Your message dated Mon, 28 May 2007 23:06:09 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#311357: fixed in kernel-image-2.6.8-amd64 2.6.8-17
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: kernel-image-2.6.8-2-k7
Version: 2.6.8-16
Severity: important
File: kernel-image-2.6.8-2

The via-rhine module no longer configures my network card correctly.
This broke with the latest kernel upgrade.  Below are the messages from
the broken kernel and a working kernel.

When loading the via-rhine module at boot (or by hand) with kernel
2.6.8-16 I get
May 31 00:55:15 localhost kernel: via-rhine.c:v1.10-LK1.1.20-2.6
May-23-2004 Written by Donald Becker
May 31 00:55:15 localhost kernel: PCI: Found IRQ 10 for device 0000:00:06.0
May 31 00:55:15 localhost kernel: PCI: Sharing IRQ 10 with 0000:00:04.4
May 31 00:55:15 localhost kernel: PCI: Unable to reserve I/O region #1:[EMAIL 
PROTECTED] for device 0000:00:06.0
May 31 00:55:15 localhost kernel: via-rhine: probe of 0000:00:06.0 failed with 
error -16
and networking is unavailable on the system.

When loading the via-rhine module at boot (or by hand) with kernel
2.6.8-13 where it works I get
May 31 01:53:00 localhost kernel: via-rhine.c:v1.10-LK1.1.20-2.6
May-23-2004 Written by Donald Becker
May 31 01:53:00 localhost kernel: PCI: Found IRQ 10 for device 0000:00:06.0
May 31 01:53:00 localhost kernel: PCI: Sharing IRQ 10 with 0000:00:04.4
May 31 01:53:00 localhost kernel: eth0: VIA VT86C100A Rhine at 0xd800, 
00:50:ba:c3:4f:50, IRQ 10.
May 31 01:53:00 localhost kernel: eth0: MII PHY found at address 8, status 
0x782d advertising 05e1 Link 45e1.

lspci -v give
0000:00:06.0 Ethernet controller: VIA Technologies, Inc. VT86C100A [Rhine] (rev 
06)
        Subsystem: D-Link System Inc DFE-530TX rev A
        Flags: bus master, medium devsel, latency 64, IRQ 10
        I/O ports at d800 [size=128]
        Memory at effff680 (32-bit, non-prefetchable) [size=128]
        Expansion ROM at effd0000 [disabled] [size=64K]


-- System Information:
Debian Release: 3.1
  APT prefers testing
  APT policy: (990, 'testing'), (500, 'unstable')
Architecture: i386 (i686)
Kernel: Linux 2.6.8-2-386
Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1)

Versions of packages kernel-image-2.6.8-2-k7 depends on:
ii  coreutils [fileutils]         5.2.1-2    The GNU core utilities
ii  initrd-tools                  0.1.81.1   tools to create initrd image for p
ii  module-init-tools             3.2-pre1-2 tools for managing Linux kernel mo

-- no debconf information


--- End Message ---
--- Begin Message ---
Source: kernel-image-2.6.8-amd64
Source-Version: 2.6.8-17

We believe that the bug you reported is fixed in the latest version of
kernel-image-2.6.8-amd64, which is due to be installed in the Debian FTP 
archive:

