sages.
I'm tagging this bug 'moreinfo' now, since it will depend on your
availability and abilities to work on it to have it advance.
Have fun,
Hans van Kranenburg
Hi,
On 11/29/20 8:50 PM, Salvatore Bonaccorso wrote:
> Source: xen
> Version: 4.14.0+80-gd101b417b7-1
> Severity: grave
> Tags: security upstream
> Justification: user security hole
> X-Debbugs-Cc: car...@debian.org, Debian Security Team
>
>
> Hi,
>
> The following vulnerability was published
On 11/20/20 8:02 PM, Hans van Kranenburg wrote:
> So,
>
> On 9/21/20 4:16 PM, Hans van Kranenburg wrote:
>> [...]
>>
> [...]
> >8
>
> dh_install: warning: Cannot find (any matches for)
> "usr/lib/debug/usr/lib/xen-*/boot/*" (tried in .
On 11/21/20 5:40 AM, Elliott Mitchell wrote:
> On Fri, Nov 20, 2020 at 08:02:26PM +0100, Hans van Kranenburg wrote:
>> So,
>>
>> On 9/21/20 4:16 PM, Hans van Kranenburg wrote:
>>> [...]
>>>
>>> gcc-Wl,-z,relro -Wl,-z,now -pthread -Wl,-soname
&
notfixed -1 xen/4.14.0-1~exp1
reopen
found -1 xen/4.14.0-1~exp1
thanks
Hi,
On 9/4/20 1:55 PM, Hans van Kranenburg wrote:
>
> On 8/24/20 7:03 PM, Gianfranco Costamagna wrote:
>> Source: xen
>> Version: 4.11.4+24-gddaaccbbab-1
>> Severity: serious
>>
>> Hello
Hi Gianfranco,
On 8/24/20 7:03 PM, Gianfranco Costamagna wrote:
> Source: xen
> Version: 4.11.4+24-gddaaccbbab-1
> Severity: serious
>
> Hello, looks like xen is FTBFS because of some bd-uninstallable python
> package and a gcc-10 related build failure.
Yes. Thanks for the report.
Currently (
Hi,
On Wed, 15 Jul 2020 20:52:40 -0700 Sarah Newman wrote:
> On 7/7/20 8:13 PM, Ben Hutchings wrote:
> > Control: reassign -1 src:linux
> > Control: tag -1 moreinfo
> >
> > On Tue, 2020-07-07 at 17:30 -0700, Sarah Newman wrote:
> >> Package: linux-signed-amd64
> >> Version: 4.19.0-9-amd64
> >>
>
On 5/9/20 9:57 PM, Moritz Mühlenhoff wrote:
> On Sat, May 09, 2020 at 02:36:24AM +0200, Thomas Goirand wrote:
>> On 5/8/20 9:35 PM, Moritz Mühlenhoff wrote:
>>> On Fri, Aug 30, 2019 at 07:45:40AM +, Matthias Klose wrote:
Package: src:python-pyxenstore
Version: 0.0.2-1
Severity: n
On 1/7/20 11:34 PM, Hans van Kranenburg wrote:
> [...]
>
> Today I have finally been working on this. The result is that I at least
> have a new (WIP) version for buster. I'm running it on a dom0 right now
> and did smoke testing, live migrate, restarting domUs etc.
& Exposures) ids in your changelog entry.
I also added a commit to put in the CVE numbers in previous changelog
entries:
https://salsa.debian.org/xen-team/debian-xen/commit/0ee295f5caf6178f64febeb976d7ea968e44a191
Is this ok/wanted/great/what-you-like? Because, regularly, the numbers
are not available yet when we push out the update.
Thanks,
Hans van Kranenburg
for reporting this. Next step would be to follow Rogers
instructions, and provide config dumps, serial console output etc...
We're certainly available to include changes / etc to fix things, given
proper information / testing reports from the user. But, the user has to
actively he
On 6/19/19 4:43 PM, Wiebe Cazemier wrote:
> This is an update to the unstable release. What is one running Debian
> stable (9), with Xen Hypervisor 4.8, to do?
This is not meant as a middle finger to users of stable.
All of the bug numbers will be closed twice, also by the 4.8 upload,
which also
Ok, so...
On 2/24/19 3:39 PM, Santiago Vila wrote:
>> All of this seems to be related to the dh-exec usage for putting files
>> in the xen-utils-common package with a different name. This is the first
>> time this package is using dh-exec.
>>
>> [...]
>>
>> Interestingly, 'etc/default/xencommons =
the report that it ftbfs came in, and I was too quick with thinking
"no way, I just built it!". :)
Thanks for your report.
On 2/23/19 7:04 AM, Santiago Vila wrote:
> On Sat, Feb 23, 2019 at 01:15:49AM +0100, Hans van Kranenburg wrote:
>
>> Can you please help me by formu
On 2/23/19 1:15 AM, Hans van Kranenburg wrote:
> Hi,
>
> On 2/23/19 12:59 AM, Santiago Vila wrote:
>>
>>> Hint: Try splitting override_dh_compress into override_dh_compress-arch
>>> and override_dh_compress-indep.
>>
>> Not really sure that thi
Hi,
On 2/23/19 12:59 AM, Santiago Vila wrote:
>
>> Hint: Try splitting override_dh_compress into override_dh_compress-arch
>> and override_dh_compress-indep.
>
> Not really sure that this is a good hint in this case. The first rule showing
> an
> error is certainly this one:
>
> find: 'debian/
he bug report. If you discover this message later, and this
case is important to you, then you can try unarchiving the bug and
replying to it, or reach out to the maintainers email list at
pkg-xen-devel at lists.alioth.debian.org (no subscription required) and
post a message.
Thanks,
Hans van Kranenburg
why you
think the problem is caused by a defect in Xen?
If not, can you show more debug logging?
Good luck,
Hans van Kranenburg
could also try your luck on the upstream xen-users mailing list [0].
However, this would also require more detailed information instead of
only "It doesn't work"-style information in order to enable others to
help you.
Good luck,
Hans van Kranenburg
[0] https://lists.xenproject.org/
Hi,
So, this is about:
https://packages.debian.org/source/sid/blktap-dkms
Related (also with a long living ftbfs bug):
https://packages.debian.org/source/sid/blktap
I can already tell that while the Debian Xen team is listed as
maintainer, the packages are not anywhere on the radar of the cu
severity -1 normal
thanks
Hi,
On 11/30/18 12:31 AM, gregory bahde wrote:
> Package: src:xen
> Version: 4.8.4+xsa273+shim4.10.1+xsa273-1+deb9u10
> Severity: critical
> Justification: breaks the whole system
>
> Dear Maintainer,
>
> *** Reporter, please consider answering these questions, where a
Hi,
On 09/26/2018 05:37 PM, Ian Jackson wrote:
> On my 4.11-based rework branch I found that the following upstream
> commits were needed:
>
> 437e00fea04becc91c1b6bc1c0baa636b067a5cc
> tools/kdd: mute spurious gcc warning
>
> e1b7eb92d3ec6ce3ca68cffb36a148eb59f59613
> tools: Move ARRAY_SIZE() i
On 06/09/2018 18:23, Hans van Kranenburg wrote:
>
> Anyway, I think the future proof solution here is to have clear
> documentation about how to configure related settings, instead of trying
> to find values that suit all users and that are not ridiculously high.
I just assisted a
On 02/28/2018 08:54 AM, Valentin Vidic wrote:
> On Tue, Feb 27, 2018 at 08:22:50PM +0100, Valentin Vidic wrote:
>> Since I can't reproduce it easily anymore I suspect something was
>> fixed in the meanwhile. My original report was for 4.9.30-2+deb9u2
>> and since then there seems to be a number of
On 07/17/2018 12:39 AM, Benoît Tonnerre wrote:
> Hi,
>
> I tested this workaround : I confirm that it works on Xen host, but not
> on Xen guest.
> If you try to start a vm with latest kernel i.e. theses parameters in
> cfg file :
>
> #
> # Kernel + memory size
> #
> kernel = '/boot/vmlinuz-
Reportedly, adding pti=off to the kernel boot parameters will work
around the issue for now.
Turning off pti in the guest kernel is done in any case for PV. The
issue between 4.9.107 and 4.9.111 affects the detection and turning off
of pti, that's why forcing it off helps.
In 4.9.112 it's fixed i
Hi,
On 07/15/2018 12:16 PM, Benoît Tonnerre wrote:
> [...]
>
> After updating 3 Xen servers from stretch (9.4) to stretch (9.5), I
> notice a kernel panic on these 3 servers.
Thanks for the report.
This is probably all related:
This went into 4.9.102:
https://www.spinics.net/lists/kernel/msg28
Hi Sebastian,
On 07/04/2018 10:21 PM, Sebastian Andrzej Siewior wrote:
>
> On 2018-07-04 14:06:54 [+0200], To Hans van Kranenburg wrote:
>> On 2018-06-24 17:12:19 [+0200], Hans van Kranenburg wrote:
>>> My mailserver logs now contain 'ERROR: Parse error at line 74: Unkn
o
be closely inspected to detect options that are removed and get patches
like you did for #826406.
I will as well inspect the config file I use to see if I can get rid of
options that have default value or are not critical, to lower the risk
of this happening again.
Thanks,
--
Hans van Kranenburg
On 02/27/2018 05:05 PM, Hans van Kranenburg wrote:
> [...]
>
> ...I doubt if it's useful (priority wise) to keep spending a lot of time
> on this, since the work is really time consuming.
It is, but it's also an interesting problem.
Idle just started domU starts at nr_fram
On 02/27/2018 12:40 AM, Hans van Kranenburg wrote:
> [...]
>
> But, the main thing I wanted to test is if the change would result in a
> much lower total amount of grants, which is not the case.
So,
* I couldn't reproduce a number > 32
* The proposed fix doesn't hel
On 02/26/2018 07:35 PM, Hans van Kranenburg wrote:
> On 02/26/2018 03:52 PM, Ian Jackson wrote:
>> Christian Schwamborn writes ("Re: Bug#880554: xen domu freezes with
kernel linux-image-4.9.0-4-amd64"):
>>> I can try, but the only system I can really test this is a pr
On 02/26/2018 03:52 PM, Ian Jackson wrote:
> Christian Schwamborn writes ("Re: Bug#880554: xen domu freezes with kernel
> linux-image-4.9.0-4-amd64"):
>> I can try, but the only system I can really test this is a productive
>> system, as this 'reliable' shows this issue (and I don't want to crash
Hi Valentin, Christian,
Finally getting back to you about the max grant frames issue.
We discussed this with upstream Xen developers, and a different fix was
proposed. I would really appreciate if you could test it and confirm it
also solves the issue. Testing does not involve recompiling the
hype
On 01/12/2018 12:43 PM, Valentin Vidic wrote:
> On Fri, Jan 12, 2018 at 01:34:10AM +0100, Hans van Kranenburg wrote:
>> Is the 59 your lots-o-vcpu-monster?
>
> Yes, that is the one with a larger vcpu count.
Check.
>> I just finished with the initial preparation of a
Hi,
On 08/01/2018 13:38, Valentin Vidic wrote:
> On Sun, Jan 07, 2018 at 07:36:40PM +0100, Hans van Kranenburg wrote:
>> Recently a tool was added to "dump guest grant table info". You could
>> see if it compiles on the 4.8 source and see if it works? Would be
>&g
On 11/01/2018 22:42, Hans van Kranenburg wrote:
> Hey,
>
> On 11/01/2018 18:59, peter green wrote:
>>> I think the compiler is simply wrong to complain about this.
>> If you are going to build with options like "-Wall -Werror" then you
>> have to expect
Hey,
On 11/01/2018 18:59, peter green wrote:
>> I think the compiler is simply wrong to complain about this.
> If you are going to build with options like "-Wall -Werror" then you
> have to expect the compiler to be bitchy. You should be able to make
> this particular warning non-fatal by adding -
On 01/07/2018 10:05 AM, Valentin Vidic wrote:
> On Sat, Jan 06, 2018 at 11:17:00PM +0100, Hans van Kranenburg wrote:
>> I agree that the upstream default, 32 is quite low. This is indeed a
>> configuration issue. I myself ran into this years ago with a growing
>> number
In any case, the grub option thing is a conffile, so any user upgrading
has to accept/merge the change, so we won't cause a stable user to just
run out of memory because of a few extra kilobytes of memory usage
without notice.
Hans van Kranenburg
P.S. Debian Xen team is in the process of being "rebooted" while the
current shitstorm about meltdown/spectre is going on, so don't hold your
breath. :)
signature.asc
Description: OpenPGP digital signature
Hi Sebastian,
On 06/05/2016 08:09 PM, Sebastian Andrzej Siewior wrote:
On 2016-06-05 13:27:08 [+0200], Hans van Kranenburg wrote:
The version in the main Debian Stable archive (so not in the additional
jessie-updates) has the option AllowSupplementaryGroups removed (see
#822444), which
ith a warning if set,
and only make it disappear when upgrading to Stretch.
Thanks,
--
Hans van Kranenburg - System / Network Engineer
T +31 (0)10 2760434 | hans.van.kranenb...@mendix.com | www.mendix.com
2152 pts/0S+ 15:02 0:00
\_ grep ipvs
So, that's ok!
--
Hans van Kranenburg - System / Network Engineer
+31 (0)10 2760434 | hans.van.kranenb...@mendix.com | www.mendix.com
--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
G'night,
Torsten Landschoff wrote:
Hi Hans,
On Wed, Apr 20, 2005 at 10:52:34PM +0200, Hans van Kranenburg wrote:
Seems /usr/lib/slapd (when present) detects with which name it was
called, and changes behaviour accordingly... :S
Yes, that's right :( Upstream merged slappasswd into slap
now temporarily fix this by manually copying /usr/lib/slapd from
Jerry to Tom.
Greetings,
Hans van Kranenburg
--
Technische Hogeschool Rijswijk
Lange Kleiweg 80
2288 GK Rijswijk
The Netherlands
T 070-3401876
E [EMAIL PROTECTED]
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
45 matches
Mail list logo