A bug from 2013, wow :-) I don't know why it's closed as invalid
(needlessly loading kernel modules does increase attack surface), but
I've learned of kernel.modules_disabled some years ago, so I'll just use
that.
--
You received this bug notification because you are a member of Kernel
Packages,
Same here during boot, running 6.5.0-15-generic on Ubuntu 23.10:
$ dmesg | grep -C3 evict
[ 10.769204] EXT4-fs (xvda1): mounted filesystem
446b2699-dd26-4b84-9ada-d0cb48d21c93 r/w with ordered data mode. Quota mode:
none.
[ 11.061845] SGI XFS with ACLs, security attributes, realtime, quota,
FWIW, this just happened again while trying out the latest mainline
kernel from https://kernel.ubuntu.com/~kernel-ppa/mainline
* Kernels up to v5.3-rc5 work fine, but booting it takes up ~36MB of /run
(unpacking during boot)
on the Dom0 here.
* Kernel v5.3-rc6 seems to take up even more, fillin
FWIW, Debian #81748 explains why it's safe to have world-writable
/dev/{u,}random devices.
** Bug watch added: Debian Bug tracker #81748
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=81748
** Also affects: makedev (Debian) via
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=81748
Imp
Why is this bug set to "Fix released" for Trusty? This is still
happening:
$ uname -rv
3.13.0-53-generic #88-Ubuntu SMP Wed May 13 18:10:29 UTC 2015
$ modprobe xfs
$ dmesg -T | tail -2
[Fri May 29 10:41:08 2015] Request for unknown module key 'Magrathea: Glacier
signing key: 9aac900abd0220fb93c8
This just happened here with eject-2.1.5, but using "eject -i off" as
suggested by zheoffec in comment #2 helped - thanks!
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to eject in Ubuntu.
https://bugs.launchpad.net/bugs/398670
Title:
ej
6 matches
Mail list logo