** Tags removed: verification-need-precise verification-needed-raring
** Tags added: verification-done-precise verification-done-raring
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1179781
Title:
I
Spun up a few VMs, and did verification, everything seems to be going
swimingly. Marked as verified.
** Tags removed: verification-needed verification-needed-quantal
** Tags added: verification-done verification-done-quantal
--
You received this bug notification because you are a member of Ubun
I could not reproduce this problem, and will need some sort of
reproduction procedure in order to pursue it further.
I created a filesystem with 680666 randomly named 4k files, spread out
among 6811 nested directories at a max depth of 5 levels of directories.
I exported the filesystem using the
Woops missed the below.
Once you increase the number of placement groups, you must also increase
the number of placement groups for placement (pgp_num) before your
cluster will rebalance. The pgp_num should be equal to the pg_num. To
increase the number of placement groups for placement, execute t
They likely have too few placement groups. They can retrieve their current
value using ...
$ ceph osd pool get {pool-name} pg_num
Please have IS set the number of placement groups according to the below page.
http://ceph.com/docs/master/rados/operations/placement-groups/
Basically it should be
** Changed in: ceph (Ubuntu)
Assignee: (unassigned) => Dave Chiluk (chiluk)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1261501
Title:
ceph osds unbalanced
To manage notifications ab
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1121874
Title:
MySQL launch fails silently if < 4MB of disk space is available
To manage notifications about this bug go to:
https://bugs.launchpad.net/
** Patch added: "lp1121874.raring.debdiff"
https://bugs.launchpad.net/ubuntu/+source/mysql-5.5/+bug/1121874/+attachment/3930710/+files/lp1121874.raring.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.
I finally got some time to update these debdiffs.
** Patch added: "lp1121874.precise.debdiff"
https://bugs.launchpad.net/ubuntu/+source/mysql-5.5/+bug/1121874/+attachment/3930702/+files/lp1121874.precise.debdiff
** Patch removed: "lp1121874.precise.debdiff"
https://bugs.launchpad.net/ubun
** Patch added: "lp1121874.quantal.debdiff"
https://bugs.launchpad.net/ubuntu/+source/mysql-5.5/+bug/1121874/+attachment/3930709/+files/lp1121874.quantal.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpa
** Patch added: "lp1121874.saucy.debdiff"
https://bugs.launchpad.net/ubuntu/+source/mysql-5.5/+bug/1121874/+attachment/3930711/+files/lp1121874.saucy.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.ne
@mdeslaur
@james-page
Rebased the debdiffs against the latest mysql-5.5 in each series. I
also deleted the earlier debdiffs against the earlier versions.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bug
So this turned out to be a much bigger job than I think can be safely
SRU'ed. I narrowed the list down to 25-30 fixes depending on how you do
it, neither of which built at the end. Even if I spent the requisite
amount of time to get this building that doesn't mean I would have
successfully handle
Well apparently will not fix is not an option for me, so Opinion will
have to do.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1179610
Title:
poor performance of resize2fs on 12.04
To manage notif
** Package changed: e2fsprogs (Ubuntu Precise) => linux (Ubuntu Precise)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1179610
Title:
poor performance of resize2fs on 12.04
To manage notifications
** Branch unlinked: lp:ubuntu/quantal-proposed/mysql-5.5
** Branch unlinked: lp:ubuntu/precise-proposed/mysql-5.5
** Branch unlinked: lp:ubuntu/raring-proposed/mysql-5.5
** Branch unlinked: lp:ubuntu/saucy-proposed/mysql-5.5
** Description changed:
[Impact]
MySQL will not launch if less th
I removed the bzr branches related to the previous change that caused
the earlier regression.
I also have included updated debdiffs with a more readable solution.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.
rm
PATH=(custom, no user)
LANG=en_US.UTF-8
SHELL=/bin/bash
SourcePackage: bip
UpgradeStatus: No upgrade log present (probably fresh install)
** Affects: bip (Ubuntu)
Importance: Undecided
Assignee: Dave Chiluk (chiluk)
Status: In Progress
** Tags: amd64 apport-bug precise
Here is the debdiff that contains the CVE backport from quantal.
** Patch added: "lp1247888.precise.debdiff"
https://bugs.launchpad.net/ubuntu/+source/bip/+bug/1247888/+attachment/3899962/+files/lp1247888.precise.debdiff
--
You received this bug notification because you are a member of Ubunt
I'm currently running with the above debdiff on my server, and all
appears to be going well.
** Description changed:
+ [Impact]
+
+ * Bip crashes with "FATAL: Failed assetion in src/irc.c(2447): n" in
+ log
+
+ * Current version of bip in precise is vulnerable to the following CVE
+ http://we
** Changed in: procps (Ubuntu Saucy)
Assignee: (unassigned) => Dave Chiluk (chiluk)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1242746
Title:
SIGSEGV when file2str reads zero bytes
The proposed package is now installed on my server machine. I will
verify in a week if any more crashes have occurred.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1247888
Title:
bip crash with "F
Well sorry to burst everyone's bubble, but my bip server just crashed
again this morning.
The end of the log looks like this
05-11-2013 10:26:04 ERROR: Error in SSL handshake.
05-11-2013 10:26:04 ERROR: Error on fd 35 (state 3)
05-11-2013 10:26:04 ERROR: client read_lines error, closing...
06
ug/1150413/+attachment/3838616/+files/lp1150413_precise.debdiff
** Changed in: procps (Ubuntu)
Assignee: Matthias Klose (doko) => Dave Chiluk (chiluk)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net
*** This bug is a duplicate of bug 1150413 ***
https://bugs.launchpad.net/bugs/1150413
cisconetgineer please see bug #1150413
A test ppa is available with a proposed fix. Please test and report
back in 1150413
--
You received this bug notification because you are a member of Ubuntu
Bugs, w
** Patch removed: "procps_precise.debdiff"
https://bugs.launchpad.net/ubuntu/+source/procps/+bug/1150413/+attachment/3838616/+files/lp1150413_precise.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.ne
Thanks Javier for testing. I have since uploaded packages for quantal,
raring, and saucy which should get built shortly. I'll go ahead and
fill out the SRU now.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.n
** Patch added: "lp1150413_precise.debdiff"
https://bugs.launchpad.net/ubuntu/+source/procps/+bug/1150413/+attachment/3839128/+files/lp1150413_precise.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.n
** Patch added: "lp1150413_saucy.debdiff"
https://bugs.launchpad.net/ubuntu/+source/procps/+bug/1150413/+attachment/3839131/+files/lp1150413_saucy.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/b
** Patch added: "lp1150413_raring.debdiff"
https://bugs.launchpad.net/ubuntu/+source/procps/+bug/1150413/+attachment/3839130/+files/lp1150413_raring.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net
** Patch added: "lp1150413_quantal.debdiff"
https://bugs.launchpad.net/ubuntu/+source/procps/+bug/1150413/+attachment/3839129/+files/lp1150413_quantal.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.n
** Description changed:
- Both ps and pgrep exit with an error like "xrealloc: realloc(1073741824)
- failedCannot allocate memory" if there is a process owned by a user with
- a large number of groups.
+ [Impact]
+
+ * Users that are members of large numbers of groups are unable to run
+ procps
** Changed in: procps (Ubuntu Precise)
Status: Triaged => Confirmed
** Changed in: procps (Ubuntu Raring)
Status: Triaged => Confirmed
** Changed in: procps (Ubuntu Quantal)
Status: Triaged => Confirmed
--
You received this bug notification because you are a member of Ubunt
** Patch removed: "lp1150413_saucy.debdiff"
https://bugs.launchpad.net/ubuntu/+source/procps/+bug/1150413/+attachment/3839131/+files/lp1150413_saucy.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net
** Patch added: "lp1150413_quantal.debdiff"
https://bugs.launchpad.net/ubuntu/+source/procps/+bug/1150413/+attachment/3841230/+files/lp1150413_quantal.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.n
** Patch added: "lp1150413_raring.debdiff"
https://bugs.launchpad.net/ubuntu/+source/procps/+bug/1150413/+attachment/3841231/+files/lp1150413_raring.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net
I updated the debdiffs and resultant quilt patches to include dep3
information.
** Patch removed: "lp1150413_raring.debdiff"
https://bugs.launchpad.net/ubuntu/+source/procps/+bug/1150413/+attachment/3839130/+files/lp1150413_raring.debdiff
** Patch removed: "lp1150413_quantal.debdiff"
http
** Patch added: "lp1150413_saucy.debdiff"
https://bugs.launchpad.net/ubuntu/+source/procps/+bug/1150413/+attachment/3841232/+files/lp1150413_saucy.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/b
I'm uploading a trusty debdiff. At this point no one that has tried the
PPA has found an issue with it. So I think the next steps should be to
upload the fix to trusty, let it bake for a while, and then sru the
solution back from there.
** Patch added: "lp560839.trusty.debdiff"
https://bugs.
fixed per feedback from infinity
** Patch removed: "lp560839.trusty.debdiff"
https://bugs.launchpad.net/ubuntu/+source/memtest86+/+bug/560839/+attachment/3922423/+files/lp560839.trusty.debdiff
** Patch added: "lp560839.trusty.debdiff"
https://bugs.launchpad.net/ubuntu/+source/memtest86+/+
Fixed debdiff so that grub menu entries are not modified to specify elf.
** Patch removed: "lp560839.trusty.debdiff"
https://bugs.launchpad.net/ubuntu/+source/memtest86+/+bug/560839/+attachment/3922489/+files/lp560839.trusty.debdiff
** Patch added: "lp560839.trusty.debdiff"
https://bugs.l
no comment
** Patch removed: "lp560839.trusty.debdiff"
https://bugs.launchpad.net/ubuntu/+source/memtest86+/+bug/560839/+attachment/3922491/+files/lp560839.trusty.debdiff
** Patch added: "lp560839.trusty.debdiff"
https://bugs.launchpad.net/ubuntu/+source/memtest86+/+bug/560839/+attach
Yeah looks like the minimum amount of ram required to complete the
writing of a dump in the case of a generic-image and default initrd is
roughly 109-110M with the 3.8 kernel (I just tested it).
My $.02 on this matter is that the default values should work for
default installs. Right now that is
** Changed in: apt (Ubuntu)
Assignee: (unassigned) => Dave Chiluk (chiluk)
** Changed in: curl (Ubuntu)
Assignee: (unassigned) => Dave Chiluk (chiluk)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Tags removed: verification-needed-raring
** Tags added: verification-done-raring
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1182247
Title:
check_ide_smart fails with i/o error
To manage noti
** Patch added: "apt_lp1179781_quantal.debdiff"
https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1179781/+attachment/3795803/+files/apt_lp1179781_quantal.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launch
Updated apt so that
apt-transport-https depends on libcurl3-gnutls (appropriate curl version)
instead of a builddep for the whole package.
** Patch removed: "apt_lp1179781_raring.debdiff"
https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1179781/+attachment/3781066/+files/apt_lp1179781_rar
** Patch added: "apt_lp1179781_raring.debdiff"
https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1179781/+attachment/3795804/+files/apt_lp1179781_raring.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpa
@slangasek
Verification for curl can not really be completed, until the updated apt
gets pushed. That's because the issue that exists in curl only gets
exacerbated when using the updated apt.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to U
** Tags added: sts
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1481490
Title:
Add sfc to nic-modules udeb
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/l
** Also affects: debian-installer (Ubuntu)
Importance: Undecided
Status: New
** Changed in: debian-installer (Ubuntu Trusty)
Status: New => In Progress
** Changed in: debian-installer (Ubuntu Trusty)
Assignee: (unassigned) => Mathieu Trudel-Lapierre (mathieu-tl)
--
You rec
)
Status: New => In Progress
** Changed in: debian-installer (Ubuntu Vivid)
Assignee: (unassigned) => Dave Chiluk (chiluk)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1481490
Ti
** Changed in: linux-lts-utopic (Ubuntu)
Status: Invalid => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1481490
Title:
Add sfc to nic-modules udeb
To manage notifications abo
Thanks for spinning the new install images. I have confirmed that the
3.13.0-65 kernel netboot install worked without a hich. However I do
not have sfc hardware to test with.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bu
This same patch applies cleanly to both wily and vivid, but it has wily
in the changelog.
** Patch added: "lp1432871.wily.debdiff"
https://bugs.launchpad.net/ubuntu/+source/coreutils/+bug/1432871/+attachment/4482367/+files/lp1432871.wily.debdiff
--
You received this bug notification because
In order to solve this issue, I have written patches and got them integrated
upstream.
gnulib commit:
http://git.savannah.gnu.org/gitweb/?p=gnulib.git;a=commit;h=c6148bca89e9465fd6ba3a10d273ec4cb58c2dbe
and
coreutils commit:
http://git.savannah.gnu.org/gitweb/?p=coreutils.git;a=commit;h=3baba
** Description changed:
[Impact]
* df displays bind mounts instead of "real" mounts if the bind mount is
mounted to a shorter directory.
* justification - This is a change of behavior from precise
* Explanation - This patch checks to see if the source directory of a
mount i
** Description changed:
[Impact]
* df displays bind mounts instead of "real" mounts if the bind mount is
mounted to a shorter directory.
* justification - When trusty moved to using /proc/mounts this changed
behavior from precise. Additionally it doesn't make sense that a bind
** Changed in: coreutils (Ubuntu)
Status: Incomplete => In Progress
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1432871
Title:
`df` shows bind mounts instead of real mounts.
To manage noti
I opened
https://savannah.gnu.org/bugs/index.php?46438
against upstream findutils to see if we can't get them to to a blessed release
of 4.5 of findutils.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bug
I also reviewed the upstream patch that purports to resolve the issue
(7dc7006). This fix is contained within the 4.5.9 and newer versions of
findutils. That's where the good news ends. The code portion of that
single commit is 817 lines long. It doesn't apply cleanly, and it
appears to have som
Fix ftbfs on tests/df/total-unprocessed.sh
Apparently the buildds are running with a slightly different environment
than my local build machine which is causing this test to fail due to
smart quotes in the set LANG. Explicitly setting LANG=C appears to
resolve this.
** Patch added: "fixftbfs.deb
** Patch removed: "fixftbfs.debdiff"
https://bugs.launchpad.net/ubuntu/+source/coreutils/+bug/1432871/+attachment/4520226/+files/fixftbfs.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/14328
Alright so even though the buildds seem to be getting false failures, I
did find a regression in the recent build. I'm going to work through
that, and possibly open up a new bug for it, at least for vivid, wily,
and xenial.
--
You received this bug notification because you are a member of Ubuntu
So the regression I discovered was actually just behavior change. Due
to the change to /proc/self/mountinfo the filesystem type is now more
explicit. In this case that means that nfs mounts are now labeled nfs4.
Additionally I discovered that the test that is now failing was
previously being ski
** Changed in: coreutils (Ubuntu Vivid)
Status: New => In Progress
** Changed in: coreutils (Ubuntu Trusty)
Status: New => In Progress
** Changed in: coreutils (Ubuntu Wily)
Status: Fix Released => Fix Committed
--
You received this bug notification because you are a member
** Changed in: coreutils (Ubuntu Wily)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1432871
Title:
`df` shows bind mounts instead of real mounts.
To ma
igned) => Dave Chiluk (chiluk)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1463911
Title:
IPV6 fragmentation and mtu issue
To manage notifications about this bug go to:
https://bugs.launchpad.net
For those seeing this issue after 3.13.0-33.58, please ensure that the
virtual machine's host kernel is running 3.13.0-33.58 or newer. The VM
kernel itself does not matter.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.
I created a centos 6 nfsv4 server, and went through the above recreate
procedure with a trusty guest, and could successfully mount, and do file
operations with accton. However after a few minutes, the console hung,
and most tasks reported the following stack traces in /var/log/kern.log
INFO: task
** Changed in: nfs-utils (Ubuntu)
Assignee: (unassigned) => Dave Chiluk (chiluk)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1509120
Title:
Process accounting deadlock with idmapd call
I verified that keyutils is already included in vivid+ in order to fix
1449074. So this shouldn't be too much of an issue to fix in trusty as
well.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/150912
** Description changed:
+ [Impact]
+
+ * Programs accessing nfsv4 mounts will hang on request_key interface
+ with nfs4 + sec=sys with old nfsv4 hosts. Kernel is waiting on
+ usermodehelper provided by keyutils.
+
+ * INFO: task ls:2101 blocked for more than 120 seconds.
+ Not tainted 3
Add keyutils to Depends: for nfs-common
** Patch added: "lp1509120.trusty.debdiff"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1509120/+attachment/4512348/+files/lp1509120.trusty.debdiff
** Changed in: nfs-utils (Ubuntu)
Importance: Undecided => Medium
** Changed in: linux (Ubunt
Yeah, I think so, if you are "creative" enough to put your accounting on
your nfs mount, and then have your nfs service fail, you should expect
your machine to stop functioning. Otherwise it could be a potential
accounting/security hole.
--
You received this bug notification because you are a me
** Tags added: sts
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1509120
Title:
Process accounting deadlock with idmapd callout when writing to NFSv4
mount
To manage notifications about this bug
** Changed in: debian-installer (Ubuntu Trusty)
Status: Fix Released => In Progress
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1481490
Title:
Add sfc to nic-modules udeb
To manage notific
** Description changed:
[Impact]
- * Programs accessing nfsv4 mounts will hang on request_key interface
+ * Programs accessing nfsv4 mounts will hang on request_key interface
with nfs4 + sec=sys with old nfsv4 hosts. Kernel is waiting on
usermodehelper provided by keyutils.
- * INF
*** This bug is a duplicate of bug 1509120 ***
https://bugs.launchpad.net/bugs/1509120
This looks like a duplicate of
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1509120 .
The workaround is to install the keyutils package.
The fix will be to add keyutils to the Requires line for nfs
** Tags added: verification-done-utopic
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1481490
Title:
Add sfc to nic-modules udeb
To manage notifications about this bug go to:
https://bugs.launchpad
Here's the debdiff for trusty. The provenance of the patches are
included in the header of the debian/patches. I've tested this patch on
machines with the above issue as well as machines with varying
configurations of disk mounts, and remote mounts even.
** Patch added: "trusty.debdiff"
http
** Tags removed: verification-needed
** Tags added: verification-done-vivid verification-done-wily
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1432871
Title:
`df` shows bind mounts instead of real
** Description changed:
[Impact]
* Programs accessing nfsv4 mounts will hang on request_key interface
with nfs4 + sec=sys with old nfsv4 hosts. Kernel is waiting on
usermodehelper provided by keyutils.
* INFO: task ls:2101 blocked for more than 120 seconds.
Not tainted 3
Thanks a ton mterry!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1432871
Title:
`df` shows bind mounts instead of real mounts.
To manage notifications about this bug go to:
https://bugs.launchpad
Thanks ruddk, it was a pleasure. We will let this bake in -proposed for
a few weeks, and then barring any unforeseen issues it will get promoted
to -updates.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/b
Subscribing sponsors and sru team, as both are still necessary for
Trusty.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1432871
Title:
`df` shows bind mounts instead of real mounts.
To manage noti
** Changed in: findutils (Ubuntu)
Assignee: (unassigned) => Dave Chiluk (chiluk)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1347788
Title:
find crashed when current working directory is
** Changed in: findutils (Ubuntu)
Importance: Undecided => Low
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1347788
Title:
find crashed when current working directory is not readable and -exec
@mrobinson-o The trusty image with the Utopic image is waiting on a new
build and test cycle of the utopic kernel before those images can be
built. It is in process. We were able to simply rebuild the images for
3.13 and 3.19 as the sfc driver was already available in those kernels.
--
You rec
** Tags removed: verification-needed-trusty
** Tags added: verification-done-trusty
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1497048
Title:
Trusty - Null pointer dereference at queue_userspace_
An external user reported that this, resolved their issue. So I'm
marking this verification-done-trusty. Unfortunately there is no easy
way to reproduce this.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net
** Changed in: coreutils (Ubuntu Vivid)
Assignee: (unassigned) => Dave Chiluk (chiluk)
** Changed in: coreutils (Ubuntu Trusty)
Assignee: (unassigned) => Dave Chiluk (chiluk)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
Public bug reported:
quassel can't play audio notifications in wily.
As of quassel-client 0.12.2-0ubuntu1, the quassel client does not play
sound notifications when highlighted messages are received.
** Affects: quassel (Ubuntu)
Importance: Undecided
Status: New
--
You received t
In case anyone is wondering. The patch does not cleanly apply against
Trusty, and I'm working on a backport/appropriate cherrypick.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1432871
Title:
`df`
@Andrei Demin,
Have you opened a separate case for Samsung drives + RAID 0 + trim =
corruption? If so what is that bug number?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1338706
Title:
Samsung
** Changed in: linux (Ubuntu Trusty)
Assignee: (unassigned) => Dave Chiluk (chiluk)
** Changed in: linux (Ubuntu Utopic)
Assignee: (unassigned) => Dave Chiluk (chiluk)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Tags added: verification-done
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1247888
Title:
bip crash with "FATAL: Failed assetion in src/irc.c(2447): n
To manage notifications about this bug go
Is this testcase reproducible using an nfs server with a recent kernel?
Lots of improvements have been made to NFS in the many years since
2.6.32, including some concurrency improvements.
Thanks,
Dave.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscr
My apologies, I just noticed the deadlock on the mutex comment. Is this
reproducible with the upstream kernel on the client?
We provide mainline kernel builds for testing of this nature using our mainline
build repositories.
http://kernel.ubuntu.com/~kernel-ppa/mainline/
Also keep in mind, that
I also completed the same test as Chris above, without failure. I was
using Ubuntu trusty+3.13 as the server and Trusty +3.19 as the guest.
At the moment I don't see any reason to assume that there is anything
power specific in this issue, so I attempted on purely x86_64 hardware.
Also can we get
501 - 600 of 946 matches
Mail list logo