Displaying 20 results from an estimated 400 matches similar to: "Bug#1036475: unblock: xen/4.17.1+2-gb773c48e36-1"
2023 Jul 05
0
Processed: user debian-qa@lists.debian.org, found 986475 in 4.1.9-1, found 1036601 in 4.17.1+2-gb773c48e36-1 ...
Processing commands for control at bugs.debian.org:
> user debian-qa at lists.debian.org
Setting user to debian-qa at lists.debian.org (was anbe at debian.org).
> found 986475 4.1.9-1
Bug #986475 [libocamlnet-ocaml-doc] libocamlnet-ocaml-doc: broken symlinks: /usr/share/doc/libocamlnet-ocaml-dev/examples -> ../libocamlnet-ocaml-doc/examples
Marked as found in versions ocamlnet/4.1.9-1.
2023 May 24
0
xen 4.17.1+2-gb773c48e36-1 MIGRATED to testing
FYI: The status of the xen source package
in Debian's testing distribution has changed.
Previous version: 4.17.0+74-g3eac216e6e-1
Current version: 4.17.1+2-gb773c48e36-1
--
This email is automatically generated once a day. As the installation of
new packages into testing happens multiple times a day you will receive
later changes on the next day.
See
2012 Aug 29
0
Bug#686199: unblock: xen-api/1.3.2-11
Package: release.debian.org
Severity: normal
User: release.debian.org at packages.debian.org
Usertags: unblock
Hi,
Please unblock package xen-api.
The PAM fix which we did for version 1.3.2-10 wasn't correct, and thanks to
the help of Steve Langasek, we have it in a good shape now.
The details of the conversation is available in the Ubuntu BTS here:
2013 Mar 06
3
unblock: xcp-xapi - urgent documentation fixes
Package: release.debian.org
Severity: normal
The current README.Debian is quite old
It gives some advice that will lead to people having a broken system
(e.g. no networking). It describes a procedure for configuring
networking that is completely opposite to what has been described more
recently on the upstream mailing list
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702337
I'm happy
2012 Nov 18
0
Bug#693611: unblock: xen-api/1.3.2-13
Package: release.debian.org
Severity: normal
User: release.debian.org at packages.debian.org
Usertags: unblock
Hi,
I have uploaded xen-api/1.3.2-13, which corrects 2 things:
the hostname change script was designed by CentOS, so I've
fixed that, and also, the init script was hanging waiting
forever if the xen-api host was a slave node, so I added
a test in the init script, thanks to a patch
2023 Jul 20
3
Bug#1041533: xen-system-amd64: Xen fails to start hvm type VMs when a vncpasswd is set
Package: xen-system-amd64
Version: 4.17.1+2-gb773c48e36-1
Severity: important
Dear Maintainer,
after upgrading my bullseye server to bookworm I ran into the issue that all VMs of type hvm are not starting anymore.
xl throws an error:
libxl: error: libxl_qmp.c:1399:qmp_ev_fd_callback: Domain 8:error on QMP socket: Connection reset by peer
libxl: error: libxl_qmp.c:1438:qmp_ev_fd_callback: Domain
2023 Jul 26
2
Bug#1042102: xen FTBFS with gcc 13
Source: xen
Version: 4.17.1+2-gb773c48e36-1
Severity: serious
Tags: ftbfs trixie sid
Forwarded: https://github.com/xen-project/xen/commit/99a9c3d7141063ae3f357892c6181cfa3be8a280
https://tests.reproducible-builds.org/debian/rb-pkg/unstable/amd64/xen.html
...
xg_offline_page.c: In function 'backup_ptes':
xg_offline_page.c:191:13: error: pointer 'orig' may be used after
2016 Jan 19
0
Bug#805508: Bug#805508: Bug#805508: Bug#805508: Bug#805508: xen: Unable to create HVM domUs
On Tue, 2016-01-19 at 10:39 +0000, Ian Campbell wrote:
> On Thu, 2015-11-26 at 15:16 +0000, Ian Campbell wrote:
> > anything better would need to be arranged upstream.
>
> http://xenbits.xen.org/gitweb/?p=xen.git;a=commit;h=de858271c16851d662b26
> 13
> 699401df6ecec8ef8 has now landed upstream, which allows the leaf dir to
> be
> set at configure time and therefore
2023 Aug 26
0
xen 4.17.2-1 MIGRATED to testing
FYI: The status of the xen source package
in Debian's testing distribution has changed.
Previous version: 4.17.1+2-gb773c48e36-1
Current version: 4.17.2-1
--
This email is automatically generated once a day. As the installation of
new packages into testing happens multiple times a day you will receive
later changes on the next day.
See https://release.debian.org/testing-watch/ for
2017 May 04
2
Bug#861660: Xen package security updates for jessie 4.4, XSA-213, XSA-214
Moritz Muehlenhoff writes ("Re: Xen package security updates for jessie 4.4, XSA-213, XSA-214"):
> On Thu, May 04, 2017 at 05:59:18PM +0100, Ian Jackson wrote:
> > Should I put jessie-security in the debian/changelog and dgit push it
> > (ie, from many people's pov, dput it) ?
>
> Yes, the distribution line should be jessie-security, but please send
> a
2012 Oct 24
1
Upload of fixes for xen-api
Dear release team,
I would like update the Wheezy package of xen-api with numerous small
fixes. These aren't RC bugs, but I believe they are all worth fixing. I
believe that the most important one to fix is #682202.
Here's the changelog:
* Fixes bashism in install-debian-pv.sh (Closes: #690612).
* Fixes bashism in interface-visualise (Closes: #690710).
* The /etc/init.d/xcp-squeezed
2016 Jan 19
2
Bug#805508: Bug#805508: Bug#805508: Bug#805508: xen: Unable to create HVM domUs
On Thu, 2015-11-26 at 15:16 +0000, Ian Campbell wrote:
> anything better would need to be arranged upstream.
http://xenbits.xen.org/gitweb/?p=xen.git;a=commit;h=de858271c16851d662b2613
699401df6ecec8ef8 has now landed upstream, which allows the leaf dir to be
set at configure time and therefore allows the packaging to avoid patching
some stuff.
HVM guests have been broken in Stretch for ages
2002 Jun 11
0
[Bug 271] New: SSHD should unblock SIGCHLD - POSIX signal blocks survive exec()
http://bugzilla.mindrot.org/show_bug.cgi?id=271
Summary: SSHD should unblock SIGCHLD - POSIX signal blocks
survive exec()
Product: Portable OpenSSH
Version: -current
Platform: Other
OS/Version: other
Status: NEW
Severity: enhancement
Priority: P2
Component: sshd
AssignedTo:
2008 Oct 23
2
Unblock the websites you love!
Are you tired of being in your highschool/university classroom or at
work and not being able to visit the website you want? With sfsf loan
you can now unblock popular social networking sites such as Myspace,
Bebo, Facebook and many other sites. Don’t give yourself a heart
attack worrying about being caught surfing the sites you want at work!
Use sfsf loan and your ip cannot be monitored! Get on
2013 Oct 17
0
Processed: unblock 718767 with 710650
Processing commands for control at bugs.debian.org:
> unblock 718767 with 710650
Bug #718767 [release.debian.org] transition: ocaml 4.00.1
718767 was blocked by: 726010 710650
718767 was not blocking any bugs.
Removed blocking bug(s) of 718767: 710650
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
718767:
2003 Jan 07
0
[Bug 271] SSHD should unblock SIGCHLD - POSIX signal blocks survive exec()
http://bugzilla.mindrot.org/show_bug.cgi?id=271
------- Additional Comments From djm at mindrot.org 2003-01-07 18:13 -------
We already reset SIGCHLD to SIG_DFL in main(), maybe we don't do it early enough...
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
2003 May 16
0
[Bug 271] SSHD should unblock SIGCHLD - POSIX signal blocks survive exec()
http://bugzilla.mindrot.org/show_bug.cgi?id=271
------- Additional Comments From djm at mindrot.org 2003-05-16 13:29 -------
Could you verify this with a recent version, preferably including diag output.
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
2017 Jun 10
1
[PATCH] lib: direct, uml: Unblock SIGTERM in the hypervisor and recovery processes (RHBZ#1460338).
If SIGTERM is blocked in the main program, then it ends up still being
blocked in the subprocess after we fork. This means that we cannot
kill qemu by sending SIGTERM to it. This commit fixes the problem by
unblocking SIGTERM unconditionally after fork.
Thanks: wtfuzz on IRC for reporting and analysis.
---
lib/launch-direct.c | 15 +++++++++++++++
lib/launch-uml.c | 11 +++++++++++
2 files
2015 Jan 22
1
Ubuntu delta against 4.5.0-1 in experimental for disussion
On Thu, 2015-01-22 at 16:08 +0100, Stefan Bader wrote:
> On 22.01.2015 13:02, Stefan Bader wrote:
> > Hi,
> >
> > I just finished preparing the Xen-4.5 merge from experimental into our next
> > release (Vivid/15.04). And something I actually should have done since the 4.4
> > times is to report back the delta I have in case there are things Debian might
> >
2012 Sep 06
1
Fwd: [Xen-announce] Xen Security Advisory 19 - guest administrator can access qemu monitor console
Hi everyone at the security team,
I'd like to upload an update of xen-qemu-dm-4.0 in Squeeze. Below is the
Xen Security Advisory as I received it, attached is the patch that they
provided. Both the debdiff and the updated packages are available in here:
http://archive.gplhost.com/pub/security/xen-qemu-dm-4.0/
Please allow me to upload this fix. If you wish, I can prepare a DSA as
well (but