Bug#588782: same bug as 586369

2010-08-24 Thread Nicolas Parpandet
same bug as 586369 


Bug#594156: modules=most does not add virtio_net

2010-08-24 Thread Reinhard Tartler
Package: initramfs-tools
Version: 0.97
Severity: normal

Hi,

I'm using initramfs-tools in the context of an FAI nfsroot, read, I want
to have it booted in a KVM guest with both virtio hard drives and
virtio_net. It turns out despite having 'MODULES=most' in
/srv/fai/nfsroot/live/filesystem.dir/etc/initramfs-tools/initramfs.conf,
the modules 'virtio_pci', 'virtio_blk' and 'virtio_ring' are included,
but 'virtio_net' is missing.

I'm still looking for a good workaround to get an virtio-net enabled
guest installed via an FAI nfsroot.



-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20100824064311.16257.51356.report...@localhost.localdomain



Bug#594165: linux-image-2.6-686: Kernel panics while transferring data through ethernet on compaq dx2000 ST/CT

2010-08-24 Thread Long.inus
Package: linux-image-2.6-686
Version: 2.6.32+28
Severity: normal

If I don't use network, it doesn't panic at all. But as soon as I transfer a
lot of data by cifs or use netperf to stress eth0, it panics.

Information about eth0 by lshal:
  udi = '/org/freedesktop/Hal/devices/pci_14e4_1696'
info.linux.driver = 'tg3'  (string)
info.parent = '/org/freedesktop/Hal/devices/pci_8086_244e'  (string)
info.product = 'NetXtreme BCM5782 Gigabit Ethernet'  (string)

panic message through serial console:
HARDWARE ERROR
CPU 0: Machine Check Exception:4 Bank 0: b2001040080f
RIP !INEXACT! 00:c1206f17
TSC 1412c9d8df3
PROCESSOR 0:f33 TIME 1282627487 SOCKET 0 APIC 0
No human readable MCE decoding support on this CPU type.
Run the message through 'mcelog --ascii' to decode.
This is not a software problem!
Machine check: Processor context corrupt
Kernel panic - not syncing: Fatal Machine check
Pid: 2173, comm: smbd Tainted: G   M   2.6.32-5-686 #1
Call Trace:
 [c126ab04] ? panic+0x38/0xe4
 [c100e11e] ? mce_panic+0x124/0x139
 [c100e810] ? do_machine_check+0x543/0x6e3
 [c1206f17] ? tcp_rcv_established+0x303/0x626
 [c100e2cd] ? do_machine_check+0x0/0x6e3
 [c126c803] ? error_code+0x73/0x78
 [c1206f17] ? tcp_rcv_established+0x303/0x626
 [c120d430] ? tcp_v4_do_rcv+0x15f/0x2cf
 [c11fff2c] ? tcp_recvmsg+0x641/0x8b6
 [c11ce005] ? sk_wait_data+0x90/0x99
 [c11fed4c] ? tcp_prequeue_process+0x57/0x6b
 [c11ffd11] ? tcp_recvmsg+0x426/0x8b6
 [c11cd1bb] ? sock_common_recvmsg+0x2f/0x45
 [c11cb5a0] ? __sock_recvmsg+0x50/0x58
 [c11cb645] ? sock_aio_read+0x9d/0xab
 [c10b2615] ? do_sync_read+0xc0/0x107
 [c1041f20] ? param_set_invbool+0x22/0x35
 [c10b21f9] ? fsnotify_access+0x5a/0x61
 [c1101814] ? security_file_permission+0xc/0xd
 [c10b] ? pcpu_alloc+0x470/0x77c
 [c10b30bc] ? sys_read+0x3c/0x63
 [c10030fb] ? sysenter_do_call+0x12/0x28
[drm:drm_fb_helper_panic] *ERROR* panic occurred, switching back to text
console

panic message with nomce boot option through serial console:
[  159.129796] BUG: unable to handle kernel paging request at 670592c8
[  159.133751] IP: [c120383d] tcp_event_data_recv+0x4/0x343
[  159.133751] *pde = 
[  159.133751] Oops: 0002 [#1] SMP
[  159.133751] last sysfs file:
/sys/devices/pci:00/:00:1f.1/host0/target0:0:0/0:0:0:0/block/sda/uevent
[  159.133751] Modules linked in: speedstep_lib cpufreq_stats
cpufreq_conservative cpufreq_userspace cpufreq_powersave ppdev lp sco bridge
stp bnep l2cap crc16 bluetooth rfkill binfmt_misc fuse snd_intel8x0
snd_ac97_codec ac97_bus snd_pcm_oss snd_mixer_oss snd_pcm snd_seq_midi
snd_rawmidi snd_seq_midi_event snd_seq i915 drm_kms_helper snd_timer drm shpchp
snd_seq_device pci_hotplug snd i2c_algo_bit i2c_i801 soundcore i2c_core video
rng_core output parport_pc evdev psmouse serio_raw parport snd_page_alloc
pcspkr button processor usbhid hid ext3 jbd mbcache sd_mod crc_t10dif
ata_generic uhci_hcd ata_piix tg3 libata thermal libphy ehci_hcd floppy usbcore
thermal_sys scsi_mod nls_base [last unloaded: scsi_wait_scan]
[  159.133751]
[  159.133751] Pid: 2369, comm: smbd Not tainted (2.6.32-5-686 #1) HP dx2000
ST(PE677AV)
[  159.133751] EIP: 0060:[c120383d] EFLAGS: 00010202 CPU: 0
[  159.133751] EIP is at tcp_event_data_recv+0x4/0x343
[  159.133751] EAX: ddf0a680 EBX: ddf0a680 ECX: ddf0a680 EDX: dea61d00
[  159.133751] ESI: 0001 EDI: dea61d00 EBP: 05b4 ESP: de217d58
[  159.133751]  DS: 007b ES: 007b FS: 00d8 GS: 00e0 SS: 0068
[  159.133751] Process smbd (pid: 2369, ti=de216000 task=dea4f740
task.ti=de216000)
[  159.133751] Stack:
[  159.133751]  ddf0a680 0001 dea61d00 05b4 c120708b dde18044 0014
0001
[  159.133751] 0  dea61d20   ddf0a680 dea61d00
c120d430 05c8
[  159.133751] 0 c11fff2c dde18030 dde18044 ddf0a680 ddf0a680 de217e18
 c11ce005
[  159.133751] Call Trace:
[  159.133751]  [c120708b] ? tcp_rcv_established+0x477/0x626
[  159.133751]  [c120d430] ? tcp_v4_do_rcv+0x15f/0x2cf
[  159.133751]  [c11fff2c] ? tcp_recvmsg+0x641/0x8b6
[  159.133751]  [c11ce005] ? sk_wait_data+0x90/0x99
[  159.133751]  [c11fed4c] ? tcp_prequeue_process+0x57/0x6b
[  159.133751]  [c11ffd11] ? tcp_recvmsg+0x426/0x8b6
[  159.133751]  [c11cd1bb] ? sock_common_recvmsg+0x2f/0x45
[  159.133751]  [c11cb5a0] ? __sock_recvmsg+0x50/0x58
[  159.133751]  [c11cb645] ? sock_aio_read+0x9d/0xab
[  159.133751]  [e02d61e5] ? tg3_poll+0x14f/0x820 [tg3]
[  159.133751]  [c10b2615] ? do_sync_read+0xc0/0x107
[  159.133751]  [c10437d6] ? autoremove_wake_function+0x0/0x2d
[  159.133751]  [c10b21f9] ? fsnotify_access+0x5a/0x61
[  159.133751]  [c1101814] ? security_file_permission+0xc/0xd
[  159.133751]  [c10b2fdd] ? vfs_read+0x8c/0xd3
[  159.133751]  [c10b30bc] ? sys_read+0x3c/0x63
[  159.133751]  [c10030fb] ? sysenter_do_call+0x12/0x28
[  159.133751] Code: d2 80 cc 01 66 89 83 90 03 00 00 89 d8 e8 86 e5 ff ff 85
c0 75 0a 31 d2 89 d8 ff 93 68 01 00 00 58 5a 5b 5e 5f 5d c3 55 57 56 53 89 c3
83 ec 14 89 54 24 0c 8b b0 a8 02 

Processed: bug 594125 is forwarded to https://bugs.freedesktop.org/show_bug.cgi?id=29406

2010-08-24 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 forwarded 594125 https://bugs.freedesktop.org/show_bug.cgi?id=29406
Bug #594125 [linux-image-2.6.35-trunk-amd64] [linux-image-2.6.35-trunk-amd64] 
BSD ring buffer implementation makes suspend to ram unreliable
Set Bug forwarded-to-address to 
'https://bugs.freedesktop.org/show_bug.cgi?id=29406'.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
594125: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=594125
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.c.128263878121366.transcr...@bugs.debian.org



Bug#594125: [linux-image-2.6.35-trunk-amd64] BSD ring buffer implementation makes suspend to ram unreliable

2010-08-24 Thread maximilian attems
severity 594125 important
stop

On Mon, Aug 23, 2010 at 10:28:31PM +0200, Florian Kriener wrote:
 Package: linux-image-2.6.35-trunk-amd64
 Version: 1~experimental.2
 Severity: grave
 Tags: patch

important is enough.
 
 --- Please enter the report below this line. ---
 There is a bug in the linux kernel 2.6.35, that makes suspend to ram
 unusable (it seems to be fixed in 2.6.36-rc2) [1]. The symptoms are:
 - Suspend to ram from X hangs the computer, the only option is to press
   the power button for ~5 sec and thus forcefully turning off the  
   computer (SysRq does not work for me). After a while (when not
   turning off the computer of cause) the fan goes to full power.
 - However, suspend to ram from console works.
 - The hang does happen every time on my laptop. However,  on some
   computers that seems to happen only sporadically.

experienced similar stuff here on a X201 Thinkpad.
 
 The link [1] contains two possible solutions for this problem.
 1. Turn off BSD completely by replacing the corresponding define
in i915_drv.h with
 #define HAS_BSD(dev)(0)
 2. 2.6.36-rc2 seems to fix the problem (according to a comment on [1]).
 
 [1] https://bugs.freedesktop.org/show_bug.cgi?id=29406

ok marking as forwarded.

once a specific patch emerges out of that report, we can add it,
otherwise it should go through stable.
   



-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20100824082611.gg1...@baikonur.stro.at



Bug#594118: initramfs-tools: Generating image error. Unexpected operator

2010-08-24 Thread maximilian attems
On Mon, Aug 23, 2010 at 09:50:34PM +0200, Rodolfo Garcia wrote:
 Package: initramfs-tools
 Version: 0.98
 Severity: important
 
 Hi!
 
 I have a problem trying to generate a new initram:
 
 debian:~# update-initramfs -u -k all
 update-initramfs: Generating /boot/initrd.img-2.6.32-5-686
 [: 33: #: unexpected operator
 /boot/initrd.img-2.6.18-6-686 does not exist. Cannot update.
 debian:~#

please post the output of:

ls -l /var/lib/initramfs-tools/

and of

sh -x /usr/sbin/update-initramfs -u

 
thanks.



-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20100824083414.gh1...@baikonur.stro.at



Processed: Bug#594125: [linux-image-2.6.35-trunk-amd64] BSD ring buffer implementation makes suspend to ram unreliable

2010-08-24 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 severity 594125 important
Bug #594125 [linux-image-2.6.35-trunk-amd64] [linux-image-2.6.35-trunk-amd64] 
BSD ring buffer implementation makes suspend to ram unreliable
Severity set to 'important' from 'grave'

 stop
Stopping processing here.

Please contact me if you need assistance.
-- 
594125: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=594125
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.c.128263945927665.transcr...@bugs.debian.org



Bug#594156: modules=most does not add virtio_net

2010-08-24 Thread maximilian attems
tags 594156 unreproducible moreinfo
stop

On Tue, Aug 24, 2010 at 08:43:11AM +0200, Reinhard Tartler wrote:
 Package: initramfs-tools
 Version: 0.97
 Severity: normal
 
 Hi,
 
 I'm using initramfs-tools in the context of an FAI nfsroot, read, I want
 to have it booted in a KVM guest with both virtio hard drives and
 virtio_net. It turns out despite having 'MODULES=most' in
 /srv/fai/nfsroot/live/filesystem.dir/etc/initramfs-tools/initramfs.conf,
 the modules 'virtio_pci', 'virtio_blk' and 'virtio_ring' are included,
 but 'virtio_net' is missing.
 
 I'm still looking for a good workaround to get an virtio-net enabled
 guest installed via an FAI nfsroot.

lsinitramfs /boot/initrd.img-2.6.32-5-amd64 | grep virtio_net
lib/modules/2.6.32-5-amd64/kernel/drivers/net/virtio_net.ko

I can only guess that you are using an outdated version of
initramfs-tools. please upgrade and retry.




-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20100824083643.gj1...@baikonur.stro.at



Bug#594156: modules=most does not add virtio_net

2010-08-24 Thread Reinhard Tartler
reassign 594156 fai-server
found 594156 3.3.5
stop

On Tue, Aug 24, 2010 at 10:36:43 (CEST), maximilian attems wrote:

 I'm using initramfs-tools in the context of an FAI nfsroot, read, I want
 to have it booted in a KVM guest with both virtio hard drives and
 virtio_net. It turns out despite having 'MODULES=most' in
 /srv/fai/nfsroot/live/filesystem.dir/etc/initramfs-tools/initramfs.conf,
 the modules 'virtio_pci', 'virtio_blk' and 'virtio_ring' are included,
 but 'virtio_net' is missing.
 
 I'm still looking for a good workaround to get an virtio-net enabled
 guest installed via an FAI nfsroot.

 lsinitramfs /boot/initrd.img-2.6.32-5-amd64 | grep virtio_net
 lib/modules/2.6.32-5-amd64/kernel/drivers/net/virtio_net.ko

 I can only guess that you are using an outdated version of
 initramfs-tools. please upgrade and retry.

You're right, the problem does not seem to be in initramfs-tools. In
fact, reinstalling initramfs-tools_0.97 in the generated fai chroot
fixes this problem as well. It seems to me that make-fai-nfsroot is
installing and/or calling update-initramfs in a bad order that leads to
the module 'virtio_net' ending up in the initramfs.

I'm CC'ing mikap with this email. Mikap, perhaps you have some idea what
might go wrong here? I'm using a more or less basic lenny installation
(in an openvz container, but that shouldn't matter) with the packages
downloaded from the fai source:

deb http://www.informatik.uni-koeln.de/fai/download lenny koeln


-- 
Gruesse/greetings,
Reinhard Tartler, KeyID 945348A4



-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/87pqx8s4gz@faui44a.informatik.uni-erlangen.de



Processed: Re: Bug#594156: modules=most does not add virtio_net

2010-08-24 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 reassign 594156 fai-server
Bug #594156 [initramfs-tools] modules=most does not add virtio_net
Bug reassigned from package 'initramfs-tools' to 'fai-server'.
Bug No longer marked as found in versions initramfs-tools/0.97.
 found 594156 3.3.5
Bug #594156 [fai-server] modules=most does not add virtio_net
Bug Marked as found in versions fai/3.3.5.
 stop
Stopping processing here.

Please contact me if you need assistance.
-- 
594156: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=594156
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.c.128264484412767.transcr...@bugs.debian.org



Bug#566574: linux-2.6: Yet another acpi_enforce_resources=lax victim

2010-08-24 Thread Dave Witbrodt
Package: linux-2.6
Severity: normal


I believe this is another case of a user needing
acpi_enforce_resources=lax in their kernel boot parameters.

Ferry, can you try the advice provided here,

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=568126#44

and see if it helps.

HTH,
Dave W.



-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20100824104955.11052.87652.report...@localhost.localdomain



Bug#594189: initramfs-tools: environment variable to disable run_bootloader

2010-08-24 Thread Colin Watson
Package: initramfs-tools
Version: 0.98
Severity: wishlist
User: ubuntu-de...@lists.ubuntu.com
Usertags: origin-ubuntu maverick

In the case where one is building an image and part of the image build
involves running update-initramfs, it would be useful to have a single
guaranteed way to disable installing any bootloader.  Individual
bootloader hooks in /etc/initramfs-tools/post-update.d/ can do this, but
it would be better to have something central.  Should this be an
environment variable or perhaps a configuration file entry?

(This was originally filed by Loïc Minier as
https://bugs.launchpad.net/bugs/623375.)

Thanks,

-- 
Colin Watson   [cjwat...@ubuntu.com]



-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20100824132505.gc21...@riva.ucam.org



Bug#594189: initramfs-tools: environment variable to disable run_bootloader

2010-08-24 Thread Ben Hutchings
On Tue, 2010-08-24 at 14:25 +0100, Colin Watson wrote:
 Package: initramfs-tools
 Version: 0.98
 Severity: wishlist
 User: ubuntu-de...@lists.ubuntu.com
 Usertags: origin-ubuntu maverick
 
 In the case where one is building an image and part of the image build
 involves running update-initramfs, it would be useful to have a single
 guaranteed way to disable installing any bootloader.  Individual
 bootloader hooks in /etc/initramfs-tools/post-update.d/ can do this,

Minus the -tools; it's supposed to be shared with any other initramfs
builders.

 but it would be better to have something central.  Should this be an
 environment variable or perhaps a configuration file entry?

So far as I can see, the only reason to override post-update hooks is
that one is cross-building an initramfs.  In that case update-initramfs
is still used for updating the host's initramfs and should continue to
invoke the hooks when doing that.  So this should be a command-line
option and not a configuration option.

Ben.

-- 
Ben Hutchings
Once a job is fouled up, anything done to improve it makes it worse.


signature.asc
Description: This is a digitally signed message part


Bug#594189: initramfs-tools: environment variable to disable run_bootloader

2010-08-24 Thread Colin Watson
On Tue, Aug 24, 2010 at 02:45:44PM +0100, Ben Hutchings wrote:
 On Tue, 2010-08-24 at 14:25 +0100, Colin Watson wrote:
  In the case where one is building an image and part of the image build
  involves running update-initramfs, it would be useful to have a single
  guaranteed way to disable installing any bootloader.  Individual
  bootloader hooks in /etc/initramfs-tools/post-update.d/ can do this,
 
 Minus the -tools; it's supposed to be shared with any other initramfs
 builders.

Oops, yes.

  but it would be better to have something central.  Should this be an
  environment variable or perhaps a configuration file entry?
 
 So far as I can see, the only reason to override post-update hooks is
 that one is cross-building an initramfs.  In that case update-initramfs
 is still used for updating the host's initramfs and should continue to
 invoke the hooks when doing that.  So this should be a command-line
 option and not a configuration option.

Consider building a filesystem image inside a chroot which one is about
to build into a live filesystem image with mksquashfs or something.  In
the event that it contains flash-kernel, then the flash-kernel hook
(once such a thing exists; in the meantime, the hardcoded flash-kernel
code in run_bootloader) will write to the host system's flash memory.
(Take another similar example if you disagree with the precise details
of this one; LILO may well have similar properties.)

In this case, changing update-initramfs' command line is likely to be
most inconvenient, as it will be called from postinst scripts and the
like.

-- 
Colin Watson   [cjwat...@debian.org]



-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20100824135404.gd21...@riva.ucam.org



Bug#594189: initramfs-tools: environment variable to disable run_bootloader

2010-08-24 Thread Ben Hutchings
On Tue, 2010-08-24 at 14:54 +0100, Colin Watson wrote:
[...]
 Consider building a filesystem image inside a chroot which one is about
 to build into a live filesystem image with mksquashfs or something.  In
 the event that it contains flash-kernel, then the flash-kernel hook
 (once such a thing exists; in the meantime, the hardcoded flash-kernel
 code in run_bootloader) will write to the host system's flash memory.
 (Take another similar example if you disagree with the precise details
 of this one; LILO may well have similar properties.)
[...]

If the live filesystem image includes a boot loader package with a
kernel or initramfs hook, you're already running the risk of breaking
the user's machine by installing a boot loader they never wanted.
Protecting the build machine only hides the problem.

Ben.

-- 
Ben Hutchings
Once a job is fouled up, anything done to improve it makes it worse.


signature.asc
Description: This is a digitally signed message part


Bug#594189: initramfs-tools: environment variable to disable run_bootloader

2010-08-24 Thread Michael Prokop
* Ben Hutchings b...@decadent.org.uk [Tue Aug 24, 2010 at 03:09:06PM +0100]:
 On Tue, 2010-08-24 at 14:54 +0100, Colin Watson wrote:

  Consider building a filesystem image inside a chroot which one is about
  to build into a live filesystem image with mksquashfs or something.  In
  the event that it contains flash-kernel, then the flash-kernel hook
  (once such a thing exists; in the meantime, the hardcoded flash-kernel
  code in run_bootloader) will write to the host system's flash memory.
  (Take another similar example if you disagree with the precise details
  of this one; LILO may well have similar properties.)

 If the live filesystem image includes a boot loader package with a
 kernel or initramfs hook, you're already running the risk of breaking
 the user's machine by installing a boot loader they never wanted.
 Protecting the build machine only hides the problem.

So what's the proper way to disable the kernel or initramfs hook in
your opinion?

I explore the same problem Colin is talking about and deploying
kernel and bootloader packages is something people building live
systems have to deal with, so I'm interested in getting this
situation fixed as well.

regards,
-mika-


signature.asc
Description: Digital signature


Bug#594189: initramfs-tools: environment variable to disable run_bootloader

2010-08-24 Thread Ben Hutchings
On Tue, 2010-08-24 at 16:24 +0200, Michael Prokop wrote:
 * Ben Hutchings b...@decadent.org.uk [Tue Aug 24, 2010 at 03:09:06PM +0100]:
  On Tue, 2010-08-24 at 14:54 +0100, Colin Watson wrote:
 
   Consider building a filesystem image inside a chroot which one is about
   to build into a live filesystem image with mksquashfs or something.  In
   the event that it contains flash-kernel, then the flash-kernel hook
   (once such a thing exists; in the meantime, the hardcoded flash-kernel
   code in run_bootloader) will write to the host system's flash memory.
   (Take another similar example if you disagree with the precise details
   of this one; LILO may well have similar properties.)
 
  If the live filesystem image includes a boot loader package with a
  kernel or initramfs hook, you're already running the risk of breaking
  the user's machine by installing a boot loader they never wanted.
  Protecting the build machine only hides the problem.
 
 So what's the proper way to disable the kernel or initramfs hook in
 your opinion?
[...]

You're asking the wrong question here.

What I think you want to know is 'how do I make sure that the boot
loader is not installed where it's not wanted'.  The obvious answer is
'don't install the package'.  The user needs to configure it, in any
case, and why not let them do that through the usual package
configuration mechanism i.e. debconf?

If you insist on installing such a package in the live system then it
needs to support a safe configuration where it won't do anything until
the user configures it to.  It doesn't matter whether it's invoked by
the kernel, initramfs-tools, or anything else.  It *must* require user
configuration.

Ben.

-- 
Ben Hutchings
Once a job is fouled up, anything done to improve it makes it worse.


signature.asc
Description: This is a digitally signed message part


Bug#594189: initramfs-tools: environment variable to disable run_bootloader

2010-08-24 Thread Michael Prokop
* Ben Hutchings b...@decadent.org.uk [Tue Aug 24, 2010 at 03:45:36PM +0100]:
 On Tue, 2010-08-24 at 16:24 +0200, Michael Prokop wrote:
  * Ben Hutchings b...@decadent.org.uk [Tue Aug 24, 2010 at 03:09:06PM 
  +0100]:
   On Tue, 2010-08-24 at 14:54 +0100, Colin Watson wrote:

Consider building a filesystem image inside a chroot which one is about
to build into a live filesystem image with mksquashfs or something.  In
the event that it contains flash-kernel, then the flash-kernel hook
(once such a thing exists; in the meantime, the hardcoded flash-kernel
code in run_bootloader) will write to the host system's flash memory.
(Take another similar example if you disagree with the precise details
of this one; LILO may well have similar properties.)

   If the live filesystem image includes a boot loader package with a
   kernel or initramfs hook, you're already running the risk of breaking
   the user's machine by installing a boot loader they never wanted.
   Protecting the build machine only hides the problem.

  So what's the proper way to disable the kernel or initramfs hook in
  your opinion?

 You're asking the wrong question here.

 What I think you want to know is 'how do I make sure that the boot
 loader is not installed where it's not wanted'.  The obvious answer is
 'don't install the package'.  The user needs to configure it, in any
 case, and why not let them do that through the usual package
 configuration mechanism i.e. debconf?

 If you insist on installing such a package in the live system then it
 needs to support a safe configuration where it won't do anything until
 the user configures it to.  It doesn't matter whether it's invoked by
 the kernel, initramfs-tools, or anything else.  It *must* require user
 configuration.

Jepp. But isn't this (possibility for user configuration) exactly
what Colin is requesting?

I'm for example shipping lilo and grub with the live system (so the
binaries as well as its documentation is available to the user), but
nowadays the build process fails due to errors like:

  run-parts: /etc/initramfs/post-update.d//lilo exited with return code 1
[...]
  run-parts: /etc/kernel/postinst.d/zz-lilo exited with return code 1

So the IMHO open question is what's a proper way to disable such
stuff on request?

regards,
-mika-


signature.asc
Description: Digital signature


Bug#594189: initramfs-tools: environment variable to disable run_bootloader

2010-08-24 Thread Ben Hutchings
On Tue, 2010-08-24 at 16:55 +0200, Michael Prokop wrote:
 * Ben Hutchings b...@decadent.org.uk [Tue Aug 24, 2010 at 03:45:36PM +0100]:
[...]
  If you insist on installing such a package in the live system then it
  needs to support a safe configuration where it won't do anything until
  the user configures it to.  It doesn't matter whether it's invoked by
  the kernel, initramfs-tools, or anything else.  It *must* require user
  configuration.
 
 Jepp. But isn't this (possibility for user configuration) exactly
 what Colin is requesting?

No, he was asking for a way to disable hook invocation (which is
something of a blunt tool).

 I'm for example shipping lilo and grub with the live system (so the
 binaries as well as its documentation is available to the user), but
 nowadays the build process fails due to errors like:
 
   run-parts: /etc/initramfs/post-update.d//lilo exited with return code 1
 [...]
   run-parts: /etc/kernel/postinst.d/zz-lilo exited with return code 1
 
 So the IMHO open question is what's a proper way to disable such
 stuff on request?

Report a bug on lilo; I suppose it should warn but still 'succeed' if
/etc/lilo.conf is missing.  elilo should do the same.  This is my bug
and I can fix it. :-)  No idea about zipl but I doubt you care about
s390 live media.

Ben.

-- 
Ben Hutchings
Once a job is fouled up, anything done to improve it makes it worse.


signature.asc
Description: This is a digitally signed message part


Bug#594189: initramfs-tools: environment variable to disable run_bootloader

2010-08-24 Thread Stephen Powell
On Tue, 24 Aug 2010 10:55:43 -0400 (EDT), Michael Prokop m...@debian.org 
wrote:
 Jepp. But isn't this (possibility for user configuration) exactly
 what Colin is requesting?
 
 I'm for example shipping lilo and grub with the live system (so the
 binaries as well as its documentation is available to the user), but
 nowadays the build process fails due to errors like:
 
   run-parts: /etc/initramfs/post-update.d//lilo exited with return code 1
 [...]
   run-parts: /etc/kernel/postinst.d/zz-lilo exited with return code 1
 
 So the IMHO open question is what's a proper way to disable such
 stuff on request?

I am not a member of the kernel team.  I'm just an ordinary user.
So I speak with zero authority.  And Ben may have his own ideas that
he wishes to share.  But one way to prevent a hook script from
executing is to remove its executable attribute.  For example,

chmod -x /etc/kernel/postinst.d/zz-lilo
chmod -x /etc/kernel/postrm.d/zz-lilo
chmod -x /etc/initramfs/post-update.d/lilo

This is not supported, of course, nor is it recommended.  But it will
work.  As a general rule I agree with Ben.  If you don't want the hook
scripts to run, don't install the package.  But in special situations,
such as where you want the man page installed for reference purposes
but don't want the package to be used, this is one solution.
I have used this technique to run my own hook scripts instead of the
package hook scripts without changing the package hook scripts when
the package hook scripts are buggy or incomplete.  (But of course I
open a bug report against the package too.)

-- 
  .''`. Stephen Powell
 : :'  :
 `. `'`
   `-



-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/2024030366.328076.1282663119633.javamail.r...@md01.wow.synacor.com



Bug#594189: initramfs-tools: environment variable to disable run_bootloader

2010-08-24 Thread Michael Prokop
* Stephen Powell zlinux...@wowway.com [Tue Aug 24, 2010 at 11:18:39AM -0400]:
 On Tue, 24 Aug 2010 10:55:43 -0400 (EDT), Michael Prokop m...@debian.org 
 wrote:
  Jepp. But isn't this (possibility for user configuration) exactly
  what Colin is requesting?

  I'm for example shipping lilo and grub with the live system (so the
  binaries as well as its documentation is available to the user), but
  nowadays the build process fails due to errors like:

run-parts: /etc/initramfs/post-update.d//lilo exited with return code 1
  [...]
run-parts: /etc/kernel/postinst.d/zz-lilo exited with return code 1

  So the IMHO open question is what's a proper way to disable such
  stuff on request?

 I am not a member of the kernel team.  I'm just an ordinary user.
 So I speak with zero authority.  And Ben may have his own ideas that
 he wishes to share.  But one way to prevent a hook script from
 executing is to remove its executable attribute.  For example,

 chmod -x /etc/kernel/postinst.d/zz-lilo
 chmod -x /etc/kernel/postrm.d/zz-lilo
 chmod -x /etc/initramfs/post-update.d/lilo

I'm aware of this, though I'd prefer a clean interface and not hacks. :)

Especially since I'm not aware of a way how to chmod -x the files before
installing the packages that fail during installation then. ;)

regards,
-mika-


signature.asc
Description: Digital signature


Bug#594189: initramfs-tools: environment variable to disable run_bootloader

2010-08-24 Thread Stephen Powell
On Tue, 24 Aug 2010 11:08:47 -0400 (EDT), Ben Hutchings wrote:
 
 Report a bug on lilo; I suppose it should warn but still 'succeed' if
 /etc/lilo.conf is missing.  elilo should do the same.  This is my bug
 and I can fix it. :-)  No idea about zipl but I doubt you care about
 s390 live media.

The last time I checked, the official version of lilo in both squeeze
and sid still did not include any hook scripts.  Joachim Wiedorn's
latest upstream version, 23.0, does include hook scripts; but Joachim
is not the Debian package maintainer for lilo, William Pitcock still is.
And William's official version does not include the hook scripts.
Therefore, opening a Debian bug report against Joachim's unofficial
Debian package is not appropriate.  I do hope that the Technical
Committee eventually gives control of the package to Joachim, but
as far as I know, no decision has yet been made.  (See bug number 587886.)

-- 
  .''`. Stephen Powell
 : :'  :
 `. `'`
   `-



-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/398211408.328559.1282663787782.javamail.r...@md01.wow.synacor.com



Bug#594189: initramfs-tools: environment variable to disable run_bootloader

2010-08-24 Thread Michael Prokop
* Stephen Powell zlinux...@wowway.com [Tue Aug 24, 2010 at 11:29:47AM -0400]:
 On Tue, 24 Aug 2010 11:08:47 -0400 (EDT), Ben Hutchings wrote:

  Report a bug on lilo; I suppose it should warn but still 'succeed' if
  /etc/lilo.conf is missing.  elilo should do the same.  This is my bug
  and I can fix it. :-)  No idea about zipl but I doubt you care about
  s390 live media.

 The last time I checked, the official version of lilo in both squeeze
 and sid still did not include any hook scripts.  Joachim Wiedorn's
 latest upstream version, 23.0, does include hook scripts; but Joachim
 is not the Debian package maintainer for lilo, William Pitcock still is.
 And William's official version does not include the hook scripts.
 Therefore, opening a Debian bug report against Joachim's unofficial
 Debian package is not appropriate.  I do hope that the Technical
 Committee eventually gives control of the package to Joachim, but
 as far as I know, no decision has yet been made.  (See bug number 587886.)

, [ aptitude changelog lilo/unstable | head ]
| Get: Changelog of lilo
| lilo (1:22.8-8.2) unstable; urgency=high
|
|   * Non-maintainer upload.
|   * Add kernel and initramfs hook scripts to ensure lilo is reinstalled
| whenever the kernel or initramfs is updated. (Closes: #590022)
|
|  -- Ben Hutchings b...@decadent.org.uk  Tue, 24 Aug 2010 04:25:24 +0100
|
| lilo (1:22.8-8.1) unstable; urgency=low
`

regards,
-mika-


signature.asc
Description: Digital signature


Bug#594189: initramfs-tools: environment variable to disable run_bootloader

2010-08-24 Thread Stephen Powell
On Tue, 24 Aug 2010 11:29:46 -0400 (EDT), Michael Prokop wrote:
 
 I'm aware of this, though I'd prefer a clean interface and not hacks. :)
 
 Especially since I'm not aware of a way how to chmod -x the files before
 installing the packages that fail during installation then. ;)
 

I haven't been following the thread; so I don't know precisely what
installation problem you are having.  But
Joachim's version of lilo does contain a bashism in it's initramfs hook
which may be the cause of the installation failure.  It uses
substring expansion, which works with the Bourne Again Shell (bash),
but not with the Bourne Shell or clones thereof (dash, ash, etc.).
This is partly my fault, since his initramfs hook is based on a template
which I provided which has the same problem.  I have reported the problem
to him, but so far I have not received a reply.

If this is the cause of the installation failure, temporarily change the
symlink /bin/sh to point to bash instead of dash.  This will allow the
package to install.  Then, change #!/bin/sh on line 1 of
/etc/initramfs/post-update.d/lilo to #!/bin/bash and change your
symlink /bin/sh to point back to dash, or whatever it used to be
pointing to.  But maybe this is not why you are having installation
problems.

-- 
  .''`. Stephen Powell
 : :'  :
 `. `'`
   `-



-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/531310898.329182.1282664833095.javamail.r...@md01.wow.synacor.com



Bug#594189: initramfs-tools: environment variable to disable run_bootloader

2010-08-24 Thread Stephen Powell
On Tue, 24 Aug 2010 11:37:29 -0400 (EDT), Michael Prokop wrote:
 
 , [ aptitude changelog lilo/unstable | head ]
 | Get: Changelog of lilo
 | lilo (1:22.8-8.2) unstable; urgency=high
 |
 |   * Non-maintainer upload.
 |   * Add kernel and initramfs hook scripts to ensure lilo is reinstalled
 | whenever the kernel or initramfs is updated. (Closes: #590022)
 |
 |  -- Ben Hutchings b...@decadent.org.uk  Tue, 24 Aug 2010 04:25:24 +0100
 |
 | lilo (1:22.8-8.1) unstable; urgency=low
 `

Aha!  Nice work, Ben.  I didn't check far enough.  I used this link

http://packages.debian.org/search?keywords=lilosearchon=namessuite=unstablesection=all

and saw that the current version was still 1:22.8-8.1.  Either the package
hasn't been uploaded yet or the web page is not in sync with the repository.

-- 
  .''`. Stephen Powell
 : :'  :
 `. `'`
   `-



-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/1917756674.329474.1282665282267.javamail.r...@md01.wow.synacor.com



Bug#594189: initramfs-tools: environment variable to disable run_bootloader

2010-08-24 Thread Colin Watson
On Tue, Aug 24, 2010 at 04:08:47PM +0100, Ben Hutchings wrote:
 On Tue, 2010-08-24 at 16:55 +0200, Michael Prokop wrote:
  * Ben Hutchings b...@decadent.org.uk [Tue Aug 24, 2010 at 03:45:36PM 
  +0100]:
   If you insist on installing such a package in the live system then it
   needs to support a safe configuration where it won't do anything until
   the user configures it to.  It doesn't matter whether it's invoked by
   the kernel, initramfs-tools, or anything else.  It *must* require user
   configuration.
  
  Jepp. But isn't this (possibility for user configuration) exactly
  what Colin is requesting?
 
 No, he was asking for a way to disable hook invocation (which is
 something of a blunt tool).

Actually, what I want is a consistent way to disable bootloader
invocation for all bootloaders, without necessarily requiring the
bootloader package not to be installed (since that's sometimes extremely
awkward to arrange).  Exactly where this goes I can't say I mind.  If
the result is an extension to the bootloader/kernel policy that needs to
be implemented in each bootloader package, that would be fine too.

  I'm for example shipping lilo and grub with the live system (so the
  binaries as well as its documentation is available to the user), but
  nowadays the build process fails due to errors like:
  
run-parts: /etc/initramfs/post-update.d//lilo exited with return code 1
  [...]
run-parts: /etc/kernel/postinst.d/zz-lilo exited with return code 1
  
  So the IMHO open question is what's a proper way to disable such
  stuff on request?
 
 Report a bug on lilo; I suppose it should warn but still 'succeed' if
 /etc/lilo.conf is missing.  elilo should do the same.  This is my bug
 and I can fix it. :-)  No idea about zipl but I doubt you care about
 s390 live media.

What I specifically do not want is for top-level client programs to have
to keep track of the different ways to ensure that each individual
bootloader is disabled.

-- 
Colin Watson   [cjwat...@debian.org]



-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20100824155518.go12...@riva.ucam.org



Bug#594189: initramfs-tools: environment variable to disable run_bootloader

2010-08-24 Thread Michael Prokop
* Stephen Powell zlinux...@wowway.com [Tue Aug 24, 2010 at 11:47:13AM -0400]:
 On Tue, 24 Aug 2010 11:29:46 -0400 (EDT), Michael Prokop wrote:

  I'm aware of this, though I'd prefer a clean interface and not hacks. :)

  Especially since I'm not aware of a way how to chmod -x the files before
  installing the packages that fail during installation then. ;)

 I haven't been following the thread; so I don't know precisely what
 installation problem you are having.  But
 Joachim's version of lilo does contain a bashism in it's initramfs hook
 which may be the cause of the installation failure.  It uses
 substring expansion, which works with the Bourne Again Shell (bash),
 but not with the Bourne Shell or clones thereof (dash, ash, etc.).
 This is partly my fault, since his initramfs hook is based on a template
 which I provided which has the same problem.  I have reported the problem
 to him, but so far I have not received a reply.

 If this is the cause of the installation failure, temporarily change the
 symlink /bin/sh to point to bash instead of dash.  This will allow the
 package to install.  Then, change #!/bin/sh on line 1 of
 /etc/initramfs/post-update.d/lilo to #!/bin/bash and change your
 symlink /bin/sh to point back to dash, or whatever it used to be
 pointing to.  But maybe this is not why you are having installation
 problems.

No, it's not because of the bashism but because of:

| Fatal: Cannot open: /etc/lilo.conf

(I just verified that once more).

See http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=594189#35
and http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=594189#40
and my bugreport against the lilo package - #594213

regards,
-mika-


signature.asc
Description: Digital signature


Bug#594189: initramfs-tools: environment variable to disable run_bootloader

2010-08-24 Thread Michael Prokop
(Removed [e]l...@packages.debian.org from Cc)

* Colin Watson cjwat...@debian.org [Tue Aug 24, 2010 at 04:55:28PM +0100]:
 On Tue, Aug 24, 2010 at 04:08:47PM +0100, Ben Hutchings wrote:
  On Tue, 2010-08-24 at 16:55 +0200, Michael Prokop wrote:
   * Ben Hutchings b...@decadent.org.uk [Tue Aug 24, 2010 at 03:45:36PM 
   +0100]:
If you insist on installing such a package in the live system then it
needs to support a safe configuration where it won't do anything until
the user configures it to.  It doesn't matter whether it's invoked by
the kernel, initramfs-tools, or anything else.  It *must* require user
configuration.

   Jepp. But isn't this (possibility for user configuration) exactly
   what Colin is requesting?

  No, he was asking for a way to disable hook invocation (which is
  something of a blunt tool).

 Actually, what I want is a consistent way to disable bootloader
 invocation for all bootloaders, without necessarily requiring the
 bootloader package not to be installed (since that's sometimes extremely
 awkward to arrange).  Exactly where this goes I can't say I mind.  If
 the result is an extension to the bootloader/kernel policy that needs to
 be implemented in each bootloader package, that would be fine too.

ACK, I'd like something like that as well.

   I'm for example shipping lilo and grub with the live system (so the
   binaries as well as its documentation is available to the user), but
   nowadays the build process fails due to errors like:

 run-parts: /etc/initramfs/post-update.d//lilo exited with return code 1
   [...]
 run-parts: /etc/kernel/postinst.d/zz-lilo exited with return code 1

   So the IMHO open question is what's a proper way to disable such
   stuff on request?

  Report a bug on lilo; I suppose it should warn but still 'succeed' if
  /etc/lilo.conf is missing.  elilo should do the same.  This is my bug
  and I can fix it. :-)  No idea about zipl but I doubt you care about
  s390 live media.

 What I specifically do not want is for top-level client programs to have
 to keep track of the different ways to ensure that each individual
 bootloader is disabled.

FullACK.

Sorry for the AOL style mail :) - I just want to express that I fully
agree with Colin's wish. It's exactly what I consider interesting for
live systems (and chroots) without having to work around any
possible dangerous package.

regards,
-mika-


signature.asc
Description: Digital signature


Bug#582281: Bug fix confirmation

2010-08-24 Thread Stephen Powell
I see that this bug has already been marked resolved, but I just wanted
to confirm that the backport of the upstream fix for this bug to kernel
2.6.32, which was originally written for a 2.6.35 kernel, does indeed
fix the problem.  I don't know if upstream backported the fix to 2.6.32
or if the Debian kernel team wrote their own patch, but package
linux-source-2.6.32 version 2.6.32-20 does show the change to
fs/partitions/ibm.c, and running a test case using stock kernel package
linux-image-2.6.32-5-s390x version 2.6.32-20 shows that the problem has
been fixed.  Nice work, kernel team!  Thanks!  I can go back to running
stock kernel images again instead of custom builds with custom patches.
And thanks to upstream too!  Peter, Moritz, Ben, thank you all.

-- 
  .''`. Stephen Powell
 : :'  :
 `. `'`
   `-



-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/1071420156.334874.1282675859457.javamail.r...@md01.wow.synacor.com



Bug#582826: Oops: 0002 unable to handle kernel paging request

2010-08-24 Thread paul . szabo
The problem did not re-occur after upgrading to 2.6.26-24.
Maybe fixed... Please close bug: I cannot reproduce anymore.

Thanks, Paul

Paul Szabo   p...@maths.usyd.edu.au   http://www.maths.usyd.edu.au/u/psz/
School of Mathematics and Statistics   University of SydneyAustralia



-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/201008242303.o7on3mrw017...@bari.maths.usyd.edu.au



Re: [Pkg-xen-devel] Graphics driver fixes for squeeze kernel-xen ?

2010-08-24 Thread Ben Hutchings
On Mon, 2010-08-23 at 15:22 +0100, Ian Campbell wrote:
 On Mon, 2010-08-23 at 17:11 +0300, Pasi Kärkkäinen wrote:
  On Sun, Aug 22, 2010 at 01:16:20AM +0300, Pasi Kärkkäinen wrote:
   On Sat, Aug 21, 2010 at 10:27:16PM +0100, Ian Campbell wrote:
On Sat, 2010-08-21 at 23:52 +0300, Pasi Kärkkäinen wrote:
 On Tue, Aug 17, 2010 at 09:28:32PM +0200, Bastian Blank wrote:
  Please send such mails to the maintainer of the package, not me.
  
  On Tue, Aug 17, 2010 at 08:55:33PM +0300, Pasi Kärkkäinen wrote:
   Is there a plan to update the dom0-capable kernel to the latest
   version from xen/stable-2.6.32.x branch?
  
  On the way.
  
 
 Oh, kernel update form xen/stable-2.6.32.x will bring
 Xen PV-on-HVM drivers aswell..

These drivers have also been backported to the regular 2.6.32 flavour
for Squeeze so you won't need the Xen flavour to get this functionality.

   
   Oh nice! Thanks.
   
  
  Btw which kernel release in squeeze/testing adds these pv-on-hvm drivers? 
 
 It will be in 2.6.32-21 which AIUI will be uploaded to Sid shortly.
 Sorry, it was misleading of me to suggest it was already in Squeeze.

Sadly not.  I have had to revert the addition of pvhvm because it causes
an instant panic under KVM (at least in a 64-bit kernel).

Ben.

-- 
Ben Hutchings
Once a job is fouled up, anything done to improve it makes it worse.


signature.asc
Description: This is a digitally signed message part


Bug#582826: marked as done (Oops: 0002 unable to handle kernel paging request)

2010-08-24 Thread Debian Bug Tracking System
Your message dated Wed, 25 Aug 2010 02:51:38 +0100
with message-id 1282701098.22839.56.ca...@localhost
and subject line Re: Bug#582826: Oops: 0002 unable to handle kernel paging 
request
has caused the Debian Bug report #582826,
regarding Oops: 0002 unable to handle kernel paging request
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
582826: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=582826
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: linux-source-2.6.26
Version: 2.6.26-21
Severity: normal


My main file and login server machine crashed, with an Oops in the logs.
I do not know whether this crash is reproducible: it crashed also a week
earlier, but with nothing visible in the logs; it had been stable for
months before these two crashes.

Extract from /var/log/syslog at the crash:

May 22 20:29:45 bari kernel: BUG: unable to handle kernel paging request at 
b14f6dc2
May 22 20:29:45 bari kernel: IP: [c014b326] find_get_pages+0x46/0x70
May 22 20:29:45 bari kernel: *pdpt = 31a75001 *pde =  
May 22 20:29:45 bari kernel: Oops: 0002 [#1] SMP 
May 22 20:29:45 bari kernel: Modules linked in: nfsd exportfs autofs4 quota_v2 
fuse intel_agp agpgart usb_storage sg thermal 8250_pnp 8250 rtc_cmos rtc_core 
ehci_hcd parport_pc parport serial_core rtc_lib evdev i2c_i801 i2c_core 
processor thermal_sys
May 22 20:29:45 bari kernel: 
May 22 20:29:45 bari kernel: Pid: 287, comm: kswapd0 Not tainted 
(2.6.26-pk03.17-svr #1)
May 22 20:29:45 bari kernel: EIP: 0060:[c014b326] EFLAGS: 00010002 CPU: 5
May 22 20:29:45 bari kernel: EIP is at find_get_pages+0x46/0x70
May 22 20:29:45 bari kernel: EAX: b16f6cbe EBX: 0001 ECX:  EDX: 
b14f6dbe
May 22 20:29:45 bari kernel: ESI:  EDI: e39c5dd8 EBP: f7e39e88 ESP: 
f7e39e40
May 22 20:29:45 bari kernel:  DS: 007b ES: 007b FS: 00d8 GS:  SS: 0068
May 22 20:29:45 bari kernel: Process kswapd0 (pid: 287, ti=f7e39000 
task=f7d7c6e0 task.ti=f7e39000)
May 22 20:29:45 bari kernel: Stack: 000e e39c5de8  f7e39e80 
 f7e39e80 c01539c2 f7e39e88 
May 22 20:29:45 bari kernel:e39c5d30 0080 c01545b4 000e 
00155ca7  e39c5dd8  
May 22 20:29:45 bari kernel:  c520e340 c1edb9e0 
c4f7bc60 c5278ae0 c39e7a60 c42deaa0 
May 22 20:29:45 bari kernel: Call Trace:
May 22 20:29:45 bari kernel:  [c01539c2] pagevec_lookup+0x22/0x30
May 22 20:29:45 bari kernel:  [c01545b4] __invalidate_mapping_pages+0x54/0x140
May 22 20:29:45 bari kernel:  [c01546af] invalidate_mapping_pages+0xf/0x20
May 22 20:29:45 bari kernel:  [c0186565] shrink_icache_memory+0x235/0x240
May 22 20:29:45 bari kernel:  [c015609f] shrink_slab+0x12f/0x190
May 22 20:29:45 bari kernel:  [c01564cd] kswapd+0x3cd/0x490
May 22 20:29:45 bari kernel:  [c0154d70] isolate_pages_global+0x0/0x60
May 22 20:29:45 bari kernel:  [c0136f80] autoremove_wake_function+0x0/0x50
May 22 20:29:45 bari kernel:  [c0156100] kswapd+0x0/0x490
May 22 20:29:45 bari kernel:  [c0136c99] kthread+0x39/0x70
May 22 20:29:45 bari kernel:  [c0136c60] kthread+0x0/0x70
May 22 20:29:45 bari kernel:  [c0103c83] kernel_thread_helper+0x7/0x14
May 22 20:29:45 bari kernel:  ===
May 22 20:29:45 bari kernel: Code: 30 00 8d 47 04 89 f1 89 ea 89 1c 24 e8 84 63 
10 00 85 c0 89 c3 74 1f 31 c9 8d 74 26 00 8b 54 8d 00 8b 02 f6 c4 40 74 03 8b 
52 0c f0 ff 42 04 83 c1 01 39 cb 77 e7 8b 44 24 04 f0 ff 47 10 fb 83 
May 22 20:29:45 bari kernel: EIP: [c014b326] find_get_pages+0x46/0x70 SS:ESP 
0068:f7e39e40
May 22 20:29:45 bari kernel: ---[ end trace 34faad952d0fda3f ]---

At this last crash, I happened to be logged in via ssh, and in the ssh
terminal window I had similar output, but curiously with a few lines
interchanged in order (and I am not sure whether the terminal output or
the syslog is correct; each line on the terminal was separately prefaced
with Message from syslogd... and separated with blank lines):

Message from sysl...@bari at Sat May 22 20:29:45 2010 ...
bari kernel: Oops: 0002 [#1] SMP 
bari kernel: Process kswapd0 (pid: 287, ti=f7e39000 task=f7d7c6e0 
task.ti=f7e39000)
bari kernel: Stack: 000e e39c5de8  f7e39e80  f7e39e80 
c01539c2 f7e39e88 
bari kernel:  c520e340 c1edb9e0 c4f7bc60 c5278ae0 
c39e7a60 c42deaa0 
bari kernel:e39c5d30 0080 c01545b4 000e 00155ca7  
e39c5dd8  
bari kernel: Call Trace:
bari kernel:  [c01539c2] pagevec_lookup+0x22/0x30
bari kernel:  [c01545b4] __invalidate_mapping_pages+0x54/0x140
bari kernel:  [c01546af] 

linux-2.6_2.6.26-24lenny1_amd64.changes ACCEPTED

2010-08-24 Thread Archive Administrator


Notes:
Mapping stable-security to proposed-updates.


Accepted:
linux-2.6_2.6.26-24lenny1.diff.gz
  to main/l/linux-2.6/linux-2.6_2.6.26-24lenny1.diff.gz
linux-2.6_2.6.26-24lenny1.dsc
  to main/l/linux-2.6/linux-2.6_2.6.26-24lenny1.dsc
linux-doc-2.6.26_2.6.26-24lenny1_all.deb
  to main/l/linux-2.6/linux-doc-2.6.26_2.6.26-24lenny1_all.deb
linux-headers-2.6.26-2-all-amd64_2.6.26-24lenny1_amd64.deb
  to main/l/linux-2.6/linux-headers-2.6.26-2-all-amd64_2.6.26-24lenny1_amd64.deb
linux-headers-2.6.26-2-all_2.6.26-24lenny1_amd64.deb
  to main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-24lenny1_amd64.deb
linux-headers-2.6.26-2-amd64_2.6.26-24lenny1_amd64.deb
  to main/l/linux-2.6/linux-headers-2.6.26-2-amd64_2.6.26-24lenny1_amd64.deb
linux-headers-2.6.26-2-common-openvz_2.6.26-24lenny1_amd64.deb
  to 
main/l/linux-2.6/linux-headers-2.6.26-2-common-openvz_2.6.26-24lenny1_amd64.deb
linux-headers-2.6.26-2-common-vserver_2.6.26-24lenny1_amd64.deb
  to 
main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-24lenny1_amd64.deb
linux-headers-2.6.26-2-common-xen_2.6.26-24lenny1_amd64.deb
  to 
main/l/linux-2.6/linux-headers-2.6.26-2-common-xen_2.6.26-24lenny1_amd64.deb
linux-headers-2.6.26-2-common_2.6.26-24lenny1_amd64.deb
  to main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-24lenny1_amd64.deb
linux-headers-2.6.26-2-openvz-amd64_2.6.26-24lenny1_amd64.deb
  to 
main/l/linux-2.6/linux-headers-2.6.26-2-openvz-amd64_2.6.26-24lenny1_amd64.deb
linux-headers-2.6.26-2-vserver-amd64_2.6.26-24lenny1_amd64.deb
  to 
main/l/linux-2.6/linux-headers-2.6.26-2-vserver-amd64_2.6.26-24lenny1_amd64.deb
linux-headers-2.6.26-2-xen-amd64_2.6.26-24lenny1_amd64.deb
  to main/l/linux-2.6/linux-headers-2.6.26-2-xen-amd64_2.6.26-24lenny1_amd64.deb
linux-image-2.6.26-2-amd64_2.6.26-24lenny1_amd64.deb
  to main/l/linux-2.6/linux-image-2.6.26-2-amd64_2.6.26-24lenny1_amd64.deb
linux-image-2.6.26-2-openvz-amd64_2.6.26-24lenny1_amd64.deb
  to 
main/l/linux-2.6/linux-image-2.6.26-2-openvz-amd64_2.6.26-24lenny1_amd64.deb
linux-image-2.6.26-2-vserver-amd64_2.6.26-24lenny1_amd64.deb
  to 
main/l/linux-2.6/linux-image-2.6.26-2-vserver-amd64_2.6.26-24lenny1_amd64.deb
linux-image-2.6.26-2-xen-amd64_2.6.26-24lenny1_amd64.deb
  to main/l/linux-2.6/linux-image-2.6.26-2-xen-amd64_2.6.26-24lenny1_amd64.deb
linux-libc-dev_2.6.26-24lenny1_amd64.deb
  to main/l/linux-2.6/linux-libc-dev_2.6.26-24lenny1_amd64.deb
linux-manual-2.6.26_2.6.26-24lenny1_all.deb
  to main/l/linux-2.6/linux-manual-2.6.26_2.6.26-24lenny1_all.deb
linux-modules-2.6.26-2-xen-amd64_2.6.26-24lenny1_amd64.deb
  to main/l/linux-2.6/linux-modules-2.6.26-2-xen-amd64_2.6.26-24lenny1_amd64.deb
linux-patch-debian-2.6.26_2.6.26-24lenny1_all.deb
  to main/l/linux-2.6/linux-patch-debian-2.6.26_2.6.26-24lenny1_all.deb
linux-source-2.6.26_2.6.26-24lenny1_all.deb
  to main/l/linux-2.6/linux-source-2.6.26_2.6.26-24lenny1_all.deb
linux-support-2.6.26-2_2.6.26-24lenny1_all.deb
  to main/l/linux-2.6/linux-support-2.6.26-2_2.6.26-24lenny1_all.deb
linux-tree-2.6.26_2.6.26-24lenny1_all.deb
  to main/l/linux-2.6/linux-tree-2.6.26_2.6.26-24lenny1_all.deb
xen-linux-system-2.6.26-2-xen-amd64_2.6.26-24lenny1_amd64.deb
  to 
main/l/linux-2.6/xen-linux-system-2.6.26-2-xen-amd64_2.6.26-24lenny1_amd64.deb


Override entries for your package:
linux-2.6_2.6.26-24lenny1.dsc - source devel
linux-doc-2.6.26_2.6.26-24lenny1_all.deb - optional doc
linux-headers-2.6.26-2-all-amd64_2.6.26-24lenny1_amd64.deb - optional devel
linux-headers-2.6.26-2-all_2.6.26-24lenny1_amd64.deb - optional devel
linux-headers-2.6.26-2-amd64_2.6.26-24lenny1_amd64.deb - optional devel
linux-headers-2.6.26-2-common-openvz_2.6.26-24lenny1_amd64.deb - optional devel
linux-headers-2.6.26-2-common-vserver_2.6.26-24lenny1_amd64.deb - optional devel
linux-headers-2.6.26-2-common-xen_2.6.26-24lenny1_amd64.deb - optional devel
linux-headers-2.6.26-2-common_2.6.26-24lenny1_amd64.deb - optional devel
linux-headers-2.6.26-2-openvz-amd64_2.6.26-24lenny1_amd64.deb - optional devel
linux-headers-2.6.26-2-vserver-amd64_2.6.26-24lenny1_amd64.deb - optional devel
linux-headers-2.6.26-2-xen-amd64_2.6.26-24lenny1_amd64.deb - optional devel
linux-image-2.6.26-2-amd64_2.6.26-24lenny1_amd64.deb - optional admin
linux-image-2.6.26-2-openvz-amd64_2.6.26-24lenny1_amd64.deb - optional admin
linux-image-2.6.26-2-vserver-amd64_2.6.26-24lenny1_amd64.deb - optional admin
linux-image-2.6.26-2-xen-amd64_2.6.26-24lenny1_amd64.deb - optional admin
linux-libc-dev_2.6.26-24lenny1_amd64.deb - optional devel
linux-manual-2.6.26_2.6.26-24lenny1_all.deb - optional doc
linux-modules-2.6.26-2-xen-amd64_2.6.26-24lenny1_amd64.deb - optional admin
linux-patch-debian-2.6.26_2.6.26-24lenny1_all.deb - optional devel
linux-source-2.6.26_2.6.26-24lenny1_all.deb - optional devel
linux-support-2.6.26-2_2.6.26-24lenny1_all.deb - optional devel
linux-tree-2.6.26_2.6.26-24lenny1_all.deb - optional devel
xen-linux-system-2.6.26-2-xen-amd64_2.6.26-24lenny1_amd64.deb - extra admin

Announcing to 

Bug#589179: marked as done (linux-image-2.6.26-2-686: heap base address is not randomised when randomize_va_space is set to 2)

2010-08-24 Thread Debian Bug Tracking System
Your message dated Wed, 25 Aug 2010 01:56:04 +
with message-id e1oo5dg-00021n...@franck.debian.org
and subject line Bug#589179: fixed in linux-2.6 2.6.26-24lenny1
has caused the Debian Bug report #589179,
regarding linux-image-2.6.26-2-686: heap base address is not randomised when 
randomize_va_space is set to 2
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
589179: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=589179
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: linux-2.6
Version: 2.6.26-24
Severity: normal

Hi,
When running the latest stable Debian kernel the base address of a heap is not 
randomised regardless of the
setting for randomize_va_space (it is set to 2 by default). This can be 
observed by using a simple .c
program (below) or using the paxtest suite available from here:
http://grsecurity.net/~spender/paxtest-0.9.9.tgz

Please bear in mind that I only have tested this within virtualised environment 
and I have only tested a x86 system.

sample c program I used:
#include stdio.h
#include stdlib.h

void main() {

char * p = (char *) malloc(40*sizeof(char));
printf(address: %x\n,p);
}

compile and run:
gcc -o heap heap.c
watch -n 1 ./heap

reproducible: always

steps to reproduce:
- compile and run paxtest or simple .c program from above

expected results:
- randomised addressed for heap allocations - address of the malloc'ed var 
should be different each time the program is run.
For the paxtest - it should not report 'no randomisation' for 'Heap 
randomisation test (ET_EXEC)'

actual results:
- no randomisation of the heap base addresses.

-- Package-specific info:
** Version:
Linux version 2.6.26-2-686 (Debian 2.6.26-24) (da...@debian.org) (gcc version 
4.1.3 20080704 (prerelease) (Debian 4.1.2-25)) #1 SMP Mon Jun 21 05:58:44 UTC 
2010

** Command line:
root=/dev/hda1 ro quiet

** Not tainted

** Kernel log:
[5.227996] usb 1-1: new full speed USB device using uhci_hcd and address 2
[5.485259] PM: Starting manual resume from disk
[5.517670] EXT3-fs: INFO: recovery required on readonly filesystem.
[5.517674] EXT3-fs: write access will be enabled during recovery.
[5.590701] usb 1-1: configuration #1 chosen from 1 choice
[5.643904] usb 1-1: New USB device found, idVendor=0627, idProduct=0001
[5.643909] usb 1-1: New USB device strings: Mfr=3, Product=2, SerialNumber=1
[5.643912] usb 1-1: Product: QEMU USB Tablet
[5.643914] usb 1-1: Manufacturer: QEMU 0.12.4
[5.643916] usb 1-1: SerialNumber: 1
[5.710778] usbcore: registered new interface driver hiddev
[5.735324] input: QEMU 0.12.4 QEMU USB Tablet as /class/input/input1
[5.739330] input,hidraw0: USB HID v0.01 Pointer [QEMU 0.12.4 QEMU USB 
Tablet] on usb-:00:01.2-1
[5.739330] usbcore: registered new interface driver usbhid
[5.739330] usbhid: v2.6:USB HID core driver
[6.359345] kjournald starting.  Commit interval 5 seconds
[6.359345] EXT3-fs: recovery complete.
[6.359345] EXT3-fs: mounted filesystem with ordered data mode.
[9.039926] udevd version 125 started
[9.809803] udev: renamed network interface eth0 to eth6
[   10.587020] piix4_smbus :00:01.3: Found :00:01.3 device
[   10.797426] input: Power Button (FF) as /class/input/input2
[   10.828746] ACPI: Power Button (FF) [PWRF]
[   11.152352] input: PC Speaker as /class/input/input3
[   11.368600] input: ImExPS/2 Generic Explorer Mouse as /class/input/input4
[   11.472414] parport_pc 00:05: reported by Plug and Play ACPI
[   11.472414] parport0: PC-style at 0x378, irq 7 [PCSPP,TRISTATE]
[   12.741775] Adding 489940k swap on /dev/hda5.  Priority:-1 extents:1 
across:489940k
[  113.697388] EXT3 FS on hda1, internal journal
[  114.415953] loop: module loaded
[  121.243828] NET: Registered protocol family 10
[  121.246126] lo: Disabled Privacy Extensions
[  122.529155] lp0: using parport0 (interrupt-driven).
[  122.667535] ppdev: user-space parallel port driver
[  126.465548] eth6: link up, 100Mbps, full-duplex, lpa 0x05E1
[  144.751798] eth6: no IPv6 routers present
[  808.293430] BUG: soft lockup - CPU#0 stuck for 104s! [swapper:0]
[  808.293430] Modules linked in: ppdev lp ipv6 cpufreq_ondemand cpufreq_stats 
freq_table cpufreq_userspace cpufreq_powersave cpufreq_conservative loop 
parport_pc parport pcspkr psmouse serio_raw button i2c_piix4 i2c_core joydev 
evdev usbhid hid ff_memless ext3 jbd mbcache ide_cd_mod cdrom ide_disk 
ata_generic libata scsi_mod 8139too dock floppy 8139cp mii uhci_hcd piix 
ide_pci_generic usbcore ide_core thermal processor fan thermal_sys [last 

Bug#589179: marked as done (linux-image-2.6.26-2-686: heap base address is not randomised when randomize_va_space is set to 2)

2010-08-24 Thread Debian Bug Tracking System
Your message dated Wed, 25 Aug 2010 01:57:58 +
with message-id e1oo5fw-0002fa...@franck.debian.org
and subject line Bug#589179: fixed in user-mode-linux 2.6.26-1um-2+24lenny1
has caused the Debian Bug report #589179,
regarding linux-image-2.6.26-2-686: heap base address is not randomised when 
randomize_va_space is set to 2
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
589179: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=589179
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: linux-2.6
Version: 2.6.26-24
Severity: normal

Hi,
When running the latest stable Debian kernel the base address of a heap is not 
randomised regardless of the
setting for randomize_va_space (it is set to 2 by default). This can be 
observed by using a simple .c
program (below) or using the paxtest suite available from here:
http://grsecurity.net/~spender/paxtest-0.9.9.tgz

Please bear in mind that I only have tested this within virtualised environment 
and I have only tested a x86 system.

sample c program I used:
#include stdio.h
#include stdlib.h

void main() {

char * p = (char *) malloc(40*sizeof(char));
printf(address: %x\n,p);
}

compile and run:
gcc -o heap heap.c
watch -n 1 ./heap

reproducible: always

steps to reproduce:
- compile and run paxtest or simple .c program from above

expected results:
- randomised addressed for heap allocations - address of the malloc'ed var 
should be different each time the program is run.
For the paxtest - it should not report 'no randomisation' for 'Heap 
randomisation test (ET_EXEC)'

actual results:
- no randomisation of the heap base addresses.

-- Package-specific info:
** Version:
Linux version 2.6.26-2-686 (Debian 2.6.26-24) (da...@debian.org) (gcc version 
4.1.3 20080704 (prerelease) (Debian 4.1.2-25)) #1 SMP Mon Jun 21 05:58:44 UTC 
2010

** Command line:
root=/dev/hda1 ro quiet

** Not tainted

** Kernel log:
[5.227996] usb 1-1: new full speed USB device using uhci_hcd and address 2
[5.485259] PM: Starting manual resume from disk
[5.517670] EXT3-fs: INFO: recovery required on readonly filesystem.
[5.517674] EXT3-fs: write access will be enabled during recovery.
[5.590701] usb 1-1: configuration #1 chosen from 1 choice
[5.643904] usb 1-1: New USB device found, idVendor=0627, idProduct=0001
[5.643909] usb 1-1: New USB device strings: Mfr=3, Product=2, SerialNumber=1
[5.643912] usb 1-1: Product: QEMU USB Tablet
[5.643914] usb 1-1: Manufacturer: QEMU 0.12.4
[5.643916] usb 1-1: SerialNumber: 1
[5.710778] usbcore: registered new interface driver hiddev
[5.735324] input: QEMU 0.12.4 QEMU USB Tablet as /class/input/input1
[5.739330] input,hidraw0: USB HID v0.01 Pointer [QEMU 0.12.4 QEMU USB 
Tablet] on usb-:00:01.2-1
[5.739330] usbcore: registered new interface driver usbhid
[5.739330] usbhid: v2.6:USB HID core driver
[6.359345] kjournald starting.  Commit interval 5 seconds
[6.359345] EXT3-fs: recovery complete.
[6.359345] EXT3-fs: mounted filesystem with ordered data mode.
[9.039926] udevd version 125 started
[9.809803] udev: renamed network interface eth0 to eth6
[   10.587020] piix4_smbus :00:01.3: Found :00:01.3 device
[   10.797426] input: Power Button (FF) as /class/input/input2
[   10.828746] ACPI: Power Button (FF) [PWRF]
[   11.152352] input: PC Speaker as /class/input/input3
[   11.368600] input: ImExPS/2 Generic Explorer Mouse as /class/input/input4
[   11.472414] parport_pc 00:05: reported by Plug and Play ACPI
[   11.472414] parport0: PC-style at 0x378, irq 7 [PCSPP,TRISTATE]
[   12.741775] Adding 489940k swap on /dev/hda5.  Priority:-1 extents:1 
across:489940k
[  113.697388] EXT3 FS on hda1, internal journal
[  114.415953] loop: module loaded
[  121.243828] NET: Registered protocol family 10
[  121.246126] lo: Disabled Privacy Extensions
[  122.529155] lp0: using parport0 (interrupt-driven).
[  122.667535] ppdev: user-space parallel port driver
[  126.465548] eth6: link up, 100Mbps, full-duplex, lpa 0x05E1
[  144.751798] eth6: no IPv6 routers present
[  808.293430] BUG: soft lockup - CPU#0 stuck for 104s! [swapper:0]
[  808.293430] Modules linked in: ppdev lp ipv6 cpufreq_ondemand cpufreq_stats 
freq_table cpufreq_userspace cpufreq_powersave cpufreq_conservative loop 
parport_pc parport pcspkr psmouse serio_raw button i2c_piix4 i2c_core joydev 
evdev usbhid hid ff_memless ext3 jbd mbcache ide_cd_mod cdrom ide_disk 
ata_generic libata scsi_mod 8139too dock floppy 8139cp mii uhci_hcd piix 
ide_pci_generic usbcore ide_core thermal processor fan 

Bug#570382: after upgrade: vlogin: openpty(): No such file or directory

2010-08-24 Thread micah anderson
On Mon, 23 Aug 2010 21:56:17 +0200 (CEST), Tomas Pospisek t...@sourcepole.ch 
wrote:

 On a different note: the last update to the most recent DSA kernels [2] 
 went completely smoothly - that is all vservers restarted without a 
 hickup. Makes me wonder if that was caused by a change in the 
 2.6.26-24lenny1 kernel? We'll see at the next upgrade.

I noticed this too, last DSA went perfectly. Before I would get at least
one guest on each machine that would exhibit this problem, this time I
got none. 

However, I *did* get one on my amd64 box. All the others were i386

micah


pgpNLGDLqcRcL.pgp
Description: PGP signature


Bug#594189: initramfs-tools: environment variable to disable run_bootloader

2010-08-24 Thread Ben Hutchings
On Tue, 2010-08-24 at 16:55 +0100, Colin Watson wrote:
 On Tue, Aug 24, 2010 at 04:08:47PM +0100, Ben Hutchings wrote:
  On Tue, 2010-08-24 at 16:55 +0200, Michael Prokop wrote:
   * Ben Hutchings b...@decadent.org.uk [Tue Aug 24, 2010 at 03:45:36PM 
   +0100]:
If you insist on installing such a package in the live system then it
needs to support a safe configuration where it won't do anything until
the user configures it to.  It doesn't matter whether it's invoked by
the kernel, initramfs-tools, or anything else.  It *must* require user
configuration.
   
   Jepp. But isn't this (possibility for user configuration) exactly
   what Colin is requesting?
  
  No, he was asking for a way to disable hook invocation (which is
  something of a blunt tool).
 
 Actually, what I want is a consistent way to disable bootloader
 invocation for all bootloaders, without necessarily requiring the
 bootloader package not to be installed (since that's sometimes extremely
 awkward to arrange).  Exactly where this goes I can't say I mind.  If
 the result is an extension to the bootloader/kernel policy that needs to
 be implemented in each bootloader package, that would be fine too.
[...]

OK, so something like this:

Boot loader packages must be installable on the filesystem in a
disabled state where they will not write to the boot sector or other
non-filesystem storage.  While a boot loader is disabled, any kernel and
initramfs hooks it includes must do nothing except (optionally) printing
a warning that the boot loader is disabled, and must exit successfully.

Ben.

-- 
Ben Hutchings
Once a job is fouled up, anything done to improve it makes it worse.


signature.asc
Description: This is a digitally signed message part


Processed: forcibly merging 588782 586369

2010-08-24 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 forcemerge 588782 586369
Bug#588782: openvz: openvz and ext4 core dump on quota check
Bug#586369: linux-image-2.6.32-5-openvz-686: Kernel oops, with openvz kernel 
and  ext4
Forcibly Merged 586369 588782.

 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
588782: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=588782
586369: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=586369
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.c.12827116719685.transcr...@bugs.debian.org



Bug#588782: same bug as 586369

2010-08-24 Thread Ben Hutchings
On Tue, 2010-08-24 at 08:07 +0200, Nicolas Parpandet wrote:
 same bug as 586369

Right, it looks like it.

Has this been fixed in a more recent version?  If not, please report
this upstream at http://bugzilla.openvz.org/ and let us know the
number or URL so we can track it.

Ben.

-- 
Ben Hutchings
Once a job is fouled up, anything done to improve it makes it worse.


signature.asc
Description: This is a digitally signed message part


Bug#594149: linux-image-2.6.32-5-amd64: Lid switch correct every other time; suspend every other lid close; Samsung N150-11 netbook

2010-08-24 Thread Ben Hutchings
On Mon, 2010-08-23 at 23:21 -0400, Doug Currie wrote:
 Package: linux-2.6
 Version: 2.6.32-20
 Severity: normal
 
 
 Samsung N150-11 netbook. Each lid closeopen toggles the lid switch state 
 so when the lid is open, half the time it reports closed:
 
 e...@esammy:~$ cat /proc/acpi/button/lid/LID0/state
 state:  open
 
 # close  open lid
 
 e...@esammy:~$ cat /proc/acpi/button/lid/LID0/state
 state:  closed
 
 So, the netbook only suspends every other time the lid is closed.
 This could be dangerous with the netbook stowed in running mode
 getting hot.
[...]

The firmware should throttle the processor and eventually power-off the
system if it is too hot.  But still, this behaviour is unfortunate.

Did any earlier kernel version handle the lid switch correctly?
Can you test the package of Linux 2.6.35 in experimental?

Ben.

-- 
Ben Hutchings
Once a job is fouled up, anything done to improve it makes it worse.


signature.asc
Description: This is a digitally signed message part


Processed: tagging 594149

2010-08-24 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tags 594149 + moreinfo
Bug #594149 [linux-2.6] linux-image-2.6.32-5-amd64: Lid switch correct every 
other time; suspend every other lid close; Samsung N150-11 netbook
Added tag(s) moreinfo.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
594149: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=594149
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.c.128271230614383.transcr...@bugs.debian.org



Processed: tagging 588782

2010-08-24 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tags 588782 + moreinfo
Bug #588782 [linux-2.6] openvz: openvz and ext4 core dump on quota check
Bug #586369 [linux-2.6] linux-image-2.6.32-5-openvz-686: Kernel oops, with 
openvz kernel and  ext4
Added tag(s) moreinfo.
Added tag(s) moreinfo.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
588782: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=588782
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.c.128271232314476.transcr...@bugs.debian.org