This turned out to be the result of a faulty cable connection.
** Changed in: linux (Ubuntu)
Status: Confirmed = Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1199366
Public bug reported:
I recently plugged a few SD cards into the reader on a new Mac Book Pro
retina late 2013 (11,1) and experienced a serious slowness in loading
its contents in nautilus. When I ran dmesg on a console I saw there had
been a bunch of storage errors from scsi and the filesystem.
Public bug reported:
Earlier in the trusty development, suspension worked fine, but after a
recent update the laptop will no longer go to sleep when the lid is
closed, instead the screen blanks and wifi is reset.
ProblemType: Bug
DistroRelease: Ubuntu 14.04
Package: linux-image-3.13.0-17-generic
Public bug reported:
This is the first time I have seen this resume failure and the laptop
has been able to sleep/resume many times in the past.
ProblemType: KernelOops
DistroRelease: Ubuntu 14.04
Package: linux-image-3.13.0-18-generic 3.13.0-18.38
ProcVersionSignature: Ubuntu
Still occurs in trusty.
[62686.310978] [ cut here ]
[62686.311009] WARNING: CPU: 1 PID: 550 at
/build/buildd/linux-3.13.0/net/wireless/sme.c:797 cfg80211_roamed+0x89/0x90
[cfg80211]()
[62686.311011] Modules linked in: 8021q garp mrp veth ipt_MASQUERADE
iptable_nat
And this trace as well:
[62686.407367] [ cut here ]
[62686.407438] WARNING: CPU: 1 PID: 550 at
/build/buildd/linux-3.13.0/net/wireless/sme.c:797 cfg80211_roamed+0x89/0x90
[cfg80211]()
[62686.407442] Modules linked in: 8021q garp mrp veth ipt_MASQUERADE
iptable_nat
This occurs in Ubuntu 13.10 amd64 on an HP Pavilion DM1Z (AMD APU E-350
unit) and the bccmd psset -r -s implementation 0x028c 0x0001
workaround does work.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to bluez in Ubuntu.
Public bug reported:
Closed lid, walked away, came back to find laptop did not suspend or
woke back up and was frozen.
ProblemType: KernelOops
DistroRelease: Ubuntu 14.04
Package: linux-image-3.13.0-19-generic 3.13.0-19.40
ProcVersionSignature: Ubuntu 3.13.0-19.40-generic 3.13.6
Uname: Linux
The laptop did not die nor did it get critically low.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1297955
Title:
[Apple Inc. MacBookPro11,1] suspend/resume failure [non-free: wl]
The battery did not die and I have hit this bug a few time since (lp
#1297955).
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1294718
Title:
[Apple Inc. MacBookPro11,1] suspend/resume
I found the issue was with a workaround script for network-manager.
There are definitely some suspension issues with the latest kernels on
this laptop however, but those have been filed as separate bugs.
** Changed in: linux (Ubuntu)
Status: Incomplete = Invalid
--
You received this bug
I was able to reproduce this bug while running kernel version
3.14.0-031400rc8.
** Tags added: kernel-bug-exists-upstream
** Changed in: linux (Ubuntu)
Status: Incomplete = Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed
Public bug reported:
The crash dialog popped up after a reboot, as to what was going on when
this occurred, I could not say.
ProblemType: KernelOops
DistroRelease: Ubuntu 14.04
Package: linux-image-3.13.0-8-generic 3.13.0-8.28
ProcVersionSignature: Ubuntu 3.13.0-8.28-generic 3.13.2
Uname: Linux
Since I am not sure what I was doing that could have caused it, I do not
know of a way to reproduce it. Basically, I was installing software
after a fresh install of 14.04, completed that and rebooted the system.
When it came back up and I logged in the crash was there. The only thing
of note I
Public bug reported:
The value of the csr-mask of the SATA PHY clock DTS node has a
wrong value resulting a kernel panic as the clock/reset is not
proper for the PHY of the SATA host controller 1. This patch
fixes the correct csr-mask value of the SATA PHY clock DTS node
for the SATA Host
Public bug reported:
The link down issue in first attempt happens due to 2 H/W errata below:
1. Due to HW errata, during speed negotiation, sometimes controller
is not able to detect ALIGN at GEN3(6Gbps) within 54.6us results in
a timeout. This issue can be recovered by issuing a COMRESET again.
First 2 hunks of the patch applied cleanly, 3rd hunk needed to be
shifted down some lines.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1359501
Title:
ahci_xgene: Skip the PHY and
Public bug reported:
This patch implements the feature to skip the PHY and clock
initialization if it is already configured by the firmware.
** Affects: linux (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Kernel
Public bug reported:
Issue: CPU affinity is changed while irqbalance is running.
+ Problem explanation:
- Old code
+ Call xgene_msi_cascade function (CPU x)
+ raw_spin_lock(desc-lock); (CPU x)
+ Goto generic_handle_irq (CPU x)
** Changed in: linux (Ubuntu)
Status: Incomplete = Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1359489
Title:
Fix the csr-mask for APM X-Gene SoC AHCI SATA PHY clock
** Changed in: linux (Ubuntu)
Status: Incomplete = Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1359507
Title:
ahci_xgene: Fix the link down in first attempt for the
** Changed in: linux (Ubuntu)
Status: Incomplete = Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1359514
Title:
pci-xgene-msi: fixed deadlock in irq_set_affinity
[IMPACT]
The value of the csr-mask of the SATA PHY clock DTS node has a
wrong value resulting a kernel panic as the clock/reset is not
proper for the PHY of the SATA host controller 1. This patch
fixes the correct csr-mask value of the SATA PHY clock DTS node
for the SATA Host controller 1.
[TEST
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1359507
Title:
ahci_xgene: Fix the link down in first attempt for the APM X-Gene SoC
AHCI SATA host controller driver
Status in “linux”
** Patch added:
0001-UBUNTU-SAUCE-no-up-arm64-Fix-the-csr-mask-for-APM-X-.patch
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1359489/+attachment/4188500/+files/0001-UBUNTU-SAUCE-no-up-arm64-Fix-the-csr-mask-for-APM-X-.patch
--
You received this bug notification because you are a
** Changed in: linux (Ubuntu)
Status: Invalid = Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1359501
Title:
ahci_xgene: Skip the PHY and clock initialization if
** Patch added:
0002-UBUNTU-SAUCE-no-up-ahci_xgene-Skip-the-PHY-and-clock.patch
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1359501/+attachment/4188527/+files/0002-UBUNTU-SAUCE-no-up-ahci_xgene-Skip-the-PHY-and-clock.patch
--
You received this bug notification because you are a
[IMPACT]
Some disk types will never be seen after boot, while others can disappear after
a reboot.
This patch implements the feature to skip the PHY and clock
initialization if it is already configured by the firmware.
[TEST CASE]
Repeatedly reboot the system.
[Regression Potential]
Only
[IMPACT]
The link down issue in first attempt happens due to 2 H/W errata below:
1. Due to HW errata, during speed negotiation, sometimes controller
is not able to detect ALIGN at GEN3(6Gbps) within 54.6us results in
a timeout. This issue can be recovered by issuing a COMRESET again.
2. Due to
** Patch added:
0003-UBUNTU-SAUCE-no-up-ahci_xgene-Fix-the-link-down-in-f.patch
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1359507/+attachment/4188528/+files/0003-UBUNTU-SAUCE-no-up-ahci_xgene-Fix-the-link-down-in-f.patch
--
You received this bug notification because you are a
** Patch added:
0001-UBUNTU-SAUCE-no-up-pci-xgene-msi-fixed-deadlock-in-i.patch
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1359514/+attachment/4188555/+files/0001-UBUNTU-SAUCE-no-up-pci-xgene-msi-fixed-deadlock-in-i.patch
--
You received this bug notification because you are a
[IMPACT]
The CPU x doesn't have a chance to exit the xgene_msi_cascade function to
unlock desc-lock before Linux scheduce and call xgene_msi_set_affinity
(irqbalance is caller) in the same CPU x. In irq_set_affinity, call
raw_spin_lock_irqsave(desc-lock, flags) which cause deadlock to CPU x
** Description changed:
+ [IMPACT]
+ Some disk types will never be seen after boot, while others can disappear
after a reboot.
+
This patch implements the feature to skip the PHY and clock
initialization if it is already configured by the firmware.
+
+ [TEST CASE]
+ Repeatedly reboot the
** Description changed:
+ [IMPACT]
The value of the csr-mask of the SATA PHY clock DTS node has a
wrong value resulting a kernel panic as the clock/reset is not
proper for the PHY of the SATA host controller 1. This patch
fixes the correct csr-mask value of the SATA PHY clock DTS node
** Patch removed:
0001-UBUNTU-SAUCE-no-up-pci-xgene-msi-fixed-deadlock-in-i.patch
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1359514/+attachment/4188555/+files/0001-UBUNTU-SAUCE-no-up-pci-xgene-msi-fixed-deadlock-in-i.patch
** Patch added:
** Description changed:
+ [IMPACT]
The link down issue in first attempt happens due to 2 H/W errata below:
1. Due to HW errata, during speed negotiation, sometimes controller
is not able to detect ALIGN at GEN3(6Gbps) within 54.6us results in
a timeout. This issue can be recovered by
** Patch removed:
0001-UBUNTU-SAUCE-no-up-arm64-Fix-the-csr-mask-for-APM-X-.patch
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1359489/+attachment/4188500/+files/0001-UBUNTU-SAUCE-no-up-arm64-Fix-the-csr-mask-for-APM-X-.patch
** Patch added:
** Patch removed:
0002-UBUNTU-SAUCE-no-up-ahci_xgene-Skip-the-PHY-and-clock.patch
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1359501/+attachment/4188527/+files/0002-UBUNTU-SAUCE-no-up-ahci_xgene-Skip-the-PHY-and-clock.patch
** Patch added:
** Patch removed:
0003-UBUNTU-SAUCE-no-up-ahci_xgene-Fix-the-link-down-in-f.patch
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1359507/+attachment/4188528/+files/0003-UBUNTU-SAUCE-no-up-ahci_xgene-Fix-the-link-down-in-f.patch
** Patch added:
** Tags removed: verification-needed-trusty
** Tags added: verification-done-trusty
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1359507
Title:
ahci_xgene: Fix the link down in first
** Tags removed: verification-needed-trusty
** Tags added: verification-done-trusty
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1359501
Title:
ahci_xgene: Skip the PHY and clock
** Tags removed: verification-needed-trusty
** Tags added: verification-done-trusty
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1359514
Title:
pci-xgene-msi: fixed deadlock in
We have tested this on every available X-Gene platform we have access to
and not experienced any regressions, however we do not have the hardware
configuration that supports testing this specific fix.
** Tags removed: verification-needed-trusty
** Tags added: verification-done-trusty
--
You
) = Craig Magina (craig.magina)
** Tags removed: verification-needed
** Tags added: verification-done
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to crash in Ubuntu.
https://bugs.launchpad.net/bugs/1354349
Title:
The crash utility doesn't
This fix was put under heavy stress for an extended period of time (72+
hours) on mutliple nodes and the issue was not seen.
** Tags removed: verification-needed-trusty
** Tags added: verification-done-trusty
--
You received this bug notification because you are a member of Kernel
Packages,
Reproduced the bug with the current updates kernel, updated to the
proposed kernel and the bug was no longer reproducible.
** Tags removed: verification-needed-trusty
** Tags added: verification-done-trusty
--
You received this bug notification because you are a member of Kernel
Packages, which
Utopic kernel also tested in the same manner as the trusty kernel.
** Tags removed: verification-needed-utopic
** Tags added: verification-done-utopic
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
** Tags removed: verification-needed-utopic
** Tags added: verification-done-utopic
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1386261
Title:
xgene-pcie: Fix max payload size and
Public bug reported:
The initial report of the issue can be found here:
http://www.spinics.net/lists/arm-kernel/msg381811.html
** Affects: linux (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Kernel
Packages, which is
Excerpt from the report:
The exact same fixup code is being used for copy_to_user and
copy_from_user.
For the copy_from_user case we want to zero the rest of the kernel
destination buffer when we hit a pagefault reading from user space.
However, for the copy_to_user case we most definitely
** Description changed:
- The initial report of the issue can be found here:
+ [Impact]
+ Fixes an issue where the kernel hits unhandled pagefaults when copy_to_user
is called.
http://www.spinics.net/lists/arm-kernel/msg381811.html
+
+ [Test Case]
+ Put the system under memory pressure.
+
Upstream already root caused the issue, so logs are not needed.
** Changed in: linux (Ubuntu)
Status: Incomplete = Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1398596
Trusty fails due to the patches that were missed in the pull.
** Tags removed: verification-needed-trusty
** Tags added: verification-failed-trusty
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
Trusty fails due to the patches that were missed in the pull.
** Tags removed: verification-needed-trusty
** Tags added: verification-failed-trusty
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
** Tags removed: verification-needed-utopic
** Tags added: verification-done-utopic
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1381216
Title:
xgene-enet: add SGMII based 1GbE
** Tags removed: verification-needed-utopic
** Tags added: verification-done-utopic
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1381084
Title:
xgene-enet: add 10GbE support
Status
Public bug reported:
[Impact]
The copy_{to,from}_user implementations in the Ubuntu kernel are suboptimal.
Optimized implementations have been submitted upstream and have shown a
significant improvement in network performance.
[Test Case]
Generate traffic from one node to another using iperf.
Here is a link to the original bug and fix that has since been reverted.
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1358949
This bug is for the new patch to fix the same issue.
** Changed in: linux (Ubuntu)
Status: Incomplete = Opinion
** Changed in: linux (Ubuntu)
Public bug reported:
[Impact]
Fixes an issue where after the system halts the cpu starts to experience soft
lockups.
[Test Case]
The most reliable means of reproducing this issue is to 'sudo poweroff' the
system from the console.
[Regression Potential]
These patches are upstream patches that
Here is an output from the console of a system experiencing this issue.
This bug occurs after executing sudo poweroff and sudo shutdown -h now This
issue was found on trusty-updates and trusty-
proposed. It wasn't seen in the released version.
$ uname -a
Linux am5 3.13.0-37-generic #64-Ubuntu
** Tags removed: verification-needed-trusty
** Tags added: verification-done-trusty
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1404335
Title:
xgene: BUG: soft lockup - CPU#0 stuck
Public bug reported:
Here is the failure:
In file included from
/home/ubuntu/trusty-xgene/drivers/staging/lustre/include/linux/libcfs/libcfs.h:159:0,
from
/home/ubuntu/trusty-xgene/drivers/staging/lustre/lustre/llite/../include/lustre_lib.h:49,
from
** Changed in: santacruz
Assignee: (unassigned) = Craig Magina (craig.magina)
** Changed in: linux (Ubuntu Vivid)
Assignee: (unassigned) = Craig Magina (craig.magina)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux
This is a build failure and the build failure is included in the initial
description.
** Changed in: linux (Ubuntu)
Status: Incomplete = Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
** Tags added: hs-arm64
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1404335
Title:
xgene: BUG: soft lockup - CPU#0 stuck for 23s! [halt:2059] on poweroff
Status in linux package in
** Tags removed: verification-needed-trusty
** Tags added: verification-done-trusty
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1381084
Title:
xgene-enet: add 10GbE support
Status
** Tags removed: verification-needed-trusty verification-needed-utopic
** Tags added: verification-done-trusty verification-done-utopic
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
I have not been able to find a reliable way to reproduce this issue, but
the fix did not cause any issues in my testing.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1425576
Title:
The upstream has merged a patch set into the iommu topic tree that
solves this issue for all platforms. I am currently testing that patch
set with the vivid 3.19 kernel.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
Here is the patch set that fixes this issue:
https://git.kernel.org/cgit/linux/kernel/git/helgaas/pci.git/log/?h=pci/iommushowmsg=1
I have tested them and they work when applied to the 3.19.0-10.10
kernel. The set of patches are from HEAD to pci/iommu.
--
You received this bug notification
Public bug reported:
This patch is an optimization and has yet to be accepted upstream, but
has been submitted and is present in our trusty and utopic kernels.
** Affects: linux (Ubuntu)
Importance: Undecided
Status: New
** Tags: hs-arm64
** Tags added: hs-arm64
--
You
I just looked at your packages and noticed they are for amd64, this
issue is an xgene (arm64) platform bug. If you give me the a point to
the git tree I can build the packages myself and test. Thanks.
--
You received this bug notification because you are a member of Kernel
Packages, which is
** Summary changed:
- kernel 3.13.0-46.75 fails to boot on arm64
+ kernel 3.13.0-46.75 and 3.16.0-31.41 fails to boot on arm64
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1426043
One final issue is the kernel version you used to test this fix contains
a bug that prevents it from booting on arm64 systems. The fix is in the
utopic-stable branch to be pulled into the next SRU cycle. The fix was
pushed into the latest trusty kernel for a one-off release,
3.13.0-46.76. You can
Public bug reported:
This crash was submitted upstream and a fix was already present, but it
didn't land until the 3.19 kernel. This bug is to track getting that fix
into trusty and utopic.
Unable to handle kernel NULL pointer dereference at virtual address 00c0
pgd = ffc3e639a000
Here is a direct link to the upstream submission of the crash:
http://www.spinics.net/lists/arm-kernel/msg399023.html
The upstream commit that fixes it is:
commit ecf6ba83d76e0c78e89401750dc527008e14faa2
Author: Iyappan Subramanian isubramanian@xxx
Date: Thu Jan 29 14:38:23 2015 -0800
Public bug reported:
The failure is:
BUG: failure at
/build/buildd/linux-3.13.0/arch/arm64/include/asm/arch_timer.h:143/arch_counter_get_cntpct()!
which comes from this code:
static inline u64 arch_counter_get_cntpct(void)
{
/*
* AArch64 kernel and user space mandate the use
** Changed in: linux (Ubuntu)
Status: Confirmed = In Progress
** Changed in: linux (Ubuntu)
Assignee: (unassigned) = Craig Magina (craig.magina)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https
This bug is to forward port a driver from trusty/utopic to vivid.
** Changed in: linux (Ubuntu)
Assignee: (unassigned) = Craig Magina (craig.magina)
** Changed in: linux (Ubuntu)
Status: Incomplete = Confirmed
--
You received this bug notification because you are a member of Kernel
Public bug reported:
[Impact]
Without the MSI-X driver, network performance on the HP Proliant m400 will be
degraded in vivid from what can be achieved in trusty and utopic.
[Test Case]
All commands work on the HP Proliant m400:
'lspci -v' should show 'MSI-X: Enable+' under the Mellanox entry.
Public bug reported:
Graceful shutdown from the ILO-CM does not work on Ubuntu 15.04 due to
commit 1972c97db5b, but is fixed by commit b90f8f22ed8.
** Affects: linux (Ubuntu)
Importance: Undecided
Assignee: Craig Magina (craig.magina)
Status: In Progress
** Changed in: linux
** Description changed:
- Graceful shutdown from the ILO-CM does not work on Ubuntu 15.04 due to
- commit 1972c97db5b, but is fixed by commit b90f8f22ed8.
+ [Impact]
+ Graceful shutdown from the ILO-CM does not work on Ubuntu 15.04 due to commit
1972c97db5b, but is fixed by commit b90f8f22ed8.
+
in-line with the way their firmware works.
** Affects: linux (Ubuntu)
Importance: Undecided
Assignee: Craig Magina (craig.magina)
Status: In Progress
** Changed in: linux (Ubuntu)
Status: New = In Progress
** Changed in: linux (Ubuntu)
Assignee: (unassigned
** Changed in: linux (Ubuntu)
Status: In Progress = Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1455105
Title:
[SRU vivid] re-enable GPIO_DWAPB for arm64 to
** Changed in: debian-installer (Ubuntu Vivid)
Status: Confirmed = Fix Committed
** Changed in: linux (Ubuntu Vivid)
Status: Confirmed = Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
Verified with both a trusty and vivid base.
** Tags removed: verification-needed-vivid
** Tags added: verification-done-vivid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1455105
Verified with a trusty and vivid base.
** Tags removed: verification-needed-vivid
** Tags added: verification-done-vivid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1451593
Title:
** Tags removed: verification-verified-trusty
** Tags added: verification-done-trusty
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1455121
Title:
[SRU trusty] net/mlx4_core: Adjust
Tested this on an HP Proliant m400 and verified the issue was not seen.
** Tags removed: verification-needed-trusty
** Tags added: verification-verified-trusty
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
This patch set has been built on amd64 and arm64 to ensure no build
breakage. The arm64 kernel was tested on a Mustang board to verify it
worked properly and an HP Proliant m400 to ensure it did not cause
issues on an arm64 system that lacked the device.
--
You received this bug notification
Public bug reported:
[Impact]
APM's Mustang boards have a second SGMII based 1GbE interface that is currently
unsupported by Ubuntu.
[Test Case]
Verify that the previously non-working SGMII based 1GbE interface now works.
[Regression Risk]
Since the changes touch the driver that supports the
** Summary changed:
- [trusty SRU] xgene-enet: add SGMII based 1GbE support for the second port
+ [SRU] xgene-enet: add SGMII based 1GbE support for the second port
** Changed in: linux (Ubuntu)
Assignee: (unassigned) = Craig Magina (craig.magina)
** Changed in: linux (Ubuntu
ubuntu@am6:~$ uname -a
Linux am6 3.13.0-57-generic #95-Ubuntu SMP Fri Jun 19 09:31:00 UTC 2015 aarch64
aarch64 aarch64 GNU/Linux
ubuntu@am6:~$ sudo ethtool eth2
Settings for eth2:
Supported ports: [ MII ]
Supported link
The latest wily linux-image-4.1.0-3-generic kernel (Full version:
4.1.0-3.3) boots on the HP Proliant m400 without issue.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1474171
Title:
** Description changed:
- From trusty through to vivid there is a copy_to/from_user patch that
- improved performance on the m400. This patch was not pushed into wily's
- 4.2 kernel as a new one was nearing upstream acceptance. That patch has
- now landed in linux-next and needs to be backported
y's 4.2
kernel.
** Affects: linux (Ubuntu)
Importance: Undecided
Assignee: Craig Magina (craig.magina)
Status: In Progress
** Changed in: linux (Ubuntu)
Status: New => In Progress
** Changed in: linux (Ubuntu)
Assignee: (unassigned) => Craig Magina (cra
Public bug reported:
[Impact]
Currently USB is not enabled for arm64 platforms. The patches will enable USB
for arm64 and for APM's Mustang platform.
[Test Case]
Insert a USB device into an APM Mustang based platform.
[Regression Risk]
This patch set enables USB for all arm64 platforms, but
Public bug reported:
This upstream patch "arm64: errata: add module build workaround for
erratum #843419" breaks module loading on arm64 and was pulled into
trusty-proposed via stable release. The trusty master-next commit is:
f869de1cf9b57d28dbba9f15569f5ae2c54c8724. Wily saw this as well, since
The commit for this change, "arm64: errata: add module build workaround
for erratum #843419" causes the kernel to fail on arm64. This issue was
seen with wily's kernel as well and was worked around by disabling
CONFIG_ARM64_ERRATUM_843419 in the kernel config. See LP#1502946
Vivid deployment succeeded with no issues.
** Tags removed: verification-needed-vivid
** Tags added: verification-done-vivid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1499869
Title:
1 - 100 of 143 matches
Mail list logo