[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#287933: marked as done (kernel-image-2.6.8-powerpc: [prep] upping the network interface (de4x5DecChip 21140 based) freezes the kernel.)



Your message dated Sun, 09 Jan 2005 08:02:24 -0500
with message-id <E1Cnci8-00012r-00@newraff.debian.org>
and subject line Bug#287933: fixed in kernel-patch-powerpc-2.6.8 2.6.8-9
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 31 Dec 2004 00:00:28 +0000
>From luther@debian.org Thu Dec 30 16:00:28 2004
Return-path: <luther@debian.org>
Received: from smtp10.wanadoo.fr [193.252.22.21] 
	by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
	id 1CkADT-0006xD-00; Thu, 30 Dec 2004 16:00:28 -0800
Received: from me-wanadoo.net (localhost [127.0.0.1])
	by mwinf1002.wanadoo.fr (SMTP Server) with SMTP id 0B0A82400095;
	Fri, 31 Dec 2004 00:59:57 +0100 (CET)
Received: from pegasos (AMontpellier-205-2-3-151.w193-253.abo.wanadoo.fr [193.253.222.151])
	by mwinf1002.wanadoo.fr (SMTP Server) with ESMTP id E4132240008D;
	Fri, 31 Dec 2004 00:59:56 +0100 (CET)
Received: from luther by pegasos with local (Exim 4.34)
	id 1CkAJn-0004xi-NI; Fri, 31 Dec 2004 01:06:59 +0100
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Sven Luther <luther@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: kernel-image-2.6.8-powerpc: [prep] upping the network interface
 (de4x5DecChip 21140 based) freezes the kernel.
X-Mailer: reportbug 3.4
Date: Fri, 31 Dec 2004 01:06:59 +0100
Message-Id: <E1CkAJn-0004xi-NI@pegasos>
Delivered-To: submit@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
	autolearn=no version=2.60-bugs.debian.org_2004_03_25
X-Spam-Level: 

Package: kernel-image-2.6.8-powerpc
Severity: important
Tags: upstream


As the subject says, the motorola powerstack (utah motherboard) has an onboard
decchip 21140 (pci-id 1011:0009), and modprobing the de4x5 module works fine,
but as soon as we access the interface, it freezes the kernel. It was reported
that the same happens with an intel based network card.

A 2.4.12 suse kernel install currently present on the machine doesn't exhibit
this problem.

Friendly,

Sven Luther

-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: powerpc (ppc)
Kernel: Linux 2.4.27-powerpc
Locale: LANG=fr_FR@euro, LC_CTYPE=fr_FR@euro (charmap=ISO-8859-15)


---------------------------------------
Received: (at 287933-close) by bugs.debian.org; 9 Jan 2005 13:08:23 +0000
>From katie@ftp-master.debian.org Sun Jan 09 05:08:23 2005
Return-path: <katie@ftp-master.debian.org>
Received: from newraff.debian.org [208.185.25.31] (mail)
	by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
	id 1Cncnv-0004Kh-00; Sun, 09 Jan 2005 05:08:23 -0800
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
	id 1Cnci8-00012r-00; Sun, 09 Jan 2005 08:02:24 -0500
From: Sven Luther <luther@debian.org>
To: 287933-close@bugs.debian.org
X-Katie: $Revision: 1.54 $
Subject: Bug#287933: fixed in kernel-patch-powerpc-2.6.8 2.6.8-9
Message-Id: <E1Cnci8-00012r-00@newraff.debian.org>
Sender: Archive Administrator <katie@ftp-master.debian.org>
Date: Sun, 09 Jan 2005 08:02:24 -0500
Delivered-To: 287933-close@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
	autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Source: kernel-patch-powerpc-2.6.8
Source-Version: 2.6.8-9

We believe that the bug you reported is fixed in the latest version of
kernel-patch-powerpc-2.6.8, which is due to be installed in the Debian FTP archive:

kernel-build-2.6.8-power3-smp_2.6.8-9_powerpc.deb
  to pool/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power3-smp_2.6.8-9_powerpc.deb
kernel-build-2.6.8-power3_2.6.8-9_powerpc.deb
  to pool/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power3_2.6.8-9_powerpc.deb
kernel-build-2.6.8-power4-smp_2.6.8-9_powerpc.deb
  to pool/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power4-smp_2.6.8-9_powerpc.deb
kernel-build-2.6.8-power4_2.6.8-9_powerpc.deb
  to pool/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power4_2.6.8-9_powerpc.deb
kernel-build-2.6.8-powerpc-smp_2.6.8-9_powerpc.deb
  to pool/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-powerpc-smp_2.6.8-9_powerpc.deb
kernel-build-2.6.8-powerpc_2.6.8-9_powerpc.deb
  to pool/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-powerpc_2.6.8-9_powerpc.deb
kernel-headers-2.6.8_2.6.8-9_powerpc.deb
  to pool/main/k/kernel-patch-powerpc-2.6.8/kernel-headers-2.6.8_2.6.8-9_powerpc.deb
kernel-image-2.6.8-power3-smp_2.6.8-9_powerpc.deb
  to pool/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power3-smp_2.6.8-9_powerpc.deb
kernel-image-2.6.8-power3_2.6.8-9_powerpc.deb
  to pool/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power3_2.6.8-9_powerpc.deb
kernel-image-2.6.8-power4-smp_2.6.8-9_powerpc.deb
  to pool/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power4-smp_2.6.8-9_powerpc.deb
kernel-image-2.6.8-power4_2.6.8-9_powerpc.deb
  to pool/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power4_2.6.8-9_powerpc.deb
kernel-image-2.6.8-powerpc-smp_2.6.8-9_powerpc.deb
  to pool/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-powerpc-smp_2.6.8-9_powerpc.deb
kernel-image-2.6.8-powerpc_2.6.8-9_powerpc.deb
  to pool/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-powerpc_2.6.8-9_powerpc.deb
kernel-patch-powerpc-2.6.8_2.6.8-9.dsc
  to pool/main/k/kernel-patch-powerpc-2.6.8/kernel-patch-powerpc-2.6.8_2.6.8-9.dsc
kernel-patch-powerpc-2.6.8_2.6.8-9.tar.gz
  to pool/main/k/kernel-patch-powerpc-2.6.8/kernel-patch-powerpc-2.6.8_2.6.8-9.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 287933@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Sven Luther <luther@debian.org> (supplier of updated kernel-patch-powerpc-2.6.8 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Sat,  8 Jan 2005 14:47:16 +0100
Source: kernel-patch-powerpc-2.6.8
Binary: kernel-build-2.6.8-power3 kernel-build-2.6.8-power4-smp kernel-build-2.6.8-powerpc kernel-image-2.6.8-power4-smp kernel-build-2.6.8-powerpc-smp kernel-image-2.6.8-power3 kernel-build-2.6.8-power3-smp kernel-image-2.6.8-powerpc-smp kernel-image-2.6.8-power3-smp kernel-image-2.6.8-power4 kernel-image-2.6.8-powerpc kernel-headers-2.6.8 kernel-build-2.6.8-power4
Architecture: source powerpc
Version: 2.6.8-9
Distribution: unstable
Urgency: high
Maintainer: Debian Kernel Team <debian-kernel@lists.debian.org>
Changed-By: Sven Luther <luther@debian.org>
Description: 
 kernel-build-2.6.8-power3 - build infrastructure for kernel version 2.6.8-power3
 kernel-build-2.6.8-power3-smp - build infrastructure for kernel version 2.6.8-power3-smp
 kernel-build-2.6.8-power4 - build infrastructure for kernel version 2.6.8-power4
 kernel-build-2.6.8-power4-smp - build infrastructure for kernel version 2.6.8-power4-smp
 kernel-build-2.6.8-powerpc - build infrastructure for kernel version 2.6.8-powerpc
 kernel-build-2.6.8-powerpc-smp - build infrastructure for kernel version 2.6.8-powerpc-smp
 kernel-headers-2.6.8 - header files for the Linux kernel version 2.6.8
 kernel-image-2.6.8-power3 - Linux kernel image for 2.6.8-power3
 kernel-image-2.6.8-power3-smp - Linux kernel image for 2.6.8-power3-smp
 kernel-image-2.6.8-power4 - Linux kernel image for 2.6.8-power4
 kernel-image-2.6.8-power4-smp - Linux kernel image for 2.6.8-power4-smp
 kernel-image-2.6.8-powerpc - Linux kernel image for 2.6.8-powerpc
 kernel-image-2.6.8-powerpc-smp - Linux kernel image for 2.6.8-powerpc-smp
Closes: 287933
Changes: 
 kernel-patch-powerpc-2.6.8 (2.6.8-9) unstable; urgency=high
 .
   * Built against kernel-source 2.6.8-12 :
     - [powerpc - prep] Fix bad irq assignement for pci devices on motorola
       powerstack boxes. (Closes: #287933) (Sven Luther)
     - add dh_fixperms to the build targets to kernel-patch-debian-2.6.8
       to ensure that the permissions of the files in this package are
       sensible. (See: Bug#288279) (Simon Horman)
     - [SECURITY] Fix vulnerability in the ELF loader code allowing
       local attacker to execute code as root, CAN-2004-1235.
       (Maximilian Attems)
     - Added backport of qla1280 driver from 2.6.10. (Norbert Tretkowski)
     - [SECURITY] 028-do_brk_security_fixes.dpatch
       Drop Marcelo's fix for this; use Linus' instead.
       Fix local root vulnerability for various do_brk() calls;
       ensure an exclusive lock on memory while modifying it; CAN-2004-1235
       (Andres Salomon) (Bug: #289155).
     - [SECURITY] 029-random_poolsize_overflow.dpatch
       drivers/char/random allows you to set the poolsize; its sanity checking
       on that input isn's very good.  We fix that here.
       See http://seclists.org/lists/fulldisclosure/2005/Jan/0270.html for
       more details.  This fixes #3 on that list (Andres Salomon).
     - [SECURITY] 030-moxa_user_copy_checking.dpatch
       The moxa driver does some ugly things w/ signed integers.  This fixes
       #4 on Brad Spengler's advisory (Andres Salomon).
     - [SECURITY] 031-sg_scsi_ioctl_int_overflows.dpatch
       SG ioctl stuff doesn't actually check whether the scsi command length
       is positive.  #5 on the above advisory (Andres Salomon).
Files: 
 478d60daaa698cf4a8491026fbfa10b0 1054 devel optional kernel-patch-powerpc-2.6.8_2.6.8-9.dsc
 49eb2ab67a2a49ffaff55757104b32aa 24294 devel optional kernel-patch-powerpc-2.6.8_2.6.8-9.tar.gz
 f1fa0e4bb702fb4b24f3537bc0bc0b89 5143196 devel optional kernel-headers-2.6.8_2.6.8-9_powerpc.deb
 d5f672f64252e0e2e646b0e72f35606a 13530578 base optional kernel-image-2.6.8-power3_2.6.8-9_powerpc.deb
 fac8dedc504a214dfa69a108d44be2dc 404160 devel optional kernel-build-2.6.8-power3_2.6.8-9_powerpc.deb
 e9970d26a457d37f2124c483515d4dfc 13881108 base optional kernel-image-2.6.8-power3-smp_2.6.8-9_powerpc.deb
 c688b98fee8c59b1ea8f9f74a21809de 404196 devel optional kernel-build-2.6.8-power3-smp_2.6.8-9_powerpc.deb
 21f1be0cb38146767eb5f8a2174241c0 13515792 base optional kernel-image-2.6.8-power4_2.6.8-9_powerpc.deb
 d00119d6eb86cd365101d38266e49c3d 404778 devel optional kernel-build-2.6.8-power4_2.6.8-9_powerpc.deb
 881397584ee3b28282fa154f3bc89c2c 13871238 base optional kernel-image-2.6.8-power4-smp_2.6.8-9_powerpc.deb
 45b90a162f1687409c815ec0d457b3bb 404110 devel optional kernel-build-2.6.8-power4-smp_2.6.8-9_powerpc.deb
 8b806dca46f5215ebe7be5d486e1e652 13546840 base optional kernel-image-2.6.8-powerpc_2.6.8-9_powerpc.deb
 34b9187fb6d2b0153a40cc599ccee30a 404404 devel optional kernel-build-2.6.8-powerpc_2.6.8-9_powerpc.deb
 8d33af484e83965b97b809f40105a383 13801384 base optional kernel-image-2.6.8-powerpc-smp_2.6.8-9_powerpc.deb
 e124e884ecf0ebecc271cad2dce4556f 404258 devel optional kernel-build-2.6.8-powerpc-smp_2.6.8-9_powerpc.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (GNU/Linux)

iD8DBQFB4HnH2WTeT3CRQaQRAvI+AJ4is13hEM/n6QWf9CcrVLJZwrpiRwCeJW17
g+gEoHHznlGpROuiImXbHxY=
=bkVY
-----END PGP SIGNATURE-----



Reply to: