[Bug 1636847] Re: unexpectedly large memory usage of mounted snaps

2021-03-17 Thread SaveTheRbtz
Is it possible (pun intended) to compromise on
`CONFIG_SQUASHFS_DECOMP_MULTI` (which uses num_online_cpus) instead of
`CONFIG_SQUASHFS_DECOMP_MULTI_PERCPU` (which uses `num_possible_cpus`)?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1636847

Title:
  unexpectedly large memory usage of mounted snaps

To manage notifications about this bug go to:
https://bugs.launchpad.net/snappy/+bug/1636847/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1636847] Re: unexpectedly large memory usage of mounted snaps

2021-03-17 Thread SaveTheRbtz
The log message[1] says that this issues is under investigation:
> For the moment turn it off while it can be investigated.

Did we find the root cause?  Seems like Debian is successfully uses it nowadays:
```
tar -xOzf linux_5.10.19-1.debian.tar.xz ./debian/config/config | fgrep 
CONFIG_SQUASHFS_DECOMP_MULTI_PERCPU
CONFIG_SQUASHFS_DECOMP_MULTI_PERCPU=y
```

[1] https://lists.ubuntu.com/archives/kernel-
team/2016-October/080596.html

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1636847

Title:
  unexpectedly large memory usage of mounted snaps

To manage notifications about this bug go to:
https://bugs.launchpad.net/snappy/+bug/1636847/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1708604] Re: Backport recent bbr bugfixes to 4.10 kernel

2017-10-28 Thread SaveTheRbtz
Sadly, we've already workedaround that problem with a custom-built
module. Let me see if my colleagues can test the kernel.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1708604

Title:
  Backport recent bbr bugfixes to 4.10 kernel

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1708604/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1708604] Re: Backport recent bbr bugfixes to 4.10 kernel

2017-08-04 Thread SaveTheRbtz
** Description changed:

- 4.10 kernel is commonly used for test BBR Congestion Control
- deployments.
+ 4.10 kernel is commonly used to test BBR Congestion Control deployments.
  
- Recent 4.13 release had a bunch of fixes for the initial BBR release, namely:
+ Recent net-next pull in 4.13-rc1 had a bunch of fixes for the initial BBR 
release, namely:
  4aea287e90dd61a48268ff2994b56f9799441b62 tcp_bbr: cut pacing rate only if 
filled pipe
  f19fd62dafaf1ed6cf615dba655b82fa9df59074 tcp_bbr: introduce 
bbr_bw_to_pacing_rate() helper
  79135b89b8af304456bd67916b80116ddf03d7b6 tcp_bbr: introduce 
bbr_init_pacing_rate_from_rtt() helper
  1d3648eb5d1fe9ed3d095ed8fa19ad11ca4c8bc0 tcp_bbr: remove sk_pacing_rate=0 
transient during init
  32984565574da7ed3afa10647bb4020d7a9e6c93 tcp_bbr: init pacing rate on first 
RTT sample
  
  All of them marked as 'Fixes: 0f8782ea1497 ("tcp_bbr: add BBR congestion
  control")', which makes them legitimate bugfixes.
  
  All of them constrained to `net/ipv4/tcp_bbr.c` and should be trivial to
  cherrypick into 4.10.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1708604

Title:
  Backport recent bbr bugfixes to 4.10 kernel

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1708604/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1708604] Re: Backport recent bbr bugfixes to 4.10 kernel

2017-08-04 Thread SaveTheRbtz
** Changed in: linux (Ubuntu)
   Status: Incomplete => Opinion

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1708604

Title:
  Backport recent bbr bugfixes to 4.10 kernel

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1708604/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1708604] [NEW] Backport recent bbr bugfixes to 4.10 kernel

2017-08-04 Thread SaveTheRbtz
Public bug reported:

4.10 kernel is commonly used for test BBR Congestion Control
deployments.

Recent 4.13 release had a bunch of fixes for the initial BBR release, namely:
4aea287e90dd61a48268ff2994b56f9799441b62 tcp_bbr: cut pacing rate only if 
filled pipe
f19fd62dafaf1ed6cf615dba655b82fa9df59074 tcp_bbr: introduce 
bbr_bw_to_pacing_rate() helper
79135b89b8af304456bd67916b80116ddf03d7b6 tcp_bbr: introduce 
bbr_init_pacing_rate_from_rtt() helper
1d3648eb5d1fe9ed3d095ed8fa19ad11ca4c8bc0 tcp_bbr: remove sk_pacing_rate=0 
transient during init
32984565574da7ed3afa10647bb4020d7a9e6c93 tcp_bbr: init pacing rate on first RTT 
sample

All of them marked as 'Fixes: 0f8782ea1497 ("tcp_bbr: add BBR congestion
control")', which makes them legitimate bugfixes.

All of them constrained to `net/ipv4/tcp_bbr.c` and should be trivial to
cherrypick into 4.10.

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1708604

Title:
  Backport recent bbr bugfixes to 4.10 kernel

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1708604/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 811016] Re: Move to /run breaks pbuilder --execute

2012-08-29 Thread SaveTheRbtz
Backport to Lucid?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/811016

Title:
  Move to /run breaks pbuilder --execute

To manage notifications about this bug go to:
https://bugs.launchpad.net/pbuilder/+bug/811016/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


Re: [Bug 493156] Re: Please enable CONFIG_TASK_DELAY_ACCT

2012-05-04 Thread SaveTheRbtz
On Fri, May 4, 2012 at 5:20 AM, Balbir Singh  wrote:
> On Thu, May 3, 2012 at 11:59 PM, Christian Kujau
> <493...@bugs.launchpad.net> wrote:
>> Whooha, language!
>>
>> And I think they "fixed" it, albeit in a weird way:
>> CONFIG_TASK_DELAY_ACCT is enabled in the kernel config, but the feature
>> is still disabled unless the kernel is booted with "delayacct" as a boot
>> parameter, see my comment above.
>>
>
> I am not sure who made the decision and on what data, but
> TASK_DELAY_ACCT should be the least of the problems when it comes to
> overheads.
>
> The correct path IMHO is to show us the overhead and lets fix it if it
> is unacceptable
>
Decision was totally right. One should NOT change behavior of kernel
in the middle of LTS lifecycle (e.g. like it was done to
CONFIG_NET_NS). Of cause it seems kinda strange that CONFIG_SCHEDSTATS
is set to "y" and we are talking about CONFIG_TASK_DELAY_ACCT
overhead.

And yes, at least some numbers would be nice (esp. form Nicholas
Janssen (xnicholas) who says that there is no overhead on his
workload).

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/493156

Title:
  Please enable CONFIG_TASK_DELAY_ACCT

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/iotop/+bug/493156/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 804355] Re: jot random number generator broken in batch jobs

2012-03-16 Thread SaveTheRbtz
Oh... Previous patch by any means was not supposed to go to mainline. It
was just dirty-hacky-PoC.

Here is our QA version. Changes:
* Switched to dpkg-source 3.0 (quilt) format
* Added dbg package
* Removed auto-generated files
* Applied arc4random patch

PS. I'm .rpm guy so I could messed up something there.
PPS. Could it be also backported to Lucid?


** Patch added: "0001-rng-Use-arc4random-insted-of-time-based-random.patch"
   
https://bugs.launchpad.net/ubuntu/+source/athena-jot/+bug/804355/+attachment/2882511/+files/0001-rng-Use-arc4random-insted-of-time-based-random.patch

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/804355

Title:
  jot random number generator broken in batch jobs

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/athena-jot/+bug/804355/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 804355] Re: jot random number generator broken in batch jobs

2012-03-15 Thread SaveTheRbtz
Provided patch solving this issue.

** Patch added: "jot-9.0-random-number-geterator.patch"
   
https://bugs.launchpad.net/ubuntu/+source/athena-jot/+bug/804355/+attachment/2875909/+files/jot-9.0-random-number-geterator.patch

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/804355

Title:
  jot random number generator broken in batch jobs

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/athena-jot/+bug/804355/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 917643] Re: Adding IPv6 address to vlan in UNKNOWN state results in routes that expire within 30 days.

2012-01-17 Thread SaveTheRbtz
Tested on Ubuntu Oneiric's 3.0 - there is no such problem there.
I've also can test it on other backport kernels when i get to work.

** Tags removed: needs-upstream-testing

** Changed in: linux (Ubuntu)
   Status: Incomplete => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/917643

Title:
  Adding IPv6 address to vlan in UNKNOWN state results in routes that
  expire within 30 days.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/917643/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 917643] Re: Adding IPv6 address to vlan in UNKNOWN state results in routes that expire within 30 days.

2012-01-17 Thread SaveTheRbtz
** Summary changed:

- Adding address to vlan in UNKNOWN state results in routes that expire within 
30 days.
+ Adding IPv6 address to vlan in UNKNOWN state results in routes that expire 
within 30 days.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/917643

Title:
  Adding IPv6 address to vlan in UNKNOWN state results in routes that
  expire within 30 days.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/917643/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 917643] Re: Adding address to vlan in UNKNOWN state results in routes that expire within 30 days.

2012-01-17 Thread SaveTheRbtz
** Changed in: linux (Ubuntu)
   Status: Incomplete => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/917643

Title:
  Adding address to vlan in UNKNOWN state results in routes that expire
  within 30 days.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/917643/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 917643] [NEW] Adding address to vlan in UNKNOWN state results in routes that expire within 30 days.

2012-01-17 Thread SaveTheRbtz
Public bug reported:

We noticed that after adding IPv6 address to vlan route to local network
is added with expiration time. If after `ip link set vlanXXX up` up we
wait until vlan's link state becomes UP then route get added without
expiration time.

We are using Ubuntu LTS 10.04: Ubuntu 2.6.32-32.62-server
2.6.32.38+drm33.16.

To reproduce one can use following test script:
$ cat test.sh
ip addr del 2a02::1.1.1.1/64 dev vlan764 || :
vconfig rem vlan764 || :
vconfig set_name_type VLAN_PLUS_VID_NO_PAD
vconfig add eth0 764
ip link set vlan764 up
#sleep 5
ip addr add 2a02::1.1.1.1/64 dev vlan764
sleep 2
ip -6 route show

$ sudo ./test.sh
2a02::/64 dev vlan764  proto kernel  metric 256  expires 2591999sec mtu 8950 
advmss 8890 hoplimit 4294967295
fe80::/64 dev eth0  proto kernel  metric 256  mtu 8950 advmss 8890 hoplimit 
4294967295
fe80::/64 dev vlan764  proto kernel  metric 256  mtu 8950 advmss 8890 hoplimit 
4294967295
default via fe80::226:bff:fe29:c40 dev vlan764  proto kernel  metric 1024  
expires 1799sec mtu 8950 advmss 8890 hoplimit 64

Notice `expires 2591999sec` in `2a02::/64 dev vlan764 ` route
Now uncomment `#sleep 5`

$ sudo ./test.sh
2a02::/64 dev vlan764  proto kernel  metric 256  mtu 8950 advmss 8890 hoplimit 
4294967295
fe80::/64 dev eth0  proto kernel  metric 256  mtu 8950 advmss 8890 hoplimit 
4294967295
fe80::/64 dev vlan764  proto kernel  metric 256  mtu 8950 advmss 8890 hoplimit 
4294967295
default via fe80::226:bff:fe29:c40 dev vlan764  proto kernel  metric 1024  
expires 0sec mtu 8950 advmss 8890 hoplimit 64

Now `expire` is gone.

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: New

** Description changed:

- We noticed that after we add IPv6 address to vlan route to local network
- is added with expire date. If after `ip link set vlanXXX up` up we wait
- until vlan's link state becomes UP then route get added without
+ We noticed that after adding IPv6 address to vlan route to local network
+ is added with expiration time. If after `ip link set vlanXXX up` up we
+ wait until vlan's link state becomes UP then route get added without
  expiration time.
  
  We are using Ubuntu LTS 10.04: Ubuntu 2.6.32-32.62-server
  2.6.32.38+drm33.16.
  
  To reproduce one can use following test script:
  $ cat test.sh
  ip addr del 2a02::1.1.1.1/64 dev vlan764 || :
  vconfig rem vlan764 || :
  vconfig set_name_type VLAN_PLUS_VID_NO_PAD
  vconfig add eth0 764
  ip link set vlan764 up
  #sleep 5
  ip addr add 2a02::1.1.1.1/64 dev vlan764
  sleep 2
  ip -6 route show
  
- $ sudo ./test.sh 
+ $ sudo ./test.sh
  2a02::/64 dev vlan764  proto kernel  metric 256  expires 2591999sec mtu 8950 
advmss 8890 hoplimit 4294967295
  fe80::/64 dev eth0  proto kernel  metric 256  mtu 8950 advmss 8890 hoplimit 
4294967295
  fe80::/64 dev vlan764  proto kernel  metric 256  mtu 8950 advmss 8890 
hoplimit 4294967295
  default via fe80::226:bff:fe29:c40 dev vlan764  proto kernel  metric 1024  
expires 1799sec mtu 8950 advmss 8890 hoplimit 64
  
  Notice `expires 2591999sec` in `2a02::/64 dev vlan764 ` route
  Now uncomment `#sleep 5`
  
- $ sudo ./test.sh 
+ $ sudo ./test.sh
  2a02::/64 dev vlan764  proto kernel  metric 256  mtu 8950 advmss 8890 
hoplimit 4294967295
  fe80::/64 dev eth0  proto kernel  metric 256  mtu 8950 advmss 8890 hoplimit 
4294967295
  fe80::/64 dev vlan764  proto kernel  metric 256  mtu 8950 advmss 8890 
hoplimit 4294967295
  default via fe80::226:bff:fe29:c40 dev vlan764  proto kernel  metric 1024  
expires 0sec mtu 8950 advmss 8890 hoplimit 64
  
  Now `expire` is gone.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/917643

Title:
  Adding address to vlan in UNKNOWN state results in routes that expire
  within 30 days.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/917643/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 908981] Re: SRU: Bump KVM_MAX_VCPUS to 64

2011-12-27 Thread SaveTheRbtz
** Description changed:

  SRU Justification:
  There are lots of server boxes with more than 16 CPUs. Current KVM 
implementation can give up to 16 vCPUs to guest system. It would be nice if we 
could rise this limit.
  
  Upstream commit:
  
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=0680fe52753381cb7154beeb01ef3e48f2cdeec6
+ 
+ PS. Also backporting of fix should require original SRCU patchset from
+ 2.6.34 to be ported as well.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/908981

Title:
  SRU: Bump KVM_MAX_VCPUS to 64

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/908981/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 908981] Re: SRU: Bump KVM_MAX_VCPUS to 64

2011-12-27 Thread SaveTheRbtz
** Changed in: linux (Ubuntu)
   Status: Incomplete => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/908981

Title:
  SRU: Bump KVM_MAX_VCPUS to 64

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/908981/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 908981] [NEW] SRU: Bump KVM_MAX_VCPUS to 64

2011-12-27 Thread SaveTheRbtz
Public bug reported:

SRU Justification:
There are lots of server boxes with more than 16 CPUs. Current KVM 
implementation can give up to 16 vCPUs to guest system. It would be nice if we 
could rise this limit.

Upstream commit:
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=0680fe52753381cb7154beeb01ef3e48f2cdeec6

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/908981

Title:
  SRU: Bump KVM_MAX_VCPUS to 64

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/908981/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 908981] Re: SRU: Bump KVM_MAX_VCPUS to 64

2011-12-27 Thread SaveTheRbtz
** Attachment added: "0001-KVM-Bump-maximum-vcpu-count-to-64.patch"
   
https://bugs.launchpad.net/bugs/908981/+attachment/2648033/+files/0001-KVM-Bump-maximum-vcpu-count-to-64.patch

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/908981

Title:
  SRU: Bump KVM_MAX_VCPUS to 64

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/908981/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 705509] Re: /dev/kvm is owned by root:root after install on natty

2011-12-26 Thread SaveTheRbtz
Will it be ported to lucid?

** Also affects: qemu-kvm
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/705509

Title:
  /dev/kvm is owned by root:root after install on natty

To manage notifications about this bug go to:
https://bugs.launchpad.net/qemu-kvm/+bug/705509/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 790863] Re: Unable to start lxc container after update to 2.6.32-32

2011-12-08 Thread SaveTheRbtz
>> Where have all my testers gone? This patch isn't going in without some 
>> feedback.
Hmm.. Half a year... To Debian I guess

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/790863

Title:
  Unable to start lxc container after update to 2.6.32-32

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/790863/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 614322] Re: libvirt not recognizing NUMA architecture

2011-12-01 Thread SaveTheRbtz
Any progress after two weeks?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/614322

Title:
  libvirt not recognizing NUMA architecture

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libvirt/+bug/614322/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 582769] Re: /lib/security/pam_cap.so: undefined symbol: pam_get_item

2011-11-09 Thread SaveTheRbtz
I think it has even greater impact: pam module is not working so we
can't set per-user inheritable capabilities via
/etc/security/capability.conf in common-auth

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/582769

Title:
  /lib/security/pam_cap.so: undefined symbol: pam_get_item

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libcap2/+bug/582769/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 582769] Re: /lib/security/pam_cap.so: undefined symbol: pam_get_item

2011-11-08 Thread SaveTheRbtz
Is it going to be backported to LTS?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/582769

Title:
  /lib/security/pam_cap.so: undefined symbol: pam_get_item

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libcap2/+bug/582769/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 839630] Re: proc: make /proc/pid/limits world readable

2011-09-02 Thread SaveTheRbtz
** Changed in: linux (Ubuntu)
   Status: Incomplete => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/839630

Title:
  proc: make /proc/pid/limits world readable

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/839630/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 839630] [NEW] proc: make /proc/pid/limits world readable

2011-09-02 Thread SaveTheRbtz
Public bug reported:

Having the limits file world readable will ease the task of system
management on systems where root privileges might be restricted.

Having admin restricted with root priviledges, he/she could not check
other users process' limits.

Also it'd align with most of the /proc stat files.


Via 
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux.git;a=commit;h=3036e7b490bf7878c6dae952eec5fb87b1106589

Can this patch be applied to Ubuntu 10.04 LTS ?

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Incomplete

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/839630

Title:
  proc: make /proc/pid/limits world readable

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/839630/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 804355] [NEW] jot random number generator broken in batch jobs

2011-07-01 Thread SaveTheRbtz
Public bug reported:

jot -r generates same random numbers within one second time so it's
unusable in batch jobs like shell scripts.

There is code for initializing "random" seed:
s = (randomize ? time(0) : STEP_DEF);
/*... snip */
srand((int) s);

Here is an example of this behavior:
rbtz@rbtz-desktop:~$ date +%s; jot -r 1 0 1000
1309455778
9981995
rbtz@rbtz-desktop:~$ date +%s; jot -r 1 0 1000
1309455779
2355993
rbtz@rbtz-desktop:~$ date +%s; jot -r 1 0 1000
1309455779
2355993
rbtz@rbtz-desktop:~$ date +%s; jot -r 1 0 1000
1309455779
2355993
rbtz@rbtz-desktop:~$ date +%s; jot -r 1 0 1000
1309455780
3745306
rbtz@rbtz-desktop:~$ date +%s; jot -r 1 0 1000
1309455780
3745306

As fast fix pid can be added to seed
srandom((int) s ^ (getpid()<<4));

As good fix arc4random or similar mechanism can be used.

** Affects: athena-jot (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/804355

Title:
  jot random number generator broken in batch jobs

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/athena-jot/+bug/804355/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 796937] Re: Disable CONFIG_NET_NS (for #720095) breaks LXC

2011-06-28 Thread SaveTheRbtz
*** This bug is a duplicate of bug 790863 ***
https://bugs.launchpad.net/bugs/790863

** This bug has been marked a duplicate of bug 790863
   Unable to start lxc container after update to 2.6.32-32

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/796937

Title:
  Disable CONFIG_NET_NS (for #720095) breaks LXC

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/796937/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 796993] Re: Disable CONFIG_NET_NS (for #720095) breaks LXC

2011-06-28 Thread SaveTheRbtz
*** This bug is a duplicate of bug 790863 ***
https://bugs.launchpad.net/bugs/790863

** This bug is no longer a duplicate of bug 796937
   Disable CONFIG_NET_NS (for #720095) breaks LXC
** This bug has been marked a duplicate of bug 790863
   Unable to start lxc container after update to 2.6.32-32

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/796993

Title:
  Disable CONFIG_NET_NS (for #720095) breaks LXC

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/796993/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs