[Bug 1704932] Re: xfstests fails with Metadata corruption at leaf on xfs filesystem
** Package changed: ubuntu => xfsprogs (Ubuntu) ** Also affects: ubuntu-power-systems Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1704932 Title: xfstests fails with Metadata corruption at leaf on xfs filesystem To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-power-systems/+bug/1704932/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1667750] Re: xhci_hcd: ERROR Transfer event TRB DMA ptr not part of current TD ep_index 2 comp_code 13
** Changed in: linux (Ubuntu) Assignee: (unassigned) => Kai-Heng Feng (kaihengfeng) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1667750 Title: xhci_hcd: ERROR Transfer event TRB DMA ptr not part of current TD ep_index 2 comp_code 13 To manage notifications about this bug go to: https://bugs.launchpad.net/hwe-next/+bug/1667750/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1653456] Re: ASUS G752VS: Touchpad and Fn keys not working (Ubuntu 16.04.1/16.10/17.04)
@Jorge, Can you file a new bug for the headphone issue? @FZ, Yours has a different ID: ELAN1203:00 04F3:301E Seems like the issue is limited to this one only: ELAN1203:00 04F3:3043 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1653456 Title: ASUS G752VS: Touchpad and Fn keys not working (Ubuntu 16.04.1/16.10/17.04) To manage notifications about this bug go to: https://bugs.launchpad.net/linux/+bug/1653456/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1653456] Re: ASUS G752VS: Touchpad and Fn keys not working (Ubuntu 16.04.1/16.10/17.04)
@aljosa, Does the interrupts number for ELAN1203 increases when you touch the touchpad? You can use `watch -n0.1 cat /proc/interrupts` to check. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1653456 Title: ASUS G752VS: Touchpad and Fn keys not working (Ubuntu 16.04.1/16.10/17.04) To manage notifications about this bug go to: https://bugs.launchpad.net/linux/+bug/1653456/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1704745] Re: Ambiance light-themes - LibreOffice has a white square top right
** Branch linked: lp:~c-lobrano/ubuntu-themes/fix-1704745 ** Changed in: ubuntu-themes Status: Confirmed => In Progress -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1704745 Title: Ambiance light-themes - LibreOffice has a white square top right To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-themes/+bug/1704745/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1704782] Re: qcow base image apparmor rule missing in artful
Breaking change identified as commit f813fe810fc3f0ce839f450e662e0173d40a5ce1 (refs/bisect/bad) Author: Peter Krempa Date: Fri Jan 13 16:50:11 2017 +0100 storage: backend: Refactor registration of the backend drivers Peter said he will take a look: "Hmmm, in that case probably the registration of the storage driver APIs in the aa-helper does not take place properly, and thus the detection of the backing chain will be wrong." -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1704782 Title: qcow base image apparmor rule missing in artful To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libvirt/+bug/1704782/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1696752] Re: [SRU] MAAS 2.2.0
I've verified -proposed on all releases and marked this as verification- done. ** Tags removed: verification-needed verification-needed-xenial verification-needed-yakkety verification-needed-zesty ** Tags added: verification-done verification-done-xenial verification-done-yakkety verification-done-zesty -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1696752 Title: [SRU] MAAS 2.2.0 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/maas/+bug/1696752/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1704829] Re: crash on s390 in kvm run due to background load on postcopy
** Tags added: architecture-s39064 bugnameltc-156764 severity-high targetmilestone-inin1704 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1704829 Title: crash on s390 in kvm run due to background load on postcopy To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/1704829/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1704937] [NEW] generate-id() returns non-unique values
Public bug reported: It seems related to patch https://bugs.debian.org/823857. See attachment, The command xsltproc generate-id.xsl pages.xml returns: and content another of xml Expected result: all IDs should be unique. ProblemType: Bug DistroRelease: Ubuntu 17.04 Package: libxslt1.1 1.1.29-2ubuntu0.1 ProcVersionSignature: Ubuntu 4.10.0-28.32-generic 4.10.17 Uname: Linux 4.10.0-28-generic x86_64 ApportVersion: 2.20.4-0ubuntu4.4 Architecture: amd64 CurrentDesktop: Unity:Unity7 Date: Tue Jul 18 10:55:05 2017 InstallationDate: Installed on 2017-05-31 (47 days ago) InstallationMedia: Ubuntu 17.04 "Zesty Zapus" - Release amd64 (20170412) SourcePackage: libxslt UpgradeStatus: No upgrade log present (probably fresh install) ** Affects: libxslt (Ubuntu) Importance: Undecided Status: New ** Tags: amd64 apport-bug zesty ** Attachment added: "generate-id.7z" https://bugs.launchpad.net/bugs/1704937/+attachment/4916588/+files/generate-id.7z -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1704937 Title: generate-id() returns non-unique values To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libxslt/+bug/1704937/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 651610] Re: Version number for .msi thumbnail is obtained from unreliable source
** Changed in: gnome-exe-thumbnailer (Debian) Status: Unknown => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/651610 Title: Version number for .msi thumbnail is obtained from unreliable source To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gnome-exe-thumbnailer/+bug/651610/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 935439] Re: sdpa version 7.3.5.dfsg-1build1 FTBFS on i386 in precise
fixed in later releases ** Changed in: sdpa (Ubuntu Precise) Status: New => Fix Released ** Changed in: sdpa (Ubuntu) Status: New => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/935439 Title: sdpa version 7.3.5.dfsg-1build1 FTBFS on i386 in precise To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/sdpa/+bug/935439/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1704942] [NEW] weather in bbc say s i need flash player
Public bug reported: on bbc site weather news says i need flash player to watch this content ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: firefox 54.0+build3-0ubuntu0.14.04.1 ProcVersionSignature: Ubuntu 3.13.0-123.172-generic 3.13.11-ckt39 Uname: Linux 3.13.0-123-generic i686 AddonCompatCheckDisabled: False ApportVersion: 2.14.1-0ubuntu3.24 Architecture: i386 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC1: john 1995 F pulseaudio /dev/snd/controlC0: john 1995 F pulseaudio BuildID: 20170612122526 Channel: Unavailable CurrentDesktop: Unity Date: Tue Jul 18 08:39:15 2017 Extensions: extensions.sqlite corrupt or missing ForcedLayersAccel: False IfupdownConfig: auto lo iface lo inet loopback IncompatibleExtensions: Unavailable (corrupt or non-existant compatibility.ini or extensions.sqlite) InstallationDate: Installed on 2016-11-09 (250 days ago) InstallationMedia: Ubuntu 12.04.4 LTS "Precise Pangolin" - Release i386 (20140204) IpRoute: default via 192.168.0.1 dev eth0 proto static 192.168.0.0/24 dev eth0 proto kernel scope link src 192.168.0.5 metric 1 IwConfig: lono wireless extensions. eth0 no wireless extensions. Locales: extensions.sqlite corrupt or missing MostRecentCrashID: bp-df71432e-3348-41fd-9ed8-632352170325 Plugins: Shockwave Flash - /usr/lib/flashplugin-installer/libflashplayer.so PrefErrors: Unexpected character '' before pref @ [Profile]/extensions/amin.eft_bmno...@gmail.com/defaults/preferences/pref.js:1 PrefSources: prefs.js ProcEnviron: LANGUAGE=en_GB:en PATH=(custom, no user) XDG_RUNTIME_DIR= LANG=en_GB.UTF-8 SHELL=/bin/bash Profiles: Profile0 (Default) - LastVersion=54.0/20170612122526 (In use) RfKill: RunningIncompatibleAddons: False SourcePackage: firefox Themes: extensions.sqlite corrupt or missing UpgradeStatus: Upgraded to trusty on 2017-03-25 (114 days ago) WifiSyslog: Jul 18 06:44:50 john-HP-Compaq-dx2420-Microtower kernel: [ 1852.643895] perf samples too long (2508 > 2500), lowering kernel.perf_event_max_sample_rate to 5 Jul 18 07:49:34 john-HP-Compaq-dx2420-Microtower kernel: [ 5735.927810] perf samples too long (5005 > 5000), lowering kernel.perf_event_max_sample_rate to 25000 Jul 18 08:15:40 john-HP-Compaq-dx2420-Microtower kernel: [ 7302.606495] systemd-hostnamed[6464]: Warning: nss-myhostname is not installed. Changing the local hostname might make it unresolveable. Please install nss-myhostname! Jul 18 08:25:48 john-HP-Compaq-dx2420-Microtower kernel: [ 7910.212175] systemd-hostnamed[6950]: Warning: nss-myhostname is not installed. Changing the local hostname might make it unresolveable. Please install nss-myhostname! dmi.bios.date: 02/20/2009 dmi.bios.vendor: Phoenix Technologies, LTD dmi.bios.version: 5.18 dmi.board.name: 2A78h dmi.board.vendor: MSI dmi.board.version: 1.0 dmi.chassis.asset.tag: CZC94064H4 dmi.chassis.type: 3 dmi.chassis.vendor: Hewlett-Packard dmi.modalias: dmi:bvnPhoenixTechnologies,LTD:bvr5.18:bd02/20/2009:svnHewlett-Packard:pnHPCompaqdx2420Microtower:pvr:rvnMSI:rn2A78h:rvr1.0:cvnHewlett-Packard:ct3:cvr: dmi.product.name: HP Compaq dx2420 Microtower dmi.sys.vendor: Hewlett-Packard ** Affects: firefox (Ubuntu) Importance: Undecided Status: New ** Tags: apport-bug i386 trusty -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1704942 Title: weather in bbc say s i need flash player To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/firefox/+bug/1704942/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1704941] [NEW] 100522224
Public bug reported: 10054 ** Affects: ubuntu Importance: Undecided Status: Incomplete ** Attachment added: "a level.pdf" https://bugs.launchpad.net/bugs/1704941/+attachment/4916608/+files/a%20level.pdf ** Changed in: ubuntu Status: New => Incomplete -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1704941 Title: 10054 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+bug/1704941/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1704829] Comment bridged from LTC Bugzilla
--- Comment From cborn...@de.ibm.com 2017-07-18 03:33 EDT--- I assume the crash is on the target (not the source). Do you have any dmesg messages from that system? Does the target system have enough memory/swap? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1704829 Title: crash on s390 in kvm run due to background load on postcopy To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/1704829/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1704829] Re: crash on s390 in kvm run due to background load on postcopy
** Tags added: s390x -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1704829 Title: crash on s390 in kvm run due to background load on postcopy To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/1704829/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1663097] Re: Show featured snaps
SRU verification for Xenial: I have reproduced the problem with gnome-software 3.20.1+git20170524.0.ea2fe2b0-0ubuntu0.16.04.1 in xenial-updates and have verified that the version of gnome-software 3.20.5-0ubuntu0.16.04.5 in -proposed fixes the issue (there are snaps in the editor's pick section - atom, corebird) Marking as verification-done ** Tags removed: verification-needed verification-needed-xenial ** Tags added: verification-done-xenial -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1663097 Title: Show featured snaps To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gnome-software/+bug/1663097/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 149519] ❤After Grisly Killings in Pennsylvania, a Quick Deal to Spare Execution
Dear friend! The police had been investigating the disappearance of four men in Pennsylvania for only a week when http://abpconsultant.ru/doctrinex.php?aaab My Best, MIRCO CPPELLETTI From: Bug 149519 [mailto:149...@bugs.launchpad.net] Sent: Tuesday, July 18, 2017 2:40 AM To: ka...@inwind.it Subject: it also looks great! :-) Things off the top of my head: Large file transfers to /Public. Could fill up all space on his hard drive with goat porn. Even better, is there a folder that goes to "Desktop"? This should lead to the desktop off all user profiles. You could some social engineering here. Put something extremely interesting here, and have him click on it. Could be something just to spook him, or something that executes a malicious payload. ** Attachment added: "FD0AC8F5766D3A0C79BC57148BD5DCCD.jpg" https://bugs.launchpad.net/bugs/149519/+attachment/4916607/+files/FD0AC8F5766D3A0C79BC57148BD5DCCD.jpg -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/149519 Title: firefox-bin crashed with SIGSEGV in __kernel_vsyscall() To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/firefox/+bug/149519/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1701834] Re: package bsdutils 1:2.29-1ubuntu2.1 failed to install/upgrade: il pacchetto si trova in uno stato di inconsistenza critico: è consigliato installarlo nuovamente prima di tentare la c
Status changed to 'Confirmed' because the bug affects multiple users. ** Changed in: util-linux (Ubuntu) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1701834 Title: package bsdutils 1:2.29-1ubuntu2.1 failed to install/upgrade: il pacchetto si trova in uno stato di inconsistenza critico: è consigliato installarlo nuovamente prima di tentare la configurazione. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/dpkg/+bug/1701834/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1701834] Re: package bsdutils 1:2.29-1ubuntu2.1 failed to install/upgrade: il pacchetto si trova in uno stato di inconsistenza critico: è consigliato installarlo nuovamente prima di tentare la c
Status changed to 'Confirmed' because the bug affects multiple users. ** Changed in: dpkg (Ubuntu) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1701834 Title: package bsdutils 1:2.29-1ubuntu2.1 failed to install/upgrade: il pacchetto si trova in uno stato di inconsistenza critico: è consigliato installarlo nuovamente prima di tentare la configurazione. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/dpkg/+bug/1701834/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1670450] Re: samba4 bind dlz module stops working on rndc reload
Hm I looked at current samba git and bugtracker and did not find anything related to this bug. It seems noone ever submitted this upstream... This is quite strange, I wonder how other people do. Maybe I missed something but this is reproducible and blocking for "real" production environements unless you never update your local DNS content ... Do you want me to report upstream ? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1670450 Title: samba4 bind dlz module stops working on rndc reload To manage notifications about this bug go to: https://bugs.launchpad.net/samba/+bug/1670450/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1689825] Re: gnome-keyring not unlocked on boot
Same here. Uninstalling dbus-user-session solved the issue. Thanks to all contributors. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1689825 Title: gnome-keyring not unlocked on boot To manage notifications about this bug go to: https://bugs.launchpad.net/dbus/+bug/1689825/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1617759] Re: kmail search broken
*** This bug is a duplicate of bug 1567522 *** https://bugs.launchpad.net/bugs/1567522 Same issue DISTRIB_ID=Ubuntu DISTRIB_RELEASE=16.04 DISTRIB_CODENAME=xenial DISTRIB_DESCRIPTION="Ubuntu 16.04.2 LTS" :~$ sudo apt policy baloo baloo: Installé : 4:5.36.0-0ubuntu1~ubuntu16.04~ppa1 Candidat : 4:5.36.0-0ubuntu1~ubuntu16.04~ppa1 Table de version : *** 4:5.36.0-0ubuntu1~ubuntu16.04~ppa1 500 500 http://ppa.launchpad.net/kubuntu-ppa/backports/ubuntu xenial/main amd64 Packages 500 http://ppa.launchpad.net/kubuntu-ppa/backports/ubuntu xenial/main i386 Packages 100 /var/lib/dpkg/status 4:5.18.0-0ubuntu1.1 500 500 http://fr.archive.ubuntu.com/ubuntu xenial-updates/universe amd64 Packages 500 http://fr.archive.ubuntu.com/ubuntu xenial-updates/universe i386 Packages 4:5.18.0-0ubuntu1 500 500 http://fr.archive.ubuntu.com/ubuntu xenial/universe amd64 Packages 500 http://fr.archive.ubuntu.com/ubuntu xenial/universe i386 Packages :~$ sudo apt policy kmail kmail: Installé : 4:16.04.3-0ubuntu2~ubuntu16.04~ppa63 Candidat : 4:16.04.3-0ubuntu2~ubuntu16.04~ppa63 Table de version : *** 4:16.04.3-0ubuntu2~ubuntu16.04~ppa63 500 500 http://ppa.launchpad.net/kubuntu-ppa/backports/ubuntu xenial/main amd64 Packages 100 /var/lib/dpkg/status 4:15.12.3-0ubuntu1 500 500 http://fr.archive.ubuntu.com/ubuntu xenial/universe amd64 Packages -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1617759 Title: kmail search broken To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/kdepim/+bug/1617759/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1703396] Re: linux: 3.13.0-125.174 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-updates Status: Confirmed => Fix Committed ** Changed in: kernel-sru-workflow/promote-to-updates Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz Zemczak (sil2100) ** Changed in: kernel-sru-workflow/promote-to-security Status: Confirmed => Fix Committed ** Changed in: kernel-sru-workflow/promote-to-security Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz Zemczak (sil2100) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1703396 Title: linux: 3.13.0-125.174 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1703396/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1697053] Re: Missing IOTLB flush causes DMAR errors with SR-IOV
This bug was fixed in the package linux - 3.13.0-125.174 --- linux (3.13.0-125.174) trusty; urgency=low * linux: 3.13.0-125.174 -proposed tracker (LP: #1703396) * NULL pointer dereference triggered by openvswitch autopkg testcase (LP: #1703401) - Revert "rtnl/do_setlink(): notify when a netdev is modified" - Revert "rtnl/do_setlink(): last arg is now a set of flags" - Revert "rtnl/do_setlink(): set modified when IFLA_LINKMODE is updated" - Revert "rtnl/do_setlink(): set modified when IFLA_TXQLEN is updated" - Revert "rtnetlink: provide api for getting and setting slave info" linux (3.13.0-124.173) trusty; urgency=low * linux: 3.13.0-124.173 -proposed tracker (LP: #1701042) * CVE-2017-7895 - nfsd: Remove assignments inside conditions - svcrdma: Do not add XDR padding to xdr_buf page vector - nfsd4: minor NFSv2/v3 write decoding cleanup - nfsd: stricter decoding of write-like NFSv2/v3 ops * CVE-2017-9605 - drm/vmwgfx: Make sure backup_handle is always valid * CVE-2017-1000380 - ALSA: timer: Fix race between read and ioctl - ALSA: timer: Fix missing queue indices reset at SNDRV_TIMER_IOCTL_SELECT * linux <3.18: netlink notification is missing when an interface is modified (LP: #1690094) - rtnetlink: provide api for getting and setting slave info - rtnl/do_setlink(): set modified when IFLA_TXQLEN is updated - rtnl/do_setlink(): set modified when IFLA_LINKMODE is updated - rtnl/do_setlink(): last arg is now a set of flags - rtnl/do_setlink(): notify when a netdev is modified * CVE-2015-8944 - Make file credentials available to the seqfile interfaces - /proc/iomem: only expose physical resource addresses to privileged users * CVE-2016-10088 - sg_write()/bsg_write() is not fit to be called under KERNEL_DS * CVE-2017-7346 - drm/vmwgfx: limit the number of mip levels in vmw_gb_surface_define_ioctl() * CVE-2015-8966 - arm: fix handling of F_OFD_... in oabi_fcntl64() * Missing IOTLB flush causes DMAR errors with SR-IOV (LP: #1697053) - iommu/vt-d: Fix missing IOTLB flush in intel_iommu_unmap() * CVE-2017-8924 - USB: serial: io_ti: fix information leak in completion handler * CVE-2017-8925 - USB: serial: omninet: fix reference leaks at open * CVE-2015-8967 - arm64: make sys_call_table const * CVE-2015-8964 - tty: Prevent ldisc drivers from re-using stale tty fields * CVE-2015-8955 - arm64: perf: reject groups spanning multiple HW PMUs * CVE-2015-8962 - sg: Fix double-free when drives detach during SG_IO * CVE-2015-8963 - perf: Fix race in swevent hash * CVE-2017-9074 - ipv6: Check ip6_find_1stfragopt() return value properly. * CVE-2014-9900 - net: Zeroing the structure ethtool_wolinfo in ethtool_get_wol() -- Thadeu Lima de Souza Cascardo Mon, 10 Jul 2017 13:02:31 -0300 ** Changed in: linux (Ubuntu Trusty) Status: Fix Committed => Fix Released ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-9900 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-8944 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-8955 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-8962 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-8963 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-8964 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-8966 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-8967 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-10088 ** CVE added: https://cve.mitre.org/cgi- bin/cvename.cgi?name=2017-1000380 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-7346 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-7895 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-8924 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-8925 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-9074 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-9605 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1697053 Title: Missing IOTLB flush causes DMAR errors with SR-IOV To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1697053/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1703401] Re: NULL pointer dereference triggered by openvswitch autopkg testcase
This bug was fixed in the package linux - 3.13.0-125.174 --- linux (3.13.0-125.174) trusty; urgency=low * linux: 3.13.0-125.174 -proposed tracker (LP: #1703396) * NULL pointer dereference triggered by openvswitch autopkg testcase (LP: #1703401) - Revert "rtnl/do_setlink(): notify when a netdev is modified" - Revert "rtnl/do_setlink(): last arg is now a set of flags" - Revert "rtnl/do_setlink(): set modified when IFLA_LINKMODE is updated" - Revert "rtnl/do_setlink(): set modified when IFLA_TXQLEN is updated" - Revert "rtnetlink: provide api for getting and setting slave info" linux (3.13.0-124.173) trusty; urgency=low * linux: 3.13.0-124.173 -proposed tracker (LP: #1701042) * CVE-2017-7895 - nfsd: Remove assignments inside conditions - svcrdma: Do not add XDR padding to xdr_buf page vector - nfsd4: minor NFSv2/v3 write decoding cleanup - nfsd: stricter decoding of write-like NFSv2/v3 ops * CVE-2017-9605 - drm/vmwgfx: Make sure backup_handle is always valid * CVE-2017-1000380 - ALSA: timer: Fix race between read and ioctl - ALSA: timer: Fix missing queue indices reset at SNDRV_TIMER_IOCTL_SELECT * linux <3.18: netlink notification is missing when an interface is modified (LP: #1690094) - rtnetlink: provide api for getting and setting slave info - rtnl/do_setlink(): set modified when IFLA_TXQLEN is updated - rtnl/do_setlink(): set modified when IFLA_LINKMODE is updated - rtnl/do_setlink(): last arg is now a set of flags - rtnl/do_setlink(): notify when a netdev is modified * CVE-2015-8944 - Make file credentials available to the seqfile interfaces - /proc/iomem: only expose physical resource addresses to privileged users * CVE-2016-10088 - sg_write()/bsg_write() is not fit to be called under KERNEL_DS * CVE-2017-7346 - drm/vmwgfx: limit the number of mip levels in vmw_gb_surface_define_ioctl() * CVE-2015-8966 - arm: fix handling of F_OFD_... in oabi_fcntl64() * Missing IOTLB flush causes DMAR errors with SR-IOV (LP: #1697053) - iommu/vt-d: Fix missing IOTLB flush in intel_iommu_unmap() * CVE-2017-8924 - USB: serial: io_ti: fix information leak in completion handler * CVE-2017-8925 - USB: serial: omninet: fix reference leaks at open * CVE-2015-8967 - arm64: make sys_call_table const * CVE-2015-8964 - tty: Prevent ldisc drivers from re-using stale tty fields * CVE-2015-8955 - arm64: perf: reject groups spanning multiple HW PMUs * CVE-2015-8962 - sg: Fix double-free when drives detach during SG_IO * CVE-2015-8963 - perf: Fix race in swevent hash * CVE-2017-9074 - ipv6: Check ip6_find_1stfragopt() return value properly. * CVE-2014-9900 - net: Zeroing the structure ethtool_wolinfo in ethtool_get_wol() -- Thadeu Lima de Souza Cascardo Mon, 10 Jul 2017 13:02:31 -0300 ** Changed in: linux (Ubuntu Trusty) Status: Fix Committed => Fix Released ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-9900 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-8944 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-8955 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-8962 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-8963 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-8964 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-8966 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-8967 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-10088 ** CVE added: https://cve.mitre.org/cgi- bin/cvename.cgi?name=2017-1000380 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-7346 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-7895 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-8924 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-8925 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-9074 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-9605 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1703401 Title: NULL pointer dereference triggered by openvswitch autopkg testcase To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1703401/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1703396] Re: linux: 3.13.0-125.174 -proposed tracker
This bug was fixed in the package linux - 3.13.0-125.174 --- linux (3.13.0-125.174) trusty; urgency=low * linux: 3.13.0-125.174 -proposed tracker (LP: #1703396) * NULL pointer dereference triggered by openvswitch autopkg testcase (LP: #1703401) - Revert "rtnl/do_setlink(): notify when a netdev is modified" - Revert "rtnl/do_setlink(): last arg is now a set of flags" - Revert "rtnl/do_setlink(): set modified when IFLA_LINKMODE is updated" - Revert "rtnl/do_setlink(): set modified when IFLA_TXQLEN is updated" - Revert "rtnetlink: provide api for getting and setting slave info" linux (3.13.0-124.173) trusty; urgency=low * linux: 3.13.0-124.173 -proposed tracker (LP: #1701042) * CVE-2017-7895 - nfsd: Remove assignments inside conditions - svcrdma: Do not add XDR padding to xdr_buf page vector - nfsd4: minor NFSv2/v3 write decoding cleanup - nfsd: stricter decoding of write-like NFSv2/v3 ops * CVE-2017-9605 - drm/vmwgfx: Make sure backup_handle is always valid * CVE-2017-1000380 - ALSA: timer: Fix race between read and ioctl - ALSA: timer: Fix missing queue indices reset at SNDRV_TIMER_IOCTL_SELECT * linux <3.18: netlink notification is missing when an interface is modified (LP: #1690094) - rtnetlink: provide api for getting and setting slave info - rtnl/do_setlink(): set modified when IFLA_TXQLEN is updated - rtnl/do_setlink(): set modified when IFLA_LINKMODE is updated - rtnl/do_setlink(): last arg is now a set of flags - rtnl/do_setlink(): notify when a netdev is modified * CVE-2015-8944 - Make file credentials available to the seqfile interfaces - /proc/iomem: only expose physical resource addresses to privileged users * CVE-2016-10088 - sg_write()/bsg_write() is not fit to be called under KERNEL_DS * CVE-2017-7346 - drm/vmwgfx: limit the number of mip levels in vmw_gb_surface_define_ioctl() * CVE-2015-8966 - arm: fix handling of F_OFD_... in oabi_fcntl64() * Missing IOTLB flush causes DMAR errors with SR-IOV (LP: #1697053) - iommu/vt-d: Fix missing IOTLB flush in intel_iommu_unmap() * CVE-2017-8924 - USB: serial: io_ti: fix information leak in completion handler * CVE-2017-8925 - USB: serial: omninet: fix reference leaks at open * CVE-2015-8967 - arm64: make sys_call_table const * CVE-2015-8964 - tty: Prevent ldisc drivers from re-using stale tty fields * CVE-2015-8955 - arm64: perf: reject groups spanning multiple HW PMUs * CVE-2015-8962 - sg: Fix double-free when drives detach during SG_IO * CVE-2015-8963 - perf: Fix race in swevent hash * CVE-2017-9074 - ipv6: Check ip6_find_1stfragopt() return value properly. * CVE-2014-9900 - net: Zeroing the structure ethtool_wolinfo in ethtool_get_wol() -- Thadeu Lima de Souza Cascardo Mon, 10 Jul 2017 13:02:31 -0300 ** Changed in: linux (Ubuntu Trusty) Status: Confirmed => Fix Released ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-9900 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-8944 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-8955 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-8962 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-8963 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-8964 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-8966 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-8967 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-10088 ** CVE added: https://cve.mitre.org/cgi- bin/cvename.cgi?name=2017-1000380 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-7346 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-7895 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-8924 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-8925 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-9074 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-9605 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1703396 Title: linux: 3.13.0-125.174 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1703396/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1704890] Re: Kea 1.2 has been out for awhile
** Bug watch added: Debian Bug tracker #863637 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863637 ** Also affects: isc-kea (Debian) via http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863637 Importance: Unknown Status: Unknown ** Tags added: upgrade-software-version -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1704890 Title: Kea 1.2 has been out for awhile To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/isc-kea/+bug/1704890/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1701042] Re: linux: 3.13.0-125.174 -proposed tracker
*** This bug is a duplicate of bug 1703396 *** https://bugs.launchpad.net/bugs/1703396 This bug was fixed in the package linux - 3.13.0-125.174 --- linux (3.13.0-125.174) trusty; urgency=low * linux: 3.13.0-125.174 -proposed tracker (LP: #1703396) * NULL pointer dereference triggered by openvswitch autopkg testcase (LP: #1703401) - Revert "rtnl/do_setlink(): notify when a netdev is modified" - Revert "rtnl/do_setlink(): last arg is now a set of flags" - Revert "rtnl/do_setlink(): set modified when IFLA_LINKMODE is updated" - Revert "rtnl/do_setlink(): set modified when IFLA_TXQLEN is updated" - Revert "rtnetlink: provide api for getting and setting slave info" linux (3.13.0-124.173) trusty; urgency=low * linux: 3.13.0-124.173 -proposed tracker (LP: #1701042) * CVE-2017-7895 - nfsd: Remove assignments inside conditions - svcrdma: Do not add XDR padding to xdr_buf page vector - nfsd4: minor NFSv2/v3 write decoding cleanup - nfsd: stricter decoding of write-like NFSv2/v3 ops * CVE-2017-9605 - drm/vmwgfx: Make sure backup_handle is always valid * CVE-2017-1000380 - ALSA: timer: Fix race between read and ioctl - ALSA: timer: Fix missing queue indices reset at SNDRV_TIMER_IOCTL_SELECT * linux <3.18: netlink notification is missing when an interface is modified (LP: #1690094) - rtnetlink: provide api for getting and setting slave info - rtnl/do_setlink(): set modified when IFLA_TXQLEN is updated - rtnl/do_setlink(): set modified when IFLA_LINKMODE is updated - rtnl/do_setlink(): last arg is now a set of flags - rtnl/do_setlink(): notify when a netdev is modified * CVE-2015-8944 - Make file credentials available to the seqfile interfaces - /proc/iomem: only expose physical resource addresses to privileged users * CVE-2016-10088 - sg_write()/bsg_write() is not fit to be called under KERNEL_DS * CVE-2017-7346 - drm/vmwgfx: limit the number of mip levels in vmw_gb_surface_define_ioctl() * CVE-2015-8966 - arm: fix handling of F_OFD_... in oabi_fcntl64() * Missing IOTLB flush causes DMAR errors with SR-IOV (LP: #1697053) - iommu/vt-d: Fix missing IOTLB flush in intel_iommu_unmap() * CVE-2017-8924 - USB: serial: io_ti: fix information leak in completion handler * CVE-2017-8925 - USB: serial: omninet: fix reference leaks at open * CVE-2015-8967 - arm64: make sys_call_table const * CVE-2015-8964 - tty: Prevent ldisc drivers from re-using stale tty fields * CVE-2015-8955 - arm64: perf: reject groups spanning multiple HW PMUs * CVE-2015-8962 - sg: Fix double-free when drives detach during SG_IO * CVE-2015-8963 - perf: Fix race in swevent hash * CVE-2017-9074 - ipv6: Check ip6_find_1stfragopt() return value properly. * CVE-2014-9900 - net: Zeroing the structure ethtool_wolinfo in ethtool_get_wol() -- Thadeu Lima de Souza Cascardo Mon, 10 Jul 2017 13:02:31 -0300 ** Changed in: linux (Ubuntu Trusty) Status: New => Fix Released ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-9900 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-8944 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-8955 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-8962 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-8963 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-8964 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-8966 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-8967 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-10088 ** CVE added: https://cve.mitre.org/cgi- bin/cvename.cgi?name=2017-1000380 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-7346 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-7895 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-8924 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-8925 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-9074 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-9605 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1701042 Title: linux: 3.13.0-125.174 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1701042/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1690094] Re: linux <3.18: netlink notification is missing when an interface is modified
This bug was fixed in the package linux - 3.13.0-125.174 --- linux (3.13.0-125.174) trusty; urgency=low * linux: 3.13.0-125.174 -proposed tracker (LP: #1703396) * NULL pointer dereference triggered by openvswitch autopkg testcase (LP: #1703401) - Revert "rtnl/do_setlink(): notify when a netdev is modified" - Revert "rtnl/do_setlink(): last arg is now a set of flags" - Revert "rtnl/do_setlink(): set modified when IFLA_LINKMODE is updated" - Revert "rtnl/do_setlink(): set modified when IFLA_TXQLEN is updated" - Revert "rtnetlink: provide api for getting and setting slave info" linux (3.13.0-124.173) trusty; urgency=low * linux: 3.13.0-124.173 -proposed tracker (LP: #1701042) * CVE-2017-7895 - nfsd: Remove assignments inside conditions - svcrdma: Do not add XDR padding to xdr_buf page vector - nfsd4: minor NFSv2/v3 write decoding cleanup - nfsd: stricter decoding of write-like NFSv2/v3 ops * CVE-2017-9605 - drm/vmwgfx: Make sure backup_handle is always valid * CVE-2017-1000380 - ALSA: timer: Fix race between read and ioctl - ALSA: timer: Fix missing queue indices reset at SNDRV_TIMER_IOCTL_SELECT * linux <3.18: netlink notification is missing when an interface is modified (LP: #1690094) - rtnetlink: provide api for getting and setting slave info - rtnl/do_setlink(): set modified when IFLA_TXQLEN is updated - rtnl/do_setlink(): set modified when IFLA_LINKMODE is updated - rtnl/do_setlink(): last arg is now a set of flags - rtnl/do_setlink(): notify when a netdev is modified * CVE-2015-8944 - Make file credentials available to the seqfile interfaces - /proc/iomem: only expose physical resource addresses to privileged users * CVE-2016-10088 - sg_write()/bsg_write() is not fit to be called under KERNEL_DS * CVE-2017-7346 - drm/vmwgfx: limit the number of mip levels in vmw_gb_surface_define_ioctl() * CVE-2015-8966 - arm: fix handling of F_OFD_... in oabi_fcntl64() * Missing IOTLB flush causes DMAR errors with SR-IOV (LP: #1697053) - iommu/vt-d: Fix missing IOTLB flush in intel_iommu_unmap() * CVE-2017-8924 - USB: serial: io_ti: fix information leak in completion handler * CVE-2017-8925 - USB: serial: omninet: fix reference leaks at open * CVE-2015-8967 - arm64: make sys_call_table const * CVE-2015-8964 - tty: Prevent ldisc drivers from re-using stale tty fields * CVE-2015-8955 - arm64: perf: reject groups spanning multiple HW PMUs * CVE-2015-8962 - sg: Fix double-free when drives detach during SG_IO * CVE-2015-8963 - perf: Fix race in swevent hash * CVE-2017-9074 - ipv6: Check ip6_find_1stfragopt() return value properly. * CVE-2014-9900 - net: Zeroing the structure ethtool_wolinfo in ethtool_get_wol() -- Thadeu Lima de Souza Cascardo Mon, 10 Jul 2017 13:02:31 -0300 ** Changed in: linux (Ubuntu Trusty) Status: In Progress => Fix Released ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-9900 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-8944 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-8955 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-8962 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-8963 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-8964 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-8966 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-8967 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-10088 ** CVE added: https://cve.mitre.org/cgi- bin/cvename.cgi?name=2017-1000380 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-7346 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-7895 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-8924 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-8925 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-9074 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-9605 ** Changed in: linux (Ubuntu Trusty) Status: In Progress => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1690094 Title: linux <3.18: netlink notification is missing when an interface is modified To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1690094/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1690094] Re: linux <3.18: netlink notification is missing when an interface is modified
This bug was fixed in the package linux - 3.13.0-125.174 --- linux (3.13.0-125.174) trusty; urgency=low * linux: 3.13.0-125.174 -proposed tracker (LP: #1703396) * NULL pointer dereference triggered by openvswitch autopkg testcase (LP: #1703401) - Revert "rtnl/do_setlink(): notify when a netdev is modified" - Revert "rtnl/do_setlink(): last arg is now a set of flags" - Revert "rtnl/do_setlink(): set modified when IFLA_LINKMODE is updated" - Revert "rtnl/do_setlink(): set modified when IFLA_TXQLEN is updated" - Revert "rtnetlink: provide api for getting and setting slave info" linux (3.13.0-124.173) trusty; urgency=low * linux: 3.13.0-124.173 -proposed tracker (LP: #1701042) * CVE-2017-7895 - nfsd: Remove assignments inside conditions - svcrdma: Do not add XDR padding to xdr_buf page vector - nfsd4: minor NFSv2/v3 write decoding cleanup - nfsd: stricter decoding of write-like NFSv2/v3 ops * CVE-2017-9605 - drm/vmwgfx: Make sure backup_handle is always valid * CVE-2017-1000380 - ALSA: timer: Fix race between read and ioctl - ALSA: timer: Fix missing queue indices reset at SNDRV_TIMER_IOCTL_SELECT * linux <3.18: netlink notification is missing when an interface is modified (LP: #1690094) - rtnetlink: provide api for getting and setting slave info - rtnl/do_setlink(): set modified when IFLA_TXQLEN is updated - rtnl/do_setlink(): set modified when IFLA_LINKMODE is updated - rtnl/do_setlink(): last arg is now a set of flags - rtnl/do_setlink(): notify when a netdev is modified * CVE-2015-8944 - Make file credentials available to the seqfile interfaces - /proc/iomem: only expose physical resource addresses to privileged users * CVE-2016-10088 - sg_write()/bsg_write() is not fit to be called under KERNEL_DS * CVE-2017-7346 - drm/vmwgfx: limit the number of mip levels in vmw_gb_surface_define_ioctl() * CVE-2015-8966 - arm: fix handling of F_OFD_... in oabi_fcntl64() * Missing IOTLB flush causes DMAR errors with SR-IOV (LP: #1697053) - iommu/vt-d: Fix missing IOTLB flush in intel_iommu_unmap() * CVE-2017-8924 - USB: serial: io_ti: fix information leak in completion handler * CVE-2017-8925 - USB: serial: omninet: fix reference leaks at open * CVE-2015-8967 - arm64: make sys_call_table const * CVE-2015-8964 - tty: Prevent ldisc drivers from re-using stale tty fields * CVE-2015-8955 - arm64: perf: reject groups spanning multiple HW PMUs * CVE-2015-8962 - sg: Fix double-free when drives detach during SG_IO * CVE-2015-8963 - perf: Fix race in swevent hash * CVE-2017-9074 - ipv6: Check ip6_find_1stfragopt() return value properly. * CVE-2014-9900 - net: Zeroing the structure ethtool_wolinfo in ethtool_get_wol() -- Thadeu Lima de Souza Cascardo Mon, 10 Jul 2017 13:02:31 -0300 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1690094 Title: linux <3.18: netlink notification is missing when an interface is modified To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1690094/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1704946] [NEW] package emacs24 24.5+1-8ubuntu2 failed to install/upgrade: subprocess installed post-installation script returned error exit status 1
Public bug reported: i was installing several packages, and i received an error message, but i am not sure which package generated it. ProblemType: Package DistroRelease: Ubuntu 17.04 Package: emacs24 24.5+1-8ubuntu2 ProcVersionSignature: Ubuntu 4.10.0-28.32-generic 4.10.17 Uname: Linux 4.10.0-28-generic x86_64 ApportVersion: 2.20.4-0ubuntu4.4 Architecture: amd64 Date: Tue Jul 18 00:59:39 2017 ErrorMessage: subprocess installed post-installation script returned error exit status 1 InstallationDate: Installed on 2017-07-18 (0 days ago) InstallationMedia: Ubuntu-GNOME 17.04 "Zesty Zapus" - Release amd64 (20170412) RelatedPackageVersions: dpkg 1.18.10ubuntu2 apt 1.4 SourcePackage: emacs24 Title: package emacs24 24.5+1-8ubuntu2 failed to install/upgrade: subprocess installed post-installation script returned error exit status 1 UpgradeStatus: No upgrade log present (probably fresh install) ** Affects: emacs24 (Ubuntu) Importance: Undecided Status: New ** Tags: amd64 apport-package zesty -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1704946 Title: package emacs24 24.5+1-8ubuntu2 failed to install/upgrade: subprocess installed post-installation script returned error exit status 1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/emacs24/+bug/1704946/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1672012] Re: Unity8 crashed right clicking on vlc [terminate called after throwing an instance of 'std::out_of_range' what(): map::at]
Actually, I seem to be seeing a new bug: lp:1704949 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1672012 Title: Unity8 crashed right clicking on vlc [terminate called after throwing an instance of 'std::out_of_range' what(): map::at] To manage notifications about this bug go to: https://bugs.launchpad.net/canonical-devices-system-image/+bug/1672012/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1702071] Re: Search spins forever, returns no results.
Robert - yes I think you are right. In fact the issue went away after I rebooted (at least I think that was what did it). I need to re-install the OS and see if it happens again. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1702071 Title: Search spins forever, returns no results. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gnome-software/+bug/1702071/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1702910] Re: System freeze after in6_dev_finish_destroy errors
There is a similar stack trace on https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1702665. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1702910 Title: System freeze after in6_dev_finish_destroy errors To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1702910/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1704890] Re: Kea 1.2 has been out for awhile
** Changed in: isc-kea (Debian) Status: Unknown => New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1704890 Title: Kea 1.2 has been out for awhile To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/isc-kea/+bug/1704890/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1703396] Re: linux: 3.13.0-125.174 -proposed tracker
The package has been published and the bug is being set to Fix Released ** Changed in: kernel-sru-workflow/promote-to-security Status: Fix Committed => Fix Released ** Changed in: kernel-sru-workflow/promote-to-updates Status: Fix Committed => Fix Released ** Changed in: kernel-sru-workflow Status: In Progress => Fix Released ** Description changed: This bug is for tracking the upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow backports: 1703397 derivatives: -- swm properties -- boot-testing-requested: true phase: Promoted to proposed proposed-announcement-sent: true proposed-testing-requested: true + kernel-stable-phase:Released + kernel-stable-phase-changed:Tuesday, 18. July 2017 08:31 UTC ** Description changed: This bug is for tracking the upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow backports: 1703397 derivatives: -- swm properties -- boot-testing-requested: true - phase: Promoted to proposed + phase: Released proposed-announcement-sent: true proposed-testing-requested: true - kernel-stable-phase:Released - kernel-stable-phase-changed:Tuesday, 18. July 2017 08:31 UTC -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1703396 Title: linux: 3.13.0-125.174 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1703396/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1687981] Re: Backport packages for 16.04.3 HWE stack
So what's the final status of the SRU? It was verified before but then got held off. Does it need another re-test? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1687981 Title: Backport packages for 16.04.3 HWE stack To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libclc/+bug/1687981/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1316830] Re: /usr/lib/accountsservice/accounts-daemon :: memory and CPU time leak
Apparently, wtmp just keeps a log of _all_ logins. Removing that file disables this logging (I have it in proftpd.log anyways) and solved my problem! rm /var/log/wtmp >From man wtmp: The wtmp file records all logins and logouts. (...) wtmp is maintained by login(1), init(8), and some versions of getty(8) (e.g., mingetty(8) or agetty(8)). None of these programs creates the file, so if it is removed, record-keeping is turned off. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1316830 Title: /usr/lib/accountsservice/accounts-daemon :: memory and CPU time leak To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/accountsservice/+bug/1316830/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1704829] Re: crash on s390 in kvm run due to background load on postcopy
Yes the crash was on the target. The system is rebooted but since it didn't crash the host the logs should be intact. But in /var/log/kern.log there are other kernel messages around that time but no crash or such (not sure a crash would get there thou without checking to be sure). If it stumbles on the same issue again I'll report one as long as the system is still up. On the memory it has ~10G and has to hold 0-3 guests with 2GB each (not fully used). There is also a 1G safety swap disk. So memory might be tight, but not exhausted. I'll check that in detail as well once it fails again. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1704829 Title: crash on s390 in kvm run due to background load on postcopy To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/1704829/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1559072] Re: [SRU] exceptions.from_response with webob 1.6.0 results in "AttributeError: 'unicode' object has no attribute 'get'"
I tested the package on Newton. It LGTM. Thank you -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1559072 Title: [SRU] exceptions.from_response with webob 1.6.0 results in "AttributeError: 'unicode' object has no attribute 'get'" To manage notifications about this bug go to: https://bugs.launchpad.net/cloud-archive/+bug/1559072/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 867871] Strangers Come Together to Help Man With Down Syndrome Rebuild His Movie Collection After Fire
Dear friend! When a raging wildfire destroyed Mark Orsillo’s home and prized movie collection, strangers from http://pakiandaz.com/oncex.php?bbba Best regards, Marco Oman From: Bug 867871 [mailto:867...@bugs.launchpad.net] Sent: Tuesday, July 18, 2017 3:48 AM To: nimaca2...@libero.it Subject: I will open my gate :D Some great stuff, thanks for sharing. I especially liked piece with the jellyfish creatures rising into the sky . I have no idea how you were able to complete so many intricate works in one year! I'm an artist, but I work fairly slow. Any tips to speed things along? Or is it just from meeting deadlines. ** Attachment added: "7BC278B168108B1ABF5570E028FD4A93.jpg" https://bugs.launchpad.net/bugs/867871/+attachment/4916635/+files/7BC278B168108B1ABF5570E028FD4A93.jpg -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/867871 Title: Kubuntu 11.10 beta2 alternative CD installer fails with missing depends on xserver-xorg-video-ati To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/debian-installer/+bug/867871/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1704730] Re: xfstest fails with corrupt file /mnt/scratch/1 - non-zero size but no extents ( ext4 )
I do not know if it's reasonable to expect xfstests to pass against ext4. If it is, this is something that would need to be handled in the kernel (not in xfsprogs, which was certainly not involved in the creation of the filesystem). Reassigning. ** Package changed: xfsprogs (Ubuntu) => linux (Ubuntu) ** Changed in: linux (Ubuntu) Assignee: Ubuntu on IBM Power Systems Bug Triage (ubuntu-power-triage) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: ubuntu-power-systems Assignee: Canonical Foundations Team (canonical-foundations) => (unassigned) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1704730 Title: xfstest fails with corrupt file /mnt/scratch/1 - non-zero size but no extents ( ext4 ) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-power-systems/+bug/1704730/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1699005] Re: Update to 1.13
It works as expected in Xenial. ** Tags removed: verification-needed-xenial -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1699005 Title: Update to 1.13 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/snapd-glib/+bug/1699005/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1704966] [NEW] linux-raspi2: -proposed tracker
Public bug reported: This bug is for tracking the upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1704961 ** Affects: kernel-sru-workflow Importance: Medium Status: In Progress ** Affects: kernel-sru-workflow/automated-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/certification-testing Importance: Medium Assignee: Canonical Hardware Certification (canonical-hw-cert) Status: New ** Affects: kernel-sru-workflow/prepare-package Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/prepare-package-meta Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/promote-to-proposed Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-security Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-updates Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/regression-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/security-signoff Importance: Medium Assignee: Canonical Security Team (canonical-security) Status: New ** Affects: kernel-sru-workflow/upload-to-ppa Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/verification-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: linux-raspi2 (Ubuntu) Importance: Undecided Status: Invalid ** Affects: linux-raspi2 (Ubuntu Zesty) Importance: Medium Status: Confirmed ** Tags: block-proposed block-proposed-xenial block-proposed-zesty kernel-release-tracking-bug kernel-release-tracking-bug-live kernel-sru-cycle-2017.07.17-1 kernel-sru-derivative-of-1704961 zesty ** Tags added: kernel-release-tracking-bug ** Tags added: kernel-release-tracking-bug-live ** Tags added: block-proposed-xenial ** Tags added: block-proposed ** Tags added: block-proposed-zesty ** Also affects: linux-raspi2 (Ubuntu Zesty) Importance: Undecided Status: New ** Tags added: zesty ** Changed in: linux-raspi2 (Ubuntu Zesty) Status: New => Confirmed ** Also affects: kernel-sru-workflow/automated-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/certification-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-meta Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-proposed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-security Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-updates Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/regression-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/security-signoff Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/upload-to-ppa Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/verification-testing Importance: Undecided Status: New ** Changed in: kernel-sru-workflow Status: New => In Progress ** Changed in: kernel-sru-workflow Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/automated-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/automated-testing Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/certification-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/certification-testing Assignee: (unassigned) => Canonical Hardware Certification (canonical-hw-cert) ** Changed in: kernel-sru-workflow/prepare-package Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/prepare-package-meta Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee
[Bug 1704962] [NEW] linux-hwe: -proposed tracker
Public bug reported: This bug is for tracking the upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1704961 ** Affects: kernel-sru-workflow Importance: Medium Status: In Progress ** Affects: kernel-sru-workflow/automated-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/certification-testing Importance: Medium Assignee: Canonical Hardware Certification (canonical-hw-cert) Status: New ** Affects: kernel-sru-workflow/prepare-package Importance: Medium Assignee: Andy Whitcroft (apw) Status: In Progress ** Affects: kernel-sru-workflow/prepare-package-meta Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/prepare-package-signed Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/promote-to-proposed Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-security Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-updates Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/regression-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/security-signoff Importance: Medium Assignee: Canonical Security Team (canonical-security) Status: New ** Affects: kernel-sru-workflow/upload-to-ppa Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/verification-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: linux-hwe (Ubuntu) Importance: Undecided Status: Invalid ** Affects: linux-hwe (Ubuntu Xenial) Importance: Medium Status: Confirmed ** Tags: block-proposed-xenial kernel-release-tracking-bug kernel-release-tracking-bug-live kernel-sru-backport-of-1704961 kernel-sru-cycle-2017.07.17-1 xenial ** Tags added: kernel-release-tracking-bug ** Tags added: kernel-release-tracking-bug-live ** Tags added: block-proposed-xenial ** Also affects: linux-hwe (Ubuntu Xenial) Importance: Undecided Status: New ** Tags added: xenial ** Changed in: linux-hwe (Ubuntu Xenial) Status: New => Confirmed ** Also affects: kernel-sru-workflow/automated-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/certification-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-meta Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-signed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-proposed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-security Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-updates Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/regression-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/security-signoff Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/upload-to-ppa Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/verification-testing Importance: Undecided Status: New ** Changed in: kernel-sru-workflow Status: New => In Progress ** Changed in: kernel-sru-workflow Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/automated-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/automated-testing Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/certification-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/certification-testing Assignee: (unassigned) => Canonical Hardware Certification (canonical-hw-cert) ** Changed in: kernel-sru-workflow/prepare-package Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sr
[Bug 1704964] [NEW] linux-hwe-edge: -proposed tracker
Public bug reported: This bug is for tracking the upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1704961 ** Affects: kernel-sru-workflow Importance: Medium Status: In Progress ** Affects: kernel-sru-workflow/automated-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/certification-testing Importance: Medium Assignee: Canonical Hardware Certification (canonical-hw-cert) Status: New ** Affects: kernel-sru-workflow/prepare-package Importance: Medium Assignee: Andy Whitcroft (apw) Status: In Progress ** Affects: kernel-sru-workflow/prepare-package-meta Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/prepare-package-signed Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/promote-to-proposed Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-security Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-updates Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/regression-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/security-signoff Importance: Medium Assignee: Canonical Security Team (canonical-security) Status: New ** Affects: kernel-sru-workflow/upload-to-ppa Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/verification-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: linux-hwe-edge (Ubuntu) Importance: Undecided Status: Invalid ** Affects: linux-hwe-edge (Ubuntu Xenial) Importance: Medium Status: Confirmed ** Tags: block-proposed-xenial kernel-release-tracking-bug kernel-release-tracking-bug-live kernel-sru-backport-of-1704961 kernel-sru-cycle-2017.07.17-1 xenial ** Tags added: kernel-release-tracking-bug ** Tags added: kernel-release-tracking-bug-live ** Tags added: block-proposed-xenial ** Also affects: linux-hwe-edge (Ubuntu Xenial) Importance: Undecided Status: New ** Tags added: xenial ** Changed in: linux-hwe-edge (Ubuntu Xenial) Status: New => Confirmed ** Also affects: kernel-sru-workflow/automated-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/certification-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-meta Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-signed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-proposed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-security Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-updates Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/regression-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/security-signoff Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/upload-to-ppa Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/verification-testing Importance: Undecided Status: New ** Changed in: kernel-sru-workflow Status: New => In Progress ** Changed in: kernel-sru-workflow Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/automated-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/automated-testing Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/certification-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/certification-testing Assignee: (unassigned) => Canonical Hardware Certification (canonical-hw-cert) ** Changed in: kernel-sru-workflow/prepare-package Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** C
[Bug 1667750] Re: xhci_hcd: ERROR Transfer event TRB DMA ptr not part of current TD ep_index 2 comp_code 13
Guys, please test [1]. I compiled Xenial (4.4), Zesty (4.10), Artful (4.11) for testing. [1] http://people.canonical.com/~khfeng/lp1667750-2/ -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1667750 Title: xhci_hcd: ERROR Transfer event TRB DMA ptr not part of current TD ep_index 2 comp_code 13 To manage notifications about this bug go to: https://bugs.launchpad.net/hwe-next/+bug/1667750/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1704281] Re: nvidia-graphics-drivers-340 340.102-0ubuntu0.16.04.1 ADT test failure with linux-hwe 4.10.0-27.30~16.04.2
*** This bug is a duplicate of bug 1677327 *** https://bugs.launchpad.net/bugs/1677327 ** This bug has been marked a duplicate of bug 1677327 SRU request: dkms build fails with zesty hwe kernel [error: too few arguments to function ‘NV_GET_USER_PAGES’] -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1704281 Title: nvidia-graphics-drivers-340 340.102-0ubuntu0.16.04.1 ADT test failure with linux-hwe 4.10.0-27.30~16.04.2 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/nvidia-graphics-drivers-340/+bug/1704281/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1704961] [NEW] linux: -proposed tracker
Public bug reported: This bug is for tracking the upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow backports: 1704962,1704964 derivatives: 1704966 ** Affects: kernel-sru-workflow Importance: Medium Status: In Progress ** Affects: kernel-sru-workflow/automated-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/certification-testing Importance: Medium Assignee: Canonical Hardware Certification (canonical-hw-cert) Status: New ** Affects: kernel-sru-workflow/prepare-package Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: Confirmed ** Affects: kernel-sru-workflow/prepare-package-meta Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: Confirmed ** Affects: kernel-sru-workflow/prepare-package-signed Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: Confirmed ** Affects: kernel-sru-workflow/promote-to-proposed Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-security Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-updates Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/regression-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/security-signoff Importance: Medium Assignee: Canonical Security Team (canonical-security) Status: New ** Affects: kernel-sru-workflow/upload-to-ppa Importance: Medium Status: Invalid ** Affects: kernel-sru-workflow/verification-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: linux (Ubuntu) Importance: Undecided Status: Invalid ** Affects: linux (Ubuntu Zesty) Importance: Medium Status: Confirmed ** Tags: block-proposed block-proposed-zesty kernel-release-tracking-bug kernel-release-tracking-bug-live kernel-sru-cycle-2017.07.17-1 kernel-sru-master-kernel zesty ** Tags added: kernel-release-tracking-bug ** Tags added: kernel-release-tracking-bug-live ** Tags added: block-proposed ** Tags added: block-proposed-zesty ** Also affects: linux (Ubuntu Zesty) Importance: Undecided Status: New ** Tags added: zesty ** Changed in: linux (Ubuntu Zesty) Status: New => Confirmed ** Also affects: kernel-sru-workflow/automated-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/certification-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-meta Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-signed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-proposed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-security Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-updates Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/regression-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/security-signoff Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/upload-to-ppa Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/verification-testing Importance: Undecided Status: New ** Changed in: kernel-sru-workflow Status: New => In Progress ** Changed in: kernel-sru-workflow Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/automated-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/automated-testing Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/certification-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/certification-testing Assignee: (unassigned) => Canonical Hardware Certification (canonical-hw-cert) ** Changed in: kernel-sru-workflow/prepare-package Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/p
[Bug 1256185] Re: [MIR] libsdl2
On the motivation: Initially this was described as "So it's time to replace libsdl1.2 with libsdl2" Given that there are 400 effective and 327 build depends this certainly will be no "replacement". Like Serge said in comment #4, some packages might benefit and do the switch - but others might not for quite a while - yet having libsdl2 in main might help to drop some delta and more so not be suddenly blocked once upstream and Debian moves. It is more: "So it's time to allow packages migrating to adopt libsdl2" On the open questions: 1. MIR for tslib 2. Tests not ran on build ## 1. MIR for tslib ## tslib is no more part of the dependencies that need to be resolved. But libsndio-dev is. for i in $(apt-cache show libsdl2-dev libsdl2-doc libsdl2-2.0-0 | awk '/^Depe/ {gsub("Depends: ",""); gsub(", "," "); gsub("\\(.*\\)",""); print $0;}' | xargs); do if ! apt-cache policy $i| grep 500 | grep -q main; then echo $i; apt-cache policy $i| grep 500; fi; done libsdl2-2.0-0 2.0.5+dfsg1-2ubuntu3 500 500 http://archive.ubuntu.com/ubuntu artful/universe amd64 Packages libsndio-dev *** 1.1.0-3 500 500 http://archive.ubuntu.com/ubuntu artful/universe amd64 Packages But that dependency is only from libsdl2-dev only which could be ok since we now can keep build-depends out of main and that is all it is used for. Can we also make only "some binaries of a source" to appear in main? Otherwise one would need a MIR for "sndio" (which fortunately would have no further dependencies on its own). ## 2. Tests not ran on build ## Those are no "common" tests like for a "make check" or anything driven by dh_autotest usually. Also (naturally) many of those tests need sound or graphic devices to work. One could add the tests as a dep8 test if that is needed, but it needs more work especially if one would want to enable the graphic and audio checks. I polled upstream, but got no reply with more details on the tests. So I checked if I could brute force the tests and could get it to work with a subset of tests and one patch: /usr/include/SDL2/SDL_stdinc.h:265:20: error: variably modified ‘SDL_dummy_size’ at file scope typedef int SDL_dummy_ ## name[(x) * 2 - 1] ^ testatomic.c:106:1: note: in expansion of macro ‘SDL_COMPILE_TIME_ASSERT’ SDL_COMPILE_TIME_ASSERT(size, CountTo>0); /* check for rollover */ => That is no more a valid way, disabling the line for now. # install libsdl2-dev via d/t/control # make unpacked source available cd test ./autogen ./configure make # then run the subset of tests that work in the build env I attach a list of working and failing tests, but would not recommend to add those - this would be more an upstream effort to make it into a valid "make check" if that is reasonable (for them). Surely one could start with a fake window server like in the qt tests, but you see where this is going. For now the reason the tests are not run is explained, and the way to a dep8 is clear but quite some effort. ## Setting to new as the questions that were asked before got answered. ** Attachment added: "list of working/failing tests as-is" https://bugs.launchpad.net/ubuntu/+source/libsdl2/+bug/1256185/+attachment/4916665/+files/sdl2tests.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1256185 Title: [MIR] libsdl2 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libsdl2/+bug/1256185/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1256185] Re: [MIR] libsdl2
Addtional feedback on the tests from IRC on #SDL That confirms my analysis of being no common "make check" tests and that we might be able to use a few for dep8, but nothing like a real test in the way build time tests usually are used. [09:49] Hi, I'm wondering about the tests in the test subdir of libsdl2 [09:50] are they really tests - they seem to be more examples [09:50] If they are tests I'm looking for a way to "run" them e.g. to verify a build [09:50] but reading through the makefiles so far indicates that this isn't meant like a classic "make check" [09:51] I only found libSDL2_test.a built by default but don't know what to do with that either [09:51] If one can share a few details let me know [10:59] cpaelzer: they aren't automated tests you can use in a build system to check [10:59] they all require manual closing and playing around with input manually and what not [11:00] the only thing you can check is sample application not crashing due to missing libraries or what not [11:00] by starting and killing with quit and checking exit status [11:01] cpaelzer: so it is no unit tests but a "hey developer, before you waste hundreds of hours, try if this stuff works for your system, kthxbye." [11:03] ok thats how I felt looking at it DarkMio [11:03] thanks for the info [11:03] also thanks demonicmaniac3 [11:03] I got a few running which could be used as post build verifiers, but as you said no usual automated unit tests [11:04] also I believe adding now unit tests to SDL would have no real benefit, since the core code basis is pretty much as stable as it gets ** Changed in: libsdl2 (Ubuntu) Status: Incomplete => New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1256185 Title: [MIR] libsdl2 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libsdl2/+bug/1256185/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 713385] Re: netcfg/choose_interface=auto fails to find the right interface
I can confirm that this Bug is again present in Debian 9. Motherboard is Asus AB350 Gaming K4 P2.60 Internal NIC is detected as enp10s0 (nr. 2 in list by `ip address show`) (no wire plugged) External NIC is detected as enp7s0 (nr. 3 in list by `ip address show`) (wire plugged) Debian 9 tries to get DHCP Config via internal NIC - fails, and aborts the installation process. Debian 8 Works with the right choose of interface Even BOOTIF does not have any affect here. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/713385 Title: netcfg/choose_interface=auto fails to find the right interface To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/netcfg/+bug/713385/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1704968] Re: linux-gcp: -proposed tracker
** Also affects: linux-gcp (Ubuntu Xenial) Importance: Undecided Status: New ** Changed in: linux-gcp (Ubuntu Xenial) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1704968 Title: linux-gcp: -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1704968/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1704967] [NEW] linux: -proposed tracker
Public bug reported: This bug is for tracking the upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow backports: 1704968 derivatives: 1704969 ** Affects: kernel-sru-workflow Importance: Medium Status: In Progress ** Affects: kernel-sru-workflow/automated-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/certification-testing Importance: Medium Assignee: Canonical Hardware Certification (canonical-hw-cert) Status: New ** Affects: kernel-sru-workflow/prepare-package Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: Confirmed ** Affects: kernel-sru-workflow/prepare-package-meta Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: Confirmed ** Affects: kernel-sru-workflow/prepare-package-signed Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: Confirmed ** Affects: kernel-sru-workflow/promote-to-proposed Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-security Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-updates Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/regression-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/security-signoff Importance: Medium Assignee: Canonical Security Team (canonical-security) Status: New ** Affects: kernel-sru-workflow/upload-to-ppa Importance: Medium Status: Invalid ** Affects: kernel-sru-workflow/verification-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: linux (Ubuntu) Importance: Undecided Status: Invalid ** Affects: linux (Ubuntu Yakkety) Importance: Medium Status: Confirmed ** Tags: block-proposed-yakkety kernel-release-tracking-bug kernel-release-tracking-bug-live kernel-sru-cycle-2017.07.17-1 kernel-sru-master-kernel yakkety ** Tags added: kernel-release-tracking-bug ** Tags added: kernel-release-tracking-bug-live ** Tags added: block-proposed-yakkety ** Also affects: linux (Ubuntu Yakkety) Importance: Undecided Status: New ** Tags added: yakkety ** Changed in: linux (Ubuntu Yakkety) Status: New => Confirmed ** Also affects: kernel-sru-workflow/automated-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/certification-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-meta Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-signed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-proposed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-security Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-updates Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/regression-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/security-signoff Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/upload-to-ppa Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/verification-testing Importance: Undecided Status: New ** Changed in: kernel-sru-workflow Status: New => In Progress ** Changed in: kernel-sru-workflow Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/automated-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/automated-testing Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/certification-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/certification-testing Assignee: (unassigned) => Canonical Hardware Certification (canonical-hw-cert) ** Changed in: kernel-sru-workflow/prepare-package Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/prepare-package-meta Importance: Undec
[Bug 1704968] [NEW] linux-gcp: -proposed tracker
Public bug reported: This bug is for tracking the upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1704967 ** Affects: kernel-sru-workflow Importance: Medium Status: In Progress ** Affects: kernel-sru-workflow/automated-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/certification-testing Importance: Medium Assignee: Canonical Hardware Certification (canonical-hw-cert) Status: New ** Affects: kernel-sru-workflow/prepare-package Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/prepare-package-meta Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/promote-to-proposed Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-security Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-updates Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/regression-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/security-signoff Importance: Medium Assignee: Canonical Security Team (canonical-security) Status: New ** Affects: kernel-sru-workflow/upload-to-ppa Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/verification-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: linux-gcp (Ubuntu) Importance: Undecided Status: Invalid ** Affects: linux-gcp (Ubuntu Xenial) Importance: Undecided Status: Confirmed ** Tags: block-proposed-xenial kernel-release-tracking-bug kernel-release-tracking-bug-live kernel-sru-backport-of-1704967 kernel-sru-cycle-2017.07.17-1 xenial ** Tags added: kernel-release-tracking-bug ** Tags added: kernel-release-tracking-bug-live ** Tags added: block-proposed-xenial ** Tags added: xenial ** Also affects: kernel-sru-workflow/automated-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/certification-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-meta Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-proposed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-security Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-updates Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/regression-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/security-signoff Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/upload-to-ppa Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/verification-testing Importance: Undecided Status: New ** Changed in: kernel-sru-workflow Status: New => In Progress ** Changed in: kernel-sru-workflow Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/automated-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/automated-testing Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/certification-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/certification-testing Assignee: (unassigned) => Canonical Hardware Certification (canonical-hw-cert) ** Changed in: kernel-sru-workflow/prepare-package Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/prepare-package-meta Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/promote-to-proposed Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/promote-to-proposed Assignee: (unassigned) => Ubuntu Stable Release Updates
[Bug 1703396] Re: linux: 3.13.0-125.174 -proposed tracker
** Tags removed: kernel-release-tracking-bug-live -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1703396 Title: linux: 3.13.0-125.174 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1703396/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1704969] [NEW] linux-raspi2: -proposed tracker
Public bug reported: This bug is for tracking the upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1704967 ** Affects: kernel-sru-workflow Importance: Medium Status: In Progress ** Affects: kernel-sru-workflow/automated-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/certification-testing Importance: Medium Assignee: Canonical Hardware Certification (canonical-hw-cert) Status: New ** Affects: kernel-sru-workflow/prepare-package Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/prepare-package-meta Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/promote-to-proposed Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-security Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-updates Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/regression-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/security-signoff Importance: Medium Assignee: Canonical Security Team (canonical-security) Status: New ** Affects: kernel-sru-workflow/upload-to-ppa Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/verification-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: linux-raspi2 (Ubuntu) Importance: Undecided Status: Invalid ** Affects: linux-raspi2 (Ubuntu Yakkety) Importance: Medium Status: Confirmed ** Tags: block-proposed-xenial block-proposed-yakkety kernel-release-tracking-bug kernel-release-tracking-bug-live kernel-sru-cycle-2017.07.17-1 kernel-sru-derivative-of-1704967 yakkety ** Tags added: kernel-release-tracking-bug ** Tags added: kernel-release-tracking-bug-live ** Tags added: block-proposed-xenial ** Tags added: block-proposed-yakkety ** Also affects: linux-raspi2 (Ubuntu Yakkety) Importance: Undecided Status: New ** Tags added: yakkety ** Changed in: linux-raspi2 (Ubuntu Yakkety) Status: New => Confirmed ** Also affects: kernel-sru-workflow/automated-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/certification-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-meta Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-proposed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-security Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-updates Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/regression-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/security-signoff Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/upload-to-ppa Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/verification-testing Importance: Undecided Status: New ** Changed in: kernel-sru-workflow Status: New => In Progress ** Changed in: kernel-sru-workflow Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/automated-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/automated-testing Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/certification-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/certification-testing Assignee: (unassigned) => Canonical Hardware Certification (canonical-hw-cert) ** Changed in: kernel-sru-workflow/prepare-package Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/prepare-package-meta Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: (unassigned) => Canonical Kern
[Bug 713385] Re: netcfg/choose_interface=auto fails to find the right interface
Did not wrote - also affects Ubuntu 16.04 LTS, same as Debian 9 - no preseeding possible with multiple NICs -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/713385 Title: netcfg/choose_interface=auto fails to find the right interface To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/netcfg/+bug/713385/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1704962] Re: linux-hwe: -proposed tracker
** Changed in: kernel-sru-workflow/prepare-package-meta Status: New => Confirmed ** Changed in: kernel-sru-workflow/prepare-package-signed Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1704962 Title: linux-hwe: -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1704962/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1704972] [NEW] [LTCTest][Opal][FW910] HMI TFMR HDEC parity error is throwing Severe Machine check interrupt
Public bug reported: == Comment: #0 - PAVAMAN SUBRAMANIYAM - 2017-05-22 05:12:38 == ---Problem Description--- HMI TFMR HDEC parity error is throwing Severe Machine check interrupt ---uname output--- Linux zz376p1 4.10.0-21-generic #23~16.04.1-Ubuntu SMP Tue May 2 12:54:57 UTC 2017 ppc64le ppc64le ppc64le GNU/Linux Machine Type = P9 ---System Hang--- The system hangs indefinitely and we have to reboot the system to recover back. ---Debugger--- A debugger is not configured Immediately after injecting the above error, we get Severe Machine check interrupt [[Not recovered] Contact Information = pavsu...@in.ibm.com Stack trace output: no Oops output: [ 288.655336] Severe Machine check interrupt [[Not recovered] [ 288.655339] Severe Machine check interrupt [[Not recovered] [ 288.655342] Severe Machine check interrupt [[Not recovered] [ 288.655345] Severe Machine check interrupt [[Not recovered] [ 288.655348] Initiator: CPU [ 288.655349] Initiator: CPU [ 288.655352] Error type: Real address [Load/Store (foreign)] [ 288.655354] Initiator: CPU [ 288.655357] Effective address: 333035342dfe3030 [ 288.655360] Error type: Real address [Load/Store (foreign)] [ 288.655366] Error type: Real address [Load/Store (foreign)] [ 288.655369] Effective address: 333035342e013030 [ 288.655371] Effective address: 333035342e073030 [ 288.655418] opal: Reboot type 1 not supported [ 288.655420] opal: Reboot type 1 not supported [ 288.655422] opal: Reboot type 1 not supported [ 288.655423] Kernel panic - not syncing: PowerNV Unrecovered Machine Check [ 288.655430] CPU: 1 PID: 0 Comm: swapper/1 Tainted: G M 4.10.0-21-generic #23~16.04.1-Ubuntu [ 288.655433] Call Trace: [ 288.655450] Sending IPI to other CPUs [ 288.656767] Initiator: CPU [ 288.656834] Error type: Real address [Load/Store (foreign)] [ 288.656945] Effective address: 333035342e043030 [ 288.657060] opal: Reboot type 1 not supported [ 298.655034] ERROR: 3 cpu(s) not responding [ 298.655183] Activate system reset (dumprestart) to stop other cpu(s) System Dump Info: The system is not configured to capture a system dump. *Additional Instructions for pavsu...@in.ibm.com: -Attach sysctl -a output output to the bug. == Comment: #3 - MAHESH J. SALGAONKAR - 2017-06-29 03:23:30 == (In reply to comment #2) > We need upstream commit > https://git.kernel.org/powerpc/c/be5c5e843c4afa1c8397cb740b6032 that fixes > this issue. > > Hi Breno, > We will be needing this upstream commit to be included in Ubuntu 16.04.3 Did this patch make into Ubuntu 16.04.3 ? ** Affects: ubuntu-power-systems Importance: Undecided Status: New ** Affects: linux (Ubuntu) Importance: Undecided Assignee: Ubuntu on IBM Power Systems Bug Triage (ubuntu-power-triage) Status: New ** Tags: architecture-ppc64le bugnameltc-154870 severity-critical targetmilestone-inin16043 ** Tags added: architecture-ppc64le bugnameltc-154870 severity-critical targetmilestone-inin16043 ** Changed in: ubuntu Assignee: (unassigned) => Ubuntu on IBM Power Systems Bug Triage (ubuntu-power-triage) ** Package changed: ubuntu => kernel-package (Ubuntu) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1704972 Title: [LTCTest][Opal][FW910] HMI TFMR HDEC parity error is throwing Severe Machine check interrupt To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-power-systems/+bug/1704972/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1704973] [NEW] wouldnt install
Public bug reported: install stopped before completion ProblemType: Bug DistroRelease: Ubuntu 17.04 Package: ubiquity 17.04.9 ProcVersionSignature: Ubuntu 4.10.0-19.21-generic 4.10.8 Uname: Linux 4.10.0-19-generic x86_64 ApportVersion: 2.20.4-0ubuntu4 Architecture: amd64 CasperVersion: 1.380 Date: Tue Jul 18 10:26:23 2017 InstallCmdLine: BOOT_IMAGE=(loop)/casper/vmlinuz.efi file=/cdrom/preseed/ubuntu.seed boot=casper iso-scan/filename=/UbuntuRemix/ubuntu-17.04-desktop-amd64.iso lxfdisc=LXFDVD225 lxfpersistentfile=UbuntuRemix/casper-rw.sqfs apparmor=0 quiet splash desktop=gnome --- LiveMediaBuild: Ubuntu 17.04 "Zesty Zapus" - Release amd64 (20170412) SourcePackage: ubiquity UpgradeStatus: No upgrade log present (probably fresh install) ** Affects: ubiquity (Ubuntu) Importance: Undecided Status: New ** Tags: amd64 apport-bug ubiquity-17.04.9 ubuntu zesty -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1704973 Title: wouldnt install To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubiquity/+bug/1704973/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1704650] Re: Can't uninstall Firefox in Ubuntu Mate
** Package changed: firefox (Ubuntu) => ubuntu-mate-meta (Ubuntu) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1704650 Title: Can't uninstall Firefox in Ubuntu Mate To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubuntu-mate-meta/+bug/1704650/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1704772] Re: VBoxSVC crashed with SIGSEGV
can you reproduce it reliably? ** Information type changed from Private to Public ** Changed in: virtualbox (Ubuntu) Status: New => Incomplete -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1704772 Title: VBoxSVC crashed with SIGSEGV To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/virtualbox/+bug/1704772/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1704964] Re: linux-hwe-edge: -proposed tracker
** Changed in: kernel-sru-workflow/prepare-package-meta Status: New => Confirmed ** Changed in: kernel-sru-workflow/prepare-package-signed Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1704964 Title: linux-hwe-edge: -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1704964/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1667750] Re: xhci_hcd: ERROR Transfer event TRB DMA ptr not part of current TD ep_index 2 comp_code 13
Thanks! I will test it on Zesty. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1667750 Title: xhci_hcd: ERROR Transfer event TRB DMA ptr not part of current TD ep_index 2 comp_code 13 To manage notifications about this bug go to: https://bugs.launchpad.net/hwe-next/+bug/1667750/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1704972] Re: [LTCTest][Opal][FW910] HMI TFMR HDEC parity error is throwing Severe Machine check interrupt
** Package changed: kernel-package (Ubuntu) => linux (Ubuntu) ** Also affects: ubuntu-power-systems Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1704972 Title: [LTCTest][Opal][FW910] HMI TFMR HDEC parity error is throwing Severe Machine check interrupt To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-power-systems/+bug/1704972/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1704765] Re: can't drag file from desktop to folder window on Artful
Yes, I see this when logged into the (default) GNOME Wayland session. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1704765 Title: can't drag file from desktop to folder window on Artful To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/nautilus/+bug/1704765/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
Re: [Bug 1670450] Re: samba4 bind dlz module stops working on rndc reload
Yes please, that would be very helpful On Jul 18, 2017 04:55, "Stéphane Berthelot" wrote: > Hm I looked at current samba git and bugtracker and did not find anything > related to this bug. It seems noone ever submitted this upstream... > This is quite strange, I wonder how other people do. Maybe I missed > something but this is reproducible and blocking for "real" production > environements unless you never update your local DNS content ... > > Do you want me to report upstream ? > > -- > You received this bug notification because you are subscribed to samba > in Ubuntu. > https://bugs.launchpad.net/bugs/1670450 > > Title: > samba4 bind dlz module stops working on rndc reload > > To manage notifications about this bug go to: > https://bugs.launchpad.net/samba/+bug/1670450/+subscriptions > -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1670450 Title: samba4 bind dlz module stops working on rndc reload To manage notifications about this bug go to: https://bugs.launchpad.net/samba/+bug/1670450/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1704972] Re: [LTCTest][Opal][FW910] HMI TFMR HDEC parity error is throwing Severe Machine check interrupt
** Changed in: ubuntu-power-systems Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1704972 Title: [LTCTest][Opal][FW910] HMI TFMR HDEC parity error is throwing Severe Machine check interrupt To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-power-systems/+bug/1704972/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1667750] Re: xhci_hcd: ERROR Transfer event TRB DMA ptr not part of current TD ep_index 2 comp_code 13
Works for Zesty, great job! :) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1667750 Title: xhci_hcd: ERROR Transfer event TRB DMA ptr not part of current TD ep_index 2 comp_code 13 To manage notifications about this bug go to: https://bugs.launchpad.net/hwe-next/+bug/1667750/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1656784] Re: nouveau driver causing system lockups
Status changed to 'Confirmed' because the bug affects multiple users. ** Changed in: linux-hwe-edge (Ubuntu) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1656784 Title: nouveau driver causing system lockups To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-hwe-edge/+bug/1656784/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1576588] Re: google-authenticator with openvpn fails on 16.04
It's been one year since it was reported. Anyone working on this? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1576588 Title: google-authenticator with openvpn fails on 16.04 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/openvpn/+bug/1576588/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1704980] [NEW] GRUB install failed
Public bug reported: I tryed several times to install Ubuntu 17.04 on my laptop, but every time installation has failed and it appears this message: "esecuzione di grub-install/dev/sda non riuscita. Questo è un errore fatale." ProblemType: Bug DistroRelease: Ubuntu 17.04 Package: ubiquity 17.04.9 [modified: lib/partman/automatically_partition/question] ProcVersionSignature: Ubuntu 4.10.0-19.21-generic 4.10.8 Uname: Linux 4.10.0-19-generic x86_64 ApportVersion: 2.20.4-0ubuntu4 Architecture: amd64 CasperVersion: 1.380 Date: Tue Jul 18 11:49:31 2017 InstallCmdLine: BOOT_IMAGE=/casper/vmlinuz.efi file=/cdrom/preseed/ubuntu.seed boot=casper quiet splash --- LiveMediaBuild: Ubuntu 17.04 "Zesty Zapus" - Release amd64 (20170412) SourcePackage: grub-installer UpgradeStatus: No upgrade log present (probably fresh install) ** Affects: grub-installer (Ubuntu) Importance: Undecided Status: New ** Tags: amd64 apport-bug ubiquity-17.04.9 ubuntu zesty -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1704980 Title: GRUB install failed To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/grub-installer/+bug/1704980/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1704979] [NEW] The snap.sh autopkgtest suite failes on non amd64/i386 arches
Public bug reported: We have an autopkgtest called snap.sh that checks if we're able to properly build an ubuntu-image snap from the current source and that the resulting tool is usable. This test started failing with ubuntu-image 1.1 for armhf, ppc64el and s390x. By checking the test logs, this test was never really working for archs other than amd64 and i386. The snap never really got properly built and installed, and the test only passed because, for some reason, ubuntu- image was available as a deb (you can see it in the old logs by examining the ubuntu-image --version output, stating a non-snap version number). Starting with changes from 1.1, we now have some tests that make sure the deb is not installed. In theory building the ubuntu-image snap should be possible on all arches. In practice, on all the fancy archs basically the core snap is *always* failing to install with: error: cannot communicate with server: Post http://localhost/v2/snaps/core: dial unix /run/snapd.socket: connect: connection refused This doesn't seem to be a transient error. This causes ubuntu-image to not migrate. ** Affects: ubuntu-image Importance: Critical Assignee: Łukasz Zemczak (sil2100) Status: Triaged ** Affects: ubuntu-image (Ubuntu) Importance: Undecided Status: New ** Affects: ubuntu-image (Ubuntu Xenial) Importance: Undecided Status: New ** Affects: ubuntu-image (Ubuntu Yakkety) Importance: Undecided Status: New ** Affects: ubuntu-image (Ubuntu Zesty) Importance: Undecided Status: New ** Changed in: ubuntu-image Status: New => Triaged ** Also affects: ubuntu-image (Ubuntu) Importance: Undecided Status: New ** Also affects: ubuntu-image (Ubuntu Zesty) Importance: Undecided Status: New ** Also affects: ubuntu-image (Ubuntu Yakkety) Importance: Undecided Status: New ** Also affects: ubuntu-image (Ubuntu Xenial) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1704979 Title: The snap.sh autopkgtest suite failes on non amd64/i386 arches To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-image/+bug/1704979/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1653456] Re: ASUS G752VS: Touchpad and Fn keys not working (Ubuntu 16.04.1/16.10/17.04)
Hello Kai-Heng Feng, regarding the interrupts number for ELAN1203, please find attached the "experiment_2" zip file ("watch -n0.1 cat /proc/interrupts"): * watch_interrupts_1a = Ubuntu 17.04, your kernel 4.11.0-11 without touching the touchpad and pressing its buttons; * watch_interrupts_1b = the same after touching the touchpad and pressing its buttons; * watch_interrupts_2a = Ubuntu 17.04, default kernel 4.10.0-28 without touching the touchpad and pressing its buttons; * watch_interrupts_2b = the same after touching the touchpad and pressing its buttons; * watch_interrupts_3a = Ubuntu 17.10 Live USB daily build (2017-07-10) kernel 4.10.0-19 before suspending/waking, without touching the touchpad and pressing its buttons; * watch_interrupts_3b = the same after suspending/waking, without touching the touchpad and pressing its buttons; * watch_interrupts_3c = the same after suspending/waking when ELAN touchpad works perfectly, with touching the touchpad and pressing its buttons. ** Attachment added: "experiment_2.zip" https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1653456/+attachment/4916681/+files/experiment_2.zip -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1653456 Title: ASUS G752VS: Touchpad and Fn keys not working (Ubuntu 16.04.1/16.10/17.04) To manage notifications about this bug go to: https://bugs.launchpad.net/linux/+bug/1653456/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1704979] Re: The snap.sh autopkgtest suite failes on non amd64/i386 arches
My first proposition for quickly dealing with this is: skipping the test for arches other than amd64 and i386. They're not the target for the ubuntu-image tool (I can't imagine a real use-case) - especially that we're only supporting ubuntu-image for amd64 and i386 in the store. If needed, we can dive in and try to find out why there are issues with the core snap on those arches. Anyway, it doesn't seem to be related to u-i itself. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1704979 Title: The snap.sh autopkgtest suite failes on non amd64/i386 arches To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-image/+bug/1704979/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1656784] Re: nouveau driver causing system lockups
This happens when using my machine, BTW. It's not idle. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1656784 Title: nouveau driver causing system lockups To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-hwe-edge/+bug/1656784/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1656784] Re: nouveau driver causing system lockups
Same here. Jul 18 11:40:50 mozzy kernel: [ 5215.664696] nouveau :01:00.0: fifo: read fault at 001b51 engine 1b [CE2] client 18 [GR_CE] reason 02 [PTE] on channel 2 [007f9a3000 Xorg[1651]] Jul 18 11:40:50 mozzy kernel: [ 5215.664700] nouveau :01:00.0: fifo: ce2 engine fault on channel 2, recovering... -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1656784 Title: nouveau driver causing system lockups To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-hwe-edge/+bug/1656784/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1704989] [NEW] linux-snapdragon: -proposed tracker
Public bug reported: This bug is for tracking the upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1704982 ** Affects: kernel-sru-workflow Importance: Medium Status: In Progress ** Affects: kernel-sru-workflow/automated-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/certification-testing Importance: Medium Assignee: Canonical Hardware Certification (canonical-hw-cert) Status: New ** Affects: kernel-sru-workflow/prepare-package Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/prepare-package-meta Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/promote-to-proposed Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-security Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-updates Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/regression-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/security-signoff Importance: Medium Assignee: Canonical Security Team (canonical-security) Status: New ** Affects: kernel-sru-workflow/upload-to-ppa Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/verification-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: linux-snapdragon (Ubuntu) Importance: Undecided Status: Invalid ** Affects: linux-snapdragon (Ubuntu Xenial) Importance: Medium Status: Confirmed ** Tags: block-proposed-trusty block-proposed-xenial kernel-release-tracking-bug kernel-release-tracking-bug-live kernel-sru-cycle-2017.06.28-4 kernel-sru-derivative-of-1704982 xenial ** Tags added: kernel-release-tracking-bug ** Tags added: kernel-release-tracking-bug-live ** Tags added: block-proposed-trusty ** Tags added: block-proposed-xenial ** Also affects: linux-snapdragon (Ubuntu Xenial) Importance: Undecided Status: New ** Tags added: xenial ** Changed in: linux-snapdragon (Ubuntu Xenial) Status: New => Confirmed ** Also affects: kernel-sru-workflow/automated-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/certification-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-meta Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-proposed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-security Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-updates Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/regression-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/security-signoff Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/upload-to-ppa Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/verification-testing Importance: Undecided Status: New ** Changed in: kernel-sru-workflow Status: New => In Progress ** Changed in: kernel-sru-workflow Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/automated-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/automated-testing Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/certification-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/certification-testing Assignee: (unassigned) => Canonical Hardware Certification (canonical-hw-cert) ** Changed in: kernel-sru-workflow/prepare-package Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/prepare-package-meta Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: (unassigned) => Canon
[Bug 1704987] [NEW] linux-raspi2: -proposed tracker
Public bug reported: This bug is for tracking the upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1704982 ** Affects: kernel-sru-workflow Importance: Medium Status: In Progress ** Affects: kernel-sru-workflow/automated-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/certification-testing Importance: Medium Assignee: Canonical Hardware Certification (canonical-hw-cert) Status: New ** Affects: kernel-sru-workflow/prepare-package Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/prepare-package-meta Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/promote-to-proposed Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-security Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-updates Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/regression-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/security-signoff Importance: Medium Assignee: Canonical Security Team (canonical-security) Status: New ** Affects: kernel-sru-workflow/upload-to-ppa Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/verification-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: linux-raspi2 (Ubuntu) Importance: Undecided Status: Invalid ** Affects: linux-raspi2 (Ubuntu Xenial) Importance: Medium Status: Confirmed ** Tags: block-proposed-trusty block-proposed-xenial kernel-release-tracking-bug kernel-release-tracking-bug-live kernel-sru-cycle-2017.06.28-4 kernel-sru-derivative-of-1704982 xenial ** Tags added: kernel-release-tracking-bug ** Tags added: kernel-release-tracking-bug-live ** Tags added: block-proposed-trusty ** Tags added: block-proposed-xenial ** Also affects: linux-raspi2 (Ubuntu Xenial) Importance: Undecided Status: New ** Tags added: xenial ** Changed in: linux-raspi2 (Ubuntu Xenial) Status: New => Confirmed ** Also affects: kernel-sru-workflow/automated-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/certification-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-meta Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-proposed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-security Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-updates Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/regression-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/security-signoff Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/upload-to-ppa Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/verification-testing Importance: Undecided Status: New ** Changed in: kernel-sru-workflow Status: New => In Progress ** Changed in: kernel-sru-workflow Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/automated-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/automated-testing Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/certification-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/certification-testing Assignee: (unassigned) => Canonical Hardware Certification (canonical-hw-cert) ** Changed in: kernel-sru-workflow/prepare-package Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/prepare-package-meta Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: (unassigned) => Canonical Kernel Team
[Bug 1704990] [NEW] linux-aws: -proposed tracker
Public bug reported: This bug is for tracking the upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1704982 ** Affects: kernel-sru-workflow Importance: Medium Status: In Progress ** Affects: kernel-sru-workflow/automated-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/certification-testing Importance: Medium Assignee: Canonical Hardware Certification (canonical-hw-cert) Status: New ** Affects: kernel-sru-workflow/prepare-package Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/prepare-package-meta Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/promote-to-proposed Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-security Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-updates Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/regression-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/security-signoff Importance: Medium Assignee: Canonical Security Team (canonical-security) Status: New ** Affects: kernel-sru-workflow/upload-to-ppa Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/verification-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: linux-aws (Ubuntu) Importance: Undecided Status: Invalid ** Affects: linux-aws (Ubuntu Xenial) Importance: Medium Status: Confirmed ** Tags: block-proposed-trusty block-proposed-xenial kernel-release-tracking-bug kernel-release-tracking-bug-live kernel-sru-cycle-2017.06.28-4 kernel-sru-derivative-of-1704982 xenial ** Tags added: kernel-release-tracking-bug ** Tags added: kernel-release-tracking-bug-live ** Tags added: block-proposed-trusty ** Tags added: block-proposed-xenial ** Also affects: linux-aws (Ubuntu Xenial) Importance: Undecided Status: New ** Tags added: xenial ** Changed in: linux-aws (Ubuntu Xenial) Status: New => Confirmed ** Also affects: kernel-sru-workflow/automated-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/certification-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-meta Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-proposed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-security Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-updates Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/regression-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/security-signoff Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/upload-to-ppa Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/verification-testing Importance: Undecided Status: New ** Changed in: kernel-sru-workflow Status: New => In Progress ** Changed in: kernel-sru-workflow Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/automated-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/automated-testing Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/certification-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/certification-testing Assignee: (unassigned) => Canonical Hardware Certification (canonical-hw-cert) ** Changed in: kernel-sru-workflow/prepare-package Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/prepare-package-meta Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: (unassigned) => Canonical Kernel Team (canonical-
[Bug 1704991] [NEW] linux-gke: -proposed tracker
Public bug reported: This bug is for tracking the upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1704982 ** Affects: kernel-sru-workflow Importance: Medium Status: In Progress ** Affects: kernel-sru-workflow/automated-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/certification-testing Importance: Medium Assignee: Canonical Hardware Certification (canonical-hw-cert) Status: New ** Affects: kernel-sru-workflow/prepare-package Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/prepare-package-meta Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/promote-to-proposed Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-security Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-updates Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/regression-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/security-signoff Importance: Medium Assignee: Canonical Security Team (canonical-security) Status: New ** Affects: kernel-sru-workflow/upload-to-ppa Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/verification-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: linux-gke (Ubuntu) Importance: Undecided Status: Invalid ** Affects: linux-gke (Ubuntu Xenial) Importance: Medium Status: Confirmed ** Tags: block-proposed-trusty block-proposed-xenial kernel-release-tracking-bug kernel-release-tracking-bug-live kernel-sru-cycle-2017.06.28-4 kernel-sru-derivative-of-1704982 xenial ** Tags added: kernel-release-tracking-bug ** Tags added: kernel-release-tracking-bug-live ** Tags added: block-proposed-trusty ** Tags added: block-proposed-xenial ** Also affects: linux-gke (Ubuntu Xenial) Importance: Undecided Status: New ** Tags added: xenial ** Changed in: linux-gke (Ubuntu Xenial) Status: New => Confirmed ** Also affects: kernel-sru-workflow/automated-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/certification-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-meta Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-proposed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-security Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-updates Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/regression-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/security-signoff Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/upload-to-ppa Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/verification-testing Importance: Undecided Status: New ** Changed in: kernel-sru-workflow Status: New => In Progress ** Changed in: kernel-sru-workflow Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/automated-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/automated-testing Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/certification-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/certification-testing Assignee: (unassigned) => Canonical Hardware Certification (canonical-hw-cert) ** Changed in: kernel-sru-workflow/prepare-package Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/prepare-package-meta Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: (unassigned) => Canonical Kernel Team (canonical-
[Bug 1704984] [NEW] delivery-notification FAILED: temporarily unable to send DSN
Public bug reported: Hello! I run ubuntu 16.04 and my logs are filled with : [127.0.0.1] said: 451 4.5.0 Error in processing, id=26913-17, delivery- notification FAILED: temporarily unable to send DSN to : 451 4.5.0 From MTA(smtp:[127.0.0.1]:10025) during fwd-data-contents (open body: Invalid argument at /usr/local/share/perl/5.22.1/MIME/Entity.pm line 1878.): id=26913-17 at /usr/sbin/amavisd-new line 15165. (in reply to end of DATA command)) Looks like bug. Thank you! ** Affects: amavisd-new (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1704984 Title: delivery-notification FAILED: temporarily unable to send DSN To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/amavisd-new/+bug/1704984/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1704982] [NEW] linux: -proposed tracker
Public bug reported: This bug is for tracking the upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow backports: 1704985 derivatives: 1704987,1704989,1704990,1704991 ** Affects: kernel-sru-workflow Importance: Medium Status: In Progress ** Affects: kernel-sru-workflow/automated-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/certification-testing Importance: Medium Assignee: Canonical Hardware Certification (canonical-hw-cert) Status: New ** Affects: kernel-sru-workflow/prepare-package Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: Confirmed ** Affects: kernel-sru-workflow/prepare-package-meta Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: Confirmed ** Affects: kernel-sru-workflow/prepare-package-signed Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: Confirmed ** Affects: kernel-sru-workflow/promote-to-proposed Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-security Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-updates Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/regression-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/security-signoff Importance: Medium Assignee: Canonical Security Team (canonical-security) Status: New ** Affects: kernel-sru-workflow/upload-to-ppa Importance: Medium Status: Invalid ** Affects: kernel-sru-workflow/verification-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: linux (Ubuntu) Importance: Undecided Status: Invalid ** Affects: linux (Ubuntu Xenial) Importance: Medium Status: Confirmed ** Tags: block-proposed-xenial kernel-release-tracking-bug kernel-release-tracking-bug-live kernel-sru-cycle-2017.06.28-4 kernel-sru-master-kernel xenial ** Tags added: kernel-release-tracking-bug ** Tags added: kernel-release-tracking-bug-live ** Tags added: block-proposed-xenial ** Also affects: linux (Ubuntu Xenial) Importance: Undecided Status: New ** Tags added: xenial ** Changed in: linux (Ubuntu Xenial) Status: New => Confirmed ** Also affects: kernel-sru-workflow/automated-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/certification-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-meta Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-signed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-proposed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-security Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-updates Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/regression-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/security-signoff Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/upload-to-ppa Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/verification-testing Importance: Undecided Status: New ** Changed in: kernel-sru-workflow Status: New => In Progress ** Changed in: kernel-sru-workflow Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/automated-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/automated-testing Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/certification-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/certification-testing Assignee: (unassigned) => Canonical Hardware Certification (canonical-hw-cert) ** Changed in: kernel-sru-workflow/prepare-package Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/prepare-package-meta
[Bug 1704985] [NEW] linux-lts-xenial: -proposed tracker
Public bug reported: This bug is for tracking the upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1704982 ** Affects: kernel-sru-workflow Importance: Medium Status: In Progress ** Affects: kernel-sru-workflow/automated-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/certification-testing Importance: Medium Assignee: Canonical Hardware Certification (canonical-hw-cert) Status: New ** Affects: kernel-sru-workflow/prepare-package Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/prepare-package-meta Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/prepare-package-signed Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/promote-to-proposed Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-security Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-updates Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/regression-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/security-signoff Importance: Medium Assignee: Canonical Security Team (canonical-security) Status: New ** Affects: kernel-sru-workflow/upload-to-ppa Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/verification-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: linux-lts-xenial (Ubuntu) Importance: Undecided Status: Invalid ** Affects: linux-lts-xenial (Ubuntu Trusty) Importance: Medium Status: Confirmed ** Tags: block-proposed-trusty kernel-release-tracking-bug kernel-release-tracking-bug-live kernel-sru-backport-of-1704982 kernel-sru-cycle-2017.06.28-4 trusty ** Tags added: kernel-release-tracking-bug ** Tags added: kernel-release-tracking-bug-live ** Tags added: block-proposed-trusty ** Also affects: linux-lts-xenial (Ubuntu Trusty) Importance: Undecided Status: New ** Tags added: trusty ** Changed in: linux-lts-xenial (Ubuntu Trusty) Status: New => Confirmed ** Also affects: kernel-sru-workflow/automated-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/certification-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-meta Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-signed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-proposed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-security Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-updates Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/regression-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/security-signoff Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/upload-to-ppa Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/verification-testing Importance: Undecided Status: New ** Changed in: kernel-sru-workflow Status: New => In Progress ** Changed in: kernel-sru-workflow Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/automated-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/automated-testing Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/certification-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/certification-testing Assignee: (unassigned) => Canonical Hardware Certification (canonical-hw-cert) ** Changed in: kernel-sru-workflow/prepare-package Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package Assignee: (unassigned) => Canonical Kernel Team (can
[Bug 1653456] Re: ASUS G752VS: Touchpad and Fn keys not working (Ubuntu 16.04.1/16.10/17.04)
Hello Kai-Heng Feng, My touchpad ID is: ELAN1203:00 04F3:301E Touchpad If this issue is limited to ELAN1203:00 04F3:3043 I need to create a new bug to? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1653456 Title: ASUS G752VS: Touchpad and Fn keys not working (Ubuntu 16.04.1/16.10/17.04) To manage notifications about this bug go to: https://bugs.launchpad.net/linux/+bug/1653456/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1667750] Re: xhci_hcd: ERROR Transfer event TRB DMA ptr not part of current TD ep_index 2 comp_code 13
I've tested 4.13rc1 and I don't see the fix there. Let's hope it hits rc2. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1667750 Title: xhci_hcd: ERROR Transfer event TRB DMA ptr not part of current TD ep_index 2 comp_code 13 To manage notifications about this bug go to: https://bugs.launchpad.net/hwe-next/+bug/1667750/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1689033] Re: A few missing icons in version 2.4.3
the issue was fixed upstream with https://git.gnome.org/browse/gtk+/commit/?id=a6dcb80fb ** Changed in: gtk+3.0 (Ubuntu) Importance: Undecided => Low ** Changed in: gtk+3.0 (Ubuntu) Status: New => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1689033 Title: A few missing icons in version 2.4.3 To manage notifications about this bug go to: https://bugs.launchpad.net/gdk-pixbuf/+bug/1689033/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1670508] Re: CIFS: Enable encryption for SMB3
** Tags removed: verification-needed-xenial ** Tags added: verification-failed-xenial -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1670508 Title: CIFS: Enable encryption for SMB3 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1670508/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1704995] [NEW] linux-lts-trusty: -proposed tracker
Public bug reported: This bug is for tracking the upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1704994 ** Affects: kernel-sru-workflow Importance: Medium Status: In Progress ** Affects: kernel-sru-workflow/automated-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/certification-testing Importance: Medium Assignee: Canonical Hardware Certification (canonical-hw-cert) Status: New ** Affects: kernel-sru-workflow/prepare-package Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/prepare-package-meta Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/prepare-package-signed Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/promote-to-proposed Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-security Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-updates Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/regression-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/security-signoff Importance: Medium Assignee: Canonical Security Team (canonical-security) Status: New ** Affects: kernel-sru-workflow/upload-to-ppa Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/verification-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: linux-lts-trusty (Ubuntu) Importance: Undecided Status: Invalid ** Affects: linux-lts-trusty (Ubuntu Precise) Importance: Medium Status: Confirmed ** Tags: block-proposed-precise kernel-release-tracking-bug kernel-release-tracking-bug-live kernel-sru-backport-of-1704994 kernel-sru-cycle-2017.07.17-1 precise ** Tags added: kernel-release-tracking-bug ** Tags added: kernel-release-tracking-bug-live ** Tags added: block-proposed-precise ** Also affects: linux-lts-trusty (Ubuntu Precise) Importance: Undecided Status: New ** Tags added: precise ** Changed in: linux-lts-trusty (Ubuntu Precise) Status: New => Confirmed ** Also affects: kernel-sru-workflow/automated-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/certification-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-meta Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-signed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-proposed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-security Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-updates Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/regression-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/security-signoff Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/upload-to-ppa Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/verification-testing Importance: Undecided Status: New ** Changed in: kernel-sru-workflow Status: New => In Progress ** Changed in: kernel-sru-workflow Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/automated-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/automated-testing Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/certification-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/certification-testing Assignee: (unassigned) => Canonical Hardware Certification (canonical-hw-cert) ** Changed in: kernel-sru-workflow/prepare-package Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package Assignee: (unassigned) => Canonical Kernel Te
[Bug 1697565] Re: Snaps without icons don't show as installed
I see no improvement with 3.20.5-0ubuntu0.16.04.5 in xenial. I tried with openscad-plars and it is not listed in the installed packages. However moon-buggy is listed but it has an icon, so it is not a good example for this test case. Marking as verification-failed for xenial ** Tags removed: verification-needed-xenial ** Tags added: verification-failed-xenial ** Description changed: [Impact] Snaps without icons don't show in the installed tab. They do show in search, because the icon is sourced from the store. [Test Case] 1. Open GNOME Software - 2. Install a snap without an icon (e.g. moon-buggy) + 2. Install a snap without an icon (e.g. openscad-plars) 3. Close GNOME Software 4. Open GNOME Software 5. Click "installed" tab Expected result: Installed snap is shown Observed result: Snap is not shown [Regression Potential] The code was refactored to download the store information for installed snaps. This means the store icon shows if the installed snap didn't have one. There is some risk of new bugs being caused by the refactoring. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1697565 Title: Snaps without icons don't show as installed To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gnome-software/+bug/1697565/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1704994] [NEW] linux: -proposed tracker
Public bug reported: This bug is for tracking the upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow backports: 1704995 derivatives: ** Affects: kernel-sru-workflow Importance: Medium Status: In Progress ** Affects: kernel-sru-workflow/automated-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/certification-testing Importance: Medium Assignee: Canonical Hardware Certification (canonical-hw-cert) Status: New ** Affects: kernel-sru-workflow/prepare-package Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: Confirmed ** Affects: kernel-sru-workflow/prepare-package-meta Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: Confirmed ** Affects: kernel-sru-workflow/prepare-package-signed Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: Confirmed ** Affects: kernel-sru-workflow/promote-to-proposed Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-security Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-updates Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/regression-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/security-signoff Importance: Medium Assignee: Canonical Security Team (canonical-security) Status: New ** Affects: kernel-sru-workflow/upload-to-ppa Importance: Medium Status: Invalid ** Affects: kernel-sru-workflow/verification-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: linux (Ubuntu) Importance: Undecided Status: Invalid ** Affects: linux (Ubuntu Trusty) Importance: Medium Status: Confirmed ** Tags: block-proposed-trusty kernel-release-tracking-bug kernel-release-tracking-bug-live kernel-sru-cycle-2017.07.17-1 kernel-sru-master-kernel trusty ** Tags added: kernel-release-tracking-bug ** Tags added: kernel-release-tracking-bug-live ** Tags added: block-proposed-trusty ** Also affects: linux (Ubuntu Trusty) Importance: Undecided Status: New ** Tags added: trusty ** Changed in: linux (Ubuntu Trusty) Status: New => Confirmed ** Also affects: kernel-sru-workflow/automated-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/certification-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-meta Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-signed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-proposed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-security Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-updates Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/regression-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/security-signoff Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/upload-to-ppa Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/verification-testing Importance: Undecided Status: New ** Changed in: kernel-sru-workflow Status: New => In Progress ** Changed in: kernel-sru-workflow Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/automated-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/automated-testing Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/certification-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/certification-testing Assignee: (unassigned) => Canonical Hardware Certification (canonical-hw-cert) ** Changed in: kernel-sru-workflow/prepare-package Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/prepare-package-meta Importance: Undecided => Medium
[Bug 1705000] Missing required logs.
This bug is missing log files that will aid in diagnosing the problem. While running an Ubuntu kernel (not a mainline or third-party kernel) please enter the following command in a terminal window: apport-collect 1705000 and then change the status of the bug to 'Confirmed'. If, due to the nature of the issue you have encountered, you are unable to run this command, please add a comment stating that fact and change the bug status to 'Confirmed'. This change has been made by an automated script, maintained by the Ubuntu Kernel Team. ** Changed in: linux (Ubuntu) Status: New => Incomplete ** Tags added: xenial -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1705000 Title: ASUS G752VM: (Ubuntu 16.04) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1705000/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1705000] [NEW] ASUS G752VM: (Ubuntu 16.04)
Public bug reported: Hello I have an ASUS ROG-G752VM computer with Ubuntu 16.04 installed with and new kernel 4.12.0-041200-generic. I'm having problems when I plug in the headphones and microphone, they don't work. What I need to do? ** Affects: linux (Ubuntu) Importance: Undecided Status: Incomplete ** Tags: xenial -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1705000 Title: ASUS G752VM: (Ubuntu 16.04) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1705000/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1704998] [NEW] Flashing LEDs (~2min interval) on Logitech Performance MX (USB Wireless) Mouse
Public bug reported: Hi, Since my upgrade from Ubuntu 14.04 to 16.04.2 LTS the battery indicator LEDs on my Logitech Performance MX Mouse light up about every 120 seconds. Depending on the charging level 1, 2 or 3 LEDs light up green. When I boot into recovery mode or disable upower after a normal boot this behaviour doesn't occur. The expected behaviour is that the LEDs do not light up every 2 minutes but instead only when the charging levels drop from "3 to 2 LEDs" and "2 to 1 LEDs" - that's how it works with Ubuntu 14.04 (and Windows 10). Using the usbmon module I captured the usb traffic and when the LEDs light up the following is logged by "cat /sys/kernel/debug/usb/usbmon/2u": 8807a16ddd80 290929349 S Co:2:009:0 s 21 09 0210 0002 0007 7 = 10018107 00 8807a16ddd80 290929492 C Co:2:009:0 0 7 > 88074c55b180 290932022 C Ii:2:009:3 0:2 7 = 10018f81 070900 88074c55b180 290932033 S Ii:2:009:3 -115:2 32 < 8807f4332540 296834836 S Co:2:009:0 s 21 09 0210 0002 0007 7 = 10028107 00 8807f4332540 296835012 C Co:2:009:0 0 7 > 88074c55b180 298689874 C Ii:2:009:3 0:2 7 = 10028107 05 88074c55b180 298689892 S Ii:2:009:3 -115:2 32 < "upower --monitor-detail" shows the following when the LEDs light up: [10:22:41.041]device changed: /org/freedesktop/UPower/devices/mouse_0003o046Do101Ax0006 native-path: /sys/devices/pci:00/:00:1d.0/usb2/2-1/2-1.8/2-1.8.4/2-1.8.4:1.2/0003:046D:C52B.0004/0003:046D:101A.0006 vendor: Logitech, Inc. model:Performance MX serial: F8A45D1F power supply: no updated: Tue 18 Jul 2017 10:22:40 AM UTC (1 seconds ago) has history: yes has statistics: no mouse present: yes rechargeable:yes state: discharging warning-level: none percentage: 55% icon-name: 'battery-good-symbolic' Here is the output from "lsusb -v" for the Logitech Unifying Receiver in use: Bus 002 Device 009: ID 046d:c52b Logitech, Inc. Unifying Receiver Device Descriptor: bLength18 bDescriptorType 1 bcdUSB 2.00 bDeviceClass0 (Defined at Interface level) bDeviceSubClass 0 bDeviceProtocol 0 bMaxPacketSize0 8 idVendor 0x046d Logitech, Inc. idProduct 0xc52b Unifying Receiver bcdDevice 12.01 iManufacturer 1 Logitech iProduct2 USB Receiver iSerial 0 bNumConfigurations 1 Configuration Descriptor: bLength 9 bDescriptorType 2 wTotalLength 84 bNumInterfaces 3 bConfigurationValue 1 iConfiguration 4 RQR12.01_B0019 bmAttributes 0xa0 (Bus Powered) Remote Wakeup MaxPower 98mA Interface Descriptor: bLength 9 bDescriptorType 4 bInterfaceNumber0 bAlternateSetting 0 bNumEndpoints 1 bInterfaceClass 3 Human Interface Device bInterfaceSubClass 1 Boot Interface Subclass bInterfaceProtocol 1 Keyboard iInterface 0 HID Device Descriptor: bLength 9 bDescriptorType33 bcdHID 1.11 bCountryCode0 Not supported bNumDescriptors 1 bDescriptorType34 Report wDescriptorLength 59 Report Descriptors: ** UNAVAILABLE ** Endpoint Descriptor: bLength 7 bDescriptorType 5 bEndpointAddress 0x81 EP 1 IN bmAttributes3 Transfer TypeInterrupt Synch Type None Usage Type Data wMaxPacketSize 0x0008 1x 8 bytes bInterval 8 Interface Descriptor: bLength 9 bDescriptorType 4 bInterfaceNumber1 bAlternateSetting 0 bNumEndpoints 1 bInterfaceClass 3 Human Interface Device bInterfaceSubClass 1 Boot Interface Subclass bInterfaceProtocol 2 Mouse iInterface 0 HID Device Descriptor: bLength 9 bDescriptorType33 bcdHID 1.11 bCountryCode0 Not supported bNumDescriptors 1
[Bug 1704997] [NEW] linux-ti-omap4: -proposed tracker
Public bug reported: This bug is for tracking the upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1704996 ** Affects: kernel-sru-workflow Importance: Medium Status: Invalid ** Affects: kernel-sru-workflow/automated-testing Importance: Medium Status: Invalid ** Affects: kernel-sru-workflow/certification-testing Importance: Medium Status: Invalid ** Affects: kernel-sru-workflow/prepare-package Importance: Medium Assignee: ubuntu-armel-kernel (ubuntu-armel-kernel) Status: Invalid ** Affects: kernel-sru-workflow/prepare-package-meta Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: Invalid ** Affects: kernel-sru-workflow/promote-to-proposed Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: Invalid ** Affects: kernel-sru-workflow/promote-to-security Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: Invalid ** Affects: kernel-sru-workflow/promote-to-updates Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: Invalid ** Affects: kernel-sru-workflow/regression-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: Invalid ** Affects: kernel-sru-workflow/security-signoff Importance: Medium Assignee: Canonical Security Team (canonical-security) Status: Invalid ** Affects: kernel-sru-workflow/upload-to-ppa Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: Invalid ** Affects: kernel-sru-workflow/verification-testing Importance: Medium Assignee: ubuntu-armel-kernel (ubuntu-armel-kernel) Status: Invalid ** Affects: linux-ti-omap4 (Ubuntu) Importance: Undecided Status: Invalid ** Affects: linux-ti-omap4 (Ubuntu Precise) Importance: Medium Status: Invalid ** Tags: armel block-proposed-precise kernel-release-tracking-bug kernel-release-tracking-bug-live kernel-sru-cycle-2017.07.17-1 kernel-sru-derivative-of-1704996 precise ** Tags added: kernel-release-tracking-bug ** Tags added: kernel-release-tracking-bug-live ** Tags added: armel ** Tags added: block-proposed-precise ** Also affects: linux-ti-omap4 (Ubuntu Precise) Importance: Undecided Status: New ** Tags added: precise ** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: New => Confirmed ** Also affects: kernel-sru-workflow/automated-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/certification-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-meta Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-proposed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-security Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-updates Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/regression-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/security-signoff Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/upload-to-ppa Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/verification-testing Importance: Undecided Status: New ** Changed in: kernel-sru-workflow Status: New => In Progress ** Changed in: kernel-sru-workflow Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/automated-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/automated-testing Status: New => Invalid ** Changed in: kernel-sru-workflow/certification-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/certification-testing Status: New => Invalid ** Changed in: kernel-sru-workflow/prepare-package Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package Assignee: (unassigned) => ubuntu-armel-kernel (ubuntu-armel-kernel) ** Changed in: kernel-sru-workflow/prepare-package-meta Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/promote-to-proposed Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/promote-to-proposed Assignee: (unassigned) => Ubuntu Stable Relea
[Bug 1704999] [NEW] linux-armadaxp: -proposed tracker
Public bug reported: This bug is for tracking the upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1704996 ** Affects: kernel-sru-workflow Importance: Medium Status: Invalid ** Affects: kernel-sru-workflow/automated-testing Importance: Medium Status: Invalid ** Affects: kernel-sru-workflow/certification-testing Importance: Medium Status: Invalid ** Affects: kernel-sru-workflow/prepare-package Importance: Medium Assignee: Canonical Hardware Enablement ARM Kernel (canonical-hwe-arm-kernel) Status: Invalid ** Affects: kernel-sru-workflow/prepare-package-meta Importance: Medium Assignee: Canonical Hardware Enablement ARM Kernel (canonical-hwe-arm-kernel) Status: Invalid ** Affects: kernel-sru-workflow/promote-to-proposed Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: Invalid ** Affects: kernel-sru-workflow/promote-to-security Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: Invalid ** Affects: kernel-sru-workflow/promote-to-updates Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: Invalid ** Affects: kernel-sru-workflow/regression-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: Invalid ** Affects: kernel-sru-workflow/security-signoff Importance: Medium Assignee: Canonical Security Team (canonical-security) Status: Invalid ** Affects: kernel-sru-workflow/upload-to-ppa Importance: Medium Status: Invalid ** Affects: kernel-sru-workflow/verification-testing Importance: Medium Assignee: Canonical Hardware Enablement ARM Kernel (canonical-hwe-arm-kernel) Status: Invalid ** Affects: linux-armadaxp (Ubuntu) Importance: Undecided Status: Invalid ** Affects: linux-armadaxp (Ubuntu Precise) Importance: Medium Status: Invalid ** Tags: armhf block-proposed-precise kernel-release-tracking-bug kernel-release-tracking-bug-live kernel-sru-cycle-2017.07.17-1 kernel-sru-derivative-of-1704996 precise ** Tags added: kernel-release-tracking-bug ** Tags added: kernel-release-tracking-bug-live ** Tags added: armhf ** Tags added: block-proposed-precise ** Also affects: linux-armadaxp (Ubuntu Precise) Importance: Undecided Status: New ** Tags added: precise ** Changed in: linux-armadaxp (Ubuntu Precise) Status: New => Confirmed ** Also affects: kernel-sru-workflow/automated-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/certification-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-meta Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-proposed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-security Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-updates Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/regression-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/security-signoff Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/upload-to-ppa Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/verification-testing Importance: Undecided Status: New ** Changed in: kernel-sru-workflow Status: New => In Progress ** Changed in: kernel-sru-workflow Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/automated-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/automated-testing Status: New => Invalid ** Changed in: kernel-sru-workflow/certification-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/certification-testing Status: New => Invalid ** Changed in: kernel-sru-workflow/prepare-package Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package Assignee: (unassigned) => Canonical Hardware Enablement ARM Kernel (canonical-hwe-arm-kernel) ** Changed in: kernel-sru-workflow/prepare-package-meta Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: (unassigned) => Canonical Hardware Enablement ARM Kernel (canonical-hwe-arm-kernel) ** Changed in: kernel-sru-workflow/promote-to-proposed Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prom
[Bug 1704996] [NEW] linux: -proposed tracker
Public bug reported: This bug is for tracking the upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow backports: derivatives: 1704997,1704999 ** Affects: kernel-sru-workflow Importance: Medium Status: In Progress ** Affects: kernel-sru-workflow/automated-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/certification-testing Importance: Medium Assignee: Canonical Hardware Certification (canonical-hw-cert) Status: New ** Affects: kernel-sru-workflow/prepare-package Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: Confirmed ** Affects: kernel-sru-workflow/prepare-package-lbm Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: Confirmed ** Affects: kernel-sru-workflow/prepare-package-meta Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: Confirmed ** Affects: kernel-sru-workflow/promote-to-proposed Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-security Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-updates Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/regression-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/security-signoff Importance: Medium Assignee: Canonical Security Team (canonical-security) Status: New ** Affects: kernel-sru-workflow/upload-to-ppa Importance: Medium Status: Invalid ** Affects: kernel-sru-workflow/verification-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: linux (Ubuntu) Importance: Undecided Status: Invalid ** Affects: linux (Ubuntu Precise) Importance: Medium Status: Confirmed ** Tags: block-proposed-precise kernel-release-tracking-bug kernel-release-tracking-bug-live kernel-sru-cycle-2017.07.17-1 kernel-sru-master-kernel precise ** Tags added: kernel-release-tracking-bug ** Tags added: kernel-release-tracking-bug-live ** Tags added: block-proposed-precise ** Also affects: linux (Ubuntu Precise) Importance: Undecided Status: New ** Tags added: precise ** Changed in: linux (Ubuntu Precise) Status: New => Confirmed ** Also affects: kernel-sru-workflow/automated-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/certification-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-lbm Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-meta Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-proposed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-security Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-updates Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/regression-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/security-signoff Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/upload-to-ppa Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/verification-testing Importance: Undecided Status: New ** Changed in: kernel-sru-workflow Status: New => In Progress ** Changed in: kernel-sru-workflow Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/automated-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/automated-testing Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/certification-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/certification-testing Assignee: (unassigned) => Canonical Hardware Certification (canonical-hw-cert) ** Changed in: kernel-sru-workflow/prepare-package Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/prepare-package-lbm Importance: Undecided =
[Bug 1703461] Re: Update to 3.20.5
** Description changed: [Impact] Ubuntu 16.04 is running a version of gnome-software based on 3.20.1 which is an older stable release (latest stable release is 3.20.5). The Ubuntu changes were managed in a git branch that is difficult to manage. We have not been able to bring in all the stable changes to this branch and it is difficult to modify. We have rebased our changes on 3.20.5 [1] and propose these as a Stable Release Update. [1] https://lists.ubuntu.com/archives/ubuntu- desktop/2017-June/005011.html [Test Case] 1. Run GNOME Software + 2. Execute the test plan https://wiki.ubuntu.com/Process/Merges/TestPlans/gnome-software Expected result: Running latest stable release, no regressions from 3.20.1 Observed result: Running older release. [Regression Potential] Due to the number of changes there is a risk of regression. These changes are all on a stable branch, so upstream considers them to be safe. We ran this version from a PPA to check for issues, and there don't seem to be any problems. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1703461 Title: Update to 3.20.5 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gnome-software/+bug/1703461/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1429427] Re: Unexplainable time jumps in CRON
right, In my test, only 7a2e247 commit fixes this symptom. but I think be45099 is worth SRUing with 7a2e247 as commit's description 5a11a1d is quite far uploaded debdiff for two patches. Thanks ** Patch added: "lp1429427_trusty2.debdiff" https://bugs.launchpad.net/ubuntu/+source/rsyslog/+bug/1429427/+attachment/4916721/+files/lp1429427_trusty2.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1429427 Title: Unexplainable time jumps in CRON To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/rsyslog/+bug/1429427/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs