Your message dated Thu, 24 Mar 2005 04:19:02 -0500 with message-id <[EMAIL PROTECTED]> and subject line Bug#295422: fixed in kernel-image-2.6.8-amd64 2.6.8-12 has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -------------------------------------- Received: (at submit) by bugs.debian.org; 2 Nov 2004 18:28:10 +0000 >From [EMAIL PROTECTED] Tue Nov 02 10:28:10 2004 Return-path: <[EMAIL PROTECTED]> Received: from webmail.cs.unm.edu (mail.cs.unm.edu) [64.106.20.39] (mail) by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1CP3O6-0001Nc-00; Tue, 02 Nov 2004 10:28:10 -0800 Received: from snot.cs.unm.edu ([64.106.46.98]) by mail.cs.unm.edu with esmtp (Exim 3.35 #1 (Debian)) id 1CP2RU-0007cL-00; Tue, 02 Nov 2004 10:27:36 -0700 Received: from bap by snot.cs.unm.edu with local (Exim 4.34) id 1CP2Po-0005Xw-Fx; Tue, 02 Nov 2004 10:25:52 -0700 From: Barak Pearlmutter <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] Subject: 64-bit kernel -> ldd -> mkinitrd issue Reply-to: [EMAIL PROTECTED] Message-Id: <[EMAIL PROTECTED]> Sender: Barak Pearlmutter <[EMAIL PROTECTED]> Date: Tue, 02 Nov 2004 10:25:52 -0700 X-Scanner: exiscan *1CP2RU-0007cL-00*/fVpxy7ZVDI* Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2004_03_25 X-Spam-Level: Package: initrd-tools Version: 0.1.74 There is an unfortunate interaction that occurs when a system is running an em64t-p4 or amd64 kernel, but a standard 32-bit "testing" user space. When configuring a kernel-image package the mkinitrd fails with a cpio failure to read a file named "(0x00000000)". The cause of this is that "ldd" has an extra entry: with a 32-bit kernel you see this # ldd /bin/cat libc.so.6 => /lib/tls/libc.so.6 (0x40028000) /lib/ld-linux.so.2 => /lib/ld-linux.so.2 (0x40000000) but with a 64-bit kernel you see this # uname -a Linux x 2.6.8-9-em64t-p4-smp #1 SMP Thu Oct 7 16:01:47 CEST 2004 x86_64 GNU/Linux # ldd /bin/cat linux-gate.so.1 => (0x00000000) libc.so.6 => /lib/tls/libc.so.6 (0x5557d000) /lib/ld-linux.so.2 => /lib/ld-linux.so.2 (0x55555000) When mkinitrd runs ldd on executables to find libraries to be included them in the initrd, it does not skip the linux-gate line and instead includes an entry for the strange filename, which fails. This would be really easy to fix by hacking mkinitrd, either by ignoring filenames that don't start with "/", or that do start with "(", or by ignoring the linux-gate lines specially, or whatever. Or (the "right" solution) ldd could be modified to take a flag telling it to just print the filenames of all used libraries and mkinitrd could call it that way, removing the need to parse ldd's output. But as a cheesy workaround for myself, which might be of value to others, I created a stub # cat /usr/local/bin/ldd #! /bin/sh /usr/bin/ldd $* | egrep -v linux-gate\[.\]so\[.\]1 and then did PATH=/usr/local/bin:$PATH dpkg --configure --pending which worked fine. -- Barak A. Pearlmutter <[EMAIL PROTECTED]> Hamilton Institute & Dept Comp Sci, NUI Maynooth, Co. Kildare, Ireland http://www-bcl.cs.may.ie/~barak/ --------------------------------------- Received: (at 295422-close) by bugs.debian.org; 24 Mar 2005 09:30:11 +0000 >From [EMAIL PROTECTED] Thu Mar 24 01:30:11 2005 Return-path: <[EMAIL PROTECTED]> Received: from newraff.debian.org [208.185.25.31] (mail) by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1DEOfL-0005Dr-00; Thu, 24 Mar 2005 01:30:11 -0800 Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian)) id 1DEOUY-0004kg-00; Thu, 24 Mar 2005 04:19:02 -0500 From: =?utf-8?q?Frederik_Sch=C3=BCler?= <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] X-Katie: $Revision: 1.55 $ Subject: Bug#295422: fixed in kernel-image-2.6.8-amd64 2.6.8-12 Message-Id: <[EMAIL PROTECTED]> Sender: Archive Administrator <[EMAIL PROTECTED]> Date: Thu, 24 Mar 2005 04:19:02 -0500 Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: Source: kernel-image-2.6.8-amd64 Source-Version: 2.6.8-12 We believe that the bug you reported is fixed in the latest version of kernel-image-2.6.8-amd64, which is due to be installed in the Debian FTP archive: kernel-headers-2.6.8-10-amd64-generic_2.6.8-12_i386.deb to pool/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-10-amd64-generic_2.6.8-12_i386.deb kernel-headers-2.6.8-10-amd64-k8-smp_2.6.8-12_i386.deb to pool/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-10-amd64-k8-smp_2.6.8-12_i386.deb kernel-headers-2.6.8-10-amd64-k8_2.6.8-12_i386.deb to pool/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-10-amd64-k8_2.6.8-12_i386.deb kernel-headers-2.6.8-10-em64t-p4-smp_2.6.8-12_i386.deb to pool/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-10-em64t-p4-smp_2.6.8-12_i386.deb kernel-headers-2.6.8-10-em64t-p4_2.6.8-12_i386.deb to pool/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-10-em64t-p4_2.6.8-12_i386.deb kernel-headers-2.6.8-10_2.6.8-12_i386.deb to pool/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-10_2.6.8-12_i386.deb kernel-image-2.6.8-10-amd64-generic_2.6.8-12_i386.deb to pool/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-10-amd64-generic_2.6.8-12_i386.deb kernel-image-2.6.8-10-amd64-k8-smp_2.6.8-12_i386.deb to pool/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-10-amd64-k8-smp_2.6.8-12_i386.deb kernel-image-2.6.8-10-amd64-k8_2.6.8-12_i386.deb to pool/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-10-amd64-k8_2.6.8-12_i386.deb kernel-image-2.6.8-10-em64t-p4-smp_2.6.8-12_i386.deb to pool/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-10-em64t-p4-smp_2.6.8-12_i386.deb kernel-image-2.6.8-10-em64t-p4_2.6.8-12_i386.deb to pool/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-10-em64t-p4_2.6.8-12_i386.deb kernel-image-2.6.8-amd64_2.6.8-12.dsc to pool/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-amd64_2.6.8-12.dsc kernel-image-2.6.8-amd64_2.6.8-12.tar.gz to pool/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-amd64_2.6.8-12.tar.gz A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Frederik Schüler <[EMAIL PROTECTED]> (supplier of updated kernel-image-2.6.8-amd64 package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Tue, 15 Mar 2005 15:30:10 +0100 Source: kernel-image-2.6.8-amd64 Binary: kernel-image-2.6.8-10-em64t-p4-smp kernel-image-2.6.8-10-amd64-generic kernel-headers-2.6.8-10-em64t-p4-smp kernel-headers-2.6.8-10-amd64-k8-smp kernel-image-2.6.8-10-amd64-k8 kernel-image-2.6.8-10-em64t-p4 kernel-image-2.6.8-10-amd64-k8-smp kernel-headers-2.6.8-10 kernel-headers-2.6.8-10-em64t-p4 kernel-headers-2.6.8-10-amd64-generic kernel-headers-2.6.8-10-amd64-k8 Architecture: source i386 Version: 2.6.8-12 Distribution: unstable Urgency: high Maintainer: Debian Kernel Team <debian-kernel@lists.debian.org> Changed-By: Frederik Schüler <[EMAIL PROTECTED]> Description: kernel-headers-2.6.8-10 - Header files related to Linux kernel version 2.6.8 kernel-headers-2.6.8-10-amd64-generic - Linux kernel headers 2.6.8 for generic x86_64 systems kernel-headers-2.6.8-10-amd64-k8 - Linux kernel headers for version 2.6.8 on AMD64 systems kernel-headers-2.6.8-10-amd64-k8-smp - Linux kernel headers for version 2.6.8 on AMD64 SMP systems kernel-headers-2.6.8-10-em64t-p4 - Linux kernel headers for version 2.6.8 on Intel EM64T systems kernel-headers-2.6.8-10-em64t-p4-smp - Linux kernel headers for version 2.6.8 on Intel EM64T SMP systems kernel-image-2.6.8-10-amd64-generic - Linux kernel image for version 2.6.8 on generic x86_64 systems kernel-image-2.6.8-10-amd64-k8 - Linux kernel image for version 2.6.8 on AMD64 systems kernel-image-2.6.8-10-amd64-k8-smp - Linux kernel image for version 2.6.8 on AMD64 SMP systems kernel-image-2.6.8-10-em64t-p4 - Linux kernel image for version 2.6.8 on Intel EM64T systems kernel-image-2.6.8-10-em64t-p4-smp - Linux kernel image for version 2.6.8 on Intel EM64T SMP systems Closes: 295422 Changes: kernel-image-2.6.8-amd64 (2.6.8-12) unstable; urgency=high . * Added versioned dependency on e2fsprogs (>= 1.35-7), needed for successfull installation on 32bit userland systems. Closes: #295422 * Updated kernel images descriptions. * Rebuild with kerne-source-2.6.8 version 2.6.8-14. Files: b80906aa76358422bbec3be3b873c1f6 1085 devel optional kernel-image-2.6.8-amd64_2.6.8-12.dsc 70ac1b45c7fbc7b53c911cedc85edf5b 73555 devel optional kernel-image-2.6.8-amd64_2.6.8-12.tar.gz df36cc6a67224886730e8cc46f4f8e26 2719728 devel optional kernel-headers-2.6.8-10_2.6.8-12_i386.deb 00ce96b74c9f07824e9b09f1069ed13d 218992 devel optional kernel-headers-2.6.8-10-amd64-k8-smp_2.6.8-12_i386.deb 3a071c65529260ae3d7e01b786f4ae93 13207550 base optional kernel-image-2.6.8-10-amd64-k8-smp_2.6.8-12_i386.deb 149708a1eb9c0cc43df2fdb26b6daf5a 217008 devel optional kernel-headers-2.6.8-10-em64t-p4_2.6.8-12_i386.deb 2109fa126d77b6894c22c7b5ebddb14e 13178132 base optional kernel-image-2.6.8-10-em64t-p4_2.6.8-12_i386.deb e934f1b23e7fa3358b129c7c3361cefb 223986 devel optional kernel-headers-2.6.8-10-amd64-generic_2.6.8-12_i386.deb 67becbf34562b60b2c037c37b9caa356 12551714 base optional kernel-image-2.6.8-10-amd64-generic_2.6.8-12_i386.deb cd81051464e008a5f9c415eed751fc90 223020 devel optional kernel-headers-2.6.8-10-amd64-k8_2.6.8-12_i386.deb 4b8ceb519df5f51b10d50d727939972c 13249880 base optional kernel-image-2.6.8-10-amd64-k8_2.6.8-12_i386.deb 678cea7212c8b65e462a4a7ed26877a1 217348 devel optional kernel-headers-2.6.8-10-em64t-p4-smp_2.6.8-12_i386.deb dcf22e2ba8d70c65e2e949ebfcd4ba9a 13178764 base optional kernel-image-2.6.8-10-em64t-p4-smp_2.6.8-12_i386.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.5 (GNU/Linux) iD8DBQFCQjdIfIEQE/XJcI0RAlFRAJ9DQltncG41gjmyvc3efC78nkXpsACcDbQg LW3cRDK/gwy3epm0SlaFEhI= =xN79 -----END PGP SIGNATURE----- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]