[Bug 1807709] Re: dbus always crashes at session start (on wayland)

2018-12-10 Thread 賴家亨
ProblemType: Crash
Architecture: amd64
CrashCounter: 1
Date: Mon Dec 10 21:25:48 2018
DistroRelease: Ubuntu 18.10
ExecutablePath: /usr/bin/dbus-daemon
ExecutableTimestamp: 1536206167
ProcCmdline: /usr/bin/dbus-daemon --session --address=systemd: --nofork 
--nopidfile --systemd-activation --syslog-only
ProcCwd: /home/laichiaheng
ProcEnviron:
 LANG=zh_TW.UTF-8
 LANGUAGE=zh_TW:zh
 PATH=(custom, no user)
 SHELL=/bin/bash
 XDG_RUNTIME_DIR=
ProcMaps:
 564b7d73e000-564b7d747000 r--p  08:13 1442493
/usr/bin/dbus-daemon
 564b7d747000-564b7d769000 r-xp 9000 08:13 1442493
/usr/bin/dbus-daemon
 564b7d769000-564b7d777000 r--p 0002b000 08:13 1442493
/usr/bin/dbus-daemon
 564b7d777000-564b7d779000 r--p 00038000 08:13 1442493
/usr/bin/dbus-daemon
 564b7d779000-564b7d77a000 rw-p 0003a000 08:13 1442493
/usr/bin/dbus-daemon
 564b7ef9b000-564b7f0fd000 rw-p  00:00 0  [heap]
 7ff119c84000-7ff119c8a000 r--p  08:13 1442178
/lib/x86_64-linux-gnu/libnss_systemd.so.2
 7ff119c8a000-7ff119cb5000 r-xp 6000 08:13 1442178
/lib/x86_64-linux-gnu/libnss_systemd.so.2
 7ff119cb5000-7ff119cc4000 r--p 00031000 08:13 1442178
/lib/x86_64-linux-gnu/libnss_systemd.so.2
 7ff119cc4000-7ff119cc7000 r--p 0003f000 08:13 1442178
/lib/x86_64-linux-gnu/libnss_systemd.so.2
 7ff119cc7000-7ff119cc8000 rw-p 00042000 08:13 1442178
/lib/x86_64-linux-gnu/libnss_systemd.so.2
 7ff119cc8000-7ff119cc9000 rw-p  00:00 0 
 7ff119cc9000-7ff119ccc000 r--p  08:13 1442226
/lib/x86_64-linux-gnu/libnss_files-2.28.so
 7ff119ccc000-7ff119cd3000 r-xp 3000 08:13 1442226
/lib/x86_64-linux-gnu/libnss_files-2.28.so
 7ff119cd3000-7ff119cd6000 r--p a000 08:13 1442226
/lib/x86_64-linux-gnu/libnss_files-2.28.so
 7ff119cd6000-7ff119cd7000 r--p c000 08:13 1442226
/lib/x86_64-linux-gnu/libnss_files-2.28.so
 7ff119cd7000-7ff119cd8000 rw-p d000 08:13 1442226
/lib/x86_64-linux-gnu/libnss_files-2.28.so
 7ff119cd8000-7ff119ce3000 rw-p  00:00 0 
 7ff119ce3000-7ff119d01000 r-xp  08:13 1442177
/lib/x86_64-linux-gnu/libgpg-error.so.0.24.3
 7ff119d01000-7ff119f01000 ---p 0001e000 08:13 1442177
/lib/x86_64-linux-gnu/libgpg-error.so.0.24.3
 7ff119f01000-7ff119f02000 r--p 0001e000 08:13 1442177
/lib/x86_64-linux-gnu/libgpg-error.so.0.24.3
 7ff119f02000-7ff119f03000 rw-p 0001f000 08:13 1442177
/lib/x86_64-linux-gnu/libgpg-error.so.0.24.3
 7ff119f03000-7ff119f04000 r--p  08:13 1442159
/lib/x86_64-linux-gnu/libdl-2.28.so
 7ff119f04000-7ff119f06000 r-xp 1000 08:13 1442159
/lib/x86_64-linux-gnu/libdl-2.28.so
 7ff119f06000-7ff119f07000 r--p 3000 08:13 1442159
/lib/x86_64-linux-gnu/libdl-2.28.so
 7ff119f07000-7ff119f08000 r--p 3000 08:13 1442159
/lib/x86_64-linux-gnu/libdl-2.28.so
 7ff119f08000-7ff119f09000 rw-p 4000 08:13 1442159
/lib/x86_64-linux-gnu/libdl-2.28.so
 7ff119f09000-7ff119f0b000 r--p  08:13 1442257
/lib/x86_64-linux-gnu/libpcre.so.3.13.3
 7ff119f0b000-7ff119f5d000 r-xp 2000 08:13 1442257
/lib/x86_64-linux-gnu/libpcre.so.3.13.3
 7ff119f5d000-7ff119f7b000 r--p 00054000 08:13 1442257
/lib/x86_64-linux-gnu/libpcre.so.3.13.3
 7ff119f7b000-7ff119f7c000 r--p 00071000 08:13 1442257
/lib/x86_64-linux-gnu/libpcre.so.3.13.3
 7ff119f7c000-7ff119f7d000 rw-p 00072000 08:13 1442257
/lib/x86_64-linux-gnu/libpcre.so.3.13.3
 7ff119f7d000-7ff11a092000 r-xp  08:13 1442175
/lib/x86_64-linux-gnu/libgcrypt.so.20.2.3
 7ff11a092000-7ff11a291000 ---p 00115000 08:13 1442175
/lib/x86_64-linux-gnu/libgcrypt.so.20.2.3
 7ff11a291000-7ff11a293000 r--p 00114000 08:13 1442175
/lib/x86_64-linux-gnu/libgcrypt.so.20.2.3
 7ff11a293000-7ff11a298000 rw-p 00116000 08:13 1442175
/lib/x86_64-linux-gnu/libgcrypt.so.20.2.3
 7ff11a298000-7ff11a29b000 rw-p  00:00 0 
 7ff11a29b000-7ff11a2d1000 r-xp  08:13 7910   
/usr/lib/x86_64-linux-gnu/liblz4.so.1.8.2
 7ff11a2d1000-7ff11a4d ---p 00036000 08:13 7910   
/usr/lib/x86_64-linux-gnu/liblz4.so.1.8.2
 7ff11a4d-7ff11a4d1000 r--p 00035000 08:13 7910   
/usr/lib/x86_64-linux-gnu/liblz4.so.1.8.2
 7ff11a4d1000-7ff11a4d2000 rw-p 00036000 08:13 7910   
/usr/lib/x86_64-linux-gnu/liblz4.so.1.8.2
 7ff11a4d2000-7ff11a4f6000 r-xp  08:13 1442196
/lib/x86_64-linux-gnu/liblzma.so.5.2.2
 

[Bug 1784485] Re: [ZenBook S UX391UA, Realtek ALC294, Mic, Internal] No sound at all

2018-12-10 Thread VanVan
It can't work if you install official kernel.
You need to replace the audio part by this one 
https://github.com/endlessm/linux/tree/master/sound

So you need to compile it ny yourself.

The correction is not yet on official kernel, it can take time before
someone accept the pull request to the official kernel.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1784485

Title:
  [ZenBook S UX391UA, Realtek ALC294, Mic, Internal] No sound at all

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/alsa-driver/+bug/1784485/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1807709] Re: dbus always crashes at session start (on wayland)

2018-12-10 Thread 賴家亨
It not only happens on Wayland, it also happens on Xorg.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1807709

Title:
  dbus always crashes at session start (on wayland)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/dbus/+bug/1807709/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1807441] Re: dangling symlink /usr/bin/vmware-user

2018-12-10 Thread Christian Ehrhardt 
patch is trivial and build worked, I'll be posting it to Debian ...

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1807441

Title:
  dangling symlink /usr/bin/vmware-user

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/open-vm-tools/+bug/1807441/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1747759] Re: [MIR] cpdb-libs

2018-12-10 Thread Till Kamppeter
Anything missing for a promotion into Main?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1747759

Title:
  [MIR] cpdb-libs

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/cpdb-libs/+bug/1747759/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1793386] Re: [Hyper-V] Enable NVME devices

2018-12-10 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-azure - 4.18.0-1006.6

---
linux-azure (4.18.0-1006.6) cosmic; urgency=medium

  * linux-azure: 4.18.0-1006.6 -proposed tracker (LP: #1805244)

  * Accelerated networking (SR-IOV VF) broken in 18.10 daily (LP: #1794477)
- [Packaging] Move pci-hyperv and autofs4 back to linux-modules

linux-azure (4.18.0-1005.5) cosmic; urgency=medium

  * linux-azure: 4.18.0-1005.5 -proposed tracker (LP: #1802752)

  * [Hyper-V] Fix IRQ spreading on NVMe devices with lower numbers of channels
(LP: #1802358)
- SAUCE: genirq/affinity: Spread IRQs to all available NUMA nodes
- SAUCE: irq/matrix: Split out the CPU selection code into a helper
- SAUCE: irq/matrix: Spread managed interrupts on allocation
- SAUCE: genirq/matrix: Improve target CPU selection for managed interrupts.

  [ Ubuntu: 4.18.0-12.13 ]

  * linux: 4.18.0-12.13 -proposed tracker (LP: #1802743)
  * [FEAT] Guest-dedicated Crypto Adapters (LP: #1787405)
- s390/zcrypt: Add ZAPQ inline function.
- s390/zcrypt: Review inline assembler constraints.
- s390/zcrypt: Integrate ap_asm.h into include/asm/ap.h.
- s390/zcrypt: fix ap_instructions_available() returncodes
- KVM: s390: vsie: simulate VCPU SIE entry/exit
- KVM: s390: introduce and use KVM_REQ_VSIE_RESTART
- KVM: s390: refactor crypto initialization
- s390: vfio-ap: base implementation of VFIO AP device driver
- s390: vfio-ap: register matrix device with VFIO mdev framework
- s390: vfio-ap: sysfs interfaces to configure adapters
- s390: vfio-ap: sysfs interfaces to configure domains
- s390: vfio-ap: sysfs interfaces to configure control domains
- s390: vfio-ap: sysfs interface to view matrix mdev matrix
- KVM: s390: interface to clear CRYCB masks
- s390: vfio-ap: implement mediated device open callback
- s390: vfio-ap: implement VFIO_DEVICE_GET_INFO ioctl
- s390: vfio-ap: zeroize the AP queues
- s390: vfio-ap: implement VFIO_DEVICE_RESET ioctl
- KVM: s390: Clear Crypto Control Block when using vSIE
- KVM: s390: vsie: Do the CRYCB validation first
- KVM: s390: vsie: Make use of CRYCB FORMAT2 clear
- KVM: s390: vsie: Allow CRYCB FORMAT-2
- KVM: s390: vsie: allow CRYCB FORMAT-1
- KVM: s390: vsie: allow CRYCB FORMAT-0
- KVM: s390: vsie: allow guest FORMAT-0 CRYCB on host FORMAT-1
- KVM: s390: vsie: allow guest FORMAT-1 CRYCB on host FORMAT-2
- KVM: s390: vsie: allow guest FORMAT-0 CRYCB on host FORMAT-2
- KVM: s390: device attrs to enable/disable AP interpretation
- KVM: s390: CPU model support for AP virtualization
- s390: doc: detailed specifications for AP virtualization
- KVM: s390: fix locking for crypto setting error path
- KVM: s390: Tracing APCB changes
- s390: vfio-ap: setup APCB mask using KVM dedicated function
- [Config:] Enable CONFIG_S390_AP_IOMMU and set CONFIG_VFIO_AP to module.
  * Bypass of mount visibility through userns + mount propagation (LP: #1789161)
- mount: Retest MNT_LOCKED in do_umount
- mount: Don't allow copying MNT_UNBINDABLE|MNT_LOCKED mounts
  *  CVE-2018-18955: nested user namespaces with more than five extents
incorrectly grant privileges over inode (LP: #1801924) // CVE-2018-18955
- userns: also map extents in the reverse map to kernel IDs
  * kdump fail due to an IRQ storm (LP: #1797990)
- SAUCE: x86/PCI: Export find_cap() to be used in early PCI code
- SAUCE: x86/quirks: Add parameter to clear MSIs early on boot
- SAUCE: x86/quirks: Scan all busses for early PCI quirks
  * crash in ENA driver on removing an interface (LP: #1802341)
- SAUCE: net: ena: fix crash during ena_remove()
  * Ubuntu 18.04.1 - [s390x] Kernel panic while stressing network bonding
(LP: #1797367)
- s390/qeth: reduce hard-coded access to ccw channels
- s390/qeth: sanitize strings in debug messages
  * Add checksum offload and TSO support for HiNIC adapters (LP: #1800664)
- net-next/hinic: add checksum offload and TSO support
  * smartpqi updates for ubuntu 18.04.2 (LP: #1798208)
- scsi: smartpqi: improve handling for sync requests
- scsi: smartpqi: improve error checking for sync requests
- scsi: smartpqi: add inspur advantech ids
- scsi: smartpqi: fix critical ARM issue reading PQI index registers
- scsi: smartpqi: bump driver version to 1.1.4-130
  * [GLK/CLX] Enhanced IBRS (LP: #1786139)
- x86/speculation: Remove SPECTRE_V2_IBRS in enum spectre_v2_mitigation
- x86/speculation: Support Enhanced IBRS on future CPUs
  * Enable keyboard wakeup for S2Idle laptops (LP: #1798552)
- Input: i8042 - enable keyboard wakeups by default when s2idle is used
  * Overlayfs in user namespace leaks directory content of inaccessible
directories (LP: #1793458) // CVE-2018-6559
- SAUCE: overlayfs: ensure mounter privileges when reading directories
  * Update ENA driver to version 2.0.1K (LP: #1798182)
- net: ena: remove 

[Bug 1795493] Re: netfilter: nf_conntrack: resolve clash for matching conntracks

2018-12-10 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-azure - 4.18.0-1006.6

---
linux-azure (4.18.0-1006.6) cosmic; urgency=medium

  * linux-azure: 4.18.0-1006.6 -proposed tracker (LP: #1805244)

  * Accelerated networking (SR-IOV VF) broken in 18.10 daily (LP: #1794477)
- [Packaging] Move pci-hyperv and autofs4 back to linux-modules

linux-azure (4.18.0-1005.5) cosmic; urgency=medium

  * linux-azure: 4.18.0-1005.5 -proposed tracker (LP: #1802752)

  * [Hyper-V] Fix IRQ spreading on NVMe devices with lower numbers of channels
(LP: #1802358)
- SAUCE: genirq/affinity: Spread IRQs to all available NUMA nodes
- SAUCE: irq/matrix: Split out the CPU selection code into a helper
- SAUCE: irq/matrix: Spread managed interrupts on allocation
- SAUCE: genirq/matrix: Improve target CPU selection for managed interrupts.

  [ Ubuntu: 4.18.0-12.13 ]

  * linux: 4.18.0-12.13 -proposed tracker (LP: #1802743)
  * [FEAT] Guest-dedicated Crypto Adapters (LP: #1787405)
- s390/zcrypt: Add ZAPQ inline function.
- s390/zcrypt: Review inline assembler constraints.
- s390/zcrypt: Integrate ap_asm.h into include/asm/ap.h.
- s390/zcrypt: fix ap_instructions_available() returncodes
- KVM: s390: vsie: simulate VCPU SIE entry/exit
- KVM: s390: introduce and use KVM_REQ_VSIE_RESTART
- KVM: s390: refactor crypto initialization
- s390: vfio-ap: base implementation of VFIO AP device driver
- s390: vfio-ap: register matrix device with VFIO mdev framework
- s390: vfio-ap: sysfs interfaces to configure adapters
- s390: vfio-ap: sysfs interfaces to configure domains
- s390: vfio-ap: sysfs interfaces to configure control domains
- s390: vfio-ap: sysfs interface to view matrix mdev matrix
- KVM: s390: interface to clear CRYCB masks
- s390: vfio-ap: implement mediated device open callback
- s390: vfio-ap: implement VFIO_DEVICE_GET_INFO ioctl
- s390: vfio-ap: zeroize the AP queues
- s390: vfio-ap: implement VFIO_DEVICE_RESET ioctl
- KVM: s390: Clear Crypto Control Block when using vSIE
- KVM: s390: vsie: Do the CRYCB validation first
- KVM: s390: vsie: Make use of CRYCB FORMAT2 clear
- KVM: s390: vsie: Allow CRYCB FORMAT-2
- KVM: s390: vsie: allow CRYCB FORMAT-1
- KVM: s390: vsie: allow CRYCB FORMAT-0
- KVM: s390: vsie: allow guest FORMAT-0 CRYCB on host FORMAT-1
- KVM: s390: vsie: allow guest FORMAT-1 CRYCB on host FORMAT-2
- KVM: s390: vsie: allow guest FORMAT-0 CRYCB on host FORMAT-2
- KVM: s390: device attrs to enable/disable AP interpretation
- KVM: s390: CPU model support for AP virtualization
- s390: doc: detailed specifications for AP virtualization
- KVM: s390: fix locking for crypto setting error path
- KVM: s390: Tracing APCB changes
- s390: vfio-ap: setup APCB mask using KVM dedicated function
- [Config:] Enable CONFIG_S390_AP_IOMMU and set CONFIG_VFIO_AP to module.
  * Bypass of mount visibility through userns + mount propagation (LP: #1789161)
- mount: Retest MNT_LOCKED in do_umount
- mount: Don't allow copying MNT_UNBINDABLE|MNT_LOCKED mounts
  *  CVE-2018-18955: nested user namespaces with more than five extents
incorrectly grant privileges over inode (LP: #1801924) // CVE-2018-18955
- userns: also map extents in the reverse map to kernel IDs
  * kdump fail due to an IRQ storm (LP: #1797990)
- SAUCE: x86/PCI: Export find_cap() to be used in early PCI code
- SAUCE: x86/quirks: Add parameter to clear MSIs early on boot
- SAUCE: x86/quirks: Scan all busses for early PCI quirks
  * crash in ENA driver on removing an interface (LP: #1802341)
- SAUCE: net: ena: fix crash during ena_remove()
  * Ubuntu 18.04.1 - [s390x] Kernel panic while stressing network bonding
(LP: #1797367)
- s390/qeth: reduce hard-coded access to ccw channels
- s390/qeth: sanitize strings in debug messages
  * Add checksum offload and TSO support for HiNIC adapters (LP: #1800664)
- net-next/hinic: add checksum offload and TSO support
  * smartpqi updates for ubuntu 18.04.2 (LP: #1798208)
- scsi: smartpqi: improve handling for sync requests
- scsi: smartpqi: improve error checking for sync requests
- scsi: smartpqi: add inspur advantech ids
- scsi: smartpqi: fix critical ARM issue reading PQI index registers
- scsi: smartpqi: bump driver version to 1.1.4-130
  * [GLK/CLX] Enhanced IBRS (LP: #1786139)
- x86/speculation: Remove SPECTRE_V2_IBRS in enum spectre_v2_mitigation
- x86/speculation: Support Enhanced IBRS on future CPUs
  * Enable keyboard wakeup for S2Idle laptops (LP: #1798552)
- Input: i8042 - enable keyboard wakeups by default when s2idle is used
  * Overlayfs in user namespace leaks directory content of inaccessible
directories (LP: #1793458) // CVE-2018-6559
- SAUCE: overlayfs: ensure mounter privileges when reading directories
  * Update ENA driver to version 2.0.1K (LP: #1798182)
- net: ena: remove 

[Bug 1786013] Re: Packaging resync

2018-12-10 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-azure - 4.18.0-1006.6

---
linux-azure (4.18.0-1006.6) cosmic; urgency=medium

  * linux-azure: 4.18.0-1006.6 -proposed tracker (LP: #1805244)

  * Accelerated networking (SR-IOV VF) broken in 18.10 daily (LP: #1794477)
- [Packaging] Move pci-hyperv and autofs4 back to linux-modules

linux-azure (4.18.0-1005.5) cosmic; urgency=medium

  * linux-azure: 4.18.0-1005.5 -proposed tracker (LP: #1802752)

  * [Hyper-V] Fix IRQ spreading on NVMe devices with lower numbers of channels
(LP: #1802358)
- SAUCE: genirq/affinity: Spread IRQs to all available NUMA nodes
- SAUCE: irq/matrix: Split out the CPU selection code into a helper
- SAUCE: irq/matrix: Spread managed interrupts on allocation
- SAUCE: genirq/matrix: Improve target CPU selection for managed interrupts.

  [ Ubuntu: 4.18.0-12.13 ]

  * linux: 4.18.0-12.13 -proposed tracker (LP: #1802743)
  * [FEAT] Guest-dedicated Crypto Adapters (LP: #1787405)
- s390/zcrypt: Add ZAPQ inline function.
- s390/zcrypt: Review inline assembler constraints.
- s390/zcrypt: Integrate ap_asm.h into include/asm/ap.h.
- s390/zcrypt: fix ap_instructions_available() returncodes
- KVM: s390: vsie: simulate VCPU SIE entry/exit
- KVM: s390: introduce and use KVM_REQ_VSIE_RESTART
- KVM: s390: refactor crypto initialization
- s390: vfio-ap: base implementation of VFIO AP device driver
- s390: vfio-ap: register matrix device with VFIO mdev framework
- s390: vfio-ap: sysfs interfaces to configure adapters
- s390: vfio-ap: sysfs interfaces to configure domains
- s390: vfio-ap: sysfs interfaces to configure control domains
- s390: vfio-ap: sysfs interface to view matrix mdev matrix
- KVM: s390: interface to clear CRYCB masks
- s390: vfio-ap: implement mediated device open callback
- s390: vfio-ap: implement VFIO_DEVICE_GET_INFO ioctl
- s390: vfio-ap: zeroize the AP queues
- s390: vfio-ap: implement VFIO_DEVICE_RESET ioctl
- KVM: s390: Clear Crypto Control Block when using vSIE
- KVM: s390: vsie: Do the CRYCB validation first
- KVM: s390: vsie: Make use of CRYCB FORMAT2 clear
- KVM: s390: vsie: Allow CRYCB FORMAT-2
- KVM: s390: vsie: allow CRYCB FORMAT-1
- KVM: s390: vsie: allow CRYCB FORMAT-0
- KVM: s390: vsie: allow guest FORMAT-0 CRYCB on host FORMAT-1
- KVM: s390: vsie: allow guest FORMAT-1 CRYCB on host FORMAT-2
- KVM: s390: vsie: allow guest FORMAT-0 CRYCB on host FORMAT-2
- KVM: s390: device attrs to enable/disable AP interpretation
- KVM: s390: CPU model support for AP virtualization
- s390: doc: detailed specifications for AP virtualization
- KVM: s390: fix locking for crypto setting error path
- KVM: s390: Tracing APCB changes
- s390: vfio-ap: setup APCB mask using KVM dedicated function
- [Config:] Enable CONFIG_S390_AP_IOMMU and set CONFIG_VFIO_AP to module.
  * Bypass of mount visibility through userns + mount propagation (LP: #1789161)
- mount: Retest MNT_LOCKED in do_umount
- mount: Don't allow copying MNT_UNBINDABLE|MNT_LOCKED mounts
  *  CVE-2018-18955: nested user namespaces with more than five extents
incorrectly grant privileges over inode (LP: #1801924) // CVE-2018-18955
- userns: also map extents in the reverse map to kernel IDs
  * kdump fail due to an IRQ storm (LP: #1797990)
- SAUCE: x86/PCI: Export find_cap() to be used in early PCI code
- SAUCE: x86/quirks: Add parameter to clear MSIs early on boot
- SAUCE: x86/quirks: Scan all busses for early PCI quirks
  * crash in ENA driver on removing an interface (LP: #1802341)
- SAUCE: net: ena: fix crash during ena_remove()
  * Ubuntu 18.04.1 - [s390x] Kernel panic while stressing network bonding
(LP: #1797367)
- s390/qeth: reduce hard-coded access to ccw channels
- s390/qeth: sanitize strings in debug messages
  * Add checksum offload and TSO support for HiNIC adapters (LP: #1800664)
- net-next/hinic: add checksum offload and TSO support
  * smartpqi updates for ubuntu 18.04.2 (LP: #1798208)
- scsi: smartpqi: improve handling for sync requests
- scsi: smartpqi: improve error checking for sync requests
- scsi: smartpqi: add inspur advantech ids
- scsi: smartpqi: fix critical ARM issue reading PQI index registers
- scsi: smartpqi: bump driver version to 1.1.4-130
  * [GLK/CLX] Enhanced IBRS (LP: #1786139)
- x86/speculation: Remove SPECTRE_V2_IBRS in enum spectre_v2_mitigation
- x86/speculation: Support Enhanced IBRS on future CPUs
  * Enable keyboard wakeup for S2Idle laptops (LP: #1798552)
- Input: i8042 - enable keyboard wakeups by default when s2idle is used
  * Overlayfs in user namespace leaks directory content of inaccessible
directories (LP: #1793458) // CVE-2018-6559
- SAUCE: overlayfs: ensure mounter privileges when reading directories
  * Update ENA driver to version 2.0.1K (LP: #1798182)
- net: ena: remove 

[Bug 1793462] Re: linux-azure: fix getabis information

2018-12-10 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-azure - 4.18.0-1006.6

---
linux-azure (4.18.0-1006.6) cosmic; urgency=medium

  * linux-azure: 4.18.0-1006.6 -proposed tracker (LP: #1805244)

  * Accelerated networking (SR-IOV VF) broken in 18.10 daily (LP: #1794477)
- [Packaging] Move pci-hyperv and autofs4 back to linux-modules

linux-azure (4.18.0-1005.5) cosmic; urgency=medium

  * linux-azure: 4.18.0-1005.5 -proposed tracker (LP: #1802752)

  * [Hyper-V] Fix IRQ spreading on NVMe devices with lower numbers of channels
(LP: #1802358)
- SAUCE: genirq/affinity: Spread IRQs to all available NUMA nodes
- SAUCE: irq/matrix: Split out the CPU selection code into a helper
- SAUCE: irq/matrix: Spread managed interrupts on allocation
- SAUCE: genirq/matrix: Improve target CPU selection for managed interrupts.

  [ Ubuntu: 4.18.0-12.13 ]

  * linux: 4.18.0-12.13 -proposed tracker (LP: #1802743)
  * [FEAT] Guest-dedicated Crypto Adapters (LP: #1787405)
- s390/zcrypt: Add ZAPQ inline function.
- s390/zcrypt: Review inline assembler constraints.
- s390/zcrypt: Integrate ap_asm.h into include/asm/ap.h.
- s390/zcrypt: fix ap_instructions_available() returncodes
- KVM: s390: vsie: simulate VCPU SIE entry/exit
- KVM: s390: introduce and use KVM_REQ_VSIE_RESTART
- KVM: s390: refactor crypto initialization
- s390: vfio-ap: base implementation of VFIO AP device driver
- s390: vfio-ap: register matrix device with VFIO mdev framework
- s390: vfio-ap: sysfs interfaces to configure adapters
- s390: vfio-ap: sysfs interfaces to configure domains
- s390: vfio-ap: sysfs interfaces to configure control domains
- s390: vfio-ap: sysfs interface to view matrix mdev matrix
- KVM: s390: interface to clear CRYCB masks
- s390: vfio-ap: implement mediated device open callback
- s390: vfio-ap: implement VFIO_DEVICE_GET_INFO ioctl
- s390: vfio-ap: zeroize the AP queues
- s390: vfio-ap: implement VFIO_DEVICE_RESET ioctl
- KVM: s390: Clear Crypto Control Block when using vSIE
- KVM: s390: vsie: Do the CRYCB validation first
- KVM: s390: vsie: Make use of CRYCB FORMAT2 clear
- KVM: s390: vsie: Allow CRYCB FORMAT-2
- KVM: s390: vsie: allow CRYCB FORMAT-1
- KVM: s390: vsie: allow CRYCB FORMAT-0
- KVM: s390: vsie: allow guest FORMAT-0 CRYCB on host FORMAT-1
- KVM: s390: vsie: allow guest FORMAT-1 CRYCB on host FORMAT-2
- KVM: s390: vsie: allow guest FORMAT-0 CRYCB on host FORMAT-2
- KVM: s390: device attrs to enable/disable AP interpretation
- KVM: s390: CPU model support for AP virtualization
- s390: doc: detailed specifications for AP virtualization
- KVM: s390: fix locking for crypto setting error path
- KVM: s390: Tracing APCB changes
- s390: vfio-ap: setup APCB mask using KVM dedicated function
- [Config:] Enable CONFIG_S390_AP_IOMMU and set CONFIG_VFIO_AP to module.
  * Bypass of mount visibility through userns + mount propagation (LP: #1789161)
- mount: Retest MNT_LOCKED in do_umount
- mount: Don't allow copying MNT_UNBINDABLE|MNT_LOCKED mounts
  *  CVE-2018-18955: nested user namespaces with more than five extents
incorrectly grant privileges over inode (LP: #1801924) // CVE-2018-18955
- userns: also map extents in the reverse map to kernel IDs
  * kdump fail due to an IRQ storm (LP: #1797990)
- SAUCE: x86/PCI: Export find_cap() to be used in early PCI code
- SAUCE: x86/quirks: Add parameter to clear MSIs early on boot
- SAUCE: x86/quirks: Scan all busses for early PCI quirks
  * crash in ENA driver on removing an interface (LP: #1802341)
- SAUCE: net: ena: fix crash during ena_remove()
  * Ubuntu 18.04.1 - [s390x] Kernel panic while stressing network bonding
(LP: #1797367)
- s390/qeth: reduce hard-coded access to ccw channels
- s390/qeth: sanitize strings in debug messages
  * Add checksum offload and TSO support for HiNIC adapters (LP: #1800664)
- net-next/hinic: add checksum offload and TSO support
  * smartpqi updates for ubuntu 18.04.2 (LP: #1798208)
- scsi: smartpqi: improve handling for sync requests
- scsi: smartpqi: improve error checking for sync requests
- scsi: smartpqi: add inspur advantech ids
- scsi: smartpqi: fix critical ARM issue reading PQI index registers
- scsi: smartpqi: bump driver version to 1.1.4-130
  * [GLK/CLX] Enhanced IBRS (LP: #1786139)
- x86/speculation: Remove SPECTRE_V2_IBRS in enum spectre_v2_mitigation
- x86/speculation: Support Enhanced IBRS on future CPUs
  * Enable keyboard wakeup for S2Idle laptops (LP: #1798552)
- Input: i8042 - enable keyboard wakeups by default when s2idle is used
  * Overlayfs in user namespace leaks directory content of inaccessible
directories (LP: #1793458) // CVE-2018-6559
- SAUCE: overlayfs: ensure mounter privileges when reading directories
  * Update ENA driver to version 2.0.1K (LP: #1798182)
- net: ena: remove 

[Bug 1794477] Re: Accelerated networking (SR-IOV VF) broken in 18.10 daily

2018-12-10 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-azure - 4.18.0-1006.6

---
linux-azure (4.18.0-1006.6) cosmic; urgency=medium

  * linux-azure: 4.18.0-1006.6 -proposed tracker (LP: #1805244)

  * Accelerated networking (SR-IOV VF) broken in 18.10 daily (LP: #1794477)
- [Packaging] Move pci-hyperv and autofs4 back to linux-modules

linux-azure (4.18.0-1005.5) cosmic; urgency=medium

  * linux-azure: 4.18.0-1005.5 -proposed tracker (LP: #1802752)

  * [Hyper-V] Fix IRQ spreading on NVMe devices with lower numbers of channels
(LP: #1802358)
- SAUCE: genirq/affinity: Spread IRQs to all available NUMA nodes
- SAUCE: irq/matrix: Split out the CPU selection code into a helper
- SAUCE: irq/matrix: Spread managed interrupts on allocation
- SAUCE: genirq/matrix: Improve target CPU selection for managed interrupts.

  [ Ubuntu: 4.18.0-12.13 ]

  * linux: 4.18.0-12.13 -proposed tracker (LP: #1802743)
  * [FEAT] Guest-dedicated Crypto Adapters (LP: #1787405)
- s390/zcrypt: Add ZAPQ inline function.
- s390/zcrypt: Review inline assembler constraints.
- s390/zcrypt: Integrate ap_asm.h into include/asm/ap.h.
- s390/zcrypt: fix ap_instructions_available() returncodes
- KVM: s390: vsie: simulate VCPU SIE entry/exit
- KVM: s390: introduce and use KVM_REQ_VSIE_RESTART
- KVM: s390: refactor crypto initialization
- s390: vfio-ap: base implementation of VFIO AP device driver
- s390: vfio-ap: register matrix device with VFIO mdev framework
- s390: vfio-ap: sysfs interfaces to configure adapters
- s390: vfio-ap: sysfs interfaces to configure domains
- s390: vfio-ap: sysfs interfaces to configure control domains
- s390: vfio-ap: sysfs interface to view matrix mdev matrix
- KVM: s390: interface to clear CRYCB masks
- s390: vfio-ap: implement mediated device open callback
- s390: vfio-ap: implement VFIO_DEVICE_GET_INFO ioctl
- s390: vfio-ap: zeroize the AP queues
- s390: vfio-ap: implement VFIO_DEVICE_RESET ioctl
- KVM: s390: Clear Crypto Control Block when using vSIE
- KVM: s390: vsie: Do the CRYCB validation first
- KVM: s390: vsie: Make use of CRYCB FORMAT2 clear
- KVM: s390: vsie: Allow CRYCB FORMAT-2
- KVM: s390: vsie: allow CRYCB FORMAT-1
- KVM: s390: vsie: allow CRYCB FORMAT-0
- KVM: s390: vsie: allow guest FORMAT-0 CRYCB on host FORMAT-1
- KVM: s390: vsie: allow guest FORMAT-1 CRYCB on host FORMAT-2
- KVM: s390: vsie: allow guest FORMAT-0 CRYCB on host FORMAT-2
- KVM: s390: device attrs to enable/disable AP interpretation
- KVM: s390: CPU model support for AP virtualization
- s390: doc: detailed specifications for AP virtualization
- KVM: s390: fix locking for crypto setting error path
- KVM: s390: Tracing APCB changes
- s390: vfio-ap: setup APCB mask using KVM dedicated function
- [Config:] Enable CONFIG_S390_AP_IOMMU and set CONFIG_VFIO_AP to module.
  * Bypass of mount visibility through userns + mount propagation (LP: #1789161)
- mount: Retest MNT_LOCKED in do_umount
- mount: Don't allow copying MNT_UNBINDABLE|MNT_LOCKED mounts
  *  CVE-2018-18955: nested user namespaces with more than five extents
incorrectly grant privileges over inode (LP: #1801924) // CVE-2018-18955
- userns: also map extents in the reverse map to kernel IDs
  * kdump fail due to an IRQ storm (LP: #1797990)
- SAUCE: x86/PCI: Export find_cap() to be used in early PCI code
- SAUCE: x86/quirks: Add parameter to clear MSIs early on boot
- SAUCE: x86/quirks: Scan all busses for early PCI quirks
  * crash in ENA driver on removing an interface (LP: #1802341)
- SAUCE: net: ena: fix crash during ena_remove()
  * Ubuntu 18.04.1 - [s390x] Kernel panic while stressing network bonding
(LP: #1797367)
- s390/qeth: reduce hard-coded access to ccw channels
- s390/qeth: sanitize strings in debug messages
  * Add checksum offload and TSO support for HiNIC adapters (LP: #1800664)
- net-next/hinic: add checksum offload and TSO support
  * smartpqi updates for ubuntu 18.04.2 (LP: #1798208)
- scsi: smartpqi: improve handling for sync requests
- scsi: smartpqi: improve error checking for sync requests
- scsi: smartpqi: add inspur advantech ids
- scsi: smartpqi: fix critical ARM issue reading PQI index registers
- scsi: smartpqi: bump driver version to 1.1.4-130
  * [GLK/CLX] Enhanced IBRS (LP: #1786139)
- x86/speculation: Remove SPECTRE_V2_IBRS in enum spectre_v2_mitigation
- x86/speculation: Support Enhanced IBRS on future CPUs
  * Enable keyboard wakeup for S2Idle laptops (LP: #1798552)
- Input: i8042 - enable keyboard wakeups by default when s2idle is used
  * Overlayfs in user namespace leaks directory content of inaccessible
directories (LP: #1793458) // CVE-2018-6559
- SAUCE: overlayfs: ensure mounter privileges when reading directories
  * Update ENA driver to version 2.0.1K (LP: #1798182)
- net: ena: remove 

[Bug 1799451] Re: linux-azure: 4.18.0-1004.4 -proposed tracker

2018-12-10 Thread Launchpad Bug Tracker
*** This bug is a duplicate of bug 1805244 ***
https://bugs.launchpad.net/bugs/1805244

This bug was fixed in the package linux-azure - 4.18.0-1006.6

---
linux-azure (4.18.0-1006.6) cosmic; urgency=medium

  * linux-azure: 4.18.0-1006.6 -proposed tracker (LP: #1805244)

  * Accelerated networking (SR-IOV VF) broken in 18.10 daily (LP: #1794477)
- [Packaging] Move pci-hyperv and autofs4 back to linux-modules

linux-azure (4.18.0-1005.5) cosmic; urgency=medium

  * linux-azure: 4.18.0-1005.5 -proposed tracker (LP: #1802752)

  * [Hyper-V] Fix IRQ spreading on NVMe devices with lower numbers of channels
(LP: #1802358)
- SAUCE: genirq/affinity: Spread IRQs to all available NUMA nodes
- SAUCE: irq/matrix: Split out the CPU selection code into a helper
- SAUCE: irq/matrix: Spread managed interrupts on allocation
- SAUCE: genirq/matrix: Improve target CPU selection for managed interrupts.

