Your message dated Fri, 20 Jun 2008 17:08:04 +0200
with message-id <[EMAIL PROTECTED]>
and subject line Kernel from Debian 3.1 no longer supported
has caused the Debian Bug report #277736,
regarding NAPI not enabled - should be
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)
--
277736: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=277736
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: kernel-image-2.6.8-1-386
Severity: normal
Tags: security
[ Filed with reportbug, but not specific to this system. ]
Hello,
CONFIG_E1000_NAPI, CONFIG_E100_NAPI, etc., all appear to be disabled in
the kernel configuration (for at least i386). This option allows boxes
that would otherwise choke in a denial of service attack (or just heavy
load) to survive (making this a security issue) with load on the order
of five times higher or more.
I have personally tested CONFIG_E1000_NAPI, CONFIG_E100_NAPI, and TG3
NAPI on many servers and core routers and have found it to be both
extremely important and completely stable.
Other distributions (eg: Red Hat ES) do appear to have this option
enabled in the default kernels.
For more information, see linux/Documentation/networking/NAPI_HOWTO.txt.
Simon-
-- System Information:
Debian Release: 3.1
APT prefers testing
APT policy: (500, 'testing')
Architecture: i386 (i686)
Kernel: Linux 2.6.9-rc3-web
Locale: LANG=C, LC_CTYPE=C
--- End Message ---
--- Begin Message ---
Version: 2.6.8-99+rm
You reported a bug against the Linux kernel (version 2.6.8) that was
shipped with Debian 3.1 (sarge). Since Debian 3.1 is no longer
supported and the kernel has changed so much that it would be very
difficult to verify every outstanding bug from 2.6.8, I'm hereby
closing your bug report.
If you still see this issue with the kernel from the upcoming release
of Debian (lenny, version 5.0), then please me know and I'll be happy
to reopen this bug report.
Thanks.
--
Martin Michlmayr
http://www.cyrius.com/
--- End Message ---