Processed: Re: Bug#681280: kernel warning at .../net/sched/sch_generic.c:255 dev_watchdog - eth0 (sky2) transmit queue 0 timed out
Processing commands for cont...@bugs.debian.org: reassign 681280 src:linux 3.2.21-3 Bug #681280 [src] kernel warning at .../net/sched/sch_generic.c:255 dev_watchdog - eth0 (sky2) transmit queue 0 timed out Warning: Unknown package 'src' Bug reassigned from package 'src' to 'src:linux'. No longer marked as found in versions 3.2.21-3. Ignoring request to alter fixed versions of bug #681280 to the same values previously set Bug #681280 [src:linux] kernel warning at .../net/sched/sch_generic.c:255 dev_watchdog - eth0 (sky2) transmit queue 0 timed out Marked as found in versions linux/3.2.21-3. thanks Stopping processing here. Please contact me if you need assistance. -- 681280: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681280 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/handler.s.c.134207953222552.transcr...@bugs.debian.org
Processed: [bts-link] source package src:linux
Processing commands for cont...@bugs.debian.org: # # bts-link upstream status pull for source package src:linux # see http://lists.debian.org/debian-devel-announce/2006/05/msg1.html # user bts-link-upstr...@lists.alioth.debian.org Setting user to bts-link-upstr...@lists.alioth.debian.org (was bts-link-de...@lists.alioth.debian.org). # remote status report for #617453 (http://bugs.debian.org/617453) # Bug title: linux-2.6: restarting doesn't always work on Dell Latitude E6400 # * http://bugzilla.kernel.org/show_bug.cgi?id=42542 # * remote status changed: (?) - NEEDINFO usertags 617453 + status-NEEDINFO Bug#617453: linux-2.6: restarting doesn't always work on Dell Latitude E6400 There were no usertags set. Usertags are now: status-NEEDINFO. # remote status report for #677472 (http://bugs.debian.org/677472) # Bug title: linux-image-3.2.0-2-686-pae: ohci_hcd module prevents PC from suspending # * http://bugzilla.kernel.org/show_bug.cgi?id=43081 # * remote status changed: (?) - ASSIGNED usertags 677472 + status-ASSIGNED Bug#677472: linux-image-3.2.0-2-686-pae: ohci_hcd module prevents PC from suspending There were no usertags set. Usertags are now: status-ASSIGNED. # remote status report for #680707 (http://bugs.debian.org/680707) # Bug title: Asus P5NSLI: lockup on resume from suspend # * http://bugzilla.kernel.org/show_bug.cgi?id=43641 # * remote status changed: (?) - RESOLVED # * remote resolution changed: (?) - PATCH-ALREADY-AVAILABLE # * closed upstream tags 680707 + fixed-upstream Bug #680707 [src:linux] Asus P5NSLI: lockup on resume from suspend Added tag(s) fixed-upstream. usertags 680707 + status-RESOLVED resolution-PATCH-ALREADY-AVAILABLE Bug#680707: Asus P5NSLI: lockup on resume from suspend There were no usertags set. Usertags are now: status-RESOLVED resolution-PATCH-ALREADY-AVAILABLE. thanks Stopping processing here. Please contact me if you need assistance. -- 680707: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=680707 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/handler.s.c.134211108121016.transcr...@bugs.debian.org
Bug#571980: /boot/vmlinuz-2.6.33-2-amd64: impi oops on intel motherboard
Ian Crowther wrote: I'm not sure what 2.6.32.y means. I've installed 2.6.32-5-686, which seems to be recent. Am I correct in assuming you mean version 2.6.32-45? You can check with dpkg-query -W linux-image-$(uname -r) to see the version number of the installed kernel, or cat /proc/version to see the version number of the running one in parentheses. 2.6.32-45 is close to 2.6.32.59 from kernel.org. That has the same problem (errors after loading ipmi modules), though. Thanks for checking. -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/20120712202150.GA2956@burratino
Bug#675190: [ 041/187] xen/netfront: teardown the device before unregistering it.
From: Greg KH gre...@linuxfoundation.org 3.4-stable review patch. If anyone has any objections, please let me know. -- From: Ian Campbell ian.campb...@citrix.com [ Upstream commit 6bc96d047fe32d76ef79f3195c52a542edf7c705 ] Fixes: [ 15.470311] WARNING: at /local/scratch/ianc/devel/kernels/linux/fs/sysfs/file.c:498 sysfs_attr_ns+0x95/0xa0() [ 15.470326] sysfs: kobject eth0 without dirent [ 15.470333] Modules linked in: [ 15.470342] Pid: 12, comm: xenwatch Not tainted 3.4.0-x86_32p-xenU #93 and [9.150554] BUG: unable to handle kernel paging request at 2b359000 [9.150577] IP: [c1279561] linkwatch_do_dev+0x81/0xc0 [9.150592] *pdpt = 2c3c9027 *pde = [9.150604] Oops: 0002 [#1] SMP [9.150613] Modules linked in: This is http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=675190 Reported-by: George Shuklin george.shuk...@gmail.com Signed-off-by: Ian Campbell ian.campb...@citrix.com Tested-by: William Dauchy wdau...@gmail.com Cc: sta...@kernel.org Cc: 675...@bugs.debian.org Signed-off-by: David S. Miller da...@davemloft.net Signed-off-by: Greg Kroah-Hartman gre...@linuxfoundation.org --- drivers/net/xen-netfront.c |8 1 file changed, 4 insertions(+), 4 deletions(-) --- a/drivers/net/xen-netfront.c +++ b/drivers/net/xen-netfront.c @@ -1935,14 +1935,14 @@ static int __devexit xennet_remove(struc dev_dbg(dev-dev, %s\n, dev-nodename); - unregister_netdev(info-netdev); - xennet_disconnect_backend(info); - del_timer_sync(info-rx_refill_timer); - xennet_sysfs_delif(info-netdev); + unregister_netdev(info-netdev); + + del_timer_sync(info-rx_refill_timer); + free_percpu(info-stats); free_netdev(info-netdev); -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/20120712191526.143177...@linuxfoundation.org
Bug#681418: debugfs is a big security hole
Package: src:linux Version: 3.2.21-3 Severity: important Tags: security As discussed here http://lists.linux-foundation.org/pipermail/ksummit-2012-discuss/2012-July/000891.html. I certainly consider mounting of debugfs to be significant security liability. I'm not at all happy that people use it as the basis for end-user applications that quietly mount debugfs if they find it isn't yet mounted. Even if their corner of debugfs is robust, all the other stuff exposed by random drivers may not be. Debian has at least one such application package (blktrace) which mounts debugfs from its init script. I would like to address this by backporting this feature: commit d6e486868cde585842d55ba3b6ec57af090fc343 Author: Ludwig Nussel ludwig.nus...@suse.de Date: Wed Jan 25 11:52:28 2012 +0100 debugfs: add mode, uid and gid options and then changing the default mode (mask) to be 0700. This should leave debugfs functional (most such applications will require root anyway) and allow users to relax permissions if they really don't care about the security problems. However, currently there is not a single place for the user options. I think that either (1) debugfs should be mounted by default in a similar way to other pseudo-filesystems, or (2) debugfs should have a noauto entry in /etc/fstab where users can set options, and packages may use 'mount /sys/kernel/debug' to mount debugfs with those options (not 'mount -t debugfs debugfs /sys/kernel/debug', as now). Ben. -- System Information: Debian Release: wheezy/sid APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'proposed-updates'), (500, 'unstable'), (500, 'stable'), (1, 'experimental') Architecture: i386 (x86_64) Foreign Architectures: amd64 Kernel: Linux 3.2.0-3-amd64 (SMP w/2 CPU cores) Locale: LANG=en_GB.utf8, LC_CTYPE=en_GB.utf8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/20120713033708.3307.93550.report...@deadeye.wl.decadent.org.uk
Bug#681418: debugfs is a big security hole
On 13.07.2012 05:37, Ben Hutchings wrote: Package: src:linux Version: 3.2.21-3 Severity: important Tags: security As discussed here http://lists.linux-foundation.org/pipermail/ksummit-2012-discuss/2012-July/000891.html. I certainly consider mounting of debugfs to be significant security liability. I'm not at all happy that people use it as the basis for end-user applications that quietly mount debugfs if they find it isn't yet mounted. Even if their corner of debugfs is robust, all the other stuff exposed by random drivers may not be. Debian has at least one such application package (blktrace) which mounts debugfs from its init script. systemd might be affected too, so I'm bringing Tollef into the loop here. When having booted with systemd I get: debugfs on /sys/kernel/debug type debugfs (rw,relatime) Tollef, do you know why systemd mounts debugfs by default? Is there something that should be done in the systemd package? Michael -- Why is it that all of the instruments seeking intelligent life in the universe are pointed away from Earth? signature.asc Description: OpenPGP digital signature
Bug#681418: debugfs is a big security hole
]] Michael Biebl Tollef, do you know why systemd mounts debugfs by default? No, I don't. Just asked upstream. Is there something that should be done in the systemd package? If it's a bad idea to mount it by default, we shouldn't, I think. -- Tollef Fog Heen UNIX is user friendly, it's just picky about who its friends are -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/878veojlws@xoog.err.no