Dear list,
I'm trying to reshape a 3-disk RAID5 array to a 4-disk RAID6 array (of
the same total size and per-device size) using linux kernel 4.9.237 on
x86_64. I understand that this reshaping operation is supposed to be
supported. But it appears perpetually stuck at 0% with no operation
taking
On Tue, Sep 20, 2016 at 03:50:09PM +0300, Mika Westerberg wrote:
> Does the machine have WDAT ACPI table (see /sys/firmware/acpi/tables/*)?
> If it does, you can try the new WDAT watchdog driver instead [1]. It
> still uses the same hardware, though but via set of instructions
> provided by the BIO
TL;DR: On some motherboards with an Intel chipset, at least from Asus
and Asrock, the hardware watchdog (linux driver iTCO-wdt) fails to
reboot the system correctly (POST fails and leaves system unusable).
Looking for people willing to test, in order to pinpoint the problem.
Background:
I am loo
TL;DR: the iTCO_wdt watchdog on the Asus P10S-WS motherboard, instead
of rebooting the machine, places the motherboard in a completely
nonfunctional state, from which it can be revived only by a hard power
cycle. I suspect this is a BIOS bug: seeking advice on how/where to
report this, and what to
TL;DR: Why is Firefox getting OOM-killed while I have 24GB free swap?
Dear list,
A few days ago I upgraded the kernel on my desktop PC from 4.5.5 to
4.7.2 and, since then, I've witnessed a huge number of cases where
various processes (typically Firefox) got OOM-killed by the kernel.
Before this k
The skge driver in the 4.3 kernel reports hardware checksum errors
upon receiving (certain?) IPv6 multicast packets containing ICMPv6
multicast listener discovery messages. This is a regression since 4.1
(I believe between 4.1 and 4.2). The e1000e driver on a different
Ethernet port of the same m
On Sun, Nov 08, 2015 at 08:49:41AM -0800, Christoph Hellwig wrote:
> can you try the patch at:
>
> http://article.gmane.org/gmane.comp.file-systems.xfs.general/70984
>
> The symptoms sound surprisingly similar.
Thanks for the pointer. I'm running with the patch now, and will
follow-up if the pr
Compiled a 4.2.5 kernel a few days ago. This morning, my machine was
essentially unresponsive (couldn't log on) so I used
alt-sysrq-{s,t,s,u,b} to reboot it, and after reboot it appears that
the first suspicious message concerns xfsaild blocked for more than
300 seconds. The disks and filesystems
With a 4.3 kernel I compiled two days ago, I had various processes
stuck in 'D' state this morning, tried to unmount filesystems, which
made things worse and froze everything. In case this means anything,
reading from the hard drives with dd (e.g., dd if=/dev/sda bs=4096k
count=1) worked (data was
Dear list,
I have a USB 3.0 controller card connected to a PCI-E bus that appears
on lspci as
06:00.0 USB controller [0c03]: NEC Corporation uPD720200 USB 3.0 Host
Controller [1033:0194] (rev 03) (prog-if 30 [XHCI])
Subsystem: ASUSTeK Computer Inc. P8P67 Deluxe Motherboard [1043:8413]
On Wed, Oct 15, 2014 at 03:54:08PM -0700, Andy Lutomirski wrote:
> On Wed, Oct 15, 2014 at 3:30 PM, David Madore wrote:
> > Note that since the possibility of using SO_PEERCRED on AF_INET
> > sockets does not hitherto exist on Linux, we can be sure that nobody
> > uses it
On Wed, Oct 15, 2014 at 07:41:48AM -0700, Andy Lutomirski wrote:
> On 10/15/2014 06:35 AM, David Madore wrote:
> > Given an AF_UNIX socket, the getsockopt(, SOL_SOCKET, SO_PEERCRED,,)
> > call allows one endpoint to authenticate the other endpoint's pid, uid
> > and gid.
Given an AF_UNIX socket, the getsockopt(, SOL_SOCKET, SO_PEERCRED,,)
call allows one endpoint to authenticate the other endpoint's pid, uid
and gid.
The call is valid on AF_INET and AF_INET6 sockets but returns no data
(pid=0, uid=-1, gid=-1). Obviously it is meaningless to try to get
such creden
Since I had a rare occasion to physically access the machine, I did
the following experiment: connect another machine to the serial
console, run
while true ; do date ; cat /proc/slabinfo ; echo '***' ; sleep 3 ; done
and generate lots of IPv6 traffic through the box (as I mentioned, for
some reas
On Fri, Aug 31, 2012 at 12:59:36PM +0200, David Madore wrote:
> On Wed, Aug 29, 2012 at 09:32:20PM +0200, Francois Romieu wrote:
> > David Madore :
> > [...]
> > > I imagine it being somehow related to the fact that it operates a
> > > network bridge (I im
On Wed, Aug 29, 2012 at 09:32:20PM +0200, Francois Romieu wrote:
> David Madore :
> [...]
> > I imagine it being somehow related to the fact that it operates a
> > network bridge (I imagine this because I have another identical
> > machine with exactly the same kernel a
Dear all,
I hope this is the right place to send this sort of backtrace dump.
I'm getting the following sort of dumps (below) on a 3.2.27 kernel on
an arm/kirkwood (actually DreamPlug) machine that's used as a router.
I imagine it being somehow related to the fact that it operates a
network brid
Hi,
Is there a simple way (via a kernel boot option or config setting or -
if really necessary - a patch or something like that) to set the
personality for the init process? I'm running an x86_64 kernel on a
system whose userland is almost entirely 32-bits (but needs an
occasional 64-bit process
Hi all,
I'm extremely confused as to what all the RTC-related config variables
in the kernel mean and what I'm supposed to do with them, and I wonder
if someone can help me or point me to some doc beside rtc.txt (which
I've read, of course).
I understand (from reading Documentation/rtc.txt) that
On Mon, Sep 17, 2007 at 11:11:52AM -0700, Jeremy Fitzhardinge wrote:
> Boot memtest86 for a little while before booting the kernel? And if you
> haven't already run it for a while, then that would be your first step
> anyway.
Indeed, that does the trick, thanks for the suggestion. So I can be
qu
Hi,
Is there a patch or a boot option or something which wipes all
available (physical) RAM at boot (or better, fills it with a fixed
signature like 0xdeadbeef)? I'm getting phony ECC errors and I'd like
to test whether they go away when the RAM is properly initialized.
Also, I'd like to know exa
// Hi. I felt the need to write the following little utility (which
// is mostly comments, really), to prevent my digital camera's image
// files to have incorrect modification when I mount them under Linux.
// Comments are welcome.
// Enjoy!
/// cut after ///
/* setsystz: set the Linux kernel's
On Sun, Jan 14, 2007 at 09:10:45PM +0100, Jan Engelhardt wrote:
> On Jan 14 2007 20:20, David Madore wrote:
> >Implement TCPMSS target for IPv6 by shamelessly copying from
> >Marc Boucher's IPv4 implementation.
>
> Would not it be worthwhile to merge ipt_TCPMSS and
t/ipv6/netfilter/ip6t_TCPMSS.c
new file mode 100644
index 000..ab492c3
--- /dev/null
+++ b/net/ipv6/netfilter/ip6t_TCPMSS.c
@@ -0,0 +1,225 @@
+/*
+ * This is a module which is used for setting the MSS option in TCP packets.
+ *
+ * Copyright (C) 2007 David Madore <[EMAIL PROTECTED]&g
On Sun, Aug 14, 2005 at 08:00:31PM +, Lee Revell wrote:
> We write code in ASCII, dammit.
http://www.madore.org/~david/weblog/2004-12.html#d.2004-12-03.0813 >
:-)
--
David A. Madore
([EMAIL PROTECTED],
http://www.madore.org/~david/ )
-
To unsubscribe from this
Hi.
I have ECC RAM on my system and I wanted to check it, so (because
there doesn't seem to be any Linux ECC support for my P5WD2
motherboard) I wrote my own kernel module[#] to interrogate the
northbridge. I was a little annoyed to find that the northbridge had
reported an ECC error, and a multi
Hi. I apologize for what is surely a stupid question: I understand
that ACPI should be able to tell me what my CPU's temperature is (I
have a sever overheating problem and I am trying to solve it by
underclocking somewhat, but I need to be able to read the temperature
to do anything worth while),
On Tue, Aug 09, 2005 at 11:36:00PM +0200, Bodo Eggert wrote:
> 1) I wouldn't want an exploited service to gain any privileges, even by
>chaining userspace exploits (e.g. exec sendmail < exploitstring). For
>most services, I'd like CAP_EXEC being unset (but it doesn't exist).
I intend to a
On Tue, Aug 09, 2005 at 01:52:06PM -0700, Chris Wright wrote:
> * Bodo Eggert ([EMAIL PROTECTED]) wrote:
> > How are you going to tell processes that may exec suid (or set-capability-)
> > programs from those that aren't supposed to gain certain capabilities?
>
> typically you'd expect exec suid w
On Tue, Aug 09, 2005 at 04:28:31PM -0400, [EMAIL PROTECTED] wrote:
> On Tue, 09 Aug 2005 07:26:21 +0200, David Madore said:
> > * Second, a much more extensive change, the patch introduces a third
> > set of capabilities for every process, the "bounding" set. Normally
On Tue, Aug 09, 2005 at 05:37:56AM +, Chris Wright wrote:
> * David Madore ([EMAIL PROTECTED]) wrote:
> > * Second, a much more extensive change, the patch introduces a third
> > set of capabilities for every process, the "bounding" set. Normally
>
> this is n
Well, I wasn't sleepy tonight, so I produced the following patch for
Linux capabilities, which attempts to make them useful. It is
supposed to do the following (which may or may not conform with the
POSIX semantics, I don't think it matters much):
* First, and most importantly, capabilities are c
On Tue, Aug 09, 2005 at 01:53:50AM +, Theodore Ts'o wrote:
> The POSIX specification for capabilities requires filesystem support,
> so that each executables can be marked with three capability sets ---
> which indicate which capabilities are asserted when the executable
> starts, which capabil
Sorry for replying to myself...
On Mon, Aug 08, 2005 at 09:13:06PM +, David Madore wrote:
> However, what I do not understand is precisely _how_ one gets a
> sendmail process without CAP_SETUID: for that is the heart of the
> problem, and that is where the bug really was. But [#3
Hi.
Like many people[#1][#2], I have found out that the Linux capability
handling utilities are non-functional, and cannot be repaired because
the kernel deliberately cripples capabilities (they are reset on every
call to execve()). I have found that various people[#1][#2] have
proposed patches t
35 matches
Mail list logo