Bug#611827: xserver-xorg-input-evdev: mice and touchpad losing sync and lagging (MORE INFO)
On Tue, Feb 8, 2011 at 12:43:36 -0500, Andres Cimmarusti wrote: This is the contents of my Xorg.log. It seems the appropriate synaptics module is being unloaded... perhaps this is causing the issue? No, that's a red herring. Cheers, Julien signature.asc Description: Digital signature
Processed: Re: Bug#612516: Installation Report Debian Installer 6.0 Release Candidate 1 release
Processing commands for cont...@bugs.debian.org: reassign 612516 linux-2.6 Bug #612516 [installation-reports] Installation Report Debian Installer 6.0 Release Candidate 1 release Bug reassigned from package 'installation-reports' to 'linux-2.6'. found 612516 2.6.32-29 Bug #612516 [linux-2.6] Installation Report Debian Installer 6.0 Release Candidate 1 release There is no source info for the package 'linux-2.6' at version '2.6.32-29' with architecture '' Unable to make a source version for version '2.6.32-29' Bug Marked as found in versions 2.6.32-29. retitle 612516 quiet option shouldn't hide unsupported video mode question Bug #612516 [linux-2.6] Installation Report Debian Installer 6.0 Release Candidate 1 release Changed Bug title to 'quiet option shouldn't hide unsupported video mode question' from 'Installation Report Debian Installer 6.0 Release Candidate 1 release' thanks Stopping processing here. Please contact me if you need assistance. -- 612516: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=612516 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/handler.s.c.129724852322632.transcr...@bugs.debian.org
Nieuw: een copier die uw papieren documenten archiveert en klasseert
Nieuw : het kopier dat uw papieren documenten archiveert en klasseert ! Maar waar is dat document toch gebleven ! Dat is een vraag die we ons allemaal wel eens stellen. In het beste geval vinden we het na grondig zoeken terug. In het ergste geval herinneren we ons dat het verdwenen is door de waterschade van 2008 ! Die tijd is voorbij, want Vcomm stelt u voortaan een eenvoudige, allesomvattende en voor iedereen toegankelijke oplossing voor. Onze laatste generatie multifunctionele apparaten in kleur bieden u naast het kopiëren, printen, scannen of faxen in hoge kwaliteit ook de mogelijkheid om al uw papieren documenten te archiveren, bewaren en klasseren. We beschikken al over een complete professionele oplossing voor minder dan 3 euro per dag. Neemt u voor die prijs nog het risico onvoldoende uitgerust te zijn ? Neem contact met ons op het nummer 0800 95 598 om het te bespreken. Vcomm-Ricoh, Terhulpensesteenweg 380 - 3090 Overijse - tel.: 02 686 3030 - Fax.: 02 686 30 31 BTW : 0478 090 432 - email .: i...@vcomm.be - Web.: www.vcomm.be
2.6.32-5-openvz: Broken CIFS
Hello, Debian Kernel Team. I have found a minor inconsistency in the package linux-image-2.6.32-5-openvz-amd64, Squeeze repository. The module cifs.ko included in mentioned kernel is incompatible with the mount.cifs tool (cifs-utils). So, if I take packages cifs-utils, samba, samba-common, smbfs from the lenny-backports distributive, then everything works OK with the 2.6.32-5-openvz-amd64 kernel. If I take everything from stable (Squeeze) distributive, then mount.cifs command always fails with the same kernel. If I take a kernel without OpenVZ support, everything is allright. The next issue is the bug, being present in 2.6.32.5-openvz kernel: http://bugzilla.openvz.org/show_bug.cgi?id=1626 It was fixed only in 042test006.1 build. It will be very nice to have a revised kernel version in the distributive. And another wish. The 2.6.32.5-openvz is not stable enough yet. May be, does it make sense to include 2.6.26-openvz kernel into Squeeze as an option? Thank you for your job. With best regards, Stanislav Klinkov. -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/4d529ae6.8000...@yandex.ru
Bug#611750:
Same symptoms on an MSI Wind U100 netbook: everything else works other than resume from hibernate which fails most of the times (more on battery than on AC power) Havent tried to rebuild the kernel without the offending patch though. -- Paolo -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/aanlktikrv9zrgu-drc6gfhiqgkhfxkqnajc65_fbm...@mail.gmail.com
Re: 2.6.32-5-openvz: Broken CIFS
On Wed, Feb 09, 2011 at 04:47:18PM +0300, Stanislav Klinkov wrote: Hello, Debian Kernel Team. I have found a minor inconsistency in the package linux-image-2.6.32-5-openvz-amd64, Squeeze repository. The module cifs.ko included in mentioned kernel is incompatible with the mount.cifs tool (cifs-utils). So, if I take packages cifs-utils, samba, samba-common, smbfs from the lenny-backports distributive, then everything works OK with the 2.6.32-5-openvz-amd64 kernel. If I take everything from stable (Squeeze) distributive, then mount.cifs command always fails with the same kernel. If I take a kernel without OpenVZ support, everything is allright. The next issue is the bug, being present in 2.6.32.5-openvz kernel: http://bugzilla.openvz.org/show_bug.cgi?id=1626 It was fixed only in 042test006.1 build. It will be very nice to have a revised kernel version in the distributive. Please test latest images of the openvz patch: http://charm.itp.tuwien.ac.at/~mattems/linux-image-2.6.32-5-openvz-amd64_2.6.32-31_amd64.deb signature http://charm.itp.tuwien.ac.at/~mattems/linux-image-2.6.32-5-openvz-amd64_2.6.32-31_amd64.deb.sha512sum.asc They should have the fix. And another wish. The 2.6.32.5-openvz is not stable enough yet. May be, does it make sense to include 2.6.26-openvz kernel into Squeeze as an option? No we do not shipp muliple linux-2.6 version in a release, this would be a securty nightmare. Thank you for your job. Aboves image will land soon in the next update, it missed squeeze shortly as openvz hadn't synced their git tree with upstream stable releases. Anyway next release will focus on in tree linux containers. kind regards -- maks -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/20110209150445.gr19...@vostochny.stro.at
