As of 14 Sep, this is working in groovy... looks like things are
progressing with groovy,
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to bluez in Ubuntu.
https://bugs.launchpad.net/bugs/1894234
Title:
Bluetooth not working with Gnome i
This appears to be related to something peculiar happening to LVM, I'm
not using LVM, but /usr/share/initramfs-tools/hooks/cryptroot appears to
be trying to read a bunch of volume group data after reading
/etc/crypttab (which is empty!)...
+ grep -s ^[^#] /etc/crypttab
+ read target source key opt
Public bug reported:
I noticed that my encrypted swap was not working, and I found that the
randomly generated encrypted filesystem had randomly generated data that
had the magic number of a filesystem type, and hence ever more it
refused to start...
Eg:-
root@hardline:/etc# more /etc/crypttab
c
apport information
** Tags added: apport-collected utopic
** Description changed:
I noticed that my encrypted swap was not working, and I found that the
randomly generated encrypted filesystem had randomly generated data that
had the magic number of a filesystem type, and hence ever more i
apport information
** Attachment added: "CurrentDmesg.txt"
https://bugs.launchpad.net/bugs/1386339/+attachment/4247006/+files/CurrentDmesg.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net
apport information
** Attachment added: "CRDA.txt"
https://bugs.launchpad.net/bugs/1386339/+attachment/4247005/+files/CRDA.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1386339
Ti
apport information
** Attachment added: "ProcCpuinfo.txt"
https://bugs.launchpad.net/bugs/1386339/+attachment/4247010/+files/ProcCpuinfo.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/b
apport information
** Attachment added: "BootDmesg.txt"
https://bugs.launchpad.net/bugs/1386339/+attachment/4247004/+files/BootDmesg.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/
apport information
** Attachment added: "IwConfig.txt"
https://bugs.launchpad.net/bugs/1386339/+attachment/4247007/+files/IwConfig.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/13
apport information
** Attachment added: "Lspci.txt"
https://bugs.launchpad.net/bugs/1386339/+attachment/4247008/+files/Lspci.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1386339
apport information
** Attachment added: "Lsusb.txt"
https://bugs.launchpad.net/bugs/1386339/+attachment/4247009/+files/Lsusb.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1386339
apport information
** Attachment added: "UdevLog.txt"
https://bugs.launchpad.net/bugs/1386339/+attachment/4247015/+files/UdevLog.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1386
apport information
** Attachment added: "RfKill.txt"
https://bugs.launchpad.net/bugs/1386339/+attachment/4247013/+files/RfKill.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1386339
apport information
** Attachment added: "UdevDb.txt"
https://bugs.launchpad.net/bugs/1386339/+attachment/4247014/+files/UdevDb.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1386339
apport information
** Attachment added: "ProcInterrupts.txt"
https://bugs.launchpad.net/bugs/1386339/+attachment/4247011/+files/ProcInterrupts.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad
I have added the information collected by apport, although this seems
like such an obviously possible (if rare) event that it does not take
too much debugging to identify what is happening.
The issue is more about deciding what action to take, rather than
finding the bug... obviously you don't wan
apport information
** Attachment added: "WifiSyslog.txt"
https://bugs.launchpad.net/bugs/1386339/+attachment/4247016/+files/WifiSyslog.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bug
apport information
** Attachment added: "ProcModules.txt"
https://bugs.launchpad.net/bugs/1386339/+attachment/4247012/+files/ProcModules.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/b
Status changed to confirmed as requested above, regarding apport data.
** Changed in: linux (Ubuntu)
Status: Incomplete => New
** Changed in: linux (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscri
Public bug reported:
Using BTRFS to allow snapshot rollback from version updates actually
worked... I updated from 14.04 to 14.10 on Nov 1st, and encountered a
problem, I saw that update-manager had taken a snapshot before
completing the update, but after rollback I found that the snapshot was
tak
I cannot provide the output of apport since the issue occurred before
the upgrade process which is now complete... however I think it's fairly
obvious, this is a procedural issue, not a crash... the BTRFS snapshot
needs to happen before it starts making changes to perform the update.
** Changed in
Public bug reported:
I'm not completely sure how to summarise this bug, but it's obviously
potentially fatal and related to the kernel components of either xl2tpd,
pppd or IPv6.
I have an IPv6 connection using xl2tpd to make a ppp connection and then
route IPv6 over that... this works fine, but i
It broke for me between 5.19.0-15 and 5.19.0-17, and breaks every
flatpak app I have installed.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1990064
Title:
unconfined profile denies us
NB, also broke Steam (from .deb).
Is there a link anywhere to some of this discussion, happy for security
to be improved, but I'd like to understand what is being disabled, and
what the specific issue is.
--
You received this bug notification because you are a member of Kernel
Packages, which is
I'm still trying to understand the exact implications of this, since I
make extensive use of LXC containers, using subuid/subgid mapping, so
that users can create containers without needing access to UID 0.
Are we talking about blocking namespaces where UID 0 in the container is
mapped to the real
Sorry, this answer has confused me even more... heres an example of what
we're currently using, perhaps you can speak to that,,, the user in this
case has no special rights, certainly not cap_sys_admin.
james@trinity:~$ grep james /etc/subuid
james:10:65536
james@trinity:~$ ls -asl .local/shar
26 matches
Mail list logo