I still have the same issue with kernel 3.16.0-36-generic or 3.13.0-51-generic
(proposed-updates)
# KVM HOST (3.16.0-36-generic)
sudo apt-get install linux-signed-generic-lts-utopic/trusty-proposed
# KVM GUEST (3.16.0-36-generic)
sudo apt-get install linux-virtual-lts-utopic/trusty-proposed
@arges
For me it's related at least part of it...
If I don't update the kernel to proposed-updates I have the following messages :
If I use one CPU instead of two, I don't have those messages.
BUG: soft lockup CPU#1 stuck for 22s! [qemu-system-x86:6889]
INFO: rcu_sched detected stalls on
Please note that my swap is NOT encrypted so it's not related to bug
1440098 or 953875
** Package changed: cryptsetup (Ubuntu) = systemd (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1463023
Public bug reported:
My Ubuntu 15.04 did not start --or took so long that I switched back to upstart!
ISSUE: (systemd during the boot)
Timed out waitingfor device dev-disk-by\x2duuid-... (swap)
Dependency failed for /dev/disk/by-uuid/... (swap)
Dependency failed for Swap.
Timed out waiting for
It could be related that ext4 was in a bad state and systemd was not able to
use it
then upstart executed fsck to fix it and now I can again use systemd.
# /var/log/syslog.4.gz
$ zgrep -h fsck /var/log/*.gz
Jun 8 08:43:06 mbp kernel: [1788385.038996] FAT-fs (sdb1): Volume was not
properly
Please attach /etc/fstab from your system, and show the output of 'swapon'
when booted with upstart.
@vorlon content of fstab see Bug Description
$ sudo swapon
NAME TYPE SIZE USED PRIO
/dev/sda6 partition 7.9G 11.5M -1
Ok, I will try to go back to systemd for science ;-)
$ sudo
@pitti
I am unable to reproduce it with 3.19.0-20 nor 3.19.0-18.
So I installed back systemd-sysv and I will do the debug stuff
next time I have the issue.
I guess the issue was related to a strange state of swap or the disk
and after booting once with upstart something fixed it. fsck??
--
You
I agree with @Jamiejellicoe this ticket should be rated as Security
issue (250) but we are close that (236)...
Having /boot full can lead to kernel, inird image or grub.conf corruption and
on top of that it's blocking new security updates to be applied.
When /boot is full you cannot even purge
Same issue
$ lsb_release -r
Release:14.04
$ uname -r
3.13.0-52-generic
May 10 00:40:40 kernel: [...] Request for unknown module key 'Magrathea:
Glacier signing key: 1981bc916ffc00599231ec5630e666e0256fd6f1' err -11
May 10 00:40:40 kernel: [...] ipt_REJECT: module verification failed:
I had the same issue when AppArmor is active (default)
and when I try to enable qemu guest agent inside your
guest :
virsh start test
error: Failed to start domain test
error: internal error: process exited while connecting to monitor:
qemu-system-x86_64: -chardev
Is it possible to apply this patch to libvirt-bin package and allow to write to
/var/lib/libvirt/qemu/ ?
For me it makes sense because disabling AppArmor for OpenStack is not a good
idea
so you will be exposed to security issues like Venom
** Description changed:
-
Ubuntu 14.04 LTS and 15.04
Steps to reproduce:
apt-get install shorewall
- vi /etc/default/shorewall
+ vi /etc/default/shorewall
replace
startup=0
with
startup=1
cp -va
Public bug reported:
Ubuntu 14.04 LTS and 15.04
Steps to reproduce:
apt-get install shorewall
vi /etc/default/shorewall
replace
startup=0
with
startup=1
cp -va
/usr/share/doc/shorewall/examples/one-interface/{interfaces,policy,rules,zones}
/etc/shorewall/
shorewall check
shorewall
My workaround:
dpkg --get-selections | grep 'linux-'
dpkg --get-selections | awk '/linux-(headers|image)-[0-9]\./ { print $1 }' |
grep -v $(uname -r | sed -e 's/-generic//') | sort -r -V -t- -k3 | tail -n+4
| xargs -r apt-get -qq -y purge
apt-get -qq -y install linux-{headers,image}-$(uname -r)
** Package changed: update-manager (Ubuntu) = lvm2 (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1480923
Title:
lvm thin corruption after lvresize
To manage notifications about this bug
** Description changed:
lvm2 version 2.02.98-6ubuntu2
- After doing a lvextend of a LVM Thin Pool, I had a corruption all sub
- LVM Thin Volumes and lost all of them. Then tried to dump/repair the
+ After doing a lvresize of a LVM Thin Pool, I had a corruption all sub
+ LVM Thin Volumes and
Public bug reported:
lvm2 version 2.02.98-6ubuntu2
After doing a lvextend of a LVM Thin Pool, I had a corruption all sub
LVM Thin Volumes and lost all of them. Then tried to dump/repair the
tmeta and end up with empty thin volumes (no more filesystem signature on them).
To sum up
The thin_pool
@boot0user I agree with you. The best workaround for now is to update
kernel to Vivid!
# Physical Server (with EFI):
sudo apt-get -y purge linux-{headers,image}-3.16.0-48-generic
sudo apt-get -y install linux-signed-generic-lts-vivid
sudo reboot
uname -r # 3.19.0-26-generic
sudo apt-get -y purge
This bug should be a top priority because people will suffer from it as soon as
they reboot
their 14.04 LTS with an Intel Gigabit NIC and the "current" Utopic kernel
(3.16.0-48-generic).
I had the same problem with HP ProLiant DL380e Gen8 which an Intel I350 Gigabit
NIC
(Hewlett-Packard
Same bug as https://bugs.launchpad.net/ubuntu/+source/linux-lts-
utopic/+bug/1492146
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1488024
Title:
[Regression] From 3.16.0-45 to -47: Intel IGB Tx
Same bug as https://bugs.launchpad.net/ubuntu/+source/linux-lts-
utopic/+bug/1488024
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1492146
Title:
igb Detected Tx Unit Hang
To manage notifications
Maybe it's another kernel regression with Intel NIC and TSO
so you can try this :
# tso => tcp-segmentation-offload
# gso => generic-segmentation-offload
# gro => generic-receive-offload
# sg => scatter-gather
# ufo => udp-fragmentation-offload (Cannot change)
# lro => large-receive-offload
If directly related to igb module maybe this
LP: #1465653
https://lists.ubuntu.com/archives/kernel-team/2015-June/058671.html
https://lists.ubuntu.com/archives/kernel-team/2015-June/058586.html
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1465653
if not directly related to igb modules
apport information
** Attachment added: "ProcCpuinfo.txt"
https://bugs.launchpad.net/bugs/1495442/+attachment/4463953/+files/ProcCpuinfo.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1495442
apport information
** Tags added: apport-collected staging trusty
** Description changed:
Ubuntu 14.04.3 LTS with Kernel 3.19.0-26-generic
One of our servers running rsnapshot and nfs-kernel-server on XFS partitions
crashed or hanged two sundays in a raw.
Kernel 3.19.0-26-generic
apport information
** Attachment added: "Lsusb.txt"
https://bugs.launchpad.net/bugs/1495442/+attachment/4463952/+files/Lsusb.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1495442
Title:
apport information
** Attachment added: "UdevDb.txt"
https://bugs.launchpad.net/bugs/1495442/+attachment/4463956/+files/UdevDb.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1495442
Title:
apport information
** Attachment added: "UdevLog.txt"
https://bugs.launchpad.net/bugs/1495442/+attachment/4463957/+files/UdevLog.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1495442
Title:
apport information
** Attachment added: "ProcInterrupts.txt"
https://bugs.launchpad.net/bugs/1495442/+attachment/4463954/+files/ProcInterrupts.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
apport information
** Attachment added: "Lspci.txt"
https://bugs.launchpad.net/bugs/1495442/+attachment/4463951/+files/Lspci.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1495442
Title:
apport information
** Attachment added: "CurrentDmesg.txt"
https://bugs.launchpad.net/bugs/1495442/+attachment/4463950/+files/CurrentDmesg.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
apport information
** Attachment added: "ProcModules.txt"
https://bugs.launchpad.net/bugs/1495442/+attachment/4463955/+files/ProcModules.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1495442
apport information
** Attachment added: "WifiSyslog.txt"
https://bugs.launchpad.net/bugs/1495442/+attachment/4463958/+files/WifiSyslog.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1495442
Same problem on iMac15,1 with Radeon R9 M295X Mac Edition
and 4.2.0-7-generic (wily / 15.10)
Two partial workarounds:
- downgrade to 4.1.0-3-generic and install fglrx-updates
but bluetooth will not work --broken with this kernel*
http://www.spinics.net/lists/linux-bluetooth/msg64098.html
-
Public bug reported:
Ubuntu 14.04.3 LTS with Kernel 3.19.0-26-generic
One of our servers running rsnapshot and nfs-kernel-server on XFS partitions
crashed or hanged two sundays in a raw.
Kernel 3.19.0-26-generic hangs multiple times (same time) in xlog_cil_force_lsn
(XFS).
I assume this bug is
The bug doesn't seem to impact 3.13.0-63-generic.
(the server is in production we don't really want to test 4.2 unstable)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1495442
Title:
XFS: kernel
Public bug reported:
After probably updating Ubuntu 15.10 packages, I unable to launch
software like evolution and virt-manager
$ evolution
evolution: symbol lookup error: /usr/lib/x86_64-linux-gnu/libmirprotobuf.so.3:
undefined symbol:
Thanks for your help
To fix I had to do
sudo apt-get purge libprotobuf-lite9v5
sudo apt-get install libprotobuf-lite9v5
as install even with --reinstall did not work (libprotobuf-lite9v5 was already
up to date)
now everything is working as before.
--
You received this bug notification because
Same issue
This morning, a security update for libc has been automatically
deployed on all our servers running 14.04 LTS.
unattended-upgrades-dpkg_2016-05-26_06:36:05.829399.log:Unpacking
libc6-dev:amd64
unattended-upgrades-dpkg_2016-05-26_06:36:05.829399.log:Unpacking libc-dev-bin
# This will simulate the removal of useless packages linked to old kernels
dpkg --get-selections 'linux-*.*.*-*' | grep $'\t''install' | cut -f1 \
| grep -vF "$(uname -r | cut -d- -f1,2)" \
| grep -vF "$(dpkg --get-selections 'linux-*image*' \
| grep -E '^[^0-9]+'$'\t''install$' | cut -f1 | xargs
Public bug reported:
Hello,
After updating the linux kernel of my Ubuntu 15.10 from 4.2.0-21 to 4.2.0.22
I was unable to get to XFCE and slim login manager, I was stuck on a black
screen
with nothing displayed (no text/graphics). Same issue with latest 4.2.0.25.
When I go back to 4.2.0-21
Public bug reported:
After updating evolution to 3.18.5.1-1ubuntu1 on Ubuntu 16.04,
it stopped working:
$ evolution
(evolution:4688): e-data-server-WARNING **: e_module_load_all_in_directory:
Error opening directory '/usr/lib/evolution-data-server/credential-modules': No
such file or
https://httpd.apache.org/docs/trunk/mod/mod_proxy_fcgi.html
14.04 LTS has Apache 2.4.7 so you cannot use this :
# Requires Apache 2.4.9 or later
SetHandler "proxy:unix:/var/run/php5-fpm.sock|fcgi://localhost/"
# Requires Apache 2.4.10 and later
SetHandler
FYI
I still have the issue on 3.13.0-91-generic (and 3.13.0-88-generic)
on a busy NFS server using XFS. I have this issue since 2015...
INFO: task kworker/1:2:31748 blocked for more than 120 seconds.
Not tainted 3.13.0-91-generic #138-Ubuntu
"echo 0 >
This is my backport of Tomas Espeleta's patch to Linux 4.15.18 (linux-
source-4.15.0 / 4.15.0-45.48 available on Ubuntu 18.04.2 LTS)
** Patch added: "huawei-matebook-x-right-speaker-work-4.15.0.patch"
https://kernel.ubuntu.com/~kernel-ppa/mainline/v5.4.32/CHANGES
https://patchwork.ozlabs.org/project/ubuntu-
kernel/patch/20200407222740.7671-2-sultan.alsa...@canonical.com/
Note that this bug only affects 5.4 and has since been fixed in 5.5.
Normally, a backport of the fix from 5.5 would be in
As 5.5 is more stable on my Dell XPS 13 than 5.4 with Intel iGPU (i915)
I did the following one-liner to install the latest version of Linux Kernel 5.5
on Ubuntu 20.04
which curl >/dev/null 2>&1 || sudo apt-get install -qq -y curl; for
version in $(curl -sL
So far no crash, freeze of any kind with Linux 5.5.13 compared to the
unstability of Ubuntu 20.04 with Linux 5.4 on Dell XPS 13 with 10th
Generation Intel Core i7-10510U CPU (Comet Lake)
I guess the patches are part of Linux v5.5.12 and later
Linux Kernel 5.5.x (>5.5.12) is working fine
** Changed in: linux (Ubuntu)
Status: Confirmed => New
** Information type changed from Public to Private
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
I did not manage to compile the kernel the Ubuntu way
https://wiki.ubuntu.com/Kernel/BuildYourOwnKernel
Is this doc still relevant for Linux 5.4 and 20.04 / Focal?
I included the patch I ported to the latest version of ubuntu-focal
git clone git://kernel.ubuntu.com/ubuntu/ubuntu-focal.git
**
** Attachment removed: "WifiSyslog.txt"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1868551/+attachment/5340470/+files/WifiSyslog.txt
** Attachment removed: "RfKill.txt"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1868551/+attachment/5340468/+files/RfKill.txt
**
I managed to build, install and boot the Linux Kernel 5.4 patched with
the above patch.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1868551
Title:
Screen freezes : NULL pointer dereference
zgrep -h i915_active_acquire /var/log/kern.log* kern.log* | cut -d ' '
-f1-3,5,9-
** Attachment added: "kern.log"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1868551/+attachment/5342403/+files/kern.log
--
You received this bug notification because you are a member of Ubuntu
Bugs,
Q: Is there an upstream commit?
A: Not that I am aware of
https://gitlab.freedesktop.org/drm/intel/issues/827
A month ago:
Hi, when will this make it's way into Kernel 5.4? -- The Boy from the MAD show
;-)
You can check if you had the same type crash of your Ubuntu 20.04 (soon
LTS)
zgrep -h
Seems to be fixed in the latest 5.5
http://kobi.wang/v5.x/ChangeLog-5.5
drm/i915: Hold reference to intel_frontbuffer as we track activity
Since obj->frontbuffer is no longer protected by the struct_mutex, as we
are processing the execbuf, it may be removed. Mark the
** Summary changed:
- Screen freezes : NULL pointer dereference i915_active_acquire since Linux 5.4
+ Intel GPU Hangs : random screen freezing w/ Ubuntu 20.04 (Linux 5.4)
i915_active_acquire
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
I am testing with Linux Kernel 5.5.13-050513-generic from
https://kernel.ubuntu.com/~kernel-ppa/mainline/v5.5.13/
as older kernels (https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=954817#17
** Bug watch added: Debian Bug tracker #954817
With the above patch, I still have the screen freeze but without Kernel oops.
I will compile and my own Linux Kernel 4.15 (18.04 LTS) for Ubuntu 20.04 (soon
LTS) as
Intel Graphics i915 is unusable on my Dell XPS 13 connected to external
screen and XFCE4
i915 :00:02.0: GPU HANG: ecode
I tested the test kernel 5.4 for about a day without issue
but all my computers using Intel GPU are using by default
kernel 5.5. I don't want to change that.
If you want to follow other users having the same kind of
issues with different i915 bugs on different Linux distro
follow comments on
Regarding #28
"on 20.04 LTS and v5.6 is not working properly with WiFi."
When I first tested Kernel 5.6 branch, the WiFi was broken because of this:
https://linuxreviews.org/Linux_5.6.2_Is_Released_With_Intel_Wifi_Fix
Now it is working again with the current 5.6 branch.
Kernel 5.5 is now EOL
https://patchwork.freedesktop.org/patch/345789/?series=70930=3
I will try to compile my own kernel with this patch
** Patch added:
"CI-drm-i915-Hold-reference-to-intel_frontbuffer-as-we-track-activity.patch"
Similar to this one
NULL pointer dereference in i915_active_acquire since Linux 5.4
https://gitlab.freedesktop.org/drm/intel/issues/827
** Bug watch added: gitlab.freedesktop.org/drm/intel/issues #827
https://gitlab.freedesktop.org/drm/intel/issues/827
--
You received this bug notification
Public bug reported:
uname -a
Linux xps 5.4.0-14-generic #17-Ubuntu SMP Thu Feb 6 22:47:59 UTC 2020 x86_64
x86_64 x86_64 GNU/Linux
lsb_release -a
No LSB modules are available.
Distributor ID: Ubuntu
Description:Ubuntu Focal Fossa (development branch)
Release:20.04
Codename:
apport information
** Attachment added: "WifiSyslog.txt"
https://bugs.launchpad.net/bugs/1868551/+attachment/5340470/+files/WifiSyslog.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1868551
apport information
** Attachment added: "Lspci.txt"
https://bugs.launchpad.net/bugs/1868551/+attachment/5340458/+files/Lspci.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1868551
Title:
apport information
** Attachment added: "ProcCpuinfoMinimal.txt"
https://bugs.launchpad.net/bugs/1868551/+attachment/5340463/+files/ProcCpuinfoMinimal.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
apport information
** Attachment added: "Lsusb-v.txt"
https://bugs.launchpad.net/bugs/1868551/+attachment/5340462/+files/Lsusb-v.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1868551
Title:
apport information
** Attachment added: "ProcInterrupts.txt"
https://bugs.launchpad.net/bugs/1868551/+attachment/5340465/+files/ProcInterrupts.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
apport information
** Attachment added: "CurrentDmesg.txt"
https://bugs.launchpad.net/bugs/1868551/+attachment/5340456/+files/CurrentDmesg.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
apport information
** Attachment added: "CRDA.txt"
https://bugs.launchpad.net/bugs/1868551/+attachment/5340455/+files/CRDA.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1868551
Title:
Dell
apport information
** Tags added: apport-collected
** Description changed:
uname -a
Linux xps 5.4.0-14-generic #17-Ubuntu SMP Thu Feb 6 22:47:59 UTC 2020 x86_64
x86_64 x86_64 GNU/Linux
lsb_release -a
No LSB modules are available.
Distributor ID: Ubuntu
Description:
apport information
** Attachment added: "ProcEnviron.txt"
https://bugs.launchpad.net/bugs/1868551/+attachment/5340464/+files/ProcEnviron.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1868551
apport information
** Attachment added: "Lsusb-t.txt"
https://bugs.launchpad.net/bugs/1868551/+attachment/5340461/+files/Lsusb-t.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1868551
Title:
apport information
** Attachment added: "PulseList.txt"
https://bugs.launchpad.net/bugs/1868551/+attachment/5340467/+files/PulseList.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1868551
apport information
** Attachment added: "IwConfig.txt"
https://bugs.launchpad.net/bugs/1868551/+attachment/5340457/+files/IwConfig.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1868551
apport information
** Attachment added: "Lsusb.txt"
https://bugs.launchpad.net/bugs/1868551/+attachment/5340459/+files/Lsusb.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1868551
Title:
apport information
** Attachment added: "UdevDb.txt"
https://bugs.launchpad.net/bugs/1868551/+attachment/5340469/+files/UdevDb.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1868551
Title:
** Summary changed:
- Dell XPS 13 : Screen freezes and Kernel Oops i915_active_acquire since Linux
5.4
+ Screen freezes : NULL pointer dereference i915_active_acquire since Linux 5.4
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1868551
Title:
Dell XPS 13 : Screen freezes and Kernel Oops i915_active_acquire
apport information
** Attachment added: "ProcModules.txt"
https://bugs.launchpad.net/bugs/1868551/+attachment/5340466/+files/ProcModules.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1868551
apport information
** Attachment added: "RfKill.txt"
https://bugs.launchpad.net/bugs/1868551/+attachment/5340468/+files/RfKill.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1868551
Title:
Can you stop launching wget or curl as root? -- Please!
Launching a web crawler/browser such as wget or curl as super user root is a
bad design
specially if it runs in background without user consent and knowledge every 12h
on all
Ubuntu Desktop and Server based devices worldwide.
It does not
Ubuntu decided to remove uptime from motd-news' data leak (exfiltration)
via User-Agent: and move /etc/default/motd-news conffile to the motd-
news-config package and switch from curl to wget.
Remove uptime from the motd-news user agent
** Attachment added: "motd-news force to run via motd-news.service and
motd-news.timer"
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+attachment/5389472/+files/ubuntu-desktop-2004-terminal3.png
--
You received this bug notification because you are a member of Ubuntu
** Attachment added: "motd.ubuntu.com is up since 2017"
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+attachment/5389476/+files/ubuntu-desktop-2004-waybackmachine.png
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
** Attachment added: "Sample motd.ubuntu.com Ads from 2017"
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+attachment/5389478/+files/ubuntu-desktop-2004-waybackmachine3.png
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed
** Attachment added: "motd-news is unremovable"
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+attachment/5389480/+files/ubuntu-desktop-2004-system-failure1.png
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Attachment added: "Sample motd.ubuntu.com Ads from 2019"
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+attachment/5389479/+files/ubuntu-desktop-2004-waybackmachine4.png
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed
** Attachment added: "motd.ubuntu.com hosted in the Amazon EC2 cloud in Dublin,
Leinster, Ireland"
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+attachment/5389474/+files/ubuntu-desktop-2004-terminal4.png
--
You received this bug notification because you are a member of
No updates from Canonical's legal departement
"A picture is worth a thousand words"
** Attachment added: "motd-news.service started during installation Ubuntu
Desktop 20.04 Without Consent"
** Attachment added: "motd.ubuntu.com current Advertising for Canonical
Products"
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+attachment/5389475/+files/ubuntu-desktop-2004-translate.png
--
You received this bug notification because you are a member of Ubuntu
Bugs,
** Attachment added: "motd-news ENABLED by default with telemetry every 12h
Without Consent"
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+attachment/5389471/+files/ubuntu-desktop-2004-terminal2.png
--
You received this bug notification because you are a member of
** Attachment added: "Privacy has not opt-out for motd-news hidden telemetry in
User-Agent"
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+attachment/5389470/+files/ubuntu-desktop-2004-privacy.png
--
You received this bug notification because you are a member of Ubuntu
** Attachment added: "Trying to remove motd-news via base-files will kill
Ubuntu"
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+attachment/5389481/+files/ubuntu-desktop-2004-system-failure2.png
--
You received this bug notification because you are a member of Ubuntu
** Attachment added: "No, don't send system info NOT RESPECTED BY MOTD-NEWS"
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+attachment/5389468/+files/ubuntu-desktop-2004-optout.png
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
** Attachment added: "motd-news exfiltrate system information via User-Agent
and IP Address every 12 hours Without Consent"
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+attachment/5389482/+files/ubuntu-desktop-2004-motd-news.png
--
You received this bug notification
** Attachment added: "Legal Notice DOES NOT COVER "motd-news" sending IP
address, Uptime, Idle time every 12h motd-news.service started during
installation Ubuntu Desktop 20.04 Without Consent"
** Attachment added: "Sample motd.ubuntu.com Ads from 2020"
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+attachment/5389477/+files/ubuntu-desktop-2004-waybackmachine2.png
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed
https://news.softpedia.com/news/canonical-under-fire-for-putting-ads-in-the-ubuntu-motd-530372.shtml
Article like "Canonical Under Fire for Putting Ads in the Ubuntu MOTD"
miss the point that motd-news is not only displaying Advertising in the login
prompt but it a Privacy Nightmare because it
https://ico.org.uk/make-a-complaint/your-personal-information-concerns/
To: ICO
Dear Information Commissioner’s Office,
I confirm that I want to proceed with the creation of the case about
Canonical's motd-news as Canonical don't want to remediate the privacy
issue of sending by default
1 - 100 of 128 matches
Mail list logo