Andrea, I've been running the v1 kernel for a day or so now:
[0.00] Linux version 5.4.0-24-generic (arighi@sita) (gcc version
9.3.0 (Ubuntu 9.3.0-10ubuntu1)) #28+lp1861359v1 SMP Wed Apr 15 14:49:33
UTC 2020 (Ubuntu 5.4.0-24.28+lp1861359v1-generic 5.4.30)
$ uptime
02:21:45 up 1 day, 9
Writing 8589934592 (eight gigs) into the zfs_arc_dnode_limit seemed to
make an improvement: the arc_prune threads would periodically spike
above 20% CPU use, but would return to 2-5% CPU use quickly; it worked
well for a long time, perhaps even hours, before all the arc_prune
threads returned to
Thanks Colin,
I believe that bountysource.com url is a scrape of
https://github.com/openzfs/zfs/issues/6223
I hadn't seen much of this information before.
Sadly my machine doesn't have enough memory to just keep turning up the
knobs -- the working set far exceeds the memory of my computer.
A
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1873308
Title:
ssl error :ssl_choose_client_version:unsupported protocol
To manage
I had success with https://launchpad.net/~mwhudson/+snap/subiquity-
hack/+build/908976
Thanks Michael!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1861369
Title:
install failed crashed with
Funny, our tooling also collected these lintian messages, in a different
spot:
python3-rtslib-fb_2.1.71-0ubuntu1_all.deb:
W: python3-rtslib-fb: binary-without-manpage usr/bin/targetctl
W: python3-rtslib-fb:
maintainer-script-should-not-use-update-alternatives-remove postrm:6
Thanks
--
You
Two .crash files, one trying to configure LVM, one not trying to
configure LVM.
** Attachment added: "sarnold-power9.tar.gz"
https://bugs.launchpad.net/subiquity/+bug/1861369/+attachment/5354279/+files/sarnold-power9.tar.gz
--
You received this bug notification because you are a member of
I'm starting to look at python-rstlib-fb and lintian (from bionic)
reported:
Output of lintian:
W: python-rtslib-fb source: debhelper-compat-file-is-missing
W: python-rtslib-fb source: package-uses-deprecated-debhelper-compat-version 1
E: python-rtslib-fb source:
Frank, I'm sorry to say that bug 1872783 'masked' this bug for me. I
couldn't reproduce 1872783 to get logs, but at the same time, found that
this one is still happening.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Attachment added: "IMG_20200413_221013.jpg"
https://bugs.launchpad.net/ubuntu/+source/subiquity/+bug/1872783/+attachment/5353991/+files/IMG_20200413_221013.jpg
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Attachment added: "IMG_20200413_221000.jpg"
https://bugs.launchpad.net/ubuntu/+source/subiquity/+bug/1872783/+attachment/5353990/+files/IMG_20200413_221000.jpg
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Public bug reported:
Hello, I believe my previous bug may have been addressed:
https://bugs.launchpad.net/subiquity/+bug/1861369
However, the installer now appears to be stuck trying to remove LVM
configs left over from previous installs. The python portions are just
stuck doing repeated epolls,
** Attachment added: "IMG_20200413_221035.jpg"
https://bugs.launchpad.net/ubuntu/+source/subiquity/+bug/1872783/+attachment/5353992/+files/IMG_20200413_221035.jpg
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
This is an awkward case, I'm not sure we've got a perfect plan here.
u-boot has been in main for a while; a previous release did need to go
through -security but it appears it wasn't for security reasons:
https://launchpad.net/ubuntu/+source/u-boot/2016.01+dfsg1-2ubuntu3
The rpi family does not
Wonderful, thanks Jamie.
** Changed in: grub2-signed (Ubuntu)
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1872045
Title:
package grub-efi-amd64-signed
Thanks Balint! I gave a very quick read to the 2.2 debdiff and couldn't
spot the fix, though -- I'd just like to double-check that the fix made
it to the packaging.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
/var/lib/dpkg/info/grub-efi-amd64-signed.postinst: 23: Syntax error:
word unexpected (expecting ")")
Michael, could you attach your /var/lib/dpkg/info/grub-efi-
amd64-signed.postinst to this bug report? I'm curious what happened
here.
Thanks
** Information type changed from Private Security to
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
This was reported upstream a few months ago but apparently still
unfixed:
https://github.com/jbeverly/pam_ssh_agent_auth/issues/18
Thanks
** Bug watch added: github.com/jbeverly/pam_ssh_agent_auth/issues #18
https://github.com/jbeverly/pam_ssh_agent_auth/issues/18
--
You received this bug
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
This has happened more than just these two cases, the timing was just
enough for me to enquire about it.
sarnold@millbarge:~/.mail_cache$ grep -r 'end of file on stdin at conffile
prompt' | wc -l
74
Thanks
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Jamie, what happens on systems without snap installed? Will systemd
start the apparmor service?
How much later does this push the already-too-late apparmor service?
Requiring a potentially new thing may push the apparmor unit further
behind, allowing even more services to start before profiles
I should point out that the period bursts of writes every five seconds
in my vmstat 1 output is due to zfs's flushing mechanism; by default it
flushes dirty pages every five seconds.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Thanks Andrea, I don't think that helped. I'll attach a file with vmstat
1 output and funclatency output, along with a few notes on the testing.
Thanks
** Attachment added: "after-limiting-dirty-bytes"
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Hello, this machine may have hardware problems:
[ 299.823042] mce: [Hardware Error]: Machine check events logged
Also, it looks like you may have removed new nvidia drivers and replaced
them with old nvidia drivers -- are you sure this is supposed to work?
Thanks
--
You received this bug
Public bug reported:
Hello, Adobe has said they will not be supporting Flash beyond 2020:
https://helpx.adobe.com/acrobat/kb/flash-format-support-in-pdf.html
https://theblog.adobe.com/adobe-flash-update/
I think we shouldn't ship Flash in Focal. Does our agreement with Adobe
for distributing
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1870803
Title:
LightDM unlocks without Password
To manage notifications about
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Hello Thomas,
That's a very dirty upgrade log, quite a lot failed. Is this a small-
memory system? Do you know what may make this system unique in showing
these errors? I don't have a lot of ideas where things would have gone
off the rails otherwise.
Thanks
--
You received this bug
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1837389
Title:
mate-screensaver crashes
To manage notifications about this bug go
*** This bug is a duplicate of bug 1869035 ***
https://bugs.launchpad.net/bugs/1869035
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Hello, I don't quickly spot why this bug is marked security; is there a
security component here that I am overlooking?
Thanks
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1867173
Title:
FTBFS
*** This bug is a duplicate of bug 1868472 ***
https://bugs.launchpad.net/bugs/1868472
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1868206
Title:
presenta un cuadro indicando error de instalacion.
To manage notifications
Hello, looking through your logs it looks like your machine has
significant problems. Some of them, like the CPU overheating, may or may
not be something you can solve by cleaning the fans or heatsinks or
making sure any fans or heatsinks are working.
Perhaps the heat problems have caused several
I didn't spot anything private in the logs; I'm setting this public so
others can see it.
Thanks
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
I didn't spot anything private in here, I'll open this so others can see
it.
Thanks
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1869868
Title:
bug
To manage notifications about this bug go to:
Public bug reported:
There appears to be some lurking Python 2 code in profile-bpfcc:
$ sudo profile-bpfcc -f
Just to be clear, not *all* tracing tools work, but this is much better:
sarnold@millbarge:/tmp$ uname -a
Linux millbarge 5.4.0-21-generic #25-Ubuntu SMP Sat Mar 28 13:10:28 UTC 2020
x86_64 x86_64 x86_64 GNU/Linux
sarnold@millbarge:/tmp$ sudo zfsslower-bpfcc
Traceback (most recent call last):
Stefan, while recent kernels seem happier than previous kernels (I think
-14 era was terrible), I don't think this problem is fixed yet:
sarnold@millbarge:/tmp$ uname -a
Linux millbarge 5.4.0-21-generic #25-Ubuntu SMP Sat Mar 28 13:10:28 UTC 2020
x86_64 x86_64 x86_64 GNU/Linux
I'm sorry for the slow response Francis, I've been running custom kernels for:
https://bugs.launchpad.net/bugs/1861359
for a while. Thanks for the reminder.
