Your message dated Thu, 24 Mar 2005 04:19:02 -0500
with message-id <[EMAIL PROTECTED]>
and subject line Bug#295422: fixed in kernel-image-2.6.8-amd64 2.6.8-12
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--------------------------------------
Received: (at submit) by bugs.debian.org; 2 Nov 2004 18:28:10 +0000
>From [EMAIL PROTECTED] Tue Nov 02 10:28:10 2004
Return-path: <[EMAIL PROTECTED]>
Received: from webmail.cs.unm.edu (mail.cs.unm.edu) [64.106.20.39] (mail)
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1CP3O6-0001Nc-00; Tue, 02 Nov 2004 10:28:10 -0800
Received: from snot.cs.unm.edu ([64.106.46.98])
by mail.cs.unm.edu with esmtp (Exim 3.35 #1 (Debian))
id 1CP2RU-0007cL-00; Tue, 02 Nov 2004 10:27:36 -0700
Received: from bap by snot.cs.unm.edu with local (Exim 4.34)
id 1CP2Po-0005Xw-Fx; Tue, 02 Nov 2004 10:25:52 -0700
From: Barak Pearlmutter <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: 64-bit kernel -> ldd -> mkinitrd issue
Reply-to: [EMAIL PROTECTED]
Message-Id: <[EMAIL PROTECTED]>
Sender: Barak Pearlmutter <[EMAIL PROTECTED]>
Date: Tue, 02 Nov 2004 10:25:52 -0700
X-Scanner: exiscan *1CP2RU-0007cL-00*/fVpxy7ZVDI*
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE
autolearn=no version=2.60-bugs.debian.org_2004_03_25
X-Spam-Level:
Package: initrd-tools
Version: 0.1.74
There is an unfortunate interaction that occurs when a system is
running an em64t-p4 or amd64 kernel, but a standard 32-bit "testing"
user space. When configuring a kernel-image package the mkinitrd
fails with a cpio failure to read a file named "(0x00000000)".
The cause of this is that "ldd" has an extra entry: with a 32-bit
kernel you see this
# ldd /bin/cat
libc.so.6 => /lib/tls/libc.so.6 (0x40028000)
/lib/ld-linux.so.2 => /lib/ld-linux.so.2 (0x40000000)
but with a 64-bit kernel you see this
# uname -a
Linux x 2.6.8-9-em64t-p4-smp #1 SMP Thu Oct 7 16:01:47 CEST 2004 x86_64
GNU/Linux
# ldd /bin/cat
linux-gate.so.1 => (0x00000000)
libc.so.6 => /lib/tls/libc.so.6 (0x5557d000)
/lib/ld-linux.so.2 => /lib/ld-linux.so.2 (0x55555000)
When mkinitrd runs ldd on executables to find libraries to be included
them in the initrd, it does not skip the linux-gate line and instead
includes an entry for the strange filename, which fails.
This would be really easy to fix by hacking mkinitrd, either by
ignoring filenames that don't start with "/", or that do start with
"(", or by ignoring the linux-gate lines specially, or whatever.
Or (the "right" solution) ldd could be modified to take a flag telling
it to just print the filenames of all used libraries and mkinitrd
could call it that way, removing the need to parse ldd's output.
But as a cheesy workaround for myself, which might be of value to
others, I created a stub
# cat /usr/local/bin/ldd
#! /bin/sh
/usr/bin/ldd $* | egrep -v linux-gate\[.\]so\[.\]1
and then did
PATH=/usr/local/bin:$PATH dpkg --configure --pending
which worked fine.
