Your message dated Sun, 30 Oct 2005 20:02:17 -0800
with message-id <[EMAIL PROTECTED]>
and subject line Bug#334458: fixed in qemu 0.7.2-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 18 Oct 2005 01:25:55 +0000
>From [EMAIL PROTECTED] Mon Oct 17 18:25:55 2005
Return-path: <[EMAIL PROTECTED]>
Received: from vms046pub.verizon.net [206.46.252.46] 
        by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
        id 1ERgEl-0006TK-00; Mon, 17 Oct 2005 18:25:55 -0700
Received: from [192.168.1.8] ([71.111.106.248])
 by vms046.mailsrvcs.net (Sun Java System Messaging Server 6.2 HotFix 0.04
 (built Dec 24 2004)) with ESMTPA id <[EMAIL PROTECTED]> for
 [EMAIL PROTECTED]; Mon, 17 Oct 2005 20:25:55 -0500 (CDT)
Date: Mon, 17 Oct 2005 18:25:53 -0700
From: Josh Triplett <[EMAIL PROTECTED]>
Subject: sysctl patch doesn't byte-swap name values
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Message-id: <[EMAIL PROTECTED]>
MIME-version: 1.0
Content-type: multipart/signed; micalg=pgp-sha1;
 protocol="application/pgp-signature";
 boundary=------------enig4D9D24CD9D02C730970FB601
X-Accept-Language: en-us, en
X-Enigmail-Version: 0.93.0.0
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.7.12) Gecko/20051007
 Debian/1.7.12-1
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-1.5 required=4.0 tests=BAYES_10 autolearn=no 
        version=2.60-bugs.debian.org_2005_01_02

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enig4D9D24CD9D02C730970FB601
Content-Type: multipart/mixed;
 boundary="------------070506030607040000090108"

This is a multi-part message in MIME format.
--------------070506030607040000090108
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit

Package: qemu
Version: 0.7.0-4
Tags: patch

The patch to handle the kernel version sysctl correctly runs tswapl on
all the arguments to sysctl, but does not run tswapl on the contents of
the name array.  The attached patch fixes this problem.

- Josh Triplett


--------------070506030607040000090108
Content-Type: text/x-patch;
 name="qemu-sysctl-swap-name.patch"
Content-Transfer-Encoding: 7bit
Content-Disposition: inline;
 filename="qemu-sysctl-swap-name.patch"

--- qemu-0.7.0/linux-user/syscall.c     2005-10-17 18:20:46.000000000 -0700
+++ qemu-0.7.0.new/linux-user/syscall.c 2005-10-17 18:21:15.000000000 -0700
@@ -2768,11 +2768,13 @@
         break;
     case TARGET_NR__sysctl:
         {
+            int i;
             struct __sysctl_args *args = (struct __sysctl_args *) arg1;
-            int *name, nlen, *oldlenp, oldlen, newlen;
+            int *namep, nlen, *oldlenp, oldlen, newlen;
+            int name[CTL_MAXNAME];
             void *oldval, *newval;
 
-            name = (int *) tswapl((long) args->name);
+            namep = (int *) tswapl((long) args->name);
             nlen = tswapl(args->nlen);
             oldval = (void *) tswapl((long) args->oldval);
             oldlenp = (int *) tswapl((long) args->oldlenp);
@@ -2780,6 +2782,14 @@
             newval = (void *) tswapl((long) args->newval);
             newlen = tswapl(args->newlen);
 
+            if (nlen <= 0 || nlen >= CTL_MAXNAME) {
+                gemu_log("qemu: sysctl with bad nlen");
+                ret = -ENOTDIR;
+            }
+
+            for(i = 0; i < nlen; i++)
+                name[i] = tswapl(namep[i]);
+
             if (nlen == 2 && name[0] == CTL_KERN && name[1] == KERN_VERSION) {
                 ret = get_errno(
                         sysctl(name, nlen, oldval, &oldlen, newval, newlen));

--------------070506030607040000090108--

--------------enig4D9D24CD9D02C730970FB601
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)
Comment: Using GnuPG with Debian - http://enigmail.mozdev.org

iD8DBQFDVE8iGJuZRtD+evsRArK4AJ9WB3O28fOqhnNmqzK2i6lDiJKTJACfX4VL
3RRP3Xnpwx1Brd+ZLVdYgKk=
=UYxk
-----END PGP SIGNATURE-----

--------------enig4D9D24CD9D02C730970FB601--

---------------------------------------
Received: (at 334458-close) by bugs.debian.org; 31 Oct 2005 04:08:08 +0000
>From [EMAIL PROTECTED] Sun Oct 30 20:08:08 2005
Return-path: <[EMAIL PROTECTED]>
Received: from katie by spohr.debian.org with local (Exim 3.36 1 (Debian))
        id 1EWQsD-00005r-00; Sun, 30 Oct 2005 20:02:17 -0800
From: Guillem Jover <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.56 $
Subject: Bug#334458: fixed in qemu 0.7.2-1
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Sun, 30 Oct 2005 20:02:17 -0800
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-CrossAssassin-Score: 2

Source: qemu
Source-Version: 0.7.2-1

We believe that the bug you reported is fixed in the latest version of
qemu, which is due to be installed in the Debian FTP archive:

qemu_0.7.2-1.diff.gz
  to pool/main/q/qemu/qemu_0.7.2-1.diff.gz
qemu_0.7.2-1.dsc
  to pool/main/q/qemu/qemu_0.7.2-1.dsc
qemu_0.7.2-1_i386.deb
  to pool/main/q/qemu/qemu_0.7.2-1_i386.deb
qemu_0.7.2.orig.tar.gz
  to pool/main/q/qemu/qemu_0.7.2.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Guillem Jover <[EMAIL PROTECTED]> (supplier of updated qemu package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Mon, 31 Oct 2005 05:01:45 +0200
Source: qemu
Binary: qemu
Architecture: source i386
Version: 0.7.2-1
Distribution: unstable
Urgency: low
Maintainer: Debian QEMU Team <[EMAIL PROTECTED]>
Changed-By: Guillem Jover <[EMAIL PROTECTED]>
Description: 
 qemu       - fast processor emulator
Closes: 321232 327168 334071 334458 335062 335159 335163
Changes: 
 qemu (0.7.2-1) unstable; urgency=low
 .
   [ Guillem Jover ]
   * New upsream release. (Closes: #321232, #327168)
     - debian/patches/12_signal_silent.patch: Integrated upstream, remove.
     - debian/patches/50_ppc_ldscript.patch: Likewise.
     - debian/patches/33_syscall_truncate64.patch: Likewise.
     - debian/patches/01_doc_typos.patch: Resync with upstream.
     - debian/patches/04_do_not_print_rtc_freq_if_ok.patch: Likewise.
     - debian/patches/05_non-fatal_if_linux_hd_missing.patch: Likewise.
     - debian/patches/10_signal_jobs.patch: Likewise.
     - debian/patches/11_signal_sigaction.patch: Likewise.
     - debian/patches/20_net_socket.patch: Likewise.
     - debian/patches/21_net_sockopt.patch: Likewise.
     - debian/patches/22_net_tuntap_stall.patch: Likewise.
     - debian/patches/30_syscall_ipc.patch: Likewise.
     - debian/patches/31_syscalls.patch: Likewise.
     - debian/patches/32_syscall_sysctl.patch: Likewise.
     - debian/patches/40_fpu_arm_sigfpe.patch: Likewise.
   * Repackaged upstream source to deal with binaries w/o sources.
     - pc-bios/video.x: New file removed.
   * Create a new qemu-user(1) manpage and link all user emulator manpages
     to it. (Closes: #335163)
   * Add missing '-' and '=' keycodes for sendkey command.
     - debian/patches/50_missing_keycodes.patch: New file. (Closes: #334071)
     Thanks to Robert Millan <[EMAIL PROTECTED]>.
   * Add manpage link for qemu-system-mips.
   * Make sysctl byte-swap the name values.
     - debian/patches/32_syscall_sysctl.patch: Merge patch. (Closes: #334458)
     Thanks to Josh Triplett <[EMAIL PROTECTED]>.
   * Change documentation menu section to "Apps/Emulators". (Closes: #335062)
     Thanks to Frans Pop <[EMAIL PROTECTED]>.
   * On PowerPC, do not zero registers r7-r31 in do_fork and zero register r3.
     Fixing segfaults on programs using the clone syscall.
     - debian/patches/33_syscall_ppc_clone.patch: New file. (Closes: #335159)
     Thanks to Josh Triplett <[EMAIL PROTECTED]>
     and Paul Brook <[EMAIL PROTECTED]>.
   * Tighten vgabios and bochsbios versioned Depends.
   * Add video.x to the list of roms to touch to make qemu Makefile happy.
   * Add lintian overrides for the user emulators being shlib-with-non-pic-code.
   * Wrap lines in debian/control fields (knowingly breaking policy).
 .
   [ Guilherme de S. Pastore ]
   * debian/control:
     - Updated my e-mail address.
   * debian/copyright:
     - Dropped André from team members list, not a single contribution ever.
Files: 
 1a41a0c2f0cc85a43d1a7f0cf843a412 926 misc optional qemu_0.7.2-1.dsc
 01b158b44f0617e7f44d67414130ebd2 1189668 misc optional qemu_0.7.2.orig.tar.gz
 25bf2477096afdcc02a778d676468af2 18499 misc optional qemu_0.7.2-1.diff.gz
 b9e0286535f286639c2ad6ce0b8402cf 2110082 misc optional qemu_0.7.2-1_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFDZZGfuW9ciZ2SjJsRAne8AJ9yviO2rKT2htb4suj5E4JBrXPv4QCg7Rg8
LPj4lOS6gllcPhugAWm2Eo0=
=YSzp
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to