[Bug 1807709] Re: dbus always crashes at session start (on wayland)
ProblemType: Crash Architecture: amd64 CrashCounter: 1 Date: Mon Dec 10 21:25:48 2018 DistroRelease: Ubuntu 18.10 ExecutablePath: /usr/bin/dbus-daemon ExecutableTimestamp: 1536206167 ProcCmdline: /usr/bin/dbus-daemon --session --address=systemd: --nofork --nopidfile --systemd-activation --syslog-only ProcCwd: /home/laichiaheng ProcEnviron: LANG=zh_TW.UTF-8 LANGUAGE=zh_TW:zh PATH=(custom, no user) SHELL=/bin/bash XDG_RUNTIME_DIR= ProcMaps: 564b7d73e000-564b7d747000 r--p 08:13 1442493 /usr/bin/dbus-daemon 564b7d747000-564b7d769000 r-xp 9000 08:13 1442493 /usr/bin/dbus-daemon 564b7d769000-564b7d777000 r--p 0002b000 08:13 1442493 /usr/bin/dbus-daemon 564b7d777000-564b7d779000 r--p 00038000 08:13 1442493 /usr/bin/dbus-daemon 564b7d779000-564b7d77a000 rw-p 0003a000 08:13 1442493 /usr/bin/dbus-daemon 564b7ef9b000-564b7f0fd000 rw-p 00:00 0 [heap] 7ff119c84000-7ff119c8a000 r--p 08:13 1442178 /lib/x86_64-linux-gnu/libnss_systemd.so.2 7ff119c8a000-7ff119cb5000 r-xp 6000 08:13 1442178 /lib/x86_64-linux-gnu/libnss_systemd.so.2 7ff119cb5000-7ff119cc4000 r--p 00031000 08:13 1442178 /lib/x86_64-linux-gnu/libnss_systemd.so.2 7ff119cc4000-7ff119cc7000 r--p 0003f000 08:13 1442178 /lib/x86_64-linux-gnu/libnss_systemd.so.2 7ff119cc7000-7ff119cc8000 rw-p 00042000 08:13 1442178 /lib/x86_64-linux-gnu/libnss_systemd.so.2 7ff119cc8000-7ff119cc9000 rw-p 00:00 0 7ff119cc9000-7ff119ccc000 r--p 08:13 1442226 /lib/x86_64-linux-gnu/libnss_files-2.28.so 7ff119ccc000-7ff119cd3000 r-xp 3000 08:13 1442226 /lib/x86_64-linux-gnu/libnss_files-2.28.so 7ff119cd3000-7ff119cd6000 r--p a000 08:13 1442226 /lib/x86_64-linux-gnu/libnss_files-2.28.so 7ff119cd6000-7ff119cd7000 r--p c000 08:13 1442226 /lib/x86_64-linux-gnu/libnss_files-2.28.so 7ff119cd7000-7ff119cd8000 rw-p d000 08:13 1442226 /lib/x86_64-linux-gnu/libnss_files-2.28.so 7ff119cd8000-7ff119ce3000 rw-p 00:00 0 7ff119ce3000-7ff119d01000 r-xp 08:13 1442177 /lib/x86_64-linux-gnu/libgpg-error.so.0.24.3 7ff119d01000-7ff119f01000 ---p 0001e000 08:13 1442177 /lib/x86_64-linux-gnu/libgpg-error.so.0.24.3 7ff119f01000-7ff119f02000 r--p 0001e000 08:13 1442177 /lib/x86_64-linux-gnu/libgpg-error.so.0.24.3 7ff119f02000-7ff119f03000 rw-p 0001f000 08:13 1442177 /lib/x86_64-linux-gnu/libgpg-error.so.0.24.3 7ff119f03000-7ff119f04000 r--p 08:13 1442159 /lib/x86_64-linux-gnu/libdl-2.28.so 7ff119f04000-7ff119f06000 r-xp 1000 08:13 1442159 /lib/x86_64-linux-gnu/libdl-2.28.so 7ff119f06000-7ff119f07000 r--p 3000 08:13 1442159 /lib/x86_64-linux-gnu/libdl-2.28.so 7ff119f07000-7ff119f08000 r--p 3000 08:13 1442159 /lib/x86_64-linux-gnu/libdl-2.28.so 7ff119f08000-7ff119f09000 rw-p 4000 08:13 1442159 /lib/x86_64-linux-gnu/libdl-2.28.so 7ff119f09000-7ff119f0b000 r--p 08:13 1442257 /lib/x86_64-linux-gnu/libpcre.so.3.13.3 7ff119f0b000-7ff119f5d000 r-xp 2000 08:13 1442257 /lib/x86_64-linux-gnu/libpcre.so.3.13.3 7ff119f5d000-7ff119f7b000 r--p 00054000 08:13 1442257 /lib/x86_64-linux-gnu/libpcre.so.3.13.3 7ff119f7b000-7ff119f7c000 r--p 00071000 08:13 1442257 /lib/x86_64-linux-gnu/libpcre.so.3.13.3 7ff119f7c000-7ff119f7d000 rw-p 00072000 08:13 1442257 /lib/x86_64-linux-gnu/libpcre.so.3.13.3 7ff119f7d000-7ff11a092000 r-xp 08:13 1442175 /lib/x86_64-linux-gnu/libgcrypt.so.20.2.3 7ff11a092000-7ff11a291000 ---p 00115000 08:13 1442175 /lib/x86_64-linux-gnu/libgcrypt.so.20.2.3 7ff11a291000-7ff11a293000 r--p 00114000 08:13 1442175 /lib/x86_64-linux-gnu/libgcrypt.so.20.2.3 7ff11a293000-7ff11a298000 rw-p 00116000 08:13 1442175 /lib/x86_64-linux-gnu/libgcrypt.so.20.2.3 7ff11a298000-7ff11a29b000 rw-p 00:00 0 7ff11a29b000-7ff11a2d1000 r-xp 08:13 7910 /usr/lib/x86_64-linux-gnu/liblz4.so.1.8.2 7ff11a2d1000-7ff11a4d ---p 00036000 08:13 7910 /usr/lib/x86_64-linux-gnu/liblz4.so.1.8.2 7ff11a4d-7ff11a4d1000 r--p 00035000 08:13 7910 /usr/lib/x86_64-linux-gnu/liblz4.so.1.8.2 7ff11a4d1000-7ff11a4d2000 rw-p 00036000 08:13 7910 /usr/lib/x86_64-linux-gnu/liblz4.so.1.8.2 7ff11a4d2000-7ff11a4f6000 r-xp 08:13 1442196 /lib/x86_64-linux-gnu/liblzma.so.5.2.2
[Bug 1784485] Re: [ZenBook S UX391UA, Realtek ALC294, Mic, Internal] No sound at all
It can't work if you install official kernel. You need to replace the audio part by this one https://github.com/endlessm/linux/tree/master/sound So you need to compile it ny yourself. The correction is not yet on official kernel, it can take time before someone accept the pull request to the official kernel. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1784485 Title: [ZenBook S UX391UA, Realtek ALC294, Mic, Internal] No sound at all To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/alsa-driver/+bug/1784485/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1807709] Re: dbus always crashes at session start (on wayland)
It not only happens on Wayland, it also happens on Xorg. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1807709 Title: dbus always crashes at session start (on wayland) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/dbus/+bug/1807709/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1807441] Re: dangling symlink /usr/bin/vmware-user
patch is trivial and build worked, I'll be posting it to Debian ... -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1807441 Title: dangling symlink /usr/bin/vmware-user To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/open-vm-tools/+bug/1807441/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1747759] Re: [MIR] cpdb-libs
Anything missing for a promotion into Main? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1747759 Title: [MIR] cpdb-libs To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/cpdb-libs/+bug/1747759/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1793386] Re: [Hyper-V] Enable NVME devices
This bug was fixed in the package linux-azure - 4.18.0-1006.6 --- linux-azure (4.18.0-1006.6) cosmic; urgency=medium * linux-azure: 4.18.0-1006.6 -proposed tracker (LP: #1805244) * Accelerated networking (SR-IOV VF) broken in 18.10 daily (LP: #1794477) - [Packaging] Move pci-hyperv and autofs4 back to linux-modules linux-azure (4.18.0-1005.5) cosmic; urgency=medium * linux-azure: 4.18.0-1005.5 -proposed tracker (LP: #1802752) * [Hyper-V] Fix IRQ spreading on NVMe devices with lower numbers of channels (LP: #1802358) - SAUCE: genirq/affinity: Spread IRQs to all available NUMA nodes - SAUCE: irq/matrix: Split out the CPU selection code into a helper - SAUCE: irq/matrix: Spread managed interrupts on allocation - SAUCE: genirq/matrix: Improve target CPU selection for managed interrupts. [ Ubuntu: 4.18.0-12.13 ] * linux: 4.18.0-12.13 -proposed tracker (LP: #1802743) * [FEAT] Guest-dedicated Crypto Adapters (LP: #1787405) - s390/zcrypt: Add ZAPQ inline function. - s390/zcrypt: Review inline assembler constraints. - s390/zcrypt: Integrate ap_asm.h into include/asm/ap.h. - s390/zcrypt: fix ap_instructions_available() returncodes - KVM: s390: vsie: simulate VCPU SIE entry/exit - KVM: s390: introduce and use KVM_REQ_VSIE_RESTART - KVM: s390: refactor crypto initialization - s390: vfio-ap: base implementation of VFIO AP device driver - s390: vfio-ap: register matrix device with VFIO mdev framework - s390: vfio-ap: sysfs interfaces to configure adapters - s390: vfio-ap: sysfs interfaces to configure domains - s390: vfio-ap: sysfs interfaces to configure control domains - s390: vfio-ap: sysfs interface to view matrix mdev matrix - KVM: s390: interface to clear CRYCB masks - s390: vfio-ap: implement mediated device open callback - s390: vfio-ap: implement VFIO_DEVICE_GET_INFO ioctl - s390: vfio-ap: zeroize the AP queues - s390: vfio-ap: implement VFIO_DEVICE_RESET ioctl - KVM: s390: Clear Crypto Control Block when using vSIE - KVM: s390: vsie: Do the CRYCB validation first - KVM: s390: vsie: Make use of CRYCB FORMAT2 clear - KVM: s390: vsie: Allow CRYCB FORMAT-2 - KVM: s390: vsie: allow CRYCB FORMAT-1 - KVM: s390: vsie: allow CRYCB FORMAT-0 - KVM: s390: vsie: allow guest FORMAT-0 CRYCB on host FORMAT-1 - KVM: s390: vsie: allow guest FORMAT-1 CRYCB on host FORMAT-2 - KVM: s390: vsie: allow guest FORMAT-0 CRYCB on host FORMAT-2 - KVM: s390: device attrs to enable/disable AP interpretation - KVM: s390: CPU model support for AP virtualization - s390: doc: detailed specifications for AP virtualization - KVM: s390: fix locking for crypto setting error path - KVM: s390: Tracing APCB changes - s390: vfio-ap: setup APCB mask using KVM dedicated function - [Config:] Enable CONFIG_S390_AP_IOMMU and set CONFIG_VFIO_AP to module. * Bypass of mount visibility through userns + mount propagation (LP: #1789161) - mount: Retest MNT_LOCKED in do_umount - mount: Don't allow copying MNT_UNBINDABLE|MNT_LOCKED mounts * CVE-2018-18955: nested user namespaces with more than five extents incorrectly grant privileges over inode (LP: #1801924) // CVE-2018-18955 - userns: also map extents in the reverse map to kernel IDs * kdump fail due to an IRQ storm (LP: #1797990) - SAUCE: x86/PCI: Export find_cap() to be used in early PCI code - SAUCE: x86/quirks: Add parameter to clear MSIs early on boot - SAUCE: x86/quirks: Scan all busses for early PCI quirks * crash in ENA driver on removing an interface (LP: #1802341) - SAUCE: net: ena: fix crash during ena_remove() * Ubuntu 18.04.1 - [s390x] Kernel panic while stressing network bonding (LP: #1797367) - s390/qeth: reduce hard-coded access to ccw channels - s390/qeth: sanitize strings in debug messages * Add checksum offload and TSO support for HiNIC adapters (LP: #1800664) - net-next/hinic: add checksum offload and TSO support * smartpqi updates for ubuntu 18.04.2 (LP: #1798208) - scsi: smartpqi: improve handling for sync requests - scsi: smartpqi: improve error checking for sync requests - scsi: smartpqi: add inspur advantech ids - scsi: smartpqi: fix critical ARM issue reading PQI index registers - scsi: smartpqi: bump driver version to 1.1.4-130 * [GLK/CLX] Enhanced IBRS (LP: #1786139) - x86/speculation: Remove SPECTRE_V2_IBRS in enum spectre_v2_mitigation - x86/speculation: Support Enhanced IBRS on future CPUs * Enable keyboard wakeup for S2Idle laptops (LP: #1798552) - Input: i8042 - enable keyboard wakeups by default when s2idle is used * Overlayfs in user namespace leaks directory content of inaccessible directories (LP: #1793458) // CVE-2018-6559 - SAUCE: overlayfs: ensure mounter privileges when reading directories * Update ENA driver to version 2.0.1K (LP: #1798182) - net: ena: remove
[Bug 1795493] Re: netfilter: nf_conntrack: resolve clash for matching conntracks
This bug was fixed in the package linux-azure - 4.18.0-1006.6 --- linux-azure (4.18.0-1006.6) cosmic; urgency=medium * linux-azure: 4.18.0-1006.6 -proposed tracker (LP: #1805244) * Accelerated networking (SR-IOV VF) broken in 18.10 daily (LP: #1794477) - [Packaging] Move pci-hyperv and autofs4 back to linux-modules linux-azure (4.18.0-1005.5) cosmic; urgency=medium * linux-azure: 4.18.0-1005.5 -proposed tracker (LP: #1802752) * [Hyper-V] Fix IRQ spreading on NVMe devices with lower numbers of channels (LP: #1802358) - SAUCE: genirq/affinity: Spread IRQs to all available NUMA nodes - SAUCE: irq/matrix: Split out the CPU selection code into a helper - SAUCE: irq/matrix: Spread managed interrupts on allocation - SAUCE: genirq/matrix: Improve target CPU selection for managed interrupts. [ Ubuntu: 4.18.0-12.13 ] * linux: 4.18.0-12.13 -proposed tracker (LP: #1802743) * [FEAT] Guest-dedicated Crypto Adapters (LP: #1787405) - s390/zcrypt: Add ZAPQ inline function. - s390/zcrypt: Review inline assembler constraints. - s390/zcrypt: Integrate ap_asm.h into include/asm/ap.h. - s390/zcrypt: fix ap_instructions_available() returncodes - KVM: s390: vsie: simulate VCPU SIE entry/exit - KVM: s390: introduce and use KVM_REQ_VSIE_RESTART - KVM: s390: refactor crypto initialization - s390: vfio-ap: base implementation of VFIO AP device driver - s390: vfio-ap: register matrix device with VFIO mdev framework - s390: vfio-ap: sysfs interfaces to configure adapters - s390: vfio-ap: sysfs interfaces to configure domains - s390: vfio-ap: sysfs interfaces to configure control domains - s390: vfio-ap: sysfs interface to view matrix mdev matrix - KVM: s390: interface to clear CRYCB masks - s390: vfio-ap: implement mediated device open callback - s390: vfio-ap: implement VFIO_DEVICE_GET_INFO ioctl - s390: vfio-ap: zeroize the AP queues - s390: vfio-ap: implement VFIO_DEVICE_RESET ioctl - KVM: s390: Clear Crypto Control Block when using vSIE - KVM: s390: vsie: Do the CRYCB validation first - KVM: s390: vsie: Make use of CRYCB FORMAT2 clear - KVM: s390: vsie: Allow CRYCB FORMAT-2 - KVM: s390: vsie: allow CRYCB FORMAT-1 - KVM: s390: vsie: allow CRYCB FORMAT-0 - KVM: s390: vsie: allow guest FORMAT-0 CRYCB on host FORMAT-1 - KVM: s390: vsie: allow guest FORMAT-1 CRYCB on host FORMAT-2 - KVM: s390: vsie: allow guest FORMAT-0 CRYCB on host FORMAT-2 - KVM: s390: device attrs to enable/disable AP interpretation - KVM: s390: CPU model support for AP virtualization - s390: doc: detailed specifications for AP virtualization - KVM: s390: fix locking for crypto setting error path - KVM: s390: Tracing APCB changes - s390: vfio-ap: setup APCB mask using KVM dedicated function - [Config:] Enable CONFIG_S390_AP_IOMMU and set CONFIG_VFIO_AP to module. * Bypass of mount visibility through userns + mount propagation (LP: #1789161) - mount: Retest MNT_LOCKED in do_umount - mount: Don't allow copying MNT_UNBINDABLE|MNT_LOCKED mounts * CVE-2018-18955: nested user namespaces with more than five extents incorrectly grant privileges over inode (LP: #1801924) // CVE-2018-18955 - userns: also map extents in the reverse map to kernel IDs * kdump fail due to an IRQ storm (LP: #1797990) - SAUCE: x86/PCI: Export find_cap() to be used in early PCI code - SAUCE: x86/quirks: Add parameter to clear MSIs early on boot - SAUCE: x86/quirks: Scan all busses for early PCI quirks * crash in ENA driver on removing an interface (LP: #1802341) - SAUCE: net: ena: fix crash during ena_remove() * Ubuntu 18.04.1 - [s390x] Kernel panic while stressing network bonding (LP: #1797367) - s390/qeth: reduce hard-coded access to ccw channels - s390/qeth: sanitize strings in debug messages * Add checksum offload and TSO support for HiNIC adapters (LP: #1800664) - net-next/hinic: add checksum offload and TSO support * smartpqi updates for ubuntu 18.04.2 (LP: #1798208) - scsi: smartpqi: improve handling for sync requests - scsi: smartpqi: improve error checking for sync requests - scsi: smartpqi: add inspur advantech ids - scsi: smartpqi: fix critical ARM issue reading PQI index registers - scsi: smartpqi: bump driver version to 1.1.4-130 * [GLK/CLX] Enhanced IBRS (LP: #1786139) - x86/speculation: Remove SPECTRE_V2_IBRS in enum spectre_v2_mitigation - x86/speculation: Support Enhanced IBRS on future CPUs * Enable keyboard wakeup for S2Idle laptops (LP: #1798552) - Input: i8042 - enable keyboard wakeups by default when s2idle is used * Overlayfs in user namespace leaks directory content of inaccessible directories (LP: #1793458) // CVE-2018-6559 - SAUCE: overlayfs: ensure mounter privileges when reading directories * Update ENA driver to version 2.0.1K (LP: #1798182) - net: ena: remove
[Bug 1786013] Re: Packaging resync
This bug was fixed in the package linux-azure - 4.18.0-1006.6 --- linux-azure (4.18.0-1006.6) cosmic; urgency=medium * linux-azure: 4.18.0-1006.6 -proposed tracker (LP: #1805244) * Accelerated networking (SR-IOV VF) broken in 18.10 daily (LP: #1794477) - [Packaging] Move pci-hyperv and autofs4 back to linux-modules linux-azure (4.18.0-1005.5) cosmic; urgency=medium * linux-azure: 4.18.0-1005.5 -proposed tracker (LP: #1802752) * [Hyper-V] Fix IRQ spreading on NVMe devices with lower numbers of channels (LP: #1802358) - SAUCE: genirq/affinity: Spread IRQs to all available NUMA nodes - SAUCE: irq/matrix: Split out the CPU selection code into a helper - SAUCE: irq/matrix: Spread managed interrupts on allocation - SAUCE: genirq/matrix: Improve target CPU selection for managed interrupts. [ Ubuntu: 4.18.0-12.13 ] * linux: 4.18.0-12.13 -proposed tracker (LP: #1802743) * [FEAT] Guest-dedicated Crypto Adapters (LP: #1787405) - s390/zcrypt: Add ZAPQ inline function. - s390/zcrypt: Review inline assembler constraints. - s390/zcrypt: Integrate ap_asm.h into include/asm/ap.h. - s390/zcrypt: fix ap_instructions_available() returncodes - KVM: s390: vsie: simulate VCPU SIE entry/exit - KVM: s390: introduce and use KVM_REQ_VSIE_RESTART - KVM: s390: refactor crypto initialization - s390: vfio-ap: base implementation of VFIO AP device driver - s390: vfio-ap: register matrix device with VFIO mdev framework - s390: vfio-ap: sysfs interfaces to configure adapters - s390: vfio-ap: sysfs interfaces to configure domains - s390: vfio-ap: sysfs interfaces to configure control domains - s390: vfio-ap: sysfs interface to view matrix mdev matrix - KVM: s390: interface to clear CRYCB masks - s390: vfio-ap: implement mediated device open callback - s390: vfio-ap: implement VFIO_DEVICE_GET_INFO ioctl - s390: vfio-ap: zeroize the AP queues - s390: vfio-ap: implement VFIO_DEVICE_RESET ioctl - KVM: s390: Clear Crypto Control Block when using vSIE - KVM: s390: vsie: Do the CRYCB validation first - KVM: s390: vsie: Make use of CRYCB FORMAT2 clear - KVM: s390: vsie: Allow CRYCB FORMAT-2 - KVM: s390: vsie: allow CRYCB FORMAT-1 - KVM: s390: vsie: allow CRYCB FORMAT-0 - KVM: s390: vsie: allow guest FORMAT-0 CRYCB on host FORMAT-1 - KVM: s390: vsie: allow guest FORMAT-1 CRYCB on host FORMAT-2 - KVM: s390: vsie: allow guest FORMAT-0 CRYCB on host FORMAT-2 - KVM: s390: device attrs to enable/disable AP interpretation - KVM: s390: CPU model support for AP virtualization - s390: doc: detailed specifications for AP virtualization - KVM: s390: fix locking for crypto setting error path - KVM: s390: Tracing APCB changes - s390: vfio-ap: setup APCB mask using KVM dedicated function - [Config:] Enable CONFIG_S390_AP_IOMMU and set CONFIG_VFIO_AP to module. * Bypass of mount visibility through userns + mount propagation (LP: #1789161) - mount: Retest MNT_LOCKED in do_umount - mount: Don't allow copying MNT_UNBINDABLE|MNT_LOCKED mounts * CVE-2018-18955: nested user namespaces with more than five extents incorrectly grant privileges over inode (LP: #1801924) // CVE-2018-18955 - userns: also map extents in the reverse map to kernel IDs * kdump fail due to an IRQ storm (LP: #1797990) - SAUCE: x86/PCI: Export find_cap() to be used in early PCI code - SAUCE: x86/quirks: Add parameter to clear MSIs early on boot - SAUCE: x86/quirks: Scan all busses for early PCI quirks * crash in ENA driver on removing an interface (LP: #1802341) - SAUCE: net: ena: fix crash during ena_remove() * Ubuntu 18.04.1 - [s390x] Kernel panic while stressing network bonding (LP: #1797367) - s390/qeth: reduce hard-coded access to ccw channels - s390/qeth: sanitize strings in debug messages * Add checksum offload and TSO support for HiNIC adapters (LP: #1800664) - net-next/hinic: add checksum offload and TSO support * smartpqi updates for ubuntu 18.04.2 (LP: #1798208) - scsi: smartpqi: improve handling for sync requests - scsi: smartpqi: improve error checking for sync requests - scsi: smartpqi: add inspur advantech ids - scsi: smartpqi: fix critical ARM issue reading PQI index registers - scsi: smartpqi: bump driver version to 1.1.4-130 * [GLK/CLX] Enhanced IBRS (LP: #1786139) - x86/speculation: Remove SPECTRE_V2_IBRS in enum spectre_v2_mitigation - x86/speculation: Support Enhanced IBRS on future CPUs * Enable keyboard wakeup for S2Idle laptops (LP: #1798552) - Input: i8042 - enable keyboard wakeups by default when s2idle is used * Overlayfs in user namespace leaks directory content of inaccessible directories (LP: #1793458) // CVE-2018-6559 - SAUCE: overlayfs: ensure mounter privileges when reading directories * Update ENA driver to version 2.0.1K (LP: #1798182) - net: ena: remove
[Bug 1793462] Re: linux-azure: fix getabis information
This bug was fixed in the package linux-azure - 4.18.0-1006.6 --- linux-azure (4.18.0-1006.6) cosmic; urgency=medium * linux-azure: 4.18.0-1006.6 -proposed tracker (LP: #1805244) * Accelerated networking (SR-IOV VF) broken in 18.10 daily (LP: #1794477) - [Packaging] Move pci-hyperv and autofs4 back to linux-modules linux-azure (4.18.0-1005.5) cosmic; urgency=medium * linux-azure: 4.18.0-1005.5 -proposed tracker (LP: #1802752) * [Hyper-V] Fix IRQ spreading on NVMe devices with lower numbers of channels (LP: #1802358) - SAUCE: genirq/affinity: Spread IRQs to all available NUMA nodes - SAUCE: irq/matrix: Split out the CPU selection code into a helper - SAUCE: irq/matrix: Spread managed interrupts on allocation - SAUCE: genirq/matrix: Improve target CPU selection for managed interrupts. [ Ubuntu: 4.18.0-12.13 ] * linux: 4.18.0-12.13 -proposed tracker (LP: #1802743) * [FEAT] Guest-dedicated Crypto Adapters (LP: #1787405) - s390/zcrypt: Add ZAPQ inline function. - s390/zcrypt: Review inline assembler constraints. - s390/zcrypt: Integrate ap_asm.h into include/asm/ap.h. - s390/zcrypt: fix ap_instructions_available() returncodes - KVM: s390: vsie: simulate VCPU SIE entry/exit - KVM: s390: introduce and use KVM_REQ_VSIE_RESTART - KVM: s390: refactor crypto initialization - s390: vfio-ap: base implementation of VFIO AP device driver - s390: vfio-ap: register matrix device with VFIO mdev framework - s390: vfio-ap: sysfs interfaces to configure adapters - s390: vfio-ap: sysfs interfaces to configure domains - s390: vfio-ap: sysfs interfaces to configure control domains - s390: vfio-ap: sysfs interface to view matrix mdev matrix - KVM: s390: interface to clear CRYCB masks - s390: vfio-ap: implement mediated device open callback - s390: vfio-ap: implement VFIO_DEVICE_GET_INFO ioctl - s390: vfio-ap: zeroize the AP queues - s390: vfio-ap: implement VFIO_DEVICE_RESET ioctl - KVM: s390: Clear Crypto Control Block when using vSIE - KVM: s390: vsie: Do the CRYCB validation first - KVM: s390: vsie: Make use of CRYCB FORMAT2 clear - KVM: s390: vsie: Allow CRYCB FORMAT-2 - KVM: s390: vsie: allow CRYCB FORMAT-1 - KVM: s390: vsie: allow CRYCB FORMAT-0 - KVM: s390: vsie: allow guest FORMAT-0 CRYCB on host FORMAT-1 - KVM: s390: vsie: allow guest FORMAT-1 CRYCB on host FORMAT-2 - KVM: s390: vsie: allow guest FORMAT-0 CRYCB on host FORMAT-2 - KVM: s390: device attrs to enable/disable AP interpretation - KVM: s390: CPU model support for AP virtualization - s390: doc: detailed specifications for AP virtualization - KVM: s390: fix locking for crypto setting error path - KVM: s390: Tracing APCB changes - s390: vfio-ap: setup APCB mask using KVM dedicated function - [Config:] Enable CONFIG_S390_AP_IOMMU and set CONFIG_VFIO_AP to module. * Bypass of mount visibility through userns + mount propagation (LP: #1789161) - mount: Retest MNT_LOCKED in do_umount - mount: Don't allow copying MNT_UNBINDABLE|MNT_LOCKED mounts * CVE-2018-18955: nested user namespaces with more than five extents incorrectly grant privileges over inode (LP: #1801924) // CVE-2018-18955 - userns: also map extents in the reverse map to kernel IDs * kdump fail due to an IRQ storm (LP: #1797990) - SAUCE: x86/PCI: Export find_cap() to be used in early PCI code - SAUCE: x86/quirks: Add parameter to clear MSIs early on boot - SAUCE: x86/quirks: Scan all busses for early PCI quirks * crash in ENA driver on removing an interface (LP: #1802341) - SAUCE: net: ena: fix crash during ena_remove() * Ubuntu 18.04.1 - [s390x] Kernel panic while stressing network bonding (LP: #1797367) - s390/qeth: reduce hard-coded access to ccw channels - s390/qeth: sanitize strings in debug messages * Add checksum offload and TSO support for HiNIC adapters (LP: #1800664) - net-next/hinic: add checksum offload and TSO support * smartpqi updates for ubuntu 18.04.2 (LP: #1798208) - scsi: smartpqi: improve handling for sync requests - scsi: smartpqi: improve error checking for sync requests - scsi: smartpqi: add inspur advantech ids - scsi: smartpqi: fix critical ARM issue reading PQI index registers - scsi: smartpqi: bump driver version to 1.1.4-130 * [GLK/CLX] Enhanced IBRS (LP: #1786139) - x86/speculation: Remove SPECTRE_V2_IBRS in enum spectre_v2_mitigation - x86/speculation: Support Enhanced IBRS on future CPUs * Enable keyboard wakeup for S2Idle laptops (LP: #1798552) - Input: i8042 - enable keyboard wakeups by default when s2idle is used * Overlayfs in user namespace leaks directory content of inaccessible directories (LP: #1793458) // CVE-2018-6559 - SAUCE: overlayfs: ensure mounter privileges when reading directories * Update ENA driver to version 2.0.1K (LP: #1798182) - net: ena: remove
[Bug 1794477] Re: Accelerated networking (SR-IOV VF) broken in 18.10 daily
This bug was fixed in the package linux-azure - 4.18.0-1006.6 --- linux-azure (4.18.0-1006.6) cosmic; urgency=medium * linux-azure: 4.18.0-1006.6 -proposed tracker (LP: #1805244) * Accelerated networking (SR-IOV VF) broken in 18.10 daily (LP: #1794477) - [Packaging] Move pci-hyperv and autofs4 back to linux-modules linux-azure (4.18.0-1005.5) cosmic; urgency=medium * linux-azure: 4.18.0-1005.5 -proposed tracker (LP: #1802752) * [Hyper-V] Fix IRQ spreading on NVMe devices with lower numbers of channels (LP: #1802358) - SAUCE: genirq/affinity: Spread IRQs to all available NUMA nodes - SAUCE: irq/matrix: Split out the CPU selection code into a helper - SAUCE: irq/matrix: Spread managed interrupts on allocation - SAUCE: genirq/matrix: Improve target CPU selection for managed interrupts. [ Ubuntu: 4.18.0-12.13 ] * linux: 4.18.0-12.13 -proposed tracker (LP: #1802743) * [FEAT] Guest-dedicated Crypto Adapters (LP: #1787405) - s390/zcrypt: Add ZAPQ inline function. - s390/zcrypt: Review inline assembler constraints. - s390/zcrypt: Integrate ap_asm.h into include/asm/ap.h. - s390/zcrypt: fix ap_instructions_available() returncodes - KVM: s390: vsie: simulate VCPU SIE entry/exit - KVM: s390: introduce and use KVM_REQ_VSIE_RESTART - KVM: s390: refactor crypto initialization - s390: vfio-ap: base implementation of VFIO AP device driver - s390: vfio-ap: register matrix device with VFIO mdev framework - s390: vfio-ap: sysfs interfaces to configure adapters - s390: vfio-ap: sysfs interfaces to configure domains - s390: vfio-ap: sysfs interfaces to configure control domains - s390: vfio-ap: sysfs interface to view matrix mdev matrix - KVM: s390: interface to clear CRYCB masks - s390: vfio-ap: implement mediated device open callback - s390: vfio-ap: implement VFIO_DEVICE_GET_INFO ioctl - s390: vfio-ap: zeroize the AP queues - s390: vfio-ap: implement VFIO_DEVICE_RESET ioctl - KVM: s390: Clear Crypto Control Block when using vSIE - KVM: s390: vsie: Do the CRYCB validation first - KVM: s390: vsie: Make use of CRYCB FORMAT2 clear - KVM: s390: vsie: Allow CRYCB FORMAT-2 - KVM: s390: vsie: allow CRYCB FORMAT-1 - KVM: s390: vsie: allow CRYCB FORMAT-0 - KVM: s390: vsie: allow guest FORMAT-0 CRYCB on host FORMAT-1 - KVM: s390: vsie: allow guest FORMAT-1 CRYCB on host FORMAT-2 - KVM: s390: vsie: allow guest FORMAT-0 CRYCB on host FORMAT-2 - KVM: s390: device attrs to enable/disable AP interpretation - KVM: s390: CPU model support for AP virtualization - s390: doc: detailed specifications for AP virtualization - KVM: s390: fix locking for crypto setting error path - KVM: s390: Tracing APCB changes - s390: vfio-ap: setup APCB mask using KVM dedicated function - [Config:] Enable CONFIG_S390_AP_IOMMU and set CONFIG_VFIO_AP to module. * Bypass of mount visibility through userns + mount propagation (LP: #1789161) - mount: Retest MNT_LOCKED in do_umount - mount: Don't allow copying MNT_UNBINDABLE|MNT_LOCKED mounts * CVE-2018-18955: nested user namespaces with more than five extents incorrectly grant privileges over inode (LP: #1801924) // CVE-2018-18955 - userns: also map extents in the reverse map to kernel IDs * kdump fail due to an IRQ storm (LP: #1797990) - SAUCE: x86/PCI: Export find_cap() to be used in early PCI code - SAUCE: x86/quirks: Add parameter to clear MSIs early on boot - SAUCE: x86/quirks: Scan all busses for early PCI quirks * crash in ENA driver on removing an interface (LP: #1802341) - SAUCE: net: ena: fix crash during ena_remove() * Ubuntu 18.04.1 - [s390x] Kernel panic while stressing network bonding (LP: #1797367) - s390/qeth: reduce hard-coded access to ccw channels - s390/qeth: sanitize strings in debug messages * Add checksum offload and TSO support for HiNIC adapters (LP: #1800664) - net-next/hinic: add checksum offload and TSO support * smartpqi updates for ubuntu 18.04.2 (LP: #1798208) - scsi: smartpqi: improve handling for sync requests - scsi: smartpqi: improve error checking for sync requests - scsi: smartpqi: add inspur advantech ids - scsi: smartpqi: fix critical ARM issue reading PQI index registers - scsi: smartpqi: bump driver version to 1.1.4-130 * [GLK/CLX] Enhanced IBRS (LP: #1786139) - x86/speculation: Remove SPECTRE_V2_IBRS in enum spectre_v2_mitigation - x86/speculation: Support Enhanced IBRS on future CPUs * Enable keyboard wakeup for S2Idle laptops (LP: #1798552) - Input: i8042 - enable keyboard wakeups by default when s2idle is used * Overlayfs in user namespace leaks directory content of inaccessible directories (LP: #1793458) // CVE-2018-6559 - SAUCE: overlayfs: ensure mounter privileges when reading directories * Update ENA driver to version 2.0.1K (LP: #1798182) - net: ena: remove
[Bug 1799451] Re: linux-azure: 4.18.0-1004.4 -proposed tracker
*** This bug is a duplicate of bug 1805244 *** https://bugs.launchpad.net/bugs/1805244 This bug was fixed in the package linux-azure - 4.18.0-1006.6 --- linux-azure (4.18.0-1006.6) cosmic; urgency=medium * linux-azure: 4.18.0-1006.6 -proposed tracker (LP: #1805244) * Accelerated networking (SR-IOV VF) broken in 18.10 daily (LP: #1794477) - [Packaging] Move pci-hyperv and autofs4 back to linux-modules linux-azure (4.18.0-1005.5) cosmic; urgency=medium * linux-azure: 4.18.0-1005.5 -proposed tracker (LP: #1802752) * [Hyper-V] Fix IRQ spreading on NVMe devices with lower numbers of channels (LP: #1802358) - SAUCE: genirq/affinity: Spread IRQs to all available NUMA nodes - SAUCE: irq/matrix: Split out the CPU selection code into a helper - SAUCE: irq/matrix: Spread managed interrupts on allocation - SAUCE: genirq/matrix: Improve target CPU selection for managed interrupts. [ Ubuntu: 4.18.0-12.13 ] * linux: 4.18.0-12.13 -proposed tracker (LP: #1802743) * [FEAT] Guest-dedicated Crypto Adapters (LP: #1787405) - s390/zcrypt: Add ZAPQ inline function. - s390/zcrypt: Review inline assembler constraints. - s390/zcrypt: Integrate ap_asm.h into include/asm/ap.h. - s390/zcrypt: fix ap_instructions_available() returncodes - KVM: s390: vsie: simulate VCPU SIE entry/exit - KVM: s390: introduce and use KVM_REQ_VSIE_RESTART - KVM: s390: refactor crypto initialization - s390: vfio-ap: base implementation of VFIO AP device driver - s390: vfio-ap: register matrix device with VFIO mdev framework - s390: vfio-ap: sysfs interfaces to configure adapters - s390: vfio-ap: sysfs interfaces to configure domains - s390: vfio-ap: sysfs interfaces to configure control domains - s390: vfio-ap: sysfs interface to view matrix mdev matrix - KVM: s390: interface to clear CRYCB masks - s390: vfio-ap: implement mediated device open callback - s390: vfio-ap: implement VFIO_DEVICE_GET_INFO ioctl - s390: vfio-ap: zeroize the AP queues - s390: vfio-ap: implement VFIO_DEVICE_RESET ioctl - KVM: s390: Clear Crypto Control Block when using vSIE - KVM: s390: vsie: Do the CRYCB validation first - KVM: s390: vsie: Make use of CRYCB FORMAT2 clear - KVM: s390: vsie: Allow CRYCB FORMAT-2 - KVM: s390: vsie: allow CRYCB FORMAT-1 - KVM: s390: vsie: allow CRYCB FORMAT-0 - KVM: s390: vsie: allow guest FORMAT-0 CRYCB on host FORMAT-1 - KVM: s390: vsie: allow guest FORMAT-1 CRYCB on host FORMAT-2 - KVM: s390: vsie: allow guest FORMAT-0 CRYCB on host FORMAT-2 - KVM: s390: device attrs to enable/disable AP interpretation - KVM: s390: CPU model support for AP virtualization - s390: doc: detailed specifications for AP virtualization - KVM: s390: fix locking for crypto setting error path - KVM: s390: Tracing APCB changes - s390: vfio-ap: setup APCB mask using KVM dedicated function - [Config:] Enable CONFIG_S390_AP_IOMMU and set CONFIG_VFIO_AP to module. * Bypass of mount visibility through userns + mount propagation (LP: #1789161) - mount: Retest MNT_LOCKED in do_umount - mount: Don't allow copying MNT_UNBINDABLE|MNT_LOCKED mounts * CVE-2018-18955: nested user namespaces with more than five extents incorrectly grant privileges over inode (LP: #1801924) // CVE-2018-18955 - userns: also map extents in the reverse map to kernel IDs * kdump fail due to an IRQ storm (LP: #1797990) - SAUCE: x86/PCI: Export find_cap() to be used in early PCI code - SAUCE: x86/quirks: Add parameter to clear MSIs early on boot - SAUCE: x86/quirks: Scan all busses for early PCI quirks * crash in ENA driver on removing an interface (LP: #1802341) - SAUCE: net: ena: fix crash during ena_remove() * Ubuntu 18.04.1 - [s390x] Kernel panic while stressing network bonding (LP: #1797367) - s390/qeth: reduce hard-coded access to ccw channels - s390/qeth: sanitize strings in debug messages * Add checksum offload and TSO support for HiNIC adapters (LP: #1800664) - net-next/hinic: add checksum offload and TSO support * smartpqi updates for ubuntu 18.04.2 (LP: #1798208) - scsi: smartpqi: improve handling for sync requests - scsi: smartpqi: improve error checking for sync requests - scsi: smartpqi: add inspur advantech ids - scsi: smartpqi: fix critical ARM issue reading PQI index registers - scsi: smartpqi: bump driver version to 1.1.4-130 * [GLK/CLX] Enhanced IBRS (LP: #1786139) - x86/speculation: Remove SPECTRE_V2_IBRS in enum spectre_v2_mitigation - x86/speculation: Support Enhanced IBRS on future CPUs * Enable keyboard wakeup for S2Idle laptops (LP: #1798552) - Input: i8042 - enable keyboard wakeups by default when s2idle is used * Overlayfs in user namespace leaks directory content of inaccessible directories (LP: #1793458) // CVE-2018-6559 - SAUCE: overlayfs: ensure mounter privileges when reading
[Bug 1805244] Re: linux-azure: 4.18.0-1006.6 -proposed tracker
This bug was fixed in the package linux-azure - 4.18.0-1006.6 --- linux-azure (4.18.0-1006.6) cosmic; urgency=medium * linux-azure: 4.18.0-1006.6 -proposed tracker (LP: #1805244) * Accelerated networking (SR-IOV VF) broken in 18.10 daily (LP: #1794477) - [Packaging] Move pci-hyperv and autofs4 back to linux-modules linux-azure (4.18.0-1005.5) cosmic; urgency=medium * linux-azure: 4.18.0-1005.5 -proposed tracker (LP: #1802752) * [Hyper-V] Fix IRQ spreading on NVMe devices with lower numbers of channels (LP: #1802358) - SAUCE: genirq/affinity: Spread IRQs to all available NUMA nodes - SAUCE: irq/matrix: Split out the CPU selection code into a helper - SAUCE: irq/matrix: Spread managed interrupts on allocation - SAUCE: genirq/matrix: Improve target CPU selection for managed interrupts. [ Ubuntu: 4.18.0-12.13 ] * linux: 4.18.0-12.13 -proposed tracker (LP: #1802743) * [FEAT] Guest-dedicated Crypto Adapters (LP: #1787405) - s390/zcrypt: Add ZAPQ inline function. - s390/zcrypt: Review inline assembler constraints. - s390/zcrypt: Integrate ap_asm.h into include/asm/ap.h. - s390/zcrypt: fix ap_instructions_available() returncodes - KVM: s390: vsie: simulate VCPU SIE entry/exit - KVM: s390: introduce and use KVM_REQ_VSIE_RESTART - KVM: s390: refactor crypto initialization - s390: vfio-ap: base implementation of VFIO AP device driver - s390: vfio-ap: register matrix device with VFIO mdev framework - s390: vfio-ap: sysfs interfaces to configure adapters - s390: vfio-ap: sysfs interfaces to configure domains - s390: vfio-ap: sysfs interfaces to configure control domains - s390: vfio-ap: sysfs interface to view matrix mdev matrix - KVM: s390: interface to clear CRYCB masks - s390: vfio-ap: implement mediated device open callback - s390: vfio-ap: implement VFIO_DEVICE_GET_INFO ioctl - s390: vfio-ap: zeroize the AP queues - s390: vfio-ap: implement VFIO_DEVICE_RESET ioctl - KVM: s390: Clear Crypto Control Block when using vSIE - KVM: s390: vsie: Do the CRYCB validation first - KVM: s390: vsie: Make use of CRYCB FORMAT2 clear - KVM: s390: vsie: Allow CRYCB FORMAT-2 - KVM: s390: vsie: allow CRYCB FORMAT-1 - KVM: s390: vsie: allow CRYCB FORMAT-0 - KVM: s390: vsie: allow guest FORMAT-0 CRYCB on host FORMAT-1 - KVM: s390: vsie: allow guest FORMAT-1 CRYCB on host FORMAT-2 - KVM: s390: vsie: allow guest FORMAT-0 CRYCB on host FORMAT-2 - KVM: s390: device attrs to enable/disable AP interpretation - KVM: s390: CPU model support for AP virtualization - s390: doc: detailed specifications for AP virtualization - KVM: s390: fix locking for crypto setting error path - KVM: s390: Tracing APCB changes - s390: vfio-ap: setup APCB mask using KVM dedicated function - [Config:] Enable CONFIG_S390_AP_IOMMU and set CONFIG_VFIO_AP to module. * Bypass of mount visibility through userns + mount propagation (LP: #1789161) - mount: Retest MNT_LOCKED in do_umount - mount: Don't allow copying MNT_UNBINDABLE|MNT_LOCKED mounts * CVE-2018-18955: nested user namespaces with more than five extents incorrectly grant privileges over inode (LP: #1801924) // CVE-2018-18955 - userns: also map extents in the reverse map to kernel IDs * kdump fail due to an IRQ storm (LP: #1797990) - SAUCE: x86/PCI: Export find_cap() to be used in early PCI code - SAUCE: x86/quirks: Add parameter to clear MSIs early on boot - SAUCE: x86/quirks: Scan all busses for early PCI quirks * crash in ENA driver on removing an interface (LP: #1802341) - SAUCE: net: ena: fix crash during ena_remove() * Ubuntu 18.04.1 - [s390x] Kernel panic while stressing network bonding (LP: #1797367) - s390/qeth: reduce hard-coded access to ccw channels - s390/qeth: sanitize strings in debug messages * Add checksum offload and TSO support for HiNIC adapters (LP: #1800664) - net-next/hinic: add checksum offload and TSO support * smartpqi updates for ubuntu 18.04.2 (LP: #1798208) - scsi: smartpqi: improve handling for sync requests - scsi: smartpqi: improve error checking for sync requests - scsi: smartpqi: add inspur advantech ids - scsi: smartpqi: fix critical ARM issue reading PQI index registers - scsi: smartpqi: bump driver version to 1.1.4-130 * [GLK/CLX] Enhanced IBRS (LP: #1786139) - x86/speculation: Remove SPECTRE_V2_IBRS in enum spectre_v2_mitigation - x86/speculation: Support Enhanced IBRS on future CPUs * Enable keyboard wakeup for S2Idle laptops (LP: #1798552) - Input: i8042 - enable keyboard wakeups by default when s2idle is used * Overlayfs in user namespace leaks directory content of inaccessible directories (LP: #1793458) // CVE-2018-6559 - SAUCE: overlayfs: ensure mounter privileges when reading directories * Update ENA driver to version 2.0.1K (LP: #1798182) - net: ena: remove
[Bug 1802752] Re: linux-azure: 4.18.0-1005.5 -proposed tracker
*** This bug is a duplicate of bug 1805244 *** https://bugs.launchpad.net/bugs/1805244 This bug was fixed in the package linux-azure - 4.18.0-1006.6 --- linux-azure (4.18.0-1006.6) cosmic; urgency=medium * linux-azure: 4.18.0-1006.6 -proposed tracker (LP: #1805244) * Accelerated networking (SR-IOV VF) broken in 18.10 daily (LP: #1794477) - [Packaging] Move pci-hyperv and autofs4 back to linux-modules linux-azure (4.18.0-1005.5) cosmic; urgency=medium * linux-azure: 4.18.0-1005.5 -proposed tracker (LP: #1802752) * [Hyper-V] Fix IRQ spreading on NVMe devices with lower numbers of channels (LP: #1802358) - SAUCE: genirq/affinity: Spread IRQs to all available NUMA nodes - SAUCE: irq/matrix: Split out the CPU selection code into a helper - SAUCE: irq/matrix: Spread managed interrupts on allocation - SAUCE: genirq/matrix: Improve target CPU selection for managed interrupts. [ Ubuntu: 4.18.0-12.13 ] * linux: 4.18.0-12.13 -proposed tracker (LP: #1802743) * [FEAT] Guest-dedicated Crypto Adapters (LP: #1787405) - s390/zcrypt: Add ZAPQ inline function. - s390/zcrypt: Review inline assembler constraints. - s390/zcrypt: Integrate ap_asm.h into include/asm/ap.h. - s390/zcrypt: fix ap_instructions_available() returncodes - KVM: s390: vsie: simulate VCPU SIE entry/exit - KVM: s390: introduce and use KVM_REQ_VSIE_RESTART - KVM: s390: refactor crypto initialization - s390: vfio-ap: base implementation of VFIO AP device driver - s390: vfio-ap: register matrix device with VFIO mdev framework - s390: vfio-ap: sysfs interfaces to configure adapters - s390: vfio-ap: sysfs interfaces to configure domains - s390: vfio-ap: sysfs interfaces to configure control domains - s390: vfio-ap: sysfs interface to view matrix mdev matrix - KVM: s390: interface to clear CRYCB masks - s390: vfio-ap: implement mediated device open callback - s390: vfio-ap: implement VFIO_DEVICE_GET_INFO ioctl - s390: vfio-ap: zeroize the AP queues - s390: vfio-ap: implement VFIO_DEVICE_RESET ioctl - KVM: s390: Clear Crypto Control Block when using vSIE - KVM: s390: vsie: Do the CRYCB validation first - KVM: s390: vsie: Make use of CRYCB FORMAT2 clear - KVM: s390: vsie: Allow CRYCB FORMAT-2 - KVM: s390: vsie: allow CRYCB FORMAT-1 - KVM: s390: vsie: allow CRYCB FORMAT-0 - KVM: s390: vsie: allow guest FORMAT-0 CRYCB on host FORMAT-1 - KVM: s390: vsie: allow guest FORMAT-1 CRYCB on host FORMAT-2 - KVM: s390: vsie: allow guest FORMAT-0 CRYCB on host FORMAT-2 - KVM: s390: device attrs to enable/disable AP interpretation - KVM: s390: CPU model support for AP virtualization - s390: doc: detailed specifications for AP virtualization - KVM: s390: fix locking for crypto setting error path - KVM: s390: Tracing APCB changes - s390: vfio-ap: setup APCB mask using KVM dedicated function - [Config:] Enable CONFIG_S390_AP_IOMMU and set CONFIG_VFIO_AP to module. * Bypass of mount visibility through userns + mount propagation (LP: #1789161) - mount: Retest MNT_LOCKED in do_umount - mount: Don't allow copying MNT_UNBINDABLE|MNT_LOCKED mounts * CVE-2018-18955: nested user namespaces with more than five extents incorrectly grant privileges over inode (LP: #1801924) // CVE-2018-18955 - userns: also map extents in the reverse map to kernel IDs * kdump fail due to an IRQ storm (LP: #1797990) - SAUCE: x86/PCI: Export find_cap() to be used in early PCI code - SAUCE: x86/quirks: Add parameter to clear MSIs early on boot - SAUCE: x86/quirks: Scan all busses for early PCI quirks * crash in ENA driver on removing an interface (LP: #1802341) - SAUCE: net: ena: fix crash during ena_remove() * Ubuntu 18.04.1 - [s390x] Kernel panic while stressing network bonding (LP: #1797367) - s390/qeth: reduce hard-coded access to ccw channels - s390/qeth: sanitize strings in debug messages * Add checksum offload and TSO support for HiNIC adapters (LP: #1800664) - net-next/hinic: add checksum offload and TSO support * smartpqi updates for ubuntu 18.04.2 (LP: #1798208) - scsi: smartpqi: improve handling for sync requests - scsi: smartpqi: improve error checking for sync requests - scsi: smartpqi: add inspur advantech ids - scsi: smartpqi: fix critical ARM issue reading PQI index registers - scsi: smartpqi: bump driver version to 1.1.4-130 * [GLK/CLX] Enhanced IBRS (LP: #1786139) - x86/speculation: Remove SPECTRE_V2_IBRS in enum spectre_v2_mitigation - x86/speculation: Support Enhanced IBRS on future CPUs * Enable keyboard wakeup for S2Idle laptops (LP: #1798552) - Input: i8042 - enable keyboard wakeups by default when s2idle is used * Overlayfs in user namespace leaks directory content of inaccessible directories (LP: #1793458) // CVE-2018-6559 - SAUCE: overlayfs: ensure mounter privileges when reading
[Bug 1806352] Re: HP LaserJet 1005 only prints first page
> When I click 'Next', just get 'Failed to install Plug-in'. This could be https://bugs.launchpad.net/hplip/+bug/1807051 > HP Device plug-in version mismatch or some files are corrupted. Download *.run and *.asc from https://developers.hp.com/hp-linux-imaging-and-printing/plugins and install the plugin with 'hp-plugin -p .' -- Brian. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1806352 Title: HP LaserJet 1005 only prints first page To manage notifications about this bug go to: https://bugs.launchpad.net/hplip/+bug/1806352/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1804445] Re: Update rax-nova-agent to 2.1.18
** Tags removed: verification-needed verification-needed-bionic verification-needed-cosmic verification-needed-xenial ** Tags added: verification-done verification-done-bionic verification-done-cosmic verification-done-xenial -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1804445 Title: Update rax-nova-agent to 2.1.18 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/rax-nova-agent/+bug/1804445/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1806952] Re: linux: 4.19.0-8.9 -proposed tracker
** Changed in: kernel-sru-workflow/automated-testing Status: Confirmed => Incomplete ** Description changed: This bug is for tracking the upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow backports: derivatives: -- swm properties -- phase: Promoted to proposed phase-changed: Friday, 07. December 2018 10:02 UTC proposed-announcement-sent: true proposed-testing-requested: true reason: - automated-testing: Testing in progress + automated-testing: Testing FAILED regression-testing: Testing in progress -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1806952 Title: linux: 4.19.0-8.9 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1806952/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1807441] Re: dangling symlink /usr/bin/vmware-user
Thanks Scott, the target of the link is actually content of open-vm-tools-desktop. Once that is installed the symlink is ok. We don't want a dependency from open.-vm-tools to open-vm-tools-desktop. Instead the right solution is to move the symlink to open-vm-desktop as well. This is old - way back in 2014 2:9.4.6-1770165-2 moved the man page for example. It always works vice versa as the -desktop package depends on the base. ** Changed in: open-vm-tools (Ubuntu) Status: New => Triaged -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1807441 Title: dangling symlink /usr/bin/vmware-user To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/open-vm-tools/+bug/1807441/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1807504] Re: Evince segfaults when opening PDF
Confirmed with the example from https://bugs.launchpad.net/ubuntu/+source/poppler/+bug/1803059/comments/10 , it's a regression from the poppler security update ** Changed in: poppler (Ubuntu) Importance: Undecided => High -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1807504 Title: Evince segfaults when opening PDF To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/poppler/+bug/1807504/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1806410] Re: linux-hwe: 4.18.0-13.14~18.04.1 -proposed tracker
** Changed in: kernel-sru-workflow/automated-testing Status: Confirmed => Incomplete ** Description changed: This bug is for tracking the upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1806409 phase: Promoted to proposed phase-changed: Saturday, 08. December 2018 09:39 UTC proposed-announcement-sent: true proposed-testing-requested: true reason: - automated-testing: Testing in progress + automated-testing: Testing FAILED certification-testing: Testing in progress regression-testing: Testing in progress security-signoff: Waiting for signoff verification-testing: Testing in progress -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1806410 Title: linux-hwe: 4.18.0-13.14~18.04.1 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1806410/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1805655] Re: BUG: unable to handle kernel NULL pointer dereference at 0000000000000008
** Changed in: linux (Ubuntu) Importance: Undecided => Medium ** Changed in: linux (Ubuntu) Status: Confirmed => Incomplete -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1805655 Title: BUG: unable to handle kernel NULL pointer dereference at 0008 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1805655/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1807437] Re: package openssh-server 1:7.6p1-4ubuntu0.1 failed to install/upgrade: installed openssh-server package post-installation script subprocess returned error exit status 1
Hi Angel, Thank you for your report. >From your log: Error: command ['/usr/sbin/sshd', '-T'] failed with exit code 255: /etc/ssh/sshd_config line 13: Deprecated option UsePrivilegeSeparation /etc/ssh/sshd_config line 16: Deprecated option KeyRegenerationInterval /etc/ssh/sshd_config line 17: Deprecated option ServerKeyBits /etc/ssh/sshd_config line 30: Bad SSH2 mac spec 'hmac-sha2-512-...@openssh.com,hmac-sha2-256-...@openssh.com,hmac-ripemd160-...@openssh.com,umac-128-...@openssh.com,hmac-sha2-512,hmac-sha2-256,hmac-ripemd160,umac-...@openssh.com'. That is a local misconfiguration that breaks the service. You'd need to resolve that to be able to start the service, but also to upgrade/install the package. This looks like a local configuration problem, rather than a bug in Ubuntu. You can find pointers to get help for this sort of problem here: http://www.ubuntu.com/support/community Since we use this bug tracker to track bugs in Ubuntu, rather than configuration problems, I'm marking this bug as Invalid. This helps us to focus on fixing bugs in Ubuntu. If you believe that this is really a bug, then you may find it helpful to read "How to report bugs effectively" http://www.chiark.greenend.org.uk/~sgtatham/bugs.html. We'd be grateful if you would then provide a more complete description of the problem, explain why you believe this is a bug in Ubuntu rather than a problem specific to your system, and then change the bug status back to New. ** Changed in: openssh (Ubuntu) Status: New => Incomplete -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1807437 Title: package openssh-server 1:7.6p1-4ubuntu0.1 failed to install/upgrade: installed openssh-server package post-installation script subprocess returned error exit status 1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/1807437/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1803059] Re: Nullpointer dereference
Hi Miguel, Sorry for the inconvenient, I`m aware of the situation and I`m working to fix this issue. Thanks tor report this. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1803059 Title: Nullpointer dereference To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/poppler/+bug/1803059/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1807702] Re: linux-oracle: 4.15.0-1007.7 -proposed tracker
** Description changed: This bug is for tracking the 4.15.0-1007.7 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1806659 + phase: Packaging + phase-changed: Monday, 10. December 2018 14:30 UTC + reason: + prepare-package: Package not yet uploaded + prepare-package-meta: Package not yet uploaded + prepare-package-signed: Package not yet uploaded -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1807702 Title: linux-oracle: 4.15.0-1007.7 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1807702/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1807439] Re: openvpn crashes when run with fips openssl
Checked on IRC, there are debdiff, testing data, etc... Please set back to new once that was made available. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1807439 Title: openvpn crashes when run with fips openssl To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/openvpn/+bug/1807439/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1807439] Re: openvpn crashes when run with fips openssl
Hi, I'm really unsure what the expectation here is now. This does not contain steps to reproduce the issue nor any suggested changes to make it work better. Both would be needed. Also is this actually the code in the main archive or any FIPS special PPA? ** Changed in: openvpn (Ubuntu Disco) Status: New => Incomplete -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1807439 Title: openvpn crashes when run with fips openssl To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/openvpn/+bug/1807439/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1640978] Re: [SRU] Backport letsencrypt from bionic
Breakdown of python-certbot changes; this is a NEW package going into trusty backported from bionic following the letsencrypt->certbot name change. A revised debdiff is attached to this bug. diff -Nru python-certbot-0.23.0/debian/compat python-certbot-0.23.0/debian/compat --- python-certbot-0.23.0/debian/compat 2018-03-23 23:00:13.0 + +++ python-certbot-0.23.0/debian/compat 2018-11-25 16:20:44.0 + @@ -1 +1 @@ -11 +9 Explanation: Debhelper compat change diff -Nru python-certbot-0.23.0/debian/control python-certbot-0.23.0/debian/control --- python-certbot-0.23.0/debian/control2018-04-07 03:21:05.0 + +++ python-certbot-0.23.0/debian/control2018-11-25 16:20:44.0 + @@ -1,47 +1,41 @@ Source: python-certbot Section: python Priority: optional -Maintainer: Debian Let's Encrypt +Maintainer: Ubuntu Developers +XSBC-Original-Maintainer: Debian Let's Encrypt Uploaders: Harlan Lieberman-Berg , Francois Marier -Build-Depends: debhelper (>= 11~), +Build-Depends: debhelper (>= 9~), dh-python, - python3, - python3-acme (>= 0.22.0~), - python3-configargparse (>= 0.10.0), - python3-configobj, - python3-cryptography (>= 1.2), - python3-distutils, - python3-josepy, - python3-mock, - python3-parsedatetime (>= 1.3), - python3-repoze.sphinx.autointerface, - python3-requests (>= 2.4.3), - python3-rfc3339, - python3-setuptools (>= 1.0), - python3-sphinx, - python3-sphinx-rtd-theme, - python3-tz, - python3-zope.component, - python3-zope.interface + python, + python-acme (>= 0.22.0~), + python-configargparse (>= 0.10.0), + python-configobj, + python-cryptography (>= 1.2), + python-josepy, + python-mock, + python-parsedatetime (>= 1.3), + python-requests (>= 2.4.3), + python-rfc3339, + python-setuptools (>= 1.0), + python-sphinx, + python-sphinx-rtd-theme, + python-tz, + python-zope.component, + python-zope.interface Standards-Version: 4.1.4 Homepage: https://certbot.eff.org/ Vcs-Git: https://salsa.debian.org/letsencrypt-team/certbot/certbot.git Vcs-Browser: https://salsa.debian.org/letsencrypt-team/certbot/certbot Testsuite: autopkgtest-pkg-python Explanation: Some of the dependencies for certbot do not have Python3 versions in Xenial; this was resolved by having certbot use Python2 and becoming a python2 package; it could also have been resolved by SRUing python-parsedtimedate as it supports Python 3 but doesn't have the necessary deb. An SRU for the bionic package may be needed to remove this with the Python 3 version. -Package: python3-certbot +Package: python-certbot Architecture: all -Depends: python3-acme (>= 0.22.0~), - python3-requests (>= 2.4.3), +Depends: python-acme (>= 0.22.0~), + python-requests (>= 2.4.3), ${misc:Depends}, - ${python3:Depends} -Recommends: certbot + ${python:Depends} Suggests: python-certbot-doc -Breaks: python-certbot-nginx (<< 0.20.0), -python-certbot-apache (<< 0.20.0), -python-letsencrypt (<= 0.6.0) -Replaces: python-letsencrypt Description: main library for certbot The objective of Certbot, Let's Encrypt, and the ACME (Automated Certificate Management Environment) protocol is to make it possible Explanation: 3->2 changes. python-letsencrypt in xenial will be a shim that provide import letsencrypt and should not be removed when this package is installed to provide ABI compat within a release @@ -62,14 +56,14 @@ Package: certbot Section: web Architecture: all -Depends: python3-certbot (= ${source:Version}), +Depends: python-certbot (= ${source:Version}), ${misc:Depends}, - ${python3:Depends} + ${python:Depends} Breaks: letsencrypt (<= 0.6.0) Replaces: letsencrypt Provides: letsencrypt -Suggests: python3-certbot-apache, - python3-certbot-nginx, +Suggests: python-certbot-apache, + python-certbot-nginx, python-certbot-doc Description: automatically configure HTTPS using Let's Encrypt The objective of Certbot, Let's Encrypt, and the ACME (Automated Explanation: Python 3->2 changes for the extension modules. We may backport nginx support at a later date so it was left in as a suggests even though it's dangling at the moment. @@ -110,12 +104,3 @@ - Help you revoke the certificate if that ever becomes necessary. . This package contains the documentation. - -Package: letsencrypt -Section: oldlibs -Architecture: all -Depends: certbot, - ${misc:Depends} -Description: transitional dummy
[Bug 1804445] Re: Update rax-nova-agent to 2.1.18
Images for Xenial, Bionic and Cosmic have been generated and tested. We have confirmation that all images are working as expected with this version of rax-nova-agent. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1804445 Title: Update rax-nova-agent to 2.1.18 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/rax-nova-agent/+bug/1804445/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1805655] Re: BUG: unable to handle kernel NULL pointer dereference at 0000000000000008
Did this issue start happening after an update/upgrade? Was there a prior kernel version where you were not having this particular problem? Would it be possible for you to test the latest upstream kernel? Refer to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest v4.20 kernel[0]. If this bug is fixed in the mainline kernel, please add the following tag 'kernel-fixed-upstream'. If the mainline kernel does not fix this bug, please add the tag: 'kernel-bug-exists-upstream'. Once testing of the upstream kernel is complete, please mark this bug as "Confirmed". Thanks in advance. [0] http://kernel.ubuntu.com/~kernel-ppa/mainline/v4.20-rc6 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1805655 Title: BUG: unable to handle kernel NULL pointer dereference at 0008 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1805655/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1807709] Re: dbus always crashes at session start (on wayland)
Status changed to 'Confirmed' because the bug affects multiple users. ** Changed in: dbus (Ubuntu) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1807709 Title: dbus always crashes at session start (on wayland) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/dbus/+bug/1807709/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1640978] Re: [SRU] Backport letsencrypt from bionic
Breakdown of changes for python ACME; I caught a mistake in the previous debdiff so reuploading a revised one with this comment: diff -Nru python-acme-0.22.2/debian/compat python-acme-0.22.2/debian/compat --- python-acme-0.22.2/debian/compat2018-03-17 15:24:35.0 + +++ python-acme-0.22.2/debian/compat2018-11-25 15:09:41.0 + @@ -1 +1 @@ -11 +9 Explaination: debhelper version change diff -Nru python-acme-0.22.2/debian/control python-acme-0.22.2/debian/control --- python-acme-0.22.2/debian/control 2018-03-17 15:24:35.0 + +++ python-acme-0.22.2/debian/control 2018-11-25 15:09:41.0 + @@ -1,13 +1,14 @@ Source: python-acme Section: python Priority: optional -Maintainer: Debian Let's Encrypt +Maintainer: Ubuntu Developers +XSBC-Original-Maintainer: Debian Let's Encrypt Uploaders: Harlan Lieberman-Berg , Francois Marier -Build-Depends: debhelper (>= 11~), +Build-Depends: debhelper (>= 9~), dh-python, python-all (>= 2.7), - python-cryptography (>= 1.3.4), + python-cryptography, python-docutils, python-josepy, python-mock, Explanation: This was an incorrect dependency in bionic; acme works proeprly against cryotpgraphy 1.2 which was shipped in Xenial. @@ -19,7 +20,7 @@ python-six (>= 1.9), python-tz, python3 (>= 3.4), - python3-cryptography (>= 1.3.4), + python3-cryptography, python3-docutils, python3-josepy, python3-mock, Explanation: See above. diff -Nru python-acme-0.22.2/debian/rules python-acme-0.22.2/debian/rules --- python-acme-0.22.2/debian/rules 2018-03-17 15:24:35.0 + +++ python-acme-0.22.2/debian/rules 2018-11-25 15:09:30.0 + @@ -7,11 +7,10 @@ override_dh_auto_build: dh_auto_build - PYTHONPATH=. \ - http_proxy='127.0.0.1:9' \ - https_proxy='127.0.0.1:9' \ - sphinx-build -N -bhtml docs/ build/html + PYTHONPATH=. http_proxy='127.0.0.1:9' sphinx-build -N -bhtml docs/ build/html override_dh_auto_install: dh_auto_install find $(CURDIR)/debian/ -type d -name testdata -print0 | xargs -0 rm -rf '{}' \; Explaination: I reused the rules from the existing python-acme version in Trusty, dropping https_proxy. This may not be necessary TBH. ** Patch added: "python-acme-2.debdiff" https://bugs.launchpad.net/ubuntu/xenial/+source/python-acme/+bug/1640978/+attachment/5220891/+files/python-acme-2.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1640978 Title: [SRU] Backport letsencrypt from bionic To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/python-acme/+bug/1640978/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1807706] Re: Disco update: 4.19.8 upstream stable release
** Description changed: + SRU Justification - SRU Justification + Impact: + The upstream process for stable tree updates is quite similar + in scope to the Ubuntu SRU process, e.g., each patch has to + demonstrably fix a bug, and each patch is vetted by upstream + by originating either directly from a mainline/stable Linux tree or + a minimally backported form of that patch. The following upstream + stable patches should be included in the Ubuntu kernel: - Impact: -The upstream process for stable tree updates is quite similar -in scope to the Ubuntu SRU process, e.g., each patch has to -demonstrably fix a bug, and each patch is vetted by upstream -by originating either directly from a mainline/stable Linux tree or -a minimally backported form of that patch. The following upstream -stable patches should be included in the Ubuntu kernel: + 4.19.8 upstream stable release + from git://git.kernel.org/ -4.19.8 upstream stable release -from git://git.kernel.org/ - - Linux 4.19.8 blk-mq: punt failed direct issue to dispatch list tipc: use destination length for copy string arc: [devboards] Add support of NFSv3 ACL ARC: change defconfig defaults to ARCv2 btrfs: tree-checker: Don't check max block group size as current max chunk size limit is unreliable Input: elan_i2c - add support for ELAN0621 touchpad Input: elan_i2c - add ACPI ID for Lenovo IdeaPad 330-15ARR Input: elan_i2c - add ELAN0620 to the ACPI table Input: cros_ec_keyb - fix button/switch capability reports Input: matrix_keypad - check for errors from of_get_named_gpio() Input: synaptics - add PNP ID for ThinkPad P50 to SMBus Input: xpad - quirk all PDP Xbox One gamepads scsi: lpfc: fix block guard enablement on SLI3 adapters i40e: Fix deletion of MAC filters selinux: add support for RTM_NEWCHAIN, RTM_DELCHAIN, and RTM_GETCHAIN svm: Add mutex_lock to protect apic_access_page_done on AMD systems kgdboc: Fix warning with module build kgdboc: Fix restrict error userfaultfd: shmem: UFFDIO_COPY: set the page dirty if VM_WRITE is not set userfaultfd: shmem: add i_size checks userfaultfd: shmem: allocate anonymous memory for MAP_PRIVATE shmem userfaultfd: use ENOENT instead of EFAULT if the atomic copy user fails drm/meson: Fix OOB memory accesses in meson_viu_set_osd_lut() drm/meson: Enable fast_io in meson_dw_hdmi_regmap_config drm/meson: Fixes for drm_crtc_vblank_on/off support drm: set is_master to 0 upon drm_new_set_master() failure drm/amd/dm: Don't forget to attach MST encoders drm/ast: Fix incorrect free on ioregs tracing/fgraph: Fix set_graph_function from showing interrupts IB/mlx5: Avoid load failure due to unknown link width mips: fix mips_get_syscall_arg o32 check MIPS: ralink: Fix mt7620 nd_sd pinmux tracepoint: Use __idx instead of idx in DO_TRACE macro to make it unique sched, trace: Fix prev_state output in sched_switch tracepoint arm64: ftrace: Fix to enable syscall events on arm64 mtd: nand: Fix memory allocation in nanddev_bbt_init() uprobes: Fix handle_swbp() vs. unregister() + register() race once more iser: set sector for ambiguous mr status errors unifdef: use memcpy instead of strncpy test_hexdump: use memcpy instead of strncpy + + The following patches from this stable update had already been applied: + blk-mq: fix corruption with direct issue ** Changed in: linux (Ubuntu Disco) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1807706 Title: Disco update: 4.19.8 upstream stable release To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1807706/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1805693] Re: User reports a hang on 18.04 LTS(4.15.18) under a heavy I/O load
** Changed in: linux (Ubuntu) Importance: Undecided => High ** Changed in: linux (Ubuntu) Status: Incomplete => Triaged ** Also affects: linux (Ubuntu Bionic) Importance: Undecided Status: New ** Changed in: linux (Ubuntu Bionic) Status: New => Triaged ** Changed in: linux (Ubuntu Bionic) Importance: Undecided => High ** Tags added: kernel-da-key -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1805693 Title: User reports a hang on 18.04 LTS(4.15.18) under a heavy I/O load To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1805693/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1807705] Re: Disco update: 4.19.7 upstream stable release
** Description changed: + SRU Justification - SRU Justification + Impact: + The upstream process for stable tree updates is quite similar + in scope to the Ubuntu SRU process, e.g., each patch has to + demonstrably fix a bug, and each patch is vetted by upstream + by originating either directly from a mainline/stable Linux tree or + a minimally backported form of that patch. The following upstream + stable patches should be included in the Ubuntu kernel: - Impact: -The upstream process for stable tree updates is quite similar -in scope to the Ubuntu SRU process, e.g., each patch has to -demonstrably fix a bug, and each patch is vetted by upstream -by originating either directly from a mainline/stable Linux tree or -a minimally backported form of that patch. The following upstream -stable patches should be included in the Ubuntu kernel: + 4.19.7 upstream stable release + from git://git.kernel.org/ -4.19.7 upstream stable release -from git://git.kernel.org/ - - Linux 4.19.7 misc: mic/scif: fix copy-paste error in scif_create_remote_lookup Drivers: hv: vmbus: check the creation_status in vmbus_establish_gpadl() mm: use swp_offset as key in shmem_replace_page() mm: cleancache: fix corruption on missed inode invalidation lib/test_kmod.c: fix rmmod double free iio:st_magn: Fix enable device after trigger iio/hid-sensors: Fix IIO_CHAN_INFO_RAW returning wrong values for signed numbers Revert "usb: dwc3: gadget: skip Set/Clear Halt when invalid" usb: core: quirks: add RESET_RESUME quirk for Cherry G230 Stream series USB: usb-storage: Add new IDs to ums-realtek staging: rtl8723bs: Add missing return for cfg80211_rtw_get_station staging: rtl8723bs: Fix incorrect sense of ether_addr_equal staging: mt7621-pinctrl: fix uninitialized variable ngroups staging: mt7621-dma: fix potentially dereferencing uninitialized 'tx_desc' staging: vchiq_arm: fix compat VCHIQ_IOC_AWAIT_COMPLETION staging: most: use format specifier "%s" in snprintf dmaengine: at_hdmac: fix module unloading dmaengine: at_hdmac: fix memory leak in at_dma_xlate() ARM: dts: rockchip: Remove @0 from the veyron memory node ASoC: pcm186x: Fix device reset-registers trigger value ASoC: intel: cht_bsw_max98090_ti: Add quirk for boards using pmc_plt_clk_0 ext2: fix potential use after free ext2: initialize opts.s_mount_opt as zero before using it binder: fix race that allows malicious free of live buffer function_graph: Reverse the order of pushing the ret_stack and the callback function_graph: Move return callback before update of curr_ret_stack function_graph: Have profiler use curr_ret_stack and not depth function_graph: Use new curr_ret_depth to manage depth instead of curr_ret_stack function_graph: Make ftrace_push_return_trace() static MIPS: function_graph: Simplify with function_graph_enter() arm64: function_graph: Simplify with function_graph_enter() s390/function_graph: Simplify with function_graph_enter() riscv/function_graph: Simplify with function_graph_enter() parisc: function_graph: Simplify with function_graph_enter() sparc/function_graph: Simplify with function_graph_enter() sh/function_graph: Simplify with function_graph_enter() powerpc/function_graph: Simplify with function_graph_enter() nds32: function_graph: Simplify with function_graph_enter() x86/function_graph: Simplify with function_graph_enter() microblaze: function_graph: Simplify with function_graph_enter() ARM: function_graph: Simplify with function_graph_enter() function_graph: Create function_graph_enter() to consolidate architecture code ALSA: hda/realtek - Add auto-mute quirk for HP Spectre x360 laptop - ALSA: hda/realtek - fix the pop noise on headphone for lenovo laptops ALSA: hda/realtek - fix headset mic detection for MSI MS-B171 ALSA: hda/realtek - Support ALC300 ALSA: hda: Add ASRock N68C-S UCC the power_save blacklist ALSA: sparc: Fix invalid snd_free_pages() at error path ALSA: control: Fix race between adding and removing a user element ALSA: ac97: Fix incorrect bit shift at AC97-SPSA control write ALSA: wss: Fix invalid snd_free_pages() at error path fs: fix lost error code in dio_complete perf/x86/intel: Disallow precise_ip on BTS events perf/x86/intel: Add generic branch tracing check to intel_pmu_has_bts() perf/x86/intel: Move branch tracing setup to the Intel-specific source file x86/fpu: Disable bottom halves while loading FPU registers x86/MCE/AMD: Fix the thresholding machinery initialization order arm64: dts: rockchip: Fix PCIe reset polarity for rk3399-puma-haikou. PCI: Fix incorrect value returned from pcie_get_speed_cap() PCI: dwc: Fix MSI-X EP framework address calculation bug PCI: layerscape: Fix wrong invocation of outbound window disable accessor btrfs: relocation: set trans to
[Bug 1804330] Re: seccomp preventing package installs
Thanks for the re-ping with the insight of the root cause in your case! Might help others hitting the same. ** Changed in: libseccomp (Ubuntu) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1804330 Title: seccomp preventing package installs To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libseccomp/+bug/1804330/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1807709] [NEW] dbus always crashes at session start (on wayland)
Public bug reported: When you login in ubuntu 18.10 using gnome shell and wayland, dbus always crashes and you are welcomed with a dialog to report the crash. Looking into the file `/var/crash/_usr_bin_dbus-daemon.1000.crash` one can see that there is antoher bug, previoulsy reported as #1591548 (https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1591548) So may be the bug report is never sent, either ? /var/crash/_usr_bin_dbus-daemon.1000.crash content is: ProblemType: Crash Architecture: amd64 Date: Sun Dec 9 11:16:22 2018 DistroRelease: Ubuntu 18.10 ExecutablePath: /usr/bin/dbus-daemon ExecutableTimestamp: 1536206167 ProcCmdline: /usr/bin/dbus-daemon --session --address=systemd: --nofork --nopidfile --systemd-activation --syslog-only ProcCwd: /home/solstice ProcEnviron: LANG=fr_FR.UTF-8 PATH=(custom, no user) SHELL=/bin/bash XDG_RUNTIME_DIR= ProcMaps: 55c9bfc7a000-55c9bfc83000 r--p 08:07 787824 /usr/bin/dbus-daemon 55c9bfc83000-55c9bfca5000 r-xp 9000 08:07 787824 /usr/bin/dbus-daemon 55c9bfca5000-55c9bfcb3000 r--p 0002b000 08:07 787824 /usr/bin/dbus-daemon 55c9bfcb3000-55c9bfcb5000 r--p 00038000 08:07 787824 /usr/bin/dbus-daemon 55c9bfcb5000-55c9bfcb6000 rw-p 0003a000 08:07 787824 /usr/bin/dbus-daemon 55c9c1bd8000-55c9c1f1e000 rw-p 00:00 0 [heap] 7eff0278c000-7eff02792000 r--p 08:07 650406 /lib/x86_64-linux-gnu/libnss_systemd.so.2 7eff02792000-7eff027bd000 r-xp 6000 08:07 650406 /lib/x86_64-linux-gnu/libnss_systemd.so.2 7eff027bd000-7eff027cc000 r--p 00031000 08:07 650406 /lib/x86_64-linux-gnu/libnss_systemd.so.2 7eff027cc000-7eff027cf000 r--p 0003f000 08:07 650406 /lib/x86_64-linux-gnu/libnss_systemd.so.2 7eff027cf000-7eff027d rw-p 00042000 08:07 650406 /lib/x86_64-linux-gnu/libnss_systemd.so.2 7eff027d-7eff027d1000 rw-p 00:00 0 7eff027d1000-7eff027d4000 r--p 08:07 654769 /lib/x86_64-linux-gnu/libnss_files-2.28.so 7eff027d4000-7eff027db000 r-xp 3000 08:07 654769 /lib/x86_64-linux-gnu/libnss_files-2.28.so 7eff027db000-7eff027de000 r--p a000 08:07 654769 /lib/x86_64-linux-gnu/libnss_files-2.28.so 7eff027de000-7eff027df000 r--p c000 08:07 654769 /lib/x86_64-linux-gnu/libnss_files-2.28.so 7eff027df000-7eff027e rw-p d000 08:07 654769 /lib/x86_64-linux-gnu/libnss_files-2.28.so 7eff027e-7eff027e6000 rw-p 00:00 0 7eff027e6000-7eff027ea000 r--p 08:07 654766 /lib/x86_64-linux-gnu/libnsl-2.28.so 7eff027ea000-7eff027f8000 r-xp 4000 08:07 654766 /lib/x86_64-linux-gnu/libnsl-2.28.so 7eff027f8000-7eff027fd000 r--p 00012000 08:07 654766 /lib/x86_64-linux-gnu/libnsl-2.28.so 7eff027fd000-7eff027fe000 r--p 00016000 08:07 654766 /lib/x86_64-linux-gnu/libnsl-2.28.so 7eff027fe000-7eff027ff000 rw-p 00017000 08:07 654766 /lib/x86_64-linux-gnu/libnsl-2.28.so 7eff027ff000-7eff02801000 rw-p 00:00 0 7eff02801000-7eff02803000 r--p 08:07 654771 /lib/x86_64-linux-gnu/libnss_nis-2.28.so 7eff02803000-7eff0280b000 r-xp 2000 08:07 654771 /lib/x86_64-linux-gnu/libnss_nis-2.28.so 7eff0280b000-7eff0280d000 r--p a000 08:07 654771 /lib/x86_64-linux-gnu/libnss_nis-2.28.so 7eff0280d000-7eff0280e000 r--p b000 08:07 654771 /lib/x86_64-linux-gnu/libnss_nis-2.28.so 7eff0280e000-7eff0280f000 rw-p c000 08:07 654771 /lib/x86_64-linux-gnu/libnss_nis-2.28.so 7eff0280f000-7eff02811000 r--p 08:07 654767 /lib/x86_64-linux-gnu/libnss_compat-2.28.so 7eff02811000-7eff02817000 r-xp 2000 08:07 654767 /lib/x86_64-linux-gnu/libnss_compat-2.28.so 7eff02817000-7eff02818000 r--p 8000 08:07 654767 /lib/x86_64-linux-gnu/libnss_compat-2.28.so 7eff02818000-7eff02819000 r--p 8000 08:07 654767 /lib/x86_64-linux-gnu/libnss_compat-2.28.so 7eff02819000-7eff0281a000 rw-p 9000 08:07 654767 /lib/x86_64-linux-gnu/libnss_compat-2.28.so 7eff0281a000-7eff0281f000 rw-p 00:00 0 7eff0281f000-7eff0283d000 r-xp 08:07 654828 /lib/x86_64-linux-gnu/libgpg-error.so.0.24.3 7eff0283d000-7eff02a3d000 ---p 0001e000 08:07 654828 /lib/x86_64-linux-gnu/libgpg-error.so.0.24.3 7eff02a3d000-7eff02a3e000 r--p 0001e000 08:07 654828 /lib/x86_64-linux-gnu/libgpg-error.so.0.24.3 7eff02a3e000-7eff02a3f000 rw-p 0001f000 08:07 654828
[Bug 1807706] [NEW] Disco update: 4.19.8 upstream stable release
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: 4.19.8 upstream stable release from git://git.kernel.org/ Linux 4.19.8 blk-mq: punt failed direct issue to dispatch list tipc: use destination length for copy string arc: [devboards] Add support of NFSv3 ACL ARC: change defconfig defaults to ARCv2 btrfs: tree-checker: Don't check max block group size as current max chunk size limit is unreliable Input: elan_i2c - add support for ELAN0621 touchpad Input: elan_i2c - add ACPI ID for Lenovo IdeaPad 330-15ARR Input: elan_i2c - add ELAN0620 to the ACPI table Input: cros_ec_keyb - fix button/switch capability reports Input: matrix_keypad - check for errors from of_get_named_gpio() Input: synaptics - add PNP ID for ThinkPad P50 to SMBus Input: xpad - quirk all PDP Xbox One gamepads scsi: lpfc: fix block guard enablement on SLI3 adapters i40e: Fix deletion of MAC filters selinux: add support for RTM_NEWCHAIN, RTM_DELCHAIN, and RTM_GETCHAIN svm: Add mutex_lock to protect apic_access_page_done on AMD systems kgdboc: Fix warning with module build kgdboc: Fix restrict error userfaultfd: shmem: UFFDIO_COPY: set the page dirty if VM_WRITE is not set userfaultfd: shmem: add i_size checks userfaultfd: shmem: allocate anonymous memory for MAP_PRIVATE shmem userfaultfd: use ENOENT instead of EFAULT if the atomic copy user fails drm/meson: Fix OOB memory accesses in meson_viu_set_osd_lut() drm/meson: Enable fast_io in meson_dw_hdmi_regmap_config drm/meson: Fixes for drm_crtc_vblank_on/off support drm: set is_master to 0 upon drm_new_set_master() failure drm/amd/dm: Don't forget to attach MST encoders drm/ast: Fix incorrect free on ioregs tracing/fgraph: Fix set_graph_function from showing interrupts IB/mlx5: Avoid load failure due to unknown link width mips: fix mips_get_syscall_arg o32 check MIPS: ralink: Fix mt7620 nd_sd pinmux tracepoint: Use __idx instead of idx in DO_TRACE macro to make it unique sched, trace: Fix prev_state output in sched_switch tracepoint arm64: ftrace: Fix to enable syscall events on arm64 mtd: nand: Fix memory allocation in nanddev_bbt_init() uprobes: Fix handle_swbp() vs. unregister() + register() race once more iser: set sector for ambiguous mr status errors unifdef: use memcpy instead of strncpy test_hexdump: use memcpy instead of strncpy The following patches from this stable update had already been applied: blk-mq: fix corruption with direct issue ** Affects: linux (Ubuntu) Importance: Medium Assignee: Seth Forshee (sforshee) Status: In Progress ** Affects: linux (Ubuntu Disco) Importance: Medium Assignee: Seth Forshee (sforshee) Status: In Progress ** Tags: kernel-stable-tracking-bug ** Tags added: kernel-stable-tracking-bug ** Also affects: linux (Ubuntu Disco) Importance: Undecided Status: New ** Changed in: linux (Ubuntu Disco) Importance: Undecided => Medium ** Changed in: linux (Ubuntu Disco) Status: New => In Progress ** Changed in: linux (Ubuntu Disco) Assignee: (unassigned) => Seth Forshee (sforshee) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1807706 Title: Disco update: 4.19.8 upstream stable release To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1807706/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1807705] [NEW] Disco update: 4.19.7 upstream stable release
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: 4.19.7 upstream stable release from git://git.kernel.org/ Linux 4.19.7 misc: mic/scif: fix copy-paste error in scif_create_remote_lookup Drivers: hv: vmbus: check the creation_status in vmbus_establish_gpadl() mm: use swp_offset as key in shmem_replace_page() mm: cleancache: fix corruption on missed inode invalidation lib/test_kmod.c: fix rmmod double free iio:st_magn: Fix enable device after trigger iio/hid-sensors: Fix IIO_CHAN_INFO_RAW returning wrong values for signed numbers Revert "usb: dwc3: gadget: skip Set/Clear Halt when invalid" usb: core: quirks: add RESET_RESUME quirk for Cherry G230 Stream series USB: usb-storage: Add new IDs to ums-realtek staging: rtl8723bs: Add missing return for cfg80211_rtw_get_station staging: rtl8723bs: Fix incorrect sense of ether_addr_equal staging: mt7621-pinctrl: fix uninitialized variable ngroups staging: mt7621-dma: fix potentially dereferencing uninitialized 'tx_desc' staging: vchiq_arm: fix compat VCHIQ_IOC_AWAIT_COMPLETION staging: most: use format specifier "%s" in snprintf dmaengine: at_hdmac: fix module unloading dmaengine: at_hdmac: fix memory leak in at_dma_xlate() ARM: dts: rockchip: Remove @0 from the veyron memory node ASoC: pcm186x: Fix device reset-registers trigger value ASoC: intel: cht_bsw_max98090_ti: Add quirk for boards using pmc_plt_clk_0 ext2: fix potential use after free ext2: initialize opts.s_mount_opt as zero before using it binder: fix race that allows malicious free of live buffer function_graph: Reverse the order of pushing the ret_stack and the callback function_graph: Move return callback before update of curr_ret_stack function_graph: Have profiler use curr_ret_stack and not depth function_graph: Use new curr_ret_depth to manage depth instead of curr_ret_stack function_graph: Make ftrace_push_return_trace() static MIPS: function_graph: Simplify with function_graph_enter() arm64: function_graph: Simplify with function_graph_enter() s390/function_graph: Simplify with function_graph_enter() riscv/function_graph: Simplify with function_graph_enter() parisc: function_graph: Simplify with function_graph_enter() sparc/function_graph: Simplify with function_graph_enter() sh/function_graph: Simplify with function_graph_enter() powerpc/function_graph: Simplify with function_graph_enter() nds32: function_graph: Simplify with function_graph_enter() x86/function_graph: Simplify with function_graph_enter() microblaze: function_graph: Simplify with function_graph_enter() ARM: function_graph: Simplify with function_graph_enter() function_graph: Create function_graph_enter() to consolidate architecture code ALSA: hda/realtek - Add auto-mute quirk for HP Spectre x360 laptop ALSA: hda/realtek - fix headset mic detection for MSI MS-B171 ALSA: hda/realtek - Support ALC300 ALSA: hda: Add ASRock N68C-S UCC the power_save blacklist ALSA: sparc: Fix invalid snd_free_pages() at error path ALSA: control: Fix race between adding and removing a user element ALSA: ac97: Fix incorrect bit shift at AC97-SPSA control write ALSA: wss: Fix invalid snd_free_pages() at error path fs: fix lost error code in dio_complete perf/x86/intel: Disallow precise_ip on BTS events perf/x86/intel: Add generic branch tracing check to intel_pmu_has_bts() perf/x86/intel: Move branch tracing setup to the Intel-specific source file x86/fpu: Disable bottom halves while loading FPU registers x86/MCE/AMD: Fix the thresholding machinery initialization order arm64: dts: rockchip: Fix PCIe reset polarity for rk3399-puma-haikou. PCI: Fix incorrect value returned from pcie_get_speed_cap() PCI: dwc: Fix MSI-X EP framework address calculation bug PCI: layerscape: Fix wrong invocation of outbound window disable accessor btrfs: relocation: set trans to be NULL after ending transaction Btrfs: fix race between enabling quotas and subvolume creation Btrfs: fix rare chances for data loss when doing a fast fsync Btrfs: ensure path name is null terminated at btrfs_control_ioctl btrfs: Always try all copies when reading extent buffers udf: Allow mounting volumes with incorrect identification strings xtensa: fix coprocessor part of ptrace_{get,set}xregs xtensa: fix coprocessor context offset definitions xtensa: enable coprocessors that are being flushed KVM: VMX: re-add ple_gap module parameter KVM: LAPIC: Fix pv ipis use-before-initialization KVM: x86: Fix kernel info-leak in KVM_HC_CLOCK_PAIRING hypercall KVM: nVMX/nSVM: Fix bug which sets vcpu->arch.tsc_offset to L1 tsc_offset kvm: svm: Ensure an IBPB on all affected CPUs when
[Bug 1038044] Re: munin-node: apt_all does not Grok Ubuntu (possible regression)
** Changed in: munin (Debian) Importance: Undecided => Unknown ** Changed in: munin (Debian) Status: New => Unknown ** Changed in: munin (Debian) Remote watch: None => Debian Bug tracker #715141 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1038044 Title: munin-node: apt_all does not Grok Ubuntu (possible regression) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/munin/+bug/1038044/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1806060] Re: Newer versions of killall (Ubuntu 18.04+) fail when signal specified in capitals
All lower case i dangerous, as it actually (can) mean the lower case options. So for example -int means "interactive" and it will ask + killall -int testINT + /tmp/testINT /dev/urandom Kill testINT(4931) ? (y/N) But the upper cases should work as specified. Just the text is misleading it is not "when specified in capitals" as -int != -INT But it is true that some options do not work. Test: #!/bin/bash #set -x TNAME="uninitialized" testkillall () { local tsig=${1} /tmp/${TNAME} /dev/urandom & local tpid=$!; echo "TEST -${tsig}"; killall -${tsig} "${TNAME}" kill -9 "${tpid}" 2>/dev/null; kill -9 "${TNAME}" 2>/dev/null; } for sig in $(killall -l | xargs); do TNAME="test${sig}" cp /usr/bin/md5sum "/tmp/${TNAME}" testkillall "$(echo ${sig} | tr '[:lower:]' '[:upper:]')" testkillall "SIG$(echo ${sig} | tr '[:lower:]' '[:upper:]')" #testkillall "$(echo ${sig} | tr '[:upper:]' '[:lower:]')" rm -f "/tmp/${TNAME}" sync done Results: - Disco with 23.2-1 all good - Cosmic with 23.1-1 broken on: INT + ILL + VTALRM ** Also affects: psmisc (Ubuntu Cosmic) Importance: Undecided Status: New ** Also affects: psmisc (Ubuntu Bionic) Importance: Undecided Status: New ** Changed in: psmisc (Ubuntu) Status: Confirmed => Fix Released ** Changed in: psmisc (Ubuntu Bionic) Status: New => Confirmed ** Changed in: psmisc (Ubuntu Cosmic) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1806060 Title: Newer versions of killall (Ubuntu 18.04+) fail when signal specified in capitals To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/psmisc/+bug/1806060/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1807702] Re: linux-oracle: 4.15.0-1007.7 -proposed tracker
** Changed in: kernel-sru-workflow/prepare-package Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package Assignee: Canonical Kernel Team (canonical-kernel-team) => Marcelo Cerri (mhcerri) ** Changed in: kernel-sru-workflow/prepare-package-meta Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: Canonical Kernel Team (canonical-kernel-team) => Marcelo Cerri (mhcerri) ** Changed in: kernel-sru-workflow/prepare-package-signed Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-signed Assignee: Canonical Kernel Team (canonical-kernel-team) => Marcelo Cerri (mhcerri) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1807702 Title: linux-oracle: 4.15.0-1007.7 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1807702/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1640978] Re: [SRU] Backport letsencrypt from bionic
Breakdown of josepy for SRU: josepy was split from python-acme, and is a NEW package going into Trusty. This is a straight backport of the bionic packaging. --- python-josepy-1.1.0/debian/compat 2018-04-15 20:45:24.0 + +++ python-josepy-1.1.0/debian/compat 2018-11-23 19:55:13.0 + @@ -1 +1 @@ -11 +9 diff -Nru python-josepy-1.1.0/debian/control python-josepy-1.1.0/debian/control --- python-josepy-1.1.0/debian/control 2018-04-15 20:45:24.0 + +++ python-josepy-1.1.0/debian/control 2018-11-23 19:55:13.0 + @@ -1,9 +1,10 @@ Source: python-josepy Section: python Priority: optional -Maintainer: Debian Let's Encrypt +Maintainer: Ubuntu Developers +XSBC-Original-Maintainer: Debian Let's Encrypt Uploaders: Harlan Lieberman-Berg -Build-Depends: debhelper (>= 11~), +Build-Depends: debhelper (>= 9~), dh-python, python (>= 2.7), python-cryptography (>= 0.8), diff -Nru python-josepy-1.1.0/debian/rules python-josepy-1.1.0/debian/rules Explanation: Debhelper 9 was the shipped version in trusty so changes to dependencies to work with it were required. --- python-josepy-1.1.0/debian/rules2018-04-15 20:45:24.0 + +++ python-josepy-1.1.0/debian/rules2018-11-23 19:55:13.0 + @@ -17,6 +17,6 @@ find $(CURDIR)/debian/ -type d -name testdata -print0 | xargs -0 rm -rf '{}' \; rm -f $(CURDIR)/debian/python*-josepy/usr/bin/jws -override_dh_installdocs: - dh_installdocs --doc-main-package=python-josepy-doc -p python-josepy-doc - dh_installdocs -p python-josepy -p python3-josepy +#override_dh_installdocs: +# dh_installdocs --doc-main-package=python-josepy-doc -p python-josepy-doc +# dh_installdocs -p python-josepy -p python3-josepy Explanation: installdocs doesn't support -p on Trusty which is used to create symlinks. This behavior mimics the way the docs packages were installed on Xenial for the existing packages; documentation still ends up properly in the -doc package (checked manually). -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1640978 Title: [SRU] Backport letsencrypt from bionic To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/python-acme/+bug/1640978/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1807704] [NEW] chromium browser crashe when saving image with name and when trying to export bookmarks
Public bug reported: On ubuntu 16,04 since a couple of weeks chromium browser crashes when saving image with name and when trying to export bookmarks. ** Affects: chromium-browser (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1807704 Title: chromium browser crashe when saving image with name and when trying to export bookmarks To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/1807704/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1806483] Comment bridged from LTC Bugzilla
--- Comment From heinz-werner_se...@de.ibm.com 2018-12-10 08:36 EDT--- Fix verified on package openssl-ibmca - 2.0.2-0ubuntu1. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1806483 Title: Ubuntu 18.04.1 - OpenSSL RSA connection rate performance degradation using ibmca engine (openssl-ibmca) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/1806483/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1806425] Re: linux-azure-edge: 4.18.0-1007.7~16.04.2 -proposed tracker
** Changed in: kernel-sru-workflow/automated-testing Status: New => Confirmed ** Changed in: kernel-sru-workflow/promote-to-proposed Status: In Progress => Fix Committed ** Changed in: kernel-sru-workflow/promote-to-proposed Status: Fix Committed => Fix Released ** Changed in: kernel-sru-workflow/regression-testing Status: New => Confirmed ** Changed in: kernel-sru-workflow/security-signoff Status: New => In Progress ** Changed in: kernel-sru-workflow/stakeholder-signoff Status: New => Confirmed ** Changed in: kernel-sru-workflow/verification-testing Status: New => Confirmed ** Description changed: This bug is for tracking the upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1806409 - phase: Uploaded - phase-changed: Friday, 07. December 2018 13:36 UTC + phase: Promoted to proposed + phase-changed: Monday, 10. December 2018 13:38 UTC + proposed-announcement-sent: true + proposed-testing-requested: true reason: - promote-to-proposed: Review in progress + automated-testing: Testing in progress + regression-testing: Testing in progress + security-signoff: Waiting for signoff + stakeholder-signoff: Waiting for signoff + verification-testing: Testing in progress -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1806425 Title: linux-azure-edge: 4.18.0-1007.7~16.04.2 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1806425/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1806572] Re: linux-lts-xenial: 4.4.0-141.167~14.04.1 -proposed tracker
** Changed in: kernel-sru-workflow/prepare-package Status: In Progress => Fix Released ** Description changed: This bug is for tracking the upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1806569 phase: Packaging - phase-changed: Wednesday, 05. December 2018 10:37 UTC + phase-changed: Monday, 10. December 2018 13:37 UTC reason: - prepare-package: Package not yet uploaded - prepare-package-meta: Package not yet uploaded - prepare-package-signed: Package not yet uploaded + prepare-package-meta: Package tag not yet published + prepare-package-signed: Package tag not yet published + promote-to-proposed: Source package tags missing -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1806572 Title: linux-lts-xenial: 4.4.0-141.167~14.04.1 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1806572/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1807702] [NEW] linux-oracle: 4.15.0-1007.7 -proposed tracker
Public bug reported: This bug is for tracking the 4.15.0-1007.7 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1806659 ** Affects: kernel-sru-workflow Importance: Medium Status: In Progress ** Affects: kernel-sru-workflow/automated-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/certification-testing Importance: Medium Assignee: Canonical Hardware Certification (canonical-hw-cert) Status: Invalid ** Affects: kernel-sru-workflow/prepare-package Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/prepare-package-meta Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/prepare-package-signed Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/promote-to-proposed Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-security Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-updates Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/regression-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/security-signoff Importance: Medium Assignee: Canonical Security Team (canonical-security) Status: New ** Affects: kernel-sru-workflow/upload-to-ppa Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/verification-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: linux (Ubuntu) Importance: Undecided Status: Invalid ** Tags: bionic kernel-release-tracking-bug kernel-release-tracking-bug-live kernel-sru-cycle-2018.12.03-1 ** Tags added: kernel-release-tracking-bug ** Tags added: kernel-release-tracking-bug-live ** Tags added: bionic ** Also affects: kernel-sru-workflow/automated-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/certification-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-meta Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-signed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-proposed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-security Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-updates Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/regression-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/security-signoff Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/upload-to-ppa Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/verification-testing Importance: Undecided Status: New ** Changed in: kernel-sru-workflow/automated-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/automated-testing Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/certification-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/certification-testing Assignee: (unassigned) => Canonical Hardware Certification (canonical-hw-cert) ** Changed in: kernel-sru-workflow/certification-testing Status: New => Invalid ** Changed in: kernel-sru-workflow/prepare-package Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/prepare-package-meta Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/prepare-package-signed Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package-signed
[Bug 1802556] Re: linux-oem: 4.15.0-1027.32 -proposed tracker
*** This bug is a duplicate of bug 1806663 *** https://bugs.launchpad.net/bugs/1806663 This bug was fixed in the package linux-oem - 4.15.0-1028.33 --- linux-oem (4.15.0-1028.33) bionic; urgency=medium * linux-oem: 4.15.0-1028.33 -proposed tracker (LP: #1803678) * Miscellaneous Ubuntu changes - Rebase to 4.15.0-42.45 [ Ubuntu: 4.15.0-42.45 ] * linux: 4.15.0-42.45 -proposed tracker (LP: #1803592) * [FEAT] Guest-dedicated Crypto Adapters (LP: #1787405) - KVM: s390: reset crypto attributes for all vcpus - KVM: s390: vsie: simulate VCPU SIE entry/exit - KVM: s390: introduce and use KVM_REQ_VSIE_RESTART - KVM: s390: refactor crypto initialization - s390: vfio-ap: base implementation of VFIO AP device driver - s390: vfio-ap: register matrix device with VFIO mdev framework - s390: vfio-ap: sysfs interfaces to configure adapters - s390: vfio-ap: sysfs interfaces to configure domains - s390: vfio-ap: sysfs interfaces to configure control domains - s390: vfio-ap: sysfs interface to view matrix mdev matrix - KVM: s390: interface to clear CRYCB masks - s390: vfio-ap: implement mediated device open callback - s390: vfio-ap: implement VFIO_DEVICE_GET_INFO ioctl - s390: vfio-ap: zeroize the AP queues - s390: vfio-ap: implement VFIO_DEVICE_RESET ioctl - KVM: s390: Clear Crypto Control Block when using vSIE - KVM: s390: vsie: Do the CRYCB validation first - KVM: s390: vsie: Make use of CRYCB FORMAT2 clear - KVM: s390: vsie: Allow CRYCB FORMAT-2 - KVM: s390: vsie: allow CRYCB FORMAT-1 - KVM: s390: vsie: allow CRYCB FORMAT-0 - KVM: s390: vsie: allow guest FORMAT-0 CRYCB on host FORMAT-1 - KVM: s390: vsie: allow guest FORMAT-1 CRYCB on host FORMAT-2 - KVM: s390: vsie: allow guest FORMAT-0 CRYCB on host FORMAT-2 - KVM: s390: device attrs to enable/disable AP interpretation - KVM: s390: CPU model support for AP virtualization - s390: doc: detailed specifications for AP virtualization - KVM: s390: fix locking for crypto setting error path - KVM: s390: Tracing APCB changes - s390: vfio-ap: setup APCB mask using KVM dedicated function - s390/zcrypt: Add ZAPQ inline function. - s390/zcrypt: Review inline assembler constraints. - s390/zcrypt: Integrate ap_asm.h into include/asm/ap.h. - s390/zcrypt: fix ap_instructions_available() returncodes - s390/zcrypt: remove VLA usage from the AP bus - s390/zcrypt: Remove deprecated ioctls. - s390/zcrypt: Remove deprecated zcrypt proc interface. - s390/zcrypt: Support up to 256 crypto adapters. - [Config:] Enable CONFIG_S390_AP_IOMMU and set CONFIG_VFIO_AP to module. * Bypass of mount visibility through userns + mount propagation (LP: #1789161) - mount: Retest MNT_LOCKED in do_umount - mount: Don't allow copying MNT_UNBINDABLE|MNT_LOCKED mounts * CVE-2018-18955: nested user namespaces with more than five extents incorrectly grant privileges over inode (LP: #1801924) // CVE-2018-18955 - userns: also map extents in the reverse map to kernel IDs * kdump fail due to an IRQ storm (LP: #1797990) - SAUCE: x86/PCI: Export find_cap() to be used in early PCI code - SAUCE: x86/quirks: Add parameter to clear MSIs early on boot - SAUCE: x86/quirks: Scan all busses for early PCI quirks -- Timo Aaltonen Fri, 16 Nov 2018 10:27:58 +0200 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1802556 Title: linux-oem: 4.15.0-1027.32 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1802556/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1802556] Re: linux-oem: 4.15.0-1027.32 -proposed tracker
*** This bug is a duplicate of bug 1806663 *** https://bugs.launchpad.net/bugs/1806663 This bug was fixed in the package linux-oem - 4.15.0-1028.33 --- linux-oem (4.15.0-1028.33) bionic; urgency=medium * linux-oem: 4.15.0-1028.33 -proposed tracker (LP: #1803678) * Miscellaneous Ubuntu changes - Rebase to 4.15.0-42.45 [ Ubuntu: 4.15.0-42.45 ] * linux: 4.15.0-42.45 -proposed tracker (LP: #1803592) * [FEAT] Guest-dedicated Crypto Adapters (LP: #1787405) - KVM: s390: reset crypto attributes for all vcpus - KVM: s390: vsie: simulate VCPU SIE entry/exit - KVM: s390: introduce and use KVM_REQ_VSIE_RESTART - KVM: s390: refactor crypto initialization - s390: vfio-ap: base implementation of VFIO AP device driver - s390: vfio-ap: register matrix device with VFIO mdev framework - s390: vfio-ap: sysfs interfaces to configure adapters - s390: vfio-ap: sysfs interfaces to configure domains - s390: vfio-ap: sysfs interfaces to configure control domains - s390: vfio-ap: sysfs interface to view matrix mdev matrix - KVM: s390: interface to clear CRYCB masks - s390: vfio-ap: implement mediated device open callback - s390: vfio-ap: implement VFIO_DEVICE_GET_INFO ioctl - s390: vfio-ap: zeroize the AP queues - s390: vfio-ap: implement VFIO_DEVICE_RESET ioctl - KVM: s390: Clear Crypto Control Block when using vSIE - KVM: s390: vsie: Do the CRYCB validation first - KVM: s390: vsie: Make use of CRYCB FORMAT2 clear - KVM: s390: vsie: Allow CRYCB FORMAT-2 - KVM: s390: vsie: allow CRYCB FORMAT-1 - KVM: s390: vsie: allow CRYCB FORMAT-0 - KVM: s390: vsie: allow guest FORMAT-0 CRYCB on host FORMAT-1 - KVM: s390: vsie: allow guest FORMAT-1 CRYCB on host FORMAT-2 - KVM: s390: vsie: allow guest FORMAT-0 CRYCB on host FORMAT-2 - KVM: s390: device attrs to enable/disable AP interpretation - KVM: s390: CPU model support for AP virtualization - s390: doc: detailed specifications for AP virtualization - KVM: s390: fix locking for crypto setting error path - KVM: s390: Tracing APCB changes - s390: vfio-ap: setup APCB mask using KVM dedicated function - s390/zcrypt: Add ZAPQ inline function. - s390/zcrypt: Review inline assembler constraints. - s390/zcrypt: Integrate ap_asm.h into include/asm/ap.h. - s390/zcrypt: fix ap_instructions_available() returncodes - s390/zcrypt: remove VLA usage from the AP bus - s390/zcrypt: Remove deprecated ioctls. - s390/zcrypt: Remove deprecated zcrypt proc interface. - s390/zcrypt: Support up to 256 crypto adapters. - [Config:] Enable CONFIG_S390_AP_IOMMU and set CONFIG_VFIO_AP to module. * Bypass of mount visibility through userns + mount propagation (LP: #1789161) - mount: Retest MNT_LOCKED in do_umount - mount: Don't allow copying MNT_UNBINDABLE|MNT_LOCKED mounts * CVE-2018-18955: nested user namespaces with more than five extents incorrectly grant privileges over inode (LP: #1801924) // CVE-2018-18955 - userns: also map extents in the reverse map to kernel IDs * kdump fail due to an IRQ storm (LP: #1797990) - SAUCE: x86/PCI: Export find_cap() to be used in early PCI code - SAUCE: x86/quirks: Add parameter to clear MSIs early on boot - SAUCE: x86/quirks: Scan all busses for early PCI quirks -- Timo Aaltonen Fri, 16 Nov 2018 10:27:58 +0200 ** Changed in: linux-oem (Ubuntu) Status: Invalid => Fix Released ** Changed in: linux-oem (Ubuntu) Status: Invalid => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1802556 Title: linux-oem: 4.15.0-1027.32 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1802556/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
Re: [Bug 1630413] Re: segfault in server/mpm/event/event.c:process_socket
Ah, that makes sense. On Mon, Dec 10, 2018 at 6:50 AM Andreas Hasenack wrote: > > However, I would prefer that someone with more Apache experience > reviewed the fix. > > Right, that was actually my (very unclear, sorry) point when I commented > on upstream's interest in this, since they would be experienced > reviewers. > > -- > You received this bug notification because you are subscribed to the bug > report. > https://bugs.launchpad.net/bugs/1630413 > > Title: > segfault in server/mpm/event/event.c:process_socket > > Status in apache2 package in Ubuntu: > Triaged > > Bug description: > We have seen consistent but infrequent segfaults of apache on a trusty > production server with 2.4.7-1ubuntu4.13 (for more examples, see [1]) > > --- > Oct 2 19:01:03 static kernel: [8029151.932468] apache2[10642]: segfault > at 7fac797803a8 ip 7fac90b345e0 sp 7fac84ff8e20 error 6 in > mod_mpm_event.so[7fac90b2e000+d000] > --- > > Taking the ip - base seems to put us at a consistent offset > > --- > (gdb) p/x 0x7fac90b345e0 - 0x7fac90b2e000 > $1 = 0x65e0 > > $ addr2line -e ./mod_mpm_event.so 0x65e0 > /build/apache2-Rau9Dr/apache2-2.4.7/server/mpm/event/event.c:1064 > --- > > which is at the bottom of process_socket(), which looks like > > --- > 1058 /* > 1059 * Prevent this connection from writing to our connection > state after it > 1060 * is no longer associated with this thread. This would > happen if the EOR > 1061 * bucket is destroyed from the listener thread due to a > connection abort > 1062 * or timeout. > 1063 */ > 1064 c->sbh = NULL; > 1065 return; > 1066 } > --- > > 1064 seems at least plausible as a faulting location... > > Some digging through httpd history reveals that this assignment was > removed on the 2.4 branch with commit [2], which seems to be largely > based on [3]. Things have been shuffled around so much it's hard to > tell exactly what might have avoided us going down this path. Even so > I'm honestly not sure how to reproduce it -- on a fairly busy server > it's seen at most a few times a day. > > [1] http://paste.openstack.org/show/584330/ > [2] > https://github.com/apache/httpd/commit/043eba1a0a190829c073d9ef084358f6693dbbd2 > [3] > https://github.com/apache/httpd/commit/285e67883e396f97dc3aad50d9dc345f15220827 > > To manage notifications about this bug go to: > > https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1630413/+subscriptions > -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1630413 Title: segfault in server/mpm/event/event.c:process_socket To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1630413/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1803678] Re: linux-oem: 4.15.0-1028.33 -proposed tracker
This bug was fixed in the package linux-oem - 4.15.0-1028.33 --- linux-oem (4.15.0-1028.33) bionic; urgency=medium * linux-oem: 4.15.0-1028.33 -proposed tracker (LP: #1803678) * Miscellaneous Ubuntu changes - Rebase to 4.15.0-42.45 [ Ubuntu: 4.15.0-42.45 ] * linux: 4.15.0-42.45 -proposed tracker (LP: #1803592) * [FEAT] Guest-dedicated Crypto Adapters (LP: #1787405) - KVM: s390: reset crypto attributes for all vcpus - KVM: s390: vsie: simulate VCPU SIE entry/exit - KVM: s390: introduce and use KVM_REQ_VSIE_RESTART - KVM: s390: refactor crypto initialization - s390: vfio-ap: base implementation of VFIO AP device driver - s390: vfio-ap: register matrix device with VFIO mdev framework - s390: vfio-ap: sysfs interfaces to configure adapters - s390: vfio-ap: sysfs interfaces to configure domains - s390: vfio-ap: sysfs interfaces to configure control domains - s390: vfio-ap: sysfs interface to view matrix mdev matrix - KVM: s390: interface to clear CRYCB masks - s390: vfio-ap: implement mediated device open callback - s390: vfio-ap: implement VFIO_DEVICE_GET_INFO ioctl - s390: vfio-ap: zeroize the AP queues - s390: vfio-ap: implement VFIO_DEVICE_RESET ioctl - KVM: s390: Clear Crypto Control Block when using vSIE - KVM: s390: vsie: Do the CRYCB validation first - KVM: s390: vsie: Make use of CRYCB FORMAT2 clear - KVM: s390: vsie: Allow CRYCB FORMAT-2 - KVM: s390: vsie: allow CRYCB FORMAT-1 - KVM: s390: vsie: allow CRYCB FORMAT-0 - KVM: s390: vsie: allow guest FORMAT-0 CRYCB on host FORMAT-1 - KVM: s390: vsie: allow guest FORMAT-1 CRYCB on host FORMAT-2 - KVM: s390: vsie: allow guest FORMAT-0 CRYCB on host FORMAT-2 - KVM: s390: device attrs to enable/disable AP interpretation - KVM: s390: CPU model support for AP virtualization - s390: doc: detailed specifications for AP virtualization - KVM: s390: fix locking for crypto setting error path - KVM: s390: Tracing APCB changes - s390: vfio-ap: setup APCB mask using KVM dedicated function - s390/zcrypt: Add ZAPQ inline function. - s390/zcrypt: Review inline assembler constraints. - s390/zcrypt: Integrate ap_asm.h into include/asm/ap.h. - s390/zcrypt: fix ap_instructions_available() returncodes - s390/zcrypt: remove VLA usage from the AP bus - s390/zcrypt: Remove deprecated ioctls. - s390/zcrypt: Remove deprecated zcrypt proc interface. - s390/zcrypt: Support up to 256 crypto adapters. - [Config:] Enable CONFIG_S390_AP_IOMMU and set CONFIG_VFIO_AP to module. * Bypass of mount visibility through userns + mount propagation (LP: #1789161) - mount: Retest MNT_LOCKED in do_umount - mount: Don't allow copying MNT_UNBINDABLE|MNT_LOCKED mounts * CVE-2018-18955: nested user namespaces with more than five extents incorrectly grant privileges over inode (LP: #1801924) // CVE-2018-18955 - userns: also map extents in the reverse map to kernel IDs * kdump fail due to an IRQ storm (LP: #1797990) - SAUCE: x86/PCI: Export find_cap() to be used in early PCI code - SAUCE: x86/quirks: Add parameter to clear MSIs early on boot - SAUCE: x86/quirks: Scan all busses for early PCI quirks -- Timo Aaltonen Fri, 16 Nov 2018 10:27:58 +0200 ** Changed in: linux-oem (Ubuntu) Status: Invalid => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1803678 Title: linux-oem: 4.15.0-1028.33 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1803678/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1753470] Re: Postconf segfaults every 5 minutes
** Changed in: postfix (Debian) Status: New => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1753470 Title: Postconf segfaults every 5 minutes To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/postfix/+bug/1753470/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1783043] Re: GLIBC High Power License Fix for Ubuntu 16.04.4
** Also affects: glibc (Ubuntu) Importance: Undecided Status: New ** No longer affects: ubuntu -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1783043 Title: GLIBC High Power License Fix for Ubuntu 16.04.4 To manage notifications about this bug go to: https://bugs.launchpad.net/intel/+bug/1783043/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1803962] Re: [19.04 FEAT] Upgrade libica >=3.4.0
** Tags added: id-5bf2ee4493db73365456488b -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1803962 Title: [19.04 FEAT] Upgrade libica >=3.4.0 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/1803962/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1806060] Re: Newer versions of killall (Ubuntu 18.04+) fail when signal specified in capitals
This is fixed in 23.2-1, would someone confirm that this fixes all you initial bugs so that we can condier backporting the fix. BTW: fix at https://gitlab.com/psmisc/psmisc/commit/258ee9166e585f87005d3a9686938a4fa26669f9 Also I agree to @rbasak that this clearly has regression potential, just we'd hope less than what it actually fixes especially for 3rd party scripts of upgraders from 16.04 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1806060 Title: Newer versions of killall (Ubuntu 18.04+) fail when signal specified in capitals To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/psmisc/+bug/1806060/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1803994] Re: [19.04 FEAT] Upgrade opencryptoki >=3.11.0
** Tags added: id-5bf2ed15a3a9ed1134d88f6d -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1803994 Title: [19.04 FEAT] Upgrade opencryptoki >=3.11.0 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/1803994/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1807177] Re: Package samba-vfs-modules missing file glusterfs.so
It's not like that. The Depends field is populated from debian/control, and from automatically calculated dependencies (like that ldd trick). The moment a package lists something in Depends, if that something cannot be installed, then the package itself will not be installed. It doesn't matter if your smb.conf is referring to the gluster module or not. Now, all that being said, I see that debian is using a trick and making glusterfs-common a "recommends" type of dependency, instead of "depends" which is stricter. But it's still not allowed to have a main package recommend an universe one. But I could use a "suggests" (https://www.debian.org/doc/debian-policy /ch-relationships.html#binary-dependencies-depends-recommends-suggests- enhances-pre-depends), which is an even weaker type of dependency. Or move the gluster vfs module into its own package, and have that land in universe. Then there wouldn't be a problem at all. Thanks for insisting on this. I'll reopen the bug, but mark it as wishlist for now. ** Changed in: samba (Ubuntu) Status: Won't Fix => Triaged ** Changed in: samba (Ubuntu) Importance: Undecided => Wishlist -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1807177 Title: Package samba-vfs-modules missing file glusterfs.so To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/samba/+bug/1807177/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1798790] Re: Ubuntu 18.10 login screen never appears when using the Nvidia driver
I forgot to include introductory links to this complicated issue. My crude understanding is that systemd handles system initialization, calling bpfilter (replacing iptables) which is handled by the linux kernel. https://thenewstack.io/systemd-vs-linux-kernel/ https://www.linux.com/news/why-kernel-community-replacing-iptables-bpf SLiM, btw, while it works, is Debian-branded. I'm still trying to figure out how to remove the amateurish Debian swirl background. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1798790 Title: Ubuntu 18.10 login screen never appears when using the Nvidia driver To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gdm3/+bug/1798790/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1795199] Re: Can't launch right click menu using touchscreen
Ok, so it's a nautilus issue if it's only there it doesn't work. What view mode do you use? Do you try to click on an icon on the bg? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1795199 Title: Can't launch right click menu using touchscreen To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/nautilus/+bug/1795199/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1773363] Re: glibc tst-preadvwritev2 and tst-preadvwritev64v2 fail with Linux 4.16+
** Changed in: linux (Ubuntu) Status: Incomplete => Confirmed ** Changed in: linux (Ubuntu Bionic) Status: Incomplete => Confirmed ** Changed in: linux (Ubuntu Cosmic) Status: Incomplete => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1773363 Title: glibc tst-preadvwritev2 and tst-preadvwritev64v2 fail with Linux 4.16+ To manage notifications about this bug go to: https://bugs.launchpad.net/glibc/+bug/1773363/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1807177] Re: Package samba-vfs-modules missing file glusterfs.so
It's not like that. The Depends field is populated from debian/control, and from automatically calculated dependencies (like that ldd trick). The moment a package lists something in Depends, if that something cannot be installed, then the package itself will not be installed. It doesn't matter if your smb.conf is referring to the gluster module or not. Now, all that being said, I see that debian is using a trick and making glusterfs-common a "recommends" type of dependency, instead of "depends" which is stricter. But it's still not allowed to have a main package recommend an universe one. But I could use a "suggests" (https://www.debian.org/doc/debian-policy /ch-relationships.html#binary-dependencies-depends-recommends-suggests- enhances-pre-depends), which is an even weaker type of dependency. Or move the gluster vfs module into its own package, and have that land in universe. Then there wouldn't be a problem at all. Thanks for insisting on this. I'll reopen the bug, but mark it as wishlist for now. ** Changed in: samba (Ubuntu) Status: Won't Fix => Triaged ** Changed in: samba (Ubuntu) Importance: Undecided => Wishlist -- You received this bug notification because you are a member of Ubuntu Server, which is subscribed to samba in Ubuntu. https://bugs.launchpad.net/bugs/1807177 Title: Package samba-vfs-modules missing file glusterfs.so To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/samba/+bug/1807177/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1798790] Re: Ubuntu 18.10 login screen never appears when using the Nvidia driver
SOLVED (MAYBE) For me, it's not nVidia, it's not WaylandEnable. It may be the "Started bpfilter" message, which I earlier thought was nothing. I don't know beans about this, but I checked, and bpfilter is a recent replacement for iptables in many Linux distros, and it's handled in the linux kernel. Casting about for perhaps an alternate to gnome display manager 3, I found that SLiM had high user ratings, and one of the suggested advantages was it didn't require systemd (the system startup daemon, which historically has had a running conflict with kernel developers, maybe bpfilter.) On the gamble that this bootup hang might be caused by a kernel-systemd conflict, I enabled networking in recovery mode and ran 'apt install slim' to install alternate display manager SLiM. the installation prompted me to choose SLiM or GDM as the default, I chose SLiM, and was able to boot Cosmic finally. If I run into any issues further on, I'll post here. If you already have an alternate display manager installed, you can switch with "sudo dpkg-reconfigure gdm" and select the alt dm. Anyway, this might be a last, desperate workaround for the "bpfilter hang," if all the other solutions didn't work for you. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1798790 Title: Ubuntu 18.10 login screen never appears when using the Nvidia driver To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gdm3/+bug/1798790/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1806860] Re: Pulseaudio module-jack-source unable to connect to jackd2
Thanks! ** Changed in: pulseaudio (Ubuntu) Status: Incomplete => Triaged -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1806860 Title: Pulseaudio module-jack-source unable to connect to jackd2 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/jackd2/+bug/1806860/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1458204] Re: removing kernels should not require a restart afterward
@bhkolts Please just upgrade update-notifier-common. Timo's automated notification email referred to the source package from which both binary packages are built. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1458204 Title: removing kernels should not require a restart afterward To manage notifications about this bug go to: https://bugs.launchpad.net/unattended-upgrades/+bug/1458204/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1787405] Re: [FEAT] Guest-dedicated Crypto Adapters
Thanks for accepting that follow-on fix. With that it now fully works on cosmic as well following the howto on comment #66 ** Tags removed: verification-needed verification-needed-cosmic ** Tags added: verification-done verification-done-cosmic -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1787405 Title: [FEAT] Guest-dedicated Crypto Adapters To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/1787405/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1807246] Re: after upgrading to bionic, my session forgets who I am frequently
Thank you Luke! Lets see if there is any new update that might shed some light here. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1807246 Title: after upgrading to bionic, my session forgets who I am frequently To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/sssd/+bug/1807246/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1806570] Re: linux-aws: 4.4.0-1037.40 -proposed tracker
** Tags added: regression-testing-passed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1806570 Title: linux-aws: 4.4.0-1037.40 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1806570/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1806570] Re: linux-aws: 4.4.0-1037.40 -proposed tracker
** Changed in: kernel-sru-workflow/regression-testing Status: Confirmed => Fix Released ** Description changed: This bug is for tracking the upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1806569 phase: Promoted to proposed phase-changed: Thursday, 06. December 2018 15:31 UTC proposed-announcement-sent: true proposed-testing-requested: true reason: - regression-testing: Testing in progress security-signoff: Waiting for signoff verification-testing: Testing in progress -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1806570 Title: linux-aws: 4.4.0-1037.40 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1806570/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1787405] Re: [FEAT] Guest-dedicated Crypto Adapters
FYI: We also resolved the systemd test issues in Bionic (unrelated, but needed a fix). Lets see how they will look like in Cosmic after the tests on the new upload complete. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1787405 Title: [FEAT] Guest-dedicated Crypto Adapters To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/1787405/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1807698] [NEW] crash after making selection with square lasso
Public bug reported: opened jpeg used square selection tool crash $ pinta (Pinta:3188): GLib-GIO-CRITICAL **: 07:27:33.961: g_dbus_proxy_new: assertion 'G_IS_DBUS_CONNECTION (connection)' failed (Pinta:3188): GLib-GIO-CRITICAL **: 07:27:33.961: g_dbus_proxy_new: assertion 'G_IS_DBUS_CONNECTION (connection)' failed free(): invalid pointer Stacktrace: at <0x> at (wrapper managed-to-native) GLib.SList.g_free (intptr) <0x0005f> at GLib.ListBase.Empty () <0x0013c> at GLib.ListBase.Dispose (bool) <0xf> at GLib.ListBase.Finalize () <0x0001d> at (wrapper runtime-invoke) object.runtime_invoke_virtual_void__this__ (object,intptr,intptr,intptr) <0x00068> Native stacktrace: /usr/bin/mono(+0xc8514) [0x5616974f1514] /lib/x86_64-linux-gnu/libpthread.so.0(+0x12890) [0x7fc567752890] /lib/x86_64-linux-gnu/libc.so.6(gsignal+0xc7) [0x7fc567175e97] /lib/x86_64-linux-gnu/libc.so.6(abort+0x141) [0x7fc567177801] /lib/x86_64-linux-gnu/libc.so.6(+0x89897) [0x7fc5671c0897] /lib/x86_64-linux-gnu/libc.so.6(+0x9090a) [0x7fc5671c790a] /lib/x86_64-linux-gnu/libc.so.6(cfree+0x4cc) [0x7fc5671cee1c] [0x415b5930] Debug info from gdb: = Got a SIGABRT while executing native code. This usually indicates a fatal error in the mono runtime or one of the native libraries used by your application. = Aborted (core dumped) ProblemType: Bug DistroRelease: Ubuntu 18.04 Package: pinta 1.6-2 ProcVersionSignature: Ubuntu 4.15.0-42.45-generic 4.15.18 Uname: Linux 4.15.0-42-generic x86_64 ApportVersion: 2.20.9-0ubuntu7.5 Architecture: amd64 CurrentDesktop: LXDE Date: Mon Dec 10 07:28:38 2018 InstallationDate: Installed on 2018-03-02 (283 days ago) InstallationMedia: Lubuntu 17.10 "Artful Aardvark" - Release amd64 (20180105) PackageArchitecture: all SourcePackage: pinta UpgradeStatus: Upgraded to bionic on 2018-07-25 (137 days ago) ** Affects: pinta (Ubuntu) Importance: Undecided Status: New ** Tags: amd64 apport-bug bionic -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1807698 Title: crash after making selection with square lasso To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/pinta/+bug/1807698/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1799459] Re: /usr/bin/gnome-tweaks:AttributeError:do_activate:__init__:load_tweaks:/usr/lib/python3/dist-packages/gtweak/tweaks/tweak_group_general.py@14
This bug was fixed in the package gnome-tweaks - 3.30.2-1 --- gnome-tweaks (3.30.2-1) unstable; urgency=medium * New upstream release - Fix running Tweaks outside of GNOME Shell (LP: #1799459) -- Jeremy Bicha Sun, 09 Dec 2018 22:00:39 -0500 ** Changed in: gnome-tweaks (Ubuntu) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1799459 Title: /usr/bin/gnome- tweaks:AttributeError:do_activate:__init__:load_tweaks:/usr/lib/python3 /dist-packages/gtweak/tweaks/tweak_group_general.py@14 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gnome-tweaks/+bug/1799459/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1807698] Re: crash after making selection with square lasso
this bub can be duplicated just opened same file crashed attached is file that crashes pinta ** Attachment added: "sample file that causes crash" https://bugs.launchpad.net/ubuntu/+source/pinta/+bug/1807698/+attachment/5220888/+files/onlinkdownload.jpeg -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1807698 Title: crash after making selection with square lasso To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/pinta/+bug/1807698/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1807246] Re: after upgrading to bionic, my session forgets who I am frequently
https://pagure.io/SSSD/sssd/issue/3900 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1807246 Title: after upgrading to bionic, my session forgets who I am frequently To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/sssd/+bug/1807246/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1805920] Re: iPXE ignores vlan 0 traffic
[1] seems reasonable, I'll give it a try with and without the PPA of Andres. It needs a slight modification, to not conflict with the default portal. Install libvirt with all else it usually brings (for the bridge and dhcp on the bridge): $ sudo install libvirt-daemon-system So use these commands: $ curl -O http://download.cirros-cloud.net/0.3.4/cirros-0.3.4-x86_64-disk.img $ qemu-img convert -O raw cirros-0.3.4-x86_64-disk.img cirros.raw $ sudo targetcli /backstores/fileio/ create cirros $PWD/cirros.raw 100M false $ sudo targetcli /iscsi create iqn.2016-01.com.example:cirros $ sudo targetcli /iscsi/iqn.2016-01.com.example:cirros/tpg1/luns create /backstores/fileio/cirros $ sudo targetcli /iscsi/iqn.2016-01.com.example:cirros/tpg1/portals delete 0.0.0.0 ip_port=3260 $ sudo targetcli /iscsi/iqn.2016-01.com.example:cirros/tpg1/portals create 192.168.122.1 If you do that you'll end up with a targetcli config like this: $ sudo targetcli targetcli shell version 2.1.fb43 Copyright 2011-2013 by Datera, Inc and others. For help on commands, type 'help'. /> ls o- / . [...] o- backstores .. [...] | o- block .. [Storage Objects: 0] | o- fileio . [Storage Objects: 1] | | o- cirros ... [/home/ubuntu/cirros.raw (39.2MiB) write-thru activated] | o- pscsi .. [Storage Objects: 0] | o- ramdisk [Storage Objects: 0] o- iscsi [Targets: 1] | o- iqn.2016-01.com.example:cirros [TPGs: 1] | o- tpg1 .. [gen-acls, no-auth] | o- acls .. [ACLs: 0] | o- luns .. [LUNs: 1] | | o- lun0 [fileio/cirros (/home/ubuntu/cirros.raw)] | o- portals [Portals: 1] | o- 192.168.122.1:3260 ... [OK] o- loopback . [Targets: 0] o- srpt . [Targets: 0] o- vhost [Targets: 0] Do that and then on qemu start attach to the console early. To get that easier, instead of VNC use a local curses console with: $ sudo qemu-system-x86_64 -smp cpus=2 -curses -boot order=n -netdev bridge,br=virbr0,id=virtio0 -device virtio-net-pci,netdev=virtio Hit CTRL+B early on boot for ipxe commands With out virtbr0 default setup having the host on 192.168.122.1 that would be iPXE> ifopen net0 iPXE> dhcp iPXE> sanboot iscsi:192.168.122.1iqn.2016-01.com.example:cirros Retested with 1.0.0+git-20180124.fbe8c52d-0ubuntu2.2~18.04.1 from the PPA. Boot just as much - so while no perfect test (what if that would be in a VLAN tagged network?) it is better than nothing. That said - together with all that was discussed before - I think Andres could go on uploading it to Disco. For the SRUs we will need some extra for [2], but one thing at a time. Or is the assumption that I drive it from here and you only do verifications on the case? [1]: https://medium.com/oracledevs/kvm-iscsi-part-i-iscsi-boot-with-ipxe-f533f2666075 [2]: https://packages.ubuntu.com/bionic/ipxe-qemu-256k-compat-efi-roms -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1805920 Title: iPXE ignores vlan 0 traffic To manage notifications about this bug go to: https://bugs.launchpad.net/maas/+bug/1805920/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com
[Bug 1795342] Re: High Power Consumption
Please ignore the previous one, I took that screenshot sooner. Consider this one. ** Attachment added: "Screenshot from 2018-12-10 17-34-22.png" https://bugs.launchpad.net/ubuntu-power-consumption/+bug/1795342/+attachment/5220876/+files/Screenshot%20from%202018-12-10%2017-34-22.png -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1795342 Title: High Power Consumption To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-power-consumption/+bug/1795342/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1807694] Re: package nvidia-340 (not installed) failed to install/upgrade: trying to overwrite '/usr/lib/x86_64-linux-gnu/libnvidia-ml.so', which is also in package libnvidia-compute-390:amd64 39
*** This bug is a duplicate of bug 1798721 *** https://bugs.launchpad.net/bugs/1798721 Thank you for taking the time to report this crash and helping to make this software better. This particular crash has already been reported and is a duplicate of bug #1798721, so is being marked as such. Please look at the other bug report to see if there is any missing information that you can provide, or to see if there is a workaround for the bug. Additionally, any further discussion regarding the bug should occur in the other report. Please continue to report any other bugs you may find. ** Tags removed: need-duplicate-check ** This bug has been marked a duplicate of bug 1798721 package nvidia-340 (not installed) failed to install/upgrade: trying to overwrite '/usr/lib/x86_64-linux-gnu/libnvidia-ml.so', which is also in package libnvidia-compute-390:amd64 390.77-0ubuntu0.18.04.1 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1807694 Title: package nvidia-340 (not installed) failed to install/upgrade: trying to overwrite '/usr/lib/x86_64-linux-gnu/libnvidia-ml.so', which is also in package libnvidia-compute-390:amd64 390.77-0ubuntu0.18.04.1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/nvidia-graphics-drivers-340/+bug/1807694/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1798721] Re: package nvidia-340 (not installed) failed to install/upgrade: trying to overwrite '/usr/lib/x86_64-linux-gnu/libnvidia-ml.so', which is also in package libnvidia-compute-390:amd64 39
Status changed to 'Confirmed' because the bug affects multiple users. ** Changed in: nvidia-graphics-drivers-340 (Ubuntu) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1798721 Title: package nvidia-340 (not installed) failed to install/upgrade: trying to overwrite '/usr/lib/x86_64-linux-gnu/libnvidia-ml.so', which is also in package libnvidia-compute-390:amd64 390.77-0ubuntu0.18.04.1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/nvidia-graphics-drivers-340/+bug/1798721/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1807694] [NEW] package nvidia-340 (not installed) failed to install/upgrade: trying to overwrite '/usr/lib/x86_64-linux-gnu/libnvidia-ml.so', which is also in package libnvidia-compute-390:amd64
*** This bug is a duplicate of bug 1798721 *** https://bugs.launchpad.net/bugs/1798721 Public bug reported: First of all, I installer the nvidia driver via this following repo: sudo add-apt-repository ppa:graphics-drivers/ppa Then I got the error message attached in this report when I tried to install nvidia-cuda-toolkit. So I tried to uninstall all nvidia: sudo add-apt-repository --remove ppa:graphics-drivers/ppa sudo apt update ubuntu-drivers devices Then I install the nvidia driver from the official repo of ubuntu like described in https://doc.ubuntu-fr.org/nvidia chapter 3.1. Then I tried to install nvidia-cuda-toolkit again but I faced the same issue. ProblemType: Package DistroRelease: Ubuntu 18.04 Package: nvidia-340 (not installed) ProcVersionSignature: Ubuntu 4.15.0-42.45-generic 4.15.18 Uname: Linux 4.15.0-42-generic x86_64 NonfreeKernelModules: nvidia_uvm nvidia ApportVersion: 2.20.9-0ubuntu7.5 AptOrdering: nvidia-340:amd64: Install NULL: ConfigurePending Architecture: amd64 Date: Mon Dec 10 12:45:12 2018 DuplicateSignature: package:nvidia-340:(not installed) Unpacking nvidia-340 (340.107-0ubuntu0.18.04.1) ... dpkg: error processing archive /var/cache/apt/archives/nvidia-340_340.107-0ubuntu0.18.04.1_amd64.deb (--unpack): trying to overwrite '/usr/lib/x86_64-linux-gnu/libnvidia-ml.so', which is also in package libnvidia-compute-390:amd64 390.77-0ubuntu0.18.04.1 ErrorMessage: trying to overwrite '/usr/lib/x86_64-linux-gnu/libnvidia-ml.so', which is also in package libnvidia-compute-390:amd64 390.77-0ubuntu0.18.04.1 InstallationDate: Installed on 2018-12-06 (3 days ago) InstallationMedia: Ubuntu 18.04.1 LTS "Bionic Beaver" - Release amd64 (20180725) Python3Details: /usr/bin/python3.6, Python 3.6.7, python3-minimal, 3.6.7-1~18.04 PythonDetails: N/A RelatedPackageVersions: dpkg 1.19.0.5ubuntu2.1 apt 1.6.6 SourcePackage: nvidia-graphics-drivers-340 Title: package nvidia-340 (not installed) failed to install/upgrade: trying to overwrite '/usr/lib/x86_64-linux-gnu/libnvidia-ml.so', which is also in package libnvidia-compute-390:amd64 390.77-0ubuntu0.18.04.1 UpgradeStatus: No upgrade log present (probably fresh install) ** Affects: nvidia-graphics-drivers-340 (Ubuntu) Importance: Undecided Status: New ** Tags: amd64 apport-package bionic package-conflict -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1807694 Title: package nvidia-340 (not installed) failed to install/upgrade: trying to overwrite '/usr/lib/x86_64-linux-gnu/libnvidia-ml.so', which is also in package libnvidia-compute-390:amd64 390.77-0ubuntu0.18.04.1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/nvidia-graphics-drivers-340/+bug/1807694/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1803469] Re: package nvidia-340 (not installed) failed to install/upgrade: trying to overwrite '/usr/lib/x86_64-linux-gnu/libnvidia-ml.so', which is also in package libnvidia-compute-390:amd64 39
Status changed to 'Confirmed' because the bug affects multiple users. ** Changed in: nvidia-graphics-drivers-340 (Ubuntu) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1803469 Title: package nvidia-340 (not installed) failed to install/upgrade: trying to overwrite '/usr/lib/x86_64-linux-gnu/libnvidia-ml.so', which is also in package libnvidia-compute-390:amd64 390.77-0ubuntu0.18.04.1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/nvidia-graphics-drivers-340/+bug/1803469/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
Re: [Bug 1268592] Re: gscan2pdf no longer launches in Ubuntu 12.04 LTS after ppa upgrade earlier today
OK, thank you. On 12/10/18 1:14 AM, Jeffrey Ratcliffe wrote: > You are scanning from the flatbed, so yet, setting # pages to 1 would > solve your problem. > > Alternatively, in Edit/Preferences, disable the option "allow batch > scanning from flatbed". > -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1268592 Title: gscan2pdf no longer launches in Ubuntu 12.04 LTS after ppa upgrade earlier today To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gscan2pdf/+bug/1268592/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 984390] Re: $PATH is taken from login.defs not /etc/environment
This is now fixed upstream: https://github.com/shadow- maint/shadow/pull/119 - so the next shadow release should have it. This makes me also wonder if we should simply cherry pick it for disco. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/984390 Title: $PATH is taken from login.defs not /etc/environment To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/984390/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1795342] Re: High Power Consumption
Thank you. Attached is the output of top -d60 ** Attachment added: "Screenshot from 2018-12-10 17-21-12.png" https://bugs.launchpad.net/ubuntu-power-consumption/+bug/1795342/+attachment/5220870/+files/Screenshot%20from%202018-12-10%2017-21-12.png -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1795342 Title: High Power Consumption To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-power-consumption/+bug/1795342/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1429030] Re: netboot mini.iso doesn't support UEFI boot
Add my vote for getting Ubuntu mini.iso compliant with Debian and currently-common sense overall. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1429030 Title: netboot mini.iso doesn't support UEFI boot To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/debian-installer/+bug/1429030/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1630413] Re: segfault in server/mpm/event/event.c:process_socket
> However, I would prefer that someone with more Apache experience reviewed the fix. Right, that was actually my (very unclear, sorry) point when I commented on upstream's interest in this, since they would be experienced reviewers. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1630413 Title: segfault in server/mpm/event/event.c:process_socket To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1630413/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1630413] Re: segfault in server/mpm/event/event.c:process_socket
> However, I would prefer that someone with more Apache experience reviewed the fix. Right, that was actually my (very unclear, sorry) point when I commented on upstream's interest in this, since they would be experienced reviewers. -- You received this bug notification because you are a member of Ubuntu Server, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/1630413 Title: segfault in server/mpm/event/event.c:process_socket To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1630413/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
Re: [Bug 1798313] Re: traceoute6 gives error sendto: Invalid argument
You can use the traceroute6 or traceroute from the package traceroute. On 9.12.2018 12.42, Jure Sah wrote: > Is there a workaround to get this working in Ubuntu 18.04, until the bug > is deemed important enough to actually fix? > -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1798313 Title: traceoute6 gives error sendto: Invalid argument To manage notifications about this bug go to: https://bugs.launchpad.net/iputils/+bug/1798313/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1798790] Re: Ubuntu 18.10 login screen never appears when using the Nvidia driver
GDM3 fails to start, stalled at 'started bpfilter' on my HP laptop (model hp15-ay016nr) which runs Intel graphics, no nVidia hardware or drivers. So, this is not strictly an nVidia issue, which began after a Sat 8 December upgrade. Booting previous kernels did not fix the problem. Disabling Wayland in /etc/gdm3/custom.conf also had no effect. I'm having a terrible time gathering system information because I can only log in to Gnome Shell as a Live Session User from the Ubuntu 18.10 Live Install USB drive -- or as root in Recovery Mode -- which results in limited access to user files and info on the installed system. Attempting to view many directories gets Access Denied You Don't Have Permissions. I even have trouble viewing my backup folders on my external USB drive, and I'm afraid I may lose access to them if I revert to 18.04 LTS, or install an alternate distro to replace the current Ubuntu 18.10. I'm not familiar with recent file system security "enhancements," but I think there have been changes with unanticipated consequences. I'm posting this as a temporary Live Session User off a Cosmic installation USB drive. None of my online account info is saved, and I have to search my pword/unname each time I visit any web site, it's a huge pain. I have been hampered in researching this, but I have seen the same symptoms reported by Arch Linux users as well. BTW, Cripton's tip above to enable networking did allow me to run 'apt update' in recovery mode to confirm no pending upgrades (so, no fixes pending.) But, unfortunately Resuming a normal boot did not result in gdm3 successfully starting for me. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1798790 Title: Ubuntu 18.10 login screen never appears when using the Nvidia driver To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gdm3/+bug/1798790/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1199511] Re: smartd service LogFile configuration points to messages instead of syslog
*** This bug is a duplicate of bug 752172 *** https://bugs.launchpad.net/bugs/752172 ** Merge proposal linked: https://code.launchpad.net/~kstenerud/ubuntu/+source/logwatch/+git/logwatch/+merge/354951 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1199511 Title: smartd service LogFile configuration points to messages instead of syslog To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/logwatch/+bug/1199511/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 752172] Re: Logwatch looks for afpd output in "messages", not in log files that afpd writes to
** Merge proposal linked: https://code.launchpad.net/~kstenerud/ubuntu/+source/logwatch/+git/logwatch/+merge/354951 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/752172 Title: Logwatch looks for afpd output in "messages", not in log files that afpd writes to To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/logwatch/+bug/752172/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1791587] Re: snapd ignores proxy settings set via core snap
** Changed in: snapd (Ubuntu) Status: New => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1791587 Title: snapd ignores proxy settings set via core snap To manage notifications about this bug go to: https://bugs.launchpad.net/snapd/+bug/1791587/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1806049] Please test proposed package
Hello Corey, or anyone else affected, Accepted ceilometer into rocky-proposed. The package will build now and be available in the Ubuntu Cloud Archive in a few hours, and then in the -proposed repository. Please help us by testing this new package. To enable the -proposed repository: sudo add-apt-repository cloud-archive:rocky-proposed sudo apt-get update Your feedback will aid us getting this update out to other Ubuntu users. If this package fixes the bug for you, please add a comment to this bug, mentioning the version of the package you tested, and change the tag from verification-rocky-needed to verification-rocky-done. If it does not fix the bug for you, please add a comment stating that, and change the tag to verification-rocky-failed. In either case, details of your testing will help us make a better decision. Further information regarding the verification process can be found at https://wiki.ubuntu.com/QATeam/PerformingSRUVerification . Thank you in advance! -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1806049 Title: [SRU] rocky stable releases To manage notifications about this bug go to: https://bugs.launchpad.net/cloud-archive/+bug/1806049/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1807678] Re: HUAWEI E15 50 HSDPA USB Stick device ID to be reported to Linux USB developers
The lack of support for deviceid 12d1:1001 in the linux serial driver option is not an usb_modeswitch bug. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1807678 Title: HUAWEI E15 50 HSDPA USB Stick device ID to be reported to Linux USB developers To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/usb-modeswitch/+bug/1807678/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1776563] Re: Acer Aspire A315 IOAPIC failure on Ubuntu 18.04, kernel hangs, can't load, kernel freeze (AMD Ryzen 5/Radeon/Raven) / AMDGPU Hybrid crash
noapic works fine only the bloody suspend isnt working -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1776563 Title: Acer Aspire A315 IOAPIC failure on Ubuntu 18.04, kernel hangs, can't load, kernel freeze (AMD Ryzen 5/Radeon/Raven) / AMDGPU Hybrid crash To manage notifications about this bug go to: https://bugs.launchpad.net/amd/+bug/1776563/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1806860] Re: Pulseaudio module-jack-source unable to connect to jackd2
Reported as suggested : https://gitlab.freedesktop.org/pulseaudio/pulseaudio/issues/604 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1806860 Title: Pulseaudio module-jack-source unable to connect to jackd2 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/jackd2/+bug/1806860/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1807594] Re: based on its behavior, gthumb appears to not have styled the headerbar with '.titlebar'
** Description changed: Themes which style the min/max/close buttons on gthumb's headrebar (e.g. 'Xfce Evolution 5.0.0', d/l here https://sourceforge.net/projects/xfce-evolution/files/xfce-evolution-5.0.0.zip/download) do not style those buttons in gthumb 3.6.1 - However, if i change the min/max/close buttons' gtk3 css selectors from 'headerbar.titlebar' to 'headerbar' (i did this in 'Xfce Evolution 5.6.0', d/l here https://sourceforge.net/projects/xfce-evolution/files/xfce-evolution-5.6.0.zip/download) then the buttons do get styled. Shoud i report this as a bug? + However, if i change the min/max/close buttons' gtk3 css selectors from 'headerbar.titlebar' to 'headerbar' (i did this in 'Xfce Evolution 5.6.0', d/l here https://sourceforge.net/projects/xfce-evolution/files/xfce-evolution-5.6.0.zip/download) then the buttons do get styled. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1807594 Title: based on its behavior, gthumb appears to not have styled the headerbar with '.titlebar' To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gthumb/+bug/1807594/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1776563] Re: Acer Aspire A315 IOAPIC failure on Ubuntu 18.04, kernel hangs, can't load, kernel freeze (AMD Ryzen 5/Radeon/Raven) / AMDGPU Hybrid crash
In manjaro 18 pci=noacpi disables dgpu. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1776563 Title: Acer Aspire A315 IOAPIC failure on Ubuntu 18.04, kernel hangs, can't load, kernel freeze (AMD Ryzen 5/Radeon/Raven) / AMDGPU Hybrid crash To manage notifications about this bug go to: https://bugs.launchpad.net/amd/+bug/1776563/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1807131] Re: Upgrade from 16.04 to 18.04 failed
Looking into other threads, I look into the log files to find obsolete packages and found these two: 2018-12-06 10:54:22,048 DEBUG Obsolete: docker-ce libsystemd-daemon0 Uninstalled them and all is working now, running the upgrade. ** Changed in: ubuntu-release-upgrader (Ubuntu) Assignee: (unassigned) => Ricardo Adao (ricadao) ** Changed in: ubuntu-release-upgrader (Ubuntu) Status: New => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1807131 Title: Upgrade from 16.04 to 18.04 failed To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubuntu-release-upgrader/+bug/1807131/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1798583] Re: the new Steam Controller driver breaks it on Steam
As I understand it, while this currently works on Bionic with 4.15 it will _stop_ working on Bionic when the new 4.18 HWE kernel gets released, without this patch applied. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1798583 Title: the new Steam Controller driver breaks it on Steam To manage notifications about this bug go to: https://bugs.launchpad.net/linux/+bug/1798583/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1587154] Re: --working-directory does not work anymore
Works for me, too. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1587154 Title: --working-directory does not work anymore To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gnome-terminal/+bug/1587154/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1802727] Re: virt-manager doesn't create or change the bridge and gives an error message
Hrm, there is no work on this bug here atm afaik. To be clear, there are: - bug 1802906 which is fixed in Disco Dingo (upcoming Ubuntu 19.04) - this bug here which is unclear what it actually is about atm. - is it the same bug as bug 1802906? - please test the code in 19.04 against your case - if it works, then we can consider 1802906 as SRU for Bionc/Cosmic - if so please provide a use case this is for on bug 1802906 - is it not the same? - please explain what makes this use case different. - please provide steps to re-produce this - only then can it be further discussed/debugged/fixed ** Changed in: virt-manager (Ubuntu) Status: In Progress => Incomplete ** Changed in: virt-manager (Ubuntu Bionic) Status: Triaged => Incomplete ** Changed in: virt-manager (Ubuntu Cosmic) Status: Triaged => Incomplete -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1802727 Title: virt-manager doesn't create or change the bridge and gives an error message To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/virt-manager/+bug/1802727/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1804625] Re: Please merge the fixes released in 10.3.5
This bug was fixed in the package open-vm-tools - 2:10.3.5-1 --- open-vm-tools (2:10.3.5-1) unstable; urgency=medium * [7061cb7] Update upstream source from tag 'upstream/10.3.5' Update to upstream version '10.3.5' with Debian dir 9315f58cab8ba1356c1e4aa77d714257dc0651f2 -- Bernd Zeimetz Fri, 09 Nov 2018 11:32:15 +0100 open-vm-tools (2:10.3.0-1) unstable; urgency=medium * [16acbc3] Remove PrivateTmp=yes. Thanks to Christian Ehrhardt (Closes: #905170) * [72aabb2] Add RequiresMountsFor=/tmp. Thanks to Christopher Odenbach (Closes: #900566) * [96bf0c5] Update upstream source from tag 'upstream/10.3.0' Update to upstream version '10.3.0' with Debian dir ace0137b2d17e039ddac188fdcd15f882119925a * [e5a9b82] Re-add .travis.yml * [83e043f] Refreshing patches -- Bernd Zeimetz Tue, 07 Aug 2018 23:41:00 +0200 ** Changed in: open-vm-tools (Ubuntu) Status: Triaged => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1804625 Title: Please merge the fixes released in 10.3.5 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/open-vm-tools/+bug/1804625/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs