Your message dated Wed, 16 Nov 2005 14:47:18 -0800
with message-id <[EMAIL PROTECTED]>
and subject line Bug#338207: fixed in xfsprogs 2.7.7-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 8 Nov 2005 19:52:37 +0000
>From [EMAIL PROTECTED] Tue Nov 08 11:52:37 2005
Return-path: <[EMAIL PROTECTED]>
Received: from master.debian.org [146.82.138.7] 
        by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
        id 1EZZ74-0004q1-00; Tue, 08 Nov 2005 11:26:34 -0800
Received: from dslb-084-056-101-102.pools.arcor-ip.net (deepdance.local) 
[84.56.101.102] 
        by master.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1EZZ73-0003Ks-00; Tue, 08 Nov 2005 13:26:33 -0600
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Martin Steigerwald <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: xfs_db "frag" command gives segmentation fault
X-Mailer: reportbug 3.17
Date: Tue, 08 Nov 2005 20:26:31 +0100
X-Debbugs-Cc: [EMAIL PROTECTED]
Message-Id: <[EMAIL PROTECTED]>
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-9.0 required=4.0 tests=BAYES_00,HAS_PACKAGE,
        OUR_MTA_MSGID,X_DEBBUGS_CC autolearn=ham 
        version=2.60-bugs.debian.org_2005_01_02

Package: xfsprogs
Version: 2.6.36-1
Severity: normal

Hello Nathan,

using the "frag" command in xfs_db gives a segmentation fault here:

[EMAIL PROTECTED]:/ -> xfs_db -V
xfs_db version 2.6.36
[EMAIL PROTECTED]:/ -> xfs_db -r /dev/hda5
xfs_db> label
label = "debian"
xfs_db> frag
Speicherzugriffsfehler
(^^^ german for segmentation fault)

Using an older version of xfs_db from an chroot'ed SuSE 9.3
environment (same kernel running, see below) works instead:

deepdance:/# xfs_db -V
xfs_db version 2.6.25
deepdance:/# xfs_db -r /dev/hda5
xfs_db> label
label = "debian"
xfs_db> frag
actual 324362, ideal 321705, fragmentation factor 0.82%
xfs_db> quit
deepdance:/#

I am using a self compiled vanilla 2.6.13.4 kernel with the
following XFS options compiled in:

[EMAIL PROTECTED]:/ -> grep -i "XFS" /boot/config-2.6.13.4-tp23
# XFS support
CONFIG_XFS_FS=y
CONFIG_XFS_EXPORT=y
CONFIG_XFS_RT=y
CONFIG_XFS_QUOTA=y
CONFIG_XFS_SECURITY=y
CONFIG_XFS_POSIX_ACL=y
# well not really XFS related
# CONFIG_VXFS_FS is not set

This is an strace of the bug:

write(1, "xfs_db> ", 8xfs_db> )                 = 8
rt_sigprocmask(SIG_BLOCK, NULL, [], 8)  = 0
read(0, "f", 1)                         = 1
write(1, "f", 1f)                        = 1
rt_sigprocmask(SIG_BLOCK, NULL, [], 8)  = 0
read(0, "r", 1)                         = 1
write(1, "r", 1r)                        = 1
rt_sigprocmask(SIG_BLOCK, NULL, [], 8)  = 0
read(0, "a", 1)                         = 1
write(1, "a", 1a)                        = 1
rt_sigprocmask(SIG_BLOCK, NULL, [], 8)  = 0
read(0, "g", 1)                         = 1
write(1, "g", 1g)                        = 1
rt_sigprocmask(SIG_BLOCK, NULL, [], 8)  = 0
read(0, "\r", 1)                        = 1
write(1, "\n", 1
)                       = 1
rt_sigprocmask(SIG_BLOCK, [INT], [], 8) = 0
ioctl(0, SNDCTL_TMR_TIMEBASE or TCGETS, {B38400 opost isig -icanon -echo ...}) 
= 0
ioctl(0, SNDCTL_TMR_STOP or TCSETSW, {B38400 opost isig icanon echo ...}) = 0
ioctl(0, SNDCTL_TMR_TIMEBASE or TCGETS, {B38400 opost isig icanon echo ...}) = 0
rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0
rt_sigaction(SIGINT, {0x80628f4, [], 0}, {0xb7fbae00, [], 0}, 8) = 0
rt_sigaction(SIGTERM, {SIG_DFL}, {0xb7fbae00, [], 0}, 8) = 0
rt_sigaction(SIGQUIT, {SIG_DFL}, {0xb7fbae00, [], 0}, 8) = 0
rt_sigaction(SIGALRM, {SIG_DFL}, {0xb7fbae00, [], 0}, 8) = 0
rt_sigaction(SIGTSTP, {SIG_DFL}, {0xb7fbae00, [], 0}, 8) = 0
rt_sigaction(SIGTTOU, {SIG_DFL}, {0xb7fbae00, [], 0}, 8) = 0
rt_sigaction(SIGTTIN, {SIG_DFL}, {0xb7fbae00, [], 0}, 8) = 0
rt_sigaction(SIGWINCH, {SIG_DFL}, {0xb7fba8f0, [], SA_RESTART}, 8) = 0
time(NULL)                              = 1131477764
_llseek(4, 512, [512], SEEK_SET)        = 0
read(4, "[EMAIL PROTECTED]"..., 512) = 512
_llseek(4, 1024, [1024], SEEK_SET)      = 0
read(4, "[EMAIL PROTECTED]"..., 512) = 512
_llseek(4, 1392640, [1392640], SEEK_SET) = 0
read(4, "IABT\0\1\0\3\377\377\377\377\377\377\377\377\0\0\0\200"..., 4096) = 
4096
_llseek(4, 741376, [741376], SEEK_SET)  = 0
read(4, "IABT\0\0\0\366\377\377\377\377\0\0\1\205\0\0\0\200\0\0"..., 4096) = 
4096
_llseek(4, 32768, [32768], SEEK_SET)    = 0
read(4, "INA\355\1\2\0\25\0\0\0\0\0\0\0\0\0\0\0\25\0\0\0\0\0\0\0"..., 16384) = 
16384
mmap2(NULL, 268443648, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) 
= 0xa7d59000
--- SIGSEGV (Segmentation fault) @ 0 (0) ---
+++ killed by SIGSEGV +++

The bug also happens when I use the "frag" command on a previously
unmounted partition.

Please tell me when you need any further informations.

Regards,
Martin Steigerwald

-- System Information:
Debian Release: testing/unstable
  APT prefers testing
  APT policy: (990, 'testing'), (500, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.13.4-tp23
Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15)

Versions of packages xfsprogs depends on:
ii  libc6                         2.3.5-6    GNU C Library: Shared libraries an
ii  libreadline5                  5.0-11     GNU readline and history libraries
ii  libuuid1                      1.38-2     universally unique id library

xfsprogs recommends no packages.

-- no debconf information

---------------------------------------
Received: (at 338207-close) by bugs.debian.org; 16 Nov 2005 22:51:29 +0000
>From [EMAIL PROTECTED] Wed Nov 16 14:51:29 2005
Return-path: <[EMAIL PROTECTED]>
Received: from katie by spohr.debian.org with local (Exim 4.50)
        id 1EcW3i-000391-PS; Wed, 16 Nov 2005 14:47:18 -0800
From: Nathan Scott <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.56 $
Subject: Bug#338207: fixed in xfsprogs 2.7.7-1
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Wed, 16 Nov 2005 14:47:18 -0800
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-CrossAssassin-Score: 3

Source: xfsprogs
Source-Version: 2.7.7-1

We believe that the bug you reported is fixed in the latest version of
xfsprogs, which is due to be installed in the Debian FTP archive:

xfslibs-dev_2.7.7-1_i386.deb
  to pool/main/x/xfsprogs/xfslibs-dev_2.7.7-1_i386.deb
xfsprogs-udeb_2.7.7-1_i386.udeb
  to pool/main/x/xfsprogs/xfsprogs-udeb_2.7.7-1_i386.udeb
xfsprogs_2.7.7-1.dsc
  to pool/main/x/xfsprogs/xfsprogs_2.7.7-1.dsc
xfsprogs_2.7.7-1.tar.gz
  to pool/main/x/xfsprogs/xfsprogs_2.7.7-1.tar.gz
xfsprogs_2.7.7-1_i386.deb
  to pool/main/x/xfsprogs/xfsprogs_2.7.7-1_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Nathan Scott <[EMAIL PROTECTED]> (supplier of updated xfsprogs package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Wed, 16 Nov 2005 16:32:35 +1100
Source: xfsprogs
Binary: xfsprogs-udeb xfslibs-dev xfsprogs
Architecture: source i386
Version: 2.7.7-1
Distribution: unstable
Urgency: low
Maintainer: Nathan Scott <[EMAIL PROTECTED]>
Changed-By: Nathan Scott <[EMAIL PROTECTED]>
Description: 
 xfslibs-dev - XFS filesystem-specific static libraries and headers
 xfsprogs   - Utilities for managing the XFS filesystem
 xfsprogs-udeb - A stripped-down version of xfsprogs, for debian-installer 
(udeb)
Closes: 249429 336350 338207
Changes: 
 xfsprogs (2.7.7-1) unstable; urgency=low
 .
   * New upstream release.
   * Add support for (optional) ATTR2 format extension (closes: #336350)
   * Allow gcc -pedantic option for C++ <xfs.h> users (closes: #249429)
   * Fix segv in xfs_db frag command (closes: #338207)
Files: 
 57698965b78d61b5dbb03424f8f7649b 571 admin optional xfsprogs_2.7.7-1.dsc
 88d98bcd4f2c4138124414c5110b10f1 866084 admin optional xfsprogs_2.7.7-1.tar.gz
 fe7449f507ed814bde6677fa378c38c9 1055844 admin optional 
xfsprogs_2.7.7-1_i386.deb
 b1cd6763cb55aa64b4e05b672dc45f8a 280684 libdevel extra 
xfslibs-dev_2.7.7-1_i386.deb
 2a6cc295e660cdc3b65f2e481a39e424 125304 debian-installer optional 
xfsprogs-udeb_2.7.7-1_i386.udeb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (GNU/Linux)

iD8DBQFDe7SNm8fl3HSIa2MRAu7yAKCLKiHa1m9K9PyYPyWdEnco+IDZggCfbDKz
2f7+w1ahcchHSIoaLe08y0E=
=Jvua
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to