Your message dated Thu, 24 Mar 2005 04:19:02 -0500
with message-id <[EMAIL PROTECTED]>
and subject line Bug#295422: fixed in kernel-image-2.6.8-amd64 2.6.8-12
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 2 Nov 2004 18:28:10 +0000
>From [EMAIL PROTECTED] Tue Nov 02 10:28:10 2004
Return-path: <[EMAIL PROTECTED]>
Received: from webmail.cs.unm.edu (mail.cs.unm.edu) [64.106.20.39] (mail)
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1CP3O6-0001Nc-00; Tue, 02 Nov 2004 10:28:10 -0800
Received: from snot.cs.unm.edu ([64.106.46.98])
        by mail.cs.unm.edu with esmtp (Exim 3.35 #1 (Debian))
        id 1CP2RU-0007cL-00; Tue, 02 Nov 2004 10:27:36 -0700
Received: from bap by snot.cs.unm.edu with local (Exim 4.34)
        id 1CP2Po-0005Xw-Fx; Tue, 02 Nov 2004 10:25:52 -0700
From: Barak Pearlmutter <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: 64-bit kernel -> ldd -> mkinitrd issue
Reply-to: [EMAIL PROTECTED]
Message-Id: <[EMAIL PROTECTED]>
Sender: Barak Pearlmutter <[EMAIL PROTECTED]>
Date: Tue, 02 Nov 2004 10:25:52 -0700
X-Scanner: exiscan *1CP2RU-0007cL-00*/fVpxy7ZVDI*
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
        autolearn=no version=2.60-bugs.debian.org_2004_03_25
X-Spam-Level: 

Package: initrd-tools
Version: 0.1.74

There is an unfortunate interaction that occurs when a system is
running an em64t-p4 or amd64 kernel, but a standard 32-bit "testing"
user space.  When configuring a kernel-image package the mkinitrd
fails with a cpio failure to read a file named "(0x00000000)".

The cause of this is that "ldd" has an extra entry: with a 32-bit
kernel you see this

    # ldd /bin/cat

                    libc.so.6 => /lib/tls/libc.so.6 (0x40028000)
            /lib/ld-linux.so.2 => /lib/ld-linux.so.2 (0x40000000)

but with a 64-bit kernel you see this

    # uname -a

    Linux x 2.6.8-9-em64t-p4-smp #1 SMP Thu Oct 7 16:01:47 CEST 2004 x86_64 
GNU/Linux

    # ldd /bin/cat

            linux-gate.so.1 =>  (0x00000000)
            libc.so.6 => /lib/tls/libc.so.6 (0x5557d000)
            /lib/ld-linux.so.2 => /lib/ld-linux.so.2 (0x55555000)

When mkinitrd runs ldd on executables to find libraries to be included
them in the initrd, it does not skip the linux-gate line and instead
includes an entry for the strange filename, which fails.

This would be really easy to fix by hacking mkinitrd, either by
ignoring filenames that don't start with "/", or that do start with
"(", or by ignoring the linux-gate lines specially, or whatever.

Or (the "right" solution) ldd could be modified to take a flag telling
it to just print the filenames of all used libraries and mkinitrd
could call it that way, removing the need to parse ldd's output.

But as a cheesy workaround for myself, which might be of value to
others, I created a stub

    # cat /usr/local/bin/ldd

    #! /bin/sh
    /usr/bin/ldd $* | egrep -v linux-gate\[.\]so\[.\]1

and then did

  PATH=/usr/local/bin:$PATH dpkg --configure --pending

which worked fine.
--
Barak A. Pearlmutter <[EMAIL PROTECTED]>
 Hamilton Institute & Dept Comp Sci, NUI Maynooth, Co. Kildare, Ireland
 http://www-bcl.cs.may.ie/~barak/

---------------------------------------
Received: (at 295422-close) by bugs.debian.org; 24 Mar 2005 09:30:11 +0000
>From [EMAIL PROTECTED] Thu Mar 24 01:30:11 2005
Return-path: <[EMAIL PROTECTED]>
Received: from newraff.debian.org [208.185.25.31] (mail)
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1DEOfL-0005Dr-00; Thu, 24 Mar 2005 01:30:11 -0800
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
        id 1DEOUY-0004kg-00; Thu, 24 Mar 2005 04:19:02 -0500
From: =?utf-8?q?Frederik_Sch=C3=BCler?= <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.55 $
Subject: Bug#295422: fixed in kernel-image-2.6.8-amd64 2.6.8-12
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Thu, 24 Mar 2005 04:19:02 -0500
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Source: kernel-image-2.6.8-amd64
Source-Version: 2.6.8-12

We believe that the bug you reported is fixed in the latest version of
kernel-image-2.6.8-amd64, which is due to be installed in the Debian FTP 
archive:

kernel-headers-2.6.8-10-amd64-generic_2.6.8-12_i386.deb
  to 
pool/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-10-amd64-generic_2.6.8-12_i386.deb
kernel-headers-2.6.8-10-amd64-k8-smp_2.6.8-12_i386.deb
  to 
pool/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-10-amd64-k8-smp_2.6.8-12_i386.deb
kernel-headers-2.6.8-10-amd64-k8_2.6.8-12_i386.deb
  to 
pool/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-10-amd64-k8_2.6.8-12_i386.deb
kernel-headers-2.6.8-10-em64t-p4-smp_2.6.8-12_i386.deb
  to 
pool/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-10-em64t-p4-smp_2.6.8-12_i386.deb
kernel-headers-2.6.8-10-em64t-p4_2.6.8-12_i386.deb
  to 
pool/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-10-em64t-p4_2.6.8-12_i386.deb
kernel-headers-2.6.8-10_2.6.8-12_i386.deb
  to 
pool/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-10_2.6.8-12_i386.deb
kernel-image-2.6.8-10-amd64-generic_2.6.8-12_i386.deb
  to 
pool/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-10-amd64-generic_2.6.8-12_i386.deb
kernel-image-2.6.8-10-amd64-k8-smp_2.6.8-12_i386.deb
  to 
pool/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-10-amd64-k8-smp_2.6.8-12_i386.deb
kernel-image-2.6.8-10-amd64-k8_2.6.8-12_i386.deb
  to 
pool/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-10-amd64-k8_2.6.8-12_i386.deb
kernel-image-2.6.8-10-em64t-p4-smp_2.6.8-12_i386.deb
  to 
pool/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-10-em64t-p4-smp_2.6.8-12_i386.deb
kernel-image-2.6.8-10-em64t-p4_2.6.8-12_i386.deb
  to 
pool/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-10-em64t-p4_2.6.8-12_i386.deb
kernel-image-2.6.8-amd64_2.6.8-12.dsc
  to pool/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-amd64_2.6.8-12.dsc
kernel-image-2.6.8-amd64_2.6.8-12.tar.gz
  to 
pool/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-amd64_2.6.8-12.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Frederik Schüler <[EMAIL PROTECTED]> (supplier of updated 
kernel-image-2.6.8-amd64 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Tue, 15 Mar 2005 15:30:10 +0100
Source: kernel-image-2.6.8-amd64
Binary: kernel-image-2.6.8-10-em64t-p4-smp kernel-image-2.6.8-10-amd64-generic 
kernel-headers-2.6.8-10-em64t-p4-smp kernel-headers-2.6.8-10-amd64-k8-smp 
kernel-image-2.6.8-10-amd64-k8 kernel-image-2.6.8-10-em64t-p4 
kernel-image-2.6.8-10-amd64-k8-smp kernel-headers-2.6.8-10 
kernel-headers-2.6.8-10-em64t-p4 kernel-headers-2.6.8-10-amd64-generic 
kernel-headers-2.6.8-10-amd64-k8
Architecture: source i386
Version: 2.6.8-12
Distribution: unstable
Urgency: high
Maintainer: Debian Kernel Team <debian-kernel@lists.debian.org>
Changed-By: Frederik Schüler <[EMAIL PROTECTED]>
Description: 
 kernel-headers-2.6.8-10 - Header files related to Linux kernel version 2.6.8
 kernel-headers-2.6.8-10-amd64-generic - Linux kernel headers 2.6.8 for generic 
x86_64 systems
 kernel-headers-2.6.8-10-amd64-k8 - Linux kernel headers for version 2.6.8 on 
AMD64 systems
 kernel-headers-2.6.8-10-amd64-k8-smp - Linux kernel headers for version 2.6.8 
on AMD64 SMP systems
 kernel-headers-2.6.8-10-em64t-p4 - Linux kernel headers for version 2.6.8 on 
Intel EM64T systems
 kernel-headers-2.6.8-10-em64t-p4-smp - Linux kernel headers for version 2.6.8 
on Intel EM64T SMP systems
 kernel-image-2.6.8-10-amd64-generic - Linux kernel image for version 2.6.8 on 
generic x86_64 systems
 kernel-image-2.6.8-10-amd64-k8 - Linux kernel image for version 2.6.8 on AMD64 
systems
 kernel-image-2.6.8-10-amd64-k8-smp - Linux kernel image for version 2.6.8 on 
AMD64 SMP systems
 kernel-image-2.6.8-10-em64t-p4 - Linux kernel image for version 2.6.8 on Intel 
EM64T systems
 kernel-image-2.6.8-10-em64t-p4-smp - Linux kernel image for version 2.6.8 on 
Intel EM64T SMP systems
Closes: 295422
Changes: 
 kernel-image-2.6.8-amd64 (2.6.8-12) unstable; urgency=high
 .
   * Added versioned dependency on e2fsprogs (>= 1.35-7), needed for
     successfull installation on 32bit userland systems. Closes: #295422
   * Updated kernel images descriptions.
   * Rebuild with kerne-source-2.6.8 version 2.6.8-14.
Files: 
 b80906aa76358422bbec3be3b873c1f6 1085 devel optional 
kernel-image-2.6.8-amd64_2.6.8-12.dsc
 70ac1b45c7fbc7b53c911cedc85edf5b 73555 devel optional 
kernel-image-2.6.8-amd64_2.6.8-12.tar.gz
 df36cc6a67224886730e8cc46f4f8e26 2719728 devel optional 
kernel-headers-2.6.8-10_2.6.8-12_i386.deb
 00ce96b74c9f07824e9b09f1069ed13d 218992 devel optional 
kernel-headers-2.6.8-10-amd64-k8-smp_2.6.8-12_i386.deb
 3a071c65529260ae3d7e01b786f4ae93 13207550 base optional 
kernel-image-2.6.8-10-amd64-k8-smp_2.6.8-12_i386.deb
 149708a1eb9c0cc43df2fdb26b6daf5a 217008 devel optional 
kernel-headers-2.6.8-10-em64t-p4_2.6.8-12_i386.deb
 2109fa126d77b6894c22c7b5ebddb14e 13178132 base optional 
kernel-image-2.6.8-10-em64t-p4_2.6.8-12_i386.deb
 e934f1b23e7fa3358b129c7c3361cefb 223986 devel optional 
kernel-headers-2.6.8-10-amd64-generic_2.6.8-12_i386.deb
 67becbf34562b60b2c037c37b9caa356 12551714 base optional 
kernel-image-2.6.8-10-amd64-generic_2.6.8-12_i386.deb
 cd81051464e008a5f9c415eed751fc90 223020 devel optional 
kernel-headers-2.6.8-10-amd64-k8_2.6.8-12_i386.deb
 4b8ceb519df5f51b10d50d727939972c 13249880 base optional 
kernel-image-2.6.8-10-amd64-k8_2.6.8-12_i386.deb
 678cea7212c8b65e462a4a7ed26877a1 217348 devel optional 
kernel-headers-2.6.8-10-em64t-p4-smp_2.6.8-12_i386.deb
 dcf22e2ba8d70c65e2e949ebfcd4ba9a 13178764 base optional 
kernel-image-2.6.8-10-em64t-p4-smp_2.6.8-12_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (GNU/Linux)

iD8DBQFCQjdIfIEQE/XJcI0RAlFRAJ9DQltncG41gjmyvc3efC78nkXpsACcDbQg
LW3cRDK/gwy3epm0SlaFEhI=
=xN79
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to