[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#290013: marked as done (kernel-source-2.4.27: apm problem on IBM Thinkpad T40p: no suspend after closing the lid)



Your message dated Thu, 20 Jan 2005 23:17:45 -0500
with message-id <E1CrqEz-00027q-00@newraff.debian.org>
and subject line Bug#290013: fixed in kernel-source-2.4.27 2.4.27-8
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 12 Jan 2005 11:28:44 +0000
>From diederich@l3s.de Wed Jan 12 03:28:44 2005
Return-path: <diederich@l3s.de>
Received: from mrelay3.uni-hannover.de [130.75.2.41] (root)
	by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
	id 1Cogg8-0008J9-00; Wed, 12 Jan 2005 03:28:44 -0800
Received: from server1.learninglab.uni-hannover.de (server1.l3s.uni-hannover.de [130.75.87.1])
	by mrelay3.uni-hannover.de (8.12.10/8.12.10) with ESMTP id j0CBSZ9e023809
	for <submit@bugs.debian.org>; Wed, 12 Jan 2005 12:28:35 +0100 (MET)
Received: from server1.learninglab.uni-hannover.de (server1.learninglab.uni-hannover.de [130.75.87.1])
	by server1.learninglab.uni-hannover.de (Postfix) with SMTP id 94FE41D64005
	for <submit@bugs.debian.org>; Wed, 12 Jan 2005 12:28:35 +0100 (CET)
Received: from diederich by localhost.localdomain with local (Exim 4.34)
	id 1Cogfy-0000Th-RD; Wed, 12 Jan 2005 12:28:34 +0100
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Joerg Diederich <diederich@l3s.de>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: kernel-source-2.4.27: apm problem on IBM Thinkpad T40p: no suspend after
 closing the lid
X-Mailer: reportbug 3.2
Date: Wed, 12 Jan 2005 12:28:34 +0100
Message-Id: <[🔎] E1Cogfy-0000Th-RD@localhost.localdomain>
X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-1.2.2 (mrelay3.uni-hannover.de [130.75.2.41]); Wed, 12 Jan 2005 12:28:35 +0100 (MET)
X-Scanned-By: MIMEDefang 2.42
Delivered-To: submit@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
	autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: kernel-source-2.4.27
Version: 2.4.27-6
Severity: normal

Hi kernel maintainers,

Starting from kernel-source-2.4.27-6, my Thinkpad T40p does not go into
suspend mode when I close the lid (even though I use the 'standard'
kernel-config provided with kernel-image-2.4.27-2, where ACPI and APM
support is compiled in, ACPI is not used according to the output of
dmesg:

ACPI: Subsystem revision 20040326
ACPI: Interpreter disabled.
[...]
apm: BIOS version 1.2 Flags 0x03 (Driver version 1.16)

)

It worked perfectly with the original debian kernel
kernel-image-2.4.27-2 (which is based on kernel-source-2.4.27-5 according
to the changelog). Now I have compiled my own kernel from
kernel-source-2.4.27-6 in two versions:
- including the patch 103-enter-acpi-early.diff (so the original source
  package)
- reverting the patch 103-enter-acpi-early.diff

in the first case, suspend does not work when I close the lid, in the
second case it does. And I do not use any extra kernel modules such as
the thinkpad modules.

For me, it's perfectly possible to work with a self-compiled kernel, but for
this IBM the debian-provided kernel worked out-of-the-box up to version
-2, which is pretty convenient for upgrading to newer version. That's
why I want to report this bug and hope that it can be fixed so that I
can go back to using the debian kernels without recompiling...

Thanks and best regards,

/Joerg

-- System Information:
Debian Release: 3.1
  APT prefers testing
  APT policy: (500, 'testing'), (1, 'experimental')
Architecture: i386 (i686)
Kernel: Linux 2.4.27
Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1)

Versions of packages kernel-source-2.4.27 depends on:
ii  binutils                      2.15-5     The GNU assembler, linker and bina
ii  bzip2                         1.0.2-1    A high-quality block-sorting file 
ii  coreutils [fileutils]         5.2.1-2    The GNU core utilities
ii  fileutils                     5.2.1-2    The GNU file management utilities 

-- no debconf information

---------------------------------------
Received: (at 290013-close) by bugs.debian.org; 21 Jan 2005 04:23:02 +0000
>From katie@ftp-master.debian.org Thu Jan 20 20:23:02 2005
Return-path: <katie@ftp-master.debian.org>
Received: from newraff.debian.org [208.185.25.31] (mail)
	by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
	id 1CrqK6-0001De-00; Thu, 20 Jan 2005 20:23:02 -0800
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
	id 1CrqEz-00027q-00; Thu, 20 Jan 2005 23:17:45 -0500
From: Simon Horman <horms@debian.org>
To: 290013-close@bugs.debian.org
X-Katie: $Revision: 1.55 $
Subject: Bug#290013: fixed in kernel-source-2.4.27 2.4.27-8
Message-Id: <E1CrqEz-00027q-00@newraff.debian.org>
Sender: Archive Administrator <katie@ftp-master.debian.org>
Date: Thu, 20 Jan 2005 23:17:45 -0500
Delivered-To: 290013-close@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
	autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 
X-CrossAssassin-Score: 10

Source: kernel-source-2.4.27
Source-Version: 2.4.27-8

We believe that the bug you reported is fixed in the latest version of
kernel-source-2.4.27, which is due to be installed in the Debian FTP archive:

kernel-doc-2.4.27_2.4.27-8_all.deb
  to pool/main/k/kernel-source-2.4.27/kernel-doc-2.4.27_2.4.27-8_all.deb
kernel-patch-debian-2.4.27_2.4.27-8_all.deb
  to pool/main/k/kernel-source-2.4.27/kernel-patch-debian-2.4.27_2.4.27-8_all.deb
kernel-source-2.4.27_2.4.27-8.diff.gz
  to pool/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-8.diff.gz
kernel-source-2.4.27_2.4.27-8.dsc
  to pool/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-8.dsc
kernel-source-2.4.27_2.4.27-8_all.deb
  to pool/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-8_all.deb
kernel-tree-2.4.27_2.4.27-8_all.deb
  to pool/main/k/kernel-source-2.4.27/kernel-tree-2.4.27_2.4.27-8_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 290013@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Simon Horman <horms@debian.org> (supplier of updated kernel-source-2.4.27 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Tue, 18 Jan 2005 17:15:51 +0900
Source: kernel-source-2.4.27
Binary: kernel-tree-2.4.27 kernel-source-2.4.27 kernel-patch-debian-2.4.27 kernel-doc-2.4.27
Architecture: source all
Version: 2.4.27-8
Distribution: unstable
Urgency: high
Maintainer: Debian Kernel Team <debian-kernel@lists.debian.org>
Changed-By: Simon Horman <horms@debian.org>
Description: 
 kernel-doc-2.4.27 - Linux kernel specific documentation for version 2.4.27
 kernel-patch-debian-2.4.27 - Debian patches to Linux 2.4.27
 kernel-source-2.4.27 - Linux kernel source for version 2.4.27 with Debian patches
 kernel-tree-2.4.27 - Linux kernel tree for building prepackaged Debian kernel images
Closes: 285521 285563 288046 288272 288279 288712 289202 289517 289682 290013 290039
Changes: 
 kernel-source-2.4.27 (2.4.27-8) unstable; urgency=high
 .
   * add dh_fixperms to the build targets to kernel-patch-debian-2.4.27
     to ensure that the permissions of the files in this package are
     sensible. (closes: Bug#288279) (Simon Horman)
   * Turn a make conditional into a runtime conditional to allow debian/rules
     prune to work. (closes: #289682) (Joshua Kwan)
 .
   Patches applied:
 .
   * 121_drm-locking-checks-1.diff, 121_drm-locking-checks-2.diff:
     [SECURITY] Fix insufficient locking checks in DRM code; CAN-2004-1056
     (Fabio M. Di Nitto, Dann Frazier, Simon Horman). (closes: Bug#285563)
   * 122_sec_brk-locked.diff
     [SECURITY] Fix vulnerability in the ELF loader code allowing
     local attacker to execute code as root; CAN-2004-1235. This is better
     known as the "uselib() bug". (closes: #289202) (Maximilian Attems)
   * 123_nfs_verify_eacces.diff
     Return -EACCES instead of -ESTALE to fix some NFS data loss bugs, already
     fixed in 2.6 but not in 2.4. (closes: #288046) (Joshua Kwan)
   * 124_random_poolsize_overflow.diff
     [SECURITY] Fix integer overflow in random poolsize sysctl. (Simon Horman)
   * 125_moxa_bound_checking.diff
     [SECURITY] Fix bounds checking in moxa serial driver. (Simon Horman)
   * 126_rlimit_memlock_dos.diff
     [SECURITY] Fix RLIMIT_MEMLOCK local DoS (Simon Horman)
   * 127_fs_coda_coverty.diff
     [SECURITY] Untrusted user data in kernel. (Maxmilian Attems)
   * 128_net_fose_coverty.diff
     [SECURITY] Fix Coverity reported lack of bounds checking rose_rt_ioctl.
     (Maximilian Attems)
   * 129_net_sdla_coverty.diff
     [SECURITY] Fix sdla_xfer lack of bounds checking, reported by Coverity.
     (Maximilian Attems)
   * 130_fs_xfs_coverty.diff
     [SECURITY] Fix xfs_attrmulti_by_handle lack of bounds checking, reported
     by Coverity. (Maximilian Attems)
   * 131_expand_stack_race.diff
     [SECURITY] Fix expand_stack race in mm.h; see CAN-2005-0001.
   * 127_acpi_off.diff
     Do not do acpi_early_init() if acpi=off is in effect.
     (closes: #290039, #290013, #289517, #288712, #285521, #288272)
     (Simon Horman)
   * 133_strncpy_zero_pad.diff
     [SECURITY] Make sure strncpy null terminates strings. (CAN-2003-0465)
     Fix for s390x, ppc64 and s390. mips and alpha are still unfixed.
     N.B. This bug appears to be minor at best
     http://marc.theaimsgroup.com/?l=linux-kernel&m=105796021120436&w=2
     (See: #280492) (Simon Horman)
Files: 
 97a63b4b0cc25c21e5609fe7c2897caa 886 devel optional kernel-source-2.4.27_2.4.27-8.dsc
 8deef7c6d5f1ebd677253e4a3d326c4a 783407 devel optional kernel-source-2.4.27_2.4.27-8.diff.gz
 ab7999be4aeddae6e37ccaf2f397459f 581928 devel optional kernel-patch-debian-2.4.27_2.4.27-8_all.deb
 2f63270d257f724340f0a4f410fcb373 3576122 doc optional kernel-doc-2.4.27_2.4.27-8_all.deb
 0152552abefd29eb1c39d88e620fb8a8 31048618 devel optional kernel-source-2.4.27_2.4.27-8_all.deb
 d6f3103bc5394fefccdcbe070aefcd36 21286 devel optional kernel-tree-2.4.27_2.4.27-8_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (GNU/Linux)

iD8DBQFB724Rdu+M6Iexz7URAjijAJ4hi05/cAN+LPp98oTvzZhgsYkTqQCePK3u
ev8Lo7eV6856leEC/UAWtj4=
=NBFC
-----END PGP SIGNATURE-----



Reply to: