Your message dated Thu, 22 Sep 2005 05:17:30 -0700 with message-id <[EMAIL PROTECTED]> and subject line Bug#328534: fixed in linux-2.6 2.6.12-7 has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -------------------------------------- Received: (at submit) by bugs.debian.org; 15 Sep 2005 22:12:49 +0000 >From [EMAIL PROTECTED] Thu Sep 15 15:12:49 2005 Return-path: <[EMAIL PROTECTED]> Received: from relay.cdlan.net [217.171.33.200] by spohr.debian.org with esmtp (Exim 3.36 1 (Debian)) id 1EG1yL-0007PQ-00; Thu, 15 Sep 2005 15:12:49 -0700 Received: from cdlan.net (unknown [217.171.42.48]) by relay.cdlan.net (Postfix) with SMTP id A9B1C124DD; Fri, 16 Sep 2005 00:12:19 +0200 (CEST) Received: (nullmailer pid 8597 invoked by uid 1000); Thu, 15 Sep 2005 22:12:20 -0000 Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit From: Luca Corti <[EMAIL PROTECTED]> To: Debian Bug Tracking System <[EMAIL PROTECTED]> Subject: Kernel panic on Adaptec 2100S on boot X-Mailer: reportbug 3.17 Date: Fri, 16 Sep 2005 00:12:20 +0200 Message-Id: <[EMAIL PROTECTED]> Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Level: X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2005_01_02 Package: linux-image-2.6.12-1-686-smp Severity: critical -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 This is fixed in 2.6.13-rc7. See http://bugzilla.kernel.org/show_bug.cgi?id=4940. The attached patch is taken from bugzilla. - --- dpt_i2o.c.orig 2005-08-08 08:25:46.888900616 -0400 +++ dpt_i2o.c 2005-08-08 08:30:48.062596580 -0400 @@ -1228,8 +1228,13 @@ hba_map0_area_size = 524288; } + if (pci_request_regions(pDev)) { + PERROR("dpti: adpt_config_hba: pci request region failed\n"); + return -EINVAL; + } base_addr_virt = ioremap(base_addr0_phys,hba_map0_area_size); if(!base_addr_virt) { + pci_release_regions(pDev); PERROR("dpti: adpt_config_hba: io remap failed\n"); return -EINVAL; } @@ -1239,6 +1244,7 @@ if(!msg_addr_virt) { PERROR("dpti: adpt_config_hba: io remap failed on BAR1 \n"); iounmap(base_addr_virt); + pci_release_regions(pDev); return -EINVAL; } } else { @@ -1252,6 +1258,7 @@ iounmap(msg_addr_virt); } iounmap(base_addr_virt); + pci_release_regions(pDev); return -ENOMEM; } memset(pHba, 0, sizeof(adpt_hba)); @@ -1345,6 +1352,7 @@ up(&adpt_configuration_lock); iounmap(pHba->base_addr_virt); + pci_release_regions(pHba->pDev); if(pHba->msg_addr_virt != pHba->base_addr_virt){ iounmap(pHba->msg_addr_virt); } - -- System Information: Debian Release: testing/unstable APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.12-1-k7 Locale: LANG=en_IN, LC_CTYPE=en_IN (charmap=UTF-8) -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.1 (GNU/Linux) iD8DBQFDKfHECUBS9R84wJERArvSAKDklqeeP5arwPWLmngMxlyLyqHQEgCfWmqH +yGtR03pwwy65hGN8HsR6OA= =TL9H -----END PGP SIGNATURE----- --------------------------------------- Received: (at 328534-close) by bugs.debian.org; 22 Sep 2005 12:18:45 +0000 >From [EMAIL PROTECTED] Thu Sep 22 05:18:45 2005 Return-path: <[EMAIL PROTECTED]> Received: from katie by spohr.debian.org with local (Exim 3.36 1 (Debian)) id 1EIQ14-0006BF-00; Thu, 22 Sep 2005 05:17:30 -0700 From: Simon Horman <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] X-Katie: $Revision: 1.56 $ Subject: Bug#328534: fixed in linux-2.6 2.6.12-7 Message-Id: <[EMAIL PROTECTED]> Sender: Archive Administrator <[EMAIL PROTECTED]> Date: Thu, 22 Sep 2005 05:17:30 -0700 Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Level: X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-CrossAssassin-Score: 4 Source: linux-2.6 Source-Version: 2.6.12-7 We believe that the bug you reported is fixed in the latest version of linux-2.6, which is due to be installed in the Debian FTP archive: kernel-image-2.6-386_2.6.12-7_i386.deb to pool/main/l/linux-2.6/kernel-image-2.6-386_2.6.12-7_i386.deb kernel-image-2.6-686-smp_2.6.12-7_i386.deb to pool/main/l/linux-2.6/kernel-image-2.6-686-smp_2.6.12-7_i386.deb kernel-image-2.6-686_2.6.12-7_i386.deb to pool/main/l/linux-2.6/kernel-image-2.6-686_2.6.12-7_i386.deb kernel-image-2.6-k7-smp_2.6.12-7_i386.deb to pool/main/l/linux-2.6/kernel-image-2.6-k7-smp_2.6.12-7_i386.deb kernel-image-2.6-k7_2.6.12-7_i386.deb to pool/main/l/linux-2.6/kernel-image-2.6-k7_2.6.12-7_i386.deb linux-2.6_2.6.12-7.diff.gz to pool/main/l/linux-2.6/linux-2.6_2.6.12-7.diff.gz linux-2.6_2.6.12-7.dsc to pool/main/l/linux-2.6/linux-2.6_2.6.12-7.dsc linux-doc-2.6.12_2.6.12-7_all.deb to pool/main/l/linux-2.6/linux-doc-2.6.12_2.6.12-7_all.deb linux-headers-2.6-386_2.6.12-7_i386.deb to pool/main/l/linux-2.6/linux-headers-2.6-386_2.6.12-7_i386.deb linux-headers-2.6-686-smp_2.6.12-7_i386.deb to pool/main/l/linux-2.6/linux-headers-2.6-686-smp_2.6.12-7_i386.deb linux-headers-2.6-686_2.6.12-7_i386.deb to pool/main/l/linux-2.6/linux-headers-2.6-686_2.6.12-7_i386.deb linux-headers-2.6-k7-smp_2.6.12-7_i386.deb to pool/main/l/linux-2.6/linux-headers-2.6-k7-smp_2.6.12-7_i386.deb linux-headers-2.6-k7_2.6.12-7_i386.deb to pool/main/l/linux-2.6/linux-headers-2.6-k7_2.6.12-7_i386.deb linux-headers-2.6.12-1-386_2.6.12-7_i386.deb to pool/main/l/linux-2.6/linux-headers-2.6.12-1-386_2.6.12-7_i386.deb linux-headers-2.6.12-1-686-smp_2.6.12-7_i386.deb to pool/main/l/linux-2.6/linux-headers-2.6.12-1-686-smp_2.6.12-7_i386.deb linux-headers-2.6.12-1-686_2.6.12-7_i386.deb to pool/main/l/linux-2.6/linux-headers-2.6.12-1-686_2.6.12-7_i386.deb linux-headers-2.6.12-1-k7-smp_2.6.12-7_i386.deb to pool/main/l/linux-2.6/linux-headers-2.6.12-1-k7-smp_2.6.12-7_i386.deb linux-headers-2.6.12-1-k7_2.6.12-7_i386.deb to pool/main/l/linux-2.6/linux-headers-2.6.12-1-k7_2.6.12-7_i386.deb linux-headers-2.6.12-1_2.6.12-7_i386.deb to pool/main/l/linux-2.6/linux-headers-2.6.12-1_2.6.12-7_i386.deb linux-image-2.6-386_2.6.12-7_i386.deb to pool/main/l/linux-2.6/linux-image-2.6-386_2.6.12-7_i386.deb linux-image-2.6-686-smp_2.6.12-7_i386.deb to pool/main/l/linux-2.6/linux-image-2.6-686-smp_2.6.12-7_i386.deb linux-image-2.6-686_2.6.12-7_i386.deb to pool/main/l/linux-2.6/linux-image-2.6-686_2.6.12-7_i386.deb linux-image-2.6-k7-smp_2.6.12-7_i386.deb to pool/main/l/linux-2.6/linux-image-2.6-k7-smp_2.6.12-7_i386.deb linux-image-2.6-k7_2.6.12-7_i386.deb to pool/main/l/linux-2.6/linux-image-2.6-k7_2.6.12-7_i386.deb linux-image-2.6.12-1-386_2.6.12-7_i386.deb to pool/main/l/linux-2.6/linux-image-2.6.12-1-386_2.6.12-7_i386.deb linux-image-2.6.12-1-686-smp_2.6.12-7_i386.deb to pool/main/l/linux-2.6/linux-image-2.6.12-1-686-smp_2.6.12-7_i386.deb linux-image-2.6.12-1-686_2.6.12-7_i386.deb to pool/main/l/linux-2.6/linux-image-2.6.12-1-686_2.6.12-7_i386.deb linux-image-2.6.12-1-k7-smp_2.6.12-7_i386.deb to pool/main/l/linux-2.6/linux-image-2.6.12-1-k7-smp_2.6.12-7_i386.deb linux-image-2.6.12-1-k7_2.6.12-7_i386.deb to pool/main/l/linux-2.6/linux-image-2.6.12-1-k7_2.6.12-7_i386.deb linux-image-386_2.6.12-7_i386.deb to pool/main/l/linux-2.6/linux-image-386_2.6.12-7_i386.deb linux-image-686-smp_2.6.12-7_i386.deb to pool/main/l/linux-2.6/linux-image-686-smp_2.6.12-7_i386.deb linux-image-686_2.6.12-7_i386.deb to pool/main/l/linux-2.6/linux-image-686_2.6.12-7_i386.deb linux-image-k7-smp_2.6.12-7_i386.deb to pool/main/l/linux-2.6/linux-image-k7-smp_2.6.12-7_i386.deb linux-image-k7_2.6.12-7_i386.deb to pool/main/l/linux-2.6/linux-image-k7_2.6.12-7_i386.deb linux-patch-debian-2.6.12_2.6.12-7_all.deb to pool/main/l/linux-2.6/linux-patch-debian-2.6.12_2.6.12-7_all.deb linux-source-2.6.12_2.6.12-7_all.deb to pool/main/l/linux-2.6/linux-source-2.6.12_2.6.12-7_all.deb linux-tree-2.6.12_2.6.12-7_all.deb to pool/main/l/linux-2.6/linux-tree-2.6.12_2.6.12-7_all.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Simon Horman <[EMAIL PROTECTED]> (supplier of updated linux-2.6 package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Thu, 22 Sep 2005 16:04:03 +0900 Source: linux-2.6 Binary: linux-image-sun3 linux-image-2.6-powerpc-miboot linux-headers-2.6.12-1-s390x linux-image-2.6-footbridge linux-image-2.6-parisc64 linux-image-2.6-amd64-generic kernel-image-2.6-686-smp linux-headers-2.6.12-1-amd64-generic linux-headers-2.6-atari kernel-image-2.6-386 linux-headers-2.6-s390 linux-image-2.6.12-1-rpc linux-image-2.6.12-1-mvme147 linux-image-mvme16x linux-image-2.6.12-1-sparc64 linux-headers-2.6.12-1-powerpc-smp linux-image-itanium linux-image-2.6-amd64-k8-smp linux-image-2.6.12-1-mckinley-smp linux-image-2.6-rpc linux-image-2.6-s390 linux-image-q40 linux-headers-2.6.12-1 linux-headers-2.6-sparc64-smp linux-headers-2.6-mvme147 linux-image-2.6.12-1-bvme6000 linux-image-footbridge kernel-image-2.6-itanium-smp linux-image-2.6.12-1-powerpc-miboot linux-headers-2.6-686-smp linux-image-atari linux-image-2.6.12-1-mckinley linux-image-2.6-q40 kernel-image-2.6-k7-smp linux-image-2.6.12-1-powerpc linux-headers-2.6-powerpc-miboot linux-headers-2.6.12-1-itanium-smp linux-image-2.6.12-1-parisc-smp linux-image-s390 linux-headers-2.6.12-1-s390 linux-headers-2.6.12-1-k7-smp linux-image-2.6-itanium linux-image-parisc-smp linux-image-2.6.12-1-parisc linux-headers-2.6.12-1-amd64-k8-smp linux-image-amd64-k8-smp linux-headers-2.6.12-1-parisc64 linux-image-2.6-parisc-smp linux-image-2.6.12-1-itanium linux-headers-2.6.12-1-386 linux-headers-2.6-amd64-generic linux-image-2.6-mckinley-smp linux-image-amiga linux-image-2.6-k7 linux-image-mckinley-smp linux-image-em64t-p4-smp linux-image-2.6-powerpc linux-image-parisc64-smp linux-headers-2.6-s3c2410 linux-image-2.6-hp linux-image-sparc64-smp linux-tree-2.6.12 linux-headers-2.6.12-1-mac linux-headers-2.6-parisc64-smp linux-headers-2.6.12-1-mckinley-smp linux-image-2.6-parisc64-smp kernel-image-2.6-mckinley linux-image-powerpc-smp linux-headers-2.6-itanium-smp kernel-image-2.6-power3 kernel-image-2.6-powerpc kernel-image-2.6-generic linux-headers-2.6-mvme16x linux-image-2.6-alpha-generic linux-headers-2.6-amd64-k8-smp linux-image-2.6-em64t-p4 linux-headers-2.6.12-1-em64t-p4-smp linux-headers-2.6-powerpc linux-image-hp linux-headers-2.6-em64t-p4-smp kernel-image-powerpc-smp linux-headers-2.6-sparc64 linux-image-2.6.12-1-mac linux-headers-2.6.12-1-parisc linux-image-powerpc64 linux-headers-2.6-hp linux-headers-2.6-powerpc64 linux-headers-2.6.12-1-q40 linux-headers-2.6.12-1-686 linux-headers-2.6.12-1-alpha-smp linux-headers-2.6.12-1-sparc64 linux-headers-2.6.12-1-alpha-generic linux-headers-2.6.12-1-ixp4xx linux-headers-2.6.12-1-powerpc-miboot linux-image-2.6.12-1-q40 linux-image-2.6.12-1-em64t-p4 linux-headers-2.6-mac linux-headers-2.6.12-1-mvme16x linux-source-2.6.12 linux-headers-2.6-em64t-p4 linux-headers-2.6-rpc linux-image-2.6-mckinley linux-headers-2.6.12-1-amiga linux-patch-debian-2.6.12 linux-headers-2.6-alpha-generic linux-image-2.6.12-1-parisc64 linux-headers-2.6-bvme6000 kernel-image-2.6-sparc64-smp kernel-image-powerpc linux-image-bvme6000 linux-headers-2.6-alpha-smp linux-image-2.6.12-1-sun3 linux-image-2.6-atari linux-image-2.6.12-1-atari linux-image-s3c2410 linux-headers-2.6-386 linux-headers-2.6-sun3 linux-image-2.6.12-1-386 linux-headers-2.6.12-1-itanium linux-headers-2.6-mckinley-smp kernel-image-2.6-power4-smp linux-image-parisc64 linux-image-2.6.12-1-ixp4xx linux-image-k7-smp linux-image-2.6.12-1-alpha-generic linux-doc-2.6.12 linux-image-386 kernel-image-power3-smp linux-headers-2.6.12-1-sparc64-smp linux-image-2.6-parisc linux-headers-2.6.12-1-sun3 linux-image-2.6-bvme6000 linux-image-mckinley linux-headers-2.6.12-1-k7 linux-image-2.6.12-1-k7-smp linux-image-itanium-smp linux-image-2.6-sparc64-smp linux-headers-2.6-s390x linux-headers-2.6-parisc linux-image-2.6.12-1-amiga linux-image-2.6.12-1-powerpc-smp linux-headers-2.6.12-1-footbridge linux-image-2.6-ixp4xx linux-headers-2.6-q40 linux-image-2.6.12-1-s3c2410 linux-headers-2.6.12-1-atari kernel-image-2.6-k7 linux-headers-2.6.12-1-bvme6000 linux-image-2.6.12-1-amd64-k8-smp linux-image-ixp4xx linux-image-rpc linux-image-2.6-mac linux-headers-2.6.12-1-mvme147 linux-headers-2.6.12-1-parisc64-smp kernel-image-2.6-power3-smp linux-image-2.6-s390x kernel-image-2.6-smp linux-image-2.6.12-1-sparc64-smp linux-headers-2.6.12-1-powerpc linux-image-2.6.12-1-686-smp linux-image-alpha-smp linux-image-2.6.12-1-footbridge linux-headers-2.6.12-1-686-smp linux-image-2.6-amd64-k8 linux-image-parisc linux-headers-2.6-footbridge linux-image-2.6.12-1-686 linux-image-2.6.12-1-mvme16x linux-image-2.6-sparc64 linux-image-amd64-k8 linux-headers-2.6.12-1-mckinley kernel-image-power4 linux-image-2.6.12-1-k7 linux-image-2.6-s3c2410 linux-headers-2.6.12-1-parisc-smp linux-headers-2.6.12-1-em64t-p4 linux-headers-2.6-k7-smp linux-headers-2.6-mckinley linux-headers-2.6.12-1-rpc linux-image-em64t-p4 linux-image-2.6-686-smp linux-image-2.6.12-1-itanium-smp linux-image-2.6-mvme147 linux-headers-2.6-ixp4xx linux-image-2.6.12-1-amd64-k8 linux-image-powerpc-miboot linux-image-mvme147 linux-image-686-smp linux-image-2.6-alpha-smp linux-image-686 linux-image-2.6.12-1-s390x linux-headers-2.6.12-1-s3c2410 linux-headers-2.6-k7 linux-image-k7 linux-image-2.6-powerpc-smp linux-image-alpha-generic linux-image-s390x linux-image-2.6.12-1-alpha-smp linux-headers-2.6-686 linux-headers-2.6.12-1-powerpc64 linux-image-2.6.12-1-em64t-p4-smp linux-image-2.6-itanium-smp kernel-image-2.6-powerpc-smp linux-image-2.6-amiga linux-image-2.6.12-1-parisc64-smp linux-image-2.6-mvme16x linux-image-2.6.12-1-amd64-generic linux-headers-2.6.12-1-hp linux-headers-2.6-amiga linux-image-2.6-sun3 kernel-image-2.6-s390x linux-image-powerpc kernel-image-2.6-mckinley-smp linux-headers-2.6-parisc64 kernel-image-power3 linux-image-2.6-powerpc64 linux-headers-2.6-amd64-k8 linux-image-2.6.12-1-powerpc64 linux-headers-2.6-parisc-smp kernel-image-power4-smp linux-image-mac linux-image-2.6-386 kernel-image-2.6-sparc64 kernel-image-2.6-power4 linux-image-amd64-generic linux-headers-2.6.12-1-amd64-k8 kernel-image-2.6-itanium linux-image-2.6.12-1-hp linux-image-2.6.12-1-s390 linux-image-sparc64 linux-image-2.6-em64t-p4-smp linux-headers-2.6-itanium linux-headers-2.6-powerpc-smp linux-image-2.6-k7-smp linux-image-2.6-686 kernel-image-2.6-s390 kernel-image-2.6-686 Architecture: source i386 all Version: 2.6.12-7 Distribution: unstable Urgency: high Maintainer: Debian Kernel Team <debian-kernel@lists.debian.org> Changed-By: Simon Horman <[EMAIL PROTECTED]> Description: kernel-image-2.6-386 - Linux kernel 2.6.12 image on 386-class machines - transition pack kernel-image-2.6-686 - Linux kernel 2.6 image on PPro/Celeron/PII/PIII/P4 machines - tra kernel-image-2.6-686-smp - Linux kernel 2.6 image on PPro/Celeron/PII/PIII/P4 SMP machines - kernel-image-2.6-k7 - Linux kernel 2.6 image on AMD K7 machines - transition package kernel-image-2.6-k7-smp - Linux kernel 2.6 image on AMD K7 SMP machines - transition packag linux-doc-2.6.12 - Linux kernel specific documentation for version 2.6.12 linux-headers-2.6-386 - Architecture-specific header files for Linux kernel 2.6 on 386-cl linux-headers-2.6-686 - Architecture-specific header files for Linux kernel 2.6 on PPro/C linux-headers-2.6-686-smp - Architecture-specific header files for Linux kernel 2.6 on PPro/C linux-headers-2.6-k7 - Architecture-specific header files for Linux kernel 2.6 on AMD K7 linux-headers-2.6-k7-smp - Architecture-specific header files for Linux kernel 2.6 on AMD K7 linux-headers-2.6.12-1 - Common architecture-specific header files for Linux kernel 2.6.12 linux-headers-2.6.12-1-386 - Architecture-specific header files for Linux kernel 2.6.12 on 386 linux-headers-2.6.12-1-686 - Architecture-specific header files for Linux kernel 2.6.12 on PPr linux-headers-2.6.12-1-686-smp - Architecture-specific header files for Linux kernel 2.6.12 on PPr linux-headers-2.6.12-1-k7 - Architecture-specific header files for Linux kernel 2.6.12 on AMD linux-headers-2.6.12-1-k7-smp - Architecture-specific header files for Linux kernel 2.6.12 on AMD linux-image-2.6-386 - Linux kernel 2.6 image on 386-class machines linux-image-2.6-686 - Linux kernel 2.6 image on PPro/Celeron/PII/PIII/P4 machines linux-image-2.6-686-smp - Linux kernel 2.6 image on PPro/Celeron/PII/PIII/P4 SMP machines linux-image-2.6-k7 - Linux kernel 2.6 image on AMD K7 machines linux-image-2.6-k7-smp - Linux kernel 2.6 image on AMD K7 SMP machines linux-image-2.6.12-1-386 - Linux kernel 2.6.12 image on 386-class machines linux-image-2.6.12-1-686 - Linux kernel 2.6.12 image on PPro/Celeron/PII/PIII/P4 machines linux-image-2.6.12-1-686-smp - Linux kernel 2.6.12 image on PPro/Celeron/PII/PIII/P4 SMP machine linux-image-2.6.12-1-k7 - Linux kernel 2.6.12 image on AMD K7 machines linux-image-2.6.12-1-k7-smp - Linux kernel 2.6.12 image on AMD K7 SMP machines linux-image-386 - Linux kernel image on 386-class machines linux-image-686 - Linux kernel image on PPro/Celeron/PII/PIII/P4 machines linux-image-686-smp - Linux kernel image on PPro/Celeron/PII/PIII/P4 SMP machines linux-image-k7 - Linux kernel image on AMD K7 machines linux-image-k7-smp - Linux kernel image on AMD K7 SMP machines linux-patch-debian-2.6.12 - Debian patches to version 2.6.12 of the Linux kernel linux-source-2.6.12 - Linux kernel source for version 2.6.12 with Debian patches linux-tree-2.6.12 - Linux kernel source tree for building Debian kernel images Closes: 322734 323724 328324 328534 Changes: linux-2.6 (2.6.12-7) unstable; urgency=high . [ Simon Horman ] * [SECURITY] The seq_file memory leak fix included in 2.6.12-6 as part of upstream's 2.6.12.6 patchset is now CAN-2005-2800. . [ Sven Luther ] * [powerpc] Added hotplug support to the mv643xx_eth driver : powerpc-mv643xx-hotplug-support.patch thanks go to Nicolas Det for providing the patch. * [powerpc] Modified a couple of configuration options for the powerpc64 flavour, fixes and enhances Apple G5 support (Closes: #323724, #328324) * [powerpc] Added powerpc-miboot flavour to use exclusively with oldworld powermac miboot floppies for debian-installer. . [ Jurij Smakov ] * Backport of dpt_i2o SCSI driver fixes from 2.6.13 to take care of panics with some Adaptec cards: driver-scsi-dpt_i2o-fixes.patch. See patch header for details and references. (closes: #328534) . [ Simon Horman ] * Added 2.6.13.1 - Kconfig: saa7134-dvb must select tda1004x saa7134-dvb-must-select-tda1004x.patch - Fix PCI ROM mapping fix-pci-rom-mapping.patch - 2.6.13 breaks libpcap (and tcpdump) fix-socket-filter-regression.patch - [SECURITY] Fix boundary check in standard multi-block cipher processors; Maybe local DoS ipsec-oops-fix.patch - Use SA_SHIRQ in sparc specific code sparc-request_irq-in-RTC-fix.patch - Reassembly trim not clearing CHECKSUM_HW ipv4-fragmentation-csum-handling.patch - [SECURITY] 32bit sendmsg() flaw. See CAN-2005-2490 sendmsg-stackoverflow.patch - [SECURITY] raw_sendmsg DoS. See CAN-2005-2492 sendmsg-DoS.patch * Added 2.6.13.2 - [SECURITY] lost fput in 32bit ioctl on x86-64 lost-fput-in-32bit-ioctl-on-x86-64.patch - [SECURITY] lost sockfd_put() in routing_ioctl() lost-sockfd_put-in-32bit-compat-routing_ioctl.patch - forcedeth: Initialize link settings in every nv_open() forcedeth-init-link-settings-in-nv_open.patch - Sun GEM ethernet: enable and map PCI ROM properly (closes: #322734) sungem-enable-and-map-pci-rom-properly.patch - Sun HME: enable and map PCI ROM properly sunhme-enable-and-map-pci-rom-properly.patch - Sun HME: enable and map PCI ROM properly sunhme-enable-and-map-pci-rom-properly.patch - Fix DHCP + MASQUERADE problem netfilter-fix-dhcp-masquerade-problem.patch - Fix MPOL_F_VERIFY fix-MPOL_F_VERIFY.patch - Fix up more strange byte writes to the PCI_ROM_ADDRESS config word fix-more-byte-to-dword-writes-to-PCI_ROM_ADDRESS-config-word.patch - USB: ftdi_sio: custom baud rate fix usb-ftdi_sio-baud-fix.patch Files: 9afc6871016d1e4b0a66afd0797dc9f0 7512 devel optional linux-2.6_2.6.12-7.dsc 802e288ce82e973851cfaad130292ec0 437538 devel optional linux-2.6_2.6.12-7.diff.gz 4757ccac3b5197887e17e69c417ddba5 3654262 doc optional linux-doc-2.6.12_2.6.12-7_all.deb 241fb83a00d3b0b6fce2b71cbc5ee57d 288438 devel optional linux-patch-debian-2.6.12_2.6.12-7_all.deb 199c1687cd2ebddc36b1b563aea76912 36529570 devel optional linux-source-2.6.12_2.6.12-7_all.deb 1cd179e37c79851823343e9749b65e3d 8760 devel optional linux-tree-2.6.12_2.6.12-7_all.deb 855b32cc9556ae05849ba9d34a4a9e0e 2882346 devel optional linux-headers-2.6.12-1_2.6.12-7_i386.deb 49ad893c067994916f1124a516ca545a 394484 devel optional linux-headers-2.6.12-1-386_2.6.12-7_i386.deb 567dad917032dd61c0a130f4df70af2f 15821416 base optional linux-image-2.6.12-1-386_2.6.12-7_i386.deb 7074c3d08944dd4e16cb36eb7adbd885 8300 base optional linux-image-386_2.6.12-7_i386.deb 9ea6b18f0e1dc1d93062b43ac2dd3347 8310 base optional linux-image-2.6-386_2.6.12-7_i386.deb 0337bf362d318ee052b7e870f9020f74 8338 devel optional linux-headers-2.6-386_2.6.12-7_i386.deb cb834e33c5a8d68576c478372040b968 392438 devel optional linux-headers-2.6.12-1-686_2.6.12-7_i386.deb 1159e53f43e14792ea22fc0c3be7afdc 16685440 base optional linux-image-2.6.12-1-686_2.6.12-7_i386.deb 680c9cb8b35749b533024d8c30cc1f8b 8328 base optional linux-image-686_2.6.12-7_i386.deb c2ef36942ba04694ae478288676fd269 8334 base optional linux-image-2.6-686_2.6.12-7_i386.deb 79ebb0bb5e67bc1483d7f831e84ba5e0 8366 devel optional linux-headers-2.6-686_2.6.12-7_i386.deb 44fc5f57360e577f4d7a32b3a372e9eb 390854 devel optional linux-headers-2.6.12-1-686-smp_2.6.12-7_i386.deb dc190becd1fbf7ec8c02ef67effc16cb 16553050 base optional linux-image-2.6.12-1-686-smp_2.6.12-7_i386.deb be8675dabf9d3e80fa6687190f14f7af 8352 base optional linux-image-686-smp_2.6.12-7_i386.deb 347ca9f9c51dfb81cf9bd416ce1e19bf 8360 base optional linux-image-2.6-686-smp_2.6.12-7_i386.deb 8417f2343db860de026b3efff639a2b7 8396 devel optional linux-headers-2.6-686-smp_2.6.12-7_i386.deb d83035277f3cbdeab1baf27b332634f4 392410 devel optional linux-headers-2.6.12-1-k7_2.6.12-7_i386.deb 5f24e290add2139e02ce5b1ef7e62940 16446616 base optional linux-image-2.6.12-1-k7_2.6.12-7_i386.deb 447b97832e13bc0d9d6e537da5a16b80 8318 base optional linux-image-k7_2.6.12-7_i386.deb 51af6d0d28784a785786433ba0369236 8326 base optional linux-image-2.6-k7_2.6.12-7_i386.deb da7ceaffffd2e4d45099e82b6576b225 8348 devel optional linux-headers-2.6-k7_2.6.12-7_i386.deb f1cd2bf96f0743c1da10ce424bec3139 390940 devel optional linux-headers-2.6.12-1-k7-smp_2.6.12-7_i386.deb 644e5dac1fbaff57655693717d69064c 16373362 base optional linux-image-2.6.12-1-k7-smp_2.6.12-7_i386.deb 2fd4f1f0408dd6330693f0e64236042c 8346 base optional linux-image-k7-smp_2.6.12-7_i386.deb 947751cc3a8ab0a0558545594a3f790e 8350 base optional linux-image-2.6-k7-smp_2.6.12-7_i386.deb a51505ab49857a5c631bac1c65dbc3b1 8382 devel optional linux-headers-2.6-k7-smp_2.6.12-7_i386.deb ab62d51bb953acb73a025b0326297900 8302 base extra kernel-image-2.6-386_2.6.12-7_i386.deb 9728805a169025049001818ae8f9d68c 8310 base extra kernel-image-2.6-686_2.6.12-7_i386.deb 3439101311c7ac3da6353e1046e92314 8328 base extra kernel-image-2.6-686-smp_2.6.12-7_i386.deb 6eef5c2eb2267161e51975e48a9dc857 8302 base extra kernel-image-2.6-k7_2.6.12-7_i386.deb 99ac45149d0bb805666b2f43d3126cee 8320 base extra kernel-image-2.6-k7-smp_2.6.12-7_i386.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.1 (GNU/Linux) iD8DBQFDMneYdu+M6Iexz7URAuAZAJ9NFnSMugcNk8neWLRxdggRnZwj3wCgiYoD iu4kx9Hw0/8Hw7g4q7zkJw4= =tKSU -----END PGP SIGNATURE----- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]