Bug#600356: luks + usbkeyboard: cannot type passphrase

2010-10-16 Thread Martin Würtele
Package: linux-2.6
Version: 2.6.32-23
Severity: normal
Tags: squeeze

Hi,

on one box I have problems with kernels newer than 2.6.26-2: I cannot type the
luks passphrase to boot.

I manually added usbcore, uhci_hcd, ehci_hcd and usbhid to
/etc/initramfs-tools/modules to see if the modules were not loaded despite
MODULES=most in /etc/initramfs-tools/initramfs.conf.

The last lines I can read on the screen (please excuse typos) are:

usb 2.6: new log speed USB device using ohce_hcd and address 4
usb 2-6: New USB device found, idVendor=946d, idProduct=c30a
usb 2-6: New USB device strings: Mfr=1, Product=2, SerialNumber=0
usb 2-6: Product: Logitech USB Keyboard
usb 2-6: Manufacturer: Logitech
usb 2-6: configuration #1 chosen from 1 choice
usbcore: registerd new interface driver hiddev
usbhid 2-3:1.9: couldn't find an interrupt endpoint
input: PS/2+USB Mouse as 
/devices/pc:00/:00:02./usb2/2-5:1.0/input/input1
gerneric-usb 0003:1267:0213:0001: input,hidraw0: USB HID v1.11 Mouse [OS/2+USB 
Mouse] on usb-:00:02.0-5/input0
usbcore: registerred new interface driver usbhid
usbhid: v2.6: v2.6:USB HID core driver
Begin: Loading essential drivers ... done.
Begin: Runnin /scritps/init-premount ... done.
Begin: Mounting root file system ... Begin: runnin /scripts/local-top ... 
Begin: Loading md: raid1 personality registered for level 1
Success: loaded module raid1.
done.

[ md stuff for the raid ...]

Unlocking the disk /dev/md2 (md2_crypt)
Enter passpharse:


yours Martin


-- Package-specific info:
** Version:
Linux version 2.6.32-5-amd64 (Debian 2.6.32-23) (da...@debian.org) (gcc version 
4.3.5 (Debian 4.3.5-3) ) #1 SMP Fri Sep 17 21:50:19 UTC 2010



-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20101016112613.21479.65243.report...@liberty.vie.wuertele.net



Processed: tagging 600356

2010-10-16 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tags 600356 - squeeze
Bug #600356 [linux-2.6] luks + usbkeyboard: cannot type passphrase
Removed tag(s) squeeze.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
600356: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=600356
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.c.128722893416902.transcr...@bugs.debian.org



Processed: reassign 600356 to initramfs-tools

2010-10-16 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 reassign 600356 initramfs-tools
Bug #600356 [linux-2.6] luks + usbkeyboard: cannot type passphrase
Bug reassigned from package 'linux-2.6' to 'initramfs-tools'.
Bug No longer marked as found in versions 2.6.32-23.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
600356: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=600356
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.c.12872326993081.transcr...@bugs.debian.org



Bug#600356: Acknowledgement (luks + usbkeyboard: cannot type passphrase)

2010-10-16 Thread Martin Wuertele
reassign 600356 linux-2.6
thanks

I really think this is a bug in the kernel. I forcefully put all
required modules in the initramfs to demonstrate that the bug is not in
loading the modules but in the result.

My guess is it has something todo with 

usbhid 2-3:1.9: couldn't find an interrupt endpoint

but my knowledge of the kernel is quite limited.

Yours Martin



-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20101016130311.gb4...@anguilla.debian.or.at



Processed: reassign 600356 to linux-2.6

2010-10-16 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 reassign 600356 linux-2.6 2.6.32-23
Bug #600356 [initramfs-tools] luks + usbkeyboard: cannot type passphrase
Bug reassigned from package 'initramfs-tools' to 'linux-2.6'.
Bug #600356 [linux-2.6] luks + usbkeyboard: cannot type passphrase
There is no source info for the package 'linux-2.6' at version '2.6.32-23' with 
architecture ''
Unable to make a source version for version '2.6.32-23'
Bug Marked as found in versions 2.6.32-23.

End of message, stopping processing here.

Please contact me if you need assistance.
-- 
600356: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=600356
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.c.128723451313834.transcr...@bugs.debian.org



Bug#599351: Caused by libdrm

2010-10-16 Thread brian m. carlson
I've done some testing on these bugs.  After 599351, I moved back to
Linux 2.6.32-5-amd64, at which time I filed 599496 (because a very
similar problem occurred).  I had installed libdrm{2,-intel1}
2.4.22~pre(something) and reverting back to 2.4.21-1~squeeze3 fixed the
problem.

I need to do some more testing to see if 2.4.22-1 will work properly,
and also whether 599351 disappears on 2.6.36-rc5 with the older libdrm
(or 2.4.22-1).  Regardless of the results, neither of these bugs should
be closed, since the kernel should not allow processes to hang on syscalls
regardless of the data passed.  Cloning 599351 to libdrm would be fine
with me.

-- 
brian m. carlson / brian with sandals: Houston, Texas, US
+1 832 623 2791 | http://www.crustytoothpaste.net/~bmc | My opinion only
OpenPGP: RSA v4 4096b: 88AC E9B2 9196 305B A994 7552 F1BA 225C 0223 B187


signature.asc
Description: Digital signature


Bug#600384: dm-crypt: please backport support for plain64 IV

2010-10-16 Thread Henrique de Moraes Holschuh
Package: linux-2.6
Version: 2.6.32-25
Severity: important

Please backport commit 61afef614b013ee1b767cdd10325acae1db1f4d2
dm crypt: add plain64 iv from upstream.  It should be a clean
cherry-pick.

Without it, Debian squeeze users might not be able to use dm-crypt
volumes created on newer kernels using *-xts-plain64, nor will be able
to create such volumes.

Using plain for IVs on block devices with more than 2^32 blocks will
cause the same IV to be used twice due to roll-over.  This is not a good
thing, although it might be not bad enough to matter much (or it could
be a terrible problem.  Someone who groks crypto for real would have to
answer that).

One cannot fix the plain IV to not warp at 2^32, or data after the
roll-over point becomes unreadable on any already-existing devices.
Thus, the only solution was to add a new IV (plain64).  For devices
smaller than 2^32 512 byte blocks, plain and plain64 are equivalent.

Userspace and docs are already beggining to tell users to use
aes-xts-plain64 and not aes-xts-plain.  They will use them in their
portable HDs, possibly on other distros, and then will not be able to
read them back in squeeze.

-- System Information:
Debian Release: squeeze/sid
  APT prefers testing
  APT policy: (500, 'testing'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.32.23 (SMP w/8 CPU cores)
Locale: LANG=pt_BR.UTF-8, LC_CTYPE=pt_BR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash



-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20101016165729.32565.38223.report...@khazad-dum2.khazad-dum.debian.net



Bug#583968: xserver-xorg-video-radeon: xpress 200m 5955 = resume from suspend fails with KMS enabled

2010-10-16 Thread Andres Cimmarusti
 Patch seems to be
 http://article.gmane.org/gmane.comp.video.dri.devel/48108

Yes this patch works. It's been applied upstream since version 2.6.35.
Could this be backported to squeeze's kernel?
I have been using the patch on vanilla kernels 2.6.32, 2.6.33, 2.6.34
and 2.6.35 successfully.

Thanks

Andres



-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/aanlktinyvavebjzxcbptw0a1otcov16t-4ejr4vot...@mail.gmail.com



Debian 5.0.6 Kernel 2.6.26-2-openvz-amd64 dmesg /var/log/messages normal?

2010-10-16 Thread Mario Kleinsasser
Hi,

we are running abount eigth HP Blade servers with the official openvz kernel
from the debian repository.
On this blades we are faced with a LOT of those messages.
This messages are logged in dmesg and also in /var/log/messages.

This hardware is useing the bnx2x chipset. The exactly same setup but
running as vmware virtual machine is not logging those messages. The system
is running stable but I would like to ask what this messages are kind of?

Maybe a combination of bnx2x firmware and vzeth?

Regards Mario

Output of /var/log/messages:

Oct 16 20:20:34 atlxvz30223 kernel: [215041.520059] [ cut here
]
Oct 16 20:20:34 atlxvz30223 kernel: [215041.520064] WARNING: at
net/core/dev.c:1440 skb_gso_segment+0x88/0x1ae()
Oct 16 20:20:34 atlxvz30223 kernel: [215041.520067] Modules linked in:
vzethdev vznetdev simfs vzrst vzcpt tun vzdquota vzmon vzdev xt_tcpudp
xt_length ipt_ttl xt_tcpmss xt_TCPMSS iptable_mangle iptable_filter
xt_multiport xt_limit xt_dscp ipt_REJECT ip_tables x_tables mptctl mptbase
sg ipmi_devintf ipv6 bonding loop ipmi_si ipmi_msghandler usbhid hid psmouse
hpilo ff_memless snd_pcm serio_raw pcspkr snd_timer snd soundcore
snd_page_alloc container button bnx2x firmware_class libcrc32c zlib_inflate
evdev ext3 jbd mbcache dm_mirror dm_log dm_snapshot dm_mod cciss scsi_mod
uhci_hcd ehci_hcd thermal processor fan thermal_sys [last unloaded:
scsi_wait_scan]
Oct 16 20:20:34 atlxvz30223 kernel: [215041.520115] Pid: 0, comm: swapper
Tainted: GW 2.6.26-2-openvz-amd64 #1
Oct 16 20:20:34 atlxvz30223 kernel: [215041.520118]
Oct 16 20:20:34 atlxvz30223 kernel: [215041.520119] Call Trace:
Oct 16 20:20:34 atlxvz30223 kernel: [215041.520122]  IRQ
[80234e10] warn_on_slowpath+0x51/0x7a
Oct 16 20:20:34 atlxvz30223 kernel: [215041.520143]  [803cb4ec]
nf_iterate+0x41/0x7d
Oct 16 20:20:34 atlxvz30223 kernel: [215041.520149]  [803b0c72]
skb_gso_segment+0x88/0x1ae
Oct 16 20:20:34 atlxvz30223 kernel: [215041.520155]  [803b0f17]
dev_hard_start_xmit+0x17f/0x28d
Oct 16 20:20:34 atlxvz30223 kernel: [215041.520162]  [803b3b44]
dev_queue_xmit+0x1f0/0x2b4
Oct 16 20:20:34 atlxvz30223 kernel: [215041.520169]  [803d163d]
ip_rcv_finish+0x3a1/0x3c4
Oct 16 20:20:34 atlxvz30223 kernel: [215041.520175]  [803d1c30]
ip_rcv+0x26e/0x2c3
Oct 16 20:20:34 atlxvz30223 kernel: [215041.520182]  [803b08f5]
netif_receive_skb+0x3d8/0x455
Oct 16 20:20:34 atlxvz30223 kernel: [215041.520194]  [a00db063]
:bnx2x:bnx2x_rx_int+0xd13/0x1755
Oct 16 20:20:34 atlxvz30223 kernel: [215041.520208]  [803c5060]
tc_ctl_tfilter+0x12b/0x4d4
Oct 16 20:20:34 atlxvz30223 kernel: [215041.520231]  [a00e8063]
:bnx2x:bnx2x_poll+0xce/0x203
Oct 16 20:20:34 atlxvz30223 kernel: [215041.520238]  [8024abdd]
hrtimer_get_next_event+0x9b/0xab
Oct 16 20:20:34 atlxvz30223 kernel: [215041.520244]  [803b2e2a]
net_rx_action+0xab/0x1da
Oct 16 20:20:34 atlxvz30223 kernel: [215041.520251]  [80239fe5]
__do_softirq+0x96/0x15c
Oct 16 20:20:34 atlxvz30223 kernel: [215041.520259]  [8020d40c]
call_softirq+0x1c/0x28
Oct 16 20:20:34 atlxvz30223 kernel: [215041.520264]  [8020f58c]
do_softirq+0x3c/0x81
Oct 16 20:20:34 atlxvz30223 kernel: [215041.520268]  [80239f09]
irq_exit+0x81/0xc7
Oct 16 20:20:34 atlxvz30223 kernel: [215041.520272]  [8020f7ec]
do_IRQ+0xb9/0xd9
Oct 16 20:20:34 atlxvz30223 kernel: [215041.520278]  [8020c5ad]
ret_from_intr+0x0/0x19
Oct 16 20:20:34 atlxvz30223 kernel: [215041.520281]  EOI
[a000c26d] :processor:acpi_idle_enter_bm+0x2b3/0x327
Oct 16 20:20:34 atlxvz30223 kernel: [215041.520300]  [80271eed]
rcu_needs_cpu+0x32/0x41
Oct 16 20:20:34 atlxvz30223 kernel: [215041.520307]  [8039f514]
cpuidle_idle_call+0x7a/0xb2
Oct 16 20:20:34 atlxvz30223 kernel: [215041.520312]  [8039f49a]
cpuidle_idle_call+0x0/0xb2
Oct 16 20:20:34 atlxvz30223 kernel: [215041.520316]  [8020adb7]
cpu_idle+0x8e/0xb8
Oct 16 20:20:34 atlxvz30223 kernel: [215041.520328]
Oct 16 20:20:34 atlxvz30223 kernel: [215041.520331] ---[ end trace
e56ecebdb1614647 ]---


Processed: tagging 583968, fixed 583968 in 2.6.35~rc6-1~experimental.1

2010-10-16 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tags 583968 + fixed-upstream
Bug #583968 [linux-2.6] xserver-xorg-video-radeon: xpress 200m 5955 = resume 
from suspend fails with KMS enabled
Bug #588601 [linux-2.6] xserver-xorg-video-radeon: xpress 200m 5955 = resume 
from suspend fails with KMS enabled
Added tag(s) fixed-upstream.
Added tag(s) fixed-upstream.
 fixed 583968 2.6.35~rc6-1~experimental.1
Bug #583968 [linux-2.6] xserver-xorg-video-radeon: xpress 200m 5955 = resume 
from suspend fails with KMS enabled
Bug #588601 [linux-2.6] xserver-xorg-video-radeon: xpress 200m 5955 = resume 
from suspend fails with KMS enabled
There is no source info for the package 'linux-2.6' at version 
'2.6.35~rc6-1~experimental.1' with architecture ''
Unable to make a source version for version '2.6.35~rc6-1~experimental.1'
Bug Marked as fixed in versions 2.6.35~rc6-1~experimental.1.
Bug Marked as fixed in versions 2.6.35~rc6-1~experimental.1.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
583968: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=583968
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.c.128725517322490.transcr...@bugs.debian.org



Processed: closing 597725

2010-10-16 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 close 597725 2.6.32-23
Bug#597725: linux-image-2.6.32-5-amd64: Errors resuming from suspend after 
upgrade from .32-3 to .32-5
'close' is deprecated; see http://www.debian.org/Bugs/Developer#closing.
Bug marked as fixed in version 2.6.32-23, send any further explanations to 
Jordan Metzmeier jor...@linuxgen.com

 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
597725: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=597725
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.c.128725548124136.transcr...@bugs.debian.org



Re: Debian 5.0.6 Kernel 2.6.26-2-openvz-amd64 dmesg /var/log/messages normal?

2010-10-16 Thread Ben Hutchings
On Sat, 2010-10-16 at 20:37 +0200, Mario Kleinsasser wrote:
 Hi,
 
 we are running abount eigth HP Blade servers with the official openvz
 kernel from the debian repository.
 On this blades we are faced with a LOT of those messages.
 This messages are logged in dmesg and also in /var/log/messages.
 
 This hardware is useing the bnx2x chipset. The exactly same setup but
 running as vmware virtual machine is not logging those messages. The
 system is running stable but I would like to ask what this messages
 are kind of?
 
 Maybe a combination of bnx2x firmware and vzeth?

This looks like the result of a combination of LRO (aka TPA) and
bridging.  LRO should be disabled automatically on interfaces that have
bridging or forwarding enabled, but there is nothing to stop you
enabling it again.

Ben.

-- 
Ben Hutchings
Once a job is fouled up, anything done to improve it makes it worse.


signature.asc
Description: This is a digitally signed message part


Bug#571035: [Upgraded to latest squeeze] Machine unbootable with ata_generic [Was: [Daily built 23. Aug 2010] Kernel freezes at boot]

2010-10-16 Thread Otavio Salvador
Hello,

We have updated kernel version in installer and I would like to ask
you to give it a try.

Please try 
http://people.debian.org/~joeyh/d-i/images/20101016-16:05/netboot/mini.iso

Thanks in advance,

-- 
Otavio Salvador                  O.S. Systems
E-mail: ota...@ossystems.com.br  http://www.ossystems.com.br
Mobile: +55 53 9981-7854         http://projetos.ossystems.com.br



--
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/aanlktimeziprzjrkoc_t+t=xt_ytgzj-tjtnaybgj...@mail.gmail.com



Bug#600075: linux-image-2.6.32-5-686: Usb work led to the blocking other tasks

2010-10-16 Thread Gorel's'kiy Sergiy

Package: linux-2.6
Version: 2.6.32-24
Severity: important

Hi!
This bug is present in 32bit kernel to.

I test it on laptop Acer TravelMate 370. This kernel (...32-24) used for 
enable acceleration on i855GM video card.


-- Package-specific info:
** Version:
Linux version 2.6.32-5-686 (Debian 2.6.32-24) (b...@decadent.org.uk) (gcc 
version 4.3.5 (Debian 4.3.5-4) ) #1 SMP Thu Sep 30 03:56:23 UTC 2010


** Command line:
BOOT_IMAGE=/vmlinuz-2.6.32-5-686 
root=UUID=fb7b94e1-1837-4fe1-b96d-82c1d51241bb ro quiet


** Not tainted

** Kernel log:
[ 8587.946986] ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
[ 8598.072056] eth0: no IPv6 routers present
[ 8632.305881] ADDRCONF(NETDEV_UP): eth1: link is not ready
[ 8632.370210] eth0: link up, 100Mbps, full-duplex, lpa 0xC5E1
[ 8632.416300] eth0: link up, 100Mbps, full-duplex, lpa 0xC5E1
[ 8642.772245] eth0: no IPv6 routers present
[ 8732.308094] usb 2-1: new low speed USB device using uhci_hcd and 
address 2

[ 8732.476068] usb 2-1: New USB device found, idVendor=1d57, idProduct=32b9
[ 8732.476080] usb 2-1: New USB device strings: Mfr=0, Product=2, 
SerialNumber=0

[ 8732.476090] usb 2-1: Product: 2.4G Receiver
[ 8732.476390] usb 2-1: configuration #1 chosen from 1 choice
[ 8733.003289] usbcore: registered new interface driver hiddev
[ 8733.01] input: 2.4G Receiver as 
/devices/pci:00/:00:1d.0/usb2/2-1/2-1:1.0/input/input8
[ 8733.021347] generic-usb 0003:1D57:32B9.0001: input,hidraw0: USB HID 
v1.10 Mouse [2.4G Receiver] on usb-:00:1d.0-1/input0

[ 8733.021395] usbcore: registered new interface driver usbhid
[ 8733.025700] usbhid: v2.6:USB HID core driver
[10790.948068] usb 1-2: new high speed USB device using ehci_hcd and 
address 3

[10791.083790] usb 1-2: New USB device found, idVendor=13fe, idProduct=3100
[10791.083802] usb 1-2: New USB device strings: Mfr=1, Product=2, 
SerialNumber=3

[10791.083811] usb 1-2: Product: Patriot Memory
[10791.083818] usb 1-2: Manufacturer:
[10791.083825] usb 1-2: SerialNumber: 07A31D00174ED3B7
[10791.085183] usb 1-2: configuration #1 chosen from 1 choice
[10791.202803] Initializing USB Mass Storage driver...
[10791.203619] scsi2 : SCSI emulation for USB Mass Storage devices
[10791.204384] usbcore: registered new interface driver usb-storage
[10791.204388] USB Mass Storage support registered.
[10791.210399] usb-storage: device found at 3
[10791.210403] usb-storage: waiting for device to settle before scanning
[10796.208267] usb-storage: device scan complete
[10796.234630] scsi 2:0:0:0: Direct-Access  Patriot Memory   
PMAP PQ: 0 ANSI: 0 CCS
[10796.853986] sd 2:0:0:0: [sdb] 31309824 512-byte logical blocks: (16.0 
GB/14.9 GiB)

[10796.857475] sd 2:0:0:0: [sdb] Write Protect is off
[10796.857487] sd 2:0:0:0: [sdb] Mode Sense: 23 00 00 00
[10796.857495] sd 2:0:0:0: [sdb] Assuming drive cache: write through
[10796.865591] sd 2:0:0:0: [sdb] Assuming drive cache: write through
[10796.865604]  sdb: sdb1
[10796.887278] sd 2:0:0:0: [sdb] Assuming drive cache: write through
[10796.887293] sd 2:0:0:0: [sdb] Attached SCSI removable disk
[10813.688647] FAT: utf8 is not a recommended IO charset for FAT 
filesystems, filesystem will be case sensitive!

[11232.365266] usb 1-2: USB disconnect, address 3
[11257.592062] usb 1-2: new high speed USB device using ehci_hcd and 
address 4

[11257.727875] usb 1-2: New USB device found, idVendor=13fe, idProduct=3100
[11257.727887] usb 1-2: New USB device strings: Mfr=1, Product=2, 
SerialNumber=3

[11257.727896] usb 1-2: Product: Patriot Memory
[11257.727903] usb 1-2: Manufacturer:
[11257.727910] usb 1-2: SerialNumber: 07A31D00174ED3B7
[11257.731278] usb 1-2: configuration #1 chosen from 1 choice
[11257.732254] scsi3 : SCSI emulation for USB Mass Storage devices
[11257.732676] usb-storage: device found at 4
[11257.732683] usb-storage: waiting for device to settle before scanning
[11262.734210] usb-storage: device scan complete
[11262.760434] scsi 3:0:0:0: Direct-Access  Patriot Memory   
PMAP PQ: 0 ANSI: 0 CCS
[11263.408549] sd 3:0:0:0: [sdb] 31309824 512-byte logical blocks: (16.0 
GB/14.9 GiB)

[11263.412257] sd 3:0:0:0: [sdb] Write Protect is off
[11263.412262] sd 3:0:0:0: [sdb] Mode Sense: 23 00 00 00
[11263.412265] sd 3:0:0:0: [sdb] Assuming drive cache: write through
[11263.419447] sd 3:0:0:0: [sdb] Assuming drive cache: write through
[11263.419459]  sdb: sdb1
[11263.440829] sd 3:0:0:0: [sdb] Assuming drive cache: write through
[11263.440842] sd 3:0:0:0: [sdb] Attached SCSI removable disk
[11273.964107] FAT: utf8 is not a recommended IO charset for FAT 
filesystems, filesystem will be case sensitive!

[11521.016186] INFO: task dpkg:10383 blocked for more than 120 seconds.
[11521.016197] echo 0  /proc/sys/kernel/hung_task_timeout_secs 
disables this message.

[11521.016206] dpkg  D c2004d58 0 10383  10365 0x
[11521.016221]  ef264000 00200086 0002 c2004d58  c1419100 
c1419100 0167
[11521.016241]  ef2641bc c2008100  

Re: Debian 5.0.6 Kernel 2.6.26-2-openvz-amd64 dmesg /var/log/messages normal?

2010-10-16 Thread Ben Hutchings
On Sat, 2010-10-16 at 20:04 +0100, Ben Hutchings wrote:
 On Sat, 2010-10-16 at 20:37 +0200, Mario Kleinsasser wrote:
  Hi,
  
  we are running abount eigth HP Blade servers with the official openvz
  kernel from the debian repository.
  On this blades we are faced with a LOT of those messages.
  This messages are logged in dmesg and also in /var/log/messages.
  
  This hardware is useing the bnx2x chipset. The exactly same setup but
  running as vmware virtual machine is not logging those messages. The
  system is running stable but I would like to ask what this messages
  are kind of?
  
  Maybe a combination of bnx2x firmware and vzeth?
 
 This looks like the result of a combination of LRO (aka TPA) and
 bridging.  LRO should be disabled automatically on interfaces that have
 bridging or forwarding enabled, but there is nothing to stop you
 enabling it again.

Actually, that automatic behaviour was only added in Linux 2.6.27.  So
you need to disable LRO manually, either using ethtool or the bnx2x
module parameter disable_tpa.

Ben.

-- 
Ben Hutchings
Once a job is fouled up, anything done to improve it makes it worse.


signature.asc
Description: This is a digitally signed message part


Processed: tagging 583968

2010-10-16 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 # Automatically generated email from bts, devscripts version 2.10.35lenny7
 tags 583968 + pending
Bug #583968 [linux-2.6] xserver-xorg-video-radeon: xpress 200m 5955 = resume 
from suspend fails with KMS enabled
Bug #588601 [linux-2.6] xserver-xorg-video-radeon: xpress 200m 5955 = resume 
from suspend fails with KMS enabled
Added tag(s) pending.
Added tag(s) pending.

End of message, stopping processing here.

Please contact me if you need assistance.
-- 
583968: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=583968
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.c.12872734137765.transcr...@bugs.debian.org



Bug#600384: dm-crypt: please backport support for plain64 IV

2010-10-16 Thread Ben Hutchings
On Sat, 2010-10-16 at 13:57 -0300, Henrique de Moraes Holschuh wrote:
 Package: linux-2.6
 Version: 2.6.32-25
 Severity: important
 
 Please backport commit 61afef614b013ee1b767cdd10325acae1db1f4d2
 dm crypt: add plain64 iv from upstream.  It should be a clean
 cherry-pick.
 
 Without it, Debian squeeze users might not be able to use dm-crypt
 volumes created on newer kernels using *-xts-plain64, nor will be able
 to create such volumes.
 
 Using plain for IVs on block devices with more than 2^32 blocks will
 cause the same IV to be used twice due to roll-over.  This is not a good
 thing, although it might be not bad enough to matter much (or it could
 be a terrible problem.  Someone who groks crypto for real would have to
 answer that).
[...]

The original author explains in
https://partner-bugzilla.redhat.com/show_bug.cgi?id=600295: the plain
IV restarts and opens device to watermarking attack (two sectors shares
the same IV, you can manipulate with the second if you know content of
the first).

This seems to justify an update on the grounds of security, not to
mention compatiblity.

Ben.

-- 
Ben Hutchings
Once a job is fouled up, anything done to improve it makes it worse.


signature.asc
Description: This is a digitally signed message part


Processed: tagging 600384

2010-10-16 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 # Automatically generated email from bts, devscripts version 2.10.35lenny7
 tags 600384 + pending
Bug #600384 [linux-2.6] dm-crypt: please backport support for plain64 IV
Added tag(s) pending.

End of message, stopping processing here.

Please contact me if you need assistance.
-- 
600384: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=600384
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.c.128727426512161.transcr...@bugs.debian.org



Processed: tagging 600305

2010-10-16 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 # Automatically generated email from bts, devscripts version 2.10.35lenny7
 tags 600305 + pending
Bug #600305 [linux-image-2.6.32-5-amd64] linux-image-2.6.32-5-amd64: MacBookPro 
7, 1 mcp89 sata link reset fails, no disks detected during install process
Added tag(s) pending.

End of message, stopping processing here.

Please contact me if you need assistance.
-- 
600305: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=600305
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.c.128727714623322.transcr...@bugs.debian.org



Bug#598493: nfs-exports does not work after reboot

2010-10-16 Thread Ben Hutchings
On Fri, 2010-10-15 at 21:47 +0200, Petter Reinholdtsen wrote:
 [Oliver Joa]
  now it seems to work. I added the following line in
  /etc/init.d/nfs-kernel-server:
 
  ### BEGIN INIT INFO
  ...
  # Should-Start:  bind9
  ...
  ### END INIT INFO
 
 I believe it is better to use $named instead of bind9.  To work with
 any local DNS service. :)

Except that nothing appears to provide $named yet.

Ben.

-- 
Ben Hutchings
Once a job is fouled up, anything done to improve it makes it worse.


signature.asc
Description: This is a digitally signed message part


Bug#600299: linux-image-2.6.32-5-openvz-amd64: Openvz kernels appear to log unitialised memory to the console with log_buf_len=XX

2010-10-16 Thread Ben Hutchings
On Fri, 2010-10-15 at 18:00 +0100, Tim Small wrote:
 Package: linux-2.6
 Version: 2.6.32-23
 Severity: normal
 
 When passing log_buf_len=2M to the kernel, the kernel logs nulls, or
 other aparently unitialised RAM to the console, and netconsole.

Any increase in log_buf_len will result in disaster, since OpenVZ will
continue using the old buffer pointer with the new length!

Please can you test this patch, following the instructions at
http://kernel-handbook.alioth.debian.org/ch-common-tasks.html#s-common-official.

Ben.

-- 
Ben Hutchings
Once a job is fouled up, anything done to improve it makes it worse.
--- a/kernel/printk.c
+++ b/kernel/printk.c
@@ -198,6 +198,9 @@
 		spin_lock_irqsave(logbuf_lock, flags);
 		log_buf_len = size;
 		log_buf = new_log_buf;
+#ifdef CONFIG_VE
+		ve0.log_buf = log_buf;
+#endif
 
 		offset = start = min(con_start, log_start);
 		dest_idx = 0;
@@ -354,9 +357,9 @@
 		if (ve_log_buf == NULL)
 			goto out;
 		count = len;
+		spin_lock_irq(logbuf_lock);
 		if (count  ve_log_buf_len)
 			count = ve_log_buf_len;
-		spin_lock_irq(logbuf_lock);
 		if (count  ve_logged_chars)
 			count = ve_logged_chars;
 		if (do_clear)


signature.asc
Description: This is a digitally signed message part


Processed: tagging 600299

2010-10-16 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tags 600299 + moreinfo patch
Bug #600299 [linux-2.6] linux-image-2.6.32-5-openvz-amd64: Openvz kernels 
appear to log unitialised memory to the console with log_buf_len=XX
Added tag(s) moreinfo and patch.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
600299: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=600299
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.c.128727868129229.transcr...@bugs.debian.org



Processed: tagging 599768

2010-10-16 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tags 599768 - patch
Bug #599768 [linux-2.6] linux-image-2.6.32-5-686: backlight control fails after 
resume from suspend (toshiba r700-155)
Removed tag(s) patch.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
599768: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599768
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.c.128727873529660.transcr...@bugs.debian.org



Bug#600286: linux-image-2.6.32-5-amd64: atl1c driver hangs after NETDEV WATCHDOG: eth0 (atl1c): transmit queue 0 timed out

2010-10-16 Thread Ben Hutchings
On Fri, 2010-10-15 at 16:34 +0200, Niels Möller wrote:
 Package: linux-2.6
 Version: 2.6.32-23
 Severity: important
 
 *** Please type your report below this line ***
 
 My wired network interface stops working (not able to transmit any
 packets, I think, but it might be reception which is broken. Anyway,
 ping to hosts on the local network results in a No route to host error,
 which means that sending or receiving arp packets fail).
[...]
 It has hanged in this way twice today, each time after I did two things
 which might be related:
 
 1. I sent some large packets (tcp over ipv4 over ethernet) of size up to
roughly 2 bytes and at a rate close to the links capacity of
100Mbit/s. One such packet, displayed by tcpdump:
 
 13:58:15.872214 00:26:9e:b3:2f:3b (oui Unknown)  00:11:25:85:b0:1a (oui 
 Unknown), ethertype IPv4 (0x0800), length 22790: 192.168.1.135.47058  
 192.168.1.108.4711: Flags [.], seq 1079380:1102104, ack 1, win 32, options 
 [nop,nop,TS val 19304579 ecr 1030215], length 22724
 
I have no idea why the kernel sent such large packets. According to
ifconfig eth0, the MTU is 1500 bytes. Is it supposed to work like
that, or is this another bug?
[...]

This driver and hardware implement TCP Segmentation Offload (TSO), which
means the kernel can provide oversized pseudo-packets that are turned
into multiple packets on the wire.

I did notice a later bug fix to this driver which might possibly address
the bug you're seeing.  Please can you test the attached patch,
following the instructions at
http://kernel-handbook.alioth.debian.org/ch-common-tasks.html#s-common-official.

Ben.

-- 
Ben Hutchings
Once a job is fouled up, anything done to improve it makes it worse.
From: Jie Yang jie.y...@atheros.com
Date: Tue, 27 Oct 2009 22:31:19 -0700
Subject: [PATCH] atl1c: duplicate atl1c_get_tpd

commit 678b77e265f6d66f1e68f3d095841c44ba5ab112 upstream.

remove duplicate atl1c_get_tpd, it may cause hardware to send wrong packets.

Signed-off-by: Jie Yang jie.y...@atheros.com
Signed-off-by: David S. Miller da...@davemloft.net
---
 drivers/net/atl1c/atl1c_main.c |2 --
 1 files changed, 0 insertions(+), 2 deletions(-)

diff --git a/drivers/net/atl1c/atl1c_main.c b/drivers/net/atl1c/atl1c_main.c
index 1372e9a..3b8801a 100644
--- a/drivers/net/atl1c/atl1c_main.c
+++ b/drivers/net/atl1c/atl1c_main.c
@@ -1981,8 +1981,6 @@ static void atl1c_tx_map(struct atl1c_adapter *adapter,
 		else {
 			use_tpd = atl1c_get_tpd(adapter, type);
 			memcpy(use_tpd, tpd, sizeof(struct atl1c_tpd_desc));
-			use_tpd = atl1c_get_tpd(adapter, type);
-			memcpy(use_tpd, tpd, sizeof(struct atl1c_tpd_desc));
 		}
 		buffer_info = atl1c_get_tx_buffer(adapter, use_tpd);
 		buffer_info-length = buf_len - mapped_len;
-- 
1.7.1



signature.asc
Description: This is a digitally signed message part


Processed: tagging 600286

2010-10-16 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tags 600286 + moreinfo patch
Bug #600286 [linux-2.6] linux-image-2.6.32-5-amd64: atl1c driver hangs after 
NETDEV WATCHDOG: eth0 (atl1c): transmit queue 0 timed out
Added tag(s) moreinfo and patch.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
600286: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=600286
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.c.1287279515606.transcr...@bugs.debian.org



Bug#600423: linux-2.6: too many open files

2010-10-16 Thread Ben Hutchings
Package: linux-2.6
Severity: serious

We will hit a build failure soon as the total number of patch
applications and removals approaches 1024.

Ben.

 Forwarded Message 
From: Thorsten Glaser t...@mirbsd.de
To: Ben Hutchings b...@decadent.org.uk
Cc: Bastian Blank wa...@mirbsd.org
Subject: linux-2.6: too many open files
Date: Wed, 13 Oct 2010 19:13:24 + (UTC)

Hi,

I'm trying to build the sid kernel plus smarenka’s patches which you
reverted and ran into “too many open files”:

patches.py has
 try:
 fp = file(os.path.join(home, 'series', i))
 ret.append(PatchSeries(i, home, fp))
 except IOError:
 pass

In IPython, I get:

In [41]: fp
Out[41]: open file 
'/home/tg/linux-2.6-2.6.32/debian/patches/series/24+m68k.1', mode 'r' at 
0x8e005a0
In [42]: PatchSeries(i, home, fp)
---
IOError   Traceback (most recent call last)
/home/tg/linux-2.6-2.6.32/ipython console in module()
/home/tg/linux-2.6-2.6.32/debian/lib/python/debian_linux/patches.pyc in 
__init__(self, name, root, fp)
IOError: [Errno 24] Too many open files: 
'/home/tg/linux-2.6-2.6.32/debian/patches/bugfix/m68k/fp/0030-Update-for-m68k-Add-support-for-EARLY_PRINTK-on-MVM.patch'

I found out that ulimit -n defaulting to 1024 is too small to handle
this because that code insists on keeping all file pointers open.
Just so you know…

bye,
//mirabilos
-- 
I believe no one can invent an algorithm. One just happens to hit upon it
when God enlightens him. Or only God invents algorithms, we merely copy them.
If you don't believe in God, just consider God as Nature if you won't deny
existence.  -- Coywolf Qi Hunt





signature.asc
Description: This is a digitally signed message part


Processed: tagging 600423

2010-10-16 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 # Automatically generated email from bts, devscripts version 2.10.35lenny7
 tags 600423 + pending
Bug #600423 [linux-2.6] linux-2.6: too many open files
Added tag(s) pending.

End of message, stopping processing here.

Please contact me if you need assistance.
-- 
600423: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=600423
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.c.12872812508036.transcr...@bugs.debian.org



Bug#598493: nfs-exports does not work after reboot

2010-10-16 Thread Petter Reinholdtsen
[Ben Hutchings]
 Except that nothing appears to provide $named yet.

How strange.  At least powerdns and bind should provide it.  See
/etc/insserv.conf*.

Happy hacking,
-- 
Petter Reinholdtsen



-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20101017043247.gc23...@login2.uio.no



Bug#600430: linux-2.6: genorig.py does not handle 4-part tarball versions (e.g. 2.6.7.8)

2010-10-16 Thread Jakob Bohm
Source: linux-2.6
Version: 2.6.32-23
Severity: normal

Since several years back, kernel.org has provided linux tarballs
with both 3 part (e.g. 2.6.35) and 4 part (e.g. 2.6.35.7) version
numbers in their filenames.

But if genorig.py is run with a 4-part versioned tarball such as
linux-2.6.35.7.tar.bz2 it will barf about not recognizing the
filename.

Confusingly, the script source code supports a file naming with
an extra dashed revision, as convention NOT used by kernel.org,
even though the instructions clearly say users should use the
script only with the upstream tarballs.

Please fix this or change the instructions in README.source to
warn users that they MUST download a base tarball and a patch
(e.g. linux-2.6.35.tar.bz2 and patch-2.6.25.6.whatever) and pass
those to the script.

-- System Information:
Debian Release: squeeze/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.32jbj3.4-47 (SMP w/4 CPU cores)
Locale: LANG=en_DK.UTF-8, LC_CTYPE=en_DK.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash
Chroot: squeeze chroot running on a lenny system



-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20101017043935.8899.83193.report...@jbj3.i.jbohm.dk



Bug#600432: linux-2.6: debian/bin/genorig.py not marked as executable

2010-10-16 Thread Jakob Bohm
Source: linux-2.6
Version: 2.6.32-23
Severity: normal

In the specified squeeze version of this package (2.6.32-23),
debian/README.source tells the user to run debian/bin/genorig.py.

Unfortunately, that file is not marked as executable in the freshly
unpacked source package, requiring the user to go off-script and
manually chmod ug+x the file before proceeding with the instructions
in README.source.

P.S.

If some of this is from another package used in preparing the kernel
source package, README.source fails to mention that key fact, so I
will assume that bugs in README.source and the scripts it references
belong to the source package containing said README.source file.


-- System Information:
Debian Release: squeeze/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.32jbj3.4-47 (SMP w/4 CPU cores)
Locale: LANG=en_DK.UTF-8, LC_CTYPE=en_DK.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash
Chroot: This is a chroot squeeze environment on a lenny system



-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20101017042824.8555.79083.report...@jbj3.i.jbohm.dk



Re: Debian 5.0.6 Kernel 2.6.26-2-openvz-amd64 dmesg /var/log/messages normal?

2010-10-16 Thread Mario Kleinsasser
On Sun, Oct 17, 2010 at 1:47 AM, Ben Hutchings b...@decadent.org.uk wrote:

 On Sat, 2010-10-16 at 20:04 +0100, Ben Hutchings wrote:
  On Sat, 2010-10-16 at 20:37 +0200, Mario Kleinsasser wrote:
   Hi,
  
   we are running abount eigth HP Blade servers with the official openvz
   kernel from the debian repository.
   On this blades we are faced with a LOT of those messages.
   This messages are logged in dmesg and also in /var/log/messages.
  
   This hardware is useing the bnx2x chipset. The exactly same setup but
   running as vmware virtual machine is not logging those messages. The
   system is running stable but I would like to ask what this messages
   are kind of?
  
   Maybe a combination of bnx2x firmware and vzeth?
 
  This looks like the result of a combination of LRO (aka TPA) and
  bridging.  LRO should be disabled automatically on interfaces that have
  bridging or forwarding enabled, but there is nothing to stop you
  enabling it again.

 Actually, that automatic behaviour was only added in Linux 2.6.27.  So
 you need to disable LRO manually, either using ethtool or the bnx2x
 module parameter disable_tpa.

 Ben.


Many thanks for your answer!
I will set the module parameter within the next few days. If it resolvs the
problem I will give feedback here.
Thats why I like the Debian community!

Mario.



 --
 Ben Hutchings
 Once a job is fouled up, anything done to improve it makes it worse.