Bug#988477: xen-hypervisor-4.14-amd64: xen dmesg shows (XEN) AMD-Vi: IO_PAGE_FAULT on sata pci device

2025-04-13 Thread Elliott Mitchell
On Fri, Mar 14, 2025 at 10:42:24PM +0100, Maximilian Engelhardt wrote: > A fix [1] for the IO_PAGE_FAULT went into xen 4.20 which is now available in > testing and unstable. > The 4.20.0-1 Debian source package can also be compiled for bookworm if you > have a bookworm system running and want to

Bug#988477: Potential Mitigation for #988477

2024-07-10 Thread Elliott Mitchell
It was suggested as a debugging step, but adding the option "iommu=no-intremap" to Xen's command-line may work as a short-term mitigation for #988477. -- (\___(\___(\__ --=> 8-) EHM <=-- __/)___/)___/) \BS (| ehem+sig...@m5p.com PGP 87145445 |)

Bug#1026914: arcanist client improperly uploading files

2022-12-23 Thread Elliott Mitchell
Package: arcanist Version: 0~git20200925-1 Severity: grave If one has one or more commits in /some/repo one can create a Phabricator diff by running `arc diff $oldver`. If there are are untracked files in the directory the arcanist client gives the message: 8<

Bug#1017944: Another reproduction of #1017944

2022-09-11 Thread Elliott Mitchell
X-Debbugs-Cc: pkg-xen-de...@lists.alioth.debian.org Guess we're finding out where everyone's update windows are. Some though may report before resolving the issue or somewhat after. Yet another reproducer of the issue here. I also observed the failure in Xen's dmesg and confirm the issue occurs

Bug#968965: xen: FTBFS woes in sid

2020-11-20 Thread Elliott Mitchell
On Fri, Nov 20, 2020 at 08:02:26PM +0100, Hans van Kranenburg wrote: > So, > > On 9/21/20 4:16 PM, Hans van Kranenburg wrote: > > [...] > > > > gcc-Wl,-z,relro -Wl,-z,now -pthread -Wl,-soname > > -Wl,libxentoolcore.so.1 -shared -Wl,--version-script=libxentoolcore.map > > -o libxentoolcore.so.

Bug#962254: Umask ignored when mounting NFSv4.2 share of an exported ZFS (with acltype=off) (was: Re: Bug#962254: NFS(v4) broken at 4.19.118-2)

2020-06-15 Thread Elliott Mitchell
On Mon, Jun 15, 2020 at 10:50:35AM -0400, J. Bruce Fields wrote: > Honestly I don't think I currently have a regression test for this so > it's possible I could have missed something upstream. I haven't seen > any reports, though > > ZFS's ACL implementation is very different from any in-tree

Bug#962254: Umask ignored when mounting NFSv4.2 share of an exported ZFS (with acltype=off) (was: Re: Bug#962254: NFS(v4) broken at 4.19.118-2)

2020-06-13 Thread Elliott Mitchell
On Sat, Jun 13, 2020 at 02:54:31PM +0200, Salvatore Bonaccorso wrote: > indicated this was specifically observed on ZFS on Linux only. Seth > Arnold's answer seem to be inline with that that the issue is more on > the ZFS on Linux side and the issue keeps biting people a bit > unexpectedly. Why doe

Bug#962254: NFS(v4) broken at 4.19.118-2

2020-06-11 Thread Elliott Mitchell
Bit more experimentation on this issue. I tried a very small C program meant to create files with fewer permissions bits set. This succeeded which strengthens the theory of the umask getting ignored. I haven't seen anything hinting whether this is more a client or server issue. I can speculate

Bug#934160: Bug#962254: NFS(v4) broken at 4.19.118-2

2020-06-08 Thread Elliott Mitchell
Control: tags 962254 +security -unreproducible Control: severity 962254 grave On Fri, Jun 05, 2020 at 08:36:31PM +0200, Salvatore Bonaccorso wrote: > This now let some rings bell, the described scenario is very similar > to what was reported in https://bugs.debian.org/934160 > > Respectively > ht

Bug#934160: Bug#962254: NFS(v4) broken at 4.19.118-2

2020-06-05 Thread Elliott Mitchell
I've run into a problem which produces the same behavior as bug #934160, but attributed it elsewhere due to other observations. What are the version(s) of the Linux kernel being used on your server and clients? I've confirmed using a 4.9 kernel on a client instead of a 4.19 kernel also works arou

Bug#819705: Adjusting severity of #819705

2017-06-09 Thread Elliott Mitchell
severity 819705 critical quit `rm -rf` is a mighty tool, and must be wielded with extreme care. firmware-b43-installer's use isn't too dangerous, but the fact remains its use *must* be in *prerm* not *postrm*. A theoretical future package which desired to replace firmware-b43-installer (something

Bug#831228: flashplugin-nonfree: Signature status

2016-08-08 Thread Elliott Mitchell
Sorry to be the bearer of bad news, but: $ wget https://people.debian.org/~bartm/flashplugin-nonfree/D5C0FC14/fp.22.0.0.209.sha512.amd64.pgp.asc --2016-08-08 16:48:41-- https://people.debian.org/~bartm/flashplugin-nonfree/D5C0FC14/fp.22.0.0.209.sha512.amd64.pgp.asc Resolving people.debian.org (

Bug#814316: Fetch flashplugin-nonfree archive from Macromedia directly?

2016-06-09 Thread Elliott Mitchell
The problem for flashplugin-nonfree is verifying the tarball that is downloaded. Adobe isn't making this easy since they don't provide any form of conventional signature (PGP). Thus Bart Martens had been doing the rather unenviable job of having to approve Flash Player somehow. The approach had

Bug#826301: Needs new signature

2016-06-08 Thread Elliott Mitchell
Okay now know what is going on. `update-flashplugin-nonfree --status` retrieves the currently installed version from libflashplayer.so and the available version by looking at adobe.com. Meanwhile, `update-flashplugin-nonfree --install` retrieves a signature from either http://people.debian.org/~

Bug#826301: Retrieving 11.2.202.616, instead of 11.2.202.621?!

2016-06-08 Thread Elliott Mitchell
The reports thus far seem to already suggest where to look for the problem being pointed to here, notice 3 lines out of the logs provided so far: installed version = 11.2.202.616 upstream version = 11.2.202.621 downloading https://fpdownload.adobe.com/get/flashplayer/pdc/11.2.202.616/install_flas

Bug#474947: Not reproducible?..

2008-10-20 Thread Elliott Mitchell
>From: Eugene V. Lyubimkin <[EMAIL PROTECTED]> > Though, I think, severity of this bug can be downgraded (imho, to important) > if it show itself rarely. And it's very hard to fix, yes. No. Have you looked at how many reports there are of the MMap problem and how old they are? A quick browse fou

Bug#474947: Appears to be testing

2008-04-13 Thread Elliott Mitchell
This appears to be due to testing. Removing the binary line for it (or rather the mirror) from /etc/apt/sources.list made this go away. Removing any of the other repositories failed to make the problem disappear. I was even able to produce core files (seems to suggest a bigger problem). I must *st

Bug#474947: MMap, again; and won't be denied this time

2008-04-07 Thread Elliott Mitchell
Package: apt Version: 0.6.46.4-0.1 Severity: grave Justification: renders package unusable, conventional workaround doesn't work Well, it's everyone's favorite bug with apt-get: Reading package lists... Error! E: Dynamic MMap ran out of room E: Error occurred while processing rt73-modules-2.6.24-

Bug#341248: [sarge] bogus "Filesystem would be destroyed" message

2006-01-11 Thread Elliott Mitchell
Is this truely a /grave/ bug with /lilo/? Certainly you were able to use the force option, and LILO did its job; this is annoying but not unusable. Certainly it didn't cause data loss. The verbose flag told you what was going on, it had incorrectly detected the presence of an NT FS. Is there anyth