[Bug 1832265] Re: keystone LDAP integration in rocky not working for RBAC rules or token auth
The commits picked may not go far enough as they just seem to touch the Federated token formatter classes - may need to expand that to cover other Payload types. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1832265 Title: keystone LDAP integration in rocky not working for RBAC rules or token auth To manage notifications about this bug go to: https://bugs.launchpad.net/charm-keystone-ldap/+bug/1832265/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1832804] [NEW] cannot create network without subnet
Public bug reported: Project or Admin -> Network -> Networks -> Create Network In this form, if you clean the checkbox "Create Subnet", you cannot submit this form because the cidr field is required. the error message in window of console: An invalid form control with name='cidr' is not focusable. ** Affects: horizon (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1832804 Title: cannot create network without subnet To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/horizon/+bug/1832804/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1832622] Re: QEMU - count cache flush Spectre v2 mitigation (CVE) (required for POWER9 DD2.3)
There is a rather similar set of patches for new Intel CPU revisions in the pipe. And in between will be a set of general security fixes to the virt stack. I'd prefer to push both at the same upload, to avoid users having to download qemu too often. I'd assume that this bug here is important, but then also not super-urgent as DD2.3 availability (right now) still should be very low anyway right? If this is rather urgent then please let us know and test the PPA asap on all releases. If that is ok I'll ask the security Team to base their coming fixes on this instead of what is in proposed. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1832622 Title: QEMU - count cache flush Spectre v2 mitigation (CVE) (required for POWER9 DD2.3) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-power-systems/+bug/1832622/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1832804] Re: cannot create network without subnet
Fixed by: https://review.opendev.org/#/c/665085/ -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1832804 Title: cannot create network without subnet To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/horizon/+bug/1832804/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1808957] Re: Dell XPS 13 (9370) defaults to s2idle sleep/suspend instead of deep, NVMe drains lots of power under s2idle
For distros other than Ubuntu, please compile your own kernel. The simplest way to do it is to use nvme-5.3 branch: http://git.infradead.org/nvme.git/shortlog/refs/heads/nvme-5.3 And pick the following two PCI patches: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d491f2b75237ef37d8867830ab7fad8d9659e853 https://patchwork.kernel.org/patch/10993697/ -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1808957 Title: Dell XPS 13 (9370) defaults to s2idle sleep/suspend instead of deep, NVMe drains lots of power under s2idle To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1808957/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1796443] Re: HP EliteBook 745 G5 (Ryzen 2500U) fails to boot unless `mce=off` is set on command line
Jon, Please test kernels here: https://people.canonical.com/~khfeng/lp1796443/ -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1796443 Title: HP EliteBook 745 G5 (Ryzen 2500U) fails to boot unless `mce=off` is set on command line To manage notifications about this bug go to: https://bugs.launchpad.net/linux/+bug/1796443/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1832265] Re: keystone LDAP integration in rocky not working for RBAC rules or token auth
Uploading test package to https://launchpad.net/~james- page/+archive/ubuntu/rocky -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1832265 Title: keystone LDAP integration in rocky not working for RBAC rules or token auth To manage notifications about this bug go to: https://bugs.launchpad.net/charm-keystone-ldap/+bug/1832265/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1832265] Re: keystone LDAP integration in rocky not working for RBAC rules or token auth
I feel this might be two bugs; one related to encoding of LDAP responses and the other due to behavioural changes - if that is the case we need to split them apart. With regards to python3 encoding - the last three commits in master branch on token_formatters.py are related to py3 encoding - I think we need to pick those: https://opendev.org/openstack/keystone/commit/79f468bad64c04a61e829029657fa6e905c610dd https://opendev.org/openstack/keystone/commit/44c1b3d28407b66d2a854105f210d53f7cdd6b6f https://opendev.org/openstack/keystone/commit/af3aef940c0162f12752a65282368d16c2d17c4f One of the first two should cover the user_id encoding issue. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1832265 Title: keystone LDAP integration in rocky not working for RBAC rules or token auth To manage notifications about this bug go to: https://bugs.launchpad.net/charm-keystone-ldap/+bug/1832265/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1832265] Re: keystone LDAP integration in rocky not working for RBAC rules or token auth
** Also affects: keystone (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1832265 Title: keystone LDAP integration in rocky not working for RBAC rules or token auth To manage notifications about this bug go to: https://bugs.launchpad.net/charm-keystone-ldap/+bug/1832265/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1832802] [NEW] disco: curl error while loading shared libraries: libssl.so.1.0.0
Public bug reported: Linux 5.0.0-16-generic #17-Ubuntu SMP Wed May 15 10:52:21 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux DISTRIB_RELEASE=19.04 DISTRIB_DESCRIPTION="Ubuntu 19.04" curl: Installed: 7.64.0-2ubuntu1.1 Candidate: 7.64.0-2ubuntu1.1 Version table: *** 7.64.0-2ubuntu1.1 1001 1001 http://security.ubuntu.com/ubuntu disco-security/main amd64 Packages 1001 http://mirror.aarnet.edu.au/pub/ubuntu/archive disco-updates/main amd64 Packages 100 /var/lib/dpkg/status 7.64.0-2ubuntu1 1001 1001 http://mirror.aarnet.edu.au/pub/ubuntu/archive disco/main amd64 Packages When I run curl, I get the following error: curl: error while loading shared libraries: libssl.so.1.0.0: cannot open shared object file: No such file or directory On other disco machines I'm not experiencing this issue. I apt purged openssl/libssl/curl and re-installed, but the error persists. I'm sure my system has some issue, but I'm unable to figure it out, and this felt like a bug as curl was working before upgrade to disco. I tried proposed packages to see if openssl 1.1.1b-1ubuntu2.2 instead of 1.1.1b-1ubuntu2 would make any difference, but the error persists. me@mbp:/usr/lib/x86_64-linux-gnu$ curl curl: error while loading shared libraries: libssl.so.1.0.0: cannot open shared object file: No such file or directory me@mbp:/usr/lib/x86_64-linux-gnu$ which curl /usr/bin/curl me@mbp:/usr/lib/x86_64-linux-gnu$ sudo dpkg -l | grep curl ii curl 7.64.0-2ubuntu1.1 amd64command line tool for transferring data with URL syntax ii libcurl3-gnutls:amd64 7.64.0-2ubuntu1.1 amd64easy-to-use client-side URL transfer library (GnuTLS flavour) ii libcurl4:amd64 7.64.0-2ubuntu1.1 amd64easy-to-use client-side URL transfer library (OpenSSL flavour) ii python3-pycurl 7.43.0.2-0.1 amd64Python bindings to libcurl (Python 3) me@mbp:/usr/lib/x86_64-linux-gnu$ sudo dpkg -l | grep ssl ii android-libboringssl8.1.0+r23-2 amd64Google's internal fork of OpenSSL for the Android SDK rc docbook-dsssl 1.79-9.1 all modular DocBook DSSSL stylesheets, for print and HTML ii libflac++6v5:amd64 1.3.2-3 amd64Free Lossless Audio Codec - C++ runtime library ii libflac8:amd64 1.3.2-3 amd64Free Lossless Audio Codec - runtime C library ii libflac8:i386 1.3.2-3 i386 Free Lossless Audio Codec - runtime C library ii libio-socket-ssl-perl 2.060-3 all Perl module implementing object oriented interface to SSL sockets ii libnet-smtp-ssl-perl1.04-1 all Perl module providing SSL support to Net::SMTP ii libnet-ssleay-perl 1.85-2ubuntu3 amd64Perl module for Secure Sockets Layer (SSL) ii libssl-dev:amd64 1.1.1b-1ubuntu2.2 amd64Secure Sockets Layer toolkit - development files ii libssl1.1:amd64 1.1.1b-1ubuntu2.2 amd64Secure Sockets Layer toolkit - shared libraries ii libssl1.1:i386 1.1.1b-1ubuntu2.2 i386 Secure Sockets Layer toolkit - shared libraries ii libwavpack1:amd64 5.1.0-5ubuntu0.1amd64audio codec (lossy and lossless) - library ii libwavpack1:i386 5.1.0-5ubuntu0.1i386 audio codec (lossy and lossless) - library ii libzstd1:amd64 1.3.8+dfsg-3 amd64fast lossless compression algorithm ii libzstd1:i386 1.3.8+dfsg-3 i386 fast lossless compression algorithm ii openssl 1.1.1b-1ubuntu2.2 amd64Secure Sockets Layer toolkit - cryptographic utility ii perl-openssl-defaults:amd64
[Bug 1832801] [NEW] disco: curl error while loading shared libraries: libssl.so.1.0.0
Public bug reported: Linux 5.0.0-16-generic #17-Ubuntu SMP Wed May 15 10:52:21 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux DISTRIB_RELEASE=19.04 DISTRIB_DESCRIPTION="Ubuntu 19.04" curl: Installed: 7.64.0-2ubuntu1.1 Candidate: 7.64.0-2ubuntu1.1 Version table: *** 7.64.0-2ubuntu1.1 1001 1001 http://security.ubuntu.com/ubuntu disco-security/main amd64 Packages 1001 http://mirror.aarnet.edu.au/pub/ubuntu/archive disco-updates/main amd64 Packages 100 /var/lib/dpkg/status 7.64.0-2ubuntu1 1001 1001 http://mirror.aarnet.edu.au/pub/ubuntu/archive disco/main amd64 Packages When I run curl, I get the following error: curl: error while loading shared libraries: libssl.so.1.0.0: cannot open shared object file: No such file or directory On other disco machines I'm not experiencing this issue. I apt purged openssl/libssl/curl and re-installed, but the error persists. I'm sure my system has some issue, but I'm unable to figure it out, and this felt like a bug as curl was working before upgrade to disco. I tried proposed packages to see if openssl 1.1.1b-1ubuntu2.2 instead of 1.1.1b-1ubuntu2 would make any difference, but the error persists. me@mbp:/usr/lib/x86_64-linux-gnu$ curl curl: error while loading shared libraries: libssl.so.1.0.0: cannot open shared object file: No such file or directory me@mbp:/usr/lib/x86_64-linux-gnu$ which curl /usr/bin/curl me@mbp:/usr/lib/x86_64-linux-gnu$ sudo dpkg -l | grep curl ii curl 7.64.0-2ubuntu1.1 amd64command line tool for transferring data with URL syntax ii libcurl3-gnutls:amd64 7.64.0-2ubuntu1.1 amd64easy-to-use client-side URL transfer library (GnuTLS flavour) ii libcurl4:amd64 7.64.0-2ubuntu1.1 amd64easy-to-use client-side URL transfer library (OpenSSL flavour) ii python3-pycurl 7.43.0.2-0.1 amd64Python bindings to libcurl (Python 3) me@mbp:/usr/lib/x86_64-linux-gnu$ sudo dpkg -l | grep ssl ii android-libboringssl8.1.0+r23-2 amd64Google's internal fork of OpenSSL for the Android SDK rc docbook-dsssl 1.79-9.1 all modular DocBook DSSSL stylesheets, for print and HTML ii libflac++6v5:amd64 1.3.2-3 amd64Free Lossless Audio Codec - C++ runtime library ii libflac8:amd64 1.3.2-3 amd64Free Lossless Audio Codec - runtime C library ii libflac8:i386 1.3.2-3 i386 Free Lossless Audio Codec - runtime C library ii libio-socket-ssl-perl 2.060-3 all Perl module implementing object oriented interface to SSL sockets ii libnet-smtp-ssl-perl1.04-1 all Perl module providing SSL support to Net::SMTP ii libnet-ssleay-perl 1.85-2ubuntu3 amd64Perl module for Secure Sockets Layer (SSL) ii libssl-dev:amd64 1.1.1b-1ubuntu2.2 amd64Secure Sockets Layer toolkit - development files ii libssl1.1:amd64 1.1.1b-1ubuntu2.2 amd64Secure Sockets Layer toolkit - shared libraries ii libssl1.1:i386 1.1.1b-1ubuntu2.2 i386 Secure Sockets Layer toolkit - shared libraries ii libwavpack1:amd64 5.1.0-5ubuntu0.1amd64audio codec (lossy and lossless) - library ii libwavpack1:i386 5.1.0-5ubuntu0.1i386 audio codec (lossy and lossless) - library ii libzstd1:amd64 1.3.8+dfsg-3 amd64fast lossless compression algorithm ii libzstd1:i386 1.3.8+dfsg-3 i386 fast lossless compression algorithm ii openssl 1.1.1b-1ubuntu2.2 amd64Secure Sockets Layer toolkit - cryptographic utility ii perl-openssl-defaults:amd64
[Bug 1832798] [NEW] Better qt experience out of the box (suggestion)
Public bug reported: (I'm unsure about the right package to report this to) The qt experience out of the box is currently a mess. Short of proper Yaru integration, why not install qt5ct with consistent Ubuntu fonts and icons and Breeze by default? Every qt app will work just fine with Breeze. Currently we’re exposing a newcomer that barely knows that gtk and qt are things, let alone different things, to a difficult manual configuration process that’s not even well documented. That’s much worse than theme integration issues. A new user wanting to launch lyx or qbittorrent should just launch lyx or qbittorrent and have a pleasant experience. That’s not so hard: * Preinstall kde-style-breeze and qt5ct * Set ubuntu fonts, dialogs and icons in qt5ct * Add export QT_QPA_PLATFORMTHEME=qt5ct export QT_AUTO_SCREEN_SCALE_FACTOR=1 to the default profile. ** Affects: ubuntu-meta (Ubuntu) Importance: Undecided Status: New ** Description changed: (I'm unsure about the right package to report this to) The qt experience out of the box is currently a mess. Short of proper Yaru integration, why not install qt5ct with consistent Ubuntu fonts and icons and Breeze by default? Every qt app will work just fine with Breeze. Currently we’re exposing a newcomer that barely knows gtk and qt are things, let alone different things, to a difficult manual configuration process that’s not even well documented. That’s much worse than theme integration issues. A new user wanting to launch lyx or qbittorrent should just launch lyx or qbittorrent and have a pleasant experience. That’s not so hard: - Preinstall kde-style-breeze and qt5ct - Set ubuntu fonts, dialogs and icons in qt5ct - Add - export QT_QPA_PLATFORMTHEME=qt5ct - export QT_AUTO_SCREEN_SCALE_FACTOR=1 - - to the default profile. + * Preinstall kde-style-breeze and qt5ct + * Set ubuntu fonts, dialogs and icons in qt5ct + * Add + export QT_QPA_PLATFORMTHEME=qt5ct + export QT_AUTO_SCREEN_SCALE_FACTOR=1 + to the default profile. ** Description changed: (I'm unsure about the right package to report this to) The qt experience out of the box is currently a mess. Short of proper Yaru integration, why not install qt5ct with consistent Ubuntu fonts and icons and Breeze by default? Every qt app will work just fine with - Breeze. Currently we’re exposing a newcomer that barely knows gtk and qt - are things, let alone different things, to a difficult manual + Breeze. Currently we’re exposing a newcomer that barely knows that gtk + and qt are things, let alone different things, to a difficult manual configuration process that’s not even well documented. That’s much worse than theme integration issues. A new user wanting to launch lyx or qbittorrent should just launch lyx or qbittorrent and have a pleasant experience. That’s not so hard: * Preinstall kde-style-breeze and qt5ct * Set ubuntu fonts, dialogs and icons in qt5ct * Add - export QT_QPA_PLATFORMTHEME=qt5ct - export QT_AUTO_SCREEN_SCALE_FACTOR=1 - to the default profile. + export QT_QPA_PLATFORMTHEME=qt5ct + export QT_AUTO_SCREEN_SCALE_FACTOR=1 + to the default profile. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1832798 Title: Better qt experience out of the box (suggestion) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubuntu-meta/+bug/1832798/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1773608] Re: Custom partition mount point not kept with "OK"; kept with
[Expired for calamares (Ubuntu) because there has been no activity for 60 days.] ** Changed in: calamares (Ubuntu) Status: Incomplete => Expired -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1773608 Title: Custom partition mount point not kept with "OK"; kept with To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/calamares/+bug/1773608/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1824578] Re: Screen lock doesn't lock Launcher (left-sidebar) and Status Menus (Indicators)
[Expired for gnome-shell (Ubuntu) because there has been no activity for 60 days.] ** Changed in: gnome-shell (Ubuntu) Status: Incomplete => Expired -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1824578 Title: Screen lock doesn't lock Launcher (left-sidebar) and Status Menus (Indicators) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gnome-shell/+bug/1824578/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1807621] Re: missing icon theme and segmentation fault trying to open qpdfview
[Expired for qpdfview (Ubuntu) because there has been no activity for 60 days.] ** Changed in: qpdfview (Ubuntu) Status: Incomplete => Expired -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1807621 Title: missing icon theme and segmentation fault trying to open qpdfview To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/qpdfview/+bug/1807621/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1824657] Re: GNOME shell crash
[Expired for gnome-shell (Ubuntu) because there has been no activity for 60 days.] ** Changed in: gnome-shell (Ubuntu) Status: Incomplete => Expired -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1824657 Title: GNOME shell crash To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gnome-shell/+bug/1824657/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1820171] Re: Screen blank when watching youtube on Chromium
[Expired for lubuntu-meta (Ubuntu) because there has been no activity for 60 days.] ** Changed in: lubuntu-meta (Ubuntu) Status: Incomplete => Expired -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1820171 Title: Screen blank when watching youtube on Chromium To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/lubuntu-meta/+bug/1820171/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1821870] Re: gnome-shell segfault libmutter-clutter-2
[Expired for gnome-shell (Ubuntu) because there has been no activity for 60 days.] ** Changed in: gnome-shell (Ubuntu) Status: Incomplete => Expired -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1821870 Title: gnome-shell segfault libmutter-clutter-2 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gnome-shell/+bug/1821870/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1824605] Re: bug after system check
[Expired for Ubuntu because there has been no activity for 60 days.] ** Changed in: ubuntu Status: Incomplete => Expired -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1824605 Title: bug after system check To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+bug/1824605/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1824739] Re: The computer is not able to resume after suspend.
[Expired for Ubuntu because there has been no activity for 60 days.] ** Changed in: ubuntu Status: Incomplete => Expired -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1824739 Title: The computer is not able to resume after suspend. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+bug/1824739/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1832792] Re: App-switcher icons too small with hidpi (3000x2000) monitor
** Changed in: gnome-shell Status: Unknown => New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1832792 Title: App-switcher icons too small with hidpi (3000x2000) monitor To manage notifications about this bug go to: https://bugs.launchpad.net/gnome-shell/+bug/1832792/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1830822] Re: Killer 1650X Wifi/BT(2723:1654) fails to load correct firmware
This commit is in backport-iwlwifi dkms package and in oem-b-osp1 5.0 kernel, so close it. ** Changed in: linux-oem (Ubuntu) Status: In Progress => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1830822 Title: Killer 1650X Wifi/BT(2723:1654) fails to load correct firmware To manage notifications about this bug go to: https://bugs.launchpad.net/hwe-next/+bug/1830822/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1832795] Missing required logs.
This bug is missing log files that will aid in diagnosing the problem. While running an Ubuntu kernel (not a mainline or third-party kernel) please enter the following command in a terminal window: apport-collect 1832795 and then change the status of the bug to 'Confirmed'. If, due to the nature of the issue you have encountered, you are unable to run this command, please add a comment stating that fact and change the bug status to 'Confirmed'. This change has been made by an automated script, maintained by the Ubuntu Kernel Team. ** Changed in: linux (Ubuntu) Status: New => Incomplete -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1832795 Title: updates to aufs To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1832795/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1771252] Re: [ICL] Enable intel_rapl driver for Icelake
** Changed in: linux-oem-osp1 (Ubuntu) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1771252 Title: [ICL] Enable intel_rapl driver for Icelake To manage notifications about this bug go to: https://bugs.launchpad.net/intel/+bug/1771252/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1809224] Re: To support Intel Wireless-AX 22000 series
** Changed in: linux-oem-osp1 (Ubuntu) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1809224 Title: To support Intel Wireless-AX 22000 series To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1809224/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1832795] [NEW] updates to aufs
Public bug reported: I have found and reported a critical bug in aufs (as shipped with the latest Ubuntu kernels, both on Bionic and Xenial), which potentially affects anyone running Docker on Ubuntu using aufs graph driver. The fix has been developed, tested at least by me to fix the issue, and committed into upstream aufs git repos The nature of the bug is, in case of multiple parallels aufs mounts and unmounts, the kernel can screw up krefs, and once that happens, the only remedy is to reboot it (as commands like mount/umount or cat /proc/mounts are all stuck in syscalls). I would appreciate syncing aufs with the latest upstream release from git, as it was done a few times already, or at least taking the below fix (whatever suits maintainers better). The fixed versions are the ones marked with 20190610, and from what I see they are available for all kernel versions since 4.14 (for example, 4.15 tree is here: https://github.com/sfjro/aufs4-standalone/commits/aufs4.15). For 4.4, a backport might be needed, but it should be trivial. Original bug report: https://sourceforge.net/p/aufs/mailman/message/36680389/ Fix: https://github.com/sfjro/aufs4-linux/commit/b633d7b2635b9615fe294b85257d05008e3747a3 ** Affects: linux (Ubuntu) Importance: Undecided Status: Incomplete -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1832795 Title: updates to aufs To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1832795/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1716857] Re: nvidia-drm.modeset=1 results in no monitors detected by Xorg
Nvidia 430.26 behaves a bit differently. It just fails to start as non- root and gives reasons: [ 897.467] xf86EnableIOPorts: failed to set IOPL for I/O (Operation not permitted) ... [ 897.470] (EE) NVIDIA: Failed to initialize the NVIDIA kernel module. Please see the [ 897.470] (EE) NVIDIA: system's kernel log for additional error messages and [ 897.470] (EE) NVIDIA: consult the NVIDIA README for details. [ 897.470] (EE) NVIDIA: Failed to initialize the NVIDIA kernel module. Please see the [ 897.470] (EE) NVIDIA: system's kernel log for additional error messages and [ 897.470] (EE) NVIDIA: consult the NVIDIA README for details. [ 897.470] (EE) [drm] Failed to open DRM device for (null): -2 [ 897.470] (EE) [drm] Failed to open DRM device for pci::01:00.0: -2 So then the NVIDIA driver gives up and Xorg tries the modeset driver instead. Modeset seems to detect my monitor fine (got the EDID) but then fails with bug 1813897. This is now a bit off-topic, but I suspect the above problem with nvidia-430 will have the same fix as this bug. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1716857 Title: nvidia-drm.modeset=1 results in no monitors detected by Xorg To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gdm3/+bug/1716857/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1831161] Re: App-switcher icons too small with hidpi monitor and 1.25 scaling
** Tags added: hidpi -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1831161 Title: App-switcher icons too small with hidpi monitor and 1.25 scaling To manage notifications about this bug go to: https://bugs.launchpad.net/gnome-shell/+bug/1831161/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1832792] Re: App-switcher icons too small with hidpi (3000x2000) monitor
** Tags added: hidpi ** Bug watch added: gitlab.gnome.org/GNOME/gnome-shell/issues #1370 https://gitlab.gnome.org/GNOME/gnome-shell/issues/1370 ** Also affects: gnome-shell via https://gitlab.gnome.org/GNOME/gnome-shell/issues/1370 Importance: Unknown Status: Unknown -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1832792 Title: App-switcher icons too small with hidpi (3000x2000) monitor To manage notifications about this bug go to: https://bugs.launchpad.net/gnome-shell/+bug/1832792/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1832656] Re: chromium-browser deb->snap transition breaks ubuntukylin image builds
** Changed in: ubuntukylin-meta (Ubuntu Eoan) Assignee: (unassigned) => handsome_feng (feng-kylin) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1832656 Title: chromium-browser deb->snap transition breaks ubuntukylin image builds To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/1832656/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1828215] Update Released
The verification of the Stable Release Update for openssl has completed successfully and the package has now been released to -updates. Subsequently, the Ubuntu Stable Release Updates Team is being unsubscribed and will not receive messages about this bug report. In the event that you encounter a regression using the package from -updates please report a new bug using ubuntu-bug and tag the bug report regression-update so we can easily find any regressions. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1828215 Title: openssl ca -spkac output regressed To manage notifications about this bug go to: https://bugs.launchpad.net/openssl/+bug/1828215/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1832522] Re: openssl maintainer scripts do not trigger services restart
This bug was fixed in the package openssl - 1.1.1-1ubuntu2.1~18.04.2 --- openssl (1.1.1-1ubuntu2.1~18.04.2) bionic; urgency=medium * Cherrypick upstream patch to fix ca -spkac output to be text again. LP: #1828215 * Cherrypick upstream patch to prevent over long nonces in ChaCha20-Poly1305 CVE-2019-1543 * Bump major version of OpenSSL in postinst to trigger services restart upon upgrade. Many services listed there must be restarted when upgrading 1.1.0 to 1.1.1. LP: #1832522 -- Dimitri John Ledkov Wed, 12 Jun 2019 00:12:47 +0100 ** Changed in: openssl (Ubuntu Bionic) Status: Fix Committed => Fix Released ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-1543 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1832522 Title: openssl maintainer scripts do not trigger services restart To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1832522/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1832522] Update Released
The verification of the Stable Release Update for openssl has completed successfully and the package has now been released to -updates. Subsequently, the Ubuntu Stable Release Updates Team is being unsubscribed and will not receive messages about this bug report. In the event that you encounter a regression using the package from -updates please report a new bug using ubuntu-bug and tag the bug report regression-update so we can easily find any regressions. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1832522 Title: openssl maintainer scripts do not trigger services restart To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1832522/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1828215] Re: openssl ca -spkac output regressed
This bug was fixed in the package openssl - 1.1.1-1ubuntu2.1~18.04.2 --- openssl (1.1.1-1ubuntu2.1~18.04.2) bionic; urgency=medium * Cherrypick upstream patch to fix ca -spkac output to be text again. LP: #1828215 * Cherrypick upstream patch to prevent over long nonces in ChaCha20-Poly1305 CVE-2019-1543 * Bump major version of OpenSSL in postinst to trigger services restart upon upgrade. Many services listed there must be restarted when upgrading 1.1.0 to 1.1.1. LP: #1832522 -- Dimitri John Ledkov Wed, 12 Jun 2019 00:12:47 +0100 ** Changed in: openssl (Ubuntu Bionic) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1828215 Title: openssl ca -spkac output regressed To manage notifications about this bug go to: https://bugs.launchpad.net/openssl/+bug/1828215/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1723827] Re: App indicator icon size is too small
See my report https://bugs.launchpad.net/ubuntu/+source/gnome-shell- extension-appindicator/+bug/1832793 Indeed PANEL_ICON_SIZE is the wrong way to compute the icon size. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1723827 Title: App indicator icon size is too small To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gnome-shell-extension-appindicator/+bug/1723827/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1832793] Re: Size is not right with hidpi (both 2x and 1x with font scaling)
I've reported this in github also: https://github.com/ubuntu/gnome- shell-extension-appindicator/issues/181. I'm not sure which is the better place since upstream = distro here. ** Bug watch added: github.com/ubuntu/gnome-shell-extension-appindicator/issues #181 https://github.com/ubuntu/gnome-shell-extension-appindicator/issues/181 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1832793 Title: Size is not right with hidpi (both 2x and 1x with font scaling) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gnome-shell-extension-appindicator/+bug/1832793/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1832793] [NEW] Size is not right with hidpi (both 2x and 1x with font scaling)
Public bug reported: I've tried this in two different hidpi monitors with different scaling configurations: 1) A 1920x1080 screen with scale factor 1x and font scale factor 1.25. 2) A 3000x2000 screen with scale factor 2x. In the first one, icons are too small, I have to change: this._iconBox = new AppIndicator.IconActor(indicator, Panel.PANEL_ICON_SIZE + 6); to this._iconBox = new AppIndicator.IconActor(indicator, Panel.PANEL_ICON_SIZE + 12); OTOH, icons are a little too big in the second setting and I have to do: this._iconBox = new AppIndicator.IconActor(indicator, Panel.PANEL_ICON_SIZE + 2); Icons directly managed by gnome shell are not sized according to PANEL_ICON_SIZE, see: https://gitlab.gnome.org/GNOME/gnome- shell/blob/master/js/ui/panelMenu.js Short of a smarter way of computing icons size, you could provide a setting to adjust it so that the user could fine tune it if necessary without hacking the code. ** Affects: gnome-shell-extension-appindicator (Ubuntu) Importance: Undecided Status: New ** Summary changed: - Size is not right with hidpi (both 2x and fractional scaling) + Size is not right with hidpi (both 2x and 1x with font scaling) ** Description changed: I've tried this in two different hidpi monitors with different scaling configurations: 1) A 1920x1080 screen with scale factor 1x and font scale factor 1.25. - + 2) A 3000x2000 screen with scale factor 2x. - In the first one, icons are too small, I have to change: -this._iconBox = new AppIndicator.IconActor(indicator, + this._iconBox = new AppIndicator.IconActor(indicator, Panel.PANEL_ICON_SIZE + 6); to -this._iconBox = new AppIndicator.IconActor(indicator, + this._iconBox = new AppIndicator.IconActor(indicator, Panel.PANEL_ICON_SIZE + 12); OTOH, icons are a little too big in the second setting and I have to do: -this._iconBox = new AppIndicator.IconActor(indicator, + this._iconBox = new AppIndicator.IconActor(indicator, Panel.PANEL_ICON_SIZE + 2); + Icons directly managed by gnome shell are not sized according to + PANEL_ICON_SIZE, see: - Icons directly managed by gnome shell are not sized according to PANEL_ICON_SIZE, see: - -https://gitlab.gnome.org/GNOME/gnome- + https://gitlab.gnome.org/GNOME/gnome- shell/blob/master/js/ui/panelMenu.js Short of a smarter way of computing icons size, you could provide a - setting to adjust it. + setting to adjust it so that the user could fine tune it if necessary + without hacking the code. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1832793 Title: Size is not right with hidpi (both 2x and 1x with font scaling) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gnome-shell-extension-appindicator/+bug/1832793/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1396379] Re: installer uses first EFI system partition found even when directed otherwise
** Tags added: bionic -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1396379 Title: installer uses first EFI system partition found even when directed otherwise To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubiquity/+bug/1396379/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1825717] Re: hplip issue during hp-setup - stuck at plugin install
Brilliant! Solved my problem. Thank you. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1825717 Title: hplip issue during hp-setup - stuck at plugin install To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/hplip/+bug/1825717/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1831161] Re: App-switcher icons too small with hidpi monitor and 1.25 scaling
I've changed `baseIconSizes` from the looking glass and I get bigger icons. This doesn't seem to be hard to fix really. Maybe the size restriction should be checked *before* scaling up 2x. Maybe bigger icons should be allowed. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1831161 Title: App-switcher icons too small with hidpi monitor and 1.25 scaling To manage notifications about this bug go to: https://bugs.launchpad.net/gnome-shell/+bug/1831161/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1829620] Re: intel-microcode on ASUS makes kernel stuck during loading initramfs on bionic-updates, bionic-security
is it because of this? (is the file new?) intel-microcode-blacklist.conf : # The microcode module attempts to apply a microcode update when # it autoloads. This is not always safe, so we block it by default. blacklist microcode -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1829620 Title: intel-microcode on ASUS makes kernel stuck during loading initramfs on bionic-updates, bionic-security To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/intel-microcode/+bug/1829620/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1827697] Re: Enroll key whiptail prompt blocks kernel header package upgrades
@juliank To trigger the bug: 1. Install any out-of-tree dkms packages (like bbswitch-dkms) 2. Un-enroll keys from MOK, ensure `mokutil --test-key /var/lib/shim-signed/mok/MOK.der` command returns "/var/lib/shim-signed/mok/MOK.der is not enrolled" 3. Ensure SecureBoot is enabled 4. Install any linux-headers-${version}-generic packages that is currently not installed, verify if it stucks at configurating state -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1827697 Title: Enroll key whiptail prompt blocks kernel header package upgrades To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/dkms/+bug/1827697/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1832792] [NEW] App-switcher icons too small with hidpi (3000x2000) monitor
Public bug reported: I've reported this upstream (https://gitlab.gnome.org/GNOME/gnome- shell/issues/1370), but given that this is an important part of the Ubuntu desktop and that you're providing some patches for improving the X11 experience with hidpi monitors, I'm notifying about the issue here too. It could be related to my previous similar report for fractional scaling resolutions: https://bugs.launchpad.net/ubuntu/+source/gnome- shell/+bug/1831161. But I'm not sure. Besides, fractional scaling is an experimental feature while 2x is not. ** Affects: gnome-shell (Ubuntu) Importance: Undecided Status: New ** Summary changed: - App-switcher icons too small with hidpi monitor + App-switcher icons too small (48x48) with hidpi monitor ** Summary changed: - App-switcher icons too small (48x48) with hidpi monitor + App-switcher icons too small (48x48) with hidpi (3000x2000) monitor ** Summary changed: - App-switcher icons too small (48x48) with hidpi (3000x2000) monitor + App-switcher icons too small with hidpi (3000x2000) monitor -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1832792 Title: App-switcher icons too small with hidpi (3000x2000) monitor To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gnome-shell/+bug/1832792/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1829620] Re: intel-microcode on ASUS makes kernel stuck during loading initramfs on bionic-updates, bionic-security
Can someone pin-point what the change is in HWE kernel rebuilds -20 and -21? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1829620 Title: intel-microcode on ASUS makes kernel stuck during loading initramfs on bionic-updates, bionic-security To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/intel-microcode/+bug/1829620/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1804978] Re: Crash on "Eject" with two tabs open
As of Nemo 3.8.5, bug still present. scott@ASUS-PRIME-B350M-A-CSM:~$ uname -a Linux ASUS-PRIME-B350M-A-CSM 4.19.0-2-amd64 #1 SMP Debian 4.19.16-1 (2019-01-17) x86_64 GNU/Linux scott@ASUS-PRIME-B350M-A-CSM:~$ lsb_release -dsc Debian GNU/Linux buster/sid buster scott@ASUS-PRIME-B350M-A-CSM:~$ echo $DESKTOP_SESSION /usr/share/xsessions/lxqt scott@ASUS-PRIME-B350M-A-CSM:~$ apt-cache policy nemo nemo: Installed: 3.8.5-1+b1 Candidate: 3.8.5-1+b1 Version table: *** 3.8.5-1+b1 500 500 https://deb.debian.org/debian testing/main amd64 Packages 100 /var/lib/dpkg/status -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1804978 Title: Crash on "Eject" with two tabs open To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/nemo/+bug/1804978/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1829620] Re: intel-microcode on ASUS makes kernel stuck during loading initramfs on bionic-updates, bionic-security
Hey, I'm the OP, I can confirm @felix-ticona 's finding, after the kernel upgrade (atleast HWE to the -21 revision and the issue is "magically" done). # uname -a Linux xxx 4.18.0-21-generic #22~18.04.1-Ubuntu SMP Thu May 16 15:07:19 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux # dmesg | grep command [0.00] Kernel command line: BOOT_IMAGE=/vmlinuz-4.18.0-21-generic root=UUID=xxx ro rootflags=subvol=@ubuntu ro kaslr resume=xxx mem_sleep_default=deep dm_mod.use_blk_mq=1 acpi_osi=Linux acpi_backlight=vendor quiet Notice no dis_ucode_ldr (=no workaround 1) # apt-cache policy intel-microcode intel-microcode: Installed: 3.20190514.0ubuntu0.18.04.3 Candidate: 3.20190514.0ubuntu0.18.04.3 Version table: *** 3.20190514.0ubuntu0.18.04.3 500 500 mirror://mirrors.ubuntu.com/mirrors.txt bionic-security/main amd64 Packages 500 mirror://mirrors.ubuntu.com/mirrors.txt bionic-updates/main amd64 Packages 100 /var/lib/dpkg/status 3.20180312.0~ubuntu18.04.1 500 500 mirror://mirrors.ubuntu.com/mirrors.txt bionic/main amd64 Packages (=no workaround 2: old intel-microcode package holding) TODO: test main kernel (4.15) and hwe-edge (5.0) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1829620 Title: intel-microcode on ASUS makes kernel stuck during loading initramfs on bionic-updates, bionic-security To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/intel-microcode/+bug/1829620/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1726160] Re: On login, display rotates to wrong orientation [HP Pavilion]
Had this same problem on Acer Spin 1, with Intel Celeron CPU and Intel HD Graphics 500 (Broxton). Removing iio-sensor-proxy fixed it perfectly! Thank you! -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1726160 Title: On login, display rotates to wrong orientation [HP Pavilion] To manage notifications about this bug go to: https://bugs.launchpad.net/iio-sensor-proxy/+bug/1726160/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1828495] Re: [KVM][CLX] CPUID_7_0_EDX_ARCH_CAPABILITIES is not enabled in VM.
** Also affects: qemu (Ubuntu Eoan) Importance: Wishlist Assignee: Rafael David Tinoco (rafaeldtinoco) Status: Confirmed ** Also affects: linux (Ubuntu Eoan) Importance: Wishlist Status: Confirmed ** Also affects: qemu (Ubuntu Disco) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Disco) Importance: Undecided Status: New ** Also affects: qemu (Ubuntu Bionic) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Bionic) Importance: Undecided Status: New ** Also affects: qemu (Ubuntu Cosmic) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Cosmic) Importance: Undecided Status: New ** Changed in: qemu (Ubuntu Disco) Status: New => Confirmed ** Changed in: qemu (Ubuntu Cosmic) Status: New => Confirmed ** Changed in: qemu (Ubuntu Bionic) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1828495 Title: [KVM][CLX] CPUID_7_0_EDX_ARCH_CAPABILITIES is not enabled in VM. To manage notifications about this bug go to: https://bugs.launchpad.net/intel/+bug/1828495/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1810786] Re: libsilo misses silo_exports.h header
The fix in Debian: + -- Gianfranco Costamagna Wed, 12 Dec 2018 11:35:20 +0100 + silo-llnl (4.10.2.real-5) unstable; urgency=medium * Export missing header files (silo_exports.h, etc) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1810786 Title: libsilo misses silo_exports.h header To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/silo-llnl/+bug/1810786/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1828905] Re: go gnupg/clearsign issues
I'm sorry I lost track of this. Here's the packages that aren't Architecture: all: grep Arch $(egrep '^[mu]' /tmp/go | awk -F/ '{print $1 "/" $2 "/" $3 "/" $4 "/debian/control" ;}' | sort -u) | grep -v ":Architecture: all$" main/g/golang-go.crypto/golang-go.crypto_0.0~git20170629.0.5ef0053-1ubuntu1/debian/control:Architecture: any main/g/golang-go.crypto/golang-go.crypto_0.0~git20170629.0.5ef0053-1ubuntu1/debian/control:Architecture: any main/j/juju-core/juju-core_2.0.2-0ubuntu0.16.04.2/debian/control:Architecture: any main/j/juju-core/juju-core_2.0~beta4-0ubuntu2/debian/control:Architecture: any main/j/juju-core/juju-core_2.3.7-0ubuntu0.16.04.1/debian/control:Architecture: any main/l/lxd/lxd_2.0.0-0ubuntu4/debian/control:Architecture: any main/l/lxd/lxd_2.0.0-0ubuntu4/debian/control:Architecture: any main/l/lxd/lxd_2.0.0-0ubuntu4/debian/control:Architecture: any main/l/lxd/lxd_2.0.11-0ubuntu1~16.04.4/debian/control:Architecture: any main/l/lxd/lxd_2.0.11-0ubuntu1~16.04.4/debian/control:Architecture: any main/l/lxd/lxd_2.0.11-0ubuntu1~16.04.4/debian/control:Architecture: any main/l/lxd/lxd_2.0.2-0ubuntu1~16.04.1/debian/control:Architecture: any main/l/lxd/lxd_2.0.2-0ubuntu1~16.04.1/debian/control:Architecture: any main/l/lxd/lxd_2.0.2-0ubuntu1~16.04.1/debian/control:Architecture: any main/l/lxd/lxd_2.18-0ubuntu6/debian/control:Architecture: amd64 arm64 armhf i386 ppc64el s390x main/l/lxd/lxd_2.18-0ubuntu6/debian/control:Architecture: amd64 arm64 armhf i386 ppc64el s390x main/l/lxd/lxd_2.18-0ubuntu6/debian/control:Architecture: amd64 arm64 armhf i386 ppc64el s390x main/l/lxd/lxd_2.21-0ubuntu3~17.10.2/debian/control:Architecture: amd64 arm64 armhf i386 ppc64el s390x main/l/lxd/lxd_2.21-0ubuntu3~17.10.2/debian/control:Architecture: amd64 arm64 armhf i386 ppc64el s390x main/l/lxd/lxd_2.21-0ubuntu3~17.10.2/debian/control:Architecture: amd64 arm64 armhf i386 ppc64el s390x main/l/lxd/lxd_3.0.0-0ubuntu4/debian/control:Architecture: amd64 arm64 armhf i386 ppc64el s390x main/l/lxd/lxd_3.0.0-0ubuntu4/debian/control:Architecture: amd64 arm64 armhf i386 ppc64el s390x main/l/lxd/lxd_3.0.0-0ubuntu4/debian/control:Architecture: amd64 arm64 armhf i386 ppc64el s390x main/l/lxd/lxd_3.0.3-0ubuntu1~16.04.1/debian/control:Architecture: amd64 arm64 armhf i386 ppc64el s390x main/l/lxd/lxd_3.0.3-0ubuntu1~16.04.1/debian/control:Architecture: amd64 arm64 armhf i386 ppc64el s390x main/l/lxd/lxd_3.0.3-0ubuntu1~16.04.1/debian/control:Architecture: amd64 arm64 armhf i386 ppc64el s390x main/l/lxd/lxd_3.0.3-0ubuntu1~18.04.1/debian/control:Architecture: amd64 arm64 armhf i386 ppc64el s390x main/l/lxd/lxd_3.0.3-0ubuntu1~18.04.1/debian/control:Architecture: amd64 arm64 armhf i386 ppc64el s390x main/l/lxd/lxd_3.0.3-0ubuntu1~18.04.1/debian/control:Architecture: amd64 arm64 armhf i386 ppc64el s390x universe/a/aptly/aptly_0.9.6-1/debian/control:Architecture: any universe/a/aptly/aptly_1.0.1-1/debian/control:Architecture: any universe/a/aptly/aptly_1.2.0-3/debian/control:Architecture: any universe/a/aptly/aptly_1.3.0-6/debian/control:Architecture: any universe/a/aptly/aptly_1.3.0-6/debian/control:Architecture: any universe/a/aptly/aptly_1.3.0+ds1-2.2/debian/control:Architecture: any universe/a/aptly/aptly_1.3.0+ds1-2.2/debian/control:Architecture: any universe/a/aptly/aptly_1.3.0+ds1-2/debian/control:Architecture: any universe/a/aptly/aptly_1.3.0+ds1-2/debian/control:Architecture: any universe/a/autodeb/autodeb_0.20.0-1/debian/control:Architecture: any universe/a/autodeb/autodeb_0.20.0-1/debian/control:Architecture: any universe/c/candid/candid_1.0.0~alpha+201804191824-24b36a9-0ubuntu2/debian/control:Architecture: any universe/c/charm/charm_2.1.1-0ubuntu1/debian/control:Architecture: any universe/j/juju-core-1/juju-core-1_1.25.5-0ubuntu3/debian/control:Architecture: any universe/j/juju-core-1/juju-core-1_1.25.6-0ubuntu1.16.04.2/debian/control:Architecture: any universe/j/juju-core/juju-core_1.25.6-0ubuntu1.14.04.2/debian/control:Architecture: any universe/l/lxd/lxd_2.0.11-0ubuntu1~14.04.4/debian/control:Architecture: amd64 arm64 armhf i386 ppc64el universe/l/lxd/lxd_2.0.11-0ubuntu1~14.04.4/debian/control:Architecture: amd64 arm64 armhf i386 ppc64el universe/l/lxd/lxd_2.0.11-0ubuntu1~14.04.4/debian/control:Architecture: amd64 arm64 armhf i386 ppc64el universe/m/mongodb/mongodb_3.4.7-1/debian/control:Architecture: amd64 arm64 ppc64el s390x universe/m/mongodb/mongodb_3.4.7-1/debian/control:Architecture: amd64 arm64 ppc64el s390x universe/m/mongodb/mongodb_3.4.7-1/debian/control:Architecture: amd64 arm64 ppc64el s390x universe/m/mongodb/mongodb_3.6.3-0ubuntu1.1/debian/control:Architecture: amd64 arm64 ppc64el s390x universe/m/mongodb/mongodb_3.6.3-0ubuntu1.1/debian/control:Architecture: amd64 arm64 ppc64el s390x universe/m/mongodb/mongodb_3.6.3-0ubuntu1.1/debian/control:Architecture: amd64 arm64 ppc64el s390x universe/m/mongodb/mongodb_3.6.3-0ubuntu1/debian/control:Architecture: amd64 arm64 ppc64el s390x
[Bug 1810786] Re: libsilo misses silo_exports.h header
I see that this bug has been fixed in disco (19.04). Could we get the fix backported to bionic (18.04)? I'm willing to help if someone could point me in the correct direction. I know software and compiling, though I am not familiar with .deb packaging. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1810786 Title: libsilo misses silo_exports.h header To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/silo-llnl/+bug/1810786/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1832776] Re: Backport VMCI PPN64 patch
** Changed in: linux (Debian) Status: Unknown => New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1832776 Title: Backport VMCI PPN64 patch To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1832776/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1832787] [NEW] fontconfig 2.12 in 18.04 causes firefox to freeze when launching chrome
Public bug reported: fontconfig version: 2.12.6-0ubuntu2 Related: https://askubuntu.com/questions/1076412/firefox-freezing-with-100-cpu- usage-for-30-seconds-when-launching-chromium https://bugzilla.mozilla.org/show_bug.cgi?id=1495900 https://bugzilla.mozilla.org/show_bug.cgi?id=1411338 Steps to reproduce: 1) Launch firefox, open a few tabs 2) Launch chrome 3) Go back to firefox, and notice it starts being very slow, switching tabs do nothing (the content area remains blank). 4) Backport fontconfig 2.13 from cosmic to bionic 5) Try to reproduce 1-3, be happy because it is now working fine! I backported 2.13.0-5ubuntu3 from cosmic to bionic, if that helps. I don't have the right setup right now to do a bisect from upstream or from debian patches sadly. ~ lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description:Ubuntu 18.04.2 LTS Release:18.04 Codename: bionic ** Affects: fontconfig (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1832787 Title: fontconfig 2.12 in 18.04 causes firefox to freeze when launching chrome To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/fontconfig/+bug/1832787/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1827697] Re: Enroll key whiptail prompt blocks kernel header package upgrades
I have applied the updates on bionic and can no longer reproduce it. ** Tags removed: verification-needed-bionic ** Tags added: verification-done-bionic -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1827697 Title: Enroll key whiptail prompt blocks kernel header package upgrades To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/dkms/+bug/1827697/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1832295] Re: lighttpd broken by OpenSSL update
To eliminate further downtime, I built/installed lighttpd 1.4.54 which resolved the problem. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1832295 Title: lighttpd broken by OpenSSL update To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/lighttpd/+bug/1832295/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1825983] Re: chromium-browser ignores system proxy settings
In my case, it's ignoring a file:// based pac, which looks to be intentional: https://bugs.chromium.org/p/chromium/issues/detail?id=839566#c7 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1825983 Title: chromium-browser ignores system proxy settings To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/1825983/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1832786] [NEW] chromium-browser ignores system password store
Public bug reported: The new chromium 75 snap package intentionally ignores the system password store: https://chromium.googlesource.com/chromium/src.git/+/master/docs/linux_password_storage.md Normally, chromium auto-detects what type of password store to use, previously this has resulted in chromium connecting to the gnome password store. The new snap release passes the command line argument: '--password-store=basic' Which bypasses the gnome password storage. ** Affects: chromium-browser (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1832786 Title: chromium-browser ignores system password store To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/1832786/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1832786] Re: chromium-browser ignores system password store
Verified that manually starting with: '/snap/chromium/750/usr/lib/chromium-browser/chrome --no-default- browser-check --no-first-run --ppapi-flash-path' fixes the issue. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1832786 Title: chromium-browser ignores system password store To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/1832786/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1832641] Re: 4.15.0-46-generic doesn't support ethtool adaptive-tx for mlx5 card
Did this work correctly in previous 4.15.0 kernels? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1832641 Title: 4.15.0-46-generic doesn't support ethtool adaptive-tx for mlx5 card To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1832641/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1832782] Re: Backport VMW_PVRDMA PPN64 patch
Oops, it should be VMW_PVRDMA instead of VMCI in the first comment. Everything else is correct. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1832782 Title: Backport VMW_PVRDMA PPN64 patch To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1832782/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1796501] Re: systemd-resolved tries to mitigate DVE-2018-0001 even if DNSSEC=yes
I grabbed the top 500 hosts in an Eaon LXD container with DNS=1.1.1.1 wget -O top500.csv https://moz.com/top-500/download/?table=top500Domains cut -d, -f2 < top500.csv | cut -d\" -f2 > top500 I ran this script twice (with and without dnssec=yes): while read p; do sleep 1 echo "$p" resolvectl query $p > with_dnssec/$p done https://bugs.launchpad.net/bugs/1796501 Title: systemd-resolved tries to mitigate DVE-2018-0001 even if DNSSEC=yes To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1796501/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1832782] WifiSyslog.txt
apport information ** Attachment added: "WifiSyslog.txt" https://bugs.launchpad.net/bugs/1832782/+attachment/5270683/+files/WifiSyslog.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1832782 Title: Backport VMW_PVRDMA PPN64 patch To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1832782/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1832782] UdevDb.txt
apport information ** Attachment added: "UdevDb.txt" https://bugs.launchpad.net/bugs/1832782/+attachment/5270682/+files/UdevDb.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1832782 Title: Backport VMW_PVRDMA PPN64 patch To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1832782/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1832782] ProcModules.txt
apport information ** Attachment added: "ProcModules.txt" https://bugs.launchpad.net/bugs/1832782/+attachment/5270681/+files/ProcModules.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1832782 Title: Backport VMW_PVRDMA PPN64 patch To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1832782/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1829749] Re: Please add support for zipl signing
s390-tools in UNAPPROVED https://launchpad.net/ubuntu/eoan/+queue?queue_state=1_text=s390-tools s390-tools-signed in source NEW https://launchpad.net/ubuntu/eoan/+queue?queue_state=0_text=s390-tools-signed ** Summary changed: - Please add support for zipl signing + Please add support for sipl -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1829749 Title: Please add support for sipl To manage notifications about this bug go to: https://bugs.launchpad.net/launchpad/+bug/1829749/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1832782] Status changed to Confirmed
This change was made by a bot. ** Changed in: linux (Ubuntu) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1832782 Title: Backport VMW_PVRDMA PPN64 patch To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1832782/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1832782] ProcInterrupts.txt
apport information ** Attachment added: "ProcInterrupts.txt" https://bugs.launchpad.net/bugs/1832782/+attachment/5270680/+files/ProcInterrupts.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1832782 Title: Backport VMW_PVRDMA PPN64 patch To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1832782/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1781029] Re: package gnome-menus 3.13.3-6ubuntu3.1 failed to install/upgrade: triggers looping, abandoned
Status changed to 'Confirmed' because the bug affects multiple users. ** Changed in: gnome-menus (Ubuntu) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1781029 Title: package gnome-menus 3.13.3-6ubuntu3.1 failed to install/upgrade: triggers looping, abandoned To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gnome-menus/+bug/1781029/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1832782] AlsaInfo.txt
apport information ** Attachment added: "AlsaInfo.txt" https://bugs.launchpad.net/bugs/1832782/+attachment/5270673/+files/AlsaInfo.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1832782 Title: Backport VMW_PVRDMA PPN64 patch To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1832782/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1832782] Lsusb.txt
apport information ** Attachment added: "Lsusb.txt" https://bugs.launchpad.net/bugs/1832782/+attachment/5270677/+files/Lsusb.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1832782 Title: Backport VMW_PVRDMA PPN64 patch To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1832782/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1832782] ProcCpuinfo.txt
apport information ** Attachment added: "ProcCpuinfo.txt" https://bugs.launchpad.net/bugs/1832782/+attachment/5270678/+files/ProcCpuinfo.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1832782 Title: Backport VMW_PVRDMA PPN64 patch To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1832782/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1832782] Lspci.txt
apport information ** Attachment added: "Lspci.txt" https://bugs.launchpad.net/bugs/1832782/+attachment/5270676/+files/Lspci.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1832782 Title: Backport VMW_PVRDMA PPN64 patch To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1832782/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1832782] ProcCpuinfoMinimal.txt
apport information ** Attachment added: "ProcCpuinfoMinimal.txt" https://bugs.launchpad.net/bugs/1832782/+attachment/5270679/+files/ProcCpuinfoMinimal.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1832782 Title: Backport VMW_PVRDMA PPN64 patch To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1832782/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1832782] CurrentDmesg.txt
apport information ** Attachment added: "CurrentDmesg.txt" https://bugs.launchpad.net/bugs/1832782/+attachment/5270675/+files/CurrentDmesg.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1832782 Title: Backport VMW_PVRDMA PPN64 patch To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1832782/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1832782] [NEW] Backport VMW_PVRDMA PPN64 patch
Public bug reported: Hi, Can this kernel patch [1] for VMCI be backported to Ubuntu Bionic and later? Here is the commit log: commit 8aa04ad3b39396e315b23448c56d5465200fa777 Author: Adit Ranadive Date: Sat Jan 26 05:09:36 2019 + RDMA/vmw_pvrdma: Support upto 64-bit PFNs Update the driver to use the new device capability to report 64-bit UAR PFNs. Thanks, Adit [1] https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8aa04ad3b39396e315b23448c56d5465200fa777 --- ProblemType: Bug ApportVersion: 2.20.9-0ubuntu7.6 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC1: gdm2010 F pulseaudio adit 3290 F pulseaudio /dev/snd/controlC0: gdm2010 F pulseaudio adit 3290 F pulseaudio DistroRelease: Ubuntu 18.04 HibernationDevice: RESUME=UUID=5e12ac9f-b7e5-46f1-aa2a-0091eb5cb723 InstallationDate: Installed on 2018-11-06 (219 days ago) InstallationMedia: Ubuntu 18.04.1 LTS "Bionic Beaver" - Release amd64 (20180725) IwConfig: eno1 no wireless extensions. lono wireless extensions. docker0 no wireless extensions. MachineType: Dell Inc. Precision T3600 Package: linux (not installed) ProcEnviron: TERM=xterm-256color PATH=(custom, no user) LANG=en_US.UTF-8 SHELL=/bin/bash ProcFB: 0 nouveaufb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-4.15.0-51-generic root=/dev/mapper/ubuntu--vg-root ro quiet splash vt.handoff=1 ProcVersionSignature: Ubuntu 4.15.0-51.55-generic 4.15.18 PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: Home directory not accessible: Permission denied No PulseAudio daemon running, or not running as session daemon. RelatedPackageVersions: linux-restricted-modules-4.15.0-51-generic N/A linux-backports-modules-4.15.0-51-generic N/A linux-firmware 1.173.6 RfKill: Tags: bionic Uname: Linux 4.15.0-51-generic x86_64 UpgradeStatus: No upgrade log present (probably fresh install) UserGroups: _MarkForUpload: True dmi.bios.date: 08/09/2013 dmi.bios.vendor: Dell Inc. dmi.bios.version: A11 dmi.board.name: 08HPGT dmi.board.vendor: Dell Inc. dmi.board.version: A01 dmi.chassis.type: 7 dmi.chassis.vendor: Dell Inc. dmi.modalias: dmi:bvnDellInc.:bvrA11:bd08/09/2013:svnDellInc.:pnPrecisionT3600:pvr01:rvnDellInc.:rn08HPGT:rvrA01:cvnDellInc.:ct7:cvr: dmi.product.name: Precision T3600 dmi.product.version: 01 dmi.sys.vendor: Dell Inc. ** Affects: linux (Ubuntu) Importance: Undecided Status: Confirmed ** Tags: apport-collected bionic ** Tags added: apport-collected bionic ** Description changed: Hi, Can this kernel patch [1] for VMCI be backported to Ubuntu Bionic and later? Here is the commit log: commit 8aa04ad3b39396e315b23448c56d5465200fa777 Author: Adit Ranadive Date: Sat Jan 26 05:09:36 2019 + RDMA/vmw_pvrdma: Support upto 64-bit PFNs Update the driver to use the new device capability to report 64-bit UAR PFNs. Thanks, Adit - [1] - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8aa04ad3b39396e315b23448c56d5465200fa777 + [1] https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8aa04ad3b39396e315b23448c56d5465200fa777 + --- + ProblemType: Bug + ApportVersion: 2.20.9-0ubuntu7.6 + Architecture: amd64 + AudioDevicesInUse: + USERPID ACCESS COMMAND + /dev/snd/controlC1: gdm2010 F pulseaudio + adit 3290 F pulseaudio + /dev/snd/controlC0: gdm2010 F pulseaudio + adit 3290 F pulseaudio + DistroRelease: Ubuntu 18.04 + HibernationDevice: RESUME=UUID=5e12ac9f-b7e5-46f1-aa2a-0091eb5cb723 + InstallationDate: Installed on 2018-11-06 (219 days ago) + InstallationMedia: Ubuntu 18.04.1 LTS "Bionic Beaver" - Release amd64 (20180725) + IwConfig: + eno1 no wireless extensions. + + lono wireless extensions. + + docker0 no wireless extensions. + MachineType: Dell Inc. Precision T3600 + Package: linux (not installed) + ProcEnviron: + TERM=xterm-256color + PATH=(custom, no user) + LANG=en_US.UTF-8 + SHELL=/bin/bash + ProcFB: 0 nouveaufb + ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-4.15.0-51-generic root=/dev/mapper/ubuntu--vg-root ro quiet splash vt.handoff=1 + ProcVersionSignature: Ubuntu 4.15.0-51.55-generic 4.15.18 + PulseList: + Error: command ['pacmd', 'list'] failed with exit code 1: Home directory not accessible: Permission denied + No PulseAudio daemon running, or not running as session daemon. + RelatedPackageVersions: + linux-restricted-modules-4.15.0-51-generic N/A + linux-backports-modules-4.15.0-51-generic N/A + linux-firmware 1.173.6 + RfKill: + + Tags: bionic + Uname: Linux 4.15.0-51-generic x86_64 + UpgradeStatus: No upgrade log present (probably fresh install) +
[Bug 1832782] CRDA.txt
apport information ** Attachment added: "CRDA.txt" https://bugs.launchpad.net/bugs/1832782/+attachment/5270674/+files/CRDA.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1832782 Title: Backport VMW_PVRDMA PPN64 patch To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1832782/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1359836] Re: Ubuntu ISOs downloaded insecurely, over HTTP rather than HTTPS
@mpt There's also non-public mirrors in the field which have never been on the list of mirrors. And never will be. For public mirrors on the list, how would Canonical know about a compromised mirror _before_ a victim downloads from it? I'm still very happy with having https'ed mirrors, because it secures the download between mirror and user at least - against e.g. MITM. That should be by far the largest attack vector these days. It's just that a download which did not come via https from ubuntu.com still has to be verified. And now that Canonical (aka the _producer_) presents a https-secured checksum from a trustworthy domain (e.g. ubuntu.com) everything is in place. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1359836 Title: Ubuntu ISOs downloaded insecurely, over HTTP rather than HTTPS To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+bug/1359836/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1832776] Re: Backport VMCI PPN64 patch
** Bug watch added: Debian Bug tracker #929824 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929824 ** Also affects: linux (Debian) via https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929824 Importance: Unknown Status: Unknown -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1832776 Title: Backport VMCI PPN64 patch To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1832776/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1829749] Re: Please add support for zipl signing
** Changed in: s390-tools (Ubuntu) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1829749 Title: Please add support for zipl signing To manage notifications about this bug go to: https://bugs.launchpad.net/launchpad/+bug/1829749/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1832776] UdevDb.txt
apport information ** Attachment added: "UdevDb.txt" https://bugs.launchpad.net/bugs/1832776/+attachment/5270671/+files/UdevDb.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1832776 Title: Backport VMCI PPN64 patch To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1832776/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1832776] WifiSyslog.txt
apport information ** Attachment added: "WifiSyslog.txt" https://bugs.launchpad.net/bugs/1832776/+attachment/5270672/+files/WifiSyslog.txt ** Changed in: linux (Ubuntu) Status: Incomplete => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1832776 Title: Backport VMCI PPN64 patch To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1832776/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1832776] ProcModules.txt
apport information ** Attachment added: "ProcModules.txt" https://bugs.launchpad.net/bugs/1832776/+attachment/5270669/+files/ProcModules.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1832776 Title: Backport VMCI PPN64 patch To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1832776/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1832776] ProcCpuinfoMinimal.txt
apport information ** Attachment added: "ProcCpuinfoMinimal.txt" https://bugs.launchpad.net/bugs/1832776/+attachment/5270667/+files/ProcCpuinfoMinimal.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1832776 Title: Backport VMCI PPN64 patch To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1832776/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1832776] Lspci.txt
apport information ** Attachment added: "Lspci.txt" https://bugs.launchpad.net/bugs/1832776/+attachment/5270664/+files/Lspci.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1832776 Title: Backport VMCI PPN64 patch To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1832776/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1832776] PulseList.txt
apport information ** Attachment added: "PulseList.txt" https://bugs.launchpad.net/bugs/1832776/+attachment/5270670/+files/PulseList.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1832776 Title: Backport VMCI PPN64 patch To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1832776/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1832776] Lsusb.txt
apport information ** Attachment added: "Lsusb.txt" https://bugs.launchpad.net/bugs/1832776/+attachment/5270665/+files/Lsusb.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1832776 Title: Backport VMCI PPN64 patch To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1832776/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1832776] ProcCpuinfo.txt
apport information ** Attachment added: "ProcCpuinfo.txt" https://bugs.launchpad.net/bugs/1832776/+attachment/5270666/+files/ProcCpuinfo.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1832776 Title: Backport VMCI PPN64 patch To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1832776/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1832776] Re: Backport VMCI PPN64 patch
apport information ** Tags added: apport-collected bionic ** Description changed: Hi, Can this kernel patch [1] for VMCI be backported to Ubuntu Bionic? I have already filed a bug with Debian[2]. Here is the commit log: commit f2db7361cb19bf3a6f7fd367f21d8eb325397946 Author: Vishnu DASA Commit: Greg Kroah-Hartman VMCI: Support upto 64-bit PPNs Add support in the VMCI driver to handle upto 64-bit PPNs when the VMCI device exposes the capability for 64-bit PPNs. Thanks, Adit [1] https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f2db7361cb19bf3a6f7fd367f21d8eb325397946 [2] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929824 + --- + ProblemType: Bug + ApportVersion: 2.20.9-0ubuntu7.6 + Architecture: amd64 + AudioDevicesInUse: + USERPID ACCESS COMMAND + /dev/snd/controlC1: adit 3290 F pulseaudio + /dev/snd/controlC0: adit 3290 F pulseaudio + CurrentDesktop: ubuntu:GNOME + DistroRelease: Ubuntu 18.04 + HibernationDevice: RESUME=UUID=5e12ac9f-b7e5-46f1-aa2a-0091eb5cb723 + InstallationDate: Installed on 2018-11-06 (219 days ago) + InstallationMedia: Ubuntu 18.04.1 LTS "Bionic Beaver" - Release amd64 (20180725) + IwConfig: + eno1 no wireless extensions. + + lono wireless extensions. + + docker0 no wireless extensions. + MachineType: Dell Inc. Precision T3600 + Package: linux (not installed) + ProcEnviron: + TERM=xterm-256color + PATH=(custom, no user) + XDG_RUNTIME_DIR= + LANG=en_US.UTF-8 + SHELL=/bin/zsh + ProcFB: 0 nouveaufb + ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-4.15.0-51-generic root=/dev/mapper/ubuntu--vg-root ro quiet splash vt.handoff=1 + ProcVersionSignature: Ubuntu 4.15.0-51.55-generic 4.15.18 + RelatedPackageVersions: + linux-restricted-modules-4.15.0-51-generic N/A + linux-backports-modules-4.15.0-51-generic N/A + linux-firmware 1.173.6 + RfKill: + + Tags: bionic + Uname: Linux 4.15.0-51-generic x86_64 + UpgradeStatus: No upgrade log present (probably fresh install) + UserGroups: adm cdrom dip docker lpadmin plugdev sambashare sudo + _MarkForUpload: True + dmi.bios.date: 08/09/2013 + dmi.bios.vendor: Dell Inc. + dmi.bios.version: A11 + dmi.board.name: 08HPGT + dmi.board.vendor: Dell Inc. + dmi.board.version: A01 + dmi.chassis.type: 7 + dmi.chassis.vendor: Dell Inc. + dmi.modalias: dmi:bvnDellInc.:bvrA11:bd08/09/2013:svnDellInc.:pnPrecisionT3600:pvr01:rvnDellInc.:rn08HPGT:rvrA01:cvnDellInc.:ct7:cvr: + dmi.product.name: Precision T3600 + dmi.product.version: 01 + dmi.sys.vendor: Dell Inc. ** Attachment added: "AlsaInfo.txt" https://bugs.launchpad.net/bugs/1832776/+attachment/5270661/+files/AlsaInfo.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1832776 Title: Backport VMCI PPN64 patch To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1832776/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1832776] CurrentDmesg.txt
apport information ** Attachment added: "CurrentDmesg.txt" https://bugs.launchpad.net/bugs/1832776/+attachment/5270663/+files/CurrentDmesg.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1832776 Title: Backport VMCI PPN64 patch To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1832776/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1832776] ProcInterrupts.txt
apport information ** Attachment added: "ProcInterrupts.txt" https://bugs.launchpad.net/bugs/1832776/+attachment/5270668/+files/ProcInterrupts.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1832776 Title: Backport VMCI PPN64 patch To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1832776/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1832776] CRDA.txt
apport information ** Attachment added: "CRDA.txt" https://bugs.launchpad.net/bugs/1832776/+attachment/5270662/+files/CRDA.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1832776 Title: Backport VMCI PPN64 patch To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1832776/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1831185] Re: synaptic package manager crashes on search action
It looks like the crash is caused by the Erlang PPA. As long as I keep it disabled, search works perfectly. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1831185 Title: synaptic package manager crashes on search action To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/synaptic/+bug/1831185/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1828495] Re: [KVM][CLX] CPUID_7_0_EDX_ARCH_CAPABILITIES is not enabled in VM.
** Merge proposal linked: https://code.launchpad.net/~rafaeldtinoco/ubuntu/+source/qemu/+git/qemu/+merge/368804 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1828495 Title: [KVM][CLX] CPUID_7_0_EDX_ARCH_CAPABILITIES is not enabled in VM. To manage notifications about this bug go to: https://bugs.launchpad.net/intel/+bug/1828495/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1832101] Re: systemd-networkd: Lost carrier e1000
yes and no. I did disabled tso, but still had some problems, after that i enabled tso and disabled rx/tx checksum That also did not resolve the issue, so as last resort i disabled GSO,GRO,TSO offload and ,RX,TX checksum check ethtool -K gso off gro off tso off rx off tx off -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1832101 Title: systemd-networkd: Lost carrier e1000 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1832101/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1832776] Missing required logs.
This bug is missing log files that will aid in diagnosing the problem. While running an Ubuntu kernel (not a mainline or third-party kernel) please enter the following command in a terminal window: apport-collect 1832776 and then change the status of the bug to 'Confirmed'. If, due to the nature of the issue you have encountered, you are unable to run this command, please add a comment stating that fact and change the bug status to 'Confirmed'. This change has been made by an automated script, maintained by the Ubuntu Kernel Team. ** Changed in: linux (Ubuntu) Status: New => Incomplete -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1832776 Title: Backport VMCI PPN64 patch To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1832776/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1832775] [NEW] Disco update: 5.0.14 upstream stable release
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: 5.0.14 upstream stable release from git://git.kernel.org/ ** Affects: linux (Ubuntu) Importance: Undecided Status: Confirmed ** Affects: linux (Ubuntu Disco) Importance: Undecided Status: New ** Tags: kernel-stable-tracking-bug ** Changed in: linux (Ubuntu) Status: New => Confirmed ** Tags added: kernel-stable-tracking-bug ** Also affects: linux (Ubuntu Disco) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1832775 Title: Disco update: 5.0.14 upstream stable release To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1832775/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1832776] [NEW] Backport VMCI PPN64 patch
Public bug reported: Hi, Can this kernel patch [1] for VMCI be backported to Ubuntu Bionic? I have already filed a bug with Debian[2]. Here is the commit log: commit f2db7361cb19bf3a6f7fd367f21d8eb325397946 Author: Vishnu DASA Commit: Greg Kroah-Hartman VMCI: Support upto 64-bit PPNs Add support in the VMCI driver to handle upto 64-bit PPNs when the VMCI device exposes the capability for 64-bit PPNs. Thanks, Adit [1] https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f2db7361cb19bf3a6f7fd367f21d8eb325397946 [2] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929824 ** Affects: linux (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1832776 Title: Backport VMCI PPN64 patch To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1832776/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1832653] Re: ejabberd fails to work after upgrade of openssl to v1.1.1 in Ubuntu 18.04 LTS
Same issue here with Ubuntu 18.04.2 LTS. We followed proposal at https://github.com/processone/ejabberd/issues/2614#issuecomment-427588059 and it fixes it (we obviously changed /usr/lib/fast_tls-1.0.25 to /usr/lib/erlang/lib/p1_tls-1.0.20). ** Bug watch added: github.com/processone/ejabberd/issues #2614 https://github.com/processone/ejabberd/issues/2614 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1832653 Title: ejabberd fails to work after upgrade of openssl to v1.1.1 in Ubuntu 18.04 LTS To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ejabberd/+bug/1832653/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1832653] Re: ejabberd fails to work after upgrade of openssl to v1.1.1 in Ubuntu 18.04 LTS
Status changed to 'Confirmed' because the bug affects multiple users. ** Changed in: ejabberd (Ubuntu) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1832653 Title: ejabberd fails to work after upgrade of openssl to v1.1.1 in Ubuntu 18.04 LTS To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ejabberd/+bug/1832653/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1831775] Re: ss seems broken when using multiple filters in the same cmdline
This bug was fixed in the package iproute2 - 4.18.0-1ubuntu3 --- iproute2 (4.18.0-1ubuntu3) eoan; urgency=medium * d/p/ss-review-ssfilter.patch: fixed issue with ss and ssfilter where ssfilter rejects single expressions if enclosed in braces (LP: #1831775) -- Rafael David Tinoco Wed, 05 Jun 2019 21:26:00 -0300 ** Changed in: iproute2 (Ubuntu Eoan) Status: Confirmed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1831775 Title: ss seems broken when using multiple filters in the same cmdline To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/iproute2/+bug/1831775/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs