Hi again,
the error log in my previous message comes from this directory:
/var/lib/systemd/pstore/7285820828300/
Each time the system reboots, a new directory is created, and 3 files are
created in it.
For the sake of completeness, here are the 3 files.
Thanks,
--
Laurent.dmesg-erst-72858
Package: src:linux
Version: 6.1.55-1
Severity: normal
Dear Maintainer,
each time this system is rebooted, during shutdown, the kernel outputs the
following error message.
The kernel thinks it encountered a "Hardware Error", but the error is most
probably not a hardware error, because I also
Package: src:linux
Version: 6.1.20-2
Severity: normal
Dear Maintainer,
each time I shutdown this system (a Debian 11 system with the bookworm kernel),
the Linux kernel outputs the following error message.
This error could have been unnoticed, but:
- it triggers an alarm in the iDRAC controll
On 1/18/23 16:46, Salvatore Bonaccorso wrote:
Would it be possible to test 6.1.7, which contains related nfs changes
with the nfsd filecache?
Yes, of course, as soon as it is available as a Debian package...
Regards,
--
Laurent.
On 12/5/22 18:26, Diederik de Haas wrote:
Do you know what the faulty and fixed 5.10 version were/are?
The problem was not really in the kernel, but in rpc.svcgssd that has trouble
with large Kerberos credentials.
The only problem with 5.10 kernels is that they only display warnings about
h
On 12/5/22 17:34, Diederik de Haas wrote:
btw: What's the reason for not using a 5.10 kernel on a Stable system?
(Not that I mind, just curious)
Thanks for your interest :>.
I had a NFS problem with the 5.10 kernel and tested a more recent kernel to see
if this problem had been fixed.
(For
Package: src:linux
Version: 5.14.9-2
Severity: important
Dear Maintainer,
I boot this system with the page_poison=1 kernel option and during boot, and
more precisely during SCSI initialization (for external USB disks), I get this
scary error dump:
[3.350394] pagealloc: memory corruption
On 27/09/2021 21.40, Salvatore Bonaccorso wrote:
I believe this is fixed by
https://salsa.debian.org/kernel-team/linux/-/commit/b7f5082c34ea43622ebd9cd42f5fdd7b5ed49761
pending for the next upload.
Thanks a lot for the quick fix!
--
Laurent.
Hi,
since the backtrace contains functions from Tomoyo, I tried to disable Tomoyo
with ccsecurity=off on the kernel command line but it does not help.
Any other suggestion ?
Thanks,
--
Laurent.
Hi,
this "bug" still exists in the latest 4.19 kernel in Debian:
# uname -a
Linux irancy 4.19.0-4-amd64 #1 SMP Debian 4.19.28-2 (2019-03-15) x86_64
GNU/Linux
# ip addr
[...]
2: eth0: mtu 1500 qdisc pfifo_fast state UP
group default qlen 1000
--
Laurent.
Hi,
the bug is still present in the latest 4.19 kernel available in Debian:
# uname -a
Linux erebus4 4.19.0-4-amd64 #1 SMP Debian 4.19.28-2 (2019-03-15) x86_64
GNU/Linux
# dmesg | grep RPC
[3.742768] systemd[1]: Listening on RPCbind Server Activation Socket.
[3.775310] RPC: Registered n
Hi,
the bug is still there in this package version:
Source: linux-signed-amd64 (4.19.28+2)
Version: 4.19.28-2
[ 311.093489] RPC: Unregistered named UNIX socket transport module.
[ 311.093493] RPC: Unregistered udp transport module.
[ 311.093494] RPC: Unregistered tcp transport module.
[ 311.
Hi,
I tested the latest kernel from sid on a Debian stretch NFS server and I am
still seeing those errors:
# uname -a
Linux xxx 4.19.0-3-amd64 #1 SMP Debian 4.19.20-1 (2019-02-11) x86_64 GNU/Linux
# dmesg | grep RPC
[3.771107] RPC: Registered named UNIX socket transport module.
[3.77110
Subject: linux-image-4.19.0-2-rt-amd64-unsigned: BUG
Package: src:linux
Version: 4.19.16-1
Severity: normal
Dear Maintainer,
I was trying to remove the sunrpc module from the kernel and got the following
BUG and backtrace.
Note that the kernel is tainted because of this previous error that is
Hi,
this bug is still there in kernel 4.11.6 :
$ uname -a
Linux irancy.iut2.upmf-grenoble.fr 4.11.0-1-rt-amd64 #1 SMP PREEMPT RT Debian
4.11.6-1 (2017-06-19) x86_64 GNU/Linux
$ dmesg
[...]
[690935.587688] NOHZ: local_softirq_pending 80
When this error occurred the system was accessing a btrfs
Hi,
this bug is still there in kernel 4.9.30 :
$ uname -a
Linux irancy.iut2.upmf-grenoble.fr 4.9.0-3-rt-amd64 #1 SMP PREEMPT RT Debian
4.9.30-1 (2017-06-04) x86_64 GNU/Linux
$ dmesg
[...]
[187203.776023] NOHZ: local_softirq_pending 80
--
Laurent.
Hi again,
I rebooted my system and during boot this other similar bug occurred:
[ 32.808532] BUG: scheduling while atomic: hdparm/920/0x0002
[ 32.808533] Modules linked in:
[ 32.808534] dcdbas
[ 32.808534] coretemp
[ 32.808535] kvm_intel
[ 32.808535] kvm
[ 32.808536] snd_hd
Hi,
here is another related but slightly different occurrence of this bug:
[84347.556228] BUG: scheduling while atomic: check-support-s/12390/0x0002
[84347.556256] Modules linked in: fuse cpuid cpufreq_conservative
cpufreq_powersave cpufreq_userspace rfkill iTCO_wdt iTCO_vendor_support
dell
Package: linux-image-4.9.0-3-rt-amd64
Version: 4.9.25-1
Dear maintainer,
here is a kernel bug that occurred after a few hours of uptime:
[24763.292878] BUG: scheduling while atomic: cron/25592/0x0002
[24763.292906] Modules linked in: cpufreq_conservative cpufreq_powersave
cpufreq_userspace
Hi,
this bug happened again. This time I have more context: it occurred during the
execution of the acct cron job:
Apr 12 07:35:10 irancy anacron[7284]: Updated timestamp for job `cron.daily' to
2017-04-12
Apr 12 07:35:10 irancy nullmailer[7282]: smtp: Succeeded: 250 OK
id=1cyAvu-00020k-FW
Ap
Package: linux-image-4.9.0-2-amd64-unsigned
Version: 4.9.18-1
Dear maintainer,
here are warnings I observed during boot in a VMWare virtual machine.
The taint comes from this previous error message:
[0.653706] scsi_mod: module verification failed: signature and/or required
key missing - t
Package: linux-image-4.9.0-2-amd64-unsigned
Version: 4.9.18-1
Dear maintainer,
here is a warning I observed on a NFSv4+Kerberos client.
The taint comes from this previous error message:
[0.653706] scsi_mod: module verification failed: signature and/or required
key missing - tainting ker
Package: nfs-common
Version: 1:1.3.4-2.1
Dear maintainer,
here is what I see in journalctl (/users is a Kerberos NFS mount point):
Mar 28 09:55:57 file-info2 systemd[1]: Mounted /users.
Mar 28 09:55:57 file-info2 systemd[1]: Started /etc/rc.local Compatibility.
Mar 28 09:55:57 file-info2 system
> It adds an extra 4K (2K on 32-bit) to the task_struct for every task
> in the system. This is not an acceptable cost.
OK, I understand that this can be a problem for systems without a lot of RAM.
> Sorry, you'll have to build a custom kernel to enable this feature.
No, problem!
Thanks anyway
Package: linux-image-4.9.0-2-rt-amd64-unsigned
Version: 4.9.13-1
Dear maintainer,
the Debian kernels are currently built without the CONFIG_LATENCYTOP option:
$ grep LATENCYTOP /boot/config-4.9.0-2-*
/boot/config-4.9.0-2-amd64:# CONFIG_LATENCYTOP is not set
/boot/config-4.9.0-2-rt-amd64:# CONFI
Package: src:linux
Version: 4.9.13-1
Severity: normal
Dear Maintainer,
this is a followup to bug #855116, but I prefer to report a new bug because the
number in the error message is not the same. So here is the new problem:
# dmesg |grep NOHZ
[408256.268051] NOHZ: local_softirq_pending 80
[59
Hi,
with a recent nfs-common package:
Package: nfs-common
Version: 1:1.3.4-2
the hardening situation is still not very good:
# ./hardening-check /usr/sbin/rpc.*
/usr/sbin/rpc.gssd:
Position Independent Executable: yes
Stack protected: no, not found!
Fortify Source functions: yes (some protec
On 22/02/2017 12:38, Laurent Bonnaud wrote:
> I will test again for the "100" errors when my other test system becomes
> available again...
Those errors are gone, too. Thanks for the fix!
--
Laurent.
Package: src:linux
Version: 4.9.10-1
Severity: important
Dear Maintainer,
I was testing plasma desktop and after a while the graphic session froze. The
kernel logged the following traces:
[ 3142.620047] INFO: task Xorg:6067 blocked for more than 120 seconds.
[ 3142.620055] Not tainted 4
On 14/02/2017 13:52, Ben Hutchings wrote:
> I think these errors (at least those with "02" at the end) are fixed by
> "softirq: wake the timer softirq if needed" which will be included in
> the next update (version 4.9.9-1). Let us know whether that fixes the
> problem for you, once it's availabl
Package: src:linux
Version: 4.9.6-3
Severity: normal
Dear Maintainer,
I see the following error messages on 2 of my test systems:
# journalctl | grep NOHZ
Feb 13 14:12:25 irancy kernel: NOHZ: local_softirq_pending 100
Feb 13 14:12:25 irancy kernel: NOHZ: local_softirq_pending 100
Feb 13 14:12:2
On 25/01/2017 18:25, Ben Hutchings wrote:
> it will be safe to make this change after the stretch release.
Great ! So I am looking forward to the stretch release :>...
Thanks again,
--
Laurent.
Package: linux
Version: 4.9.2-2
Severity: wishlist
Hi,
current Linux kernels in Debian are compiled with
CONFIG_LEGACY_VSYSCALL_EMULATE:
$ grep LEGACY_VSYSCALL /boot/config-4.9.0-1-*
/boot/config-4.9.0-1-amd64:# CONFIG_LEGACY_VSYSCALL_NATIVE is not set
/boot/config-4.9.0-1-amd64:CONFIG_LEGACY_V
Hi,
here is another occurrence of this bug with a more recent kernel:
[64222.064017] [ cut here ]
[64222.064022] WARNING: CPU: 1 PID: 10138 at
/build/linux-zDY19G/linux-4.8.15/debian/build/source_rt/arch/x86/include/asm/fpu/internal.h:534
fpu__restore+0xf5/0x2f0
[64222.0
Package: src:linux
Version: 4.8.5-1
Severity: normal
Dear Maintainer,
here is a kernel warning I got several times:
[69707.044045] [ cut here ]
[69707.044051] WARNING: CPU: 0 PID: 26963 at
/build/linux-v2K05A/linux-4.8.5/debian/build/source_rt/arch/x86/include/asm/fpu/in
Package: linux-image-4.6.0-1-rt-amd64
Version: 4.6.4-1
Hi,
I decided to give linux-image-rt a try and after a while the kernel displayed
the following warning message. The kernel is marked as tainted. It is not the
result of a previous fault, but the result of this error:
[1.250921] scs
Package: linux
Version: 4.2.6-1
Severity: normal
Hi,
current Linux kernels in Debian are compiled with CONFIG_CC_STACKPROTECTOR but
not with CONFIG_CC_STACKPROTECTOR_STRONG:
$ grep STACKPROT /boot/config-4.2.0-1-amd64
CONFIG_HAVE_CC_STACKPROTECTOR=y
CONFIG_CC_STACKPROTECTOR=y
# CONFIG_CC_STACKP
Hi,
a newer version is available with more fixes:
https://www.kernel.org/pub/linux/utils/nfs-utils/1.3.1/1.3.1-Changelog
This is good news: you will be able to jump 3 versions ahead with just one
package upload :>.
--
Laurent.
--
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debia
Package: nfs-common
Version: 1:1.2.8-7
Severity: wishlist
Hi,
according to the checksec.sh script, binaries provided by nfs-utils
are not compiled with all available hardening features:
RELRO STACK CANARY NXPIE RPATH
RUNPATH FILE
No RELRO
Package: linux
Version: 3.14.13-2
Severity: wishlist
Hi,
the Linux kernel in Debian does currently not use this option:
$ grep CONFIG_DEBUG_STRICT_USER_COPY_CHECKS /boot/config-3.14-*
/boot/config-3.14-2-686-pae:# CONFIG_DEBUG_STRICT_USER_COPY_CHECKS is
not set
/boot/config-3.14-2-amd64:# CONFI
Package: nfs-utils
Version: 1:1.2.8-7
Severity: wishlist
Hi,
a lot of bugs have been fixed upstream, see:
https://www.kernel.org/pub/linux/utils/nfs-utils/1.2.9/1.2.9-Changelog
https://www.kernel.org/pub/linux/utils/nfs-utils/1.3.0/1.3.0-Changelog
So could you please update the nfs-utils packa
Package: linux
Version: 3.14.13-2
Severity: wishlist
Hi,
the Linux kernel in Debian is currently not protected against stack attacks:
$ grep STACKPROTECTOR /boot/config-3.14-2-amd64
CONFIG_HAVE_CC_STACKPROTECTOR=y
# CONFIG_CC_STACKPROTECTOR is not set
CONFIG_CC_STACKPROTECTOR_NONE=y
# CONFIG_CC
Hi,
I also had this problem on a Debian squeeze server. I upgraded this
server to wheezy and the problem remains. Did anyone make progress on
debugging this ?
--
Laurent Bonnaud.
http://www.iut2grenoble.com/
--
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a
CONFIG_FSCACHE_HISTOGRAM ?
--
Laurent Bonnaud.
http://www.gipsa-lab.inpg.fr/page_pro.php?vid=96
--
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/1306742434.66
-686
# CONFIG_DEBUG_SET_MODULE_RONX is not set
According to this article:
http://lwn.net/Articles/422487/
this option would improve the security of the kernel.
--
Laurent Bonnaud
--
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe"
: Enable the CONFIG_PM_ADVANCED_DEBUG kernel configuration option.
This option will allow PowerTOP to collect runtime power management
statistics.
So could you please enable it ?
--
Laurent Bonnaud.
http://www.lis.inpg.fr/pages_perso/bonnaud/
--
To UNSUBSCRIBE, email to debian-kernel-requ
Hi,
this bug is the same as bug #540291.
--
Laurent Bonnaud.
--
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/1278610233.4599.6.ca...@localhost
Hi,
I have the same problem, but /etc/network/interfaces already contains:
auto eth0
--
Laurent Bonnaud.
--
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.
APT prefers testing-proposed-updates
APT policy: (500, 'testing-proposed-updates'), (500, 'testing')
Architecture: amd64 (x86_64)
--
Laurent Bonnaud.
http://www.lis.inpg.fr/pages_perso/bonnaud/
--
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with
On Tue, 2009-11-03 at 11:41 +0100, maximilian attems wrote:
> no way.
Could you please elaborate why ?
--
Laurent Bonnaud.
http://www.lis.inpg.fr/pages_perso/bonnaud/
--
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe". Tro
, and then check the root
filesystem before mounting it ro, but no distro does this as far
as I know.
During boot, it would allow to mount the ext4 root FS read-only without
replaying the journal. So could you please include e2fsck and
dependencies in the initramfs ?
--
Laurent Bonnaud.
http
/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash
--
Laurent Bonnaud.
http://www.lis.inpg.fr/pages_perso/bonnaud/
--
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe&q
inux 2.6.25-2-686 (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash
--
Laurent Bonnaud.
http://www.lis.inpg.fr/pages_perso/bonnaud/
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
this bug as fixed, and I will close it...
Thank to the Debian kernel team for continuous kernel updates!
--
Laurent Bonnaud.
http://www.lis.inpg.fr/pages_perso/bonnaud/
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Hi,
I am not seeing this bug any longer, therefore I am going to close this
bug...
--
Laurent Bonnaud.
http://www.lis.inpg.fr/pages_perso/bonnaud/
smime.p7s
Description: S/MIME cryptographic signature
x27;s machine.
Furthermore, this tool is advertised here:
http://wiki.debian.org/KernelFAQ#new-features-in-lenny
therefore people can expect it to work "out of the box".
--
Laurent Bonnaud.
http://www.lis.inpg.fr/pages_perso/bonnaud/
--
To UNSUBSCRIBE, email to [EMAIL PR
Hi,
linux-headers-2.6.25-1-686 is now installable, therefore I'm going to
close this bug...
--
Laurent Bonnaud.
http://www.lis.inpg.fr/pages_perso/bonnaud/
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
: sorry for my annoying moan :>.
--
Laurent Bonnaud.
http://www.lis.inpg.fr/pages_perso/bonnaud/
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Hi,
how about providing a driver in the non-free section that would be easy
to compile with module-assistant ?
--
Laurent Bonnaud.
http://www.lis.inpg.fr/pages_perso/bonnaud/
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
=453358
--
Laurent Bonnaud.
http://www.lis.inpg.fr/pages_perso/bonnaud/
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
it is not
installable
E: Broken packages
--
Laurent Bonnaud.
http://www.lis.inpg.fr/pages_perso/bonnaud/
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
ng
the computer, but one of my students was).
Besides those are "production" computers that are used by students so I
cannot take too many risks with them.
As soon as kernel 2.6.23 is released I will upgrade the computers...
--
Laurent Bonnaud.
http://www.lis.inpg.fr/pages_perso/bonn
-2-686:
linux-image-2.6.22-2-686/postinst/old-initrd-link-2.6.22-2-686: true
linux-image-2.6.22-2-686/postinst/bootloader-test-error-2.6.22-2-686:
linux-image-2.6.22-2-686/preinst/abort-install-2.6.22-2-686:
linux-image-2.6.22-2-686/postinst/old-system-map-link-2.6.22-2-686: true
--
Laurent Bonna
Package: linux-image-2.6-686
Version: 2.6.18+6
Severity: grave
Justification: renders package unusable
Hi,
now that kernel 2.6.18 has been removed from sid, could you please
update the metapackages to depend on 2.6.20 or 2.6.21 kernels ?
# apt-get install linux-image-2.6-686
Reading package lis
On Fri, 2006-11-10 at 17:13 +, Alan Woodland wrote:
> Nope, I haven't seen this in ages.
I'll close this bug, then. Thanks.
--
Laurent Bonnaud.
http://www.lis.inpg.fr/pages_perso/bonnaud/
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe&
Package: initramfs-tools
Version: 0.85a
Severity: important
Hi,
this system usually boots from an internal SATA disk (/dev/sda). I
recently added an external IEEE1394 disk and when I tried to reboot
the system, it failed. /dev/sda had become the external disk and the
internal disk had become /
Hi Alan,
are you still seeing this bug ?
It occurred only once on my system and with recent kernels, I never had
a crash again. Therefore, I would like to close this bug.
--
Laurent Bonnaud.
http://www.lis.inpg.fr/pages_perso/bonnaud/
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a
Package: linux-image-2.6.17-2-686
Version: 2.6.17-9
Severity: important
Hi,
here is the problem from the kernel logs:
BUG: warning at fs/ext3/inode.c:1016/ext3_getblk()
ext3_getblk+0xa8/0x22f [ext3] do_lookup+0x4f/0x135
dput+0x1a/0x118 __link_path_walk+0xb6a/0xca7
ext3_bread+0x12/0x62
Hi,
recent kernels allow udev to create the 1394 devices, therefore I am
going to close this bug.
Thanks to the Debian kernel team for timely kernel upgrades !
--
Laurent Bonnaud.
http://www.lis.inpg.fr/pages_perso/bonnaud/
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of
Hi,
I cannot reproduce this problem with kernel 2.6.17. Therefore I'm going
to close this bug.
--
Laurent Bonnaud.
http://www.lis.inpg.fr/pages_perso/bonnaud/
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Dear kernel maintainers,
could you please check if this bug is really a kernel problem ?
--
Laurent Bonnaud.
http://www.lis.inpg.fr/pages_perso/bonnaud/
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Hi,
this bug is gone in kernels 2.6.15 and 2.6.16, therefore I'm going to
close it.
--
Laurent Bonnaud.
http://www.lis.inpg.fr/pages_perso/bonnaud/
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
for the assertion to
fail in case of I/O error ?
--
Laurent Bonnaud.
http://www.lis.inpg.fr/pages_perso/bonnaud/
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Package: kernel
Version: 2.6.15-8
Severity: important
Hi,
this system has an Asus A8V motherboard with an integrated 2 channels
SATA controller. It has 2 SATA disks (/dev/sda and /dev/sdb) that are
assembled in a RAID1 array (/dev/md0).
A few days ago I mistakingly unplugged the power connecto
Package: kernel
Version: 2.6.15-8
Severity: important
Hi,
here is the problem:
$ dmesg
[...]
KERNEL: assertion (!sk->sk_forward_alloc) failed at net/core/stream.c (279)
KERNEL: assertion (!sk->sk_forward_alloc) failed at net/ipv4/af_inet.c (148)
I have found similar reports here:
http://lkm
Package: kernel
Version: 2.6.15-6
Severity: important
Hi,
here is the problem:
Feb 14 23:35:39 pc-dg-105-2 kernel: Unable to handle kernel NULL pointer
dereference at virtual address 0800
Feb 14 23:35:39 pc-dg-105-2 kernel: printing eip:
Feb 14 23:35:39 pc-dg-105-2 kernel: c0130583
Feb 14
> I cannot reproduce. Please describe in detail how you rebuild the
> package.
This is on a sarge system, since I'm doing a backport. I use this
command:
fakeroot apt-get -b source yaird
--
Laurent Bonnaud.
http://www.lis.inpg.fr/pages_perso/bonnaud/
--
To UNSUBSCRIBE, emai
get a working package as long as I do not
mess up the system. And putting files in /usr/local/ is clearly allowed
and does not count as "messing up the system".
--
Laurent Bonnaud.
http://www.lis.inpg.fr/pages_perso/bonnaud/
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a su
Package: yaird
Version: 0.0.11-11
Severity: normal
Hi,
I have rebuilt yaird from the Debian source package on a system where
/usr/local/bin/perl is a symlink to /usr/bin/perl. In the resulting binary
package, /usr/sbin/yaird begins with:
#!/usr/local/bin/perl
whereas in the standard package,
Hi,
since kernel 2.6.13 has not appeared in Debian yet (hint, hint !), I had
a chance to reboot my system, so here is the requested info:
# dmsetup ls
hda1(253, 0)
hdb1(253, 1)
# dmsetup info hda1
Name: hda1
State: ACTIVE
Tables present:LIVE
Open count:
dprobe dm_mod
# dmsetup ls
No devices found
In fact I guess that you are interested in the dmsetup output right
after the boot, when the dm_mod module still locks my PATA drives.
Unfortunately I cannot afford to reboot this machine now. I will do it
when kernel 2.6.13 is out.
--
Laurent
Hi,
this bug is still there with kernel 2.6.12.
--
Laurent Bonnaud.
http://www.lis.inpg.fr/pages_perso/bonnaud/
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Package: kernel
Version: 2.6.12-5
Severity: important
Hi,
I was installing a package with dpkg when the kernel had a GPF. dpkg
was then stuck and I had to reboot the system. This is with the
Debian provided linux-image:
$ uname -a
Linux jophur 2.6.12-1-amd64-k8 #1 Thu Aug 18 03:05:27 CEST 200
Package: kernel
Version: 2.6.11-3
Severity: wishlist
Hi,
until version 2.6.10, kernels were built with PREEMPT enabled. This
has changed in version 2.6.11-2:
kernel-image-2.6.11-i386 (2.6.11-2) unstable; urgency=low
[...]
* Disable CONFIG_PREEMPT (Andres Salomon).
$ grep PREEMPT /boot/confi
Package: kernel-image-2.6.11-9-amd64-k8
Version: 2.6.11-2
Severity: wishlist
Hi,
PREEMPT is disabled in the latest available kernel:
$ grep PREEMPT /boot/config-2.6.11-9-amd64-k8
# CONFIG_PREEMPT is not set
whereas it is (at least it was) enabled in i686 kernels. If there is
no good reason to
rrent versions of lib*1394 and coriander. Therefore I'm
leaving it open and will ask the coriander author for comments ...
--
Laurent Bonnaud.
http://www.lis.inpg.fr/pages_perso/bonnaud/
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
+0x1f/0x30
[] kobject_put+0x1f/0x30
[] kobject_release+0x0/0x10
[] vesafb_exit+0xf/0x1d [vesafb]
[] sys_delete_module+0x159/0x190
[] sys_munmap+0x50/0x80
[] sysenter_past_esp+0x52/0x75
Linux irancy 2.6.10-1-686 #1 Fri Mar 11 03:55:46 EST 2005 i686 GNU/Linux
--
Laurent Bonnaud.
http://www.l
ivers/base/core.c:85
[] kobject_cleanup+0x98/0xa0
[] kobject_release+0x0/0x10
[] kref_put+0x39/0xa0
[] kobject_put+0x1f/0x30
[] kobject_put+0x1f/0x30
[] kobject_release+0x0/0x10
[] init_i82365+0x1c3/0x1d9 [i82365]
[] sys_init_module+0x163/0x210
[] sysenter_past_esp+0x52/0x75
--
Laurent Bon
Hi,
this bug is fixed in kernel 2.6.10. Should I let this bug open as long
as Debian provides a default kernel with this bug ?
--
Laurent Bonnaud.
http://www.lis.inpg.fr/pages_perso/bonnaud/
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Troubl
Package: kernel
Version: 2.6.11-1
Severity: normal
Hi,
this system boots from a RAID1 array made of 2 SATA disks. It then
tries to mount 2 PATA disks. Unfortunately mount refuses to mount
those disks because they are "busy". The "dm_mod" module is
responsible for locking those disks. It is l
Hi,
I got confirmation that the genrtc module works on our Dell PowerEdge
SC1420.
BTW, why are there 2 rtc modules ?
Why is the rtc module loaded by default ?
Would loading the genrtc module by default be a problem on some
machines ?
--
Laurent Bonnaud.
http://www.lis.inpg.fr/pages_perso
Hi,
according to a report about some recent Dell computers that I read, the
module genrtc works. I could not confirm this on our server yet because
I'm not the admin.
--
Laurent Bonnaud.
http://www.lis.inpg.fr/pages_perso/bonnaud/
nux st-dg-00 2.6.8-1-686 #1 Thu Oct 7 03:15:25 EDT 2004 i686 GNU/Linux
--
Laurent Bonnaud.
http://www.lis.inpg.fr/pages_perso/bonnaud/
Package: kernel
Version: 2.6.8-3
Severity: normal
Hi,
note that this bug is almost the same as bug #234019, only on a
different machine with another radeon 9200 card. I'm opening a new
bug because even if you cannot fix it:
- it will prevent radeon 9200 users to loose time with the radeonfb
Package: kernel
Version: 2.6.8-1
Severity: normal
Hi,
the standard Debian initrd automatically loads the vesafb module.
When I try to remove it (to replace it with the radeonfb module), the
kernel displays this error message:
Device 'vesafb0' does not have a release() function, it is broken and
Package: kernel
Version: 2.6.8-1
Severity: normal
Hi,
during the system boot, one of the hardware autodetect package
(discover, hotplug, ...) tries to load and unload the i823650 module.
Then the kernel displays this error message:
Device 'i823650' does not have a release() function, it is brok
96 matches
Mail list logo