[Bug 2061040] Re: I2C HID device sometimes fails to initialize causing touchpad to not work
** Changed in: linux (Ubuntu) Status: Triaged => In Progress ** Changed in: linux (Ubuntu Noble) Status: Triaged => In Progress -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2061040 Title: I2C HID device sometimes fails to initialize causing touchpad to not work To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2061040/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2063898] Re: broken doc symlinks after t64 transition in noble
Can confirm: [hloeung@dharkan tmp]$ ls /usr/share/doc/openssl -la total 120 drwxr-xr-x3 root root 4096 Apr 4 18:43 . drwxr-xr-x 1469 root root 61440 Apr 26 19:28 .. lrwxrwxrwx1 root root30 Mar 31 17:42 changelog.Debian.gz -> ../libssl3/changelog.Debian.gz lrwxrwxrwx1 root root23 Mar 31 17:42 changelog.gz -> ../libssl3/changelog.gz lrwxrwxrwx1 root root20 Mar 31 17:42 copyright -> ../libssl3/copyright -rw-r--r--1 root root 197 Jan 31 00:28 FAQ.md -rw-r--r--1 root root 862 Jan 31 00:28 fingerprints.txt drwxr-xr-x2 root root 4096 Apr 4 18:43 HOWTO -rw-r--r--1 root root 18800 Jan 31 00:28 NEWS.md.gz -rw-r--r--1 root root 2122 Mar 8 20:44 README.Debian -rw-r--r--1 root root 5966 Jan 31 00:28 README-ENGINES.md.gz -rw-r--r--1 root root 2660 Jan 31 00:28 README.md.gz -rw-r--r--1 root root 1385 Mar 8 20:44 README.optimization [hloeung@dharkan tmp]$ ls /usr/share/doc/openssl/../libssl3/changelog.Debian.gz ls: cannot access '/usr/share/doc/openssl/../libssl3/changelog.Debian.gz': No such file or directory [hloeung@dharkan tmp]$ ls /usr/share/doc/openssl/../libssl3/ [hloeung@dharkan tmp]$ ls /usr/share/doc/openssl/../libssl3t64/ changelog.Debian.gz copyright [hloeung@dharkan tmp]$ -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2063898 Title: broken doc symlinks after t64 transition in noble To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/2063898/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2061040] [NEW] I2C HID device sometimes fails to initialize causing touchpad to not work
Public bug reported: Hi, Touchpad on my new Lenovo X1 Carbon (Gen12) with the Sensel haptic pad doesn't work on boot. I see this: | [Thu Apr 11 13:57:26 2024] i2c_hid_acpi i2c-SNSL0028:00: device did not ack reset within 1000 ms | [Thu Apr 11 13:57:26 2024] hid-generic 0018:2C2F:0028.0001: unknown main item tag 0x0 | [Thu Apr 11 13:57:26 2024] hid-generic 0018:2C2F:0028.0001: unknown main item tag 0x0 | [Thu Apr 11 13:57:26 2024] hid-generic 0018:2C2F:0028.0001: unknown main item tag 0x0 | [Thu Apr 11 13:57:26 2024] hid-generic 0018:2C2F:0028.0001: unknown main item tag 0x0 | [Thu Apr 11 13:57:26 2024] hid-generic 0018:2C2F:0028.0001: unknown main item tag 0x0 | [Thu Apr 11 13:57:26 2024] hid-generic 0018:2C2F:0028.0001: unknown main item tag 0x0 | [Thu Apr 11 13:57:26 2024] hid-generic 0018:2C2F:0028.0001: unknown main item tag 0x0 | [Thu Apr 11 13:57:26 2024] hid-generic 0018:2C2F:0028.0001: unknown main item tag 0x0 | [Thu Apr 11 13:57:26 2024] hid-generic 0018:2C2F:0028.0001: unknown main item tag 0x0 | [Thu Apr 11 13:57:26 2024] hid-generic 0018:2C2F:0028.0001: unknown main item tag 0x0 | [Thu Apr 11 13:57:26 2024] hid-generic 0018:2C2F:0028.0001: unknown main item tag 0x0 | ... | [Thu Apr 11 13:57:26 2024] hid-generic 0018:2C2F:0028.0001: unbalanced collection at end of report description | [Thu Apr 11 13:57:26 2024] hid-generic: probe of 0018:2C2F:0028.0001 failed with error -22 Per the Arch Linux wiki page[1], removing and reloading the `i2c_hid_acpi` seems to fix it: | [Thu Apr 11 13:58:02 2024] i2c_hid_acpi i2c-SNSL0028:00: device did not ack reset within 1000 ms | [Thu Apr 11 13:58:02 2024] input: SNSL0028:00 2C2F:0028 Mouse as /devices/pci:00/:00:15.0/i2c_designware.0/i2c-15/i2c-SNSL0028:00/0018:2C2F:0028.0002/input/input15 | [Thu Apr 11 13:58:02 2024] input: SNSL0028:00 2C2F:0028 Touchpad as /devices/pci:00/:00:15.0/i2c_designware.0/i2c-15/i2c-SNSL0028:00/0018:2C2F:0028.0002/input/input16 | [Thu Apr 11 13:58:02 2024] hid-multitouch 0018:2C2F:0028.0002: input,hidraw0: I2C HID v1.00 Mouse [SNSL0028:00 2C2F:0028] on i2c-SNSL0028:00 | [Thu Apr 11 13:58:03 2024] psmouse serio1: trackpoint: Synaptics TrackPoint firmware: 0x08, buttons: 3/3 | [Thu Apr 11 13:58:03 2024] input: TPPS/2 Synaptics TrackPoint as /devices/platform/i8042/serio1/input/input18 From that Arch Linux wiki page, it seems to be a bug upstream[2] with the commit fixing this: | https://github.com/torvalds/linux/commit/af93a167eda90192563bce64c4bb989836afac1f Or | https://lore.kernel.org/linux- input/20240331182440.14477-1...@kl.wtf/T/#u Can we get fix this backported? | [hloeung@dharkan tmp]$ apt-cache policy linux-image-generic-hwe-24.04 | linux-image-generic-hwe-24.04: | Installed: 6.8.0-22.22 | Candidate: 6.8.0-22.22 | Version table: | *** 6.8.0-22.22 500 | 500 http://haw-test.archive.ubuntu.com/ubuntu noble/main amd64 Packages | 100 /var/lib/dpkg/status | [hloeung@dharkan tmp]$ uname -a | Linux dharkan.local 6.8.0-22-generic #22-Ubuntu SMP PREEMPT_DYNAMIC Thu Apr 4 22:30:32 UTC 2024 x86_64 x86_64 x86_64 GNU/Linux | [hloeung@dharkan tmp]$ Thanks, Haw [1]: https://wiki.archlinux.org/title/Lenovo_ThinkPad_Z16_Gen_2 [2]: https://bugzilla.redhat.com/show_bug.cgi?id=2271136 ** Affects: linux (Ubuntu) Importance: Undecided Status: New ** Affects: linux (Ubuntu Noble) Importance: Undecided Status: New ** Tags: noble ** Also affects: linux (Ubuntu Noble) Importance: Undecided Status: New ** Tags added: noble ** Description changed: Hi, Touchpad on my new Lenovo X1 Carbon (Gen12) with the Sensel haptic pad doesn't work on boot. I see this: | [Thu Apr 11 13:57:26 2024] i2c_hid_acpi i2c-SNSL0028:00: device did not ack reset within 1000 ms | [Thu Apr 11 13:57:26 2024] hid-generic 0018:2C2F:0028.0001: unknown main item tag 0x0 | [Thu Apr 11 13:57:26 2024] hid-generic 0018:2C2F:0028.0001: unknown main item tag 0x0 | [Thu Apr 11 13:57:26 2024] hid-generic 0018:2C2F:0028.0001: unknown main item tag 0x0 | [Thu Apr 11 13:57:26 2024] hid-generic 0018:2C2F:0028.0001: unknown main item tag 0x0 | [Thu Apr 11 13:57:26 2024] hid-generic 0018:2C2F:0028.0001: unknown main item tag 0x0 | [Thu Apr 11 13:57:26 2024] hid-generic 0018:2C2F:0028.0001: unknown main item tag 0x0 | [Thu Apr 11 13:57:26 2024] hid-generic 0018:2C2F:0028.0001: unknown main item tag 0x0 | [Thu Apr 11 13:57:26 2024] hid-generic 0018:2C2F:0028.0001: unknown main item tag 0x0 | [Thu Apr 11 13:57:26 2024] hid-generic 0018:2C2F:0028.0001: unknown main item tag 0x0 | [Thu Apr 11 13:57:26 2024] hid-generic 0018:2C2F:0028.0001: unknown main item tag 0x0 | [Thu Apr 11 13:57:26 2024] hid-generic 0018:2C2F:0028.0001: unknown main item tag 0x0 | ... | [Thu Apr 11 13:57:26 2024] hid-generic 0018:2C2F:0028.0001: unbalanced collection at end of report description | [Thu Apr 11 13:57:26 2024] hid-generic: probe of
[Bug 2060266] Re: gnome-session.service [unity-session] uses deprecated --builtin parameter
Confirmed the latest gnome-session fixes this. | [hloeung@dharkan tmp]$ apt-cache policy unity-session gnome-session-bin | unity-session: | Installed: 46.0-1ubuntu3 | Candidate: 46.0-1ubuntu3 | Version table: | *** 46.0-1ubuntu3 500 | 500 http://haw-test.archive.ubuntu.com/ubuntu noble/universe amd64 Packages | 100 /var/lib/dpkg/status | gnome-session-bin: | Installed: 46.0-1ubuntu3 | Candidate: 46.0-1ubuntu3 | Version table: | *** 46.0-1ubuntu3 500 | 500 http://haw-test.archive.ubuntu.com/ubuntu noble/main amd64 Packages | 100 /var/lib/dpkg/status -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2060266 Title: gnome-session.service [unity-session] uses deprecated --builtin parameter To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gnome-session/+bug/2060266/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2060426] Re: DeprecationWarning: datetime.datetime.utcfromtimestamp() is deprecated and scheduled for removal in a future version.
** Tags added: noble -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2060426 Title: DeprecationWarning: datetime.datetime.utcfromtimestamp() is deprecated and scheduled for removal in a future version. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/python3-dateutil/+bug/2060426/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2060266] Re: gnome-session no longer supports --builtin
@vanvugt, it's `unity-session` shipping out `/usr/lib/systemd/user/gnome-session.service` which is part of `gnome- session`: | $ dpkg-query -S /usr/lib/systemd/user/gnome-session.service | unity-session: /usr/lib/systemd/user/gnome-session.service $ chdist apt-get noble source unity-session Reading package lists... Done Picking 'gnome-session' as source package instead of 'unity-session' NOTICE: 'gnome-session' packaging is maintained in the 'Git' version control system at: https://salsa.debian.org/gnome-team/gnome-session.git -b ubuntu/master Please use: git clone https://salsa.debian.org/gnome-team/gnome-session.git -b ubuntu/master to retrieve the latest (possibly unreleased) updates to the package. Need to get 572 kB of source archives. Get:1 http://azure.archive.ubuntu.com/ubuntu noble/main gnome-session 46.0-1ubuntu2 (dsc) [3,067 B] Get:2 http://azure.archive.ubuntu.com/ubuntu noble/main gnome-session 46.0-1ubuntu2 (tar) [484 kB] Get:3 http://azure.archive.ubuntu.com/ubuntu noble/main gnome-session 46.0-1ubuntu2 (diff) [85.0 kB] Fetched 572 kB in 3s (225 kB/s) dpkg-source: info: extracting gnome-session in gnome-session-46.0 dpkg-source: info: unpacking gnome-session_46.0.orig.tar.xz dpkg-source: info: unpacking gnome-session_46.0-1ubuntu2.debian.tar.xz dpkg-source: info: using patch list from debian/patches/series dpkg-source: info: applying debian/Revert-main-Remove-GNOME_DESKTOP_SESSION_ID-envvar.patch dpkg-source: info: applying ubuntu/support_autostart_delay.patch dpkg-source: info: applying ubuntu/ubuntu-sessions.patch dpkg-source: info: applying ubuntu/remove_session_saving_from_gui.patch dpkg-source: info: applying ubuntu/add_sessionmigration.patch dpkg-source: info: applying ubuntu/dbus_request_shutdown.patch dpkg-source: info: applying ubuntu/ignore_gsettings_region.patch dpkg-source: info: applying revert_remove_gnome_session_properties.patch [hloeung@dharkan gnome-session-46.0]$ grep builtin . -r --exclude-dir po ./debian/changelog:- Pass --builtin to gnome-session to fix broken login for Unity ./debian/changelog:+ debian/55gnome-session_gnomerc: Use shell builtins instead of external ./debian/data/gnome-session.service:exec gnome-session --builtin --session=$DESKTOP_SESSION --disable-acceleration-check || \ ./debian/data/gnome-session.service:exec gnome-session --builtin --session=$DESKTOP_SESSION' ** Changed in: ubuntu Status: Incomplete => New ** Package changed: ubuntu => gnome-session (Ubuntu) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2060266 Title: gnome-session no longer supports --builtin To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gnome-session/+bug/2060266/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2060426] [NEW] DeprecationWarning: datetime.datetime.utcfromtimestamp() is deprecated and scheduled for removal in a future version.
Public bug reported: Hi, Seeing this: | /usr/lib/python3/dist-packages/dateutil/tz/tz.py:37: DeprecationWarning: datetime.datetime.utcfromtimestamp() is deprecated and scheduled for removal in a future version. Use timezone-aware objects to represent datetimes in UTC: datetime.datetime.fromtimestamp(timestamp, datetime.UTC). | EPOCH = datetime.datetime.utcfromtimestamp(0) Upstream has a patch: https://github.com/dateutil/dateutil/issues/1284 | - EPOCH = datetime.datetime.utcfromtimestamp(0) | + EPOCH = datetime.datetime(1970, 1, 1, 0, 0) Can we please backport this? | $ apt-cache policy python3-dateutil | python3-dateutil: | Installed: 2.8.2-3 | Candidate: 2.8.2-3 | Version table: | *** 2.8.2-3 500 | 500 http://haw-test.archive.ubuntu.com/ubuntu noble/main amd64 Packages | 100 /var/lib/dpkg/status ** Affects: python3-dateutil (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2060426 Title: DeprecationWarning: datetime.datetime.utcfromtimestamp() is deprecated and scheduled for removal in a future version. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/python3-dateutil/+bug/2060426/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2060266] [NEW] gnome-session no longer supports --builtin
Public bug reported: Hi, `gnome-session.service` has the following: | [Service] | ExecStart=/bin/sh -exc '[ "$DESKTOP_SESSION" != "gnome-classic" ] || export | GNOME_SHELL_SESSION_MODE=classic; \ | export GNOME_SESSION_XDG_SESSION_PATH=${XDG_SESSION_PATH}; \ | [ "$DESKTOP_SESSION" = gnome-flashback-metacity ] && \ | exec gnome-session --builtin --session=$DESKTOP_SESSION --disable-acceleration-check || \ | exec gnome-session --builtin --session=$DESKTOP_SESSION' Unfortunately, the latest `gnome-session` no longer supports `--builtin`. This causes login failures, in particular for me, using Unity, I get logged back out from the unity greeter. | $ apt-cache policy gnome-session-bin | gnome-session-bin: | Installed: 46.0-1ubuntu2 | Candidate: 46.0-1ubuntu2 | Version table: | *** 46.0-1ubuntu2 500 | 500 http://haw-test.archive.ubuntu.com/ubuntu noble/main amd64 Packages | 100 /var/lib/dpkg/status | 45.0-1ubuntu1 500 | 500 http://haw-test.archive.ubuntu.com/ubuntu noble-updates/main amd64 Packages | $ gnome-session --builtin | | ** (gnome-session-binary:5602): WARNING **: 15:35:22.156: Unknown option --builtin Removing `--builtin` from `/usr/lib/systemd/user/gnome-session.service` let's me log in. With that though, I was not able to input text in chromium (installed via the snap). Downgrading `gnome-session-bin`, `gnome-session-common`, and `unity- session` back to 45.0-1ubuntu1 restores things for me: | [hloeung@dharkan tmp]$ apt-cache policy gnome-session-bin | gnome-session-bin: | Installed: 45.0-1ubuntu1 | Candidate: 46.0-1ubuntu2 | Version table: | 46.0-1ubuntu2 500 | 500 http://haw-test.archive.ubuntu.com/ubuntu noble/main amd64 Packages | *** 45.0-1ubuntu1 500 | 500 http://haw-test.archive.ubuntu.com/ubuntu noble-updates/main amd64 Packages | 100 /var/lib/dpkg/status | [hloeung@dharkan tmp]$ apt-cache policy gnome-session-common | gnome-session-common: | Installed: 45.0-1ubuntu1 | Candidate: 46.0-1ubuntu2 | Version table: | 46.0-1ubuntu2 500 | 500 http://haw-test.archive.ubuntu.com/ubuntu noble/main amd64 Packages | *** 45.0-1ubuntu1 500 | 500 http://haw-test.archive.ubuntu.com/ubuntu noble-updates/main amd64 Packages | 100 /var/lib/dpkg/status | [hloeung@dharkan tmp]$ apt-cache policy unity-session | unity-session: | Installed: 45.0-1ubuntu1 | Candidate: 46.0-1ubuntu2 | Version table: | 46.0-1ubuntu2 500 | 500 http://haw-test.archive.ubuntu.com/ubuntu noble/universe amd64 Packages | *** 45.0-1ubuntu1 500 | 500 http://haw-test.archive.ubuntu.com/ubuntu noble-updates/universe amd64 Packages | 100 /var/lib/dpkg/status ** Affects: gnome-session (Ubuntu) Importance: Undecided Status: New ** Description changed: Hi, `gnome-session.service` has the following: | [Service] | ExecStart=/bin/sh -exc '[ "$DESKTOP_SESSION" != "gnome-classic" ] || export | GNOME_SHELL_SESSION_MODE=classic; \ | export GNOME_SESSION_XDG_SESSION_PATH=${XDG_SESSION_PATH}; \ | [ "$DESKTOP_SESSION" = gnome-flashback-metacity ] && \ | exec gnome-session --builtin --session=$DESKTOP_SESSION --disable-acceleration-check || \ | exec gnome-session --builtin --session=$DESKTOP_SESSION' Unfortunately, the latest `gnome-session` no longer supports `--builtin`. This causes login failures, in particular for me, using Unity, I get logged back out from the unity greeter. | $ apt-cache policy gnome-session-bin | gnome-session-bin: | Installed: 46.0-1ubuntu2 | Candidate: 46.0-1ubuntu2 | Version table: | *** 46.0-1ubuntu2 500 | 500 http://haw-test.archive.ubuntu.com/ubuntu noble/main amd64 Packages | 100 /var/lib/dpkg/status | 45.0-1ubuntu1 500 | 500 http://haw-test.archive.ubuntu.com/ubuntu noble-updates/main amd64 Packages | $ gnome-session --builtin | | ** (gnome-session-binary:5602): WARNING **: 15:35:22.156: Unknown option --builtin + + Removing `--builtin` from `/usr/lib/systemd/user/gnome-session.service` + let's me log in. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2060266 Title: gnome-session no longer supports --builtin To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gnome-session/+bug/2060266/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2060266] Re: gnome-session no longer supports --builtin
** Tags added: noble ** Also affects: gnome-session (Ubuntu Noble) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2060266 Title: gnome-session no longer supports --builtin To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gnome-session/+bug/2060266/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2060266] Re: gnome-session no longer supports --builtin
** Description changed: Hi, `gnome-session.service` has the following: | [Service] | ExecStart=/bin/sh -exc '[ "$DESKTOP_SESSION" != "gnome-classic" ] || export | GNOME_SHELL_SESSION_MODE=classic; \ | export GNOME_SESSION_XDG_SESSION_PATH=${XDG_SESSION_PATH}; \ | [ "$DESKTOP_SESSION" = gnome-flashback-metacity ] && \ | exec gnome-session --builtin --session=$DESKTOP_SESSION --disable-acceleration-check || \ | exec gnome-session --builtin --session=$DESKTOP_SESSION' Unfortunately, the latest `gnome-session` no longer supports `--builtin`. This causes login failures, in particular for me, using Unity, I get logged back out from the unity greeter. | $ apt-cache policy gnome-session-bin | gnome-session-bin: | Installed: 46.0-1ubuntu2 | Candidate: 46.0-1ubuntu2 | Version table: | *** 46.0-1ubuntu2 500 | 500 http://haw-test.archive.ubuntu.com/ubuntu noble/main amd64 Packages | 100 /var/lib/dpkg/status | 45.0-1ubuntu1 500 | 500 http://haw-test.archive.ubuntu.com/ubuntu noble-updates/main amd64 Packages | $ gnome-session --builtin | | ** (gnome-session-binary:5602): WARNING **: 15:35:22.156: Unknown option --builtin Removing `--builtin` from `/usr/lib/systemd/user/gnome-session.service` let's me log in. + + With that though, I was not able to input text in chromium (installed + via the snap). + + Downgrading `gnome-session-bin`, `gnome-session-common`, and `unity- + session` back to 45.0-1ubuntu1 restores things for me: + + | [hloeung@dharkan tmp]$ apt-cache policy gnome-session-bin + | gnome-session-bin: + | Installed: 45.0-1ubuntu1 + | Candidate: 46.0-1ubuntu2 + | Version table: + | 46.0-1ubuntu2 500 + | 500 http://haw-test.archive.ubuntu.com/ubuntu noble/main amd64 Packages + | *** 45.0-1ubuntu1 500 + | 500 http://haw-test.archive.ubuntu.com/ubuntu noble-updates/main amd64 Packages + | 100 /var/lib/dpkg/status + | [hloeung@dharkan tmp]$ apt-cache policy gnome-session-common + | gnome-session-common: + | Installed: 45.0-1ubuntu1 + | Candidate: 46.0-1ubuntu2 + | Version table: + | 46.0-1ubuntu2 500 + | 500 http://haw-test.archive.ubuntu.com/ubuntu noble/main amd64 Packages + | *** 45.0-1ubuntu1 500 + | 500 http://haw-test.archive.ubuntu.com/ubuntu noble-updates/main amd64 Packages + | 100 /var/lib/dpkg/status + | [hloeung@dharkan tmp]$ apt-cache policy unity-session + | unity-session: + | Installed: 45.0-1ubuntu1 + | Candidate: 46.0-1ubuntu2 + | Version table: + | 46.0-1ubuntu2 500 + | 500 http://haw-test.archive.ubuntu.com/ubuntu noble/universe amd64 Packages + | *** 45.0-1ubuntu1 500 + | 500 http://haw-test.archive.ubuntu.com/ubuntu noble-updates/universe amd64 Packages + | 100 /var/lib/dpkg/status -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2060266 Title: gnome-session no longer supports --builtin To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gnome-session/+bug/2060266/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2058881] Re: [snap] Allow chromium snap to access Pressure Stall Information (PSI)
I've not observed any problems or hindrance as a result of these denials, no. Just more noise and thought maybe Chromium was going to use the pressure stall information for something useful like for the selection of which tabs/process to kill off when the system is experiencing pressure in either CPU, I/O, and/or memory. But all good if it does not and it does not plan to. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2058881 Title: [snap] Allow chromium snap to access Pressure Stall Information (PSI) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/2058881/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2058881] Re: [snap] Allow chromium snap to access Pressure Stall Information (PSI)
It's used here: | https://github.com/chromium/chromium/blob/123.0.6312.58/chrome/browser/metrics/pressure/pressure_metrics_reporter.cc#L19 From this commit: | https://github.com/chromium/chromium/commit/dace5562b1d56bf2d2e5b2de6f4518c44844be9f References this bug: | https://issues.chromium.org/issues/40256157 ** Bug watch added: issues.chromium.org/issues #40256157 https://issues.chromium.org/issues/40256157 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2058881 Title: [snap] Allow chromium snap to access Pressure Stall Information (PSI) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/2058881/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2058881] Re: [snap] Allow chromium snap to access Pressure Stall Information (PSI)
Sorry, I should have mentioned the version. I'm using the chromium from the candidate channel: | $ snap info chromium | grep installed | installed: 123.0.6312.58 (2795) 168MB - Seems to be happening every 10 mins. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2058881 Title: [snap] Allow chromium snap to access Pressure Stall Information (PSI) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/2058881/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2058881] [NEW] [snap] Allow chromium snap to access Pressure Stall Information (PSI)
Public bug reported: Hi, Currently seeing this: | Mar 25 16:12:23 dharkan.local kernel: audit: type=1400 audit(1711343543.539:657): apparmor="DENIED" operation="open" class="file" profile="snap.chromium.chromium" name="/proc/pressure/cpu" pid=63335 comm="ThreadPoolForeg" requested_mask="r" denied_mask="r" fsuid=3134 ouid=0 | Mar 25 16:12:23 dharkan.local kernel: audit: type=1400 audit(1711343543.539:658): apparmor="DENIED" operation="open" class="file" profile="snap.chromium.chromium" name="/proc/pressure/io" pid=63335 comm="ThreadPoolForeg" requested_mask="r" denied_mask="r" fsuid=3134 ouid=0 | Mar 25 16:12:23 dharkan.local kernel: audit: type=1400 audit(1711343543.539:659): apparmor="DENIED" operation="open" class="file" profile="snap.chromium.chromium" name="/proc/pressure/memory" pid=63335 comm="ThreadPoolForeg" requested_mask="r" denied_mask="r" fsuid=3134 ouid> It seems the AppAmor profile should be updated to allow Chromium access to the pressure stall information for it to monitor and manage it's processes? ** Affects: chromium-browser (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2058881 Title: [snap] Allow chromium snap to access Pressure Stall Information (PSI) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/2058881/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2055239] Re: Warning: The unit file, source configuration file or drop-ins of {apt-news, esm-cache}.service changed on disk. Run 'systemctl daemon-reload' to reload units.
Seeing this myself: | $ sudo apt-get update | Warning: The unit file, source configuration file or drop-ins of apt-news.service changed on disk. Run 'systemctl daemon-reload' to reload units. | Warning: The unit file, source configuration file or drop-ins of esm-cache.service changed on disk. Run 'systemctl daemon-reload' to reload units. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2055239 Title: Warning: The unit file, source configuration file or drop-ins of {apt- news,esm-cache}.service changed on disk. Run 'systemctl daemon-reload' to reload units. To manage notifications about this bug go to: https://bugs.launchpad.net/snapd/+bug/2055239/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2034656] Re: ESM archive getting DoSed with legitimate traffic every day at 06:25 (cron.daily time)
For debugging, I provisioned VMs in Azure for each of the releases and they all have this disabled: | $ juju run --application ubuntu-jammy-test,ubuntu-focal-test,ubuntu-bionic-test,ubuntu-xenial-test,ubuntu-trusty-test "grep APT::Periodic::Download-Upgradeable-Packages /etc/apt/apt.conf.d/10periodic" | - Stdout: | | APT::Periodic::Download-Upgradeable-Packages "0"; | UnitId: ubuntu-bionic-test/0 | - Stdout: | | APT::Periodic::Download-Upgradeable-Packages "0"; | UnitId: ubuntu-focal-test/0 | - Stdout: | | APT::Periodic::Download-Upgradeable-Packages "0"; | UnitId: ubuntu-jammy-test/0 | - Stdout: | | APT::Periodic::Download-Upgradeable-Packages "0"; | UnitId: ubuntu-trusty-test/0 | - Stdout: | | APT::Periodic::Download-Upgradeable-Packages "0"; | UnitId: ubuntu-xenial-test/0 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2034656 Title: ESM archive getting DoSed with legitimate traffic every day at 06:25 (cron.daily time) To manage notifications about this bug go to: https://bugs.launchpad.net/cloud-images/+bug/2034656/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2034656] Re: ESM archive getting DoSed with legitimate traffic every day at 06:25 (cron.daily time)
Maybe it is this as Grant (orndorffgrant) mentioned earlier? | APT::Periodic::Download-Upgradeable-Packages "0"; During the time of a surge, we saw this: | Hits h% Vis. v% Bandwidth Mtd ProtoData | - -- - -- --- | 3772 0.82% 2461 0.85% 56.62 GiB GET HTTP/1.1 /infra/ubuntu/pool/main/l/linux-azure-5.4/linux-modules-extra-5.4.0-1116-azure_5.4.0-1116.123~18.04.1_amd64.deb | 3246 0.71% 2147 0.74% 41.55 GiB GET HTTP/1.1 /infra/ubuntu/pool/main/l/linux-azure-5.4/linux-modules-5.4.0-1116-azure_5.4.0-1116.123~18.04.1_amd64.deb | 3850 0.84% 2585 0.89% 41.15 GiB GET HTTP/1.1 /infra/ubuntu/pool/main/l/linux-azure-5.4/linux-azure-5.4-headers-5.4.0-1116_5.4.0-1116.123~18.04.1_all.deb | 3580 0.78% 2364 0.81% 32.93 GiB GET HTTP/1.1 /infra/ubuntu/pool/main/l/linux-signed-azure-5.4/linux-image-5.4.0-1116-azure_5.4.0-1116.123~18.04.1_amd64.deb | 3607 0.78% 2478 0.85% 18.01 GiB GET HTTP/1.1 /infra/ubuntu/pool/main/l/linux-azure-5.4/linux-azure-5.4-tools-5.4.0-1116_5.4.0-1116.123~18.04.1_amd64.deb | 3523 0.77% 2413 0.83%5.33 GiB GET HTTP/1.1 /infra/ubuntu/pool/main/l/linux-azure-5.4/linux-headers-5.4.0-1116-azure_5.4.0-1116.123~18.04.1_amd64.deb | 3635 0.79% 2510 0.86%2.00 GiB GET HTTP/1.1 /infra/ubuntu/pool/main/l/linux-azure-5.4/linux-azure-5.4-cloud-tools-5.4.0-1116_5.4.0-1116.123~18.04.1_amd64.deb | 3604 0.78% 2508 0.86%1.93 GiB GET HTTP/1.1 /infra/ubuntu/pool/main/l/linux-azure-5.4/linux-cloud-tools-5.4.0-1116-azure_5.4.0-1116.123~18.04.1_amd64.deb | 3431 0.75% 2421 0.83%1.83 GiB GET HTTP/1.1 /infra/ubuntu/pool/main/l/linux-azure-5.4/linux-tools-5.4.0-1116-azure_5.4.0-1116.123~18.04.1_amd64.deb This kernel would be for Bionic VMs in Azure - as Junien (axino) has pointed out earlier. `APT::Periodic::Download-Upgradeable-Packages` is defined in `/etc/apt/apt.conf.d/10periodic` and shipped out via `update-notifier- common`. ** Also affects: update-notifier (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2034656 Title: ESM archive getting DoSed with legitimate traffic every day at 06:25 (cron.daily time) To manage notifications about this bug go to: https://bugs.launchpad.net/cloud-images/+bug/2034656/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2056093] [NEW] ImportError: cannot import name 'missing_whitespace_around_operator' from 'pycodestyle' (/usr/lib/python3/dist-packages/pycodestyle.py). Did you mean: 'whitespace_around_operator'?
Public bug reported: Hi, Running `flake8` `5.0.4-4` included with Noble, I'm getting the following errors: | ]$ flake8 pe.py | Traceback (most recent call last): | File "/usr/lib/python3/dist-packages/flake8/plugins/finder.py", line 296, in _load_plugin | obj = plugin.entry_point.load() | ^ | File "/usr/lib/python3.12/importlib/metadata/__init__.py", line 205, in load | module = import_module(match.group('module')) | | File "/usr/lib/python3.12/importlib/__init__.py", line 90, in import_module | return _bootstrap._gcd_import(name[level:], package, level) | | File "", line 1387, in _gcd_import | File "", line 1360, in _find_and_load | File "", line 1331, in _find_and_load_unlocked | File "", line 935, in _load_unlocked | File "", line 995, in exec_module | File "", line 488, in _call_with_frames_removed | File "/usr/lib/python3/dist-packages/flake8/plugins/pycodestyle.py", line 25, in | from pycodestyle import missing_whitespace_around_operator as _missing_whitespace_around_operator # noqa: E501 | ^ | ImportError: cannot import name 'missing_whitespace_around_operator' from 'pycodestyle' (/usr/lib/python3/dist-packages/pycodestyle.py). Did you mean: 'whitespace_around_operator'? | | During handling of the above exception, another exception occurred: | | Traceback (most recent call last): | File "/usr/bin/flake8", line 33, in | sys.exit(load_entry_point('flake8==5.0.4', 'console_scripts', 'flake8')()) | | File "/usr/lib/python3/dist-packages/flake8/main/cli.py", line 22, in main | app.run(argv) | File "/usr/lib/python3/dist-packages/flake8/main/application.py", line 336, in run | self._run(argv) | File "/usr/lib/python3/dist-packages/flake8/main/application.py", line 324, in _run | self.initialize(argv) | File "/usr/lib/python3/dist-packages/flake8/main/application.py", line 302, in initialize | self.find_plugins( | File "/usr/lib/python3/dist-packages/flake8/main/application.py", line 128, in find_plugins | self.plugins = finder.load_plugins(raw, opts) |^^ | File "/usr/lib/python3/dist-packages/flake8/plugins/finder.py", line 370, in load_plugins | return _classify_plugins(_import_plugins(plugins, opts), opts) | ^^ | File "/usr/lib/python3/dist-packages/flake8/plugins/finder.py", line 312, in _import_plugins | return [_load_plugin(p) for p in plugins] | ^^^ | File "/usr/lib/python3/dist-packages/flake8/plugins/finder.py", line 298, in _load_plugin | raise FailedToLoadPlugin(plugin.package, e) | flake8.exceptions.FailedToLoadPlugin: Flake8 failed to load plugin "pycodestyle" due to cannot import name 'missing_whitespace_around_operator' from 'pycodestyle' (/usr/lib/python3/dist-packages/pycodestyle.py). Commenting that out in `/usr/lib/python3/dist- packages/flake8/plugins/pycodestyle.py`, I get others. It looks like this is fixed upstream in https://github.com/PyCQA/flake8/commit/9786562feb573d30c73f18e1a0a6685c8584e9b5 Can we please include this? ** Affects: flake8 (Ubuntu) Importance: Undecided Status: New ** Affects: flake8 (Ubuntu Noble) Importance: Undecided Status: New ** Also affects: flake8 (Ubuntu Noble) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2056093 Title: ImportError: cannot import name 'missing_whitespace_around_operator' from 'pycodestyle' (/usr/lib/python3/dist-packages/pycodestyle.py). Did you mean: 'whitespace_around_operator'? To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/flake8/+bug/2056093/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1598304] Re: systemd services created by snappy breaks etckeeper
** Also affects: hundredpapercuts Importance: Undecided Status: New ** Changed in: etckeeper (Ubuntu) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1598304 Title: systemd services created by snappy breaks etckeeper To manage notifications about this bug go to: https://bugs.launchpad.net/etckeeper/+bug/1598304/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1986739] Re: etckeeper cron spam => please pass --quiet to `bzr commit`
** Also affects: hundredpapercuts Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1986739 Title: etckeeper cron spam => please pass --quiet to `bzr commit` To manage notifications about this bug go to: https://bugs.launchpad.net/etckeeper/+bug/1986739/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1922960] Re: ieee-data monthly cron job in Xenial probably DDoSes ieee.org
** Also affects: hundredpapercuts Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1922960 Title: ieee-data monthly cron job in Xenial probably DDoSes ieee.org To manage notifications about this bug go to: https://bugs.launchpad.net/hundredpapercuts/+bug/1922960/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2038613] Re: Unable to get a copy of private bzr repositories using 'bzr branch' on mantic
** Also affects: breezy (Ubuntu Mantic) Importance: Undecided Status: New ** Also affects: breezy (Ubuntu Noble) Importance: Undecided Status: Confirmed ** Summary changed: - Unable to get a copy of private bzr repositories using 'bzr branch' on mantic + Unable to get a copy of private bzr repositories using 'bzr branch' on mantic & noble ** Changed in: breezy (Ubuntu Mantic) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2038613 Title: Unable to get a copy of private bzr repositories using 'bzr branch' on mantic & noble To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/breezy/+bug/2038613/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2038613] Re: Unable to get a copy of private bzr repositories using 'bzr branch' on mantic
The workaround doesn't work for me? | [hloeung@dharkan tmp]$ bzr branch lp+bzr:canonical-sshebang | ... | | lazr.restfulclient.errors.ServerError: HTTP Error 500: Internal Server Error | Response headers: | --- | connection: close | content-length: 14 | content-type: text/plain;charset=utf-8 | date: Thu, 29 Feb 2024 01:47:10 GMT | server: gunicorn | status: 500 | x-lazr-oopsid: OOPS-5b2b04c2eb781d9c86031e2a31b56739 | x-powered-by: Zope (www.zope.org), Python (www.python.org) | x-request-id: d23d8481-48de-495f-a8ff-520577cedfe0 | x-vcs-revision: 9643586c585856148a18782148972ae9c1179d06 | --- | Response body: | --- | b'AssertionError' | --- | | | brz 3.3.5 on python 3.12.2 (Linux-6.6.0-14-generic-x86_64-with-glibc2.39) | arguments: ['bzr', 'branch', 'lp+bzr:canonical-sshebang'] | plugins: bash_completion[3.3.5], changelog_merge[3.3.5], | commitfromnews[3.3.5], cvs[3.3.5], darcs[3.3.5], email[3.3.5], | etckeeper[unknown], fastimport[3.3.5], flake8[unknown], fossil[3.3.5], | github[3.3.5], gitlab[3.3.5], hg[3.3.5], launchpad[3.3.5], mtn[3.3.5], | netrc_credential_store[3.3.5], news_merge[3.3.5], po_merge[3.3.5], | propose[3.3.5], pypi[3.3.5], quilt[unknown], repodebug[3.3.5], | rewrite[unknown], stats[3.3.5], svn[3.3.5], upload[3.3.5], | weave_fmt[3.3.5], webdav[3.3.5], zsh_completion[3.3.5] | encoding: 'utf-8', fsenc: 'utf-8', lang: 'en_US.utf8' | | *** Breezy has encountered an internal error. This probably indicates a | bug in Breezy. You can help us fix it by filing a bug report at | https://bugs.launchpad.net/brz/+filebug | including this traceback and a description of the problem. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2038613 Title: Unable to get a copy of private bzr repositories using 'bzr branch' on mantic To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/breezy/+bug/2038613/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2054924] Re: color emoji are broken with fontconfig 2.15
** Changed in: fontconfig (Ubuntu) Status: Triaged => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2054924 Title: color emoji are broken with fontconfig 2.15 To manage notifications about this bug go to: https://bugs.launchpad.net/fontconfig/+bug/2054924/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2054924] Re: color emoji are broken with fontconfig 2.15
The workaround detailed upstream works for me - removing /etc/fonts/conf.d/70-no-bitmaps.conf and re-generating your fonts cache. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2054924 Title: color emoji are broken with fontconfig 2.15 To manage notifications about this bug go to: https://bugs.launchpad.net/fontconfig/+bug/2054924/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1968305] Re: sshd_config.d overrides not working
> From debugging sshd, I can see the override file is indeed being read, and the option is supposedly set. But after testing, the options are not taking effect. From debugging, do you see /etc/ssh/sshd_config being read first? For OpenSSH, at least with the client side, the first defined value is used and I suspect it's the same with the server side. Can you show us the contents of your /etc/ssh/sshd_config to see if the "Include /etc/ssh/sshd_config.d/*.conf" is at the very top? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1968305 Title: sshd_config.d overrides not working To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/1968305/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1960570] [NEW] Logrotate shouldn't restart conntrackd
Public bug reported: Hi, The current logrotate config is as follows: === /var/log/conntrackd-stats.log { weekly rotate 2 missingok postrotate invoke-rc.d conntrackd restart > /dev/null endscript } === This causes weekly restarts of conntrackd. Can we switch to using copytruncate instead to prevent restarting conntrackd? ** Affects: conntrack-tools (Ubuntu) Importance: Undecided Status: New ** Description changed: Hi, The current logrotate config is as follows: === /var/log/conntrackd-stats.log { - weekly - rotate 2 - missingok + weekly + rotate 2 + missingok - postrotate - invoke-rc.d conntrackd restart > /dev/null - endscript + postrotate + invoke-rc.d conntrackd restart > /dev/null + endscript } === - This causes daily restarts of conntrackd. Can we switch to using + This causes weekly restarts of conntrackd. Can we switch to using copytruncate instead to prevent restarting conntrackd? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1960570 Title: Logrotate shouldn't restart conntrackd To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/conntrack-tools/+bug/1960570/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1928989] Re: expiring trust anchor compatibility issue
I think you want package updates from Ubuntu ESM, in particular ca- certificates 20190110~14.04.1~esm2. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1928989 Title: expiring trust anchor compatibility issue To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1928989/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1957128] Re: ifenslave fails to detach slave from bonded interface
Looks fixed in more recent versions. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1957128 Title: ifenslave fails to detach slave from bonded interface To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ifenslave/+bug/1957128/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1957128] [NEW] ifenslave fails to detach slave from bonded interface
Public bug reported: Hi, When I try to detach a slave from a bonded interface, it fails as follows: | [hloeung@myhost etc]$ sudo ifenslave -v -d bond0 ens2f1 | ens2f1: is not enslaved to bond0 It's definitely part of the bond: | [hloeung@myhost etc]$ ls /sys/class/net/bond0/ -la | grep ens | lrwxrwxrwx 1 root root0 Jan 12 02:36 lower_ens2f0 -> ../../../pci:00/:00:02.0/:05:00.0/net/ens2f0 | lrwxrwxrwx 1 root root0 Jan 12 02:36 lower_ens2f1 -> ../../../pci:00/:00:02.0/:05:00.1/net/ens2f1 Running ifenslave with `sh -x` shows this: | ... | + [ -z ens2f1 ] | + master=bond0 | + shift | + [ -d /sys/class/net/bond0 ] | + [ -d /sys/class/net/bond0/bonding ] | + [ = 1 ] | + [ -d /sys/class/net/ens2f1 ] | + [ -z 1 ] | + [ ! -h /sys/class/net/bond0/slave_ens2f1 ] | + echo ens2f1: is not enslaved to bond0 | ens2f1: is not enslaved to bond0 | + continue | + exit 0 I think the bug is in this code: | if [ -z "$DETACH" ]; then | if [ -h "/sys/class/net/$master/slave_$slave" ] || |[ -h "/sys/class/net/$master/lower_$slave" ]; then | echo "$slave: already enslaved to $master" >&2 | continue | fi | ... | else | if [ ! -h "/sys/class/net/$master/slave_$slave" ] || |[ ! -h "/sys/class/net/$master/lower_$slave" ]; then | echo "$slave: is not enslaved to $master" >&2 | continue | fi Where rather than ||, it should be && in the else block (for detaching). ** Affects: ifenslave (Ubuntu) Importance: Undecided Status: Invalid ** Affects: ifenslave (Ubuntu Xenial) Importance: Undecided Status: Invalid ** Changed in: ifenslave (Ubuntu) Status: New => Invalid ** Also affects: ifenslave (Ubuntu Xenial) Importance: Undecided Status: New ** Changed in: ifenslave (Ubuntu Xenial) Status: New => Invalid ** Description changed: Hi, When I try to detach a slave from a bonded interface, it fails as follows: | [hloeung@myhost etc]$ sudo ifenslave -v -d bond0 ens2f1 | ens2f1: is not enslaved to bond0 It's definitely part of the bond: | [hloeung@myhost etc]$ ls /sys/class/net/bond0/ -la | grep ens | lrwxrwxrwx 1 root root0 Jan 12 02:36 lower_ens2f0 -> ../../../pci:00/:00:02.0/:05:00.0/net/ens2f0 | lrwxrwxrwx 1 root root0 Jan 12 02:36 lower_ens2f1 -> ../../../pci:00/:00:02.0/:05:00.1/net/ens2f1 Running ifenslave with `sh -x` shows this: | ... | + [ -z ens2f1 ] | + master=bond0 | + shift | + [ -d /sys/class/net/bond0 ] | + [ -d /sys/class/net/bond0/bonding ] | + [ = 1 ] | + [ -d /sys/class/net/ens2f1 ] | + [ -z 1 ] | + [ ! -h /sys/class/net/bond0/slave_ens2f1 ] | + echo ens2f1: is not enslaved to bond0 | ens2f1: is not enslaved to bond0 | + continue | + exit 0 I think the bug is in this code: | if [ -z "$DETACH" ]; then | if [ -h "/sys/class/net/$master/slave_$slave" ] || |[ -h "/sys/class/net/$master/lower_$slave" ]; then | echo "$slave: already enslaved to $master" >&2 | continue | fi | ... | else - | if [ ! -h "/sys/class/net/$master/slave_$slave" ] && + | if [ ! -h "/sys/class/net/$master/slave_$slave" ] || |[ ! -h "/sys/class/net/$master/lower_$slave" ]; then | echo "$slave: is not enslaved to $master" >&2 | continue | fi - Where rather than &&, it should be || in the else block (for detaching). + Where rather than ||, it should be && in the else block (for detaching). -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1957128 Title: ifenslave fails to detach slave from bonded interface To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ifenslave/+bug/1957128/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1954721] [NEW] no LLDP on Intel X710 NICs
Public bug reported: Hi, Per the Intel community [1], for Intel X710 controllers, the NIC is meant to handle LLDP directly. Unfortunately, this doesn't play well with lldpd: | hloeung@cumulus:mgmt:~$ net show lldp | grep swp24 | swp24 10GTrunk/L237383638-3530-5A43-3238-30423954 Unknown It is known in upstream lldpd[2] with a fix proposed to work around this by disabling handling of LLDP in the NIC[3]. Can we please backport this to Focal? The suggested workaround is: | for i in $(sudo ls /sys/kernel/debug/i40e); do | echo lldp stop | sudo tee /sys/kernel/debug/i40e/${i}/command | done [1]https://community.intel.com/t5/Ethernet-Products/X710-dropping-LLDP-frames/m-p/348508 [2]https://github.com/lldpd/lldpd/issues/372 [3]https://github.com/lldpd/lldpd/commit/a74fd8ca9c02fc0eb81f7a219b2bb657cac25ca2 ** Affects: lldpd (Ubuntu) Importance: Undecided Status: Fix Released ** Affects: lldpd (Ubuntu Focal) Importance: Undecided Status: New ** Affects: lldpd (Ubuntu Hirsute) Importance: Undecided Status: New ** Affects: lldpd (Ubuntu Impish) Importance: Undecided Status: Fix Released ** Affects: lldpd (Ubuntu Jammy) Importance: Undecided Status: Fix Released ** Also affects: lldpd (Ubuntu Impish) Importance: Undecided Status: New ** Also affects: lldpd (Ubuntu Hirsute) Importance: Undecided Status: New ** Also affects: lldpd (Ubuntu Jammy) Importance: Undecided Status: New ** Also affects: lldpd (Ubuntu Focal) Importance: Undecided Status: New ** Changed in: lldpd (Ubuntu Impish) Status: New => Invalid ** Changed in: lldpd (Ubuntu Jammy) Status: New => Invalid ** Changed in: lldpd (Ubuntu Impish) Status: Invalid => Fix Released ** Changed in: lldpd (Ubuntu Jammy) Status: Invalid => Fix Released ** Description changed: Hi, Per the Intel community [1], for Intel X710 controllers, the NIC is meant to handle LLDP directly. Unfortunately, this doesn't play well with lldpd: | hloeung@cumulus:mgmt:~$ net show lldp | grep swp24 | swp24 10GTrunk/L237383638-3530-5A43-3238-30423954 Unknown - It is known in upstream lldpd with a fix proposed to work around this by - disabling handling of LLDP in the NIC[2]. Can we please backport this to - Focal? + It is known in upstream lldpd[2] with a fix proposed to work around this + by disabling handling of LLDP in the NIC[3]. Can we please backport this + to Focal? The suggested workaround is: | for i in $(sudo ls /sys/kernel/debug/i40e); do | echo lldp stop | sudo tee /sys/kernel/debug/i40e/${i}/command | done - [1]https://community.intel.com/t5/Ethernet-Products/X710-dropping-LLDP-frames/m-p/348508 - [2]https://github.com/lldpd/lldpd/commit/a74fd8ca9c02fc0eb81f7a219b2bb657cac25ca2 + [2]https://github.com/lldpd/lldpd/issues/372 + [3]https://github.com/lldpd/lldpd/commit/a74fd8ca9c02fc0eb81f7a219b2bb657cac25ca2 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1954721 Title: no LLDP on Intel X710 NICs To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/lldpd/+bug/1954721/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1918936] Re: ipset does NSS lookups even if ports are numeric
Hirsute verified - https://paste.ubuntu.com/p/Zs6vG7M6Jf/ | real1m46.509s vs. | real0m43.891s Impish verified - https://paste.ubuntu.com/p/yWW4k8Jy79/ | real1m14.348s vs. | real0m27.687s ** Tags removed: verification-needed verification-needed-hirsute verification-needed-impish ** Tags added: verification-done verification-done-hirsute verification-done-impish -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1918936 Title: ipset does NSS lookups even if ports are numeric To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ipset/+bug/1918936/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1918936] Re: ipset does NSS lookups even if ports are numeric
Tested on a Focal VM in Canonistack. Using current ipset: | ubuntu@juju-87625f-hloeung-110:~$ sudo apt-get install ipset | ... | Get:1 http://us.archive.ubuntu.com/ubuntu focal/main amd64 libipset13 amd64 7.5-1~exp1 [53.4 kB] | Get:2 http://us.archive.ubuntu.com/ubuntu focal/main amd64 ipset amd64 7.5-1~exp1 [29.8 kB] | ubuntu@juju-87625f-hloeung-110:~$ time sudo ipset restore < whitelist-ipv4-2021-06-29-with-proto-nums | | real1m55.870s | user1m3.704s | sys 0m26.604s Using the one in -proposed: | Get:1 http://us.archive.ubuntu.com/ubuntu focal-proposed/main amd64 ipset amd64 7.5-1ubuntu0.20.04.1 [29.8 kB] | Get:1 http://us.archive.ubuntu.com/ubuntu focal-proposed/main amd64 libipset13 amd64 7.5-1ubuntu0.20.04.1 [53.6 kB] | ubuntu@juju-87625f-hloeung-110:~$ time sudo ipset restore < whitelist-ipv4-2021-06-29-with-proto-nums | | real0m41.372s | user0m18.724s | sys 0m16.023s Full output - https://paste.ubuntu.com/p/w74Kjvnn84/ ** Tags removed: verification-needed-focal ** Tags added: verification-done-focal -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1918936 Title: ipset does NSS lookups even if ports are numeric To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ipset/+bug/1918936/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1948995] [NEW] Allow reverting to older revisions of a snap
Public bug reported: Hi, Is there a way to list the previous revisions of a snap in a specific channel and then allow the snap client to revert or install specific revisions? I understand `snap revert` exists, but it only allows to revert to the last installed and that's it. My use case is this, on an application unit using the ruby snap, it was automatically updated around 7 days ago. It wasn't until recently when we wanted to update the application where the latest ruby snap broke gem collection, see upstream bug[1]. But it wasn't known at the time so we thought to try the latest ruby from the latest channel (from 2.7/stable). So: | snap refresh ruby --channel latest/stable So now we want to revert: | $ sudo snap revert ruby | ruby reverted to 2.7.4 | $ sudo snap revert ruby | error: cannot revert "ruby": no revision to revert to What we actually want is to revert from 2.7.4 (231) in 2.7/stable to 2.7.4 (219) also in 2.7/stable. The only way seems to be to find the correct URLs for both assertion file and snap itself, download both, and to use `snap ack ` plus `snap install RjAgguCDAawLSJ3IByPe0R92xlNtrfGt_219.snap`. [1]https://github.com/ruby/snap.ruby/issues/28 ** Affects: snapd (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1948995 Title: Allow reverting to older revisions of a snap To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/snapd/+bug/1948995/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
Re: [Bug 1940011] Re: Reduce cron spam from weekly update-notifier-common
On Thu, Sep 02, 2021 at 05:39:23PM -, Brian Murray wrote: > I think part of the point of having the cronjob is to mail the system > administrator and let them know that a new release of Ubuntu is > available. That being said I do feel like sending the email every week > until the system upgraded is a bit much. I'd be happy to hear about any > clever ideas for avoiding that. Maybe email once per new release of Ubuntu (including point releases). Create a flag on disk when notifed for said release. If we wanted to, create the flag on /run, so that a reboot resets it all. Unfortunately, this is made worse with the shift to replacing services with juju deployments where environments contain multiple units each trying to email about a new release. Thanks! -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1940011 Title: Reduce cron spam from weekly update-notifier-common To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/update-notifier/+bug/1940011/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1941692] Re: Update nmap-mac-prefixes on packaging?
** Description changed: Hi, The bundled nmap-mac-prefixes dates back to 2019: | # $Id: nmap-mac-prefixes 37638 2019-05-28 21:35:45Z dmiller $ generated with make-mac-prefixes.pl | # Original data comes from http://standards.ieee.org/regauth/oui/oui.txt | # These values are known as Organizationally Unique Identifiers (OUIs) | # See http://standards.ieee.org/faqs/OUI.html | # We have added a few unregistered OUIs at the end. Think we could automatically update this when packaging nmap? Maybe get it from http://standards-oui.ieee.org/oui/oui.txt (the base 16 lines). + + Something like this would generate the file in a format nmap + understands: + + | grep 'base 16' oui.txt | sed -e 's/\s*(base 16)\s*/ /g' | sudo tee + /usr/share/nmap/nmap-mac-prefixes -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1941692 Title: Update nmap-mac-prefixes on packaging? To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/nmap/+bug/1941692/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1941692] [NEW] Update nmap-mac-prefixes on packaging?
Public bug reported: Hi, The bundled nmap-mac-prefixes dates back to 2019: | # $Id: nmap-mac-prefixes 37638 2019-05-28 21:35:45Z dmiller $ generated with make-mac-prefixes.pl | # Original data comes from http://standards.ieee.org/regauth/oui/oui.txt | # These values are known as Organizationally Unique Identifiers (OUIs) | # See http://standards.ieee.org/faqs/OUI.html | # We have added a few unregistered OUIs at the end. Think we could automatically update this when packaging nmap? Maybe get it from http://standards-oui.ieee.org/oui/oui.txt (the base 16 lines). ** Affects: nmap (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1941692 Title: Update nmap-mac-prefixes on packaging? To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/nmap/+bug/1941692/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1836475] Re: [SRU] update-notifier-common weekly cron job runs at the same time for all computers across the globe
LGTM, thanks! | ubuntu@juju-87625f-hloeung-66:~$ cp /etc/cron.weekly/update-notifier-common ~/ | ubuntu@juju-87625f-hloeung-66:~$ sudo apt-get update | ... | Get:8 http://us.archive.ubuntu.com/ubuntu bionic-proposed/main amd64 Packages [104 kB] | ... | ubuntu@juju-87625f-hloeung-66:~$ sudo apt-get install update-notifier-common | ubuntu@juju-87625f-hloeung-66:~$ diff -Naurp ~/update-notifier-common /etc/cron.weekly/update-notifier-common | --- /home/ubuntu/update-notifier-common 2021-08-26 00:27:43.687383953 + | +++ /etc/cron.weekly/update-notifier-common 2021-08-23 22:33:23.0 + | @@ -4,5 +4,12 @@ set -e | | [ -x /usr/lib/ubuntu-release-upgrader/release-upgrade-motd ] || exit 0 | | -# Check to see whether there is a new version of Ubuntu available | -/usr/lib/ubuntu-release-upgrader/release-upgrade-motd | +sleep_then_check() { | +# Sleep for up to an hour to spread the load of checking for updates on | +# the Ubuntu infrastructure | +sleep $(shuf -i 1-3600 -n 1) | +# Check to see whether there is a new version of Ubuntu available | +/usr/lib/ubuntu-release-upgrader/release-upgrade-motd | +} | + | +sleep_then_check & | ubuntu@juju-87625f-hloeung-66:~$ sudo /etc/cron.weekly/update-notifier-common | ubuntu@juju-87625f-hloeung-66:~$ ps afxuww | grep sleep | root 22110 0.0 0.0 7932 740 pts/0S00:29 0:00 \_ sleep 767 | ubuntu@juju-87625f-hloeung-66:~$ ls -la /var/lib/ubuntu-release-upgrader/release-upgrade-available | -rw-r--r-- 1 root root 80 Aug 26 00:27 /var/lib/ubuntu-release-upgrader/release-upgrade-available | ubuntu@juju-87625f-hloeung-66:~$ New release '20.04.2 LTS' available. | Run 'do-release-upgrade' to upgrade to it. | The additional output from the end is when it ran, LP:1940011 is to see if we can silence that to reduce weekly cron spam. ** Tags removed: verification-needed verification-needed-bionic ** Tags added: verification-done verification-done-bionic ** Changed in: update-notifier (Ubuntu Bionic) Importance: Undecided => High -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1836475 Title: [SRU] update-notifier-common weekly cron job runs at the same time for all computers across the globe To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/update-notifier/+bug/1836475/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1918936] Re: ipset does NSS lookups even if ports are numeric
** Changed in: ipset (Ubuntu Focal) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1918936 Title: ipset does NSS lookups even if ports are numeric To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ipset/+bug/1918936/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1940011] [NEW] Reduce cron spam from weekly update-notifier-common
Public bug reported: Hi, We get these cron spam weekly: | Received: by mysystem.mydomain.local (Postfix) | id B19E32E806B; Sun, 15 Aug 2021 06:47:03 + (UTC) | Delivered-To: root@mysystem.mydomain.local | Received: by mysystem.mydomain.local (Postfix, from userid 0) | id 9DD002E8075; Sun, 15 Aug 2021 06:47:03 + (UTC) | From: Cron Daemon | To: root@mysystem.mydomain.local | Subject: Cron test -x /usr/sbin/anacron || ( cd / && run-parts --report /etc/cron.weekly ) | MIME-Version: 1.0 | Content-Type: text/plain; charset=UTF-8 | Content-Transfer-Encoding: 8bit | X-Cron-Env: | X-Cron-Env: | X-Cron-Env: | X-Cron-Env: | Message-Id: <20210815064703.9DD002E8075@mysystem.mydomain.local> | Date: Sun, 15 Aug 2021 06:47:03 + (UTC) | | /etc/cron.weekly/update-notifier-common: | New release '18.04.5 LTS' available. | Run 'do-release-upgrade' to upgrade to it. This is output from /etc/cron.weekly/update-notifier-common calling /usr/lib/ubuntu-release-upgrader/release-upgrade-motd That's fine for when you have a system or two, but probably not when you manage many. Any chance the cron job can be updated so stdout is silenced? So: | # Check to see whether there is a new version of Ubuntu available | /usr/lib/ubuntu-release-upgrader/release-upgrade-motd > /dev/null Thanks ** Affects: update-notifier (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1940011 Title: Reduce cron spam from weekly update-notifier-common To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/update-notifier/+bug/1940011/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1836475] Re: [SRU] update-notifier-common weekly cron job runs at the same time for all computers across the globe
Thanks Brian (brian-murray) for sponsoring this change. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1836475 Title: [SRU] update-notifier-common weekly cron job runs at the same time for all computers across the globe To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/update-notifier/+bug/1836475/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1836475] Re: [SRU] update-notifier-common weekly cron job runs at the same time for all computers across the globe
Looks good to me: | ubuntu@juju-87625f-hloeung-100:/etc/apt$ sudo apt-get install update-notifier-common | Reading package lists... Done | Building dependency tree | Reading state information... Done | The following packages were automatically installed and are no longer required: | dnsmasq-base kpartx libfl2 libidn11 libsgutils2-2 liburcu6 sg3-utils sg3-utils-udev | Use 'sudo apt autoremove' to remove them. | The following packages will be upgraded: | update-notifier-common | 1 upgraded, 0 newly installed, 0 to remove and 44 not upgraded. | Need to get 133 kB of archives. | After this operation, 0 B of additional disk space will be used. | Get:1 http://us.archive.ubuntu.com/ubuntu focal-proposed/main amd64 update-notifier-common all 3.192.30.9 [133 kB] | Fetched 133 kB in 0s (3458 kB/s) | (Reading database ... 130802 files and directories currently installed.) | Preparing to unpack .../update-notifier-common_3.192.30.9_all.deb ... | Unpacking update-notifier-common (3.192.30.9) over (3.192.30.8) ... | Setting up update-notifier-common (3.192.30.9) ... | Installing new version of config file /etc/cron.weekly/update-notifier-common ... Comparing it with the old backup copy: | ubuntu@juju-87625f-hloeung-100:/etc/apt$ diff -Naurp ~/update-notifier-common /etc/cron.weekly/update-notifier-common | --- /home/ubuntu/update-notifier-common 2021-08-13 05:55:55.859177053 + | +++ /etc/cron.weekly/update-notifier-common 2021-08-05 14:01:11.0 + | @@ -4,5 +4,12 @@ set -e | | [ -x /usr/lib/ubuntu-release-upgrader/release-upgrade-motd ] || exit 0 | | -# Check to see whether there is a new version of Ubuntu available | -/usr/lib/ubuntu-release-upgrader/release-upgrade-motd | +sleep_then_check() { | +# Sleep for up to an hour to spread the load of checking for updates on | +# the Ubuntu infrastructure | +sleep $(shuf -i 1-3600 -n 1) | +# Check to see whether there is a new version of Ubuntu available | +/usr/lib/ubuntu-release-upgrader/release-upgrade-motd | +} | + | +sleep_then_check & | ubuntu@juju-87625f-hloeung-100:/etc/cron.weekly$ apt-cache policy update-notifier-commonupdate-notifier-common: | Installed: 3.192.30.9 | Candidate: 3.192.30.9 | Version table: | *** 3.192.30.9 500 | 500 http://us.archive.ubuntu.com/ubuntu focal-proposed/main amd64 Packages | 100 /var/lib/dpkg/status | 3.192.30.8 500 | 500 http://us.archive.ubuntu.com/ubuntu focal-updates/main amd64 Packages | 3.192.30 500 | 500 http://us.archive.ubuntu.com/ubuntu focal/main amd64 Packages ** Tags removed: verification-needed verification-needed-focal ** Tags added: verification-done verification-done-focal -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1836475 Title: [SRU] update-notifier-common weekly cron job runs at the same time for all computers across the globe To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/update-notifier/+bug/1836475/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1836475] Re: [SRU] update-notifier-common weekly cron job runs at the same time for all computers across the globe
@waveform, perfect, thanks! -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1836475 Title: [SRU] update-notifier-common weekly cron job runs at the same time for all computers across the globe To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/update-notifier/+bug/1836475/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1936175] Re: apt hook slows down apt - could this be asynchronous?
Something similar was done for checking for the latest Ubuntu release and updating the MOTD in LP:1836475. It switches the download part into a systemd timer (https://launchpadlibrarian.net/505544658/lp1836475-focal.debdiff). So maybe something similar here where the timer job checks existence and timestamp of a file and runs if it doesn't exist or is older than a certain period of time. Then the apt hook itself would remove that file forcing the systemd timer job to fire. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1936175 Title: apt hook slows down apt - could this be asynchronous? To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/update-notifier/+bug/1936175/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1935731] Re: [Errno 2] No such file or directory: '/usr/lib/python3/dist-packages/breezy/git/__init__.py'
Sorry for the noise, this is my dpkg-divert to disable git support per LP:1868200. ** Changed in: breezy (Ubuntu) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1935731 Title: [Errno 2] No such file or directory: '/usr/lib/python3/dist- packages/breezy/git/__init__.py' To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/breezy/+bug/1935731/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1935731] [NEW] [Errno 2] No such file or directory: '/usr/lib/python3/dist-packages/breezy/git/__init__.py'
Public bug reported: Hi, Install brz from Hirsute fails: | Selecting previously unselected package python3-breezy. | Preparing to unpack .../4-python3-breezy_3.1.0-8_amd64.deb ... | Unpacking python3-breezy (3.1.0-8) ... | Selecting previously unselected package brz. | Preparing to unpack .../5-brz_3.1.0-8_all.deb ... | Unpacking brz (3.1.0-8) ... | Setting up python3-fastimport (0.9.8-5build1) ... | Setting up python3-configobj (5.0.6-4) ... | Setting up python3-patiencediff (0.2.1-1build1) ... | Setting up python3-dulwich (0.20.15-1ubuntu1) ... | Setting up python3-breezy (3.1.0-8) ... | [Errno 2] No such file or directory: '/usr/lib/python3/dist-packages/breezy/git/__init__.py' | dpkg: error processing package python3-breezy (--configure): | installed python3-breezy package post-installation script subprocess returned error exit status 1 | dpkg: dependency problems prevent configuration of brz: | brz depends on python3-breezy (<= 3.1.0-8.1~); however: | Package python3-breezy is not configured yet. | brz depends on python3-breezy (>= 3.1.0-8); however: | Package python3-breezy is not configured yet. | | dpkg: error processing package brz (--configure): | dependency problems - leaving unconfigured | Processing triggers for man-db (2.9.4-2) ... | No apport report written because the error message indicates its a followup error from a previous failure. | Errors were encountered while processing: | python3-breezy | brz | E: Sub-process /usr/bin/dpkg returned an error code (1) Workaround seems to be touching / creating /usr/lib/python3/dist- packages/breezy/git/__init__.py which then allows the rest to finish up. Should that file be packaged? ** Affects: breezy (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1935731 Title: [Errno 2] No such file or directory: '/usr/lib/python3/dist- packages/breezy/git/__init__.py' To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/breezy/+bug/1935731/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1918936] Re: ipset does NSS lookups even if ports are numeric
** Patch added: "ipset.patch" https://bugs.launchpad.net/ubuntu/+source/ipset/+bug/1918936/+attachment/5507474/+files/ipset.patch -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1918936 Title: ipset does NSS lookups even if ports are numeric To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ipset/+bug/1918936/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1918936] Re: ipset does NSS lookups even if ports are numeric
Apologies, can we update it to using the attached patch? It includes the fix by Jozsef from upstream: """ Fix patch "Parse port before trying by service name" The patch broke parsing service names: number parsing failures are hard errors which erase data, thus making impossible to parse input as a string. Fix it by enabling soft (warning) failures in the case of port number parsing. """ https://git.netfilter.org/ipset/commit/?id=fd7d97c57e9dbe215c71be5a2fe049a1f905fddb Thanks -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1918936 Title: ipset does NSS lookups even if ports are numeric To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ipset/+bug/1918936/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1918936] Re: ipset does NSS lookups even if ports are numeric
Per discussion on Mattermost, the original behavior was to try string_to_u16() before parse_portname(). This was switched in upstream commit https://git.netfilter.org/ipset/tree/lib/parse.c?id=516600858cb54906fb728d04e5edf1131ee7b3b2 and released with ipset v6.37. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1918936 Title: ipset does NSS lookups even if ports are numeric To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ipset/+bug/1918936/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
Re: [Bug 1836475] Re: [SRU] update-notifier-common weekly cron job runs at the same time for all computers across the globe
On Mon, Jun 14, 2021 at 04:16:28PM -, Robie Basak wrote: > > I'm keen to try and avoid handling any more complex (arbitrary) > customisations > > I agree! I think I prefer adding a random sleep for the SRU for this > reason, even if the appropriate fix for the development release that > landed in Groovy was to switch to a systemd timer. However a long random > sleep in cron.weekly will hold up other cron.weekly jobs, so given that > /usr/lib/ubuntu-release-upgrader/release-upgrade-motd already gates with > a timestamp, perhaps backgrounding a shorter random delay would be > preferable if that would be acceptable to Canonical IS? > We could try with a shorter random delay and see if it helps spread the load. The 'update-notifier-common' cron.weekly job is usually last so wouldn't really hold up that many other cron.weekly jobs. If a shoter random delay/sleep doesn't help, we could consider renaming it to something like 'zzupdate-notifier-common' and increasing the delay then. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1836475 Title: [SRU] update-notifier-common weekly cron job runs at the same time for all computers across the globe To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/update-notifier/+bug/1836475/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1780341] Re: squid should default to more human friendly timestamps
** Branch linked: lp:~hloeung/ubuntu-repository-cache/squid-logging- human-sensible-timestamps -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1780341 Title: squid should default to more human friendly timestamps To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/squid/+bug/1780341/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1926379] Re: stack smashing attack detected in bash host tab completion
We're also seeing this with rsyncd: | Apr 28 09:35:04 behaim rsync[2152929]: *** stack smashing detected ***: terminated >From apt history logs: | Upgrade: libldap-2.4-2:amd64 (2.4.49+dfsg-2ubuntu1.7, 2.4.49+dfsg-2ubuntu1.8), libc6-dev:amd64 (2.31-0ubuntu9.2, 2.31-0ubuntu9.3), grub-common:amd64 (2.04-1ubuntu26.9, 2.04-1ubuntu26.11), python3-pip:amd64 (20.0.2-5ubuntu1.1, 20.0.2-5ubuntu1.3), libc6:amd64 (2.31-0ubuntu9.2, 2.31-0ubuntu9.3)... -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1926379 Title: stack smashing attack detected in bash host tab completion To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/glibc/+bug/1926379/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1918936] Re: ipset does NSS lookups even if ports are numeric
Example entries in ipset used for testing: | add test 10.1.1.0/21,80,150.222.129.122/31 | add test 10.1.1.0/21,80,150.222.129.124/31 | add test 10.1.1.0/21,80,150.222.129.126/31 We're not specifying the protocol to avoid the just as expensive getprotobyname() lookup. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1918936 Title: ipset does NSS lookups even if ports are numeric To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ipset/+bug/1918936/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1918936] Re: ipset does NSS lookups even if ports are numeric
Current size of ipset used for testing: | ubuntu@juju-87625f-hloeung-93:~/ipset$ wc -l ~/whitelist-ipv4 | 515698 /home/ubuntu/whitelist-ipv4 With the patch: | ubuntu@juju-87625f-hloeung-93:~/ipset$ sudo ipset destroy test | ubuntu@juju-87625f-hloeung-93:~/ipset$ sudo ipset create test hash:net,port,net hashsize 4096 maxelem 786432 | ubuntu@juju-87625f-hloeung-93:~/ipset$ time sudo ~/ipset/src/ipset restore < ~/whitelist-ipv4 | | real0m7.204s | user0m3.104s | sys 0m3.877s vs without. | ubuntu@juju-87625f-hloeung-93:~/ipset$ sudo ipset destroy test | ubuntu@juju-87625f-hloeung-93:~/ipset$ sudo ipset create test hash:net,port,net hashsize 4096 maxelem 786432 | ubuntu@juju-87625f-hloeung-93:~/ipset$ time sudo ~/ipset/src/ipset restore < ~/whitelist-ipv4 | | real0m33.232s | user0m25.291s | sys 0m7.682s Output of what I used to revert to compare - https://paste.ubuntu.com/p/x9wcsQdxMn/ -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1918936 Title: ipset does NSS lookups even if ports are numeric To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ipset/+bug/1918936/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1904369] Re: systemd 100% CPU; constantly reading service for socket activation
FWIW, these were the main Ubuntu Archive servers. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1904369 Title: systemd 100% CPU; constantly reading service for socket activation To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1904369/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1904369] Re: systemd 100% CPU; constantly reading service for socket activation
Sorry about not providing further details on this bug. We ended up switching the last of our systems to xinetd so can no longer reproduce and provide the information required. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1904369 Title: systemd 100% CPU; constantly reading service for socket activation To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1904369/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1913216] Re: unbound DNS service crashing/not starting
What does 'journalctl -xe' say? Also anything interesting in /var/log/syslog? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1913216 Title: unbound DNS service crashing/not starting To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/unbound/+bug/1913216/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1836475] Re: [SRU] update-notifier-common weekly cron job runs at the same time for all computers across the globe
Any updates with regards to getting this backported to Focal? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1836475 Title: [SRU] update-notifier-common weekly cron job runs at the same time for all computers across the globe To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/update-notifier/+bug/1836475/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1898786] Re: bcache: Issues with large IO wait in bch_mca_scan() when shrinker is enabled
@mruffell, that's for Bionic, but for Focal is that still 5.4.0-56-generic? Or is there a new respun kernel to include these patches? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1898786 Title: bcache: Issues with large IO wait in bch_mca_scan() when shrinker is enabled To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1898786/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1836475] Re: [SRU] update-notifier-common weekly cron job runs at the same time for all computers across the globe
I tried to verify this but it looks like it was removed from focal- proposed. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1836475 Title: [SRU] update-notifier-common weekly cron job runs at the same time for all computers across the globe To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/update-notifier/+bug/1836475/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1901650] Re: grub-install: error: failed to register the EFI boot entry: Operation not permitted.
Adding '--no-nvram' as advised by Robert in #5 seems to work. Without: | ubuntu@machine-0:~$ sudo /usr/lib/grub/grub-multi-install --target=x86_64-efi | Installing grub to /boot/efi. | Installing for x86_64-efi platform. | grub-install: warning: Internal error. | grub-install: error: failed to register the EFI boot entry: Operation not permitted. | Installing grub to /boot/efi. | Installing for x86_64-efi platform. | ^C | ubuntu@machine-0:~$ With: | ubuntu@machine-0:~$ sudo /usr/lib/grub/grub-multi-install --target=x86_64-efi --no-nvram | Installing grub to /boot/efi. | Installing for x86_64-efi platform. | Installation finished. No error reported. | ubuntu@machine-0:~$ -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1901650 Title: grub-install: error: failed to register the EFI boot entry: Operation not permitted. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/grub2/+bug/1901650/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1901650] Re: grub-install: error: failed to register the EFI boot entry: Operation not permitted.
Other user reports - https://github.com/actions/virtual- environments/issues/1605 ** Bug watch added: github.com/actions/virtual-environments/issues #1605 https://github.com/actions/virtual-environments/issues/1605 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1901650 Title: grub-install: error: failed to register the EFI boot entry: Operation not permitted. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/grub2/+bug/1901650/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1904369] [NEW] systemd 100% CPU; constantly reading service for socket activation
Public bug reported: Hi, We recently switched to using systemd's socket activation for per-client limits. The configs are as follows: | $ ls -la /etc/systemd/system/sockets.target.wants/rsyncd.socket | lrwxrwxrwx 1 root root 33 Aug 25 00:09 /etc/systemd/system/sockets.target.wants/rsyncd.socket -> /etc/systemd/system/rsyncd.socket | $ cat /etc/systemd/system/sockets.target.wants/rsyncd.socket | [Unit] | Description=rsync daemon (socket) | Conflicts=rsyncd.service | | [Socket] | ListenStream=873 | Accept=yes | MaxConnections=85 | MaxConnectionsPerSource=5 | KeepAlive=true | | [Install] | WantedBy=sockets.target | $ cat /etc/systemd/system/rsyncd@.service | [Unit] | Description=rsync daemon | ConditionPathExists=/etc/rsyncd.conf | | [Service] | ExecStart=/usr/bin/rsync --daemon | StandardInput=socket | | [Install] | WantedBy=multi-user.target After a while, systemd runs hot consuming a whole CPU core: | $ top -p 1 | PID USER PR NIVIRTRESSHR S %CPU %MEM TIME+ COMMAND | 1 root 20 0 2057476 251560 6264 R 99.7 0.1 17903:32 systemd strace shows it constantly doing this: | $ sudo strace -p 1 | ... | openat(AT_FDCWD, "/etc/systemd/system/rsyncd@.service", O_RDONLY|O_NOCTTY|O_NOFOLLOW|O_CLOEXEC) = 14 | fcntl(14, F_GETFL) = 0x28000 (flags O_RDONLY|O_LARGEFILE|O_NOFOLLOW) | fstat(14, {st_mode=S_IFREG|0644, st_size=173, ...}) = 0 | fstat(14, {st_mode=S_IFREG|0644, st_size=173, ...}) = 0 | fstat(14, {st_mode=S_IFREG|0644, st_size=173, ...}) = 0 | read(14, "[Unit]\nDescription=rsync daemon\n"..., 4096) = 173 | read(14, "", 4096) = 0 | close(14) = 0 | openat(AT_FDCWD, "/etc/systemd/system/rsyncd@.service", O_RDONLY|O_NOCTTY|O_NOFOLLOW|O_CLOEXEC) = 14 | fcntl(14, F_GETFL) = 0x28000 (flags O_RDONLY|O_LARGEFILE|O_NOFOLLOW) | fstat(14, {st_mode=S_IFREG|0644, st_size=173, ...}) = 0 | fstat(14, {st_mode=S_IFREG|0644, st_size=173, ...}) = 0 | fstat(14, {st_mode=S_IFREG|0644, st_size=173, ...}) = 0 | read(14, "[Unit]\nDescription=rsync daemon\n"..., 4096) = 173 | read(14, "", 4096) = 0 | close(14) = 0 | ^Cstrace: Process 1 detached This is with 237-3ubuntu10.43 on a host running Bionic. ** Affects: systemd (Ubuntu) Importance: Undecided Status: New ** Affects: systemd (Ubuntu Bionic) Importance: Undecided Status: New ** Also affects: systemd (Ubuntu Bionic) Importance: Undecided Status: New ** Description changed: Hi, We recently switched to using systemd's socket activation for per-client limits. The configs are as follows: | $ ls -la /etc/systemd/system/sockets.target.wants/rsyncd.socket | lrwxrwxrwx 1 root root 33 Aug 25 00:09 /etc/systemd/system/sockets.target.wants/rsyncd.socket -> /etc/systemd/system/rsyncd.socket | $ cat /etc/systemd/system/sockets.target.wants/rsyncd.socket | [Unit] | Description=rsync daemon (socket) | Conflicts=rsyncd.service | | [Socket] | ListenStream=873 | Accept=yes | MaxConnections=85 | MaxConnectionsPerSource=5 | KeepAlive=true | | [Install] | WantedBy=sockets.target + + | $ cat /etc/systemd/system/rsyncd@.service + | [Unit] + | Description=rsync daemon + | ConditionPathExists=/etc/rsyncd.conf + | + | [Service] + | ExecStart=/usr/bin/rsync --daemon + | StandardInput=socket + | + | [Install] + | WantedBy=multi-user.target After a while, systemd runs hot consuming a whole CPU core: | PID USER PR NIVIRTRESSHR S %CPU %MEM TIME+ COMMAND | 1 root 20 0 2057476 251560 6264 R 99.7 0.1 17903:32 systemd strace shows it constantly doing this: | $ sudo strace -p 1 | ... | openat(AT_FDCWD, "/etc/systemd/system/rsyncd@.service", O_RDONLY|O_NOCTTY|O_NOFOLLOW|O_CLOEXEC) = 14 | fcntl(14, F_GETFL) = 0x28000 (flags O_RDONLY|O_LARGEFILE|O_NOFOLLOW) | fstat(14, {st_mode=S_IFREG|0644, st_size=173, ...}) = 0 | fstat(14, {st_mode=S_IFREG|0644, st_size=173, ...}) = 0 | fstat(14, {st_mode=S_IFREG|0644, st_size=173, ...}) = 0 | read(14, "[Unit]\nDescription=rsync daemon\n"..., 4096) = 173 | read(14, "", 4096) = 0 | close(14) = 0 | openat(AT_FDCWD, "/etc/systemd/system/rsyncd@.service", O_RDONLY|O_NOCTTY|O_NOFOLLOW|O_CLOEXEC) = 14 | fcntl(14, F_GETFL) = 0x28000 (flags O_RDONLY|O_LARGEFILE|O_NOFOLLOW) | fstat(14, {st_mode=S_IFREG|0644, st_size=173, ...}) = 0 | fstat(14, {st_mode=S_IFREG|0644, st_size=173, ...}) = 0 | fstat(14, {st_mode=S_IFREG|0644, st_size=173, ...}) = 0 | read(14, "[Unit]\nDescription=rsync daemon\n"..., 4096) = 173 | read(14, "", 4096) = 0 | close(14) = 0 | ^Cstrace: Process 1 detached This is with 237-3ubuntu10.43 on a host running Bionic. ** Description changed:
[Bug 1902960] Re: Upgrade from 245.4-4ubuntu3.3 to 245.4-4ubuntu3.2 appears to break DNS resolution in some cases
Attached /var/log/syslog. ** Attachment added: "syslog" https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1902960/+attachment/5431334/+files/syslog -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1902960 Title: Upgrade from 245.4-4ubuntu3.3 to 245.4-4ubuntu3.2 appears to break DNS resolution in some cases To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1902960/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1902960] Re: Upgrade from 245.4-4ubuntu3.3 to 245.4-4ubuntu3.2 appears to break DNS resolution in some cases
Spun up a new unit in Azure and also ran into this: | https://paste.ubuntu.com/p/zd6z8dZ5Zr/ -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1902960 Title: Upgrade from 245.4-4ubuntu3.3 to 245.4-4ubuntu3.2 appears to break DNS resolution in some cases To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1902960/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1901650] [NEW] grub-install: error: failed to register the EFI boot entry: Operation not permitted.
Public bug reported: Hi, Seeing a bunch of these across various units, all of which were recently provisioned in Azure: | ubuntu@machine-1:~$ sudo apt-get dist-upgrade | Reading package lists... Done | Building dependency tree | Reading state information... Done | Calculating upgrade... Done | 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. | 1 not fully installed or removed. | After this operation, 0 B of additional disk space will be used. | Do you want to continue? [Y/n] y | Setting up grub-efi-amd64-signed (1.142.8+2.04-1ubuntu26.6) ... | Installing grub to /boot/efi. | Installing for x86_64-efi platform. | grub-install: warning: Internal error. | grub-install: error: failed to register the EFI boot entry: Operation not permitted. It keeps trying to install on either /dev/sda15 or /dev/sdb15 (some units have attached volumes). | ubuntu@machine-1:~$ sudo parted -l | Model: Msft Virtual Disk (scsi) | Disk /dev/sda: 34.4GB | Sector size (logical/physical): 512B/512B | Partition Table: gpt | Disk Flags: | | Number Start End SizeFile system Name Flags | 14 1049kB 5243kB 4194kB bios_grub | 15 5243kB 116MB 111MB fat32 boot, esp | 1 116MB 34.4GB 34.2GB ext4 Focal. | Start-Date: 2020-10-26 16:02:51 | Upgrade: perl-base:amd64 (5.30.0-9build1, 5.30.0-9ubuntu0.2), bind9-dnsutils:amd64 (1:9.16.1-0ubuntu2.3, 1:9.16.1-0ubuntu2.4), grub-common:amd64 (2.04-1ubuntu26.4, 2.04-1ubuntu26.6), snapd:amd64 (2.46.1+20.04, 2.47.1+20.04), bind9-host:amd64 (1:9.16.1-0ubuntu2.3, 1:9.16.1-0ubuntu2.4), perl-modules-5.30:amd64 (5.30.0-9build1, 5.30.0-9ubuntu0.2), grub2-common:amd64 (2.04-1ubuntu26.4, 2.04-1ubuntu26.6), plymouth-theme-ubuntu-text:amd64 (0.9.4git20200323-0ubuntu6, 0.9.4git20200323-0ubuntu6.1), grub-pc:amd64 (2.04-1ubuntu26.4, 2.04-1ubuntu26.6), libplymouth5:amd64 (0.9.4git20200323-0ubuntu6, 0.9.4git20200323-0ubuntu6.1), libperl5.30:amd64 (5.30.0-9build1, 5.30.0-9ubuntu0.2), grub-pc-bin:amd64 (2.04-1ubuntu26.4, 2.04-1ubuntu26.6), grub-efi-amd64-bin:amd64 (2.04-1ubuntu26.4, 2.04-1ubuntu26.6), plymouth:amd64 (0.9.4git20200323-0ubuntu6, 0.9.4git20200323-0ubuntu6.1), grub-efi-amd64-signed:amd64 (1.142.6+2.04-1ubuntu26.4, 1.142.8+2.04-1ubuntu26.6), perl:amd64 (5.30.0-9build1, 5.30.0-9ubuntu0.2), accountsservice:amd64 (0.6.55-0ubuntu12~20.04.1, 0.6.55-0ubuntu12~20.04.2), bind9-libs:amd64 (1:9.16.1-0ubuntu2.3, 1:9.16.1-0ubuntu2.4), libaccountsservice0:amd64 (0.6.55-0ubuntu12~20.04.1, 0.6.55-0ubuntu12~20.04.2) | Error: Sub-process /usr/bin/dpkg returned an error code (1) | End-Date: 2020-10-26 16:03:54 With apt term.log - https://paste.ubuntu.com/p/5HnGZ43QzH/ ** Affects: grub2 (Ubuntu) Importance: Undecided Status: New ** Affects: grub2 (Ubuntu Focal) Importance: Undecided Status: New ** Also affects: grub2 (Ubuntu Focal) Importance: Undecided Status: New ** Description changed: Hi, Seeing a bunch of these across various units, all of which were recently provisioned in Azure: - | ubuntu@machine-1:~$ sudo apt-get dist-upgrade + | ubuntu@machine-1:~$ sudo apt-get dist-upgrade | Reading package lists... Done - | Building dependency tree + | Building dependency tree | Reading state information... Done | Calculating upgrade... Done | 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. | 1 not fully installed or removed. | After this operation, 0 B of additional disk space will be used. | Do you want to continue? [Y/n] y | Setting up grub-efi-amd64-signed (1.142.8+2.04-1ubuntu26.6) ... | Installing grub to /boot/efi. | Installing for x86_64-efi platform. | grub-install: warning: Internal error. | grub-install: error: failed to register the EFI boot entry: Operation not permitted. It keeps trying to install on either /dev/sda15 or /dev/sdb15 (some units have attached volumes). | ubuntu@machine-1:~$ sudo parted -l | Model: Msft Virtual Disk (scsi) | Disk /dev/sda: 34.4GB | Sector size (logical/physical): 512B/512B | Partition Table: gpt | Disk Flags: - | + | | Number Start End SizeFile system Name Flags | 14 1049kB 5243kB 4194kB bios_grub | 15 5243kB 116MB 111MB fat32 boot, esp | 1 116MB 34.4GB 34.2GB ext4 Focal. + + | Start-Date: 2020-10-26 16:02:51 + | Upgrade: perl-base:amd64 (5.30.0-9build1, 5.30.0-9ubuntu0.2), bind9-dnsutils:amd64 (1:9.16.1-0ubuntu2.3, 1:9.16.1-0ubuntu2.4), grub-common:amd64 (2.04-1ubuntu26.4, 2.04-1ubuntu26.6), snapd:amd64 (2.46.1+20.04, 2.47.1+20.04), bind9-host:amd64 (1:9.16.1-0ubuntu2.3, 1:9.16.1-0ubuntu2.4), perl-modules-5.30:amd64 (5.30.0-9build1, 5.30.0-9ubuntu0.2), grub2-common:amd64 (2.04-1ubuntu26.4, 2.04-1ubuntu26.6), plymouth-theme-ubuntu-text:amd64 (0.9.4git20200323-0ubuntu6, 0.9.4git20200323-0ubuntu6.1), grub-pc:amd64 (2.04-1ubuntu26.4, 2.04-1ubuntu26.6),
[Bug 1900438] Re: Bcache bypasse writeback on caching device with fragmentation
** Changed in: linux (Ubuntu) Status: Incomplete => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1900438 Title: Bcache bypasse writeback on caching device with fragmentation To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1900438/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1898786] Re: Issue with bcache bch_mca_scan causing huge IO wait
** Description changed: Hello, In short, we faced an issue with a huge IO wait on a bionic Ubuntu 4.15.0-118.119-generic kernel. - This is the full list of process and the kernel function they were stuck in [2]. + This is the full list of process and the kernel function they were stuck in [0]. - The main issue can probably be summarized by this perf reports + The main issue can probably be summarized by this perf reports * first identify that the cpu are stuck in idle because of something[1] * second, see what kernel function seems to stuck the process kswapd0 and kswapd1 [2]. We could see that this seems to be the mutex_lock in the bch_mca_scan function [3]. After running the command: - | sudo bash -c "echo 1 > /sys/fs/bcache/f1a1e8cb-3e6b-40ea-852e- + | sudo bash -c "echo 1 > /sys/fs/bcache/f1a1e8cb-3e6b-40ea-852e- 583c48d0c2b8/internal/btree_shrinker_disabled" The server started to respond normally and the IO wait dropped significantly [0]: https://pastebin.canonical.com/p/wYYKwHdRXk/ [1]: https://pastebin.canonical.com/p/n2Tw57QyBC/ [2]: https://pastebin.canonical.com/p/3QqFTfdHhX/ [3]: https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/bionic/tree/drivers/md/bcache/btree.c?h=Ubuntu-4.15.0-118.119#n674 $ cat /proc/version_signature Ubuntu 4.15.0-118.119-generic 4.15.18 ProblemType: Bug DistroRelease: Ubuntu 18.04 Package: linux-image-4.15.0-118-generic 4.15.0-118.119 ProcVersionSignature: User Name 4.15.0-118.119-generic 4.15.18 Uname: Linux 4.15.0-118-generic x86_64 AlsaDevices: - total 0 - crw-rw 1 root audio 116, 1 Sep 29 10:04 seq - crw-rw 1 root audio 116, 33 Sep 29 10:04 timer + total 0 + crw-rw 1 root audio 116, 1 Sep 29 10:04 seq + crw-rw 1 root audio 116, 33 Sep 29 10:04 timer AplayDevices: Error: [Errno 2] No such file or directory: 'aplay': 'aplay' ApportVersion: 2.20.9-0ubuntu7.16 Architecture: amd64 ArecordDevices: Error: [Errno 2] No such file or directory: 'arecord': 'arecord' AudioDevicesInUse: Error: command ['fuser', '-v', '/dev/snd/seq', '/dev/snd/timer'] failed with exit code 1: Date: Tue Oct 6 20:36:18 2020 IwConfig: Error: [Errno 2] No such file or directory: 'iwconfig': 'iwconfig' MachineType: HP ProLiant DL380 G7 PciMultimedia: - + ProcFB: 0 radeondrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-4.15.0-118-generic root=UUID=c6ad1629-a506-4043-a339-6d57f0708d12 ro console=ttyS1,115200 nosplash RelatedPackageVersions: - linux-restricted-modules-4.15.0-118-generic N/A - linux-backports-modules-4.15.0-118-generic N/A - linux-firmware 1.173.18 + linux-restricted-modules-4.15.0-118-generic N/A + linux-backports-modules-4.15.0-118-generic N/A + linux-firmware 1.173.18 RfKill: Error: [Errno 2] No such file or directory: 'rfkill': 'rfkill' SourcePackage: linux UpgradeStatus: Upgraded to bionic on 2019-09-27 (375 days ago) dmi.bios.date: 05/05/2011 dmi.bios.vendor: HP dmi.bios.version: P67 dmi.chassis.type: 23 dmi.chassis.vendor: HP dmi.modalias: dmi:bvnHP:bvrP67:bd05/05/2011:svnHP:pnProLiantDL380G7:pvr:cvnHP:ct23:cvr: dmi.product.family: ProLiant dmi.product.name: ProLiant DL380 G7 dmi.sys.vendor: HP -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1898786 Title: Issue with bcache bch_mca_scan causing huge IO wait To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1898786/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1836475] Re: update-notifier-common weekly cron job runs at the same time for all computers across the globe
This just happened with conntrack metrics below: | * 20200920-0647 | 629385 dst=91.189.95.15 | | * 20200920-0648 | 1444902 dst=91.189.95.15 | | * 20200920-0649 | 1044261 dst=91.189.95.15 With request logs showing a surge in this: | xxx.xxx.xxx.xxx - - [20/Sep/2020:06:46:34 +] "GET /meta-release-lts HTTP/1.1" 304 129 "-" "Python-urllib/3.5" -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1836475 Title: update-notifier-common weekly cron job runs at the same time for all computers across the globe To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubuntu-release-upgrader/+bug/1836475/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1836475] Re: update-notifier-common weekly cron job runs at the same time for all computers across the globe
We're still seeing regular request spikes to changelogs.ubuntu.com. Can we move release-upgrade-motd, the bit that downloads and checks for a new Ubuntu release to systemd timer units instead? /usr/lib/ubuntu-release-upgrader/release-upgrade-motd which calls /usr/lib/ubuntu-release-upgrader/check-new-release which uses MetaReleaseCore from UpdateManager.Core.MetaRelease ** Also affects: ubuntu-release-upgrader (Ubuntu) Importance: Undecided Status: New ** Changed in: ubuntu-release-upgrader (Ubuntu) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1836475 Title: update-notifier-common weekly cron job runs at the same time for all computers across the globe To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubuntu-release-upgrader/+bug/1836475/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1896341] [NEW] Spread out release-upgrade-motd over a period of time (changelogs.ubuntu.com)
*** This bug is a duplicate of bug 1836475 *** https://bugs.launchpad.net/bugs/1836475 Public bug reported: Hi, We see frequent request spikes to changelogs.ubuntu.com. It turns out it's related to the release-upgrade-motd being called from cron.weekly. Can we spread this out over a period of time? Perhaps changing it over to using systemd timers much like we do with apt update these days? ** Affects: ubuntu-release-upgrader (Ubuntu) Importance: Undecided Status: New ** This bug has been marked a duplicate of bug 1836475 update-notifier-common weekly cron job runs at the same time for all computers across the globe -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1896341 Title: Spread out release-upgrade-motd over a period of time (changelogs.ubuntu.com) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubuntu-release-upgrader/+bug/1896341/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1893716] Re: scripts in /etc/update-motd.d/ run even on login via non-interactive scp and sftp sessions
** Also affects: landscape-client (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1893716 Title: scripts in /etc/update-motd.d/ run even on login via non-interactive scp and sftp sessions To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1893716/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1893716] Re: scripts in /etc/update-motd.d/ run even on login via non-interactive scp and sftp sessions
** Also affects: base-files (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1893716 Title: scripts in /etc/update-motd.d/ run even on login via non-interactive scp and sftp sessions To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1893716/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1565744] Re: "Mutex file:${APACHE_LOCK_DIR} default" should be disabled by default on Linux because it leads to errors
Looks good to me, thanks: | https://paste.ubuntu.com/p/D3BfjqzR4t/ ** Tags removed: verification-needed verification-needed-xenial ** Tags added: verification-done verification-done-xenial -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1565744 Title: "Mutex file:${APACHE_LOCK_DIR} default" should be disabled by default on Linux because it leads to errors To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1565744/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1888058] Re: Got “Authentication failed” while running do-release-upgrade from 19.10 to 20.04 LTS with proxy configured
Good to hear it isn't something on our end. Thanks for the update. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1888058 Title: Got “Authentication failed” while running do-release-upgrade from 19.10 to 20.04 LTS with proxy configured To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubuntu-release-upgrader/+bug/1888058/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 245219] Re: Ubuntu archive server returning incorrect content-encoding - content-header incorrect type
** Changed in: apache2 (Debian) Importance: Unknown => Undecided ** Changed in: apache2 (Debian) Remote watch: Debian Bug tracker #565626 => None ** Changed in: apache2 (Debian) Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/245219 Title: Ubuntu archive server returning incorrect content-encoding - content- header incorrect type To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-archive-publishing/+bug/245219/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1541678] Re: if-post-down.d/vlan and if-pre-up.d/vlan should support predictable NIC names
** Changed in: vlan (Debian) Importance: Unknown => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1541678 Title: if-post-down.d/vlan and if-pre-up.d/vlan should support predictable NIC names To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/vlan/+bug/1541678/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1487190] Re: Not all interfaces display when >~30 interfaces
** Changed in: nicstat (Debian) Importance: Unknown => Low -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1487190 Title: Not all interfaces display when >~30 interfaces To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/nicstat/+bug/1487190/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 583994] Re: Consider replacing ntpdate calls by 'ntpd -g'
** Changed in: ntp (Debian) Importance: Unknown => Low -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/583994 Title: Consider replacing ntpdate calls by 'ntpd -g' To manage notifications about this bug go to: https://bugs.launchpad.net/ntp/+bug/583994/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 245219] Re: Ubuntu archive server returning incorrect content-encoding - content-header incorrect type
** Changed in: apache2 (Debian) Importance: Unknown => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/245219 Title: Ubuntu archive server returning incorrect content-encoding - content- header incorrect type To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-archive-publishing/+bug/245219/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 752583] Re: Name resolution does not work with IPv6 only name servers
** Changed in: mtr (Debian) Importance: Unknown => Medium ** Changed in: mtr (Ubuntu) Status: In Progress => Confirmed ** Changed in: mtr (Ubuntu) Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/752583 Title: Name resolution does not work with IPv6 only name servers To manage notifications about this bug go to: https://bugs.launchpad.net/mtr/+bug/752583/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1832182] Re: systemd unable to detect running apache if invoked via "apache2ctl graceful"
** Changed in: apache2 (Debian) Importance: Unknown => High -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1832182 Title: systemd unable to detect running apache if invoked via "apache2ctl graceful" To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1832182/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1222602] Re: [regression] [gen3] Mesa 9.2 makes Unity unusable on Atom class hardware and 943/945 graphics controllers
** Changed in: mesa Importance: Unknown => Undecided ** Changed in: mesa Remote watch: gitlab.freedesktop.org/mesa/mesa/issues #727 => None ** Changed in: mesa Status: New => Won't Fix -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1222602 Title: [regression] [gen3] Mesa 9.2 makes Unity unusable on Atom class hardware and 943/945 graphics controllers To manage notifications about this bug go to: https://bugs.launchpad.net/mesa/+bug/1222602/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 576434] Re: UserWarning: Unbuilt egg for setuptools [unknown version] (/usr/lib/python2.6/dist-packages)
** Changed in: distribute (Ubuntu) Status: Confirmed => Won't Fix ** Changed in: tahoe-lafs Importance: Unknown => Undecided ** Changed in: tahoe-lafs Remote watch: Tahoe-LAFS Trac #1235 => None ** Changed in: tahoe-lafs Status: New => Won't Fix -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/576434 Title: UserWarning: Unbuilt egg for setuptools [unknown version] (/usr/lib/python2.6/dist-packages) To manage notifications about this bug go to: https://bugs.launchpad.net/tahoe-lafs/+bug/576434/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1300215] Re: Failed to open VDPAU backend libvdpau_i965.so: cannot open shared object file: No such file or directory
** Changed in: libvdpau (Debian) Importance: Unknown => Undecided ** Changed in: libvdpau (Debian) Remote watch: Debian Bug tracker #617940 => None ** Changed in: libvdpau (Debian) Importance: Undecided => Medium ** Changed in: libvdpau (Debian) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1300215 Title: Failed to open VDPAU backend libvdpau_i965.so: cannot open shared object file: No such file or directory To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libvdpau/+bug/1300215/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 245219] Re: Ubuntu archive server returning incorrect content-encoding - content-header incorrect type
I'm not sure why this is a problem now as the old archive servers were doing the same thing. In any case, I've added the following to apache2 configs: | AddType application/pgp-signature .gpg Testing without: > GET > /ubuntu/dists/focal-updates/main/dist-upgrader-all/current/focal.tar.gz.gpg > HTTP/1.1 > Host: archive.ubuntu.com > ... < Last-Modified: Thu, 16 Jul 2020 08:58:10 GMT < ETag: "612-5aa8b3d596c80" < Accept-Ranges: bytes < Content-Length: 1554 < Content-Type: application/x-gzip Testing with: > GET > /ubuntu/dists/focal-updates/main/dist-upgrader-all/current/focal.tar.gz.gpg > HTTP/1.1 > Host: archive.ubuntu.com >... < Last-Modified: Thu, 16 Jul 2020 08:58:10 GMT < ETag: "612-5aa8b3d596c80" < Accept-Ranges: bytes < Content-Length: 1554 < Content-Type: application/pgp-signature -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/245219 Title: Ubuntu archive server returning incorrect content-encoding - content- header incorrect type To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-archive-publishing/+bug/245219/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1888058] Re: Got “Authentication failed” while running do-release-upgrade from 19.10 to 20.04 LTS with proxy configured
I'm not sure why this is a problem now as the old archive servers were doing the same thing. In any case, I've added the following to apache2 configs: | AddType application/pgp-signature .gpg Testing without: > GET > /ubuntu/dists/focal-updates/main/dist-upgrader-all/current/focal.tar.gz.gpg > HTTP/1.1 > Host: archive.ubuntu.com > ... < Last-Modified: Thu, 16 Jul 2020 08:58:10 GMT < ETag: "612-5aa8b3d596c80" < Accept-Ranges: bytes < Content-Length: 1554 < Content-Type: application/x-gzip Testing with: > GET > /ubuntu/dists/focal-updates/main/dist-upgrader-all/current/focal.tar.gz.gpg > HTTP/1.1 > Host: archive.ubuntu.com >... < Last-Modified: Thu, 16 Jul 2020 08:58:10 GMT < ETag: "612-5aa8b3d596c80" < Accept-Ranges: bytes < Content-Length: 1554 < Content-Type: application/pgp-signature -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1888058 Title: Got “Authentication failed” while running do-release-upgrade from 19.10 to 20.04 LTS with proxy configured To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubuntu-release-upgrader/+bug/1888058/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1565744] Re: "Mutex file:${APACHE_LOCK_DIR} default" should be disabled by default on Linux because it leads to errors
Installed packages from Bryce's PPA and confirmed no more '(35)Resource deadlock avoided: AH02026: Failed to acquire SSL session cache lock' logged. See https://pastebin.ubuntu.com/p/bFJ9C5hFCD/ -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1565744 Title: "Mutex file:${APACHE_LOCK_DIR} default" should be disabled by default on Linux because it leads to errors To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1565744/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1565744] Re: "Mutex file:${APACHE_LOCK_DIR} default" should be disabled by default on Linux because it leads to errors
Unfortunately, I'm not sure how best to reproduce this. I can tell you that we were seeing this on really busy units. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1565744 Title: "Mutex file:${APACHE_LOCK_DIR} default" should be disabled by default on Linux because it leads to errors To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1565744/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1565744] Re: "Mutex file:${APACHE_LOCK_DIR} default" should be disabled by default on Linux because it leads to errors
Can we get the following backported to Xenial (so 2.4.18-2ubuntu3.14)? | apache2 (2.4.20-1) unstable; urgency=medium | | * On Linux, use pthread mutexes. On kfreebsd/hurd, continue using fctnl | because they lack robust pthred mutexes. LP: #1565744, #1527044 Seeing it on a couple of Xenial hosts and the fix being to comment out the following line from /etc/apache2/apache2.conf: | Mutex file:${APACHE_LOCK_DIR} default ** Also affects: apache2 (Ubuntu Xenial) Importance: Undecided Status: New ** Changed in: apache2 (Ubuntu Xenial) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1565744 Title: "Mutex file:${APACHE_LOCK_DIR} default" should be disabled by default on Linux because it leads to errors To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1565744/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1875517] Re: check_http inefficient and sometimes times out
Eoan: | https://pastebin.ubuntu.com/p/gWFFFJdP2d/ ** Tags removed: verification-needed verification-needed-eoan ** Tags added: verification-done verification-done-eoan -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1875517 Title: check_http inefficient and sometimes times out To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/monitoring-plugins/+bug/1875517/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1875517] Re: check_http inefficient and sometimes times out
Tested with the packages from *-proposed. Looks good. Bionic: | https://pastebin.ubuntu.com/p/gkw5JWqtN7/ Focal: | https://pastebin.ubuntu.com/p/rJgmHhfJ6v/ ** Tags removed: verification-needed-bionic verification-needed-focal ** Tags added: verification-done-bionic verification-done-focal -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1875517 Title: check_http inefficient and sometimes times out To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/monitoring-plugins/+bug/1875517/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1875517] Re: check_http inefficient and sometimes times out
** Tags added: verification-done-focal -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1875517 Title: check_http inefficient and sometimes times out To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/monitoring-plugins/+bug/1875517/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1875517] Re: check_http inefficient and sometimes times out
** Tags added: verification-done-bionic -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1875517 Title: check_http inefficient and sometimes times out To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/monitoring-plugins/+bug/1875517/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1875517] Re: check_http inefficient and sometimes times out
I set something up for you to test: | /usr/lib/nagios/plugins/check_http -p 443 --ssl -H people.canonical.com -j GET -u '/~hloeung/tmp/lp1875517-test.txt' -r haproxy -t 60 Without the patch, it's ~25secs. With reduces that to under 1sec. This works for testing too (~2secs vs. ~0.1secs): | /usr/lib/nagios/plugins/check_http -H archive.ubuntu.com -j GET -u /ubuntu/ls-lR.gz -t 60 That's for a 20MBytes file. Could also pick a larger 150Mbytes file: | $ /usr/lib/nagios/plugins/check_http -H archive.ubuntu.com -j GET -u /ubuntu/pool/main/l/linux-hwe-5.0/linux-hwe-5.0_5.0.0.orig.tar.gz -t 600 | HTTP OK: HTTP/1.1 200 OK - 162594115 bytes in 0.499 second response time |time=0.498710s;;;0.00;600.00 size=162594115B;;;0 With the patch vs. the following without: | $ /usr/lib/nagios/plugins/check_http -H archive.ubuntu.com -j GET -u /ubuntu/pool/main/l/linux-hwe-5.0/linux-hwe-5.0_5.0.0.orig.tar.gz -t 600 | HTTP OK: HTTP/1.1 200 OK - 162594115 bytes in 108.216 second response time |time=108.215539s;;;0.00 size=162594115B;;;0 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1875517 Title: check_http inefficient and sometimes times out To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/monitoring-plugins/+bug/1875517/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
Re: [Bug 1875517] Re: check_http inefficient and sometimes times out
On Thu, Apr 30, 2020 at 03:01:28PM -, Rafael David Tinoco wrote: > I need some clarification here. You have applied a temporary mitigation > that improves check_http by not constantly freeing and allocating heap > memory. You have indicated upstream patches (2 of them) dealing with the > constant timeout for the checker. > > monitoring-plugins 2.2 version check_http SEEMs to be close to nagios- > plugins 1.5 version. Aren't the nagios-plugin packages deprecated in favor of monitoring-plugins? | $ apt-cache search nagios-plugins-basic | nagios-plugins-basic - transitional dummy package > The nagios-plugins you pointed out are backportable to release-2.2.0 of > NAGIOS-PLUGINS package and not monitoring-plugins. Have you tested those > ? Do you need nagios-plugins backport (of those 2 patches) to test and > see if it mitigates your issue ? I initially tried to apply the patches as is from upstream but it didn't apply cleanly requiring various other things (ssl/utils, utils, etc.). Ended up being way too large: | https://launchpadlibrarian.net/477251813/monitoring- plugins_2.2-3ubuntu2haw4_2.2-3ubuntu2haw5.diff.gz So took a step back and revisited the changes from upstream. The most important bit being this: | https://github.com/nagios-plugins/nagios- plugins/commit/2b38350d546ef9632ccd90e300eeaf6eda0ca32c#diff- 458353164a55a2e140dfc531b6ac2c38L1131-R1150 So took that, applied it, and built a package with the diff being much much smaller: | https://launchpadlibrarian.net/477257299/monitoring- plugins_2.2-3ubuntu2_2.2-3ubuntu2haw5.diff.gz The attached patch (9 lines) seems to be all that's required, has been tested and is what we're currently running with to resolve the socket timeout issues we have seen. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1875517 Title: check_http inefficient and sometimes times out To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/monitoring-plugins/+bug/1875517/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1876035] [NEW] Consider making '-o Acquire::Retries=3' the default for 'apt-get update/install/dist-upgrade'
Public bug reported: Hi, We operate archive.ubuntu.com as well as mirrors of it in various places. We're getting reports of various CI/CD jobs failing. Sometimes due to routing issues, issues with overloaded servers/VMs hosting archive, etc. Any chance we can make '-o Acquire::Retries=3' the default for 'apt-get update/install/dist-upgrade'? Preferably with a randomised skew between retries. Also, any chance of having apt-get retry with different IPs/hosts returned from the DNS lookup? (e.g. for archive.ubuntu.com - 91.189.88.142, 91.189.88.152, ...). Thanks. ** Affects: apt (Ubuntu) Importance: Undecided Status: New ** Summary changed: - Consider making '-o Acquire::Retries=3' the default + Consider making '-o Acquire::Retries=3' the default for 'apt-get update' ** Summary changed: - Consider making '-o Acquire::Retries=3' the default for 'apt-get update' + Consider making '-o Acquire::Retries=3' the default for 'apt-get update/install/dist-upgrade' ** Description changed: Hi, We operate archive.ubuntu.com as well as mirrors of it in various places. We're getting reports of various CI/CD jobs failing. Sometimes due to routing issues, issues with overloaded servers/VMs hosting archive, etc. Any chance we can make '-o Acquire::Retries=3' the default for 'apt-get - update'? Preferably with a randomised skew between retries. - + update/install/dist-upgrade'? Preferably with a randomised skew between + retries. Thanks. ** Description changed: Hi, We operate archive.ubuntu.com as well as mirrors of it in various places. We're getting reports of various CI/CD jobs failing. Sometimes due to routing issues, issues with overloaded servers/VMs hosting archive, etc. Any chance we can make '-o Acquire::Retries=3' the default for 'apt-get update/install/dist-upgrade'? Preferably with a randomised skew between retries. + Also, any chance of having apt-get retry with different IPs/hosts + returned from the DNS lookup? (e.g. for archive.ubuntu.com - + 91.189.88.142, 91.189.88.152, ...). + Thanks. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1876035 Title: Consider making '-o Acquire::Retries=3' the default for 'apt-get update/install/dist-upgrade' To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1876035/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1875517] Re: check_http inefficient and sometimes times out
** Also affects: monitoring-plugins (Ubuntu Focal) Importance: Undecided Status: New ** Also affects: monitoring-plugins (Ubuntu Groovy) Importance: Undecided Status: Confirmed ** Also affects: monitoring-plugins (Ubuntu Eoan) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1875517 Title: check_http inefficient and sometimes times out To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/monitoring-plugins/+bug/1875517/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1875517] Re: check_http inefficient and sometimes times out
** Also affects: monitoring-plugins (Ubuntu Bionic) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1875517 Title: check_http inefficient and sometimes times out To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/monitoring-plugins/+bug/1875517/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1875517] Re: check_http inefficient and sometimes times out
Tested in my PPA: | https://launchpad.net/~hloeung/+archive/ubuntu/nagios-nrpe/+packages With output: | $ time ./check_http -I 127.0.0.1 -p 9103 -u /metrics -r haproxy_rate -t 50 | HTTP OK: HTTP/1.0 200 OK - 13239810 bytes in 1.157 second response time |time=1.156696s;;;0.00;50.00 size=13239810B;;;0 | | real0m1.194s | user0m0.045s | sys 0m0.064s vs. | $ time /usr/lib/nagios/plugins/check_http -I 127.0.0.1 -p 9103 -u /metrics -r haproxy_rate -t 50 | HTTP OK: HTTP/1.0 200 OK - 13239139 bytes in 14.090 second response time |time=14.090071s;;;0.00;50.00 size=13239139B;;;0 | | real0m14.128s | user0m4.650s | sys 0m8.808s ** Patch added: "check_http_socket_timeouts.patch" https://bugs.launchpad.net/ubuntu/+source/monitoring-plugins/+bug/1875517/+attachment/5362235/+files/check_http_socket_timeouts.patch -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1875517 Title: check_http inefficient and sometimes times out To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/monitoring-plugins/+bug/1875517/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs