[Bug 1863714] [NEW] package libevdocument3-4:amd64 3.18.2-1ubuntu4.6 failed to install/upgrade: vereistenproblemen - blijft ongeconfigureerd
Public bug reported: Don't have any ProblemType: Package DistroRelease: Ubuntu 16.04 Package: libevdocument3-4:amd64 3.18.2-1ubuntu4.6 ProcVersionSignature: Ubuntu 4.4.0-173.203-generic 4.4.208 Uname: Linux 4.4.0-173-generic x86_64 ApportVersion: 2.20.1-0ubuntu2.21 Architecture: amd64 Date: Mon Feb 10 19:38:30 2020 DpkgHistoryLog: Start-Date: 2020-02-10 19:35:55 Commandline: /usr/bin/unattended-upgrade Upgrade: libsystemd0:amd64 (229-4ubuntu21.21, 229-4ubuntu21.27), libsystemd0:i386 (229-4ubuntu21.21, 229-4ubuntu21.27), sudo:amd64 (1.8.16-0ubuntu1.8, 1.8.16-0ubuntu1.9), udev:amd64 (229-4ubuntu21.21, 229-4ubuntu21.27), libudev1:amd64 (229-4ubuntu21.21, 229-4ubuntu21.27), libudev1:i386 (229-4ubuntu21.21, 229-4ubuntu21.27), systemd-sysv:amd64 (229-4ubuntu21.21, 229-4ubuntu21.27), firefox-locale-en:amd64 (72.0.1+build1-0ubuntu0.16.04.1, 72.0.2+build1-0ubuntu0.16.04.1), firefox-locale-nl:amd64 (72.0.1+build1-0ubuntu0.16.04.1, 72.0.2+build1-0ubuntu0.16.04.1), libpam-systemd:amd64 (229-4ubuntu21.21, 229-4ubuntu21.27), systemd:amd64 (229-4ubuntu21.21, 229-4ubuntu21.27), firefox:amd64 (72.0.1+build1-0ubuntu0.16.04.1, 72.0.2+build1-0ubuntu0.16.04.1), libexiv2-14:amd64 (0.25-2.1ubuntu16.04.5, 0.25-2.1ubuntu16.04.6) ErrorMessage: vereistenproblemen - blijft ongeconfigureerd InstallationDate: Installed on 2017-02-14 (1098 days ago) InstallationMedia: Ubuntu 16.04.1 LTS "Xenial Xerus" - Release amd64 (20160719) ProcCmdline: BOOT_IMAGE=/vmlinuz-4.4.0-173-generic root=/dev/mapper/ubuntu--vg-root ro quiet splash vt.handoff=7 SourcePackage: evince Title: package libevdocument3-4:amd64 3.18.2-1ubuntu4.6 failed to install/upgrade: vereistenproblemen - blijft ongeconfigureerd UpgradeStatus: Upgraded to xenial on 2020-02-18 (0 days ago) ** Affects: evince (Ubuntu) Importance: Undecided Status: New ** Tags: amd64 apport-package xenial -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1863714 Title: package libevdocument3-4:amd64 3.18.2-1ubuntu4.6 failed to install/upgrade: vereistenproblemen - blijft ongeconfigureerd To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/evince/+bug/1863714/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1863285] Re: bionic/linux-azure: 5.0.0-1033.35 -proposed tracker
** Changed in: kernel-sru-workflow/automated-testing Status: New => Confirmed ** Changed in: kernel-sru-workflow/promote-to-proposed Status: Fix Committed => Fix Released ** Changed in: kernel-sru-workflow/regression-testing Status: New => Confirmed ** Changed in: kernel-sru-workflow/security-signoff Status: New => Confirmed ** Changed in: kernel-sru-workflow/stakeholder-signoff Status: New => Confirmed ** Changed in: kernel-sru-workflow/verification-testing Status: New => Confirmed ** Changed in: kernel-sru-workflow/automated-testing Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/regression-testing Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/verification-testing Status: Confirmed => In Progress ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1863297 packages: lrm: linux-restricted-modules-azure main: linux-azure meta: linux-meta-azure signed: linux-signed-azure - phase: Promote to Proposed - phase-changed: Monday, 17. February 2020 22:13 UTC + phase: Testing + phase-changed: Tuesday, 18. February 2020 07:43 UTC + proposed-announcement-sent: true + proposed-testing-requested: true reason: - promote-to-proposed: Ongoing -- packages waiting in -proposed for mirror sync + automated-testing: Ongoing -- testing in progress + regression-testing: Ongoing -- testing in progress + security-signoff: Pending -- waiting for signoff + stakeholder-signoff: Pending -- waiting for signoff + verification-testing: Ongoing -- testing in progress trackers: bionic/linux-azure/azure-kernel: bug 1863284 variant: debs -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1863285 Title: bionic/linux-azure: 5.0.0-1033.35 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1863285/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1863592] Re: bionic/linux-oem: 4.15.0-1073.83 -proposed tracker
** Changed in: kernel-sru-workflow/automated-testing Status: New => Confirmed ** Changed in: kernel-sru-workflow/promote-to-proposed Status: Fix Committed => Fix Released ** Changed in: kernel-sru-workflow/regression-testing Status: New => Confirmed ** Changed in: kernel-sru-workflow/security-signoff Status: New => Confirmed ** Changed in: kernel-sru-workflow/verification-testing Status: New => Confirmed ** Changed in: kernel-sru-workflow/automated-testing Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/regression-testing Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/verification-testing Status: Confirmed => Fix Released ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1862824 packages: lrm: linux-restricted-modules-oem main: linux-oem meta: linux-meta-oem signed: linux-signed-oem - phase: Promote to Proposed - phase-changed: Monday, 17. February 2020 21:32 UTC + phase: Testing + phase-changed: Tuesday, 18. February 2020 07:42 UTC + proposed-announcement-sent: true + proposed-testing-requested: true reason: + automated-testing: Ongoing -- testing in progress certification-testing: Ongoing -- testing in progress - promote-to-proposed: Ongoing -- packages waiting in -proposed for mirror sync + regression-testing: Ongoing -- testing in progress + security-signoff: Pending -- waiting for signoff variant: debs -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1863592 Title: bionic/linux-oem: 4.15.0-1073.83 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1863592/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1861199] Re: eoan/linux-aws: 5.3.0-1011.12 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Status: In Progress => Fix Released ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1861214 packages: lrm: linux-restricted-modules-aws main: linux-aws meta: linux-meta-aws - phase: Promote to Security - phase-changed: Tuesday, 18. February 2020 07:19 UTC + phase: Complete + phase-changed: Tuesday, 18. February 2020 07:29 UTC proposed-announcement-sent: true proposed-testing-requested: true - reason: - promote-to-security: Ongoing -- packages not yet published trackers: bionic/linux-aws-5.3: bug 1861198 variant: debs -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1861199 Title: eoan/linux-aws: 5.3.0-1011.12 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1861199/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1861669] Re: Can't connect to wireless AP after resume from S3
** Description changed: + [Impact] + RTL8821CE dkms driver version 5.2.5.2.1.30816.20190425-0ubuntu1 fails to re-associate previously associated WiFi AP when resumed from suspend, and it takes a reboot to recover from this situation. + + [Fix] + This is fixed in a new release 20190614_RTL8821CE_WiFi_linux_v5.5.2_34066_COEX20180712-3232.20190614.zip, which has issues to compile against Focal 5.4 kernel, and is then fixed in yet another minor release RTL8821CE_WiFi_linux_v5.5.2.1_35598_COEX20180712-3232.20191029.zip. + + [Test Case] + 1. Install this dkms and make sure corresponding kernel module is generated. + 2. Reboot. Wi-Fi interface should be up and works just fine. Try get associated to some AP. + 3. Suspend the system and resume a while after. + 4. Check if Wi-Fi interface is automatically brought up and associated to the previous AP. + + [Regression Potential] + Low. This is the DKMS package for specific hardware models, which is known to have this issue and have to be fixed with this package and this package along. Doesn't affect other systems/hardware. + + == original bug description == + RTL8821CE dkms driver version 5.2.5.2.1.30816.20190425-0ubuntu1 fails to re-associate previously associated WiFi AP when resumed from suspend, and it takes a reboot to recover from this situation. [ 203.545116] PM: suspend entry (deep) [ 203.545118] PM: Syncing filesystems ... done. [ 204.026363] Freezing user space processes ... (elapsed 0.002 seconds) done. [ 204.029131] OOM killer disabled. [ 204.029132] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 204.030453] Suspending console(s) (use no_console_suspend to debug) [ 204.031766] RTW: suspend start [ 204.031779] RTW: rtw_cmd_thread(wlo1) stop_req:1, break [ 204.031826] RTW: rtw_suspend_normal: ### ERROR driver in IPS ERROR###!!! [ 204.031834] RTW: rtw_dev_unload: driver in IPS-FWLPS [ 204.031845] RTW: rtw suspend success in 0 ms [ 205.107104] ACPI: Preparing to enter system sleep state S3 [ 205.443577] PM: Saving platform NVS memory [ 205.443658] Disabling non-boot CPUs ... and when resumed [ 205.796968] ACPI: Low-level resume complete [ 205.797020] PM: Restoring platform NVS memory [ 205.797573] Enabling non-boot CPUs ... [ 205.797625] x86: Booting SMP configuration: ... [ 205.837514] ACPI: Waking up from system sleep state S3 [ 205.880254] RTW: resume start [ 206.381440] RTW: wlo1- hw port(0) mac_addr =40:5b:d8:79:35:1d [ 206.381658] RTW: rtw_resume_common:0 in 500 ms [ 206.381691] RTW: WARN Unhandled ISR = 2000, 0, 0 [ 206.534803] OOM killer enabled. [ 206.534804] Restarting tasks ... done. [ 206.539698] PM: suspend exit [ 210.158137] rtl8821ce :17:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT domain=0x000e address=0xfed7d000 flags=0x] [ 210.158147] rtl8821ce :17:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT domain=0x000e address=0xfed7d030 flags=0x] [ 210.646668] RTW: wlo1- hw port(0) mac_addr =40:5b:d8:79:35:1d [ 210.646868] RTW: nolinked power save leave [ 210.647031] RTW: set bssid:00:00:00:00:00:00 [ 210.647081] RTW: set ssid [\xfeC\xfb\xfa\xaa:\xfb)\xd1\xe6<|\x94uؾa\x89\xf9\\xbb\xa8\x99\x95\xb1\xeb\xf1\xb3] fw_state=0x0008 [ 210.667923] IPv6: ADDRCONF(NETDEV_UP): wlo1: link is not ready [ 212.933864] RTW: indicate disassoc [ 212.937336] RTW: There are some pkts to transmit [ 212.937342] RTW: free_xmitbuf_cnt: 128, free_xmit_extbuf_cnt: 0 [ 212.990652] RTW: set ssid [HIDDEN-SSID] fw_state=0x0008 [ 212.993334] RTW: set bssid:a4:56:30:be:51:10 [ 213.088342] RTW: start auth [ 214.701727] RTW: indicate disassoc [ 217.100438] RTW: set ssid [HIDDEN-SSID] fw_state=0x0008 [ 217.100458] RTW: set bssid:2c:36:f8:fa:f5:b0 [ 217.161695] RTW: start auth [ 218.762801] RTW: indicate disassoc [ 221.154160] RTW: set ssid [HIDDEN-SSID] fw_state=0x0008 [ 221.154182] RTW: set bssid:a4:56:30:be:51:10 [ 221.235930] RTW: start auth [ 222.828269] RTW: indicate disassoc --- ProblemType: Bug ApportVersion: 2.20.9-0ubuntu7.9 Architecture: amd64 CurrentDesktop: ubuntu:GNOME DistributionChannelDescriptor: # This is the distribution channel descriptor for the OEM CDs canonical-oem-stella-bionic-amd64-806 DistroRelease: Ubuntu 18.04 InstallationDate: Installed on 2020-01-14 (21 days ago) InstallationMedia: Ubuntu 18.04 "Bionic" - Build amd64 LIVE Binary 20191205-16:26 Package: rtl8821ce-dkms 5.2.5.2.1.30816.20190425-0ubuntu1~18.04.1 PackageArchitecture: all ProcVersionSignature: Ubuntu 4.15.0-1067.77-oem 4.15.18 Tags: bionic Uname: Linux 4.15.0-1067-oem x86_64 UpgradeStatus: No upgrade log present (probably fresh install) UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo _MarkForUpload: True ** Description changed: + [SRU Justification] +
[Bug 1861206] Re: eoan/linux-kvm: 5.3.0-1010.11 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Status: In Progress => Fix Released ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1861214 packages: main: linux-kvm meta: linux-meta-kvm - phase: Promote to Security - phase-changed: Tuesday, 18. February 2020 07:19 UTC + phase: Complete + phase-changed: Tuesday, 18. February 2020 07:30 UTC proposed-announcement-sent: true proposed-testing-requested: true - reason: - promote-to-security: Ongoing -- packages not yet published variant: debs -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1861206 Title: eoan/linux-kvm: 5.3.0-1010.11 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1861206/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1861197] Re: eoan/linux-raspi2: 5.3.0-1018.20 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Status: In Progress => Fix Released ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1861214 packages: main: linux-raspi2 meta: linux-meta-raspi2 - phase: Promote to Security - phase-changed: Tuesday, 18. February 2020 07:18 UTC + phase: Complete + phase-changed: Tuesday, 18. February 2020 07:29 UTC proposed-announcement-sent: true proposed-testing-requested: true - reason: - promote-to-security: Ongoing -- packages not yet published trackers: bionic/linux-raspi2-5.3: bug 1861196 eoan/linux-raspi2/pi-kernel: bug 1861194 variant: debs -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1861197 Title: eoan/linux-raspi2: 5.3.0-1018.20 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1861197/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1863268] Re: bionic/linux-raspi2-5.3: 5.3.0-1019.21~18.04.1 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-proposed Status: New => Confirmed ** Tags added: block-proposed-bionic ** Tags added: block-proposed ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1863269 packages: main: linux-raspi2-5.3 meta: linux-meta-raspi2-5.3 - phase: Holding before Promote to Proposed - phase-changed: Monday, 17. February 2020 17:28 UTC + phase: Ready for Promote to Proposed + phase-changed: Tuesday, 18. February 2020 07:34 UTC reason: - promote-to-proposed: Stalled -- another kernel is currently pending in Proposed + promote-to-proposed: Pending -- ready for review trackers: bionic/linux-raspi2-5.3/pi-kernel: bug 1863267 variant: debs -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1863268 Title: bionic/linux-raspi2-5.3: 5.3.0-1019.21~18.04.1 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1863268/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1861214] Re: eoan/linux: 5.3.0-40.32 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Status: In Progress => Fix Released ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true bugs-spammed: true packages: lrm: linux-restricted-modules main: linux meta: linux-meta signed: linux-signed - phase: Promote to Security - phase-changed: Tuesday, 18. February 2020 07:15 UTC + phase: Complete + phase-changed: Tuesday, 18. February 2020 07:27 UTC proposed-announcement-sent: true proposed-testing-requested: true - reason: - promote-to-security: Ongoing -- packages not yet published trackers: bionic/linux-hwe: bug 1861212 eoan/linux-aws: bug 1861199 eoan/linux-azure: bug 1862398 eoan/linux-gcp: bug 1861205 eoan/linux-kvm: bug 1861206 eoan/linux-oracle: bug 1861208 eoan/linux-raspi2: bug 1861197 variant: debs -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1861214 Title: eoan/linux: 5.3.0-40.32 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1861214/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1861208] Re: eoan/linux-oracle: 5.3.0-1009.10 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Status: In Progress => Fix Released ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1861214 packages: lrm: linux-restricted-modules-oracle main: linux-oracle meta: linux-meta-oracle signed: linux-signed-oracle - phase: Promote to Security - phase-changed: Tuesday, 18. February 2020 07:20 UTC + phase: Complete + phase-changed: Tuesday, 18. February 2020 07:30 UTC proposed-announcement-sent: true proposed-testing-requested: true - reason: - promote-to-security: Ongoing -- packages not yet published trackers: bionic/linux-oracle-5.3: bug 1861207 variant: debs -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1861208 Title: eoan/linux-oracle: 5.3.0-1009.10 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1861208/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1862398] Re: eoan/linux-azure: 5.3.0-1013.14 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Status: In Progress => Fix Released ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1861214 packages: lrm: linux-restricted-modules-azure main: linux-azure meta: linux-meta-azure signed: linux-signed-azure - phase: Promote to Security - phase-changed: Tuesday, 18. February 2020 07:21 UTC + phase: Complete + phase-changed: Tuesday, 18. February 2020 07:31 UTC proposed-announcement-sent: true proposed-testing-requested: true - reason: - promote-to-security: Ongoing -- packages not yet published trackers: bionic/linux-azure-5.3: bug 1862397 variant: debs -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1862398 Title: eoan/linux-azure: 5.3.0-1013.14 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1862398/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1857869] Re: Red fill the search stop icon
** Changed in: nautilus Status: Unknown => New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1857869 Title: Red fill the search stop icon To manage notifications about this bug go to: https://bugs.launchpad.net/nautilus/+bug/1857869/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1861196] Re: bionic/linux-raspi2-5.3: 5.3.0-1018.20~18.04.1 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-updates Status: In Progress => Fix Released ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1861197 packages: main: linux-raspi2-5.3 meta: linux-meta-raspi2-5.3 - phase: Promote to Updates - phase-changed: Tuesday, 18. February 2020 07:17 UTC + phase: Holding before Promote to Security + phase-changed: Tuesday, 18. February 2020 07:33 UTC proposed-announcement-sent: true proposed-testing-requested: true reason: promote-to-security: Holding -- not ready for security (replication dwell) - promote-to-updates: Ongoing -- packages not yet published trackers: bionic/linux-raspi2-5.3/pi-kernel: bug 1861195 variant: debs -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1861196 Title: bionic/linux-raspi2-5.3: 5.3.0-1018.20~18.04.1 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1861196/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1861205] Re: eoan/linux-gcp: 5.3.0-1012.13 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Status: In Progress => Fix Released ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1861214 packages: lrm: linux-restricted-modules-gcp main: linux-gcp meta: linux-meta-gcp signed: linux-signed-gcp - phase: Promote to Security - phase-changed: Tuesday, 18. February 2020 07:19 UTC + phase: Complete + phase-changed: Tuesday, 18. February 2020 07:29 UTC proposed-announcement-sent: true proposed-testing-requested: true - reason: - promote-to-security: Ongoing -- packages not yet published trackers: bionic/linux-gcp-5.3: bug 1861202 bionic/linux-gke-5.3: bug 1861204 variant: debs -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1861205 Title: eoan/linux-gcp: 5.3.0-1012.13 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1861205/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1863272] Re: eoan/linux-aws: 5.3.0-1012.13 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-proposed Status: In Progress => Fix Committed ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1863294 packages: lrm: linux-restricted-modules-aws main: linux-aws meta: linux-meta-aws phase: Promote to Proposed phase-changed: Tuesday, 18. February 2020 07:11 UTC reason: - promote-to-proposed: Stalled -- review in progress + promote-to-proposed: Ongoing -- packages waiting in -proposed for mirror sync trackers: bionic/linux-aws-5.3: bug 1863270 variant: debs -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1863272 Title: eoan/linux-aws: 5.3.0-1012.13 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1863272/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1861197] Re: eoan/linux-raspi2: 5.3.0-1018.20 -proposed tracker
** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1861214 packages: main: linux-raspi2 meta: linux-meta-raspi2 - phase: Ready for Promote to Security - phase-changed: Tuesday, 18. February 2020 03:51 UTC + phase: Promote to Security + phase-changed: Tuesday, 18. February 2020 07:18 UTC proposed-announcement-sent: true proposed-testing-requested: true reason: - promote-to-security: Pending -- ready to copy + promote-to-security: Ongoing -- packages not yet published trackers: bionic/linux-raspi2-5.3: bug 1861196 eoan/linux-raspi2/pi-kernel: bug 1861194 variant: debs -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1861197 Title: eoan/linux-raspi2: 5.3.0-1018.20 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1861197/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1861208] Re: eoan/linux-oracle: 5.3.0-1009.10 -proposed tracker
** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1861214 packages: lrm: linux-restricted-modules-oracle main: linux-oracle meta: linux-meta-oracle signed: linux-signed-oracle - phase: Ready for Promote to Security - phase-changed: Monday, 17. February 2020 22:33 UTC + phase: Promote to Security + phase-changed: Tuesday, 18. February 2020 07:20 UTC proposed-announcement-sent: true proposed-testing-requested: true reason: - promote-to-security: Pending -- ready to copy + promote-to-security: Ongoing -- packages not yet published trackers: bionic/linux-oracle-5.3: bug 1861207 variant: debs -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1861208 Title: eoan/linux-oracle: 5.3.0-1009.10 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1861208/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1861199] Re: eoan/linux-aws: 5.3.0-1011.12 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/promote-to-security Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy Whitcroft (apw) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1861199 Title: eoan/linux-aws: 5.3.0-1011.12 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1861199/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1848496] Re: [zfs-root] device-mapper: reload ioctl on osprober-linux-sda5 failed: Device or resource busy
I just installed Ubuntu 19.10 and update & upgraded everything. And this error is what causing a weird issue while booting. Laptop boots like, Pruple Screen > Dell logo > Purple > actually starts booting. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1848496 Title: [zfs-root] device-mapper: reload ioctl on osprober-linux-sda5 failed: Device or resource busy To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/os-prober/+bug/1848496/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1848496] Re: [zfs-root] device-mapper: reload ioctl on osprober-linux-sda5 failed: Device or resource busy
