Hello Sergio,
I'm reviewing bugs that are currently release critical at our local bug
squashing party, and I stumbled on yours.
I'm not disputing this bug exists, I'm just trying to determine why it
is you set the severity to "Serious". As you are probably aware, this
severity indicates that th
Package: initramfs-tools
Version: 0.119
Severity: wishlist
I have an encrypted USB drive that is not always attached to my
system. With the default cryptsetup configuration, when the system
boots, it asks me for the passphrase and everything is fine. If the
device is not connected, then booting ta
Hi Jonathan,
Jonathan Nieder writes:
> severity 699311 important
> quit
>
> Hi Micah,
>
> micah anderson wrote:
>
>> I had plugged in a USB headset and I used it for various things. At some
>> point
>> I decided to remove it from the computer, so I p
Hi all,
Its been 2 months without a reply on this issue, and we are getting
close to a freeze. Kees and John it looks like there are some pending
questions for you below, it would be great if you could chime in with
your opinons:
>If the Debian kernel team was willing to carry some kind of AppAr
Package: linux-2.6
Version: 3.2.15-1~bpo60+1
Severity: normal
*** Please type your report below this line ***
We are experiencing periodic lock-ups since upgrading to the latest backport
kernel. Its happened two nights in a row now, and previously happened two days
before. The machine is a relati
Ben Hutchings writes:
> (See the complaints about removing OpenVZ in wheezy despite 4 years'
> advance notice of this.)
There were complaints when this was originally decided four years ago by
the kernel team. What is disturbing is that the complaints then (lxc is
not even close to being a drop-i
On Mon, 30 Jan 2012 22:26:50 +0100, Yves-Alexis Perez wrote:
> On lun., 2012-01-30 at 14:08 +, Ben Hutchings wrote:
> > On Mon, 2012-01-30 at 11:05 +0100, Yves-Alexis Perez wrote:
> > > (adding few CC:s to keep track on the bug)
> > >
> > > On dim., 2012-01-29 at 21:26 +, Ben Hutchings wr
On Mon, 23 Jan 2012 16:30:29 +0100, Alexander Wirt wrote:
> Ben Hutchings schrieb am Montag, den 23. Januar 2012:
>
> > On Mon, 2012-01-23 at 08:16 +0100, Marcus Osdoba wrote:
> > > Am 18.01.2012 04:42, schrieb Ben Hutchings:
> > > >> cpufrequtils (007-2)
> > > >>
> > > >> A separate build-contai
Package: linux-image-2.6.32-5-686-bigmem
Version: 2.6.32-35
Severity: important
Tags: squeeze
I have two machines that I upgraded to squeeze and migrated their ext3
filesystems to ext4 due to very high i/o and deep directory hierarchy. These two
machines have been crashing regularly since the ext4
On Wed, 9 Feb 2011 18:51:02 +0100, maximilian attems wrote:
>
> > > first of all merging a patch that deviates from mainline for an
> > > eternety and shows zero interest of upstream merging is not a
> > > good candidate. You get longterm plenty of cost versus allmost
> > > no benefit.
> >
> >
It looks like the solution to this problem was to turn on ACPI in the
BIOS, things boot fine again.
Closing the bug, full details on xen-devel list.
micah
--
pgpvC6yiQl1QI.pgp
Description: PGP signature
Hi Ian,
On Tue, 23 Nov 2010 13:23:41 +, Ian Campbell wrote:
> I am assuming that this the same issue as you reported on xen-devel in
> the "aic79xx failures with pvops dom0 2.6.32.25"[0] / "ATA driver
> failures with pvops dom0"[1] thread recently?
Indeed, I got some purchase with upstream
Package: linux-patch-debian-2.6.32
Version: 2.6.32-26
Severity: normal
r...@cassowary:/usr/src/linux-source-2.6.32#
/usr/src/kernel-patches/all/2.6.32/unpatch/debian all
--> 19 fully unapplied.
--> Try to unapply 18.
(+) OK bugfix/all/3c59x-Fix-call-to-mdio_sync-with-the-wron
On Mon, 23 Aug 2010 21:56:17 +0200 (CEST), Tomas Pospisek
wrote:
> On a different note: the last update to the most recent DSA kernels [2]
> went completely smoothly - that is all vservers restarted without a
> hickup. Makes me wonder if that was caused by a change in the
> 2.6.26-24lenny1 ke
I can confirm that this manifested with the 2.6.26-21lenny3 security
upgrade in Feburary (DSA-1996). It seems like what happens is when the
system boots, it runs the /etc/init.d/util-vserver script, which
attempts to automatically start all the guests which have the 'default'
mark. Sometimes thing
On Sat, 10 Apr 2010 11:13:11 -0400, micah anderson wrote:
> On Sat, 10 Apr 2010 12:17:51 +0100, Ben Hutchings
> wrote:
> > On Fri, 2010-04-09 at 23:38 -0400, micah anderson wrote:
> > > On Sat, 10 Apr 2010 01:48:24 +0100, Ben Hutchings
> > > wrote:
> > &
On Sat, 10 Apr 2010 12:17:51 +0100, Ben Hutchings wrote:
> On Fri, 2010-04-09 at 23:38 -0400, micah anderson wrote:
> > On Sat, 10 Apr 2010 01:48:24 +0100, Ben Hutchings
> > wrote:
> > > On Thu, 2010-04-08 at 12:41 -0400, micah anderson wrote:
> > > >
On Sat, 10 Apr 2010 01:48:24 +0100, Ben Hutchings wrote:
> On Thu, 2010-04-08 at 12:41 -0400, micah anderson wrote:
> > On 2010-04-08, micah anderson wrote:
> > > On Wed, 2010-04-07 at 11:52 -0400, Micah Anderson wrote:
> > > > Package: linux-image-2.6.32-2-amd64
>
On 2010-04-08, micah anderson wrote:
> On Wed, 2010-04-07 at 11:52 -0400, Micah Anderson wrote:
> > Package: linux-image-2.6.32-2-amd64
> > Version: 2.6.32-8~bpo50+1
> > Severity: important
> >
> > I'm running a tor exit node on a kvm instance, it runs for a
Package: linux-image-2.6.32-2-amd64
Version: 2.6.32-8~bpo50+1
Severity: important
I'm running a tor exit node on a kvm instance, it runs for a little
while (between an hour and 3 days), doing 30-40mbit/sec and then
suddenly 'swapper: page allocation failure' happens, and the entire
networking stac
[136556.763720] iret exception: [#1] SMP
[136556.763803] Modules linked in: xt_tcpudp xt_physdev iptable_filter
ip_tables x_tables tun netloop bridge ipv6 loop serio_raw psmouse container
pcspkr button i2c_i801 intel_rng i2c_core rng_core shpchp e7xxx_edac
pci_hotplug edac_core joydev evdev e
Excerpts from micah anderson's message of Tue Nov 24 20:20:51 -0500 2009:
> Excerpts from Ben Hutchings's message of Tue Nov 24 18:51:45 -0500 2009:
> > On Tue, 2009-11-24 at 18:17 -0500, micah anderson wrote:
> > > I keep getting them, so I'll keep sending them:
Excerpts from Ben Hutchings's message of Tue Nov 24 18:51:45 -0500 2009:
> On Tue, 2009-11-24 at 18:17 -0500, micah anderson wrote:
> > I keep getting them, so I'll keep sending them:
>
> Which kernel version are you using? Version 2.6.26-20 in
> stable-proposed-
I keep getting them, so I'll keep sending them:
[366904.120247] iret exception: [#1] SMP
[366904.120332] Modules linked in: xt_tcpudp xt_physdev iptable_filter
ip_tables x_tables tun netloop bridge ipv6 loop serio_raw i2c_i801 psmouse
intel_rng rng_core i2c_core pcspkr container button sh
Hi,
Yesterday we completely swapped the entire machine, where this was
happening, with another identical machine. We just took the disks out of
the one that had been crashing and put them into this other machine.
Today, on the new hardware, it crashed again:
[64631.057499] iret exception:
(XEN) domain_crash_sync called from entry.S (ff188600)
(XEN) Domain 0 (vcpu#1) crashed on cpu#0:
(XEN) [ Xen-3.2-1 x86_32p debug=n Not tainted ]
(XEN) CPU:0
(XEN) EIP:0061:[]
(XEN) EFLAGS: 0246 CONTEXT: guest
(XEN) eax: ebx: 0001 ecx: edx: ed467
Can I provide more information, or is there anything else I can do to
help fix this?
(XEN) domain_crash_sync called from entry.S (ff188600)
(XEN) Domain 0 (vcpu#0) crashed on cpu#0:
(XEN) [ Xen-3.2-1 x86_32p debug=n Not tainted ]
(XEN) CPU:0
(XEN) EIP:0061:[]
(XEN) EFLAGS:
And another crash today, slightly different:
(XEN) domain_crash_sync called from entry.S (ff188600)
(XEN) Domain 0 (vcpu#1) crashed on cpu#1:
(XEN) [ Xen-3.2-1 x86_32p debug=n Not tainted ]
(XEN) CPU:1
(XEN) EIP:0061:[]
(XEN) EFLAGS: 0246 CONTEXT: guest
(XEN) eax: 000
I too have been a victim of this problem, on a number of machines. I fed
the lines into addr2line -e vmlinux after rebuilding the kernel with
this flavor to get the vmlinux.
This looks clearly like a xen bug, the kernel does some I/O, which gets
queued, but for some reason the request causes a v
* Christoph Siess [2009-09-02 14:57-0400]:
> Package: linux-image-2.6.26-2-686
> Version: 2.6.26-17lenny2
> Severity: critical
> Tags: security
> Justification: root security hole
>
>
> Hi,
>
> according to http://www.debian.org/security/2009/dsa-1862 this Version of the
> 2.6.26-2 Kernel shou
Micah Anderson writes:
> I wanted to start a discussion about the plans for the stable kernel
> in the next point release, specifically where it relates to the
> Linux-Vserver patch-set.
*taps microphone*
So... one month went by since I sent this message, the new stable
release of L
Hi,
I wanted to start a discussion about the plans for the stable kernel
in the next point release, specifically where it relates to the
Linux-Vserver patch-set.
As we all know, the 2.6.26 kernel is the version that Lenny ended up
with and the Linux-Vserver patch that was under development (and
I experienced this problem on a machine with 12gigs of memory when I
added a failed disk back into a mdadm array, output included below. The
machine basically was totally frozen for 10 minutes or so until the raid
array finished its sync, and then everything returned to normal. Pretty
ugly, would
ing a
release exception to sync these up:
* Micah Anderson <[EMAIL PROTECTED]> [2008-08-21 15:31-0400]:
> * dann frazier <[EMAIL PROTECTED]> [2008-08-21 10:51-0400]:
> > On Thu, Aug 21, 2008 at 01:43:44PM -0400, Micah Anderson wrote:
> > > * dann frazier <[EM
* dann frazier <[EMAIL PROTECTED]> [2008-08-21 10:51-0400]:
> On Thu, Aug 21, 2008 at 01:43:44PM -0400, Micah Anderson wrote:
> > * dann frazier <[EMAIL PROTECTED]> [2008-08-20 17:59-0400]:
> > This is a user-space issue, not a kernel issue. Using an older version
>
* dann frazier <[EMAIL PROTECTED]> [2008-08-20 17:59-0400]:
> On Mon, Aug 18, 2008 at 02:40:41AM -0600, dann frazier wrote:
> > On Fri, Aug 15, 2008 at 09:51:33PM +0200, Bastian Blank wrote:
> > > Hi folks
> > >
> > > I'd like to schedule the upload of linux-2.6 2.6.26-3 for monday.
> > >
> > > T
maximilian attems <[EMAIL PROTECTED]> writes:
Hi all,
> On Thu, Aug 14, 2008 at 12:30:05PM +0300, Arturas K. wrote:
>> * I know you guys are busy - so am I, but I am eager to try and help on
>> this particular feature.
>
> please stop waffling.
>
> if you checked current sid repo you'd see that
* Micah Anderson <[EMAIL PROTECTED]> [2008-08-13 16:26-0400]:
>
> There is a working patch available as of yesterday for 2.6.25 and
> 2.6.25.2 which fixes both ext4 and xfs. It has had the 'dontuse' flag
> removed and is considered pre5.
Err, my mistake, I meant
There is a working patch available as of yesterday for 2.6.25 and
2.6.25.2 which fixes both ext4 and xfs. It has had the 'dontuse' flag
removed and is considered pre5.
micah
signature.asc
Description: Digital signature
Bastian Blank <[EMAIL PROTECTED]> writes:
> On Fri, Aug 08, 2008 at 04:42:03PM -0500, William Pitcock wrote:
>> It appears the plan is to drop vserver in favour of openvz, offering
>> openvz as an alternative and perhaps default is a good option, but
>> please do not remove vservers, as there are
Package: linux-source-2.6.15
Version: 2.6.15-8
Severity: normal
Tags: patch
There is a local redeclaration of name_to_dev_t in
drivers/mtd/devices/blkmtd.c:617 which is inconsistant with the function in
mount.h.
The way to fix this would be to remove the declaration and include the
mount.h as th
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Andreas Barth wrote:
> I usually want to have some "flavoured" kernels, i.e. they should
> contain certain (custom) patches. Now, there are the official source
> packages, and of course binaries from them. However, if I need my own
> kernel, it takes
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Although the original report says, "After 250 days, the jiffies overflow
and ipt_recent do not work anymore" and is for 2.4, I've actually found
that the code included in 2.6.8 (and probably any kernel version that
includes ipt_recent) causes unexpect
Horms schrieb am Friday, den 09. September 2005:
> On Thu, Sep 08, 2005 at 09:17:25PM -0500, Micah Anderson wrote:
> > Hi,
> >
> > I think it would be a good idea to get a DTSA (Debian Testing Security
> > Advisory) issued for 2.4.27 and 2.6.8.
>
> That seem
Moritz Muehlenhoff schrieb am Friday, den 09. September 2005:
> Micah Anderson wrote:
> > Neither of these advisories is a typical DTSA, as we normally we only do
> > advisories for things that are blocked from reaching testing by some other
> > issue, but I think that i
Hi,
I think it would be a good idea to get a DTSA (Debian Testing Security
Advisory) issued for 2.4.27 and 2.6.8.
2.4.27-11 is already in testing, but the number of security bugs fixed in
this version is significant: there are 9 CAN numbers for 2.4.27-11[1]; and 4
other security patches that do
Package: kernel-source-2.4.27
Version: 2.4.27-10
Severity: normal
Tags: security
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1768 reads:
Race condition in the ia32 compatibility code for the execve system
call in Linux kernel 2.4 before 2.4.31 and 2.6 before 2.6.6 allows
local user
Package: kernel-source-2.6.8
Version: 2.6.8-15
Severity: normal
Tags: patch
There is a subtle bug in error handling of ext2 and ext3 xattrs. When
ext2_sync_inode() or ext3_xattr_block_set() fails because it could not
write the inode's dirty data (ENOSPC), it doesn't keep the xattrs in a
consistent
Package: kernel-source-2.6.8
Version: 2.6.8-15
Severity: normal
Tags: patch
If you set in the config CONFIG_DEBUG_SPINLOCK=y and have CONFIG_SMP=n
then the various spinlock checks in the kernel can cause the kernel to
crash, an example of one of these spinlock checks is the code:
BUG_ON(!spin_is_
Package: kernel-source-2.6.8
Version: 2.6.8-14
Severity: normal
Tags: security
Greetings,
CAN-2005-0210 reads:
Netfilter in the Linux kernel 2.6.8.1 allows local users to cause a
denial of service (memory consumption) via certain packet fragments
that are reassembled twice, which causes a data s
Package: kernel-source-2.6.8
Version: 2.6.8-14
Severity: normal
Tags: security patch
CAN-2004-1191 reads:
Race condition ... when run on SMP systems that have more than 4GB of
memory, could allow local users to read unauthorized memory from
"foreign memory pages." Apparantly it also allows remote
Package: kernel-source-2.6.8
Version: 2.6.8-14
Severity: normal
Tags: security patch
Hello,
CAN-2004-1190 reads:
SUSE Linux before 9.1 and SUSE Linux Enterprise Server before 9 do not
properly check commands sent to CD devices that have been opened
read-only, which could allow local users to con
s the thread for reference:
http://groups-beta.google.com/group/linux.kernel/browse_thread/thread/1fd2bd7a57fac50c/197ace52b8cf3b8b
Thanks,
micah
On Thu, 24 Feb 2005, Horms wrote:
> On Thu, Feb 24, 2005 at 12:43:14AM -0600, Micah Anderson wrote:
> > I looked over the 2.6.10 changelogs and d
I looked over the 2.6.10 changelogs and do not see this being either
fixed, or that particular file being changed. Although I do see that it
has changed slightly, the piece that is replaced in this patch is not
replaced here. As a result, I am not able to determine myself if
2.6.10 is also suscepti
Package: kernel-source-2.6.8
Version: 2.6.8-13
Severity: normal
Tags: security patch
Hello,
CAN-2005-0204 reads:
Linux kernel before 2.6.9, when running on the AMD64 and Intel EM64T
architectures, allows local users to write to privileged IO ports via
the OUTS instruction.
Although this says "b
55 matches
Mail list logo