[Bug 1939665] Re: "apt-get update" fails if another instance is running
In practice the two processes that run apt-get update are unaware of each other. When I'm updating of course I wouldn't intentionally run two instances in parallel. Indeed the other process is likely apt- daily.service. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1939665 Title: "apt-get update" fails if another instance is running To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1939665/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1939665] [NEW] "apt-get update" fails if another instance is running
Public bug reported: This snippet: sudo apt-get update & sudo apt-get update & wait; wait will result in one apt-get run succeeding and the other failing on the lock: [1] 3006473 [2] 3006474 Hit:1 http://ports.ubuntu.com/ubuntu-ports groovy InRelease Hit:2 http://ports.ubuntu.com/ubuntu-ports groovy-backports InRelease Hit:3 http://ports.ubuntu.com/ubuntu-ports groovy-security InRelease Hit:4 http://ports.ubuntu.com/ubuntu-ports groovy-updates InRelease Reading package lists... Done E: Could not get lock /var/lib/apt/lists/lock. It is held by process 3006476 (apt-get) N: Be aware that removing the lock file is not a solution and may break your system. E: Unable to lock directory /var/lib/apt/lists/ Reading package lists... Done [1]- Donesudo apt-get update [2]+ Exit 100sudo apt-get update Note that apt-get upgrade will correctly wait. ProblemType: Bug DistroRelease: Ubuntu 20.10 Package: apt 2.1.10ubuntu0.3 ProcVersionSignature: Ubuntu 5.8.0-48.54-generic 5.8.18 Uname: Linux 5.8.0-48-generic aarch64 ApportVersion: 2.20.11-0ubuntu50.7 Architecture: arm64 CasperMD5CheckResult: skip Date: Thu Aug 12 07:50:16 2021 ProcEnviron: LC_TIME=C.UTF-8 TERM=xterm-256color PATH=(custom, no user) LANG=C.UTF-8 SHELL=/bin/bash SourcePackage: apt UpgradeStatus: Upgraded to groovy on 2021-03-25 (139 days ago) ** Affects: apt (Ubuntu) Importance: Undecided Status: New ** Tags: apport-bug arm64 groovy uec-images -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1939665 Title: "apt-get update" fails if another instance is running To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1939665/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1577126] [NEW] Missing C++ support library
Public bug reported: antlr3 has the C support library, but is missing the C++ support library. This prevents scylladb (https://github.com/scylladb/scylla) from building out of the box. ** Affects: antlr3 (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1577126 Title: Missing C++ support library To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/antlr3/+bug/1577126/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1576101] [NEW] Missing libthrift.so
Public bug reported: Ubuntu provides the thrift compiler, bit not the run-time support library, so C++ applications using thrift cannot be built. This impacts ScyllaDB (http://github.com/scylladb/scylla) and the C++ driver for Apache Cassandra (https://github.com/datastax/cpp-driver). Seen in 14.04 and 16.04. ** Affects: thrift-compiler (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1576101 Title: Missing libthrift.so To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/thrift-compiler/+bug/1576101/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1500954] Re: xfs DIO data corruption
** Package changed: linux-lts-vivid (Ubuntu) => linux-lts-trusty (Ubuntu) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1500954 Title: xfs DIO data corruption To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-lts-trusty/+bug/1500954/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1500954] Re: xfs DIO data corruption
Any progress on this issue? This is DATA CORRUPTION! -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1500954 Title: xfs DIO data corruption To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-lts-vivid/+bug/1500954/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1500954] [NEW] xfs DIO data corruption
Public bug reported: An appending DIO write will corrupt files on XFS. The following patch needs to be backported: commit b9d59846f73713d77f0f3fb784c7f84249fc2b93 Author: Dave ChinnerDate: Thu Apr 16 22:03:07 2015 +1000 xfs: DIO write completion size updates race xfs_end_io_direct_write() can race with other IO completions when updating the in-core inode size. The IO completion processing is not serialised for direct IO - they are done either under the IOLOCK_SHARED for non-AIO DIO, and without any IOLOCK held at all during AIO DIO completion. Hence the non-atomic test-and-set update of the in-core inode size is racy and can result in the in-core inode size going backwards if the race if hit just right. If the inode size goes backwards, this can trigger the EOF zeroing code to run incorrectly on the next IO, which then will zero data that has successfully been written to disk by a previous DIO. To fix this bug, we need to serialise the test/set updates of the in-core inode size. This first patch introduces locking around the relevant updates and checks in the DIO path. Because we now have an ioend in xfs_end_io_direct_write(), we know exactly then we are doing an IO that requires an in-core EOF update, and we know that they are not running in interrupt context. As such, we do not need to use irqsave() spinlock variants to protect against interrupts while the lock is held. Hence we can use an existing spinlock in the inode to do this serialisation and so not need to grow the struct xfs_inode just to work around this problem. This patch does not address the test/set EOF update in generic_file_write_direct() for various reasons - that will be done as a followup with separate explanation. Signed-off-by: Dave Chinner Reviewed-by: Brian Foster Signed-off-by: Dave Chinner ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-image-3.19.0-25-generic 3.19.0-25.26~14.04.1 [modified: boot/vmlinuz-3.19.0-25-generic] ProcVersionSignature: Ubuntu 3.19.0-25.26~14.04.1-generic 3.19.8-ckt2 Uname: Linux 3.19.0-25-generic x86_64 ApportVersion: 2.14.1-0ubuntu3.11 Architecture: amd64 CurrentDesktop: Unity Date: Tue Sep 29 19:29:28 2015 InstallationDate: Installed on 2015-09-29 (0 days ago) InstallationMedia: Ubuntu 14.04.3 LTS "Trusty Tahr" - Beta amd64 (20150805) SourcePackage: linux-lts-vivid UpgradeStatus: No upgrade log present (probably fresh install) ** Affects: linux-lts-vivid (Ubuntu) Importance: Undecided Status: New ** Tags: amd64 apport-bug trusty -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1500954 Title: xfs DIO data corruption To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-lts-vivid/+bug/1500954/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs