This also happens when an interface is only used for vlans and nothing
else.
I don't mind systemd-networkd-wait-online blocking the vlans that are
supposed to be on but it always block s when trying the trunk even if
it's up.
..
network:
version: 2
ethernets:
enp3s0: {}
vlans:
vlan
with 6.8-31 I was able to install 24.04 ubuntu-server-minimal with zfs
boot & root using the OpenZFS tutorial for 22.04 with minimal change.
Since there's no ZFS root install script in subiquity yet the OpenZFS
instructions are going to be the go-to for many people again.
https://github.com/openz
Was about to file a report for this.
Can confirm, tested in 16.04
http://pastebin.com/JzexVR0D
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1405232
Title:
ping reports wrong IP responding under ce
This is still an issue. LTS needs a backport. Some of us are in this
boat until 2017.
** Changed in: tinc (Ubuntu)
Status: Expired => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/
I have no idea which package contains the program to determine keyboard
layout during ubuntu-server install.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1358596
Title:
The new keyboard detection r
Public bug reported:
The routine that detects which keyboard is used by having the user press
certain keys during install does not work properly anymore for belgian
keyboards.
The previous version worked great. (the ones that had ?) as the first character
to be pressed .
This latest one ends
** Changed in: linux (Ubuntu)
Status: Invalid => Incomplete
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/986805
Title:
WARNING: at /build/buildd/linux-3.2.0/net/sched/sch_generic.c:255
dev
It still happened and both cases are related.
I don't see why this has to be closed.
Other people reported the same issue, they didn't have the same
hardware. There is no reason to close this because it happened on more
than one of my computers.
This bug not being hardware specific is a potentia
And this is where I fall flat on my ass.
3days ago when my nic gave out , I googled the error.
This part :
"/build/buildd/linux-3.2.0/net/sched/sch_generic.c:255
dev_watchdog+0x25a/0x270()"
To see if I found anything on what happened. I was somewhat surprised I
ended up at a bug report I filed
Well , it happened to me again today.
More than a year later but this time it didn't recover the nic gave out. To the
OS however on IP level everything was hunky doori. I was able to issue ping
commands over the interface , no replies of course.
anyway , here is the entry in the log. I had to r
Still "Upload pending" on debian. making an 2.3.2-4ubuntu2 with the fix
included would not be a bad idea at this point imo.
The version that would eventually trickle down from debian would be the same
anyway.
Regards.
--
You received this bug notification because you are a member of Ubuntu
Bu
The fix has a "upload pending" flag attached to it on debian.
It seems to have been accepted but is stuck in the queue.
Adding this comment to make sure it gets added to saucy before final
beta, and definitely upon release.
Friendly regards.
--
You received this bug notification because you are
Works like a charm .
Hoping it gets put in release.
Thank you for the speedy replies.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1200519
Title:
"service openvpn restart" broken. Stop returns be
@ simon
Also , about changing the number of sleep seconds in a restart, that would not
fix scripts that stop and start the openvpn service. If as a temporary measure
a delay is chosen the delay should be put somewhere in "stop" not in "restart"
Regards.
--
You received this bug notification
Simon, thank you for taking the time to comment.
I have just now tested this on another identical machine running 12.04. As you
said , the issue exists there as well. I must not have encountered it before
today.
Still , this caused a part of my network to do down this morning when
openvpn had re
** Description changed:
When restarting openvpn with "service openvpn restart" this occurs:
Jul 12 09:37:03 Muur2 ovpn-client[3831]: TCP/UDP: Socket bind failed on local
address [undef]: Address already in use
Jul 12 09:37:04 Muur2 ovpn-client[3743]: WARNING: Failed running command
(--
Edit:
This bug started with the move to openvpn 2.3.2-4ubuntu1 a few hours ago from
now.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1200519
Title:
"service openvpn restart" broken. Stop returns
Added Mr Stéphane Grabber to subscriber list since he seems to be
involved with most OpenVpn packages on ubuntu so far.
Regards.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1200519
Title:
"servic
Public bug reported:
When restarting openvpn with "service openvpn restart" this occurs:
Jul 12 09:37:03 Muur2 ovpn-client[3831]: TCP/UDP: Socket bind failed on local
address [undef]: Address already in use
Jul 12 09:37:04 Muur2 ovpn-client[3743]: WARNING: Failed running command
(--up/--down):
On 2013-02 Mr James Paige patched this so it would work for newer
kernels. It did worked up to 3.9.
(https://launchpad.net/ubuntu/+source/iscsitarget/1.4.20.2-5ubuntu3.2)
Added him to the notification list for this issue.
--
You received this bug notification because you are a member of Ubuntu
B
updated to 3.10.0-1
iscsitarget-dkms is still broken.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1195607
Title:
iscsitarget-dkms broken since kernel 3.10.0
To manage notifications about this bu
Someone please duplicate this already so it can be tagged bagged and fixed
asap.
This isn't one that can be left out there for too long.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1195607
Title:
Public bug reported:
!! URGENT !!
When trying to instal or reinstall the dkms on the current saucy kernel :
Error! Bad return status for module build on kernel: 3.10.0-0-generic (x86_64)
Consult /var/lib/dkms/iscsitarget/1.4.20.2/build/make.log for more information.
content of make.log
DKMS
There is hope... for 13.10
xtables-addons and with it geo-ip compatibility for iptables works in
saucy dev out of the box.
This does nothing for current stable , but still , it's worth a mention.
If the person who fixed it for saucy would be so kind as to fix it for
13.04 as well ...
--
You re
** Summary changed:
- xtables-addons issues are being systematically avoided . Bub reports fall on
deaf ears.
+ xtables-addons issues are being systematically avoided . Bug reports fall on
deaf ears.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscr
*** This bug is a security vulnerability ***
Public security bug reported:
This is not me reporting an issue I have with an install of something
wanting some help. Let's be clear about that first.
I am reporting a constant denial and covering up of an issue that is key
to a lot of server install
I tested kernel 3.2.0-24 , that's an update from 3.2.0-23 where it originally
happened , wasn't that the aim?
I read over the reply asking for me to test a later kernel too quickly .
reverted tags.
If I find time this week , and detailed install info , I'll clone it's
system drive and install an
** Tags removed: kernel-bug-exists-upstream
** Tags added: needs-upstream-testing
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/986805
Title:
WARNING: at /build/buildd/linux-3.2.0/net/sched/sch_gene
** Tags removed: needs-upstream-testing
** Tags added: kernel-bug-exists-upstream
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/986805
Title:
WARNING: at /build/buildd/linux-3.2.0/net/sched/sch_gene
updated to -24 error occured again :
Apr 27 16:09:47 Ambroise kernel: [ 123.714766] atl1c :01:00.0: atl1c: eth1
NIC Link is Down
Apr 27 16:09:50 Ambroise kernel: [ 126.778746] atl1c :01:00.0: atl1c: eth1
NIC Link is Up<1000 Mbps Full Duplex>
Apr 27 16:09:55 Ambroise kernel: [ 131.824
This time though , it happened 13 X in a little less than 3 hours .. It
used to be once every 24 hours approx.
http://pastebin.com/E0BW3AHz
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/986805
Title:
After running the apport command I also found this in my syslog:
Apr 22 13:46:45 Ambroise kernel: [ 8540.924011] atl1c :01:00.0: vpd r/w
failed. This is likely a firmware bug on this device. Contact the card vendor
for a firmware update.ACPI Warning: Incorrect checksum in table [GSCI] - 0
[quote]
please run:
apport-collect 986805
and then change the status of the bug to 'Confirmed'.
[/quote]
Ran command , changed status to confirmed.
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bu
apport information
** Attachment added: "WifiSyslog.txt"
https://bugs.launchpad.net/bugs/986805/+attachment/3098420/+files/WifiSyslog.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/986805
Titl
apport information
** Attachment added: "UdevLog.txt"
https://bugs.launchpad.net/bugs/986805/+attachment/3098419/+files/UdevLog.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/986805
Title:
at
apport information
** Attachment added: "UdevDb.txt"
https://bugs.launchpad.net/bugs/986805/+attachment/3098418/+files/UdevDb.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/986805
Title:
atl1
apport information
** Attachment added: "ProcModules.txt"
https://bugs.launchpad.net/bugs/986805/+attachment/3098417/+files/ProcModules.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/986805
Ti
apport information
** Attachment added: "ProcInterrupts.txt"
https://bugs.launchpad.net/bugs/986805/+attachment/3098416/+files/ProcInterrupts.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/9868
apport information
** Attachment added: "ProcCpuinfo.txt"
https://bugs.launchpad.net/bugs/986805/+attachment/3098414/+files/ProcCpuinfo.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/986805
Ti
apport information
** Attachment added: "Lspci.txt"
https://bugs.launchpad.net/bugs/986805/+attachment/3098413/+files/Lspci.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/986805
Title:
atl1c
apport information
** Attachment added: "CurrentDmesg.txt"
https://bugs.launchpad.net/bugs/986805/+attachment/3098412/+files/CurrentDmesg.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/986805
apport information
** Attachment added: "BootDmesg.txt"
https://bugs.launchpad.net/bugs/986805/+attachment/3098411/+files/BootDmesg.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/986805
Title:
apport information
** Tags added: apport-collected precise
** Description changed:
Since I upgraded ubuntu server , precise pangolin this morning to kernel
.23
Atheros integrated nic on asus P5G41TM_LX crashes , then seems to
recover afterwards.
syslog cut of crash :
http://
Public bug reported:
Since I upgraded ubuntu server , precise pangolin this morning to kernel
.23
Atheros integrated nic on asus P5G41TM_LX crashes , then seems to
recover afterwards.
syslog cut of crash :
http://pastebin.com/z20DrWN4
** Affects: linux (Ubuntu)
Importance: Undecided
Please change priority to high .
Please remove this whole asus cosmetic fix Aleksi Hankalahti mentioned
in his first and second link until the author can be sure it doesn't
break anything somewhat more important , like a filesystem.
--
You received this bug notification because you are a member
This , together with brightness control break ZFS for linux. P9 and P8
motherboards have ben confirmed to be affacted.
Please fix or revert.
Part of dump: (linked in mopdules -> ZFS)
Mar 31 00:41:33 Pollux kernel: [ 14.827281] input: Eee PC WMI hotkeys as
/devices/platform/eeepc-wmi/input/in
My motherboard however is an asus P9X79-Pro
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/969576
Title:
BUG: unable to handle kernel NULL pointer dereference at (null)
[asus_wmi_rfkill_init]
To m
For me this broke my ZFS , my zpools are gone , everything is ok again
when I start up with .20
Pastebin of trace , as not to clutter this thread.
http://pastebin.com/73d54Zpp
For me this is quite fatal , happens every boot.
--
You received this bug notification because you are a member of Ubu
Just stumbled into this on Precise.
Both client and server are precise. It always pops up on reboot then at
random during usage. No ill effects have been observed however.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.l
49 matches
Mail list logo