[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#329354: marked as done (kernel-source-2.4.27: Patch 143_outs.diff.bz2 breaks compilation on x86_64.)



Your message dated Thu, 15 Dec 2005 01:47:15 -0800
with message-id <E1Emphj-0003gZ-W6@spohr.debian.org>
and subject line Bug#329354: fixed in kernel-source-2.4.27 2.4.27-12
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 21 Sep 2005 10:31:53 +0000
>From ntarmos@ceid.upatras.gr Wed Sep 21 03:31:53 2005
Return-path: <ntarmos@ceid.upatras.gr>
Received: from master.debian.org [146.82.138.7] 
	by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
	id 1EI1tJ-0007g1-00; Wed, 21 Sep 2005 03:31:53 -0700
Received: from (Atlas.itei.gr) [150.140.143.228] 
	by master.debian.org with esmtp (Exim 3.35 1 (Debian))
	id 1EI1tH-0006Yy-00; Wed, 21 Sep 2005 05:31:51 -0500
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Nikos Ntarmos <ntarmos@ceid.upatras.gr>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: kernel-source-2.4.27: Patch 143_outs.diff.bz2 breaks compilation on x86_64.
X-Mailer: reportbug 3.8
Date: Wed, 21 Sep 2005 13:31:37 +0300
X-Debbugs-Cc: ntarmos@ceid.upatras.gr
Message-Id: <E1EI1tH-0006Yy-00@master.debian.org>
Delivered-To: submit@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-9.0 required=4.0 tests=BAYES_00,HAS_PACKAGE,
	OUR_MTA_MSGID,X_DEBBUGS_CC autolearn=ham 
	version=2.60-bugs.debian.org_2005_01_02

Package: kernel-source-2.4.27
Version: 2.4.27-11.hls.2005082200
Severity: important
Justification: fails to build from source

Patch 143_outs.diff.bz2 breaks the kernel compilation on x86_64. The
problem is that it uses the IO_BITMAP_BYTES macro which is defined for
i386 (in linux/include/asm-i386/processor.h) but not for x86_64.
Reverting the patch lets the kernel build again, although I guess the
correct solution would be to add an appropriate IO_BITMAP_BYTES to
linux/include/asm-x86_64/processor.h as well.

-- System Information:
Debian Release: 3.1
Architecture: amd64 (x86_64)
Kernel: Linux 2.6.13-rc7
Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1)

Versions of packages kernel-source-2.4.27 depends on:
ii  binutils                      2.15-6     The GNU assembler, linker and bina
ii  bzip2                         1.0.2-7    high-quality block-sorting file co
ii  coreutils [fileutils]         5.2.1-2    The GNU core utilities

-- no debconf information

---------------------------------------
Received: (at 329354-close) by bugs.debian.org; 15 Dec 2005 09:51:20 +0000
>From katie@ftp-master.debian.org Thu Dec 15 01:51:20 2005
Return-path: <katie@ftp-master.debian.org>
Received: from katie by spohr.debian.org with local (Exim 4.50)
	id 1Emphj-0003gZ-W6; Thu, 15 Dec 2005 01:47:15 -0800
From: Simon Horman <horms@verge.net.au>
To: 329354-close@bugs.debian.org
X-Katie: $Revision: 1.60 $
Subject: Bug#329354: fixed in kernel-source-2.4.27 2.4.27-12
Message-Id: <E1Emphj-0003gZ-W6@spohr.debian.org>
Sender: Archive Administrator <katie@ftp-master.debian.org>
Date: Thu, 15 Dec 2005 01:47:15 -0800
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
	autolearn=no version=2.60-bugs.debian.org_2005_01_02

Source: kernel-source-2.4.27
Source-Version: 2.4.27-12

We believe that the bug you reported is fixed in the latest version of
kernel-source-2.4.27, which is due to be installed in the Debian FTP archive:

kernel-doc-2.4.27_2.4.27-12_all.deb
  to pool/main/k/kernel-source-2.4.27/kernel-doc-2.4.27_2.4.27-12_all.deb
kernel-patch-debian-2.4.27_2.4.27-12_all.deb
  to pool/main/k/kernel-source-2.4.27/kernel-patch-debian-2.4.27_2.4.27-12_all.deb
kernel-source-2.4.27_2.4.27-12.diff.gz
  to pool/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-12.diff.gz
kernel-source-2.4.27_2.4.27-12.dsc
  to pool/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-12.dsc
kernel-source-2.4.27_2.4.27-12_all.deb
  to pool/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-12_all.deb
kernel-tree-2.4.27_2.4.27-12_all.deb
  to pool/main/k/kernel-source-2.4.27/kernel-tree-2.4.27_2.4.27-12_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 329354@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Simon Horman <horms@verge.net.au> (supplier of updated kernel-source-2.4.27 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Wed, 30 Nov 2005 20:56:54 +0900
Source: kernel-source-2.4.27
Binary: kernel-tree-2.4.27 kernel-source-2.4.27 kernel-patch-debian-2.4.27 kernel-doc-2.4.27
Architecture: source all
Version: 2.4.27-12
Distribution: unstable
Urgency: low
Maintainer: Debian Kernel Team <debian-kernel@lists.debian.org>
Changed-By: Simon Horman <horms@verge.net.au>
Description: 
 kernel-doc-2.4.27 - Linux kernel specific documentation for version 2.4.27
 kernel-patch-debian-2.4.27 - Debian patches to Linux 2.4.27
 kernel-source-2.4.27 - Linux kernel source for version 2.4.27 with Debian patches
 kernel-tree-2.4.27 - Linux kernel source tree for building Debian kernel images
Closes: 252187 255406 324591 325871 328707 329354
Changes: 
 kernel-source-2.4.27 (2.4.27-12) unstable; urgency=low
 .
   [ Simon Horman ]
   * 184_arch-x86_64-ia32-ptrace32-oops.diff
     [Security, x86_64] 32 bit ltrace oops when tracing 64 bit executable
     http://lkml.org/lkml/2005/1/5/245
     http://linux.bkbits.net:8080/linux-2.4/cset@41dd3455GwQPufrGvBJjcUOXQa3WXA
     See CAN-2005-2553
 .
   * 185_net-sockglue-cap.diff
     [Security] Restrict socket policy loading to CAP_NET_ADMIN.
     From 2.6.12.6
     See CAN-2005-2555.
 .
   * control
     Add build dependancy on gcc-3.3 (closes: #324591)
 .
   * There was a bit of a screw up in 2.4.27-11 (by me)
     as 183_zisofs.diff was actually a copy of 182_linux-zlib-fixes.diff,
     and due to a quirk in the apply scripts, basically caused
     the zlib 182_linux-zlib-fixes.diff fixes to be reversed,
     and thus neither patch was applied. 186_linux-zlib-fixes-2.diff
     and 187_zisofs-2.diff resolve this problem. More information below.
     (closes: #325871)
 .
   * 186_linux-zlib-fixes-2.diff
     [Security] Fix security bugs in the Linux zlib implementations.
     See CAN-2005-2458, CAN-2005-2459
     From 2.6.12.5 and 2.6.12.6
     http://sources.redhat.com/ml/bug-gnu-utils/1999-06/msg00183.html
     http://bugs.gentoo.org/show_bug.cgi?id=94584
 .
   * 187_zisofs-2.diff
     [Security] Check input buffer size in zisofs
     From 2.6.12.5
     See CAN-2005-2457.
     What 183_zisofs.diff (incorectly annotated as zisofs.dpatch)
     should have been.
 .
   * 188_fix-dst-leak-in-icmp_push_reply.diff
     [Maybe-Security: Can remote traffic trigger this]
     Fix DST leak in icmp_push_reply()
     From 2.6.12.6
 .
   * 189_ipv6-skb-leak.diff
      [Maybe-Security: Seems like a local DoS]
      Fix SKB leak in ip6_input_finish()
      From 2.6.12.6
 .
   * 180_fs-isofs-ignored-parameters.diff
     isofs ignores any mount parameters after iocharset, map or session.
     http://lists.debian.org/debian-kernel/2005/08/msg00581.html
 .
   * 178_fs_ext2_ext3_xattr-sharing.diff
     Included in 2.4.27-11 is CAN-2005-2801
 .
   * 179_net-ipv4-netfilter-ip_recent-last_pkts.diff
     Included in 2.4.27-11 is CAN-2005-2872
 .
   * 190_outs-2.diff (removed 143_outs.diff):
     [SECURITY]: AMD64, allows local users to write to privileged
     IO ports via OUTS instruction
     See CAN-2005-0204
     143_outs.diff, included in 2.4.27-11 breaks the
     build as IO_BITMAP_BYTES is not defined. 190_outs-2.diff
     should resolve this problem by defining IO_BITMAP_BYTES
     (closes: #329354)
 .
   * 191_build_foo.diff
     Fix build problems that appear to be caused by recent binutils changes
     (closes: #328707)
 .
   * 192_orinoco-info-leak.diff
     [SECURITY] orinoco: Information leakage due to incorrect padding
     See CAN-2005-3180
     From 2.6.13.4
 .
   * 194_xfs-inode-race.diff
     [SECURITY] XFS: Handle inode creation race
     CAN-NOMATCH
     Links in Patch file
 .
   * 195_net-ipv6-udp_v6_get_port-loop.diff
      [SECURITY] Fix infinite loop in udp_v6_get_port().  See CVE-2005-2973
 .
   * 196_net-bridge-if_del-panic.diff
      Fix panic when non-existant bridge is deleted
      (closes: #255406)
 .
   *  197_net-plip-invalid-ioctl.diff
      Detect invalid ioctls in plip driver
      (closes: #252187)
Files: 
 2c22e5f1e9568bd5e56de47220457b75 897 devel optional kernel-source-2.4.27_2.4.27-12.dsc
 250fa245ac2ae613f9f93469ff6414a7 711050 devel optional kernel-source-2.4.27_2.4.27-12.diff.gz
 d58b7bb162c53ec6aae211d325086b0b 667962 devel optional kernel-patch-debian-2.4.27_2.4.27-12_all.deb
 05c75067afdd26136479d447c8fbd53e 2378488 doc optional kernel-doc-2.4.27_2.4.27-12_all.deb
 9f4d67baf6a6a93d2851da081734ae3d 31038516 devel optional kernel-source-2.4.27_2.4.27-12_all.deb
 b94bca9944e40801f698d7caaee0c667 25244 devel optional kernel-tree-2.4.27_2.4.27-12_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFDjbBTA8ACPgVBDpcRAv+NAJ9UjRlczttuAVA56+sWLJfyPGk9kwCeKFwR
mUGjTJr2o+d0FAbcXVPLxlE=
=6uuP
-----END PGP SIGNATURE-----



Reply to: