[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#289610: marked as done ("debian vesfb incomplete")



Your message dated Tue, 18 Jan 2005 10:48:09 -0500
with message-id <E1CqvaT-0006it-00@newraff.debian.org>
and subject line Bug#289610: fixed in kernel-source-2.6.10 2.6.10-4
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 10 Jan 2005 02:30:46 +0000
>From afcpack@verizon.net Sun Jan 09 18:30:46 2005
Return-path: <afcpack@verizon.net>
Received: from out001pub.verizon.net (out001.verizon.net) [206.46.170.140] 
	by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
	id 1CnpKQ-0007Wo-00; Sun, 09 Jan 2005 18:30:46 -0800
Received: from localhost.localdomain ([141.153.92.97])
          by out001.verizon.net
          (InterMail vM.5.01.06.06 201-253-122-130-106-20030910) with ESMTP
          id <[🔎] 20050110023045.GZFB28025.out001.verizon.net@localhost.localdomain>;
          Sun, 9 Jan 2005 20:30:45 -0600
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Brian Pack <afcpack@verizon.net>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: kernel-source-2.6.10: console screen blank when vesafb compiled statically
Bcc: Brian Pack <afcpack@verizon.net>
X-Mailer: reportbug 3.5
Date: Sun, 09 Jan 2005 21:30:45 -0500
X-Authentication-Info: Submitted using SMTP AUTH at out001.verizon.net from [141.153.92.97] at Sun, 9 Jan 2005 20:30:45 -0600
Message-Id: <[🔎] 20050110023045.GZFB28025.out001.verizon.net@localhost.localdomain>
Delivered-To: submit@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
	autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: kernel-source-2.6.10
Version: 2.6.10-3
Severity: important

Compiling the kernel with the debianized /drivers/video/vesafb.c
statically results in a blank screen at bootup. Replacing with the
vanilla vesafb.c works.

I patched with the bootsplash-3.1.4-2.6.10.diff from bootsplash.de
before compiling. 

-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Kernel: Linux 2.6.10-20050109
Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1)

Versions of packages kernel-source-2.6.10 depends on:
ii  binutils                      2.15-5     The GNU assembler, linker and bina
ii  bzip2                         1.0.2-3    high-quality block-sorting file co
ii  coreutils [fileutils]         5.2.1-2    The GNU core utilities

-- no debconf information

---------------------------------------
Received: (at 289610-close) by bugs.debian.org; 18 Jan 2005 15:53:17 +0000
>From katie@ftp-master.debian.org Tue Jan 18 07:53:17 2005
Return-path: <katie@ftp-master.debian.org>
Received: from newraff.debian.org [208.185.25.31] (mail)
	by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
	id 1CqvfR-0004gt-00; Tue, 18 Jan 2005 07:53:17 -0800
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
	id 1CqvaT-0006it-00; Tue, 18 Jan 2005 10:48:09 -0500
From: Andres Salomon <dilinger@voxel.net>
To: 289610-close@bugs.debian.org
X-Katie: $Revision: 1.55 $
Subject: Bug#289610: fixed in kernel-source-2.6.10 2.6.10-4
Message-Id: <E1CqvaT-0006it-00@newraff.debian.org>
Sender: Archive Administrator <katie@ftp-master.debian.org>
Date: Tue, 18 Jan 2005 10:48:09 -0500
Delivered-To: 289610-close@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
	autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 
X-CrossAssassin-Score: 2

Source: kernel-source-2.6.10
Source-Version: 2.6.10-4

We believe that the bug you reported is fixed in the latest version of
kernel-source-2.6.10, which is due to be installed in the Debian FTP archive:

kernel-doc-2.6.10_2.6.10-4_all.deb
  to pool/main/k/kernel-source-2.6.10/kernel-doc-2.6.10_2.6.10-4_all.deb
kernel-patch-debian-2.6.10_2.6.10-4_all.deb
  to pool/main/k/kernel-source-2.6.10/kernel-patch-debian-2.6.10_2.6.10-4_all.deb
kernel-source-2.6.10_2.6.10-4.diff.gz
  to pool/main/k/kernel-source-2.6.10/kernel-source-2.6.10_2.6.10-4.diff.gz
kernel-source-2.6.10_2.6.10-4.dsc
  to pool/main/k/kernel-source-2.6.10/kernel-source-2.6.10_2.6.10-4.dsc
kernel-source-2.6.10_2.6.10-4_all.deb
  to pool/main/k/kernel-source-2.6.10/kernel-source-2.6.10_2.6.10-4_all.deb
kernel-tree-2.6.10_2.6.10-4_all.deb
  to pool/main/k/kernel-source-2.6.10/kernel-tree-2.6.10_2.6.10-4_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 289610@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Andres Salomon <dilinger@voxel.net> (supplier of updated kernel-source-2.6.10 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Tue, 18 Jan 2005 02:40:12 -0500
Source: kernel-source-2.6.10
Binary: kernel-doc-2.6.10 kernel-tree-2.6.10 kernel-patch-debian-2.6.10 kernel-source-2.6.10
Architecture: source all
Version: 2.6.10-4
Distribution: unstable
Urgency: low
Maintainer: Debian kernel team <debian-kernel@lists.debian.org>
Changed-By: Andres Salomon <dilinger@voxel.net>
Description: 
 kernel-doc-2.6.10 - Linux kernel specific documentation for version 2.6.10
 kernel-patch-debian-2.6.10 - Debian patches to Linux 2.6.10
 kernel-source-2.6.10 - Linux kernel source for version 2.6.10 with Debian patches
 kernel-tree-2.6.10 - Linux kernel tree for building prepackaged Debian kernel images
Closes: 283241 289610
Changes: 
 kernel-source-2.6.10 (2.6.10-4) unstable; urgency=low
 .
   * Replace smbfs-overflow-fixes.patch with a newer version from 2.6.10-ac
     that actually works.  Thanks to S?ren Hansen <sh@warma.dk> for finding
     and submitting it. (Christoph Hellwig) (closes: #283241).
 .
   * Rework the modular ide patch:
      - dropped support for unloading modules that didn't find devices
      - splited the rest into two patches, one that fixes modular ide
        support and one that fixes __init vs __devinit problems.
     (Christoph Hellwig).
 .
   * Drop alsa-module-load-fix.dpatch, the issue has been fixed in a better
     way upstream. (Christoph Hellwig).
 .
   * Drop drivers-input-psaux-hacks.dpatch, the patch has effictively disabled
     by every architecture setting INPUT_MOUSEDEV_PSAUX_ENABLE to 'y' already.
 .
   * [alpha] Added a workaround for ext3 oops. (Norbert Tretkowski)
 .
   * Fixes emu10k1_fx8010_code_t structure using indirect pointers to be less
     than 8192 bytes to follow the ioctl semantics and thus not break powerpc
     builds. Userland ioctl value is still changed. (Sven Luther and Fabbione)
 .
   * Fix modular-vesafb.dpatch to not break the non-modular case
     (Christoph Hellwig) (closes: #289610).
 .
   * Fix weird alpha IO failures due to typo. (Maximilian Attems)
 .
   * [SECURITY] 033-rlimit_memlock_check.dpatch
     RLIMIT_MEMLOCK isn't checked properly, allowing for a DoS attack.
     See http://seclists.org/lists/fulldisclosure/2005/Jan/0270.html for
     more details.  This patch fixes it, and all reorganizes the stack resize
     stuff a bit (*sigh*) (Andres Salomon).
 .
   * [SECURITY] 034-stack_resize_exploit.dpatch
     Fix exploitable race condition on SMP and HT systems where two
     threads attempt to expand the stack at the same time.  This is
     CAN-2005-0001 (happy new year!) (Andres Salomon).
 .
   * [SECURITY] 035-do_brk_security_fixes-2.dpatch
     Further do_brk fixes; just to be safe, lock everywhere do_brk
     is used (Andres Salomon).
 .
   * Apply patch to fix compat cmsg_len checks (Christoph Hellwig).
 .
   * More modular-vesafb updates/cleanups (Andres Salomon).
 .
   * [SECURITY] 036-rlimit_memlock_check-2.dpatch
     Add missing memory check; needed by 033-rlimit_memlock_check.patch
     (Andres Salomon).
 .
   * 037-sctp_err_lookup_oops.dpatch
     In case of an error, sk never gets set; thus, sock_put(sk) messes up
     (Andres Salomon).
 .
   * 038-ftdi_sio_debug_output.dpatch
     Make ftdi_sio driver output debug message instead of error if attempting
     to write 0 bytes (Andres Salomon).
 .
   * 039-serial_console_resume.dpatch
     Don't assume a port has a tty associated w/ it when resuming
     (Andres Salomon).
 .
   * 040-sk_forward_alloc_underflow.dpatch
     Do not underflow sk_forward_alloc from tcp_sendpage (Andres Salomon).
 .
   * 041-ide_hwif_supress_busy.dpatch
     While probing ide interfaces, supress error messages for non-existent
     ones (Andres Salomon).
 .
   * 042-gx_get_cpuspeed_return_value.dpatch
     gx_get_cpuspeed was returning the wrong value; this fixes it (Andres
     Salomon).
 .
   * 043-dothan_p4_get_frequency.dpatch
     Pentium M (Dothan) model is 0x0d, not 0x13 (Andres Salomon).
 .
   * 044-elevator_noop_add_request.dpatch
     elevator_noop_add_request() ignored the 'where' arg, which specified
     where the request should be added (front, back..) (Andres Salomon).
 .
   * [SPARC64] 045-pci_psycho_brainfart.dpatch
     Incorrect register values are used inside __psycho_check_one_stc if
     PBM type is B (Andres Salomon).
 .
   * 046-ipv6_sit_lock.dpatch
     Fix locking issue inside ipip6_tunnel_link() (Andres Salomon).
 .
   * 047-do_tcp_sendpages_tso_assertion.dpatch
     do_tcp_sendpages() didn't track skb->truesize correctly; this causes
     partially ACK'd TSO frames to potentially corrupt stuff as
     skb->truesize is too small (Andres Salomon).
 .
   * 048-matroxfb_mtrr_ifdef.dpatch
     The mtrr stuff in the matroxfb driver needs to be wrapped w/ CONFIG_MTRR
     ifdefs (Andres Salomon).
 .
   * 050-cfq_requeue_request_accounting.dpatch
     cfq_requeue_request can potentially decrement a counter past 0; we want
     to only decrement it if it's > 0 (Andres Salomon).
Files: 
 6d7e401ba21df7f064342fc9bd9d4607 996 devel optional kernel-source-2.6.10_2.6.10-4.dsc
 7ffbe9ec0bed4f42b9071d51e870ba00 257162 devel optional kernel-source-2.6.10_2.6.10-4.diff.gz
 f5953759469ed5b8922422917b304d80 271734 devel optional kernel-patch-debian-2.6.10_2.6.10-4_all.deb
 9eb8efc831d7e48fad5119f7a1f45b37 35834934 devel optional kernel-source-2.6.10_2.6.10-4_all.deb
 edb5273c4846604c376823640c1018dc 29034 devel optional kernel-tree-2.6.10_2.6.10-4_all.deb
 89510868140164c9a872e5709415685f 6729448 doc optional kernel-doc-2.6.10_2.6.10-4_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (GNU/Linux)

iD8DBQFB7MD178o9R9NraMQRAvT8AJ4i65HcRgRU3L2ilk+V4+6UcDiq/QCff6ae
jZosx3SCwCSr56AVTWB8rCE=
=G/v5
-----END PGP SIGNATURE-----



Reply to: