Your message dated Sun, 15 May 2005 22:47:09 -0400
with message-id <[EMAIL PROTECTED]>
and subject line Bug#308844: fixed in openafs 1.3.82-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 12 May 2005 17:07:17 +0000
>From [EMAIL PROTECTED] Thu May 12 10:07:17 2005
Return-path: <[EMAIL PROTECTED]>
Received: from cow.theophys.kth.se [130.237.25.17] 
        by spohr.debian.org with smtp (Exim 3.35 1 (Debian))
        id 1DWH9Y-0006j7-00; Thu, 12 May 2005 10:07:17 -0700
Received: (qmail 6328 invoked from network); 12 May 2005 17:07:34 -0000
Received: from roo.theophys.kth.se (HELO ?127.0.0.1?) (130.237.25.150)
  by 0 with SMTP; 12 May 2005 17:07:34 -0000
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: "R. Armiento" <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: libpam-openafs-kaserver pam_afs.so gives undefined symbol errors when 
used
X-Mailer: reportbug 3.8
Date: Thu, 12 May 2005 19:07:33 +0200
Message-Id: <[EMAIL PROTECTED]>
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.8 required=4.0 tests=BAYES_00,FROM_ENDS_IN_NUMS,
        HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: libpam-openafs-kaserver
Version: 1.3.81-3
Severity: normal

I try to use the pam_afs.so provided by libpam-openafs-kaserver, but it
seems the pam system cannot use it becuase of undefined symbols.

Here are the errors I find in auth.log:
=================================================================
May 12 18:51:12 localhost sshd[6498]: PAM unable to
dlopen(/lib/security/pam_afs.so)
May 12 18:51:12 localhost sshd[6498]: PAM [dlerror:
/lib/security/pam_afs.so: undefined symbol: xdr_afs_int32]
May 12 18:51:12 localhost sshd[6498]: PAM adding faulty module:
/lib/security/pam_afs.so
=================================================================

I've tracked the problem down into the openafs sources; in
  openafs/src/pam/Makefile
Inside the 'pam_afs.so.1' stansa, in the '*linux*' option,
it seems $(LIBS) is missing on the absolute end of the compile 
line (compare with the compile lines for other platforms)

If I add $(LIBS) to the compile line and recompile, I get a pam module
that works for me.

I have seen this problem on both i386 and alpha linux debian.
The only thing I don't understand at all is how the binary module 
can work for anyone else out there. Perhaps I'm missing something.

-- System Information:
Debian Release: 3.1
  APT prefers testing
  APT policy: (500, 'testing'), (1, 'experimental')
Architecture: i386 (i686)
Kernel: Linux 2.4.27-2-686
Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1)

Versions of packages libpam-openafs-kaserver depends on:
ii  libc6                       2.3.2.ds1-20 GNU C Library: Shared libraries an
ii  libpam0g                    0.76-22      Pluggable Authentication Modules l

-- no debconf information

---------------------------------------
Received: (at 308844-close) by bugs.debian.org; 16 May 2005 02:52:22 +0000
>From [EMAIL PROTECTED] Sun May 15 19:52:22 2005
Return-path: <[EMAIL PROTECTED]>
Received: from newraff.debian.org [208.185.25.31] (mail)
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1DXViP-0002Lu-00; Sun, 15 May 2005 19:52:21 -0700
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
        id 1DXVdN-0000ib-00; Sun, 15 May 2005 22:47:09 -0400
From: Russ Allbery <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.55 $
Subject: Bug#308844: fixed in openafs 1.3.82-1
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Sun, 15 May 2005 22:47:09 -0400
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 
X-CrossAssassin-Score: 3

Source: openafs
Source-Version: 1.3.82-1

We believe that the bug you reported is fixed in the latest version of
openafs, which is due to be installed in the Debian FTP archive:

libopenafs-dev_1.3.82-1_i386.deb
  to pool/main/o/openafs/libopenafs-dev_1.3.82-1_i386.deb
libpam-openafs-kaserver_1.3.82-1_i386.deb
  to pool/main/o/openafs/libpam-openafs-kaserver_1.3.82-1_i386.deb
openafs-client_1.3.82-1_i386.deb
  to pool/main/o/openafs/openafs-client_1.3.82-1_i386.deb
openafs-dbserver_1.3.82-1_i386.deb
  to pool/main/o/openafs/openafs-dbserver_1.3.82-1_i386.deb
openafs-fileserver_1.3.82-1_i386.deb
  to pool/main/o/openafs/openafs-fileserver_1.3.82-1_i386.deb
openafs-kpasswd_1.3.82-1_i386.deb
  to pool/main/o/openafs/openafs-kpasswd_1.3.82-1_i386.deb
openafs-modules-source_1.3.82-1_all.deb
  to pool/main/o/openafs/openafs-modules-source_1.3.82-1_all.deb
openafs_1.3.82-1.diff.gz
  to pool/main/o/openafs/openafs_1.3.82-1.diff.gz
openafs_1.3.82-1.dsc
  to pool/main/o/openafs/openafs_1.3.82-1.dsc
openafs_1.3.82.orig.tar.gz
  to pool/main/o/openafs/openafs_1.3.82.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Russ Allbery <[EMAIL PROTECTED]> (supplier of updated openafs package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----

Format: 1.7
Date: Tue, 10 May 2005 21:09:55 -0700
Source: openafs
Binary: openafs-client libopenafs-dev openafs-dbserver openafs-modules-source 
openafs-fileserver openafs-kpasswd libpam-openafs-kaserver
Architecture: source i386 all
Version: 1.3.82-1
Distribution: unstable
Urgency: medium
Maintainer: Sam Hartman <[EMAIL PROTECTED]>
Changed-By: Russ Allbery <[EMAIL PROTECTED]>
Description: 
 libopenafs-dev - The AFS distributed filesystem- development libraries
 libpam-openafs-kaserver - The AFS distributed filesystem- kaserver PAM module
 openafs-client - The AFS distributed filesystem- client support
 openafs-dbserver - The AFS distributed filesystem- database server
 openafs-fileserver - The AFS distributed filesystem- file server
 openafs-kpasswd - The AFS distributed filesystem- old password changing
 openafs-modules-source - The AFS distributed filesystem- Module Sources
Closes: 225907 253168 303495 304040 307699 308399 308844
Changes: 
 openafs (1.3.82-1) unstable; urgency=medium
 .
   * New upstream version.  (Closes: #307699)
     - Proper locking for preempt kernels.  This bug manifested as an
       inability to shut down AFS cleanly.  (Closes: #308399, #304040)
     - Correctly handle the inotify semaphore.  (Closes: #303495)
   * Repackage upstream to remove MacOS-specific files covered by the APSL.
     Remove the WINNT directory to save space since we have to repackage
     anyway.  Provide a get-orig-source target to do the repackaging.
   * libpam-openafs-kaserver: Fix compilation so that the PAM module isn't
     missing symbols and therefore unusable.  (Closes: #308844)
   * Apply patch from Chas Williams to fix stale cache data from deleted
     files, a bug introduced in 1.3.82.
   * In all cases, only build the module appropriate to the kernel we're
     building against.  Building an SMP module against a non-SMP kernel
     fails due to missing defines.  (Closes: #225907)
   * README.modules: Add documentation for module-assistant and recommend
     it when using Debian kernels.  Mention divergences from upstream in
     module naming.  (Closes: #253168)  Emphasize that the kernel source
     tree used for make-kpkg must be identically configured to the kernel
     the module will be used with.
   * Update copyright with more complete information from upstream
     src/LICENSE.
   * Simplify clean target.  Upstream make distclean is now better.
Files: 
 be18ffb47be4d08939fb524289703f32 1097 net optional openafs_1.3.82-1.dsc
 3f611129bcab821760d30d7fbb0b1ede 4334564 net optional 
openafs_1.3.82.orig.tar.gz
 ac699751bdffad7ccea4763ec51b2c2f 119190 net optional openafs_1.3.82-1.diff.gz
 32b4d7825f12f74d6f508336b1e00311 4425684 net extra 
openafs-modules-source_1.3.82-1_all.deb
 1f7b4771bd05c4127e93dc3d4c682e67 1540402 net optional 
openafs-client_1.3.82-1_i386.deb
 f630dee77e4b041fbf2626f50f26bf5b 204584 net extra 
openafs-kpasswd_1.3.82-1_i386.deb
 b7a663a00fd95301aa4a93ddee6433f9 785586 net optional 
openafs-fileserver_1.3.82-1_i386.deb
 a83d5464950e99b3cdb2a19f76464699 465512 net optional 
openafs-dbserver_1.3.82-1_i386.deb
 a90c3746f26faa7005a9585c5a0a5ffe 1261884 libdevel extra 
libopenafs-dev_1.3.82-1_i386.deb
 633e7771375ae4f14f71e3480b722472 218290 net extra 
libpam-openafs-kaserver_1.3.82-1_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (GNU/Linux)

iQEVAwUBQof/fLf2jhx5fmQdAQEzOQf+K3epjxyWYHP+V65437Jnng4flk6lvznh
oZTBl4GSWzxv1Ka7GU85eJFtCPRBPc1fss3q3lwNLoAmk/eOGSGvlo3vqniOrLBd
s5z7PU7Z7xUoEgmTi4lwyCJYf0qKxvxUJSbJdrkF9fnqgn3q392H36XIjeDyFqdr
5RxaDz3wCrpaEQ68yZK8owFu9lcP+7H50kHs0g+1D4urVT4qyr2levqzWHkmXcyS
r2iqnK689vbQCBJPJ298VrmiLaeN0MklkKcekOwqOpqAY4BVuGhyZSCeyZAXjGE+
9mlNYyRuXlVgNUArUs7v+NpmqFzQpjXSdmfGEq8/8HUm0o443eaggg==
=7c/f
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to