kernel-headers-2.6.8-13-amd64-generic_2.6.8-17_i386.deb
  to 
pool/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-13-amd64-generic_2.6.8-17_i386.deb
kernel-headers-2.6.8-13-amd64-k8-smp_2.6.8-17_i386.deb
  to 
pool/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-13-amd64-k8-smp_2.6.8-17_i386.deb
kernel-headers-2.6.8-13-amd64-k8_2.6.8-17_i386.deb
  to 
pool/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-13-amd64-k8_2.6.8-17_i386.deb
kernel-headers-2.6.8-13-em64t-p4-smp_2.6.8-17_i386.deb
  to 
pool/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-13-em64t-p4-smp_2.6.8-17_i386.deb
kernel-headers-2.6.8-13-em64t-p4_2.6.8-17_i386.deb
  to 
pool/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-13-em64t-p4_2.6.8-17_i386.deb
kernel-headers-2.6.8-13_2.6.8-17_i386.deb
  to 
pool/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-13_2.6.8-17_i386.deb
kernel-image-2.6.8-13-amd64-generic_2.6.8-17_i386.deb
  to 
pool/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-13-amd64-generic_2.6.8-17_i386.deb
kernel-image-2.6.8-13-amd64-k8-smp_2.6.8-17_i386.deb
  to 
pool/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-13-amd64-k8-smp_2.6.8-17_i386.deb
kernel-image-2.6.8-13-amd64-k8_2.6.8-17_i386.deb
  to 
pool/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-13-amd64-k8_2.6.8-17_i386.deb
kernel-image-2.6.8-13-em64t-p4-smp_2.6.8-17_i386.deb
  to 
pool/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-13-em64t-p4-smp_2.6.8-17_i386.deb
kernel-image-2.6.8-13-em64t-p4_2.6.8-17_i386.deb
  to 
pool/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-13-em64t-p4_2.6.8-17_i386.deb
kernel-image-2.6.8-amd64_2.6.8-17.dsc
  to pool/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-amd64_2.6.8-17.dsc
kernel-image-2.6.8-amd64_2.6.8-17.tar.gz
  to 
pool/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-amd64_2.6.8-17.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
dann frazier <[EMAIL PROTECTED]> (supplier of updated kernel-image-2.6.8-amd64 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Sat, 26 May 2007 03:56:58 -0600
Source: kernel-image-2.6.8-amd64
Binary: kernel-headers-2.6.8-13-amd64-k8 kernel-image-2.6.8-13-em64t-p4-smp 
kernel-image-2.6.8-13-amd64-k8-smp kernel-headers-2.6.8-13 
kernel-headers-2.6.8-13-amd64-generic kernel-image-2.6.8-13-amd64-k8 
kernel-headers-2.6.8-13-em64t-p4 kernel-headers-2.6.8-13-amd64-k8-smp 
kernel-headers-2.6.8-13-em64t-p4-smp kernel-image-2.6.8-13-amd64-generic 
kernel-image-2.6.8-13-em64t-p4
Architecture: source i386
Version: 2.6.8-17
Distribution: oldstable
Urgency: high
Maintainer: Debian Kernel Team <debian-kernel@lists.debian.org>
Changed-By: dann frazier <[EMAIL PROTECTED]>
Description: 
 kernel-headers-2.6.8-13 - Header files related to Linux kernel version 2.6.8
 kernel-headers-2.6.8-13-amd64-generic - Linux kernel headers 2.6.8 for generic 
x86_64 systems
 kernel-headers-2.6.8-13-amd64-k8 - Linux kernel headers for version 2.6.8 on 
AMD64 systems
 kernel-headers-2.6.8-13-amd64-k8-smp - Linux kernel headers for version 2.6.8 
on AMD64 SMP systems
 kernel-headers-2.6.8-13-em64t-p4 - Linux kernel headers for version 2.6.8 on 
Intel EM64T systems
