linux-2.6_2.6.18.dfsg.1-13etch4_amd64.changes REJECTED
Mapping stable-security to proposed-updates. Rejected: linux-headers-2.6.18-5-xen_2.6.18.dfsg.1-13etch4_amd64.deb: old version (2.6.18.dfsg.1-15) in proposed-updates >= new version (2.6.18.dfsg.1-13etch4) targeted at proposed-updates. Rejected: linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch4_amd64.deb: old version (2.6.18.dfsg.1-15) in proposed-updates >= new version (2.6.18.dfsg.1-13etch4) targeted at proposed-updates. Rejected: linux-modules-2.6.18-5-xen-vserver-amd64_2.6.18.dfsg.1-13etch4_amd64.deb: old version (2.6.18.dfsg.1-15) in proposed-updates >= new version (2.6.18.dfsg.1-13etch4) targeted at proposed-updates. Rejected: linux-headers-2.6.18-5-amd64_2.6.18.dfsg.1-13etch4_amd64.deb: old version (2.6.18.dfsg.1-15) in proposed-updates >= new version (2.6.18.dfsg.1-13etch4) targeted at proposed-updates. Rejected: linux-image-2.6.18-5-xen-amd64_2.6.18.dfsg.1-13etch4_amd64.deb: old version (2.6.18.dfsg.1-15) in proposed-updates >= new version (2.6.18.dfsg.1-13etch4) targeted at proposed-updates. Rejected: linux-headers-2.6.18-5-vserver-amd64_2.6.18.dfsg.1-13etch4_amd64.deb: old version (2.6.18.dfsg.1-15) in proposed-updates >= new version (2.6.18.dfsg.1-13etch4) targeted at proposed-updates. Rejected: linux-manual-2.6.18_2.6.18.dfsg.1-13etch4_all.deb: old version (2.6.18.dfsg.1-15) in proposed-updates >= new version (2.6.18.dfsg.1-13etch4) targeted at proposed-updates. Rejected: xen-linux-system-2.6.18-5-xen-amd64_2.6.18.dfsg.1-13etch4_amd64.deb: old version (2.6.18.dfsg.1-15) in proposed-updates >= new version (2.6.18.dfsg.1-13etch4) targeted at proposed-updates. Rejected: linux-support-2.6.18-5_2.6.18.dfsg.1-13etch4_all.deb: old version (2.6.18.dfsg.1-15) in proposed-updates >= new version (2.6.18.dfsg.1-13etch4) targeted at proposed-updates. Rejected: linux-doc-2.6.18_2.6.18.dfsg.1-13etch4_all.deb: old version (2.6.18.dfsg.1-15) in proposed-updates >= new version (2.6.18.dfsg.1-13etch4) targeted at proposed-updates. Rejected: linux-tree-2.6.18_2.6.18.dfsg.1-13etch4_all.deb: old version (2.6.18.dfsg.1-15) in proposed-updates >= new version (2.6.18.dfsg.1-13etch4) targeted at proposed-updates. Rejected: linux-headers-2.6.18-5-xen-vserver_2.6.18.dfsg.1-13etch4_amd64.deb: old version (2.6.18.dfsg.1-15) in proposed-updates >= new version (2.6.18.dfsg.1-13etch4) targeted at proposed-updates. Rejected: linux-modules-2.6.18-5-xen-amd64_2.6.18.dfsg.1-13etch4_amd64.deb: old version (2.6.18.dfsg.1-15) in proposed-updates >= new version (2.6.18.dfsg.1-13etch4) targeted at proposed-updates. Rejected: linux-source-2.6.18_2.6.18.dfsg.1-13etch4_all.deb: old version (2.6.18.dfsg.1-15) in proposed-updates >= new version (2.6.18.dfsg.1-13etch4) targeted at proposed-updates. Rejected: linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch4_amd64.deb: old version (2.6.18.dfsg.1-15) in proposed-updates >= new version (2.6.18.dfsg.1-13etch4) targeted at proposed-updates. Rejected: xen-linux-system-2.6.18-5-xen-vserver-amd64_2.6.18.dfsg.1-13etch4_amd64.deb: old version (2.6.18.dfsg.1-15) in proposed-updates >= new version (2.6.18.dfsg.1-13etch4) targeted at proposed-updates. Rejected: linux-image-2.6.18-5-vserver-amd64_2.6.18.dfsg.1-13etch4_amd64.deb: old version (2.6.18.dfsg.1-15) in proposed-updates >= new version (2.6.18.dfsg.1-13etch4) targeted at proposed-updates. Rejected: linux-headers-2.6.18-5-vserver_2.6.18.dfsg.1-13etch4_amd64.deb: old version (2.6.18.dfsg.1-15) in proposed-updates >= new version (2.6.18.dfsg.1-13etch4) targeted at proposed-updates. Rejected: linux-headers-2.6.18-5-all-amd64_2.6.18.dfsg.1-13etch4_amd64.deb: old version (2.6.18.dfsg.1-15) in proposed-updates >= new version (2.6.18.dfsg.1-13etch4) targeted at proposed-updates. Rejected: linux-image-2.6.18-5-xen-vserver-amd64_2.6.18.dfsg.1-13etch4_amd64.deb: old version (2.6.18.dfsg.1-15) in proposed-updates >= new version (2.6.18.dfsg.1-13etch4) targeted at proposed-updates. Rejected: linux-image-2.6.18-5-amd64_2.6.18.dfsg.1-13etch4_amd64.deb: old version (2.6.18.dfsg.1-15) in proposed-updates >= new version (2.6.18.dfsg.1-13etch4) targeted at proposed-updates. Rejected: linux-headers-2.6.18-5-xen-vserver-amd64_2.6.18.dfsg.1-13etch4_amd64.deb: old version (2.6.18.dfsg.1-15) in proposed-updates >= new version (2.6.18.dfsg.1-13etch4) targeted at proposed-updates. Rejected: linux-headers-2.6.18-5-xen-amd64_2.6.18.dfsg.1-13etch4_amd64.deb: old version (2.6.18.dfsg.1-15) in proposed-updates >= new version (2.6.18.dfsg.1-13etch4) targeted at proposed-updates. Rejected: linux-patch-debian-2.6.18_2.6.18.dfsg.1-13etch4_all.deb: old version (2.6.18.dfsg.1-15) in proposed-updates >= new version (2.6.18.dfsg.1-13etch4) targeted at proposed-updates. Rejected: linux-2.6_2.6.18.dfsg.1-13etch4.dsc: old version (2.6.18.dfsg.1-15) in proposed-updates >= new version (2.6.18.dfsg.1-13etch4) targeted at proposed-updates. === If you don't understand why your files were rejected, or if the override file requires editing, rep
Processing of linux-2.6_2.6.18.dfsg.1-13etch4_amd64.changes
linux-2.6_2.6.18.dfsg.1-13etch4_amd64.changes uploaded successfully to localhost along with the files: linux-2.6_2.6.18.dfsg.1-13etch4.dsc linux-2.6_2.6.18.dfsg.1-13etch4.diff.gz linux-doc-2.6.18_2.6.18.dfsg.1-13etch4_all.deb linux-manual-2.6.18_2.6.18.dfsg.1-13etch4_all.deb linux-patch-debian-2.6.18_2.6.18.dfsg.1-13etch4_all.deb linux-source-2.6.18_2.6.18.dfsg.1-13etch4_all.deb linux-support-2.6.18-5_2.6.18.dfsg.1-13etch4_all.deb linux-tree-2.6.18_2.6.18.dfsg.1-13etch4_all.deb linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch4_amd64.deb linux-headers-2.6.18-5-all-amd64_2.6.18.dfsg.1-13etch4_amd64.deb linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch4_amd64.deb linux-image-2.6.18-5-amd64_2.6.18.dfsg.1-13etch4_amd64.deb linux-headers-2.6.18-5-amd64_2.6.18.dfsg.1-13etch4_amd64.deb linux-headers-2.6.18-5-vserver_2.6.18.dfsg.1-13etch4_amd64.deb linux-image-2.6.18-5-vserver-amd64_2.6.18.dfsg.1-13etch4_amd64.deb linux-headers-2.6.18-5-vserver-amd64_2.6.18.dfsg.1-13etch4_amd64.deb linux-headers-2.6.18-5-xen_2.6.18.dfsg.1-13etch4_amd64.deb linux-image-2.6.18-5-xen-amd64_2.6.18.dfsg.1-13etch4_amd64.deb linux-modules-2.6.18-5-xen-amd64_2.6.18.dfsg.1-13etch4_amd64.deb linux-headers-2.6.18-5-xen-amd64_2.6.18.dfsg.1-13etch4_amd64.deb xen-linux-system-2.6.18-5-xen-amd64_2.6.18.dfsg.1-13etch4_amd64.deb linux-headers-2.6.18-5-xen-vserver_2.6.18.dfsg.1-13etch4_amd64.deb linux-image-2.6.18-5-xen-vserver-amd64_2.6.18.dfsg.1-13etch4_amd64.deb linux-modules-2.6.18-5-xen-vserver-amd64_2.6.18.dfsg.1-13etch4_amd64.deb linux-headers-2.6.18-5-xen-vserver-amd64_2.6.18.dfsg.1-13etch4_amd64.deb xen-linux-system-2.6.18-5-xen-vserver-amd64_2.6.18.dfsg.1-13etch4_amd64.deb Greetings, Your Debian queue daemon -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: Bug#444981: linux-image-2.6.18-4-686: Oops in free_uid()
* Frank Gevaerts <[EMAIL PROTECTED]> [2007-10-02 15:13]: > Package: linux-image-2.6.18-4-686 > Version: 2.6.18.dfsg.1-12etch2 Did you see that with older kernels in etch too? -- Martin Michlmayr http://www.cyrius.com/ -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Processed: severity of 444961 is important
Processing commands for [EMAIL PROTECTED]: > # Automatically generated email from bts, devscripts version 2.9.26 > severity 444961 important Bug#444961: starting a domU kills the system Severity set to `important' from `critical' > End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Processed: Re: Bug#444981: linux-image-2.6.18-4-686: Oops in free_uid()
Processing commands for [EMAIL PROTECTED]: > reassign 444981 linux-2.6 Bug#444981: linux-image-2.6.18-4-686: Oops in free_uid() Warning: Unknown package 'linux-image-2.6.18-4-686' Bug reassigned from package `linux-image-2.6.18-4-686' to `linux-2.6'. > -- Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#444981: linux-image-2.6.18-4-686: Oops in free_uid()
On Tue, Oct 02, 2007 at 04:39:12PM +0200, Martin Michlmayr wrote: > * Frank Gevaerts <[EMAIL PROTECTED]> [2007-10-02 15:13]: > > Package: linux-image-2.6.18-4-686 > > Version: 2.6.18.dfsg.1-12etch2 > > Did you see that with older kernels in etch too? I don't think the machine has ever run an older kernel, and we only had this once. I tend to agree with Linus Torvalds (http://lkml.org/lkml/2006/11/4/45) that this probably is a very rare race condition, taking into account that this is in a frequently used function. Frank > > -- > Martin Michlmayr > http://www.cyrius.com/ -- "Debugging is twice as hard as writing the code in the first place. Therefore, if you write the code as cleverly as possible, you are, by definition, not smart enough to debug it." - Brian W. Kernighan -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#444981: linux-image-2.6.18-4-686: Oops in free_uid()
Package: linux-image-2.6.18-4-686 Version: 2.6.18.dfsg.1-12etch2 Severity: normal Oct 2 12:24:27 olympia kernel: BUG: unable to handle kernel paging request at virtual address 00100104 Oct 2 12:24:27 olympia kernel: printing eip: Oct 2 12:24:27 olympia kernel: c01259aa Oct 2 12:24:27 olympia kernel: *pde = Oct 2 12:24:27 olympia kernel: Oops: 0002 [#1] Oct 2 12:24:27 olympia kernel: SMP Oct 2 12:24:27 olympia kernel: Modules linked in: appletalk button ac battery ipv6 nfs lockd nfs_acl sunrpc ext2 dm_snapshot dm_mirror dm_mod loop psmouse parport_pc serio_raw floppy pcspkr i2c_i801 rtc parport i2c_core shpchp pci_hotplug sg sr_mod cdrom evdev ext3 jbd mbcache raid456 xor raid1 md_mod ide_generic generic ide_core sd_mod tg3 ehci_hcd ata_piix uhci_hcd libata usbcore aic7xxx scsi_transport_spi mptsas mptscsih mptbase scsi_transport_sas scsi_mod thermal processor fan Oct 2 12:24:27 olympia kernel: CPU:2 Oct 2 12:24:27 olympia kernel: EIP:0060:[]Not tainted VLI Oct 2 12:24:27 olympia kernel: EFLAGS: 00010002 (2.6.18-4-686 #1) Oct 2 12:24:27 olympia kernel: EIP is at free_uid+0x22/0x64 Oct 2 12:24:27 olympia kernel: eax: 00200200 ebx: f4a1a540 ecx: f4a1a568 edx: 00100100 Oct 2 12:24:27 olympia kernel: esi: 0082 edi: e4edff34 ebp: e5a6e478 esp: e4edfe84 Oct 2 12:24:27 olympia kernel: ds: 007b es: 007b ss: 0068 Oct 2 12:24:27 olympia kernel: Process smbd (pid: 8092, ti=e4ede000 task=f718aaa0 task.ti=e4ede000) Oct 2 12:24:27 olympia kernel: Stack: e5a6e478 e5a6e4a4 c0125e2d f6e25858 c012620f 0023 0023 0022 Oct 2 12:24:27 olympia kernel: e4edff14 f718aaa0 f718af04 c0127441 0021 Oct 2 12:24:27 olympia kernel:b7d70ff4 e4edffbc c01277bb e4edffbc e4edff94 e4edff14 f718af04 0002 Oct 2 12:24:27 olympia kernel: Call Trace: Oct 2 12:24:27 olympia kernel: [] __sigqueue_free+0x1e/0x2d Oct 2 12:24:27 olympia kernel: [] __dequeue_signal+0x108/0x15c Oct 2 12:24:27 olympia kernel: [] dequeue_signal+0x2d/0x9c Oct 2 12:24:27 olympia kernel: [] get_signal_to_deliver+0xe3/0x3bc Oct 2 12:24:27 olympia kernel: [] do_notify_resume+0x71/0x5d7 Oct 2 12:24:27 olympia kernel: [] __wake_up_common+0x2f/0x53 Oct 2 12:24:27 olympia kernel: [] __link_path_walk+0xbe4/0xd1d Oct 2 12:24:27 olympia kernel: [] schedule+0x84e/0x8fe Oct 2 12:24:27 olympia kernel: [] _spin_unlock_irqrestore+0x8/0x9 Oct 2 12:24:27 olympia kernel: [] sys_setresuid+0x1ae/0x1c0 Oct 2 12:24:27 olympia kernel: [] work_notifysig+0x13/0x19 Oct 2 12:24:27 olympia kernel: Code: 30 c0 56 9d 5b 31 c0 5e c3 56 85 c0 53 89 c3 74 59 9c 5e fa ba 94 bc 2c c0 e8 ff 1a 09 00 85 c0 74 46 8d 4b 28 8b 53 28 8b 41 04 <89> 42 04 89 10 89 f2 b8 94 bc 2c c0 c7 41 04 00 02 20 00 c7 43 This happened during normal use, and seems to be the same as reported in http://lkml.org/lkml/2006/10/31/257 and http://lkml.org/lkml/2006/11/4/45 Frank -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Processed: tagging 444395
Processing commands for [EMAIL PROTECTED]: > # Automatically generated email from bts, devscripts version 2.9.26 > tags 444395 + pending Bug#444395: linux-2.6 [etch] - w83793 support There were no tags set. Tags added: pending > End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
armful westinghouse westinghouse;
As a business you have been preapproved to receive 40145 USD TODAY! No hassle at all, completely unsecured. There are no hidden costs or fees. Worried that your credit is less than perfect? Not an issue. Give us a ring, now.. 8772926894 Turn your dream into a reality. 8772926894 The latter three Misery novels had been little more than straightforward adventure tales with a fair amount of piquantly described cute thrown in to please the ladies. Whatever you called the stuff, however, there were enough torches in there to get the whole village afire - it would burn like a Guy Fawkes dummy, Geoffrey thought. Summer Sheets -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#444961: starting a domU kills the system
Package: linux-image-2.6.18-5-xen-amd64 Version: 2.6.18.dfsg.1-13etch2 Severity: critical Hi, after starting a domU with linux-image-2.6.18-xen-3.1-1-amd64, version 2.6.18.dfsg.1-15+xen.1 (from http://194.39.182.225/debian/linux-2.6/xen-extra/ as told by waldi), the host system and all domUs suddenly stop with this error: Oct 2 01:42:23 urd kernel: --- [cut here ] - [please bite here ] - Oct 2 01:42:23 urd kernel: CPU 1 Oct 2 01:42:23 urd kernel: Modules linked in: xt_physdev xfs iptable_filter ip_tables x_tables ipv6 bridge loop floppy shpchp pci_hotplug serial _core pcspkr serio_raw psmouse i2c_nforce2 i2c_core evdev joydev ext3 jbd mbcache dm_mirror dm_snapshot dm_mod raid456 xor raid1 md_mod ide_gener ic ide_cd cdrom sd_mod usb_storage usbhid sata_nv libata scsi_mod e1000 amd74xx forcedeth ohci_hcd generic ide_core ehci_hcd fan Oct 2 01:42:23 urd kernel: Pid: 21, comm: xenwatch Not tainted 2.6.18-5-xen-amd64 #1 Oct 2 01:42:23 urd kernel: RIP: e030:[] [] retrigger+0x26/0x3e Oct 2 01:42:23 urd kernel: RSP: e02b:8800f2917d88 EFLAGS: 00010046 Oct 2 01:42:23 urd kernel: RAX: RBX: 8980 RCX: ff578000 Oct 2 01:42:23 urd kernel: RDX: 0024 RSI: 8800f2917d30 RDI: 0113 Oct 2 01:42:23 urd kernel: RBP: 804cde00 R08: 8800f284cbf0 R09: 88000a36fd00 Oct 2 01:42:23 urd kernel: R10: 88000a36f800 R11: 80360ebd R12: 0113 Oct 2 01:42:23 urd kernel: R13: 804cde3c R14: R15: 0008 Oct 2 01:42:23 urd kernel: FS: 2b6951249ae0() GS:804c4080() knlGS: Oct 2 01:42:23 urd kernel: CS: e033 DS: ES: Oct 2 01:42:23 urd kernel: Process xenwatch (pid: 21, threadinfo 8800f2916000, task 8800f28f5080) Oct 2 01:42:23 urd kernel: Stack: 802a0646 88000a36fd00 88000a36fd00 Oct 2 01:42:23 urd kernel: 8800f2917de0 020b 8036da4e Oct 2 01:42:23 urd kernel: 8036dec6 8800f2917ea4 Oct 2 01:42:23 urd kernel: Call Trace: Oct 2 01:42:23 urd kernel: [] enable_irq+0x9d/0xbc Oct 2 01:42:23 urd kernel: [] __netif_up+0xc/0x15 Oct 2 01:42:23 urd kernel: [] netif_map+0x2a6/0x2d8 Oct 2 01:42:23 urd kernel: [] bus_for_each_dev+0x61/0x6e Oct 2 01:42:23 urd kernel: [] xenwatch_thread+0x0/0x145 Oct 2 01:42:23 urd kernel: [] xenwatch_thread+0x0/0x145 Oct 2 01:42:23 urd kernel: [] frontend_changed+0x2ba/0x4f9 Oct 2 01:42:23 urd kernel: [] xenwatch_thread+0x0/0x145 Oct 2 01:42:23 urd kernel: [] keventd_create_kthread+0x0/0x61 Oct 2 01:42:23 urd kernel: [] xenwatch_handle_callback+0x15/0x48 Oct 2 01:42:23 urd kernel: [] xenwatch_thread+0x12d/0x145 Oct 2 01:42:23 urd kernel: [] autoremove_wake_function+0x0/0x2e Oct 2 01:42:23 urd kernel: [] keventd_create_kthread+0x0/0x61 Oct 2 01:42:23 urd kernel: [] xenwatch_thread+0x0/0x145 Oct 2 01:42:23 urd kernel: [] kthread+0xd4/0x107 Oct 2 01:42:23 urd kernel: [] child_rip+0xa/0x12 Oct 2 01:42:23 urd kernel: [] keventd_create_kthread+0x0/0x61 Oct 2 01:42:23 urd kernel: [] kthread+0x0/0x107 Oct 2 01:42:23 urd kernel: [] child_rip+0x0/0x12 The host (and all domUs) run etch, with the only exception being the newer kernel. Setting this bug report to critical as crashing the whole machine by starting a new guest sounds to me like an exploitable issue in the xen handlers. (This could of course be wrong, so feel free to adjust the severity.) Cheers, Andi -- http://home.arcor.de/andreas-barth/ -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]