This bug is missing log files that will aid in diagnosing the problem.
While running an Ubuntu kernel (not a mainline or third-party kernel)
please enter the following command in a terminal window:

apport-collect 1748157

and then change the status of the bug to 'Confirmed'.

If, due to the nature of the issue you have encountered, you are unable
to run this command, please add a comment stating that fact and change
the bug status to 'Confirmed'.

This change has been made by an automated script, maintained by the
Ubuntu Kernel Team.

** Changed in: linux (Ubuntu)
       Status: New => Incomplete

You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.

   [MIR] thunderbolt-tools

Status in linux package in Ubuntu:

Bug description:
  == Overview ==

  Intel Thunderbolt userspace components provides components for using
  Intel Thunderbolt controllers with security level features.
  Thunderboltâ„¢ technology is a transformational high-speed, dual
  protocol I/O that provides unmatched performance with up to 40Gbps bi-
  directional transfer speeds. It provides flexibility and simplicity by
  supporting both data (PCIe, USB3.1) and video (DisplayPort) on a
  single cable connection that can daisy-chain up to six devices.

  [ See ]

  == Answers to UbuntuMainInclusionRequirements ==

  = Requirements =

  1. Availability
     Package is in universe:

  2. Rationale
     Package a device enabler for users with Thunderbolt technology

  3. Security:
     No security issues exposed so far. However, the tools have only been in 
Ubuntu since
     2017-12-09, so this currently is less than the 90 days threshold.

  4. Quality assurance:
     * Manual is provided
     * No debconf questions higher than medium
     * No major outstanding bugs. I'm also helping Intel fix issues that I'm 
finding with
       static analysis tools such as scan-build, cppcheck and CoverityScan
       Bugs outstanding:
         #883857 please backport for stretch-backports
         #882525 thunderbolt-tools: FTBFS on kFreeBSD: 
_ZN5boost6system15system_categoryEv undefined
           - I can fix this, but it makes no sense to run on kFreeBSD
     * Exotic Hardware: Only Thunderbolt supported H/W is required, this is an 
industry standard
       and the support for the tools are in the 4.13+ kernels
     * No Test Suite shipped with the package
     * Does not rely on obsolete or demoted packages

  5. UI standards:
     * This is a CLI tool. Tool has normal CLI style short help and man pages
     * No desktop file required as it is a CLI tool.

  6. Binary Dependencies:
        libboost-dev                    (main)
        libboost-filesystem-dev         (main)
        libboost-program-options-dev    (main)
        udev                            (main)

  7. Standards compliance:
     lintian clean and meets the FHS + Debian Policy standards to the best of 
my knowledge

  8. Maintenance
     * Package owning team: The Ubuntu Kernel Team
     * Debian package maintained by Colin Ian King (myself from the Kernel Team)

  9. Background Information
     The user-space components implement device approval support:

     a. Easier interaction with the kernel module for approving connected 
     b. ACL for auto-approving devices white-listed by the user.

     Tools provided by this package:

      tbtacl - triggered by udev (see the udev rules in tbtacl.rules).
  It auto-approves devices that are found in ACL.

      tbtadm - user-facing CLI tool. It provides operations for device
  approval, handling the ACL and more.

      The user-space components operate in coordination with the
  upstream Thunderbolt kernel driver (found in v4.13) to provide the
  Thunderbolt functionalities. These components are NOT compatible with
  the old out-of-tree Thunderbolt kernel module.

  = Security checks = Search in the National Vulnerability 
Database using the package as a keyword
    * No CVEs found search for the package as a keyword
    * No security advisories found

    Ubuntu CVE Tracker
      * No
      * No
      * No

      Check for security relevant binaries. If any are present, this
      requires a more in-depth security review.

      Executables which have the suid or sgid bit set.
        * Not applicable

      Executables in /sbin, /usr/sbin.
        * None in these paths

      Packages which install daemons (/etc/init.d/*)
        * No

      Packages which open privileged ports (ports < 1024).
        * No

       Add-ons and plugins to security-sensitive software (filters,
       scanners, UI skins, etc)
        * This does exec tbtacl from udev with new udev rules, so this
          needs security checking

To manage notifications about this bug go to:

Mailing list:
Post to     :
Unsubscribe :
More help   :

Reply via email to