[Bug 1926011] Re: groovy / focal fwupd sbat support

2021-05-18 Thread Yuan-Chen Cheng
One note: along the way of install shim from hirsute, it happened to me
that the machine can't properly boot to grub or fwupdx64. It just stops
at the vendor logo for quite a while.

I try to do more cross-test comparisons, however, it's not 100%
reproducible.

It seems to me that:

1. it's something that happens as an upgrade shim from the previous shim 
version.
2. As it's upgraded, and properly boot, then all sub-sequence reboots just work 
fine.

I think what I saw could need more tests. Plan to do that as we SRU back
to focal.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926011

Title:
  groovy / focal fwupd sbat support

To manage notifications about this bug go to:
https://bugs.launchpad.net/oem-priority/+bug/1926011/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1926011] Re: groovy / focal fwupd sbat support

2021-05-18 Thread Yuan-Chen Cheng
One note: along the way of install shim from hirsute, it happened to me
that the machine can't properly boot. It just stops at the vendor logo
for quite a while.

I try to do more cross-test comparisons, however, it's not 100%
reproducible.

It seems to me that:

1. it's something that happens as an upgrade shim from the previous shim 
version.
2. As it's upgraded, and properly boot, then all sub-sequence reboots just work 
fine.

I think what I saw could need more tests. Plan to do that as we SRU back
to focal.

** Tags removed: verification-needed-groovy
** Tags added: verification-done-groovy

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926011

Title:
  groovy / focal fwupd sbat support

To manage notifications about this bug go to:
https://bugs.launchpad.net/oem-priority/+bug/1926011/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1928758] Re: All apt commands failed after upgrade to 27.0.2~20.04.1

2021-05-18 Thread Ulrik Sannsell
root@1tvsica02:/var/cache# apport-retrace -g 
/var/crash/_usr_lib_ubuntu-advantage_apt-esm-hook.0.crash
GNU gdb (Ubuntu 9.2-0ubuntu1~20.04) 9.2
Copyright (C) 2020 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later 
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.
Type "show copying" and "show warranty" for details.
This GDB was configured as "x86_64-linux-gnu".
Type "show configuration" for configuration details.
For bug reporting instructions, please see:
.
Find the GDB manual and other documentation resources online at:
.

For help, type "help".
Type "apropos word" to search for commands related to "word".
Reading symbols from /usr/lib/ubuntu-advantage/apt-esm-hook...
(No debugging symbols found in /usr/lib/ubuntu-advantage/apt-esm-hook)
[New LWP 23957]
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
Core was generated by `/usr/lib/ubuntu-advantage/apt-esm-hook pre-invoke'.
Program terminated with signal SIGSEGV, Segmentation fault.
#0  __strlen_avx2 () at ../sysdeps/x86_64/multiarch/strlen-avx2.S:65
65  ../sysdeps/x86_64/multiarch/strlen-avx2.S: No such file or directory.
(gdb) show args
Argument list to give program being debugged when it is started is "".
(gdb) back
#0  __strlen_avx2 () at ../sysdeps/x86_64/multiarch/strlen-avx2.S:65
#1  0x7fcaa129e1d0 in std::__cxx11::basic_string, std::allocator >::compare(char const*) const () 
from /usr/lib/x86_64-linux-gnu/libstdc++.so.6
#2  0x56515445f657 in ?? ()
#3  0x7fcaa0f730b3 in __libc_start_main (main=0x56515445f180, argc=2, 
argv=0x7ffe9b038d98, init=, fini=, 
rtld_fini=,
stack_end=0x7ffe9b038d88) at ../csu/libc-start.c:308
#4  0x5651544617ee in ?? ()
(gdb) back
#0  __strlen_avx2 () at ../sysdeps/x86_64/multiarch/strlen-avx2.S:65
#1  0x7fcaa129e1d0 in std::__cxx11::basic_string, std::allocator >::compare(char const*) const () 
from /usr/lib/x86_64-linux-gnu/libstdc++.so.6
#2  0x56515445f657 in ?? ()
#3  0x7fcaa0f730b3 in __libc_start_main (main=0x56515445f180, argc=2, 
argv=0x7ffe9b038d98, init=, fini=, 
rtld_fini=,
stack_end=0x7ffe9b038d88) at ../csu/libc-start.c:308
#4  0x5651544617ee in ?? ()

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1928758

Title:
  All apt commands failed after upgrade to 27.0.2~20.04.1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-advantage-tools/+bug/1928758/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1928780] Comment bridged from LTC Bugzilla

2021-05-18 Thread bugproxy
--- Comment From heinz-werner_se...@de.ibm.com 2021-05-19 02:22 EDT---
Also to be added to 3.16 (impish) . I missed that.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1928780

Title:
  [UBUNTU 21.04] openCryptoki: Soft token does not check if an EC key is
  valid

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1928780/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1907262] Re: raid10: discard leads to corrupted file system

2021-05-18 Thread Matthew Ruffell
Hi Thimo,

Thanks for helping test! I really appreciate it. It is great to hear
that you haven't had any trouble with the test kernel.

Just a quick update on the state of the Raid10 patchset. I submitted
them for SRU for the current cycle, and the kernel team wrote back to me
asking for more testing to be done before they make a decision to
include them in the Ubuntu kernels.

I am currently looking into longer running tests.

At the moment, I am using a cloud instance as my personal computer with
4x scratch NVMe disks built as a Raid10 array with the same 5.4 test
kernel, and I put my /home directory on the raid array. Everything is
okay so far.

I am planing to submit the patches for SRU to the next kernel SRU cycle,
so hopefully we can get them reviewed and accepted then.

I hope things are still running nice and stable on your side. I'll let
you know how I get on with my /home on a Raid10 array, and when I next
submit the patches for SRU.

Thanks,
Matthew

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1907262

Title:
  raid10: discard leads to corrupted file system

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1907262/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1926011] Re: groovy / focal fwupd sbat support

2021-05-18 Thread Yuan-Chen Cheng
I install groovy the same machine as in lp:1921539, #12

Machine: Dell Latitude 5300
BIOS: 1.10.4

and install fwupd 1.4.7-0~20.10.2 / fwupd-signed 1.30.2+1.4.7-0~20.10.2
from the proposed channel.

sbat section exists in both fwupdx64.efi.signed and fwupdx64.efi by
using command: objdump -h fwupdx64.efi.signed.

install shim 15.4-0ubuntu2 / shim-signed 1.47+15.4-0ubuntu2 from hirsute
on the same machine, and turned on secure boot, then I use below command

fwupdmgr install
9da74134678173a97e2d3eb4a79f0beba0e43e85155777e040396bad6b70d0b4-firmware.cab
--allow-reinstall

to re-install bios fw. I reply "Y" to reboot, and the machine reboots
properly into fwupdx64.efi, then it flsh the bios and then reboots to
ubuntu as expected!

Given the above verification result, the verification is passed.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926011

Title:
  groovy / focal fwupd sbat support

To manage notifications about this bug go to:
https://bugs.launchpad.net/oem-priority/+bug/1926011/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1928758] Re: All apt commands failed after upgrade to 27.0.2~20.04.1

2021-05-18 Thread Ulrik Sannsell
Installed gdb as well to try and figure out what is wrong with apt-esm-
hook which seems to cause the core dump.

ot@1tvsica02:/etc/apt# gdb /usr/lib/ubuntu-advantage/apt-esm-hook
GNU gdb (Ubuntu 9.2-0ubuntu1~20.04) 9.2
Copyright (C) 2020 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later 
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.
Type "show copying" and "show warranty" for details.
This GDB was configured as "x86_64-linux-gnu".
Type "show configuration" for configuration details.
For bug reporting instructions, please see:
.
Find the GDB manual and other documentation resources online at:
.

For help, type "help".
Type "apropos word" to search for commands related to "word"...
Reading symbols from /usr/lib/ubuntu-advantage/apt-esm-hook...
(No debugging symbols found in /usr/lib/ubuntu-advantage/apt-esm-hook)
(gdb) run
Starting program: /usr/lib/ubuntu-advantage/apt-esm-hook
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
[Detaching after fork from child process 4188974]
[Detaching after fork from child process 4188975]

Program received signal SIGSEGV, Segmentation fault.
__strlen_avx2 () at ../sysdeps/x86_64/multiarch/strlen-avx2.S:65
65  ../sysdeps/x86_64/multiarch/strlen-avx2.S: No such file or directory.
(gdb)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1928758

Title:
  All apt commands failed after upgrade to 27.0.2~20.04.1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-advantage-tools/+bug/1928758/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1921104] Comment bridged from LTC Bugzilla

2021-05-18 Thread bugproxy
--- Comment From heinz-werner_se...@de.ibm.com 2021-05-19 02:18 EDT---
IBM Bugzilla status->closed, Fix Released with all requested distros.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1921104

Title:
  net/mlx5e: Add missing capability check for uplink follow

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1921104/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1926011] Re: groovy / focal fwupd sbat support

2021-05-18 Thread Yuan-Chen Cheng
** Changed in: oem-priority
   Status: Confirmed => In Progress

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926011

Title:
  groovy / focal fwupd sbat support

To manage notifications about this bug go to:
https://bugs.launchpad.net/oem-priority/+bug/1926011/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1928642] Re: [SRU] libreoffice 7.0.6 for groovy

2021-05-18 Thread Rico Tzschichholz
** Changed in: libreoffice (Ubuntu)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1928642

Title:
  [SRU] libreoffice 7.0.6 for groovy

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libreoffice/+bug/1928642/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Re: [Bug 1912057] Re: Power consumption higher after suspend - Ubuntu 20.10 on Asus UX425JA

2021-05-18 Thread koba
@Henrik,
forget to reset the patch that disables d3cold_allowed and please try this
again. thanks
the d3cold_allowed shoube 1.
https://drive.google.com/drive/folders/17qeSGLKz8hR8TLsr35qS_4RSDUZcpaLu?usp=sharing

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1912057

Title:
  Power consumption higher after suspend - Ubuntu 20.10 on Asus UX425JA

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1912057/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1928791] Re: gnome-shell runs on 60--100% CPU usage

2021-05-18 Thread Daniel van Vugt
Also, do you have any animated indicators in your panel like indicator-
multiload? (I am thinking of bug 784055)

How about apps that are rendering constantly? Web browsers? Which ones?
What apps are close to gnome-shell in the 'top' list?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1928791

Title:
  gnome-shell runs on 60--100% CPU usage

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gnome-shell/+bug/1928791/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1925008] Re: no memory hot-plugging in cloud-images

2021-05-18 Thread Olaf Schmerse
root@ubuntu:~# cat /etc/apt/sources.list.d/ubuntu-focal-proposed.list
# Enable Ubuntu proposed archive
deb http://archive.ubuntu.com/ubuntu/ focal-proposed restricted main multiverse 
universe

root@ubuntu:~# apt policy linux-image-kvm
linux-image-kvm:
  Installed: 5.4.0.1033.31
  Candidate: 5.4.0.1039.37
  Version table:
 5.4.0.1040.38 400
400 http://archive.ubuntu.com/ubuntu focal-proposed/main amd64 Packages
 5.4.0.1039.37 500
500 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 Packages
500 http://security.ubuntu.com/ubuntu focal-security/main amd64 Packages
 *** 5.4.0.1033.31 100
100 /var/lib/dpkg/status
 5.4.0.1009.9 500
500 http://archive.ubuntu.com/ubuntu focal/main amd64 Packages

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1925008

Title:
  no memory hot-plugging in cloud-images

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-images/+bug/1925008/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1912371] Re: [MIR] flashrom + libftdi

2021-05-18 Thread Alex Murray
I am trying to do the security review of flashrom for this MIR but
currently it FTBFS with the attached debdiff in comment 9 - the build
log is attached. Can this please be resolved (along with removing the
'WILLIAM we're doing tests!' part of the output :)

** Attachment added: "flashrom_1.2-5ubuntu1_amd64-2021-05-19T04:46:52Z.build"
   
https://bugs.launchpad.net/ubuntu/+source/flashrom/+bug/1912371/+attachment/5498638/+files/flashrom_1.2-5ubuntu1_amd64-2021-05-19T04%3A46%3A52Z.build

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1912371

Title:
  [MIR] flashrom + libftdi

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/flashrom/+bug/1912371/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1924888] Re: gnome-disks can't create exfat partitions on Hirsute with the Samsung provided tools.

