[Bug 1868551] Re: Screen freezes : NULL pointer dereference i915_active_acquire since Linux 5.4

2020-03-26 Thread Guy Baconniere
I did not manage to compile the kernel the Ubuntu way
https://wiki.ubuntu.com/Kernel/BuildYourOwnKernel
Is this doc still relevant for Linux 5.4 and 20.04 / Focal?

I included the patch I ported to the latest version of ubuntu-focal
git clone git://kernel.ubuntu.com/ubuntu/ubuntu-focal.git

** Patch added: "ubuntu-focal-1868551-i915_active_acquire.patch"
   
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1868551/+attachment/5341878/+files/ubuntu-focal-1868551-i915_active_acquire.patch

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1868551

Title:
  Screen freezes : NULL pointer dereference i915_active_acquire since
  Linux 5.4

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1868551/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1868551] Re: Screen freezes : NULL pointer dereference i915_active_acquire since Linux 5.4

2020-03-26 Thread Guy Baconniere
I managed to build, install and boot the Linux Kernel 5.4 patched with
the above patch.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1868551

Title:
  Screen freezes : NULL pointer dereference i915_active_acquire since
  Linux 5.4

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1868551/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1868551] Re: Screen freezes : NULL pointer dereference i915_active_acquire since Linux 5.4

2020-03-26 Thread Guy Baconniere
** Attachment removed: "WifiSyslog.txt"
   
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1868551/+attachment/5340470/+files/WifiSyslog.txt

** Attachment removed: "RfKill.txt"
   
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1868551/+attachment/5340468/+files/RfKill.txt

** Attachment removed: "AlsaInfo.txt"
   
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1868551/+attachment/5340454/+files/AlsaInfo.txt

** Attachment removed: "CRDA.txt"
   
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1868551/+attachment/5340455/+files/CRDA.txt

** Attachment removed: "IwConfig.txt"
   
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1868551/+attachment/5340457/+files/IwConfig.txt

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1868551

Title:
  Screen freezes : NULL pointer dereference i915_active_acquire since
  Linux 5.4

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1868551/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1868551] Re: Screen freezes : NULL pointer dereference i915_active_acquire since Linux 5.4

2020-03-28 Thread Guy Baconniere
Q: Is there an upstream commit?

A: Not that I am aware of

https://gitlab.freedesktop.org/drm/intel/issues/827

A month ago:
Hi, when will this make it's way into Kernel 5.4? -- The Boy from the MAD show 
;-)

You can check if you had the same type crash of your Ubuntu 20.04 (soon
LTS)

zgrep -h i915_active_acquire /var/log/kern.log*

RIP: 0010:i915_active_acquire+0xe/0x80 [i915]

I had about one or two crash / freeze of Ubuntu 20.04 per week on my
Dell XPS 13 connected to an external monitor. Initially, I thought it
was related to the instability of the hardware itself but at the end it
seems to be an Intel i915 graphics kernel driver bug or regression on
Linux Kernel 5.4.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1868551

Title:
  Screen freezes : NULL pointer dereference i915_active_acquire since
  Linux 5.4

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1868551/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1868551] Re: Screen freezes : NULL pointer dereference i915_active_acquire since Linux 5.4

2020-03-28 Thread Guy Baconniere
zgrep -h i915_active_acquire /var/log/kern.log* kern.log* | cut -d ' ' 
-f1-3,5,9-


** Attachment added: "kern.log"
   
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1868551/+attachment/5342403/+files/kern.log

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1868551

Title:
  Screen freezes : NULL pointer dereference i915_active_acquire since
  Linux 5.4

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1868551/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1868551] Re: Screen freezes : NULL pointer dereference i915_active_acquire since Linux 5.4

2020-03-28 Thread Guy Baconniere
Seems to be fixed in the latest 5.5
http://kobi.wang/v5.x/ChangeLog-5.5

drm/i915: Hold reference to intel_frontbuffer as we track activity

Since obj->frontbuffer is no longer protected by the struct_mutex, as we
are processing the execbuf, it may be removed. Mark the
intel_frontbuffer as rcu protected, and so acquire a reference to
the struct as we track activity upon it.

Closes: https://gitlab.freedesktop.org/drm/intel/issues/827
Fixes: 8e7cb1799b4f ("drm/i915: Extract intel_frontbuffer active tracking")
Signed-off-by: Chris Wilson 
Link: 
https://patchwork.freedesktop.org/patch/msgid/20191218104043.3539458-1-ch...@chris-wilson.co.uk
(cherry picked from commit da42104f589d979bbe402703fd836cec60befae1)

I am not sure that is a good idea to ship Ubuntu 20.04 LTS with Linux
Kernel 5.4 branch unless you backport 5.5 patches as many people rely on
bult-in Intel GPU in their workstation and the Intel graphics kernel
driver is not very stable

https://linuxreviews.org/Linux_Kernel_5.5_Will_Not_Fix_The_Frequent_Intel_GPU_Hangs_In_Recent_Kernels

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=949369

https://bugzilla.redhat.com/show_bug.cgi?id=1805278

https://bugs.archlinux.org/task/65392

Google "i915_active_acquire"+"i915_vma_move_to_active"
Google link:https://gitlab.freedesktop.org/drm/intel/issues/827

commit e85ade1f50aae464ce196672faa7a099fd1721ed
Author: Chris Wilson 
Date:   Wed Dec 18 10:40:43 2019 +


** Bug watch added: Debian Bug tracker #949369
   https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=949369

** Bug watch added: Red Hat Bugzilla #1805278
   https://bugzilla.redhat.com/show_bug.cgi?id=1805278

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1868551

Title:
  Screen freezes : NULL pointer dereference i915_active_acquire since
  Linux 5.4

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1868551/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1868551] Re: Screen freezes : NULL pointer dereference i915_active_acquire since Linux 5.4

2020-03-30 Thread Guy Baconniere
With the above patch, I still have the screen freeze but without Kernel oops.

I will compile and my own Linux Kernel 4.15 (18.04 LTS) for Ubuntu 20.04 (soon 
LTS) as
Intel Graphics i915 is unusable on my Dell XPS 13 connected to external
screen and XFCE4

 i915 :00:02.0: GPU HANG: ecode 9:1:0x, hang on rcs0
 i915 :00:02.0: Resetting rcs0 for hang on rcs0
 [drm:gen8_reset_engines [i915]] *ERROR* rcs0 reset request timed out: 
{request: 0001, RESET_CTL: 0001}
 i915 :00:02.0: Resetting chip for hang on rcs0
 [drm:gen8_reset_engines [i915]] *ERROR* rcs0 reset request timed out: 
{request: 0001, RESET_CTL: 0001}
 [drm:gen8_reset_engines [i915]] *ERROR* rcs0 reset request timed out: 
{request: 0001, RESET_CTL: 0001}
 Asynchronous wait on fence i915:xfwm4[1901]:57922 timed out 
(hint:intel_atomic_commit_ready+0x0/0x54 [i915])
 Asynchronous wait on fence i915:xfwm4[1901]:57922 timed out 
(hint:intel_atomic_commit_ready+0x0/0x54 [i915])
 i915 :00:02.0: Resetting rcs0 for hang on rcs0
 i915 :00:02.0: Resetting rcs0 for hang on rcs0
 ...
 i915 :00:02.0: GPU recovery timed out, cancelling all in-flight rendering.
 i915 :00:02.0: Resetting chip for hang on rcs0
 i915 :00:02.0: Resetting rcs0 for hang on rcs0
 i915 :00:02.0: Resetting rcs0 for hang on rcs0
 Asynchronous wait on fence i915:xfwm4[1901]:57926 timed out 
(hint:intel_atomic_commit_ready+0x0/0x54 [i915])
 Asynchronous wait on fence i915:xfwm4[1901]:57926 timed out 
(hint:intel_atomic_commit_ready+0x0/0x54 [i915])
 i915 :00:02.0: Resetting rcs0 for hang on rcs0
 i915 :00:02.0: Resetting rcs0 for hang on rcs0
 ...
 i915 :00:02.0: GPU recovery timed out, cancelling all in-flight rendering.
 i915 :00:02.0: Resetting chip for hang on rcs0
 i915 :00:02.0: Resetting rcs0 for hang on rcs0
 [drm:gen8_reset_engines [i915]] *ERROR* rcs0 reset request timed out: 
{request: 0001, RESET_CTL: 0001}
 i915 :00:02.0: Resetting chip for hang on rcs0
 [drm:gen8_reset_engines [i915]] *ERROR* rcs0 reset request timed out: 
{request: 0001, RESET_CTL: 0001}
 [drm:gen8_reset_engines [i915]] *ERROR* rcs0 reset request timed out: 
{request: 0001, RESET_CTL: 0001}
 i915 :00:02.0: Resetting rcs0 for hang on rcs0
 i915 :00:02.0: Resetting rcs0 for hang on rcs0
 Asynchronous wait on fence i915:xfwm4[1901]:5792a timed out 
(hint:intel_atomic_commit_ready+0x0/0x54 [i915])
 Asynchronous wait on fence i915:xfwm4[1901]:5792a timed out 
(hint:intel_atomic_commit_ready+0x0/0x54 [i915])
 i915 :00:02.0: Resetting rcs0 for hang on rcs0
 i915 :00:02.0: Resetting rcs0 for hang on rcs0
 ...
 i915 :00:02.0: GPU recovery timed out, cancelling all in-flight rendering.
 i915 :00:02.0: Resetting chip for hang on rcs0
 i915 :00:02.0: Resetting rcs0 for hang on rcs0
 ...
 Asynchronous wait on fence i915:xfwm4[1901]:5792e timed out 
(hint:intel_atomic_commit_ready+0x0/0x54 [i915])
 Asynchronous wait on fence i915:xfwm4[1901]:5792e timed out 
(hint:intel_atomic_commit_ready+0x0/0x54 [i915])
 i915 :00:02.0: Resetting rcs0 for hang on rcs0
 i915 :00:02.0: Resetting rcs0 for hang on rcs0
 ...
 i915 :00:02.0: GPU recovery timed out, cancelling all in-flight rendering.
 i915 :00:02.0: Resetting chip for hang on rcs0
 i915 :00:02.0: Resetting rcs0 for stuck wait on rcs0
 i915 :00:02.0: Resetting rcs0 for hang on rcs0
 i915 :00:02.0: Resetting rcs0 for hang on rcs0
 Asynchronous wait on fence i915:xfwm4[1901]:57932 timed out 
(hint:intel_atomic_commit_ready+0x0/0x54 [i915])
 Asynchronous wait on fence i915:xfwm4[1901]:57932 timed out 
(hint:intel_atomic_commit_ready+0x0/0x54 [i915])
 i915 :00:02.0: Resetting rcs0 for hang on rcs0
 i915 :00:02.0: Resetting rcs0 for hang on rcs0
 ...
 i915 :00:02.0: Resetting rcs0 for hang on rcs0
 i915 :00:02.0: GPU recovery timed out, cancelling all in-flight rendering.
 i915 :00:02.0: Resetting chip for hang on rcs0
 i915 :00:02.0: GPU recovery timed out, cancelling all in-flight rendering.
 i915 :00:02.0: Resetting chip for hang on rcs0
 i915 :00:02.0: Resetting rcs0 for hang on rcs0
 Asynchronous wait on fence i915:xfwm4[1901]:57936 timed out 
(hint:intel_atomic_commit_ready+0x0/0x54 [i915])
 Asynchronous wait on fence i915:xfwm4[1901]:57936 timed out 
(hint:intel_atomic_commit_ready+0x0/0x54 [i915])
 i915 :00:02.0: Resetting rcs0 for hang on rcs0
 i915 :00:02.0: Resetting rcs0 for hang on rcs0
 ...
 i915 :00:02.0: GPU recovery timed out, cancelling all in-flight rendering.
 i915 :00:02.0: Resetting chip for hang on rcs0
 i915 :00:02.0: Resetting rcs0 for hang on rcs0
 i915 :00:02.0: Resetting rcs0 for hang on rcs0
 Asynchronous wait on fence i915:xfwm4[1901]:57938 timed out 
(hint:intel_atomic_commit_ready+0x0/0x54 [i915])
 Asynchronous wait on fence i915:xfwm4[1901]:57938 timed out 
(hint:intel_atomic_commit_ready+0x0/0x54 [i915])
 i915 :00:02.0: Rese

[Bug 1868551] Re: Screen freezes : NULL pointer dereference i915_active_acquire since Linux 5.4

2020-03-31 Thread Guy Baconniere
I am testing with Linux Kernel 5.5.13-050513-generic from 
https://kernel.ubuntu.com/~kernel-ppa/mainline/v5.5.13/
as older kernels (https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=954817#17

** Bug watch added: Debian Bug tracker #954817
   https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=954817

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1868551

Title:
  Screen freezes : NULL pointer dereference i915_active_acquire since
  Linux 5.4

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1868551/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1868551] Re: Intel GPU Hangs : random screen freezing w/ Ubuntu 20.04 (Linux 5.4) i915_active_acquire

2020-03-31 Thread Guy Baconniere
** Summary changed:

- Screen freezes : NULL pointer dereference i915_active_acquire since Linux 5.4
+ Intel GPU Hangs : random screen freezing w/ Ubuntu 20.04 (Linux 5.4) 
i915_active_acquire

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1868551

Title:
  Intel GPU Hangs : random screen freezing w/ Ubuntu 20.04 (Linux 5.4)
  i915_active_acquire

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1868551/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1868551] Re: Intel GPU Hangs : random screen freezing w/ Ubuntu 20.04 (Linux 5.4) i915_active_acquire

2020-04-01 Thread Guy Baconniere
So far no crash, freeze of any kind with Linux 5.5.13 compared to the
unstability of Ubuntu 20.04 with Linux 5.4 on Dell XPS 13 with 10th
Generation Intel Core i7-10510U CPU (Comet Lake)

I guess the patches are part of Linux v5.5.12 and later
https://kernel.ubuntu.com/~kernel-ppa/mainline/v5.5.12/CHANGES

 Chris Wilson (1):
  drm/i915/execlists: Track active elements during dequeue

 Matt Roper (1):
  drm/i915: Handle all MCR ranges

 Caz Yokoyama (1):
  Revert "drm/i915/tgl: Add extra hdc flush workaround"

Maybe Canonical should backport those patches to 5.4 or switch to 5.5
branch before Ubuntu 20.04 General Availability?

https://lkml.org/lkml/2020/3/22/419
https://lkml.org/lkml/2020/3/19/1779

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1868551

Title:
  Intel GPU Hangs : random screen freezing w/ Ubuntu 20.04 (Linux 5.4)
  i915_active_acquire

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1868551/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1868551] Re: Intel GPU Hangs : random screen freezing w/ Ubuntu 20.04 (Linux 5.4) i915_active_acquire

2020-04-05 Thread Guy Baconniere
Linux Kernel 5.5.x (>5.5.12) is working fine

** Changed in: linux (Ubuntu)
   Status: Confirmed => New

** Information type changed from Public to Private

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1868551

Title:
  Intel GPU Hangs : random screen freezing w/ Ubuntu 20.04 (Linux 5.4)
  i915_active_acquire

