Bug#903767: 1adc34adc3447c34926994b87db5d929f5ab45b5 confirmed to fix the issue
On Wed, 18 Jul 2018 00:09:54 +1000 TMC wrote: > does commit 1adc34adc3447c34926994b87db5d929f5ab45b5 on top of > Debian’s 4.9.110-1 kernel solvexen dom0 boot issue? Unfortunately I have no control over the host, so I cannot test dom0. I could only test inside a single domU.
Bug#903767: 1adc34adc3447c34926994b87db5d929f5ab45b5 confirmed to fix the issue
I can confirm that applying 1adc34adc3447c34926994b87db5d929f5ab45b5 on top of Debian’s 4.9.110-1 kernel solves the issue here on a Xen PV guest.
Bug#871608: linux-image-4.9.0-3-amd64: Linux kernel should handle decreasing cpu steal clock counter gracefully
There is currently a discussion on LKML and xen-devel about this issue: https://lkml.org/lkml/2017/10/10/182 Maybe this will result in some backportable fix.
Bug#871608: linux-image-4.9.0-3-amd64: Linux kernel should handle decreasing cpu steal clock counter gracefully
> Am 25.09.2017 um 02:07 schrieb Ben Hutchings: > > I agree that the kernel ought to work around this, but I'm hesitant to > add a fix that doesn't look like any upstream change. Why and how do > you think this was fixed in 4.11? Indeed this patch is not included upstream and won’t be as it does not apply to the current development branch. See the following brief discussion on this on Linux stable: http://www.spinics.net/lists/stable/msg186915.html The main issue here is the conversion between nsecs and cputime and how this behaves when the calculated difference in steal time overflows, i.e. decreases. In this case cpustat does not overflow and therefore decrease as well but instead increases by a large number. In Linux 4.11 the conversion between nsecs and cputime is entirely gone, which should lead to a backwards running cpustat counter without further issues (I have not actually tested this): 2b1f967d80e8e5d7361f0e1654c842869570f573 sched/cputime: Complete nsec conversion of tick based accounting This change seems to be only the last commit of a larger change though and I’m not sure if this larger change is suitable for backporting. I agree that it would be nice to have a patch which has undergone a good review process. Unfortunately I cannot provide that. I also cannot estimate how many people are affected by this issue considering that it did not attract attention over the last year. Michael
Bug#851214: images attached to emails are embedded with task=1 instead of task=mail
Hi, this is a duplicate of #843795. The workaround shown here would actually revert parts of a critical security fix for CVE-2016-4069. Instead, the solution mentioned in #843795 should be implemented and pushed via Wheezy LTS. Cheers, Michael
Bug#727143: libapache2-mod-php5: max_execution_time + SSL causes data transfer corruption
Package: libapache2-mod-php5 Version: 5.4.4-14+deb7u5 Severity: important The problem is also reproducable on a current wheezy system. -- System Information: Debian Release: 7.2 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 3.2.0-4-amd64 (SMP w/1 CPU core) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages libapache2-mod-php5 depends on: ii apache2-mpm-prefork 2.2.22-13 ii apache2.2-common 2.2.22-13 ii libbz2-1.0 1.0.6-4 ii libc62.13-38 ii libcomerr2 1.42.5-1.1 ii libdb5.1 5.1.29-5 ii libgssapi-krb5-2 1.10.1+dfsg-5+deb7u1 ii libk5crypto3 1.10.1+dfsg-5+deb7u1 ii libkrb5-31.10.1+dfsg-5+deb7u1 ii libmagic15.11-2 ii libonig2 5.9.1-1 ii libpcre3 1:8.30-5 ii libqdbm141.8.78-2 ii libssl1.0.0 1.0.1e-2 ii libstdc++6 4.7.2-5 ii libxml2 2.8.0+dfsg1-7+nmu2 ii mime-support 3.52-1 ii php5-common 5.4.4-14+deb7u5 ii tzdata 2013d-0wheezy1 ii ucf 3.0025+nmu3 ii zlib1g 1:1.2.7.dfsg-13 Versions of packages libapache2-mod-php5 recommends: ii php5-cli 5.4.4-14+deb7u5 Versions of packages libapache2-mod-php5 suggests: pn php-pear none -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org