth: btusb: Fix minor whitespace issue in QCA ROME device entries
- LP: #1459937
  * Bluetooth: btusb: Add support for 0cf3:e007
- LP: #1459937
  * storvsc: Set the SRB flags correctly when no data transfer is needed
- LP: #1439780
  * vfs: read file_handle only once in handle_to_path
- LP: #1416503
- CVE-2015-1420
  * ozwpan: Use unsigned ints to prevent heap overflow
- LP: #1463442
- CVE-2015-4001
  * ozwpan: divide-by-zero leading to panic
- LP: #1463445
- CVE-2015-4003
  * ozwpan: Use proper check to prevent heap overflow
- LP: #1463444
- CVE-2015-4002
  * ozwpan: unchecked signed subtraction leads to DoS
- LP: #1463444
- CVE-2015-4002
  * enclosure: fix WARN_ON removing an adapter in multi-path devices
- LP: #1415178
  * ASoC: tfa9879: Fix return value check in tfa9879_i2c_probe()
- LP: #1465696
  * ASoC: samsung: s3c24xx-i2s: Fix return value check in
s3c24xx_iis_dev_probe()
- LP: #1465696
  * ASoC: dapm: Enable autodisable on SOC_DAPM_SINGLE_TLV_AUTODISABLE
- LP: #1465696
  * ASoC: rt5677: add register patch for PLL
- LP: #1465696
  * btrfs: unlock i_mutex after attempting to delete subvolume during send
- LP: #1465696
  * ALSA: hda - Fix mute-LED fixed mode
- LP: #1465696
  * ALSA: hda - Add mute-LED mode control to Thinkpad
- LP: #1465696
  * arm64: dma-mapping: always clear allocated buffers
- LP: #1465696
  * ALSA: emu10k1: Fix card shortname string buffer overflow
- LP: #1465696
  * ALSA: emux: Fix mutex deadlock at unloading
- LP: #1465696
  * drm/radeon: Use drm_calloc_ab for CS relocs
- LP: #1465696
  * drm/radeon: adjust pll when audio is not enabled
- LP: #1465696
  * drm/radeon: add SI DPM quirk for Sapphire R9 270 Dual-X 2G GDDR5
- LP: #1465696
  * drm/radeon: fix lockup when BOs aren't part of the VM on release
- LP: #1465696
  * drm/radeon: reset BOs address after clearing it.
- LP: #1465696
  * drm/radeon: check new address before removing old one
- LP: #1465696
  * SCSI: add 1024 max sectors black list flag
- LP: #1465696
  * 3w-sas: fix command completion race
- LP: #1465696
  * 3w-: fix command completion race
- LP: #1465696
  * 3w-9xxx: fix command completion race
- LP: #1465696
  * uas: Allow uas_use_uas_driver to return usb-storage flags
- LP: #1465696
  * uas: Add US_FL_MAX_SECTORS_240 flag
- LP: #1465696
  * uas: Set max_sectors_240 quirk for ASM1053 devices
- LP: #1465696
  * usb: chipidea: otg: remove mutex unlock and lock while stop and start
role
- LP: #1465696
  * serial: xilinx: Use platform_get_irq to get irq description structure
- LP: #1465696
  * serial: of-serial: Remove device_type = serial registration
- LP: #1465696
  * tty/serial: at91: maxburst was missing for dma transfers
- LP: #1465696
  * ALSA: emux: Fix mutex deadlock in OSS emulation
- LP: #1465696
  * ACPI / SBS: Enable battery manager when present
- LP: #1465696
  * ALSA: emu10k1: Emu10k2 32 bit DMA mode
- LP: #1465696
  * ASoC: rt5677: fixed wrong DMIC ref clock
- LP: #1465696
  * rbd: end I/O the entire obj_request on error
- LP: #1465696
  * ext4: fix data corruption caused by unwritten and delayed extents
- LP: #1465696
  * ext4: move check under lock scope to close a race.
- LP: #1465696
  * powerpc/pseries: Correct cpu affinity for dlpar added cpus
- LP: #1465696
  * powerpc/powernv: Restore non-volatile CRs after nap
- LP: #1465696
  * efivarfs: Ensure VariableName is NUL-terminated
- LP: #1465696
  * x86/efi: Store upper bits of command line buffer address in
ext_cmd_line_ptr
- LP: #1465696
  * blk-mq: fix race between timeout and CPU hotplug
- LP: #1465696
  * blk-mq: fix CPU hotplug handling
- LP: #1465696
  * 

[Kernel-packages] [Bug 1460657] Re: possible infinite loop when parsing CDC headers

2015-06-18 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.19.0-22.22

---
linux (3.19.0-22.22) vivid; urgency=low

  [ Brad Figg ]

  * Release Tracking Bug
- LP: #1465755

  [ Tai Nguyen ]

  * SAUCE: power: reset: Add syscon reboot device node for APM X-Gene
platform
- LP: #1463211

  [ Upstream Kernel Changes ]

  * Revert dm crypt: fix deadlock when async crypto algorithm returns
-EBUSY
- LP: #1465696
  * Bluetooth: ath3k: Add a new ID 0cf3:e006 to ath3k list
- LP: #1459934
  * cdc-acm: prevent infinite loop when parsing CDC headers.
- LP: #1460657
  * (upstream) libata: Blacklist queued TRIM on all Samsung 800-series
- LP: #1338706, #1449005
  * powerpc/powernv: Check image loaded or not before calling flash
- LP: #1461553
  * ahci: avoton port-disable reset-quirk
- LP: #1458617
  * Bluetooth: btusb: support public address configuration for ath3012
- LP: #1459937
  * Bluetooth: btusb: Add setup callback for chip init on USB
- LP: #1459937
  * Bluetooth: btusb: Add support for QCA ROME chipset family
- LP: #1459937
  * Bluetooth: btusb: Fix incorrect type in qca_device_info
- LP: #1459937
  * Bluetooth: btusb: Fix minor whitespace issue in QCA ROME device entries
- LP: #1459937
  * Bluetooth: btusb: Add support for 0cf3:e007
- LP: #1459937
  * storvsc: Set the SRB flags correctly when no data transfer is needed
- LP: #1439780
  * vfs: read file_handle only once in handle_to_path
- LP: #1416503
- CVE-2015-1420
  * ozwpan: Use unsigned ints to prevent heap overflow
- LP: #1463442
- CVE-2015-4001
  * ozwpan: divide-by-zero leading to panic
- LP: #1463445
- CVE-2015-4003
  * ozwpan: Use proper check to prevent heap overflow
- LP: #1463444
- CVE-2015-4002
  * ozwpan: unchecked signed subtraction leads to DoS
- LP: #1463444
- CVE-2015-4002
  * enclosure: fix WARN_ON removing an adapter in multi-path devices
- LP: #1415178
  * ASoC: tfa9879: Fix return value check in tfa9879_i2c_probe()
- LP: #1465696
  * ASoC: samsung: s3c24xx-i2s: Fix return value check in
s3c24xx_iis_dev_probe()
- LP: #1465696
  * ASoC: dapm: Enable autodisable on SOC_DAPM_SINGLE_TLV_AUTODISABLE
- LP: #1465696
  * ASoC: rt5677: add register patch for PLL
- LP: #1465696
  * btrfs: unlock i_mutex after attempting to delete subvolume during send
- LP: #1465696
  * ALSA: hda - Fix mute-LED fixed mode
- LP: #1465696
  * ALSA: hda - Add mute-LED mode control to Thinkpad
- LP: #1465696
  * arm64: dma-mapping: always clear allocated buffers
- LP: #1465696
  * ALSA: emu10k1: Fix card shortname string buffer overflow
- LP: #1465696
  * ALSA: emux: Fix mutex deadlock at unloading
- LP: #1465696
  * drm/radeon: Use drm_calloc_ab for CS relocs
- LP: #1465696
  * drm/radeon: adjust pll when audio is not enabled
- LP: #1465696
  * drm/radeon: add SI DPM quirk for Sapphire R9 270 Dual-X 2G GDDR5
- LP: #1465696
  * drm/radeon: fix lockup when BOs aren't part of the VM on release
- LP: #1465696
  * drm/radeon: reset BOs address after clearing it.
- LP: #1465696
  * drm/radeon: check new address before removing old one
- LP: #1465696
  * SCSI: add 1024 max sectors black list flag
- LP: #1465696
  * 3w-sas: fix command completion race
- LP: #1465696
  * 3w-: fix command completion race
- LP: #1465696
  * 3w-9xxx: fix command completion race
- LP: #1465696
  * uas: Allow uas_use_uas_driver to return usb-storage flags
- LP: #1465696
  * uas: Add US_FL_MAX_SECTORS_240 flag
- LP: #1465696
  * uas: Set max_sectors_240 quirk for ASM1053 devices
- LP: #1465696
  * usb: chipidea: otg: remove mutex unlock and lock while stop and start
role
- LP: #1465696
  * serial: xilinx: Use platform_get_irq to get irq description structure
- LP: #1465696
  * serial: of-serial: Remove device_type = serial registration
- LP: #1465696
  * tty/serial: at91: maxburst was missing for dma transfers
- LP: #1465696
  * ALSA: emux: Fix mutex deadlock in OSS emulation
- LP: #1465696
  * ACPI / SBS: Enable battery manager when present
- LP: #1465696
  * ALSA: emu10k1: Emu10k2 32 bit DMA mode
- LP: #1465696
  * ASoC: rt5677: fixed wrong DMIC ref clock
- LP: #1465696
  * rbd: end I/O the entire obj_request on error
- LP: #1465696
  * ext4: fix data corruption caused by unwritten and delayed extents
- LP: #1465696
  * ext4: move check under lock scope to close a race.
- LP: #1465696
  * powerpc/pseries: Correct cpu affinity for dlpar added cpus
- LP: #1465696
  * powerpc/powernv: Restore non-volatile CRs after nap
- LP: #1465696
  * efivarfs: Ensure VariableName is NUL-terminated
- LP: #1465696
  * x86/efi: Store upper bits of command line buffer address in
ext_cmd_line_ptr
- LP: #1465696
  * blk-mq: fix race between timeout and CPU hotplug
- LP: #1465696
  * blk-mq: fix CPU hotplug handling
- LP: #1465696
  * 

[Kernel-packages] [Bug 1416503] Re: CVE-2015-1420

2015-06-18 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.19.0-22.22

---
linux (3.19.0-22.22) vivid; urgency=low

  [ Brad Figg ]

  * Release Tracking Bug
- LP: #1465755

  [ Tai Nguyen ]

  * SAUCE: power: reset: Add syscon reboot device node for APM X-Gene
platform
- LP: #1463211

  [ Upstream Kernel Changes ]

  * Revert dm crypt: fix deadlock when async crypto algorithm returns
-EBUSY
- LP: #1465696
  * Bluetooth: ath3k: Add a new ID 0cf3:e006 to ath3k list
- LP: #1459934
  * cdc-acm: prevent infinite loop when parsing CDC headers.
- LP: #1460657
  * (upstream) libata: Blacklist queued TRIM on all Samsung 800-series
- LP: #1338706, #1449005
  * powerpc/powernv: Check image loaded or not before calling flash
- LP: #1461553
  * ahci: avoton port-disable reset-quirk
- LP: #1458617
  * Bluetooth: btusb: support public address configuration for ath3012
- LP: #1459937
  * Bluetooth: btusb: Add setup callback for chip init on USB
- LP: #1459937
  * Bluetooth: btusb: Add support for QCA ROME chipset family
- LP: #1459937
  * Bluetooth: btusb: Fix incorrect type in qca_device_info
- LP: #1459937
  * Bluetooth: btusb: Fix minor whitespace issue in QCA ROME device entries
- LP: #1459937
  * Bluetooth: btusb: Add support for 0cf3:e007
- LP: #1459937
  * storvsc: Set the SRB flags correctly when no data transfer is needed
- LP: #1439780
  * vfs: read file_handle only once in handle_to_path
- LP: #1416503
- CVE-2015-1420
  * ozwpan: Use unsigned ints to prevent heap overflow
- LP: #1463442
- CVE-2015-4001
  * ozwpan: divide-by-zero leading to panic
- LP: #1463445
- CVE-2015-4003
  * ozwpan: Use proper check to prevent heap overflow
- LP: #1463444
- CVE-2015-4002
  * ozwpan: unchecked signed subtraction leads to DoS
- LP: #1463444
- CVE-2015-4002
  * enclosure: fix WARN_ON removing an adapter in multi-path devices
- LP: #1415178
  * ASoC: tfa9879: Fix return value check in tfa9879_i2c_probe()
- LP: #1465696
  * ASoC: samsung: s3c24xx-i2s: Fix return value check in
s3c24xx_iis_dev_probe()
- LP: #1465696
  * ASoC: dapm: Enable autodisable on SOC_DAPM_SINGLE_TLV_AUTODISABLE
- LP: #1465696
  * ASoC: rt5677: add register patch for PLL
- LP: #1465696
  * btrfs: unlock i_mutex after attempting to delete subvolume during send
- LP: #1465696
  * ALSA: hda - Fix mute-LED fixed mode
- LP: #1465696
  * ALSA: hda - Add mute-LED mode control to Thinkpad
- LP: #1465696
  * arm64: dma-mapping: always clear allocated buffers
- LP: #1465696
  * ALSA: emu10k1: Fix card shortname string buffer overflow
- LP: #1465696
  * ALSA: emux: Fix mutex deadlock at unloading
- LP: #1465696
  * drm/radeon: Use drm_calloc_ab for CS relocs
- LP: #1465696
  * drm/radeon: adjust pll when audio is not enabled
- LP: #1465696
  * drm/radeon: add SI DPM quirk for Sapphire R9 270 Dual-X 2G GDDR5
- LP: #1465696
  * drm/radeon: fix lockup when BOs aren't part of the VM on release
- LP: #1465696
  * drm/radeon: reset BOs address after clearing it.
- LP: #1465696
  * drm/radeon: check new address before removing old one
- LP: #1465696
  * SCSI: add 1024 max sectors black list flag
- LP: #1465696
  * 3w-sas: fix command completion race
- LP: #1465696
  * 3w-: fix command completion race
- LP: #1465696
  * 3w-9xxx: fix command completion race
- LP: #1465696
  * uas: Allow uas_use_uas_driver to return usb-storage flags
- LP: #1465696
  * uas: Add US_FL_MAX_SECTORS_240 flag
- LP: #1465696
  * uas: Set max_sectors_240 quirk for ASM1053 devices
- LP: #1465696
  * usb: chipidea: otg: remove mutex unlock and lock while stop and start
role
- LP: #1465696
  * serial: xilinx: Use platform_get_irq to get irq description structure
- LP: #1465696
  * serial: of-serial: Remove device_type = serial registration
- LP: #1465696
  * tty/serial: at91: maxburst was missing for dma transfers
- LP: #1465696
  * ALSA: emux: Fix mutex deadlock in OSS emulation
- LP: #1465696
  * ACPI / SBS: Enable battery manager when present
- LP: #1465696
  * ALSA: emu10k1: Emu10k2 32 bit DMA mode
- LP: #1465696
  * ASoC: rt5677: fixed wrong DMIC ref clock
- LP: #1465696
  * rbd: end I/O the entire obj_request on error
- LP: #1465696
  * ext4: fix data corruption caused by unwritten and delayed extents
- LP: #1465696
  * ext4: move check under lock scope to close a race.
- LP: #1465696
  * powerpc/pseries: Correct cpu affinity for dlpar added cpus
- LP: #1465696
  * powerpc/powernv: Restore non-volatile CRs after nap
- LP: #1465696
  * efivarfs: Ensure VariableName is NUL-terminated
- LP: #1465696
  * x86/efi: Store upper bits of command line buffer address in
ext_cmd_line_ptr
- LP: #1465696
  * blk-mq: fix race between timeout and CPU hotplug
- LP: #1465696
  * blk-mq: fix CPU hotplug handling
- LP: #1465696
  * 

[Kernel-packages] [Bug 1461553] Re: [Ubuntu 14.04.3] kernel patches for RAS tools

2015-06-18 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.19.0-22.22

---
linux (3.19.0-22.22) vivid; urgency=low

  [ Brad Figg ]

  * Release Tracking Bug
- LP: #1465755

  [ Tai Nguyen ]

  * SAUCE: power: reset: Add syscon reboot device node for APM X-Gene
platform
- LP: #1463211

  [ Upstream Kernel Changes ]

  * Revert dm crypt: fix deadlock when async crypto algorithm returns
-EBUSY
- LP: #1465696
  * Bluetooth: ath3k: Add a new ID 0cf3:e006 to ath3k list
- LP: #1459934
  * cdc-acm: prevent infinite loop when parsing CDC headers.
- LP: #1460657
  * (upstream) libata: Blacklist queued TRIM on all Samsung 800-series
- LP: #1338706, #1449005
  * powerpc/powernv: Check image loaded or not before calling flash
- LP: #1461553
  * ahci: avoton port-disable reset-quirk
- LP: #1458617
  * Bluetooth: btusb: support public address configuration for ath3012
- LP: #1459937
  * Bluetooth: btusb: Add setup callback for chip init on USB
- LP: #1459937
  * Bluetooth: btusb: Add support for QCA ROME chipset family
- LP: #1459937
  * Bluetooth: btusb: Fix incorrect type in qca_device_info
- LP: #1459937
  * Bluetooth: btusb: Fix minor whitespace issue in QCA ROME device entries
- LP: #1459937
  * Bluetooth: btusb: Add support for 0cf3:e007
- LP: #1459937
  * storvsc: Set the SRB flags correctly when no data transfer is needed
- LP: #1439780
  * vfs: read file_handle only once in handle_to_path
- LP: #1416503
- CVE-2015-1420
  * ozwpan: Use unsigned ints to prevent heap overflow
- LP: #1463442
- CVE-2015-4001
  * ozwpan: divide-by-zero leading to panic
- LP: #1463445
- CVE-2015-4003
  * ozwpan: Use proper check to prevent heap overflow
- LP: #1463444
- CVE-2015-4002
  * ozwpan: unchecked signed subtraction leads to DoS
- LP: #1463444
- CVE-2015-4002
  * enclosure: fix WARN_ON removing an adapter in multi-path devices
- LP: #1415178
  * ASoC: tfa9879: Fix return value check in tfa9879_i2c_probe()
- LP: #1465696
  * ASoC: samsung: s3c24xx-i2s: Fix return value check in
s3c24xx_iis_dev_probe()
- LP: #1465696
  * ASoC: dapm: Enable autodisable on SOC_DAPM_SINGLE_TLV_AUTODISABLE
- LP: #1465696
  * ASoC: rt5677: add register patch for PLL
- LP: #1465696
  * btrfs: unlock i_mutex after attempting to delete subvolume during send
- LP: #1465696
  * ALSA: hda - Fix mute-LED fixed mode
- LP: #1465696
  * ALSA: hda - Add mute-LED mode control to Thinkpad
- LP: #1465696
  * arm64: dma-mapping: always clear allocated buffers
- LP: #1465696
  * ALSA: emu10k1: Fix card shortname string buffer overflow
- LP: #1465696
  * ALSA: emux: Fix mutex deadlock at unloading
- LP: #1465696
  * drm/radeon: Use drm_calloc_ab for CS relocs
- LP: #1465696
  * drm/radeon: adjust pll when audio is not enabled
- LP: #1465696
  * drm/radeon: add SI DPM quirk for Sapphire R9 270 Dual-X 2G GDDR5
- LP: #1465696
  * drm/radeon: fix lockup when BOs aren't part of the VM on release
- LP: #1465696
  * drm/radeon: reset BOs address after clearing it.
- LP: #1465696
  * drm/radeon: check new address before removing old one
- LP: #1465696
  * SCSI: add 1024 max sectors black list flag
- LP: #1465696
  * 3w-sas: fix command completion race
- LP: #1465696
  * 3w-: fix command completion race
- LP: #1465696
  * 3w-9xxx: fix command completion race
- LP: #1465696
  * uas: Allow uas_use_uas_driver to return usb-storage flags
- LP: #1465696
  * uas: Add US_FL_MAX_SECTORS_240 flag
- LP: #1465696
  * uas: Set max_sectors_240 quirk for ASM1053 devices
- LP: #1465696
  * usb: chipidea: otg: remove mutex unlock and lock while stop and start
role
- LP: #1465696
  * serial: xilinx: Use platform_get_irq to get irq description structure
- LP: #1465696
  * serial: of-serial: Remove device_type = serial registration
- LP: #1465696
  * tty/serial: at91: maxburst was missing for dma transfers
- LP: #1465696
  * ALSA: emux: Fix mutex deadlock in OSS emulation
- LP: #1465696
  * ACPI / SBS: Enable battery manager when present
- LP: #1465696
  * ALSA: emu10k1: Emu10k2 32 bit DMA mode
- LP: #1465696
  * ASoC: rt5677: fixed wrong DMIC ref clock
- LP: #1465696
  * rbd: end I/O the entire obj_request on error
- LP: #1465696
  * ext4: fix data corruption caused by unwritten and delayed extents
- LP: #1465696
  * ext4: move check under lock scope to close a race.
- LP: #1465696
  * powerpc/pseries: Correct cpu affinity for dlpar added cpus
- LP: #1465696
  * powerpc/powernv: Restore non-volatile CRs after nap
- LP: #1465696
  * efivarfs: Ensure VariableName is NUL-terminated
- LP: #1465696
  * x86/efi: Store upper bits of command line buffer address in
ext_cmd_line_ptr
- LP: #1465696
  * blk-mq: fix race between timeout and CPU hotplug
- LP: #1465696
  * blk-mq: fix CPU hotplug handling
- LP: #1465696
  * 

[Kernel-packages] [Bug 1449005] Re: trim does not work with Samsung 840 EVO after firmware update (EXT0DB6Q)

2015-06-18 Thread Launchpad Bug Tracker
*** This bug is a duplicate of bug 1338706 ***
https://bugs.launchpad.net/bugs/1338706

This bug was fixed in the package linux - 3.19.0-22.22

---
linux (3.19.0-22.22) vivid; urgency=low

  [ Brad Figg ]

  * Release Tracking Bug
- LP: #1465755

  [ Tai Nguyen ]

  * SAUCE: power: reset: Add syscon reboot device node for APM X-Gene
platform
- LP: #1463211

  [ Upstream Kernel Changes ]

  * Revert dm crypt: fix deadlock when async crypto algorithm returns
-EBUSY
- LP: #1465696
  * Bluetooth: ath3k: Add a new ID 0cf3:e006 to ath3k list
- LP: #1459934
  * cdc-acm: prevent infinite loop when parsing CDC headers.
- LP: #1460657
  * (upstream) libata: Blacklist queued TRIM on all Samsung 800-series
- LP: #1338706, #1449005
  * powerpc/powernv: Check image loaded or not before calling flash
- LP: #1461553
  * ahci: avoton port-disable reset-quirk
- LP: #1458617
  * Bluetooth: btusb: support public address configuration for ath3012
- LP: #1459937
  * Bluetooth: btusb: Add setup callback for chip init on USB
- LP: #1459937
  * Bluetooth: btusb: Add support for QCA ROME chipset family
- LP: #1459937
  * Bluetooth: btusb: Fix incorrect type in qca_device_info
- LP: #1459937
  * Bluetooth: btusb: Fix minor whitespace issue in QCA ROME device entries
- LP: #1459937
  * Bluetooth: btusb: Add support for 0cf3:e007
- LP: #1459937
  * storvsc: Set the SRB flags correctly when no data transfer is needed
- LP: #1439780
  * vfs: read file_handle only once in handle_to_path
- LP: #1416503
- CVE-2015-1420
  * ozwpan: Use unsigned ints to prevent heap overflow
- LP: #1463442
- CVE-2015-4001
  * ozwpan: divide-by-zero leading to panic
- LP: #1463445
- CVE-2015-4003
  * ozwpan: Use proper check to prevent heap overflow
- LP: #1463444
- CVE-2015-4002
  * ozwpan: unchecked signed subtraction leads to DoS
- LP: #1463444
- CVE-2015-4002
  * enclosure: fix WARN_ON removing an adapter in multi-path devices
- LP: #1415178
  * ASoC: tfa9879: Fix return value check in tfa9879_i2c_probe()
- LP: #1465696
  * ASoC: samsung: s3c24xx-i2s: Fix return value check in
s3c24xx_iis_dev_probe()
- LP: #1465696
  * ASoC: dapm: Enable autodisable on SOC_DAPM_SINGLE_TLV_AUTODISABLE
- LP: #1465696
  * ASoC: rt5677: add register patch for PLL
- LP: #1465696
  * btrfs: unlock i_mutex after attempting to delete subvolume during send
- LP: #1465696
  * ALSA: hda - Fix mute-LED fixed mode
- LP: #1465696
  * ALSA: hda - Add mute-LED mode control to Thinkpad
- LP: #1465696
  * arm64: dma-mapping: always clear allocated buffers
- LP: #1465696
  * ALSA: emu10k1: Fix card shortname string buffer overflow
- LP: #1465696
  * ALSA: emux: Fix mutex deadlock at unloading
- LP: #1465696
  * drm/radeon: Use drm_calloc_ab for CS relocs
- LP: #1465696
  * drm/radeon: adjust pll when audio is not enabled
- LP: #1465696
  * drm/radeon: add SI DPM quirk for Sapphire R9 270 Dual-X 2G GDDR5
- LP: #1465696
  * drm/radeon: fix lockup when BOs aren't part of the VM on release
- LP: #1465696
  * drm/radeon: reset BOs address after clearing it.
- LP: #1465696
  * drm/radeon: check new address before removing old one
- LP: #1465696
  * SCSI: add 1024 max sectors black list flag
- LP: #1465696
  * 3w-sas: fix command completion race
- LP: #1465696
  * 3w-: fix command completion race
- LP: #1465696
  * 3w-9xxx: fix command completion race
- LP: #1465696
  * uas: Allow uas_use_uas_driver to return usb-storage flags
- LP: #1465696
  * uas: Add US_FL_MAX_SECTORS_240 flag
- LP: #1465696
  * uas: Set max_sectors_240 quirk for ASM1053 devices
- LP: #1465696
  * usb: chipidea: otg: remove mutex unlock and lock while stop and start
role
- LP: #1465696
  * serial: xilinx: Use platform_get_irq to get irq description structure
- LP: #1465696
  * serial: of-serial: Remove device_type = serial registration
- LP: #1465696
  * tty/serial: at91: maxburst was missing for dma transfers
- LP: #1465696
  * ALSA: emux: Fix mutex deadlock in OSS emulation
- LP: #1465696
  * ACPI / SBS: Enable battery manager when present
- LP: #1465696
  * ALSA: emu10k1: Emu10k2 32 bit DMA mode
- LP: #1465696
  * ASoC: rt5677: fixed wrong DMIC ref clock
- LP: #1465696
  * rbd: end I/O the entire obj_request on error
- LP: #1465696
  * ext4: fix data corruption caused by unwritten and delayed extents
- LP: #1465696
  * ext4: move check under lock scope to close a race.
- LP: #1465696
  * powerpc/pseries: Correct cpu affinity for dlpar added cpus
- LP: #1465696
  * powerpc/powernv: Restore non-volatile CRs after nap
- LP: #1465696
  * efivarfs: Ensure VariableName is NUL-terminated
- LP: #1465696
  * x86/efi: Store upper bits of command line buffer address in
ext_cmd_line_ptr
- LP: #1465696
  * blk-mq: fix race between timeout and 

[Kernel-packages] [Bug 1458617] Re: Avoton server occasionally fails to boot when using SSD disks connected using ahci driver

2015-06-18 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.19.0-22.22

---
linux (3.19.0-22.22) vivid; urgency=low

  [ Brad Figg ]

  * Release Tracking Bug
- LP: #1465755

  [ Tai Nguyen ]

  * SAUCE: power: reset: Add syscon reboot device node for APM X-Gene
platform
- LP: #1463211

  [ Upstream Kernel Changes ]

  * Revert dm crypt: fix deadlock when async crypto algorithm returns
-EBUSY
- LP: #1465696
  * Bluetooth: ath3k: Add a new ID 0cf3:e006 to ath3k list
- LP: #1459934
  * cdc-acm: prevent infinite loop when parsing CDC headers.
- LP: #1460657
  * (upstream) libata: Blacklist queued TRIM on all Samsung 800-series
- LP: #1338706, #1449005
  * powerpc/powernv: Check image loaded or not before calling flash
- LP: #1461553
  * ahci: avoton port-disable reset-quirk
- LP: #1458617
  * Bluetooth: btusb: support public address configuration for ath3012
- LP: #1459937
  * Bluetooth: btusb: Add setup callback for chip init on USB
- LP: #1459937
  * Bluetooth: btusb: Add support for QCA ROME chipset family
- LP: #1459937
  * Bluetooth: btusb: Fix incorrect type in qca_device_info
- LP: #1459937
  * Bluetooth: btusb: Fix minor whitespace issue in QCA ROME device entries
- LP: #1459937
  * Bluetooth: btusb: Add support for 0cf3:e007
- LP: #1459937
  * storvsc: Set the SRB flags correctly when no data transfer is needed
- LP: #1439780
  * vfs: read file_handle only once in handle_to_path
- LP: #1416503
- CVE-2015-1420
  * ozwpan: Use unsigned ints to prevent heap overflow
- LP: #1463442
- CVE-2015-4001
  * ozwpan: divide-by-zero leading to panic
- LP: #1463445
- CVE-2015-4003
  * ozwpan: Use proper check to prevent heap overflow
- LP: #1463444
- CVE-2015-4002
  * ozwpan: unchecked signed subtraction leads to DoS
- LP: #1463444
- CVE-2015-4002
  * enclosure: fix WARN_ON removing an adapter in multi-path devices
- LP: #1415178
  * ASoC: tfa9879: Fix return value check in tfa9879_i2c_probe()
- LP: #1465696
  * ASoC: samsung: s3c24xx-i2s: Fix return value check in
s3c24xx_iis_dev_probe()
- LP: #1465696
  * ASoC: dapm: Enable autodisable on SOC_DAPM_SINGLE_TLV_AUTODISABLE
- LP: #1465696
  * ASoC: rt5677: add register patch for PLL
- LP: #1465696
  * btrfs: unlock i_mutex after attempting to delete subvolume during send
- LP: #1465696
  * ALSA: hda - Fix mute-LED fixed mode
- LP: #1465696
  * ALSA: hda - Add mute-LED mode control to Thinkpad
- LP: #1465696
  * arm64: dma-mapping: always clear allocated buffers
- LP: #1465696
  * ALSA: emu10k1: Fix card shortname string buffer overflow
- LP: #1465696
  * ALSA: emux: Fix mutex deadlock at unloading
- LP: #1465696
  * drm/radeon: Use drm_calloc_ab for CS relocs
- LP: #1465696
  * drm/radeon: adjust pll when audio is not enabled
- LP: #1465696
  * drm/radeon: add SI DPM quirk for Sapphire R9 270 Dual-X 2G GDDR5
- LP: #1465696
  * drm/radeon: fix lockup when BOs aren't part of the VM on release
- LP: #1465696
  * drm/radeon: reset BOs address after clearing it.
- LP: #1465696
  * drm/radeon: check new address before removing old one
- LP: #1465696
  * SCSI: add 1024 max sectors black list flag
- LP: #1465696
  * 3w-sas: fix command completion race
- LP: #1465696
  * 3w-: fix command completion race
- LP: #1465696
  * 3w-9xxx: fix command completion race
- LP: #1465696
  * uas: Allow uas_use_uas_driver to return usb-storage flags
- LP: #1465696
  * uas: Add US_FL_MAX_SECTORS_240 flag
- LP: #1465696
  * uas: Set max_sectors_240 quirk for ASM1053 devices
- LP: #1465696
  * usb: chipidea: otg: remove mutex unlock and lock while stop and start
role
- LP: #1465696
  * serial: xilinx: Use platform_get_irq to get irq description structure
- LP: #1465696
  * serial: of-serial: Remove device_type = serial registration
- LP: #1465696
  * tty/serial: at91: maxburst was missing for dma transfers
- LP: #1465696
  * ALSA: emux: Fix mutex deadlock in OSS emulation
- LP: #1465696
  * ACPI / SBS: Enable battery manager when present
- LP: #1465696
  * ALSA: emu10k1: Emu10k2 32 bit DMA mode
- LP: #1465696
  * ASoC: rt5677: fixed wrong DMIC ref clock
- LP: #1465696
  * rbd: end I/O the entire obj_request on error
- LP: #1465696
  * ext4: fix data corruption caused by unwritten and delayed extents
- LP: #1465696
  * ext4: move check under lock scope to close a race.
- LP: #1465696
  * powerpc/pseries: Correct cpu affinity for dlpar added cpus
- LP: #1465696
  * powerpc/powernv: Restore non-volatile CRs after nap
- LP: #1465696
  * efivarfs: Ensure VariableName is NUL-terminated
- LP: #1465696
  * x86/efi: Store upper bits of command line buffer address in
ext_cmd_line_ptr
- LP: #1465696
  * blk-mq: fix race between timeout and CPU hotplug
- LP: #1465696
  * blk-mq: fix CPU hotplug handling
- LP: #1465696
  * 

[Kernel-packages] [Bug 1415178] Re: Kernel trace message when the ipr driver is rmmod from Ubuntu 14.10 guest (GTO - PCI Passthrough)

2015-06-18 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.19.0-22.22

---
linux (3.19.0-22.22) vivid; urgency=low

  [ Brad Figg ]

  * Release Tracking Bug
- LP: #1465755

  [ Tai Nguyen ]

  * SAUCE: power: reset: Add syscon reboot device node for APM X-Gene
platform
- LP: #1463211

  [ Upstream Kernel Changes ]

  * Revert dm crypt: fix deadlock when async crypto algorithm returns
-EBUSY
- LP: #1465696
  * Bluetooth: ath3k: Add a new ID 0cf3:e006 to ath3k list
- LP: #1459934
  * cdc-acm: prevent infinite loop when parsing CDC headers.
- LP: #1460657
  * (upstream) libata: Blacklist queued TRIM on all Samsung 800-series
- LP: #1338706, #1449005
  * powerpc/powernv: Check image loaded or not before calling flash
- LP: #1461553
  * ahci: avoton port-disable reset-quirk
- LP: #1458617
  * Bluetooth: btusb: support public address configuration for ath3012
- LP: #1459937
  * Bluetooth: btusb: Add setup callback for chip init on USB
- LP: #1459937
  * Bluetooth: btusb: Add support for QCA ROME chipset family
- LP: #1459937
  * Bluetooth: btusb: Fix incorrect type in qca_device_info
- LP: #1459937
  * Bluetooth: btusb: Fix minor whitespace issue in QCA ROME device entries
- LP: #1459937
  * Bluetooth: btusb: Add support for 0cf3:e007
- LP: #1459937
  * storvsc: Set the SRB flags correctly when no data transfer is needed
- LP: #1439780
  * vfs: read file_handle only once in handle_to_path
- LP: #1416503
- CVE-2015-1420
  * ozwpan: Use unsigned ints to prevent heap overflow
- LP: #1463442
- CVE-2015-4001
  * ozwpan: divide-by-zero leading to panic
- LP: #1463445
- CVE-2015-4003
  * ozwpan: Use proper check to prevent heap overflow
- LP: #1463444
- CVE-2015-4002
  * ozwpan: unchecked signed subtraction leads to DoS
- LP: #1463444
- CVE-2015-4002
  * enclosure: fix WARN_ON removing an adapter in multi-path devices
- LP: #1415178
  * ASoC: tfa9879: Fix return value check in tfa9879_i2c_probe()
- LP: #1465696
  * ASoC: samsung: s3c24xx-i2s: Fix return value check in
s3c24xx_iis_dev_probe()
- LP: #1465696
  * ASoC: dapm: Enable autodisable on SOC_DAPM_SINGLE_TLV_AUTODISABLE
- LP: #1465696
  * ASoC: rt5677: add register patch for PLL
- LP: #1465696
  * btrfs: unlock i_mutex after attempting to delete subvolume during send
- LP: #1465696
  * ALSA: hda - Fix mute-LED fixed mode
- LP: #1465696
  * ALSA: hda - Add mute-LED mode control to Thinkpad
- LP: #1465696
  * arm64: dma-mapping: always clear allocated buffers
- LP: #1465696
  * ALSA: emu10k1: Fix card shortname string buffer overflow
- LP: #1465696
  * ALSA: emux: Fix mutex deadlock at unloading
- LP: #1465696
  * drm/radeon: Use drm_calloc_ab for CS relocs
- LP: #1465696
  * drm/radeon: adjust pll when audio is not enabled
- LP: #1465696
  * drm/radeon: add SI DPM quirk for Sapphire R9 270 Dual-X 2G GDDR5
- LP: #1465696
  * drm/radeon: fix lockup when BOs aren't part of the VM on release
- LP: #1465696
  * drm/radeon: reset BOs address after clearing it.
- LP: #1465696
  * drm/radeon: check new address before removing old one
- LP: #1465696
  * SCSI: add 1024 max sectors black list flag
- LP: #1465696
  * 3w-sas: fix command completion race
- LP: #1465696
  * 3w-: fix command completion race
- LP: #1465696
  * 3w-9xxx: fix command completion race
- LP: #1465696
  * uas: Allow uas_use_uas_driver to return usb-storage flags
- LP: #1465696
  * uas: Add US_FL_MAX_SECTORS_240 flag
- LP: #1465696
  * uas: Set max_sectors_240 quirk for ASM1053 devices
- LP: #1465696
  * usb: chipidea: otg: remove mutex unlock and lock while stop and start
role
- LP: #1465696
  * serial: xilinx: Use platform_get_irq to get irq description structure
- LP: #1465696
  * serial: of-serial: Remove device_type = serial registration
- LP: #1465696
  * tty/serial: at91: maxburst was missing for dma transfers
- LP: #1465696
  * ALSA: emux: Fix mutex deadlock in OSS emulation
- LP: #1465696
  * ACPI / SBS: Enable battery manager when present
- LP: #1465696
  * ALSA: emu10k1: Emu10k2 32 bit DMA mode
- LP: #1465696
  * ASoC: rt5677: fixed wrong DMIC ref clock
- LP: #1465696
  * rbd: end I/O the entire obj_request on error
- LP: #1465696
  * ext4: fix data corruption caused by unwritten and delayed extents
- LP: #1465696
  * ext4: move check under lock scope to close a race.
- LP: #1465696
  * powerpc/pseries: Correct cpu affinity for dlpar added cpus
- LP: #1465696
  * powerpc/powernv: Restore non-volatile CRs after nap
- LP: #1465696
  * efivarfs: Ensure VariableName is NUL-terminated
- LP: #1465696
  * x86/efi: Store upper bits of command line buffer address in
ext_cmd_line_ptr
- LP: #1465696
  * blk-mq: fix race between timeout and CPU hotplug
- LP: #1465696
  * blk-mq: fix CPU hotplug handling
- LP: #1465696
  * 

[Kernel-packages] [Bug 1463211] Re: mustang board doesn't reboot

2015-06-18 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.19.0-22.22

---
linux (3.19.0-22.22) vivid; urgency=low

  [ Brad Figg ]

  * Release Tracking Bug
- LP: #1465755

  [ Tai Nguyen ]

  * SAUCE: power: reset: Add syscon reboot device node for APM X-Gene
platform
- LP: #1463211

  [ Upstream Kernel Changes ]

  * Revert dm crypt: fix deadlock when async crypto algorithm returns
-EBUSY
- LP: #1465696
  * Bluetooth: ath3k: Add a new ID 0cf3:e006 to ath3k list
- LP: #1459934
  * cdc-acm: prevent infinite loop when parsing CDC headers.
- LP: #1460657
  * (upstream) libata: Blacklist queued TRIM on all Samsung 800-series
- LP: #1338706, #1449005
  * powerpc/powernv: Check image loaded or not before calling flash
- LP: #1461553
  * ahci: avoton port-disable reset-quirk
- LP: #1458617
  * Bluetooth: btusb: support public address configuration for ath3012
- LP: #1459937
  * Bluetooth: btusb: Add setup callback for chip init on USB
- LP: #1459937
  * Bluetooth: btusb: Add support for QCA ROME chipset family
- LP: #1459937
  * Bluetooth: btusb: Fix incorrect type in qca_device_info
- LP: #1459937
  * Bluetooth: btusb: Fix minor whitespace issue in QCA ROME device entries
- LP: #1459937
  * Bluetooth: btusb: Add support for 0cf3:e007
- LP: #1459937
  * storvsc: Set the SRB flags correctly when no data transfer is needed
- LP: #1439780
  * vfs: read file_handle only once in handle_to_path
- LP: #1416503
- CVE-2015-1420
  * ozwpan: Use unsigned ints to prevent heap overflow
- LP: #1463442
- CVE-2015-4001
  * ozwpan: divide-by-zero leading to panic
- LP: #1463445
- CVE-2015-4003
  * ozwpan: Use proper check to prevent heap overflow
- LP: #1463444
- CVE-2015-4002
  * ozwpan: unchecked signed subtraction leads to DoS
- LP: #1463444
- CVE-2015-4002
  * enclosure: fix WARN_ON removing an adapter in multi-path devices
- LP: #1415178
  * ASoC: tfa9879: Fix return value check in tfa9879_i2c_probe()
- LP: #1465696
  * ASoC: samsung: s3c24xx-i2s: Fix return value check in
s3c24xx_iis_dev_probe()
- LP: #1465696
  * ASoC: dapm: Enable autodisable on SOC_DAPM_SINGLE_TLV_AUTODISABLE
- LP: #1465696
  * ASoC: rt5677: add register patch for PLL
- LP: #1465696
  * btrfs: unlock i_mutex after attempting to delete subvolume during send
- LP: #1465696
  * ALSA: hda - Fix mute-LED fixed mode
- LP: #1465696
  * ALSA: hda - Add mute-LED mode control to Thinkpad
- LP: #1465696
  * arm64: dma-mapping: always clear allocated buffers
- LP: #1465696
  * ALSA: emu10k1: Fix card shortname string buffer overflow
- LP: #1465696
  * ALSA: emux: Fix mutex deadlock at unloading
- LP: #1465696
  * drm/radeon: Use drm_calloc_ab for CS relocs
- LP: #1465696
  * drm/radeon: adjust pll when audio is not enabled
- LP: #1465696
  * drm/radeon: add SI DPM quirk for Sapphire R9 270 Dual-X 2G GDDR5
- LP: #1465696
  * drm/radeon: fix lockup when BOs aren't part of the VM on release
- LP: #1465696
  * drm/radeon: reset BOs address after clearing it.
- LP: #1465696
  * drm/radeon: check new address before removing old one
- LP: #1465696
  * SCSI: add 1024 max sectors black list flag
- LP: #1465696
  * 3w-sas: fix command completion race
- LP: #1465696
  * 3w-: fix command completion race
- LP: #1465696
  * 3w-9xxx: fix command completion race
- LP: #1465696
  * uas: Allow uas_use_uas_driver to return usb-storage flags
- LP: #1465696
  * uas: Add US_FL_MAX_SECTORS_240 flag
- LP: #1465696
  * uas: Set max_sectors_240 quirk for ASM1053 devices
- LP: #1465696
  * usb: chipidea: otg: remove mutex unlock and lock while stop and start
role
- LP: #1465696
  * serial: xilinx: Use platform_get_irq to get irq description structure
- LP: #1465696
  * serial: of-serial: Remove device_type = serial registration
- LP: #1465696
  * tty/serial: at91: maxburst was missing for dma transfers
- LP: #1465696
  * ALSA: emux: Fix mutex deadlock in OSS emulation
- LP: #1465696
  * ACPI / SBS: Enable battery manager when present
- LP: #1465696
  * ALSA: emu10k1: Emu10k2 32 bit DMA mode
- LP: #1465696
  * ASoC: rt5677: fixed wrong DMIC ref clock
- LP: #1465696
  * rbd: end I/O the entire obj_request on error
- LP: #1465696
  * ext4: fix data corruption caused by unwritten and delayed extents
- LP: #1465696
  * ext4: move check under lock scope to close a race.
- LP: #1465696
  * powerpc/pseries: Correct cpu affinity for dlpar added cpus
- LP: #1465696
  * powerpc/powernv: Restore non-volatile CRs after nap
- LP: #1465696
  * efivarfs: Ensure VariableName is NUL-terminated
- LP: #1465696
  * x86/efi: Store upper bits of command line buffer address in
ext_cmd_line_ptr
- LP: #1465696
  * blk-mq: fix race between timeout and CPU hotplug
- LP: #1465696
  * blk-mq: fix CPU hotplug handling
- LP: #1465696
  * 

[Kernel-packages] [Bug 1338706] Re: Samsung SSD 840 failed to get NCQ Send/Recv Log Emask 0x1 failed to set xfermode (err_mask=0x40) on upstream kernels = 3.12

2015-06-18 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.19.0-22.22

---
linux (3.19.0-22.22) vivid; urgency=low

  [ Brad Figg ]

  * Release Tracking Bug
- LP: #1465755

  [ Tai Nguyen ]

  * SAUCE: power: reset: Add syscon reboot device node for APM X-Gene
platform
- LP: #1463211

  [ Upstream Kernel Changes ]

  * Revert dm crypt: fix deadlock when async crypto algorithm returns
-EBUSY
- LP: #1465696
  * Bluetooth: ath3k: Add a new ID 0cf3:e006 to ath3k list
- LP: #1459934
  * cdc-acm: prevent infinite loop when parsing CDC headers.
- LP: #1460657
  * (upstream) libata: Blacklist queued TRIM on all Samsung 800-series
- LP: #1338706, #1449005
  * powerpc/powernv: Check image loaded or not before calling flash
- LP: #1461553
  * ahci: avoton port-disable reset-quirk
- LP: #1458617
  * Bluetooth: btusb: support public address configuration for ath3012
- LP: #1459937
  * Bluetooth: btusb: Add setup callback for chip init on USB
- LP: #1459937
  * Bluetooth: btusb: Add support for QCA ROME chipset family
- LP: #1459937
  * Bluetooth: btusb: Fix incorrect type in qca_device_info
- LP: #1459937
  * Bluetooth: btusb: Fix minor whitespace issue in QCA ROME device entries
- LP: #1459937
  * Bluetooth: btusb: Add support for 0cf3:e007
- LP: #1459937
  * storvsc: Set the SRB flags correctly when no data transfer is needed
- LP: #1439780
  * vfs: read file_handle only once in handle_to_path
- LP: #1416503
- CVE-2015-1420
  * ozwpan: Use unsigned ints to prevent heap overflow
- LP: #1463442
- CVE-2015-4001
  * ozwpan: divide-by-zero leading to panic
- LP: #1463445
- CVE-2015-4003
  * ozwpan: Use proper check to prevent heap overflow
- LP: #1463444
- CVE-2015-4002
  * ozwpan: unchecked signed subtraction leads to DoS
- LP: #1463444
- CVE-2015-4002
  * enclosure: fix WARN_ON removing an adapter in multi-path devices
- LP: #1415178
  * ASoC: tfa9879: Fix return value check in tfa9879_i2c_probe()
- LP: #1465696
  * ASoC: samsung: s3c24xx-i2s: Fix return value check in
s3c24xx_iis_dev_probe()
- LP: #1465696
  * ASoC: dapm: Enable autodisable on SOC_DAPM_SINGLE_TLV_AUTODISABLE
- LP: #1465696
  * ASoC: rt5677: add register patch for PLL
- LP: #1465696
  * btrfs: unlock i_mutex after attempting to delete subvolume during send
- LP: #1465696
  * ALSA: hda - Fix mute-LED fixed mode
- LP: #1465696
  * ALSA: hda - Add mute-LED mode control to Thinkpad
- LP: #1465696
  * arm64: dma-mapping: always clear allocated buffers
- LP: #1465696
  * ALSA: emu10k1: Fix card shortname string buffer overflow
- LP: #1465696
  * ALSA: emux: Fix mutex deadlock at unloading
- LP: #1465696
  * drm/radeon: Use drm_calloc_ab for CS relocs
- LP: #1465696
  * drm/radeon: adjust pll when audio is not enabled
- LP: #1465696
  * drm/radeon: add SI DPM quirk for Sapphire R9 270 Dual-X 2G GDDR5
- LP: #1465696
  * drm/radeon: fix lockup when BOs aren't part of the VM on release
- LP: #1465696
  * drm/radeon: reset BOs address after clearing it.
- LP: #1465696
  * drm/radeon: check new address before removing old one
- LP: #1465696
  * SCSI: add 1024 max sectors black list flag
- LP: #1465696
  * 3w-sas: fix command completion race
- LP: #1465696
  * 3w-: fix command completion race
- LP: #1465696
  * 3w-9xxx: fix command completion race
- LP: #1465696
  * uas: Allow uas_use_uas_driver to return usb-storage flags
- LP: #1465696
  * uas: Add US_FL_MAX_SECTORS_240 flag
- LP: #1465696
  * uas: Set max_sectors_240 quirk for ASM1053 devices
- LP: #1465696
  * usb: chipidea: otg: remove mutex unlock and lock while stop and start
role
- LP: #1465696
  * serial: xilinx: Use platform_get_irq to get irq description structure
- LP: #1465696
  * serial: of-serial: Remove device_type = serial registration
- LP: #1465696
  * tty/serial: at91: maxburst was missing for dma transfers
- LP: #1465696
  * ALSA: emux: Fix mutex deadlock in OSS emulation
- LP: #1465696
  * ACPI / SBS: Enable battery manager when present
- LP: #1465696
  * ALSA: emu10k1: Emu10k2 32 bit DMA mode
- LP: #1465696
  * ASoC: rt5677: fixed wrong DMIC ref clock
- LP: #1465696
  * rbd: end I/O the entire obj_request on error
- LP: #1465696
  * ext4: fix data corruption caused by unwritten and delayed extents
- LP: #1465696
  * ext4: move check under lock scope to close a race.
- LP: #1465696
  * powerpc/pseries: Correct cpu affinity for dlpar added cpus
- LP: #1465696
  * powerpc/powernv: Restore non-volatile CRs after nap
- LP: #1465696
  * efivarfs: Ensure VariableName is NUL-terminated
- LP: #1465696
  * x86/efi: Store upper bits of command line buffer address in
ext_cmd_line_ptr
- LP: #1465696
  * blk-mq: fix race between timeout and CPU hotplug
- LP: #1465696
  * blk-mq: fix CPU hotplug handling
- LP: #1465696
  * 

[Kernel-packages] [Bug 1439780] Re: [Hyper-V] Fiber Channel critical target error

2015-06-18 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.19.0-22.22

---
linux (3.19.0-22.22) vivid; urgency=low

  [ Brad Figg ]

  * Release Tracking Bug
- LP: #1465755

  [ Tai Nguyen ]

  * SAUCE: power: reset: Add syscon reboot device node for APM X-Gene
platform
- LP: #1463211

  [ Upstream Kernel Changes ]

  * Revert dm crypt: fix deadlock when async crypto algorithm returns
-EBUSY
- LP: #1465696
  * Bluetooth: ath3k: Add a new ID 0cf3:e006 to ath3k list
- LP: #1459934
  * cdc-acm: prevent infinite loop when parsing CDC headers.
- LP: #1460657
  * (upstream) libata: Blacklist queued TRIM on all Samsung 800-series
- LP: #1338706, #1449005
  * powerpc/powernv: Check image loaded or not before calling flash
- LP: #1461553
  * ahci: avoton port-disable reset-quirk
- LP: #1458617
  * Bluetooth: btusb: support public address configuration for ath3012
- LP: #1459937
  * Bluetooth: btusb: Add setup callback for chip init on USB
- LP: #1459937
  * Bluetooth: btusb: Add support for QCA ROME chipset family
- LP: #1459937
  * Bluetooth: btusb: Fix incorrect type in qca_device_info
- LP: #1459937
  * Bluetooth: btusb: Fix minor whitespace issue in QCA ROME device entries
- LP: #1459937
  * Bluetooth: btusb: Add support for 0cf3:e007
- LP: #1459937
  * storvsc: Set the SRB flags correctly when no data transfer is needed
- LP: #1439780
  * vfs: read file_handle only once in handle_to_path
- LP: #1416503
- CVE-2015-1420
  * ozwpan: Use unsigned ints to prevent heap overflow
- LP: #1463442
- CVE-2015-4001
  * ozwpan: divide-by-zero leading to panic
- LP: #1463445
- CVE-2015-4003
  * ozwpan: Use proper check to prevent heap overflow
- LP: #1463444
- CVE-2015-4002
  * ozwpan: unchecked signed subtraction leads to DoS
- LP: #1463444
- CVE-2015-4002
  * enclosure: fix WARN_ON removing an adapter in multi-path devices
- LP: #1415178
  * ASoC: tfa9879: Fix return value check in tfa9879_i2c_probe()
- LP: #1465696
  * ASoC: samsung: s3c24xx-i2s: Fix return value check in
s3c24xx_iis_dev_probe()
- LP: #1465696
  * ASoC: dapm: Enable autodisable on SOC_DAPM_SINGLE_TLV_AUTODISABLE
- LP: #1465696
  * ASoC: rt5677: add register patch for PLL
- LP: #1465696
  * btrfs: unlock i_mutex after attempting to delete subvolume during send
- LP: #1465696
  * ALSA: hda - Fix mute-LED fixed mode
- LP: #1465696
  * ALSA: hda - Add mute-LED mode control to Thinkpad
- LP: #1465696
  * arm64: dma-mapping: always clear allocated buffers
- LP: #1465696
  * ALSA: emu10k1: Fix card shortname string buffer overflow
- LP: #1465696
  * ALSA: emux: Fix mutex deadlock at unloading
- LP: #1465696
  * drm/radeon: Use drm_calloc_ab for CS relocs
- LP: #1465696
  * drm/radeon: adjust pll when audio is not enabled
- LP: #1465696
  * drm/radeon: add SI DPM quirk for Sapphire R9 270 Dual-X 2G GDDR5
- LP: #1465696
  * drm/radeon: fix lockup when BOs aren't part of the VM on release
- LP: #1465696
  * drm/radeon: reset BOs address after clearing it.
- LP: #1465696
  * drm/radeon: check new address before removing old one
- LP: #1465696
  * SCSI: add 1024 max sectors black list flag
- LP: #1465696
  * 3w-sas: fix command completion race
- LP: #1465696
  * 3w-: fix command completion race
- LP: #1465696
  * 3w-9xxx: fix command completion race
- LP: #1465696
  * uas: Allow uas_use_uas_driver to return usb-storage flags
- LP: #1465696
  * uas: Add US_FL_MAX_SECTORS_240 flag
- LP: #1465696
  * uas: Set max_sectors_240 quirk for ASM1053 devices
- LP: #1465696
  * usb: chipidea: otg: remove mutex unlock and lock while stop and start
role
- LP: #1465696
  * serial: xilinx: Use platform_get_irq to get irq description structure
- LP: #1465696
  * serial: of-serial: Remove device_type = serial registration
- LP: #1465696
  * tty/serial: at91: maxburst was missing for dma transfers
- LP: #1465696
  * ALSA: emux: Fix mutex deadlock in OSS emulation
- LP: #1465696
  * ACPI / SBS: Enable battery manager when present
- LP: #1465696
  * ALSA: emu10k1: Emu10k2 32 bit DMA mode
- LP: #1465696
  * ASoC: rt5677: fixed wrong DMIC ref clock
- LP: #1465696
  * rbd: end I/O the entire obj_request on error
- LP: #1465696
  * ext4: fix data corruption caused by unwritten and delayed extents
- LP: #1465696
  * ext4: move check under lock scope to close a race.
- LP: #1465696
  * powerpc/pseries: Correct cpu affinity for dlpar added cpus
- LP: #1465696
  * powerpc/powernv: Restore non-volatile CRs after nap
- LP: #1465696
  * efivarfs: Ensure VariableName is NUL-terminated
- LP: #1465696
  * x86/efi: Store upper bits of command line buffer address in
ext_cmd_line_ptr
- LP: #1465696
  * blk-mq: fix race between timeout and CPU hotplug
- LP: #1465696
  * blk-mq: fix CPU hotplug handling
- LP: #1465696
  * 

[Kernel-packages] [Bug 1466591] Re: linux-lts-utopic: 3.16.0-41.57~14.04.1 -proposed tracker

2015-06-18 Thread Brad Figg
** Description changed:

  This bug is for tracking the 3.16.0-41.57~14.04.1 upload package. This
  bug will contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Thursday, 18. June 2015 17:17 UTC
  kernel-stable-phase:Prepare
  kernel-stable-phase-changed:Thursday, 18. June 2015 17:17 UTC
  kernel-stable-master-bug:1466250
+ kernel-stable-Security-signoff-end:Thursday, 18. June 2015 20:02 UTC

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-utopic in Ubuntu.
https://bugs.launchpad.net/bugs/1466591

Title:
  linux-lts-utopic: 3.16.0-41.57~14.04.1 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  New
Status in Kernel SRU Workflow package-testing series:
  New
Status in Kernel SRU Workflow prepare-package series:
  New
Status in Kernel SRU Workflow prepare-package-meta series:
  Invalid
Status in Kernel SRU Workflow prepare-package-signed series:
  New
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-utopic source package in Trusty:
  New

Bug description:
  This bug is for tracking the 3.16.0-41.57~14.04.1 upload package. This
  bug will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Thursday, 18. June 2015 17:17 UTC
  kernel-stable-phase:Prepare
  kernel-stable-phase-changed:Thursday, 18. June 2015 17:17 UTC
  kernel-stable-master-bug:1466250
  kernel-stable-Security-signoff-end:Thursday, 18. June 2015 20:02 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1466591/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1404409] Re: [regression] Intel 10Gb NIC Crashes

2015-06-18 Thread Chris J Arges
These commits may address the issue based on the stacktrace:
d4bcef3fbe887ff93b58da4fcf6df1eee416e8fa
72b1405964c19b99ad9f75340249b16305cf31ab
0213668f060ea966ee8f4e6334f0fd27b6a1c428
10e4fb333c9ad72491f80bed018f8007e17060d1
53d6471cef17262d3ad1c7ce8982a234244f68ec

I have  test build here for 3.13, can you test with this and see if the issue 
happens?
http://people.canonical.com/~arges/lp1404409/

Thanks,

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1404409

Title:
  [regression] Intel 10Gb NIC Crashes

Status in linux package in Ubuntu:
  In Progress

Bug description:
  I posted this to net...@vger.kernel.org as well:
  http://www.spinics.net/lists/netdev/msg309110.html

  I think the next step is to try to bisect this down to a specific commit. I'm 
starting to look at the instructions here:
  https://wiki.ubuntu.com/Kernel/KernelBisection

  -

  Previous history of this thread:
  http://thread.gmane.org/gmane.linux.network/326672

  On 2014-11-04 22:57:19, Tom Herbert wrote:
   Using vlan and bonding? vlan_dev_hard_start_xmit called. A possible
   cause is that bonding interface is out of sync with slave interface
   w.r.t. GSO features. Do we know if this worked in 3.14, 3.15?

  I'm seeing the same sort of crash/warning (skb_war_bad_offload). It's
  happening on Intel 10 Gig NICs using the ixgbe driver. I'm using bridges
  (for virtual machines) on top of VLANs on top of 802.3ad bonding. I'm
  using an MTU of 9000 on the bond0 interface, but 1500 everywhere else.

  I'm always bonding two ports: one one system, I'm bonding two ports on
  identical one-port NICs; on another system, I'm bonding two ports on a
  single two-port NIC. Both systems exhibit the same behavior.

  Everything has worked fine for a couple years on Ubuntu 12.04 Precise
  (Linux 3.2.0). It immediately broke when I upgraded to Ubuntu 14.04
  Trusty (Linux 3.13.0). I can also reproduce this using the packaged
  version of Linux 3.16.0 on Trusty.

  In contrast to other reports of this bug, disabling scatter gather on
  the physical interfaces (e.g. eth0) does *not* stop the crashes
  (assuming I disabled it correctly).

  I currently have two systems (one with Precise, one with Trusty)
  available to do any testing that you'd find helpful.

  Here's a first pass at getting some debugging data.

  The broken system (Ubuntu 14.04 Trusty):

  rlaager@BROKEN:~$ uname -a
  Linux BROKEN 3.13.0-43-generic #72-Ubuntu SMP Mon Dec 8 19:35:06 UTC
  2014 x86_64 x86_64 x86_64 GNU/Linux

  rlaager@BROKEN:~$ ethtool -k p6p1
  Features for p6p1:
  rx-checksumming: on
  tx-checksumming: on
  tx-checksum-ipv4: on
  tx-checksum-ip-generic: off [fixed]
  tx-checksum-ipv6: on
  tx-checksum-fcoe-crc: on [fixed]
  tx-checksum-sctp: on
  scatter-gather: on
  tx-scatter-gather: on
  tx-scatter-gather-fraglist: off [fixed]
  tcp-segmentation-offload: on
  tx-tcp-segmentation: on
  tx-tcp-ecn-segmentation: off [fixed]
  tx-tcp6-segmentation: on
  udp-fragmentation-offload: off [fixed]
  generic-segmentation-offload: on
  generic-receive-offload: on
  large-receive-offload: off
  rx-vlan-offload: on
  tx-vlan-offload: on
  ntuple-filters: off
  receive-hashing: on
  highdma: on [fixed]
  rx-vlan-filter: on
  vlan-challenged: off [fixed]
  tx-lockless: off [fixed]
  netns-local: off [fixed]
  tx-gso-robust: off [fixed]
  tx-fcoe-segmentation: on [fixed]
  tx-gre-segmentation: off [fixed]
  tx-ipip-segmentation: off [fixed]
  tx-sit-segmentation: off [fixed]
  tx-udp_tnl-segmentation: off [fixed]
  tx-mpls-segmentation: off [fixed]
  fcoe-mtu: off [fixed]
  tx-nocache-copy: on
  loopback: off [fixed]
  rx-fcs: off [fixed]
  rx-all: off
  tx-vlan-stag-hw-insert: off [fixed]
  rx-vlan-stag-hw-parse: off [fixed]
  rx-vlan-stag-filter: off [fixed]
  l2-fwd-offload: off

  rlaager@BROKEN:~$ ethtool -k bond0
  Features for bond0:
  rx-checksumming: off [fixed]
  tx-checksumming: on
  tx-checksum-ipv4: off [fixed]
  tx-checksum-ip-generic: on
  tx-checksum-ipv6: off [fixed]
  tx-checksum-fcoe-crc: off [fixed]
  tx-checksum-sctp: off [fixed]
  scatter-gather: on
  tx-scatter-gather: on
  tx-scatter-gather-fraglist: off [requested on]
  tcp-segmentation-offload: on
  tx-tcp-segmentation: on
  tx-tcp-ecn-segmentation: on
  tx-tcp6-segmentation: on
  udp-fragmentation-offload: off [fixed]
  generic-segmentation-offload: on
  generic-receive-offload: on
  large-receive-offload: off
  rx-vlan-offload: on
  tx-vlan-offload: on
  ntuple-filters: off [fixed]
  receive-hashing: off [fixed]
  highdma: on
  rx-vlan-filter: on
  vlan-challenged: off [fixed]
  tx-lockless: on [fixed]
  netns-local: off [fixed]
  tx-gso-robust: off [fixed]
  tx-fcoe-segmentation: off [fixed]
  tx-gre-segmentation: off [fixed]
 

[Kernel-packages] [Bug 1354975] Re: iwlwifi Intel 7260 Wifi disconnects

2015-06-18 Thread Emmanuel Grumbach
Intel just released this page, which can be helpful. I don't think that
replacing the supplicant is a must. But using the latest driver /
firmware seems to be helpful

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launchpad.net/bugs/1354975

Title:
  iwlwifi Intel 7260 Wifi disconnects

Status in Unity Linux:
  New
Status in linux-firmware package in Ubuntu:
  Fix Released

Bug description:
  I experience frequent disconnects and auth issues, never more than 30
  minutes without a disconnect. Sometimes dozens of disconnects in a few
  minutes.

  This happens with the default 7260-8 firmware.
  Tried replacing the -8 with -9 ucode. Failed to load due to API version. This 
loaded the -7 driver which seems to be more stable.

  Tested against 2.4ghz APs (Apple, Netgear, Linksys).

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.13.0-32-generic 3.13.0-32.57
  ProcVersionSignature: Ubuntu 3.13.0-32.57-generic 3.13.11.4
  Uname: Linux 3.13.0-32-generic x86_64
  ApportVersion: 2.14.1-0ubuntu3.3
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  steve  2577 F pulseaudio
   /dev/snd/controlC1:  steve  2577 F pulseaudio
  CurrentDesktop: Unity
  Date: Sun Aug 10 17:49:06 2014
  HibernationDevice: RESUME=UUID=374a0c1c-4ac2-456b-a67e-9ea54fe11fe6
  InstallationDate: Installed on 2013-12-28 (225 days ago)
  InstallationMedia: Ubuntu 13.10 Saucy Salamander - Release amd64 
(20131016.1)
  MachineType: Dell Inc. XPS 12-9Q33
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-32-generic 
root=UUID=58deb355-7a09-440b-ade2-69a84fd74460 ro ipv6.disable=1 quiet splash 
vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-3.13.0-32-generic N/A
   linux-backports-modules-3.13.0-32-generic  N/A
   linux-firmware 1.127.5
  SourcePackage: linux
  UpgradeStatus: Upgraded to trusty on 2014-07-06 (35 days ago)
  dmi.bios.date: 05/06/2013
  dmi.bios.vendor: Dell Inc.
  dmi.bios.version: A00
  dmi.board.name: XPS 12-9Q33
  dmi.board.vendor: Dell Inc.
  dmi.board.version: A00
  dmi.chassis.type: 8
  dmi.chassis.vendor: Dell Inc.
  dmi.chassis.version: Not Specified
  dmi.modalias: 
dmi:bvnDellInc.:bvrA00:bd05/06/2013:svnDellInc.:pnXPS12-9Q33:pvrA00:rvnDellInc.:rnXPS12-9Q33:rvrA00:cvnDellInc.:ct8:cvrNotSpecified:
  dmi.product.name: XPS 12-9Q33
  dmi.product.version: A00
  dmi.sys.vendor: Dell Inc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/unitylinux/+bug/1354975/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1465755] Re: linux: 3.19.0-22.22 -proposed tracker

2015-06-18 Thread John Johansen
** Changed in: kernel-sru-workflow/security-signoff
   Status: Confirmed = In Progress

** Changed in: kernel-sru-workflow/security-signoff
 Assignee: Canonical Security Team (canonical-security) = John Johansen 
(jjohansen)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1465755

Title:
  linux: 3.19.0-22.22 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Confirmed
Status in Kernel SRU Workflow package-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Confirmed
Status in Kernel SRU Workflow security-signoff series:
  In Progress
Status in Kernel SRU Workflow verification-testing series:
  In Progress
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Vivid:
  New

Bug description:
  This bug is for tracking the 3.19.0-22.22 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 16. June 2015 16:18 UTC
  kernel-stable-Prepare-package-end:Wednesday, 17. June 2015 02:02 UTC
  kernel-stable-Promote-to-proposed-start:Wednesday, 17. June 2015 02:02 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 18. June 2015 18:59 UTC
  kernel-stable-phase:Verification  Testing
  kernel-stable-phase-changed:Thursday, 18. June 2015 20:00 UTC
  kernel-stable-Verification-testing-start:Thursday, 18. June 2015 20:00 UTC
  kernel-stable-Certification-testing-start:Thursday, 18. June 2015 20:00 UTC
  kernel-stable-Security-signoff-start:Thursday, 18. June 2015 20:00 UTC
  proposed-announcement-sent:True
  kernel-stable-Regression-testing-start:Thursday, 18. June 2015 20:00 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1465755/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1445195] Re: [Hyper-V] Kernel patches for storvsc

2015-06-18 Thread Stephen A. Zarkos
We tested the Utopic kernel and it works fine now.  No crashes or issues
and performance is better.

Thanks!

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1445195

Title:
  [Hyper-V] Kernel patches for storvsc

Status in linux package in Ubuntu:
  Triaged
Status in linux source package in Precise:
  Triaged
Status in linux source package in Trusty:
  Triaged
Status in linux source package in Utopic:
  Triaged
Status in linux source package in Vivid:
  Fix Committed
Status in linux source package in Wily:
  Triaged

Bug description:
  Storage driver performance updates for vivid

  K. Y. Srinivasan (7):
scsi: storvsc: Increase the ring buffer size
scsi: storvsc: Size the queue depth based on the ringbuffer size
scsi: storvsc: Always send on the selected outgoing channel
scsi: storvsc: Retrieve information about the capability of the target
scsi: storvsc: Fix a bug in copy_from_bounce_buffer()
scsi: storvsc: Don't assume that the scatterlist is not chained
scsi: storvsc: Set the tablesize based on the information given by the host

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1445195/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1463445] Re: CVE-2015-4003

2015-06-18 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.19.0-22.22

---
linux (3.19.0-22.22) vivid; urgency=low

  [ Brad Figg ]

  * Release Tracking Bug
- LP: #1465755

  [ Tai Nguyen ]

  * SAUCE: power: reset: Add syscon reboot device node for APM X-Gene
platform
- LP: #1463211

  [ Upstream Kernel Changes ]

  * Revert dm crypt: fix deadlock when async crypto algorithm returns
-EBUSY
- LP: #1465696
  * Bluetooth: ath3k: Add a new ID 0cf3:e006 to ath3k list
- LP: #1459934
  * cdc-acm: prevent infinite loop when parsing CDC headers.
- LP: #1460657
  * (upstream) libata: Blacklist queued TRIM on all Samsung 800-series
- LP: #1338706, #1449005
  * powerpc/powernv: Check image loaded or not before calling flash
- LP: #1461553
  * ahci: avoton port-disable reset-quirk
- LP: #1458617
  * Bluetooth: btusb: support public address configuration for ath3012
- LP: #1459937
  * Bluetooth: btusb: Add setup callback for chip init on USB
- LP: #1459937
  * Bluetooth: btusb: Add support for QCA ROME chipset family
- LP: #1459937
  * Bluetooth: btusb: Fix incorrect type in qca_device_info
- LP: #1459937
  * Bluetooth: btusb: Fix minor whitespace issue in QCA ROME device entries
- LP: #1459937
  * Bluetooth: btusb: Add support for 0cf3:e007
- LP: #1459937
  * storvsc: Set the SRB flags correctly when no data transfer is needed
- LP: #1439780
  * vfs: read file_handle only once in handle_to_path
- LP: #1416503
- CVE-2015-1420
  * ozwpan: Use unsigned ints to prevent heap overflow
- LP: #1463442
- CVE-2015-4001
  * ozwpan: divide-by-zero leading to panic
- LP: #1463445
- CVE-2015-4003
  * ozwpan: Use proper check to prevent heap overflow
- LP: #1463444
- CVE-2015-4002
  * ozwpan: unchecked signed subtraction leads to DoS
- LP: #1463444
- CVE-2015-4002
  * enclosure: fix WARN_ON removing an adapter in multi-path devices
- LP: #1415178
  * ASoC: tfa9879: Fix return value check in tfa9879_i2c_probe()
- LP: #1465696
  * ASoC: samsung: s3c24xx-i2s: Fix return value check in
s3c24xx_iis_dev_probe()
- LP: #1465696
  * ASoC: dapm: Enable autodisable on SOC_DAPM_SINGLE_TLV_AUTODISABLE
- LP: #1465696
  * ASoC: rt5677: add register patch for PLL
- LP: #1465696
  * btrfs: unlock i_mutex after attempting to delete subvolume during send
- LP: #1465696
  * ALSA: hda - Fix mute-LED fixed mode
- LP: #1465696
  * ALSA: hda - Add mute-LED mode control to Thinkpad
- LP: #1465696
  * arm64: dma-mapping: always clear allocated buffers
- LP: #1465696
  * ALSA: emu10k1: Fix card shortname string buffer overflow
- LP: #1465696
  * ALSA: emux: Fix mutex deadlock at unloading
- LP: #1465696
  * drm/radeon: Use drm_calloc_ab for CS relocs
- LP: #1465696
  * drm/radeon: adjust pll when audio is not enabled
- LP: #1465696
  * drm/radeon: add SI DPM quirk for Sapphire R9 270 Dual-X 2G GDDR5
- LP: #1465696
  * drm/radeon: fix lockup when BOs aren't part of the VM on release
- LP: #1465696
  * drm/radeon: reset BOs address after clearing it.
- LP: #1465696
  * drm/radeon: check new address before removing old one
- LP: #1465696
  * SCSI: add 1024 max sectors black list flag
- LP: #1465696
  * 3w-sas: fix command completion race
- LP: #1465696
  * 3w-: fix command completion race
- LP: #1465696
  * 3w-9xxx: fix command completion race
- LP: #1465696
  * uas: Allow uas_use_uas_driver to return usb-storage flags
- LP: #1465696
  * uas: Add US_FL_MAX_SECTORS_240 flag
- LP: #1465696
  * uas: Set max_sectors_240 quirk for ASM1053 devices
- LP: #1465696
  * usb: chipidea: otg: remove mutex unlock and lock while stop and start
role
- LP: #1465696
  * serial: xilinx: Use platform_get_irq to get irq description structure
- LP: #1465696
  * serial: of-serial: Remove device_type = serial registration
- LP: #1465696
  * tty/serial: at91: maxburst was missing for dma transfers
- LP: #1465696
  * ALSA: emux: Fix mutex deadlock in OSS emulation
- LP: #1465696
  * ACPI / SBS: Enable battery manager when present
- LP: #1465696
  * ALSA: emu10k1: Emu10k2 32 bit DMA mode
- LP: #1465696
  * ASoC: rt5677: fixed wrong DMIC ref clock
- LP: #1465696
  * rbd: end I/O the entire obj_request on error
- LP: #1465696
  * ext4: fix data corruption caused by unwritten and delayed extents
- LP: #1465696
  * ext4: move check under lock scope to close a race.
- LP: #1465696
  * powerpc/pseries: Correct cpu affinity for dlpar added cpus
- LP: #1465696
  * powerpc/powernv: Restore non-volatile CRs after nap
- LP: #1465696
  * efivarfs: Ensure VariableName is NUL-terminated
- LP: #1465696
  * x86/efi: Store upper bits of command line buffer address in
ext_cmd_line_ptr
- LP: #1465696
  * blk-mq: fix race between timeout and CPU hotplug
- LP: #1465696
  * blk-mq: fix CPU hotplug handling
- LP: #1465696
  * 

[Kernel-packages] [Bug 1465755] Re: linux: 3.19.0-22.22 -proposed tracker

2015-06-18 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.19.0-22.22

---
linux (3.19.0-22.22) vivid; urgency=low

  [ Brad Figg ]

  * Release Tracking Bug
- LP: #1465755

  [ Tai Nguyen ]

  * SAUCE: power: reset: Add syscon reboot device node for APM X-Gene
platform
- LP: #1463211

  [ Upstream Kernel Changes ]

  * Revert dm crypt: fix deadlock when async crypto algorithm returns
-EBUSY
- LP: #1465696
  * Bluetooth: ath3k: Add a new ID 0cf3:e006 to ath3k list
- LP: #1459934
  * cdc-acm: prevent infinite loop when parsing CDC headers.
- LP: #1460657
  * (upstream) libata: Blacklist queued TRIM on all Samsung 800-series
- LP: #1338706, #1449005
  * powerpc/powernv: Check image loaded or not before calling flash
- LP: #1461553
  * ahci: avoton port-disable reset-quirk
- LP: #1458617
  * Bluetooth: btusb: support public address configuration for ath3012
- LP: #1459937
  * Bluetooth: btusb: Add setup callback for chip init on USB
- LP: #1459937
  * Bluetooth: btusb: Add support for QCA ROME chipset family
- LP: #1459937
  * Bluetooth: btusb: Fix incorrect type in qca_device_info
- LP: #1459937
  * Bluetooth: btusb: Fix minor whitespace issue in QCA ROME device entries
- LP: #1459937
  * Bluetooth: btusb: Add support for 0cf3:e007
- LP: #1459937
  * storvsc: Set the SRB flags correctly when no data transfer is needed
- LP: #1439780
  * vfs: read file_handle only once in handle_to_path
- LP: #1416503
- CVE-2015-1420
  * ozwpan: Use unsigned ints to prevent heap overflow
- LP: #1463442
- CVE-2015-4001
  * ozwpan: divide-by-zero leading to panic
- LP: #1463445
- CVE-2015-4003
  * ozwpan: Use proper check to prevent heap overflow
- LP: #1463444
- CVE-2015-4002
  * ozwpan: unchecked signed subtraction leads to DoS
- LP: #1463444
- CVE-2015-4002
  * enclosure: fix WARN_ON removing an adapter in multi-path devices
- LP: #1415178
  * ASoC: tfa9879: Fix return value check in tfa9879_i2c_probe()
- LP: #1465696
  * ASoC: samsung: s3c24xx-i2s: Fix return value check in
s3c24xx_iis_dev_probe()
- LP: #1465696
  * ASoC: dapm: Enable autodisable on SOC_DAPM_SINGLE_TLV_AUTODISABLE
- LP: #1465696
  * ASoC: rt5677: add register patch for PLL
- LP: #1465696
  * btrfs: unlock i_mutex after attempting to delete subvolume during send
- LP: #1465696
  * ALSA: hda - Fix mute-LED fixed mode
- LP: #1465696
  * ALSA: hda - Add mute-LED mode control to Thinkpad
- LP: #1465696
  * arm64: dma-mapping: always clear allocated buffers
- LP: #1465696
  * ALSA: emu10k1: Fix card shortname string buffer overflow
- LP: #1465696
  * ALSA: emux: Fix mutex deadlock at unloading
- LP: #1465696
  * drm/radeon: Use drm_calloc_ab for CS relocs
- LP: #1465696
  * drm/radeon: adjust pll when audio is not enabled
- LP: #1465696
  * drm/radeon: add SI DPM quirk for Sapphire R9 270 Dual-X 2G GDDR5
- LP: #1465696
  * drm/radeon: fix lockup when BOs aren't part of the VM on release
- LP: #1465696
  * drm/radeon: reset BOs address after clearing it.
- LP: #1465696
  * drm/radeon: check new address before removing old one
- LP: #1465696
  * SCSI: add 1024 max sectors black list flag
- LP: #1465696
  * 3w-sas: fix command completion race
- LP: #1465696
  * 3w-: fix command completion race
- LP: #1465696
  * 3w-9xxx: fix command completion race
- LP: #1465696
  * uas: Allow uas_use_uas_driver to return usb-storage flags
- LP: #1465696
  * uas: Add US_FL_MAX_SECTORS_240 flag
- LP: #1465696
  * uas: Set max_sectors_240 quirk for ASM1053 devices
- LP: #1465696
  * usb: chipidea: otg: remove mutex unlock and lock while stop and start
role
- LP: #1465696
  * serial: xilinx: Use platform_get_irq to get irq description structure
- LP: #1465696
  * serial: of-serial: Remove device_type = serial registration
- LP: #1465696
  * tty/serial: at91: maxburst was missing for dma transfers
- LP: #1465696
  * ALSA: emux: Fix mutex deadlock in OSS emulation
- LP: #1465696
  * ACPI / SBS: Enable battery manager when present
- LP: #1465696
  * ALSA: emu10k1: Emu10k2 32 bit DMA mode
- LP: #1465696
  * ASoC: rt5677: fixed wrong DMIC ref clock
- LP: #1465696
  * rbd: end I/O the entire obj_request on error
- LP: #1465696
  * ext4: fix data corruption caused by unwritten and delayed extents
- LP: #1465696
  * ext4: move check under lock scope to close a race.
- LP: #1465696
  * powerpc/pseries: Correct cpu affinity for dlpar added cpus
- LP: #1465696
  * powerpc/powernv: Restore non-volatile CRs after nap
- LP: #1465696
  * efivarfs: Ensure VariableName is NUL-terminated
- LP: #1465696
  * x86/efi: Store upper bits of command line buffer address in
ext_cmd_line_ptr
- LP: #1465696
  * blk-mq: fix race between timeout and CPU hotplug
- LP: #1465696
  * blk-mq: fix CPU hotplug handling
- LP: #1465696
  * 

[Kernel-packages] [Bug 1465696] Re: Vivid update to 3.19.8-ckt1 stable release

2015-06-18 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.19.0-22.22

---
linux (3.19.0-22.22) vivid; urgency=low

  [ Brad Figg ]

  * Release Tracking Bug
- LP: #1465755

  [ Tai Nguyen ]

  * SAUCE: power: reset: Add syscon reboot device node for APM X-Gene
platform
- LP: #1463211

  [ Upstream Kernel Changes ]

  * Revert dm crypt: fix deadlock when async crypto algorithm returns
-EBUSY
- LP: #1465696
  * Bluetooth: ath3k: Add a new ID 0cf3:e006 to ath3k list
- LP: #1459934
  * cdc-acm: prevent infinite loop when parsing CDC headers.
- LP: #1460657
  * (upstream) libata: Blacklist queued TRIM on all Samsung 800-series
- LP: #1338706, #1449005
  * powerpc/powernv: Check image loaded or not before calling flash
- LP: #1461553
  * ahci: avoton port-disable reset-quirk
- LP: #1458617
  * Bluetooth: btusb: support public address configuration for ath3012
- LP: #1459937
  * Bluetooth: btusb: Add setup callback for chip init on USB
- LP: #1459937
  * Bluetooth: btusb: Add support for QCA ROME chipset family
- LP: #1459937
  * Bluetooth: btusb: Fix incorrect type in qca_device_info
- LP: #1459937
  * Bluetooth: btusb: Fix minor whitespace issue in QCA ROME device entries
- LP: #1459937
  * Bluetooth: btusb: Add support for 0cf3:e007
- LP: #1459937
  * storvsc: Set the SRB flags correctly when no data transfer is needed
- LP: #1439780
  * vfs: read file_handle only once in handle_to_path
- LP: #1416503
- CVE-2015-1420
  * ozwpan: Use unsigned ints to prevent heap overflow
- LP: #1463442
- CVE-2015-4001
  * ozwpan: divide-by-zero leading to panic
- LP: #1463445
- CVE-2015-4003
  * ozwpan: Use proper check to prevent heap overflow
- LP: #1463444
- CVE-2015-4002
  * ozwpan: unchecked signed subtraction leads to DoS
- LP: #1463444
- CVE-2015-4002
  * enclosure: fix WARN_ON removing an adapter in multi-path devices
- LP: #1415178
  * ASoC: tfa9879: Fix return value check in tfa9879_i2c_probe()
- LP: #1465696
  * ASoC: samsung: s3c24xx-i2s: Fix return value check in
s3c24xx_iis_dev_probe()
- LP: #1465696
  * ASoC: dapm: Enable autodisable on SOC_DAPM_SINGLE_TLV_AUTODISABLE
- LP: #1465696
  * ASoC: rt5677: add register patch for PLL
- LP: #1465696
  * btrfs: unlock i_mutex after attempting to delete subvolume during send
- LP: #1465696
  * ALSA: hda - Fix mute-LED fixed mode
- LP: #1465696
  * ALSA: hda - Add mute-LED mode control to Thinkpad
- LP: #1465696
  * arm64: dma-mapping: always clear allocated buffers
- LP: #1465696
  * ALSA: emu10k1: Fix card shortname string buffer overflow
- LP: #1465696
  * ALSA: emux: Fix mutex deadlock at unloading
- LP: #1465696
  * drm/radeon: Use drm_calloc_ab for CS relocs
- LP: #1465696
  * drm/radeon: adjust pll when audio is not enabled
- LP: #1465696
  * drm/radeon: add SI DPM quirk for Sapphire R9 270 Dual-X 2G GDDR5
- LP: #1465696
  * drm/radeon: fix lockup when BOs aren't part of the VM on release
- LP: #1465696
  * drm/radeon: reset BOs address after clearing it.
- LP: #1465696
  * drm/radeon: check new address before removing old one
- LP: #1465696
  * SCSI: add 1024 max sectors black list flag
- LP: #1465696
  * 3w-sas: fix command completion race
- LP: #1465696
  * 3w-: fix command completion race
- LP: #1465696
  * 3w-9xxx: fix command completion race
- LP: #1465696
  * uas: Allow uas_use_uas_driver to return usb-storage flags
- LP: #1465696
  * uas: Add US_FL_MAX_SECTORS_240 flag
- LP: #1465696
  * uas: Set max_sectors_240 quirk for ASM1053 devices
- LP: #1465696
  * usb: chipidea: otg: remove mutex unlock and lock while stop and start
role
- LP: #1465696
  * serial: xilinx: Use platform_get_irq to get irq description structure
- LP: #1465696
  * serial: of-serial: Remove device_type = serial registration
- LP: #1465696
  * tty/serial: at91: maxburst was missing for dma transfers
- LP: #1465696
  * ALSA: emux: Fix mutex deadlock in OSS emulation
- LP: #1465696
  * ACPI / SBS: Enable battery manager when present
- LP: #1465696
  * ALSA: emu10k1: Emu10k2 32 bit DMA mode
- LP: #1465696
  * ASoC: rt5677: fixed wrong DMIC ref clock
- LP: #1465696
  * rbd: end I/O the entire obj_request on error
- LP: #1465696
  * ext4: fix data corruption caused by unwritten and delayed extents
- LP: #1465696
  * ext4: move check under lock scope to close a race.
- LP: #1465696
  * powerpc/pseries: Correct cpu affinity for dlpar added cpus
- LP: #1465696
  * powerpc/powernv: Restore non-volatile CRs after nap
- LP: #1465696
  * efivarfs: Ensure VariableName is NUL-terminated
- LP: #1465696
  * x86/efi: Store upper bits of command line buffer address in
ext_cmd_line_ptr
- LP: #1465696
  * blk-mq: fix race between timeout and CPU hotplug
- LP: #1465696
  * blk-mq: fix CPU hotplug handling
- LP: #1465696
  * 

[Kernel-packages] [Bug 1425576] Re: Occasional crash in APM xgene enet driver on kernels prior to v3.19

2015-06-18 Thread Ming Lei
Finally I figured out one approach to reproduce it quickly, see the
attachment log.


** Attachment added: crash log in trusty
   
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1425576/+attachment/4416913/+files/dmesg-trusty.log

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1425576

Title:
  Occasional crash in APM xgene enet driver on kernels prior to v3.19

Status in linux package in Ubuntu:
  Triaged
Status in linux source package in Trusty:
  In Progress
Status in linux source package in Utopic:
  In Progress

Bug description:
  [Impact]
  System panics every few hours under constant network load

  [Test Case]
  On the X-Gene system, start an iperf server:
$ iperf -s
  Connect to it from another system (1Gbps is sufficient)
$ iperf -t 10 -c xgene host

  On failure, you'll get a panic within several hours.

  [Regression Risk]
  The proposed patch only touches the impacted driver. It is adding a memory 
barrier - albeit a lightweight one - so there is the risk of a performance 
degradation. Indeed, when measured using a 60s iperf run, I do see a 
performance drop, but by  0.5%.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1425576/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1425576] Re: Occasional crash in APM xgene enet driver on kernels prior to v3.19

2015-06-18 Thread Ming Lei
** Attachment added: crash log in utopic
   
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1425576/+attachment/4416914/+files/dmesg-utopic.log

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1425576

Title:
  Occasional crash in APM xgene enet driver on kernels prior to v3.19

Status in linux package in Ubuntu:
  Triaged
Status in linux source package in Trusty:
  In Progress
Status in linux source package in Utopic:
  In Progress

Bug description:
  [Impact]
  System panics every few hours under constant network load

  [Test Case]
  On the X-Gene system, start an iperf server:
$ iperf -s
  Connect to it from another system (1Gbps is sufficient)
$ iperf -t 10 -c xgene host

  On failure, you'll get a panic within several hours.

  [Regression Risk]
  The proposed patch only touches the impacted driver. It is adding a memory 
barrier - albeit a lightweight one - so there is the risk of a performance 
degradation. Indeed, when measured using a 60s iperf run, I do see a 
performance drop, but by  0.5%.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1425576/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


  1   2   >