Bug#535331: ditto

2009-11-07 Thread Josip Rodin
On Fri, Oct 23, 2009 at 11:54:21AM +0200, Josip Rodin wrote:
 I've experienced the same problem. I've got two lenny machines which have
[...]

FWIW Here's the last upgrade output pasted exactly as it just happened:

% sudo apt-get upgrade
Reading package lists... Done
Building dependency tree   
Reading state information... Done
The following packages will be upgraded:
  linux-image-2.6.26-2-686
1 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
Need to get 20,2MB of archives.
After this operation, 0B of additional disk space will be used.
Do you want to continue [Y/n]? 
Get:1 http://security.debian.org lenny/updates/main linux-image-2.6.26-2-686 
2.6.26-19lenny2 [20,2MB]
Fetched 20,2MB in 21s (929kB/s)
Preconfiguring packages ...
(Reading database ... 24703 files and directories currently installed.)
Preparing to replace linux-image-2.6.26-2-686 2.6.26-19lenny1 (using 
.../linux-image-2.6.26-2-686_2.6.26-19lenny2_i386.deb) ...
The directory /lib/modules/2.6.26-2-686 still exists. Continuing as directed.
Done.
Unpacking replacement linux-image-2.6.26-2-686 ...
Setting up linux-image-2.6.26-2-686 (2.6.26-19lenny2) ...
Running depmod.
Running mkinitramfs-kpkg.
Not updating initrd symbolic links since we are being updated/reinstalled 
(2.6.26-19lenny1 was configured last, according to dpkg)
Not updating image symbolic links since we are being updated/reinstalled 
(2.6.26-19lenny1 was configured last, according to dpkg)
% 

% sudo perl -pi -e 's,^(my \$loader\s+=\s+),$1lilo,' 
/var/lib/dpkg/info/linux-image-2.6.26-2-686.postinst

% sudo dpkg-reconfigure linux-image-2.6.26-2-686
Running depmod.
Running mkinitramfs-kpkg.
Not updating initrd symbolic links since we are being updated/reinstalled 
(2.6.26-19lenny2 was configured last, according to dpkg)
Not updating image symbolic links since we are being updated/reinstalled 
(2.6.26-19lenny2 was configured last, according to dpkg)
You already have a LILO configuration in /etc/lilo.conf
Running boot loader as requested
Testing lilo.conf ... 
Testing successful.
Installing the partition boot sector... 
Running /sbin/lilo  ... 
Installation successful.
% 

 [...] after upgrading linux-image-2.6.26-2-686, I just get [...]

FWIW it also happens on the amd64 version, exactly the same:

% sudo apt-get upgrade
Reading package lists... Done
Building dependency tree   
Reading state information... Done
The following packages will be upgraded:
  linux-image-2.6.26-2-amd64
1 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
Need to get 20,9MB of archives.
After this operation, 4096B of additional disk space will be used.
Do you want to continue [Y/n]? 
Get:1 http://security.debian.org lenny/updates/main linux-image-2.6.26-2-amd64 
2.6.26-19lenny2 [20,9MB]
Fetched 20,9MB in 20s (1013kB/s)   
Preconfiguring packages ...
(Reading database ... 20849 files and directories currently installed.)
Preparing to replace linux-image-2.6.26-2-amd64 2.6.26-19lenny1 (using 
.../linux-image-2.6.26-2-amd64_2.6.26-19lenny2_amd64.deb) ...
The directory /lib/modules/2.6.26-2-amd64 still exists. Continuing as directed.
Done.
Unpacking replacement linux-image-2.6.26-2-amd64 ...
Setting up linux-image-2.6.26-2-amd64 (2.6.26-19lenny2) ...
Running depmod.
Running mkinitramfs-kpkg.
Not updating initrd symbolic links since we are being updated/reinstalled 
(2.6.26-19lenny1 was configured last, according to dpkg)
Not updating image symbolic links since we are being updated/reinstalled 
(2.6.26-19lenny1 was configured last, according to dpkg)
% 

% sudo perl -pi -e 's,^(my \$loader\s+=\s+),$1lilo,' 
/var/lib/dpkg/info/linux-image-2.6.26-2-amd64.postinst

% sudo dpkg-reconfigure linux-image-2.6.26-2-amd64
Running depmod.
Running mkinitramfs-kpkg.
Not updating initrd symbolic links since we are being updated/reinstalled 
(2.6.26-19lenny2 was configured last, according to dpkg)
Not updating image symbolic links since we are being updated/reinstalled 
(2.6.26-19lenny2 was configured last, according to dpkg)
You already have a LILO configuration in /etc/lilo.conf
Running boot loader as requested
Testing lilo.conf ... 
Testing successful.
Installing the partition boot sector... 
Running /sbin/lilo  ... 
Installation successful.
% 

-- 
 2. That which causes joy or happiness.



-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#504805: and another....

2009-11-07 Thread Micah Anderson

Can I provide more information, or is there anything else I can do to
help fix this?

(XEN) domain_crash_sync called from entry.S (ff188600)
(XEN) Domain 0 (vcpu#0) crashed on cpu#0:
(XEN) [ Xen-3.2-1  x86_32p  debug=n  Not tainted ]
(XEN) CPU:0
(XEN) EIP:0061:[c01013a7]
(XEN) EFLAGS: 0246   CONTEXT: guest
(XEN) eax:    ebx: 0001   ecx:    edx: c0389fc8
(XEN) esi:    edi:    ebp:    esp: c0389fbc
(XEN) cr0: 8005003b   cr4: 06f0   cr3: 001dec80   cr2: bfba0a10
(XEN) ds: 007b   es: 007b   fs: 00d8   gs:    ss: 0069   cs: 0061
(XEN) Guest stack trace from esp=c0389fbc:
(XEN)c0105f52   c05669bb 9b7f  0020 

(XEN)c01028ab c0102810 0020 c20ee000  c038f88b c03ac580 
0002080b
(XEN) c038f5c3 c038f5cb c038f5d3 c0102374 c010263c c01027c8 
c0102981
(XEN)c0102fd7 c0102ff8 c0103480 c0103520 c0103609 c0103a81 c0103b3d 
c0103bfa
(XEN)c0103c59 c0103d03 c01042f9 c010430c c0104332 c010433f c01043db 
c0104999
(XEN)c0104a5c c010506c c01050ec c01051bc c0105ebf c0105eff c0105f58 
c0106238
(XEN)c0106323 c010664a c0106a80 c0106be4 c039453d c0394546 c0108085 
c0108093
(XEN)c0108108 c0108116 c0395faf c0395fc2 c01085ef c0108679 c010934c 
c0109547
(XEN)c0109572 c010957b c010985d c0109865 c010a3ae c010a425 c010a434 
c010a468
(XEN)c010a4a2 c010a4ab c010a4b4 c02c5f1d c02c60c1 c02c6118 c02c6138 
c02c62fe
(XEN)c02c63c2 c02c67ea c03962cb c03962d3 c02c6d11 c0396429 c0396432 
c039643b
(XEN)c0396444 c0396453 c039645c c039646b c0396474 c02c6df1 c02c6e5a 
c02c6fbd
(XEN)c02c7033 c02c708d c02c7093 c02c72d1 c02c7317 c02c738f c02c739f 
c02c741b
(XEN)c02c742f c02c753c c02c754d c02c7554 c02c76d3 c02c7962 c02c7b49 
c02c7b9a
(XEN)c02c7c3a c02c7c3f c02c7c4d c02c7d80 c02c7d95 c02c7fea c02c8037 
c02c80bf
(XEN)c02c80e0 c02c81c7 c02c81d6 c02c81e5 c02c8206 c02c8215 c010b59e 
c010b5c7
(XEN)c010b5ef c010bbad c010bbe0 c010bc47 c010bc9d c010bccf c010bd07 
c010bd91
(XEN)c010be10 c010be59 c010c0e7 c039753b c039755e c039798f c010ce93 
c010de56
(XEN)c039867c c03986a3 c0398797 c0398a78 c010e3f9 c010f656 c010fec4 
c0110fb9
(XEN)c0110fc3 c0ba c0c4 c01116a8 c0111a69 c0111ab0 c0111b39 
c0111cba
(XEN) Domain 0 crashed: 'noreboot' set - not rebooting.



-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: reassign 554793 to watchdog

2009-11-07 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 reassign 554793 watchdog
Bug #554793 [linux-image-2.6.26-2-amd64] linux-image-2.6.26-2-amd64: 
ipmi_watchdog module frequently returns errno=16 - Device or resource busy on 
Dell Poweredge 860s
Bug reassigned from package 'linux-image-2.6.26-2-amd64' to 'watchdog'.
Bug No longer marked as found in versions 2.6.26-17lenny1.

End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#554793: linux-image-2.6.26-2-amd64: ipmi_watchdog module frequently returns errno=16 - Device or resource busy on Dell Poweredge 860s

2009-11-07 Thread Ben Hutchings
On Fri, 2009-11-06 at 16:00 +, Tim Small wrote:
 Package: linux-image-2.6.26-2-amd64
 Version: 2.6.26-17lenny1
 Severity: normal
 
 Opening /dev/watchdog as provided by ipmi_watchdog on a Dell PowerEdge
 860 running Lenny 5.0 (64 bit), frequently fails with EBUSY.
 
 Nov  5 11:50:09 kernel: [   29.583805] IPMI Watchdog: driver initialized
 Nov  5 11:50:12 watchdog[3239]: starting daemon (5.4):
 Nov  5 11:50:12 watchdog[3239]: int=10s realtime=yes sync=no
 soft=no mla=0 mem=140733193388032
 
 [...]
 
 Nov  5 11:50:12 watchdog[3239]: test=none(0) repair=none
 alive=/dev/watchdog heartbeat=none temp=none to=root no_act=no
 Nov  5 11:50:12 watchdog[3239]: cannot open /dev/watchdog (errno
 = 16 = 'Device or resource busy')
 Nov  5 11:50:12 kernel: [   57.375695] IPMI Watchdog: Unexpected
 close, not stopping watchdog
 
 
 worse, if the module is loaded with the nowayout=1 - the machine then
 gets hard-reset timeout seconds later!

The watchdog device cannot be closed if it was not successfully opened.
This is a problem with the watchdog daemon.

Ben.

-- 
Ben Hutchings
The generation of random numbers is too important to be left to chance.
- Robert Coveyou


signature.asc
Description: This is a digitally signed message part


Processed: closing 552472

2009-11-07 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 # updating all initramfs costs too much time and is useless risk
 close 552472
Bug#552472: cryptsetup: dpkg-trigger only rebuilds initramfs for the running 
kernel
'close' is deprecated; see http://www.debian.org/Bugs/Developer#closing.
Bug closed, send any further explanations to Thiemo Nagel 
thiemo.na...@ph.tum.de


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: bug 553067 is forwarded to http://bugzilla.kernel.org/show_bug.cgi?id=14496

2009-11-07 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 forwarded 553067 http://bugzilla.kernel.org/show_bug.cgi?id=14496
Bug #553067 [linux-2.6] linux-image-2.6.31-trunk-686: uvcvide camera does not 
work anymore
Set Bug forwarded-to-address to 
'http://bugzilla.kernel.org/show_bug.cgi?id=14496'.

End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#509441: marked as done (computer locks up during down-load)

2009-11-07 Thread Debian Bug Tracking System
Your message dated Sun, 8 Nov 2009 00:18:57 +0100
with message-id 20091107231857.ga3...@galadriel.inutil.org
and subject line Re: Bug#509441: computer locks up during down-load
has caused the Debian Bug report #509441,
regarding computer locks up during down-load
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
509441: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=509441
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: ppp
Version: 2.4.4rel-8

Computer fails to respond to mouse, keyboard, and even to
CtrlAltDel when attempting to download a web page e.g.
http://www.uk.debian.org/ .

I am trying to get Etch to run in an old computer, which has about 361
Mega-bytes of SDRAM.

It uses an external modem to dial into an ISP.
It uses a simple shel script which calls pon, I attach a copy of the
shell script, and a copy of the called file.

The bugs appears when that ISP is Entanet using dial in number 0845
6040104.
It seem to dial in successfully,
I attach a copy of the ppp dialogue.
However, then I tried to use Epiphany to download a web page e.g.
http://www.uk.debian.org/ .
The system downloaded some of the page, and displayed as much as would
fit in the window.
The computer then did not respond to any of the controls -- keyboard,
mouse.
It just froze, or locked-up.
Eventually the OH light on the modem went out, I took this as my cue
to push the power switch, and hold it in, till it switched off the
power.

I tried several times with variations.
first using Iceweasel;
then Iceweasel and squid;
then wget.
Iceweasel, with or without squid, caused the computer to lock up.
Wget sometimes caused it to lock up.

Downloading a smaller webpage instead usually worked, except that the
pictures did not get displayed.


Workaround;
I tried using various different ISPs,  system worked with all of these
others.

Knoppix version 5.1.1 live CD, running in the same hardware works, even
on the Entanet dial up line, but slowly.

versions;
I attach a list of versions of some of the packages in my system.
It is Etch as installed plus a few Etch packages which were not
installed as default.
These were all updated by aptitude update, and then aptitude upgrade on
20 December 2008.

I attach output from reportbug, which seems to contain at least one
error (from address).

Thank you very much for providing ppp.

Best regards

Richard Betham

ii  ppp2.4.4rel-8 Point-to-Point Protocol (PPP) daemon
ii  pppconfig  2.3.15.etch1   A text menu based utility for configuring pp
ii  base-files 4  Debian base system miscellaneous files
ii  libpam-modules   0.79-5 Pluggable Authentication Modules for PAM
ii  libpam-runtime   0.79-5 Runtime support for the PAM library
ii  libpam0g 0.79-5 Pluggable Authentication Modules library
ii  libcap11.10-14support for getting/setting POSIX.1e 
capabilities
ii  libc6  2.3.6.ds1-13etch5 GNU C Library: Shared libraries
ii  libc6-i686 2.3.6.ds1-13etch5 GNU C Library: Shared libraries [i686 
optimi
ii  linux-image-2.6-k7  2.6.18+6etch3 Linux kernel 2.6 image on AMD 
K7
ii  linux-image-2.6.18-6-k7 2.6.18.dfsg.1-23etch1 Linux 2.6.18 image on AMD K7
ii  kdm3.5.5a.dfsg.1-6etch2 X display manager for KDE


Entanet6.sh
Description: application/shellscript
# This optionfile was generated by pppconfig 2.3.15. 
# 
#
hide-password 
noauth
connect /usr/sbin/chat -v -f /etc/chatscripts/Entanet6
debug
/dev/ttyS0
115200
defaultroute
noipdefault 
user jubileeweb
 
ipparam Entanet6

usepeerdns
idle 600Sat Dec 20 20:32:17 GMT 2008
Serial connection established.
using channel 1
Using interface ppp0
Connect: ppp0 -- /dev/ttyS0
sent [LCP ConfReq id=0x1 asyncmap 0x0 magic 0x4c7ddae5 pcomp accomp]
rcvd [LCP ConfReq id=0x1 asyncmap 0xa auth chap MD5 magic 0x844dfb9b 
pcomp accomp mrru 1524 endpoint [local:42.54.4d.44.49.50]]
sent [LCP ConfRej id=0x1 mrru 1524]
rcvd [LCP ConfReq id=0x2 asyncmap 0xa auth chap MD5 magic 0x844dfb9b 
pcomp accomp endpoint [local:42.54.4d.44.49.50]]
sent [LCP ConfAck id=0x2 asyncmap 0xa auth chap MD5 magic 0x844dfb9b 
pcomp accomp endpoint [local:42.54.4d.44.49.50]]
sent [LCP ConfReq id=0x1 asyncmap 0x0 magic 0x4c7ddae5 pcomp accomp]
rcvd [LCP ConfAck id=0x1 asyncmap 0x0 magic 0x4c7ddae5 pcomp accomp]
sent [LCP EchoReq id=0x0 magic=0x4c7ddae5]
rcvd [CHAP Challenge id=0x1 4b4c283cd7222792e0c032b21eeb7e4a, name = BTMDIP]
sent [CHAP Response id=0x1 483ef642a3082bcacd81cd1c5a68039b, name = 
jubileeweb]
rcvd [LCP EchoRep id=0x0 magic=0x844dfb9b]
rcvd [CHAP 

Bug handling policy [2nd draft]

2009-11-07 Thread Ben Hutchings
This incorporates all the comments, I think.  I'll take further comments
on this draft until 14th November, then consider this final if no-one
objects.

Ben.

---

1. Required information

Submitters are expected to run reportbug or other tool that runs our
'bug' script under the kernel version in question.  The response to
reports without this information should be a request to follow-up using
reportbug.  If we do not receive this information within a month of the
request, the bug may be closed.

Exceptions:
* If the kernel does not boot or is very unstable, instead of the usual
  system information we need the console messages via netconsole, serial
  console, or a photograph.
* If the report is relaying information about a bug acknowledged
  upstream, we do not need system information but we do need specific
  references (bugzilla.kernel.org or git commit id).
* If the bug is clearly not hardware-specific (e.g. packaging error), we
  do not need system information.
* If the bug is reported against a well-defined model, we may not need
  device listings.

2. Severities

Many submitters report bugs with the wrong severity.  We interpret the
criteria as follows and will adjust severity as appropriate:

'critical: makes unrelated software on the system (or the whole system)
break...'
   The bug must make the kernel unbootable or unstable on common
   hardware or all systems that a specific flavour is supposed to
   support.  There is no 'unrelated software' since everything
   depends on the kernel.

'grave: makes the package in question unusable or mostly so...'
   If the kernel is unusable, this already qualifies as critical.

'grave: ...or causes data loss...'
   We exclude loss of data in memory due to a crash.  Only corruption
   of data in storage or communication, or silent failure to write data,
   qualifies.

important
   We include lack of support for new hardware that is generally
   available.

3. Tagging

We do not use user-tags.  In order to aid bug triage we should make use
of the standard tags and 'forwarded' field defined by the BTS.  In
particular:

* Add 'moreinfo' whenever we are waiting for a response from the
  submitter and remove it when we are not
* Do not add 'unreproducible' to bugs that may be hardware-dependent

4. Analysis by maintainers

Generally we should not expect to be able to reproduce bugs without
having similar hardware.  We should consider:

* Searching bugzilla.kernel.org (including closed bugs) or other
  relevant bug tracker
* Searching kernel mailing lists
  - Of the many archives, http://news.gmane.org seems to suck least
  - Patches submitted to some lists are archived at
http://patchwork.kernel.org/
* Viewing git commit logs for relevant source files
  - In case of a regression, from the known good to the bad version
  - In other cases, from the bad version forwards, in case the bug
has been fixed since
* Searching kerneloops.org for similar oopses
* Matching the machine code and registers in an 'oops' against the
  source and deducing how the impossible happened (this doesn't work
  that often but when it does you look like a genius ;-)

5. Testing by submitter

Depending on the technical sophistication of the submitter and the
service requirements of the system in question (e.g. whether it's a
production server) we can request one or more of the following:

* Gathering more information passively (e.g. further logging, reporting
  contents of files in procfs or sysfs)
* Upgrading to the current stable/stable-proposed-updates/
  stable-security version, if it includes a fix for a similar bug
* Adding debug or fallback options to the kernel command line or
  module parameters
* Installing the unstable or backports version temporarily
* Rebuilding and installing the kernel with a specific patch added
  (the script debian/bin/test-patches should make this easy)
* Using 'git bisect' to find a specific upstream change that
  introduced the bug

When a bug occurs in what upstream considers the current or previous
stable release, and we cannot fix it, we ask the submitter to report it
upstream at bugzilla.kernel.org under a specific Product and Component,
and to tell us the upstream bug number.  We do not report bugs directly
because follow-up questions from upstream need to go to the submitter,
not to us.  Given the upstream bug number, we mark the bug as forwarded.
bts-link then updates its status.

6. Keeping bugs separate

Many submitters search for a characteristic error message and treat this
as indicating a specific bug.  This can lead to many 'me too' follow-ups
where, for example, the message indicates a driver bug and the second
submitter is using a different driver from the original submitter.

In order to avoid the report turning into a mess of conflicting
information about two or more different bugs:
* We should try to respond to such a follow-up quickly, requesting a
  separate bug report
* We can use the BTS 'summary' command to improve the 

Re: Re: Building vanilla kernel .debs

2009-11-07 Thread Jan Muszynski
On Sun, Oct 18, 2009 at 22:21:00 +0200,  maximilian attems wrote:

On Sun, Oct 18, 2009 at 09:53:58PM +0200, Marc Haber wrote:

snippage

 Is there any documentation about which features are
 available?

not yet, as currently it is dead simple, but in the work indeed.

On build it respects DEBEMAIL and DEBFULLNAME for changelog and control
file generation. If firmware is also build you get a seperated firmware
package.

On install eventual hook scripts in /etc/kernel will be executed.

 For this to be a make-kpkg replacement, I'd need the
 possibility to run the actual build process as non-root user while
 using fakeroot to build the .deb,

done in linux-next kbuild tree heading for 2.6.33.

 append a string to the version  number and a debian revision.

if you set KDEB_PKGVERSION you can set both, the debian revision
is controled by .version.


Just found this thread and tried it. What I see I like, makes things
nice and simple.
BUT - is there any way to generate a header-package? Doc package would be nice
as well, although not as critical. I can easily live without that. I
really need a header
package though. I often remove the source tree, or modify it, after
compiling a kernel.

TIA


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org