[Bug 2061040] Re: I2C HID device sometimes fails to initialize causing touchpad to not work

2024-05-20 Thread Haw Loeung
** Changed in: linux (Ubuntu)
   Status: Triaged => In Progress

** Changed in: linux (Ubuntu Noble)
   Status: Triaged => In Progress

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2061040

Title:
  I2C HID device sometimes fails to initialize causing touchpad to not
  work

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2061040/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2063898] Re: broken doc symlinks after t64 transition in noble

2024-04-28 Thread Haw Loeung
Can confirm:

[hloeung@dharkan tmp]$ ls /usr/share/doc/openssl -la
total 120
drwxr-xr-x3 root root  4096 Apr  4 18:43 .
drwxr-xr-x 1469 root root 61440 Apr 26 19:28 ..
lrwxrwxrwx1 root root30 Mar 31 17:42 changelog.Debian.gz -> 
../libssl3/changelog.Debian.gz
lrwxrwxrwx1 root root23 Mar 31 17:42 changelog.gz -> 
../libssl3/changelog.gz
lrwxrwxrwx1 root root20 Mar 31 17:42 copyright -> ../libssl3/copyright
-rw-r--r--1 root root   197 Jan 31 00:28 FAQ.md
-rw-r--r--1 root root   862 Jan 31 00:28 fingerprints.txt
drwxr-xr-x2 root root  4096 Apr  4 18:43 HOWTO
-rw-r--r--1 root root 18800 Jan 31 00:28 NEWS.md.gz
-rw-r--r--1 root root  2122 Mar  8 20:44 README.Debian
-rw-r--r--1 root root  5966 Jan 31 00:28 README-ENGINES.md.gz
-rw-r--r--1 root root  2660 Jan 31 00:28 README.md.gz
-rw-r--r--1 root root  1385 Mar  8 20:44 README.optimization
[hloeung@dharkan tmp]$ ls /usr/share/doc/openssl/../libssl3/changelog.Debian.gz
ls: cannot access '/usr/share/doc/openssl/../libssl3/changelog.Debian.gz': No 
such file or directory
[hloeung@dharkan tmp]$ ls /usr/share/doc/openssl/../libssl3/
[hloeung@dharkan tmp]$ ls /usr/share/doc/openssl/../libssl3t64/
changelog.Debian.gz  copyright
[hloeung@dharkan tmp]$

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2063898

Title:
  broken doc symlinks after t64 transition in noble

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/2063898/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2061040] [NEW] I2C HID device sometimes fails to initialize causing touchpad to not work

2024-04-11 Thread Haw Loeung
Public bug reported:

Hi,

Touchpad on my new Lenovo X1 Carbon (Gen12) with the Sensel haptic pad
doesn't work on boot. I see this:

| [Thu Apr 11 13:57:26 2024] i2c_hid_acpi i2c-SNSL0028:00: device did not ack 
reset within 1000 ms
| [Thu Apr 11 13:57:26 2024] hid-generic 0018:2C2F:0028.0001: unknown main item 
tag 0x0
| [Thu Apr 11 13:57:26 2024] hid-generic 0018:2C2F:0028.0001: unknown main item 
tag 0x0
| [Thu Apr 11 13:57:26 2024] hid-generic 0018:2C2F:0028.0001: unknown main item 
tag 0x0
| [Thu Apr 11 13:57:26 2024] hid-generic 0018:2C2F:0028.0001: unknown main item 
tag 0x0
| [Thu Apr 11 13:57:26 2024] hid-generic 0018:2C2F:0028.0001: unknown main item 
tag 0x0
| [Thu Apr 11 13:57:26 2024] hid-generic 0018:2C2F:0028.0001: unknown main item 
tag 0x0
| [Thu Apr 11 13:57:26 2024] hid-generic 0018:2C2F:0028.0001: unknown main item 
tag 0x0
| [Thu Apr 11 13:57:26 2024] hid-generic 0018:2C2F:0028.0001: unknown main item 
tag 0x0
| [Thu Apr 11 13:57:26 2024] hid-generic 0018:2C2F:0028.0001: unknown main item 
tag 0x0
| [Thu Apr 11 13:57:26 2024] hid-generic 0018:2C2F:0028.0001: unknown main item 
tag 0x0
| [Thu Apr 11 13:57:26 2024] hid-generic 0018:2C2F:0028.0001: unknown main item 
tag 0x0
| ...
| [Thu Apr 11 13:57:26 2024] hid-generic 0018:2C2F:0028.0001: unbalanced 
collection at end of report description
| [Thu Apr 11 13:57:26 2024] hid-generic: probe of 0018:2C2F:0028.0001 failed 
with error -22

Per the Arch Linux wiki page[1], removing and reloading the
`i2c_hid_acpi` seems to fix it:

| [Thu Apr 11 13:58:02 2024] i2c_hid_acpi i2c-SNSL0028:00: device did not ack 
reset within 1000 ms
| [Thu Apr 11 13:58:02 2024] input: SNSL0028:00 2C2F:0028 Mouse as 
/devices/pci:00/:00:15.0/i2c_designware.0/i2c-15/i2c-SNSL0028:00/0018:2C2F:0028.0002/input/input15
| [Thu Apr 11 13:58:02 2024] input: SNSL0028:00 2C2F:0028 Touchpad as 
/devices/pci:00/:00:15.0/i2c_designware.0/i2c-15/i2c-SNSL0028:00/0018:2C2F:0028.0002/input/input16
| [Thu Apr 11 13:58:02 2024] hid-multitouch 0018:2C2F:0028.0002: input,hidraw0: 
I2C HID v1.00 Mouse [SNSL0028:00 2C2F:0028] on i2c-SNSL0028:00
| [Thu Apr 11 13:58:03 2024] psmouse serio1: trackpoint: Synaptics TrackPoint 
firmware: 0x08, buttons: 3/3
| [Thu Apr 11 13:58:03 2024] input: TPPS/2 Synaptics TrackPoint as 
/devices/platform/i8042/serio1/input/input18

From that Arch Linux wiki page, it seems to be a bug upstream[2] with
the commit fixing this:

|
https://github.com/torvalds/linux/commit/af93a167eda90192563bce64c4bb989836afac1f

Or

| https://lore.kernel.org/linux-
input/20240331182440.14477-1...@kl.wtf/T/#u

Can we get fix this backported?

| [hloeung@dharkan tmp]$ apt-cache policy linux-image-generic-hwe-24.04
| linux-image-generic-hwe-24.04:
|   Installed: 6.8.0-22.22
|   Candidate: 6.8.0-22.22
|   Version table:
|  *** 6.8.0-22.22 500
| 500 http://haw-test.archive.ubuntu.com/ubuntu noble/main amd64 
Packages
| 100 /var/lib/dpkg/status
| [hloeung@dharkan tmp]$ uname -a
| Linux dharkan.local 6.8.0-22-generic #22-Ubuntu SMP PREEMPT_DYNAMIC Thu Apr  
4 22:30:32 UTC 2024 x86_64 x86_64 x86_64 GNU/Linux
| [hloeung@dharkan tmp]$

Thanks,

Haw

[1]: https://wiki.archlinux.org/title/Lenovo_ThinkPad_Z16_Gen_2
[2]: https://bugzilla.redhat.com/show_bug.cgi?id=2271136

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: linux (Ubuntu Noble)
 Importance: Undecided
 Status: New


** Tags: noble

** Also affects: linux (Ubuntu Noble)
   Importance: Undecided
   Status: New

** Tags added: noble

** Description changed:

  Hi,
  
  Touchpad on my new Lenovo X1 Carbon (Gen12) with the Sensel haptic pad
  doesn't work on boot. I see this:
  
  | [Thu Apr 11 13:57:26 2024] i2c_hid_acpi i2c-SNSL0028:00: device did not ack 
reset within 1000 ms
  | [Thu Apr 11 13:57:26 2024] hid-generic 0018:2C2F:0028.0001: unknown main 
item tag 0x0
  | [Thu Apr 11 13:57:26 2024] hid-generic 0018:2C2F:0028.0001: unknown main 
item tag 0x0
  | [Thu Apr 11 13:57:26 2024] hid-generic 0018:2C2F:0028.0001: unknown main 
item tag 0x0
  | [Thu Apr 11 13:57:26 2024] hid-generic 0018:2C2F:0028.0001: unknown main 
item tag 0x0
  | [Thu Apr 11 13:57:26 2024] hid-generic 0018:2C2F:0028.0001: unknown main 
item tag 0x0
  | [Thu Apr 11 13:57:26 2024] hid-generic 0018:2C2F:0028.0001: unknown main 
item tag 0x0
  | [Thu Apr 11 13:57:26 2024] hid-generic 0018:2C2F:0028.0001: unknown main 
item tag 0x0
  | [Thu Apr 11 13:57:26 2024] hid-generic 0018:2C2F:0028.0001: unknown main 
item tag 0x0
  | [Thu Apr 11 13:57:26 2024] hid-generic 0018:2C2F:0028.0001: unknown main 
item tag 0x0
  | [Thu Apr 11 13:57:26 2024] hid-generic 0018:2C2F:0028.0001: unknown main 
item tag 0x0
  | [Thu Apr 11 13:57:26 2024] hid-generic 0018:2C2F:0028.0001: unknown main 
item tag 0x0
  | ...
  | [Thu Apr 11 13:57:26 2024] hid-generic 0018:2C2F:0028.0001: unbalanced 
collection at end of report description
  | [Thu Apr 11 13:57:26 2024] hid-generic: probe of 

[Bug 2060266] Re: gnome-session.service [unity-session] uses deprecated --builtin parameter

2024-04-11 Thread Haw Loeung
Confirmed the latest gnome-session fixes this.

| [hloeung@dharkan tmp]$ apt-cache policy unity-session gnome-session-bin
| unity-session:
|   Installed: 46.0-1ubuntu3
|   Candidate: 46.0-1ubuntu3
|   Version table:
|  *** 46.0-1ubuntu3 500
| 500 http://haw-test.archive.ubuntu.com/ubuntu noble/universe amd64 
Packages
| 100 /var/lib/dpkg/status
| gnome-session-bin:
|   Installed: 46.0-1ubuntu3
|   Candidate: 46.0-1ubuntu3
|   Version table:
|  *** 46.0-1ubuntu3 500
| 500 http://haw-test.archive.ubuntu.com/ubuntu noble/main amd64 
Packages
| 100 /var/lib/dpkg/status

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060266

Title:
  gnome-session.service [unity-session] uses deprecated --builtin
  parameter

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gnome-session/+bug/2060266/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2060426] Re: DeprecationWarning: datetime.datetime.utcfromtimestamp() is deprecated and scheduled for removal in a future version.

2024-04-09 Thread Haw Loeung
** Tags added: noble

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060426

Title:
  DeprecationWarning: datetime.datetime.utcfromtimestamp() is deprecated
  and scheduled for removal in a future version.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/python3-dateutil/+bug/2060426/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2060266] Re: gnome-session no longer supports --builtin

2024-04-07 Thread Haw Loeung
@vanvugt, it's `unity-session` shipping out
`/usr/lib/systemd/user/gnome-session.service` which is part of `gnome-
session`:

| $ dpkg-query -S /usr/lib/systemd/user/gnome-session.service
| unity-session: /usr/lib/systemd/user/gnome-session.service


$ chdist apt-get noble source unity-session
Reading package lists... Done
Picking 'gnome-session' as source package instead of 'unity-session'
NOTICE: 'gnome-session' packaging is maintained in the 'Git' version control 
system at:
https://salsa.debian.org/gnome-team/gnome-session.git -b ubuntu/master
Please use:
git clone https://salsa.debian.org/gnome-team/gnome-session.git -b ubuntu/master
to retrieve the latest (possibly unreleased) updates to the package.
Need to get 572 kB of source archives.
Get:1 http://azure.archive.ubuntu.com/ubuntu noble/main gnome-session 
46.0-1ubuntu2 (dsc) [3,067 B]
Get:2 http://azure.archive.ubuntu.com/ubuntu noble/main gnome-session 
46.0-1ubuntu2 (tar) [484 kB]
Get:3 http://azure.archive.ubuntu.com/ubuntu noble/main gnome-session 
46.0-1ubuntu2 (diff) [85.0 kB]
Fetched 572 kB in 3s (225 kB/s)
dpkg-source: info: extracting gnome-session in gnome-session-46.0
dpkg-source: info: unpacking gnome-session_46.0.orig.tar.xz
dpkg-source: info: unpacking gnome-session_46.0-1ubuntu2.debian.tar.xz
dpkg-source: info: using patch list from debian/patches/series
dpkg-source: info: applying 
debian/Revert-main-Remove-GNOME_DESKTOP_SESSION_ID-envvar.patch
dpkg-source: info: applying ubuntu/support_autostart_delay.patch
dpkg-source: info: applying ubuntu/ubuntu-sessions.patch
dpkg-source: info: applying ubuntu/remove_session_saving_from_gui.patch
dpkg-source: info: applying ubuntu/add_sessionmigration.patch
dpkg-source: info: applying ubuntu/dbus_request_shutdown.patch
dpkg-source: info: applying ubuntu/ignore_gsettings_region.patch
dpkg-source: info: applying revert_remove_gnome_session_properties.patch


[hloeung@dharkan gnome-session-46.0]$ grep builtin . -r --exclude-dir po
./debian/changelog:- Pass --builtin to gnome-session to fix broken login 
for Unity
./debian/changelog:+ debian/55gnome-session_gnomerc: Use shell builtins 
instead of external
./debian/data/gnome-session.service:exec gnome-session --builtin 
--session=$DESKTOP_SESSION --disable-acceleration-check || \
./debian/data/gnome-session.service:exec gnome-session --builtin 
--session=$DESKTOP_SESSION'

** Changed in: ubuntu
   Status: Incomplete => New

** Package changed: ubuntu => gnome-session (Ubuntu)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060266

Title:
  gnome-session no longer supports --builtin

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gnome-session/+bug/2060266/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2060426] [NEW] DeprecationWarning: datetime.datetime.utcfromtimestamp() is deprecated and scheduled for removal in a future version.

2024-04-07 Thread Haw Loeung
Public bug reported:

Hi,

Seeing this:

|   /usr/lib/python3/dist-packages/dateutil/tz/tz.py:37: DeprecationWarning: 
datetime.datetime.utcfromtimestamp() is deprecated and scheduled for removal in 
a future version. Use timezone-aware objects to represent datetimes in UTC: 
datetime.datetime.fromtimestamp(timestamp, datetime.UTC).
| EPOCH = datetime.datetime.utcfromtimestamp(0)

Upstream has a patch:

https://github.com/dateutil/dateutil/issues/1284

| - EPOCH = datetime.datetime.utcfromtimestamp(0)
| + EPOCH = datetime.datetime(1970, 1, 1, 0, 0)

Can we please backport this?

| $ apt-cache policy python3-dateutil
| python3-dateutil:
|   Installed: 2.8.2-3
|   Candidate: 2.8.2-3
|   Version table:
|  *** 2.8.2-3 500
| 500 http://haw-test.archive.ubuntu.com/ubuntu noble/main amd64 
Packages
| 100 /var/lib/dpkg/status

** Affects: python3-dateutil (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060426

Title:
  DeprecationWarning: datetime.datetime.utcfromtimestamp() is deprecated
  and scheduled for removal in a future version.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/python3-dateutil/+bug/2060426/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2060266] [NEW] gnome-session no longer supports --builtin

2024-04-05 Thread Haw Loeung
Public bug reported:

Hi,

`gnome-session.service` has the following:

| [Service]
| ExecStart=/bin/sh -exc '[ "$DESKTOP_SESSION" != "gnome-classic" ] || export | 
GNOME_SHELL_SESSION_MODE=classic; \
| export GNOME_SESSION_XDG_SESSION_PATH=${XDG_SESSION_PATH}; \
| [ "$DESKTOP_SESSION" = gnome-flashback-metacity ] && \
| exec gnome-session --builtin --session=$DESKTOP_SESSION 
--disable-acceleration-check || \
| exec gnome-session --builtin --session=$DESKTOP_SESSION'

Unfortunately, the latest `gnome-session` no longer supports
`--builtin`. This causes login failures, in particular for me, using
Unity, I get logged back out from the unity greeter.

| $ apt-cache policy gnome-session-bin
| gnome-session-bin:
|   Installed: 46.0-1ubuntu2
|   Candidate: 46.0-1ubuntu2
|   Version table:
|  *** 46.0-1ubuntu2 500
| 500 http://haw-test.archive.ubuntu.com/ubuntu noble/main amd64 
Packages
| 100 /var/lib/dpkg/status
|  45.0-1ubuntu1 500
| 500 http://haw-test.archive.ubuntu.com/ubuntu noble-updates/main 
amd64 Packages

| $ gnome-session --builtin
|
| ** (gnome-session-binary:5602): WARNING **: 15:35:22.156: Unknown option 
--builtin

Removing `--builtin` from `/usr/lib/systemd/user/gnome-session.service`
let's me log in.

With that though, I was not able to input text in chromium (installed
via the snap).

Downgrading `gnome-session-bin`, `gnome-session-common`, and `unity-
session` back to 45.0-1ubuntu1 restores things for me:

| [hloeung@dharkan tmp]$ apt-cache policy gnome-session-bin
| gnome-session-bin:
|   Installed: 45.0-1ubuntu1
|   Candidate: 46.0-1ubuntu2
|   Version table:
|  46.0-1ubuntu2 500
| 500 http://haw-test.archive.ubuntu.com/ubuntu noble/main amd64 
Packages
|  *** 45.0-1ubuntu1 500
| 500 http://haw-test.archive.ubuntu.com/ubuntu noble-updates/main 
amd64 Packages
| 100 /var/lib/dpkg/status
| [hloeung@dharkan tmp]$ apt-cache policy gnome-session-common
| gnome-session-common:
|   Installed: 45.0-1ubuntu1
|   Candidate: 46.0-1ubuntu2
|   Version table:
|  46.0-1ubuntu2 500
| 500 http://haw-test.archive.ubuntu.com/ubuntu noble/main amd64 
Packages
|  *** 45.0-1ubuntu1 500
| 500 http://haw-test.archive.ubuntu.com/ubuntu noble-updates/main 
amd64 Packages
| 100 /var/lib/dpkg/status
| [hloeung@dharkan tmp]$ apt-cache policy unity-session
| unity-session:
|   Installed: 45.0-1ubuntu1
|   Candidate: 46.0-1ubuntu2
|   Version table:
|  46.0-1ubuntu2 500
| 500 http://haw-test.archive.ubuntu.com/ubuntu noble/universe amd64 
Packages
|  *** 45.0-1ubuntu1 500
| 500 http://haw-test.archive.ubuntu.com/ubuntu noble-updates/universe 
amd64 Packages
| 100 /var/lib/dpkg/status

** Affects: gnome-session (Ubuntu)
 Importance: Undecided
 Status: New

** Description changed:

  Hi,
  
  `gnome-session.service` has the following:
  
  | [Service]
  | ExecStart=/bin/sh -exc '[ "$DESKTOP_SESSION" != "gnome-classic" ] || export 
| GNOME_SHELL_SESSION_MODE=classic; \
  | export GNOME_SESSION_XDG_SESSION_PATH=${XDG_SESSION_PATH}; \
  | [ "$DESKTOP_SESSION" = gnome-flashback-metacity ] && \
  | exec gnome-session --builtin --session=$DESKTOP_SESSION 
--disable-acceleration-check || \
  | exec gnome-session --builtin --session=$DESKTOP_SESSION'
  
  Unfortunately, the latest `gnome-session` no longer supports
  `--builtin`. This causes login failures, in particular for me, using
  Unity, I get logged back out from the unity greeter.
  
  | $ apt-cache policy gnome-session-bin
  | gnome-session-bin:
  |   Installed: 46.0-1ubuntu2
  |   Candidate: 46.0-1ubuntu2
  |   Version table:
  |  *** 46.0-1ubuntu2 500
  | 500 http://haw-test.archive.ubuntu.com/ubuntu noble/main amd64 
Packages
  | 100 /var/lib/dpkg/status
  |  45.0-1ubuntu1 500
  | 500 http://haw-test.archive.ubuntu.com/ubuntu noble-updates/main 
amd64 Packages
  
  | $ gnome-session --builtin
  |
  | ** (gnome-session-binary:5602): WARNING **: 15:35:22.156: Unknown option 
--builtin
+ 
+ Removing `--builtin` from `/usr/lib/systemd/user/gnome-session.service`
+ let's me log in.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060266

Title:
  gnome-session no longer supports --builtin

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gnome-session/+bug/2060266/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2060266] Re: gnome-session no longer supports --builtin

2024-04-05 Thread Haw Loeung
** Tags added: noble

** Also affects: gnome-session (Ubuntu Noble)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060266

Title:
  gnome-session no longer supports --builtin

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gnome-session/+bug/2060266/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2060266] Re: gnome-session no longer supports --builtin

2024-04-05 Thread Haw Loeung
** Description changed:

  Hi,
  
  `gnome-session.service` has the following:
  
  | [Service]
  | ExecStart=/bin/sh -exc '[ "$DESKTOP_SESSION" != "gnome-classic" ] || export 
| GNOME_SHELL_SESSION_MODE=classic; \
  | export GNOME_SESSION_XDG_SESSION_PATH=${XDG_SESSION_PATH}; \
  | [ "$DESKTOP_SESSION" = gnome-flashback-metacity ] && \
  | exec gnome-session --builtin --session=$DESKTOP_SESSION 
--disable-acceleration-check || \
  | exec gnome-session --builtin --session=$DESKTOP_SESSION'
  
  Unfortunately, the latest `gnome-session` no longer supports
  `--builtin`. This causes login failures, in particular for me, using
  Unity, I get logged back out from the unity greeter.
  
  | $ apt-cache policy gnome-session-bin
  | gnome-session-bin:
  |   Installed: 46.0-1ubuntu2
  |   Candidate: 46.0-1ubuntu2
  |   Version table:
  |  *** 46.0-1ubuntu2 500
  | 500 http://haw-test.archive.ubuntu.com/ubuntu noble/main amd64 
Packages
  | 100 /var/lib/dpkg/status
  |  45.0-1ubuntu1 500
  | 500 http://haw-test.archive.ubuntu.com/ubuntu noble-updates/main 
amd64 Packages
  
  | $ gnome-session --builtin
  |
  | ** (gnome-session-binary:5602): WARNING **: 15:35:22.156: Unknown option 
--builtin
  
  Removing `--builtin` from `/usr/lib/systemd/user/gnome-session.service`
  let's me log in.
+ 
+ With that though, I was not able to input text in chromium (installed
+ via the snap).
+ 
+ Downgrading `gnome-session-bin`, `gnome-session-common`, and `unity-
+ session` back to 45.0-1ubuntu1 restores things for me:
+ 
+ | [hloeung@dharkan tmp]$ apt-cache policy gnome-session-bin
+ | gnome-session-bin:
+ |   Installed: 45.0-1ubuntu1
+ |   Candidate: 46.0-1ubuntu2
+ |   Version table:
+ |  46.0-1ubuntu2 500
+ | 500 http://haw-test.archive.ubuntu.com/ubuntu noble/main amd64 
Packages
+ |  *** 45.0-1ubuntu1 500
+ | 500 http://haw-test.archive.ubuntu.com/ubuntu noble-updates/main 
amd64 Packages
+ | 100 /var/lib/dpkg/status
+ | [hloeung@dharkan tmp]$ apt-cache policy gnome-session-common
+ | gnome-session-common:
+ |   Installed: 45.0-1ubuntu1
+ |   Candidate: 46.0-1ubuntu2
+ |   Version table:
+ |  46.0-1ubuntu2 500
+ | 500 http://haw-test.archive.ubuntu.com/ubuntu noble/main amd64 
Packages
+ |  *** 45.0-1ubuntu1 500
+ | 500 http://haw-test.archive.ubuntu.com/ubuntu noble-updates/main 
amd64 Packages
+ | 100 /var/lib/dpkg/status
+ | [hloeung@dharkan tmp]$ apt-cache policy unity-session
+ | unity-session:
+ |   Installed: 45.0-1ubuntu1
+ |   Candidate: 46.0-1ubuntu2
+ |   Version table:
+ |  46.0-1ubuntu2 500
+ | 500 http://haw-test.archive.ubuntu.com/ubuntu noble/universe amd64 
Packages
+ |  *** 45.0-1ubuntu1 500
+ | 500 http://haw-test.archive.ubuntu.com/ubuntu 
noble-updates/universe amd64 Packages
+ | 100 /var/lib/dpkg/status

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060266

Title:
  gnome-session no longer supports --builtin

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gnome-session/+bug/2060266/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2058881] Re: [snap] Allow chromium snap to access Pressure Stall Information (PSI)

2024-03-26 Thread Haw Loeung
I've not observed any problems or hindrance as a result of these
denials, no.

Just more noise and thought maybe Chromium was going to use the pressure
stall information for something useful like for the selection of which
tabs/process to kill off when the system is experiencing pressure in
either CPU, I/O, and/or memory.

But all good if it does not and it does not plan to.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2058881

Title:
  [snap] Allow chromium snap to access Pressure Stall Information (PSI)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/2058881/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2058881] Re: [snap] Allow chromium snap to access Pressure Stall Information (PSI)

2024-03-25 Thread Haw Loeung
It's used here:

|
https://github.com/chromium/chromium/blob/123.0.6312.58/chrome/browser/metrics/pressure/pressure_metrics_reporter.cc#L19

From this commit:

|
https://github.com/chromium/chromium/commit/dace5562b1d56bf2d2e5b2de6f4518c44844be9f

References this bug:

| https://issues.chromium.org/issues/40256157

** Bug watch added: issues.chromium.org/issues #40256157
   https://issues.chromium.org/issues/40256157

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2058881

Title:
  [snap] Allow chromium snap to access Pressure Stall Information (PSI)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/2058881/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2058881] Re: [snap] Allow chromium snap to access Pressure Stall Information (PSI)

2024-03-25 Thread Haw Loeung
Sorry, I should have mentioned the version. I'm using the chromium from
the candidate channel:

| $ snap info chromium | grep installed
| installed:  123.0.6312.58 (2795) 168MB -

Seems to be happening every 10 mins.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2058881

Title:
  [snap] Allow chromium snap to access Pressure Stall Information (PSI)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/2058881/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2058881] [NEW] [snap] Allow chromium snap to access Pressure Stall Information (PSI)

2024-03-24 Thread Haw Loeung
Public bug reported:

Hi,

Currently seeing this:

| Mar 25 16:12:23 dharkan.local kernel: audit: type=1400 
audit(1711343543.539:657): apparmor="DENIED" operation="open" class="file" 
profile="snap.chromium.chromium" name="/proc/pressure/cpu" pid=63335 
comm="ThreadPoolForeg" requested_mask="r" denied_mask="r" fsuid=3134 ouid=0
| Mar 25 16:12:23 dharkan.local kernel: audit: type=1400 
audit(1711343543.539:658): apparmor="DENIED" operation="open" class="file" 
profile="snap.chromium.chromium" name="/proc/pressure/io" pid=63335 
comm="ThreadPoolForeg" requested_mask="r" denied_mask="r" fsuid=3134 ouid=0
| Mar 25 16:12:23 dharkan.local kernel: audit: type=1400 
audit(1711343543.539:659): apparmor="DENIED" operation="open" class="file" 
profile="snap.chromium.chromium" name="/proc/pressure/memory" pid=63335 
comm="ThreadPoolForeg" requested_mask="r" denied_mask="r" fsuid=3134 ouid>

It seems the AppAmor profile should be updated to allow Chromium access
to the pressure stall information for it to monitor and manage it's
processes?

** Affects: chromium-browser (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2058881

Title:
  [snap] Allow chromium snap to access Pressure Stall Information (PSI)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/2058881/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2055239] Re: Warning: The unit file, source configuration file or drop-ins of {apt-news, esm-cache}.service changed on disk. Run 'systemctl daemon-reload' to reload units.

2024-03-10 Thread Haw Loeung
Seeing this myself:

| $ sudo apt-get update
| Warning: The unit file, source configuration file or drop-ins of 
apt-news.service changed on disk. Run 'systemctl daemon-reload' to reload units.
| Warning: The unit file, source configuration file or drop-ins of 
esm-cache.service changed on disk. Run 'systemctl daemon-reload' to reload 
units.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2055239

Title:
  Warning: The unit file, source configuration file or drop-ins of {apt-
  news,esm-cache}.service changed on disk. Run 'systemctl daemon-reload'
  to reload units.

To manage notifications about this bug go to:
https://bugs.launchpad.net/snapd/+bug/2055239/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2034656] Re: ESM archive getting DoSed with legitimate traffic every day at 06:25 (cron.daily time)

2024-03-07 Thread Haw Loeung
For debugging, I provisioned VMs in Azure for each of the releases and
they all have this disabled:

| $ juju run --application 
ubuntu-jammy-test,ubuntu-focal-test,ubuntu-bionic-test,ubuntu-xenial-test,ubuntu-trusty-test
 "grep APT::Periodic::Download-Upgradeable-Packages 
/etc/apt/apt.conf.d/10periodic"
| - Stdout: |
| APT::Periodic::Download-Upgradeable-Packages "0";
|   UnitId: ubuntu-bionic-test/0
| - Stdout: |
| APT::Periodic::Download-Upgradeable-Packages "0";
|   UnitId: ubuntu-focal-test/0
| - Stdout: |
| APT::Periodic::Download-Upgradeable-Packages "0";
|   UnitId: ubuntu-jammy-test/0
| - Stdout: |
| APT::Periodic::Download-Upgradeable-Packages "0";
|   UnitId: ubuntu-trusty-test/0
| - Stdout: |
| APT::Periodic::Download-Upgradeable-Packages "0";
|   UnitId: ubuntu-xenial-test/0

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2034656

Title:
  ESM archive getting DoSed with legitimate traffic every day at 06:25
  (cron.daily time)

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-images/+bug/2034656/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2034656] Re: ESM archive getting DoSed with legitimate traffic every day at 06:25 (cron.daily time)

2024-03-07 Thread Haw Loeung
Maybe it is this as Grant (orndorffgrant) mentioned earlier?

| APT::Periodic::Download-Upgradeable-Packages "0";

During the time of a surge, we saw this:

| Hits  h%  Vis. v%   Bandwidth Mtd  ProtoData
| - -- - -- ---   
| 3772   0.82%  2461  0.85%   56.62 GiB GET  HTTP/1.1 
/infra/ubuntu/pool/main/l/linux-azure-5.4/linux-modules-extra-5.4.0-1116-azure_5.4.0-1116.123~18.04.1_amd64.deb
| 3246   0.71%  2147  0.74%   41.55 GiB GET  HTTP/1.1 
/infra/ubuntu/pool/main/l/linux-azure-5.4/linux-modules-5.4.0-1116-azure_5.4.0-1116.123~18.04.1_amd64.deb
| 3850   0.84%  2585  0.89%   41.15 GiB GET  HTTP/1.1 
/infra/ubuntu/pool/main/l/linux-azure-5.4/linux-azure-5.4-headers-5.4.0-1116_5.4.0-1116.123~18.04.1_all.deb
| 3580   0.78%  2364  0.81%   32.93 GiB GET  HTTP/1.1 
/infra/ubuntu/pool/main/l/linux-signed-azure-5.4/linux-image-5.4.0-1116-azure_5.4.0-1116.123~18.04.1_amd64.deb
| 3607   0.78%  2478  0.85%   18.01 GiB GET  HTTP/1.1 
/infra/ubuntu/pool/main/l/linux-azure-5.4/linux-azure-5.4-tools-5.4.0-1116_5.4.0-1116.123~18.04.1_amd64.deb
| 3523   0.77%  2413  0.83%5.33 GiB GET  HTTP/1.1 
/infra/ubuntu/pool/main/l/linux-azure-5.4/linux-headers-5.4.0-1116-azure_5.4.0-1116.123~18.04.1_amd64.deb
| 3635   0.79%  2510  0.86%2.00 GiB GET  HTTP/1.1 
/infra/ubuntu/pool/main/l/linux-azure-5.4/linux-azure-5.4-cloud-tools-5.4.0-1116_5.4.0-1116.123~18.04.1_amd64.deb
| 3604   0.78%  2508  0.86%1.93 GiB GET  HTTP/1.1 
/infra/ubuntu/pool/main/l/linux-azure-5.4/linux-cloud-tools-5.4.0-1116-azure_5.4.0-1116.123~18.04.1_amd64.deb
| 3431   0.75%  2421  0.83%1.83 GiB GET  HTTP/1.1 
/infra/ubuntu/pool/main/l/linux-azure-5.4/linux-tools-5.4.0-1116-azure_5.4.0-1116.123~18.04.1_amd64.deb

This kernel would be for Bionic VMs in Azure - as Junien (axino) has
pointed out earlier.

`APT::Periodic::Download-Upgradeable-Packages` is defined in
`/etc/apt/apt.conf.d/10periodic` and shipped out via `update-notifier-
common`.


** Also affects: update-notifier (Ubuntu)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2034656

Title:
  ESM archive getting DoSed with legitimate traffic every day at 06:25
  (cron.daily time)

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-images/+bug/2034656/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2056093] [NEW] ImportError: cannot import name 'missing_whitespace_around_operator' from 'pycodestyle' (/usr/lib/python3/dist-packages/pycodestyle.py). Did you mean: 'whitespace_around_operator'?

2024-03-04 Thread Haw Loeung
Public bug reported:

Hi,

Running `flake8` `5.0.4-4` included with Noble, I'm getting the
following errors:

| ]$ flake8 pe.py
| Traceback (most recent call last):
|   File "/usr/lib/python3/dist-packages/flake8/plugins/finder.py", line 296, 
in _load_plugin
| obj = plugin.entry_point.load()
|   ^
|   File "/usr/lib/python3.12/importlib/metadata/__init__.py", line 205, in load
| module = import_module(match.group('module'))
|  
|   File "/usr/lib/python3.12/importlib/__init__.py", line 90, in import_module
| return _bootstrap._gcd_import(name[level:], package, level)
|
|   File "", line 1387, in _gcd_import
|   File "", line 1360, in _find_and_load
|   File "", line 1331, in _find_and_load_unlocked
|   File "", line 935, in _load_unlocked
|   File "", line 995, in exec_module
|   File "", line 488, in _call_with_frames_removed
|   File "/usr/lib/python3/dist-packages/flake8/plugins/pycodestyle.py", line 
25, in 
| from pycodestyle import missing_whitespace_around_operator as 
_missing_whitespace_around_operator  # noqa: E501
| 
^
| ImportError: cannot import name 'missing_whitespace_around_operator' from 
'pycodestyle' (/usr/lib/python3/dist-packages/pycodestyle.py). Did you mean: 
'whitespace_around_operator'?
|
| During handling of the above exception, another exception occurred:
|
| Traceback (most recent call last):
|   File "/usr/bin/flake8", line 33, in 
| sys.exit(load_entry_point('flake8==5.0.4', 'console_scripts', 'flake8')())
|  
|   File "/usr/lib/python3/dist-packages/flake8/main/cli.py", line 22, in main
| app.run(argv)
|   File "/usr/lib/python3/dist-packages/flake8/main/application.py", line 336, 
in run
| self._run(argv)
|   File "/usr/lib/python3/dist-packages/flake8/main/application.py", line 324, 
in _run
| self.initialize(argv)
|   File "/usr/lib/python3/dist-packages/flake8/main/application.py", line 302, 
in initialize
| self.find_plugins(
|   File "/usr/lib/python3/dist-packages/flake8/main/application.py", line 128, 
in find_plugins
| self.plugins = finder.load_plugins(raw, opts)
|^^
|   File "/usr/lib/python3/dist-packages/flake8/plugins/finder.py", line 370, 
in load_plugins
| return _classify_plugins(_import_plugins(plugins, opts), opts)
|  ^^
|   File "/usr/lib/python3/dist-packages/flake8/plugins/finder.py", line 312, 
in _import_plugins
| return [_load_plugin(p) for p in plugins]
| ^^^
|   File "/usr/lib/python3/dist-packages/flake8/plugins/finder.py", line 298, 
in _load_plugin
| raise FailedToLoadPlugin(plugin.package, e)
| flake8.exceptions.FailedToLoadPlugin: Flake8 failed to load plugin 
"pycodestyle" due to cannot import name 'missing_whitespace_around_operator' 
from 'pycodestyle' (/usr/lib/python3/dist-packages/pycodestyle.py).

Commenting that out in `/usr/lib/python3/dist-
packages/flake8/plugins/pycodestyle.py`, I get others.

It looks like this is fixed upstream in
https://github.com/PyCQA/flake8/commit/9786562feb573d30c73f18e1a0a6685c8584e9b5

Can we please include this?

** Affects: flake8 (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: flake8 (Ubuntu Noble)
 Importance: Undecided
 Status: New

** Also affects: flake8 (Ubuntu Noble)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2056093

Title:
  ImportError: cannot import name 'missing_whitespace_around_operator'
  from 'pycodestyle' (/usr/lib/python3/dist-packages/pycodestyle.py).
  Did you mean: 'whitespace_around_operator'?

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/flake8/+bug/2056093/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1598304] Re: systemd services created by snappy breaks etckeeper

2024-03-03 Thread Haw Loeung
** Also affects: hundredpapercuts
   Importance: Undecided
   Status: New

** Changed in: etckeeper (Ubuntu)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1598304

Title:
  systemd services created by snappy breaks etckeeper

To manage notifications about this bug go to:
https://bugs.launchpad.net/etckeeper/+bug/1598304/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1986739] Re: etckeeper cron spam => please pass --quiet to `bzr commit`

2024-03-03 Thread Haw Loeung
** Also affects: hundredpapercuts
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1986739

Title:
  etckeeper cron spam => please pass --quiet to `bzr commit`

To manage notifications about this bug go to:
https://bugs.launchpad.net/etckeeper/+bug/1986739/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1922960] Re: ieee-data monthly cron job in Xenial probably DDoSes ieee.org

2024-03-03 Thread Haw Loeung
** Also affects: hundredpapercuts
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1922960

Title:
  ieee-data monthly cron job in Xenial probably DDoSes ieee.org

To manage notifications about this bug go to:
https://bugs.launchpad.net/hundredpapercuts/+bug/1922960/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2038613] Re: Unable to get a copy of private bzr repositories using 'bzr branch' on mantic

2024-02-28 Thread Haw Loeung
** Also affects: breezy (Ubuntu Mantic)
   Importance: Undecided
   Status: New

** Also affects: breezy (Ubuntu Noble)
   Importance: Undecided
   Status: Confirmed

** Summary changed:

- Unable to get a copy of private bzr repositories using 'bzr branch' on mantic
+ Unable to get a copy of private bzr repositories using 'bzr branch' on mantic 
& noble

** Changed in: breezy (Ubuntu Mantic)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2038613

Title:
  Unable to get a copy of private bzr repositories using 'bzr branch' on
  mantic & noble

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/breezy/+bug/2038613/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2038613] Re: Unable to get a copy of private bzr repositories using 'bzr branch' on mantic

2024-02-28 Thread Haw Loeung
The workaround doesn't work for me?

| [hloeung@dharkan tmp]$ bzr branch lp+bzr:canonical-sshebang
| ...
|
| lazr.restfulclient.errors.ServerError: HTTP Error 500: Internal Server Error
| Response headers:
| ---
| connection: close
| content-length: 14
| content-type: text/plain;charset=utf-8
| date: Thu, 29 Feb 2024 01:47:10 GMT
| server: gunicorn
| status: 500
| x-lazr-oopsid: OOPS-5b2b04c2eb781d9c86031e2a31b56739
| x-powered-by: Zope (www.zope.org), Python (www.python.org)
| x-request-id: d23d8481-48de-495f-a8ff-520577cedfe0
| x-vcs-revision: 9643586c585856148a18782148972ae9c1179d06
| ---
| Response body:
| ---
| b'AssertionError'
| ---
|
|
| brz 3.3.5 on python 3.12.2 (Linux-6.6.0-14-generic-x86_64-with-glibc2.39)
| arguments: ['bzr', 'branch', 'lp+bzr:canonical-sshebang']
| plugins: bash_completion[3.3.5], changelog_merge[3.3.5],
| commitfromnews[3.3.5], cvs[3.3.5], darcs[3.3.5], email[3.3.5],
| etckeeper[unknown], fastimport[3.3.5], flake8[unknown], fossil[3.3.5],
| github[3.3.5], gitlab[3.3.5], hg[3.3.5], launchpad[3.3.5], mtn[3.3.5],
| netrc_credential_store[3.3.5], news_merge[3.3.5], po_merge[3.3.5],
| propose[3.3.5], pypi[3.3.5], quilt[unknown], repodebug[3.3.5],
| rewrite[unknown], stats[3.3.5], svn[3.3.5], upload[3.3.5],
| weave_fmt[3.3.5], webdav[3.3.5], zsh_completion[3.3.5]
| encoding: 'utf-8', fsenc: 'utf-8', lang: 'en_US.utf8'
|
| *** Breezy has encountered an internal error.  This probably indicates a
| bug in Breezy.  You can help us fix it by filing a bug report at
| https://bugs.launchpad.net/brz/+filebug
| including this traceback and a description of the problem.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2038613

Title:
  Unable to get a copy of private bzr repositories using 'bzr branch' on
  mantic

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/breezy/+bug/2038613/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2054924] Re: color emoji are broken with fontconfig 2.15

2024-02-27 Thread Haw Loeung
** Changed in: fontconfig (Ubuntu)
   Status: Triaged => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2054924

Title:
  color emoji are broken with fontconfig 2.15

To manage notifications about this bug go to:
https://bugs.launchpad.net/fontconfig/+bug/2054924/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2054924] Re: color emoji are broken with fontconfig 2.15

2024-02-26 Thread Haw Loeung
The workaround detailed upstream works for me - removing
/etc/fonts/conf.d/70-no-bitmaps.conf and re-generating your fonts cache.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2054924

Title:
  color emoji are broken with fontconfig 2.15

To manage notifications about this bug go to:
https://bugs.launchpad.net/fontconfig/+bug/2054924/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1968305] Re: sshd_config.d overrides not working

2022-04-10 Thread Haw Loeung
> From debugging sshd, I can see the override file is indeed being read,
and the option is supposedly set. But after testing, the options are not
taking effect.

From debugging, do you see /etc/ssh/sshd_config being read first?

For OpenSSH, at least with the client side, the first defined value is
used and I suspect it's the same with the server side.

Can you show us the contents of your /etc/ssh/sshd_config to see if the
"Include /etc/ssh/sshd_config.d/*.conf" is at the very top?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1968305

Title:
  sshd_config.d overrides not working

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/1968305/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1960570] [NEW] Logrotate shouldn't restart conntrackd

2022-02-10 Thread Haw Loeung
Public bug reported:

Hi,

The current logrotate config is as follows:

===
/var/log/conntrackd-stats.log {
weekly
rotate 2
missingok

postrotate
invoke-rc.d conntrackd restart > /dev/null
endscript
}
===

This causes weekly restarts of conntrackd. Can we switch to using
copytruncate instead to prevent restarting conntrackd?

** Affects: conntrack-tools (Ubuntu)
 Importance: Undecided
 Status: New

** Description changed:

  Hi,
  
  The current logrotate config is as follows:
  
  ===
  /var/log/conntrackd-stats.log {
- weekly
- rotate 2
- missingok
+ weekly
+ rotate 2
+ missingok
  
- postrotate
- invoke-rc.d conntrackd restart > /dev/null
- endscript 
+ postrotate
+ invoke-rc.d conntrackd restart > /dev/null
+ endscript
  }
  ===
  
- This causes daily restarts of conntrackd. Can we switch to using
+ This causes weekly restarts of conntrackd. Can we switch to using
  copytruncate instead to prevent restarting conntrackd?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1960570

Title:
  Logrotate shouldn't restart conntrackd

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/conntrack-tools/+bug/1960570/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1928989] Re: expiring trust anchor compatibility issue

2022-01-16 Thread Haw Loeung
I think you want package updates from Ubuntu ESM, in particular ca-
certificates 20190110~14.04.1~esm2.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1928989

Title:
  expiring trust anchor compatibility issue

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1928989/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1957128] Re: ifenslave fails to detach slave from bonded interface

2022-01-11 Thread Haw Loeung
Looks fixed in more recent versions.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1957128

Title:
  ifenslave fails to detach slave from bonded interface

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ifenslave/+bug/1957128/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1957128] [NEW] ifenslave fails to detach slave from bonded interface

2022-01-11 Thread Haw Loeung
Public bug reported:

Hi,

When I try to detach a slave from a bonded interface, it fails as
follows:

| [hloeung@myhost etc]$ sudo ifenslave -v -d bond0 ens2f1
| ens2f1: is not enslaved to bond0

It's definitely part of the bond:

| [hloeung@myhost etc]$ ls /sys/class/net/bond0/ -la | grep ens
| lrwxrwxrwx  1 root root0 Jan 12 02:36 lower_ens2f0 -> 
../../../pci:00/:00:02.0/:05:00.0/net/ens2f0
| lrwxrwxrwx  1 root root0 Jan 12 02:36 lower_ens2f1 -> 
../../../pci:00/:00:02.0/:05:00.1/net/ens2f1

Running ifenslave with `sh -x` shows this:

| ...
| + [ -z ens2f1 ]
| + master=bond0
| + shift
| + [ -d /sys/class/net/bond0 ]
| + [ -d /sys/class/net/bond0/bonding ]
| + [  = 1 ]
| + [ -d /sys/class/net/ens2f1 ]
| + [ -z 1 ]
| + [ ! -h /sys/class/net/bond0/slave_ens2f1 ]
| + echo ens2f1: is not enslaved to bond0
| ens2f1: is not enslaved to bond0
| + continue
| + exit 0

I think the bug is in this code:

| if [ -z "$DETACH" ]; then
| if [ -h "/sys/class/net/$master/slave_$slave" ] ||
|[ -h "/sys/class/net/$master/lower_$slave" ]; then
| echo "$slave: already enslaved to $master" >&2
| continue
| fi
| ...
| else
| if [ ! -h "/sys/class/net/$master/slave_$slave" ] ||
|[ ! -h "/sys/class/net/$master/lower_$slave" ]; then
| echo "$slave: is not enslaved to $master" >&2
| continue
| fi

Where rather than ||, it should be && in the else block (for detaching).

** Affects: ifenslave (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: ifenslave (Ubuntu Xenial)
 Importance: Undecided
 Status: Invalid

** Changed in: ifenslave (Ubuntu)
   Status: New => Invalid

** Also affects: ifenslave (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: ifenslave (Ubuntu Xenial)
   Status: New => Invalid

** Description changed:

  Hi,
  
  When I try to detach a slave from a bonded interface, it fails as
  follows:
  
  | [hloeung@myhost etc]$ sudo ifenslave -v -d bond0 ens2f1
  | ens2f1: is not enslaved to bond0
  
  It's definitely part of the bond:
  
  | [hloeung@myhost etc]$ ls /sys/class/net/bond0/ -la | grep ens
  | lrwxrwxrwx  1 root root0 Jan 12 02:36 lower_ens2f0 -> 
../../../pci:00/:00:02.0/:05:00.0/net/ens2f0
  | lrwxrwxrwx  1 root root0 Jan 12 02:36 lower_ens2f1 -> 
../../../pci:00/:00:02.0/:05:00.1/net/ens2f1
  
  Running ifenslave with `sh -x` shows this:
  
  | ...
  | + [ -z ens2f1 ]
  | + master=bond0
  | + shift
  | + [ -d /sys/class/net/bond0 ]
  | + [ -d /sys/class/net/bond0/bonding ]
  | + [  = 1 ]
  | + [ -d /sys/class/net/ens2f1 ]
  | + [ -z 1 ]
  | + [ ! -h /sys/class/net/bond0/slave_ens2f1 ]
  | + echo ens2f1: is not enslaved to bond0
  | ens2f1: is not enslaved to bond0
  | + continue
  | + exit 0
  
  I think the bug is in this code:
  
  | if [ -z "$DETACH" ]; then
  | if [ -h "/sys/class/net/$master/slave_$slave" ] ||
  |[ -h "/sys/class/net/$master/lower_$slave" ]; then
  | echo "$slave: already enslaved to $master" >&2
  | continue
  | fi
  | ...
  | else
- | if [ ! -h "/sys/class/net/$master/slave_$slave" ] &&
+ | if [ ! -h "/sys/class/net/$master/slave_$slave" ] ||
  |[ ! -h "/sys/class/net/$master/lower_$slave" ]; then
  | echo "$slave: is not enslaved to $master" >&2
  | continue
  | fi
  
- Where rather than &&, it should be || in the else block (for detaching).
+ Where rather than ||, it should be && in the else block (for detaching).

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1957128

Title:
  ifenslave fails to detach slave from bonded interface

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ifenslave/+bug/1957128/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1954721] [NEW] no LLDP on Intel X710 NICs

2021-12-13 Thread Haw Loeung
Public bug reported:

Hi,

Per the Intel community [1], for Intel X710 controllers, the NIC is
meant to handle LLDP directly. Unfortunately, this doesn't play well
with lldpd:

| hloeung@cumulus:mgmt:~$ net show lldp | grep swp24
| swp24  10GTrunk/L237383638-3530-5A43-3238-30423954  Unknown

It is known in upstream lldpd[2] with a fix proposed to work around this
by disabling handling of LLDP in the NIC[3]. Can we please backport this
to Focal?

The suggested workaround is:

| for i in $(sudo ls /sys/kernel/debug/i40e); do
|   echo lldp stop | sudo tee /sys/kernel/debug/i40e/${i}/command
| done

[1]https://community.intel.com/t5/Ethernet-Products/X710-dropping-LLDP-frames/m-p/348508
[2]https://github.com/lldpd/lldpd/issues/372
[3]https://github.com/lldpd/lldpd/commit/a74fd8ca9c02fc0eb81f7a219b2bb657cac25ca2

** Affects: lldpd (Ubuntu)
 Importance: Undecided
 Status: Fix Released

** Affects: lldpd (Ubuntu Focal)
 Importance: Undecided
 Status: New

** Affects: lldpd (Ubuntu Hirsute)
 Importance: Undecided
 Status: New

** Affects: lldpd (Ubuntu Impish)
 Importance: Undecided
 Status: Fix Released

** Affects: lldpd (Ubuntu Jammy)
 Importance: Undecided
 Status: Fix Released

** Also affects: lldpd (Ubuntu Impish)
   Importance: Undecided
   Status: New

** Also affects: lldpd (Ubuntu Hirsute)
   Importance: Undecided
   Status: New

** Also affects: lldpd (Ubuntu Jammy)
   Importance: Undecided
   Status: New

** Also affects: lldpd (Ubuntu Focal)
   Importance: Undecided
   Status: New

** Changed in: lldpd (Ubuntu Impish)
   Status: New => Invalid

** Changed in: lldpd (Ubuntu Jammy)
   Status: New => Invalid

** Changed in: lldpd (Ubuntu Impish)
   Status: Invalid => Fix Released

** Changed in: lldpd (Ubuntu Jammy)
   Status: Invalid => Fix Released

** Description changed:

  Hi,
  
  Per the Intel community [1], for Intel X710 controllers, the NIC is
  meant to handle LLDP directly. Unfortunately, this doesn't play well
  with lldpd:
  
  | hloeung@cumulus:mgmt:~$ net show lldp | grep swp24
  | swp24  10GTrunk/L237383638-3530-5A43-3238-30423954  Unknown
  
- It is known in upstream lldpd with a fix proposed to work around this by
- disabling handling of LLDP in the NIC[2]. Can we please backport this to
- Focal?
+ It is known in upstream lldpd[2] with a fix proposed to work around this
+ by disabling handling of LLDP in the NIC[3]. Can we please backport this
+ to Focal?
  
  The suggested workaround is:
  
  | for i in $(sudo ls /sys/kernel/debug/i40e); do
  |   echo lldp stop | sudo tee /sys/kernel/debug/i40e/${i}/command
  | done
  
- 
  
[1]https://community.intel.com/t5/Ethernet-Products/X710-dropping-LLDP-frames/m-p/348508
- 
[2]https://github.com/lldpd/lldpd/commit/a74fd8ca9c02fc0eb81f7a219b2bb657cac25ca2
+ [2]https://github.com/lldpd/lldpd/issues/372
+ 
[3]https://github.com/lldpd/lldpd/commit/a74fd8ca9c02fc0eb81f7a219b2bb657cac25ca2

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1954721

Title:
  no LLDP on Intel X710 NICs

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lldpd/+bug/1954721/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1918936] Re: ipset does NSS lookups even if ports are numeric

2021-11-30 Thread Haw Loeung
Hirsute verified - https://paste.ubuntu.com/p/Zs6vG7M6Jf/

| real1m46.509s

vs.

| real0m43.891s

Impish verified - https://paste.ubuntu.com/p/yWW4k8Jy79/

| real1m14.348s

vs.

| real0m27.687s

** Tags removed: verification-needed verification-needed-hirsute 
verification-needed-impish
** Tags added: verification-done verification-done-hirsute 
verification-done-impish

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1918936

Title:
  ipset does NSS lookups even if ports are numeric

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ipset/+bug/1918936/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1918936] Re: ipset does NSS lookups even if ports are numeric

2021-11-30 Thread Haw Loeung
Tested on a Focal VM in Canonistack.

Using current ipset:

| ubuntu@juju-87625f-hloeung-110:~$ sudo apt-get install ipset
| ...
| Get:1 http://us.archive.ubuntu.com/ubuntu focal/main amd64 libipset13 amd64 
7.5-1~exp1 [53.4 kB]
| Get:2 http://us.archive.ubuntu.com/ubuntu focal/main amd64 ipset amd64 
7.5-1~exp1 [29.8 kB]

| ubuntu@juju-87625f-hloeung-110:~$ time sudo ipset restore < 
whitelist-ipv4-2021-06-29-with-proto-nums
|
| real1m55.870s
| user1m3.704s
| sys 0m26.604s

Using the one in -proposed:

| Get:1 http://us.archive.ubuntu.com/ubuntu focal-proposed/main amd64 ipset 
amd64 7.5-1ubuntu0.20.04.1 [29.8 kB]
| Get:1 http://us.archive.ubuntu.com/ubuntu focal-proposed/main amd64 
libipset13 amd64 7.5-1ubuntu0.20.04.1 [53.6 kB]

| ubuntu@juju-87625f-hloeung-110:~$ time sudo ipset restore < 
whitelist-ipv4-2021-06-29-with-proto-nums
|
| real0m41.372s
| user0m18.724s
| sys 0m16.023s

Full output - https://paste.ubuntu.com/p/w74Kjvnn84/

** Tags removed: verification-needed-focal
** Tags added: verification-done-focal

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1918936

Title:
  ipset does NSS lookups even if ports are numeric

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ipset/+bug/1918936/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1948995] [NEW] Allow reverting to older revisions of a snap

2021-10-27 Thread Haw Loeung
Public bug reported:

Hi,

Is there a way to list the previous revisions of a snap in a specific
channel and then allow the snap client to revert or install specific
revisions?

I understand `snap revert` exists, but it only allows to revert to the
last installed and that's it.

My use case is this, on an application unit using the ruby snap, it was
automatically updated around 7 days ago. It wasn't until recently when
we wanted to update the application where the latest ruby snap broke gem
collection, see upstream bug[1]. But it wasn't known at the time so we
thought to try the latest ruby from the latest channel (from
2.7/stable). So:

| snap refresh ruby --channel latest/stable

So now we want to revert:

| $ sudo snap revert ruby
| ruby reverted to 2.7.4
| $ sudo snap revert ruby
| error: cannot revert "ruby": no revision to revert to

What we actually want is to revert from 2.7.4 (231) in 2.7/stable to
2.7.4 (219) also in 2.7/stable.

The only way seems to be to find the correct URLs for both assertion
file and snap itself, download both, and to use `snap ack ` plus `snap install RjAgguCDAawLSJ3IByPe0R92xlNtrfGt_219.snap`.

[1]https://github.com/ruby/snap.ruby/issues/28

** Affects: snapd (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1948995

Title:
  Allow reverting to older revisions of a snap

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/snapd/+bug/1948995/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Re: [Bug 1940011] Re: Reduce cron spam from weekly update-notifier-common

2021-09-12 Thread Haw Loeung
On Thu, Sep 02, 2021 at 05:39:23PM -, Brian Murray wrote:
> I think part of the point of having the cronjob is to mail the system
> administrator and let them know that a new release of Ubuntu is
> available. That being said I do feel like sending the email every week
> until the system upgraded is a bit much. I'd be happy to hear about any
> clever ideas for avoiding that.

Maybe email once per new release of Ubuntu (including point
releases). Create a flag on disk when notifed for said release.

If we wanted to, create the flag on /run, so that a reboot resets it
all.

Unfortunately, this is made worse with the shift to replacing services
with juju deployments where environments contain multiple units each
trying to email about a new release.

Thanks!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1940011

Title:
  Reduce cron spam from weekly update-notifier-common

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/update-notifier/+bug/1940011/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1941692] Re: Update nmap-mac-prefixes on packaging?

2021-08-25 Thread Haw Loeung
** Description changed:

  Hi,
  
  The bundled nmap-mac-prefixes dates back to 2019:
  
  | # $Id: nmap-mac-prefixes 37638 2019-05-28 21:35:45Z dmiller $ generated 
with make-mac-prefixes.pl
  | # Original data comes from http://standards.ieee.org/regauth/oui/oui.txt
  | # These values are known as Organizationally Unique Identifiers (OUIs)
  | # See http://standards.ieee.org/faqs/OUI.html
  | # We have added a few unregistered OUIs at the end.
  
  Think we could automatically update this when packaging nmap?
  
  Maybe get it from http://standards-oui.ieee.org/oui/oui.txt (the base 16
  lines).
+ 
+ Something like this would generate the file in a format nmap
+ understands:
+ 
+ | grep 'base 16' oui.txt | sed -e 's/\s*(base 16)\s*/ /g' | sudo tee
+ /usr/share/nmap/nmap-mac-prefixes

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1941692

Title:
  Update nmap-mac-prefixes on packaging?

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/nmap/+bug/1941692/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1941692] [NEW] Update nmap-mac-prefixes on packaging?

2021-08-25 Thread Haw Loeung
Public bug reported:

Hi,

The bundled nmap-mac-prefixes dates back to 2019:

| # $Id: nmap-mac-prefixes 37638 2019-05-28 21:35:45Z dmiller $ generated with 
make-mac-prefixes.pl
| # Original data comes from http://standards.ieee.org/regauth/oui/oui.txt
| # These values are known as Organizationally Unique Identifiers (OUIs)
| # See http://standards.ieee.org/faqs/OUI.html
| # We have added a few unregistered OUIs at the end.

Think we could automatically update this when packaging nmap?

Maybe get it from http://standards-oui.ieee.org/oui/oui.txt (the base 16
lines).

** Affects: nmap (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1941692

Title:
  Update nmap-mac-prefixes on packaging?

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/nmap/+bug/1941692/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1836475] Re: [SRU] update-notifier-common weekly cron job runs at the same time for all computers across the globe

2021-08-25 Thread Haw Loeung
LGTM, thanks!

| ubuntu@juju-87625f-hloeung-66:~$ cp /etc/cron.weekly/update-notifier-common ~/
| ubuntu@juju-87625f-hloeung-66:~$ sudo apt-get update
| ...
| Get:8 http://us.archive.ubuntu.com/ubuntu bionic-proposed/main amd64 Packages 
[104 kB]
| ...
| ubuntu@juju-87625f-hloeung-66:~$ sudo apt-get install update-notifier-common
| ubuntu@juju-87625f-hloeung-66:~$ diff -Naurp ~/update-notifier-common 
/etc/cron.weekly/update-notifier-common
| --- /home/ubuntu/update-notifier-common 2021-08-26 00:27:43.687383953 +
| +++ /etc/cron.weekly/update-notifier-common 2021-08-23 22:33:23.0 
+
| @@ -4,5 +4,12 @@ set -e
|
|  [ -x /usr/lib/ubuntu-release-upgrader/release-upgrade-motd ] || exit 0
|
| -# Check to see whether there is a new version of Ubuntu available
| -/usr/lib/ubuntu-release-upgrader/release-upgrade-motd
| +sleep_then_check() {
| +# Sleep for up to an hour to spread the load of checking for updates on
| +# the Ubuntu infrastructure
| +sleep $(shuf -i 1-3600 -n 1)
| +# Check to see whether there is a new version of Ubuntu available
| +/usr/lib/ubuntu-release-upgrader/release-upgrade-motd
| +}
| +
| +sleep_then_check &
| ubuntu@juju-87625f-hloeung-66:~$ sudo /etc/cron.weekly/update-notifier-common
| ubuntu@juju-87625f-hloeung-66:~$ ps afxuww | grep sleep
| root 22110  0.0  0.0   7932   740 pts/0S00:29   0:00  \_ sleep 767
| ubuntu@juju-87625f-hloeung-66:~$ ls -la 
/var/lib/ubuntu-release-upgrader/release-upgrade-available
| -rw-r--r-- 1 root root 80 Aug 26 00:27 
/var/lib/ubuntu-release-upgrader/release-upgrade-available
| ubuntu@juju-87625f-hloeung-66:~$ New release '20.04.2 LTS' available.
| Run 'do-release-upgrade' to upgrade to it.
|

The additional output from the end is when it ran, LP:1940011 is to see
if we can silence that to reduce weekly cron spam.

** Tags removed: verification-needed verification-needed-bionic
** Tags added: verification-done verification-done-bionic

** Changed in: update-notifier (Ubuntu Bionic)
   Importance: Undecided => High

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1836475

Title:
  [SRU] update-notifier-common weekly cron job runs at the same time for
  all computers across the globe

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/update-notifier/+bug/1836475/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1918936] Re: ipset does NSS lookups even if ports are numeric

2021-08-15 Thread Haw Loeung
** Changed in: ipset (Ubuntu Focal)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1918936

Title:
  ipset does NSS lookups even if ports are numeric

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ipset/+bug/1918936/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1940011] [NEW] Reduce cron spam from weekly update-notifier-common

2021-08-15 Thread Haw Loeung
Public bug reported:

Hi,

We get these cron spam weekly:

| Received: by mysystem.mydomain.local (Postfix)
| id B19E32E806B; Sun, 15 Aug 2021 06:47:03 + (UTC)
| Delivered-To: root@mysystem.mydomain.local
| Received: by mysystem.mydomain.local (Postfix, from userid 0)
| id 9DD002E8075; Sun, 15 Aug 2021 06:47:03 + (UTC)
| From: Cron Daemon 
| To: root@mysystem.mydomain.local
| Subject: Cron  test -x /usr/sbin/anacron || ( cd / && 
run-parts --report /etc/cron.weekly )
| MIME-Version: 1.0
| Content-Type: text/plain; charset=UTF-8
| Content-Transfer-Encoding: 8bit
| X-Cron-Env: 
| X-Cron-Env: 

| X-Cron-Env: 
| X-Cron-Env: 
| Message-Id: <20210815064703.9DD002E8075@mysystem.mydomain.local>
| Date: Sun, 15 Aug 2021 06:47:03 + (UTC)
|
| /etc/cron.weekly/update-notifier-common:
| New release '18.04.5 LTS' available.
| Run 'do-release-upgrade' to upgrade to it.

This is output from /etc/cron.weekly/update-notifier-common calling
/usr/lib/ubuntu-release-upgrader/release-upgrade-motd

That's fine for when you have a system or two, but probably not when you
manage many. Any chance the cron job can be updated so stdout is
silenced? So:

| # Check to see whether there is a new version of Ubuntu available
| /usr/lib/ubuntu-release-upgrader/release-upgrade-motd > /dev/null


Thanks

** Affects: update-notifier (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1940011

Title:
  Reduce cron spam from weekly update-notifier-common

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/update-notifier/+bug/1940011/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1836475] Re: [SRU] update-notifier-common weekly cron job runs at the same time for all computers across the globe

2021-08-13 Thread Haw Loeung
Thanks Brian (brian-murray) for sponsoring this change.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1836475

Title:
  [SRU] update-notifier-common weekly cron job runs at the same time for
  all computers across the globe

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/update-notifier/+bug/1836475/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1836475] Re: [SRU] update-notifier-common weekly cron job runs at the same time for all computers across the globe

2021-08-13 Thread Haw Loeung
Looks good to me:

| ubuntu@juju-87625f-hloeung-100:/etc/apt$ sudo apt-get install 
update-notifier-common
| Reading package lists... Done
| Building dependency tree
| Reading state information... Done
| The following packages were automatically installed and are no longer 
required:
|   dnsmasq-base kpartx libfl2 libidn11 libsgutils2-2 liburcu6 sg3-utils 
sg3-utils-udev
| Use 'sudo apt autoremove' to remove them.
| The following packages will be upgraded:
|   update-notifier-common
| 1 upgraded, 0 newly installed, 0 to remove and 44 not upgraded.
| Need to get 133 kB of archives.
| After this operation, 0 B of additional disk space will be used.
| Get:1 http://us.archive.ubuntu.com/ubuntu focal-proposed/main amd64 
update-notifier-common all 3.192.30.9 [133 kB]
| Fetched 133 kB in 0s (3458 kB/s)
| (Reading database ... 130802 files and directories currently installed.)
| Preparing to unpack .../update-notifier-common_3.192.30.9_all.deb ...
| Unpacking update-notifier-common (3.192.30.9) over (3.192.30.8) ...
| Setting up update-notifier-common (3.192.30.9) ...
| Installing new version of config file /etc/cron.weekly/update-notifier-common 
...

Comparing it with the old backup copy:

| ubuntu@juju-87625f-hloeung-100:/etc/apt$ diff -Naurp ~/update-notifier-common 
/etc/cron.weekly/update-notifier-common
| --- /home/ubuntu/update-notifier-common 2021-08-13 05:55:55.859177053 +
| +++ /etc/cron.weekly/update-notifier-common 2021-08-05 14:01:11.0 
+
| @@ -4,5 +4,12 @@ set -e
|
|  [ -x /usr/lib/ubuntu-release-upgrader/release-upgrade-motd ] || exit 0
|
| -# Check to see whether there is a new version of Ubuntu available
| -/usr/lib/ubuntu-release-upgrader/release-upgrade-motd
| +sleep_then_check() {
| +# Sleep for up to an hour to spread the load of checking for updates on
| +# the Ubuntu infrastructure
| +sleep $(shuf -i 1-3600 -n 1)
| +# Check to see whether there is a new version of Ubuntu available
| +/usr/lib/ubuntu-release-upgrader/release-upgrade-motd
| +}
| +
| +sleep_then_check &

| ubuntu@juju-87625f-hloeung-100:/etc/cron.weekly$ apt-cache policy 
update-notifier-commonupdate-notifier-common:
|   Installed: 3.192.30.9
|   Candidate: 3.192.30.9
|   Version table:
|  *** 3.192.30.9 500
| 500 http://us.archive.ubuntu.com/ubuntu focal-proposed/main amd64 
Packages
| 100 /var/lib/dpkg/status
|  3.192.30.8 500
| 500 http://us.archive.ubuntu.com/ubuntu focal-updates/main amd64 
Packages
|  3.192.30 500
| 500 http://us.archive.ubuntu.com/ubuntu focal/main amd64 Packages


** Tags removed: verification-needed verification-needed-focal
** Tags added: verification-done verification-done-focal

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1836475

Title:
  [SRU] update-notifier-common weekly cron job runs at the same time for
  all computers across the globe

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/update-notifier/+bug/1836475/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1836475] Re: [SRU] update-notifier-common weekly cron job runs at the same time for all computers across the globe

2021-08-05 Thread Haw Loeung
@waveform, perfect, thanks!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1836475

Title:
  [SRU] update-notifier-common weekly cron job runs at the same time for
  all computers across the globe

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/update-notifier/+bug/1836475/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1936175] Re: apt hook slows down apt - could this be asynchronous?

2021-07-16 Thread Haw Loeung
Something similar was done for checking for the latest Ubuntu release
and updating the MOTD in LP:1836475. It switches the download part into
a systemd timer
(https://launchpadlibrarian.net/505544658/lp1836475-focal.debdiff). So
maybe something similar here where the timer job checks existence and
timestamp of a file and runs if it doesn't exist or is older than a
certain period of time.

Then the apt hook itself would remove that file forcing the systemd
timer job to fire.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1936175

Title:
  apt hook slows down apt - could this be asynchronous?

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/update-notifier/+bug/1936175/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1935731] Re: [Errno 2] No such file or directory: '/usr/lib/python3/dist-packages/breezy/git/__init__.py'

2021-07-11 Thread Haw Loeung
Sorry for the noise, this is my dpkg-divert to disable git support per
LP:1868200.

** Changed in: breezy (Ubuntu)
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1935731

Title:
  [Errno 2] No such file or directory: '/usr/lib/python3/dist-
  packages/breezy/git/__init__.py'

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/breezy/+bug/1935731/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1935731] [NEW] [Errno 2] No such file or directory: '/usr/lib/python3/dist-packages/breezy/git/__init__.py'

2021-07-10 Thread Haw Loeung
Public bug reported:

Hi,

Install brz from Hirsute fails:

| Selecting previously unselected package python3-breezy.
| Preparing to unpack .../4-python3-breezy_3.1.0-8_amd64.deb ...
| Unpacking python3-breezy (3.1.0-8) ...
| Selecting previously unselected package brz.
| Preparing to unpack .../5-brz_3.1.0-8_all.deb ...
| Unpacking brz (3.1.0-8) ...
| Setting up python3-fastimport (0.9.8-5build1) ...
| Setting up python3-configobj (5.0.6-4) ...
| Setting up python3-patiencediff (0.2.1-1build1) ...
| Setting up python3-dulwich (0.20.15-1ubuntu1) ...
| Setting up python3-breezy (3.1.0-8) ...
| [Errno 2] No such file or directory: 
'/usr/lib/python3/dist-packages/breezy/git/__init__.py'
| dpkg: error processing package python3-breezy (--configure):
|  installed python3-breezy package post-installation script subprocess 
returned error exit status 1
| dpkg: dependency problems prevent configuration of brz:
|  brz depends on python3-breezy (<= 3.1.0-8.1~); however:
|   Package python3-breezy is not configured yet.
|  brz depends on python3-breezy (>= 3.1.0-8); however:
|   Package python3-breezy is not configured yet.
|
| dpkg: error processing package brz (--configure):
|  dependency problems - leaving unconfigured
| Processing triggers for man-db (2.9.4-2) ...
| No apport report written because the error message indicates its a followup 
error from a previous failure.
|   
Errors were encountered while processing:
|  python3-breezy
|  brz
| E: Sub-process /usr/bin/dpkg returned an error code (1)

Workaround seems to be touching / creating /usr/lib/python3/dist-
packages/breezy/git/__init__.py which then allows the rest to finish up.

Should that file be packaged?

** Affects: breezy (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1935731

Title:
  [Errno 2] No such file or directory: '/usr/lib/python3/dist-
  packages/breezy/git/__init__.py'

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/breezy/+bug/1935731/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1918936] Re: ipset does NSS lookups even if ports are numeric

2021-06-27 Thread Haw Loeung
** Patch added: "ipset.patch"
   
https://bugs.launchpad.net/ubuntu/+source/ipset/+bug/1918936/+attachment/5507474/+files/ipset.patch

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1918936

Title:
  ipset does NSS lookups even if ports are numeric

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ipset/+bug/1918936/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1918936] Re: ipset does NSS lookups even if ports are numeric

2021-06-27 Thread Haw Loeung
Apologies, can we update it to using the attached patch?

It includes the fix by Jozsef from upstream:

"""
Fix patch "Parse port before trying by service name"
The patch broke parsing service names: number parsing failures
are hard errors which erase data, thus making impossible to
parse input as a string. Fix it by enabling soft (warning)
failures in the case of port number parsing.
"""

https://git.netfilter.org/ipset/commit/?id=fd7d97c57e9dbe215c71be5a2fe049a1f905fddb


Thanks

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1918936

Title:
  ipset does NSS lookups even if ports are numeric

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ipset/+bug/1918936/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1918936] Re: ipset does NSS lookups even if ports are numeric

2021-06-25 Thread Haw Loeung
Per discussion on Mattermost, the original behavior was to try
string_to_u16() before parse_portname(). This was switched in upstream
commit
https://git.netfilter.org/ipset/tree/lib/parse.c?id=516600858cb54906fb728d04e5edf1131ee7b3b2
and released with ipset v6.37.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1918936

Title:
  ipset does NSS lookups even if ports are numeric

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ipset/+bug/1918936/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Re: [Bug 1836475] Re: [SRU] update-notifier-common weekly cron job runs at the same time for all computers across the globe

2021-06-14 Thread Haw Loeung
On Mon, Jun 14, 2021 at 04:16:28PM -, Robie Basak wrote:
> > I'm keen to try and avoid handling any more complex (arbitrary)
> customisations
>
> I agree! I think I prefer adding a random sleep for the SRU for this
> reason, even if the appropriate fix for the development release that
> landed in Groovy was to switch to a systemd timer. However a long random
> sleep in cron.weekly will hold up other cron.weekly jobs, so given that
> /usr/lib/ubuntu-release-upgrader/release-upgrade-motd already gates with
> a timestamp, perhaps backgrounding a shorter random delay would be
> preferable if that would be acceptable to Canonical IS?
>

We could try with a shorter random delay and see if it helps spread
the load.

The 'update-notifier-common' cron.weekly job is usually last so
wouldn't really hold up that many other cron.weekly jobs. If a shoter
random delay/sleep doesn't help, we could consider renaming it to
something like 'zzupdate-notifier-common' and increasing the delay
then.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1836475

Title:
  [SRU] update-notifier-common weekly cron job runs at the same time for
  all computers across the globe

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/update-notifier/+bug/1836475/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1780341] Re: squid should default to more human friendly timestamps

2021-06-07 Thread Haw Loeung
** Branch linked: lp:~hloeung/ubuntu-repository-cache/squid-logging-
human-sensible-timestamps

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1780341

Title:
  squid should default to more human friendly timestamps

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/squid/+bug/1780341/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1926379] Re: stack smashing attack detected in bash host tab completion

2021-04-29 Thread Haw Loeung
We're also seeing this with rsyncd:

| Apr 28 09:35:04 behaim rsync[2152929]: *** stack smashing detected
***: terminated

>From apt history logs:

| Upgrade: libldap-2.4-2:amd64 (2.4.49+dfsg-2ubuntu1.7, 
2.4.49+dfsg-2ubuntu1.8), libc6-dev:amd64 (2.31-0ubuntu9.2, 2.31-0ubuntu9.3), 
grub-common:amd64 (2.04-1ubuntu26.9, 2.04-1ubuntu26.11), python3-pip:amd64 
(20.0.2-5ubuntu1.1, 20.0.2-5ubuntu1.3), libc6:amd64 (2.31-0ubuntu9.2,
2.31-0ubuntu9.3)...

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926379

Title:
  stack smashing attack detected in bash host tab completion

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/glibc/+bug/1926379/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1918936] Re: ipset does NSS lookups even if ports are numeric

2021-03-12 Thread Haw Loeung
Example entries in ipset used for testing:

| add test 10.1.1.0/21,80,150.222.129.122/31
| add test 10.1.1.0/21,80,150.222.129.124/31
| add test 10.1.1.0/21,80,150.222.129.126/31

We're not specifying the protocol to avoid the just as expensive
getprotobyname() lookup.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1918936

Title:
  ipset does NSS lookups even if ports are numeric

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ipset/+bug/1918936/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1918936] Re: ipset does NSS lookups even if ports are numeric

2021-03-12 Thread Haw Loeung
Current size of ipset used for testing:

| ubuntu@juju-87625f-hloeung-93:~/ipset$ wc -l ~/whitelist-ipv4
| 515698 /home/ubuntu/whitelist-ipv4

With the patch:

| ubuntu@juju-87625f-hloeung-93:~/ipset$ sudo ipset destroy test
| ubuntu@juju-87625f-hloeung-93:~/ipset$ sudo ipset create test 
hash:net,port,net hashsize 4096 maxelem 786432
| ubuntu@juju-87625f-hloeung-93:~/ipset$ time sudo ~/ipset/src/ipset restore < 
~/whitelist-ipv4
|
| real0m7.204s
| user0m3.104s
| sys 0m3.877s

vs without.

| ubuntu@juju-87625f-hloeung-93:~/ipset$ sudo ipset destroy test
| ubuntu@juju-87625f-hloeung-93:~/ipset$ sudo ipset create test 
hash:net,port,net hashsize 4096 maxelem 786432
| ubuntu@juju-87625f-hloeung-93:~/ipset$ time sudo ~/ipset/src/ipset restore < 
~/whitelist-ipv4 
|
| real0m33.232s
| user0m25.291s
| sys 0m7.682s

Output of what I used to revert to compare -
https://paste.ubuntu.com/p/x9wcsQdxMn/

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1918936

Title:
  ipset does NSS lookups even if ports are numeric

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ipset/+bug/1918936/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1904369] Re: systemd 100% CPU; constantly reading service for socket activation

2021-02-19 Thread Haw Loeung
FWIW, these were the main Ubuntu Archive servers.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1904369

Title:
  systemd 100% CPU; constantly reading service for socket activation

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1904369/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1904369] Re: systemd 100% CPU; constantly reading service for socket activation

2021-02-19 Thread Haw Loeung
Sorry about not providing further details on this bug. We ended up
switching the last of our systems to xinetd so can no longer reproduce
and provide the information required.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1904369

Title:
  systemd 100% CPU; constantly reading service for socket activation

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1904369/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1913216] Re: unbound DNS service crashing/not starting

2021-01-25 Thread Haw Loeung
What does 'journalctl -xe' say? Also anything interesting in
/var/log/syslog?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1913216

Title:
  unbound DNS service crashing/not starting

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/unbound/+bug/1913216/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1836475] Re: [SRU] update-notifier-common weekly cron job runs at the same time for all computers across the globe

2020-12-20 Thread Haw Loeung
Any updates with regards to getting this backported to Focal?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1836475

Title:
  [SRU] update-notifier-common weekly cron job runs at the same time for
  all computers across the globe

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/update-notifier/+bug/1836475/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1898786] Re: bcache: Issues with large IO wait in bch_mca_scan() when shrinker is enabled

2020-12-14 Thread Haw Loeung
@mruffell, that's for Bionic, but for Focal is that still
5.4.0-56-generic? Or is there a new respun kernel to include these
patches?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1898786

Title:
  bcache: Issues with large IO wait in bch_mca_scan() when shrinker is
  enabled

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1898786/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1836475] Re: [SRU] update-notifier-common weekly cron job runs at the same time for all computers across the globe

2020-12-06 Thread Haw Loeung
I tried to verify this but it looks like it was removed from focal-
proposed.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1836475

Title:
  [SRU] update-notifier-common weekly cron job runs at the same time for
  all computers across the globe

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/update-notifier/+bug/1836475/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1901650] Re: grub-install: error: failed to register the EFI boot entry: Operation not permitted.

2020-11-26 Thread Haw Loeung
Adding '--no-nvram' as advised by Robert in #5 seems to work.

Without:

| ubuntu@machine-0:~$ sudo /usr/lib/grub/grub-multi-install --target=x86_64-efi
| Installing grub to /boot/efi.
| Installing for x86_64-efi platform.
| grub-install: warning: Internal error.
| grub-install: error: failed to register the EFI boot entry: Operation not 
permitted.
| Installing grub to /boot/efi.
| Installing for x86_64-efi platform.
| ^C
| ubuntu@machine-0:~$

With:

| ubuntu@machine-0:~$ sudo /usr/lib/grub/grub-multi-install --target=x86_64-efi 
--no-nvram
| Installing grub to /boot/efi.
| Installing for x86_64-efi platform.
| Installation finished. No error reported.
| ubuntu@machine-0:~$

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1901650

Title:
  grub-install: error: failed to register the EFI boot entry: Operation
  not permitted.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/grub2/+bug/1901650/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1901650] Re: grub-install: error: failed to register the EFI boot entry: Operation not permitted.

2020-11-22 Thread Haw Loeung
Other user reports - https://github.com/actions/virtual-
environments/issues/1605

** Bug watch added: github.com/actions/virtual-environments/issues #1605
   https://github.com/actions/virtual-environments/issues/1605

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1901650

Title:
  grub-install: error: failed to register the EFI boot entry: Operation
  not permitted.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/grub2/+bug/1901650/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1904369] [NEW] systemd 100% CPU; constantly reading service for socket activation

2020-11-15 Thread Haw Loeung
Public bug reported:

Hi,

We recently switched to using systemd's socket activation for per-client
limits. The configs are as follows:

| $ ls -la /etc/systemd/system/sockets.target.wants/rsyncd.socket
| lrwxrwxrwx 1 root root 33 Aug 25 00:09 
/etc/systemd/system/sockets.target.wants/rsyncd.socket -> 
/etc/systemd/system/rsyncd.socket

| $ cat /etc/systemd/system/sockets.target.wants/rsyncd.socket
| [Unit]
| Description=rsync daemon (socket)
| Conflicts=rsyncd.service
|
| [Socket]
| ListenStream=873
| Accept=yes
| MaxConnections=85
| MaxConnectionsPerSource=5
| KeepAlive=true
|
| [Install]
| WantedBy=sockets.target

| $ cat /etc/systemd/system/rsyncd@.service
| [Unit]
| Description=rsync daemon
| ConditionPathExists=/etc/rsyncd.conf
|
| [Service]
| ExecStart=/usr/bin/rsync --daemon
| StandardInput=socket
|
| [Install]
| WantedBy=multi-user.target

After a while, systemd runs hot consuming a whole CPU core:

| $ top -p 1
|   PID USER  PR  NIVIRTRESSHR S  %CPU %MEM TIME+ COMMAND
| 1 root  20   0 2057476 251560   6264 R  99.7  0.1  17903:32 systemd

strace shows it constantly doing this:

| $ sudo strace -p 1
| ...
| openat(AT_FDCWD, "/etc/systemd/system/rsyncd@.service", 
O_RDONLY|O_NOCTTY|O_NOFOLLOW|O_CLOEXEC) = 14
| fcntl(14, F_GETFL)  = 0x28000 (flags 
O_RDONLY|O_LARGEFILE|O_NOFOLLOW)
| fstat(14, {st_mode=S_IFREG|0644, st_size=173, ...}) = 0
| fstat(14, {st_mode=S_IFREG|0644, st_size=173, ...}) = 0
| fstat(14, {st_mode=S_IFREG|0644, st_size=173, ...}) = 0
| read(14, "[Unit]\nDescription=rsync daemon\n"..., 4096) = 173
| read(14, "", 4096)  = 0
| close(14)   = 0
| openat(AT_FDCWD, "/etc/systemd/system/rsyncd@.service", 
O_RDONLY|O_NOCTTY|O_NOFOLLOW|O_CLOEXEC) = 14
| fcntl(14, F_GETFL)  = 0x28000 (flags 
O_RDONLY|O_LARGEFILE|O_NOFOLLOW)
| fstat(14, {st_mode=S_IFREG|0644, st_size=173, ...}) = 0
| fstat(14, {st_mode=S_IFREG|0644, st_size=173, ...}) = 0
| fstat(14, {st_mode=S_IFREG|0644, st_size=173, ...}) = 0
| read(14, "[Unit]\nDescription=rsync daemon\n"..., 4096) = 173
| read(14, "", 4096)  = 0
| close(14)   = 0
| ^Cstrace: Process 1 detached

This is with 237-3ubuntu10.43 on a host running Bionic.

** Affects: systemd (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: systemd (Ubuntu Bionic)
 Importance: Undecided
 Status: New

** Also affects: systemd (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Description changed:

  Hi,
  
  We recently switched to using systemd's socket activation for per-client
  limits. The configs are as follows:
  
  | $ ls -la /etc/systemd/system/sockets.target.wants/rsyncd.socket
  | lrwxrwxrwx 1 root root 33 Aug 25 00:09 
/etc/systemd/system/sockets.target.wants/rsyncd.socket -> 
/etc/systemd/system/rsyncd.socket
  
  | $ cat /etc/systemd/system/sockets.target.wants/rsyncd.socket
  | [Unit]
  | Description=rsync daemon (socket)
  | Conflicts=rsyncd.service
  |
  | [Socket]
  | ListenStream=873
  | Accept=yes
  | MaxConnections=85
  | MaxConnectionsPerSource=5
  | KeepAlive=true
  |
  | [Install]
  | WantedBy=sockets.target
+ 
+ | $ cat /etc/systemd/system/rsyncd@.service
+ | [Unit]
+ | Description=rsync daemon
+ | ConditionPathExists=/etc/rsyncd.conf
+ |
+ | [Service]
+ | ExecStart=/usr/bin/rsync --daemon
+ | StandardInput=socket
+ |
+ | [Install]
+ | WantedBy=multi-user.target
  
  After a while, systemd runs hot consuming a whole CPU core:
  
  |   PID USER  PR  NIVIRTRESSHR S  %CPU %MEM TIME+ COMMAND
  | 1 root  20   0 2057476 251560   6264 R  99.7  0.1  17903:32 systemd
  
  strace shows it constantly doing this:
  
  | $ sudo strace -p 1
  | ...
  | openat(AT_FDCWD, "/etc/systemd/system/rsyncd@.service", 
O_RDONLY|O_NOCTTY|O_NOFOLLOW|O_CLOEXEC) = 14
  | fcntl(14, F_GETFL)  = 0x28000 (flags 
O_RDONLY|O_LARGEFILE|O_NOFOLLOW)
  | fstat(14, {st_mode=S_IFREG|0644, st_size=173, ...}) = 0
  | fstat(14, {st_mode=S_IFREG|0644, st_size=173, ...}) = 0
  | fstat(14, {st_mode=S_IFREG|0644, st_size=173, ...}) = 0
  | read(14, "[Unit]\nDescription=rsync daemon\n"..., 4096) = 173
  | read(14, "", 4096)  = 0
  | close(14)   = 0
  | openat(AT_FDCWD, "/etc/systemd/system/rsyncd@.service", 
O_RDONLY|O_NOCTTY|O_NOFOLLOW|O_CLOEXEC) = 14
  | fcntl(14, F_GETFL)  = 0x28000 (flags 
O_RDONLY|O_LARGEFILE|O_NOFOLLOW)
  | fstat(14, {st_mode=S_IFREG|0644, st_size=173, ...}) = 0
  | fstat(14, {st_mode=S_IFREG|0644, st_size=173, ...}) = 0
  | fstat(14, {st_mode=S_IFREG|0644, st_size=173, ...}) = 0
  | read(14, "[Unit]\nDescription=rsync daemon\n"..., 4096) = 173
  | read(14, "", 4096)  = 0
  | close(14)   = 0
  | ^Cstrace: Process 1 detached
  
  This is with 237-3ubuntu10.43 on a host running Bionic.

** Description changed:

  

[Bug 1902960] Re: Upgrade from 245.4-4ubuntu3.3 to 245.4-4ubuntu3.2 appears to break DNS resolution in some cases

2020-11-04 Thread Haw Loeung
Attached /var/log/syslog.

** Attachment added: "syslog"
   
https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1902960/+attachment/5431334/+files/syslog

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1902960

Title:
  Upgrade from 245.4-4ubuntu3.3 to 245.4-4ubuntu3.2 appears to break DNS
  resolution in some cases

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1902960/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1902960] Re: Upgrade from 245.4-4ubuntu3.3 to 245.4-4ubuntu3.2 appears to break DNS resolution in some cases

2020-11-04 Thread Haw Loeung
Spun up a new unit in Azure and also ran into this:

| https://paste.ubuntu.com/p/zd6z8dZ5Zr/

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1902960

Title:
  Upgrade from 245.4-4ubuntu3.3 to 245.4-4ubuntu3.2 appears to break DNS
  resolution in some cases

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1902960/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1901650] [NEW] grub-install: error: failed to register the EFI boot entry: Operation not permitted.

2020-10-26 Thread Haw Loeung
Public bug reported:

Hi,

Seeing a bunch of these across various units, all of which were recently
provisioned in Azure:

| ubuntu@machine-1:~$ sudo apt-get dist-upgrade
| Reading package lists... Done
| Building dependency tree
| Reading state information... Done
| Calculating upgrade... Done
| 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
| 1 not fully installed or removed.
| After this operation, 0 B of additional disk space will be used.
| Do you want to continue? [Y/n] y
| Setting up grub-efi-amd64-signed (1.142.8+2.04-1ubuntu26.6) ...
| Installing grub to /boot/efi.
| Installing for x86_64-efi platform.
| grub-install: warning: Internal error.
| grub-install: error: failed to register the EFI boot entry: Operation not 
permitted.

It keeps trying to install on either /dev/sda15 or /dev/sdb15 (some
units have attached volumes).

| ubuntu@machine-1:~$ sudo parted -l
| Model: Msft Virtual Disk (scsi)
| Disk /dev/sda: 34.4GB
| Sector size (logical/physical): 512B/512B
| Partition Table: gpt
| Disk Flags:
|
| Number  Start   End SizeFile system  Name  Flags
| 14  1049kB  5243kB  4194kB bios_grub
| 15  5243kB  116MB   111MB   fat32  boot, esp
|  1  116MB   34.4GB  34.2GB  ext4

Focal.

| Start-Date: 2020-10-26  16:02:51
| Upgrade: perl-base:amd64 (5.30.0-9build1, 5.30.0-9ubuntu0.2), 
bind9-dnsutils:amd64 (1:9.16.1-0ubuntu2.3, 1:9.16.1-0ubuntu2.4), 
grub-common:amd64 (2.04-1ubuntu26.4, 2.04-1ubuntu26.6), snapd:amd64 
(2.46.1+20.04, 2.47.1+20.04), bind9-host:amd64 (1:9.16.1-0ubuntu2.3, 
1:9.16.1-0ubuntu2.4), perl-modules-5.30:amd64 (5.30.0-9build1, 
5.30.0-9ubuntu0.2), grub2-common:amd64 (2.04-1ubuntu26.4, 2.04-1ubuntu26.6), 
plymouth-theme-ubuntu-text:amd64 (0.9.4git20200323-0ubuntu6, 
0.9.4git20200323-0ubuntu6.1), grub-pc:amd64 (2.04-1ubuntu26.4, 
2.04-1ubuntu26.6), libplymouth5:amd64 (0.9.4git20200323-0ubuntu6, 
0.9.4git20200323-0ubuntu6.1), libperl5.30:amd64 (5.30.0-9build1, 
5.30.0-9ubuntu0.2), grub-pc-bin:amd64 (2.04-1ubuntu26.4, 2.04-1ubuntu26.6), 
grub-efi-amd64-bin:amd64 (2.04-1ubuntu26.4, 2.04-1ubuntu26.6), plymouth:amd64 
(0.9.4git20200323-0ubuntu6, 0.9.4git20200323-0ubuntu6.1), 
grub-efi-amd64-signed:amd64 (1.142.6+2.04-1ubuntu26.4, 
1.142.8+2.04-1ubuntu26.6), perl:amd64 (5.30.0-9build1, 5.30.0-9ubuntu0.2), 
accountsservice:amd64 (0.6.55-0ubuntu12~20.04.1, 0.6.55-0ubuntu12~20.04.2), 
bind9-libs:amd64 (1:9.16.1-0ubuntu2.3, 1:9.16.1-0ubuntu2.4), 
libaccountsservice0:amd64 (0.6.55-0ubuntu12~20.04.1, 0.6.55-0ubuntu12~20.04.2)
| Error: Sub-process /usr/bin/dpkg returned an error code (1)
| End-Date: 2020-10-26  16:03:54

With apt term.log - https://paste.ubuntu.com/p/5HnGZ43QzH/

** Affects: grub2 (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: grub2 (Ubuntu Focal)
 Importance: Undecided
 Status: New

** Also affects: grub2 (Ubuntu Focal)
   Importance: Undecided
   Status: New

** Description changed:

  Hi,
  
  Seeing a bunch of these across various units, all of which were recently
  provisioned in Azure:
  
- | ubuntu@machine-1:~$ sudo apt-get dist-upgrade 
+ | ubuntu@machine-1:~$ sudo apt-get dist-upgrade
  | Reading package lists... Done
- | Building dependency tree   
+ | Building dependency tree
  | Reading state information... Done
  | Calculating upgrade... Done
  | 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
  | 1 not fully installed or removed.
  | After this operation, 0 B of additional disk space will be used.
  | Do you want to continue? [Y/n] y
  | Setting up grub-efi-amd64-signed (1.142.8+2.04-1ubuntu26.6) ...
  | Installing grub to /boot/efi.
  | Installing for x86_64-efi platform.
  | grub-install: warning: Internal error.
  | grub-install: error: failed to register the EFI boot entry: Operation not 
permitted.
  
  It keeps trying to install on either /dev/sda15 or /dev/sdb15 (some
  units have attached volumes).
  
  | ubuntu@machine-1:~$ sudo parted -l
  | Model: Msft Virtual Disk (scsi)
  | Disk /dev/sda: 34.4GB
  | Sector size (logical/physical): 512B/512B
  | Partition Table: gpt
  | Disk Flags:
- | 
+ |
  | Number  Start   End SizeFile system  Name  Flags
  | 14  1049kB  5243kB  4194kB bios_grub
  | 15  5243kB  116MB   111MB   fat32  boot, esp
  |  1  116MB   34.4GB  34.2GB  ext4
  
  Focal.
+ 
+ | Start-Date: 2020-10-26  16:02:51
+ | Upgrade: perl-base:amd64 (5.30.0-9build1, 5.30.0-9ubuntu0.2), 
bind9-dnsutils:amd64 (1:9.16.1-0ubuntu2.3, 1:9.16.1-0ubuntu2.4), 
grub-common:amd64 (2.04-1ubuntu26.4, 2.04-1ubuntu26.6), snapd:amd64 
(2.46.1+20.04, 2.47.1+20.04), bind9-host:amd64 (1:9.16.1-0ubuntu2.3, 
1:9.16.1-0ubuntu2.4), perl-modules-5.30:amd64 (5.30.0-9build1, 
5.30.0-9ubuntu0.2), grub2-common:amd64 (2.04-1ubuntu26.4, 2.04-1ubuntu26.6), 
plymouth-theme-ubuntu-text:amd64 (0.9.4git20200323-0ubuntu6, 
0.9.4git20200323-0ubuntu6.1), grub-pc:amd64 (2.04-1ubuntu26.4, 
2.04-1ubuntu26.6), 

[Bug 1900438] Re: Bcache bypasse writeback on caching device with fragmentation

2020-10-19 Thread Haw Loeung
** Changed in: linux (Ubuntu)
   Status: Incomplete => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1900438

Title:
  Bcache bypasse writeback on caching device with fragmentation

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1900438/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1898786] Re: Issue with bcache bch_mca_scan causing huge IO wait

2020-10-06 Thread Haw Loeung
** Description changed:

  Hello,
  
  In short, we faced an issue with a huge IO wait on a bionic Ubuntu 
4.15.0-118.119-generic kernel.
- This is the full list of process and the kernel function they were stuck in 
[2].
+ This is the full list of process and the kernel function they were stuck in 
[0].
  
- The main issue can probably be summarized by this perf reports 
+ The main issue can probably be summarized by this perf reports
  * first identify that the cpu are stuck in idle because of something[1]
  * second, see what kernel function seems to stuck the process kswapd0 and 
kswapd1 [2].
  
  We could see that this seems to be the mutex_lock in the bch_mca_scan
  function [3].
  
  After running the command:
  
-  | sudo bash -c "echo 1 > /sys/fs/bcache/f1a1e8cb-3e6b-40ea-852e-
+  | sudo bash -c "echo 1 > /sys/fs/bcache/f1a1e8cb-3e6b-40ea-852e-
  583c48d0c2b8/internal/btree_shrinker_disabled"
  
  The server started to respond normally and the IO wait dropped significantly
  [0]: https://pastebin.canonical.com/p/wYYKwHdRXk/
  [1]: https://pastebin.canonical.com/p/n2Tw57QyBC/
  [2]: https://pastebin.canonical.com/p/3QqFTfdHhX/
  [3]: 
https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/bionic/tree/drivers/md/bcache/btree.c?h=Ubuntu-4.15.0-118.119#n674
  
  
  $ cat /proc/version_signature
  Ubuntu 4.15.0-118.119-generic 4.15.18
  
  ProblemType: Bug
  DistroRelease: Ubuntu 18.04
  Package: linux-image-4.15.0-118-generic 4.15.0-118.119
  ProcVersionSignature: User Name 4.15.0-118.119-generic 4.15.18
  Uname: Linux 4.15.0-118-generic x86_64
  AlsaDevices:
-  total 0
-  crw-rw 1 root audio 116,  1 Sep 29 10:04 seq
-  crw-rw 1 root audio 116, 33 Sep 29 10:04 timer
+  total 0
+  crw-rw 1 root audio 116,  1 Sep 29 10:04 seq
+  crw-rw 1 root audio 116, 33 Sep 29 10:04 timer
  AplayDevices: Error: [Errno 2] No such file or directory: 'aplay': 'aplay'
  ApportVersion: 2.20.9-0ubuntu7.16
  Architecture: amd64
  ArecordDevices: Error: [Errno 2] No such file or directory: 'arecord': 
'arecord'
  AudioDevicesInUse: Error: command ['fuser', '-v', '/dev/snd/seq', 
'/dev/snd/timer'] failed with exit code 1:
  Date: Tue Oct  6 20:36:18 2020
  IwConfig: Error: [Errno 2] No such file or directory: 'iwconfig': 'iwconfig'
  MachineType: HP ProLiant DL380 G7
  PciMultimedia:
-  
+ 
  ProcFB: 0 radeondrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-4.15.0-118-generic 
root=UUID=c6ad1629-a506-4043-a339-6d57f0708d12 ro console=ttyS1,115200 nosplash
  RelatedPackageVersions:
-  linux-restricted-modules-4.15.0-118-generic N/A
-  linux-backports-modules-4.15.0-118-generic  N/A
-  linux-firmware  1.173.18
+  linux-restricted-modules-4.15.0-118-generic N/A
+  linux-backports-modules-4.15.0-118-generic  N/A
+  linux-firmware  1.173.18
  RfKill: Error: [Errno 2] No such file or directory: 'rfkill': 'rfkill'
  SourcePackage: linux
  UpgradeStatus: Upgraded to bionic on 2019-09-27 (375 days ago)
  dmi.bios.date: 05/05/2011
  dmi.bios.vendor: HP
  dmi.bios.version: P67
  dmi.chassis.type: 23
  dmi.chassis.vendor: HP
  dmi.modalias: 
dmi:bvnHP:bvrP67:bd05/05/2011:svnHP:pnProLiantDL380G7:pvr:cvnHP:ct23:cvr:
  dmi.product.family: ProLiant
  dmi.product.name: ProLiant DL380 G7
  dmi.sys.vendor: HP

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1898786

Title:
  Issue with bcache bch_mca_scan causing huge IO wait

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1898786/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1836475] Re: update-notifier-common weekly cron job runs at the same time for all computers across the globe

2020-09-20 Thread Haw Loeung
This just happened with conntrack metrics below:

| * 20200920-0647
|  629385 dst=91.189.95.15
|
| * 20200920-0648
| 1444902 dst=91.189.95.15
|
| * 20200920-0649
| 1044261 dst=91.189.95.15

With request logs showing a surge in this:

| xxx.xxx.xxx.xxx - - [20/Sep/2020:06:46:34 +] "GET /meta-release-lts 
HTTP/1.1" 304 129 "-"
"Python-urllib/3.5"

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1836475

Title:
  update-notifier-common weekly cron job runs at the same time for all
  computers across the globe

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-release-upgrader/+bug/1836475/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1836475] Re: update-notifier-common weekly cron job runs at the same time for all computers across the globe

2020-09-19 Thread Haw Loeung
We're still seeing regular request spikes to changelogs.ubuntu.com. Can
we move release-upgrade-motd, the bit that downloads and checks for a
new Ubuntu release to systemd timer units instead?

/usr/lib/ubuntu-release-upgrader/release-upgrade-motd which calls
/usr/lib/ubuntu-release-upgrader/check-new-release which uses
MetaReleaseCore from UpdateManager.Core.MetaRelease

** Also affects: ubuntu-release-upgrader (Ubuntu)
   Importance: Undecided
   Status: New

** Changed in: ubuntu-release-upgrader (Ubuntu)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1836475

Title:
  update-notifier-common weekly cron job runs at the same time for all
  computers across the globe

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-release-upgrader/+bug/1836475/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1896341] [NEW] Spread out release-upgrade-motd over a period of time (changelogs.ubuntu.com)

2020-09-19 Thread Haw Loeung
*** This bug is a duplicate of bug 1836475 ***
https://bugs.launchpad.net/bugs/1836475

Public bug reported:

Hi,

We see frequent request spikes to changelogs.ubuntu.com. It turns out
it's related to the release-upgrade-motd being called from cron.weekly.
Can we spread this out over a period of time? Perhaps changing it over
to using systemd timers much like we do with apt update these days?

** Affects: ubuntu-release-upgrader (Ubuntu)
 Importance: Undecided
 Status: New

** This bug has been marked a duplicate of bug 1836475
   update-notifier-common weekly cron job runs at the same time for all 
computers across the globe

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1896341

Title:
  Spread out release-upgrade-motd over a period of time
  (changelogs.ubuntu.com)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-release-upgrader/+bug/1896341/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1893716] Re: scripts in /etc/update-motd.d/ run even on login via non-interactive scp and sftp sessions

2020-09-01 Thread Haw Loeung
** Also affects: landscape-client (Ubuntu)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1893716

Title:
  scripts in /etc/update-motd.d/ run even on login via non-interactive
  scp and sftp sessions

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1893716/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1893716] Re: scripts in /etc/update-motd.d/ run even on login via non-interactive scp and sftp sessions

2020-09-01 Thread Haw Loeung
** Also affects: base-files (Ubuntu)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1893716

Title:
  scripts in /etc/update-motd.d/ run even on login via non-interactive
  scp and sftp sessions

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1893716/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1565744] Re: "Mutex file:${APACHE_LOCK_DIR} default" should be disabled by default on Linux because it leads to errors

2020-07-29 Thread Haw Loeung
Looks good to me, thanks:

| https://paste.ubuntu.com/p/D3BfjqzR4t/

** Tags removed: verification-needed verification-needed-xenial
** Tags added: verification-done verification-done-xenial

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1565744

Title:
  "Mutex file:${APACHE_LOCK_DIR} default" should be disabled by default
  on Linux because it leads to errors

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1565744/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1888058] Re: Got “Authentication failed” while running do-release-upgrade from 19.10 to 20.04 LTS with proxy configured

2020-07-23 Thread Haw Loeung
Good to hear it isn't something on our end. Thanks for the update.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1888058

Title:
  Got “Authentication failed” while running do-release-upgrade from
  19.10 to 20.04 LTS with proxy configured

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-release-upgrader/+bug/1888058/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 245219] Re: Ubuntu archive server returning incorrect content-encoding - content-header incorrect type

2020-07-22 Thread Haw Loeung
** Changed in: apache2 (Debian)
   Importance: Unknown => Undecided

** Changed in: apache2 (Debian)
 Remote watch: Debian Bug tracker #565626 => None

** Changed in: apache2 (Debian)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/245219

Title:
  Ubuntu archive server returning incorrect content-encoding - content-
  header incorrect type

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-archive-publishing/+bug/245219/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1541678] Re: if-post-down.d/vlan and if-pre-up.d/vlan should support predictable NIC names

2020-07-22 Thread Haw Loeung
** Changed in: vlan (Debian)
   Importance: Unknown => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1541678

Title:
  if-post-down.d/vlan and if-pre-up.d/vlan should support predictable
  NIC names

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/vlan/+bug/1541678/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1487190] Re: Not all interfaces display when >~30 interfaces

2020-07-22 Thread Haw Loeung
** Changed in: nicstat (Debian)
   Importance: Unknown => Low

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1487190

Title:
  Not all interfaces display when >~30 interfaces

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/nicstat/+bug/1487190/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 583994] Re: Consider replacing ntpdate calls by 'ntpd -g'

2020-07-22 Thread Haw Loeung
** Changed in: ntp (Debian)
   Importance: Unknown => Low

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/583994

Title:
  Consider replacing ntpdate calls by 'ntpd -g'

To manage notifications about this bug go to:
https://bugs.launchpad.net/ntp/+bug/583994/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 245219] Re: Ubuntu archive server returning incorrect content-encoding - content-header incorrect type

2020-07-22 Thread Haw Loeung
** Changed in: apache2 (Debian)
   Importance: Unknown => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/245219

Title:
  Ubuntu archive server returning incorrect content-encoding - content-
  header incorrect type

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-archive-publishing/+bug/245219/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 752583] Re: Name resolution does not work with IPv6 only name servers

2020-07-22 Thread Haw Loeung
** Changed in: mtr (Debian)
   Importance: Unknown => Medium

** Changed in: mtr (Ubuntu)
   Status: In Progress => Confirmed

** Changed in: mtr (Ubuntu)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/752583

Title:
  Name resolution does not work with IPv6 only name servers

To manage notifications about this bug go to:
https://bugs.launchpad.net/mtr/+bug/752583/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1832182] Re: systemd unable to detect running apache if invoked via "apache2ctl graceful"

2020-07-22 Thread Haw Loeung
** Changed in: apache2 (Debian)
   Importance: Unknown => High

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1832182

Title:
  systemd unable to detect running apache if invoked via "apache2ctl
  graceful"

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1832182/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1222602] Re: [regression] [gen3] Mesa 9.2 makes Unity unusable on Atom class hardware and 943/945 graphics controllers

2020-07-22 Thread Haw Loeung
** Changed in: mesa
   Importance: Unknown => Undecided

** Changed in: mesa
 Remote watch: gitlab.freedesktop.org/mesa/mesa/issues #727 => None

** Changed in: mesa
   Status: New => Won't Fix

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1222602

Title:
  [regression] [gen3] Mesa 9.2 makes Unity unusable on Atom class
  hardware and 943/945 graphics controllers

To manage notifications about this bug go to:
https://bugs.launchpad.net/mesa/+bug/1222602/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 576434] Re: UserWarning: Unbuilt egg for setuptools [unknown version] (/usr/lib/python2.6/dist-packages)

2020-07-22 Thread Haw Loeung
** Changed in: distribute (Ubuntu)
   Status: Confirmed => Won't Fix

** Changed in: tahoe-lafs
   Importance: Unknown => Undecided

** Changed in: tahoe-lafs
 Remote watch: Tahoe-LAFS Trac #1235 => None

** Changed in: tahoe-lafs
   Status: New => Won't Fix

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/576434

Title:
  UserWarning: Unbuilt egg for setuptools [unknown version]
  (/usr/lib/python2.6/dist-packages)

To manage notifications about this bug go to:
https://bugs.launchpad.net/tahoe-lafs/+bug/576434/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1300215] Re: Failed to open VDPAU backend libvdpau_i965.so: cannot open shared object file: No such file or directory

2020-07-22 Thread Haw Loeung
** Changed in: libvdpau (Debian)
   Importance: Unknown => Undecided

** Changed in: libvdpau (Debian)
 Remote watch: Debian Bug tracker #617940 => None

** Changed in: libvdpau (Debian)
   Importance: Undecided => Medium

** Changed in: libvdpau (Debian)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1300215

Title:
  Failed to open VDPAU backend libvdpau_i965.so: cannot open shared
  object file: No such file or directory

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libvdpau/+bug/1300215/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 245219] Re: Ubuntu archive server returning incorrect content-encoding - content-header incorrect type

2020-07-21 Thread Haw Loeung
I'm not sure why this is a problem now as the old archive servers were
doing the same thing. In any case, I've added the following to apache2
configs:

| AddType application/pgp-signature .gpg

Testing without:

> GET 
> /ubuntu/dists/focal-updates/main/dist-upgrader-all/current/focal.tar.gz.gpg 
> HTTP/1.1
> Host: archive.ubuntu.com
> ...
< Last-Modified: Thu, 16 Jul 2020 08:58:10 GMT
< ETag: "612-5aa8b3d596c80"
< Accept-Ranges: bytes
< Content-Length: 1554
< Content-Type: application/x-gzip

Testing with:

> GET 
> /ubuntu/dists/focal-updates/main/dist-upgrader-all/current/focal.tar.gz.gpg 
> HTTP/1.1
> Host: archive.ubuntu.com
>...
< Last-Modified: Thu, 16 Jul 2020 08:58:10 GMT
< ETag: "612-5aa8b3d596c80"
< Accept-Ranges: bytes
< Content-Length: 1554
< Content-Type: application/pgp-signature

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/245219

Title:
  Ubuntu archive server returning incorrect content-encoding - content-
  header incorrect type

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-archive-publishing/+bug/245219/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1888058] Re: Got “Authentication failed” while running do-release-upgrade from 19.10 to 20.04 LTS with proxy configured

2020-07-21 Thread Haw Loeung
I'm not sure why this is a problem now as the old archive servers were
doing the same thing. In any case, I've added the following to apache2
configs:

| AddType application/pgp-signature .gpg

Testing without:

> GET 
> /ubuntu/dists/focal-updates/main/dist-upgrader-all/current/focal.tar.gz.gpg 
> HTTP/1.1
> Host: archive.ubuntu.com
> ...
< Last-Modified: Thu, 16 Jul 2020 08:58:10 GMT
< ETag: "612-5aa8b3d596c80"
< Accept-Ranges: bytes
< Content-Length: 1554
< Content-Type: application/x-gzip

Testing with:

> GET 
> /ubuntu/dists/focal-updates/main/dist-upgrader-all/current/focal.tar.gz.gpg 
> HTTP/1.1
> Host: archive.ubuntu.com
>...
< Last-Modified: Thu, 16 Jul 2020 08:58:10 GMT
< ETag: "612-5aa8b3d596c80"
< Accept-Ranges: bytes
< Content-Length: 1554
< Content-Type: application/pgp-signature

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1888058

Title:
  Got “Authentication failed” while running do-release-upgrade from
  19.10 to 20.04 LTS with proxy configured

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-release-upgrader/+bug/1888058/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1565744] Re: "Mutex file:${APACHE_LOCK_DIR} default" should be disabled by default on Linux because it leads to errors

2020-07-20 Thread Haw Loeung
Installed packages from Bryce's PPA and confirmed no more '(35)Resource
deadlock avoided: AH02026: Failed to acquire SSL session cache lock'
logged.

See https://pastebin.ubuntu.com/p/bFJ9C5hFCD/

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1565744

Title:
  "Mutex file:${APACHE_LOCK_DIR} default" should be disabled by default
  on Linux because it leads to errors

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1565744/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1565744] Re: "Mutex file:${APACHE_LOCK_DIR} default" should be disabled by default on Linux because it leads to errors

2020-07-19 Thread Haw Loeung
Unfortunately, I'm not sure how best to reproduce this. I can tell you
that we were seeing this on really busy units.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1565744

Title:
  "Mutex file:${APACHE_LOCK_DIR} default" should be disabled by default
  on Linux because it leads to errors

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1565744/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1565744] Re: "Mutex file:${APACHE_LOCK_DIR} default" should be disabled by default on Linux because it leads to errors

2020-06-23 Thread Haw Loeung
Can we get the following backported to Xenial (so 2.4.18-2ubuntu3.14)?

| apache2 (2.4.20-1) unstable; urgency=medium
|
|   * On Linux, use pthread mutexes. On kfreebsd/hurd, continue using fctnl
| because they lack robust pthred mutexes. LP: #1565744, #1527044

Seeing it on a couple of Xenial hosts and the fix being to comment out
the following line from /etc/apache2/apache2.conf:

| Mutex file:${APACHE_LOCK_DIR} default

** Also affects: apache2 (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: apache2 (Ubuntu Xenial)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1565744

Title:
  "Mutex file:${APACHE_LOCK_DIR} default" should be disabled by default
  on Linux because it leads to errors

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1565744/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1875517] Re: check_http inefficient and sometimes times out

2020-05-10 Thread Haw Loeung
Eoan:

| https://pastebin.ubuntu.com/p/gWFFFJdP2d/

** Tags removed: verification-needed verification-needed-eoan
** Tags added: verification-done verification-done-eoan

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1875517

Title:
  check_http inefficient and sometimes times out

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/monitoring-plugins/+bug/1875517/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1875517] Re: check_http inefficient and sometimes times out

2020-05-10 Thread Haw Loeung
Tested with the packages from *-proposed. Looks good.

Bionic:

| https://pastebin.ubuntu.com/p/gkw5JWqtN7/

Focal:

| https://pastebin.ubuntu.com/p/rJgmHhfJ6v/


** Tags removed: verification-needed-bionic verification-needed-focal
** Tags added: verification-done-bionic verification-done-focal

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1875517

Title:
  check_http inefficient and sometimes times out

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/monitoring-plugins/+bug/1875517/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1875517] Re: check_http inefficient and sometimes times out

2020-05-05 Thread Haw Loeung
** Tags added: verification-done-focal

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1875517

Title:
  check_http inefficient and sometimes times out

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/monitoring-plugins/+bug/1875517/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1875517] Re: check_http inefficient and sometimes times out

2020-05-05 Thread Haw Loeung
** Tags added: verification-done-bionic

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1875517

Title:
  check_http inefficient and sometimes times out

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/monitoring-plugins/+bug/1875517/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1875517] Re: check_http inefficient and sometimes times out

2020-05-01 Thread Haw Loeung
I set something up for you to test:

| /usr/lib/nagios/plugins/check_http -p 443 --ssl -H
people.canonical.com -j GET -u '/~hloeung/tmp/lp1875517-test.txt' -r
haproxy -t 60

Without the patch, it's ~25secs. With reduces that to under 1sec.

This works for testing too (~2secs vs. ~0.1secs):

| /usr/lib/nagios/plugins/check_http -H archive.ubuntu.com -j GET -u
/ubuntu/ls-lR.gz  -t 60

That's for a 20MBytes file. Could also pick a larger 150Mbytes file:

| $ /usr/lib/nagios/plugins/check_http -H archive.ubuntu.com -j GET -u 
/ubuntu/pool/main/l/linux-hwe-5.0/linux-hwe-5.0_5.0.0.orig.tar.gz -t 600
| HTTP OK: HTTP/1.1 200 OK - 162594115 bytes in 0.499 second response time 
|time=0.498710s;;;0.00;600.00 size=162594115B;;;0

With the patch vs. the following without:

| $ /usr/lib/nagios/plugins/check_http -H archive.ubuntu.com -j GET -u 
/ubuntu/pool/main/l/linux-hwe-5.0/linux-hwe-5.0_5.0.0.orig.tar.gz -t 600
| HTTP OK: HTTP/1.1 200 OK - 162594115 bytes in 108.216 second response time 
|time=108.215539s;;;0.00 size=162594115B;;;0

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1875517

Title:
  check_http inefficient and sometimes times out

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/monitoring-plugins/+bug/1875517/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Re: [Bug 1875517] Re: check_http inefficient and sometimes times out

2020-04-30 Thread Haw Loeung
On Thu, Apr 30, 2020 at 03:01:28PM -, Rafael David Tinoco wrote:
> I need some clarification here. You have applied a temporary mitigation
> that improves check_http by not constantly freeing and allocating heap
> memory. You have indicated upstream patches (2 of them) dealing with the
> constant timeout for the checker.
>
> monitoring-plugins 2.2 version check_http SEEMs to be close to nagios-
> plugins 1.5 version.

Aren't the nagios-plugin packages deprecated in favor of
monitoring-plugins?

| $ apt-cache search nagios-plugins-basic
| nagios-plugins-basic - transitional dummy package

> The nagios-plugins you pointed out are backportable to release-2.2.0 of
> NAGIOS-PLUGINS package and not monitoring-plugins. Have you tested those
> ? Do you need nagios-plugins backport (of those 2 patches) to test and
> see if it mitigates your issue ?

I initially tried to apply the patches as is from upstream but it
didn't apply cleanly requiring various other things (ssl/utils, utils,
etc.). Ended up being way too large:

| https://launchpadlibrarian.net/477251813/monitoring-
plugins_2.2-3ubuntu2haw4_2.2-3ubuntu2haw5.diff.gz

So took a step back and revisited the changes from upstream. The most
important bit being this:

| https://github.com/nagios-plugins/nagios-
plugins/commit/2b38350d546ef9632ccd90e300eeaf6eda0ca32c#diff-
458353164a55a2e140dfc531b6ac2c38L1131-R1150

So took that, applied it, and built a package with the diff being much
much smaller:

| https://launchpadlibrarian.net/477257299/monitoring-
plugins_2.2-3ubuntu2_2.2-3ubuntu2haw5.diff.gz

The attached patch (9 lines) seems to be all that's required, has been
tested and is what we're currently running with to resolve the socket
timeout issues we have seen.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1875517

Title:
  check_http inefficient and sometimes times out

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/monitoring-plugins/+bug/1875517/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1876035] [NEW] Consider making '-o Acquire::Retries=3' the default for 'apt-get update/install/dist-upgrade'

2020-04-29 Thread Haw Loeung
Public bug reported:

Hi,

We operate archive.ubuntu.com as well as mirrors of it in various
places. We're getting reports of various CI/CD jobs failing. Sometimes
due to routing issues, issues with overloaded servers/VMs hosting
archive, etc.

Any chance we can make '-o Acquire::Retries=3' the default for 'apt-get
update/install/dist-upgrade'? Preferably with a randomised skew between
retries.

Also, any chance of having apt-get retry with different IPs/hosts
returned from the DNS lookup? (e.g. for archive.ubuntu.com -
91.189.88.142, 91.189.88.152, ...).

Thanks.

** Affects: apt (Ubuntu)
 Importance: Undecided
 Status: New

** Summary changed:

- Consider making '-o Acquire::Retries=3' the default
+ Consider making '-o Acquire::Retries=3' the default for 'apt-get update'

** Summary changed:

- Consider making '-o Acquire::Retries=3' the default for 'apt-get update'
+ Consider making '-o Acquire::Retries=3' the default for 'apt-get 
update/install/dist-upgrade'

** Description changed:

  Hi,
  
  We operate archive.ubuntu.com as well as mirrors of it in various
  places. We're getting reports of various CI/CD jobs failing. Sometimes
  due to routing issues, issues with overloaded servers/VMs hosting
  archive, etc.
  
  Any chance we can make '-o Acquire::Retries=3' the default for 'apt-get
- update'? Preferably with a randomised skew between retries.
- 
+ update/install/dist-upgrade'? Preferably with a randomised skew between
+ retries.
  
  Thanks.

** Description changed:

  Hi,
  
  We operate archive.ubuntu.com as well as mirrors of it in various
  places. We're getting reports of various CI/CD jobs failing. Sometimes
  due to routing issues, issues with overloaded servers/VMs hosting
  archive, etc.
  
  Any chance we can make '-o Acquire::Retries=3' the default for 'apt-get
  update/install/dist-upgrade'? Preferably with a randomised skew between
  retries.
  
+ Also, any chance of having apt-get retry with different IPs/hosts
+ returned from the DNS lookup? (e.g. for archive.ubuntu.com -
+ 91.189.88.142, 91.189.88.152, ...).
+ 
  Thanks.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1876035

Title:
  Consider making '-o Acquire::Retries=3' the default for 'apt-get
  update/install/dist-upgrade'

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1876035/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1875517] Re: check_http inefficient and sometimes times out

2020-04-28 Thread Haw Loeung
** Also affects: monitoring-plugins (Ubuntu Focal)
   Importance: Undecided
   Status: New

** Also affects: monitoring-plugins (Ubuntu Groovy)
   Importance: Undecided
   Status: Confirmed

** Also affects: monitoring-plugins (Ubuntu Eoan)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1875517

Title:
  check_http inefficient and sometimes times out

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/monitoring-plugins/+bug/1875517/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1875517] Re: check_http inefficient and sometimes times out

2020-04-28 Thread Haw Loeung
** Also affects: monitoring-plugins (Ubuntu Bionic)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1875517

Title:
  check_http inefficient and sometimes times out

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/monitoring-plugins/+bug/1875517/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1875517] Re: check_http inefficient and sometimes times out

2020-04-28 Thread Haw Loeung
Tested in my PPA:

| https://launchpad.net/~hloeung/+archive/ubuntu/nagios-nrpe/+packages

With output:

| $ time ./check_http -I 127.0.0.1 -p 9103 -u /metrics -r haproxy_rate -t 50
| HTTP OK: HTTP/1.0 200 OK - 13239810 bytes in 1.157 second response time 
|time=1.156696s;;;0.00;50.00 size=13239810B;;;0
|
| real0m1.194s
| user0m0.045s
| sys 0m0.064s

vs.

| $ time /usr/lib/nagios/plugins/check_http -I 127.0.0.1 -p 9103 -u /metrics -r 
haproxy_rate -t 50
| HTTP OK: HTTP/1.0 200 OK - 13239139 bytes in 14.090 second response time 
|time=14.090071s;;;0.00;50.00 size=13239139B;;;0
|
| real0m14.128s
| user0m4.650s
| sys 0m8.808s

** Patch added: "check_http_socket_timeouts.patch"
   
https://bugs.launchpad.net/ubuntu/+source/monitoring-plugins/+bug/1875517/+attachment/5362235/+files/check_http_socket_timeouts.patch

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1875517

Title:
  check_http inefficient and sometimes times out

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/monitoring-plugins/+bug/1875517/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

  1   2   3   4   5   6   7   >