Processed: Re: Bug#466051: gspca-modules-2.6.22-3-amd64: Philips webcam SPC210NC has image turned upside/down

2008-02-16 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> reassign 466051 gspca-source
Bug#466051: gspca-modules-2.6.22-3-amd64: Philips webcam SPC210NC has image 
turned upside/down
Bug reassigned from package `gspca-modules-2.6.22-3-amd64' to `gspca-source'.

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#466051: gspca-modules-2.6.22-3-amd64: Philips webcam SPC210NC has image turned upside/down

2008-02-16 Thread Jan Prunk
Package: gspca-modules-2.6.22-3-amd64
Version: 2.6.22+01.00.18-9
Severity: minor


I bought a Philips webcam, model SPC210NC. It is
listed that it uses gspca module.
I am using OS system GNU/Linux Debian lenny/testing. I have installed
this package
gspca-modules-2.6.22-3-amd64 2.6.22+01.00.18-9

The problem is that I get the picture turned upside/down ?
These are the messages from dmesg (visible also at
http://openpaste.org/en/5140/)

#
Linux video capture interface: v2.00
#
/build/buildd/linux-modules-extra-2.6-2.6.22/debian/build/build_amd64_none_amd64_gspca/gspca_core.c:
USB GSPCA camera found.(ZC3XX)
#
/build/buildd/linux-modules-extra-2.6-2.6.22/debian/build/build_amd64_none_amd64_gspca/gspca_core.c:
[spca5xx_probe:4098] Camera type JPEG
#
/build/buildd/linux-modules-extra-2.6-2.6.22/debian/build/build_amd64_none_amd64_gspca/Vimicro/zc3xx.h:
[zc3xx_config:515] Sensor ID:10
#
/build/buildd/linux-modules-extra-2.6-2.6.22/debian/build/build_amd64_none_amd64_gspca/Vimicro/zc3xx.h:
[zc3xx_config:587] Find Sensor PAS106
#
/build/buildd/linux-modules-extra-2.6-2.6.22/debian/build/build_amd64_none_amd64_gspca/gspca_core.c:
[spca5xx_getcapability:1215] maxw 352 maxh 288 minw 176 minh 144
#
usbcore: registered new interface driver gspca
#
/build/buildd/linux-modules-extra-2.6-2.6.22/debian/build/build_amd64_none_amd64_gspca/gspca_core.c:
gspca driver 2.6.22 registered

Someone suggested to me that doing "modprobe gspca vflip=1" would help
but it doesn't seem to come as an option ?

Also this message keeps appearing, when I test the camera with  "xawtv"

/build/buildd/linux-modules-extra-2.6-2.6.22/debian/build/build_amd64_none_amd64_gspca/gspca_core.c:
[gspca_set_isoc_ep:903] ISO EndPoint found 0x81 AlternateSet 7
/build/buildd/linux-modules-extra-2.6-2.6.22/debian/build/build_amd64_none_amd64_gspca/gspca_core.c:
VIDIOCMCAPTURE: invalid format (7)

Kind regards,
Jan Prunk

-- System Information:
Debian Release: lenny/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.22-3-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages gspca-modules-2.6.22-3-amd64 depends on:
ii  linux-image-2.6.22-3-amd64 [l 2.6.22-6   Linux 2.6.22 image on AMD64

gspca-modules-2.6.22-3-amd64 recommends no packages.

-- no debconf information



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



linux-2.6_2.6.18.dfsg.1-18etch1_amd64.changes INSTALLED into stable

2008-02-16 Thread Debian Installer

Installing:
linux-2.6_2.6.18.dfsg.1-18etch1.diff.gz
  to pool/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-18etch1.diff.gz
linux-2.6_2.6.18.dfsg.1-18etch1.dsc
  to pool/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-18etch1.dsc
linux-doc-2.6.18_2.6.18.dfsg.1-18etch1_all.deb
  to pool/main/l/linux-2.6/linux-doc-2.6.18_2.6.18.dfsg.1-18etch1_all.deb
linux-headers-2.6.18-6-all-amd64_2.6.18.dfsg.1-18etch1_amd64.deb
  to 
pool/main/l/linux-2.6/linux-headers-2.6.18-6-all-amd64_2.6.18.dfsg.1-18etch1_amd64.deb
linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch1_amd64.deb
  to 
pool/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch1_amd64.deb
linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-18etch1_amd64.deb
  to 
pool/main/l/linux-2.6/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-18etch1_amd64.deb
linux-headers-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-18etch1_amd64.deb
  to 
pool/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-18etch1_amd64.deb
linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch1_amd64.deb
  to 
pool/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch1_amd64.deb
linux-headers-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch1_amd64.deb
  to 
pool/main/l/linux-2.6/linux-headers-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch1_amd64.deb
linux-headers-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch1_amd64.deb
  to 
pool/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch1_amd64.deb
linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-18etch1_amd64.deb
  to 
pool/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-18etch1_amd64.deb
linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-18etch1_amd64.deb
  to 
pool/main/l/linux-2.6/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-18etch1_amd64.deb
linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch1_amd64.deb
  to 
pool/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch1_amd64.deb
linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-18etch1_amd64.deb
  to 
pool/main/l/linux-2.6/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-18etch1_amd64.deb
linux-image-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-18etch1_amd64.deb
  to 
pool/main/l/linux-2.6/linux-image-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-18etch1_amd64.deb
linux-image-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch1_amd64.deb
  to 
pool/main/l/linux-2.6/linux-image-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch1_amd64.deb
linux-image-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch1_amd64.deb
  to 
pool/main/l/linux-2.6/linux-image-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch1_amd64.deb
linux-manual-2.6.18_2.6.18.dfsg.1-18etch1_all.deb
  to pool/main/l/linux-2.6/linux-manual-2.6.18_2.6.18.dfsg.1-18etch1_all.deb
linux-modules-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch1_amd64.deb
  to 
pool/main/l/linux-2.6/linux-modules-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch1_amd64.deb
linux-modules-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch1_amd64.deb
  to 
pool/main/l/linux-2.6/linux-modules-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch1_amd64.deb
linux-patch-debian-2.6.18_2.6.18.dfsg.1-18etch1_all.deb
  to 
pool/main/l/linux-2.6/linux-patch-debian-2.6.18_2.6.18.dfsg.1-18etch1_all.deb
linux-source-2.6.18_2.6.18.dfsg.1-18etch1_all.deb
  to pool/main/l/linux-2.6/linux-source-2.6.18_2.6.18.dfsg.1-18etch1_all.deb
linux-support-2.6.18-6_2.6.18.dfsg.1-18etch1_all.deb
  to pool/main/l/linux-2.6/linux-support-2.6.18-6_2.6.18.dfsg.1-18etch1_all.deb
linux-tree-2.6.18_2.6.18.dfsg.1-18etch1_all.deb
  to pool/main/l/linux-2.6/linux-tree-2.6.18_2.6.18.dfsg.1-18etch1_all.deb
xen-linux-system-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch1_amd64.deb
  to 
pool/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch1_amd64.deb
xen-linux-system-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch1_amd64.deb
  to 
pool/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch1_amd64.deb


Override entries for your package:
linux-2.6_2.6.18.dfsg.1-18etch1.dsc - source devel
linux-doc-2.6.18_2.6.18.dfsg.1-18etch1_all.deb - optional doc
linux-headers-2.6.18-6-all-amd64_2.6.18.dfsg.1-18etch1_amd64.deb - optional 
devel
linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch1_amd64.deb - optional devel
linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-18etch1_amd64.deb - optional devel
linux-headers-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-18etch1_amd64.deb - optional 
devel
linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch1_amd64.deb - optional devel
linux-headers-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch1_amd64.deb - optional 
devel
linux-headers-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch1_amd64.deb - 
optional devel
linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-18etch1_amd64.deb - optional 
devel
linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-18etch1_amd64.deb - optional devel
linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch1_amd64.deb - optional devel
linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-18etch1_amd64.deb - optional admin
linux-image-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-18etch1_amd64.deb - optional 
admin
linux-image-2.6.18-6-xen-am

linux-modules-nonfree-2.6_2.6.18-4etch2_i386.changes INSTALLED into stable

2008-02-16 Thread Debian Installer

Installing:
kqemu-modules-2.6-486_2.6.18-4etch2_i386.deb
  to 
pool/non-free/l/linux-modules-nonfree-2.6/kqemu-modules-2.6-486_2.6.18-4etch2_i386.deb
kqemu-modules-2.6-686-bigmem_2.6.18-4etch2_i386.deb
  to 
pool/non-free/l/linux-modules-nonfree-2.6/kqemu-modules-2.6-686-bigmem_2.6.18-4etch2_i386.deb
kqemu-modules-2.6-686_2.6.18-4etch2_i386.deb
  to 
pool/non-free/l/linux-modules-nonfree-2.6/kqemu-modules-2.6-686_2.6.18-4etch2_i386.deb
kqemu-modules-2.6-k7_2.6.18-4etch2_i386.deb
  to 
pool/non-free/l/linux-modules-nonfree-2.6/kqemu-modules-2.6-k7_2.6.18-4etch2_i386.deb
kqemu-modules-2.6.18-6-486_2.6.18+1.3.0~pre9-4etch2_i386.deb
  to 
pool/non-free/l/linux-modules-nonfree-2.6/kqemu-modules-2.6.18-6-486_2.6.18+1.3.0~pre9-4etch2_i386.deb
kqemu-modules-2.6.18-6-686-bigmem_2.6.18+1.3.0~pre9-4etch2_i386.deb
  to 
pool/non-free/l/linux-modules-nonfree-2.6/kqemu-modules-2.6.18-6-686-bigmem_2.6.18+1.3.0~pre9-4etch2_i386.deb
kqemu-modules-2.6.18-6-686_2.6.18+1.3.0~pre9-4etch2_i386.deb
  to 
pool/non-free/l/linux-modules-nonfree-2.6/kqemu-modules-2.6.18-6-686_2.6.18+1.3.0~pre9-4etch2_i386.deb
kqemu-modules-2.6.18-6-k7_2.6.18+1.3.0~pre9-4etch2_i386.deb
  to 
pool/non-free/l/linux-modules-nonfree-2.6/kqemu-modules-2.6.18-6-k7_2.6.18+1.3.0~pre9-4etch2_i386.deb
linux-modules-nonfree-2.6_2.6.18-4etch2.dsc
  to 
pool/non-free/l/linux-modules-nonfree-2.6/linux-modules-nonfree-2.6_2.6.18-4etch2.dsc
linux-modules-nonfree-2.6_2.6.18-4etch2.tar.gz
  to 
pool/non-free/l/linux-modules-nonfree-2.6/linux-modules-nonfree-2.6_2.6.18-4etch2.tar.gz


Override entries for your package:
kqemu-modules-2.6-486_2.6.18-4etch2_i386.deb - optional non-free/admin
kqemu-modules-2.6-686-bigmem_2.6.18-4etch2_i386.deb - optional non-free/admin
kqemu-modules-2.6-686_2.6.18-4etch2_i386.deb - optional non-free/admin
kqemu-modules-2.6-k7_2.6.18-4etch2_i386.deb - optional non-free/admin
kqemu-modules-2.6.18-6-486_2.6.18+1.3.0~pre9-4etch2_i386.deb - optional 
non-free/admin
kqemu-modules-2.6.18-6-686-bigmem_2.6.18+1.3.0~pre9-4etch2_i386.deb - optional 
non-free/admin
kqemu-modules-2.6.18-6-686_2.6.18+1.3.0~pre9-4etch2_i386.deb - optional 
non-free/admin
kqemu-modules-2.6.18-6-k7_2.6.18+1.3.0~pre9-4etch2_i386.deb - optional 
non-free/admin
linux-modules-nonfree-2.6_2.6.18-4etch2.dsc - source non-free/devel

Announcing to [EMAIL PROTECTED]


Thank you for your contribution to Debian.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



linux-modules-contrib-2.6_2.6.18-4+etch3_i386.changes INSTALLED into stable

2008-02-16 Thread Debian Installer

Installing:
ipw2100-modules-2.6-486_2.6.18-4+etch3_i386.deb
  to 
pool/contrib/l/linux-modules-contrib-2.6/ipw2100-modules-2.6-486_2.6.18-4+etch3_i386.deb
ipw2100-modules-2.6-686-bigmem_2.6.18-4+etch3_i386.deb
  to 
pool/contrib/l/linux-modules-contrib-2.6/ipw2100-modules-2.6-686-bigmem_2.6.18-4+etch3_i386.deb
ipw2100-modules-2.6-686_2.6.18-4+etch3_i386.deb
  to 
pool/contrib/l/linux-modules-contrib-2.6/ipw2100-modules-2.6-686_2.6.18-4+etch3_i386.deb
ipw2100-modules-2.6-amd64_2.6.18-4+etch3_i386.deb
  to 
pool/contrib/l/linux-modules-contrib-2.6/ipw2100-modules-2.6-amd64_2.6.18-4+etch3_i386.deb
ipw2100-modules-2.6-k7_2.6.18-4+etch3_i386.deb
  to 
pool/contrib/l/linux-modules-contrib-2.6/ipw2100-modules-2.6-k7_2.6.18-4+etch3_i386.deb
ipw2100-modules-2.6-vserver-686_2.6.18-4+etch3_i386.deb
  to 
pool/contrib/l/linux-modules-contrib-2.6/ipw2100-modules-2.6-vserver-686_2.6.18-4+etch3_i386.deb
ipw2100-modules-2.6-vserver-k7_2.6.18-4+etch3_i386.deb
  to 
pool/contrib/l/linux-modules-contrib-2.6/ipw2100-modules-2.6-vserver-k7_2.6.18-4+etch3_i386.deb
ipw2100-modules-2.6-xen-686_2.6.18-4+etch3_i386.deb
  to 
pool/contrib/l/linux-modules-contrib-2.6/ipw2100-modules-2.6-xen-686_2.6.18-4+etch3_i386.deb
ipw2100-modules-2.6-xen-vserver-686_2.6.18-4+etch3_i386.deb
  to 
pool/contrib/l/linux-modules-contrib-2.6/ipw2100-modules-2.6-xen-vserver-686_2.6.18-4+etch3_i386.deb
ipw2100-modules-2.6.18-6-486_2.6.18+1.2.1-4+etch3_i386.deb
  to 
pool/contrib/l/linux-modules-contrib-2.6/ipw2100-modules-2.6.18-6-486_2.6.18+1.2.1-4+etch3_i386.deb
ipw2100-modules-2.6.18-6-686-bigmem_2.6.18+1.2.1-4+etch3_i386.deb
  to 
pool/contrib/l/linux-modules-contrib-2.6/ipw2100-modules-2.6.18-6-686-bigmem_2.6.18+1.2.1-4+etch3_i386.deb
ipw2100-modules-2.6.18-6-686_2.6.18+1.2.1-4+etch3_i386.deb
  to 
pool/contrib/l/linux-modules-contrib-2.6/ipw2100-modules-2.6.18-6-686_2.6.18+1.2.1-4+etch3_i386.deb
ipw2100-modules-2.6.18-6-amd64_2.6.18+1.2.1-4+etch3_i386.deb
  to 
pool/contrib/l/linux-modules-contrib-2.6/ipw2100-modules-2.6.18-6-amd64_2.6.18+1.2.1-4+etch3_i386.deb
ipw2100-modules-2.6.18-6-k7_2.6.18+1.2.1-4+etch3_i386.deb
  to 
pool/contrib/l/linux-modules-contrib-2.6/ipw2100-modules-2.6.18-6-k7_2.6.18+1.2.1-4+etch3_i386.deb
ipw2100-modules-2.6.18-6-vserver-686_2.6.18+1.2.1-4+etch3_i386.deb
  to 
pool/contrib/l/linux-modules-contrib-2.6/ipw2100-modules-2.6.18-6-vserver-686_2.6.18+1.2.1-4+etch3_i386.deb
ipw2100-modules-2.6.18-6-vserver-k7_2.6.18+1.2.1-4+etch3_i386.deb
  to 
pool/contrib/l/linux-modules-contrib-2.6/ipw2100-modules-2.6.18-6-vserver-k7_2.6.18+1.2.1-4+etch3_i386.deb
ipw2100-modules-2.6.18-6-xen-686_2.6.18+1.2.1-4+etch3_i386.deb
  to 
pool/contrib/l/linux-modules-contrib-2.6/ipw2100-modules-2.6.18-6-xen-686_2.6.18+1.2.1-4+etch3_i386.deb
ipw2100-modules-2.6.18-6-xen-vserver-686_2.6.18+1.2.1-4+etch3_i386.deb
  to 
pool/contrib/l/linux-modules-contrib-2.6/ipw2100-modules-2.6.18-6-xen-vserver-686_2.6.18+1.2.1-4+etch3_i386.deb
ipw2200-modules-2.6-486_2.6.18-4+etch3_i386.deb
  to 
pool/contrib/l/linux-modules-contrib-2.6/ipw2200-modules-2.6-486_2.6.18-4+etch3_i386.deb
ipw2200-modules-2.6-686-bigmem_2.6.18-4+etch3_i386.deb
  to 
pool/contrib/l/linux-modules-contrib-2.6/ipw2200-modules-2.6-686-bigmem_2.6.18-4+etch3_i386.deb
ipw2200-modules-2.6-686_2.6.18-4+etch3_i386.deb
  to 
pool/contrib/l/linux-modules-contrib-2.6/ipw2200-modules-2.6-686_2.6.18-4+etch3_i386.deb
ipw2200-modules-2.6-amd64_2.6.18-4+etch3_i386.deb
  to 
pool/contrib/l/linux-modules-contrib-2.6/ipw2200-modules-2.6-amd64_2.6.18-4+etch3_i386.deb
ipw2200-modules-2.6-k7_2.6.18-4+etch3_i386.deb
  to 
pool/contrib/l/linux-modules-contrib-2.6/ipw2200-modules-2.6-k7_2.6.18-4+etch3_i386.deb
ipw2200-modules-2.6-vserver-686_2.6.18-4+etch3_i386.deb
  to 
pool/contrib/l/linux-modules-contrib-2.6/ipw2200-modules-2.6-vserver-686_2.6.18-4+etch3_i386.deb
ipw2200-modules-2.6-vserver-k7_2.6.18-4+etch3_i386.deb
  to 
pool/contrib/l/linux-modules-contrib-2.6/ipw2200-modules-2.6-vserver-k7_2.6.18-4+etch3_i386.deb
ipw2200-modules-2.6-xen-686_2.6.18-4+etch3_i386.deb
  to 
pool/contrib/l/linux-modules-contrib-2.6/ipw2200-modules-2.6-xen-686_2.6.18-4+etch3_i386.deb
ipw2200-modules-2.6-xen-vserver-686_2.6.18-4+etch3_i386.deb
  to 
pool/contrib/l/linux-modules-contrib-2.6/ipw2200-modules-2.6-xen-vserver-686_2.6.18-4+etch3_i386.deb
ipw2200-modules-2.6.18-6-486_2.6.18+1.2.0-4+etch3_i386.deb
  to 
pool/contrib/l/linux-modules-contrib-2.6/ipw2200-modules-2.6.18-6-486_2.6.18+1.2.0-4+etch3_i386.deb
ipw2200-modules-2.6.18-6-686-bigmem_2.6.18+1.2.0-4+etch3_i386.deb
  to 
pool/contrib/l/linux-modules-contrib-2.6/ipw2200-modules-2.6.18-6-686-bigmem_2.6.18+1.2.0-4+etch3_i386.deb
ipw2200-modules-2.6.18-6-686_2.6.18+1.2.0-4+etch3_i386.deb
  to 
pool/contrib/l/linux-modules-contrib-2.6/ipw2200-modules-2.6.18-6-686_2.6.18+1.2.0-4+etch3_i386.deb
ipw2200-modules-2.6.18-6-amd64_2.6.18+1.2.0-4+etch3_i386.deb
  to 
pool/contrib/l/linux-modules-contrib-2.6/ipw2200-modules-2.6.18-6-amd64_2.6.18+1.2.0-4+etch3_i386.deb
ipw2200-modules

linux-latest-2.6_6etch3_alpha+amd64+arm+hppa+i386+ia64+mips+mipsel+powerpc+s390+sparc+source.changes INSTALLED into stable

2008-02-16 Thread Debian Installer

Installing:
kernel-image-2.6-386_2.6.18+6etch3_i386.deb
  to pool/main/l/linux-latest-2.6/kernel-image-2.6-386_2.6.18+6etch3_i386.deb
kernel-image-2.6-686-smp_2.6.18+6etch3_i386.deb
  to 
pool/main/l/linux-latest-2.6/kernel-image-2.6-686-smp_2.6.18+6etch3_i386.deb
kernel-image-2.6-686_2.6.18+6etch3_i386.deb
  to pool/main/l/linux-latest-2.6/kernel-image-2.6-686_2.6.18+6etch3_i386.deb
kernel-image-2.6-amd64-generic_2.6.18+6etch3_amd64.deb
  to 
pool/main/l/linux-latest-2.6/kernel-image-2.6-amd64-generic_2.6.18+6etch3_amd64.deb
kernel-image-2.6-amd64-generic_2.6.18+6etch3_i386.deb
  to 
pool/main/l/linux-latest-2.6/kernel-image-2.6-amd64-generic_2.6.18+6etch3_i386.deb
kernel-image-2.6-amd64-k8-smp_2.6.18+6etch3_amd64.deb
  to 
pool/main/l/linux-latest-2.6/kernel-image-2.6-amd64-k8-smp_2.6.18+6etch3_amd64.deb
kernel-image-2.6-amd64-k8-smp_2.6.18+6etch3_i386.deb
  to 
pool/main/l/linux-latest-2.6/kernel-image-2.6-amd64-k8-smp_2.6.18+6etch3_i386.deb
kernel-image-2.6-amd64-k8_2.6.18+6etch3_amd64.deb
  to 
pool/main/l/linux-latest-2.6/kernel-image-2.6-amd64-k8_2.6.18+6etch3_amd64.deb
kernel-image-2.6-amd64-k8_2.6.18+6etch3_i386.deb
  to 
pool/main/l/linux-latest-2.6/kernel-image-2.6-amd64-k8_2.6.18+6etch3_i386.deb
kernel-image-2.6-em64t-p4-smp_2.6.18+6etch3_amd64.deb
  to 
pool/main/l/linux-latest-2.6/kernel-image-2.6-em64t-p4-smp_2.6.18+6etch3_amd64.deb
kernel-image-2.6-em64t-p4-smp_2.6.18+6etch3_i386.deb
  to 
pool/main/l/linux-latest-2.6/kernel-image-2.6-em64t-p4-smp_2.6.18+6etch3_i386.deb
kernel-image-2.6-em64t-p4_2.6.18+6etch3_amd64.deb
  to 
pool/main/l/linux-latest-2.6/kernel-image-2.6-em64t-p4_2.6.18+6etch3_amd64.deb
kernel-image-2.6-em64t-p4_2.6.18+6etch3_i386.deb
  to 
pool/main/l/linux-latest-2.6/kernel-image-2.6-em64t-p4_2.6.18+6etch3_i386.deb
kernel-image-2.6-generic_2.6.18+6etch3_alpha.deb
  to 
pool/main/l/linux-latest-2.6/kernel-image-2.6-generic_2.6.18+6etch3_alpha.deb
kernel-image-2.6-itanium-smp_2.6.18+6etch3_ia64.deb
  to 
pool/main/l/linux-latest-2.6/kernel-image-2.6-itanium-smp_2.6.18+6etch3_ia64.deb
kernel-image-2.6-itanium_2.6.18+6etch3_ia64.deb
  to 
pool/main/l/linux-latest-2.6/kernel-image-2.6-itanium_2.6.18+6etch3_ia64.deb
kernel-image-2.6-k7-smp_2.6.18+6etch3_i386.deb
  to pool/main/l/linux-latest-2.6/kernel-image-2.6-k7-smp_2.6.18+6etch3_i386.deb
kernel-image-2.6-k7_2.6.18+6etch3_i386.deb
  to pool/main/l/linux-latest-2.6/kernel-image-2.6-k7_2.6.18+6etch3_i386.deb
kernel-image-2.6-mckinley-smp_2.6.18+6etch3_ia64.deb
  to 
pool/main/l/linux-latest-2.6/kernel-image-2.6-mckinley-smp_2.6.18+6etch3_ia64.deb
kernel-image-2.6-mckinley_2.6.18+6etch3_ia64.deb
  to 
pool/main/l/linux-latest-2.6/kernel-image-2.6-mckinley_2.6.18+6etch3_ia64.deb
kernel-image-2.6-power3-smp_2.6.18+6etch3_powerpc.deb
  to 
pool/main/l/linux-latest-2.6/kernel-image-2.6-power3-smp_2.6.18+6etch3_powerpc.deb
kernel-image-2.6-power3_2.6.18+6etch3_powerpc.deb
  to 
pool/main/l/linux-latest-2.6/kernel-image-2.6-power3_2.6.18+6etch3_powerpc.deb
kernel-image-2.6-power4-smp_2.6.18+6etch3_powerpc.deb
  to 
pool/main/l/linux-latest-2.6/kernel-image-2.6-power4-smp_2.6.18+6etch3_powerpc.deb
kernel-image-2.6-power4_2.6.18+6etch3_powerpc.deb
  to 
pool/main/l/linux-latest-2.6/kernel-image-2.6-power4_2.6.18+6etch3_powerpc.deb
kernel-image-2.6-powerpc-smp_2.6.18+6etch3_powerpc.deb
  to 
pool/main/l/linux-latest-2.6/kernel-image-2.6-powerpc-smp_2.6.18+6etch3_powerpc.deb
kernel-image-2.6-powerpc_2.6.18+6etch3_powerpc.deb
  to 
pool/main/l/linux-latest-2.6/kernel-image-2.6-powerpc_2.6.18+6etch3_powerpc.deb
kernel-image-2.6-s390_2.6.18+6etch3_s390.deb
  to pool/main/l/linux-latest-2.6/kernel-image-2.6-s390_2.6.18+6etch3_s390.deb
kernel-image-2.6-s390x_2.6.18+6etch3_s390.deb
  to pool/main/l/linux-latest-2.6/kernel-image-2.6-s390x_2.6.18+6etch3_s390.deb
kernel-image-2.6-smp_2.6.18+6etch3_alpha.deb
  to pool/main/l/linux-latest-2.6/kernel-image-2.6-smp_2.6.18+6etch3_alpha.deb
kernel-image-2.6-sparc64-smp_2.6.18+6etch3_sparc.deb
  to 
pool/main/l/linux-latest-2.6/kernel-image-2.6-sparc64-smp_2.6.18+6etch3_sparc.deb
kernel-image-2.6-sparc64_2.6.18+6etch3_sparc.deb
  to 
pool/main/l/linux-latest-2.6/kernel-image-2.6-sparc64_2.6.18+6etch3_sparc.deb
kernel-image-power3-smp_2.6.18+6etch3_powerpc.deb
  to 
pool/main/l/linux-latest-2.6/kernel-image-power3-smp_2.6.18+6etch3_powerpc.deb
kernel-image-power3_2.6.18+6etch3_powerpc.deb
  to pool/main/l/linux-latest-2.6/kernel-image-power3_2.6.18+6etch3_powerpc.deb
kernel-image-power4-smp_2.6.18+6etch3_powerpc.deb
  to 
pool/main/l/linux-latest-2.6/kernel-image-power4-smp_2.6.18+6etch3_powerpc.deb
kernel-image-power4_2.6.18+6etch3_powerpc.deb
  to pool/main/l/linux-latest-2.6/kernel-image-power4_2.6.18+6etch3_powerpc.deb
kernel-image-powerpc-smp_2.6.18+6etch3_powerpc.deb
  to 
pool/main/l/linux-latest-2.6/kernel-image-powerpc-smp_2.6.18+6etch3_powerpc.deb
kernel-image-powerpc_2.6.18+6etch3_powerpc.deb
  to pool/main/l/linux-latest-2.6/kernel-image-powerpc_2.6.18+6etch3_powerpc.deb
linux-headers-2.6-486

Bug#460337: marked as done (Fix ethernet interrupts for Cobalt RaQ1)

2008-02-16 Thread Debian Bug Tracking System

Your message dated Sat, 16 Feb 2008 12:17:32 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#460337: fixed in user-mode-linux 2.6.18-1um-2etch.18etch1
has caused the Debian Bug report #460337,
regarding Fix ethernet interrupts for Cobalt RaQ1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
460337: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=460337
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: linux-2.6
Version: 2.6.18.dfsg.1-12
Severity: important

The network interface on Cobalt RaQ1 has not worked since we moved
from 2.4 to 2.6.  There were quite a few reports about this on the
debian-mips list.  Thomas Bogendoerfer just posted a patch for this
problem.


- Forwarded message from Thomas Bogendoerfer <[EMAIL PROTECTED]> -

From: Thomas Bogendoerfer <[EMAIL PROTECTED]>
Subject: [PATCH] Fix ethernet interrupts for Cobalt RaQ1
Date: Sat, 12 Jan 2008 00:25:14 +0100 (CET)
To: [EMAIL PROTECTED]
cc: [EMAIL PROTECTED]

RAQ1 uses the same interrupt routing as qube2.

Signed-off-by: Thomas Bogendoerfer <[EMAIL PROTECTED]>
---

 arch/mips/pci/fixup-cobalt.c |2 +-
 1 files changed, 1 insertions(+), 1 deletions(-)

diff --git a/arch/mips/pci/fixup-cobalt.c b/arch/mips/pci/fixup-cobalt.c
index f7df114..9553b14 100644
--- a/arch/mips/pci/fixup-cobalt.c
+++ b/arch/mips/pci/fixup-cobalt.c
@@ -177,7 +177,7 @@ static char irq_tab_raq2[] __initdata = {
 
 int __init pcibios_map_irq(const struct pci_dev *dev, u8 slot, u8 pin)
 {
-   if (cobalt_board_id < COBALT_BRD_ID_QUBE2)
+   if (cobalt_board_id <= COBALT_BRD_ID_QUBE1)
return irq_tab_qube1[slot];
 
if (cobalt_board_id == COBALT_BRD_ID_RAQ2)

- End forwarded message -

-- 
Martin Michlmayr
http://www.cyrius.com/


--- End Message ---
--- Begin Message ---
Source: user-mode-linux
Source-Version: 2.6.18-1um-2etch.18etch1

We believe that the bug you reported is fixed in the latest version of
user-mode-linux, which is due to be installed in the Debian FTP archive:

user-mode-linux_2.6.18-1um-2etch.18etch1.diff.gz
  to 
pool/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch1.diff.gz
user-mode-linux_2.6.18-1um-2etch.18etch1.dsc
  to pool/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch1.dsc
user-mode-linux_2.6.18-1um-2etch.18etch1_i386.deb
  to 
pool/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch1_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
dann frazier <[EMAIL PROTECTED]> (supplier of updated user-mode-linux package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Tue, 12 Feb 2008 09:57:25 -0700
Source: user-mode-linux
Binary: user-mode-linux
Architecture: source i386
Version: 2.6.18-1um-2etch.18etch1
Distribution: stable-security
Urgency: high
Maintainer: User Mode Linux Maintainers <[EMAIL PROTECTED]>
Changed-By: dann frazier <[EMAIL PROTECTED]>
Description: 
 user-mode-linux - User-mode Linux (kernel)
Closes: 460337 461493
Changes: 
 user-mode-linux (2.6.18-1um-2etch.18etch1) stable-security; urgency=high
 .
   * Rebuild against linux-source-2.6.18 (2.6.18.dfsg.1-18etch1)
 * bugfix/vmsplice-security.patch
   [SECURITY] Fix missing access check in vmsplice.
   See CVE-2008-0010, CVE-2008-0600
 * bugfix/all/vserver/proc-link-security.patch
   [SECURITY][vserver] Fix access checks for the links in /proc/$pid.
   * Changes from linux-source-2.6.18 (2.6.18.dfsg.1-18)
 [ Martin Michlmayr ]
 * [mips] Fix network on Cobalt RaQ1, thanks Thomas Bogendoerfer
   (closes: #460337).
 .
 [ dann frazier ]
 * [ia64] Fix an issue with unaligned accesses and certain floating point
   instructions that can result in silent user data corruption
   (closes: #461493).
 * Update abi reference files for ABI 6
Files: 
 a316e3449f9cd0bbf497ad704c1d78ec 892 misc extra 
user-mode-linux_2.6.18-1um-2etch.18etch1.dsc
 b62c78f80dbe59c81827b4d7cf1c3997 16048 misc extra 
user-mode-linux_2.6.18-1um-2etch.18etch1.diff.gz
 1d2290c410d6d56c0e698f217ddb1dc6 25585940 misc extra 
user-mode-linux_2.6.18-1um-2etch.18etch1_i386.deb

-BEGIN PGP SIGNA

Bug#461493: marked as done (linux-2.6: [ia64] FP instructions/misaligned access cause silent user data corruption)

2008-02-16 Thread Debian Bug Tracking System

Your message dated Sat, 16 Feb 2008 12:17:32 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#461493: fixed in user-mode-linux 2.6.18-1um-2etch.18etch1
has caused the Debian Bug report #461493,
regarding linux-2.6: [ia64] FP instructions/misaligned access cause silent user 
data corruption
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
461493: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=461493
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: linux-2.6
Version: 2.6.18.dfsg.1-17
Severity: critical
Tags: patch
Justification: causes serious data loss

References:
  
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=1a499150e4ec1299232e24389f648d059ce5617a
  https://bugzilla.redhat.com/show_bug.cgi?id=428920
  https://bugzilla.novell.com/show_bug.cgi?id=354069

-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: ia64

Kernel: Linux 2.6.22-3-mckinley (SMP w/1 CPU core)
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)
Shell: /bin/sh linked to /bin/bash


--- End Message ---
--- Begin Message ---
Source: user-mode-linux
Source-Version: 2.6.18-1um-2etch.18etch1

We believe that the bug you reported is fixed in the latest version of
user-mode-linux, which is due to be installed in the Debian FTP archive:

user-mode-linux_2.6.18-1um-2etch.18etch1.diff.gz
  to 
pool/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch1.diff.gz
user-mode-linux_2.6.18-1um-2etch.18etch1.dsc
  to pool/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch1.dsc
user-mode-linux_2.6.18-1um-2etch.18etch1_i386.deb
  to 
pool/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch1_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
dann frazier <[EMAIL PROTECTED]> (supplier of updated user-mode-linux package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Tue, 12 Feb 2008 09:57:25 -0700
Source: user-mode-linux
Binary: user-mode-linux
Architecture: source i386
Version: 2.6.18-1um-2etch.18etch1
Distribution: stable-security
Urgency: high
Maintainer: User Mode Linux Maintainers <[EMAIL PROTECTED]>
Changed-By: dann frazier <[EMAIL PROTECTED]>
Description: 
 user-mode-linux - User-mode Linux (kernel)
Closes: 460337 461493
Changes: 
 user-mode-linux (2.6.18-1um-2etch.18etch1) stable-security; urgency=high
 .
   * Rebuild against linux-source-2.6.18 (2.6.18.dfsg.1-18etch1)
 * bugfix/vmsplice-security.patch
   [SECURITY] Fix missing access check in vmsplice.
   See CVE-2008-0010, CVE-2008-0600
 * bugfix/all/vserver/proc-link-security.patch
   [SECURITY][vserver] Fix access checks for the links in /proc/$pid.
   * Changes from linux-source-2.6.18 (2.6.18.dfsg.1-18)
 [ Martin Michlmayr ]
 * [mips] Fix network on Cobalt RaQ1, thanks Thomas Bogendoerfer
   (closes: #460337).
 .
 [ dann frazier ]
 * [ia64] Fix an issue with unaligned accesses and certain floating point
   instructions that can result in silent user data corruption
   (closes: #461493).
 * Update abi reference files for ABI 6
Files: 
 a316e3449f9cd0bbf497ad704c1d78ec 892 misc extra 
user-mode-linux_2.6.18-1um-2etch.18etch1.dsc
 b62c78f80dbe59c81827b4d7cf1c3997 16048 misc extra 
user-mode-linux_2.6.18-1um-2etch.18etch1.diff.gz
 1d2290c410d6d56c0e698f217ddb1dc6 25585940 misc extra 
user-mode-linux_2.6.18-1um-2etch.18etch1_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFHsgQJhuANDBmkLRkRApscAKCJNCn9DnLiOPi8SLIrW8REOafUVACgkt7P
ncqNS55G+rHbBayQAA7ts68=
=4zjq
-END PGP SIGNATURE-


--- End Message ---


Bug#460337: marked as done (Fix ethernet interrupts for Cobalt RaQ1)

2008-02-16 Thread Debian Bug Tracking System

Your message dated Sat, 16 Feb 2008 12:17:05 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#460337: fixed in fai-kernels 1.17+etch.18etch1
has caused the Debian Bug report #460337,
regarding Fix ethernet interrupts for Cobalt RaQ1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
460337: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=460337
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: linux-2.6
Version: 2.6.18.dfsg.1-12
Severity: important

The network interface on Cobalt RaQ1 has not worked since we moved
from 2.4 to 2.6.  There were quite a few reports about this on the
debian-mips list.  Thomas Bogendoerfer just posted a patch for this
problem.


- Forwarded message from Thomas Bogendoerfer <[EMAIL PROTECTED]> -

From: Thomas Bogendoerfer <[EMAIL PROTECTED]>
Subject: [PATCH] Fix ethernet interrupts for Cobalt RaQ1
Date: Sat, 12 Jan 2008 00:25:14 +0100 (CET)
To: [EMAIL PROTECTED]
cc: [EMAIL PROTECTED]

RAQ1 uses the same interrupt routing as qube2.

Signed-off-by: Thomas Bogendoerfer <[EMAIL PROTECTED]>
---

 arch/mips/pci/fixup-cobalt.c |2 +-
 1 files changed, 1 insertions(+), 1 deletions(-)

diff --git a/arch/mips/pci/fixup-cobalt.c b/arch/mips/pci/fixup-cobalt.c
index f7df114..9553b14 100644
--- a/arch/mips/pci/fixup-cobalt.c
+++ b/arch/mips/pci/fixup-cobalt.c
@@ -177,7 +177,7 @@ static char irq_tab_raq2[] __initdata = {
 
 int __init pcibios_map_irq(const struct pci_dev *dev, u8 slot, u8 pin)
 {
-   if (cobalt_board_id < COBALT_BRD_ID_QUBE2)
+   if (cobalt_board_id <= COBALT_BRD_ID_QUBE1)
return irq_tab_qube1[slot];
 
if (cobalt_board_id == COBALT_BRD_ID_RAQ2)

- End forwarded message -

-- 
Martin Michlmayr
http://www.cyrius.com/


--- End Message ---
--- Begin Message ---
Source: fai-kernels
Source-Version: 1.17+etch.18etch1

We believe that the bug you reported is fixed in the latest version of
fai-kernels, which is due to be installed in the Debian FTP archive:

fai-kernels_1.17+etch.18etch1.dsc
  to pool/main/f/fai-kernels/fai-kernels_1.17+etch.18etch1.dsc
fai-kernels_1.17+etch.18etch1.tar.gz
  to pool/main/f/fai-kernels/fai-kernels_1.17+etch.18etch1.tar.gz
fai-kernels_1.17+etch.18etch1_i386.deb
  to pool/main/f/fai-kernels/fai-kernels_1.17+etch.18etch1_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
dann frazier <[EMAIL PROTECTED]> (supplier of updated fai-kernels package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Tue, 12 Feb 2008 09:59:43 -0700
Source: fai-kernels
Binary: fai-kernels
Architecture: source i386
Version: 1.17+etch.18etch1
Distribution: stable-security
Urgency: high
Maintainer: Holger Levsen <[EMAIL PROTECTED]>
Changed-By: dann frazier <[EMAIL PROTECTED]>
Description: 
 fai-kernels - special kernels for FAI (Fully Automatic Installation)
Closes: 460337 461493
Changes: 
 fai-kernels (1.17+etch.18etch1) stable-security; urgency=high
 .
   * Rebuild against linux-source-2.6.18 (2.6.18.dfsg.1-18etch1)
 * bugfix/vmsplice-security.patch
   [SECURITY] Fix missing access check in vmsplice.
   See CVE-2008-0010, CVE-2008-0600
 * bugfix/all/vserver/proc-link-security.patch
   [SECURITY][vserver] Fix access checks for the links in /proc/$pid.
   * Changes from linux-source-2.6.18 (2.6.18.dfsg.1-18)
 [ Martin Michlmayr ]
 * [mips] Fix network on Cobalt RaQ1, thanks Thomas Bogendoerfer
   (closes: #460337).
 .
 [ dann frazier ]
 * [ia64] Fix an issue with unaligned accesses and certain floating point
   instructions that can result in silent user data corruption
   (closes: #461493).
 * Update abi reference files for ABI 6
Files: 
 42ad7f3b4925c86466a12f6af1f60d34 740 admin extra 
fai-kernels_1.17+etch.18etch1.dsc
 1d940e99b60ea13d97af2a2c7091b7ca 56178 admin extra 
fai-kernels_1.17+etch.18etch1.tar.gz
 f19755f1460aadb94f355e4b601e90e5 5503064 admin extra 
fai-kernels_1.17+etch.18etch1_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFHsgPjhuANDBmkLRkRAhllAJ4ws/6hlYtCuBq9u3YHVpjEoQ0DHwCbB8Lt
HMTbm1UMBp9kLHIG5gw+Jus=
=oF8O
-END PGP SIGN

linux-modules-extra-2.6_2.6.18-7+etch4_i386.changes INSTALLED into stable

2008-02-16 Thread Debian Installer

Installing:
gspca-modules-2.6-486_2.6.18-7+etch4_i386.deb
  to 
pool/main/l/linux-modules-extra-2.6/gspca-modules-2.6-486_2.6.18-7+etch4_i386.deb
gspca-modules-2.6-686-bigmem_2.6.18-7+etch4_i386.deb
  to 
pool/main/l/linux-modules-extra-2.6/gspca-modules-2.6-686-bigmem_2.6.18-7+etch4_i386.deb
gspca-modules-2.6-686_2.6.18-7+etch4_i386.deb
  to 
pool/main/l/linux-modules-extra-2.6/gspca-modules-2.6-686_2.6.18-7+etch4_i386.deb
gspca-modules-2.6-amd64_2.6.18-7+etch4_i386.deb
  to 
pool/main/l/linux-modules-extra-2.6/gspca-modules-2.6-amd64_2.6.18-7+etch4_i386.deb
gspca-modules-2.6-k7_2.6.18-7+etch4_i386.deb
  to 
pool/main/l/linux-modules-extra-2.6/gspca-modules-2.6-k7_2.6.18-7+etch4_i386.deb
gspca-modules-2.6-vserver-686_2.6.18-7+etch4_i386.deb
  to 
pool/main/l/linux-modules-extra-2.6/gspca-modules-2.6-vserver-686_2.6.18-7+etch4_i386.deb
gspca-modules-2.6-vserver-k7_2.6.18-7+etch4_i386.deb
  to 
pool/main/l/linux-modules-extra-2.6/gspca-modules-2.6-vserver-k7_2.6.18-7+etch4_i386.deb
gspca-modules-2.6-xen-686_2.6.18-7+etch4_i386.deb
  to 
pool/main/l/linux-modules-extra-2.6/gspca-modules-2.6-xen-686_2.6.18-7+etch4_i386.deb
gspca-modules-2.6-xen-vserver-686_2.6.18-7+etch4_i386.deb
  to 
pool/main/l/linux-modules-extra-2.6/gspca-modules-2.6-xen-vserver-686_2.6.18-7+etch4_i386.deb
gspca-modules-2.6.18-6-486_2.6.18+01.00.04-7+etch4_i386.deb
  to 
pool/main/l/linux-modules-extra-2.6/gspca-modules-2.6.18-6-486_2.6.18+01.00.04-7+etch4_i386.deb
gspca-modules-2.6.18-6-686-bigmem_2.6.18+01.00.04-7+etch4_i386.deb
  to 
pool/main/l/linux-modules-extra-2.6/gspca-modules-2.6.18-6-686-bigmem_2.6.18+01.00.04-7+etch4_i386.deb
gspca-modules-2.6.18-6-686_2.6.18+01.00.04-7+etch4_i386.deb
  to 
pool/main/l/linux-modules-extra-2.6/gspca-modules-2.6.18-6-686_2.6.18+01.00.04-7+etch4_i386.deb
gspca-modules-2.6.18-6-amd64_2.6.18+01.00.04-7+etch4_i386.deb
  to 
pool/main/l/linux-modules-extra-2.6/gspca-modules-2.6.18-6-amd64_2.6.18+01.00.04-7+etch4_i386.deb
gspca-modules-2.6.18-6-k7_2.6.18+01.00.04-7+etch4_i386.deb
  to 
pool/main/l/linux-modules-extra-2.6/gspca-modules-2.6.18-6-k7_2.6.18+01.00.04-7+etch4_i386.deb
gspca-modules-2.6.18-6-vserver-686_2.6.18+01.00.04-7+etch4_i386.deb
  to 
pool/main/l/linux-modules-extra-2.6/gspca-modules-2.6.18-6-vserver-686_2.6.18+01.00.04-7+etch4_i386.deb
gspca-modules-2.6.18-6-vserver-k7_2.6.18+01.00.04-7+etch4_i386.deb
  to 
pool/main/l/linux-modules-extra-2.6/gspca-modules-2.6.18-6-vserver-k7_2.6.18+01.00.04-7+etch4_i386.deb
gspca-modules-2.6.18-6-xen-686_2.6.18+01.00.04-7+etch4_i386.deb
  to 
pool/main/l/linux-modules-extra-2.6/gspca-modules-2.6.18-6-xen-686_2.6.18+01.00.04-7+etch4_i386.deb
gspca-modules-2.6.18-6-xen-vserver-686_2.6.18+01.00.04-7+etch4_i386.deb
  to 
pool/main/l/linux-modules-extra-2.6/gspca-modules-2.6.18-6-xen-vserver-686_2.6.18+01.00.04-7+etch4_i386.deb
linux-modules-extra-2.6_2.6.18-7+etch4.dsc
  to 
pool/main/l/linux-modules-extra-2.6/linux-modules-extra-2.6_2.6.18-7+etch4.dsc
linux-modules-extra-2.6_2.6.18-7+etch4.tar.gz
  to 
pool/main/l/linux-modules-extra-2.6/linux-modules-extra-2.6_2.6.18-7+etch4.tar.gz
redhat-cluster-modules-2.6-486_2.6.18-7+etch4_i386.deb
  to 
pool/main/l/linux-modules-extra-2.6/redhat-cluster-modules-2.6-486_2.6.18-7+etch4_i386.deb
redhat-cluster-modules-2.6-686-bigmem_2.6.18-7+etch4_i386.deb
  to 
pool/main/l/linux-modules-extra-2.6/redhat-cluster-modules-2.6-686-bigmem_2.6.18-7+etch4_i386.deb
redhat-cluster-modules-2.6-686_2.6.18-7+etch4_i386.deb
  to 
pool/main/l/linux-modules-extra-2.6/redhat-cluster-modules-2.6-686_2.6.18-7+etch4_i386.deb
redhat-cluster-modules-2.6-amd64_2.6.18-7+etch4_i386.deb
  to 
pool/main/l/linux-modules-extra-2.6/redhat-cluster-modules-2.6-amd64_2.6.18-7+etch4_i386.deb
redhat-cluster-modules-2.6-k7_2.6.18-7+etch4_i386.deb
  to 
pool/main/l/linux-modules-extra-2.6/redhat-cluster-modules-2.6-k7_2.6.18-7+etch4_i386.deb
redhat-cluster-modules-2.6-vserver-686_2.6.18-7+etch4_i386.deb
  to 
pool/main/l/linux-modules-extra-2.6/redhat-cluster-modules-2.6-vserver-686_2.6.18-7+etch4_i386.deb
redhat-cluster-modules-2.6-vserver-k7_2.6.18-7+etch4_i386.deb
  to 
pool/main/l/linux-modules-extra-2.6/redhat-cluster-modules-2.6-vserver-k7_2.6.18-7+etch4_i386.deb
redhat-cluster-modules-2.6-xen-686_2.6.18-7+etch4_i386.deb
  to 
pool/main/l/linux-modules-extra-2.6/redhat-cluster-modules-2.6-xen-686_2.6.18-7+etch4_i386.deb
redhat-cluster-modules-2.6-xen-vserver-686_2.6.18-7+etch4_i386.deb
  to 
pool/main/l/linux-modules-extra-2.6/redhat-cluster-modules-2.6-xen-vserver-686_2.6.18-7+etch4_i386.deb
redhat-cluster-modules-2.6.18-6-486_2.6.18+1.03.00-7+etch4_i386.deb
  to 
pool/main/l/linux-modules-extra-2.6/redhat-cluster-modules-2.6.18-6-486_2.6.18+1.03.00-7+etch4_i386.deb
redhat-cluster-modules-2.6.18-6-686-bigmem_2.6.18+1.03.00-7+etch4_i386.deb
  to 
pool/main/l/linux-modules-extra-2.6/redhat-cluster-modules-2.6.18-6-686-bigmem_2.6.18+1.03.00-7+etch4_i386.deb
redhat-cluster-modules-2.6.18-6-686_2.6.18+1.03.00-7+etch4_i386.deb
  to 
pool/main/l/li

Bug#461493: marked as done (linux-2.6: [ia64] FP instructions/misaligned access cause silent user data corruption)

2008-02-16 Thread Debian Bug Tracking System

Your message dated Sat, 16 Feb 2008 12:17:06 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#461493: fixed in fai-kernels 1.17+etch.18etch1
has caused the Debian Bug report #461493,
regarding linux-2.6: [ia64] FP instructions/misaligned access cause silent user 
data corruption
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
461493: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=461493
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: linux-2.6
Version: 2.6.18.dfsg.1-17
Severity: critical
Tags: patch
Justification: causes serious data loss

References:
  
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=1a499150e4ec1299232e24389f648d059ce5617a
  https://bugzilla.redhat.com/show_bug.cgi?id=428920
  https://bugzilla.novell.com/show_bug.cgi?id=354069

-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: ia64

Kernel: Linux 2.6.22-3-mckinley (SMP w/1 CPU core)
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)
Shell: /bin/sh linked to /bin/bash


--- End Message ---
--- Begin Message ---
Source: fai-kernels
Source-Version: 1.17+etch.18etch1

We believe that the bug you reported is fixed in the latest version of
fai-kernels, which is due to be installed in the Debian FTP archive:

fai-kernels_1.17+etch.18etch1.dsc
  to pool/main/f/fai-kernels/fai-kernels_1.17+etch.18etch1.dsc
fai-kernels_1.17+etch.18etch1.tar.gz
  to pool/main/f/fai-kernels/fai-kernels_1.17+etch.18etch1.tar.gz
fai-kernels_1.17+etch.18etch1_i386.deb
  to pool/main/f/fai-kernels/fai-kernels_1.17+etch.18etch1_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
dann frazier <[EMAIL PROTECTED]> (supplier of updated fai-kernels package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Tue, 12 Feb 2008 09:59:43 -0700
Source: fai-kernels
Binary: fai-kernels
Architecture: source i386
Version: 1.17+etch.18etch1
Distribution: stable-security
Urgency: high
Maintainer: Holger Levsen <[EMAIL PROTECTED]>
Changed-By: dann frazier <[EMAIL PROTECTED]>
Description: 
 fai-kernels - special kernels for FAI (Fully Automatic Installation)
Closes: 460337 461493
Changes: 
 fai-kernels (1.17+etch.18etch1) stable-security; urgency=high
 .
   * Rebuild against linux-source-2.6.18 (2.6.18.dfsg.1-18etch1)
 * bugfix/vmsplice-security.patch
   [SECURITY] Fix missing access check in vmsplice.
   See CVE-2008-0010, CVE-2008-0600
 * bugfix/all/vserver/proc-link-security.patch
   [SECURITY][vserver] Fix access checks for the links in /proc/$pid.
   * Changes from linux-source-2.6.18 (2.6.18.dfsg.1-18)
 [ Martin Michlmayr ]
 * [mips] Fix network on Cobalt RaQ1, thanks Thomas Bogendoerfer
   (closes: #460337).
 .
 [ dann frazier ]
 * [ia64] Fix an issue with unaligned accesses and certain floating point
   instructions that can result in silent user data corruption
   (closes: #461493).
 * Update abi reference files for ABI 6
Files: 
 42ad7f3b4925c86466a12f6af1f60d34 740 admin extra 
fai-kernels_1.17+etch.18etch1.dsc
 1d940e99b60ea13d97af2a2c7091b7ca 56178 admin extra 
fai-kernels_1.17+etch.18etch1.tar.gz
 f19755f1460aadb94f355e4b601e90e5 5503064 admin extra 
fai-kernels_1.17+etch.18etch1_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFHsgPjhuANDBmkLRkRAhllAJ4ws/6hlYtCuBq9u3YHVpjEoQ0DHwCbB8Lt
HMTbm1UMBp9kLHIG5gw+Jus=
=oF8O
-END PGP SIGNATURE-


--- End Message ---


Bug#466091: linux-image-2.6.18-6-686: Oops every few days with NAT usage (anon_vma_unlink / if_err_eth1)

2008-02-16 Thread Atis Lezdins
Package: linux-image-2.6.18-6-686
Version: 2.6.18.dfsg.1-18etch1
Severity: normal

I'm experiencing kernel Oops every few days. All userspace programs
stop responding, however iptables keep working.

lspci:
---
00:00.0 Host bridge: VIA Technologies, Inc. VT8366/A/7 [Apollo KT266/A/333]
00:01.0 PCI bridge: VIA Technologies, Inc. VT8366/A/7 [Apollo KT266/A/333 AGP]
00:09.0 RAID bus controller: VIA Technologies, Inc. VT6421 IDE RAID
Controller (rev 50)
00:0b.0 Ethernet controller: Realtek Semiconductor Co., Ltd.
RTL-8139/8139C/8139C+ (rev 10)
00:0d.0 Ethernet controller: Realtek Semiconductor Co., Ltd.
RTL-8139/8139C/8139C+ (rev 10)
00:11.0 ISA bridge: VIA Technologies, Inc. VT8233A ISA Bridge
00:11.1 IDE interface: VIA Technologies, Inc.
VT82C586A/B/VT82C686/A/B/VT823x/A/C PIPC Bus Master IDE (rev 06)
00:11.2 USB Controller: VIA Technologies, Inc. VT82x UHCI USB 1.1
Controller (rev 23)
00:11.3 USB Controller: VIA Technologies, Inc. VT82x UHCI USB 1.1
Controller (rev 23)
01:00.0 VGA compatible controller: nVidia Corporation NV11 [GeForce2
MX/MX 400] (rev b2)

Here's the output i see in pts:
---
Message from [EMAIL PROTECTED] at Sat Feb 16 12:25:05 2008 ...
debian kernel: Oops: 0002 [#1]

Message from [EMAIL PROTECTED] at Sat Feb 16 12:25:05 2008 ...
debian kernel: SMP

Message from [EMAIL PROTECTED] at Sat Feb 16 12:25:05 2008 ...
debian kernel: CPU:0

Message from [EMAIL PROTECTED] at Sat Feb 16 12:25:05 2008 ...
debian kernel: EIP is at anon_vma_unlink+0x24/0x4d

Message from [EMAIL PROTECTED] at Sat Feb 16 12:25:05 2008 ...
debian kernel: eax: e763f93c   ebx: f32e5ee8   ecx: e7f4e93c   edx: 5eec

Message from [EMAIL PROTECTED] at Sat Feb 16 12:25:05 2008 ...
debian kernel: esi: e7f4e908   edi: e7f4e908   ebp: b7e1a000   esp: e7abfe2c

Message from [EMAIL PROTECTED] at Sat Feb 16 12:25:05 2008 ...
debian kernel: ds: 007b   es: 007b   ss: 0068

Message from [EMAIL PROTECTED] at Sat Feb 16 12:25:05 2008 ...
debian kernel: Process if_err_eth1 (pid: 30726, ti=e7abe000
task=e7b3e550 task.ti=e7abe000)

Message from [EMAIL PROTECTED] at Sat Feb 16 12:25:05 2008 ...
debian kernel: Stack: e7f4b7b8 e7f4e908 c014d1f9  e7abfe68
e7abfe68 e7884764 ed648200

Message from [EMAIL PROTECTED] at Sat Feb 16 12:25:05 2008 ...
debian kernel:e7f4ac80 c014de01   e7abfe64
 009a c17058a0

Message from [EMAIL PROTECTED] at Sat Feb 16 12:25:05 2008 ...
debian kernel:ed648200 ed648248 c029c0cd c011b217 ed648200
f74b5c62 c01631d8 f763b200

Message from [EMAIL PROTECTED] at Sat Feb 16 12:25:05 2008 ...
debian kernel: Call Trace:

Message from [EMAIL PROTECTED] at Sat Feb 16 12:25:05 2008 ...
debian kernel: Code: 08 00 00 00 00 eb cb 56 89 c6 53 8b 58 3c 85 db
74 3f 89 d8 e8 96 fc 12 00 8d 4e 34 8b 56 34 8b 41 04 89 10 c7 46 34
00 01 10 00 <89> 42 04 8b 53 04 b0 01 c7 41 04 00 02 20 00 8d 4b 04 86
03 39

Message from [EMAIL PROTECTED] at Sat Feb 16 12:25:05 2008 ...
debian kernel: EIP: [] anon_vma_unlink+0x24/0x4d SS:ESP 0068:e7abfe2c

-- System Information:
Debian Release: 4.0
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-6-686
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)

Versions of packages linux-image-2.6.18-6-686 depends on:
ii  coreutils5.97-5.3The GNU core utilities
ii  debconf [debconf-2.0]1.5.11etch1 Debian configuration management sy
ii  initramfs-tools [linux-initr 0.85h   tools for generating an initramfs
ii  module-init-tools3.3-pre4-2  tools for managing Linux kernel mo

Versions of packages linux-image-2.6.18-6-686 recommends:
ii  libc6-i686 2.3.6.ds1-13etch4 GNU C Library: Shared libraries [i

-- debconf information:
  shared/kernel-image/really-run-bootloader: true
  linux-image-2.6.18-6-686/preinst/elilo-initrd-2.6.18-6-686: true
* linux-image-2.6.18-6-686/preinst/already-running-this-2.6.18-6-686:
  linux-image-2.6.18-6-686/postinst/depmod-error-2.6.18-6-686: false
  linux-image-2.6.18-6-686/preinst/initrd-2.6.18-6-686:
  linux-image-2.6.18-6-686/postinst/old-initrd-link-2.6.18-6-686: true
  linux-image-2.6.18-6-686/preinst/bootloader-initrd-2.6.18-6-686: true
  linux-image-2.6.18-6-686/preinst/abort-install-2.6.18-6-686:
  linux-image-2.6.18-6-686/preinst/lilo-has-ramdisk:
  linux-image-2.6.18-6-686/preinst/overwriting-modules-2.6.18-6-686: true
  linux-image-2.6.18-6-686/postinst/bootloader-error-2.6.18-6-686:
  linux-image-2.6.18-6-686/prerm/would-invalidate-boot-loader-2.6.18-6-686: true
  linux-image-2.6.18-6-686/postinst/bootloader-test-error-2.6.18-6-686:
  linux-image-2.6.18-6-686/postinst/create-kimage-link-2.6.18-6-686: true
  linux-image-2.6.18-6-686/postinst/depmod-error-initrd-2.6.18-6-686: false
  linux-image-2.6.18-6-686/preinst/lilo-initrd-2.6.18-6-686: true
  linux-image-2.6.18-6-686/postinst/old-dir-initrd-link-2.6.18-6-686: true
  linux-image-2.6.18-6-686/preinst/failed-

Bug#463751: linux-image-2.6.24-1-amd64: iwlwifi module don't accept dhcp request

2008-02-16 Thread Daniel Huhardeaux

Hi,

I tried with adding

options iwl3945 disable_hw_scan=1 


in modprobe.conf: no changes. When I remove the module, in dmesg I see

ACPI: PCI interrupt for device :0b:00.0 disabled

When I load the module, there is

iwl3945: Intel(R) PRO/Wireless 3945ABG/BG Network Connection driver for Linux, 
1.1.17ks
iwl3945: Copyright(c) 2003-2007 Intel Corporation
ACPI: PCI Interrupt :0b:00.0[A] -> GSI 16 (level, low) -> IRQ 16
PCI: Setting latency timer of device :0b:00.0 to 64
iwl3945: Detected Intel PRO/Wireless 3945ABG Network Connection
iwl3945: Tunable channels: 13 802.11bg, 23 802.11a channels
phy1: Selected rate control algorithm 'iwl-3945-rs'

A iwconfig essid ESSID && iwconfig key APKey gives in dmesg:

ADDRCONF(NETDEV_UP): wlan0: link is not ready
wlan0: Initial auth_alg=0
wlan0: authenticate with AP 00:0f:66:d9:ec:a5
wlan0: RX authentication from 00:0f:66:d9:ec:a5 (alg=0 transaction=2 status=0)
wlan0: authenticated
wlan0: associate with AP 00:0f:66:d9:ec:a5
wlan0: RX AssocResp from 00:0f:66:d9:ec:a5 (capab=0x411 status=0 aid=2)
wlan0: associated
ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
wlan0: no IPv6 routers present

Dhclient is still not working.

ifconfig  netmask  up  


is also not connecting to the AP. Kernel is

[EMAIL PROTECTED]:~$ aptitude show linux-image-2.6.24-1-amd64
Paquet : linux-image-2.6.24-1-amd64
Nouveau: oui
État: installé
Automatiquement installé: non
Version : 2.6.24-4

--
Daniel






Bug#401035: ST310211A and HPA ( was Re: Bug#401035: linux-image-2.6-686 - another misbehaving Seagate )

2008-02-16 Thread Bartlomiej Zolnierkiewicz
On Wednesday 06 February 2008, Mikko Rapeli wrote:
> (cc'ing linux-ide)
> 
> On Mon, Feb 04, 2008 at 02:32:59AM +0100, Bart Champagne wrote:
> > Just found another type of Seagate drives that shows this behaviour : 
> > ST310211A
> > Can this one be blacklisted as well ?
> 
> Yes, do you have a patch? And a dmesg dump of the drive in use with and 
> without a patch?
> 
> If you do, please send them to upstream [EMAIL PROTECTED] and hope
> that the fix gets applied to Debian kernels too. Also, please test the
> sata/pata driver with your drive and add a blacklist there too.
> 
> If you don't have a patch, here's one for 2.6.24 to go.
> 
> From 4a8b40c53d2e539bad3f93996f599d69a16af94b Mon Sep 17 00:00:00 2001
> From: Mikko Rapeli <[EMAIL PROTECTED]>
> Date: Wed, 6 Feb 2008 09:41:14 +0200
> Subject: [PATCH] ST310211A has buggy HPA too.
> 
> Signed-off-by: Mikko Rapeli <[EMAIL PROTECTED]>

applied (this was confirmed by Bart Champagne to fix the issue)

Thanks.

> ---
>  drivers/ata/libata-core.c |1 +
>  drivers/ide/ide-disk.c|1 +
>  2 files changed, 2 insertions(+), 0 deletions(-)
> 
> diff --git a/drivers/ata/libata-core.c b/drivers/ata/libata-core.c
> index 6380726..d08f869 100644
> --- a/drivers/ata/libata-core.c
> +++ b/drivers/ata/libata-core.c
> @@ -4169,6 +4169,7 @@ static const struct ata_blacklist_entry 
> ata_device_blacklist [] = {
>   /* Devices which report 1 sector over size HPA */
>   { "ST340823A",  NULL,   ATA_HORKAGE_HPA_SIZE, },
>   { "ST320413A",  NULL,   ATA_HORKAGE_HPA_SIZE, },
> + { "ST310211A",  NULL,   ATA_HORKAGE_HPA_SIZE, },
>  
>   /* Devices which get the IVB wrong */
>   { "QUANTUM FIREBALLlct10 05", "A03.0900", ATA_HORKAGE_IVB, },
> diff --git a/drivers/ide/ide-disk.c b/drivers/ide/ide-disk.c
> index b178190..a0f9940 100644
> --- a/drivers/ide/ide-disk.c
> +++ b/drivers/ide/ide-disk.c
> @@ -462,6 +462,7 @@ static inline int idedisk_supports_lba48(const struct 
> hd_driveid *id)
>  static const struct drive_list_entry hpa_list[] = {
>   { "ST340823A",  NULL },
>   { "ST320413A",  NULL },
> + { "ST310211A",  NULL },
>   { NULL, NULL }
>  };



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Future of the linux udebs

2008-02-16 Thread Bastian Blank
On Fri, Feb 15, 2008 at 04:40:47PM -0200, Otavio Salvador wrote:
> If a unwanted kernel is uploaded to sid and we wanted to update the
> udebs, for a release or something, we would end up doing it
> t-p-u. This would be done with minor testing and possible breaking
> lenny installer.

So? If we need to update the kernel themself, it is also needed.

> >> So your idea is to this list be placed inside each source package?
> > It's the only solution which will not kill new versions without code to
> > ignore udebs if the definitions are broken.
> Didn get you here. Could you elaborate it a bit?

The list contains module X. This module got removed. What should happen
with the build?
- Fail silent. Ignore the error and don't output any udebs.
- Fail loud.

The first variant needs to be used if the list is included from an
external source if it should not break it complete. I won't implement it
because the build output is not longer reproducible.

> > The list needs to be available during build of the source package, it is
> > not possible to change them after that.
> Sure. But it could be available from kernel-wedge or something?

It introduces an out-of-date problem. You can only force the
availability of a new enough version by an explicit build-dep. To be
exact, it needs to be a = dep.

> This
> would allow us to keep control about what would be end in d-i kernel
> modules packages.

We have to process it anyway and will be able to change it in any way we
want. This is called trust.

> If this could be done from a d-i package (k-w or anything) it gives us
> a cannonical place to look at and don't force us to follow another
> commit mailing list to get the need information.

You would be forced to read build logs for failures and handle them on
your own, because we don't like breakages and would disable the build
completely, which does not get as anything except more possible problems.

> > Everything might break.
> And we need to try to avoid it as possible.

Yes. The solution is called "test", either programmatic (which is not
that easy in this case) or manual.

Bastian

-- 
Killing is stupid; useless!
-- McCoy, "A Private Little War", stardate 4211.8


signature.asc
Description: Digital signature


Bug#463751: linux-image-2.6.24-1-amd64: iwlwifi module don't accept dhcp request

2008-02-16 Thread Bastian Blank
On Sat, Feb 16, 2008 at 04:26:35PM +0100, Daniel Huhardeaux wrote:
> ADDRCONF(NETDEV_UP): wlan0: link is not ready
> wlan0: Initial auth_alg=0
> wlan0: authenticate with AP 00:0f:66:d9:ec:a5
> wlan0: RX authentication from 00:0f:66:d9:ec:a5 (alg=0 transaction=2 
> status=0)
> wlan0: authenticated
> wlan0: associate with AP 00:0f:66:d9:ec:a5
> wlan0: RX AssocResp from 00:0f:66:d9:ec:a5 (capab=0x411 status=0 aid=2)
> wlan0: associated
> ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
> wlan0: no IPv6 routers present

The card is associated to the AP, at least the kernel thinks it received
an correct answer.

> Dhclient is still not working.

What does the AP say?

> [EMAIL PROTECTED]:~$ aptitude show linux-image-2.6.24-1-amd64
> Paquet : linux-image-2.6.24-1-amd64
> Nouveau: oui
> État: installé
> Automatiquement installé: non
> Version : 2.6.24-4

What?

Bastian

-- 
Live long and prosper.
-- Spock, "Amok Time", stardate 3372.7




Bug#464962: Do AMD K7 family CPUs support long noops?

2008-02-16 Thread Jan Ceuleers

H. Peter Anvin wrote:
>> i.e. can you safely enable X86_P6_NOP for other CPUs, such as AMD
>> K7/K8, VIA C3/C7, or Efficeon? If not, would it be more sensible to
>> avoid using these instructions?
>>
>> It appears that at least some VIA C3 CPUs do not support these opcodes:
>>
>> http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=463606#45
>>
>
> Attached is a C program which tests this.
>

[EMAIL PROTECTED]:~/src# cat /proc/cpuinfo
processor   : 0
vendor_id   : CentaurHauls
cpu family  : 6
model   : 13
model name  : VIA C7-D Processor 1500MHz
stepping: 0
cpu MHz : 1500.156
cache size  : 128 KB
fdiv_bug: no
hlt_bug : no
f00f_bug: no
coma_bug: no
fpu : yes
fpu_exception   : yes
cpuid level : 1
wp  : yes
flags   : fpu vme de pse tsc msr pae mce apic sep mtrr pge cmov
pat clflush acpi mmx fxsr sse sse2 tm nx up pni xtpr rng rng_en ace
ace_en ace2 ace2_en phe phe_en pmm pmm_en
bogomips: 3002.28
clflush size: 64

[EMAIL PROTECTED]:~/src# ./longnop
Long NOPs supported: yes




--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Bug#462677: rm assert error on arm: ((status) == RM_OK || (status) == RM_USER_DECLINED || (status) == RM_ERROR)

2008-02-16 Thread Guillem Jover
reassign 462677 linux-2.6
found 462677 2.6.22-6
thanks

On Mon, 2008-01-28 at 08:06:56 +0200, Guillem Jover wrote:
> On Sun, 2008-01-27 at 13:20:38 +0100, Matthias Klose wrote:
> > Guillem Jover writes:
> > > On Sat, 2008-01-26 at 23:11:32 +0100, Frank Lichtenheld wrote:
> > > > On Sat, Jan 26, 2008 at 10:03:18PM +0100, Matthias Klose wrote:
> > > > > > On Sat, 2008-01-26 at 20:59:15 +0100, Matthias Klose wrote:
> > > > > > > $ sudo dpkg -i /var/cache/apt/archives/dpkg_1.14.16.5_arm.deb 
> > > > > > > (Reading database ... 31489 files and directories currently 
> > > > > > > installed.)
> > > > > > > Preparing to replace dpkg 1.14.16.5 (using 
> > > > > > > .../dpkg_1.14.16.5_arm.deb) ...
> > > > > > > Unpacking replacement dpkg ...
> > > > > > > rm: rm.c:371: main: Assertion `((status) == RM_OK || (status) == 
> > > > > > > RM_USER_DECLINED || (status) == RM_ERROR)' failed.
> > > > > > > dpkg: error while cleaning up:
> > > > > > >  subprocess rm cleanup killed by signal (Aborted)
> > > > > > 
> > > > > > This assert is coming from the rm binary, and seems quite fishy. Is 
> > > > > > that
> > > > > > system ok otherwise, fs, kernel, memory etc?
> > > > > 
> > > > > yes, a thecus running armel, with an arm chroot.
> > > > 
> > > > Can't reproduce this on my slug.
> > > 
> > > It could be related to the OABI compat layer. Which kernel version are
> > > you guys using?
> > 
> > linux-image-2.6.22-3-iop32x 2.6.22-6
> 
> Did you upgrade that recently? And would be possible to try with a
> non-EABI (normal arm) kernel, in case you have that chroot in a
> different partition, or maybe transfering it beforehand?
> 
> Anyway, I don't think this is a problem related to dpkg in any way.

I'm just reassigning accordingly.

regards,
guillem


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: reassign 465812 to initramfs-tools

2008-02-16 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> # Automatically generated email from bts, devscripts version 2.10.16
> reassign 465812 initramfs-tools
Bug#465812: linux-image-2.6.22-3-686: [Regression] LuKS passphrase not accepted 
anymore
Bug reassigned from package `cryptsetup' to `initramfs-tools'.

>
End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: Re: Bug#462677: rm assert error on arm: ((status) == RM_OK || (status) == RM_USER_DECLINED || (status) == RM_ERROR)

2008-02-16 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> reassign 462677 linux-2.6
Bug#462677: rm assert error on arm: ((status) == RM_OK || (status) == 
RM_USER_DECLINED || (status) == RM_ERROR)
Bug reassigned from package `dpkg' to `linux-2.6'.

> found 462677 2.6.22-6
Bug#462677: rm assert error on arm: ((status) == RM_OK || (status) == 
RM_USER_DECLINED || (status) == RM_ERROR)
Bug marked as found in version 2.6.22-6.

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Future of the linux udebs

2008-02-16 Thread Otavio Salvador
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Bastian Blank <[EMAIL PROTECTED]> writes:

> On Fri, Feb 15, 2008 at 04:40:47PM -0200, Otavio Salvador wrote:
>> If a unwanted kernel is uploaded to sid and we wanted to update the
>> udebs, for a release or something, we would end up doing it
>> t-p-u. This would be done with minor testing and possible breaking
>> lenny installer.
>
> So? If we need to update the kernel themself, it is also needed.

But it's obviously something to avoid.

I know that there're alternatives however it's not the best option.

>> >> So your idea is to this list be placed inside each source package?
>> > It's the only solution which will not kill new versions without code to
>> > ignore udebs if the definitions are broken.
>> Didn get you here. Could you elaborate it a bit?
>
> The list contains module X. This module got removed. What should happen
> with the build?
> - Fail silent. Ignore the error and don't output any udebs.
> - Fail loud.
>
> The first variant needs to be used if the list is included from an
> external source if it should not break it complete. I won't implement it
> because the build output is not longer reproducible.

I think it should fail loudly.

Yeah, after thinking more about it I figured that if we choose to go
for udebs being build by kernel source packages, we does need to have
it in the kernel package source.

>> This
>> would allow us to keep control about what would be end in d-i kernel
>> modules packages.
>
> We have to process it anyway and will be able to change it in any way we
> want. This is called trust.

While I agree that it's suppose to work, I also think that it can
bring serious discussions like we had lately (because of 2.6.24
migration to testing).

If we were already using this schema, the Beta1 release would need to
delay since we do not have 2.6.22 on sid anymore.

For me, to think more about it, we need an agreement from kernel team
that d-i can veto uploads of kernel. Obviously d-i team won't deny any
upload with real reasons however this agreement this is a must from my
POV.

Let me express my conclusion up to now for this thread (even I still
want to see a comment from Colin, Joey and Frans on this):

 - if we choose to go with kernel sources building udebs, k-w is dead;
 - kernel team needs to accept nacks from d-i team for badly time
   uploads (this is a must);
 - time needed for migration to new kernel would be reduced a lot;
 - tests would be need, for d-i, from snapshots of kernel;

Cheers,

- -- 
O T A V I OS A L V A D O R
- -
 E-mail: [EMAIL PROTECTED]  UIN: 5906116
 GNU/Linux User: 239058 GPG ID: 49A5F855
 Home Page: http://otavio.ossystems.com.br
- -
"Microsoft sells you Windows ... Linux gives
 you the whole house."
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Processed by Mailcrypt 3.5.8+ 

iD8DBQFHt0qSLqiZQEml+FURAs1HAJ43XrO2zga1AZtHDvsQwUjxYpGHvACgkPRh
a6AzostXhbnMNenQ9B1NDT0=
=Kwqe
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Future of the linux udebs

2008-02-16 Thread Bastian Blank
On Sat, Feb 16, 2008 at 06:42:05PM -0200, Otavio Salvador wrote:
> For me, to think more about it, we need an agreement from kernel team
> that d-i can veto uploads of kernel. Obviously d-i team won't deny any
> upload with real reasons however this agreement this is a must from my
> POV.

Not acceptable.

-- 
Live long and prosper.
-- Spock, "Amok Time", stardate 3372.7


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#465812: [Pkg-cryptsetup-devel] Bug#465812: linux-image-2.6.22-3-686: [Regression] LuKS passphrase not accepted anymore

2008-02-16 Thread David Härdeman

On Fri, Feb 15, 2008 at 10:16:06PM +0100, Jonas Meurer wrote:

On 15/02/2008 Martin Ammermüller wrote:

On Friday 15 February 2008 17:23:39 maximilian attems wrote:
> On Fri, 15 Feb 2008, Martin Ammermüller wrote:
> > Tried that for 2.6.22-3-686 and 2.6.24 with no effect. And I'm pretty
> > sure that i didn't enter the passphrase wrong :) (works still with
> > 2.6.22-2, did not try my luck with update-initramfs on this kernel-image,
> > though).
>
> well then it can only be a cryptetup bug of newer version.
> as newer cryptsetup land on both of those.

Looks like the keyboard-layout isn't set up correctly. I run etch installer 
with german keyboard layout. If I enter the passphrase like my keyboard had 
an english layout, it works with linux-image 2.6.24. I also did a diff of 
initrd.img from 2.6.22-2 and 2.6.22-3. /bin/kbd_mode as well as /bin/loadkeys 
are missing in initrd.img-2.6.22-3:


David, can you take a look at this one? What exactly is responsible for
putting kbd_mode and loadkeys into the initramfs? A brief search through
the cryptsetup initramfs scripts/hooks gave no result, so I doubt that
that's the source for the problem. But you should know more ;-)


cryptsetup used to have code for adding stuff for keyboard setup. That 
code was moved into initramfs-tools and it should be activated by the 
cryptsetup/trunk/debian/initramfs/cryptroot-conf file which should be 
installed to /usr/share/initramfs-tools/conf.d. It seems that SVN commit 
433 moved that file to /usr/share/initramfs-tools/conf-hooks.d.


I'm not sure what the difference between the two directories are, but 
perhaps the newer location is only supported by a newer initramfs-tools 
version?


--
David Härdeman



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Future of the linux udebs

2008-02-16 Thread Frederik Schueler
Hello,

On Fri, Feb 15, 2008 at 12:31:05PM -0200, Otavio Salvador wrote:
> Bastian Blank <[EMAIL PROTECTED]> writes:
>>  - Is impossible to release d-i with a different kernel from sid
>>without a lot of hassle
>>  - If a bad kernel, with a bunch of ugly bugs, gets uploaded, all d-i
>>development is affected
>
> This last item is where I worry a lot. Obviously, kernel team want to
> put newest kernel on sid however, when he does it, d-i will be forced
> to change it too.

Coordination is already needed now, and will be needed even more when
this change is implemented. 
If this means waiting with a new upstream kernel version for a week or 
two until the next beta of d-i is done, we will of course wait, no one
wants to break d-i development by purpose.

> For it to work testing images, _before_ the kernel
> upload to happen, would be required to at least reduce the risk of a
> kernel upload to stop all d-i development until it gets fixed.

We have the kernel-snapshots archive to test new images before uploading
them. This infrastructure could be extended, by adding buildds for all 
missing architectures, and whatever else is needed to get daily d-i
snapshots built with these kernels. 
 
> Another thihk that I see as a _must_ is that d-i team could nack a
> kernel upload. This is requred since d-i won't be allowed to diverge
> from sid kernels anymore (I mean during development) and those
> migrations would need to be much more coordinated with d-i RM and d-i
> porters.

Nobody will insist on uploading a new kernel version if this breaks the 
release schedule, just think of 2.6.19, which never was uploaded to the
archive because we where in the middle of releasing etch. 


Best regards
Frederik Schüler

-- 
ENOSIG


signature.asc
Description: Digital signature


Re: Future of the linux udebs

2008-02-16 Thread Otavio Salvador
Frederik Schueler <[EMAIL PROTECTED]> writes:

> Hello,
>
> On Fri, Feb 15, 2008 at 12:31:05PM -0200, Otavio Salvador wrote:
>> Bastian Blank <[EMAIL PROTECTED]> writes:
>>>  - Is impossible to release d-i with a different kernel from sid
>>>without a lot of hassle
>>>  - If a bad kernel, with a bunch of ugly bugs, gets uploaded, all d-i
>>>development is affected
>>
>> This last item is where I worry a lot. Obviously, kernel team want to
>> put newest kernel on sid however, when he does it, d-i will be forced
>> to change it too.
>
> Coordination is already needed now, and will be needed even more when
> this change is implemented. 
> If this means waiting with a new upstream kernel version for a week or 
> two until the next beta of d-i is done, we will of course wait, no one
> wants to break d-i development by purpose.

Exactly however for that to work we, d-i team, need to be able to nack
a kernel upload.

Please read the thread we had about 2.6.24 kernel testing
migration... this is what worries me.

>> For it to work testing images, _before_ the kernel
>> upload to happen, would be required to at least reduce the risk of a
>> kernel upload to stop all d-i development until it gets fixed.
>
> We have the kernel-snapshots archive to test new images before uploading
> them. This infrastructure could be extended, by adding buildds for all 
> missing architectures, and whatever else is needed to get daily d-i
> snapshots built with these kernels. 

Yes, that's one thing that do like. This would allow us to have a
current d-i image and one using the next kernel, just released.

>> Another thihk that I see as a _must_ is that d-i team could nack a
>> kernel upload. This is requred since d-i won't be allowed to diverge
>> from sid kernels anymore (I mean during development) and those
>> migrations would need to be much more coordinated with d-i RM and d-i
>> porters.
>
> Nobody will insist on uploading a new kernel version if this breaks the 
> release schedule, just think of 2.6.19, which never was uploaded to the
> archive because we where in the middle of releasing etch. 

I guess so but we had a hard time about 2.6.24.

This needs to get an agreement from both sides to be able to work.

I personally have a good relation with all active people in
debian-kernel but I think that we might have a "policy" to avoid
problems to happen. Good will isn't enough, IMO.

-- 
O T A V I OS A L V A D O R
-
 E-mail: [EMAIL PROTECTED]  UIN: 5906116
 GNU/Linux User: 239058 GPG ID: 49A5F855
 Home Page: http://otavio.ossystems.com.br
-
"Microsoft sells you Windows ... Linux gives
 you the whole house."


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#465812: [Pkg-cryptsetup-devel] Bug#465812: linux-image-2.6.22-3-686: [Regression] LuKS passphrase not accepted anymore

2008-02-16 Thread Martin Ammermüller
On Saturday 16 February 2008 18:51:37 Jonas Meurer wrote:
> And Martin, could you try to update your initramfs for the older kernels
> as well? Did you update cryptsetup in the last days/shortly before the
> issues occured?

Only old kernel i have here is 2.6.22-2-686. After i did an 
update-initramfs -u for this particular kernel image, i had to use an english 
keyboard layout for this kernel as well. AFAIR i updated cryptsetup in the 
last days, but i had this problem with kernel version 2.6.24-1-686 since i 
installed it from unstable (shortly after it appeared there). cryptsetup / 
initramfs-tools version combinations i know which seem to have this problem 
(tried update-initramfs with both of these) are:

2:1.0.6~pre1+svn45-1 / 0.91d
2:1.0.6~pre1+svn45-1 / 0.91e

HTH,
Martin



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processing of linux-modules-extra-2.6_2.6.24-4_i386.changes

2008-02-16 Thread Archive Administrator
linux-modules-extra-2.6_2.6.24-4_i386.changes uploaded successfully to localhost
along with the files:
  linux-modules-extra-2.6_2.6.24-4.dsc
  linux-modules-extra-2.6_2.6.24-4.tar.gz
  atl2-modules-2.6.24-1-486_2.6.24+2.0.3-4_i386.deb
  atl2-modules-2.6-486_2.6.24-4_i386.deb
  aufs-modules-2.6.24-1-486_2.6.24+0+20080129-4_i386.deb
  aufs-modules-2.6-486_2.6.24-4_i386.deb
  btrfs-modules-2.6.24-1-486_2.6.24+0.12-4_i386.deb
  btrfs-modules-2.6-486_2.6.24-4_i386.deb
  drbd8-modules-2.6.24-1-486_2.6.24+8.0.11-4_i386.deb
  drbd8-modules-2.6-486_2.6.24-4_i386.deb
  gspca-modules-2.6.24-1-486_2.6.24+01.00.20-4_i386.deb
  gspca-modules-2.6-486_2.6.24-4_i386.deb
  kqemu-modules-2.6.24-1-486_2.6.24+1.3.0~pre11-4_i386.deb
  kqemu-modules-2.6-486_2.6.24-4_i386.deb
  loop-aes-modules-2.6.24-1-486_2.6.24+3.2b-4_i386.deb
  loop-aes-modules-2.6-486_2.6.24-4_i386.deb
  lzma-modules-2.6.24-1-486_2.6.24+4.43-4_i386.deb
  lzma-modules-2.6-486_2.6.24-4_i386.deb
  r6040-modules-2.6.24-1-486_2.6.24+0.17-4_i386.deb
  r6040-modules-2.6-486_2.6.24-4_i386.deb
  redhat-cluster-modules-2.6.24-1-486_2.6.24+2.20080212-4_i386.deb
  redhat-cluster-modules-2.6-486_2.6.24-4_i386.deb
  squashfs-modules-2.6.24-1-486_2.6.24+3.3-4_i386.deb
  squashfs-modules-2.6-486_2.6.24-4_i386.deb
  unionfs-modules-2.6.24-1-486_2.6.24+2.2.3-2.6.24-4_i386.deb
  unionfs-modules-2.6-486_2.6.24-4_i386.deb
  virtualbox-ose-modules-2.6.24-1-486_2.6.24+1.5.4-dfsg-4_i386.deb
  virtualbox-ose-modules-2.6-486_2.6.24-4_i386.deb
  virtualbox-ose-guest-modules-2.6.24-1-486_2.6.24+1.5.4-dfsg-4_i386.deb
  virtualbox-ose-guest-modules-2.6-486_2.6.24-4_i386.deb
  atl2-modules-2.6.24-1-686_2.6.24+2.0.3-4_i386.deb
  atl2-modules-2.6-686_2.6.24-4_i386.deb
  aufs-modules-2.6.24-1-686_2.6.24+0+20080129-4_i386.deb
  aufs-modules-2.6-686_2.6.24-4_i386.deb
  btrfs-modules-2.6.24-1-686_2.6.24+0.12-4_i386.deb
  btrfs-modules-2.6-686_2.6.24-4_i386.deb
  drbd8-modules-2.6.24-1-686_2.6.24+8.0.11-4_i386.deb
  drbd8-modules-2.6-686_2.6.24-4_i386.deb
  gspca-modules-2.6.24-1-686_2.6.24+01.00.20-4_i386.deb
  gspca-modules-2.6-686_2.6.24-4_i386.deb
  kqemu-modules-2.6.24-1-686_2.6.24+1.3.0~pre11-4_i386.deb
  kqemu-modules-2.6-686_2.6.24-4_i386.deb
  loop-aes-modules-2.6.24-1-686_2.6.24+3.2b-4_i386.deb
  loop-aes-modules-2.6-686_2.6.24-4_i386.deb
  lzma-modules-2.6.24-1-686_2.6.24+4.43-4_i386.deb
  lzma-modules-2.6-686_2.6.24-4_i386.deb
  r6040-modules-2.6.24-1-686_2.6.24+0.17-4_i386.deb
  r6040-modules-2.6-686_2.6.24-4_i386.deb
  redhat-cluster-modules-2.6.24-1-686_2.6.24+2.20080212-4_i386.deb
  redhat-cluster-modules-2.6-686_2.6.24-4_i386.deb
  squashfs-modules-2.6.24-1-686_2.6.24+3.3-4_i386.deb
  squashfs-modules-2.6-686_2.6.24-4_i386.deb
  unionfs-modules-2.6.24-1-686_2.6.24+2.2.3-2.6.24-4_i386.deb
  unionfs-modules-2.6-686_2.6.24-4_i386.deb
  virtualbox-ose-modules-2.6.24-1-686_2.6.24+1.5.4-dfsg-4_i386.deb
  virtualbox-ose-modules-2.6-686_2.6.24-4_i386.deb
  virtualbox-ose-guest-modules-2.6.24-1-686_2.6.24+1.5.4-dfsg-4_i386.deb
  virtualbox-ose-guest-modules-2.6-686_2.6.24-4_i386.deb
  atl2-modules-2.6.24-1-686-bigmem_2.6.24+2.0.3-4_i386.deb
  atl2-modules-2.6-686-bigmem_2.6.24-4_i386.deb
  aufs-modules-2.6.24-1-686-bigmem_2.6.24+0+20080129-4_i386.deb
  aufs-modules-2.6-686-bigmem_2.6.24-4_i386.deb
  btrfs-modules-2.6.24-1-686-bigmem_2.6.24+0.12-4_i386.deb
  btrfs-modules-2.6-686-bigmem_2.6.24-4_i386.deb
  drbd8-modules-2.6.24-1-686-bigmem_2.6.24+8.0.11-4_i386.deb
  drbd8-modules-2.6-686-bigmem_2.6.24-4_i386.deb
  gspca-modules-2.6.24-1-686-bigmem_2.6.24+01.00.20-4_i386.deb
  gspca-modules-2.6-686-bigmem_2.6.24-4_i386.deb
  kqemu-modules-2.6.24-1-686-bigmem_2.6.24+1.3.0~pre11-4_i386.deb
  kqemu-modules-2.6-686-bigmem_2.6.24-4_i386.deb
  loop-aes-modules-2.6.24-1-686-bigmem_2.6.24+3.2b-4_i386.deb
  loop-aes-modules-2.6-686-bigmem_2.6.24-4_i386.deb
  lzma-modules-2.6.24-1-686-bigmem_2.6.24+4.43-4_i386.deb
  lzma-modules-2.6-686-bigmem_2.6.24-4_i386.deb
  r6040-modules-2.6.24-1-686-bigmem_2.6.24+0.17-4_i386.deb
  r6040-modules-2.6-686-bigmem_2.6.24-4_i386.deb
  redhat-cluster-modules-2.6.24-1-686-bigmem_2.6.24+2.20080212-4_i386.deb
  redhat-cluster-modules-2.6-686-bigmem_2.6.24-4_i386.deb
  squashfs-modules-2.6.24-1-686-bigmem_2.6.24+3.3-4_i386.deb
  squashfs-modules-2.6-686-bigmem_2.6.24-4_i386.deb
  unionfs-modules-2.6.24-1-686-bigmem_2.6.24+2.2.3-2.6.24-4_i386.deb
  unionfs-modules-2.6-686-bigmem_2.6.24-4_i386.deb
  virtualbox-ose-modules-2.6.24-1-686-bigmem_2.6.24+1.5.4-dfsg-4_i386.deb
  virtualbox-ose-modules-2.6-686-bigmem_2.6.24-4_i386.deb
  virtualbox-ose-guest-modules-2.6.24-1-686-bigmem_2.6.24+1.5.4-dfsg-4_i386.deb
  virtualbox-ose-guest-modules-2.6-686-bigmem_2.6.24-4_i386.deb
  atl2-modules-2.6.24-1-amd64_2.6.24+2.0.3-4_i386.deb
  atl2-modules-2.6-amd64_2.6.24-4_i386.deb
  aufs-modules-2.6.24-1-amd64_2.6.24+0+20080129-4_i386.deb
  aufs-modules-2.6-amd64_2.6.24-4_i386.deb
  btrfs-modules-2.6.24-1-amd64_2.6.24+0.12-4_i386.deb
  btrfs-modules-2.6-amd64_2.6.24-4_i386.deb
  drbd8-mod

linux-modules-extra-2.6_2.6.24-4_i386.changes is NEW

2008-02-16 Thread Debian Installer
atl2-modules-2.6-486_2.6.24-4_i386.deb
  to pool/main/l/linux-modules-extra-2.6/atl2-modules-2.6-486_2.6.24-4_i386.deb
atl2-modules-2.6-686-bigmem_2.6.24-4_i386.deb
  to 
pool/main/l/linux-modules-extra-2.6/atl2-modules-2.6-686-bigmem_2.6.24-4_i386.deb
atl2-modules-2.6-686_2.6.24-4_i386.deb
  to pool/main/l/linux-modules-extra-2.6/atl2-modules-2.6-686_2.6.24-4_i386.deb
atl2-modules-2.6-amd64_2.6.24-4_i386.deb
  to 
pool/main/l/linux-modules-extra-2.6/atl2-modules-2.6-amd64_2.6.24-4_i386.deb
atl2-modules-2.6.24-1-486_2.6.24+2.0.3-4_i386.deb
  to 
pool/main/l/linux-modules-extra-2.6/atl2-modules-2.6.24-1-486_2.6.24+2.0.3-4_i386.deb
atl2-modules-2.6.24-1-686-bigmem_2.6.24+2.0.3-4_i386.deb
  to 
pool/main/l/linux-modules-extra-2.6/atl2-modules-2.6.24-1-686-bigmem_2.6.24+2.0.3-4_i386.deb
atl2-modules-2.6.24-1-686_2.6.24+2.0.3-4_i386.deb
  to 
pool/main/l/linux-modules-extra-2.6/atl2-modules-2.6.24-1-686_2.6.24+2.0.3-4_i386.deb
atl2-modules-2.6.24-1-amd64_2.6.24+2.0.3-4_i386.deb
  to 
pool/main/l/linux-modules-extra-2.6/atl2-modules-2.6.24-1-amd64_2.6.24+2.0.3-4_i386.deb
aufs-modules-2.6-486_2.6.24-4_i386.deb
  to pool/main/l/linux-modules-extra-2.6/aufs-modules-2.6-486_2.6.24-4_i386.deb
aufs-modules-2.6-686-bigmem_2.6.24-4_i386.deb
  to 
pool/main/l/linux-modules-extra-2.6/aufs-modules-2.6-686-bigmem_2.6.24-4_i386.deb
aufs-modules-2.6-686_2.6.24-4_i386.deb
  to pool/main/l/linux-modules-extra-2.6/aufs-modules-2.6-686_2.6.24-4_i386.deb
aufs-modules-2.6-amd64_2.6.24-4_i386.deb
  to 
pool/main/l/linux-modules-extra-2.6/aufs-modules-2.6-amd64_2.6.24-4_i386.deb
aufs-modules-2.6-xen-686_2.6.24-4_i386.deb
  to 
pool/main/l/linux-modules-extra-2.6/aufs-modules-2.6-xen-686_2.6.24-4_i386.deb
aufs-modules-2.6.24-1-486_2.6.24+0+20080129-4_i386.deb
  to 
pool/main/l/linux-modules-extra-2.6/aufs-modules-2.6.24-1-486_2.6.24+0+20080129-4_i386.deb
aufs-modules-2.6.24-1-686-bigmem_2.6.24+0+20080129-4_i386.deb
  to 
pool/main/l/linux-modules-extra-2.6/aufs-modules-2.6.24-1-686-bigmem_2.6.24+0+20080129-4_i386.deb
aufs-modules-2.6.24-1-686_2.6.24+0+20080129-4_i386.deb
  to 
pool/main/l/linux-modules-extra-2.6/aufs-modules-2.6.24-1-686_2.6.24+0+20080129-4_i386.deb
aufs-modules-2.6.24-1-amd64_2.6.24+0+20080129-4_i386.deb
  to 
pool/main/l/linux-modules-extra-2.6/aufs-modules-2.6.24-1-amd64_2.6.24+0+20080129-4_i386.deb
aufs-modules-2.6.24-1-xen-686_2.6.24+0+20080129-4_i386.deb
  to 
pool/main/l/linux-modules-extra-2.6/aufs-modules-2.6.24-1-xen-686_2.6.24+0+20080129-4_i386.deb
btrfs-modules-2.6-486_2.6.24-4_i386.deb
  to pool/main/l/linux-modules-extra-2.6/btrfs-modules-2.6-486_2.6.24-4_i386.deb
btrfs-modules-2.6-686-bigmem_2.6.24-4_i386.deb
  to 
pool/main/l/linux-modules-extra-2.6/btrfs-modules-2.6-686-bigmem_2.6.24-4_i386.deb
btrfs-modules-2.6-686_2.6.24-4_i386.deb
  to pool/main/l/linux-modules-extra-2.6/btrfs-modules-2.6-686_2.6.24-4_i386.deb
btrfs-modules-2.6-amd64_2.6.24-4_i386.deb
  to 
pool/main/l/linux-modules-extra-2.6/btrfs-modules-2.6-amd64_2.6.24-4_i386.deb
btrfs-modules-2.6-xen-686_2.6.24-4_i386.deb
  to 
pool/main/l/linux-modules-extra-2.6/btrfs-modules-2.6-xen-686_2.6.24-4_i386.deb
btrfs-modules-2.6.24-1-486_2.6.24+0.12-4_i386.deb
  to 
pool/main/l/linux-modules-extra-2.6/btrfs-modules-2.6.24-1-486_2.6.24+0.12-4_i386.deb
btrfs-modules-2.6.24-1-686-bigmem_2.6.24+0.12-4_i386.deb
  to 
pool/main/l/linux-modules-extra-2.6/btrfs-modules-2.6.24-1-686-bigmem_2.6.24+0.12-4_i386.deb
btrfs-modules-2.6.24-1-686_2.6.24+0.12-4_i386.deb
  to 
pool/main/l/linux-modules-extra-2.6/btrfs-modules-2.6.24-1-686_2.6.24+0.12-4_i386.deb
btrfs-modules-2.6.24-1-amd64_2.6.24+0.12-4_i386.deb
  to 
pool/main/l/linux-modules-extra-2.6/btrfs-modules-2.6.24-1-amd64_2.6.24+0.12-4_i386.deb
btrfs-modules-2.6.24-1-xen-686_2.6.24+0.12-4_i386.deb
  to 
pool/main/l/linux-modules-extra-2.6/btrfs-modules-2.6.24-1-xen-686_2.6.24+0.12-4_i386.deb
drbd8-modules-2.6-486_2.6.24-4_i386.deb
  to pool/main/l/linux-modules-extra-2.6/drbd8-modules-2.6-486_2.6.24-4_i386.deb
drbd8-modules-2.6-686-bigmem_2.6.24-4_i386.deb
  to 
pool/main/l/linux-modules-extra-2.6/drbd8-modules-2.6-686-bigmem_2.6.24-4_i386.deb
drbd8-modules-2.6-686_2.6.24-4_i386.deb
  to pool/main/l/linux-modules-extra-2.6/drbd8-modules-2.6-686_2.6.24-4_i386.deb
drbd8-modules-2.6-amd64_2.6.24-4_i386.deb
  to 
pool/main/l/linux-modules-extra-2.6/drbd8-modules-2.6-amd64_2.6.24-4_i386.deb
drbd8-modules-2.6-xen-686_2.6.24-4_i386.deb
  to 
pool/main/l/linux-modules-extra-2.6/drbd8-modules-2.6-xen-686_2.6.24-4_i386.deb
drbd8-modules-2.6.24-1-486_2.6.24+8.0.11-4_i386.deb
  to 
pool/main/l/linux-modules-extra-2.6/drbd8-modules-2.6.24-1-486_2.6.24+8.0.11-4_i386.deb
drbd8-modules-2.6.24-1-686-bigmem_2.6.24+8.0.11-4_i386.deb
  to 
pool/main/l/linux-modules-extra-2.6/drbd8-modules-2.6.24-1-686-bigmem_2.6.24+8.0.11-4_i386.deb
drbd8-modules-2.6.24-1-686_2.6.24+8.0.11-4_i386.deb
  to 
pool/main/l/linux-modules-extra-2.6/drbd8-modules-2.6.24-1-686_2.6.24+8.0.11-4_i386.deb
drbd8-modules-2.6.24-1-amd64_2.6.24+8.0.11-4_i386.d