Hi Michael,
Am 29.09.2014 um 08:37 schrieb Michael Tokarev :
> [Rehashing a somewhat old thread...]
> 08.08.2014 14:55, Zimmermann, Alexander wrote:
>
>> So here is the full output. Vanilla Linux 3.16. No patches. There is
>> definitely something
>> broken in the us
Am 07.08.2014 um 15:02 schrieb Alexander Zimmermann
:
>
> Am 06.08.2014 um 07:42 schrieb Michael Tokarev :
>
>> 05.08.2014 17:36, Zimmermann, Alexander wrote:
>>
>>> Despite the fact that I was unable to write a proper wrapper :-) - the
>>> kernel
Am 06.08.2014 um 07:42 schrieb Michael Tokarev :
> 05.08.2014 17:36, Zimmermann, Alexander wrote:
>
>> Despite the fact that I was unable to write a proper wrapper :-) - the
>> kernel crashes -
>> I know now that neither busybox nor AUFS is the culprit. See below:
>
Am 01.08.2014 um 13:46 schrieb Michael Tokarev :
> 01.08.2014 15:37, Zimmermann, Alexander wrote:
>
>> As you can see, we use a vanilla 3.14 Kernel, patched w/ official AUFS patch
>> (see
>> http://aufs.sourceforge.net)
>
> I too use aufs here, for a very long
Hi Michael,
Am 31.07.2014 um 20:53 schrieb Michael Tokarev :
> Control: tag -1 + moreinfo
>
> 31.07.2014 11:56, Zimmermann, Alexander wrote:
>> Package: busybox
>> Version: 1:1.22.0-6
>> Severity: important
>>
>> Dear Maintainer,
>>
>> we hav
Package: busybox
Version: 1:1.22.0-6
Severity: important
Dear Maintainer,
we have a PXE environments in our lab, where we boot both physical boxes
and XEN machines via NFS from one centralized Debian SID image. While
the kernel/initramfs mounts the image correctly read only (I set a
breakpoint ju
6 matches
Mail list logo