Your message dated Fri, 21 Dec 2007 12:32:15 +0000 with message-id <[EMAIL PROTECTED]> and subject line Bug#448818: fixed in linux-2.6 2.6.23-2 has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database)
--- Begin Message ---Package: linux-source-2.6.22 Version: 2.6.22-5 Severity: normal Tags: patch The current kernel does not recognize the the touchpad on some Dell Vostro laptops. As per <http://lkml.org/lkml/2007/8/4/184>, this patch, which should show up uspstream some time in the future adds support for the touchpad: --- drivers/input/mouse/alps.c.old 2007-07-31 21:42:37.000000000 +1000 +++ drivers/input/mouse/alps.c 2007-08-05 08:34:00.000000000 +1000 @@ -53,6 +53,7 @@ { { 0x20, 0x02, 0x0e }, 0xf8, 0xf8, ALPS_PASS | ALPS_DUALPOINT }, /* XXX */ { { 0x22, 0x02, 0x0a }, 0xf8, 0xf8, ALPS_PASS | ALPS_DUALPOINT }, { { 0x22, 0x02, 0x14 }, 0xff, 0xff, ALPS_PASS | ALPS_DUALPOINT }, /* Dell Latitude D600 */ + { { 0x73, 0x02, 0x50 }, 0xcf, 0xff, ALPS_FW_BK_1 } /* Dell Vostro 1400 */ }; -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.6.22-lauren2 (SMP w/2 CPU cores; PREEMPT) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages linux-source-2.6.22 depends on: ii binutils 2.18.1~cvs20071027-1 The GNU assembler, linker and bina ii bzip2 1.0.3-7 high-quality block-sorting file co Versions of packages linux-source-2.6.22 recommends: ii gcc 4:4.2.1-6 The GNU C compiler ii libc6-dev [libc-dev] 2.6.1-6 GNU C Library: Development Librari ii make 3.81-3 The GNU version of the "make" util -- no debconf informationsignature.asc
Description: PGP signature
--- End Message ---
--- Begin Message ---Source: linux-2.6 Source-Version: 2.6.23-2 We believe that the bug you reported is fixed in the latest version of linux-2.6, which is due to be installed in the Debian FTP archive: linux-2.6_2.6.23-2.diff.gz to pool/main/l/linux-2.6/linux-2.6_2.6.23-2.diff.gz linux-2.6_2.6.23-2.dsc to pool/main/l/linux-2.6/linux-2.6_2.6.23-2.dsc linux-doc-2.6.23_2.6.23-2_all.deb to pool/main/l/linux-2.6/linux-doc-2.6.23_2.6.23-2_all.deb linux-headers-2.6.23-1-all-amd64_2.6.23-2_amd64.deb to pool/main/l/linux-2.6/linux-headers-2.6.23-1-all-amd64_2.6.23-2_amd64.deb linux-headers-2.6.23-1-all_2.6.23-2_amd64.deb to pool/main/l/linux-2.6/linux-headers-2.6.23-1-all_2.6.23-2_amd64.deb linux-headers-2.6.23-1-amd64_2.6.23-2_amd64.deb to pool/main/l/linux-2.6/linux-headers-2.6.23-1-amd64_2.6.23-2_amd64.deb linux-headers-2.6.23-1-common_2.6.23-2_amd64.deb to pool/main/l/linux-2.6/linux-headers-2.6.23-1-common_2.6.23-2_amd64.deb linux-image-2.6.23-1-amd64_2.6.23-2_amd64.deb to pool/main/l/linux-2.6/linux-image-2.6.23-1-amd64_2.6.23-2_amd64.deb linux-libc-dev_2.6.23-2_amd64.deb to pool/main/l/linux-2.6/linux-libc-dev_2.6.23-2_amd64.deb linux-manual-2.6.23_2.6.23-2_all.deb to pool/main/l/linux-2.6/linux-manual-2.6.23_2.6.23-2_all.deb linux-patch-debian-2.6.23_2.6.23-2_all.deb to pool/main/l/linux-2.6/linux-patch-debian-2.6.23_2.6.23-2_all.deb linux-source-2.6.23_2.6.23-2_all.deb to pool/main/l/linux-2.6/linux-source-2.6.23_2.6.23-2_all.deb linux-support-2.6.23-1_2.6.23-2_all.deb to pool/main/l/linux-2.6/linux-support-2.6.23-1_2.6.23-2_all.deb linux-tree-2.6.23_2.6.23-2_all.deb to pool/main/l/linux-2.6/linux-tree-2.6.23_2.6.23-2_all.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. maximilian attems <[EMAIL PROTECTED]> (supplier of updated linux-2.6 package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Fri, 21 Dec 2007 11:47:55 +0100 Source: linux-2.6 Binary: linux-image-2.6.23-1-parisc linux-image-2.6.23-1-4kc-malta linux-headers-2.6.23-1-s390x linux-headers-2.6.23-1-686-bigmem linux-headers-2.6.23-1-alpha-legacy linux-image-2.6.23-1-itanium linux-patch-debian-2.6.23 linux-headers-2.6.23-1-itanium linux-doc-2.6.23 linux-headers-2.6.23-1-common-xen linux-headers-2.6.23-1-all-s390 linux-image-2.6.23-1-mckinley linux-image-2.6.23-1-s390-tape linux-headers-2.6.23-1-all-sparc linux-headers-2.6.23-1-s390 linux-headers-2.6.23-1-all-i386 linux-headers-2.6.23-1-all-alpha linux-headers-2.6.23-1-ixp4xx linux-headers-2.6.23-1-all-hppa linux-modules-2.6.23-1-xen-686 linux-headers-2.6.23-1-486 linux-image-2.6.23-1-qemu linux-image-2.6.23-1-sb1-bcm91250a linux-image-2.6.23-1-ixp4xx linux-image-2.6.23-1-s390x linux-headers-2.6.23-1-all-powerpc linux-image-2.6.23-1-xen-686 linux-image-2.6.23-1-atari linux-image-2.6.23-1-alpha-generic linux-image-2.6.23-1-powerpc-miboot linux-image-2.6.23-1-sparc64-smp linux-headers-2.6.23-1-all-m68k linux-image-2.6.23-1-686-bigmem linux-headers-2.6.23-1-sparc64-smp linux-image-2.6.23-1-amiga linux-headers-2.6.23-1-iop32x linux-image-2.6.23-1-r5k-cobalt linux-headers-2.6.23-1-alpha-smp linux-libc-dev linux-image-2.6.23-1-alpha-smp linux-headers-2.6.23-1-powerpc64 linux-headers-2.6.23-1-s390-tape linux-headers-2.6.23-1-r4k-ip22 linux-image-2.6.23-1-powerpc-smp linux-headers-2.6.23-1-qemu linux-headers-2.6.23-1-r5k-ip32 linux-headers-2.6.23-1-5kc-malta linux-source-2.6.23 linux-headers-2.6.23-1-common linux-headers-2.6.23-1-parisc64 linux-image-2.6.23-1-686 linux-image-2.6.23-1-r5k-ip32 linux-headers-2.6.23-1-powerpc linux-image-2.6.23-1-mac linux-headers-2.6.23-1-mckinley linux-headers-2.6.23-1-all-armel linux-image-2.6.23-1-parisc-smp linux-image-2.6.23-1-486 linux-headers-2.6.23-1-versatile linux-image-2.6.23-1-sb1a-bcm91480b linux-image-2.6.23-1-versatile linux-headers-2.6.23-1-4kc-malta linux-image-2.6.23-1-powerpc linux-image-2.6.23-1-r4k-ip22 linux-headers-2.6.23-1-sb1a-bcm91480b linux-support-2.6.23-1 linux-image-2.6.23-1-iop32x linux-headers-2.6.23-1-parisc64-smp linux-image-2.6.23-1-powerpc64 linux-headers-2.6.23-1-atari linux-image-2.6.23-1-footbridge linux-headers-2.6.23-1-powerpc-miboot linux-headers-2.6.23-1-parisc-smp linux-headers-2.6.23-1-r5k-cobalt linux-headers-2.6.23-1-parisc linux-image-2.6.23-1-amd64 linux-headers-2.6.23-1-all-mips linux-manual-2.6.23 linux-image-2.6.23-1-sparc64 linux-headers-2.6.23-1-sparc64 linux-headers-2.6.23-1-alpha-generic linux-image-2.6.23-1-parisc64-smp linux-tree-2.6.23 linux-headers-2.6.23-1-amiga linux-headers-2.6.23-1-all-ia64 linux-headers-2.6.23-1-mac linux-image-2.6.23-1-s390 linux-headers-2.6.23-1-all-amd64 linux-headers-2.6.23-1-686 linux-headers-2.6.23-1-all-mipsel linux-headers-2.6.23-1-amd64 linux-image-2.6.23-1-parisc64 linux-headers-2.6.23-1-sb1-bcm91250a linux-headers-2.6.23-1-footbridge linux-headers-2.6.23-1-all linux-headers-2.6.23-1-powerpc-smp linux-image-2.6.23-1-alpha-legacy linux-image-2.6.23-1-5kc-malta linux-headers-2.6.23-1-all-arm linux-headers-2.6.23-1-xen-686 Architecture: source all amd64 Version: 2.6.23-2 Distribution: unstable Urgency: low Maintainer: Debian Kernel Team <debian-kernel@lists.debian.org> Changed-By: maximilian attems <[EMAIL PROTECTED]> Description: linux-doc-2.6.23 - Linux kernel specific documentation for version 2.6.23 linux-headers-2.6.23-1-all - All header files for Linux 2.6.23 linux-headers-2.6.23-1-all-amd64 - All header files for Linux 2.6.23 linux-headers-2.6.23-1-amd64 - Header files for Linux 2.6.23 on AMD64 linux-headers-2.6.23-1-common - Common header files for Linux 2.6.23 linux-image-2.6.23-1-amd64 - Linux 2.6.23 image on AMD64 linux-libc-dev - Linux Kernel Headers for development linux-manual-2.6.23 - Linux kernel API manual pages for version 2.6.23 linux-patch-debian-2.6.23 - Debian patches to version 2.6.23 of the Linux kernel linux-source-2.6.23 - Linux kernel source for version 2.6.23 with Debian patches linux-support-2.6.23-1 - Support files for Linux 2.6.23 linux-tree-2.6.23 - Linux kernel source tree for building Debian kernel images Closes: 440720 448818 Changes: linux-2.6 (2.6.23-2) unstable; urgency=low . [ dann frazier ] * [ia64]: Enable BLK_CPQ_DA . [ Gordon Farquharson ] * [arm/iop32x] Use the new i2c framework to load rtc-rs5c372 for the GLAN Tank. . [ Frederik Schüler ] * Export gfs2 locking symbols required to build gfs1 module. . [ maximilian attems ] * [ppc] Reenable PMAC_BACKLIGHT. * [sparc] Add davem get_cpu() SunFire boot patch. (closes: #440720) * Add stable release 2.6.23.10: - IPV4: Remove bogus ifdef mess in arp_process - KVM: x86 emulator: Use emulator_write_emulated and not emulator_write_std - KVM: SVM: Fix FPU leak while emulating clts - revert "dpt_i2o: convert to SCSI hotplug model" - KVM: x86 emulator: fix access registers for instructions with ModR/M byte and Mod = 3 - KVM: x86 emulator: invd instruction - KVM: SVM: Intercept the 'invd' and 'wbinvd' instructions - KVM: Skip pio instruction when it is emulated, not executed - KVM: VMX: Force vm86 mode if setting flags during real mode - forcedeth: new mcp79 pci ids - forcedeth boot delay fix - PFKEY: Sending an SADB_GET responds with an SADB_GET - rd: fix data corruption on memory pressure. - create /sys/.../power when CONFIG_PM is set - USB: fix up EHCI startup synchronization - RXRPC: Add missing select on CRYPTO - KVM: VMX: Reset mmu context when entering real mode - NET: random : secure_tcp_sequence_number should not assume CONFIG_KTIME_SCALAR - NET: Corrects a bug in ip_rt_acct_read() - NETFILTER: Fix NULL pointer dereference in nf_nat_move_storage() - netfilter: Fix kernel panic with REDIRECT target. - IPV6: Restore IPv6 when MTU is big enough - UNIX: EOF on non-blocking SOCK_SEQPACKET - x86 setup: add a near jump to serialize %cr0 on 386/486 - Fix synchronize_irq races with IRQ handler - CRYPTO api: Fix potential race in crypto_remove_spawn - TCP: Fix TCP header misalignment - tmpfs: restore missing clear_highpage (CVE-2007-6417) - TCP: MTUprobe: fix potential sk_send_head corruption - NETFILTER: fix forgotten module release in xt_CONNMARK and xt_CONNSECMARK - fb_ddc: fix DDC lines quirk - VLAN: Fix nested VLAN transmit bug - I4L: fix isdn_ioctl memory overrun vulnerability (CVE-2007-6151) - isdn: avoid copying overly-long strings - nf_nat: fix memset error - esp_scsi: fix reset cleanup spinlock recursion - libertas: properly account for queue commands - KVM: Fix hang on uniprocessor - USB: make the microtek driver and HAL cooperate - TEXTSEARCH: Do not allow zero length patterns in the textsearch infrastructure - XFRM: Fix leak of expired xfrm_states - NETFILTER: xt_TCPMSS: remove network triggerable WARN_ON - BRIDGE: Lost call to br_fdb_fini() in br_init() error path - DECNET: dn_nl_deladdr() almost always returns no error - BRIDGE: Properly dereference the br_should_route_hook - PKT_SCHED: Check subqueue status before calling hard_start_xmit - Freezer: Fix APM emulation breakage - XFS: Make xfsbufd threads freezable - TCP: Problem bug with sysctl_tcp_congestion_control function - wait_task_stopped(): pass correct exit_code to wait_noreap_copyout() - KVM: x86 emulator: implement 'movnti mem, reg' - TCP: illinois: Incorrect beta usage - futex: fix for futex_wait signal stack corruption - libata: kill spurious NCQ completion detection - hrtimers: avoid overflow for large relative timeouts (CVE-2007-5966) - Input: ALPS - add support for model found in Dell Vostro 1400 (closes: #448818) - PNP: increase the maximum number of resources - sched: some proc entries are missed in sched_domain sys_ctl debug code - ATM: [he] initialize lock and tasklet earlier * Add stable release 2.6.23.11: - BRIDGE: Section fix. - Revert "Freezer: Fix APM emulation breakage" * Backport fix for CVE-2007-5938 - iwlwifi: fix possible NULL dereference in iwl_set_rate() * Add stable release 2.6.23.12: - Revert "PNP: increase the maximum number of resources" * VM/Security: add security hook to do_brk (CVE-2007-6434) * security: protect from stack expantion into low vm addresses * [hppa]: Disable OCFS2, due build trouble. . [ Aurelien Jarno ] * [arm/versatile] Disable ACENIC and MYRI10GE as they are useless on this platform. * Add em28xx-dv100.patch to add support for Pinnacle Dazzle DVC 100. . [ Bastian Blank ] * Fix abi change in 2.6.23.10. Files: e8a12c947a62a5ef350a97f652912276 4191 devel optional linux-2.6_2.6.23-2.dsc 344b3af08a91bf5c39e44624c361219a 4116305 devel optional linux-2.6_2.6.23-2.diff.gz f3d224dbce25b66c63042697d38c7910 4382328 doc optional linux-doc-2.6.23_2.6.23-2_all.deb bce013549cb3dbf0942129fba9e18e51 1498470 doc optional linux-manual-2.6.23_2.6.23-2_all.deb eed530b5d97e5d5d7fb591d54b56a67f 1056524 devel optional linux-patch-debian-2.6.23_2.6.23-2_all.deb 4d5fa7146841a9c86321ce92985933ef 45652136 devel optional linux-source-2.6.23_2.6.23-2_all.deb 501fa677fca870c3d8faaf753f09851d 86644 devel optional linux-support-2.6.23-1_2.6.23-2_all.deb c3e3a3d531134ed52bb76c19d94184d9 72014 devel optional linux-tree-2.6.23_2.6.23-2_all.deb 85e91e8930b7933b6f643a323d66c963 18746712 admin optional linux-image-2.6.23-1-amd64_2.6.23-2_amd64.deb e204a7a8eca46796ece068c1c6d7522f 320224 devel optional linux-headers-2.6.23-1-amd64_2.6.23-2_amd64.deb d5e29bccbceac678e5543844bfb5645d 3570490 devel optional linux-headers-2.6.23-1-common_2.6.23-2_amd64.deb b881ab6068974d9f7501b87f11417653 71662 devel optional linux-headers-2.6.23-1-all_2.6.23-2_amd64.deb ad63524e536ad0ddc8737c48131f9848 71668 devel optional linux-headers-2.6.23-1-all-amd64_2.6.23-2_amd64.deb 195c20b8e8f4d8f08ab9cc4b6e3ba2d9 736556 devel optional linux-libc-dev_2.6.23-2_amd64.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFHa6+qeW7Lc5tEHqgRAr7DAJ0W5Yi18+eQ/vGdEuNHufam4pdT1ACfdWDC TNYQG44D+5Z8BS/p+vsKYVY= =qXm8 -----END PGP SIGNATURE-----
--- End Message ---