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1868551/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1701068] Re: motd.ubuntu.com currently shows media item (HBO's Silicon Valley using Ubuntu)

2020-06-29 Thread Guy Baconniere
motd-news is part base-files so it cannot be removed from Ubuntu Desktop, 
Server or Core.
if you need to report a bug use 
https://bugs.launchpad.net/ubuntu/+source/base-files/+filebug

On my point of view, motd-news is a Telemetry tool hidden in a Message of the 
Day (MOTD)
serving Ads for Canonical products (kubernetes, snap, lxd, etc.). On top of 
that it represents
a risk of security and privacy because curl is launched as root and your IP and 
private
information such as CPU model, CPU usage (idle time), uptime, Kernel version 
are transmitted
without consent (and regardless of any kind of approval) to Canonical. 

https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1701068

Title:
  motd.ubuntu.com currently shows media item (HBO's Silicon Valley using
  Ubuntu)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1701068/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background

2020-07-03 Thread Guy Baconniere
** Attachment added: "motd.ubuntu.com current Advertising for Canonical 
Products"
   
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+attachment/5389475/+files/ubuntu-desktop-2004-translate.png

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1867424

Title:
  motd-news transmitting private hardware data without consent or
  knowledge in background

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background

2020-07-03 Thread Guy Baconniere
** Attachment added: "motd-news ENABLED by default with telemetry every 12h 
Without Consent"
   
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+attachment/5389471/+files/ubuntu-desktop-2004-terminal2.png

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1867424

Title:
  motd-news transmitting private hardware data without consent or
  knowledge in background

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background

2020-07-03 Thread Guy Baconniere
** Attachment added: "Privacy has not opt-out for motd-news hidden telemetry in 
User-Agent"
   
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+attachment/5389470/+files/ubuntu-desktop-2004-privacy.png

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1867424

Title:
  motd-news transmitting private hardware data without consent or
  knowledge in background

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background

2020-07-03 Thread Guy Baconniere
** Attachment added: "Trying to remove motd-news via base-files will kill 
Ubuntu"
   
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+attachment/5389481/+files/ubuntu-desktop-2004-system-failure2.png

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1867424

Title:
  motd-news transmitting private hardware data without consent or
  knowledge in background

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background

2020-07-03 Thread Guy Baconniere
** Attachment added: "No, don't send system info NOT RESPECTED BY MOTD-NEWS"
   
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+attachment/5389468/+files/ubuntu-desktop-2004-optout.png

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1867424

Title:
  motd-news transmitting private hardware data without consent or
  knowledge in background

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background

2020-07-03 Thread Guy Baconniere
** Attachment added: "motd-news exfiltrate system information via User-Agent 
and IP Address every 12 hours Without Consent"
   
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+attachment/5389482/+files/ubuntu-desktop-2004-motd-news.png

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1867424

Title:
  motd-news transmitting private hardware data without consent or
  knowledge in background

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background

2020-07-03 Thread Guy Baconniere
** Attachment added: "Legal Notice DOES NOT COVER "motd-news" sending IP 
address, Uptime, Idle time every 12h motd-news.service started during 
installation Ubuntu Desktop 20.04 Without Consent"
   
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+attachment/5389469/+files/ubuntu-desktop-2004-legal.png

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1867424

Title:
  motd-news transmitting private hardware data without consent or
  knowledge in background

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background

2020-07-03 Thread Guy Baconniere
** Attachment added: "Sample motd.ubuntu.com Ads from 2020"
   
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+attachment/5389477/+files/ubuntu-desktop-2004-waybackmachine2.png

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1867424

Title:
  motd-news transmitting private hardware data without consent or
  knowledge in background

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background

2020-07-03 Thread Guy Baconniere
** Attachment added: "motd.ubuntu.com is up since 2017"
   
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+attachment/5389476/+files/ubuntu-desktop-2004-waybackmachine.png

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1867424

Title:
  motd-news transmitting private hardware data without consent or
  knowledge in background

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background

2020-07-03 Thread Guy Baconniere
** Attachment added: "Sample motd.ubuntu.com Ads from 2017"
   
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+attachment/5389478/+files/ubuntu-desktop-2004-waybackmachine3.png

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1867424

Title:
  motd-news transmitting private hardware data without consent or
  knowledge in background

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background

2020-07-03 Thread Guy Baconniere
** Attachment added: "motd-news is unremovable"
   
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+attachment/5389480/+files/ubuntu-desktop-2004-system-failure1.png

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1867424

Title:
  motd-news transmitting private hardware data without consent or
  knowledge in background

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background

2020-07-03 Thread Guy Baconniere
** Attachment added: "Sample motd.ubuntu.com Ads from 2019"
   
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+attachment/5389479/+files/ubuntu-desktop-2004-waybackmachine4.png

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1867424

Title:
  motd-news transmitting private hardware data without consent or
  knowledge in background

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background

2020-07-03 Thread Guy Baconniere
** Attachment added: "motd.ubuntu.com hosted in the Amazon EC2 cloud in Dublin, 
Leinster, Ireland"
   
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+attachment/5389474/+files/ubuntu-desktop-2004-terminal4.png

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1867424

Title:
  motd-news transmitting private hardware data without consent or
  knowledge in background

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background

2020-07-03 Thread Guy Baconniere
No updates from Canonical's legal departement

"A picture is worth a thousand words"




** Attachment added: "motd-news.service started during installation Ubuntu 
Desktop 20.04 Without Consent"
   
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+attachment/5389467/+files/ubuntu-desktop-2004.png

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1867424

Title:
  motd-news transmitting private hardware data without consent or
  knowledge in background

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background

2020-07-03 Thread Guy Baconniere
** Attachment added: "motd-news force to run via motd-news.service and 
motd-news.timer"
   
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+attachment/5389472/+files/ubuntu-desktop-2004-terminal3.png

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1867424

Title:
  motd-news transmitting private hardware data without consent or
  knowledge in background

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background

2020-07-03 Thread Guy Baconniere
https://news.softpedia.com/news/canonical-under-fire-for-putting-ads-in-the-ubuntu-motd-530372.shtml

Article like "Canonical Under Fire for Putting Ads in the Ubuntu MOTD"
miss the point that motd-news is not only displaying Advertising in the login 
prompt but it a Privacy Nightmare because it has an hidden Telemetry feature 
which is enabled by default Without Consent and leak IP Address, System 
critical informations (Kernel Version, Uptime, CPU Vendor, CPU Model, Idle 
Time, Uptime) every 12 hours via User-Agent from curl on all Ubuntu Desktop and 
Ubuntu Server including the current version of Ubuntu. 

On top of that, motd-news is also a security nightmare as it runs curl
as root which can be exploited to gain root on any servers, laptops etc.

I recommend that all Ubuntu users open a Terminal and execute the
following

sudo sed -i -r 's/(ENABLED)=.+/\1=0/' /etc/default/motd-news
sudo apt-get -qq -y purge curl

N.B. curl is not installed if you explicitly select Ubuntu Minimal
during the installation of Ubuntu Desktop so motd-news cannot contact
motd.ubuntu.com without curl even if ENABLED=1 by default

GDPR : EU's General Data Protection Regulation since daily reporting of
computer's infos are proceeded without the user's consent. Cf. GDPR
application comments [https://gdpr.eu/eu-gdpr-personal-data/], in
particular with respect to Recital 30 [https://gdpr.eu/recital-30
-online-identifiers-for-profiling-and-identification/]

Internet protocol (IP) addresses; information that is related to an
individual’s tools, applications, or devices, like their computer.

Canonical Ltd. has handled my personal information without concent.
By collecting twice a day the following informations:

- The public IP address where Ubuntu system is used (part of the log of the 
HTTPS server)
- Date / Time when collected (part of the log of the HTTPS server)
- Harware info such as CPU Vendor and Model (via /proc/cpuinfo)
- The distribution version (via /etc/lsb-release)
- The operating system (via uname -o)
- The Linux kernel release (via uname -r)
- The computer architecture aka machine hardware name (via uname -m)
- Cloud Hosting: cloud identifier such as aws, gce, azure, lxd (via cloud-id 
part of cloud-init)
- Total number of seconds the system has been up (via /proc/uptime)
- The sum of how much time each core has spent idle in seconds (via 
/proc/uptime)
- Version of curl software (launched as root which is a bad IT practice and a 
security risk)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1867424

Title:
  motd-news transmitting private hardware data without consent or
  knowledge in background

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background

2020-06-04 Thread Guy Baconniere
** Tags added: bionic cosmic disco

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1867424

Title:
  motd-news transmitting private hardware data without consent or
  knowledge in background

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background

2020-06-04 Thread Guy Baconniere
This ticket should be updated to Security issue +250 points

I highly doubt that this Motd News "feature" is compliant with EU's
General Data Protection Regulation since daily reporting of computer's
infos are proceeded without the user's consent. Cf. GDPR application
comments [https://gdpr.eu/eu-gdpr-personal-data/], in particular with
respect to Recital 30 [https://gdpr.eu/recital-30-online-identifiers-
for-profiling-and-identification/]

Internet protocol (IP) addresses; information that is related to an
individual’s tools, applications, or devices, like their computer.

Daily report of computer's private infos without the users consent


It affects Ubuntu Servers and Desktop (including roaming computers like laptops)
since at least 18.04 LTS and also the current 20.04 LTS

Sensible data sent
- IP address of the computer running Ubuntu
- Date of the HTTPS query
- Kernel Version
- CPU Vendor and Model
- Uptime
- Cloud identifier
- Version of Curl so version of Ubuntu running ...

$curl_ver $lsb $platform $cpu $uptime $cloud_id

Sample from our PC Engines running Ubuntu 18.04 LTS:
```
curl/7.58.0-2ubuntu3.8 GNU/Linux/4.15.0-101-generic/x86_64 AMD/GX-412TC/SOC 
uptime/692518.54/2755023.47 cloud_id/unknown
```

https://motd.ubuntu.com/ 
```
 * MicroK8s gets a native Windows installer and command-line integration.

 https://ubuntu.com/blog/microk8s-installers-windows-and-macos
```

The perfect opportunity to map all Ubuntu Linux users worldwide on a
daily basis?

https://gdpr.eu/eu-gdpr-personal-data/
https://gdpr.eu/checklist/

See also
https://askubuntu.com/questions/1105825/why-lubuntu-18-04-calls-amazon-servers-motd-ubuntu-com

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1867424

Title:
  motd-news transmitting private hardware data without consent or
  knowledge in background

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background

2020-06-04 Thread Guy Baconniere
Anyone privacy-conscious using any version of Ubuntu should do this in a shell 
ASAP

sudo sed -i -r 's/(ENABLED)=.+/\1=0/' /etc/default/motd-news

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1867424

Title:
  motd-news transmitting private hardware data without consent or
  knowledge in background

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background

2020-06-04 Thread Guy Baconniere
Thanks security-conscious Dustin Kirkland for this great bash script 
("I've insisted on shell here for transparency! - Dustin ")
and other contributions like NSA's SELinux or security sensible
software like Pollinate  (Entropy-as-a-Service in the cloud) via
https://entropy.ubuntu.com

Packing so many sensible info inside User-Agent sent daily by default
from all Ubuntu to https://motd.ubuntu.com is brillant!

less /etc/update-motd.d/50-motd-news
```
#50-motd-news - print the live news from the Ubuntu wire
#Copyright (C) 2016-2017 Canonical Ltd.
#Copyright (C) 2016-2017 Dustin Kirkland

##
# This program could be rewritten in C or Golang for faster performance.
# Or it could be rewritten in Python or another higher level language
# for more modularity.
# However, I've insisted on shell here for transparency!
# - Dustin
##

# Curl browser version, for debug purposes
curl_ver="$(dpkg -l curl | awk '$1 == "ii" { print($3); exit(0); }')"

# Distribution version, for messages releated to this Ubuntu release
. /etc/lsb-release
lsb=$(echo "$DISTRIB_DESCRIPTION" | sed -e "s/ /\//g")
codename="$DISTRIB_CODENAME"

# Kernel version and CPU type, for messages related to a particular revision or 
hardware
platform="$(uname -o)/$(uname -r)/$(uname -m)"
arch="$(uname -m)"
cpu="$(grep -m1 "^model name" /proc/cpuinfo | sed -e "s/.*: //" -e 
"s:\s\+:/:g")"
cloud_id="unknown"
if [ -x /usr/bin/cloud-id ]; then
/usr/bin/cloud-id > "$CLOUD" 2>/dev/null
if [ $? -eq 0 ]; then
# sanitize it a bit, just in case
cloud_id=$(cut -c -40 "${CLOUD}" | tr -c -d '[:alnum:]')
if [ -z "${cloud_id}" ]; then
cloud_id="unknown"
fi
fi
fi

# Some messages may only be pertinent before or after some amount of uptime
read up idle < /proc/uptime
uptime="uptime/$up/$idle"

# Piece together the user agent
USER_AGENT="curl/$curl_ver $lsb $platform $cpu $uptime cloud_id/$cloud_id"

...

# Fetch and print the news motd
if curl --connect-timeout "$WAIT" --max-time "$WAIT" -A "$USER_AGENT" 
-o- "$u" >"$NEWS" 2>"$ERR"; then

```

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1867424

Title:
  motd-news transmitting private hardware data without consent or
  knowledge in background

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background

2020-06-04 Thread Guy Baconniere
Well known... 
https://twitter.com/search?q=ubuntu%20motd-news&src=typed_query&f=live

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1867424

Title:
  motd-news transmitting private hardware data without consent or
  knowledge in background

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background

2020-06-04 Thread Guy Baconniere
Part of the base OS ... resistance is futile

dpkg -L base-files | grep motd-news
/etc/default/motd-news
/etc/update-motd.d/50-motd-news
/lib/systemd/system/motd-news.service
/lib/systemd/system/motd-news.timer

sudo grep news /var/log/syslog
Jun  4 04:44:22 mbx 50-motd-news[94986]:  * MicroK8s gets a native Windows 
installer and command-line integration.
Jun  4 04:44:22 mbx 50-motd-news[94986]:  
https://ubuntu.com/blog/microk8s-installers-windows-and-macos
Jun  4 04:44:22 mbx systemd[1]: motd-news.service: Succeeded.
Jun  4 08:57:00 mbx systemd[1]: motd-news.timer: Succeeded.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1867424

Title:
  motd-news transmitting private hardware data without consent or
  knowledge in background

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background

2020-06-04 Thread Guy Baconniere
Please give the Message of the Day (MOTD) every time I get online on the 
Internet 
or I reboot my Ubuntu computer ...

Hold on, connecting to Amazon Cloud (Amazon Data Services)
motd.ubuntu.com ...

Your message of the day is

Building Trust is Hard, Breaking Trust is Easy

In exchange, please give me your User-Agent will all your private informations
so I know who you are (IP, Ubuntu Cloud ID, Linux Kernel Version, Curl version, 
etc.)

GET /bionic/x86_64 HTTP/1.1
Host: motd.ubuntu.com
User-Agent: curl/7.58.0-2ubuntu3.8 Ubuntu/18.04.3/LTSGNU/Linux/4.15.0-72-generic
/x86_64 Intel(R)/Core(TM)/i5-8500B/CPU/@/3.00GHz uptime/108266.13/21
2047.71 cloud_id/unknown
Accept: */*

https://ma.ttias.be/what-exactly-being-sent-ubuntu-motd/

[Unit]
Description=Message of the Day
After=network-online.target
Documentation=man:update-motd(8)

[Service]
Type=oneshot
ExecStart=/etc/update-motd.d/50-motd-news --force

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1867424

Title:
  motd-news transmitting private hardware data without consent or
  knowledge in background

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background

2020-06-04 Thread Guy Baconniere
Thanks Canonical for this great Telemetry master piece
hidden in a Daily "News" (Message of the Day) deep inside
the core of Ubuntu.

I found it active on all the Ubuntu laptop of my friends
and coworkers, all Ubuntu servers from local ISP and my
work. As well as on all Ubuntu flavours and Ubuntu derived
Linux distros.

It is also present in cloud-init images of major cloud providers,
and all Docker images from Docker Registry based on Ubuntu.

What a (s)hell for transparency!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1867424

Title:
  motd-news transmitting private hardware data without consent or
  knowledge in background

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background

2020-06-05 Thread Guy Baconniere
This is more than just a Telemetry, It as a Trojan in Ubuntu Distro.

A remote code-execution (RCE) vulnerability 
in all Ubuntu of the world!  Why?

Simple

curl is launched as root (not the best practice!),
and Ubuntu Distro fetch https://motd.ubuntu.com multiple times per day
if someone (like 3-letters or 4 letters) controls this Amazon Web server
knowing the version of curl (provided by the script) exploit any local
known vulnerability present in curl or use a curl zero day it will have
"root" access to any Ubuntu Server or Desktop, Laptop of the world!

Proof of Concept

Add the following before the for calling curl in /etc/update-motd.d/50
-motd-news

date +'%Y-%m-%d %H:%M:%S' >> /tmp/test
whoami >> /tmp/test
echo $USER_AGENT >> /tmp/test

wait 12 hours... or 12:00 / 00:00 or reboot

cat /tmp/test

2020-06-05 12:00:00
root
curl/7.68.0-1ubuntu2 Ubuntu/20.04/LTS GNU/Linux/**-generic/x86_64 
Intel(R)/Core(TM)/i7-**/CPU/@/*GHz uptime/70.55/921.20 cloud_id/unknown

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1867424

Title:
  motd-news transmitting private hardware data without consent or
  knowledge in background

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background

2020-06-05 Thread Guy Baconniere
motd-news is present in Nvidia Jetson Nano (derived from Ubuntu)
and Ubuntu for Raspberry Pi. It is enabled by default and also calling Home
Ubuntu via Amazon Cloud.

motd-news is also present in Ubuntu Core 18 for embedded systems (like Tesla 
Car)
but unlike Ubuntu Server and Desktop Distro it is not enabled by default.
I don't have a Tesla car to verify if it is enabled or not.

unxz ubuntu-core-18-amd64.img.xz
sudo mount -o loop,offset=$((106496*512)) ubuntu-core-18-amd64.img /mnt/
sudo unsquashfs -d /tmp/core18 
/mnt/system-data/var/lib/snapd/seed/snaps/core18_1668.snap
/tmp/core18/etc/default/motd-news
/tmp/core18/etc/update-motd.d/50-motd-news
/tmp/core18/lib/systemd/system/timers.target.wants/motd-news.timer
/tmp/core18/var/lib/systemd/deb-systemd-helper-enabled/motd-news.timer.dsh-also
/tmp/core18/var/lib/systemd/deb-systemd-helper-enabled/timers.target.wants/motd-news.timer

sudo grep ENABLED /tmp/core18/etc/default/motd-news 
ENABLED=0

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1867424

Title:
  motd-news transmitting private hardware data without consent or
  knowledge in background

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background

2020-06-05 Thread Guy Baconniere
The original request for motd-news came from Dustin Kirkland on
2016-10-30

https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1637800

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1867424

Title:
  motd-news transmitting private hardware data without consent or
  knowledge in background

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background

2020-06-05 Thread Guy Baconniere
I recommend the following action points to restore a bit of trust in Ubuntu 
Product 
after the introduction of motd-news by Dustin Kirkland (Ex- VP Product at 
Canonical)

- Run all motd scripts including motd-news AND curl as non privileged
account -- not as root

- Move motd-news functionality from base-files to a removable package
called motd-news

- Set ENABLED to 0 by default on all Ubuntu Distos or at least ask the user 
consent 
  (during install and later with cloud-init)

- Remove private information from User-Agent (uptime, kernel version,
curl version, type of cloud) and stop using HTTPS Header such User-Agent
as proxy to exfiltrate sensible infos from Ubuntu

- Make the code behind https://motd.ubuntu.com auditable, signed and
open source

- Check the logs of https://motd.ubuntu.com if it has been compromised
the last 3 years if it is the case report it so people can reinstall
their Ubuntu Server, Desktop, Laptop to restore trust

Currently Ubuntu users are trapped as they can only disable motd-news but not 
uninstall it
and any software update of base-files could bring back the security issue.

Anyone who has access to motd.ubuntu.com (or via DNS + MITM) could in
theory execute code on any Ubuntu if a serious vulnerability in curl has
been found or if the user did not update curl.

Running curl as root, reporting the curl version and the kernel version
give all the information needed to implemented a persistent backdoor in
any Ubuntu worldwide.

sudo apt-get purge base-files

WARNING: The following essential packages will be removed.
This should NOT be done unless you know exactly what you are doing!
  base-files bash
0 upgraded, 0 newly installed, 5 to remove and 26 not upgraded.
After this operation, 4,525 kB disk space will be freed.
You are about to do something potentially harmful.
To continue type in the phrase 'Yes, do as I say!'
 ?]

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1867424

Title:
  motd-news transmitting private hardware data without consent or
  knowledge in background

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background

2020-06-05 Thread Guy Baconniere
I don't think it was safe decision to link the security of Ubuntu 
base OS to curl running as root every 12 hours via motd-news just
to display Ads for products and not important security messages
like suggested in the original ticket (1637800).

Just imagine the consequence of https://motd.ubuntu.com being compromised 
starts to redirect to a TFTP URL and send private memory contents
from root account every 12 hours or if curl has a new vulnerability 
such as buffer overflow discovered automatically by Google's OSS-Fuzz 
and not yet patched within 30 days by curl maintainers or by 
Ubuntu Security Team.

https://curl.haxx.se/docs/CVE-2017-1000100.html

A malicious HTTP(S) server could redirect a vulnerable libcurl-using client 
to a crafted TFTP URL (if the client hasn't restricted which protocols it 
allows redirects to) and trick it to send private memory contents to a 
remote server over UDP.

https://bugs.chromium.org/p/oss-
fuzz/issues/list?q=curl&can=1&sort=-reported


** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-1000100

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1867424

Title:
  motd-news transmitting private hardware data without consent or
  knowledge in background

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background

2020-06-07 Thread Guy Baconniere
The usage of motd-news as Advertising media for Canonical products is well 
documented.
Now we need to know if Canonical share the crafted User-Agent with sensible 
info in it with third party and use it for telemetry like Microsoft Windows 10.

Samples output of motd-news mirrored in both login prompt via motd and
syslog

- MicroK8s gets a native Windows installer and command-line integration.
  https://ubuntu.com/blog/microk8s-installers-windows-and-macos

- How HBO's Silicon Valley built "Not Hotdog" with mobile TensorFlow,
Keras & React Native on Ubuntu

- Overheard at KubeCon: "microk8s.status just blew my mind".
  https://microk8s.io/docs/commands#microk8s.status

https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1701068

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1867424

Title:
  motd-news transmitting private hardware data without consent or
  knowledge in background

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1637800] Re: add a motd script for news

2020-06-08 Thread Guy Baconniere
motd-news vs privacy / security / telemetry

https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1637800

Title:
  add a motd script for news

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1637800/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background

2020-06-08 Thread Guy Baconniere
All messages received over a year (Ubuntu 18.04):

* Congrats to the Kubernetes community on 1.16 beta 1! Now available
* Kata Containers are now fully integrated in Charmed Kubernetes 1.16!
* Keen to learn Istio? It's included in the single-package MicroK8s.
* Kubernetes 1.18 GA is now available! See https://microk8s.io for docs or
* Latest Kubernetes 1.18 beta is now available for your laptop, NUC, cloud
* MicroK8s 1.15 is out! It has already been installed on more
* MicroK8s 1.15 is out! Thanks to all 40 contributors, you get the latest
* MicroK8s passes 9 million downloads. Thank you to all our contributors!
* Multipass 1.0 is out! Get Ubuntu VMs on demand on your Linux, Windows or
* Multipass 1.1 adds proxy support for developers behind enterprise
* Overheard at KubeCon: "microk8s.status just blew my mind".
* 'snap info' now shows the freshness of each channel.
* Ubuntu 20.04 LTS is out, raising the bar on performance, security,
* Ubuntu's Kubernetes 1.14 distributions can bypass Docker and use containerd

None of them are about security and none of them are customized
using uptime, ubuntu version, kernel version, curl version, ip, ...

Why do pack all this into User-Agent which can be linked to public IP
every 12 hours?


** Attachment added: "motd-news.txt"
   
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+attachment/5381565/+files/motd-news.txt

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1867424

Title:
  motd-news transmitting private hardware data without consent or
  knowledge in background

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background

2020-06-10 Thread Guy Baconniere
Privacy:

Ubuntu users don't have the opportunity to opt-out from motd-news before all 
the private infos
and telemetry are sent via User-Agent. So even if people change ENABLED=1 to 
ENABLED=0
in /etc/default/motd-news they only stop future leaks but the initial leak has 
already been
done in background after the boot via systemd/motd-news service.

I repeat, this doesn't look GRPD-compliant at all. There is no prior consent 
ever asked for.
The GDPR was adopted on 14 April 2016, and became enforceable beginning 25 May 
2018.

motd-news has been designed in 2017 and is enabled by default on all Ubuntu 
Server, 
Ubuntu Desktop, Ubuntu Flavors (such as Mate, Raspberry), Ubuntu derived such 
as Nvidia Jetson Nano
without prior consent.

Security:

Run curl as root every 12h are you serious?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1867424

Title:
  motd-news transmitting private hardware data without consent or
  knowledge in background

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background

2020-06-11 Thread Guy Baconniere
https://github.com/curl/curl/issues/5557


** Bug watch added: github.com/curl/curl/issues #5557
   https://github.com/curl/curl/issues/5557

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1867424

Title:
  motd-news transmitting private hardware data without consent or
  knowledge in background

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background

2020-06-12 Thread Guy Baconniere
Maybe as manager of the Ubuntu Server team, you should ask to improve motd-news 
software
to not curl as root.

You should also improve landscape and landscape on premises level of access so 
any users
cannot list all processes and reboot any servers or execute shell script as 
root.

Good luck, I think we are done with Ubuntu.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1867424

Title:
  motd-news transmitting private hardware data without consent or
  knowledge in background

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background

2020-06-12 Thread Guy Baconniere
By the current design, you don't give choice to the Ubuntu users as they cannot 
opt-out BEFORE
the laptop or server contacts motd.ubuntu.com sending the telemetry. By 
implementing it as
essential package, you don't let user remove it but only disable it when it is 
too late.

The same apply to landscape, you don't give choice to disable some dangerous 
features 
like executing very powerful script, list all processes, etc. This is why, we 
decided to stop 
using landscape (both in the cloud and on premises).

It will be your responsibility as Ubuntu Server manager, if motd.ubuntu.com 
gets compromised
and motd-news is exploited because it runs curl as root and all Ubuntu servers 
could get
compromised at the same time within 12 hours.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1867424

Title:
  motd-news transmitting private hardware data without consent or
  knowledge in background

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background

2020-06-12 Thread Guy Baconniere
And don't tell me that the fact that Canonical use motd as Telemetry was done 
transparently, 
with clear documentation... most users complain only about the advertising but 
don't realize
that the motd-news is used as telemetry tool but seems to act as a advertising 
/ news purpose
and the risk of the bad design decision of running curl as root.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1867424

Title:
  motd-news transmitting private hardware data without consent or
  knowledge in background

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background

2020-06-12 Thread Guy Baconniere
Best practices by Dustin Kirkland
https://manpages.ubuntu.com/manpages/focal/en/man5/update-motd.5.html

- No mention of curl running as root
- No mention of the exfiltration of private data done via User-Agent
- No mention of the novel concept of advertising via motd 
- No mention of using motd-news as telemetry
- No mention that motd-news is part of core Ubuntu "base-files" and cannot be 
removed

Feel free to guide me to the correct info on your website or update your
documentation.

Additional discussions on Twitter
https://twitter.com/lusis/status/880446088083329024
https://twitter.com/astarrb/status/880170781841514496
https://twitter.com/lelff/status/1210619413885575168
https://twitter.com/hessu/status/1269994718018056199
https://twitter.com/nikitonsky/status/1073714951104184320
https://twitter.com/wamdamdam/status/1044197012353298433
https://twitter.com/marcodavids/status/1245054456955314178
...

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1867424

Title:
  motd-news transmitting private hardware data without consent or
  knowledge in background

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background

2020-06-14 Thread Guy Baconniere
I have decided to contact ICO (Information Commissioner's Office).

Because Canonical Ltd. has handled my personal information 
(IP address, Hardware CPU, Choice of Cloud Hosting, and various meta-data) 
and the one of the company I work for without concent.

The same apply to all users of Ubuntu (persons, companies, governements)
worldwide on a daily basis.

By collecting twice a day the following informations:

- The public IP address where Ubuntu system is used (part of the log of the 
HTTPS server)
- Date / Time when collected (part of the log of the HTTPS server)
- Harware info such as CPU Vendor and Model (via /proc/cpuinfo)
- The distribution version (via /etc/lsb-release)
- The operating system (via uname -o)
- The Linux kernel release (via uname -r)
- The computer architecture aka machine hardware name (via uname -m)
- Cloud Hosting: cloud identifier such as aws, gce, azure, lxd (via cloud-id 
part of cloud-init)
- Total number of seconds the system has been up (via /proc/uptime)
- The sum of how much time each core has spent idle in seconds (via 
/proc/uptime)
- Version of curl software (launched as root which is a bad IT practice and a 
security risk)

On top of that by making motd-news unremovable in the core of Ubuntu's 
base-files 
(like it was the case for Internet Explorer in Windows or the Telemery in 
Windows 10), 
they enforce the telemetry before you can disable it or opt-out from it.

Fell free to fill your own complaint or contact your local information 
commissioner
as this ticket is marked as Won't Fix by the manager of the Ubuntu Server team.

https://ico.org.uk/make-a-complaint/your-personal-information-concerns
/personal-information-complaint/

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1867424

Title:
  motd-news transmitting private hardware data without consent or
  knowledge in background

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background

2020-06-14 Thread Guy Baconniere
I will first contact the Data Protection Officer (DPO) of Canonical Group 
Limited
dataprotect...@canonical.com

https://ubuntu.com/legal/data-privacy

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1867424

Title:
  motd-news transmitting private hardware data without consent or
  knowledge in background

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background

2020-06-20 Thread Guy Baconniere
FYI Canonical's legal departement is reviewing motd-news "feature" (such as 
telemetry)
and will provide updated information next week.

All motd-news related tickets

https://bugs.launchpad.net/ubuntu/+source/base-
files/+bugs?field.searchtext=motd-
news&orderby=-datecreated&search=Search&field.status%3Alist=NEW&field.status%3Alist=OPINION&field.status%3Alist=INVALID&field.status%3Alist=WONTFIX&field.status%3Alist=EXPIRED&field.status%3Alist=CONFIRMED&field.status%3Alist=TRIAGED&field.status%3Alist=INPROGRESS&field.status%3Alist=FIXCOMMITTED&field.status%3Alist=FIXRELEASED&field.status%3Alist=INCOMPLETE_WITH_RESPONSE&field.status%3Alist=INCOMPLETE_WITHOUT_RESPONSE

"Canonical has launched the Ubuntu Appliance initiative which aims to
transform Raspberry Pi devices or personal computers into secure, self-
updating solutions" (source 9to5linux). I checked nextcloud-
core18-pi.img (and core18_1753.snap), motd-news is still present but
turned off by default -- Good! ENABLED=0 in the file /etc/default/motd-
news. I hope Canonical will apply "Secure by design" motto to the rest
of Ubuntu products https://ubuntu.com/appliance

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1867424

Title:
  motd-news transmitting private hardware data without consent or
  knowledge in background

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1868551] Re: Intel GPU Hangs : random screen freezing w/ Ubuntu 20.04 (Linux 5.4) i915_active_acquire

2020-04-15 Thread Guy Baconniere
https://kernel.ubuntu.com/~kernel-ppa/mainline/v5.4.32/CHANGES

https://patchwork.ozlabs.org/project/ubuntu-
kernel/patch/20200407222740.7671-2-sultan.alsa...@canonical.com/

Note that this bug only affects 5.4 and has since been fixed in 5.5.
Normally, a backport of the fix from 5.5 would be in order, but the
patch set that fixes this deadlock involves massive changes that are
neither feasible nor desirable for backporting [1][2][3]. Therefore,
this small patch was made to address the deadlock specifically for 5.4.

** Information type changed from Private to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1868551

Title:
  Intel GPU Hangs : random screen freezing w/ Ubuntu 20.04 (Linux 5.4)
  i915_active_acquire

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1868551/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1868551] Re: Intel GPU Hangs : random screen freezing w/ Ubuntu 20.04 (Linux 5.4) i915_active_acquire

2020-04-21 Thread Guy Baconniere
As 5.5 is more stable on my Dell XPS 13 than 5.4 with Intel iGPU (i915)
I did the following one-liner to install the latest version of Linux Kernel 5.5 
on Ubuntu 20.04

which curl >/dev/null 2>&1 || sudo apt-get install -qq -y curl; for
version in $(curl -sL https://kernel.ubuntu.com/~kernel-ppa/mainline/ |
tac | grep -Pom1 '(?<=")v5\.5\.[0-9]+/'); do for deb in $(curl -sL
https://kernel.ubuntu.com/~kernel-ppa/mainline/${version} | grep -Pom4
'(?<=")linux-(headers|image-
unsigned|modules)-5\.5\.[^"]+[0-9]+(-generic_5\.5\.|_5\.5\.)[^"]+.(amd64|all)\.deb');
do curl -sLo ${deb} https://kernel.ubuntu.com/~kernel-
ppa/mainline/${version}/${deb}; debs="${debs} ${deb}"; done; sudo dpkg
-i ${debs}; done

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1868551

Title:
  Intel GPU Hangs : random screen freezing w/ Ubuntu 20.04 (Linux 5.4)
  i915_active_acquire

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1868551/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1868551] Re: Intel GPU Hangs : random screen freezing w/ Ubuntu 20.04 (Linux 5.4) i915_active_acquire

2020-05-18 Thread Guy Baconniere
Regarding #28

"on 20.04 LTS and v5.6 is not working properly with WiFi."

When I first tested Kernel 5.6 branch, the WiFi was broken because of this:
https://linuxreviews.org/Linux_5.6.2_Is_Released_With_Intel_Wifi_Fix

Now it is working again with the current 5.6 branch.

Kernel 5.5 is now EOL (as of 5.5.19 end of April)
https://en.wikipedia.org/wiki/Linux_kernel_version_history#Releases_5.x.y

Intel should do better QA for their iGPU and WiFi 
and try to port it to all stable LTS branches aka 5.4.x and 5.6.x

If you still have issues with Intel i915 on 5.4.x, you can use
the following one-liner to install 5.6.x

which curl >/dev/null 2>&1 || sudo apt-get install -qq -y curl; for
version in $(curl -sL https://kernel.ubuntu.com/~kernel-ppa/mainline/ |
tac | grep -Pom1 '(?<=")v5\.6\.[0-9]+/'); do for deb in $(curl -sL
https://kernel.ubuntu.com/~kernel-ppa/mainline/${version} | grep -Pom4
'(?<=")linux-(headers|image-
unsigned|modules)-5\.6\.[^"]+[0-9]+(-generic_5\.6\.|_5\.6\.)[^"]+.(amd64|all)\.deb');
do curl -sLo ${deb} https://kernel.ubuntu.com/~kernel-
ppa/mainline/${version}/${deb}; debs="${debs} ${deb}"; done; sudo dpkg
-i ${debs}; done

If you need to go back to legacy Ubuntu 20.04 LTS Kernel and remove
Linux Kernel 5.5 and 5.6

dpkg --get-selections | awk '/linux-.*-5\.[5-6]/ { print $1 }' | xargs
echo sudo apt-get purge -y

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1868551

Title:
  Intel GPU Hangs : random screen freezing w/ Ubuntu 20.04 (Linux 5.4)
  i915_active_acquire

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1868551/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background

2020-07-13 Thread Guy Baconniere
https://ico.org.uk/make-a-complaint/your-personal-information-concerns/

To: ICO

Dear Information Commissioner’s Office,

I confirm that I want to proceed with the creation of the case about
Canonical's motd-news as Canonical don't want to remediate the privacy 
issue of sending by default hardware details and public IP of all 
Ubuntu Desktop and Ubuntu Server twice a day, every day of the year.

Next to this message, you will find the final answer from Canonical.

https://ubuntu.com/legal/motd

The following are my comments on their legal information.

"The purpose of sending the system information is so that Canonical can
tailor the message returned by https://motd.canonical.com.";

This is wrong motd.canonical.com does not exist and is part of motd-news.
The server used by Ubuntu is https://motd.ubuntu.com

lynx -mime_header https://motd.canonical.com

Looking up motd.canonical.com
Unable to locate remote host motd.canonical.com.
Alert!: Unable to connect to remote host.

The evidence is part of the Ticket
https://launchpadlibrarian.net/487032881/ubuntu-desktop-2004-motd-news.png

"None of this data can be used to identify a machine or user."

"Along with this data, the IP address and other network information is
transmitted to facilitate communication on the internet from the Ubuntu
machine to Canonical. This information is not stored by Canonical."

This is wrong as Canonical is using Apache and the default is to store
IP address in the access log

https://httpd.apache.org/docs/current/logs.html

Common Log Format

(%h)
 This is the IP address of the client (remote host) which
made the request to the server. If HostnameLookups is set to On, then the 
server will try to determine the hostname and log it in place of the IP 
address. However, this configuration is not recommended since it can 
significantly slow the server. Instead, it is best to use a log post-processor 
such as logresolve to determine the hostnames. The IP address reported here is 
not necessarily the address of the machine at which the user is sitting. If a 
proxy server exists between the user and the server, this address will be the 
address of the proxy, rather than the originating machine.

lynx -mime_header https://motd.ubuntu.com

HTTP/1.1 200 OK
Date: Mon, 13 Jul 2020 06:05:38 GMT
Server: Apache/2.4.18 (Ubuntu)
Last-Modified: Mon, 13 Jul 2020 06:00:50 GMT
Accept-Ranges: bytes
Content-Length: 215
Vary: Accept-Encoding
Connection: close
Content-Type: text/plain

 * "If you've been waiting for the perfect Kubernetes dev solution for
   macOS, the wait is over. Learn how to install Microk8s on macOS."

   https://www.techrepublic.com/article/how-to-install-microk8s-on-
macos/

"You can disable this service as follows:"
"/etc/default/motd-news has an ENABLED=1 setting that if set to 0 will turn off 
this functionality."

I assume 80% of Ubuntu Desktop users will not know how to disable motd-news
because they need a Terminal and sudo access. A regular editor running
a default user will not allow to edit this file as super user. So this doc
is useless. 

On top of that Canonical send motd-news information before
the user can even opt out during the installation of Ubuntu Desktop
and during the first boot of the Ubuntu Desktop operating system
so setting it is only useful to stop it but the harm is already done
and data already sent to Canonical.

Evidence https://launchpadlibrarian.net/487031151/ubuntu-
desktop-2004.png

For more information read
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424

Please also note that https://ubuntu.com/legal/motd title is not searchable
in their search engine and is not part of the legal notice during the 
installation of Ubuntu

Evidence (picture in attachment) and
https://launchpadlibrarian.net/487031391/ubuntu-desktop-2004-legal.png

"No, don't send system info" is not respected
https://launchpadlibrarian.net/487031210/ubuntu-desktop-2004-optout.png
https://launchpadlibrarian.net/487032881/ubuntu-desktop-2004-motd-news.png

Privacy does not have an option to opt out from motd-news
https://launchpadlibrarian.net/487031529/ubuntu-desktop-2004-privacy.png

 Forwarded Message 
Subject: Re: Unremovable motd-news used as Telemetry and Advertising tool 
without explicit consent
Date: Fri, 10 Jul 2020 12:00:29 +0100

Dear Guy

Thank you for your patience.

Please now see the legal notice for MOTD on Canonical's website:
https://ubuntu.com/legal/motd

I can assure you that no access to or storage of IP address data is
made.

Canonical takes data protection compliance very seriously and we
continue to review how we can improve this and other services.

Many thanks

Director of Legal & Company Secretary
Canonical
Blue Fin Building, 5th Floor
110 Southwark Street, SE1 0SU
Ubuntu - Linux for Human Beings
www.canonical.com

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1867424

Title

[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background

2020-07-13 Thread Guy Baconniere
I added https://ubuntu.com/legal/motd to Archive.org's Internet Wayback
Machine

https://web.archive.org/web/20200713070037/https://ubuntu.com/legal/motd

** Attachment added: "canonical-legal-motd.pdf"
   
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+attachment/5392271/+files/canonical-legal-motd.pdf

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1867424

Title:
  motd-news transmitting private hardware data without consent or
  knowledge in background

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background

2020-07-14 Thread Guy Baconniere
On my point of view, it's NOT enough to implement a legal notice
https://ubuntu.com/legal/motd with technical errors and it is not
possible to verify that Canonical does not store the IP address of
Ubuntu users in Apache log (the default) and/or database without an
external auditor (PwC, EY, KPMG, etc.).

Nothing has been done regarding the consent of the user.

I except one of the following two options to be implemented by
Canonical.

(A)

Ask for consent during the installation of the operating system Ubuntu
and before sharing my personal information via the motd-news software
used for Telemetry, Tracking, Advertising purpose instead of providing
meaningful "security messages or other news" on a daily basis.

(B)

Or disable it by default via ENABLED=0 in the file /etc/default/motd-
news and move motd-news software outside "base-files" package and make
it user removable.

If Canonical doesn't takes data protection seriously by implementing
technical measures such as stop calling motd-news during installation
and after automatically without consent and implement an easy way to opt
out for people without technical knowledge in linux shell then ICO will
need to evaluate the choice of Canonical of enforcing Telemetry hidden
in motd-news's User-Agent without asking user consent and not respecting
"No, don't send system info" choice of the user during the installation
wizard, sending beacons with IP address, system info twice a day, every
day from all Ubuntu Desktop and Ubuntu Server installations worldwide.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1867424

Title:
  motd-news transmitting private hardware data without consent or
  knowledge in background

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1868551] Re: Intel GPU Hangs : random screen freezing w/ Ubuntu 20.04 (Linux 5.4) i915_active_acquire

2020-05-04 Thread Guy Baconniere
I tested the test kernel 5.4 for about a day without issue
but all my computers using Intel GPU are using by default
kernel 5.5. I don't want to change that.

If you want to follow other users having the same kind of
issues with different i915 bugs on different Linux distro
follow comments on
https://linuxreviews.org/Linux_Kernel_5.5_Will_Not_Fix_The_Frequent_Intel_GPU_Hangs_In_Recent_Kernels

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1868551

Title:
  Intel GPU Hangs : random screen freezing w/ Ubuntu 20.04 (Linux 5.4)
  i915_active_acquire

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1868551/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1721987] Re: No sound from right audio channel

2019-02-25 Thread Guy Baconniere
This is my backport of Tomas Espeleta's patch to Linux 4.15.18 (linux-
source-4.15.0 / 4.15.0-45.48 available on Ubuntu 18.04.2 LTS)

** Patch added: "huawei-matebook-x-right-speaker-work-4.15.0.patch"
   
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1721987/+attachment/5241510/+files/huawei-matebook-x-right-speaker-work-4.15.0.patch

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1721987

Title:
  No sound from right audio channel

To manage notifications about this bug go to:
https://bugs.launchpad.net/linux/+bug/1721987/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1411030] Re: backport support for unix domain sockets

2016-05-12 Thread Guy Baconniere
https://httpd.apache.org/docs/trunk/mod/mod_proxy_fcgi.html

14.04 LTS has Apache 2.4.7 so you cannot use this :


# Requires Apache 2.4.9 or later 
SetHandler "proxy:unix:/var/run/php5-fpm.sock|fcgi://localhost/" 

# Requires Apache 2.4.10 and later 
SetHandler "proxy:fcgi://127.0.0.1:9000" 


So with 14.04 LTS you need to 
1. Configure each VirtualHost with
   ProxyPassMatch ^/(.*\.php(/.*)?)$ 
fcgi://127.0.0.1:9000/your_path_to/htdocs/$1
2. In PHP5-FPM, use TCP instead of Unix Domain Socket 
(/etc/php5/fpm/pool.d/www.conf)
   listen = 127.0.0.1:9000

The alternative is to use mod_fastcgi but it's part of multiverse
(disabled by default /etc/apt/sources.list)

See also
http://events.linuxfoundation.org/sites/events/files/slides/AC2014-FastCGI.pdf 

16.04 LTS is out but not all PHP applications are compatible with PHP 7
(like ibm_db2 is not yet ready https://bugs.php.net/bug.php?id=69852)


** Bug watch added: bugs.php.net/ #69852
   http://bugs.php.net/bug.php?id=69852

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1411030

Title:
  backport support for unix domain sockets

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1411030/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1527062] Re: XFS Deadlock on 4.2+

2016-07-07 Thread Guy Baconniere
FYI

I still have the issue on 3.13.0-91-generic (and 3.13.0-88-generic)
on a busy NFS server using XFS. I have this issue since 2015...

INFO: task kworker/1:2:31748 blocked for more than 120 seconds.
  Not tainted 3.13.0-91-generic #138-Ubuntu
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
kworker/1:2 D 88023f433180 0 31748  2 0x
Workqueue: xfs-log/dm-5 xfs_log_worker [xfs]
 88012f31fb70 0046 880035983000 00013180
 88012f31ffd8 00013180 880035983000 88012f31fcb8
 88012f31fcc0 7fff 880035983000 8802317e9528
Call Trace:
 [] schedule+0x29/0x70
 [] schedule_timeout+0x279/0x310
 [] wait_for_completion+0xa6/0x150
 [] ? wake_up_state+0x20/0x20
 [] flush_work+0xed/0x1b0
 [] ? wake_up_worker+0x30/0x30
 [] xlog_cil_force_lsn+0x3f/0x170 [xfs]
...

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1527062

Title:
  XFS Deadlock on 4.2+

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1527062/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1557612] [NEW] evolution: e-data-server Error opening directory '/usr/lib/evolution-data-server/credential-modules'

2016-03-15 Thread Guy Baconniere
Public bug reported:


After updating evolution to 3.18.5.1-1ubuntu1 on Ubuntu 16.04,
it stopped working:

$ evolution 
(evolution:4688): e-data-server-WARNING **: e_module_load_all_in_directory: 
Error opening directory '/usr/lib/evolution-data-server/credential-modules': No 
such file or directory

My workaround:
sudo apt-get install evolution-data-server-online-accounts 

Then it worked again.

Maybe you need to add "Depends: evolution-data-server-online-accounts  (>= 
3.18.5)" to evolution package
or remove the new depency.

** Affects: evolution (Ubuntu)
 Importance: Undecided
 Status: New

** Package changed: linux (Ubuntu) => evolution (Ubuntu)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1557612

Title:
  evolution: e-data-server Error opening directory '/usr/lib/evolution-
  data-server/credential-modules'

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/evolution/+bug/1557612/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1585614] Re: libc on 2016-05-25 causes Apache not to restart, libm.so.6: symbol __strtold_nan, version GLIBC_PRIVATE not defined in file libc.so.6 with link time reference

2016-05-26 Thread Guy Baconniere
Same issue

This morning, a security update for libc has been automatically 
deployed on all our servers running 14.04 LTS.

unattended-upgrades-dpkg_2016-05-26_06:36:05.829399.log:Unpacking 
libc6-dev:amd64
unattended-upgrades-dpkg_2016-05-26_06:36:05.829399.log:Unpacking libc-dev-bin
unattended-upgrades-dpkg_2016-05-26_06:36:05.829399.log:Unpacking libc-bin
unattended-upgrades-dpkg_2016-05-26_06:36:05.829399.log:Unpacking libc6:amd64
unattended-upgrades-dpkg_2016-05-26_06:36:05.829399.log:Unpacking 
multiarch-support

On one of our web servers (only one??) Apache (2.4.7-1ubuntu4.9) has stopped 
working
after the unattended upgrades of libc6. When Apache received the signal SIGUSR1.

This did not impact any other web server with identical version of all 
softwares 
(aligned with Ansible) ?! -- at least in the beginning of the day...

Later on at 12:52 we did "apachectl graceful" on all our web servers and
all apache servers stopped responding until we restart them with
"service apache2 restart".

[Thu May 26 06:35:36.222660 2016] [mpm_worker:notice] [pid 6318:tid 
140737354041216] 
AH00297: SIGUSR1 received.  Doing graceful restart

[Thu May 26 06:35:36.231321 2016] [:alert] [pid 16293:tid 140737354041216] 
(4)Interrupted system call: FastCGI: read() from pipe failed (0)

[Thu May 26 06:35:36.231395 2016] [:alert] [pid 16293:tid 140737354041216] 
(4)Interrupted system call: FastCGI: the PM is shutting down, Apache seems to 
have disappeared - bye
apache2: Syntax error on line 140 of /etc/apache2/apache2.conf: Syntax error on 
line 2 of /etc/apache2/mods-enabled/security2.load: Cannot load libxml2.so.2 
into server: /lib/x86_64-linux-gnu/libm.so.6: symbol __strtold_nan, version 
GLIBC_PRIVATE not defined in file libc.so.6 with link time reference

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1585614

Title:
  libc on 2016-05-25 causes Apache not to restart, libm.so.6: symbol
  __strtold_nan, version GLIBC_PRIVATE not defined in file libc.so.6
  with link time reference

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/eglibc/+bug/1585614/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1486914] [NEW] shoreall won't start, wrong runlevels

2015-08-20 Thread Guy Baconniere
Public bug reported:

Ubuntu 14.04 LTS and 15.04

Steps to reproduce:

apt-get install shorewall
vi /etc/default/shorewall
replace
startup=0
with
startup=1
cp -va 
/usr/share/doc/shorewall/examples/one-interface/{interfaces,policy,rules,zones} 
/etc/shorewall/
shorewall check
shorewall safe-restart
iptables -L -n # all rules are there
reboot
iptables -L -n # all rules are gone #FAIL

Workaround:

vi /etc/init.d/shorewall

replace

# Default-Start: S
# Default-Stop:  0 6

with

# Default-Start: 2 3 4 5
# Default-Stop:  0 1 6

sudo rm -fv /etc/rc?.d/*shorewall*
sudo update-rc.d shorewall defaults

References:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773392
http://ubuntuforums.org/showthread.php?t=2275224
https://help.ubuntu.com/community/ShorewallBasics

** Affects: shorewall (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: init shorewall

** Package changed: shorewall-common (Ubuntu) => shorewall (Ubuntu)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1486914

Title:
  shoreall won't start, wrong runlevels

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/shorewall/+bug/1486914/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1486914] Re: shoreall won't start, wrong runlevels

2015-08-20 Thread Guy Baconniere
** Description changed:

- 
  Ubuntu 14.04 LTS and 15.04
  
  Steps to reproduce:
  
  apt-get install shorewall
- vi /etc/default/shorewall 
+ vi /etc/default/shorewall
  replace
  startup=0
  with
  startup=1
  cp -va 
/usr/share/doc/shorewall/examples/one-interface/{interfaces,policy,rules,zones} 
/etc/shorewall/
+ shorewall check
  shorewall safe-restart
  iptables -L -n # all rules are there
  reboot
  iptables -L -n # all rules are gone #FAIL
  
  Workaround:
  
- vi /etc/init.d/shorewall 
+ vi /etc/init.d/shorewall
+ 
  replace
+ 
  # Default-Start: S
+ # Default-Stop:  0 6
+ 
  with
+ 
  # Default-Start: 2 3 4 5
+ # Default-Stop:  0 1 6
+ 
  sudo rm -fv /etc/rc?.d/*shorewall*
  sudo update-rc.d shorewall defaults
  
  References:
  https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773392
  http://ubuntuforums.org/showthread.php?t=2275224
  https://help.ubuntu.com/community/ShorewallBasics

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1486914

Title:
  shoreall won't start, wrong runlevels

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/shorewall/+bug/1486914/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1463023] Re: systemd Timed out waiting for device swap and file system check

2015-06-08 Thread Guy Baconniere
Please note that my swap is NOT encrypted so it's not related to bug
1440098 or 953875

** Package changed: cryptsetup (Ubuntu) => systemd (Ubuntu)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1463023

Title:
  systemd Timed out waiting for device swap and file system check

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1463023/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1463023] [NEW] systemd Timed out waiting for device swap and file system check

2015-06-08 Thread Guy Baconniere
Public bug reported:


My Ubuntu 15.04 did not start --or took so long that I switched back to upstart!

ISSUE: (systemd during the boot)

Timed out waitingfor device dev-disk-by\x2duuid-... (swap)
Dependency failed for /dev/disk/by-uuid/... (swap)
Dependency failed for Swap.
Timed out waiting for device dev-sdaX.device(swap)
Dependency failed for Swap Partition.
Failed to start udev Wait for Complete Device Initialization.
See "systemctl status systemd-udev-settle.service" for details.
Starting File System Check on Root Device...
Starting Copy rules generated while the root was ro...
(1 of 2) A start job is running for File System Check on Root Device (3min 28s 
/ no limit)
...
 No tainted 3.19.0-18-generic #18-Ubuntu
"echo 0> /proc/sys/kernel/hung_task_timeout_secs" disables this message.
INFO: task systemd-udevd:336 blocked for more than 120 seconds.
...
INFO: task systemd-udevd:338 blocked for more than 120 seconds.
...
INFO: task systemd-udevd:346 blocked for more than 120 seconds.
...
(1 of 2) A start job is running for File System Check on Root Device (4min 3s / 
no limit)

WORKAROUND:

apt-get -qq -y install upstart-sysv # switch back to upstart
http://linux.softpedia.com/blog/Ubuntu-15-04-Users-Can-Switch-Off-Systemd-and-Use-Upstart-479373.shtml
P.S. don't ask me to go back to systemd-sysv... I am fine with upstart

TECHNICAL DETAILS:

$ lsb_release -r
Release:15.04

$ uname -r
3.19.0-18-generic

$ sudo dmidecode -s system-product-name
MacBookPro8,2

$ grep "^GRUB_CMDLINE_LINUX_DEFAULT" /etc/default/grub
GRUB_CMDLINE_LINUX_DEFAULT="transparent_hugepage=always intel_iommu=on 
acpi_irq_nobalance cgroup_enable=memory swapaccount=1 libata.force=noncq 
modeset=1 hybridopts=ON,IGD,OFF i915.modeset=0 radeon.modeset=1 radeon.dpm=1 
radeon.audio=1 i915.lvds_channels=2 quirks.mbp_force_ahci=1 
acpi_backlight=vendor reboot=pci"

$ cat /etc/fstab
#
# / was on /dev/sda5 during installation
UUID=6619a7e9-4b94-4e9b-8dbe-4110f89dde74 /   ext4
errors=remount-ro 0   1
# swap was on /dev/sda6 during installation
UUID=813e9dc2-c678-4959-ac89-e6660f886942 noneswapsw
  0   0

# lsblk -f
NAME   FSTYPE  LABELUUID MOUNTPOINT
sda  
├─sda1 vfatEFI  67E3-17ED
├─sda2 hfsplus Macintosh HD 2ba5bbc1-fff0-36ea-ade4-140386274279 
├─sda3 hfsplus Recovery HD  9e776f16-ceb4-37e6-b4ce-4e75c1db5444 
├─sda4   
├─sda5 ext4 6619a7e9-4b94-4e9b-8dbe-4110f89dde74 /
└─sda6 swap 813e9dc2-c678-4959-ac89-e6660f886942 [SWAP]
sr0   

# blkid 
/dev/sda1: LABEL="EFI" UUID="67E3-17ED" TYPE="vfat" PARTLABEL="EFI System 
Partition" PARTUUID="5d71ff71-9843-473d-90e7-4c780c8a494d"
/dev/sda2: UUID="2ba5bbc1-fff0-36ea-ade4-140386274279" LABEL="Macintosh HD" 
TYPE="hfsplus" PARTLABEL="Macintosh HD" 
PARTUUID="4e4c2249-24f8-4229-9325-d4aafd7ac093"
/dev/sda3: UUID="9e776f16-ceb4-37e6-b4ce-4e75c1db5444" LABEL="Recovery HD" 
TYPE="hfsplus" PARTLABEL="Recovery HD" 
PARTUUID="a986e3e1-ed3b-44bb-a75b-87b54434380d"
/dev/sda5: UUID="6619a7e9-4b94-4e9b-8dbe-4110f89dde74" TYPE="ext4" 
PARTUUID="9d860cb1-1334-4f79-a07a-01b8818c4aab"
/dev/sda6: UUID="813e9dc2-c678-4959-ac89-e6660f886942" TYPE="swap" 
PARTUUID="bf1271f6-8d51-4510-8979-666c9546f1f3"
/dev/sda4: PARTUUID="2b731a42-bd29-4548-8f0e-a9889ee9486b"

** Affects: systemd (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: swap systemd systemd-boot

** Attachment added: "IMG_20150608_114616.jpg"
   
https://bugs.launchpad.net/bugs/1463023/+attachment/4411529/+files/IMG_20150608_114616.jpg

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1463023

Title:
  systemd Timed out waiting for device swap and file system check

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1463023/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1463023] Re: systemd Timed out waiting for device swap and file system check

2015-06-12 Thread Guy Baconniere
> Please attach /etc/fstab from your system, and show the output of 'swapon' 
> when booted with upstart.

@vorlon content of fstab see "Bug Description"

$ sudo swapon
NAME  TYPE  SIZE  USED PRIO
/dev/sda6 partition 7.9G 11.5M   -1

Ok, I will try to go back to systemd for science ;-)
$ sudo apt-get install systemd-sysv

@pitti

I will try that. Thanks!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1463023

Title:
  systemd Timed out waiting for device swap and file system check

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1463023/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1463023] Re: systemd Timed out waiting for device swap and file system check

2015-06-12 Thread Guy Baconniere
@pitti

I am unable to reproduce it with 3.19.0-20 nor 3.19.0-18.
So I installed back systemd-sysv and I will do the debug stuff
next time I have the issue.

I guess the issue was related to a strange state of swap or the disk
and after booting once with upstart something fixed it. fsck??

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1463023

Title:
  systemd Timed out waiting for device swap and file system check

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1463023/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1463023] Re: systemd Timed out waiting for device swap and file system check

2015-06-12 Thread Guy Baconniere
It could be related that ext4 was in a bad state and systemd was not able to 
use it 
then upstart executed fsck to fix it and now I can again use systemd.

# /var/log/syslog.4.gz
$ zgrep -h "fsck" /var/log/*.gz
Jun  8 08:43:06 mbp kernel: [1788385.038996] FAT-fs (sdb1): Volume was not 
properly unmounted. Some data may be corrupt. Please run fsck.
Jun  8 10:48:10 mbp systemd-fsck[971]: /dev/sda5: clean, 448286/17760256 files, 
35731755/71025664 blocks
Jun  8 10:48:10 mbp kernel: [4.748519] systemd[1]: Listening on fsck to 
fsckd communication Socket.
Jun  8 10:48:10 mbp kernel: [4.750175] systemd[1]: Starting fsck to fsckd 
communication Socket.
Jun  8 11:08:54 mbp systemd-fsck[943]: /dev/sda5: clean, 447436/17760256 files, 
35695088/71025664 blocks
Jun  8 11:08:54 mbp kernel: [3.809333] systemd[1]: Listening on fsck to 
fsckd communication Socket.
Jun  8 11:08:54 mbp kernel: [3.809392] systemd[1]: Starting fsck to fsckd 
communication Socket.
Jun  8 11:11:50 mbp systemd-fsck[946]: /dev/sda5: clean, 447438/17760256 files, 
35715637/71025664 blocks
Jun  8 11:11:50 mbp kernel: [3.736279] systemd[1]: Listening on fsck to 
fsckd communication Socket.
Jun  8 11:11:50 mbp kernel: [3.737878] systemd[1]: Starting fsck to fsckd 
communication Socket.

zgrep -h systemd /var/log/syslog.4.gz > systemd-2015-06-08.log


** Attachment added: "systemd-2015-06-08.log"
   
https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1463023/+attachment/4413674/+files/systemd-2015-06-08.log

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1463023

Title:
  systemd Timed out waiting for device swap and file system check

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1463023/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1267059] Re: "Unattended-Upgrade::Remove-Unused-Dependencies" does not work

2015-05-26 Thread Guy Baconniere
I agree with @Jamiejellicoe this ticket should be rated as "Security
issue" (250) but we are close that (236)...

Having /boot full can lead to kernel, inird image or grub.conf corruption and 
on top of that it's blocking new security updates to be applied.

When /boot is full you cannot even purge old kernel before /boot has a minimum
disk space. So my workaround is to echo -n > /boot/initrd.img- some old 
kernel's inird images
so I have enough free space to cleanup old kernel, header, etc.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1267059

Title:
  "Unattended-Upgrade::Remove-Unused-Dependencies" does not work

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/unattended-upgrades/+bug/1267059/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1253155] Re: Failure to validate module signature at boot time

2015-05-26 Thread Guy Baconniere
Same issue

$ lsb_release -r
Release:14.04
$ uname -r
3.13.0-52-generic

May 10 00:40:40 kernel: [...] Request for unknown module key 'Magrathea: 
Glacier signing key: 1981bc916ffc00599231ec5630e666e0256fd6f1' err -11
May 10 00:40:40 kernel: [...] ipt_REJECT: module verification failed: signature 
and/or  required key missing - tainting kernel

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1253155

Title:
  Failure to validate module signature at boot time

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1253155/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1227912] Re: instance fails to boot with qemu guest agent set in image metadata

2015-05-26 Thread Guy Baconniere
I had the same issue when AppArmor is active (default)
and when I try to enable qemu guest agent inside your
guest :

virsh start test
error: Failed to start domain test
error: internal error: process exited while connecting to monitor: 
qemu-system-x86_64: -chardev 
socket,id=charchannel0,path=/var/lib/libvirt/qemu/test-virtio.sock,server,nowait:
 Failed to bind socket: Permission denied
qemu-system-x86_64: -chardev 
socket,id=charchannel0,path=/var/lib/libvirt/qemu/test-virtio.sock,server,nowait:
 chardev: opening backend "socket" failed

audit: type=1400 audit(...): apparmor="DENIED" operation="mknod" profile
="libvirt-74c30212-4631-4498-a684-c62db8b2dc21"
name="/var/lib/libvirt/qemu/test-virtio.sock" pid=10291 comm="qemu-
system-x86" requested_mask="c" denied_mask="c" fsuid=106 ouid=106


  
  
  
  




  


  
  
  


I am using qemu guest agent to be able to call guest-fstrim
virsh qemu-agent-command  '{"execute":"guest-fstrim"}'
guest-fstrim is doing fstrim on all partitions if discard has been
enabled with virtio-scsi (free up deleted blocks)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1227912

Title:
  instance fails to boot with qemu guest agent set in image metadata

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1227912/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1227912] Re: instance fails to boot with qemu guest agent set in image metadata

2015-05-26 Thread Guy Baconniere
Is it possible to apply this patch to libvirt-bin package and allow to write to 
 /var/lib/libvirt/qemu/ ?

For me it makes sense because disabling AppArmor for OpenStack is not a good 
idea
so you will be exposed to security issues like Venom
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/VENOM
<< Additionally, the QEMU process is confined by an AppArmor profile that 
significantly lessens the impact of a vulnerability such as VENOM by reducing 
the host environment's attack surface >>

$ dpkg -S /etc/apparmor.d/abstractions/libvirt-qemu
libvirt-bin: /etc/apparmor.d/abstractions/libvirt-qemu


** Patch added: "Fix for"
   
https://bugs.launchpad.net/nova/+bug/1227912/+attachment/4404897/+files/apparmor_libvirt-qemu.patch

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1227912

Title:
  instance fails to boot with qemu guest agent set in image metadata

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1227912/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1480923] [NEW] lvm thin corruption after lvresize

2015-08-03 Thread Guy Baconniere
Public bug reported:

lvm2 version 2.02.98-6ubuntu2

After doing a lvextend of a LVM Thin Pool, I had a corruption all sub
LVM Thin Volumes and lost all of them. Then tried to dump/repair the 
tmeta and end up with empty thin volumes (no more filesystem signature on them).

To sum up
The thin_pool was 2T and I tried to increased it to 3T...

As fare as I know, none of the partitions were full but I increased the main 
thin pool as it was close to the sum of all sub thin volumes.

I assume that using LVM Thin is still not stable on 14.04 LTS right?

I guess that lvm2 2.02.98 does not properly handle the metadata resize 
of a thin pool right? (maybe add a warning somewhere in doc?)

I managed to recover some files from the raw thin_pool (tdata/tpool) with 
scalapel 
but that is it. 

Do you known any other tools to recovery lvm thin volumes or
partition/data on it?

Errors

  attempt to access beyond end of device
  dm-6: rw=0, want=7753528, limit=262144
  attempt to access beyond end of device
  dm-6: rw=0, want=7753528, limit=262144 
  attempt to access beyond end of device
  dm-6: rw=0, want=7753528, limit=262144
  attempt to access beyond end of device
  dm-6: rw=0, want=7753528, limit=262144

  /dev/mainvg/thin_rsnapshot: read failed after 0 of 4096 at 2199023190016: 
Input/output error
  /dev/mainvg/thin_rsnapshot: read failed after 0 of 4096 at 2199023247360: 
Input/output error
  /dev/mainvg/thin_rsnapshot: read failed after 0 of 4096 at 0: Input/output 
error
  /dev/mainvg/thin_rsnapshot: read failed after 0 of 4096 at 4096: Input/output 
error
  /dev/mainvg/thin_archive: read failed after 0 of 4096 at 805306302464: 
Input/output error
  /dev/mainvg/thin_archive: read failed after 0 of 4096 at 805306359808: 
Input/output error
  /dev/mainvg/thin_archive: read failed after 0 of 4096 at 0: Input/output error
  /dev/mainvg/thin_archive: read failed after 0 of 4096 at 4096: Input/output 
error

lvs
  LV VG Attr  LSize   Pool  Origin Data%  Move Log 
Copy%  Convert
  thin_archive   mainvg Vwi-aotz- 500.00g thin_pool 94.65   
 
  thin_rsnapshot mainvg Vwi-aotz-   1.50t thin_pool 94.01   
 
  thin_pool  mainvg twi-a-tz-   3.00t   71.65   
 

lvresize -L 2T /dev/mapper/mainvg-thin_rsnapshot
  /dev/mainvg/thin_rsnapshot: read failed after 0 of 4096 at 1649267376128: 
Input/output error
  /dev/mainvg/thin_rsnapshot: read failed after 0 of 4096 at 1649267433472: 
Input/output error
  /dev/mainvg/thin_archive: read failed after 0 of 4096 at 536870846464: 
Input/output error
  /dev/mainvg/thin_archive: read failed after 0 of 4096 at 536870903808: 
Input/output error
  Extending logical volume thin_rsnapshot to 2.00 TiB
  Logical volume thin_rsnapshot successfully resized

** Affects: update-manager (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: lvm

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1480923

Title:
  lvm thin corruption after lvresize

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/update-manager/+bug/1480923/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1480923] Re: lvm thin corruption after lvresize

2015-08-04 Thread Guy Baconniere
** Package changed: update-manager (Ubuntu) => lvm2 (Ubuntu)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1480923

Title:
  lvm thin corruption after lvresize

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lvm2/+bug/1480923/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1480923] Re: lvm thin corruption after lvresize

2015-08-04 Thread Guy Baconniere
** Description changed:

  lvm2 version 2.02.98-6ubuntu2
  
- After doing a lvextend of a LVM Thin Pool, I had a corruption all sub
- LVM Thin Volumes and lost all of them. Then tried to dump/repair the 
+ After doing a lvresize of a LVM Thin Pool, I had a corruption all sub
+ LVM Thin Volumes and lost all of them. Then tried to dump/repair the
  tmeta and end up with empty thin volumes (no more filesystem signature on 
them).
  
  To sum up
  The thin_pool was 2T and I tried to increased it to 3T...
  
- As fare as I know, none of the partitions were full but I increased the main 
+ As fare as I know, none of the partitions were full but I increased the main
  thin pool as it was close to the sum of all sub thin volumes.
  
  I assume that using LVM Thin is still not stable on 14.04 LTS right?
  
- I guess that lvm2 2.02.98 does not properly handle the metadata resize 
+ I guess that lvm2 2.02.98 does not properly handle the metadata resize
  of a thin pool right? (maybe add a warning somewhere in doc?)
  
- I managed to recover some files from the raw thin_pool (tdata/tpool) with 
scalapel 
- but that is it. 
+ Maybe related to
+ http://comments.gmane.org/gmane.linux.kernel.device-mapper.devel/19190
+ https://www.redhat.com/archives/lvm-devel/2013-June/msg00371.html
+ 
+ I managed to recover some files from the raw thin_pool (tdata/tpool) with 
scalapel
+ but that is it.
  
  Do you known any other tools to recovery lvm thin volumes or
  partition/data on it?
  
  Errors
  
-   attempt to access beyond end of device
-   dm-6: rw=0, want=7753528, limit=262144
-   attempt to access beyond end of device
-   dm-6: rw=0, want=7753528, limit=262144 
-   attempt to access beyond end of device
-   dm-6: rw=0, want=7753528, limit=262144
-   attempt to access beyond end of device
-   dm-6: rw=0, want=7753528, limit=262144
+   attempt to access beyond end of device
+   dm-6: rw=0, want=7753528, limit=262144
+   attempt to access beyond end of device
+   dm-6: rw=0, want=7753528, limit=262144
+   attempt to access beyond end of device
+   dm-6: rw=0, want=7753528, limit=262144
+   attempt to access beyond end of device
+   dm-6: rw=0, want=7753528, limit=262144
  
-   /dev/mainvg/thin_rsnapshot: read failed after 0 of 4096 at 2199023190016: 
Input/output error
-   /dev/mainvg/thin_rsnapshot: read failed after 0 of 4096 at 2199023247360: 
Input/output error
-   /dev/mainvg/thin_rsnapshot: read failed after 0 of 4096 at 0: Input/output 
error
-   /dev/mainvg/thin_rsnapshot: read failed after 0 of 4096 at 4096: 
Input/output error
-   /dev/mainvg/thin_archive: read failed after 0 of 4096 at 805306302464: 
Input/output error
-   /dev/mainvg/thin_archive: read failed after 0 of 4096 at 805306359808: 
Input/output error
-   /dev/mainvg/thin_archive: read failed after 0 of 4096 at 0: Input/output 
error
-   /dev/mainvg/thin_archive: read failed after 0 of 4096 at 4096: Input/output 
error
+   /dev/mainvg/thin_rsnapshot: read failed after 0 of 4096 at 2199023190016: 
Input/output error
+   /dev/mainvg/thin_rsnapshot: read failed after 0 of 4096 at 2199023247360: 
Input/output error
+   /dev/mainvg/thin_rsnapshot: read failed after 0 of 4096 at 0: Input/output 
error
+   /dev/mainvg/thin_rsnapshot: read failed after 0 of 4096 at 4096: 
Input/output error
+   /dev/mainvg/thin_archive: read failed after 0 of 4096 at 805306302464: 
Input/output error
+   /dev/mainvg/thin_archive: read failed after 0 of 4096 at 805306359808: 
Input/output error
+   /dev/mainvg/thin_archive: read failed after 0 of 4096 at 0: Input/output 
error
+   /dev/mainvg/thin_archive: read failed after 0 of 4096 at 4096: Input/output 
error
  
  lvs
-   LV VG Attr  LSize   Pool  Origin Data%  Move Log 
Copy%  Convert
-   thin_archive   mainvg Vwi-aotz- 500.00g thin_pool 94.65 
   
-   thin_rsnapshot mainvg Vwi-aotz-   1.50t thin_pool 94.01 
   
-   thin_pool  mainvg twi-a-tz-   3.00t   71.65 
   
+   LV VG Attr  LSize   Pool  Origin Data%  Move Log 
Copy%  Convert
+   thin_archive   mainvg Vwi-aotz- 500.00g thin_pool 94.65
+   thin_rsnapshot mainvg Vwi-aotz-   1.50t thin_pool 94.01
+   thin_pool  mainvg twi-a-tz-   3.00t   71.65
  
  lvresize -L 2T /dev/mapper/mainvg-thin_rsnapshot
-   /dev/mainvg/thin_rsnapshot: read failed after 0 of 4096 at 1649267376128: 
Input/output error
-   /dev/mainvg/thin_rsnapshot: read failed after 0 of 4096 at 1649267433472: 
Input/output error
-   /dev/mainvg/thin_archive: read failed after 0 of 4096 at 536870846464: 
Input/output error
-   /dev/mainvg/thin_archive: read failed after 0 of 4096 at 536870903808: 
Input/output error
-   Extending logical volume thin_rsnapshot to 2.00 TiB
-   Logical volume thin_rsnapshot successfully resized
+   /dev/mainvg/thin_rsnapshot: read failed after 0 of 4096 at 1649267376128: 
Input/output error
+   /dev/mainvg

[Bug 1089195] Re: linux-headers will eat your inodes on LTS.

2015-07-28 Thread Guy Baconniere
My workaround:
dpkg --get-selections | grep 'linux-'
dpkg --get-selections | awk '/linux-(headers|image)-[0-9]\./ { print $1 }' | 
grep -v "$(uname -r | sed -e 's/-generic//')" | sort -r -V -t- -k3 | tail -n+4 
| xargs -r apt-get -qq -y purge
apt-get -qq -y install linux-{headers,image}-$(uname -r)
dpkg --get-selections | grep 'linux-'

# (optional)
# apt-get -qq -y install linux-{headers,image}-generic-lts-utopic 2>/dev/null 
|| apt-get -qq -y install linux-{headers,image}-generic-lts-trusty

Until a backport is available for LTS 14.04/12.04 see
https://bugs.launchpad.net/ubuntu/+source/unattended-upgrades/+bug/1267059

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1089195

Title:
  linux-headers will eat your inodes on LTS.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/update-manager/+bug/1089195/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1492146] Re: igb Detected Tx Unit Hang

2015-09-06 Thread Guy Baconniere
This bug should be a top priority because people will suffer from it as soon as 
they reboot
their 14.04 LTS with an Intel Gigabit NIC and the "current" Utopic kernel 
(3.16.0-48-generic).

I had the same problem with HP ProLiant DL380e Gen8 which an Intel I350 Gigabit 
NIC 
(Hewlett-Packard Company Ethernet 1Gb 4-port 366i Adapter)

It was hard to get a shell with 30-50% packets drop and igb driver resetting 
ALL NICs...
"blind-typing" on the shell and wait 1-2 minutes to get the output... of dmesg 
;-)

I updated the kernel of 14.04 LTS from Utopic to Vivid and everything is
working again.

Workaround is:
screen -S kernel
apt-get -y purge linux-{headers,image,image-extra}-3.16.0-48-generic
apt-get -y install linux-image-generic-lts-vivid linux-headers-generic-lts-vivid
reboot

Output of dmesg:
 igb :02:00.1 em2: igb: em2 NIC Link is Up 1000 Mbps Full Duplex, Flow 
Control: RX
 igb :02:00.1: Detected Tx Unit Hang
   Tx Queue <3>
   TDH  <0>
   TDT  <0>
   next_to_use  <4>
   next_to_clean<0>
 buffer_info[next_to_clean]
   time_stamp   <100039540>
   next_to_watch
   jiffies  <1000397b6>
   desc.status  <0>
igb :02:00.1 em2: Reset adapter
igb :02:00.2 em3: Reset adapter
igb :02:00.0 em1: Reset adapter
igb :02:00.0 em1: igb: em1 NIC Link is Up 100 Mbps Full Duplex, Flow 
Control: RX
igb :02:00.1 em2: igb: em2 NIC Link is Up 1000 Mbps Full Duplex, Flow 
Control: RX
igb :02:00.1: Detected Tx Unit Hang

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1492146

Title:
  igb Detected Tx Unit Hang

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-lts-utopic/+bug/1492146/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1488024] Re: [Regression] From 3.16.0-45 to -47: Intel IGB Tx Unit Hang network adapter reset problem prevents stable network connection

2015-09-06 Thread Guy Baconniere
Same bug as https://bugs.launchpad.net/ubuntu/+source/linux-lts-
utopic/+bug/1492146

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1488024

Title:
  [Regression] From 3.16.0-45 to -47: Intel IGB Tx Unit Hang network
  adapter reset problem prevents stable network connection

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-lts-utopic/+bug/1488024/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1492146] Re: igb Detected Tx Unit Hang

2015-09-06 Thread Guy Baconniere
Same bug as https://bugs.launchpad.net/ubuntu/+source/linux-lts-
utopic/+bug/1488024

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1492146

Title:
  igb Detected Tx Unit Hang

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-lts-utopic/+bug/1492146/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1492146] Re: igb Detected Tx Unit Hang

2015-09-06 Thread Guy Baconniere
Maybe it's another kernel regression with Intel NIC and TSO 
so you can try this :

# tso => tcp-segmentation-offload
# gso => generic-segmentation-offload
# gro => generic-receive-offload
# sg  => scatter-gather
# ufo => udp-fragmentation-offload (Cannot change)
# lro => large-receive-offload (Cannot change)
ethtool -K em1 tso off gso off gro off sg off
ethtool -K em2 tso off gso off gro off sg off
ethtool -K em3 tso off gso off gro off sg off
ethtool -K em4 tso off gso off gro off sg off
# ethtool -K eth0 tso off gso off gro off sg off
# ...

Add this to each iface in /etc/network/interfaces
pre-up /sbin/ethtool -K $IFACE tso off gso off gro off sg off || true

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1492146

Title:
  igb Detected Tx Unit Hang

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-lts-utopic/+bug/1492146/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1492146] Re: igb Detected Tx Unit Hang

2015-09-06 Thread Guy Baconniere
If directly related to igb module maybe this
LP: #1465653
https://lists.ubuntu.com/archives/kernel-team/2015-June/058671.html
https://lists.ubuntu.com/archives/kernel-team/2015-June/058586.html
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1465653

if not directly related to igb modules maybe something linked to  
hv_netvsc (Microsot Hyper-V Network Virtual Service Consumer)
LP: #1454892
http://lists.openwall.net/netdev/2015/09/01/18
http://marc.info/?l=linux-netdev&m=140900971718712&w=2
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1454892

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1492146

Title:
  igb Detected Tx Unit Hang

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-lts-utopic/+bug/1492146/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1492146] Re: igb Detected Tx Unit Hang

2015-09-08 Thread Guy Baconniere
@boot0user I agree with you. The best workaround for now is  to update
kernel to Vivid!

# Physical Server (with EFI):
sudo apt-get -y purge linux-{headers,image}-3.16.0-48-generic
sudo apt-get -y install linux-signed-generic-lts-vivid
sudo reboot
uname -r # 3.19.0-26-generic
sudo apt-get -y purge linux-signed-generic-lts-utopic
sudo apt-get -y purge linux-{image,headers}-generic-lts-utopic

# Physical Server (without EFI, but signed is also fine):
sudo apt-get -y purge linux-{headers,image}-3.16.0-48-generic
sudo apt-get -y install linux-generic-lts-vivid
sudo reboot
uname -r # 3.19.0-26-generic
sudo apt-get -y purge linux-generic-lts-utopic
sudo apt-get -y purge linux-{image,headers}-generic-lts-utopic

# Virtual Server:
sudo apt-get -y purge linux-{headers,image,image-extra}-3.16.0-48-generic
sudo apt-get -y install linux-virtual-lts-vivid
sudo reboot
uname -r # 3.19.0-26-generic
sudo apt-get -y purge linux-virtual-lts-utopic
sudo apt-get -y purge linux-{image,headers}-virtual-lts-utopic

# (optional)
# If you want to clean old kernels after the reboot (issue 1267059, 1089195) :
dpkg --get-selections | awk '/linux-(headers|image)-[0-9]\./ { print $1 }' \
| sort -r -V -t- -k3 | tail -n+4 \
| grep -v "$(uname -r | sed -e 's/-generic//')" \
| xargs -r apt-get -qq -y purge

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1492146

Title:
  igb Detected Tx Unit Hang

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-lts-utopic/+bug/1492146/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1493888] Re: FGLRX incompatible with kernel 4.2

2015-09-13 Thread Guy Baconniere
Same problem on iMac15,1 with Radeon R9 M295X Mac Edition
and 4.2.0-7-generic (wily / 15.10)

Two partial workarounds:

- downgrade to 4.1.0-3-generic and install fglrx-updates
  but bluetooth will not work --broken with this kernel*
  http://www.spinics.net/lists/linux-bluetooth/msg64098.html

- use 4.2.0-7-generic but remove fglrx-updates (fglrx-amdcccle etc.)
  bluetooth will work but no radeon hardware acceleration (No Steam, etc.)

In my case I need to choose between bluetooth devies and 3d graphics
(radeaon)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1493888

Title:
  FGLRX incompatible with kernel 4.2

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/fglrx-installer/+bug/1493888/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1495442] [NEW] XFS: kernel hangs multiple times in xlog_cil_force_lsn

2015-09-14 Thread Guy Baconniere
Public bug reported:

Ubuntu 14.04.3 LTS with Kernel 3.19.0-26-generic

One of our servers running rsnapshot and nfs-kernel-server on XFS partitions
crashed or hanged two sundays in a raw.

Kernel 3.19.0-26-generic hangs multiple times (same time) in xlog_cil_force_lsn 
(XFS).
I assume this bug is not related with bug report 979498.

I had also this issue with kernel 3.16.0-46-generic or 3.13.0-57-generic but I 
have
no log during the crash to determine which of the above kernel was running.
I switched to kernel 3.19.0-26-generic because 3.16.0-48-generic was not
working well with Intel Gigabit -- tx hang (bug 1492146)

 INFO: task kthreadd:2 blocked for more than 120 seconds.
   Tainted: G C 3.19.0-26-generic #28~14.04.1-Ubuntu
 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
 kthreaddD 8802362eb3a8 0 2  0 0x
  8802362eb3a8 8802362c09d0 00013e80 8802362ebfd8
  00013e80 880235c28000 8802362c09d0 88020001
  8802362eb500 7fff 8802362eb4f8 8802362c09d0
 Call Trace:
  [] schedule+0x29/0x70
  [] schedule_timeout+0x20c/0x280
  [] ? update_curr+0xe4/0x180
  [] wait_for_completion+0xa4/0x170
  [] ? wake_up_state+0x20/0x20
  [] flush_work+0xed/0x1c0
  [] ? destroy_worker+0x90/0x90
  [] xlog_cil_force_lsn+0x7e/0x1f0 [xfs]
  [] ? __free_pages+0x27/0x30
  [] ? __free_slab+0xd0/0x1f0
  [] _xfs_log_force_lsn+0x5e/0x2d0 [xfs]
  [] xfs_log_force_lsn+0x2e/0x90 [xfs]
  [] ? xfs_iunpin_wait+0x19/0x20 [xfs]
  [] __xfs_iunpin_wait+0x8d/0x120 [xfs]
  [] ? autoremove_wake_function+0x40/0x40
  [] xfs_iunpin_wait+0x19/0x20 [xfs]
  [] xfs_reclaim_inode+0x7c/0x340 [xfs]
  [] xfs_reclaim_inodes_ag+0x257/0x370 [xfs]
  [] xfs_reclaim_inodes_nr+0x33/0x40 [xfs]
  [] xfs_fs_free_cached_objects+0x15/0x20 [xfs]
  [] super_cache_scan+0x169/0x170
  [] shrink_node_slabs+0x1d6/0x370
  [] shrink_zone+0x20a/0x240
  [] do_try_to_free_pages+0x155/0x440
  [] ? zone_watermark_ok+0x1f/0x30
  [] try_to_free_pages+0xba/0x150
  [] __alloc_pages_nodemask+0x61b/0xa60
  [] alloc_kmem_pages_node+0x6a/0x130
  [] ? copy_process.part.26+0xf3/0x1c00
  [] copy_process.part.26+0x113/0x1c00
  [] ? dequeue_task_fair+0x44e/0x660
  [] ? put_prev_entity+0x31/0x3f0
  [] ? pick_next_task_fair+0x19c/0x880
  [] ? kthread_create_on_node+0x1c0/0x1c0
  [] ? put_prev_task_fair+0x2f/0x50
  [] do_fork+0xd5/0x340
  [] kernel_thread+0x26/0x30
  [] kthreadd+0x15a/0x1c0
  [] ? kthread_create_on_cpu+0x60/0x60
  [] ret_from_fork+0x58/0x90
  [] ? kthread_create_on_cpu+0x60/0x60

10:17:01 xyz CRON[59020]: (root) CMD (   cd / && run-parts --report 
/etc/cron.hourly)
11:17:01 xyz CRON[59177]: (root) CMD (   cd / && run-parts --report 
/etc/cron.hourly)
12:00:01 xyz CRON[59282]: (root) CMD (/usr/bin/rsnapshot -c /etc/rsnapshot.conf 
hourly)
12:03:05 xyz kernel: [616881.456247] INFO: task kthreadd:2 blocked for more 
than 120 seconds.
12:03:05 xyz kernel: [616881.456587]   Tainted: G C 
3.19.0-26-generic #28~14.04.1-Ubuntu
...
12:03:05 xyz kernel: [616881.457934] INFO: task kswapd0:57 blocked for more 
than 120 seconds.
12:03:05 xyz kernel: [616881.458271]   Tainted: G C 
3.19.0-26-generic #28~14.04.1-Ubuntu
...
12:03:05 xyz kernel: [616881.485629] INFO: task nfsd:2002 blocked for more than 
120 seconds.
12:03:05 xyz kernel: [616881.492761]   Tainted: G C 
3.19.0-26-generic #28~14.04.1-Ubuntu
...
12:03:05 xyz kernel: [616881.523050] INFO: task snmpd:2155 blocked for more 
than 120 seconds.
12:03:05 xyz kernel: [616881.530783]   Tainted: G C 
3.19.0-26-generic #28~14.04.1-Ubuntu
...
12:03:05 xyz kernel: [616881.562789] INFO: task kworker/1:0:59030 blocked for 
more than 120 seconds.
12:03:05 xyz kernel: [616881.571082]   Tainted: G C 
3.19.0-26-generic #28~14.04.1-Ubuntu
...
12:03:05 xyz kernel: [616881.605747] INFO: task kworker/3:1H:59110 blocked for 
more than 120 seconds.
12:03:05 xyz kernel: [616881.615112]   Tainted: G C 
3.19.0-26-generic #28~14.04.1-Ubuntu
...
12:03:05 xyz kernel: [616881.652107] INFO: task rm:59284 blocked for more than 
120 seconds.
12:03:05 xyz kernel: [616881.661441]   Tainted: G C 
3.19.0-26-generic #28~14.04.1-Ubuntu
...
12:05:05 xyz kernel: [617001.782228] INFO: task kswapd0:57 blocked for more 
than 120 seconds.
12:05:05 xyz kernel: [617001.791580]   Tainted: G C 
3.19.0-26-generic #28~14.04.1-Ubuntu
...
12:05:05 xyz kernel: [617001.828636] INFO: task irqbalance:1353 blocked for 
more than 120 seconds.
12:05:05 xyz kernel: [617001.838019]   Tainted: G C 
3.19.0-26-generic #28~14.04.1-Ubuntu
...
12:05:05 xyz kernel: [617001.875425] INFO: task nfsd:2002 blocked for more than 
120 seconds.
12:05:05 xyz kernel: [617001.884799]   Tainted: G C 
3.19.0-26-generic #28~14.04.1-Ubuntu
...

REFERENCES
http://marc.info/?l=linux-xfs&w=2&r=1&s=xlog_cil_force_lsn%2B0x7e%2F0x1f0

[Bug 1495442] Lsusb.txt

2015-09-14 Thread Guy Baconniere
apport information

** Attachment added: "Lsusb.txt"
   https://bugs.launchpad.net/bugs/1495442/+attachment/4463952/+files/Lsusb.txt

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1495442

Title:
  XFS: kernel hangs multiple times in xlog_cil_force_lsn

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1495442/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1495442] UdevDb.txt

2015-09-14 Thread Guy Baconniere
apport information

** Attachment added: "UdevDb.txt"
   https://bugs.launchpad.net/bugs/1495442/+attachment/4463956/+files/UdevDb.txt

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1495442

Title:
  XFS: kernel hangs multiple times in xlog_cil_force_lsn

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1495442/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1495442] ProcModules.txt

2015-09-14 Thread Guy Baconniere
apport information

** Attachment added: "ProcModules.txt"
   
https://bugs.launchpad.net/bugs/1495442/+attachment/4463955/+files/ProcModules.txt

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1495442

Title:
  XFS: kernel hangs multiple times in xlog_cil_force_lsn

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1495442/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1495442] WifiSyslog.txt

2015-09-14 Thread Guy Baconniere
apport information

** Attachment added: "WifiSyslog.txt"
   
https://bugs.launchpad.net/bugs/1495442/+attachment/4463958/+files/WifiSyslog.txt

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1495442

Title:
  XFS: kernel hangs multiple times in xlog_cil_force_lsn

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1495442/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1495442] UdevLog.txt

2015-09-14 Thread Guy Baconniere
apport information

** Attachment added: "UdevLog.txt"
   
https://bugs.launchpad.net/bugs/1495442/+attachment/4463957/+files/UdevLog.txt

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1495442

Title:
  XFS: kernel hangs multiple times in xlog_cil_force_lsn

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1495442/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1495442] ProcInterrupts.txt

2015-09-14 Thread Guy Baconniere
apport information

** Attachment added: "ProcInterrupts.txt"
   
https://bugs.launchpad.net/bugs/1495442/+attachment/4463954/+files/ProcInterrupts.txt

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1495442

Title:
  XFS: kernel hangs multiple times in xlog_cil_force_lsn

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1495442/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1495442] Lspci.txt

2015-09-14 Thread Guy Baconniere
apport information

** Attachment added: "Lspci.txt"
   https://bugs.launchpad.net/bugs/1495442/+attachment/4463951/+files/Lspci.txt

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1495442

Title:
  XFS: kernel hangs multiple times in xlog_cil_force_lsn

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1495442/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1495442] CurrentDmesg.txt

2015-09-14 Thread Guy Baconniere
apport information

** Attachment added: "CurrentDmesg.txt"
   
https://bugs.launchpad.net/bugs/1495442/+attachment/4463950/+files/CurrentDmesg.txt

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1495442

Title:
  XFS: kernel hangs multiple times in xlog_cil_force_lsn

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1495442/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1495442] Re: XFS: kernel hangs multiple times in xlog_cil_force_lsn

2015-09-14 Thread Guy Baconniere
apport information

** Tags added: apport-collected staging trusty

** Description changed:

  Ubuntu 14.04.3 LTS with Kernel 3.19.0-26-generic
  
  One of our servers running rsnapshot and nfs-kernel-server on XFS partitions
  crashed or hanged two sundays in a raw.
  
  Kernel 3.19.0-26-generic hangs multiple times (same time) in 
xlog_cil_force_lsn (XFS).
  I assume this bug is not related with bug report 979498.
  
  I had also this issue with kernel 3.16.0-46-generic or 3.13.0-57-generic but 
I have
  no log during the crash to determine which of the above kernel was running.
  I switched to kernel 3.19.0-26-generic because 3.16.0-48-generic was not
  working well with Intel Gigabit -- tx hang (bug 1492146)
  
   INFO: task kthreadd:2 blocked for more than 120 seconds.
 Tainted: G C 3.19.0-26-generic #28~14.04.1-Ubuntu
   "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
   kthreaddD 8802362eb3a8 0 2  0 0x
8802362eb3a8 8802362c09d0 00013e80 8802362ebfd8
00013e80 880235c28000 8802362c09d0 88020001
8802362eb500 7fff 8802362eb4f8 8802362c09d0
   Call Trace:
[] schedule+0x29/0x70
[] schedule_timeout+0x20c/0x280
[] ? update_curr+0xe4/0x180
[] wait_for_completion+0xa4/0x170
[] ? wake_up_state+0x20/0x20
[] flush_work+0xed/0x1c0
[] ? destroy_worker+0x90/0x90
[] xlog_cil_force_lsn+0x7e/0x1f0 [xfs]
[] ? __free_pages+0x27/0x30
[] ? __free_slab+0xd0/0x1f0
[] _xfs_log_force_lsn+0x5e/0x2d0 [xfs]
[] xfs_log_force_lsn+0x2e/0x90 [xfs]
[] ? xfs_iunpin_wait+0x19/0x20 [xfs]
[] __xfs_iunpin_wait+0x8d/0x120 [xfs]
[] ? autoremove_wake_function+0x40/0x40
[] xfs_iunpin_wait+0x19/0x20 [xfs]
[] xfs_reclaim_inode+0x7c/0x340 [xfs]
[] xfs_reclaim_inodes_ag+0x257/0x370 [xfs]
[] xfs_reclaim_inodes_nr+0x33/0x40 [xfs]
[] xfs_fs_free_cached_objects+0x15/0x20 [xfs]
[] super_cache_scan+0x169/0x170
[] shrink_node_slabs+0x1d6/0x370
[] shrink_zone+0x20a/0x240
[] do_try_to_free_pages+0x155/0x440
[] ? zone_watermark_ok+0x1f/0x30
[] try_to_free_pages+0xba/0x150
[] __alloc_pages_nodemask+0x61b/0xa60
[] alloc_kmem_pages_node+0x6a/0x130
[] ? copy_process.part.26+0xf3/0x1c00
[] copy_process.part.26+0x113/0x1c00
[] ? dequeue_task_fair+0x44e/0x660
[] ? put_prev_entity+0x31/0x3f0
[] ? pick_next_task_fair+0x19c/0x880
[] ? kthread_create_on_node+0x1c0/0x1c0
[] ? put_prev_task_fair+0x2f/0x50
[] do_fork+0xd5/0x340
[] kernel_thread+0x26/0x30
[] kthreadd+0x15a/0x1c0
[] ? kthread_create_on_cpu+0x60/0x60
[] ret_from_fork+0x58/0x90
[] ? kthread_create_on_cpu+0x60/0x60
  
  10:17:01 xyz CRON[59020]: (root) CMD (   cd / && run-parts --report 
/etc/cron.hourly)
  11:17:01 xyz CRON[59177]: (root) CMD (   cd / && run-parts --report 
/etc/cron.hourly)
  12:00:01 xyz CRON[59282]: (root) CMD (/usr/bin/rsnapshot -c 
/etc/rsnapshot.conf hourly)
  12:03:05 xyz kernel: [616881.456247] INFO: task kthreadd:2 blocked for more 
than 120 seconds.
  12:03:05 xyz kernel: [616881.456587]   Tainted: G C 
3.19.0-26-generic #28~14.04.1-Ubuntu
  ...
  12:03:05 xyz kernel: [616881.457934] INFO: task kswapd0:57 blocked for more 
than 120 seconds.
  12:03:05 xyz kernel: [616881.458271]   Tainted: G C 
3.19.0-26-generic #28~14.04.1-Ubuntu
  ...
  12:03:05 xyz kernel: [616881.485629] INFO: task nfsd:2002 blocked for more 
than 120 seconds.
  12:03:05 xyz kernel: [616881.492761]   Tainted: G C 
3.19.0-26-generic #28~14.04.1-Ubuntu
  ...
  12:03:05 xyz kernel: [616881.523050] INFO: task snmpd:2155 blocked for more 
than 120 seconds.
  12:03:05 xyz kernel: [616881.530783]   Tainted: G C 
3.19.0-26-generic #28~14.04.1-Ubuntu
  ...
  12:03:05 xyz kernel: [616881.562789] INFO: task kworker/1:0:59030 blocked for 
more than 120 seconds.
  12:03:05 xyz kernel: [616881.571082]   Tainted: G C 
3.19.0-26-generic #28~14.04.1-Ubuntu
  ...
  12:03:05 xyz kernel: [616881.605747] INFO: task kworker/3:1H:59110 blocked 
for more than 120 seconds.
  12:03:05 xyz kernel: [616881.615112]   Tainted: G C 
3.19.0-26-generic #28~14.04.1-Ubuntu
  ...
  12:03:05 xyz kernel: [616881.652107] INFO: task rm:59284 blocked for more 
than 120 seconds.
  12:03:05 xyz kernel: [616881.661441]   Tainted: G C 
3.19.0-26-generic #28~14.04.1-Ubuntu
  ...
  12:05:05 xyz kernel: [617001.782228] INFO: task kswapd0:57 blocked for more 
than 120 seconds.
  12:05:05 xyz kernel: [617001.791580]   Tainted: G C 
3.19.0-26-generic #28~14.04.1-Ubuntu
  ...
  12:05:05 xyz kernel: [617001.828636] INFO: task irqbalance:1353 blocked for 
more than 120 seconds.
  12:05:05 xyz kernel: [617001.838019]   Tainted: G C 
3.19.0-26-generic #28~14.04.1-Ubuntu
  ...
  12:05:05 xyz kernel: [617001.8

[Bug 1495442] ProcCpuinfo.txt

2015-09-14 Thread Guy Baconniere
apport information

** Attachment added: "ProcCpuinfo.txt"
   
https://bugs.launchpad.net/bugs/1495442/+attachment/4463953/+files/ProcCpuinfo.txt

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1495442

Title:
  XFS: kernel hangs multiple times in xlog_cil_force_lsn

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1495442/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1495442] Re: XFS: kernel hangs multiple times in xlog_cil_force_lsn

2015-09-22 Thread Guy Baconniere
The bug doesn't seem to impact 3.13.0-63-generic.

(the server is in production we don't really want to test 4.2 unstable)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1495442

Title:
  XFS: kernel hangs multiple times in xlog_cil_force_lsn

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1495442/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1413540] Re: Trusty soft lockup issues with nested KVM

2015-04-22 Thread Guy Baconniere
I still have the same issue with kernel 3.16.0-36-generic or 3.13.0-51-generic 
(proposed-updates)

# KVM HOST (3.16.0-36-generic)
sudo apt-get install linux-signed-generic-lts-utopic/trusty-proposed

# KVM GUEST (3.16.0-36-generic)
sudo apt-get install linux-virtual-lts-utopic/trusty-proposed
apt-get install cloud-installer
cloud-install

[ 1196.920613] kvm: vmptrld   (null)/7800 failed
[ 1196.920953] vmwrite error: reg 401e value 31 (err 1)
[ 1196.921243] CPU: 23 PID: 5240 Comm: qemu-system-x86 Not tainted 
3.16.0-36-generic #48~14.04.1-Ubuntu
[ 1196.921244] Hardware name: HP ProLiant DL380 Gen9, BIOS P89 11/03/2014
[ 1196.921245]   88202018fb58 81764a5f 
880fe496
[ 1196.921248]  88202018fb68 c0a9320d 88202018fb78 
c0a878bf
[ 1196.921250]  88202018fba8 c0a8e1cf 880fe496 

[ 1196.921252] Call Trace:
[ 1196.921262]  [] dump_stack+0x45/0x56
[ 1196.921277]  [] vmwrite_error+0x2c/0x2e [kvm_intel]
[ 1196.921280]  [] vmcs_writel+0x1f/0x30 [kvm_intel]
[ 1196.921283]  [] free_nested.part.73+0x5f/0x170 [kvm_intel]
[ 1196.921286]  [] vmx_free_vcpu+0x33/0x70 [kvm_intel]
[ 1196.921305]  [] kvm_arch_vcpu_free+0x44/0x50 [kvm]
[ 1196.921312]  [] kvm_arch_destroy_vm+0xf2/0x1f0 [kvm]
[ 1196.921318]  [] ? synchronize_srcu+0x1d/0x20
[ 1196.921323]  [] kvm_put_kvm+0x10e/0x220 [kvm]
[ 1196.921328]  [] kvm_vcpu_release+0x18/0x20 [kvm]
[ 1196.921331]  [] __fput+0xe4/0x220
[ 1196.921333]  [] fput+0xe/0x10
[ 1196.921337]  [] task_work_run+0xc4/0xe0
[ 1196.921342]  [] do_exit+0x2b8/0xa60
[ 1196.921345]  [] ? __unqueue_futex+0x32/0x70
[ 1196.921347]  [] ? futex_wait+0x126/0x290
[ 1196.921349]  [] ? check_preempt_curr+0x85/0xa0
[ 1196.921351]  [] do_group_exit+0x3f/0xa0
[ 1196.921353]  [] get_signal_to_deliver+0x1d0/0x6f0
[ 1196.921357]  [] do_signal+0x48/0xad0
[ 1196.921359]  [] ? __switch_to+0x167/0x590
[ 1196.921361]  [] do_notify_resume+0x69/0xb0
[ 1196.921364]  [] int_signal+0x12/0x17
[ 1196.921365] vmwrite error: reg 2800 value  (err -255)
[ 1196.921733] CPU: 23 PID: 5240 Comm: qemu-system-x86 Not tainted 
3.16.0-36-generic #48~14.04.1-Ubuntu
[ 1196.921734] Hardware name: HP ProLiant DL380 Gen9, BIOS P89 11/03/2014
[ 1196.921735]   88202018fb58 81764a5f 
880fe496
[ 1196.921736]  88202018fb68 c0a9320d 88202018fb78 
c0a878bf
[ 1196.921737]  88202018fba8 c0a8e1e0 880fe496 

[ 1196.921739] Call Trace:
[ 1196.921741]  [] dump_stack+0x45/0x56
[ 1196.921744]  [] vmwrite_error+0x2c/0x2e [kvm_intel]
[ 1196.921746]  [] vmcs_writel+0x1f/0x30 [kvm_intel]
[ 1196.921748]  [] free_nested.part.73+0x70/0x170 [kvm_intel]
[ 1196.921751]  [] vmx_free_vcpu+0x33/0x70 [kvm_intel]
[ 1196.921757]  [] kvm_arch_vcpu_free+0x44/0x50 [kvm]
[ 1196.921763]  [] kvm_arch_destroy_vm+0xf2/0x1f0 [kvm]
[ 1196.921765]  [] ? synchronize_srcu+0x1d/0x20
[ 1196.921770]  [] kvm_put_kvm+0x10e/0x220 [kvm]
[ 1196.921774]  [] kvm_vcpu_release+0x18/0x20 [kvm]
[ 1196.921775]  [] __fput+0xe4/0x220
[ 1196.921777]  [] fput+0xe/0x10
[ 1196.921778]  [] task_work_run+0xc4/0xe0
[ 1196.921780]  [] do_exit+0x2b8/0xa60
[ 1196.921782]  [] ? __unqueue_futex+0x32/0x70
[ 1196.921783]  [] ? futex_wait+0x126/0x290
[ 1196.921784]  [] ? check_preempt_curr+0x85/0xa0
[ 1196.921786]  [] do_group_exit+0x3f/0xa0
[ 1196.921788]  [] get_signal_to_deliver+0x1d0/0x6f0
[ 1196.921790]  [] do_signal+0x48/0xad0
[ 1196.921791]  [] ? __switch_to+0x167/0x590
[ 1196.921793]  [] do_notify_resume+0x69/0xb0
[ 1196.921795]  [] int_signal+0x12/0x17
[ 1270.766540] device vnet3 entered promiscuous mode
[ 1270.865885] device vnet4 entered promiscuous mode
[ 1273.824576] kvm: zapping shadow pages for mmio generation wraparound
[ 1447.725335] kvm [6152]: vcpu0 unhandled rdmsr: 0x606

uvt-kvm create \
--memory 16384 \
--disk 100 \
--cpu 2 \
--ssh-public-key-file uvt-authorized_keys \
--template uvt-template.xml \
test release=trusty arch=amd64


  2
  



  
  
SandyBridge
Intel




-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1413540

Title:
  Trusty soft lockup issues with nested KVM

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1413540/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


  1   2   >