Public bug reported:
zdb -b has given me some very long progress estimates:
$ sudo zdb -b fst
[sudo] password for sarnold:
Traversing all blocks to verify nothing leaked ...
loading space map for vdev 0 of 1, metaslab 115 of 116 ...
4.72T completed (2659MB/s) estimated time remaining: 42944189
Hello, can you please look for ip_tables.ko in
/lib/modules/*/kernel/net/ipv4/netfilter/ip_tables.ko ? Which linux-
modules-* package and which linux-image-* packages do you have
installed?
Thanks
** Package changed: iptables (Ubuntu) => linux (Ubuntu)
--
You received this bug notification beca
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1937107
Title:
Kernel Oops - unable to handle kernel paging request at
Wonderful, thanks Daniel!
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to bluez in Ubuntu.
https://bugs.launchpad.net/bugs/1926548
Title:
The gatt protocol has out-of-bounds read that leads to information
leakage
Status in Bluez Util
Daniel, are you sure about that fixed-in-5.56 bug tag? I can't spot the
referenced commit in the tarballs 5.55, 5.56, 5.57, 5.58 from:
http://www.bluez.org/
nor in the github sources:
https://github.com/bluez/bluez/blob/master/src/gatt-database.c#L1054
nor the kernel.org sources:
https://git.kern
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to bluez in Ubuntu.
https://bugs.launchpad.net/bugs/1926548
Title:
The gatt protocol has out-of-bounds read that leads to
Hello Hadar, I'm sorry for the trouble.
These have been fixed:
https://ubuntu.com/security/notices/USN-4577-1
https://ubuntu.com/security/notices/USN-4576-1
https://ubuntu.com/security/notices/USN-4578-1
https://ubuntu.com/security/notices/USN-4579-1
https://ubuntu.com/security/notices/
I've added a few more packages to the bug; nothing in the various links
suggested to me that anyone has yet identified where the fault lies.
Thanks
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.ne
** Information type changed from Private Security to Public Security
** Also affects: linux (Ubuntu)
Importance: Undecided
Status: New
** Also affects: samba (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Kernel
P
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1922534
Title:
touch pad of my laptop is not working
Status in linux package i
I'm sorry I lost track of this bug.
fatrace is still acting strangely for me:
$ uname -a
Linux millbarge 5.4.0-65-generic #73-Ubuntu SMP Mon Jan 18 17:25:17 UTC 2021
x86_64 x86_64 x86_64 GNU/Linux
$ apt policy fatrace
fatrace:
Installed: 0.13-2
Candidate: 0.13-2
Version table:
*** 0.13-2
*** This bug is a duplicate of bug 1871794 ***
https://bugs.launchpad.net/bugs/1871794
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to bluez in Ubuntu.
https://bugs.launchpad.
Re test rebuilds, that's certainly the intention, but there are
occasional problems:
https://launchpad.net/bugs/1910555
https://bugs.launchpad.net/ubuntu/+source/nvidia-graphics-drivers-340/+bug/1910709
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1910503 (virtualbox,
probably not in scop
I added the linux source package to this bug because I've heard this
commit addresses the issue:
https://github.com/gregkh/linux/commit/099340d3e758cca06a82bf5dcff8b9a8acbdcb0a
Thanks
** Also affects: linux (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notificat
*** This bug is a security vulnerability ***
Public security bug reported:
Hello, it looks like CONFIG_RANDOMIZE_BASE is not set in our ppc64el
kernel configurations, based on running this in an rsync clone of
kernel.ubuntu.com::kernel-ppa-config/ :
grep CONFIG_RANDOMIZE_BASE $(find . -iname '*p
Thanks Christian, I think you're right, this probably doesn't need a
security review and being centralized in one place will probably be
easier to maintain.
Thanks
** Changed in: libbpf (Ubuntu)
Status: New => Fix Committed
** Changed in: libbpf (Ubuntu)
Assignee: Seth
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1908768
Title:
TouchPad don't response
Status in linux package in Ubuntu:
Co
Hello, was this perhaps within a container that might have just had the
host filesystem passed in without write access?
Thanks
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to li
Hopefully helpful, hopefully this isn't a red herring, but it sure seems
suspicious timing:
[ 113.249890] rfkill: input handler disabled
[ 242.742392] INFO: task kworker/u16:3:110 blocked for more than 120 seconds.
[ 242.742399] Not tainted 5.4.0-58-generic #64-Ubuntu
[ 242.742401] "echo
Hello Sanjay, from your logs:
diversion of /usr/lib/i386-linux-gnu/libGL.so.1 to /usr/lib/i386-linux-
gnu/libGL.so.1.distrib by nvidia-340
I don't know nvidia drivers well, but this looks a bit like an older
driver is still installed while trying to install a new one. Does this
sound familiar?
T
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to nvidia-graphics-drivers-455 in Ubuntu.
https://bugs.launchpad.net/bugs/1907852
Title:
package libnvidia-gl-455 (not installed) f
My guess is the next step is trying the zfs send | ssh zfs recv commands
that were causing the VERIFY(size != 0) failed message with traces. I've
always been uneasy with the 'main' error coming only with a recv
operation, relying upon two systems to recreate a bug is iffy at best.
And since it wedg
The scrub has finished, no new errors in zpool status -v, dmesg is
filled with debugging messages, I hope something is useful. :)
Thanks
$ uname -a
Linux wopr 4.15.0-126-generic #129-Ubuntu SMP Mon Nov 23 18:53:38 UTC 2020
x86_64 x86_64 x86_64 GNU/Linux
$ modinfo zfs | grep -i version
version:
Here's smartctl output on the disks in the pool. It's a bit hard to
summarize nine drives of smartctl output but nothing stood out as
interesting to me.
My journals only go back a few months so they wouldn't show any IO
errors at the time of this problem being introduced, but this currently
gives
Picking the previous bad object (which I'm pretty sure should still be
intact):
$ modinfo zfs | grep ^version
version:0.7.5-1ubuntu16.10+lp1861235
$ uname -a
Linux wopr 4.15.0-126-generic #129-Ubuntu SMP Mon Nov 23 18:53:38 UTC 2020
x86_64 x86_64 x86_64 GNU/Linux
$ sudo zdb - srv/back
Hello Andrea, thanks for looking into my problem.
# zpool status -v
pool: fst
state: ONLINE
scan: scrub repaired 0B in 2h37m with 0 errors on Sun Nov 8 03:01:53 2020
config:
NAMESTATE READ WRITE CKSUM
fst ONLINE 0
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1905150
Title:
package linux-image-5.4.0-55-generic 5.4.0-55.61 failed to
ins
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Hi Colin, thanks so much for giving this another look. I don't see any
references to trying different zfs_arc_meta_limit* settings here!
I raised zfs_arc_meta_limit_percent from the default 75 to 95 and my
system has been running this ripgrep for four hours without falling to
pieces.
I think we c
On Wed, Oct 21, 2020 at 10:32:14PM -, Peter Burkholder wrote:
> Is there an approval/publication step that y'alls still need to take?
Yes, there is; it's been a busy, uh, three months give or take.
Thanks for the friendly reminder. :)
--
You received this bug notification because you are a
This appears to be: https://people.canonical.com/~ubuntu-
security/cve/2020/CVE-2020-25643.html
Thanks
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-25643
** Package changed: linux-meta (Ubuntu) => linux (Ubuntu)
** Information type changed from Private Security to Public Se
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1898351
Title:
Wifi does not show up or work
Status in linux package in Ubuntu
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to bcmwl in Ubuntu.
https://bugs.launchpad.net/bugs/1897982
Title:
bcmwl-kernel-source 6.30.223.271+bdcom-0ubuntu5 (amd64 binary) i
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to bcmwl in Ubuntu.
https://bugs.launchpad.net/bugs/1897792
Title:
package bcmwl-kernel-source 6.30.223.30+bdcom-0ubuntu1~ppa1 fail
Thank you for taking the time to report this bug and helping to make
Ubuntu better. Reviewing your dmesg attachment to this bug report it
seems that there may be a problem with your hardware. I'd recommend
performing a back up and then investigating the situation. Measures you
might take include
Is it interesting that I'm seeing both 19 and 20 in my dmesg?
[1229822.406130] dmu_object_free: object = 0x266d2904, dn->dn_type = 20
[1229823.980888] dmu_object_free: object = 0x266d0d5a, dn->dn_type = 20
[1229823.994690] dmu_object_free: object = 0x266d0d5b, dn->dn_type = 20
[1229823.998123] dmu
Hello Eko, my guess is the process that had the debconf database locked
was asking you to enroll a new secure boot key. By killing it rather
than configuring a key, you can't install self-built kernel modules.
I suggest looking at the "Manual Method" section of
https://wiki.ubuntu.com/UEFI/SecureB
Hopefully helpful:
[ 45.069078] NVRM: API mismatch: the client has the version 440.95.01, but
NVRM: this kernel module has the version 440.100. Please
NVRM: make sure that this kernel module and all NVIDIA driver
NVRM: components have the same versio
Hello Trinity,
Quite often, running pavucontrol is enough to see what needs to be
changed to make audio output work correctly.
I hope this helps.
Thanks
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Package
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1887190
Title:
MSFT Touchpad not working on Lenovo Legion-5 15ARH05
Status in P
I was reminded of this bug earlier today -- Andrea, Sultan, thanks so
much for fixing my issues. I've been happily running along for months
now. :) Thanks!
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launc
Hello Dexuan, wonderful, thanks;
Eric's proposed patch confuses me on one point:
- if (rcu_access_pointer(sk->sk_filter) &&
- udp_lib_checksum_complete(skb))
+ if (udp_lib_checksum_complete(skb))
goto csum_error;
Do you know why the rcu_access_pointer() call
These cryptsetup warnings and errors are indeed due to my zfs use, I see
them several times a month for the life of the machine, roughly the last
ten months. Don't let the 'error' there scare you, as it did me. I don't
understand them, but they also don't appear to have any consequences.
The probl
I'm sorry, I can't recall that system very well at this point. "gmain"
is the generic name used by any application using glib's
g_get_worker_context() function to create worker threads. At this point
I can't even recall if I booted that system with X11 / lightdm or if I
had configured it to boot to
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed in Ubuntu.
https://bugs.launchpad.net/bugs/1883086
Title:
package linux-image-4.4.0-178-generic 4.4.0-178.208 faile
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1882850
Title:
Touchpad not detected
Status in linux package in Ubuntu:
New
The default NFSv4 acls may be a poor choice on ZOL. This keeps biting
people unexpectedly, I wonder how many people this has affected and they
never spot it?
Thanks
** Also affects: zfs-linux (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you
I picked the last dataset given in the command output from an earlier,
but not the most recent, comment:
$ sudo zdb - srv/backups/millbarge/rpool/var/log 529
Dataset srv/backups/millbarge/rpool/var/log [ZPL], ID 39694, cr_txg 23197757,
554M, 274 objects, rootbp DVA[0]=<1:1d000d42000:1000>
DV
On Sat, May 16, 2020 at 01:56:08AM -, Seth Arnold wrote:
> Sadly, journalctl doesn't have the dmesg from the previous boot:
I meant to say, journalctl's copy of dmesg from the previous boot doesn't
have the new debug output. Sorry.
Thanks
--
You received this bug notifi
Hello Colin, trying the zfs recv operation on the .3 dkms eventually
kills my system dead. There was nothing on the console. The cursor on
the console stopped blinking; I couldn't switch VTs. My ssh sessions
were hung. ping reported destination host unreachable.
It ran for about two and a half min
Hello Colin, this looks promising for my arc_prune spinlock contention
problems:
https://github.com/openzfs/zfs/pull/10331
with some background here:
https://github.com/openzfs/zfs/issues/7559
This might have a simple ~dozen line fix! It's not yet reviewed by the
openzfs gurus but it sure *look
Thanks Colin!
[ 271.628232] dnone_free_ramge: nblks = 0, trunc = 1, len =
18446744073709551615, blkshift = 0
[ 271.628297] dnode_free_range: nblks == 0, len == 18446744073709551615
, off=0
[ 271.628298] range_tree_clear: size == 0
[ 271.628375] range_tree_find_impl: size == 0
[
Here's the part that looks important; the whole dmesg is in the
attachment.
Thanks
[ 761.730488] dnone_free_ramge: nblks = 0, trunc = 1, len =
18446744073709551615, blkshift = 0
[ 761.730542] dnode_free_range: nblks == 0, len == 18446744073709551615
, off=0
[ 761.730543] range_
This feels related to
https://bugs.launchpad.net/ubuntu/+source/rtkit/+bug/1875665 which was
filed by amd64 users.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1876697
Title:
test_regr
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1875513
Title:
wifi is not showing in select networks
Status in linux package
Hello Colin, yes, this is still an open issue:
Linux wopr 4.15.0-91-generic #92-Ubuntu SMP Fri Feb 28 11:09:48 UTC 2020
x86_64 x86_64 x86_64 GNU/Linux
Apr 22 19:10:03 wopr zed[12576]: eid=8352 class=history_event
pool_guid=0xB3B099B638F02EEF
Apr 22 19:10:03 wopr kernel: VERIFY(size != 0) failed
Colin, thanks for the link to https://github.com/openzfs/zfs/issues/9966
; unfortunately I think that's a different problem, my meta use seems
less drastic than the github issue
arc_prune 41859269059
arc_meta_used 43590932168
arc_meta_limit
I forgot to mention, my l2arc is used on the second pool on this system:
$ zpool iostat -v
capacity operations
bandwidth
pool alloc free read write read
write
-
Andreas, this system is running 18.04 LTS, 0.7.5-1ubuntu16.8,
4.15.0-91-generic.
It has 128 gigs of ram; the workload is running ripgrep on an entire
unpacked Ubuntu source archive, roughly 193 million files, 3.8 TB of
data, on a single raidz1 ssd vdev.
So I have no illusions that this workload f
Andrea, I've been running the v1 kernel for a day or so now:
[0.00] Linux version 5.4.0-24-generic (arighi@sita) (gcc version
9.3.0 (Ubuntu 9.3.0-10ubuntu1)) #28+lp1861359v1 SMP Wed Apr 15 14:49:33
UTC 2020 (Ubuntu 5.4.0-24.28+lp1861359v1-generic 5.4.30)
$ uptime
02:21:45 up 1 day, 9 min
Writing 8589934592 (eight gigs) into the zfs_arc_dnode_limit seemed to
make an improvement: the arc_prune threads would periodically spike
above 20% CPU use, but would return to 2-5% CPU use quickly; it worked
well for a long time, perhaps even hours, before all the arc_prune
threads returned to ~5
Thanks Colin,
I believe that bountysource.com url is a scrape of
https://github.com/openzfs/zfs/issues/6223
I hadn't seen much of this information before.
Sadly my machine doesn't have enough memory to just keep turning up the
knobs -- the working set far exceeds the memory of my computer.
A re
I should point out that the period bursts of writes every five seconds
in my vmstat 1 output is due to zfs's flushing mechanism; by default it
flushes dirty pages every five seconds.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in
Thanks Andrea, I don't think that helped. I'll attach a file with vmstat
1 output and funclatency output, along with a few notes on the testing.
Thanks
** Attachment added: "after-limiting-dirty-bytes"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1861359/+attachment/5349071/+files/aft
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Just to be clear, not *all* tracing tools work, but this is much better:
sarnold@millbarge:/tmp$ uname -a
Linux millbarge 5.4.0-21-generic #25-Ubuntu SMP Sat Mar 28 13:10:28 UTC 2020
x86_64 x86_64 x86_64 GNU/Linux
sarnold@millbarge:/tmp$ sudo zfsslower-bpfcc
Traceback (most recent call last):
Stefan, while recent kernels seem happier than previous kernels (I think
-14 era was terrible), I don't think this problem is fixed yet:
sarnold@millbarge:/tmp$ uname -a
Linux millbarge 5.4.0-21-generic #25-Ubuntu SMP Sat Mar 28 13:10:28 UTC 2020
x86_64 x86_64 x86_64 GNU/Linux
sarnold@millbarge:/
I'm sorry for the slow response Francis, I've been running custom kernels for:
https://bugs.launchpad.net/bugs/1861359
for a while. Thanks for the reminder.
sarnold@millbarge:~$ dmesg | grep -i lockdown
[0.00] Kernel is locked down from EFI Secure Boot mode; see man
kernel_lockdown.7
[
Sultan put together a kernel with some debugging for me:
[101616.889859] __alloc_pages_nodemask: stall of 3683ms for order-0, mask:
0x100dca
[101616.889863] Call Trace:
[101616.889880] __alloc_pages_nodemask+0x34f/0x3b0
[101616.889887] alloc_pages_vma+0x7f/0x200
[101616.889893] do_anonymous_pa
Sultan, thanks for the advice.
I set this watermark boost factor to zero as you suggested, and then
decided to try a stupid simple benchmark of my storage -- my swap is a
zfs dataset on nvme. zfs means it'll go slower than raw nvme block
access:
$ dd if=ubuntu-18.04.4-desktop-amd64.iso of=foo bs=
I'm adding the champagne tag to this bug to bring it to a potential
wider audience; I think we may need to take more drastic steps like
disabling swap on upgrades, not offering swap in our installers, etc.,
to try to have a better experience.
Thanks
** Tags added: champagne
--
You received this
BTW, this is still happening in:
Linux millbarge 5.4.0-20-generic #24-Ubuntu SMP Mon Mar 23 20:55:46 UTC
2020 x86_64 x86_64 x86_64 GNU/Linux
I've seen it both with firefox in trello, firefox in launchpad (typing
this comment) and doing two sequential wgets of
http://releases.ubuntu.com/18.04/ubun
Hello Colin, I'm not sure:
- I'm now on 5.4.0-17-generic to try to debug a different issue
- I believe I've fixed all the datasets that were failing to mount at
boot time due to unexpected files or directories in the mountpoints
- I don't know why zfs was segfaulting in the first place: it was m
There is an interesting (to me, anyway) change of behaviour with the -17
kernel: while earlier kernels would appear to be locked solid for 30-60
seconds before the screen could update, -17 allows screen updates every
six seconds or so.
I have an always-running mosh session to a remote host running
I couldn't find a way to disable the lockdown functionality short of
disabling secure boot in my UEFI system setup.
If we choose to keep lockdown enabled by default then we will need to
document a way it can be disabled so users can run applications like
https://cilium.io/ or the bcc iovisor tools
Andrea, unfortunately this updated kernel hasn't fixed the problem:
01:02:48 up 21:21, 9 users, load average: 1.45, 0.98, 0.58
Linux millbarge 5.4.0-17-generic #21-Ubuntu SMP Fri Feb 28 16:18:44 UTC
2020 x86_64 x86_64 x86_64 GNU/Linux
I was able to reproduce the swap growth and hangs with Fi
Andrea, this new kernel looks promising.
Linux millbarge 5.4.0-17-generic #21-Ubuntu SMP Fri Feb 28 16:18:44 UTC
2020 x86_64 x86_64 x86_64 GNU/Linux
Unfortunately I didn't check the reproducer before rebooting: the error
message I get with it now suggests that it might not work any more.
However
Public bug reported:
Hello, there's dangling symlinks in the zfsutils-linux binary packages
on a bionic system:
lrwxrwxrwx 1 root root7 Apr 13 2016 libnvpair1linux -> zfs-doc
lrwxrwxrwx 1 root root7 Apr 13 2016 libuutil1linux -> zfs-doc
lrwxrwxrwx 1 root root7 Apr 13 2016 libzfs2li
This web page may be a good reproducer candidate:
https://platform.leolabs.space/visualizations/conjunction?type=conjunction&reportId=2004981040
Loading it in firefox would make my computer unresponsive for over a
minute. (Be careful with firefox reloading it when re-opening firefox.)
Loading it
Public bug reported:
Hello, I tried to disable lockdown so I could debug bug 1861359.
I changed my security= kernel command line parameter to no longer
reference lockdown or integrity and yet the lockdown still applied:
sarnold@millbarge:~/Canonical/work-reports$ uname -a
Linux millbarge 5.4.0-1
$ uname -a
Linux millbarge 5.4.0-12-generic #15-Ubuntu SMP Tue Jan 21 15:12:29 UTC 2020
x86_64 x86_64 x86_64 GNU/Linux
$ cat /proc/sys/kernel/ftrace_enabled
1
$ sudo kprobe-perf -s 'p:shrink_node'
[sudo] password for sarnold:
ERROR: func shrink_node not in
/sys/kernel/debug/tracing/available_fil
$ uname -a
Linux millbarge 5.4.0-12-generic #15-Ubuntu SMP Tue Jan 21 15:12:29 UTC 2020
x86_64 x86_64 x86_64 GNU/Linux
$ grep FTRACE /boot/config-`uname -r`
CONFIG_KPROBES_ON_FTRACE=y
CONFIG_HAVE_KPROBES_ON_FTRACE=y
CONFIG_STM_SOURCE_FTRACE=m
# CONFIG_PSTORE_FTRACE is not set
CONFIG_HAVE_DYNAMIC_F
Please use CVE-2020-8832 for this issue. Thanks.
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-8832
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1862840
Title:
[Bi
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1862708
Title:
tracing doesn't work on focal
Status in linux package
apport information
** Attachment added: "PciMultimedia.txt"
https://bugs.launchpad.net/bugs/1862708/+attachment/5327192/+files/PciMultimedia.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.n
apport information
** Attachment added: "Lsusb.txt"
https://bugs.launchpad.net/bugs/1862708/+attachment/5327189/+files/Lsusb.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1862708
apport information
** Attachment added: "ProcInterrupts.txt"
https://bugs.launchpad.net/bugs/1862708/+attachment/5327194/+files/ProcInterrupts.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad
apport information
** Attachment added: "WifiSyslog.txt"
https://bugs.launchpad.net/bugs/1862708/+attachment/5327199/+files/WifiSyslog.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bug
apport information
** Attachment added: "ProcModules.txt"
https://bugs.launchpad.net/bugs/1862708/+attachment/5327195/+files/ProcModules.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/b
apport information
** Attachment added: "ProcCpuinfoMinimal.txt"
https://bugs.launchpad.net/bugs/1862708/+attachment/5327193/+files/ProcCpuinfoMinimal.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.l
apport information
** Attachment added: "RfKill.txt"
https://bugs.launchpad.net/bugs/1862708/+attachment/5327197/+files/RfKill.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1862708
apport information
** Attachment added: "Card0.Amixer.values.txt"
https://bugs.launchpad.net/bugs/1862708/+attachment/5327183/+files/Card0.Amixer.values.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs
apport information
** Attachment added: "Card0.Codecs.codec.2.txt"
https://bugs.launchpad.net/bugs/1862708/+attachment/5327185/+files/Card0.Codecs.codec.2.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bu
apport information
** Attachment added: "Lsusb-v.txt"
https://bugs.launchpad.net/bugs/1862708/+attachment/5327191/+files/Lsusb-v.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1862
apport information
** Attachment added: "PulseList.txt"
https://bugs.launchpad.net/bugs/1862708/+attachment/5327196/+files/PulseList.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/
apport information
** Attachment added: "Card1.Amixer.values.txt"
https://bugs.launchpad.net/bugs/1862708/+attachment/5327186/+files/Card1.Amixer.values.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs
apport information
** Attachment added: "CurrentDmesg.txt"
https://bugs.launchpad.net/bugs/1862708/+attachment/5327187/+files/CurrentDmesg.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net
apport information
** Attachment added: "Lspci.txt"
https://bugs.launchpad.net/bugs/1862708/+attachment/5327188/+files/Lspci.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1862708
apport information
** Attachment added: "Lsusb-t.txt"
https://bugs.launchpad.net/bugs/1862708/+attachment/5327190/+files/Lsusb-t.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1862
101 - 200 of 580 matches
Mail list logo