  [ Ubuntu: 4.18.0-12.13 ]

  * linux: 4.18.0-12.13 -proposed tracker (LP: #1802743)
  * [FEAT] Guest-dedicated Crypto Adapters (LP: #1787405)
- s390/zcrypt: Add ZAPQ inline function.
- s390/zcrypt: Review inline assembler constraints.
- s390/zcrypt: Integrate ap_asm.h into include/asm/ap.h.
- s390/zcrypt: fix ap_instructions_available() returncodes
- KVM: s390: vsie: simulate VCPU SIE entry/exit
- KVM: s390: introduce and use KVM_REQ_VSIE_RESTART
- KVM: s390: refactor crypto initialization
- s390: vfio-ap: base implementation of VFIO AP device driver
- s390: vfio-ap: register matrix device with VFIO mdev framework
- s390: vfio-ap: sysfs interfaces to configure adapters
- s390: vfio-ap: sysfs interfaces to configure domains
- s390: vfio-ap: sysfs interfaces to configure control domains
- s390: vfio-ap: sysfs interface to view matrix mdev matrix
- KVM: s390: interface to clear CRYCB masks
- s390: vfio-ap: implement mediated device open callback
- s390: vfio-ap: implement VFIO_DEVICE_GET_INFO ioctl
- s390: vfio-ap: zeroize the AP queues
- s390: vfio-ap: implement VFIO_DEVICE_RESET ioctl
- KVM: s390: Clear Crypto Control Block when using vSIE
- KVM: s390: vsie: Do the CRYCB validation first
- KVM: s390: vsie: Make use of CRYCB FORMAT2 clear
- KVM: s390: vsie: Allow CRYCB FORMAT-2
- KVM: s390: vsie: allow CRYCB FORMAT-1
- KVM: s390: vsie: allow CRYCB FORMAT-0
- KVM: s390: vsie: allow guest FORMAT-0 CRYCB on host FORMAT-1
- KVM: s390: vsie: allow guest FORMAT-1 CRYCB on host FORMAT-2
- KVM: s390: vsie: allow guest FORMAT-0 CRYCB on host FORMAT-2
- KVM: s390: device attrs to enable/disable AP interpretation
- KVM: s390: CPU model support for AP virtualization
- s390: doc: detailed specifications for AP virtualization
- KVM: s390: fix locking for crypto setting error path
- KVM: s390: Tracing APCB changes
- s390: vfio-ap: setup APCB mask using KVM dedicated function
- [Config:] Enable CONFIG_S390_AP_IOMMU and set CONFIG_VFIO_AP to module.
  * Bypass of mount visibility through userns + mount propagation (LP: #1789161)
- mount: Retest MNT_LOCKED in do_umount
- mount: Don't allow copying MNT_UNBINDABLE|MNT_LOCKED mounts
  *  CVE-2018-18955: nested user namespaces with more than five extents
incorrectly grant privileges over inode (LP: #1801924) // CVE-2018-18955
- userns: also map extents in the reverse map to kernel IDs
  * kdump fail due to an IRQ storm (LP: #1797990)
- SAUCE: x86/PCI: Export find_cap() to be used in early PCI code
- SAUCE: x86/quirks: Add parameter to clear MSIs early on boot
- SAUCE: x86/quirks: Scan all busses for early PCI quirks
  * crash in ENA driver on removing an interface (LP: #1802341)
- SAUCE: net: ena: fix crash during ena_remove()
  * Ubuntu 18.04.1 - [s390x] Kernel panic while stressing network bonding
(LP: #1797367)
- s390/qeth: reduce hard-coded access to ccw channels
- s390/qeth: sanitize strings in debug messages
  * Add checksum offload and TSO support for HiNIC adapters (LP: #1800664)
- net-next/hinic: add checksum offload and TSO support
  * smartpqi updates for ubuntu 18.04.2 (LP: #1798208)
- scsi: smartpqi: improve handling for sync requests
- scsi: smartpqi: improve error checking for sync requests
- scsi: smartpqi: add inspur advantech ids
- scsi: smartpqi: fix critical ARM issue reading PQI index registers
- scsi: smartpqi: bump driver version to 1.1.4-130
  * [GLK/CLX] Enhanced IBRS (LP: #1786139)
- x86/speculation: Remove SPECTRE_V2_IBRS in enum spectre_v2_mitigation
- x86/speculation: Support Enhanced IBRS on future CPUs
  * Enable keyboard wakeup for S2Idle laptops (LP: #1798552)
- Input: i8042 - enable keyboard wakeups by default when s2idle is used
  * Overlayfs in user namespace leaks directory content of inaccessible
directories (LP: #1793458) // CVE-2018-6559
- SAUCE: overlayfs: ensure mounter privileges when reading 

[Bug 1805244] Re: linux-azure: 4.18.0-1006.6 -proposed tracker

2018-12-10 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-azure - 4.18.0-1006.6

---
linux-azure (4.18.0-1006.6) cosmic; urgency=medium

  * linux-azure: 4.18.0-1006.6 -proposed tracker (LP: #1805244)

  * Accelerated networking (SR-IOV VF) broken in 18.10 daily (LP: #1794477)
- [Packaging] Move pci-hyperv and autofs4 back to linux-modules

linux-azure (4.18.0-1005.5) cosmic; urgency=medium

  * linux-azure: 4.18.0-1005.5 -proposed tracker (LP: #1802752)

  * [Hyper-V] Fix IRQ spreading on NVMe devices with lower numbers of channels
(LP: #1802358)
- SAUCE: genirq/affinity: Spread IRQs to all available NUMA nodes
- SAUCE: irq/matrix: Split out the CPU selection code into a helper
- SAUCE: irq/matrix: Spread managed interrupts on allocation
- SAUCE: genirq/matrix: Improve target CPU selection for managed interrupts.

  [ Ubuntu: 4.18.0-12.13 ]

  * linux: 4.18.0-12.13 -proposed tracker (LP: #1802743)
  * [FEAT] Guest-dedicated Crypto Adapters (LP: #1787405)
- s390/zcrypt: Add ZAPQ inline function.
- s390/zcrypt: Review inline assembler constraints.
- s390/zcrypt: Integrate ap_asm.h into include/asm/ap.h.
- s390/zcrypt: fix ap_instructions_available() returncodes
- KVM: s390: vsie: simulate VCPU SIE entry/exit
- KVM: s390: introduce and use KVM_REQ_VSIE_RESTART
- KVM: s390: refactor crypto initialization
- s390: vfio-ap: base implementation of VFIO AP device driver
- s390: vfio-ap: register matrix device with VFIO mdev framework
- s390: vfio-ap: sysfs interfaces to configure adapters
- s390: vfio-ap: sysfs interfaces to configure domains
- s390: vfio-ap: sysfs interfaces to configure control domains
- s390: vfio-ap: sysfs interface to view matrix mdev matrix
- KVM: s390: interface to clear CRYCB masks
- s390: vfio-ap: implement mediated device open callback
- s390: vfio-ap: implement VFIO_DEVICE_GET_INFO ioctl
- s390: vfio-ap: zeroize the AP queues
- s390: vfio-ap: implement VFIO_DEVICE_RESET ioctl
- KVM: s390: Clear Crypto Control Block when using vSIE
- KVM: s390: vsie: Do the CRYCB validation first
- KVM: s390: vsie: Make use of CRYCB FORMAT2 clear
- KVM: s390: vsie: Allow CRYCB FORMAT-2
- KVM: s390: vsie: allow CRYCB FORMAT-1
- KVM: s390: vsie: allow CRYCB FORMAT-0
- KVM: s390: vsie: allow guest FORMAT-0 CRYCB on host FORMAT-1
- KVM: s390: vsie: allow guest FORMAT-1 CRYCB on host FORMAT-2
- KVM: s390: vsie: allow guest FORMAT-0 CRYCB on host FORMAT-2
- KVM: s390: device attrs to enable/disable AP interpretation
- KVM: s390: CPU model support for AP virtualization
- s390: doc: detailed specifications for AP virtualization
- KVM: s390: fix locking for crypto setting error path
- KVM: s390: Tracing APCB changes
- s390: vfio-ap: setup APCB mask using KVM dedicated function
- [Config:] Enable CONFIG_S390_AP_IOMMU and set CONFIG_VFIO_AP to module.
  * Bypass of mount visibility through userns + mount propagation (LP: #1789161)
- mount: Retest MNT_LOCKED in do_umount
- mount: Don't allow copying MNT_UNBINDABLE|MNT_LOCKED mounts
  *  CVE-2018-18955: nested user namespaces with more than five extents
incorrectly grant privileges over inode (LP: #1801924) // CVE-2018-18955
- userns: also map extents in the reverse map to kernel IDs
  * kdump fail due to an IRQ storm (LP: #1797990)
- SAUCE: x86/PCI: Export find_cap() to be used in early PCI code
- SAUCE: x86/quirks: Add parameter to clear MSIs early on boot
- SAUCE: x86/quirks: Scan all busses for early PCI quirks
  * crash in ENA driver on removing an interface (LP: #1802341)
- SAUCE: net: ena: fix crash during ena_remove()
  * Ubuntu 18.04.1 - [s390x] Kernel panic while stressing network bonding
(LP: #1797367)
- s390/qeth: reduce hard-coded access to ccw channels
- s390/qeth: sanitize strings in debug messages
  * Add checksum offload and TSO support for HiNIC adapters (LP: #1800664)
- net-next/hinic: add checksum offload and TSO support
  * smartpqi updates for ubuntu 18.04.2 (LP: #1798208)
- scsi: smartpqi: improve handling for sync requests
- scsi: smartpqi: improve error checking for sync requests
- scsi: smartpqi: add inspur advantech ids
- scsi: smartpqi: fix critical ARM issue reading PQI index registers
- scsi: smartpqi: bump driver version to 1.1.4-130
  * [GLK/CLX] Enhanced IBRS (LP: #1786139)
- x86/speculation: Remove SPECTRE_V2_IBRS in enum spectre_v2_mitigation
- x86/speculation: Support Enhanced IBRS on future CPUs
  * Enable keyboard wakeup for S2Idle laptops (LP: #1798552)
- Input: i8042 - enable keyboard wakeups by default when s2idle is used
  * Overlayfs in user namespace leaks directory content of inaccessible
directories (LP: #1793458) // CVE-2018-6559
- SAUCE: overlayfs: ensure mounter privileges when reading directories
  * Update ENA driver to version 2.0.1K (LP: #1798182)
- net: ena: remove 

[Bug 1802752] Re: linux-azure: 4.18.0-1005.5 -proposed tracker

2018-12-10 Thread Launchpad Bug Tracker
*** This bug is a duplicate of bug 1805244 ***
https://bugs.launchpad.net/bugs/1805244

This bug was fixed in the package linux-azure - 4.18.0-1006.6

---
linux-azure (4.18.0-1006.6) cosmic; urgency=medium

  * linux-azure: 4.18.0-1006.6 -proposed tracker (LP: #1805244)

  * Accelerated networking (SR-IOV VF) broken in 18.10 daily (LP: #1794477)
- [Packaging] Move pci-hyperv and autofs4 back to linux-modules

linux-azure (4.18.0-1005.5) cosmic; urgency=medium

  * linux-azure: 4.18.0-1005.5 -proposed tracker (LP: #1802752)

  * [Hyper-V] Fix IRQ spreading on NVMe devices with lower numbers of channels
(LP: #1802358)
- SAUCE: genirq/affinity: Spread IRQs to all available NUMA nodes
- SAUCE: irq/matrix: Split out the CPU selection code into a helper
- SAUCE: irq/matrix: Spread managed interrupts on allocation
- SAUCE: genirq/matrix: Improve target CPU selection for managed interrupts.

  [ Ubuntu: 4.18.0-12.13 ]

  * linux: 4.18.0-12.13 -proposed tracker (LP: #1802743)
  * [FEAT] Guest-dedicated Crypto Adapters (LP: #1787405)
- s390/zcrypt: Add ZAPQ inline function.
- s390/zcrypt: Review inline assembler constraints.
- s390/zcrypt: Integrate ap_asm.h into include/asm/ap.h.
- s390/zcrypt: fix ap_instructions_available() returncodes
- KVM: s390: vsie: simulate VCPU SIE entry/exit
- KVM: s390: introduce and use KVM_REQ_VSIE_RESTART
- KVM: s390: refactor crypto initialization
- s390: vfio-ap: base implementation of VFIO AP device driver
- s390: vfio-ap: register matrix device with VFIO mdev framework
- s390: vfio-ap: sysfs interfaces to configure adapters
- s390: vfio-ap: sysfs interfaces to configure domains
- s390: vfio-ap: sysfs interfaces to configure control domains
- s390: vfio-ap: sysfs interface to view matrix mdev matrix
- KVM: s390: interface to clear CRYCB masks
- s390: vfio-ap: implement mediated device open callback
- s390: vfio-ap: implement VFIO_DEVICE_GET_INFO ioctl
- s390: vfio-ap: zeroize the AP queues
- s390: vfio-ap: implement VFIO_DEVICE_RESET ioctl
- KVM: s390: Clear Crypto Control Block when using vSIE
- KVM: s390: vsie: Do the CRYCB validation first
- KVM: s390: vsie: Make use of CRYCB FORMAT2 clear
- KVM: s390: vsie: Allow CRYCB FORMAT-2
- KVM: s390: vsie: allow CRYCB FORMAT-1
- KVM: s390: vsie: allow CRYCB FORMAT-0
- KVM: s390: vsie: allow guest FORMAT-0 CRYCB on host FORMAT-1
- KVM: s390: vsie: allow guest FORMAT-1 CRYCB on host FORMAT-2
- KVM: s390: vsie: allow guest FORMAT-0 CRYCB on host FORMAT-2
- KVM: s390: device attrs to enable/disable AP interpretation
- KVM: s390: CPU model support for AP virtualization
- s390: doc: detailed specifications for AP virtualization
- KVM: s390: fix locking for crypto setting error path
- KVM: s390: Tracing APCB changes
- s390: vfio-ap: setup APCB mask using KVM dedicated function
- [Config:] Enable CONFIG_S390_AP_IOMMU and set CONFIG_VFIO_AP to module.
  * Bypass of mount visibility through userns + mount propagation (LP: #1789161)
- mount: Retest MNT_LOCKED in do_umount
- mount: Don't allow copying MNT_UNBINDABLE|MNT_LOCKED mounts
  *  CVE-2018-18955: nested user namespaces with more than five extents
incorrectly grant privileges over inode (LP: #1801924) // CVE-2018-18955
- userns: also map extents in the reverse map to kernel IDs
  * kdump fail due to an IRQ storm (LP: #1797990)
- SAUCE: x86/PCI: Export find_cap() to be used in early PCI code
- SAUCE: x86/quirks: Add parameter to clear MSIs early on boot
- SAUCE: x86/quirks: Scan all busses for early PCI quirks
  * crash in ENA driver on removing an interface (LP: #1802341)
- SAUCE: net: ena: fix crash during ena_remove()
  * Ubuntu 18.04.1 - [s390x] Kernel panic while stressing network bonding
(LP: #1797367)
- s390/qeth: reduce hard-coded access to ccw channels
- s390/qeth: sanitize strings in debug messages
  * Add checksum offload and TSO support for HiNIC adapters (LP: #1800664)
- net-next/hinic: add checksum offload and TSO support
  * smartpqi updates for ubuntu 18.04.2 (LP: #1798208)
- scsi: smartpqi: improve handling for sync requests
- scsi: smartpqi: improve error checking for sync requests
- scsi: smartpqi: add inspur advantech ids
- scsi: smartpqi: fix critical ARM issue reading PQI index registers
- scsi: smartpqi: bump driver version to 1.1.4-130
  * [GLK/CLX] Enhanced IBRS (LP: #1786139)
- x86/speculation: Remove SPECTRE_V2_IBRS in enum spectre_v2_mitigation
- x86/speculation: Support Enhanced IBRS on future CPUs
  * Enable keyboard wakeup for S2Idle laptops (LP: #1798552)
- Input: i8042 - enable keyboard wakeups by default when s2idle is used
  * Overlayfs in user namespace leaks directory content of inaccessible
directories (LP: #1793458) // CVE-2018-6559
- SAUCE: overlayfs: ensure mounter privileges when reading 

[Bug 1806352] Re: HP LaserJet 1005 only prints first page

2018-12-10 Thread brian_p
> When I click 'Next', just get 'Failed to install Plug-in'.

This could be

https://bugs.launchpad.net/hplip/+bug/1807051

> HP Device plug-in version mismatch or some files are corrupted.

Download *.run and *.asc from

 https://developers.hp.com/hp-linux-imaging-and-printing/plugins

and install the plugin with 'hp-plugin -p .'

-- 
Brian.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1806352

Title:
  HP LaserJet 1005 only prints first page

To manage notifications about this bug go to:
https://bugs.launchpad.net/hplip/+bug/1806352/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1804445] Re: Update rax-nova-agent to 2.1.18

2018-12-10 Thread Balint Reczey
** Tags removed: verification-needed verification-needed-bionic 
verification-needed-cosmic verification-needed-xenial
** Tags added: verification-done verification-done-bionic 
verification-done-cosmic verification-done-xenial

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1804445

Title:
   Update rax-nova-agent to 2.1.18

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/rax-nova-agent/+bug/1804445/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1806952] Re: linux: 4.19.0-8.9 -proposed tracker

2018-12-10 Thread Brad Figg
** Changed in: kernel-sru-workflow/automated-testing
   Status: Confirmed => Incomplete

** Description changed:

  This bug is for tracking the  upload package. This
  bug will contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see:
  https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  
  backports: 
  derivatives:
  -- swm properties --
  phase: Promoted to proposed
  phase-changed: Friday, 07. December 2018 10:02 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason:
-   automated-testing: Testing in progress
+   automated-testing: Testing FAILED
regression-testing: Testing in progress

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1806952

Title:
  linux: 4.19.0-8.9 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1806952/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1807441] Re: dangling symlink /usr/bin/vmware-user

2018-12-10 Thread Christian Ehrhardt 
Thanks Scott,
the target of the link is actually content of open-vm-tools-desktop.
Once that is installed the symlink is ok.

We don't want a dependency from open.-vm-tools to open-vm-tools-desktop.
Instead the right solution is to move the symlink to open-vm-desktop as well.

This is old - way back in 2014 2:9.4.6-1770165-2 moved the man page for example.
It always works vice versa as the -desktop package depends on the base.


** Changed in: open-vm-tools (Ubuntu)
   Status: New => Triaged

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1807441

Title:
  dangling symlink /usr/bin/vmware-user

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/open-vm-tools/+bug/1807441/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1807504] Re: Evince segfaults when opening PDF

2018-12-10 Thread Sebastien Bacher
Confirmed with the example from
https://bugs.launchpad.net/ubuntu/+source/poppler/+bug/1803059/comments/10
, it's a regression from the poppler security update

** Changed in: poppler (Ubuntu)
   Importance: Undecided => High

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1807504

Title:
  Evince segfaults when opening PDF

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/poppler/+bug/1807504/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1806410] Re: linux-hwe: 4.18.0-13.14~18.04.1 -proposed tracker

2018-12-10 Thread Brad Figg
** Changed in: kernel-sru-workflow/automated-testing
   Status: Confirmed => Incomplete

** Description changed:

  This bug is for tracking the  upload package. This
  bug will contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1806409
  phase: Promoted to proposed
  phase-changed: Saturday, 08. December 2018 09:39 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason:
-   automated-testing: Testing in progress
+   automated-testing: Testing FAILED
certification-testing: Testing in progress
regression-testing: Testing in progress
security-signoff: Waiting for signoff
verification-testing: Testing in progress

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1806410

Title:
  linux-hwe: 4.18.0-13.14~18.04.1 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1806410/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1805655] Re: BUG: unable to handle kernel NULL pointer dereference at 0000000000000008

2018-12-10 Thread Joseph Salisbury
** Changed in: linux (Ubuntu)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu)
   Status: Confirmed => Incomplete

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1805655

Title:
  BUG: unable to handle kernel NULL pointer dereference at
  0008

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1805655/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1807437] Re: package openssh-server 1:7.6p1-4ubuntu0.1 failed to install/upgrade: installed openssh-server package post-installation script subprocess returned error exit status 1

2018-12-10 Thread Christian Ehrhardt 
Hi Angel,
Thank you for your report.

>From your log:

 Error: command ['/usr/sbin/sshd', '-T'] failed with exit code 255: 
/etc/ssh/sshd_config line 13: Deprecated option UsePrivilegeSeparation
 /etc/ssh/sshd_config line 16: Deprecated option KeyRegenerationInterval
 /etc/ssh/sshd_config line 17: Deprecated option ServerKeyBits
 /etc/ssh/sshd_config line 30: Bad SSH2 mac spec 
'hmac-sha2-512-...@openssh.com,hmac-sha2-256-...@openssh.com,hmac-ripemd160-...@openssh.com,umac-128-...@openssh.com,hmac-sha2-512,hmac-sha2-256,hmac-ripemd160,umac-...@openssh.com'.

That is a local misconfiguration that breaks the service.
You'd need to resolve that to be able to start the service, but also to 
upgrade/install the package.

This looks like a local configuration problem, rather than a bug in
Ubuntu.

You can find pointers to get help for this sort of problem here:
http://www.ubuntu.com/support/community

Since we use this bug tracker to track bugs in Ubuntu, rather than
configuration problems, I'm marking this bug as Invalid. This helps us
to focus on fixing bugs in Ubuntu.

If you believe that this is really a bug, then you may find it helpful
to read "How to report bugs effectively"
http://www.chiark.greenend.org.uk/~sgtatham/bugs.html. We'd be grateful
if you would then provide a more complete description of the problem,
explain why you believe this is a bug in Ubuntu rather than a problem
specific to your system, and then change the bug status back to New.

** Changed in: openssh (Ubuntu)
   Status: New => Incomplete

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1807437

Title:
  package openssh-server 1:7.6p1-4ubuntu0.1 failed to install/upgrade:
  installed openssh-server package post-installation script subprocess
  returned error exit status 1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/1807437/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1803059] Re: Nullpointer dereference

2018-12-10 Thread Leonidas S. Barbosa
Hi Miguel,

Sorry for the inconvenient,  I`m aware of the situation and I`m working
to fix this issue.

Thanks tor report this.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1803059

Title:
  Nullpointer dereference

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/poppler/+bug/1803059/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1807702] Re: linux-oracle: 4.15.0-1007.7 -proposed tracker

2018-12-10 Thread Brad Figg
** Description changed:

  This bug is for tracking the 4.15.0-1007.7 upload package. This bug will
  contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  -- swm properties --
  kernel-stable-master-bug: 1806659
+ phase: Packaging
+ phase-changed: Monday, 10. December 2018 14:30 UTC
+ reason:
+   prepare-package: Package not yet uploaded
+   prepare-package-meta: Package not yet uploaded
+   prepare-package-signed: Package not yet uploaded

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1807702

Title:
  linux-oracle: 4.15.0-1007.7 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1807702/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1807439] Re: openvpn crashes when run with fips openssl

2018-12-10 Thread Christian Ehrhardt 
Checked on IRC, there are debdiff, testing data, etc...
Please set back to new once that was made available.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1807439

Title:
  openvpn crashes when run with fips openssl

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openvpn/+bug/1807439/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1807439] Re: openvpn crashes when run with fips openssl

2018-12-10 Thread Christian Ehrhardt 
Hi,
I'm really unsure what the expectation here is now.
This does not contain steps to reproduce the issue nor any suggested changes to 
make it work better.
Both would be needed.