A proof: https://imgur.com/gallery/uRZFX5p -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1848496 Title: [zfs-root] device-mapper: reload ioctl on osprober-linux-sda5 failed: Device or resource busy To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/os-prober/+bug/1848496/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1861197] Re: eoan/linux-raspi2: 5.3.0-1018.20 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/promote-to-security Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy Whitcroft (apw) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1861197 Title: eoan/linux-raspi2: 5.3.0-1018.20 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1861197/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1861206] Re: eoan/linux-kvm: 5.3.0-1010.11 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/promote-to-security Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy Whitcroft (apw) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1861206 Title: eoan/linux-kvm: 5.3.0-1010.11 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1861206/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1861206] Re: eoan/linux-kvm: 5.3.0-1010.11 -proposed tracker
** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1861214 packages: main: linux-kvm meta: linux-meta-kvm - phase: Ready for Promote to Security - phase-changed: Monday, 17. February 2020 22:32 UTC + phase: Promote to Security + phase-changed: Tuesday, 18. February 2020 07:19 UTC proposed-announcement-sent: true proposed-testing-requested: true reason: - promote-to-security: Pending -- ready to copy + promote-to-security: Ongoing -- packages not yet published variant: debs -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1861206 Title: eoan/linux-kvm: 5.3.0-1010.11 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1861206/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1861214] Re: eoan/linux: 5.3.0-40.32 -proposed tracker
** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true bugs-spammed: true packages: lrm: linux-restricted-modules main: linux meta: linux-meta signed: linux-signed - phase: Ready for Promote to Security - phase-changed: Monday, 17. February 2020 22:31 UTC + phase: Promote to Security + phase-changed: Tuesday, 18. February 2020 07:15 UTC proposed-announcement-sent: true proposed-testing-requested: true reason: - promote-to-security: Pending -- ready to copy + promote-to-security: Ongoing -- packages not yet published trackers: bionic/linux-hwe: bug 1861212 eoan/linux-aws: bug 1861199 eoan/linux-azure: bug 1862398 eoan/linux-gcp: bug 1861205 eoan/linux-kvm: bug 1861206 eoan/linux-oracle: bug 1861208 eoan/linux-raspi2: bug 1861197 variant: debs -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1861214 Title: eoan/linux: 5.3.0-40.32 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1861214/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1861205] Re: eoan/linux-gcp: 5.3.0-1012.13 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/promote-to-security Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy Whitcroft (apw) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1861205 Title: eoan/linux-gcp: 5.3.0-1012.13 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1861205/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1861196] Re: bionic/linux-raspi2-5.3: 5.3.0-1018.20~18.04.1 -proposed tracker
** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1861197 packages: main: linux-raspi2-5.3 meta: linux-meta-raspi2-5.3 - phase: Ready for Promote to Updates - phase-changed: Tuesday, 18. February 2020 06:36 UTC + phase: Promote to Updates + phase-changed: Tuesday, 18. February 2020 07:17 UTC proposed-announcement-sent: true proposed-testing-requested: true reason: - promote-to-updates: Pending -- ready to copy + promote-to-security: Holding -- not ready for security (replication dwell) + promote-to-updates: Ongoing -- packages not yet published trackers: bionic/linux-raspi2-5.3/pi-kernel: bug 1861195 variant: debs -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1861196 Title: bionic/linux-raspi2-5.3: 5.3.0-1018.20~18.04.1 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1861196/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1861199] Re: eoan/linux-aws: 5.3.0-1011.12 -proposed tracker
** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1861214 packages: lrm: linux-restricted-modules-aws main: linux-aws meta: linux-meta-aws - phase: Ready for Promote to Security - phase-changed: Monday, 17. February 2020 22:31 UTC + phase: Promote to Security + phase-changed: Tuesday, 18. February 2020 07:19 UTC proposed-announcement-sent: true proposed-testing-requested: true reason: - promote-to-security: Pending -- ready to copy + promote-to-security: Ongoing -- packages not yet published trackers: bionic/linux-aws-5.3: bug 1861198 variant: debs -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1861199 Title: eoan/linux-aws: 5.3.0-1011.12 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1861199/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1861205] Re: eoan/linux-gcp: 5.3.0-1012.13 -proposed tracker
** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1861214 packages: lrm: linux-restricted-modules-gcp main: linux-gcp meta: linux-meta-gcp signed: linux-signed-gcp - phase: Ready for Promote to Security - phase-changed: Monday, 17. February 2020 22:32 UTC + phase: Promote to Security + phase-changed: Tuesday, 18. February 2020 07:19 UTC proposed-announcement-sent: true proposed-testing-requested: true reason: - promote-to-security: Pending -- ready to copy + promote-to-security: Ongoing -- packages not yet published trackers: bionic/linux-gcp-5.3: bug 1861202 bionic/linux-gke-5.3: bug 1861204 variant: debs -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1861205 Title: eoan/linux-gcp: 5.3.0-1012.13 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1861205/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1861208] Re: eoan/linux-oracle: 5.3.0-1009.10 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/promote-to-security Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy Whitcroft (apw) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1861208 Title: eoan/linux-oracle: 5.3.0-1009.10 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1861208/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1863274] Re: eoan/linux-azure: 5.3.0-1014.15 -proposed tracker
** Changed in: kernel-sru-workflow/automated-testing Status: New => Confirmed ** Changed in: kernel-sru-workflow/promote-to-proposed Status: Fix Committed => Fix Released ** Changed in: kernel-sru-workflow/regression-testing Status: New => Confirmed ** Changed in: kernel-sru-workflow/security-signoff Status: New => Confirmed ** Changed in: kernel-sru-workflow/stakeholder-signoff Status: New => Confirmed ** Changed in: kernel-sru-workflow/verification-testing Status: New => Confirmed ** Changed in: kernel-sru-workflow/automated-testing Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/regression-testing Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/verification-testing Status: Confirmed => In Progress ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1863294 packages: lrm: linux-restricted-modules-azure main: linux-azure meta: linux-meta-azure signed: linux-signed-azure - phase: Promote to Proposed - phase-changed: Monday, 17. February 2020 21:48 UTC + phase: Testing + phase-changed: Tuesday, 18. February 2020 07:16 UTC + proposed-announcement-sent: true + proposed-testing-requested: true reason: - promote-to-proposed: Ongoing -- packages waiting in -proposed for mirror sync + automated-testing: Ongoing -- testing in progress + regression-testing: Ongoing -- testing in progress + security-signoff: Pending -- waiting for signoff + stakeholder-signoff: Pending -- waiting for signoff + verification-testing: Ongoing -- testing in progress trackers: bionic/linux-azure-5.3: bug 1863273 variant: debs -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1863274 Title: eoan/linux-azure: 5.3.0-1014.15 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1863274/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1862398] Re: eoan/linux-azure: 5.3.0-1013.14 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/promote-to-security Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy Whitcroft (apw) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1862398 Title: eoan/linux-azure: 5.3.0-1013.14 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1862398/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1862398] Re: eoan/linux-azure: 5.3.0-1013.14 -proposed tracker
** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1861214 packages: lrm: linux-restricted-modules-azure main: linux-azure meta: linux-meta-azure signed: linux-signed-azure - phase: Ready for Promote to Security - phase-changed: Monday, 17. February 2020 22:34 UTC + phase: Promote to Security + phase-changed: Tuesday, 18. February 2020 07:21 UTC proposed-announcement-sent: true proposed-testing-requested: true reason: - promote-to-security: Pending -- ready to copy + promote-to-security: Ongoing -- packages not yet published trackers: bionic/linux-azure-5.3: bug 1862397 variant: debs -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1862398 Title: eoan/linux-azure: 5.3.0-1013.14 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1862398/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1863280] Re: eoan/linux-gcp: 5.3.0-1013.14 -proposed tracker
** Changed in: kernel-sru-workflow/automated-testing Status: New => Confirmed ** Changed in: kernel-sru-workflow/promote-to-proposed Status: Fix Committed => Fix Released ** Changed in: kernel-sru-workflow/regression-testing Status: New => Confirmed ** Changed in: kernel-sru-workflow/security-signoff Status: New => Confirmed ** Changed in: kernel-sru-workflow/verification-testing Status: New => Confirmed ** Changed in: kernel-sru-workflow/automated-testing Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/regression-testing Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/verification-testing Status: Confirmed => In Progress ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1863294 packages: lrm: linux-restricted-modules-gcp main: linux-gcp meta: linux-meta-gcp signed: linux-signed-gcp - phase: Promote to Proposed - phase-changed: Monday, 17. February 2020 21:48 UTC + phase: Testing + phase-changed: Tuesday, 18. February 2020 07:17 UTC + proposed-announcement-sent: true + proposed-testing-requested: true reason: - promote-to-proposed: Ongoing -- packages waiting in -proposed for mirror sync + automated-testing: Ongoing -- testing in progress + regression-testing: Ongoing -- testing in progress + security-signoff: Pending -- waiting for signoff + verification-testing: Ongoing -- testing in progress trackers: bionic/linux-gcp-5.3: bug 1863275 bionic/linux-gke-5.3: bug 1863278 variant: debs -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1863280 Title: eoan/linux-gcp: 5.3.0-1013.14 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1863280/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1861196] Re: bionic/linux-raspi2-5.3: 5.3.0-1018.20~18.04.1 -proposed tracker
This bug was fixed in the package linux-raspi2-5.3 - 5.3.0-1018.20~18.04.1 --- linux-raspi2-5.3 (5.3.0-1018.20~18.04.1) bionic; urgency=medium * bionic/linux-raspi2-5.3: 5.3.0-1018.20~18.04.1 -proposed tracker (LP: #1861196) [ Ubuntu: 5.3.0-1018.20 ] * eoan/linux-raspi2: 5.3.0-1018.20 -proposed tracker (LP: #1861197) * Disable CONFIG_SECURITY_SELINUX_DISABLE (LP: #1680315) - [Config] raspi2: unset CONFIG_SECURITY_SELINUX_DISABLE * eoan/linux: 5.3.0-40.32 -proposed tracker (LP: #1861214) * No sof soundcard for 'ASoC: CODEC DAI intel-hdmi-hifi1 not registered' after modprobe sof (LP: #1860248) - ASoC: SOF: Intel: fix HDA codec driver probe with multiple controllers * ocfs2-tools