[Bug 1841977] Re: shiftfs: drop entries from cache on unlink

2019-10-15 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 5.0.0-32.34

---
linux (5.0.0-32.34) disco; urgency=medium

  * disco/linux: 5.0.0-32.34 -proposed tracker (LP: #1846097)

  * CVE-2019-14814 // CVE-2019-14815 // CVE-2019-14816
- mwifiex: Fix three heap overflow at parsing element in 
cfg80211_ap_settings

  * CVE-2019-15505
- media: technisat-usb2: break out of loop at end of buffer

  * CVE-2019-2181
- binder: check for overflow when alloc for security context

  * Support Hi1620 zip hw accelerator (LP: #1845355)
- [Config] Enable HiSilicon QM/ZIP as modules
- crypto: hisilicon - add queue management driver for HiSilicon QM module
- crypto: hisilicon - add hardware SGL support
- crypto: hisilicon - add HiSilicon ZIP accelerator support
- crypto: hisilicon - add SRIOV support for ZIP
- Documentation: Add debugfs doc for hisi_zip
- crypto: hisilicon - add debugfs for ZIP and QM
- MAINTAINERS: add maintainer for HiSilicon QM and ZIP controller driver
- crypto: hisilicon - fix kbuild warnings
- crypto: hisilicon - add dependency for CRYPTO_DEV_HISI_ZIP
- crypto: hisilicon - init curr_sgl_dma to fix compile warning
- crypto: hisilicon - add missing single_release
- crypto: hisilicon - fix error handle in hisi_zip_create_req_q
- crypto: hisilicon - Fix warning on printing %p with dma_addr_t
- crypto: hisilicon - Fix return value check in hisi_zip_acompress()
- crypto: hisilicon - avoid unused function warning

  * xfrm interface: several kernel panic (LP: #1836261)
- xfrm interface: fix memory leak on creation
- xfrm interface: avoid corruption on changelink
- xfrm interface: ifname may be wrong in logs
- xfrm interface: fix list corruption for x-netns
- xfrm interface: fix management of phydev

  * shiftfs: drop entries from cache on unlink (LP: #1841977)
- SAUCE: shiftfs: fix buggy unlink logic

  * shiftfs: mark kmem_cache as reclaimable (LP: #1842059)
- SAUCE: shiftfs: mark slab objects SLAB_RECLAIM_ACCOUNT

  *  Suspend to RAM(S3) does not wake up for latest megaraid and mpt3sas
adapters(SAS3.5 onwards) (LP: #1838751)
- PCI: Restore Resizable BAR size bits correctly for 1MB BARs

  * No sound inputs from the external microphone and headset on a Dell machine
(LP: #1842265)
- ALSA: hda - Expand pin_match function to match upcoming new tbls
- ALSA: hda - Define a fallback_pin_fixup_tbl for alc269 family

  * Add -fcf-protection=none when using retpoline flags (LP: #1843291)
- SAUCE: kbuild: add -fcf-protection=none when using retpoline flags

  * Disco update: upstream stable patchset 2019-09-25 (LP: #1845390)
- bridge/mdb: remove wrong use of NLM_F_MULTI
- cdc_ether: fix rndis support for Mediatek based smartphones
- ipv6: Fix the link time qualifier of 'ping_v6_proc_exit_net()'
- isdn/capi: check message length in capi_write()
- ixgbe: Fix secpath usage for IPsec TX offload.
- net: Fix null de-reference of device refcount
- net: gso: Fix skb_segment splat when splitting gso_size mangled skb having
  linear-headed frag_list
- net: phylink: Fix flow control resolution
- net: sched: fix reordering issues
- sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
- sctp: Fix the link time qualifier of 'sctp_ctrlsock_exit()'
- sctp: use transport pf_retrans in sctp_do_8_2_transport_strike
- tcp: fix tcp_ecn_withdraw_cwr() to clear TCP_ECN_QUEUE_CWR
- tipc: add NULL pointer check before calling kfree_rcu
- tun: fix use-after-free when register netdev failed
- gpiolib: acpi: Add gpiolib_acpi_run_edge_events_on_boot option and 
blacklist
- gpio: fix line flag validation in linehandle_create
- Btrfs: fix assertion failure during fsync and use of stale transaction
- ixgbe: Prevent u8 wrapping of ITR value to something less than 10us
- genirq: Prevent NULL pointer dereference in resend_irqs()
- KVM: s390: kvm_s390_vm_start_migration: check dirty_bitmap before using it
  as target for memset()
- KVM: s390: Do not leak kernel stack data in the KVM_S390_INTERRUPT ioctl
- KVM: x86: work around leak of uninitialized stack contents
- KVM: nVMX: handle page fault in vmread
- x86/purgatory: Change compiler flags from -mcmodel=kernel to 
-mcmodel=large
  to fix kexec relocation errors
- powerpc: Add barrier_nospec to raw_copy_in_user()
- drm/meson: Add support for XBGR & ABGR formats
- clk: rockchip: Don't yell about bad mmc phases when getting
- mtd: rawnand: mtk: Fix wrongly assigned OOB buffer pointer issue
- PCI: Always allow probing with driver_override
- gpio: fix line flag validation in lineevent_create
- ubifs: Correctly use tnc_next() in search_dh_cookie()
- driver core: Fix use-after-free and double free on glue directory
- crypto: talitos - check AES key size
- crypto: talitos - fix CTR alg blocksize
- crypto: talitos - ch

[Bug 1836912] Re: ipv4: enable route flushing in network namespaces

2019-10-15 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 5.0.0-32.34

---
linux (5.0.0-32.34) disco; urgency=medium

  * disco/linux: 5.0.0-32.34 -proposed tracker (LP: #1846097)

  * CVE-2019-14814 // CVE-2019-14815 // CVE-2019-14816
- mwifiex: Fix three heap overflow at parsing element in 
cfg80211_ap_settings

  * CVE-2019-15505
- media: technisat-usb2: break out of loop at end of buffer

  * CVE-2019-2181
- binder: check for overflow when alloc for security context

  * Support Hi1620 zip hw accelerator (LP: #1845355)
- [Config] Enable HiSilicon QM/ZIP as modules
- crypto: hisilicon - add queue management driver for HiSilicon QM module
- crypto: hisilicon - add hardware SGL support
- crypto: hisilicon - add HiSilicon ZIP accelerator support
- crypto: hisilicon - add SRIOV support for ZIP
- Documentation: Add debugfs doc for hisi_zip
- crypto: hisilicon - add debugfs for ZIP and QM
- MAINTAINERS: add maintainer for HiSilicon QM and ZIP controller driver
- crypto: hisilicon - fix kbuild warnings
- crypto: hisilicon - add dependency for CRYPTO_DEV_HISI_ZIP
- crypto: hisilicon - init curr_sgl_dma to fix compile warning
- crypto: hisilicon - add missing single_release
- crypto: hisilicon - fix error handle in hisi_zip_create_req_q
- crypto: hisilicon - Fix warning on printing %p with dma_addr_t
- crypto: hisilicon - Fix return value check in hisi_zip_acompress()
- crypto: hisilicon - avoid unused function warning

  * xfrm interface: several kernel panic (LP: #1836261)
- xfrm interface: fix memory leak on creation
- xfrm interface: avoid corruption on changelink
- xfrm interface: ifname may be wrong in logs
- xfrm interface: fix list corruption for x-netns
- xfrm interface: fix management of phydev

  * shiftfs: drop entries from cache on unlink (LP: #1841977)
- SAUCE: shiftfs: fix buggy unlink logic

  * shiftfs: mark kmem_cache as reclaimable (LP: #1842059)
- SAUCE: shiftfs: mark slab objects SLAB_RECLAIM_ACCOUNT

  *  Suspend to RAM(S3) does not wake up for latest megaraid and mpt3sas
adapters(SAS3.5 onwards) (LP: #1838751)
- PCI: Restore Resizable BAR size bits correctly for 1MB BARs

  * No sound inputs from the external microphone and headset on a Dell machine
(LP: #1842265)
- ALSA: hda - Expand pin_match function to match upcoming new tbls
- ALSA: hda - Define a fallback_pin_fixup_tbl for alc269 family

  * Add -fcf-protection=none when using retpoline flags (LP: #1843291)
- SAUCE: kbuild: add -fcf-protection=none when using retpoline flags

  * Disco update: upstream stable patchset 2019-09-25 (LP: #1845390)
- bridge/mdb: remove wrong use of NLM_F_MULTI
- cdc_ether: fix rndis support for Mediatek based smartphones
- ipv6: Fix the link time qualifier of 'ping_v6_proc_exit_net()'
- isdn/capi: check message length in capi_write()
- ixgbe: Fix secpath usage for IPsec TX offload.
- net: Fix null de-reference of device refcount
- net: gso: Fix skb_segment splat when splitting gso_size mangled skb having
  linear-headed frag_list
- net: phylink: Fix flow control resolution
- net: sched: fix reordering issues
- sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
- sctp: Fix the link time qualifier of 'sctp_ctrlsock_exit()'
- sctp: use transport pf_retrans in sctp_do_8_2_transport_strike
- tcp: fix tcp_ecn_withdraw_cwr() to clear TCP_ECN_QUEUE_CWR
- tipc: add NULL pointer check before calling kfree_rcu
- tun: fix use-after-free when register netdev failed
- gpiolib: acpi: Add gpiolib_acpi_run_edge_events_on_boot option and 
blacklist
- gpio: fix line flag validation in linehandle_create
- Btrfs: fix assertion failure during fsync and use of stale transaction
- ixgbe: Prevent u8 wrapping of ITR value to something less than 10us
- genirq: Prevent NULL pointer dereference in resend_irqs()
- KVM: s390: kvm_s390_vm_start_migration: check dirty_bitmap before using it
  as target for memset()
- KVM: s390: Do not leak kernel stack data in the KVM_S390_INTERRUPT ioctl
- KVM: x86: work around leak of uninitialized stack contents
- KVM: nVMX: handle page fault in vmread
- x86/purgatory: Change compiler flags from -mcmodel=kernel to 
-mcmodel=large
  to fix kexec relocation errors
- powerpc: Add barrier_nospec to raw_copy_in_user()
- drm/meson: Add support for XBGR & ABGR formats
- clk: rockchip: Don't yell about bad mmc phases when getting
- mtd: rawnand: mtk: Fix wrongly assigned OOB buffer pointer issue
- PCI: Always allow probing with driver_override
- gpio: fix line flag validation in lineevent_create
- ubifs: Correctly use tnc_next() in search_dh_cookie()
- driver core: Fix use-after-free and double free on glue directory
- crypto: talitos - check AES key size
- crypto: talitos - fix CTR alg blocksize
- crypto: talitos - ch

[Bug 1842774] Re: Enhanced Hardware Support - Finalize Naming

2019-10-15 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 5.0.0-32.34

---
linux (5.0.0-32.34) disco; urgency=medium

  * disco/linux: 5.0.0-32.34 -proposed tracker (LP: #1846097)

  * CVE-2019-14814 // CVE-2019-14815 // CVE-2019-14816
- mwifiex: Fix three heap overflow at parsing element in 
cfg80211_ap_settings

  * CVE-2019-15505
- media: technisat-usb2: break out of loop at end of buffer

  * CVE-2019-2181
- binder: check for overflow when alloc for security context

  * Support Hi1620 zip hw accelerator (LP: #1845355)
- [Config] Enable HiSilicon QM/ZIP as modules
- crypto: hisilicon - add queue management driver for HiSilicon QM module
- crypto: hisilicon - add hardware SGL support
- crypto: hisilicon - add HiSilicon ZIP accelerator support
- crypto: hisilicon - add SRIOV support for ZIP
- Documentation: Add debugfs doc for hisi_zip
- crypto: hisilicon - add debugfs for ZIP and QM
- MAINTAINERS: add maintainer for HiSilicon QM and ZIP controller driver
- crypto: hisilicon - fix kbuild warnings
- crypto: hisilicon - add dependency for CRYPTO_DEV_HISI_ZIP
- crypto: hisilicon - init curr_sgl_dma to fix compile warning
- crypto: hisilicon - add missing single_release
- crypto: hisilicon - fix error handle in hisi_zip_create_req_q
- crypto: hisilicon - Fix warning on printing %p with dma_addr_t
- crypto: hisilicon - Fix return value check in hisi_zip_acompress()
- crypto: hisilicon - avoid unused function warning

  * xfrm interface: several kernel panic (LP: #1836261)
- xfrm interface: fix memory leak on creation
- xfrm interface: avoid corruption on changelink
- xfrm interface: ifname may be wrong in logs
- xfrm interface: fix list corruption for x-netns
- xfrm interface: fix management of phydev

  * shiftfs: drop entries from cache on unlink (LP: #1841977)
- SAUCE: shiftfs: fix buggy unlink logic

  * shiftfs: mark kmem_cache as reclaimable (LP: #1842059)
- SAUCE: shiftfs: mark slab objects SLAB_RECLAIM_ACCOUNT

  *  Suspend to RAM(S3) does not wake up for latest megaraid and mpt3sas
adapters(SAS3.5 onwards) (LP: #1838751)
- PCI: Restore Resizable BAR size bits correctly for 1MB BARs

  * No sound inputs from the external microphone and headset on a Dell machine
(LP: #1842265)
- ALSA: hda - Expand pin_match function to match upcoming new tbls
- ALSA: hda - Define a fallback_pin_fixup_tbl for alc269 family

  * Add -fcf-protection=none when using retpoline flags (LP: #1843291)
- SAUCE: kbuild: add -fcf-protection=none when using retpoline flags

  * Disco update: upstream stable patchset 2019-09-25 (LP: #1845390)
- bridge/mdb: remove wrong use of NLM_F_MULTI
- cdc_ether: fix rndis support for Mediatek based smartphones
- ipv6: Fix the link time qualifier of 'ping_v6_proc_exit_net()'
- isdn/capi: check message length in capi_write()
- ixgbe: Fix secpath usage for IPsec TX offload.
- net: Fix null de-reference of device refcount
- net: gso: Fix skb_segment splat when splitting gso_size mangled skb having
  linear-headed frag_list
- net: phylink: Fix flow control resolution
- net: sched: fix reordering issues
- sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
- sctp: Fix the link time qualifier of 'sctp_ctrlsock_exit()'
- sctp: use transport pf_retrans in sctp_do_8_2_transport_strike
- tcp: fix tcp_ecn_withdraw_cwr() to clear TCP_ECN_QUEUE_CWR
- tipc: add NULL pointer check before calling kfree_rcu
- tun: fix use-after-free when register netdev failed
- gpiolib: acpi: Add gpiolib_acpi_run_edge_events_on_boot option and 
blacklist
- gpio: fix line flag validation in linehandle_create
- Btrfs: fix assertion failure during fsync and use of stale transaction
- ixgbe: Prevent u8 wrapping of ITR value to something less than 10us
- genirq: Prevent NULL pointer dereference in resend_irqs()
- KVM: s390: kvm_s390_vm_start_migration: check dirty_bitmap before using it
  as target for memset()
- KVM: s390: Do not leak kernel stack data in the KVM_S390_INTERRUPT ioctl
- KVM: x86: work around leak of uninitialized stack contents
- KVM: nVMX: handle page fault in vmread
- x86/purgatory: Change compiler flags from -mcmodel=kernel to 
-mcmodel=large
  to fix kexec relocation errors
- powerpc: Add barrier_nospec to raw_copy_in_user()
- drm/meson: Add support for XBGR & ABGR formats
- clk: rockchip: Don't yell about bad mmc phases when getting
- mtd: rawnand: mtk: Fix wrongly assigned OOB buffer pointer issue
- PCI: Always allow probing with driver_override
- gpio: fix line flag validation in lineevent_create
- ubifs: Correctly use tnc_next() in search_dh_cookie()
- driver core: Fix use-after-free and double free on glue directory
- crypto: talitos - check AES key size
- crypto: talitos - fix CTR alg blocksize
- crypto: talitos - ch

[Bug 1838751] Re: Suspend to RAM(S3) does not wake up for latest megaraid and mpt3sas adapters(SAS3.5 onwards)

2019-10-15 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 5.0.0-32.34

---
linux (5.0.0-32.34) disco; urgency=medium

  * disco/linux: 5.0.0-32.34 -proposed tracker (LP: #1846097)

  * CVE-2019-14814 // CVE-2019-14815 // CVE-2019-14816
- mwifiex: Fix three heap overflow at parsing element in 
cfg80211_ap_settings

  * CVE-2019-15505
- media: technisat-usb2: break out of loop at end of buffer

  * CVE-2019-2181
- binder: check for overflow when alloc for security context

  * Support Hi1620 zip hw accelerator (LP: #1845355)
- [Config] Enable HiSilicon QM/ZIP as modules
- crypto: hisilicon - add queue management driver for HiSilicon QM module
- crypto: hisilicon - add hardware SGL support
- crypto: hisilicon - add HiSilicon ZIP accelerator support
- crypto: hisilicon - add SRIOV support for ZIP
- Documentation: Add debugfs doc for hisi_zip
- crypto: hisilicon - add debugfs for ZIP and QM
- MAINTAINERS: add maintainer for HiSilicon QM and ZIP controller driver
- crypto: hisilicon - fix kbuild warnings
- crypto: hisilicon - add dependency for CRYPTO_DEV_HISI_ZIP
- crypto: hisilicon - init curr_sgl_dma to fix compile warning
- crypto: hisilicon - add missing single_release
- crypto: hisilicon - fix error handle in hisi_zip_create_req_q
- crypto: hisilicon - Fix warning on printing %p with dma_addr_t
- crypto: hisilicon - Fix return value check in hisi_zip_acompress()
- crypto: hisilicon - avoid unused function warning

  * xfrm interface: several kernel panic (LP: #1836261)
- xfrm interface: fix memory leak on creation
- xfrm interface: avoid corruption on changelink
- xfrm interface: ifname may be wrong in logs
- xfrm interface: fix list corruption for x-netns
- xfrm interface: fix management of phydev

  * shiftfs: drop entries from cache on unlink (LP: #1841977)
- SAUCE: shiftfs: fix buggy unlink logic

  * shiftfs: mark kmem_cache as reclaimable (LP: #1842059)
- SAUCE: shiftfs: mark slab objects SLAB_RECLAIM_ACCOUNT

  *  Suspend to RAM(S3) does not wake up for latest megaraid and mpt3sas
adapters(SAS3.5 onwards) (LP: #1838751)
- PCI: Restore Resizable BAR size bits correctly for 1MB BARs

  * No sound inputs from the external microphone and headset on a Dell machine
(LP: #1842265)
- ALSA: hda - Expand pin_match function to match upcoming new tbls
- ALSA: hda - Define a fallback_pin_fixup_tbl for alc269 family

  * Add -fcf-protection=none when using retpoline flags (LP: #1843291)
- SAUCE: kbuild: add -fcf-protection=none when using retpoline flags

  * Disco update: upstream stable patchset 2019-09-25 (LP: #1845390)
- bridge/mdb: remove wrong use of NLM_F_MULTI
- cdc_ether: fix rndis support for Mediatek based smartphones
- ipv6: Fix the link time qualifier of 'ping_v6_proc_exit_net()'
- isdn/capi: check message length in capi_write()
- ixgbe: Fix secpath usage for IPsec TX offload.
- net: Fix null de-reference of device refcount
- net: gso: Fix skb_segment splat when splitting gso_size mangled skb having
  linear-headed frag_list
- net: phylink: Fix flow control resolution
- net: sched: fix reordering issues
- sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
- sctp: Fix the link time qualifier of 'sctp_ctrlsock_exit()'
- sctp: use transport pf_retrans in sctp_do_8_2_transport_strike
- tcp: fix tcp_ecn_withdraw_cwr() to clear TCP_ECN_QUEUE_CWR
- tipc: add NULL pointer check before calling kfree_rcu
- tun: fix use-after-free when register netdev failed
- gpiolib: acpi: Add gpiolib_acpi_run_edge_events_on_boot option and 
blacklist
- gpio: fix line flag validation in linehandle_create
- Btrfs: fix assertion failure during fsync and use of stale transaction
- ixgbe: Prevent u8 wrapping of ITR value to something less than 10us
- genirq: Prevent NULL pointer dereference in resend_irqs()
- KVM: s390: kvm_s390_vm_start_migration: check dirty_bitmap before using it
  as target for memset()
- KVM: s390: Do not leak kernel stack data in the KVM_S390_INTERRUPT ioctl
- KVM: x86: work around leak of uninitialized stack contents
- KVM: nVMX: handle page fault in vmread
- x86/purgatory: Change compiler flags from -mcmodel=kernel to 
-mcmodel=large
  to fix kexec relocation errors
- powerpc: Add barrier_nospec to raw_copy_in_user()
- drm/meson: Add support for XBGR & ABGR formats
- clk: rockchip: Don't yell about bad mmc phases when getting
- mtd: rawnand: mtk: Fix wrongly assigned OOB buffer pointer issue
- PCI: Always allow probing with driver_override
- gpio: fix line flag validation in lineevent_create
- ubifs: Correctly use tnc_next() in search_dh_cookie()
- driver core: Fix use-after-free and double free on glue directory
- crypto: talitos - check AES key size
- crypto: talitos - fix CTR alg blocksize
- crypto: talitos - ch

[Bug 1836261] Re: xfrm interface: several kernel panic

2019-10-15 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 5.0.0-32.34

---
linux (5.0.0-32.34) disco; urgency=medium

  * disco/linux: 5.0.0-32.34 -proposed tracker (LP: #1846097)

  * CVE-2019-14814 // CVE-2019-14815 // CVE-2019-14816
- mwifiex: Fix three heap overflow at parsing element in 
cfg80211_ap_settings

  * CVE-2019-15505
- media: technisat-usb2: break out of loop at end of buffer

  * CVE-2019-2181
- binder: check for overflow when alloc for security context

  * Support Hi1620 zip hw accelerator (LP: #1845355)
- [Config] Enable HiSilicon QM/ZIP as modules
- crypto: hisilicon - add queue management driver for HiSilicon QM module
- crypto: hisilicon - add hardware SGL support
- crypto: hisilicon - add HiSilicon ZIP accelerator support
- crypto: hisilicon - add SRIOV support for ZIP
- Documentation: Add debugfs doc for hisi_zip
- crypto: hisilicon - add debugfs for ZIP and QM
- MAINTAINERS: add maintainer for HiSilicon QM and ZIP controller driver
- crypto: hisilicon - fix kbuild warnings
- crypto: hisilicon - add dependency for CRYPTO_DEV_HISI_ZIP
- crypto: hisilicon - init curr_sgl_dma to fix compile warning
- crypto: hisilicon - add missing single_release
- crypto: hisilicon - fix error handle in hisi_zip_create_req_q
- crypto: hisilicon - Fix warning on printing %p with dma_addr_t
- crypto: hisilicon - Fix return value check in hisi_zip_acompress()
- crypto: hisilicon - avoid unused function warning

  * xfrm interface: several kernel panic (LP: #1836261)
- xfrm interface: fix memory leak on creation
- xfrm interface: avoid corruption on changelink
- xfrm interface: ifname may be wrong in logs
- xfrm interface: fix list corruption for x-netns
- xfrm interface: fix management of phydev

  * shiftfs: drop entries from cache on unlink (LP: #1841977)
- SAUCE: shiftfs: fix buggy unlink logic

  * shiftfs: mark kmem_cache as reclaimable (LP: #1842059)
- SAUCE: shiftfs: mark slab objects SLAB_RECLAIM_ACCOUNT

  *  Suspend to RAM(S3) does not wake up for latest megaraid and mpt3sas
adapters(SAS3.5 onwards) (LP: #1838751)
- PCI: Restore Resizable BAR size bits correctly for 1MB BARs

  * No sound inputs from the external microphone and headset on a Dell machine
(LP: #1842265)
- ALSA: hda - Expand pin_match function to match upcoming new tbls
- ALSA: hda - Define a fallback_pin_fixup_tbl for alc269 family

  * Add -fcf-protection=none when using retpoline flags (LP: #1843291)
- SAUCE: kbuild: add -fcf-protection=none when using retpoline flags

  * Disco update: upstream stable patchset 2019-09-25 (LP: #1845390)
- bridge/mdb: remove wrong use of NLM_F_MULTI
- cdc_ether: fix rndis support for Mediatek based smartphones
- ipv6: Fix the link time qualifier of 'ping_v6_proc_exit_net()'
- isdn/capi: check message length in capi_write()
- ixgbe: Fix secpath usage for IPsec TX offload.
- net: Fix null de-reference of device refcount
- net: gso: Fix skb_segment splat when splitting gso_size mangled skb having
  linear-headed frag_list
- net: phylink: Fix flow control resolution
- net: sched: fix reordering issues
- sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
- sctp: Fix the link time qualifier of 'sctp_ctrlsock_exit()'
- sctp: use transport pf_retrans in sctp_do_8_2_transport_strike
- tcp: fix tcp_ecn_withdraw_cwr() to clear TCP_ECN_QUEUE_CWR
- tipc: add NULL pointer check before calling kfree_rcu
- tun: fix use-after-free when register netdev failed
- gpiolib: acpi: Add gpiolib_acpi_run_edge_events_on_boot option and 
blacklist
- gpio: fix line flag validation in linehandle_create
- Btrfs: fix assertion failure during fsync and use of stale transaction
- ixgbe: Prevent u8 wrapping of ITR value to something less than 10us
- genirq: Prevent NULL pointer dereference in resend_irqs()
- KVM: s390: kvm_s390_vm_start_migration: check dirty_bitmap before using it
  as target for memset()
- KVM: s390: Do not leak kernel stack data in the KVM_S390_INTERRUPT ioctl
- KVM: x86: work around leak of uninitialized stack contents
- KVM: nVMX: handle page fault in vmread
- x86/purgatory: Change compiler flags from -mcmodel=kernel to 
-mcmodel=large
  to fix kexec relocation errors
- powerpc: Add barrier_nospec to raw_copy_in_user()
- drm/meson: Add support for XBGR & ABGR formats
- clk: rockchip: Don't yell about bad mmc phases when getting
- mtd: rawnand: mtk: Fix wrongly assigned OOB buffer pointer issue
- PCI: Always allow probing with driver_override
- gpio: fix line flag validation in lineevent_create
- ubifs: Correctly use tnc_next() in search_dh_cookie()
- driver core: Fix use-after-free and double free on glue directory
- crypto: talitos - check AES key size
- crypto: talitos - fix CTR alg blocksize
- crypto: talitos - ch

[Bug 1842265] Re: No sound inputs from the external microphone and headset on a Dell machine

2019-10-15 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 5.0.0-32.34

---
linux (5.0.0-32.34) disco; urgency=medium

  * disco/linux: 5.0.0-32.34 -proposed tracker (LP: #1846097)

  * CVE-2019-14814 // CVE-2019-14815 // CVE-2019-14816
- mwifiex: Fix three heap overflow at parsing element in 
cfg80211_ap_settings

  * CVE-2019-15505
- media: technisat-usb2: break out of loop at end of buffer

  * CVE-2019-2181
- binder: check for overflow when alloc for security context

  * Support Hi1620 zip hw accelerator (LP: #1845355)
- [Config] Enable HiSilicon QM/ZIP as modules
- crypto: hisilicon - add queue management driver for HiSilicon QM module
- crypto: hisilicon - add hardware SGL support
- crypto: hisilicon - add HiSilicon ZIP accelerator support
- crypto: hisilicon - add SRIOV support for ZIP
- Documentation: Add debugfs doc for hisi_zip
- crypto: hisilicon - add debugfs for ZIP and QM
- MAINTAINERS: add maintainer for HiSilicon QM and ZIP controller driver
- crypto: hisilicon - fix kbuild warnings
- crypto: hisilicon - add dependency for CRYPTO_DEV_HISI_ZIP
- crypto: hisilicon - init curr_sgl_dma to fix compile warning
- crypto: hisilicon - add missing single_release
- crypto: hisilicon - fix error handle in hisi_zip_create_req_q
- crypto: hisilicon - Fix warning on printing %p with dma_addr_t
- crypto: hisilicon - Fix return value check in hisi_zip_acompress()
- crypto: hisilicon - avoid unused function warning

  * xfrm interface: several kernel panic (LP: #1836261)
- xfrm interface: fix memory leak on creation
- xfrm interface: avoid corruption on changelink
- xfrm interface: ifname may be wrong in logs
- xfrm interface: fix list corruption for x-netns
- xfrm interface: fix management of phydev

  * shiftfs: drop entries from cache on unlink (LP: #1841977)
- SAUCE: shiftfs: fix buggy unlink logic

  * shiftfs: mark kmem_cache as reclaimable (LP: #1842059)
- SAUCE: shiftfs: mark slab objects SLAB_RECLAIM_ACCOUNT

  *  Suspend to RAM(S3) does not wake up for latest megaraid and mpt3sas
adapters(SAS3.5 onwards) (LP: #1838751)
- PCI: Restore Resizable BAR size bits correctly for 1MB BARs

  * No sound inputs from the external microphone and headset on a Dell machine
(LP: #1842265)
- ALSA: hda - Expand pin_match function to match upcoming new tbls
- ALSA: hda - Define a fallback_pin_fixup_tbl for alc269 family

  * Add -fcf-protection=none when using retpoline flags (LP: #1843291)
- SAUCE: kbuild: add -fcf-protection=none when using retpoline flags

  * Disco update: upstream stable patchset 2019-09-25 (LP: #1845390)
- bridge/mdb: remove wrong use of NLM_F_MULTI
- cdc_ether: fix rndis support for Mediatek based smartphones
- ipv6: Fix the link time qualifier of 'ping_v6_proc_exit_net()'
- isdn/capi: check message length in capi_write()
- ixgbe: Fix secpath usage for IPsec TX offload.
- net: Fix null de-reference of device refcount
- net: gso: Fix skb_segment splat when splitting gso_size mangled skb having
  linear-headed frag_list
- net: phylink: Fix flow control resolution
- net: sched: fix reordering issues
- sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
- sctp: Fix the link time qualifier of 'sctp_ctrlsock_exit()'
- sctp: use transport pf_retrans in sctp_do_8_2_transport_strike
- tcp: fix tcp_ecn_withdraw_cwr() to clear TCP_ECN_QUEUE_CWR
- tipc: add NULL pointer check before calling kfree_rcu
- tun: fix use-after-free when register netdev failed
- gpiolib: acpi: Add gpiolib_acpi_run_edge_events_on_boot option and 
blacklist
- gpio: fix line flag validation in linehandle_create
- Btrfs: fix assertion failure during fsync and use of stale transaction
- ixgbe: Prevent u8 wrapping of ITR value to something less than 10us
- genirq: Prevent NULL pointer dereference in resend_irqs()
- KVM: s390: kvm_s390_vm_start_migration: check dirty_bitmap before using it
  as target for memset()
- KVM: s390: Do not leak kernel stack data in the KVM_S390_INTERRUPT ioctl
- KVM: x86: work around leak of uninitialized stack contents
- KVM: nVMX: handle page fault in vmread
- x86/purgatory: Change compiler flags from -mcmodel=kernel to 
-mcmodel=large
  to fix kexec relocation errors
- powerpc: Add barrier_nospec to raw_copy_in_user()
- drm/meson: Add support for XBGR & ABGR formats
- clk: rockchip: Don't yell about bad mmc phases when getting
- mtd: rawnand: mtk: Fix wrongly assigned OOB buffer pointer issue
- PCI: Always allow probing with driver_override
- gpio: fix line flag validation in lineevent_create
- ubifs: Correctly use tnc_next() in search_dh_cookie()
- driver core: Fix use-after-free and double free on glue directory
- crypto: talitos - check AES key size
- crypto: talitos - fix CTR alg blocksize
- crypto: talitos - ch

[Bug 1838886] Re: New ID in ums-realtek module breaks cardreader

2019-10-15 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 5.0.0-32.34

---
linux (5.0.0-32.34) disco; urgency=medium

  * disco/linux: 5.0.0-32.34 -proposed tracker (LP: #1846097)

  * CVE-2019-14814 // CVE-2019-14815 // CVE-2019-14816
- mwifiex: Fix three heap overflow at parsing element in 
cfg80211_ap_settings

  * CVE-2019-15505
- media: technisat-usb2: break out of loop at end of buffer

  * CVE-2019-2181
- binder: check for overflow when alloc for security context

  * Support Hi1620 zip hw accelerator (LP: #1845355)
- [Config] Enable HiSilicon QM/ZIP as modules
- crypto: hisilicon - add queue management driver for HiSilicon QM module
- crypto: hisilicon - add hardware SGL support
- crypto: hisilicon - add HiSilicon ZIP accelerator support
- crypto: hisilicon - add SRIOV support for ZIP
- Documentation: Add debugfs doc for hisi_zip
- crypto: hisilicon - add debugfs for ZIP and QM
- MAINTAINERS: add maintainer for HiSilicon QM and ZIP controller driver
- crypto: hisilicon - fix kbuild warnings
- crypto: hisilicon - add dependency for CRYPTO_DEV_HISI_ZIP
- crypto: hisilicon - init curr_sgl_dma to fix compile warning
- crypto: hisilicon - add missing single_release
- crypto: hisilicon - fix error handle in hisi_zip_create_req_q
- crypto: hisilicon - Fix warning on printing %p with dma_addr_t
- crypto: hisilicon - Fix return value check in hisi_zip_acompress()
- crypto: hisilicon - avoid unused function warning

  * xfrm interface: several kernel panic (LP: #1836261)
- xfrm interface: fix memory leak on creation
- xfrm interface: avoid corruption on changelink
- xfrm interface: ifname may be wrong in logs
- xfrm interface: fix list corruption for x-netns
- xfrm interface: fix management of phydev

  * shiftfs: drop entries from cache on unlink (LP: #1841977)
- SAUCE: shiftfs: fix buggy unlink logic

  * shiftfs: mark kmem_cache as reclaimable (LP: #1842059)
- SAUCE: shiftfs: mark slab objects SLAB_RECLAIM_ACCOUNT

  *  Suspend to RAM(S3) does not wake up for latest megaraid and mpt3sas
adapters(SAS3.5 onwards) (LP: #1838751)
- PCI: Restore Resizable BAR size bits correctly for 1MB BARs

  * No sound inputs from the external microphone and headset on a Dell machine
(LP: #1842265)
- ALSA: hda - Expand pin_match function to match upcoming new tbls
- ALSA: hda - Define a fallback_pin_fixup_tbl for alc269 family

  * Add -fcf-protection=none when using retpoline flags (LP: #1843291)
- SAUCE: kbuild: add -fcf-protection=none when using retpoline flags

  * Disco update: upstream stable patchset 2019-09-25 (LP: #1845390)
- bridge/mdb: remove wrong use of NLM_F_MULTI
- cdc_ether: fix rndis support for Mediatek based smartphones
- ipv6: Fix the link time qualifier of 'ping_v6_proc_exit_net()'
- isdn/capi: check message length in capi_write()
- ixgbe: Fix secpath usage for IPsec TX offload.
- net: Fix null de-reference of device refcount
- net: gso: Fix skb_segment splat when splitting gso_size mangled skb having
  linear-headed frag_list
- net: phylink: Fix flow control resolution
- net: sched: fix reordering issues
- sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
- sctp: Fix the link time qualifier of 'sctp_ctrlsock_exit()'
- sctp: use transport pf_retrans in sctp_do_8_2_transport_strike
- tcp: fix tcp_ecn_withdraw_cwr() to clear TCP_ECN_QUEUE_CWR
- tipc: add NULL pointer check before calling kfree_rcu
- tun: fix use-after-free when register netdev failed
- gpiolib: acpi: Add gpiolib_acpi_run_edge_events_on_boot option and 
blacklist
- gpio: fix line flag validation in linehandle_create
- Btrfs: fix assertion failure during fsync and use of stale transaction
- ixgbe: Prevent u8 wrapping of ITR value to something less than 10us
- genirq: Prevent NULL pointer dereference in resend_irqs()
- KVM: s390: kvm_s390_vm_start_migration: check dirty_bitmap before using it
  as target for memset()
- KVM: s390: Do not leak kernel stack data in the KVM_S390_INTERRUPT ioctl
- KVM: x86: work around leak of uninitialized stack contents
- KVM: nVMX: handle page fault in vmread
- x86/purgatory: Change compiler flags from -mcmodel=kernel to 
-mcmodel=large
  to fix kexec relocation errors
- powerpc: Add barrier_nospec to raw_copy_in_user()
- drm/meson: Add support for XBGR & ABGR formats
- clk: rockchip: Don't yell about bad mmc phases when getting
- mtd: rawnand: mtk: Fix wrongly assigned OOB buffer pointer issue
- PCI: Always allow probing with driver_override
- gpio: fix line flag validation in lineevent_create
- ubifs: Correctly use tnc_next() in search_dh_cookie()
- driver core: Fix use-after-free and double free on glue directory
- crypto: talitos - check AES key size
- crypto: talitos - fix CTR alg blocksize
- crypto: talitos - ch

[Bug 1842059] Re: shiftfs: mark kmem_cache as reclaimable

2019-10-15 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 5.0.0-32.34

---
linux (5.0.0-32.34) disco; urgency=medium

  * disco/linux: 5.0.0-32.34 -proposed tracker (LP: #1846097)

  * CVE-2019-14814 // CVE-2019-14815 // CVE-2019-14816
- mwifiex: Fix three heap overflow at parsing element in 
cfg80211_ap_settings

  * CVE-2019-15505
- media: technisat-usb2: break out of loop at end of buffer

  * CVE-2019-2181
- binder: check for overflow when alloc for security context

  * Support Hi1620 zip hw accelerator (LP: #1845355)
- [Config] Enable HiSilicon QM/ZIP as modules
- crypto: hisilicon - add queue management driver for HiSilicon QM module
- crypto: hisilicon - add hardware SGL support
- crypto: hisilicon - add HiSilicon ZIP accelerator support
- crypto: hisilicon - add SRIOV support for ZIP
- Documentation: Add debugfs doc for hisi_zip
- crypto: hisilicon - add debugfs for ZIP and QM
- MAINTAINERS: add maintainer for HiSilicon QM and ZIP controller driver
- crypto: hisilicon - fix kbuild warnings
- crypto: hisilicon - add dependency for CRYPTO_DEV_HISI_ZIP
- crypto: hisilicon - init curr_sgl_dma to fix compile warning
- crypto: hisilicon - add missing single_release
- crypto: hisilicon - fix error handle in hisi_zip_create_req_q
- crypto: hisilicon - Fix warning on printing %p with dma_addr_t
- crypto: hisilicon - Fix return value check in hisi_zip_acompress()
- crypto: hisilicon - avoid unused function warning

  * xfrm interface: several kernel panic (LP: #1836261)
- xfrm interface: fix memory leak on creation
- xfrm interface: avoid corruption on changelink
- xfrm interface: ifname may be wrong in logs
- xfrm interface: fix list corruption for x-netns
- xfrm interface: fix management of phydev

  * shiftfs: drop entries from cache on unlink (LP: #1841977)
- SAUCE: shiftfs: fix buggy unlink logic

  * shiftfs: mark kmem_cache as reclaimable (LP: #1842059)
- SAUCE: shiftfs: mark slab objects SLAB_RECLAIM_ACCOUNT

  *  Suspend to RAM(S3) does not wake up for latest megaraid and mpt3sas
adapters(SAS3.5 onwards) (LP: #1838751)
- PCI: Restore Resizable BAR size bits correctly for 1MB BARs

  * No sound inputs from the external microphone and headset on a Dell machine
(LP: #1842265)
- ALSA: hda - Expand pin_match function to match upcoming new tbls
- ALSA: hda - Define a fallback_pin_fixup_tbl for alc269 family

  * Add -fcf-protection=none when using retpoline flags (LP: #1843291)
- SAUCE: kbuild: add -fcf-protection=none when using retpoline flags

  * Disco update: upstream stable patchset 2019-09-25 (LP: #1845390)
- bridge/mdb: remove wrong use of NLM_F_MULTI
- cdc_ether: fix rndis support for Mediatek based smartphones
- ipv6: Fix the link time qualifier of 'ping_v6_proc_exit_net()'
- isdn/capi: check message length in capi_write()
- ixgbe: Fix secpath usage for IPsec TX offload.
- net: Fix null de-reference of device refcount
- net: gso: Fix skb_segment splat when splitting gso_size mangled skb having
  linear-headed frag_list
- net: phylink: Fix flow control resolution
- net: sched: fix reordering issues
- sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
- sctp: Fix the link time qualifier of 'sctp_ctrlsock_exit()'
- sctp: use transport pf_retrans in sctp_do_8_2_transport_strike
- tcp: fix tcp_ecn_withdraw_cwr() to clear TCP_ECN_QUEUE_CWR
- tipc: add NULL pointer check before calling kfree_rcu
- tun: fix use-after-free when register netdev failed
- gpiolib: acpi: Add gpiolib_acpi_run_edge_events_on_boot option and 
blacklist
- gpio: fix line flag validation in linehandle_create
- Btrfs: fix assertion failure during fsync and use of stale transaction
- ixgbe: Prevent u8 wrapping of ITR value to something less than 10us
- genirq: Prevent NULL pointer dereference in resend_irqs()
- KVM: s390: kvm_s390_vm_start_migration: check dirty_bitmap before using it
  as target for memset()
- KVM: s390: Do not leak kernel stack data in the KVM_S390_INTERRUPT ioctl
- KVM: x86: work around leak of uninitialized stack contents
- KVM: nVMX: handle page fault in vmread
- x86/purgatory: Change compiler flags from -mcmodel=kernel to 
-mcmodel=large
  to fix kexec relocation errors
- powerpc: Add barrier_nospec to raw_copy_in_user()
- drm/meson: Add support for XBGR & ABGR formats
- clk: rockchip: Don't yell about bad mmc phases when getting
- mtd: rawnand: mtk: Fix wrongly assigned OOB buffer pointer issue
- PCI: Always allow probing with driver_override
- gpio: fix line flag validation in lineevent_create
- ubifs: Correctly use tnc_next() in search_dh_cookie()
- driver core: Fix use-after-free and double free on glue directory
- crypto: talitos - check AES key size
- crypto: talitos - fix CTR alg blocksize
- crypto: talitos - ch

[Bug 1845390] Re: Disco update: upstream stable patchset 2019-09-25

2019-10-15 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 5.0.0-32.34

---
linux (5.0.0-32.34) disco; urgency=medium

  * disco/linux: 5.0.0-32.34 -proposed tracker (LP: #1846097)

  * CVE-2019-14814 // CVE-2019-14815 // CVE-2019-14816
- mwifiex: Fix three heap overflow at parsing element in 
cfg80211_ap_settings

  * CVE-2019-15505
- media: technisat-usb2: break out of loop at end of buffer

  * CVE-2019-2181
- binder: check for overflow when alloc for security context

  * Support Hi1620 zip hw accelerator (LP: #1845355)
- [Config] Enable HiSilicon QM/ZIP as modules
- crypto: hisilicon - add queue management driver for HiSilicon QM module
- crypto: hisilicon - add hardware SGL support
- crypto: hisilicon - add HiSilicon ZIP accelerator support
- crypto: hisilicon - add SRIOV support for ZIP
- Documentation: Add debugfs doc for hisi_zip
- crypto: hisilicon - add debugfs for ZIP and QM
- MAINTAINERS: add maintainer for HiSilicon QM and ZIP controller driver
- crypto: hisilicon - fix kbuild warnings
- crypto: hisilicon - add dependency for CRYPTO_DEV_HISI_ZIP
- crypto: hisilicon - init curr_sgl_dma to fix compile warning
- crypto: hisilicon - add missing single_release
- crypto: hisilicon - fix error handle in hisi_zip_create_req_q
- crypto: hisilicon - Fix warning on printing %p with dma_addr_t
- crypto: hisilicon - Fix return value check in hisi_zip_acompress()
- crypto: hisilicon - avoid unused function warning

  * xfrm interface: several kernel panic (LP: #1836261)
- xfrm interface: fix memory leak on creation
- xfrm interface: avoid corruption on changelink
- xfrm interface: ifname may be wrong in logs
- xfrm interface: fix list corruption for x-netns
- xfrm interface: fix management of phydev

  * shiftfs: drop entries from cache on unlink (LP: #1841977)
- SAUCE: shiftfs: fix buggy unlink logic

  * shiftfs: mark kmem_cache as reclaimable (LP: #1842059)
- SAUCE: shiftfs: mark slab objects SLAB_RECLAIM_ACCOUNT

  *  Suspend to RAM(S3) does not wake up for latest megaraid and mpt3sas
adapters(SAS3.5 onwards) (LP: #1838751)
- PCI: Restore Resizable BAR size bits correctly for 1MB BARs

  * No sound inputs from the external microphone and headset on a Dell machine
(LP: #1842265)
- ALSA: hda - Expand pin_match function to match upcoming new tbls
- ALSA: hda - Define a fallback_pin_fixup_tbl for alc269 family

  * Add -fcf-protection=none when using retpoline flags (LP: #1843291)
- SAUCE: kbuild: add -fcf-protection=none when using retpoline flags

  * Disco update: upstream stable patchset 2019-09-25 (LP: #1845390)
- bridge/mdb: remove wrong use of NLM_F_MULTI
- cdc_ether: fix rndis support for Mediatek based smartphones
- ipv6: Fix the link time qualifier of 'ping_v6_proc_exit_net()'
- isdn/capi: check message length in capi_write()
- ixgbe: Fix secpath usage for IPsec TX offload.
- net: Fix null de-reference of device refcount
- net: gso: Fix skb_segment splat when splitting gso_size mangled skb having
  linear-headed frag_list
- net: phylink: Fix flow control resolution
- net: sched: fix reordering issues
- sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
- sctp: Fix the link time qualifier of 'sctp_ctrlsock_exit()'
- sctp: use transport pf_retrans in sctp_do_8_2_transport_strike
- tcp: fix tcp_ecn_withdraw_cwr() to clear TCP_ECN_QUEUE_CWR
- tipc: add NULL pointer check before calling kfree_rcu
- tun: fix use-after-free when register netdev failed
- gpiolib: acpi: Add gpiolib_acpi_run_edge_events_on_boot option and 
blacklist
- gpio: fix line flag validation in linehandle_create
- Btrfs: fix assertion failure during fsync and use of stale transaction
- ixgbe: Prevent u8 wrapping of ITR value to something less than 10us
- genirq: Prevent NULL pointer dereference in resend_irqs()
- KVM: s390: kvm_s390_vm_start_migration: check dirty_bitmap before using it
  as target for memset()
- KVM: s390: Do not leak kernel stack data in the KVM_S390_INTERRUPT ioctl
- KVM: x86: work around leak of uninitialized stack contents
- KVM: nVMX: handle page fault in vmread
- x86/purgatory: Change compiler flags from -mcmodel=kernel to 
-mcmodel=large
  to fix kexec relocation errors
- powerpc: Add barrier_nospec to raw_copy_in_user()
- drm/meson: Add support for XBGR & ABGR formats
- clk: rockchip: Don't yell about bad mmc phases when getting
- mtd: rawnand: mtk: Fix wrongly assigned OOB buffer pointer issue
- PCI: Always allow probing with driver_override
- gpio: fix line flag validation in lineevent_create
- ubifs: Correctly use tnc_next() in search_dh_cookie()
- driver core: Fix use-after-free and double free on glue directory
- crypto: talitos - check AES key size
- crypto: talitos - fix CTR alg blocksize
- crypto: talitos - ch

[Bug 1845506] Re: Libvirt snapshot doesn't update apparmor profile

2019-10-15 Thread Christian Ehrhardt 
Example if you run snapshot and hot-add concurrently it might loose one
rule and break.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1845506

Title:
  Libvirt snapshot doesn't update apparmor profile

To manage notifications about this bug go to:
https://bugs.launchpad.net/libvirt/+bug/1845506/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1843291] Re: Add -fcf-protection=none when using retpoline flags

2019-10-15 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 5.0.0-32.34

---
linux (5.0.0-32.34) disco; urgency=medium

  * disco/linux: 5.0.0-32.34 -proposed tracker (LP: #1846097)

  * CVE-2019-14814 // CVE-2019-14815 // CVE-2019-14816
- mwifiex: Fix three heap overflow at parsing element in 
cfg80211_ap_settings

  * CVE-2019-15505
- media: technisat-usb2: break out of loop at end of buffer

  * CVE-2019-2181
- binder: check for overflow when alloc for security context

  * Support Hi1620 zip hw accelerator (LP: #1845355)
- [Config] Enable HiSilicon QM/ZIP as modules
- crypto: hisilicon - add queue management driver for HiSilicon QM module
- crypto: hisilicon - add hardware SGL support
- crypto: hisilicon - add HiSilicon ZIP accelerator support
- crypto: hisilicon - add SRIOV support for ZIP
- Documentation: Add debugfs doc for hisi_zip
- crypto: hisilicon - add debugfs for ZIP and QM
- MAINTAINERS: add maintainer for HiSilicon QM and ZIP controller driver
- crypto: hisilicon - fix kbuild warnings
- crypto: hisilicon - add dependency for CRYPTO_DEV_HISI_ZIP
- crypto: hisilicon - init curr_sgl_dma to fix compile warning
- crypto: hisilicon - add missing single_release
- crypto: hisilicon - fix error handle in hisi_zip_create_req_q
- crypto: hisilicon - Fix warning on printing %p with dma_addr_t
- crypto: hisilicon - Fix return value check in hisi_zip_acompress()
- crypto: hisilicon - avoid unused function warning

  * xfrm interface: several kernel panic (LP: #1836261)
- xfrm interface: fix memory leak on creation
- xfrm interface: avoid corruption on changelink
- xfrm interface: ifname may be wrong in logs
- xfrm interface: fix list corruption for x-netns
- xfrm interface: fix management of phydev

  * shiftfs: drop entries from cache on unlink (LP: #1841977)
- SAUCE: shiftfs: fix buggy unlink logic

  * shiftfs: mark kmem_cache as reclaimable (LP: #1842059)
- SAUCE: shiftfs: mark slab objects SLAB_RECLAIM_ACCOUNT

  *  Suspend to RAM(S3) does not wake up for latest megaraid and mpt3sas
adapters(SAS3.5 onwards) (LP: #1838751)
- PCI: Restore Resizable BAR size bits correctly for 1MB BARs

  * No sound inputs from the external microphone and headset on a Dell machine
(LP: #1842265)
- ALSA: hda - Expand pin_match function to match upcoming new tbls
- ALSA: hda - Define a fallback_pin_fixup_tbl for alc269 family

  * Add -fcf-protection=none when using retpoline flags (LP: #1843291)
- SAUCE: kbuild: add -fcf-protection=none when using retpoline flags

  * Disco update: upstream stable patchset 2019-09-25 (LP: #1845390)
- bridge/mdb: remove wrong use of NLM_F_MULTI
- cdc_ether: fix rndis support for Mediatek based smartphones
- ipv6: Fix the link time qualifier of 'ping_v6_proc_exit_net()'
- isdn/capi: check message length in capi_write()
- ixgbe: Fix secpath usage for IPsec TX offload.
- net: Fix null de-reference of device refcount
- net: gso: Fix skb_segment splat when splitting gso_size mangled skb having
  linear-headed frag_list
- net: phylink: Fix flow control resolution
- net: sched: fix reordering issues
- sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
- sctp: Fix the link time qualifier of 'sctp_ctrlsock_exit()'
- sctp: use transport pf_retrans in sctp_do_8_2_transport_strike
- tcp: fix tcp_ecn_withdraw_cwr() to clear TCP_ECN_QUEUE_CWR
- tipc: add NULL pointer check before calling kfree_rcu
- tun: fix use-after-free when register netdev failed
- gpiolib: acpi: Add gpiolib_acpi_run_edge_events_on_boot option and 
blacklist
- gpio: fix line flag validation in linehandle_create
- Btrfs: fix assertion failure during fsync and use of stale transaction
- ixgbe: Prevent u8 wrapping of ITR value to something less than 10us
- genirq: Prevent NULL pointer dereference in resend_irqs()
- KVM: s390: kvm_s390_vm_start_migration: check dirty_bitmap before using it
  as target for memset()
- KVM: s390: Do not leak kernel stack data in the KVM_S390_INTERRUPT ioctl
- KVM: x86: work around leak of uninitialized stack contents
- KVM: nVMX: handle page fault in vmread
- x86/purgatory: Change compiler flags from -mcmodel=kernel to 
-mcmodel=large
  to fix kexec relocation errors
- powerpc: Add barrier_nospec to raw_copy_in_user()
- drm/meson: Add support for XBGR & ABGR formats
- clk: rockchip: Don't yell about bad mmc phases when getting
- mtd: rawnand: mtk: Fix wrongly assigned OOB buffer pointer issue
- PCI: Always allow probing with driver_override
- gpio: fix line flag validation in lineevent_create
- ubifs: Correctly use tnc_next() in search_dh_cookie()
- driver core: Fix use-after-free and double free on glue directory
- crypto: talitos - check AES key size
- crypto: talitos - fix CTR alg blocksize
- crypto: talitos - ch

[Bug 1844722] Re: Disco update: upstream stable patchset 2019-09-19

2019-10-15 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 5.0.0-32.34

---
linux (5.0.0-32.34) disco; urgency=medium

  * disco/linux: 5.0.0-32.34 -proposed tracker (LP: #1846097)

  * CVE-2019-14814 // CVE-2019-14815 // CVE-2019-14816
- mwifiex: Fix three heap overflow at parsing element in 
cfg80211_ap_settings

  * CVE-2019-15505
- media: technisat-usb2: break out of loop at end of buffer

  * CVE-2019-2181
- binder: check for overflow when alloc for security context

  * Support Hi1620 zip hw accelerator (LP: #1845355)
- [Config] Enable HiSilicon QM/ZIP as modules
- crypto: hisilicon - add queue management driver for HiSilicon QM module
- crypto: hisilicon - add hardware SGL support
- crypto: hisilicon - add HiSilicon ZIP accelerator support
- crypto: hisilicon - add SRIOV support for ZIP
- Documentation: Add debugfs doc for hisi_zip
- crypto: hisilicon - add debugfs for ZIP and QM
- MAINTAINERS: add maintainer for HiSilicon QM and ZIP controller driver
- crypto: hisilicon - fix kbuild warnings
- crypto: hisilicon - add dependency for CRYPTO_DEV_HISI_ZIP
- crypto: hisilicon - init curr_sgl_dma to fix compile warning
- crypto: hisilicon - add missing single_release
- crypto: hisilicon - fix error handle in hisi_zip_create_req_q
- crypto: hisilicon - Fix warning on printing %p with dma_addr_t
- crypto: hisilicon - Fix return value check in hisi_zip_acompress()
- crypto: hisilicon - avoid unused function warning

  * xfrm interface: several kernel panic (LP: #1836261)
- xfrm interface: fix memory leak on creation
- xfrm interface: avoid corruption on changelink
- xfrm interface: ifname may be wrong in logs
- xfrm interface: fix list corruption for x-netns
- xfrm interface: fix management of phydev

  * shiftfs: drop entries from cache on unlink (LP: #1841977)
- SAUCE: shiftfs: fix buggy unlink logic

  * shiftfs: mark kmem_cache as reclaimable (LP: #1842059)
- SAUCE: shiftfs: mark slab objects SLAB_RECLAIM_ACCOUNT

  *  Suspend to RAM(S3) does not wake up for latest megaraid and mpt3sas
adapters(SAS3.5 onwards) (LP: #1838751)
- PCI: Restore Resizable BAR size bits correctly for 1MB BARs

  * No sound inputs from the external microphone and headset on a Dell machine
(LP: #1842265)
- ALSA: hda - Expand pin_match function to match upcoming new tbls
- ALSA: hda - Define a fallback_pin_fixup_tbl for alc269 family

  * Add -fcf-protection=none when using retpoline flags (LP: #1843291)
- SAUCE: kbuild: add -fcf-protection=none when using retpoline flags

  * Disco update: upstream stable patchset 2019-09-25 (LP: #1845390)
- bridge/mdb: remove wrong use of NLM_F_MULTI
- cdc_ether: fix rndis support for Mediatek based smartphones
- ipv6: Fix the link time qualifier of 'ping_v6_proc_exit_net()'
- isdn/capi: check message length in capi_write()
- ixgbe: Fix secpath usage for IPsec TX offload.
- net: Fix null de-reference of device refcount
- net: gso: Fix skb_segment splat when splitting gso_size mangled skb having
  linear-headed frag_list
- net: phylink: Fix flow control resolution
- net: sched: fix reordering issues
- sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
- sctp: Fix the link time qualifier of 'sctp_ctrlsock_exit()'
- sctp: use transport pf_retrans in sctp_do_8_2_transport_strike
- tcp: fix tcp_ecn_withdraw_cwr() to clear TCP_ECN_QUEUE_CWR
- tipc: add NULL pointer check before calling kfree_rcu
- tun: fix use-after-free when register netdev failed
- gpiolib: acpi: Add gpiolib_acpi_run_edge_events_on_boot option and 
blacklist
- gpio: fix line flag validation in linehandle_create
- Btrfs: fix assertion failure during fsync and use of stale transaction
- ixgbe: Prevent u8 wrapping of ITR value to something less than 10us
- genirq: Prevent NULL pointer dereference in resend_irqs()
- KVM: s390: kvm_s390_vm_start_migration: check dirty_bitmap before using it
  as target for memset()
- KVM: s390: Do not leak kernel stack data in the KVM_S390_INTERRUPT ioctl
- KVM: x86: work around leak of uninitialized stack contents
- KVM: nVMX: handle page fault in vmread
- x86/purgatory: Change compiler flags from -mcmodel=kernel to 
-mcmodel=large
  to fix kexec relocation errors
- powerpc: Add barrier_nospec to raw_copy_in_user()
- drm/meson: Add support for XBGR & ABGR formats
- clk: rockchip: Don't yell about bad mmc phases when getting
- mtd: rawnand: mtk: Fix wrongly assigned OOB buffer pointer issue
- PCI: Always allow probing with driver_override
- gpio: fix line flag validation in lineevent_create
- ubifs: Correctly use tnc_next() in search_dh_cookie()
- driver core: Fix use-after-free and double free on glue directory
- crypto: talitos - check AES key size
- crypto: talitos - fix CTR alg blocksize
- crypto: talitos - ch

[Bug 1845506] Re: Libvirt snapshot doesn't update apparmor profile

2019-10-15 Thread Christian Ehrhardt 
ok, attach-device and attach-disk only support one device on each
invocation and thereby are safe even if they would call the critical
code.

But these (more common) paths still pass AppArmorSetSecurityImageLabel which 
means if there were rules added that are not yet reflected in the XML 
representation they would be lost at this point.
So while not really affected it seems wise for this use-case as well to make 
the changes.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1845506

Title:
  Libvirt snapshot doesn't update apparmor profile

To manage notifications about this bug go to:
https://bugs.launchpad.net/libvirt/+bug/1845506/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1845355] Re: Support Hi1620 zip hw accelerator

2019-10-15 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 5.0.0-32.34

---
linux (5.0.0-32.34) disco; urgency=medium

  * disco/linux: 5.0.0-32.34 -proposed tracker (LP: #1846097)

  * CVE-2019-14814 // CVE-2019-14815 // CVE-2019-14816
- mwifiex: Fix three heap overflow at parsing element in 
cfg80211_ap_settings

  * CVE-2019-15505
- media: technisat-usb2: break out of loop at end of buffer

  * CVE-2019-2181
- binder: check for overflow when alloc for security context

  * Support Hi1620 zip hw accelerator (LP: #1845355)
- [Config] Enable HiSilicon QM/ZIP as modules
- crypto: hisilicon - add queue management driver for HiSilicon QM module
- crypto: hisilicon - add hardware SGL support
- crypto: hisilicon - add HiSilicon ZIP accelerator support
- crypto: hisilicon - add SRIOV support for ZIP
- Documentation: Add debugfs doc for hisi_zip
- crypto: hisilicon - add debugfs for ZIP and QM
- MAINTAINERS: add maintainer for HiSilicon QM and ZIP controller driver
- crypto: hisilicon - fix kbuild warnings
- crypto: hisilicon - add dependency for CRYPTO_DEV_HISI_ZIP
- crypto: hisilicon - init curr_sgl_dma to fix compile warning
- crypto: hisilicon - add missing single_release
- crypto: hisilicon - fix error handle in hisi_zip_create_req_q
- crypto: hisilicon - Fix warning on printing %p with dma_addr_t
- crypto: hisilicon - Fix return value check in hisi_zip_acompress()
- crypto: hisilicon - avoid unused function warning

  * xfrm interface: several kernel panic (LP: #1836261)
- xfrm interface: fix memory leak on creation
- xfrm interface: avoid corruption on changelink
- xfrm interface: ifname may be wrong in logs
- xfrm interface: fix list corruption for x-netns
- xfrm interface: fix management of phydev

  * shiftfs: drop entries from cache on unlink (LP: #1841977)
- SAUCE: shiftfs: fix buggy unlink logic

  * shiftfs: mark kmem_cache as reclaimable (LP: #1842059)
- SAUCE: shiftfs: mark slab objects SLAB_RECLAIM_ACCOUNT

  *  Suspend to RAM(S3) does not wake up for latest megaraid and mpt3sas
adapters(SAS3.5 onwards) (LP: #1838751)
- PCI: Restore Resizable BAR size bits correctly for 1MB BARs

  * No sound inputs from the external microphone and headset on a Dell machine
(LP: #1842265)
- ALSA: hda - Expand pin_match function to match upcoming new tbls
- ALSA: hda - Define a fallback_pin_fixup_tbl for alc269 family

  * Add -fcf-protection=none when using retpoline flags (LP: #1843291)
- SAUCE: kbuild: add -fcf-protection=none when using retpoline flags

  * Disco update: upstream stable patchset 2019-09-25 (LP: #1845390)
- bridge/mdb: remove wrong use of NLM_F_MULTI
- cdc_ether: fix rndis support for Mediatek based smartphones
- ipv6: Fix the link time qualifier of 'ping_v6_proc_exit_net()'
- isdn/capi: check message length in capi_write()
- ixgbe: Fix secpath usage for IPsec TX offload.
- net: Fix null de-reference of device refcount
- net: gso: Fix skb_segment splat when splitting gso_size mangled skb having
  linear-headed frag_list
- net: phylink: Fix flow control resolution
- net: sched: fix reordering issues
- sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
- sctp: Fix the link time qualifier of 'sctp_ctrlsock_exit()'
- sctp: use transport pf_retrans in sctp_do_8_2_transport_strike
- tcp: fix tcp_ecn_withdraw_cwr() to clear TCP_ECN_QUEUE_CWR
- tipc: add NULL pointer check before calling kfree_rcu
- tun: fix use-after-free when register netdev failed
- gpiolib: acpi: Add gpiolib_acpi_run_edge_events_on_boot option and 
blacklist
- gpio: fix line flag validation in linehandle_create
- Btrfs: fix assertion failure during fsync and use of stale transaction
- ixgbe: Prevent u8 wrapping of ITR value to something less than 10us
- genirq: Prevent NULL pointer dereference in resend_irqs()
- KVM: s390: kvm_s390_vm_start_migration: check dirty_bitmap before using it
  as target for memset()
- KVM: s390: Do not leak kernel stack data in the KVM_S390_INTERRUPT ioctl
- KVM: x86: work around leak of uninitialized stack contents
- KVM: nVMX: handle page fault in vmread
- x86/purgatory: Change compiler flags from -mcmodel=kernel to 
-mcmodel=large
  to fix kexec relocation errors
- powerpc: Add barrier_nospec to raw_copy_in_user()
- drm/meson: Add support for XBGR & ABGR formats
- clk: rockchip: Don't yell about bad mmc phases when getting
- mtd: rawnand: mtk: Fix wrongly assigned OOB buffer pointer issue
- PCI: Always allow probing with driver_override
- gpio: fix line flag validation in lineevent_create
- ubifs: Correctly use tnc_next() in search_dh_cookie()
- driver core: Fix use-after-free and double free on glue directory
- crypto: talitos - check AES key size
- crypto: talitos - fix CTR alg blocksize
- crypto: talitos - ch

[Bug 1843622] Re: Disco update: upstream stable patchset 2019-09-11

2019-10-15 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 5.0.0-32.34

---
linux (5.0.0-32.34) disco; urgency=medium

  * disco/linux: 5.0.0-32.34 -proposed tracker (LP: #1846097)

  * CVE-2019-14814 // CVE-2019-14815 // CVE-2019-14816
- mwifiex: Fix three heap overflow at parsing element in 
cfg80211_ap_settings

  * CVE-2019-15505
- media: technisat-usb2: break out of loop at end of buffer

  * CVE-2019-2181
- binder: check for overflow when alloc for security context

  * Support Hi1620 zip hw accelerator (LP: #1845355)
- [Config] Enable HiSilicon QM/ZIP as modules
- crypto: hisilicon - add queue management driver for HiSilicon QM module
- crypto: hisilicon - add hardware SGL support
- crypto: hisilicon - add HiSilicon ZIP accelerator support
- crypto: hisilicon - add SRIOV support for ZIP
- Documentation: Add debugfs doc for hisi_zip
- crypto: hisilicon - add debugfs for ZIP and QM
- MAINTAINERS: add maintainer for HiSilicon QM and ZIP controller driver
- crypto: hisilicon - fix kbuild warnings
- crypto: hisilicon - add dependency for CRYPTO_DEV_HISI_ZIP
- crypto: hisilicon - init curr_sgl_dma to fix compile warning
- crypto: hisilicon - add missing single_release
- crypto: hisilicon - fix error handle in hisi_zip_create_req_q
- crypto: hisilicon - Fix warning on printing %p with dma_addr_t
- crypto: hisilicon - Fix return value check in hisi_zip_acompress()
- crypto: hisilicon - avoid unused function warning

  * xfrm interface: several kernel panic (LP: #1836261)
- xfrm interface: fix memory leak on creation
- xfrm interface: avoid corruption on changelink
- xfrm interface: ifname may be wrong in logs
- xfrm interface: fix list corruption for x-netns
- xfrm interface: fix management of phydev

  * shiftfs: drop entries from cache on unlink (LP: #1841977)
- SAUCE: shiftfs: fix buggy unlink logic

  * shiftfs: mark kmem_cache as reclaimable (LP: #1842059)
- SAUCE: shiftfs: mark slab objects SLAB_RECLAIM_ACCOUNT

  *  Suspend to RAM(S3) does not wake up for latest megaraid and mpt3sas
adapters(SAS3.5 onwards) (LP: #1838751)
- PCI: Restore Resizable BAR size bits correctly for 1MB BARs

  * No sound inputs from the external microphone and headset on a Dell machine
(LP: #1842265)
- ALSA: hda - Expand pin_match function to match upcoming new tbls
- ALSA: hda - Define a fallback_pin_fixup_tbl for alc269 family

  * Add -fcf-protection=none when using retpoline flags (LP: #1843291)
- SAUCE: kbuild: add -fcf-protection=none when using retpoline flags

  * Disco update: upstream stable patchset 2019-09-25 (LP: #1845390)
- bridge/mdb: remove wrong use of NLM_F_MULTI
- cdc_ether: fix rndis support for Mediatek based smartphones
- ipv6: Fix the link time qualifier of 'ping_v6_proc_exit_net()'
- isdn/capi: check message length in capi_write()
- ixgbe: Fix secpath usage for IPsec TX offload.
- net: Fix null de-reference of device refcount
- net: gso: Fix skb_segment splat when splitting gso_size mangled skb having
  linear-headed frag_list
- net: phylink: Fix flow control resolution
- net: sched: fix reordering issues
- sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
- sctp: Fix the link time qualifier of 'sctp_ctrlsock_exit()'
- sctp: use transport pf_retrans in sctp_do_8_2_transport_strike
- tcp: fix tcp_ecn_withdraw_cwr() to clear TCP_ECN_QUEUE_CWR
- tipc: add NULL pointer check before calling kfree_rcu
- tun: fix use-after-free when register netdev failed
- gpiolib: acpi: Add gpiolib_acpi_run_edge_events_on_boot option and 
blacklist
- gpio: fix line flag validation in linehandle_create
- Btrfs: fix assertion failure during fsync and use of stale transaction
- ixgbe: Prevent u8 wrapping of ITR value to something less than 10us
- genirq: Prevent NULL pointer dereference in resend_irqs()
- KVM: s390: kvm_s390_vm_start_migration: check dirty_bitmap before using it
  as target for memset()
- KVM: s390: Do not leak kernel stack data in the KVM_S390_INTERRUPT ioctl
- KVM: x86: work around leak of uninitialized stack contents
- KVM: nVMX: handle page fault in vmread
- x86/purgatory: Change compiler flags from -mcmodel=kernel to 
-mcmodel=large
  to fix kexec relocation errors
- powerpc: Add barrier_nospec to raw_copy_in_user()
- drm/meson: Add support for XBGR & ABGR formats
- clk: rockchip: Don't yell about bad mmc phases when getting
- mtd: rawnand: mtk: Fix wrongly assigned OOB buffer pointer issue
- PCI: Always allow probing with driver_override
- gpio: fix line flag validation in lineevent_create
- ubifs: Correctly use tnc_next() in search_dh_cookie()
- driver core: Fix use-after-free and double free on glue directory
- crypto: talitos - check AES key size
- crypto: talitos - fix CTR alg blocksize
- crypto: talitos - ch

[Bug 1846097] Re: disco/linux: 5.0.0-32.34 -proposed tracker

2019-10-15 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 5.0.0-32.34

---
linux (5.0.0-32.34) disco; urgency=medium

  * disco/linux: 5.0.0-32.34 -proposed tracker (LP: #1846097)

  * CVE-2019-14814 // CVE-2019-14815 // CVE-2019-14816
- mwifiex: Fix three heap overflow at parsing element in 
cfg80211_ap_settings

  * CVE-2019-15505
- media: technisat-usb2: break out of loop at end of buffer

  * CVE-2019-2181
- binder: check for overflow when alloc for security context

  * Support Hi1620 zip hw accelerator (LP: #1845355)
- [Config] Enable HiSilicon QM/ZIP as modules
- crypto: hisilicon - add queue management driver for HiSilicon QM module
- crypto: hisilicon - add hardware SGL support
- crypto: hisilicon - add HiSilicon ZIP accelerator support
- crypto: hisilicon - add SRIOV support for ZIP
- Documentation: Add debugfs doc for hisi_zip
- crypto: hisilicon - add debugfs for ZIP and QM
- MAINTAINERS: add maintainer for HiSilicon QM and ZIP controller driver
- crypto: hisilicon - fix kbuild warnings
- crypto: hisilicon - add dependency for CRYPTO_DEV_HISI_ZIP
- crypto: hisilicon - init curr_sgl_dma to fix compile warning
- crypto: hisilicon - add missing single_release
- crypto: hisilicon - fix error handle in hisi_zip_create_req_q
- crypto: hisilicon - Fix warning on printing %p with dma_addr_t
- crypto: hisilicon - Fix return value check in hisi_zip_acompress()
- crypto: hisilicon - avoid unused function warning

  * xfrm interface: several kernel panic (LP: #1836261)
- xfrm interface: fix memory leak on creation
- xfrm interface: avoid corruption on changelink
- xfrm interface: ifname may be wrong in logs
- xfrm interface: fix list corruption for x-netns
- xfrm interface: fix management of phydev

  * shiftfs: drop entries from cache on unlink (LP: #1841977)
- SAUCE: shiftfs: fix buggy unlink logic

  * shiftfs: mark kmem_cache as reclaimable (LP: #1842059)
- SAUCE: shiftfs: mark slab objects SLAB_RECLAIM_ACCOUNT

  *  Suspend to RAM(S3) does not wake up for latest megaraid and mpt3sas
adapters(SAS3.5 onwards) (LP: #1838751)
- PCI: Restore Resizable BAR size bits correctly for 1MB BARs

  * No sound inputs from the external microphone and headset on a Dell machine
(LP: #1842265)
- ALSA: hda - Expand pin_match function to match upcoming new tbls
- ALSA: hda - Define a fallback_pin_fixup_tbl for alc269 family

  * Add -fcf-protection=none when using retpoline flags (LP: #1843291)
- SAUCE: kbuild: add -fcf-protection=none when using retpoline flags

  * Disco update: upstream stable patchset 2019-09-25 (LP: #1845390)
- bridge/mdb: remove wrong use of NLM_F_MULTI
- cdc_ether: fix rndis support for Mediatek based smartphones
- ipv6: Fix the link time qualifier of 'ping_v6_proc_exit_net()'
- isdn/capi: check message length in capi_write()
- ixgbe: Fix secpath usage for IPsec TX offload.
- net: Fix null de-reference of device refcount
- net: gso: Fix skb_segment splat when splitting gso_size mangled skb having
  linear-headed frag_list
- net: phylink: Fix flow control resolution
- net: sched: fix reordering issues
- sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
- sctp: Fix the link time qualifier of 'sctp_ctrlsock_exit()'
- sctp: use transport pf_retrans in sctp_do_8_2_transport_strike
- tcp: fix tcp_ecn_withdraw_cwr() to clear TCP_ECN_QUEUE_CWR
- tipc: add NULL pointer check before calling kfree_rcu
- tun: fix use-after-free when register netdev failed
- gpiolib: acpi: Add gpiolib_acpi_run_edge_events_on_boot option and 
blacklist
- gpio: fix line flag validation in linehandle_create
- Btrfs: fix assertion failure during fsync and use of stale transaction
- ixgbe: Prevent u8 wrapping of ITR value to something less than 10us
- genirq: Prevent NULL pointer dereference in resend_irqs()
- KVM: s390: kvm_s390_vm_start_migration: check dirty_bitmap before using it
  as target for memset()
- KVM: s390: Do not leak kernel stack data in the KVM_S390_INTERRUPT ioctl
- KVM: x86: work around leak of uninitialized stack contents
- KVM: nVMX: handle page fault in vmread
- x86/purgatory: Change compiler flags from -mcmodel=kernel to 
-mcmodel=large
  to fix kexec relocation errors
- powerpc: Add barrier_nospec to raw_copy_in_user()
- drm/meson: Add support for XBGR & ABGR formats
- clk: rockchip: Don't yell about bad mmc phases when getting
- mtd: rawnand: mtk: Fix wrongly assigned OOB buffer pointer issue
- PCI: Always allow probing with driver_override
- gpio: fix line flag validation in lineevent_create
- ubifs: Correctly use tnc_next() in search_dh_cookie()
- driver core: Fix use-after-free and double free on glue directory
- crypto: talitos - check AES key size
- crypto: talitos - fix CTR alg blocksize
- crypto: talitos - ch

[Bug 1603600] Re: NetworkManager ignores pushed openvpn routes

2019-10-15 Thread Torsten Bronger
I reported it at .

** Bug watch added: gitlab.gnome.org/GNOME/NetworkManager-openvpn/issues #40
   https://gitlab.gnome.org/GNOME/NetworkManager-openvpn/issues/40

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1603600

Title:
  NetworkManager ignores pushed openvpn routes

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/network-manager-openvpn/+bug/1603600/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1846087] Re: disco/linux-kvm: 5.0.0-1020.21 -proposed tracker

2019-10-15 Thread Ubuntu Kernel Bot
** Tags removed: block-proposed-disco

** Tags removed: block-proposed

** Description changed:

  This bug will contain status and test results related to a kernel source
  (or snap) as stated in the title.
  
  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  
  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1846097
  packages:
main: linux-kvm
meta: linux-meta-kvm
- phase: Holding before Promote to Updates
- phase-changed: Wednesday, 16. October 2019 00:08 UTC
+ phase: Promote to Updates
+ phase-changed: Wednesday, 16. October 2019 06:27 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason:
-   promote-to-updates: Holding -- cycle not ready to release
+   promote-to-updates: Ongoing -- packages not yet published
  variant: debs

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1846087

Title:
  disco/linux-kvm: 5.0.0-1020.21 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1846087/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1755999] Re: Reproducible hang in generic/430 with xfstest from upstream

2019-10-15 Thread Po-Hsu Lin
** Tags added: ubuntu-xfstests-btrfs ubuntu-xfstests-ext4 ubuntu-
xfstests-xfs

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1755999

Title:
  Reproducible hang in generic/430 with xfstest from upstream

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1755999/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1846075] Re: disco/linux-aws: 5.0.0-1019.21 -proposed tracker

2019-10-15 Thread Ubuntu Kernel Bot
** Tags removed: block-proposed-disco

** Tags removed: block-proposed

** Description changed:

  This bug will contain status and test results related to a kernel source
  (or snap) as stated in the title.
  
  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  
  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1846097
  packages:
main: linux-aws
meta: linux-meta-aws
- phase: Holding before Promote to Updates
- phase-changed: Wednesday, 16. October 2019 00:07 UTC
+ phase: Promote to Updates
+ phase-changed: Wednesday, 16. October 2019 06:26 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason:
-   promote-to-updates: Holding -- cycle not ready to release
+   promote-to-updates: Ongoing -- packages not yet published
  trackers:
bionic/linux-aws-edge: bug 1846074
  variant: debs

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1846075

Title:
  disco/linux-aws: 5.0.0-1019.21 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1846075/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1821942] Re: package snapd 2.37.4ubuntu0.1 failed to install/upgrade: problemas de dependência - deixando desconfigurado

2019-10-15 Thread Michael Vogt
Looking at the error this looks like its insserv that breaks here - or
smfpd which I cannot find as a package in ubuntu.

** Changed in: snapd
   Status: New => Incomplete

** Changed in: snapd (Ubuntu)
   Status: New => Incomplete

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1821942

Title:
  package snapd 2.37.4ubuntu0.1 failed to install/upgrade: problemas de
  dependência - deixando desconfigurado

To manage notifications about this bug go to:
https://bugs.launchpad.net/snapd/+bug/1821942/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1824460] Re: package snapd 2.37.4ubuntu0.1 failed to install/upgrade: subprocess installed post-removal script returned error exit status 1

2019-10-15 Thread Michael Vogt
The issue with:
rm: cannot remove '/var/cache/snapd/aux': Is a directory

got fixed in snapd 2.39

** Changed in: snapd
   Status: New => Fix Released

** Changed in: snapd (Ubuntu)
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1824460

Title:
  package snapd 2.37.4ubuntu0.1 failed to install/upgrade: subprocess
  installed post-removal script returned error exit status 1

To manage notifications about this bug go to:
https://bugs.launchpad.net/snapd/+bug/1824460/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1846086] Re: disco/linux-gcp: 5.0.0-1021.21 -proposed tracker

2019-10-15 Thread Ubuntu Kernel Bot
** Tags removed: block-proposed-disco

** Tags removed: block-proposed

** Description changed:

  This bug will contain status and test results related to a kernel source
  (or snap) as stated in the title.
  
  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  
  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1846097
  packages:
main: linux-gcp
meta: linux-meta-gcp
signed: linux-signed-gcp
- phase: Holding before Promote to Updates
- phase-changed: Wednesday, 16. October 2019 00:08 UTC
+ phase: Promote to Updates
+ phase-changed: Wednesday, 16. October 2019 06:27 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason:
-   promote-to-updates: Holding -- cycle not ready to release
+   promote-to-updates: Ongoing -- packages not yet published
  trackers:
bionic/linux-gcp: bug 1846082
bionic/linux-gke-5.0: bug 1847930
  variant: debs

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1846086

Title:
  disco/linux-gcp: 5.0.0-1021.21 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1846086/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1846073] Re: disco/linux-raspi2: 5.0.0-1020.20 -proposed tracker

2019-10-15 Thread Ubuntu Kernel Bot
** Tags removed: block-proposed-disco

** Tags removed: block-proposed

** Description changed:

  This bug will contain status and test results related to a kernel source
  (or snap) as stated in the title.
  
  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  
  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1846097
  packages:
main: linux-raspi2
meta: linux-meta-raspi2
- phase: Holding before Promote to Updates
- phase-changed: Wednesday, 16. October 2019 00:06 UTC
+ phase: Promote to Updates
+ phase-changed: Wednesday, 16. October 2019 06:26 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason:
-   promote-to-updates: Holding -- cycle not ready to release
+   promote-to-updates: Ongoing -- packages not yet published
  variant: debs

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1846073

Title:
  disco/linux-raspi2: 5.0.0-1020.20 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1846073/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1821943] Re: package ubuntu-core-launcher 2.37.4ubuntu0.1 failed to install/upgrade: problemas de dependência - deixando desconfigurado

2019-10-15 Thread Michael Vogt
*** This bug is a duplicate of bug 1821942 ***
https://bugs.launchpad.net/bugs/1821942

** This bug has been marked a duplicate of bug 1821942
   package snapd 2.37.4ubuntu0.1 failed to install/upgrade: problemas de 
dependência - deixando desconfigurado

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1821943

Title:
  package ubuntu-core-launcher 2.37.4ubuntu0.1 failed to
  install/upgrade: problemas de dependência - deixando desconfigurado

To manage notifications about this bug go to:
https://bugs.launchpad.net/snapd/+bug/1821943/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1847445] Re: [CML-S] intel_idle support CML-S 6+2

2019-10-15 Thread quanxian
keep tune. Once the patch is ready, I will provide commit, as well other
bugs. :)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1847445

Title:
  [CML-S] intel_idle support CML-S 6+2

To manage notifications about this bug go to:
https://bugs.launchpad.net/intel/+bug/1847445/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1846079] Re: disco/linux-azure: 5.0.0-1023.24 -proposed tracker

2019-10-15 Thread Ubuntu Kernel Bot
** Tags removed: block-proposed-disco

** Tags removed: block-proposed

** Description changed:

  This bug will contain status and test results related to a kernel source
  (or snap) as stated in the title.
  
  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  
  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1846097
  packages:
main: linux-azure
meta: linux-meta-azure
signed: linux-signed-azure
- phase: Holding before Promote to Updates
- phase-changed: Wednesday, 16. October 2019 00:07 UTC
+ phase: Promote to Updates
+ phase-changed: Wednesday, 16. October 2019 06:26 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason:
-   promote-to-updates: Holding -- cycle not ready to release
+   promote-to-updates: Ongoing -- packages not yet published
  trackers:
bionic/linux-azure: bug 1846078
  variant: debs

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1846079

Title:
  disco/linux-azure: 5.0.0-1023.24 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1846079/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1846091] Re: disco/linux-snapdragon: 5.0.0-1024.25 -proposed tracker

2019-10-15 Thread Ubuntu Kernel Bot
** Tags removed: block-proposed-disco

** Tags removed: block-proposed

** Description changed:

  This bug will contain status and test results related to a kernel source
  (or snap) as stated in the title.
  
  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  
  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1846097
  packages:
main: linux-snapdragon
meta: linux-meta-snapdragon
- phase: Holding before Promote to Updates
- phase-changed: Wednesday, 16. October 2019 00:08 UTC
+ phase: Promote to Updates
+ phase-changed: Wednesday, 16. October 2019 06:30 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason:
-   promote-to-updates: Holding -- cycle not ready to release
+   promote-to-updates: Ongoing -- packages not yet published
  variant: debs

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1846091

Title:
  disco/linux-snapdragon: 5.0.0-1024.25 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1846091/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1846089] Re: disco/linux-oracle: 5.0.0-1005.9 -proposed tracker

2019-10-15 Thread Ubuntu Kernel Bot
** Tags removed: block-proposed-disco

** Tags removed: block-proposed

** Description changed:

  This bug will contain status and test results related to a kernel source
  (or snap) as stated in the title.
  
  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  
  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1846097
  packages:
main: linux-oracle
meta: linux-meta-oracle
signed: linux-signed-oracle
- phase: Holding before Promote to Updates
- phase-changed: Wednesday, 16. October 2019 00:08 UTC
+ phase: Promote to Updates
+ phase-changed: Wednesday, 16. October 2019 06:27 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason:
-   promote-to-updates: Holding -- cycle not ready to release
+   promote-to-updates: Ongoing -- packages not yet published
  trackers:
bionic/linux-oracle-edge: bug 1846088
  variant: debs

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1846089

Title:
  disco/linux-oracle: 5.0.0-1005.9 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1846089/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1846097] Re: disco/linux: 5.0.0-32.34 -proposed tracker

2019-10-15 Thread Ubuntu Kernel Bot
** Tags removed: block-proposed-disco

** Tags removed: block-proposed

** Description changed:

  This bug will contain status and test results related to a kernel source
  (or snap) as stated in the title.
  
  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  
  -- swm properties --
  boot-testing-requested: true
  bugs-spammed: true
  packages:
lrm: linux-restricted-modules
main: linux
meta: linux-meta
signed: linux-signed
- phase: Holding before Promote to Updates
- phase-changed: Tuesday, 15. October 2019 20:45 UTC
+ phase: Promote to Updates
+ phase-changed: Wednesday, 16. October 2019 06:25 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason:
-   promote-to-updates: Holding -- cycle not ready to release
+   promote-to-updates: Ongoing -- packages not yet published
  trackers:
bionic/linux-bluefield: bug 1846096
bionic/linux-hwe: bug 1846092
bionic/linux-oem-osp1: bug 1846095
disco/linux-aws: bug 1846075
disco/linux-azure: bug 1846079
disco/linux-gcp: bug 1846086
disco/linux-kvm: bug 1846087
disco/linux-oracle: bug 1846089
disco/linux-raspi2: bug 1846073
disco/linux-snapdragon: bug 1846091
  variant: debs

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1846097

Title:
  disco/linux: 5.0.0-32.34 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1846097/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1848127] Comment bridged from LTC Bugzilla

2019-10-15 Thread bugproxy
--- Comment From pavsu...@in.ibm.com 2019-10-16 02:27 EDT---
Then executed the test again with the eoan kernel installed on the system.

root@ltc-wspoon11:~# uname -a
Linux ltc-wspoon11 5.3.0-18-generic #19~lp1848127+build.2-Ubuntu SMP Tue Oct 15 
22:29:26 UTC 2019 ppc64le ppc64le ppc64le GNU/Linux

root@ltc-wspoon11:~# ./probe_cpus.sh -L
CHIP ID: 0 CORE ID: 0 THREADS: 4 CPUs:  0 1 2 3
CHIP ID: 0 CORE ID: 1 THREADS: 4 CPUs:  4 5 6 7
CHIP ID: 0 CORE ID: 2 THREADS: 4 CPUs:  8 9 10 11
CHIP ID: 0 CORE ID: 3 THREADS: 4 CPUs:  12 13 14 15
CHIP ID: 0 CORE ID: 6 THREADS: 4 CPUs:  16 17 18 19
CHIP ID: 0 CORE ID: 7 THREADS: 4 CPUs:  20 21 22 23
CHIP ID: 0 CORE ID: 8 THREADS: 4 CPUs:  24 25 26 27
CHIP ID: 0 CORE ID: 9 THREADS: 4 CPUs:  28 29 30 31
CHIP ID: 0 CORE ID: 10 THREADS: 4 CPUs:  32 33 34 35
CHIP ID: 0 CORE ID: 11 THREADS: 4 CPUs:  36 37 38 39
CHIP ID: 0 CORE ID: 12 THREADS: 4 CPUs:  40 41 42 43
CHIP ID: 0 CORE ID: 13 THREADS: 4 CPUs:  44 45 46 47
CHIP ID: 0 CORE ID: 16 THREADS: 4 CPUs:  48 49 50 51
CHIP ID: 0 CORE ID: 17 THREADS: 4 CPUs:  52 53 54 55
CHIP ID: 0 CORE ID: 18 THREADS: 4 CPUs:  56 57 58 59
CHIP ID: 0 CORE ID: 19 THREADS: 4 CPUs:  60 61 62 63
CHIP ID: 0 CORE ID: 20 THREADS: 4 CPUs:  64 65 66 67
CHIP ID: 0 CORE ID: 21 THREADS: 4 CPUs:  68 69 70 71
CHIP ID: 8 CORE ID: 6 THREADS: 4 CPUs:  72 73 74 75
CHIP ID: 8 CORE ID: 7 THREADS: 4 CPUs:  76 77 78 79
CHIP ID: 8 CORE ID: 8 THREADS: 4 CPUs:  80 81 82 83
CHIP ID: 8 CORE ID: 9 THREADS: 4 CPUs:  84 85 86 87
CHIP ID: 8 CORE ID: 10 THREADS: 4 CPUs:  88 89 90 91
CHIP ID: 8 CORE ID: 11 THREADS: 4 CPUs:  92 93 94 95
CHIP ID: 8 CORE ID: 12 THREADS: 4 CPUs:  96 97 98 99
CHIP ID: 8 CORE ID: 13 THREADS: 4 CPUs:  100 101 102 103
CHIP ID: 8 CORE ID: 14 THREADS: 4 CPUs:  104 105 106 107
CHIP ID: 8 CORE ID: 15 THREADS: 4 CPUs:  108 109 110 111
CHIP ID: 8 CORE ID: 16 THREADS: 4 CPUs:  112 113 114 115
CHIP ID: 8 CORE ID: 17 THREADS: 4 CPUs:  116 117 118 119
CHIP ID: 8 CORE ID: 18 THREADS: 4 CPUs:  120 121 122 123
CHIP ID: 8 CORE ID: 19 THREADS: 4 CPUs:  124 125 126 127
CHIP ID: 8 CORE ID: 20 THREADS: 4 CPUs:  128 129 130 131
CHIP ID: 8 CORE ID: 21 THREADS: 4 CPUs:  132 133 134 135
CHIP ID: 8 CORE ID: 22 THREADS: 4 CPUs:  136 137 138 139
CHIP ID: 8 CORE ID: 23 THREADS: 4 CPUs:  140 141 142 143

-
p[0]
eq[0,1,2,3,4,5]
ex[0,1,3,4,5,6,8,9,10]
c[0,1,2,3,6,7,8,9,10,11,12,13,16,17,18,19,20,21]
p[8]
eq[1,2,3,4,5]
ex[3,4,5,6,7,8,9,10,11]
c[6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23]
-

--Processor Layout---
p[0]
+---EQ00+   +---EQ02+   +---EQ04+
|EX-0C0 |   |EX-4C8 |   |EX-8C16|
+ - - - - - +   + - - - - - +   + - - - - - +
|EX-0C1 |   |EX-4C9 |   |EX-8C17|
+ - - - - - +   + - - - - - +   + - - - - - +
|EX-1C2 |   |EX-5C10|   |EX-9C18|
+ - - - - - +   + - - - - - +   + - - - - - +
|EX-1C3 |   |EX-5C11|   |EX-9C19|
+---+   +---+   +---+

+---EQ01+   +---EQ03+   +---EQ05+
|   |   |EX-6C12|   |EX-10   C20|
+ - - - - - +   + - - - - - +   + - - - - - +
|   |   |EX-6C13|   |EX-10   C21|
+ - - - - - +   + - - - - - +   + - - - - - +
|EX-3C6 |   |   |   |   |
+ - - - - - +   + - - - - - +   + - - - - - +
|EX-3C7 |   |   |   |   |
+---+   +---+   +---+

p[8]
+---EQ00+   +---EQ02+   +---EQ04+
|   |   |EX-4C8 |   |EX-8C16|
+ - - - - - +   + - - - - - +   + - - - - - +
|   |   |EX-4C9 |   |EX-8C17|
+ - - - - - +   + - - - - - +   + - - - - - +
|   |   |EX-5C10|   |EX-9C18|
+ - - - - - +   + - - - - - +   + - - - - - +
|   |   |EX-5C11|   |EX-9C19|
+---+   +---+   +---+

+---EQ01+   +---EQ03+   +---EQ05+
|   |   |EX-6C12|   |EX-10   C20|
+ - - - - - +   + - - - - - +   + - - - - - +
|   |   |EX-6C13|   |EX-10   C21|
+ - - - - - +   + - - - - - +   + - - - - - +
|EX-3C6 |   |EX-7C14|   |EX-11   C22|
+ - - - - - +   + - - - - - +   + - - - - - +
|EX-3C7 |   |EX-7C15|   |EX-11   C23|
+---+   +---+   +---+

root@ltc-wspoon11:~# ./statedisable.sh
./statedisable.sh: line 10: 
/sys/devices/system/cpu/cpu*/cpuidle/state7/disable: No such file or directory
./statedisable.sh: line 11: 
/sys/devices/system/cpu/cpu*/cpuidle/state8/disable: No such file or directory

root@ltc-wspoon11:~# cpupower idle-info
CPUidle driver: powernv_idle
CPUidle governor: menu
analyzing CPU 0:

Number of idle states: 7
Available idle states: snooze stop0_lite stop0 stop1 stop2 stop4 stop5
snooze (DISABLED) :
Flags/Description: snooze
Latency: 0
Usage: 17
Duration: 262
stop0_lite (DISABLED) :
Flags/Description: stop0_lite
Latency: 1
Usage: 7
Duration: 14921
stop0 (DISABLED) :
Flags/Description: stop0
Latency: 2
Usage: 109
Duration: 18343
stop1 (DISABLED) :
Flags/Description: 

[Bug 1826362] Re: Use system CA certificates

2019-10-15 Thread Michael Vogt
** Changed in: snapd (Ubuntu)
   Status: New => Triaged

** Changed in: snapd (Ubuntu)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1826362

Title:
  Use system CA certificates

To manage notifications about this bug go to:
https://bugs.launchpad.net/snapd/+bug/1826362/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1801423] Re: snap applications only show up in the applications menu after a restart

2019-10-15 Thread Michael Vogt
Snapd uses the standard way for this, i.e. it writes desktop files into
XDG_DATA_DIRS. Maybe lxqt-panel is not monitoring all XDG_DATA_DIRS for
changes ? Not sure what snapd can do about this.

** Changed in: snapd
   Status: New => Incomplete

** Changed in: snapd (Ubuntu)
   Status: New => Incomplete

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1801423

Title:
  snap applications only show up in the applications menu after a
  restart

To manage notifications about this bug go to:
https://bugs.launchpad.net/snapd/+bug/1801423/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1846075] Re: disco/linux-aws: 5.0.0-1019.21 -proposed tracker

2019-10-15 Thread Andy Whitcroft
** Tags removed: kernel-unblock-updates

** Changed in: kernel-sru-workflow/promote-to-updates
   Status: New => In Progress

** Changed in: kernel-sru-workflow/promote-to-updates
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy 
Whitcroft (apw)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1846075

Title:
  disco/linux-aws: 5.0.0-1019.21 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1846075/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1846087] Re: disco/linux-kvm: 5.0.0-1020.21 -proposed tracker

2019-10-15 Thread Andy Whitcroft
** Tags removed: kernel-unblock-updates

** Changed in: kernel-sru-workflow/promote-to-updates
   Status: New => In Progress

** Changed in: kernel-sru-workflow/promote-to-updates
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy 
Whitcroft (apw)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1846087

Title:
  disco/linux-kvm: 5.0.0-1020.21 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1846087/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1811087] Re: [cosmic] lxd-tools replaced by lxd snap, which is missing 'fuidshift' binary

2019-10-15 Thread Michael Vogt
I added a task for lxd as this seems to be about the lxd snap itself,
not so much about snapd the package manager.

** Also affects: lxd (Ubuntu)
   Importance: Undecided
   Status: New

** Changed in: snapd (Ubuntu)
   Status: New => Invalid

** Changed in: snapd
   Status: New => Invalid

** Also affects: lxd
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1811087

Title:
  [cosmic] lxd-tools replaced by lxd snap, which is missing 'fuidshift'
  binary

To manage notifications about this bug go to:
https://bugs.launchpad.net/lxd/+bug/1811087/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1846086] Re: disco/linux-gcp: 5.0.0-1021.21 -proposed tracker

2019-10-15 Thread Andy Whitcroft
** Tags removed: kernel-unblock-updates

** Changed in: kernel-sru-workflow/promote-to-updates
   Status: New => In Progress

** Changed in: kernel-sru-workflow/promote-to-updates
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy 
Whitcroft (apw)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1846086

Title:
  disco/linux-gcp: 5.0.0-1021.21 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1846086/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1846089] Re: disco/linux-oracle: 5.0.0-1005.9 -proposed tracker

2019-10-15 Thread Andy Whitcroft
** Tags removed: kernel-unblock-updates

** Changed in: kernel-sru-workflow/promote-to-updates
   Status: New => In Progress

** Changed in: kernel-sru-workflow/promote-to-updates
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy 
Whitcroft (apw)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1846089

Title:
  disco/linux-oracle: 5.0.0-1005.9 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1846089/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1819926] Re: Change default snap log directory

2019-10-15 Thread Michael Vogt
Thanks for your bugreport. We plan to work on this but have no clear
target date yet.

** Changed in: snapd
   Status: New => Incomplete

** Changed in: snapd
   Status: Incomplete => Triaged

** Changed in: snapd (Ubuntu)
   Status: New => Triaged

** Changed in: snapd
   Importance: Undecided => Medium

** Changed in: snapd (Ubuntu)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1819926

Title:
  Change default snap log directory

To manage notifications about this bug go to:
https://bugs.launchpad.net/snapd/+bug/1819926/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1846073] Re: disco/linux-raspi2: 5.0.0-1020.20 -proposed tracker

2019-10-15 Thread Andy Whitcroft
** Tags removed: kernel-unblock-updates

** Changed in: kernel-sru-workflow/promote-to-updates
   Status: New => In Progress

** Changed in: kernel-sru-workflow/promote-to-updates
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy 
Whitcroft (apw)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1846073

Title:
  disco/linux-raspi2: 5.0.0-1020.20 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1846073/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1846079] Re: disco/linux-azure: 5.0.0-1023.24 -proposed tracker

2019-10-15 Thread Andy Whitcroft
** Tags removed: kernel-unblock-updates

** Changed in: kernel-sru-workflow/promote-to-updates
   Status: New => In Progress

** Changed in: kernel-sru-workflow/promote-to-updates
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy 
Whitcroft (apw)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1846079

Title:
  disco/linux-azure: 5.0.0-1023.24 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1846079/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1825298] Re: apparmor.service fails to start when apt install/remove snapd due to snapd profile error

2019-10-15 Thread Zygmunt Krynicki
We discussed this issue on IRC and we believe to understand the cause.

One way to solve it would be to move all snapd apparmor profiles to
/var, so that they are not regarded as conf-files simply because they
are stored in /etc. This would also allow us to remove the silly .real
suffix from snap-confine apparmor profile.

We need to look at the details of how this would interplay with
rollbacks though.

** Changed in: snapd
   Status: Triaged => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1825298

Title:
  apparmor.service fails to start when apt install/remove snapd due to
  snapd profile error

To manage notifications about this bug go to:
https://bugs.launchpad.net/snapd/+bug/1825298/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1848127] Comment bridged from LTC Bugzilla

2019-10-15 Thread bugproxy
--- Comment From pavsu...@in.ibm.com 2019-10-16 02:17 EDT---
I have installed the eoan kernel in this PPA 
https://launchpad.net/~ubuntu-power-triage/+archive/ubuntu/lp1848127/+packages 
and tested again.

root@ltc-wspoon11:~# sudo add-apt-repository ppa:ubuntu-power-
triage/lp1848127

More info: https://launchpad.net/~ubuntu-power-triage/+archive/ubuntu/lp1848127
Press [ENTER] to continue or Ctrl-c to cancel adding it.

Get:1 file:/var/cuda-repo-10-1-local-10.1.152-418.67  InRelease
Ign:1 file:/var/cuda-repo-10-1-local-10.1.152-418.67  InRelease
Get:2 file:/var/cuda-repo-10-1-local-10.1.152-418.67  Release [574 B]
Get:2 file:/var/cuda-repo-10-1-local-10.1.152-418.67  Release [574 B]
Hit:4 http://ports.ubuntu.com/ubuntu-ports bionic-security InRelease
Hit:5 http://us.ports.ubuntu.com/ubuntu-ports bionic InRelease
Hit:6 http://us.ports.ubuntu.com/ubuntu-ports bionic-updates InRelease
Ign:7 http://ddebs.ubuntu.com bionic InRelease
Ign:8 http://ppa.launchpad.net/ubuntu-power-triage/lp1848127/ubuntu bionic 
InRelease
Hit:9 http://us.ports.ubuntu.com/ubuntu-ports bionic-backports InRelease
Ign:10 http://ddebs.ubuntu.com bionic-updates InRelease
Err:11 http://ppa.launchpad.net/ubuntu-power-triage/lp1848127/ubuntu bionic 
Release
404  Not Found [IP: 91.189.95.83 80]
Ign:12 http://ddebs.ubuntu.com bionic-proposed InRelease
Hit:13 http://ddebs.ubuntu.com bionic Release
Hit:15 http://ddebs.ubuntu.com bionic-updates Release
Hit:17 http://ddebs.ubuntu.com bionic-proposed Release
Reading package lists... Done
E: The repository 
'http://ppa.launchpad.net/ubuntu-power-triage/lp1848127/ubuntu bionic Release' 
does not have a Release file.
N: Updating from such a repository can't be done securely, and is therefore 
disabled by default.
N: See apt-secure(8) manpage for repository creation and user configuration 
details.

root@ltc-wspoon11:~# sudo apt-get update
Get:1 file:/var/cuda-repo-10-1-local-10.1.152-418.67  InRelease
Ign:1 file:/var/cuda-repo-10-1-local-10.1.152-418.67  InRelease
Get:2 file:/var/cuda-repo-10-1-local-10.1.152-418.67  Release [574 B]
Get:2 file:/var/cuda-repo-10-1-local-10.1.152-418.67  Release [574 B]
Hit:4 http://us.ports.ubuntu.com/ubuntu-ports bionic InRelease
Hit:5 http://us.ports.ubuntu.com/ubuntu-ports bionic-updates InRelease
Ign:6 http://ppa.launchpad.net/ubuntu-power-triage/lp1848127/ubuntu bionic 
InRelease
Get:7 http://ports.ubuntu.com/ubuntu-ports bionic-security InRelease [88.7 kB]
Hit:8 http://us.ports.ubuntu.com/ubuntu-ports bionic-backports InRelease
Ign:9 http://ddebs.ubuntu.com bionic InRelease
Err:10 http://ppa.launchpad.net/ubuntu-power-triage/lp1848127/ubuntu bionic 
Release
404  Not Found [IP: 91.189.95.83 80]
Ign:11 http://ddebs.ubuntu.com bionic-updates InRelease
Ign:12 http://ddebs.ubuntu.com bionic-proposed InRelease
Hit:13 http://ddebs.ubuntu.com bionic Release
Hit:15 http://ddebs.ubuntu.com bionic-updates Release
Hit:17 http://ddebs.ubuntu.com bionic-proposed Release
Reading package lists... Done
E: The repository 
'http://ppa.launchpad.net/ubuntu-power-triage/lp1848127/ubuntu bionic Release' 
does not have a Release file.
N: Updating from such a repository can't be done securely, and is therefore 
disabled by default.
N: See apt-secure(8) manpage for repository creation and user configuration 
details.

root@ltc-wspoon11:~/eoankernel# dpkg -i 
linux-modules-5.3.0-18-generic_5.3.0-18.19~lp1848127+build.2_ppc64el.deb
Selecting previously unselected package linux-modules-5.3.0-18-generic.
(Reading database ... 182130 files and directories currently installed.)
Preparing to unpack 
linux-modules-5.3.0-18-generic_5.3.0-18.19~lp1848127+build.2_ppc64el.deb ...
Unpacking linux-modules-5.3.0-18-generic (5.3.0-18.19~lp1848127+build.2) ...
Setting up linux-modules-5.3.0-18-generic (5.3.0-18.19~lp1848127+build.2) ...

root@ltc-wspoon11:~/eoankernel# dpkg -i 
linux-image-unsigned-5.3.0-18-generic_5.3.0-18.19~lp1848127+build.2_ppc64el.deb 
 (Reading database ... 183281 files and 
directories currently installed.)
Preparing to unpack 
linux-image-unsigned-5.3.0-18-generic_5.3.0-18.19~lp1848127+build.2_ppc64el.deb 
...
Unpacking linux-image-unsigned-5.3.0-18-generic (5.3.0-18.19~lp1848127+build.2) 
over (5.3.0-18.19~lp1848127+build.2) ...
/var/lib/dpkg/info/linux-image-unsigned-5.3.0-18-generic.postrm ... removing 
pending trigger
Setting up linux-image-unsigned-5.3.0-18-generic 
(5.3.0-18.19~lp1848127+build.2) ...
Processing triggers for linux-image-unsigned-5.3.0-18-generic 
(5.3.0-18.19~lp1848127+build.2) ...
/etc/kernel/postinst.d/dkms:
* dkms: running auto installation service for kernel 5.3.0-18-generic
Error! Your kernel headers for kernel 5.3.0-18-generic cannot be found.
Please install the linux-headers-5.3.0-18-generic package,
or use the --kernelsourcedir option to tell DKMS where it's located
...done.
/etc/kernel/postinst.d/initramfs-tools:
update-initramfs: Generating /boot/initrd.img-5.3.0-18-generic
/etc/kernel/postinst.d/kdump-t

[Bug 1846091] Re: disco/linux-snapdragon: 5.0.0-1024.25 -proposed tracker

2019-10-15 Thread Andy Whitcroft
** Tags removed: kernel-unblock-updates

** Changed in: kernel-sru-workflow/promote-to-updates
   Status: New => In Progress

** Changed in: kernel-sru-workflow/promote-to-updates
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy 
Whitcroft (apw)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1846091

Title:
  disco/linux-snapdragon: 5.0.0-1024.25 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1846091/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1846097] Re: disco/linux: 5.0.0-32.34 -proposed tracker

2019-10-15 Thread Andy Whitcroft
** Tags removed: kernel-unblock-updates

** Changed in: kernel-sru-workflow/promote-to-updates
   Status: New => In Progress

** Changed in: kernel-sru-workflow/promote-to-updates
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy 
Whitcroft (apw)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1846097

Title:
  disco/linux: 5.0.0-32.34 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1846097/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1780313] Re: package snapd 2.31.2~14.04 failed to install/upgrade: subprocess new pre-removal script returned error exit status 5

2019-10-15 Thread Michael Vogt
We fixed a bunch of the preinst issues in later versions of snapd,
please let us know if you still have this issue.

** Changed in: snapd
   Status: New => Incomplete

** Changed in: snapd (Ubuntu)
   Status: New => Incomplete

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1780313

Title:
  package snapd 2.31.2~14.04 failed to install/upgrade: subprocess new
  pre-removal script returned error exit status 5

To manage notifications about this bug go to:
https://bugs.launchpad.net/snapd/+bug/1780313/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1781447] Re: snapd not updated or deleted

2019-10-15 Thread Michael Vogt
Could you please attach the output of:

systemctl status snapd.apparmor.service

when this happens?

** Changed in: snapd
   Status: New => Incomplete

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1781447

Title:
  snapd not updated or deleted

To manage notifications about this bug go to:
https://bugs.launchpad.net/snapd/+bug/1781447/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1779180] Re: package snapd 2.26.10~14.04 failed to install/upgrade: subprocess new pre-removal script returned error exit status 5

2019-10-15 Thread Michael Vogt
We fixed a bunch of the postinst issues in later versions of snapd,
please let us  know if you still have this issue.

** Changed in: snapd
   Status: New => Incomplete

** Changed in: snapd (Ubuntu)
   Status: New => Incomplete

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1779180

Title:
  package snapd 2.26.10~14.04 failed to install/upgrade: subprocess new
  pre-removal script returned error exit status 5

To manage notifications about this bug go to:
https://bugs.launchpad.net/snapd/+bug/1779180/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1774160] Re: package snapd 2.32.5+18.04 failed to install/upgrade: package is in a very bad inconsistent state; you should reinstall it before attempting configuration

2019-10-15 Thread Michael Vogt
This looks like the dpkg database got corrupted, could you please try:
sudo dpkg --purge snapd
and see if that helps?

** Changed in: snapd (Ubuntu)
   Status: New => Incomplete

** Changed in: snapd
   Status: New => Incomplete

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1774160

Title:
  package snapd 2.32.5+18.04 failed to install/upgrade: package is in a
  very bad inconsistent state; you should  reinstall it before
  attempting configuration

To manage notifications about this bug go to:
https://bugs.launchpad.net/snapd/+bug/1774160/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1771808] Re: package snapd 2.32.8+18.04 failed to install/upgrade: balík je ve velmi nekonzistentním stavu - před pokusem o konfiguraci by měl by být přeinstalován.

2019-10-15 Thread Michael Vogt
This looks like the dpkg database got corrupted, could you please try:
sudo dpkg --purge snapd
and see if that helps?

** Changed in: snapd
   Status: New => Incomplete

** Changed in: snapd (Ubuntu)
   Status: New => Incomplete

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1771808

Title:
  package snapd 2.32.8+18.04 failed to install/upgrade: balík je ve
  velmi nekonzistentním stavu - před pokusem o konfiguraci by měl by být
  přeinstalován.

To manage notifications about this bug go to:
https://bugs.launchpad.net/snapd/+bug/1771808/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1778326] Re: package snapd 2.32.9+18.04 failed to install/upgrade: package is in a very bad inconsistent state; you should reinstall it before attempting configuration

2019-10-15 Thread Michael Vogt
*** This bug is a duplicate of bug 1774160 ***
https://bugs.launchpad.net/bugs/1774160

** This bug has been marked a duplicate of bug 1774160
   package snapd 2.32.5+18.04 failed to install/upgrade: package is in a very 
bad inconsistent state; you should  reinstall it before attempting configuration

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1778326

Title:
  package snapd 2.32.9+18.04 failed to install/upgrade: package is in a
  very bad inconsistent state; you should  reinstall it before
  attempting configuration

To manage notifications about this bug go to:
https://bugs.launchpad.net/snapd/+bug/1778326/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1787254] Re: Possibly demote fwupdate to universe?

2019-10-15 Thread Michael Vogt
I'm closing the snapd task because it looks like we don't need fwupdate
for uc20. If it turns out I was wrong this needs to be reopened.

** Changed in: snapd
   Status: New => Invalid

** Changed in: snapd (Ubuntu)
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1787254

Title:
  Possibly demote fwupdate to universe?

To manage notifications about this bug go to:
https://bugs.launchpad.net/snapd/+bug/1787254/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1769628] Re: snap applications are not translated

2019-10-15 Thread Michael Vogt
** Changed in: snapd
   Status: New => Triaged

** Changed in: snapd
   Importance: Undecided => High

** Changed in: snapd (Ubuntu)
   Status: New => Triaged

** Changed in: snapd (Ubuntu)
   Importance: Undecided => High

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1769628

Title:
  snap applications are not translated

To manage notifications about this bug go to:
https://bugs.launchpad.net/snapd/+bug/1769628/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1826473] Re: package ubuntu-core-launcher 2.38 failed to install/upgrade: problemas de dependencias - se deja sin configurar

2019-10-15 Thread Michael Vogt
The real issue is:
"""
Configurando udev (229-4ubuntu21.21) ...
addgroup: El grupo `input' ya existe como grupo del sistema. Saliendo.
update-initramfs: deferring update (trigger activated)
insserv: warning: script 'K07smfpd' missing LSB tags and overrides
insserv: warning: script 'smfpd' missing LSB tags and overrides
insserv: There is a loop at service plymouth if started
insserv: There is a loop between service plymouth and procps if started
insserv:  loop involving service procps at depth 2
insserv:  loop involving service udev at depth 1
insserv: There is a loop at service smfpd if started
insserv: Starting smfpd depends on plymouth and therefore on system facility 
`$all' which can not be true!
insserv: Starting smfpd depends on plymouth and therefore on system facility 
`$all' which can not be true!
insserv: Starting smfpd depends on plymouth and therefore on system facility 
`$all' which can not be true!
insserv: Starting smfpd depends on plymouth and therefore on system facility 
`$all' which can not be true!
insserv: Starting smfpd depends on plymouth and therefore on system facility 
`$all' which can not be true!
insserv: Starting smfpd depends on plymouth and therefore on system facility 
`$all' which can not be true!
insserv: Starting smfpd depends on plymouth and therefore on system facility 
`$all' which can not be true!
insserv: Starting smfpd depends on plymouth and therefore on system facility 
`$all' which can not be true!
insserv: Starting smfpd depends on plymouth and therefore on system facility 
`$all' which can not be true!
insserv: Starting smfpd depends on plymouth and therefore on system facility 
`$all' which can not be true!
insserv: Starting smfpd depends on plymouth and therefore on system facility 
`$all' which can not be true!
insserv: Starting smfpd depends on plymouth and therefore on system facility 
`$all' which can not be true!
insserv: Starting smfpd depends on plymouth and therefore on system facility 
`$all' which can not be true!
insserv: Starting smfpd depends on plymouth and therefore on system facility 
`$all' which can not be true!
insserv: Starting smfpd depends on plymouth and therefore on system facility 
`$all' which can not be true!
insserv: Starting smfpd depends on plymouth and therefore on system facility 
`$all' which can not be true!
insserv: Starting smfpd depends on plymouth and therefore on system facility 
`$all' which can not be true!
insserv: Starting smfpd depends on plymouth and therefore on system facility 
`$all' which can not be true!
insserv: Starting smfpd depends on plymouth and therefore on system facility 
`$all' which can not be true!
insserv: Starting smfpd depends on plymouth and therefore on system facility 
`$all' which can not be true!
insserv: Starting smfpd depends on plymouth and therefore on system facility 
`$all' which can not be true!
insserv: Starting smfpd depends on plymouth and therefore on system facility 
`$all' which can not be true!
insserv: Starting smfpd depends on plymouth and therefore on system facility 
`$all' which can not be true!
insserv: Starting smfpd depends on plymouth and therefore on system facility 
`$all' which can not be true!
insserv: Starting smfpd depends on plymouth and therefore on system facility 
`$all' which can not be true!
insserv: Starting smfpd depends on plymouth and therefore on system facility 
`$all' which can not be true!
insserv: Starting smfpd depends on plymouth and therefore on system facility 
`$all' which can not be true!
insserv: Starting smfpd depends on plymouth and therefore on system facility 
`$all' which can not be true!
insserv: Starting smfpd depends on plymouth and therefore on system facility 
`$all' which can not be true!
insserv: Starting smfpd depends on plymouth and therefore on system facility 
`$all' which can not be true!
insserv: Starting smfpd depends on plymouth and therefore on system facility 
`$all' which can not be true!
insserv: Starting smfpd depends on plymouth and therefore on system facility 
`$all' which can not be true!
insserv: Starting smfpd depends on plymouth and therefore on system facility 
`$all' which can not be true!
insserv: Starting smfpd depends on plymouth and therefore on system facility 
`$all' which can not be true!
insserv: Starting smfpd depends on plymouth and therefore on system facility 
`$all' which can not be true!
insserv: Starting smfpd depends on plymouth and therefore on system facility 
`$all' which can not be true!
insserv: Starting smfpd depends on plymouth and therefore on system facility 
`$all' which can not be true!
insserv: Starting smfpd depends on plymouth and therefore on system facility 
`$all' which can not be true!
insserv: Starting smfpd depends on plymouth and therefore on system facility 
`$all' which can not be true!
insserv: Starting smfpd depends on plymouth and therefore on system facility 
`$all' which can not be true!
insserv: Starting smfpd depends on plymouth and therefore on system facility 

[Bug 1846073] Re: disco/linux-raspi2: 5.0.0-1020.20 -proposed tracker

2019-10-15 Thread Andy Whitcroft
** Tags added: kernel-unblock-updates

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1846073

Title:
  disco/linux-raspi2: 5.0.0-1020.20 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1846073/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1846079] Re: disco/linux-azure: 5.0.0-1023.24 -proposed tracker

2019-10-15 Thread Andy Whitcroft
** Tags added: kernel-unblock-updates

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1846079

Title:
  disco/linux-azure: 5.0.0-1023.24 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1846079/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1846087] Re: disco/linux-kvm: 5.0.0-1020.21 -proposed tracker

2019-10-15 Thread Andy Whitcroft
** Tags added: kernel-unblock-updates

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1846087

Title:
  disco/linux-kvm: 5.0.0-1020.21 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1846087/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1846091] Re: disco/linux-snapdragon: 5.0.0-1024.25 -proposed tracker

2019-10-15 Thread Andy Whitcroft
** Tags added: kernel-unblock-updates

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1846091

Title:
  disco/linux-snapdragon: 5.0.0-1024.25 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1846091/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1846075] Re: disco/linux-aws: 5.0.0-1019.21 -proposed tracker

2019-10-15 Thread Andy Whitcroft
** Tags added: kernel-unblock-updates

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1846075

Title:
  disco/linux-aws: 5.0.0-1019.21 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1846075/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1846089] Re: disco/linux-oracle: 5.0.0-1005.9 -proposed tracker

2019-10-15 Thread Andy Whitcroft
** Tags added: kernel-unblock-updates

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1846089

Title:
  disco/linux-oracle: 5.0.0-1005.9 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1846089/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1835024] Re: Links triggered within most snap apps open in a separate browser session

2019-10-15 Thread Michael Vogt
** Changed in: snapd
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1835024

Title:
  Links triggered within most snap apps open in a separate browser
  session

To manage notifications about this bug go to:
https://bugs.launchpad.net/snapd/+bug/1835024/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1846086] Re: disco/linux-gcp: 5.0.0-1021.21 -proposed tracker

2019-10-15 Thread Andy Whitcroft
** Tags added: kernel-unblock-updates

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1846086

Title:
  disco/linux-gcp: 5.0.0-1021.21 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1846086/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1846097] Re: disco/linux: 5.0.0-32.34 -proposed tracker

2019-10-15 Thread Andy Whitcroft
** Tags added: kernel-unblock-updates

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1846097

Title:
  disco/linux: 5.0.0-32.34 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1846097/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1824975] Re: snapd 2.37.4+18.10.1 ADT test failure with linux 4.18.0-18.19

2019-10-15 Thread Michael Vogt
We reworked how we run autopkgtests in 2.39, this  should no longer be
an issue.

** Changed in: snapd (Ubuntu)
   Status: New => Fix Released

** Changed in: snapd
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1824975

Title:
  snapd 2.37.4+18.10.1 ADT test failure with linux 4.18.0-18.19

To manage notifications about this bug go to:
https://bugs.launchpad.net/snapd/+bug/1824975/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1824770] Re: Installer should copy fontconfig cache to the installed system

2019-10-15 Thread Michael Vogt
Is there anything that snapd needs to do here? It already generates the
caches, does it need to do more? It seems this is a ubiquity task, yes?

** Changed in: snapd
   Status: New => Incomplete

** Changed in: snapd (Ubuntu)
   Status: New => Incomplete

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1824770

Title:
  Installer should copy fontconfig cache to the installed system

To manage notifications about this bug go to:
https://bugs.launchpad.net/snapd/+bug/1824770/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1825298] Re: apparmor.service fails to start on Cosmic due to snapd profile error

2019-10-15 Thread Michael Vogt
I can reproduce this on cosmic, installing snapd and removing (but not
purging) snapd gives me this error. It seems like removing removes the
/var/lib/snapd/apparmor/snap-confine dir but keeps the /etc/apparmor.d
/...snap-confine conf file in place (oh the joy of conffiles).

To reproduce:
1. apt update
2. apt install snapd
3. apt remove snapd
4. reboot
5. systemctl status apparmor

This also appears to be happening on 18.04 with the latest apparmor
version available for 18.04. So we need to look into this.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1825298

Title:
  apparmor.service fails to start when apt install/remove snapd due to
  snapd profile error

To manage notifications about this bug go to:
https://bugs.launchpad.net/snapd/+bug/1825298/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1652282] Re: Xwayland not using XAUTHORITY, prevents root applications from connecting

2019-10-15 Thread Bug Watch Updater
** Changed in: gdm
   Status: Unknown => New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1652282

Title:
  Xwayland not using XAUTHORITY, prevents root applications from
  connecting

To manage notifications about this bug go to:
https://bugs.launchpad.net/gdm/+bug/1652282/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1848288] ThreadStacktrace.txt

2019-10-15 Thread Apport retracing service
** Attachment added: "ThreadStacktrace.txt"
   
https://bugs.launchpad.net/bugs/1848288/+attachment/5297417/+files/ThreadStacktrace.txt

** Tags added: apport-failed-retrace

** Tags removed: need-amd64-retrace

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1848288

Title:
  Xorg crashed with SIGSEGV when changing volume on speakers

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xorg-server/+bug/1848288/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1848288] [NEW] Xorg crashed with SIGSEGV when changing volume on speakers

2019-10-15 Thread Kalani Helekunihi
Public bug reported:

When using either a Razer Nommo Pro speaker set or a Steel Series Arctis
Pro Wireless Headset, when the audio devices are set to USB Digital
Audio, changing the volume knobs will cause xorg-server to crash. When
changing the volume via the system volume screen or mobile apps, the
volume will change as expected and xorg-server will not crash.

ProblemType: Crash
DistroRelease: Ubuntu 19.10
Package: xserver-xorg-core 2:1.20.5+git20190820-0ubuntu3
ProcVersionSignature: Ubuntu 5.3.0-10.11-generic 5.3.0-rc8
Uname: Linux 5.3.0-10-generic x86_64
ApportVersion: 2.20.11-0ubuntu7
Architecture: amd64
BootLog: Error: [Errno 13] Permission denied: '/var/log/boot.log'
CasperVersion: 1.419
CompositorRunning: None
CurrentDesktop: ubuntu:GNOME
Date: Wed Oct 16 05:29:09 2019
DistUpgraded: Fresh install
DistroCodename: eoan
DistroVariant: ubuntu
ExecutablePath: /usr/lib/xorg/Xorg
ExtraDebuggingInterest: Yes, including running git bisection searches
GraphicsCard:
 NVIDIA Corporation TU102 [GeForce RTX 2080 Ti Rev. A] [10de:1e07] (rev a1) 
(prog-if 00 [VGA controller])
   Subsystem: ASUSTeK Computer Inc. TU102 [GeForce RTX 2080 Ti Rev. A] 
[1043:866a]
 NVIDIA Corporation TU102 [GeForce RTX 2080 Ti Rev. A] [10de:1e07] (rev a1) 
(prog-if 00 [VGA controller])
   Subsystem: ASUSTeK Computer Inc. TU102 [GeForce RTX 2080 Ti Rev. A] 
[1043:866a]
LiveMediaBuild: Ubuntu 19.10 "Eoan Ermine" - Beta amd64 (20190926.1)
MachineType: System manufacturer System Product Name
ProcCmdline: /usr/lib/xorg/Xorg vt2 -displayfd 3 -auth 
/run/user/999/gdm/Xauthority -background none -noreset -keeptty -verbose 3
ProcEnviron:
 PATH=(custom, no user)
 XDG_RUNTIME_DIR=
 LANG=C.UTF-8
 SHELL=/bin/bash
ProcKernelCmdLine: BOOT_IMAGE=/casper/vmlinuz file=/cdrom/preseed/username.seed 
quiet splash ---
SegvAnalysis:
 Segfault happened at: 0x7f6b2d60aa5f:  test   %ebx,0x10(%r15)
 PC (0x7f6b2d60aa5f) ok
 source "%ebx" ok
 destination "0x10(%r15)" (0x00fffce7) not located in a known VMA region 
(needed writable region)!
 Stack memory exhausted (SP below stack segment)
SegvReason: writing unknown VMA
Signal: 11
SourcePackage: xorg-server
StacktraceTop:
 ?? () from /usr/lib/xorg/modules/input/libinput_drv.so
 ?? () from /usr/lib/xorg/modules/input/libinput_drv.so
 ?? ()
 ?? ()
 ?? ()
Title: Xorg crashed with SIGSEGV
UpgradeStatus: No upgrade log present (probably fresh install)
UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo
dmi.bios.date: 07/31/2019
dmi.bios.vendor: American Megatrends Inc.
dmi.bios.version: 2001
dmi.board.asset.tag: Default string
dmi.board.name: ROG ZENITH EXTREME ALPHA
dmi.board.vendor: ASUSTeK COMPUTER INC.
dmi.board.version: Rev 1.xx
dmi.chassis.asset.tag: Default string
dmi.chassis.type: 3
dmi.chassis.vendor: Default string
dmi.chassis.version: Default string
dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvr2001:bd07/31/2019:svnSystemmanufacturer:pnSystemProductName:pvrSystemVersion:rvnASUSTeKCOMPUTERINC.:rnROGZENITHEXTREMEALPHA:rvrRev1.xx:cvnDefaultstring:ct3:cvrDefaultstring:
dmi.product.family: To be filled by O.E.M.
dmi.product.name: System Product Name
dmi.product.sku: SKU
dmi.product.version: System Version
dmi.sys.vendor: System manufacturer
separator:
 
version.compiz: compiz N/A
version.libdrm2: libdrm2 2.4.99-1
version.libgl1-mesa-dri: libgl1-mesa-dri 19.1.6-1ubuntu1
version.libgl1-mesa-glx: libgl1-mesa-glx N/A
version.xserver-xorg-core: xserver-xorg-core 2:1.20.5+git20190820-0ubuntu3
version.xserver-xorg-input-evdev: xserver-xorg-input-evdev N/A
version.xserver-xorg-video-ati: xserver-xorg-video-ati 1:19.0.1-1
version.xserver-xorg-video-intel: xserver-xorg-video-intel 
2:2.99.917+git20190815-1
version.xserver-xorg-video-nouveau: xserver-xorg-video-nouveau 1:1.0.16-1

** Affects: xorg-server (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: amd64 apport-crash apport-failed-retrace eoan ubuntu

** Information type changed from Private to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1848288

Title:
  Xorg crashed with SIGSEGV when changing volume on speakers

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xorg-server/+bug/1848288/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1825298] Re: apparmor.service fails to start on Cosmic due to snapd profile error

2019-10-15 Thread Michael Vogt
Closing the cosmic task as its EOL but keeping the other tasks open.

** Changed in: snapd (Ubuntu Cosmic)
   Status: New => Won't Fix

** Changed in: snapd
   Status: New => Triaged

** Changed in: snapd
   Importance: Undecided => High

** Changed in: snapd (Ubuntu)
   Status: New => Triaged

** Changed in: snapd (Ubuntu)
   Importance: Undecided => High

** Description changed:

- On Cosmic (18.10), running:
+ On Bionic (18.04) and others, running:
  
  systemd 239-7ubuntu10.13
  snapd 2.37.4+18.10.1
  kernel 4.18.0-17.18,
  
  the apparmor systemd service fails to start:
  
  $ systemctl status apparmor.service
  ● apparmor.service - AppArmor initialization
-Loaded: loaded (/lib/systemd/system/apparmor.service; enabled; vendor 
preset: enabled)
-Active: failed (Result: exit-code) since Wed 2019-04-17 18:00:06 CEST; 9s 
ago
-  Docs: man:apparmor(7)
-http://wiki.apparmor.net/
-   Process: 1295 ExecStart=/etc/init.d/apparmor start (code=exited, status=123)
-  Main PID: 1295 (code=exited, status=123)
- 
+    Loaded: loaded (/lib/systemd/system/apparmor.service; enabled; vendor 
preset: enabled)
+    Active: failed (Result: exit-code) since Wed 2019-04-17 18:00:06 CEST; 9s 
ago
+  Docs: man:apparmor(7)
+    http://wiki.apparmor.net/
+   Process: 1295 ExecStart=/etc/init.d/apparmor start (code=exited, status=123)
+  Main PID: 1295 (code=exited, status=123)
  
  Looking at the logs it seems to be cause by the following error:
  
  Apr 17 17:44:18 autopkgtest apparmor[358]: AppArmor parser error for
  /var/lib/snapd/apparmor/profiles/snap-confine.core.6673 in
  /var/lib/snapd/apparmor/profiles/snap-confine.core.6673 at line 11:
  Could not open '/var/lib/snapd/apparmor/snap-confine'
  
  I will attach the full log from the service.

** Summary changed:

- apparmor.service fails to start on Cosmic due to snapd profile error
+ apparmor.service fails to start when apt install/remove snapd due to snapd 
profile error

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1825298

Title:
  apparmor.service fails to start when apt install/remove snapd due to
  snapd profile error

To manage notifications about this bug go to:
https://bugs.launchpad.net/snapd/+bug/1825298/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1848288] Xorg crashed with SIGSEGV when changing volume on speakers

2019-10-15 Thread Apport retracing service
Stacktrace:
 #0  0x7f6b2d60aa5f in ?? ()
 No symbol table info available.
 #1  0x in ?? ()
 No symbol table info available.
StacktraceSource:
 #0  0x7f6b2d60aa5f in ?? ()
 #1  0x in ?? ()
StacktraceTop:
 ?? ()
 ?? ()

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1848288

Title:
  Xorg crashed with SIGSEGV when changing volume on speakers

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xorg-server/+bug/1848288/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1844498] Re: 18.10+ cloud images have the LXD group as gid 1000

2019-10-15 Thread Michael Vogt
Closing the ubuntu snapd task as this bug is already on the project
snapd

** Changed in: snapd
   Status: New => In Progress

** Changed in: snapd (Ubuntu)
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1844498

Title:
  18.10+ cloud images have the LXD group as gid 1000

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-images/+bug/1844498/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1837382] Re: Error messages on shutdown: Failed unmounting Mount unit

2019-10-15 Thread Michael Vogt
Thanks for your bugreport. Do you get exactly the same journalctl output
as in the older bugreport? Even if it looks similar it would be nice to
get the logs from journalctl or maybe a picture of the screen when it
tries to unmount (and fails)?

** Changed in: snapd
   Status: New => Incomplete

** Changed in: snapd (Ubuntu)
   Status: New => Incomplete

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1837382

Title:
  Error messages on shutdown: Failed unmounting Mount unit

To manage notifications about this bug go to:
https://bugs.launchpad.net/snapd/+bug/1837382/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1846138] Update Released

2019-10-15 Thread Chris Halse Rogers
The verification of the Stable Release Update for apache2 has completed
successfully and the package has now been released to -updates.
Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report.  In
the event that you encounter a regression using the package from
-updates please report a new bug using ubuntu-bug and tag the bug report
regression-update so we can easily find any regressions.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1846138

Title:
  backport mod_reqtimeout with handshake support

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1846138/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1844498] Re: 18.10+ cloud images have the LXD group as gid 1000

2019-10-15 Thread Michael Vogt
If snapd should change for this I think we need to have some design to
discuss how this should look. AIUI there is a desire to express that
some snaps needs groups created on the host (like lxd) when a snap gets
installed. We could make this work, but even then with our current model
where snaps are seeded during boot we would still need to make sure that
cloud-init does things in the right order, i.e. first wait for seeding
and then do the user creation.

** Changed in: snapd
   Status: In Progress => Incomplete

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1844498

Title:
  18.10+ cloud images have the LXD group as gid 1000

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-images/+bug/1844498/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1846138] Re: backport mod_reqtimeout with handshake support

2019-10-15 Thread Launchpad Bug Tracker
This bug was fixed in the package apache2 - 2.4.18-2ubuntu3.14

---
apache2 (2.4.18-2ubuntu3.14) xenial; urgency=medium

  * Backport mod_reqtimeout with handshake support (LP: #1846138)
- d/p/0001-mod-reqtimeout-revent-long-response-times.patch
- 
d/p/0002-mod_reqtimeout-fix-body-timeout-disabling-for-CONNECT-request.patch
- 
d/p/0003-mod_reqtimeout-Merge-r1853901-r1853906-r1853908-r1853929-r1853935-r.patch

 -- Jesse Williamson   Tue, 08 Oct 2019
13:31:25 +

** Changed in: apache2 (Ubuntu Xenial)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1846138

Title:
  backport mod_reqtimeout with handshake support

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1846138/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1832675] Re: On a fresh install of Kubuntu and fish shell my snaps are not in PATH

2019-10-15 Thread Michael Vogt
This sounds like the fish shell maybe does do something fishy (sry for
the pun) with the /etc/environment. In snapd 2.41 we use a systemd
generator to create the right PATH on bootup, so this version (which wil
be availalbe as a deb in *-updates shortly) should fix this issue.

** Changed in: snapd (Ubuntu)
   Status: New => In Progress

** Changed in: snapd
   Status: New => In Progress

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1832675

Title:
  On a fresh install of Kubuntu and fish shell my snaps are not in PATH

To manage notifications about this bug go to:
https://bugs.launchpad.net/snapd/+bug/1832675/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1827253] Re: [apparmor] missing 'mr' on binary for usage on containers

2019-10-15 Thread Christian Ehrhardt 
MPs got reviewed and uploaded to D/B SRU queue

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1827253

Title:
  [apparmor] missing 'mr' on binary for usage on containers

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/rsyslog/+bug/1827253/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1652282] Re: Xwayland not using XAUTHORITY, prevents root applications from connecting

2019-10-15 Thread Bug Watch Updater
Launchpad has imported 30 comments from the remote bug at
https://bugzilla.gnome.org/show_bug.cgi?id=776437.

If you reply to an imported comment from within Launchpad, your comment
will be sent to the remote bug automatically. Read more about
Launchpad's inter-bugtracker facilities at
https://help.launchpad.net/InterBugTracking.


On 2016-12-23T11:45:26+00:00 Wise Melon wrote:

I have found that after switching from Xorg to Wayland on Ubuntu GNOME
16.10 with GNOME 3.22 that GParted does not run when I try to run it as
root. That is when I click the icon and enter my password nothing
happens. I have found that when running what is run when the icon is
clicked that the output in Terminal is (gparted-pkexec):

Created symlink /run/systemd/system/-.mount → /dev/null.
Created symlink /run/systemd/system/boot-efi.mount → /dev/null.
Created symlink /run/systemd/system/boot.mount → /dev/null.
Created symlink /run/systemd/system/run-user-1000.mount → /dev/null.
Created symlink /run/systemd/system/run-user-120.mount → /dev/null.
Created symlink /run/systemd/system/tmp.mount → /dev/null.
No protocol specified

(gpartedbin:16832): Gtk-WARNING **: cannot open display: :0
Removed /run/systemd/system/-.mount.
Removed /run/systemd/system/boot-efi.mount.
Removed /run/systemd/system/boot.mount.
Removed /run/systemd/system/run-user-1000.mount.
Removed /run/systemd/system/run-user-120.mount.
Removed /run/systemd/system/tmp.mount.

So I am now unable to launch and use GParted as root which is really the
only way I can run it in order to make changes.

I originally reported this issue here:
https://bugs.launchpad.net/ubuntu/+source/gparted/+bug/1652282 But
thought I should also do so upstream.

Reply at: https://bugs.launchpad.net/gparted/+bug/1652282/comments/2


On 2017-01-02T11:20:07+00:00 Mike Fleetwood wrote:

This is a known limitation and design choice that Wayland doesn't allow
root privileged applications to work.

One workaround is to run the following in a terminal before running
GParted to allow root applications to connect to the X server under
Wayland.
  xhost +si:localuser:root

Another workaround it to continue to use the X.org display server rather
than the Wayland display server.

More information can be found in the:
  Common Fedora 25 Bugs / Running graphical apps with root privileges
  (e.g. gparted) does not work on Wayland
  https://fedoraproject.org/wiki/Common_F25_bugs#wayland-root-apps

Reply at: https://bugs.launchpad.net/gparted/+bug/1652282/comments/3


On 2017-01-02T11:21:24+00:00 Mike Fleetwood wrote:

*** Bug 776707 has been marked as a duplicate of this bug. ***

Reply at: https://bugs.launchpad.net/gparted/+bug/1652282/comments/4


On 2017-01-04T22:51:55+00:00 Nate Graham wrote:

Those workarounds are fine for now, but the real solution to boldly move
us all into the Wayland future is to make GParted run its main UI as a
normally-privileged user, and only request elevated permissions for
actions that actually require them.

Reply at: https://bugs.launchpad.net/gparted/+bug/1652282/comments/5


On 2017-01-05T16:27:10+00:00 Curtis Gedak wrote:

Hi Nate,

For past discussion on this issue, see also:

Bug 758131 - Don't run GUI as root
 (Was: [wayland] gparted fails to start under wayland)

Curtis

Reply at: https://bugs.launchpad.net/gparted/+bug/1652282/comments/6


On 2017-01-06T03:20:53+00:00 Nate Graham wrote:

> All the code is predicated on a single process querying the storage,
> running the GUI and manipulating the storage.  It would be a very large
> task to change.  For a spare time only hobby this might never get done.

Sadly that will eventually result in GParted dying as more and more
distros move to Wayland. :(

Reply at: https://bugs.launchpad.net/gparted/+bug/1652282/comments/7


On 2017-03-01T20:17:11+00:00 Erkin Alp Güney wrote:

>  For a spare time only hobby this might never get done.

Curtis, transferring maintenance of GParted to GNU or GNOME teams would
solve that. They have long queues for maintenance requests and it is
able to finish the process (find a full time maintainer) in a fortnight.

Reply at: https://bugs.launchpad.net/gparted/+bug/1652282/comments/11


On 2017-05-08T12:35:18+00:00 Gnome-4 wrote:

(In reply to Erkin Alp Güney from comment #6)
> >  For a spare time only hobby this might never get done.
> 
> Curtis, transferring main

[Bug 1843381] Re: Dell system takes a long time to connect network with external dock

2019-10-15 Thread Che Cheng
Yes, since it will be the same result as udev failed to rename it, it
doesn't matter.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1843381

Title:
  Dell system takes a long time to connect network with external dock

To manage notifications about this bug go to:
https://bugs.launchpad.net/oem-priority/+bug/1843381/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1781692] Re: Ubuntu corrupted by installing snapd - complete Ubuntu re-installation needed on VB

2019-10-15 Thread Michael Vogt
Closing as suggested by the original reporter. Thanks again to Jean-Do
for this report!

** Changed in: snapd (Ubuntu)
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1781692

Title:
  Ubuntu corrupted by installing snapd - complete Ubuntu re-installation
  needed on VB

To manage notifications about this bug go to:
https://bugs.launchpad.net/snapd/+bug/1781692/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1781692] Re: Ubuntu corrupted by installing snapd - complete Ubuntu re-installation needed on VB

2019-10-15 Thread Michael Vogt
Closing as suggested by the original reporter. Thanks again to Jean-Do
for this report!

** Changed in: snapd
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1781692

Title:
  Ubuntu corrupted by installing snapd - complete Ubuntu re-installation
  needed on VB

To manage notifications about this bug go to:
https://bugs.launchpad.net/snapd/+bug/1781692/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1781919] Re: /usr/lib/snapd/snapd-apparmor: No such file or directory

2019-10-15 Thread Michael Vogt
** Changed in: snapd (Ubuntu)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1781919

Title:
  /usr/lib/snapd/snapd-apparmor: No such file or directory

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/snapd/+bug/1781919/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1781692] Re: Ubuntu corrupted by installing snapd - complete Ubuntu re-installation needed on VB

2019-10-15 Thread Michael Vogt
Thank you Jean-Do for testing this for us!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1781692

Title:
  Ubuntu corrupted by installing snapd - complete Ubuntu re-installation
  needed on VB

To manage notifications about this bug go to:
https://bugs.launchpad.net/snapd/+bug/1781692/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1841630] Re: snap version of fwupd prints tons of garbage

2019-10-15 Thread Michael Vogt
Thanks Mario, given that it resolved itself with an updated fwupd I will
mark it as "fix-released". Please reopen if there is anything else that
nees to be done here.

** Changed in: snapd
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1841630

Title:
  snap version of fwupd prints tons of garbage

To manage notifications about this bug go to:
https://bugs.launchpad.net/snapd/+bug/1841630/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1841630] Re: snap version of fwupd prints tons of garbage

2019-10-15 Thread Michael Vogt
Thanks Mario, given that it resolved itself with an updated fwupd I will
mark it as "fix-released". Please reopen if there is anything else that
nees to be done here.

** Changed in: snapd (Ubuntu)
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1841630

Title:
  snap version of fwupd prints tons of garbage

To manage notifications about this bug go to:
https://bugs.launchpad.net/snapd/+bug/1841630/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1603600] Re: NetworkManager ignores pushed openvpn routes

2019-10-15 Thread Torsten Bronger
[Re-posted because I accidentally clicked on “Post Comment”. Sorry for
that.]

Confirmed with Ubuntu 19.04. An

   push "route 134.94.0.0 255.255.0.0 net_gateway"

is ignored. The pushed route is mentioned in the NetworkManager log:

NetworkManager[893]:   […] Data: Static Route: 134.94.0.0/16
Next Hop: 134.94.16.1

(The gateway is even correct.)  However, no route is actually added.
Interestingly enough, a

push "route 134.94.0.0 255.255.0.0 vpn_gateway"

*is* added to the routes.  I suspect the device is wrong, because a
manual

# route add -net 134.94.0.0/16 gw 134.94.16.1 dev tun0
SIOCADDRT: Network is unreachable

fails obviously.  Instead of “tun0”, it must be the normal net device
for which the gateway is valid.  Possibly, NetworkManager tries to add
the route to “tun0” always, which would be wrong.

Is there an upstream bug report?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1603600

Title:
  NetworkManager ignores pushed openvpn routes

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/network-manager-openvpn/+bug/1603600/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1824162] Re: /usr/lib/snapd/snapd:11:runtime:runtime:runtime:runtime:runtime

2019-10-15 Thread Michael Vogt
** Changed in: snapd (Ubuntu)
   Status: New => In Progress

** Changed in: snapd (Ubuntu)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1824162

Title:
  /usr/lib/snapd/snapd:11:runtime:runtime:runtime:runtime:runtime

To manage notifications about this bug go to:
https://bugs.launchpad.net/snapd/+bug/1824162/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1837905] Re: [SRU] stein stable releases

2019-10-15 Thread Launchpad Bug Tracker
This bug was fixed in the package cinder - 2:14.0.1-0ubuntu1

---
cinder (2:14.0.1-0ubuntu1) disco; urgency=medium

  [ Corey Bryant ]
  * d/gbp.conf: Create stable/stein branch.

  [ Sahid Orentino Ferdjaoui ]
  * New stable point release for OpenStack Stein (LP: #1837905).

 -- Sahid Orentino Ferdjaoui   Mon, 29
Jul 2019 08:36:06 +0200

** Changed in: cinder (Ubuntu Disco)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1837905

Title:
   [SRU] stein stable releases

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-archive/+bug/1837905/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1837905] Update Released

2019-10-15 Thread Chris Halse Rogers
The verification of the Stable Release Update for cinder has completed
successfully and the package has now been released to -updates.
Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report.  In
the event that you encounter a regression using the package from
-updates please report a new bug using ubuntu-bug and tag the bug report
regression-update so we can easily find any regressions.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1837905

Title:
   [SRU] stein stable releases

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-archive/+bug/1837905/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1837905] Re: [SRU] stein stable releases

2019-10-15 Thread Launchpad Bug Tracker
This bug was fixed in the package horizon - 3:15.1.0-0ubuntu1.1

---
horizon (3:15.1.0-0ubuntu1.1) disco; urgency=medium

  * No change rebuild to pick up xstatic orig tarball.

horizon (3:15.1.0-0ubuntu1) disco; urgency=medium

  [ Corey Bryant ]
  * d/gbp.conf: Create stable/stein branch.

  [ Sahid Orentino Ferdjaoui ]
  * New stable point release for OpenStack Stein (LP: #1837905).
  * d/p/set-min-version-of-python-cinderclient-to-4.0.0.patch: Dropped.
Fixed in upstream 15.1.0.

 -- Corey Bryant   Wed, 31 Jul 2019 10:06:53
-0400

** Changed in: horizon (Ubuntu Disco)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1837905

Title:
   [SRU] stein stable releases

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-archive/+bug/1837905/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1792932] Re: Desktop fails to boot in vbox: Xorg assert failure: Xorg: ../../../../dix/privates.c:384: dixRegisterPrivateKey: Assertion `!global_keys[type].created' failed.

2019-10-15 Thread Gennady
Any fixes/updates for bionic?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1792932

Title:
  Desktop fails to boot in vbox:  Xorg assert failure: Xorg:
  ../../../../dix/privates.c:384: dixRegisterPrivateKey: Assertion
  `!global_keys[type].created' failed.

To manage notifications about this bug go to:
https://bugs.launchpad.net/xorg-server/+bug/1792932/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1603600] Re: NetworkManager ignores pushed openvpn routes

2019-10-15 Thread Torsten Bronger
Confirmed with Ubuntu 19.04.  An

   push "route 134.94.0.0 255.255.0.0 net_gateway"

is ignored.  The pushed route is mentioned in the NetworkManager log:

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1603600

Title:
  NetworkManager ignores pushed openvpn routes

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/network-manager-openvpn/+bug/1603600/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1844195] Re: beegfs-meta lockup with glibc 2.27 on bionic

2019-10-15 Thread Dirk Petersen
Just a followup as this issue was reported about a month ago, I wonder
if there is anyone from the GLIBC team who could have a look at this
code?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1844195

Title:
  beegfs-meta lockup with glibc 2.27 on bionic

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/glibc/+bug/1844195/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1847801] Re: bionic/linux-oem: 4.15.0-1059.68 -proposed tracker

2019-10-15 Thread Ubuntu Kernel Bot
** Description changed:

  This bug will contain status and test results related to a kernel source
  (or snap) as stated in the title.
  
  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  
  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1846131
  packages:
lrm: linux-restricted-modules-oem
main: linux-oem
meta: linux-meta-oem
signed: linux-signed-oem
  phase: Testing
  phase-changed: Monday, 14. October 2019 14:26 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason:
automated-testing: Ongoing -- testing in progress
certification-testing: Ongoing -- testing in progress
-   regression-testing: Ongoing -- testing in progress
verification-testing: Ongoing -- testing in progress
  variant: debs

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1847801

Title:
  bionic/linux-oem: 4.15.0-1059.68 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1847801/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1830226] Re: systemtap currently broken in xenial

2019-10-15 Thread Nivedita Singhvi
This version of systemtap needs to be dependent on kernel 4.4.0-143 #169 or 
later. 
I'm assuming that we can do that?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1830226

Title:
  systemtap currently broken in xenial

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/systemtap/+bug/1830226/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1847801] Re: bionic/linux-oem: 4.15.0-1059.68 -proposed tracker

2019-10-15 Thread Po-Hsu Lin
4.15.0-1059.68 - oem
Regression test CMPL, RTB.

56 / 59 tests were run, missing: ubuntu_xfstests_btrfs, ubuntu_xfstests_ext4, 
ubuntu_xfstests_xfs
Issue to note in amd64:
  ubuntu_bpf - test_maps failed (bug 1837386)
  ubuntu_kvm_unit_tests - apic timeouted (bug 1748103) apic-split timeouted 
(bug 1821390)
  ubuntu_ltp - proc01 (bug 1829849) binfmt_misc02 (bug 1822246) 
memcg_max_usage_in_bytes (bug 1829979) memcg_stat (bug 1829983) 
memcg_use_hierarchy (bug 1829989) memcg_usage_in_bytes (bug 1829984) 
cpuset_hotplug (bug 1834006) getaddrinfo_01 (bug 1829995) crypto_user02 (bug 
1837543)
  ubuntu_ltp_syscalls - fallocate04, fallocate05, fdatasync03, fremovexattr01, 
fremovexattr02, fsync01, fsync04, msync04, preadv03, preadv03_64, preadv203, 
preadv203_64, pwritev03, pwritev03_64, sync03, syncfs01, sync_file_range02, 
copy_file_range01, statx04 (bug 1842266) fsetxattr01, fgetxattr01, fanotify13, 
fanotify14, lremovexattr01, setxattr01 (bug 1842266)


** Changed in: kernel-sru-workflow/regression-testing
   Status: In Progress => Fix Released

** Changed in: kernel-sru-workflow/regression-testing
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Po-Hsu Lin 
(cypressyew)

** Tags added: regression-testing-passed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1847801

Title:
  bionic/linux-oem: 4.15.0-1059.68 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1847801/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 60764] Re: Large file transfer gives error: Corrupted MAC on input

2019-10-15 Thread Robert Gilland
Problem happens on win 7 so it is not system related.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/60764

Title:
  Large file transfer gives error: Corrupted MAC on input

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/60764/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1830226] Re: systemtap currently broken in xenial

2019-10-15 Thread Matthew Ruffell
I went and tested the released and -proposed versions of systemtap along
with the GA and HWE kernels on xenial. This is what I found:

Tests 1 and 2, confirming that current package is broken:

Test 1:
Xenial 4.4.0-165-generic kernel, Systemtap 2.9-2ubuntu2
Test results: 
https://paste.ubuntu.com/p/MhVhHJHkMT/
We failed to load the trivial hello world probe. As reported.

Test 2:
Xenial 4.15.0-66-generic #75~16.04.1-Ubuntu HWE kernel, Systemtap 2.9-2ubuntu2
Test results:
https://paste.ubuntu.com/p/pZYrpHNWCV/
We failed to load the trivial hello world probe. As reported.

Tests 3 and 4, with the new package in -proposed:

Test 3:
Xenial 4.4.0-165-generic #193-Ubuntu GA kernel, Systemtap 2.9-2ubuntu2.1 from 
-proposed.
Test results:
https://paste.ubuntu.com/p/SGC8wKdS6W/
We successfully loaded the trivial hello world probe. -proposed package fixes 
issue.

Test 4:
Xenial 4.15.0-66-generic #75~16.04.1-Ubuntu HWE kernel, Systemtap 
2.9-2ubuntu2.1 from -proposed.
Test results:
https://paste.ubuntu.com/p/PnzMknQxqP/
We failed to load the trivial hello world probe. HWE kernels are still broken.

While the package in -proposed does solve the problem for the GA 4.4
kernel, this package is still incompatible with the 4.15 HWE kernel, as
per Bug 1683876.

Another thing that is critical to mention, is that the function
signature change that happened because of "mm: replace get_user_pages()
write/force parameters with gup_flags" landed in xenial 4.4.0-143 #169
earlier this year.

That means if we release the systemtap 2.9-2ubuntu2.1 from -proposed,
which requires the above commit from 4.4.0-143 #169 onward, systemtap
will then break for all users of xenial 4.4.0-142 and previous, as
systemtap 2.9-2ubuntu2.1 would contain the wrong function signature.

This would cause regressions if users are using the updated systemtap
package with older kernels, but do not wish to upgrade their kernel.

Because of this, I will not mark this bug as verified, as this needs
more discussion before we go releasing this package.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1830226

Title:
  systemtap currently broken in xenial

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/systemtap/+bug/1830226/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1837757] Re: adding extension caused libreoffice to fail loading on restart

2019-10-15 Thread Launchpad Bug Tracker
[Expired for libreoffice (Ubuntu) because there has been no activity for
60 days.]

** Changed in: libreoffice (Ubuntu)
   Status: Incomplete => Expired

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1837757

Title:
  adding extension caused libreoffice to fail loading on restart

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libreoffice/+bug/1837757/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

  1   2   3   4   5   6   7   >