Accepted:
linux-headers-2.6.16-2-all-arm_2.6.16-15+b1_arm.deb
to
pool/main/l/linux-2.6.16/linux-headers-2.6.16-2-all-arm_2.6.16-15+b1_arm.deb
linux-headers-2.6.16-2-all_2.6.16-15+b1_arm.deb
to pool/main/l/linux-2.6.16/linux-headers-2.6.16-2-all_2.6.16-15+b1_arm.deb
linux-headers-2.6.16-2-foot
linux-2.6.16_2.6.16-15+b1_arm.changes uploaded successfully to localhost
along with the files:
linux-headers-2.6.16-2-all_2.6.16-15+b1_arm.deb
linux-headers-2.6.16-2-all-arm_2.6.16-15+b1_arm.deb
linux-headers-2.6.16-2_2.6.16-15+b1_arm.deb
linux-image-2.6.16-2-footbridge_2.6.16-15+b1_arm.deb
Processing commands for [EMAIL PROTECTED]:
> assign 377076 nfs-common
Unknown command or malformed arguments to command.
> severity 377076 serious
Bug#377076: nfs-kernel-server: automounter cannot cooperate with new nfs-utils:
"Unsupported nfs mount option: grpid"
Severity set to `serious' from
On Fri, 7 Jul 2006 02:52:33 +0200 maximilian attems wrote:
> now that the smp alternatives patch went in,
> time to think about usefull flavours:
>
> -bigmem got requested several times with CONFIG_HIGHMEM64G=y and
> CONFIG_X86_PAE=y
> -lowlat with CONFIG_PREEMPT=y and CONFIG_HZ=1000 see
Processing commands for [EMAIL PROTECTED]:
> severity 377024 normal
Bug#377024: nfs_common: nfs client crash nfs server? ; [TCP CHECKSUM INCORRECT]
Severity set to `normal' from `serious'
> thanks
Stopping processing here.
Please contact me if you need assistance.
Debian bug tracking system adm
reassign 377076 nfs-common
merge 377076 376089
thanks
On Fri, Jul 07, 2006 at 10:20:12AM +0200, Peder Chr. Norgaard wrote:
>On Thu, 6 Jul 2006, Steinar H. Gunderson wrote:
>
>>reassign 377076 nfs-common
>>forcemerge 377076 377024
>>thanks
>>
>>On Thu, Jul 06, 2006 at 02:04:01PM +0200, Peder Chr. N
Processing commands for [EMAIL PROTECTED]:
> # Automatically generated email from bts, devscripts version 2.9.20
> tags 376604 pending
Bug#376604: mkinitrd migration needs to be done in preinst
There were no tags set.
Tags added: pending
>
End of message, stopping processing here.
Please contact
Hello,
Please ignore my previous message to #376089.
Aníbal Monsalve Salazar
--
http://v7w.com/anibal
signature.asc
Description: Digital signature
On Fri, 07 Jul 2006, Jonas Smedegaard wrote:
> On Fri, 7 Jul 2006 02:52:33 +0200 maximilian attems wrote:
>
> > now that the smp alternatives patch went in,
> > time to think about usefull flavours:
> >
> > -bigmem got requested several times with CONFIG_HIGHMEM64G=y and
> > CONFIG_X86_P
On Fri, 7 Jul 2006 15:43:48 +0200 maximilian attems wrote:
> On Fri, 07 Jul 2006, Jonas Smedegaard wrote:
>
> > On Fri, 7 Jul 2006 02:52:33 +0200 maximilian attems wrote:
> >
> > > now that the smp alternatives patch went in,
> > > time to think about usefull flavours:
> > >
> > > -bigmem got r
On Fri, Jul 07, 2006 at 02:52:33AM +0200, maximilian attems wrote:
> -bigmem got requested several times with CONFIG_HIGHMEM64G=y and
> CONFIG_X86_PAE=y
> added it for now in the d-k repository for 686.
> there is a pending request for xen too.
> also k7 .config will be ad
Package: kernel-image-2.6-amd64-k8
Version: 103sarge1
Severity: wishlist
Hello,
yesterday I did a dist-upgrade from sarge (unofficial amd64 stable) to
etch, with aptitude dist-upgrade.
At the point, where udev should be upgraded, the upgrade stops, because
udev 0.93 depends on kernel >= 2.6.15
Af
On Fri, Jul 07, 2006 at 04:45:17PM +0200, Bastian Blank wrote:
> It is off per default but set to on in the default configs for ia64,
> s390 and x86_64.
And I currently expect it to be the source of some weird illegal
instruction errors I've seen on one of my s390 machins.
Bastian
--
If a man h
Package: linux-headers-2.6.17-1-k7
Severity: grave
Justification: renders package unusable
There is a dependancy on this package that renders it uninstallable,
as the required package isn't even in the repositories
The following packages have unmet dependencies:
linux-headers-2.6.17-1-k7: Depe
Processing commands for [EMAIL PROTECTED]:
> # Automatically generated email from bts, devscripts version 2.9.20
> severity 311357 important
Bug#311357: kernel-image-2.6.8-2: via-rhine fails to reserve I/O region, no
networking available
Severity set to `important' from `grave'
>
End of message,
Processing commands for [EMAIL PROTECTED]:
> # Automatically generated email from bts, devscripts version 2.9.20
> severity 375341 important
Bug#375341: system hangs when an (LVM) snapshot volume is removed with an older
lvm2 version (present in sarge)
Bug#376308: system hangs when an (LVM) snaps
Processing commands for [EMAIL PROTECTED]:
> reassign 377235 linux-2.6
Bug#377235: linux-headers-2.6.17-1-k7: package uninstallable
Bug reassigned from package `linux-headers-2.6.17-1-k7' to `linux-2.6'.
> forcemerge 368544 377235
Bug#368544: linux-headers-2.6.17-rc3-amd64-k8: depends on non-exis
Package: linux-2.6.16
Version: 2.6.16-15
Severity: grave
The arm packages don't match the source as the binNMU contains source
changes.
Bastian
--
It is a human characteristic to love little animals, especially if
they're attractive in some way.
-- McCoy, "The Trouble with Tribb
2 additional information:
the checksum is bad:
* with NFS and SMB over TCP, but not with telnet.
* only in TCP blocks wich size (Len under ethereal) is not null
this means checksum is good with both telnet blocks empty TCP blocks.
Moreover on another computer, without the upgrade, NFS seams to w
linux-2.6* is not binNMU-able. This upload includes source changes. So
linux-2.6.16 needs another upload. I intend to schedule the upload of
linux-2.6.16 2.6.16-16 for tomorrow.
Bastian
On Fri, Jul 07, 2006 at 12:47:42AM -0700, Debian Installer wrote:
> Accepted:
> linux-headers-2.6.16-2-all-arm_
I just find a relation between the bad checksum and lenth:
I have seen:
bad checksum: 5a1c , when Len is 120
bad checksum: 5f58 , when Len is 1460
bad checksum: 5e1c , when Len is 1144
bad checksum: 5a28 , when Len is 132
This seams to mean that:
checksum= 0x59A4 + Len
but why on earth do I ha
On Fri, Jul 07, 2006 at 08:53:49PM +0200, [EMAIL PROTECTED] wrote:
> I just find a relation between the bad checksum and lenth:
You are putting way too much weight on the checksum. Ethereal's idea of the
outgoing checksum is _wrong_ when you have checksum offloading enabled (and
you probably do),
On Fri, Jul 07, 2006 at 08:38:24PM +0200, [EMAIL PROTECTED] wrote:
> the checksum is bad:
> * with NFS and SMB over TCP, but not with telnet.
> * only in TCP blocks wich size (Len under ethereal) is not null
Not surprising; remember that nfs and smbfs is handled by the kernel. I'm not
surprised if
On Friday 07 July 2006 23:18, Stephen Hemminger wrote:
> On Mon, 3 Jul 2006 22:52:38 +0200
> Martin Michlmayr <[EMAIL PROTECTED]> wrote:
>
> > We received the following bug report at http://bugs.debian.org/341801
> >
> > | I have a Asus A8V with 4GB of RAM. When I turn on the hardware memory
> >
On Mon, 3 Jul 2006 22:52:38 +0200
Martin Michlmayr <[EMAIL PROTECTED]> wrote:
> We received the following bug report at http://bugs.debian.org/341801
>
> | I have a Asus A8V with 4GB of RAM. When I turn on the hardware memory
> | hole in the BIOS, the skge driver prints out this message:
> |
Should be fixed with new linux 2.6.17 and linux-kbuild-2.6.17 (now in
new).
--
Stephen R. Marenka If life's not fun, you're not doing it right!
<[EMAIL PROTECTED]>
signature.asc
Description: Digital signature
26 matches
Mail list logo