is causing kernel panics in Ubuntu Focal (Ubuntu-5.4.0-9.12) (LP: #1852122) - ocfs2: fix the crash due to call ocfs2_get_dlm_debug once less * QAT drivers for C3XXX and C62X not included as modules (LP: #1845959) - [Config] CRYPTO_DEV_QAT_C3XXX=m, CRYPTO_DEV_QAT_C62X=m and CRYPTO_DEV_QAT_DH895xCC=m * Eoan update: upstream stable patchset 2020-01-24 (LP: #1860816) - scsi: lpfc: Fix discovery failures when target device connectivity bounces - scsi: mpt3sas: Fix clear pending bit in ioctl status - scsi: lpfc: Fix locking on mailbox command completion - Input: atmel_mxt_ts - disable IRQ across suspend - f2fs: fix to update time in lazytime mode - iommu: rockchip: Free domain on .domain_free - iommu/tegra-smmu: Fix page tables in > 4 GiB memory - dmaengine: xilinx_dma: Clear desc_pendingcount in xilinx_dma_reset - scsi: target: compare full CHAP_A Algorithm strings - scsi: lpfc: Fix SLI3 hba in loop mode not discovering devices - scsi: csiostor: Don't enable IRQs too early - scsi: hisi_sas: Replace in_softirq() check in hisi_sas_task_exec() - powerpc/pseries: Mark accumulate_stolen_time() as notrace - powerpc/pseries: Don't fail hash page table insert for bolted mapping - powerpc/tools: Don't quote $objdump in scripts - dma-debug: add a schedule point in debug_dma_dump_mappings() - leds: lm3692x: Handle failure to probe the regulator - clocksource/drivers/asm9260: Add a check for of_clk_get - clocksource/drivers/timer-of: Use unique device name instead of timer - powerpc/security/book3s64: Report L1TF status in sysfs - powerpc/book3s64/hash: Add cond_resched to avoid soft lockup warning - ext4: update direct I/O read lock pattern for IOCB_NOWAIT - ext4: iomap that extends beyond EOF should be marked dirty - jbd2: Fix statistics for the number of logged blocks - scsi: tracing: Fix handling of TRANSFER LENGTH == 0 for READ(6) and WRITE(6) - scsi: lpfc: Fix duplicate unreg_rpi error in port offline flow - f2fs: fix to update dir's i_pino during cross_rename - clk: qcom: Allow constant ratio freq tables for rcg - clk: clk-gpio: propagate rate change to parent - irqchip/irq-bcm7038-l1: Enable parent IRQ if necessary - irqchip: ingenic: Error out if IRQ domain creation failed - fs/quota: handle overflows of sysctl fs.quota.* and report as unsigned long - scsi: lpfc: fix: Coverity: lpfc_cmpl_els_rsp(): Null pointer dereferences - PCI: rpaphp: Fix up pointer to first drc-info entry - scsi: ufs: fix potential bug which ends in system hang - powerpc/pseries/cmm: Implement release() function for sysfs device - PCI: rpaphp: Don't rely on firmware feature to imply drc-info support - PCI: rpaphp: Annotate and correctly byte swap DRC properties - PCI: rpaphp: Correctly match ibm, my-drc-index to drc-name when using drc- info - powerpc/security: Fix wrong message when RFI Flush is disable - scsi: atari_scsi: sun3_scsi: Set sg_tablesize to 1 instead of SG_NONE - clk: pxa: fix one of the pxa RTC clocks - bcache: at least try to shrink 1 node in bch_mca_scan() - HID: quirks: Add quirk for HP MSU1465 PIXART OEM mouse - HID: logitech-hidpp: Silence intermittent get_battery_capacity errors - ARM: 8937/1: spectre-v2: remove Brahma-B53 from hardening - libnvdimm/btt: fix variable 'rc' set but not used - HID: Improve Windows Precision Touchpad detection. - HID: rmi: Check that the RMI_STARTED bit is set before unregistering the RMI transport device - watchdog: Fix the race between the release of watchdog_core_data and cdev - scsi: pm80xx: Fix for SATA device discovery - scsi: ufs: Fix error handing during hibern8 enter - scsi: scsi_debug: num_tgts must be >= 0 - scsi: NCR5380: Add disconnect_mask module parameter - scsi: iscsi: Don't send data to unbound connection - scsi: target: iscsi: Wait for all commands to finish before freeing a session - gpio: mpc8xxx: Don't overwrite default irq_set_type callback - apparmor: fix unsigned len comparison with less than zero - scripts/kallsyms: fix definitely-lost memory leak - powerpc: Don't add
[Bug 1863272] Re: eoan/linux-aws: 5.3.0-1012.13 -proposed tracker
** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1863294 packages: lrm: linux-restricted-modules-aws main: linux-aws meta: linux-meta-aws - phase: Ready for Promote to Proposed - phase-changed: Monday, 17. February 2020 22:26 UTC + phase: Promote to Proposed + phase-changed: Tuesday, 18. February 2020 07:11 UTC reason: - promote-to-proposed: Pending -- ready for review + promote-to-proposed: Stalled -- review in progress trackers: bionic/linux-aws-5.3: bug 1863270 variant: debs -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1863272 Title: eoan/linux-aws: 5.3.0-1012.13 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1863272/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1861214] Re: eoan/linux: 5.3.0-40.32 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/promote-to-security Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy Whitcroft (apw) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1861214 Title: eoan/linux: 5.3.0-40.32 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1861214/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1861196] Re: bionic/linux-raspi2-5.3: 5.3.0-1018.20~18.04.1 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-updates Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/promote-to-updates Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy Whitcroft (apw) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1861196 Title: bionic/linux-raspi2-5.3: 5.3.0-1018.20~18.04.1 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1861196/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1863711] [NEW] [focal] `ovsdb-tool` not in `openvswitch-common`
Public bug reported: The on-going work to wean OVN off of the `openvswitch-switch` package is great, however it appears we're mising the `ovsdb-tool` binary. Feb 18 06:46:15 juju-e5e5a4-zaza-0bd44e19b938-4 ovn-ctl[14536]: /usr/share/ovn/scripts/ovn-ctl: 401: /usr/share/ovn/scripts/ovn-ctl: ovsdb-tool: not found Feb 18 06:46:15 juju-e5e5a4-zaza-0bd44e19b938-4 ovn-ctl[14536]: * Creating cluster database /var/lib/ovn/ovnnb_db.db # ovsdb-tool Command 'ovsdb-tool' not found, but can be installed with: apt install openvswitch-switch ** Affects: openvswitch (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1863711 Title: [focal] `ovsdb-tool` not in `openvswitch-common` To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/openvswitch/+bug/1863711/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1863272] Re: eoan/linux-aws: 5.3.0-1012.13 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-proposed Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/promote-to-proposed Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy Whitcroft (apw) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1863272 Title: eoan/linux-aws: 5.3.0-1012.13 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1863272/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1861973] Re: run_afpackettests in ubuntu_kernel_selftests failed with "./in_netns.sh: Permission denied"
Passed with node amd64 node rizzo with 4.4.0-175.205 ** Changed in: ubuntu-kernel-tests Status: In Progress => Fix Released ** Tags removed: verification-needed-xenial ** Tags added: verification-done-xenial -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1861973 Title: run_afpackettests in ubuntu_kernel_selftests failed with "./in_netns.sh: Permission denied" To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1861973/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1862114] Re: pty03 from pty in ubuntu_ltp failed on Eoan
Passed with amd64 node amaura on 4.15.0-89.89 ** Tags removed: verification-needed-bionic ** Tags added: verification-done-bionic -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1862114 Title: pty03 from pty in ubuntu_ltp failed on Eoan To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1862114/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1861196] Re: bionic/linux-raspi2-5.3: 5.3.0-1018.20~18.04.1 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-updates Status: New => Confirmed ** Tags removed: block-proposed-bionic ** Tags removed: block-proposed ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1861197 packages: main: linux-raspi2-5.3 meta: linux-meta-raspi2-5.3 - phase: Ready for Testing - phase-changed: Monday, 17. February 2020 09:28 UTC + phase: Ready for Promote to Updates + phase-changed: Tuesday, 18. February 2020 06:36 UTC proposed-announcement-sent: true proposed-testing-requested: true reason: - certification-testing: Ongoing -- testing in progress + promote-to-updates: Pending -- ready to copy trackers: bionic/linux-raspi2-5.3/pi-kernel: bug 1861195 variant: debs -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1861196 Title: bionic/linux-raspi2-5.3: 5.3.0-1018.20~18.04.1 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1861196/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1861648] Re: When booting 20.04 an 'ld-2.23.so' process consumes 100% CPU for minutes
It is, the process is quite elaborate. Snapd runs fc-cache-* binary from the core snap by directly invoking ld.so (the interpreter) from the core snap, passing library path arguments that ensure that library dependencies come from core and lastly the binary itself. You can see it in action here: https://github.com/snapcore/snapd/blob/d4a45e9771e535da9bbe82be7c12e537d83e58cd/cmd/cmdutil/cmdutil.go#L100-L139 The side effect is that argv[0] is set to ld.so, so in ps output it looks like as if ld.so is running. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1861648 Title: When booting 20.04 an 'ld-2.23.so' process consumes 100% CPU for minutes To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/snapd/+bug/1861648/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1863463] Re: Firefox 75 requires nodejs >= 10.19
** Description changed: Firefox trunk, to become version 75.0 in April 2020, has bumped its nodejs requirement to 10.19 (https://bugzilla.mozilla.org/show_bug.cgi?id=1547823). + + Firefox 75 Beta starts on March 9th. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1863463 Title: Firefox 75 requires nodejs >= 10.19 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/firefox/+bug/1863463/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1861196] Re: bionic/linux-raspi2-5.3: 5.3.0-1018.20~18.04.1 -proposed tracker
Hardware Certification have completed testing this -proposed kernel. No regressions were observed, results are available here: Rpi2b-armhf: https://certification.canonical.com/hardware/201906-27188/submission/161422/ Rpi3b-arm64: https://certification.canonical.com/hardware/201811-26649/submission/161426/ Rpi3b-armhf: https://certification.canonical.com/hardware/201811-26649/submission/161417/ Rpi3a+-arm64: https://certification.canonical.com/hardware/201901-26785/submission/161439/ Rpi3a+-armhf: https://certification.canonical.com/hardware/201901-26785/submission/161432/ Rpi3b+-arm64: https://certification.canonical.com/hardware/201810-26542/submission/161437/ Rpi3b+-armhf: https://certification.canonical.com/hardware/201810-26542/submission/161431/ Rpi4b-1g-arm64: https://certification.canonical.com/hardware/201911-27471/submission/161413/ Rpi4b-1g-armhf: https://certification.canonical.com/hardware/201910-27407/submission/161414/ Rpi4b-2g-arm64: https://certification.canonical.com/hardware/201911-27507/submission/161411/ Rpi4b-2g-armhf: https://certification.canonical.com/hardware/201911-27506/submission/161409/ Rpi4b-4g-arm64: https://certification.canonical.com/hardware/201911-27456/submission/161410/ Rpi4b-4g-armhf: https://certification.canonical.com/hardware/201911-27455/submission/161412/ CM3-arm64: https://certification.canonical.com/hardware/201711-25992/submission/161429/ CM3-armhf: https://certification.canonical.com/hardware/201711-25992/submission/161435/ CM3+-arm64: https://certification.canonical.com/hardware/201908-27277/submission/161440/ CM3+-armhf: https://certification.canonical.com/hardware/201908-27277/submission/161434/ ** Changed in: kernel-sru-workflow/certification-testing Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/certification-testing Status: In Progress => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1861196 Title: bionic/linux-raspi2-5.3: 5.3.0-1018.20~18.04.1 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1861196/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1851188] Re: Failed to create a partition table - install failed
I had this issue again today on dell [optiplex] 755 (c2d-e8300, 8gb, amd/ati radeon rv610/radeon hd2400 pro/xt) testcase: full disk, bios, internet, no-encryption this box reliably has this issue, but I noticed something unusual after the test when I tried to use the box instead for a 'live' test.. 'install was attempted'. it failed & I cancelled out of `calamares` On loading `pcmanfm-qt` I tried to `mount` hdd as I often do in 'live tests and I keep getting "Error" - "No object for D-Bus interface" I rebooted the system, and using `pcmanfm-qt` I to mount as I normally do got no errors, used `kde partition manager` to umount & re-attempted install (it failed again), then again retried to `mount` via `pcmanfm- qt` and error "No object for D-Bus interface". -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1851188 Title: Failed to create a partition table - install failed To manage notifications about this bug go to: https://bugs.launchpad.net/calamares/+bug/1851188/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1855685] Re: change kconfig of the soundwire bus driver from y to m
** Changed in: hwe-next Status: New => Fix Released ** Changed in: linux (Ubuntu Bionic) Status: New => Won't Fix -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1855685 Title: change kconfig of the soundwire bus driver from y to m To manage notifications about this bug go to: https://bugs.launchpad.net/hwe-next/+bug/1855685/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1863704] [NEW] wrongly used a string type as int value for CEPH_VOLUME_SYSTEMD_TRIES and CEPH_VOLUME_SYSTEMD_INTERVAL
Public bug reported: [Impact] The impact is that we can't manually change the value of env CEPH_VOLUME_SYSTEMD_TRIES or CEPH_VOLUME_SYSTEMD_INTERVAL. The default value will make the ceph-volume-systemd only keep trying about 150 seconds, which is not enough under some circumstance that the cluter needs longer time to activate the disks (e.g disk was encrypted by vault, and this can happen when vault and osd nodes are restarted). So, in this case, user will need to increase the value of CEPH_VOLUME_SYSTEMD_TRIES or CEPH_VOLUME_SYSTEMD_INTERVAL to keep ceph-volume-systemd to try longer to be able to start the osd. [Test case] 1. deploy a ceph cluster (we can use luminous) 2. set env CEPH_VOLUME_SYSTEMD_TRIES to 100 on one osd node 3. debug the ceph-volume-systemd at file src/ceph-volume/ceph_volume/systemd/main.py and print the value of 'tries' after it was used as an integer. we can see it's not an integer value 100 as we expeceted. [Regression Potential] Regression potential is very low, a potential case would be if a user had set these two env before, after he upgraded a new version with this fix, the new real 'tries' might seems to be less than before as the previous value was apparently wrong and might wrongly enlarged. [other info] Upstream bug report: https://tracker.ceph.com/issues/43186 Upstream pull request: https://github.com/ceph/ceph/pull/32106 ** Affects: ceph (Ubuntu) Importance: High Assignee: dongdong tao (taodd) Status: New ** Changed in: ceph (Ubuntu) Importance: Undecided => Medium ** Changed in: ceph (Ubuntu) Importance: Medium => High ** Changed in: ceph (Ubuntu) Assignee: (unassigned) => dongdong tao (taodd) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1863704 Title: wrongly used a string type as int value for CEPH_VOLUME_SYSTEMD_TRIES and CEPH_VOLUME_SYSTEMD_INTERVAL To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ceph/+bug/1863704/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1863285] Re: bionic/linux-azure: 5.0.0-1033.35 -proposed tracker
** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1863297 packages: lrm: linux-restricted-modules-azure main: linux-azure meta: linux-meta-azure signed: linux-signed-azure phase: Promote to Proposed phase-changed: Monday, 17. February 2020 22:13 UTC reason: - promote-to-proposed: Pending -- package copied to Proposed signed:queued + promote-to-proposed: Ongoing -- packages waiting in -proposed for mirror sync trackers: bionic/linux-azure/azure-kernel: bug 1863284 variant: debs -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1863285 Title: bionic/linux-azure: 5.0.0-1033.35 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1863285/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1844001] Re: error to install
We are sorry that we do not always have the capacity to review all reported bugs in a timely manner. The following messages can be found in UbiquitySyslog.txt which was automatically attached to this bug report: Sep 14 15:42:08 ubuntu kernel: [ 51.471874] SQUASHFS error: zlib decompression failed, data probably corrupt Sep 14 15:42:08 ubuntu kernel: [ 51.471882] SQUASHFS error: squashfs_read_data failed to read block 0x727fdcaf Sep 14 15:42:08 ubuntu kernel: [ 51.516408] SQUASHFS error: zlib decompression failed, data probably corrupt Sep 14 15:42:08 ubuntu kernel: [ 51.516414] SQUASHFS error: squashfs_read_data failed to read block 0x728db97f Sep 14 15:42:08 ubuntu kernel: [ 51.522855] SQUASHFS error: zlib decompression failed, data probably corrupt You probably had a bad write to your media. If you have problems in the future please try the option to check the integrity of the image from the installer boot menu, and if this confirms that the media is corrupt, try re-writing it. I'm closing this bug report due to the time that has elapsed since it was raised. Please feel free to re=open it if you're still having problems completing the installation. ** Changed in: ubiquity (Ubuntu) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1844001 Title: error to install To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubiquity/+bug/1844001/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1863592] Re: bionic/linux-oem: 4.15.0-1073.83 -proposed tracker
** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1862824 packages: lrm: linux-restricted-modules-oem main: linux-oem meta: linux-meta-oem signed: linux-signed-oem phase: Promote to Proposed phase-changed: Monday, 17. February 2020 21:32 UTC reason: certification-testing: Ongoing -- testing in progress - promote-to-proposed: Pending -- package copied to Proposed signed:queued + promote-to-proposed: Ongoing -- packages waiting in -proposed for mirror sync variant: debs -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1863592 Title: bionic/linux-oem: 4.15.0-1073.83 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1863592/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1840065] Re: cant install 19.04 says dirty cd/dvd or hard disk problem
We are sorry that we do not always have the capacity to review all reported bugs in a timely manner. The following messages can be found in UbiquitySyslog.txt which was automatically attached to this bug report: Aug 13 17:35:11 ubuntu kernel: [ 182.993359] SQUASHFS error: zlib decompression failed, data probably corrupt Aug 13 17:35:11 ubuntu kernel: [ 182.993364] SQUASHFS error: squashfs_read_data failed to read block 0x30914325 Aug 13 17:35:11 ubuntu kernel: [ 183.159470] SQUASHFS error: zlib decompression failed, data probably corrupt Aug 13 17:35:11 ubuntu kernel: [ 183.159474] SQUASHFS error: squashfs_read_data failed to read block 0x30914325 You probably had a bad write to your media. If you have problems in the future please try the option to check the integrity of the image from the installer boot menu, and if this confirms that the media is corrupt, try re-writing it. I'm closing this bug report due to the time that has elapsed since it was raised. Also Ubuntu 19.04 is now out of support. ** Changed in: ubiquity (Ubuntu) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1840065 Title: cant install 19.04 says dirty cd/dvd or hard disk problem To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubiquity/+bug/1840065/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1844927] Re: installer crashed Ubuntu 19.04
We are sorry that we do not always have the capacity to review all reported bugs in a timely manner. The following messages can be found in UbiquitySyslog.txt which was automatically attached to this bug report: Sep 22 13:29:25 ubuntu kernel: [ 2726.539576] SQUASHFS error: zlib decompression failed, data probably corrupt Sep 22 13:29:25 ubuntu kernel: [ 2726.539580] SQUASHFS error: squashfs_read_data failed to read block 0x19cb588e You probably had a bad write to your media. If you have problems in the future please try the option to check the integrity of the image from the installer boot menu, and if this confirms that the media is corrupt, try re-writing it. I'm closing this bug report due to the time that has elapsed since it was raised. Also Ubuntu 19.04 is now out of support. ** Changed in: ubiquity (Ubuntu) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1844927 Title: installer crashed Ubuntu 19.04 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubiquity/+bug/1844927/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1847309] Re: install 19.04
The following messages can be found in UbiquitySyslog.txt which was automatically attached to this bug report: Oct 8 16:47:18 ubuntu kernel: [ 18.605470] SQUASHFS error: zlib decompression failed, data probably corrupt Oct 8 16:47:18 ubuntu kernel: [ 18.605475] SQUASHFS error: squashfs_read_data failed to read block 0x2b7730d You probably had a bad write to your media. I'm closing this report due to the time that has elapsed since you filed the report. Ubuntu 19.04 is also out of support. If you have such problems in the future please try the option to check the integrity of the image from the installer boot menu, and if this confirms that the media is corrupt, try re-writing it. ** Changed in: ubiquity (Ubuntu) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1847309 Title: install 19.04 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubiquity/+bug/1847309/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1846430] Re: Install crash on welcome screen
The following messages can be found in UbiquitySyslog.txt which was automatically attached to this bug report: Oct 2 22:52:30 ubuntu kernel: [ 309.317262] SQUASHFS error: zlib decompression failed, data probably corrupt Oct 2 22:52:30 ubuntu kernel: [ 309.317269] SQUASHFS error: squashfs_read_data failed to read block 0x1304064b You probably had a bad write to your media. I'm closing this report due to the time that has elapsed since you filed the report. Ubuntu 19.04 is also now out of support. If you have such problems in the future please try the option to check the integrity of the image from the installer boot menu, and if this confirms that the media is corrupt, try re- writing it. ** Changed in: ubiquity (Ubuntu) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1846430 Title: Install crash on welcome screen To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubiquity/+bug/1846430/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1863274] Re: eoan/linux-azure: 5.3.0-1014.15 -proposed tracker
** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1863294 packages: lrm: linux-restricted-modules-azure main: linux-azure meta: linux-meta-azure signed: linux-signed-azure phase: Promote to Proposed phase-changed: Monday, 17. February 2020 21:48 UTC reason: - promote-to-proposed: Pending -- package copied to Proposed signed:queued + promote-to-proposed: Ongoing -- packages waiting in -proposed for mirror sync trackers: bionic/linux-azure-5.3: bug 1863273 variant: debs -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1863274 Title: eoan/linux-azure: 5.3.0-1014.15 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1863274/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1863219] Re: WiFi module RTL8723DE not supported @live / installed session
*** This bug is a duplicate of bug 1780590 *** https://bugs.launchpad.net/bugs/1780590 ** This bug has been marked a duplicate of bug 1780590 Add support for Realtek 8723DE wireless adapter -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1863219 Title: WiFi module RTL8723DE not supported @live / installed session To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1863219/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1863420] Re: WiFi Realtek RTL8723DE adapter support issue.
*** This bug is a duplicate of bug 1780590 *** https://bugs.launchpad.net/bugs/1780590 ** This bug has been marked a duplicate of bug 1780590 Add support for Realtek 8723DE wireless adapter -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1863420 Title: WiFi Realtek RTL8723DE adapter support issue. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1863420/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1863280] Re: eoan/linux-gcp: 5.3.0-1013.14 -proposed tracker
** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1863294 packages: lrm: linux-restricted-modules-gcp main: linux-gcp meta: linux-meta-gcp signed: linux-signed-gcp phase: Promote to Proposed phase-changed: Monday, 17. February 2020 21:48 UTC reason: - promote-to-proposed: Pending -- package copied to Proposed signed:queued + promote-to-proposed: Ongoing -- packages waiting in -proposed for mirror sync trackers: bionic/linux-gcp-5.3: bug 1863275 bionic/linux-gke-5.3: bug 1863278 variant: debs -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1863280 Title: eoan/linux-gcp: 5.3.0-1013.14 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1863280/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1780590] Re: Add support for Realtek 8723DE wireless adapter
Status changed to 'Confirmed' because the bug affects multiple users. ** Changed in: linux-oem-osp1 (Ubuntu) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1780590 Title: Add support for Realtek 8723DE wireless adapter To manage notifications about this bug go to: https://bugs.launchpad.net/oem-priority/+bug/1780590/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1863026] Re: Remove my_bool typedef workaround
This bug was fixed in the package asterisk - 1:16.2.1~dfsg-2ubuntu1 --- asterisk (1:16.2.1~dfsg-2ubuntu1) focal; urgency=medium * d/p/mysql8_my_bool.patch: Reintroduce my_bool to fix build with MySQL 8. (LP: #1863026) -- Andreas Hasenack Wed, 12 Feb 2020 19:54:27 -0300 ** Changed in: asterisk (Ubuntu) Status: In Progress => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1863026 Title: Remove my_bool typedef workaround To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/argus-clients/+bug/1863026/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1847306] Re: installing ubuntu 19.04
The following messages can be found in UbiquitySyslog.txt which was automatically attached to this bug report: Oct 8 16:32:27 ubuntu kernel: [ 19.368025] SQUASHFS error: zlib decompression failed, data probably corrupt Oct 8 16:32:27 ubuntu kernel: [ 19.368029] SQUASHFS error: squashfs_read_data failed to read block 0x2b7730d You probably had a bad write to your media. I'm closing this report due to the time that has elapsed since you filed the report. Ubuntu 19.04 is also out of support. If you have such problems in the future please try the option to check the integrity of the image from the installer boot menu, and if this confirms that the media is corrupt, try re-writing it. ** Changed in: ubiquity (Ubuntu) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1847306 Title: installing ubuntu 19.04 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubiquity/+bug/1847306/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1848388] Re: Instalation Failed
he following messages can be found in UbiquitySyslog.txt which was automatically attached to this bug report: Oct 16 20:39:56 backbox kernel: [ 957.191992] SQUASHFS error: zlib decompression failed, data probably corrupt Oct 16 20:39:56 backbox kernel: [ 957.191996] SQUASHFS error: squashfs_read_data failed to read block 0x1feca2cd You probably had a bad write to your media. If you're still having problems please try the option to check the integrity of the image from the installer boot menu, and if this confirms that the media is corrupt, try re-writing it. Due to the time that has elapsed since you raised this report I;m closing it but please feel free to reopen the report if you're still having problems completing the installation. ** Changed in: ubiquity (Ubuntu) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1848388 Title: Instalation Failed To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubiquity/+bug/1848388/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1853186] Re: installation program detects a disk problem and stops
The following messages can be found in UbiquitySyslog.txt which was automatically attached to this bug report: Nov 19 16:30:23 xubuntu kernel: [ 631.354041] SQUASHFS error: zlib decompression failed, data probably corrupt Nov 19 16:30:23 xubuntu kernel: [ 631.354050] SQUASHFS error: squashfs_read_data failed to read block 0x597f8d5 You probably had a bad write to your media. If you're still having problems please try the option to check the integrity of the image from the installer boot menu, and if this confirms that the media is corrupt, try re-writing it. Due to the time that has elapsed since you raised this report I'm closing it but please feel free to re-open it if you're still unable to complete the installation. ** Changed in: ubiquity (Ubuntu) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1853186 Title: installation program detects a disk problem and stops To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubiquity/+bug/1853186/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1863592] Re: bionic/linux-oem: 4.15.0-1073.83 -proposed tracker
** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1862824 packages: lrm: linux-restricted-modules-oem main: linux-oem meta: linux-meta-oem signed: linux-signed-oem phase: Promote to Proposed phase-changed: Monday, 17. February 2020 21:32 UTC reason: + certification-testing: Ongoing -- testing in progress promote-to-proposed: Pending -- package copied to Proposed signed:queued variant: debs -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1863592 Title: bionic/linux-oem: 4.15.0-1073.83 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1863592/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1855032] Re: cannot install on vm ware. crashe out
The following messages can be found in UbiquitySyslog.txt which was automatically attached to this bug report: Dec 4 01:53:46 ubuntu-studio kernel: [ 418.242399] SQUASHFS error: zlib decompression failed, data probably corrupt Dec 4 01:53:46 ubuntu-studio kernel: [ 418.242403] SQUASHFS error: squashfs_read_data failed to read block 0x1e550625 You probably had a bad write to your media. I'm closing this report due to the time that has elapsed since you raised the problem. If you're still having problems please try the option to check the integrity of the image from the installer boot menu, and if this confirms that the media is corrupt, try re-writing it. If that proves unsuccessful please feel free to re-open the report by changing the status back to 'New' and add any further information that might be applicable. ** Changed in: ubiquity (Ubuntu) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1855032 Title: cannot install on vm ware. crashe out To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubiquity/+bug/1855032/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1863592] Re: bionic/linux-oem: 4.15.0-1073.83 -proposed tracker
** Changed in: kernel-sru-workflow/certification-testing Status: New => In Progress -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1863592 Title: bionic/linux-oem: 4.15.0-1073.83 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1863592/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1859126] Re: Reduce s2idle power consumption when ethernet cable is connected on e1000e
** Tags removed: verification-needed-eoan ** Tags added: verification-done-eoan -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1859126 Title: Reduce s2idle power consumption when ethernet cable is connected on e1000e To manage notifications about this bug go to: https://bugs.launchpad.net/hwe-next/+bug/1859126/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1862600] Re: sensitive config files are world-readable
** Information type changed from Public to Public Security ** Tags removed: community-security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1862600 Title: sensitive config files are world-readable To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/netplan.io/+bug/1862600/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1858961] Re: Update-Manager does not apply updates seen by the package manager
https://wiki.ubuntu.com/PhasedUpdates should explain what you're seeing. ** Changed in: update-manager (Ubuntu) Status: New => Incomplete -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1858961 Title: Update-Manager does not apply updates seen by the package manager To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/update-manager/+bug/1858961/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1861558] Re: Snap 'ed applicaitons have garbage on top of the window Close [x] button
Status changed to 'Confirmed' because the bug affects multiple users. ** Changed in: humanity-icon-theme (Ubuntu) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1861558 Title: Snap 'ed applicaitons have garbage on top of the window Close [x] button To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/adwaita-icon-theme/+bug/1861558/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1861558] Re: Snap 'ed applicaitons have garbage on top of the window Close [x] button
Status changed to 'Confirmed' because the bug affects multiple users. ** Changed in: gnome-themes-extra (Ubuntu) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1861558 Title: Snap 'ed applicaitons have garbage on top of the window Close [x] button To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/adwaita-icon-theme/+bug/1861558/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1861558] Re: Snap 'ed applicaitons have garbage on top of the window Close [x] button
Status changed to 'Confirmed' because the bug affects multiple users. ** Changed in: ubuntu-mono (Ubuntu) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1861558 Title: Snap 'ed applicaitons have garbage on top of the window Close [x] button To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/adwaita-icon-theme/+bug/1861558/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1861558] Re: Snap 'ed applicaitons have garbage on top of the window Close [x] button
Status changed to 'Confirmed' because the bug affects multiple users. ** Changed in: adwaita-icon-theme (Ubuntu) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1861558 Title: Snap 'ed applicaitons have garbage on top of the window Close [x] button To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/adwaita-icon-theme/+bug/1861558/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1863044] Re: qla2xxx no longer detects LUNs with 4.15.0-74+ on IBM BladeCenter
Hi Mauricio, Thanks for the prompt answer! After a lot of messing around to get a remote console, I can finally test. It looks like -88 doesn't work. I'm attaching a dmesg from -88 and -72. I will build and test master-next next. Regards, Daniel ** Attachment added: "dmesg from -88" https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1863044/+attachment/5329132/+files/dmesg-88 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1863044 Title: qla2xxx no longer detects LUNs with 4.15.0-74+ on IBM BladeCenter To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1863044/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1863433] Re: CCSM not activating
CCSM, or CompizConfig Settings Manager allows a user to configure Compiz Window Manager plugins. Ubuntu 19.10 uses the mutter not compiz so not a bug. ** Tags added: eoan ** Changed in: compiz (Ubuntu) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1863433 Title: CCSM not activating To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/compiz/+bug/1863433/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1653351] Re: Have option to not automatically open next email
** Changed in: thunderbird Importance: Wishlist => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1653351 Title: Have option to not automatically open next email To manage notifications about this bug go to: https://bugs.launchpad.net/thunderbird/+bug/1653351/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1863044] Re: qla2xxx no longer detects LUNs with 4.15.0-74+ on IBM BladeCenter
** Attachment added: "dmesg from -72" https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1863044/+attachment/5329133/+files/dmesg-72 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1863044 Title: qla2xxx no longer detects LUNs with 4.15.0-74+ on IBM BladeCenter To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1863044/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1843403] Re: [MIR] nfs-ganesha, ntirpc
I reviewed ntirpc 3.0-0ubuntu2 as checked into focal. This shouldn't be considered a full audit but rather a quick gauge of maintainability. ntirpc is a fork of the existing libtirpc library providing RPC services for nfs-ganesha and others. - CVE History: - Only 1 past CVEs against ntirpc - CVE-2017-8779 - was fixed reasonably quickly - This shares a lot of code with libtirpc which has had 5 CVEs (including CVE-2017-8779) so I checked these against ntirpc: - CVE-2013-1950 - ntirpc *might* be vulnerable to this - this needs more thorough code review - CVE-2018-14621 - ntirpc is not vulnerable - CVE-2018-14622 - ntirpc is not vulnerable - CVE-2016-4429 - ntirpc appears to also be vulnerable to this - I have marked this as such in our CVE tracker - I have updated our CVE tracker so that all CVEs triaged against libtirpc will also get triaged against ntirpc due to the amount of similar code between the two so that future CVEs don't get missed - No significant Build-Depends - cmake,libkrb5-dev, libjemalloc-dev, liburcu-dev - No pre/post inst/rm scripts - No init scripts - No systemd units - No dbus services - No setuid binaries - No binaries in PATH - No sudo fragments - No polkit files - No udev rules - No autopkgtests - Very simple tests run during build (tests/rpcping) - This exercises the high-level interfaces of the library - No cron jobs - Build logs are clean - No Processes spawned - Memory management appears to be careful and deliberate - Minimal file IO using hard-coded file paths to root-owned files - Logging is careful - The only environment variable used is NETPATH and this appears to be done carefully - No use of privileged functions - No use of cryptography / random number sources etc - No use of temp files - Network handling appears to be pretty good - Takes care to track buffer sizes and carefully decodes remote data - No use of WebKit - No Use of PolicyKit - Significant static analysis results - cppcheck identifies a possible NULL pointer dereference in the City hash code: - src/city.c:412:30: note: Calling function 'CityHash128WithSeed', 1st argument 'NULL' value is 0 - src/city.c:339:46: note: Calling function 'Fetch64', 1st argument 's' value is 0 - src/city.c:91:9: note: Calling function 'UNALIGNED_LOAD64', 1st argument 'p' value is 0 - src/city.c:43:18: note: Null pointer dereference - (ie due to the call to CityHash128WithSeed(NULL,...) this could result in an eventual call to memcpy with that NULL as the src argument) - coverity identifies a number of issues around handling of locks - some of these appear to be false positives but others could potentially be real issues - see attached for the full list of defects. In general, ntirpc appears to be well maintained and does not appear to have any obvious security issues. Other than the fact that this duplicates a lot of code from libtirpc, no object from the Security Team for promoting this to main - we have updated our CVE tracker so that any future CVEs against libtirpc will get automatically assigned to ntirpc as well so that we do not miss any other possible future CVEs for this. Security team ACK for promoting ntirpc to main - I suggest however that the list of Coverity defects be examined in more detail since some indicate the chance of dead-lock which would not be a good outcome for users of ntirpc. ** Changed in: nfs-ganesha (Ubuntu) Assignee: Ubuntu Security Team (ubuntu-security) => (unassigned) ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2013-1950 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-4429 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-8779 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-14621 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-14622 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1843403 Title: [MIR] nfs-ganesha, ntirpc To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/nfs-ganesha/+bug/1843403/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1843403] Re: [MIR] nfs-ganesha, ntirpc
** Attachment added: "ntirpc coverity defect results" https://bugs.launchpad.net/ubuntu/+source/ntirpc/+bug/1843403/+attachment/5329131/+files/coverity.txt ** Changed in: ntirpc (Ubuntu) Assignee: Ubuntu Security Team (ubuntu-security) => (unassigned) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1843403 Title: [MIR] nfs-ganesha, ntirpc To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/nfs-ganesha/+bug/1843403/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 234365] Re: Place unison.log file in ~/.unison
** Changed in: unison (Debian) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/234365 Title: Place unison.log file in ~/.unison To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/unison/+bug/234365/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1856941] Re: chinese input option just qwerty
[Expired for gnome-control-center (Ubuntu) because there has been no activity for 60 days.] ** Changed in: gnome-control-center (Ubuntu) Status: Incomplete => Expired -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1856941 Title: chinese input option just qwerty To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gnome-control-center/+bug/1856941/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1853731] Re: [snap] chromium stops working after a while, fails to render new tabs/pages
[Expired for chromium-browser (Ubuntu) because there has been no activity for 60 days.] ** Changed in: chromium-browser (Ubuntu) Status: Incomplete => Expired -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1853731 Title: [snap] chromium stops working after a while, fails to render new tabs/pages To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/1853731/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1861669] Re: Can't connect to wireless AP after resume from S3
Verified 5.5.2.1-0ubuntu3 from focal-release, and 5.5.2.1-0ubuntu3~18.04.1 from my PPA. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1861669 Title: Can't connect to wireless AP after resume from S3 To manage notifications about this bug go to: https://bugs.launchpad.net/hwe-next/+bug/1861669/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1863672] Re: The 'new' persistent live method starting in 19.10 no longer works
Status changed to 'Confirmed' because the bug affects multiple users. ** Changed in: casper (Ubuntu) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1863672 Title: The 'new' persistent live method starting in 19.10 no longer works To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/casper/+bug/1863672/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1862811] Re: bionic/linux-kvm: 4.15.0-1053.53 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Status: New => Confirmed ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1862824 packages: main: linux-kvm meta: linux-meta-kvm - phase: Holding before Promote to Security - phase-changed: Monday, 17. February 2020 15:52 UTC + phase: Ready for Promote to Security + phase-changed: Tuesday, 18. February 2020 03:51 UTC proposed-announcement-sent: true proposed-testing-requested: true reason: - promote-to-security: Holding -- not ready for security (replication dwell) + promote-to-security: Pending -- ready to copy variant: debs -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1862811 Title: bionic/linux-kvm: 4.15.0-1053.53 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1862811/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1861197] Re: eoan/linux-raspi2: 5.3.0-1018.20 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Status: New => Confirmed ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1861214 packages: main: linux-raspi2 meta: linux-meta-raspi2 - phase: Holding before Promote to Security - phase-changed: Monday, 17. February 2020 15:52 UTC + phase: Ready for Promote to Security + phase-changed: Tuesday, 18. February 2020 03:51 UTC proposed-announcement-sent: true proposed-testing-requested: true reason: - promote-to-security: Holding -- not ready for security (replication dwell) + promote-to-security: Pending -- ready to copy trackers: bionic/linux-raspi2-5.3: bug 1861196 eoan/linux-raspi2/pi-kernel: bug 1861194 variant: debs -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1861197 Title: eoan/linux-raspi2: 5.3.0-1018.20 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1861197/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1856083] Re: autopkgtest failure in focal
This bug was fixed in the package runc - 1.0.0~rc10-0ubuntu1 --- runc (1.0.0~rc10-0ubuntu1) focal; urgency=medium [ Lucas Kanashiro ] * Run dh_golang_autopkgtest with isolation-machine restriction (LP: #1856083) - d/control: remove Testsuite field since we are now overwriting the autodep8 test definition. - d/t/control: overwrite autodep8 test definition to add isolation-machine restriction. * d/t/control: Use commas in Restrictions field of basic-smoke test [ Tianon Gravi ] * Update to 1.0.0-rc10 upstream release -- Tianon Gravi Tue, 18 Feb 2020 09:06:24 +1300 ** Changed in: runc (Ubuntu) Status: New => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1856083 Title: autopkgtest failure in focal To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/runc/+bug/1856083/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1863026] Re: Remove my_bool typedef workaround
This bug was fixed in the package argus-clients - 1:3.0.8.2-5ubuntu1 --- argus-clients (1:3.0.8.2-5ubuntu1) focal; urgency=medium * d/p/mysql8_my_bool.patch: Reintroduce my_bool to fix build with MySQL 8. (LP: #1863026) -- Andreas Hasenack Wed, 12 Feb 2020 19:47:54 -0300 ** Changed in: argus-clients (Ubuntu) Status: In Progress => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1863026 Title: Remove my_bool typedef workaround To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/argus-clients/+bug/1863026/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1863574] Re: Update mpt3sas Driver to 33.100.00.00 for Ubuntu 20.04
** Changed in: linux (Ubuntu) Status: Incomplete => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1863574 Title: Update mpt3sas Driver to 33.100.00.00 for Ubuntu 20.04 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1863574/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1854362] Re: [MIR] ceph-iscsi, tcmu, python-configshell-fb, python-rtslib-fb, urwid
targetcli-fb has not been mentioned previously and is not a task on this bug - does it need to be added? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1854362 Title: [MIR] ceph-iscsi, tcmu, python-configshell-fb, python-rtslib-fb, urwid To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ceph-iscsi/+bug/1854362/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1863697] [NEW] not compatible with python3.8 on focal
Public bug reported: graphite-web fails on focal with python3.8 (the default) due to the following error: File "/usr/lib/python3/dist-packages/graphite/render/urls.py", line 16, in from . import views File "/usr/lib/python3/dist-packages/graphite/render/views.py", line 23, in from cgi import parse_qs ImportError: cannot import name 'parse_qs' from 'cgi' (/usr/lib/python3.8/cgi.py) The following upstream PR fixes the issue by using six.moves for this, and also makes 1 other change for Python3.8: https://github.com/graphite-project/graphite-web/commit/117b04df26d83c57d3d5f25fb7457572d3fe90bd This PR is in the upstream release 1.1.6 however Debian sid/experimental and thus focal is stuck on 1.1.4 The reproduction setup is using apache2 with libapache2-mod-wsgi-py3 - there appears to be no easy way to request mod-wsgi load python3.7 instead so this seems critical. ** Affects: graphite-web (Ubuntu) Importance: High Status: Confirmed ** Changed in: graphite-web (Ubuntu) Status: New => Confirmed ** Changed in: graphite-web (Ubuntu) Importance: Undecided => High -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1863697 Title: not compatible with python3.8 on focal To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/graphite-web/+bug/1863697/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1863696] [NEW] Failed to install
Public bug reported: just failed to complete intsallation ProblemType: Bug DistroRelease: Ubuntu 18.04 Package: ubiquity 18.04.14.14 ProcVersionSignature: Ubuntu 5.3.0-28.30~18.04.1-generic 5.3.13 Uname: Linux 5.3.0-28-generic x86_64 ApportVersion: 2.20.9-0ubuntu7.9 Architecture: amd64 CasperVersion: 1.394.3 CurrentDesktop: ubuntu:GNOME Date: Mon Feb 17 19:44:54 2020 InstallCmdLine: BOOT_IMAGE=/casper/vmlinuz file=/cdrom/preseed/ubuntu.seed boot=casper only-ubiquity quiet splash oem-config/enable=true --- LiveMediaBuild: Ubuntu 18.04.4 LTS "Bionic Beaver" - Release amd64 (20200203.1) ProcEnviron: LANGUAGE=en_US.UTF-8 PATH=(custom, no user) XDG_RUNTIME_DIR= LANG=en_US.UTF-8 LC_NUMERIC=C.UTF-8 SourcePackage: grub-installer UpgradeStatus: No upgrade log present (probably fresh install) ** Affects: grub-installer (Ubuntu) Importance: Undecided Status: New ** Tags: amd64 apport-bug bionic ubiquity-18.04.14.14 ubuntu -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1863696 Title: Failed to install To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/grub-installer/+bug/1863696/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1862823] Re: xenial/linux-hwe: 4.15.0-88.88~16.04.1 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Status: New => Confirmed ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1862824 packages: main: linux-hwe meta: linux-meta-hwe signed: linux-signed-hwe - phase: Holding before Promote to Security - phase-changed: Monday, 17. February 2020 15:09 UTC + phase: Ready for Promote to Security + phase-changed: Tuesday, 18. February 2020 02:56 UTC proposed-announcement-sent: true proposed-testing-requested: true reason: - promote-to-security: Holding -- not ready for security (replication dwell) + promote-to-security: Pending -- ready to copy trackers: xenial/linux-deeplens: bug 1861162 variant: debs -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1862823 Title: xenial/linux-hwe: 4.15.0-88.88~16.04.1 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1862823/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1862813] Re: xenial/linux-oracle: 4.15.0-1033.36~16.04.1 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Status: New => Confirmed ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1862814 packages: main: linux-oracle meta: linux-meta-oracle signed: linux-signed-oracle - phase: Holding before Promote to Security - phase-changed: Monday, 17. February 2020 14:55 UTC + phase: Ready for Promote to Security + phase-changed: Tuesday, 18. February 2020 02:48 UTC proposed-announcement-sent: true proposed-testing-requested: true reason: - promote-to-security: Holding -- not ready for security (replication dwell) + promote-to-security: Pending -- ready to copy variant: debs -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1862813 Title: xenial/linux-oracle: 4.15.0-1033.36~16.04.1 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1862813/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1862821] Re: xenial/linux-gcp: 4.15.0-1055.59 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Status: New => Confirmed ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1862824 packages: main: linux-gcp meta: linux-meta-gcp signed: linux-signed-gcp - phase: Holding before Promote to Security - phase-changed: Monday, 17. February 2020 14:51 UTC + phase: Ready for Promote to Security + phase-changed: Tuesday, 18. February 2020 02:47 UTC proposed-announcement-sent: true proposed-testing-requested: true reason: - promote-to-security: Holding -- not ready for security (replication dwell) + promote-to-security: Pending -- ready to copy trackers: xenial/linux-gcp/gcp-kernel: bug 1862819 xenial/linux-gcp/gke-kernel: bug 1862820 variant: debs -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1862821 Title: xenial/linux-gcp: 4.15.0-1055.59 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1862821/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1862818] Re: xenial/linux-azure: 4.15.0-1071.76 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Status: New => Confirmed ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1862824 packages: main: linux-azure meta: linux-meta-azure signed: linux-signed-azure - phase: Holding before Promote to Security - phase-changed: Monday, 17. February 2020 14:50 UTC + phase: Ready for Promote to Security + phase-changed: Tuesday, 18. February 2020 02:46 UTC proposed-announcement-sent: true proposed-testing-requested: true reason: - promote-to-security: Holding -- not ready for security (replication dwell) + promote-to-security: Pending -- ready to copy trackers: trusty/linux-azure: bug 1862816 xenial/linux-azure/azure-kernel: bug 1862815 variant: debs -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1862818 Title: xenial/linux-azure: 4.15.0-1071.76 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1862818/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1862807] Re: xenial/linux-aws-hwe: 4.15.0-1060.62~16.04.1 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Status: New => Confirmed ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1862808 packages: main: linux-aws-hwe meta: linux-meta-aws-hwe - phase: Holding before Promote to Security - phase-changed: Monday, 17. February 2020 14:55 UTC + phase: Ready for Promote to Security + phase-changed: Tuesday, 18. February 2020 02:47 UTC proposed-announcement-sent: true proposed-testing-requested: true reason: - promote-to-security: Holding -- not ready for security (replication dwell) + promote-to-security: Pending -- ready to copy variant: debs -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1862807 Title: xenial/linux-aws-hwe: 4.15.0-1060.62~16.04.1 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1862807/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1861115] Re: xenial/linux-snapdragon: 4.4.0-1133.141 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Status: New => Confirmed ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1861122 packages: main: linux-snapdragon meta: linux-meta-snapdragon - phase: Holding before Promote to Security - phase-changed: Monday, 17. February 2020 14:48 UTC + phase: Ready for Promote to Security + phase-changed: Tuesday, 18. February 2020 02:46 UTC proposed-announcement-sent: true proposed-testing-requested: true reason: - promote-to-security: Holding -- not ready for security (replication dwell) + promote-to-security: Pending -- ready to copy trackers: xenial/linux-snapdragon/dragonboard-kernel: bug 1861114 variant: debs -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1861115 Title: xenial/linux-snapdragon: 4.4.0-1133.141 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1861115/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1861107] Re: xenial/linux-aws: 4.4.0-1102.113 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Status: New => Confirmed ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1861122 packages: main: linux-aws meta: linux-meta-aws - phase: Holding before Promote to Security - phase-changed: Monday, 17. February 2020 14:33 UTC + phase: Ready for Promote to Security + phase-changed: Tuesday, 18. February 2020 02:32 UTC proposed-announcement-sent: true proposed-testing-requested: true reason: - promote-to-security: Holding -- not ready for security (replication dwell) + promote-to-security: Pending -- ready to copy trackers: xenial/linux-aws/aws-kernel: bug 1861106 variant: debs -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1861107 Title: xenial/linux-aws: 4.4.0-1102.113 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1861107/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs