Using Mod1 as modifier triggers accelerator keys automatically

Bug #1857276 reported by Mikaël Francoeur
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
x11-xkb-utils (Ubuntu)
New
Undecided
Unassigned

Bug Description

1) Release: Ubuntu 16.04.04 LTS

2) Package x11-xkb-utils 7.7+2

3) In xkb, when using Mod1 (bound by default to left Alt and right Alt) to trigger a shift level, typing in a dialog box should not trigger accelerator shortcuts.

4) When using Mod1 in a xkb type, accelerator keys are triggered by default. So when logging in, the "o" in my password triggers the "OK" button, which forces me to use an alternate keyboard layout to enter my password. Same happens, for example, when using the screenshot tool, typing "s" triggers the "Take Screenshot" button.

Attached is the type file causing the issue. The offending type is "SIX_LEVEL", and the issue appears when I use Mod1 as the modifier for any shift level. I don't have this issue on my other layout (us).

ProblemType: Bug
DistroRelease: Ubuntu 16.04
Package: x11-xkb-utils 7.7+2
ProcVersionSignature: Ubuntu 4.13.0-41.46~16.04.1-generic 4.13.16
Uname: Linux 4.13.0-41-generic x86_64
.tmp.unity_support_test.0:

ApportVersion: 2.20.1-0ubuntu2.17
Architecture: amd64
CompizPlugins: No value set for `/apps/compiz-1/general/screen0/options/active_plugins'
CompositorRunning: compiz
CompositorUnredirectDriverBlacklist: '(nouveau|Intel).*Mesa 8.0'
CompositorUnredirectFSW: true
CurrentDesktop: Unity
Date: Sun Dec 22 21:22:46 2019
DistUpgraded: Fresh install
DistroCodename: xenial
DistroVariant: ubuntu
DkmsStatus: virtualbox-guest, 5.1.38, 4.13.0-41-generic, x86_64: installed
EcryptfsInUse: Yes
GraphicsCard:
 Intel Corporation HD Graphics 620 [8086:5916] (rev 02) (prog-if 00 [VGA controller])
   Subsystem: Dell Device [1028:07b8]
   Subsystem: Dell Sun XT [Radeon HD 8670A/8670M/8690M / R5 M330] [1028:07b8]
InstallationDate: Installed on 2018-01-11 (710 days ago)
InstallationMedia: Ubuntu 16.04.3 LTS "Xenial Xerus" - Release amd64 (20170801)
Lsusb:
 Bus 002 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub
 Bus 001 Device 003: ID 0cf3:e007 Atheros Communications, Inc.
 Bus 001 Device 002: ID 0bda:5689 Realtek Semiconductor Corp.
 Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
MachineType: Dell Inc. Latitude 3580
ProcEnviron:
 LANGUAGE=en_CA:en
 PATH=(custom, no user)
 XDG_RUNTIME_DIR=<set>
 LANG=en_CA.UTF-8
 SHELL=/bin/bash
ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-4.13.0-41-generic root=/dev/mapper/ubuntu--vg-root ro quiet splash vt.handoff=7
SourcePackage: x11-xkb-utils
UpgradeStatus: No upgrade log present (probably fresh install)
dmi.bios.date: 07/21/2017
dmi.bios.vendor: Dell Inc.
dmi.bios.version: 1.4.1
dmi.board.name: 0HPM4G
dmi.board.vendor: Dell Inc.
dmi.board.version: A00
dmi.chassis.type: 10
dmi.chassis.vendor: Dell Inc.
dmi.modalias: dmi:bvnDellInc.:bvr1.4.1:bd07/21/2017:svnDellInc.:pnLatitude3580:pvr:rvnDellInc.:rn0HPM4G:rvrA00:cvnDellInc.:ct10:cvr:
dmi.product.family: Latitude
dmi.product.name: Latitude 3580
dmi.sys.vendor: Dell Inc.
version.compiz: compiz 1:0.9.12.3+16.04.20180221-0ubuntu1
version.ia32-libs: ia32-libs N/A
version.libdrm2: libdrm2 2.4.92+git1805201830.cb592a~oibaf~x
version.libgl1-mesa-dri: libgl1-mesa-dri 18.2~git1805210730.bfa74b~oibaf~x
version.libgl1-mesa-dri-experimental: libgl1-mesa-dri-experimental N/A
version.libgl1-mesa-glx: libgl1-mesa-glx 18.2~git1805210730.bfa74b~oibaf~x
version.xserver-xorg-core: xserver-xorg-core N/A
version.xserver-xorg-input-evdev: xserver-xorg-input-evdev N/A
version.xserver-xorg-video-ati: xserver-xorg-video-ati N/A
version.xserver-xorg-video-intel: xserver-xorg-video-intel N/A
version.xserver-xorg-video-nouveau: xserver-xorg-video-nouveau N/A
xserver.bootTime: Sun Dec 22 17:38:50 2019
xserver.configfile: default
xserver.logfile: /var/log/Xorg.0.log
xserver.outputs:
 product id 1680
 vendor BOE
xserver.version: 2:1.19.5-0ubuntu2~16.04.1

Revision history for this message
Mikaël Francoeur (lemikaelf) wrote :
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.