kernel-image-2.6.8-amd64_2.6.8-14_i386.changes ACCEPTED
Accepted: kernel-headers-2.6.8-11-amd64-generic_2.6.8-14_i386.deb to pool/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-generic_2.6.8-14_i386.deb kernel-headers-2.6.8-11-amd64-k8-smp_2.6.8-14_i386.deb to pool/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-k8-smp_2.6.8-14_i386.deb kernel-headers-2.6.8-11-amd64-k8_2.6.8-14_i386.deb to pool/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-k8_2.6.8-14_i386.deb kernel-headers-2.6.8-11-em64t-p4-smp_2.6.8-14_i386.deb to pool/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-em64t-p4-smp_2.6.8-14_i386.deb kernel-headers-2.6.8-11-em64t-p4_2.6.8-14_i386.deb to pool/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-em64t-p4_2.6.8-14_i386.deb kernel-headers-2.6.8-11_2.6.8-14_i386.deb to pool/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11_2.6.8-14_i386.deb kernel-image-2.6.8-11-amd64-generic_2.6.8-14_i386.deb to pool/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-generic_2.6.8-14_i386.deb kernel-image-2.6.8-11-amd64-k8-smp_2.6.8-14_i386.deb to pool/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-k8-smp_2.6.8-14_i386.deb kernel-image-2.6.8-11-amd64-k8_2.6.8-14_i386.deb to pool/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-k8_2.6.8-14_i386.deb kernel-image-2.6.8-11-em64t-p4-smp_2.6.8-14_i386.deb to pool/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-em64t-p4-smp_2.6.8-14_i386.deb kernel-image-2.6.8-11-em64t-p4_2.6.8-14_i386.deb to pool/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-em64t-p4_2.6.8-14_i386.deb kernel-image-2.6.8-amd64_2.6.8-14.dsc to pool/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-amd64_2.6.8-14.dsc kernel-image-2.6.8-amd64_2.6.8-14.tar.gz to pool/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-amd64_2.6.8-14.tar.gz Announcing to debian-devel-changes@lists.debian.org Thank you for your contribution to Debian. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Processing of kernel-image-2.6.8-amd64_2.6.8-14_i386.changes
kernel-image-2.6.8-amd64_2.6.8-14_i386.changes uploaded successfully to localhost along with the files: kernel-image-2.6.8-amd64_2.6.8-14.dsc kernel-image-2.6.8-amd64_2.6.8-14.tar.gz kernel-headers-2.6.8-11_2.6.8-14_i386.deb kernel-headers-2.6.8-11-amd64-k8-smp_2.6.8-14_i386.deb kernel-image-2.6.8-11-amd64-k8-smp_2.6.8-14_i386.deb kernel-headers-2.6.8-11-em64t-p4_2.6.8-14_i386.deb kernel-image-2.6.8-11-em64t-p4_2.6.8-14_i386.deb kernel-headers-2.6.8-11-amd64-generic_2.6.8-14_i386.deb kernel-image-2.6.8-11-amd64-generic_2.6.8-14_i386.deb kernel-headers-2.6.8-11-amd64-k8_2.6.8-14_i386.deb kernel-image-2.6.8-11-amd64-k8_2.6.8-14_i386.deb kernel-headers-2.6.8-11-em64t-p4-smp_2.6.8-14_i386.deb kernel-image-2.6.8-11-em64t-p4-smp_2.6.8-14_i386.deb Greetings, Your Debian queue daemon -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: kernel updates accepted for sarge
On Mon, 2005-05-30 at 20:49 -0700, Steve Langasek wrote: > On Mon, May 30, 2005 at 06:17:57PM -0600, dann frazier wrote: > > On Mon, 2005-05-30 at 18:45 +0200, Frederik Schueler wrote: > > > Hello, > > > > On Sat, May 28, 2005 at 09:57:52PM -0700, Steve Langasek wrote: > > > > If there are updates to unstable pending for any other architectures, > > > > please > > > > let debian-release know. > > > > I am preparing an upload of kernel-image-2.6.8-amd64 version 2.6.8-14, > > > wich contains all current security updates. > > > > I'll notice you again as soon as my sponsor has done the upload. > > > I've just completed a sponsored upload of Frederik's changes. > > I don't see any sign of this upload. My bad - I didn't notice this error: [ Uploading job kernel-image-2.6.8-amd64_2.6.8-14_i386 kernel-headers-2.6.8-11-amd64-k8_2.6.8-14_i386.deb 217.9 kBdupload fatal error: Can't upload kernel-headers-2.6.8-11-amd64-k8_2.6.8-14_i386.deb: Illegal PORT command. at /usr/bin/dupload line 506 I ran it again, and it completed successfully this time. -- dann frazier <[EMAIL PROTECTED]> -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#308584: kernel-source-2.4.27: missing sysctl slot for ia64 results in local DoS
On Mon, May 30, 2005 at 04:33:02PM -0600, dann frazier wrote: > On Mon, 2005-05-30 at 02:00 -0600, dann frazier wrote: > > I think the best solution at this point is to build a > > kernel-patch-2.4.27-ia64 (2.4.27-4) that reverts this change and prepare > > a kernel-image along with it, therefore requiring no changes to > > kernel-source-2.4.27. What do you think? > > > > Release Team: If I get these 2 builds into sid can we move these into > > sarge with the other kernel updates? > > I've uploaded kernel-patch-2.4.27-ia64 (2.4.27-4) and > kernel-image-2.4.27-ia64 (2.4.27-10) to sid with only the changes > described below - please approve both for sarge. > > kernel-patch-2.4.27-ia64 (2.4.27-4) unstable; urgency=medium > . >* remove-syscall-slot.patch: Revert the fix for CAN-2005-0137. This was > added into kernel-source-2.4.27 (2.4.27-10). Version the build-depend to > match. > kernel-image-2.4.27-ia64 (2.4.27-10) unstable; urgency=medium > . >* Rebuild against kernel-tree-2.4.27-10 and > kernel-patch-2.4.27-ia64 (2.4.27-4) Hi Dann, If you want to merge those changes into kernel-source-2.4.27 (obviously for a future, non-sarge r0 release) please feel free to do so. -- Horms -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: draft of DebConf5 debian-kernel paper
On Mon, May 30, 2005 at 08:06:42AM -0600, dann frazier wrote: >hey, > I posted a draft of a paper for DebConf here: > http://people.debian.org/~dannf/debconf5/ > > If you have time in the next couple of days, please take a look and >tell me where I went wrong :) I tried to talk about both day-to-day >type tasks, as well as some history and some notable stuff happening on >the list lately (kernel freeze, ABI issues, unified source package, >security support, firmware redistributability, etc). > > I'm very open to changes - new topics included. I think a number of >people on this list will be there - if you'd like to co-present on one >of these topics (or one I didn't mention), let me know. I would like to see a section about joining the debian-kernel team and how to help. Horms allowed me to see what he usually does as part of his debian-kernel work after his presentation during linux.conf.au. It was very important to me, however, I'm still learning how to help effectively. So far, I'm following the lkm and the debian-kernel list. Maybe we could have a BOF/tutorial about all that. >Horms: I listed you as an author in this draft because I stole some >content directly from a couple of your .au slides; let me know if you'd >prefer I didn't. I think you should change the pronoum "I" to either your own name or horms' name. It may not be a problem for people who already know who is doing what. But, for some people at debconf it may be unclear. >-- >dann frazier <[EMAIL PROTECTED]> Anibal Monsalve Salazar -- .''`. Debian GNU/Linux : :' : Free Operating System `. `' http://debian.org/ `- http://v7w.com/anibal signature.asc Description: Digital signature
Re: Kernel Modules for PE2850 in default i386 2.6 kernel builds.
On Mon, May 30, 2005 at 08:05:33PM +0200, Achim Bohnet wrote: > On Monday 30 May 2005 04:01, Horms wrote: > > On Fri, May 27, 2005 at 09:13:00PM -0400, Satadru Pramanik wrote: > > > I'm more than willing to test some images out. > > > > > > Thanks. > > > > > > satadru > > > > I have put the images and source up at http://debian.vergenet.net/testing/ > > The debian version is 5.hls.2005052700 > > Hi Horms, > > Installed and rebooted the new kernel 2.6.11-1-686-smp_2.6.11-5.hls.2005052700 > without problems. Thx! Thanks. For the record, I added a patch (from the nice people at Ubuntu) that moves the old driver to megaraidlegacy - normally if you have the newgen driver you loose the old driver. The legacy driver has also been patched not to support cards that are supported by the new gen driver. I think this means that a handful of older cards now need to use megaraidlegacy (in practice I am not sure if there are any debian people out there with such cards) and everyone else will use new gen - so hopefully it works :) -- Horms -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: kernel updates accepted for sarge
On Mon, May 30, 2005 at 06:17:57PM -0600, dann frazier wrote: > On Mon, 2005-05-30 at 18:45 +0200, Frederik Schueler wrote: > > Hello, > > On Sat, May 28, 2005 at 09:57:52PM -0700, Steve Langasek wrote: > > > If there are updates to unstable pending for any other architectures, > > > please > > > let debian-release know. > > I am preparing an upload of kernel-image-2.6.8-amd64 version 2.6.8-14, > > wich contains all current security updates. > > I'll notice you again as soon as my sponsor has done the upload. > I've just completed a sponsored upload of Frederik's changes. I don't see any sign of this upload. -- Steve Langasek postmodern programmer signature.asc Description: Digital signature
Bug#308584: kernel-source-2.4.27: missing sysctl slot for ia64 results in local DoS
On Mon, May 30, 2005 at 04:33:02PM -0600, dann frazier wrote: > On Mon, 2005-05-30 at 02:00 -0600, dann frazier wrote: > > I think the best solution at this point is to build a > > kernel-patch-2.4.27-ia64 (2.4.27-4) that reverts this change and prepare > > a kernel-image along with it, therefore requiring no changes to > > kernel-source-2.4.27. What do you think? > > Release Team: If I get these 2 builds into sid can we move these into > > sarge with the other kernel updates? > I've uploaded kernel-patch-2.4.27-ia64 (2.4.27-4) and > kernel-image-2.4.27-ia64 (2.4.27-10) to sid with only the changes > described below - please approve both for sarge. > kernel-patch-2.4.27-ia64 (2.4.27-4) unstable; urgency=medium > . >* remove-syscall-slot.patch: Revert the fix for CAN-2005-0137. This was > added into kernel-source-2.4.27 (2.4.27-10). Version the build-depend to > match. > kernel-image-2.4.27-ia64 (2.4.27-10) unstable; urgency=medium > . >* Rebuild against kernel-tree-2.4.27-10 and > kernel-patch-2.4.27-ia64 (2.4.27-4) Approved. urgency=medium pushes the limit; I'll probably push this in later in the week if it still looks ok then. -- Steve Langasek postmodern programmer signature.asc Description: Digital signature
Re: kernel updates accepted for sarge
On Mon, 2005-05-30 at 18:45 +0200, Frederik Schueler wrote: > Hello, > > On Sat, May 28, 2005 at 09:57:52PM -0700, Steve Langasek wrote: > > If there are updates to unstable pending for any other architectures, please > > let debian-release know. > > I am preparing an upload of kernel-image-2.6.8-amd64 version 2.6.8-14, > wich contains all current security updates. > > I'll notice you again as soon as my sponsor has done the upload. I've just completed a sponsored upload of Frederik's changes. -- dann frazier <[EMAIL PROTECTED]> -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: kernel updates accepted for sarge
On Mon, May 30, 2005 at 06:34:20PM +0200, Norbert Tretkowski wrote: > * Norbert Tretkowski wrote: > > * Steve Langasek wrote: > > > If there are updates to unstable pending for any other > > > architectures, please let debian-release know. > > I'm currently compiling updates for alpha 2.4 and 2.6 kernels, > > upload tomorrow. > Uploaded, please approve for sarge. Approved. Thanks, -- Steve Langasek postmodern programmer -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#308584: kernel-source-2.4.27: missing sysctl slot for ia64 results in local DoS
On Mon, 2005-05-30 at 02:00 -0600, dann frazier wrote: > I think the best solution at this point is to build a > kernel-patch-2.4.27-ia64 (2.4.27-4) that reverts this change and prepare > a kernel-image along with it, therefore requiring no changes to > kernel-source-2.4.27. What do you think? > > Release Team: If I get these 2 builds into sid can we move these into > sarge with the other kernel updates? I've uploaded kernel-patch-2.4.27-ia64 (2.4.27-4) and kernel-image-2.4.27-ia64 (2.4.27-10) to sid with only the changes described below - please approve both for sarge. kernel-patch-2.4.27-ia64 (2.4.27-4) unstable; urgency=medium . * remove-syscall-slot.patch: Revert the fix for CAN-2005-0137. This was added into kernel-source-2.4.27 (2.4.27-10). Version the build-depend to match. kernel-image-2.4.27-ia64 (2.4.27-10) unstable; urgency=medium . * Rebuild against kernel-tree-2.4.27-10 and kernel-patch-2.4.27-ia64 (2.4.27-4) -- dann frazier <[EMAIL PROTECTED]> -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#311273: kernel-image-2.6.11-9-amd64-k8: Please configure Security Capatibilities as module
Hello, On Mon, May 30, 2005 at 11:54:24PM +0200, maximilian attems wrote: > > The security capatibilities are not configured as module. > > agreed, that opens security problems. Well, it is built in to _prevent_ security problems, like http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1337 This bug is fixed in 2.6.11, though. I opt for SECURITY_CAPABILITIES=y in the common arch config. Kind regards Frederik Schueler -- ENOSIG signature.asc Description: Digital signature
Re: draft of DebConf5 debian-kernel paper
On Mon, 30 May 2005, maximilian attems wrote: > On Mon, 30 May 2005, dann frazier wrote: > > I'm very open to changes - new topics included. I think a number of > > people on this list will be there - if you'd like to co-present on one > > of these topics (or one I didn't mention), let me know. > > please mention the ongoing work of jbailey concerning > the replacement of the initrd-tools by initramfs. forgot the url http://www.ubuntulinux.org/wiki/Initramfs -- maks -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#308584: kernel-source-2.4.27: missing sysctl slot for ia64 results in local DoS
On Mon, May 30, 2005 at 02:00:13AM -0600, dann frazier wrote: > On Mon, 2005-05-30 at 00:22 -0600, dann frazier wrote: > > On Wed, 2005-05-11 at 18:30 +0900, Horms wrote: > > > Package: kernel-source-2.4.27 > > > Version: 2.4.27-10 > > > Severity: important > > > Tags: patch, security, pending > > > I got this from Moritz Muehlenhoff <[EMAIL PROTECTED]>: > > >http://www.redhat.com/support/errata/RHSA-2005-284.html This is > > >CAN-2005-0137 : Linux kernel 2.6 on Itanium (ia64) architectures > > >allows local users to cause a denial of service via a "missing > > >Itanium syscall table entry." > > > On investigation I found that > > >2.4.27 is vulnerable to this. 2.6.8 and 2.6.11 are not. > > >The bug has been fixed upstream for both 2.4 and 2.6 and > > >I have put a this patch into SVN for 2.4.27 > > Actually, this fix is already in kernel-patch-2.4.27-ia64 (2.4.27-3). > > It was included when I resync'd with upstream; I didn't include a > > reference in the changelog because I was unsure if the CAN ID was public > > yet. > > kernel-patch-2.4.27-ia64 has already made its way into sarge, and: > > anyway, yeah, 2.4 kernels are also being synced up; I've already > > approved 2.4.27-8 in for ia64 > > 2.4.27-8 was built against -3, so it sounds like this fix should already > > be going in. > Testing a build against 2.4.27-10, I noticed that both patches will > apply. Since they both add a syscall slot, we silently get one extra > syscall slot :/ I'm unsure how severe of a problem this is - but I fear > it may introduce a DoS vector of its own. > I think the best solution at this point is to build a > kernel-patch-2.4.27-ia64 (2.4.27-4) that reverts this change and prepare > a kernel-image along with it, therefore requiring no changes to > kernel-source-2.4.27. What do you think? > Release Team: If I get these 2 builds into sid can we move these into > sarge with the other kernel updates? Yes. Thanks, -- Steve Langasek postmodern programmer
Bug#311221: Zaurus no longer connects
tags 311221 moreinfo thanks On Sun, 29 May 2005, Adam Majer wrote: > Package: kernel-source-2.6.11 > Version: 2.6.11-5 > Severity: normal > > After upgrading the kernel to 2.6.11-5 version, Zaurus (OpenZaurus) > can no longer connect via USB, please send full dmesg for that kernel. > usb 3-2: new full speed USB device using uhci_hcd and address 3 > usb 3-2: device descriptor read/64, error -32 > usb 3-2: device descriptor read/64, error -32 > usb 3-2: new full speed USB device using uhci_hcd and address 4 > usb 3-2: device descriptor read/64, error -32 > usb 3-2: device descriptor read/64, error -32 > > It works with 2.6.10 kernel as well as earlier versions of the 2.6.11. please send working 2.6.11 dmesg. you find the older debian package at snapshot.debian.net thanks. -- maks -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#311210: marked as done (kernel-image-2.6.11-i386: Please add RF Monitor mode for orinoco_cs drivers)
Your message dated Tue, 31 May 2005 00:00:42 +0200 with message-id <[EMAIL PROTECTED]> and subject line Bug#311210: kernel-image-2.6.11-i386: Please add RF Monitor mode for orinoco_cs drivers has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -- Received: (at maintonly) by bugs.debian.org; 29 May 2005 20:14:47 + >From [EMAIL PROTECTED] Sun May 29 13:14:47 2005 Return-path: <[EMAIL PROTECTED]> Received: from smtp104.rog.mail.re2.yahoo.com [206.190.36.82] by spohr.debian.org with smtp (Exim 3.35 1 (Debian)) id 1DcUBK-00076o-00; Sun, 29 May 2005 13:14:47 -0700 Received: from unknown (HELO alps.law.yi.org) ([EMAIL PROTECTED] with login) by smtp104.rog.mail.re2.yahoo.com with SMTP; 29 May 2005 20:14:16 - Received: from sfllaw by alps.law.yi.org with local (Exim 3.35 #1 (Debian)) id 1DcUAm-0004ZB-00; Sun, 29 May 2005 16:14:12 -0400 Date: Sun, 29 May 2005 16:14:12 -0400 From: Simon Law <[EMAIL PROTECTED]> To: Debian Bug Tracking System <[EMAIL PROTECTED]> Subject: kernel-image-2.6.11-i386: Please add RF Monitor mode for orinoco_cs drivers Message-ID: <[EMAIL PROTECTED]> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline X-Reportbug-Version: 1.50 User-Agent: Mutt/1.5.6+20040907i Sender: Simon Law <[EMAIL PROTECTED]> Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: Package: kernel-image-2.6.11-i386 Version: N/A; reported 2005-05-29 Severity: wishlist Please add the RF Monitor patches for the Orinoco wireless drivers. It would make life more pleasant if you did, because then I'd be able to find local access points without having to rebuild the kernel. This functionality is there for most other drivers, but it won't land in 2.6 for a very long time. *sigh* You can find a patch for 2.6.11 at http://www.kismetwireless.net/download.shtml#orinoco2611 Previous versions are also available on that page. Thanks, Simon -- System Information Debian Release: 3.0 Architecture: i386 Kernel: Linux alps 2.4.18-1-686 #1 Wed Apr 14 18:20:10 UTC 2004 i686 Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 --- Received: (at 311210-done) by bugs.debian.org; 30 May 2005 22:01:15 + >From [EMAIL PROTECTED] Mon May 30 15:01:15 2005 Return-path: <[EMAIL PROTECTED]> Received: from baikonur.stro.at [213.239.196.228] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1DcsJv-0006Z8-00; Mon, 30 May 2005 15:01:15 -0700 Received: from sputnik (stallburg.stro.at [128.131.216.190]) by baikonur.stro.at (Postfix) with ESMTP id 3389E5C011 for <[EMAIL PROTECTED]>; Tue, 31 May 2005 00:00:40 +0200 (CEST) Received: from max by sputnik with local (Exim 4.50) id 1DcsJO-0002dm-CO for [EMAIL PROTECTED]; Tue, 31 May 2005 00:00:42 +0200 Date: Tue, 31 May 2005 00:00:42 +0200 From: maximilian attems <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] Subject: Re: Bug#311210: kernel-image-2.6.11-i386: Please add RF Monitor mode for orinoco_cs drivers Message-ID: <[EMAIL PROTECTED]> References: <[EMAIL PROTECTED]> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <[EMAIL PROTECTED]> User-Agent: Mutt/1.5.9i X-Virus-Scanned: by Amavis (ClamAV) at stro.at Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: On Sun, 29 May 2005, Simon Law wrote: > Package: kernel-image-2.6.11-i386 > Version: N/A; reported 2005-05-29 > Severity: wishlist > > Please add the RF Monitor patches for the Orinoco wireless drivers. It > would make life more pleasant if you did, because then I'd be able to > find local access points without having to rebuild the kernel. > > This functionality is there for most other drivers, but it won't land in > 2.6 for a very long time. *sigh* some orinoco patches landed some time ago for 2.6.12, please push upstream authors to submit also those. > You can find a patch for 2.6.11 at > http://www.kismetwireless.net/download.shtml#orinoco2611 > Previous versions are
Processed: Re: Bug#311221: Zaurus no longer connects
Processing commands for [EMAIL PROTECTED]: > tags 311221 moreinfo Bug#311221: Zaurus no longer connects There were no tags set. Tags added: moreinfo > thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#311273: kernel-image-2.6.11-9-amd64-k8: Please configure Security Capatibilities as module
retitle 311273 please set CONFIG_SECURITY_CAPABILITIES on common arch config reassign 311273 kernel thanks On Mon, 30 May 2005, Romain Chantereau wrote: > Hi ! > > It is impossible to compile the realtime security module with the actual > kernel configuration. this module is rejected upstream. > The security capatibilities are not configured as module. agreed, that opens security problems. > Please setup this option as a module permitting building realtime-lsm. we do not care, as this should be done through pam with the merged efforts for 2.6.12 -- maks -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Processed: Re: Bug#311273: kernel-image-2.6.11-9-amd64-k8: Please configure Security Capatibilities as module
Processing commands for [EMAIL PROTECTED]: > retitle 311273 please set CONFIG_SECURITY_CAPABILITIES on common arch config Bug#311273: kernel-image-2.6.11-9-amd64-k8: Please configure Security Capatibilities as module Changed Bug title. > reassign 311273 kernel Bug#311273: please set CONFIG_SECURITY_CAPABILITIES on common arch config Bug reassigned from package `kernel-image-2.6.11-9-amd64-k8' to `kernel'. > thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
kernel-image-2.4.27-ia64_2.4.27-10_ia64.changes ACCEPTED
Accepted: kernel-build-2.4.27-2_2.4.27-10_ia64.deb to pool/main/k/kernel-image-2.4.27-ia64/kernel-build-2.4.27-2_2.4.27-10_ia64.deb kernel-headers-2.4.27-2-itanium-smp_2.4.27-10_ia64.deb to pool/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-2-itanium-smp_2.4.27-10_ia64.deb kernel-headers-2.4.27-2-itanium_2.4.27-10_ia64.deb to pool/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-2-itanium_2.4.27-10_ia64.deb kernel-headers-2.4.27-2-mckinley-smp_2.4.27-10_ia64.deb to pool/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-2-mckinley-smp_2.4.27-10_ia64.deb kernel-headers-2.4.27-2-mckinley_2.4.27-10_ia64.deb to pool/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-2-mckinley_2.4.27-10_ia64.deb kernel-headers-2.4.27-2_2.4.27-10_ia64.deb to pool/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-2_2.4.27-10_ia64.deb kernel-image-2.4-itanium-smp_2.4.27-10_ia64.deb to pool/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-itanium-smp_2.4.27-10_ia64.deb kernel-image-2.4-itanium_2.4.27-10_ia64.deb to pool/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-itanium_2.4.27-10_ia64.deb kernel-image-2.4-mckinley-smp_2.4.27-10_ia64.deb to pool/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-mckinley-smp_2.4.27-10_ia64.deb kernel-image-2.4-mckinley_2.4.27-10_ia64.deb to pool/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-mckinley_2.4.27-10_ia64.deb kernel-image-2.4.27-2-itanium-smp_2.4.27-10_ia64.deb to pool/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-2-itanium-smp_2.4.27-10_ia64.deb kernel-image-2.4.27-2-itanium_2.4.27-10_ia64.deb to pool/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-2-itanium_2.4.27-10_ia64.deb kernel-image-2.4.27-2-mckinley-smp_2.4.27-10_ia64.deb to pool/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-2-mckinley-smp_2.4.27-10_ia64.deb kernel-image-2.4.27-2-mckinley_2.4.27-10_ia64.deb to pool/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-2-mckinley_2.4.27-10_ia64.deb kernel-image-2.4.27-ia64_2.4.27-10.dsc to pool/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-ia64_2.4.27-10.dsc kernel-image-2.4.27-ia64_2.4.27-10.tar.gz to pool/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-ia64_2.4.27-10.tar.gz Announcing to debian-devel-changes@lists.debian.org Thank you for your contribution to Debian. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
kernel-patch-2.4.27-ia64_2.4.27-4_ia64.changes ACCEPTED
Accepted: kernel-patch-2.4.27-ia64_2.4.27-4.dsc to pool/main/k/kernel-patch-2.4.27-ia64/kernel-patch-2.4.27-ia64_2.4.27-4.dsc kernel-patch-2.4.27-ia64_2.4.27-4.tar.gz to pool/main/k/kernel-patch-2.4.27-ia64/kernel-patch-2.4.27-ia64_2.4.27-4.tar.gz kernel-patch-2.4.27-ia64_2.4.27-4_all.deb to pool/main/k/kernel-patch-2.4.27-ia64/kernel-patch-2.4.27-ia64_2.4.27-4_all.deb Announcing to debian-devel-changes@lists.debian.org Thank you for your contribution to Debian. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: draft of DebConf5 debian-kernel paper
On Mon, 30 May 2005, dann frazier wrote: > hey, > I posted a draft of a paper for DebConf here: > http://people.debian.org/~dannf/debconf5/ cool > If you have time in the next couple of days, please take a look and > tell me where I went wrong :) I tried to talk about both day-to-day > type tasks, as well as some history and some notable stuff happening on > the list lately (kernel freeze, ABI issues, unified source package, > security support, firmware redistributability, etc). the bet on a stable abi is bad, please refer to Documentation/stable_api_nonsense.txt d-i needs to improve a lot in that aspect, nice to get those archive hacks, but showing wrong direction. > I'm very open to changes - new topics included. I think a number of > people on this list will be there - if you'd like to co-present on one > of these topics (or one I didn't mention), let me know. please mention the ongoing work of jbailey concerning the replacement of the initrd-tools by initramfs. -- maks -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Processing of kernel-image-2.4.27-ia64_2.4.27-10_ia64.changes
kernel-image-2.4.27-ia64_2.4.27-10_ia64.changes uploaded successfully to localhost along with the files: kernel-image-2.4.27-ia64_2.4.27-10.dsc kernel-image-2.4.27-ia64_2.4.27-10.tar.gz kernel-headers-2.4.27-2_2.4.27-10_ia64.deb kernel-image-2.4-itanium-smp_2.4.27-10_ia64.deb kernel-headers-2.4.27-2-itanium-smp_2.4.27-10_ia64.deb kernel-image-2.4.27-2-itanium-smp_2.4.27-10_ia64.deb kernel-image-2.4-itanium_2.4.27-10_ia64.deb kernel-headers-2.4.27-2-itanium_2.4.27-10_ia64.deb kernel-image-2.4.27-2-itanium_2.4.27-10_ia64.deb kernel-image-2.4-mckinley-smp_2.4.27-10_ia64.deb kernel-headers-2.4.27-2-mckinley-smp_2.4.27-10_ia64.deb kernel-image-2.4.27-2-mckinley-smp_2.4.27-10_ia64.deb kernel-image-2.4-mckinley_2.4.27-10_ia64.deb kernel-headers-2.4.27-2-mckinley_2.4.27-10_ia64.deb kernel-image-2.4.27-2-mckinley_2.4.27-10_ia64.deb kernel-build-2.4.27-2_2.4.27-10_ia64.deb Greetings, Your Debian queue daemon -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Processing of kernel-patch-2.4.27-ia64_2.4.27-4_ia64.changes
kernel-patch-2.4.27-ia64_2.4.27-4_ia64.changes uploaded successfully to localhost along with the files: kernel-patch-2.4.27-ia64_2.4.27-4.dsc kernel-patch-2.4.27-ia64_2.4.27-4.tar.gz kernel-patch-2.4.27-ia64_2.4.27-4_all.deb Greetings, Your Debian queue daemon -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: Kernel Modules for PE2850 in default i386 2.6 kernel builds.
On Monday 30 May 2005 04:01, Horms wrote: > On Fri, May 27, 2005 at 09:13:00PM -0400, Satadru Pramanik wrote: > > I'm more than willing to test some images out. > > > > Thanks. > > > > satadru > > I have put the images and source up at http://debian.vergenet.net/testing/ > The debian version is 5.hls.2005052700 Hi Horms, Installed and rebooted the new kernel 2.6.11-1-686-smp_2.6.11-5.hls.2005052700 without problems. Thx! Achim > > > -Original Message- > > From: Horms <[EMAIL PROTECTED]> > > Date: Friday, May 27, 2005 8:02 pm > > Subject: Re: Kernel Modules for PE2850 in default i386 2.6 kernel builds. > > > > On Thu, May 19, 2005 at 05:13:08PM +0200, Achim Bohnet wrote: > > > On Thursday 19 May 2005 16:37, Satadru Pramanik wrote: > > > > I am setting up a Dell PowerEdge 2850 with Debian/Sarge and noticed > > > > that I can install with a sarge installation cd > > > > using kernel 2.4.x, but I can not install with the debian 2.6.x > > > > kernels, nor update to a debian 2.6.x kernel that will support > > > > the built in scsi hardware. > > > > > > > > The problem lies in the LSI SCSI cards masquerading as PERC cards > > > > inside the machine using the megaraid2 driver > > > > on 2.4.x, and on 2.6 using the megaraid_newgen and megaraid_mailbox > > > > drivers. > > > > > > > > Is there any chance the following drivers could be compiled in as > > > > modules for 2.6.11-x-686-smp? > > > > > > > > CONFIG_MEGARAID_NEWGEN > > > > CONFIG_MEGARAID_MM > > > > CONFIG_MEGARAID_MAILBOX > > > > > > I would like to see this addition too. > > > > > > > These are already in the default config for 2.6.11-x-em64t-p4-smp. > > > > > > An additional note: the -em64t-p4-smp kernel can also be used > > > on Dells PE2850, BUT there are some user 32/kernel 64 bit IPMI > > > problems in the 2.6.11 em64t that make it no good default choice. > > > [Hopefully the fixes get merged before 2.6.12.] > > > > > > > Compiling a kernel for myself hasn't been a problem, but for the > > > > corporate minded, it is easier to sell a > > > > debian install (as opposed to RedHat) to a client by showing them > > > > that a stock debian 32 bit 2.6 kernel > > > > that has gone through the debian vetting process supports their system. > > > > > > I can confirm this, we have this discussion here. > > > > That sounds fine to me. I have put it into SVN and will do some test > > builds. I'll make them available when they are done (likely over the > > weekend), testing would be appreciated. > > > > -- > > Horms > > > > -- > Horms > > -- To me vi is Zen. To use vi is to practice zen. Every command is a koan. Profound to the user, unintelligible to the uninitiated. You discover truth everytime you use it. -- [EMAIL PROTECTED] -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
kernel-image-2.4.27-alpha_2.4.27-10_alpha.changes ACCEPTED
Accepted: kernel-build-2.4.27-2_2.4.27-10_alpha.deb to pool/main/k/kernel-image-2.4.27-alpha/kernel-build-2.4.27-2_2.4.27-10_alpha.deb kernel-headers-2.4.27-2-generic_2.4.27-10_alpha.deb to pool/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-2-generic_2.4.27-10_alpha.deb kernel-headers-2.4.27-2-smp_2.4.27-10_alpha.deb to pool/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-2-smp_2.4.27-10_alpha.deb kernel-headers-2.4.27-2_2.4.27-10_alpha.deb to pool/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-2_2.4.27-10_alpha.deb kernel-image-2.4.27-2-generic_2.4.27-10_alpha.deb to pool/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-2-generic_2.4.27-10_alpha.deb kernel-image-2.4.27-2-smp_2.4.27-10_alpha.deb to pool/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-2-smp_2.4.27-10_alpha.deb kernel-image-2.4.27-alpha_2.4.27-10.dsc to pool/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-alpha_2.4.27-10.dsc kernel-image-2.4.27-alpha_2.4.27-10.tar.gz to pool/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-alpha_2.4.27-10.tar.gz Announcing to debian-devel-changes@lists.debian.org Thank you for your contribution to Debian. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
kernel-image-2.6.8-alpha_2.6.8-16_alpha.changes ACCEPTED
Accepted: kernel-headers-2.6.8-2-generic_2.6.8-16_alpha.deb to pool/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-2-generic_2.6.8-16_alpha.deb kernel-headers-2.6.8-2-smp_2.6.8-16_alpha.deb to pool/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-2-smp_2.6.8-16_alpha.deb kernel-headers-2.6.8-2_2.6.8-16_alpha.deb to pool/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-2_2.6.8-16_alpha.deb kernel-image-2.6.8-2-generic_2.6.8-16_alpha.deb to pool/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-2-generic_2.6.8-16_alpha.deb kernel-image-2.6.8-2-smp_2.6.8-16_alpha.deb to pool/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-2-smp_2.6.8-16_alpha.deb kernel-image-2.6.8-alpha_2.6.8-16.dsc to pool/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-alpha_2.6.8-16.dsc kernel-image-2.6.8-alpha_2.6.8-16.tar.gz to pool/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-alpha_2.6.8-16.tar.gz Announcing to debian-devel-changes@lists.debian.org Thank you for your contribution to Debian. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Processing of kernel-image-2.6.8-alpha_2.6.8-16_alpha.changes
kernel-image-2.6.8-alpha_2.6.8-16_alpha.changes uploaded successfully to localhost along with the files: kernel-image-2.6.8-alpha_2.6.8-16.dsc kernel-image-2.6.8-alpha_2.6.8-16.tar.gz kernel-headers-2.6.8-2_2.6.8-16_alpha.deb kernel-headers-2.6.8-2-smp_2.6.8-16_alpha.deb kernel-image-2.6.8-2-smp_2.6.8-16_alpha.deb kernel-headers-2.6.8-2-generic_2.6.8-16_alpha.deb kernel-image-2.6.8-2-generic_2.6.8-16_alpha.deb Greetings, Your Debian queue daemon -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Processing of kernel-image-2.4.27-alpha_2.4.27-10_alpha.changes
kernel-image-2.4.27-alpha_2.4.27-10_alpha.changes uploaded successfully to localhost along with the files: kernel-image-2.4.27-alpha_2.4.27-10.dsc kernel-image-2.4.27-alpha_2.4.27-10.tar.gz kernel-headers-2.4.27-2_2.4.27-10_alpha.deb kernel-headers-2.4.27-2-smp_2.4.27-10_alpha.deb kernel-image-2.4.27-2-smp_2.4.27-10_alpha.deb kernel-headers-2.4.27-2-generic_2.4.27-10_alpha.deb kernel-image-2.4.27-2-generic_2.4.27-10_alpha.deb kernel-build-2.4.27-2_2.4.27-10_alpha.deb Greetings, Your Debian queue daemon -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: kernel updates accepted for sarge
Hello, On Sat, May 28, 2005 at 09:57:52PM -0700, Steve Langasek wrote: > If there are updates to unstable pending for any other architectures, please > let debian-release know. I am preparing an upload of kernel-image-2.6.8-amd64 version 2.6.8-14, wich contains all current security updates. I'll notice you again as soon as my sponsor has done the upload. Kind regards Frederik Schueler -- ENOSIG signature.asc Description: Digital signature
Re: kernel updates accepted for sarge
* Norbert Tretkowski wrote: > * Steve Langasek wrote: > > If there are updates to unstable pending for any other > > architectures, please let debian-release know. > > I'm currently compiling updates for alpha 2.4 and 2.6 kernels, > upload tomorrow. Uploaded, please approve for sarge. Norbert -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#303200: kernel-image-2.6.10-1-686: kernel BUG at fs/reiserfs/file.c:534!
severity 303200 important tags 303200 moreinfo thanks > On Tue, 05 Apr 2005, Pau Capdevila wrote: > > > *** Please type your report below this line *** > > > > When the following occurs: > > > > Apr 3 21:59:31 localhost kernel: hda: dma_intr: status=0x51 { > > DriveReady SeekComplete Error } > > Apr 3 21:59:31 localhost kernel: hda: dma_intr: error=0x40 { > > UncorrectableError }, LBAsect=57642412, sector=57642408 > > Apr 3 21:59:31 localhost kernel: ide: failed opcode was: unknown > > Apr 3 21:59:31 localhost kernel: end_request: I/O error, dev hda, > > sector 57642408 > > Apr 3 21:59:31 localhost kernel: [ cut here ] > > Apr 3 21:59:31 localhost kernel: kernel BUG at fs/reiserfs/file.c:534! > > Apr 3 21:59:31 localhost kernel: invalid operand: [#1] > > Apr 3 21:59:31 localhost kernel: PREEMPT > > Apr 3 21:59:31 localhost kernel: Modules linked in: tdfx lp ipv6 floppy > > parport_pc parport pcspkr rtc snd_ens1371 snd_rawmidi snd_seq_device > > snd_ac97_codec snd_pcm_oss snd_mixer_oss snd_pcm snd_timer snd soundcore > > snd_page_alloc gameport 8139cp 8139too mii i2c_piix4 i2c_core joydev > > tsdev usbhid uhci_hcd usbcore pci_hotplug intel_agp agpgart > > nls_iso8859_1 vfat fat nls_cp437 ntfs capability commoncap evdev apm > > ide_cd cdrom mousedev psmouse reiserfs ext2 ext3 jbd mbcache ide_generic > > siimage aec62xx trm290 alim15x3 hpt34x hpt366 ide_disk cmd64x piix > > rz1000 slc90e66 generic cs5530 cs5520 sc1200 triflex atiixp pdc202xx_old > > pdc202xx_new opti621 ns87415 cy82c693 amd74xx sis5513 via82cxxx > > serverworks ide_core unix fbcon font bitblit vesafb cfbcopyarea > > cfbimgblt cfbfillrect > > Apr 3 21:59:31 localhost kernel: CPU:0 > > Apr 3 21:59:31 localhost kernel: EIP: > > 0060:[pg0+341663470/1069863936]Not tainted VLI > > Apr 3 21:59:31 localhost kernel: EFLAGS: 00210256 (2.6.10-1-686) > > Apr 3 21:59:31 localhost kernel: EIP is at > > reiserfs_allocate_blocks_for_region+0xb6e/0x1620 [reiserfs] > > Apr 3 21:59:31 localhost kernel: eax: 2000 ebx: c2709ad8 ecx: > > edx: c1028d20 > > Apr 3 21:59:31 localhost kernel: esi: 0001 edi: cbb4fedc ebp: > > cf5a6018 esp: cbb4fcb0 > > Apr 3 21:59:31 localhost kernel: ds: 007b es: 007b ss: 0068 > > Apr 3 21:59:31 localhost kernel: Process amule (pid: 4705, > > threadinfo=cbb4e000 task=cb8c0570) > > Apr 3 21:59:31 localhost kernel: Stack: cbb4feac c8850bfc cbb4fdb4 > > fffb 000f 0003 c02a343e c1280ca8 > > Apr 3 21:59:31 localhost kernel:cbb4fd24 cbb4fd2c > > c02a3651 c24b3fb8 c0157100 cbb4fd38 cb8c0570 > > Apr 3 21:59:31 localhost kernel:cbb4fd20 c0157100 00200296 > > 0002 c1280ca8 c8850bb0 > > Apr 3 21:59:31 localhost kernel: Call Trace: > > Apr 3 21:59:31 localhost kernel: [io_schedule+14/32] > > io_schedule+0xe/0x20 > > Apr 3 21:59:31 localhost kernel: [__wait_on_bit+81/112] > > __wait_on_bit+0x51/0x70 > > Apr 3 21:59:31 localhost kernel: [sync_buffer+0/80] > > sync_buffer+0x0/0x50 > > Apr 3 21:59:31 localhost kernel: [sync_buffer+0/80] > > sync_buffer+0x0/0x50 > > Apr 3 21:59:31 localhost kernel: [free_buffer_head+57/112] > > free_buffer_head+0x39/0x70 > > Apr 3 21:59:31 localhost kernel: [pg0+341666258/1069863936] > > reiserfs_unprepare_pages+0x32/0x70 [reiserfs] > > Apr 3 21:59:31 localhost kernel: [pg0+341669618/1069863936] > > reiserfs_prepare_file_region_for_write+0x562/0x990 [reiserfs] > > Apr 3 21:59:31 localhost kernel: [pg0+341672407/1069863936] > > reiserfs_file_write+0x6b7/0x6d0 [reiserfs] > > Apr 3 21:59:31 localhost kernel: [vfs_statfs+100/128] > > vfs_statfs+0x64/0x80 > > Apr 3 21:59:31 localhost kernel: [vfs_statfs64+64/80] > > vfs_statfs64+0x40/0x50 > > Apr 3 21:59:31 localhost kernel: [path_release+21/80] > > path_release+0x15/0x50 > > Apr 3 21:59:31 localhost kernel: [sys_statfs64+143/208] > > sys_statfs64+0x8f/0xd0 > > Apr 3 21:59:31 localhost kernel: [vfs_write+237/352] > > vfs_write+0xed/0x160 > > Apr 3 21:59:31 localhost kernel: [sys_write+81/128] > > sys_write+0x51/0x80 > > Apr 3 21:59:31 localhost kernel: [syscall_call+7/11] > > syscall_call+0x7/0xb > > Apr 3 21:59:31 localhost kernel: Code: 24 e8 c7 9e 00 00 8b 94 24 8c 01 > > 00 00 b8 60 5d 9a d4 89 44 24 04 8b 82 8c 00 00 00 eb e0 0f 0b 19 02 20 > > a6 9a d4 e9 00 ff ff ff <0f> 0b 16 02 20 a6 9a d4 e9 e5 fe ff ff 89 7c > > 24 04 8b 84 24 88 > > > > The system doesn't panic but X fall down and you must reset the machine. > > > well reiserfs doesn't work well with preempt, > could you please try the 2.6.11 kernel-iamge. > there preempt is disabled afair. > > also aboves looks like an hardware error of your harddisc, > is it still alive? > can you reproduce the dma error with ext3? > still awaiting answers to above question, btw really downgrading. -- maks -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Processed: Re: Bug#303200: kernel-image-2.6.10-1-686: kernel BUG at fs/reiserfs/file.c:534!
Processing commands for [EMAIL PROTECTED]: > severity 303200 important Bug#303200: kernel-image-2.6.10-1-686: kernel BUG at fs/reiserfs/file.c:534! Severity set to `important'. > tags 303200 moreinfo Bug#303200: kernel-image-2.6.10-1-686: kernel BUG at fs/reiserfs/file.c:534! There were no tags set. Tags added: moreinfo > thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
draft of DebConf5 debian-kernel paper
hey, I posted a draft of a paper for DebConf here: http://people.debian.org/~dannf/debconf5/ If you have time in the next couple of days, please take a look and tell me where I went wrong :) I tried to talk about both day-to-day type tasks, as well as some history and some notable stuff happening on the list lately (kernel freeze, ABI issues, unified source package, security support, firmware redistributability, etc). I'm very open to changes - new topics included. I think a number of people on this list will be there - if you'd like to co-present on one of these topics (or one I didn't mention), let me know. Horms: I listed you as an author in this draft because I stole some content directly from a couple of your .au slides; let me know if you'd prefer I didn't. -- dann frazier <[EMAIL PROTECTED]> -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Processed: Re: Bug#309206: hal: Hald freezes my computer on startup
Processing commands for [EMAIL PROTECTED]: > reassign 309206 kernel-source-2.6.11 Bug#309206: hal: Hald freezes my computer on startup Bug reassigned from package `hal' to `kernel-source-2.6.11'. > thanks, Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#311273: kernel-image-2.6.11-9-amd64-k8: Please configure Security Capatibilities as module
Package: kernel-image-2.6.11-9-amd64-k8 Version: 2.6.11-2 Severity: wishlist Hi ! It is impossible to compile the realtime security module with the actual kernel configuration. The security capatibilities are not configured as module. Please setup this option as a module permitting building realtime-lsm. Cheers, Romain Chantereau. -- System Information: Debian Release: 3.1 Architecture: amd64 (x86_64) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.11-9-amd64-k8 Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) Versions of packages kernel-image-2.6.11-9-amd64-k8 depends on: ii coreutils [fileutil 5.2.1-2 The GNU core utilities ii e2fsprogs 1.37+1.38-WIP-0509-1 ext2 file system utilities and lib ii initrd-tools0.1.81.1 tools to create initrd image for p ii module-init-tools 3.2-pre1-2 tools for managing Linux kernel mo -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#120116: Download Faster
Hello, Make your ordinary 56k modem go speeds of upto 250k+! (Average increased speeds of 195 - 200K!) Download music/programs in seconds, not minutes! This hardware is compatible with EVERY Dialup ISP! Check it out: http://1stopcentral.info Best Regards, Roxanne Peel Never Again : : 1stopcentral.info/r Those janitors aren't missing sleeping right now.. Did Roy love working on the top of the mountain?.
Processed: bring this issue on the radar of the release team
Processing commands for [EMAIL PROTECTED]: > reassign 303200 kernel,kernel-source-2.6.8 Bug#303200: kernel-image-2.6.10-1-686: kernel BUG at fs/reiserfs/file.c:534! Bug reassigned from package `kernel' to `kernel,kernel-source-2.6.8'. > thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#67718: Get latest version, cds and download under $99
Best software prices. http://agse.ahwpvral72ah7ba.tritylbcgbj.com Atheism has no room for human rights. .. spell 'creat' with an E.' -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#308584: kernel-source-2.4.27: missing sysctl slot for ia64 results in local DoS
On Mon, 2005-05-30 at 00:22 -0600, dann frazier wrote: > On Wed, 2005-05-11 at 18:30 +0900, Horms wrote: > > Package: kernel-source-2.4.27 > > Version: 2.4.27-10 > > Severity: important > > Tags: patch, security, pending > > > > > > I got this from Moritz Muehlenhoff <[EMAIL PROTECTED]>: > > > >http://www.redhat.com/support/errata/RHSA-2005-284.html This is > >CAN-2005-0137 : Linux kernel 2.6 on Itanium (ia64) architectures > >allows local users to cause a denial of service via a "missing > >Itanium syscall table entry." > > > > On investigation I found that > > > >2.4.27 is vulnerable to this. 2.6.8 and 2.6.11 are not. > >The bug has been fixed upstream for both 2.4 and 2.6 and > >I have put a this patch into SVN for 2.4.27 > > Actually, this fix is already in kernel-patch-2.4.27-ia64 (2.4.27-3). > It was included when I resync'd with upstream; I didn't include a > reference in the changelog because I was unsure if the CAN ID was public > yet. > > kernel-patch-2.4.27-ia64 has already made its way into sarge, and: > > anyway, yeah, 2.4 kernels are also being synced up; I've already > approved 2.4.27-8 in for ia64 > > 2.4.27-8 was built against -3, so it sounds like this fix should already > be going in. Testing a build against 2.4.27-10, I noticed that both patches will apply. Since they both add a syscall slot, we silently get one extra syscall slot :/ I'm unsure how severe of a problem this is - but I fear it may introduce a DoS vector of its own. I think the best solution at this point is to build a kernel-patch-2.4.27-ia64 (2.4.27-4) that reverts this change and prepare a kernel-image along with it, therefore requiring no changes to kernel-source-2.4.27. What do you think? Release Team: If I get these 2 builds into sid can we move these into sarge with the other kernel updates? -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#308584: kernel-source-2.4.27: missing sysctl slot for ia64 results in local DoS
On Wed, 2005-05-11 at 18:30 +0900, Horms wrote: > Package: kernel-source-2.4.27 > Version: 2.4.27-10 > Severity: important > Tags: patch, security, pending > > > I got this from Moritz Muehlenhoff <[EMAIL PROTECTED]>: > >http://www.redhat.com/support/errata/RHSA-2005-284.html This is >CAN-2005-0137 : Linux kernel 2.6 on Itanium (ia64) architectures >allows local users to cause a denial of service via a "missing >Itanium syscall table entry." > > On investigation I found that > >2.4.27 is vulnerable to this. 2.6.8 and 2.6.11 are not. >The bug has been fixed upstream for both 2.4 and 2.6 and >I have put a this patch into SVN for 2.4.27 Actually, this fix is already in kernel-patch-2.4.27-ia64 (2.4.27-3). It was included when I resync'd with upstream; I didn't include a reference in the changelog because I was unsure if the CAN ID was public yet. kernel-patch-2.4.27-ia64 has already made its way into sarge, and: anyway, yeah, 2.4 kernels are also being synced up; I've already approved 2.4.27-8 in for ia64 2.4.27-8 was built against -3, so it sounds like this fix should already be going in. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]