[Group.of.nepali.translators] [Bug 1878155] [NEW] Thunderbird fails to connect to server in FIPS mode

2020-05-12 Thread Dariusz Gadomski
Public bug reported:

[Impact]

 * Thunderbird may become useless after booting into FIPS mode - it
refuses to connect to server displaying the following message:

Unexpected response from the server

This document cannot be displayed unless you install the Personal
Security Manager (PSM). Download and install PSM and try again, or
contact your system administrator.

This seems to be a result of the fact that despite Thunderbird for
Ubuntu being with FIPS support disabled there's a piece of code that
ignores the build flag and checks for `/proc/sys/crypto/fips_enabled`
status anyway.

Looks like upstream fix [1] needs to be applied to Thunderbird source
under security/nss.

[Test Case]

 * Configure an email account in Thunderbird. I was able to reproduce it with a 
gmail account.
 * Install FIPS modules as described in [2].
 * Boot into FIPS mode.
 * Open Thunderbird.

[Regression Potential]

 * I can't identify regression potential - this is clearly a bug fixed
upstream by a simple fix.

[Other Info]
 
 * Related Firefox bug: https://bugs.launchpad.net/bugs/1843044
 * I was able to backport this fix and test it - the problem was gone. Xenial 
build is available in ppa:dgadomski/thunderbird.


[1] 
https://hg.mozilla.org/projects/nss/raw-rev/55ba54adfcaea2f984a999a511eec5047462eb57
[2] https://docs.ubuntu.com/security-certs/en/fips

** Affects: thunderbird (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: thunderbird (Ubuntu Xenial)
 Importance: Undecided
 Status: New

** Affects: thunderbird (Ubuntu Bionic)
 Importance: Undecided
 Status: New

** Also affects: thunderbird (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Also affects: thunderbird (Ubuntu Bionic)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1878155

Title:
  Thunderbird fails to connect to server in FIPS mode

Status in thunderbird package in Ubuntu:
  New
Status in thunderbird source package in Xenial:
  New
Status in thunderbird source package in Bionic:
  New

Bug description:
  [Impact]

   * Thunderbird may become useless after booting into FIPS mode - it
  refuses to connect to server displaying the following message:

  Unexpected response from the server

  This document cannot be displayed unless you install the Personal
  Security Manager (PSM). Download and install PSM and try again, or
  contact your system administrator.

  This seems to be a result of the fact that despite Thunderbird for
  Ubuntu being with FIPS support disabled there's a piece of code that
  ignores the build flag and checks for `/proc/sys/crypto/fips_enabled`
  status anyway.

  Looks like upstream fix [1] needs to be applied to Thunderbird source
  under security/nss.

  [Test Case]

   * Configure an email account in Thunderbird. I was able to reproduce it with 
a gmail account.
   * Install FIPS modules as described in [2].
   * Boot into FIPS mode.
   * Open Thunderbird.

  [Regression Potential]

   * I can't identify regression potential - this is clearly a bug fixed
  upstream by a simple fix.

  [Other Info]
   
   * Related Firefox bug: https://bugs.launchpad.net/bugs/1843044
   * I was able to backport this fix and test it - the problem was gone. Xenial 
build is available in ppa:dgadomski/thunderbird.

  
  [1] 
https://hg.mozilla.org/projects/nss/raw-rev/55ba54adfcaea2f984a999a511eec5047462eb57
  [2] https://docs.ubuntu.com/security-certs/en/fips

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/thunderbird/+bug/1878155/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1878155] Re: Thunderbird fails to connect to server in FIPS mode

2020-05-12 Thread Dariusz Gadomski
It is already included upstream starting from release 75.0b1.

** Also affects: thunderbird (Ubuntu Groovy)
   Importance: Undecided
   Status: New

** Also affects: thunderbird (Ubuntu Eoan)
   Importance: Undecided
   Status: New

** Also affects: thunderbird (Ubuntu Focal)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1878155

Title:
  Thunderbird fails to connect to server in FIPS mode

Status in thunderbird package in Ubuntu:
  New
Status in thunderbird source package in Xenial:
  New
Status in thunderbird source package in Bionic:
  New
Status in thunderbird source package in Eoan:
  New
Status in thunderbird source package in Focal:
  New
Status in thunderbird source package in Groovy:
  New

Bug description:
  [Impact]

   * Thunderbird may become useless after booting into FIPS mode - it
  refuses to connect to server displaying the following message:

  Unexpected response from the server

  This document cannot be displayed unless you install the Personal
  Security Manager (PSM). Download and install PSM and try again, or
  contact your system administrator.

  This seems to be a result of the fact that despite Thunderbird for
  Ubuntu being with FIPS support disabled there's a piece of code that
  ignores the build flag and checks for `/proc/sys/crypto/fips_enabled`
  status anyway.

  Looks like upstream fix [1] needs to be applied to Thunderbird source
  under security/nss.

  [Test Case]

   * Configure an email account in Thunderbird. I was able to reproduce it with 
a gmail account.
   * Install FIPS modules as described in [2].
   * Boot into FIPS mode.
   * Open Thunderbird.

  [Regression Potential]

   * I can't identify regression potential - this is clearly a bug fixed
  upstream by a simple fix.

  [Other Info]
   
   * Related Firefox bug: https://bugs.launchpad.net/bugs/1843044
   * I was able to backport this fix and test it - the problem was gone. Xenial 
build is available in ppa:dgadomski/thunderbird.

  
  [1] 
https://hg.mozilla.org/projects/nss/raw-rev/55ba54adfcaea2f984a999a511eec5047462eb57
  [2] https://docs.ubuntu.com/security-certs/en/fips

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/thunderbird/+bug/1878155/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1874795] Re: xenial/linux-cascade: 4.4.0-1018.20 -proposed tracker

2020-05-12 Thread Ubuntu Kernel Bot
** Changed in: kernel-sru-workflow/promote-signing-to-proposed
   Status: In Progress => Fix Committed

** Changed in: kernel-sru-workflow/verification-testing
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/promote-signing-to-proposed
   Status: Fix Committed => Fix Released

** Changed in: kernel-sru-workflow/verification-testing
   Status: Confirmed => In Progress

** Description changed:

  This bug will contain status and test results related to a kernel source
  (or snap) as stated in the title.
  
  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  
  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1874804
  packages:
main: linux-cascade
meta: linux-meta-cascade
signed: linux-signed-cascade
- phase: Promote to Proposed
- phase-changed: Monday, 11. May 2020 20:02 UTC
+ phase: Testing
+ phase-changed: Tuesday, 12. May 2020 09:56 UTC
+ proposed-announcement-sent: true
+ proposed-testing-requested: true
  reason:
-   promote-signing-to-proposed: Stalled -- review in progress
+   verification-testing: Ongoing -- testing in progress
  trackers:
xenial/linux-cascade/cascade-kernel: bug 1874794
  variant: debs
  versions:
main: 4.4.0-1018.20
meta: 4.4.0.1018.21
signed: 4.4.0-1018.20

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1874795

Title:
  xenial/linux-cascade: 4.4.0-1018.20 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Invalid
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-signing-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Invalid
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Invalid
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow verification-testing series:
  In Progress
Status in linux source package in Xenial:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1874804
  packages:
main: linux-cascade
meta: linux-meta-cascade
signed: linux-signed-cascade
  phase: Testing
  phase-changed: Tuesday, 12. May 2020 09:56 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason:
verification-testing: Ongoing -- testing in progress
  trackers:
xenial/linux-cascade/cascade-kernel: bug 1874794
  variant: debs
  versions:
main: 4.4.0-1018.20
meta: 4.4.0.1018.21
signed: 4.4.0-1018.20

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1874795/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1878207] [NEW] Xenial update: 4.4.222 upstream stable release

2020-05-12 Thread Ian
Public bug reported:


SRU Justification

Impact:
   The upstream process for stable tree updates is quite similar
   in scope to the Ubuntu SRU process, e.g., each patch has to
   demonstrably fix a bug, and each patch is vetted by upstream
   by originating either directly from a mainline/stable Linux tree or
   a minimally backported form of that patch. The following upstream
   stable patches should be included in the Ubuntu kernel:

   4.4.222 upstream stable release
   from git://git.kernel.org/

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Confirmed

** Affects: linux (Ubuntu Xenial)
 Importance: Undecided
 Status: New


** Tags: kernel-stable-tracking-bug

** Changed in: linux (Ubuntu)
   Status: New => Confirmed

** Tags added: kernel-stable-tracking-bug

** Also affects: linux (Ubuntu Xenial)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1878207

Title:
  Xenial update: 4.4.222 upstream stable release

Status in linux package in Ubuntu:
  Confirmed
Status in linux source package in Xenial:
  New

Bug description:
  
  SRU Justification

  Impact:
 The upstream process for stable tree updates is quite similar
 in scope to the Ubuntu SRU process, e.g., each patch has to
 demonstrably fix a bug, and each patch is vetted by upstream
 by originating either directly from a mainline/stable Linux tree or
 a minimally backported form of that patch. The following upstream
 stable patches should be included in the Ubuntu kernel:

 4.4.222 upstream stable release
 from git://git.kernel.org/

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1878207/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1835596] Re: incorrect argument to file_printable in [PATCH] PR/62

2020-05-12 Thread Marc Deslauriers
** Also affects: file (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Also affects: file (Ubuntu Focal)
   Importance: Undecided
   Status: New

** Also affects: file (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Also affects: file (Ubuntu Groovy)
   Importance: Undecided
 Assignee: Marc Deslauriers (mdeslaur)
   Status: Confirmed

** Also affects: file (Ubuntu Eoan)
   Importance: Undecided
   Status: New

** Changed in: file (Ubuntu Eoan)
   Status: New => Fix Released

** Changed in: file (Ubuntu Focal)
   Status: New => Fix Released

** Changed in: file (Ubuntu Groovy)
   Status: Confirmed => Fix Released

** Changed in: file (Ubuntu Xenial)
 Assignee: (unassigned) => Marc Deslauriers (mdeslaur)

** Changed in: file (Ubuntu Bionic)
 Assignee: (unassigned) => Marc Deslauriers (mdeslaur)

** Changed in: file (Ubuntu Xenial)
   Status: New => In Progress

** Changed in: file (Ubuntu Bionic)
   Status: New => In Progress

** Changed in: file (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: file (Ubuntu Bionic)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1835596

Title:
  incorrect argument to file_printable in [PATCH] PR/62

Status in file package in Ubuntu:
  Fix Released
Status in file source package in Xenial:
  In Progress
Status in file source package in Bionic:
  In Progress
Status in file source package in Eoan:
  Fix Released
Status in file source package in Focal:
  Fix Released
Status in file source package in Groovy:
  Fix Released

Bug description:
  In last patch below

  +From d65781527c8134a1202b2649695d48d5701ac60b Mon Sep 17 00:00:00 2001
  +From: Christos Zoulas 
  +Date: Mon, 18 Feb 2019 17:46:56 +
  +Subject: [PATCH] PR/62: spinpx: limit size of file_printable.

  +===
  +--- file-5.32.orig/src/readelf.c 2019-03-13 12:38:58.854781641 -0400
   file-5.32/src/readelf.c  2019-03-13 12:39:43.450945506 -0400
  +@@ -725,7 +725,7 @@ do_core_note(struct magic_set *ms, unsig
  + if (file_printf(ms, ", from '%.31s', pid=%u, uid=%u, "
  + "gid=%u, nlwps=%u, lwp=%u (signal %u/code %u)",
  + file_printable(sbuf, sizeof(sbuf),
  +-CAST(char *, pi.cpi_name)),
  ++RCAST(char *, pi.cpi_name), sizeof(pi.cpi_name)),
  + elf_getu32(swap, pi.cpi_pid),
  + elf_getu32(swap, pi.cpi_euid),
  + elf_getu32(swap, pi.cpi_egid),
  +@@ -1564,7 +1564,8 @@ dophn_exec(struct magic_set *ms, int cla
  + return -1;
  + if (interp[0])
  + if (file_printf(ms, ", interpreter %s",
  +-file_printable(ibuf, sizeof(ibuf), interp)) == -1)
  ++file_printable(ibuf, sizeof(ibuf), interp, sizeof(interp)))
  ++== -1)
  + return -1;
  + return 0;
  + }

  sizeof(interp) is passed to file_printable as the `slen' parameter, since 
interp is of 
  type `char *', sizeof(interp) will be 8 or 4 const value for different 
pointer types, 
  this makes the `interpreter' extraction for elf file limited to 8 bytes under 
x64. 

  A example for this, under ubuntu 18.04:
  $ file /bin/dash
  /bin/dash: ELF 64-bit LSB shared object, x86-64, version 1 (SYSV), 
dynamically linked,
  interpreter /lib64/l, for GNU/Linux 3.2.0, 
BuildID[sha1]=a783260e3a5fe0afdae77417eea7f
  bf8d645219e, stripped

  notice that the interpreter portion is `/lib64/l', which is 8 bytes long and 
only a part
  of the actual interpreter path. 

  the `slen' parameter here should be something like `sizeof(char) * 
length_of_buffer'
  instead of sizeof(char *).

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/file/+bug/1835596/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1878214] Re: [Xenial] dahdi-dkms fails to build after kernel version 4.4.218

2020-05-12 Thread Stefan Bader
Test build: https://launchpad.net/~smb/+archive/ubuntu/xenial/+packages

** Also affects: dahdi-linux (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: dahdi-linux (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: dahdi-linux (Ubuntu Xenial)
   Status: New => In Progress

** Changed in: dahdi-linux (Ubuntu Xenial)
 Assignee: (unassigned) => Stefan Bader (smb)

** Changed in: dahdi-linux (Ubuntu)
   Status: In Progress => Invalid

** Changed in: dahdi-linux (Ubuntu)
 Assignee: Stefan Bader (smb) => (unassigned)

** Description changed:

  In upstream stable 4.4.218, the following patch brings back kref_read()
  which was re-implemented in dahdi-linux code for kernel versions before
  4.11:
  
  commit 408f17931f5451702ad638e1d8511e780f6b56e7
  Author: Peter Zijlstra 
  Date:   Mon Nov 14 17:29:48 2016 +0100
  
- locking/atomic, kref: Add kref_read()
+ locking/atomic, kref: Add kref_read()
  
  This needs adjustment now in Xenial for kernels including 4.4.218 and
  later.
  
  [SRU Justification]
  
  == Impact ==
  
  Dahdi-dkms fails to build for kernels which include upstream stable
  version 4.4.218 or later.
+ 
+ 
https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac
+ /autopkgtest-xenial/xenial/amd64/d/dahdi-
+ linux/20200511_051631_1b525@/log.gz
  
  == Fix ==
  
  Disable the internal re-implementation of kref_read() for kernels
  including upstream stable 4.4.218.
  
  == Testcase ==
  
  Running dkms build for various kernel versions (tested with
  Ubuntu-4.4.0-178 and Ubuntu-4.4.0-179). With -178 building currently
  succeeds, with -179 it fails.
  
  == Risk of Regression ==
  
  Low, internal implementation which was backported from kernel 4.11 gets
  replaced by the kernel function.

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1878214

Title:
  [Xenial] dahdi-dkms fails to build after kernel version 4.4.218

Status in dahdi-linux package in Ubuntu:
  Invalid
Status in dahdi-linux source package in Xenial:
  In Progress

Bug description:
  In upstream stable 4.4.218, the following patch brings back
  kref_read() which was re-implemented in dahdi-linux code for kernel
  versions before 4.11:

  commit 408f17931f5451702ad638e1d8511e780f6b56e7
  Author: Peter Zijlstra 
  Date:   Mon Nov 14 17:29:48 2016 +0100

  locking/atomic, kref: Add kref_read()

  This needs adjustment now in Xenial for kernels including 4.4.218 and
  later.

  [SRU Justification]

  == Impact ==

  Dahdi-dkms fails to build for kernels which include upstream stable
  version 4.4.218 or later.

  
https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac
  /autopkgtest-xenial/xenial/amd64/d/dahdi-
  linux/20200511_051631_1b525@/log.gz

  == Fix ==

  Disable the internal re-implementation of kref_read() for kernels
  including upstream stable 4.4.218.

  == Testcase ==

  Running dkms build for various kernel versions (tested with
  Ubuntu-4.4.0-178 and Ubuntu-4.4.0-179). With -178 building currently
  succeeds, with -179 it fails.

  == Risk of Regression ==

  Low, internal implementation which was backported from kernel 4.11
  gets replaced by the kernel function.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/dahdi-linux/+bug/1878214/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1878232] [NEW] Xenial update: 4.4.223 upstream stable release

2020-05-12 Thread Ian
Public bug reported:


SRU Justification

Impact:
   The upstream process for stable tree updates is quite similar
   in scope to the Ubuntu SRU process, e.g., each patch has to
   demonstrably fix a bug, and each patch is vetted by upstream
   by originating either directly from a mainline/stable Linux tree or
   a minimally backported form of that patch. The following upstream
   stable patches should be included in the Ubuntu kernel:

   4.4.223 upstream stable release
   from git://git.kernel.org/

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Confirmed

** Affects: linux (Ubuntu Xenial)
 Importance: Undecided
 Status: New


** Tags: kernel-stable-tracking-bug

** Changed in: linux (Ubuntu)
   Status: New => Confirmed

** Tags added: kernel-stable-tracking-bug

** Also affects: linux (Ubuntu Xenial)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1878232

Title:
  Xenial update: 4.4.223 upstream stable release

Status in linux package in Ubuntu:
  Confirmed
Status in linux source package in Xenial:
  New

Bug description:
  
  SRU Justification

  Impact:
 The upstream process for stable tree updates is quite similar
 in scope to the Ubuntu SRU process, e.g., each patch has to
 demonstrably fix a bug, and each patch is vetted by upstream
 by originating either directly from a mainline/stable Linux tree or
 a minimally backported form of that patch. The following upstream
 stable patches should be included in the Ubuntu kernel:

 4.4.223 upstream stable release
 from git://git.kernel.org/

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1878232/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1878207] Re: Xenial update: 4.4.222 upstream stable release

2020-05-12 Thread Ian
** Changed in: linux (Ubuntu)
   Status: Confirmed => Invalid

** Changed in: linux (Ubuntu Xenial)
   Status: New => Invalid

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1878207

Title:
  Xenial update: 4.4.222 upstream stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Xenial:
  Invalid

Bug description:
  SRU Justification

  Impact:
     The upstream process for stable tree updates is quite similar
     in scope to the Ubuntu SRU process, e.g., each patch has to
     demonstrably fix a bug, and each patch is vetted by upstream
     by originating either directly from a mainline/stable Linux tree or
     a minimally backported form of that patch. The following upstream
     stable patches should be included in the Ubuntu kernel:

     4.4.222 upstream stable release
     from git://git.kernel.org/

  The following patches from the 4.4.222 stable release shall be applied:
  * ext4: fix special inode number checks in __ext4_iget()
  * drm/qxl: qxl_release leak in qxl_hw_surface_alloc()
  * ALSA: pcm: oss: Place the plugin buffer overflow checks correctly
  * PM: ACPI: Output correct message on target power state
  * RDMA/mlx4: Initialize ib_spec on the stack
  * vfio/type1: Fix VA->PA translation for PFNMAP VMAs in vaddr_get_pfn()
  * ALSA: opti9xx: shut up gcc-10 range warning
  * nfs: Fix potential posix_acl refcnt leak in nfs3_set_acl
  * dmaengine: dmatest: Fix iteration non-stop logic
  * i2c: designware-pci: use IRQF_COND_SUSPEND flag
  * perf hists: Fix HISTC_MEM_DCACHELINE width setting
  * powerpc/perf: Remove PPMU_HAS_SSLOT flag for Power8
  * perf/x86: Fix uninitialized value usage
  * exynos4-is: fix a format string bug
  * ASoC: wm8960: Fix WM8960_SYSCLK_PLL mode
  * ASoC: imx-spdif: Fix crash on suspend
  * ipv6: use READ_ONCE() for inet->hdrincl as in ipv4
  * selinux: properly handle multiple messages in selinux_netlink_send()
  * Linux 4.4.222

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1878207/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1878246] [NEW] Xenial update: 4.4.222 upstream stable release

2020-05-12 Thread Ian
Public bug reported:

SRU Justification

Impact:
   The upstream process for stable tree updates is quite similar
   in scope to the Ubuntu SRU process, e.g., each patch has to
   demonstrably fix a bug, and each patch is vetted by upstream
   by originating either directly from a mainline/stable Linux tree or
   a minimally backported form of that patch. The following upstream
   stable patches should be included in the Ubuntu kernel:

   4.4.222 upstream stable release
   from git://git.kernel.org/

The following patches from the 4.4.222 stable release shall be applied:
* ext4: fix special inode number checks in __ext4_iget()
* drm/qxl: qxl_release leak in qxl_hw_surface_alloc()
* ALSA: pcm: oss: Place the plugin buffer overflow checks correctly
* PM: ACPI: Output correct message on target power state
* RDMA/mlx4: Initialize ib_spec on the stack
* vfio/type1: Fix VA->PA translation for PFNMAP VMAs in vaddr_get_pfn()
* ALSA: opti9xx: shut up gcc-10 range warning
* nfs: Fix potential posix_acl refcnt leak in nfs3_set_acl
* dmaengine: dmatest: Fix iteration non-stop logic
* i2c: designware-pci: use IRQF_COND_SUSPEND flag
* perf hists: Fix HISTC_MEM_DCACHELINE width setting
* powerpc/perf: Remove PPMU_HAS_SSLOT flag for Power8
* perf/x86: Fix uninitialized value usage
* exynos4-is: fix a format string bug
* ASoC: wm8960: Fix WM8960_SYSCLK_PLL mode
* ASoC: imx-spdif: Fix crash on suspend
* ipv6: use READ_ONCE() for inet->hdrincl as in ipv4
* selinux: properly handle multiple messages in selinux_netlink_send()
* Linux 4.4.222

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Confirmed

** Affects: linux (Ubuntu Xenial)
 Importance: Undecided
 Status: New


** Tags: kernel-stable-tracking-bug

** Changed in: linux (Ubuntu)
   Status: New => Confirmed

** Tags added: kernel-stable-tracking-bug

** Also affects: linux (Ubuntu Xenial)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1878246

Title:
  Xenial update: 4.4.222 upstream stable release

Status in linux package in Ubuntu:
  Confirmed
Status in linux source package in Xenial:
  New

Bug description:
  SRU Justification

  Impact:
     The upstream process for stable tree updates is quite similar
     in scope to the Ubuntu SRU process, e.g., each patch has to
     demonstrably fix a bug, and each patch is vetted by upstream
     by originating either directly from a mainline/stable Linux tree or
     a minimally backported form of that patch. The following upstream
     stable patches should be included in the Ubuntu kernel:

     4.4.222 upstream stable release
     from git://git.kernel.org/

  The following patches from the 4.4.222 stable release shall be applied:
  * ext4: fix special inode number checks in __ext4_iget()
  * drm/qxl: qxl_release leak in qxl_hw_surface_alloc()
  * ALSA: pcm: oss: Place the plugin buffer overflow checks correctly
  * PM: ACPI: Output correct message on target power state
  * RDMA/mlx4: Initialize ib_spec on the stack
  * vfio/type1: Fix VA->PA translation for PFNMAP VMAs in vaddr_get_pfn()
  * ALSA: opti9xx: shut up gcc-10 range warning
  * nfs: Fix potential posix_acl refcnt leak in nfs3_set_acl
  * dmaengine: dmatest: Fix iteration non-stop logic
  * i2c: designware-pci: use IRQF_COND_SUSPEND flag
  * perf hists: Fix HISTC_MEM_DCACHELINE width setting
  * powerpc/perf: Remove PPMU_HAS_SSLOT flag for Power8
  * perf/x86: Fix uninitialized value usage
  * exynos4-is: fix a format string bug
  * ASoC: wm8960: Fix WM8960_SYSCLK_PLL mode
  * ASoC: imx-spdif: Fix crash on suspend
  * ipv6: use READ_ONCE() for inet->hdrincl as in ipv4
  * selinux: properly handle multiple messages in selinux_netlink_send()
  * Linux 4.4.222

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1878246/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1796940] Re: ubuntu-release-upgrader-core missing a dependency

2020-05-12 Thread Launchpad Bug Tracker
This bug was fixed in the package ubuntu-release-upgrader - 1:16.04.30

---
ubuntu-release-upgrader (1:16.04.30) xenial; urgency=medium

  * debian/control: change ubuntu-release-upgrader-core to depend on
ca-certificates (LP: #1796940)
  * Update mirrors data.

 -- Brian Murray   Fri, 01 May 2020 16:06:05 -0700

** Changed in: ubuntu-release-upgrader (Ubuntu Xenial)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1796940

Title:
  ubuntu-release-upgrader-core missing a dependency

Status in ubuntu-release-upgrader package in Ubuntu:
  Fix Released
Status in ubuntu-release-upgrader source package in Xenial:
  Fix Released
Status in ubuntu-release-upgrader source package in Bionic:
  Fix Released

Bug description:
  Test Case
  -
  1) Install ubuntu-release-upgrader-core on an 18.04 chroot
  2) Edit /etc/update-manager/release-upgrades set Prompt=normal
  3) Run 'do-release-upgrade -d'
  4) Observe the following

  (bionic-amd64)root@impulse:~# do-release-upgrade -d
  Checking for a new Ubuntu release
  Failed to connect to https://changelogs.ubuntu.com/meta-release-development. 
Check your Internet connection or proxy settings
  Upgrades to the development release are only
  available from the latest supported release.

  Installing ca-certificates resolves the issue, this was likely caused
  by the fix for bug 1744318.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-release-upgrader/+bug/1796940/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1700810] Re: aptdaemon's crash.py file is not working

2020-05-12 Thread Launchpad Bug Tracker
This bug was fixed in the package aptdaemon - 1.1.1+bzr982-0ubuntu33

---
aptdaemon (1.1.1+bzr982-0ubuntu33) groovy; urgency=medium

  * Update crash handler to use the changed apport function. (LP:
#1700810)

 -- Brian Murray   Mon, 11 May 2020 15:10:33 -0700

** Changed in: aptdaemon (Ubuntu)
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1700810

Title:
  aptdaemon's crash.py file is not working

Status in aptdaemon package in Ubuntu:
  Fix Released
Status in aptdaemon source package in Xenial:
  In Progress
Status in aptdaemon source package in Bionic:
  In Progress
Status in aptdaemon source package in Eoan:
  In Progress
Status in aptdaemon source package in Focal:
  In Progress

Bug description:
  [Impact]
  aptdaemon ships its own crash handler which is not working and subsequently 
crash reports are not being created about aptdaemon. Given that aptdaemon is 
the package manager behind update-manager it'd be good to get crash reports 
from it.

  [Test Case]
  1) cd /
  2) Run 'sudo python3 aptdaemon.crash'
  3) Look for a crash file in /var/crash named '_usr_sbin_aptd.0.crash'

  With the current version aptdaemon no crash file will be created. With
  the version of aptdaemon from -proposed. there will be a crash file
  and if you view it you will see "Title: test" and "Traceback:
  testtrace" in the file.

  [Regression Test Case]
  After creating a .crash file with the version of aptdaemon from -proposed run 
'sudo python3 aptdaemon.crash' again. You should receive a 'FileExistsError' 
traceback from apport.

  [Regression Potential]
  Aptdaemon is being updated to use a function that was renamed in apport so 
there is little chance of regression. However, we are removing a file exists 
check (which should now be handled by apport) so we should double check that an 
existing crash file doesn't get overwritten.

  [Original Description]
  aptdaemon includes a file named crash.py which is supposed to create apport 
problem reports for a given crash. However, searching through bug attachments 
for aptdaemon bug reports I don't see any with the key "TransactionRole" in any 
recent bug reports.

   $ grep -r TransactionRole *
  bug-1058886/Description.txt:TransactionRole: role-commit-packages
  bug-1158395/Description.txt:TransactionRole: role-install-file
  bug-1166875/Description.txt:TransactionRole: role-remove-packages
  bug-1201054/Description.txt:TransactionRole: role-commit-packages
  bug-1237851/Description.txt:TransactionRole: role-commit-packages
  bug-1279716/Description.txt:TransactionRole: role-commit-packages
  bug-1293334/Description.txt:TransactionRole: role-pk-query
  bug-1297434/Description.txt:TransactionRole: role-install-file
  bug-1301063/Description.txt:TransactionRole: role-install-packages
  bug-1306498/Description.txt:TransactionRole: role-pk-query
  bug-1380290/apport_crash.log:TransactionRole: role-pk-query

  It seems likely that either "trans" is null, or something is wrong
  with aptdaemon's crash handler.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/aptdaemon/+bug/1700810/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1874771] Re: xenial/linux-azure: 4.15.0-1083.93~16.04.1 -proposed tracker

2020-05-12 Thread Ubuntu Kernel Bot
** Changed in: kernel-sru-workflow/automated-testing
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/promote-to-proposed
   Status: Fix Committed => Fix Released

** Changed in: kernel-sru-workflow/regression-testing
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/security-signoff
   Status: New => In Progress

** Changed in: kernel-sru-workflow/stakeholder-signoff
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/verification-testing
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/automated-testing
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/regression-testing
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/verification-testing
   Status: Confirmed => In Progress

** Description changed:

  This bug will contain status and test results related to a kernel source
  (or snap) as stated in the title.
  
  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  
  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1874773
  packages:
main: linux-azure
meta: linux-meta-azure
signed: linux-signed-azure
- phase: Promote to Proposed
- phase-changed: Tuesday, 12. May 2020 18:27 UTC
+ phase: Testing
+ phase-changed: Tuesday, 12. May 2020 20:03 UTC
+ proposed-announcement-sent: true
+ proposed-testing-requested: true
  reason:
-   promote-to-proposed: Ongoing -- packages waiting in -proposed for
- mirror sync
+   automated-testing: Ongoing -- testing in progress
+   regression-testing: Ongoing -- testing in progress
+   security-signoff: Pending -- waiting for signoff
+   stakeholder-signoff: Pending -- waiting for signoff
+   verification-testing: Ongoing -- testing in progress
  trackers:
xenial/linux-azure/azure-kernel: bug 1874770
  variant: debs
  versions:
main: 4.15.0-1083.93~16.04.1
meta: 4.15.0.1083.82
signed: 4.15.0-1083.93~16.04.1

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1874771

Title:
  xenial/linux-azure: 4.15.0-1083.93~16.04.1 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  In Progress
Status in Kernel SRU Workflow security-signoff series:
  In Progress
Status in Kernel SRU Workflow stakeholder-signoff series:
  Confirmed
Status in Kernel SRU Workflow verification-testing series:
  In Progress
Status in linux-azure source package in Xenial:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1874773
  packages:
main: linux-azure
meta: linux-meta-azure
signed: linux-signed-azure
  phase: Testing
  phase-changed: Tuesday, 12. May 2020 20:03 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason:
automated-testing: Ongoing -- testing in progress
regression-testing: Ongoing -- testing in progress
security-signoff: Pending -- waiting for signoff
stakeholder-signoff: Pending -- waiting for signoff
verification-testing: Ongoing -- testing in progress
  trackers:
xenial/linux-azure/azure-kernel: bug 1874770
  variant: debs
  versions:
main: 4.15.0-1083.93~16.04.1
meta: 4.15.0.1083.82
signed: 4.15.0-1083.93~16.04.1

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1874771/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1874785] Re: xenial/linux-deeplens: 4.15.0-1023.23 -proposed tracker

2020-05-12 Thread Ubuntu Kernel Bot
** Changed in: kernel-sru-workflow/certification-testing
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/promote-to-proposed
   Status: In Progress => Fix Committed

** Changed in: kernel-sru-workflow/verification-testing
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/promote-to-proposed
   Status: Fix Committed => Fix Released

** Description changed:

  This bug will contain status and test results related to a kernel source
  (or snap) as stated in the title.
  
  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  
  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1877981
  packages:
main: linux-deeplens
meta: linux-meta-deeplens
- phase: Promote to Proposed
- phase-changed: Tuesday, 12. May 2020 19:53 UTC
+ phase: Ready for Testing
+ phase-changed: Tuesday, 12. May 2020 20:11 UTC
+ proposed-announcement-sent: true
+ proposed-testing-requested: true
  reason:
-   promote-to-proposed: Stalled -- review in progress
+   certification-testing: Ongoing -- testing in progress
+   verification-testing: Ongoing -- testing in progress
  variant: debs
  versions:
main: 4.15.0-1023.23
meta: 4.15.0.1023.23

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1874785

Title:
  xenial/linux-deeplens: 4.15.0-1023.23 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Invalid
Status in Kernel SRU Workflow certification-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Invalid
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Invalid
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow verification-testing series:
  Confirmed
Status in linux source package in Xenial:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1877981
  packages:
main: linux-deeplens
meta: linux-meta-deeplens
  phase: Ready for Testing
  phase-changed: Tuesday, 12. May 2020 20:11 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason:
certification-testing: Ongoing -- testing in progress
verification-testing: Ongoing -- testing in progress
  variant: debs
  versions:
main: 4.15.0-1023.23
meta: 4.15.0.1023.23

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1874785/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1874800] Re: xenial/linux-snapdragon: 4.4.0-1137.145 -proposed tracker

2020-05-12 Thread Ubuntu Kernel Bot
** Changed in: kernel-sru-workflow/automated-testing
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/certification-testing
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/promote-to-proposed
   Status: Fix Committed => Fix Released

** Changed in: kernel-sru-workflow/security-signoff
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/verification-testing
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/automated-testing
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/verification-testing
   Status: Confirmed => In Progress

** Description changed:

  This bug will contain status and test results related to a kernel source
  (or snap) as stated in the title.
  
  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  
  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1874804
  packages:
main: linux-snapdragon
meta: linux-meta-snapdragon
- phase: Promote to Proposed
- phase-changed: Tuesday, 12. May 2020 19:51 UTC
+ phase: Testing
+ phase-changed: Tuesday, 12. May 2020 22:03 UTC
+ proposed-announcement-sent: true
+ proposed-testing-requested: true
  reason:
-   promote-to-proposed: Ongoing -- packages waiting in -proposed for
- mirror sync
+   automated-testing: Ongoing -- testing in progress
+   certification-testing: Ongoing -- testing in progress
+   security-signoff: Pending -- waiting for signoff
+   verification-testing: Ongoing -- testing in progress
  trackers:
xenial/linux-snapdragon/dragonboard-kernel: bug 1874799
  variant: debs
  versions:
main: 4.4.0-1137.145
meta: 4.4.0.1137.129

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1874800

Title:
  xenial/linux-snapdragon: 4.4.0-1137.145 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Invalid
Status in Kernel SRU Workflow security-signoff series:
  Confirmed
Status in Kernel SRU Workflow verification-testing series:
  In Progress
Status in linux-snapdragon source package in Xenial:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1874804
  packages:
main: linux-snapdragon
meta: linux-meta-snapdragon
  phase: Testing
  phase-changed: Tuesday, 12. May 2020 22:03 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason:
automated-testing: Ongoing -- testing in progress
certification-testing: Ongoing -- testing in progress
security-signoff: Pending -- waiting for signoff
verification-testing: Ongoing -- testing in progress
  trackers:
xenial/linux-snapdragon/dragonboard-kernel: bug 1874799
  variant: debs
  versions:
main: 4.4.0-1137.145
meta: 4.4.0.1137.129

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1874800/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1877981] Re: xenial/linux-hwe: 4.15.0-101.102~16.04.1 -proposed tracker

2020-05-12 Thread Ubuntu Kernel Bot
** Changed in: kernel-sru-workflow/automated-testing
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/certification-testing
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/promote-to-proposed
   Status: Fix Committed => Fix Released

** Changed in: kernel-sru-workflow/regression-testing
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/security-signoff
   Status: New => In Progress

** Changed in: kernel-sru-workflow/verification-testing
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/automated-testing
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/regression-testing
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/verification-testing
   Status: Confirmed => In Progress

** Description changed:

  This bug will contain status and test results related to a kernel source
  (or snap) as stated in the title.
  
  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  
  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1877262
  packages:
main: linux-hwe
meta: linux-meta-hwe
signed: linux-signed-hwe
- phase: Promote to Proposed
- phase-changed: Tuesday, 12. May 2020 21:13 UTC
+ phase: Testing
+ phase-changed: Tuesday, 12. May 2020 22:47 UTC
+ proposed-announcement-sent: true
+ proposed-testing-requested: true
  reason:
-   promote-to-proposed: Ongoing -- packages waiting in -proposed for
- mirror sync
+   automated-testing: Ongoing -- testing in progress
+   certification-testing: Ongoing -- testing in progress
+   regression-testing: Ongoing -- testing in progress
+   security-signoff: Pending -- waiting for signoff
+   verification-testing: Ongoing -- testing in progress
  trackers:
xenial/linux-deeplens: bug 1874785
  variant: debs
  versions:
main: 4.15.0-101.102~16.04.1
meta: 4.15.0.101.108
signed: 4.15.0-101.102~16.04.1

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1877981

Title:
  xenial/linux-hwe: 4.15.0-101.102~16.04.1 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  In Progress
Status in Kernel SRU Workflow security-signoff series:
  In Progress
Status in Kernel SRU Workflow verification-testing series:
  In Progress
Status in linux-hwe source package in Xenial:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1877262
  packages:
main: linux-hwe
meta: linux-meta-hwe
signed: linux-signed-hwe
  phase: Testing
  phase-changed: Tuesday, 12. May 2020 22:47 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason:
automated-testing: Ongoing -- testing in progress
certification-testing: Ongoing -- testing in progress
regression-testing: Ongoing -- testing in progress
security-signoff: Pending -- waiting for signoff
verification-testing: Ongoing -- testing in progress
  trackers:
xenial/linux-deeplens: bug 1874785
  variant: debs
  versions:
main: 4.15.0-101.102~16.04.1
meta: 4.15.0.101.108
signed: 4.15.0-101.102~16.04.1

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1877981/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1874801] Re: xenial/linux-fips: 4.4.0-1034.39 -proposed tracker

2020-05-12 Thread Po-Hsu Lin
4.4.0-1034.39 - fips
Regression test CMPL, RTB.

58 / 60 tests were run, missing: ubuntu_xfstests_btrfs, ubuntu_xfstests_ext4
Issue to note in amd64:
  ubuntu_kvm_unit_tests - apic timeouted (bug 1748103) debug (bug 1821906) vmx 
(bug 1821394) vmx_host_state_area (bug 1866585) vmx_intr_window_test (bug 
1866586) vmx_nm_test (bug 1866587) vmx_nmi_window_test (bug 1866588) 
vmx_pending_event_test (bug 1866591)
  ubuntu_ltp_syscalls - connect02 (bug 1874014) btrfs fill_fs test in 
fallocate06 (bug 1866323) fanotify06 (bug 1833028) fanotify10 (bug 1802454) 
kill11 (bug 1865965)
  ubuntu_unionmount_ovlfs - failed with the latest code in upstream (bug 
1854298)
  ubuntu_xfstests_xfs - no scratch drive for the test 

52 / 56 tests were run, missing: ubuntu_boot, ubuntu_xfstests_btrfs, 
ubuntu_xfstests_ext4, ubuntu_xfstests_xfs
Issue to note in ppc64le (P8):
  ubuntu_btrfs_kernel_fixes - Unable to mount a btrfs filesystem smaller than 
320M on Xenial P8 (bug 1813863)
  ubuntu_fan_smoke_test - Failed to fetch file from http://ports.ubuntu.com 
(bug 1864140)
  ubuntu_ltp_syscalls - fanotify07 won't fix (bug 1775165) connect02 (bug 
1874014) fallocate04, fallocate05, fsetxattr01, fdatasync03, fgetxattr01, 
fremovexattr01, fremovexattr02, fsync01, fsync04, fanotify13, fanotify14, 
fanotify15, lremovexattr01, msync04, preadv03, preadv03_64, preadv203, 
preadv203_64, pwritev03, pwritev03_64, setxattr01, sync03, syncfs01, 
sync_file_range02, copy_file_range01 (bug 1842270) fanotify06 (bug 1833028) 
fanotify10 (bug 1802454) move_pages12 (bug 1831043)
  ubuntu_unionmount_ovlfs - failed with the latest code in upstream (bug 
1854298)

51 / 52 tests were run, missing: ubuntu_boot
Issue to note in s390x (KVM):
  libhugetlbfs - libhugetlbfs failed with "Address is not hugepage / Heap not 
on hugepages" (bug 1864650) bad config 1
  ubuntu_bpf_jit - 4 failures reported for X s390x (bug 1768452)
  ubuntu_kernel_selftests - test_bpf in net (bug 1768452)
  ubuntu_kvm_smoke_test - uvtool issue (bug 1729854)
  ubuntu_kvm_unit_tests - test should be skipped for X s390x KVM
  ubuntu_ltp_syscalls - connect02 (bug 1874014) btrfs fill_fs test in 
fallocate06 (bug 1866323) fanotify06 (bug 1833028) fanotify10 (bug 1802454) 
kill11 (bug 1865965)
  ubuntu_unionmount_ovlfs - failed with the latest code in upstream (bug 
1854298)


** Changed in: kernel-sru-workflow/regression-testing
   Status: In Progress => Fix Released

** Changed in: kernel-sru-workflow/regression-testing
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Po-Hsu Lin 
(cypressyew)

** Tags added: regression-testing-passed

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1874801

Title:
  xenial/linux-fips: 4.4.0-1034.39 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Invalid
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-signing-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Invalid
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow verification-testing series:
  In Progress
Status in linux source package in Xenial:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1874804
  packages:
main: linux-fips
meta: linux-meta-fips
signed: linux-signed-fips
  phase: Testing
  phase-changed: Thursday, 30. April 2020 20:32 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason:
verification-testing: Ongoing -- testing in progress
  variant: debs
  versions:
main: 4.4.0-1034.39
meta: 4.4.0.1034.36
signed: 4.4.0-1034.39

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1874801/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1874776] Re: xenial/linux-gcp: 4.15.0-1071.81~16.04.1 -proposed tracker

2020-05-12 Thread Ubuntu Kernel Bot
** Changed in: kernel-sru-workflow/automated-testing
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/promote-to-proposed
   Status: Fix Committed => Fix Released

** Changed in: kernel-sru-workflow/regression-testing
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/security-signoff
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/verification-testing
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/automated-testing
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/regression-testing
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/verification-testing
   Status: Confirmed => In Progress

** Description changed:

  This bug will contain status and test results related to a kernel source
  (or snap) as stated in the title.
  
  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  
  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1874777
  packages:
main: linux-gcp
meta: linux-meta-gcp
signed: linux-signed-gcp
- phase: Promote to Proposed
- phase-changed: Wednesday, 13. May 2020 03:41 UTC
+ phase: Testing
+ phase-changed: Wednesday, 13. May 2020 05:12 UTC
+ proposed-announcement-sent: true
+ proposed-testing-requested: true
  reason:
-   promote-to-proposed: Ongoing -- packages waiting in -proposed for
- mirror sync
+   automated-testing: Ongoing -- testing in progress
+   regression-testing: Ongoing -- testing in progress
+   security-signoff: Pending -- waiting for signoff
+   verification-testing: Ongoing -- testing in progress
  trackers:
xenial/linux-gcp/gcp-kernel: bug 1874774
xenial/linux-gcp/gke-kernel: bug 1874775
  variant: debs
  versions:
main: 4.15.0-1071.81~16.04.1
meta: 4.15.0.1071.77
signed: 4.15.0-1071.81~16.04.1

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1874776

Title:
  xenial/linux-gcp: 4.15.0-1071.81~16.04.1 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  In Progress
Status in Kernel SRU Workflow security-signoff series:
  Confirmed
Status in Kernel SRU Workflow verification-testing series:
  In Progress
Status in linux-gcp source package in Xenial:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1874777
  packages:
main: linux-gcp
meta: linux-meta-gcp
signed: linux-signed-gcp
  phase: Testing
  phase-changed: Wednesday, 13. May 2020 05:12 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason:
automated-testing: Ongoing -- testing in progress
regression-testing: Ongoing -- testing in progress
security-signoff: Pending -- waiting for signoff
verification-testing: Ongoing -- testing in progress
  trackers:
xenial/linux-gcp/gcp-kernel: bug 1874774
xenial/linux-gcp/gke-kernel: bug 1874775
  variant: debs
  versions:
main: 4.15.0-1071.81~16.04.1
meta: 4.15.0.1071.77
signed: 4.15.0-1071.81~16.04.1

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1874776/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp