[Bug 1788764] Re: linux: 3.13.0-158.208 -proposed tracker

2018-09-10 Thread Steve Beattie
No USN needed.

** Changed in: kernel-sru-workflow/security-signoff
   Status: In Progress => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1788764

Title:
  linux: 3.13.0-158.208 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1788764/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1771245] Re: [ICL] Touch support

2018-09-10 Thread Joseph Salisbury
** Changed in: linux (Ubuntu Cosmic)
   Status: Triaged => In Progress

** Changed in: linux (Ubuntu Cosmic)
 Assignee: (unassigned) => Joseph Salisbury (jsalisbury)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1771245

Title:
  [ICL] Touch support

To manage notifications about this bug go to:
https://bugs.launchpad.net/intel/+bug/1771245/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1789496] Re: Fresh install failed when installing or upgrading GRUB-2

2018-09-10 Thread Phillip Susi
*** This bug is a duplicate of bug 1766945 ***
https://bugs.launchpad.net/bugs/1766945

** This bug has been marked a duplicate of bug 1766945
   (EFI on top of legacy install) choosing "replace" or "resize" options in 
partitioning may lead to an install failure

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1789496

Title:
  Fresh install failed when installing or upgrading GRUB-2

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/grub-installer/+bug/1789496/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1790996] Re: JS ERROR: ImportError: No JS module 'desktop' found in search path#012

2018-09-10 Thread Launchpad Bug Tracker
This bug was fixed in the package gnome-shell - 3.30.0-1ubuntu2

---
gnome-shell (3.30.0-1ubuntu2) cosmic; urgency=medium

  * ubuntu/desktop_detect.patch:
+ Added missing misc/desktop.js to pref's gresource.xml (LP: #1790996)

 -- Shem Pasamba   Thu, 06 Sep 2018 16:41:39 +0800

** Changed in: gnome-shell (Ubuntu)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1790996

Title:
  JS ERROR: ImportError: No JS module 'desktop' found in search path#012

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gnome-shell/+bug/1790996/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1788765] Re: linux-lts-trusty: 3.13.0-158.208~precise2 -proposed tracker

2018-09-10 Thread Steve Beattie
** Changed in: kernel-sru-workflow/security-signoff
   Status: In Progress => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1788765

Title:
  linux-lts-trusty: 3.13.0-158.208~precise2 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1788765/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1760920] Re: FFe: sync java packages from Debian to fix OpenJDK 9/10 issues in Bionic

2018-09-10 Thread Tiago Stürmer Daitx
** Summary changed:

- FFe: sync java packages from Debian to fix OpenJDK 9/10 issues
+ FFe: sync java packages from Debian to fix OpenJDK 9/10 issues in Bionic

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1760920

Title:
  FFe: sync java packages from Debian to fix OpenJDK 9/10 issues in
  Bionic

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/java-common/+bug/1760920/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1771245] Re: [ICL] Touch support

2018-09-10 Thread Joseph Salisbury
https://lists.ubuntu.com/archives/kernel-team/2018-September/095316.html

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1771245

Title:
  [ICL] Touch support

To manage notifications about this bug go to:
https://bugs.launchpad.net/intel/+bug/1771245/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1788766] Re: linux: 4.4.0-135.161 -proposed tracker

2018-09-10 Thread Steve Beattie
No USN Needed

** Changed in: kernel-sru-workflow/security-signoff
   Status: In Progress => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1788766

Title:
  linux: 4.4.0-135.161 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1788766/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1788563] Re: L1TF mitigation not effective

2018-09-10 Thread Joseph Salisbury
** Changed in: linux (Ubuntu Bionic)
   Status: Triaged => In Progress

** Changed in: linux (Ubuntu Bionic)
 Assignee: (unassigned) => Joseph Salisbury (jsalisbury)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1788563

Title:
  L1TF mitigation not effective

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1788563/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1790966] Re: Electron apps segfault on glibc 2.28 (cosmic)

2018-09-10 Thread Martin Wimpress
This issue affects Electron apps built with Electron <= 2.0.7 and is
fixed in Electron 2.0.8.

  * https://github.com/electron/electron/issues/13972

Few Electron applications have made the transition to Electron 2.x, but
those that have will need to be rebuilt with Electron >== 2.0.8

** Bug watch added: github.com/electron/electron/issues #13972
   https://github.com/electron/electron/issues/13972

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1790966

Title:
  Electron apps segfault on glibc 2.28 (cosmic)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/glibc/+bug/1790966/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1791407] Re: Thinkpad L570 UEFI destroyed after BIOS update

2018-09-10 Thread Richard Hughes
> I've bricked two laptops (a L560 and a L570) due to this update.

Ohh dear, this really shouldn't have happened. I'm sorry for this
experience you've had.

> or the fact that lenovo released a fault firmware

Lenovo are the ones that upload, test and certify firmware releases. The
LVFS doesn't test anything and all the onus is on the OEM to test on
actual hardware before moving to stable.

> to NOT update the bios unless your system isn't working as expected

1.35 also fixes an unspecified security issue, so I assume that's why it
was uploaded.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1791407

Title:
  Thinkpad L570 UEFI destroyed after BIOS update

To manage notifications about this bug go to:
https://bugs.launchpad.net/fwupd/+bug/1791407/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1054299] Re: Race condition in suspend scripts reveals desktop

2018-09-10 Thread Theo Linkspfeifer
Jarno, would you be able to contribute a patch to improve the
functionality?

This is a long-standing issue and still not fully fixed. The upstream
developers may not be aware of its severity.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1054299

Title:
  Race condition in suspend scripts reveals desktop

To manage notifications about this bug go to:
https://bugs.launchpad.net/unity/+bug/1054299/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1788744] Re: linux: 4.15.0-34.37 -proposed tracker

2018-09-10 Thread Steve Beattie
** Changed in: kernel-sru-workflow/security-signoff
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1788744

Title:
  linux: 4.15.0-34.37 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1788744/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1788767] Re: linux-aws: 4.4.0-1029.32 -proposed tracker

2018-09-10 Thread Steve Beattie
No USN needed

** Changed in: kernel-sru-workflow/security-signoff
   Status: In Progress => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1788767

Title:
  linux-aws: 4.4.0-1029.32 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1788767/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1788771] Re: linux-kvm: 4.4.0-1033.39 -proposed tracker

2018-09-10 Thread Steve Beattie
No USN needed

** Changed in: kernel-sru-workflow/security-signoff
   Status: In Progress => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1788771

Title:
  linux-kvm: 4.4.0-1033.39 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1788771/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1788563] Re: L1TF mitigation not effective in some CPU and RAM combinations

2018-09-10 Thread Tyler Hicks
** Summary changed:

- L1TF mitigation not effective
+ L1TF mitigation not effective in some CPU and RAM combinations

** Description changed:

  == SRU Justification ==
  This regression has been reported in multiple bugs and affects Trust,
  Xenial and Bionic.  All releases need different backports, so T and X
  will be sent in separate SRU requests.
  
- Due to this regression L1TF mitigation not effective.
+ Due to this bug in the original L1TF patch set, L1TF mitigation not
+ effective in certain CPU and installed RAM configurations.
  
  == Fixes ==
  9df9516940a6 ("x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 
32bit")
  b0a182f87568 ("x86/speculation/l1tf: Fix off-by-one error when warning that 
system has too much RAM")
  cc51e5428ea5 ("x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+")
  
  == Regression Potential ==
  Low.  These are security fixes and have all been cc'd to upstream
  stable, so they have had additional upstream review.
  
  == Test Case ==
  A test kernel was built with these patches and tested by the original bug 
reporter.
  The bug reporter states the test kernel resolved the bug.
- 
  
  Lenovo Thinkpad W530 system with 32 GB RAM
  
  dmesg | grep -i l1tf
  [0.038386] L1TF: System has more than MAX_PA/2 memory. L1TF mitigation 
not effective.
  [ 2652.469669] L1TF CPU bug present and SMT on, data leak possible. See 
CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html 
for details.
  
  Related:
  https://bugzilla.opensuse.org/show_bug.cgi?id=1105536
  
  ProblemType: Bug
  DistroRelease: Ubuntu 18.04
  Package: linux-image-4.15.0-32-generic 4.15.0-32.35
  ProcVersionSignature: Ubuntu 4.15.0-32.35-generic 4.15.18
  Uname: Linux 4.15.0-32-generic x86_64
  ApportVersion: 2.20.9-0ubuntu7.2
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  pgera  2809 F pulseaudio
  CurrentDesktop: Unity:Unity7:ubuntu
  Date: Thu Aug 23 03:38:40 2018
  InstallationDate: Installed on 2018-08-11 (12 days ago)
  InstallationMedia: Ubuntu 18.04.1 LTS "Bionic Beaver" - Release amd64 
(20180725)
  MachineType: LENOVO 24382LU
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-4.15.0-32-generic 
root=UUID=e2607c8a-4bd1-49fe-ad07-83046492fac5 ro quiet splash vt.handoff=1
  RelatedPackageVersions:
   linux-restricted-modules-4.15.0-32-generic N/A
   linux-backports-modules-4.15.0-32-generic  N/A
   linux-firmware 1.173.1
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 06/11/2018
  dmi.bios.vendor: LENOVO
  dmi.bios.version: G5ETB2WW (2.72 )
  dmi.board.asset.tag: Not Available
  dmi.board.name: 24382LU
  dmi.board.vendor: LENOVO
  dmi.board.version: NO DPK
  dmi.chassis.asset.tag: No Asset Information
  dmi.chassis.type: 10
  dmi.chassis.vendor: LENOVO
  dmi.chassis.version: Not Available
  dmi.modalias: 
dmi:bvnLENOVO:bvrG5ETB2WW(2.72):bd06/11/2018:svnLENOVO:pn24382LU:pvrThinkPadW530:rvnLENOVO:rn24382LU:rvrNODPK:cvnLENOVO:ct10:cvrNotAvailable:
  dmi.product.family: ThinkPad W530
  dmi.product.name: 24382LU
  dmi.product.version: ThinkPad W530
  dmi.sys.vendor: LENOVO

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1788563

Title:
  L1TF mitigation not effective in some CPU and RAM combinations

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1788563/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1791724] [NEW] linux-oem: -proposed tracker

2018-09-10 Thread Kleber Sacilotto de Souza
Public bug reported:

This bug is for tracking the  upload package. This
bug will contain status and testing results related to that upload.

For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
kernel-stable-master-bug: 1791719

** Affects: kernel-sru-workflow
 Importance: Medium
 Status: In Progress

** Affects: kernel-sru-workflow/automated-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/certification-testing
 Importance: Medium
 Assignee: Canonical Hardware Certification (canonical-hw-cert)
 Status: New

** Affects: kernel-sru-workflow/prepare-package
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/prepare-package-meta
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/prepare-package-signed
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/promote-to-proposed
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-security
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-updates
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/regression-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/security-signoff
 Importance: Medium
 Assignee: Canonical Security Team (canonical-security)
 Status: New

** Affects: kernel-sru-workflow/upload-to-ppa
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/verification-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: linux-oem (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux-oem (Ubuntu Bionic)
 Importance: Medium
 Status: Confirmed


** Tags: bionic kernel-release-tracking-bug kernel-release-tracking-bug-live 
kernel-sru-cycle-2018.09.10 kernel-sru-derivative-of-1791719

** Tags added: kernel-release-tracking-bug

** Tags added: kernel-release-tracking-bug-live

** Also affects: linux-oem (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Tags added: bionic

** Changed in: linux-oem (Ubuntu Bionic)
   Status: New => Confirmed

** Also affects: kernel-sru-workflow/automated-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/certification-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package-signed
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-proposed
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-security
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-updates
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/regression-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/security-signoff
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/upload-to-ppa
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/verification-testing
   Importance: Undecided
   Status: New

** Changed in: kernel-sru-workflow/automated-testing
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/automated-testing
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/certification-testing
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/certification-testing
 Assignee: (unassigned) => Canonical Hardware Certification 
(canonical-hw-cert)

** Changed in: kernel-sru-workflow/prepare-package
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: (unassigned) => Canonical Kernel Team 

[Bug 1791726] [NEW] linux-azure: -proposed tracker

2018-09-10 Thread Kleber Sacilotto de Souza
Public bug reported:

This bug is for tracking the  upload package. This
bug will contain status and testing results related to that upload.

For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
kernel-stable-master-bug: 1791719

** Affects: kernel-sru-workflow
 Importance: Medium
 Status: In Progress

** Affects: kernel-sru-workflow/automated-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/certification-testing
 Importance: Medium
 Assignee: Canonical Hardware Certification (canonical-hw-cert)
 Status: Invalid

** Affects: kernel-sru-workflow/prepare-package
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/prepare-package-meta
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/prepare-package-signed
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/promote-to-proposed
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-security
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-updates
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/regression-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/security-signoff
 Importance: Medium
 Assignee: Canonical Security Team (canonical-security)
 Status: New

** Affects: kernel-sru-workflow/snap-release-to-beta
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/snap-release-to-candidate
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/snap-release-to-edge
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/snap-release-to-stable
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/stakeholder-signoff
 Importance: Medium
 Assignee: Joshua R. Poulson (jrp)
 Status: New

** Affects: kernel-sru-workflow/upload-to-ppa
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/verification-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: linux-azure (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux-azure (Ubuntu Bionic)
 Importance: Medium
 Status: Confirmed


** Tags: bionic kernel-release-tracking-bug kernel-release-tracking-bug-live 
kernel-sru-cycle-2018.09.10 kernel-sru-derivative-of-1791719

** Tags added: kernel-release-tracking-bug

** Tags added: kernel-release-tracking-bug-live

** Also affects: linux-azure (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Tags added: bionic

** Changed in: linux-azure (Ubuntu Bionic)
   Status: New => Confirmed

** Also affects: kernel-sru-workflow/automated-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/certification-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package-signed
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-proposed
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-security
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-updates
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/regression-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/security-signoff
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/snap-release-to-beta
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/snap-release-to-candidate
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/snap-release-to-edge
   Importance: 

[Bug 1788769] Re: linux-aws: 4.4.0-1067.77 -proposed tracker

2018-09-10 Thread Steve Beattie
No USN needed

** Changed in: kernel-sru-workflow/security-signoff
   Status: In Progress => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1788769

Title:
  linux-aws: 4.4.0-1067.77 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1788769/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1788772] Re: linux-raspi2: 4.4.0-1096.104 -proposed tracker

2018-09-10 Thread Steve Beattie
No USN needed

** Changed in: kernel-sru-workflow/security-signoff
   Status: In Progress => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1788772

Title:
  linux-raspi2: 4.4.0-1096.104 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1788772/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1788773] Re: linux-snapdragon: 4.4.0-1100.105 -proposed tracker

2018-09-10 Thread Steve Beattie
No USN needed

** Changed in: kernel-sru-workflow/security-signoff
   Status: In Progress => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1788773

Title:
  linux-snapdragon: 4.4.0-1100.105 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1788773/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1791725] [NEW] linux-aws: -proposed tracker

2018-09-10 Thread Kleber Sacilotto de Souza
Public bug reported:

This bug is for tracking the  upload package. This
bug will contain status and testing results related to that upload.

For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
kernel-stable-master-bug: 1791719

** Affects: kernel-sru-workflow
 Importance: Medium
 Status: In Progress

** Affects: kernel-sru-workflow/automated-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/certification-testing
 Importance: Medium
 Assignee: Canonical Hardware Certification (canonical-hw-cert)
 Status: Invalid

** Affects: kernel-sru-workflow/prepare-package
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/prepare-package-meta
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/promote-to-proposed
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-security
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-updates
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/regression-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/security-signoff
 Importance: Medium
 Assignee: Canonical Security Team (canonical-security)
 Status: New

** Affects: kernel-sru-workflow/snap-release-to-beta
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/snap-release-to-candidate
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/snap-release-to-edge
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/snap-release-to-stable
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/upload-to-ppa
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/verification-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: linux-aws (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux-aws (Ubuntu Bionic)
 Importance: Medium
 Status: Confirmed


** Tags: bionic kernel-release-tracking-bug kernel-release-tracking-bug-live 
kernel-sru-cycle-2018.09.10 kernel-sru-derivative-of-1791719

** Tags added: kernel-release-tracking-bug

** Tags added: kernel-release-tracking-bug-live

** Also affects: linux-aws (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Tags added: bionic

** Changed in: linux-aws (Ubuntu Bionic)
   Status: New => Confirmed

** Also affects: kernel-sru-workflow/automated-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/certification-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-proposed
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-security
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-updates
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/regression-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/security-signoff
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/snap-release-to-beta
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/snap-release-to-candidate
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/snap-release-to-edge
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/snap-release-to-stable
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/upload-to-ppa
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/verification-testing
   Importance: Undecided
   Status: New

** Changed in: kernel-sru-workflow/automated-testing
   Importance: Undecided 

[Bug 1788768] Re: linux-lts-xenial: 4.4.0-135.161~14.04.1 -proposed tracker

2018-09-10 Thread Steve Beattie
No USN needed

** Changed in: kernel-sru-workflow/security-signoff
   Status: In Progress => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1788768

Title:
  linux-lts-xenial: 4.4.0-135.161~14.04.1 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1788768/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1788563] Re: L1TF mitigation not effective in some CPU and RAM combinations

2018-09-10 Thread Joseph Salisbury
** Changed in: linux (Ubuntu Cosmic)
   Status: Triaged => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1788563

Title:
  L1TF mitigation not effective in some CPU and RAM combinations

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1788563/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1791740] [NEW] linux-hwe: -proposed tracker

2018-09-10 Thread Kleber Sacilotto de Souza
Public bug reported:

This bug is for tracking the  upload package. This
bug will contain status and testing results related to that upload.

For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
kernel-stable-master-bug: 1791719

** Affects: kernel-sru-workflow
 Importance: Medium
 Status: In Progress

** Affects: kernel-sru-workflow/automated-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/certification-testing
 Importance: Medium
 Assignee: Canonical Hardware Certification (canonical-hw-cert)
 Status: New

** Affects: kernel-sru-workflow/prepare-package
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/prepare-package-meta
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/prepare-package-signed
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/promote-to-proposed
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-security
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-updates
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/regression-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/security-signoff
 Importance: Medium
 Assignee: Canonical Security Team (canonical-security)
 Status: New

** Affects: kernel-sru-workflow/upload-to-ppa
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/verification-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: linux-hwe (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux-hwe (Ubuntu Xenial)
 Importance: Medium
 Status: Confirmed


** Tags: kernel-release-tracking-bug kernel-release-tracking-bug-live 
kernel-sru-backport-of-1791719 kernel-sru-cycle-2018.09.10 xenial

** Tags added: kernel-release-tracking-bug

** Tags added: kernel-release-tracking-bug-live

** Also affects: linux-hwe (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Tags added: xenial

** Changed in: linux-hwe (Ubuntu Xenial)
   Status: New => Confirmed

** Also affects: kernel-sru-workflow/automated-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/certification-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package-signed
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-proposed
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-security
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-updates
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/regression-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/security-signoff
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/upload-to-ppa
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/verification-testing
   Importance: Undecided
   Status: New

** Changed in: kernel-sru-workflow/automated-testing
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/automated-testing
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/certification-testing
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/certification-testing
 Assignee: (unassigned) => Canonical Hardware Certification 
(canonical-hw-cert)

** Changed in: kernel-sru-workflow/prepare-package
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: (unassigned) => Canonical Kernel Team 

[Bug 1791744] [NEW] linux-hwe-edge: -proposed tracker

2018-09-10 Thread Kleber Sacilotto de Souza
Public bug reported:

This bug is for tracking the  upload package. This
bug will contain status and testing results related to that upload.

For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
kernel-stable-master-bug: 1791719

** Affects: kernel-sru-workflow
 Importance: Medium
 Status: In Progress

** Affects: kernel-sru-workflow/automated-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/certification-testing
 Importance: Medium
 Assignee: Canonical Hardware Certification (canonical-hw-cert)
 Status: Invalid

** Affects: kernel-sru-workflow/prepare-package
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/prepare-package-meta
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/promote-to-proposed
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-security
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-updates
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/regression-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/security-signoff
 Importance: Medium
 Assignee: Canonical Security Team (canonical-security)
 Status: New

** Affects: kernel-sru-workflow/upload-to-ppa
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/verification-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: linux-hwe-edge (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux-hwe-edge (Ubuntu Xenial)
 Importance: Medium
 Status: Confirmed


** Tags: kernel-release-tracking-bug kernel-release-tracking-bug-live 
kernel-sru-backport-of-1791719 kernel-sru-cycle-2018.09.10 xenial

** Tags added: kernel-release-tracking-bug

** Tags added: kernel-release-tracking-bug-live

** Also affects: linux-hwe-edge (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Tags added: xenial

** Changed in: linux-hwe-edge (Ubuntu Xenial)
   Status: New => Confirmed

** Also affects: kernel-sru-workflow/automated-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/certification-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-proposed
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-security
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-updates
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/regression-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/security-signoff
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/upload-to-ppa
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/verification-testing
   Importance: Undecided
   Status: New

** Changed in: kernel-sru-workflow/automated-testing
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/automated-testing
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/certification-testing
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/certification-testing
 Assignee: (unassigned) => Canonical Hardware Certification 
(canonical-hw-cert)

** Changed in: kernel-sru-workflow/certification-testing
   Status: New => Invalid

** Changed in: kernel-sru-workflow/prepare-package
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/promote-to-proposed
   Importance: Undecided => Medium

** Changed in: 

[Bug 1791080] Re: Xenial update to 4.4.144 stable release

2018-09-10 Thread Kleber Sacilotto de Souza
** Changed in: linux (Ubuntu Xenial)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1791080

Title:
  Xenial update to 4.4.144 stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1791080/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1788762] Re: linux: 3.2.0-135.181 -proposed tracker

2018-09-10 Thread Brad Figg
** Changed in: kernel-sru-workflow/promote-to-security
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/promote-to-updates
   Status: New => Confirmed

** Tags removed: block-proposed-precise

** Tags removed: block-proposed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1788762

Title:
  linux: 3.2.0-135.181 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1788762/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1791336] Re: jerky stuttering playback since updating to 18.04

2018-09-10 Thread pleabargain
FWIW.
ALL video files stutter but NOT the audio. Audio is fine.

I'm getting a lot of messages about

main input debug: Creating an input for preparsing

is there a way of suppressing or telling VLC NOT to preparse?

---
I got a bunch of this:
[h264 @ 0x7f9fc8cb27c0] Slice 0 param buffer (3128 bytes) is 0x801.
[h264 @ 0x7f9fc8cb27c0] Slice 0 data buffer (26 bytes) is 0x804.
[h264 @ 0x7f9fc8cb27c0] Decode to surface 0x410.
[h264 @ 0x7f9fc8cce8a0] nal_unit_type: 1, nal_ref_idc: 2
[h264 @ 0x7f9fc8cce8a0] Param buffer (type 0, 672 bytes) is 0x803.
[h264 @ 0x7f9fc8cce8a0] Param buffer (type 1, 240 bytes) is 0x801.
[h264 @ 0x7f9fc8cce8a0] Slice 0 param buffer (3128 bytes) is 0x802.
[h264 @ 0x7f9fc8cce8a0] Slice 0 data buffer (19 bytes) is 0x800.
[h264 @ 0x7f9fc8cce8a0] Decode to surface 0x40d.
[h264 @ 0x7f9fc8ceaa80] nal_unit_type: 1, nal_ref_idc: 0
[h264 @ 0x7f9fc8ceaa80] Param buffer (type 0, 672 bytes) is 0x804.
[h264 @ 0x7f9fc8ceaa80] Param buffer (type 1, 240 bytes) is 0x802.
[h264 @ 0x7f9fc8ceaa80] Slice 0 param buffer (3128 bytes) is 0x801.
[h264 @ 0x7f9fc8ceaa80] Slice 0 data buffer (17 bytes) is 0x803.
[h264 @ 0x7f9fc8ceaa80] Decode to surface 0x404.
[h264 @ 0x7f9fc8c4da80] nal_unit_type: 1, nal_ref_idc: 0
[h264 @ 0x7f9fc8c4da80] Param buffer (type 0, 672 bytes) is 0x803.
[h264 @ 0x7f9fc8c4da80] Param buffer (type 1, 240 bytes) is 0x801.
[h264 @ 0x7f9fc8c4da80] Slice 0 param buffer (3128 bytes) is 0x802.
[h264 @ 0x7f9fc8c4da80] Slice 0 data buffer (17 bytes) is 0x804.
[h264 @ 0x7f9fc8c4da80] Decode to surface 0x408.
[h264 @ 0x7f9fc8c2b100] nal_unit_type: 1, nal_ref_idc: 2
[h264 @ 0x7f9fc8c2b100] Param buffer (type 0, 672 bytes) is 0x804.
[h264 @ 0x7f9fc8c2b100] Param buffer (type 1, 240 bytes) is 0x802.
[h264 @ 0x7f9fc8c2b100] Slice 0 param buffer (3128 bytes) is 0x801.
[h264 @ 0x7f9fc8c2b100] Slice 0 data buffer (26 bytes) is 0x803.
[h264 @ 0x7f9fc8c2b100] Decode to surface 0x40e.
[h264 @ 0x7f9fc8cb27c0] nal_unit_type: 1, nal_ref_idc: 2
[h264 @ 0x7f9fc8cb27c0] Param buffer (type 0, 672 bytes) is 0x800.
[h264 @ 0x7f9fc8cb27c0] Param buffer (type 1, 240 bytes) is 0x801.
[h264 @ 0x7f9fc8cb27c0] Slice 0 param buffer (3128 bytes) is 0x802.
[h264 @ 0x7f9fc8cb27c0] Slice 0 data buffer (19 bytes) is 0x804.
[h264 @ 0x7f9fc8cb27c0] Decode to surface 0x40a.
[h264 @ 0x7f9fc8cce8a0] nal_unit_type: 1, nal_ref_idc: 0
[h264 @ 0x7f9fc8cce8a0] Param buffer (type 0, 672 bytes) is 0x803.
[h264 @ 0x7f9fc8cce8a0] Param buffer (type 1, 240 bytes) is 0x802.
[h264 @ 0x7f9fc8cce8a0] Slice 0 param buffer (3128 bytes) is 0x801.
[h264 @ 0x7f9fc8cce8a0] Slice 0 data buffer (17 bytes) is 0x800.
[h264 @ 0x7f9fc8cce8a0] Decode to surface 0x406.
[h264 @ 0x7f9fc8ceaa80] nal_unit_type: 1, nal_ref_idc: 0
[h264 @ 0x7f9fc8ceaa80] Param buffer (type 0, 672 bytes) is 0x800.
[h264 @ 0x7f9fc8ceaa80] Param buffer (type 1, 240 bytes) is 0x801.
[h264 @ 0x7f9fc8ceaa80] Slice 0 param buffer (3128 bytes) is 0x802.
[h264 @ 0x7f9fc8ceaa80] Slice 0 data buffer (17 bytes) is 0x803.
[h264 @ 0x7f9fc8ceaa80] Decode to surface 0x409.
[h264 @ 0x7f9fc8c4da80] nal_unit_type: 1, nal_ref_idc: 2
[h264 @ 0x7f9fc8c4da80] Param buffer (type 0, 672 bytes) is 0x803.
[h264 @ 0x7f9fc8c4da80] Param buffer (type 1, 240 bytes) is 0x802.
[h264 @ 0x7f9fc8c4da80] Slice 0 param buffer (3128 bytes) is 0x801.
[h264 @ 0x7f9fc8c4da80] Slice 0 data buffer (25 bytes) is 0x800.
[h264 @ 0x7f9fc8c4da80] Decode to surface 0x411.
[h264 @ 0x7f9fc8c2b100] nal_unit_type: 1, nal_ref_idc: 2
[h264 @ 0x7f9fc8c2b100] Param buffer (type 0, 672 bytes) is 0x804.
[h264 @ 0x7f9fc8c2b100] Param buffer (type 1, 240 bytes) is 0x801.
[h264 @ 0x7f9fc8c2b100] Slice 0 param buffer (3128 bytes) is 0x802.
[h264 @ 0x7f9fc8c2b100] Slice 0 data buffer (19 bytes) is 0x803.
[h264 @ 0x7f9fc8c2b100] Decode to surface 0x40c.
[h264 @ 0x7f9fc8cb27c0] nal_unit_type: 1, nal_ref_idc: 0
[h264 @ 0x7f9fc8cb27c0] Param buffer (type 0, 672 bytes) is 0x800.
[h264 @ 0x7f9fc8cb27c0] Param buffer (type 1, 240 bytes) is 0x802.
[h264 @ 0x7f9fc8cb27c0] Slice 0 param buffer (3128 bytes) is 0x801.
[h264 @ 0x7f9fc8cb27c0] Slice 0 data buffer (17 bytes) is 0x804.
[h264 @ 0x7f9fc8cb27c0] Decode to surface 0x405.
[h264 @ 0x7f9fc8cce8a0] nal_unit_type: 1, nal_ref_idc: 0
[h264 @ 0x7f9fc8cce8a0] Param buffer (type 0, 672 bytes) is 0x804.
[h264 @ 0x7f9fc8cce8a0] Param buffer (type 1, 240 bytes) is 0x801.
[h264 @ 0x7f9fc8cce8a0] Slice 0 param buffer (3128 bytes) is 0x802.
[h264 @ 0x7f9fc8cce8a0] Slice 0 data buffer (17 bytes) is 0x800.
[h264 @ 0x7f9fc8cce8a0] Decode to surface 0x407.
[h264 @ 0x7f9fc8ceaa80] nal_unit_type: 1, nal_ref_idc: 2
[h264 @ 0x7f9fc8ceaa80] Param buffer (type 0, 672 bytes) is 0x800.
[h264 @ 0x7f9fc8ceaa80] Param buffer (type 1, 240 bytes) is 0x802.
[h264 @ 

[Bug 1788761] Re: linux-hwe-edge: 4.15.0-34.37~16.04.1 -proposed tracker

2018-09-10 Thread Brad Figg
** Changed in: kernel-sru-workflow/promote-to-security
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/promote-to-updates
   Status: New => Confirmed

** Tags removed: block-proposed-xenial

** Tags removed: block-proposed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1788761

Title:
  linux-hwe-edge: 4.15.0-34.37~16.04.1 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1788761/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1788748] Re: linux-oem: 4.15.0-1018.21 -proposed tracker

2018-09-10 Thread Brad Figg
** Changed in: kernel-sru-workflow/promote-to-security
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/promote-to-updates
   Status: New => Confirmed

** Tags removed: block-proposed-bionic

** Tags removed: block-proposed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1788748

Title:
  linux-oem: 4.15.0-1018.21 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1788748/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1791650] Re: python-pandas has missing dependency

2018-09-10 Thread Hans Joachim Desserud
*** This bug is a duplicate of bug 1787280 ***
https://bugs.launchpad.net/bugs/1787280

Thank you for taking the time to report this bug and helping to make
Ubuntu better. This particular bug has already been reported and is a
duplicate of bug 1787280, so it is being marked as such. Please look at
the other bug report to see if there is any missing information that you
can provide, or to see if there is a workaround for the bug.
Additionally, any further discussion regarding the bug should occur in
the other report. When reporting bugs in the future please use apport by
using 'ubuntu-bug' and the name of the package affected.

** This bug has been marked a duplicate of bug 1787280
   python3-pandas-lib missing in armhf version

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1791650

Title:
  python-pandas has missing dependency

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/pandas/+bug/1791650/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1651660] Re: package python-samba 2:4.3.11+dfsg-0ubuntu0.16.04.1 failed to install/upgrade: subprocess new pre-removal script returned error exit status 1

2018-09-10 Thread Andreas Hasenack
Hi Kim,

sorry for being unclear. I meant for people affected by this bug to try
to run this command, which is what the package does in its post
installation procedure:

pycompile -p python-samba

On a clean xenial install, that does not fail. If it fails for someone,
it means a non-standard python version is somehow being invoked.

-- 
You received this bug notification because you are a member of Ubuntu
Server, which is subscribed to samba in Ubuntu.
https://bugs.launchpad.net/bugs/1651660

Title:
  package python-samba 2:4.3.11+dfsg-0ubuntu0.16.04.1 failed to
  install/upgrade: subprocess new pre-removal script returned error exit
  status 1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/samba/+bug/1651660/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1771124] Re: [SRU] libpcl cflags -march=native -msse4.2 makes user-compiled programs crash

2018-09-10 Thread Gianfranco Costamagna via ubuntu-bugs
** Summary changed:

- libpcl cflags -march=native -msse4.2 makes user-compiled programs crash
+ [SRU] libpcl cflags -march=native -msse4.2 makes user-compiled programs crash

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1771124

Title:
  [SRU] libpcl cflags -march=native -msse4.2 makes user-compiled
  programs crash

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/pcl/+bug/1771124/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1791373] Re: [FFe] Update gnome-terminal to 3.30.0 and vte to 0.54

2018-09-10 Thread Treviño
Yeah, I was aware I had to do these steps, just didn't had the time to
finish it last friday, but I wanted the bug number to add it to the
debian/changelog :).

