Hmm, I also found this line in my log (this time it booted OK):
Jul 12 18:41:47 redacted.example.org ntpdate[2184]: name server cannot
be used: Temporary failure in name resolution (-3)
I'm wondering whether it's either
a) failing to start ntp because ntpdate isn't running because it
couldn't re
*** This bug is a duplicate of bug 1575572 ***
https://bugs.launchpad.net/bugs/1575572
I'm also seeing this still fail with init-system-helpers 1.29ubuntu2,
also suggesting this is not a duplicate of #1575572.
It does not seem to fail reliably, but for what it's worth this was a
clean install
I can confirm that this can be fixed by carrying out the instructions
here: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=744304#32
(i.e. adding a small systemd file)
then:
systemctl enable bind9-resolvconf.service
then restarting bind9.
I don't think it should really be this opaque ...
-
This may explain it:
root@shed2:~# systemctl list-units --all | egrep 'bind9|resolv'
org.freedesktop.resolve1.busname
loadedinactive dead Network Name Resolution Service Bus
Name
systemd-networkd-resolvconf-update.path
Public bug reported:
Under 16.04, /etc/default/bind9 contains a RESOLVCONF option which
appears not to work with systemd.
Under 14.04, setting RESOLVCONF="yes" in /etc/default/bind9 caused bind9
to be installed as a local resolver. This is done by lines 65-68 of the
(16.04) /etc/init.d/bind9.
As
Public bug reported:
nbd-client 3.7 (shipped with 14.04) connects read-only to newer nbd
servers (3.9+, as well as gonbdserver and - probably - modern qemu).
The problem is described here:
https://www.mail-archive.com/nbd-general@lists.sourceforge.net/msg03878.html
In essence nbd-client pre 3
Bug 1337262 is lonely and unloved. By donating just five minutes of your
time, you can make a real difference to this bug's life, and kill it.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1337262
Tit
I know this isn't exactly urgent, but it is the world's simplest patch,
and is really quite useful if you are booting in an environment where
modules are on the boot disk.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.la
Thanks for everyone's work on this - much appreciated.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1366174
Title:
apache2 SEGV with multiple SSL sites
To manage notifications about this bug go to
http://people.canonical.com/~ubuntu-archive/pending-sru.html indicates
there is allegedly a regression in svn. Last build is here:
https://jenkins.qa.ubuntu.com/job/trusty-adt-
subversion/lastBuild/ARCH=amd64,label=adt/ and indeed the build log
shows a failure here: https://jenkins.qa.ubuntu.com/jo
Thanks. Verified that this works with the original test cases, and
marked verification-done.
** Tags removed: verification-needed
** Tags added: verification-done
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.
Thanks Robie.
If it helps, we have been running this patch on many tens of machines of
machines since early Nov 2014 (so approximately 4 months) without any
ill effects, with and without SSL (though we don't use stapling).
--
You received this bug notification because you are a member of Ubuntu
Any update on this one?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1366174
Title:
apache2 SEGV with multiple SSL sites
To manage notifications about this bug go to:
https://bugs.launchpad.net/ap
Robie: can I ping you once more re the backport to trusty?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1366174
Title:
apache2 SEGV with multiple SSL sites
To manage notifications about this bug g
Robie: I've verified that the Vivid version works fine. Can I ping you
re getting the SRU done for Trusty?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1366174
Title:
apache2 SEGV with multiple SSL
Made this public as the links to which it refers are public.
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1400775
Title:
CVE-20
Robie: no apology needed, and yes I would be happy to check Vivid.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1366174
Title:
apache2 SEGV with multiple SSL sites
To manage notifications about th
Robie: this is me poking you after a couple of weeks, as requested.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1366174
Title:
apache2 SEGV with multiple SSL sites
To manage notifications about t
I have added [Impact] and [Regression potential] sections.
Do the SRU requirements mean we need a patch for U too? I'm not sure
what "current development release" means right now given that U is out.
I believe the upstream 2.4.10 patch should apply straight to U. It's
upstream, so V will presumab
I have attached a backport to 2.4.7 to this comment. This is a backport
of the backport to 2.4.x in upstream svn. More details in the commit
message.
This is a straight patch to the source (produced from git) rather than a
proper packaged up patch, if you see what I mean.
I've put this up on gith
This has now been merged into 2.4. See
https://issues.apache.org/bugzilla/show_bug.cgi?id=54357
Any chance this can now be backported to Trusty? The impact is pretty
severe.
** Bug watch added: Apache Software Foundation Bugzilla #54357
http://issues.apache.org/bugzilla/show_bug.cgi?id=54357
The fix for this is now committed in trunk. A 2.4 backport is
available. See:
https://svn.apache.org/viewvc/httpd/httpd/branches/2.4.x/STATUS?r1=1631030&r2=1631029
Patch (per the above) at:
https://people.apache.org/~kbrand/mod_ssl-2.4.x-PR54357.diff
--
You received this bug notification beca
Yep, though I think that was what https://bugs.debian.org/cgi-
bin/bugreport.cgi?bug=752922 asked for.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/188
Title:
mod_ident no longer included in ap
Yes, we did talk on IRC :-)
As far as I can tell, utopic 2.4.10-1ubuntu1 does not build modident
(still). I suspect what might have been fixed in the debian bug my
report got merged into (https://bugs.debian.org/cgi-
bin/bugreport.cgi?bug=711925) is the constant removal of any module
called modide
I can confirm that the above workaround fixes 2.4.7, both my testcase
and our real world version. I attach a patch. This is probably 'better
than nothing'.
** Patch added: "Patch to avoid calling certinfo_free (ugly workaround)"
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1366174/+a
Robie: removing the reference to certinfo_free where
X509_get_ex_new_index is called within ssl_stapling_ex_init works around
the 2.4.10 bug at the expense of a memory leak. I haven't (yet) verified
this entirely fixes 2.4.7 though I suspect it will. I'll test that in a
bit.
Obviously this solutio
Turns out 2.4.10 also has the bug after all (it's just more difficult to
trigger). I think I have found the root cause. I've put details
upstream.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1366174
Robie: that attitude is quite understandable. I'm willing to do some work
bisecting it, but I fear the root problem is going to be that addressed this
commit:
http://svn.apache.org/viewvc?view=revision&revision=1573360
The ssl_pphrase_Handle routine is misleadingly named, and in fact is pretty
m
The number of sites required appears to vary. Also it appears to be
necessary to have mod php5 enabled.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1366174
Title:
apache2 SEGV with multiple SSL si
Actually "DBDriver pgsql" causes the issue, but not "DBDriver mysql",
and it can be outside the virtual host block. So I think this might be a
pgsql driver issue.
Reported upstream at:
https://issues.apache.org/bugzilla/show_bug.cgi?id=56919
** Bug watch added: Apache Software Foundation Bugzill
I think I've got about the minimal case for replication. Attached is a
tiny perl script which generates a number of SSL sites of the form:
ServerName 127.0.0.1:$port
SSLEngine on
SSLCertificateFile/etc/ssl/certs/ssl-cert-snakeoil.pem
SSLCertificateKeyFile /etc/ssl/private/ssl
Public bug reported:
Apache2 crashes with multiple SSL sites.
When starting apache2 with multiple SSL sites I get a SEGV like this:
(gdb) bt
#0 0x705faaf3 in ?? () from /usr/lib/apache2/modules/mod_ssl.so
#1 0x729647a6 in int_free_ex_data (class_index=,
obj=0x55af7460, ad=
Public bug reported:
libxen-4.4 has no corresponding debug package with debugging symbols in.
** Affects: xen (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launc
This gets worse.
You can't even use your own mod_ident, because whenever apache2 is
upgraded, it runs this:
OBSOLETE_CONFFILES="...
/etc/apache2/mods-available/ident.load
..."
...
if [ -n "$2" ] || obsolete_conffile_exists ; then
prepare_rm_conffile
Looks like there is a patch here:
http://pkgs.fedoraproject.org/cgit/qemu.git/tree/0001-Fix-migration-from-qemu-kvm.patch?h=f20
but it's either take it (and break inbound migrates from quantal etc.)
or don't (and break inbound migrates from precise). Another possibility
(unhelpful for libvirt po
This is pretty annoying. In a situation where you have many customer VMs
running on 12.04, and want to migrate them to a host running 14.04 (so
you can do a rolling OS upgrade), I'm afraid "shut down all your
customer VMs and restart" isn't really an option for obvious reasons.
Equally, installing
gah this got filed under apache2 even though I said affects kmod. -
apologies all
** Package changed: apache2 (Ubuntu) => kmod (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1337262
Title:
Public bug reported:
kmod should permit use of compressed modules. This enables images that
boot from RAM to be much smaller. In essence this requires only changing
a build option. Uncompressed modules are still supported.
A patch is here:
https://github.com/abligh/kmod/commit/31795c8078ba9ccb6f0
Public bug reported:
mountall / Upstart handles /dev mounting badly on trusty (14.04) when no
initrd is used. This is a regression from Precise (12.04).
This bug occurs when an Ubuntu image is produced using debootstrap and a
separate initrd is not used. More precisely, I am using debootstrap to
Reported to Debian:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=752922
** Bug watch added: Debian Bug tracker #752922
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=752922
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
ht
Arguably the real fix to this is to configure apache with --reallyall
(compile everything), then perhaps put the more esoteric modules in a
secondary package (libapache2-mod-extra or something).
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
If you prefer this as a separate module, this would appear to compile and load
as a module:
https://github.com/abligh/libapache-mod-ident
Direction on which you would prefer would be useful and I will get
testing.
--
You received this bug notification because you are a member of Ubuntu
Bugs,
The attached patch appear to result in it building, and being able to be
inserted as a module.
root@trustytest:/home/ubuntu/apache2/apache2-2.4.7# for i in ../*.deb ; do echo
$i ; dpkg -c $i | fgrep ident ; done
../apache2_2.4.7-1ubuntu4_amd64.deb
-rw-r--r-- root/root62 2014-06-23 20:00
Public bug reported:
Precise included mod_ident in apache2.2. Trusty does not include
mod_ident in apache2.4. There appears to be no other package containing
mod_ident.so. Therefore an upgrade between Precise (LTS) and Trusty
(LTS) will unfixably break anything using mod_ident.
This affects me su
That's a shame, but thanks for the info.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1275656
Title:
open-vm-dkms 2011.12.20-562307-0ubuntu1: open-vm-tools kernel module
failed to build
To manag
Further playing about suggests I need (somehow) vmware-hgfsclient, but
the package seems devoid of any documentation or manual pages.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1275656
Title:
ope
Hi,
I tried to test this and couldn't get it to work, though I may have done
something stupid.
I run precise, and upgraded to the lts-trusty kernel. I then removed
open-vm-tools (& friends), and inserted the custom built precise
package.
That all worked fine, but I still can't mount vmhgfs as I
This affects 14.04 too
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1068756
Title:
IPv6 Privacy Extensions enabled on Ubuntu Server by default
To manage notifications about this bug go to:
https:/
That doesn't work if (for instance) you have 2 machines on the same SDN
virtual LAN, which is a /64, and you want to prevent source spoofing
between them. For avoidance of doubt, we do use /64s.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
Neil: the metadata is just one example (though that's not happening).
The firewall rule thing applies irrespective of the metadata. The cloud
environment created requires only /128 addresses it knows about to be
accessible, and firewalls everything else out. Reasons for this include
prevention of
** Also affects: cloud-init (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1068756
Title:
IPv6 Privacy Extensions enabled on Ubuntu Server by defa
In my view this is NOT a software bug, its an OS bug.
Here's a completely different why this causes problems.
We use Ubuntu UEC images. There are no meaningful privacy considerations
here because we generate both the MAC address and the IP address of the
servers concerned. IE, if the machine is m
Any news on the fix being released for Lucid?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1295987
Title:
openjdk6 regression causes finalizers never to be called
To manage notifications about thi
Jamie: any news on this one?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1295987
Title:
openjdk6 regression causes finalizers never to be called
To manage notifications about this bug go to:
http
I can confirm the Precise packages passed our torture tests over the
weekend. These are good to go as far as I am concerned.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1295987
Title:
openjdk6 reg
48 hours of testing show no problems with these packages, whereas the
previously released packages show leaks. We will continue to run these
tests over the weekend, but it's looking good for us so far.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscri
Jamie: thanks. They look good to me (from inspection of the diffs). Will
get these checked tomorrow once they have built. Normally our tests take
a couple of days to run.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.lau
Will do once they have finished building. Is there a link to the diff in
the mean time so I can check it against the one we've been using?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1295987
Title:
Yes , the version I tested (with my patch, as attached to this bug) has
both of those fixed.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1295987
Title:
openjdk6 regression causes finalizers never
Jamie: we've verified that the patch I applied *appears* to fix the bug
we are seeing. I say *appears* as the bug manifesting itself seems to be
a function of uninitialized values on the stack; on some runs it
explodes with leaking stuff straight away, other times it runs fine for
many many hours,
The above patch has a second instance of the same issue fixed. Mailing list
thread from upstream here:
http://mail.openjdk.java.net/pipermail/jdk6-dev/2014-March/003253.html
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs
I'm currently running with the following patch (not entirely sure how
the packaging works and whether I've done this the right wy). Passes all
tests.
** Patch added: "Patch to ubuntu packaging"
https://bugs.launchpad.net/ubuntu/+source/openjdk-6/+bug/1295987/+attachment/4040464/+files/zero-jdk
Mailing list discussion:
http://comments.gmane.org/gmane.comp.java.openjdk.jdk6.devel/1114
cleaned up in openjdk7 amongst a much larger commit
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1295987
https://launchpad.net/ubuntu/+source/openjdk-6/+publishinghistory
confirms that this would have been introduced into Precise on 2014-02-27
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1295987
Title:
Public bug reported:
Upgrading openjdk6 from 6b27-1.12.6-1ubuntu0.12.04.4 to
6b30-1.13.1-1ubuntu2~0.12.04.1 (Precise update in Jan / Feb 2014) causes
finalizers not to run reliably. Whilst it is good practice to avoid use
of finalizers, JDBC uses them to close connections, sockets use them to
clos
Just as a note, the new kernels are not only needed on LTS for hardware
enablement (and I'm guessing relatively few people need hardware
enablement in a VMware guest), but also to run Docker, which I suspect
affects more people (me included).
--
You received this bug notification because you are
It's already set to 1:
amb@dbs-test:~/extility/superproject-3.0/extility-evr$ cat
/proc/sys/kernel/yama/ptrace_scope
1
but setting it to 0 seems to fix things:
amb@dbs-test:~$ mkdir -p foo2 ; FAKEROOT_TMPDIR=`pwd`/foo2 fakeroot-ng -l z
echo hello
hello
I have a feeling I might need to upgrad
Shachar, thanks, but I can't see any workaround in that bug.
I would have simply backported 0.18 to Precise and asked for an SRU,
except it needs at least g++ 4.7 (apparently), and even if I compile it
elsewhere, I'd need all the 4.7 g++ libraries I think. I can't see we're
going to get an SRU int
Public bug reported:
fakeroot-ng fails with 'Operation not permitted'.
To replicate:
amb@alex-test:~$ mkdir -p foo2 ; FAKEROOT_TMPDIR=`pwd`/foo2 fakeroot-ng -l z
echo hello
amb@alex-test:~$ cat z
Debugger started
Could not start trace of process 26862: Operation not permitted
Begin the process
Public bug reported:
I believe this was due to updat-grub hanging. strace showed it stuck
reading from stdin, so I killed it.
ProblemType: Package
DistroRelease: Ubuntu 12.04
Package: kexec-tools 1:2.0.2-3ubuntu4.1
ProcVersionSignature: Ubuntu 3.0.0-27.44~lucid1-server 3.0.45
Uname: Linux 3.0.0-2
Sorry, I've tried on Lucid and OS-X both of which are using 0.9.8 (k and
r respectively), i.e.
$ dpkg --list | fgrep libssl
ii libssl-dev0.9.8k-7ubuntu8.13
SSL development libraries, header files and documentati
ii libssl0.9.8
Public bug reported:
Upgrade of libssl1.0.0 Precise from version 1.0.1-4ubuntu5.5 to version
1.0.1-4ubuntu5.7 causes failure of negotiation by old clients.
I am running apache2 on servers with self-signed certs (I enclose one
such). Before upgrade, I can do a 'curl -k' (insecure) and connect
succ
Just to document an IRC conversation, another more obvious instance of
the problem is:
a) use OCFS2 with a shared heartbeat service on an iSCSI connected SAN - assume
this is not in the configuration file for iSCSI (not that it makes much
difference)
b) OCFS2 will access the raw block device wit
Actually one problem we are seeing should be pretty universal.
When using OCFS2, it will open the shared iSCSI device with O_DIRECT,
and write a heartbeat there. If this errors, then the node self fences
(i.e. reboots).
If the open-iscsi package is upgraded, it calls the init with a stop
method,
Ritesh,
We're actually seeing 2 problems:
1. on an upgrade to the open-iscsi module, between the stop and the
subsequent start, a daemon is calling iscsiadm and that is failing as
the module isn't loaded. Arguably this is our problem.
2. on a separate system, we have something which does somethi
Public bug reported:
open-iscsi's stop script has within it the following lines:
stop() {
stoptargets
log_daemon_msg "Stopping iSCSI initiator service"
start-stop-daemon --stop --quiet --signal KILL --exec $DAEMON
rm -f $PIDFILE /lib/init/rw/sendsigs.omit.d/`basena
Note that upgrades from Lucid to Precise can trigger this bug as the
directory permissions may preclude writing to /var/cache/bind - see bug
1086775
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/103819
** Description changed:
Affects: 1:9.7.0.dfsg.P1-1ubuntu0.8, 1:9.8.1.dfsg.P1-4ubuntu0.4, 1:9.8.4
.dfsg-1ubuntu1.
bind9.postinst only sets permissions on
/var/cache/bind on a fresh install. When the bind9 package is removed
but not purged, /var/cache/bind is removed, but /etc/bind is l
Note also modern xen comes with qemu-img included. This is from xen
upstream's 'make deb' option:
amb@DBS:~/xen/xen4.2/xen-4.2.0$ dpkg -c ./dist/xen-upstream-4.2.0.deb | fgrep
qemu-img
-rwxr-xr-x root/root 1462009 2012-10-24 15:05 ./usr/lib/xen/bin/qemu-img
-rwxr-xr-x root/root163448 2012-1
As a matter of interest, modern xen provides the qemu device model in
which case .qcow2 files are directly usable by Xen. Indeed we are using
the Ubuntu cloud images for exactly that. I am told that it works fine
under Xen 4.1 (but minus some of the fancy live snapshotting), and fine
under Xen 4.2
Robie,
No problem - I'm just glad I wasn't imagining it.
I agree the 100% CPU problem can't be reproduced on precise.
To be honest I don't quite understand why /var/cache/bind isn't in
/var/run (given it's a cache) but I may be wrong about that.
Alex
--
You received this bug notification beca
To follow this up, the .deb at least on Lucid does NOT have the write
permission set.
amb@nimrod-ubuntu:~/bind-test$ dpkg -c bind9_9.7.0.dfsg.P1-1ubuntu0.8_amd64.deb
| fgrep cache
drwxr-xr-x root/root 0 2012-10-09 14:13 ./var/cache/
drwxr-xr-x root/root 0 2012-10-09 14:13 ./var/ca
OK so my working hypothesis is this. On Lucid /var/cache/bind is created
simply by virtue of it being a directory within the package (see the
bind9.list file). The group write permission is added by the postinst.
If the Lucid package was installed, then removed, then installed again,
the following
Well I'm pretty sure the problem is this. I've just gone to another
(unconnected) Lucid box, and:
root@extility-developers:~# lsb_release -a
No LSB modules are available.
Distributor ID: Ubuntu
Description:Ubuntu 10.04.4 LTS
Release:10.04
Codename: lucid
root@extility-developers:
The server concerns was automatically installed from a CD-ROM built from
Ubuntu sources and (in respect of bind) it has only had automatic
updates run on it. I am very confident it was not operator error.
It was upgraded with 'do-release-upgrade'.
I can tell you I am not the only person experienc
** Description changed:
Summary: bind9 uses very high CPU after an upgrade from Lucid to
Precise. I have traced this to a directory permissions problem as
/var/cache/bind is not writeable by the bind group after an upgrade, but
is writeable after a clean install.
Ubuntu release:
roo
Public bug reported:
Summary: bind9 uses very high CPU after an upgrade from Lucid to
Precise. I have traced this to a directory permissions problem as
/var/cache/bind is not writeable by the bind group after an upgrade, but
is writeable after a clean install.
Ubuntu release:
root@dev1-kvm-cluste
Oops - my apologies for my launchpad newbiness. I misunderstood the
fact that the milestone entry said only "Ubuntu ubuntu-13.04-beta-1" to
mean no SRU on 12.04.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.n
Would an SRU for Precise be reasonable?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1062716
Title:
Regression in privileges of mysql debian-sys-maint user
To manage notifications about this bug g
Apologies - please use this patch
** Patch removed: "Fix configure & configure.ac to allow resizecons on x86_64"
https://bugs.launchpad.net/ubuntu/+source/kbd/+bug/789196/+attachment/3413354/+files/resizecons-x86_64.patch
** Patch added: "make resizecons work on x86_64"
https://bugs.launc
In Precise, the problem is that the configure file shipped is failing to
consider x86_64 a valid target as it does not match the shell glob
'i?86*'. The attached fixes it. Note that configure is meant to be built
from configure.ac etc., but it's far from clear whether this actually
happens at packa
Easier way of replicating:
dd if=/dev/zero of=- bs=1M count=5 | dd if=- of=myfile bs=1M
count=5
(two dd's to prevent dd optimisation of /dev/zero writes), whilst
running Ric's script (he's just about to upload a better version.
--
You received this bug notification because you are a mem
See also bug:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1064521
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1008400
Title:
Ubuntu server uses CFQ scheduler instead of deadline
To mana
This is related to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1008400
The outcome of bug 1008400 is (I think) 'this is fixed on Quantal by changing
the default IO scheduler to Deadline'. Two problems with that:
1. We see the same problem (but to a lesser extent) on the deadline sched
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1064521
Title:
Kernel I/O scheduling writes starving reads, local DoS
To manage no
apport information
** Attachment added: "WifiSyslog.txt"
https://bugs.launchpad.net/bugs/1064521/+attachment/3390394/+files/WifiSyslog.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1064521
Ti
apport information
** Attachment added: "UdevLog.txt"
https://bugs.launchpad.net/bugs/1064521/+attachment/3390393/+files/UdevLog.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1064521
Title:
apport information
** Attachment added: "UdevDb.txt"
https://bugs.launchpad.net/bugs/1064521/+attachment/3390392/+files/UdevDb.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1064521
Title:
Ke
apport information
** Attachment added: "ProcModules.txt"
https://bugs.launchpad.net/bugs/1064521/+attachment/3390391/+files/ProcModules.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1064521
apport information
** Attachment added: "ProcInterrupts.txt"
https://bugs.launchpad.net/bugs/1064521/+attachment/3390390/+files/ProcInterrupts.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/106
1 - 100 of 240 matches
Mail list logo