[Bug 1975669] [NEW] USB devices are not working on Raspberry pi zero 2 with arm64 image

2022-05-25 Thread Gavin Lin
Public bug reported:

[Summary]
USB devices are not working on Raspberry pi zero 2 with arm64 image.

I have tried following devices with adapters:
rpiz2 micro usb -> usb type-c -> usb type-c storage
rpiz2 micro usb -> usb type-c -> usb type-a -> usb type-a storage
rpiz2 micro usb -> usb type-c -> usb type-c ethernet dongle
rpiz2 micro usb -> usb type-c -> usb type-a -> usb type-a ethernet dongle

I have checked both 20.04 and 22.04, all these devices work fine with armhf 
images but not work with arm64 images.
And all these devices work fine on Raspberry pi 3a+ with armhf and arm64 images

[Steps to reproduce]
1. Flash image to SD card
2. Boot into system
3. Check usb device with lsusb

[Expected result]
All usb devices are working fine.

[Actual result]
USB devices are not working on Raspberry pi zero 2 with arm64 image.

[Additional information]
SKU: Raspberry pi zero 2
Kernel: 5.15.0-1008-raspi

ProblemType: Bug
DistroRelease: Ubuntu 22.04
Package: linux-raspi 5.15.0.1008.8
ProcVersionSignature: Ubuntu 5.15.0-1008.8-raspi 5.15.30
Uname: Linux 5.15.0-1008-raspi aarch64
AlsaDevices:
 total 0
 crw-rw 1 root audio 116,  1 May 25 04:00 seq
 crw-rw 1 root audio 116, 33 May 25 04:00 timer
AlsaVersion: Advanced Linux Sound Architecture Driver Version 
k5.15.0-1008-raspi.
AplayDevices: Error: [Errno 2] No such file or directory: 'aplay'
ApportVersion: 2.20.11-0ubuntu82.1
Architecture: arm64
ArecordDevices: Error: [Errno 2] No such file or directory: 'arecord'
AudioDevicesInUse: Error: command ['fuser', '-v', '/dev/snd/seq', 
'/dev/snd/timer'] failed with exit code 1:
CRDA: N/A
CasperMD5CheckResult: unknown
Date: Wed May 25 06:36:24 2022
ImageMediaBuild: 20220419
IwConfig: Error: [Errno 2] No such file or directory: 'iwconfig'
Lspci:
 
Lspci-vt: -[:00]-
Lsusb: Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
Lsusb-t: /:  Bus 01.Port 1: Dev 1, Class=root_hub, Driver=dwc2/1p, 480M
PciMultimedia:
 
ProcEnviron:
 TERM=vt220
 PATH=(custom, no user)
 LANG=C.UTF-8
 SHELL=/bin/bash
ProcFB: 0 BCM2708 FB
ProcKernelCmdLine: coherent_pool=1M 8250.nr_uarts=1 
snd_bcm2835.enable_compat_alsa=0 snd_bcm2835.enable_hdmi=1 
bcm2708_fb.fbwidth=720 bcm2708_fb.fbheight=480 bcm2708_fb.fbswap=1 
smsc95xx.macaddr=B8:27:EB:6A:C0:29 vc_mem.mem_base=0x1ec0 
vc_mem.mem_size=0x2000  console=ttyS0,115200 dwc_otg.lpm_enable=0 
console=tty1 root=LABEL=writable rootfstype=ext4 rootwait fixrtc quiet splash
RelatedPackageVersions:
 linux-restricted-modules-5.15.0-1008-raspi N/A
 linux-backports-modules-5.15.0-1008-raspi  N/A
 linux-firmware 20220329.git681281e4-0ubuntu3
RfKill: Error: [Errno 2] No such file or directory: 'rfkill'
SourcePackage: linux-raspi
StagingDrivers: bcm2835_codec bcm2835_isp bcm2835_v4l2 vc_sm_cma 
bcm2835_mmal_vchiq snd_bcm2835
UpgradeStatus: No upgrade log present (probably fresh install)
acpidump:

** Affects: linux-raspi (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: apport-bug arm64 arm64-image jammy raspi-image staging uec-images

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1975669

Title:
  USB devices are not working on Raspberry pi zero 2 with arm64 image

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-raspi/+bug/1975669/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1956177] Re: battery not detected by ACPI

2022-05-25 Thread Kai-Heng Feng
Seems like BATD is not correct?

Can someone please run 
$ sudo acpidbg -b 'ex  \_SB_.PCI0.LPCB.EC0_.BATD'

and attach its value?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1956177

Title:
  battery not detected by ACPI

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1956177/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1975670] [NEW] execsnoop-bpfcc gives error and doesn't work in Turkish locale

2022-05-25 Thread Oğuz Karayemiş
Public bug reported:

In terminal, after the "sudo execsnoop-bpfcc":

error: unknown argument '-discard-value-names'; did you mean 
'-discard-value-names'?
Traceback (most recent call last):
  File "/usr/sbin/execsnoop-bpfcc", line 227, in 
b = BPF(text=bpf_text)
  File "/usr/lib/python3/dist-packages/bcc/__init__.py", line 364, in __init__
raise Exception("Failed to compile BPF module %s" % (src_file or ""))
Exception: Failed to compile BPF module 

But if I use "LC_ALL=C" environment variable before command "sudo
LC_ALL=C execsnoop-bpfcc" will work without any problem. This issue
causes another program (like "system76-scheduler") which calls this
function to use much higher cpu clock time.

** Affects: bpfcc (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1975670

Title:
  execsnoop-bpfcc gives error and doesn't work in Turkish locale

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/bpfcc/+bug/1975670/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1973638] Re: gnome-shell 42 leaks tens of megabytes with every screenshot

2022-05-25 Thread Daniel van Vugt
https://gitlab.gnome.org/GNOME/gjs/-/merge_requests/746

** Also affects: gjs (Ubuntu)
   Importance: Undecided
   Status: New

** Changed in: gjs (Ubuntu)
   Importance: Undecided => High

** Changed in: gjs (Ubuntu)
   Status: New => In Progress

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1973638

Title:
  gnome-shell 42 leaks tens of megabytes with every screenshot

To manage notifications about this bug go to:
https://bugs.launchpad.net/gnome-shell/+bug/1973638/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1973167] Re: linux-image-4.15.0-177-generic freezes on the welcome screen

2022-05-25 Thread Robert Schlabbach
My "prime suspect" is this commit:
https://kernel.ubuntu.com/git/ubuntu/ubuntu-bionic.git/commit/kernel/module.c?h=Ubuntu-4.15.0-177.186&id=3879f4364139acb2bd3932e6a15994f109c49d6b

Also see Linus' comments when this patch was submitted to the mainline kernel:
https://www.spinics.net/lists/kernel/msg4223720.html

"that might be a big deal slowing things down at boot time.
[...]
Comments? Maybe this is a "just apply it, see if somebody screams" situation?"

From what I understand, other measures taken in the kernel and modules
make this issue no longer occur, so my hypothesis is that this may not
have caused issues in the current kernel. So the mistake was that
Canonical backported this commit to a very old kernel version that
kernel.org no longer maintains...

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1973167

Title:
  linux-image-4.15.0-177-generic freezes on the welcome screen

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1973167/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1975673] [NEW] libgpg-error/1.45-2 fails autopkgtest on i386

2022-05-25 Thread Lukas Märdian
Public bug reported:

The failure was introduced by this change in Debian:
https://salsa.debian.org/debian/libgpg-error/-/commit/0c11fe4ae16c2800e13758ff1ee64c561354e628

It started to fail for i386 on autopkgtest.u.c:
https://autopkgtest.ubuntu.com/packages/libgpg-error/kinetic/i386
https://autopkgtest.ubuntu.com/results/autopkgtest-kinetic/kinetic/i386/libg/libgpg-error/20220523_114919_e3142@/log.gz

The relevant log is this:
```
The following packages have unmet dependencies:
 builddeps:/tmp/autopkgtest.VMjBik/1-autopkgtest-satdep.dsc:i386 : Depends: 
gcc-mingw-w64-x86-64:i386 but it is not installable
E: Unable to correct problems, you have held broken packages.
win64 FAIL badpkg
[...]
autopkgtest [11:49:03]:  summary
win32 SKIP Test lists explicitly supported architectures, but the current 
architecture amd64 isn't listed.
win64 FAIL badpkg
blame: libgpg-error
badpkg: Test dependencies are unsatisfiable. A common reason is that your 
testbed is out of date with respect to the archive, and you need to use a 
current testbed or run apt-get update or use -U.
build PASS
```

As can be seen, the i386/win32 test is skipped while amd64/win64 is
executed and fails with "badpkg" error due to not being able to install
"gcc-mingw-w64-x86-64:i386".


=


Even if that can be fixed 
(https://code.launchpad.net/~ubuntu-release/autopkgtest/+git/development/+merge/423176),
 the "win64" test is skipped now and "win32" executed, "win32" fails with a 
"badpkg" error, which probably needs solving in the archive.

$ PYTHONPATH=lib/ runner/autopkgtest libgpg-error 
--apt-pocket=proposed=src:libgpg-error -a i386 -U -- qemu 
/data/autopkgtest-kinetic-amd64.img
[...]
win64 SKIP Test lists explicitly supported architectures, but the current 
architecture i386 isn't listed.
[...]
The following packages have unmet dependencies:
 builddeps:/tmp/autopkgtest.8Maso6/1-autopkgtest-satdep.dsc:i386 : Depends: 
gcc-mingw-w64-i686:i386 but it is not installable
   Depends: 
wine32:i386 but it is not going to be installed
E: Unable to correct problems, you have held broken packages.
win32 FAIL badpkg
blame: libgpg-error
badpkg: Test dependencies are unsatisfiable. A common reason is that your 
testbed is out of date with respect to the archive, and you need to use a 
current testbed or run apt-get update or use -U.

Full log: https://paste.ubuntu.com/p/JYHrJpMGbn/

** Affects: libgpg-error (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: update-excuse

** Merge proposal linked:
   
https://code.launchpad.net/~ubuntu-release/autopkgtest/+git/development/+merge/423176

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1975673

Title:
  libgpg-error/1.45-2 fails autopkgtest on i386

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libgpg-error/+bug/1975673/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1967013] Re: Bionic update: upstream stable patchset 2022-03-29

2022-05-25 Thread Robert Schlabbach
This commit is suspected to cause issues for many users:
https://kernel.ubuntu.com/git/ubuntu/ubuntu-bionic.git/commit/kernel/module.c?h=Ubuntu-4.15.0-177.186&id=3879f4364139acb2bd3932e6a15994f109c49d6b

Please see this bug ticket:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1973167

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1967013

Title:
  Bionic update: upstream stable patchset 2022-03-29

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1967013/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1871015] Re: test_vxlan_under_vrf.sh in net from ubuntu_kernel_selftests failed with H (Check VM connectivity through VXLAN (underlay in the default VRF) [FAIL])

2022-05-25 Thread Po-Hsu Lin
** Also affects: linux-oem-5.14 (Ubuntu)
   Importance: Undecided
   Status: New

** Changed in: linux-oem-5.14 (Ubuntu Bionic)
   Status: New => Invalid

** Changed in: linux-oem-5.14 (Ubuntu Focal)
   Status: New => Invalid

** Changed in: linux-oem-5.14 (Ubuntu Hirsute)
   Status: New => Invalid

** Changed in: linux-oem-5.14 (Ubuntu Focal)
   Status: Invalid => In Progress

** Changed in: linux-oem-5.14 (Ubuntu Focal)
 Assignee: (unassigned) => Po-Hsu Lin (cypressyew)

** Changed in: linux-oem-5.14 (Ubuntu Impish)
   Status: New => Invalid

** Changed in: linux-oem-5.14 (Ubuntu Jammy)
   Status: New => Invalid

** Changed in: linux-oem-5.14 (Ubuntu Kinetic)
   Status: New => Invalid

** Tags added: 13 5.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1871015

Title:
  test_vxlan_under_vrf.sh in net from ubuntu_kernel_selftests failed
  with H (Check VM connectivity through VXLAN (underlay in the default
  VRF) [FAIL])

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1871015/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1975675] [NEW] GUI problem from {Online Accounts} Google Microsoft and {Ubuntu Desktop Guide}

2022-05-25 Thread bob
Public bug reported:

raspberry pi 4 (8GB memory, USB SSD boot) ubuntu 64 with 2 monitors


Description:Ubuntu 22.04 LTS
Release:22.04


Seems like the GUI for {Online Accounts} Google Microsoft and {Ubuntu Desktop 
Guide} can't render themselves correctly. Meanwhile, the Firefox can play 
YouTube on 2 monitors without any problem.
Please refer to the attached snapshot.

apt-cache policy 
Package files:
 100 /var/lib/dpkg/status
 release a=now
 500 http://ports.ubuntu.com/ubuntu-ports jammy-security/universe arm64 Packages
 release 
v=22.04,o=Ubuntu,a=jammy-security,n=jammy,l=Ubuntu,c=universe,b=arm64
 origin ports.ubuntu.com
 500 http://ports.ubuntu.com/ubuntu-ports jammy-security/restricted arm64 
Packages
 release 
v=22.04,o=Ubuntu,a=jammy-security,n=jammy,l=Ubuntu,c=restricted,b=arm64
 origin ports.ubuntu.com
 500 http://ports.ubuntu.com/ubuntu-ports jammy-security/main arm64 Packages
 release v=22.04,o=Ubuntu,a=jammy-security,n=jammy,l=Ubuntu,c=main,b=arm64
 origin ports.ubuntu.com
 100 http://ports.ubuntu.com/ubuntu-ports jammy-backports/universe arm64 
Packages
 release 
v=22.04,o=Ubuntu,a=jammy-backports,n=jammy,l=Ubuntu,c=universe,b=arm64
 origin ports.ubuntu.com
 500 http://ports.ubuntu.com/ubuntu-ports jammy-updates/universe arm64 Packages
 release 
v=22.04,o=Ubuntu,a=jammy-updates,n=jammy,l=Ubuntu,c=universe,b=arm64
 origin ports.ubuntu.com
 500 http://ports.ubuntu.com/ubuntu-ports jammy-updates/restricted arm64 
Packages
 release 
v=22.04,o=Ubuntu,a=jammy-updates,n=jammy,l=Ubuntu,c=restricted,b=arm64
 origin ports.ubuntu.com
 500 http://ports.ubuntu.com/ubuntu-ports jammy-updates/main arm64 Packages
 release v=22.04,o=Ubuntu,a=jammy-updates,n=jammy,l=Ubuntu,c=main,b=arm64
 origin ports.ubuntu.com
 500 http://ports.ubuntu.com/ubuntu-ports jammy/multiverse arm64 Packages
 release v=22.04,o=Ubuntu,a=jammy,n=jammy,l=Ubuntu,c=multiverse,b=arm64
 origin ports.ubuntu.com
 500 http://ports.ubuntu.com/ubuntu-ports jammy/universe arm64 Packages
 release v=22.04,o=Ubuntu,a=jammy,n=jammy,l=Ubuntu,c=universe,b=arm64
 origin ports.ubuntu.com
 500 http://ports.ubuntu.com/ubuntu-ports jammy/restricted arm64 Packages
 release v=22.04,o=Ubuntu,a=jammy,n=jammy,l=Ubuntu,c=restricted,b=arm64
 origin ports.ubuntu.com
 500 http://ports.ubuntu.com/ubuntu-ports jammy/main arm64 Packages
 release v=22.04,o=Ubuntu,a=jammy,n=jammy,l=Ubuntu,c=main,b=arm64
 origin ports.ubuntu.com
Pinned packages:
 librados2 -> 17.2.0-0ubuntu0.22.04.1 with priority 1
 crimson-osd -> 17.2.0-0ubuntu0.22.04.1 with priority 1
 ec2-instance-connect -> 1.1.14-0ubuntu1.1 with priority 1
 python3-etcd3gw -> 0.2.5-1ubuntu1.22.04.1 with priority 1
 budgie-control-center-data -> 1.0.1-2ubuntu2 with priority 1
 xdg-desktop-portal-tests -> 1.14.3-0ubuntu2.22.04.1 with priority 1
 budgie-desktop -> 10.6.1-1ubuntu1~22.04 with priority 1
 python-etcd3gw-doc -> 0.2.5-1ubuntu1.22.04.1 with priority 1
 ceph-volume -> 17.2.0-0ubuntu0.22.04.1 with priority 1
 evolution-dev -> 3.44.1-0ubuntu1 with priority 1
 libbudgietheme0 -> 10.6.1-1ubuntu1~22.04 with priority 1
 rbd-fuse -> 17.2.0-0ubuntu0.22.04.1 with priority 1
 ceph-mgr-modules-core -> 17.2.0-0ubuntu0.22.04.1 with priority 1
 libgtk-4-common -> 4.6.3+ds1-0ubuntu1 with priority 1
 ceph-grafana-dashboards -> 17.2.0-0ubuntu0.22.04.1 with priority 1
 gir1.2-clutter-gst-3.0 -> 3.0.27-2ubuntu1 with priority 1
 libgail-3-dev -> 3.24.33-1ubuntu2 with priority 1
 libgail-3-doc -> 3.24.33-1ubuntu2 with priority 1
 ceph-resource-agents -> 17.2.0-0ubuntu0.22.04.1 with priority 1
 ceph-base -> 17.2.0-0ubuntu0.22.04.1 with priority 1
 libsqlite3-mod-ceph-dev -> 17.2.0-0ubuntu0.22.04.1 with priority 1
 libjson-c-dev -> 0.15-3~ubuntu1.22.04.1 with priority 1
 libjson-c-doc -> 0.15-3~ubuntu1.22.04.1 with priority 1
 xdg-desktop-portal-dev -> 1.14.3-0ubuntu2.22.04.1 with priority 1
 gstreamer1.0-clutter-3.0 -> 3.0.27-2ubuntu1 with priority 1
 python3-ceph-common -> 17.2.0-0ubuntu0.22.04.1 with priority 1
 librbd1 -> 17.2.0-0ubuntu0.22.04.1 with priority 1
 gir1.2-budgie-1.0 -> 10.6.1-1ubuntu1~22.04 with priority 1
 libraven0 -> 10.6.1-1ubuntu1~22.04 with priority 1
 librgw2 -> 17.2.0-0ubuntu0.22.04.1 with priority 1
 libusb-1.0-0-dev -> 2:1.0.25-1ubuntu2 with priority 1
 libclutter-gst-3.0-dev -> 3.0.27-2ubuntu1 with priority 1
 libclutter-gst-3.0-doc -> 3.0.27-2ubuntu1 with priority 1
 ceph-mgr-cephadm -> 17.2.0-0ubuntu0.22.04.1 with priority 1
 libcephfs-dev -> 17.2.0-0ubuntu0.22.04.1 with priority 1
 budgie-control-center -> 1.0.1-2ubuntu2 with priority 1
 ceph-common -> 17.2.0-0ubuntu0.22.04.1 with priority 1
 libusb-1.0-doc -> 2:1.0.25-1ubuntu2 with priority 1
 libcephfs-jni -> 17.2.0-0ubuntu0.22.04.1 with priority 1
 evolution-plugins -> 3.44.1-0ubuntu1 wit

[Bug 1975399] Re: FATAL FwdState::noteDestinationsEnd exception: opening()

2022-05-25 Thread laszloj
Hi Bryce,

Thank you for the prompt response.
I wasn't able to reproduce the crashes with a script yet, however, I have been 
able to isolate the issue a bit more.
It seems like it only happens when ssl-bump is used - I'm using the newly 
introduced squid-openssl package.
I've attached a config file which is based on the following entry in Squid's 
FAQ and didn't cause the same crashes in squid 4.x (compiled with openssl): 
https://wiki.squid-cache.org/SquidFaq/WindowsUpdate

Using this config requires the squid-openssl package and the below commands 
must be executed before starting the service, otherwise squid gets stuck in a 
crash loop:
---
/usr/lib/squid/security_file_certgen -c -s /var/spool/squid/ssl_db -M 4MB && 
chown -R proxy:proxy /var/spool/squid/ssl_db
---

If I set the proxy config on my Windows laptop to point at the squid proxy 
running with the attached config on Ubuntu 22.04, squid crashes and restarts as 
soon as I try to open Outlook or Word. I cannot reproduce this issue with a 
config where ssl-bump is not used, even when using the squid-openssl package.
I tried using a Python script to simultaneously call some of the https URLs 
that I found in the logs, but squid didn't crash that way.
I'll try reproducing it using an app on an Ubuntu desktop VM and keep trying 
with the script as well.

** Attachment added: "sample squid config"
   
https://bugs.launchpad.net/ubuntu/+source/squid/+bug/1975399/+attachment/5592813/+files/squid.conf

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1975399

Title:
  FATAL FwdState::noteDestinationsEnd exception: opening()

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/squid/+bug/1975399/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1871015] Re: test_vxlan_under_vrf.sh in net from ubuntu_kernel_selftests failed with H (Check VM connectivity through VXLAN (underlay in the default VRF) [FAIL])

2022-05-25 Thread Po-Hsu Lin
** Description changed:

+ [Impact]
+ 
+ 
+ [Fix]
+ 
+ 
+ [Test]
+ 
+ 
+ [Where problems could occur]
+ 
+ [Original Bug Report]
  Issue found with GCP 5.3.0-1017.18~18.04.1
  
-  # selftests: net: test_vxlan_under_vrf.sh
-  # Checking HV connectivity [ OK ]
-  # Check VM connectivity through VXLAN (underlay in the default VRF) [FAIL]
-  not ok 25 selftests: net: test_vxlan_under_vrf.sh # exit=1
- 
+  # selftests: net: test_vxlan_under_vrf.sh
+  # Checking HV connectivity [ OK ]
+  # Check VM connectivity through VXLAN (underlay in the default VRF) [FAIL]
+  not ok 25 selftests: net: test_vxlan_under_vrf.sh # exit=1
  
  The failure is different from bug 1837348

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1871015

Title:
  test_vxlan_under_vrf.sh in net from ubuntu_kernel_selftests failed
  with H (Check VM connectivity through VXLAN (underlay in the default
  VRF) [FAIL])

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1871015/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1959548] Re: [22.04 FEAT] zcrypt DD: Exploitation Support of new IBM Z Crypto Hardware (s390-tools part)

2022-05-25 Thread Frank Heimes
** Description changed:

+ SRU Justification:
+ ==
+ 
+ [Impact]
+ 
+  * This in a hardware enablement SRU,
+and mainly adds support for CryptoExpress 8S adapters
+to the s390-tools package.
+ 
+  * With that the new options 'show_serialnumbers',
+'--accelonly', '--ccaonly' and '--ep11only'
+are introduced to the lszcrypt tool.
+ 
+  * In addition lszcrypt now supports the checkstop state
+of a crypto card, that is provided by the 'chkstop'
+attribute in the sysfs of newer kernels.
+ 
+  * And lszcrypt now shows the AP bus msg size limit capability,
+which is needed for new adapter cards.
+ 
+  * New codes for zcryptstats are needed as well.
+ 
+ [Test Plan]
+ 
+  * Prepare an IBM z16 LPAR with Ubuntu 22.04 (incl. this patch)
+that has an CryptoExpress 8S adapter attached to it
+and at least one crypto domain online and available.
+ 
+  * Call 'lszcrypt -V' and check the 2nd column called 'type'
+and the last column called 'driver'.
+ 
+  * If both have entries that start with "cex8..." then the new
+CryptoExpress 8S driver is active and the new card is detected
+and can be used (and the new features exploited).
+ 
+  * If the driver listed there is older than 'cex8',
+than the new card is probably detected as an older type
+and it runs in toleration mode only.
+ 
+  * Try and test the new options.
+ 
+  * Run zcryptstats and with that make use of the new codes
+(which actually means add CEX8S support for zcryptstats).
+ 
+  * And finally extending lszcrypt's capabilities and
+make it aware of CEX8S.
+ 
+ [Where problems could occur]
+ 
+  * The new declarations, initializations or the scan for the serial numbers
+of the devices could fail, which would lead to a non-working
+or even erroneous new '-s' option.
+ 
+  * The new filter mechanism could be broken and now incorrect
+resources, but this would be limited to the new options
+'--cardonly' and '--queueonly'.
+ 
+  * The same applies to the new options
+'--accelonly', '--ccaonly' and '--ep11only'.
+ 
+  * The handling of the new chkstop state can be confusing or might be
+broken, which may lead to wrong state representations.
+ 
+  * The new AP bus msg size limit mights be incorrectly calculated,
+which leads to a wrong size and with that certain feature not to work.
+ 
+  * The new zcryptstats might come with wrong or mixed codes,
+which would lead to wrong and misleading statistics,
+or even break zcryptstats.
+ 
+  * Regarding the lszcrypt capability extension there is no danger
+since an existing case statement is extended and the case content
+reused unchanged.
+ 
+  * All this is s390x specific, and only affects the handling for
+CryptoExpress 8S adapters. It won't have an impact on CPACF.
+ 
+ [Other Info]
+  
+  * The net CEX8S support is provided by commits bcbb6fca and b16a6d4f.
+All others can be considered as pre-requisites.
+ 
+ __
+ 
  zcrypt DD: Exploitation Support of new IBM Z Crypto Hardware -
  s390-tools part

** Changed in: s390-tools (Ubuntu)
 Assignee: Skipper Bug Screeners (skipper-screen-team) => Frank Heimes 
(fheimes)

** Information type changed from Private to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1959548

Title:
  [22.04 FEAT] zcrypt DD: Exploitation Support of new IBM Z Crypto
  Hardware (s390-tools part)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1959548/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1974097] Re: KSystemLog only launches if run from a terminal - attempting to run from the application menu or from KRunner silently fails

2022-05-25 Thread Rik Mills
*** This bug is a duplicate of bug 1965439 ***
https://bugs.launchpad.net/bugs/1965439

** This bug has been marked a duplicate of bug 1965439
   applications can no longer launch when called by kdesu

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1974097

Title:
  KSystemLog only launches if run from a terminal - attempting to run
  from the application menu or from KRunner silently fails

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ksystemlog/+bug/1974097/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1968318] Re: [sru] ceph 17.2.0 (Quincy) release

2022-05-25 Thread James Page
focal-yoga/proposed

==
Totals
==
Ran: 182 tests in 1541.3454 sec.
 - Passed: 167
 - Skipped: 12
 - Expected Fail: 0
 - Unexpected Success: 0
 - Failed: 3
Sum of execute time for each test: 1522.4674 sec.


same three failures

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1968318

Title:
  [sru] ceph 17.2.0 (Quincy) release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ceph/+bug/1968318/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1967286] Re: KSystemLog is not launched

2022-05-25 Thread Rik Mills
*** This bug is a duplicate of bug 1965439 ***
https://bugs.launchpad.net/bugs/1965439

** This bug is no longer a duplicate of bug 1962455
   Unable to authenticate to KSystemLog graphical app Kubuntu Jammy
** This bug has been marked a duplicate of bug 1965439
   applications can no longer launch when called by kdesu

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1967286

Title:
  KSystemLog is not launched

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/kubuntu-meta/+bug/1967286/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1964439] Re: KSystemLog does not launch from Application Launcher menu

2022-05-25 Thread Rik Mills
*** This bug is a duplicate of bug 1965439 ***
https://bugs.launchpad.net/bugs/1965439

** This bug is no longer a duplicate of bug 1962455
   Unable to authenticate to KSystemLog graphical app Kubuntu Jammy
** This bug has been marked a duplicate of bug 1965439
   applications can no longer launch when called by kdesu

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1964439

Title:
  KSystemLog does not launch from Application Launcher menu

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/plasma-desktop/+bug/1964439/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1962455] Re: Unable to authenticate to KSystemLog graphical app Kubuntu Jammy

2022-05-25 Thread Rik Mills
*** This bug is a duplicate of bug 1965439 ***
https://bugs.launchpad.net/bugs/1965439

** This bug has been marked a duplicate of bug 1965439
   applications can no longer launch when called by kdesu

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1962455

Title:
  Unable to authenticate to KSystemLog graphical app Kubuntu Jammy

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ksystemlog/+bug/1962455/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1975460] Re: ubuntu 22.04 kernel 5.15.0.x iwlwifi cannot load firmware, wifi card does not work: Intel Corporation Wireless 7260

2022-05-25 Thread Juerg Haefliger
Thanks for the bug report. Can you test the kernel from here:
https://kernel.ubuntu.com/~kernel-ppa/mainline/v5.15/

Specifically:
https://kernel.ubuntu.com/~kernel-ppa/mainline/v5.15/amd64/linux-image-unsigned-5.15.0-051500-generic_5.15.0-051500.202110312130_amd64.deb
https://kernel.ubuntu.com/~kernel-ppa/mainline/v5.15/amd64/linux-modules-5.15.0-051500-generic_5.15.0-051500.202110312130_amd64.deb

And post the output of dmesg?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1975460

Title:
  ubuntu 22.04 kernel 5.15.0.x iwlwifi cannot load firmware, wifi card
  does not work: Intel Corporation Wireless 7260

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1975460/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1965439] Re: software-properties-qt can no longer launch when called by kdesu

2022-05-25 Thread Rik Mills
** No longer affects: software-properties (Ubuntu)

** No longer affects: software-properties (Ubuntu Impish)

** No longer affects: software-properties (Ubuntu Jammy)

** No longer affects: policykit-1 (Ubuntu Impish)

** No longer affects: policykit-1 (Ubuntu Jammy)

** No longer affects: policykit-1 (Ubuntu)

** Summary changed:

- software-properties-qt can no longer launch when called by kdesu
+ applications can no longer launch when called by kdesu

** Also affects: ubuntustudio-default-settings via
   https://bugs.kde.org/show_bug.cgi?id=452532
   Importance: Unknown
   Status: Unknown

** No longer affects: ubuntustudio-default-settings

** No longer affects: ubuntustudio-default-settings (Ubuntu Impish)

** No longer affects: sudo (Ubuntu Impish)

** No longer affects: kubuntu-settings (Ubuntu Impish)

** No longer affects: kdesu (Ubuntu Impish)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1965439

Title:
  applications can no longer launch when called by kdesu

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/kdesu/+bug/1965439/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1975678] [NEW] Netplan generates the wrong YAML value when setting activation-mode=off

2022-05-25 Thread Isaac True
Public bug reported:

When setting activation-mode=off on Ubuntu 20.04/Ubuntu Core 20, netplan
generates the incorrect value in the YAML file (activation-mode: false),
causing it to fail due to incorrect syntax.

$ sudo netplan set ethernets.eth0.activation-mode=off
Traceback (most recent call last):
  File "/usr/sbin/netplan", line 23, in 
netplan.main()
  File "/usr/share/netplan/netplan/cli/core.py", line 50, in main
self.run_command()
  File "/usr/share/netplan/netplan/cli/utils.py", line 247, in run_command
self.func()
  File "/usr/share/netplan/netplan/cli/commands/set.py", line 55, in run
self.run_command()
  File "/usr/share/netplan/netplan/cli/utils.py", line 247, in run_command
self.func()
  File "/usr/share/netplan/netplan/cli/commands/set.py", line 126, in 
command_set
self.write_file(subtree, hint + '.yaml', self.root_dir)
  File "/usr/share/netplan/netplan/cli/commands/set.py", line 193, in write_file
libnetplan.netplan_parse(tmpp)
  File "/usr/share/netplan/netplan/libnetplan.py", line 64, in netplan_parse
raise Exception(err.contents.message.decode('utf-8'))
Exception: /tmp/netplan-set_o73ewgp4/etc/netplan/50-cloud-init.yaml:4:24: Error 
in network definition: Value of 'activation-mode' needs to be 'manual' or 'off'
  activation-mode: false
   ^

** Affects: netplan.io (Ubuntu)
 Importance: Medium
 Status: Triaged

** Affects: netplan.io (Ubuntu Focal)
 Importance: Medium
 Status: Triaged

** Affects: netplan.io (Ubuntu Impish)
 Importance: Undecided
 Status: New

** Affects: netplan.io (Ubuntu Jammy)
 Importance: Undecided
 Status: New

** Affects: netplan.io (Ubuntu Kinetic)
 Importance: Medium
 Status: Triaged


** Tags: rls-ff-incoming rls-kk-incoming

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1975678

Title:
  Netplan generates the wrong YAML value when setting activation-
  mode=off

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/netplan.io/+bug/1975678/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1975678] Re: Netplan generates the wrong YAML value when setting activation-mode=off

2022-05-25 Thread Lukas Märdian
** Also affects: netplan.io (Ubuntu Impish)
   Importance: Undecided
   Status: New

** Also affects: netplan.io (Ubuntu Jammy)
   Importance: Undecided
   Status: New

** Also affects: netplan.io (Ubuntu Focal)
   Importance: Undecided
   Status: New

** Also affects: netplan.io (Ubuntu Kinetic)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1975678

Title:
  Netplan generates the wrong YAML value when setting activation-
  mode=off

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/netplan.io/+bug/1975678/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1975678] Re: Netplan generates the wrong YAML value when setting activation-mode=off

2022-05-25 Thread Isaac True
** Description changed:

- When setting activation-mode=off, netplan generates the incorrect value
- in the YAML file (activation-mode: false), causing it to fail due to
- incorrect syntax.
+ When setting activation-mode=off on Ubuntu 20.04/Ubuntu Core 20, netplan
+ generates the incorrect value in the YAML file (activation-mode: false),
+ causing it to fail due to incorrect syntax.
  
  $ sudo netplan set ethernets.eth0.activation-mode=off
  Traceback (most recent call last):
-   File "/usr/sbin/netplan", line 23, in 
- netplan.main()
-   File "/usr/share/netplan/netplan/cli/core.py", line 50, in main
- self.run_command()
-   File "/usr/share/netplan/netplan/cli/utils.py", line 247, in run_command
- self.func()
-   File "/usr/share/netplan/netplan/cli/commands/set.py", line 55, in run
- self.run_command()
-   File "/usr/share/netplan/netplan/cli/utils.py", line 247, in run_command
- self.func()
-   File "/usr/share/netplan/netplan/cli/commands/set.py", line 126, in 
command_set
- self.write_file(subtree, hint + '.yaml', self.root_dir)
-   File "/usr/share/netplan/netplan/cli/commands/set.py", line 193, in 
write_file
- libnetplan.netplan_parse(tmpp)
-   File "/usr/share/netplan/netplan/libnetplan.py", line 64, in netplan_parse
- raise Exception(err.contents.message.decode('utf-8'))
+   File "/usr/sbin/netplan", line 23, in 
+ netplan.main()
+   File "/usr/share/netplan/netplan/cli/core.py", line 50, in main
+ self.run_command()
+   File "/usr/share/netplan/netplan/cli/utils.py", line 247, in run_command
+ self.func()
+   File "/usr/share/netplan/netplan/cli/commands/set.py", line 55, in run
+ self.run_command()
+   File "/usr/share/netplan/netplan/cli/utils.py", line 247, in run_command
+ self.func()
+   File "/usr/share/netplan/netplan/cli/commands/set.py", line 126, in 
command_set
+ self.write_file(subtree, hint + '.yaml', self.root_dir)
+   File "/usr/share/netplan/netplan/cli/commands/set.py", line 193, in 
write_file
+ libnetplan.netplan_parse(tmpp)
+   File "/usr/share/netplan/netplan/libnetplan.py", line 64, in netplan_parse
+ raise Exception(err.contents.message.decode('utf-8'))
  Exception: /tmp/netplan-set_o73ewgp4/etc/netplan/50-cloud-init.yaml:4:24: 
Error in network definition: Value of 'activation-mode' needs to be 'manual' or 
'off'
-   activation-mode: false
-^
+   activation-mode: false
+    ^

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1975678

Title:
  Netplan generates the wrong YAML value when setting activation-
  mode=off

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/netplan.io/+bug/1975678/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1975678] Re: Netplan generates the wrong YAML value when setting activation-mode=off

2022-05-25 Thread Lukas Märdian
** Changed in: netplan.io (Ubuntu Kinetic)
   Status: New => Triaged

** Changed in: netplan.io (Ubuntu Kinetic)
   Importance: Undecided => Medium

** Changed in: netplan.io (Ubuntu Focal)
   Status: New => Triaged

** Changed in: netplan.io (Ubuntu Focal)
   Importance: Undecided => Medium

** Tags added: rls-ff-incoming rls-kk-incoming

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1975678

Title:
  Netplan generates the wrong YAML value when setting activation-
  mode=off

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/netplan.io/+bug/1975678/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1970957] Re: suspend problem

2022-05-25 Thread mnijh
L13 Yoga Gen 2 is also affected, both in X11 and Wayland.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1970957

Title:
  suspend problem

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1970957/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1871015] Re: test_vxlan_under_vrf.sh in net from ubuntu_kernel_selftests failed (Check VM connectivity through VXLAN (underlay in the default VRF) [FAIL])

2022-05-25 Thread Po-Hsu Lin
** Summary changed:

- test_vxlan_under_vrf.sh in net from ubuntu_kernel_selftests failed with H 
(Check VM connectivity through VXLAN (underlay in the default VRF) [FAIL])
+ test_vxlan_under_vrf.sh in net from ubuntu_kernel_selftests failed (Check VM 
connectivity through VXLAN (underlay in the default VRF) [FAIL])

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1871015

Title:
  test_vxlan_under_vrf.sh in net from ubuntu_kernel_selftests failed
  (Check VM connectivity through VXLAN (underlay in the default VRF)
  [FAIL])

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1871015/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1975678] Re: Netplan generates the wrong YAML value when setting activation-mode=off

2022-05-25 Thread Lukas Märdian
This seems to be due to the (old) Python YAML parser being in conflict
with libnetplan's actual C YAML parser.

Apparently pyyaml interprets "off" as a boolean ('False') by default in
yaml.safe_load(value) (`set_tree = self.parse_key(key,
yaml.safe_load(value))`), while it is supposed to be an actual string
("off") for activation-mode.

Looks like it was broken ever since netplan set was introduced (v0.101)
and just recently got fixed via
https://github.com/canonical/netplan/pull/254
(https://github.com/canonical/netplan/commit/bdb4f9846c8f40275c09a28bed04d8436cbbeffc
to be specific)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1975678

Title:
  Netplan generates the wrong YAML value when setting activation-
  mode=off

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/netplan.io/+bug/1975678/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1975678] Re: Netplan generates the wrong YAML value when setting activation-mode=off

2022-05-25 Thread Lukas Märdian
A quick workaround seems to be quoting the parameters like this:

netplan set "ethernets.eth0.activation-mode='off'"

** Changed in: netplan.io (Ubuntu Kinetic)
   Importance: Medium => Low

** Changed in: netplan.io (Ubuntu Focal)
   Importance: Medium => Low

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1975678

Title:
  Netplan generates the wrong YAML value when setting activation-
  mode=off

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/netplan.io/+bug/1975678/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1975675] Re: GUI problem from {Online Accounts} Google Microsoft and {Ubuntu Desktop Guide}

2022-05-25 Thread Ubuntu Foundations Team Bug Bot
*** This bug is a duplicate of bug 1924251 ***
https://bugs.launchpad.net/bugs/1924251

** Package changed: ubuntu => xorg (Ubuntu)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1975675

Title:
  GUI problem from {Online Accounts} Google Microsoft and {Ubuntu
  Desktop Guide}

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+bug/1975675/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1971933] Re: [Regression] Unable to wake laptop using trackpad input

2022-05-25 Thread Kai-Heng Feng
Oh please remove all the "acpi*" kernel parameters which mess with the
ACPI.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1971933

Title:
  [Regression] Unable to wake laptop using trackpad input

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1971933/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1975675] Re: GUI problem from {Online Accounts} Google Microsoft and {Ubuntu Desktop Guide}

2022-05-25 Thread Daniel van Vugt
*** This bug is a duplicate of bug 1924251 ***
https://bugs.launchpad.net/bugs/1924251

Thank you for taking the time to report this bug and helping to make
Ubuntu better. This particular bug has already been reported and is a
duplicate of bug 1924251, so it is being marked as such. Please look at
the other bug report to see if there is any missing information that you
can provide, or to see if there is a workaround for the bug.
Additionally, any further discussion regarding the bug should occur in
the other report. Feel free to continue to report any other bugs you may
find.


** Package changed: xorg (Ubuntu) => ubuntu

** This bug has been marked a duplicate of bug 1924251
   Embedded browser display corruption under Wayland on Pi desktop

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1975675

Title:
  GUI problem from {Online Accounts} Google Microsoft and {Ubuntu
  Desktop Guide}

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+bug/1975675/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1970943] Re: OpenVPN connection fails with smartcard provided private key; please update pkcs11-helper

2022-05-25 Thread Lorenz Schwittmann
Hey there,

I have performed the following steps to test the proposed fix:

1) removed self-compiled pkcs11-helper version 1.29.0 from my system (hotfix)
2) tried to connect to an OpenVPN with smartcard authentification => failed as 
expected
3) enabled jammy-proposed
4) installed libpkcs11-helper1 1.28-1ubuntu0.22.04.1
5) tried to connect to an OpenVPN with smartcard authentification => connection 
succeeded

I therefore conclude that this update fixes the issue; thanks!

** Tags removed: verification-needed-jammy
** Tags added: verification-done-jammy

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1970943

Title:
  OpenVPN connection fails with smartcard provided private key; please
  update pkcs11-helper

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/pkcs11-helper/+bug/1970943/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1975673] Re: libgpg-error/1.45-2 fails autopkgtest on i386

2022-05-25 Thread Alexandre Ghiti
I think there's another problem: it fails to install gcc-mingw-w64-i686
because autopkgtest tries to install gcc-mingw-w64-i686:i386 which does
not exist since it only exists as gcc-mingw-w64-i686:all.

I added :all to the test dependency, and then it works, the test passes
correctly on i386 \o/

But I'll come up with the proper patch in autopkgtest: it should try
:$arch first and then :all in case it does not work.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1975673

Title:
  libgpg-error/1.45-2 fails autopkgtest on i386

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libgpg-error/+bug/1975673/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1975566] Re: radeon / amdgpu bad performance or panics

2022-05-25 Thread Timo Aaltonen
aiui the radv vulkan driver requires amdgpu kernel driver, so I don't
know how you could have it working before the upgrade.

the default driver for SI cards is radeon, that won't change so
essentially we don't support vulkan on those

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1975566

Title:
  radeon / amdgpu bad performance or panics

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/mesa/+bug/1975566/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1975669] Re: USB devices are not working on Raspberry pi zero 2 with arm64 image

2022-05-25 Thread Juerg Haefliger
Works fine for me:

$ cat /proc/device-tree/model 
Raspberry Pi Zero 2 Rev 1.0
$ uname -a
Linux rpi-zero2-rev1d0-2c3c 5.15.0-1008-raspi #8-Ubuntu SMP PREEMPT Thu May 19 
11:58:51 UTC 2022 aarch64 aarch64 aarch64 GNU/Linux
$ lsusb 
Bus 001 Device 002: ID 2357:0601 TP-Link UE300 10/100/1000 LAN (ethernet mode) 
[Realtek RTL8153]
Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1975669

Title:
  USB devices are not working on Raspberry pi zero 2 with arm64 image

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-raspi/+bug/1975669/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1974056] Re: iptables-1.8.7/iptables/tests/shell/testcases/nft-only/0009-needless-bitwise_0 fails on s390x

2022-05-25 Thread bugproxy
--- Comment From boris.m...@de.ibm.com 2022-05-25 04:39 EDT---
Description by Canonical (LP#1974056):

command17 FAIL stderr: W: [FAILED] ././testcases/nft-only/0009-needless-
bitwise_0: expected 0 but got 1

this can be reproduced with:

pull-lp-source iptables
cd iptables-1.8.7/
chmod +x ./iptables/tests/shell/testcases/iptables/0007-zero-counters_0
cd iptables/tests/shell
sudo ./run-tests.sh --host

** Tags added: architecture-s39064 bugnameltc-198367 severity-high
targetmilestone-inin2204

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1974056

Title:
  iptables-1.8.7/iptables/tests/shell/testcases/nft-only/0009-needless-
  bitwise_0 fails on s390x

To manage notifications about this bug go to:
https://bugs.launchpad.net/iptables/+bug/1974056/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1871015] Re: test_vxlan_under_vrf.sh in net from ubuntu_kernel_selftests failed (Check VM connectivity through VXLAN (underlay in the default VRF) [FAIL])

2022-05-25 Thread Po-Hsu Lin
** Description changed:

  [Impact]
+ The test_vxlan_under_vrf.sh in the net category of ubuntu_kernel_selftests 
will fail on 5.13 kernel with:
  
+  Running 'make run_tests -C net TEST_PROGS=test_vxlan_under_vrf.sh 
TEST_GEN_PROGS='' TEST_CUSTOM_PROGS='''
+  make: Entering directory 
'/home/ubuntu/autotest/client/tmp/ubuntu_kernel_selftests/src/linux/tools/testing/selftests/net'
+  make --no-builtin-rules ARCH=x86 -C ../../../.. headers_install
+  make[1]: Entering directory 
'/home/ubuntu/autotest/client/tmp/ubuntu_kernel_selftests/src/linux'
+INSTALL ./usr/include
+  make[1]: Leaving directory 
'/home/ubuntu/autotest/client/tmp/ubuntu_kernel_selftests/src/linux'
+  TAP version 13
+  1..1
+  # selftests: net: test_vxlan_under_vrf.sh
+  # Checking HV connectivity[ OK ]
+  # Check VM connectivity through VXLAN (underlay in the default VRF)  [FAIL]
+  not ok 1 selftests: net: test_vxlan_under_vrf.sh # exit=1 
  
  [Fix]
+ * e7e4785f selftests: net: test_vxlan_under_vrf: fix HV connectivity test
+ * b50d3b46 selftests: test_vxlan_under_vrf: Fix broken test case 
  
+ The first patch can be cherry-picked to Impish 5.13 and F-oem-5.14.
+ 
+ Note that this test is not failing on F-oem-5.14, but it's better to
+ have it applied to reduce the maintenance cost.
+ 
+ After the first patch was applied, we will need the second patch to solve the 
another failure on Impish 5.13, which we made it an expected failure (XFAIL) 
with SAUCE patches:
+ Check VM connectivity through VXLAN (underlay in a VRF)   [XFAIL]
  
  [Test]
+ Patch tested on Impish 5.13 and F-oem-5.14, this test_vxlan_under_vrf.sh test 
can pass without any issue:
  
  
  [Where problems could occur]
  
  [Original Bug Report]
  Issue found with GCP 5.3.0-1017.18~18.04.1
  
   # selftests: net: test_vxlan_under_vrf.sh
   # Checking HV connectivity [ OK ]
   # Check VM connectivity through VXLAN (underlay in the default VRF) [FAIL]
   not ok 25 selftests: net: test_vxlan_under_vrf.sh # exit=1
  
  The failure is different from bug 1837348

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1871015

Title:
  test_vxlan_under_vrf.sh in net from ubuntu_kernel_selftests failed
  (Check VM connectivity through VXLAN (underlay in the default VRF)
  [FAIL])

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1871015/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1959548] Re: [22.04 FEAT] zcrypt DD: Exploitation Support of new IBM Z Crypto Hardware (s390-tools part)

2022-05-25 Thread Frank Heimes
** Description changed:

  SRU Justification:
  ==
  
  [Impact]
  
-  * This in a hardware enablement SRU,
-and mainly adds support for CryptoExpress 8S adapters
-to the s390-tools package.
+  * This in a hardware enablement SRU,
+    and mainly adds support for CryptoExpress 8S adapters
+    to the s390-tools package.
  
-  * With that the new options 'show_serialnumbers',
-'--accelonly', '--ccaonly' and '--ep11only'
-are introduced to the lszcrypt tool.
+  * With that the new options 'show_serialnumbers',
+    '--accelonly', '--ccaonly' and '--ep11only'
+    are introduced to the lszcrypt tool.
  
-  * In addition lszcrypt now supports the checkstop state
-of a crypto card, that is provided by the 'chkstop'
-attribute in the sysfs of newer kernels.
+  * In addition lszcrypt now supports the checkstop state
+    of a crypto card, that is provided by the 'chkstop'
+    attribute in the sysfs of newer kernels.
  
-  * And lszcrypt now shows the AP bus msg size limit capability,
-which is needed for new adapter cards.
+  * And lszcrypt now shows the AP bus msg size limit capability,
+    which is needed for new adapter cards.
  
-  * New codes for zcryptstats are needed as well.
+  * New codes for zcryptstats are needed as well.
  
  [Test Plan]
  
-  * Prepare an IBM z16 LPAR with Ubuntu 22.04 (incl. this patch)
-that has an CryptoExpress 8S adapter attached to it
-and at least one crypto domain online and available.
+  * Prepare an IBM z16 LPAR with Ubuntu 22.04 (incl. this patch)
+    that has an CryptoExpress 8S adapter attached to it
+    and at least one crypto domain online and available.
  
-  * Call 'lszcrypt -V' and check the 2nd column called 'type'
-and the last column called 'driver'.
+  * Call 'lszcrypt -V' and check the 2nd column called 'type'
+    and the last column called 'driver'.
  
-  * If both have entries that start with "cex8..." then the new
-CryptoExpress 8S driver is active and the new card is detected
-and can be used (and the new features exploited).
+  * If both have entries that start with "cex8..." then the new
+    CryptoExpress 8S driver is active and the new card is detected
+    and can be used (and the new features exploited).
  
-  * If the driver listed there is older than 'cex8',
-than the new card is probably detected as an older type
-and it runs in toleration mode only.
+  * If the driver listed there is older than 'cex8',
+    than the new card is probably detected as an older type
+    and it runs in toleration mode only.
  
-  * Try and test the new options.
+  * Try and test the new options.
  
-  * Run zcryptstats and with that make use of the new codes
-(which actually means add CEX8S support for zcryptstats).
+  * Run zcryptstats and with that make use of the new codes
+    (which actually means add CEX8S support for zcryptstats).
  
-  * And finally extending lszcrypt's capabilities and
-make it aware of CEX8S.
+  * And finally extending lszcrypt's capabilities and
+    make it aware of CEX8S.
  
  [Where problems could occur]
  
-  * The new declarations, initializations or the scan for the serial numbers
-of the devices could fail, which would lead to a non-working
-or even erroneous new '-s' option.
+  * The new declarations, initializations or the scan for the serial numbers
+    of the devices could fail, which would lead to a non-working
+    or even erroneous new '-s' option.
  
-  * The new filter mechanism could be broken and now incorrect
-resources, but this would be limited to the new options
-'--cardonly' and '--queueonly'.
+  * The new filter mechanism could be broken and now incorrect
+    resources, but this would be limited to the new options
+    '--cardonly' and '--queueonly'.
  
-  * The same applies to the new options
-'--accelonly', '--ccaonly' and '--ep11only'.
+  * The same applies to the new options
+    '--accelonly', '--ccaonly' and '--ep11only'.
  
-  * The handling of the new chkstop state can be confusing or might be
-broken, which may lead to wrong state representations.
+  * The handling of the new chkstop state can be confusing or might be
+    broken, which may lead to wrong state representations.
  
-  * The new AP bus msg size limit mights be incorrectly calculated,
-which leads to a wrong size and with that certain feature not to work.
+  * The new AP bus msg size limit mights be incorrectly calculated,
+    which leads to a wrong size and with that certain feature not to work.
  
-  * The new zcryptstats might come with wrong or mixed codes,
-which would lead to wrong and misleading statistics,
-or even break zcryptstats.
+  * The new zcryptstats might come with wrong or mixed codes,
+    which would lead to wrong and misleading statistics,
+    or even break zcryptstats.
  
-  * Regarding the lszcrypt capability extension there is no danger
-since an existing case statement is extended and the case c

[Bug 1871148] Re: services start before apparmor profiles are loaded

2022-05-25 Thread Etienne URBAH
$ systemctl status snapd.apparmor
○ snapd.apparmor.service - Load AppArmor profiles managed internally by snapd
 Loaded: loaded (/lib/systemd/system/snapd.apparmor.service; disabled; 
vendor preset: enabled)
 Active: inactive (dead)

I do NOT remember having manually disabled this service.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1871148

Title:
  services start before apparmor profiles are loaded

To manage notifications about this bug go to:
https://bugs.launchpad.net/apparmor/+bug/1871148/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1871015] Re: test_vxlan_under_vrf.sh in net from ubuntu_kernel_selftests failed (Check VM connectivity through VXLAN (underlay in the default VRF) [FAIL])

2022-05-25 Thread Po-Hsu Lin
** Description changed:

  [Impact]
  The test_vxlan_under_vrf.sh in the net category of ubuntu_kernel_selftests 
will fail on 5.13 kernel with:
  
-  Running 'make run_tests -C net TEST_PROGS=test_vxlan_under_vrf.sh 
TEST_GEN_PROGS='' TEST_CUSTOM_PROGS='''
-  make: Entering directory 
'/home/ubuntu/autotest/client/tmp/ubuntu_kernel_selftests/src/linux/tools/testing/selftests/net'
-  make --no-builtin-rules ARCH=x86 -C ../../../.. headers_install
-  make[1]: Entering directory 
'/home/ubuntu/autotest/client/tmp/ubuntu_kernel_selftests/src/linux'
-INSTALL ./usr/include
-  make[1]: Leaving directory 
'/home/ubuntu/autotest/client/tmp/ubuntu_kernel_selftests/src/linux'
-  TAP version 13
-  1..1
-  # selftests: net: test_vxlan_under_vrf.sh
-  # Checking HV connectivity[ OK ]
-  # Check VM connectivity through VXLAN (underlay in the default VRF)  [FAIL]
-  not ok 1 selftests: net: test_vxlan_under_vrf.sh # exit=1 
+  Running 'make run_tests -C net TEST_PROGS=test_vxlan_under_vrf.sh 
TEST_GEN_PROGS='' TEST_CUSTOM_PROGS='''
+  make: Entering directory 
'/home/ubuntu/autotest/client/tmp/ubuntu_kernel_selftests/src/linux/tools/testing/selftests/net'
+  make --no-builtin-rules ARCH=x86 -C ../../../.. headers_install
+  make[1]: Entering directory 
'/home/ubuntu/autotest/client/tmp/ubuntu_kernel_selftests/src/linux'
+    INSTALL ./usr/include
+  make[1]: Leaving directory 
'/home/ubuntu/autotest/client/tmp/ubuntu_kernel_selftests/src/linux'
+  TAP version 13
+  1..1
+  # selftests: net: test_vxlan_under_vrf.sh
+  # Checking HV connectivity[ OK ]
+  # Check VM connectivity through VXLAN (underlay in the default VRF)  [FAIL]
+  not ok 1 selftests: net: test_vxlan_under_vrf.sh # exit=1
  
  [Fix]
  * e7e4785f selftests: net: test_vxlan_under_vrf: fix HV connectivity test
- * b50d3b46 selftests: test_vxlan_under_vrf: Fix broken test case 
+ * b50d3b46 selftests: test_vxlan_under_vrf: Fix broken test case
  
  The first patch can be cherry-picked to Impish 5.13 and F-oem-5.14.
  
  Note that this test is not failing on F-oem-5.14, but it's better to
  have it applied to reduce the maintenance cost.
  
  After the first patch was applied, we will need the second patch to solve the 
another failure on Impish 5.13, which we made it an expected failure (XFAIL) 
with SAUCE patches:
  Check VM connectivity through VXLAN (underlay in a VRF)   [XFAIL]
  
  [Test]
  Patch tested on Impish 5.13 and F-oem-5.14, this test_vxlan_under_vrf.sh test 
can pass without any issue:
- 
+ Checking HV connectivity   [ OK ]
+ Check VM connectivity through VXLAN (underlay in the default VRF)  [ OK ]
+ Check VM connectivity through VXLAN (underlay in a VRF)[ OK ]
  
  [Where problems could occur]
+ Change limit to test cases, should not have any real impact to kernel 
functions. But if these fixes are incorrect we will see failures in our 
regression-testing report. The worst scenario is getting false-negative results.
  
  [Original Bug Report]
  Issue found with GCP 5.3.0-1017.18~18.04.1
  
   # selftests: net: test_vxlan_under_vrf.sh
   # Checking HV connectivity [ OK ]
   # Check VM connectivity through VXLAN (underlay in the default VRF) [FAIL]
   not ok 25 selftests: net: test_vxlan_under_vrf.sh # exit=1
  
  The failure is different from bug 1837348

** Description changed:

  [Impact]
  The test_vxlan_under_vrf.sh in the net category of ubuntu_kernel_selftests 
will fail on 5.13 kernel with:
  
-  Running 'make run_tests -C net TEST_PROGS=test_vxlan_under_vrf.sh 
TEST_GEN_PROGS='' TEST_CUSTOM_PROGS='''
-  make: Entering directory 
'/home/ubuntu/autotest/client/tmp/ubuntu_kernel_selftests/src/linux/tools/testing/selftests/net'
-  make --no-builtin-rules ARCH=x86 -C ../../../.. headers_install
-  make[1]: Entering directory 
'/home/ubuntu/autotest/client/tmp/ubuntu_kernel_selftests/src/linux'
-    INSTALL ./usr/include
-  make[1]: Leaving directory 
'/home/ubuntu/autotest/client/tmp/ubuntu_kernel_selftests/src/linux'
-  TAP version 13
-  1..1
   # selftests: net: test_vxlan_under_vrf.sh
   # Checking HV connectivity[ OK ]
   # Check VM connectivity through VXLAN (underlay in the default VRF)  [FAIL]
   not ok 1 selftests: net: test_vxlan_under_vrf.sh # exit=1
  
  [Fix]
  * e7e4785f selftests: net: test_vxlan_under_vrf: fix HV connectivity test
  * b50d3b46 selftests: test_vxlan_under_vrf: Fix broken test case
  
  The first patch can be cherry-picked to Impish 5.13 and F-oem-5.14.
  
  Note that this test is not failing on F-oem-5.14, but it's better to
  have it applied to reduce the maintenance cost.
  
  After the first patch was applied, we will need the second patch to solve the 
another failure on Impish 5.13, which we made it an expected failure (XFAIL) 
with SAUCE patches:
  Check VM connectivity through VXLAN (underlay in a VRF)   [XFAIL]
  
  [Test]
  Patch tested on Impish 5.13 and F-

[Bug 1871015] Re: test_vxlan_under_vrf.sh in net from ubuntu_kernel_selftests failed (Check VM connectivity through VXLAN (underlay in the default VRF) [FAIL])

2022-05-25 Thread Po-Hsu Lin
** Description changed:

  [Impact]
  The test_vxlan_under_vrf.sh in the net category of ubuntu_kernel_selftests 
will fail on 5.13 kernel with:
  
   # selftests: net: test_vxlan_under_vrf.sh
   # Checking HV connectivity[ OK ]
   # Check VM connectivity through VXLAN (underlay in the default VRF)  [FAIL]
   not ok 1 selftests: net: test_vxlan_under_vrf.sh # exit=1
  
  [Fix]
  * e7e4785f selftests: net: test_vxlan_under_vrf: fix HV connectivity test
  * b50d3b46 selftests: test_vxlan_under_vrf: Fix broken test case
  
- The first patch can be cherry-picked to Impish 5.13 and F-oem-5.14.
+ The first patch (e7e4785f) can be cherry-picked to Impish 5.13 and
+ F-oem-5.14.
  
  Note that this test is not failing on F-oem-5.14, but it's better to
  have it applied to reduce the maintenance cost.
  
  After the first patch was applied, we will need the second patch on Impish 
5.13 to solve the another failure, which we made it an expected failure (XFAIL) 
with SAUCE patches:
  Check VM connectivity through VXLAN (underlay in a VRF)   [XFAIL]
  
- F-oem-5.14 has already got this one applied.
+ The second patch (b50d3b46) can be cherry-picked with must be applied
+ with -C2 due to our SAUCE patches. F-oem-5.14 has already got this one
+ applied.
  
  [Test]
  Patch tested on Impish 5.13 and F-oem-5.14, this test_vxlan_under_vrf.sh test 
can pass without any issue:
  Checking HV connectivity   [ OK ]
  Check VM connectivity through VXLAN (underlay in the default VRF)  [ OK ]
  Check VM connectivity through VXLAN (underlay in a VRF)[ OK ]
  
  [Where problems could occur]
  Change limit to test cases, should not have any real impact to kernel 
functions. But if these fixes are incorrect we will see failures in our 
regression-testing report. The worst scenario is getting false-negative results.
  
  [Original Bug Report]
  Issue found with GCP 5.3.0-1017.18~18.04.1
  
   # selftests: net: test_vxlan_under_vrf.sh
   # Checking HV connectivity [ OK ]
   # Check VM connectivity through VXLAN (underlay in the default VRF) [FAIL]
   not ok 25 selftests: net: test_vxlan_under_vrf.sh # exit=1
  
  The failure is different from bug 1837348

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1871015

Title:
  test_vxlan_under_vrf.sh in net from ubuntu_kernel_selftests failed
  (Check VM connectivity through VXLAN (underlay in the default VRF)
  [FAIL])

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1871015/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1967116] Re: [Ubuntu 22.04] mpi3mr: Request to include latest bug fixes

2022-05-25 Thread Sumit Saxena
I have tested the kernel 5.15.0-32.33 with the patches mentioned in bug 
description. 
Looks good.

** Tags added: verification-done-focal

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1967116

Title:
  [Ubuntu 22.04] mpi3mr: Request to include latest bug fixes

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1967116/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1975566] Re: radeon / amdgpu bad performance or panics

2022-05-25 Thread Daniel van Vugt
Before the upgrade it was an Intel GPU.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1975566

Title:
  radeon / amdgpu bad performance or panics

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/mesa/+bug/1975566/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1960119] Re: [22.04 FEAT] Add new CPU-MF Counters for new IBM Z Hardware - s390-tools part

2022-05-25 Thread Frank Heimes
A test build in PPA was done and is available here:
https://launchpad.net/~fheimes/+archive/ubuntu/lp1960119

** Changed in: ubuntu-z-systems
   Status: New => In Progress

** Changed in: s390-tools (Ubuntu)
   Status: New => In Progress

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1960119

Title:
  [22.04 FEAT] Add new CPU-MF Counters for new IBM Z Hardware -
  s390-tools part

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1960119/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1972853] Re: [MIR] lib*-perl

2022-05-25 Thread Christian Ehrhardt 
Review for Package: libindirect-perl

[Summary]
MIR team ACK

This does not need a security review

List of specific binary packages to be promoted to main: libindirect-perl
Specific binary packages built, but NOT to be promoted to main: n/a

[Duplication]
There is no other package in main providing the same functionality.

[Dependencies]
OK:
- no other Dependencies to MIR due to this
- no -dev/-debug/-doc packages that need exclusion
- No dependencies in main that are only superficially tested requiring
  more tests now.

Problems: None

[Embedded sources and static linking]
OK:
- no embedded source present
- no static linking
- does not have odd Built-Using entries
- not a go package, no extra constraints to consider in that regard
- No vendoring used, all Built-Using are in main

Problems: None

[Security]
- history of CVEs does not look concerning
- does not run a daemon as root
- does not use webkit1,2
- does not use lib*v8 directly
- does not open a port/socket
- does not process arbitrary web content
- does not use centralized online accounts
- does not integrate arbitrary javascript into the desktop
- does not deal with system authentication (eg, pam), etc)
- does not deal with security attestation (secure boot, tpm, signatures)

Problems:
- does parse data formats (usually code in the current use, but not arbitrary
  and low attack surface)

[Common blockers]
OK:
- does not FTBFS currently
- does have a test suite that runs at build time
  - test suite fails will fail the build upon error.
- does have a test suite that runs as autopkgtest
- no special HW needed
- no new python2 dependency

Problems: None

[Packaging red flags]
OK:
- Ubuntu does not carry a delta
- symbols tracking not applicable for this kind of code.
- d/watch is present and looks ok
- Debian/Ubuntu update history is slow (matching upstream)
- the current release is packaged
- promoting this does not seem to cause issues for MOTUs that so far
  maintained the package
- no massive Lintian warnings
- d/rules is rather clean
- It is not on the lto-disabled list

Problems:
- Upstream update history is slow, not sure how much we can rely on it.
  Those kind of packages often are without being a problem, but we have to
  be clear this seems like a non (much) active upstream.

[Upstream red flags]
OK:
- no Errors/warnings during the build
- no incautious use of malloc/sprintf (perl only)
- no use of sudo, gksu, pkexec, or LD_LIBRARY_PATH
- no use of user nobody
- no use of setuid
- no important open bugs (crashers, etc) in Debian or Ubuntu
- no dependency on webkit, qtwebkit, seed or libgoa-*
- not part of the UI for extra checks
- no translation present, but none needed for this case

Problems: None


** Changed in: libindirect-perl (Ubuntu)
   Status: Confirmed => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1972853

Title:
  [MIR] lib*-perl

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libindirect-perl/+bug/1972853/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1972853] Re: [MIR] lib*-perl

2022-05-25 Thread Christian Ehrhardt 
Review for Package: libobject-pad-perl

[Summary]
MIR team ACK

This does not need a security review

List of specific binary packages to be promoted to main: libobject-pad-perl
Specific binary packages built, but NOT to be promoted to main: n/a

[Duplication]
There is no other package in main providing the same functionality.

[Dependencies]
OK:
- no other Dependencies to MIR due to this
- no -dev/-debug/-doc packages that need exclusion
- No dependencies in main that are only superficially tested requiring
  more tests now.

Problems: None

[Embedded sources and static linking]
OK:
- no embedded source present
- no static linking
- does not have odd Built-Using entries
- not a go package, no extra constraints to consider in that regard
- No vendoring used, all Built-Using are in main

Problems: None

[Security]
- history of CVEs does not look concerning
- does not run a daemon as root
- does not use webkit1,2
- does not use lib*v8 directly
- does not open a port/socket
- does not process arbitrary web content
- does not use centralized online accounts
- does not integrate arbitrary javascript into the desktop
- does not deal with system authentication (eg, pam), etc)
- does not deal with security attestation (secure boot, tpm, signatures)

Problems:
- does parse data formats (usually code in the current use, but not arbitrary
  and low attack surface)

[Common blockers]
OK:
- does not FTBFS currently
- does have a test suite that runs at build time
  - test suite fails will fail the build upon error.
- does have a test suite that runs as autopkgtest
- no special HW needed
- no new python2 dependency

Problems: None

[Packaging red flags]
OK:
- Ubuntu does not carry a delta
- symbols tracking not applicable for this kind of code.
- d/watch is present and looks ok
- Debian/Ubuntu update history is slow (matching upstream)
- the current release is packaged
- promoting this does not seem to cause issues for MOTUs that so far
  maintained the package
- no massive Lintian warnings
- d/rules is rather clean
- It is not on the lto-disabled list

Problems:
- Upstream update history is slow, not sure how much we can rely on it.
  Those kind of packages often are without being a problem, but we have to
  be clear this seems like a non (much) active upstream.

[Upstream red flags]
OK:
- no Errors/warnings during the build
- no incautious use of malloc/sprintf (perl only)
- no use of sudo, gksu, pkexec, or LD_LIBRARY_PATH
- no use of user nobody
- no use of setuid
- no important open bugs (crashers, etc) in Debian or Ubuntu
- no dependency on webkit, qtwebkit, seed or libgoa-*
- not part of the UI for extra checks
- no translation present, but none needed for this case

Problems: None


** Changed in: libobject-pad-perl (Ubuntu)
   Status: Confirmed => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1972853

Title:
  [MIR] lib*-perl

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libindirect-perl/+bug/1972853/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1972853] Re: [MIR] lib*-perl

2022-05-25 Thread Christian Ehrhardt 
Review for Package: libunicode-escape-perl

[Summary]
MIR team NACK
(outdated, unmaintained, alternatives in main)
Unless there is a very strong explanation why this can't be done with
the better alternatives this is a NACK.

This does not need a security review

List of specific binary packages to be promoted to main: libunicode-escape-perl
Specific binary packages built, but NOT to be promoted to main: n/a

Required TODOs:
- give it a reasonable evaluation please if the alternate modules already in
  main like libunicode-utf8-perl might be sufficient for what the new dependency
  needs from libunicode-escape-perl. Modern perl also supports unicode natively
  are we sure this isn't just a (very) old dependency here?
  Also 0.0.2 since 2011, given there are alternatives I'm really not convinced
  we should use this.
Recommended TODOs:
- The package should get a team bug subscriber before being promoted

[Duplication]
There is no other package in main providing the same functionality.

There are many similar ones though, like libstring-escape-perl for general
string escaping. And libunicode-utf8-perl for encode/decode of unicode.
Both are already in main.

Also modern perl supports unicode directly, do we really need this?

CPAN even has more https://metacpan.org/pod/Encode::Escape::Unicode
there might be a proliferation going on, but all except the perl-integrated
one have not seen updates in years.

And if this would not be needed, then libunicode-string-perl also would not
be needed to bepromoted/supported.

I'll add a check for that as required TODO to ensure we are not just re-adding
the same function. Especially since most of these libs seem outdated or at least
rarely updated, it is better to carry fewer.

[Dependencies]
OK:
- no other Dependencies to MIR due to this
- no -dev/-debug/-doc packages that need exclusion
- No dependencies in main that are only superficially tested requiring
  more tests now.

Problems: None

[Embedded sources and static linking]
OK:
- no embedded source present
- no static linking
- does not have odd Built-Using entries
- not a go package, no extra constraints to consider in that regard
- No vendoring used, all Built-Using are in main

Problems: None

[Security]
- history of CVEs does not look concerning
- does not run a daemon as root
- does not use webkit1,2
- does not use lib*v8 directly
- does not open a port/socket
- does not process arbitrary web content
- does not use centralized online accounts
- does not integrate arbitrary javascript into the desktop
- does not deal with system authentication (eg, pam), etc)
- does not deal with security attestation (secure boot, tpm, signatures)

Problems:
- does parse data formats (usually docs in the current use, but not arbitrary
  and low attack surface)

[Common blockers]
OK:
- does not FTBFS currently
- does have a test suite that runs at build time
  - test suite fails will fail the build upon error.
- does have a test suite that runs as autopkgtest
- no special HW needed
- no new python2 dependency

Problems: None

[Packaging red flags]
OK:
- Ubuntu does not carry a delta
- symbols tracking not applicable for this kind of code.
- d/watch is present and looks ok
- Debian/Ubuntu update history is slow (matching upstream)
- the current release is packaged
- promoting this does not seem to cause issues for MOTUs that so far
  maintained the package
- no massive Lintian warnings
- d/rules is rather clean
- It is not on the lto-disabled list

Problems:
- Upstream update history is slow, not sure how much we can rely on it.
  Those kind of packages often are without being a problem, but we have to
  be clear this seems like a non (much) active upstream.
  This package in particular 0.0.2 since 2011, given there are alternatives
  now I'm really not convinced we should use this.

[Upstream red flags]
OK:
- no Errors/warnings during the build
- no incautious use of malloc/sprintf (perl only)
- no use of sudo, gksu, pkexec, or LD_LIBRARY_PATH
- no use of user nobody
- no use of setuid
- no important open bugs (crashers, etc) in Debian or Ubuntu
- no dependency on webkit, qtwebkit, seed or libgoa-*
- not part of the UI for extra checks
- no translation present, but none needed for this case

Problems: None


** Changed in: libunicode-escape-perl (Ubuntu)
   Status: Confirmed => Incomplete

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1972853

Title:
  [MIR] lib*-perl

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libindirect-perl/+bug/1972853/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1972853] Re: [MIR] lib*-perl

2022-05-25 Thread Christian Ehrhardt 
Review for Package: libxs-parse-sublike-perl

[Summary]
MIR team ACK under the constraint to resolve the below listed
required TODOs and as much as possible having a look at the
recommended TODOs.

This does not need a security review

List of specific binary packages to be promoted to main: 
libxs-parse-sublike-perl
Specific binary packages built, but NOT to be promoted to main: n/a

Required TODOs:
- the autopkgtest is broken since forever on all but armhf, please fix this
Recommended TODOs:
- The package should get a team bug subscriber before being promoted

[Duplication]
There is no other package in main providing the same functionality.

[Dependencies]
OK:
- no other Dependencies to MIR due to this
- no -dev/-debug/-doc packages that need exclusion
- No dependencies in main that are only superficially tested requiring
  more tests now.

Problems: None

[Embedded sources and static linking]
OK:
- no embedded source present
- no static linking
- does not have odd Built-Using entries
- not a go package, no extra constraints to consider in that regard
- No vendoring used, all Built-Using are in main

Problems: None

[Security]
- history of CVEs does not look concerning
- does not run a daemon as root
- does not use webkit1,2
- does not use lib*v8 directly
- does not open a port/socket
- does not process arbitrary web content
- does not use centralized online accounts
- does not integrate arbitrary javascript into the desktop
- does not deal with system authentication (eg, pam), etc)
- does not deal with security attestation (secure boot, tpm, signatures)

Problems:
- does parse data formats (usually code in the current use, but not arbitrary
  and low attack surface)

[Common blockers]
OK:
- does not FTBFS currently
- does have a test suite that runs at build time
  - test suite fails will fail the build upon error.
- does have a test suite that runs as autopkgtest
- no special HW needed
- no new python2 dependency

Problems:
- the current autopkgtest fails and does so since impish which is why it
  isn't flagged. But this might represent an underlying problem with not only
  the test but the program, we should fix this before considering it ready.

[Packaging red flags]
OK:
- Ubuntu does not carry a delta
- symbols tracking not applicable for this kind of code.
- d/watch is present and looks ok
- Debian/Ubuntu update history is slow (matching upstream)
- the current release is packaged
- promoting this does not seem to cause issues for MOTUs that so far
  maintained the package
- no massive Lintian warnings
- d/rules is rather clean
- It is not on the lto-disabled list

Problems:
- Upstream update history is slow, not sure how much we can rely on it.
  Those kind of packages often are without being a problem, but we have to
  be clear this seems like a non (much) active upstream.

[Upstream red flags]
OK:
- no Errors/warnings during the build
- no incautious use of malloc/sprintf (perl only)
- no use of sudo, gksu, pkexec, or LD_LIBRARY_PATH
- no use of user nobody
- no use of setuid
- no important open bugs (crashers, etc) in Debian or Ubuntu
- no dependency on webkit, qtwebkit, seed or libgoa-*
- not part of the UI for extra checks
- no translation present, but none needed for this case

Problems: None


** Changed in: libxs-parse-sublike-perl (Ubuntu)
   Status: Confirmed => Incomplete

** Changed in: libindirect-perl (Ubuntu)
 Assignee: Christian Ehrhardt  (paelzer) => (unassigned)

** Changed in: libobject-pad-perl (Ubuntu)
 Assignee: Christian Ehrhardt  (paelzer) => (unassigned)

** Changed in: libunicode-escape-perl (Ubuntu)
 Assignee: Christian Ehrhardt  (paelzer) => (unassigned)

** Changed in: libunicode-string-perl (Ubuntu)
 Assignee: Christian Ehrhardt  (paelzer) => (unassigned)

** Changed in: libxs-parse-sublike-perl (Ubuntu)
 Assignee: Christian Ehrhardt  (paelzer) => (unassigned)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1972853

Title:
  [MIR] lib*-perl

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libindirect-perl/+bug/1972853/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1972853] Re: [MIR] lib*-perl

2022-05-25 Thread Christian Ehrhardt 
Review for Package: libunicode-string-perl

[Summary]
MIR team NACK
(indirectly, since libunicode-escape-perl got a NACK)
Once resolved there this can be re-considere. In that case it would be a usual
ack under constraint to resolve the required todos below.

This does not need a security review

List of specific binary packages to be promoted to main: libunicode-string-perl
Specific binary packages built, but NOT to be promoted to main: n/a

Notes:
Required TODOs:
- give it a reasonable evaluation please if the need for this from the
  depending package might nowadays be fulfillable with perls native unicode
  support that it has.
Recommended TODOs:
- The package should get a team bug subscriber before being promoted

[Duplication]
There is no other package in main providing the same functionality.

But that is only true if one insists on the old style handling.
Newer perl supports unicode and the package states that itself:
"These modules predate native Unicode support inside Perl.  Normally, the
integrated Perl Unicode support and modules such as Encode should be used
instead of these modules."

We should avoid picking this up by accident, unless the dependency triggering
this does strictly need one of the few special features here it should be
better to get rid of the dependency to this old module.

Please start those checks at libunicode-escape-perl which has a similar
problem and if that isn't needed then libunicode-string-perl is not needed
either.


[Dependencies]
OK:
- no other Dependencies to MIR due to this
- no -dev/-debug/-doc packages that need exclusion
- No dependencies in main that are only superficially tested requiring
  more tests now.

Problems: None

[Embedded sources and static linking]
OK:
- no embedded source present
- no static linking
- does not have odd Built-Using entries
- not a go package, no extra constraints to consider in that regard
- No vendoring used, all Built-Using are in main

Problems: None

[Security]
- history of CVEs does not look concerning
- does not run a daemon as root
- does not use webkit1,2
- does not use lib*v8 directly
- does not open a port/socket
- does not process arbitrary web content
- does not use centralized online accounts
- does not integrate arbitrary javascript into the desktop
- does not deal with system authentication (eg, pam), etc)
- does not deal with security attestation (secure boot, tpm, signatures)

Problems:
- does parse data formats (usually docs in the current use, but not arbitrary
  and low attack surface)

[Common blockers]
OK:
- does not FTBFS currently
- does have a test suite that runs at build time
  - test suite fails will fail the build upon error.
- does have a test suite that runs as autopkgtest
- no special HW needed
- no new python2 dependency

Problems: None

[Packaging red flags]
OK:
- Ubuntu does not carry a delta
- symbols tracking not applicable for this kind of code.
- d/watch is present and looks ok
- Debian/Ubuntu update history is slow (matching upstream)
- the current release is packaged
- promoting this does not seem to cause issues for MOTUs that so far
  maintained the package
- no massive Lintian warnings
- d/rules is rather clean
- It is not on the lto-disabled list

Problems:
- Upstream update history is slow, not sure how much we can rely on it.
  Those kind of packages often are without being a problem, but we have to
  be clear this seems like a non (much) active upstream.

[Upstream red flags]
OK:
- no Errors/warnings during the build
- no incautious use of malloc/sprintf (perl only)
- no use of sudo, gksu, pkexec, or LD_LIBRARY_PATH
- no use of user nobody
- no use of setuid
- no important open bugs (crashers, etc) in Debian or Ubuntu
- no dependency on webkit, qtwebkit, seed or libgoa-*
- not part of the UI for extra checks
- no translation present, but none needed for this case

Problems: None


** Changed in: libunicode-string-perl (Ubuntu)
   Status: Confirmed => Incomplete

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1972853

Title:
  [MIR] lib*-perl

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libindirect-perl/+bug/1972853/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1959548] Re: [22.04 FEAT] zcrypt DD: Exploitation Support of new IBM Z Crypto Hardware (s390-tools part)

2022-05-25 Thread Frank Heimes
A test build in PPA was done and is available here:
https://launchpad.net/~fheimes/+archive/ubuntu/lp1959548

** Changed in: ubuntu-z-systems
   Status: Incomplete => In Progress

** Changed in: s390-tools (Ubuntu)
   Status: Incomplete => In Progress

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1959548

Title:
  [22.04 FEAT] zcrypt DD: Exploitation Support of new IBM Z Crypto
  Hardware (s390-tools part)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1959548/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1871015] Re: test_vxlan_under_vrf.sh in net from ubuntu_kernel_selftests failed (Check VM connectivity through VXLAN (underlay in the default VRF) [FAIL])

2022-05-25 Thread Po-Hsu Lin
** Description changed:

  [Impact]
- The test_vxlan_under_vrf.sh in the net category of ubuntu_kernel_selftests 
will fail on 5.13 kernel with:
+ test_vxlan_under_vrf.sh in the net category of ubuntu_kernel_selftests
+ will fail on 5.13 kernel with:
  
-  # selftests: net: test_vxlan_under_vrf.sh
-  # Checking HV connectivity[ OK ]
-  # Check VM connectivity through VXLAN (underlay in the default VRF)  [FAIL]
-  not ok 1 selftests: net: test_vxlan_under_vrf.sh # exit=1
+   # selftests: net: test_vxlan_under_vrf.sh
+   # Checking HV connectivity [ OK ]
+   # Check VM connectivity through VXLAN (underlay in the default VRF) [FAIL]
+   not ok 1 selftests: net: test_vxlan_under_vrf.sh # exit=1
  
  [Fix]
  * e7e4785f selftests: net: test_vxlan_under_vrf: fix HV connectivity test
  * b50d3b46 selftests: test_vxlan_under_vrf: Fix broken test case
  
  The first patch (e7e4785f) can be cherry-picked to Impish 5.13 and
  F-oem-5.14.
  
  Note that this test is not failing on F-oem-5.14, but it's better to
  have it applied to reduce the maintenance cost.
  
- After the first patch was applied, we will need the second patch on Impish 
5.13 to solve the another failure, which we made it an expected failure (XFAIL) 
with SAUCE patches:
- Check VM connectivity through VXLAN (underlay in a VRF)   [XFAIL]
+ After the first patch was applied, we will need the second patch on
+ Impish 5.13 to solve the another failure, which we made it an expected
+ failure (XFAIL) with SAUCE patches:
+   Check VM connectivity through VXLAN (underlay in a VRF) [XFAIL]
  
- The second patch (b50d3b46) can be cherry-picked with must be applied
- with -C2 due to our SAUCE patches. F-oem-5.14 has already got this one
- applied.
+ The second patch (b50d3b46) can be cherry-picked to Impish 5.13 but
+ must be applied with -C2 due to our SAUCE patches. F-oem-5.14 has
+ already got this one applied.
  
  [Test]
- Patch tested on Impish 5.13 and F-oem-5.14, this test_vxlan_under_vrf.sh test 
can pass without any issue:
- Checking HV connectivity   [ OK ]
- Check VM connectivity through VXLAN (underlay in the default VRF)  [ OK ]
- Check VM connectivity through VXLAN (underlay in a VRF)[ OK ]
+ With the patched test_vxlan_under_vrf.sh test, it can pass on Impish
+ 5.13 and F-oem-5.14 without any issue:
+   Checking HV connectivity [ OK ]
+   Check VM connectivity through VXLAN (underlay in the default VRF) [ OK ]
+   Check VM connectivity through VXLAN (underlay in a VRF) [ OK ]
  
  [Where problems could occur]
- Change limit to test cases, should not have any real impact to kernel 
functions. But if these fixes are incorrect we will see failures in our 
regression-testing report. The worst scenario is getting false-negative results.
+ Change limit to test cases, should not have any real impact to any
+ kernel functions. But if these fixes are incorrect we will see
+ failures in our regression-testing report. The worst scenario is
+ getting false-negative results.
+ 
  
  [Original Bug Report]
  Issue found with GCP 5.3.0-1017.18~18.04.1
  
   # selftests: net: test_vxlan_under_vrf.sh
   # Checking HV connectivity [ OK ]
   # Check VM connectivity through VXLAN (underlay in the default VRF) [FAIL]
   not ok 25 selftests: net: test_vxlan_under_vrf.sh # exit=1
  
  The failure is different from bug 1837348

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1871015

Title:
  test_vxlan_under_vrf.sh in net from ubuntu_kernel_selftests failed
  (Check VM connectivity through VXLAN (underlay in the default VRF)
  [FAIL])

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1871015/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1971933] Re: [Regression] Unable to wake laptop using trackpad input

2022-05-25 Thread John Smith
Didn't Work.
---
I removed acpi_os parameters,

updated grub with update-grub,

rebooted,

touchpad still does not wakeup device, and,

$ pwd
/sys/devices/pci:00/:00:15.1/i2c_designware.1/i2c-2/i2c-DLL0798:00/power

$ ls -la
total 0
drwxr-xr-x 2 root root0 May 25 14:55 .
drwxr-xr-x 4 root root0 May 25 14:34 ..
-rw-r--r-- 1 root root 4096 May 25 14:55 async
-rw-r--r-- 1 root root 4096 May 25 14:55 autosuspend_delay_ms
-rw-r--r-- 1 root root 4096 May 25 14:55 control
-r--r--r-- 1 root root 4096 May 25 14:55 runtime_active_kids
-r--r--r-- 1 root root 4096 May 25 14:55 runtime_active_time
-r--r--r-- 1 root root 4096 May 25 14:55 runtime_enabled
-r--r--r-- 1 root root 4096 May 25 14:55 runtime_status
-r--r--r-- 1 root root 4096 May 25 14:55 runtime_suspended_time
-r--r--r-- 1 root root 4096 May 25 14:55 runtime_usage

** Attachment added: "updated grub"
   
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1971933/+attachment/5592829/+files/grub

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1971933

Title:
  [Regression] Unable to wake laptop using trackpad input

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1971933/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1975685] [NEW] Wifi hotspot does not work when band A is selected

2022-05-25 Thread Tom Cook
Public bug reported:

I'm using a built-in RTL8822BE WiFi adapter on a Ryzen 7 system.  When I
create a hotspot by opening the GNOME settings app, opening the WiFi
settings page and selecting "Turn on hotspot..." from the drop-down
menu, everything works fine.  If I then open nm-connection-editor and
edit the connection to select band A (5GHz), the hotspot fails to start.
If I then open the connection editor again and switch back to automatic
band selection, the hotspot works again.

When it fails, this appears in syslog:

May 25 10:21:30 frog NetworkManager[815]:   [1653470490.8638] device 
(wlo1): Activation: starting connection 'Hotspot' 
(514f603b-25e2-4c1e-9220-7b77ed966ff5)
May 25 10:21:30 frog NetworkManager[815]:   [1653470490.8643] device 
(wlo1): supplicant interface state: completed -> disconnected
May 25 10:21:30 frog NetworkManager[815]:   [1653470490.8653] device 
(wlo1): state change: disconnected -> prepare (reason 'none', sys-iface-state: 
'managed')
May 25 10:21:30 frog NetworkManager[815]:   [1653470490.8676] device 
(wlo1): state change: prepare -> config (reason 'none', sys-iface-state: 
'managed')
May 25 10:21:30 frog NetworkManager[815]:   [1653470490.8783] device 
(wlo1): Activation: (wifi) access point 'Hotspot' has security, but secrets are 
required.
May 25 10:21:30 frog NetworkManager[815]:   [1653470490.8783] device 
(wlo1): state change: config -> need-auth (reason 'none', sys-iface-state: 
'managed')
May 25 10:21:30 frog NetworkManager[815]:   [1653470490.8800] device 
(wlo1): state change: need-auth -> prepare (reason 'none', sys-iface-state: 
'managed')
May 25 10:21:30 frog NetworkManager[815]:   [1653470490.8810] device 
(wlo1): state change: prepare -> config (reason 'none', sys-iface-state: 
'managed')
May 25 10:21:30 frog NetworkManager[815]:   [1653470490.8883] device 
(wlo1): Activation: (wifi) connection 'Hotspot' has security, and secrets 
exist.  No new secrets needed.
May 25 10:21:30 frog wpa_supplicant[866]: wlo1: Failed to start AP functionality
May 25 10:21:56 frog NetworkManager[815]:   [1653470516.1521] device 
(wlo1): Activation: (wifi) Hotspot network creation took too long, failing 
activation
May 25 10:21:56 frog NetworkManager[815]:   [1653470516.1522] device 
(wlo1): state change: config -> failed (reason 'supplicant-timeout', 
sys-iface-state: 'managed')
May 25 10:21:56 frog NetworkManager[815]:   [1653470516.1526] device 
(wlo1): Activation: failed for connection 'Hotspot'
May 25 10:21:56 frog wpa_supplicant[866]: wlo1: CTRL-EVENT-DSCP-POLICY clear_all
May 25 10:21:56 frog NetworkManager[815]:   [1653470516.1530] device 
(wlo1): state change: failed -> disconnected (reason 'none', sys-iface-state: 
'managed')
May 25 10:21:56 frog wpa_supplicant[866]: wlo1: Reject scan trigger since one 
is already pending
May 25 10:21:59 frog wpa_supplicant[866]: wlo1: CTRL-EVENT-REGDOM-CHANGE 
init=BEACON_HINT type=UNKNOWN

I'm guessing that NetworkManager is getting the way it drives
wpa_supplicant wrong when the 5GHz band is selected, but it's only a
guess.

Ubuntu version is:

tkcook@frog:~$ lsb_release -rd
Description:Ubuntu 22.04 LTS
Release:22.04

NetworkManager version is:

tkcook@frog:~$ apt-cache policy network-manager-gnome
network-manager-gnome:
  Installed: 1.24.0-1ubuntu3
  Candidate: 1.24.0-1ubuntu3
  Version table:
 *** 1.24.0-1ubuntu3 500
500 http://gb.archive.ubuntu.com/ubuntu jammy/main amd64 Packages
100 /var/lib/dpkg/status

ProblemType: Bug
DistroRelease: Ubuntu 22.04
Package: network-manager-gnome 1.24.0-1ubuntu3
Uname: Linux 5.18.0 x86_64
ApportVersion: 2.20.11-0ubuntu82.1
Architecture: amd64
CasperMD5CheckResult: pass
CurrentDesktop: ubuntu:GNOME
Date: Wed May 25 10:29:37 2022
InstallationDate: Installed on 2021-08-27 (270 days ago)
InstallationMedia: Ubuntu 21.04 "Hirsute Hippo" - Release amd64 (20210420)
SourcePackage: network-manager-applet
UpgradeStatus: Upgraded to jammy on 2022-05-05 (19 days ago)
nmcli-nm:
 RUNNING  VERSION  STATE  STARTUP  CONNECTIVITY  NETWORKING  WIFI-HW  WIFI  
   WWAN-HW  WWAN 
 running  1.36.4   connected  started  full  enabled enabled  
enabled  enabled  disabled

** Affects: network-manager-applet (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: amd64 apport-bug jammy third-party-packages

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1975685

Title:
  Wifi hotspot does not work when band A is selected

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/network-manager-applet/+bug/1975685/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1786013] Autopkgtest regression report (linux-meta-aws-5.4/5.4.0.1075.57)

2022-05-25 Thread Ubuntu SRU Bot
All autopkgtests for the newly accepted linux-meta-aws-5.4 (5.4.0.1075.57) for 
bionic have finished running.
The following regressions have been reported in tests triggered by the package:

systemd/237-3ubuntu10.53 (amd64)
lxc/3.0.3-0ubuntu1~18.04.1 (amd64)
kpatch/0.5.0-0ubuntu1.1 (amd64)


Please visit the excuses page listed below and investigate the failures, 
proceeding afterwards as per the StableReleaseUpdates policy regarding 
autopkgtest regressions [1].

https://people.canonical.com/~ubuntu-archive/proposed-
migration/bionic/update_excuses.html#linux-meta-aws-5.4

[1] https://wiki.ubuntu.com/StableReleaseUpdates#Autopkgtest_Regressions

Thank you!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1786013

Title:
  Packaging resync

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1786013/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1975687] [NEW] Please enable delayacct by default

2022-05-25 Thread Gionatan Danti
Public bug reported:

Recent kernel commit disabled delayacct by default (see here:
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e4042ad492357fa995921376462b04a025dd53b6),
which partially breaks "iotop".

Please change grub kernel command line to re-enable delayacct by
default. Alternatively, please revert the commit above.

Ubuntu version affected (via "lsb_release -rd"):
Description:Ubuntu 22.04 LTS
Release:22.04

** Affects: linux-meta (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1975687

Title:
  Please enable delayacct by default

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-meta/+bug/1975687/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1975576] Re: [SRU] Connect to WPA3 failed - Secrets were required, but not provided

2022-05-25 Thread Lukas Märdian
** Changed in: netplan.io (Ubuntu Focal)
   Status: New => Triaged

** Changed in: netplan.io (Ubuntu Focal)
   Importance: Undecided => Medium

** Changed in: netplan.io (Ubuntu Jammy)
   Status: New => Triaged

** Changed in: netplan.io (Ubuntu Jammy)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1975576

Title:
  [SRU] Connect to WPA3 failed - Secrets were required, but not provided

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/netplan.io/+bug/1975576/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1975688] [NEW] Accessing squashfs with lzma compression is ~16% slower in 5.15 when compared to 5.4, on an RPi3 B+

2022-05-25 Thread Alfonso Sanchez-Beato
Public bug reported:

On the server image on an RPi3 B+, I run this script:

```
#!/bin/bash -eu
mount_and_read()
{
local snap=$1
local mnt_d=$2
mount "$snap" "$mnt_d"

# We should not use /dev/null here, see
# 
https://unix.stackexchange.com/questions/512362/why-does-tar-appear-to-skip-file-contents-when-output-file-is-dev-null
tar -cO "$mnt_d"/ > /dev/zeros
}

snap_d=$(mktemp -d)
for i in {1..3}; do
sync && echo 3 > /proc/sys/vm/drop_caches
time mount_and_read "$1" "$snap_d"
umount "$snap_d"
done
rmdir "$snap_d"
```

With these commands:
$ sudo mount -t tmpfs -o size=400M tmpfs tmpfs/
$ cd tmpfs
$ snap download core22
$ sudo ../measure-snap-mnt.sh core22_169.snap

I get these results on 20.04:
real0m21.667s
user0m0.302s
sys 0m20.299s

real0m21.650s
user0m0.351s
sys 0m20.417s

real0m21.718s
user0m0.285s
sys 0m20.528s

On 22.04 server image:
real0m25.084s
user0m0.407s
sys 0m23.778s

real0m25.064s
user0m0.397s
sys 0m23.768s

real0m25.051s
user0m0.369s
sys 0m23.803s

Which is a considerable difference. This affects snaps compressed with
xz, and although these measurements are for server the bigger impact is
on UC images, where the boot time increases considerably because of
this.

** Affects: linux-raspi (Ubuntu)
 Importance: Undecided
 Status: New

** Summary changed:

- Accessing squashfs with lzma compression is ~16% slower in 5.15 when compared 
to 5.4
+ Accessing squashfs with lzma compression is ~16% slower in 5.15 when compared 
to 5.4, on an RPi3 B+

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1975688

Title:
  Accessing squashfs with lzma compression is ~16% slower in 5.15 when
  compared to 5.4, on an RPi3 B+

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-raspi/+bug/1975688/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1871015] Re: test_vxlan_under_vrf.sh in net from ubuntu_kernel_selftests failed (Check VM connectivity through VXLAN (underlay in the default VRF) [FAIL])

2022-05-25 Thread Po-Hsu Lin
https://lists.ubuntu.com/archives/kernel-team/2022-May/130587.html

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1871015

Title:
  test_vxlan_under_vrf.sh in net from ubuntu_kernel_selftests failed
  (Check VM connectivity through VXLAN (underlay in the default VRF)
  [FAIL])

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1871015/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1975391] Re: Subiquity crashes if the hd contains a previous Proxmox PVE install

2022-05-25 Thread Typhoe
Ok, thank you.

If I encounter the error again or manage to reproduce it, I'll post the
logs here then!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1975391

Title:
  Subiquity crashes if the hd contains a previous Proxmox PVE install

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/subiquity/+bug/1975391/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1973041] Re: llvm-toolchain-13: please backport Risc-V .insn directive support

2022-05-25 Thread Simon Chopin
Refreshed version of the same thing, with the merge fixed, adding
Replaces/Breaks fields due to the Ubuntu/Debian divergence on which
package ships the new static libraries.

I used the dh-exec mechanism for the i386 exception as it is what is
used in the current Salsa 13 branch for their grpc-unable architectures,
thus it'll eventually reduce the delta.

The .insn patch has been forwarded to Debian:
https://salsa.debian.org/pkg-llvm-team/llvm-
toolchain/-/merge_requests/89

** Patch added: "llvm-13.debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/llvm-toolchain-13/+bug/1973041/+attachment/5592872/+files/llvm-13.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1973041

Title:
  llvm-toolchain-13: please backport Risc-V .insn directive support

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/llvm-toolchain-13/+bug/1973041/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1975616] Re: [UBUNTU 20.04] Several "failed assertion in udev" messages causing unexpected errors in the system

2022-05-25 Thread Frank Heimes
** Also affects: ubuntu-z-systems
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1975616

Title:
  [UBUNTU 20.04] Several "failed assertion in udev" messages causing
  unexpected errors in the system

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1975616/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1975616] Re: [UBUNTU 20.04] Several "failed assertion in udev" messages causing unexpected errors in the system

2022-05-25 Thread Frank Heimes
Thanks for raising this.

Please let me mention a few observations:
- The kernel that is in use is (significantly) outdated: 5.4.0-80-generic (Jul 
9 17:41:33 UTC 2021), there is a delta of about 20 missed kernel updates.
- And the system as a whole is outdated as well, since it reports "20.04.2 LTS".
  Please notice that every new point release replaces the previous one
  and with that makes it obsolete and no longer supported.
  We are btw. currently at 20.04.4 (20.04.5 will come in August).
  On top a system needs to receive regular (functional and security) updates,
  for example with the help of:
  sudo apt update
   
  sudo apt upgrade
  An up-to-date system will obviously have lot's of mlx5 kernel fixes
  as well as systemd, udev and other user-land patches included.
- So please reproduce this with the latest levels, on an up-to-date system.
  Otherwise time and effort might be wasted at both parties on hunting down bugs
  that are potentially already fixed.

I'm also reading that "this is a customer machine", in such a case it's
preferred to open a SalesForce ticket (for support cases) rather than a
Launchpad bug (for development tasks).

And without crash/dump files one can only roughly assume what might
happen.

A first brief investigation of some of the messages, seem to point to a 
potential problem of the hw-fw/driver combination.
So please also double-check if the firmware of the RoCE/Mellanox adapter is on 
the very latest fw level.

** Changed in: linux (Ubuntu)
   Status: New => Incomplete

** Changed in: ubuntu-z-systems
   Status: New => Incomplete

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1975616

Title:
  [UBUNTU 20.04] Several "failed assertion in udev" messages causing
  unexpected errors in the system

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1975616/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1872984] Re: RTL8822BE [10ec:b822] network driver rtl_wifi crashes on boot in Focal Fossa 20.04 - 5.4.0-21-generic and mainline 5.7.0-050700rc1-generic

2022-05-25 Thread Vincent Pottier
I experienced the bug on my Lenovo IdeaPad L340-17IWL with Ubuntu 20.04 up to 
date and a Realtech rtw_8821ce.
I spend hours to try to find a setting, practicing the Computer Assisted Waste 
of Time.
I bought an external wifi dongle with another Realtech 81... chip (I've not it 
at hand now) and experienced also the failure of the wifi after some times.
As said by delfi above. I still experience the bug after a while after a fresh 
install of Ubuntu 22.04.
More than 2 years that the bug is known...

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1872984

Title:
  RTL8822BE [10ec:b822] network driver rtl_wifi crashes on boot in Focal
  Fossa 20.04 - 5.4.0-21-generic and mainline 5.7.0-050700rc1-generic

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1872984/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1871148] Re: services start before apparmor profiles are loaded

2022-05-25 Thread Alberto Mardegan
Oh, this is interesting! Then, Etienne, my suggestion is the following:
re-enable the snapd.apparmor service, and if that (as I expect) fixes
the bug, let's stop discussing this issue here, and instead open a
separate issue about the service being disabled.

It may be that something went wrong during the upgrade to Jammy. If we
file this as a separate bug, we might be able to see if other people
have met the same issue.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1871148

Title:
  services start before apparmor profiles are loaded

To manage notifications about this bug go to:
https://bugs.launchpad.net/apparmor/+bug/1871148/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1975691] [NEW] Remvoe SAUCE patches from test_vxlan_under_vrf.sh in net of ubuntu_kernel_selftests

2022-05-25 Thread Po-Hsu Lin
Public bug reported:

[Impact]
test_vxlan_under_vrf.sh should not be failing anymore (except if it's a config 
related issue) with patches submitted for I-5.13 / F-oem-5.14 in bug 1871015

We should remove the SAUCE patches that mark "vxlan_under_vrf" failure
as expected failure to catch regressions in the future.

[Fix]
Revert the following patches:
* UBUNTU: SAUCE: selftests: net: Make test for VXLAN underlay in non-default 
VRF an expected failure
* UBUNTU: SAUCE: selftests: net: Don't fail test_vxlan_under_vrf on xfail

[Test]


[Where problems could occur]
Change limit to test cases, should not have any real impact to any
kernel functions. We may see failures reported from this test in
our SRU regression-testing report in the future, but it means we're
doing the right thing.

** Affects: ubuntu-kernel-tests
 Importance: Undecided
 Assignee: Po-Hsu Lin (cypressyew)
 Status: In Progress

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: linux-oem-5.14 (Ubuntu)
 Importance: Undecided
 Status: New

** Changed in: ubuntu-kernel-tests
 Assignee: (unassigned) => Po-Hsu Lin (cypressyew)

** Changed in: ubuntu-kernel-tests
   Status: New => In Progress

** Also affects: linux (Ubuntu)
   Importance: Undecided
   Status: New

** Also affects: linux-oem-5.14 (Ubuntu)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1975691

Title:
  Remvoe SAUCE patches from test_vxlan_under_vrf.sh in net of
  ubuntu_kernel_selftests

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1975691/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1975690] [NEW] kernel 5.13.0-41 and 5.13.0-44 do not boot

2022-05-25 Thread Michel Sauvard
Public bug reported:

the kernel updates for linux Mint 5.13.0.41 then 5.13.0-44 do not boot.
Nothing on the screen or journalctl.
I tried to add debug=vc and break=top on the boot line with nothing else.
I also tried to use the root='hd0,gpt6' syntax instead of root=UUID=... but the 
file system is seen because if I replace initrd.img-5.13.0-44-generic by a copy 
of initrd.img-5.13.0-40-generic I have some display
5.13.0-40 works fine, and the root, debug and break options work fine in it.
ubuntu-bug does not work saying linux-image-5.13.0-40-generic is not an 
official package and no crash report
I join files for lspci -vnvn

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: boot initrd kernel

** Attachment added: "lspci-vnvn.log"
   
https://bugs.launchpad.net/bugs/1975690/+attachment/5592873/+files/lspci-vnvn.log

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1975690

Title:
  kernel 5.13.0-41 and 5.13.0-44 do not boot

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1975690/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1970957] Re: suspend problem

2022-05-25 Thread bigblackcar
On my X1 Carbon I seem to have solved the issue by:
1. changing the BIOS so the Sleep State is in mode "Linux" as opposed to 
"Windows and Linux"
2. using Xorg instead of Wayland. -> When you log in, before inserting the 
password, click on the cog on the bottom right and choose the "Ubuntu on Xorg" 
option.

YMMV, but since I lost a day I wrote my solution here in case it helps
someone.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1970957

Title:
  suspend problem

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1970957/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1973564] Re: File dialog doesn't return current filter in Ubuntu 20.04

2022-05-25 Thread Robie Basak
Hello Ted, or anyone else affected,

Accepted xdg-desktop-portal into focal-proposed. The package will build
now and be available at https://launchpad.net/ubuntu/+source/xdg-
desktop-portal/1.6.0-1ubuntu1 in a few hours, and then in the -proposed
repository.

Please help us by testing this new package.  See
https://wiki.ubuntu.com/Testing/EnableProposed for documentation on how
to enable and use -proposed.  Your feedback will aid us getting this
update out to other Ubuntu users.

If this package fixes the bug for you, please add a comment to this bug,
mentioning the version of the package you tested, what testing has been
performed on the package and change the tag from verification-needed-
focal to verification-done-focal. If it does not fix the bug for you,
please add a comment stating that, and change the tag to verification-
failed-focal. In either case, without details of your testing we will
not be able to proceed.

Further information regarding the verification process can be found at
https://wiki.ubuntu.com/QATeam/PerformingSRUVerification .  Thank you in
advance for helping!

N.B. The updated package will be released to -updates after the bug(s)
fixed by this package have been verified and the package has been in
-proposed for a minimum of 7 days.

** Tags added: verification-needed verification-needed-focal

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1973564

Title:
  File dialog doesn't return current filter in Ubuntu 20.04

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xdg-desktop-portal/+bug/1973564/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1973564] Please test proposed package

2022-05-25 Thread Robie Basak
Hello Ted, or anyone else affected,

Accepted xdg-desktop-portal-gtk into focal-proposed. The package will
build now and be available at https://launchpad.net/ubuntu/+source/xdg-
desktop-portal-gtk/1.6.0-1ubuntu1 in a few hours, and then in the
-proposed repository.

Please help us by testing this new package.  See
https://wiki.ubuntu.com/Testing/EnableProposed for documentation on how
to enable and use -proposed.  Your feedback will aid us getting this
update out to other Ubuntu users.

If this package fixes the bug for you, please add a comment to this bug,
mentioning the version of the package you tested, what testing has been
performed on the package and change the tag from verification-needed-
focal to verification-done-focal. If it does not fix the bug for you,
please add a comment stating that, and change the tag to verification-
failed-focal. In either case, without details of your testing we will
not be able to proceed.

Further information regarding the verification process can be found at
https://wiki.ubuntu.com/QATeam/PerformingSRUVerification .  Thank you in
advance for helping!

N.B. The updated package will be released to -updates after the bug(s)
fixed by this package have been verified and the package has been in
-proposed for a minimum of 7 days.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1973564

Title:
  File dialog doesn't return current filter in Ubuntu 20.04

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xdg-desktop-portal/+bug/1973564/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1964983] Re: IPU6 camera has no function on Andrews MLK

2022-05-25 Thread You-Sheng Yang
SRU v7: https://lists.ubuntu.com/archives/kernel-
team/2022-May/130591.html (jammy)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1964983

Title:
  IPU6 camera has no function on Andrews MLK

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1964983/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1955383] Re: Support Intel IPU6 MIPI camera on Alder Lake platforms

2022-05-25 Thread You-Sheng Yang
SRU v7: https://lists.ubuntu.com/archives/kernel-
team/2022-May/130591.html (jammy)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1955383

Title:
  Support Intel IPU6 MIPI camera on Alder Lake platforms

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1955383/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1958006] Re: multiple UBSAN warnings in Intel IPU6 camera driver at boot

2022-05-25 Thread You-Sheng Yang
SRU v7: https://lists.ubuntu.com/archives/kernel-
team/2022-May/130591.html (jammy)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1958006

Title:
  multiple UBSAN warnings in Intel IPU6 camera driver at boot

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1958006/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1947127] Fix included in openstack/neutron 19.3.0

2022-05-25 Thread OpenStack Infra
This issue was fixed in the openstack/neutron 19.3.0  release.

** Changed in: cloud-archive/xena
   Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1947127

Title:
  [SRU] Some DNS extensions not working with OVN

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-archive/+bug/1947127/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1871015] Re: test_vxlan_under_vrf.sh in net from ubuntu_kernel_selftests failed (Check VM connectivity through VXLAN (underlay in the default VRF) [FAIL])

2022-05-25 Thread Po-Hsu Lin
** Description changed:

  [Impact]
  test_vxlan_under_vrf.sh in the net category of ubuntu_kernel_selftests
  will fail on 5.13 kernel with:
  
# selftests: net: test_vxlan_under_vrf.sh
# Checking HV connectivity [ OK ]
# Check VM connectivity through VXLAN (underlay in the default VRF) [FAIL]
not ok 1 selftests: net: test_vxlan_under_vrf.sh # exit=1
  
+ Note that this test is not failing on F-oem-5.14 / J-oem-5.17, but
+ it's better to have corresponding patches applied to reduce the
+ maintenance cost in the future.
+ 
  [Fix]
  * e7e4785f selftests: net: test_vxlan_under_vrf: fix HV connectivity test
  * b50d3b46 selftests: test_vxlan_under_vrf: Fix broken test case
  
- The first patch (e7e4785f) can be cherry-picked to Impish 5.13 and
- F-oem-5.14.
+ First patch (e7e4785f):
+   - Can be cherry-picked to Impish 5.13
+   - Can be cherry-picked to F-oem-5.14.
+ Second patch (b50d3b46):
+   - Can be cherry-picked to Impish 5.13 (-C2 is required while
+ applying it due to our SAUCE patches)
+   - F-oem-5.14 has already got this one applied.
+   - Can be cherry-picked to J-oem-5.17
  
- Note that this test is not failing on F-oem-5.14, but it's better to
- have it applied to reduce the maintenance cost.
- 
- After the first patch was applied, we will need the second patch on
- Impish 5.13 to solve the another failure, which we made it an expected
+ The reason why we need the second patch is that after the first one
+ got applied, we will see another failure, which we made it an expected
  failure (XFAIL) with SAUCE patches:
Check VM connectivity through VXLAN (underlay in a VRF) [XFAIL]
  
- The second patch (b50d3b46) can be cherry-picked to Impish 5.13 but
- must be applied with -C2 due to our SAUCE patches. F-oem-5.14 has
- already got this one applied.
- 
  [Test]
  With the patched test_vxlan_under_vrf.sh test, it can pass on Impish
- 5.13 and F-oem-5.14 without any issue:
+ 5.13, F-oem-5.14 and J-oem-5.17 without any issue:
Checking HV connectivity [ OK ]
Check VM connectivity through VXLAN (underlay in the default VRF) [ OK ]
Check VM connectivity through VXLAN (underlay in a VRF) [ OK ]
  
  [Where problems could occur]
  Change limit to test cases, should not have any real impact to any
  kernel functions. But if these fixes are incorrect we will see
  failures in our regression-testing report. The worst scenario is
  getting false-negative results.
  
- 
  [Original Bug Report]
  Issue found with GCP 5.3.0-1017.18~18.04.1
  
   # selftests: net: test_vxlan_under_vrf.sh
   # Checking HV connectivity [ OK ]
   # Check VM connectivity through VXLAN (underlay in the default VRF) [FAIL]
   not ok 25 selftests: net: test_vxlan_under_vrf.sh # exit=1
  
  The failure is different from bug 1837348

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1871015

Title:
  test_vxlan_under_vrf.sh in net from ubuntu_kernel_selftests failed
  (Check VM connectivity through VXLAN (underlay in the default VRF)
  [FAIL])

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1871015/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1975578] Re: NetworkManager does not push search domains to systemd-resolved

2022-05-25 Thread Ronzo
** Description changed:

  Search domains defined in a NetworkManager connection are not pushed to
  systemd-resolved.
+ 
+ DISTRIB_ID=Ubuntu
+ DISTRIB_RELEASE=22.04
+ DISTRIB_CODENAME=jammy
+ DISTRIB_DESCRIPTION="Ubuntu 22.04 LTS"
+ PRETTY_NAME="Ubuntu 22.04 LTS"
+ NAME="Ubuntu"
+ VERSION_ID="22.04"
+ VERSION="22.04 LTS (Jammy Jellyfish)"
+ VERSION_CODENAME=jammy
+ ID=ubuntu
+ ID_LIKE=debian
+ UBUNTU_CODENAME=jammy

** Description changed:

  Search domains defined in a NetworkManager connection are not pushed to
  systemd-resolved.
  
  DISTRIB_ID=Ubuntu
  DISTRIB_RELEASE=22.04
  DISTRIB_CODENAME=jammy
  DISTRIB_DESCRIPTION="Ubuntu 22.04 LTS"
  PRETTY_NAME="Ubuntu 22.04 LTS"
  NAME="Ubuntu"
  VERSION_ID="22.04"
  VERSION="22.04 LTS (Jammy Jellyfish)"
  VERSION_CODENAME=jammy
  ID=ubuntu
  ID_LIKE=debian
  UBUNTU_CODENAME=jammy
+ 
+ Details:
+ DNS search domains can be set per NetworkManager connection. In my case it 
looks like this:
+ 
+ nmcli con show MyConnection | grep ipv4.dns-search
+ ipv4.dns-search:
mydomain.at,org.mydomain.at,linux.mydomain.at
+ 
+ Afaik NetworkManager should push them to systemd-resolved automatically.
+ But this does not happen. The entries do not make it to
+ /etc/resolv.conf.
+ 
+ (If I do it manually with resolvectl, it works.)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1975578

Title:
  NetworkManager does not push search domains to systemd-resolved

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/network-manager/+bug/1975578/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1969342] Re: running dpdk-testpmd shows "Failed to execute command of OP_SET_RSS_HENA" in vm with intree driver on ubuntu-22.04

2022-05-25 Thread Alex Wang
we have learned that the in-tree ice driver support for OP_SET_RSS_HENA
has never been upstreamed, so we will track this issue as a future
requirement, and will revisit this issue once the in-tree ice driver
support for OP_SET_RSS_HENA has been upstreamed and backported. Thanks.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1969342

Title:
  running dpdk-testpmd shows "Failed to execute command of
  OP_SET_RSS_HENA" in vm with intree driver on ubuntu-22.04

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/dpdk/+bug/1969342/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1975690] Missing required logs.

2022-05-25 Thread Ubuntu Kernel Bot
This bug is missing log files that will aid in diagnosing the problem.
While running an Ubuntu kernel (not a mainline or third-party kernel)
please enter the following command in a terminal window:

apport-collect 1975690

and then change the status of the bug to 'Confirmed'.

If, due to the nature of the issue you have encountered, you are unable
to run this command, please add a comment stating that fact and change
the bug status to 'Confirmed'.

This change has been made by an automated script, maintained by the
Ubuntu Kernel Team.

** Changed in: linux (Ubuntu)
   Status: New => Incomplete

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1975690

Title:
  kernel 5.13.0-41 and 5.13.0-44 do not boot

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1975690/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1975578] Re: NetworkManager does not push search domains to systemd-resolved

2022-05-25 Thread Ronzo
** Description changed:

  Search domains defined in a NetworkManager connection are not pushed to
  systemd-resolved.
  
  DISTRIB_ID=Ubuntu
  DISTRIB_RELEASE=22.04
  DISTRIB_CODENAME=jammy
  DISTRIB_DESCRIPTION="Ubuntu 22.04 LTS"
  PRETTY_NAME="Ubuntu 22.04 LTS"
  NAME="Ubuntu"
  VERSION_ID="22.04"
  VERSION="22.04 LTS (Jammy Jellyfish)"
  VERSION_CODENAME=jammy
  ID=ubuntu
  ID_LIKE=debian
  UBUNTU_CODENAME=jammy
  
+ NetworkManager -V
+ 1.36.4
+ 
  Details:
  DNS search domains can be set per NetworkManager connection. In my case it 
looks like this:
  
  nmcli con show MyConnection | grep ipv4.dns-search
  ipv4.dns-search:
mydomain.at,org.mydomain.at,linux.mydomain.at
  
  Afaik NetworkManager should push them to systemd-resolved automatically.
  But this does not happen. The entries do not make it to
  /etc/resolv.conf.
  
  (If I do it manually with resolvectl, it works.)

** Description changed:

  Search domains defined in a NetworkManager connection are not pushed to
  systemd-resolved.
  
  DISTRIB_ID=Ubuntu
  DISTRIB_RELEASE=22.04
  DISTRIB_CODENAME=jammy
  DISTRIB_DESCRIPTION="Ubuntu 22.04 LTS"
  PRETTY_NAME="Ubuntu 22.04 LTS"
  NAME="Ubuntu"
  VERSION_ID="22.04"
  VERSION="22.04 LTS (Jammy Jellyfish)"
  VERSION_CODENAME=jammy
  ID=ubuntu
  ID_LIKE=debian
  UBUNTU_CODENAME=jammy
  
  NetworkManager -V
  1.36.4
  
+ resolvectl --version
+ systemd 249 (249.11-0ubuntu3.1)
+ +PAM +AUDIT +SELINUX +APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS -OPENSSL 
+ACL +BLKID +CURL +ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP 
-LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE +BZIP2 +LZ4 +XZ +ZLIB +ZSTD 
-XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified
+ 
  Details:
  DNS search domains can be set per NetworkManager connection. In my case it 
looks like this:
  
  nmcli con show MyConnection | grep ipv4.dns-search
  ipv4.dns-search:
mydomain.at,org.mydomain.at,linux.mydomain.at
  
  Afaik NetworkManager should push them to systemd-resolved automatically.
  But this does not happen. The entries do not make it to
  /etc/resolv.conf.
  
  (If I do it manually with resolvectl, it works.)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1975578

Title:
  NetworkManager does not push search domains to systemd-resolved

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/network-manager/+bug/1975578/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Re: [Bug 1970957] Re: suspend problem

2022-05-25 Thread lauricat
On my X1 Carbon 10th Gen, I can confirm my 'sleep state' in UEFI/BIOS is
set to "Linux" - as per lenovo's instructions, and I use Xorg exlsuively
- via Ubuntu Mate.

I can confirm that this mitigates the problem, but still occurs
occasionally.

HTH

- Original message -
From: bigblackcar <1970...@bugs.launchpad.net>
To: lauri...@fastmail.fm
Subject: [Bug 1970957] Re: suspend problem
Date: Wednesday, 25 May 2022 8:33 PM

On my X1 Carbon I seem to have solved the issue by:
1. changing the BIOS so the Sleep State is in mode "Linux" as opposed to 
"Windows and Linux"
2. using Xorg instead of Wayland. -> When you log in, before inserting the 
password, click on the cog on the bottom right and choose the "Ubuntu on Xorg" 
option.

YMMV, but since I lost a day I wrote my solution here in case it helps
someone.

-- 
You received this bug notification because you are subscribed to the bug
report.
https://bugs.launchpad.net/bugs/1970957

Title:
  suspend problem

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  I've installed Ubuntu 22.04 on the ThinkPad E480. Suspend functions ok
  intermittently. Some times it works fine, other times the computer
  does not enter the suspend mode (the screen gets blank, but the
  machine is still running and the ThinPad led is on, and there is no
  way out... no response from keyboard or mouse... the only solution is
  to switch off manually hitting and holding the power button), other
  times the machine does not wakes up from suspension mode.

  ProblemType: Bug
  DistroRelease: Ubuntu 22.04
  Package: ubuntu-release-upgrader-core 1:22.04.10
  ProcVersionSignature: Ubuntu 5.15.0-27.28-generic 5.15.30
  Uname: Linux 5.15.0-27-generic x86_64
  ApportVersion: 2.20.11-0ubuntu82
  Architecture: amd64
  CasperMD5CheckResult: pass
  CrashDB: ubuntu
  CurrentDesktop: ubuntu:GNOME
  Date: Fri Apr 29 10:53:59 2022
  EcryptfsInUse: Yes
  InstallationDate: Installed on 2022-04-24 (4 days ago)
  InstallationMedia: Ubuntu 22.04 LTS "Jammy Jellyfish" - Release amd64 
(20220419)
  PackageArchitecture: all
  SourcePackage: ubuntu-release-upgrader
  Symptom: dist-upgrade
  UpgradeStatus: No upgrade log present (probably fresh install)
  --- 
  ProblemType: Bug
  ApportVersion: 2.20.11-0ubuntu82
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  leoca  1913 F pulseaudio
  CRDA: N/A
  CasperMD5CheckResult: pass
  CurrentDesktop: ubuntu:GNOME
  DistroRelease: Ubuntu 22.04
  EcryptfsInUse: Yes
  InstallationDate: Installed on 2022-04-24 (4 days ago)
  InstallationMedia: Ubuntu 22.04 LTS "Jammy Jellyfish" - Release amd64 
(20220419)
  MachineType: LENOVO 20KQ000EBR
  Package: linux (not installed)
  ProcFB: 0 i915drmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-5.15.0-27-generic 
root=UUID=1e7d6212-699d-4319-b137-8a7059545433 ro quiet splash vt.handoff=7
  ProcVersionSignature: Ubuntu 5.15.0-27.28-generic 5.15.30
  RelatedPackageVersions:
   linux-restricted-modules-5.15.0-27-generic N/A
   linux-backports-modules-5.15.0-27-generic  N/A
   linux-firmware 20220329.git681281e4-0ubuntu1
  Tags:  jammy
  Uname: Linux 5.15.0-27-generic x86_64
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: adm cdrom dip lpadmin lxd plugdev sambashare sudo
  _MarkForUpload: True
  dmi.bios.date: 06/14/2018
  dmi.bios.release: 1.19
  dmi.bios.vendor: LENOVO
  dmi.bios.version: R0PET42W (1.19 )
  dmi.board.asset.tag: Not Available
  dmi.board.name: 20KQ000EBR
  dmi.board.vendor: LENOVO
  dmi.board.version: SDK0J40697 WIN
  dmi.chassis.asset.tag: No Asset Information
  dmi.chassis.type: 10
  dmi.chassis.vendor: LENOVO
  dmi.chassis.version: None
  dmi.ec.firmware.release: 1.19
  dmi.modalias: 
dmi:bvnLENOVO:bvrR0PET42W(1.19):bd06/14/2018:br1.19:efr1.19:svnLENOVO:pn20KQ000EBR:pvrThinkPadE480:rvnLENOVO:rn20KQ000EBR:rvrSDK0J40697WIN:cvnLENOVO:ct10:cvrNone:skuLENOVO_MT_20KQ_BU_Think_FM_ThinkPadE480:
  dmi.product.family: ThinkPad E480
  dmi.product.name: 20KQ000EBR
  dmi.product.sku: LENOVO_MT_20KQ_BU_Think_FM_ThinkPad E480
  dmi.product.version: ThinkPad E480
  dmi.sys.vendor: LENOVO

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1970957/+subscriptions

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1970957

Title:
  suspend problem

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1970957/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1871015] Re: test_vxlan_under_vrf.sh in net from ubuntu_kernel_selftests failed (Check VM connectivity through VXLAN (underlay in the default VRF) [FAIL])

2022-05-25 Thread Po-Hsu Lin
V2 https://lists.ubuntu.com/archives/kernel-team/2022-May/130594.html

** Description changed:

  [Impact]
  test_vxlan_under_vrf.sh in the net category of ubuntu_kernel_selftests
  will fail on 5.13 kernel with:
  
# selftests: net: test_vxlan_under_vrf.sh
# Checking HV connectivity [ OK ]
# Check VM connectivity through VXLAN (underlay in the default VRF) [FAIL]
not ok 1 selftests: net: test_vxlan_under_vrf.sh # exit=1
  
  Note that this test is not failing on F-oem-5.14 / J-oem-5.17, but
  it's better to have corresponding patches applied to reduce the
  maintenance cost in the future.
  
  [Fix]
  * e7e4785f selftests: net: test_vxlan_under_vrf: fix HV connectivity test
  * b50d3b46 selftests: test_vxlan_under_vrf: Fix broken test case
  
  First patch (e7e4785f):
- Can be cherry-picked to Impish 5.13
- Can be cherry-picked to F-oem-5.14.
  Second patch (b50d3b46):
- Can be cherry-picked to Impish 5.13 (-C2 is required while
  applying it due to our SAUCE patches)
- F-oem-5.14 has already got this one applied.
-   - Can be cherry-picked to J-oem-5.17
  
  The reason why we need the second patch is that after the first one
  got applied, we will see another failure, which we made it an expected
  failure (XFAIL) with SAUCE patches:
Check VM connectivity through VXLAN (underlay in a VRF) [XFAIL]
  
  [Test]
  With the patched test_vxlan_under_vrf.sh test, it can pass on Impish
- 5.13, F-oem-5.14 and J-oem-5.17 without any issue:
+ 5.13 and F-oem-5.14 without any issue:
Checking HV connectivity [ OK ]
Check VM connectivity through VXLAN (underlay in the default VRF) [ OK ]
Check VM connectivity through VXLAN (underlay in a VRF) [ OK ]
  
  [Where problems could occur]
  Change limit to test cases, should not have any real impact to any
  kernel functions. But if these fixes are incorrect we will see
  failures in our regression-testing report. The worst scenario is
  getting false-negative results.
  
  [Original Bug Report]
  Issue found with GCP 5.3.0-1017.18~18.04.1
  
   # selftests: net: test_vxlan_under_vrf.sh
   # Checking HV connectivity [ OK ]
   # Check VM connectivity through VXLAN (underlay in the default VRF) [FAIL]
   not ok 25 selftests: net: test_vxlan_under_vrf.sh # exit=1
  
  The failure is different from bug 1837348

** Description changed:

  [Impact]
  test_vxlan_under_vrf.sh in the net category of ubuntu_kernel_selftests
  will fail on 5.13 kernel with:
  
-   # selftests: net: test_vxlan_under_vrf.sh
-   # Checking HV connectivity [ OK ]
-   # Check VM connectivity through VXLAN (underlay in the default VRF) [FAIL]
-   not ok 1 selftests: net: test_vxlan_under_vrf.sh # exit=1
+   # selftests: net: test_vxlan_under_vrf.sh
+   # Checking HV connectivity [ OK ]
+   # Check VM connectivity through VXLAN (underlay in the default VRF) [FAIL]
+   not ok 1 selftests: net: test_vxlan_under_vrf.sh # exit=1
  
- Note that this test is not failing on F-oem-5.14 / J-oem-5.17, but
- it's better to have corresponding patches applied to reduce the
- maintenance cost in the future.
+ Note that this test is not failing on F-oem-5.14 but it's better to
+ have corresponding patches applied to reduce the maintenance cost
+ in the future.
  
  [Fix]
  * e7e4785f selftests: net: test_vxlan_under_vrf: fix HV connectivity test
  * b50d3b46 selftests: test_vxlan_under_vrf: Fix broken test case
  
  First patch (e7e4785f):
-   - Can be cherry-picked to Impish 5.13
-   - Can be cherry-picked to F-oem-5.14.
+   - Can be cherry-picked to Impish 5.13
+   - Can be cherry-picked to F-oem-5.14.
  Second patch (b50d3b46):
-   - Can be cherry-picked to Impish 5.13 (-C2 is required while
- applying it due to our SAUCE patches)
-   - F-oem-5.14 has already got this one applied.
+   - Can be cherry-picked to Impish 5.13 (-C2 is required while
+ applying it due to our SAUCE patches)
+   - F-oem-5.14 has already got this one applied.
  
  The reason why we need the second patch is that after the first one
  got applied, we will see another failure, which we made it an expected
  failure (XFAIL) with SAUCE patches:
-   Check VM connectivity through VXLAN (underlay in a VRF) [XFAIL]
+   Check VM connectivity through VXLAN (underlay in a VRF) [XFAIL]
  
  [Test]
  With the patched test_vxlan_under_vrf.sh test, it can pass on Impish
  5.13 and F-oem-5.14 without any issue:
-   Checking HV connectivity [ OK ]
-   Check VM connectivity through VXLAN (underlay in the default VRF) [ OK ]
-   Check VM connectivity through VXLAN (underlay in a VRF) [ OK ]
+   Checking HV connectivity [ OK ]
+   Check VM connectivity through VXLAN (underlay in the default VRF) [ OK ]
+   Check VM connectivity through VXLAN (underlay in a VRF) [ OK ]
  
  [Where problems could occur]
  Change limit to test cases, should not have any real impact to any
  kernel functions. But if these fixes are incorrect we will see
  failures in our regression-testing report. The worst scenario is
  getting

[Bug 1973839] Re: 5.15.0-30-generic : SSBD mitigation results in "unchecked MSR access error: WRMSR to 0x48 (tried to write 0x0000000000000004)" and flood of kernel traces in some cloud providers

2022-05-25 Thread Kai-Heng Feng
Which cloud is in use and what the instance type is?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1973839

Title:
  5.15.0-30-generic :  SSBD mitigation results in "unchecked MSR access
  error: WRMSR to 0x48 (tried to write 0x0004)" and flood of
  kernel traces in some cloud providers

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1973839/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1973296] Re: [UBUNTU 20.04] OpenCryptoki >= 3.13 with upgraded EP11 host library - Dilithium support not available

2022-05-25 Thread Robie Basak
Hello bugproxy, or anyone else affected,

Accepted opencryptoki into impish-proposed. The package will build now
and be available at
https://launchpad.net/ubuntu/+source/opencryptoki/3.16.0+dfsg-0ubuntu1.1
in a few hours, and then in the -proposed repository.

Please help us by testing this new package.  See
https://wiki.ubuntu.com/Testing/EnableProposed for documentation on how
to enable and use -proposed.  Your feedback will aid us getting this
update out to other Ubuntu users.

If this package fixes the bug for you, please add a comment to this bug,
mentioning the version of the package you tested, what testing has been
performed on the package and change the tag from verification-needed-
impish to verification-done-impish. If it does not fix the bug for you,
please add a comment stating that, and change the tag to verification-
failed-impish. In either case, without details of your testing we will
not be able to proceed.

Further information regarding the verification process can be found at
https://wiki.ubuntu.com/QATeam/PerformingSRUVerification .  Thank you in
advance for helping!

N.B. The updated package will be released to -updates after the bug(s)
fixed by this package have been verified and the package has been in
-proposed for a minimum of 7 days.

** Changed in: opencryptoki (Ubuntu Impish)
   Status: In Progress => Fix Committed

** Tags added: verification-needed verification-needed-impish

** Changed in: opencryptoki (Ubuntu Jammy)
   Status: In Progress => Fix Committed

** Tags added: verification-needed-jammy

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1973296

Title:
  [UBUNTU 20.04] OpenCryptoki >= 3.13 with upgraded EP11 host library -
  Dilithium support not available

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1973296/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1973296] Please test proposed package

2022-05-25 Thread Robie Basak
Hello bugproxy, or anyone else affected,

Accepted opencryptoki into jammy-proposed. The package will build now
and be available at
https://launchpad.net/ubuntu/+source/opencryptoki/3.17.0+dfsg+20220202.b40982e-0ubuntu1.1
in a few hours, and then in the -proposed repository.

Please help us by testing this new package.  See
https://wiki.ubuntu.com/Testing/EnableProposed for documentation on how
to enable and use -proposed.  Your feedback will aid us getting this
update out to other Ubuntu users.

If this package fixes the bug for you, please add a comment to this bug,
mentioning the version of the package you tested, what testing has been
performed on the package and change the tag from verification-needed-
jammy to verification-done-jammy. If it does not fix the bug for you,
please add a comment stating that, and change the tag to verification-
failed-jammy. In either case, without details of your testing we will
not be able to proceed.

Further information regarding the verification process can be found at
https://wiki.ubuntu.com/QATeam/PerformingSRUVerification .  Thank you in
advance for helping!

N.B. The updated package will be released to -updates after the bug(s)
fixed by this package have been verified and the package has been in
-proposed for a minimum of 7 days.

** Changed in: opencryptoki (Ubuntu Focal)
   Status: In Progress => Fix Committed

** Tags added: verification-needed-focal

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1973296

Title:
  [UBUNTU 20.04] OpenCryptoki >= 3.13 with upgraded EP11 host library -
  Dilithium support not available

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1973296/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1973296] Please test proposed package

2022-05-25 Thread Robie Basak
Hello bugproxy, or anyone else affected,

Accepted opencryptoki into focal-proposed. The package will build now
and be available at
https://launchpad.net/ubuntu/+source/opencryptoki/3.13.0+dfsg-0ubuntu5.2
in a few hours, and then in the -proposed repository.

Please help us by testing this new package.  See
https://wiki.ubuntu.com/Testing/EnableProposed for documentation on how
to enable and use -proposed.  Your feedback will aid us getting this
update out to other Ubuntu users.

If this package fixes the bug for you, please add a comment to this bug,
mentioning the version of the package you tested, what testing has been
performed on the package and change the tag from verification-needed-
focal to verification-done-focal. If it does not fix the bug for you,
please add a comment stating that, and change the tag to verification-
failed-focal. In either case, without details of your testing we will
not be able to proceed.

Further information regarding the verification process can be found at
https://wiki.ubuntu.com/QATeam/PerformingSRUVerification .  Thank you in
advance for helping!

N.B. The updated package will be released to -updates after the bug(s)
fixed by this package have been verified and the package has been in
-proposed for a minimum of 7 days.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1973296

Title:
  [UBUNTU 20.04] OpenCryptoki >= 3.13 with upgraded EP11 host library -
  Dilithium support not available

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1973296/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1973296] Re: [UBUNTU 20.04] OpenCryptoki >= 3.13 with upgraded EP11 host library - Dilithium support not available

2022-05-25 Thread Robie Basak
Accepted, but please adjust your Test Plan to actually test the previous
missing *functionality* of opencryptoki+EP11+Dilithium from a user's
perspective. This means something like "verify that a user can use their
token to authenticate against X" rather than "verify that the library
supports X".


Just checking that it's detected and _might_ work is insufficient, IMHO. 
Because if it turns out that a further patch is needed to make it actually work 
for users, we shouldn't be pushing updates multiple times to unaffected users 
because we didn't test the stack all the way through.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1973296

Title:
  [UBUNTU 20.04] OpenCryptoki >= 3.13 with upgraded EP11 host library -
  Dilithium support not available

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1973296/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1965123] Re: Active launchers area pixels (corners) missing

2022-05-25 Thread Do Duy Huy Hoang
I have this issue on an Intel graphic laptop

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1965123

Title:
  Active launchers area pixels (corners) missing

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gnome-shell/+bug/1965123/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1971933] Re: [Regression] Unable to wake laptop using trackpad input

2022-05-25 Thread Kai-Heng Feng
OK, so the laptop doesn't use s2idle, it's using S3 instead. Please
perform a kernel bisection [1] to find the regression commit.

[1] https://wiki.ubuntu.com/Kernel/KernelBisection

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1971933

Title:
  [Regression] Unable to wake laptop using trackpad input

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1971933/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1975690] Re: kernel 5.13.0-41 and 5.13.0-44 do not boot

2022-05-25 Thread Michel Sauvard
apport information

** Tags added: apport-collected una

** Description changed:

  the kernel updates for linux Mint 5.13.0.41 then 5.13.0-44 do not boot.
  Nothing on the screen or journalctl.
  I tried to add debug=vc and break=top on the boot line with nothing else.
  I also tried to use the root='hd0,gpt6' syntax instead of root=UUID=... but 
the file system is seen because if I replace initrd.img-5.13.0-44-generic by a 
copy of initrd.img-5.13.0-40-generic I have some display
  5.13.0-40 works fine, and the root, debug and break options work fine in it.
  ubuntu-bug does not work saying linux-image-5.13.0-40-generic is not an 
official package and no crash report
  I join files for lspci -vnvn
+ --- 
+ ProblemType: Bug
+ ApportVersion: 2.20.11-0ubuntu27.24
+ Architecture: amd64
+ AudioDevicesInUse:
+  USERPID ACCESS COMMAND
+  /dev/snd/controlC0:  sauvard1402 F pulseaudio
+  /dev/snd/pcmC0D0p:   sauvard1402 F...m pulseaudio
+  /dev/snd/controlC1:  sauvard1402 F pulseaudio
+ CasperMD5CheckResult: skip
+ DistroRelease: Linux Mint 20.3
+ InstallationDate: Installed on 2019-12-23 (883 days ago)
+ InstallationMedia: Linux Mint 19.2 "Tina" - Release amd64 20190729
+ IwConfig:
+  lono wireless extensions.
+  
+  enp2s0no wireless extensions.
+ MachineType: Gigabyte Technology Co., Ltd. B560 HD3
+ Package: linux (not installed)
+ ProcEnviron:
+  LANGUAGE=fr_FR
+  TERM=xterm-256color
+  PATH=(custom, no user)
+  LANG=C
+  SHELL=/bin/bash
+ ProcFB: 0 i915drmfb
+ ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-5.13.0-40-generic 
root=UUID=42eeb43d-120a-4438-a3c4-d924632552c8 ro quiet splash
+ ProcVersionSignature: Ubuntu 5.13.0-40.45~20.04.1-generic 5.13.19
+ PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No 
PulseAudio daemon running, or not running as session daemon.
+ RelatedPackageVersions:
+  linux-restricted-modules-5.13.0-40-generic N/A
+  linux-backports-modules-5.13.0-40-generic  N/A
+  linux-firmware 1.187.31
+ RfKill:
+  0: hci0: Bluetooth
+   Soft blocked: no
+   Hard blocked: no
+ Tags:  una
+ Uname: Linux 5.13.0-40-generic x86_64
+ UpgradeStatus: No upgrade log present (probably fresh install)
+ UserGroups: N/A
+ _MarkForUpload: True
+ dmi.bios.date: 11/03/2021
+ dmi.bios.release: 5.19
+ dmi.bios.vendor: American Megatrends International, LLC.
+ dmi.bios.version: F10
+ dmi.board.asset.tag: Default string
+ dmi.board.name: B560 HD3
+ dmi.board.vendor: Gigabyte Technology Co., Ltd.
+ dmi.board.version: Default string
+ dmi.chassis.asset.tag: Default string
+ dmi.chassis.type: 3
+ dmi.chassis.vendor: Default string
+ dmi.chassis.version: Default string
+ dmi.modalias: 
dmi:bvnAmericanMegatrendsInternational,LLC.:bvrF10:bd11/03/2021:br5.19:svnGigabyteTechnologyCo.,Ltd.:pnB560HD3:pvrDefaultstring:rvnGigabyteTechnologyCo.,Ltd.:rnB560HD3:rvrDefaultstring:cvnDefaultstring:ct3:cvrDefaultstring:skuDefaultstring:
+ dmi.product.family: B560 MB
+ dmi.product.name: B560 HD3
+ dmi.product.sku: Default string
+ dmi.product.version: Default string
+ dmi.sys.vendor: Gigabyte Technology Co., Ltd.

** Attachment added: "AlsaInfo.txt"
   
https://bugs.launchpad.net/bugs/1975690/+attachment/5592874/+files/AlsaInfo.txt

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1975690

Title:
  kernel 5.13.0-41 and 5.13.0-44 do not boot

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1975690/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1975690] CRDA.txt

2022-05-25 Thread Michel Sauvard
apport information

** Attachment added: "CRDA.txt"
   https://bugs.launchpad.net/bugs/1975690/+attachment/5592875/+files/CRDA.txt

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1975690

Title:
  kernel 5.13.0-41 and 5.13.0-44 do not boot

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1975690/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1975690] CurrentDmesg.txt

2022-05-25 Thread Michel Sauvard
apport information

** Attachment added: "CurrentDmesg.txt"
   
https://bugs.launchpad.net/bugs/1975690/+attachment/5592876/+files/CurrentDmesg.txt

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1975690

Title:
  kernel 5.13.0-41 and 5.13.0-44 do not boot

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1975690/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1975690] Lspci.txt

2022-05-25 Thread Michel Sauvard
apport information

** Attachment added: "Lspci.txt"
   https://bugs.launchpad.net/bugs/1975690/+attachment/5592877/+files/Lspci.txt

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1975690

Title:
  kernel 5.13.0-41 and 5.13.0-44 do not boot

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1975690/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1975690] Lsusb.txt

2022-05-25 Thread Michel Sauvard
apport information

** Attachment added: "Lsusb.txt"
   https://bugs.launchpad.net/bugs/1975690/+attachment/5592879/+files/Lsusb.txt

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1975690

Title:
  kernel 5.13.0-41 and 5.13.0-44 do not boot

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1975690/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1975690] Lsusb-t.txt

2022-05-25 Thread Michel Sauvard
apport information

** Attachment added: "Lsusb-t.txt"
   
https://bugs.launchpad.net/bugs/1975690/+attachment/5592880/+files/Lsusb-t.txt

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1975690

Title:
  kernel 5.13.0-41 and 5.13.0-44 do not boot

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1975690/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1975690] Lspci-vt.txt

2022-05-25 Thread Michel Sauvard
apport information

** Attachment added: "Lspci-vt.txt"
   
https://bugs.launchpad.net/bugs/1975690/+attachment/5592878/+files/Lspci-vt.txt

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1975690

Title:
  kernel 5.13.0-41 and 5.13.0-44 do not boot

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1975690/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1975690] Lsusb-v.txt

2022-05-25 Thread Michel Sauvard
apport information

** Attachment added: "Lsusb-v.txt"
   
https://bugs.launchpad.net/bugs/1975690/+attachment/5592881/+files/Lsusb-v.txt

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1975690

Title:
  kernel 5.13.0-41 and 5.13.0-44 do not boot

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1975690/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1975690] ProcCpuinfoMinimal.txt

2022-05-25 Thread Michel Sauvard
apport information

** Attachment added: "ProcCpuinfoMinimal.txt"
   
https://bugs.launchpad.net/bugs/1975690/+attachment/5592883/+files/ProcCpuinfoMinimal.txt

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1975690

Title:
  kernel 5.13.0-41 and 5.13.0-44 do not boot

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1975690/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1975690] ProcCpuinfo.txt

2022-05-25 Thread Michel Sauvard
apport information

** Attachment added: "ProcCpuinfo.txt"
   
https://bugs.launchpad.net/bugs/1975690/+attachment/5592882/+files/ProcCpuinfo.txt

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1975690

Title:
  kernel 5.13.0-41 and 5.13.0-44 do not boot

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1975690/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1975690] ProcInterrupts.txt

2022-05-25 Thread Michel Sauvard
apport information

** Attachment added: "ProcInterrupts.txt"
   
https://bugs.launchpad.net/bugs/1975690/+attachment/5592884/+files/ProcInterrupts.txt

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1975690

Title:
  kernel 5.13.0-41 and 5.13.0-44 do not boot

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1975690/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1975690] ProcModules.txt

2022-05-25 Thread Michel Sauvard
apport information

** Attachment added: "ProcModules.txt"
   
https://bugs.launchpad.net/bugs/1975690/+attachment/5592885/+files/ProcModules.txt

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1975690

Title:
  kernel 5.13.0-41 and 5.13.0-44 do not boot

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1975690/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1975690] UdevDb.txt

2022-05-25 Thread Michel Sauvard
apport information

** Attachment added: "UdevDb.txt"
   https://bugs.launchpad.net/bugs/1975690/+attachment/5592886/+files/UdevDb.txt

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1975690

Title:
  kernel 5.13.0-41 and 5.13.0-44 do not boot

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1975690/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1975690] acpidump.txt

2022-05-25 Thread Michel Sauvard
apport information

** Attachment added: "acpidump.txt"
   
https://bugs.launchpad.net/bugs/1975690/+attachment/5592888/+files/acpidump.txt

** Changed in: linux (Ubuntu)
   Status: Incomplete => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1975690

Title:
  kernel 5.13.0-41 and 5.13.0-44 do not boot

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1975690/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

  1   2   3   4   >