Re: linux kernel version 5.15.0-69

2023-04-03 Thread Oliver Grawert
hi, Am Samstag, dem 01.04.2023 um 12:47 +0200 schrieb harald.font...@gmx.net: > Do you recommend upgrading the kernel manually? it does not ask you to "upgrade the kernel manually" it just tells you that the upgrade happened but the kernel will only be able to be used after a reboot of the

linux kernel version 5.15.0-69

2023-04-03 Thread harald.fontius
Dear all, I am new to managing servers – I “rented” a Linux Server from IONOS that I have to manage it myself. While installing some packages I got this warning: I ran “sudo apt-get dist-upgrade” but it didn’t do any upgrades. I am on Ubuntu 22.04.2 LTS and extended security

Re: [kernel-hardening] Why does no one care that Brad Spengler of GRSecurity is blatantly violating the intention of the rightsholders to the Linux Kernel?

2017-06-15 Thread Ralf Mardorf
n a >courtroom nor do I personally have any code in the linux kernel. It's not my domain, but seemingly Ubuntu provides AppArmor and no GRSecurity at all. However, the problem with this person aren't the concerns. It's the tone of voice and that there isn't an evidence for a violation. Regards

Re: [kernel-hardening] Why does no one care that Brad Spengler of GRSecurity is blatantly violating the intention of the rightsholders to the Linux Kernel?

2017-06-15 Thread Brendan || Lyn Perrine
of the violation because it's only > >>> been > >>> a month since GRSecurity pulled the sourcecode: it was almost a moot > >>> point > >>> before then with no real damage. Such is no-longer the case. > >>> > >>> On 2017-06-15 15:43, Greg

Re: [kernel-hardening] Why does no one care that Brad Spengler of GRSecurity is blatantly violating the intention of the rightsholders to the Linux Kernel?

2017-06-15 Thread aconcernedfossdev
I'm listening to your responses, and responding myself. You call me a spammer. Which is a libel. Would you like me to file over it? On 2017-06-15 16:05, Wade Smart wrote: Whoever this person is, not only is s/he spamming multiple lists here, there are several over lists where Im getting the

Re: [kernel-hardening] Why does no one care that Brad Spengler of GRSecurity is blatantly violating the intention of the rightsholders to the Linux Kernel?

2017-06-15 Thread aconcernedfossdev
is blatantly violating the intention of the rightsholders to the Linux Kernel? Why does no one care that Brad Spengler (seemingly aswell as PaxTeam) of GRSecurity is blatantly violating the intention of the rightsholders to the Linux Kernel? Why does no one care that Brad Spengler

Re: [kernel-hardening] Why does no one care that Brad Spengler of GRSecurity is blatantly violating the intention of the rightsholders to the Linux Kernel?

2017-06-15 Thread aconcernedfossdev
's only been a month since GRSecurity pulled the sourcecode: it was almost a moot point before then with no real damage. Such is no-longer the case. On 2017-06-15 15:43, Greg KH wrote: On Thu, Jun 15, 2017 at 03:34:06PM +, aconcernedfoss...@airmail.cc wrote: Why does no one care that Brad

Re: [kernel-hardening] Why does no one care that Brad Spengler of GRSecurity is blatantly violating the intention of the rightsholders to the Linux Kernel?

2017-06-15 Thread aconcernedfossdev
int action. On 2017-06-15 15:58, Rik van Riel wrote: On Thu, 2017-06-15 at 15:34 +, aconcernedfoss...@airmail.cc wrote: Why does no one care that Brad Spengler of GRSecurity is blatantly  violating the intention of the rightsholders to the Linux Kernel? He is also violating the license grant, Co

Re: [kernel-hardening] Why does no one care that Brad Spengler of GRSecurity is blatantly violating the intention of the rightsholders to the Linux Kernel?

2017-06-15 Thread aconcernedfossdev
If Mr Spengler would like to market a non-re-distributable hardened kernel, he can write his own kernel from scratch. Currently he is marketing a non-redistributable derivative work of the Linux Kernel. He prevents customers of his from redistributing the derivative work by threatening a non

Re: [kernel-hardening] Why does no one care that Brad Spengler of GRSecurity is blatantly violating the intention of the rightsholders to the Linux Kernel?

2017-06-15 Thread aconcernedfossdev
GRSecurity is such a non-standalone derivative work, so the Linux Licensing terms absolutely do apply (it's a patch that snakes through the whole of the Linux Kernel source tree, touching everything like a vine). Here's a quick rundown: - GRSecurity goes full commercia

re: bcmwl-kernel-source and linux kernel 4.7

2016-06-30 Thread Javad Karabi
it looks like IEEE80211_BAND_2GHZ/IEEE80211_BAND_5GHZ, has been renamed to NL80211_BAND_2GHZ/NL80211_BAND_5GHZ i have tested the below patch on my machine, and i am able to successfully build, and use, my wireless adapter with it diff --git a/src/wl/sys/wl_cfg80211_hybrid.c

GRSecurity Closes Stable Patch of Linux Kernel, Your opinion?

2015-09-15 Thread Veri Vel
patches, which are wholely derivative works of the linux kernel, have been brought closed. This is how to "un-GPL" a work, 101. That is what has happened, effectivly: they got around your intent that derivative works be open, like the linux kernel, except this time they are not even di

Re: GRSecurity Closes Stable Patch of Linux Kernel, Your opinion?

2015-09-15 Thread Ralf Mardorf
Hi, there were already discussions about violations of the GPL on Linux audio lists, but I have forgotten if it's allowed to provide the source to customers only. IMO it doesn't matter what's allowed and what isn't allowed, there's an ethical commitment to keep source code open. Another issue is

Major Page Fault Handler in the Linux Kernel

2012-05-03 Thread Alfred Zhong
Hi Dear Ubuntu developers and kernel hackers, I am wondering where is the major page fault handler. I wrote an algorithm to minimize page faults in the kernel. So I need to record something whenever a page fault happens. I currently record a page fault happen at do_page_fault(...) in

Linux Kernel

2010-06-04 Thread Volovikov Taras
Which version of the kernel you plan to include in Ubuntu 10.10? I believe that if you want to use btrfs, the better it will be 2.6.35 or later. -- Ubuntu-devel-discuss mailing list Ubuntu-devel-discuss@lists.ubuntu.com Modify settings or unsubscribe at:

Re: Linux Kernel

2010-06-04 Thread Daniel Chen
On Fri, Jun 4, 2010 at 5:05 AM, Volovikov Taras wizard160...@mail.ru wrote: Which version of the kernel you plan to include in Ubuntu 10.10? I believe that if you want to use btrfs, the better it will be 2.6.35 or later. https://lists.ubuntu.com/archives/ubuntu-devel/2010-May/030764.html --

Re: Linux kernel debug information missing from Intrepid

2008-10-31 Thread Martin Pitt
Hi Stefano, Stefano Doni [2008-10-29 20:27 +0100]: first of let me congratulate on the Intrepid release, you made a great work, as usual! Thanks! I would like to bring to your attention though that Intrepid seems to lack the linux-image-debug package. This is needed in order to use the

Re: Linux kernel debug information missing from Intrepid

2008-10-31 Thread Pär Andersson
Hi, On Friday 31 October 2008 21.55.39 Martin Pitt wrote: In Intrepid it is now marked as a debug symbol package and lands at http://ddebs.ubuntu.com/pool/main/l/linux/ The packages is not installable using APT as they are missing from the ddebs repository Packages file. Also the

Linux kernel debug information missing from Intrepid

2008-10-29 Thread Stefano Doni
Hello guys, first of let me congratulate on the Intrepid release, you made a great work, as usual! I would like to bring to your attention though that Intrepid seems to lack the linux-image-debug package. This is needed in order to use the Systemtap utility. I've filed a bug here:

Re: Upgrading Hardy Heron 8.04 Beta to Linux kernel .16 breaks it; it won't boot.

2008-04-21 Thread (``-_-´´) -- Fernando
Olá Jim. On Wednesday 16 April 2008 13:53:28 Jim and Judi Harris wrote: Please also send a URL describing how to change your grub boot options to remove the splash so you can see the errors etc. better, as I see no such help anywhere, including in the GRUB Manual at snip Sincerely,

Re: Upgrading Hardy Heron 8.04 Beta to Linux kernel .16 breaks it; it won't boot.

2008-04-16 Thread Todd Deshane
On Wed, Apr 16, 2008 at 8:53 AM, Jim and Judi Harris [EMAIL PROTECTED] wrote: Thanks to Todd and Henrik. No, Henrik, I don't have a TV card; there is nothing but a GeForce 2 video card added to the mobo. Todd, how can I run any of what you say if it won't boot? Do I do all that work on the

Re: Upgrading Hardy Heron 8.04 Beta to Linux kernel .16 breaks it; it won't boot.

2008-04-16 Thread Markus Hitter
Am 16.04.2008 um 14:53 schrieb Jim and Judi Harris: ubuntu-users http://lists.ubuntu.com/mailman/listinfo/ubuntu-users - Ubuntu user technical support, not for general discussions and my Ubuntu is the free version so I am not under a user technical support agreement? Your Ubuntu is free as

Upgrading Hardy Heron 8.04 Beta to Linux kernel .16 breaks it; it won't boot.

2008-04-15 Thread Jim and Judi Harris
Hi. This is my first post to this kind of list. I'm not a Linux newbie but close to it. I've been using Ubuntu for the last few years (and tried a few other versions before that), but mostly as a Typical Windows User, where I focus mostly on using the applications, not the OS. Anyway, perhaps

Re: Upgrading Hardy Heron 8.04 Beta to Linux kernel .16 breaks it; it won't boot.

2008-04-15 Thread Todd Deshane
Hi Jim, This is something that I would recommend report a bug on at: https://launchpad.net/ubuntu From your description it sounds like it is a kernel problem, so look for the appropriate linux package. Make sure you have the latest available and then you should provide some more information in

Re: Upgrading Hardy Heron 8.04 Beta to Linux kernel .16 breaks it; it won't boot.

2008-04-15 Thread Juan C. Villa
@lists.ubuntu.com Sent: Tue, 15 Apr 2008 12:01:20 -0600 Subject: Upgrading Hardy Heron 8.04 Beta to Linux kernel .16 breaks it; it won't boot. Hi. This is my first post to this kind of list. I'm not a Linux newbie but close to it. I've been using Ubuntu for the last few years (and tried a few

URGENT !!! : [USN-464-1] Linux kernel vulnerabilities

2007-05-27 Thread Thilo Six
Thilo Six wrote the following on 26.05.2007 23:27 Hello The kernel security update [USN-464-1] is missing s.th. $ sudo aptitude show linux-generic | grep depend Depends: linux-image-generic, linux-restricted-modules-generic $ sudo aptitude show linux-image-generic | grep depen Depends:

Re: URGENT !!! : [USN-464-1] Linux kernel vulnerabilities

2007-05-27 Thread Thilo Six
Thilo Six wrote the following on 27.05.2007 10:31 Thilo Six wrote the following on 26.05.2007 23:27 Hello The kernel security update [USN-464-1] is missing s.th. $ sudo aptitude show linux-generic | grep depend Depends: linux-image-generic, linux-restricted-modules-generic $ sudo aptitude

Re: [USN-464-1] Linux kernel vulnerabilities

2007-05-27 Thread Matt Zimmerman
On Sat, May 26, 2007 at 11:27:45PM +0200, Thilo Six wrote: Hello The kernel security update [USN-464-1] is missing s.th. This is known to the security team, and being worked on. -- - mdz -- Ubuntu-devel-discuss mailing list Ubuntu-devel-discuss@lists.ubuntu.com Modify settings or

Re: URGENT !!! : [USN-464-1] Linux kernel vulnerabilities

2007-05-27 Thread Matt Zimmerman
On Sun, May 27, 2007 at 10:31:37AM +0200, Thilo Six wrote: now i $ aptitude install linux-image-2.6.20-16-generic and now nvidia is broken !! You installed the new kernel, but forgot to install the corresponding restricted-modules package. -- - mdz -- Ubuntu-devel-discuss mailing list

Re: URGENT !!! : [USN-464-1] Linux kernel vulnerabilities

2007-05-27 Thread Thilo Six
Matt Zimmerman wrote the following on 27.05.2007 22:48 now i $ aptitude install linux-image-2.6.20-16-generic and now nvidia is broken !! You installed the new kernel, but forgot to install the corresponding restricted-modules package. sorry if i exaggerated a bit but i got this green

Re: URGENT !!! : [USN-464-1] Linux kernel vulnerabilities

2007-05-27 Thread Matt Zimmerman
On Sun, May 27, 2007 at 11:22:30PM +0200, Thilo Six wrote: Matt Zimmerman wrote the following on 27.05.2007 22:48 now i $ aptitude install linux-image-2.6.20-16-generic and now nvidia is broken !! You installed the new kernel, but forgot to install the corresponding

Re: [USN-464-1] Linux kernel vulnerabilities

2007-05-26 Thread Thilo Six
Hello The kernel security update [USN-464-1] is missing s.th. $ sudo aptitude show linux-generic | grep depend Depends: linux-image-generic, linux-restricted-modules-generic $ sudo aptitude show linux-image-generic | grep depen Depends: linux-image-2.6.20-15-generic