sarnold@millbarge:~$ dmesg | grep -i lockdown
[0.00] Kernel is locked down from EFI Secure Boot mode; see man
kernel_lockdown.7
[
Sultan put together a kernel with some debugging for me:
[101616.889859] __alloc_pages_nodemask: stall of 3683ms for order-0, mask:
0x100dca
[101616.889863] Call Trace:
[101616.889880] __alloc_pages_nodemask+0x34f/0x3b0
[101616.889887] alloc_pages_vma+0x7f/0x200
[101616.889893]
On Tue, Mar 31, 2020 at 02:15:11PM -, Christian Ehrhardt wrote:
> Mar 30 20:44:55 millbarge systemd[1]: libvirtd.service: Found left-over
> process 3054 (dnsmasq) in control group while starting unit. Ignoring.
> => That is ok, some things are expected to live over to the new restarted
>
On Mon, Mar 30, 2020 at 09:09:56PM -, Simon Déziel wrote:
> On 2020-03-30 4:54 p.m., Seth Arnold wrote:
> > Sadly 'journactl -xe' was useless. (It only showed a thousand
> > unrelated lines.) A raw journalctl took forever to run long enough to
> > let me see it genera
Public bug reported:
Seen from today's apt upgrade on focal:
Setting up libvirt-daemon-driver-qemu (6.0.0-0ubuntu6) ...
Setting up libvirt-daemon (6.0.0-0ubuntu6) ...
Setting up libvirt-daemon-driver-storage-rbd (6.0.0-0ubuntu6) ...
Setting up libvirt-daemon-driver-storage-zfs (6.0.0-0ubuntu6)
Sultan, thanks for the advice.
I set this watermark boost factor to zero as you suggested, and then
decided to try a stupid simple benchmark of my storage -- my swap is a
zfs dataset on nvme. zfs means it'll go slower than raw nvme block
access:
$ dd if=ubuntu-18.04.4-desktop-amd64.iso of=foo
I reviewed libcbor version 0.6.0-0ubuntu1 as checked into focal-
proposed; for this latest look I only inspected the packaging, trusting
that the code quality I saw earlier hasn't degraded. (Yes, the old
version had alignment issues, but was otherwise in good shape.)
No full form since I'm on
On Wed, Mar 25, 2020 at 02:54:24PM -, David Kastrup wrote:
> I don't even think it directly calls the interpreter: I discovered that my
> hashbang was
> #!/bin/bash
> while the complained was about /usr/bin/dash (and still is).
This may be due to a confusing, relatively new, symlink:
$ ls
I'm adding the champagne tag to this bug to bring it to a potential
wider audience; I think we may need to take more drastic steps like
disabling swap on upgrades, not offering swap in our installers, etc.,
to try to have a better experience.
Thanks
** Tags added: champagne
--
You received
BTW, this is still happening in:
Linux millbarge 5.4.0-20-generic #24-Ubuntu SMP Mon Mar 23 20:55:46 UTC
2020 x86_64 x86_64 x86_64 GNU/Linux
I've seen it both with firefox in trello, firefox in launchpad (typing
this comment) and doing two sequential wgets of
Thanks Andreas; while you're there, could you give a look to running the
tests in test/ during the build or as autopkgtests?
Thanks
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1864439
Title:
Version 0.5.0+dfsg-2 of libcbor as packaged in focal appears to have
significant unaligned data access problems.
The version in github appears to be fixed: see eg
https://github.com/PJK/libcbor/commit/c745f6b88a739e700c6ea2baa96bcfef1d51cc0f
We need to update libcbor before we can use this
I reviewed gamemode 1.5-1 as checked into focal. This shouldn't be
considered a full audit but rather a quick gauge of maintainability.
gamemode tries to improve the Linux gaming experience by switching to more
reliable CPU governors, rescheduling processes, changing io priorities,
inhibiting
Hello Colin, I'm not sure:
- I'm now on 5.4.0-17-generic to try to debug a different issue
- I believe I've fixed all the datasets that were failing to mount at
boot time due to unexpected files or directories in the mountpoints
- I don't know why zfs was segfaulting in the first place: it was
There is an interesting (to me, anyway) change of behaviour with the -17
kernel: while earlier kernels would appear to be locked solid for 30-60
seconds before the screen could update, -17 allows screen updates every
six seconds or so.
