fakeroot gdb segfaults on mips

Bug #9932 reported by Debian Bug Importer
This bug report is a duplicate of:  Bug #7384: file on mips needs too much memory. Edit Remove
6
Affects Status Importance Assigned to Milestone
glibc (Debian)
Fix Released
Unknown
glibc (Ubuntu)
Invalid
High
Unassigned

Bug Description

Automatically imported from Debian bug report #265678 http://bugs.debian.org/265678

Revision history for this message
Debian Bug Importer (debzilla) wrote :

Message-ID: <email address hidden>
Date: Sat, 14 Aug 2004 14:06:06 +0200
From: Thiemo Seufer <email address hidden>
To: <email address hidden>
Subject: fakeroot gdb segfaults on mips

Package: fakeroot
Version: 1.0.7
Severity: important

Fakeroot appears to be broken on mips for every command depending on
libdl. A simple example:

hattusa:~$ fakeroot gdb
/usr/bin/fakeroot: line 148: 9506 Segmentation fault FAKEROOTKEY=$FAKEROOTKEY LD_LIBRARY_PATH="$PATHS" LD_PRELOAD="$LIB" "$@"

This happens at least with fakeroot versions 1.0.5, 1.0.6 and 1.0.7.

Thiemo

-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing')
Architecture: mips
Kernel: Linux 2.4.26-sb1-swarm-bn
Locale: LANG=C, LC_CTYPE=de_DE@euro

Versions of packages fakeroot depends on:
ii libc6 2.3.2.ds1-16 GNU C Library: Shared libraries an

-- no debconf information

Revision history for this message
Debian Bug Importer (debzilla) wrote :

Message-ID: <email address hidden>
Date: Sat, 14 Aug 2004 11:07:36 -0400
From: Clint Adams <email address hidden>
To: Thiemo Seufer <email address hidden>,
 <email address hidden>
Cc: <email address hidden>, <email address hidden>
Subject: Re: Bug#265678: fakeroot gdb segfaults on mips

> Fakeroot appears to be broken on mips for every command depending on
> libdl. A simple example:

I can reproduce this with gdb, but not with bash or zsh, which are also
both linked against libdl. file also segfaults, though it is not linked
against libdl.

> hattusa:~$ fakeroot gdb
> /usr/bin/fakeroot: line 148: 9506 Segmentation fault FAKEROOTKEY=$FAKEROOTKEY LD_LIBRARY_PATH="$PATHS" LD_PRELOAD="$LIB" "$@"
>
> This happens at least with fakeroot versions 1.0.5, 1.0.6 and 1.0.7.

Both the segfault in gdb and file appear to be in _dl_unload_cache:

#0 0x2aab1564 in _dl_unload_cache () from /lib/ld.so.1
Cannot access memory at address 0x7f7f7fec

Revision history for this message
Debian Bug Importer (debzilla) wrote :

Message-ID: <email address hidden>
Date: Sat, 14 Aug 2004 20:13:10 +0200
From: Thiemo Seufer <email address hidden>
To: Clint Adams <email address hidden>
Cc: <email address hidden>, <email address hidden>, <email address hidden>
Subject: Re: Bug#265678: fakeroot gdb segfaults on mips

Clint Adams wrote:
> > Fakeroot appears to be broken on mips for every command depending on
> > libdl. A simple example:
>
> I can reproduce this with gdb, but not with bash or zsh, which are also
> both linked against libdl. file also segfaults, though it is not linked
> against libdl.

The program where I noticed the problem was gconftool-2. I tried to
debug it with gdb...

I can confirm "fakeroot bash" works here as well.

> > hattusa:~$ fakeroot gdb
> > /usr/bin/fakeroot: line 148: 9506 Segmentation fault FAKEROOTKEY=$FAKEROOTKEY LD_LIBRARY_PATH="$PATHS" LD_PRELOAD="$LIB" "$@"
> >
> > This happens at least with fakeroot versions 1.0.5, 1.0.6 and 1.0.7.
>
> Both the segfault in gdb and file appear to be in _dl_unload_cache:
>
> #0 0x2aab1564 in _dl_unload_cache () from /lib/ld.so.1
> Cannot access memory at address 0x7f7f7fec

So it appears to be a libc problem.

Thiemo

Revision history for this message
Debian Bug Importer (debzilla) wrote :

Message-ID: <email address hidden>
Date: Sat, 14 Aug 2004 19:18:18 +0100
From: Martin Michlmayr <email address hidden>
To: Thiemo Seufer <email address hidden>
Cc: Clint Adams <email address hidden>, <email address hidden>,
 <email address hidden>
Subject: Re: Bug#265678: fakeroot gdb segfaults on mips

Just for reference, this was also reported as #264920
--
Martin Michlmayr
<email address hidden>

Revision history for this message
Debian Bug Importer (debzilla) wrote :

Message-ID: <email address hidden>
Date: Sat, 14 Aug 2004 22:21:32 +0200
From: Thiemo Seufer <email address hidden>
To: Clint Adams <email address hidden>
Cc: <email address hidden>, <email address hidden>, <email address hidden>
Subject: Re: Bug#265678: fakeroot gdb segfaults on mips

Thiemo Seufer wrote:
> Clint Adams wrote:
> > > Fakeroot appears to be broken on mips for every command depending on
> > > libdl. A simple example:
> >
> > I can reproduce this with gdb, but not with bash or zsh, which are also
> > both linked against libdl. file also segfaults, though it is not linked
> > against libdl.
>
> The program where I noticed the problem was gconftool-2. I tried to
> debug it with gdb...
>
> I can confirm "fakeroot bash" works here as well.

file, however, does not segfault here but uses up to 1.4 GB per call.
This slowes compilations down quite a bit. :-)

Thiemo

Revision history for this message
Debian Bug Importer (debzilla) wrote :

Message-ID: <email address hidden>
Date: Mon, 20 Sep 2004 08:02:23 +0200
From: Matthias Klose <email address hidden>
To: <email address hidden>
Cc: Thiemo Seufer <email address hidden>, <email address hidden>
Subject: fakeroot ranlib segfaults on mips

ranlib started segfaulting the same way. it does work in sarge.
Seen in the doko-sid chroot on solitude.

Revision history for this message
Debian Bug Importer (debzilla) wrote :

Message-ID: <email address hidden>
Date: Tue, 5 Oct 2004 11:08:35 -0400
From: Clint Adams <email address hidden>
To: <email address hidden>
Subject: mips fun

reassign 265678 libc6
quit

Since I continue to think that this is libdl's fault, I'm reassigning to
libc6.

Revision history for this message
Debian Bug Importer (debzilla) wrote :

Message-ID: <email address hidden>
Date: Wed, 06 Oct 2004 13:04:19 +0900
From: GOTO Masanori <email address hidden>
To: Clint Adams <email address hidden>, <email address hidden>
Subject: Re: Processed: mips fun

At Tue, 05 Oct 2004 08:18:15 -0700,
Debian Bug Tracking System wrote:
> > reassign 265678 libc6
> Bug#265678: fakeroot gdb segfaults on mips
> Bug reassigned from package `fakeroot' to `libc6'.

You have to show us the concrete example why it's libc6 problem.

Regards,
-- gotom

Revision history for this message
Debian Bug Importer (debzilla) wrote :

Message-ID: <email address hidden>
Date: Thu, 7 Oct 2004 19:15:51 +0100
From: Martin Michlmayr <email address hidden>
To: <email address hidden>
Subject: same bugs

reassign 264920 libc6
merge 264920 265678
--
Martin Michlmayr
http://www.cyrius.com/

Revision history for this message
Debian Bug Importer (debzilla) wrote :

Message-ID: <email address hidden>
Date: Mon, 11 Oct 2004 21:40:31 +0200
From: Thiemo Seufer <email address hidden>
To: <email address hidden>
Subject: More Info about this bug

The problem is caused by dlsym() returning the lazy binding stub of
the next library instead of the actual implementation. Example:

/usr/bin/file
/usr/lib/libfakeroot/libfakeroot.so.0
/usr/lib/libmagic.so.1
/usr/lib/libz.so.1
/lib/libc.so.6
/lib/ld.so.1

__xstat64 (in libc) is called from both file and libmagic, and
libfakeroot tries to wrap it. With the current behaviour, the wrapper
function in libfakeroot resolves to the lazy binding stub in libmagic
instead of the __xstat64 implementation in libc.

The stub in libmagic is marked as undefined:

    95: 0000dee0 0 FUNC GLOBAL DEFAULT UND __xstat64@GLIBC_2.2 (3)

Thiemo

Revision history for this message
Debian Bug Importer (debzilla) wrote :

Message-Id: <1099648673.3654.430.camel@thanatos>
Date: Fri, 05 Nov 2004 10:57:54 +0100
From: Thomas Hood <email address hidden>
To: <email address hidden>
Subject: severity serious

severity 265678 serious
thanks

This results in fakeroot being FTBFS on mips and mipsel (#279240).

--
Thomas Hood

Revision history for this message
Debian Bug Importer (debzilla) wrote :

Marking as duplicate based on debbugs merge (264920,265678)

This bug has been marked as a duplicate of bug 7384.

Revision history for this message
Daniel Stone (daniels) wrote :

We don't do mips.

Revision history for this message
Debian Bug Importer (debzilla) wrote :

Message-ID: <email address hidden>
Date: Sat, 06 Nov 2004 08:10:49 +0900
From: GOTO Masanori <email address hidden>
To: Thomas Hood <email address hidden>, <email address hidden>,
 <email address hidden>
Subject: Re: Bug#265678: severity serious

control 265678 important
thanks

Again, show us the example. Patch is welcome.

-- gotom

Revision history for this message
Debian Bug Importer (debzilla) wrote :

Message-ID: <email address hidden>
Date: Sat, 06 Nov 2004 18:22:19 +0900
From: GOTO Masanori <email address hidden>
To: <email address hidden>

severity 265678 important
thanks

Revision history for this message
Debian Bug Importer (debzilla) wrote :

Message-Id: <email address hidden>
Date: Sun, 07 Nov 2004 18:53:24 +0900
From: Kenshi Muto <email address hidden>
To: <email address hidden>, <email address hidden>
Subject: fakeroot doesn't build on mips and mipsel

Hi,

I tried to reproduce a problem, then Masanori Goto and I find
(temporary) solution.

<Temporary solution>
Add "#undef RTLD_NEXT" to libfakeroot.c when architecture is mips/mipsel.
</Temporary solution>

Problem will be solved.

fakeroot on sarge works, but one on sid won't work. At least about
'mv' command, newest libacl makes RTLD_NEXT confusing.

Masanori assumes this is complex problem of toolchain and libc/dlsym
on mips/mipsel. He said more about this problem, but I couldn't
understand in detail and translate it in English. Could you describe
more detail, gotom? :-)

Thanks,
--
Kenshi Muto
<email address hidden>

Revision history for this message
Debian Bug Importer (debzilla) wrote :

Message-ID: <email address hidden>
Date: Tue, 16 Nov 2004 00:55:05 +0900
From: GOTO Masanori <email address hidden>
To: Kenshi Muto <email address hidden>, <email address hidden>,
 Steve Langasek <email address hidden>, Clint Adams <email address hidden>, Adrian Bunk <email address hidden>
Cc: <email address hidden>, Thiemo Seufer <email address hidden>, <email address hidden>,
 <email address hidden>, Thomas Hood <email address hidden>
Subject: Re: Bug#279240: fakeroot doesn't build on mips and mipsel

Hi,

At Sun, 07 Nov 2004 18:53:24 +0900,
Kenshi Muto wrote:
> I tried to reproduce a problem, then Masanori Goto and I find
> (temporary) solution.

Recently I got the root access to mips/mipsel machine (Thanks to
Mutsumi Ishikawa and Kenshi Muto), and checked this problem.

> <Temporary solution>
> Add "#undef RTLD_NEXT" to libfakeroot.c when architecture is mips/mipsel.
> </Temporary solution>
>
> Problem will be solved.

Yes, I confirmed the following (workaround) patch fixed the problem on
mipsel (I didn't test it on mips):

--- ../../fakeroot-1.1.5/libfakeroot.c 2004-10-08 00:56:04.000000000 +0900
+++ libfakeroot.c 2004-11-06 22:11:38.000000000 +0900
@@ -73,7 +73,7 @@
 };

 void *get_libc(){
-
+#undef RTLD_NEXT
 #ifndef RTLD_NEXT
  void *lib=0;
  if(!lib){

It disables to use RTLD_NEXT (== -1).

It seems when we use RTLD_NEXT, the next line returns the invalid
address which is not in the glibc scope (and interestingly it's
libacl1 scope):

       *(next_wrap[i].doit)=dlsym(get_libc(), next_wrap[i].name);

> fakeroot on sarge works, but one on sid won't work. At least about
> 'mv' command, newest libacl makes RTLD_NEXT confusing.

"mv" command depends on the following libraries:

        libacl.so.1 => /lib/libacl.so.1 (0x2ab04000)
        libc.so.6 => /lib/libc.so.6 (0x2ab4c000)
        libattr.so.1 => /lib/libattr.so.1 (0x2ad18000)
        /lib/ld.so.1 => /lib/ld.so.1 (0x2aaa8000)

Moreover, when we use libacl1 (2.2.23-1), fakeroot without RTLD_NEXT
hack works well. However when we use the recent libacl1 (2.2.26-1),
fakeroot does not work and RTLD_NEXT hack is needed.

Thiemo was also spotted this problem:

> The problem is caused by dlsym() returning the lazy binding stub of
> the next library instead of the actual implementation. Example:
>
> /usr/bin/file
> /usr/lib/libfakeroot/libfakeroot.so.0
> /usr/lib/libmagic.so.1
> /usr/lib/libz.so.1
> /lib/libc.so.6
> /lib/ld.so.1
>
> __xstat64 (in libc) is called from both file and libmagic, and
> libfakeroot tries to wrap it. With the current behaviour, the wrapper
> function in libfakeroot resolves to the lazy binding stub in libmagic
> instead of the __xstat64 implementation in libc.
>
> The stub in libmagic is marked as undefined:
>
> 95: 0000dee0 0 FUNC GLOBAL DEFAULT UND __xstat64@GLIBC_2.2 (3)

I guess the lazy binding + RTLD_NEXT is broken with the recent
libraries which are compiled by the recent binutils 2.15 or the recent
gcc 3.3. I guess it's binutils and glibc dl related problem, but I
still don't know what the actual problem is.

Regards,
-- gotom

Revision history for this message
Debian Bug Importer (debzilla) wrote :
Download full text (4.8 KiB)

Message-ID: <email address hidden>
Date: Wed, 13 Apr 2005 03:17:02 +0200
From: Thiemo Seufer <email address hidden>
To: <email address hidden>
Subject: Fix/Workaround for broken symbol resolving on mips/mipsel

tags 265678 +patch
thanks

ld.so for mips/mipsel resolves symbols to the lazy evaluation stub of
in between libraries. The stubs aren't marked by anything beyond the
section information, but their symbols are SHN_UNDEF.

The appended patch works around this by ignoring SHN_UNDEF symbols in
the resolver lookup function. It may break copy relocations on other
architectures, so it should be mips specific. It also includes a
INTUSE cleanup which is unrelated to this bug.

I built and installed the resulting libc on several mips machines,
fakeroot works, no ill effects observed so far.

Thiemo

#! /bin/sh -e

# All lines beginning with `# DP:' are a description of the patch.
# DP: Description: Workaround invalid resolving of lazy evaluation stubs
# DP: Author: Thiemo Seufer <email address hidden>
# DP: Date: 2005-04-11

if [ $# -ne 2 ]; then
    echo >&2 "`basename $0`: script expects -patch|-unpatch as argument"
    exit 1
fi
case "$1" in
    -patch) patch -d "$2" -f --no-backup-if-mismatch -p2 < $0;;
    -unpatch) patch -d "$2" -f --no-backup-if-mismatch -R -p2 < $0;;
    *)
 echo >&2 "`basename $0`: script expects -patch|-unpatch as argument"
 exit 1
esac
exit 0

# append the patch here and adjust the -p? flag in the patch calls.
diff -upr build-tree.orig/glibc-2.3.2/elf/do-lookup.h build-tree/glibc-2.3.2/elf/do-lookup.h
--- build-tree.orig/glibc-2.3.2/elf/do-lookup.h 2005-02-28 23:42:31.000000000 +0100
+++ build-tree/glibc-2.3.2/elf/do-lookup.h 2005-04-11 18:19:20.000000000 +0200
@@ -209,6 +209,11 @@ FCT (const char *undef_name, unsigned lo
   }
        /* FALLTHROUGH */
      case STB_GLOBAL:
+ /* HACK: MIPS marks its lazy evaluation stubs with SHN_UNDEF
+ symbols, we skip them. */
+ if (sym->st_shndx == SHN_UNDEF)
+ break;
+
        /* Global definition. Just what we need. */
        result->s = sym;
        result->m = map;
diff -upr build-tree.orig/glibc-2.3.2/sysdeps/mips/dl-machine.h build-tree/glibc-2.3.2/sysdeps/mips/dl-machine.h
--- build-tree.orig/glibc-2.3.2/sysdeps/mips/dl-machine.h 2005-02-28 23:42:36.000000000 +0100
+++ build-tree/glibc-2.3.2/sysdeps/mips/dl-machine.h 2005-04-10 22:39:15.000000000 +0200
@@ -347,5 +347,6 @@ __dl_runtime_resolve (ElfW(Word) sym_ind
   const ElfW(Word) gotsym \
     = (const ElfW(Word)) l->l_info[DT_MIPS (GOTSYM)]->d_un.d_val; \
   const ElfW(Sym) *sym = &symtab[sym_index]; \
+ lookup_t result; \
   ElfW(Addr) value; \
                \
@@ -363,30 +364,37 @@ __dl_runtime_resolve (ElfW(Word) sym_ind
                \
      if (version->hash != 0) \
        { \
- value = _dl_lookup_versioned_symbol(strtab + sym->st_name, l, \
- &sym, l->l_scope, version,\
- ELF_RTYPE_CLASS_PLT, 0); \
+ result = INTUSE(_dl_lookup_versioned_symbol) (strtab \
+ + sym->st_name, \
+ l, &sym, \
+ l->l_scope, \
+ version, \
+ ...

Read more...

Revision history for this message
Debian Bug Importer (debzilla) wrote :
Download full text (4.4 KiB)

Message-ID: <email address hidden>
Date: Thu, 14 Apr 2005 19:54:43 +0200
From: Thiemo Seufer <email address hidden>
To: <email address hidden>
Subject: Re: Bug#265678: Info received (was Fix/Workaround for broken symbol resolving on
 mips/mipsel)

Hello,

this is an updated patch which adds the SHN_UNDEF workaround only for
mips/mipsel.

Thiemo

#! /bin/sh -e

# All lines beginning with `# DP:' are a description of the patch.
# DP: Description: Workaround invalid resolving of lazy evaluation stubs
# DP: Author: Thiemo Seufer <email address hidden>
# DP: Date: 2005-04-11

if [ $# -ne 2 ]; then
    echo >&2 "`basename $0`: script expects -patch|-unpatch as argument"
    exit 1
fi
case "$1" in
    -patch) patch -d "$2" -f --no-backup-if-mismatch -p2 < $0;;
    -unpatch) patch -d "$2" -f --no-backup-if-mismatch -R -p2 < $0;;
    *)
 echo >&2 "`basename $0`: script expects -patch|-unpatch as argument"
 exit 1
esac
exit 0

# append the patch here and adjust the -p? flag in the patch calls.
diff -upr build-tree.orig/glibc-2.3.2/elf/do-lookup.h build-tree/glibc-2.3.2/elf/do-lookup.h
--- build-tree.orig/glibc-2.3.2/elf/do-lookup.h 2005-02-28 23:42:31.000000000 +0100
+++ build-tree/glibc-2.3.2/elf/do-lookup.h 2005-04-11 18:19:20.000000000 +0200
@@ -209,6 +209,13 @@ FCT (const char *undef_name, unsigned lo
   }
        /* FALLTHROUGH */
      case STB_GLOBAL:
+#ifdef __mips__
+ /* HACK: MIPS marks its lazy evaluation stubs with SHN_UNDEF
+ symbols, we skip them. */
+ if (sym->st_shndx == SHN_UNDEF)
+ break;
+#endif
+
        /* Global definition. Just what we need. */
        result->s = sym;
        result->m = map;
diff -upr build-tree.orig/glibc-2.3.2/sysdeps/mips/dl-machine.h build-tree/glibc-2.3.2/sysdeps/mips/dl-machine.h
--- build-tree.orig/glibc-2.3.2/sysdeps/mips/dl-machine.h 2005-02-28 23:42:36.000000000 +0100
+++ build-tree/glibc-2.3.2/sysdeps/mips/dl-machine.h 2005-04-10 22:39:15.000000000 +0200
@@ -347,5 +347,6 @@ __dl_runtime_resolve (ElfW(Word) sym_ind
   const ElfW(Word) gotsym \
     = (const ElfW(Word)) l->l_info[DT_MIPS (GOTSYM)]->d_un.d_val; \
   const ElfW(Sym) *sym = &symtab[sym_index]; \
+ lookup_t result; \
   ElfW(Addr) value; \
                \
@@ -363,30 +364,37 @@ __dl_runtime_resolve (ElfW(Word) sym_ind
                \
      if (version->hash != 0) \
        { \
- value = _dl_lookup_versioned_symbol(strtab + sym->st_name, l, \
- &sym, l->l_scope, version,\
- ELF_RTYPE_CLASS_PLT, 0); \
+ result = INTUSE(_dl_lookup_versioned_symbol) (strtab \
+ + sym->st_name, \
+ l, &sym, \
+ l->l_scope, \
+ version, \
+ ELF_RTYPE_CLASS_PLT,\
+ 0);\
   break; \
        } \
      /* Fall through. */ \
    } \
  case 0: \
- value = _dl_lookup_symbol (strtab + sym->st_name, l, &sym, \
- l->l_scope, ELF_RTYPE_CLASS_PLT, \
- DL_LOOKUP_ADD_DEPENDENCY); \
+ result = INTUSE(_dl_lookup_symbol) (strtab + sym->st_name, l, &sym, \
+ ...

Read more...

Revision history for this message
Debian Bug Importer (debzilla) wrote :

Message-ID: <email address hidden>
Date: Sat, 16 Apr 2005 17:52:13 +0900
From: GOTO Masanori <email address hidden>
To: Thiemo Seufer <email address hidden>, <email address hidden>
Subject: Re: Bug#265678: Info received (was Fix/Workaround for broken symbol resolving on
 mips/mipsel)

At Thu, 14 Apr 2005 19:54:43 +0200,
Thiemo Seufer wrote:
> this is an updated patch which adds the SHN_UNDEF workaround only for
> mips/mipsel.

Thanks for your patch, I put it in -21. I tested some applications
with your workaround patch on mips, but it does not cause any
problems, too. Fakeroot problem should be fixed now. I hope this
issue will be correctly fixed with appropriate toolchain support in
etch, I will help you.

Regards,
-- gotom

Revision history for this message
Debian Bug Importer (debzilla) wrote :
Download full text (7.7 KiB)

Message-Id: <email address hidden>
Date: Sat, 16 Apr 2005 09:17:24 -0400
From: GOTO Masanori <email address hidden>
To: <email address hidden>
Subject: Bug#264920: fixed in glibc 2.3.2.ds1-21

Source: glibc
Source-Version: 2.3.2.ds1-21

We believe that the bug you reported is fixed in the latest version of
glibc, which is due to be installed in the Debian FTP archive:

glibc-doc_2.3.2.ds1-21_all.deb
  to pool/main/g/glibc/glibc-doc_2.3.2.ds1-21_all.deb
glibc_2.3.2.ds1-21.diff.gz
  to pool/main/g/glibc/glibc_2.3.2.ds1-21.diff.gz
glibc_2.3.2.ds1-21.dsc
  to pool/main/g/glibc/glibc_2.3.2.ds1-21.dsc
libc6-dbg_2.3.2.ds1-21_i386.deb
  to pool/main/g/glibc/libc6-dbg_2.3.2.ds1-21_i386.deb
libc6-dev_2.3.2.ds1-21_i386.deb
  to pool/main/g/glibc/libc6-dev_2.3.2.ds1-21_i386.deb
libc6-i686_2.3.2.ds1-21_i386.deb
  to pool/main/g/glibc/libc6-i686_2.3.2.ds1-21_i386.deb
libc6-pic_2.3.2.ds1-21_i386.deb
  to pool/main/g/glibc/libc6-pic_2.3.2.ds1-21_i386.deb
libc6-prof_2.3.2.ds1-21_i386.deb
  to pool/main/g/glibc/libc6-prof_2.3.2.ds1-21_i386.deb
libc6-udeb_2.3.2.ds1-21_i386.udeb
  to pool/main/g/glibc/libc6-udeb_2.3.2.ds1-21_i386.udeb
libc6_2.3.2.ds1-21_i386.deb
  to pool/main/g/glibc/libc6_2.3.2.ds1-21_i386.deb
libnss-dns-udeb_2.3.2.ds1-21_i386.udeb
  to pool/main/g/glibc/libnss-dns-udeb_2.3.2.ds1-21_i386.udeb
libnss-files-udeb_2.3.2.ds1-21_i386.udeb
  to pool/main/g/glibc/libnss-files-udeb_2.3.2.ds1-21_i386.udeb
locales_2.3.2.ds1-21_all.deb
  to pool/main/g/glibc/locales_2.3.2.ds1-21_all.deb
nscd_2.3.2.ds1-21_i386.deb
  to pool/main/g/glibc/nscd_2.3.2.ds1-21_i386.deb

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to <email address hidden>,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
GOTO Masanori <email address hidden> (supplier of updated glibc package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing <email address hidden>)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Mon, 14 Feb 2005 09:26:26 +0900
Source: glibc
Binary: libc6-i686 libc0.3-pic glibc-doc libc1-udeb libc0.3 libc6.1-dev libc1-pic libc6-s390x libnss-files-udeb libc1-dbg libc6-dev-sparc64 libc0.3-dev libc6-udeb libc6-dbg libc6.1-pic libc6-dev libc0.3-prof libc6-sparcv9 libc6.1-prof libc1 locales libc6-pic libc0.3-udeb libc1-prof libc0.3-dbg libc6-prof libc6 libc6-sparcv9b libc6.1-udeb libc6.1-dbg nscd libc6-sparc64 libnss-dns-udeb libc6.1 libc1-dev libc6-dev-s390x
Architecture: source i386 all
Version: 2.3.2.ds1-21
Distribution: unstable
Urgency: high
Maintainer: GOTO Masanori <email address hidden>
Changed-By: GOTO Masanori <email address hidden>
Description:
 glibc-doc - GNU C Library: Documentation
 libc6 - GNU C Library: Shared libraries and Timezone data
 libc6-dbg - GNU C Library: Libraries with debugging symbols
 libc6-dev - GNU C Library: Development Libraries and Header Files
 libc6-i686 - GNU C Library: Shared libraries [i686 optimized]...

Read more...

Revision history for this message
Debian Bug Importer (debzilla) wrote :
Download full text (7.7 KiB)

Message-Id: <email address hidden>
Date: Sat, 16 Apr 2005 09:17:24 -0400
From: GOTO Masanori <email address hidden>
To: <email address hidden>
Subject: Bug#265678: fixed in glibc 2.3.2.ds1-21

Source: glibc
Source-Version: 2.3.2.ds1-21

We believe that the bug you reported is fixed in the latest version of
glibc, which is due to be installed in the Debian FTP archive:

glibc-doc_2.3.2.ds1-21_all.deb
  to pool/main/g/glibc/glibc-doc_2.3.2.ds1-21_all.deb
glibc_2.3.2.ds1-21.diff.gz
  to pool/main/g/glibc/glibc_2.3.2.ds1-21.diff.gz
glibc_2.3.2.ds1-21.dsc
  to pool/main/g/glibc/glibc_2.3.2.ds1-21.dsc
libc6-dbg_2.3.2.ds1-21_i386.deb
  to pool/main/g/glibc/libc6-dbg_2.3.2.ds1-21_i386.deb
libc6-dev_2.3.2.ds1-21_i386.deb
  to pool/main/g/glibc/libc6-dev_2.3.2.ds1-21_i386.deb
libc6-i686_2.3.2.ds1-21_i386.deb
  to pool/main/g/glibc/libc6-i686_2.3.2.ds1-21_i386.deb
libc6-pic_2.3.2.ds1-21_i386.deb
  to pool/main/g/glibc/libc6-pic_2.3.2.ds1-21_i386.deb
libc6-prof_2.3.2.ds1-21_i386.deb
  to pool/main/g/glibc/libc6-prof_2.3.2.ds1-21_i386.deb
libc6-udeb_2.3.2.ds1-21_i386.udeb
  to pool/main/g/glibc/libc6-udeb_2.3.2.ds1-21_i386.udeb
libc6_2.3.2.ds1-21_i386.deb
  to pool/main/g/glibc/libc6_2.3.2.ds1-21_i386.deb
libnss-dns-udeb_2.3.2.ds1-21_i386.udeb
  to pool/main/g/glibc/libnss-dns-udeb_2.3.2.ds1-21_i386.udeb
libnss-files-udeb_2.3.2.ds1-21_i386.udeb
  to pool/main/g/glibc/libnss-files-udeb_2.3.2.ds1-21_i386.udeb
locales_2.3.2.ds1-21_all.deb
  to pool/main/g/glibc/locales_2.3.2.ds1-21_all.deb
nscd_2.3.2.ds1-21_i386.deb
  to pool/main/g/glibc/nscd_2.3.2.ds1-21_i386.deb

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to <email address hidden>,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
GOTO Masanori <email address hidden> (supplier of updated glibc package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing <email address hidden>)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Mon, 14 Feb 2005 09:26:26 +0900
Source: glibc
Binary: libc6-i686 libc0.3-pic glibc-doc libc1-udeb libc0.3 libc6.1-dev libc1-pic libc6-s390x libnss-files-udeb libc1-dbg libc6-dev-sparc64 libc0.3-dev libc6-udeb libc6-dbg libc6.1-pic libc6-dev libc0.3-prof libc6-sparcv9 libc6.1-prof libc1 locales libc6-pic libc0.3-udeb libc1-prof libc0.3-dbg libc6-prof libc6 libc6-sparcv9b libc6.1-udeb libc6.1-dbg nscd libc6-sparc64 libnss-dns-udeb libc6.1 libc1-dev libc6-dev-s390x
Architecture: source i386 all
Version: 2.3.2.ds1-21
Distribution: unstable
Urgency: high
Maintainer: GOTO Masanori <email address hidden>
Changed-By: GOTO Masanori <email address hidden>
Description:
 glibc-doc - GNU C Library: Documentation
 libc6 - GNU C Library: Shared libraries and Timezone data
 libc6-dbg - GNU C Library: Libraries with debugging symbols
 libc6-dev - GNU C Library: Development Libraries and Header Files
 libc6-i686 - GNU C Library: Shared libraries [i686 optimized]...

Read more...

Changed in glibc:
status: Unknown → Fix Released
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.