 kernel-headers-2.6.8-13-em64t-p4-smp - Linux kernel headers for version 2.6.8 
on Intel EM64T SMP systems
 kernel-image-2.6.8-13-amd64-generic - Linux kernel image for version 2.6.8 on 
generic x86_64 systems
 kernel-image-2.6.8-13-amd64-k8 - Linux kernel image for version 2.6.8 on AMD64 
systems
 kernel-image-2.6.8-13-amd64-k8-smp - Linux kernel image for version 2.6.8 on 
AMD64 SMP systems
 kernel-image-2.6.8-13-em64t-p4 - Linux kernel image for version 2.6.8 on Intel 
EM64T systems
 kernel-image-2.6.8-13-em64t-p4-smp - Linux kernel image for version 2.6.8 on 
Intel EM64T SMP systems
Closes: 311357 317286 321442 323557 336153 349774 354493 372621
Changes: 
 kernel-image-2.6.8-amd64 (2.6.8-17) oldstable; urgency=high
 .
   * Rebuild against kernel-tree-2.6.8-17
     [ Simon Horman ]
     * drivers-net-via-rhine-wol-oops.dpatch (removed):
       This patch breaks the via-rhine driver and 2.6.8 and is
       completely bogus for this version of the kernel
       (closes: #311357)
 .
     * drivers-media-vidio-bttv-vc100xp-detect.dpatch
       Allow Leadtek WinFast VC100 XP cards to work.
 .
     * fs-jbd-checkpoint-assertion.dpatch
       Fix possible false assertion failure in log_do_checkpoint(). We might 
fail
       to detect that we actually made a progress when cleaning up the 
checkpoint
       lists if we don't retry after writing something to disk.
 .
     * mm-rmap-out-of-bounds-pte.dpatch
       Stop try_to_unmap_cluster() passing out-of-bounds pte to pte_unmap()
 .
     * net-ipv4-netfilter-ip_queue-deadlock.dpatch
       Fix deadlock with ip_queue and tcp local input path.
 .
     * asm-i386-mem-clobber.dpatch:
       Make sure gcc doesn't reorder memory accesses in strncmp and friends on
       i386.
 .
     * drivers-acpi-pci_irq-elcr.dpatch:
       Make sure we call acpi_register_gsi() even for default PCI interrupt
       assignment. That's the part that keeps track of the ELCR register, and we
       want to make sure that the PCI interrupts are properly marked level/low.
 .
     [ dann frazier ]
     * Merge in applicable fixes from 2.6.12.4
        - netfilter-deadlock-ip6_queue.dpatch
        - rocket_c-fix-ldisc-ref-count.dpatch
        - early-vlan-fix.dpatch
 .
     [ Simon Horman ]
     * drivers-sata-promise-sataii_tx2_tx4.dpatch
       Add SATAII TX2 and TX2/TX4 support to sata promise driver
       (Closes: #317286)
 .
     * module-per-cpu-alignment-fix.dpatch
       Module per-cpu alignment cannot always be met
       From 2.6.12.5
 .
     * genelink-usbnet-skb-typo.dpatch
       fix gl_skb/skb type error in genelink driver in usbnet
       Backported From 2.6.12.6
 .
     * drivers-ide-ppp-pmac-build.dpatch
       Make sure BLK_DEV_IDEDMA_PCI is defined for pmac ide driver builds
       (closes: #321442)
 .
     * fs-ext3-nfs-parent-fix.dpatch
       ext3 file systems mounted over nfs may lookup .. in dx directories
       causing an oops.
       (closes: #323557)
 .
     * sparc-request_irq-in-RTC-fix.dpatch
       Use SA_SHIRQ in sparc specific code.
       From 2.6.13.1
 .
     * forcedeth-init-link-settings-in-nv_open.patch
       forcedeth: Initialize link settings in every nv_open()
       From 2.6.13.2
 .
     * fix-MPOL_F_VERIFY.patch