--
Barak A. Pearlmutter <[EMAIL PROTECTED]>
Hamilton Institute & Dept Comp Sci, NUI Maynooth, Co. Kildare, Ireland
http://www-bcl.cs.may.ie/~barak/
---------------------------------------
Received: (at 295422-close) by bugs.debian.org; 24 Mar 2005 09:30:11 +0000
>From [EMAIL PROTECTED] Thu Mar 24 01:30:11 2005
Return-path: <[EMAIL PROTECTED]>
Received: from newraff.debian.org [208.185.25.31] (mail)
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1DEOfL-0005Dr-00; Thu, 24 Mar 2005 01:30:11 -0800
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
id 1DEOUY-0004kg-00; Thu, 24 Mar 2005 04:19:02 -0500
From: =?utf-8?q?Frederik_Sch=C3=BCler?= <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.55 $
Subject: Bug#295422: fixed in kernel-image-2.6.8-amd64 2.6.8-12
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Thu, 24 Mar 2005 04:19:02 -0500
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level:
Source: kernel-image-2.6.8-amd64
Source-Version: 2.6.8-12
We believe that the bug you reported is fixed in the latest version of
kernel-image-2.6.8-amd64, which is due to be installed in the Debian FTP
archive:
kernel-headers-2.6.8-10-amd64-generic_2.6.8-12_i386.deb
to
pool/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-10-amd64-generic_2.6.8-12_i386.deb
kernel-headers-2.6.8-10-amd64-k8-smp_2.6.8-12_i386.deb
to
pool/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-10-amd64-k8-smp_2.6.8-12_i386.deb
kernel-headers-2.6.8-10-amd64-k8_2.6.8-12_i386.deb
to
pool/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-10-amd64-k8_2.6.8-12_i386.deb
kernel-headers-2.6.8-10-em64t-p4-smp_2.6.8-12_i386.deb
to
pool/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-10-em64t-p4-smp_2.6.8-12_i386.deb
kernel-headers-2.6.8-10-em64t-p4_2.6.8-12_i386.deb
to
pool/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-10-em64t-p4_2.6.8-12_i386.deb
kernel-headers-2.6.8-10_2.6.8-12_i386.deb
to
pool/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-10_2.6.8-12_i386.deb
kernel-image-2.6.8-10-amd64-generic_2.6.8-12_i386.deb
to
pool/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-10-amd64-generic_2.6.8-12_i386.deb
kernel-image-2.6.8-10-amd64-k8-smp_2.6.8-12_i386.deb
to
pool/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-10-amd64-k8-smp_2.6.8-12_i386.deb
kernel-image-2.6.8-10-amd64-k8_2.6.8-12_i386.deb
to
pool/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-10-amd64-k8_2.6.8-12_i386.deb
kernel-image-2.6.8-10-em64t-p4-smp_2.6.8-12_i386.deb
to
pool/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-10-em64t-p4-smp_2.6.8-12_i386.deb
kernel-image-2.6.8-10-em64t-p4_2.6.8-12_i386.deb
to
pool/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-10-em64t-p4_2.6.8-12_i386.deb
kernel-image-2.6.8-amd64_2.6.8-12.dsc
to pool/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-amd64_2.6.8-12.dsc
kernel-image-2.6.8-amd64_2.6.8-12.tar.gz
to
pool/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-amd64_2.6.8-12.tar.gz
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Frederik Schüler <[EMAIL PROTECTED]> (supplier of updated
kernel-image-2.6.8-amd64 package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Tue, 15 Mar 2005 15:30:10 +0100
Source: kernel-image-2.6.8-amd64
Binary: kernel-image-2.6.8-10-em64t-p4-smp kernel-image-2.6.8-10-amd64-generic
kernel-headers-2.6.8-10-em64t-p4-smp kernel-headers-2.6.8-10-amd64-k8-smp
kernel-image-2.6.8-10-amd64-k8 kernel-image-2.6.8-10-em64t-p4
kernel-image-2.6.8-10-amd64-k8-smp kernel-headers-2.6.8-10
kernel-headers-2.6.8-10-em64t-p4 kernel-headers-2.6.8-10-amd64-generic
kernel-headers-2.6.8-10-amd64-k8
Architecture: source i386
Version: 2.6.8-12
Distribution: unstable
Urgency: high
Maintainer: Debian Kernel Team <[email protected]>
Changed-By: Frederik Schüler <[EMAIL PROTECTED]>
Description:
kernel-headers-2.6.8-10 - Header files related to Linux kernel version 2.6.8
kernel-headers-2.6.8-10-amd64-generic - Linux kernel headers 2.6.8 for generic
x86_64 systems
kernel-headers-2.6.8-10-amd64-k8 - Linux kernel headers for version 2.6.8 on
AMD64 systems
kernel-headers-2.6.8-10-amd64-k8-smp - Linux kernel headers for version 2.6.8
on AMD64 SMP systems
kernel-headers-2.6.8-10-em64t-p4 - Linux kernel headers for version 2.6.8 on
Intel EM64T systems
kernel-headers-2.6.8-10-em64t-p4-smp - Linux kernel headers for version 2.6.8
on Intel EM64T SMP systems
kernel-image-2.6.8-10-amd64-generic - Linux kernel image for version 2.6.8 on
generic x86_64 systems
kernel-image-2.6.8-10-amd64-k8 - Linux kernel image for version 2.6.8 on AMD64
systems
kernel-image-2.6.8-10-amd64-k8-smp - Linux kernel image for version 2.6.8 on
AMD64 SMP systems
kernel-image-2.6.8-10-em64t-p4 - Linux kernel image for version 2.6.8 on Intel
EM64T systems
kernel-image-2.6.8-10-em64t-p4-smp - Linux kernel image for version 2.6.8 on
Intel EM64T SMP systems
Closes: 295422
Changes:
kernel-image-2.6.8-amd64 (2.6.8-12) unstable; urgency=high
.
* Added versioned dependency on e2fsprogs (>= 1.35-7), needed for
successfull installation on 32bit userland systems. Closes: #295422
* Updated kernel images descriptions.
* Rebuild with kerne-source-2.6.8 version 2.6.8-14.
Files:
b80906aa76358422bbec3be3b873c1f6 1085 devel optional
kernel-image-2.6.8-amd64_2.6.8-12.dsc
70ac1b45c7fbc7b53c911cedc85edf5b 73555 devel optional
kernel-image-2.6.8-amd64_2.6.8-12.tar.gz
df36cc6a67224886730e8cc46f4f8e26 2719728 devel optional
kernel-headers-2.6.8-10_2.6.8-12_i386.deb
00ce96b74c9f07824e9b09f1069ed13d 218992 devel optional
kernel-headers-2.6.8-10-amd64-k8-smp_2.6.8-12_i386.deb
3a071c65529260ae3d7e01b786f4ae93 13207550 base optional
kernel-image-2.6.8-10-amd64-k8-smp_2.6.8-12_i386.deb
149708a1eb9c0cc43df2fdb26b6daf5a 217008 devel optional
kernel-headers-2.6.8-10-em64t-p4_2.6.8-12_i386.deb
2109fa126d77b6894c22c7b5ebddb14e 13178132 base optional
kernel-image-2.6.8-10-em64t-p4_2.6.8-12_i386.deb
e934f1b23e7fa3358b129c7c3361cefb 223986 devel optional
kernel-headers-2.6.8-10-amd64-generic_2.6.8-12_i386.deb
67becbf34562b60b2c037c37b9caa356 12551714 base optional
kernel-image-2.6.8-10-amd64-generic_2.6.8-12_i386.deb
cd81051464e008a5f9c415eed751fc90 223020 devel optional
kernel-headers-2.6.8-10-amd64-k8_2.6.8-12_i386.deb
4b8ceb519df5f51b10d50d727939972c 13249880 base optional
kernel-image-2.6.8-10-amd64-k8_2.6.8-12_i386.deb
678cea7212c8b65e462a4a7ed26877a1 217348 devel optional
kernel-headers-2.6.8-10-em64t-p4-smp_2.6.8-12_i386.deb
dcf22e2ba8d70c65e2e949ebfcd4ba9a 13178764 base optional
kernel-image-2.6.8-10-em64t-p4-smp_2.6.8-12_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (GNU/Linux)
iD8DBQFCQjdIfIEQE/XJcI0RAlFRAJ9DQltncG41gjmyvc3efC78nkXpsACcDbQg
LW3cRDK/gwy3epm0SlaFEhI=
=xN79
-----END PGP SIGNATURE-----
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]