I have an always-running mosh session to a remote host
I couldn't find a way to disable the lockdown functionality short of
disabling secure boot in my UEFI system setup.
If we choose to keep lockdown enabled by default then we will need to
document a way it can be disabled so users can run applications like
https://cilium.io/ or the bcc iovisor
Hello, possibly related to:
https://bugs.launchpad.net/ubuntu/+bug/1866219
Thanks
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1866256
Title:
Disabled animations breaks lock screen and other
Hello, possibly related to:
https://bugs.launchpad.net/ubuntu/+source/gnome-shell/+bug/1866256
Thanks
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Andrea, unfortunately this updated kernel hasn't fixed the problem:
01:02:48 up 21:21, 9 users, load average: 1.45, 0.98, 0.58
Linux millbarge 5.4.0-17-generic #21-Ubuntu SMP Fri Feb 28 16:18:44 UTC
2020 x86_64 x86_64 x86_64 GNU/Linux
I was able to reproduce the swap growth and hangs with
Andrea, this new kernel looks promising.
Linux millbarge 5.4.0-17-generic #21-Ubuntu SMP Fri Feb 28 16:18:44 UTC
2020 x86_64 x86_64 x86_64 GNU/Linux
Unfortunately I didn't check the reproducer before rebooting: the error
message I get with it now suggests that it might not work any more.
On Mon, Mar 02, 2020 at 09:15:56AM -, Shaheena Kazi wrote:
> Public bug reported:
>
> I have created an AppArmor profile for SSH.
ssh server or ssh client?
What profile transitions did you put into your profile?
> The profile is created successfully but each time I run aa-logprof it gives
Public bug reported:
Hello, there's dangling symlinks in the zfsutils-linux binary packages
on a bionic system:
lrwxrwxrwx 1 root root7 Apr 13 2016 libnvpair1linux -> zfs-doc
lrwxrwxrwx 1 root root7 Apr 13 2016 libuutil1linux -> zfs-doc
lrwxrwxrwx 1 root root7 Apr 13 2016
This web page may be a good reproducer candidate:
https://platform.leolabs.space/visualizations/conjunction?type=conjunction=2004981040
Loading it in firefox would make my computer unresponsive for over a
minute. (Be careful with firefox reloading it when re-opening firefox.)
Loading it in
I reviewed libheif 1.6.1-1 as checked into focal. This shouldn't be
considered a full audit but rather a quick gauge of maintainability.
libheif is an image codec library necessary for decoding photos from some
newer phones.
- CVE History:
- CVE-2019-11471, our database says still unfixed in
Yes, that mesa bug looks about right.
Here's a photo I snapped of firefox's address bar. I hit 'a', which
brought up history entries in a drop-down list. When I deleted the 'a',
the history list is removed, and these pixels were momentarily visible
during the repainting.
The static view of
I've returned to this package, and I'm seeing enough // TODO markers
that I'm starting to be concerned that this library implements
sufficient functionality to be useful for us. The code that's there
mostly looks good, but there's enough markers for "handle errors" and
"find out .." that I'm
On Tue, Feb 25, 2020 at 10:16:50PM -, Timo Aaltonen wrote:
> which desktop environment?
None, I use i3wm in x11.
> probably caused by the new mesa, which now defaults to the Iris driver
> on newer Intel GPU's, you can verify this by running firefox like:
>
> "dri_driver=i965 firefox"
The
On Tue, Feb 25, 2020 at 04:21:05PM -, Balint Reczey wrote:
> This is a temporary key and it is indeed available to everyone being
> able to run curl on the system:
> https://www.reddit.com/r/aws/comments/85vkq6/question_about_accesskeyid_secretaccesskey_in/
>
> The package does not change the
On Mon, Feb 24, 2020 at 06:48:33AM -, dinar qurbanov wrote:
> after firefox restart these appeared:
>
> Feb 24 09:30:04 dinar-HP-Pavilion-g7-Notebook-PC kernel: [ 141.932834]
> audit: type=1400 audit(1582525804.452:27): apparmor="DENIED"
> operation="open"
On Mon, Feb 24, 2020 at 11:45:12AM -, Launchpad Bug Tracker wrote:
> [MIR] libfido2, libcbor, mathjax (dependencies of openssh)
Is it known that mathjax is strictly needed? The mathjax webpage says:
"Beautiful math in all browsers"
which lines up with my expectation that it's a documentation
** Tags added: champagne
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1864274
Title:
crunchy pixels
To manage notifications about this bug go to:
Public bug reported:
Hello, after upgrading firefox (and many other packages) on focal today,
I've got some video artifacts in firefox.
When typing in text boxes and text fields, the new character is drawn
very slowly, pixel-by-pixel, and isn't complete until the cursor has
moved on. When larger
Public bug reported:
Hello, I tried to disable lockdown so I could debug bug 1861359.
I changed my security= kernel command line parameter to no longer
reference lockdown or integrity and yet the lockdown still applied:
sarnold@millbarge:~/Canonical/work-reports$ uname -a
Linux millbarge
This new version of ec2-instance-connect is significantly better, thanks
for all the work.
I was wrong about the dedicated user: using the ec2-instance-connect
user is definitely an improvement.
My one specific concern:
- AWS_SECRET_ACCESS_KEY (and the ability to get one) appears to be
Public bug reported:
Hello, on focal with chromium from the snap package running I see a
constant stream of apparmor denials:
Feb 21 00:20:55 millbarge audit[4014267]: AVC apparmor="DENIED"
operation="open" profile="snap.chromium.chromium"
The hex encoded version of the key is also passed to openssl:
$ echo abcdef0123456789 | /usr/bin/od -A n -t x1 | /bin/sed ':a;N;$!ba;s/[\n
]//g'
616263646566303132333435363738390a
$ aa-decode 616263646566303132333435363738390a
Decoded: abcdef0123456789
# Sign a message with a given key
# sign
That's got to be my one super-power -- asking a question and finding out
that no, I didn't find a bug, but by asking the question someone *else*
spots a bug.
How about this?
# Derive a sigv4 signing key for the given secret
# get_sigv4_key [key] [datestamp] [region name] [service name]
$ uname -a
Linux millbarge 5.4.0-12-generic #15-Ubuntu SMP Tue Jan 21 15:12:29 UTC 2020
x86_64 x86_64 x86_64 GNU/Linux
$ cat /proc/sys/kernel/ftrace_enabled
1
$ sudo kprobe-perf -s 'p:shrink_node'
[sudo] password for sarnold:
ERROR: func shrink_node not in
Is the postrm script missing a systemctl daemon-reload?
==> postrm <==
#!/bin/sh
set -e
#DEBHELPER#
case "$1" in
purge|remove|abort-install|disappear)
deb-systemd-helper purge ec2-instance-connect
# Delete system user
deluser --system --quiet ec2-instance-connect
Yes, 100% means an entire core is being used; 117% means the process is
multi-threaded and threads are executing on several cores at once, thus
the total is above 100%.
As for flash's poor performance, that'd be on Adobe to sort out -- given
they are only doing security fixes for flash, for only
*** This bug is a duplicate of bug 1728697 ***
https://bugs.launchpad.net/bugs/1728697
** This bug has been marked a duplicate of bug 1728697
package flashplugin-installer 27.0.0.183ubuntu0.16.04.1 failed to
install/upgrade: problemas de dependencias - se deja sin configurar
--
You
*** This bug is a duplicate of bug 1728697 ***
https://bugs.launchpad.net/bugs/1728697
** This bug has been marked a duplicate of bug 1728697
package flashplugin-installer 27.0.0.183ubuntu0.16.04.1 failed to
install/upgrade: problemas de dependencias - se deja sin configurar
--
You
Can we drop all the flash packages before focal becomes 20.04 LTS? I
don't think we should have flash in the release at all if we know it
won't be supportable after a few months.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Hmm, the error message says no more free space, but the df output shows
there's space left.
How'd this work out?
Thanks
** Changed in: flashplugin-nonfree (Ubuntu)
Status: New => Incomplete
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
801 - 900 of 6656 matches
Mail list logo