'modprobe aoe' on Karmic kernel oopses with AOE device from Jaunty
Bug #410198 reported by
Dmitrii Zagorodnov
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
linux (Ubuntu) |
Fix Released
|
High
|
Andy Whitcroft | ||
Karmic |
Fix Released
|
High
|
Andy Whitcroft |
Bug Description
To replicate the problem with two machines: on machine 'a', that is not running karmic (jaunty), run vblade and export an AOE device on the network. On machine 'b' that is running Karmic, run 'modprobe aoe'. As soon as the /dev/etherd devices are discovered/
Related branches
Changed in linux (Ubuntu): | |
importance: | Undecided → Medium |
tags: | added: regression-potential |
Changed in linux (Ubuntu Karmic): | |
milestone: | none → karmic-alpha-5 |
Changed in linux (Ubuntu Karmic): | |
status: | Incomplete → In Progress |
To post a comment you must log in.
Thank you for taking the time to report this bug and helping to make Ubuntu better. This bug did not have a package associated with it, which is important for ensuring that it gets looked at by the proper developers. You can learn more about finding the right package at https:/ /wiki.ubuntu. com/Bugs/ FindRightPackag e. I have classified this bug as a bug in linux which provides the kernel. /wiki.ubuntu. com/ReportingBu gs.
For future reference you might be interested to know that a lot of applications have bug reporting functionality built in to them. This can be accessed via the Report a Problem option in the Help menu for the application with which you are having an issue. You can learn more about this feature at https:/