Bug#895381: Severity

2019-01-20 Thread micah anderson
Hello Sergio, I'm reviewing bugs that are currently release critical at our local bug squashing party, and I stumbled on yours. I'm not disputing this bug exists, I'm just trying to determine why it is you set the severity to "Serious". As you are probably aware, this severity indicates that th

Bug#781685: cryptsetup: prompt for password if device exists, otherwise don't block for it to appear

2015-04-01 Thread Micah Anderson
Package: initramfs-tools Version: 0.119 Severity: wishlist I have an encrypted USB drive that is not always attached to my system. With the default cryptsetup configuration, when the system boots, it asks me for the passphrase and everything is fine. If the device is not connected, then booting ta

Bug#699311: [wheezy] oops when unplugged USB audio headset

2013-02-27 Thread micah anderson
Hi Jonathan, Jonathan Nieder writes: > severity 699311 important > quit > > Hi Micah, > > micah anderson wrote: > >> I had plugged in a USB headset and I used it for various things. At some >> point >> I decided to remove it from the computer, so I p

Bug#661151: [apparmor] Bug#661151: linux-2.6: lacks AppArmor kernel/userspace interface

2012-05-30 Thread micah anderson
Hi all, Its been 2 months without a reply on this issue, and we are getting close to a freeze. Kees and John it looks like there are some pending questions for you below, it would be great if you could chime in with your opinons: >If the Debian kernel team was willing to carry some kind of AppAr

Bug#674424: linux-image-3.2.0-0.bpo.2-686-pae: hangs requiring power cycle

2012-05-24 Thread Micah Anderson
Package: linux-2.6 Version: 3.2.15-1~bpo60+1 Severity: normal *** Please type your report below this line *** We are experiencing periodic lock-ups since upgrading to the latest backport kernel. Its happened two nights in a row now, and previously happened two days before. The machine is a relati

Re: Linux 3.2 in wheezy

2012-01-31 Thread Micah Anderson
Ben Hutchings writes: > (See the complaints about removing OpenVZ in wheezy despite 4 years' > advance notice of this.) There were complaints when this was originally decided four years ago by the kernel team. What is disturbing is that the complaints then (lxc is not even close to being a drop-i

Re: Bug#605090: Linux 3.2 in wheezy

2012-01-31 Thread micah anderson
On Mon, 30 Jan 2012 22:26:50 +0100, Yves-Alexis Perez wrote: > On lun., 2012-01-30 at 14:08 +, Ben Hutchings wrote: > > On Mon, 2012-01-30 at 11:05 +0100, Yves-Alexis Perez wrote: > > > (adding few CC:s to keep track on the bug) > > > > > > On dim., 2012-01-29 at 21:26 +, Ben Hutchings wr

Re: Outdated linux-2.6 backport

2012-01-23 Thread micah anderson
On Mon, 23 Jan 2012 16:30:29 +0100, Alexander Wirt wrote: > Ben Hutchings schrieb am Montag, den 23. Januar 2012: > > > On Mon, 2012-01-23 at 08:16 +0100, Marcus Osdoba wrote: > > > Am 18.01.2012 04:42, schrieb Ben Hutchings: > > > >> cpufrequtils (007-2) > > > >> > > > >> A separate build-contai

Bug#638231: linux-image-2.6.32-5-686-bigmem: instability when using ext4

2011-08-17 Thread Micah Anderson
Package: linux-image-2.6.32-5-686-bigmem Version: 2.6.32-35 Severity: important Tags: squeeze I have two machines that I upgraded to squeeze and migrated their ext3 filesystems to ext4 due to very high i/o and deep directory hierarchy. These two machines have been crashing regularly since the ext4

Bug#605090: Updated patch

2011-02-09 Thread micah anderson
On Wed, 9 Feb 2011 18:51:02 +0100, maximilian attems wrote: > > > > first of all merging a patch that deviates from mainline for an > > > eternety and shows zero interest of upstream merging is not a > > > good candidate. You get longterm plenty of cost versus allmost > > > no benefit. > > > >

Bug#603927: solved

2010-11-30 Thread Micah Anderson
It looks like the solution to this problem was to turn on ACPI in the BIOS, things boot fine again. Closing the bug, full details on xen-devel list. micah -- pgpvC6yiQl1QI.pgp Description: PGP signature

Bug#603927: linux-image-2.6.32-5-xen-686: booting with xen enabled fails to bring up ATA devices

2010-11-23 Thread micah anderson
Hi Ian, On Tue, 23 Nov 2010 13:23:41 +, Ian Campbell wrote: > I am assuming that this the same issue as you reported on xen-devel in > the "aic79xx failures with pvops dom0 2.6.32.25"[0] / "ATA driver > failures with pvops dom0"[1] thread recently? Indeed, I got some purchase with upstream

Bug#601625: linux-patch-debian-2.6.32: unapplying 18 fails

2010-10-27 Thread Micah Anderson
Package: linux-patch-debian-2.6.32 Version: 2.6.32-26 Severity: normal r...@cassowary:/usr/src/linux-source-2.6.32# /usr/src/kernel-patches/all/2.6.32/unpatch/debian all --> 19 fully unapplied. --> Try to unapply 18. (+) OK bugfix/all/3c59x-Fix-call-to-mdio_sync-with-the-wron

Bug#570382: after upgrade: "vlogin: openpty(): No such file or directory"

2010-08-24 Thread micah anderson
On Mon, 23 Aug 2010 21:56:17 +0200 (CEST), Tomas Pospisek wrote: > On a different note: the last update to the most recent DSA kernels [2] > went completely smoothly - that is all vservers restarted without a > hickup. Makes me wonder if that was caused by a change in the > 2.6.26-24lenny1 ke

Bug#570382: after upgrade: "vlogin: openpty(): No such file or directory"]

2010-05-10 Thread micah anderson
I can confirm that this manifested with the 2.6.26-21lenny3 security upgrade in Feburary (DSA-1996). It seems like what happens is when the system boots, it runs the /etc/init.d/util-vserver script, which attempts to automatically start all the guests which have the 'default' mark. Sometimes thing

Bug#576838: KVM: networking stack tanks after page allocation failure

2010-04-25 Thread micah anderson
On Sat, 10 Apr 2010 11:13:11 -0400, micah anderson wrote: > On Sat, 10 Apr 2010 12:17:51 +0100, Ben Hutchings > wrote: > > On Fri, 2010-04-09 at 23:38 -0400, micah anderson wrote: > > > On Sat, 10 Apr 2010 01:48:24 +0100, Ben Hutchings > > > wrote: > > &

Bug#576838: KVM: networking stack tanks after page allocation failure

2010-04-10 Thread micah anderson
On Sat, 10 Apr 2010 12:17:51 +0100, Ben Hutchings wrote: > On Fri, 2010-04-09 at 23:38 -0400, micah anderson wrote: > > On Sat, 10 Apr 2010 01:48:24 +0100, Ben Hutchings > > wrote: > > > On Thu, 2010-04-08 at 12:41 -0400, micah anderson wrote: > > > >

Bug#576838: KVM: networking stack tanks after page allocation failure

2010-04-09 Thread micah anderson
On Sat, 10 Apr 2010 01:48:24 +0100, Ben Hutchings wrote: > On Thu, 2010-04-08 at 12:41 -0400, micah anderson wrote: > > On 2010-04-08, micah anderson wrote: > > > On Wed, 2010-04-07 at 11:52 -0400, Micah Anderson wrote: > > > > Package: linux-image-2.6.32-2-amd64 >

Bug#576838: KVM: networking stack tanks after page allocation failure

2010-04-08 Thread micah anderson
On 2010-04-08, micah anderson wrote: > On Wed, 2010-04-07 at 11:52 -0400, Micah Anderson wrote: > > Package: linux-image-2.6.32-2-amd64 > > Version: 2.6.32-8~bpo50+1 > > Severity: important > > > > I'm running a tor exit node on a kvm instance, it runs for a

Bug#576838: KVM: networking stack tanks after page allocation failure

2010-04-07 Thread Micah Anderson
Package: linux-image-2.6.32-2-amd64 Version: 2.6.32-8~bpo50+1 Severity: important I'm running a tor exit node on a kvm instance, it runs for a little while (between an hour and 3 days), doing 30-40mbit/sec and then suddenly 'swapper: page allocation failure' happens, and the entire networking stac

Bug#504805: anoher iret exception

2009-11-27 Thread micah anderson
[136556.763720] iret exception: [#1] SMP [136556.763803] Modules linked in: xt_tcpudp xt_physdev iptable_filter ip_tables x_tables tun netloop bridge ipv6 loop serio_raw psmouse container pcspkr button i2c_i801 intel_rng i2c_core rng_core shpchp e7xxx_edac pci_hotplug edac_core joydev evdev e

Bug#504805: some more crash logs

2009-11-25 Thread micah anderson
Excerpts from micah anderson's message of Tue Nov 24 20:20:51 -0500 2009: > Excerpts from Ben Hutchings's message of Tue Nov 24 18:51:45 -0500 2009: > > On Tue, 2009-11-24 at 18:17 -0500, micah anderson wrote: > > > I keep getting them, so I'll keep sending them:

Bug#504805: some more crash logs

2009-11-24 Thread micah anderson
Excerpts from Ben Hutchings's message of Tue Nov 24 18:51:45 -0500 2009: > On Tue, 2009-11-24 at 18:17 -0500, micah anderson wrote: > > I keep getting them, so I'll keep sending them: > > Which kernel version are you using? Version 2.6.26-20 in > stable-proposed-

Bug#504805: some more crash logs

2009-11-24 Thread micah anderson
I keep getting them, so I'll keep sending them: [366904.120247] iret exception: [#1] SMP [366904.120332] Modules linked in: xt_tcpudp xt_physdev iptable_filter ip_tables x_tables tun netloop bridge ipv6 loop serio_raw i2c_i801 psmouse intel_rng rng_core i2c_core pcspkr container button sh

Bug#504805: Changed hardware, still happening

2009-11-19 Thread micah anderson
Hi, Yesterday we completely swapped the entire machine, where this was happening, with another identical machine. We just took the disks out of the one that had been crashing and put them into this other machine. Today, on the new hardware, it crashed again: [64631.057499] iret exception:

Bug#504805: Another crash

2009-11-15 Thread micah anderson
(XEN) domain_crash_sync called from entry.S (ff188600) (XEN) Domain 0 (vcpu#1) crashed on cpu#0: (XEN) [ Xen-3.2-1 x86_32p debug=n Not tainted ] (XEN) CPU:0 (XEN) EIP:0061:[] (XEN) EFLAGS: 0246 CONTEXT: guest (XEN) eax: ebx: 0001 ecx: edx: ed467

Bug#504805: and another....

2009-11-07 Thread Micah Anderson
Can I provide more information, or is there anything else I can do to help fix this? (XEN) domain_crash_sync called from entry.S (ff188600) (XEN) Domain 0 (vcpu#0) crashed on cpu#0: (XEN) [ Xen-3.2-1 x86_32p debug=n Not tainted ] (XEN) CPU:0 (XEN) EIP:0061:[] (XEN) EFLAGS:

Bug#504805: more information about this problem

2009-11-03 Thread Micah Anderson
And another crash today, slightly different: (XEN) domain_crash_sync called from entry.S (ff188600) (XEN) Domain 0 (vcpu#1) crashed on cpu#1: (XEN) [ Xen-3.2-1 x86_32p debug=n Not tainted ] (XEN) CPU:1 (XEN) EIP:0061:[] (XEN) EFLAGS: 0246 CONTEXT: guest (XEN) eax: 000

Bug#504805: more information about this problem

2009-11-02 Thread Micah Anderson
I too have been a victim of this problem, on a number of machines. I fed the lines into addr2line -e vmlinux after rebuilding the kernel with this flavor to get the vmlinux. This looks clearly like a xen bug, the kernel does some I/O, which gets queued, but for some reason the request causes a v

Bug#544756: [Secure-testing-team] Bug#544756: linux-image-2.6.26-2-686: Kernel still vulnerable by dsa-1862

2009-09-03 Thread Micah Anderson
* Christoph Siess [2009-09-02 14:57-0400]: > Package: linux-image-2.6.26-2-686 > Version: 2.6.26-17lenny2 > Severity: critical > Tags: security > Justification: root security hole > > > Hi, > > according to http://www.debian.org/security/2009/dsa-1862 this Version of the > 2.6.26-2 Kernel shou

Re: Stable Linux-Vserver patch plans

2009-06-29 Thread Micah Anderson
Micah Anderson writes: > I wanted to start a discussion about the plans for the stable kernel > in the next point release, specifically where it relates to the > Linux-Vserver patch-set. *taps microphone* So... one month went by since I sent this message, the new stable release of L

Stable Linux-Vserver patch plans

2009-05-27 Thread Micah Anderson
Hi, I wanted to start a discussion about the plans for the stable kernel in the next point release, specifically where it relates to the Linux-Vserver patch-set. As we all know, the 2.6.26 kernel is the version that Lenny ended up with and the Linux-Vserver patch that was under development (and

Bug#517449: Experiencing this problem also

2009-03-30 Thread Micah Anderson
I experienced this problem on a machine with 12gigs of memory when I added a failed disk back into a mdadm array, output included below. The machine basically was totally frozen for 10 minutes or so until the raid array finished its sync, and then everything returned to normal. Pretty ugly, would

Re: Scheduling linux-2.6 2.6.26-3

2008-08-25 Thread Micah Anderson
ing a release exception to sync these up: * Micah Anderson <[EMAIL PROTECTED]> [2008-08-21 15:31-0400]: > * dann frazier <[EMAIL PROTECTED]> [2008-08-21 10:51-0400]: > > On Thu, Aug 21, 2008 at 01:43:44PM -0400, Micah Anderson wrote: > > > * dann frazier <[EM

Re: Scheduling linux-2.6 2.6.26-3

2008-08-21 Thread Micah Anderson
* dann frazier <[EMAIL PROTECTED]> [2008-08-21 10:51-0400]: > On Thu, Aug 21, 2008 at 01:43:44PM -0400, Micah Anderson wrote: > > * dann frazier <[EMAIL PROTECTED]> [2008-08-20 17:59-0400]: > > This is a user-space issue, not a kernel issue. Using an older version >

Re: Scheduling linux-2.6 2.6.26-3

2008-08-21 Thread Micah Anderson
* dann frazier <[EMAIL PROTECTED]> [2008-08-20 17:59-0400]: > On Mon, Aug 18, 2008 at 02:40:41AM -0600, dann frazier wrote: > > On Fri, Aug 15, 2008 at 09:51:33PM +0200, Bastian Blank wrote: > > > Hi folks > > > > > > I'd like to schedule the upload of linux-2.6 2.6.26-3 for monday. > > > > > > T

Re: Bug#495009: closed by Bastian Blank (Re: Bug#495009: please update vserver patch and re enable it)

2008-08-16 Thread Micah Anderson
maximilian attems <[EMAIL PROTECTED]> writes: Hi all, > On Thu, Aug 14, 2008 at 12:30:05PM +0300, Arturas K. wrote: >> * I know you guys are busy - so am I, but I am eager to try and help on >> this particular feature. > > please stop waffling. > > if you checked current sid repo you'd see that

Bug#489387: vserver patch available for 2.6.26

2008-08-14 Thread Micah Anderson
* Micah Anderson <[EMAIL PROTECTED]> [2008-08-13 16:26-0400]: > > There is a working patch available as of yesterday for 2.6.25 and > 2.6.25.2 which fixes both ext4 and xfs. It has had the 'dontuse' flag > removed and is considered pre5. Err, my mistake, I meant

Bug#489387: vserver patch available for 2.6.26

2008-08-13 Thread Micah Anderson
There is a working patch available as of yesterday for 2.6.25 and 2.6.25.2 which fixes both ext4 and xfs. It has had the 'dontuse' flag removed and is considered pre5. micah signature.asc Description: Digital signature

Re: Bug#489387: Please do not replace vserver with openvz.

2008-08-12 Thread Micah Anderson
Bastian Blank <[EMAIL PROTECTED]> writes: > On Fri, Aug 08, 2008 at 04:42:03PM -0500, William Pitcock wrote: >> It appears the plan is to drop vserver in favour of openvz, offering >> openvz as an alternative and perhaps default is a good option, but >> please do not remove vservers, as there are

Bug#357545: linux-source-2.6.15: local redeclaration of name_to_dev_t in drivers/mtd/devices/blkmtd.c

2006-03-17 Thread Micah Anderson
Package: linux-source-2.6.15 Version: 2.6.15-8 Severity: normal Tags: patch There is a local redeclaration of name_to_dev_t in drivers/mtd/devices/blkmtd.c:617 which is inconsistant with the function in mount.h. The way to fix this would be to remove the declaration and include the mount.h as th

Re: automatic custom kernels?

2005-12-05 Thread Micah Anderson
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Andreas Barth wrote: > I usually want to have some "flavoured" kernels, i.e. they should > contain certain (custom) patches. Now, there are the official source > packages, and of course binaries from them. However, if I need my own > kernel, it takes

Bug#332381: This problem has broader implications

2005-11-27 Thread Micah Anderson
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Although the original report says, "After 250 days, the jiffies overflow and ipt_recent do not work anymore" and is for 2.4, I've actually found that the code included in 2.6.8 (and probably any kernel version that includes ipt_recent) causes unexpect

Re: DTSA for 2.6.8 and 2.4.27

2005-09-09 Thread Micah Anderson
Horms schrieb am Friday, den 09. September 2005: > On Thu, Sep 08, 2005 at 09:17:25PM -0500, Micah Anderson wrote: > > Hi, > > > > I think it would be a good idea to get a DTSA (Debian Testing Security > > Advisory) issued for 2.4.27 and 2.6.8. > > That seem

Re: [Secure-testing-team] DTSA for 2.6.8 and 2.4.27

2005-09-09 Thread Micah Anderson
Moritz Muehlenhoff schrieb am Friday, den 09. September 2005: > Micah Anderson wrote: > > Neither of these advisories is a typical DTSA, as we normally we only do > > advisories for things that are blocked from reaching testing by some other > > issue, but I think that i

DTSA for 2.6.8 and 2.4.27

2005-09-08 Thread Micah Anderson
Hi, I think it would be a good idea to get a DTSA (Debian Testing Security Advisory) issued for 2.4.27 and 2.6.8. 2.4.27-11 is already in testing, but the number of security bugs fixed in this version is significant: there are 9 CAN numbers for 2.4.27-11[1]; and 4 other security patches that do

Bug#319629: [CAN-2005-1768]: Race condition in ia32 compatability code for execve causes local DoS

2005-07-23 Thread Micah Anderson
Package: kernel-source-2.4.27 Version: 2.4.27-10 Severity: normal Tags: security http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1768 reads: Race condition in the ia32 compatibility code for the execve system call in Linux kernel 2.4 before 2.4.31 and 2.6 before 2.6.6 allows local user

Bug#303426: kernel-source-2.6.8: ext3 xattr/dquot reports incorrect quota

2005-04-06 Thread Micah Anderson
Package: kernel-source-2.6.8 Version: 2.6.8-15 Severity: normal Tags: patch There is a subtle bug in error handling of ext2 and ext3 xattrs. When ext2_sync_inode() or ext3_xattr_block_set() fails because it could not write the inode's dirty data (ENOSPC), it doesn't keep the xattrs in a consistent

Bug#303424: kernel-source-2.6.8: spinlock assert can crash kernel when compiled with up/spinlock_debug

2005-04-06 Thread Micah Anderson
Package: kernel-source-2.6.8 Version: 2.6.8-15 Severity: normal Tags: patch If you set in the config CONFIG_DEBUG_SPINLOCK=y and have CONFIG_SMP=n then the various spinlock checks in the kernel can cause the kernel to crash, an example of one of these spinlock checks is the code: BUG_ON(!spin_is_

Bug#300838: [CAN-2005-0210]: Netfilter in Linux kernel 2.6.8.1 allows remote attackers to cause a denial of service

2005-03-21 Thread Micah Anderson
Package: kernel-source-2.6.8 Version: 2.6.8-14 Severity: normal Tags: security Greetings, CAN-2005-0210 reads: Netfilter in the Linux kernel 2.6.8.1 allows local users to cause a denial of service (memory consumption) via certain packet fragments that are reassembled twice, which causes a data s

Bug#300163: [CAN-2004-1191]: Race condition could allow local users to read unauthorized memory from "foreign memory pages."

2005-03-17 Thread Micah Anderson
Package: kernel-source-2.6.8 Version: 2.6.8-14 Severity: normal Tags: security patch CAN-2004-1191 reads: Race condition ... when run on SMP systems that have more than 4GB of memory, could allow local users to read unauthorized memory from "foreign memory pages." Apparantly it also allows remote

Bug#300162: [CAN-2004-1191]: Improper command checking for CDs, allowing local users to conduct unauthorized writes to firmware

2005-03-17 Thread Micah Anderson
Package: kernel-source-2.6.8 Version: 2.6.8-14 Severity: normal Tags: security patch Hello, CAN-2004-1190 reads: SUSE Linux before 9.1 and SUSE Linux Enterprise Server before 9 do not properly check commands sent to CD devices that have been opened read-only, which could allow local users to con

Bug#296700: Suspect this is in 2.6.10 as well

2005-02-28 Thread Micah Anderson
s the thread for reference: http://groups-beta.google.com/group/linux.kernel/browse_thread/thread/1fd2bd7a57fac50c/197ace52b8cf3b8b Thanks, micah On Thu, 24 Feb 2005, Horms wrote: > On Thu, Feb 24, 2005 at 12:43:14AM -0600, Micah Anderson wrote: > > I looked over the 2.6.10 changelogs and d

Bug#296700: Suspect this is in 2.6.10 as well

2005-02-23 Thread Micah Anderson
I looked over the 2.6.10 changelogs and do not see this being either fixed, or that particular file being changed. Although I do see that it has changed slightly, the piece that is replaced in this patch is not replaced here. As a result, I am not able to determine myself if 2.6.10 is also suscepti

Bug#296700: [CAN-2005-0204]: AMD64, allows local users to write to privileged IO ports via OUTS instruction

2005-02-23 Thread Micah Anderson
Package: kernel-source-2.6.8 Version: 2.6.8-13 Severity: normal Tags: security patch Hello, CAN-2005-0204 reads: Linux kernel before 2.6.9, when running on the AMD64 and Intel EM64T architectures, allows local users to write to privileged IO ports via the OUTS instruction. Although this says "b