2021-05-18 Thread Sebastien Bacher
Hey Chris, as written on bug #1925822 for Lukasz that's on our merge
list, we will try to get to it today

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1924888

Title:
  gnome-disks can't create exfat partitions on Hirsute with the Samsung
  provided tools.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/udisks2/+bug/1924888/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1533554] Re: Duplicate package entries shown when listing by package origin

2021-05-18 Thread Ján Koštial
The same problem in Linux Mint (Ubuntu derivative).

I think duplicates are showing when the same package exists in two or more 
repos.
Synaptic is combining package with repo so if package exists in two repos then 
the 4 identical packages are displayed (2 repos x 2 packages)...

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1533554

Title:
  Duplicate package entries shown when listing by package origin

To manage notifications about this bug go to:
https://bugs.launchpad.net/linuxmint/+bug/1533554/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1802005] Re: socket is inaccessible for libvirt-dbus

2021-05-18 Thread Launchpad Bug Tracker
This bug was fixed in the package libvirt-dbus - 1.4.0-2ubuntu0.1

---
libvirt-dbus (1.4.0-2ubuntu0.1) hirsute; urgency=medium

  * d/postinst: add libvirtdbus to group libvirt to be able to access the
sockets of libvirtd (LP: #1802005)

 -- Christian Ehrhardt   Fri, 23 Apr
2021 12:25:41 +0200

** Changed in: libvirt-dbus (Ubuntu Hirsute)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1802005

Title:
  socket is inaccessible for libvirt-dbus

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libvirt/+bug/1802005/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1802005] Update Released

2021-05-18 Thread Chris Halse Rogers
The verification of the Stable Release Update for libvirt-dbus has
completed successfully and the package is now being released to
-updates.  Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report.  In
the event that you encounter a regression using the package from
-updates please report a new bug using ubuntu-bug and tag the bug report
regression-update so we can easily find any regressions.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1802005

Title:
  socket is inaccessible for libvirt-dbus

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libvirt/+bug/1802005/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1924888] Re: gnome-disks can't create exfat partitions on Hirsute with the Samsung provided tools.

2021-05-18 Thread Chris Halse Rogers
This looks like a candidate for release into hirsute-updates, but it's
not clear whether or not this is fixed in impish yet. If it's fixed in
impish could you please update the bug status, and if it's not fixed in
impish yet could you please fix it there? :)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1924888

Title:
  gnome-disks can't create exfat partitions on Hirsute with the Samsung
  provided tools.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/udisks2/+bug/1924888/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1859592] Re: Bluetooth unavailable after updates - Reading Intel version information failed (-110)

2021-05-18 Thread Kai-Heng Feng
This patch may help, please give it a try:
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=8bf7111b4bda00ae82e2de0cd871af997c3f2e9b

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1859592

Title:
  Bluetooth unavailable after updates - Reading Intel version
  information failed (-110)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1859592/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1912262] Re: Kubuntu 21.04 QA Test Installer Crashed during OEM Install

2021-05-18 Thread Launchpad Bug Tracker
[Expired for ubiquity (Ubuntu) because there has been no activity for 60
days.]

** Changed in: ubiquity (Ubuntu)
   Status: Incomplete => Expired

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1912262

Title:
  Kubuntu 21.04 QA Test Installer Crashed during OEM Install

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubiquity/+bug/1912262/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1914143] Re: vmxnet3: update to latest ToT

2021-05-18 Thread Launchpad Bug Tracker
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]

** Changed in: linux (Ubuntu)
   Status: Incomplete => Expired

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1914143

Title:
  vmxnet3: update to latest ToT

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1914143/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1923415] Re: Hirsute update: v5.11.13 upstream stable release

2021-05-18 Thread Kelsey Skunberg
** No longer affects: linux-aws (Ubuntu)

** No longer affects: linux-aws (Ubuntu Hirsute)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1923415

Title:
  Hirsute update: v5.11.13 upstream stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1923415/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1926999] Re: Hirsute update: v5.11.16 upstream stable release

2021-05-18 Thread Kelsey Skunberg
** No longer affects: linux-aws (Ubuntu)

** No longer affects: linux-aws (Ubuntu Hirsute)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926999

Title:
  Hirsute update: v5.11.16 upstream stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1926999/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1850667] Re: Switch to "unified" cgroup hierarchy (cgroupv2)

2021-05-18 Thread Launchpad Bug Tracker
Status changed to 'Confirmed' because the bug affects multiple users.

** Changed in: systemd (Ubuntu)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1850667

Title:
  Switch to "unified" cgroup hierarchy (cgroupv2)

To manage notifications about this bug go to:
https://bugs.launchpad.net/lxc/+bug/1850667/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1926165] Re: Bass speakers not enabled on Lenovo Yoga 9i

2021-05-18 Thread Hui Wang
Please test with generic kernel, and set both DAC1 and DAC2 to maximum,
download the attached set-verb.sh, chmod a+x set-verb.sh, sudo ./set-
verb.sh. Check if the bass spk could output sound?

thx.


** Attachment added: "set-verb.sh"
   
https://bugs.launchpad.net/ubuntu/+source/alsa-driver/+bug/1926165/+attachment/5498623/+files/set-verb.sh

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926165

Title:
  Bass speakers not enabled on Lenovo Yoga 9i

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/alsa-driver/+bug/1926165/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1921211] Re: Taking a memory dump of user mode process on Xenial hosts causes bugcheck/kernel panic and core dump

2021-05-18 Thread Steve Beattie
This was fixed with linux 4.4.0-211.243 in Ubuntu 16.04 ESM (Infra).

** Changed in: linux (Ubuntu Xenial)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1921211

Title:
  Taking a memory dump of user mode process on Xenial hosts causes
  bugcheck/kernel panic and core dump

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1921211/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1926378] Re: SRU pi-bluetooth from hirsute to focal to enable all models

2021-05-18 Thread Chris Halse Rogers
This is apparently fixed in Hirsute, and now the Focal SRU, but that
would seem to leave Groovy without working bluetooth on the Pi 400 and
CM4? Is there any plan for an SRU to Groovy, too?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926378

Title:
  SRU pi-bluetooth from hirsute to focal to enable all models

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/pi-bluetooth/+bug/1926378/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1928493] Re: package mysql-server-8.0 8.0.25-0ubuntu0.20.04.1 failed to install/upgrade: installed mysql-server-8.0 package post-installation script subprocess returned error exit status 1

2021-05-18 Thread Launchpad Bug Tracker
Status changed to 'Confirmed' because the bug affects multiple users.

** Changed in: mysql-8.0 (Ubuntu)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1928493

Title:
  package mysql-server-8.0 8.0.25-0ubuntu0.20.04.1 failed to
  install/upgrade: installed mysql-server-8.0 package post-installation
  script subprocess returned error exit status 1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/mysql-8.0/+bug/1928493/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1928750] Re: Support mic-mute on Dell's platform

2021-05-18 Thread koba
** Also affects: linux-oem-5.10 (Ubuntu Impish)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Impish)
 Assignee: (unassigned) => koba (kobako)

** Changed in: linux (Ubuntu Impish)
   Status: New => In Progress

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1928750

Title:
  Support mic-mute on Dell's platform

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1928750/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1879341] Re: test_350_retpolined_modules from ubuntu_qrt_kernel_security failed on F-OEM-5.6

2021-05-18 Thread Steve Beattie
** Changed in: linux-oem-5.6 (Ubuntu)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1879341

Title:
  test_350_retpolined_modules from ubuntu_qrt_kernel_security failed on
  F-OEM-5.6

To manage notifications about this bug go to:
https://bugs.launchpad.net/qa-regression-testing/+bug/1879341/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1793715] Re: VMWare Guest OS Customization will fail for Ubuntu 18.04 Server LiveCD

2021-05-18 Thread Pengpeng Sun
Hello Lukáš,

You mentioned "initiate it with cloud-init (userdata + metadata)", may I
know how did you initiate userdata and metadata? also you mentioned
guestinfo.userdata and guestinfo.metadata, did you use the way described
here: https://github.com/vmware/cloud-init-vmware-guestinfo ?

Another question: did you trigger guest customization on the VM? if not,
you needn't disable guest customization from the vmware-toolbox-cmd.

There should be a default user 'ubuntu' which is configured in
/etc/cloud/cloud.cfg, I think you will be asked to set password for this
user when you deploy focal-server-cloudimg-amd64.ova on ESXi(I'm not
sure what free version means, were you using vCenter server?)

At last, we need cloud-init logs to see what really happened in VM,
command 'sudo cloud-init collect-logs' should help to collect them.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1793715

Title:
  VMWare Guest OS Customization will fail for Ubuntu 18.04 Server
  LiveCD

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/cloud-init/+bug/1793715/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1926254] Re: x509 Certificate verification fails when basicConstraints=CA:FALSE, pathlen:0 on self-signed leaf certs

2021-05-18 Thread Launchpad Bug Tracker
This bug was fixed in the package openssl - 1.1.1f-1ubuntu4.4

---
openssl (1.1.1f-1ubuntu4.4) groovy; urgency=medium

  * Allow x509 certificates which set basicConstraints=CA:FALSE,pathlen:0
to validate, as it is common on self-signed leaf certificates.
(LP: #1926254)
- d/p/lp-1926254-1-Allow-certificates-with-Basic-Constraints-CA-fa.patch
- d/p/lp-1926254-2-Set-X509_V_ERR_INVALID_EXTENSION-error-for-inva.patch
- d/p/lp-1926254-3-Add-test-cases-for-the-non-CA-certificate-with-.patch
  * Split d/p/pr12272.patch into multiple patchfiles to fix dpkg-source
error when attempting to build a source package, due to pr12272.patch
patching files multiple times within the same patch. (LP: #1927161)
- d/p/lp-1927161-1-x86-Add-endbranch-to-indirect-branch-targets-fo.patch
- d/p/lp-1927161-2-Use-swapcontext-for-Intel-CET.patch
- d/p/lp-1927161-3-x86-Always-generate-note-gnu-property-section-f.patch
- d/p/lp-1927161-4-x86_64-Always-generate-note-gnu-property-sectio.patch
- d/p/lp-1927161-5-x86_64-Add-endbranch-at-function-entries-for-In.patch

 -- Matthew Ruffell   Wed, 05 May 2021
12:13:30 +1200

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926254

Title:
  x509 Certificate verification fails when
  basicConstraints=CA:FALSE,pathlen:0 on self-signed leaf certs

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1926254/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1926254] Re: x509 Certificate verification fails when basicConstraints=CA:FALSE, pathlen:0 on self-signed leaf certs

2021-05-18 Thread Launchpad Bug Tracker
This bug was fixed in the package openssl - 1.1.1f-1ubuntu2.4

---
openssl (1.1.1f-1ubuntu2.4) focal; urgency=medium

  * Allow x509 certificates which set basicConstraints=CA:FALSE,pathlen:0
to validate, as it is common on self-signed leaf certificates.
(LP: #1926254)
- d/p/lp-1926254-1-Allow-certificates-with-Basic-Constraints-CA-fa.patch
- d/p/lp-1926254-2-Set-X509_V_ERR_INVALID_EXTENSION-error-for-inva.patch
- d/p/lp-1926254-3-Add-test-cases-for-the-non-CA-certificate-with-.patch

 -- Matthew Ruffell   Wed, 28 Apr 2021
12:37:28 +1200

** Changed in: openssl (Ubuntu Focal)
   Status: Fix Committed => Fix Released

** Changed in: openssl (Ubuntu Groovy)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926254

Title:
  x509 Certificate verification fails when
  basicConstraints=CA:FALSE,pathlen:0 on self-signed leaf certs

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1926254/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1927161] Re: dpkg-source: error: diff 'openssl/debian/patches/pr12272.patch' patches files multiple times; split the diff in multiple files or merge the hunks into a single one

2021-05-18 Thread Launchpad Bug Tracker
This bug was fixed in the package openssl - 1.1.1f-1ubuntu4.4

---
openssl (1.1.1f-1ubuntu4.4) groovy; urgency=medium

  * Allow x509 certificates which set basicConstraints=CA:FALSE,pathlen:0
to validate, as it is common on self-signed leaf certificates.
(LP: #1926254)
- d/p/lp-1926254-1-Allow-certificates-with-Basic-Constraints-CA-fa.patch
- d/p/lp-1926254-2-Set-X509_V_ERR_INVALID_EXTENSION-error-for-inva.patch
- d/p/lp-1926254-3-Add-test-cases-for-the-non-CA-certificate-with-.patch
  * Split d/p/pr12272.patch into multiple patchfiles to fix dpkg-source
error when attempting to build a source package, due to pr12272.patch
patching files multiple times within the same patch. (LP: #1927161)
- d/p/lp-1927161-1-x86-Add-endbranch-to-indirect-branch-targets-fo.patch
- d/p/lp-1927161-2-Use-swapcontext-for-Intel-CET.patch
- d/p/lp-1927161-3-x86-Always-generate-note-gnu-property-section-f.patch
- d/p/lp-1927161-4-x86_64-Always-generate-note-gnu-property-sectio.patch
- d/p/lp-1927161-5-x86_64-Add-endbranch-at-function-entries-for-In.patch

 -- Matthew Ruffell   Wed, 05 May 2021
12:13:30 +1200

** Changed in: openssl (Ubuntu Groovy)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1927161

Title:
  dpkg-source: error: diff 'openssl/debian/patches/pr12272.patch'
  patches files multiple times; split the diff in multiple files or
  merge the hunks into a single one

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1927161/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1928744] Re: Disk IO very slow on kernel 4.15.0-142-generic

2021-05-18 Thread Mariusz
Unable to run apport-collect 1928744 command.

** Changed in: linux (Ubuntu)
   Status: Incomplete => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1928744

Title:
  Disk IO very slow on kernel 4.15.0-142-generic

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1928744/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1928888] Missing required logs.

2021-05-18 Thread Ubuntu Kernel Bot
This bug is missing log files that will aid in diagnosing the problem.
While running an Ubuntu kernel (not a mainline or third-party kernel)
please enter the following command in a terminal window:

apport-collect 192

and then change the status of the bug to 'Confirmed'.

If, due to the nature of the issue you have encountered, you are unable
to run this command, please add a comment stating that fact and change
the bug status to 'Confirmed'.

This change has been made by an automated script, maintained by the
Ubuntu Kernel Team.

** Changed in: linux (Ubuntu)
   Status: New => Incomplete

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/192

Title:
  test_utils_testsuite from ubuntu_qrt_apparmor linux ADT test failure
  with linux/5.11.0-18.19

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/192/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1928889] Missing required logs.

2021-05-18 Thread Ubuntu Kernel Bot
This bug is missing log files that will aid in diagnosing the problem.
While running an Ubuntu kernel (not a mainline or third-party kernel)
please enter the following command in a terminal window:

apport-collect 1928889

and then change the status of the bug to 'Confirmed'.

If, due to the nature of the issue you have encountered, you are unable
to run this command, please add a comment stating that fact and change
the bug status to 'Confirmed'.

This change has been made by an automated script, maintained by the
Ubuntu Kernel Team.

** Changed in: linux (Ubuntu)
   Status: New => Incomplete

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1928889

Title:
  evlink_port_split linux ADT test failure with linux/5.11.0-18.19 (
  list index out of range)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1928889/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1928890] Missing required logs.

2021-05-18 Thread Ubuntu Kernel Bot
This bug is missing log files that will aid in diagnosing the problem.
While running an Ubuntu kernel (not a mainline or third-party kernel)
please enter the following command in a terminal window:

apport-collect 1928890

and then change the status of the bug to 'Confirmed'.

If, due to the nature of the issue you have encountered, you are unable
to run this command, please add a comment stating that fact and change
the bug status to 'Confirmed'.

This change has been made by an automated script, maintained by the
Ubuntu Kernel Team.

** Changed in: linux (Ubuntu)
   Status: New => Incomplete

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1928890

Title:
  vrf_route_leaking linux ADT test failure with linux/5.11.0-18.19 (Ping
  received ICMP Packet too big)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1928890/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1928888] Re: test_utils_testsuite from ubuntu_qrt_apparmor linux ADT test failure with linux/5.11.0-18.19

2021-05-18 Thread Kelsey Skunberg
** Summary changed:

- test_utils_testsuite linux ADT test failure with linux/5.11.0-18.19 (ERROR: 
capability CAP_CHECKPOINT_RESTORE not found in severity.db)
+ test_utils_testsuite from ubuntu_qrt_apparmor linux ADT test failure with 
linux/5.11.0-18.19

** Description changed:

  This is a scripted bug report about ADT failures while running linux
  tests for linux/5.11.0-18.19 on hirsute. Whether this is caused by the
  dep8 tests of the tested source or the kernel has yet to be determined.
  
  Not a regression. Found to occur previously on hirsute/linux
  5.11.0-14.15
  
  Testing failed on:
  amd64: 
https://autopkgtest.ubuntu.com/results/autopkgtest-hirsute/hirsute/amd64/l/linux/20210515_005957_75e5a@/log.gz
  arm64: 
https://autopkgtest.ubuntu.com/results/autopkgtest-hirsute/hirsute/arm64/l/linux/20210513_203508_96fd3@/log.gz
  ppc64el: 
https://autopkgtest.ubuntu.com/results/autopkgtest-hirsute/hirsute/ppc64el/l/linux/20210513_163708_c0203@/log.gz
  s390x: 
https://autopkgtest.ubuntu.com/results/autopkgtest-hirsute/hirsute/s390x/l/linux/20210513_144454_54b04@/log.gz
+ 
+ 
+   test_zz_cleanup_source_tree (__main__.ApparmorTestsuites)
+   Cleanup downloaded source ... ok
+   
+   ==
+   FAIL: test_utils_testsuite (__main__.ApparmorTestsuites)
+   Run utils (make check)
+   --
+   Traceback (most recent call last):
+ File 
"/tmp/autopkgtest.gBRfIs/build.V37/src/autotest/client/tmp/ubuntu_qrt_apparmor/src/qa-regression-testing/scripts/./test-apparmor.py",
 line 1841, in test_utils_testsuite
+   self.assertEqual(expected, rc, result + report)
+   AssertionError: 0 != 2 : Got exit code 2, expected 0
+   ERROR: capability CAP_CHECKPOINT_RESTORE not found in severity.db
+   make: *** [Makefile:81: check_severity_db] Error 1
+   
+   
+   ==
+   FAIL: test_utils_testsuite3 (__main__.ApparmorTestsuites)
+   Run utils (make check with python3)
+   --
+   Traceback (most recent call last):
+ File 
"/tmp/autopkgtest.gBRfIs/build.V37/src/autotest/client/tmp/ubuntu_qrt_apparmor/src/qa-regression-testing/scripts/./test-apparmor.py",
 line 1862, in test_utils_testsuite3
+   self.assertEqual(expected, rc, result + report)
+   AssertionError: 0 != 2 : Got exit code 2, expected 0
+   ERROR: capability CAP_CHECKPOINT_RESTORE not found in severity.db
+   make: *** [Makefile:81: check_severity_db] Error 1
+   
+   
+   --
+   Ran 58 tests in 1448.768s
+   
+   FAILED (failures=2)
+ 23:36:54 INFO |   END ERROR   ubuntu_qrt_apparmor.test-apparmor.py
ubuntu_qrt_apparmor.test-apparmor.pytimestamp=1621035414localtime=May 
14 23:36:54

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/192

Title:
  test_utils_testsuite from ubuntu_qrt_apparmor linux ADT test failure
  with linux/5.11.0-18.19

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/192/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1928890] [NEW] vrf_route_leaking linux ADT test failure with linux/5.11.0-18.19 (Ping received ICMP Packet too big)

2021-05-18 Thread Kelsey Skunberg
Public bug reported:

This is a scripted bug report about ADT failures while running linux
tests for linux/5.11.0-18.19 on hirsute. Whether this is caused by the
dep8 tests of the tested source or the kernel has yet to be determined.

Not a regression. Found to occur previously on hirsute/linux
5.11.0-14.15


Testing failed on:
amd64: 
https://autopkgtest.ubuntu.com/results/autopkgtest-hirsute/hirsute/amd64/l/linux/20210515_005957_75e5a@/log.gz
arm64: 
https://autopkgtest.ubuntu.com/results/autopkgtest-hirsute/hirsute/arm64/l/linux/20210513_203508_96fd3@/log.gz
ppc64el: 
https://autopkgtest.ubuntu.com/results/autopkgtest-hirsute/hirsute/ppc64el/l/linux/20210513_163708_c0203@/log.gz
s390x: 
https://autopkgtest.ubuntu.com/results/autopkgtest-hirsute/hirsute/s390x/l/linux/20210513_144454_54b04@/log.gz


00:09:30 DEBUG| [stdout] # selftests: net: vrf_route_leaking.sh
00:09:30 DEBUG| [stdout] # 
00:09:30 DEBUG| [stdout] # 
###
00:09:30 DEBUG| [stdout] # IPv4 (sym route): VRF ICMP ttl error route lookup 
ping
00:09:30 DEBUG| [stdout] # 
###
00:09:30 DEBUG| [stdout] # 
00:09:32 DEBUG| [stdout] # TEST: Basic IPv4 connectivity
   [ OK ]
00:09:32 DEBUG| [stdout] # TEST: Ping received ICMP ttl exceeded
   [ OK ]
00:09:32 DEBUG| [stdout] # 
00:09:32 DEBUG| [stdout] # 
###
00:09:32 DEBUG| [stdout] # IPv4 (sym route): VRF ICMP error route lookup 
traceroute
00:09:32 DEBUG| [stdout] # 
###
00:09:32 DEBUG| [stdout] # 
00:09:32 DEBUG| [stdout] # SKIP: Could not run IPV4 test without traceroute
00:09:32 DEBUG| [stdout] # 
00:09:32 DEBUG| [stdout] # 
###
00:09:32 DEBUG| [stdout] # IPv4 (sym route): VRF ICMP fragmentation error route 
lookup ping
00:09:32 DEBUG| [stdout] # 
###
00:09:32 DEBUG| [stdout] # 
00:09:34 DEBUG| [stdout] # TEST: Basic IPv4 connectivity
   [ OK ]
00:09:34 DEBUG| [stdout] # TEST: Ping received ICMP Frag needed 
   [ OK ]
00:09:34 DEBUG| [stdout] # 
00:09:34 DEBUG| [stdout] # 
###
00:09:34 DEBUG| [stdout] # IPv4 (asym route): VRF ICMP ttl error route lookup 
ping
00:09:34 DEBUG| [stdout] # 
###
00:09:34 DEBUG| [stdout] # 
00:09:36 DEBUG| [stdout] # TEST: Basic IPv4 connectivity
   [ OK ]
00:09:36 DEBUG| [stdout] # TEST: Ping received ICMP ttl exceeded
   [ OK ]
00:09:36 DEBUG| [stdout] # 
00:09:36 DEBUG| [stdout] # 
###
00:09:36 DEBUG| [stdout] # IPv4 (asym route): VRF ICMP error route lookup 
traceroute
00:09:36 DEBUG| [stdout] # 
###
00:09:36 DEBUG| [stdout] # 
00:09:36 DEBUG| [stdout] # SKIP: Could not run IPV4 test without traceroute
00:09:36 DEBUG| [stdout] # 
00:09:36 DEBUG| [stdout] # 
###
00:09:36 DEBUG| [stdout] # IPv6 (sym route): VRF ICMP ttl error route lookup 
ping
00:09:36 DEBUG| [stdout] # 
###
00:09:36 DEBUG| [stdout] # 
00:09:40 DEBUG| [stdout] # TEST: Basic IPv6 connectivity
   [FAIL]
00:09:40 DEBUG| [stdout] # TEST: Ping received ICMP Hop limit   
   [ OK ]
00:09:40 DEBUG| [stdout] # 
00:09:40 DEBUG| [stdout] # 
###
00:09:40 DEBUG| [stdout] # IPv6 (sym route): VRF ICMP error route lookup 
traceroute
00:09:40 DEBUG| [stdout] # 
###
00:09:40 DEBUG| [stdout] # 
00:09:42 DEBUG| [stdout] # TEST: Basic IPv6 connectivity
   [ OK ]
00:09:42 DEBUG| [stdout] # TEST: Traceroute6 reports a hop on r1
   [ OK ]
00:09:42 DEBUG| [stdout] # 
00:09:42 DEBUG| [stdout] # 
###
00:09:42 DEBUG| [stdout] # IPv6 (sym route): VRF ICMP fragmentation error route 
lookup ping
00:09:42 DEBUG| [stdout] # 
###
00:09:42 DEBUG| [stdout] # 
00:09:45 DEBUG| [stdout] # TEST: Basic IPv6 connectivity
   [FAIL]
00:09:47 DEBUG| [s

[Bug 1928888] [NEW] test_utils_testsuite from ubuntu_qrt_apparmor linux ADT test failure with linux/5.11.0-18.19

2021-05-18 Thread Kelsey Skunberg
Public bug reported:

This is a scripted bug report about ADT failures while running linux
tests for linux/5.11.0-18.19 on hirsute. Whether this is caused by the
dep8 tests of the tested source or the kernel has yet to be determined.

Not a regression. Found to occur previously on hirsute/linux
5.11.0-14.15

Testing failed on:
amd64: 
https://autopkgtest.ubuntu.com/results/autopkgtest-hirsute/hirsute/amd64/l/linux/20210515_005957_75e5a@/log.gz
arm64: 
https://autopkgtest.ubuntu.com/results/autopkgtest-hirsute/hirsute/arm64/l/linux/20210513_203508_96fd3@/log.gz
ppc64el: 
https://autopkgtest.ubuntu.com/results/autopkgtest-hirsute/hirsute/ppc64el/l/linux/20210513_163708_c0203@/log.gz
s390x: 
https://autopkgtest.ubuntu.com/results/autopkgtest-hirsute/hirsute/s390x/l/linux/20210513_144454_54b04@/log.gz


  test_zz_cleanup_source_tree (__main__.ApparmorTestsuites)
  Cleanup downloaded source ... ok
  
  ==
  FAIL: test_utils_testsuite (__main__.ApparmorTestsuites)
  Run utils (make check)
  --
  Traceback (most recent call last):
File 
"/tmp/autopkgtest.gBRfIs/build.V37/src/autotest/client/tmp/ubuntu_qrt_apparmor/src/qa-regression-testing/scripts/./test-apparmor.py",
 line 1841, in test_utils_testsuite
  self.assertEqual(expected, rc, result + report)
  AssertionError: 0 != 2 : Got exit code 2, expected 0
  ERROR: capability CAP_CHECKPOINT_RESTORE not found in severity.db
  make: *** [Makefile:81: check_severity_db] Error 1
  
  
  ==
  FAIL: test_utils_testsuite3 (__main__.ApparmorTestsuites)
  Run utils (make check with python3)
  --
  Traceback (most recent call last):
File 
"/tmp/autopkgtest.gBRfIs/build.V37/src/autotest/client/tmp/ubuntu_qrt_apparmor/src/qa-regression-testing/scripts/./test-apparmor.py",
 line 1862, in test_utils_testsuite3
  self.assertEqual(expected, rc, result + report)
  AssertionError: 0 != 2 : Got exit code 2, expected 0
  ERROR: capability CAP_CHECKPOINT_RESTORE not found in severity.db
  make: *** [Makefile:81: check_severity_db] Error 1
  
  
  --
  Ran 58 tests in 1448.768s
  
  FAILED (failures=2)
23:36:54 INFO | END ERROR   ubuntu_qrt_apparmor.test-apparmor.py
ubuntu_qrt_apparmor.test-apparmor.pytimestamp=1621035414localtime=May 
14 23:36:54

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: 5.11 hirsute kernel-adt-failure

** Tags added: kernel-adt-failure

** Summary changed:

- linux ADT test failure with linux/5.11.0-18.19
+ test_utils_testsuite linux ADT test failure with linux/5.11.0-18.19 (ERROR: 
capability CAP_CHECKPOINT_RESTORE not found in severity.db)

** Tags added: 5.11 hirsute

** Description changed:

  This is a scripted bug report about ADT failures while running linux
  tests for linux/5.11.0-18.19 on hirsute. Whether this is caused by the
  dep8 tests of the tested source or the kernel has yet to be determined.
  
+ 
+ Not a regression. Found to occur previously on hirsute/linux 5.11.0-14.15
+ 
  Testing failed on:
- amd64: 
https://autopkgtest.ubuntu.com/results/autopkgtest-hirsute/hirsute/amd64/l/linux/20210515_005957_75e5a@/log.gz
- arm64: 
https://autopkgtest.ubuntu.com/results/autopkgtest-hirsute/hirsute/arm64/l/linux/20210513_203508_96fd3@/log.gz
- ppc64el: 
https://autopkgtest.ubuntu.com/results/autopkgtest-hirsute/hirsute/ppc64el/l/linux/20210513_163708_c0203@/log.gz
- s390x: 
https://autopkgtest.ubuntu.com/results/autopkgtest-hirsute/hirsute/s390x/l/linux/20210513_144454_54b04@/log.gz
+ amd64: 
https://autopkgtest.ubuntu.com/results/autopkgtest-hirsute/hirsute/amd64/l/linux/20210515_005957_75e5a@/log.gz
+ arm64: 
https://autopkgtest.ubuntu.com/results/autopkgtest-hirsute/hirsute/arm64/l/linux/20210513_203508_96fd3@/log.gz
+ ppc64el: 
https://autopkgtest.ubuntu.com/results/autopkgtest-hirsute/hirsute/ppc64el/l/linux/20210513_163708_c0203@/log.gz
+ s390x: 
https://autopkgtest.ubuntu.com/results/autopkgtest-hirsute/hirsute/s390x/l/linux/20210513_144454_54b04@/log.gz

** Description changed:

  This is a scripted bug report about ADT failures while running linux
  tests for linux/5.11.0-18.19 on hirsute. Whether this is caused by the
  dep8 tests of the tested source or the kernel has yet to be determined.
  
- 
- Not a regression. Found to occur previously on hirsute/linux 5.11.0-14.15
+ Not a regression. Found to occur previously on hirsute/linux
+ 5.11.0-14.15
  
  Testing failed on:
  amd64: 
https://autopkgtest.ubuntu.com/results/autopkgtest-hirsute/hirsute/amd64/l/linux/20210515_005957_75e5a@/log.gz
  arm64: 
https://autopkgtest.ubuntu.com/results/autopkgtest-hirsute/hirsute/arm64/l/li

[Bug 1928889] [NEW] evlink_port_split linux ADT test failure with linux/5.11.0-18.19 ( list index out of range)

2021-05-18 Thread Kelsey Skunberg
Public bug reported:

This is a scripted bug report about ADT failures while running linux
tests for linux/5.11.0-18.19 on hirsute. Whether this is caused by the
dep8 tests of the tested source or the kernel has yet to be determined.

Not a regression. Found to occur previously on hirsute/linux
5.11.0-14.15

Testing failed on:
amd64: 
https://autopkgtest.ubuntu.com/results/autopkgtest-hirsute/hirsute/amd64/l/linux/20210515_005957_75e5a@/log.gz
arm64: 
https://autopkgtest.ubuntu.com/results/autopkgtest-hirsute/hirsute/arm64/l/linux/20210513_203508_96fd3@/log.gz
ppc64el: 
https://autopkgtest.ubuntu.com/results/autopkgtest-hirsute/hirsute/ppc64el/l/linux/20210513_163708_c0203@/log.gz
s390x: 
https://autopkgtest.ubuntu.com/results/autopkgtest-hirsute/hirsute/s390x/l/linux/20210513_144454_54b04@/log.gz


17:39:37 DEBUG| [stdout] # selftests: net: devlink_port_split.py
17:39:37 DEBUG| [stdout] # Traceback (most recent call last):
17:39:37 DEBUG| [stdout] #   File 
"/tmp/autopkgtest.ojlWKQ/build.XZw/src/autotest/client/tmp/ubuntu_kernel_selftests/src/linux/tools/testing/selftests/net/./devlink_port_split.py",
 line 277, in 
17:39:37 DEBUG| [stdout] # main()
17:39:37 DEBUG| [stdout] #   File 
"/tmp/autopkgtest.ojlWKQ/build.XZw/src/autotest/client/tmp/ubuntu_kernel_selftests/src/linux/tools/testing/selftests/net/./devlink_port_split.py",
 line 242, in main
17:39:37 DEBUG| [stdout] # dev = list(devs.keys())[0]
17:39:37 DEBUG| [stdout] # IndexError: list index out of range
17:39:37 DEBUG| [stdout] not ok 43 selftests: net: devlink_port_split.py # 
exit=1

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: 5.11 hirsute kernel-adt-failure

** Tags added: kernel-adt-failure

** Description changed:

  This is a scripted bug report about ADT failures while running linux
  tests for linux/5.11.0-18.19 on hirsute. Whether this is caused by the
  dep8 tests of the tested source or the kernel has yet to be determined.
  
+ Not a regression. Found to occur previously on hirsute/linux
+ 5.11.0-14.15
+ 
  Testing failed on:
- amd64: 
https://autopkgtest.ubuntu.com/results/autopkgtest-hirsute/hirsute/amd64/l/linux/20210515_005957_75e5a@/log.gz
- arm64: 
https://autopkgtest.ubuntu.com/results/autopkgtest-hirsute/hirsute/arm64/l/linux/20210513_203508_96fd3@/log.gz
- ppc64el: 
https://autopkgtest.ubuntu.com/results/autopkgtest-hirsute/hirsute/ppc64el/l/linux/20210513_163708_c0203@/log.gz
- s390x: 
https://autopkgtest.ubuntu.com/results/autopkgtest-hirsute/hirsute/s390x/l/linux/20210513_144454_54b04@/log.gz
+ amd64: 
https://autopkgtest.ubuntu.com/results/autopkgtest-hirsute/hirsute/amd64/l/linux/20210515_005957_75e5a@/log.gz
+ arm64: 
https://autopkgtest.ubuntu.com/results/autopkgtest-hirsute/hirsute/arm64/l/linux/20210513_203508_96fd3@/log.gz
+ ppc64el: 
https://autopkgtest.ubuntu.com/results/autopkgtest-hirsute/hirsute/ppc64el/l/linux/20210513_163708_c0203@/log.gz
+ s390x: 
https://autopkgtest.ubuntu.com/results/autopkgtest-hirsute/hirsute/s390x/l/linux/20210513_144454_54b04@/log.gz

** Tags added: 5.11 hirsute

** Summary changed:

- linux ADT test failure with linux/5.11.0-18.19
+ evlink_port_split linux ADT test failure with linux/5.11.0-18.19 ( list index 
out of range)

** Description changed:

  This is a scripted bug report about ADT failures while running linux
  tests for linux/5.11.0-18.19 on hirsute. Whether this is caused by the
  dep8 tests of the tested source or the kernel has yet to be determined.
  
  Not a regression. Found to occur previously on hirsute/linux
  5.11.0-14.15
  
  Testing failed on:
  amd64: 
https://autopkgtest.ubuntu.com/results/autopkgtest-hirsute/hirsute/amd64/l/linux/20210515_005957_75e5a@/log.gz
  arm64: 
https://autopkgtest.ubuntu.com/results/autopkgtest-hirsute/hirsute/arm64/l/linux/20210513_203508_96fd3@/log.gz
  ppc64el: 
https://autopkgtest.ubuntu.com/results/autopkgtest-hirsute/hirsute/ppc64el/l/linux/20210513_163708_c0203@/log.gz
  s390x: 
https://autopkgtest.ubuntu.com/results/autopkgtest-hirsute/hirsute/s390x/l/linux/20210513_144454_54b04@/log.gz
+ 
+ 
+ 17:39:37 DEBUG| [stdout] # selftests: net: devlink_port_split.py
+ 17:39:37 DEBUG| [stdout] # Traceback (most recent call last):
+ 17:39:37 DEBUG| [stdout] #   File 
"/tmp/autopkgtest.ojlWKQ/build.XZw/src/autotest/client/tmp/ubuntu_kernel_selftests/src/linux/tools/testing/selftests/net/./devlink_port_split.py",
 line 277, in 
+ 17:39:37 DEBUG| [stdout] # main()
+ 17:39:37 DEBUG| [stdout] #   File 
"/tmp/autopkgtest.ojlWKQ/build.XZw/src/autotest/client/tmp/ubuntu_kernel_selftests/src/linux/tools/testing/selftests/net/./devlink_port_split.py",
 line 242, in main
+ 17:39:37 DEBUG| [stdout] # dev = list(devs.keys())[0]
+ 17:39:37 DEBUG| [stdout] # IndexError: list index out of range
+ 17:39:37 DEBUG| [stdout] not ok 43 selftests: net: devlink_port_split.py # 
exit=1

-- 
You received this bug notification because you are a

[Bug 1885271] Re: kernel oops xr-usb-serial

2021-05-18 Thread Po-Hsu Lin
** Changed in: linux (Ubuntu)
   Status: Confirmed => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1885271

Title:
  kernel oops xr-usb-serial

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1885271/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1895905] Re: lubuntu groovy; flashing of sddm greeter

2021-05-18 Thread Chris Guiver
@piotr (peterq94)
refer comments #22 & #24 on this report. 

I've written about this (work-around) on Lubuntu's discourse I believe
too (https://discourse.lubuntu.me/t/login-screen-flashes/1634/7 and
maybe elsewhere too).  I've lost access to the d990  (which wasn't my
box) so I can't test further with it.

There are other bugs relating to sddm flashing (non-nvidia graphics)
which can likewise be mitigated as this was.  Support questions should
be directed to support venues; not bug trackers.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1895905

Title:
  lubuntu groovy; flashing of sddm greeter

To manage notifications about this bug go to:
https://bugs.launchpad.net/linux/+bug/1895905/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1926254] Update Released

2021-05-18 Thread Chris Halse Rogers
The verification of the Stable Release Update for openssl has completed
successfully and the package is now being released to -updates.
Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report.  In
the event that you encounter a regression using the package from
-updates please report a new bug using ubuntu-bug and tag the bug report
regression-update so we can easily find any regressions.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926254

Title:
  x509 Certificate verification fails when
  basicConstraints=CA:FALSE,pathlen:0 on self-signed leaf certs

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1926254/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1927161] Update Released

2021-05-18 Thread Chris Halse Rogers
The verification of the Stable Release Update for openssl has completed
successfully and the package is now being released to -updates.
Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report.  In
the event that you encounter a regression using the package from
-updates please report a new bug using ubuntu-bug and tag the bug report
regression-update so we can easily find any regressions.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1927161

Title:
  dpkg-source: error: diff 'openssl/debian/patches/pr12272.patch'
  patches files multiple times; split the diff in multiple files or
  merge the hunks into a single one

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1927161/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1928600] Missing required logs.

2021-05-18 Thread Ubuntu Kernel Bot
This bug is missing log files that will aid in diagnosing the problem.
While running an Ubuntu kernel (not a mainline or third-party kernel)
please enter the following command in a terminal window:

apport-collect 1928600

and then change the status of the bug to 'Confirmed'.

If, due to the nature of the issue you have encountered, you are unable
to run this command, please add a comment stating that fact and change
the bug status to 'Confirmed'.

This change has been made by an automated script, maintained by the
Ubuntu Kernel Team.

** Changed in: linux (Ubuntu)
   Status: New => Incomplete

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1928600

Title:
  [amdgpu] Gnome locks up with artifacts on screen

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1928600/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1928600] Re: [amdgpu] Gnome locks up with artifacts on screen

2021-05-18 Thread Daniel van Vugt
Thanks. Not all logs will show the problem since a full lockup might
prevent pending log messages from reaching the disk. The log in comment
#10 however looks related and ends with some problems in the 'amdgpu'
kernel driver, which is what I expected.

So this bug is now assigned to the correct component. You should try a
newer kernel like https://kernel.ubuntu.com/~kernel-
ppa/mainline/v5.13-rc2/amd64/ to see if the problem has already been
fixed.

** Changed in: linux (Ubuntu)
   Status: Incomplete => New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1928600

Title:
  [amdgpu] Gnome locks up with artifacts on screen

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1928600/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1928733] Re: Starting systemd Network Service fails with "Invalid argument"

2021-05-18 Thread David Cunningham
Hi Dan, thanks for that. Interestingly it was much harder to reproduce
the problem with debugging enabled, but we got it on about the 15th try.
The log is attached.


** Attachment added: "systemd-networkd-1.log"
   
https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1928733/+attachment/5498612/+files/systemd-networkd-1.log

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1928733

Title:
  Starting systemd Network Service fails with "Invalid argument"

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1928733/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1928744] Missing required logs.

2021-05-18 Thread Ubuntu Kernel Bot
This bug is missing log files that will aid in diagnosing the problem.
While running an Ubuntu kernel (not a mainline or third-party kernel)
please enter the following command in a terminal window:

apport-collect 1928744

and then change the status of the bug to 'Confirmed'.

If, due to the nature of the issue you have encountered, you are unable
to run this command, please add a comment stating that fact and change
the bug status to 'Confirmed'.

This change has been made by an automated script, maintained by the
Ubuntu Kernel Team.

** Changed in: linux (Ubuntu)
   Status: New => Incomplete

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1928744

Title:
  Disk IO very slow on kernel 4.15.0-142-generic

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1928744/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1914279] Update Released

2021-05-18 Thread Chris Halse Rogers
The verification of the Stable Release Update for rtl8812au has
completed successfully and the package is now being released to
-updates.  Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report.  In
the event that you encounter a regression using the package from
-updates please report a new bug using ubuntu-bug and tag the bug report
regression-update so we can easily find any regressions.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1914279

Title:
  linux from security may force reboots without complete dkms modules

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/acpi-call/+bug/1914279/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1914279] Re: linux from security may force reboots without complete dkms modules

2021-05-18 Thread Launchpad Bug Tracker
This bug was fixed in the package zfs-linux - 0.8.3-1ubuntu12.9

---
zfs-linux (0.8.3-1ubuntu12.9) focal; urgency=medium

  * No change rebuild in security pocket. LP: #1914279.

 -- Dimitri John Ledkov   Thu, 29 Apr 2021 16:09:45
+0100

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1914279

Title:
  linux from security may force reboots without complete dkms modules

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/acpi-call/+bug/1914279/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1914279] Re: linux from security may force reboots without complete dkms modules

2021-05-18 Thread Launchpad Bug Tracker
This bug was fixed in the package virtualbox-hwe - 6.1.16-dfsg-
6ubuntu1.20.04.2

---
virtualbox-hwe (6.1.16-dfsg-6ubuntu1.20.04.2) focal; urgency=medium

  * No change rebuild in security pocket. LP: #1914279.

 -- Dimitri John Ledkov   Thu, 29 Apr 2021 16:06:25
+0100

** Changed in: zfs-linux (Ubuntu Focal)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1914279

Title:
  linux from security may force reboots without complete dkms modules

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/acpi-call/+bug/1914279/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1914279] Re: linux from security may force reboots without complete dkms modules

2021-05-18 Thread Launchpad Bug Tracker
This bug was fixed in the package virtualbox -
6.1.16-dfsg-6~ubuntu1.20.04.2

---
virtualbox (6.1.16-dfsg-6~ubuntu1.20.04.2) focal; urgency=medium

  * No change rebuild in security pocket. LP: #1914279.

 -- Dimitri John Ledkov   Thu, 29 Apr 2021 16:42:15
+0100

** Changed in: virtualbox-hwe (Ubuntu Focal)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1914279

Title:
  linux from security may force reboots without complete dkms modules

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/acpi-call/+bug/1914279/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1914279] Re: linux from security may force reboots without complete dkms modules

2021-05-18 Thread Launchpad Bug Tracker
This bug was fixed in the package v4l2loopback - 0.12.3-1ubuntu0.4

---
v4l2loopback (0.12.3-1ubuntu0.4) focal; urgency=medium

  * No change rebuild in security pocket. LP: #1914279.

 -- Dimitri John Ledkov   Thu, 29 Apr 2021 16:09:12
+0100

** Changed in: virtualbox (Ubuntu Focal)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1914279

Title:
  linux from security may force reboots without complete dkms modules

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/acpi-call/+bug/1914279/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1914279] Re: linux from security may force reboots without complete dkms modules

2021-05-18 Thread Launchpad Bug Tracker
This bug was fixed in the package sysdig - 0.26.4-1ubuntu0.3

---
sysdig (0.26.4-1ubuntu0.3) focal; urgency=medium

  * No change rebuild in security pocket. LP: #1914279.

 -- Dimitri John Ledkov   Thu, 29 Apr 2021 16:09:03
+0100

** Changed in: v4l2loopback (Ubuntu Focal)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1914279

Title:
  linux from security may force reboots without complete dkms modules

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/acpi-call/+bug/1914279/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1914279] Re: linux from security may force reboots without complete dkms modules

2021-05-18 Thread Launchpad Bug Tracker
This bug was fixed in the package rtl8812au - 4.3.8.12175.20140902+dfsg-
0ubuntu13~20.04.2

---
rtl8812au (4.3.8.12175.20140902+dfsg-0ubuntu13~20.04.2) focal; urgency=medium

  * No change rebuild in security pocket. LP: #1914279.

 -- Dimitri John Ledkov   Thu, 29 Apr 2021 16:08:52
+0100

** Changed in: sysdig (Ubuntu Focal)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1914279

Title:
  linux from security may force reboots without complete dkms modules

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/acpi-call/+bug/1914279/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1914279] Re: linux from security may force reboots without complete dkms modules

2021-05-18 Thread Launchpad Bug Tracker
This bug was fixed in the package r8168 - 8.048.00-1ubuntu0.20.04.2

---
r8168 (8.048.00-1ubuntu0.20.04.2) focal; urgency=medium

  * No change rebuild in security pocket. LP: #1914279.

 -- Dimitri John Ledkov   Thu, 29 Apr 2021 16:08:42
+0100

** Changed in: rtl8812au (Ubuntu Focal)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1914279

Title:
  linux from security may force reboots without complete dkms modules

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/acpi-call/+bug/1914279/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1914279] Re: linux from security may force reboots without complete dkms modules

2021-05-18 Thread Launchpad Bug Tracker
This bug was fixed in the package oss4 - 4.2-build2010-5ubuntu6~20.04.2

---
oss4 (4.2-build2010-5ubuntu6~20.04.2) focal; urgency=medium

  * No change rebuild in security pocket. LP: #1914279.

 -- Dimitri John Ledkov   Thu, 29 Apr 2021 16:08:32
+0100

** Changed in: r8168 (Ubuntu Focal)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1914279

Title:
  linux from security may force reboots without complete dkms modules

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/acpi-call/+bug/1914279/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1914279] Re: linux from security may force reboots without complete dkms modules

2021-05-18 Thread Launchpad Bug Tracker
This bug was fixed in the package nvidia-graphics-drivers-340 -
340.108-0ubuntu5.20.04.2

---
nvidia-graphics-drivers-340 (340.108-0ubuntu5.20.04.2) focal; urgency=medium

  * No change rebuild in security pocket. LP: #1914279.

 -- Dimitri John Ledkov   Thu, 29 Apr 2021 16:05:47
+0100

** Changed in: oss4 (Ubuntu Focal)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1914279

Title:
  linux from security may force reboots without complete dkms modules

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/acpi-call/+bug/1914279/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1914279] Re: linux from security may force reboots without complete dkms modules

2021-05-18 Thread Launchpad Bug Tracker
This bug was fixed in the package lttng-modules -
2.12.2-1ubuntu1~20.04.2

---
lttng-modules (2.12.2-1ubuntu1~20.04.2) focal; urgency=medium

  * No change rebuild in security pocket. LP: #1914279.

 -- Dimitri John Ledkov   Thu, 29 Apr 2021 16:08:09
+0100

** Changed in: nvidia-graphics-drivers-340 (Ubuntu Focal)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1914279

Title:
  linux from security may force reboots without complete dkms modules

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/acpi-call/+bug/1914279/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1914279] Re: linux from security may force reboots without complete dkms modules

2021-05-18 Thread Launchpad Bug Tracker
This bug was fixed in the package lime-forensics - 1.9-1ubuntu0.2

---
lime-forensics (1.9-1ubuntu0.2) focal; urgency=medium

  * No change rebuild in security pocket. LP: #1914279.

 -- Dimitri John Ledkov   Thu, 29 Apr 2021 16:08:00
+0100

** Changed in: lttng-modules (Ubuntu Focal)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1914279

Title:
  linux from security may force reboots without complete dkms modules

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/acpi-call/+bug/1914279/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1914279] Re: linux from security may force reboots without complete dkms modules

2021-05-18 Thread Launchpad Bug Tracker
This bug was fixed in the package liblzf - 3.6-2~ubuntu1.20.04.2

---
liblzf (3.6-2~ubuntu1.20.04.2) focal; urgency=medium

  * No change rebuild in security pocket. LP: #1914279.

 -- Dimitri John Ledkov   Thu, 29 Apr 2021 17:11:50
+0100

** Changed in: lime-forensics (Ubuntu Focal)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1914279

Title:
  linux from security may force reboots without complete dkms modules

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/acpi-call/+bug/1914279/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1914279] Re: linux from security may force reboots without complete dkms modules

2021-05-18 Thread Launchpad Bug Tracker
This bug was fixed in the package iptables-netflow - 2.4-2ubuntu0.4

---
iptables-netflow (2.4-2ubuntu0.4) focal; urgency=medium

  * No change rebuild in security pocket. LP: #1914279.

 -- Dimitri John Ledkov   Thu, 29 Apr 2021 16:07:51
+0100

** Changed in: liblzf (Ubuntu Focal)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1914279

Title:
  linux from security may force reboots without complete dkms modules

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/acpi-call/+bug/1914279/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1914279] Re: linux from security may force reboots without complete dkms modules

2021-05-18 Thread Launchpad Bug Tracker
This bug was fixed in the package gost-crypto - 0.3.2-2ubuntu0.2

---
gost-crypto (0.3.2-2ubuntu0.2) focal; urgency=medium

  * No change rebuild in security pocket. LP: #1914279.

 -- Dimitri John Ledkov   Thu, 29 Apr 2021 16:07:41
+0100

** Changed in: iptables-netflow (Ubuntu Focal)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1914279

Title:
  linux from security may force reboots without complete dkms modules

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/acpi-call/+bug/1914279/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1914279] Re: linux from security may force reboots without complete dkms modules

2021-05-18 Thread Launchpad Bug Tracker
This bug was fixed in the package evdi - 1.7.0+dfsg-1ubuntu1~20.04.3

---
evdi (1.7.0+dfsg-1ubuntu1~20.04.3) focal; urgency=medium

  * No change rebuild in security pocket. LP: #1914279.

 -- Dimitri John Ledkov   Thu, 29 Apr 2021 16:07:32
+0100

** Changed in: gost-crypto (Ubuntu Focal)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1914279

Title:
  linux from security may force reboots without complete dkms modules

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/acpi-call/+bug/1914279/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1914279] Re: linux from security may force reboots without complete dkms modules

2021-05-18 Thread Launchpad Bug Tracker
This bug was fixed in the package dm-writeboost - 2.2.9-1ubuntu1.2

---
dm-writeboost (2.2.9-1ubuntu1.2) focal; urgency=medium

  * No change rebuild in security pocket. LP: #1914279.

 -- Dimitri John Ledkov   Thu, 29 Apr 2021 16:07:23
+0100

** Changed in: evdi (Ubuntu Focal)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1914279

Title:
  linux from security may force reboots without complete dkms modules

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/acpi-call/+bug/1914279/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1914279] Re: linux from security may force reboots without complete dkms modules

2021-05-18 Thread Launchpad Bug Tracker
This bug was fixed in the package dahdi-linux - 1:2.11.1~dfsg-1ubuntu6.2

---
dahdi-linux (1:2.11.1~dfsg-1ubuntu6.2) focal; urgency=medium

  * No change rebuild in security pocket. LP: #1914279.

 -- Dimitri John Ledkov   Thu, 29 Apr 2021 16:07:14
+0100

** Changed in: dm-writeboost (Ubuntu Focal)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1914279

Title:
  linux from security may force reboots without complete dkms modules

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/acpi-call/+bug/1914279/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1914279] Re: linux from security may force reboots without complete dkms modules

2021-05-18 Thread Launchpad Bug Tracker
This bug was fixed in the package bcmwl - 6.30.223.271+bdcom-
0ubuntu7~20.04.2

---
bcmwl (6.30.223.271+bdcom-0ubuntu7~20.04.2) focal; urgency=medium

  * No change rebuild in security pocket. LP: #1914279.

 -- Dimitri John Ledkov   Thu, 29 Apr 2021 16:05:27
+0100

** Changed in: dahdi-linux (Ubuntu Focal)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1914279

Title:
  linux from security may force reboots without complete dkms modules

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/acpi-call/+bug/1914279/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1914279] Re: linux from security may force reboots without complete dkms modules

2021-05-18 Thread Launchpad Bug Tracker
This bug was fixed in the package backport-iwlwifi-dkms -
8324-0ubuntu3~20.04.3

---
backport-iwlwifi-dkms (8324-0ubuntu3~20.04.3) focal; urgency=medium

  * No change rebuild in security pocket. LP: #1914279.

 -- Dimitri John Ledkov   Thu, 29 Apr 2021 16:07:04
+0100

** Changed in: bcmwl (Ubuntu Focal)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1914279

Title:
  linux from security may force reboots without complete dkms modules

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/acpi-call/+bug/1914279/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1914279] Re: linux from security may force reboots without complete dkms modules

2021-05-18 Thread Launchpad Bug Tracker
This bug was fixed in the package acpi-call - 1.1.0-5ubuntu0.2

---
acpi-call (1.1.0-5ubuntu0.2) focal; urgency=medium

  * No change rebuild in security pocket. LP: #1914279.

 -- Dimitri John Ledkov   Thu, 29 Apr 2021 16:06:55
+0100

** Changed in: acpi-call (Ubuntu Focal)
   Status: Fix Committed => Fix Released

** Changed in: backport-iwlwifi-dkms (Ubuntu Focal)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1914279

Title:
  linux from security may force reboots without complete dkms modules

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/acpi-call/+bug/1914279/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1928791] Re: gnome-shell runs on 60--100% CPU usage

2021-05-18 Thread Daniel van Vugt
Thanks for the bug report.

1. It looks like you don't have any custom extensions installed, is that
correct? You can check using the app called 'Extensions' where there
should be only 3 default extensions listed.

2. Next time the problem is happening, please open a Terminal and run:

   journalctl -b0 > journal.txt

3. Attach the resulting text file here.


** Tags added: nvidia performance

** Changed in: gnome-shell (Ubuntu)
   Status: New => Incomplete

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1928791

Title:
  gnome-shell runs on 60--100% CPU usage

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gnome-shell/+bug/1928791/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1899159] Autopkgtest regression report (python3-stdlib-extensions/3.9.5-0ubuntu3~21.04)

2021-05-18 Thread Ubuntu SRU Bot
All autopkgtests for the newly accepted python3-stdlib-extensions 
(3.9.5-0ubuntu3~21.04) for hirsute have finished running.
The following regressions have been reported in tests triggered by the package:

python-pip/20.3.4-1ubuntu2 (arm64)
sshuttle/1.0.4-1ubuntu4 (amd64, ppc64el, arm64)
statsmodels/0.12.2-1 (armhf)


Please visit the excuses page listed below and investigate the failures, 
proceeding afterwards as per the StableReleaseUpdates policy regarding 
autopkgtest regressions [1].

https://people.canonical.com/~ubuntu-archive/proposed-
migration/hirsute/update_excuses.html#python3-stdlib-extensions

[1] https://wiki.ubuntu.com/StableReleaseUpdates#Autopkgtest_Regressions

Thank you!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1899159

Title:
  SRU: backport Python 3.9.5 to 20.04 LTS, 20.10 and 21.04

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/python3-stdlib-extensions/+bug/1899159/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1926165] Re: Bass speakers not enabled on Lenovo Yoga 9i

2021-05-18 Thread Hui Wang
OK, wrote an email to realtek codec expert to ask for help.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926165

Title:
  Bass speakers not enabled on Lenovo Yoga 9i

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/alsa-driver/+bug/1926165/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1928656] Re: [i915] Horizontal lines of flickering random pixels on Comet Lake

2021-05-18 Thread Daniel van Vugt
You need four files:

1. https://kernel.ubuntu.com/~kernel-ppa/mainline/v5.12.4/amd64/linux-
headers-5.12.4-051204-generic_5.12.4-051204.202105140931_amd64.deb

2. https://kernel.ubuntu.com/~kernel-ppa/mainline/v5.12.4/amd64/linux-
headers-5.12.4-051204_5.12.4-051204.202105140931_all.deb

3. https://kernel.ubuntu.com/~kernel-ppa/mainline/v5.12.4/amd64/linux-
image-
unsigned-5.12.4-051204-generic_5.12.4-051204.202105140931_amd64.deb

4. https://kernel.ubuntu.com/~kernel-ppa/mainline/v5.12.4/amd64/linux-
modules-5.12.4-051204-generic_5.12.4-051204.202105140931_amd64.deb

5. Once they are downloaded in the same directory, install them all
together:

   cd ~/Downloads
   sudo dpkg -i linux*.deb

6. Reboot.

7. Verify the new kernel version is active by running:

   uname -a

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1928656

Title:
  [i915] Horizontal lines of flickering random pixels on Comet Lake

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-signed-hwe-5.8/+bug/1928656/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1928744] Re: Disk IO very slow on kernel 4.15.0-142-generic

2021-05-18 Thread Chris Guiver
changed HWE to linux as I see no reference to a HWE (5.4) kernel

** Package changed: linux-signed-hwe (Ubuntu) => linux (Ubuntu)

** Tags added: bionic

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1928744

Title:
  Disk IO very slow on kernel 4.15.0-142-generic

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1928744/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1924951] Re: Cannot upgrade from 18.04 to 20.04 "An unresolvable problem occured while calculating the upgrade."

2021-05-18 Thread Jochen Ehnes
Thanks for the help Brian, really appreciated.

This is just to inform you that it will take a while until I can try
this and report the results back to you. This machine is located at my
workplace, but due to the recent increase of Covid-19 cases in Singapore
we are supposed to work from home for now. As doing a release upgrade is
discouraged via ssh, this will have to wait a few weeks until we can go
back to the office.

Best regards,
Jochen

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1924951

Title:
  Cannot upgrade from 18.04 to 20.04 "An unresolvable problem occured
  while calculating the upgrade."

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-release-upgrader/+bug/1924951/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1928586] Re: Desktop icons disappearing

2021-05-18 Thread Daniel van Vugt
** Changed in: gnome-shell-extension-desktop-icons (Ubuntu)
   Status: Incomplete => New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1928586

Title:
  Desktop icons disappearing

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gnome-shell-extension-desktop-icons/+bug/1928586/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1927796] Re: [SRU]pam_tally2 can cause accounts to be locked by correct password. pam_faillock use is the recommended fix

2021-05-18 Thread Matthew Ruffell
Performing verification for Groovy

I enabled -proposed and installed libpam-modules libpam-modules-bin
libpam-runtime libpam0g version 1.3.1-5ubuntu6.20.10.1

>From there, I set the pam_faillock configuration in:

/etc/security/faillock.conf:
deny = 3
unlock_time = 120

and also:

/etc/pam.d/common-auth:

# here are the per-package modules (the "Primary" block)
authrequisite   pam_faillock.so preauth
auth[success=1 default=ignore]  pam_unix.so nullok_secure
auth[default=die]   pam_faillock.so authfail
authsufficient  pam_faillock.so authsucc
# here's the fallback if no module succeeds
authrequisite   pam_deny.so
# prime the stack with a positive return value if there isn't one already;
# this avoids us returning an error just because nothing sets a success code
# since the modules above will each just jump around
authrequiredpam_permit.so
# and here are more per-package modules (the "Additional" block)
authoptionalpam_cap.so
# end of pam-auth-update config

>From there, I created a new user "dave", and rebooted the system.

I connected via ssh with the "dave" user and used the wrong password 5 times.
I then tried with the correct password and found the account to be locked.

I waited 2 minutes, and tried again with the correct password, and I was logged
in.

When the account was locked, I logged in as the "ubuntu" user and ran:

$ sudo faillock --user dave
dave:
WhenType  Source   Valid
2021-05-19 02:08:53 RHOST 192.168.122.1V
2021-05-19 02:08:58 RHOST 192.168.122.1V
2021-05-19 02:09:02 RHOST 192.168.122.1V

And I could see the times that "dave" was locked.

I also tested resetting via:

$ sudo faillock --user dave --reset

and "dave" was allowed to log in again.

My tests agree with what Richard sees. Marking as verified for Groovy.

** Tags removed: verification-needed verification-needed-groovy
** Tags added: verification-done verification-done-groovy

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1927796

Title:
  [SRU]pam_tally2 can cause accounts to be locked by correct password.
  pam_faillock use is the recommended fix

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/pam/+bug/1927796/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1922353] Re: Overview sometimes fails to appear or disappear in 21.04

2021-05-18 Thread Daniel van Vugt
Thanks uriel, that is the same error in your log as comment #34. It
seems we have at least some correlation if not causation. I'm not yet
convinced it's a fix but can anyone test the patch and verify it fixes
this bug?

https://gitlab.gnome.org/GNOME/gnome-shell/-/merge_requests/1794.patch

Maybe we will need a PPA...

** Changed in: gnome-shell (Ubuntu Hirsute)
   Status: New => Incomplete

** Changed in: gnome-shell-extension-ubuntu-dock (Ubuntu Hirsute)
   Status: New => Incomplete

** Changed in: gnome-shell (Ubuntu Hirsute)
   Importance: Undecided => High

** Changed in: gnome-shell-extension-ubuntu-dock (Ubuntu Hirsute)
   Importance: Undecided => High

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1922353

Title:
  Overview sometimes fails to appear or disappear in 21.04

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gnome-shell/+bug/1922353/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1927796] Re: [SRU]pam_tally2 can cause accounts to be locked by correct password. pam_faillock use is the recommended fix

2021-05-18 Thread Matthew Ruffell
Performing verification for Hirsute

I enabled -proposed and installed libpam-modules libpam-modules-bin
libpam-runtime libpam0g version 1.3.1-5ubuntu6.21.04.1

>From there, I set the pam_faillock configuration in:

/etc/security/faillock.conf:
deny = 3
unlock_time = 120

and also:

/etc/pam.d/common-auth:

# here are the per-package modules (the "Primary" block)
authrequisite   pam_faillock.so preauth
auth[success=1 default=ignore]  pam_unix.so nullok_secure
auth[default=die]   pam_faillock.so authfail
authsufficient  pam_faillock.so authsucc
# here's the fallback if no module succeeds
authrequisite   pam_deny.so
# prime the stack with a positive return value if there isn't one already;
# this avoids us returning an error just because nothing sets a success code
# since the modules above will each just jump around
authrequiredpam_permit.so
# and here are more per-package modules (the "Additional" block)
authoptionalpam_cap.so
# end of pam-auth-update config

>From there, I created a new user "dave", and rebooted the system.

I connected via ssh with the "dave" user and used the wrong password 5 times.
I then tried with the correct password and found the account to be locked.

I waited 2 minutes, and tried again with the correct password, and I was logged
in.

When the account was locked, I logged in as the "ubuntu" user and ran:

$ sudo faillock --user dave
dave:
WhenType  Source   Valid
2021-05-19 01:50:25 RHOST 192.168.122.1V
2021-05-19 01:50:28 RHOST 192.168.122.1V
2021-05-19 01:50:31 RHOST 192.168.122.1V

And I could see the times that "dave" was locked.

I also tested resetting via:

$ sudo faillock --user dave --reset

and "dave" was allowed to log in again.

My tests agree with what Richard sees. Marking as verified for Hirsute.

** Tags removed: verification-needed-hirsute
** Tags added: verification-done-hirsute

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1927796

Title:
  [SRU]pam_tally2 can cause accounts to be locked by correct password.
  pam_faillock use is the recommended fix

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/pam/+bug/1927796/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1571506] Re: update-initramfs should include firmware from /lib/firmware/updates

2021-05-18 Thread Launchpad Bug Tracker
This bug was fixed in the package initramfs-tools - 0.130ubuntu3.12

---
initramfs-tools (0.130ubuntu3.12) bionic; urgency=medium

  * scripts/local-premount/resume:
- Use readlink -f to correctly handle non-symlink $resume
  (LP: #1876570)
  * hooks/fsck:
- don't check PASSNO, always include fsck
  (LP: #1917780)
  * hook-functions:
- include firmware from /lib/firmware/updates
  (LP: #1571506)

 -- Dan Streetman   Thu, 18 Mar 2021 14:48:17
-0400

** Changed in: initramfs-tools (Ubuntu Bionic)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1571506

Title:
  update-initramfs should include firmware from /lib/firmware/updates

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/initramfs-tools/+bug/1571506/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1876570] Re: Could not resume from hibernation when swap is specified as device

2021-05-18 Thread Launchpad Bug Tracker
This bug was fixed in the package initramfs-tools - 0.137ubuntu12.1

---
initramfs-tools (0.137ubuntu12.1) groovy; urgency=medium

  * scripts/local-premount/resume:
- Use readlink -f to correctly handle non-symlink $resume
  (LP: #1876570)
  * hook-functions:
- when MODULES=list there will be no 'kernel' dir, so don't try
  to find anything there, as it will log an error
  (LP: #1927779)
  * hooks/fsck:
- don't check PASSNO, always include fsck
  (LP: #1917780)

 -- Dan Streetman   Thu, 18 Mar 2021 14:48:17
-0400

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1876570

Title:
  Could not resume from hibernation when swap is specified as device

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/initramfs-tools/+bug/1876570/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1876570] Re: Could not resume from hibernation when swap is specified as device

2021-05-18 Thread Launchpad Bug Tracker
This bug was fixed in the package initramfs-tools - 0.136ubuntu6.5

---
initramfs-tools (0.136ubuntu6.5) focal; urgency=medium

  * scripts/local-premount/resume:
- Use readlink -f to correctly handle non-symlink $resume
  (LP: #1876570)
  * hook-functions:
- when MODULES=list there will be no 'kernel' dir, so don't try
  to find anything there, as it will log an error
  (LP: #1927779)
  * hooks/fsck:
- don't check PASSNO, always include fsck
  (LP: #1917780)

 -- Dan Streetman   Thu, 18 Mar 2021 14:48:17
-0400

** Changed in: initramfs-tools (Ubuntu Groovy)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1876570

Title:
  Could not resume from hibernation when swap is specified as device

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/initramfs-tools/+bug/1876570/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1876570] Re: Could not resume from hibernation when swap is specified as device

2021-05-18 Thread Launchpad Bug Tracker
This bug was fixed in the package initramfs-tools - 0.130ubuntu3.12

---
initramfs-tools (0.130ubuntu3.12) bionic; urgency=medium

  * scripts/local-premount/resume:
- Use readlink -f to correctly handle non-symlink $resume
  (LP: #1876570)
  * hooks/fsck:
- don't check PASSNO, always include fsck
  (LP: #1917780)
  * hook-functions:
- include firmware from /lib/firmware/updates
  (LP: #1571506)

 -- Dan Streetman   Thu, 18 Mar 2021 14:48:17
-0400

** Changed in: initramfs-tools (Ubuntu Bionic)
   Status: Fix Committed => Fix Released

** Changed in: initramfs-tools (Ubuntu Focal)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1876570

Title:
  Could not resume from hibernation when swap is specified as device

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/initramfs-tools/+bug/1876570/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1917780] Re: initramfs-tools does not include fsck binaries in the initrd if all mount pass are 0

2021-05-18 Thread Launchpad Bug Tracker
This bug was fixed in the package initramfs-tools - 0.137ubuntu12.1

---
initramfs-tools (0.137ubuntu12.1) groovy; urgency=medium

  * scripts/local-premount/resume:
- Use readlink -f to correctly handle non-symlink $resume
  (LP: #1876570)
  * hook-functions:
- when MODULES=list there will be no 'kernel' dir, so don't try
  to find anything there, as it will log an error
  (LP: #1927779)
  * hooks/fsck:
- don't check PASSNO, always include fsck
  (LP: #1917780)

 -- Dan Streetman   Thu, 18 Mar 2021 14:48:17
-0400

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1917780

Title:
  initramfs-tools does not include fsck binaries in the initrd if all
  mount pass are 0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/initramfs-tools/+bug/1917780/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1917780] Re: initramfs-tools does not include fsck binaries in the initrd if all mount pass are 0

2021-05-18 Thread Launchpad Bug Tracker
This bug was fixed in the package initramfs-tools - 0.136ubuntu6.5

---
initramfs-tools (0.136ubuntu6.5) focal; urgency=medium

  * scripts/local-premount/resume:
- Use readlink -f to correctly handle non-symlink $resume
  (LP: #1876570)
  * hook-functions:
- when MODULES=list there will be no 'kernel' dir, so don't try
  to find anything there, as it will log an error
  (LP: #1927779)
  * hooks/fsck:
- don't check PASSNO, always include fsck
  (LP: #1917780)

 -- Dan Streetman   Thu, 18 Mar 2021 14:48:17
-0400

** Changed in: initramfs-tools (Ubuntu Groovy)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1917780

Title:
  initramfs-tools does not include fsck binaries in the initrd if all
  mount pass are 0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/initramfs-tools/+bug/1917780/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1917780] Re: initramfs-tools does not include fsck binaries in the initrd if all mount pass are 0

2021-05-18 Thread Launchpad Bug Tracker
This bug was fixed in the package initramfs-tools - 0.130ubuntu3.12

---
initramfs-tools (0.130ubuntu3.12) bionic; urgency=medium

  * scripts/local-premount/resume:
- Use readlink -f to correctly handle non-symlink $resume
  (LP: #1876570)
  * hooks/fsck:
- don't check PASSNO, always include fsck
  (LP: #1917780)
  * hook-functions:
- include firmware from /lib/firmware/updates
  (LP: #1571506)

 -- Dan Streetman   Thu, 18 Mar 2021 14:48:17
-0400

** Changed in: initramfs-tools (Ubuntu Bionic)
   Status: Fix Committed => Fix Released

** Changed in: initramfs-tools (Ubuntu Focal)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1917780

Title:
  initramfs-tools does not include fsck binaries in the initrd if all
  mount pass are 0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/initramfs-tools/+bug/1917780/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1927779] Re: MODULES=list results in error

2021-05-18 Thread Launchpad Bug Tracker
This bug was fixed in the package initramfs-tools - 0.137ubuntu12.1

---
initramfs-tools (0.137ubuntu12.1) groovy; urgency=medium

  * scripts/local-premount/resume:
- Use readlink -f to correctly handle non-symlink $resume
  (LP: #1876570)
  * hook-functions:
- when MODULES=list there will be no 'kernel' dir, so don't try
  to find anything there, as it will log an error
  (LP: #1927779)
  * hooks/fsck:
- don't check PASSNO, always include fsck
  (LP: #1917780)

 -- Dan Streetman   Thu, 18 Mar 2021 14:48:17
-0400

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1927779

Title:
  MODULES=list results in error

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/initramfs-tools/+bug/1927779/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1927779] Re: MODULES=list results in error

2021-05-18 Thread Launchpad Bug Tracker
This bug was fixed in the package initramfs-tools - 0.136ubuntu6.5

---
initramfs-tools (0.136ubuntu6.5) focal; urgency=medium

  * scripts/local-premount/resume:
- Use readlink -f to correctly handle non-symlink $resume
  (LP: #1876570)
  * hook-functions:
- when MODULES=list there will be no 'kernel' dir, so don't try
  to find anything there, as it will log an error
  (LP: #1927779)
  * hooks/fsck:
- don't check PASSNO, always include fsck
  (LP: #1917780)

 -- Dan Streetman   Thu, 18 Mar 2021 14:48:17
-0400

** Changed in: initramfs-tools (Ubuntu Focal)
   Status: Fix Committed => Fix Released

** Changed in: initramfs-tools (Ubuntu Groovy)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1927779

Title:
  MODULES=list results in error

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/initramfs-tools/+bug/1927779/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1917780] Update Released

2021-05-18 Thread Chris Halse Rogers
The verification of the Stable Release Update for initramfs-tools has
completed successfully and the package is now being released to
-updates.  Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report.  In
the event that you encounter a regression using the package from
-updates please report a new bug using ubuntu-bug and tag the bug report
regression-update so we can easily find any regressions.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1917780

Title:
  initramfs-tools does not include fsck binaries in the initrd if all
  mount pass are 0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/initramfs-tools/+bug/1917780/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1927779] Update Released

2021-05-18 Thread Chris Halse Rogers
The verification of the Stable Release Update for initramfs-tools has
completed successfully and the package is now being released to
-updates.  Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report.  In
the event that you encounter a regression using the package from
-updates please report a new bug using ubuntu-bug and tag the bug report
regression-update so we can easily find any regressions.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1927779

Title:
  MODULES=list results in error

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/initramfs-tools/+bug/1927779/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1927796] Re: [SRU]pam_tally2 can cause accounts to be locked by correct password. pam_faillock use is the recommended fix

2021-05-18 Thread Matthew Ruffell
Performing verification for Focal

I enabled -proposed and installed libpam-modules libpam-modules-bin
libpam-runtime libpam0g version 1.3.1-5ubuntu4.2

>From there, I set the pam_faillock configuration in:

/etc/security/faillock.conf:
deny = 3
unlock_time = 120

and also:

/etc/pam.d/common-auth:

# here are the per-package modules (the "Primary" block)
authrequisite   pam_faillock.so preauth
auth[success=1 default=ignore]  pam_unix.so nullok_secure
auth[default=die]   pam_faillock.so authfail
authsufficient  pam_faillock.so authsucc
# here's the fallback if no module succeeds
authrequisite   pam_deny.so
# prime the stack with a positive return value if there isn't one already;
# this avoids us returning an error just because nothing sets a success code
# since the modules above will each just jump around
authrequiredpam_permit.so
# and here are more per-package modules (the "Additional" block)
authoptionalpam_cap.so
# end of pam-auth-update config

>From there, I created a new user "dave", and rebooted the system.

I connected via ssh with the "dave" user and used the wrong password 5 times.
I then tried with the correct password and found the account to be locked.

I waited 2 minutes, and tried again with the correct password, and I was logged
in.

When the account was locked, I logged in as the "ubuntu" user and ran:

$ sudo faillock --user dave
dave:
WhenType  Source   Valid
2021-05-19 00:31:08 RHOST 192.168.122.1V
2021-05-19 00:31:13 RHOST 192.168.122.1V
2021-05-19 00:31:17 RHOST 192.168.122.1V

And I could see the times that "dave" was locked.

I also tested resetting via:

$ sudo faillock --user dave --reset

and "dave" was allowed to log in again.

My tests agree with what Richard sees. Marking as verified for Focal.

** Tags removed: verification-needed-focal
** Tags added: verification-done-focal

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1927796

Title:
  [SRU]pam_tally2 can cause accounts to be locked by correct password.
  pam_faillock use is the recommended fix

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/pam/+bug/1927796/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1927796] Re: [SRU]pam_tally2 can cause accounts to be locked by correct password. pam_faillock use is the recommended fix

2021-05-18 Thread Matthew Ruffell
Performing verification for Bionic

I enabled -proposed and installed libpam-modules libpam-modules-bin
libpam-runtime libpam0g version 1.1.8-3.6ubuntu2.18.04.3

>From there, I set the pam_faillock configuration in:

/etc/security/faillock.conf:
deny = 3
unlock_time = 120

and also:

/etc/pam.d/common-auth:

# here are the per-package modules (the "Primary" block)
authrequisite   pam_faillock.so preauth
auth[success=1 default=ignore]  pam_unix.so nullok_secure
auth[default=die]   pam_faillock.so authfail
authsufficient  pam_faillock.so authsucc
# here's the fallback if no module succeeds
authrequisite   pam_deny.so
# prime the stack with a positive return value if there isn't one already;
# this avoids us returning an error just because nothing sets a success code
# since the modules above will each just jump around
authrequiredpam_permit.so
# and here are more per-package modules (the "Additional" block)
authoptionalpam_cap.so
# end of pam-auth-update config

>From there, I created a new user "dave", and rebooted the system.

I connected via ssh with the "dave" user and used the wrong password 5 times.
I then tried with the correct password and found the account to be locked.

I waited 2 minutes, and tried again with the correct password, and I was logged
in.

When the account was locked, I logged in as the "ubuntu" user and ran:

$ sudo faillock --user dave
dave:
WhenType  Source   Valid
2021-05-19 00:57:10 RHOST 192.168.122.1V
2021-05-19 00:57:12 RHOST 192.168.122.1V
2021-05-19 00:57:16 RHOST 192.168.122.1V

And I could see the times that "dave" was locked.

I also tested resetting via:

$ sudo faillock --user dave --reset

and "dave" was allowed to log in again.

My tests agree with what Richard sees. Marking as verified for Bionic.

** Tags removed: verification-needed-bionic
** Tags added: sts verification-done-bionic

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1927796

Title:
  [SRU]pam_tally2 can cause accounts to be locked by correct password.
  pam_faillock use is the recommended fix

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/pam/+bug/1927796/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1801629] Re: direct dependencies of ubiquity should not be autoremovable

2021-05-18 Thread Arno Teigseth
struck Linux mint 20.4 (focal, right?) - "just" lvm2 was removed though,
not cryptsetup.

I definitely did not remove lvm2 by hand but usually run autoremove.
Maybe I'll actually read the "these packages will be removed" next time
o_O

My setup was encrypted root, encrypted raid5 and none of those of course
mounted since lvm2 was no longer a thing. Easily fixed by liveUsb boot,
unlock+chroot and apt install lvm2

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1801629

Title:
  direct dependencies of ubiquity should not be autoremovable

To manage notifications about this bug go to:
https://bugs.launchpad.net/oem-priority/+bug/1801629/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1876570] Update Released

2021-05-18 Thread Chris Halse Rogers
The verification of the Stable Release Update for initramfs-tools has
completed successfully and the package is now being released to
-updates.  Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report.  In
the event that you encounter a regression using the package from
-updates please report a new bug using ubuntu-bug and tag the bug report
regression-update so we can easily find any regressions.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1876570

Title:
  Could not resume from hibernation when swap is specified as device

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/initramfs-tools/+bug/1876570/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1924589] Re: Please update to 20210414.00 upstream release

2021-05-18 Thread Chris Halse Rogers
Has the Xenial SRU been tested? I only see verifications for Bionic,
Focal, Groovy, and Hirsute.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1924589

Title:
  Please update to 20210414.00 upstream release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/google-guest-agent/+bug/1924589/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1926437] Re: [SRU] Backport zstd support, fix bug in python-apt

2021-05-18 Thread Chris Halse Rogers
The focal and groovy autopkgtest failures in apt-clone look suspiciously
like real regressions. Do we have an analysis of those?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926437

Title:
  [SRU] Backport zstd support, fix bug in python-apt

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1926437/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1924589] Re: Please update to 20210414.00 upstream release

2021-05-18 Thread Launchpad Bug Tracker
This bug was fixed in the package google-guest-agent -
20210414.00-0ubuntu1~20.10.0

---
google-guest-agent (20210414.00-0ubuntu1~20.10.0) groovy; urgency=medium

  * Rebuild for Groovy

google-guest-agent (20210414.00-0ubuntu1) hirsute; urgency=medium

  * New upstream release (LP: #1924589)
- call restorecon on ssh host keys (#98)
- add ipv6 forwarded ip support (#101)
- add a match block to sshd_config for SAs (#99)
- Update error message for handleHealthCheckRequest. (#105)
- Add systemd-networkd.service restart dependency
- start sshd

 -- Balint Reczey   Thu, 15 Apr 2021 21:07:47 +0200

** Changed in: google-guest-agent (Ubuntu Hirsute)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1924589

Title:
  Please update to 20210414.00 upstream release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/google-guest-agent/+bug/1924589/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

  1   2   3   4   >