[Bug 1327218] Re: Volume detach failure because of invalid bdm.connection_info
I am not sure whether this bug is fixed. I can reproduce it on master branch. my test environment is setup with commit 172d4a00ce609da7ea6d8d97f635e6c9afecb373. 2015-08-12 23:23:15.793 INFO nova.compute.manager [req-6e6eb653-cb52-47a2-93e5-d520633e4e10 admin admin] [instance: 0030bb4e-10f3-4300-9ab7-2a2bd609678f] Detach volume fe82d173-1500-4bfb-a541-3046b46c8be0 from mountpoint /dev/vdb BlockDeviceMapping(boot_index=None,connection_info=None,created_at=2015-08-12T13:38:16Z,delete_on_termination=False,deleted=False,deleted_at=None,destination_type='volume',device_name='/dev/vdb',device_type=None,disk_bus=None,guest_format=None,id=2685,image_id=None,instance=,instance_uuid=0030bb4e-10f3-4300-9ab7-2a2bd609678f,no_device=False,snapshot_id=None,source_type='volume',updated_at=None,volume_id='fe82d173-1500-4bfb-a541-3046b46c8be0',volume_size=None) --- (This is printed by me) 2015-08-12 23:23:15.808 ERROR oslo_messaging.rpc.dispatcher [req-6e6eb653-cb52-47a2-93e5-d520633e4e10 admin admin] Exception during message handling: can't be decoded 2015-08-12 23:23:15.808 136462 ERROR oslo_messaging.rpc.dispatcher Traceback (most recent call last): 2015-08-12 23:23:15.808 136462 ERROR oslo_messaging.rpc.dispatcher File "/usr/local/lib/python2.7/dist-packages/oslo_messaging/rpc/dispatcher.py", line 142, in _dispatch_and_reply 2015-08-12 23:23:15.808 136462 ERROR oslo_messaging.rpc.dispatcher executor_callback)) 2015-08-12 23:23:15.808 136462 ERROR oslo_messaging.rpc.dispatcher File "/usr/local/lib/python2.7/dist-packages/oslo_messaging/rpc/dispatcher.py", line 186, in _dispatch 2015-08-12 23:23:15.808 136462 ERROR oslo_messaging.rpc.dispatcher executor_callback) 2015-08-12 23:23:15.808 136462 ERROR oslo_messaging.rpc.dispatcher File "/usr/local/lib/python2.7/dist-packages/oslo_messaging/rpc/dispatcher.py", line 129, in _do_dispatch 2015-08-12 23:23:15.808 136462 ERROR oslo_messaging.rpc.dispatcher result = func(ctxt, **new_args) 2015-08-12 23:23:15.808 136462 ERROR oslo_messaging.rpc.dispatcher File "/opt/stack/nova/nova/exception.py", line 89, in wrapped 2015-08-12 23:23:15.808 136462 ERROR oslo_messaging.rpc.dispatcher payload) 2015-08-12 23:23:15.808 136462 ERROR oslo_messaging.rpc.dispatcher File "/usr/local/lib/python2.7/dist-packages/oslo_utils/excutils.py", line 119, in __exit__ 2015-08-12 23:23:15.808 136462 ERROR oslo_messaging.rpc.dispatcher six.reraise(self.type_, self.value, self.tb) 2015-08-12 23:23:15.808 136462 ERROR oslo_messaging.rpc.dispatcher File "/opt/stack/nova/nova/exception.py", line 72, in wrapped 2015-08-12 23:23:15.808 136462 ERROR oslo_messaging.rpc.dispatcher return f(self, context, *args, **kw) 2015-08-12 23:23:15.808 136462 ERROR oslo_messaging.rpc.dispatcher File "/opt/stack/nova/nova/compute/manager.py", line 364, in decorated_function 2015-08-12 23:23:15.808 136462 ERROR oslo_messaging.rpc.dispatcher kwargs['instance'], e, sys.exc_info()) 2015-08-12 23:23:15.808 136462 ERROR oslo_messaging.rpc.dispatcher File "/usr/local/lib/python2.7/dist-packages/oslo_utils/excutils.py", line 119, in __exit__ 2015-08-12 23:23:15.808 136462 ERROR oslo_messaging.rpc.dispatcher six.reraise(self.type_, self.value, self.tb) 2015-08-12 23:23:15.808 136462 ERROR oslo_messaging.rpc.dispatcher File "/opt/stack/nova/nova/compute/manager.py", line 352, in decorated_function 2015-08-12 23:23:15.808 136462 ERROR oslo_messaging.rpc.dispatcher return function(self, context, *args, **kwargs) 2015-08-12 23:23:15.808 136462 ERROR oslo_messaging.rpc.dispatcher File "/opt/stack/nova/nova/compute/manager.py", line 4594, in detach_volume 2015-08-12 23:23:15.808 136462 ERROR oslo_messaging.rpc.dispatcher self._detach_volume(context, volume_id, instance) 2015-08-12 23:23:15.808 136462 ERROR oslo_messaging.rpc.dispatcher File "/opt/stack/nova/nova/compute/manager.py", line 4577, in _detach_volume 2015-08-12 23:23:15.808 136462 ERROR oslo_messaging.rpc.dispatcher self._driver_detach_volume(context, instance, bdm) 2015-08-12 23:23:15.808 136462 ERROR oslo_messaging.rpc.dispatcher File "/opt/stack/nova/nova/compute/manager.py", line 4512, in _driver_detach_volume 2015-08-12 23:23:15.808 136462 ERROR oslo_messaging.rpc.dispatcher connection_info = jsonutils.loads(bdm.connection_info) 2015-08-12 23:23:15.808 136462 ERROR oslo_messaging.rpc.dispatcher File "/usr/local/lib/python2.7/dist-packages/oslo_serialization/jsonutils.py", line 214, in loads 2015-08-12 23:23:15.808 136462 ERROR oslo_messaging.rpc.dispatcher return json.loads(encodeutils.safe_decode(s, encoding), **kwargs) 2015-08-12 23:23:15.808 136462 ERROR oslo_messaging.rpc.dispatcher File "/usr/local/lib/python2.7/dist-packages/oslo_utils/encodeutils.py", line 33, in safe_decode 2015-08-12 23:23:15.808 136462 ERROR oslo_messaging.rpc.dispatcher raise TypeError("%s can't be decoded" % type(text)) 2015-08-12 23:23:15.808 136462 ERROR oslo_mess
[Bug 1451540] Re: usbredir fails to build in trusty
The package built successfully on launchpad, and I was able to download and extract the source on my Trusty machine. $ apt-get source usbredir Reading package lists... Done Building dependency tree Reading state information... Done NOTICE: 'usbredir' packaging is maintained in the 'Git' version control system at: git://git.debian.org/collab-maint/usbredir.git Need to get 311 kB of source archives. Get:1 http://ca.archive.ubuntu.com/ubuntu/ trusty-proposed/main usbredir 0.6-2ubuntu1.1 (dsc) [1,913 B] Get:2 http://ca.archive.ubuntu.com/ubuntu/ trusty-proposed/main usbredir 0.6-2ubuntu1.1 (tar) [306 kB] Get:3 http://ca.archive.ubuntu.com/ubuntu/ trusty-proposed/main usbredir 0.6-2ubuntu1.1 (diff) [3,504 B] Fetched 311 kB in 0s (701 kB/s) gpgv: Signature made Wed 13 May 2015 03:30:08 PM EDT using RSA key ID A85E3F9D gpgv: Can't check signature: public key not found dpkg-source: warning: failed to verify signature on ./usbredir_0.6-2ubuntu1.1.dsc dpkg-source: info: extracting usbredir in usbredir-0.6 dpkg-source: info: unpacking usbredir_0.6.orig.tar.bz2 dpkg-source: info: unpacking usbredir_0.6-2ubuntu1.1.debian.tar.xz dpkg-source: info: applying update-usbredirserver-whatis-entry.diff $ ** Tags removed: verification-needed ** Tags added: trusty verification-done -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to usbredir in Ubuntu. https://bugs.launchpad.net/bugs/1451540 Title: usbredir fails to build in trusty To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/usbredir/+bug/1451540/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1451540] Re: usbredir fails to build in trusty
** Description changed: - - Impact: package cannot be extracted from source - Stable Fix: fix whitespace damage in quilt patch - Test case: apt-get source usbredir (on a trusty box) -- look for errors while applying patches. - Regression potential: should be none. - + [Impact] - usbredir fails to build in trusty + * usbredir fails to build in trusty. + + * Package cannot be extracted from source. + + * The fix is to remove the whitespace damage in quilt patch. + + [Test Case] + + * apt-get source usbredir (on a trusty box). + + * look for errors while applying patches. + + [Regression Potential] + + * Should be none. dpkg-source: warning: -sn is not a valid option for Dpkg::Source::Package::V3::Quilt gpgv: Signature made Fri Jan 3 01:48:06 2014 UTC using RSA key ID 97D73BA5 gpgv: Can't check signature: public key not found dpkg-source: warning: failed to verify signature on ./usbredir_0.6-2ubuntu1.dsc dpkg-source: info: extracting usbredir in usbredir-0.6 dpkg-source: info: unpacking usbredir_0.6.orig.tar.bz2 dpkg-source: info: unpacking usbredir_0.6-2ubuntu1.debian.tar.gz dpkg-source: error: expected ^--- in line 3 of diff `usbredir-0.6/debian/patches/update-usbredirserver-whatis-entry.diff' dpkg-source: info: applying update-usbredirserver-whatis-entry.diff dpkg-source: info: fuzz is not allowed when applying patches dpkg-source: info: if patch 'update-usbredirserver-whatis-entry.diff' is correctly applied by quilt, use 'quilt refresh' to update it FAILED [dpkg-source died] -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to usbredir in Ubuntu. https://bugs.launchpad.net/bugs/1451540 Title: usbredir fails to build in trusty To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/usbredir/+bug/1451540/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1267393] Re: [MIR] juju-core, juju-mongodb, gccgo, golang
@Seth, with the user mode containers - lxc didn't support that when the local provider feature was first developed. And now we have lxd on the horizon so we will be re-tooling local provider to use lxd and this will be delivered for Juju 1.26 around end of January 2016. We don't plan on making any further changes to local provider / lxc in the meantime as any work there will be imminently obsolete by the lxd stuff. -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to golang in Ubuntu. https://bugs.launchpad.net/bugs/1267393 Title: [MIR] juju-core, juju-mongodb, gccgo, golang To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gccgo-5/+bug/1267393/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1481780] Re: ipmitool 1.8.13 needs 2 patches for OpenPower systems
** Branch linked: lp:ubuntu/vivid-proposed/ipmitool -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to ipmitool in Ubuntu. https://bugs.launchpad.net/bugs/1481780 Title: ipmitool 1.8.13 needs 2 patches for OpenPower systems To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ipmitool/+bug/1481780/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1267393] Re: [MIR] juju-core, juju-mongodb, gccgo, golang
Regarding - release-public-tools.sh doesn't validate downloaded packages. That script has not been used since October 2013. The current script http://bazaar.launchpad.net/~juju-qa/juju-release-tools/trunk/view/head:/assemble-streams.bash does not use "apt-get download" because that that command does not work for all series. The script is run a Jerff (streams.canonical.com), a machine the QA team does not control. We are not permitted to install software on it, nor can we change its apt settings. As the machine is precise, we could only get 3 of the 18 ubuntu agents built by Launchpad. The modern script downloads the deb from a private ppa with only one subscriber (the QA team). The packages are downloaded within 30 minutes of being built. As juju doesn't distinguish between patch-level or origin in is checking of versions, and the fact that Juju itself creates fake versions, The assembly and publication script scripts validate the collection of agents. Agents cannot be changed. Only the agents added are permitted to be different in the collection. All the agents in the collect are hashed and verified to to match the local collection each time the script is run. The publication script rsyncs (or uses the clouds equivalent feature) the local stream of agents to the cloud. The final check verify the metadata is identical and public for users to access. assemble-streams.bash is scheduled to be replaced this cycle. We are considering removing the phase to download debs and make agents. The process is not idempotent. We are considering a separate process controlled solely by the QA team to create and assess agents for the collection (test them before they are placed in streams). We could use "apt-get download" on machines/containers we control to make agents. Streams.canonical.com, like the clouds would get agents only from the QA team. -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to golang in Ubuntu. https://bugs.launchpad.net/bugs/1267393 Title: [MIR] juju-core, juju-mongodb, gccgo, golang To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gccgo-5/+bug/1267393/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1483836] Re: acpica-unix ftbfs on powerpc
Hi Al, just temporarily assigning this to get your comment - do you have any idea why the above segfault woul dhappen during the aapit tests on powerpc? For some reason neither AcpiGbl_RootNode nor AcpiGbl_OutputFile is being initialized. ** Changed in: acpica-unix (Ubuntu) Assignee: Serge Hallyn (serge-hallyn) => Al Stone (ahs3) -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/1483836 Title: acpica-unix ftbfs on powerpc To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/acpica-unix/+bug/1483836/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1483836] Re: acpica-unix ftbfs on powerpc
Setting it to stdout gets us to the next segfault, an object being NULL. I get the feeling there is some initialization that is no longer being called. It doesn't stand out to me in the debdiff though. -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/1483836 Title: acpica-unix ftbfs on powerpc To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/acpica-unix/+bug/1483836/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1483836] Re: acpica-unix ftbfs on powerpc
So the segfault happens at _IO_acquire_lock_clear_flags2 (fp); in glibc. AcpiGbl_OutputFile, is NULL. -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/1483836 Title: acpica-unix ftbfs on powerpc To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/acpica-unix/+bug/1483836/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1483836] Re: acpica-unix ftbfs on powerpc
Reproducible by hand, after which the coredump from first failure shows: Core was generated by `./aapits 1 1 ../tmp/aml'. Program terminated with signal SIGSEGV, Segmentation fault. #0 ___vfprintf_chk (fp=0x0, flag=flag@entry=1, format=0x100ba764 "ACPI Exception: %s, ", ap=0xff8bafa0, ap@entry=0xff8baf10) at vfprintf_chk.c:29 29 vfprintf_chk.c: No such file or directory. (gdb) where #0 ___vfprintf_chk (fp=0x0, flag=flag@entry=1, format=0x100ba764 "ACPI Exception: %s, ", ap=0xff8bafa0, ap@entry=0xff8baf10) at vfprintf_chk.c:29 #1 0x10032cc0 in vfprintf (__ap=0xff8baf10, __fmt=, __stream=) at /usr/include/powerpc-linux-gnu/bits/stdio2.h:127 #2 AcpiOsActualVprintf (Fmt=, Args=Args@entry=0xff8bafa0) at osunixxf.c:410 #3 0x1003028c in AcpiOsPrintf (Fmt=Fmt@entry=0x100ba764 "ACPI Exception: %s, ") at atosxfwrap.c:481 #4 0x100940e8 in AcpiException (ModuleName=ModuleName@entry=0x100ba7c8 <_AcpiModuleName> "utxfinit", LineNumber=LineNumber@entry=93, Status=Status@entry=1, Format=Format@entry=0x100ba818 "During OSL initialization") at ../../source/components/utilities/utxferror.c:136 #5 0x1009468c in AcpiInitializeSubsystem () at ../../source/components/utilities/utxfinit.c:93 #6 0x100049d8 in AtInitTermCommonTest (OsxfNum=AcpiOsInitializeC, ActFlag=AtActD_OneTime, ActCode=3, TFst=1, Check_Flags=, Benchmark=1) at atinit.c:1065 #7 0x100032c8 in ExecuteTest (test_case=test_case@entry=1, test_num=1) at atmain.c:365 #8 0x1b88 in main (argc=4, argv=0xff8bb374) at atmain.c:480 -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/1483836 Title: acpica-unix ftbfs on powerpc To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/acpica-unix/+bug/1483836/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1484262] [NEW] Heimdal krb5_kuserok fails if user's home directory protected
Public bug reported: I've encountered this problem with Ubuntu 12.04.5 LTS Release: 12.04 and libkrb5-heimdal 1.6~git20120311.dfsg.1-2ubuntu0.1. It wouldn't surprise me were the problem wider in scope. Assume a valid Heimdal Kerberos setup, with: Packages heimdal-clients and libpam-heimdal installed (which also brings in sundry libraries as dependencies); /etc/krb5.conf properly set up, in particular the default realm under [libdefaults], DNS-domain-to-realm mappings under [domain_realm], and the KDC under [realms]; pam_krb5 configured in /etc/pam.d/common-auth (as should happen automatically when libpam-heimdal is installed); a proper host principal for the client host, with its key installed in /etc/krb5.keytab; and a local user with: a proper entry in /etc/passwd and /etc/shadow; a proper corresponding principal user@REALM in the KDC; a home directory accessed over NFS, with root_squash in effect. If the user's home directory has permissions 755, Kerberos login works just fine; in particular klist displays a TGT. If the user's home directory has permissions 700, Kerberos login fails. A message containing `pam_krb5(login:auth): failed authorization check' is written to syslog/auth. No session ticket cache is set up. Workaround: give pam_krb5 the ignore_k5login parameter, either in [appdefaults] in /etc/krb5.conf or whereever it appears in the several files in /etc/pam.d. I've dug around in the source, and I believe the trouble to be not in the PAM module but in the Heimdal implementation of library function krb5_kuserok. In particular, in function kuserok_user_k5login_plug_f in file lib/krb5/kuserok.c in source package heimdal-1.6~git20120311 (fetched by apt-get source libkrb5-26-heimdal). That function: a. Calls check_one_file to try to read $HOME/.k5login. If the function returns zero, the file was opened and read (and a value returned through a pointer tells whether the current principal was found); if nonzero, the value is an errno code. kuserok_user_k5login_plug_f believes that if errno was ENOENT, the file didn't exist and all is well; otherwise it acts as if it found an empty file, which means the principal wasn't listed there, which means krb5_kuserok will return failure. b. Calls check_directory to scan directory $HOME/.k5login.d. Again, it returns zero if the directory was found and opened; a nonzero errno value if not. kuserok_user_k5login_plug_f declares that all is well if the error value is ENOENT or ENOTDIR; otherwise it again causes krb5_kuserok to fail. The trouble is that when logging in, this code is executed as the super- user; hence, if the user's home directory forbids access to anyone but the owner and NFS root_squash blocks the super-user's extra permissions, check_one_file and check_directory will return EACCES, and krb5_kuserok will return failure as if .k5login existed but didn't list the current principal, and authentication will be denied. One could quibble over what to do if the file might exist but cannot be opened. (We don't know it exists because it is the directory's permissions that block access.) I've checked the MIT Kerberos source; in their rather-different krb5_kuserok implementation, any open failure for .k5login or .k5login.d allows access. That means maybe it's OK for Heimdal to do the same. On the other hand, one could argue (probably whoever wrote the code would) that it's safer to deny access if you can't tell whether the file is even there. I would argue that one of two things should happen: 1. The checks for ret == ENOENT should be changed either to ret != 0 (to match the MIT behaviour) or (ret == ENOENT || ret == EACCES) (so the permission-denied case allows access, but less-ordinary errors like EIO don't). 2. It should be documented, perhaps in the Heimdal version of pam_krb5(5), that there will be unexpected failures if the super-user is denied read permission to users' home directories, and if your system is set up that way you should use ignore_k5login. We'll probably just use ignore_k5login since for other reasons that seems the right answer for our site, but it may be a bigger problem for others. ** Affects: heimdal (Ubuntu) Importance: Undecided Status: New ** Tags: heimdal kerberos krb5 -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to heimdal in Ubuntu. https://bugs.launchpad.net/bugs/1484262 Title: Heimdal krb5_kuserok fails if user's home directory protected To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/heimdal/+bug/1484262/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1483093] Re: .archive.ubuntu.com is non inclusive
Hey Robie, Unfortunately, this server was installed for a conference that has already ended, and infrastructure for the site has already torn it down. If it helps, I installed 14.04.2 just a couple days before 14.04.3 was released. No ppas, stock from the repo. No modifications on the sources list. And yes, it does seem like it happens with the DNS redirection. I never tried using the squid client, since it was, as I mentioned, to use at a conference with large attendance. -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/1483093 Title: .archive.ubuntu.com is non inclusive To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/squid-deb-proxy/+bug/1483093/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1398718] Re: Live migration locks up Linux 3.2-based guests
Apologies for the delay. I can't even seem to reproduce the original issue on the affected hardware before upgrading, so I can't confirm the fix in vivid or wily. I'd be fine with closing this "can (no longer) reproduce"—maybe my recollection is playing funny tricks on me. -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to qemu in Ubuntu. https://bugs.launchpad.net/bugs/1398718 Title: Live migration locks up Linux 3.2-based guests To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/qemu/+bug/1398718/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1448985] Re: llvmpipe i386 crashes when running on qemu64 cpu
This bug has been reported on the Ubuntu ISO testing tracker. A list of all reports related to this bug can be found here: http://iso.qa.ubuntu.com/qatracker/reports/bugs/1448985 ** Tags added: iso-testing -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to qemu in Ubuntu. https://bugs.launchpad.net/bugs/1448985 Title: llvmpipe i386 crashes when running on qemu64 cpu To manage notifications about this bug go to: https://bugs.launchpad.net/qemu/+bug/1448985/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1463172] Re: destination arm board hangs after migration from x86 source
Hm, ok, thanks - sadly i don't have any board I can test this on with me. Wonder whether a rpi2 (which I have but not with me) would work. ** Changed in: qemu (Ubuntu) Status: Invalid => New -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to qemu in Ubuntu. https://bugs.launchpad.net/bugs/1463172 Title: destination arm board hangs after migration from x86 source To manage notifications about this bug go to: https://bugs.launchpad.net/qemu/+bug/1463172/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1463172] Re: destination arm board hangs after migration from x86 source
I think it is in theory supposed to work, but possibly in practice it doesn't... -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to qemu in Ubuntu. https://bugs.launchpad.net/bugs/1463172 Title: destination arm board hangs after migration from x86 source To manage notifications about this bug go to: https://bugs.launchpad.net/qemu/+bug/1463172/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1267393] Re: [MIR] juju-core, juju-mongodb, gccgo, golang
LP #1481502 has been opened to track the development work to fix ShQuote() https://bugs.launchpad.net/juju-core/+bug/1481502 -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to golang in Ubuntu. https://bugs.launchpad.net/bugs/1267393 Title: [MIR] juju-core, juju-mongodb, gccgo, golang To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gccgo-5/+bug/1267393/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1484132] Re: [FFe] juju-core 1.25
** Tags added: upgrade-software-version -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to juju-core in Ubuntu. https://bugs.launchpad.net/bugs/1484132 Title: [FFe] juju-core 1.25 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/juju-core/+bug/1484132/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1336568] Re: LVMiSCSI driver can't issue direct I/O through tgtd to iscsi volume
** Branch linked: lp:~billy-olsen/cinder/icehouse-1336568 -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to cinder in Ubuntu. https://bugs.launchpad.net/bugs/1336568 Title: LVMiSCSI driver can't issue direct I/O through tgtd to iscsi volume To manage notifications about this bug go to: https://bugs.launchpad.net/cinder/+bug/1336568/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1448985] Re: llvmpipe i386 crashes when running on qemu64 cpu
Since a simple work-around exists I think the importance can be lowered. ** Summary changed: - Ubuntu 14.04 LTS, 14.10, 15.04, 15.10 guests do not boot to Unity from QEMU-KVM Ubuntu 14.04 LTS, 14.10, 15.04 hosts + llvmpipe i386 crashes when running on qemu64 cpu ** Description changed: STEPS TO REPRODUCE: 1. Install Ubuntu 14.04.2 LTS or Ubuntu 14.10 or Ubuntu 15.04 with all updates (it is a host system). 2. Download one (or all) isos: * Ubuntu 14.0.4.2 i386 iso (ubuntu-14.04.2-desktop-i386.iso, MD5SUM = a8a14f1f92c1ef35dae4966a2ae1a264). * Ubuntu 14.10 i386 iso (ubuntu-14.10-desktop-i386.iso, MD5SUM = 4a3c4b8421af51c29c84fb6f4b3fe109) * Ubuntu 15.04 i386 iso (ubuntu-15.04-desktop-i386.iso, MD5SUM = 6ea04093b767ad6778aa245d53625612) 3. Boot one (or all) isos with as QEMU-KVM guest with the following commands: * sudo kvm -m 1536 -cdrom ubuntu-*-desktop-i386.iso * sudo kvm -m 1536 -cdrom ubuntu-*-desktop-i386.iso -vga std * sudo kvm -m 1536 -cdrom ubuntu-*-desktop-i386.iso -vga vmware * or from usb-creator-gtk via "Test disk" button 4. Click on "Try Ubuntu" EXPECTED RESULTS: ISO is booted to Unity desktop, user can test and use it. ACTUAL RESULTS: In 14.04 and 14.10 guests can see empty purple desktop or purple desktop with two shortcuts ("Examples" and "Install Ubuntu ..."). 15.10 guest does not boot or boot to safe graphic mode (it is bug 1437740). + The reason for this is that unity requires gfx acceleration which is + done via llvmpipe on non accelerated gfx chipsets (as VMs use by + default). The error message is hidden away but is: + + LLVM ERROR: Do not know how to split the result of this operator! + + The cause is that KVM VMs by default use the qemu64 cpu model which + seems to be inconsistent in some way between claimed features and actual + results when using those features. A work-around for running i386 isos + is to use a cpu model like core2duo or kvm64. + This bug should be confirmed and fixed. Users may want to run Ubuntu in QEMU/KVM, not just VirtualBox. ** Also affects: llvm-toolchain-3.6 (Ubuntu) Importance: Undecided Status: New ** Changed in: qemu (Ubuntu) Importance: High => Medium -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to qemu in Ubuntu. https://bugs.launchpad.net/bugs/1448985 Title: llvmpipe i386 crashes when running on qemu64 cpu To manage notifications about this bug go to: https://bugs.launchpad.net/qemu/+bug/1448985/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1481294] Re: 14.04.3: in kvm install full disk from the i386 install when you go to login it returns you to the login page
*** This bug is a duplicate of bug 1448985 *** https://bugs.launchpad.net/bugs/1448985 Or actually kvm64 as model. I would be duping this bug report against the one I was looking into before as I think we got more details in that by now. ** This bug has been marked a duplicate of bug 1448985 llvmpipe i386 crashes when running on qemu64 cpu -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to qemu in Ubuntu. https://bugs.launchpad.net/bugs/1481294 Title: 14.04.3: in kvm install full disk from the i386 install when you go to login it returns you to the login page To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/llvm-toolchain-3.6/+bug/1481294/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1465935] Re: kvm_irqchip_commit_routes: Assertion `ret == 0' failed
Marking as incomplete while waiting for test feedback. ** Changed in: qemu (Ubuntu) Status: Confirmed => Incomplete -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to qemu in Ubuntu. https://bugs.launchpad.net/bugs/1465935 Title: kvm_irqchip_commit_routes: Assertion `ret == 0' failed To manage notifications about this bug go to: https://bugs.launchpad.net/qemu/+bug/1465935/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 685096] Re: USB Passthrough not working for Windows 7 guest
** Changed in: qemu (Ubuntu) Importance: Medium => Low -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to qemu in Ubuntu. https://bugs.launchpad.net/bugs/685096 Title: USB Passthrough not working for Windows 7 guest To manage notifications about this bug go to: https://bugs.launchpad.net/qemu/+bug/685096/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1297218] Re: guest hangs after live migration due to tsc jump
Could someone confirm whether this is fixed in 15.04 and/or 15.10? ** Changed in: qemu (Ubuntu) Status: Triaged => Incomplete -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to qemu in Ubuntu. https://bugs.launchpad.net/bugs/1297218 Title: guest hangs after live migration due to tsc jump To manage notifications about this bug go to: https://bugs.launchpad.net/qemu/+bug/1297218/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1398718] Re: Live migration locks up Linux 3.2-based guests
Ping - can you confirm whether this is an issue still in vivid or wily? ** Changed in: qemu (Ubuntu) Status: Triaged => Incomplete -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to qemu in Ubuntu. https://bugs.launchpad.net/bugs/1398718 Title: Live migration locks up Linux 3.2-based guests To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/qemu/+bug/1398718/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1163034] Re: linux-user mode can't handle guest setting RLIMIT_AS (hangs running gnutls28 configure check code)
This will come in when implemented upstream. ** Changed in: qemu (Ubuntu) Importance: High => Wishlist -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to qemu in Ubuntu. https://bugs.launchpad.net/bugs/1163034 Title: linux-user mode can't handle guest setting RLIMIT_AS (hangs running gnutls28 configure check code) To manage notifications about this bug go to: https://bugs.launchpad.net/qemu/+bug/1163034/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1183429] Re: Hang on login after booting armhf container
Can you still reproduce this in 14.04 or 15.10? ** Changed in: qemu (Ubuntu) Status: Triaged => Incomplete -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to qemu in Ubuntu. https://bugs.launchpad.net/bugs/1183429 Title: Hang on login after booting armhf container To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/qemu/+bug/1183429/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1463172] Re: destination arm board hangs after migration from x86 source
I'm going to mark this invalid as I don't believe this is a supported case. If someone can vouch for the fact that this is supposed to work, please leave a comment. ** Changed in: qemu (Ubuntu) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to qemu in Ubuntu. https://bugs.launchpad.net/bugs/1463172 Title: destination arm board hangs after migration from x86 source To manage notifications about this bug go to: https://bugs.launchpad.net/qemu/+bug/1463172/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1321028] Re: qemu-system-ppc : file systems are not shutting down clean
*** This bug is a duplicate of bug 1317603 *** https://bugs.launchpad.net/bugs/1317603 ** This bug has been marked a duplicate of bug 1317603 qemu-system-ppc does not terminate on VM exit -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to qemu in Ubuntu. https://bugs.launchpad.net/bugs/1321028 Title: qemu-system-ppc : file systems are not shutting down clean To manage notifications about this bug go to: https://bugs.launchpad.net/qemu/+bug/1321028/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1321028] Re: qemu-system-ppc : file systems are not shutting down clean
** Changed in: qemu (Ubuntu) Status: Incomplete => New -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to qemu in Ubuntu. https://bugs.launchpad.net/bugs/1321028 Title: qemu-system-ppc : file systems are not shutting down clean To manage notifications about this bug go to: https://bugs.launchpad.net/qemu/+bug/1321028/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1481556] Re: [needs-packaging] 1.24.5 is not packaged in wily
Hi Robie and all interested parties. I have linked a source package branch to update Juju to 1.24.5 in wily. The debian diff can be seen at http://people.canonical.com/~curtis/wily-juju-1.24.5/debian.diff There are several kinds of changes in the juju-core release files reflected in debian/copyright that I can summarise: 1. Go packages dropped: * src/bitbucket.org/kardianos/osext * src/bitbucket.org/kardianos/service * src/code.google.com/p/go.crypto * src/code.google.com/p/winsvc 2. Go packages added [1] note 2 packages had licence issues that I reported upstream during development of 1.24.0. This point release has the upstream fixes, we avoided the need to document licensing exceptions: * src/github.com/ajstarks/svgo * src/github.com/altoros/gosigma * src/github.com/coreos/go-systemd * src/github.com/dustin/go-humanize * src/github.com/godbus/dbus * src/github.com/juju/govmomi * src/github.com/juju/jujusvg * src/github.com/juju/persistent-cookiejar * src/github.com/juju/replicaset * src/golang.org/x/oauth2 * src/google.golang.org/api * src/google.golang.org/cloud * src/gopkg.in/errgo.v1 [1] * src/gopkg.in/juju/charm.v5 * src/gopkg.in/juju/charmstore.v4 [1] * src/gopkg.in/macaroon-bakery.v0 * src/gopkg.in/macaroon.v1 3. Projects moved from launchpad.net; inflating the diff: * src/launchpad.net/goamz -> src/gopkg.in/amz.v3 * src/launchpad.net/goose -> src/gopkg.in/goose.v1 4. Forks of upstream golang to fix issues in golang 1.2 system packages: * src/github.com/gabriel-samfira/sys * src/github.com/juju/govmomi/vim25/xml * src/github.com/juju/httpprof * src/github.com/juju/xml 5. Fixes for copyright issues in response to the bugs we reported previously: * src/github.com/juju/cmd * src/github.com/juju/gojsonpointer * src/github.com/juju/gojsonreference * src/github.com/juju/gojsonschema * src/github.com/juju/juju * src/github.com/juju/utils 6. Packages updated to get fixes or new API: * src/github.com/juju/blobstore * src/github.com/juju/names * src/github.com/juju/testing * src/golang.org/x/crypto * src/gopkg.in/check.v1 * src/gopkg.in/mgo.v2 * src/gopkg.in/natefinch/lumberjack.v2 * src/launchpad.net/gomaasapi I audited the embedded go packages based on a diff of the dependencies.tsv http://people.canonical.com/~curtis/wily-juju-1.24.5/deps.diff and this script to identify undocumented deps: for dep in $(cat src/github.com/juju/juju/dependencies.tsv | cut -f 3); do grep -q "Last verified commit $dep" debian/copyright || echo "Review $dep" done The actual diff between 1.22.6 and 1.24.5 is a mind-numbing 1,123,938 lines; http://people.canonical.com/~curtis/wily-juju-1.24.5/1.22.6-1.24.5.diff.gz I singled out src/githib.com/juju/juju for special attention since files are moved in and out the project; http://people.canonical.com/~curtis/wily-juju-1.24.5/juju.diff.gz ** Summary changed: - [needs-packaging] 1.24.4 is not packaged in wily + [needs-packaging] 1.24.5 is not packaged in wily ** Description changed: - Juju 1.24.4 is currently proposed to be the next stable Juju release. + Juju 1.24.5 is currently proposed to be the next stable Juju release. The juju team want this version also proposed for wily. This release supports systemd for local charm development and testing [SRU Information] juju-core has a stable release exception in https://wiki.ubuntu.com/StableReleaseUpdates/MicroReleaseExceptions, including for major version updates. [Devel Fix] [sinzui] Prepare source package, and diffs: DONE [rbasak] Review package and upload of new upstream release with packaging review. [Pre-QA tasks] [rbasak] Upload to the development release (wily-proposed): TODO [QA Status] Since there are multiple verifications required, they are listed here as a work item whiteboard status type thing rather than try and track them in a single tag. Please do not mark verification-done or remove block- proposed until all following items have passed. If any of these items fail, this bug should be marked verification-failed immediately. [sinzui] Upstream QA test against Wily: TODO [sinzui] Upstream release process complete: TODO Manual tests required: [sinzui] Test juju-quickstart against wily-proposed: TODO [sinzui] Test juju-deployer against wily-proposed: TODO ** Branch linked: lp:~sinzui/ubuntu/wily/juju-core/wily-1.24.5 ** Branch unlinked: lp:~sinzui/ubuntu/wily/juju-core/wily-1.24.4 -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to juju-core in Ubuntu. https://bugs.launchpad.net/bugs/1481556 Title: [needs-packaging] 1.24.5 is not packaged in wily To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/juju-core/+bug/1481556/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bu
[Bug 1483836] Re: acpica-unix ftbfs on powerpc
** Changed in: acpica-unix (Ubuntu) Assignee: (unassigned) => Serge Hallyn (serge-hallyn) -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/1483836 Title: acpica-unix ftbfs on powerpc To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/acpica-unix/+bug/1483836/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1481780] Re: ipmitool 1.8.13 needs 2 patches for OpenPower systems
Hello bugproxy, or anyone else affected, Accepted ipmitool into vivid-proposed. The package will build now and be available at https://launchpad.net/ubuntu/+source/ipmitool/1.8.15-1ubuntu0.1 in a few hours, and then in the -proposed repository. Please help us by testing this new package. See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to enable and use -proposed. Your feedback will aid us getting this update out to other Ubuntu users. If this package fixes the bug for you, please add a comment to this bug, mentioning the version of the package you tested, and change the tag from verification-needed to verification-done. If it does not fix the bug for you, please add a comment stating that, and change the tag to verification-failed. In either case, details of your testing will help us make a better decision. Further information regarding the verification process can be found at https://wiki.ubuntu.com/QATeam/PerformingSRUVerification . Thank you in advance! ** Changed in: ipmitool (Ubuntu Vivid) Status: In Progress => Fix Committed ** Tags added: verification-needed -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to ipmitool in Ubuntu. https://bugs.launchpad.net/bugs/1481780 Title: ipmitool 1.8.13 needs 2 patches for OpenPower systems To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ipmitool/+bug/1481780/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1477174] Update Released
The verification of the Stable Release Update for ceph has completed successfully and the package has now been released to -updates. Subsequently, the Ubuntu Stable Release Updates Team is being unsubscribed and will not receive messages about this bug report. In the event that you encounter a regression using the package from -updates please report a new bug using ubuntu-bug and tag the bug report regression-update so we can easily find any regressions. -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to ceph in Ubuntu. https://bugs.launchpad.net/bugs/1477174 Title: [SRU] 0.80.10 stable release To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ceph/+bug/1477174/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1477174] Re: [SRU] 0.80.10 stable release
This bug was fixed in the package ceph - 0.80.10-0ubuntu0.14.04.1 --- ceph (0.80.10-0ubuntu0.14.04.1) trusty; urgency=medium * New upstream stable point release (LP: #1477174): - d/ceph.install: Add manpage for ceph-disk. - d/ceph-common.install: Replace ceph_filestore_* with ceph-objectstore-tool. - d/control: Ensure ceph-test-dbg depends on ceph-test only. - d/p/fix-python-rados-memleak.patch: Dropped included upstream. -- James Page Wed, 22 Jul 2015 17:12:16 +0100 ** Changed in: ceph (Ubuntu Trusty) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to ceph in Ubuntu. https://bugs.launchpad.net/bugs/1477174 Title: [SRU] 0.80.10 stable release To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ceph/+bug/1477174/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 489398] Re: Unable to use use LVM with DRBD block devices as PV
** Changed in: drbd8 (Debian) Status: Confirmed => Fix Released -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to drbd8 in Ubuntu. https://bugs.launchpad.net/bugs/489398 Title: Unable to use use LVM with DRBD block devices as PV To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/drbd8/+bug/489398/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1481931] Please test proposed package
Hello Ben, or anyone else affected, Accepted walinuxagent into precise-proposed. The package will build now and be available at https://launchpad.net/ubuntu/+source/walinuxagent/2.0.14-0ubuntu1~12.04.0 in a few hours, and then in the -proposed repository. Please help us by testing this new package. See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to enable and use -proposed. Your feedback will aid us getting this update out to other Ubuntu users. If this package fixes the bug for you, please add a comment to this bug, mentioning the version of the package you tested, and change the tag from verification-needed to verification-done. If it does not fix the bug for you, please add a comment stating that, and change the tag to verification-failed. In either case, details of your testing will help us make a better decision. Further information regarding the verification process can be found at https://wiki.ubuntu.com/QATeam/PerformingSRUVerification . Thank you in advance! -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to walinuxagent in Ubuntu. https://bugs.launchpad.net/bugs/1481931 Title: [SRU] walinuxagent incorrectly handles http error for HPC workloads To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/walinuxagent/+bug/1481931/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1481931] Please test proposed package
Hello Ben, or anyone else affected, Accepted walinuxagent into vivid-proposed. The package will build now and be available at https://launchpad.net/ubuntu/+source/walinuxagent/2.0.14-0ubuntu1~15.04.0 in a few hours, and then in the -proposed repository. Please help us by testing this new package. See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to enable and use -proposed. Your feedback will aid us getting this update out to other Ubuntu users. If this package fixes the bug for you, please add a comment to this bug, mentioning the version of the package you tested, and change the tag from verification-needed to verification-done. If it does not fix the bug for you, please add a comment stating that, and change the tag to verification-failed. In either case, details of your testing will help us make a better decision. Further information regarding the verification process can be found at https://wiki.ubuntu.com/QATeam/PerformingSRUVerification . Thank you in advance! ** Changed in: walinuxagent (Ubuntu Precise) Status: New => Fix Committed -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to walinuxagent in Ubuntu. https://bugs.launchpad.net/bugs/1481931 Title: [SRU] walinuxagent incorrectly handles http error for HPC workloads To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/walinuxagent/+bug/1481931/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1481931] Re: [SRU] walinuxagent incorrectly handles http error for HPC workloads
Hello Ben, or anyone else affected, Accepted walinuxagent into trusty-proposed. The package will build now and be available at https://launchpad.net/ubuntu/+source/walinuxagent/2.0.14-0ubuntu1~14.04.0 in a few hours, and then in the -proposed repository. Please help us by testing this new package. See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to enable and use -proposed. Your feedback will aid us getting this update out to other Ubuntu users. If this package fixes the bug for you, please add a comment to this bug, mentioning the version of the package you tested, and change the tag from verification-needed to verification-done. If it does not fix the bug for you, please add a comment stating that, and change the tag to verification-failed. In either case, details of your testing will help us make a better decision. Further information regarding the verification process can be found at https://wiki.ubuntu.com/QATeam/PerformingSRUVerification . Thank you in advance! ** Changed in: walinuxagent (Ubuntu Trusty) Status: New => Fix Committed ** Changed in: walinuxagent (Ubuntu Vivid) Status: New => Fix Committed -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to walinuxagent in Ubuntu. https://bugs.launchpad.net/bugs/1481931 Title: [SRU] walinuxagent incorrectly handles http error for HPC workloads To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/walinuxagent/+bug/1481931/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1476666] Re: [MRE] Rebase Xen-4.4 to upstream stable 4.4.2
Hello Stefan, or anyone else affected, Accepted xen into trusty-proposed. The package will build now and be available at https://launchpad.net/ubuntu/+source/xen/4.4.2-0ubuntu0.14.04.1 in a few hours, and then in the -proposed repository. Please help us by testing this new package. See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to enable and use -proposed. Your feedback will aid us getting this update out to other Ubuntu users. If this package fixes the bug for you, please add a comment to this bug, mentioning the version of the package you tested, and change the tag from verification-needed to verification-done. If it does not fix the bug for you, please add a comment stating that, and change the tag to verification-failed. In either case, details of your testing will help us make a better decision. Further information regarding the verification process can be found at https://wiki.ubuntu.com/QATeam/PerformingSRUVerification . Thank you in advance! ** Changed in: xen (Ubuntu Trusty) Status: In Progress => Fix Committed ** Tags added: verification-needed -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to xen in Ubuntu. https://bugs.launchpad.net/bugs/147 Title: [MRE] Rebase Xen-4.4 to upstream stable 4.4.2 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/xen/+bug/147/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1481289] Re: PHP 5.5.9 Default socket timeout being not honoured by application
Hello, The referenced patch: https://bugs.php.net/patch- display.php?bug_id=41631&patch=bug41631.patch&revision=latest Does not apply against 5.5.9-1ubuntu4.11 source. Further, from the bug referenced it doesn't appear that patch specified was the final solution committed to source. The most recent comment in the bug suggests that 3 commits were needed and applied to 5.5 This has been addressed (we believe once and for all) in upstream 5.5/5.6/master branches. Thanks to bbroerman for the associated patches. http://git.php.net/?p=php-src.git;a=commitdiff;h=fd4641696cc67fedf494717b5e4d452019f04d6f http://git.php.net/?p=php-src.git;a=commitdiff;h=1482ed2d5660c3875add40706a18fe29e2b3ff70 http://git.php.net/?p=php-src.git;a=commitdiff;h=dddbe0fc338a0f01ba336e84755694fb9bfbeb53 These are commits further along in php 5.5 series, 5.5.23ish, so these patches don't cleanly apply either. I'm a bit wary about backporting these three safely into 5.5.9 and I don't think we can push newer 5.5.X without a Micro Release Exception (https://wiki.ubuntu.com/StableReleaseUpdates/MicroReleaseExceptions) as there isn't one in place for php. The development release (wily) is running 5.6 which has these fixes already included from trunk. ** Changed in: php5 (Ubuntu) Importance: Undecided => Medium ** Changed in: php5 (Ubuntu) Status: New => Incomplete -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/1481289 Title: PHP 5.5.9 Default socket timeout being not honoured by application To manage notifications about this bug go to: https://bugs.launchpad.net/php/+bug/1481289/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1484132] [NEW] [FFe] juju-core 1.25
Public bug reported: The Juju team are finalising the juju-core 1.25 feature set. We believe we can have a stable Juju by the time of Wily's release, but we will miss the August 24 feature freeze date. We want an feature freeze exemption to put 1.25 into wily. We expect juju-core 1.24.x to be in wily soon. We will then put 1.25 in wily-proposed. When all parties agree that 1.25 is fit for purpose, it can leave proposed. We expect to update the 1.25 version is propose a few times to address issues reported by the Ubuntu testers. ** Affects: juju-core (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to juju-core in Ubuntu. https://bugs.launchpad.net/bugs/1484132 Title: [FFe] juju-core 1.25 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/juju-core/+bug/1484132/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1307445] Re: openstack: instances with multiple nics on the same network don't have deterministic private-addresses
** Changed in: juju-core Status: New => Triaged -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to juju-core in Ubuntu. https://bugs.launchpad.net/bugs/1307445 Title: openstack: instances with multiple nics on the same network don't have deterministic private-addresses To manage notifications about this bug go to: https://bugs.launchpad.net/juju-core/+bug/1307445/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1482765] Re: [MIR] neutron-vpnaas
This is OK from a packaging side (nice unit tests!). It has a system daemon, so I'll subscribe the security team for a look see. It also has been removed from Debian testing, but that's no big deal, it was a temporary thing to let a transition go through. More troublingly, we have never sync'ed up with Debian. And notably, are now using a separate versioning scheme. Are we truly doomed to never be able to merge from Debian as is? I guess we'd have to get them to bump their version to 2: or 3: in order to make that work. Still, we should try to merge everything but the version if possible, will make merges simpler. Any comment on this mess? ** Changed in: neutron-vpnaas (Ubuntu) Status: New => Incomplete ** Changed in: neutron-vpnaas (Ubuntu) Assignee: (unassigned) => Ubuntu Security Team (ubuntu-security) -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to neutron-vpnaas in Ubuntu. https://bugs.launchpad.net/bugs/1482765 Title: [MIR] neutron-vpnaas To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/neutron-vpnaas/+bug/1482765/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1279826] Re: CVE-2013-7108
Seems like there was some confusion here. CVE-2013-7106 affected Icinga only but CVE-2013-7108 affects both Icinga and Nagios3. CVE-2013-7108 is still unpatched for Nagios3 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-7106 ** Also affects: nagios3 (Ubuntu) Importance: Undecided Status: New ** Description changed: - Seems like the version shipped in Ubuntu Precise suffers from CVE-2013-7106 (buffer overflows) + Seems like the version shipped in Ubuntu Precise suffers from CVE-2013-7108 (buffer overflows) 1) Description: Ubuntu 12.04.4 LTS Release: 12.04 2) apt-cache policy icinga icinga: - Installed: 1.6.1-2 - Candidate: 1.6.1-2 - Version table: - *** 1.6.1-2 0 - 500 http://archive.ubuntu.com/ubuntu/ precise/universe amd64 Packages - 100 /var/lib/dpkg/status + Installed: 1.6.1-2 + Candidate: 1.6.1-2 + Version table: + *** 1.6.1-2 0 + 500 http://archive.ubuntu.com/ubuntu/ precise/universe amd64 Packages + 100 /var/lib/dpkg/status A lot of info plus patches exist here: https://dev.icinga.org/issues/5251 -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to nagios3 in Ubuntu. https://bugs.launchpad.net/bugs/1279826 Title: CVE-2013-7108 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/icinga/+bug/1279826/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1279825] Re: CVE-2013-7106
** Also affects: nagios3 (Ubuntu) Importance: Undecided Status: New ** No longer affects: nagios3 (Ubuntu) -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to nagios3 in Ubuntu. https://bugs.launchpad.net/bugs/1279825 Title: CVE-2013-7106 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/icinga/+bug/1279825/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 901944] Re: gdbserver inside qemu does not stop on breakpoints
As mentioned by Horst, hbreak is needed. If you are getting "Remote 'g' packet reply is too long", see: https://sourceware.org/bugzilla/show_bug.cgi?id=13984 ** Bug watch added: Sourceware.org Bugzilla #13984 http://sourceware.org/bugzilla/show_bug.cgi?id=13984 -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to qemu-kvm in Ubuntu. https://bugs.launchpad.net/bugs/901944 Title: gdbserver inside qemu does not stop on breakpoints To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/qemu-kvm/+bug/901944/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1483836] [NEW] acpica-unix ftbfs on powerpc
You have been subscribed to a public bug by Robie Basak (racb): acpica-unix ftbfs on powerpc, preventing the package to migrate to the release pocket ** Affects: acpica-unix (Ubuntu) Importance: High Status: Confirmed ** Tags: ftbfs -- acpica-unix ftbfs on powerpc https://bugs.launchpad.net/bugs/1483836 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to the bug report. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1459987] Re: ubuntu-vm-builder hangs after bootstrapping (precise host, trusty guest)
Status changed to 'Confirmed' because the bug affects multiple users. ** Changed in: vm-builder (Ubuntu) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to vm-builder in Ubuntu. https://bugs.launchpad.net/bugs/1459987 Title: ubuntu-vm-builder hangs after bootstrapping (precise host, trusty guest) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/vm-builder/+bug/1459987/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1467050] Re: package tomcat7 7.0.56-2 failed to install/upgrade: subprocess installed post-installation script returned error exit status 1
Thank you for taking the time to report this bug and helping to make Ubuntu better. Since it seems likely to me that this is a local configuration problem, rather than a bug in Ubuntu, I'm marking this bug as Incomplete. Specifically you appear to have deleted /etc/tomcat7/ manually so the package cannot be expected to work. Try purging (not removing) and reinstalling the relevant packages. If indeed this is a local configuration problem, you can find pointers to get help for this sort of problem here: http://www.ubuntu.com/support/community Or if you believe that this is really a bug, then you may find it helpful to read "How to report bugs effectively" http://www.chiark.greenend.org.uk/~sgtatham/bugs.html. We'd be grateful if you would then provide a more complete description of the problem, explain why you believe this is a bug in Ubuntu rather than a problem specific to your system, and then change the bug status back to New. ** Changed in: tomcat7 (Ubuntu) Status: Confirmed => Incomplete -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to tomcat7 in Ubuntu. https://bugs.launchpad.net/bugs/1467050 Title: package tomcat7 7.0.56-2 failed to install/upgrade: subprocess installed post-installation script returned error exit status 1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/tomcat7/+bug/1467050/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1376316] Re: nova absolute-limits floating ip count is incorrect in a neutron based deployment
** Changed in: nova (Ubuntu) Status: Triaged => In Progress -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to nova in Ubuntu. https://bugs.launchpad.net/bugs/1376316 Title: nova absolute-limits floating ip count is incorrect in a neutron based deployment To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1376316/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1483999] Re: bacula-fd dies on restore
found upstream bug. http://bugs.bacula.org/view.php?id=2071 No fix. ** Bug watch added: bugs.bacula.org/ #2071 http://bugs.bacula.org/view.php?id=2071 -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to bacula in Ubuntu. https://bugs.launchpad.net/bugs/1483999 Title: bacula-fd dies on restore To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/bacula/+bug/1483999/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1483999] Re: bacula-fd dies on restore
** Attachment added: "GDB trace" https://bugs.launchpad.net/ubuntu/+source/bacula/+bug/1483999/+attachment/4443237/+files/bacula_trace.gdb ** Description changed: - Trying to restore a client on bacula the bacula-fd processes dies. GDB - trace below : + Trying to restore a client on bacula the bacula-fd processes dies. - [New LWP 3156] - [New LWP 1945] - [Thread debugging using libthread_db enabled] - Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1". - 0x7f026897dda3 in select () from /lib/x86_64-linux-gnu/libc.so.6 - $1 = '\000' - $2 = 0x1586088 "bacula-fd" - $3 = 0x0 - $4 = 0x0 - $5 = 0x7f0269634ffb "5.2.6 (21 February 2012)" - $6 = 0x7f0269634fda "x86_64-pc-linux-gnu" - $7 = 0x7f0269634fd3 "ubuntu" - $8 = 0x7f0269634ff5 "14.04" - $9 = "prd-qua-za-backups.int.domain.com", '\000' - $10 = 0x7f0269634fee "ubuntu 14.04" - $11 = 0 - Environment variable "TestName" not defined. - #0 0x7f026897dda3 in select () from /lib/x86_64-linux-gnu/libc.so.6 - #1 0x7f0269603858 in bnet_thread_server (addrs=, max_clients=, client_wq=client_wq@entry=0x62be40 , handle_client_request=) at bnet_server.c:160 - #2 0x00408f82 in main (argc=, argv=) at filed.c:278 - - Thread 3 (Thread 0x7f0266dfc700 (LWP 1945)): - #0 0x7f0268c5d7ce in pthread_cond_timedwait@@GLIBC_2.3.2 () from /lib/x86_64-linux-gnu/libpthread.so.0 - #1 0x7f026962a61c in watchdog_thread (arg=) at watchdog.c:321 - #2 0x7f0268c59182 in start_thread () from /lib/x86_64-linux-gnu/libpthread.so.0 - #3 0x7f026898647d in clone () from /lib/x86_64-linux-gnu/libc.so.6 - - Thread 2 (Thread 0x7f02665fb700 (LWP 3156)): - #0 0x7f0268c60ee9 in waitpid () from /lib/x86_64-linux-gnu/libpthread.so.0 - #1 0x7f026962103a in signal_handler (sig=11) at signal.c:229 - #2 - #3 0x7f0269618d3f in sm_free_pool_memory (fname=fname@entry=0x4239f0 "job.c", lineno=lineno@entry=330, obuf=0x7f02600031b0 "<") at mem_pool.c:228 - #4 0x00417381 in handle_client_request (dirp=0x15a4f68) at job.c:330 - #5 0x7f026962af39 in workq_server (arg=0x62be40 ) at workq.c:346 - #6 0x7f0268c59182 in start_thread () from /lib/x86_64-linux-gnu/libpthread.so.0 - #7 0x7f026898647d in clone () from /lib/x86_64-linux-gnu/libc.so.6 - - Thread 1 (Thread 0x7f026a497780 (LWP 1933)): - #0 0x7f026897dda3 in select () from /lib/x86_64-linux-gnu/libc.so.6 - #1 0x7f0269603858 in bnet_thread_server (addrs=, max_clients=, client_wq=client_wq@entry=0x62be40 , handle_client_request=) at bnet_server.c:160 - #2 0x00408f82 in main (argc=, argv=) at filed.c:278 - #0 0x7f026897dda3 in select () from /lib/x86_64-linux-gnu/libc.so.6 - No symbol table info available. - #1 0x7f0269603858 in bnet_thread_server (addrs=, max_clients=, client_wq=client_wq@entry=0x62be40 , handle_client_request=) at bnet_server.c:160 - 160 bnet_server.c: No such file or directory. - maxfd = 3 - sockset = {fds_bits = {8, 0 }} - clilen = 16 - turnon = 1 - p = - buf = "127.0.0.1", '\000' , "\260\f\232\314\377\177\000\000\240\f\232\314\377\177\000\000)\240\215h\002\177\000\000\003\357\204i\002\177\000\000\377\356\204i\002\177\000\000\352d\215h\002\177\000\000\000\000\000\000\000\000\000\000\325\341\002U\000\000\000\000?;\036\r\000\000\000\000\004\342)j\002\177\000\000\000\000\000\000\000\000\000\000\327\356\337f\002\177\000" - allbuf = "\000\000\000\000\000\000\000\000\230qX\001", '\000' , "\273\367bi\002\177\000\000\000\000\000\000\000\000\000\000\326\035bi\002\177\000\000\001\000\000\000\000\000\000\000\330sX\001", '\000' , "\326\035bi\002\177\000\000#\216\000\000\000\000\000\000\002\000\000\000\000\000\000\000\070rX\001\000\000\000\000\270rX\001\000\000\000\000\330sX\001\000\000\000\000\070rX\001\000\000\000\000\230qX\001\000\000\000\000#\216\000\000\000\000\000\000\370fX\001\000\000\000\000\200Kci\002\177\000\000\370fX\001\000\000\000\000\200Kci\002\177\000\000\310\275b\000\000\000\000\000\226\034ai\002\177\000\000\330sX\001\000\000\000\000"... - stat = - tlog = - fd_ptr = 0x0 - sockfds = { = {}, head = 0x7fffcc9a0520, tail = 0x7fffcc9a0520, loffset = 0, num_items = 1} - newsockfd = - cli_addr = {sa_family = 2, sa_data = "\350\316\177\000\000\001\000\000\000\000\000\000\000"} - request = {fd = 4, user = '\000' , daemon = "prd-domain-bacula-fd", '\000' , pid = "1933\000\000\000\000\000", client = {{name = '\000' , addr = '\000' , sin = 0x7f0268685bc0, unit = 0x0, request = 0x7fffcc9a06f0}}, server = {{name = '\000' , addr = '\000' , sin = 0x7f0268685b40, unit = 0x0, request = 0x7fffcc9a06f0}}, sink = 0x0, hostname = 0x7f0268482aa0 , hostaddr = 0x7f0268482a50 , cleanup = 0x0, config = 0x0} - #2 0x00408f82 in main (argc=, argv=) at filed.c:278 - 278 filed.c: No such file or directory. - test_config = false - keep_readall_caps = false - ch = - uid = 0x0 - gid = 0x0 - python_args = {progname = 0x15871e8 "prd-domain-bacula-fd", scriptdir = 0x0, modulename = 0x4210e5 "FD
[Bug 1484022] [NEW] please pick os-endpoint-type fix for Kilo
Public bug reported: With 0.3.0-0ubuntu1~cloud0 from trusty-kilo repo, --os-endpoint-type will be ignored. If the client has no connectivity to the public endpoint, heatclient just gets timeout. This issue was fixed in 0.4.0 https://bugs.launchpad.net/python-heatclient/+bug/1422487 https://git.openstack.org/cgit/openstack/python-heatclient/commit/?id=4cda08d91c6344770819df48d5be855590e592f0 Please pick the fix for python-client in Kilo(the latest stable) repository. ** Affects: cloud-archive Importance: Undecided Status: New ** Affects: python-heatclient (Ubuntu) Importance: Undecided Status: New ** Also affects: cloud-archive Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to python-heatclient in Ubuntu. https://bugs.launchpad.net/bugs/1484022 Title: please pick os-endpoint-type fix for Kilo To manage notifications about this bug go to: https://bugs.launchpad.net/cloud-archive/+bug/1484022/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1483999] [NEW] bacula-fd dies on restore
Public bug reported: Trying to restore a client on bacula the bacula-fd processes dies. GDB trace below : [New LWP 3156] [New LWP 1945] [Thread debugging using libthread_db enabled] Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1". 0x7f026897dda3 in select () from /lib/x86_64-linux-gnu/libc.so.6 $1 = '\000' $2 = 0x1586088 "bacula-fd" $3 = 0x0 $4 = 0x0 $5 = 0x7f0269634ffb "5.2.6 (21 February 2012)" $6 = 0x7f0269634fda "x86_64-pc-linux-gnu" $7 = 0x7f0269634fd3 "ubuntu" $8 = 0x7f0269634ff5 "14.04" $9 = "prd-qua-za-backups.int.domain.com", '\000' $10 = 0x7f0269634fee "ubuntu 14.04" $11 = 0 Environment variable "TestName" not defined. #0 0x7f026897dda3 in select () from /lib/x86_64-linux-gnu/libc.so.6 #1 0x7f0269603858 in bnet_thread_server (addrs=, max_clients=, client_wq=client_wq@entry=0x62be40 , handle_client_request=) at bnet_server.c:160 #2 0x00408f82 in main (argc=, argv=) at filed.c:278 Thread 3 (Thread 0x7f0266dfc700 (LWP 1945)): #0 0x7f0268c5d7ce in pthread_cond_timedwait@@GLIBC_2.3.2 () from /lib/x86_64-linux-gnu/libpthread.so.0 #1 0x7f026962a61c in watchdog_thread (arg=) at watchdog.c:321 #2 0x7f0268c59182 in start_thread () from /lib/x86_64-linux-gnu/libpthread.so.0 #3 0x7f026898647d in clone () from /lib/x86_64-linux-gnu/libc.so.6 Thread 2 (Thread 0x7f02665fb700 (LWP 3156)): #0 0x7f0268c60ee9 in waitpid () from /lib/x86_64-linux-gnu/libpthread.so.0 #1 0x7f026962103a in signal_handler (sig=11) at signal.c:229 #2 #3 0x7f0269618d3f in sm_free_pool_memory (fname=fname@entry=0x4239f0 "job.c", lineno=lineno@entry=330, obuf=0x7f02600031b0 "<") at mem_pool.c:228 #4 0x00417381 in handle_client_request (dirp=0x15a4f68) at job.c:330 #5 0x7f026962af39 in workq_server (arg=0x62be40 ) at workq.c:346 #6 0x7f0268c59182 in start_thread () from /lib/x86_64-linux-gnu/libpthread.so.0 #7 0x7f026898647d in clone () from /lib/x86_64-linux-gnu/libc.so.6 Thread 1 (Thread 0x7f026a497780 (LWP 1933)): #0 0x7f026897dda3 in select () from /lib/x86_64-linux-gnu/libc.so.6 #1 0x7f0269603858 in bnet_thread_server (addrs=, max_clients=, client_wq=client_wq@entry=0x62be40 , handle_client_request=) at bnet_server.c:160 #2 0x00408f82 in main (argc=, argv=) at filed.c:278 #0 0x7f026897dda3 in select () from /lib/x86_64-linux-gnu/libc.so.6 No symbol table info available. #1 0x7f0269603858 in bnet_thread_server (addrs=, max_clients=, client_wq=client_wq@entry=0x62be40 , handle_client_request=) at bnet_server.c:160 160 bnet_server.c: No such file or directory. maxfd = 3 sockset = {fds_bits = {8, 0 }} clilen = 16 turnon = 1 p = buf = "127.0.0.1", '\000' , "\260\f\232\314\377\177\000\000\240\f\232\314\377\177\000\000)\240\215h\002\177\000\000\003\357\204i\002\177\000\000\377\356\204i\002\177\000\000\352d\215h\002\177\000\000\000\000\000\000\000\000\000\000\325\341\002U\000\000\000\000?;\036\r\000\000\000\000\004\342)j\002\177\000\000\000\000\000\000\000\000\000\000\327\356\337f\002\177\000" allbuf = "\000\000\000\000\000\000\000\000\230qX\001", '\000' , "\273\367bi\002\177\000\000\000\000\000\000\000\000\000\000\326\035bi\002\177\000\000\001\000\000\000\000\000\000\000\330sX\001", '\000' , "\326\035bi\002\177\000\000#\216\000\000\000\000\000\000\002\000\000\000\000\000\000\000\070rX\001\000\000\000\000\270rX\001\000\000\000\000\330sX\001\000\000\000\000\070rX\001\000\000\000\000\230qX\001\000\000\000\000#\216\000\000\000\000\000\000\370fX\001\000\000\000\000\200Kci\002\177\000\000\370fX\001\000\000\000\000\200Kci\002\177\000\000\310\275b\000\000\000\000\000\226\034ai\002\177\000\000\330sX\001\000\000\000\000"... stat = tlog = fd_ptr = 0x0 sockfds = { = {}, head = 0x7fffcc9a0520, tail = 0x7fffcc9a0520, loffset = 0, num_items = 1} newsockfd = cli_addr = {sa_family = 2, sa_data = "\350\316\177\000\000\001\000\000\000\000\000\000\000"} request = {fd = 4, user = '\000' , daemon = "prd-domain-bacula-fd", '\000' , pid = "1933\000\000\000\000\000", client = {{name = '\000' , addr = '\000' , sin = 0x7f0268685bc0, unit = 0x0, request = 0x7fffcc9a06f0}}, server = {{name = '\000' , addr = '\000' , sin = 0x7f0268685b40, unit = 0x0, request = 0x7fffcc9a06f0}}, sink = 0x0, hostname = 0x7f0268482aa0 , hostaddr = 0x7f0268482a50 , cleanup = 0x0, config = 0x0} #2 0x00408f82 in main (argc=, argv=) at filed.c:278 278 filed.c: No such file or directory. test_config = false keep_readall_caps = false ch = uid = 0x0 gid = 0x0 python_args = {progname = 0x15871e8 "prd-domain-bacula-fd", scriptdir = 0x0, modulename = 0x4210e5 "FDStartUp", configfile = 0x15862f8 "/etc/bacula/bacula-fd.conf", workingdir = 0x1587338 "/var/lib/bacula", job_getattr = 0x4193a0 , job_setattr = 0x419570 } p = 0x0 #0 0x in ?? () No symbol table info available. #0 0x in ?? () No symbol table info available. #0 0x in ?? () No symbol table info availab