       Fix MPOL_F_VERIFY
       From 2.6.13.2
 .
     * fix-more-byte-to-dword-writes-to-PCI_ROM_ADDRESS-config-word.patch
       Fix up more strange byte writes to the PCI_ROM_ADDRESS config word
       From 2.6.13.2
 .
     * yenta-oops-fix.patch
       yenta oops fix
       From 2.6.13.3
 .
     * fix-de_thread-BUG_ON.patch
       Fix fs/exec.c:788 (de_thread()) BUG_ON
       From 2.6.13.3
 .
     * ipv6-fix-per-socket-multicast-filtering.patch
       fix IPv6 per-socket multicast filtering in exact-match case
       From 2.6.13.3
 .
     * ipvs-ip_vs_ftp-breaks-connections.patch
       ipvs: ip_vs_ftp breaks connections using persistence
       From 2.6.13.3
 .
     * ieee1394-sbp2-fixes-for-hot-unplug-and-module-unloading.dpatch
       ieee1394/sbp2: fixes for hot-unplug and module unloading
       From 2.6.13.4
 .
     * fix-sparc64-fpu-register-corruption.dpatch
       [SPARC64]: Fix userland FPU state corruption.
       From 2.6.13.4
 .
     [ dann frazier ]
     * drivers-block-raw-ioctl2.dpatch, drivers-block-ioctl-enotty.dpatch:
       Fix a bug in the block layer that causes a bootloader installation
       error under certain conditions - breaks installation on cciss devices.
       (closes: #354493)
     * Fix data corruption with dm-crypt over RAID5 (closes: #336153)
     * Fix VLAN support for 3c59x/90x series hardware (closes: #349774)
     * Fix erroneous calculation of 'len' parameter to NLMSG_PUT resulting in
       bogus 'error during NLMSG_PUT' messages (closes: #372621)
     * hp-diva-rmp3.dpatch, hp-diva-hurricane.dpatch:
       Add PCI IDs for newer Diva console ports
Files: 
 49238bb913ef65c35b418e84eafcf07c 1085 devel optional 
kernel-image-2.6.8-amd64_2.6.8-17.dsc
 7b401585e3eb4f0634c1f643a2a9ac3e 80931 devel optional 
kernel-image-2.6.8-amd64_2.6.8-17.tar.gz
 d7859c8cf5ef94abaee2ea70e7836917 2727190 devel optional 
kernel-headers-2.6.8-13_2.6.8-17_i386.deb
 58ef5e653626790f32e3f8b7d0e7e46f 229140 devel optional 
kernel-headers-2.6.8-13-amd64-k8_2.6.8-17_i386.deb
 bcdf65f040ac486b506d5e10d0cae49e 13272718 base optional 
kernel-image-2.6.8-13-amd64-k8_2.6.8-17_i386.deb
 232748eb3c797297e59e393dc208110f 229994 devel optional 
kernel-headers-2.6.8-13-amd64-generic_2.6.8-17_i386.deb
 2ff85b96fb64c24a46b6537523a2aec1 12578082 base optional 
kernel-image-2.6.8-13-amd64-generic_2.6.8-17_i386.deb
 280f473cfa84445774b8178e63c1f898 227330 devel optional 
kernel-headers-2.6.8-13-em64t-p4_2.6.8-17_i386.deb
 6dacc0111426fb547963a0bdfbe93e83 13231850 base optional 
kernel-image-2.6.8-13-em64t-p4_2.6.8-17_i386.deb
 e69d325b9f104a3a9ae7f5ccd1452a18 225520 devel optional 
kernel-headers-2.6.8-13-amd64-k8-smp_2.6.8-17_i386.deb
 e8acc024da2aaf732e725897879bef7e 13234852 base optional 
kernel-image-2.6.8-13-amd64-k8-smp_2.6.8-17_i386.deb
 9d981adf81766e9253c3b9bf762e6a12 224052 devel optional 
kernel-headers-2.6.8-13-em64t-p4-smp_2.6.8-17_i386.deb
 2c4458b2d350b08ecf1a67192f0b89ef 13207158 base optional 
kernel-image-2.6.8-13-em64t-p4-smp_2.6.8-17_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFGWwJ9huANDBmkLRkRAiR4AKCTVbXuQ76UoiN2APwFoYFV9NTC3gCfW4jK
HQxKpYr87BRwp6ubN+Ts9AE=
=Dgvr
-----END PGP SIGNATURE-----


--- End Message ---

Reply via email to