Bug#801925: [PATCH] SCSI: fix crashes in sd and sr runtime PM

2016-01-26 Thread Erich Schubert
lear the private data during removal and test it during > runtime suspend/resume. > > This fixes <https://bugs.debian.org/801925>. > > Signed-off-by: Alan Stern > Reported-by: Paul Menzel > Reported-by: Erich Schubert > Reported-by: Alexandre Rossi > T

Bug#801925: NULL pointer dereference: IP: [] sr_runtime_suspend+0xc/0x20 [sr_mod]

2016-01-10 Thread Erich Schubert
Hi all, 4.4-rc8 does not fix the problem for me. Anything beyond 4.1.0 remains unable to boot this computer. Unfortunately, because the error occurs during early early SCSI initialization, I do not have easy access to the log - no disk, no network. It happens during SATA initialization: "scsi_runt

Bug#801925: Linux Null Pointer Dereference on boot

2015-11-10 Thread Erich Schubert
Hi, Both me and a colleague are bit by the same/a similar bug. The Null Pointer Dereference here is at sd_resume during early boot, but looks very much related to this issue. The last kernel able to boot for me is 4.1.0-2-amd64 Anything later than that (including linux-image-4.3.0-trunk-amd64 4.3-

Bug#763155: Bug#764528: Cross-referencing i915 kernel bugs on EEEpc

2015-02-11 Thread Erich Schubert
, 2015 at 3:22 PM, Erich Schubert wrote: > tag 764528 + patch jessie > tag 763155 + patch jessie > thanks > > There appears to be a rather easy patch available: > http://patchwork.freedesktop.org/patch/38659/ > "Quietly reject attempts to create non-pagealigned stolen obj

Bug#763155: Bug#764528: Cross-referencing i915 kernel bugs on EEEpc

2015-02-07 Thread Erich Schubert
sues on some eeePC models (apparently, it depends on the bios and CPU), and the patch is quite simple, it should be considered for jessie, even if the patch isn't the long-term solution yet. Thank you. Regards, Erich On Sun, Nov 30, 2014 at 10:59 PM, Erich Schubert wrote: > https://bugs.free

Bug#763155: Bug#764528: Cross-referencing i915 kernel bugs on EEEpc

2014-11-30 Thread Erich Schubert
https://bugs.freedesktop.org/show_bug.cgi?id=86883 Not sure if kernel bugzilla wouldn't have been the better address, given that the BUG_ON clearly is in kernel code. But I guess it's the same developers anyway. Regards, Erich -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org

Bug#763155: Cross-referencing i915 kernel bugs on EEEpc

2014-11-30 Thread Erich Schubert
severity 764528 important tag 764528 +jessie +sid +experimental tag 771227 +jessie +sid +experimental block 764528 763155 block 771227 763155 merge 764528 771227 thanks All of these are probably the same bug, rendering current kernels (jessie onward) unusable on EEEpc with older (?) Atom CPUs. As

Bug#763155: linux-image-3.16.0-4-686-pae: Bad news, only working sometimes

2014-11-10 Thread Erich Schubert
Package: src:linux Version: 3.16.7-2 Followup-For: Bug #763155 Control: found 3.16.7-2 Unfortunately, the problems still persist. Today, 3.16.0-4 did not boot correctly either; nor did 3.17. The last kernel working reliably was and continues to be 3.14. :-( Hardware name: ASUSTeK Computer INC. 1

Bug#763155: linux-image-3.16.0-4-686-pae: Probably resolved in 3.16.0-4-686

2014-11-07 Thread Erich Schubert
Package: src:linux Followup-For: Bug #763155 Hello, Successfully running 3.16.0-4-686-pae right now. Either the problem is gone, or it doesn't occur on every boot. (Different EEEpc model, though) -- Package-specific info: ** Version: Linux version 3.16.0-4-686-pae (debian-kernel@lists.debian.org)

Bug#768027: linux-image-3.16-3-686-pae: kernel BUG at linux-3.16.5/drivers/gpu/drm/i915/i915_gem_stolen.c:431!

2014-11-04 Thread Erich Schubert
Package: src:linux Version: 3.16.5-1 Severity: important Booting a 3.16.5 leads to a locked up system. Login manager fails to start, and the console is dead. This renders this kernel UNUSABLE on my Netbook. Kernel 3.14 works fine. This appears to be specific to the earlier Intel Atom CPUs? Nov

Bug#763155: linux-image-3.16-2-686-pae: linux 3.16-2-686-pae: i915 module crashes on Eeepc 1001p

2014-10-01 Thread Erich Schubert
Package: src:linux Version: 3.14.15-2 Followup-For: Bug #763155 Same thing here: kernel BUG at /build/linux-Lep8DD/linux-3.16.3/drivers/gpu/drm/i915/i915_gem_stolen.c:431! invalid opcode: [#1] SMP EIP is at i915_gem_object_create_stolen_for_preallocated+0x20b/0x280 [i915] and resulting in a

Bug#625510: Broadcom 802.11 driver missing from 2.6.39-rc[45]

2011-05-03 Thread Erich Schubert
Package: linux-2.6 Version: 2.6.39~rc5-1~experimental.1 Severity: normal Tags: experimental The driver for my other laptops broadcom BCM4313 seems to be missing. Comparing the config files: /boot/config-2.6.38-2-686:CONFIG_BRCM80211=m /boot/config-2.6.38-2-686:CONFIG_BRCM80211_PCI=y /boot/config-

Bug#567747: workaround for no-video on i915: vga=ext

2010-02-14 Thread Erich Schubert
Hi, I added vga=ext to my boot parameters, and with that my system boots fine (although not in the usual vga=ext 50 lines vga mode, but it DOES activate my i915 framebuffer?!? it's definitely running the native 1440x900 resolution of my screen.) Maybe this prevents efifb from running (or resets the

Bug#534635: linux-image-2.6.30-1-686: Intel xorg driver problems

2009-08-16 Thread Erich Schubert
Package: linux-image-2.6.30-1-686 Severity: normal fixed 534635 2.6.30-2 thanks I think we can mark this bug fixed, since the mentioned commit was included in 2.6.30.1 and thus in the -2 debian package. I'm still seeing the occasional xorg crash after resuming - most often like one minute after

Bug#534635: linux-image-2.6.30-1-686: xorg crashes after resume on intel

2009-06-25 Thread Erich Schubert
Package: linux-image-2.6.30-1-686 Version: 2.6.30-1 Severity: important Hi, Suspend/resume is no longer working reliable for me since a few versions. Some time after resume, I start seeing glyph corruption or (more often) the xserver just suddenly locks up. The problem description pretty much matc

Bug#412188: Microphone on Dell 640m

2007-02-26 Thread Erich Schubert
Hi, With Kernel 2.6.20, the microphone jack works. best regards, Erich Schubert -- erich@(vitavonni.de|debian.org)--GPG Key ID: 4B3A135C(o_ Reality continues to ruin my life --- Calvin//\ Die Mathematik muss man schon deswegen studieren, weil sie

Bug#412188: linux-image-2.6.18-4-686: Microphone doesn't work on Dell 640m (Sigmatel / Intel HDA STAC92xx)

2007-02-24 Thread Erich Schubert
Package: linux-image-2.6.18-4-686 Version: 2.6.18.dfsg.1-11 Severity: normal The microphone on my Dell 640m doesn't work. Sound otherwise is okay, but trying to record produces an empty file (so it probably isn't just some volume setting...) There are various reports on the same issue on the net.

Bug#412153: linux-image-2.6.18-4-686: WPA fails on SMP systems under heavy load

2007-02-23 Thread Erich Schubert
Package: linux-image-2.6.18-4-686 Version: 2.6.18.dfsg.1-11 Severity: normal I was having problems with WPA-encrypted networks in heavy load conditions, e.g. when transferring files from a local server. Every minute I would be disconnected with the error messages --- TKIP: ICV error detected: STA=

Bug#402707: reproducible: hash check failed

2006-12-16 Thread Erich Schubert
x27;m not using torrents that often) best regards, Erich Schubert -- erich@(vitavonni.de|debian.org)--GPG Key ID: 4B3A135C(o_ The future is here. It's just not evenly distributed yet. //\ Der Anfang aller Erkenntnis ist das Staunen. --- AristotelesV_/_

Issue with Debian Kernels and SELinux

2005-11-10 Thread Erich Schubert
presence of the LSM hooks is having real impact, even with selinux=0), > then possibly CONFIG_SECURITY_NETWORK could be tightened up to only > apply to the hooks that are on the critical path (e.g. sock_rcv_skb is > likely the largest concern). best regards, Erich Schubert -- erich@(

Bug#335601: compaq arrays with ida

2005-11-07 Thread Erich Schubert
Hi, > + if ($name =~ /^ida!c\d+d\d+$/) { > + ModProbe::addModules ($actions, [ "cpqarray" ]); > + $actions->add("mkbdev", $device->yspecial, sysname => $name); > + return 1; > + } That is what I had inser

Bug#333834: Please enable "audit" support

2005-11-04 Thread Erich Schubert
Hi, > CONFIG_AUDIT=y > # CONFIG_AUDITSYSCALL is not set According to #selinux at Freenode this is just fine that way. Sorry, I wasn't sure which of them is needed for what. best regards, Erich Schubert -- erich@(vitavonni.de|debian.org)--GPG Key ID: 4B3A135C(o_

Bug#335601: compaq arrays with ida

2005-11-02 Thread Erich Schubert
Hi, the compaq smart arrays I have use "ida": /dev/ida/c0d0p5 on / type ext3 (rw,errors=remount-ro) /dev/ida/c0d0p1 on /boot type ext2 (rw) /dev/ida/c0d0p6 on /home type ext3 (rw,nodev) as well as /sys/block/ida!c0d0 The module needed is "cpqarray" Greetings, Erich Sc

Bug#333834: linux-2.6: Please enabled "audit" support, selinux is pretty much unuseable otherwise.

2005-10-14 Thread Erich Schubert
d CONFIG_AUDIT_SYSCALL. IIRC the latter allows you to disable audit logging from userspace as well as configure where the logs go to (e.g. via netlink to a userspace audit daemon) best regards, Erich Schubert -- erich@(vitavonni.de|debian.org)--GPG Key ID: 4B3A135C(o_

Bug#333834: linux-2.6: Please enabled "audit" support, selinux is pretty much unuseable otherwise.

2005-10-13 Thread Erich Schubert
Package: linux-2.6 Severity: normal While you can run SELinux just fine without audit enabled, it's next to impossible to write or debug SELinux policy without it. But SELinux hasn't reached the stage where there is a perfect policy for everything, so users need to have the ability to debug their

Bug#255406: kernel-source-2.4.26: Kernel crash when removing interface from wrong bridge group

2004-06-21 Thread Erich Schubert
> Did you try sending this to netdev@oss.sgi.com and CCing the relevant > maintainer, Stephen Hemminger <[EMAIL PROTECTED]> I believe? I just got a mail by Marcelo Tosatti that Stephen Hemminger is preparing a complete bridging update including this fix. Greetings, Erich Schubert --

Bug#255406: kernel-source-2.4.26: Kernel crash when removing interface from wrong bridge group

2004-06-20 Thread Erich Schubert
Package: kernel-source-2.4.26 Severity: normal Some time ago i found a kernel crash in 2.4.x and reported it to LKML. Unfortunately i never recieved a reply, and i didn't see it in recent pre-releases of the 2.4.x kernel. To verify your system is vulnerable (need bridge support): $ brctl addbr br