Also is this actually the code in the main archive or any FIPS special
PPA?

** Changed in: openvpn (Ubuntu Disco)
   Status: New => Incomplete

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1807439

Title:
  openvpn crashes when run with fips openssl

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openvpn/+bug/1807439/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1640978] Re: [SRU] Backport letsencrypt from bionic

2018-12-10 Thread Michael Casadevall
Breakdown of python-certbot changes; this is a NEW package going into
trusty backported from bionic following the letsencrypt->certbot name
change. A revised debdiff is attached to this bug.

diff -Nru python-certbot-0.23.0/debian/compat 
python-certbot-0.23.0/debian/compat
--- python-certbot-0.23.0/debian/compat 2018-03-23 23:00:13.0 +
+++ python-certbot-0.23.0/debian/compat 2018-11-25 16:20:44.0 +
@@ -1 +1 @@
-11
+9

Explanation: Debhelper compat change

diff -Nru python-certbot-0.23.0/debian/control 
python-certbot-0.23.0/debian/control
--- python-certbot-0.23.0/debian/control2018-04-07 03:21:05.0 
+
+++ python-certbot-0.23.0/debian/control2018-11-25 16:20:44.0 
+
@@ -1,47 +1,41 @@
 Source: python-certbot
 Section: python
 Priority: optional
-Maintainer: Debian Let's Encrypt 
+Maintainer: Ubuntu Developers 
+XSBC-Original-Maintainer: Debian Let's Encrypt 

 Uploaders: Harlan Lieberman-Berg ,
Francois Marier 
-Build-Depends: debhelper (>= 11~),
+Build-Depends: debhelper (>= 9~),
dh-python,
-   python3,
-   python3-acme (>= 0.22.0~),
-   python3-configargparse (>= 0.10.0),
-   python3-configobj,
-   python3-cryptography (>= 1.2),
-  python3-distutils,
-  python3-josepy,
-   python3-mock,
-   python3-parsedatetime (>= 1.3),
-   python3-repoze.sphinx.autointerface,
-   python3-requests (>= 2.4.3),
-   python3-rfc3339,
-   python3-setuptools (>= 1.0),
-   python3-sphinx,
-   python3-sphinx-rtd-theme,
-   python3-tz,
-   python3-zope.component,
-   python3-zope.interface
+   python,
+   python-acme (>= 0.22.0~),
+   python-configargparse (>= 0.10.0),
+   python-configobj,
+   python-cryptography (>= 1.2),
+  python-josepy,
+   python-mock,
+   python-parsedatetime (>= 1.3),
+   python-requests (>= 2.4.3),
+   python-rfc3339,
+   python-setuptools (>= 1.0),
+   python-sphinx,
+   python-sphinx-rtd-theme,
+   python-tz,
+   python-zope.component,
+   python-zope.interface
 Standards-Version: 4.1.4
 Homepage: https://certbot.eff.org/
 Vcs-Git: https://salsa.debian.org/letsencrypt-team/certbot/certbot.git
 Vcs-Browser: https://salsa.debian.org/letsencrypt-team/certbot/certbot
 Testsuite: autopkgtest-pkg-python

Explanation:  Some of the dependencies for certbot do not have Python3
versions in Xenial; this was resolved by having certbot use Python2 and
becoming a python2 package; it could also have been resolved by SRUing
python-parsedtimedate as it supports Python 3 but doesn't have the
necessary deb. An SRU for the bionic package may be needed to remove
this with the Python 3 version.

-Package: python3-certbot
+Package: python-certbot
 Architecture: all
-Depends: python3-acme (>= 0.22.0~),
- python3-requests (>= 2.4.3),
+Depends: python-acme (>= 0.22.0~),
+ python-requests (>= 2.4.3),
  ${misc:Depends},
- ${python3:Depends}
-Recommends: certbot
+ ${python:Depends}
 Suggests: python-certbot-doc
-Breaks: python-certbot-nginx (<< 0.20.0),
-python-certbot-apache (<< 0.20.0),
-python-letsencrypt (<= 0.6.0)
-Replaces: python-letsencrypt
 Description: main library for certbot
  The objective of Certbot, Let's Encrypt, and the ACME (Automated
  Certificate Management Environment) protocol is to make it possible

Explanation: 3->2 changes. python-letsencrypt in xenial will be a shim
that provide import letsencrypt and should not be removed when this
package is installed to provide ABI compat within a release

@@ -62,14 +56,14 @@
 Package: certbot
 Section: web
 Architecture: all
-Depends: python3-certbot (= ${source:Version}),
+Depends: python-certbot (= ${source:Version}),
  ${misc:Depends},
- ${python3:Depends}
+ ${python:Depends}
 Breaks: letsencrypt (<= 0.6.0)
 Replaces: letsencrypt
 Provides: letsencrypt
-Suggests: python3-certbot-apache,
- python3-certbot-nginx,
+Suggests: python-certbot-apache,
+ python-certbot-nginx,
   python-certbot-doc
 Description: automatically configure HTTPS using Let's Encrypt
  The objective of Certbot, Let's Encrypt, and the ACME (Automated

Explanation: Python 3->2 changes for the extension modules. We may
backport nginx support at a later date so it was left in as a suggests
even though it's dangling at the moment.

@@ -110,12 +104,3 @@
- Help you revoke the certificate if that ever becomes necessary.
  .
  This package contains the documentation.
-
-Package: letsencrypt
-Section: oldlibs
-Architecture: all
-Depends: certbot,
- ${misc:Depends}
-Description: transitional dummy 

[Bug 1804445] Re: Update rax-nova-agent to 2.1.18

2018-12-10 Thread Tobias Koch
Images for Xenial, Bionic and Cosmic have been generated and tested. We
have confirmation that all images are working as expected with this
version of rax-nova-agent.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1804445

Title:
   Update rax-nova-agent to 2.1.18

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/rax-nova-agent/+bug/1804445/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1805655] Re: BUG: unable to handle kernel NULL pointer dereference at 0000000000000008

2018-12-10 Thread Joseph Salisbury
Did this issue start happening after an update/upgrade?  Was there a
prior kernel version where you were not having this particular problem?

Would it be possible for you to test the latest upstream kernel? Refer
to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest
v4.20 kernel[0].

If this bug is fixed in the mainline kernel, please add the following
tag 'kernel-fixed-upstream'.

If the mainline kernel does not fix this bug, please add the tag:
'kernel-bug-exists-upstream'.

Once testing of the upstream kernel is complete, please mark this bug as
"Confirmed".


Thanks in advance.

[0] http://kernel.ubuntu.com/~kernel-ppa/mainline/v4.20-rc6

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1805655

Title:
  BUG: unable to handle kernel NULL pointer dereference at
  0008

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1805655/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1807709] Re: dbus always crashes at session start (on wayland)

2018-12-10 Thread Launchpad Bug Tracker
Status changed to 'Confirmed' because the bug affects multiple users.

** Changed in: dbus (Ubuntu)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1807709

Title:
  dbus always crashes at session start (on wayland)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/dbus/+bug/1807709/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1640978] Re: [SRU] Backport letsencrypt from bionic

2018-12-10 Thread Michael Casadevall
Breakdown of changes for python ACME; I caught a mistake in the previous
debdiff so reuploading a revised one with this comment:


diff -Nru python-acme-0.22.2/debian/compat python-acme-0.22.2/debian/compat
--- python-acme-0.22.2/debian/compat2018-03-17 15:24:35.0 +
+++ python-acme-0.22.2/debian/compat2018-11-25 15:09:41.0 +
@@ -1 +1 @@
-11
+9

Explaination: debhelper version change

diff -Nru python-acme-0.22.2/debian/control python-acme-0.22.2/debian/control
--- python-acme-0.22.2/debian/control   2018-03-17 15:24:35.0 +
+++ python-acme-0.22.2/debian/control   2018-11-25 15:09:41.0 +
@@ -1,13 +1,14 @@
 Source: python-acme
 Section: python
 Priority: optional
-Maintainer: Debian Let's Encrypt 
+Maintainer: Ubuntu Developers 
+XSBC-Original-Maintainer: Debian Let's Encrypt 

 Uploaders: Harlan Lieberman-Berg ,
Francois Marier 
-Build-Depends: debhelper (>= 11~),
+Build-Depends: debhelper (>= 9~),
dh-python,
python-all (>= 2.7),
-   python-cryptography (>= 1.3.4),
+   python-cryptography,
python-docutils,
python-josepy,
python-mock,

Explanation: This was an incorrect dependency in bionic; acme works
proeprly against cryotpgraphy 1.2 which was shipped in Xenial.

@@ -19,7 +20,7 @@
python-six (>= 1.9),
python-tz,
python3 (>= 3.4),
-   python3-cryptography (>= 1.3.4),
+   python3-cryptography,
python3-docutils,
python3-josepy,
python3-mock,

Explanation: See above.

diff -Nru python-acme-0.22.2/debian/rules python-acme-0.22.2/debian/rules
--- python-acme-0.22.2/debian/rules 2018-03-17 15:24:35.0 +
+++ python-acme-0.22.2/debian/rules 2018-11-25 15:09:30.0 +
@@ -7,11 +7,10 @@
 
 override_dh_auto_build:
dh_auto_build
-   PYTHONPATH=. \
-   http_proxy='127.0.0.1:9' \
-   https_proxy='127.0.0.1:9' \
-   sphinx-build -N -bhtml docs/ build/html
+   PYTHONPATH=. http_proxy='127.0.0.1:9' sphinx-build -N -bhtml docs/ 
build/html
 
 override_dh_auto_install:
dh_auto_install
find $(CURDIR)/debian/ -type d -name testdata -print0 | xargs -0 rm -rf 
'{}' \;

Explaination: I reused the rules from the existing python-acme version
in Trusty, dropping https_proxy. This may not be necessary TBH.

** Patch added: "python-acme-2.debdiff"
   
https://bugs.launchpad.net/ubuntu/xenial/+source/python-acme/+bug/1640978/+attachment/5220891/+files/python-acme-2.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1640978

Title:
  [SRU] Backport letsencrypt from bionic

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/python-acme/+bug/1640978/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1807706] Re: Disco update: 4.19.8 upstream stable release

2018-12-10 Thread Seth Forshee
** Description changed:

+ SRU Justification
  
- SRU Justification
+ Impact:
+    The upstream process for stable tree updates is quite similar
+    in scope to the Ubuntu SRU process, e.g., each patch has to
+    demonstrably fix a bug, and each patch is vetted by upstream
+    by originating either directly from a mainline/stable Linux tree or
+    a minimally backported form of that patch. The following upstream
+    stable patches should be included in the Ubuntu kernel:
  
- Impact:
-The upstream process for stable tree updates is quite similar
-in scope to the Ubuntu SRU process, e.g., each patch has to
-demonstrably fix a bug, and each patch is vetted by upstream
-by originating either directly from a mainline/stable Linux tree or
-a minimally backported form of that patch. The following upstream
-stable patches should be included in the Ubuntu kernel:
+    4.19.8 upstream stable release
+    from git://git.kernel.org/
  
-4.19.8 upstream stable release
-from git://git.kernel.org/
- 
- 
  Linux 4.19.8
  blk-mq: punt failed direct issue to dispatch list
  tipc: use destination length for copy string
  arc: [devboards] Add support of NFSv3 ACL
  ARC: change defconfig defaults to ARCv2
  btrfs: tree-checker: Don't check max block group size as current max chunk 
size limit is unreliable
  Input: elan_i2c - add support for ELAN0621 touchpad
  Input: elan_i2c - add ACPI ID for Lenovo IdeaPad 330-15ARR
  Input: elan_i2c - add ELAN0620 to the ACPI table
  Input: cros_ec_keyb - fix button/switch capability reports
  Input: matrix_keypad - check for errors from of_get_named_gpio()
  Input: synaptics - add PNP ID for ThinkPad P50 to SMBus
  Input: xpad - quirk all PDP Xbox One gamepads
  scsi: lpfc: fix block guard enablement on SLI3 adapters
  i40e: Fix deletion of MAC filters
  selinux: add support for RTM_NEWCHAIN, RTM_DELCHAIN, and RTM_GETCHAIN
  svm: Add mutex_lock to protect apic_access_page_done on AMD systems
  kgdboc: Fix warning with module build
  kgdboc: Fix restrict error
  userfaultfd: shmem: UFFDIO_COPY: set the page dirty if VM_WRITE is not set
  userfaultfd: shmem: add i_size checks
  userfaultfd: shmem: allocate anonymous memory for MAP_PRIVATE shmem
  userfaultfd: use ENOENT instead of EFAULT if the atomic copy user fails
  drm/meson: Fix OOB memory accesses in meson_viu_set_osd_lut()
  drm/meson: Enable fast_io in meson_dw_hdmi_regmap_config
  drm/meson: Fixes for drm_crtc_vblank_on/off support
  drm: set is_master to 0 upon drm_new_set_master() failure
  drm/amd/dm: Don't forget to attach MST encoders
  drm/ast: Fix incorrect free on ioregs
  tracing/fgraph: Fix set_graph_function from showing interrupts
  IB/mlx5: Avoid load failure due to unknown link width
  mips: fix mips_get_syscall_arg o32 check
  MIPS: ralink: Fix mt7620 nd_sd pinmux
  tracepoint: Use __idx instead of idx in DO_TRACE macro to make it unique
  sched, trace: Fix prev_state output in sched_switch tracepoint
  arm64: ftrace: Fix to enable syscall events on arm64
  mtd: nand: Fix memory allocation in nanddev_bbt_init()
  uprobes: Fix handle_swbp() vs. unregister() + register() race once more
  iser: set sector for ambiguous mr status errors
  unifdef: use memcpy instead of strncpy
  test_hexdump: use memcpy instead of strncpy
+ 
+ The following patches from this stable update had already been applied:
+ 
  blk-mq: fix corruption with direct issue

** Changed in: linux (Ubuntu Disco)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1807706

Title:
  Disco update: 4.19.8 upstream stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1807706/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1805693] Re: User reports a hang on 18.04 LTS(4.15.18) under a heavy I/O load

2018-12-10 Thread Joseph Salisbury
** Changed in: linux (Ubuntu)
   Importance: Undecided => High

** Changed in: linux (Ubuntu)
   Status: Incomplete => Triaged

** Also affects: linux (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Bionic)
   Status: New => Triaged

** Changed in: linux (Ubuntu Bionic)
   Importance: Undecided => High

** Tags added: kernel-da-key

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1805693

Title:
  User reports a hang on 18.04 LTS(4.15.18) under a heavy I/O load

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1805693/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1807705] Re: Disco update: 4.19.7 upstream stable release

2018-12-10 Thread Seth Forshee
** Description changed:

+ SRU Justification
  
- SRU Justification
+ Impact:
+    The upstream process for stable tree updates is quite similar
+    in scope to the Ubuntu SRU process, e.g., each patch has to
+    demonstrably fix a bug, and each patch is vetted by upstream
+    by originating either directly from a mainline/stable Linux tree or
+    a minimally backported form of that patch. The following upstream
+    stable patches should be included in the Ubuntu kernel:
  
- Impact:
-The upstream process for stable tree updates is quite similar
-in scope to the Ubuntu SRU process, e.g., each patch has to
-demonstrably fix a bug, and each patch is vetted by upstream
-by originating either directly from a mainline/stable Linux tree or
-a minimally backported form of that patch. The following upstream
-stable patches should be included in the Ubuntu kernel:
+    4.19.7 upstream stable release
+    from git://git.kernel.org/
  
-4.19.7 upstream stable release
-from git://git.kernel.org/
- 
- 
  Linux 4.19.7
  misc: mic/scif: fix copy-paste error in scif_create_remote_lookup
  Drivers: hv: vmbus: check the creation_status in vmbus_establish_gpadl()
  mm: use swp_offset as key in shmem_replace_page()
  mm: cleancache: fix corruption on missed inode invalidation
  lib/test_kmod.c: fix rmmod double free
  iio:st_magn: Fix enable device after trigger
  iio/hid-sensors: Fix IIO_CHAN_INFO_RAW returning wrong values for signed 
numbers
  Revert "usb: dwc3: gadget: skip Set/Clear Halt when invalid"
  usb: core: quirks: add RESET_RESUME quirk for Cherry G230 Stream series
  USB: usb-storage: Add new IDs to ums-realtek
  staging: rtl8723bs: Add missing return for cfg80211_rtw_get_station
  staging: rtl8723bs: Fix incorrect sense of ether_addr_equal
  staging: mt7621-pinctrl: fix uninitialized variable ngroups
  staging: mt7621-dma: fix potentially dereferencing uninitialized 'tx_desc'
  staging: vchiq_arm: fix compat VCHIQ_IOC_AWAIT_COMPLETION
  staging: most: use format specifier "%s" in snprintf
  dmaengine: at_hdmac: fix module unloading
  dmaengine: at_hdmac: fix memory leak in at_dma_xlate()
  ARM: dts: rockchip: Remove @0 from the veyron memory node
  ASoC: pcm186x: Fix device reset-registers trigger value
  ASoC: intel: cht_bsw_max98090_ti: Add quirk for boards using pmc_plt_clk_0
  ext2: fix potential use after free
  ext2: initialize opts.s_mount_opt as zero before using it
  binder: fix race that allows malicious free of live buffer
  function_graph: Reverse the order of pushing the ret_stack and the callback
  function_graph: Move return callback before update of curr_ret_stack
  function_graph: Have profiler use curr_ret_stack and not depth
  function_graph: Use new curr_ret_depth to manage depth instead of 
curr_ret_stack
  function_graph: Make ftrace_push_return_trace() static
  MIPS: function_graph: Simplify with function_graph_enter()
  arm64: function_graph: Simplify with function_graph_enter()
  s390/function_graph: Simplify with function_graph_enter()
  riscv/function_graph: Simplify with function_graph_enter()
  parisc: function_graph: Simplify with function_graph_enter()
  sparc/function_graph: Simplify with function_graph_enter()
  sh/function_graph: Simplify with function_graph_enter()
  powerpc/function_graph: Simplify with function_graph_enter()
  nds32: function_graph: Simplify with function_graph_enter()
  x86/function_graph: Simplify with function_graph_enter()
  microblaze: function_graph: Simplify with function_graph_enter()
  ARM: function_graph: Simplify with function_graph_enter()
  function_graph: Create function_graph_enter() to consolidate architecture code
  ALSA: hda/realtek - Add auto-mute quirk for HP Spectre x360 laptop
- ALSA: hda/realtek - fix the pop noise on headphone for lenovo laptops
  ALSA: hda/realtek - fix headset mic detection for MSI MS-B171
  ALSA: hda/realtek - Support ALC300
  ALSA: hda: Add ASRock N68C-S UCC the power_save blacklist
  ALSA: sparc: Fix invalid snd_free_pages() at error path
  ALSA: control: Fix race between adding and removing a user element
  ALSA: ac97: Fix incorrect bit shift at AC97-SPSA control write
  ALSA: wss: Fix invalid snd_free_pages() at error path
  fs: fix lost error code in dio_complete
  perf/x86/intel: Disallow precise_ip on BTS events
  perf/x86/intel: Add generic branch tracing check to intel_pmu_has_bts()
  perf/x86/intel: Move branch tracing setup to the Intel-specific source file
  x86/fpu: Disable bottom halves while loading FPU registers
  x86/MCE/AMD: Fix the thresholding machinery initialization order
  arm64: dts: rockchip: Fix PCIe reset polarity for rk3399-puma-haikou.
  PCI: Fix incorrect value returned from pcie_get_speed_cap()
  PCI: dwc: Fix MSI-X EP framework address calculation bug
  PCI: layerscape: Fix wrong invocation of outbound window disable accessor
  btrfs: relocation: set trans to 

[Bug 1804330] Re: seccomp preventing package installs

2018-12-10 Thread Christian Ehrhardt 
Thanks for the re-ping with the insight of the root cause in your case!
Might help others hitting the same.

** Changed in: libseccomp (Ubuntu)
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1804330

Title:
  seccomp preventing package installs

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libseccomp/+bug/1804330/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1807709] [NEW] dbus always crashes at session start (on wayland)

2018-12-10 Thread zebul666
Public bug reported:

When you login in ubuntu 18.10 using gnome shell and wayland, dbus
always crashes and you are welcomed with a dialog to report the crash.

Looking into the file `/var/crash/_usr_bin_dbus-daemon.1000.crash` one
can see that there is antoher bug, previoulsy reported as #1591548
(https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1591548)

So may be the bug report is never sent, either ?

/var/crash/_usr_bin_dbus-daemon.1000.crash content is:

ProblemType: Crash
Architecture: amd64
Date: Sun Dec  9 11:16:22 2018
DistroRelease: Ubuntu 18.10
ExecutablePath: /usr/bin/dbus-daemon
ExecutableTimestamp: 1536206167
ProcCmdline: /usr/bin/dbus-daemon --session --address=systemd: --nofork 
--nopidfile --systemd-activation --syslog-only
ProcCwd: /home/solstice
ProcEnviron:
 LANG=fr_FR.UTF-8
 PATH=(custom, no user)
 SHELL=/bin/bash
 XDG_RUNTIME_DIR=
ProcMaps:
 55c9bfc7a000-55c9bfc83000 r--p  08:07 787824 
/usr/bin/dbus-daemon
 55c9bfc83000-55c9bfca5000 r-xp 9000 08:07 787824 
/usr/bin/dbus-daemon
 55c9bfca5000-55c9bfcb3000 r--p 0002b000 08:07 787824 
/usr/bin/dbus-daemon
 55c9bfcb3000-55c9bfcb5000 r--p 00038000 08:07 787824 
/usr/bin/dbus-daemon
 55c9bfcb5000-55c9bfcb6000 rw-p 0003a000 08:07 787824 
/usr/bin/dbus-daemon
 55c9c1bd8000-55c9c1f1e000 rw-p  00:00 0  [heap]
 7eff0278c000-7eff02792000 r--p  08:07 650406 
/lib/x86_64-linux-gnu/libnss_systemd.so.2
 7eff02792000-7eff027bd000 r-xp 6000 08:07 650406 
/lib/x86_64-linux-gnu/libnss_systemd.so.2
 7eff027bd000-7eff027cc000 r--p 00031000 08:07 650406 
/lib/x86_64-linux-gnu/libnss_systemd.so.2
 7eff027cc000-7eff027cf000 r--p 0003f000 08:07 650406 
/lib/x86_64-linux-gnu/libnss_systemd.so.2
 7eff027cf000-7eff027d rw-p 00042000 08:07 650406 
/lib/x86_64-linux-gnu/libnss_systemd.so.2
 7eff027d-7eff027d1000 rw-p  00:00 0 
 7eff027d1000-7eff027d4000 r--p  08:07 654769 
/lib/x86_64-linux-gnu/libnss_files-2.28.so
 7eff027d4000-7eff027db000 r-xp 3000 08:07 654769 
/lib/x86_64-linux-gnu/libnss_files-2.28.so
 7eff027db000-7eff027de000 r--p a000 08:07 654769 
/lib/x86_64-linux-gnu/libnss_files-2.28.so
 7eff027de000-7eff027df000 r--p c000 08:07 654769 
/lib/x86_64-linux-gnu/libnss_files-2.28.so
 7eff027df000-7eff027e rw-p d000 08:07 654769 
/lib/x86_64-linux-gnu/libnss_files-2.28.so
 7eff027e-7eff027e6000 rw-p  00:00 0 
 7eff027e6000-7eff027ea000 r--p  08:07 654766 
/lib/x86_64-linux-gnu/libnsl-2.28.so
 7eff027ea000-7eff027f8000 r-xp 4000 08:07 654766 
/lib/x86_64-linux-gnu/libnsl-2.28.so
 7eff027f8000-7eff027fd000 r--p 00012000 08:07 654766 
/lib/x86_64-linux-gnu/libnsl-2.28.so
 7eff027fd000-7eff027fe000 r--p 00016000 08:07 654766 
/lib/x86_64-linux-gnu/libnsl-2.28.so
 7eff027fe000-7eff027ff000 rw-p 00017000 08:07 654766 
/lib/x86_64-linux-gnu/libnsl-2.28.so
 7eff027ff000-7eff02801000 rw-p  00:00 0 
 7eff02801000-7eff02803000 r--p  08:07 654771 
/lib/x86_64-linux-gnu/libnss_nis-2.28.so
 7eff02803000-7eff0280b000 r-xp 2000 08:07 654771 
/lib/x86_64-linux-gnu/libnss_nis-2.28.so
 7eff0280b000-7eff0280d000 r--p a000 08:07 654771 
/lib/x86_64-linux-gnu/libnss_nis-2.28.so
 7eff0280d000-7eff0280e000 r--p b000 08:07 654771 
/lib/x86_64-linux-gnu/libnss_nis-2.28.so
 7eff0280e000-7eff0280f000 rw-p c000 08:07 654771 
/lib/x86_64-linux-gnu/libnss_nis-2.28.so
 7eff0280f000-7eff02811000 r--p  08:07 654767 
/lib/x86_64-linux-gnu/libnss_compat-2.28.so
 7eff02811000-7eff02817000 r-xp 2000 08:07 654767 
/lib/x86_64-linux-gnu/libnss_compat-2.28.so
 7eff02817000-7eff02818000 r--p 8000 08:07 654767 
/lib/x86_64-linux-gnu/libnss_compat-2.28.so
 7eff02818000-7eff02819000 r--p 8000 08:07 654767 
/lib/x86_64-linux-gnu/libnss_compat-2.28.so
 7eff02819000-7eff0281a000 rw-p 9000 08:07 654767 
/lib/x86_64-linux-gnu/libnss_compat-2.28.so
 7eff0281a000-7eff0281f000 rw-p  00:00 0 
 7eff0281f000-7eff0283d000 r-xp  08:07 654828 
/lib/x86_64-linux-gnu/libgpg-error.so.0.24.3
 7eff0283d000-7eff02a3d000 ---p 0001e000 08:07 654828 
/lib/x86_64-linux-gnu/libgpg-error.so.0.24.3
 7eff02a3d000-7eff02a3e000 r--p 0001e000 08:07 654828 
/lib/x86_64-linux-gnu/libgpg-error.so.0.24.3
 7eff02a3e000-7eff02a3f000 rw-p 0001f000 08:07 654828 

[Bug 1807706] [NEW] Disco update: 4.19.8 upstream stable release

2018-12-10 Thread Seth Forshee
Public bug reported:

SRU Justification

Impact:
   The upstream process for stable tree updates is quite similar
   in scope to the Ubuntu SRU process, e.g., each patch has to
   demonstrably fix a bug, and each patch is vetted by upstream
   by originating either directly from a mainline/stable Linux tree or
   a minimally backported form of that patch. The following upstream
   stable patches should be included in the Ubuntu kernel:

   4.19.8 upstream stable release
   from git://git.kernel.org/

Linux 4.19.8
blk-mq: punt failed direct issue to dispatch list
tipc: use destination length for copy string
arc: [devboards] Add support of NFSv3 ACL
ARC: change defconfig defaults to ARCv2
btrfs: tree-checker: Don't check max block group size as current max chunk size 
limit is unreliable
Input: elan_i2c - add support for ELAN0621 touchpad
Input: elan_i2c - add ACPI ID for Lenovo IdeaPad 330-15ARR
Input: elan_i2c - add ELAN0620 to the ACPI table
Input: cros_ec_keyb - fix button/switch capability reports
Input: matrix_keypad - check for errors from of_get_named_gpio()
Input: synaptics - add PNP ID for ThinkPad P50 to SMBus
Input: xpad - quirk all PDP Xbox One gamepads
scsi: lpfc: fix block guard enablement on SLI3 adapters
i40e: Fix deletion of MAC filters
selinux: add support for RTM_NEWCHAIN, RTM_DELCHAIN, and RTM_GETCHAIN
svm: Add mutex_lock to protect apic_access_page_done on AMD systems
kgdboc: Fix warning with module build
kgdboc: Fix restrict error
userfaultfd: shmem: UFFDIO_COPY: set the page dirty if VM_WRITE is not set
userfaultfd: shmem: add i_size checks
userfaultfd: shmem: allocate anonymous memory for MAP_PRIVATE shmem
userfaultfd: use ENOENT instead of EFAULT if the atomic copy user fails
drm/meson: Fix OOB memory accesses in meson_viu_set_osd_lut()
drm/meson: Enable fast_io in meson_dw_hdmi_regmap_config
drm/meson: Fixes for drm_crtc_vblank_on/off support
drm: set is_master to 0 upon drm_new_set_master() failure
drm/amd/dm: Don't forget to attach MST encoders
drm/ast: Fix incorrect free on ioregs
tracing/fgraph: Fix set_graph_function from showing interrupts
IB/mlx5: Avoid load failure due to unknown link width
mips: fix mips_get_syscall_arg o32 check
MIPS: ralink: Fix mt7620 nd_sd pinmux
tracepoint: Use __idx instead of idx in DO_TRACE macro to make it unique
sched, trace: Fix prev_state output in sched_switch tracepoint
arm64: ftrace: Fix to enable syscall events on arm64
mtd: nand: Fix memory allocation in nanddev_bbt_init()
uprobes: Fix handle_swbp() vs. unregister() + register() race once more
iser: set sector for ambiguous mr status errors
unifdef: use memcpy instead of strncpy
test_hexdump: use memcpy instead of strncpy

The following patches from this stable update had already been applied:

blk-mq: fix corruption with direct issue

** Affects: linux (Ubuntu)
 Importance: Medium
 Assignee: Seth Forshee (sforshee)
 Status: In Progress

** Affects: linux (Ubuntu Disco)
 Importance: Medium
 Assignee: Seth Forshee (sforshee)
 Status: In Progress


** Tags: kernel-stable-tracking-bug

** Tags added: kernel-stable-tracking-bug

** Also affects: linux (Ubuntu Disco)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Disco)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Disco)
   Status: New => In Progress

** Changed in: linux (Ubuntu Disco)
 Assignee: (unassigned) => Seth Forshee (sforshee)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1807706

Title:
  Disco update: 4.19.8 upstream stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1807706/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1807705] [NEW] Disco update: 4.19.7 upstream stable release

2018-12-10 Thread Seth Forshee
Public bug reported:

SRU Justification

Impact:
   The upstream process for stable tree updates is quite similar
   in scope to the Ubuntu SRU process, e.g., each patch has to
   demonstrably fix a bug, and each patch is vetted by upstream
   by originating either directly from a mainline/stable Linux tree or
   a minimally backported form of that patch. The following upstream
   stable patches should be included in the Ubuntu kernel:

   4.19.7 upstream stable release
   from git://git.kernel.org/

Linux 4.19.7
misc: mic/scif: fix copy-paste error in scif_create_remote_lookup
Drivers: hv: vmbus: check the creation_status in vmbus_establish_gpadl()
mm: use swp_offset as key in shmem_replace_page()
mm: cleancache: fix corruption on missed inode invalidation
lib/test_kmod.c: fix rmmod double free
iio:st_magn: Fix enable device after trigger
iio/hid-sensors: Fix IIO_CHAN_INFO_RAW returning wrong values for signed numbers
Revert "usb: dwc3: gadget: skip Set/Clear Halt when invalid"
usb: core: quirks: add RESET_RESUME quirk for Cherry G230 Stream series
USB: usb-storage: Add new IDs to ums-realtek
staging: rtl8723bs: Add missing return for cfg80211_rtw_get_station
staging: rtl8723bs: Fix incorrect sense of ether_addr_equal
staging: mt7621-pinctrl: fix uninitialized variable ngroups
staging: mt7621-dma: fix potentially dereferencing uninitialized 'tx_desc'
staging: vchiq_arm: fix compat VCHIQ_IOC_AWAIT_COMPLETION
staging: most: use format specifier "%s" in snprintf
dmaengine: at_hdmac: fix module unloading
dmaengine: at_hdmac: fix memory leak in at_dma_xlate()
ARM: dts: rockchip: Remove @0 from the veyron memory node
ASoC: pcm186x: Fix device reset-registers trigger value
ASoC: intel: cht_bsw_max98090_ti: Add quirk for boards using pmc_plt_clk_0
ext2: fix potential use after free
ext2: initialize opts.s_mount_opt as zero before using it
binder: fix race that allows malicious free of live buffer
function_graph: Reverse the order of pushing the ret_stack and the callback
function_graph: Move return callback before update of curr_ret_stack
function_graph: Have profiler use curr_ret_stack and not depth
function_graph: Use new curr_ret_depth to manage depth instead of curr_ret_stack
function_graph: Make ftrace_push_return_trace() static
MIPS: function_graph: Simplify with function_graph_enter()
arm64: function_graph: Simplify with function_graph_enter()
s390/function_graph: Simplify with function_graph_enter()
riscv/function_graph: Simplify with function_graph_enter()
parisc: function_graph: Simplify with function_graph_enter()
sparc/function_graph: Simplify with function_graph_enter()
sh/function_graph: Simplify with function_graph_enter()
powerpc/function_graph: Simplify with function_graph_enter()
nds32: function_graph: Simplify with function_graph_enter()
x86/function_graph: Simplify with function_graph_enter()
microblaze: function_graph: Simplify with function_graph_enter()
ARM: function_graph: Simplify with function_graph_enter()
function_graph: Create function_graph_enter() to consolidate architecture code
ALSA: hda/realtek - Add auto-mute quirk for HP Spectre x360 laptop
ALSA: hda/realtek - fix headset mic detection for MSI MS-B171
ALSA: hda/realtek - Support ALC300
ALSA: hda: Add ASRock N68C-S UCC the power_save blacklist
ALSA: sparc: Fix invalid snd_free_pages() at error path
ALSA: control: Fix race between adding and removing a user element
ALSA: ac97: Fix incorrect bit shift at AC97-SPSA control write
ALSA: wss: Fix invalid snd_free_pages() at error path
fs: fix lost error code in dio_complete
perf/x86/intel: Disallow precise_ip on BTS events
perf/x86/intel: Add generic branch tracing check to intel_pmu_has_bts()
perf/x86/intel: Move branch tracing setup to the Intel-specific source file
x86/fpu: Disable bottom halves while loading FPU registers
x86/MCE/AMD: Fix the thresholding machinery initialization order
arm64: dts: rockchip: Fix PCIe reset polarity for rk3399-puma-haikou.
PCI: Fix incorrect value returned from pcie_get_speed_cap()
PCI: dwc: Fix MSI-X EP framework address calculation bug
PCI: layerscape: Fix wrong invocation of outbound window disable accessor
btrfs: relocation: set trans to be NULL after ending transaction
Btrfs: fix race between enabling quotas and subvolume creation
Btrfs: fix rare chances for data loss when doing a fast fsync
Btrfs: ensure path name is null terminated at btrfs_control_ioctl
btrfs: Always try all copies when reading extent buffers
udf: Allow mounting volumes with incorrect identification strings
xtensa: fix coprocessor part of ptrace_{get,set}xregs
xtensa: fix coprocessor context offset definitions
xtensa: enable coprocessors that are being flushed
KVM: VMX: re-add ple_gap module parameter
KVM: LAPIC: Fix pv ipis use-before-initialization
KVM: x86: Fix kernel info-leak in KVM_HC_CLOCK_PAIRING hypercall
KVM: nVMX/nSVM: Fix bug which sets vcpu->arch.tsc_offset to L1 tsc_offset
kvm: svm: Ensure an IBPB on all affected CPUs when 

[Bug 1038044] Re: munin-node: apt_all does not Grok Ubuntu (possible regression)

2018-12-10 Thread Christian Ehrhardt 
** Changed in: munin (Debian)
   Importance: Undecided => Unknown

** Changed in: munin (Debian)
   Status: New => Unknown

** Changed in: munin (Debian)
 Remote watch: None => Debian Bug tracker #715141

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1038044

Title:
  munin-node: apt_all does not Grok Ubuntu (possible regression)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/munin/+bug/1038044/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1806060] Re: Newer versions of killall (Ubuntu 18.04+) fail when signal specified in capitals

2018-12-10 Thread Christian Ehrhardt 
All lower case i dangerous, as it actually (can) mean the lower case options.
So for example

-int means "interactive" and it will ask
  + killall -int testINT
  + /tmp/testINT /dev/urandom
  Kill testINT(4931) ? (y/N)

But the upper cases should work as specified.
Just the text is misleading it is not "when specified in capitals" as -int != 
-INT

But it is true that some options do not work.

Test:
#!/bin/bash
#set -x
TNAME="uninitialized"

testkillall () {
local tsig=${1}
/tmp/${TNAME} /dev/urandom &
local tpid=$!;
echo "TEST -${tsig}";
killall -${tsig} "${TNAME}"
kill -9 "${tpid}" 2>/dev/null;
kill -9 "${TNAME}" 2>/dev/null;
}

for sig in $(killall -l | xargs); do
TNAME="test${sig}"
cp /usr/bin/md5sum "/tmp/${TNAME}"
testkillall "$(echo ${sig} | tr '[:lower:]' '[:upper:]')"
testkillall "SIG$(echo ${sig} | tr '[:lower:]' '[:upper:]')"
#testkillall "$(echo ${sig} | tr '[:upper:]' '[:lower:]')"
rm -f "/tmp/${TNAME}"
sync
done


Results:
- Disco with 23.2-1 all good
- Cosmic with 23.1-1 broken on: INT + ILL + VTALRM

** Also affects: psmisc (Ubuntu Cosmic)
   Importance: Undecided
   Status: New

** Also affects: psmisc (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Changed in: psmisc (Ubuntu)
   Status: Confirmed => Fix Released

** Changed in: psmisc (Ubuntu Bionic)
   Status: New => Confirmed

** Changed in: psmisc (Ubuntu Cosmic)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1806060

Title:
  Newer versions of killall (Ubuntu 18.04+) fail when signal specified
  in capitals

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/psmisc/+bug/1806060/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1807702] Re: linux-oracle: 4.15.0-1007.7 -proposed tracker

2018-12-10 Thread Marcelo Cerri
** Changed in: kernel-sru-workflow/prepare-package
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Marcelo Cerri 
(mhcerri)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Marcelo Cerri 
(mhcerri)

** Changed in: kernel-sru-workflow/prepare-package-signed
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-signed
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Marcelo Cerri 
(mhcerri)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1807702

Title:
  linux-oracle: 4.15.0-1007.7 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1807702/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1640978] Re: [SRU] Backport letsencrypt from bionic

2018-12-10 Thread Michael Casadevall
Breakdown of josepy for SRU:

josepy was split from python-acme, and is a NEW package going into
Trusty. This is a straight backport of the bionic packaging.

--- python-josepy-1.1.0/debian/compat   2018-04-15 20:45:24.0 +
+++ python-josepy-1.1.0/debian/compat   2018-11-23 19:55:13.0 +
@@ -1 +1 @@
-11
+9
diff -Nru python-josepy-1.1.0/debian/control python-josepy-1.1.0/debian/control
--- python-josepy-1.1.0/debian/control  2018-04-15 20:45:24.0 +
+++ python-josepy-1.1.0/debian/control  2018-11-23 19:55:13.0 +
@@ -1,9 +1,10 @@
 Source: python-josepy
 Section: python
 Priority: optional
-Maintainer: Debian Let's Encrypt 
+Maintainer: Ubuntu Developers 
+XSBC-Original-Maintainer: Debian Let's Encrypt 

 Uploaders: Harlan Lieberman-Berg 
-Build-Depends: debhelper (>= 11~),
+Build-Depends: debhelper (>= 9~),
   dh-python,
   python (>= 2.7),
   python-cryptography (>= 0.8),
diff -Nru python-josepy-1.1.0/debian/rules python-josepy-1.1.0/debian/rules

Explanation: Debhelper 9 was the shipped version in trusty so changes to
dependencies to work with it were required.

--- python-josepy-1.1.0/debian/rules2018-04-15 20:45:24.0 +
+++ python-josepy-1.1.0/debian/rules2018-11-23 19:55:13.0 +
@@ -17,6 +17,6 @@
find $(CURDIR)/debian/ -type d -name testdata -print0 | xargs -0 rm -rf 
'{}' \;
rm -f $(CURDIR)/debian/python*-josepy/usr/bin/jws
 
-override_dh_installdocs:
-   dh_installdocs --doc-main-package=python-josepy-doc -p python-josepy-doc
-   dh_installdocs -p python-josepy -p python3-josepy
+#override_dh_installdocs:
+#  dh_installdocs --doc-main-package=python-josepy-doc -p python-josepy-doc
+#  dh_installdocs -p python-josepy -p python3-josepy

Explanation: installdocs doesn't support -p on Trusty which is used to
create symlinks. This behavior mimics the way the docs packages were
installed on Xenial for the existing packages; documentation still ends
up properly in the -doc package (checked manually).

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1640978

Title:
  [SRU] Backport letsencrypt from bionic

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/python-acme/+bug/1640978/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1807704] [NEW] chromium browser crashe when saving image with name and when trying to export bookmarks

2018-12-10 Thread Marco
Public bug reported:

On ubuntu 16,04 since a couple of weeks chromium browser crashes when
saving image with name  and when trying to export bookmarks.

** Affects: chromium-browser (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1807704

Title:
  chromium browser crashe when saving image with name  and when trying
  to export bookmarks

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/1807704/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1806483] Comment bridged from LTC Bugzilla

2018-12-10 Thread bugproxy
--- Comment From heinz-werner_se...@de.ibm.com 2018-12-10 08:36 EDT---
Fix verified on package openssl-ibmca - 2.0.2-0ubuntu1.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1806483

Title:
  Ubuntu 18.04.1 - OpenSSL RSA connection rate performance degradation
  using ibmca engine (openssl-ibmca)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1806483/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1806425] Re: linux-azure-edge: 4.18.0-1007.7~16.04.2 -proposed tracker

2018-12-10 Thread Brad Figg
** Changed in: kernel-sru-workflow/automated-testing
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/promote-to-proposed
   Status: In Progress => Fix Committed

** Changed in: kernel-sru-workflow/promote-to-proposed
   Status: Fix Committed => Fix Released

** Changed in: kernel-sru-workflow/regression-testing
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/security-signoff
   Status: New => In Progress

** Changed in: kernel-sru-workflow/stakeholder-signoff
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/verification-testing
   Status: New => Confirmed

** Description changed:

  This bug is for tracking the  upload package. This
  bug will contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1806409
- phase: Uploaded
- phase-changed: Friday, 07. December 2018 13:36 UTC
+ phase: Promoted to proposed
+ phase-changed: Monday, 10. December 2018 13:38 UTC
+ proposed-announcement-sent: true
+ proposed-testing-requested: true
  reason:
-   promote-to-proposed: Review in progress
+   automated-testing: Testing in progress
+   regression-testing: Testing in progress
+   security-signoff: Waiting for signoff
+   stakeholder-signoff: Waiting for signoff
+   verification-testing: Testing in progress

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1806425

Title:
  linux-azure-edge: 4.18.0-1007.7~16.04.2 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1806425/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1806572] Re: linux-lts-xenial: 4.4.0-141.167~14.04.1 -proposed tracker

2018-12-10 Thread Brad Figg
** Changed in: kernel-sru-workflow/prepare-package
   Status: In Progress => Fix Released

** Description changed:

  This bug is for tracking the  upload package. This
  bug will contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  -- swm properties --
  kernel-stable-master-bug: 1806569
  phase: Packaging
- phase-changed: Wednesday, 05. December 2018 10:37 UTC
+ phase-changed: Monday, 10. December 2018 13:37 UTC
  reason:
-   prepare-package: Package not yet uploaded
-   prepare-package-meta: Package not yet uploaded
-   prepare-package-signed: Package not yet uploaded
+   prepare-package-meta: Package tag not yet published
+   prepare-package-signed: Package tag not yet published
+   promote-to-proposed: Source package tags missing

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1806572

Title:
  linux-lts-xenial: 4.4.0-141.167~14.04.1 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1806572/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1807702] [NEW] linux-oracle: 4.15.0-1007.7 -proposed tracker

2018-12-10 Thread Marcelo Cerri
Public bug reported:

This bug is for tracking the 4.15.0-1007.7 upload package. This bug will
contain status and testing results related to that upload.

For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
kernel-stable-master-bug: 1806659

** Affects: kernel-sru-workflow
 Importance: Medium
 Status: In Progress

** Affects: kernel-sru-workflow/automated-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/certification-testing
 Importance: Medium
 Assignee: Canonical Hardware Certification (canonical-hw-cert)
 Status: Invalid

** Affects: kernel-sru-workflow/prepare-package
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/prepare-package-meta
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/prepare-package-signed
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/promote-to-proposed
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-security
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-updates
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/regression-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/security-signoff
 Importance: Medium
 Assignee: Canonical Security Team (canonical-security)
 Status: New

** Affects: kernel-sru-workflow/upload-to-ppa
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/verification-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Invalid


** Tags: bionic kernel-release-tracking-bug kernel-release-tracking-bug-live 
kernel-sru-cycle-2018.12.03-1

** Tags added: kernel-release-tracking-bug

** Tags added: kernel-release-tracking-bug-live

** Tags added: bionic

** Also affects: kernel-sru-workflow/automated-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/certification-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package-signed
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-proposed
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-security
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-updates
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/regression-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/security-signoff
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/upload-to-ppa
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/verification-testing
   Importance: Undecided
   Status: New

** Changed in: kernel-sru-workflow/automated-testing
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/automated-testing
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/certification-testing
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/certification-testing
 Assignee: (unassigned) => Canonical Hardware Certification 
(canonical-hw-cert)

** Changed in: kernel-sru-workflow/certification-testing
   Status: New => Invalid

** Changed in: kernel-sru-workflow/prepare-package
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/prepare-package-signed
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/prepare-package-signed
 

[Bug 1802556] Re: linux-oem: 4.15.0-1027.32 -proposed tracker

2018-12-10 Thread Launchpad Bug Tracker
*** This bug is a duplicate of bug 1806663 ***
https://bugs.launchpad.net/bugs/1806663

This bug was fixed in the package linux-oem - 4.15.0-1028.33

---
linux-oem (4.15.0-1028.33) bionic; urgency=medium

  * linux-oem: 4.15.0-1028.33 -proposed tracker (LP: #1803678)

  * Miscellaneous Ubuntu changes
- Rebase to 4.15.0-42.45

  [ Ubuntu: 4.15.0-42.45 ]

  * linux: 4.15.0-42.45 -proposed tracker (LP: #1803592)
  * [FEAT] Guest-dedicated Crypto Adapters (LP: #1787405)
- KVM: s390: reset crypto attributes for all vcpus
- KVM: s390: vsie: simulate VCPU SIE entry/exit
- KVM: s390: introduce and use KVM_REQ_VSIE_RESTART
- KVM: s390: refactor crypto initialization
- s390: vfio-ap: base implementation of VFIO AP device driver
- s390: vfio-ap: register matrix device with VFIO mdev framework
- s390: vfio-ap: sysfs interfaces to configure adapters
- s390: vfio-ap: sysfs interfaces to configure domains
- s390: vfio-ap: sysfs interfaces to configure control domains
- s390: vfio-ap: sysfs interface to view matrix mdev matrix
- KVM: s390: interface to clear CRYCB masks
- s390: vfio-ap: implement mediated device open callback
- s390: vfio-ap: implement VFIO_DEVICE_GET_INFO ioctl
- s390: vfio-ap: zeroize the AP queues
- s390: vfio-ap: implement VFIO_DEVICE_RESET ioctl
- KVM: s390: Clear Crypto Control Block when using vSIE
- KVM: s390: vsie: Do the CRYCB validation first
- KVM: s390: vsie: Make use of CRYCB FORMAT2 clear
- KVM: s390: vsie: Allow CRYCB FORMAT-2
- KVM: s390: vsie: allow CRYCB FORMAT-1
- KVM: s390: vsie: allow CRYCB FORMAT-0
- KVM: s390: vsie: allow guest FORMAT-0 CRYCB on host FORMAT-1
- KVM: s390: vsie: allow guest FORMAT-1 CRYCB on host FORMAT-2
- KVM: s390: vsie: allow guest FORMAT-0 CRYCB on host FORMAT-2
- KVM: s390: device attrs to enable/disable AP interpretation
- KVM: s390: CPU model support for AP virtualization
- s390: doc: detailed specifications for AP virtualization
- KVM: s390: fix locking for crypto setting error path
- KVM: s390: Tracing APCB changes
- s390: vfio-ap: setup APCB mask using KVM dedicated function
- s390/zcrypt: Add ZAPQ inline function.
- s390/zcrypt: Review inline assembler constraints.
- s390/zcrypt: Integrate ap_asm.h into include/asm/ap.h.
- s390/zcrypt: fix ap_instructions_available() returncodes
- s390/zcrypt: remove VLA usage from the AP bus
- s390/zcrypt: Remove deprecated ioctls.
- s390/zcrypt: Remove deprecated zcrypt proc interface.
- s390/zcrypt: Support up to 256 crypto adapters.
- [Config:] Enable CONFIG_S390_AP_IOMMU and set CONFIG_VFIO_AP to module.
  * Bypass of mount visibility through userns + mount propagation (LP: #1789161)
- mount: Retest MNT_LOCKED in do_umount
- mount: Don't allow copying MNT_UNBINDABLE|MNT_LOCKED mounts
  *  CVE-2018-18955: nested user namespaces with more than five extents
incorrectly grant privileges over inode (LP: #1801924) // CVE-2018-18955
- userns: also map extents in the reverse map to kernel IDs
  * kdump fail due to an IRQ storm (LP: #1797990)
- SAUCE: x86/PCI: Export find_cap() to be used in early PCI code
- SAUCE: x86/quirks: Add parameter to clear MSIs early on boot
- SAUCE: x86/quirks: Scan all busses for early PCI quirks

 -- Timo Aaltonen   Fri, 16 Nov 2018
10:27:58 +0200

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1802556

Title:
  linux-oem: 4.15.0-1027.32 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1802556/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1802556] Re: linux-oem: 4.15.0-1027.32 -proposed tracker

2018-12-10 Thread Launchpad Bug Tracker
*** This bug is a duplicate of bug 1806663 ***
https://bugs.launchpad.net/bugs/1806663

This bug was fixed in the package linux-oem - 4.15.0-1028.33

---
linux-oem (4.15.0-1028.33) bionic; urgency=medium

  * linux-oem: 4.15.0-1028.33 -proposed tracker (LP: #1803678)

  * Miscellaneous Ubuntu changes
- Rebase to 4.15.0-42.45

  [ Ubuntu: 4.15.0-42.45 ]

  * linux: 4.15.0-42.45 -proposed tracker (LP: #1803592)
  * [FEAT] Guest-dedicated Crypto Adapters (LP: #1787405)
- KVM: s390: reset crypto attributes for all vcpus
- KVM: s390: vsie: simulate VCPU SIE entry/exit
- KVM: s390: introduce and use KVM_REQ_VSIE_RESTART
- KVM: s390: refactor crypto initialization
- s390: vfio-ap: base implementation of VFIO AP device driver
- s390: vfio-ap: register matrix device with VFIO mdev framework
- s390: vfio-ap: sysfs interfaces to configure adapters
- s390: vfio-ap: sysfs interfaces to configure domains
- s390: vfio-ap: sysfs interfaces to configure control domains
- s390: vfio-ap: sysfs interface to view matrix mdev matrix
- KVM: s390: interface to clear CRYCB masks
- s390: vfio-ap: implement mediated device open callback
- s390: vfio-ap: implement VFIO_DEVICE_GET_INFO ioctl
- s390: vfio-ap: zeroize the AP queues
- s390: vfio-ap: implement VFIO_DEVICE_RESET ioctl
- KVM: s390: Clear Crypto Control Block when using vSIE
- KVM: s390: vsie: Do the CRYCB validation first
- KVM: s390: vsie: Make use of CRYCB FORMAT2 clear
- KVM: s390: vsie: Allow CRYCB FORMAT-2
- KVM: s390: vsie: allow CRYCB FORMAT-1
- KVM: s390: vsie: allow CRYCB FORMAT-0
- KVM: s390: vsie: allow guest FORMAT-0 CRYCB on host FORMAT-1
- KVM: s390: vsie: allow guest FORMAT-1 CRYCB on host FORMAT-2
- KVM: s390: vsie: allow guest FORMAT-0 CRYCB on host FORMAT-2
- KVM: s390: device attrs to enable/disable AP interpretation
- KVM: s390: CPU model support for AP virtualization
- s390: doc: detailed specifications for AP virtualization
- KVM: s390: fix locking for crypto setting error path
- KVM: s390: Tracing APCB changes
- s390: vfio-ap: setup APCB mask using KVM dedicated function
- s390/zcrypt: Add ZAPQ inline function.
- s390/zcrypt: Review inline assembler constraints.
- s390/zcrypt: Integrate ap_asm.h into include/asm/ap.h.
- s390/zcrypt: fix ap_instructions_available() returncodes
- s390/zcrypt: remove VLA usage from the AP bus
- s390/zcrypt: Remove deprecated ioctls.
- s390/zcrypt: Remove deprecated zcrypt proc interface.
- s390/zcrypt: Support up to 256 crypto adapters.
- [Config:] Enable CONFIG_S390_AP_IOMMU and set CONFIG_VFIO_AP to module.
  * Bypass of mount visibility through userns + mount propagation (LP: #1789161)
- mount: Retest MNT_LOCKED in do_umount
- mount: Don't allow copying MNT_UNBINDABLE|MNT_LOCKED mounts
  *  CVE-2018-18955: nested user namespaces with more than five extents
incorrectly grant privileges over inode (LP: #1801924) // CVE-2018-18955
- userns: also map extents in the reverse map to kernel IDs
  * kdump fail due to an IRQ storm (LP: #1797990)
- SAUCE: x86/PCI: Export find_cap() to be used in early PCI code
- SAUCE: x86/quirks: Add parameter to clear MSIs early on boot
- SAUCE: x86/quirks: Scan all busses for early PCI quirks

 -- Timo Aaltonen   Fri, 16 Nov 2018
10:27:58 +0200

** Changed in: linux-oem (Ubuntu)
   Status: Invalid => Fix Released

** Changed in: linux-oem (Ubuntu)
   Status: Invalid => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1802556

Title:
  linux-oem: 4.15.0-1027.32 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1802556/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Re: [Bug 1630413] Re: segfault in server/mpm/event/event.c:process_socket

2018-12-10 Thread Brian Morton
Ah, that makes sense.

On Mon, Dec 10, 2018 at 6:50 AM Andreas Hasenack 
wrote:

> > However, I would prefer that someone with more Apache experience
> reviewed the fix.
>
> Right, that was actually my (very unclear, sorry) point when I commented
> on upstream's interest in this, since they would be experienced
> reviewers.
>
> --
> You received this bug notification because you are subscribed to the bug
> report.
> https://bugs.launchpad.net/bugs/1630413
>
> Title:
>   segfault in server/mpm/event/event.c:process_socket
>
> Status in apache2 package in Ubuntu:
>   Triaged
>
> Bug description:
>   We have seen consistent but infrequent segfaults of apache on a trusty
>   production server with 2.4.7-1ubuntu4.13 (for more examples, see [1])
>
>   ---
>   Oct  2 19:01:03 static kernel: [8029151.932468] apache2[10642]: segfault
> at 7fac797803a8 ip 7fac90b345e0 sp 7fac84ff8e20 error 6 in
> mod_mpm_event.so[7fac90b2e000+d000]
>   ---
>
>   Taking the ip - base seems to put us at a consistent offset
>
>   ---
>   (gdb) p/x 0x7fac90b345e0 - 0x7fac90b2e000
>   $1 = 0x65e0
>
>   $ addr2line -e ./mod_mpm_event.so  0x65e0
>   /build/apache2-Rau9Dr/apache2-2.4.7/server/mpm/event/event.c:1064
>   ---
>
>   which is at the bottom of process_socket(), which looks like
>
>   ---
> 1058  /*
> 1059   * Prevent this connection from writing to our connection
> state after it
> 1060   * is no longer associated with this thread. This would
> happen if the EOR
> 1061   * bucket is destroyed from the listener thread due to a
> connection abort
> 1062   * or timeout.
> 1063   */
> 1064  c->sbh = NULL;
> 1065  return;
> 1066  }
>   ---
>
>   1064 seems at least plausible as a faulting location...
>
>   Some digging through httpd history reveals that this assignment was
>   removed on the 2.4 branch with commit [2], which seems to be largely
>   based on [3].  Things have been shuffled around so much it's hard to
>   tell exactly what might have avoided us going down this path.  Even so
>   I'm honestly not sure how to reproduce it -- on a fairly busy server
>   it's seen at most a few times a day.
>
>   [1] http://paste.openstack.org/show/584330/
>   [2]
> https://github.com/apache/httpd/commit/043eba1a0a190829c073d9ef084358f6693dbbd2
>   [3]
> https://github.com/apache/httpd/commit/285e67883e396f97dc3aad50d9dc345f15220827
>
> To manage notifications about this bug go to:
>
> https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1630413/+subscriptions
>

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1630413

Title:
  segfault in server/mpm/event/event.c:process_socket

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1630413/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1803678] Re: linux-oem: 4.15.0-1028.33 -proposed tracker

2018-12-10 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-oem - 4.15.0-1028.33

---
linux-oem (4.15.0-1028.33) bionic; urgency=medium

  * linux-oem: 4.15.0-1028.33 -proposed tracker (LP: #1803678)

  * Miscellaneous Ubuntu changes
- Rebase to 4.15.0-42.45

  [ Ubuntu: 4.15.0-42.45 ]

  * linux: 4.15.0-42.45 -proposed tracker (LP: #1803592)
  * [FEAT] Guest-dedicated Crypto Adapters (LP: #1787405)
- KVM: s390: reset crypto attributes for all vcpus
- KVM: s390: vsie: simulate VCPU SIE entry/exit
- KVM: s390: introduce and use KVM_REQ_VSIE_RESTART
- KVM: s390: refactor crypto initialization
- s390: vfio-ap: base implementation of VFIO AP device driver
- s390: vfio-ap: register matrix device with VFIO mdev framework
- s390: vfio-ap: sysfs interfaces to configure adapters
- s390: vfio-ap: sysfs interfaces to configure domains
- s390: vfio-ap: sysfs interfaces to configure control domains
- s390: vfio-ap: sysfs interface to view matrix mdev matrix
- KVM: s390: interface to clear CRYCB masks
- s390: vfio-ap: implement mediated device open callback
- s390: vfio-ap: implement VFIO_DEVICE_GET_INFO ioctl
- s390: vfio-ap: zeroize the AP queues
- s390: vfio-ap: implement VFIO_DEVICE_RESET ioctl
- KVM: s390: Clear Crypto Control Block when using vSIE
- KVM: s390: vsie: Do the CRYCB validation first
- KVM: s390: vsie: Make use of CRYCB FORMAT2 clear
- KVM: s390: vsie: Allow CRYCB FORMAT-2
- KVM: s390: vsie: allow CRYCB FORMAT-1
- KVM: s390: vsie: allow CRYCB FORMAT-0
- KVM: s390: vsie: allow guest FORMAT-0 CRYCB on host FORMAT-1
- KVM: s390: vsie: allow guest FORMAT-1 CRYCB on host FORMAT-2
- KVM: s390: vsie: allow guest FORMAT-0 CRYCB on host FORMAT-2
- KVM: s390: device attrs to enable/disable AP interpretation
- KVM: s390: CPU model support for AP virtualization
- s390: doc: detailed specifications for AP virtualization
- KVM: s390: fix locking for crypto setting error path
- KVM: s390: Tracing APCB changes
- s390: vfio-ap: setup APCB mask using KVM dedicated function
- s390/zcrypt: Add ZAPQ inline function.
- s390/zcrypt: Review inline assembler constraints.
- s390/zcrypt: Integrate ap_asm.h into include/asm/ap.h.
- s390/zcrypt: fix ap_instructions_available() returncodes
- s390/zcrypt: remove VLA usage from the AP bus
- s390/zcrypt: Remove deprecated ioctls.
- s390/zcrypt: Remove deprecated zcrypt proc interface.
- s390/zcrypt: Support up to 256 crypto adapters.
- [Config:] Enable CONFIG_S390_AP_IOMMU and set CONFIG_VFIO_AP to module.
  * Bypass of mount visibility through userns + mount propagation (LP: #1789161)
- mount: Retest MNT_LOCKED in do_umount
- mount: Don't allow copying MNT_UNBINDABLE|MNT_LOCKED mounts
  *  CVE-2018-18955: nested user namespaces with more than five extents
incorrectly grant privileges over inode (LP: #1801924) // CVE-2018-18955
- userns: also map extents in the reverse map to kernel IDs
  * kdump fail due to an IRQ storm (LP: #1797990)
- SAUCE: x86/PCI: Export find_cap() to be used in early PCI code
- SAUCE: x86/quirks: Add parameter to clear MSIs early on boot
- SAUCE: x86/quirks: Scan all busses for early PCI quirks

 -- Timo Aaltonen   Fri, 16 Nov 2018
10:27:58 +0200

** Changed in: linux-oem (Ubuntu)
   Status: Invalid => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1803678

Title:
  linux-oem: 4.15.0-1028.33 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1803678/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1753470] Re: Postconf segfaults every 5 minutes

2018-12-10 Thread Bug Watch Updater
** Changed in: postfix (Debian)
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1753470

Title:
  Postconf segfaults every 5 minutes

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/postfix/+bug/1753470/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1783043] Re: GLIBC High Power License Fix for Ubuntu 16.04.4

2018-12-10 Thread Anthony Wong
** Also affects: glibc (Ubuntu)
   Importance: Undecided
   Status: New

** No longer affects: ubuntu

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1783043

Title:
  GLIBC High Power License Fix for Ubuntu 16.04.4

To manage notifications about this bug go to:
https://bugs.launchpad.net/intel/+bug/1783043/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1803962] Re: [19.04 FEAT] Upgrade libica >=3.4.0

2018-12-10 Thread Francis Ginther
** Tags added: id-5bf2ee4493db73365456488b

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1803962

Title:
  [19.04 FEAT] Upgrade libica >=3.4.0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1803962/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1806060] Re: Newer versions of killall (Ubuntu 18.04+) fail when signal specified in capitals

2018-12-10 Thread Christian Ehrhardt 
This is fixed in 23.2-1,
would someone confirm that this fixes all you initial bugs so that we can 
condier backporting the fix.

BTW: fix at
https://gitlab.com/psmisc/psmisc/commit/258ee9166e585f87005d3a9686938a4fa26669f9

Also I agree to @rbasak that this clearly has regression potential, just
we'd hope less than what it actually fixes especially for 3rd party
scripts of upgraders from 16.04

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1806060

Title:
  Newer versions of killall (Ubuntu 18.04+) fail when signal specified
  in capitals

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/psmisc/+bug/1806060/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1803994] Re: [19.04 FEAT] Upgrade opencryptoki >=3.11.0

2018-12-10 Thread Francis Ginther
** Tags added: id-5bf2ed15a3a9ed1134d88f6d

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1803994

Title:
  [19.04 FEAT] Upgrade opencryptoki >=3.11.0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1803994/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1807177] Re: Package samba-vfs-modules missing file glusterfs.so

2018-12-10 Thread Andreas Hasenack
It's not like that. The Depends field is populated from debian/control,
and from automatically calculated dependencies (like that ldd trick).
The moment a package lists something in Depends, if that something
cannot be installed, then the package itself will not be installed. It
doesn't matter if your smb.conf is referring to the gluster module or
not.

Now, all that being said, I see that debian is using a trick and making
glusterfs-common a "recommends" type of dependency, instead of "depends"
which is stricter. But it's still not allowed to have a main package
recommend an universe one.

But I could use a "suggests" (https://www.debian.org/doc/debian-policy
/ch-relationships.html#binary-dependencies-depends-recommends-suggests-
enhances-pre-depends), which is an even weaker type of dependency.

Or move the gluster vfs module into its own package, and have that land
in universe. Then there wouldn't be a problem at all.

Thanks for insisting on this. I'll reopen the bug, but mark it as
wishlist for now.

** Changed in: samba (Ubuntu)
   Status: Won't Fix => Triaged

** Changed in: samba (Ubuntu)
   Importance: Undecided => Wishlist

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1807177

Title:
  Package samba-vfs-modules missing file glusterfs.so

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/samba/+bug/1807177/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1798790] Re: Ubuntu 18.10 login screen never appears when using the Nvidia driver

2018-12-10 Thread rtimai
I forgot to include introductory links to this complicated issue. My
crude understanding is that systemd handles system initialization,
calling bpfilter (replacing iptables) which is handled by the linux
kernel.

https://thenewstack.io/systemd-vs-linux-kernel/

https://www.linux.com/news/why-kernel-community-replacing-iptables-bpf

SLiM, btw, while it works, is Debian-branded. I'm still trying to figure
out how to remove the amateurish Debian swirl background.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1798790

Title:
  Ubuntu 18.10 login screen never appears when using the Nvidia driver

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gdm3/+bug/1798790/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1795199] Re: Can't launch right click menu using touchscreen

2018-12-10 Thread Sebastien Bacher
Ok, so it's a nautilus issue if it's only there it doesn't work. What
view mode do you use? Do you try to click on an icon on the bg?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1795199

Title:
  Can't launch right click menu using touchscreen

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/nautilus/+bug/1795199/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1773363] Re: glibc tst-preadvwritev2 and tst-preadvwritev64v2 fail with Linux 4.16+

2018-12-10 Thread Andy Whitcroft
** Changed in: linux (Ubuntu)
   Status: Incomplete => Confirmed

** Changed in: linux (Ubuntu Bionic)
   Status: Incomplete => Confirmed

** Changed in: linux (Ubuntu Cosmic)
   Status: Incomplete => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1773363

Title:
  glibc tst-preadvwritev2 and tst-preadvwritev64v2 fail with Linux 4.16+

To manage notifications about this bug go to:
https://bugs.launchpad.net/glibc/+bug/1773363/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1807177] Re: Package samba-vfs-modules missing file glusterfs.so

2018-12-10 Thread Andreas Hasenack
It's not like that. The Depends field is populated from debian/control,
and from automatically calculated dependencies (like that ldd trick).
The moment a package lists something in Depends, if that something
cannot be installed, then the package itself will not be installed. It
doesn't matter if your smb.conf is referring to the gluster module or
not.

Now, all that being said, I see that debian is using a trick and making
glusterfs-common a "recommends" type of dependency, instead of "depends"
which is stricter. But it's still not allowed to have a main package
recommend an universe one.

But I could use a "suggests" (https://www.debian.org/doc/debian-policy
/ch-relationships.html#binary-dependencies-depends-recommends-suggests-
enhances-pre-depends), which is an even weaker type of dependency.

Or move the gluster vfs module into its own package, and have that land
in universe. Then there wouldn't be a problem at all.

Thanks for insisting on this. I'll reopen the bug, but mark it as
wishlist for now.

** Changed in: samba (Ubuntu)
   Status: Won't Fix => Triaged

** Changed in: samba (Ubuntu)
   Importance: Undecided => Wishlist

-- 
You received this bug notification because you are a member of Ubuntu
Server, which is subscribed to samba in Ubuntu.
https://bugs.launchpad.net/bugs/1807177

Title:
  Package samba-vfs-modules missing file glusterfs.so

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/samba/+bug/1807177/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1798790] Re: Ubuntu 18.10 login screen never appears when using the Nvidia driver

2018-12-10 Thread rtimai
SOLVED (MAYBE)

For me, it's not nVidia, it's not WaylandEnable. It may be the "Started
bpfilter" message, which I earlier thought was nothing. I don't know
beans about this, but I checked, and bpfilter is a recent replacement
for iptables in many Linux distros, and it's handled in the linux
kernel. Casting about for perhaps an alternate to gnome display manager
3, I found that SLiM had high user ratings, and one of the suggested
advantages was it didn't require systemd (the system startup daemon,
which historically has had a running conflict with kernel developers,
maybe bpfilter.) On the gamble that this bootup hang might be caused by
a kernel-systemd conflict, I enabled networking in recovery mode and ran
'apt install slim' to install alternate display manager SLiM. the
installation prompted me to choose SLiM or GDM as the default, I chose
SLiM, and was able to boot Cosmic finally. If I run into any issues
further on, I'll post here.

If you already have an alternate display manager installed, you can
switch with "sudo dpkg-reconfigure gdm" and select the alt dm.

Anyway, this might be a last, desperate workaround for the "bpfilter
hang," if all the other solutions didn't work for you.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1798790

Title:
  Ubuntu 18.10 login screen never appears when using the Nvidia driver

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gdm3/+bug/1798790/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1806860] Re: Pulseaudio module-jack-source unable to connect to jackd2

2018-12-10 Thread Sebastien Bacher
Thanks!

** Changed in: pulseaudio (Ubuntu)
   Status: Incomplete => Triaged

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1806860

Title:
  Pulseaudio module-jack-source unable to connect to jackd2

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/jackd2/+bug/1806860/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1458204] Re: removing kernels should not require a restart afterward

2018-12-10 Thread Balint Reczey
@bhkolts

Please just upgrade update-notifier-common. Timo's automated
notification email referred to the source package from which both binary
packages are built.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1458204

Title:
  removing kernels should not require a restart afterward

To manage notifications about this bug go to:
https://bugs.launchpad.net/unattended-upgrades/+bug/1458204/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1787405] Re: [FEAT] Guest-dedicated Crypto Adapters

2018-12-10 Thread Christian Ehrhardt 
Thanks for accepting that follow-on fix.
With that it now fully works on cosmic as well following the howto on comment 
#66

** Tags removed: verification-needed verification-needed-cosmic
** Tags added: verification-done verification-done-cosmic

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1787405

Title:
  [FEAT] Guest-dedicated Crypto Adapters

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1787405/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1807246] Re: after upgrading to bionic, my session forgets who I am frequently

2018-12-10 Thread Christian Ehrhardt 
Thank you Luke!
Lets see if there is any new update that might shed some light here.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1807246

Title:
  after upgrading to bionic, my session forgets who I am frequently

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sssd/+bug/1807246/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1806570] Re: linux-aws: 4.4.0-1037.40 -proposed tracker

2018-12-10 Thread Sean Feole
** Tags added: regression-testing-passed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1806570

Title:
  linux-aws: 4.4.0-1037.40 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1806570/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1806570] Re: linux-aws: 4.4.0-1037.40 -proposed tracker

2018-12-10 Thread Brad Figg
** Changed in: kernel-sru-workflow/regression-testing
   Status: Confirmed => Fix Released

** Description changed:

  This bug is for tracking the  upload package. This
  bug will contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1806569
  phase: Promoted to proposed
  phase-changed: Thursday, 06. December 2018 15:31 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason:
-   regression-testing: Testing in progress
security-signoff: Waiting for signoff
verification-testing: Testing in progress

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1806570

Title:
  linux-aws: 4.4.0-1037.40 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1806570/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1787405] Re: [FEAT] Guest-dedicated Crypto Adapters

2018-12-10 Thread Christian Ehrhardt 
FYI: We also resolved the systemd test issues in Bionic (unrelated, but needed 
a fix).
Lets see how they will look like in Cosmic after the tests on the new upload 
complete.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1787405

Title:
  [FEAT] Guest-dedicated Crypto Adapters

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1787405/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1807698] [NEW] crash after making selection with square lasso

2018-12-10 Thread pleabargain
Public bug reported:

opened jpeg
used square selection tool
crash
$ pinta

(Pinta:3188): GLib-GIO-CRITICAL **: 07:27:33.961: g_dbus_proxy_new:
assertion 'G_IS_DBUS_CONNECTION (connection)' failed

(Pinta:3188): GLib-GIO-CRITICAL **: 07:27:33.961: g_dbus_proxy_new: assertion 
'G_IS_DBUS_CONNECTION (connection)' failed
free(): invalid pointer
Stacktrace:

  at  <0x>
  at (wrapper managed-to-native) GLib.SList.g_free (intptr) <0x0005f>
  at GLib.ListBase.Empty () <0x0013c>
  at GLib.ListBase.Dispose (bool) <0xf>
  at GLib.ListBase.Finalize () <0x0001d>
  at (wrapper runtime-invoke) object.runtime_invoke_virtual_void__this__ 
(object,intptr,intptr,intptr) <0x00068>

Native stacktrace:

/usr/bin/mono(+0xc8514) [0x5616974f1514]
/lib/x86_64-linux-gnu/libpthread.so.0(+0x12890) [0x7fc567752890]
/lib/x86_64-linux-gnu/libc.so.6(gsignal+0xc7) [0x7fc567175e97]
/lib/x86_64-linux-gnu/libc.so.6(abort+0x141) [0x7fc567177801]
/lib/x86_64-linux-gnu/libc.so.6(+0x89897) [0x7fc5671c0897]
/lib/x86_64-linux-gnu/libc.so.6(+0x9090a) [0x7fc5671c790a]
/lib/x86_64-linux-gnu/libc.so.6(cfree+0x4cc) [0x7fc5671cee1c]
[0x415b5930]

Debug info from gdb:


=
Got a SIGABRT while executing native code. This usually indicates
a fatal error in the mono runtime or one of the native libraries 
used by your application.
=

Aborted (core dumped)

ProblemType: Bug
DistroRelease: Ubuntu 18.04
Package: pinta 1.6-2
ProcVersionSignature: Ubuntu 4.15.0-42.45-generic 4.15.18
Uname: Linux 4.15.0-42-generic x86_64
ApportVersion: 2.20.9-0ubuntu7.5
Architecture: amd64
CurrentDesktop: LXDE
Date: Mon Dec 10 07:28:38 2018
InstallationDate: Installed on 2018-03-02 (283 days ago)
InstallationMedia: Lubuntu 17.10 "Artful Aardvark" - Release amd64 (20180105)
PackageArchitecture: all
SourcePackage: pinta
UpgradeStatus: Upgraded to bionic on 2018-07-25 (137 days ago)

** Affects: pinta (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: amd64 apport-bug bionic

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1807698

Title:
  crash after making selection with square lasso

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/pinta/+bug/1807698/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1799459] Re: /usr/bin/gnome-tweaks:AttributeError:do_activate:__init__:load_tweaks:/usr/lib/python3/dist-packages/gtweak/tweaks/tweak_group_general.py@14

2018-12-10 Thread Launchpad Bug Tracker
This bug was fixed in the package gnome-tweaks - 3.30.2-1

---
gnome-tweaks (3.30.2-1) unstable; urgency=medium

  * New upstream release
- Fix running Tweaks outside of GNOME Shell (LP: #1799459)

 -- Jeremy Bicha   Sun, 09 Dec 2018 22:00:39 -0500

** Changed in: gnome-tweaks (Ubuntu)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1799459

Title:
  /usr/bin/gnome-
  tweaks:AttributeError:do_activate:__init__:load_tweaks:/usr/lib/python3
  /dist-packages/gtweak/tweaks/tweak_group_general.py@14

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gnome-tweaks/+bug/1799459/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1807698] Re: crash after making selection with square lasso

2018-12-10 Thread pleabargain
this bub can be duplicated
just opened same file
crashed

attached is file that crashes pinta

** Attachment added: "sample file that causes crash"
   
https://bugs.launchpad.net/ubuntu/+source/pinta/+bug/1807698/+attachment/5220888/+files/onlinkdownload.jpeg

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1807698

Title:
  crash after making selection with square lasso

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/pinta/+bug/1807698/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1807246] Re: after upgrading to bionic, my session forgets who I am frequently

2018-12-10 Thread Luke Schierer
https://pagure.io/SSSD/sssd/issue/3900

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1807246

Title:
  after upgrading to bionic, my session forgets who I am frequently

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sssd/+bug/1807246/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1805920] Re: iPXE ignores vlan 0 traffic

2018-12-10 Thread Christian Ehrhardt 
[1] seems reasonable, I'll give it a try with and without the PPA of Andres.
It needs a slight modification, to not conflict with the default portal.

Install libvirt with all else it usually brings (for the bridge and dhcp on the 
bridge):
$ sudo install libvirt-daemon-system

So use these commands:
 $ curl -O  http://download.cirros-cloud.net/0.3.4/cirros-0.3.4-x86_64-disk.img
 $ qemu-img convert -O raw cirros-0.3.4-x86_64-disk.img cirros.raw
 $ sudo targetcli /backstores/fileio/ create cirros $PWD/cirros.raw 100M false
 $ sudo targetcli /iscsi create iqn.2016-01.com.example:cirros
 $ sudo targetcli /iscsi/iqn.2016-01.com.example:cirros/tpg1/luns create 
/backstores/fileio/cirros
 $ sudo targetcli /iscsi/iqn.2016-01.com.example:cirros/tpg1/portals delete 
0.0.0.0 ip_port=3260
 $ sudo targetcli /iscsi/iqn.2016-01.com.example:cirros/tpg1/portals create 
192.168.122.1


If you do that you'll end up with a targetcli config like this:
$ sudo targetcli
targetcli shell version 2.1.fb43
Copyright 2011-2013 by Datera, Inc and others.
For help on commands, type 'help'.

/> ls
o- / 
.
 [...]
  o- backstores 
..
 [...]
  | o- block 
..
 [Storage Objects: 0]
  | o- fileio 
.
 [Storage Objects: 1]
  | | o- cirros ... 
[/home/ubuntu/cirros.raw (39.2MiB) write-thru activated]
  | o- pscsi 
..
 [Storage Objects: 0]
  | o- ramdisk 

 [Storage Objects: 0]
  o- iscsi 

 [Targets: 1]
  | o- iqn.2016-01.com.example:cirros 

 [TPGs: 1]
  |   o- tpg1 
..
 [gen-acls, no-auth]
  | o- acls 
..
 [ACLs: 0]
  | o- luns 
..
 [LUNs: 1]
  | | o- lun0 
 
[fileio/cirros (/home/ubuntu/cirros.raw)]
  | o- portals 

 [Portals: 1]
  |   o- 192.168.122.1:3260 
...
 [OK]
  o- loopback 
.
 [Targets: 0]
  o- srpt 
.
 [Targets: 0]
  o- vhost 

 [Targets: 0]


Do that and then on qemu start attach to the console early.
To get that easier, instead of VNC use a local curses console with:
  $ sudo qemu-system-x86_64 -smp cpus=2 -curses -boot order=n -netdev 
bridge,br=virbr0,id=virtio0 -device virtio-net-pci,netdev=virtio

Hit CTRL+B early on boot for ipxe commands

With out virtbr0 default setup having the host on 192.168.122.1 that
would be

iPXE> ifopen net0
iPXE> dhcp
iPXE> sanboot iscsi:192.168.122.1iqn.2016-01.com.example:cirros


Retested with 1.0.0+git-20180124.fbe8c52d-0ubuntu2.2~18.04.1 from the PPA.
Boot just as much - so while no perfect test (what if that would be in a VLAN 
tagged network?) it is better than nothing.

That said - together with all that was discussed before - I think Andres could 
go on uploading it to Disco.
For the SRUs we will need some extra for [2], but one thing at a time.

Or is the assumption that I drive it from here and you only do
verifications on the case?

[1]: 
https://medium.com/oracledevs/kvm-iscsi-part-i-iscsi-boot-with-ipxe-f533f2666075
[2]: https://packages.ubuntu.com/bionic/ipxe-qemu-256k-compat-efi-roms

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1805920

Title:
  iPXE ignores vlan 0 traffic

To manage notifications about this bug go to:
https://bugs.launchpad.net/maas/+bug/1805920/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com

[Bug 1795342] Re: High Power Consumption

2018-12-10 Thread Irfan
Please ignore the previous one, I took that screenshot sooner. Consider
this one.

** Attachment added: "Screenshot from 2018-12-10 17-34-22.png"
   
https://bugs.launchpad.net/ubuntu-power-consumption/+bug/1795342/+attachment/5220876/+files/Screenshot%20from%202018-12-10%2017-34-22.png

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1795342

Title:
  High Power Consumption

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-power-consumption/+bug/1795342/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1807694] Re: package nvidia-340 (not installed) failed to install/upgrade: trying to overwrite '/usr/lib/x86_64-linux-gnu/libnvidia-ml.so', which is also in package libnvidia-compute-390:amd64 39

2018-12-10 Thread Apport retracing service
*** This bug is a duplicate of bug 1798721 ***
https://bugs.launchpad.net/bugs/1798721

Thank you for taking the time to report this crash and helping to make
this software better.  This particular crash has already been reported
and is a duplicate of bug #1798721, so is being marked as such.  Please
look at the other bug report to see if there is any missing information
that you can provide, or to see if there is a workaround for the bug.
Additionally, any further discussion regarding the bug should occur in
the other report.  Please continue to report any other bugs you may
find.

** Tags removed: need-duplicate-check

** This bug has been marked a duplicate of bug 1798721
   package nvidia-340 (not installed) failed to install/upgrade: trying to 
overwrite '/usr/lib/x86_64-linux-gnu/libnvidia-ml.so', which is also in package 
libnvidia-compute-390:amd64 390.77-0ubuntu0.18.04.1

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1807694

Title:
  package nvidia-340 (not installed) failed to install/upgrade: trying
  to overwrite '/usr/lib/x86_64-linux-gnu/libnvidia-ml.so', which is
  also in package libnvidia-compute-390:amd64 390.77-0ubuntu0.18.04.1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/nvidia-graphics-drivers-340/+bug/1807694/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1798721] Re: package nvidia-340 (not installed) failed to install/upgrade: trying to overwrite '/usr/lib/x86_64-linux-gnu/libnvidia-ml.so', which is also in package libnvidia-compute-390:amd64 39

2018-12-10 Thread Launchpad Bug Tracker
Status changed to 'Confirmed' because the bug affects multiple users.

** Changed in: nvidia-graphics-drivers-340 (Ubuntu)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1798721

Title:
  package nvidia-340 (not installed) failed to install/upgrade: trying
  to overwrite '/usr/lib/x86_64-linux-gnu/libnvidia-ml.so', which is
  also in package libnvidia-compute-390:amd64 390.77-0ubuntu0.18.04.1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/nvidia-graphics-drivers-340/+bug/1798721/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1807694] [NEW] package nvidia-340 (not installed) failed to install/upgrade: trying to overwrite '/usr/lib/x86_64-linux-gnu/libnvidia-ml.so', which is also in package libnvidia-compute-390:amd64

2018-12-10 Thread Etienne
*** This bug is a duplicate of bug 1798721 ***
https://bugs.launchpad.net/bugs/1798721

Public bug reported:

First of all, I installer the nvidia driver via this following repo:
sudo add-apt-repository ppa:graphics-drivers/ppa

Then I got the error message attached in this report when I tried to
install nvidia-cuda-toolkit.

So I tried to uninstall all nvidia:
sudo add-apt-repository --remove ppa:graphics-drivers/ppa 
sudo apt update 
ubuntu-drivers devices
Then I install the nvidia driver from the official repo of ubuntu like 
described in https://doc.ubuntu-fr.org/nvidia chapter 3.1.
Then I tried to install nvidia-cuda-toolkit again but I faced the same issue.

ProblemType: Package
DistroRelease: Ubuntu 18.04
Package: nvidia-340 (not installed)
ProcVersionSignature: Ubuntu 4.15.0-42.45-generic 4.15.18
Uname: Linux 4.15.0-42-generic x86_64
NonfreeKernelModules: nvidia_uvm nvidia
ApportVersion: 2.20.9-0ubuntu7.5
AptOrdering:
 nvidia-340:amd64: Install
 NULL: ConfigurePending
Architecture: amd64
Date: Mon Dec 10 12:45:12 2018
DuplicateSignature:
 package:nvidia-340:(not installed)
 Unpacking nvidia-340 (340.107-0ubuntu0.18.04.1) ...
 dpkg: error processing archive 
/var/cache/apt/archives/nvidia-340_340.107-0ubuntu0.18.04.1_amd64.deb 
(--unpack):
  trying to overwrite '/usr/lib/x86_64-linux-gnu/libnvidia-ml.so', which is 
also in package libnvidia-compute-390:amd64 390.77-0ubuntu0.18.04.1
ErrorMessage: trying to overwrite '/usr/lib/x86_64-linux-gnu/libnvidia-ml.so', 
which is also in package libnvidia-compute-390:amd64 390.77-0ubuntu0.18.04.1
InstallationDate: Installed on 2018-12-06 (3 days ago)
InstallationMedia: Ubuntu 18.04.1 LTS "Bionic Beaver" - Release amd64 (20180725)
Python3Details: /usr/bin/python3.6, Python 3.6.7, python3-minimal, 3.6.7-1~18.04
PythonDetails: N/A
RelatedPackageVersions:
 dpkg 1.19.0.5ubuntu2.1
 apt  1.6.6
SourcePackage: nvidia-graphics-drivers-340
Title: package nvidia-340 (not installed) failed to install/upgrade: trying to 
overwrite '/usr/lib/x86_64-linux-gnu/libnvidia-ml.so', which is also in package 
libnvidia-compute-390:amd64 390.77-0ubuntu0.18.04.1
UpgradeStatus: No upgrade log present (probably fresh install)

** Affects: nvidia-graphics-drivers-340 (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: amd64 apport-package bionic package-conflict

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1807694

Title:
  package nvidia-340 (not installed) failed to install/upgrade: trying
  to overwrite '/usr/lib/x86_64-linux-gnu/libnvidia-ml.so', which is
  also in package libnvidia-compute-390:amd64 390.77-0ubuntu0.18.04.1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/nvidia-graphics-drivers-340/+bug/1807694/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1803469] Re: package nvidia-340 (not installed) failed to install/upgrade: trying to overwrite '/usr/lib/x86_64-linux-gnu/libnvidia-ml.so', which is also in package libnvidia-compute-390:amd64 39

2018-12-10 Thread Launchpad Bug Tracker
Status changed to 'Confirmed' because the bug affects multiple users.

** Changed in: nvidia-graphics-drivers-340 (Ubuntu)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1803469

Title:
  package nvidia-340 (not installed) failed to install/upgrade: trying
  to overwrite '/usr/lib/x86_64-linux-gnu/libnvidia-ml.so', which is
  also in package libnvidia-compute-390:amd64 390.77-0ubuntu0.18.04.1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/nvidia-graphics-drivers-340/+bug/1803469/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Re: [Bug 1268592] Re: gscan2pdf no longer launches in Ubuntu 12.04 LTS after ppa upgrade earlier today

2018-12-10 Thread Mike
OK, thank you.


On 12/10/18 1:14 AM, Jeffrey Ratcliffe wrote:
> You are scanning from the flatbed, so yet, setting # pages to 1 would
> solve your problem.
>
> Alternatively, in Edit/Preferences, disable the option "allow batch
> scanning from flatbed".
>

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1268592

Title:
  gscan2pdf no longer launches in Ubuntu 12.04 LTS after ppa upgrade
  earlier today

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gscan2pdf/+bug/1268592/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 984390] Re: $PATH is taken from login.defs not /etc/environment

2018-12-10 Thread Michael Vogt
This is now fixed upstream: https://github.com/shadow-
maint/shadow/pull/119 - so the next shadow release should have it. This
makes me also wonder if we should simply cherry pick it for disco.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/984390

Title:
  $PATH is taken from login.defs not /etc/environment

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/984390/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1795342] Re: High Power Consumption

2018-12-10 Thread Irfan
Thank you.
Attached is the output of top -d60

** Attachment added: "Screenshot from 2018-12-10 17-21-12.png"
   
https://bugs.launchpad.net/ubuntu-power-consumption/+bug/1795342/+attachment/5220870/+files/Screenshot%20from%202018-12-10%2017-21-12.png

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1795342

Title:
  High Power Consumption

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-power-consumption/+bug/1795342/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1429030] Re: netboot mini.iso doesn't support UEFI boot

2018-12-10 Thread Wladimir Mutel
Add my vote for getting Ubuntu mini.iso compliant with Debian and
currently-common sense overall.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1429030

Title:
  netboot mini.iso doesn't support UEFI boot

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/debian-installer/+bug/1429030/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1630413] Re: segfault in server/mpm/event/event.c:process_socket

2018-12-10 Thread Andreas Hasenack
> However, I would prefer that someone with more Apache experience
reviewed the fix.

Right, that was actually my (very unclear, sorry) point when I commented
on upstream's interest in this, since they would be experienced
reviewers.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1630413

Title:
  segfault in server/mpm/event/event.c:process_socket

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1630413/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1630413] Re: segfault in server/mpm/event/event.c:process_socket

2018-12-10 Thread Andreas Hasenack
> However, I would prefer that someone with more Apache experience
reviewed the fix.

Right, that was actually my (very unclear, sorry) point when I commented
on upstream's interest in this, since they would be experienced
reviewers.

-- 
You received this bug notification because you are a member of Ubuntu
Server, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1630413

Title:
  segfault in server/mpm/event/event.c:process_socket

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1630413/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


Re: [Bug 1798313] Re: traceoute6 gives error sendto: Invalid argument

2018-12-10 Thread Rami Lehti
You can use the traceroute6 or traceroute from the package traceroute.

On 9.12.2018 12.42, Jure Sah wrote:
> Is there a workaround to get this working in Ubuntu 18.04, until the bug
> is deemed important enough to actually fix?
>

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1798313

Title:
  traceoute6 gives error sendto: Invalid argument

To manage notifications about this bug go to:
https://bugs.launchpad.net/iputils/+bug/1798313/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1798790] Re: Ubuntu 18.10 login screen never appears when using the Nvidia driver

2018-12-10 Thread rtimai
GDM3 fails to start, stalled at 'started bpfilter' on my HP laptop
(model hp15-ay016nr) which runs Intel graphics, no nVidia hardware or
drivers. So, this is not strictly an nVidia issue, which began after a
Sat 8 December upgrade.

Booting previous kernels did not fix the problem. Disabling Wayland in
/etc/gdm3/custom.conf also had no effect.

I'm having a terrible time gathering system information because I can
only log in to Gnome Shell as a Live Session User from the Ubuntu 18.10
Live Install USB drive -- or as root in Recovery Mode -- which results
in limited access to user files and info on the installed system.
Attempting to view many directories gets Access Denied You Don't Have
Permissions. I even have trouble viewing my backup folders on my
external USB drive, and I'm afraid I may lose access to them if I revert
to 18.04 LTS, or install an alternate distro to replace the current
Ubuntu 18.10. I'm not familiar with recent file system security
"enhancements," but I think there have been changes with unanticipated
consequences.

I'm posting this as a temporary Live Session User off a Cosmic installation USB 
drive. None of my online account info is saved, and I have to search my 
pword/unname each time I visit any web site, it's a huge pain.
I have been hampered in researching this, but I have seen the same symptoms 
reported by Arch Linux users as well.

BTW, Cripton's tip above to enable networking did allow me to run 'apt
update' in recovery mode to confirm no pending upgrades (so, no fixes
pending.) But, unfortunately Resuming a normal boot did not result in
gdm3 successfully starting for me.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1798790

Title:
  Ubuntu 18.10 login screen never appears when using the Nvidia driver

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gdm3/+bug/1798790/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1199511] Re: smartd service LogFile configuration points to messages instead of syslog

2018-12-10 Thread Launchpad Bug Tracker
*** This bug is a duplicate of bug 752172 ***
https://bugs.launchpad.net/bugs/752172

** Merge proposal linked:
   
https://code.launchpad.net/~kstenerud/ubuntu/+source/logwatch/+git/logwatch/+merge/354951

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1199511

Title:
  smartd service LogFile configuration points to messages instead of
  syslog

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/logwatch/+bug/1199511/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 752172] Re: Logwatch looks for afpd output in "messages", not in log files that afpd writes to

2018-12-10 Thread Launchpad Bug Tracker
** Merge proposal linked:
   
https://code.launchpad.net/~kstenerud/ubuntu/+source/logwatch/+git/logwatch/+merge/354951

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/752172

Title:
  Logwatch looks for afpd output in "messages", not in log files that
  afpd writes to

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/logwatch/+bug/752172/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1791587] Re: snapd ignores proxy settings set via core snap

2018-12-10 Thread Michael Vogt
** Changed in: snapd (Ubuntu)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1791587

Title:
  snapd ignores proxy settings set via core snap

To manage notifications about this bug go to:
https://bugs.launchpad.net/snapd/+bug/1791587/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1806049] Please test proposed package

2018-12-10 Thread James Page
Hello Corey, or anyone else affected,

Accepted ceilometer into rocky-proposed. The package will build now and
be available in the Ubuntu Cloud Archive in a few hours, and then in the
-proposed repository.

Please help us by testing this new package. To enable the -proposed
repository:

  sudo add-apt-repository cloud-archive:rocky-proposed
  sudo apt-get update

Your feedback will aid us getting this update out to other Ubuntu users.

If this package fixes the bug for you, please add a comment to this bug,
mentioning the version of the package you tested, and change the tag
from verification-rocky-needed to verification-rocky-done. If it does
not fix the bug for you, please add a comment stating that, and change
the tag to verification-rocky-failed. In either case, details of your
testing will help us make a better decision.

Further information regarding the verification process can be found at
https://wiki.ubuntu.com/QATeam/PerformingSRUVerification . Thank you in
advance!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1806049

Title:
  [SRU] rocky stable releases

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-archive/+bug/1806049/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1807678] Re: HUAWEI E15 50 HSDPA USB Stick device ID to be reported to Linux USB developers

2018-12-10 Thread Lars Melin
The lack of support for deviceid 12d1:1001 in the linux serial driver
option  is not an usb_modeswitch bug.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1807678

Title:
  HUAWEI E15 50 HSDPA USB Stick device ID to be reported to Linux USB
  developers

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/usb-modeswitch/+bug/1807678/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1776563] Re: Acer Aspire A315 IOAPIC failure on Ubuntu 18.04, kernel hangs, can't load, kernel freeze (AMD Ryzen 5/Radeon/Raven) / AMDGPU Hybrid crash

2018-12-10 Thread siyia
noapic works fine only the bloody suspend isnt working

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1776563

Title:
  Acer Aspire A315 IOAPIC failure on Ubuntu 18.04, kernel hangs, can't
  load, kernel freeze  (AMD Ryzen 5/Radeon/Raven) / AMDGPU Hybrid crash

To manage notifications about this bug go to:
https://bugs.launchpad.net/amd/+bug/1776563/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1806860] Re: Pulseaudio module-jack-source unable to connect to jackd2

2018-12-10 Thread Hauke Wintjen
Reported as suggested :
https://gitlab.freedesktop.org/pulseaudio/pulseaudio/issues/604

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1806860

Title:
  Pulseaudio module-jack-source unable to connect to jackd2

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/jackd2/+bug/1806860/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1807594] Re: based on its behavior, gthumb appears to not have styled the headerbar with '.titlebar'

2018-12-10 Thread gyll
** Description changed:

  Themes which style the min/max/close buttons on gthumb's headrebar (e.g. 
'Xfce Evolution 5.0.0', d/l here 
https://sourceforge.net/projects/xfce-evolution/files/xfce-evolution-5.0.0.zip/download)
 do not style those buttons in gthumb 3.6.1
- However, if i change the min/max/close buttons' gtk3 css selectors from 
'headerbar.titlebar' to 'headerbar' (i did this in 'Xfce Evolution 5.6.0', d/l 
here 
https://sourceforge.net/projects/xfce-evolution/files/xfce-evolution-5.6.0.zip/download)
 then the buttons do get styled. Shoud i report this as a bug?
+ However, if i change the min/max/close buttons' gtk3 css selectors from 
'headerbar.titlebar' to 'headerbar' (i did this in 'Xfce Evolution 5.6.0', d/l 
here 
https://sourceforge.net/projects/xfce-evolution/files/xfce-evolution-5.6.0.zip/download)
 then the buttons do get styled.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1807594

Title:
  based on its behavior, gthumb appears to not have styled the headerbar
  with '.titlebar'

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gthumb/+bug/1807594/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1776563] Re: Acer Aspire A315 IOAPIC failure on Ubuntu 18.04, kernel hangs, can't load, kernel freeze (AMD Ryzen 5/Radeon/Raven) / AMDGPU Hybrid crash

2018-12-10 Thread siyia
In manjaro 18 pci=noacpi disables dgpu.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1776563

Title:
  Acer Aspire A315 IOAPIC failure on Ubuntu 18.04, kernel hangs, can't
  load, kernel freeze  (AMD Ryzen 5/Radeon/Raven) / AMDGPU Hybrid crash

To manage notifications about this bug go to:
https://bugs.launchpad.net/amd/+bug/1776563/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1807131] Re: Upgrade from 16.04 to 18.04 failed

2018-12-10 Thread Ricardo Adao
Looking into other threads, I look into the log files to find obsolete
packages and found these two:

2018-12-06 10:54:22,048 DEBUG Obsolete: docker-ce libsystemd-daemon0

Uninstalled them and all is working now, running the upgrade.

** Changed in: ubuntu-release-upgrader (Ubuntu)
 Assignee: (unassigned) => Ricardo Adao (ricadao)

** Changed in: ubuntu-release-upgrader (Ubuntu)
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1807131

Title:
  Upgrade from 16.04 to 18.04 failed

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-release-upgrader/+bug/1807131/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1798583] Re: the new Steam Controller driver breaks it on Steam

2018-12-10 Thread Will Cooke
As I understand it, while this currently works on Bionic with 4.15 it
will _stop_ working on Bionic when the new 4.18 HWE kernel gets
released, without this patch applied.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1798583

Title:
  the new Steam Controller driver breaks it on Steam

To manage notifications about this bug go to:
https://bugs.launchpad.net/linux/+bug/1798583/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1587154] Re: --working-directory does not work anymore

2018-12-10 Thread Rainer Müller
Works for me, too.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1587154

Title:
  --working-directory does not work anymore

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gnome-terminal/+bug/1587154/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1802727] Re: virt-manager doesn't create or change the bridge and gives an error message

2018-12-10 Thread Christian Ehrhardt 
Hrm, there is no work on this bug here atm afaik.
To be clear, there are:
- bug 1802906 which is fixed in Disco Dingo (upcoming Ubuntu 19.04)
- this bug here which is unclear what it actually is about atm.
  - is it the same bug as bug 1802906?
- please test the code in 19.04 against your case
- if it works, then we can consider 1802906 as SRU for Bionc/Cosmic
- if so please provide a use case this is for on bug 1802906
  - is it not the same?
- please explain what makes this use case different.
- please provide steps to re-produce this
- only then can it be further discussed/debugged/fixed

** Changed in: virt-manager (Ubuntu)
   Status: In Progress => Incomplete

** Changed in: virt-manager (Ubuntu Bionic)
   Status: Triaged => Incomplete

** Changed in: virt-manager (Ubuntu Cosmic)
   Status: Triaged => Incomplete

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1802727

Title:
  virt-manager doesn't create or change the bridge and gives an error
  message

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/virt-manager/+bug/1802727/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1804625] Re: Please merge the fixes released in 10.3.5

2018-12-10 Thread Christian Ehrhardt 
This bug was fixed in the package open-vm-tools - 2:10.3.5-1

---
open-vm-tools (2:10.3.5-1) unstable; urgency=medium

  * [7061cb7] Update upstream source from tag 'upstream/10.3.5'
Update to upstream version '10.3.5'
with Debian dir 9315f58cab8ba1356c1e4aa77d714257dc0651f2

 -- Bernd Zeimetz   Fri, 09 Nov 2018 11:32:15 +0100

open-vm-tools (2:10.3.0-1) unstable; urgency=medium

  * [16acbc3] Remove PrivateTmp=yes.
Thanks to Christian Ehrhardt (Closes: #905170)
  * [72aabb2] Add RequiresMountsFor=/tmp.
Thanks to Christopher Odenbach (Closes: #900566)
  * [96bf0c5] Update upstream source from tag 'upstream/10.3.0'
Update to upstream version '10.3.0'
with Debian dir ace0137b2d17e039ddac188fdcd15f882119925a
  * [e5a9b82] Re-add .travis.yml
  * [83e043f] Refreshing patches

 -- Bernd Zeimetz   Tue, 07 Aug 2018 23:41:00 +0200

** Changed in: open-vm-tools (Ubuntu)
   Status: Triaged => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1804625

Title:
  Please merge the fixes released in 10.3.5

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/open-vm-tools/+bug/1804625/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

<    1   2   3   4   5   6   >