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1791373

Title:
  [FFe] Update gnome-terminal to 3.30.0 and vte to 0.54

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gnome-terminal/+bug/1791373/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1771124] Re: [SRU] libpcl cflags -march=native -msse4.2 makes user-compiled programs crash

2018-09-10 Thread Gianfranco Costamagna via ubuntu-bugs
** Description changed:

- in /usr/lib/x86_64-linux-gnu/cmake/pcl/PCLConfig.cmake, line 780, the cflags 
for PCL are defined like this:  
+ [ Impact ]
+ * It is currently impossible to use the library, without making programs that 
crash during startup
+ 
+ [ Test case ]
+ * Attached and in Other info section
+ 
+ [ Regression Potential ]
+ * Fix is uploaded in cosmic, waiting for build/migration
+ 
+ [ Other Info ]
+ in /usr/lib/x86_64-linux-gnu/cmake/pcl/PCLConfig.cmake, line 780, the cflags 
for PCL are defined like this:
  list(APPEND PCL_DEFINITIONS  -march=native -msse4.2 -mfpmath=sse  )
  
  however, when using -march=native -msse4.2, even simple user-compiled
  programs crash in eigen's handmade_aligned_free. I attached a minimal
  testcase for this (the program crashes on ubuntu artful and bionic, but
  not on zesty). Problem was on a dell xps13 (since -march=native is
  hardware-dependent, on some systems the problem might not be
  reproducible)
  
  see also this email thread http://www.pcl-users.org/Segfaults-in-eigen-s
  -handmade-aligned-free-on-ubuntu-artful-td4045237.html
  
  CMakeLists.txt for the program in attach:
  
  cmake_minimum_required(VERSION 2.8)
  project(crashdemo)
  find_package(Boost 1.54 REQUIRED COMPONENTS filesystem)
  include_directories(${Boost_INCLUDE_DIRS})
  link_directories(${Boost_LIBRARY_DIRS})
  set(OUR_Boost_LIBRARIES ${Boost_LIBRARIES})
  find_package(PCL 1.8 REQUIRED COMPONENTS common io segmentation visualization 
filters)
  add_definitions(${PCL_DEFINITIONS})
  include_directories(${PCL_INCLUDE_DIRS})
  link_directories(${PCL_LIBRARY_DIRS})
  add_executable(crasher
-   src/crasher.cpp
+  src/crasher.cpp
  )
  target_link_libraries(crasher
-   ${OUR_Boost_LIBRARIES}
-   ${Boost_LIBRARIES}
-   ${PCL_LIBRARIES}
+  ${OUR_Boost_LIBRARIES}
+  ${Boost_LIBRARIES}
+  ${PCL_LIBRARIES}
  )
  
  ProblemType: Bug
  DistroRelease: Ubuntu 18.04
  Package: libpcl-dev 1.8.1+dfsg1-2ubuntu2
  ProcVersionSignature: Ubuntu 4.15.0-20.21-generic 4.15.17
  Uname: Linux 4.15.0-20-generic x86_64
  ApportVersion: 2.20.9-0ubuntu7
  Architecture: amd64
  CurrentDesktop: GNOME
  Date: Mon May 14 15:18:46 2018
  InstallationDate: Installed on 2016-10-23 (567 days ago)
  InstallationMedia: Ubuntu 16.10 "Yakkety Yak" - Release amd64 (20161012.2)
  SourcePackage: pcl
  UpgradeStatus: Upgraded to bionic on 2018-05-09 (4 days ago)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1771124

Title:
  [SRU] libpcl cflags -march=native -msse4.2 makes user-compiled
  programs crash

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/pcl/+bug/1771124/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1791675] [NEW] failed to connect to '/run/xpra/system':

2018-09-10 Thread Hadmut Danisch
Public bug reported:

Hi,

I just tried to use xpra for the first time after upgrading to 18.04.
Seems to have problems with the systemd structure (tested on different
machines):


$ xpra start :7
Warning: cannot use the system proxy for 'start' subcommand,
 failed to connect to '/run/xpra/system':
 [Errno 2] No such file or directory


It does not start. On a server machine the log file says:


++) Using config file: "/etc/xpra/xorg.conf"
(==) Using system config directory "/usr/share/X11/xorg.conf.d"
2018-09-10 15:36:25,040 created unix domain socket: 
/run/user/1000/xpra/finnland1-107ESC[0m
2018-09-10 15:36:25,040 created unix domain socket: 
/home/hadmut/.xpra/finnland1-107ESC[0m
2018-09-10 15:36:25,041 created unix domain socket: 
/run/xpra/finnland1-107ESC[0m
/bin/sh: 1: dbus-launch: not found
dbus-launch failed to start using command 'dbus-launch --close-stderr':

 exit code is 127


On a desktop machine it says:

/usr/lib/xorg/Xorg.wrap: Only console users are allowed to run the X server
2018-09-10 15:38:12,624 
2018-09-10 15:38:12,625 Xvfb command has terminated! xpra cannot continue
2018-09-10 15:38:12,625  if the display is already running, try a different one,
2018-09-10 15:38:12,625  or use the --use-display flag
2018-09-10 15:38:12,626 
2018-09-10 15:38:12,627 killing xvfb with pid 27213
2018-09-10 15:38:12,629 failed to kill xvfb process with pid 27213:
2018-09-10 15:38:12,629  [Errno 3] No such process

ProblemType: Bug
DistroRelease: Ubuntu 18.04
Package: xpra 2.1.3+dfsg-1ubuntu1
ProcVersionSignature: Ubuntu 4.15.0-33.36-generic 4.15.18
Uname: Linux 4.15.0-33-generic x86_64
NonfreeKernelModules: zfs zunicode zavl icp zcommon znvpair
ApportVersion: 2.20.9-0ubuntu7.3
Architecture: amd64
CurrentDesktop: LXDE
Date: Mon Sep 10 15:28:34 2018
InstallationDate: Installed on 2018-04-30 (133 days ago)
InstallationMedia: Lubuntu 18.04 LTS "Bionic Beaver" - Release amd64 (20180426)
SourcePackage: xpra
UpgradeStatus: No upgrade log present (probably fresh install)

** Affects: xpra (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: amd64 apport-bug bionic

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1791675

Title:
  failed to connect to '/run/xpra/system':

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xpra/+bug/1791675/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1790601] Re: Ubuntu18.10 - Update libocxl to version 1.1

2018-09-10 Thread Andrew Cloke
We're now past the Feature Freeze for 18.10. As this is not an urgent
issue, we would plan to pick up this new version for 19.04.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1790601

Title:
  Ubuntu18.10 - Update libocxl to version 1.1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-power-systems/+bug/1790601/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1791407] Re: Thinkpad L570 UEFI destroyed after BIOS update

2018-09-10 Thread Mario Limonciello
** Bug watch added: github.com/hughsie/lvfs-website/issues #163
   https://github.com/hughsie/lvfs-website/issues/163

** Also affects: fwupd via
   https://github.com/hughsie/lvfs-website/issues/163
   Importance: Unknown
   Status: Unknown

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1791407

Title:
  Thinkpad L570 UEFI destroyed after BIOS update

To manage notifications about this bug go to:
https://bugs.launchpad.net/fwupd/+bug/1791407/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1651660] Re: package python-samba 2:4.3.11+dfsg-0ubuntu0.16.04.1 failed to install/upgrade: subprocess new pre-removal script returned error exit status 1

2018-09-10 Thread Geokimbo
Nope

kim@T610:/usr/lib/python2.7$ pycompile -p python-samba
Traceback (most recent call last):
  File "/usr/bin/pycompile", line 26, in 
import logging
  File "/usr/lib/python2.7/logging/__init__.py", line 26, in 
import sys, os, time, cStringIO, traceback, warnings, weakref, collections
  File "/usr/lib/python2.7/weakref.py", line 14, in 
from _weakref import (
ImportError: cannot import name _remove_dead_weakref


This is after I copied back the original version of weakref.py as in step 4 
above.

However my fix above appears to work so I'm happy for the moment.

Cheers
Kim

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1651660

Title:
  package python-samba 2:4.3.11+dfsg-0ubuntu0.16.04.1 failed to
  install/upgrade: subprocess new pre-removal script returned error exit
  status 1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/samba/+bug/1651660/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1791407] Re: Thinkpad L570 UEFI destroyed after BIOS update

2018-09-10 Thread Federico Foschini
Sorry for the double comment.
I'm not sure if this is a fault of fwupd or the fact that lenovo released a 
fault firmware; anyway I think Ubuntu should not push firmware updates along 
normal system updates.

Bios updates are very dangerous (as shown in this bug-report) and even
Lenovo says on their official documentation to NOT update the bios
unless your system isn't working as expected.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1791407

Title:
  Thinkpad L570 UEFI destroyed after BIOS update

To manage notifications about this bug go to:
https://bugs.launchpad.net/fwupd/+bug/1791407/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1791407] Re: Thinkpad L570 UEFI destroyed after BIOS update

2018-09-10 Thread Bug Watch Updater
** Changed in: fwupd
   Status: Unknown => New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1791407

Title:
  Thinkpad L570 UEFI destroyed after BIOS update

To manage notifications about this bug go to:
https://bugs.launchpad.net/fwupd/+bug/1791407/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1790636] Re: Watchdog CPU:19 Hard LOCKUP when kernel crash was triggered

2018-09-10 Thread Manoj Iyer
** Changed in: linux (Ubuntu)
   Status: New => Fix Committed

** Changed in: ubuntu-power-systems
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1790636

Title:
  Watchdog CPU:19 Hard LOCKUP when kernel crash was triggered

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-power-systems/+bug/1790636/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1788747] Re: linux-raspi2: 4.15.0-1022.24 -proposed tracker

2018-09-10 Thread Steve Beattie
** Changed in: kernel-sru-workflow/security-signoff
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1788747

Title:
  linux-raspi2: 4.15.0-1022.24 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1788747/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1790901] Re: How to use s390x pxelinux style network booting from qemu 3.0 in bionic

2018-09-10 Thread  Christian Ehrhardt 
You are the tftp/pxelinux experts more than I am.
I follow our tftp and libvirt setup as in [1]

But instead of building a complex single purpose pxelinux.0

All the new "code" youneed is actually inside that boot image.
So no need to build huge things, instead replace
  /usr/share/qemu/s390-netboot.img
with the one from upstream
  
https://git.qemu.org/?p=qemu.git;a=blob_plain;f=pc-bios/s390-netboot.img;hb=HEAD

This works Bionics Qemu well.

Now I can now just use kernel/initrd and pxeconfig as "usual"
  $ sudo cp /boot/vmlinuz-4.15.0-33-generic /srv/tftp/
  $ sudo cp /boot/initrd.img-4.15.0-33-generic /srv/tftp/

Then I put this in my config for pxelinux:
$ cat pxelinux.cfg/default
label ubuntu
   kernel vmlinuz-4.15.0-33-generic
   initrd initrd.img-4.15.0-33-generic
   append root=/dev/vda1

Starting the guest from that:

$ virsh start netboot --console
Domain netboot started
Connected to domain netboot
Escape character is ^]
  Using MAC address: 52:54:00:1e:b5:2a
  Requesting information via DHCP: done
  Using IPv4 address: 192.168.122.222
  Using TFTP server: 192.168.122.1
  Bootfile name: 'pxelinux.0'
  Receiving data:  0 KBytes
  TFTP error: file not found: pxelinux.0
Trying pxelinux.cfg files...
  Receiving data:  0 KBytes
  TFTP: Received pxelinux.cfg/default (113 bytes)
Loading pxelinux.cfg entry 'ubuntu'
  Receiving data:  4292 KBytes
  TFTP: Received vmlinuz-4.15.0-33-generic (4292 KBytes)
  Receiving data:  16763 KBytes
  TFTP: Received initrd.img-4.15.0-33-generic (16763 KBytes)
Network loading done, starting kernel...

[0.425566] Linux version 4.15.0-33-generic (buildd@bos02-s390x-010) (gcc 
version 7.3.0 (Ubuntu 7.3.0-16ubuntu3)) #36-Ubuntu SMP Wed Aug 15 13:42:17 UTC 
2018 (Ubuntu 4.15.0-33.36-generic 4.15.18)
[0.425572] setup.289988: Linux is running under KVM in 64-bit mode

You know much better than I do how to control the PXE details.
I think this gets you going without massive PPAs/Backport needs at all right?

I will set "invalid" (as no source change is needed) and modify the
title a bit to match the solution.

I'll keep my test env up for the sprint so that we can try more if you need.
But actually I think you can start as-is by providing that extra ROM just as 
you would provide any other updated data file to the target you want to deploy 
to.

[1]: http://ubuntu-on-big-iron.blogspot.com/2017/12/pxe-netboot-kvm-
s390x.html

** Summary changed:

- Backporting s390x pxelinux style network booting from qemu 3.0 to bionic
+ How to use s390x pxelinux style network booting from qemu 3.0 in bionic

** Changed in: qemu (Ubuntu)
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1790901

Title:
  How to use s390x pxelinux style network booting from qemu 3.0 in
  bionic

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/qemu/+bug/1790901/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1791690] [NEW] nautilus crashed with SIGSEGV

2018-09-10 Thread Sosha
Public bug reported:

after turn on pc

ProblemType: Crash
DistroRelease: Ubuntu 18.10
Package: nautilus 1:3.26.4-0ubuntu3
ProcVersionSignature: Ubuntu 4.17.0-9.10-generic 4.17.17
Uname: Linux 4.17.0-9-generic x86_64
ApportVersion: 2.20.10-0ubuntu9
Architecture: amd64
CurrentDesktop: ubuntu:GNOME
Date: Mon Sep 10 18:52:31 2018
Disassembly: No registers.
ExecutablePath: /usr/bin/nautilus
GsettingsChanges: b'org.gnome.nautilus.window-state' b'geometry' 
b"'890x550+387+256'"
InstallationDate: Installed on 2018-09-10 (0 days ago)
InstallationMedia: Ubuntu 18.10 "Cosmic Cuttlefish" - Alpha amd64 (20180908)
ProcCmdline: /usr/bin/nautilus --gapplication-service
ProcEnviron:
 SHELL=/bin/bash
 XDG_RUNTIME_DIR=
 PATH=(custom, no user)
 LANG=en_US.UTF-8
Registers: The program has no registers now.
SegvAnalysis: Failure: invalid literal for int() with base 16: 'program'
Signal: 11
SourcePackage: nautilus
Stacktrace: No stack.
StacktraceTop:
 
ThreadStacktrace:
 
Title: nautilus crashed with SIGSEGV
UpgradeStatus: No upgrade log present (probably fresh install)
UserGroups: adm cdrom dip libvirt lpadmin plugdev sambashare sudo
usr_lib_nautilus:

** Affects: nautilus (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: amd64 apport-crash apport-failed-retrace cosmic

** Information type changed from Private to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1791690

Title:
  nautilus crashed with SIGSEGV

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/nautilus/+bug/1791690/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1791373] Re: [FFe] Update gnome-terminal to 3.30.0 and vte to 0.54

2018-09-10 Thread Iain Lane
okey dokey

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1791373

Title:
  [FFe] Update gnome-terminal to 3.30.0 and vte to 0.54

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gnome-terminal/+bug/1791373/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1791489] Re: [FFe] Update to 3.30 - Sync from Debian

2018-09-10 Thread Jeremy Bicha
There is an icon name change but I filed
https://launchpad.net/bugs/1790754 for it.

Upstream lists these updates:
- Tweaks to the avatar selector UI
- Several fixes for the Flatpak build
- OARS content ratings

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1791489

Title:
  [FFe] Update to 3.30 - Sync from Debian

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gnome-contacts/+bug/1791489/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1791697] [NEW] pkcs #7 signature not signed with a trusted key

2018-09-10 Thread Sosha
Public bug reported:

after install nvidia-drivers-396 and virt-manager, virtualbox package and 
reboot system, in boot my system show to me this message: "pkcs #7 signature 
not signed with a trusted key" and system not booting(freeze maybe)
I purged Nvidia and Intel packages in recovery mode, The problem was resolved 
temporarily...
i use ubuntu 18.10 development branch, ubuntu is UEFI boot.

same problem when upgrading ubuntu 18.04 to 18.10. and now when
reinstalling ubuntu 18.10!

** Affects: ubuntu
 Importance: Undecided
 Status: New


** Tags: cosmic

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1791697

Title:
  pkcs #7 signature not signed with a trusted key

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+bug/1791697/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Re: [Bug 1773457] Re: Full-system encryption needs to be supported out-of-the-box including /boot and should not delete other installed systems

2018-09-10 Thread Phillip Susi
On 9/7/2018 3:06 AM, Paddy Landau wrote:
> If you are arguing that /boot shouldn't be encrypted, this is a direct
> contradiction of what you wrote earlier that malware can be loaded into
> the ESP; so why couldn't malware be loaded into /boot?

It can.  Encrypting it does not stop that.

> Please would you explain why you think that we should NOT encrypt /boot?
> The rest of us here are mystified; we should encrypt as much as possible
> in order to increase the barriers to black hats.

Because encryption does not prevent tampering.  It protects private
data.  With no private data in /boot, there is no need to protect it.

On 9/9/2018 5:40 PM, Javier Paniagua Laconich wrote:
> Well, not entirely correct. Encryption is also for tamper resistance, so it 
> is still very useful even if nothing in /boot is private.

No, it isn't.

This belief that encryption prevents tampering strikes me as similar to
people thinking that RAID is a substitute for backups.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1773457

Title:
  Full-system encryption needs to be supported out-of-the-box including
  /boot and should not delete other installed systems

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/grub2/+bug/1773457/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1791691] Re: PATH broken in systemd units

2018-09-10 Thread Dan Watkins
http://cloud-images.ubuntu.com/cosmic/20180906/unpacked/cosmic-
daily.changelog outlines the changed packages between the two images.  I
strongly suspect that the root cause of this is the systemd environment
generator added in the latest version of snapd, so I've added snapd to
this bug.

The changelog for the latest snapd version:

snapd (2.35.1+18.10) cosmic; urgency=medium

  *  New upstream release, LP: #1786438
- packaging/fedora: Merge changes from Fedora Dist-Git
- snapcraft: do not use --diry in mkversion.sh
- cmd: add systemd environment generator
- snap-confine: map /var/lib/extrausers into snaps mount-namespace
- tests: cherry-pick test fixes from master for 2.35
- systemd: do not run "snapd.snap-repair.service.in on firstboot
  bootstrap
- interfaces: retain order of inserted security backends
- selftest: detect if apparmor is unusable and error

 -- Michael Vogt   Mon, 03 Sep 2018 14:44:06
+0200

** Also affects: snapd (Ubuntu)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1791691

Title:
  PATH broken in systemd units

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-images/+bug/1791691/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1788563] Re: L1TF mitigation not effective

2018-09-10 Thread Joseph Salisbury
Bionic SRU request submitted:
https://lists.ubuntu.com/archives/kernel-team/2018-September/095319.html

** Description changed:

+ == SRU Justification ==
+ This regression has been reported in multiple bugs and affects Trust,
+ Xenial and Bionic.  All releases need different backports, so T and X
+ will be sent in separate SRU requests.
+ 
+ Due to this regression L1TF mitigation not effective.
+ 
+ == Fixes ==
+ 9df9516940a6 ("x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 
32bit")
+ b0a182f87568 ("x86/speculation/l1tf: Fix off-by-one error when warning that 
system has too much RAM")
+ cc51e5428ea5 ("x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+")
+ 
+ == Regression Potential ==
+ Low.  These are security fixes and have all been cc'd to upstream
+ stable, so they have had additional upstream review.
+ 
+ == Test Case ==
+ A test kernel was built with these patches and tested by the original bug 
reporter.
+ The bug reporter states the test kernel resolved the bug.
+ 
+ 
  Lenovo Thinkpad W530 system with 32 GB RAM
  
  dmesg | grep -i l1tf
  [0.038386] L1TF: System has more than MAX_PA/2 memory. L1TF mitigation 
not effective.
  [ 2652.469669] L1TF CPU bug present and SMT on, data leak possible. See 
CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html 
for details.
  
  Related:
  https://bugzilla.opensuse.org/show_bug.cgi?id=1105536
  
  ProblemType: Bug
  DistroRelease: Ubuntu 18.04
  Package: linux-image-4.15.0-32-generic 4.15.0-32.35
  ProcVersionSignature: Ubuntu 4.15.0-32.35-generic 4.15.18
  Uname: Linux 4.15.0-32-generic x86_64
  ApportVersion: 2.20.9-0ubuntu7.2
  Architecture: amd64
  AudioDevicesInUse:
-  USERPID ACCESS COMMAND
-  /dev/snd/controlC0:  pgera  2809 F pulseaudio
+  USERPID ACCESS COMMAND
+  /dev/snd/controlC0:  pgera  2809 F pulseaudio
  CurrentDesktop: Unity:Unity7:ubuntu
  Date: Thu Aug 23 03:38:40 2018
  InstallationDate: Installed on 2018-08-11 (12 days ago)
  InstallationMedia: Ubuntu 18.04.1 LTS "Bionic Beaver" - Release amd64 
(20180725)
  MachineType: LENOVO 24382LU
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-4.15.0-32-generic 
root=UUID=e2607c8a-4bd1-49fe-ad07-83046492fac5 ro quiet splash vt.handoff=1
  RelatedPackageVersions:
-  linux-restricted-modules-4.15.0-32-generic N/A
-  linux-backports-modules-4.15.0-32-generic  N/A
-  linux-firmware 1.173.1
+  linux-restricted-modules-4.15.0-32-generic N/A
+  linux-backports-modules-4.15.0-32-generic  N/A
+  linux-firmware 1.173.1
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 06/11/2018
  dmi.bios.vendor: LENOVO
  dmi.bios.version: G5ETB2WW (2.72 )
  dmi.board.asset.tag: Not Available
  dmi.board.name: 24382LU
  dmi.board.vendor: LENOVO
  dmi.board.version: NO DPK
  dmi.chassis.asset.tag: No Asset Information
  dmi.chassis.type: 10
  dmi.chassis.vendor: LENOVO
  dmi.chassis.version: Not Available
  dmi.modalias: 
dmi:bvnLENOVO:bvrG5ETB2WW(2.72):bd06/11/2018:svnLENOVO:pn24382LU:pvrThinkPadW530:rvnLENOVO:rn24382LU:rvrNODPK:cvnLENOVO:ct10:cvrNotAvailable:
  dmi.product.family: ThinkPad W530
  dmi.product.name: 24382LU
  dmi.product.version: ThinkPad W530
  dmi.sys.vendor: LENOVO

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1788563

Title:
  L1TF mitigation not effective in some CPU and RAM combinations

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1788563/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1739263] Re: Gnome terminal always open new window in gnome shell

2018-09-10 Thread Treviño
** Changed in: gnome-terminal (Ubuntu)
   Status: Triaged => In Progress

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1739263

Title:
  Gnome terminal always open new window in gnome shell

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gnome-terminal/+bug/1739263/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1788765] Re: linux-lts-trusty: 3.13.0-158.208~precise2 -proposed tracker

2018-09-10 Thread Brad Figg
** Changed in: kernel-sru-workflow/promote-to-security
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1788765

Title:
  linux-lts-trusty: 3.13.0-158.208~precise2 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1788765/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1788766] Re: linux: 4.4.0-135.161 -proposed tracker

2018-09-10 Thread Brad Figg
** Changed in: kernel-sru-workflow/promote-to-security
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1788766

Title:
  linux: 4.4.0-135.161 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1788766/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1788764] Re: linux: 3.13.0-158.208 -proposed tracker

2018-09-10 Thread Brad Figg
** Changed in: kernel-sru-workflow/promote-to-security
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1788764

Title:
  linux: 3.13.0-158.208 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1788764/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1788755] Re: linux-azure: 4.15.0-1023.24~16.04.1 -proposed tracker

2018-09-10 Thread Joshua R. Poulson via ubuntu-bugs
Testing looks good

** Changed in: kernel-sru-workflow/stakeholder-signoff
   Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1788755

Title:
  linux-azure: 4.15.0-1023.24~16.04.1 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1788755/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1788761] Re: linux-hwe-edge: 4.15.0-34.37~16.04.1 -proposed tracker

2018-09-10 Thread Steve Beattie
** Changed in: kernel-sru-workflow/security-signoff
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1788761

Title:
  linux-hwe-edge: 4.15.0-34.37~16.04.1 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1788761/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1791716] Re: FFe: sync java packages from Debian to fix OpenJDK 10/11 issues in Cosmic

2018-09-10 Thread Hans Joachim Desserud
** Tags added: upgrade-software-version

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1791716

Title:
  FFe: sync java packages from Debian to fix OpenJDK 10/11 issues in
  Cosmic

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/java-common/+bug/1791716/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1791552] Re: package gstreamer1.0-libav:amd64 1.14.1-1~ubuntu18.04.1 failed to install/upgrade: package is in a very bad inconsistent state; you should reinstall it before attempting configurati

2018-09-10 Thread Apport retracing service
** Tags removed: need-duplicate-check

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1791552

Title:
  package gstreamer1.0-libav:amd64 1.14.1-1~ubuntu18.04.1 failed to
  install/upgrade: package is in a very bad inconsistent state; you
  should  reinstall it before attempting configuration

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gst-libav1.0/+bug/1791552/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1791576] Re: package initramfs-tools 0.130ubuntu3.1 failed to install/upgrade: installed initramfs-tools package post-installation script subprocess returned error exit status 1

2018-09-10 Thread Apport retracing service
** Tags removed: need-duplicate-check

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1791576

Title:
  package initramfs-tools 0.130ubuntu3.1 failed to install/upgrade:
  installed initramfs-tools package post-installation script subprocess
  returned error exit status 1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/initramfs-tools/+bug/1791576/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1791642] Re: salt-minion won't start after upgrade to cosmic

2018-09-10 Thread Hans Joachim Desserud
** Bug watch added: Debian Bug tracker #896921
   https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=896921

** Also affects: salt (Debian) via
   https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=896921
   Importance: Unknown
   Status: Unknown

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1791642

Title:
  salt-minion won't start after upgrade to cosmic

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/salt/+bug/1791642/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1787090] Re: [AEP-bug] libnvdimm: Fix a bug that overwrites and corrupts user memory in an ARS_STATUS command

2018-09-10 Thread Joseph Salisbury
Commit 286e87718103acdf85f4ed323a37e4839a8a7c05 is now in the 18.10
kernel version: Ubuntu-4.18.0-8.9

** Changed in: linux (Ubuntu)
   Status: In Progress => Fix Released

** Changed in: linux (Ubuntu)
   Status: Fix Released => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1787090

Title:
  [AEP-bug] libnvdimm: Fix a bug that overwrites and corrupts user
  memory in an ARS_STATUS command

To manage notifications about this bug go to:
https://bugs.launchpad.net/intel/+bug/1787090/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1788751] Re: linux-azure: 4.15.0-1023.24 -proposed tracker

2018-09-10 Thread Joshua R. Poulson via ubuntu-bugs
Testing looks good

** Changed in: kernel-sru-workflow/stakeholder-signoff
   Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1788751

Title:
  linux-azure: 4.15.0-1023.24 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1788751/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1615612] Re: systemd-inhibit authentication ignored by suspend request

2018-09-10 Thread Theo Linkspfeifer
I have checked the Xfce bug tracker and found this report:

https://bugzilla.xfce.org/show_bug.cgi?id=10581

It describes the issue with the bad positioning of the authentication
window.

So, the problem in 18.04 is that the restart/logout/suspend dialog
remains visible/glitched after initiating the suspend process, correct?

** Bug watch added: Xfce Bugzilla #10581
   https://bugzilla.xfce.org/show_bug.cgi?id=10581

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1615612

Title:
  systemd-inhibit authentication ignored by suspend request

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xfce4-session/+bug/1615612/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1529460] Re: Update nautilus-python to latest upstream version - 1.2.x - migrate to Python 3

2018-09-10 Thread Bug Watch Updater
** Changed in: nautilus-python (Debian)
   Status: Unknown => New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1529460

Title:
  Update nautilus-python to latest upstream version - 1.2.x - migrate to
  Python 3

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/nautilus-python/+bug/1529460/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1791687] [NEW] package acpid 1:2.0.28-1ubuntu1 failed to install/upgrade: installed acpid package post-installation script subprocess returned error exit status 1

2018-09-10 Thread Wayne McRae
Public bug reported:

Upgrading from 16.04 LTS to 18.04 LTS using apt dist-upgrade.  Upgrade
failed to boot image 4.15.0-33-generic.  Had to revert to
4.4.0-134-generic to get to the desktop.

ProblemType: Package
DistroRelease: Ubuntu 18.04
Package: acpid 1:2.0.28-1ubuntu1
ProcVersionSignature: Ubuntu 4.4.0-134.160-generic 4.4.140
Uname: Linux 4.4.0-134-generic x86_64
ApportVersion: 2.20.9-0ubuntu7.3
AptOrdering:
 xscreensaver:amd64: Remove
 NULL: ConfigurePending
Architecture: amd64
Date: Mon Sep 10 14:28:26 2018
DpkgHistoryLog:
 Start-Date: 2018-09-10  14:28:18
 Remove: xscreensaver:amd64 (5.36-1ubuntu1)
ErrorMessage: installed acpid package post-installation script subprocess 
returned error exit status 1
InstallationDate: Installed on 2017-04-27 (500 days ago)
InstallationMedia: Ubuntu-Server 16.04.2 LTS "Xenial Xerus" - Release amd64 
(20170215.8)
Python3Details: /usr/bin/python3.6, Python 3.6.5, python3-minimal, 
3.6.5-3ubuntu1
PythonDetails: /usr/bin/python2.7, Python 2.7.15rc1, python-minimal, 
2.7.15~rc1-1
RelatedPackageVersions:
 dpkg 1.19.0.5ubuntu2
 apt  1.6.3ubuntu0.1
SourcePackage: acpid
Title: package acpid 1:2.0.28-1ubuntu1 failed to install/upgrade: installed 
acpid package post-installation script subprocess returned error exit status 1
UpgradeStatus: No upgrade log present (probably fresh install)

** Affects: acpid (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: amd64 apport-package bionic need-duplicate-check

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1791687

Title:
  package acpid 1:2.0.28-1ubuntu1 failed to install/upgrade: installed
  acpid package post-installation script subprocess returned error exit
  status 1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/acpid/+bug/1791687/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1791688] [NEW] package avahi-daemon 0.7-3.1ubuntu1.1 failed to install/upgrade: installed avahi-daemon package post-installation script subprocess returned error exit status 1

2018-09-10 Thread Wayne McRae
Public bug reported:

Upgrading from 16.0 LTS to 18.04 LTS using apt dist-upgrade.  Kernel
panic booting to 4.15.0-33-generic.  Had to revert to 4.4.0-134 to get
to desktop.

ProblemType: Package
DistroRelease: Ubuntu 18.04
Package: avahi-daemon 0.7-3.1ubuntu1.1
ProcVersionSignature: Ubuntu 4.4.0-134.160-generic 4.4.140
Uname: Linux 4.4.0-134-generic x86_64
ApportVersion: 2.20.9-0ubuntu7.3
AptOrdering:
 xscreensaver:amd64: Remove
 NULL: ConfigurePending
Architecture: amd64
Date: Mon Sep 10 14:28:26 2018
DpkgHistoryLog:
 Start-Date: 2018-09-10  14:28:18
 Remove: xscreensaver:amd64 (5.36-1ubuntu1)
ErrorMessage: installed avahi-daemon package post-installation script 
subprocess returned error exit status 1
InstallationDate: Installed on 2017-04-27 (500 days ago)
InstallationMedia: Ubuntu-Server 16.04.2 LTS "Xenial Xerus" - Release amd64 
(20170215.8)
Python3Details: /usr/bin/python3.6, Python 3.6.5, python3-minimal, 
3.6.5-3ubuntu1
PythonDetails: /usr/bin/python2.7, Python 2.7.15rc1, python-minimal, 
2.7.15~rc1-1
RelatedPackageVersions:
 dpkg 1.19.0.5ubuntu2
 apt  1.6.3ubuntu0.1
SourcePackage: avahi
Title: package avahi-daemon 0.7-3.1ubuntu1.1 failed to install/upgrade: 
installed avahi-daemon package post-installation script subprocess returned 
error exit status 1
UpgradeStatus: No upgrade log present (probably fresh install)

** Affects: avahi (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: amd64 apport-package bionic need-duplicate-check

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1791688

Title:
  package avahi-daemon 0.7-3.1ubuntu1.1 failed to install/upgrade:
  installed avahi-daemon package post-installation script subprocess
  returned error exit status 1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/avahi/+bug/1791688/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1785675] Re: Security fix: check if IOMMU page is contained in the pinned physical page

2018-09-10 Thread Manoj Iyer
** Changed in: linux (Ubuntu)
   Status: Triaged => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1785675

Title:
  Security fix: check if IOMMU page is contained in the pinned physical
  page

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-power-systems/+bug/1785675/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1788751] Re: linux-azure: 4.15.0-1023.24 -proposed tracker

2018-09-10 Thread Brad Figg
** Changed in: kernel-sru-workflow/snap-release-to-candidate
   Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1788751

Title:
  linux-azure: 4.15.0-1023.24 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1788751/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1731417] Re: Installed network printer removed automatically when turned off

2018-09-10 Thread Xavier Bosch
I have the same problem in Ubuntu 18.04.1 with a Laserjet CP1025nw...
very annoying,,, is there a fix for that bug? How can I get it?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1731417

Title:
  Installed network printer removed automatically when turned off

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/cups-filters/+bug/1731417/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1791706] [NEW] /lib/systemd/systemd-journald:6:journal_file_append_data:journal_file_append_entry:write_to_journal:dispatch_message_real:server_dispatch_message

2018-09-10 Thread errors.ubuntu.com bug bridge
Public bug reported:

The Ubuntu Error Tracker has been receiving reports about a problem regarding 
systemd.  This problem was most recently seen with package version 
237-3ubuntu10.3, the problem page at 
https://errors.ubuntu.com/problem/82f6ccb214b5973176f89848a8f79045e422806c 
contains more details, including versions of packages affected, stacktrace or 
traceback, and individual crash reports.
If you do not have access to the Ubuntu Error Tracker and are a software 
developer, you can request it at http://forms.canonical.com/reports/.

** Affects: systemd (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: artful bionic cosmic kylin-15.04 vivid wily xenial yakkety zesty

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1791706

Title:
  /lib/systemd/systemd-
  
journald:6:journal_file_append_data:journal_file_append_entry:write_to_journal:dispatch_message_real:server_dispatch_message

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1791706/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1789471] Re: installation process crashed with this error

2018-09-10 Thread Phillip Susi
Can you run sudo efibootmgr -vv and post the output?

** Changed in: grub-installer (Ubuntu)
   Status: New => Incomplete

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1789471

Title:
  installation process crashed with this error

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/grub-installer/+bug/1789471/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1785434] Re: VLC under Wayland causes system freezes in fullscreen mode

2018-09-10 Thread Bjorn Padding
Me three. Intel Iris pro 5200. Xorg is fine. Wayland crashes on full
screen. Ubuntu 18.04.1. VLC 3.0.3. Wayland 2:1.19.6-1ubuntu4.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1785434

Title:
   VLC under Wayland causes system freezes in fullscreen mode

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/vlc/+bug/1785434/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1771124] Re: [SRU] libpcl cflags -march=native -msse4.2 makes user-compiled programs crash

2018-09-10 Thread Gianfranco Costamagna via ubuntu-bugs
without this patch I get a segfault

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1771124

Title:
  [SRU] libpcl cflags -march=native -msse4.2 makes user-compiled
  programs crash

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/pcl/+bug/1771124/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1791691] Re: PATH broken in systemd units

2018-09-10 Thread Dimitri John Ledkov
This is a security issue too.

** Information type changed from Public to Public Security

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1791691

Title:
  PATH broken in systemd units

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-images/+bug/1791691/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1789319] Re: Unable to load shimx64.efi using iPXE over UEFI

2018-09-10 Thread Phillip Susi
Isn't that just a workaround?  There is still an underlying bug in the
iPXE network driver isn't there?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1789319

Title:
  Unable to load shimx64.efi using iPXE over UEFI

To manage notifications about this bug go to:
https://bugs.launchpad.net/maas/+bug/1789319/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1791731] [NEW] linux-kvm: -proposed tracker

2018-09-10 Thread Kleber Sacilotto de Souza
Public bug reported:

This bug is for tracking the  upload package. This
bug will contain status and testing results related to that upload.

For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
kernel-stable-master-bug: 1791719

** Affects: kernel-sru-workflow
 Importance: Medium
 Status: In Progress

** Affects: kernel-sru-workflow/automated-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/certification-testing
 Importance: Medium
 Assignee: Canonical Hardware Certification (canonical-hw-cert)
 Status: Invalid

** Affects: kernel-sru-workflow/prepare-package
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/prepare-package-meta
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/promote-to-proposed
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-security
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-updates
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/regression-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/security-signoff
 Importance: Medium
 Assignee: Canonical Security Team (canonical-security)
 Status: New

** Affects: kernel-sru-workflow/upload-to-ppa
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/verification-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: linux-kvm (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux-kvm (Ubuntu Bionic)
 Importance: Medium
 Status: Confirmed


** Tags: bionic kernel-release-tracking-bug kernel-release-tracking-bug-live 
kernel-sru-cycle-2018.09.10 kernel-sru-derivative-of-1791719

** Tags added: kernel-release-tracking-bug

** Tags added: kernel-release-tracking-bug-live

** Also affects: linux-kvm (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Tags added: bionic

** Changed in: linux-kvm (Ubuntu Bionic)
   Status: New => Confirmed

** Also affects: kernel-sru-workflow/automated-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/certification-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-proposed
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-security
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-updates
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/regression-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/security-signoff
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/upload-to-ppa
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/verification-testing
   Importance: Undecided
   Status: New

** Changed in: kernel-sru-workflow/automated-testing
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/automated-testing
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/certification-testing
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/certification-testing
 Assignee: (unassigned) => Canonical Hardware Certification 
(canonical-hw-cert)

** Changed in: kernel-sru-workflow/certification-testing
   Status: New => Invalid

** Changed in: kernel-sru-workflow/prepare-package
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/promote-to-proposed
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/promote-to-proposed
 

[Bug 1791728] [NEW] linux-gcp: -proposed tracker

2018-09-10 Thread Kleber Sacilotto de Souza
Public bug reported:

This bug is for tracking the  upload package. This
bug will contain status and testing results related to that upload.

For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
kernel-stable-master-bug: 1791719

** Affects: kernel-sru-workflow
 Importance: Medium
 Status: In Progress

** Affects: kernel-sru-workflow/automated-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/certification-testing
 Importance: Medium
 Assignee: Canonical Hardware Certification (canonical-hw-cert)
 Status: Invalid

** Affects: kernel-sru-workflow/prepare-package
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/prepare-package-meta
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/prepare-package-signed
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/promote-to-proposed
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-security
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-updates
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/regression-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/security-signoff
 Importance: Medium
 Assignee: Canonical Security Team (canonical-security)
 Status: New

** Affects: kernel-sru-workflow/snap-release-to-beta
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/snap-release-to-candidate
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/snap-release-to-edge
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/snap-release-to-stable
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/upload-to-ppa
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/verification-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: linux-gcp (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux-gcp (Ubuntu Bionic)
 Importance: Medium
 Status: Confirmed


** Tags: bionic kernel-release-tracking-bug kernel-release-tracking-bug-live 
kernel-sru-cycle-2018.09.10 kernel-sru-derivative-of-1791719

** Tags added: kernel-release-tracking-bug

** Tags added: kernel-release-tracking-bug-live

** Also affects: linux-gcp (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Tags added: bionic

** Changed in: linux-gcp (Ubuntu Bionic)
   Status: New => Confirmed

** Also affects: kernel-sru-workflow/automated-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/certification-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package-signed
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-proposed
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-security
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-updates
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/regression-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/security-signoff
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/snap-release-to-beta
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/snap-release-to-candidate
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/snap-release-to-edge
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/snap-release-to-stable
   Importance: Undecided
   Status: New

** Also 

[Bug 1787649] Re: ubuntu-release-upgrader crashed with SystemError: E:Error, pkgProblemResolver::Resolve generated breaks, this may be caused by held packages.

2018-09-10 Thread Łukasz Zemczak
Hello errors.ubuntu.com, or anyone else affected,

Accepted ubuntu-release-upgrader into bionic-proposed. The package will
build now and be available at https://launchpad.net/ubuntu/+source
/ubuntu-release-upgrader/1:18.04.26 in a few hours, and then in the
-proposed repository.

Please help us by testing this new package.  See
https://wiki.ubuntu.com/Testing/EnableProposed for documentation on how
to enable and use -proposed.Your feedback will aid us getting this
update out to other Ubuntu users.

If this package fixes the bug for you, please add a comment to this bug,
mentioning the version of the package you tested and change the tag from
verification-needed-bionic to verification-done-bionic. If it does not
fix the bug for you, please add a comment stating that, and change the
tag to verification-failed-bionic. In either case, without details of
your testing we will not be able to proceed.

Further information regarding the verification process can be found at
https://wiki.ubuntu.com/QATeam/PerformingSRUVerification .  Thank you in
advance!

** Changed in: ubuntu-release-upgrader (Ubuntu Bionic)
   Status: In Progress => Fix Committed

** Tags added: verification-needed verification-needed-bionic

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1787649

Title:
  ubuntu-release-upgrader crashed with SystemError: E:Error,
  pkgProblemResolver::Resolve generated breaks, this may be caused by
  held packages.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-release-upgrader/+bug/1787649/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1788755] Re: linux-azure: 4.15.0-1023.24~16.04.1 -proposed tracker

2018-09-10 Thread Brad Figg
** Changed in: kernel-sru-workflow/promote-to-security
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/promote-to-updates
   Status: New => Confirmed

** Tags removed: block-proposed-xenial

** Tags removed: block-proposed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1788755

Title:
  linux-azure: 4.15.0-1023.24~16.04.1 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1788755/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1788760] Re: linux-hwe: 4.15.0-34.37~16.04.1 -proposed tracker

2018-09-10 Thread Brad Figg
** Changed in: kernel-sru-workflow/promote-to-security
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/promote-to-updates
   Status: New => Confirmed

** Tags removed: block-proposed-xenial

** Tags removed: block-proposed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1788760

Title:
  linux-hwe: 4.15.0-34.37~16.04.1 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1788760/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1788747] Re: linux-raspi2: 4.15.0-1022.24 -proposed tracker

2018-09-10 Thread Brad Figg
** Changed in: kernel-sru-workflow/promote-to-security
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/promote-to-updates
   Status: New => Confirmed

** Tags removed: block-proposed-bionic

** Tags removed: block-proposed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1788747

Title:
  linux-raspi2: 4.15.0-1022.24 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1788747/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1787280] Re: python3-pandas-lib missing in armhf version

2018-09-10 Thread Launchpad Bug Tracker
Status changed to 'Confirmed' because the bug affects multiple users.

** Changed in: pandas (Ubuntu)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1787280

Title:
  python3-pandas-lib missing in armhf version

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/pandas/+bug/1787280/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1787280] Re: python3-pandas-lib missing in armhf version

2018-09-10 Thread Hans Joachim Desserud
** Tags added: unmetdeps

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1787280

Title:
  python3-pandas-lib missing in armhf version

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/pandas/+bug/1787280/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1788753] Re: linux-kvm: 4.15.0-1021.21 -proposed tracker

2018-09-10 Thread Brad Figg
** Changed in: kernel-sru-workflow/promote-to-security
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/promote-to-updates
   Status: New => Confirmed

** Tags removed: block-proposed-bionic

** Tags removed: block-proposed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1788753

Title:
  linux-kvm: 4.15.0-1021.21 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1788753/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1670291] Re: Landscape: Upgrade 14.04.5 to 16.04.2 fails unable to reboot

2018-09-10 Thread Dimitri John Ledkov
Note to self, I wonder if:
https://github.com/systemd/systemd/commit/c68867da320de296917820e5a76e902a8a86be5a
https://github.com/systemd/systemd/commit/7f96539d45028650f2ba9452095473a9c455d84b

are related.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1670291

Title:
  Landscape: Upgrade 14.04.5 to 16.04.2 fails unable to reboot

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/landscape-client/+bug/1670291/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1788750] Re: linux-aws: 4.15.0-1021.21 -proposed tracker

2018-09-10 Thread Brad Figg
** Changed in: kernel-sru-workflow/promote-to-security
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/promote-to-updates
   Status: New => Confirmed

** Tags removed: block-proposed-bionic

** Tags removed: block-proposed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1788750

Title:
  linux-aws: 4.15.0-1021.21 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1788750/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1786229] Re: SRU 1.4 tracking bug

2018-09-10 Thread Launchpad Bug Tracker
This bug was fixed in the package ubuntu-image - 1.4+16.04ubuntu2

---
ubuntu-image (1.4+16.04ubuntu2) xenial; urgency=medium

  * Demote the qemu-user-static dependency to Suggests, modify the code to
gracefully handle the lack of qemu binaries for cross-compilation.
(LP:1788177)
  * Add missing information about UBUNTU_IMAGE_QEMU_USER_STATIC_PATH to the
manpage.
  * SRU tracking number LP: #1786229

ubuntu-image (1.4+16.04ubuntu1) xenial; urgency=medium

  * Add support for classic cross-compilation, add qemu-user-static as a
dependency.  (LP:1772061)
  * Work-around the API rate limit exceeded failures from github in the
haschangelog test case by re-writing it not to use python3-github anymore
and instead check for the PR trivial label manually.  (LP:1690081)
  * Work-around Permission denied errors printing to stderr whenever parted is
imported, causing some of our basic autopkgtests failing.  (LP:1775085)
  * Fix some coverage and autopkgtest failures per changes in the environment.
Switch to using deb-packaged voluptuous.  (LP:1782313)
  * Add the new connections: stanza to the gadget.yaml parser.  (LP:1780217)
  * SRU tracking number LP: #1786229

 -- Łukasz 'sil2100' Zemczak   Tue, 21 Aug
2018 15:25:59 +0200

** Changed in: ubuntu-image (Ubuntu Xenial)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1786229

Title:
  SRU 1.4 tracking bug

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-image/+bug/1786229/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1788744] Re: linux: 4.15.0-34.37 -proposed tracker

2018-09-10 Thread Brad Figg
** Changed in: kernel-sru-workflow/promote-to-security
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/promote-to-updates
   Status: New => Confirmed

** Tags removed: block-proposed-bionic

** Tags removed: block-proposed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1788744

Title:
  linux: 4.15.0-34.37 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1788744/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1788751] Re: linux-azure: 4.15.0-1023.24 -proposed tracker

2018-09-10 Thread Brad Figg
** Changed in: kernel-sru-workflow/promote-to-security
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/promote-to-updates
   Status: New => Confirmed

** Tags removed: block-proposed-bionic

** Tags removed: block-proposed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1788751

Title:
  linux-azure: 4.15.0-1023.24 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1788751/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1788752] Re: linux-gcp: 4.15.0-1019.20 -proposed tracker

2018-09-10 Thread Brad Figg
** Changed in: kernel-sru-workflow/promote-to-security
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/promote-to-updates
   Status: New => Confirmed

** Tags removed: block-proposed-bionic

** Tags removed: block-proposed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1788752

Title:
  linux-gcp: 4.15.0-1019.20 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1788752/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1529460] Re: Update nautilus-python to latest upstream version - 1.2.x - migrate to Python 3

2018-09-10 Thread Jeremy Bicha
** Tags added: upgrade-software-version

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1529460

Title:
  Update nautilus-python to latest upstream version - 1.2.x - migrate to
  Python 3

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/nautilus-python/+bug/1529460/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1791271] Re: FFe release 1.8.16

2018-09-10 Thread Launchpad Bug Tracker
This bug was fixed in the package network-manager-applet -
1.8.16-1ubuntu1

---
network-manager-applet (1.8.16-1ubuntu1) cosmic; urgency=low

  * Merge from Debian unstable. Remaining changes: (LP: #1791271)
- debian/control, debian/rules:
  + Drop gir1.2-nmgtk-1.0 as part of the libnm-gtk removal process
  + use libappindicator for now, it is tested and in main and the
new ayatana variant from Debian hasn't been reviewed yet.
  + Run dh_translations
- debian/control, debian/rules, debian/libnm-gtk*.symbols:
  + Add legacy libnm-gtk packages, until unity-control-center
is ported (see LP 1744619)
- Add lp341684_device_sensitive_disconnect_notify.patch:
  + Show correct notification messages for disconnect events, to be in
line with the other *connect*text patches.
- Add lp460144_correctly_update_notification.patch: cleaner notification
messages, and allow for messages to be updated instead of cleared.
- Add Have-the-appindicator-enabled-by-default.patch:
  + enable appindicator by default.
- Add applet-wifi-menu-before-vpn.patch:
  + Show Create New and Connect to Hidden wifi menu items with the other
Wifi items, rather than separated by the VPN menus.
- Allow-to-create-and-connect-to-Ad-Hoc-RSN-networks.patch:
  + Enable Ad-Hoc using WPA RSN
- Make-sure-the-behavior-for-policykit-restricted-acti.patch,
  Support-hiding-rather-than-desensitizing-disallowed-items.patch,
  + provide methods to desensitize and hide menu items which are useless
given the current policykit policy level of the user.

network-manager-applet (1.8.16-1) unstable; urgency=medium

  * New upstream version 1.8.16
  * Rebase patches
  * Add Build-Depends on mobile-broadband-provider-info.
This is required to get the database path at build time

network-manager-applet (1.8.14-1) unstable; urgency=medium

  * New upstream version 1.8.14
  * Rebase patches
  * Update install path for AppStream metadata files

network-manager-applet (1.8.12-2) unstable; urgency=medium

  * NMNetworkMenuItem: Don't double-free priv->dupes (Closes: #900869)

network-manager-applet (1.8.12-1) unstable; urgency=medium

  * New upstream version 1.8.12
  * Rebase patches
  * Update symbols file for libnma

 -- Didier Roche   Thu, 06 Sep 2018 12:31:31 +0200

** Changed in: network-manager-applet (Ubuntu)
   Status: Triaged => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1791271

Title:
  FFe release 1.8.16

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/network-manager-applet/+bug/1791271/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1791690] nautilus crashed with SIGSEGV

2018-09-10 Thread Apport retracing service
Stacktrace: No stack.
StacktraceSource:
 
StacktraceTop:
 
ThreadStacktrace:
 


** Tags added: apport-failed-retrace

** Tags removed: need-amd64-retrace

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1791690

Title:
  nautilus crashed with SIGSEGV

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/nautilus/+bug/1791690/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1788748] Re: linux-oem: 4.15.0-1018.21 -proposed tracker

2018-09-10 Thread Steve Beattie
** Changed in: kernel-sru-workflow/security-signoff
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1788748

Title:
  linux-oem: 4.15.0-1018.21 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1788748/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1791709] Re: systemd dependency loop with systemd-update-utmp.service

2018-09-10 Thread Tom
If there is any question about the systemd version being an in house
version. We only backported a bug fix from upstream. That being said it
might be a cause of the issue however we only had issues with auditd and
no other services, therefore we still think this bug is relevant.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1791709

Title:
  systemd dependency loop with systemd-update-utmp.service

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/auditd/+bug/1791709/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1791747] [NEW] linux-lts-xenial: -proposed tracker

2018-09-10 Thread Kleber Sacilotto de Souza
Public bug reported:

This bug is for tracking the  upload package. This
bug will contain status and testing results related to that upload.

For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
kernel-stable-master-bug: 1791745

** Affects: kernel-sru-workflow
 Importance: Medium
 Status: In Progress

** Affects: kernel-sru-workflow/automated-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/certification-testing
 Importance: Medium
 Assignee: Canonical Hardware Certification (canonical-hw-cert)
 Status: New

** Affects: kernel-sru-workflow/prepare-package
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/prepare-package-meta
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/prepare-package-signed
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/promote-to-proposed
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-security
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-updates
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/regression-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/security-signoff
 Importance: Medium
 Assignee: Canonical Security Team (canonical-security)
 Status: New

** Affects: kernel-sru-workflow/upload-to-ppa
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/verification-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: linux-lts-xenial (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux-lts-xenial (Ubuntu Trusty)
 Importance: Medium
 Status: Confirmed


** Tags: kernel-release-tracking-bug kernel-release-tracking-bug-live 
kernel-sru-backport-of-1791745 kernel-sru-cycle-2018.09.10 trusty

** Tags added: kernel-release-tracking-bug

** Tags added: kernel-release-tracking-bug-live

** Also affects: linux-lts-xenial (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Tags added: trusty

** Changed in: linux-lts-xenial (Ubuntu Trusty)
   Status: New => Confirmed

** Also affects: kernel-sru-workflow/automated-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/certification-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package-signed
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-proposed
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-security
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-updates
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/regression-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/security-signoff
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/upload-to-ppa
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/verification-testing
   Importance: Undecided
   Status: New

** Changed in: kernel-sru-workflow/automated-testing
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/automated-testing
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/certification-testing
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/certification-testing
 Assignee: (unassigned) => Canonical Hardware Certification 
(canonical-hw-cert)

** Changed in: kernel-sru-workflow/prepare-package
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: (unassigned) => 

[Bug 1791749] [NEW] linux-aws: -proposed tracker

2018-09-10 Thread Kleber Sacilotto de Souza
Public bug reported:

This bug is for tracking the  upload package. This
bug will contain status and testing results related to that upload.

For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
kernel-stable-master-bug: 1791745

** Affects: kernel-sru-workflow
 Importance: Medium
 Status: In Progress

** Affects: kernel-sru-workflow/automated-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/certification-testing
 Importance: Medium
 Assignee: Canonical Hardware Certification (canonical-hw-cert)
 Status: Invalid

** Affects: kernel-sru-workflow/prepare-package
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/prepare-package-meta
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/promote-to-proposed
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-security
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-updates
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/regression-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/security-signoff
 Importance: Medium
 Assignee: Canonical Security Team (canonical-security)
 Status: New

** Affects: kernel-sru-workflow/snap-release-to-beta
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/snap-release-to-candidate
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/snap-release-to-edge
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/snap-release-to-stable
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/upload-to-ppa
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/verification-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: linux-aws (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux-aws (Ubuntu Xenial)
 Importance: Medium
 Status: Confirmed


** Tags: kernel-release-tracking-bug kernel-release-tracking-bug-live 
kernel-sru-cycle-2018.09.10 kernel-sru-derivative-of-1791745 xenial

** Tags added: kernel-release-tracking-bug

** Tags added: kernel-release-tracking-bug-live

** Also affects: linux-aws (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Tags added: xenial

** Changed in: linux-aws (Ubuntu Xenial)
   Status: New => Confirmed

** Also affects: kernel-sru-workflow/automated-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/certification-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-proposed
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-security
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-updates
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/regression-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/security-signoff
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/snap-release-to-beta
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/snap-release-to-candidate
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/snap-release-to-edge
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/snap-release-to-stable
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/upload-to-ppa
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/verification-testing
   Importance: Undecided
   Status: New

** Changed in: kernel-sru-workflow/automated-testing
   Importance: Undecided 

[Bug 1791745] [NEW] linux: -proposed tracker

2018-09-10 Thread Kleber Sacilotto de Souza
Public bug reported:

This bug is for tracking the  upload package. This
bug will contain status and testing results related to that upload.

For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

backports: bug 1791746 (linux-aws), bug 1791747 (linux-lts-xenial)
derivatives: bug 1791749 (linux-aws), bug 1791750 (linux-euclid), bug 1791751 
(linux-kvm), bug 1791752 (linux-raspi2), bug 1791753 (linux-snapdragon)

** Affects: kernel-sru-workflow
 Importance: Medium
 Status: In Progress

** Affects: kernel-sru-workflow/automated-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/certification-testing
 Importance: Medium
 Assignee: Canonical Hardware Certification (canonical-hw-cert)
 Status: New

** Affects: kernel-sru-workflow/prepare-package
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: Confirmed

** Affects: kernel-sru-workflow/prepare-package-meta
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/prepare-package-signed
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/promote-to-proposed
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-security
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-updates
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/regression-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/security-signoff
 Importance: Medium
 Assignee: Canonical Security Team (canonical-security)
 Status: New

** Affects: kernel-sru-workflow/snap-certification-testing
 Importance: Medium
 Assignee: Canonical Hardware Certification (canonical-hw-cert)
 Status: New

** Affects: kernel-sru-workflow/snap-release-to-beta
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/snap-release-to-candidate
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/snap-release-to-edge
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/snap-release-to-stable
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/upload-to-ppa
 Importance: Medium
 Status: Invalid

** Affects: kernel-sru-workflow/verification-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux (Ubuntu Xenial)
 Importance: Medium
 Status: Confirmed


** Tags: kernel-release-tracking-bug kernel-release-tracking-bug-live 
kernel-sru-cycle-2018.09.10 kernel-sru-master-kernel xenial

** Tags added: kernel-release-tracking-bug

** Tags added: kernel-release-tracking-bug-live

** Also affects: linux (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Tags added: xenial

** Changed in: linux (Ubuntu Xenial)
   Status: New => Confirmed

** Also affects: kernel-sru-workflow/automated-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/certification-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package-signed
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-proposed
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-security
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-updates
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/regression-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/security-signoff
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/snap-certification-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/snap-release-to-beta
   

<    1   2   3   4   5   6   7   8   9   >