Public bug reported:
Please merge ifenslave-2.7 (main) from debian unstable (main)
** Affects: ifenslave (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.
Public bug reported:
Please merge ifenslave-2.7 (main) from debian unstable (main)
** Affects: ifenslave (Ubuntu)
Importance: Wishlist
Assignee: Louis Bouchard (louis-bouchard)
Status: In Progress
** Changed in: ifenslave (Ubuntu)
Status: New => In Progress
** Chan
** Changed in: linux (Ubuntu)
Importance: Undecided => High
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1475497
Title:
Unable to configure Firmware Assisted dump
To manage notifications about
The bug is caused by a regression between 1.5.7-5 and 1.5.8-1 some
commits got dropped.
The debian bug for that issue is https://bugs.debian.org/cgi-
bin/bugreport.cgi?bug=793485.
I will get this uploaded at the beginning of next week in Debian so it
get synchronized to Wily automatically.
** B
** Also affects: ifenslave-2.6 (Ubuntu Trusty)
Importance: Undecided
Status: New
** Changed in: ifenslave-2.6 (Ubuntu Trusty)
Status: New => Confirmed
** Changed in: ifenslave-2.6 (Ubuntu Trusty)
Importance: Undecided => Medium
--
You received this bug notification because y
Hello,
The Debian bug has been closed with 1:1.5.8-4, which has been
synchronized with Ubuntu Wily. Can you please test that the latest
version do fix this issue ?
I will add the well known 'verification-needed' tag to the bug that you
can change once verified.
** Tags added: sts verification-d
The fixed ifenslave-2.7 is now in Wily. Marking it fixed released. Next
step is to SRU to Trusty
** Changed in: ifenslave-2.6 (Ubuntu)
Status: In Progress => Fix Released
** Changed in: ifenslave-2.6 (Ubuntu)
Assignee: Louis Bouchard (louis-bouchard) => (unassigned)
--
You re
** Changed in: ifenslave-2.6 (Ubuntu)
Status: Triaged => In Progress
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1326854
Title:
ambiguous error message "sh: echo: I/O error"
To manage noti
As it turns out, this highlights a bug in the ifenslave script.
Starting with kernel 3.13 (commit
http://git.kernel.org/cgit/linux/kernel/git/stable/linux-
stable.git/commit/?id=5831d66e8097aedfa3bc35941cf265ada2352317),
/sys/class/net/{bond}/slave_{ifname} (notice the slave_) no longer
exist.
I
For info, the ambiguous message only appears when using ifenslave on a
bond that is already configured :
# ifconfig eth1 up
# ifconfig eth2 up
# ifconfig bond0 up
# ifenslave bond0 eth1 eth2 No error on the first execution
# ifenslave bond0 eth1 eth2
sh: echo: I/O error
eth1: could not add
I have just opened a bug on the debian ifenslave package :
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=791906 with a proposed
patch that seems to fix the issue.
Will wait to see if the maintainer responds.
** Bug watch added: Debian Bug tracker #791906
http://bugs.debian.org/cgi-bin/bugre
The cited patch that fixes the issue is a kernel patch on kexec. This
does not apply to makedumpfile.
** Package changed: makedumpfile (Ubuntu) => linux (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.n
not a kernel patch after all but a kexec-tools one
** Package changed: linux (Ubuntu) => kexec-tools (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1461078
Title:
kdump service fails to sta
** Summary changed:
- kdump service fails to start
+ kdump service fails to start on Power8
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1461078
Title:
kdump service fails to start on Power8
To m
ools (Ubuntu)
Importance: Undecided => High
** Changed in: kexec-tools (Ubuntu Trusty)
Importance: Undecided => High
** Changed in: kexec-tools (Ubuntu Trusty)
Assignee: (unassigned) => Louis Bouchard (louis-bouchard)
** Patch added:
"kexec-tools-trusty-Use-slurp_file_len-t
** Also affects: nova (Ubuntu Utopic)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1459046
Title:
[SRU] nova-* services do not start if rsyslog is not ye
** Also affects: ceilometer (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: ceilometer (Ubuntu Utopic)
Importance: Undecided
Status: New
** Also affects: ceilometer (Ubuntu Vivid)
Importance: Undecided
Status: New
** Also affects: ceilometer (Ubun
Quick update : the fix is now in Debian ifenslave-2.7 . It needs to be
merged in Wily so we can backport the fix to trusty.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1326854
Title:
ambiguous err
** Also affects: nova (Ubuntu)
Importance: Undecided
Status: New
** Also affects: nova (Ubuntu Trusty)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bu
Public bug reported:
SRU justification :
Duplicity implements a new lockfile that impacts deja-dup functionality.
A fix to remove the lockfile is already commited upstream and in Trusty.
The SRU is to make the fix available before duplicity's SRU is completed
Impact :
Without this SRU, duplicit
Bug created to SRU trusty's fix to Precise & Saucy
https://bugs.launchpad.net/ubuntu/+source/deja-dup/+bug/1281066
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1266763
Title:
Race condition betwee
ded => Medium
** Changed in: deja-dup (Ubuntu Precise)
Assignee: (unassigned) => Louis Bouchard (louis-bouchard)
** Changed in: deja-dup (Ubuntu Saucy)
Status: New => In Progress
** Changed in: deja-dup (Ubuntu Saucy)
Importance: Undecided => Medium
** Changed in: deja-dup (Ub
** Patch added: "lp1281066-kill-lockfile-saucy.debdiff"
https://bugs.launchpad.net/ubuntu/+source/deja-dup/+bug/1281066/+attachment/3985344/+files/lp1281066-kill-lockfile-saucy.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu
debdiff for precise
** Patch added: "lp1281066-kill-lockfile-precise.debdiff"
https://bugs.launchpad.net/ubuntu/+source/deja-dup/+bug/1281066/+attachment/3985343/+files/lp1281066-kill-lockfile-precise.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, whic
To potential sponsor:
I am preparing a slight modification (add Breaks: statement). debdiff
should be there shortly
** Patch removed: "lp1266763_s3_locking_trusty.debdiff"
https://bugs.launchpad.net/duplicity/+bug/1266763/+attachment/3955924/+files/lp1266763_s3_locking_trusty.debdiff
** Patc
Same version of the patch with a "Breaks: "statement in the control file
to signal dependancy with deja-dup
** Patch added: "lp1266763_s3_locking_trusty_with_breaks.debdiff"
https://bugs.launchpad.net/duplicity/+bug/1266763/+attachment/3986714/+files/lp1266763_s3_locking_trusty_with_breaks.deb
Equivalent debdiff with Breaks: statement added
** Patch added: "lp1266763_s3_locking_gpg_precise_with_breaks.debdiff"
https://bugs.launchpad.net/duplicity/+bug/1266763/+attachment/3988012/+files/lp1266763_s3_locking_gpg_precise_with_breaks.debdiff
--
You received this bug notification becau
Equivalent debdiff with Breaks: statement added
** Changed in: duplicity (Ubuntu Quantal)
Status: In Progress => Won't Fix
** Changed in: duplicity (Ubuntu Raring)
Status: In Progress => Won't Fix
** Changed in: duplicity (Ubuntu Quantal)
Assignee: Louis
Opened upstream bug on the matter :
https://www.cups.org/str.php?L4561+P-1+S-2+C0+I0+E0+Q4561
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1352809
Title:
/usr/bin/lp on Trusty using -h option doesn
Hello,
I have proposed a patch upstream and am waiting for their answer. I will
let you know as soon as I hear from them.
** Changed in: cups (Ubuntu)
Status: Confirmed => In Progress
** Also affects: cups (Ubuntu Utopic)
Importance: Undecided
Status: New
** Also affects: cups
Public bug reported:
In some specific context that I currently cannot identify (i.e. happens
everytime on my server but never in VMs), after a reboot, squid-deb-
proxy fails to resolve DNS entries for URL that it needs to service. The
problem seems systematic on the hardware that I have.
Release
Using the same "start on " clause than for the squid3 job fixes the
problem (start on runlevel ...) :
# squid-deb-proxy - a proxy for deb packages
#
description "squid-deb-proxy"
start on runlevel [2345]
stop on runlevel [!2345]
I am going to prepare a debdiff with that modification
--
debdiff for Trusty
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1456662
Title:
squid-deb-proxy fails to resolve dns entry : needs to be restarted
To manage notifications about this bug go to:
http
Status: Invalid
** Affects: makedumpfile (Ubuntu Trusty)
Importance: Medium
Assignee: Louis Bouchard (louis-bouchard)
Status: Confirmed
** Changed in: makedumpfile (Ubuntu)
Status: New => Confirmed
** Changed in: makedumpfile (Ubuntu)
Importance: Undeci
Fixed in Utopic and onward. Needs a fix for trusty though
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1441042
Title:
makedumpfile fails with segfault
To manage notifications about this bug go to:
** Description changed:
- System: Ubuntu 14.04 LTS
- Kernel: 3.16.0-31.43
- kexec-tools: 2.0.7-1ubuntu2 (amd64)
- makedumpfile: 1.5.5-2ubuntu1.1
+ [SRU justification]
+ Makedumpfile execution fails with segmentation fault when used on systems
using UEFI
+
+ [Impact]
+ Impossible to capture k
** Also affects: autofs (Ubuntu Utopic)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1386869
Title:
-host in auto.master not mounting nfs exports
To man
The backport bug is now "Fix Released". Marking this one "Fix Released"
too
** Changed in: openafs (Ubuntu)
Status: Triaged => Fix Released
** Changed in: openafs (Ubuntu)
Assignee: Louis Bouchard (louis-bouchard) => (unassigned)
--
You received this bu
** Changed in: pywbem (Ubuntu)
Status: Confirmed => In Progress
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1434991
Title:
python attributeError 'SSLTimeoutError' after upgrade
To manage n
I have submitted a fix to debian. Waiting to hear from the maintainer
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1434991
Title:
python attributeError 'SSLTimeoutError' after upgrade
To manage no
t of convincing (unless it's something
ultra-basic and generic :-)
** Changed in: sosreport (Ubuntu)
Status: Confirmed => Triaged
** Changed in: sosreport (Ubuntu)
Assignee: (unassigned) => Louis Bouchard (louis-bouchard)
--
You received this bug notification bec
signed) => Louis Bouchard (louis-bouchard)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1423151
Title:
openafs-modules-dkms 1.6.7-1: openafs kernel module failed to build
To manage notifications a
Marking the development release as Invalid since the vivid version
(1.6.10-4) has the fix. Only trusty and utopic is concerned by that
issue.
Taking care of Trusty for the time being
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
ht
Thanks for the tests. I'm just doing a last test at the second part of
the provided patch and will take care of the SRU. I'll keep you posted
here.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/14231
** Tags added: cts
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1423151
Title:
openafs-modules-dkms 1.6.7-1: openafs kernel module failed to build
To manage notifications about this bug go to:
htt
** Changed in: openafs (Ubuntu Trusty)
Status: Triaged => In Progress
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1423151
Title:
openafs-modules-dkms 1.6.7-1: openafs kernel module failed t
Sorry Achim, I was wrong, the attribution is to Sergio who authored the
patch. My bad
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1423151
Title:
openafs-modules-dkms 1.6.7-1: openafs kernel module
debdiff for trusty
** Description changed:
+ [SRU justification]
+ The openafs-modules-dkms package fails to build its modules following kernel
upgrade
+
+ [Impact]
+ No longer possible to use openafs kernel module
+
+ [Fix]
+ Backport the dentry changes into the current package.
+
+ [Test Ca
Achim, I adapted your patch into one single quilt patch with added DEP3
information. I also changed the changelog to include bug attribution to
you.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/142315
Hi Xing,
Thanks for the verification. I have now marked the bug as "verification-
done". The SRU should homefully complete shortly
** Tags removed: verification-needed
** Tags added: verification-done
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subsc
I just tested the package in -propose and it builds correctly. It would
be more useful if someone with a real openafs infrastructure could test
it & change the tag to "verification-done". Otherwise, I will change it
myself by the end of the week.
--
You received this bug notification because you
Thanks Christoph, I missed your update before posting :-)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1423151
Title:
openafs-modules-dkms 1.6.7-1: openafs kernel module failed to build
To manage
signed) => Louis Bouchard (louis-bouchard)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1423151
Title:
openafs-modules-dkms 1.6.7-1: openafs kernel module failed to build
To manage notificati
*** This bug is a duplicate of bug 1423151 ***
https://bugs.launchpad.net/bugs/1423151
I'll mark this bug as duplicate of lp bug #1423151 and work the Utopic
SRU over there.
** This bug has been marked a duplicate of bug 1423151
openafs-modules-dkms 1.6.7-1: openafs kernel module failed to
** Changed in: openafs (Ubuntu Utopic)
Status: Confirmed => In Progress
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1423151
Title:
openafs-modules-dkms 1.6.7-1: openafs kernel module failed
debdiff for Utopic
** Patch added: "lp1423151_fix_dmks_build_utopic.debdiff"
https://bugs.launchpad.net/ubuntu/+source/openafs/+bug/1423151/+attachment/4344169/+files/lp1423151_fix_dmks_build_utopic.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which
** Changed in: bcmwl (Ubuntu)
Status: Incomplete => In Progress
** Changed in: bcmwl (Ubuntu)
Assignee: (unassigned) => Louis Bouchard (louis-bouchard)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
As outlined by bryn (bmr), the functionality was historically part of
sosreport and got deprecated because of many implementation issues.
I do think that carrying an Ubuntu specific patch to enable that is not
viable.
This is very much Vendor specific so I would encourage a vendor specific
soluti
Public bug reported:
not iptable information is collected
** Affects: sosreport (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1435562
Title:
** Tags removed: cts
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1327412
Title:
Delay during PXE Boot, IP-Config gives up
To manage notifications about this bug go to:
https://bugs.launchpad.net/
** Changed in: openafs (Ubuntu)
Status: New => Triaged
** Changed in: openafs (Ubuntu)
Importance: Undecided => Medium
** Changed in: openafs (Ubuntu)
Assignee: (unassigned) => Louis Bouchard (louis-bouchard)
--
You received this bug notification because you are a
** Also affects: ubuntu
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1378095
Title:
aa-complain traceback when marking multiple profiles
To manage notif
** Package changed: ubuntu => apparmor (Ubuntu)
** Also affects: apparmor (Ubuntu Trusty)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1378095
Title:
aa
ok, will do
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1434991
Title:
python attributeError 'SSLTimeoutError' after upgrade
To manage notifications about this bug go to:
https://bugs.launchpad.n
(Ubuntu Trusty)
Status: New => Confirmed
** Changed in: pywbem (Ubuntu Utopic)
Status: New => Confirmed
** Changed in: pywbem (Ubuntu Trusty)
Assignee: (unassigned) => Louis Bouchard (louis-bouchard)
** Changed in: pywbem (Ubuntu Utopic)
Assignee: (unassigned)
After looking thoroughly at the upstream code for m2crypto, it looks
like this SSLTimeoutError exception never existed. I have pinged the
upstream maintainer of M2Crypto go get confirmation.
Then I will get it fixed for all releases & will request a fix for
debian as well.
** Changed in: pywbem (
** Also affects: pywbem (Ubuntu Vivid)
Importance: Medium
Assignee: Louis Bouchard (louis-bouchard)
Status: In Progress
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1434991
Title
** Changed in: sosreport (Ubuntu)
Status: In Progress => Fix Released
** Changed in: sosreport (Ubuntu)
Assignee: Louis Bouchard (louis-bouchard) => (unassigned)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Changed in: kexec-tools (Ubuntu)
Assignee: Louis Bouchard (louis-bouchard) => (unassigned)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1324125
Title:
Unable to trigger a kernel crash d
d8bf78 R14: 0003 R15: 7f68f8744a10
ORIG_RAX: ...
** Affects: linux (Ubuntu)
Importance: High
Assignee: Louis Bouchard (louis-bouchard)
Status: Triaged
** Changed in: linux (Ubuntu)
Status: New => Triaged
** Changed in: linux (Ubuntu)
Assignee
** Changed in: linux (Ubuntu Precise)
Status: New => Triaged
** Changed in: linux (Ubuntu Precise)
Assignee: (unassigned) => Louis Bouchard (louis-bouchard)
** Changed in: linux (Ubuntu Precise)
Importance: Undecided => High
--
You received this bug notification becaus
Here is an analysis of the kernel core dump captured for this issue :
crash> sys
KERNEL: vmlinux-3.2.0-38-generic
DUMPFILE: VmCore
CPUS: 24
DATE: Wed Sep 18 22:34:35 2013
UPTIME: 1 days, 11:33:14
LOAD AVERAGE: 2.04, 2.09, 2.16
TASKS: 6656
NODENAME: ddb-m
@david & Vin:
I have just checked and the updated package with the fix is indeed in
the -updates archive :
# apt-cache policy dante-server
dante-server:
Installed: 1.1.19.dfsg-3ubuntu6.12.04.1
Candidate: 1.1.19.dfsg-3ubuntu6.12.04.1
Version table:
*** 1.1.19.dfsg-3ubuntu6.12.04.1 0
After a few back and forth between me and the Debian maintainer, we
agreed that fixing stud itself was the proper way to deal with this.
I have proposed a patch to stud that handles termination of the children
processes when TERM is sent to the parent. I am waiting to hear from
Debian upstream.
*
** Changed in: linux (Ubuntu Precise)
Status: Triaged => In Progress
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1233175
Title:
Kernel panic : mempolicy potential use-after-free on server r
Updated precise debdiff with typo fixed
** Patch removed: "lp1216921_ignoremissing_precise.debdiff"
https://bugs.launchpad.net/ubuntu/+source/duplicity/+bug/1216921/+attachment/3838074/+files/lp1216921_ignoremissing_precise.debdiff
** Patch removed: "lp1216921_ignoremissing_quantal.debdiff"
Updated quantal debdiff with typo fixed
** Patch added: "lp1216921_ignoremissing_quantal.debdiff"
https://bugs.launchpad.net/ubuntu/+source/duplicity/+bug/1216921/+attachment/3891187/+files/lp1216921_ignoremissing_quantal.debdiff
--
You received this bug notification because you are a member
Updated raring debdiff with typo fixed
** Patch added: "lp1216921_ignoremissing_raring.debdiff"
https://bugs.launchpad.net/ubuntu/+source/duplicity/+bug/1216921/+attachment/3891188/+files/lp1216921_ignoremissing_raring.debdiff
--
You received this bug notification because you are a member of
** Project changed: duplicity => duplicity (Ubuntu)
** Changed in: duplicity (Ubuntu)
Importance: Undecided => High
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1216921
Title:
util.ignore_missi
> Triaged
** Also affects: duplicity
Importance: Undecided
Status: New
** Changed in: duplicity
Status: New => Confirmed
** Changed in: duplicity (Ubuntu)
Status: In Progress => Triaged
** Changed in: duplicity (Ubuntu Precise)
Assignee: (unassigned) =>
** Changed in: duplicity (Ubuntu)
Status: Triaged => In Progress
** Changed in: duplicity (Ubuntu)
Assignee: Louis Bouchard (louis-bouchard) => Michael Terry (mterry)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
@mathias:
I have run over 75 iteration of a full backup to FTP target without any
kind of python issue.
Is there some more specific steps to be used in order to reproduce the
issue ? If so, please share it with me so I can use it for the SRU
--
You received this bug notification because you are
** Changed in: duplicity (Ubuntu Precise)
Status: Triaged => In Progress
** Changed in: duplicity (Ubuntu Quantal)
Status: Triaged => In Progress
** Changed in: duplicity (Ubuntu Raring)
Status: Triaged => In Progress
--
You received this bug notification because you are a
btw, this bug will need to be re-targetted to kexec-tools; the
crashkernel= definition has been moved to kexec-tools recently :
http://bazaar.launchpad.net/~ubuntu-branches/ubuntu/trusty/kexec-tools
/trusty-proposed/revision/63
kexec-tools (1:2.0.3-4ubuntu2) trusty; urgency=low
2
3 * Add "cra
== Test on a VM with 384Mb of memory ==
1)Original setup - crashkernel=384M-2G:64M,2G-:128M
ubuntu@SaucyS:~$ free
total used free sharedbuffers cached
Mem:306572 144412 162160 0 21900 73716
-/+ buffers/cache: 48796 25
The patch got accepted and uploaded to Debian and is now available in
Trusty. I will proceed to SRU the patch to P/Q/R & S
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1123950
Title:
/etc/init.d/s
Import from debian fixes Trusty. Marking it fix released
** Changed in: stud (Ubuntu)
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1123950
Title:
/etc/in
debdiff for saucy
** Patch added: "lp1123950-fail-restart_saucy.debdiff"
https://bugs.launchpad.net/ubuntu/+source/stud/+bug/1123950/+attachment/3900629/+files/lp1123950-fail-restart_saucy.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscri
Undecided => Medium
** Changed in: stud (Ubuntu Raring)
Importance: Undecided => Medium
** Changed in: stud (Ubuntu Saucy)
Importance: Undecided => Medium
** Changed in: stud (Ubuntu Quantal)
Assignee: (unassigned) => Louis Bouchard (louis-bouchard)
** Changed in
debdiff for quantal
** Patch added: "lp1123950-fail-restart_quantal.debdiff"
https://bugs.launchpad.net/ubuntu/+source/stud/+bug/1123950/+attachment/3900627/+files/lp1123950-fail-restart_quantal.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is s
debdiff for raring
** Patch added: "lp1123950-fail-restart_raring.debdiff"
https://bugs.launchpad.net/ubuntu/+source/stud/+bug/1123950/+attachment/3900628/+files/lp1123950-fail-restart_raring.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subs
** Description changed:
+ SRU justification :
+
+ Impact :
+ When using invoke-rc.d stud restart, stud is not restarted
+ since the children processes are still holding open sockets since children
are not
+ killed when SIGTERM is sent to the parent
+
+ Fix :
+ Modify stud to handle terminatio
:
- libpng source: brace-expansion-in-debhelper-config-file
debian/libpng12-dev.install
** Affects: libpng (Ubuntu)
Importance: Wishlist
Assignee: Louis Bouchard (louis-bouchard)
Status: In Progress
** Changed in: libpng (Ubuntu)
Status: New => In Progress
** Changed
debdiff for raring
** Patch added: "lp1216921_ignoremissing_raring.debdiff"
https://bugs.launchpad.net/ubuntu/+source/duplicity/+bug/1216921/+attachment/3838082/+files/lp1216921_ignoremissing_raring.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which
debdiff for quantal
** Patch added: "lp1216921_ignoremissing_quantal.debdiff"
https://bugs.launchpad.net/ubuntu/+source/duplicity/+bug/1216921/+attachment/3838075/+files/lp1216921_ignoremissing_quantal.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, whi
debdiff for precise
** Description changed:
- duplicity version: 0.6.18-0ubuntu3
+ SRU justification :
+
+ Without this fix, there is a potential for crash during execution of
+ duplicity
+
+ Impact :
+
+ Renders duplicity potentially unusable dues to spurious crashes
+
+ Fix :
+
+ Backport
I systematically change the setting on all my VMs to 128M as I have had
repeated failure with 64M. I think that the default should be raised to
128Mb which is the default on Debian anyway.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu
** Tags removed: verification-needed
** Tags added: verification-done
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1064475
Title:
crash version is outdated. Needs to import Debian version of the
** Tags removed: verification-needed
** Tags added: verification-done
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/251288
Title:
Crash should depend on binutils
To manage notifications about this
AFAIK, this bug may be a duplicate of the following longstanding bug :
https://bugs.launchpad.net/ubuntu/+source/kexec-tools/+bug/785394
I have made a habit of increasing the reserved crashkernel= value to
128Mb which is the default in debian though I understand that it may be
costly on micro ins
601 - 700 of 1494 matches
Mail list logo