similar to: Bug#1063270: xen: NMU diff for 64-bit time_t transition

Displaying 20 results from an estimated 300 matches similar to: "Bug#1063270: xen: NMU diff for 64-bit time_t transition"

2024 Aug 25
1
Your xen stable upload
Hi Adam, On 8/25/24 15:26, Adam D. Barratt wrote: > > I noticed that there's a xen upload in the stable-new queue, which > claims to have been uploaded by you. > > I'm afraid that we can't accept it currently, because it is a newer > version than is currently in unstable and testing: > > xen | 4.17.3+10-g091466ba55-1~deb12u1 | stable |
2024 Aug 25
1
Your xen stable upload
Hi, I noticed that there's a xen upload in the stable-new queue, which claims to have been uploaded by you. I'm afraid that we can't accept it currently, because it is a newer version than is currently in unstable and testing: xen | 4.17.3+10-g091466ba55-1~deb12u1 | stable | source xen | 4.17.3+10-g091466ba55-1~deb12u1 | stable-debug | source xen
2024 Mar 09
3
Bug#1065794: xen: FTBFS on armhf: xenstored_control.c:646:70: error: format ‘%ld’ expects argument of type ‘long int’, but argument 5 has type ‘time_t’ {aka ‘long long int’} [-Werror=format=]
Source: xen Version: 4.17.3+10-g091466ba55-1.1 Severity: serious Tags: ftbfs Justification: fails to build from source (but built successfully in the past) X-Debbugs-Cc: sramacher at debian.org https://buildd.debian.org/status/fetch.php?pkg=xen&arch=armhf&ver=4.17.3%2B10-g091466ba55-1.1&stamp=1709892742&raw=0 xenstored_control.c:646:70: error: format ?%ld? expects argument of
2024 Apr 26
0
xen 4.17.3+36-g54dacb5c02-1 MIGRATED to testing
FYI: The status of the xen source package in Debian's testing distribution has changed. Previous version: 4.17.3+10-g091466ba55-1 Current version: 4.17.3+36-g54dacb5c02-1 -- This email is automatically generated once a day. As the installation of new packages into testing happens multiple times a day you will receive later changes on the next day. See
2024 Sep 03
1
Bug#988477: xen-hypervisor-4.14-amd64: xen dmesg shows (XEN) AMD-Vi: IO_PAGE_FAULT on sata pci device
found 988477 4.17.3+10-g091466ba55-1~deb12u1 severity 988477 critical quit Justification is same as original, data loss. I'm unsure about of the border between "data loss" and "serious data loss" is, but the original reportter declared it so and I don't disagree. On Sun, Aug 25, 2024 at 11:41:44PM +0200, Maximilian Engelhardt wrote: > I am changing the severity
2024 Mar 19
0
Bug#1067152: xen-utils-common: remove IPv6 link locals from switched interfaces
Package: src:xen Version: 4.17.3+10-g091466ba55-1~deb12u1 Severity: wishlist I wasn't sure if this script comes from Debian or Xen or somewhere else, so I thought it safest to report it here. IPv6 on the Dom0 should be removed from switched/bridged interfaces. Earlier I would just sysctl disable_ipv6 on the interface, but the below diff seems to remove the link local address too. I've
2024 Mar 19
2
Bug#1067151: xen-utils-common: vif-openvswitch ignores MTU
Package: src:xen Version: 4.17.3+10-g091466ba55-1~deb12u1 Severity: wishlist I wasn't sure if this script comes from Debian or Xen or somewhere else, so I thought it safest to report it here. /etc/xen/scripts/vif-bridge handles MTU settings in the vif, but the otherwise similar /etc/xen/scripts/vif-openvswitch does not. I added it in, here's the diff-c and the full fixed file is also
2018 Apr 08
0
Success : clang/LLVM-built host kernel and clang-built VMware kernel modules for VMware Player 14.1.1 on host Ubuntu 17.10 x86_64
Hello All, As part of my clang/LLVM experiments and explorations with different clang-built kernel versions, I have tried to bring up other Linux/Ubuntu applications with their kernel modules also being clang-built. One such case has been with VMware Player 14.1.1. I am sharing this report for interested people that highlights my research and success in overcoming and solving the challenges in
2023 Jan 30
1
Need to know Samba version addressing "CVE-2018-14628" fix
Hi Team, We are looking for Security Release Version / patch for "CVE-2018-14628<https://attachments.samba.org/attachment.cgi?id=14477>". The above CVE says : All versions of Samba from 4.0.0 onwards are vulnerable to an information leak (compared with the established behaviour of Microsoft's Active Directory) when Samba is an Active Directory Domain Controller. A patch
2020 Jun 06
1
[PATCH] v2v: fix spelling errors in Python comments
These were flagged by the [Lintian] [spelling-error-in-binary] rule. [Lintian]: https://github.com/Debian/lintian [spelling-error-in-binary]: https://lintian.debian.org/tags/spelling-error-in-binary.html Signed-off-by: Kevin Locke <kevin@kevinlocke.name> --- v2v/rhv-upload-plugin.py | 4 ++-- v2v/rhv-upload-vmcheck.py | 2 +- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git
2019 Jul 25
0
NOTICE: Update Debian samba 4.10.6 (stretch)
Hai, ? We have noticed a depency that was missing in the latest 4.10.6 builds.? Affected are Debian Stretch and Buster. ? If you where running samba 4.10.5 and upgraded you might not?notice this problem. If you did not use samba-tool, you might not have noticed it. New installs?and people building from my sources did noticed it. ? Thank you guys for the reports ! @Marcio Demetrio Bacci
2018 Jun 22
0
Samba 4.7.8 Available for Debian Stretch (amd64/i386)
Hai. I've finished the 4.7.8 package for Debian Stretch. You can find them in the repo stretch-unstable. (Note, these are not unstable, but a bad choice of words was made here.) This version is alligned with the debian samba patches up to 4.8.2, but adapted in this 4.7.8. The Build logs can be found here: http://downloads.van-belle.nl/samba4/Buildlogs/stretch/ So, i've made a few
2018 Feb 26
0
v4.16-rc2: virtio-block + ext4 lockdep splats / sleeping from invalid context
On Fri 23-02-18 15:47:36, Mark Rutland wrote: > Hi all, > > While fuzzing arm64/v4.16-rc2 with syzkaller, I simultaneously hit a > number of splats in the block layer: > > * inconsistent {HARDIRQ-ON-W} -> {IN-HARDIRQ-R} usage in > jbd2_trans_will_send_data_barrier > > * BUG: sleeping function called from invalid context at mm/mempool.c:320 > > * WARNING:
2018 Aug 23
2
xen_4.11.1~pre+1.733450b39b-1~exp1_multi.changes REJECTED
xen source: lintian output: 'license-problem-gfdl-invariants stubdom/grub.patches/00cvs invariant part is: with no invariant sections, with the front-cover texts being a gnu manual, and with the back-cover texts as in (a) below', automatically rejected package. xen source: If you have a good reason, you may override this lintian tag. xen-utils-4.11: lintian output:
2023 Jul 20
3
Bug#1041533: xen-system-amd64: Xen fails to start hvm type VMs when a vncpasswd is set
Package: xen-system-amd64 Version: 4.17.1+2-gb773c48e36-1 Severity: important Dear Maintainer, after upgrading my bullseye server to bookworm I ran into the issue that all VMs of type hvm are not starting anymore. xl throws an error: libxl: error: libxl_qmp.c:1399:qmp_ev_fd_callback: Domain 8:error on QMP socket: Connection reset by peer libxl: error: libxl_qmp.c:1438:qmp_ev_fd_callback: Domain
2018 Mar 30
0
debian lintian warn: hardening-no-fortify-functions
> On 30 March 2018 at 15:08 "A. Schulze" <sca at andreasschulze.de> wrote: > > > Hello, > > to build + packages dovecot I use the usual Debian tool chain. That includes build with selected GCC options and running lintian. > > I notice since a long time (read: many earlier versions, up to 2.2.35) this lintian warnings: > > I: dovecot-core:
2010 Apr 02
1
hivex: lintain being pedantic about spelling!
Thanks very much for the responses on my last three issues. I've incorporated the appropriate changes into the budding Debian package. I feel embarrassed to raise this one, but in the interests of shutting lintian up maybe this could be fixed at some point: I: hivex: spelling-error-in-manpage usr/share/man/man1/hivexregedit.1.gz reencode re-encode I: libhivex-perl: spelling-error-in-manpage
2018 Feb 23
2
v4.16-rc2: virtio-block + ext4 lockdep splats / sleeping from invalid context
Hi all, While fuzzing arm64/v4.16-rc2 with syzkaller, I simultaneously hit a number of splats in the block layer: * inconsistent {HARDIRQ-ON-W} -> {IN-HARDIRQ-R} usage in jbd2_trans_will_send_data_barrier * BUG: sleeping function called from invalid context at mm/mempool.c:320 * WARNING: CPU: 0 PID: 0 at block/blk.h:297 generic_make_request_checks+0x670/0x750 ... I've included the
2018 Feb 23
2
v4.16-rc2: virtio-block + ext4 lockdep splats / sleeping from invalid context
Hi all, While fuzzing arm64/v4.16-rc2 with syzkaller, I simultaneously hit a number of splats in the block layer: * inconsistent {HARDIRQ-ON-W} -> {IN-HARDIRQ-R} usage in jbd2_trans_will_send_data_barrier * BUG: sleeping function called from invalid context at mm/mempool.c:320 * WARNING: CPU: 0 PID: 0 at block/blk.h:297 generic_make_request_checks+0x670/0x750 ... I've included the
2023 May 23
4
Bug#1036601: xenstore-utils: missing Depends: xen-utils-common
Package: xenstore-utils Version: 4.17.0+74-g3eac216e6e-1 Severity: serious User: debian-qa at lists.debian.org Usertags: piuparts Hi, during a test with piuparts I noticed your package ships (or creates) a broken symlink: 0m15.9s ERROR: FAIL: Broken symlinks: /usr/bin/xenstore-control -> ../lib/xen-common/bin/xen-utils-wrapper (xenstore-utils) cheers, Andreas