Bug#895381: Severity

2019-01-20 Thread micah anderson
Hello Sergio, I'm reviewing bugs that are currently release critical at our local bug squashing party, and I stumbled on yours. I'm not disputing this bug exists, I'm just trying to determine why it is you set the severity to "Serious". As you are probably aware, this severity indicates that

Bug#781685: cryptsetup: prompt for password if device exists, otherwise don't block for it to appear

2015-04-01 Thread Micah Anderson
Package: initramfs-tools Version: 0.119 Severity: wishlist I have an encrypted USB drive that is not always attached to my system. With the default cryptsetup configuration, when the system boots, it asks me for the passphrase and everything is fine. If the device is not connected, then booting

Bug#699311: [wheezy] oops when unplugged USB audio headset

2013-02-27 Thread micah anderson
Hi Jonathan, Jonathan Nieder jrnie...@gmail.com writes: severity 699311 important quit Hi Micah, micah anderson wrote: I had plugged in a USB headset and I used it for various things. At some point I decided to remove it from the computer, so I pulled it out. Immediately the system

Bug#661151: [apparmor] Bug#661151: linux-2.6: lacks AppArmor kernel/userspace interface

2012-05-30 Thread micah anderson
Hi all, Its been 2 months without a reply on this issue, and we are getting close to a freeze. Kees and John it looks like there are some pending questions for you below, it would be great if you could chime in with your opinons: If the Debian kernel team was willing to carry some kind of

Bug#674424: linux-image-3.2.0-0.bpo.2-686-pae: hangs requiring power cycle

2012-05-24 Thread Micah Anderson
Package: linux-2.6 Version: 3.2.15-1~bpo60+1 Severity: normal *** Please type your report below this line *** We are experiencing periodic lock-ups since upgrading to the latest backport kernel. Its happened two nights in a row now, and previously happened two days before. The machine is a

Re: Bug#605090: Linux 3.2 in wheezy

2012-01-31 Thread micah anderson
On Mon, 30 Jan 2012 22:26:50 +0100, Yves-Alexis Perez cor...@debian.org wrote: On lun., 2012-01-30 at 14:08 +, Ben Hutchings wrote: On Mon, 2012-01-30 at 11:05 +0100, Yves-Alexis Perez wrote: (adding few CC:s to keep track on the bug) On dim., 2012-01-29 at 21:26 +, Ben

Re: Linux 3.2 in wheezy

2012-01-31 Thread Micah Anderson
Ben Hutchings b...@decadent.org.uk writes: (See the complaints about removing OpenVZ in wheezy despite 4 years' advance notice of this.) There were complaints when this was originally decided four years ago by the kernel team. What is disturbing is that the complaints then (lxc is not even

Re: Outdated linux-2.6 backport

2012-01-23 Thread micah anderson
On Mon, 23 Jan 2012 16:30:29 +0100, Alexander Wirt formo...@formorer.de wrote: Ben Hutchings schrieb am Montag, den 23. Januar 2012: On Mon, 2012-01-23 at 08:16 +0100, Marcus Osdoba wrote: Am 18.01.2012 04:42, schrieb Ben Hutchings: cpufrequtils (007-2) A separate

Bug#638231: linux-image-2.6.32-5-686-bigmem: instability when using ext4

2011-08-17 Thread Micah Anderson
Package: linux-image-2.6.32-5-686-bigmem Version: 2.6.32-35 Severity: important Tags: squeeze I have two machines that I upgraded to squeeze and migrated their ext3 filesystems to ext4 due to very high i/o and deep directory hierarchy. These two machines have been crashing regularly since the

Bug#605090: Updated patch

2011-02-09 Thread micah anderson
On Wed, 9 Feb 2011 18:51:02 +0100, maximilian attems m...@stro.at wrote: first of all merging a patch that deviates from mainline for an eternety and shows zero interest of upstream merging is not a good candidate. You get longterm plenty of cost versus allmost no benefit.

Bug#603927: solved

2010-11-30 Thread Micah Anderson
It looks like the solution to this problem was to turn on ACPI in the BIOS, things boot fine again. Closing the bug, full details on xen-devel list. micah -- pgpvC6yiQl1QI.pgp Description: PGP signature

Bug#603927: linux-image-2.6.32-5-xen-686: booting with xen enabled fails to bring up ATA devices

2010-11-23 Thread micah anderson
Hi Ian, On Tue, 23 Nov 2010 13:23:41 +, Ian Campbell i...@hellion.org.uk wrote: I am assuming that this the same issue as you reported on xen-devel in the aic79xx failures with pvops dom0 2.6.32.25[0] / ATA driver failures with pvops dom0[1] thread recently? Indeed, I got some purchase

Bug#601625: linux-patch-debian-2.6.32: unapplying 18 fails

2010-10-27 Thread Micah Anderson
Package: linux-patch-debian-2.6.32 Version: 2.6.32-26 Severity: normal r...@cassowary:/usr/src/linux-source-2.6.32# /usr/src/kernel-patches/all/2.6.32/unpatch/debian all -- 19 fully unapplied. -- Try to unapply 18. (+) OK

Bug#570382: after upgrade: vlogin: openpty(): No such file or directory

2010-08-24 Thread micah anderson
On Mon, 23 Aug 2010 21:56:17 +0200 (CEST), Tomas Pospisek t...@sourcepole.ch wrote: On a different note: the last update to the most recent DSA kernels [2] went completely smoothly - that is all vservers restarted without a hickup. Makes me wonder if that was caused by a change in the

Bug#570382: after upgrade: vlogin: openpty(): No such file or directory]

2010-05-10 Thread micah anderson
I can confirm that this manifested with the 2.6.26-21lenny3 security upgrade in Feburary (DSA-1996). It seems like what happens is when the system boots, it runs the /etc/init.d/util-vserver script, which attempts to automatically start all the guests which have the 'default' mark. Sometimes

Bug#576838: KVM: networking stack tanks after page allocation failure

2010-04-25 Thread micah anderson
On Sat, 10 Apr 2010 11:13:11 -0400, micah anderson mi...@debian.org wrote: On Sat, 10 Apr 2010 12:17:51 +0100, Ben Hutchings b...@decadent.org.uk wrote: On Fri, 2010-04-09 at 23:38 -0400, micah anderson wrote: On Sat, 10 Apr 2010 01:48:24 +0100, Ben Hutchings b...@decadent.org.uk wrote

Bug#576838: KVM: networking stack tanks after page allocation failure

2010-04-10 Thread micah anderson
On Sat, 10 Apr 2010 12:17:51 +0100, Ben Hutchings b...@decadent.org.uk wrote: On Fri, 2010-04-09 at 23:38 -0400, micah anderson wrote: On Sat, 10 Apr 2010 01:48:24 +0100, Ben Hutchings b...@decadent.org.uk wrote: On Thu, 2010-04-08 at 12:41 -0400, micah anderson wrote: On 2010-04-08

Bug#576838: KVM: networking stack tanks after page allocation failure

2010-04-09 Thread micah anderson
On Sat, 10 Apr 2010 01:48:24 +0100, Ben Hutchings b...@decadent.org.uk wrote: On Thu, 2010-04-08 at 12:41 -0400, micah anderson wrote: On 2010-04-08, micah anderson wrote: On Wed, 2010-04-07 at 11:52 -0400, Micah Anderson wrote: Package: linux-image-2.6.32-2-amd64 Version: 2.6.32-8

Bug#576838: KVM: networking stack tanks after page allocation failure

2010-04-08 Thread micah anderson
On 2010-04-08, micah anderson wrote: On Wed, 2010-04-07 at 11:52 -0400, Micah Anderson wrote: Package: linux-image-2.6.32-2-amd64 Version: 2.6.32-8~bpo50+1 Severity: important I'm running a tor exit node on a kvm instance, it runs for a little while (between an hour and 3 days

Bug#576838: KVM: networking stack tanks after page allocation failure

2010-04-07 Thread Micah Anderson
Package: linux-image-2.6.32-2-amd64 Version: 2.6.32-8~bpo50+1 Severity: important I'm running a tor exit node on a kvm instance, it runs for a little while (between an hour and 3 days), doing 30-40mbit/sec and then suddenly 'swapper: page allocation failure' happens, and the entire networking

Bug#504805: anoher iret exception

2009-11-27 Thread micah anderson
[136556.763720] iret exception: [#1] SMP [136556.763803] Modules linked in: xt_tcpudp xt_physdev iptable_filter ip_tables x_tables tun netloop bridge ipv6 loop serio_raw psmouse container pcspkr button i2c_i801 intel_rng i2c_core rng_core shpchp e7xxx_edac pci_hotplug edac_core joydev evdev

Bug#504805: some more crash logs

2009-11-25 Thread micah anderson
Excerpts from micah anderson's message of Tue Nov 24 20:20:51 -0500 2009: Excerpts from Ben Hutchings's message of Tue Nov 24 18:51:45 -0500 2009: On Tue, 2009-11-24 at 18:17 -0500, micah anderson wrote: I keep getting them, so I'll keep sending them: Which kernel version are you using

Bug#504805: some more crash logs

2009-11-24 Thread micah anderson
I keep getting them, so I'll keep sending them: [366904.120247] iret exception: [#1] SMP [366904.120332] Modules linked in: xt_tcpudp xt_physdev iptable_filter ip_tables x_tables tun netloop bridge ipv6 loop serio_raw i2c_i801 psmouse intel_rng rng_core i2c_core pcspkr container button

Bug#504805: some more crash logs

2009-11-24 Thread micah anderson
Excerpts from Ben Hutchings's message of Tue Nov 24 18:51:45 -0500 2009: On Tue, 2009-11-24 at 18:17 -0500, micah anderson wrote: I keep getting them, so I'll keep sending them: Which kernel version are you using? Version 2.6.26-20 in stable-proposed-updates fixes a crash bug

Bug#504805: Changed hardware, still happening

2009-11-19 Thread micah anderson
Hi, Yesterday we completely swapped the entire machine, where this was happening, with another identical machine. We just took the disks out of the one that had been crashing and put them into this other machine. Today, on the new hardware, it crashed again: [64631.057499] iret exception:

Bug#504805: Another crash

2009-11-15 Thread micah anderson
(XEN) domain_crash_sync called from entry.S (ff188600) (XEN) Domain 0 (vcpu#1) crashed on cpu#0: (XEN) [ Xen-3.2-1 x86_32p debug=n Not tainted ] (XEN) CPU:0 (XEN) EIP:0061:[c01013a7] (XEN) EFLAGS: 0246 CONTEXT: guest (XEN) eax: ebx: 0001 ecx:

Bug#504805: and another....

2009-11-07 Thread Micah Anderson
Can I provide more information, or is there anything else I can do to help fix this? (XEN) domain_crash_sync called from entry.S (ff188600) (XEN) Domain 0 (vcpu#0) crashed on cpu#0: (XEN) [ Xen-3.2-1 x86_32p debug=n Not tainted ] (XEN) CPU:0 (XEN) EIP:0061:[c01013a7] (XEN)

Bug#504805: more information about this problem

2009-11-03 Thread Micah Anderson
And another crash today, slightly different: (XEN) domain_crash_sync called from entry.S (ff188600) (XEN) Domain 0 (vcpu#1) crashed on cpu#1: (XEN) [ Xen-3.2-1 x86_32p debug=n Not tainted ] (XEN) CPU:1 (XEN) EIP:0061:[c01013a7] (XEN) EFLAGS: 0246 CONTEXT: guest (XEN)

Bug#504805: more information about this problem

2009-11-02 Thread Micah Anderson
I too have been a victim of this problem, on a number of machines. I fed the lines into addr2line -e vmlinux after rebuilding the kernel with this flavor to get the vmlinux. This looks clearly like a xen bug, the kernel does some I/O, which gets queued, but for some reason the request causes a

Bug#544756: [Secure-testing-team] Bug#544756: linux-image-2.6.26-2-686: Kernel still vulnerable by dsa-1862

2009-09-03 Thread Micah Anderson
* Christoph Siess c...@geekhost.info [2009-09-02 14:57-0400]: Package: linux-image-2.6.26-2-686 Version: 2.6.26-17lenny2 Severity: critical Tags: security Justification: root security hole Hi, according to http://www.debian.org/security/2009/dsa-1862 this Version of the 2.6.26-2

Re: Stable Linux-Vserver patch plans

2009-06-29 Thread Micah Anderson
Micah Anderson mi...@riseup.net writes: I wanted to start a discussion about the plans for the stable kernel in the next point release, specifically where it relates to the Linux-Vserver patch-set. *taps microphone* So... one month went by since I sent this message, the new stable release

Stable Linux-Vserver patch plans

2009-05-27 Thread Micah Anderson
Hi, I wanted to start a discussion about the plans for the stable kernel in the next point release, specifically where it relates to the Linux-Vserver patch-set. As we all know, the 2.6.26 kernel is the version that Lenny ended up with and the Linux-Vserver patch that was under development

Bug#517449: Experiencing this problem also

2009-03-30 Thread Micah Anderson
I experienced this problem on a machine with 12gigs of memory when I added a failed disk back into a mdadm array, output included below. The machine basically was totally frozen for 10 minutes or so until the raid array finished its sync, and then everything returned to normal. Pretty ugly, would

Re: Scheduling linux-2.6 2.6.26-3

2008-08-25 Thread Micah Anderson
a release exception to sync these up: * Micah Anderson [EMAIL PROTECTED] [2008-08-21 15:31-0400]: * dann frazier [EMAIL PROTECTED] [2008-08-21 10:51-0400]: On Thu, Aug 21, 2008 at 01:43:44PM -0400, Micah Anderson wrote: * dann frazier [EMAIL PROTECTED] [2008-08-20 17:59-0400]: This is a user

Re: Scheduling linux-2.6 2.6.26-3

2008-08-21 Thread Micah Anderson
* dann frazier [EMAIL PROTECTED] [2008-08-20 17:59-0400]: On Mon, Aug 18, 2008 at 02:40:41AM -0600, dann frazier wrote: On Fri, Aug 15, 2008 at 09:51:33PM +0200, Bastian Blank wrote: Hi folks I'd like to schedule the upload of linux-2.6 2.6.26-3 for monday. The following things

Re: Bug#495009: closed by Bastian Blank wa...@debian.org (Re: Bug#495009: please update vserver patch and re enable it)

2008-08-16 Thread Micah Anderson
maximilian attems [EMAIL PROTECTED] writes: Hi all, On Thu, Aug 14, 2008 at 12:30:05PM +0300, Arturas K. wrote: * I know you guys are busy - so am I, but I am eager to try and help on this particular feature. please stop waffling. if you checked current sid repo you'd see that waldi

Bug#489387: vserver patch available for 2.6.26

2008-08-14 Thread Micah Anderson
* Micah Anderson [EMAIL PROTECTED] [2008-08-13 16:26-0400]: There is a working patch available as of yesterday for 2.6.25 and 2.6.25.2 which fixes both ext4 and xfs. It has had the 'dontuse' flag removed and is considered pre5. Err, my mistake, I meant to write 2.6.26 and 2.6.26.2 here

Bug#489387: vserver patch available for 2.6.26

2008-08-13 Thread Micah Anderson
There is a working patch available as of yesterday for 2.6.25 and 2.6.25.2 which fixes both ext4 and xfs. It has had the 'dontuse' flag removed and is considered pre5. micah signature.asc Description: Digital signature

Re: Bug#489387: Please do not replace vserver with openvz.

2008-08-12 Thread Micah Anderson
Bastian Blank [EMAIL PROTECTED] writes: On Fri, Aug 08, 2008 at 04:42:03PM -0500, William Pitcock wrote: It appears the plan is to drop vserver in favour of openvz, offering openvz as an alternative and perhaps default is a good option, but please do not remove vservers, as there are real

Bug#357545: linux-source-2.6.15: local redeclaration of name_to_dev_t in drivers/mtd/devices/blkmtd.c

2006-03-17 Thread Micah Anderson
Package: linux-source-2.6.15 Version: 2.6.15-8 Severity: normal Tags: patch There is a local redeclaration of name_to_dev_t in drivers/mtd/devices/blkmtd.c:617 which is inconsistant with the function in mount.h. The way to fix this would be to remove the declaration and include the mount.h as

Re: automatic custom kernels?

2005-12-05 Thread Micah Anderson
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Andreas Barth wrote: I usually want to have some flavoured kernels, i.e. they should contain certain (custom) patches. Now, there are the official source packages, and of course binaries from them. However, if I need my own kernel, it takes some

Bug#332381: This problem has broader implications

2005-11-27 Thread Micah Anderson
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Although the original report says, After 250 days, the jiffies overflow and ipt_recent do not work anymore and is for 2.4, I've actually found that the code included in 2.6.8 (and probably any kernel version that includes ipt_recent) causes

Re: [Secure-testing-team] DTSA for 2.6.8 and 2.4.27

2005-09-09 Thread Micah Anderson
Moritz Muehlenhoff schrieb am Friday, den 09. September 2005: Micah Anderson wrote: Neither of these advisories is a typical DTSA, as we normally we only do advisories for things that are blocked from reaching testing by some other issue, but I think that it would be good to do these two

Re: DTSA for 2.6.8 and 2.4.27

2005-09-09 Thread Micah Anderson
Horms schrieb am Friday, den 09. September 2005: On Thu, Sep 08, 2005 at 09:17:25PM -0500, Micah Anderson wrote: Hi, I think it would be a good idea to get a DTSA (Debian Testing Security Advisory) issued for 2.4.27 and 2.6.8. That seems fine to me, at a glance. Though there have

DTSA for 2.6.8 and 2.4.27

2005-09-08 Thread Micah Anderson
Hi, I think it would be a good idea to get a DTSA (Debian Testing Security Advisory) issued for 2.4.27 and 2.6.8. 2.4.27-11 is already in testing, but the number of security bugs fixed in this version is significant: there are 9 CAN numbers for 2.4.27-11[1]; and 4 other security patches that do

Bug#319629: [CAN-2005-1768]: Race condition in ia32 compatability code for execve causes local DoS

2005-07-23 Thread Micah Anderson
Package: kernel-source-2.4.27 Version: 2.4.27-10 Severity: normal Tags: security http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1768 reads: Race condition in the ia32 compatibility code for the execve system call in Linux kernel 2.4 before 2.4.31 and 2.6 before 2.6.6 allows local

Bug#303424: kernel-source-2.6.8: spinlock assert can crash kernel when compiled with up/spinlock_debug

2005-04-06 Thread Micah Anderson
Package: kernel-source-2.6.8 Version: 2.6.8-15 Severity: normal Tags: patch If you set in the config CONFIG_DEBUG_SPINLOCK=y and have CONFIG_SMP=n then the various spinlock checks in the kernel can cause the kernel to crash, an example of one of these spinlock checks is the code:

Bug#303426: kernel-source-2.6.8: ext3 xattr/dquot reports incorrect quota

2005-04-06 Thread Micah Anderson
Package: kernel-source-2.6.8 Version: 2.6.8-15 Severity: normal Tags: patch There is a subtle bug in error handling of ext2 and ext3 xattrs. When ext2_sync_inode() or ext3_xattr_block_set() fails because it could not write the inode's dirty data (ENOSPC), it doesn't keep the xattrs in a

Bug#300162: [CAN-2004-1191]: Improper command checking for CDs, allowing local users to conduct unauthorized writes to firmware

2005-03-17 Thread Micah Anderson
Package: kernel-source-2.6.8 Version: 2.6.8-14 Severity: normal Tags: security patch Hello, CAN-2004-1190 reads: SUSE Linux before 9.1 and SUSE Linux Enterprise Server before 9 do not properly check commands sent to CD devices that have been opened read-only, which could allow local users to

Bug#300163: [CAN-2004-1191]: Race condition could allow local users to read unauthorized memory from foreign memory pages.

2005-03-17 Thread Micah Anderson
Package: kernel-source-2.6.8 Version: 2.6.8-14 Severity: normal Tags: security patch CAN-2004-1191 reads: Race condition ... when run on SMP systems that have more than 4GB of memory, could allow local users to read unauthorized memory from foreign memory pages. Apparantly it also allows remote

Bug#296700: Suspect this is in 2.6.10 as well

2005-02-28 Thread Micah Anderson
is the thread for reference: http://groups-beta.google.com/group/linux.kernel/browse_thread/thread/1fd2bd7a57fac50c/197ace52b8cf3b8b Thanks, micah On Thu, 24 Feb 2005, Horms wrote: On Thu, Feb 24, 2005 at 12:43:14AM -0600, Micah Anderson wrote: I looked over the 2.6.10 changelogs and do not see

Bug#296700: [CAN-2005-0204]: AMD64, allows local users to write to privileged IO ports via OUTS instruction

2005-02-23 Thread Micah Anderson
Package: kernel-source-2.6.8 Version: 2.6.8-13 Severity: normal Tags: security patch Hello, CAN-2005-0204 reads: Linux kernel before 2.6.9, when running on the AMD64 and Intel EM64T architectures, allows local users to write to privileged IO ports via the OUTS instruction. Although this says

Bug#296700: Suspect this is in 2.6.10 as well

2005-02-23 Thread Micah Anderson
I looked over the 2.6.10 changelogs and do not see this being either fixed, or that particular file being changed. Although I do see that it has changed slightly, the piece that is replaced in this patch is not replaced here. As a result, I am not able to determine myself if 2.6.10 is also