[Group.of.nepali.translators] [Bug 1930286] Re: Defensics' synopsys fuzzer testing tool cause openssh to segfault

2021-06-07 Thread Eric Desrochers
** Changed in: openssh (Ubuntu Xenial)
   Status: New => In Progress

** Description changed:

+ [Impact] 
  Here's what has been brought to my attention by a UA customer:
  
  * Release:
  Xenial/16.04LTS
  
  * Openssh version:
  7.2p2-4ubuntu2.10
  
  * Fuzzer tool used:
  
https://www.synopsys.com/software-integrity/security-testing/fuzz-testing.html 
(proprietary software)
  
  As of today, I have no access to a reproducer. Still working on getting
  access to one (if possible) in order to better understand what the
  failing test scenario is doing.
  
  * coredump:
  
  $ gdb $(which sshd) core.cic-1.domain.tld.1612566260.sshd.20731
  ...
  Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
  Core was generated by `sshd: [net] '.
  Program terminated with signal SIGSEGV, Segmentation fault.
  #0 __memcpy_avx_unaligned () at 
../sysdeps/x86_64/multiarch/memcpy-avx-unaligned.S:136
  136 ../sysdeps/x86_64/multiarch/memcpy-avx-unaligned.S: No such file or 
directory.
  (gdb) bt
  #0 __memcpy_avx_unaligned () at 
../sysdeps/x86_64/multiarch/memcpy-avx-unaligned.S:136
  #1 0x7fec25b241db in memcpy (__len=, __src=0x0, 
__dest=)
  at /usr/include/x86_64-linux-gnu/bits/string3.h:53
  #2 aes_gcm_ctrl (c=0x558a7ae19758, type=, arg=, 
ptr=0x0) at e_aes.c:1189
  #3 0x7fec25b20897 in EVP_CIPHER_CTX_ctrl (ctx=ctx@entry=0x558a7ae19758, 
type=type@entry=18, arg=arg@entry=-1, ptr=ptr@entry=0x0) at evp_enc.c:619
  #4 0x558a7953f54c in cipher_init (cc=cc@entry=0x558a7ae19750, 
cipher=0x558a797b3ef0 , key=0x0, keylen=32, iv=0x0, 
ivlen=, do_encrypt=0) at ../cipher.c:336
  #5 0x558a7954521a in ssh_set_newkeys (ssh=ssh@entry=0x558a7ae18ef0, 
mode=mode@entry=0)at ../packet.c:919
  #6 0x558a7955ae92 in kex_input_newkeys (type=, 
seq=, ctxt=0x558a7ae18ef0)at ../kex.c:434
  #7 0x558a7954d269 in ssh_dispatch_run (ssh=ssh@entry=0x558a7ae18ef0, 
mode=0, done=0x558a7ae18278, ctxt=0x558a7ae18ef0) at ../dispatch.c:119
  #8 0x558a7954d2b9 in ssh_dispatch_run_fatal (ssh=0x558a7ae18ef0, 
mode=, done=, ctxt=) at 
../dispatch.c:140
  #9 0x558a79502770 in do_ssh2_kex () at ../sshd.c:2744
  #10 main (ac=, av=) at ../sshd.c:2301
  (gdb)
+ 
+ [Test plan]
+ 
+ ** NOT REPRODUCIBLE ON MY SIDE **
+ 
+ This seems to be a corner case generated by the Defensics fuzzer test
+ suite (proprietary software from synopsys).
+ 
+ That's the only way this could have been reproduced so far.
+ 
+ [Where problem could occur]
+ 
+ [Other information]
+ 
+ Upstream fix:
+ 
https://github.com/openssh/openssh-portable/commit/2adbe1e63bc313d03e8e84e652cc623af8ebb163
+ 
+ Only Xenial requires the fix:
+ 
+ # git describe --contains 2adbe1e
+ V_7_5_P1~7
+ 
+ # rmadison openssh
+  => openssh | 1:7.2p2-4ubuntu2.10 | xenial-updates   | source
+  openssh | 1:7.6p1-4   | bionic   | source
+  openssh | 1:7.6p1-4ubuntu0.3  | bionic-security  | source
+  openssh | 1:7.6p1-4ubuntu0.3  | bionic-updates   | source
+  openssh | 1:7.6p1-4ubuntu0.4  | bionic-proposed  | source
+  openssh | 1:8.2p1-4   | focal| source
+  openssh | 1:8.2p1-4ubuntu0.2  | focal-security   | source
+  openssh | 1:8.2p1-4ubuntu0.2  | focal-updates| source
+  openssh | 1:8.3p1-1   | groovy   | source
+  openssh | 1:8.3p1-1ubuntu0.1  | groovy-security  | source
+  openssh | 1:8.3p1-1ubuntu0.1  | groovy-updates   | source
+  openssh | 1:8.4p1-5ubuntu1| hirsute  | source
+  openssh | 1:8.4p1-5ubuntu1| impish   | source

** Changed in: openssh (Ubuntu)
   Status: New => Fix Released

** Changed in: openssh (Ubuntu Xenial)
   Importance: Undecided => Medium

** Description changed:

- [Impact] 
+ [Impact]
  Here's what has been brought to my attention by a UA customer:
  
  * Release:
  Xenial/16.04LTS
  
  * Openssh version:
  7.2p2-4ubuntu2.10
  
  * Fuzzer tool used:
  
https://www.synopsys.com/software-integrity/security-testing/fuzz-testing.html 
(proprietary software)
  
- As of today, I have no access to a reproducer. Still working on getting
- access to one (if possible) in order to better understand what the
- failing test scenario is doing.
+ As of today, I have no access to a reproducer.
  
  * coredump:
  
  $ gdb $(which sshd) core.cic-1.domain.tld.1612566260.sshd.20731
  ...
  Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
  Core was generated by `sshd: [net] '.
  Program terminated with signal SIGSEGV, Segmentation fault.
  #0 __memcpy_avx_unaligned () at 
../sysdeps/x86_64/multiarch/memcpy-avx-unaligned.S:136
  136 ../sysdeps/x86_64/multiarch/memcpy-avx-unaligned.S: No such file or 
directory.
  (gdb) bt
  #0 __memcpy_avx_unaligned () at 
../sysdeps/x86_64/multiarch/memcpy-avx-unaligned.S:136
  #1 0x7fec25b241db in memcpy (__len=, __src=0x0, 
__dest=)
  at /usr/include/x86_64-linux-gnu/bits/string3.h:53
  #2 aes_gcm_ctrl (c=0x558a7ae19758, type=, arg=, 
ptr=0x0) at e_aes.c:1189
  #3 0x7fec25b20897 in EVP_CIPHER_CTX_

[Group.of.nepali.translators] [Bug 1930286] [NEW] Defensics fuzzer testing tool cause openssh to segfault

2021-05-31 Thread Eric Desrochers
Public bug reported:

I'm reporting this bug to keep track of it, as of today I'm still
collecting informations.

Here's what I have gathered so far:

Release: Xenial/16.04LTS
Openssh version :7.2p2-4ubuntu2.10
Fuzzer tool used: 
https://www.synopsys.com/software-integrity/security-testing/fuzz-testing.html 
(proprietary software)

As of today, I have no access to a reproducer. Still working on getting
access to one and better understand what the failing test scenario is
doing.

gdb backtrace:
$ gdb $(which sshd) core.cic-1.domain.tld.1612566260.sshd.20731
...
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
Core was generated by `sshd: [net] '.
Program terminated with signal SIGSEGV, Segmentation fault.
#0 __memcpy_avx_unaligned () at 
../sysdeps/x86_64/multiarch/memcpy-avx-unaligned.S:136
136 ../sysdeps/x86_64/multiarch/memcpy-avx-unaligned.S: No such file or 
directory.
(gdb) bt
#0 __memcpy_avx_unaligned () at 
../sysdeps/x86_64/multiarch/memcpy-avx-unaligned.S:136
#1 0x7fec25b241db in memcpy (__len=, __src=0x0, 
__dest=)
at /usr/include/x86_64-linux-gnu/bits/string3.h:53
#2 aes_gcm_ctrl (c=0x558a7ae19758, type=, arg=, 
ptr=0x0) at e_aes.c:1189
#3 0x7fec25b20897 in EVP_CIPHER_CTX_ctrl (ctx=ctx@entry=0x558a7ae19758, 
type=type@entry=18, arg=arg@entry=-1, ptr=ptr@entry=0x0) at evp_enc.c:619
#4 0x558a7953f54c in cipher_init (cc=cc@entry=0x558a7ae19750, 
cipher=0x558a797b3ef0 , key=0x0, keylen=32, iv=0x0, 
ivlen=, do_encrypt=0) at ../cipher.c:336
#5 0x558a7954521a in ssh_set_newkeys (ssh=ssh@entry=0x558a7ae18ef0, 
mode=mode@entry=0)at ../packet.c:919
#6 0x558a7955ae92 in kex_input_newkeys (type=, 
seq=, ctxt=0x558a7ae18ef0)at ../kex.c:434
#7 0x558a7954d269 in ssh_dispatch_run (ssh=ssh@entry=0x558a7ae18ef0, 
mode=0, done=0x558a7ae18278, ctxt=0x558a7ae18ef0) at ../dispatch.c:119
#8 0x558a7954d2b9 in ssh_dispatch_run_fatal (ssh=0x558a7ae18ef0, 
mode=, done=, ctxt=) at 
../dispatch.c:140
#9 0x558a79502770 in do_ssh2_kex () at ../sshd.c:2744
#10 main (ac=, av=) at ../sshd.c:2301
(gdb)

** Affects: openssh (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: openssh (Ubuntu Xenial)
 Importance: Undecided
 Status: New

** Also affects: openssh (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Description changed:

  I'm reporting this bug to keep track of it, as of today I'm still
  collecting informations.
  
  Here's what I have gathered so far:
  
  Release: Xenial/16.04LTS
  Openssh version :7.2p2-4ubuntu2.10
- Fuzzer tool used: 
https://www.synopsys.com/software-integrity/security-testing/fuzz-testing.html
+ Fuzzer tool used: 
https://www.synopsys.com/software-integrity/security-testing/fuzz-testing.html 
(proprietary software)
+ 
+ As of today, I have no access to a reproducer.
  
  gdb backtrace:
  $ gdb $(which sshd) core.cic-1.domain.tld.1612566260.sshd.20731
  ...
  Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
  Core was generated by `sshd: [net] '.
  Program terminated with signal SIGSEGV, Segmentation fault.
  #0 __memcpy_avx_unaligned () at 
../sysdeps/x86_64/multiarch/memcpy-avx-unaligned.S:136
  136 ../sysdeps/x86_64/multiarch/memcpy-avx-unaligned.S: No such file or 
directory.
  (gdb) bt
  #0 __memcpy_avx_unaligned () at 
../sysdeps/x86_64/multiarch/memcpy-avx-unaligned.S:136
  #1 0x7fec25b241db in memcpy (__len=, __src=0x0, 
__dest=)
  at /usr/include/x86_64-linux-gnu/bits/string3.h:53
  #2 aes_gcm_ctrl (c=0x558a7ae19758, type=, arg=, 
ptr=0x0) at e_aes.c:1189
  #3 0x7fec25b20897 in EVP_CIPHER_CTX_ctrl (ctx=ctx@entry=0x558a7ae19758, 
type=type@entry=18, arg=arg@entry=-1, ptr=ptr@entry=0x0) at evp_enc.c:619
  #4 0x558a7953f54c in cipher_init (cc=cc@entry=0x558a7ae19750, 
cipher=0x558a797b3ef0 , key=0x0, keylen=32, iv=0x0, 
ivlen=, do_encrypt=0) at ../cipher.c:336
  #5 0x558a7954521a in ssh_set_newkeys (ssh=ssh@entry=0x558a7ae18ef0, 
mode=mode@entry=0)at ../packet.c:919
  #6 0x558a7955ae92 in kex_input_newkeys (type=, 
seq=, ctxt=0x558a7ae18ef0)at ../kex.c:434
  #7 0x558a7954d269 in ssh_dispatch_run (ssh=ssh@entry=0x558a7ae18ef0, 
mode=0, done=0x558a7ae18278, ctxt=0x558a7ae18ef0) at ../dispatch.c:119
  #8 0x558a7954d2b9 in ssh_dispatch_run_fatal (ssh=0x558a7ae18ef0, 
mode=, done=, ctxt=) at 
../dispatch.c:140
  #9 0x558a79502770 in do_ssh2_kex () at ../sshd.c:2744
  #10 main (ac=, av=) at ../sshd.c:2301
  (gdb)

** Description changed:

  I'm reporting this bug to keep track of it, as of today I'm still
  collecting informations.
  
  Here's what I have gathered so far:
  
  Release: Xenial/16.04LTS
  Openssh version :7.2p2-4ubuntu2.10
  Fuzzer tool used: 
https://www.synopsys.com/software-integrity/security-testing/fuzz-testing.html 
(proprietary software)
  
- As of today, I have no access to a reproducer.
+ As of today, I have no access to a reproducer. Still working on getting
+ access to one and better understand what the failing test

[Group.of.nepali.translators] [Bug 1925351] Re: [sos39][networking] dpdk port flapping observed during sosreport execution

2021-04-22 Thread Eric Desrochers
** Description changed:

  [IMPACT]
  
  sosreport networking plugin unconditionally exercise 'ethtool -e'.
  
  EEPROM dump collection might hang on specific types of devices,
  
  ETHTOOL(8)
     -e --eeprom-dump
    Retrieves and prints an EEPROM dump for the specified network 
device.  When raw is enabled,  then  it dumps  the raw EEPROM data to stdout. 
The length and offset parameters allow dumping certain portions of the EEPROM.  
Default is to dump the entire EEPROM.
  
  [TEST PLAN]
  
  * On a xenial system
  
  ## Should not execute 'ethtool -e' (New default behaviour)
  * sosreport -o networking
  
  ## Should execute 'ethtool -e'. (Only if sosreport is instructed to do so 
(AKA former default behaviour))
  * sosreport -o networking --plugin-option networking.eepromdump
  
  ## Should not execute 'ethtool -e' with -a (if with appropriate tunables in 
/etc/sos.conf)
  ---
  [tunables]
  networking.eepromdump = off
  ---
  
  ## Should execute 'ethtool -e' with -a (if without appropriate tunables
  in /etc/sos.conf)
  
  [WHERE PROBLEM OCCURS]
  
  No problem expected.
  
  networking plugin will be gated to prevent 'ethtool -e' to be run by
  default, so that 'sosreport -o networking' will now no longer execute
  'ethtool -e' command.
  
  On the other end, if one really want to eepromdump, one can use the
  'eepromdump' plugin option as follows:
  
  sosreport -o networking --plugin-option networking.eepromdump
  
  Yes, we are changing the default behaviour for good reasons as it may
  produce more harm than good the way it is at the moment, BUT the former
  behaviour is still available if *REALLY* needed, and after knowing the
  risk that this could occur.
  
  Note:
  sosreport -a ## Will still execute 'ethtool -e' as it turns all options to 
'True'.
  
     -a, --alloptions
    Set all boolean options to True for all enabled plug-ins.
  
  Unless one specify the following in /etc/sos.conf:
  ---
  [tunables]
  networking.eepromdump = off
  ---
  
  so 'sosreport -a' with a combination of adding the right tunables in
  /etc/sos.conf will prevent 'ethtool_e' to be executed.
  
  [OTHER INFORMATION]
  
  Upstream fix:
- 
https://github.com/sosreport/sos/commit/bc3b7eefa093af150286ad6c345cef6afe282756
+ 
https://github.com/sosreport/sos/commit/a74ef444a72691fab9c65fa679687cc2d6e0fc8c
+ 
+ $ git describe --contains aca8bd83
+ 4.1~44
+ 
+ $ rmadison sosreport
+ => sosreport | 3.9.1-1ubuntu0.16.04.1| xenial-updates 
+ sosreport | 4.1-1ubuntu0.18.04.1 | bionic-updates
+ sosreport | 4.1-1ubuntu0.20.04.1 | focal-updates 
+ sosreport | 4.1-1ubuntu0.20.10.1 | groovy-updates
+ sosreport | 4.1-1ubuntu1 | hirsute

** Also affects: sosreport (Ubuntu Focal)
   Importance: Undecided
   Status: New

** Also affects: sosreport (Ubuntu Groovy)
   Importance: Undecided
   Status: New

** Also affects: sosreport (Ubuntu Hirsute)
   Importance: Undecided
   Status: Fix Released

** Also affects: sosreport (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Changed in: sosreport (Ubuntu Bionic)
   Status: New => Fix Released

** Changed in: sosreport (Ubuntu Focal)
   Status: New => Fix Released

** Changed in: sosreport (Ubuntu Groovy)
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1925351

Title:
  [sos39][networking] dpdk port flapping observed during sosreport
  execution

Status in sosreport package in Ubuntu:
  Fix Released
Status in sosreport source package in Xenial:
  In Progress
Status in sosreport source package in Bionic:
  Fix Released
Status in sosreport source package in Focal:
  Fix Released
Status in sosreport source package in Groovy:
  Fix Released
Status in sosreport source package in Hirsute:
  Fix Released

Bug description:
  [IMPACT]

  sosreport networking plugin unconditionally exercise 'ethtool -e'.

  EEPROM dump collection might hang on specific types of devices,

  ETHTOOL(8)
     -e --eeprom-dump
    Retrieves and prints an EEPROM dump for the specified network 
device.  When raw is enabled,  then  it dumps  the raw EEPROM data to stdout. 
The length and offset parameters allow dumping certain portions of the EEPROM.  
Default is to dump the entire EEPROM.

  [TEST PLAN]

  * On a xenial system

  ## Should not execute 'ethtool -e' (New default behaviour)
  * sosreport -o networking

  ## Should execute 'ethtool -e'. (Only if sosreport is instructed to do so 
(AKA former default behaviour))
  * sosreport -o networking --plugin-option networking.eepromdump

  ## Should not execute 'ethtool -e' with -a (if with appropriate tunables in 
/etc/sos.conf)
  ---
  [tunables]
  networking.eepromdump = off
  ---

  ## Should execute 'ethtool -e' with -a (if without appr

[Group.of.nepali.translators] [Bug 1925351] [NEW] [networking] dpdk port flapping observed during sosreport execution

2021-04-21 Thread Eric Desrochers
Public bug reported:

[IMPACT]

sosreport networking plugin unconditionally exercise 'ethtool -e.

EEPROM dump collection might hang on specific types of devices,

ETHTOOL(8)
   -e --eeprom-dump
  Retrieves and prints an EEPROM dump for the specified network 
device.  When raw is enabled,  then  it dumps  the raw EEPROM data to stdout. 
The length and offset parameters allow dumping certain portions of the EEPROM.  
Default is to dump the entire EEPROM.

[TEST PLAN]

* On a xenial system

## Should not execute 'ethtool -e' (Default behaviour)
* sosreport -o networking

## Should execute 'ethtool -e'. (Only if sosreport is instructed to do so)
* sosreport -o networking --plugin-option networking.eepromdump

[WHERE PROBLEM OCCURS]

No problem expected.

networking plugin will be gated to prevent 'ethtool -e' to be run by
default, so that

sosreport -o networking will not execute 'ethtool -e' command.
On the other end, if one really want to eepromdump, one can use the 
'eepromdump' plugin option as follows:

sosreport -o networking --plugin-option networking.eepromdump

So we are changing the default behaviour, but the former one is still
available if *REALLY* needed, and knowing the risk that this can occur.

[OTHER INFORMATION]

Upstream fix:
https://github.com/sosreport/sos/commit/bc3b7eefa093af150286ad6c345cef6afe282756

** Affects: sosreport (Ubuntu)
 Importance: Undecided
 Status: Fix Released

** Affects: sosreport (Ubuntu Xenial)
 Importance: High
 Assignee: Eric Desrochers (slashd)
 Status: In Progress

** Changed in: sosreport (Ubuntu)
   Status: New => Fix Released

** Also affects: sosreport (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: sosreport (Ubuntu Xenial)
   Status: New => In Progress

** Changed in: sosreport (Ubuntu Xenial)
 Assignee: (unassigned) => Eric Desrochers (slashd)

** Changed in: sosreport (Ubuntu Xenial)
   Importance: Undecided => High

** Description changed:

  [IMPACT]
  
  sosreport networking plugin unconditionally exercise 'ethtool -e.
  
  EEPROM dump collection might hang on specific types of devices,
  
- 
  ETHTOOL(8)
--e --eeprom-dump
-   Retrieves and prints an EEPROM dump for the specified network 
device.  When raw is enabled,  then  it dumps  the raw EEPROM data to stdout. 
The length and offset parameters allow dumping certain portions of the EEPROM.  
Default is to dump the entire EEPROM.
- 
+    -e --eeprom-dump
+   Retrieves and prints an EEPROM dump for the specified network 
device.  When raw is enabled,  then  it dumps  the raw EEPROM data to stdout. 
The length and offset parameters allow dumping certain portions of the EEPROM.  
Default is to dump the entire EEPROM.
  
  [TEST CASE]
  
  * On a xenial system
- * sosreport -o networking
+ * sosreport -o networking ## Should not execute 'ethtool -e'
+ * sosreport -o networking --plugin-option networking.eepromdump ## Should 
execute 'ethtool -e'.
  
  [WHERE PROBLEM OCCURS]
  
  No problem expected.
  
  networking plugin will be gated to prevent 'ethtool -e' to be run by
  default, so that
  
  sosreport -o networking will not execute 'ethtool -e' command.
  On the other end, if one really want to eepromdump, one can use the 
'eepromdump' plugin option as follows:
  
  sosreport -o networking --plugin-option networking.eepromdump
  
- 
- So we are changing the default behaviour, but the former one is still 
available if *REALLY* needed, and knowing the risk that this can occurs.
+ So we are changing the default behaviour, but the former one is still
+ available if *REALLY* needed, and knowing the risk that this can occur.
  
  [OTHER INFORMATION]
  
- 
  Upstream fix:
  
https://github.com/sosreport/sos/commit/bc3b7eefa093af150286ad6c345cef6afe282756

** Description changed:

  [IMPACT]
  
  sosreport networking plugin unconditionally exercise 'ethtool -e.
  
  EEPROM dump collection might hang on specific types of devices,
  
  ETHTOOL(8)
     -e --eeprom-dump
    Retrieves and prints an EEPROM dump for the specified network 
device.  When raw is enabled,  then  it dumps  the raw EEPROM data to stdout. 
The length and offset parameters allow dumping certain portions of the EEPROM.  
Default is to dump the entire EEPROM.
  
- [TEST CASE]
+ [TEST PLAN]
  
  * On a xenial system
- * sosreport -o networking ## Should not execute 'ethtool -e'
- * sosreport -o networking --plugin-option networking.eepromdump ## Should 
execute 'ethtool -e'.
+ 
+ ## Should not execute 'ethtool -e' (Default behaviour)
+ * sosreport -o networking 
+ 
+ ## Should execute 'ethtool -e'. (Only if sosreport is instructed to do so)
+ * sosreport -o networking --plugin-option networking.eepromdump 
+ * sosreport -a --plugin-option n

[Group.of.nepali.translators] [Bug 1892275] Re: [sync][sru] sos upstream 4.0

2021-03-05 Thread Eric Desrochers
** Changed in: sosreport (Ubuntu Bionic)
   Status: In Progress => Won't Fix

** Changed in: sosreport (Ubuntu Bionic)
 Assignee: Eric Desrochers (slashd) => (unassigned)

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1892275

Title:
  [sync][sru] sos upstream 4.0

Status in sosreport:
  Unknown
Status in sosreport package in Ubuntu:
  Fix Released
Status in sosreport source package in Xenial:
  Won't Fix
Status in sosreport source package in Bionic:
  Won't Fix
Status in sosreport source package in Focal:
  Fix Released

Bug description:
  [Impact]
  The sos team is pleased to announce the release of sos-4.0. This is a major 
version release that represents a significant change to the sos project, new 
features, and bug fixes.

  https://github.com/sosreport/sos/releases/tag/4.0

  [Test Case]
  * Install sosreport 4.0-1* package
   ** Test new main binary 'sos' and it's former binary still present 
'sosreport' (e.g. sosreport -a --all-logs & sos report -a --all-logs)
    ** Test new features:
  *** sos-collect (Collect sosreport from multiple node simultaneously)
  *** sos-clean || sos-mask (It's aim is to scrub potentially sensitive 
information from sosreports in a consistent manner, beyond the obfuscation done 
by plugins already.) Replacement of the former project called 'soscleaner' 
which no longer deliver development.

  [Regression Potential]

  Main binary formerly known as 'sosreport' has been officially renamed
  to 'sos' but 'sosreport' still exist and has been carried over for now
  to help to transition for package maintainer. No impact nor
  behavioural change for existing user. They are welcome to use the new
  binary or the former one as they wish.

  -rwxr-xr-x 1 root root 1057 Aug 25 16:24 /usr/bin/sosreport
  -rwxr-xr-x 1 root root  596 Aug 25 16:24 /usr/bin/sos

  New functionalities has been added which could lead to possible bugs
  ,since they are fairly new addition, if not already caught by the
  travis/autopkg tests but if a problem arise it will be limited to the
  components itself and won't affect the main behaviour (which by the
  way remain the same, which is to collect a tarball using 'sosreport'
  or/and now 'sos report' subcommand.

  To resume, main known existing behaviour remain the same but some new
  features which are limited/independent to each other has been added to
  offer new features such as :

  * sos collect is a new sub command in this release, and is an
  integration of the standalone sos-collector project, with the aim
  being to collect sosreports from multiple systems simultaneously. Note
  that this sub-command requires python3-pexpect to be available. If the
  module is not available, sos collect will abort with an appropriate
  error message

  * sos clean, also available as sos mask, is a newly added sub-command
  in this release and is an implementation of the standalone soscleaner
  project. Its aim is to scrub potentially sensitive information from
  sosreports in a consistent manner, beyond the obfuscation done by
  plugins already.

  https://wiki.ubuntu.com/SosreportUpdates

  sos4.0 now enforces archives to be stored in /var/tmp.
  A debian patch has been made to continue to store in /tmp (current behaviour) 
to stay align with current behaviour but also because debian's systemd 
implementation doesn't provide a tmpfiles.d cleaner for /var/tmp. So /tmp 
remains the default "tmp-dir" location.

  During the testing, I found a py38 incompatibility related to
  dictionnary order, that I fixed upstream and cherry-pick for Ubuntu
  release having py38 found in : d/p/0002-fix-dict-order-
  py38-incompatibility.patch.

  Upstream commit:
  
https://github.com/sosreport/sos/pull/2207/commits/86dfd99931ac0199895cf5e41711fc9b1ab6feaf

  The old config (/etc/sos.conf) contents will not be carried over after
  update. Users will have to modify the new file (/etc/sos/sos.conf)
  instead (if needed).

  [Other Information]

  https://github.com/sosreport/sos/releases/tag/4.0

  [Original Description]
  https://github.com/sosreport/sos/releases/tag/4.0

  Major changes
  Sos has been redesigned to provide functionality beyond the well known report 
data collection usage. It has been updated to provide
  more functionality via sub-commands.

  A new sos binary has replaced the former sosreport binary as the main
  entry point for the utility.

  sos report is now used to generate sosreport tarballs. A sosreport binary is 
maintained as a redirection point and will now invoke sos report.
  sos collect formally brings sos-collector into the main sos project, and is 
used to collect sosreports from multiple nodes simultaneously. A sos-collector 

[Group.of.nepali.translators] [Bug 1892275] Re: [sync][sru] sos upstream 4.0

2021-02-25 Thread Eric Desrochers
** Changed in: sosreport (Ubuntu Xenial)
   Status: Confirmed => Won't Fix

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1892275

Title:
  [sync][sru] sos upstream 4.0

Status in sosreport:
  Unknown
Status in sosreport package in Ubuntu:
  Fix Released
Status in sosreport source package in Xenial:
  Won't Fix
Status in sosreport source package in Bionic:
  In Progress
Status in sosreport source package in Focal:
  Fix Released

Bug description:
  [Impact]
  The sos team is pleased to announce the release of sos-4.0. This is a major 
version release that represents a significant change to the sos project, new 
features, and bug fixes.

  https://github.com/sosreport/sos/releases/tag/4.0

  [Test Case]
  * Install sosreport 4.0-1* package
   ** Test new main binary 'sos' and it's former binary still present 
'sosreport' (e.g. sosreport -a --all-logs & sos report -a --all-logs)
    ** Test new features:
  *** sos-collect (Collect sosreport from multiple node simultaneously)
  *** sos-clean || sos-mask (It's aim is to scrub potentially sensitive 
information from sosreports in a consistent manner, beyond the obfuscation done 
by plugins already.) Replacement of the former project called 'soscleaner' 
which no longer deliver development.

  [Regression Potential]

  Main binary formerly known as 'sosreport' has been officially renamed
  to 'sos' but 'sosreport' still exist and has been carried over for now
  to help to transition for package maintainer. No impact nor
  behavioural change for existing user. They are welcome to use the new
  binary or the former one as they wish.

  -rwxr-xr-x 1 root root 1057 Aug 25 16:24 /usr/bin/sosreport
  -rwxr-xr-x 1 root root  596 Aug 25 16:24 /usr/bin/sos

  New functionalities has been added which could lead to possible bugs
  ,since they are fairly new addition, if not already caught by the
  travis/autopkg tests but if a problem arise it will be limited to the
  components itself and won't affect the main behaviour (which by the
  way remain the same, which is to collect a tarball using 'sosreport'
  or/and now 'sos report' subcommand.

  To resume, main known existing behaviour remain the same but some new
  features which are limited/independent to each other has been added to
  offer new features such as :

  * sos collect is a new sub command in this release, and is an
  integration of the standalone sos-collector project, with the aim
  being to collect sosreports from multiple systems simultaneously. Note
  that this sub-command requires python3-pexpect to be available. If the
  module is not available, sos collect will abort with an appropriate
  error message

  * sos clean, also available as sos mask, is a newly added sub-command
  in this release and is an implementation of the standalone soscleaner
  project. Its aim is to scrub potentially sensitive information from
  sosreports in a consistent manner, beyond the obfuscation done by
  plugins already.

  https://wiki.ubuntu.com/SosreportUpdates

  sos4.0 now enforces archives to be stored in /var/tmp.
  A debian patch has been made to continue to store in /tmp (current behaviour) 
to stay align with current behaviour but also because debian's systemd 
implementation doesn't provide a tmpfiles.d cleaner for /var/tmp. So /tmp 
remains the default "tmp-dir" location.

  During the testing, I found a py38 incompatibility related to
  dictionnary order, that I fixed upstream and cherry-pick for Ubuntu
  release having py38 found in : d/p/0002-fix-dict-order-
  py38-incompatibility.patch.

  Upstream commit:
  
https://github.com/sosreport/sos/pull/2207/commits/86dfd99931ac0199895cf5e41711fc9b1ab6feaf

  The old config (/etc/sos.conf) contents will not be carried over after
  update. Users will have to modify the new file (/etc/sos/sos.conf)
  instead (if needed).

  [Other Information]

  https://github.com/sosreport/sos/releases/tag/4.0

  [Original Description]
  https://github.com/sosreport/sos/releases/tag/4.0

  Major changes
  Sos has been redesigned to provide functionality beyond the well known report 
data collection usage. It has been updated to provide
  more functionality via sub-commands.

  A new sos binary has replaced the former sosreport binary as the main
  entry point for the utility.

  sos report is now used to generate sosreport tarballs. A sosreport binary is 
maintained as a redirection point and will now invoke sos report.
  sos collect formally brings sos-collector into the main sos project, and is 
used to collect sosreports from multiple nodes simultaneously. A sos-collector 
binary is maintained as a redirection point and will invoke sos collect.
  This means the standalone sos-collector utility will no longer be 
independently developed.
  sos clean formally brings soscleaner-like functionality into the main sos 
p

[Group.of.nepali.translators] [Bug 1906302] Re: [plugin][apt] Move unattended-upgrades log collection

2021-02-06 Thread Eric Desrochers
** Description changed:

- This commit move the collection of unattended-upgrades from 'logs' plugin to 
'apt' plugin:
+ [Impact]
+ 
+ Having u-u logs collection inside the apt plugin make more sense
+ (instead of logs plugin) as it is using apt functionalities and python
+ modules such as apt, apt_inst, apt_pkg.
+ 
+ u-u is a mechanism to automatically install security upgrades on
+ Debian/Ubuntu. It is enabled by default at installation.
+ 
+ 'sos' philosophy is that each plugin should be taken care of its own
+ logs.
+ 
+ [Test case]
+ 
+ * Deploy Ubuntu (A container will do)
+ * Run sosreport and make sure the systemd plugin is executed
+   ** sosreport -o apt
+ * Look the content of the generated tarball under 
'path_to_sosreport/var/log/unattended-upgrades/'
+ 
+ and under 'path_to_sosreport/sos_logs/sos.log' for the execution log of the 
'apt' plugin:
+ sos.log:2021-02-06 11:23:55,257 INFO: [plugin:apt] collecting path 
'/var/log/unattended-upgrades/.
+ 
+ 
+ [Where problem could occur]
+ 
+ If a problem have to occur, it will only be impacting the apt plugin
+ itself, not the core functionalities of 'sos' nor its other plugins.
+ 
+ A third party vendor might have to break the habit to assume that the
+ 'logs' plugin will take care of the 'u-u' logs, and that 'apt' is the
+ way to move forward now.
+ 
+ [Other information]
  
https://github.com/sosreport/sos/commit/9f057fb43a949cabb496d06506a59e411ef17812

** Description changed:

  [Impact]
  
  Having u-u logs collection inside the apt plugin make more sense
  (instead of logs plugin) as it is using apt functionalities and python
  modules such as apt, apt_inst, apt_pkg.
  
  u-u is a mechanism to automatically install security upgrades on
  Debian/Ubuntu. It is enabled by default at installation.
  
  'sos' philosophy is that each plugin should be taken care of its own
  logs.
  
  [Test case]
  
  * Deploy Ubuntu (A container will do)
  * Run sosreport and make sure the systemd plugin is executed
-   ** sosreport -o apt
+   ** sosreport -o apt
  * Look the content of the generated tarball under 
'path_to_sosreport/var/log/unattended-upgrades/'
  
- and under 'path_to_sosreport/sos_logs/sos.log' for the execution log of the 
'apt' plugin:
- sos.log:2021-02-06 11:23:55,257 INFO: [plugin:apt] collecting path 
'/var/log/unattended-upgrades/.
+ * And under 'path_to_sosreport/sos_logs/sos.log' for the execution log
+ of the 'apt' plugin:
  
+ sos.log:2021-02-06 11:23:55,257 INFO: [plugin:apt] collecting path
+ '/var/log/unattended-upgrades/.
  
  [Where problem could occur]
  
  If a problem have to occur, it will only be impacting the apt plugin
  itself, not the core functionalities of 'sos' nor its other plugins.
  
  A third party vendor might have to break the habit to assume that the
  'logs' plugin will take care of the 'u-u' logs, and that 'apt' is the
  way to move forward now.
  
  [Other information]
  
https://github.com/sosreport/sos/commit/9f057fb43a949cabb496d06506a59e411ef17812

** Changed in: sosreport (Ubuntu Groovy)
 Assignee: (unassigned) => Eric Desrochers (slashd)

** Changed in: sosreport (Ubuntu Groovy)
   Status: New => In Progress

** Changed in: sosreport (Ubuntu Focal)
 Assignee: (unassigned) => Eric Desrochers (slashd)

** Changed in: sosreport (Ubuntu Focal)
   Status: New => In Progress

** Changed in: sosreport (Ubuntu Xenial)
   Status: New => Won't Fix

** Changed in: sosreport (Ubuntu Bionic)
   Status: New => In Progress

** Changed in: sosreport (Ubuntu Bionic)
 Assignee: (unassigned) => Eric Desrochers (slashd)

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1906302

Title:
  [plugin][apt] Move unattended-upgrades log collection

Status in sosreport package in Ubuntu:
  Fix Released
Status in sosreport source package in Xenial:
  Won't Fix
Status in sosreport source package in Bionic:
  In Progress
Status in sosreport source package in Focal:
  In Progress
Status in sosreport source package in Groovy:
  In Progress
Status in sosreport source package in Hirsute:
  Fix Released

Bug description:
  [Impact]

  Having u-u logs collection inside the apt plugin make more sense
  (instead of logs plugin) as it is using apt functionalities and python
  modules such as apt, apt_inst, apt_pkg.

  u-u is a mechanism to automatically install security upgrades on
  Debian/Ubuntu. It is enabled by default at installation.

  'sos' philosophy is that each plugin should be taken care of its own
  logs.

  [Test case]

  * Deploy Ubuntu (A container will do)
  * Run sosreport an

[Group.of.nepali.translators] [Bug 1914372] Re: Ubuntu packages affected by CVE-2020-24553

2021-02-05 Thread Eric Desrochers
** Description changed:

  [Impact]
  
   Go before 1.14.8 and 1.15.x before 1.15.1 allows XSS because text/html
  is the default for CGI/FCGI handlers that lack a Content-Type header.
  
  [Test Case]
  
   Described as POC at https://www.redteam-pentesting.de/en/advisories/rt-
  sa-2020-004/-inconsistent-behavior-of-gos-cgi-and-fastcgi-transport-may-
  lead-to-cross-site-scripting:
  
   1. Use the snippet of CGI go code provided and run it: go run poc.go
   2. Run nginx with the config provided to forward the FastCGI calls to the go 
program.
   3. curl -i -o - http://localhost:8000
   4. Observe the output.
  
  In an affected golang build the output will say:
  Content-Type: text/html (...)
  while in the fixed version it should recognize the content type correctly as:
  Content-Type: image/png
  
  [Where problems could occur]
  
   * It may affect deployments where go apps are used as CGI scripts - if
  the setup was incorrectly relying on hard-coded content type it may
  require fixing it.
  
  [Other Info]
  
+  * It has been specifically backported upstream in release 1.14 series:
+ https://go.googlesource.com/go/+/8fcee8abbea1bb959c63a6944f9ddf490a97f802
+ 
+ $ git tag --contains 8fcee8abbe
+ go1.14.10
+ go1.14.11
+ go1.14.12
+ go1.14.13
+ go1.14.14
+ go1.14.15
+ go1.14.8
+ go1.14.9
+ 
+ 
   * The fix is present in golang-1.15 for hirsute and groovy.

** Also affects: golang-1.15 (Ubuntu)
   Importance: Undecided
   Status: New

** Changed in: golang-1.15 (Ubuntu)
   Status: New => Fix Released

** Changed in: golang-1.14 (Ubuntu Hirsute)
 Assignee: (unassigned) => Dariusz Gadomski (dgadomski)

** Changed in: golang-1.14 (Ubuntu Groovy)
 Assignee: (unassigned) => Dariusz Gadomski (dgadomski)

** Changed in: golang-1.14 (Ubuntu Focal)
 Assignee: (unassigned) => Dariusz Gadomski (dgadomski)

** Changed in: golang-1.10 (Ubuntu Bionic)
 Assignee: (unassigned) => Dariusz Gadomski (dgadomski)

** Changed in: golang-1.10 (Ubuntu Xenial)
 Assignee: (unassigned) => Dariusz Gadomski (dgadomski)

** Changed in: golang-1.14 (Ubuntu Hirsute)
   Status: New => In Progress

** Changed in: golang-1.14 (Ubuntu Groovy)
   Status: New => In Progress

** Changed in: golang-1.14 (Ubuntu Focal)
   Status: New => In Progress

** Changed in: golang-1.10 (Ubuntu Xenial)
   Status: New => In Progress

** Changed in: golang-1.10 (Ubuntu Bionic)
   Status: New => In Progress

** Description changed:

  [Impact]
  
   Go before 1.14.8 and 1.15.x before 1.15.1 allows XSS because text/html
  is the default for CGI/FCGI handlers that lack a Content-Type header.
  
  [Test Case]
  
   Described as POC at https://www.redteam-pentesting.de/en/advisories/rt-
  sa-2020-004/-inconsistent-behavior-of-gos-cgi-and-fastcgi-transport-may-
  lead-to-cross-site-scripting:
  
   1. Use the snippet of CGI go code provided and run it: go run poc.go
   2. Run nginx with the config provided to forward the FastCGI calls to the go 
program.
   3. curl -i -o - http://localhost:8000
   4. Observe the output.
  
  In an affected golang build the output will say:
  Content-Type: text/html (...)
  while in the fixed version it should recognize the content type correctly as:
  Content-Type: image/png
  
  [Where problems could occur]
  
   * It may affect deployments where go apps are used as CGI scripts - if
  the setup was incorrectly relying on hard-coded content type it may
  require fixing it.
  
  [Other Info]
  
-  * It has been specifically backported upstream in release 1.14 series:
+  * It has been specifically backported upstream in release 1.14 series 
(Starting w/ 1.14.8) as follows:
  https://go.googlesource.com/go/+/8fcee8abbea1bb959c63a6944f9ddf490a97f802
  
  $ git tag --contains 8fcee8abbe
  go1.14.10
  go1.14.11
  go1.14.12
  go1.14.13
  go1.14.14
  go1.14.15
  go1.14.8
  go1.14.9
  
- 
   * The fix is present in golang-1.15 for hirsute and groovy.

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1914372

Title:
  Ubuntu packages affected by CVE-2020-24553

Status in golang-1.14 package in Ubuntu:
  In Progress
Status in golang-1.15 package in Ubuntu:
  Fix Released
Status in golang-1.10 source package in Xenial:
  In Progress
Status in golang-1.10 source package in Bionic:
  In Progress
Status in golang-1.14 source package in Focal:
  In Progress
Status in golang-1.14 source package in Groovy:
  In Progress
Status in golang-1.14 source package in Hirsute:
  In Progress

Bug description:
  [Impact]

   Go before 1.14.8 and 1.15.x before 1.15.1 allows XSS because
  text/html is the default for CGI/FCGI handlers that lack a Content-
  Type header.

  [Test Case]

   Described as POC at https://www.redteam-pentesting.de/en/advisories
  /rt-sa-2020-004/-inconsistent-behavior-of-gos-cgi-and-fastcgi-
  transport-may-lead-to-cross-site-scrip

[Group.of.nepali.translators] [Bug 1907676] Re: segmentation fault when opening fd

2020-12-20 Thread Eric Desrochers
@julian, thanks for the quick reply. Will do.

** Changed in: python-apt (Ubuntu)
   Status: New => Fix Released

** Description changed:

  [Impact]
  
  USN-4668-1 introduced a regression in python-apt when using certain APIs
  with a file handle.
  
  [Test case]
  
  # Landscape scenario:
  1) On the Landscape server, create a package profile that installs a single 
package, 'hello' is enough.
  2) On the Landscape server, apply the package profile to a client
  3) On the Landscape client, verify that there is no segfault message on 
'/var/log/kern.log'
  4) On the Landscape server, verify that the activity to apply the package 
profile ends with success.
  
  Step 3) would show a segfault and step 4), the activity would stay 'In
  Progress' forever.
  
- [Where problem could occurs]
+ # dak scenario:
+ dak crashes with a segmentation fault in python3-apt when processing
+ uploads or processing the NEW queue on ftp-master; and also on my
+ playground server (used to generate the backtrace).
+ 
+ [Where problems could occurs]
  
  [Other info]
  
  See Debian bug:
  https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=977000
  
  Fix:
  
https://salsa.debian.org/apt-team/python-apt/-/commit/3d9af5f196ad6a6c6973ac699a15888d21a9bb52

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1907676

Title:
  segmentation fault when opening fd

Status in python-apt package in Ubuntu:
  Fix Released
Status in python-apt source package in Xenial:
  New
Status in python-apt source package in Bionic:
  New
Status in python-apt source package in Focal:
  New
Status in python-apt source package in Groovy:
  New
Status in python-apt package in Debian:
  Unknown

Bug description:
  [Impact]

  USN-4668-1 introduced a regression in python-apt when using certain
  APIs with a file handle.

  [Test case]

  # Landscape scenario:
  1) On the Landscape server, create a package profile that installs a single 
package, 'hello' is enough.
  2) On the Landscape server, apply the package profile to a client
  3) On the Landscape client, verify that there is no segfault message on 
'/var/log/kern.log'
  4) On the Landscape server, verify that the activity to apply the package 
profile ends with success.

  Step 3) would show a segfault and step 4), the activity would stay 'In
  Progress' forever.

  # dak scenario:
  dak crashes with a segmentation fault in python3-apt when processing
  uploads or processing the NEW queue on ftp-master; and also on my
  playground server (used to generate the backtrace).

  [Where problems could occurs]

  [Other info]

  See Debian bug:
  https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=977000

  Fix:
  
https://salsa.debian.org/apt-team/python-apt/-/commit/3d9af5f196ad6a6c6973ac699a15888d21a9bb52

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/python-apt/+bug/1907676/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1907262] Re: raid10: discard leads to corrupted file system

2020-12-09 Thread Eric Desrochers
@voidlily,

I would assume you are running a HWE kernel (v4.15) on Xenial.

If it's the case, fixing the Bionic kernel will generate a new HWE
(4.15) kernel for Xenial.


** Changed in: linux (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux (Ubuntu Trusty)
   Status: New => Invalid

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1907262

Title:
  raid10: discard leads to corrupted file system

Status in linux package in Ubuntu:
  Confirmed
Status in linux source package in Trusty:
  Invalid
Status in linux source package in Xenial:
  Invalid
Status in linux source package in Bionic:
  Fix Committed
Status in linux source package in Focal:
  Fix Committed
Status in linux source package in Groovy:
  Fix Committed

Bug description:
  Seems to be closely related to
  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1896578

  After updating the Ubuntu 18.04 kernel from 4.15.0-124 to 4.15.0-126
  the fstrim command triggered by fstrim.timer causes a severe number of
  mismatches between two RAID10 component devices.

  This bug affects several machines in our company with different HW
  configurations (All using ECC RAM). Both, NVMe and SATA SSDs are
  affected.

  How to reproduce:
   - Create a RAID10 LVM and filesystem on two SSDs
  mdadm -C -v -l10 -n2 -N "lv-raid" -R /dev/md0 /dev/nvme0n1p2 
/dev/nvme1n1p2
  pvcreate -ff -y /dev/md0
  vgcreate -f -y VolGroup /dev/md0
  lvcreate -n root-L 100G -ay -y VolGroup
  mkfs.ext4 /dev/VolGroup/root
  mount /dev/VolGroup/root /mnt
   - Write some data, sync and delete it
  dd if=/dev/zero of=/mnt/data.raw bs=4K count=1M
  sync
  rm /mnt/data.raw
   - Check the RAID device
  echo check >/sys/block/md0/md/sync_action
   - After finishing (see /proc/mdstat), check the mismatch_cnt (should be 0):
  cat /sys/block/md0/md/mismatch_cnt
   - Trigger the bug
  fstrim /mnt
   - Re-Check the RAID device
  echo check >/sys/block/md0/md/sync_action
   - After finishing (see /proc/mdstat), check the mismatch_cnt (probably in 
the range of N*1):
  cat /sys/block/md0/md/mismatch_cnt

  After investigating this issue on several machines it *seems* that the
  first drive does the trim correctly while the second one goes wild. At
  least the number and severity of errors found by a  USB stick live
  session fsck.ext4 suggests this.

  To perform the single drive evaluation the RAID10 was started using a single 
drive at once:
mdadm --assemble /dev/md127 /dev/nvme0n1p2
mdadm --run /dev/md127
fsck.ext4 -n -f /dev/VolGroup/root

vgchange -a n /dev/VolGroup
mdadm --stop /dev/md127

mdadm --assemble /dev/md127 /dev/nvme1n1p2
mdadm --run /dev/md127
fsck.ext4 -n -f /dev/VolGroup/root

  When starting these fscks without -n, on the first device it seems the
  directory structure is OK while on the second device there is only the
  lost+found folder left.

  Side-note: Another machine using HWE kernel 5.4.0-56 (after using -53
  before) seems to have a quite similar issue.

  Unfortunately the risk/regression assessment in the aforementioned bug
  is not complete: the workaround only mitigates the issues during FS
  creation. This bug on the other hand is triggered by a weekly service
  (fstrim) causing severe file system corruption.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1907262/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1907262] Re: raid10: discard leads to corrupted file system

2020-12-09 Thread Eric Desrochers
** Also affects: linux (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Trusty)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1907262

Title:
  raid10: discard leads to corrupted file system

Status in linux package in Ubuntu:
  Confirmed
Status in linux source package in Trusty:
  New
Status in linux source package in Xenial:
  New
Status in linux source package in Bionic:
  Fix Committed
Status in linux source package in Focal:
  Fix Committed
Status in linux source package in Groovy:
  Fix Committed

Bug description:
  Seems to be closely related to
  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1896578

  After updating the Ubuntu 18.04 kernel from 4.15.0-124 to 4.15.0-126
  the fstrim command triggered by fstrim.timer causes a severe number of
  mismatches between two RAID10 component devices.

  This bug affects several machines in our company with different HW
  configurations (All using ECC RAM). Both, NVMe and SATA SSDs are
  affected.

  How to reproduce:
   - Create a RAID10 LVM and filesystem on two SSDs
  mdadm -C -v -l10 -n2 -N "lv-raid" -R /dev/md0 /dev/nvme0n1p2 
/dev/nvme1n1p2
  pvcreate -ff -y /dev/md0
  vgcreate -f -y VolGroup /dev/md0
  lvcreate -n root-L 100G -ay -y VolGroup
  mkfs.ext4 /dev/VolGroup/root
  mount /dev/VolGroup/root /mnt
   - Write some data, sync and delete it
  dd if=/dev/zero of=/mnt/data.raw bs=4K count=1M
  sync
  rm /mnt/data.raw
   - Check the RAID device
  echo check >/sys/block/md0/md/sync_action
   - After finishing (see /proc/mdstat), check the mismatch_cnt (should be 0):
  cat /sys/block/md0/md/mismatch_cnt
   - Trigger the bug
  fstrim /mnt
   - Re-Check the RAID device
  echo check >/sys/block/md0/md/sync_action
   - After finishing (see /proc/mdstat), check the mismatch_cnt (probably in 
the range of N*1):
  cat /sys/block/md0/md/mismatch_cnt

  After investigating this issue on several machines it *seems* that the
  first drive does the trim correctly while the second one goes wild. At
  least the number and severity of errors found by a  USB stick live
  session fsck.ext4 suggests this.

  To perform the single drive evaluation the RAID10 was started using a single 
drive at once:
mdadm --assemble /dev/md127 /dev/nvme0n1p2
mdadm --run /dev/md127
fsck.ext4 -n -f /dev/VolGroup/root

vgchange -a n /dev/VolGroup
mdadm --stop /dev/md127

mdadm --assemble /dev/md127 /dev/nvme1n1p2
mdadm --run /dev/md127
fsck.ext4 -n -f /dev/VolGroup/root

  When starting these fscks without -n, on the first device it seems the
  directory structure is OK while on the second device there is only the
  lost+found folder left.

  Side-note: Another machine using HWE kernel 5.4.0-56 (after using -53
  before) seems to have a quite similar issue.

  Unfortunately the risk/regression assessment in the aforementioned bug
  is not complete: the workaround only mitigates the issues during FS
  creation. This bug on the other hand is triggered by a weekly service
  (fstrim) causing severe file system corruption.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1907262/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1905579] Re: parted crashes with invalid pointer on resizepart on focal

2020-12-01 Thread Eric Desrochers
Xenial and Bionic doesn't have such end_input pointer in
do_resizepart().

** Changed in: parted (Ubuntu Bionic)
   Status: In Progress => Won't Fix

** Changed in: parted (Ubuntu Xenial)
   Status: In Progress => Won't Fix

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1905579

Title:
  parted crashes with invalid pointer on resizepart on focal

Status in parted package in Ubuntu:
  Fix Released
Status in parted source package in Xenial:
  Won't Fix
Status in parted source package in Bionic:
  Won't Fix
Status in parted source package in Focal:
  In Progress
Status in parted source package in Groovy:
  In Progress
Status in parted source package in Hirsute:
  Fix Released

Bug description:
  [Impact]

  Parted is crashing (core dumping) during resize operation, while
  changing the end position of a partition.

  [Test Case]

  root@ubuntu-focal:~# parted /dev/sda resizepart 1 100%
  Warning: Partition /dev/sda1 is being used. Are you sure you want to continue?
  Yes/No? yes
  End?  [42.9GB]?
  free(): invalid pointer
  Aborted (core dumped)

  [Where problems could occur]

  As per resize documentation:
  "Note that this does not modify any filesystem present in the partition."
  "When growing a partition you will want to grow the filesystem afterwards"

  FS-wise the resize operation won't try to take action on the FS
  itself. It would need to be done by the admin as a separate step.

  If any problem arise, it will be limited to the resize functionality
  of parted. In this case, the impact would be ~ similar to the actual
  parted state (before this SRU), and one won't be able to resize as
  requested.

  [Other Info]

  
https://git.savannah.gnu.org/cgit/parted.git/commit/?id=ca845aeeddb17343c9289816833ca352f7c0d87b

  # Upstream repo:

  git describe --tags ca845ae
  v3.3-5-gca845ae

  # Ubuntu
  $ rmadison parted

   parted | 3.2-15ubuntu0.1   | xenial-updates
   parted | 3.2-20ubuntu0.2   | bionic-updates
   parted | 3.3-4 | focal
   parted | 3.3-4 | groovy
   parted | 3.3-4 | hirsute

  [Original Description]
  parted crashes with invalid pointer on resizepart on focal

  root@ubuntu-focal:~# parted /dev/sda resizepart 1 100%
  Warning: Partition /dev/sda1 is being used. Are you sure you want to continue?
  Yes/No? yes
  End?  [42.9GB]?
  free(): invalid pointer
  Aborted (core dumped)

  Discussion: https://www.mail-archive.com/bug-
  par...@gnu.org/msg04962.html

  Fix:
  https://github.com/bcl/parted/commit/883813c365482d06d05a1998e066792c48156f23

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/parted/+bug/1905579/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1903733] Re: Out of memory issue for websocket client

2020-11-18 Thread Eric Desrochers
** Description changed:

+ [Impact]
+ 
+ 
+ [Test Case]
+ 
+ 
+ [Where problems could occur]
+ 
+ 
+ [Other Info]
+ 
+ $ git remote -v
+ originhttps://github.com/tornadoweb/tornado.git (fetch)
+ originhttps://github.com/tornadoweb/tornado.git (push)
+ 
+ $ git describe --contains 20becca3
+ v5.1.0b1~28^2~1
+ 
+ $ rmadison python3-tornardo
+  => python3-tornado | 4.2.1-1ubuntu3  | xenial
+  python3-tornado | 4.5.3-1 | bionic/universe   
+  => python3-tornado | 4.5.3-1ubuntu0.1| bionic-updates/universe   
+  python3-tornado | 6.0.3+really5.1.1-3 | focal/universe
+  python3-tornado | 6.0.4-2 | groovy/universe   
+  python3-tornado | 6.0.4-3 | hirsute/universe 
+  python3-tornado | 6.1.0-1 | hirsute-proposed/universe 
+ 
+ 
+ [Original Description]
+ 
  Tornado has no 'flow control' for websockets. A websocket will receive data 
as fast as it can, and store the data in a deque. If that data is not consumed 
as fast as it is written, then that deque will grow in size indefinitely, 
ultimately leading to a memory error and killing the process.
  Fix is to use a Queue. Read and get messages from the queue on the client 
side.
  
  Patch file [0]
  Commit history [1]
  GitHub [2]
  Issue [3]
  
  [0] 
https://patch-diff.githubusercontent.com/raw/tornadoweb/tornado/pull/2351.patch
  [1] https://github.com/tornadoweb/tornado/pull/2351/commits
  [2] https://github.com/tornadoweb/tornado
  [3] https://github.com/tornadoweb/tornado/issues/2341
  
  Will provide test setup at a later point

** Also affects: python-tornado (Ubuntu Groovy)
   Importance: Undecided
   Status: New

** Also affects: python-tornado (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Also affects: python-tornado (Ubuntu Hirsute)
   Importance: Undecided
 Assignee: Heather Lemon (hypothetical-lemon)
   Status: New

** Also affects: python-tornado (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Also affects: python-tornado (Ubuntu Focal)
   Importance: Undecided
   Status: New

** Changed in: python-tornado (Ubuntu Hirsute)
   Status: New => Fix Released

** Changed in: python-tornado (Ubuntu Groovy)
   Status: New => Fix Released

** Changed in: python-tornado (Ubuntu Focal)
   Status: New => Fix Released

** Changed in: python-tornado (Ubuntu Hirsute)
 Assignee: Heather Lemon (hypothetical-lemon) => (unassigned)

** Changed in: python-tornado (Ubuntu Bionic)
 Assignee: (unassigned) => Heather Lemon (hypothetical-lemon)

** Changed in: python-tornado (Ubuntu Xenial)
 Assignee: (unassigned) => Heather Lemon (hypothetical-lemon)

** Description changed:

  [Impact]
- 
  
  [Test Case]
  
- 
  [Where problems could occur]
  
+ [Other Info]
  
- [Other Info]
+ Upstream commit(s):
+ 
https://github.com/tornadoweb/tornado/pull/2351/commits/20becca336caae61cd24f7afba0e177c0a210c70
  
  $ git remote -v
  originhttps://github.com/tornadoweb/tornado.git (fetch)
  originhttps://github.com/tornadoweb/tornado.git (push)
  
  $ git describe --contains 20becca3
  v5.1.0b1~28^2~1
  
  $ rmadison python3-tornardo
-  => python3-tornado | 4.2.1-1ubuntu3  | xenial
-  python3-tornado | 4.5.3-1 | bionic/universe   
-  => python3-tornado | 4.5.3-1ubuntu0.1| bionic-updates/universe   
-  python3-tornado | 6.0.3+really5.1.1-3 | focal/universe
-  python3-tornado | 6.0.4-2 | groovy/universe   
-  python3-tornado | 6.0.4-3 | hirsute/universe 
-  python3-tornado | 6.1.0-1 | hirsute-proposed/universe 
- 
+  => python3-tornado | 4.2.1-1ubuntu3  | xenial
+  python3-tornado | 4.5.3-1 | bionic/universe
+  => python3-tornado | 4.5.3-1ubuntu0.1| bionic-updates/universe
+  python3-tornado | 6.0.3+really5.1.1-3 | focal/universe
+  python3-tornado | 6.0.4-2 | groovy/universe
+  python3-tornado | 6.0.4-3 | hirsute/universe
+  python3-tornado | 6.1.0-1 | hirsute-proposed/universe
  
  [Original Description]
  
  Tornado has no 'flow control' for websockets. A websocket will receive data 
as fast as it can, and store the data in a deque. If that data is not consumed 
as fast as it is written, then that deque will grow in size indefinitely, 
ultimately leading to a memory error and killing the process.
  Fix is to use a Queue. Read and get messages from the queue on the client 
side.
  
  Patch file [0]
  Commit history [1]
  GitHub [2]
  Issue [3]
  
  [0] 
https://patch-diff.githubusercontent.com/raw/tornadoweb/tornado/pull/2351.patch
  [1] https://github.com/tornadoweb/tornado/pull/2351/commits
  [2] https://github.com/tornadoweb/tornado
  [3] https://github.com/tornadoweb/tornado/issues/2341
  
  Will provide test setup at a later point

-- 
You received this bug notification because you are a member of नेपाली

[Group.of.nepali.translators] [Bug 1893109] Re: Backport - collect ceph balancer and pr-autoscale status

2020-09-17 Thread Eric Desrochers
@CJ,

Could you produce a debdiff ? I'll sponsor it.

** Tags added: seg sts

** Also affects: sosreport (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Also affects: sosreport (Ubuntu Groovy)
   Importance: Undecided
   Status: New

** Also affects: sosreport (Ubuntu Focal)
   Importance: Undecided
   Status: New

** Also affects: sosreport (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Changed in: sosreport (Ubuntu Groovy)
   Status: New => In Progress

** Changed in: sosreport (Ubuntu Groovy)
 Assignee: (unassigned) => Chris Johnston (cjohnston)

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1893109

Title:
  Backport - collect ceph balancer and pr-autoscale status

Status in sosreport:
  Fix Released
Status in sosreport package in Ubuntu:
  In Progress
Status in sosreport source package in Xenial:
  New
Status in sosreport source package in Bionic:
  New
Status in sosreport source package in Focal:
  New
Status in sosreport source package in Groovy:
  In Progress

Bug description:
  It would be nice to collect:

  ceph osd pool autoscale-status
  ceph balancer status

  Upstream report: https://github.com/sosreport/sos/issues/2211
  Upstream commit: 
https://github.com/sosreport/sos/commit/52f4661e2b594134b98e2967b02cc860d7963fef

To manage notifications about this bug go to:
https://bugs.launchpad.net/sosreport/+bug/1893109/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1888854] Re: update ovs plugin

2020-08-28 Thread Eric Desrochers
*** This bug is a duplicate of bug 1892275 ***
https://bugs.launchpad.net/bugs/1892275

sosreport 4.0-1~ubuntu0.20.04.1 (currently found in focal-proposed) will
contain the above plugin update and more.

https://launchpad.net/ubuntu/+source/sosreport/4.0-1~ubuntu0.20.04.1

- Eric

** This bug has been marked a duplicate of bug 1892275
   [sync][sru] sos upstream 4.0

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/154

Title:
  update ovs plugin

Status in sosreport package in Ubuntu:
  Fix Released
Status in sosreport source package in Xenial:
  New
Status in sosreport source package in Bionic:
  New
Status in sosreport source package in Focal:
  In Progress

Bug description:
  [Impact]

  The Openvswitch plugin is a little outdated.

  sosreport is in constant development, and since 3.9.1 got released a
  few plugin updates, adds, ... has been merged upstream (Some changes
  has been reported and/or submitted by Canonical employees). Some
  changes will be beneficial for the Canonical support team in order to
  help troubleshooting UA customer and may also serve for other 3rd
  party vendor.

  [Test Case]

  * Install sosreport
  * Run sosreport in different customer scenarios:
  server, desktop, cloud, hypervisor, instance (container, vm), physical 
server, ...
  * Extract archive and look at the content, look for 0 size file (and use 
common sense if legit or not)
  * Look under "sos_reports" for full report.
  * Look under "sos_logs" for warnings/errors.
$ grep -v "INFO:" sos_logs/sos.log
  * Run "simple.sh": A quick port of the travis tests to bash. Generating 
various type of sosreports collection (which is part of the autopkgtest 
(d/test/simple.sh) now.

  * https://wiki.ubuntu.com/SosreportUpdates

  [Regression Potential]

  Sosreport, as of today, has ~300 plugins that are all configured
  differently and configured to run under certain conditions. We can't
  test all possible scenarios. All we can do is identify the most
  common, important and Ubuntu/Canonical related one and test them (e.g.
  Openstack*, juju, MAAS, kernel, ...). With that being said, it is
  definitely possible that certain plugins may not work as expected, but
  the risk will be very low (e.g. not collecting the desired
  information) and isolated to this specific plugin. It shouldn't affect
  the other plugins nor core functionalities of sosreport.

  [Other Information]
  [Original description]

  Backport OVS changes into sosreport (ubuntu)

  c2bf52d7 [openvswitch] poll dpdk status from ifaces and ports
  96c69385 [openvswitch] pull cfm, qos, and bond info
  4703cbaa [openvswitch] Add LACP stats
  27ef2569 [openvswitch] List important dpdk related directories
  bc0c0245 [openvswitch] ensure -t 5 for ovs-vsctl where needed
  eb145d94 [openvswitch] capture all datapath data
  798fc4a5 [openvswitch] pull additional bridge information
  e1b474af [openvswitch] add support for OpenFlow 1.4 and 1.5
  ac1ebcc8 [openvswitch] only check mempool information for dpdk-init=true

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sosreport/+bug/154/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1888403] Re: sosreport plugins updates

2020-08-28 Thread Eric Desrochers
*** This bug is a duplicate of bug 1892275 ***
https://bugs.launchpad.net/bugs/1892275

sosreport 4.0-1~ubuntu0.20.04.1 (currently found in focal-proposed) will
contain the above plugin update and more.

https://launchpad.net/ubuntu/+source/sosreport/4.0-1~ubuntu0.20.04.1

- Eric

** This bug has been marked a duplicate of bug 1892275
   [sync][sru] sos upstream 4.0

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1888403

Title:
  sosreport plugins updates

Status in sosreport package in Ubuntu:
  Fix Released
Status in sosreport source package in Xenial:
  New
Status in sosreport source package in Bionic:
  New
Status in sosreport source package in Focal:
  In Progress
Status in sosreport source package in Groovy:
  Fix Released

Bug description:
  [Impact]

  sosreport is in constant development, and since 3.9.1 got released a
  few plugin updates, adds, ... has been merged upstream (Some of the
  changes has been reported and/or submitted by Canonical employees).
  Some changes will be beneficial for the Canonical support team in
  order to help troubleshooting UA customer and may also serve for other
  3rd party vendor.

  [Test Case]

  * Install sosreport
  * Run sosreport in different customer scenarios:
  server, desktop, cloud, hypervisor, instance (container, vm), physical 
server, ...
  * Extract archive and look at the content, look for 0 size file (and use 
common sense if legit or not)
  * Look under "sos_reports" for full report.
  * Look under "sos_logs" for warnings/errors.
    $ grep -v "INFO:" sos_logs/sos.log
  * Run "simple.sh": A quick port of the travis tests to bash. Generating 
various type of sosreports collection (which is part of the autopkgtest 
(d/test/simple.sh) now.

  * https://wiki.ubuntu.com/SosreportUpdates

  [Regression Potential]

  Sosreport, as of today, has ~300 plugins that are all configured
  differently and configured to run under certain conditions. We can't
  test all possible scenarios. All we can do is identify the most
  common, important and Ubuntu/Canonical related one and test them (e.g.
  Openstack*, juju, MAAS, kernel, ...). With that being said, it is
  definitely possible that certain plugins may not work as expected, but
  the risk will be very low (e.g. not collecting the desired
  information) and isolated to this specific plugin. It shouldn't affect
  the other plugins nor core functionalities of sosreport.

  [Other Information]
  [Original description]

  List of plugins update under evaluation (so far) for next sosreport
  SRU:

  (The list is susceptible to change as it is still an evaluation as we
  speak)

  4be4e4ea [drbd] Add new plugin for DRBD
  43b4a9ab [maas] use maas-region instead of deprecated maas-region-admin
  31e04678 [networking] collect iptables when proper kernel modules loaded
  591cd4cf [networking] Small change to produce more-useful, numbered ufw rule 
status
  e8b38048 [systemd] update trigger with better generic file check
  e9d71c78 [ubuntu] support status command update
  3a50987a [sar] Extend command sadf to get more data out of sar
  9d572eb4 [kubernetes] Adding support for alternate Ubuntu deployments
  b34edec3 [pacemaker] Fix scrubbing when password contains an equal sign

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sosreport/+bug/1888403/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1888403] [NEW] sosreport plugins updates

2020-07-21 Thread Eric Desrochers
Public bug reported:

List of plugins update under evaluation (so far) for next sosreport SRU:

(The list is susceptible to change as it is still an evaluation as we
speak)

4be4e4ea [drbd] Add new plugin for DRBD
43b4a9ab [maas] use maas-region instead of deprecated maas-region-admin
c2bf52d7 [openvswitch] poll dpdk status from ifaces and ports
96c69385 [openvswitch] pull cfm, qos, and bond info
4703cbaa [openvswitch] Add LACP stats
27ef2569 [openvswitch] List important dpdk related directories
bc0c0245 [openvswitch] ensure -t 5 for ovs-vsctl where needed
eb145d94 [openvswitch] capture all datapath data
798fc4a5 [openvswitch] pull additional bridge information
e1b474af [openvswitch] add support for OpenFlow 1.4 and 1.5
ac1ebcc8 [openvswitch] only check mempool information for dpdk-init=true
31e04678 [networking] collect iptables when proper kernel modules loaded
591cd4cf [networking] Small change to produce more-useful, numbered ufw rule 
status
e8b38048 [systemd] update trigger with better generic file check
e9d71c78 [ubuntu] support status command update
3a50987a [sar] Extend command sadf to get more data out of sar
9d572eb4 [kubernetes] Adding support for alternate Ubuntu deployments
b34edec3 [pacemaker] Fix scrubbing when password contains an equal sign

** Affects: sosreport (Ubuntu)
 Importance: Medium
 Assignee: Eric Desrochers (slashd)
 Status: In Progress

** Affects: sosreport (Ubuntu Xenial)
 Importance: Undecided
 Status: New

** Affects: sosreport (Ubuntu Bionic)
 Importance: Undecided
 Status: New

** Affects: sosreport (Ubuntu Focal)
 Importance: Undecided
 Status: New

** Affects: sosreport (Ubuntu Groovy)
 Importance: Medium
 Assignee: Eric Desrochers (slashd)
 Status: In Progress


** Tags: seg sts

** Also affects: sosreport (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Also affects: sosreport (Ubuntu Groovy)
   Importance: Undecided
   Status: New

** Also affects: sosreport (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Also affects: sosreport (Ubuntu Focal)
   Importance: Undecided
   Status: New

** Tags added: seg sts

** Description changed:

  List of plugins update under evaluation (so far) for next sosreport SRU:
  
  4be4e4ea [drbd] Add new plugin for DRBD
  43b4a9ab [maas] use maas-region instead of deprecated maas-region-admin
  c2bf52d7 [openvswitch] poll dpdk status from ifaces and ports
  96c69385 [openvswitch] pull cfm, qos, and bond info
  4703cbaa [openvswitch] Add LACP stats
  27ef2569 [openvswitch] List important dpdk related directories
  bc0c0245 [openvswitch] ensure -t 5 for ovs-vsctl where needed
  eb145d94 [openvswitch] capture all datapath data
  798fc4a5 [openvswitch] pull additional bridge information
  e1b474af [openvswitch] add support for OpenFlow 1.4 and 1.5
  ac1ebcc8 [openvswitch] only check mempool information for dpdk-init=true
  31e04678 [networking] collect iptables when proper kernel modules loaded
  591cd4cf [networking] Small change to produce more-useful, numbered ufw rule 
status
- 1417827a [maas] Add snap support to maas plugin

** Changed in: sosreport (Ubuntu Groovy)
   Status: New => In Progress

** Changed in: sosreport (Ubuntu Groovy)
 Assignee: (unassigned) => Eric Desrochers (slashd)

** Changed in: sosreport (Ubuntu Groovy)
   Importance: Undecided => Medium

** Description changed:

  List of plugins update under evaluation (so far) for next sosreport SRU:
+ 
+ (The list is susceptible to change as it is still an evaluation as we
+ speak)
  
  4be4e4ea [drbd] Add new plugin for DRBD
  43b4a9ab [maas] use maas-region instead of deprecated maas-region-admin
  c2bf52d7 [openvswitch] poll dpdk status from ifaces and ports
  96c69385 [openvswitch] pull cfm, qos, and bond info
  4703cbaa [openvswitch] Add LACP stats
  27ef2569 [openvswitch] List important dpdk related directories
  bc0c0245 [openvswitch] ensure -t 5 for ovs-vsctl where needed
  eb145d94 [openvswitch] capture all datapath data
  798fc4a5 [openvswitch] pull additional bridge information
  e1b474af [openvswitch] add support for OpenFlow 1.4 and 1.5
  ac1ebcc8 [openvswitch] only check mempool information for dpdk-init=true
  31e04678 [networking] collect iptables when proper kernel modules loaded
  591cd4cf [networking] Small change to produce more-useful, numbered ufw rule 
status

** Description changed:

  List of plugins update under evaluation (so far) for next sosreport SRU:
  
  (The list is susceptible to change as it is still an evaluation as we
  speak)
  
  4be4e4ea [drbd] Add new plugin for DRBD
  43b4a9ab [maas] use maas-region instead of deprecated maas-region-admin
  c2bf52d7 [openvswitch] poll dpdk status from ifaces and ports
  96c69385 [openvswitch] pull cfm, qos, and bond info
  4703cbaa [openvswitch] Add LACP stats
  27ef2569 [openvswitch] List important dpdk related directories
  bc0c0245 [openvswitch] ensure -t 5 for ovs-vs

[Group.of.nepali.translators] [Bug 1865212] Re: simple.sh to be run as part of the autopkgtests

2020-07-15 Thread Eric Desrochers
** Changed in: sosreport (Ubuntu Xenial)
   Status: Won't Fix => In Progress

** Changed in: sosreport (Ubuntu Xenial)
 Assignee: (unassigned) => Eric Desrochers (slashd)

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1865212

Title:
  simple.sh to be run as part of the autopkgtests

Status in sosreport package in Ubuntu:
  Fix Released
Status in sosreport source package in Xenial:
  In Progress
Status in sosreport source package in Bionic:
  Fix Released
Status in sosreport source package in Eoan:
  Fix Released

Bug description:
  [Impact]
  I'd like to provide more testing/regression detection to the actual 
autopkgtest for sosreport.

  [Test Case]
  The acceptance criteria:
  * The autopkgtest infra picks the simple.sh
  * Executes/runs it
  * and that the script passes all verifications.

  [Regression potential]

  simple.sh is generating sosreport(s) archive using various
  parameters/arguments and look for its success.

  That will enhance the detection of potential regression inside
  sosreport to them early.

  One regression I can think of is simple.sh providing false positive
  and/or that the script always fails, but it is unlikely to happen
  because I've been using it manually for quite some time now and it has
  been proven to work well.

  If pending sru doesn't reveal any regression then we are all good.
  autopkgtest log can also be use as a proof that simple.sh did run as expected.

  [Original Description]

  Reporting this bug as a reminder for me to start working at eventually
  include simple.sh[0] to be run as part of the sosreport's autopkgtest.

  Autopkgtest restriction definitions requirement: needs-root

  [0] - A quick port of the travis tests to bash, requires root
  https://github.com/sosreport/sos/blob/master/tests/simple.sh

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sosreport/+bug/1865212/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1884293] Re: Update to maintenance release v3.9.1

2020-07-15 Thread Eric Desrochers
** Changed in: sosreport (Ubuntu Xenial)
   Status: Won't Fix => In Progress

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1884293

Title:
  Update to maintenance release v3.9.1

Status in sosreport package in Ubuntu:
  Fix Released
Status in sosreport source package in Xenial:
  In Progress
Status in sosreport source package in Bionic:
  Fix Released
Status in sosreport source package in Eoan:
  Fix Released
Status in sosreport source package in Focal:
  Fix Released

Bug description:
  [Impact]

  sosreport 3.9.1 is now released.

  It would be great to find sosreport v3.9.1 in supported stable
  releases, and active development release considering the fact that the
  releases (especially LTSes) are going to be supported for a couple of
  years.

  Sosreport is widely used by Canonical support team (and mission
  critical) to troubleshoot UA (Ubuntu Advantage) customer, partners,
  community users,  and so on.

  Just like we did for :
  - v3.5 (LP: #1734983)
  - v3.6 (LP: #1775195)
  - v3.9 (LP: #1862830)

  [Test Case]

  * Install sosreport
  * Run sosreport in different customer scenarios:
  server, desktop, cloud, hypervisor, instance (container, vm), physical 
server, ...
  * Extract archive and look at the content, look for 0 size file (and use 
common sense if legit or not)
  * Look under "sos_reports" for full report.
  * Look under "sos_logs" for warnings/errors.
    $ grep -v "INFO:" sos_logs/sos.log
  * Run "simple.sh": A quick port of the travis tests to bash. Generating 
various type of sosreports collection (which is part of the autopkgtest 
(d/test/simple.sh) now.

  * Perform some dog fooding test routines (--all-logs, --upload,
  looking sosreport archive content, ... and so on)

  * https://wiki.ubuntu.com/SosreportUpdates

  [Regression Potential]

  Sosreport, as of today, has 300 plugins that are all configured
  differently and configured to run under certain conditions. We can't
  test all possible scenarios. All we can do is identify the most
  common, important and Ubuntu/Canonical related one and test them (e.g.
  Openstack*, juju, MAAS, kernel, ...). With that being said, it is
  definitely possible that certain plugins may not work as expected, but
  the risk will be very low (e.g. not collecting the desired
  information) and isolated to this specific plugin. It shouldn't affect
  the other plugins nor core functionalities of sosreport.

  [Other Information]

  * Release note:
  https://github.com/sosreport/sos/releases/tag/3.9.1

  [Original Description]

  3.9.1 is now found in Debian unstable and Groovy (Current Active Devel
  Release)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sosreport/+bug/1884293/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1886494] Re: sosreport does not correctly enable the maas plugin for a snap install

2020-07-15 Thread Eric Desrochers
** Also affects: sosreport (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: sosreport (Ubuntu Xenial)
   Importance: Undecided => Low

** Changed in: sosreport (Ubuntu Xenial)
 Assignee: (unassigned) => Eric Desrochers (slashd)

** Changed in: sosreport (Ubuntu Xenial)
   Status: New => In Progress

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1886494

Title:
  sosreport does not correctly enable the maas plugin for a snap install

Status in sosreport package in Ubuntu:
  Fix Released
Status in sosreport source package in Xenial:
  In Progress
Status in sosreport source package in Bionic:
  Fix Committed
Status in sosreport source package in Focal:
  Fix Committed
Status in sosreport source package in Groovy:
  Fix Released

Bug description:
  [Impact]

  sosreport doesn't exercise the MAAS plugin if it is installed as a SNAP.
  Only work if installed as a DEB package.

  [Test Case]

  * snap install maas
  * sosreport -a
  * Looking the sosreport archive content and validate that MAAS information 
haven't been collected (e.g. /path_to_sosreport/sos_commands/maas)

  [Regression Potential]

  No regression expected.
  If a regression happens it will only be isolated to the plugin itself.
  It won't affect/impact other plugin nor sosreport core functionalities.

  Worst case scenario, the MAAS plugin won't be exercised as expected,
  and one would need to request MAAS information manually.

  https://wiki.ubuntu.com/SosreportUpdates

  [Other Info]

  Upstream commit:
  - [maas] Add snap support to maas plugin
  - https://github.com/sosreport/sos/commit/1417827a

  [Original Description]

  Installing maas via snap on a focal machine (in my case lxd container)
  following:

  sudo snap install maas-test-db
  sudo snap install maas
  sudo maas init region --database-uri maas-test-db:///

  Then running sosreport, sosreport does not correctly enable the maas
  plugin.  I tested with version 3.9.1-1ubuntu0.20.04.1 of sosreport and
  also the upstream package from source.  Here are the results:

  root@testing:/sos# dpkg -l | grep sosreport
  ii  sosreport  3.9.1-1ubuntu0.20.04.1 amd64   
 Set of tools to gather troubleshooting data from a system
  root@testing:/sos# sosreport -l | grep maas
   maas inactive   Ubuntu Metal-As-A-Service
  root@testing:/sos# ./bin/sosreport -l | grep maas
   maas Ubuntu Metal-As-A-Service
   maas.profile-name The name with which you will later 
refer to this remote
   maas.url  The URL of the remote API
   maas.credentials  The credentials, also known as the 
API key

  As you can see the version of sosreport from the package lists the
  maas plugin as inactive but from source it is enabled.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sosreport/+bug/1886494/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1884293] Re: Update to maintenance release v3.9.1

2020-07-03 Thread Eric Desrochers
** Tags removed: verification-needed verification-needed-bionic 
verification-needed-focal
** Tags added: verification-done verification-done-bionic 
verification-done-focal

** Changed in: sosreport (Ubuntu Xenial)
   Status: Confirmed => Won't Fix

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1884293

Title:
  Update to maintenance release v3.9.1

Status in sosreport package in Ubuntu:
  Fix Released
Status in sosreport source package in Xenial:
  Won't Fix
Status in sosreport source package in Bionic:
  Fix Committed
Status in sosreport source package in Eoan:
  Fix Committed
Status in sosreport source package in Focal:
  Fix Committed

Bug description:
  [Impact]

  sosreport 3.9.1 is now released.

  It would be great to find sosreport v3.9.1 in supported stable
  releases, and active development release considering the fact that the
  releases (especially LTSes) are going to be supported for a couple of
  years.

  Sosreport is widely used by Canonical support team (and mission
  critical) to troubleshoot UA (Ubuntu Advantage) customer, partners,
  community users,  and so on.

  Just like we did for :
  - v3.5 (LP: #1734983)
  - v3.6 (LP: #1775195)
  - v3.9 (LP: #1862830)

  [Test Case]

  * Install sosreport
  * Run sosreport in different customer scenarios:
  server, desktop, cloud, hypervisor, instance (container, vm), physical 
server, ...
  * Extract archive and look at the content, look for 0 size file (and use 
common sense if legit or not)
  * Look under "sos_reports" for full report.
  * Look under "sos_logs" for warnings/errors.
    $ grep -v "INFO:" sos_logs/sos.log
  * Run "simple.sh": A quick port of the travis tests to bash. Generating 
various type of sosreports collection (which is part of the autopkgtest 
(d/test/simple.sh) now.

  * Perform some dog fooding test routines (--all-logs, --upload,
  looking sosreport archive content, ... and so on)

  * https://wiki.ubuntu.com/SosreportUpdates

  [Regression Potential]

  Sosreport, as of today, has 300 plugins that are all configured
  differently and configured to run under certain conditions. We can't
  test all possible scenarios. All we can do is identify the most
  common, important and Ubuntu/Canonical related one and test them (e.g.
  Openstack*, juju, MAAS, kernel, ...). With that being said, it is
  definitely possible that certain plugins may not work as expected, but
  the risk will be very low (e.g. not collecting the desired
  information) and isolated to this specific plugin. It shouldn't affect
  the other plugins nor core functionalities of sosreport.

  [Other Information]

  * Release note:
  https://github.com/sosreport/sos/releases/tag/3.9.1

  [Original Description]

  3.9.1 is now found in Debian unstable and Groovy (Current Active Devel
  Release)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sosreport/+bug/1884293/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1883320] Re: [kvm] change check_enabled to /dev/kvm

2020-06-21 Thread Eric Desrochers
** Changed in: sosreport (Ubuntu Bionic)
   Status: New => In Progress

** Also affects: sosreport (Ubuntu Eoan)
   Importance: Undecided
   Status: New

** Changed in: sosreport (Ubuntu Eoan)
   Status: New => In Progress

** Changed in: sosreport (Ubuntu Eoan)
 Assignee: (unassigned) => Eric Desrochers (slashd)

** Changed in: sosreport (Ubuntu Bionic)
 Assignee: (unassigned) => Eric Desrochers (slashd)

** Changed in: sosreport (Ubuntu Groovy)
   Importance: Undecided => Medium

** Changed in: sosreport (Ubuntu Eoan)
   Importance: Undecided => Medium

** Changed in: sosreport (Ubuntu Bionic)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1883320

Title:
  [kvm] change check_enabled to /dev/kvm

Status in sosreport package in Ubuntu:
  Fix Released
Status in sosreport source package in Xenial:
  New
Status in sosreport source package in Bionic:
  In Progress
Status in sosreport source package in Eoan:
  In Progress
Status in sosreport source package in Focal:
  In Progress
Status in sosreport source package in Groovy:
  Fix Released

Bug description:
  [Impact]

  The KVM plugin get triggered in a container
  (e.g lxd) because of "/sys/module/kvm"
  inheritance from the kernel host.

  Not only it's a waste of sosreport time,
  but running it inside a container may
  unintentionally reveal details from its
  host. Which is a undesired behaviour.

  Switching to /dev/kvm, is more appropriate
  and follow current standard as used by tool
  such as cpu-checker (kvm-ok) for instance.

  And taking benefit of this change to get rid
  of the check_enabled() overwrite in favour of
  using "files=" trigger.

  [Test Case]

  * Run sosreport inside a LXD container
  * The container will contain KVM information from its host (Iff its host as 
KVM installed)

  [Regression Potential]

  We only change the way the plugin gets triggered to use a most
  conventional way.

  If /dev/kvm exist, then exercise the kvm plugin.

  No regression expected, but worse case scenario, it will only be
  isolated and impact the KVM plugin to collect data properly as
  expected.

  It won't cause any harm to others plugins nor sosreport core
  functionalities itself.

  The commit went through some upstream Travis testing which used a
  shell script called "simple.sh" to verify sosreport collection.

  BTW, this same exact script is part of the sosreport autopkgtest, and
  will be run as part of the SRU to push this change.

  [Other Information]

  * Upstream bug:
  https://github.com/sosreport/sos/issues/2062

  * Upstream commit:
  
https://github.com/sosreport/sos/pull/2063/commits/dc58a038c18ff3e838d883d4b31aad5dac7ea9e1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sosreport/+bug/1883320/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1884293] Re: Update to maintenance release v3.9.1

2020-06-21 Thread Eric Desrochers
** Changed in: sosreport (Ubuntu Bionic)
   Status: Confirmed => In Progress

** Also affects: sosreport (Ubuntu Eoan)
   Importance: Undecided
   Status: New

** Changed in: sosreport (Ubuntu Eoan)
   Status: New => In Progress

** Changed in: sosreport (Ubuntu Eoan)
 Assignee: (unassigned) => Eric Desrochers (slashd)

** Changed in: sosreport (Ubuntu Eoan)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1884293

Title:
  Update to maintenance release v3.9.1

Status in sosreport package in Ubuntu:
  Fix Released
Status in sosreport source package in Xenial:
  Confirmed
Status in sosreport source package in Bionic:
  In Progress
Status in sosreport source package in Eoan:
  In Progress
Status in sosreport source package in Focal:
  In Progress

Bug description:
  [Impact]

  sosreport 3.9.1 is now released.

  It would be great to find sosreport v3.9.1 in supported stable
  releases, and active development release considering the fact that the
  releases (especially LTSes) are going to be supported for a couple of
  years.

  Sosreport is widely used by Canonical support team (and mission
  critical) to troubleshoot UA (Ubuntu Advantage) customer, partners,
  community users,  and so on.

  Just like we did for :
  - v3.5 (LP: #1734983)
  - v3.6 (LP: #1775195)
  - v3.9 (LP: #1862830)

  [Test Case]

  * Install sosreport
  * Run sosreport in different customer scenarios:
  server, desktop, cloud, hypervisor, instance (container, vm), physical 
server, ...
  * Extract archive and look at the content, look for 0 size file (and use 
common sense if legit or not)
  * Look under "sos_reports" for full report.
  * Look under "sos_logs" for warnings/errors.
    $ grep -v "INFO:" sos_logs/sos.log
  * Run "simple.sh": A quick port of the travis tests to bash. Generating 
various type of sosreports collection (which is part of the autopkgtest 
(d/test/simple.sh) now.

  * Perform some dog fooding test routines (--all-logs, --upload,
  looking sosreport archive content, ... and so on)

  [Regression Potential]

  Sosreport, as of today, has 300 plugins that are all configured
  differently and configured to run under certain conditions. We can't
  test all possible scenarios. All we can do is identify the most
  common, important and Ubuntu/Canonical related one and test them (e.g.
  Openstack*, juju, MAAS, kernel, ...). With that being said, it is
  definitely possible that certain plugins may not work as expected, but
  the risk will be very low (e.g. not collecting the desired
  information) and isolated to this specific plugin. It shouldn't affect
  the other plugins nor core functionalities of sosreport.

  [Other Information]

  * Release note:
  https://github.com/sosreport/sos/releases/tag/3.9.1

  [Original Description]

  3.9.1 is now found in Debian unstable and Groovy (Current Active Devel
  Release)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sosreport/+bug/1884293/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1883320] Re: [kvm] change check_enabled to /dev/kvm

2020-06-19 Thread Eric Desrochers
Fixed in Groovy's sosreport (3.9.1-1ubuntu1) uploaded earlier today.


  * New 3.9.1 upstream release. (LP: #1884293)
This maintenance release includes:
- New plugins: sos_extras, ovirt_engine_backup, console,
  validation_framework.
- lxd plugin collections have been overhauled.
- Fixed handling of the namespace pattern for the networking
  plugin.
- A basic path is now defined in Policy for all subclasses.

Plugin API Enhancements:
- Enablement checks have been extended to include architecture
  constraints.
- SoSPredicate has been extended to include architecture constraints,
  as well as negative constraints for all elements.
- Plugins will now capture service status information for all services
  defined in the services class attr.

Further release information and tarballs are available at:
- https://github.com/sosreport/sos/releases/tag/3.9.1

  * Former patches now fixed upstream:
- d/p/0001-unittest-py3-fix.patch
- d/p/0002-lxd-drop-db-collection-and-introduce-lxd-buginfo.patch

  * Other specific modifications:
- d/p/0001-lshw-command.patch
- d/p/0002-lds-substitute-oidc-conf.patch
==> - d/p/0003-kvm-change-trigger-to-dev-kvm.patch <==


** Changed in: sosreport (Ubuntu Groovy)
   Status: In Progress => Fix Released

** Changed in: sosreport (Ubuntu Focal)
   Status: New => In Progress

** Changed in: sosreport (Ubuntu Focal)
 Assignee: (unassigned) => Eric Desrochers (slashd)

** Changed in: sosreport (Ubuntu Focal)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1883320

Title:
  [kvm] change check_enabled to /dev/kvm

Status in sosreport package in Ubuntu:
  Fix Released
Status in sosreport source package in Xenial:
  New
Status in sosreport source package in Bionic:
  New
Status in sosreport source package in Focal:
  In Progress
Status in sosreport source package in Groovy:
  Fix Released

Bug description:
  [Impact]

  The KVM plugin get triggered in a container
  (e.g lxd) because of "/sys/module/kvm"
  inheritance from the kernel host.

  Not only it's a waste of sosreport time,
  but running it inside a container may
  unintentionally reveal details from its
  host. Which is a undesired behaviour.

  Switching to /dev/kvm, is more appropriate
  and follow current standard as used by tool
  such as cpu-checker (kvm-ok) for instance.

  And taking benefit of this change to get rid
  of the check_enabled() overwrite in favour of
  using "files=" trigger.

  [Test Case]

  * Run sosreport inside a LXD container
  * The container will contain KVM information from its host (Iff its host as 
KVM installed)

  [Regression Potential]

  We only change the way the plugin gets triggered to use a most
  conventional way.

  If /dev/kvm exist, then exercise the kvm plugin.

  No regression expected, but worse case scenario, it will only be
  isolated and impact the KVM plugin to collect data properly as
  expected.

  It won't cause any harm to others plugins nor sosreport core
  functionalities itself.

  The commit went through some upstream Travis testing which used a
  shell script called "simple.sh" to verify sosreport collection.

  BTW, this same exact script is part of the sosreport autopkgtest, and
  will be run as part of the SRU to push this change.

  [Other Information]

  * Upstream bug:
  https://github.com/sosreport/sos/issues/2062

  * Upstream commit:
  
https://github.com/sosreport/sos/pull/2063/commits/dc58a038c18ff3e838d883d4b31aad5dac7ea9e1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sosreport/+bug/1883320/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1884293] [NEW] Update to maintenance release v3.9.1

2020-06-19 Thread Eric Desrochers
Public bug reported:

[Impact]

sosreport 3.9.1 is now released.

It would be great to find sosreport v3.9.1 in supported stable releases,
and active development release considering the fact that the releases
(especially LTSes) are going to be supported for a couple of years.

Sosreport is widely used by Canonical support team to troubleshoot UA
(Ubuntu Advantage) customer, other vendors and community users.

Just like we did for :
- v3.5 (LP: #1734983)
- v3.6 (LP: #1775195)
- v3.9 (LP: #1862830)

[Test Case]

* Install sosreport
* Run sosreport in different customer scenarios:
server, desktop, cloud, hypervisor, instance (container, vm), physical server, 
...
* Extract archive and look at the content, look for 0 size file (and use common 
sense if legit or not)
* Look under "sos_reports" for full report.
* Look under "sos_logs" for warnings/errors.
  $ grep -v "INFO:" sos_logs/sos.log
* Run "simple.sh": A quick port of the travis tests to bash. Generating various 
type of sosreports collection (which is part of the autopkgtest 
(d/test/simple.sh) now.

* Perform some dog fooding test routines (--all-logs, --upload, lookg
sosreport archive content, ... and so on)

[Regression Potential]

Sosreport, as of today, has 300 plugins that are all configured
differently and configured to run under certain conditions. We can't
test all possible scenarios. All we can do is identify the most common,
important and Ubuntu/Canonical related one and test them (e.g.
Openstack*, juju, MAAS, kernel, ...). With that being said, it is
definitely possible that certain plugins may not work as expected, but
the risk will be very low (e.g. not collecting the desired information)
and isolated to this specific plugin. It shouldn't affect the other
plugins nor core functionalities of sosreport.

[Other Information]

* Release note:
https://github.com/sosreport/sos/releases/tag/3.9.1

[Original Description]

3.9.1 is now found in Debian unstable and Groovy (Current Active Devel
Release)

** Affects: sosreport (Ubuntu)
 Importance: Undecided
 Status: Fix Released

** Affects: sosreport (Ubuntu Xenial)
 Importance: Medium
 Assignee: Eric Desrochers (slashd)
 Status: In Progress

** Affects: sosreport (Ubuntu Bionic)
 Importance: Medium
 Assignee: Eric Desrochers (slashd)
 Status: In Progress

** Affects: sosreport (Ubuntu Focal)
 Importance: Medium
 Assignee: Eric Desrochers (slashd)
 Status: In Progress


** Tags: seg sts

** Also affects: sosreport (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Also affects: sosreport (Ubuntu Focal)
   Importance: Undecided
   Status: New

** Also affects: sosreport (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Changed in: sosreport (Ubuntu)
   Status: New => Fix Released

** Changed in: sosreport (Ubuntu Xenial)
   Status: New => In Progress

** Changed in: sosreport (Ubuntu Bionic)
   Status: New => In Progress

** Changed in: sosreport (Ubuntu Focal)
   Status: New => In Progress

** Changed in: sosreport (Ubuntu Focal)
 Assignee: (unassigned) => Eric Desrochers (slashd)

** Changed in: sosreport (Ubuntu Bionic)
 Assignee: (unassigned) => Eric Desrochers (slashd)

** Changed in: sosreport (Ubuntu Xenial)
 Assignee: (unassigned) => Eric Desrochers (slashd)

** Changed in: sosreport (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: sosreport (Ubuntu Bionic)
   Importance: Undecided => Medium

** Changed in: sosreport (Ubuntu Focal)
   Importance: Undecided => Medium

** Description changed:

  [Impact]
  
- sosreport 3.9 is now released.
+ sosreport 3.9.1 is now released.
  
- It would be great to find sosreport v3.9 in supported stable releases,
- and active development release considering the fact that the releasea
- (especially LTSes) are going to be supported for a couple of years
- still.
+ It would be great to find sosreport v3.9.1 in supported stable releases,
+ and active development release considering the fact that the releases
+ (especially LTSes) are going to be supported for a couple of years.
  
- Sosreport is widely use by Canonical support team to troubleshoot UA
+ Sosreport is widely used by Canonical support team to troubleshoot UA
  (Ubuntu Advantage) customer, other vendors and community users.
  
  Just like we did for :
  - v3.5 (LP: #1734983)
  - v3.6 (LP: #1775195)
  - v3.9 (LP: #1862830)
  
  [Test Case]
  
  * Install sosreport
  * Run sosreport in different customer scenarios:
  server, desktop, cloud, hypervisor, instance (container, vm), physical 
server, ...
  * Extract archive and look at the content, look for 0 size file (and use 
common sense if legit or not)
  * Look under "sos_reports" for full report.
  * Look under "sos_logs" for warnings/errors.
-   $ grep -v "INFO:" sos_logs/sos.log
+   $ grep -v "

[Group.of.nepali.translators] [Bug 1869465] Re: Kdump-Tools: Makedumpfile Failed, Falling Back To 'Cp'

2020-06-08 Thread Eric Desrochers
** Also affects: makedumpfile (Ubuntu)
   Importance: Undecided
   Status: New

** Changed in: makedumpfile (Ubuntu Groovy)
   Importance: Undecided => Medium

** Changed in: makedumpfile (Ubuntu Groovy)
   Status: New => In Progress

** Changed in: makedumpfile (Ubuntu Groovy)
 Assignee: (unassigned) => Ioanna Alifieraki (joalif)

** Tags removed: sts-sponsor-mfo-and-slashd
** Tags added: sts-sponsor-mfo

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1869465

Title:
  Kdump-Tools: Makedumpfile Failed, Falling Back To 'Cp'

Status in linux package in Ubuntu:
  In Progress
Status in makedumpfile package in Ubuntu:
  In Progress
Status in linux source package in Xenial:
  In Progress
Status in makedumpfile source package in Xenial:
  New
Status in linux source package in Bionic:
  In Progress
Status in makedumpfile source package in Bionic:
  New
Status in linux source package in Eoan:
  In Progress
Status in makedumpfile source package in Eoan:
  New
Status in linux source package in Focal:
  In Progress
Status in makedumpfile source package in Focal:
  New
Status in linux source package in Groovy:
  In Progress
Status in makedumpfile source package in Groovy:
  In Progress
Status in linux package in Debian:
  New

Bug description:
  [Impact]

  On some arm systems makedumpfile fails to translate virtual to physical 
addresses properly.
  This may result in makedumpfile looping forever exhausting
  all memory, or  translating a virtual address to an invalid physical address 
  and then failing and falling back to cp.
  The reason it cannot resolve some addresses is because the PMD mask is wrong. 
  When physical address mask allows up to 48bits pmd mask should allow the
  same, currently pmd mask is set to 40bits (see commit [1]).

  Commit [1] fixes this bug.

  [Test Case]

  To hit this bug you need a system that needs physical addresses over 1TB.
  This may be either because you have a lot
  of memory or because the firmware mapped some memory above 1TB for some
  reason [1].

  A user hit this bug because firmware mapped memory above 1TB and provided a 
  dump so I could reproduce the bug when running makedumpfile on the dump.

  [Regression Potential]

  This commit changes the PMD_SECTION_MASK for arm64. So any regression 
potential
  would only affect arm64 systems. In addition PMD_SECTION_MASK is used in 
translation
  from virtual to physical addresses and therefore any regression would happen 
during
  this process.

  [Other]

  [1]
  
https://github.com/makedumpfile/makedumpfile/commit/7242ae4cb5288df626f464ced0a8b60fd669100b

  
  When testing kdump on Ubuntu 18.04.4 (arm64) GA kernel, makedumpfile fails. 
The test steps are as follows:
  # echo 1> / proc / sys / kernel / sysrq
  # echo c> / proc / sysrq-trigger
  The logs are as follows:

  kdump-tools[646]: starting kdump-tools: * running makedumpfile -c -d 31 
/proc/vmcore /var/crash/202003251128/dump-incomplete
  kdump-tools[646]: readpage_elf: Attempt to read non-existent page at 0x0
  kdump-tools[646]: readmem: type_addr: 1, addr:ff0, size:8
  kdump-tools[646]: vaddr_to_paddr_arm64: Can't read pud
  kdump-tools[646]: readmem: Can't convert a virtual address(9e653690) to 
physical address.
  kdump-tools[646]: readmem: type_addr: 0, addr:9e653690, size:1032
  kdump-tools[646]: validate_mem_section: Can't read mem_section array.
  kdump-tools[646]: get_mem_section: Could not validate mem_section.
  kdump-tools[646]: get_mm_sparsemem: Can't get the address of mem_section.
  kdump-tools[646]: makedumpfile Failed.
  kdump-tools[646]: * kdump-tools: makedumpfile failed, falling back to 'cp'

  But when I use the HWE kernel, I find that there is no such problem.
  The HEW kernel version: 5.3.0-42-generic

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1869465/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1875927] Re: add support for phys_port_name attribute in Xenial/16.04LTS

2020-05-22 Thread Eric Desrochers
** Changed in: systemd (Ubuntu Xenial)
   Status: In Progress => Won't Fix

** Changed in: systemd (Ubuntu Xenial)
 Assignee: Eric Desrochers (slashd) => (unassigned)

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1875927

Title:
  add support for phys_port_name attribute in Xenial/16.04LTS

Status in systemd package in Ubuntu:
  Fix Released
Status in systemd source package in Xenial:
  Won't Fix

Bug description:
  [Impact]
  In Xenial/16.04LTS, one can't generate network interface name from 
"phys_port_name" attribute.

  "phys_port_name" indicates the interface physical port name within the
  NIC.

  [Test Case]

  Check that udev (systemd-udevd) provides the phys_port_name property
  Tests should be done on kernel versions: v4.15 (HWE)

  # cat /sys/class/net//phys_port_name
  yyy

  Look if interface name contains the 'phys_port_name':

  $ ip link show
  
  3: ens3nyyy:  ...
  

  [Regression Potential]

  * This piece of code is already in place in Bionic (systemd) and late.
  AFAICT, nothing has been reported since then with regards to this feature.

  * phys_port_name kernel support has been introduced in v4.1, but none
  of the current v4.4 Xenial kernel drivers uses it (minus rocker which
  is a test bed software switch for devel work on switchdev, it has no
  real function)

  # Xenial - kernel v4.4
  config-4.4.0-142-generic:# CONFIG_NET_SWITCHDEV is not set

  No drivers uses the phys_port_name method at all + NET_SWITCHDEV is
  not even turned on.

  # Xenial HWE - kernel v4.15
  config-4.15.0-99-generic:CONFIG_NET_SWITCHDEV=y

  Meaning if a regression arise, it will be limited to the HWE kernel (v4.15) 
and to the "Ethernet switch device driver model (switchdev)":
  mlx5
  mlxsw
  bnxt
  sfc (solarflar)

  --
  drivers/net/ethernet:
  --
  broadcom/bnxt/bnxt_vfr.c: .ndo_get_phys_port_name = 
bnxt_vf_rep_get_phys_port_name
  broadcom/bnxt/bnxt.c: .ndo_get_phys_port_name = bnxt_get_phys_port_name
  cavium/liquidio/lio_vf_rep.c: .ndo_get_phys_port_name = 
lio_vf_rep_phys_port_name,
  mellanox/mlx5/core/en_rep.c:  .ndo_get_phys_port_name  = 
mlx5e_rep_get_phys_port_name,
  mellanox/mlxsw/switchx2.c:.ndo_get_phys_port_name = 
mlxsw_sx_port_get_phys_port_name,
  mellanox/mlxsw/spectrum.c:.ndo_get_phys_port_name = 
mlxsw_sp_port_get_phys_port_name,
  netronome/nfp/nfp_net_repr.c: .ndo_get_phys_port_name = 
nfp_port_get_phys_port_name,
  netronome/nfp/nfp_net_common.c:   .ndo_get_phys_port_name = 
nfp_port_get_phys_port_name,
  rocker/rocker_main.c: .ndo_get_phys_port_name = 
rocker_port_get_phys_port_name,
  sfc/efx.c:.ndo_get_phys_port_name = efx_get_phys_port_name,
  --

  # On other more specific kernels the regression potential can be
  expanded to virtio-net driver as well.

  # cloud-init may taint the result as it renames switchdev(s) after
  systemd at first initialization (even without the phys_port_name
  support) as follows:

  (Testing on a sfc card / server deployed by MAAS)

  syslog:May 20 22:12:43 OBFUSCATED_HOST kernel: [ 36.199674] sfc :08:00.1 
ens1f1: renamed from eth1 ## systemd
  syslog:May 20 22:12:43 OBFUSCATED_HOST kernel: [ 37.128236] sfc :08:00.0 
ens1f0: renamed from eth0 ## systemd

  syslog:May 20 22:12:43 OBFUSCATED_HOST kernel: [ 84.653460] sfc :08:00.0 
ens1f0np0: renamed from ens1f0 ## cloud-init
  syslog:May 20 22:12:43 OBFUSCATED_HOST kernel: [ 84.697177] sfc :08:00.1 
ens1f1np1: renamed from ens1f1 ## cloud-init

  cloud-init.log:2020-05-20 22:04:53,980 - util.py[DEBUG]: Running command 
['ip', 'link', 'set', 'ens1f0', 'name', 'ens1f0np0'] with allowed return codes 
[0] (shell=False, capture=True)
  cloud-init.log:2020-05-20 22:04:54,016 - util.py[DEBUG]: Running command 
['ip', 'link', 'set', 'ens1f1', 'name', 'ens1f1np1'] with allowed return codes 
[0] (shell=False, capture=True)

  systemd:
  ... OBFUSCATED_HOST systemd[1]: sys-subsystem-net-devices-ens1f1.device: Dev 
sys-subsystem-net-devices-ens1f1.device appeared twice with different sysfs 
paths /sys/devices/pci:00/:00:03.0/:08:00.1/net/ens1f1 and 
/sys/devices/pci:00/:00:03.0/:08:00.1/net/ens1f1np1

  # 1 concern was raise here by ddstreet:
  https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1875927/comments/1

  Here's the result of the test I have performed:
  https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1875927/comments/5

  This change indeed rename existing switchdev interfaces to add the
  'phys_port_name' (if any) into it. I'm afraid this will be a non-
  acceptable behaviour change in stable release and won't be SRU'able.

  M

[Group.of.nepali.translators] [Bug 1874526] Re: [landscape] Substitute oidc conf in service file

2020-04-30 Thread Eric Desrochers
After talking to simpoir (lds maintainer) lds 19.10 is not available in
Xenial so no OIDC available.

** Changed in: sosreport (Ubuntu Xenial)
   Status: In Progress => Won't Fix

** Changed in: sosreport (Ubuntu Xenial)
 Assignee: Eric Desrochers (slashd) => (unassigned)

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1874526

Title:
  [landscape] Substitute oidc conf in service file

Status in sosreport package in Ubuntu:
  Fix Released
Status in sosreport source package in Xenial:
  Won't Fix
Status in sosreport source package in Bionic:
  Fix Committed
Status in sosreport source package in Eoan:
  Fix Committed
Status in sosreport source package in Focal:
  Fix Committed
Status in sosreport source package in Groovy:
  Fix Released

Bug description:
  [Impact]

  Landscape has added the ability to connect to OIDC.

  The plugin should be updated to obfuscate the sensitive information.

  https://docs.ubuntu.com/landscape/en/onprem-auth#openid-connect-
  support

  [Test Case]

  * Install sosreport
  * Install landscape-client and/or landscape-server (to make sure sosreport's 
landscape plugin will be triggered) from the Landscape PPA -> 
https://launchpad.net/~landscape
  * Manually append or create files: "/etc/landscape/service.conf" & 
"/etc/landscape/service.conf.old" (No need to have a fully functionnal 
landscape setup, just the package installed (for triggering purposes) and then 
you can create and add the parameter by hand)
  * Add the following in both "/etc/landscape/service.conf" & 
"/etc/landscape/service.conf.old":
  oidc-client-secret = secret-test
  oidc-client-id = id-test
  * Execute sosreport "sosreport -a"
  * Make sure landscape plugin was exercise.
  * Extract archive and make sure both "oidc-client-id" & "oidc-client-secret" 
are subsituted in files "/etc/landscape/service.conf" & 
"/etc/landscape/service.conf.old" as it should (if present).

  Expected result (path_to_sosreport/etc/landscape/service.conf*)
  oidc-client-secret = []
  oidc-client-id = []

  Extra testing (sanity check):
  * Look under "sos_reports" for full report.
  * Look under "sos_logs" for warnings/errors.
    $ grep -v "INFO:" sos_logs/sos.log
  * Run "simple.sh": A quick port of the travis tests to bash. Generating 
various type of sosreports collection.
  https://raw.githubusercontent.com/sosreport/sos/master

  [Regression]

  No regression expected, we don't change/impact core functionnalities
  nor affect other plugins. If something happens it will be isolate to
  the landscape plugin itself only.

  Worse case the OID substitution won't work as expected (corner case)
  and will reveal OID sensible information, but it is very unlikely to
  happen as it will be intensively tested during the testing phase, and
  the substitute mechanism in place has been proven to work for the same
  configuration files in the landscape plugin already.

  [Other Informations]

  Upstream bug:
  https://github.com/sosreport/sos/issues/2023

  Upstream PR:
  https://github.com/sosreport/sos/pull/2025

  Upstream commit:
  
https://github.com/sosreport/sos/pull/2025/commits/0c4d821e26e1206a0b99f427b572931ba2fd9bb5

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sosreport/+bug/1874526/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1875927] [NEW] add support for phys_port_name attribute in Xenial/16.04LTS

2020-04-29 Thread Eric Desrochers
Public bug reported:

It has been brought to my attention that systemd in Xenial/16.04LTS
doesn't have support for phys_port_name[0] attribute.

The support has been first introduced in systemd version "232" via:
https://github.com/systemd/systemd/commit/4887b656c22af059d4e833de7b56544f24951184
https://github.com/systemd/systemd/pull/4506

Bionic and late have the necessary bits ( systemd >232), but not Xenial
(229)[1]

Support for "phys_port_name" has been first introduced in the kernel
with v4.1[2]

[0]
- https://www.kernel.org/doc/Documentation/ABI/testing/sysfs-class-net
- 
https://www.freedesktop.org/software/systemd/man/systemd.net-naming-scheme.html
- https://www.kernel.org/doc/Documentation/networking/switchdev.txt

[1]
# git systemd/systemd
git describe --contains 4887b656c22af059d4e833de7b56544f24951184
v232~15

# rmadison
 => systemd | 229-4ubuntu21.27 | xenial-updates
 systemd | 237-3ubuntu10.39 | bionic-updates
 systemd | 240-6ubuntu5.8   | disco-updates
 systemd | 242-7ubuntu3.7   | eoan-updates
 systemd | 245.4-4ubuntu3   | focal
 systemd | 245.4-4ubuntu3   | groovy

[2]
https://github.com/torvalds/linux/commit/db24a9044ee1

$ git describe --contains db24a9044ee1
v4.1-rc1

** Affects: systemd (Ubuntu)
 Importance: Undecided
 Status: Fix Released

** Affects: systemd (Ubuntu Xenial)
 Importance: Medium
 Assignee: Eric Desrochers (slashd)
 Status: In Progress


** Tags: sts

** Also affects: systemd (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: systemd (Ubuntu)
   Status: New => Fix Released

** Tags added: sts

** Changed in: systemd (Ubuntu Xenial)
   Status: New => Confirmed

** Changed in: systemd (Ubuntu Xenial)
 Assignee: (unassigned) => Eric Desrochers (slashd)

** Changed in: systemd (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: systemd (Ubuntu Xenial)
   Status: Confirmed => In Progress

** Description changed:

  It has been brought to my attention that systemd in Xenial/16.04LTS
  doesn't have support for phys_port_name[0] attribute.
  
  The support has been first introduced in systemd version "232" via:
  
https://github.com/systemd/systemd/commit/4887b656c22af059d4e833de7b56544f24951184
+ https://github.com/systemd/systemd/pull/4506
  
  Bionic and late have the necessary bits ( systemd >232), but not Xenial
  (229).
  
- [0] 
+ [0]
  - https://www.kernel.org/doc/Documentation/ABI/testing/sysfs-class-net
  - 
https://www.freedesktop.org/software/systemd/man/systemd.net-naming-scheme.html

** Description changed:

  It has been brought to my attention that systemd in Xenial/16.04LTS
  doesn't have support for phys_port_name[0] attribute.
  
  The support has been first introduced in systemd version "232" via:
  
https://github.com/systemd/systemd/commit/4887b656c22af059d4e833de7b56544f24951184
  https://github.com/systemd/systemd/pull/4506
  
  Bionic and late have the necessary bits ( systemd >232), but not Xenial
- (229).
+ (229)[1]
  
  [0]
  - https://www.kernel.org/doc/Documentation/ABI/testing/sysfs-class-net
  - 
https://www.freedesktop.org/software/systemd/man/systemd.net-naming-scheme.html
+ 
+ [1]
+ # git systemd/systemd
+ git describe --contains 4887b656c22af059d4e833de7b56544f24951184
+ v232~15
+ 
+ # rmadison
+  => systemd | 229-4ubuntu21.27 | xenial-updates  
+  systemd | 237-3ubuntu10.39 | bionic-updates  
+  systemd | 240-6ubuntu5.8   | disco-updates   
+  systemd | 242-7ubuntu3.7   | eoan-updates
+  systemd | 245.4-4ubuntu3   | focal  
+  systemd | 245.4-4ubuntu3   | groovy

** Description changed:

  It has been brought to my attention that systemd in Xenial/16.04LTS
  doesn't have support for phys_port_name[0] attribute.
  
  The support has been first introduced in systemd version "232" via:
  
https://github.com/systemd/systemd/commit/4887b656c22af059d4e833de7b56544f24951184
  https://github.com/systemd/systemd/pull/4506
  
  Bionic and late have the necessary bits ( systemd >232), but not Xenial
  (229)[1]
  
  [0]
  - https://www.kernel.org/doc/Documentation/ABI/testing/sysfs-class-net
  - 
https://www.freedesktop.org/software/systemd/man/systemd.net-naming-scheme.html
+ - https://www.kernel.org/doc/Documentation/networking/switchdev.txt
  
  [1]
  # git systemd/systemd
  git describe --contains 4887b656c22af059d4e833de7b56544f24951184
  v232~15
  
  # rmadison
-  => systemd | 229-4ubuntu21.27 | xenial-updates  
-  systemd | 237-3ubuntu10.39 | bionic-updates  
-  systemd | 240-6ubuntu5.8   | disco-updates   
-  systemd | 242-7ubuntu3.7   | eoan-updates
-  systemd | 245.4-4ubuntu3   | focal  
-  systemd | 245.4-4ubuntu3   | groovy
+  => systemd | 229-4ubuntu21.27 | xenial-updates
+  systemd | 237-3ubuntu10.39 | bionic-updates
+  systemd | 240-6ubuntu5.8   | disco-updates
+  systemd | 242-7ubuntu3.7   | eoan-updates
+  systemd | 245.4-

[Group.of.nepali.translators] [Bug 1865212] Re: simple.sh to be run as part of the autopkgtests

2020-04-28 Thread Eric Desrochers
** Changed in: sosreport (Ubuntu Bionic)
 Assignee: (unassigned) => Heather Lemon (hypothetical-lemon)

** Changed in: sosreport (Ubuntu Bionic)
   Status: New => In Progress

** Changed in: sosreport (Ubuntu Xenial)
   Status: New => Won't Fix

** Changed in: sosreport (Ubuntu Bionic)
   Importance: Undecided => Low

** Changed in: sosreport (Ubuntu Xenial)
   Importance: Undecided => Low

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1865212

Title:
  simple.sh to be run as part of the autopkgtests

Status in sosreport package in Ubuntu:
  Fix Released
Status in sosreport source package in Xenial:
  Won't Fix
Status in sosreport source package in Bionic:
  In Progress
Status in sosreport source package in Eoan:
  In Progress

Bug description:
  [Wishlist]

  Reporting this bug as a reminder for me to start working at eventually
  include simple.sh[0] to be run as part of the sosreport's autopkgtest.

  Autopkgtest restriction definitions requirement: needs-root

  [0] - A quick port of the travis tests to bash, requires root
  https://github.com/sosreport/sos/blob/master/tests/simple.sh

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sosreport/+bug/1865212/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1874526] Re: [landscape] Substitute oidc conf in service file

2020-04-27 Thread Eric Desrochers
** Also affects: sosreport (Ubuntu Groovy)
   Importance: High
 Assignee: Eric Desrochers (slashd)
   Status: In Progress

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1874526

Title:
  [landscape] Substitute oidc conf in service file

Status in sosreport package in Ubuntu:
  In Progress
Status in sosreport source package in Xenial:
  In Progress
Status in sosreport source package in Bionic:
  In Progress
Status in sosreport source package in Eoan:
  In Progress
Status in sosreport source package in Focal:
  In Progress
Status in sosreport source package in Groovy:
  In Progress

Bug description:
  [Impact]

  Landscape has added the ability to connect to OIDC.

  The plugin should be updated to obfuscate the sensitive information.

  https://docs.ubuntu.com/landscape/en/onprem-auth#openid-connect-
  support

  [Test Case]

  * Install sosreport
  * Run sosreport in a Landscape environment (client and server)
  * Extract archive and look at the content of sos_commands/landscape and most 
importantly make sure both "oidc-client-id" & "oidc-client-secret" are 
subsitute in files "/etc/landscape/service.conf" & 
"/etc/landscape/service.conf.old" as it should (if present).

  Extra testing:
  * Look under "sos_reports" for full report.
  * Look under "sos_logs" for warnings/errors.
    $ grep -v "INFO:" sos_logs/sos.log
  * Run "simple.sh": A quick port of the travis tests to bash. Generating 
various type of sosreports collection.
  https://raw.githubusercontent.com/sosreport/sos/master

  [Regression]

  No regression expected, we don't change/impact core functionnalities
  nor affect other plugins. If something happens it will be isolate to
  the landscape plugin itself only.

  Worse case the OID substitution won't work as expected (corner case)
  and will reveal OID sensible information, but it is very unlikely to
  happen as it will be intensively tested during the testing phase, and
  the substitute mechanism in place has been proven to work for the same
  configuration files in the landscape plugin already.

  [Other Informations]

  Upstream bug:
  https://github.com/sosreport/sos/issues/2023

  Upstream PR:
  https://github.com/sosreport/sos/pull/2025

  Upstream commit:
  
https://github.com/sosreport/sos/pull/2025/commits/0c4d821e26e1206a0b99f427b572931ba2fd9bb5

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sosreport/+bug/1874526/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1874075] Re: rabbitmq-server startup timeouts differ between SysV and systemd

2020-04-27 Thread Eric Desrochers
Nicolas, can you please produce a 'groovy' 20.10 debdiff ?

Thanks

** Also affects: rabbitmq-server (Ubuntu Groovy)
   Importance: Low
 Assignee: Nicolas Bock (nicolasbock)
   Status: In Progress

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1874075

Title:
  rabbitmq-server startup timeouts differ between SysV and systemd

Status in rabbitmq-server package in Ubuntu:
  In Progress
Status in rabbitmq-server source package in Xenial:
  In Progress
Status in rabbitmq-server source package in Bionic:
  In Progress
Status in rabbitmq-server source package in Eoan:
  Won't Fix
Status in rabbitmq-server source package in Focal:
  In Progress
Status in rabbitmq-server source package in Groovy:
  In Progress

Bug description:
  The startup timeouts were recently adjusted and synchronized between
  the SysV and systemd startup files.

  https://github.com/rabbitmq/rabbitmq-server-release/pull/129

  The new startup files should be included in this package.

  [Impact]

  After starting the RabbitMQ server process, the startup script will
  wait for the server to start by calling `rabbitmqctl wait` and will
  time out after 10 s.

  The startup time of the server depends on how quickly the Mnesia
  database becomes available and the server will time out after
  `mnesia_table_loading_retry_timeout` ms times
  `mnesia_table_loading_retry_limit` retries. By default this wait is
  30,000 ms times 10 retries, i.e. 300 s.

  The mismatch between these two timeout values might lead to the
  startup script failing prematurely while the server is still waiting
  for the Mnesia tables.

  This change introduces variable `RABBITMQ_STARTUP_TIMEOUT` and the
  `--timeout` option into the startup script. The default value for this
  timeout is set to 10 minutes (600 seconds).

  This change also updates the systemd service file to match the timeout
  values between the two service management methods.

  [Test Case]

  In a clustered setup with two nodes, A and B.

  1. create queue on A
  2. shut down B
  3. shut down A
  4. boot B

  The broker on B will wait for A. The systemd service will wait for 10
  seconds and then fail. Boot A and the rabbitmq-server process on B
  will complete startup.

  [Regression Potential]

  This change alters the behavior of the startup scripts when the Mnesia
  database takes long to become available. This might lead to failures
  further down the service dependency chain.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/rabbitmq-server/+bug/1874075/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1871494] Re: add lshw cmd into sosreport's hardware plugin

2020-04-27 Thread Eric Desrochers
Heather, can you please produce a 'groovy' 20.10 debdiff ?

Thanks

** Also affects: sosreport (Ubuntu Groovy)
   Importance: Wishlist
 Assignee: Heather Lemon (hypothetical-lemon)
   Status: In Progress

** Changed in: sosreport (Ubuntu Groovy)
   Importance: Wishlist => Low

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1871494

Title:
  add lshw cmd into sosreport's hardware plugin

Status in sosreport package in Ubuntu:
  In Progress
Status in sosreport source package in Xenial:
  In Progress
Status in sosreport source package in Bionic:
  In Progress
Status in sosreport source package in Eoan:
  In Progress
Status in sosreport source package in Focal:
  In Progress
Status in sosreport source package in Groovy:
  In Progress

Bug description:
  
  [Impact]

lshw(1) https://linux.die.net/man/1/lshw
   * lshw is a small tool to extract detailed information on the hardware 
 configuration of the machine. It can report exact memory configuration,
 firmware version, mainboard configuration, CPU version and speed, 
 cache configuration, bus speed, etc. on DMI-capable x86 or IA-64
 systems and on some PowerPC machines (PowerMac G4 is known to work).

   * Adding 'lshw' will help Canonical or third-party vendor using the 
 sosreport package to not having to ask 'lshw' in addition to sosreport.  
 This is a frequent command to run to troubleshoot/debug things

   * Including hardware information is a helpful debug step to determine
 issues found

  [Test Case]

   * Run sosreport in different customer scenarios:
  server, desktop, cloud, hypervisor, instance (container, vm), 
  physical server, since this is specifically listing hardware  
  informations.
   * For all distros:
 - install sosreport from the proposed pocket
 - run sosreport with default settings `sudo sosreport -a --config 
 sos.conf` 
 Or to just test hardware plugin `sosreport -o hardware --config
 sos.conf`
   * Extract archive and look at contents
- untar report file in /tmp/
  - cd /sos_commands/hardware/
  - less lshw
   -- the ouput is information about the system's hardware
  - look under "sos_logs" for warnings/errors.
  - look under "sos_reports" for full report.
   * Run `simple.sh`: A quick port of the travis unit tests to bash.  

  Generates various types of sosreports collection.
   * Ensure simple.sh test passes 
  - wget https://raw.githubusercontent.com/sosreport/sos/master
/test/simple.sh
  - execute command  `sudo tests/simple.sh`

  [Regression Potential]

   * Command implicitly slows down python script
   * Unit test failures
   * Only affects the hardware plugin and won't affect core functionalities nor 
other plugins
   * Lshw that is commonly used on system, the command cannot create any harm 
on the system (read only)
   * If the command doesn't exist sosreport will continue and move on
   * Lshw must be run as super user or it will only report partial information

  [Other Info]

   * Upstream commit:
  
https://github.com/sosreport/sos/pull/1994/commits/2dd5cd45a8381fa36ea99c85b526f9d79e526d91

  [Original description]

   * This is a wishlist to add the cmd 'lshw' into the hardware's
  sosreport plugin

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sosreport/+bug/1871494/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1874075] Re: rabbitmq-server startup timeouts differ between SysV and systemd

2020-04-23 Thread Eric Desrochers
Eoan FTBFS as follows:

==> rabbitmqctl
** (Mix) You're trying to run :rabbitmqctl on Elixir v1.9.1 but it has declared 
in its mix.exs file it supports only Elixir >= 1.6.6 and < 1.8.0
make[4]: *** [Makefile:93: escript/rabbitmqctl] Error 1
make[4]: Leaving directory '/<>/deps/rabbitmq_cli'
make[3]: *** [erlang.mk:4322: deps] Error 2
make[3]: Leaving directory '/<>/deps/rabbit'
make[2]: *** [erlang.mk:4322: deps] Error 2
make[2]: Leaving directory '/<>'
make[1]: *** [debian/rules:18: override_dh_auto_build] Error 2
make[1]: Leaving directory '/<>'
make: *** [debian/rules:11: build] Error 2
dpkg-buildpackage: error: debian/rules build subprocess returned exit status 2

Bug reference:
https://bugs.launchpad.net/ubuntu/+source/rabbitmq-server/+bug/1773324

- Eric

** Changed in: rabbitmq-server (Ubuntu Eoan)
   Status: In Progress => Won't Fix

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1874075

Title:
  rabbitmq-server startup timeouts differ between SysV and systemd

Status in rabbitmq-server package in Ubuntu:
  In Progress
Status in rabbitmq-server source package in Xenial:
  In Progress
Status in rabbitmq-server source package in Bionic:
  In Progress
Status in rabbitmq-server source package in Eoan:
  Won't Fix
Status in rabbitmq-server source package in Focal:
  In Progress

Bug description:
  The startup timeouts were recently adjusted and synchronized between
  the SysV and systemd startup files.

  https://github.com/rabbitmq/rabbitmq-server-release/pull/129

  The new startup files should be included in this package.

  [Impact]

  After starting the RabbitMQ server process, the startup script will
  wait for the server to start by calling `rabbitmqctl wait` and will
  time out after 10 s.

  The startup time of the server depends on how quickly the Mnesia
  database becomes available and the server will time out after
  `mnesia_table_loading_retry_timeout` ms times
  `mnesia_table_loading_retry_limit` retries. By default this wait is
  30,000 ms times 10 retries, i.e. 300 s.

  The mismatch between these two timeout values might lead to the
  startup script failing prematurely while the server is still waiting
  for the Mnesia tables.

  This change introduces variable `RABBITMQ_STARTUP_TIMEOUT` and the
  `--timeout` option into the startup script. The default value for this
  timeout is set to 10 minutes (600 seconds).

  This change also updates the systemd service file to match the timeout
  values between the two service management methods.

  [Test Case]

  In a clustered setup with two nodes, A and B.

  1. create queue on A
  2. shut down B
  3. shut down A
  4. boot B

  The broker on B will wait for A. The systemd service will wait for 10
  seconds and then fail. Boot A and the rabbitmq-server process on B
  will complete startup.

  [Regression Potential]

  This change alters the behavior of the startup scripts when the Mnesia
  database takes long to become available. This might lead to failures
  further down the service dependency chain.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/rabbitmq-server/+bug/1874075/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1860813] Re: LXC container reports spike in swap occasionally

2020-03-27 Thread Eric Desrochers
** Also affects: lxcfs (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Also affects: lxcfs (Ubuntu Eoan)
   Importance: Undecided
   Status: New

** Also affects: lxcfs (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Changed in: lxcfs (Ubuntu Bionic)
 Assignee: (unassigned) => Kellen Renshaw (krenshaw)

** Changed in: lxcfs (Ubuntu Bionic)
   Importance: Undecided => Medium

** Changed in: lxcfs (Ubuntu Bionic)
   Status: New => In Progress

** Tags added: sts-sponsor-slashd

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1860813

Title:
  LXC container reports spike in swap occasionally

Status in lxcfs package in Ubuntu:
  Fix Released
Status in lxcfs source package in Xenial:
  New
Status in lxcfs source package in Bionic:
  In Progress
Status in lxcfs source package in Eoan:
  New

Bug description:
  [Impact]

   * lxcfs provides a container-specific view of /proc/meminfo.
  Occasionally, with near zero or zero swap usage *and* swap accounting
  turned on (kernel parameter swapaccount=1), the container will report
  100% swap utilization.

   * This issue has been encountered and could result in unecessary
  alerts or potential automated attempts at remediating a non-existent
  "full swap" issue.

   * This fix changed the logic used for SwapFree when swap accounting
  is enabled to better handle situations where memswusage is less than
  memusage, caused by the fuzziness of the usage_in_bytes counters used
  as the source. Specifically, it added a check for memusage being
  larger than memswusage and if so, sets 0 as the value of swapusage.
  Otherwise the calculation (memswusage - memusage) remains the same.

  [Test Case]

   * Requires a Bionic (18.04) or Eoan (19.10) host with swap space.

   * Enable swap accounting with the "swapaccount=1" kernel parameter on
  the kernel command line. Edit /etc/default/grub, add "swapaccount=1"
  to the GRUB_CMDLINE_LINUX_DEFAULT="other parameters" line, then run
  "update-grub" and reboot to make the change active.

   * Ensure lxd is installed, "sudo apt install lxd"

   * Create a lxd/lxc container with "lxc launch ubuntu:X
  container_name" with X being either b[ionic] or e[oan].

   * Open two shells to the container with "lxc shell container_name"

   * In one of the shells, run: watch -n 0.1 "grep Swap /proc/meminfo"

   * In the other, run: while true; do free; done

   * You should see SwapFree intermittently drop to zero in the first
  terminal.

   * The fix results in small non-zero swap "usage" intermittently
  instead of intermittent SwapFree = 0.

  
  [Regression Potential] 

   * Low, as swap accounting must be enabled to encounter the bug and
  the fix.

   * Potential for unanticipated edge cases in the values of memusage
  and memswusage to cause incorrect swap reporting within the container,
  with swap accounting turned on.

   * Any tooling that expected, compensated, or relied on the behavior
  may no longer work as expected.

  [Other Info]
   
   * Cherrypick of a one line fix to address this specific situation.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lxcfs/+bug/1860813/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1862830] Re: Update sosreport to 3.9

2020-02-16 Thread Eric Desrochers
This bug was fixed in the package sosreport - 3.9-1
Sponsored for Eric Desrochers (slashd)

---
sosreport (3.9-1) unstable; urgency=medium

  * New 3.9 upstream release.
- Improved human-readable archive naming and support for archive labels
- Improved reporting of archive output and properties
- Support for automatic uploading of report archives via FTP and HTTPS
- Automatic PATH support on Ubuntu distributions
- Improved policy performance
- Improved service status collection API
- 9 new plugins: cloud_init, convert2rhel, ebpf, fwupd, login, nginx,
  nvidia, openstack_tripleo
- 6 obsolete plugins removed or merged into other plugins:
  katello, last, mrggrid, mrgmessg, satellite
- Significant updates to 14 plugins: dlm, dnf, ceph, foreman, gluster,
  gnocchi, juju, kubernetes, logs, maas, networking, openvswitch,
  python, plugins
- The openswan plugin was renamed to libreswan to reflect the active
  upstream project name
- Updated Red Hat presets and new Cloud Forms preset
- Updates to networking plugin namespace handling
- Updates to the OVN plugins (ovn_central, ovn_host)
- Kernel eBPF data consolidated in a single plugin

  Further release information and tarballs are available at:
https://github.com/sosreport/sos/releases/tag/3.9

  * Other specific modifications:
- d/p/0001-unittest-py3-fix.patch

 -- Eric Desrochers   Sun, 16 Feb 2020 01:35:52 +

** Changed in: sosreport (Ubuntu)
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1862830

Title:
  Update sosreport to 3.9

Status in sosreport package in Ubuntu:
  Fix Released
Status in sosreport source package in Xenial:
  New
Status in sosreport source package in Bionic:
  New
Status in sosreport source package in Eoan:
  New
Status in sosreport source package in Focal:
  Fix Released
Status in sosreport package in Debian:
  New

Bug description:
  [Impact]

  sosreport 3.9 is now released.

  It would be great to find sosreport v3.9 in supported stable releases,
  and active development release considering the fact that the releasea
  (especially LTSes) are going to be supported for a couple of years
  still.

  Sosreport is widely use by Canonical support team to troubleshoot UA
  (Ubuntu Advantage) customer, other vendors and community users.

  Just like we did for :
  - v3.5 (LP: #1734983)
  - v3.6 (LP: #1775195)

  [Test Case]

  * Install sosreport
  * Test the new upload functionality (--upload)
  * Test new --all-logs behaviour
  * Make sure the new naming pattern doesn't break any current Canonical 
mechanism (Brickftp scripts, ...). If yes evaluate if easy fixable before 
considering reverting back to 'legacy' pattern.
  * Run sosreport in different customer scenarios:
  server, desktop, cloud, hypervisor, instance (container, vm), physical 
server, ...
  * Extract archive and look at the content, look for 0 size file (and use 
common sense if legit or not)
  * Look under "sos_reports" and "sos_logs" for warnings/errors

  [Regression Potential]

  Sosreport has 292 plugins that are all configured differently and
  configured to run under certains conditions. We can't test all
  possible scenarios. All we can do is idenfity the most common,
  important and Ubuntu/Canonical related one and test them (e.g.
  Openstack*, juju, MAAS, kernel, ...) . With that being said, it is
  definitely possible that certains plugins may not work as expected,
  but the risk will be very low (e.g not collecting the desired
  informations) and isolated to this specific plugin. It shouldn't
  affect the other plugins nor core functionnalities of sosreport.

  [Other Informations]

  * Release note:
  https://github.com/sosreport/sos/releases/tag/3.9

  [Original Description]

  A new version of sosreport upstream (v3.9) will be released soon.
  This bug is to track activities to update sosreport in Ubuntu stable + Active 
Devel release.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sosreport/+bug/1862830/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1828901] Re: add PTY support for runuser

2020-02-15 Thread Eric Desrochers
The sosreport juju plugin refactoring has been simplified.

For now, we don't expect the juju plugin to drop privileges any time
soon.

Thanks !

** Changed in: util-linux (Ubuntu Xenial)
   Status: In Progress => Won't Fix

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1828901

Title:
  add PTY support for runuser

Status in util-linux package in Ubuntu:
  Fix Released
Status in util-linux source package in Xenial:
  Won't Fix
Status in util-linux package in Debian:
  Fix Released

Bug description:
  [IMPACT]

  [TEST CASE]

  [REGRESSION POTENTIAL]

  [OTHER INFORMATION]

  Debbug:
  https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922

  This is fixing a CVE vulnerability:
  https://security-tracker.debian.org/tracker/CVE-2016-2779

  Restricting ioctl on the kernel side seems the better approach, patches have 
been posted to kernel-hardening list
  http://www.openwall.com/lists/oss-security/2016/02/27/1
  https://marc.info/?l=util-linux-ng&m=145694736107128&w=2
  2.31 introduces a new --pty option to separate privileged and unprivileged
  shells (not enabled by default and the cli switch is necessary).

  [ORIGINAL DESCRIPTION]
  After a discussion with security team on what would be their recommended way 
to run command as 'juju-user' inside the sosreport juju plugin which is run as 
root, in order to avoid using 'sudo' or 'su' command.

  The recommendation was to use 'runuser -P'

  runuser PTY support is present in Bionic and late, but not in Xenial.

  I'm opening this bug in the effort to update util-linux/runuser code
  in Xenial to add the PTY support.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/util-linux/+bug/1828901/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1862830] Re: Update sosreport to 3.9

2020-02-15 Thread Eric Desrochers
** Bug watch added: Debian Bug tracker #951392
   https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=951392

** Also affects: sosreport (Debian) via
   https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=951392
   Importance: Unknown
   Status: Unknown

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1862830

Title:
  Update sosreport to 3.9

Status in sosreport package in Ubuntu:
  In Progress
Status in sosreport source package in Xenial:
  New
Status in sosreport source package in Bionic:
  New
Status in sosreport source package in Eoan:
  New
Status in sosreport source package in Focal:
  In Progress
Status in sosreport package in Debian:
  Unknown

Bug description:
  [Impact]

  sosreport 3.9 is now released.

  It would be great to find sosreport v3.9 in supported stable releases,
  and active development release considering the fact that the releasea
  (especially LTSes) are going to be supported for a couple of years
  still.

  Sosreport is widely use by Canonical support team to troubleshoot UA
  (Ubuntu Advantage) customer, other vendors and community users.

  Just like we did for :
  - v3.5 (LP: #1734983)
  - v3.6 (LP: #1775195)

  [Test Case]

  [Regression Potential]

  [Other Informations]

  * Release note:
  https://github.com/sosreport/sos/releases/tag/3.9

  [Original Description]

  A new version of sosreport upstream (v3.9) will be released soon.
  This bug is to track activities to update sosreport in Ubuntu stable + Active 
Devel release.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sosreport/+bug/1862830/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1860217] Re: dpkg-reconfigure clamav-daemon in infinite loop

2020-02-14 Thread Eric Desrochers
@cash.williams

no worries I revert it back to "Fix Committed"

** Changed in: clamav (Ubuntu Xenial)
   Status: Fix Released => Fix Committed

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1860217

Title:
  dpkg-reconfigure clamav-daemon in infinite loop

Status in clamav package in Ubuntu:
  Fix Released
Status in clamav source package in Xenial:
  Fix Committed
Status in clamav source package in Bionic:
  Fix Committed
Status in clamav source package in Eoan:
  Fix Committed
Status in clamav source package in Focal:
  Fix Released

Bug description:
  [Impact]

  There appears to be another issue with
  > dpkg-reconfigure clamav-daemon

  Like in #1792051, the command ends up in an infinite loop, just that
  this time it happens between 'Log file for clamav-daemon' and 'Do you
  want to enable log rotation?', with one more step between also
  included in the loop.

  Purged and reinstalled the package with no effect.

  Effected package: clamav-daemon 0.102.1+dfsg-0ubuntu0.19.10.2 (arm64)

  EDIT: I was able to reproduce the error on a different system (also
  0.102.1+dfsg-0ubuntu0.19.10.2, just amd64 instead)

  [Test Case]

  (1)

  Here's how to reproduce:
  * Deploy Bionic
  * Install clamav clamav-daemon

  (As a debug exercise and confirmation of the infinite loop in action,
  with the use of "export DEBCONF_DEBUG='.*'" one can confirm it.)

  * Perform:
  DEBIAN_FRONTEND=noninteractive DEBCONF_NONINTERACTIVE_SEEN=true 
dpkg-reconfigure clamav-daemon

  Make sure it completes fine and doesn't enter an infinite loop.

  ---

  (2)

  Run "dpkg-reconfigure clamav-daemon", make sure all of the debconf
  prompts that are supposed to be there are actually reachable,
  including the one modified by this SRU "LogTime"[0] and
  "LogRotate"[1].

  [0]- Do you want to log time information with each message?
  [1]- Do you want to enable log rotation?

  Here's a test where I intentionally reconfigure the package and set
  both LogTime and LogRotate from 'yes' (true) to 'No' (False).

  # egrep "LogRotate|LogTime" /etc/clamav/clamd.conf
  LogRotate true
  LogTime true

  # dpkg-reconfigure clamav-daemon
  Replacing config file /etc/clamav/clamd.conf with new version
  Disabling old logrotate script for clamav-daemon

  # egrep "LogRotate|LogTime" /etc/clamav/clamd.conf
  LogRotate false
  LogTime false

  [Regression Potential]

  Right now, the impact is limited to the reconfiguration of the
  package. This is a consequence of the removal of ScanOnAcces (701f0e8e
  Remove ScanOnAccess).

  It's been proven to be working well pre-SRU.

  If a regression is found, it will likely remain limited to the package
  reconfiguration.

  I added another verification to address vorlon's concern found in
  comment #16. See section (2) in [Test Case].

  [Other infos]

  * Debian upstream bug:
  https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=950296

  * Debian upstream (salsa):
  
https://salsa.debian.org/clamav-team/clamav/commit/089b6136e95dd34b3ac8a4d0753bffb48c48ebdb

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/clamav/+bug/1860217/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1819437] Re: transient mon<->osd connectivity HEALTH_WARN events don't self clear in 13.2.4

2020-02-13 Thread Eric Desrochers
** Changed in: ceph (Ubuntu Focal)
   Status: New => Fix Released

** Changed in: ceph (Ubuntu Xenial)
   Status: New => Invalid

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1819437

Title:
  transient mon<->osd connectivity HEALTH_WARN events don't self clear
  in 13.2.4

Status in ceph package in Ubuntu:
  Fix Released
Status in ceph source package in Xenial:
  Invalid
Status in ceph source package in Bionic:
  New
Status in ceph source package in Eoan:
  New
Status in ceph source package in Focal:
  Fix Released

Bug description:
  In a recently juju deployed 13.2.4 ceph cluster (as part of an
  OpenStack Rocky deploy) we experienced a none clearing HEALTH_WARN
  event that appeared to be associated with a short planned network
  outage, but did not clear without human intervention:

  health: HEALTH_WARN
  6 slow ops, oldest one blocked for 112899 sec, daemons 
[mon.shinx,mon.sliggoo] have slow ops.

  We can correlate this back to a known network event, but all OSDs are
  up and the cluster otherwise looks healthy:

  ubuntu@juju-df624b-4-lxd-14:~$ sudo ceph osd tree
  ID  CLASS WEIGHT  TYPE NAMESTATUS REWEIGHT PRI-AFF 
   -1   7.64076 root default 
  -13   0.90970 host happiny 
8   hdd 0.90970 osd.8up  1.0 1.0 
   -5   0.90970 host jynx
9   hdd 0.90970 osd.9up  1.0 1.0 
   -3   1.63739 host piplup  
0   hdd 0.81870 osd.0up  1.0 1.0 
3   hdd 0.81870 osd.3up  1.0 1.0 
   -9   1.63739 host raichu  
5   hdd 0.81870 osd.5up  1.0 1.0 
6   hdd 0.81870 osd.6up  1.0 1.0 
  -11   0.90919 host shinx   
7   hdd 0.90919 osd.7up  1.0 1.0 
   -7   1.63739 host sliggoo 
1   hdd 0.81870 osd.1up  1.0 1.0 
4   hdd 0.81870 osd.4up  1.0 1.0 

  
  ubuntu@shinx:~$ sudo ceph daemon mon.shinx ops
  {
  "ops": [
  {
  "description": "osd_failure(failed timeout osd.0 
10.48.2.158:6804/211414 for 31sec e911 v911)",
  "initiated_at": "2019-03-07 00:40:43.282823",
  "age": 113953.696205,
  "duration": 113953.696225,
  "type_data": {
  "events": [
  {
  "time": "2019-03-07 00:40:43.282823",
  "event": "initiated"
  },
  {
  "time": "2019-03-07 00:40:43.282823",
  "event": "header_read"
  },
  {
  "time": "0.00",
  "event": "throttled"
  },
  {
  "time": "0.00",
  "event": "all_read"
  },
  {
  "time": "0.00",
  "event": "dispatched"
  },
  {
  "time": "2019-03-07 00:40:43.283360",
  "event": "mon:_ms_dispatch"
  },
  {
  "time": "2019-03-07 00:40:43.283360",
  "event": "mon:dispatch_op"
  },
  {
  "time": "2019-03-07 00:40:43.283360",
  "event": "psvc:dispatch"
  },
  {
  "time": "2019-03-07 00:40:43.283370",
  "event": "osdmap:preprocess_query"
  },
  {
  "time": "2019-03-07 00:40:43.283371",
  "event": "osdmap:preprocess_failure"
  },
  {
  "time": "2019-03-07 00:40:43.283386",
  "event": "osdmap:prepare_update"
  },
  {
  "time": "2019-03-07 00:40:43.283386",
  "event": "osdmap:prepare_failure"
  }
  ],
  "info": {
  "seq": 48576937,
  "src_is_mon": false,
  "source": "osd.8 10.48.2.206:6800/1226277",
  "forwarded_to_leader": false
  }
  }
  },
  {
  "description": "osd_

[Group.of.nepali.translators] [Bug 1825010] Re: [sru] Update sosreport to 3.8

2020-02-11 Thread Eric Desrochers
** Summary changed:

- [sru] Update sosreport to 3.9
+ [sru] Update sosreport to 3.8

** Tags removed: sosreport37

** Changed in: sosreport (Ubuntu Xenial)
   Status: In Progress => Won't Fix

** Changed in: sosreport (Ubuntu Bionic)
   Status: In Progress => Won't Fix

** Changed in: sosreport (Ubuntu Eoan)
   Status: In Progress => Won't Fix

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1825010

Title:
  [sru] Update sosreport to 3.8

Status in sosreport package in Ubuntu:
  Fix Released
Status in sosreport source package in Trusty:
  Won't Fix
Status in sosreport source package in Xenial:
  Won't Fix
Status in sosreport source package in Bionic:
  Won't Fix
Status in sosreport source package in Cosmic:
  Won't Fix
Status in sosreport source package in Disco:
  Won't Fix
Status in sosreport source package in Eoan:
  Won't Fix
Status in sosreport source package in Focal:
  Fix Released
Status in sosreport package in Debian:
  Fix Released

Bug description:
  [Impact]

  sosreport 3.8 has been released including further enhancements in core 
sosreport functionality:
  https://github.com/sosreport/sos/releases/tag/3.8

  It would be great to find sosreport v3.8 in supported stable releases,
  considering the fact that the release (especially LTSes) will be
  supported for a couple of years still:

  sosreport is widely use by Canonical support team to troubleshoot UA
  customer, other vendors and community users. These improvement will
  benefit all of them.

  sosreport 3.8 contains a number of enhancements, new features, and bug
  fixes. (See "Release Note" below)

  Just like we did for :
  - v3.5 (LP: #1734983)
  - v3.6 (LP: #1775195)

  [Test Case]

   * Install sosreport
   * Run sosreport
     - sosreport plugins are separated by subject (juju, MAAS, grub, zfs,...) 
and allow the capability to detect (based on file and package) if it exist 
and/or installed and then only run the necessary plugins based on the detection 
made.

  It creates a files under /tmp in the form of :
  /tmp/sosreport-sos38X-20190416160152.tar.xz  # Actual sosreport
  /tmp/sosreport-sos38X-20190416160152.tar.xz.md5  # MD5 checksum

  Only accessible by root user:
  -rw--- 1 root root 1619000 Apr 16 16:07 
/tmp/sosreport-sos38X-20190416160152.tar.xz

  Ideally, since we can't test all plugins, it would be good to have a
  few testers using different HW, kernel, installation with a focus on
  juju, MAAS, LXD, canonical-livepatch, 

  Looking for any error on the terminal while sosreport is running or
  post-sosreport run in /tmp/sosreport-*/sos_logs/

  [Regression Potential]

   * Risk is low.

   * We did some dogfooding on sosreport, but we can't test each
  individual plugins and scenarios one by one, that would just be
  impossible but we have tested the ones we considered important and
  Ubuntu/Canonical related (canonical-livepatch, MAAS, juju, snappy),
  Openstack, mandatory file (logs, dmidecode, installed-debs and so on)

   * Plugin bug is an eventuality, but they are usually easy to fix and
  the impact will be isolated to the plugin itself or section of the
  plugin. If a plugin has a bug the worst that could happen is that this
  particular plugin won't (or partially) collect information.

  [Other information]

  * Release note:
  https://github.com/sosreport/sos/releases/tag/3.8

  * Plugins:
  sosreport contains in total: 284 plugins

  - 185 plugins that used UbuntuPlugin and/or DebianPlugin that might
  been triggered at sosreport run.

  -  97 plugins not using UbuntuPlugin and/or DebianPlugin. Basically
  useless in a Ubuntu context.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sosreport/+bug/1825010/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1825010] Re: [sru] Update sosreport to 3.8

2019-12-11 Thread Eric Desrochers
** Changed in: sosreport (Ubuntu Disco)
   Status: Confirmed => Won't Fix

** Changed in: sosreport (Ubuntu Xenial)
   Status: Confirmed => Won't Fix

** Changed in: sosreport (Ubuntu Bionic)
   Status: Confirmed => In Progress

** Changed in: sosreport (Ubuntu Xenial)
   Status: Won't Fix => In Progress

** Changed in: sosreport (Ubuntu Xenial)
   Importance: Undecided => Low

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1825010

Title:
  [sru] Update sosreport to 3.8

Status in sosreport package in Ubuntu:
  Fix Released
Status in sosreport source package in Trusty:
  Won't Fix
Status in sosreport source package in Xenial:
  In Progress
Status in sosreport source package in Bionic:
  In Progress
Status in sosreport source package in Cosmic:
  Won't Fix
Status in sosreport source package in Disco:
  Won't Fix
Status in sosreport source package in Eoan:
  In Progress
Status in sosreport source package in Focal:
  Fix Released
Status in sosreport package in Debian:
  Fix Released

Bug description:
  [Impact]

  sosreport 3.8 has been released including further enhancements in core 
sosreport functionality:
  https://github.com/sosreport/sos/releases/tag/3.8

  It would be great to find sosreport v3.8 in supported stable releases,
  considering the fact that the release (especially LTSes) will be
  supported for a couple of years still:

  sosreport is widely use by Canonical support team to troubleshoot UA
  customer, other vendors and community users. These improvement will
  benefit all of them.

  sosreport 3.8 contains a number of enhancements, new features, and bug
  fixes. (See "Release Note" below)

  Just like we did for :
  - v3.5 (LP: #1734983)
  - v3.6 (LP: #1775195)

  [Test Case]

   * Install sosreport
   * Run sosreport
     - sosreport plugins are separated by subject (juju, MAAS, grub, zfs,...) 
and allow the capability to detect (based on file and package) if it exist 
and/or installed and then only run the necessary plugins based on the detection 
made.

  It creates a files under /tmp in the form of :
  /tmp/sosreport-sos38X-20190416160152.tar.xz  # Actual sosreport
  /tmp/sosreport-sos38X-20190416160152.tar.xz.md5  # MD5 checksum

  Only accessible by root user:
  -rw--- 1 root root 1619000 Apr 16 16:07 
/tmp/sosreport-sos38X-20190416160152.tar.xz

  Ideally, since we can't test all plugins, it would be good to have a
  few testers using different HW, kernel, installation with a focus on
  juju, MAAS, LXD, canonical-livepatch, 

  Looking for any error on the terminal while sosreport is running or
  post-sosreport run in /tmp/sosreport-*/sos_logs/

  [Regression Potential]

   * Risk is low.

   * We did some dogfooding on sosreport, but we can't test each
  individual plugins and scenarios one by one, that would just be
  impossible but we have tested the ones we considered important and
  Ubuntu/Canonical related (canonical-livepatch, MAAS, juju, snappy),
  Openstack, mandatory file (logs, dmidecode, installed-debs and so on)

   * Plugin bug is an eventuality, but they are usually easy to fix and
  the impact will be isolated to the plugin itself or section of the
  plugin. If a plugin has a bug the worst that could happen is that this
  particular plugin won't (or partially) collect information.

  [Other information]

  * Release note:
  https://github.com/sosreport/sos/releases/tag/3.8

  * Plugins:
  sosreport contains in total: 284 plugins

  - 185 plugins that used UbuntuPlugin and/or DebianPlugin that might
  been triggered at sosreport run.

  -  97 plugins not using UbuntuPlugin and/or DebianPlugin. Basically
  useless in a Ubuntu context.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sosreport/+bug/1825010/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1842495] Re: Grafana support on Ubuntu

2019-12-09 Thread Eric Desrochers
Disco is near EOL, no need to patch it.

** Also affects: sosreport (Ubuntu Eoan)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1842495

Title:
  Grafana support on Ubuntu

Status in sosreport:
  Fix Released
Status in sosreport package in Ubuntu:
  Fix Released
Status in sosreport source package in Xenial:
  New
Status in sosreport source package in Bionic:
  New
Status in sosreport source package in Disco:
  Won't Fix
Status in sosreport source package in Eoan:
  New

Bug description:
  Please expand the Grafana plugin to support Ubuntu. This should work
  with both snaps or debs.

To manage notifications about this bug go to:
https://bugs.launchpad.net/sosreport/+bug/1842495/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1842495] Re: Grafana support on Ubuntu

2019-12-09 Thread Eric Desrochers
@cjohnston

Do you need this in stable release as well ?
Feel free to generate debdiff(s) and I'll gladly sponsor them.

- Eric

** Also affects: sosreport (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Also affects: sosreport (Ubuntu Disco)
   Importance: Undecided
   Status: New

** Also affects: sosreport (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: sosreport (Ubuntu Disco)
   Status: New => Won't Fix

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1842495

Title:
  Grafana support on Ubuntu

Status in sosreport:
  Fix Released
Status in sosreport package in Ubuntu:
  Fix Released
Status in sosreport source package in Xenial:
  New
Status in sosreport source package in Bionic:
  New
Status in sosreport source package in Disco:
  Won't Fix
Status in sosreport source package in Eoan:
  New

Bug description:
  Please expand the Grafana plugin to support Ubuntu. This should work
  with both snaps or debs.

To manage notifications about this bug go to:
https://bugs.launchpad.net/sosreport/+bug/1842495/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1854981] Re: system doesn't properly boot as expected if /usr is on its own LV

2019-12-05 Thread Eric Desrochers
** Changed in: lvm2 (Ubuntu Xenial)
   Status: New => Won't Fix

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1854981

Title:
  system doesn't properly boot as expected if /usr is on its own LV

Status in initramfs-tools package in Ubuntu:
  Won't Fix
Status in lvm2 package in Ubuntu:
  Fix Released
Status in initramfs-tools source package in Xenial:
  Won't Fix
Status in lvm2 source package in Xenial:
  Won't Fix
Status in initramfs-tools source package in Bionic:
  Won't Fix
Status in lvm2 source package in Bionic:
  Confirmed
Status in initramfs-tools source package in Disco:
  Won't Fix
Status in lvm2 source package in Disco:
  Confirmed

Bug description:
  Only the lv for root volume get activated, because of the grub
  parameter that specifies/enforce it "root=/dev/mapper/ubuntu-vg-ubuntu
  --lv"

  http://man7.org/linux/man-pages/man7/bootparam.7.html
  'root=...'
    This argument tells the kernel what device is to be used as
    the root filesystem while booting.

  If one add a separate LV for /usr, the system will go straight to
  initramfs prompt failling to mount /usr.

  At initramfs prompt, we notice that 'lv-usr' status is 'NOT
  available'.

  Performing 'lvm vgchange -ay' at initramfs prompt workaround the
  problem and allow one to successfully boot.

  Adding 'debug' parameter, we clearly we see /root being detected and mounted:
  initramfs.debug:
  => + mount -r -t ext4 /dev/mapper/ubuntu--vg-ubuntu--lv /root
  => + mountroot_status=0
  + [ ]
  + log_end_msg
  + _log_msg done.\n
  + [ n = y ]
  + printf done.\n
  done.
  + read_fstab_entry /usr
  + found=1
  + [ -f /root/etc/fstab ]
  + read MNT_FSNAME MNT_DIR MNT_TYPE MNT_OPTS MNT_FREQ MNT_PASS MNT_JUNK
  + [ / = /usr ]
  + read MNT_FSNAME MNT_DIR MNT_TYPE MNT_OPTS MNT_FREQ MNT_PASS MNT_JUNK
  + [ /usr = /usr ]
  + [ -n ]
  + found=0
  + break 2
  + return 0
  + log_begin_msg Mounting /usr file system
  + _log_msg Begin: Mounting /usr file system ...

  then the code read /etc/fstab and specifically search for /usr (most
  likely because of the /usr binary merged) and try to mount if if
  found.

  initramfs-tools:init
  271 maybe_break mount
  272 log_begin_msg "Mounting root file system"
  273 # Always load local and nfs (since these might be needed for /etc or
  274 # /usr, irrespective of the boot script used to mount the rootfs).
  275 . /scripts/local
  276 . /scripts/nfs
  277 . /scripts/${BOOT}
  278 parse_numeric "${ROOT}"
  279 maybe_break mountroot
  280 mount_top
  281 mount_premount
  282 mountroot
  283 log_end_msg
  284
  => 285 if read_fstab_entry /usr; then
  => 286 log_begin_msg "Mounting /usr file system"
  => 287 mountfs /usr
  => 288 log_end_msg
  => 289 fi

  In this case, /usr is present in /etc/fstab but the logical volume is
  not available, so it is mounting a filesystem without his backend
  device, thus goes straight to the initramfs prompt because /usr
  couldn't be mounted.

  It clearly seems to be an 'auto-activation' issue at boot.

  For other such as /home, /var, it's not a big deal cause they can be
  activated later on in the process and they are (I haven't check but I
  guess systemd or systemd unit/generator is taking care of it at some
  point), but /usr is a important piece to have mounted before the pivot
  since it contains most of the crucial binary, especially that nowadays
  /sbin, /bin, and /lib are pointing to /usr:

  lrwxrwxrwx   1 root root 10 Aug 26 13:51 libx32 -> usr/libx32
  lrwxrwxrwx   1 root root  9 Aug 26 13:51 lib64 -> usr/lib64
  lrwxrwxrwx   1 root root  9 Aug 26 13:51 lib32 -> usr/lib32
  lrwxrwxrwx   1 root root  7 Aug 26 13:51 lib -> usr/lib
  lrwxrwxrwx   1 root root  7 Aug 26 13:51 bin -> usr/bin
  lrwxrwxrwx   1 root root  8 Aug 26 13:51 sbin -> usr/sbin

  NOTE:

  * That doesn't affect /usr found in /etc/fstab on its separate
  partition when no LVM involve (e.g. /dev/vdb /usr ext4 ). It only
  cause issue when /usr is in a LVM context.

  * I was able to reproduce on Bionic and Disco so far.
  Eoan doesn't seem to exhibit the situation so far in my testing.

  * While certain release such as Bionic, Xenial doesn't come implicitly
  with the /usr merge approach. One can install package 'usrmerge' and
  convert their system /usr merged. I don't think removing the
  read_fstable_entry for /usr is an option here, as some user could
  potentially decide to convert their system with 'usrmerge' pkg.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/initramfs-tools/+bug/1854981/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/

[Group.of.nepali.translators] [Bug 1854981] Re: system doesn't properly boot as expected if /usr is on its own LV

2019-12-05 Thread Eric Desrochers
** Also affects: lvm2 (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Also affects: initramfs-tools (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Also affects: lvm2 (Ubuntu Disco)
   Importance: Undecided
   Status: New

** Also affects: initramfs-tools (Ubuntu Disco)
   Importance: Undecided
   Status: New

** Also affects: lvm2 (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Also affects: initramfs-tools (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: initramfs-tools (Ubuntu Disco)
   Status: New => Won't Fix

** Changed in: initramfs-tools (Ubuntu Bionic)
   Status: New => Won't Fix

** Changed in: initramfs-tools (Ubuntu Xenial)
   Status: New => Won't Fix

** Changed in: initramfs-tools (Ubuntu)
   Status: New => Won't Fix

** Changed in: lvm2 (Ubuntu)
   Status: New => Fix Released

** Changed in: lvm2 (Ubuntu Disco)
   Status: New => Confirmed

** Changed in: lvm2 (Ubuntu Bionic)
   Status: New => Confirmed

** Changed in: lvm2 (Ubuntu Bionic)
   Importance: Undecided => Medium

** Changed in: lvm2 (Ubuntu Disco)
   Importance: Undecided => Medium

** Changed in: lvm2 (Ubuntu)
   Importance: High => Undecided

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1854981

Title:
  system doesn't properly boot as expected if /usr is on its own LV

Status in initramfs-tools package in Ubuntu:
  Won't Fix
Status in lvm2 package in Ubuntu:
  Fix Released
Status in initramfs-tools source package in Xenial:
  Won't Fix
Status in lvm2 source package in Xenial:
  Won't Fix
Status in initramfs-tools source package in Bionic:
  Won't Fix
Status in lvm2 source package in Bionic:
  Confirmed
Status in initramfs-tools source package in Disco:
  Won't Fix
Status in lvm2 source package in Disco:
  Confirmed

Bug description:
  Only the lv for root volume get activated, because of the grub
  parameter that specifies/enforce it "root=/dev/mapper/ubuntu-vg-ubuntu
  --lv"

  http://man7.org/linux/man-pages/man7/bootparam.7.html
  'root=...'
    This argument tells the kernel what device is to be used as
    the root filesystem while booting.

  If one add a separate LV for /usr, the system will go straight to
  initramfs prompt failling to mount /usr.

  At initramfs prompt, we notice that 'lv-usr' status is 'NOT
  available'.

  Performing 'lvm vgchange -ay' at initramfs prompt workaround the
  problem and allow one to successfully boot.

  Adding 'debug' parameter, we clearly we see /root being detected and mounted:
  initramfs.debug:
  => + mount -r -t ext4 /dev/mapper/ubuntu--vg-ubuntu--lv /root
  => + mountroot_status=0
  + [ ]
  + log_end_msg
  + _log_msg done.\n
  + [ n = y ]
  + printf done.\n
  done.
  + read_fstab_entry /usr
  + found=1
  + [ -f /root/etc/fstab ]
  + read MNT_FSNAME MNT_DIR MNT_TYPE MNT_OPTS MNT_FREQ MNT_PASS MNT_JUNK
  + [ / = /usr ]
  + read MNT_FSNAME MNT_DIR MNT_TYPE MNT_OPTS MNT_FREQ MNT_PASS MNT_JUNK
  + [ /usr = /usr ]
  + [ -n ]
  + found=0
  + break 2
  + return 0
  + log_begin_msg Mounting /usr file system
  + _log_msg Begin: Mounting /usr file system ...

  then the code read /etc/fstab and specifically search for /usr (most
  likely because of the /usr binary merged) and try to mount if if
  found.

  initramfs-tools:init
  271 maybe_break mount
  272 log_begin_msg "Mounting root file system"
  273 # Always load local and nfs (since these might be needed for /etc or
  274 # /usr, irrespective of the boot script used to mount the rootfs).
  275 . /scripts/local
  276 . /scripts/nfs
  277 . /scripts/${BOOT}
  278 parse_numeric "${ROOT}"
  279 maybe_break mountroot
  280 mount_top
  281 mount_premount
  282 mountroot
  283 log_end_msg
  284
  => 285 if read_fstab_entry /usr; then
  => 286 log_begin_msg "Mounting /usr file system"
  => 287 mountfs /usr
  => 288 log_end_msg
  => 289 fi

  In this case, /usr is present in /etc/fstab but the logical volume is
  not available, so it is mounting a filesystem without his backend
  device, thus goes straight to the initramfs prompt because /usr
  couldn't be mounted.

  It clearly seems to be an 'auto-activation' issue at boot.

  For other such as /home, /var, it's not a big deal cause they can be
  activated later on in the process and they are (I haven't check but I
  guess systemd or systemd unit/generator is taking care of it at some
  point), but /usr is a important piece to have mounted before the pivot
  since it contains most of the crucial binary, especially that nowadays
  /sbin, /bin, and /lib are pointing to /usr:

  lrwxrwxrwx   1 root root 10 Aug 26 13:51 libx32 -> usr/libx32
  lrwxrwxrwx   1 root root  9 Aug 26 13:51 lib64 -> usr/lib64
  lrwxrwxrwx   1 root root  9 Aug 26 13:51 lib32 -> usr/lib32
  lrwxrwxrwx   1 root r

[Group.of.nepali.translators] [Bug 1825010] Re: [sru] Update sosreport to 3.8

2019-11-12 Thread Eric Desrochers
** Changed in: sosreport (Ubuntu Cosmic)
   Status: Confirmed => Won't Fix

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1825010

Title:
  [sru] Update sosreport to 3.8

Status in sosreport package in Ubuntu:
  Fix Released
Status in sosreport source package in Trusty:
  Won't Fix
Status in sosreport source package in Xenial:
  Confirmed
Status in sosreport source package in Bionic:
  Confirmed
Status in sosreport source package in Cosmic:
  Won't Fix
Status in sosreport source package in Disco:
  Confirmed
Status in sosreport source package in Eoan:
  In Progress
Status in sosreport source package in Focal:
  Fix Released
Status in sosreport package in Debian:
  Fix Released

Bug description:
  [Impact]

  sosreport 3.8 has been released including further enhancements in core 
sosreport functionality:
  https://github.com/sosreport/sos/releases/tag/3.8

  It would be great to find sosreport v3.8 in supported stable releases,
  considering the fact that the release (especially LTSes) will be
  supported for a couple of years still:

  sosreport is widely use by Canonical support team to troubleshoot UA
  customer, other vendors and community users. These improvement will
  benefit all of them.

  sosreport 3.8 contains a number of enhancements, new features, and bug
  fixes. (See "Release Note" below)

  Just like we did for :
  - v3.5 (LP: #1734983)
  - v3.6 (LP: #1775195)

  [Test Case]

   * Install sosreport
   * Run sosreport
     - sosreport plugins are separated by subject (juju, MAAS, grub, zfs,...) 
and allow the capability to detect (based on file and package) if it exist 
and/or installed and then only run the necessary plugins based on the detection 
made.

  It creates a files under /tmp in the form of :
  /tmp/sosreport-sos38X-20190416160152.tar.xz  # Actual sosreport
  /tmp/sosreport-sos38X-20190416160152.tar.xz.md5  # MD5 checksum

  Only accessible by root user:
  -rw--- 1 root root 1619000 Apr 16 16:07 
/tmp/sosreport-sos38X-20190416160152.tar.xz

  Ideally, since we can't test all plugins, it would be good to have a
  few testers using different HW, kernel, installation with a focus on
  juju, MAAS, LXD, canonical-livepatch, 

  Looking for any error on the terminal while sosreport is running or
  post-sosreport run in /tmp/sosreport-*/sos_logs/

  [Regression Potential]

   * Risk is low.

   * We did some dogfooding on sosreport, but we can't test each
  individual plugins and scenarios one by one, that would just be
  impossible but we have tested the ones we considered important and
  Ubuntu/Canonical related (canonical-livepatch, MAAS, juju, snappy),
  Openstack, mandatory file (logs, dmidecode, installed-debs and so on)

   * Plugin bug is an eventuality, but they are usually easy to fix and
  the impact will be isolated to the plugin itself or section of the
  plugin. If a plugin has a bug the worst that could happen is that this
  particular plugin won't (or partially) collect information.

  [Other information]

  * Release note:
  https://github.com/sosreport/sos/releases/tag/3.8

  * Plugins:
  sosreport contains in total: 284 plugins

  - 185 plugins that used UbuntuPlugin and/or DebianPlugin that might
  been triggered at sosreport run.

  -  97 plugins not using UbuntuPlugin and/or DebianPlugin. Basically
  useless in a Ubuntu context.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sosreport/+bug/1825010/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1828467] Re: [sru] remove juju-db stop/start service interactions

2019-11-11 Thread Eric Desrochers
** Changed in: sosreport (Ubuntu)
 Assignee: Dan Hill (hillpd) => Eric Desrochers (slashd)

** Changed in: sosreport (Ubuntu)
   Status: In Progress => Fix Released

** Changed in: sosreport (Ubuntu Cosmic)
   Status: New => Won't Fix

** Changed in: sosreport (Ubuntu Eoan)
 Assignee: Dan Hill (hillpd) => Eric Desrochers (slashd)

** Changed in: sosreport (Ubuntu Disco)
 Assignee: Dan Hill (hillpd) => Eric Desrochers (slashd)

** Changed in: sosreport (Ubuntu Cosmic)
 Assignee: Dan Hill (hillpd) => (unassigned)

** Changed in: sosreport (Ubuntu Bionic)
 Assignee: Dan Hill (hillpd) => Eric Desrochers (slashd)

** Changed in: sosreport (Ubuntu Xenial)
 Assignee: Dan Hill (hillpd) => Eric Desrochers (slashd)

** Changed in: sosreport (Ubuntu Disco)
   Status: New => In Progress

** Changed in: sosreport (Ubuntu Bionic)
   Status: New => In Progress

** Changed in: sosreport (Ubuntu Xenial)
   Status: New => In Progress

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1828467

Title:
  [sru] remove juju-db stop/start service interactions

Status in sosreport package in Ubuntu:
  Fix Released
Status in sosreport source package in Trusty:
  Won't Fix
Status in sosreport source package in Xenial:
  In Progress
Status in sosreport source package in Bionic:
  In Progress
Status in sosreport source package in Cosmic:
  Won't Fix
Status in sosreport source package in Disco:
  In Progress
Status in sosreport source package in Eoan:
  In Progress

Bug description:
  [Impact]

  The juju plugin will stop and start the juju-db service during data 
collection.
  sosreport should not impact running services, or attempt to recover them.

  This has been reported upstream[0] and will be fixed by the juju 2.x
  refactor[1]

  This is a stop-gap tracking the removal of the juju-db service restart
  code in existing sosreport releases.

  [0] - https://github.com/sosreport/sos/issues/1653
  [1] - https://github.com/sosreport/sos/pull/1670

  [Test Case]

   * Make sure you are in the juju controller.
   * Install sosreport
   * Look mongod PID before
     ** $ pidof mongod
   * Run sosreport, ensuring that the juju plugin is exercised
   * Confirm the juju-db service was not restarted, and mongoexport data 
captured.
  * Look mongod PID after
     ** $ pidof mongod

  Check for errors while running, or in /tmp/sosreport-*/sos_logs/

  The offending function ensure_service_is_running() in theory doesn't
  create any harm unless juju plugin is exercised during a sosreport run
  from a juju controller where mongod and/or juju-db resides.

  [Regression Potential]

   * Risk is low.
   * Change is limited in scope to the juju plugin.
   * Worst-case scenario is that the mongoexport command will fail to collect 
any data, which won't affect core functionality of sosreport itself nor impact 
other sosreport plugins.

  [Other information]

  We will temporary divert from the juju plugin found upstream and
  debian, while the refactoring is completed to avoid any situation
  where sosreport is run on a controller since it may have production
  impact on Ubuntu juju environment.

  Once the refactoring of the juju plugin is completed upstream, we will
  make sure to update debian and put the juju plugin align with what
  found upstream and debian.

  Actually, sosreport 3.7 micro-release is blocked waiting for this
  refactoring to be completed (LP: #1825010).

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sosreport/+bug/1828467/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1840686] Re: Xenial images won't reboot if disk size is > 2TB when using GPT

2019-11-04 Thread Eric Desrochers
Uploaded grub2-signed "Rebuild against grub2 2.02~beta2-36ubuntu3.23.
(LP: #1840686)"

** Changed in: grub2-signed (Ubuntu)
   Status: In Progress => Fix Released

** Changed in: grub2-signed (Ubuntu)
     Assignee: Eric Desrochers (slashd) => (unassigned)

** Changed in: grub2-signed (Ubuntu)
   Importance: High => Undecided

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1840686

Title:
  Xenial images won't reboot if disk size is > 2TB when using GPT

Status in cloud-init:
  Won't Fix
Status in grub package in Ubuntu:
  Fix Released
Status in grub2-signed package in Ubuntu:
  Fix Released
Status in grub source package in Xenial:
  In Progress

Bug description:
  [Impact]

  On Xenial images which use GPT instead of MBR to enable efi based
  booting, there is an issue where after booting an instance that has a
  disk size of 2049 GB or higher, we hang on the next subsequent boot
  (Logs indicate it hanging on "Booting Hard Disk 0").

  This is a problem in grub2 where the system would become unbootable
  after ext* online resize if no resize_inode was created at ext* format
  time.

  [Test Case]

  To reproduce:

  1) Create an image with a disk size of 3072 GB using a serial that has
  GPT:

  gcloud compute instances create test-3072-xenial --image daily-
  ubuntu-1604-xenial-v20190731 --image-project ubuntu-os-cloud-devel
  --boot-disk-size 3072

  2) Reboot the instance

  The instance will hang on reboot and you cannot connect. If you go to
  GCP console and select Logs > Serial port 1 (console), you will see
  the boot process has stopped at "Booting Hard Disk 0".

  I have built a test package, which is available here:

  https://launchpad.net/~mruffell/+archive/ubuntu/lp1840686-test

  If you do step 1) but do not reboot, and instead add the PPA, install
  the new grub like so:

  1) gcloud compute instances create test-3072-xenial --image 
daily-ubuntu-1604-xenial-v20190731 --image-project ubuntu-os-cloud-devel 
--boot-disk-size 3072
  2) sudo add-apt-repository ppa:mruffell/lp1840686-test
  3) sudo apt-get update
  4) sudo apt remove grub-common grub-efi-amd64 grub-efi-amd64-bin 
grub-efi-amd64-signed grub-pc-bin grub2-common
  5) sudo apt install grub-common grub-efi-amd64 grub-efi-amd64-bin grub-pc-bin 
grub2-common
  6) sudo grub-install /dev/sda
  7) sudo reboot

  The instance will boot successfully and you will be able to connect.

  Note, we must use "daily-ubuntu-1604-xenial-v20190731" as the image,
  as it is enabled for GPT and efi. GCP was reverted back to MBR and
  bios booting because of this bug, so the latest images will not
  reproduce the problem.

  [Regression Potential]

  Grub is a core package and every care must be taken in order to not
  introduce any regressions.

  The commit is present in B, D, E and F, and is considered well tested
  and widely adopted by the community.

  The commit comes with its own testcase, to test the ext4_metabg fix.

  The changes are localised to ext* based filesystems, although since
  they are the most popular family of filesystems used by the community,
  this does not reduce risk of breakage by much.

  If a regression were to happen, a regression would have a large
  impact, and in the worst case, can lead to unbootable systems and data
  loss for users who are not technical enough to reinstall grub from a
  working package inside the broken system chroot.

  [Other Info]

  In comment #4, Sultan identifies the fix as:

  commit e20aa39ea4298011ba716087713cff26c6c52006
  Author: Vladimir Serbinenko 
  Date:   Mon Feb 16 20:53:26 2015 +0100
  Subject: ext2: Support META_BG.

  This commit is from upstream grub2, and can be found here:

  
https://git.savannah.gnu.org/cgit/grub.git/commit/?id=e20aa39ea4298011ba716087713cff26c6c52006

  Looking at when this was merged:

  $ git describe --contains e20aa39ea4298011ba716087713cff26c6c52006
  2.02-beta3~429

  This commit is present in B, D, E and F, leaving X as the only version
  needing an SRU.

  The commit cleanly cherry picks to X, because the delta from
  2.02~beta2-36ubuntu3.22 to 2.02-beta3~429 is small.

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-init/+bug/1840686/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1840686] Re: Xenial images won't reboot if disk size is > 2TB when using GPT

2019-11-04 Thread Eric Desrochers
** Also affects: grub2-signed (Ubuntu)
   Importance: Undecided
   Status: New

** Changed in: grub2-signed (Ubuntu)
   Status: New => In Progress

** Changed in: grub2-signed (Ubuntu)
   Importance: Undecided => High

** Changed in: grub2-signed (Ubuntu)
 Assignee: (unassigned) => Eric Desrochers (slashd)

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1840686

Title:
  Xenial images won't reboot if disk size is > 2TB when using GPT

Status in cloud-init:
  Won't Fix
Status in grub package in Ubuntu:
  Fix Released
Status in grub2-signed package in Ubuntu:
  Fix Released
Status in grub source package in Xenial:
  In Progress

Bug description:
  [Impact]

  On Xenial images which use GPT instead of MBR to enable efi based
  booting, there is an issue where after booting an instance that has a
  disk size of 2049 GB or higher, we hang on the next subsequent boot
  (Logs indicate it hanging on "Booting Hard Disk 0").

  This is a problem in grub2 where the system would become unbootable
  after ext* online resize if no resize_inode was created at ext* format
  time.

  [Test Case]

  To reproduce:

  1) Create an image with a disk size of 3072 GB using a serial that has
  GPT:

  gcloud compute instances create test-3072-xenial --image daily-
  ubuntu-1604-xenial-v20190731 --image-project ubuntu-os-cloud-devel
  --boot-disk-size 3072

  2) Reboot the instance

  The instance will hang on reboot and you cannot connect. If you go to
  GCP console and select Logs > Serial port 1 (console), you will see
  the boot process has stopped at "Booting Hard Disk 0".

  I have built a test package, which is available here:

  https://launchpad.net/~mruffell/+archive/ubuntu/lp1840686-test

  If you do step 1) but do not reboot, and instead add the PPA, install
  the new grub like so:

  1) gcloud compute instances create test-3072-xenial --image 
daily-ubuntu-1604-xenial-v20190731 --image-project ubuntu-os-cloud-devel 
--boot-disk-size 3072
  2) sudo add-apt-repository ppa:mruffell/lp1840686-test
  3) sudo apt-get update
  4) sudo apt remove grub-common grub-efi-amd64 grub-efi-amd64-bin 
grub-efi-amd64-signed grub-pc-bin grub2-common
  5) sudo apt install grub-common grub-efi-amd64 grub-efi-amd64-bin grub-pc-bin 
grub2-common
  6) sudo grub-install /dev/sda
  7) sudo reboot

  The instance will boot successfully and you will be able to connect.

  Note, we must use "daily-ubuntu-1604-xenial-v20190731" as the image,
  as it is enabled for GPT and efi. GCP was reverted back to MBR and
  bios booting because of this bug, so the latest images will not
  reproduce the problem.

  [Regression Potential]

  Grub is a core package and every care must be taken in order to not
  introduce any regressions.

  The commit is present in B, D, E and F, and is considered well tested
  and widely adopted by the community.

  The commit comes with its own testcase, to test the ext4_metabg fix.

  The changes are localised to ext* based filesystems, although since
  they are the most popular family of filesystems used by the community,
  this does not reduce risk of breakage by much.

  If a regression were to happen, a regression would have a large
  impact, and in the worst case, can lead to unbootable systems and data
  loss for users who are not technical enough to reinstall grub from a
  working package inside the broken system chroot.

  [Other Info]

  In comment #4, Sultan identifies the fix as:

  commit e20aa39ea4298011ba716087713cff26c6c52006
  Author: Vladimir Serbinenko 
  Date:   Mon Feb 16 20:53:26 2015 +0100
  Subject: ext2: Support META_BG.

  This commit is from upstream grub2, and can be found here:

  
https://git.savannah.gnu.org/cgit/grub.git/commit/?id=e20aa39ea4298011ba716087713cff26c6c52006

  Looking at when this was merged:

  $ git describe --contains e20aa39ea4298011ba716087713cff26c6c52006
  2.02-beta3~429

  This commit is present in B, D, E and F, leaving X as the only version
  needing an SRU.

  The commit cleanly cherry picks to X, because the delta from
  2.02~beta2-36ubuntu3.22 to 2.02-beta3~429 is small.

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-init/+bug/1840686/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1743592] Re: NGINX fails to start/install/upgrade if IPv6 is completely disabled.

2019-10-28 Thread Eric Desrochers
** Changed in: nginx (Ubuntu Eoan)
   Status: In Progress => Won't Fix

** Changed in: nginx (Ubuntu Disco)
   Status: In Progress => Won't Fix

** Changed in: nginx (Ubuntu Bionic)
   Status: In Progress => Won't Fix

** Changed in: nginx (Ubuntu Xenial)
   Status: New => Won't Fix

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1743592

Title:
  NGINX fails to start/install/upgrade if IPv6 is completely disabled.

Status in nginx package in Ubuntu:
  Triaged
Status in nginx source package in Xenial:
  Won't Fix
Status in nginx source package in Bionic:
  Won't Fix
Status in nginx source package in Disco:
  Won't Fix
Status in nginx source package in Eoan:
  Won't Fix
Status in nginx package in Debian:
  New

Bug description:
  [IMPACT]

  With current default vhost listening on IPV6, nginx won't start on
  fully IPV6 disabled system, expecting to connect to a IPV6 socket on
  port 80.

  # nginx -t
  nginx: the configuration file /etc/nginx/nginx.conf syntax is ok
  ==> nginx: [emerg] socket() [::]:80 failed (97: Address family not supported 
by protocol)
  nginx: configuration file /etc/nginx/nginx.conf test failed

  # cat /etc/nginx/sites-enabled/default
  ..
  server {
   listen 80 default_server;
  ==> listen [::]:80 default_server;
  ..

  [TEST CASE]
  * Disable ipv6
    # cat /proc/cmdline
     ipv6.disable=1

  * Reboot for the kernel parameter to be taken into account.

  * Fresh install of nginx:
    # apt-get install nginx -y

  Output:
  

  # apt-get install nginx -y
  ...
  Setting up nginx-core (1.14.0-0ubuntu1.6) ...
  Job for nginx.service failed because the control process exited with error 
code.
  See "systemctl status nginx.service" and "journalctl -xe" for details.
  invoke-rc.d: initscript nginx, action "start" failed.
  ● nginx.service - A high performance web server and a reverse proxy server
     Loaded: loaded (/lib/systemd/system/nginx.service; enabled; vendor preset: 
enabled)
     Active: failed (Result: exit-code) since Wed 2019-10-23 14:01:26 UTC; 6ms 
ago
   Docs: man:nginx(8)
    Process: 1005 ExecStartPre=/usr/sbin/nginx -t -q -g daemon on; 
master_process on; (code=exited, status=1/FAILURE)

  Oct 23 14:01:26 nginxbionictest1 systemd[1]: Starting A high performance web 
server and a reverse proxy server...
  Oct 23 14:01:26 nginxbionictest1 nginx[1005]: nginx: [emerg] socket() [::]:80 
failed (97: Address family not supported by protocol)
  Oct 23 14:01:26 nginxbionictest1 nginx[1005]: nginx: configuration file 
/etc/nginx/nginx.conf test failed
  Oct 23 14:01:26 nginxbionictest1 systemd[1]: nginx.service: Control process 
exited, code=exited status=1
  Oct 23 14:01:26 nginxbionictest1 systemd[1]: nginx.service: Failed with 
result 'exit-code'.
  Oct 23 14:01:26 nginxbionictest1 systemd[1]: Failed to start A high 
performance web server and a reverse proxy server.
  dpkg: error processing package nginx-core (--configure):
   installed nginx-core package post-installation script subprocess returned 
error exit status 1
  dpkg: dependency problems prevent configuration of nginx:
   nginx depends on nginx-core (<< 1.14.0-0ubuntu1.6.1~) | nginx-full (<< 
1.14.0-0ubuntu1.6.1~) | nginx-light (<< 1.14.0-0ubuntu1.6.1~) | nginx-extras 
(<< 1.14.0-0ubuntu1.6.1~); however:
    Package nginx-core is not configured yet.
    Package nginx-full is not installed.
    Package nginx-light is not installed.
    Package nginx-extras is not installed.
   nginx depends on nginx-core (>= 1.14.0-0ubuntu1.6) | nginx-full (>= 
1.14.0-0ubuntu1.6) | nginx-light (>= 1.14.0-0ubuntu1.6) | nginx-extras (>= 
1.14.0-0ubuntu1.6); however:
    Package nginx-core is not configured yet.
    Package nginx-full is not installed.
    Package nginx-light is not installed.
    Package nginx-extras is not installed.

  dpkg: error processing package nginx (--configure):
   dependency problems - leaving unconfigured
  Processing triggers for systemd (237-3ubuntu10.31) ...
  No apport report written because the error message indicates its a followup 
error from a previous failure.
    
Processing triggers for man-db (2.8.3-2ubuntu0.1) 
...
  Processing triggers for ufw (0.36-0ubuntu0.18.04.1) ...
  Processing triggers for ureadahead (0.100.0-21) ...
  Processing triggers for libc-bin (2.27-3ubuntu1) ...
  Errors were encountered while processing:
   nginx-core
   nginx
  E: Sub-process /usr/bin/dpkg returned an error code (1)

  
  # dpkg -l | grep -i nginx
  iU  nginx  1.14.0-0ubuntu1.6  all 
 small, powerful, scalable web/proxy server
  ii  nginx-common   1.14.0-0ubuntu1.6  all 
 small, powerful, scalable web/p

[Group.of.nepali.translators] [Bug 1831448] Re: adcli: not adding an additional service-name

2019-10-26 Thread Eric Desrochers
Current active devel release (Future next LTS), now introduced a newer version 
of adcli:
 adcli | 0.9.0-1 | focal/universe  | source, amd64, arm64, armhf, i386, 
ppc64el, s390x


** Also affects: adcli (Ubuntu Focal)
   Importance: Undecided
   Status: Won't Fix

** Changed in: adcli (Ubuntu Focal)
   Status: Won't Fix => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1831448

Title:
  adcli: not adding an additional service-name

Status in adcli package in Ubuntu:
  Won't Fix
Status in adcli source package in Xenial:
  Won't Fix
Status in adcli source package in Bionic:
  Won't Fix
Status in adcli source package in Disco:
  Won't Fix
Status in adcli source package in Eoan:
  Won't Fix
Status in adcli source package in Focal:
  Fix Released
Status in adcli package in CentOS:
  Unknown
Status in adcli package in Debian:
  Fix Released

Bug description:
  I'm trying to add service principals to my computer in an Active
  Directory environment. The command runs without errors but the
  computer account attribute "servicePrincipalName" in AD is not
  changed.

  The man page says

  -

  --service-name=service

  Additional service name for a Kerberos principal to be created on the
  computer account. This option may be specified multiple times.

  --

  I've tried this by

   adcli -v update --service-name=nfs -D DOMAIN -C
  /tmp/krb5cc_11872_nXpkOu --show-details

  and got

   * Found realm in keytab: DOMAIN
   * Found service principal in keytab: host/m15015-lin.DOMAIN
   * Found host qualified name in keytab: host/m15015-lin.DOMAIN
   * Found service principal in keytab: host/M15015-LIN
   * Found computer name in keytab: M15015-LIN
   * Found service principal in keytab: host/m15015-lin
   * Using domain name: DOMAIN
   * Calculated computer account name from fqdn: M15015-LIN
   * Using domain realm: DOMAIN
   * Discovering domain controllers: _ldap._tcp.DOMAIN
   * Sending netlogon pings to domain controller: cldap://X.X.X.X
   * Sending netlogon pings to domain controller: cldap://X.X.X.X
   * Sending netlogon pings to domain controller: cldap://X.X.x.X
   * Received NetLogon info from: WinDC3.DOMAIN
   * Wrote out krb5.conf snippet to 
/tmp/adcli-krb5-Q9bim6/krb5.d/adcli-krb5-conf-ZzF3Xh
   * Looked up short domain name: DOMAIN
   * Using fully qualified name: m15015-lin
   * Using domain name: DOMAIN
   * Using computer account name: M15015-LIN
   * Using domain realm: DOMAIN
   * Using fully qualified name: m15015-lin.DOMAIN
   * Enrolling computer name: M15015-LIN
   * Generated 120 character computer password
   * Using keytab: FILE:/etc/krb5.keytab
   * Found computer account for M15015-LIN$ at: 
CN=M15015-LIN,OU=Linux-Clients,OU=Client Computer,DC=DOMAIN
   * Retrieved kvno '2' for computer account in directory: 
CN=M15015-LIN,OU=Linux-Clients,OU=Client Computer,DC=DOMAIN
   * Password not too old, no change needed
   * Modifying computer account: userAccountControl
   * Modifying computer account: operatingSystem
   * Modifying computer account: userPrincipalName

  
  The errorcode is 0. The cmd line --service-name is not working or do I use 
the wrong argument? --service-name="nfs/HOSTNAME" is not working too.

  However, my AD and kerberos configuration is working and so other updates to 
the computer account in AD are working like:
adcli -v update --os-version=19.04 -D DOMAIN -C /tmp/krb5cc_11872_nXpkOu 
--show-details
  This updates the attribute "operatingSystemVersion" for the computer account 
in AD.

  
  ---
  Ubuntu 19.04
  adcli  0.8.2-1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/adcli/+bug/1831448/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1848210] Re: ghostscript: ensure update of cups-filter

2019-10-15 Thread Eric Desrochers
I will be more favourable to do the other way around by adding a
"Depends:" in cups-filters package for ghostscript version "X" ?
Especially if cups-filters always needs ghostscript ?

It will force ghostscript to get updated instead of making the package
install to fails/breaks.

At least it's worth testing IMHO that avenue before considering the
current "Breaks:" approach.

- Eric


** Also affects: cups-filters (Ubuntu)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1848210

Title:
  ghostscript: ensure update of cups-filter

Status in cups-filters package in Ubuntu:
  New
Status in ghostscript package in Ubuntu:
  Invalid
Status in cups-filters source package in Xenial:
  New
Status in ghostscript source package in Xenial:
  In Progress
Status in cups-filters source package in Bionic:
  New
Status in ghostscript source package in Bionic:
  In Progress

Bug description:
  [Impact]

   * After an update of ghostscript but not cups-filters
     (which is possible; eg unattended-upgrade/landscape)
     users may hit errors printing PDF files (LP#1828401).

   * Landscape and unattended-upgrade allows packages
 updates to security updates / USN-only, thus
     ghostscript is updated for CVE-2019-3839-1 and -2
     (version 9.26~dfsg+0-0ubuntu0.18.04.9 and 16.04.9)
     which may break printing PDF files on cups-filters.

   * So, to ensure that ghostscript and cups-filters are
     both updated, add a versioned 'Breaks:' relationship
     to ghostscript for older cups-filters versions which
     are not yet fixed.

     Per Debian Policy [1]:

   """
   Normally a Breaks entry will have an “earlier than” version clause;
   such a Breaks is introduced in the version ... [that] reveals a bug
   in earlier versions of the broken package ...

   This use of Breaks will inform higher-level package management tools
   that the broken package must be upgraded before the new one.
   """

   * A versioned 'Depends:' relationship is not possible
     as ghostscript doesn't depend on cups-filters, thus
     it's possible to have ghostscript installed without
     cups-filters at all.

  [Test Case]

   * Install cups-filters version without fix for LP#1828401:
     1.20.2-0ubuntu3 in Bionic, and 1.8.3-2ubuntu3.4 in Xenial.

   * Update ghostscript to/later than fix for CVE-2019-3839-1/-2
     9.26~dfsg+0-0ubuntu0.18.04.9 in Bionic / .16.04.9 in Xenial.

   * Notice it does _not_ update cups-filters to version with fix:
     1.20.2-0ubuntu3.1 in Bionic, and 1.8.3-2ubuntu3.5 in Xenial.

   * $ wget -O ppd-with-pdf-support.ppd \
   
'http://www.openprinting.org/ppd-o-matic.php?driver=hl7x0&printer=Brother-HL-1020&show=1'

   * $ wget -O dummy.pdf \
   https://www.w3.org/WAI/ER/tests/xhtml/testfiles/resources/pdf/dummy.pdf

   * $ foomatic-rip -v --ppd ppd-with-pdf-support.ppd dummy.pdf
     ...
     Filetype: PDF
     GPL Ghostscript 9.26: Unrecoverable error, exit code 1
     Process is dying with "Unable to determine number of pages, page count: -1
     ", exit stat 3
     ...

   * Note it's broken.

   * Install ghostscript (test) packages with the relationships
     'Breaks: cups-filters (<< 1.20.2-0ubuntu3.1)' in Bionic or
     'Breaks: ..., cups-filters (<< 1.8.3-2ubuntu3.5)' in Xenial.

   * Note it _does_ update cups-filters to version with fix.

   * $ foomatic-rip -v --ppd ppd-with-pdf-support.ppd dummy.pdf
     ...
     Filetype: PDF
     File contains 1 pages
     Starting renderer with command: <...>
     ...

   * Note it's now working.

  [Regression Potential]

   * Low.  This only causes an update to cups-filters to a version
     that fixes an already identified/resolved problem (LP#1828401),
     which is available in bionic- & xenial-updates since May 2019.

  [Other Info]

   * This is only required in Xenial and Bionic.

   * Trusty doesn't have the ghostscript update that causes the problem.

   * Disco/Eoan have the cups-filters fix that it requires (1.22.5+).

  [1] https://www.debian.org/doc/debian-policy/ch-relationships.html
  #packages-which-break-other-packages-breaks

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/cups-filters/+bug/1848210/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1846138] Re: backport mod_reqtimeout with handshake support

2019-10-08 Thread Eric Desrochers
** Changed in: apache2 (Ubuntu Disco)
   Status: New => Fix Released

** Changed in: apache2 (Ubuntu Bionic)
   Status: New => Confirmed

** Changed in: apache2 (Ubuntu Bionic)
   Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1846138

Title:
  backport mod_reqtimeout with handshake support

Status in apache2 package in Ubuntu:
  Fix Released
Status in apache2 source package in Xenial:
  Confirmed
Status in apache2 source package in Bionic:
  Fix Released
Status in apache2 source package in Disco:
  Fix Released

Bug description:
  ## DRAFT ##
  [Impact] 

  [Test Case]

  [Regression Potential]

  
  [Other Info]

  [Original description]
  Backport the handshake feature in mod_reqtimeout (in Apache 2.4.39) to Apache 
2.4.18.

  Lack of this feature was exhausting free connections when sent
  corrupted packets.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1846138/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1846138] Re: backport mod_reqtimeout with handshake support

2019-10-08 Thread Eric Desrochers
** Changed in: apache2 (Ubuntu)
   Status: New => Fix Released

** Changed in: apache2 (Ubuntu)
 Assignee: Jesse Williamson (chardan) => (unassigned)

** Changed in: apache2 (Ubuntu Xenial)
 Assignee: (unassigned) => Jesse Williamson (chardan)

** Description changed:

- Backport the handshake feature in mod_reqtimeout (in Apache 2.4.39) to
- Apache 2.4.18.
+ ## DRAFT ##
+ [Impact] 
+ 
+ [Test Case]
+ 
+ [Regression Potential]
+ 
+ 
+ [Other Info]
+ 
+ [Original description]
+ Backport the handshake feature in mod_reqtimeout (in Apache 2.4.39) to Apache 
2.4.18.
  
  Lack of this feature was exhausting free connections when sent corrupted
  packets.

** Changed in: apache2 (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: apache2 (Ubuntu Xenial)
   Status: New => Confirmed

** Also affects: apache2 (Ubuntu Disco)
   Importance: Undecided
   Status: New

** Also affects: apache2 (Ubuntu Bionic)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1846138

Title:
  backport mod_reqtimeout with handshake support

Status in apache2 package in Ubuntu:
  Fix Released
Status in apache2 source package in Xenial:
  Confirmed
Status in apache2 source package in Bionic:
  Fix Released
Status in apache2 source package in Disco:
  Fix Released

Bug description:
  ## DRAFT ##
  [Impact] 

  [Test Case]

  [Regression Potential]

  
  [Other Info]

  [Original description]
  Backport the handshake feature in mod_reqtimeout (in Apache 2.4.39) to Apache 
2.4.18.

  Lack of this feature was exhausting free connections when sent
  corrupted packets.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1846138/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1846138] Re: backport mod_reqtimeout with handshake support

2019-10-07 Thread Eric Desrochers
** Also affects: apache2 (Ubuntu Xenial)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1846138

Title:
  backport mod_reqtimeout with handshake support

Status in apache2 package in Ubuntu:
  New
Status in apache2 source package in Xenial:
  New

Bug description:
  Backport the handshake feature in mod_reqtimeout (in Apache 2.4.39) to
  Apache 2.4.18.

  Lack of this feature was exhausting free connections when sent
  corrupted packets.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1846138/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1831448] Re: adcli: not adding an additional service-name

2019-10-03 Thread Eric Desrochers
A bionic-backports request has been made via LP: #1846516

** Changed in: adcli (Ubuntu Eoan)
   Status: New => Won't Fix

** Changed in: adcli (Ubuntu Disco)
   Status: New => Won't Fix

** Changed in: adcli (Ubuntu Bionic)
   Status: New => Won't Fix

** Changed in: adcli (Ubuntu Xenial)
   Status: New => Won't Fix

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1831448

Title:
  adcli: not adding an additional service-name

Status in adcli package in Ubuntu:
  New
Status in adcli source package in Xenial:
  Won't Fix
Status in adcli source package in Bionic:
  Won't Fix
Status in adcli source package in Disco:
  Won't Fix
Status in adcli source package in Eoan:
  Won't Fix
Status in adcli package in CentOS:
  Unknown
Status in adcli package in Debian:
  Fix Released

Bug description:
  I'm trying to add service principals to my computer in an Active
  Directory environment. The command runs without errors but the
  computer account attribute "servicePrincipalName" in AD is not
  changed.

  The man page says

  -

  --service-name=service

  Additional service name for a Kerberos principal to be created on the
  computer account. This option may be specified multiple times.

  --

  I've tried this by

   adcli -v update --service-name=nfs -D DOMAIN -C
  /tmp/krb5cc_11872_nXpkOu --show-details

  and got

   * Found realm in keytab: DOMAIN
   * Found service principal in keytab: host/m15015-lin.DOMAIN
   * Found host qualified name in keytab: host/m15015-lin.DOMAIN
   * Found service principal in keytab: host/M15015-LIN
   * Found computer name in keytab: M15015-LIN
   * Found service principal in keytab: host/m15015-lin
   * Using domain name: DOMAIN
   * Calculated computer account name from fqdn: M15015-LIN
   * Using domain realm: DOMAIN
   * Discovering domain controllers: _ldap._tcp.DOMAIN
   * Sending netlogon pings to domain controller: cldap://X.X.X.X
   * Sending netlogon pings to domain controller: cldap://X.X.X.X
   * Sending netlogon pings to domain controller: cldap://X.X.x.X
   * Received NetLogon info from: WinDC3.DOMAIN
   * Wrote out krb5.conf snippet to 
/tmp/adcli-krb5-Q9bim6/krb5.d/adcli-krb5-conf-ZzF3Xh
   * Looked up short domain name: DOMAIN
   * Using fully qualified name: m15015-lin
   * Using domain name: DOMAIN
   * Using computer account name: M15015-LIN
   * Using domain realm: DOMAIN
   * Using fully qualified name: m15015-lin.DOMAIN
   * Enrolling computer name: M15015-LIN
   * Generated 120 character computer password
   * Using keytab: FILE:/etc/krb5.keytab
   * Found computer account for M15015-LIN$ at: 
CN=M15015-LIN,OU=Linux-Clients,OU=Client Computer,DC=DOMAIN
   * Retrieved kvno '2' for computer account in directory: 
CN=M15015-LIN,OU=Linux-Clients,OU=Client Computer,DC=DOMAIN
   * Password not too old, no change needed
   * Modifying computer account: userAccountControl
   * Modifying computer account: operatingSystem
   * Modifying computer account: userPrincipalName

  
  The errorcode is 0. The cmd line --service-name is not working or do I use 
the wrong argument? --service-name="nfs/HOSTNAME" is not working too.

  However, my AD and kerberos configuration is working and so other updates to 
the computer account in AD are working like:
adcli -v update --os-version=19.04 -D DOMAIN -C /tmp/krb5cc_11872_nXpkOu 
--show-details
  This updates the attribute "operatingSystemVersion" for the computer account 
in AD.

  
  ---
  Ubuntu 19.04
  adcli  0.8.2-1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/adcli/+bug/1831448/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1831448] Re: adcli: not adding an additional service-name

2019-10-02 Thread Eric Desrochers
@bigon,

I made the request more "official" by reporting a bug in Debian against
adcli:

# adcli new release 0.9.0
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=941583

Regards,
Eric

** Bug watch added: Debian Bug tracker #941583
   https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=941583

** Also affects: adcli (Debian) via
   https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=941583
   Importance: Unknown
   Status: Unknown

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1831448

Title:
  adcli: not adding an additional service-name

Status in adcli package in Ubuntu:
  New
Status in adcli source package in Xenial:
  New
Status in adcli source package in Bionic:
  New
Status in adcli source package in Disco:
  New
Status in adcli source package in Eoan:
  New
Status in adcli package in CentOS:
  Unknown
Status in adcli package in Debian:
  Unknown

Bug description:
  I'm trying to add service principals to my computer in an Active
  Directory environment. The command runs without errors but the
  computer account attribute "servicePrincipalName" in AD is not
  changed.

  The man page says

  -

  --service-name=service

  Additional service name for a Kerberos principal to be created on the
  computer account. This option may be specified multiple times.

  --

  I've tried this by

   adcli -v update --service-name=nfs -D DOMAIN -C
  /tmp/krb5cc_11872_nXpkOu --show-details

  and got

   * Found realm in keytab: DOMAIN
   * Found service principal in keytab: host/m15015-lin.DOMAIN
   * Found host qualified name in keytab: host/m15015-lin.DOMAIN
   * Found service principal in keytab: host/M15015-LIN
   * Found computer name in keytab: M15015-LIN
   * Found service principal in keytab: host/m15015-lin
   * Using domain name: DOMAIN
   * Calculated computer account name from fqdn: M15015-LIN
   * Using domain realm: DOMAIN
   * Discovering domain controllers: _ldap._tcp.DOMAIN
   * Sending netlogon pings to domain controller: cldap://X.X.X.X
   * Sending netlogon pings to domain controller: cldap://X.X.X.X
   * Sending netlogon pings to domain controller: cldap://X.X.x.X
   * Received NetLogon info from: WinDC3.DOMAIN
   * Wrote out krb5.conf snippet to 
/tmp/adcli-krb5-Q9bim6/krb5.d/adcli-krb5-conf-ZzF3Xh
   * Looked up short domain name: DOMAIN
   * Using fully qualified name: m15015-lin
   * Using domain name: DOMAIN
   * Using computer account name: M15015-LIN
   * Using domain realm: DOMAIN
   * Using fully qualified name: m15015-lin.DOMAIN
   * Enrolling computer name: M15015-LIN
   * Generated 120 character computer password
   * Using keytab: FILE:/etc/krb5.keytab
   * Found computer account for M15015-LIN$ at: 
CN=M15015-LIN,OU=Linux-Clients,OU=Client Computer,DC=DOMAIN
   * Retrieved kvno '2' for computer account in directory: 
CN=M15015-LIN,OU=Linux-Clients,OU=Client Computer,DC=DOMAIN
   * Password not too old, no change needed
   * Modifying computer account: userAccountControl
   * Modifying computer account: operatingSystem
   * Modifying computer account: userPrincipalName

  
  The errorcode is 0. The cmd line --service-name is not working or do I use 
the wrong argument? --service-name="nfs/HOSTNAME" is not working too.

  However, my AD and kerberos configuration is working and so other updates to 
the computer account in AD are working like:
adcli -v update --os-version=19.04 -D DOMAIN -C /tmp/krb5cc_11872_nXpkOu 
--show-details
  This updates the attribute "operatingSystemVersion" for the computer account 
in AD.

  
  ---
  Ubuntu 19.04
  adcli  0.8.2-1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/adcli/+bug/1831448/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1825010] Re: [sru] Update sosreport to 3.8

2019-09-16 Thread Eric Desrochers
sosreport 3.8 have been accepted into debian unstable.

As a first step, I'll upload sosreport 3.8 in the next active
development release (F-series) when the cycle will start, and then will
wait as mentioned earlier for the juju plugin(s) refactoring to be
merged before updating any stable releases.

** Also affects: sosreport (Ubuntu Ff-series)
   Importance: Undecided
   Status: New

** Changed in: sosreport (Ubuntu Ff-series)
   Status: New => In Progress

** Changed in: sosreport (Ubuntu Ff-series)
   Importance: Undecided => Medium

** Changed in: sosreport (Ubuntu Ff-series)
 Assignee: (unassigned) => Eric Desrochers (slashd)

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1825010

Title:
  [sru] Update sosreport to 3.8

Status in sosreport package in Ubuntu:
  New
Status in sosreport source package in Trusty:
  Won't Fix
Status in sosreport source package in Xenial:
  New
Status in sosreport source package in Bionic:
  New
Status in sosreport source package in Cosmic:
  New
Status in sosreport source package in Disco:
  New
Status in sosreport source package in Eoan:
  In Progress
Status in sosreport source package in FF-Series:
  In Progress
Status in sosreport package in Debian:
  Fix Released

Bug description:
  [Impact]

  sosreport 3.8 has been released including further enhancements in core 
sosreport functionality:
  https://github.com/sosreport/sos/releases/tag/3.8

  It would be great to find sosreport v3.8 in supported stable releases,
  considering the fact that the release (especially LTSes) will be
  supported for a couple of years still:

  sosreport is widely use by Canonical support team to troubleshoot UA
  customer, other vendors and community users. These improvement will
  benefit all of them.

  sosreport 3.8 contains a number of enhancements, new features, and bug
  fixes. (See "Release Note" below)

  Just like we did for :
  - v3.5 (LP: #1734983)
  - v3.6 (LP: #1775195)

  [Test Case]

   * Install sosreport
   * Run sosreport
     - sosreport plugins are separated by subject (juju, MAAS, grub, zfs,...) 
and allow the capability to detect (based on file and package) if it exist 
and/or installed and then only run the necessary plugins based on the detection 
made.

  It creates a files under /tmp in the form of :
  /tmp/sosreport-sos37xenial-20190416160152.tar.xz # Actual sosreport
  /tmp/sosreport-sos37X-20190416160152.tar.xz.md5  # MD5 checksum

  Only accessible by root user:
  -rw--- 1 root root 1619000 Apr 16 16:07 
/tmp/sosreport-sos37X-20190416160152.tar.xz

  Ideally, since we can't test all plugins, it would be good to have a
  few testers using different HW, kernel, installation with a focus on
  juju, MAAS, LXD, canonical-livepatch, 

  Looking for any error on the terminal while sosreport is running or
  post-sosreport run in /tmp/sosreport-*/sos_logs/

  [Regression Potential]

   * Risk is low.

   * We did some dogfooding on sosreport, but we can't test each
  individual plugins and scenarios one by one, that would just be
  impossible but we have tested the ones we considered important and
  Ubuntu/Canonical related (canonical-livepatch, MAAS, juju, snappy),
  Openstack, mandatory file (logs, dmidecode, installed-debs and so on)

   * Plugin bug is an eventuality, but they are usually easy to fix and
  the impact will be isolated to the plugin itself or section of the
  plugin. If a plugin has a bug the worst that could happen is that this
  particular plugin won't (or partially) collect information.

  [Other information]

  * Release note:
  https://github.com/sosreport/sos/releases/tag/3.8

  * Plugins:
  sosreport contains in total: 284 plugins

  - 185 plugins that used UbuntuPlugin and/or DebianPlugin that might
  been triggered at sosreport run.

  -  97 plugins not using UbuntuPlugin and/or DebianPlugin. Basically
  useless in a Ubuntu context.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sosreport/+bug/1825010/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1843036] Re: [regression] SNMP missing disks in hrStorageTable

2019-09-11 Thread Eric Desrochers
** Changed in: net-snmp (Ubuntu Bionic)
   Status: Fix Released => Fix Committed

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1843036

Title:
  [regression] SNMP missing disks in hrStorageTable

Status in net-snmp package in Ubuntu:
  Fix Released
Status in net-snmp source package in Xenial:
  Fix Committed
Status in net-snmp source package in Bionic:
  Fix Committed
Status in net-snmp source package in Disco:
  Fix Committed
Status in net-snmp source package in Eoan:
  Fix Released

Bug description:
  [IMPACT]

  It has been brought to me the following:

  Some hosts have started to cause UNKNOWN return values in Nagios for
  checks on their disks. This is because these hosts are no longer
  reporting their disks as part of the SNMP table hrStorageTable
  (1.3.6.1.2.1.25.2.3.1 ) - only memory devices are being reported. The
  affected hosts that I have investigated received updates for SNMP:

  Upgrade package libsnmp-base 5.7.3+dfsg-1.8ubuntu3.1 to 
5.7.3+dfsg-1.8ubuntu3.2
  Upgrade package libsnmp30 5.7.3+dfsg-1.8ubuntu3.1 to 5.7.3+dfsg-1.8ubuntu3.2
  Upgrade package snmpd 5.7.3+dfsg-1.8ubuntu3.1 to 5.7.3+dfsg-1.8ubuntu3.2

  It seems likely that this package update is the cause.

  As debug info, you can see the difference between 2 nearly identical
  servers, one of which received the SNMP updates, and one which did
  not. You can see that the one without the update is returning disks in
  the SNMP output:

  # snmpwalk -v2c -cpublic arcprsmt01 1.3.6.1.2.1.25.2.3.1.3
  iso.3.6.1.2.1.25.2.3.1.3.1 = STRING: "Physical memory"
  iso.3.6.1.2.1.25.2.3.1.3.3 = STRING: "Virtual memory"
  iso.3.6.1.2.1.25.2.3.1.3.6 = STRING: "Memory buffers"
  iso.3.6.1.2.1.25.2.3.1.3.7 = STRING: "Cached memory"
  iso.3.6.1.2.1.25.2.3.1.3.8 = STRING: "Shared memory"
  iso.3.6.1.2.1.25.2.3.1.3.10 = STRING: "Swap space"
  iso.3.6.1.2.1.25.2.3.1.3.31 = STRING: "/"
  iso.3.6.1.2.1.25.2.3.1.3.37 = STRING: "/run"
  iso.3.6.1.2.1.25.2.3.1.3.39 = STRING: "/dev/shm"
  iso.3.6.1.2.1.25.2.3.1.3.40 = STRING: "/run/lock"
  iso.3.6.1.2.1.25.2.3.1.3.41 = STRING: "/sys/fs/cgroup"
  iso.3.6.1.2.1.25.2.3.1.3.67 = STRING: "/run/snapd/ns"
  iso.3.6.1.2.1.25.2.3.1.3.70 = STRING: 
"/var/lib/docker/containers/3cad3d36991b677c37b08b374a7bfeceddf36a6b6754edaa1ff687b00111a6b8/mounts/shm"
  iso.3.6.1.2.1.25.2.3.1.3.73 = STRING: 
"/var/lib/docker/containers/c605c4b76dea65d562ba024212a38e24fb710186c499187b6604478b7ff678e9/mounts/shm"
  iso.3.6.1.2.1.25.2.3.1.3.82 = STRING: "/run/user/2002"
  iso.3.6.1.2.1.25.2.3.1.3.253 = STRING: 
"/var/lib/docker/containers/dc74a157fbaaa284e0e5b8ca4afc88769bf625eb796d89a5d26f98a540cabf35/mounts/shm"
  iso.3.6.1.2.1.25.2.3.1.3.256 = STRING: 
"/var/lib/docker/containers/6ce6193433f9c1c95cccbfbbe08a3f3385bdbc4f2e3f0baa02d11baf3866dfd2/mounts/shm"
  iso.3.6.1.2.1.25.2.3.1.3.258 = STRING: "/run/user/1000"

  The other, which received SNMP updates, is returning only memory
  devices, such as swap and shmem:

  # snmpwalk -v2c -cpublic arcprsmt02 1.3.6.1.2.1.25.2.3.1.3
  iso.3.6.1.2.1.25.2.3.1.3.1 = STRING: "Physical memory"
  iso.3.6.1.2.1.25.2.3.1.3.3 = STRING: "Virtual memory"
  iso.3.6.1.2.1.25.2.3.1.3.6 = STRING: "Memory buffers"
  iso.3.6.1.2.1.25.2.3.1.3.7 = STRING: "Cached memory"
  iso.3.6.1.2.1.25.2.3.1.3.8 = STRING: "Shared memory"
  iso.3.6.1.2.1.25.2.3.1.3.10 = STRING: "Swap space"

  [Test Case]

  * Install snmp snmpd
  * Configure /etc/snmp/snmpd.conf by adding the following:
   view   systemonly  included   .1.3.6.1.2.1.25.2.3.1.3
  * Restart snmpd
  * Use snmpwalk:
   ** snmpwalk -v2c -cpublic localhost 1.3.6.1.2.1.25.2.3.1.3

  Expected behavior is to see the disk as follow:
  "
  iso.3.6.1.2.1.25.2.3.1.3.1 = STRING: "Physical memory"
  iso.3.6.1.2.1.25.2.3.1.3.3 = STRING: "Virtual memory"
  iso.3.6.1.2.1.25.2.3.1.3.6 = STRING: "Memory buffers"
  iso.3.6.1.2.1.25.2.3.1.3.7 = STRING: "Cached memory"
  iso.3.6.1.2.1.25.2.3.1.3.8 = STRING: "Shared memory"
  iso.3.6.1.2.1.25.2.3.1.3.10 = STRING: "Swap space"
  iso.3.6.1.2.1.25.2.3.1.3.31 = STRING: "/"
  iso.3.6.1.2.1.25.2.3.1.3.33 = STRING: "/dev"
  iso.3.6.1.2.1.25.2.3.1.3.45 = STRING: "/dev/lxd"
  iso.3.6.1.2.1.25.2.3.1.3.46 = STRING: "/dev/.lxd-mounts"
  iso.3.6.1.2.1.25.2.3.1.3.63 = STRING: "/proc/sys/kernel/random/boot_id"
  iso.3.6.1.2.1.25.2.3.1.3.66 = STRING: "/dev/shm"
  iso.3.6.1.2.1.25.2.3.1.3.67 = STRING: "/run"
  iso.3.6.1.2.1.25.2.3.1.3.68 = STRING: "/run/lock"
  iso.3.6.1.2.1.25.2.3.1.3.69 = STRING: "/sys/fs/cgroup"
  "

  [Potential Regression]
  The fix has been tested by various impacted users (+/- 10 different impacted 
users), and feedback were all positives (see comments below). 

  Note that this fix a regression introduced by:
  https://bugs.launchpad.net/bugs/1835818

  [Other information]

  # Upstream commit:
  
https://github.com/net-snmp/net-snmp/commit/71e487212bd65839e7454d

[Group.of.nepali.translators] [Bug 1825010] Re: [sru] Update sosreport to 3.8

2019-09-09 Thread Eric Desrochers
** No longer affects: sosreport (Debian)

** Bug watch added: Debian Bug tracker #939900
   https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=939900

** Also affects: sosreport (Debian) via
   https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=939900
   Importance: Unknown
   Status: Unknown

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1825010

Title:
  [sru] Update sosreport to 3.8

Status in sosreport package in Ubuntu:
  New
Status in sosreport source package in Trusty:
  Won't Fix
Status in sosreport source package in Xenial:
  New
Status in sosreport source package in Bionic:
  New
Status in sosreport source package in Cosmic:
  New
Status in sosreport source package in Disco:
  New
Status in sosreport source package in Eoan:
  In Progress
Status in sosreport package in Debian:
  Unknown

Bug description:
  [Impact]

  sosreport 3.8 has been released including further enhancements in core 
sosreport functionality:
  https://github.com/sosreport/sos/releases/tag/3.8

  It would be great to find sosreport v3.8 in supported stable releases,
  considering the fact that the release (especially LTSes) will be
  supported for a couple of years still:

  sosreport is widely use by Canonical support team to troubleshoot UA
  customer, other vendors and community users. These improvement will
  benefit all of them.

  sosreport 3.8 contains a number of enhancements, new features, and bug
  fixes. (See "Release Note" below)

  Just like we did for :
  - v3.5 (LP: #1734983)
  - v3.6 (LP: #1775195)

  [Test Case]

   * Install sosreport
   * Run sosreport
     - sosreport plugins are separated by subject (juju, MAAS, grub, zfs,...) 
and allow the capability to detect (based on file and package) if it exist 
and/or installed and then only run the necessary plugins based on the detection 
made.

  It creates a files under /tmp in the form of :
  /tmp/sosreport-sos37xenial-20190416160152.tar.xz # Actual sosreport
  /tmp/sosreport-sos37X-20190416160152.tar.xz.md5  # MD5 checksum

  Only accessible by root user:
  -rw--- 1 root root 1619000 Apr 16 16:07 
/tmp/sosreport-sos37X-20190416160152.tar.xz

  Ideally, since we can't test all plugins, it would be good to have a
  few testers using different HW, kernel, installation with a focus on
  juju, MAAS, LXD, canonical-livepatch, 

  Looking for any error on the terminal while sosreport is running or
  post-sosreport run in /tmp/sosreport-*/sos_logs/

  [Regression Potential]

   * Risk is low.

   * We did some dogfooding on sosreport, but we can't test each
  individual plugins and scenarios one by one, that would just be
  impossible but we have tested the ones we considered important and
  Ubuntu/Canonical related (canonical-livepatch, MAAS, juju, snappy),
  Openstack, mandatory file (logs, dmidecode, installed-debs and so on)

   * Plugin bug is an eventuality, but they are usually easy to fix and
  the impact will be isolated to the plugin itself or section of the
  plugin. If a plugin has a bug the worst that could happen is that this
  particular plugin won't (or partially) collect information.

  [Other information]

  * Release note:
  https://github.com/sosreport/sos/releases/tag/3.8

  * Plugins:
  sosreport contains in total: 284 plugins

  - 185 plugins that used UbuntuPlugin and/or DebianPlugin that might
  been triggered at sosreport run.

  -  97 plugins not using UbuntuPlugin and/or DebianPlugin. Basically
  useless in a Ubuntu context.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sosreport/+bug/1825010/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1842426] [NEW] xenial's chromium-browser test failure

2019-09-03 Thread Eric Desrochers
Public bug reported:

As requested by SRU verification team:

https://bugs.launchpad.net/ubuntu/+source/util-
linux/+bug/1589289/comments/33

As for xenial's chromium-browser test failures - could you please file a
bug about the failing architectures? I would then include the bug number
in the hint. This way we won't forget about the test issues.


# pending SRU report:
Regression in autopkgtest for chromium-browser (arm64): test log
 http://autopkgtest.ubuntu.com/packages/c/chromium-browser/xenial/arm64
Regression in autopkgtest for chromium-browser (i386): test log
 http://autopkgtest.ubuntu.com/packages/c/chromium-browser/xenial/i386
Regression in autopkgtest for chromium-browser (amd64): test log
 http://autopkgtest.ubuntu.com/packages/c/chromium-browser/xenial/amd64

The above are recurrent pattern of autopkgtest failures.

** Affects: chromium-browser (Ubuntu)
 Importance: Undecided
 Status: Fix Released

** Affects: chromium-browser (Ubuntu Xenial)
 Importance: Undecided
 Status: New

** Also affects: chromium-browser (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: chromium-browser (Ubuntu)
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1842426

Title:
  xenial's chromium-browser test failure

Status in chromium-browser package in Ubuntu:
  Fix Released
Status in chromium-browser source package in Xenial:
  New

Bug description:
  As requested by SRU verification team:

  https://bugs.launchpad.net/ubuntu/+source/util-
  linux/+bug/1589289/comments/33

  As for xenial's chromium-browser test failures - could you please file
  a bug about the failing architectures? I would then include the bug
  number in the hint. This way we won't forget about the test issues.

  
  # pending SRU report:
  Regression in autopkgtest for chromium-browser (arm64): test log
   http://autopkgtest.ubuntu.com/packages/c/chromium-browser/xenial/arm64
  Regression in autopkgtest for chromium-browser (i386): test log
   http://autopkgtest.ubuntu.com/packages/c/chromium-browser/xenial/i386
  Regression in autopkgtest for chromium-browser (amd64): test log
   http://autopkgtest.ubuntu.com/packages/c/chromium-browser/xenial/amd64

  The above are recurrent pattern of autopkgtest failures.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/1842426/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1840091] Re: ubuntu-advantage enable-esm should ensure correct package requirements are met

2019-08-28 Thread Eric Desrochers
Base on the discussion with vorlon, I'll mark X/B/E as 'Won't Fix' for
now.

[12:27:52]  rbasak: there's a complete rewrite of the client that is 
going to be landed in trusty-updates, definitely before xenial goes ESM.  It's 
been delayed for polish but is definitely happening
[12:28:07]  because the ESM service implementation is changing and the 
old client will not work with ESM for xenial
[12:28:19]  so I'm confident in this case :)

[12:31:15] rbasak, vorlon, so it's safe to say that we can postpone the 
fix until the new client is released ? and re-evaluate by then ?
[12:31:24] for x and late
[12:31:36]  yes

** Changed in: ubuntu-advantage-tools (Ubuntu Bionic)
   Status: In Progress => Won't Fix

** Changed in: ubuntu-advantage-tools (Ubuntu Eoan)
   Status: In Progress => Won't Fix

** Changed in: ubuntu-advantage-tools (Ubuntu Xenial)
   Status: In Progress => Won't Fix

** Changed in: ubuntu-advantage-tools (Ubuntu Eoan)
 Assignee: Erlon R. Cruz (sombrafam) => (unassigned)

** Changed in: ubuntu-advantage-tools (Ubuntu Bionic)
 Assignee: Erlon R. Cruz (sombrafam) => (unassigned)

** Changed in: ubuntu-advantage-tools (Ubuntu Xenial)
 Assignee: Erlon R. Cruz (sombrafam) => (unassigned)

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1840091

Title:
  ubuntu-advantage enable-esm should ensure correct package requirements
  are met

Status in ubuntu-advantage-tools package in Ubuntu:
  Won't Fix
Status in ubuntu-advantage-tools source package in Trusty:
  Fix Committed
Status in ubuntu-advantage-tools source package in Xenial:
  Won't Fix
Status in ubuntu-advantage-tools source package in Bionic:
  Won't Fix
Status in ubuntu-advantage-tools source package in Eoan:
  Won't Fix

Bug description:
  [Impact]

  To use ESM for 14.04 you must install 1.0.1ubuntu2.23 of apt apt-
  transport-https apt-utils libapt-inst1.5 libapt-pkg4.12

  These should be checked and warn/error/install the correct packages
  when running enable-esm

  [Test Case]

  * Deploy trusty container with a "apt" package version lower than version: 
"1.0.1ubuntu2.23"
   ** lxc launch ubuntu:d57cf522816f 
  For instance image iD "d57cf522816f" contains apt : 1.0.1ubuntu2.17
  * lxc exec  bash
  * Install ubuntu-advantage-tools
  * ubuntu-advantage enable-esm 
  * sudo apt-get update
  * sudo apt-get upgrade

  Err https://esm.ubuntu.com/ubuntu/ trusty-security/main bash amd64 
4.3-7ubuntu1.8+esm1
  HttpError401
  Err https://esm.ubuntu.com/ubuntu/ trusty-security/main bzip2 amd64 
1.0.6-5ubuntu0.1~esm2
  ...
  E: Failed to fetch 
https://esm.ubuntu.com/ubuntu/pool/main/a/apport/apport_2.14.1-0ubuntu3.29+esm1_all.deb
  HttpError401
  E: Failed to fetch 
https://esm.ubuntu.com/ubuntu/pool/main/g/glib2.0/libglib2.0-data_2.40.2-0ubuntu1.1+esm3_all.deb
  HttpError401
  E: Failed to fetch 
https://esm.ubuntu.com/ubuntu/pool/main/p/python-urllib3/python-urllib3_1.7.1-1ubuntu4.1+esm1_all.deb
  HttpError401
  E: Failed to fetch 
https://esm.ubuntu.com/ubuntu/pool/main/s/screen/screen_4.1.0~20120320gitdb59704-9ubuntu0.1~esm1_amd64.deb
  HttpError401
  E: Unable to fetch some archives, maybe run apt-get update or try with 
--fix-missing?

  Expected behaviour:
  Get:3 https://esm.ubuntu.com/ubuntu/ trusty-security/main bash amd64 
4.3-7ubuntu1.8+esm1 [575 kB]
  Get:6 https://esm.ubuntu.com/ubuntu/ trusty-security/main bzip2 amd64 
1.0.6-5ubuntu0.1~esm2 [34.6 kB]
  ..

  If user installs u-a-tools and do not upgrade apt, then complains are
  that it does not work all the time as expected (see above ^)

  Would be better to add some Depends: (as describe by juliank) to avoid
  users updating the tool but keeping an older version of apt that may
  introduce esm upgrade problem/failure.

  [Potential Regression]

  * One situation that Andreas brought up that is worth mentioning here,
  is  that apparently some customer may have intentionally disabled
  "trusty-updates". If it's the case, then one would need to enable
  "trusty-updates" back temporary in order to upgrade the "ubuntu-
  advantage-tools" package and it's Dependencies (apt derived binary
  packages)

  * We simply instruct u-a-tools to update apt (and its derived binary
  pkg) to a more recent version to avoid problems.

  * apt in Trusty is unlikely to change now. There may be other ESM
  uploads here and there in the future, but Trusty itself is frozen now.

  
  [Other Info]

  * Fix has been proposed and agreed by foundation team.

  * rmadison:
   apt | 1.0.1ubuntu2| trusty
   apt | 1.0.1ubuntu2.19 | trusty-security
   apt | 1.0.1ubuntu2.23 | trusty-updates

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-advantage-tools/+bug/1840091/+subscriptions

___
Mailing list: https:

[Group.of.nepali.translators] [Bug 1840091] Re: ubuntu-advantage enable-esm should ensure correct package requirements are met

2019-08-28 Thread Eric Desrochers
** Changed in: ubuntu-advantage-tools (Ubuntu Eoan)
   Status: Won't Fix => In Progress

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1840091

Title:
  ubuntu-advantage enable-esm should ensure correct package requirements
  are met

Status in ubuntu-advantage-tools package in Ubuntu:
  Won't Fix
Status in ubuntu-advantage-tools source package in Trusty:
  Fix Committed
Status in ubuntu-advantage-tools source package in Xenial:
  In Progress
Status in ubuntu-advantage-tools source package in Bionic:
  In Progress
Status in ubuntu-advantage-tools source package in Eoan:
  In Progress

Bug description:
  [Impact]

  To use ESM for 14.04 you must install 1.0.1ubuntu2.23 of apt apt-
  transport-https apt-utils libapt-inst1.5 libapt-pkg4.12

  These should be checked and warn/error/install the correct packages
  when running enable-esm

  [Test Case]

  * Deploy trusty container with a "apt" package version lower than version: 
"1.0.1ubuntu2.23"
   ** lxc launch ubuntu:d57cf522816f 
  For instance image iD "d57cf522816f" contains apt : 1.0.1ubuntu2.17
  * lxc exec  bash
  * Install ubuntu-advantage-tools
  * ubuntu-advantage enable-esm 
  * sudo apt-get update
  * sudo apt-get upgrade

  Err https://esm.ubuntu.com/ubuntu/ trusty-security/main bash amd64 
4.3-7ubuntu1.8+esm1
  HttpError401
  Err https://esm.ubuntu.com/ubuntu/ trusty-security/main bzip2 amd64 
1.0.6-5ubuntu0.1~esm2
  ...
  E: Failed to fetch 
https://esm.ubuntu.com/ubuntu/pool/main/a/apport/apport_2.14.1-0ubuntu3.29+esm1_all.deb
  HttpError401
  E: Failed to fetch 
https://esm.ubuntu.com/ubuntu/pool/main/g/glib2.0/libglib2.0-data_2.40.2-0ubuntu1.1+esm3_all.deb
  HttpError401
  E: Failed to fetch 
https://esm.ubuntu.com/ubuntu/pool/main/p/python-urllib3/python-urllib3_1.7.1-1ubuntu4.1+esm1_all.deb
  HttpError401
  E: Failed to fetch 
https://esm.ubuntu.com/ubuntu/pool/main/s/screen/screen_4.1.0~20120320gitdb59704-9ubuntu0.1~esm1_amd64.deb
  HttpError401
  E: Unable to fetch some archives, maybe run apt-get update or try with 
--fix-missing?

  Expected behaviour:
  Get:3 https://esm.ubuntu.com/ubuntu/ trusty-security/main bash amd64 
4.3-7ubuntu1.8+esm1 [575 kB]
  Get:6 https://esm.ubuntu.com/ubuntu/ trusty-security/main bzip2 amd64 
1.0.6-5ubuntu0.1~esm2 [34.6 kB]
  ..

  If user installs u-a-tools and do not upgrade apt, then complains are
  that it does not work all the time as expected (see above ^)

  Would be better to add some Depends: (as describe by juliank) to avoid
  users updating the tool but keeping an older version of apt that may
  introduce esm upgrade problem/failure.

  [Potential Regression]

  * One situation that Andreas brought up that is worth mentioning here,
  is  that apparently some customer may have intentionally disabled
  "trusty-updates". If it's the case, then one would need to enable
  "trusty-updates" back temporary in order to upgrade the "ubuntu-
  advantage-tools" package and it's Dependencies (apt derived binary
  packages)

  * We simply instruct u-a-tools to update apt (and its derived binary
  pkg) to a more recent version to avoid problems.

  * apt in Trusty is unlikely to change now. There may be other ESM
  uploads here and there in the future, but Trusty itself is frozen now.

  
  [Other Info]

  * Fix has been proposed and agreed by foundation team.

  * rmadison:
   apt | 1.0.1ubuntu2| trusty
   apt | 1.0.1ubuntu2.19 | trusty-security
   apt | 1.0.1ubuntu2.23 | trusty-updates

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-advantage-tools/+bug/1840091/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1840091] Re: ubuntu-advantage enable-esm should ensure correct package requirements are met

2019-08-28 Thread Eric Desrochers
Might be a MUST to have it also in future release before their ESM
period start. For that reason, I'm targeting the other LTS version.

** Also affects: ubuntu-advantage-tools (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Also affects: ubuntu-advantage-tools (Ubuntu Eoan)
   Importance: High
   Status: Won't Fix

** Also affects: ubuntu-advantage-tools (Ubuntu Bionic)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1840091

Title:
  ubuntu-advantage enable-esm should ensure correct package requirements
  are met

Status in ubuntu-advantage-tools package in Ubuntu:
  Won't Fix
Status in ubuntu-advantage-tools source package in Trusty:
  Fix Committed
Status in ubuntu-advantage-tools source package in Xenial:
  In Progress
Status in ubuntu-advantage-tools source package in Bionic:
  In Progress
Status in ubuntu-advantage-tools source package in Eoan:
  In Progress

Bug description:
  [Impact]

  To use ESM for 14.04 you must install 1.0.1ubuntu2.23 of apt apt-
  transport-https apt-utils libapt-inst1.5 libapt-pkg4.12

  These should be checked and warn/error/install the correct packages
  when running enable-esm

  [Test Case]

  * Deploy trusty container with a "apt" package version lower than version: 
"1.0.1ubuntu2.23"
   ** lxc launch ubuntu:d57cf522816f 
  For instance image iD "d57cf522816f" contains apt : 1.0.1ubuntu2.17
  * lxc exec  bash
  * Install ubuntu-advantage-tools
  * ubuntu-advantage enable-esm 
  * sudo apt-get update
  * sudo apt-get upgrade

  Err https://esm.ubuntu.com/ubuntu/ trusty-security/main bash amd64 
4.3-7ubuntu1.8+esm1
  HttpError401
  Err https://esm.ubuntu.com/ubuntu/ trusty-security/main bzip2 amd64 
1.0.6-5ubuntu0.1~esm2
  ...
  E: Failed to fetch 
https://esm.ubuntu.com/ubuntu/pool/main/a/apport/apport_2.14.1-0ubuntu3.29+esm1_all.deb
  HttpError401
  E: Failed to fetch 
https://esm.ubuntu.com/ubuntu/pool/main/g/glib2.0/libglib2.0-data_2.40.2-0ubuntu1.1+esm3_all.deb
  HttpError401
  E: Failed to fetch 
https://esm.ubuntu.com/ubuntu/pool/main/p/python-urllib3/python-urllib3_1.7.1-1ubuntu4.1+esm1_all.deb
  HttpError401
  E: Failed to fetch 
https://esm.ubuntu.com/ubuntu/pool/main/s/screen/screen_4.1.0~20120320gitdb59704-9ubuntu0.1~esm1_amd64.deb
  HttpError401
  E: Unable to fetch some archives, maybe run apt-get update or try with 
--fix-missing?

  Expected behaviour:
  Get:3 https://esm.ubuntu.com/ubuntu/ trusty-security/main bash amd64 
4.3-7ubuntu1.8+esm1 [575 kB]
  Get:6 https://esm.ubuntu.com/ubuntu/ trusty-security/main bzip2 amd64 
1.0.6-5ubuntu0.1~esm2 [34.6 kB]
  ..

  If user installs u-a-tools and do not upgrade apt, then complains are
  that it does not work all the time as expected (see above ^)

  Would be better to add some Depends: (as describe by juliank) to avoid
  users updating the tool but keeping an older version of apt that may
  introduce esm upgrade problem/failure.

  [Potential Regression]

  * One situation that Andreas brought up that is worth mentioning here,
  is  that apparently some customer may have intentionally disabled
  "trusty-updates". If it's the case, then one would need to enable
  "trusty-updates" back temporary in order to upgrade the "ubuntu-
  advantage-tools" package and it's Dependencies (apt derived binary
  packages)

  * We simply instruct u-a-tools to update apt (and its derived binary
  pkg) to a more recent version to avoid problems.

  * apt in Trusty is unlikely to change now. There may be other ESM
  uploads here and there in the future, but Trusty itself is frozen now.

  
  [Other Info]

  * Fix has been proposed and agreed by foundation team.

  * rmadison:
   apt | 1.0.1ubuntu2| trusty
   apt | 1.0.1ubuntu2.19 | trusty-security
   apt | 1.0.1ubuntu2.23 | trusty-updates

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-advantage-tools/+bug/1840091/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1828596] Re: kdump fails when crash is triggered after DLPAR cpu add operation

2019-08-27 Thread Eric Desrochers
** Changed in: makedumpfile (Ubuntu Disco)
   Status: New => In Progress

** Changed in: makedumpfile (Ubuntu Disco)
 Assignee: (unassigned) => Thadeu Lima de Souza Cascardo (cascardo)

** Changed in: makedumpfile (Ubuntu Bionic)
   Status: New => In Progress

** Changed in: makedumpfile (Ubuntu Bionic)
 Assignee: (unassigned) => Thadeu Lima de Souza Cascardo (cascardo)

** Changed in: makedumpfile (Ubuntu Cosmic)
   Status: New => Won't Fix

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1828596

Title:
  kdump fails when crash is triggered after DLPAR cpu add operation

Status in The Ubuntu-power-systems project:
  Triaged
Status in kexec-tools package in Ubuntu:
  Invalid
Status in makedumpfile package in Ubuntu:
  Fix Released
Status in kexec-tools source package in Xenial:
  New
Status in makedumpfile source package in Xenial:
  New
Status in kexec-tools source package in Bionic:
  New
Status in makedumpfile source package in Bionic:
  In Progress
Status in kexec-tools source package in Cosmic:
  New
Status in makedumpfile source package in Cosmic:
  Won't Fix
Status in kexec-tools source package in Disco:
  New
Status in makedumpfile source package in Disco:
  In Progress
Status in kexec-tools source package in Eoan:
  Invalid
Status in makedumpfile source package in Eoan:
  Fix Released

Bug description:
  [Impact]
  After a CPU add/hotplug operation on Power systems, kdump will fail after a 
crash. The kdump kernel needs to be reloaded after a CPU add/hotplug.

  [Test case]
  Do CPU add/hotplug, trigger a crash, and check for a successful kdump.

  [Regression potential]
  Multiple reloads caused by multiple sequential CPU adds may cause spurious 
log results, and systemd may fail to properly reload the kdump kernel. This has 
been handled by resetting the failure counter when doing such reloads.

  == Comment: #0 - Hari Krishna Bathini - 2019-05-10 05:55:40 ==
  ---Problem Description---
  kdump fails when crash is triggered after CPU add operation.

  Machine Type = na

  ---System Hang---
   Crashed in early boot process of kdump kernel after crash

  Had to issue system reset from HMC to reclaim

  ---Steps to Reproduce---
   1. Configure kdump.
  2. Add cpu from HMC.
  3. Trigger crash.
  4. Machine hangs after crash as below:

  ---
  [169250.213166] IPI complete
  [169250.234331] kexec: Starting switchover sequence.
  I'm in purgatory
   --- STRUCK HERE ---

  ---uname output---
  na

  ---Debugger---
  A debugger is not configured

  == Comment: #1 - Hari Krishna Bathini  - 2019-05-10 05:56:46 ==
  The problem is, kexec udev rule to restart kdump-tools service - when a core 
is added,
  is not being triggered. The old DT created by kexec (before the core is added)
  is being used by KDump Kernel. So, when system crashes on a thread from
  the added core(s), KDump kernel is failing to get the 'boot_cpuid' and
  eventually failing to boot..

  == Comment: #2 - Hari Krishna Bathini - 2019-05-10 06:02:27 ==
  The udev rule when CPU is added is not triggered because ppc64 does not
  eject add/remove event when a CPU is hot added/removed. It only ejects
  online/offline event to user space when CPU is hot added/removed.

  So, the below udev rules are never triggered when needed:

  SUBSYSTEM=="cpu", ACTION=="add", PROGRAM="/bin/systemctl try-restart 
kdump-tools.service"
  SUBSYSTEM=="cpu", ACTION=="remove", PROGRAM="/bin/systemctl try-restart 
kdump-tools.service"

  Also, with how CPU hot add & remove are handled in ppc64, a udev trigger
  to reload kdump after CPU is hot removed is NOT necessary. So, fix the CPU
  hot add case by updating the udev rule and drop the udev rule meant for CPU
  hot remove in the kdump udev rules file:

  SUBSYSTEM=="cpu", ACTION=="online", PROGRAM="/bin/systemctl try-
  restart kdump-tools.service"

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-power-systems/+bug/1828596/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1589289] Re: fstrim: cannot open /dev/.lxd-mounts: Permission denied

2019-08-21 Thread Eric Desrochers
** Bug watch added: Debian Bug tracker #935326
   https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=935326

** Also affects: util-linux (Debian) via
   https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=935326
   Importance: Unknown
   Status: Unknown

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1589289

Title:
  fstrim: cannot open /dev/.lxd-mounts: Permission denied

Status in util-linux package in Ubuntu:
  In Progress
Status in util-linux source package in Xenial:
  In Progress
Status in util-linux source package in Bionic:
  In Progress
Status in util-linux source package in Disco:
  In Progress
Status in util-linux package in Debian:
  Unknown

Bug description:
  [Impact]
  fstrim weekly cronjob output in an unprivileged LXD container:

  /etc/cron.weekly/fstrim:
  fstrim: cannot open /dev/.lxd-mounts: Permission denied
  fstrim: /dev/fuse: not a directory
  fstrim: /dev/lxd: FITRIM ioctl failed: Operation not permitted

  There is a github issue:

  https://github.com/lxc/lxd/issues/2030

  The outcome is that it's purely an fstrim misbehaviour, it could be
  smarter.

  Stephane Graber comment:

  As all of this is handled by the kernel, there isn't anything we can
  do about it in LXD.

  I think fstrim should be made slightly more clever:

  * Don't run on bind-mounts (you can detect bind-mounts by parsing 
/proc/self/mountinfo instead of /proc/mounts)
  * Maybe not be as noisy on expected errors like EACCES, EPERM and ENOENT, 
only log actual failures which would likely be EINVAL or memory related errors.

  ProblemType: Bug
  DistroRelease: Ubuntu 16.04
  Package: util-linux 2.27.1-6ubuntu3
  ProcVersionSignature: Ubuntu 4.4.0-21.37-generic 4.4.6
  Uname: Linux 4.4.0-21-generic x86_64
  ApportVersion: 2.20.1-0ubuntu2.1
  Architecture: amd64
  Date: Sun Jun  5 19:49:04 2016
  ProcEnviron:
   LANGUAGE=en_US:en
   TERM=xterm
   PATH=(custom, no user)
   LANG=en_US.UTF-8
   SHELL=/bin/bash
  SourcePackage: util-linux
  UpgradeStatus: No upgrade log present (probably fresh install)

  [Test Case]
  * Ubuntu lxd container
  * Wait for the scheduled fstrim run (X: cronjob, B and late: systemd timer)
  * fstrim will run and report errors "Operation not permitted" "Permission 
denied", ...

  Container shouldn't run fstrim, it should only be run at host level.

  [Potential Regression]

  None, the change will only block fstrim to be automatically run at
  scheduled time. One can still run fstrim on a container manually, even
  if there is no purpose of doing that.

  Xenial uses the cronjob approach /etc/cron.weekly/fstrim
  Bionic and late switched to a systemd timer.

  2 differents fixes (one for X, and one for B and late) will be needed,
  but they'll do same thing, which prevent fstrim to automatically run
  if inside a container both fixes using systemd-virt-detect.

  [Other Informations]

  * The systemd timer change upstream PR:
  https://github.com/karelzak/util-linux/pull/841

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/util-linux/+bug/1589289/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1839366] Re: LVM: fix missing dash

2019-08-08 Thread Eric Desrochers
** Changed in: resource-agents (Ubuntu Xenial)
   Status: In Progress => Invalid

** Description changed:

  [Impact]
  lvm-tag.sh line 150 is missing a dash in front of 'aly' flags. This is 
causing lvm resource to fail during start.
  
  heartbeat/lvm-tag.sh
  vgchange_activate_options="aly --config 
activation{volume_list=[\"@${OUR_TAG}\"]}"
  
  is missing a - in front of aly. The - can be seen in the deactivate
  line:
  
  vgchange_deactivate_options="-aln"
  
  Upstream fix:
  
  https://github.com/ClusterLabs/resource-agents/pull/1190/files
  
  Version: 1:4.1.0~rc1-1ubuntu1.1
  
  [Test Case]
  
  It's the ocf:heartbeat:LVM resource that fails here (because the flags
  it passes to vgchange to activate the VG are incorrect). It manages an
  Linux Volume Manager volume (LVM) as an HA resource.
  
  [Potential Regression]
  
  I don't expect regression, the missing "-" need to be there to properly
  perform the activation. Once the activation will work using the "-",
  it's not impossible that one finds other corner situation due to the
  fact that the activation now working, but IMHO they'll be consider bugs,
  not regression to this SRU.
  
  [Other Infos]
  
  * Redhat Bug:
  https://bugzilla.redhat.com/show_bug.cgi?id=1612828
  
  * Upstream fix:
  
https://github.com/ClusterLabs/resource-agents/commit/5a664525a20d3d5094912322be4faac668e4920e
  
  $ git describe --contains 5a664525a20d3d5094912322be4faac668e4920e
  v4.2.0rc1~42^2
  
  $ rmadison resource-agents
-  => resource-agents | 1:3.9.7-1ubuntu1.1   | xenial-updates
+  resource-agents | 1:3.9.7-1ubuntu1.1   | xenial-updates # lvm-tag.sh 
doesn't exist yet.
   => resource-agents | 1:4.1.0~rc1-1ubuntu1.1   | bionic-updates
   resource-agents | 1:4.2.0-1ubuntu1.1   | disco-updates
   resource-agents | 1:4.2.0-1ubuntu2 | eoan

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1839366

Title:
  LVM: fix missing dash

Status in resource-agents package in Ubuntu:
  Fix Released
Status in resource-agents source package in Xenial:
  Invalid
Status in resource-agents source package in Bionic:
  In Progress

Bug description:
  [Impact]
  lvm-tag.sh line 150 is missing a dash in front of 'aly' flags. This is 
causing lvm resource to fail during start.

  heartbeat/lvm-tag.sh
  vgchange_activate_options="aly --config 
activation{volume_list=[\"@${OUR_TAG}\"]}"

  is missing a - in front of aly. The - can be seen in the deactivate
  line:

  vgchange_deactivate_options="-aln"

  Upstream fix:

  https://github.com/ClusterLabs/resource-agents/pull/1190/files

  Version: 1:4.1.0~rc1-1ubuntu1.1

  [Test Case]

  It's the ocf:heartbeat:LVM resource that fails here (because the flags
  it passes to vgchange to activate the VG are incorrect). It manages an
  Linux Volume Manager volume (LVM) as an HA resource.

  [Potential Regression]

  I don't expect regression, the missing "-" need to be there to
  properly perform the activation. Once the activation will work using
  the "-", it's not impossible that one finds other corner situation due
  to the fact that the activation now working, but IMHO they'll be
  consider bugs, not regression to this SRU.

  [Other Infos]

  * Redhat Bug:
  https://bugzilla.redhat.com/show_bug.cgi?id=1612828

  * Upstream fix:
  
https://github.com/ClusterLabs/resource-agents/commit/5a664525a20d3d5094912322be4faac668e4920e

  $ git describe --contains 5a664525a20d3d5094912322be4faac668e4920e
  v4.2.0rc1~42^2

  $ rmadison resource-agents
   resource-agents | 1:3.9.7-1ubuntu1.1   | xenial-updates # lvm-tag.sh 
doesn't exist yet.
   => resource-agents | 1:4.1.0~rc1-1ubuntu1.1   | bionic-updates
   resource-agents | 1:4.2.0-1ubuntu1.1   | disco-updates
   resource-agents | 1:4.2.0-1ubuntu2 | eoan

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/resource-agents/+bug/1839366/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1839366] Re: LVM: fix missing dash

2019-08-07 Thread Eric Desrochers
** Tags added: sts

** Description changed:

  heartbeat/lvm-tag.sh
  vgchange_activate_options="aly --config 
activation{volume_list=[\"@${OUR_TAG}\"]}"
  
  is missing a - in front of aly. The - can be seen in the deactivate
  line:
  
  vgchange_deactivate_options="-aln"
  
  Upstream fix:
  
  https://github.com/ClusterLabs/resource-agents/pull/1190/files
  
  Version: 1:4.1.0~rc1-1ubuntu1.1
+ 
+ [Other Infos]
+ 
+ * Upstream fix: https://github.com/ClusterLabs/resource-
+ agents/commit/5a664525a20d3d5094912322be4faac668e4920e
+ 
+ $ git describe --contains 5a664525a20d3d5094912322be4faac668e4920e
+ v4.2.0rc1~42^2
+ 
+ $ rmadison resource-agents  
+  => resource-agents | 1:3.9.7-1ubuntu1.1   | xenial-updates  
+  => resource-agents | 1:4.1.0~rc1-1ubuntu1.1   | bionic-updates   
+  resource-agents | 1:4.2.0-1ubuntu1.1   | disco-updates  
+  resource-agents | 1:4.2.0-1ubuntu2 | eoan

** Also affects: resource-agents (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Also affects: resource-agents (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: resource-agents (Ubuntu)
   Status: New => Fix Released

** Changed in: resource-agents (Ubuntu Bionic)
   Status: New => In Progress

** Changed in: resource-agents (Ubuntu Bionic)
   Importance: Undecided => Medium

** Changed in: resource-agents (Ubuntu Bionic)
 Assignee: (unassigned) => Eric Desrochers (slashd)

** Changed in: resource-agents (Ubuntu Xenial)
 Assignee: (unassigned) => Eric Desrochers (slashd)

** Changed in: resource-agents (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: resource-agents (Ubuntu Xenial)
   Status: New => In Progress

** Description changed:

  heartbeat/lvm-tag.sh
  vgchange_activate_options="aly --config 
activation{volume_list=[\"@${OUR_TAG}\"]}"
  
  is missing a - in front of aly. The - can be seen in the deactivate
  line:
  
  vgchange_deactivate_options="-aln"
  
  Upstream fix:
  
  https://github.com/ClusterLabs/resource-agents/pull/1190/files
  
  Version: 1:4.1.0~rc1-1ubuntu1.1
  
  [Other Infos]
  
- * Upstream fix: https://github.com/ClusterLabs/resource-
- agents/commit/5a664525a20d3d5094912322be4faac668e4920e
+ * Redhat Bug:
+ https://bugzilla.redhat.com/show_bug.cgi?id=1612828
+ 
+ * Upstream fix: 
+ 
https://github.com/ClusterLabs/resource-agents/commit/5a664525a20d3d5094912322be4faac668e4920e
  
  $ git describe --contains 5a664525a20d3d5094912322be4faac668e4920e
  v4.2.0rc1~42^2
  
- $ rmadison resource-agents  
-  => resource-agents | 1:3.9.7-1ubuntu1.1   | xenial-updates  
-  => resource-agents | 1:4.1.0~rc1-1ubuntu1.1   | bionic-updates   
-  resource-agents | 1:4.2.0-1ubuntu1.1   | disco-updates  
-  resource-agents | 1:4.2.0-1ubuntu2 | eoan
+ $ rmadison resource-agents
+  => resource-agents | 1:3.9.7-1ubuntu1.1   | xenial-updates
+  => resource-agents | 1:4.1.0~rc1-1ubuntu1.1   | bionic-updates
+  resource-agents | 1:4.2.0-1ubuntu1.1   | disco-updates
+  resource-agents | 1:4.2.0-1ubuntu2 | eoan

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1839366

Title:
  LVM: fix missing dash

Status in resource-agents package in Ubuntu:
  Fix Released
Status in resource-agents source package in Xenial:
  In Progress
Status in resource-agents source package in Bionic:
  In Progress

Bug description:
  [Impact]
  lvm-tag.sh line 150 is missing a dash in front of 'aly' flags. This is 
causing lvm resource to fail during start:

  heartbeat/lvm-tag.sh
  vgchange_activate_options="aly --config 
activation{volume_list=[\"@${OUR_TAG}\"]}"

  is missing a - in front of aly. The - can be seen in the deactivate
  line:

  vgchange_deactivate_options="-aln"

  Upstream fix:

  https://github.com/ClusterLabs/resource-agents/pull/1190/files

  Version: 1:4.1.0~rc1-1ubuntu1.1

  [Test Case]

  [Potential Regression]

  
  [Other Infos]

  * Redhat Bug:
  https://bugzilla.redhat.com/show_bug.cgi?id=1612828

  * Upstream fix:
  
https://github.com/ClusterLabs/resource-agents/commit/5a664525a20d3d5094912322be4faac668e4920e

  $ git describe --contains 5a664525a20d3d5094912322be4faac668e4920e
  v4.2.0rc1~42^2

  $ rmadison resource-agents
   => resource-agents | 1:3.9.7-1ubuntu1.1   | xenial-updates
   => resource-agents | 1:4.1.0~rc1-1ubuntu1.1   | bionic-updates
   resource-agents | 1:4.2.0-1ubuntu1.1   | disco-updates
   resource-agents | 1:4.2.0-1ubuntu2 | eoan

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/resource-agents/+bug

[Group.of.nepali.translators] [Bug 1835818] Re: snmpd causes autofs mount points to be mounted on service start/restart

2019-07-31 Thread Eric Desrochers
** Changed in: net-snmp (Ubuntu Cosmic)
   Status: In Progress => Won't Fix

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1835818

Title:
  snmpd causes autofs mount points to be mounted on service
  start/restart

Status in net-snmp package in Ubuntu:
  In Progress
Status in net-snmp source package in Xenial:
  In Progress
Status in net-snmp source package in Bionic:
  In Progress
Status in net-snmp source package in Cosmic:
  Won't Fix
Status in net-snmp source package in Disco:
  In Progress
Status in net-snmp source package in Eoan:
  In Progress

Bug description:
  [Impact]

  Autofs direct map triggers are visible in /etc/mtab.
  On boot, when snmpd starts, it iterates over the entries in /etc/mtab and 
performs statfs() on them.
  This trigger automount to mount autofs mounts even if the user does not 
explicitly access them.

  However this happens only if autofs service is started before snmpd.
  If snmpd stars first /etc/mtab is not yet populated with autofs mounts and 
therefore
  are not mounted.

  When there a few autofs mount points the impact is insignificant.
  However when there are thousands of them, this causes unnecessary overhead on 
operations
  such as df.
  This also delays the system shutdown time since everything needs to be 
unmounted.

  [Test Case]

  *** Test Case 1 - During boot:

  The user that brought this issue to our attention would observe all autofs 
mounts
  be mounted at boot, because in their environment autofs would start first.

  In my environment snmpd starts first so to reproduce I had to add a small 
delay in
  snmpd init script.

  In /etc/init.d/snmp :
  @@ -36,6 +36,8 @@ cd /
   
   case "$1" in
 start)
  +# Delay snmp start
  +sleep 2
   log_daemon_msg "Starting SNMP services:"
   # remove old symlink with previous version
   if [ -L /var/run/agentx ]; then


  $cat /etc/auto.master
  /- /etc/auto.nfs --timeout=30

  $cat /etc/auto.nfs
  /home/test1 -fstype=nfs,hard,intr,nosuid,no-subtree-check,tcp :/srv/export/test1
  /home/test2 -fstype=nfs,hard,intr,nosuid,no-subtree-check,tcp :/srv/export/test2

  Reboot vm, syslog entries :

  # Autofs starts
  Jul 11 11:04:16 xenial-vm3 autofs[1295]:  * Starting automount...
  Jul 11 11:04:16 xenial-vm3 automount[1357]: Starting automounter version 
5.1.1, master map /etc/auto.master
  Jul 11 11:04:16 xenial-vm3 automount[1357]: using kernel protocol version 5.02
  # Mount triggers, now visible in mtab
  Jul 11 11:04:16 xenial-vm3 automount[1357]: mounted direct on /home/test1 
with timeout 300, freq 75 seconds
  Jul 11 11:04:16 xenial-vm3 automount[1357]: mounted direct on /home/test2 
with timeout 300, freq 75 seconds
  Jul 11 11:04:16 xenial-vm3 autofs[1295]:...done.
  ...
  # SNMP starts
  Jul 11 11:04:18 xenial-vm3 snmpd[1294]:  * Starting SNMP services:
  Jul 11 11:04:18 xenial-vm3 systemd[1]: proc-sys-fs-binfmt_misc.automount: Got 
automount request for /proc/sys/fs/binfmt_misc, triggered by 1394 (snmpd)
  Jul 11 11:04:18 xenial-vm3 systemd[1]: Mounting Arbitrary Executable File 
Formats File System...
  Jul 11 11:04:18 xenial-vm3 systemd[1]: Mounted Arbitrary Executable File 
Formats File System.
  Jul 11 11:04:18 xenial-vm3 automount[1357]: attempting to mount entry 
/home/test1 <==
  Jul 11 11:04:18 xenial-vm3 kernel: [8.880685] FS-Cache: Loaded
  Jul 11 11:04:18 xenial-vm3 kernel: [8.889318] FS-Cache: Netfs 'nfs' 
registered for caching
  Jul 11 11:04:18 xenial-vm3 kernel: [8.902672] NFS: Registering the 
id_resolver key type
  Jul 11 11:04:18 xenial-vm3 kernel: [8.902680] Key type id_resolver 
registered
  Jul 11 11:04:18 xenial-vm3 kernel: [8.902682] Key type id_legacy 
registered
  Jul 11 11:04:18 xenial-vm3 automount[1357]: mounted /home/test1  <==
  Jul 11 11:04:18 xenial-vm3 automount[1357]: attempting to mount entry 
/home/test2  <==
  Jul 11 11:04:18 xenial-vm3 kernel: [9.163011] random: nonblocking pool is 
initialized
  Jul 11 11:04:18 xenial-vm3 automount[1357]: mounted /home/test2  <===

  
  *** Test Case 2 - Restart snmpd :

  To reproduce this case, autofs mounts should not be mounted to begin with.
  (restart autofs or let it expire)

  #systemctl restart snmpd.service

  Syslog entries :

  Jul 11 11:15:40 xenial-vm3 systemd[1]: Stopping LSB: SNMP agents...
  Jul 11 11:15:40 xenial-vm3 snmpd[1668]:  * Stopping SNMP services:
  Jul 11 11:15:40 xenial-vm3 snmpd[1434]: Received TERM or STOP signal...  
shutting down...
  Jul 11 11:15:40 xenial-vm3 systemd[1]: Stopped LSB: SNMP agents.
  Jul 11 11:15:40 xenial-vm3 systemd[1]: Starting LSB: SNMP agents...
  Jul 11 11:15:42 xenial-vm3 snmpd[1677]:  * Starting SNMP services:
  Jul 11 11:15:42 xenial-vm3 automount[1357]: attempting to mount entry 
/home/test1 <===
  Jul 11 11:15:42 xenial-vm3 auto

[Group.of.nepali.translators] [Bug 1681909] Re: kdump is not captured in remote host when kdump over ssh is configured

2019-07-22 Thread Eric Desrochers
Marking Cosmic as 'Won't fix'.

Ubuntu 18.10 (Cosmic Cuttlefish) End Of Life reached on July 18 2019.


** Changed in: makedumpfile (Ubuntu Cosmic)
   Status: In Progress => Won't Fix

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1681909

Title:
  kdump is not captured in remote host when kdump over ssh is configured

Status in The Ubuntu-power-systems project:
  In Progress
Status in makedumpfile package in Ubuntu:
  In Progress
Status in makedumpfile source package in Xenial:
  In Progress
Status in makedumpfile source package in Bionic:
  In Progress
Status in makedumpfile source package in Cosmic:
  Won't Fix
Status in makedumpfile source package in Disco:
  In Progress
Status in makedumpfile source package in Eoan:
  In Progress

Bug description:
  [Impact]

  * Kdump over network (like NFS mount or SSH dump) relies on network-
  online target from systemd. Even so, there are some NICs that report
  "Link Up" state but aren't ready to transmit packets. This is a
  generally bad behavior that is credited probably to NIC firmware
  delays, usually not fixable from drivers. Some adapters known to act
  like this are bnx2x, tg3 and ixgbe.

  * Kdump is a mechanism that may be a last resort to debug complex/hard
  to reproduce issues, so it's interesting to increase its reliability /
  resilience. We then propose here a solution/quirk to this issue on
  network dump by adding a retry/delay mechanism; if it's a network
  dump, kdump will retry some times and sleep between the attempts in
  order to exclude the case of NICs that aren't ready yet but will soon
  be able to transmit packets.

  * Although first reported by IBM in PowerPC arch, the scope for this
  issue is the NIC, and it was later reported in x86 arch too.

  [Test case]

  Usually it's difficult to naturally reproduce this issue in a deterministic 
way, but we have an artificial test case on comment #24 of this LP.
  Also, we have a report from this bug in which the user managed to reproduce 
the problem consistently - it's fixed after testing our solution.

  [Regression potential]

  There's not a clear regression potential here since it's just a retry/delay 
mechanism. Some potential problems may come from bad coding in the script.
  The delay between attempts is only 3 sec per iteration, so it shouldn't block 
the kdump progress for a high amount of time at once.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-power-systems/+bug/1681909/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1832223] Re: glusterfs in bionic is EOL

2019-06-10 Thread Eric Desrochers
** Description changed:

  According to glusterfs release schedule[0], the glusterfs version[1]
  found in bionic 'universe' reached EOL at upstream level.
+ 
+ 3.13 was a short term maintenance release, it reached end of life (EOL)
+ with the release of 4.0.0.[2]
  
  As I create this bug, only 4.1 and late are still 'maintained'
  
  [0]- https://www.gluster.org/release-schedule/
  
  [1]- rmadison:
   glusterfs-server | 3.13.2-1build1  | bionic/universe
   glusterfs-server | 3.13.2-1ubuntu1 | bionic-proposed/universe
+ 
+ [2]- https://docs.gluster.org/en/latest/release-notes/4.0.0/

** Summary changed:

- glusterfs in bionic is EOL
+ glusterfs in bionic/xenial is EOL

** Description changed:

  According to glusterfs release schedule[0], the glusterfs version[1]
- found in bionic 'universe' reached EOL at upstream level.
+ found in Bionic and Xenial 'universe' reached EOL at upstream level.
  
  3.13 was a short term maintenance release, it reached end of life (EOL)
  with the release of 4.0.0.[2]
  
  As I create this bug, only 4.1 and late are still 'maintained'
  
  [0]- https://www.gluster.org/release-schedule/
  
  [1]- rmadison:
-  glusterfs-server | 3.13.2-1build1  | bionic/universe
-  glusterfs-server | 3.13.2-1ubuntu1 | bionic-proposed/universe
+  glusterfs | 3.7.6-1ubuntu1  | xenial/universe  | source
+  glusterfs | 3.13.2-1build1  | bionic/universe  | source
+  glusterfs | 3.13.2-1ubuntu1 | bionic-proposed/universe | source
+  glusterfs | 3.13.2-1ubuntu1 | bionic-updates/universe  | source
  
  [2]- https://docs.gluster.org/en/latest/release-notes/4.0.0/

** Also affects: glusterfs (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: glusterfs (Ubuntu Xenial)
   Importance: Undecided => Low

** Description changed:

  According to glusterfs release schedule[0], the glusterfs version[1]
  found in Bionic and Xenial 'universe' reached EOL at upstream level.
  
- 3.13 was a short term maintenance release, it reached end of life (EOL)
- with the release of 4.0.0.[2]
+ 3.7 has been released in November 2015.
+ 3.13 has been released in January 2018.
+ 
+ Note: 3.13 was a short term maintenance release, it reached end of life
+ (EOL) with the release of 4.0.0.[2]
  
  As I create this bug, only 4.1 and late are still 'maintained'
  
  [0]- https://www.gluster.org/release-schedule/
  
  [1]- rmadison:
-  glusterfs | 3.7.6-1ubuntu1  | xenial/universe  | source
-  glusterfs | 3.13.2-1build1  | bionic/universe  | source
-  glusterfs | 3.13.2-1ubuntu1 | bionic-proposed/universe | source
-  glusterfs | 3.13.2-1ubuntu1 | bionic-updates/universe  | source
+  glusterfs | 3.7.6-1ubuntu1  | xenial/universe  | source
+  glusterfs | 3.13.2-1build1  | bionic/universe  | source
+  glusterfs | 3.13.2-1ubuntu1 | bionic-proposed/universe | source
+  glusterfs | 3.13.2-1ubuntu1 | bionic-updates/universe  | source
  
  [2]- https://docs.gluster.org/en/latest/release-notes/4.0.0/

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1832223

Title:
  glusterfs in bionic/xenial is EOL

Status in glusterfs package in Ubuntu:
  Fix Released
Status in glusterfs source package in Xenial:
  New
Status in glusterfs source package in Bionic:
  New

Bug description:
  According to glusterfs release schedule[0], the glusterfs version[1]
  found in Bionic and Xenial 'universe' reached EOL at upstream level.

  3.7 has been released in November 2015.
  3.13 has been released in January 2018.

  Note: 3.13 was a short term maintenance release, it reached end of
  life (EOL) with the release of 4.0.0.[2]

  As I create this bug, only 4.1 and late are still 'maintained'

  [0]- https://www.gluster.org/release-schedule/

  [1]- rmadison:
   glusterfs | 3.7.6-1ubuntu1  | xenial/universe  | source
   glusterfs | 3.13.2-1build1  | bionic/universe  | source
   glusterfs | 3.13.2-1ubuntu1 | bionic-proposed/universe | source
   glusterfs | 3.13.2-1ubuntu1 | bionic-updates/universe  | source

  [2]- https://docs.gluster.org/en/latest/release-notes/4.0.0/

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/glusterfs/+bug/1832223/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1668639] Re: Add a trigger to reload rsyslog when a new configuration file is dropped in /etc/rsyslog.d

2019-05-16 Thread Eric Desrochers
It is fixed in Ubuntu Bionic and late but this LP bug have never been
mentioned in the changelog, which explains why the status didn't change
until now (after a manual status change from my part)

Xenial hasn't been fix, I did some quick verification and base on the
fix, which add a Depends as follow:

debian/control: init-system-helpers (>= 1.47~)

and considering rmadison:
 init-system-helpers | 1.29ubuntu1 | xenial | source, all
 init-system-helpers | 1.29ubuntu4 | xenial-updates | source, all

I'm afraid the fix won't work for Xenial.

With that being said, I will set Xenial to "Won't fix".

Please feel free to re-open it if you judge Xenial need the fix by
providing good justification/rational.

- Eric

** Changed in: rsyslog (Ubuntu Zesty)
   Status: Won't Fix => Fix Released

** Changed in: rsyslog (Ubuntu Xenial)
   Status: In Progress => Fix Released

** Changed in: rsyslog (Ubuntu Xenial)
   Status: Fix Released => Won't Fix

** Changed in: rsyslog (Ubuntu Trusty)
   Status: In Progress => Won't Fix

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1668639

Title:
  Add a trigger to reload rsyslog when a new configuration file is
  dropped in /etc/rsyslog.d

Status in rsyslog package in Ubuntu:
  Fix Released
Status in rsyslog source package in Trusty:
  Won't Fix
Status in rsyslog source package in Xenial:
  Won't Fix
Status in rsyslog source package in Zesty:
  Fix Released
Status in rsyslog source package in Artful:
  Fix Released
Status in rsyslog package in Debian:
  Fix Released

Bug description:
  [Impact]
  Servers or cloud instances will not log important messages after initial 
deployment. Manual reboot or restart of services is necessary to get expected 
behaviour.

  [Test Case]
  1) Install, enable and start haproxy
  2) Observe that /etc/rsyslog.d/49-haproxy.conf is installed
  3) Observe that /var/lib/haproxy/dev/log and /var/log/haproxy.log is NOT 
created
  4) Restart rsyslog service
  5) Observe that /var/lib/haproxy/dev/log and /var/log/haproxy.log IS created
  6) Restart haproxy service and observe that log now is filled with entries

  With the patched deb steps 3,4 and 6 becomes irrelevant and everything
  works out of the box.

  [Regression Potential]
  Minimal.

  This patch merges a patch from Debian where a trigger is added to the
  rsyslog package that fires when other debs drop files into
  /etc/rsyslog.d.

  
  [Original Bug Description]
  rsyslog should reload its configuration when other packages drop 
configuration in /etc/rsyslog.d

  https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=791337

  https://anonscm.debian.org/cgit/collab-
  maint/rsyslog.git/commit/?id=8d4074003f8fb19dae07c59dd19f0540a639210f

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/rsyslog/+bug/1668639/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1828901] Re: add PTY support for runuser

2019-05-13 Thread Eric Desrochers
** Changed in: util-linux (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: util-linux (Ubuntu Xenial)
 Assignee: (unassigned) => Eric Desrochers (slashd)

** Bug watch added: Debian Bug tracker #815922
   https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922

** Also affects: util-linux (Debian) via
   https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922
   Importance: Unknown
   Status: Unknown

** Changed in: util-linux (Ubuntu Xenial)
   Status: New => In Progress

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1828901

Title:
  add PTY support for runuser

Status in util-linux package in Ubuntu:
  Fix Released
Status in util-linux source package in Xenial:
  In Progress
Status in util-linux package in Debian:
  Unknown

Bug description:
  [IMPACT]

  [TEST CASE]

  [REGRESSION POTENTIAL]

  [OTHER INFORMATION]

  Debbug:
  https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922

  This is fixing a CVE vulnerability:
  https://security-tracker.debian.org/tracker/CVE-2016-2779

  Restricting ioctl on the kernel side seems the better approach, patches have 
been posted to kernel-hardening list
  http://www.openwall.com/lists/oss-security/2016/02/27/1
  https://marc.info/?l=util-linux-ng&m=145694736107128&w=2
  2.31 introduces a new --pty option to separate privileged and unprivileged
  shells (not enabled by default and the cli switch is necessary).

  [ORIGINAL DESCRIPTION]
  After a discussion with security team on what would be their recommended way 
to run command as 'juju-user' inside the sosreport juju plugin which is run as 
root, in order to avoid using 'sudo' or 'su' command.

  The recommendation was to use 'runuser -P'

  runuser PTY support is present in Bionic and late, but not in Xenial.

  I'm opening this bug in the effort to update util-linux/runuser code
  in Xenial to add the PTY support.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/util-linux/+bug/1828901/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1828901] [NEW] add PTY support for runuser

2019-05-13 Thread Eric Desrochers
Public bug reported:

[IMPACT]

[TEST CASE]

[REGRESSION POTENTIAL]

[OTHER INFORMATION]

Debbug:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922

This is fixing a CVE vulnerability:
https://security-tracker.debian.org/tracker/CVE-2016-2779

Restricting ioctl on the kernel side seems the better approach, patches have 
been posted to kernel-hardening list
http://www.openwall.com/lists/oss-security/2016/02/27/1
https://marc.info/?l=util-linux-ng&m=145694736107128&w=2
2.31 introduces a new --pty option to separate privileged and unprivileged
shells (not enabled by default and the cli switch is necessary).

[ORIGINAL DESCRIPTION]
After a discussion with security team on what would be their recommended way to 
run command as 'juju-user' inside the sosreport juju plugin which is run as 
root, in order to avoid using 'sudo' or 'su' command.

The recommendation was to use 'runuser -P'

runuser PTY support is present in Bionic and late, but not in Xenial.

I'm opening this bug in the effort to update util-linux/runuser code in
Xenial to add the PTY support.

** Affects: util-linux (Ubuntu)
 Importance: Undecided
 Status: Fix Released

** Affects: util-linux (Ubuntu Xenial)
 Importance: Undecided
 Status: New


** Tags: sts

** Tags added: sts

** Also affects: util-linux (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: util-linux (Ubuntu)
   Status: New => Fix Released

** Description changed:

- After a discussion with security team on what would be their recommended
- way to run command as 'juju-user' inside the sosreport juju plugin which
- is run as root, in order to avoid using 'sudo' or 'su' command.
+ [IMPACT]
+ 
+ [TEST CASE]
+ 
+ [REGRESSION POTENTIAL]
+ 
+ [OTHER INFORMATION]
+ 
+ Debbug:
+ https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922
+ 
+ This is fixing a CVE vulnerability:
+ https://security-tracker.debian.org/tracker/CVE-2016-2779
+ 
+ Restricting ioctl on the kernel side seems the better approach, patches have 
been posted to kernel-hardening list
+ http://www.openwall.com/lists/oss-security/2016/02/27/1
+ https://marc.info/?l=util-linux-ng&m=145694736107128&w=2
+ 2.31 introduces a new --pty option to separate privileged and unprivileged
+ shells (not enabled by default and the cli switch is necessary).
+ 
+ [ORIGINAL DESCRIPTION]
+ After a discussion with security team on what would be their recommended way 
to run command as 'juju-user' inside the sosreport juju plugin which is run as 
root, in order to avoid using 'sudo' or 'su' command.
  
  The recommendation was to use 'runuser -P'
  
  runuser PTY support is present in Bionic and late, but not in Xenial.
  
  I'm opening this bug in the effort to update util-linux/runuser code in
  Xenial to add the PTY support.

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1828901

Title:
  add PTY support for runuser

Status in util-linux package in Ubuntu:
  Fix Released
Status in util-linux source package in Xenial:
  New

Bug description:
  [IMPACT]

  [TEST CASE]

  [REGRESSION POTENTIAL]

  [OTHER INFORMATION]

  Debbug:
  https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922

  This is fixing a CVE vulnerability:
  https://security-tracker.debian.org/tracker/CVE-2016-2779

  Restricting ioctl on the kernel side seems the better approach, patches have 
been posted to kernel-hardening list
  http://www.openwall.com/lists/oss-security/2016/02/27/1
  https://marc.info/?l=util-linux-ng&m=145694736107128&w=2
  2.31 introduces a new --pty option to separate privileged and unprivileged
  shells (not enabled by default and the cli switch is necessary).

  [ORIGINAL DESCRIPTION]
  After a discussion with security team on what would be their recommended way 
to run command as 'juju-user' inside the sosreport juju plugin which is run as 
root, in order to avoid using 'sudo' or 'su' command.

  The recommendation was to use 'runuser -P'

  runuser PTY support is present in Bionic and late, but not in Xenial.

  I'm opening this bug in the effort to update util-linux/runuser code
  in Xenial to add the PTY support.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/util-linux/+bug/1828901/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1775195] Re: [sync][sru] Backport of sosreport v3.6

2019-05-13 Thread Eric Desrochers
** Changed in: sosreport (Ubuntu Trusty)
   Status: In Progress => Won't Fix

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1775195

Title:
  [sync][sru] Backport of sosreport v3.6

Status in sosreport package in Ubuntu:
  Fix Released
Status in sosreport source package in Trusty:
  Won't Fix
Status in sosreport source package in Xenial:
  Fix Released
Status in sosreport source package in Bionic:
  Fix Released
Status in sosreport source package in Cosmic:
  Fix Released
Status in sosreport package in Debian:
  Fix Released

Bug description:
  [Impact]

  sosreport 3.6 has been released in June 2018 with further enhancements
  in core sosreport functionality.

  I already did the request for debian :
  https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900818

  and 3.6 has been uploaded in Debian since then (Thanks to caribou):
  sosreport | 3.6-1 | testing
  sosreport | 3.6-1 | unstable

  and I have synced sosreport (Debian->Ubuntu Disco).

  It would be great to have sosreport v3.6 SRU'd in supported stable
  releases once official release upstream, considering the fact that the
  release (especially LTSes) will be supported for a couple of years
  still:

  [https://www.ubuntu.com/about/release-cycle]
  Ubuntu 16.04 | support until 2023
  Ubuntu 18.04 | support until 2024

  sosreport is widely use by Canonical support team to troubleshoot UA
  customer and other vendors and community users. These improvement will
  benefit all of them.

  sosreport 3.6 contains a number of enhancements, new features, and bug
  fixes. (See "Release Note" below)

  Just like we did for v3.5 (LP: #1734983)

  [Test Case]

   * Install sosreport
   * Run sosreport
     - sosreport plugins are separated by subject (juju, MAAS, grub,zfs, ipsec, 
...) and allow the capability to detect (based on file and package) if it exist 
and/or installed and then only run the necessary plugins based on the detection 
made.

  [Things identified during our testing]

   * [minor] juju plugin detection doesn't work if installed as a snap:
     https://github.com/sosreport/sos/issues/1475
     Fix already submitted upstream. This is not a new thing, juju in
     sosreport have always been made for .deb so far. It's not a
     regression introduce in 3.6, and IMHO not a blocker for the current
     SRU. It could be patch later on when the upstream discussion/approval
     will be done.

   * [major] Certain plugins may or may not substitute sensible
     information such as password. Upstream fix found and applied :
     https://github.com/sosreport/sos/commit/b96bdab
     - d/p/fix-string-substitution-method.patch

   * [minor] kernel plugin dont collect some tracing instance files
     https://github.com/sosreport/sos/commit/d6379b5
     LP: #1803735
     - d/p/dont-collect-some-tracing-instance-files.patch

  [Regression Potential]

   * Regression risk is low, as long as the core functionnality works
  (Package manager, ...)

   * autopkgtest reveal no regressions.

   * We did some dogfooding on sosreport, but we can't test each
  individual plugins and scenarios one by one, that would be impossible
  but we have tested the ones we considered important and Ubuntu related
  (canonical-livepatch, MAAS, juju, openstack, ...). Plugin bug is an
  eventuality, but they are usually easy to fix and the impact will be
  isolated to the plugin itself or section of the plugin. If a plugin
  has a bug the worst that could happen is that this particular plugin
  won't collect system logs, debug information or anything this plugin
  was instructed to do, usually won't affect other plugin to perform as
  expected and/or sosreport to complete.

  [Other Info]

  [v3.6 Release notes]
  # https://github.com/sosreport/sos/releases/tag/3.6

  [Original Description]

  sosreport 3.6 has been released in June 2018 with further enhancements
  in core sosreport functionality.

  A sync can be done since all Ubuntu patches has been integrated in 3.6

  I already did the request for debian :
  https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900818

  and 3.6 has been uploaded in Debian since then (Thanks to caribou):
  sosreport  | 3.6-1| testing
  sosreport  | 3.6-1| unstable

  Now, it would be great to have sosreport v3.6 in Development Release &
  SRU'd in all supported stable release once official release upstream,
  considering the fact that the release will contain a number of
  enhancements, new features, and bug fixes and that sosreport is widely
  use by Canonical support team to troubleshoot UA customer.

  Just like we did for v3.5.

  [v3.6 Release notes]

  # https://github.com/sosreport/sos/releases/tag/3.6
  The sos team is pleased to announce the release of sos-3.6. This is a
  significant release containing a number of enhancements, new features,
  and

[Group.of.nepali.translators] [Bug 1803735] Re: [kernel] dont collect some tracing instance files

2019-05-13 Thread Eric Desrochers
** Changed in: sosreport (Ubuntu Trusty)
   Status: In Progress => Won't Fix

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1803735

Title:
  [kernel] dont collect some tracing instance files

Status in sosreport package in Ubuntu:
  Fix Released
Status in sosreport source package in Trusty:
  Won't Fix
Status in sosreport source package in Xenial:
  Fix Released
Status in sosreport source package in Bionic:
  Fix Released
Status in sosreport source package in Cosmic:
  Fix Released
Status in sosreport source package in Disco:
  Fix Released

Bug description:
  ** Minor bug found in the current SRU for LP: #1775195 **

  [Impact]

   * When kernel tracing event is in used, sosreport hang at the kernel
  plugin.

  [Test Case]

   * Install rasdaemon

     $ apt-get install rasdaemon -y

   * Run sosreport from -proposed (See Bug #1775195)

     sosreport | 3.6-1ubuntu0.16.04.1  | xenial-proposed
     sosreport | 3.6-1ubuntu0.18.04.1  | bionic-proposed
     sosreport | 3.6-1ubuntu0.18.10.1  | cosmic-proposed

     Only kernel plugin is needed to trigger the hang :
     $ sosreport -o kernel

  [Regression Potential]

   * Regression low.

  The fix is simply appending files to the the kernel plugin into an
  existing list of files to be ignored in order to stop hanging when
  trying to collect them when tracing event is in used.

  [Other Info]

   * Upstream fix:
     
https://github.com/sosreport/sos/pull/1445/commits/d6379b5ba0f381ea8ec2403b9985100a946a5866

   * Origin :
     https://github.com/sosreport/sos/pull/1445

  [Git bisect log]

  git bisect start '--term-old' 'broken' '--term-new' 'fixed'
  # fixed: [848b110f83697814c72ac93b36e786ff9dafc0fc] [powerpc] Add support to 
collect DLPAR and LPM related logs
  git bisect fixed 848b110f83697814c72ac93b36e786ff9dafc0fc
  # broken: [967c015518c1aa135aa6007329972f031ffe12fc] [plugins] Remove 
unnecessary sizelimits
  git bisect broken 967c015518c1aa135aa6007329972f031ffe12fc
  # broken: [e89c7f7744ac4b39956ef3122cdb1489d2676664] [multipath] use -ll for 
path checker and prio inclusion
  git bisect broken e89c7f7744ac4b39956ef3122cdb1489d2676664
  # broken: [0ea62d1ea57f41c1b75ccb83e69fdda386a7d280] [Plugin] fix exception 
raise in Plugin._copy_dir()
  git bisect broken 0ea62d1ea57f41c1b75ccb83e69fdda386a7d280
  # broken: [2e3e1479df19aca58d8bd9f80ef3d6e7a9641211] [utilities] use correct 
comparison-to-None style
  git bisect broken 2e3e1479df19aca58d8bd9f80ef3d6e7a9641211
  # broken: [e108d7c03834446f8dac66ad69f5eade4f2c5fce] [archive] fix and 
simplify directory destination rewriting
  git bisect broken e108d7c03834446f8dac66ad69f5eade4f2c5fce
  # broken: [f8ee9c4b87c6c3b8aa2bda3425f0e53499515363] [openstack_*] relax 
enabling of OSP RedHat plugins
  git bisect broken f8ee9c4b87c6c3b8aa2bda3425f0e53499515363
  # fixed: [d6379b5ba0f381ea8ec2403b9985100a946a5866] [kernel] dont collect 
some tracing instance files
  git bisect fixed d6379b5ba0f381ea8ec2403b9985100a946a5866
  # first fixed commit: [d6379b5ba0f381ea8ec2403b9985100a946a5866] [kernel] 
dont collect some tracing instance files

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sosreport/+bug/1803735/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1828467] Re: [sru] remove juju-db stop/start service interactions

2019-05-10 Thread Eric Desrochers
** Changed in: sosreport (Ubuntu Trusty)
   Status: New => Won't Fix

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1828467

Title:
  [sru] remove juju-db stop/start service interactions

Status in sosreport package in Ubuntu:
  In Progress
Status in sosreport source package in Trusty:
  Won't Fix
Status in sosreport source package in Xenial:
  New
Status in sosreport source package in Bionic:
  New
Status in sosreport source package in Cosmic:
  New
Status in sosreport source package in Disco:
  New
Status in sosreport source package in Eoan:
  In Progress

Bug description:
  [Impact]

  The juju plugin will stop and start the juju-db service during data 
collection.
  sosreport should not impact running services, or attempt to recover them.

  This has been reported upstream[0] and will be fixed by the juju 2.x
  refactor[1]

  This is a stop-gap tracking the removal of the juju-db service restart
  code in existing sosreport releases.

  [0] - https://github.com/sosreport/sos/issues/1653
  [1] - https://github.com/sosreport/sos/pull/1670

  [Test Case]

   * Make sure you are in the juju controller.
   * Install sosreport
   * Look mongod PID before
     ** $ pidof mongod
   * Run sosreport, ensuring that the juju plugin is exercised
   * Confirm the juju-db service was not restarted, and mongoexport data 
captured.
  * Look mongod PID after
     ** $ pidof mongod

  
  Check for errors while running, or in /tmp/sosreport-*/sos_logs/

  The offending function ensure_service_is_running() in theory doesn't
  create any harm unless juju plugin is exercised during a sosreport run
  from a juju controller where mongod and/or juju-db resides.

  [Regression Potential]

   * Risk is low.
   * Change is limited in scope to the juju plugin.
   * Worst-case scenario is that the mongoexport command will fail to collect 
any data, which won't affect core functionality of sosreport itself nor impact 
other sosreport plugins.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sosreport/+bug/1828467/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1777131] Re: Wrong RAM size shown for server

2019-04-29 Thread Eric Desrochers
Upstream bug : https://ezix.org/project/ticket/662
Upstream commit : 
https://ezix.org/src/pkg/lshw/commit/640615983fbf976e66931164a9ae1bd64da9668b

I'm working on a backport fix for Xenial.

# git describe --contains 6406159
B.02.17~26

# rmadison
=>  lshw | 02.17-1.1ubuntu3.5   | xenial-updates 
lshw | 02.18-0.1ubuntu6 | bionic 
lshw | 02.18-0.1ubuntu6.18.04.1 | bionic-updates 
lshw | 02.18-0.1ubuntu7 | cosmic 
lshw | 02.18-0.1ubuntu7 | disco  
lshw | 02.18.85-0.1ubuntu1  | eoan   


** Bug watch added: Ezix Trac #662
   http://ezix.org/project/ticket/662

** Also affects: lshw (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: lshw (Ubuntu)
   Status: Confirmed => Fix Released

** Changed in: lshw (Ubuntu Xenial)
 Assignee: (unassigned) => Eric Desrochers (slashd)

** Changed in: lshw (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: lshw (Ubuntu Xenial)
   Status: New => In Progress

** Tags added: sts

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1777131

Title:
  Wrong RAM size shown for server

Status in MAAS:
  Invalid
Status in lshw package in Ubuntu:
  Fix Released
Status in lshw source package in Xenial:
  In Progress

Bug description:
  Currently MAAS relies on DMI for the info about RAM size.
  DMI seems not to be always correct, this results in wrong RAM amount shown in 
the MAAS UI.

  In my case :

  ..
  handle: DMI:0017
  - lshw:description:
    DIMM Synchronous 2666 MHz (0.4 ns)
  - lshw:product:
    M386A8K40BM2-CTD
  - lshw:vendor:
    Samsung
  - lshw:physid:
    0
  - lshw:serial:
    375610DE
  - lshw:slot:
    P1-DIMMA1
  - lshw:size:
    units: bytes
    34358689792
  ..

  full machine yaml : https://pastebin.canonical.com/p/TqpvzXj2sx/

  However product M386A8K40BM2-CTD is actually 64GB:
  
https://memory.net/product/m386a8k40bm2-ctd-samsung-1x-64gb-ddr4-2666-lrdimm-pc4-21300v-l-quad-rank-x4-module/

  I have 12 of those, and on boot it shows me the correct amount 12 *
  64GB:

  ubuntu:~$ dmesg | grep Memory
  [0.00] Memory: 791161372K/803909324K available (8541K kernel code, 
1313K rwdata, 4000K rodata, 1512K init, 1316K bss, 12747952K reserved, 0K 
cma-reserved)

  ubuntu:~$ free -m
    totalusedfree  shared  buff/cache   
available
  Mem: 7726583828  768156  18 672  
766751
  Swap:  8191   08191

  

  /var/log/maas : https://private-
  fileshare.canonical.com/~dima/varlogmaas-15062018.tar

  ubuntu$  dpkg -l '*maas*'|cat
  Desired=Unknown/Install/Remove/Purge/Hold
  | Status=Not/Inst/Conf-files/Unpacked/halF-conf/Half-inst/trig-aWait/Trig-pend
  |/ Err?=(none)/Reinst-required (Status,Err: uppercase=bad)
  ||/ NameVersion  
Architecture Description
  
+++-===---=
  un  maas   
   (no description available)
  ii  maas-cli2.3.3-6498-ge4db91d-0ubuntu1~16.04.1 all  
MAAS client and command-line interface
  un  maas-cluster-controller
   (no description available)
  ii  maas-common 2.3.3-6498-ge4db91d-0ubuntu1~16.04.1 all  
MAAS server common files
  ii  maas-dhcp   2.3.3-6498-ge4db91d-0ubuntu1~16.04.1 all  
MAAS DHCP server
  ii  maas-dns2.3.3-6498-ge4db91d-0ubuntu1~16.04.1 all  
MAAS DNS server
  ii  maas-proxy  2.3.3-6498-ge4db91d-0ubuntu1~16.04.1 all  
MAAS Caching Proxy
  ii  maas-rack-controller2.3.3-6498-ge4db91d-0ubuntu1~16.04.1 all  
Rack Controller for MAAS
  ii  maas-region-api 2.3.3-6498-ge4db91d-0ubuntu1~16.04.1 all  
Region controller API service for MAAS
  ii  maas-region-controller  2.3.3-6498-ge4db91d-0ubuntu1~16.04.1 all  
Region Controller for MAAS
  un  maas-region-controller-min 
   (no description available)
  un  python-django-maas 
   (no description available)
  un  python-maas-client 
   (no description available)
  un  python-maas-provisioningserver  

[Group.of.nepali.translators] [Bug 1825010] Re: [sru] Backport of sosreport v3.7

2019-04-26 Thread Eric Desrochers
debbug:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=928049

** Bug watch added: Debian Bug tracker #928049
   https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=928049

** Also affects: sosreport (Debian) via
   https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=928049
   Importance: Unknown
   Status: Unknown

** Changed in: sosreport (Ubuntu Trusty)
   Status: New => Won't Fix

** Summary changed:

- [sru] Backport of sosreport v3.7
+ [sru] new sosreport v3.7

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1825010

Title:
  [sru] new sosreport v3.7

Status in sosreport package in Ubuntu:
  New
Status in sosreport source package in Trusty:
  Won't Fix
Status in sosreport source package in Xenial:
  New
Status in sosreport source package in Bionic:
  New
Status in sosreport source package in Cosmic:
  New
Status in sosreport source package in Disco:
  New
Status in sosreport source package in Eoan:
  In Progress
Status in sosreport package in Debian:
  Unknown

Bug description:
  [Impact]

  sosreport 3.7 has been released including further enhancements in core 
sosreport functionality:
  https://github.com/sosreport/sos/releases/tag/3.7

  It would be great to find sosreport v3.7 in supported stable releases,
  considering the fact that the release (especially LTSes) will be
  supported for a couple of years still:

  sosreport is widely use by Canonical support team to troubleshoot UA
  customer, other vendors and community users. These improvement will
  benefit all of them.

  sosreport 3.7 contains a number of enhancements, new features, and bug
  fixes. (See "Release Note" below)

  Just like we did for :
  - v3.5 (LP: #1734983)
  - v3.6 (LP: #1775195)

  [Test Case]

   * Install sosreport
   * Run sosreport
     - sosreport plugins are separated by subject (juju, MAAS, grub, zfs,...) 
and allow the capability to detect (based on file and package) if it exist 
and/or installed and then only run the necessary plugins based on the detection 
made.

  It creates a files under /tmp in the form of :
  /tmp/sosreport-sos37xenial-20190416160152.tar.xz # Actual sosreport
  /tmp/sosreport-sos37X-20190416160152.tar.xz.md5  # MD5 checksum

  Only accessible by root user:
  -rw--- 1 root root 1619000 Apr 16 16:07 
/tmp/sosreport-sos37X-20190416160152.tar.xz

  Ideally, since we can't test all plugins, it would be good to have a
  few testers using different HW, kernel, installation with a focus on
  juju, MAAS, LXD, canonical-livepatch, 

  Looking for any error on the terminal while sosreport is running or
  post-sosreport run in /tmp/sosreport-*/sos_logs/

  [Regression Potential]

   * Risk is low.

   * We did some dogfooding on sosreport, but we can't test each
  individual plugins and scenarios one by one, that would just be
  impossible but we have tested the ones we considered important and
  Ubuntu/Canonical related (canonical-livepatch, MAAS, juju, snappy),
  Openstack, mandatory file (logs, dmidecode, installed-debs and so on)

   * Plugin bug is an eventuality, but they are usually easy to fix and
  the impact will be isolated to the plugin itself or section of the
  plugin. If a plugin has a bug the worst that could happen is that this
  particular plugin won't (or partially) collect information.

  [Other information]

  * Release note:
  https://github.com/sosreport/sos/releases/tag/3.7

  * Plugins:
  sosreport contains in total: 284 plugins

  - 185 plugins that used UbuntuPlugin and/or DebianPlugin that might
  been triggered at sosreport run.

  -  97 plugins not using UbuntuPlugin and/or DebianPlugin. Basically
  useless in a Ubuntu context.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sosreport/+bug/1825010/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1825010] [NEW] v3.7 is now the latest release

2019-04-16 Thread Eric Desrochers
Public bug reported:

https://github.com/sosreport/sos/releases/tag/3.7

---
The sos team is pleased to announce the release of sos-3.7. This is a 
significant release containing a large number of enhancements, new features, 
and bug fixes, including:

New distribution policies for CentOS and Amazon Linux

19 new plugins:
candlepin, cifs, cockpit, composer, crio, gssproxy, katello, 
openstack_novajoin, ovirt_node, peripety, podman, pulp, rasdaemon, rhcos, 
rhv_analyzer, rpmostree, ruby, stratis, sudo

Obsolete IPSec plugin removed (in favour of OpenSwan)

Support for passphrase and key based encryption of the report archive

Ability to encrypt the archive using GPG, with either a key or passphrase
New --encrypt-key and --encrypt-pass arguments to sosreport
Improved handling of paths containing directory symbolic links (for e.g. /sys)

Previous versions of sos would replace intermediate path components that 
contain a symbolic link to a directory in the host file system with an actual 
directory in the report archive. The host file system structure is now 
reflected properly in the report directory structure.
New InitSystem abstraction

Allows plugin and collection enablement based on the presence of a service, and 
methods to test whether a given service is currently running
LVM2 plugin enhancements

Locking fixes for LVM2 metadata and reporting output capture
Additional LVM2 logical volume manager report data
Append plugin exceptions to sos_logs/*-plugin-exception.txt

Previous versions of sos would overwrite earlier exceptions if more than one 
exception occurred while running a plugin (for example, when an exception 
occurs in both setup() and postproc() phases).
Dry run mode (--dry-run)

Allows sos to run without collecting data, or executing commands, and proving a 
log of actions that would have been taken by a normal run on the current system 
configuration.
Plugin API enhancements

SoSPredicates for gating collection on service and kernel module presence, and 
during dry-run mode
Significant enhancements to core features and existing plugins

Fixes to threaded exception handling, and interactive debugging with
--debug

Support for OpenShift 3.10 deployments

Improved multipath data collection

Fixed RHEL Atomic default command line preset

Support for PowerPC DLPAR and LPM logs

Additional FIPS and crypto-policies data collection

Test suite and CI support for Python-3.7 final

Additional systemd listings and statuses

Support for user-controlled per-plugin timeouts

Do not leave report artefacts in TMP when executing list commands

Improvements to command termination in the event of plugin timeouts

Policy support for Red Hat Enterprise Linux 8.0

Improved STONITH and watchdog data collection for Pacemaker clusters

Support for Debian journald logging in the logs plugin

New built-in 'cantboot' preset for collecting information relevant to
failed boots

Ability to disable default presets on the command line (--preset=none)

Support for setting all sosreport command line options (including global
and plugin options) in the sos.conf configuration file

The deprecated XML reporting module has been removed

Continuous integration with the LGTM static analyser (rated 'A')

Apache plugin fixed to support --log-size global option

Native support for collecting foreman-debug equivalent data in sos
---

** Affects: sosreport (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: sosreport (Ubuntu Trusty)
 Importance: Undecided
 Status: New

** Affects: sosreport (Ubuntu Xenial)
 Importance: Undecided
 Status: New

** Affects: sosreport (Ubuntu Bionic)
 Importance: Undecided
 Status: New

** Affects: sosreport (Ubuntu Cosmic)
 Importance: Undecided
 Status: New

** Affects: sosreport (Ubuntu Disco)
 Importance: Undecided
 Status: New

** Affects: sosreport (Ubuntu Ee-series)
 Importance: Low
 Assignee: Eric Desrochers (slashd)
 Status: In Progress

** Also affects: sosreport (Ubuntu Ee-series)
   Importance: Undecided
   Status: New

** Changed in: sosreport (Ubuntu Ee-series)
 Assignee: (unassigned) => Eric Desrochers (slashd)

** Changed in: sosreport (Ubuntu Ee-series)
   Importance: Undecided => Low

** Changed in: sosreport (Ubuntu Ee-series)
   Status: New => In Progress

** Also affects: sosreport (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Also affects: sosreport (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Also affects: sosreport (Ubuntu Disco)
   Importance: Undecided
   Status: New

** Also affects: sosreport (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: sosreport (Ubuntu Cosmic)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bu

[Group.of.nepali.translators] [Bug 1822129] Re: [SRU] leave device name empty so that nova can determine it instead

2019-04-16 Thread Eric Desrochers
** Also affects: horizon (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: horizon (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: horizon (Ubuntu Xenial)
   Status: New => In Progress

** Changed in: horizon (Ubuntu Xenial)
 Assignee: (unassigned) => Eric Desrochers (slashd)

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1822129

Title:
  [SRU] leave device name empty so that nova can determine it instead

Status in Ubuntu Cloud Archive:
  Confirmed
Status in Ubuntu Cloud Archive pike series:
  Confirmed
Status in Ubuntu Cloud Archive queens series:
  Confirmed
Status in Ubuntu Cloud Archive rocky series:
  Confirmed
Status in Ubuntu Cloud Archive stein series:
  Confirmed
Status in horizon package in Ubuntu:
  Fix Released
Status in horizon source package in Xenial:
  In Progress
Status in horizon source package in Bionic:
  In Progress
Status in horizon source package in Cosmic:
  In Progress
Status in horizon source package in Disco:
  Fix Released

Bug description:
  [IMPACT]

  Horizon hardcoded 'vda' no matter what (legacy code) for boot volume
  scenarios. Meaning that if for instance we use an image with scsi
  decoration[1] horizon will name the device_name as 'vda' when it
  should be 'sda'.

  Inside the instance, it will be 'sda' but horizon will show 'vda', if
  you then attach a second volume the volume will be seen as 'sda' in
  horizon, but 'sdb' in the instance and so on ... creating a
  inconsistency, and can also cause in certain circumstance VM to have
  issue to successfully reboot, hanging with "No bootable device".

  There is 2 functions (thus fixes) separated as follow:

  * setFinalSpecBootImageToVolume() which already uses BDMv2, in this case it 
was just a matter to remove the 'device_name' attribute as suggested per 
documentation[2]. This function take care of boot image from volume scenario.
  -> https://review.openstack.org/#/c/644982/

  * setFinalSpecBootFromVolumeDevice() which currently uses BDMv1 (legacy), in 
this case an upgrade to BDMv2 without setting up a 'device_name' attribute is 
sufficient to fix the issue. This function take care of booting from existing 
volume and snapshot.
  -> https://review.openstack.org/648328/

  Basically, with theses 2 fixes, it is no longer relying on
  "vol_device_name= 'vda'" as it was before as it is no longer needed
  since Liberty (again as per documentation)

  An instance with scsi decoration will properly show 'sda' and without
  will show 'vda'.'vda' will still be taken when it's the right thing to
  do, but not because it is hardcorded like it used to before these
  fixes.

  [1] -  scsi meta decoration:
  hw_disk_bus='scsi'
  hw_scsi_model='virtio-scsi'

  [2]- https://docs.openstack.org/nova/stein/user/block-device-mapping

  [TEST CASE]

  Here's some use case I can think of 

  With fix 1 in setFinalSpecBootImageToVolume():

  * Test #1:
  Use scsi meta data image decoration:
  hw_disk_bus='scsi'
  hw_scsi_model='virtio-scsi'

  1. Go to the Horizon dashboard and launch an instance
  2. Select "Boot from image (creates a new volume)" as Instance Boot Source

  Expected result:
  Instance should starts with /dev/sda as root device, instead of 'dev/vda'

  * Test #2:
  Use no scsi meta data image decoration

  1. Go to the Horizon dashboard and launch an instance
  2. Select "Boot from image (creates a new volume)" as Instance Boot Source

  Expected result:
  Instance will remain with /dev/vda as root device.
  No behaviour change here.

  With fix 2 in setFinalSpecBootFromVolumeDevice():

  * Test #1:
  Creating a server using an existing volume or volume snapshot.

  [POTENTIAL REGRESSION]

  * none expected, we basically leave nova to determine the device_name
  instead of having it force for Horizon by removing the 'device_name'
  attribute, and we also take benefit of it to upgrade some part of the
  code from legacy BDMv1 in flavor of BDMv2.

  * Note: This will not fix device name inconsistency already created
  instance, but will fix newly created instance after having applied the
  package from where these fixes have been first introduced.

  * Both fixes aren't dependant and can be SRU'd separately.

  [OTHER INFORMATION]

  * Upstream bug:
  https://bugs.launchpad.net/nova/+bug/1560965

  * Upstream git-review:

  # Taking care of bootimagefromvolume
  https://review.openstack.org/644982/
  
https://github.com/openstack/horizon/commit/4788c4d2f59b8aa08e5f599a6d2c327b6004dc0c

  # Taking care of existing volume and snapshot

[Group.of.nepali.translators] [Bug 1774032] Re: Bionic: CollectD ceph plugin is incompatible with Ceph 12+ (Luminous)

2019-03-26 Thread Eric Desrochers
To avoid any potential confusion, I have marked Xenial as 'Won't Fix'
with the following rationale:

It is true that Xenial offers Jewel and Luminous support, but since the
'Add support for ceph version luminous' commit is not backward
compatible with previous Ceph version.

We can't backport that change in Xenial/16.04 LTS.


>From 647ac31bf9db60b1685d6d8d25be65375ba85891 Mon Sep 17 00:00:00 2001
From: Aleksei Zakharov 
Date: Wed, 4 Oct 2017 11:12:23 +0300
Subject: [PATCH] Add support for ceph version luminous

This patch is not backward compatible with previous ceph versions.


Regards,
Eric

** Also affects: collectd (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: collectd (Ubuntu Xenial)
   Status: New => Won't Fix

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1774032

Title:
  Bionic: CollectD ceph plugin is incompatible with Ceph 12+ (Luminous)

Status in collectd package in Ubuntu:
  Fix Released
Status in collectd source package in Xenial:
  Won't Fix
Status in collectd source package in Bionic:
  In Progress

Bug description:
  ## DRAFT ##
  [IMPACT]
  The version of collectd shipped with Ubuntu 18.04 (Bionic) provides a ceph 
plugin that is incompatible with the version of Ceph shipped in the same 
distribution.

  The version of collectd is 5.7.2-2ubuntu1
  The version of ceph is 12.2.4-0ubuntu1.1

  This patch for collectd is required for correct interoperation with
  Ceph 12+:

   https://github.com/collectd/collectd/pull/2464

  The first version of collectd to contain this patch is 5.8.0.

  Without this patch, errors of the following form will be logged by
  collectd, and many ceph-specific metrics will not be collected:

  May 28 09:31:56 stor-a collectd[2141]: ceph plugin: 
cconn_handle_event(name=osd.2,i=0,st=4): error 1
  May 28 09:31:56 stor-a collectd[2141]: ceph plugin: ds 
Bluestore.kvFlushLat.avgtime was not properly initialized.
  May 28 09:31:56 stor-a collectd[2141]: ceph plugin: JSON handler failed with 
status -1.

  [TEST CASE]

  [POTENTIAL REGRESSION]

   * Low, Bionic oldest Ceph version support is Luminous, so the
  backward incompatibility with previous ceph versions is not a problem
  here.

   * Upstream faced a segfault situation in the Ceph plugin with Mimic
  version via issue: https://github.com/collectd/collectd/issues/2572,
  this problem is also addressed in the current SRU (d/p/ceph-plugin-
  Fix-2572.patch)

   * The new Ceph support is already part of debian and Ubuntu Cosmic
  and Disco.

  [OTHER INFORMATION]

  # Upstream commits:
  647ac31b Add support for ceph version luminous:
  
https://github.com/collectd/collectd/commit/647ac31bf9db60b1685d6d8d25be65375ba85891

  de05fb53 ceph plugin: Fix #2572:
  
https://github.com/collectd/collectd/commit/de05fb53fad6bc998f585b704ca0caeadc14a035

  $ git describe --contains 647ac31b
  collectd-5.8.0~29^2~9

  $ git describe --contains de05fb53
  collectd-5.8.1~38

  # rmadison
  ==> collectd | 5.7.2-2ubuntu1| bionic/universe
   collectd | 5.8.0-5.2 | cosmic/universe
   collectd | 5.8.1-1.2 | disco/universe

  [ORIGINAL DESCRIPTION]

  The version of collectd shipped with Ubuntu 18.04 (Bionic) provides a
  ceph plugin that is incompatible with the version of Ceph shipped in
  the same distribution.

  The version of collectd is 5.7.2-2ubuntu1
  The version of ceph is 12.2.4-0ubuntu1.1

  This patch for collectd is required for correct interoperation with
  Ceph 12+:

   https://github.com/collectd/collectd/pull/2464

  The first version of collectd to contain this patch is 5.8.0.

  Without this patch, errors of the following form will be logged by
  collectd, and many ceph-specific metrics will not be collected:

  May 28 09:31:56 stor-a collectd[2141]: ceph plugin: 
cconn_handle_event(name=osd.2,i=0,st=4): error 1
  May 28 09:31:56 stor-a collectd[2141]: ceph plugin: ds 
Bluestore.kvFlushLat.avgtime was not properly initialized.
  May 28 09:31:56 stor-a collectd[2141]: ceph plugin: JSON handler failed with 
status -1.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/collectd/+bug/1774032/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1815237] Re: stop shipping "update-pciids" in /usr/sbin

2019-03-25 Thread Eric Desrochers
** Changed in: pciutils (Ubuntu Cosmic)
 Assignee: Eric Desrochers (slashd) => (unassigned)

** Changed in: pciutils (Ubuntu Cosmic)
 Assignee: (unassigned) => Mark Thomas (markthomas)

** Changed in: pciutils (Ubuntu)
 Assignee: Eric Desrochers (slashd) => (unassigned)

** Changed in: pciutils (Ubuntu)
 Assignee: (unassigned) => Mark Thomas (markthomas)

** Changed in: pciutils (Ubuntu Cosmic)
 Assignee: Mark Thomas (markthomas) => (unassigned)

** Also affects: pciutils (Ubuntu Disco)
   Importance: Low
 Assignee: Mark Thomas (markthomas)
   Status: In Progress

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1815237

Title:
  stop shipping "update-pciids" in /usr/sbin

Status in pciutils package in Ubuntu:
  In Progress
Status in pciutils source package in Precise:
  Invalid
Status in pciutils source package in Trusty:
  In Progress
Status in pciutils source package in Xenial:
  In Progress
Status in pciutils source package in Bionic:
  In Progress
Status in pciutils source package in Cosmic:
  In Progress
Status in pciutils source package in Disco:
  In Progress

Bug description:
  [IMPACT]

  pciutils contains a script called 'update-pciids' which offer to user the 
possibilty to download new version of the PCI ID list 
  from 'http:pciids.sourceforge.net/v2.2/pci.ids' and update the file 
'/usr/share/misc/pci.ids' accordingly.

  After a discussion with foundation/security about what would be the
  best practice between (a) simply use update-pciids script or (b) do an
  sru to update the list.

  Option (b) was unanimously judge more viable. (see the irc discussion
  in the [ORIG DESCRIPTION] section.

  That brought up another aspect, should Ubuntu keep that script
  available for user. Foundation/Security team ACK on moving the script
  to '/usr/share/doc/pciutils/examples/'

  The motivation behind this is the following :
  - Injection attack where intentionally-corrupted pci.ids data exploits 
something goofy in a library that reads it.
  - It alters a dpkg-managed file in /usr/share
  - Uncheck download over http
  - 

  
  [TEST CASE]

  1) Install pciutils (if not installed already)
  # apt-get install pciutils

  The package come with a pre-define pci.ids vendor list, freeze at the end 
time it was last SRU'd, merge, sync from Debian. 
  If you perform a 'dmidecode' on a system with recent HW, dmidecode may not 
know about this new HW since the pci.ids list can have been updated before the 
HW exist, or got added to the upstream pci vendor list.

  2) Check pci.ids (pre-update)
  # stat /usr/share/misc/pci.ids 
File: /usr/share/misc/pci.ids
Size: 1062022   Blocks: 2080   IO Block: 4096   regular file
  Device: 10302h/66306d Inode: 8916914 Links: 1
  Access: (0644/-rw-r--r--)  Uid: (0/root)   Gid: (0/root)
  ==> Access: 2019-03-13 16:46:34.208000193 -0400
  ==> Modify: 2017-04-24 14:35:32.0 -0400
  ==> Change: 2019-03-04 15:19:41.001315621 -0500
   Birth: -

  3) Update pci.ids
  # update-pciids 
  Downloaded daily snapshot dated 2019-03-14 03:15:02

  4) Check pci.ids (pre-update)
  # stat /usr/share/misc/pci.ids 
File: /usr/share/misc/pci.ids
Size: 1169201   Blocks: 2288   IO Block: 4096   regular file
  Device: 10302h/66306d Inode: 8916466 Links: 1
  Access: (0644/-rw-r--r--)  Uid: (0/root)   Gid: (0/root)
  ==> Access: 2019-03-14 03:15:02.0 -0400
  ==> Modify: 2019-03-14 03:15:02.0 -0400
  ==> Change: 2019-03-15 12:32:25.489581638 -0400
   Birth: -

  At this point the pci.ids is updated.

  After this SRU, the above step won't be available ^.

  [REGRESSION POTENTIAL]

  User used to update their PCI vendor list using 'update-pciids' won't have it 
available anymore out of the box as it was before this SRU.
  (Unless they do the necessary manual intervention by taking the script from 
'pciutils/examples' set the executable bit and run it, as user could still use 
that way but they have to be aware of the potential risk that may or may not 
come with it.)

  At this point, it will be at user discretion to use it or not and
  judge/evaluate the risk, but the package itself will no longer offer
  the option out of the box.

  We need to file a debian bug about it, but I don't know if Debian will
  be willing to follow our chain of thought. If not we will divert from
  pciutils debian package at that aspect.

  [OTHER INFORMATION]

  For more information :
  # man update-pciids

  [ORIG DESCRIPTION]
  [Freenode #ubuntu-release discussion]

  [13:51:02]  vorlon, I also puzzle what would be the good practice, 
SRU an update of pci.ids or leave the user the decision to use update-pc

[Group.of.nepali.translators] [Bug 1821582] [NEW] Don't rely on SysV init script in logrotate config

2019-03-25 Thread Eric Desrochers
Public bug reported:

[IMPACT]

Xenial uses systemd as default now, debian salsa 
4a49edf26d405726041bee12a42d6f064145c87e, introduce a shell script, 
taking advantage of systemctl directly if systemd is active by still keeping 
Sysv init script as fallback only.

While there is no 'real' impact, I think it make total sense for a
systemd Xenial system, to use the systemctl approach for logrotation

[TEST CASE]

* On a Xenial active systemd system:

Determine the script pick the right decision approach.
# bash -vx /usr/lib/rsyslog/rsyslog-rotate

Run logrotate which contains 'include /etc/logrotate.d', thus will use the 
rsyslog log rotation information, now using '/usr/lib/rsyslog/rsyslog-rotate' 
helper.
# logrotate -vdf /etc/logrotate.conf

Check if logs rotation happeneded in /var/log.
# ls -altr /var/log

* On a Xenial active upstart system:
Determine the script pick the right decision approach.
# bash -vx /usr/lib/rsyslog/rsyslog-rotate

Run logrotate which contains 'include /etc/logrotate.d', thus will use the 
rsyslog log rotation information, now using '/usr/lib/rsyslog/rsyslog-rotate' 
helper.
# logrotate -vdf /etc/logrotate.conf

Check if logs rotation happeneded in /var/log.
# ls -altr /var/log


[POTENTIAL REGRESSION

* None, this commit introduced a new shell script (rsyslog-rotate) which uses 
systemctl directly if systemd is active (default in Xenial) but keeps the 
original Sysv init script as fallback only. 
  Meaning no behaviour change for users who decided not to use systemd on their 
Xenial system.

  /usr/lib/rsyslog/rsyslog-rotate:
  1) Check if existence of systemd, if yes; systemctl kill -s HUP 
rsyslog.service
  2) Check if existence of systemd, if no ; invoke-rc.d rsyslog rotate > 
/dev/null

[OTHER INFO]

* Salsa rsyslog repository:
https://salsa.debian.org/debian/rsyslog/commit/4a49edf26d405726041bee12a42d6f064145c87e

* First introduced:
git describe --contains 4a49edf26d405726041bee12a42d6f064145c87e
debian/8.27.0-4~1

* rmadison:
=>  rsyslog | 8.16.0-1ubuntu3  | xenial   
rsyslog | 8.32.0-1ubuntu4  | bionic   
rsyslog | 8.32.0-1ubuntu5  | cosmic   
rsyslog | 8.32.0-1ubuntu7  | disco

** Affects: rsyslog (Ubuntu)
 Importance: Undecided
 Status: Fix Released

** Affects: rsyslog (Ubuntu Xenial)
 Importance: Medium
 Assignee: Eric Desrochers (slashd)
 Status: In Progress


** Tags: sts

** Changed in: rsyslog (Ubuntu)
   Status: New => Fix Released

** Also affects: rsyslog (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Tags added: sts

** Changed in: rsyslog (Ubuntu Xenial)
   Status: New => In Progress

** Changed in: rsyslog (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: rsyslog (Ubuntu Xenial)
 Assignee: (unassigned) => Eric Desrochers (slashd)

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1821582

Title:
  Don't rely on SysV init script in logrotate config

Status in rsyslog package in Ubuntu:
  Fix Released
Status in rsyslog source package in Xenial:
  In Progress

Bug description:
  [IMPACT]

  Xenial uses systemd as default now, debian salsa 
4a49edf26d405726041bee12a42d6f064145c87e, introduce a shell script, 
  taking advantage of systemctl directly if systemd is active by still keeping 
Sysv init script as fallback only.

  While there is no 'real' impact, I think it make total sense for a
  systemd Xenial system, to use the systemctl approach for logrotation

  [TEST CASE]

  * On a Xenial active systemd system:

  Determine the script pick the right decision approach.
  # bash -vx /usr/lib/rsyslog/rsyslog-rotate

  Run logrotate which contains 'include /etc/logrotate.d', thus will use the 
rsyslog log rotation information, now using '/usr/lib/rsyslog/rsyslog-rotate' 
helper.
  # logrotate -vdf /etc/logrotate.conf

  Check if logs rotation happeneded in /var/log.
  # ls -altr /var/log

  * On a Xenial active upstart system:
  Determine the script pick the right decision approach.
  # bash -vx /usr/lib/rsyslog/rsyslog-rotate

  Run logrotate which contains 'include /etc/logrotate.d', thus will use the 
rsyslog log rotation information, now using '/usr/lib/rsyslog/rsyslog-rotate' 
helper.
  # logrotate -vdf /etc/logrotate.conf

  Check if logs rotation happeneded in /var/log.
  # ls -altr /var/log

  
  [POTENTIAL REGRESSION

  * None, this commit introduced a new shell script (rsyslog-rotate) which uses 
systemctl directly if systemd is active (default in Xenial) but keeps the 
original Sysv init script as fallback only. 
Meaning no behaviour change for users who decided not to use systemd on 
their Xenial system.

/usr/lib/rsyslog/rsyslog-rotate:
1) Check if exi

[Group.of.nepali.translators] [Bug 1746598] Re: [MIR] libnfs

2019-03-11 Thread Eric Desrochers
@cyphermox,

It was "Fix Released" for disco only[1], can we complete it for stable
releases ?

[1] - rmadison
 libnfs | 1.2.0-3| precise/universe | source
 libnfs | 1.3.0-2ubuntu1 | trusty/universe  | source
 libnfs | 1.9.8-1| xenial/universe  | source
 libnfs | 2.0.0-1~exp1   | bionic/universe  | source
 libnfs | 2.0.0-1~exp1   | cosmic/universe  | source
 => libnfs | 3.0.0-2| disco| source


** Also affects: libnfs (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Also affects: libnfs (Ubuntu Cosmic)
   Importance: Undecided
   Status: New

** Also affects: libnfs (Ubuntu Bionic)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1746598

Title:
  [MIR] libnfs

Status in libnfs package in Ubuntu:
  Fix Released
Status in libnfs source package in Xenial:
  New
Status in libnfs source package in Bionic:
  New
Status in libnfs source package in Cosmic:
  New

Bug description:
  Availability
  
  Built for all supported architectures. In sync with Debian.

  Rationale
  =
  gvfs 1.24 added an NFS backend 3 years ago. It was enabled in Debian a year 
ago, but we can't enable it in Ubuntu until libnfs is promoted to main.

  The Ubuntu bug for this feature to be enabled in gvfs is LP: #1637988

  qemu-block-extra could also enable libnfs support.

  Security
  
  No known CVEs.

  https://security-tracker.debian.org/tracker/source-package/libnfs
  https://launchpad.net/ubuntu/+source/libnfs/+cve

  Quality assurance
  =
  - Desktop Packages team is subscribed.
  - dh_auto_test runs but the tests shipped by upstream cant'b be run at build 
time since they modify the system.
  - Autopkgtests are added in 3.0.0-1, running upstream's test suite which 
includes running tests with valgrind, too.

  https://bugs.launchpad.net/ubuntu/+source/libnfs
  https://bugs.debian.org/cgi-bin/pkgreport.cgi?src=libnfs
  https://github.com/sahlberg/libnfs/issues

  https://autopkgtest.ubuntu.com/packages/libn/libnfs (failing, never passed:
  see https://bugs.debian.org/921578 )

  https://ci.debian.net/packages/libn/libnfs/ (tests aren't run in
  Debian because they request machine isolation which isn't implemented
  there yet)

  Dependencies
  
  No universe binary dependencies

  Standards compliance
  
  3.9.8, debhelper compat 9, dh7 simple rules

  Maintenance
  ===
  Actively maintained:
  https://github.com/sahlberg/libnfs

  Not team maintained in Debian.
  https://tracker.debian.org/pkg/libnfs

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libnfs/+bug/1746598/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1817903] Re: systemd-resolve appends "options edns0" to resolv.conf

2019-02-28 Thread Eric Desrochers
** Also affects: resolvconf (Ubuntu)
   Importance: Undecided
   Status: New

** Changed in: resolvconf (Ubuntu Disco)
   Importance: Undecided => High

** Changed in: resolvconf (Ubuntu Disco)
   Status: New => In Progress

** Changed in: resolvconf (Ubuntu Disco)
 Assignee: (unassigned) => Dan Streetman (ddstreet)

** Changed in: resolvconf (Ubuntu Disco)
   Importance: High => Critical

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1817903

Title:
  systemd-resolve appends "options edns0" to resolv.conf

Status in resolvconf package in Ubuntu:
  In Progress
Status in systemd package in Ubuntu:
  In Progress
Status in resolvconf source package in Trusty:
  New
Status in systemd source package in Trusty:
  Invalid
Status in resolvconf source package in Xenial:
  New
Status in systemd source package in Xenial:
  Invalid
Status in resolvconf source package in Bionic:
  New
Status in systemd source package in Bionic:
  In Progress
Status in resolvconf source package in Cosmic:
  New
Status in systemd source package in Cosmic:
  In Progress
Status in resolvconf source package in Disco:
  In Progress
Status in systemd source package in Disco:
  In Progress

Bug description:
  [impact]

  systems upgraded from pre-Bionic releases to Bionic or later will
  continue to use ifupdown/resolvconf for network conf and management,
  but resolvconf has a new systemd service in Bionic and later that
  pulls systemd-resolved stub-resolv.conf into its local configuration.
  With the recent addition of edns0 option to the stub resolver conf in
  systemd to fix bug 1811471, this means resolvconf now sets up the
  /etc/resolv.conf file to include upstream servers but also use edns.
  For any systems where the upstream resolver(s) don't support edns, dns
  lookups will break.

  [test case]

  create a xenial system with ifupdown/resolvconf, then upgrade to
  bionic (alternately it should be possible to install bionic, then
  remove netplan and install/configure ifupdown and resolvconf).  The
  system ifupdown config should include an upstream name server.

  After upgrade, the /etc/resolv.conf will contain both the upstream
  name server as well as options edns0.

  [regression potential]

  this changes how resolvconf handles system dns on bionic and later:

  1) networking is managed by ifupdown

  resolvconf is currently adding the local stub resolver to
  /etc/resolv.conf, even though in this case it doesn't know about any
  upstream name servers.  This change will remove the local stub
  resolver from /etc/resolv.conf; it should not be there.

  2) networking is managed by systemd-networkd

  resolvconf is currently setting up /etc/resolv.conf to direct all
  local dns queries to the local stub resolver, similar to how systemd-
  resolved itself configures /etc/resolv.conf.  This change will instead
  set up /etc/resolv.conf to bypass the local stub resolver, and send
  all dns queries to the upstream name server(s).

  In case #1, this change has little chance for regression; in case #2
  however, this change will bypass the local stub resolver and thus
  create more network dns traffic (since dns queries will not be cached
  locally).  However, this is how pre-Bionic releases worked, and simply
  removing resolvconf will restore systemd-resolved control of
  /etc/resolv.conf, causing the system to again use the local stub
  resolver.

  Additional regressions due to this change would likely be seen in dns
  query failures with other system configurations.

  [other info]

  This affects only Bionic and later; in Xenial and earlier, resolvconf
  does not include the 'resolvconf-pull-resolved' service to pull in the
  systemd-resolved stub config, which is what causes this problem.

  This also does not affect Debian, as it does not include the
  'resolvconf-pull-resolved' service either.

  original description:

  --

  Mint 19 (Ubuntu 18.04)

  Following latest mint update done on 24/02/2019, DNS is broken

  nslookup and dig of certain domain names work as expected, ping does
  not (ip works but not domain name)

  After a day of trial and error, testing I found that the problem lies
  with the presence of

  "options edns0"

  in /run/resolvconf/resolv.conf (link to by /etc/resolv.conf)

  With option present many dns lookups fail with both FF and chrome browswers 
and thunderbird...
  This is on a home network, with router set as dns proxy for external wan, not 
using NetworkManager

  Deleting the option on live system results in the issue immediately
  disappearing, but on reboot it is added back in (by systemd-resolve ?)

  I cannot find any option to prevent this being added, so presumably it
  is hard-coded in systemd following the update?

  systemd:
    Installed: 237-3ubuntu10.13

To manage notifications about this bug go to:
https://bug

[Group.of.nepali.translators] [Bug 1666203] Re: pam_tty_audit failed in pam_open_session

2019-02-27 Thread Eric Desrochers
** Description changed:

+ [Impact]
+ 
+  * Kernel keystroke auditing via pam_tty_audit.so not working
+  
+  * When Using the pam_tty_audit with other pam modules(ex, pam_ldap), it 
failed in pam_open_session.
+It was triggared by use uninitialized variable in 
pam_tty_audit.c::pam_open_session.
+ 
+ [Test Case]
+ 
+ 1. Install libpam-ldap
+ 2. Add the following to the end of /etc/pam.d/common-sessions
+ 
+ session required pam_tty_audit.so enable=* open_only
+ 
+ 3. When logging in with ssh etc., pam_tty_audit will fail and login fails
+ 
+ [Regression Potential]
+ 
+  * Low, we are simply including the missing header files and copy the old 
status as initialization of new.
+It's already part of Debian and Disco.
+ 
+ [Other Info]
+ 
+ # Upstream fix:
+ 
https://github.com/linux-pam/linux-pam/commit/c5f829931a22c65feffee16570efdae036524bee
+ 
+ # git describe --contains c5f829931a22c65feffee16570efdae036524bee
+ Linux-PAM-1_2_0~75
+ 
+ # rmadision pam
+ =>  pam | 1.1.8-1ubuntu2.2   | trusty-updates   | source
+ =>  pam | 1.1.8-3.2ubuntu2   | xenial   | source
+ =>  pam | 1.1.8-3.2ubuntu2.1 | xenial-updates   | source
+ =>  pam | 1.1.8-3.6ubuntu2   | bionic   | source
+ =>  pam | 1.1.8-3.6ubuntu2   | cosmic   | source
+ pam | 1.3.1-5ubuntu1 | disco| source
+ 
+ [Original Description]
+ 
  Dear Maintainer.
  
  I found a bug in pam_tty_audit.
  When Using the pam_tty_audit with other pam modules(ex, pam_ldap), it failed 
in pam_open_session.
  It was triggared by use uninitialized variable in 
pam_tty_audit.c::pam_open_session.
  
  * Enviroments
  Ubuntu 14.04.4 LTS
  linux-image-3.16.0-71-generic3.16.0-71.92~14.04.1
  libpam-ldap:amd64184-8.5ubuntu3
  libpam-modules:amd641.1.8-1ubuntu2.2
  
  Ubuntu 16.04.2 TLS
  linux-image-4.4.0-62-generic4.4.0-62.83
  libpam-ldap:amd64184-8.7ubuntu1
  libpam-modules:amd641.1.8-3.2ubuntu2
  
  * Reproduction method
  1. Install libpam-ldap.
  2. Add the following to the end of /etc/pam.d/common-sessions
  
  session required pam_tty_audit.so enable=* open_only
  
  3. When logging in with ssh etc., pam_tty_audit will fail and login fails
  
  * Solution (== 2018/04/16 Link updated ==)
  apply upstream patch
  
https://github.com/linux-pam/linux-pam/commit/c5f829931a22c65feffee16570efdae036524bee
  
  * Logs (on Ubuntu14.04)
  -- auth.log --
  May 18 14:47:03 vm sshd[2272]: Accepted publickey for test from 10.99.0.1 
port 51398 ssh2: RSA 8f:39:1c:3a:f4:9d:ca:99:67:fc:e3:fd:1e:0c:5b:a8
  May 18 14:47:03 vm sshd[2272]: pam_unix(sshd:session): session opened for 
user test by (uid=0)
  May 18 14:47:03 vm sshd[2272]: pam_tty_audit(sshd:session): error setting 
current audit status: Invalid argument
  May 18 14:47:03 vm sshd[2272]: error: PAM: pam_open_session(): Cannot 
make/remove an entry for the specified session
  May 18 14:47:03 vm sshd[2297]: Received disconnect from 10.99.0.1: 11: 
disconnected by user
  
  -- syslog --
  May 18 14:47:03 vm audispd: node=vm type=USER_ACCT 
msg=audit(1463550423.399:58): pid=2272 uid=0 auid=4294967295 ses=4294967295 
msg='op=PAM:accounting acct="test" exe="/usr/sbin/sshd" hostname=10.99.0.1 
addr=10.99.0.1 terminal=ssh res=success'
  May 18 14:47:03 vm audispd: node=vm type=CRED_ACQ 
msg=audit(1463550423.403:59): pid=2272 uid=0 auid=4294967295 ses=4294967295 
msg='op=PAM:setcred acct="test" exe="/usr/sbin/sshd" hostname=10.99.0.1 
addr=10.99.0.1 terminal=ssh res=success'
  May 18 14:47:03 vm audispd: node=vm type=LOGIN msg=audit(1463550423.403:60): 
pid=2272 uid=0 old-auid=4294967295 auid=20299 old-ses=4294967295 ses=3 res=1
  May 18 14:47:03 vm audispd: node=vm type=CONFIG_CHANGE 
msg=audit(1463550423.403:61): pid=2272 uid=0 auid=20299 ses=3 op=tty_set 
old-enabled=0 new-enabled=1 old-log_passwd=0 new-log_passwd=32743 res=0
  May 18 14:47:03 vm audispd: node=vm type=USER_START 
msg=audit(1463550423.447:62): pid=2272 uid=0 auid=20299 ses=3 
msg='op=PAM:session_open acct="test" exe="/usr/sbin/sshd" hostname=10.99.0.1 
addr=10.99.0.1 terminal=ssh res=failed'
  May 18 14:47:03 vm audispd: node=vm type=CRED_ACQ 
msg=audit(1463550423.447:63): pid=2297 uid=0 auid=20299 ses=3 
msg='op=PAM:setcred acct="test" exe="/usr/sbin/sshd" hostname=10.99.0.1 
addr=10.99.0.1 terminal=ssh res=success'
  May 18 14:47:03 vm audispd: node=vm type=CRED_DISP 
msg=audit(1463550423.451:64): pid=2272 uid=0 auid=20299 ses=3 
msg='op=PAM:setcred acct="test" exe="/usr/sbin/sshd" hostname=10.99.0.1 
addr=10.99.0.1 terminal=ssh res=success'
  
  Thanks regards.

** Also affects: pam (Ubuntu Cosmic)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1666203

Title:
  pam_tty_audit failed in pam_open_session

Status in pam package in Ubuntu:
  Fix Released
Status in pam 

[Group.of.nepali.translators] [Bug 1815237] Re: stop shipping "update-pciids" in /usr/sbin

2019-02-20 Thread Eric Desrochers
** Changed in: pciutils (Ubuntu Precise)
   Status: New => Invalid

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1815237

Title:
  stop shipping "update-pciids" in /usr/sbin

Status in pciutils package in Ubuntu:
  In Progress
Status in pciutils source package in Precise:
  Invalid
Status in pciutils source package in Trusty:
  In Progress
Status in pciutils source package in Xenial:
  In Progress
Status in pciutils source package in Bionic:
  In Progress
Status in pciutils source package in Cosmic:
  In Progress

Bug description:
  [Freenode #ubuntu-release discussion]

  [13:51:02]  vorlon, I also puzzle what would be the good practice, 
SRU an update of pci.ids or leave the user the decision to use update-pciids 
which does it automatically
  [13:52:13]  slashd: That second option isn't a great one, for many 
reasons.
  [13:52:21]  slashd: ^^ I concur
  [13:52:55]  slashd: The two that come to mind is (a) it alters a 
dpkg-managed file in /usr/share and (b) it's an entirely unchecked random 
download over http.
  [13:53:17]  In fact, I'm a bit shocked we even ship that script at 
all, or haven't at least neutered it in some way.
  [13:54:40]  That's just begging for an injection attack where 
intentionally-corrupted pci.ids data exploits something goofy in a library that 
reads it.
  [13:55:00]  infinity, good point
  [13:56:05]  If we were to give that as an option, we'd need to 
alter the script (and things that read that data) to use a second user-writable 
location in /var, and we'd need upstream to provide a signed/verifiable source 
we can pull from.
  [13:56:23]  But I think "stop shipping the script on the PATH" is a 
saner plan.
  [13:58:26]  slashd: Maybe get some input from someone like mdeslaur 
or sarnold to see if they think I'm being overly paranoid, but I think having a 
script on path that downloads random junk over http and slams it in a file in 
/usr/share that gets read by dozens of other binaries is pretty sketchy.
  [13:58:40]  slashd: So I'd be +1 on just nuking it.
  [13:59:08]  infinity, ack will try to have a ACK for security team as 
well, but sound like a good plan
  [13:59:14]  slashd: Or moving it to /use/share/doc/pciutils/examples
  [14:00:23]  infinity, vorlon ok thanks a lot for your help
  [14:00:28]  oh ew ew ew ew
  [14:01:01]  yeah, moving it to examples would be a good idea
  [14:01:21]  mdeslaur, ack tks

  SRU team: +1
  Security team: +1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/pciutils/+bug/1815237/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1816388] [NEW] FTBFS on s390x on xenial

2019-02-18 Thread Eric Desrochers
Public bug reported:

[Impact]

libguestfs doesn't build on s390x architecture

* Pending SRU (xenial)
libguestfs s390x: Failed to build
https://launchpad.net/ubuntu/+source/libguestfs/1:1.32.2-4ubuntu2.1/+build/16379018

* Build log
...
checking for qemu-system-s390x... no
configure: error: qemu must be installed
...

[Test Case]

* Build libguestfs for s390x in Launchpad (PPA)

[Regression Potential]

None, the package doesn't build. The fix is already in other releases.
The package will no longer relies on qemu-system-misc in favor of 
qemu-system-s390x now.

[Other informations]

* git-ubuntu (libguestfs)
commit 3928bd5f1458d199cd93e415c9a8081d28048500)

* debdiff

The following should help the build for that particular FTBFS situation
(if no other build problem found after)

diff -Nru libguestfs-1.32.2/debian/control libguestfs-1.32.2/debian/control
--- libguestfs-1.32.2/debian/control2016-03-13 16:04:12.0 +
+++ libguestfs-1.32.2/debian/control2019-02-15 14:24:56.0 +
@@ -18,7 +18,7 @@
   gperf, libxml2-utils,
   qemu-system-arm [armel armhf arm64],
   qemu-system-mips [mips mipsel mips64 mips64el],
 - qemu-system-misc [s390x],
 + qemu-system-s390x [s390x],
   qemu-system-ppc [powerpc ppc64 ppc64el],
   qemu-system-aarch64 [arm64],
   qemu-system-sparc [sparc],
@@ -154,7 +154,7 @@
   supermin (>= 5),
   qemu-system-arm [armel armhf arm64],
   qemu-system-mips [mips mipsel mips64 mips64el],
 - qemu-system-misc [s390x],
 + qemu-system-s390x [s390x],
   qemu-system-aarch64 [arm64],
   qemu-system-ppc [powerpc pc64 ppc64el],
   qemu-system-sparc [sparc],

** Affects: libguestfs (Ubuntu)
 Importance: Undecided
 Status: Fix Released

** Affects: libguestfs (Ubuntu Xenial)
 Importance: Medium
 Assignee: Ioanna Alifieraki (joalif)
 Status: In Progress


** Tags: sts

** Also affects: libguestfs (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Summary changed:

- FTBFS on s390x
+ FTBFS on s390x on xenial

** Changed in: libguestfs (Ubuntu)
   Status: New => Fix Released

** Changed in: libguestfs (Ubuntu Xenial)
   Status: New => In Progress

** Changed in: libguestfs (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: libguestfs (Ubuntu Xenial)
 Assignee: (unassigned) => Ioanna Alifieraki (joalif)

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1816388

Title:
  FTBFS on s390x on xenial

Status in libguestfs package in Ubuntu:
  Fix Released
Status in libguestfs source package in Xenial:
  In Progress

Bug description:
  [Impact]

  libguestfs doesn't build on s390x architecture

  * Pending SRU (xenial)
  libguestfs s390x: Failed to build
  
https://launchpad.net/ubuntu/+source/libguestfs/1:1.32.2-4ubuntu2.1/+build/16379018

  * Build log
  ...
  checking for qemu-system-s390x... no
  configure: error: qemu must be installed
  ...

  [Test Case]

  * Build libguestfs for s390x in Launchpad (PPA)

  [Regression Potential]

  None, the package doesn't build. The fix is already in other releases.
  The package will no longer relies on qemu-system-misc in favor of 
qemu-system-s390x now.

  [Other informations]

  * git-ubuntu (libguestfs)
  commit 3928bd5f1458d199cd93e415c9a8081d28048500)

  * debdiff

  The following should help the build for that particular FTBFS situation
  (if no other build problem found after)

  diff -Nru libguestfs-1.32.2/debian/control libguestfs-1.32.2/debian/control
  --- libguestfs-1.32.2/debian/control  2016-03-13 16:04:12.0 +
  +++ libguestfs-1.32.2/debian/control  2019-02-15 14:24:56.0 +
  @@ -18,7 +18,7 @@
     gperf, libxml2-utils,
     qemu-system-arm [armel armhf arm64],
     qemu-system-mips [mips mipsel mips64 mips64el],
   - qemu-system-misc [s390x],
   + qemu-system-s390x [s390x],
     qemu-system-ppc [powerpc ppc64 ppc64el],
     qemu-system-aarch64 [arm64],
     qemu-system-sparc [sparc],
  @@ -154,7 +154,7 @@
     supermin (>= 5),
     qemu-system-arm [armel armhf arm64],
     qemu-system-mips [mips mipsel mips64 mips64el],
   - qemu-system-misc [s390x],
   + qemu-system-s390x [s390x],
     qemu-system-aarch64 [arm64],
     qemu-system-ppc [powerpc pc64 ppc64el],
     qemu-system-sparc [sparc],

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libguestfs/+bug/1816388/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1815212] Re: [Xenial][SRU] Update pci.ids for pciutils

2019-02-10 Thread Eric Desrochers
** Description changed:

  [Impact]
  
  pci.ids table in Xenial seems a little bit behind in term of new device
  id added since last time it was updated.
  
  Some user are observing that their new device doesn't show up because
  they don't exist in the pci.ids file yet.
  
- User or troubleshooter may get a wrong impression that the correct raid
- controller is not present, if the user doesn't read the PCI bus address.
+ User or troubleshooter may get a wrong impression that, for instance,
+ the correct raid controller is not present, if the user doesn't read the
+ PCI bus address.
+ 
+ While we are here, I will update Xenial and Bionic to be at the same
+ version level (Version: 2018.07.21) of current devel release (Disco)
+ which isn't too far behind current upstream (github) one in master
+ branch.
+ 
+ x/pciutils-3.3.1/pci.ids:#Version: 2016.01.02
+ b/pciutils-3.5.2/pci.ids:#Version: 2017.03.16
+ c/pciutils-3.5.2/pci.ids:#Version: 2018.07.21
+ d/pciutils-3.5.2/pci.ids:#Version: 2018.07.21
+ upstream/pciutils/pci.ids:#   Version: 2018.08.12
+ 
  
  [Test case]
  
  Here's an example took by a user using a device id (0014) not in the
  Xenial pci.ids table:
  
  Xenial:
  60:00.0 RAID bus controller: LSI Logic / Symbios Logic Device 0014 (rev 01)
  
  Bionic:
  60:00.0 RAID bus controller: LSI Logic / Symbios Logic MegaRAID Tri-Mode 
SAS3516 (rev 01)
  
  [Regression Potential]
  
- Low, no core functionality change. The intention is to only update
- pci.ids table list.
+ Low, no core functionality change. 
+ The intention is to only update pci.ids table list to recognize new pci 
vendor list/hw.
  
  The only thing I can think of ...
  In some cases there is some device id renaming, which I guess can "possibly" 
impact some user script or HW inventory solution expecting a certain type of 
device id output.
  
  Example:
  - 67df  Ellesmere [Polaris10]
  + 67df  Ellesmere [Radeon RX 470/480]
  
  [Other information]
- 
- An update of pci.ids has been made on October 3rd 2016.
- This update include the device id 0014 (took from the example in "Test Case".)
- 
- Upstream repository:
- https://github.com/pciutils/pciutils.git
- 
- Upstream commits:
- # git log --oneline v3.3.1..v3.5.2 pci.ids ## Update done between Xenial and 
Bionic
- 701fdd1 Updated pci.ids to today's snapshot
- 8c2d87f Updated pci.ids to today's snapshot
- 07a250f pci.ids updated to today's snapshot
- 73debb0 Updated pci.ids to today's snapshot
- 
- # From the example in the [Test Case]:
- # git show 701fdd1
- ..
- + 0014 MegaRAID Tri-Mode SAS3516
- ..
- 
- # git describe --contains 701fdd1
- v3.5.2~1
- 
- # rmadison pciutils
- ==> pciutils | 1:3.3.1-1.1ubuntu1.2 | xenial-updates
- pciutils | 1:3.5.2-1ubuntu1 | bionic
- pciutils | 1:3.5.2-1ubuntu2 | cosmic
- pciutils | 1:3.5.2-1ubuntu2 | disco
- --

** Also affects: pciutils (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Changed in: pciutils (Ubuntu Bionic)
   Status: New => In Progress

** Changed in: pciutils (Ubuntu Bionic)
   Importance: Undecided => Low

** Changed in: pciutils (Ubuntu Bionic)
 Assignee: (unassigned) => Eric Desrochers (slashd)

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1815212

Title:
  [Xenial][SRU] Update pci.ids for pciutils

Status in pciutils package in Ubuntu:
  Fix Released
Status in pciutils source package in Xenial:
  In Progress
Status in pciutils source package in Bionic:
  In Progress

Bug description:
  [Impact]

  pci.ids table in Xenial seems a little bit behind in term of new
  device id added since last time it was updated.

  Some user are observing that their new device doesn't show up because
  they don't exist in the pci.ids file yet.

  User or troubleshooter may get a wrong impression that, for instance,
  the correct raid controller is not present, if the user doesn't read
  the PCI bus address.

  While we are here, I will update Xenial and Bionic to be at the same
  version level (Version: 2018.07.21) of current devel release (Disco)
  which isn't too far behind current upstream (github) one in master
  branch.

  x/pciutils-3.3.1/pci.ids:#Version: 2016.01.02
  b/pciutils-3.5.2/pci.ids:#Version: 2017.03.16
  c/pciutils-3.5.2/pci.ids:#Version: 2018.07.21
  d/pciutils-3.5.2/pci.ids:#Version: 2018.07.21
  upstream/pciutils/pci.ids:#   Version: 2018.08.12

  
  [Test case]

  Here's an example took by a user using a device id (0014) not in the
  Xenial pci.ids table:

  Xenial:
  60:00.0 RAID bus controller: LSI Logic / Symbios Logic Device 0014 (rev 01)

  Bionic:
  60:00.0 RAID bus controller: LSI Logic / Symbios Logic MegaRAID Tri-Mode 
SAS3516 (rev 01)

  [Regression Potential]

  Low, no core functionality chan

[Group.of.nepali.translators] [Bug 1815237] [NEW] stop shipping "update-pciids"

2019-02-08 Thread Eric Desrochers
Public bug reported:

[Freenode #ubuntu-release discussion]

[13:51:02]  vorlon, I also puzzle what would be the good practice, SRU 
an update of pci.ids or leave the user the decision to use update-pciids which 
does it automatically
[13:52:13]  slashd: That second option isn't a great one, for many 
reasons.
[13:52:21]  slashd: ^^ I concur
[13:52:55]  slashd: The two that come to mind is (a) it alters a 
dpkg-managed file in /usr/share and (b) it's an entirely unchecked random 
download over http.
[13:53:17]  In fact, I'm a bit shocked we even ship that script at 
all, or haven't at least neutered it in some way.
[13:54:40]  That's just begging for an injection attack where 
intentionally-corrupted pci.ids data exploits something goofy in a library that 
reads it.
[13:55:00]  infinity, good point
[13:56:05]  If we were to give that as an option, we'd need to alter 
the script (and things that read that data) to use a second user-writable 
location in /var, and we'd need upstream to provide a signed/verifiable source 
we can pull from.
[13:56:23]  But I think "stop shipping the script on the PATH" is a 
saner plan.
[13:58:26]  slashd: Maybe get some input from someone like mdeslaur 
or sarnold to see if they think I'm being overly paranoid, but I think having a 
script on path that downloads random junk over http and slams it in a file in 
/usr/share that gets read by dozens of other binaries is pretty sketchy.
[13:58:40]  slashd: So I'd be +1 on just nuking it.
[13:59:08]  infinity, ack will try to have a ACK for security team as 
well, but sound like a good plan
[13:59:14]  slashd: Or moving it to /use/share/doc/pciutils/examples
[14:00:23]  infinity, vorlon ok thanks a lot for your help
[14:00:28]  oh ew ew ew ew
[14:01:01]  yeah, moving it to examples would be a good idea
[14:01:21]  mdeslaur, ack tks

SRU team: +1
Security team: +1

** Affects: pciutils (Ubuntu)
 Importance: Low
 Assignee: Eric Desrochers (slashd)
 Status: In Progress

** Affects: pciutils (Ubuntu Trusty)
 Importance: Undecided
 Status: New

** Affects: pciutils (Ubuntu Xenial)
 Importance: Undecided
 Status: New

** Affects: pciutils (Ubuntu Bionic)
 Importance: Undecided
 Status: New

** Affects: pciutils (Ubuntu Cosmic)
 Importance: Undecided
 Status: New

** Changed in: pciutils (Ubuntu)
 Assignee: (unassigned) => Eric Desrochers (slashd)

** Changed in: pciutils (Ubuntu)
   Importance: Undecided => Low

** Changed in: pciutils (Ubuntu)
   Status: New => In Progress

** Also affects: pciutils (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Also affects: pciutils (Ubuntu Cosmic)
   Importance: Undecided
   Status: New

** Also affects: pciutils (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: pciutils (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Summary changed:

- drop "update-pciids" for security reasons
+ stop shipping "update-pciids"

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1815237

Title:
  stop shipping "update-pciids"

Status in pciutils package in Ubuntu:
  In Progress
Status in pciutils source package in Trusty:
  New
Status in pciutils source package in Xenial:
  New
Status in pciutils source package in Bionic:
  New
Status in pciutils source package in Cosmic:
  New

Bug description:
  [Freenode #ubuntu-release discussion]

  [13:51:02]  vorlon, I also puzzle what would be the good practice, 
SRU an update of pci.ids or leave the user the decision to use update-pciids 
which does it automatically
  [13:52:13]  slashd: That second option isn't a great one, for many 
reasons.
  [13:52:21]  slashd: ^^ I concur
  [13:52:55]  slashd: The two that come to mind is (a) it alters a 
dpkg-managed file in /usr/share and (b) it's an entirely unchecked random 
download over http.
  [13:53:17]  In fact, I'm a bit shocked we even ship that script at 
all, or haven't at least neutered it in some way.
  [13:54:40]  That's just begging for an injection attack where 
intentionally-corrupted pci.ids data exploits something goofy in a library that 
reads it.
  [13:55:00]  infinity, good point
  [13:56:05]  If we were to give that as an option, we'd need to 
alter the script (and things that read that data) to use a second user-writable 
location in /var, and we'd need upstream to provide a signed/verifiable source 
we can pull from.
  [13:56:23]  But I think "stop shipping the script on the PATH" is a 
saner plan.
  [13:58:26]  slashd: Maybe get some input from someone like mdeslaur 
or sarnold to see if they think I'm being overly paranoid, but I think having a 
script on path that downloads random

[Group.of.nepali.translators] [Bug 1815212] [NEW] [Xenial][SRU] Update pci.ids for pciutils

2019-02-08 Thread Eric Desrochers
Public bug reported:

[Impact]

pci.ids table in Xenial seems a little bit behind in term of new device
id added since last time it was updated.

Some user are observing that their new device doesn't show up because
they don't exist in the pci.ids file yet.

IMHO, it would be a good idea to update the Xenial pci.ids to represent
what Bionic has as of today.

[Test case]

Here's an example took by a user using a device id (0014) not in the
Xenial pci.ids table:

Xenial:
60:00.0 RAID bus controller: LSI Logic / Symbios Logic Device 0014 (rev 01)

Bionic:
60:00.0 RAID bus controller: LSI Logic / Symbios Logic MegaRAID Tri-Mode 
SAS3516 (rev 01)

[Regression Potential]

[Other information]

An update of pci.ids has been made on October 3rd 2016.
This update include the device id 0014 (took from the example in "Test Case".)

upstream repository:
https://github.com/pciutils/pciutils.git

Upstream commit:
https://github.com/pciutils/pciutils/commit/701fdd1e

# git show 701fdd1e | grep SAS3516
..
+   0014 MegaRAID Tri-Mode SAS3516
..

# git describe --contains 701fdd1e
v3.5.2~1

# rmadison pciutils
==> pciutils | 1:3.3.1-1.1ubuntu1.2 | xenial-updates 
pciutils | 1:3.5.2-1ubuntu1 | bionic 
pciutils | 1:3.5.2-1ubuntu2 | cosmic 
pciutils | 1:3.5.2-1ubuntu2 | disco 
--

** Affects: pciutils (Ubuntu)
 Importance: Undecided
 Status: Fix Released

** Affects: pciutils (Ubuntu Xenial)
 Importance: Undecided
     Assignee: Eric Desrochers (slashd)
 Status: In Progress


** Tags: sts

** Also affects: pciutils (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Description changed:

  [Impact]
  
  pci.ids table in Xenial seems a little bit behind in term of new device
- id added since last time he was updated.
+ id added since last time it was updated.
  
  Some user are observe that their new device doesn't show up because they
  don't exist in the pci.ids file yet.
  
  IMHO, it would be a good idea to update the Xenial pci.ids to more or
  less represent what Bionic has as of today.
  
  [Test case]
  
  Here's an example took by a user using a device id (0014) not in the
  Xenial pci.ids table:
  
  Xenial:
- 60:00.0 RAID bus controller: LSI Logic / Symbios Logic Device 0014 (rev 01) 
+ 60:00.0 RAID bus controller: LSI Logic / Symbios Logic Device 0014 (rev 01)
  
  Bionic:
  60:00.0 RAID bus controller: LSI Logic / Symbios Logic MegaRAID Tri-Mode 
SAS3516 (rev 01)
  
  [Regression Potential]
  
  [Other information]
  
- An update of pci.ids has been made on October 3rd 2016. 
+ An update of pci.ids has been made on October 3rd 2016.
  This update include the device id 0014 (took from the example in "Test Case".)
  
  upstream repository : https://github.com/pciutils/pciutils.git
  
  # git show 701fdd1e | grep SAS3516
  ..
  + 0014 MegaRAID Tri-Mode SAS3516
  ..
  
  # git describe --contains 701fdd1e
  v3.5.2~1
  
  # rmadison pciutils
  ==> pciutils | 1:3.3.1-1.1ubuntu1.2 | xenial-updates | source, amd64, arm64, 
armhf, i386, powerpc, ppc64el, s390x
  pciutils | 1:3.5.2-1ubuntu1 | bionic | source, amd64, arm64, armhf, i386, 
ppc64el, s390x
  pciutils | 1:3.5.2-1ubuntu2 | cosmic | source, amd64, arm64, armhf, i386, 
ppc64el, s390x
  pciutils | 1:3.5.2-1ubuntu2 | disco | source, amd64, arm64, armhf, i386, 
ppc64el, s390x
  --

** Changed in: pciutils (Ubuntu)
   Status: New => Fix Released

** Tags added: sts

** Description changed:

  [Impact]
  
  pci.ids table in Xenial seems a little bit behind in term of new device
  id added since last time it was updated.
  
  Some user are observe that their new device doesn't show up because they
  don't exist in the pci.ids file yet.
  
  IMHO, it would be a good idea to update the Xenial pci.ids to more or
  less represent what Bionic has as of today.
  
  [Test case]
  
  Here's an example took by a user using a device id (0014) not in the
  Xenial pci.ids table:
  
  Xenial:
  60:00.0 RAID bus controller: LSI Logic / Symbios Logic Device 0014 (rev 01)
  
  Bionic:
  60:00.0 RAID bus controller: LSI Logic / Symbios Logic MegaRAID Tri-Mode 
SAS3516 (rev 01)
  
  [Regression Potential]
  
  [Other information]
  
  An update of pci.ids has been made on October 3rd 2016.
  This update include the device id 0014 (took from the example in "Test Case".)
  
  upstream repository : https://github.com/pciutils/pciutils.git
  
+ Upstream commit:
+ https://github.com/pciutils/pciutils/commit/701fdd1e
+ 
  # git show 701fdd1e | grep SAS3516
  ..
  + 0014 MegaRAID Tri-Mode SAS3516
  ..
  
  # git describe --contains 701fdd1e
  v3.5.2~1
  
  # rmadison pciutils
  ==> pciutils | 1:3.3.1-1.1ubuntu1.2 | xenial-updates | source, amd64, arm64, 
armhf, i386, powerpc, ppc64el, s390x
  pciutils | 1:3.5.2-1ubuntu1 | bionic | source, amd64, arm64, armhf, i386, 
ppc64el, s390x
  pciutils | 1:3.5.2-1ubuntu2 | cosmic | source, amd64, arm64, armhf, i386, 
p

[Group.of.nepali.translators] [Bug 1573594] Re: Missing null termination in PROTOCOL_BINARY_CMD_SASL_LIST_MECHS response handling

2019-02-07 Thread Eric Desrochers
** Changed in: libmemcached (Ubuntu Trusty)
   Status: Fix Committed => Invalid

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1573594

Title:
  Missing null termination in PROTOCOL_BINARY_CMD_SASL_LIST_MECHS
  response handling

Status in libmemcached package in Ubuntu:
  Fix Released
Status in libmemcached source package in Trusty:
  Invalid
Status in libmemcached source package in Xenial:
  Fix Released
Status in libmemcached source package in Bionic:
  Fix Released
Status in libmemcached source package in Cosmic:
  Fix Released
Status in libmemcached source package in Disco:
  Fix Released
Status in libmemcached package in Debian:
  New

Bug description:
  [Impact]

  When connecting to a server using SASL,
  memcached_sasl_authenticate_connection() reads the list of supported
  mechanisms [1] from the server via the command
  PROTOCOL_BINARY_CMD_SASL_LIST_MECHS. The server's response is a string
  containing supported authentication mechanisms, which gets stored into
  the (uninitialized) destination buffer without null termination [2].

  The buffer then gets passed to sasl_client_start [3] which treats it
  as a null-terminated string [4], reading uninitialised bytes in the
  buffer.

  As the buffer lives on the stack, an attacker that can put strings on
  the stack before the connection gets made, might be able to tamper
  with the authentication.

  [1] libmemcached/sasl.cc:174
  [2] libmemcached/response.cc:619
  [1] libmemcached/sasl.cc:231
  [3] http://linux.die.net/man/3/sasl_client_start

  [Test Case]

  This bug is difficult to reproduce since it depends on the contents of the 
stack.
  However, here is a test case using the fix on Bionic that shows that this fix 
does not cause any problems.

  For testing you need

  1) A memcached server.
     You can setup one by following the instructions in [1],
     or (what I did) create one in the cloud [2].

  2) A client test program to connect to the memcached server.
     One can be found in [3].
     This simple test connects to a memcache server and test basic get/set 
operations.
     Copy paste the C code into a file (sals_test.c) and compile with :
     gcc -o sasl_test -O2 sasl_test.c -lmemcached -pthread

  3) On a machine with the updated version of libmemcached in which the fix is 
applied :
     jo@bionic-vm:~$ dpkg -l | grep libmemcached
  ii  libhashkit-dev:amd64  1.0.18-4.2ubuntu0.18.04.1   
   amd64libmemcached hashing functions and algorithms (development 
files)
  ii  libhashkit2:amd64 1.0.18-4.2ubuntu0.18.04.1   
   amd64libmemcached hashing functions and algorithms
  ii  libmemcached-dbg:amd641.0.18-4.2ubuntu0.18.04.1   
   amd64Debug Symbols for libmemcached
  ii  libmemcached-dev:amd641.0.18-4.2ubuntu0.18.04.1   
   amd64C and C++ client library to the memcached server (development 
files)
  ii  libmemcached-tools1.0.18-4.2ubuntu0.18.04.1   
   amd64Commandline tools for talking to memcached via libmemcached
  ii  libmemcached11:amd64  1.0.18-4.2ubuntu0.18.04.1   
   amd64C and C++ client library to the memcached server
  ii  libmemcachedutil2:amd64   1.0.18-4.2ubuntu0.18.04.1   
   amd64library implementing connection pooling for libmemcached

     Run the sals_test binary :
     #./sasl_test [username] [password] [server]

     In my case using the credentials and the server created in step 1 :
     jo@bionic-vm:~$ ./sasl_test 88BAB0 1A99094B77C8935ED9F1461C767DB1F9 
mc2.dev.eu.ec2.memcachier.com
     Get/Set success!

  [1] https://blog.couchbase.com/sasl-memcached-now-available/
  [2] https://www.memcachier.com/
  [3] 
https://blog.memcachier.com/2014/11/05/ubuntu-libmemcached-and-sasl-support/

  [Regression Potential]

  This fix initialises the buffer to 0.
  Any potential regression may include failure of the authentication when using 
SASL.

  * When running autopkgtest for xenial/armhf it fails on gearmand : 
http://autopkgtest.ubuntu.com/packages/g/gearmand/xenial/armhf .
  However this is a long standing issue with gearmand and it is not related 
with the current SRU.

  
  [Other Info]

  This bug affects trusty and later.

  * rmadison:
   libmemcached | 1.0.8-1ubuntu2 | trusty  | source
   libmemcached | 1.0.18-4.1 | xenial  | source
   libmemcached | 1.0.18-4.2 | bionic  | source
   libmemcached | 1.0.18-4.2 | cosmic  | source
   libmemcached | 1.0.18-4.2 | disco   | source

  * Debian bug:
  https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=919696

  * Upstream seems pretty quiet since 2014

  Unfortunately, because the project seems more or less dead ... it
  seems like we won't be able submit anything upstre

[Group.of.nepali.translators] [Bug 1814939] Re: libguestfs fails to build on Xenial - dh_install --fail-missing

2019-02-06 Thread Eric Desrochers
** Also affects: libguestfs (Ubuntu Xenial)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1814939

Title:
  libguestfs fails to build on Xenial - dh_install --fail-missing

Status in libguestfs package in Ubuntu:
  New
Status in libguestfs source package in Xenial:
  In Progress

Bug description:
  Ubuntu Version :
  $ lsb_release -rd
  Description:  Ubuntu 16.04.5 LTS
  Release:  16.04

  libguestfs version : 1:1.32.2-4ubuntu2

  When trying to build libguestfs on Ubuntu 16.04 - Xenial, it fails at
  :

  dh_install -X.la -X.so.owner -Xbindtests -X/usr/lib/go/ -Xpackages.orig \
  --fail-missing
  dh_install: usr/lib/go-1.6/pkg/linux_amd64/libguestfs.org/guestfs/guestfs.a 
exists in debian/tmp but is not installed to anywhere
  dh_install: 
usr/lib/go-1.6/src/pkg/libguestfs.org/guestfs/guestfs_040_create_multiple_test.go
 exists in debian/tmp but is not installed to anywhere
  dh_install: 
usr/lib/go-1.6/src/pkg/libguestfs.org/guestfs/guestfs_100_launch_test.go exists 
in debian/tmp but is not installed to anywhere
  dh_install: 
usr/lib/go-1.6/src/pkg/libguestfs.org/guestfs/guestfs_070_optargs_test.go 
exists in debian/tmp but is not installed to anywhere
  dh_install: 
usr/lib/go-1.6/src/pkg/libguestfs.org/guestfs/guestfs_060_explicit_close_test.go
 exists in debian/tmp but is not installed to anywhere
  dh_install: 
usr/lib/go-1.6/src/pkg/libguestfs.org/guestfs/guestfs_010_load_test.go exists 
in debian/tmp but is not installed to anywhere
  dh_install: 
usr/lib/go-1.6/src/pkg/libguestfs.org/guestfs/guestfs_900_rstringlist_test.go 
exists in debian/tmp but is not installed to anywhere
  dh_install: usr/lib/go-1.6/src/pkg/libguestfs.org/guestfs/guestfs.go exists 
in debian/tmp but is not installed to anywhere
  dh_install: 
usr/lib/go-1.6/src/pkg/libguestfs.org/guestfs/guestfs_030_create_flags_test.go 
exists in debian/tmp but is not installed to anywhere
  dh_install: 
usr/lib/go-1.6/src/pkg/libguestfs.org/guestfs/guestfs_020_create_test.go exists 
in debian/tmp but is not installed to anywhere
  dh_install: 
usr/lib/go-1.6/src/pkg/libguestfs.org/guestfs/guestfs_050_handle_properties_test.go
 exists in debian/tmp but is not installed to anywhere
  dh_install: missing files, aborting
  debian/rules:118: recipe for target 'override_dh_install' failed

  This happens because the dh_install excludes the /usr/lib/go files 
(-X/usr/lib/go)
  but does not exclude the /usr/lib/go- for the specific version of go.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libguestfs/+bug/1814939/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1812696] Re: APT doc and manpage uses wrong ubuntu-codename

2019-01-21 Thread Eric Desrochers
juliank will include the ubuntu-codename variable change in his next SRU
later this week.

Thanks Juliank !

** Tags added: sts

** Changed in: apt (Ubuntu Trusty)
   Status: New => Invalid

** Description changed:

  From APT src code :
  
- --- 
- * trusty: 
- apt-1.0.1ubuntu2.18/doc/apt-verbatim.ent: 
+ ---
+ [GOOD ubuntu-codename]
+ * trusty:
+ apt-1.0.1ubuntu2.18/doc/apt-verbatim.ent:
  
- * xenial: 
- apt-1.2.29/doc/apt-verbatim.ent: 
+ [WRONG ubuntu-codename]
+ * xenial:
+ apt-1.2.29/doc/apt-verbatim.ent:
  
- * bionic: 
- apt-1.6.7/doc/apt-verbatim.ent: 
+ * bionic:
+ apt-1.6.7/doc/apt-verbatim.ent:
  
- * disco: 
- apt-1.8.0~alpha3/doc/apt-verbatim.ent: 
- --- 
+ * disco:
+ apt-1.8.0~alpha3/doc/apt-verbatim.ent:
+ ---
  
- * vendor/ubuntu/sources.list.in 
- --- 
- # See sources.list(5) manpage for more information 
- # Remember that CD-ROMs, DVDs and such are managed through the apt-cdrom 
tool. 
- deb http://us.archive.ubuntu.com/ubuntu &ubuntu-codename; main restricted 
- deb-src http://us.archive.ubuntu.com/ubuntu &ubuntu-codename; main restricted 
+ * vendor/ubuntu/sources.list.in
+ ---
+ # See sources.list(5) manpage for more information
+ # Remember that CD-ROMs, DVDs and such are managed through the apt-cdrom tool.
+ deb http://us.archive.ubuntu.com/ubuntu &ubuntu-codename; main restricted
+ deb-src http://us.archive.ubuntu.com/ubuntu &ubuntu-codename; main restricted
  
- deb http://security.ubuntu.com/ubuntu &ubuntu-codename;-security main 
restricted 
- deb-src http://security.ubuntu.com/ubuntu &ubuntu-codename;-security main 
restricted 
+ deb http://security.ubuntu.com/ubuntu &ubuntu-codename;-security main 
restricted
+ deb-src http://security.ubuntu.com/ubuntu &ubuntu-codename;-security main 
restricted
  
- deb http://us.archive.ubuntu.com/ubuntu &ubuntu-codename;-updates main 
restricted 
- deb-src http://us.archive.ubuntu.com/ubuntu &ubuntu-codename;-updates main 
restricted 
- --- 
+ deb http://us.archive.ubuntu.com/ubuntu &ubuntu-codename;-updates main 
restricted
+ deb-src http://us.archive.ubuntu.com/ubuntu &ubuntu-codename;-updates main 
restricted
+ ---
  
  The ubuntu-codename variable for Bionic and late in APT points to Xenial
  which generate the doc example with Xenial instead of the actual
  codename.
  
- * ./doc/sources.list.5.xml | grep -i verbatim 
- --- 
-  %aptverbatiment; 
- --- 
+ * ./doc/sources.list.5.xml | grep -i verbatim
+ ---
+  %aptverbatiment;
+ ---
  
  It also seems to affect the man page by mentionning 'xenial' for Bionic:
- http://manpages.ubuntu.com/manpages/bionic/man5/sources.list.5.html 
+ http://manpages.ubuntu.com/manpages/bionic/man5/sources.list.5.html
  http://manpages.ubuntu.com/manpages/bionic/man5/apt_preferences.5.html

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1812696

Title:
  APT doc and manpage uses wrong ubuntu-codename

Status in apt package in Ubuntu:
  New
Status in apt source package in Trusty:
  Invalid
Status in apt source package in Xenial:
  New
Status in apt source package in Bionic:
  New
Status in apt source package in Cosmic:
  New
Status in apt source package in Disco:
  New

Bug description:
  From APT src code :

  ---
  [GOOD ubuntu-codename]
  * trusty:
  apt-1.0.1ubuntu2.18/doc/apt-verbatim.ent:

  [WRONG ubuntu-codename]
  * xenial:
  apt-1.2.29/doc/apt-verbatim.ent:

  * bionic:
  apt-1.6.7/doc/apt-verbatim.ent:

  * disco:
  apt-1.8.0~alpha3/doc/apt-verbatim.ent:
  ---

  * vendor/ubuntu/sources.list.in
  ---
  # See sources.list(5) manpage for more information
  # Remember that CD-ROMs, DVDs and such are managed through the apt-cdrom tool.
  deb http://us.archive.ubuntu.com/ubuntu &ubuntu-codename; main restricted
  deb-src http://us.archive.ubuntu.com/ubuntu &ubuntu-codename; main restricted

  deb http://security.ubuntu.com/ubuntu &ubuntu-codename;-security main 
restricted
  deb-src http://security.ubuntu.com/ubuntu &ubuntu-codename;-security main 
restricted

  deb http://us.archive.ubuntu.com/ubuntu &ubuntu-codename;-updates main 
restricted
  deb-src http://us.archive.ubuntu.com/ubuntu &ubuntu-codename;-updates main 
restricted
  ---

  The ubuntu-codename variable for Bionic and late in APT points to
  Xenial which generate the doc example with Xenial instead of the
  actual codename.

  * ./doc/sources.list.5.xml | grep -i verbatim
  ---
   %aptverbatiment;
  ---

  It also seems to affect the man page by mentionning 'xenial'. 
  Example took from Bionic:
  http://manpages.ubuntu.com/manpages/bionic/man5/sources.list.5.html
  http://manpages.ubuntu.com/manpages/bionic/man5/apt_preferences.5.html

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1812696/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : 

[Group.of.nepali.translators] [Bug 1573594] Re: Missing null termination in PROTOCOL_BINARY_CMD_SASL_LIST_MECHS response handling

2019-01-18 Thread Eric Desrochers
** Bug watch added: Debian Bug tracker #919696
   https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=919696

** Also affects: libmemcached (Debian) via
   https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=919696
   Importance: Unknown
   Status: Unknown

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1573594

Title:
  Missing null termination in PROTOCOL_BINARY_CMD_SASL_LIST_MECHS
  response handling

Status in libmemcached:
  New
Status in libmemcached package in Ubuntu:
  In Progress
Status in libmemcached source package in Trusty:
  In Progress
Status in libmemcached source package in Xenial:
  In Progress
Status in libmemcached source package in Bionic:
  In Progress
Status in libmemcached source package in Cosmic:
  In Progress
Status in libmemcached source package in Disco:
  In Progress
Status in libmemcached package in Debian:
  Unknown

Bug description:
  [Impact]

  When connecting to a server using SASL,
  memcached_sasl_authenticate_connection() reads the list of supported
  mechanisms [1] from the server via the command
  PROTOCOL_BINARY_CMD_SASL_LIST_MECHS. The server's response is a string
  containing supported authentication mechanisms, which gets stored into
  the (uninitialized) destination buffer without null termination [2].

  The buffer then gets passed to sasl_client_start [3] which treats it
  as a null-terminated string [4], reading uninitialised bytes in the
  buffer.

  As the buffer lives on the stack, an attacker that can put strings on
  the stack before the connection gets made, might be able to tamper
  with the authentication.

  [1] libmemcached/sasl.cc:174
  [2] libmemcached/response.cc:619
  [1] libmemcached/sasl.cc:231
  [3] http://linux.die.net/man/3/sasl_client_start

  [Test Case]

  There is no known reliable reproducer.

  [Regression Potential]

  This fix initialises the buffer to 0.
  Any potential regression may include failure of the authentication when using 
SASL.

  [Other Info]

  This bug affects trusty and later.

  * rmadison:
   libmemcached | 1.0.8-1ubuntu2 | trusty  | source
   libmemcached | 1.0.18-4.1 | xenial  | source
   libmemcached | 1.0.18-4.2 | bionic  | source
   libmemcached | 1.0.18-4.2 | cosmic  | source
   libmemcached | 1.0.18-4.2 | disco   | source

  * Debian bug:
  https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=919696

  * Upstream seems pretty quiet since 2014

  Unfortunately, because the project seems more or less dead ... it
  seems like we won't be able submit anything upstream and go straight
  to fixing Debian and Ubuntu.

  - Repo: 
  bzr branch lp:libmemcached

  - Last commit:
  revno: 1113 [merge]
  committer: Continuous Integration 
  branch nick: workspace
  timestamp: Sun 2014-02-16 03:31:37 -0800
  message:
    Merge bzr://soup.haus/ Build: jenkins-Libmemcached-473

To manage notifications about this bug go to:
https://bugs.launchpad.net/libmemcached/+bug/1573594/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1800566] Re: Make the reset_devices parameter default for kdump kernels

2019-01-09 Thread Eric Desrochers
** Also affects: makedumpfile (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Also affects: makedumpfile (Ubuntu Cosmic)
   Importance: Undecided
   Status: New

** Also affects: makedumpfile (Ubuntu Disco)
   Importance: High
 Assignee: Mauricio Faria de Oliveira (mfo)
   Status: Confirmed

** Also affects: makedumpfile (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: makedumpfile (Ubuntu Xenial)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1800566

Title:
  Make the reset_devices parameter default for kdump kernels

Status in makedumpfile package in Ubuntu:
  Confirmed
Status in makedumpfile source package in Trusty:
  New
Status in makedumpfile source package in Xenial:
  New
Status in makedumpfile source package in Bionic:
  New
Status in makedumpfile source package in Cosmic:
  New
Status in makedumpfile source package in Disco:
  Confirmed

Bug description:
  Kernel has the "reset_devices" parameter that drivers can opt-in, and
  perform special activity in case this parameter is parsed from
  command-line. For example, in kdump kernels it hints the drivers that
  they (maybe) are booting from a non-healthy condition and needs to
  issue some reset to the adapter. Users currently (kernel v4.19) are:
  hpsa, ipr, megaraid_sas, mpt3sas, smartpqi, xenbus.

  This should be enabled by default in the kdump config file to be added
  in the kdump kernel command-line for all versions.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/makedumpfile/+bug/1800566/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1800562] Re: Replace "nousb" option in kdump command-line for the newer "usbcore.nousb"

2019-01-09 Thread Eric Desrochers
** Also affects: makedumpfile (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Also affects: makedumpfile (Ubuntu Cosmic)
   Importance: Undecided
   Status: New

** Also affects: makedumpfile (Ubuntu Disco)
   Importance: High
 Assignee: Guilherme G. Piccoli (gpiccoli)
   Status: Confirmed

** Also affects: makedumpfile (Ubuntu Xenial)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1800562

Title:
  Replace "nousb" option in kdump command-line for the newer
  "usbcore.nousb"

Status in makedumpfile package in Ubuntu:
  Confirmed
Status in makedumpfile source package in Xenial:
  New
Status in makedumpfile source package in Bionic:
  New
Status in makedumpfile source package in Cosmic:
  New
Status in makedumpfile source package in Disco:
  Confirmed

Bug description:
  Since kernel v4.5, the correct parameter to disable USB subsystem
  initialization is "usbcore.nousb" always (instead of "nousb" in case
  the subsystem is built-in). This was changed by commit 097a9ea0e48
  ("usb: make "nousb" a clear module parameter").

  We need to take this into account in kdump-tools, or else we may boot
  with USB in kdump even the command-line saying the opposite.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/makedumpfile/+bug/1800562/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1800873] Re: Add KDUMP_CMDLINE_REMOVE option to remove portions of kernel command-line

2019-01-09 Thread Eric Desrochers
** Also affects: makedumpfile (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Also affects: makedumpfile (Ubuntu Cosmic)
   Importance: Undecided
   Status: New

** Also affects: makedumpfile (Ubuntu Disco)
   Importance: Low
 Assignee: Guilherme G. Piccoli (gpiccoli)
   Status: Confirmed

** Also affects: makedumpfile (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: makedumpfile (Ubuntu Xenial)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1800873

Title:
  Add KDUMP_CMDLINE_REMOVE option to remove portions of kernel command-
  line

Status in makedumpfile package in Ubuntu:
  Confirmed
Status in makedumpfile source package in Trusty:
  New
Status in makedumpfile source package in Xenial:
  New
Status in makedumpfile source package in Bionic:
  New
Status in makedumpfile source package in Cosmic:
  New
Status in makedumpfile source package in Disco:
  Confirmed

Bug description:
  Currently kdump has an useful option to append parameters to the kdump
  kernel command-line, "KDUMP_CMDLINE_APPEND". Would be useful to have a
  reciprocal option which users could use to remove parameters without
  needing to rewrite the whole line.

  The option name proposed here is KDUMP_CMDLINE_REMOVE, which would
  tentatively "sed"-out the options from the kernel command-line before
  appending the new ones from KDUMP_CMDLINE_APPEND.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/makedumpfile/+bug/1800873/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


  1   2   3   >