I have created Bug 1907814 to complain about apport refusing to report
bugs about unknown updates with an unhelpful message.
I believe these remain two separate concerns:
a) Retracting security upgrades on purpose after releasing them to non-proposed
channels needs a better workflow, reverting in
This affects multiple GA and HWE (including -edge) stacks.
These are the notices announcing the now missing package versions as
intentional releases:
https://ubuntu.com/security/notices/USN-4658-1
https://ubuntu.com/security/notices/USN-4659-1
https://ubuntu.com/security/notices/USN-4660-1
https:
This link is what *should* have been easily discoverable for anyone
wondering about the vanished version:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1907262
Ideas:
* allow updating USNs even when no new binaries are available, simply because
changelogs are *not*
* add this possibility t
Public bug reported:
Since upgrading to 5.4.0-56-generic my RPI3 devices started freezing
randomly, about once every few hours. Diagnostics so far have not turned
up anything useful, still busy figuring out cross-compile bisect and a
reasonably fast reproduction.
The devices are also known as (/p
apport information
** Tags added: apport-collected
** Description changed:
Since upgrading to 5.4.0-56-generic my RPI3 devices started freezing
randomly, about once every few hours. Diagnostics so far have not turned
up anything useful, still busy figuring out cross-compile bisect and a
apport information
** Attachment added: "Lsusb-t.txt"
https://bugs.launchpad.net/bugs/1908423/+attachment/5444234/+files/Lsusb-t.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1908
apport information
** Attachment added: "CRDA.txt"
https://bugs.launchpad.net/bugs/1908423/+attachment/5444232/+files/CRDA.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1908423
Ti
apport information
** Attachment added: "ProcCpuinfoMinimal.txt"
https://bugs.launchpad.net/bugs/1908423/+attachment/5444237/+files/ProcCpuinfoMinimal.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.l
apport information
** Attachment added: "ProcModules.txt"
https://bugs.launchpad.net/bugs/1908423/+attachment/5444239/+files/ProcModules.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/b
apport information
** Attachment added: "CurrentDmesg.txt"
https://bugs.launchpad.net/bugs/1908423/+attachment/5444233/+files/CurrentDmesg.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net
apport information
** Attachment added: "UdevDb.txt"
https://bugs.launchpad.net/bugs/1908423/+attachment/5444240/+files/UdevDb.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1908423
apport information
** Attachment added: "WifiSyslog.txt"
https://bugs.launchpad.net/bugs/1908423/+attachment/5444241/+files/WifiSyslog.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bug
apport information
** Attachment added: "ProcCpuinfo.txt"
https://bugs.launchpad.net/bugs/1908423/+attachment/5444236/+files/ProcCpuinfo.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/b
apport information
** Attachment added: "ProcInterrupts.txt"
https://bugs.launchpad.net/bugs/1908423/+attachment/5444238/+files/ProcInterrupts.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad
apport information
** Attachment added: "Lsusb-v.txt"
https://bugs.launchpad.net/bugs/1908423/+attachment/5444235/+files/Lsusb-v.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1908
** Description changed:
Since upgrading to 5.4.0-56-generic my RPI3 devices started freezing
- randomly, about once every few hours. Diagnostics so far have not turned
- up anything useful, still busy figuring out cross-compile bisect and a
+ randomly, about once every few hours.
+
+ -56, -58 a
The logs attached to the original bug relate to the issue I care about.
The logs attached to fulfill ubuntu-kernel-bot demands contain the dmesg
output produced when doing `modprobe -r -v i2c_bcm2835` that demonstrate
how these kernel messages share some similarities.
** Changed in: linux (Ubuntu
Public bug reported:
Workaround snd-intel-sdw-acpi.dsp_driver=1 allows sound output, did not
investigate further.
Saw some upstream work mentioning "DSPless" mode that sounds like this might
become relevant on 6.5 again.
Recent 6.5 report where DSP detect worked, but sound did not: LP: #2039320
** Description changed:
- Workaround snd-intel-sdw-acpi.dsp_driver=1 allows sound output, did not
investigate further.
+ Workaround snd-intel-sdw-acpi.dsp_driver=1 allows sound output, did not
+ investigate further.
+
Saw some upstream work mentioning "DSPless" mode that sounds like this might
Public bug reported:
physdev iptables match was broken in a stable update.
A fix is described in upstream releases 5.15.109 and 6.1.26
== Regression details ==
Discovered in version: 5.19.0-42.43~22.04.1
Last known good version: 5.19.0-41.42~22.04.1
How to tell? Add & use a bridge interface, add
** Description changed:
physdev iptables match was broken in a stable update.
- A fix is described in upstream releases 5.15.109 and 6.1.26
+
+ A fix was already committed in upstream releases
+ 5.4.242
+ 5.15.109
+ 6.1.26
+ 6.2.13 / LP: #2023929
== Regression details ==
Discovered in ve
Public bug reported:
Patch "UBUNTU: SAUCE: apparmor4.0.0 [42/76]: Stacking v38: Audit: Add record
for multiple object contexts"
- see LP: #2028253 - emits a new kernel error:
"error in audit_log_object_context"
Could use some explanation, and likely workarounds in whatever software
(update, pos
** Description changed:
Patch "UBUNTU: SAUCE: apparmor4.0.0 [42/76]: Stacking v38: Audit: Add record
for multiple object contexts"
- see LP: #2028253 - emits a new kernel error:
"error in audit_log_object_context"
Could use some explanation, and likely workarounds in whatever softwa
Extra step needed when testing these proposed packages against kernels
providing the rc:
dkms and dpkg disagree on version sort order.
# dpkg prioritizes tilde
dpkg --compare-versions '2.2.0-0ubuntu1~23.10' gt '2.2.0~rc3-0ubuntu4' ; echo $?
# dkms determines dash comes first
dpkg-reconfigure zfs
SuperSpeed, specifically:
https://lore.kernel.org/all/c1a18876-c505-4d4f-9f58-264199135...@rowland.harvard.edu/
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2043197
Title:
USB bus erro
In the last line, what does 861d25eea98e reference?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2023230
Title:
Jammy update: v5.15.105 upstream stable release
Status in linux package
0.15.06-2 against 6.2.0-1006-kvm also eats memory, but sometimes adds:
13:06:48.136501 AppArmor DFA next/check upper bounds error
13:06:48.204486 AppArmor DFA next/check upper bounds error
13:06:48.228502 AppArmor DFA next/check upper bounds error
13:06:48.476002 AppArmor DFA state with invalid ma
Fixed in:
Ubuntu 6.2.0-26.26~22.04.1-generic 6.2.13
Available on jammy via:
linux-image-generic-hwe-22.04-edge
** Changed in: linux (Ubuntu)
Status: Fix Committed => Fix Released
** Description changed:
physdev iptables match was broken in a stable update.
A fix was already committ
Is there a way to have either launchpad or snapd track the status in
snap-managed library hardcopies?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2031093
Title:
libgnutls report "trap
** Also affects: linux-hwe-6.8 (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-hwe-6.2 in Ubuntu.
https://bugs.launchpad.net/bugs/2039747
Title:
snd_intel_dsp_driver_probe page
Similar device on linux-image-generic-hwe-22.04 ~> linux-
modules-6.8.0-40-generic
# dmidecode | grep 'Family: T'
Family: ThinkPad T14 Gen 1
# grep -rH .
/sys/class/firmware-attributes/thinklmi/attributes/{MicrophoneAccess,IntegratedAudioAccess,SGXControl,KernelDMAProtection}/current_value
/sys
** Description changed:
Patch "UBUNTU: SAUCE: apparmor4.0.0 [42/76]: Stacking v38: Audit: Add record
for multiple object contexts"
- see LP: #2028253 - emits a new kernel error:
"error in audit_log_object_context"
Could use some explanation, and likely workarounds in whatever softwa
32 matches
Mail list logo