Processed: Re: Bug#681280: kernel warning at .../net/sched/sch_generic.c:255 dev_watchdog - eth0 (sky2) transmit queue 0 timed out

2012-07-12 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 reassign 681280 src:linux 3.2.21-3
Bug #681280 [src] kernel warning at .../net/sched/sch_generic.c:255 
dev_watchdog - eth0 (sky2) transmit queue 0 timed out
Warning: Unknown package 'src'
Bug reassigned from package 'src' to 'src:linux'.
No longer marked as found in versions 3.2.21-3.
Ignoring request to alter fixed versions of bug #681280 to the same values 
previously set
Bug #681280 [src:linux] kernel warning at .../net/sched/sch_generic.c:255 
dev_watchdog - eth0 (sky2) transmit queue 0 timed out
Marked as found in versions linux/3.2.21-3.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
681280: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681280
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.c.134207953222552.transcr...@bugs.debian.org



Processed: [bts-link] source package src:linux

2012-07-12 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 #
 # bts-link upstream status pull for source package src:linux
 # see http://lists.debian.org/debian-devel-announce/2006/05/msg1.html
 #
 user bts-link-upstr...@lists.alioth.debian.org
Setting user to bts-link-upstr...@lists.alioth.debian.org (was 
bts-link-de...@lists.alioth.debian.org).
 # remote status report for #617453 (http://bugs.debian.org/617453)
 # Bug title: linux-2.6: restarting doesn't always work on Dell Latitude E6400
 #  * http://bugzilla.kernel.org/show_bug.cgi?id=42542
 #  * remote status changed: (?) - NEEDINFO
 usertags 617453 + status-NEEDINFO
Bug#617453: linux-2.6: restarting doesn't always work on Dell Latitude E6400
There were no usertags set.
Usertags are now: status-NEEDINFO.
 # remote status report for #677472 (http://bugs.debian.org/677472)
 # Bug title: linux-image-3.2.0-2-686-pae: ohci_hcd module prevents PC from 
 suspending
 #  * http://bugzilla.kernel.org/show_bug.cgi?id=43081
 #  * remote status changed: (?) - ASSIGNED
 usertags 677472 + status-ASSIGNED
Bug#677472: linux-image-3.2.0-2-686-pae: ohci_hcd module prevents PC from 
suspending
There were no usertags set.
Usertags are now: status-ASSIGNED.
 # remote status report for #680707 (http://bugs.debian.org/680707)
 # Bug title: Asus P5NSLI: lockup on resume from suspend
 #  * http://bugzilla.kernel.org/show_bug.cgi?id=43641
 #  * remote status changed: (?) - RESOLVED
 #  * remote resolution changed: (?) - PATCH-ALREADY-AVAILABLE
 #  * closed upstream
 tags 680707 + fixed-upstream
Bug #680707 [src:linux] Asus P5NSLI: lockup on resume from suspend
Added tag(s) fixed-upstream.
 usertags 680707 + status-RESOLVED resolution-PATCH-ALREADY-AVAILABLE
Bug#680707: Asus P5NSLI: lockup on resume from suspend
There were no usertags set.
Usertags are now: status-RESOLVED resolution-PATCH-ALREADY-AVAILABLE.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
680707: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=680707
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.c.134211108121016.transcr...@bugs.debian.org



Bug#571980: /boot/vmlinuz-2.6.33-2-amd64: impi oops on intel motherboard

2012-07-12 Thread Jonathan Nieder
Ian Crowther wrote:

 I'm not sure what 2.6.32.y means. I've installed 2.6.32-5-686, which
 seems to be recent.

Am I correct in assuming you mean version 2.6.32-45?  You can check
with

dpkg-query -W linux-image-$(uname -r)

to see the version number of the installed kernel, or

cat /proc/version

to see the version number of the running one in parentheses.

2.6.32-45 is close to 2.6.32.59 from kernel.org.

 That has the same problem (errors after loading
 ipmi modules), though.

Thanks for checking.



-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20120712202150.GA2956@burratino



Bug#675190: [ 041/187] xen/netfront: teardown the device before unregistering it.

2012-07-12 Thread Greg Kroah-Hartman
From: Greg KH gre...@linuxfoundation.org

3.4-stable review patch.  If anyone has any objections, please let me know.

--


From: Ian Campbell ian.campb...@citrix.com

[ Upstream commit 6bc96d047fe32d76ef79f3195c52a542edf7c705 ]

Fixes:
[   15.470311] WARNING: at 
/local/scratch/ianc/devel/kernels/linux/fs/sysfs/file.c:498 
sysfs_attr_ns+0x95/0xa0()
[   15.470326] sysfs: kobject eth0 without dirent
[   15.470333] Modules linked in:
[   15.470342] Pid: 12, comm: xenwatch Not tainted 3.4.0-x86_32p-xenU #93
and
[9.150554] BUG: unable to handle kernel paging request at 2b359000
[9.150577] IP: [c1279561] linkwatch_do_dev+0x81/0xc0
[9.150592] *pdpt = 2c3c9027 *pde = 
[9.150604] Oops: 0002 [#1] SMP
[9.150613] Modules linked in:

This is http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=675190

Reported-by: George Shuklin george.shuk...@gmail.com
Signed-off-by: Ian Campbell ian.campb...@citrix.com
Tested-by: William Dauchy wdau...@gmail.com
Cc: sta...@kernel.org
Cc: 675...@bugs.debian.org
Signed-off-by: David S. Miller da...@davemloft.net
Signed-off-by: Greg Kroah-Hartman gre...@linuxfoundation.org
---
 drivers/net/xen-netfront.c |8 
 1 file changed, 4 insertions(+), 4 deletions(-)

--- a/drivers/net/xen-netfront.c
+++ b/drivers/net/xen-netfront.c
@@ -1935,14 +1935,14 @@ static int __devexit xennet_remove(struc
 
dev_dbg(dev-dev, %s\n, dev-nodename);
 
-   unregister_netdev(info-netdev);
-
xennet_disconnect_backend(info);
 
-   del_timer_sync(info-rx_refill_timer);
-
xennet_sysfs_delif(info-netdev);
 
+   unregister_netdev(info-netdev);
+
+   del_timer_sync(info-rx_refill_timer);
+
free_percpu(info-stats);
 
free_netdev(info-netdev);





-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20120712191526.143177...@linuxfoundation.org



Bug#681418: debugfs is a big security hole

2012-07-12 Thread Ben Hutchings
Package: src:linux
Version: 3.2.21-3
Severity: important
Tags: security

As discussed here
http://lists.linux-foundation.org/pipermail/ksummit-2012-discuss/2012-July/000891.html.

I certainly consider mounting of debugfs to be significant security
liability.  I'm not at all happy that people use it as the basis for
end-user applications that quietly mount debugfs if they find it isn't
yet mounted.  Even if their corner of debugfs is robust, all the other
stuff exposed by random drivers may not be.

Debian has at least one such application package (blktrace) which
mounts debugfs from its init script.

I would like to address this by backporting this feature:

commit d6e486868cde585842d55ba3b6ec57af090fc343
Author: Ludwig Nussel ludwig.nus...@suse.de
Date:   Wed Jan 25 11:52:28 2012 +0100

debugfs: add mode, uid and gid options

and then changing the default mode (mask) to be 0700.  This should
leave debugfs functional (most such applications will require root
anyway) and allow users to relax permissions if they really don't
care about the security problems.

However, currently there is not a single place for the user options.
I think that either (1) debugfs should be mounted by default in a
similar way to other pseudo-filesystems, or (2) debugfs should have a
noauto entry in /etc/fstab where users can set options, and packages
may use 'mount /sys/kernel/debug' to mount debugfs with those options
(not 'mount -t debugfs debugfs /sys/kernel/debug', as now).

Ben.

-- System Information:
Debian Release: wheezy/sid
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'proposed-updates'), (500, 
'unstable'), (500, 'stable'), (1, 'experimental')
Architecture: i386 (x86_64)
Foreign Architectures: amd64

Kernel: Linux 3.2.0-3-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_GB.utf8, LC_CTYPE=en_GB.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash



-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20120713033708.3307.93550.report...@deadeye.wl.decadent.org.uk



Bug#681418: debugfs is a big security hole

2012-07-12 Thread Michael Biebl
On 13.07.2012 05:37, Ben Hutchings wrote:
 Package: src:linux
 Version: 3.2.21-3
 Severity: important
 Tags: security
 
 As discussed here
 http://lists.linux-foundation.org/pipermail/ksummit-2012-discuss/2012-July/000891.html.
 
 I certainly consider mounting of debugfs to be significant security
 liability.  I'm not at all happy that people use it as the basis for
 end-user applications that quietly mount debugfs if they find it isn't
 yet mounted.  Even if their corner of debugfs is robust, all the other
 stuff exposed by random drivers may not be.
 
 Debian has at least one such application package (blktrace) which
 mounts debugfs from its init script.

systemd might be affected too, so I'm bringing Tollef into the loop here.

When having booted with systemd I get:

debugfs on /sys/kernel/debug type debugfs (rw,relatime)


Tollef, do you know why systemd mounts debugfs by default?

Is there something that should be done in the systemd package?


Michael


-- 
Why is it that all of the instruments seeking intelligent life in the
universe are pointed away from Earth?



signature.asc
Description: OpenPGP digital signature


Bug#681418: debugfs is a big security hole

2012-07-12 Thread Tollef Fog Heen
]] Michael Biebl 

 Tollef, do you know why systemd mounts debugfs by default?

No, I don't.  Just asked upstream.

 Is there something that should be done in the systemd package?

If it's a bad idea to mount it by default, we shouldn't, I think.

-- 
Tollef Fog Heen
UNIX is user friendly, it's just picky about who its friends are



-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/878veojlws@xoog.err.no