[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#964153: marked as done (Problem connecting wireless in new version Kernel)



Your message dated Fri, 24 Jul 2020 19:32:08 +0000
with message-id <E1jz3QO-000GCL-37@fasolo.debian.org>
and subject line Bug#964480: fixed in linux 4.19.132-1
has caused the Debian Bug report #964480,
regarding Problem connecting wireless in new version Kernel
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
964480: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=964480
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: linux
Version: 5.7.6-1
Severity: important

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Hi,

After upgrading the kernel to 5.7, my wireless card that I use via usb does not load the module, neither the owner nor the open source firmware, which is the ath9k firmware of model AR9271 and I am not aware if the problem occurs for the others cards, but at the moment I'm keeping the version 5.6. Aware that the firmware is not a driver, the downgrade solves the problem and this is a regression and I cannot report where it comes from. I checked the dmesg and the log showed a failure to load the card module. And that only happens in the last version released today in testing. Can I report this problem as a regression.

Greetings,

Leandro Cunha 

-----BEGIN PGP SIGNATURE-----
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=Hq5P
-----END PGP SIGNATURE-----


--- End Message ---
--- Begin Message ---
Source: linux
Source-Version: 4.19.132-1
Done: Salvatore Bonaccorso <carnil@debian.org>

We believe that the bug you reported is fixed in the latest version of
linux, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 964480@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Salvatore Bonaccorso <carnil@debian.org> (supplier of updated linux package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Fri, 24 Jul 2020 20:46:18 +0200
Source: linux
Architecture: source
Version: 4.19.132-1
Distribution: buster
Urgency: medium
Maintainer: Debian Kernel Team <debian-kernel@lists.debian.org>
Changed-By: Salvatore Bonaccorso <carnil@debian.org>
Closes: 964153 964480 965365
Changes:
 linux (4.19.132-1) buster; urgency=medium
 .
   * New upstream stable update:
     https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.132
     - btrfs: fix a block group ref counter leak after failure to remove block
       group
     - mm: fix swap cache node allocation mask
     - [x86] EDAC/amd64: Read back the scrub rate PCI register on F15h
     - usbnet: smsc95xx: Fix use-after-free after removal
     - mm/slub.c: fix corrupted freechain in deactivate_slab()
     - mm/slub: fix stack overruns with SLUB_STATS
     - [s390x] debug: avoid kernel warning on too large number of pages
     - nvme-multipath: set bdi capabilities once
     - nvme-multipath: fix deadlock between ana_work and scan_work
     - crypto: af_alg - fix use-after-free in af_alg_accept() due to
       bh_lock_sock()
     - [arm64] drm/msm/dpu: fix error return code in dpu_encoder_init
     - cxgb4: use unaligned conversion for fetching timestamp
     - cxgb4: parse TC-U32 key values and masks natively
     - cxgb4: use correct type for all-mask IP address comparison
     - cxgb4: fix SGE queue dump destination buffer context
     - [x86] hwmon: (acpi_power_meter) Fix potential memory leak in
       acpi_power_meter_add()
     - [arm64,armhf] drm: sun4i: hdmi: Remove extra HPD polling
     - virtio-blk: free vblk-vqs in error path of virtblk_probe()
     - SMB3: Honor 'posix' flag for multiuser mounts
     - nvme: fix a crash in nvme_mpath_add_disk
     - i2c: algo-pca: Add 0x78 as SCL stuck low status for PCA9665
     - Revert "ALSA: usb-audio: Improve frames size computation"
     - SMB3: Honor 'seal' flag for multiuser mounts
     - SMB3: Honor persistent/resilient handle flags for multiuser mounts
     - SMB3: Honor lease disabling for multiuser mounts
     - cifs: Fix the target file was deleted when rename failed.
     - [mips*] Add missing EHB in mtc0 -> mfc0 sequence for DSPen
     - [arm64,armhf] irqchip/gic: Atomically update affinity
     - dm zoned: assign max_io_len correctly
     - efi: Make it possible to disable efivar_ssdt entirely
 .
   [ Salvatore Bonaccorso ]
   * [rt] Update to 4.19.132-rt59
   * Revert "ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb"
     (Closes: #964153, #964480)
   * efi: Restrict efivar_ssdt_load when the kernel is locked down
     (CVE-2019-20908)
   * certs: Rotate to use the Debian Secure Boot Signer 2020 certificate
   * e1000e: Add support for Comet Lake (Closes: #965365)
Checksums-Sha1:
 a656fbd9ddbb0c69b21cefcb4eac3bab270a3e24 191615 linux_4.19.132-1.dsc
 b390a044abfbe60032473fc3edd7d3992d565933 107498852 linux_4.19.132.orig.tar.xz
 0ed161e73377aee4cfe52d3e6b5fef30a94e9162 3308396 linux_4.19.132-1.debian.tar.xz
 22a3e8e5299bf2c03c8738e4eafd4793aab72550 6551 linux_4.19.132-1_source.buildinfo
Checksums-Sha256:
 3431e9f27ad196e3cd3b0908b5ac5008ed2522118c4f51fd8f8a8c1240819e28 191615 linux_4.19.132-1.dsc
 3e9e811d44d190dcd8af04e86ad4c00032a5b74cafece51cfd12581648e4e1db 107498852 linux_4.19.132.orig.tar.xz
 c592597164270d5cfbf7efa12a04d8246ba26e2d9228bb8ae030ef88b147fe40 3308396 linux_4.19.132-1.debian.tar.xz
 0e6241b34e74a0a353b3d8d34d5608799e7a0f9a3bc72ea13661cdc34f82e356 6551 linux_4.19.132-1_source.buildinfo
Files:
 63adc0fb5dd68fb0a08c554c779033bc 191615 kernel optional linux_4.19.132-1.dsc
 0b1c490f4cf63bf15452e54fd56d44f8 107498852 kernel optional linux_4.19.132.orig.tar.xz
 a4719f638b28e0a069076f5d9afce4a0 3308396 kernel optional linux_4.19.132-1.debian.tar.xz
 f7da3e46b61c11808b35c60ef89e8258 6551 kernel optional linux_4.19.132-1_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=Xv6t
-----END PGP SIGNATURE-----

--- End Message ---

Reply to: