Please apply this fix from upstream. The patch has been altered to apply
to this version of libselinux.
** Attachment added: "tls.237156.diff"
http://launchpadlibrarian.net/27990758/tls.237156.diff
--
SETRANS + libavg = SIGSEGV on Hardy
https://bugs.launchpad.net/bugs/237156
You received this
Public bug reported:
I believe this is an accidental regression related to:
https://bugs.launchpad.net/bugs/357041
Several patches were tried for this bug, with most of them causing
kernel panics similar to the one attached. The final patch was tested
out for the -14 kernel and worked ok.
Thank
** Attachment added: "jjs.32 @ 2009-07-03 11:55:24.png"
http://launchpadlibrarian.net/28664244/jjs.32%20%40%202009-07-03%2011%3A55%3A24.png
** Tags added: regression-potential
--
selinux kernel panic 2.6.28-13.45
https://bugs.launchpad.net/bugs/395219
You received this bug notification beca
That fixes the panic. Thanks Manoj!
--
selinux kernel panic 2.6.28-13.45
https://bugs.launchpad.net/bugs/395219
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubunt
Panics
Can you post a kernel source package?
** Attachment added: "jjs.32 @ 2009-05-08 15:55:02.png"
http://launchpadlibrarian.net/26478391/jjs.32%20%40%202009-05-08%2015%3A55%3A02.png
--
Warnings about open_file_mask_to_av with unknown mode when SELinux is enabled
https://bugs.launchpad.ne
** Bug watch added: freedesktop.org Bugzilla #21072
https://bugs.freedesktop.org/show_bug.cgi?id=21072
** Also affects: dbus via
https://bugs.freedesktop.org/show_bug.cgi?id=21072
Importance: Unknown
Status: Unknown
--
Denials when SELinux is permissive and dbus has invalid domai
** Changed in: dbus (Ubuntu)
Status: New => In Progress
--
Denials when SELinux is permissive and dbus has invalid domain.
https://bugs.launchpad.net/bugs/356570
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mail
Full panic output attached.
** Attachment added: "ouch"
http://launchpadlibrarian.net/26901618/ouch
--
Warnings about open_file_mask_to_av with unknown mode when SELinux is enabled
https://bugs.launchpad.net/bugs/357041
You received this bug notification because you are a member of Ubuntu
Bug
Eric's patch fixes the panic for me. It looks like the combined patches
fix the warning message.
--
Warnings about open_file_mask_to_av with unknown mode when SELinux is enabled
https://bugs.launchpad.net/bugs/357041
You received this bug notification because you are a member of Ubuntu
Bugs, whic
Any updates?
--
DPKG_MAINTSCRIPT_PACKAGE not set by dpkg-reconfigure causing dpkg-trigger to
fail
https://bugs.launchpad.net/bugs/198421
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubun
** Attachment added: "libsepol_2.0.30-2ubuntu1.debdiff"
http://launchpadlibrarian.net/24054562/libsepol_2.0.30-2ubuntu1.debdiff
--
fix boolean state smashing
https://bugs.launchpad.net/bugs/344959
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed
This bug has resurfaced with the sync with Debian.
Debdiff attached.
Description: Ubuntu Jaunty (development branch)
Release: 9.04
policycoreutils 2.0.49-8
** Attachment added: "policycoreutils_2.0.49-8ubuntu1.debdiff"
http://launchpadlibrarian.net/24055304/policycoreutils_2.0.49-8ubuntu1.d
Public bug reported:
>From the upstream patch:
"
If a boolean is encountered in a require block before the place where it is
declared it currently gets created with the state set to false no matter what
the declared state was. This only affects booleans in modules where the boolean
was also re
Public bug reported:
Binary package hint: policycoreutils
The files in:
/var/run/cups
/var/run/dbus
/var/run/network
/var/run/network/ifstate
/var/run/PolicyKit
Need to have restorecond entries because /var/run is a tmpfs and its not
possible to create good type transition rules for these.
**
** Attachment added: "policycoreutils_2.0.49-8ubuntu2.debdiff"
http://launchpadlibrarian.net/24594261/policycoreutils_2.0.49-8ubuntu2.debdiff
--
Miss-labeled files in /var/run
https://bugs.launchpad.net/bugs/352756
You received this bug notification because you are a member of Ubuntu
Bugs, w
Public bug reported:
Binary package hint: selinux
The selinux policy specific to Ubuntu has been renamed from selinux-
policy-refpolicy to selinux-policy-ubuntu. This changes the depends to
reflect that.
** Affects: selinux (Ubuntu)
Importance: Undecided
Status: New
--
change dep
** Attachment added: "selinux_0.4.debdiff"
http://launchpadlibrarian.net/24597352/selinux_0.4.debdiff
--
change depends to reflect rename of selinux-policy-refpolicy to
selinux-policy-ubuntu
https://bugs.launchpad.net/bugs/352771
You received this bug notification because you are a member of
Which version of the kernel was this committed to? I'm still seeing this
problem in the latest: 2.6.28-14.47
--
selinux kernel panic 2.6.28-13.45
https://bugs.launchpad.net/bugs/395219
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
This is certainly a log filler. It also qualifies as a DoS as any
application, even a confined one, can DoS the logs. Furthermore, this
message will appear on all terminals, over the top of anything you might
be doing there effectively allowing someone to DoS the terminals.
--
Warnings about open
That kernel looks good, no open_av messages and no crashes. Thanks!
--
Warnings about open_file_mask_to_av with unknown mode when SELinux is enabled
https://bugs.launchpad.net/bugs/357041
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
-
** Changed in: selinux (Ubuntu)
Status: New => Fix Released
--
[hardy alpha 6] unable to start cupsys if selinux is enforcing.
https://bugs.launchpad.net/bugs/202983
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs
Fixed in refpolicy 0.0.20071214-0ubuntu3
** Changed in: selinux (Ubuntu)
Status: New => Fix Released
--
selinux prevents running depmod, thus not allowing kernel upgrades
https://bugs.launchpad.net/bugs/211305
You received this bug notification because you are a member of Ubuntu
Bugs, whi
Fixed in refpolicy 0.0.20071214-0ubuntu3
** Changed in: selinux (Ubuntu)
Status: New => Fix Released
--
[hardy beta] unable to start syslog-ng if selinux is enforcing.
https://bugs.launchpad.net/bugs/209773
You received this bug notification because you are a member of Ubuntu
Bugs, which
I believe that 'apt-get autoclean' will do it.
--
the security context for the normal login shell is incorrect
https://bugs.launchpad.net/bugs/192983
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing list
ubuntu-bug
** Changed in: selinux (Ubuntu)
Status: New => Invalid
** bug changed to question:
https://answers.launchpad.net/ubuntu/+source/selinux/+question/30361
--
selinux installed- can't boot-unable to mount /selinux
https://bugs.launchpad.net/bugs/203645
You received this bug notification be
resolvconf needs its own policy module (see comments on
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=405767).
** Bug watch added: Debian Bug tracker #405767
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=405767
** Also affects: refpolicy (Debian) via
http://bugs.debian.org/cgi-bin/bug
Thanks for the report. Can you please post more information? I cannot
duplicate this bug. Please add at least the following:
1) The release of Ubuntu you are using, via 'lsb_release -rd' or System ->
About Ubuntu.
2) The version of the package you are using, via 'apt-cache policy packagename'
or
** Changed in: refpolicy (Ubuntu)
Status: New => Incomplete
--
HAL not working
https://bugs.launchpad.net/bugs/221272
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https:
The related bug in debconf is in progress and I wanted this to reflect
that.
** Changed in: selinux (Ubuntu)
Status: New => In Progress
--
selinux can't be reconfigured
https://bugs.launchpad.net/bugs/207784
You received this bug notification because you are a member of Ubuntu
Bugs, which
The stock installation of aptitude will try to install recommended
packages as hard dependencies. In the case of installing selinux this
results in ubuntu-standard being uninstalled (due to ubuntu-standard
recommending apparmor-utils). I suspect that this is what has happened.
You can change this
The scripts that are added to the initramfs are not deleted on a
'remove'. They are on a purge however (dpkg -P selinux).
I've attached a patch that deletes the initramfs scripts when selinux is
removed.
** Attachment added: "selinux.postrm.remove.patch"
http://launchpadlibrarian.net/13419249/
When selinux is installed it will only update the initramfs for the
running kernel. If you would like it installed in all your kernels
please run:
update-initramfs -u -k all
Please let me know if that fixes your problem!
** Changed in: selinux (Ubuntu)
Status: New => In Progress
--
seli
aptitude has a known problem with its handling of ordered dependencies
(which results in the dummy policy being installed instead of
refpolicy). Please use apt-get to install selinux. Instructions for
using aptitude can be found on the wiki:
https://wiki.ubuntu.com/HardySELinux
Look under the 'In
The new 'selinux' package (which replaces 'selinux-basics') provides the
proper support for using SELinux with Upstart. The selinux package is
available in Hardy. Please see the HardySELinux page for more
information: https://wiki.ubuntu.com/HardySELinux
--
selinux should be enabled and activate
Fix has been submitted.
--
load_policy shoud be moved to /sbin
https://bugs.launchpad.net/bugs/126415
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mai
Duplicate of #126415 (thank you for the extra information though) a fix
has been submitted.
--
load_policy should reside in /sbin
https://bugs.launchpad.net/bugs/192973
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mail
*** This bug is a duplicate of bug 126415 ***
https://bugs.launchpad.net/bugs/126415
** This bug has been marked a duplicate of bug 126415
load_policy shoud be moved to /sbin
--
load_policy should reside in /sbin
https://bugs.launchpad.net/bugs/192973
You received this bug notification be
On Mon, Mar 3, 2008 at 5:32 PM, Cafuego <[EMAIL PROTECTED]> wrote:
> Public bug reported:
>
> Binary package hint: selinux
>
> When installing on a Xen VM I was told:
>
> Preconfiguring packages ...
> GRUB configuration file not found.
> selinux failed to preconfigure, with exit status 1
>
>
This bug appears to be fixed in upstream version python-selinux
2.0.55-0ubuntu4. Can you please verify?
--
package python-selinux 2.0.55-0ubuntu1 failed to install/upgrade: Unterprozess
neues pre-removal-Skript gab den Fehlerwert 1 zur?ck
https://bugs.launchpad.net/bugs/193029
You received this
; urgency=low
* debian/*:
- reconstituted the python debug package
* debian/setup.py:
- updated version number
-- Caleb Case <[EMAIL PROTECTED]> Fri, 29 Feb 2008 12:16:37 -0500
Testing:
* Built with pbuilder without problems.
* Installs and can be used on Ubuntu Server.
** A
** Attachment added: "libsemanage.diff"
http://launchpadlibrarian.net/12379521/libsemanage.diff
--
FFE NEW python-semanage-dbg
https://bugs.launchpad.net/bugs/198349
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mai
Public bug reported:
Binary package hint: setools
Update SETools to the latest release. The SELinux policies used in Hardy
Heron are not supported by SETools version 2.4. Updating to version
3.3.3 will allow Hardy Heron users to analyze their SELinux policies.
Changelog:
setools (3.3.3-0ubuntu1
Updated package is on revu:
http://revu.tauware.de/details.py?upid=2127
--
FFE upgrade setools from 2.4 to 3.3.3
https://bugs.launchpad.net/bugs/198391
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing list
ubuntu-b
Updated package is on revu:
http://revu.tauware.de/details.py?package=libsemanage
--
FFE NEW python-semanage-dbg
https://bugs.launchpad.net/bugs/198349
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing list
ubuntu-b
On Mon, Mar 3, 2008 at 6:57 PM, Cafuego <[EMAIL PROTECTED]> wrote:
> Ah ok, mine was set to high. However, I seem to not be able to rerun the
> config:
>
> [EMAIL PROTECTED]:~$ sudo dpkg-reconfigure -plow selinux
> dpkg-trigger: dpkg-trigger must be called from a maintainer script (or with
> a
On Tue, Mar 4, 2008 at 11:29 AM, Caleb Case <[EMAIL PROTECTED]> wrote:
> On Mon, Mar 3, 2008 at 6:57 PM, Cafuego <[EMAIL PROTECTED]> wrote:
> > Ah ok, mine was set to high. However, I seem to not be able to rerun the
> > config:
> >
> > [EMAIL PR
Public bug reported:
Binary package hint: debconf
When reconfiguring a package that uses dpkg-trigger it fails with:
dpkg-trigger: dpkg-trigger must be called from a maintainer script (or
with a --by-package option)
For instance:
$ sudo dpkg-reconfigure selinux
dpkg-trigger: dpkg-trigger must
Public bug reported:
Binary package hint: grub
As part of supporting SELinux in Ubuntu we would like to switch
seamlessly switch between AppArmor and SELinux. Part of the switch
involves updating the menu.lst's defoptions so that AppArmor/SELinux are
enabled/disabled at boot. Adding a trigger for
** Attachment added: "grub.trigger.patch"
http://launchpadlibrarian.net/11768532/grub.trigger.patch
--
trigger for update-grub
https://bugs.launchpad.net/bugs/189173
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for Ubuntu.
--
ubuntu-bu
Public bug reported:
The default login.pam does not run pam_selinux and results in incorrect
login contexts if SELinux is enabled on the system. We would like
pam_selinux to be run by default in Hardy to facilitate supporting
SELinux. Debdiff attached.
Thanks,
Caleb
DISTRIB_ID=Ubuntu
DISTRIB_RE
** Attachment added: "shadow.patch"
http://launchpadlibrarian.net/11901930/shadow.patch
--
package shadow-4.0.18.2-1 enable pam_selinux in login.pam
https://bugs.launchpad.net/bugs/191326
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for
pam_selinux will return success if selinux is not enabled.
SSH and GDM have their own special support for handling selinux
contexts.
--
package shadow-4.0.18.2-1 enable pam_selinux in login.pam
https://bugs.launchpad.net/bugs/191326
You received this bug notification because you are a member of
Public bug reported:
The version of pam_selinux.c in pam 0.99.7.1 is using an old method for
determining contexts. Because of this it does not correctly handle the
seusers configuration. This was fixed in upstream on 6/15/07 and has
been in pam releases starting with 99.8. Most policies use the se
** Attachment added: "pam_0.99.7.1-5ubuntu4.diff.gz"
http://launchpadlibrarian.net/11684521/pam_0.99.7.1-5ubuntu4.diff.gz
** Bug watch added: Debian Bug tracker #451722
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=451722
** Also affects: pam (Debian) via
http://bugs.debian.org/cgi-b
** Attachment added: "pam.seusers.patch"
http://launchpadlibrarian.net/11685360/pam.seusers.patch
--
package pam-0.99.7.1 pam_selinux.so doesn't support seusers
https://bugs.launchpad.net/bugs/187822
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug
Public bug reported:
The configure.am script doesn't add -lselinux to LIBS before it checks
for the existence of getseuserbyname and get_default_context_with_level
using AC_CHECK_FUNCS. This results in the functions not being found even
if they do exist and the seusers configuration not being hand
** Attachment added: "openssh.seusers.patch"
http://launchpadlibrarian.net/11704959/openssh.seusers.patch
--
package openssh-4.7p1 configure.ac improperly fails to recognize
getseuserbyname and get_default_context_with_level
https://bugs.launchpad.net/bugs/188136
You received this bug notifi
Thanks!
On Feb 4, 2008 4:47 AM, Colin Watson <[EMAIL PROTECTED]> wrote:
> Thanks; I've applied a very similar patch (just some formatting tweaks)
> to my Debian tree for my next upload.
>
> ** Changed in: openssh (Ubuntu)
> Assignee: (unassigned) => Colin Watson (kamion)
>Status: New
[EMAIL PROTECTED]:/tmp# ls -Z /etc/shadow
system_u:object_r:shadow_t /etc/shadow
[EMAIL PROTECTED]:/tmp# cp --preserve=all /etc/shadow .
[EMAIL PROTECTED]:/tmp# ls -Z shadow
system_u:object_r:shadow_t shadow
According to the man page for cp -a is the same as -dpR which turns out to mean:
--no-der
I've put an updated setools on revu that has the transitional packages
added. The version was changed to 3.3.4 upstream.
http://revu.tauware.de/details.py?package=setools
--
FFE upgrade setools from 2.4 to 3.3.3
https://bugs.launchpad.net/bugs/198391
You received this bug notification because yo
This is related to LP: #198421
https://bugs.launchpad.net/ubuntu/+source/debconf/+bug/198421
See that bug for a quick solution and the associated tree with a fix.
Thanks for the report,
Caleb
On Thu, Mar 27, 2008 at 11:56 AM, Reinhard Tartler <[EMAIL PROTECTED]> wrote:
> I clarified the bug des
I wasn't able to verify this bug. Can you verify that it exits in with
the newest package?
--
the security context for the normal login shell is incorrect
https://bugs.launchpad.net/bugs/192983
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubun
At this time apache is not protected, but we would like it to be ;o}
Essentially the policy for apache from refpolicy needs to be adjusted to
work on Ubuntu, tested, and packaged.
--
selinux policy allows apache access to type shadow_t
https://bugs.launchpad.net/bugs/203436
You received this bug
Mar 2008) | 33 lines
Author: Caleb Case
Email: [EMAIL PROTECTED]
Subject: policycoreutils semanage --proto --protocol inconsistent flags
Date: Tue, 18 Mar 2008 10:31:16 -0400
semanage --help indicates two conflicting ways of using the port
protocol flag:
# semanage --help | grep proto
semanage
Confirmed, I have a fix for this in my repo which I will post shortly to
revu.
** Changed in: sepolgen (Ubuntu)
Status: New => In Progress
--
python-sepolgen issue going from 7.10 to 8.04
https://bugs.launchpad.net/bugs/200652
You received this bug notification because you are a member of
On Wed, Mar 26, 2008 at 3:55 PM, Florin Iucha <[EMAIL PROTECTED]> wrote:
> The system is up-to-date as of this morning.
Are you using the packages from the hardened ppa? These packages would
be out of date with the packages in the main hardy repo.
>
> [EMAIL PROTECTED] $ ps xZ
> LABEL
The kernel from -proposed looks ok.
r...@jjs:~# uname -a
Linux jjs 2.6.28-15-server #52-Ubuntu SMP Wed Sep 9 11:50:50 UTC 2009 i686
GNU/Linux
r...@jjs:~# apt-cache policy linux-image-2.6.28-15-server
linux-image-2.6.28-15-server:
Installed: 2.6.28-15.52
Candidate: 2.6.28-15.52
Version tabl
Just wanted to add some perspective to this. 99% of all my dmesg entries
are from this single warning message:
r...@zedd:/var/log# dmesg | wc
1509 13586 126548
r...@zedd:/var/log# dmesg | grep "SELinux: WARNING: inside open_file_mask_to_av
with unknown mode:" | wc
1497 13473 125748
Public bug reported:
Binary package hint: gdm
To replicate:
* apt-get install selinux
* reboot
* login
* open a terminal and check your context (id -Z)
The context should be unconfined_t, however, because the new GDM handles
SELinux differently the context will end up being gdm_t. GDM now handl
** Attachment added: "gdm_2.27.90-0ubuntu6.debdiff"
http://launchpadlibrarian.net/31851236/gdm_2.27.90-0ubuntu6.debdiff
** Changed in: gdm (Ubuntu)
Status: New => In Progress
--
[karmic] gdm login context incorrect
https://bugs.launchpad.net/bugs/430205
You received this bug notificat
I was still seeing this problem with the 2.6.32-21-generic kernel, but
it seems to be fixed in -22.
--
system locked up _spin_unlock_bh+0x19/0x20
https://bugs.launchpad.net/bugs/539836
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
Reproducible on 9.10 (Karmic) 64bit
--
Use of -g workarea causes X Error of failed request: BadValue
https://bugs.launchpad.net/bugs/192218
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing list
ubuntu-bugs@lists.u
Debdiff attached that moves the man pages to /usr/share
** Attachment added: "policycoreutils_2.0.69-2ubuntu2.debdiff"
http://launchpadlibrarian.net/31658601/policycoreutils_2.0.69-2ubuntu2.debdiff
--
shipping files in /share
https://bugs.launchpad.net/bugs/418026
You received this bug notif
Debdiff attached that moves the man pages to /usr/share
** Attachment added: "policycoreutils_2.0.69-2ubuntu2.debdiff"
http://launchpadlibrarian.net/31658602/policycoreutils_2.0.69-2ubuntu2.debdiff
--
shipping files in /share
https://bugs.launchpad.net/bugs/418026
You received this bug notif
Public bug reported:
Binary package hint: selinux
The selinux package needs to be upgraded for GRUB 2.
r...@kks:~# apt-get install selinux
Setting up selinux (1:0.4) ...
GRUB configuration file not found.
dpkg: error processing selinux (--configure):
subprocess installed post-installation scri
** Attachment added: "selinux_0.5.debdiff"
http://launchpadlibrarian.net/31662416/selinux_0.5.debdiff
--
[karmic] GRUB configuration file not found.
https://bugs.launchpad.net/bugs/428007
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu
Public bug reported:
Binary package hint: policycoreutils
When selinux is installed it schedules the system to relabeled on
shutdown:
r...@kks:~# apt-get install selinux
Processing triggers for selinux ...
semodule deferred processing now taking place
/usr/sbin/semodule: SELinux policy is not m
** Attachment added: "policycoreutils_2.0.69-2ubuntu3.debdiff"
http://launchpadlibrarian.net/31678435/policycoreutils_2.0.69-2ubuntu3.debdiff
--
[karmic] setfiles fails to relabel if selinux not yet enabled
https://bugs.launchpad.net/bugs/428043
You received this bug notification because you
Is this bug to move the man pages to /usr/share or to move the
load_policy tool to /usr/sbin?
--
shipping files in /share
https://bugs.launchpad.net/bugs/418026
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing list
load_policy is called from the initramfs to load the policy. At that
point /usr is not guaranteed to be mounted. That was why it was moved
to /sbin.
--
shipping files in /share
https://bugs.launchpad.net/bugs/418026
You received this bug notification because you are a member of Ubuntu
Bugs, which
The kernel manages the labels for proc and sysfs, so no problems with
these.
--
mountall does not run restorecon on tmpfs
https://bugs.launchpad.net/bugs/456942
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing list
Public bug reported:
Please consider providing the alternative for libblas.so only and
installing the symlink libblas.so -> libblas.so.3gf in libblas (rather
than only in libblas-dev). This would remove a potential oops when
choosing which blas to use and accidentally updating only one of the
alte
Public bug reported:
$ lsb_release -rd
Description:Ubuntu Natty (development branch)
Release:11.04
$ apt-cache policy libatlas-dev
libatlas-dev:
Installed: 3.8.3-29
Symbolic links for the following are missing:
libatlas.so
libcblas.so
libf77blas.so
liblapack_atlas.so
The result i
Before: ~80 [kernel scheduler] Load balancing tick
After: ~20
2.6.35rc5-power2-generic #1-Ubuntu SMP Sat Jul 17 08:39:54 UTC 2010 x86_64
GNU/Linux
Intel(R) Core(TM) i5 CPU M 450
Much improved, thanks!
--
Tens of wakes per second in "[kernel scheduler] Load balancing tick" on Core 2
Duo
84 matches
Mail list logo