[Group.of.nepali.translators] [Bug 1842562] Re: AWS: Add udev rule to set Instance Store device IO timeouts

2020-08-18 Thread Matthew Ruffell
** Changed in: cloud-init (Ubuntu)
   Status: In Progress => Won't Fix

** Changed in: cloud-init (Ubuntu Xenial)
   Status: In Progress => Won't Fix

** Changed in: cloud-init (Ubuntu Bionic)
   Status: In Progress => Won't Fix

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1842562

Title:
  AWS: Add udev rule to set Instance Store device IO timeouts

Status in cloud-init package in Ubuntu:
  Won't Fix
Status in cloud-init source package in Xenial:
  Won't Fix
Status in cloud-init source package in Bionic:
  Won't Fix
Status in cloud-init source package in Disco:
  Won't Fix
Status in cloud-init source package in Eoan:
  Won't Fix

Bug description:
  [Impact]

  AWS wish to implement per-device IO timeouts in their cloud, since
  currently NVMe devices only support a single global timeout, and this
  doesn't play well with EBS volumes, which have error recovery
  capabilities built into the back end, and require large timeouts, and
  Instance Store / ephemeral volumes, which are to be treated as local
  disks, which require short timeouts.

  AWS have proposed a solution which is to backport the below two
  patches to the Ubuntu kernels:

  commit 65cd1d13b880920054d6c750679baa80b7f9c072
  Author: Weiping Zhang 
  Date:   Thu Nov 29 00:04:39 2018 +0800
  subject: block: add io timeout to sysfs

  commit 4d25339e32a1b6e1f490bb78b1e5b0fa9eb3e073
  Author: Weiping Zhang 
  Date:   Tue Apr 2 21:14:30 2019 +0800
  subject: block: don't show io_timeout if driver has no timeout handler

  This enables a sysfs entry in /sys/block/nvmeXnX/queue/io_timeout
  which gets and sets the io_timeout per device in milliseconds.

  Kernel commits are being tracked in LP #1841461

  EBS volumes will use the default timeout as set on the kernel command
  line of 4294966296, and Instance Store volumes will need to use a
  default timeout of 3.

  AWS have suggested that we deploy the below udev rule to automatically
  set the io_timeout of all Instance Store volumes to 3:

  KERNEL=="nvme[0-9]*n[0-9]*", ENV{DEVTYPE}=="disk",
  ATTRS{model}=="Amazon EC2 NVMe Instance Storage",
  ATTR{queue/io_timeout}="3"

  This bug is to add the above udev rule to cloud-init.

  [Test Case]

  This requires an AWS instance that has Instance Store volumes
  configured, and I suggest using c5d.large instances.

  I have built a test kernel for bionic linux-aws, version
  4.15.0-1043.45+hf240347v20190828b2 which is available from here:

  https://launchpad.net/~mruffell/+archive/ubuntu/sf240347-kernel

  Install the kernel with the below:

  1) sudo add-apt-repository ppa:mruffell/sf240347-kernel
  2) sudo apt-get update

  Modify grub to boot it, this kernel is 1043, and current is 1044, so
  it will likely be "1>2" in grub config:

  3) sudo vim /etc/default/grub
  Change GRUB_DEFAULT=0 to GRUB_DEFAULT="1>2"
  4) sudo update-grub
  5) reboot

  Once system is up, check kernel version:
  6) uname -rv
  4.15.0-1043-aws #45+hf240347v20190828b2-Ubuntu SMP Wed Aug 28 06:08:21 UTC 
2019

  Verify that we have two nvme disks, one EBS and one Instance Store:

  7) lsblk 
  Should have two disks, normally nvme0 and nvme1.

  See what device is what:

  8) sudo udevadm info --attribute-walk /dev/nvme0
  For me, ATTR{model} is "Amazon Elastic Block Store"

  9) sudo udevadm info --attribute-walk /dev/nvme1
  For me, ATTR{model} is "Amazon EC2 NVMe Instance Storage"

  Look at the two timeouts (Note no udev rule yet):

  10) cat /sys/block/{nvme0n1,nvme1n1}/queue/io_timeout
  4294966296
  4294966296

  Now we deploy the udev rule:
  Place the following line in /lib/udev/rules.d/66-aws-io-timeout.rules

  KERNEL=="nvme[0-9]*n[0-9]*", ENV{DEVTYPE}=="disk",
  ATTRS{model}=="Amazon EC2 NVMe Instance Storage",
  ATTR{queue/io_timeout}="3"

  Now trigger udev rules:
  11) sudo udevadm trigger

  Look at the timeouts now:

  12) cat /sys/block/{nvme0n1,nvme1n1}/queue/io_timeout
  4294966296
  3

  [Regression Potential]

  Regression potential is low since we are adding a udev rule which
  applies only to AWS instances, and only for instances which support
  Instance Store devices.

  The only thing being modified is the device timeout and the udev rule
  is robust to device reordering as it goes by model attr information.

  When the udev rule is used with unpatched kernels, nothing happens
  since the sysfs entry does not exist, and no errors or the like are
  reported.

  [Other Info]
  cloud-init appears to carry azure specific udev rules, which makes me think 
that cloud-init is the right place for this requested udev rule to live.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/cloud-init/+bug/1842562/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators

[Group.of.nepali.translators] [Bug 1890667] Re: xenial/linux-fips: 4.4.0-1045.50 -proposed tracker

2020-08-18 Thread Ubuntu Kernel Bot
** Changed in: kernel-sru-workflow/promote-signing-to-proposed
   Status: In Progress => Fix Committed

** Changed in: kernel-sru-workflow/regression-testing
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/verification-testing
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/promote-signing-to-proposed
   Status: Fix Committed => Fix Released

** Changed in: kernel-sru-workflow/regression-testing
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/verification-testing
   Status: Confirmed => In Progress

** Description changed:

  This bug will contain status and test results related to a kernel source
  (or snap) as stated in the title.
  
  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  
  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1891057
  packages:
main: linux-fips
meta: linux-meta-fips
signed: linux-signed-fips
- phase: Promote to Proposed
- phase-changed: Tuesday, 18. August 2020 20:07 UTC
+ phase: Testing
+ phase-changed: Tuesday, 18. August 2020 20:17 UTC
+ proposed-announcement-sent: true
+ proposed-testing-requested: true
  reason:
-   promote-signing-to-proposed: Stalled -- review in progress
+   regression-testing: Ongoing -- testing in progress
+   verification-testing: Ongoing -- testing in progress
  variant: debs
  versions:
main: 4.4.0-1045.50
meta: 4.4.0.1045.47
signed: 4.4.0-1045.50

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1890667

Title:
  xenial/linux-fips: 4.4.0-1045.50 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Invalid
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-signing-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Invalid
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  In Progress
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow verification-testing series:
  In Progress
Status in linux source package in Xenial:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1891057
  packages:
main: linux-fips
meta: linux-meta-fips
signed: linux-signed-fips
  phase: Testing
  phase-changed: Tuesday, 18. August 2020 20:17 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason:
regression-testing: Ongoing -- testing in progress
verification-testing: Ongoing -- testing in progress
  variant: debs
  versions:
main: 4.4.0-1045.50
meta: 4.4.0.1045.47
signed: 4.4.0-1045.50

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1890667/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1840488] Re: Disable Bluetooth in cloud kernels

2020-08-18 Thread Brian Murray
The Eoan Ermine has reached end of life, so this bug will not be fixed
for that release

** Changed in: linux-aws (Ubuntu Eoan)
   Status: Triaged => Won't Fix

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1840488

Title:
  Disable Bluetooth in cloud kernels

Status in linux-aws package in Ubuntu:
  Triaged
Status in linux-gcp package in Ubuntu:
  Triaged
Status in linux-gke-4.15 package in Ubuntu:
  Invalid
Status in linux-gke-5.0 package in Ubuntu:
  Invalid
Status in linux-oracle package in Ubuntu:
  Triaged
Status in linux-aws source package in Xenial:
  Invalid
Status in linux-gcp source package in Xenial:
  Triaged
Status in linux-gke-4.15 source package in Xenial:
  Invalid
Status in linux-gke-5.0 source package in Xenial:
  Invalid
Status in linux-oracle source package in Xenial:
  Triaged
Status in linux-aws source package in Bionic:
  Triaged
Status in linux-gcp source package in Bionic:
  Triaged
Status in linux-gke-4.15 source package in Bionic:
  Triaged
Status in linux-gke-5.0 source package in Bionic:
  Triaged
Status in linux-oracle source package in Bionic:
  Triaged
Status in linux-aws source package in Disco:
  Won't Fix
Status in linux-gcp source package in Disco:
  Won't Fix
Status in linux-gke-4.15 source package in Disco:
  Invalid
Status in linux-gke-5.0 source package in Disco:
  Invalid
Status in linux-oracle source package in Disco:
  Won't Fix
Status in linux-aws source package in Eoan:
  Won't Fix
Status in linux-gcp source package in Eoan:
  Won't Fix
Status in linux-gke-4.15 source package in Eoan:
  Invalid
Status in linux-gke-5.0 source package in Eoan:
  Invalid
Status in linux-oracle source package in Eoan:
  Won't Fix

Bug description:
  [Impact]

  Some cloud-focused kernels have CONFIG_BT enabled but cloud instances
  shouldn't need bluetooth support. Disabling the bluetooth subsystem
  reduces the amount of security-sensitive code we have to worry about
  in the cloud kernels and also has the nice side effect of minimizing
  build times and kernel sizes.

  The cloud kernels known to have bluetooth enabled include:

  * [B/D/E] linux-aws (arm64 only)
  * [X/B/D/E] linux-gcp
  * [B] linux-gke-4.15
  * [B] linux-gke-5.0
  * [X/B/D/E] linux-oracle

  [Test Case]

  1. Install patched kernel and reboot into it
  2. Ensure that the following command does NOT display any output:
     $ grep CONFIG_BT=[my] /boot/config-$(uname -r)

  [Regression Potential]

  There could be an unexpected dependence on bluetooth within one of the
  clouds but I think it is highly unlikely.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-aws/+bug/1840488/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1864174] Re: rustc 1.41 and cargo 0.42 required by firefox 75

2020-08-18 Thread Brian Murray
The Eoan Ermine has reached end of life, so this bug will not be fixed
for that release

** Changed in: rustc (Ubuntu Eoan)
   Status: Fix Committed => Won't Fix

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1864174

Title:
  rustc 1.41 and cargo 0.42 required by firefox 75

Status in cargo package in Ubuntu:
  Fix Released
Status in rustc package in Ubuntu:
  Fix Released
Status in cargo source package in Xenial:
  Fix Released
Status in rustc source package in Xenial:
  Fix Committed
Status in cargo source package in Bionic:
  Fix Released
Status in rustc source package in Bionic:
  Fix Committed
Status in cargo source package in Eoan:
  Fix Released
Status in rustc source package in Eoan:
  Won't Fix

Bug description:
  Firefox 75+ will require rustc 1.41 and cargo 0.42 to build¹.

  The beta phase for Firefox 75.0 begins on 2020-03-05 and release
  candidates will be available from 2020-04-02.

  We will need these in focal and all supported releases (xenial, bionic
  and eoan).

  ¹ https://bugzilla.mozilla.org/show_bug.cgi?id=1615003

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/cargo/+bug/1864174/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1828258] Re: ldirectord systemd service fails if no /var/lock/subsys dir

2020-08-18 Thread Brian Murray
The Eoan Ermine has reached end of life, so this bug will not be fixed
for that release

** Changed in: resource-agents (Ubuntu Eoan)
   Status: In Progress => Won't Fix

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1828258

Title:
  ldirectord systemd service fails if no /var/lock/subsys dir

Status in resource-agents package in Ubuntu:
  In Progress
Status in resource-agents source package in Xenial:
  In Progress
Status in resource-agents source package in Bionic:
  In Progress
Status in resource-agents source package in Cosmic:
  In Progress
Status in resource-agents source package in Disco:
  Won't Fix
Status in resource-agents source package in Eoan:
  Won't Fix

Bug description:
  [impact]

  ldirectord's systemd service script contains commands to touch and
  remove a file in the /var/lock/subsys directory; however, locks there
  are a SysV service serialization thing, and are unneeded with systemd.
  It's unclear why the ldirectord systemd service script contains the
  lines, but they come from upstream so we should get it fixed there and
  then correct debian and ubuntu.

  this impacts users because if no /var/lock/subsys directory exists,
  the systemd service will fail to start, which can impact installing or
  upgrading the resource-agents package.

  [test case]

  remove the /var/lock/subsys directory and try to install or upgrade
  ldirectord:

  ubuntu@lp1828258:~$ sudo rmdir /var/lock/subsys
  ubuntu@lp1828258:~$ sudo apt install ldirectord
  Reading package lists... Done
  Building dependency tree   
  Reading state information... Done
  The following package was automatically installed and is no longer required:
libfreetype6
  Use 'sudo apt autoremove' to remove it.
  The following NEW packages will be installed:
ldirectord
  0 upgraded, 1 newly installed, 0 to remove and 0 not upgraded.
  Need to get 0 B/62.1 kB of archives.
  After this operation, 233 kB of additional disk space will be used.
  Selecting previously unselected package ldirectord.
  (Reading database ... 30382 files and directories currently installed.)
  Preparing to unpack .../ldirectord_1%3a4.2.0-1ubuntu1_all.deb ...
  Unpacking ldirectord (1:4.2.0-1ubuntu1) ...
  Setting up ldirectord (1:4.2.0-1ubuntu1) ...

  ...(120 second or so delay)...

  Job for ldirectord.service failed because the control process exited with 
error code.
  See "systemctl status ldirectord.service" and "journalctl -xe" for details.
  invoke-rc.d: initscript ldirectord, action "start" failed.
  ● ldirectord.service - Monitor and administer real servers in a LVS cluster 
of load balanced virtual servers
 Loaded: loaded (/lib/systemd/system/ldirectord.service; disabled; vendor 
preset: enabled)
 Active: failed (Result: exit-code) since Thu 2019-05-09 11:27:53 UTC; 11ms 
ago
   Docs: man:ldirectord(8)
Process: 7559 ExecStart=/usr/sbin/ldirectord start (code=exited, 
status=0/SUCCESS)
Process: 7564 ExecStartPost=/usr/bin/touch /var/lock/subsys/ldirectord 
(code=exited, status=1/FAILURE)
Process: 7565 ExecStopPost=/bin/rm -f /var/lock/subsys/ldirectord 
(code=exited, status=0/SUCCESS)
   Main PID: 7561
  Tasks: 3 (limit: 4915)
 Memory: 71.7M
 CGroup: /system.slice/ldirectord.service
 ├─2547 /usr/bin/perl -w /usr/sbin/ldirectord start
 ├─7078 /usr/bin/perl -w /usr/sbin/ldirectord start
 └─7561 /usr/bin/perl -w /usr/sbin/ldirectord start

  May 09 11:26:22 lp1828258 systemd[1]: Starting Monitor and administer real 
servers in a LVS cluster of load balanced virtual servers...
  May 09 11:26:23 lp1828258 systemd[1]: ldirectord.service: Supervising process 
7561 which is not our child. We'll most likely not notice when it exits.
  May 09 11:26:23 lp1828258 touch[7564]: /usr/bin/touch: cannot touch 
'/var/lock/subsys/ldirectord': No such file or directory

  
  [regression potential]

  if something internal to resource-agents actually uses the old SysV-
  style /var/lock/subsys lock, removing it could cause a regression.
  However, it shouldn't, because the lock was for use only by SysV
  service scripts.  Also, as we should fix this upstream first, they
  should know if it is used for any other purpose, so if they accept the
  change it should be safe.

  [other info]

  this is causing autopkgtest failures, especially on arm; but the
  failure could happen on any arch.

  also note that /var/lock/subsys (where /var/lock/ is a symlink to
  /run/lock) is managed by systemd's tmpfiles, as a 'legacy' directory:

  ubuntu@lp1828258:~$ cat /usr/lib/tmpfiles.d/legacy.conf 
  ...[snip]...
  # These files are considered legacy and are unnecessary on legacy-free
  # systems.

  L /var/lock - - - - ../run/lock

  # /run/lock/subsys is used for serializing SysV service execution, and
  # hence without use on SysV-less 

[Group.of.nepali.translators] [Bug 1840488] Re: Disable Bluetooth in cloud kernels

2020-08-18 Thread Brian Murray
The Eoan Ermine has reached end of life, so this bug will not be fixed
for that release

** Changed in: linux-gcp (Ubuntu Eoan)
   Status: Triaged => Won't Fix

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1840488

Title:
  Disable Bluetooth in cloud kernels

Status in linux-aws package in Ubuntu:
  Triaged
Status in linux-gcp package in Ubuntu:
  Triaged
Status in linux-gke-4.15 package in Ubuntu:
  Invalid
Status in linux-gke-5.0 package in Ubuntu:
  Invalid
Status in linux-oracle package in Ubuntu:
  Triaged
Status in linux-aws source package in Xenial:
  Invalid
Status in linux-gcp source package in Xenial:
  Triaged
Status in linux-gke-4.15 source package in Xenial:
  Invalid
Status in linux-gke-5.0 source package in Xenial:
  Invalid
Status in linux-oracle source package in Xenial:
  Triaged
Status in linux-aws source package in Bionic:
  Triaged
Status in linux-gcp source package in Bionic:
  Triaged
Status in linux-gke-4.15 source package in Bionic:
  Triaged
Status in linux-gke-5.0 source package in Bionic:
  Triaged
Status in linux-oracle source package in Bionic:
  Triaged
Status in linux-aws source package in Disco:
  Won't Fix
Status in linux-gcp source package in Disco:
  Won't Fix
Status in linux-gke-4.15 source package in Disco:
  Invalid
Status in linux-gke-5.0 source package in Disco:
  Invalid
Status in linux-oracle source package in Disco:
  Won't Fix
Status in linux-aws source package in Eoan:
  Won't Fix
Status in linux-gcp source package in Eoan:
  Won't Fix
Status in linux-gke-4.15 source package in Eoan:
  Invalid
Status in linux-gke-5.0 source package in Eoan:
  Invalid
Status in linux-oracle source package in Eoan:
  Won't Fix

Bug description:
  [Impact]

  Some cloud-focused kernels have CONFIG_BT enabled but cloud instances
  shouldn't need bluetooth support. Disabling the bluetooth subsystem
  reduces the amount of security-sensitive code we have to worry about
  in the cloud kernels and also has the nice side effect of minimizing
  build times and kernel sizes.

  The cloud kernels known to have bluetooth enabled include:

  * [B/D/E] linux-aws (arm64 only)
  * [X/B/D/E] linux-gcp
  * [B] linux-gke-4.15
  * [B] linux-gke-5.0
  * [X/B/D/E] linux-oracle

  [Test Case]

  1. Install patched kernel and reboot into it
  2. Ensure that the following command does NOT display any output:
     $ grep CONFIG_BT=[my] /boot/config-$(uname -r)

  [Regression Potential]

  There could be an unexpected dependence on bluetooth within one of the
  clouds but I think it is highly unlikely.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-aws/+bug/1840488/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1842479] Re: timer_create will fail with invalid error code

2020-08-18 Thread Brian Murray
The Eoan Ermine has reached end of life, so this bug will not be fixed
for that release

** Changed in: linux (Ubuntu Eoan)
   Status: Fix Committed => Won't Fix

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1842479

Title:
  timer_create will fail with invalid error code

Status in linux package in Ubuntu:
  In Progress
Status in linux source package in Xenial:
  Fix Committed
Status in linux source package in Bionic:
  Fix Committed
Status in linux source package in Disco:
  Won't Fix
Status in linux source package in Eoan:
  Won't Fix

Bug description:
  [Impact]
  On some OpenPower systems, RTC does not support set_alarm, and 
timer_create(CLOCK_REALTIME_ALARM, ...) will fail with ENOTSUPP instead of 
EOPNOTSUPP. This will break some regression testing that expects the later 
value.

  [Test cases]
  Run LTP syscalls regression testing, which we do before releasing kernels.

  [Regression potential]
  This should not break any userspace, as none should be using/expecting 
ENOTSUPP for any call. In order to do so, they would have to go out of their 
way as it's not defined on libc headers.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1842479/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1870555] Re: SSH authentication fails for many clients due to receiving of SSH_MSG_IGNORE packet

2020-08-18 Thread Brian Murray
The Eoan Ermine has reached end of life, so this bug will not be fixed
for that release

** Changed in: proftpd (Ubuntu Eoan)
   Status: Incomplete => Won't Fix

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1870555

Title:
  SSH authentication fails for many clients due to receiving of
  SSH_MSG_IGNORE packet

Status in proftpd package in Ubuntu:
  Fix Released
Status in proftpd source package in Xenial:
  Incomplete
Status in proftpd source package in Bionic:
  Incomplete
Status in proftpd source package in Eoan:
  Won't Fix

Bug description:
  This bug has been brought to my attention the following:

  There is a Debian bug report
  https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=949622

  The proftpd-basic package suffers from this bug. The impact is very
  widespread. Every person that uses Filezilla client version greater
  than 3.46.1 cannot connect to any Ubuntu server using this proftpd
  package due to the bug.

  As you see in the link above, there is a patch for Debian. So is it
  possible that the support team can get this functionality bug and
  security fix implemented in Xenial and Bionic?

  
https://github.com/proftpd/proftpd/commit/3d17c8419afb10580b942f392f0a5c6de995c4e2

  # Proftpd
  $ git describe --contains 3d17c8419
  v1.3.7rc3~25^2

   proftpd-basic | 1.3.5a-1ubuntu0.1  | xenial-updates/universe
   proftpd-basic | 1.3.5e-1build1 | bionic/universe
   proftpd-basic | 1.3.6-4| disco/universe
   proftpd-basic | 1.3.6-6build2  | eoan/universe
   proftpd-basic | 1.3.6c-2   | focal/universe

  Focal has the patch already:
  ./f/proftpd-dfsg-1.3.6c/debian/patches/upstream_4385

  # Filezilla
   filezilla | 3.15.0.2-1ubuntu1 | xenial/universe  
   filezilla | 3.28.0-1  | bionic/universe  
   filezilla | 3.39.0-2  | disco/universe   
   filezilla | 3.39.0-2  | eoan/universe
   filezilla | 3.46.3-1build1| focal/universe 

  Reference:
  https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=949622
  http://bugs.proftpd.org/show_bug.cgi?id=4385

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/proftpd/+bug/1870555/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1879327] Re: Enforce all config annotations

2020-08-18 Thread Brian Murray
The Eoan Ermine has reached end of life, so this bug will not be fixed
for that release

** Changed in: linux (Ubuntu Eoan)
   Status: Confirmed => Won't Fix

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1879327

Title:
  Enforce all config annotations

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Xenial:
  Confirmed
Status in linux source package in Bionic:
  Confirmed
Status in linux source package in Eoan:
  Won't Fix
Status in linux source package in Focal:
  Fix Released
Status in linux source package in Groovy:
  Fix Released

Bug description:
  [Impact]
  Not all config annotations are enforced, which means config could regress 
without notice.

  [Test case]
  Check the logs mention much more options being enforced. From the hundreds to 
more than 1.

  [Regression potential]
  Builds will start failing when config doesn't match annotations. However, 
this is an opt-in for now, which means only those branches prepared to accept 
it will risk such regression.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1879327/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1814373] Re: storage / luks / dmsetup regressed (or got better) on ppc64le

2020-08-18 Thread Brian Murray
The Eoan Ermine has reached end of life, so this bug will not be fixed
for that release

** Changed in: systemd (Ubuntu Eoan)
   Status: Confirmed => Won't Fix

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1814373

Title:
  storage / luks / dmsetup regressed (or got better) on ppc64le

Status in linux package in Ubuntu:
  Confirmed
Status in systemd package in Ubuntu:
  Confirmed
Status in systemd source package in Xenial:
  Fix Released
Status in linux source package in Bionic:
  New
Status in systemd source package in Bionic:
  Fix Released
Status in linux source package in Cosmic:
  New
Status in systemd source package in Cosmic:
  Fix Released
Status in linux source package in Disco:
  Won't Fix
Status in systemd source package in Disco:
  Fix Released
Status in linux source package in Eoan:
  Confirmed
Status in systemd source package in Eoan:
  Won't Fix
Status in systemd package in Debian:
  Fix Released

Bug description:
  in disco proposed with new systemd and v4.19 kernel it appears that
  dmsetup / cryptsetup storage either got better or worse.

  Devices take very long to activate, and sometimes remain in use during
  test clean up.

  This leads to udisks autopkgtest failing on ppc64le and systemd's
  "storage" autopkgtest is also failing.

  I've tried to make ppc64le test more resilient, but it's still odd
  that it became unstable in disco, and used to be rock solid on
  ppc64le.

  --
  sru template for systemd upload:

  [impact]
  buffer overflow can cause memory corruption; this is seen in failed 
autopkgtests

  [test case]
  see comment 6

  [regression potential]
  the patch is minimal and clearly correct; however the regression potential is 
around invalid/corrupted keys read from the keyring.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1814373/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1845048] Re: Improve sysctl handling on kdump-tools

2020-08-18 Thread Brian Murray
The Eoan Ermine has reached end of life, so this bug will not be fixed
for that release

** Changed in: makedumpfile (Ubuntu Eoan)
   Status: In Progress => Won't Fix

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1845048

Title:
  Improve sysctl handling on kdump-tools

Status in makedumpfile package in Ubuntu:
  In Progress
Status in makedumpfile source package in Xenial:
  Opinion
Status in makedumpfile source package in Bionic:
  In Progress
Status in makedumpfile source package in Eoan:
  Won't Fix
Status in makedumpfile source package in Focal:
  In Progress
Status in makedumpfile source package in Groovy:
  In Progress
Status in makedumpfile package in Debian:
  New

Bug description:
  [impact]

  Documentation, and past behavior, for kdump-tools was that the
  KDUMP_SYSCTL variable in the /etc/default/kdump-tools file would be
  applied to the system kernel params at kdump 'load'.  However this is
  no longer true, and those params are no longer applied to the system's
  kernel param settings.

  [test case]

  install linux-crashdump (and kdump-tools).

  Edit the /etc/default/kdump-tools file to set the KDUMP_SYSCTL param
  to something other than default, e.g.:

  KDUMP_SYSCTL="kernel.panic_on_oops=1 kernel.panic_on_warn=1"

  reboot, or unload/reload kdump, to pick up the changes to the file.

  Check if the panic_on_warn param is set:

  $ cat /proc/sys/kernel/panic_on_warn
  0

  the problem does not seem to be with sysctl, as manually calling it
  does work:

  $ KDUMP_SYSCTL="kernel.panic_on_oops=1 kernel.panic_on_warn=1"
  $ cat /proc/sys/kernel/panic_on_warn
  0
  $ sudo sysctl -w $KDUMP_SYSCTL
  kernel.panic_on_oops = 1
  kernel.panic_on_warn = 1
  $ cat /proc/sys/kernel/panic_on_warn
  1

  [regression potential]

  TBD

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/makedumpfile/+bug/1845048/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1437359] Re: A PIDFILE is double-defined for the corosync-notifyd init script

2020-08-18 Thread Brian Murray
The Eoan Ermine has reached end of life, so this bug will not be fixed
for that release

** Changed in: corosync (Ubuntu Eoan)
   Status: Triaged => Won't Fix

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1437359

Title:
  A PIDFILE is double-defined for the corosync-notifyd init script

Status in corosync package in Ubuntu:
  Fix Released
Status in corosync source package in Trusty:
  Won't Fix
Status in corosync source package in Xenial:
  Triaged
Status in corosync source package in Bionic:
  Triaged
Status in corosync source package in Disco:
  Won't Fix
Status in corosync source package in Eoan:
  Won't Fix
Status in corosync source package in Focal:
  Fix Released

Bug description:
  A /etc/init.d/corosync-notifyd contains two definitions for the PIDFILE:
  > PIDFILE=/var/run/$NAME.pid
  > SCRIPTNAME=/etc/init.d/$NAME
  > PIDFILE=/var/run/corosync.pid

  The first one is correct and the second one is wrong as it refers to
  the corosync service's pidfile instead

  The corosync package version is 2.3.3-1ubuntu1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/corosync/+bug/1437359/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1710278] Re: [2.3a1] named stuck on reload, DNS broken

2020-08-18 Thread Brian Murray
The Eoan Ermine has reached end of life, so this bug will not be fixed
for that release

** Changed in: bind9 (Ubuntu Eoan)
   Status: In Progress => Won't Fix

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1710278

Title:
  [2.3a1] named stuck on reload, DNS broken

Status in BIND:
  Fix Released
Status in MAAS:
  Fix Released
Status in MAAS 2.2 series:
  Fix Released
Status in MAAS 2.4 series:
  Fix Committed
Status in MAAS 2.6 series:
  Fix Released
Status in MAAS 2.7 series:
  Fix Released
Status in bind9 package in Ubuntu:
  In Progress
Status in maas package in Ubuntu:
  Confirmed
Status in bind9 source package in Xenial:
  In Progress
Status in bind9 source package in Bionic:
  In Progress
Status in maas source package in Bionic:
  In Progress
Status in bind9 source package in Disco:
  Won't Fix
Status in bind9 source package in Eoan:
  Won't Fix

Bug description:
  [Impact]

   * systemd thinks the service is running, but it does not respond to
  any commands or requests. Also, it doesn't respond to signals other
  than kill -9. service restarts hang, rndc hangs.

   * being that the deadlock is in bind9 that ships in bionic the issue
  needs to be backported to 2.4.3 so MAAS from the archive in bionic can
  handle the deadlock and get bind9 unstuck.

   * change in MAAS watches for this case to occur with bind9, then MAAS
  will force kill the service and restart it.

  [Test Case]

   * very hard to reproduce but the issue occurs when bind9 deadlocks,
  it response to nothing over the network or rndc. SIGTERM does not kill
  it only SIGKILL works to force kill the process and get systemd to
  restart it.

  
  [Regression Potential] 

   * possible that bind9 will not be started correctly or possible that
  bind9 will be placed into a forever restart loop

To manage notifications about this bug go to:
https://bugs.launchpad.net/bind/+bug/1710278/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1638210] Re: saidar segmentation fault

2020-08-18 Thread Brian Murray
The Eoan Ermine has reached end of life, so this bug will not be fixed
for that release

** Changed in: libstatgrab (Ubuntu Eoan)
   Status: Incomplete => Won't Fix

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1638210

Title:
  saidar segmentation fault

Status in libstatgrab package in Ubuntu:
  Fix Released
Status in libstatgrab source package in Xenial:
  Incomplete
Status in libstatgrab source package in Bionic:
  Incomplete
Status in libstatgrab source package in Eoan:
  Won't Fix
Status in libstatgrab package in Debian:
  Fix Released

Bug description:
  Erreur de segmentation (core dumped)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libstatgrab/+bug/1638210/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1831940] Re: hibernation support for linux-aws

2020-08-18 Thread Brian Murray
The Eoan Ermine has reached end of life, so this bug will not be fixed
for that release

** Changed in: linux-aws-5.0 (Ubuntu Eoan)
   Status: Confirmed => Won't Fix

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1831940

Title:
  hibernation support for linux-aws

Status in linux-aws package in Ubuntu:
  Fix Released
Status in linux-aws-5.0 package in Ubuntu:
  Invalid
Status in linux-aws source package in Xenial:
  Fix Released
Status in linux-aws-5.0 source package in Xenial:
  Invalid
Status in linux-aws source package in Bionic:
  Fix Released
Status in linux-aws-5.0 source package in Bionic:
  Fix Released
Status in linux-aws source package in Disco:
  Won't Fix
Status in linux-aws-5.0 source package in Disco:
  Invalid
Status in linux-aws source package in Eoan:
  Fix Released
Status in linux-aws-5.0 source package in Eoan:
  Won't Fix
Status in linux-aws source package in Focal:
  Fix Released
Status in linux-aws-5.0 source package in Focal:
  Invalid

Bug description:
  Additional AWS-specific and mainline patches are required to support
  hibernation across the various types of AWS instances.

  The following patch sets for linux-aws-xenial and linux-aws-bionic
  provide the necessary functionality, and should only impact the
  hibernation and resume paths.

  [linux-aws-xenial]

  UBUNTU SAUCE [aws]: block: xen-blkfront: consider new dom0 features on restore
  UBUNTU SAUCE [aws]: ACPICA: Enable sleep button on ACPI legacy wake
  UBUNTU SAUCE [aws]: xen: restore pirqs on resume from hibernation.
  UBUNTU SAUCE [aws]: xen: Only restore the ACPI SCI interrupt in 
xen_restore_pirqs.
  radix-tree: delete radix_tree_locate_item()
  mm: rid swapoff of quadratic complexity
  sched/wait: Fix abort_exclusive_wait(), it should pass TASK_NORMAL to 
wake_up()
  sched/wait: Avoid abort_exclusive_wait() in ___wait_event()
  sched/wait: Avoid abort_exclusive_wait() in __wait_on_bit_lock()
  sched/wait: Introduce init_wait_entry()
  sched/wait: Standardize wait_bit_queue naming
  sched/wait: Introduce wait_var_event()
  mm: swapoff: shmem_unuse() stop eviction without igrab()
  UBUNTU SAUCE [aws]: mm: aggressive swapoff
  UBUNTU SAUCE [aws]: PM / hibernate: make sure pm_async is always disabled
  NVMe: Allow request merges
  PM / hibernate: Do not free preallocated safe pages during image restore
  PM / hibernate: Recycle safe pages after image restoration
  PM / hibernate: Simplify mark_unsafe_pages()
  UBUNTU: [Config] aws: disable CONFIG_TRANSPARENT_HUGEPAGE_ALWAYS
  UBUNTU SAUCE [aws] PM / hibernate: set image_size to total RAM size by default
  UBUNTU SAUCE [aws] PM / hibernate: reduce memory pressure during image writing
  UBUNTU SAUCE [aws] mm, page_alloc: disable fair zone allocation policy on 
hibernate

  [linux-aws-bionic]

  UBUNTU SAUCE [aws]: block: xen-blkfront: consider new dom0 features on restore
  UBUNTU SAUCE [aws]: ACPICA: Enable sleep button on ACPI legacy wake
  UBUNTU SAUCE [aws]: xen: restore pirqs on resume from hibernation.
  UBUNTU SAUCE [aws]: xen: Only restore the ACPI SCI interrupt in 
xen_restore_pirqs.
  mm: rid swapoff of quadratic complexity
  sched/wait: Introduce wait_var_event()
  mm: swapoff: shmem_unuse() stop eviction without igrab()
  UBUNTU SAUCE [aws]: mm: aggressive swapoff
  netlink: Don't shift on 64 for ngroups

  [linux-aws-edge-bionic]

  UBUNTU SAUCE [aws]: xen: Only restore the ACPI SCI interrupt in 
xen_restore_pirqs.
  UBUNTU SAUCE [aws]: xen: restore pirqs on resume from hibernation.
  UBUNTU SAUCE [aws]: block: xen-blkfront: consider new dom0 features on restore
  UBUNTU SAUCE [aws]: ACPICA: Enable sleep button on ACPI legacy wake
  UBUNTU SAUCE [aws]: PM / hibernate: set image_size to 0 by default
  UBUNTU SAUCE [aws]: PM / hibernate: make sure pm_async is always disabled
  UBUNTU SAUCE [aws]: mm: swap: improve swap readahead heuristic
  UBUNTU SAUCE [aws] PM / hibernate: reduce memory pressure during image writing
  PM / hibernate: memory_bm_find_bit(): Tighten node optimisation
  mm: rid swapoff of quadratic complexity
  mm: refactor swap-in logic out of shmem_getpage_gfp

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-aws/+bug/1831940/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1800873] Re: Add KDUMP_CMDLINE_REMOVE option to remove portions of kernel command-line

2020-08-18 Thread Brian Murray
The Eoan Ermine has reached end of life, so this bug will not be fixed
for that release

** Changed in: makedumpfile (Ubuntu Eoan)
   Status: Confirmed => Won't Fix

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1800873

Title:
  Add KDUMP_CMDLINE_REMOVE option to remove portions of kernel command-
  line

Status in makedumpfile package in Ubuntu:
  Confirmed
Status in makedumpfile source package in Xenial:
  Won't Fix
Status in makedumpfile source package in Bionic:
  Confirmed
Status in makedumpfile source package in Eoan:
  Won't Fix
Status in makedumpfile source package in Focal:
  Confirmed
Status in makedumpfile source package in Groovy:
  Confirmed

Bug description:
  Currently kdump has an useful option to append parameters to the kdump
  kernel command-line, "KDUMP_CMDLINE_APPEND". Would be useful to have a
  reciprocal option which users could use to remove parameters without
  needing to rewrite the whole line.

  The option name proposed here is KDUMP_CMDLINE_REMOVE, which would
  tentatively "sed"-out the options from the kernel command-line before
  appending the new ones from KDUMP_CMDLINE_APPEND.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/makedumpfile/+bug/1800873/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1677684] Re: /usr/bin/corosync-blackbox: 34: /usr/bin/corosync-blackbox: qb-blackbox: not found

2020-08-18 Thread Brian Murray
The Eoan Ermine has reached end of life, so this bug will not be fixed
for that release

** Changed in: corosync (Ubuntu Eoan)
   Status: Confirmed => Won't Fix

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1677684

Title:
  /usr/bin/corosync-blackbox: 34: /usr/bin/corosync-blackbox: qb-
  blackbox: not found

Status in corosync package in Ubuntu:
  Fix Released
Status in corosync source package in Trusty:
  Won't Fix
Status in corosync source package in Xenial:
  Confirmed
Status in corosync source package in Zesty:
  Won't Fix
Status in corosync source package in Bionic:
  Confirmed
Status in corosync source package in Disco:
  Won't Fix
Status in corosync source package in Eoan:
  Won't Fix
Status in corosync source package in Focal:
  Fix Released

Bug description:
  [Environment]

  Ubuntu Xenial 16.04
  Amd64

  [Test Case]

  1) sudo apt-get install corosync
  2) sudo corosync-blackbox.

  root@juju-niedbalski-xenial-machine-5:/home/ubuntu# dpkg -L corosync |grep 
black
  /usr/bin/corosync-blackbox

  Expected results: corosync-blackbox runs OK.

  Current results:

  $ sudo corosync-blackbox
  /usr/bin/corosync-blackbox: 34: /usr/bin/corosync-blackbox: qb-blackbox: not 
found

  [Impact]

   * Cannot run corosync-blackbox

  [Regression Potential]

  * None identified.

  [Fix]
  Make the package dependant of libqb-dev

  root@juju-niedbalski-xenial-machine-5:/home/ubuntu# dpkg -L libqb-dev | grep 
qb-bl
  /usr/sbin/qb-blackbox

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/corosync/+bug/1677684/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1845687] Re: memory test in ubuntu_kvm_unit tests fails Xenial linux-kvm

2020-08-18 Thread Brian Murray
The Eoan Ermine has reached end of life, so this bug will not be fixed
for that release

** Changed in: linux-kvm (Ubuntu Eoan)
   Status: New => Won't Fix

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1845687

Title:
  memory test in ubuntu_kvm_unit tests fails Xenial linux-kvm

Status in ubuntu-kernel-tests:
  Triaged
Status in linux-kvm package in Ubuntu:
  New
Status in linux-kvm source package in Xenial:
  New
Status in linux-kvm source package in Eoan:
  Won't Fix

Bug description:
  Series: Xenial
  Kernel: 4.4.0-1059.66 linux-kvm

  specifically clfushopt and clwb

  09/23 08:43:08 DEBUG| utils:0116| Running 'kvm-ok'
  09/23 08:43:08 DEBUG| utils:0153| [stdout] INFO: /dev/kvm exists
  09/23 08:43:08 DEBUG| utils:0153| [stdout] KVM acceleration can be used
  09/23 08:43:08 DEBUG| utils:0116| Running 
'/home/ubuntu/autotest/client/tmp/ubuntu_kvm_unit_tests/src/kvm-unit-tests/tests/memory'
  09/23 08:43:08 DEBUG| utils:0153| [stdout] BUILD_HEAD=e2c275c4
  09/23 08:43:09 DEBUG| utils:0153| [stdout] timeout -k 1s --foreground 90s 
/usr/bin/qemu-system-x86_64 -nodefaults -device pc-testdev -device 
isa-debug-exit,iobase=0xf4,iosize=0x4 -vnc none -serial stdio -device 
pci-testdev -machine accel=kvm -kernel /tmp/tmp.HnxXwZrpQ9 -smp 1 -cpu host # 
-initrd /tmp/tmp.SL7FtNHKpq
  09/23 08:43:09 DEBUG| utils:0153| [stdout] enabling apic
  09/23 08:43:09 DEBUG| utils:0153| [stdout] PASS: clflush (present)
  09/23 08:43:09 DEBUG| utils:0153| [stdout] PASS: sfence (present)
  09/23 08:43:09 DEBUG| utils:0153| [stdout] PASS: lfence (present)
  09/23 08:43:09 DEBUG| utils:0153| [stdout] PASS: mfence (present)
  09/23 08:43:09 DEBUG| utils:0153| [stdout] FAIL: clflushopt (ABSENT)
  09/23 08:43:09 DEBUG| utils:0153| [stdout] FAIL: clwb (ABSENT)
  09/23 08:43:09 DEBUG| utils:0153| [stdout] PASS: invalid clwb
  09/23 08:43:09 DEBUG| utils:0153| [stdout] PASS: pcommit (ABSENT)
  09/23 08:43:09 DEBUG| utils:0153| [stdout] SUMMARY: 8 tests, 2 unexpected 
failures
  09/23 08:43:09 DEBUG| utils:0153| [stdout] FAIL memory (8 tests, 2 
unexpected failures)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1845687/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1864092] Re: quotactl07 from ubuntu_ltp_syscalls failed

2020-08-18 Thread Brian Murray
The Eoan Ermine has reached end of life, so this bug will not be fixed
for that release

** Changed in: linux (Ubuntu Eoan)
   Status: Fix Committed => Won't Fix

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1864092

Title:
  quotactl07 from ubuntu_ltp_syscalls failed

Status in ubuntu-kernel-tests:
  Fix Released
Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Xenial:
  Fix Released
Status in linux source package in Bionic:
  Fix Released
Status in linux source package in Disco:
  Won't Fix
Status in linux source package in Eoan:
  Won't Fix

Bug description:
  == SRU Justification ==
  This quotactl07 is a new test case added in LTP test suite, 

  The test will fail with:
<<>>
incrementing stop
tst_kconfig.c:62: INFO: Parsing kernel config 
'/boot/config-5.0.0-38-generic'
tst_device.c:244: INFO: Using test device LTP_DEV='/dev/loop4'
tst_mkfs.c:90: INFO: Formatting /dev/loop4 with xfs opts='' extra opts=''
tst_test.c:1217: INFO: Timeout per run is 0h 05m 00s
quotactl07.c:34: FAIL: Q_XQUOTARM doesn't have quota type check

HINT: You _MAY_ be missing kernel fixes, see:

  
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3dd4d40b4208

  == Fix ==
  * 3dd4d40b (xfs: Sanity check flags of Q_XQUOTARM call)

  Focal got this patch from stable update. This patch can be cherry-
  picked into all the other kernels.

  == Test ==
  Test kernels could be found here:
  https://people.canonical.com/~phlin/kernel/lp-1864092-quotactl07/

  All patched kernels are working as expected,

  == Regression Potential ==
  Low, change limited to quota on XFS, and it's just adding a check for the 
flags.

  
  == Original Bug Report ==
  Initially Found:
  Cloud: GCP
  Kernel: 5.0.0-1032.33
  Test: ubuntu_ltp_syscalls

  02/20 15:04:55 DEBUG| utils:0153| [stdout] startup='Thu Feb 20 14:49:24 
2020'
  02/20 15:04:55 DEBUG| utils:0153| [stdout] tst_kconfig.c:62: INFO: 
Parsing kernel config '/boot/config-5.0.0-1032-gcp'
  02/20 15:04:55 DEBUG| utils:0153| [stdout] tst_device.c:244: INFO: Using 
test device LTP_DEV='/dev/loop2'
  02/20 15:04:55 DEBUG| utils:0153| [stdout] tst_mkfs.c:90: INFO: 
Formatting /dev/loop2 with xfs opts='' extra opts=''
  02/20 15:04:55 DEBUG| utils:0153| [stdout] tst_test.c:1217: INFO: Timeout 
per run is 0h 05m 00s
  02/20 15:04:55 DEBUG| utils:0153| [stdout] quotactl07.c:34: FAIL: 
Q_XQUOTARM doesn't have quota type check
  02/20 15:04:55 DEBUG| utils:0153| [stdout]
  02/20 15:04:55 DEBUG| utils:0153| [stdout] HINT: You _MAY_ be missing 
kernel fixes, see:
  02/20 15:04:55 DEBUG| utils:0153| [stdout]
  02/20 15:04:55 DEBUG| utils:0153| [stdout] 
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3dd4d40b4208
  02/20 15:04:55 DEBUG| utils:0153| [stdout]
  02/20 15:04:55 DEBUG| utils:0153| [stdout] Summary:
  02/20 15:04:55 DEBUG| utils:0153| [stdout] passed   0
  02/20 15:04:55 DEBUG| utils:0153| [stdout] failed   1
  02/20 15:04:55 DEBUG| utils:0153| [stdout] skipped  0
  02/20 15:04:55 DEBUG| utils:0153| [stdout] warnings 0
  02/20 15:04:55 DEBUG| utils:0153| [stdout] tag=quotactl07 
stime=1582210164 dur=4 exit=exited stat=1 core=no cu=0 cs=0
  02/20 15:04:55 DEBUG| utils:0153| [stdout] startup='Thu Feb 20 14:49:29 
2020'
  02/20 15:04:55 DEBUG| utils:0153| [stdout] tst_test.c:1217: INFO: Timeout 
per run is 0h 05m 00s
  02/20 15:04:55 DEBUG| utils:0153| [stdout] read01.c:24: PASS: read(2) 
returned 512

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1864092/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1882180] Re: DoS vulnerability: fail to allocate

2020-08-18 Thread Brian Murray
The Eoan Ermine has reached end of life, so this bug will not be fixed
for that release

** Changed in: whoopsie (Ubuntu Eoan)
   Status: Confirmed => Won't Fix

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1882180

Title:
  DoS vulnerability: fail to allocate

Status in whoopsie package in Ubuntu:
  Fix Released
Status in whoopsie source package in Xenial:
  Fix Released
Status in whoopsie source package in Bionic:
  Fix Released
Status in whoopsie source package in Eoan:
  Won't Fix
Status in whoopsie source package in Focal:
  Fix Released
Status in whoopsie source package in Groovy:
  Fix Released

Bug description:
  Hi,

  I have found a security issue on whoopsie 0.2.69 and earlier.

  # Vulnerability description
  In whoopsie 0.2.69 and earlier, there is a denial of service vulnerability in 
the parse_report function.
  A crafted input, i.e., crash report located in '/var/crash/', will lead to a 
denial of service attack.
  During the parsing of the crash report, the data length is not checked.   
  
  The value of data length can be directly controlled by an input file. 
  
  In the parse_report() function, the g_malloc or g_realloc is called based on 
data length.
  If we set the value of data length close to the amount of system memory, it 
will cause the daemon process to terminate unexpectedly, hang the system, or 
trigger the OOM killer.

  # PoC
  Please check the below whoopsie_killer2.py

  Sincerely,

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/whoopsie/+bug/1882180/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1880832] Re: [SRU] backport wslu 2.3.6-0ubuntu1 to all current supported releases

2020-08-18 Thread Brian Murray
The Eoan Ermine has reached end of life, so this bug will not be fixed
for that release

** Changed in: wslu (Ubuntu Eoan)
   Status: New => Won't Fix

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1880832

Title:
  [SRU] backport wslu 2.3.6-0ubuntu1 to all current supported releases

Status in wslu package in Ubuntu:
  Fix Released
Status in wslu source package in Xenial:
  New
Status in wslu source package in Bionic:
  New
Status in wslu source package in Eoan:
  Won't Fix

Bug description:
  [Impact]

  The package is already released in focal/groovy but it still affects
  eoan/bionic/xenial, a SRU is needed.

  [Test Case]

   * Follow the testing process outlined in https://wiki.ubuntu.com/wslu-Updates
   * Run the autopktest in a WSL environment where the user name contains space.
   * Verify the other individual bugs fixed by the SRU.

  [Regression Potential]

  * There is a issue on #1877016 which is already addressed in the next
  release, but I hope to SRU the current packages in order to prevent
  future issues when SRUing.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/wslu/+bug/1880832/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1875092] Re: support v5.4 syscalls

2020-08-18 Thread Brian Murray
The Eoan Ermine has reached end of life, so this bug will not be fixed
for that release

** Changed in: libseccomp (Ubuntu Eoan)
   Status: New => Won't Fix

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1875092

Title:
  support v5.4 syscalls

Status in libseccomp package in Ubuntu:
  Fix Released
Status in libseccomp source package in Xenial:
  New
Status in libseccomp source package in Bionic:
  New
Status in libseccomp source package in Eoan:
  Won't Fix

Bug description:
  [Impact]

   * update libssecomp syscalls, for example current seccomp on xenial
  and up, cannot correctly filter calls for focal armhf chroots on v5.4
  kernels, due to new syscalls usage.

  [Test Case]

   * Boot v5.4 kernel
   * Use seccomp to try to resolve new syscall numbers

   * Rebuild snapd snap against bileto ppa with this change
   * Test that this rebuild snapd snap, can correctly launch confined python 
armhf interpreter on arm64 v5.4 kernel (i.e. uc20 raspi arm64 beta image)

  [Regression Potential]

   * The issue only impacts when one is running on a newer / hwe kernel,
  and tries to seccomp filter newer binaries that use new syscalls. No
  changes are made to any existing syscalls or apis.

  [Other Info]

   * Bileto PPA with this change is being prepared with this change.

  xenial: https://bileto.ubuntu.com/#/ticket/4041
  bionic: https://bileto.ubuntu.com/#/ticket/4040
  eoan: https://bileto.ubuntu.com/#/ticket/4039

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libseccomp/+bug/1875092/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1885248] Re: Update intel-microcode to latest upstream release 20200616 to fix possible regression in 06-5e-03/0x000506e3

2020-08-18 Thread Brian Murray
The Eoan Ermine has reached end of life, so this bug will not be fixed
for that release

** Changed in: intel-microcode (Ubuntu Eoan)
   Status: New => Won't Fix

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1885248

Title:
  Update intel-microcode to latest upstream release 20200616 to fix
  possible regression in 06-5e-03/0x000506e3

Status in intel-microcode package in Ubuntu:
  New
Status in intel-microcode source package in Xenial:
  New
Status in intel-microcode source package in Bionic:
  New
Status in intel-microcode source package in Eoan:
  Won't Fix
Status in intel-microcode source package in Focal:
  New
Status in intel-microcode source package in Groovy:
  New

Bug description:
  As a result of https://bugs.launchpad.net/ubuntu/+source/intel-
  microcode/+bug/1882890 the microcode for 06-4e-03 was reverted from
  the most recent intel-microcode release to the previous one - Intel
  has subsequently released a new upstream release
  https://github.com/intel/Intel-Linux-Processor-Microcode-Data-
  Files/releases/tag/microcode-20200616 which includes this revert *as
  well as a revert for the 06-5e-03/0x000506e3 microcode too*. This
  should also be updated in Ubuntu to ensure we do not suffer any
  unexpected regressions on these platforms too.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/intel-microcode/+bug/1885248/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1582811] Re: update-grub produces broken grub.cfg with ZFS mirror volume

2020-08-18 Thread Brian Murray
The Eoan Ermine has reached end of life, so this bug will not be fixed
for that release

** Changed in: grub2 (Ubuntu Eoan)
   Status: Confirmed => Won't Fix

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1582811

Title:
  update-grub produces broken grub.cfg with ZFS mirror volume

Status in grub2 package in Ubuntu:
  Confirmed
Status in grub2 source package in Xenial:
  Confirmed
Status in grub2 source package in Bionic:
  Confirmed
Status in grub2 source package in Disco:
  Won't Fix
Status in grub2 source package in Eoan:
  Won't Fix
Status in grub2 source package in Focal:
  Confirmed

Bug description:
  When running update-grub on Xenial with an mirrored ZFS root, broken
  grub.cfg files are consistently produced due to the root= line being
  formatted with block devices and a newline inserted.

  Specifically I get a line like so:
linux   /ROOT/mint-13@/boot/vmlinuz-4.6.0-040600-generic root=/dev/sdj1
  /dev/sdi3 ro   nomdmonddf nomdmonisw

  The newline is what's included.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/grub2/+bug/1582811/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1800562] Re: Remove obsolete "nousb" option in kdump command-line for newer kernels

2020-08-18 Thread Brian Murray
The Eoan Ermine has reached end of life, so this bug will not be fixed
for that release

** Changed in: makedumpfile (Ubuntu Eoan)
   Status: Confirmed => Won't Fix

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1800562

Title:
  Remove obsolete "nousb" option in kdump command-line for newer kernels

Status in makedumpfile package in Ubuntu:
  Confirmed
Status in makedumpfile source package in Xenial:
  Won't Fix
Status in makedumpfile source package in Bionic:
  Confirmed
Status in makedumpfile source package in Eoan:
  Won't Fix
Status in makedumpfile source package in Focal:
  Confirmed
Status in makedumpfile source package in Groovy:
  Confirmed

Bug description:
  [Impact]
  * Kdump command-line include an obsolete "nousb" parameter by default, which 
can cause a misimpression: users will think they are not booting with USB, but 
they are.

  * Since kernel v4.5, the correct parameter to disable USB subsystem
  initialization is "usbcore.nousb" always (instead of "nousb" in case
  the subsystem is built-in). This was changed by commit 097a9ea0e48
  ("usb: make "nousb" a clear module parameter").

  * USB may be pretty essential in case for example kdump users need to
  decrypt a disk under LUKS, and there's only an USB keyboard connected
  to the system. Given the option is innocuous since Bionic, we should
  just drop it to prevent confusion.

  
  [Test Case]

  1) Deploy a Disco VM e.g. with uvt-kvm
  2) Install the kdump-tools package
  3) Run `kdump-config test`and check for the 'nousb' parameter:

  $ kdump-config test
  ...
  kexec command to be used:
    /sbin/kexec -p --command-line="BOOT_IMAGE=/boot/vmlinuz-4.15.0-45-generic 
root=LABEL=cloudimg-rootfs ro console=tty1 console=ttyS0 nr_cpus=1 
systemd.unit=kdump-tools.service irqpoll nousb ata_piix.prefer_ms_hyperv=0" 
/var/lib/kdump/vmlinuz

  
  [Regression Potential]

  The regression potential is extremely low, since the "nousb" parameter
  is not used since Bionic although is there. Any bugs we would have by
  changing this are still valid by not removing the option - the
  semantics with or without "nosub" is the same since from Bionic.

  NOTICE we won't change Xenial, it can use kernel 4.4 which indeed
  disables USB by taking the "nousb" parameter.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/makedumpfile/+bug/1800562/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1770093] Re: Ubiquity crashes with mount points that are FAT16/32

2020-08-18 Thread Brian Murray
The Eoan Ermine has reached end of life, so this bug will not be fixed
for that release

** Changed in: partman-basicfilesystems (Ubuntu Eoan)
   Status: In Progress => Won't Fix

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1770093

Title:
  Ubiquity crashes with mount points that are FAT16/32

Status in partman-basicfilesystems package in Ubuntu:
  In Progress
Status in partman-basicfilesystems source package in Xenial:
  In Progress
Status in partman-basicfilesystems source package in Bionic:
  In Progress
Status in partman-basicfilesystems source package in Eoan:
  Won't Fix
Status in partman-basicfilesystems source package in Focal:
  In Progress

Bug description:
  [impact]

  when installing on pi with ubiquity, the /boot/firmware partition gets
  mounted with extra parameters that causes ubiquity to crash.

  [test case]

  see original description.

  [regression potential]

  this removes the additional mount params from (only) the
  /boot/firmware mount, so any regression would likely involve problems
  with that partition.  Also since this patches the installation path,
  regressions may occur during installation.

  [scope]

  Debian does not include the extra mount parameters, so Debian does not
  need patching.

  This package has been unchanged since bionic.  The code needing
  patching is unchanged between xenial and bionic.

  This needs patching in all releases (Xenial, Bionic, Eoan, Focal).

  [original description]

  Hi, I've used ubiquity as an installer for the Raspberry Pi 2/3.  One
  of the quirks of the Pi is its need for a FAT formatted boot
  partition.  The Pi packages (flash-kernel etc) expect this to be
  mounted at /boot/firmware.  However if I give ubiquity this mount
  point then it soon crashes.

  I believe the problem is to do with the mount options that are
  automatically given to fat partitions.  I've solved this by applying a
  patch to the partman-basicfilesystems package.  Please see attached.

  I'm not sure whether this is the correct fix, or a more generic fix
  should be applied to ubiquity and FAT partitions.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/partman-basicfilesystems/+bug/1770093/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1825755] Re: apt-mirror in all versions (including disco and last from github) doesn't mirror Commands-* files

2020-08-18 Thread Brian Murray
The Eoan Ermine has reached end of life, so this bug will not be fixed
for that release

** Changed in: apt-mirror (Ubuntu Eoan)
   Status: Triaged => Won't Fix

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1825755

Title:
  apt-mirror in all versions (including disco and last from github)
  doesn't mirror Commands-* files

Status in apt-mirror package in Ubuntu:
  Triaged
Status in apt-mirror source package in Xenial:
  Confirmed
Status in apt-mirror source package in Bionic:
  Triaged
Status in apt-mirror source package in Eoan:
  Won't Fix
Status in apt-mirror source package in Focal:
  Triaged
Status in apt-mirror source package in Groovy:
  Triaged

Bug description:
  [Impact]

  * since ubuntu disco, main repositories contains 'cnf' directory with
  'Commands*' files. those files are compressed with xy, whereas apt-
  mirror 0.5.1 doesn't contain the patch which enable download of .xz
  compressed files

  * Without this update, users are not able to mirror newer releases of
  Ubuntu.

  [Test Case]

  * On any release of Ubuntu install apt-mirror and add this line to
  /etc/apt/mirror.list:

  deb http://archive.ubuntu.com/ubuntu eoan-updates main restricted
  universe multiverse

  * sync the mirror using `apt-mirror`

  * Attempt to run `apt update` against the mirror. The result will be
  similar to:

  ...
  Err:7 http://10.3.0.41/ubuntu eoan-updates/main amd64 c-n-f Metadata
    404  Not Found [IP: 10.3.0.41 80]
  Ign:14 http://10.3.0.41/ubuntu eoan-updates/multiverse amd64 c-n-f Metadata
  Ign:15 http://10.3.0.41/ubuntu eoan-updates/universe amd64 c-n-f Metadata
  Ign:16 http://10.3.0.41/ubuntu eoan-updates/restricted amd64 c-n-f Metadata
  Reading package lists... Done
  E: Failed to fetch 
http://10.3.0.41/ubuntu/dists/eoan-updates/main/cnf/Commands-amd64  404  Not 
Found [IP: 10.3.0.41 80]
  E: Some index files failed to download. They have been ignored, or old ones 
used instead.
  ...

  * Updating the apt-mirror package from ppa:slashd/test and then re-
  running the `apt-mirror` command will then allow a successful `apt
  update`.

  [Regression Potential]

  * The regression potential is low since the package doesn't currently
  work properly anyway.

  * It's a patchset from a fork repo, if apt-mirror upstream becomes
  alive again in the future, it won't necessary mean that the fork will
  be commited/merged upstream, and Ubuntu package might differ from
  original upstream until next version bump.

  [Other informations]

  Upstream bug:
  https://github.com/apt-mirror/apt-mirror/issues/118

  Not much update has been made since Upstream become inactive as noted
  from the output of rmadison:

  Since Bionic, it is a simple copy from release to active devel release
  and so on directly from debian, no patching whatsoever and nothing new
  to pull from Debian as well.

  
  Ubuntu
   apt-mirror | 0.5.1-1ubuntu1   | xenial/universe  | source, all
   apt-mirror | 0.5.4-1  | bionic/universe  | source, all
   apt-mirror | 0.5.4-1  | disco/universe   | source, all
   apt-mirror | 0.5.4-1  | eoan/universe| source, all
   apt-mirror | 0.5.4-1  | focal/universe   | source, all
   apt-mirror | 0.5.4-1  | groovy/universe  | source, all

  Debian
  apt-mirror 0.5.4-1 is found in sid/unstable
  ---

  The required patchset is from a fork of upstream apt-mirror josbraden
  /apt-mirror (https://github.com/josbraden/apt-mirror)

  Note that upstream apt-mirror is not active anymore, and is looking
  for a new maintainer as published in their github page:
  https://github.com/apt-mirror/apt-mirror

  That's why we have to rely on the fork atm.

  The required patchset are (tested by Chris in the form of a test pkg:
  0001-Copy-DEP-11-functions-for-editing.patch
  0001-Replace-DEP-11-with-cnf-in-DEP-11-code-copy.patch
  0001-Fix-Regex.patch
  0001-Improve-regex-for-cnf-file-matching.patch
  0001-Remove-dev-note.patch
  0001-Fix-missing-parenthesis.patch

  I also talked with sil2100 (SRU verification team member) about the
  feasibilty of this SRU (from a fork repo):

  "
   Yeah, I'd say fixes from forked repositories in this case make 
sense Since there's no longer any 'one authority' for it.
  "

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apt-mirror/+bug/1825755/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1816743] Re: Add systemd's kdump service command-line regardless if user provides or not KDUMP_CMDLINE_APPEND

2020-08-18 Thread Brian Murray
The Eoan Ermine has reached end of life, so this bug will not be fixed
for that release

** Changed in: makedumpfile (Ubuntu Eoan)
   Status: Confirmed => Won't Fix

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1816743

Title:
  Add systemd's kdump service command-line regardless if user provides
  or not KDUMP_CMDLINE_APPEND

Status in makedumpfile package in Ubuntu:
  Confirmed
Status in makedumpfile source package in Xenial:
  Won't Fix
Status in makedumpfile source package in Bionic:
  Confirmed
Status in makedumpfile source package in Eoan:
  Won't Fix
Status in makedumpfile source package in Focal:
  Confirmed
Status in makedumpfile source package in Groovy:
  Confirmed

Bug description:
  Since Xenial release, Ubuntu relies on systemd as its init system -
  there's a kdump service to prevent some other services to
  unnecessarily start in kdump environment.

  Problem: if we add something to KDUMP_CMDLINE_APPEND, the entry for
  kdump service, "systemd.unit=kdump-tools.service" is removed from the
  command-line. The user manually needs to add that, and this seems
  highly prone to error.

  We propose here to decouple the "systemd.unit=kdump-tools.service"
  parameter from KDUMP_CMDLINE_APPEND, so if user wants really to remove
  this option, they should used KDUMP_CMDLINE instead.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/makedumpfile/+bug/1816743/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1840488] Re: Disable Bluetooth in cloud kernels

2020-08-18 Thread Brian Murray
The Eoan Ermine has reached end of life, so this bug will not be fixed
for that release

** Changed in: linux-oracle (Ubuntu Eoan)
   Status: Triaged => Won't Fix

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1840488

Title:
  Disable Bluetooth in cloud kernels

Status in linux-aws package in Ubuntu:
  Triaged
Status in linux-gcp package in Ubuntu:
  Triaged
Status in linux-gke-4.15 package in Ubuntu:
  Invalid
Status in linux-gke-5.0 package in Ubuntu:
  Invalid
Status in linux-oracle package in Ubuntu:
  Triaged
Status in linux-aws source package in Xenial:
  Invalid
Status in linux-gcp source package in Xenial:
  Triaged
Status in linux-gke-4.15 source package in Xenial:
  Invalid
Status in linux-gke-5.0 source package in Xenial:
  Invalid
Status in linux-oracle source package in Xenial:
  Triaged
Status in linux-aws source package in Bionic:
  Triaged
Status in linux-gcp source package in Bionic:
  Triaged
Status in linux-gke-4.15 source package in Bionic:
  Triaged
Status in linux-gke-5.0 source package in Bionic:
  Triaged
Status in linux-oracle source package in Bionic:
  Triaged
Status in linux-aws source package in Disco:
  Won't Fix
Status in linux-gcp source package in Disco:
  Won't Fix
Status in linux-gke-4.15 source package in Disco:
  Invalid
Status in linux-gke-5.0 source package in Disco:
  Invalid
Status in linux-oracle source package in Disco:
  Won't Fix
Status in linux-aws source package in Eoan:
  Won't Fix
Status in linux-gcp source package in Eoan:
  Won't Fix
Status in linux-gke-4.15 source package in Eoan:
  Invalid
Status in linux-gke-5.0 source package in Eoan:
  Invalid
Status in linux-oracle source package in Eoan:
  Won't Fix

Bug description:
  [Impact]

  Some cloud-focused kernels have CONFIG_BT enabled but cloud instances
  shouldn't need bluetooth support. Disabling the bluetooth subsystem
  reduces the amount of security-sensitive code we have to worry about
  in the cloud kernels and also has the nice side effect of minimizing
  build times and kernel sizes.

  The cloud kernels known to have bluetooth enabled include:

  * [B/D/E] linux-aws (arm64 only)
  * [X/B/D/E] linux-gcp
  * [B] linux-gke-4.15
  * [B] linux-gke-5.0
  * [X/B/D/E] linux-oracle

  [Test Case]

  1. Install patched kernel and reboot into it
  2. Ensure that the following command does NOT display any output:
     $ grep CONFIG_BT=[my] /boot/config-$(uname -r)

  [Regression Potential]

  There could be an unexpected dependence on bluetooth within one of the
  clouds but I think it is highly unlikely.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-aws/+bug/1840488/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1848828] Re: report packages from security pocket

2020-08-18 Thread Brian Murray
The Eoan Ermine has reached end of life, so this bug will not be fixed
for that release

** Changed in: landscape-client (Ubuntu Eoan)
   Status: In Progress => Won't Fix

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1848828

Title:
  report packages from security pocket

Status in landscape-client package in Ubuntu:
  In Progress
Status in landscape-client source package in Xenial:
  In Progress
Status in landscape-client source package in Bionic:
  In Progress
Status in landscape-client source package in Disco:
  Won't Fix
Status in landscape-client source package in Eoan:
  Won't Fix
Status in landscape-client source package in Focal:
  In Progress

Bug description:
  [Impact]

  I report this bug to add the necessary bit into lds-client for all
  affected/supported releases.

  [Test Case]

  * One must use Landscape server on-prem (version >=19.01) or hosted which 
already contain the necessary server side change.
  * Install landscape-client.
  * Successfully register a client against Landscape server.
  * Security updates will only rely on USN notices and could possibly ignore 
other packages found in -security pocket even if they are there simply by the 
fact that there was no USN notice specific for them.

  (e.g. systemd has an USN, systemd get updated but its derived systemd
  binary packages aren't updated)

  [Regression Potential]

  * The patch flags potential security updates by matching the pocket name. The 
server then does additional package selection from that info. If the pocket 
matching were to break, security updates would continue as it was previously.
  * False positive matching could be possible, assuming one builds a mirror 
which mimics security pockets and contains normal updates. In that case, 
landscape could mistakenly update as if they were security updates.
  * Landscape may apply security updates without USN data, if the update comes 
from a security pocket. Since this matches the behaviour of unattended-upgrades 
and MOTD info, this may be closer to what users expect, even though this is a 
change of behaviour.

  [Other Info]

  * Upstream details:
  
https://github.com/CanonicalLtd/landscape-client/commit/93a3b47965da199785e9b3d226cb61f721e54196
  https://github.com/CanonicalLtd/landscape-client/pull/57
  https://github.com/CanonicalLtd/landscape-client/pull/70

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/landscape-client/+bug/1848828/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1842562] Re: AWS: Add udev rule to set Instance Store device IO timeouts

2020-08-18 Thread Brian Murray
The Eoan Ermine has reached end of life, so this bug will not be fixed
for that release

** Changed in: cloud-init (Ubuntu Eoan)
   Status: In Progress => Won't Fix

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1842562

Title:
  AWS: Add udev rule to set Instance Store device IO timeouts

Status in cloud-init package in Ubuntu:
  In Progress
Status in cloud-init source package in Xenial:
  In Progress
Status in cloud-init source package in Bionic:
  In Progress
Status in cloud-init source package in Disco:
  Won't Fix
Status in cloud-init source package in Eoan:
  Won't Fix

Bug description:
  [Impact]

  AWS wish to implement per-device IO timeouts in their cloud, since
  currently NVMe devices only support a single global timeout, and this
  doesn't play well with EBS volumes, which have error recovery
  capabilities built into the back end, and require large timeouts, and
  Instance Store / ephemeral volumes, which are to be treated as local
  disks, which require short timeouts.

  AWS have proposed a solution which is to backport the below two
  patches to the Ubuntu kernels:

  commit 65cd1d13b880920054d6c750679baa80b7f9c072
  Author: Weiping Zhang 
  Date:   Thu Nov 29 00:04:39 2018 +0800
  subject: block: add io timeout to sysfs

  commit 4d25339e32a1b6e1f490bb78b1e5b0fa9eb3e073
  Author: Weiping Zhang 
  Date:   Tue Apr 2 21:14:30 2019 +0800
  subject: block: don't show io_timeout if driver has no timeout handler

  This enables a sysfs entry in /sys/block/nvmeXnX/queue/io_timeout
  which gets and sets the io_timeout per device in milliseconds.

  Kernel commits are being tracked in LP #1841461

  EBS volumes will use the default timeout as set on the kernel command
  line of 4294966296, and Instance Store volumes will need to use a
  default timeout of 3.

  AWS have suggested that we deploy the below udev rule to automatically
  set the io_timeout of all Instance Store volumes to 3:

  KERNEL=="nvme[0-9]*n[0-9]*", ENV{DEVTYPE}=="disk",
  ATTRS{model}=="Amazon EC2 NVMe Instance Storage",
  ATTR{queue/io_timeout}="3"

  This bug is to add the above udev rule to cloud-init.

  [Test Case]

  This requires an AWS instance that has Instance Store volumes
  configured, and I suggest using c5d.large instances.

  I have built a test kernel for bionic linux-aws, version
  4.15.0-1043.45+hf240347v20190828b2 which is available from here:

  https://launchpad.net/~mruffell/+archive/ubuntu/sf240347-kernel

  Install the kernel with the below:

  1) sudo add-apt-repository ppa:mruffell/sf240347-kernel
  2) sudo apt-get update

  Modify grub to boot it, this kernel is 1043, and current is 1044, so
  it will likely be "1>2" in grub config:

  3) sudo vim /etc/default/grub
  Change GRUB_DEFAULT=0 to GRUB_DEFAULT="1>2"
  4) sudo update-grub
  5) reboot

  Once system is up, check kernel version:
  6) uname -rv
  4.15.0-1043-aws #45+hf240347v20190828b2-Ubuntu SMP Wed Aug 28 06:08:21 UTC 
2019

  Verify that we have two nvme disks, one EBS and one Instance Store:

  7) lsblk 
  Should have two disks, normally nvme0 and nvme1.

  See what device is what:

  8) sudo udevadm info --attribute-walk /dev/nvme0
  For me, ATTR{model} is "Amazon Elastic Block Store"

  9) sudo udevadm info --attribute-walk /dev/nvme1
  For me, ATTR{model} is "Amazon EC2 NVMe Instance Storage"

  Look at the two timeouts (Note no udev rule yet):

  10) cat /sys/block/{nvme0n1,nvme1n1}/queue/io_timeout
  4294966296
  4294966296

  Now we deploy the udev rule:
  Place the following line in /lib/udev/rules.d/66-aws-io-timeout.rules

  KERNEL=="nvme[0-9]*n[0-9]*", ENV{DEVTYPE}=="disk",
  ATTRS{model}=="Amazon EC2 NVMe Instance Storage",
  ATTR{queue/io_timeout}="3"

  Now trigger udev rules:
  11) sudo udevadm trigger

  Look at the timeouts now:

  12) cat /sys/block/{nvme0n1,nvme1n1}/queue/io_timeout
  4294966296
  3

  [Regression Potential]

  Regression potential is low since we are adding a udev rule which
  applies only to AWS instances, and only for instances which support
  Instance Store devices.

  The only thing being modified is the device timeout and the udev rule
  is robust to device reordering as it goes by model attr information.

  When the udev rule is used with unpatched kernels, nothing happens
  since the sysfs entry does not exist, and no errors or the like are
  reported.

  [Other Info]
  cloud-init appears to carry azure specific udev rules, which makes me think 
that cloud-init is the right place for this requested udev rule to live.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/cloud-init/+bug/1842562/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net

[Group.of.nepali.translators] [Bug 1851663] Re: (In)consistent autopkgtest failures on ppc64el/s390x

2020-08-18 Thread Brian Murray
The Eoan Ermine has reached end of life, so this bug will not be fixed
for that release

** Changed in: makedumpfile (Ubuntu Eoan)
   Status: Confirmed => Won't Fix

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1851663

Title:
  (In)consistent autopkgtest failures on ppc64el/s390x

Status in makedumpfile package in Ubuntu:
  Confirmed
Status in makedumpfile source package in Xenial:
  Confirmed
Status in makedumpfile source package in Bionic:
  Confirmed
Status in makedumpfile source package in Eoan:
  Won't Fix
Status in makedumpfile source package in Focal:
  Confirmed
Status in makedumpfile source package in Groovy:
  Confirmed

Bug description:
  Recently autopkgtest started to consistently fail in ppc64el / s390x.
  When testing manually, the kernel dump is collected and all works
  fine. By discussing with the package maintainer (Cascardo), it seems
  it started after a change in the instance type of the tests, to
  m1.large.

  This seems either a problem in the test infrastructure itself or a likely a 
"timing" problem in the test (i.e., requiring some pause or delay that is not 
currently enough).
  This demands investigation because those failures delay the package release 
for all arches, usually those releases contain important fixes.

  Also, the recurrent "workaround" is to mark the tests as "force-
  badtest" in ubuntu-hints for the 2 arches, which is in practice
  skipping the test, so those 2 arches are getting releases untested by
  the automatic infrastructure.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/makedumpfile/+bug/1851663/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1861243] Re: Revert temporary md/raid0 layout patch

2020-08-18 Thread Brian Murray
The Eoan Ermine has reached end of life, so this bug will not be fixed
for that release

** Changed in: linux (Ubuntu Eoan)
   Status: Triaged => Won't Fix

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1861243

Title:
  Revert temporary md/raid0 layout patch

Status in linux package in Ubuntu:
  Triaged
Status in linux source package in Trusty:
  Triaged
Status in linux source package in Xenial:
  Triaged
Status in linux source package in Bionic:
  Triaged
Status in linux source package in Disco:
  Won't Fix
Status in linux source package in Eoan:
  Won't Fix

Bug description:
  A "temporary" patch was applied to Xenial, Bionic, Disco and Eoan as
  part of the fix for: https://bugs.launchpad.net/bugs/1850540:

  https://git.launchpad.net/~ubuntu-
  
kernel/ubuntu/+source/linux/+git/xenial/commit/?id=faf36efcc6d6bf50c9b5a2a6d7f0efdae296e8a6

  "UBUNTU: SAUCE: md/raid0: Use kernel specific layout" (this uses by
  default the layout for multi-zone md RAID0 arrays that the kernel was
  using before / instead of failing to assemble those and require the
  user to make a choice).

  Once the rollout of a fixed user-space and maybe some grace period we
  should revert this to be back behaving like upstream does. This bug is
  for tracking the reversion of the patch.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1861243/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1873074] Re: kernel panic hit by kube-proxy iptables-save/restore caused by aufs

2020-08-18 Thread Brian Murray
The Eoan Ermine has reached end of life, so this bug will not be fixed
for that release

** Changed in: linux (Ubuntu Eoan)
   Status: Fix Committed => Won't Fix

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1873074

Title:
  kernel panic hit by kube-proxy iptables-save/restore caused by aufs

Status in linux package in Ubuntu:
  In Progress
Status in linux source package in Xenial:
  Fix Released
Status in linux source package in Bionic:
  Fix Released
Status in linux source package in Eoan:
  Won't Fix
Status in linux source package in Focal:
  Fix Released
Status in linux source package in Groovy:
  Won't Fix

Bug description:
  [Impact]

   * Systems with aufs mounts are vulnerable to a kernel BUG(),
     which can turn into a panic/crash if panic_on_oops is set.

   * It is exploitable by unprivileged local users; and also
     remote access operations (e.g., web server) potentially.

   * This issue has also manifested in Kubernetes deployments
     with a kernel panic in iptables-save or iptables-restore
     after a few weeks of uptime, without user interaction.

   * Usually all Kubernetes worker nodes hit the issue around
     the same time.

  [Fix]

   * The issue is fixed with 2 patches in aufs4-linux.git:
   - 515a586eeef3 aufs: do not call i_readcount_inc()
   - f10aea57d39d aufs: bugfix, IMA i_readcount

   * The first addresses the issue, and the second addresses a
     regression in the aufs feature to change RW branches to RO.

   * The kernel v5.3 aufs patches had an equivalent fix to the
     second patch, which is present in the Focal aufs patchset
     (and on ubuntu-unstable/master & /master-5.8 on 20200629)

   - 1d26f910c53f aufs: for v5.3-rc1, maintain i_readcount
 (in aufs5-linux.git)

  [Test Case]

   * Repeatedly open/close the same file in read-only mode in
     aufs (UINT_MAX times, to overflow a signed int back to 0.)

   * Alternatively, monitor the underlying filesystems's file
     inode.i_readcount over several open/close system calls.
     (should not monotonically increase; rather, return to 0.)

  [Regression Potential]

   * This changes the core path that aufs opens files, so there
     is a risk of regression; however, the fix changes aufs for
     how other filesystems work, so this generally is OK to do.
     In any case, most regressions would manifest in open() or
     close() (where the VFS handles/checks inode.i_readcount.)

   * The aufs maintainer has access to an internal test-suite
     used to validate aufs changes, used to identify the first
     regression (in the branch RW/RO mode change), and then to
     validate/publish the patches upstream; should be good now.

   * This has also been tested with 'stress-ng --class filesystem'
     and with 'xfstests -overlay' (patch to use aufs vs overlayfs)
     on Xenial/Bionic/Focal (-proposed vs. -proposed + patches).
     No regressions observed in stress-ng/xfstests log or dmesg.

  [Other Info]

   * Applied on Unstable (branches master and master-5.8)
   * Not required on Groovy (still 5.4; should sync from Unstable)
   * Required on LTS releases: Bionic and Focal and Xenial.
   * Required on other releases: Disco and Eoan (for custom kernels)

  [Original Bug Description]

  Problem Report:
  --

  An user reported several nodes in their Kubernetes clusters
  hit a kernel panic at about the same time, and periodically
  (usually 35 days of uptime, and in same order nodes booted.)

  The kernel panics message/stack trace are consistent across
  nodes, in __fput() by iptables-save/restore from kube-proxy.

  Example:

  """
  [3016161.866702] kernel BUG at .../include/linux/fs.h:2583!
  [3016161.866704] invalid opcode:  [#1] SMP
  ...
  [3016161.866780] CPU: 40 PID: 33068 Comm: iptables-restor Tainted: P OE 
4.4.0-133-generic #159-Ubuntu
  ...
  [3016161.866786] RIP: 0010:[...] [...] __fput+0x223/0x230
  ...
  [3016161.866818] Call Trace:
  [3016161.866823] [...] fput+0xe/0x10
  [3016161.866827] [...] task_work_run+0x86/0xb0
  [3016161.866831] [...] exit_to_usermode_loop+0xc2/0xd0
  [3016161.866833] [...] syscall_return_slowpath+0x4e/0x60
  [3016161.866839] [...] int_ret_from_sys_call+0x25/0x9f
  """

  (uptime: 3016161 seconds / (24*60*60) = 34.90 days)

  They have provided a crashdump (privately available) used
  for analysis later in this bug report.

  Note: the root cause turns out to be independent of K8s,
  as explained in the Root Cause section.

  Related Report:
  --

  This behavior matches this public bug of another user:
  https://github.com/kubernetes/kubernetes/issues/70229

  """
  I have several machines happen kernel panic,and these
  machine have same dump trace like below:

  KERNEL: /usr/lib/debug/boot/vmlinux-4.4.0-104-generic
  ...
  PANIC: "kernel BUG at .../include/linux/fs.h:2582!"
 

[Group.of.nepali.translators] [Bug 1877442] Re: Broken SQL CONCAT function behaviour in 5.7.30-0ubuntu0.18.04.1

2020-08-18 Thread Brian Murray
The Eoan Ermine has reached end of life, so this bug will not be fixed
for that release

** Changed in: mysql-8.0 (Ubuntu Eoan)
   Status: Triaged => Won't Fix

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1877442

Title:
  Broken SQL CONCAT function behaviour in 5.7.30-0ubuntu0.18.04.1

Status in mysql-5.7 package in Ubuntu:
  Triaged
Status in mysql-8.0 package in Ubuntu:
  Triaged
Status in mysql-5.7 source package in Xenial:
  Triaged
Status in mysql-8.0 source package in Xenial:
  Invalid
Status in mysql-5.7 source package in Bionic:
  Triaged
Status in mysql-8.0 source package in Bionic:
  Invalid
Status in mysql-5.7 source package in Eoan:
  Invalid
Status in mysql-8.0 source package in Eoan:
  Won't Fix
Status in mysql-5.7 source package in Focal:
  Invalid
Status in mysql-8.0 source package in Focal:
  Triaged

Bug description:
  [Impact]
  This is a regression in MySQL 5.7.30 (does not affect 8.0 which is in focal 
and development release, nor 5.7.29). The CONCAT function has inconsistent 
behavior depending on whether or not the result is assigned to a variable, 
which is leading to a crash in slurmdbd.

  Since it's limited to 5.7.30, the bug only affects stable releases
  Bionic and Xenial.

  [Test Case]
  - Start up MySQL Server 5.7.30
  - Connect to it with the mysql cli (with default install of the server, "sudo 
mysql" will connect to the MySQL root user)
  - Run the following two queries:
* SELECT CONCAT('');
* SET @var = ""; SELECT @var := CONCAT('');
  They should give the same output, but the second one returns NULL instead of 
an empty string when using 5.7.30.

  [Regression Potential]
  The patch changes fairly low-level code, which can always carry some risk. 

  [Other info]
  This bug is fixed in the next upstream release of MySQL (5.7.31), so the 
patch would only be needed until that is picked.

  --- ORIGINAL DESCRIPTION ---
  Hi,

  Yesterday we upgraded from 5.7.29-0ubuntu0.18.04.1 to
  5.7.30-0ubuntu0.18.04.1 (via unattended-upgrade) on Ubuntu 18.04 and
  slurmdbd (https://packages.ubuntu.com/bionic/admin/slurmdbd) started
  segfaulting.

  Upon inspection, the slurmdbd crash is caused by a change of behaviour
  of the SQL CONCAT function. The new behaviour seems wrong.

  Calling
  SELECT CONCAT('');
  will result in an empty string as expected however if the result is assigned 
to a variable with:
  SET @var = ""; SELECT @var := CONCAT('');
  the variable will be NULL instead of an empty string.

  It seems that when the output of CONCAT is assigned to a variable; if
  CONCAT should have returned an empty string, it will set the variable
  to NULL instead.

  SLURM itself crashes because it uses a stored procedure which relies
  on the output of CONCAT to be an empty string rather than a NULL
  variable and tries to dereference the pointer.

  I wasn’t able to get hold of 5.7.29-0ubuntu0.18.04.1 via APT so I
  tested on 5.7.21-1ubuntu1. On 5.7.21, the variable was correctly set
  to an empty string. I have also tried on 20.04 and the behaviour is
  correct as well. So the problem seems to be present only in the
  version 5.7.30-0ubuntu0.18.04.1.

  I think that the behaviour was introduced in the 5.7 branch by this commit:
  
https://github.com/mysql/mysql-server/commit/addb2aab601d98e685eccae545f79d120561ad9b
  but I am not entirely sure.

  This bug is a bit annoying because it makes SLURM with accounting
  enabled completely unusable. However downgrading MySQL to
  5.7.29-0ubuntu0.18.04.1 temporarily fixed the problem.

  I have attached a log file with examples to reproduce the bug.

  Thank you very much.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/mysql-5.7/+bug/1877442/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1867916] Re: Regression in kernel 4.15.0-91 causes kernel panic with Bcache

2020-08-18 Thread Brian Murray
The Eoan Ermine has reached end of life, so this bug will not be fixed
for that release

** Changed in: linux (Ubuntu Eoan)
   Status: Fix Committed => Won't Fix

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1867916

Title:
  Regression in kernel 4.15.0-91 causes kernel panic with Bcache

Status in Linux:
  Confirmed
Status in linux package in Ubuntu:
  Fix Committed
Status in linux source package in Xenial:
  Fix Released
Status in linux source package in Bionic:
  Fix Committed
Status in linux source package in Eoan:
  Won't Fix
Status in linux source package in Focal:
  Fix Committed
Status in linux source package in Groovy:
  Won't Fix

Bug description:
  [Impact]

   * Users of bcache who manually specified a block size
     greater than the page size when creating the device
     with 'make-bcache' started to hit a kernel BUG/oops
     after kernel upgrades.  (This is not widely used.)

   * The issue has been exposed with commit ad6bf88a6c19
     ("block: fix an integer overflow in logical block size")
     because it increased the range of values accepted as
     logical block size, which used to overflow to zero,
     and thus receive a default of 512 via block layer.

   * The issue existed previously, but with fewer values
     exposed (e.g. 8k, 16k, 32k); the regression reports
     happened with larger values (512k) for RAID stripes.

  [Fix]

   * The upstream commit dcacbc1242c7 ("bcache: check and
     adjust logical block size for backing devices") checks
     the block size and adjusts it if needed, to the value
     of the underlying device's logical block size.

   * It is merged as of v5.8-rcN, and sent to v5.7 stable.

  [Test Case]

   * Run make-bcache with block size greater than page size.
     $ sudo make-bcache --bdev $DEV --block 8k

   * Expected results: bcache device registered; no BUG/oops.
   * Details steps on comment #43.

  [Regression Potential]

   * Restricted to users who specify a bcache block size
     greater than page size.

   * Regressions could theoretically manifest on bcache
     device probe/register, if the underlying device's
     logical block size for whatever triggers issues not
     seen previously with the overflow/default 512 bytes.

  [Other Info]

   * Unstable has the patch on both master/master-5.7.
   * Groovy should get it on rebase.

  [Original Bug Description]
  After upgrading from kernel 4.15.0-88 to 4.15.0-91 one of our systems does 
not boot any longer. It always crashes during boot with a kernel panic.

  I suspect that this crash might be related to Bcache because this is
  the only one of our systems where we use Bcache and the kernel panic
  appears right after Bcache initialization.

  I already checked that this bug still exists in the 4.15.0-92.93
  kernel from proposed.

  Unfortunately, I cannot do a bisect because this is a critical
  production system and we do not have any other system with a similar
  configuration.

  I attached a screenshot with the trace of the kernel panic.

  The last message that appears before the kernel panic (or rather the
  last one that I can see - there is a rather long pause between that
  message and the panic and I cannot scroll up far enough to ensure that
  there are no other messages in between) is:

  bcache: register_bcache() error /dev/dm-0: device already registered

  When booting with kernel 4.15.0-88 that does not have this problem,
  the next message is

  bcache: register_bcache() error /dev/dm-12: device already registered
  (emitting change event)

  After that the next message is:

  Begin: Loading essential drivers ... done

  This message also appears after the kernel panic, but the boot process
  stalls and the system can only be recovered by doing a hardware reset.

  ProblemType: Bug
  DistroRelease: Ubuntu 18.04
  Package: linux-image-4.15.0-88-generic 4.15.0-88.88
  ProcVersionSignature: Ubuntu 4.15.0-88.88-generic 4.15.18
  Uname: Linux 4.15.0-88-generic x86_64
  AlsaDevices:
   total 0
   crw-rw 1 root audio 116,  1 Mar 17 21:08 seq
   crw-rw 1 root audio 116, 33 Mar 17 21:08 timer
  AplayDevices: Error: [Errno 2] No such file or directory: 'aplay': 'aplay'
  ApportVersion: 2.20.9-0ubuntu7.11
  Architecture: amd64
  ArecordDevices: Error: [Errno 2] No such file or directory: 'arecord': 
'arecord'
  AudioDevicesInUse: Error: command ['fuser', '-v', '/dev/snd/seq', 
'/dev/snd/timer'] failed with exit code 1:
  Date: Wed Mar 18 12:55:18 2020
  HibernationDevice: RESUME=UUID=40512ea2-9fce-40f5-8362-5daf955cc26a
  InstallationDate: Installed on 2013-07-02 (2450 days ago)
  InstallationMedia: Ubuntu-Server 12.04.2 LTS "Precise Pangolin" - Release 
amd64 (20130214)
  MachineType: HP ProLiant DL160 G6
  PciMultimedia:

  ProcFB: 0 mgadrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-4.15.0-88-generic 

[Group.of.nepali.translators] [Bug 1881982] Re: DoS vulnerability: cause resource exhaustion

2020-08-18 Thread Brian Murray
The Eoan Ermine has reached end of life, so this bug will not be fixed
for that release

** Changed in: whoopsie (Ubuntu Eoan)
   Status: Confirmed => Won't Fix

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1881982

Title:
  DoS vulnerability: cause resource exhaustion

Status in whoopsie package in Ubuntu:
  Fix Released
Status in whoopsie source package in Xenial:
  Fix Released
Status in whoopsie source package in Bionic:
  Fix Released
Status in whoopsie source package in Eoan:
  Won't Fix
Status in whoopsie source package in Focal:
  Fix Released
Status in whoopsie source package in Groovy:
  Fix Released

Bug description:
  Hi,

  I have found a security issue on whoopsie 0.2.69 and earlier.

  # Vulnerability description
  The parse_report() function in whoopsie.c allows attackers to cause a denial 
of service (memory leak) via a crafted file. 
  Exploitation of this issue causes excessive memory consumption which results 
in the Linux kernel triggering OOM killer on arbitrary process.
  This results in the process being terminated by the OOM killer.

  
  # Details 
  We have found a memory leak vulnerability during the parsing the crash file, 
when a collision occurs on GHashTable through g_hash_table_insert().
  According to [1], if the key already exists in the GHashTable, its current 
value is replaced with the new value.
  If 'key_destory_func' and 'value_destroy_func' are supplied when creating the 
table, the old value and the passed key are freed using that function.
  Unfortunately, whoopsie does not handle the old value and the passed key when 
collision happens.
  If a crash file contains same repetitive key-value pairs, it leads to memory 
leak as much as the amount of repetition and results in denial-of-service.

  [1] https://developer.gnome.org/glib/stable/glib-Hash-Tables.html#g
  -hash-table-insert

  
  # PoC (*Please check the below PoC: whoopsie_killer.py)
  1) Generates a certain malformed crash file that contains same repetitive 
key-value pairs.
  2) Trigger the whoopsie to read the generated crash file.
  3) After then, the whoopsie process has been killed.

  
  # Mitigation (*Please check the below patch: g_hash_table_memory_leak.patch)
  We should use g_hash_table_new_full() with ‘key_destroy_func’ and 
‘value_destroy_func’ functions instead of g_hash_table_new().
  Otherwise, before g_hash_table_insert(), we should check the collision via 
g_hash_table_lookup_extended() and obtain pointer to the old value and remove 
it.

  Sincerely,

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/whoopsie/+bug/1881982/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1884766] Re: use-after-free in af_alg_accept() due to bh_lock_sock()

2020-08-18 Thread Brian Murray
The Eoan Ermine has reached end of life, so this bug will not be fixed
for that release

** Changed in: linux (Ubuntu Eoan)
   Status: Fix Committed => Won't Fix

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1884766

Title:
  use-after-free in af_alg_accept() due to bh_lock_sock()

Status in linux package in Ubuntu:
  In Progress
Status in linux source package in Xenial:
  Fix Committed
Status in linux source package in Bionic:
  Fix Committed
Status in linux source package in Eoan:
  Won't Fix
Status in linux source package in Focal:
  Fix Committed
Status in linux source package in Groovy:
  Won't Fix

Bug description:
  [Impact]

   * Users of the Linux kernel's crypto userspace API
     reported BUG() / kernel NULL pointer dereference
     errors after kernel upgrades.

   * The stack trace signature is an accept() syscall
     going through af_alg_accept() and hitting errors
     usually in one of:
     - apparmor_sk_clone_security()
     - apparmor_sock_graft()
     - release_sock()

  [Fix]

   * This is a regression introduced by upstream commit
     37f96694cf73 ("crypto: af_alg - Use bh_lock_sock
     in sk_destruct") which made its way through stable.

   * The offending patch allows the critical regions
     of af_alg_accept() and af_alg_release_parent() to
     run concurrently; now with the "right" events on 2
     CPUs it might drop the non-atomic reference counter
     of the alg_sock then the sock, thus release a sock
     that is still in use.

   * The fix is upstream commit 34c86f4c4a7b ("crypto:
     af_alg - fix use-after-free in af_alg_accept() due
     to bh_lock_sock()") [1]. It changes alg_sock's ref
     counter to atomic, which addresses the root cause.

  [Test Case]

   * There is a synthetic test case available, which
     uses a kprobes kernel module to synchronize the
     concurrent CPUs on the instructions responsible
     for the problem; and a userspace part to run it.

   * The organic reproducer is the Varnish Cache Plus
     software with the Crypto vmod (which uses kernel
     crypto userspace API) under long, very high load.

   * The patch has been verified on both reproducers
     with the 4.15 and 5.7 kernels.

   * More tests performed with 'stress-ng --af-alg'
     with 11 CPUs on Xenial/Bionic/Disco/Eoan/Focal
     (all on same version of stress-ng, V0.11.14)

     No regressions observed from original kernel.
     (the af-alg stressor can exercise almost all
     kernel crypto modules shipped with the kernel;
     so it checks more paths/crypto alg interfaces.)

  [Regression Potential]

   * The fix patch does a fundamental change in how
     alg_sock reference counters work, plus another
     change to the 'nokey' counting. This of course
     *has* a risk of regression.

   * Regressions theoretically could manifest as use
     after free errors (in case of undercounting) in
     the af_alg functions or silent memory leaks (in
     case of overcounting), but also other behaviors
     since reference counting is key to many things.

   * FWIW, this patch has been written by the crypto
     subsystem maintainer, who certainly knows a lot
     of the normal and corner cases, thus giving the
     patch more credit.

   * Testing with the organic reproducer ran as long
     as 5 days, without issues, so it does look good.

  [Other Info]

   * Not sending for Groovy (should get via Unstable).

   * [1] Patch:
  
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=34c86f4c4a7be3b3e35aa48bd18299d4c756064d

  [Stack Trace Examples]

  Examples:

  BUG: unable to handle kernel NULL pointer dereference at 
  ...
  RIP: 0010:apparmor_sk_clone_security+0x26/0x70
  ...
  Call Trace:
   security_sk_clone+0x33/0x50
   af_alg_accept+0x81/0x1c0 [af_alg]
   alg_accept+0x15/0x20 [af_alg]
   SYSC_accept4+0xff/0x210
   SyS_accept+0x10/0x20
   do_syscall_64+0x73/0x130
   entry_SYSCALL_64_after_hwframe+0x3d/0xa2

  general protection fault:  [#1] SMP PTI
  ...
  RIP: 0010:__release_sock+0x54/0xe0
  ...
  Call Trace:
   release_sock+0x30/0xa0
   af_alg_accept+0x122/0x1c0 [af_alg]
   alg_accept+0x15/0x20 [af_alg]
   SYSC_accept4+0xff/0x210
   SyS_accept+0x10/0x20
   do_syscall_64+0x73/0x130
   entry_SYSCALL_64_after_hwframe+0x3d/0xa2

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1884766/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1835135] Re: FIPS OpenSSL crashes Python2 hashlib

2020-08-18 Thread Brian Murray
eoan has reached end of life, so this bug will not be fixed for that
release

** Changed in: python2.7 (Ubuntu Eoan)
   Status: Triaged => Won't Fix

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1835135

Title:
  FIPS OpenSSL crashes Python2 hashlib

Status in python2.7 package in Ubuntu:
  Triaged
Status in python3.5 package in Ubuntu:
  Invalid
Status in python2.7 source package in Xenial:
  Fix Released
Status in python3.5 source package in Xenial:
  Fix Released
Status in python2.7 source package in Bionic:
  Fix Released
Status in python3.5 source package in Bionic:
  Invalid
Status in python2.7 source package in Cosmic:
  Won't Fix
Status in python3.5 source package in Cosmic:
  Invalid
Status in python2.7 source package in Disco:
  Fix Released
Status in python3.5 source package in Disco:
  Invalid
Status in python2.7 source package in Eoan:
  Won't Fix
Status in python3.5 source package in Eoan:
  Invalid

Bug description:
  If Ubuntu/Canonical's FIPS-compliant OpenSSL is initialized with
  SSL_library_init, then Python2's hashlib bindings for MD5 can trigger
  a SIGSEGV via a NULL pointer dereference (if calling the .update
  method) or a SIGABRT (if passing input to the constructor or passing
  no input and invoking the .final method). This happens if, for
  example, PyOpenSSL is imported before hashlib.

  Canonical's FIPS patches for OpenSSL introduce some odd behavior that
  arguably should be revisited, but the (TL;DR) core bug is that Python2
  hashlib doesn't properly check the return value of EVP_DigestInit,
  preventing hashlib from falling back to it's internal MD5
  implementation and instead setting things up for use of the MD5
  context to trigger SIGSEGV or SIGABRT.

  Python3 correctly checks the return value, so the fix is to backport
  the relevant code into Python2 (see
  python2.7-2.7.12/Modules/_hashopenssl.c).

  See attached good.py and bad.py files which exhibit the import order-
  dependent crashing issue. See attached fips-md5-python-init-bug.c
  which shows the FIPS OpenSSL behaviors that conditionally tickle the
  Python2 bug. The C file also contains a much more detailed description
  of the Python2 bug and other behavior which I'd rather not repeat
  here.

  I discovered this bug investigating an issue with the third-party apt-
  boto-s3 package. See https://github.com/boto/boto3/issues/2021

  Note that this bug effects Splunk, Inc, which has a corporate Ubuntu
  Advantage license. My login account is attached to a different,
  single-seat license.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/python2.7/+bug/1835135/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1859013] Re: openssh tests use "not valid yet" certificate from 2020, which is now valid

2020-08-18 Thread Launchpad Bug Tracker
This bug was fixed in the package openssh - 1:8.0p1-6ubuntu0.1

---
openssh (1:8.0p1-6ubuntu0.1) eoan; urgency=medium

  * Apply upstream patch to stop using 2020 as a future date in regress
tests. LP: #1859013

 -- Dimitri John Ledkov   Thu, 09 Jan 2020 23:53:27
+

** Changed in: openssh (Ubuntu Eoan)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1859013

Title:
  openssh tests use "not valid yet" certificate from 2020, which is now
  valid

Status in openssh package in Ubuntu:
  Fix Released
Status in openssh source package in Precise:
  New
Status in openssh source package in Trusty:
  New
Status in openssh source package in Xenial:
  Fix Released
Status in openssh source package in Bionic:
  Fix Committed
Status in openssh source package in Disco:
  Won't Fix
Status in openssh source package in Eoan:
  Fix Released
Status in openssh source package in Focal:
  Fix Released

Bug description:
  [Impact]

   * regression testsuite uses 1st of January 2020 as the date in the
  future, however that is now in the past making autpkgtests fail.

  [Test Case]

   * Autopkgtest must pass

  [Regression Potential]

   * Testsuite assertion update only

  [Other Info]

  This is a staged update to be rolled up with any other openssh update
  in the future.

  fixed in debian https://tracker.debian.org/news/1092767/accepted-
  openssh-181p1-4-source-into-unstable/

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/1859013/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1890790] Re: Build Failure with --enable-ssl-crtd flag

2020-08-18 Thread Richard sims
I am attempting to rebuild the package with no modification apart from a
change to the configuration options in debian/rules before recompiling.

apt source -y squid
cd squid* && sed -i 's/--with-large-files/--with-large-files --with-openssl 
--enable-ssl-crtd/g' debian/rules
debuild -b -uc -us -j$(nproc)

This used to work until the squid3_3.5.12-1ubuntu7.12 update without any
modifications to the method of rebuilding.

This is occurring on two 16.04 machines, one of which was a fresh
install.

Thanks

** Changed in: squid3 (Ubuntu)
   Status: Invalid => New

** Changed in: squid3 (Ubuntu Xenial)
   Status: Invalid => New

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1890790

Title:
  Build Failure with --enable-ssl-crtd flag

Status in squid3 package in Ubuntu:
  New
Status in squid3 source package in Xenial:
  New

Bug description:
  I have a script that grabs the latest package source for squid3 and
  builds, adding the --enable-ssl-crtd and --with-openssl flags. After
  the last package update "squid3_3.5.12-1ubuntu7.12.debian.tar.xz" this
  errors out during compilation.

  I have narrowed it down to the --enable-ssl-crtd flag. The error is as
  follows:

  ssl/certificate_db.h:56:0: error: "Here" redefined [-Werror]
   #define Here __FILE__, __LINE__
   ^
  In file included from ../src/base/TextException.h:15:0,
   from ../src/SBufExceptions.h:12,
   from ../src/SBuf.h:14,
   from ../src/http/MethodType.h:12,
   from ../src/HttpRequestMethod.h:12,
   from ../src/AccessLogEntry.h:18,
   from acl/FilledChecklist.h:12,
   from client_side.cc:61:
  ../src/base/Here.h:15:0: note: this is the location of the previous definition
   #define Here() SourceLocation(__FUNCTION__, __FILE__, __LINE__)
   ^

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/squid3/+bug/1890790/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1890662] Re: xenial/linux-kvm: 4.4.0-1079.86 -proposed tracker

2020-08-18 Thread Ubuntu Kernel Bot
** Changed in: kernel-sru-workflow/automated-testing
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/promote-to-proposed
   Status: Fix Committed => Fix Released

** Changed in: kernel-sru-workflow/regression-testing
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/security-signoff
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/verification-testing
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/automated-testing
   Status: Confirmed => Incomplete

** Changed in: kernel-sru-workflow/regression-testing
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/verification-testing
   Status: Confirmed => In Progress

** Description changed:

  This bug will contain status and test results related to a kernel source
  (or snap) as stated in the title.
  
  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  
  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1891057
  packages:
main: linux-kvm
meta: linux-meta-kvm
- phase: Promote to Proposed
- phase-changed: Tuesday, 18. August 2020 08:53 UTC
+ phase: Testing
+ phase-changed: Tuesday, 18. August 2020 10:44 UTC
+ proposed-announcement-sent: true
+ proposed-testing-requested: true
  reason:
-   promote-to-proposed: Ongoing -- packages waiting in -proposed for
- mirror sync
+   automated-testing: Stalled -- testing FAILED
+   regression-testing: Ongoing -- testing in progress
+   security-signoff: Pending -- waiting for signoff
+   verification-testing: Ongoing -- testing in progress
  variant: debs
  versions:
main: 4.4.0-1079.86
meta: 4.4.0.1079.77

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1890662

Title:
  xenial/linux-kvm: 4.4.0-1079.86 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Incomplete
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  In Progress
Status in Kernel SRU Workflow security-signoff series:
  Confirmed
Status in Kernel SRU Workflow verification-testing series:
  In Progress
Status in linux-kvm source package in Xenial:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1891057
  packages:
main: linux-kvm
meta: linux-meta-kvm
  phase: Testing
  phase-changed: Tuesday, 18. August 2020 10:44 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason:
automated-testing: Stalled -- testing FAILED
regression-testing: Ongoing -- testing in progress
security-signoff: Pending -- waiting for signoff
verification-testing: Ongoing -- testing in progress
  variant: debs
  versions:
main: 4.4.0-1079.86
meta: 4.4.0.1079.77

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1890662/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1890667] Re: xenial/linux-fips: 4.4.0-1045.50 -proposed tracker

2020-08-18 Thread Ubuntu Kernel Bot
** Changed in: kernel-sru-workflow/promote-signing-to-proposed
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/promote-to-proposed
   Status: Fix Committed => Fix Released

** Description changed:

  This bug will contain status and test results related to a kernel source
  (or snap) as stated in the title.
  
  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  
  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1891057
  packages:
main: linux-fips
meta: linux-meta-fips
signed: linux-signed-fips
- phase: Building in Signing
- phase-changed: Tuesday, 18. August 2020 06:28 UTC
+ phase: Ready for Promote to Proposed
+ phase-changed: Tuesday, 18. August 2020 08:17 UTC
  reason:
-   build-packages-signing: Ongoing -- building in Signing
- signed:depwait
-   promote-to-proposed: Stalled -- packages copying to Signing
+   promote-signing-to-proposed: Pending -- ready for review
  variant: debs
  versions:
main: 4.4.0-1045.50
meta: 4.4.0.1045.47
signed: 4.4.0-1045.50

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1890667

Title:
  xenial/linux-fips: 4.4.0-1045.50 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Invalid
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-signing-to-proposed series:
  Confirmed
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Invalid
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux source package in Xenial:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1891057
  packages:
main: linux-fips
meta: linux-meta-fips
signed: linux-signed-fips
  phase: Ready for Promote to Proposed
  phase-changed: Tuesday, 18. August 2020 08:17 UTC
  reason:
promote-signing-to-proposed: Pending -- ready for review
  variant: debs
  versions:
main: 4.4.0-1045.50
meta: 4.4.0.1045.47
signed: 4.4.0-1045.50

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1890667/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1890700] Re: xenial/linux-oracle: 4.15.0-1051.55~16.04.1 -proposed tracker

2020-08-18 Thread Ubuntu Kernel Bot
** Changed in: kernel-sru-workflow/prepare-package
   Status: In Progress => Fix Committed

** Changed in: kernel-sru-workflow/prepare-package
   Status: Fix Committed => Fix Released

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: In Progress => Fix Committed

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: Fix Committed => Fix Released

** Changed in: kernel-sru-workflow/prepare-package-signed
   Status: In Progress => Fix Committed

** Changed in: kernel-sru-workflow/prepare-package-signed
   Status: Fix Committed => Fix Released

** Description changed:

  This bug will contain status and test results related to a kernel source
  (or snap) as stated in the title.
  
  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  
  -- swm properties --
  kernel-stable-master-bug: 1890701
  packages:
main: linux-oracle
meta: linux-meta-oracle
signed: linux-signed-oracle
- phase: Packaging
- phase-changed: Friday, 14. August 2020 20:06 UTC
+ phase: Building in ppa
+ phase-changed: Tuesday, 18. August 2020 08:01 UTC
  reason:
-   prepare-package: Pending -- tag not published and package not
- uploaded
-   prepare-package-meta: Pending -- tag not published and package not
- uploaded
-   prepare-package-signed: Pending -- tag not published and package not
- uploaded
+   build-packages-ppa: Ongoing -- building in ppa main:building
  variant: debs
+ versions:
+   main: 4.15.0-1051.55~16.04.1
+   meta: 4.15.0.1051.42
+   signed: 4.15.0-1051.55~16.04.1

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1890700

Title:
  xenial/linux-oracle: 4.15.0-1051.55~16.04.1 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  New
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux-oracle source package in Xenial:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  kernel-stable-master-bug: 1890701
  packages:
main: linux-oracle
meta: linux-meta-oracle
signed: linux-signed-oracle
  phase: Building in ppa
  phase-changed: Tuesday, 18. August 2020 08:01 UTC
  reason:
build-packages-ppa: Ongoing -- building in ppa main:building
  variant: debs
  versions:
main: 4.15.0-1051.55~16.04.1
meta: 4.15.0.1051.42
signed: 4.15.0-1051.55~16.04.1

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1890700/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1890704] Re: xenial/linux-hwe: 4.15.0-114.115~16.04.1 -proposed tracker

2020-08-18 Thread Ubuntu Kernel Bot
** Changed in: kernel-sru-workflow/automated-testing
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/certification-testing
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/promote-to-proposed
   Status: Fix Committed => Fix Released

** Changed in: kernel-sru-workflow/regression-testing
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/security-signoff
   Status: New => Fix Released

** Changed in: kernel-sru-workflow/verification-testing
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/automated-testing
   Status: Confirmed => Incomplete

** Changed in: kernel-sru-workflow/regression-testing
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/verification-testing
   Status: Confirmed => In Progress

** Description changed:

  This bug will contain status and test results related to a kernel source
  (or snap) as stated in the title.
  
  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  
  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1891052
  packages:
main: linux-hwe
meta: linux-meta-hwe
signed: linux-signed-hwe
- phase: Promote to Proposed
- phase-changed: Tuesday, 18. August 2020 06:27 UTC
+ phase: Testing
+ phase-changed: Tuesday, 18. August 2020 07:57 UTC
+ proposed-announcement-sent: true
+ proposed-testing-requested: true
  reason:
-   promote-to-proposed: Ongoing -- packages waiting in -proposed for
- mirror sync
+   automated-testing: Stalled -- testing FAILED
+   certification-testing: Ongoing -- testing in progress
+   regression-testing: Ongoing -- testing in progress
+   verification-testing: Ongoing -- testing in progress
  trackers:
xenial/linux-deeplens: bug 1890703
  variant: debs
  versions:
main: 4.15.0-114.115~16.04.1
meta: 4.15.0.114.115
signed: 4.15.0-114.115~16.04.1

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1890704

Title:
  xenial/linux-hwe: 4.15.0-114.115~16.04.1 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Incomplete
Status in Kernel SRU Workflow certification-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  In Progress
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  In Progress
Status in linux-hwe source package in Xenial:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1891052
  packages:
main: linux-hwe
meta: linux-meta-hwe
signed: linux-signed-hwe
  phase: Testing
  phase-changed: Tuesday, 18. August 2020 07:57 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason:
automated-testing: Stalled -- testing FAILED
certification-testing: Ongoing -- testing in progress
regression-testing: Ongoing -- testing in progress
verification-testing: Ongoing -- testing in progress
  trackers:
xenial/linux-deeplens: bug 1890703
  variant: debs
  versions:
main: 4.15.0-114.115~16.04.1
meta: 4.15.0.114.115
signed: 4.15.0-114.115~16.04.1

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1890704/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp