Hi *,
this seems to be the identical to bug #354087:
I had this kernel bug triggered two times. The process that seemed guilty was
Coldfusion 5.0, running as an wwwrun-type user.
Both machines are HP DL380 with Intel Xeons and 3 GB of RAM. I was not able to reproduce that bug directly, it just
I implemented in udev 0.085-1 a first attempt to solve this problem.
It's totally untested and I will not able to test it myself soon, so
reports are appreciated.
The upgrade procedure should be something like:
# switch sources.list to testing
apt-get update
touch /etc/udev/kernel-upgrade
running the Coldfusion 5.0 server and accessing the web application triggers
the bug after a while.
is it possible to disable PREEMPT by doing:
echo 0 /proc/sys/kernel/kernel_preemption
echo 0 /proc/sys/kernel/kernel_preemption
Regards,
Tom
another oops:
ar 2 13:06:07 ctengine2 kernel:
I just bought the same keyboard, lsusb -v gives exactly the same output.
In my case the messages about irq status -32 appeared right away while
booting.
This is with a kernel 2.6.15
--
Wolfgang
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact
Hello,
I would like to upload 2.6.15-8 with urgency=high as soon as possible:
It contains 2.6.15.5 which fixes 3 security issues.
I know this is (again) short-term, but is friday before dinstall ok for
everyone?
Best regards
Frederik Schueler
--
ENOSIG
signature.asc
Description: Digital
Package: kernel-image-2.6.8-11-amd64-k8-sm
Version: 2.6.8-16sarge1
System: Debian amd64 Sarge
Architecture: AMD Athalon 64 X2
Libc6: 2.3.5-13
I am experiencing an odd sort of system bug on a new install of sarge
(amd64). The system clock runs too fast and the keyboard speed
(typtic
Processing commands for [EMAIL PROTECTED]:
reassign 354995 linux-2.6
Bug#354995: amd64-k8-smp kernel makes clock run fast
Warning: Unknown package 'kernel-image-2.6.8-11-amd64-k8-sm'
Bug reassigned from package `kernel-image-2.6.8-11-amd64-k8-sm' to `linux-2.6'.
--
Stopping processing here.
On Thu, Mar 02, 2006 at 07:53:58PM +0100, Frederik Schueler wrote:
Hello,
I would like to upload 2.6.15-8 with urgency=high as soon as possible:
It contains 2.6.15.5 which fixes 3 security issues.
I know this is (again) short-term, but is friday before dinstall ok for
everyone?
This
On Thu, Mar 02, 2006 at 07:53:58PM +0100, Frederik Schueler wrote:
I would like to upload 2.6.15-8 with urgency=high as soon as possible:
It contains 2.6.15.5 which fixes 3 security issues.
It does not build at all without fixe.
Bastian
--
Men of peace usually are [brave].
FYI: The status of the initramfs-tools source package
in Debian's testing distribution has changed.
Previous version: 0.52b
Current version: 0.53
--
This email is automatically generated; [EMAIL PROTECTED] is responsible.
See http://people.debian.org/~henning/trille/ for more information.
Greetings,
The new upgrade procedure fails on alpha, regardless of the kernel
workaround, there's still a udev - initramfs-tools dependency loop which
interrupts the udev postinst, and the failures cascade from there:
# touch /etc/udev/kernel-upgrade
# dselect
Reading package lists... Done
11 matches
Mail list logo