Bug#611750:
* Paolo Casaschi | 2011-02-09 15:12:31 [+]: Same symptoms on an MSI Wind U100 netbook: everything else works other than resume from hibernate which fails most of the times (more on battery than on AC power) Havent tried to rebuild the kernel without the offending patch though. If you trust me enough, I have mine at [0] if you want to test it. [0] http://download.breakpoint.cc/deb_bug_611750/ Sebastian -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/20110209153317.ga15...@chamillionaire.breakpoint.cc
Bug#609784:
Thanks for considering this bug. I have been using this driver and seems to be working fine so far (sending this email using it). $ sudo lspci -s 07:00.0 -nnv 07:00.0 Network controller [0280]: Realtek Semiconductor Co., Ltd. RTL8191SEvB Wireless LAN Controller [10ec:8172] (rev 10) Subsystem: Realtek Semiconductor Co., Ltd. Device [10ec:8181] Flags: bus master, fast devsel, latency 0, IRQ 17 I/O ports at 2000 [size=256] Memory at d110 (32-bit, non-prefetchable) [size=16K] Capabilities: [40] Power Management version 3 Capabilities: [50] MSI: Enable- Count=1/1 Maskable- 64bit+ Capabilities: [70] Express Legacy Endpoint, MSI 00 Capabilities: [100] Advanced Error Reporting Capabilities: [140] Virtual Channel Capabilities: [160] Device Serial Number 00-00-00-00-00-00-00-00 Kernel driver in use: rtl819xSE and dmesg output: [ 2028.969908] rtllib_crypt: registered algorithm 'NULL' [ 2028.969911] rtllib_crypt: registered algorithm 'TKIP' [ 2028.969912] rtllib_crypt: registered algorithm 'CCMP' [ 2028.969913] rtllib_crypt: registered algorithm 'WEP' [ 2028.969914] [ 2028.969915] Linux kernel driver for RTL8192 based WLAN cards [ 2028.969916] Copyright (c) 2007-2008, Realsil Wlan Driver [ 2028.969957] rtl819xSE :07:00.0: PCI INT A - GSI 17 (level, low) - IRQ 17 [ 2028.969963] rtl819xSE :07:00.0: setting latency timer to 64 [ 2028.970100] Memory mapped space start: 0xd110 [ 2028.976097] GetPciBusInfo(): Find Device(10EC:8172) bus=7 dev=0, func=0 [ 2028.977088] GetPciBridegInfo : Find Device(8086:3B44) bus=0 dev=28, func=1 [ 2028.977089] Pci Bridge Vendor is found index: 0 [ 2028.977090] Pci Bridge Vendor is 8086 [ 2028.982411] =dm_InitRateAdaptiveMask: bUseRAMask=0 [ 2029.065603] rtl819xSE :07:00.0: firmware: requesting RTL8192SE/rtl8192sfw.bin [ 2029.213505] rtl8192_SetWirelessMode(), wireless_mode:10, bEnableHT = 1 [ 2029.213512] InitializeAdapter8192SE(): Set MRC settings on as default!! [ 2029.213516] HW_VAR_MRC: Turn on 1T1R MRC! [ 2029.214753] ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 2029.432219] rtl8192_SetWirelessMode(), wireless_mode:10, bEnableHT = 1 [ 2029.432226] InitializeAdapter8192SE(): Set MRC settings on as default!! [ 2029.432230] HW_VAR_MRC: Turn on 1T1R MRC! [ 2049.903684] rtl8192_SetWirelessMode(), wireless_mode:10, bEnableHT = 1 [ 2049.903691] InitializeAdapter8192SE(): Set MRC settings on as default!! [ 2049.903695] HW_VAR_MRC: Turn on 1T1R MRC! [ 2079.890248] rtl8192_SetWirelessMode(), wireless_mode:10, bEnableHT = 1 [ 2079.890255] InitializeAdapter8192SE(): Set MRC settings on as default!! [ 2079.890260] HW_VAR_MRC: Turn on 1T1R MRC! [ 2119.960961] rtl8192_SetWirelessMode(), wireless_mode:10, bEnableHT = 1 [ 2119.960965] InitializeAdapter8192SE(): Set MRC settings on as default!! [ 2119.960967] HW_VAR_MRC: Turn on 1T1R MRC! [ 2173.776027] lo: Disabled Privacy Extensions [ 2231.078758] rtl8192_SetWirelessMode(), wireless_mode:10, bEnableHT = 1 [ 2231.078762] InitializeAdapter8192SE(): Set MRC settings on as default!! [ 2231.078763] HW_VAR_MRC: Turn on 1T1R MRC! [ 2232.536122] Linking with thenetworkwifi,channel:6, qos:0, myHT:1, networkHT:0, mode:6 cur_net.flags:0x406 [ 2232.536143] rtllib_associate_procedure_wq(), chan:6 [ 2232.536148] HTSetConnectBwMode():pHTInfo-bCurBW40MHz:0 [ 2232.546108] ==rtllib_associate_procedure_wq():ieee-current_network.qos_data.qos_mode is 0,ieee-qos_capability is 1 -- Mathieu -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/AANLkTinmJpRh0gBP7RxanYrfUoHVOZqYkQj8=7ymf...@mail.gmail.com
Bug#590280:
reassign 590280 firmware-realtek thanks I believe this should go into the non-free, reassigning from linux to realtek-firmware. -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/aanlktimc6qmgrxghbyypwy2jj9s8fxfdiqdklkttj...@mail.gmail.com
Processed: your mail
Processing commands for cont...@bugs.debian.org: reassign 590280 firmware-realtek Bug #590280 [linux-2.6] linux-image-2.6.32-5-amd64: Kernel module for wireless PCI card Realtek RTL8191SE/RTL8192SE Bug reassigned from package 'linux-2.6' to 'firmware-realtek'. Bug No longer marked as found in versions 2.6.32-18. thanks Stopping processing here. Please contact me if you need assistance. -- 590280: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=590280 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/handler.s.c.129726761931812.transcr...@bugs.debian.org
Bug#611622: linux-image-2.6.32-bpo.5-686: VM problems
Hi Ben, You were correct. It is offload and it is X and/or pulse which is throwing enough TCP at the system to trigger the memory allocation failures. You can close the bug now. Turning off all offloads except checksumming looks like a valid workaround. I have had the system running for a while. The memory allocation failures should have shown up by now. It may be worth it to have an init script as a part of the ethtool package which sets offloads and defaults to turning off segmentation offloads at if there is no swap. I will be happy to write it, if you and the ethtool maintainer think it is a good idea. Brgds, -- Understanding is a three-edged sword: your side, their side, and the truth. --Kosh Naranek A. R. Ivanov E-mail: aiva...@sigsegv.cx WWW: http://www.sigsegv.cx/ pub 1024D/DDE5E715 2002-03-03 Anton R. Ivanov ai...@sigsegv.cx Fingerprint: C824 CBD7 EE4B D7F8 5331 89D5 FCDA 572E DDE5 E715 -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/4d52c09a.70...@sigsegv.cx
Bug#611622: marked as done (linux-image-2.6.32-bpo.5-686: VM problems)
Your message dated Wed, 9 Feb 2011 16:53:40 + with message-id 20110209165340.gg21...@decadent.org.uk and subject line Re: Bug#611622: linux-image-2.6.32-bpo.5-686: VM problems has caused the Debian Bug report #611622, regarding linux-image-2.6.32-bpo.5-686: VM problems to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 611622: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=611622 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: linux-2.6 Version: 2.6.32-30~bpo50+1 Severity: normal I keep getting VM failure messages. I suspect the machine is simply a bit too slow for the network card which is in it. It is a via Nehemia at 1.7GHz with an extra Intel GigE server adapter. The backtraces look like showing problems in the network receive/xmit routines. The machine is swapless and is used mostly as an NFS server. It was not showing this behaviour under 2.6.26 Best Regards, -- Package-specific info: ** Version: Linux version 2.6.32-bpo.5-686 (Debian 2.6.32-30~bpo50+1) (norb...@tretkowski.de) (gcc version 4.3.2 (Debian 4.3.2-1.1) ) #1 SMP Tue Jan 18 23:27:36 UTC 2011 ** Command line: auto BOOT_IMAGE=Lin_2.6.32-bpo ro root=900 acpi_enforce_resources=lax ** Not tainted ** Kernel log: [120567.850253] HighMem: 1*4kB 5*8kB 0*16kB 1*32kB 2*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 204kB [120567.850276] 171605 total pagecache pages [120567.850281] 0 pages in swap cache [120567.850286] Swap cache stats: add 0, delete 0, find 0/0 [120567.850291] Free swap = 0kB [120567.850295] Total swap = 0kB [120567.867575] 245472 pages RAM [120567.867584] 19186 pages HighMem [120567.867588] 3410 pages reserved [120567.867592] 29182 pages shared [120567.867596] 216768 pages non-shared [120567.867696] swapper: page allocation failure. order:5, mode:0x4020 [120567.867705] Pid: 0, comm: swapper Not tainted 2.6.32-bpo.5-686 #1 [120567.867710] Call Trace: [120567.867731] [c108c099] ? __alloc_pages_nodemask+0x484/0x4d9 [120567.867743] [c108c0fa] ? __get_free_pages+0xc/0x17 [120567.867752] [c10ae8fe] ? __kmalloc+0x30/0x128 [120567.867763] [c11d29ec] ? pskb_expand_head+0x4f/0x157 [120567.867772] [c11d2e2f] ? __pskb_pull_tail+0x40/0x1f6 [120567.867786] [c11d9ad4] ? dev_queue_xmit+0xe4/0x38e [120567.867801] [c11fb191] ? ip_finish_output+0x0/0x5c [120567.867810] [c11fb156] ? ip_finish_output2+0x187/0x1c2 [120567.867820] [c11fa657] ? ip_local_out+0x15/0x17 [120567.867829] [c11fae38] ? ip_queue_xmit+0x31e/0x379 [120567.867838] [c10add2d] ? __slab_alloc+0x97/0x431 [120567.867849] [c126e058] ? _spin_lock_bh+0x8/0x1e [120567.867870] [f8775a86] ? __nf_ct_refresh_acct+0x66/0xa4 [nf_conntrack] [120567.867884] [c1209e8e] ? tcp_transmit_skb+0x595/0x5cc [120567.867894] [c120bef2] ? tcp_write_xmit+0x7a3/0x874 [120567.867903] [c1207926] ? tcp_ack+0x1611/0x1802 [120567.867912] [c120921b] ? tcp_established_options+0x1d/0x8b [120567.867921] [c12094df] ? tcp_current_mss+0x38/0x53 [120567.867931] [c120c009] ? __tcp_push_pending_frames+0x1e/0x50 [120567.867940] [c1207b32] ? tcp_data_snd_check+0x1b/0xd2 [120567.867949] [c12081d1] ? tcp_rcv_established+0xd2/0x626 [120567.867960] [c120e958] ? tcp_v4_do_rcv+0x15f/0x2cf [120567.867970] [c120ee9a] ? tcp_v4_rcv+0x3d2/0x602 [120567.867980] [c11f71d6] ? ip_local_deliver_finish+0x10c/0x18c [120567.867989] [c11f6dfc] ? ip_rcv_finish+0x2c4/0x2d8 [120567.867999] [c11d8d99] ? netif_receive_skb+0x3bb/0x3d6 [120567.868095] [f7c6ca2c] ? e1000_clean_rx_irq+0x351/0x400 [e1000] [120567.868130] [f7c703c6] ? e1000_clean+0x29f/0x40d [e1000] [120567.868142] [c104684c] ? hrtimer_get_next_event+0x8c/0xa0 [120567.868155] [c103b2df] ? get_next_timer_interrupt+0x190/0x1fb [120567.868165] [c1007569] ? sched_clock+0x5/0x7 [120567.868175] [c1047beb] ? sched_clock_local+0x15/0x11b [120567.868184] [c11d9319] ? net_rx_action+0x96/0x194 [120567.868196] [c10354dc] ? __do_softirq+0xaa/0x151 [120567.868205] [c10355b4] ? do_softirq+0x31/0x3c [120567.868213] [c103568a] ? irq_exit+0x26/0x58 [120567.868225] [c1004699] ? do_IRQ+0x78/0x89 [120567.868234] [c10037f0] ? common_interrupt+0x30/0x38 [120567.868250] [c101a818] ? native_safe_halt+0x2/0x3 [120567.868259] [c1008597] ? default_idle+0x3c/0x5a [120567.868267] [c1002389] ? cpu_idle+0x89/0xa4 [120567.868279] [c13bf7fc] ? start_kernel+0x318/0x31d [120567.868284] Mem-Info: [120567.868288] DMA per-cpu: [120567.868293] CPU0: hi:0, btch: 1 usd: 0 [120567.868298] Normal per-cpu: [120567.868304] CPU0: hi: 186, btch: 31 usd: 43 [120567.868308] HighMem per-cpu: [120567.868314] CPU0: hi: 18,
Bug#612633: initramfs-tools: mkinitramfs creates non working initramfs
Package: initramfs-tools Version: 0.98.8 Severity: grave Hi, mkinitramfs copies libgcc_s.so from /usr/local/lib into the initramfs. After a reboot lvm charge about a missing library (libgcc_s.so) and failed to start. Due to an update all initramfs images went broken. Please ignore /usr/local/ at all, or add /usr/local/lib to the library search path. Regards Bene Spranger -- System Information: Debian Release: 6.0 APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.6.37-rc3+ (SMP w/2 CPU cores; PREEMPT) Locale: LANG=de_DE.utf8, LC_CTYPE=de_DE.utf8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages initramfs-tools depends on: ii cpio 2.11-6 GNU cpio -- a program to manage ar ii findutils 4.4.2-1+b1 utilities for finding files--find, ii klibc-utils 1.5.21-1 small utilities built with klibc f ii module-init-tools 3.12-1 tools for managing Linux kernel mo ii udev 164-4 /dev/ and hotplug management daemo Versions of packages initramfs-tools recommends: ii busybox 1:1.17.1-8 Tiny utilities for small and embed Versions of packages initramfs-tools suggests: pn bash-completion none (no description available) -- no debconf information -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/20110209172907.206bd...@ariane.spranger.biz
Re: Uploading linux-2.6 2.6.37-1 to unstable
On mar., 2011-02-08 at 15:16 +, Ben Hutchings wrote: Note that the OpenVZ, VServer and Xen flavours have been dropped and will not come back. OpenVZ and VServer users should migrate to LXC (Linux containers, using the cgroups and namespace features). Xen support in mainline Linux is improving and it should be usable as the dom0 kernel soon. What about the Grsecurity featureset? -- Yves-Alexis -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/1297273042.27728.11.camel@oban
Processed: severity of 612633 is normal
Processing commands for cont...@bugs.debian.org: severity 612633 normal Bug #612633 [initramfs-tools] initramfs-tools: mkinitramfs creates non working initramfs Severity set to 'normal' from 'grave' thanks Stopping processing here. Please contact me if you need assistance. -- 612633: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=612633 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/handler.s.c.129727315026104.transcr...@bugs.debian.org
Re: Uploading linux-2.6 2.6.37-1 to unstable
On Wed, Feb 09, 2011 at 06:37:22PM +0100, Yves-Alexis Perez wrote: On mar., 2011-02-08 at 15:16 +, Ben Hutchings wrote: Note that the OpenVZ, VServer and Xen flavours have been dropped and will not come back. OpenVZ and VServer users should migrate to LXC (Linux containers, using the cgroups and namespace features). Xen support in mainline Linux is improving and it should be usable as the dom0 kernel soon. What about the Grsecurity featureset? Well, I had thought that was ready to add, but Bastian raised some issues that you'll have to answer first. Sorry for raising your hopes on that. Ben. -- Ben Hutchings We get into the habit of living before acquiring the habit of thinking. - Albert Camus -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/20110209174748.gh21...@decadent.org.uk
Bug#605090: Updated patch
On Thu, 27 Jan 2011, Yves-Alexis Perez wrote: On jeu., 2011-01-27 at 00:29 +0100, maximilian attems wrote: On Tue, 18 Jan 2011, Yves-Alexis Perez wrote: Kernel team, what do you think? Could the patches be merged against trunk? Config might still need some reviewing but that can be done once people start testing the packages. What follows is my personal view, in short what I miss most is an assessement of the involved cost of this specific feature branch. I follow both 2.6.32 (“stable”) and 2.6.36 then 2.6.37 (“test”) releases since few weeks, integrating them to the linux-2.6 (sid and trunk) source packages. There's an rss feed with a changelog which I use to see what changed and apply the debian diff (which is about removing the “localpart” in 2.6.37 and removing the security bugfixes in 2.6.32). Right now I'm doing it manually (applying against a tree after debian/rules source and fixing the rej) and intend to switch to git when the migration is done. For 2.6.37 it's immediate, for 2.6.32 it's a bit longer since I need to do the removal part. Then there is the testing. Nothing really specific there. Removing the security bugfixes, that doesn't sound like a good roead to go. first of all merging a patch that deviates from mainline for an eternety and shows zero interest of upstream merging is not a good candidate. You get longterm plenty of cost versus allmost no benefit. There's no interest in upstreaming from grsec/pax teams but some other people are indeed interested in upstreaming those kind of features. In the meantime, having a featureset is a nice way to move along. That is a wrong look at the problem, once it's upstream everybody profits. So this looks more like a dead end road. I'm quite unsure that this patch benefits Debian. A lot of Debian users build their own kernels for integrating grsecurity patch and I really think they would be interested in having it directly in the distribution. Though it's not exactly the same situation (especially wrt. the config) I think Gentoo Hardened kernel is really appreciated. Professional as well a personal people do use it daily because it's critical in their work. If we can provide them a package I think they'll be grateful. Hmm Openvz was once scheduled to be merged mainline and back then people were actively workin on it. We are dropping it as mainline has a very interesting alternative. Considering that SELinux is inside the kernel it be much better time investment to polish that. What makes you think that a Debian Hardened with proper SELinux wouldn't be really appreciated!? Third beside security theatre what is gained by it? I think the whole point of the “Grsecurity” patchset is “security”. I like the way you put it under brackets and think that security is gained by just applying this patchset. Fourth why not invest the time for Wheezy and have finally the mainline and security backed SELinux ready. This seems like a much better time investment. Trying to push some bits upstream is indeed a good time investment (though it takes time and I really think moving forward now is a good idea). But Grsecurity isn't a drop-in replacement for SELinux. Some features like RBAC and auditing have some similarities, but all the hardening and memory protection really have nothing to do with that. Be more precise in what SELinux can't do for you? (Emulating NX for bad hardware doesn't count these days). Fifth the ninties are over, an upstream that still doesn't use an VSC seems very untrustworthy. I didn't say anything about upstream VCS usage. Indeed it'd be nice to have a repository available for users and I'm sure openvz and vserver patchsets maintainers would agree. Been there and we are leaving both. Happy hacking -- maks -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/20110209175102.ga27...@stro.at
Re: Uploading linux-2.6 2.6.37-1 to unstable
On mer., 2011-02-09 at 17:47 +, Ben Hutchings wrote: On Wed, Feb 09, 2011 at 06:37:22PM +0100, Yves-Alexis Perez wrote: On mar., 2011-02-08 at 15:16 +, Ben Hutchings wrote: Note that the OpenVZ, VServer and Xen flavours have been dropped and will not come back. OpenVZ and VServer users should migrate to LXC (Linux containers, using the cgroups and namespace features). Xen support in mainline Linux is improving and it should be usable as the dom0 kernel soon. What about the Grsecurity featureset? Well, I had thought that was ready to add, but Bastian raised some issues that you'll have to answer first. Sorry for raising your hopes on that. No problem, though I've replied to the comments and am waiting for some replies. Regards, -- Yves-Alexis -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/1297274466.27728.12.camel@oban
Bug#605090: Updated patch
On mer., 2011-02-09 at 18:51 +0100, maximilian attems wrote: I follow both 2.6.32 (“stable”) and 2.6.36 then 2.6.37 (“test”) releases since few weeks, integrating them to the linux-2.6 (sid and trunk) source packages. There's an rss feed with a changelog which I use to see what changed and apply the debian diff (which is about removing the “localpart” in 2.6.37 and removing the security bugfixes in 2.6.32). Right now I'm doing it manually (applying against a tree after debian/rules source and fixing the rej) and intend to switch to git when the migration is done. For 2.6.37 it's immediate, for 2.6.32 it's a bit longer since I need to do the removal part. Then there is the testing. Nothing really specific there. Removing the security bugfixes, that doesn't sound like a good roead to go. Well, I'm only removing them from the Grsecurity patch because they're already included in the Debian packaging... first of all merging a patch that deviates from mainline for an eternety and shows zero interest of upstream merging is not a good candidate. You get longterm plenty of cost versus allmost no benefit. There's no interest in upstreaming from grsec/pax teams but some other people are indeed interested in upstreaming those kind of features. In the meantime, having a featureset is a nice way to move along. That is a wrong look at the problem, once it's upstream everybody profits. So this looks more like a dead end road. I agree that upstreaming is better but I still think it's useful to have a featureset in the meantime (and I think people are interested in that). Hmm Openvz was once scheduled to be merged mainline and back then people were actively workin on it. We are dropping it as mainline has a very interesting alternative. Again, I'm all in favor of dropping it when mainline has a viable alternative. But it's not currently the case. Considering that SELinux is inside the kernel it be much better time investment to polish that. What makes you think that a Debian Hardened with proper SELinux wouldn't be really appreciated!? I'm sure a Debian Hardened with SELinux would be really appreciated. Be more precise in what SELinux can't do for you? (Emulating NX for bad hardware doesn't count these days). Again, SELinux is about access control policies, in order to reduce propagation when a process is compromised. It's not about hardening the kernel and userland to prevent this compromission. At most you could compare it with the RBAC part of Grsecurity, but there's also the chroot protection one, the PaX memory protections, auditing and the various hardening features which you can find on the website. Thanks for your comments. -- Yves-Alexis Perez ANSSI/ACE/LAM signature.asc Description: This is a digitally signed message part
Bug#605090: Updated patch
On Wed, 9 Feb 2011 18:51:02 +0100, maximilian attems m...@stro.at wrote: first of all merging a patch that deviates from mainline for an eternety and shows zero interest of upstream merging is not a good candidate. You get longterm plenty of cost versus allmost no benefit. There's no interest in upstreaming from grsec/pax teams but some other people are indeed interested in upstreaming those kind of features. In the meantime, having a featureset is a nice way to move along. That is a wrong look at the problem, once it's upstream everybody profits. So this looks more like a dead end road. So instead of having things that are nice, we should wait until upstream has them? Considering that SELinux is inside the kernel it be much better time investment to polish that. What makes you think that a Debian Hardened with proper SELinux wouldn't be really appreciated!? It would be. So would a proper grsecurity kernel. Third beside security theatre what is gained by it? I think the whole point of the “Grsecurity” patchset is “security”. I like the way you put it under brackets and think that security is gained by just applying this patchset. Can you show that grsecurity does not provide any additional security? Fourth why not invest the time for Wheezy and have finally the mainline and security backed SELinux ready. This seems like a much better time investment. Trying to push some bits upstream is indeed a good time investment (though it takes time and I really think moving forward now is a good idea). But Grsecurity isn't a drop-in replacement for SELinux. Some features like RBAC and auditing have some similarities, but all the hardening and memory protection really have nothing to do with that. Be more precise in what SELinux can't do for you? (Emulating NX for bad hardware doesn't count these days). For some SELinux is the right choice, for others grsecurity. Its obvious which you prefer, but not everyone is the same as you. Yves-Alexis is interested in doing the work on something that you do not want to do the work on, that seems like a good thing. micah pgpc8N0q6MwIa.pgp Description: PGP signature
Processed: linux-2.6 497036, 578005, 501023, 513406, 497036, 523424, 581001, 589996, 388721, 498309, 402562, 421911, 475055, 529165
Processing commands for cont...@bugs.debian.org: fixed 497036 2.6.32-11 Bug #497036 {Done: dann frazier da...@debian.org} [linux-2.6] bug tg3 linux-image-2.6.25-2-686 Bug #498479 {Done: dann frazier da...@debian.org} [linux-2.6] bug in linux-image-2.6-686 Bug #498548 {Done: dann frazier da...@debian.org} [linux-2.6] linux-image-2.6.26-1-686: SKB BUG: Invalid truesize Bug #509716 {Done: dann frazier da...@debian.org} [linux-2.6] linux-image-2.6.26-1-686: system crashed on the hard network problem There is no source info for the package 'linux-2.6' at version '2.6.32-11' with architecture '' Unable to make a source version for version '2.6.32-11' Bug Marked as fixed in versions 2.6.32-11. Bug Marked as fixed in versions 2.6.32-11. Bug Marked as fixed in versions 2.6.32-11. Bug Marked as fixed in versions 2.6.32-11. fixed 578005 2.6.32-11 Bug #578005 {Done: Ben Hutchings b...@decadent.org.uk} [linux-2.6] Please consider backporting KVM_GET/SET_CLOCK to 2.6.32 There is no source info for the package 'linux-2.6' at version '2.6.32-11' with architecture '' Unable to make a source version for version '2.6.32-11' Bug Marked as fixed in versions 2.6.32-11. fixed 501023 2.6.32-11 Bug #501023 {Done: dann frazier da...@debian.org} [linux-2.6] kernel 2.6.26-1-amd64 hangs at boot. There is no source info for the package 'linux-2.6' at version '2.6.32-11' with architecture '' Unable to make a source version for version '2.6.32-11' Bug Marked as fixed in versions 2.6.32-11. fixed 513406 2.6.32-11 Bug #513406 {Done: dann frazier da...@debian.org} [linux-2.6] Possible oops during eeepc-laptop module init; kills ACPI hotkeys There is no source info for the package 'linux-2.6' at version '2.6.32-11' with architecture '' Unable to make a source version for version '2.6.32-11' Bug Marked as fixed in versions 2.6.32-11. fixed 497036 2.6.32-11 Bug #497036 {Done: dann frazier da...@debian.org} [linux-2.6] bug tg3 linux-image-2.6.25-2-686 Bug #498479 {Done: dann frazier da...@debian.org} [linux-2.6] bug in linux-image-2.6-686 Bug #498548 {Done: dann frazier da...@debian.org} [linux-2.6] linux-image-2.6.26-1-686: SKB BUG: Invalid truesize Bug #509716 {Done: dann frazier da...@debian.org} [linux-2.6] linux-image-2.6.26-1-686: system crashed on the hard network problem There is no source info for the package 'linux-2.6' at version '2.6.32-11' with architecture '' Unable to make a source version for version '2.6.32-11' Ignoring request to alter fixed versions of bug #497036 to the same values previously set Ignoring request to alter fixed versions of bug #498479 to the same values previously set Ignoring request to alter fixed versions of bug #498548 to the same values previously set Ignoring request to alter fixed versions of bug #509716 to the same values previously set fixed 523424 2.6.32-11 Bug #523424 {Done: Tobias Grimm tobias.gr...@e-tobi.net} [linux-libc-dev] [linux-libc-dev] header clash between linux/types.h and stdint.h Bug Marked as fixed in versions linux-2.6/2.6.32-11. fixed 581001 2.6.32-29 Bug #581001 {Done: dann frazier da...@debian.org} [linux-2.6] linux-image-2.6.26-2-amd64: Broadcom 5709 lockup with message-signalled-interrupts There is no source info for the package 'linux-2.6' at version '2.6.32-29' with architecture '' Unable to make a source version for version '2.6.32-29' Bug Marked as fixed in versions 2.6.32-29. fixed 589996 2.6.32-29 Bug #589996 {Done: Ben Hutchings b...@decadent.org.uk} [linux-base] Insane dependency on apt causes kernel to be removed on update Bug #598023 {Done: Ben Hutchings b...@decadent.org.uk} [linux-base] linux-base in experimental still depends on libapt-pkg-perl Bug Marked as fixed in versions linux-2.6/2.6.32-29. Bug Marked as fixed in versions linux-2.6/2.6.32-29. fixed 388721 2.6.26-3 Bug #388721 {Done: Philippe Cloutier philippe.cloutie...@ulaval.ca} [linux-2.6] version.h missing in linux-headers-2.6.16-2-686 There is no source info for the package 'linux-2.6' at version '2.6.26-3' with architecture '' Unable to make a source version for version '2.6.26-3' Bug Marked as fixed in versions 2.6.26-3. fixed 498309 2.6.26-3 Bug #498309 {Done: dann frazier da...@debian.org} [linux-2.6] xfs filesystem corruption due to attr2 bug There is no source info for the package 'linux-2.6' at version '2.6.26-3' with architecture '' Unable to make a source version for version '2.6.26-3' Bug Marked as fixed in versions 2.6.26-3. fixed 402562 2.6.26-3 Bug #402562 {Done: dann frazier da...@debian.org} [linux-2.6] Please support newer 3ware controllers There is no source info for the package 'linux-2.6' at version '2.6.26-3' with architecture '' Unable to make a source version for version '2.6.26-3' Bug Marked as fixed in versions 2.6.26-3. fixed 421911 2.6.26-3 Bug #421911 {Done: maximilian attems m...@stro.at} [linux-2.6] kernel: kernel BUG at mm/slab.c:595! when a mobile phone is connected through a USB cable There is no source info for the package
Bug#612633: initramfs-tools: mkinitramfs creates non working initramfs
On Wed, Feb 09, 2011 at 05:29:07PM +0100, Benedikt Spranger wrote: Package: initramfs-tools Version: 0.98.8 Severity: grave hmmm, severe misinterpretation. mkinitramfs copies libgcc_s.so from /usr/local/lib into the initramfs. After a reboot lvm charge about a missing library (libgcc_s.so) and failed to start. Due to an update all initramfs images went broken. Please ignore /usr/local/ at all, or add /usr/local/lib to the library search path. most likely your box is broken, the lvm from Debian I am looking at does certainly not depend on libgcc: $ ldd /sbin/lvm linux-vdso.so.1 = (0x7fff9d1ff000) libdl.so.2 = /lib/libdl.so.2 (0x7fbcdaa77000) libreadline.so.5 = /lib/libreadline.so.5 (0x7fbcda837000) libdevmapper.so.1.02.1 = /lib/libdevmapper.so.1.02.1 (0x7fbcda614000) libudev.so.0 = /lib/libudev.so.0 (0x7fbcda406000) libc.so.6 = /lib/libc.so.6 (0x7fbcda0a5000) /lib64/ld-linux-x86-64.so.2 (0x7fbcdac9d000) libncurses.so.5 = /lib/libncurses.so.5 (0x7fbcd9e5e000) libselinux.so.1 = /lib/libselinux.so.1 (0x7fbcd9c4) You'd better check what you have localy compiled in /usr/local/lib and see that it gets out of the way for ldd. No libgcc also seen in any of the initramfs around. Unless this bug report gets backed up with real data on why mkinitramfs would be misbehaving here, this can be closed soon. -- maks -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/20110209213900.gs19...@vostochny.stro.at
Bug#605090: Updated patch
On Wed, Feb 09, 2011 at 06:51:02PM +0100, maximilian attems wrote: Be more precise in what SELinux can't do for you? SELinux is only MAC. It attempts to protect userspace from userspace. From my view, the bulk of the benefits in grsec and PaX are protecting the kernel from userspace. Take for example the case of syscalls. There is nothing in a MAC that can filter syscalls, so if there is a new vulnerability in a syscall, you might get attacked, and no MAC can stop it. PaX adds a lot of internal hardening to mitigate most kernel exploitation attempts (for example, actually enforcing the kernel/userspace memory segmentation so that kernel code can't be tricked into running code from a userspace mapping, setting function pointers and call tables read-only so that an arbitrary write isn't instantly turned into a root-escalation, hiding the location of kernel addresses to frustrate attacks that need to find in-kernel offsets, actually checking the size of copy_to/from_user work to avoid overflows, the list goes on and on). (Emulating NX for bad hardware doesn't count these days). Why not? A giant amount of hardware lacks NX, and is still in active use, especially for Debian (people are turning more to Debian as other distros move their minimum instruction set requirements higher and higher). -Kees -- Kees Cook@debian.org -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/20110209231848.gb1...@outflux.net
Processed (with 1 errors): Found 532005 in 2.6.32-30
Processing commands for cont...@bugs.debian.org: unarchive 532005 Bug #532005 {Done: Moritz Muehlenhoff j...@inutil.org} [linux-2.6] gnome: Bell beep on PC speaker no longer works Unarchived Bug 532005 reopen 532005 Bug #532005 {Done: Moritz Muehlenhoff j...@inutil.org} [linux-2.6] gnome: Bell beep on PC speaker no longer works 'reopen' may be inappropriate when a bug has been closed with a version; you may need to use 'found' to remove fixed versions. found linux-2.6 2.6.32-30 Unknown command or malformed arguments to command. thanks Stopping processing here. Please contact me if you need assistance. -- 532005: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=532005 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/handler.s.c.129730704019315.transcr...@bugs.debian.org
Bug#532005: Found 532005 in Squeeze Kernel 2.6.32-30
Hi Moritz and Matthew, This is an issue with the current release of Debian Squeeze. The issue is actually a boot-time load order issue. If the pcspkr module is inserted into the kernel too early in the boot process (as it is by default, at least on my system) the beep becomes the evil buzzing honk the original reporter complained about. However, if it's inserted late into the boot process, it's the lovely, beautiful, normal, Lenny beep. So, an effective workaround is to insert the following into your /etc/rc.local file: modprobe -r pcspkr modprobe pcspkr I just figured this out today, and was really happy to have my normal, Lenny beep back. This probably means that this bug should be reassigned, but I have no idea where it should be reassigned. Thanks for your time, Nick -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/871v3g1stc@debian.home
Bug#612633: initramfs-tools: mkinitramfs creates non working initramfs
[ Keep the bugreport on Cc, this is *not* a private communication and maybe easily lost there, thank you. ] On Wed, Feb 09, 2011 at 11:41:58PM +0100, Benedikt Spranger wrote: # md5sum /sbin/lvm a61f4ebc4f34d2f973925bd5e06bc269 /sbin/lvm # ldd /sbin/lvm linux-gate.so.1 = (0xb774f000) libdl.so.2 = /lib/i686/cmov/libdl.so.2 (0xb7728000) libreadline.so.5 = /lib/libreadline.so.5 (0xb76f5000) libdevmapper.so.1.02.1 = /lib/libdevmapper.so.1.02.1 (0xb76d2000) libudev.so.0 = /lib/libudev.so.0 (0xb76c4000) libc.so.6 = /lib/i686/cmov/libc.so.6 (0xb757e000) /lib/ld-linux.so.2 (0xb775) libncurses.so.5 = /lib/libncurses.so.5 (0xb7544000) libgcc_s.so.1 = /usr/local/lib/libgcc_s.so.1 (0xb7527000) libselinux.so.1 = /lib/libselinux.so.1 (0xb750b000) hmm right forgot to check 32 bit legacy, well there the line is similar, but libgcc_s.so.1 = /lib/libgcc_s.so.1 (0xb7595000) what is your cat /etc/ld.so.conf /etc/ld.so.conf.d/*.conf No libgcc also seen in any of the initramfs around. Thats bad. See above. libgcc_s.so.1 is needed. well the question is why do you have a non working libgcc in /usr/local/lib ?? mkinitramfs would be misbehaving here, this can be closed soon. I hope the output above can clarify. Nope, your report is still missing a lot, like lsinitramfs /boot/path_to_broken_initramfs and the output of sh -x /usr/sbin/mkinitramfs -o /tmp/fooo to backup the claims. thank you. -- maks -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/20110210070049.gt19...@vostochny.stro.at
Bug#612633: initramfs-tools: mkinitramfs creates non working initramfs
[ Again don't drop Cc on bug report ] On Thu, Feb 10, 2011 at 12:02:49AM +0100, Benedikt Spranger wrote: Am Wed, 9 Feb 2011 21:39:00 + schrieb maximilian attems m...@stro.at: You'd better check what you have localy compiled in /usr/local/lib and see that it gets out of the way for ldd. # gcc --version gcc (GCC) 4.6.0 20110112 (experimental) well, why does this end up in /usr/local, me gets confused, anyway there are newer packages around afais: gcc-4.6 | 4.6-20110125-1 | experimental | source, amd64, armel, i386, ia64, mips, s390 This bug and the default update all initramfs with no backup hits me really hard. So it did work at some point? That is an info you didn't tell yet. You can easily tell it to do backups in /etc/initramfs-tools/initramfs.conf anyway why don't you keep another kernel around? Running unstable one should be able to debug one own's box, that's the rule. It is working well for thousands other, no idea yet what goes wrong here. -- maks -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/20110210070724.gu19...@vostochny.stro.at
Bug#612714: netfilter: fails to match state of IPv6 connections
Package: linux-2.6 Version: 2.6.32-30 Severity: normal Tags: upstream ipv6 I tested this only by filtering bridged traffic. How to repeat: 1. Set the IPv6 FORWARD default policy to DROP. 2. Add this rule: ip6tables -A FORWARD -j ACCEPT 3. This way, the packets (neighbor discovery, ICMP ping ...) are not dropped. 4. We delete the previous rule and add this one: ip6tables -A FORWARD -m state --state NEW,ESTABLISHED,RELATED -j ACCEPT 5. The IPv6 packets, which should be forwarded are now dropped. For the record: if I test this with Lenny, the packets are forwarded if I match INVALID packets and accept them. In Squeeze even this doesn't seem to work. -- Package-specific info: ** Version: Linux version 2.6.32-5-amd64 (Debian 2.6.32-30) (b...@decadent.org.uk) (gcc version 4.3.5 (Debian 4.3.5-4) ) #1 SMP Wed Jan 12 03:40:32 UTC 2011 ** Command line: BOOT_IMAGE=/boot/vmlinuz-2.6.32-5-amd64 root=UUID=588f1832-95bb-4ea9-983e-f7fd257ddf70 ro quiet Architecture: amd64 (x86_64) Kernel: Linux 2.6.32-5-amd64 (SMP w/1 CPU core) -- debconf information: linux-image-2.6.32-5-amd64/postinst/ignoring-do-bootloader-2.6.32-5-amd64: linux-image-2.6.32-5-amd64/postinst/depmod-error-initrd-2.6.32-5-amd64: false linux-image-2.6.32-5-amd64/prerm/removing-running-kernel-2.6.32-5-amd64: true linux-image-2.6.32-5-amd64/postinst/missing-firmware-2.6.32-5-amd64: -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/4d538e15.8090...@skoberne.net
Re: 2.6.32-5-openvz: Broken CIFS
09.02.2011 18:04, maximilian attems wrote: Please test latest images of the openvz patch: http://charm.itp.tuwien.ac.at/~mattems/linux-image-2.6.32-5-openvz-amd64_2.6.32-31_amd64.deb They should have the fix. OK, Maximilian. I have tested the image you offered. CIFS is still broken, bug #1626 is still present. Furthemore, this pre-release contains extremely buggy NFS support (that bugs are already fixed in 042test006.1 too). I see no reason to put this package in new minor squeeze release, because the new one is worse than the present one. Respectful, Stanislav Klinkov. -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/4d539005.9020...@yandex.ru