Your message dated Sat, 08 Nov 2003 20:02:47 -0500
with message-id <[EMAIL PROTECTED]>
and subject line Bug#219769: fixed in linux-kernel-headers 2.5.999-test7-bk-9
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 8 Nov 2003 21:14:56 +0000
>From [EMAIL PROTECTED] Sat Nov 08 15:14:55 2003
Return-path: <[EMAIL PROTECTED]>
Received: from dirg.bris.ac.uk [137.222.10.102] 
        by master.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1AIaQ2-0008NX-00; Sat, 08 Nov 2003 15:14:54 -0600
Received: from brahma.phy.bris.ac.uk by dirg.bris.ac.uk with SMTP-LOCAL 
          with ESMTP; Sat, 8 Nov 2003 21:14:53 +0000
Received: from sticks.phy.bris.ac.uk ([137.222.30.155]) 
          by brahma.phy.bris.ac.uk 
          with SMTP (Microsoft Exchange Internet Mail Service Version 5.5.2657.72)     
 id V0MQV85P;
          Sat, 8 Nov 2003 21:14:52 -0000
Received: from andras by sticks.phy.bris.ac.uk 
          with local (Exim 3.35 #1 (Debian))    id 1AIaPz-00089I-00     for <[EMAIL 
PROTECTED]>;
          Sat, 08 Nov 2003 21:14:51 +0000
Date: Sat, 8 Nov 2003 21:14:50 +0000
From: Major A <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: libc6-2.3.2.ds1-10 on ARM breaks modutils
Message-ID: <[EMAIL PROTECTED]>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: Mutt/1.5.4i
Sender: Major A <[EMAIL PROTECTED]>
Delivered-To: [EMAIL PROTECTED]
X-Spam-Status: No, hits=-8.2 required=4.0
        tests=HAS_PACKAGE,QUOTED_EMAIL_TEXT
        version=2.53-bugs.debian.org_2003_11_7
X-Spam-Level: 
X-Spam-Checker-Version: SpamAssassin 2.53-bugs.debian.org_2003_11_7 
(1.174.2.15-2003-03-30-exp)


Package: libc6
Version: 2.3.2.ds1-10
Severity: grave
Arch: ARM


After upgrading libc6 on an ARM-based handheld running "sarge" to
"sid", all programs in modutils (lsmod, for instance), issue an error
"lsmod: QM_MODULES: Function not implemented" and exit when run as
root. When run as non-root, lsmod runs expected, the other commands
(modprobe, insmod) fail with the QM_MODULES error message.

Here is the output of "strace lsmod" when run as root:

> execve("/sbin/lsmod", ["lsmod"], [/* 15 vars */]) = 0
> uname({sys="Linux", node="cirrus", ...}) = 0
> brk(0)                                  = 0x28494
> access("/etc/ld.so.nohwcap", F_OK)      = -1 ENOENT (No such file or directory)
> open("/etc/ld.so.preload", O_RDONLY)    = -1 ENOENT (No such file or directory)
> open("/etc/ld.so.cache", O_RDONLY)      = 3
> fstat64(3, {st_mode=S_IFREG|0644, st_size=11129, ...}) = 0
> old_mmap(NULL, 11129, PROT_READ, MAP_PRIVATE, 3, 0) = 0x40015000
> close(3)                                = 0
> access("/etc/ld.so.nohwcap", F_OK)      = -1 ENOENT (No such file or directory)
> open("/lib/libc.so.6", O_RDONLY)        = 3
> read(3, "\177ELF\1\1\1a\0\0\0\0\0\0\0\0\3\0(\0\1\0\0\0(t\1\0004"..., 512) = 512
> fstat64(3, {st_mode=S_IFREG|0644, st_size=1166132, ...}) = 0
> old_mmap(NULL, 1202940, PROT_READ|PROT_EXEC, MAP_PRIVATE, 3, 0) = 0x4001e000
> old_mmap(0x40136000, 49152, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED, 3, 
> 0x110000) = 0x40136000
> old_mmap(0x40142000, 6908, PROT_READ|PROT_WRITE, 
> MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x40142000
> close(3)                                = 0
> munmap(0x40015000, 11129)               = 0
> brk(0)                                  = 0x28494
> brk(0x49494)                            = 0x49494
> brk(0)                                  = 0x49494
> brk(0x4a000)                            = 0x4a000
> open("/proc/sys/kernel/tainted", O_RDONLY) = 3
> fstat64(3, {st_mode=S_IFREG|0644, st_size=0, ...}) = 0
> old_mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 
> 0x40015000
> read(3, "1\n", 4096)                    = 2
> close(3)                                = 0
> munmap(0x40015000, 4096)                = 0
> brk(0)                                  = 0x4a000
> brk(0)                                  = 0x4a000
> brk(0x49000)                            = 0x49000
> brk(0)                                  = 0x49000
> fstat64(1, {st_mode=S_IFREG|0644, st_size=1891, ...}) = 0
> old_mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 
> 0x40015000
> getuid32()                              = 0
> write(2, "lsmod: ", 7lsmod: )                  = 7
> write(2, "QM_MODULES: Function not impleme"..., 37QM_MODULES: Function not 
> implemented
> ) = 37
> write(2, "\n", 1
> )                       = 1
> write(1, "Module                  Size  Us"..., 54Module                  Size  Used 
> by    Tainted: P  
> ) = 54
> munmap(0x40015000, 4096)                = 0
> io_submit(0x1, 0, 0xfbad2088)           = -1 ENOSYS (Function not implemented)
> _exit(1)                                = ?

Here is the same for a non-root user (uid 1000):

> execve("/sbin/lsmod", ["/sbin/lsmod"], [/* 14 vars */]) = 0
> uname({sys="Linux", node="cirrus", ...}) = 0
> brk(0)                                  = 0x28494
> access("/etc/ld.so.nohwcap", F_OK)      = -1 ENOENT (No such file or directory)
> open("/etc/ld.so.preload", O_RDONLY)    = -1 ENOENT (No such file or directory)
> open("/etc/ld.so.cache", O_RDONLY)      = 3
> fstat64(3, {st_mode=S_IFREG|0644, st_size=11129, ...}) = 0
> old_mmap(NULL, 11129, PROT_READ, MAP_PRIVATE, 3, 0) = 0x40015000
> close(3)                                = 0
> access("/etc/ld.so.nohwcap", F_OK)      = -1 ENOENT (No such file or directory)
> open("/lib/libc.so.6", O_RDONLY)        = 3
> read(3, "\177ELF\1\1\1a\0\0\0\0\0\0\0\0\3\0(\0\1\0\0\0(t\1\0004"..., 512) = 512
> fstat64(3, {st_mode=S_IFREG|0644, st_size=1166132, ...}) = 0
> old_mmap(NULL, 1202940, PROT_READ|PROT_EXEC, MAP_PRIVATE, 3, 0) = 0x4001e000
> old_mmap(0x40136000, 49152, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED, 3, 
> 0x110000) = 0x40136000
> old_mmap(0x40142000, 6908, PROT_READ|PROT_WRITE, 
> MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x40142000
> close(3)                                = 0
> munmap(0x40015000, 11129)               = 0
> brk(0)                                  = 0x28494
> brk(0x49494)                            = 0x49494
> brk(0)                                  = 0x49494
> brk(0x4a000)                            = 0x4a000
> open("/proc/sys/kernel/tainted", O_RDONLY) = 3
> fstat64(3, {st_mode=S_IFREG|0644, st_size=0, ...}) = 0
> old_mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 
> 0x40015000
> read(3, "1\n", 4096)                    = 2
> close(3)                                = 0
> munmap(0x40015000, 4096)                = 0
> brk(0)                                  = 0x4a000
> brk(0)                                  = 0x4a000
> brk(0x49000)                            = 0x49000
> brk(0)                                  = 0x49000
> fstat64(1, {st_mode=S_IFREG|0644, st_size=1897, ...}) = 0
> old_mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 
> 0x40015000
> getuid32()                              = 1000
> write(1, "Module                  Size  Us"..., 54Module                  Size  Used 
> by    Tainted: P  
> ) = 54
> open("/proc/modules", O_RDONLY)         = 3
> read(3, "sharp_mmcsd_m          25888   1"..., 100) = 100
> write(1, "sharp_mmcsd_m          25888   1"..., 100sharp_mmcsd_m          25888   1
> pxa_bi                 21612   0 (unused)
> net_fd                 25) = 100
> read(3, "824   1\nusbdmonitor             "..., 100) = 90
> write(1, "824   1\nusbdmonitor             "..., 90824   1
> usbdmonitor             5216   0
> usbdcore               34608   0 [pxa_bi net_fd]
> ) = 90
> read(3, "", 100)                        = 0
> close(3)                                = 0
> munmap(0x40015000, 4096)                = 0
> io_submit(0, 0, 0xfbad2088)             = -1 ENOSYS (Function not implemented)
> _exit(0)                                = ?

I wasn't able to reproduce this with an x86 desktop computer. The
Linux kernel in use is 2.4.18-rmk7-pxa3-embedix, the patches to 2.4.18
are required to make it work on the special hardware on this machine
(SHARP Zaurus C7x0).

I ranked the bug as "grave" because rebooting the Zaurus with this
libc6 installed and no working version available in internal flash
memory prevents any kind of communication with the device other than
via the keyboard and screen.
 
  Andras

===========================================================================
Major Andras
    e-mail: [EMAIL PROTECTED]
    www:    http://andras.webhop.org/
===========================================================================

---------------------------------------
Received: (at 219769-close) by bugs.debian.org; 9 Nov 2003 01:08:40 +0000
>From [EMAIL PROTECTED] Sat Nov 08 19:08:39 2003
Return-path: <[EMAIL PROTECTED]>
Received: from auric.debian.org [206.246.226.45] 
        by master.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1AIe4F-0005RT-00; Sat, 08 Nov 2003 19:08:39 -0600
Received: from katie by auric.debian.org with local (Exim 3.35 1 (Debian))
        id 1AIdyZ-0006qL-00; Sat, 08 Nov 2003 20:02:47 -0500
From: Philip Blundell <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.43 $
Subject: Bug#219769: fixed in linux-kernel-headers 2.5.999-test7-bk-9
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Sat, 08 Nov 2003 20:02:47 -0500
Delivered-To: [EMAIL PROTECTED]

Source: linux-kernel-headers
Source-Version: 2.5.999-test7-bk-9

We believe that the bug you reported is fixed in the latest version of
linux-kernel-headers, which is due to be installed in the Debian FTP archive:

linux-kernel-headers_2.5.999-test7-bk-9.diff.gz
  to pool/main/l/linux-kernel-headers/linux-kernel-headers_2.5.999-test7-bk-9.diff.gz
linux-kernel-headers_2.5.999-test7-bk-9.dsc
  to pool/main/l/linux-kernel-headers/linux-kernel-headers_2.5.999-test7-bk-9.dsc
linux-kernel-headers_2.5.999-test7-bk-9_i386.deb
  to pool/main/l/linux-kernel-headers/linux-kernel-headers_2.5.999-test7-bk-9_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Philip Blundell <[EMAIL PROTECTED]> (supplier of updated linux-kernel-headers package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Sun,  9 Nov 2003 00:21:32 +0000
Source: linux-kernel-headers
Binary: linux-kernel-headers
Architecture: source i386
Version: 2.5.999-test7-bk-9
Distribution: unstable
Urgency: low
Maintainer: [EMAIL PROTECTED]
Changed-By: Philip Blundell <[EMAIL PROTECTED]>
Description: 
 linux-kernel-headers - Linux Kernel Headers for development
Closes: 219769
Changes: 
 linux-kernel-headers (2.5.999-test7-bk-9) unstable; urgency=low
 .
   * Phil Blundell <[EMAIL PROTECTED]>
 .
     - debian/patches/arm-query-module.patch: New.  (Closes: #219769)
Files: 
 b3e695d5369a480878a432cf5e0e0702 856 devel standard 
linux-kernel-headers_2.5.999-test7-bk-9.dsc
 05fb2c809e3ba8626dc423324883eaec 48435 devel standard 
linux-kernel-headers_2.5.999-test7-bk-9.diff.gz
 c606f6d1255d34383a57e180c4adb48d 1374356 devel standard 
linux-kernel-headers_2.5.999-test7-bk-9_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.3 (GNU/Linux)

iD8DBQE/rY67VTLPJe9CT30RAkDcAKCMwEhokFJuNuuiMDCKHVFWoAhi/QCeJRkM
31dlG7pRelXj/D7ClmM4NQU=
=UPbv
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to