Processed (with 1 errors): Bug#479952: Bug#468793: tokyocabinet - FTBFS: pthread_mutex_lock.c:71: __pthread_mutex_lock: Assertion `mutex-__data.__owner == 0' failed.
Processing commands for [EMAIL PROTECTED]: reassign 468793 glibc Bug#468793: tokyocabinet - FTBFS: pthread_mutex_lock.c:71: __pthread_mutex_lock: Assertion `mutex-__data.__owner == 0' failed. Bug reassigned from package `tokyocabinet' to `glibc'. forcemerge 479952 468793 Bug#479952: libc6/s390 - __pthread_mutex_lock: Assertion `mutex-__data.__owner == 0' failed. Bug#468793: tokyocabinet - FTBFS: pthread_mutex_lock.c:71: __pthread_mutex_lock: Assertion `mutex-__data.__owner == 0' failed. Mismatch - only Bugs in the same package can be forcibly merged: Bug 468793 is not in the same package as 479952 thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed (with 1 errors): Bug#479952: Bug#468793: tokyocabinet - FTBFS: pthread_mutex_lock.c:71: __pthread_mutex_lock: Assertion `mutex-__data.__owner == 0' failed.
Processing commands for [EMAIL PROTECTED]: reassign 468793 libc6/s390 Bug#468793: tokyocabinet - FTBFS: pthread_mutex_lock.c:71: __pthread_mutex_lock: Assertion `mutex-__data.__owner == 0' failed. Warning: Unknown package 'libc6/s390' Bug reassigned from package `glibc' to `libc6/s390'. forcemerge 479952 468793 Bug#479952: libc6/s390 - __pthread_mutex_lock: Assertion `mutex-__data.__owner == 0' failed. Bug#468793: tokyocabinet - FTBFS: pthread_mutex_lock.c:71: __pthread_mutex_lock: Assertion `mutex-__data.__owner == 0' failed. Mismatch - only Bugs in the same package can be forcibly merged: Bug 468793 is not in the same package as 479952 thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#479952: Bug#468793: tokyocabinet - FTBFS: pthread_mutex_lock.c:71: __pthread_mutex_lock: Assertion `mutex-__data.__owner == 0' failed.
On Thu, 2008-10-30 at 14:12 +0100, Pierre Habouzit wrote: On Thu, Oct 30, 2008 at 12:44:35PM +, Martin Schwidefsky wrote: On Mon, 2008-10-27 at 19:59 +0100, Julien Danjou wrote: At 1225129482 time_t, Moritz Muehlenhoff wrote: Maybe we could forward this bug to Martin Schwidefsky [EMAIL PROTECTED], who is the glibc s390 maintainer and who works for IBM on the s390 Linux port. Why not. Martin, do you have any clue about bug #479952? http://bugs.debian.org/479952 This does look familiar, I've seen this some years ago with broken locking primivites in the nptl lowlevellock implementation. Could you check your copy of glibc to verify if the locking inline assemblies in nptl/sysdeps/unix/sysv/linux/s390/lowlevellock.h all have the memory clobber? This has been the bug last time. Just for information I'm currently on travel and will read my mail only randomly. They all have the memory constraint. In the meantime Michael Matz from Novell found the problem: the __lll_lock Funktion uses atomic_compare_and_exchange_bool_acq which uses the __arch_compare_and_exchange_val_32_acq function which does NOT have a memory clobber. The patch below should fix the problem -- blue skies, Martin. Reality continues to ruin my life. - Calvin. --- diff -urpN libc/sysdeps/s390/bits/atomic.h libc-s390/sysdeps/s390/bits/atomic.h --- libc/sysdeps/s390/bits/atomic.h 2003-05-05 20:20:54.0 +0200 +++ libc-s390/sysdeps/s390/bits/atomic.h2008-11-03 10:56:20.0 +0100 @@ -56,7 +56,7 @@ typedef uintmax_t uatomic_max_t; __typeof (*mem) __archold = (oldval); \ __asm __volatile (cs %0,%2,%1 \ : +d (__archold), =Q (*__archmem) \ - : d (newval), m (*__archmem) : cc ); \ + : d (newval), m (*__archmem) : cc, memory ); \ __archold; }) #ifdef __s390x__ @@ -65,7 +65,8 @@ typedef uintmax_t uatomic_max_t; __typeof (*mem) __archold = (oldval); \ __asm __volatile (csg %0,%2,%1\ : +d (__archold), =Q (*__archmem) \ - : d ((long) (newval)), m (*__archmem) : cc );\ + : d ((long) (newval)), m (*__archmem) \ + : cc, memory );\ __archold; }) #else /* For 31 bit we do not really need 64-bit compare-and-exchange. We can -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#479952: Bug#468793: tokyocabinet - FTBFS: pthread_mutex_lock.c:71: __pthread_mutex_lock: Assertion `mutex-__data.__owner == 0' failed.
reassign 468793 glibc forcemerge 479952 468793 thanks On Mon, Nov 03, 2008 at 09:59:28AM +, Martin Schwidefsky wrote: On Thu, 2008-10-30 at 14:12 +0100, Pierre Habouzit wrote: On Thu, Oct 30, 2008 at 12:44:35PM +, Martin Schwidefsky wrote: On Mon, 2008-10-27 at 19:59 +0100, Julien Danjou wrote: At 1225129482 time_t, Moritz Muehlenhoff wrote: Maybe we could forward this bug to Martin Schwidefsky [EMAIL PROTECTED], who is the glibc s390 maintainer and who works for IBM on the s390 Linux port. Why not. Martin, do you have any clue about bug #479952? http://bugs.debian.org/479952 This does look familiar, I've seen this some years ago with broken locking primivites in the nptl lowlevellock implementation. Could you check your copy of glibc to verify if the locking inline assemblies in nptl/sysdeps/unix/sysv/linux/s390/lowlevellock.h all have the memory clobber? This has been the bug last time. Just for information I'm currently on travel and will read my mail only randomly. They all have the memory constraint. In the meantime Michael Matz from Novell found the problem: the __lll_lock Funktion uses atomic_compare_and_exchange_bool_acq which uses the __arch_compare_and_exchange_val_32_acq function which does NOT have a memory clobber. The patch below should fix the problem Wonderful, thanks a lot to him ! -- ·O· Pierre Habouzit ··O[EMAIL PROTECTED] OOOhttp://www.madism.org pgpTBKF1ygRKG.pgp Description: PGP signature
Unidentified subject!
-- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
How can I 'step into libc' with gdb?
Hi all, I'm desperately trying to debug something for which I need to be able to step into the libc6 source code, especially libpthread. I installed the -dbg package but it contains no line numbers?! Can someone give me a pointer to what is needed to be able to debug libc on debian? -- Carlo Wood [EMAIL PROTECTED] -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Re: How can I 'step into libc' with gdb?
On Mon, Nov 3, 2008 at 12:14 PM, Carlo Wood [EMAIL PROTECTED] wrote: Hi all, I'm desperately trying to debug something for which I need to be able to step into the libc6 source code, especially libpthread. I installed the -dbg package but it contains no line numbers?! Can someone give me a pointer to what is needed to be able to debug libc on debian? You'll also need the source for your version of glibc, and you'll have to point gdb at the location of the source using the dirs command (effects the source search paths). Make sure that info shared shows that you have actually loaded the debug libraries. Cheers, Carlos. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: reassign 468793 to libc6
Processing commands for [EMAIL PROTECTED]: reassign 468793 libc6 Bug#468793: tokyocabinet - FTBFS: pthread_mutex_lock.c:71: __pthread_mutex_lock: Assertion `mutex-__data.__owner == 0' failed. Warning: Unknown package 'libc6/s390' Bug reassigned from package `libc6/s390' to `libc6'. End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
reassign 468793 to libc6
reassign 468793 libc6 -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#501433: marked as done (libc6 nptl linking problem)
Your message dated Mon, 03 Nov 2008 19:52:27 + with message-id [EMAIL PROTECTED] and subject line Bug#501433: fixed in glibc 2.3.6.ds1-13etch8 has caused the Debian Bug report #501433, regarding libc6 nptl linking problem to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [EMAIL PROTECTED] immediately.) -- 501433: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=501433 Debian Bug Tracking System Contact [EMAIL PROTECTED] with problems ---BeginMessage--- Package: libc6 Version: 2.3.6.ds1-13etch7 Severity: normal There was a change between 2.3.6.ds1-13etch5 and 2.3.6.ds1-13etch7 in /usr/lib/nptl/libc.so: 2.3.6.ds1-13etch5: GROUP ( /lib/tls/libc.so.6 /usr/lib/nptl/libc_nonshared.a ) 2.3.6.ds1-13etch7: GROUP ( /lib/tls/libc.so.6 /usr/lib/nptl/libc_nonshared.a AS_NEEDED ( /lib/tls/ld-linux.so.2 ) ) I don't have /lib/tls/ld-linux.so.2 on my system, so linking of any c program with CFLAGS=-L /usr/lib/nptl fails with: /usr/bin/ld: cannot find /lib/tls/ld-linux.so.2 collect2: ld returned 1 exit status It used to work with 2.3.6.ds1-13etch5. -- System Information: Debian Release: 4.0 APT prefers stable APT policy: (500, 'stable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.24-21-386 Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) Versions of packages libc6 depends on: ii tzdata 2007k-1etch1 Time Zone and Daylight Saving Time libc6 recommends no packages. -- no debconf information ---End Message--- ---BeginMessage--- Source: glibc Source-Version: 2.3.6.ds1-13etch8 We believe that the bug you reported is fixed in the latest version of glibc, which is due to be installed in the Debian FTP archive: glibc-doc_2.3.6.ds1-13etch8_all.deb to pool/main/g/glibc/glibc-doc_2.3.6.ds1-13etch8_all.deb glibc_2.3.6.ds1-13etch8.diff.gz to pool/main/g/glibc/glibc_2.3.6.ds1-13etch8.diff.gz glibc_2.3.6.ds1-13etch8.dsc to pool/main/g/glibc/glibc_2.3.6.ds1-13etch8.dsc libc6-dbg_2.3.6.ds1-13etch8_amd64.deb to pool/main/g/glibc/libc6-dbg_2.3.6.ds1-13etch8_amd64.deb libc6-dev-i386_2.3.6.ds1-13etch8_amd64.deb to pool/main/g/glibc/libc6-dev-i386_2.3.6.ds1-13etch8_amd64.deb libc6-dev_2.3.6.ds1-13etch8_amd64.deb to pool/main/g/glibc/libc6-dev_2.3.6.ds1-13etch8_amd64.deb libc6-i386_2.3.6.ds1-13etch8_amd64.deb to pool/main/g/glibc/libc6-i386_2.3.6.ds1-13etch8_amd64.deb libc6-pic_2.3.6.ds1-13etch8_amd64.deb to pool/main/g/glibc/libc6-pic_2.3.6.ds1-13etch8_amd64.deb libc6-prof_2.3.6.ds1-13etch8_amd64.deb to pool/main/g/glibc/libc6-prof_2.3.6.ds1-13etch8_amd64.deb libc6-udeb_2.3.6.ds1-13etch8_amd64.udeb to pool/main/g/glibc/libc6-udeb_2.3.6.ds1-13etch8_amd64.udeb libc6_2.3.6.ds1-13etch8_amd64.deb to pool/main/g/glibc/libc6_2.3.6.ds1-13etch8_amd64.deb libnss-dns-udeb_2.3.6.ds1-13etch8_amd64.udeb to pool/main/g/glibc/libnss-dns-udeb_2.3.6.ds1-13etch8_amd64.udeb libnss-files-udeb_2.3.6.ds1-13etch8_amd64.udeb to pool/main/g/glibc/libnss-files-udeb_2.3.6.ds1-13etch8_amd64.udeb locales-all_2.3.6.ds1-13etch8_amd64.deb to pool/main/g/glibc/locales-all_2.3.6.ds1-13etch8_amd64.deb locales_2.3.6.ds1-13etch8_all.deb to pool/main/g/glibc/locales_2.3.6.ds1-13etch8_all.deb nscd_2.3.6.ds1-13etch8_amd64.deb to pool/main/g/glibc/nscd_2.3.6.ds1-13etch8_amd64.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Aurelien Jarno [EMAIL PROTECTED] (supplier of updated glibc package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Mon, 13 Oct 2008 09:05:59 +0200 Source: glibc Binary: libc0.1-prof libc6-dev-amd64 locales-all libc6-i686 libc6-dev-ppc64 libc0.3-pic glibc-doc libc0.3 libc0.1-i686 libc0.1-i386 libc6.1-dev libc6-s390x libnss-files-udeb libc0.1-dev-i386 libc6-dev-sparc64 libc6-i386 libc0.3-dev libc6-udeb libc6-dbg libc6.1-pic libc6-dev libc0.3-prof libc6-sparcv9 libc0.1-udeb libc6-dev-i386 libc6.1-prof libc0.1-dev locales libc6-pic libc0.3-udeb libc6-dev-powerpc libc0.1-pic libc6-ppc64 libc0.3-dbg libc0.1-dbg libc6-amd64 libc0.1 libc6-prof libc6-xen libc6-powerpc libc6 libc6-sparcv9b libc6.1-udeb libc6.1-dbg nscd libc6-sparc64
r3184 - in glibc-package/trunk/debian: . patches patches/any
Author: aurel32 Date: 2008-11-03 22:24:44 + (Mon, 03 Nov 2008) New Revision: 3184 Added: glibc-package/trunk/debian/patches/any/cvs-rpcgen-makefile.diff Removed: glibc-package/trunk/debian/patches/any/submitted-rpcgen-makefile.diff Modified: glibc-package/trunk/debian/changelog glibc-package/trunk/debian/patches/series Log: Replace submitted-rpcgen-makefile.diff by cvs-rpcgen-makefile.diff (accepted upstream) Modified: glibc-package/trunk/debian/changelog === --- glibc-package/trunk/debian/changelog2008-11-03 07:19:39 UTC (rev 3183) +++ glibc-package/trunk/debian/changelog2008-11-03 22:24:44 UTC (rev 3184) @@ -1,9 +1,9 @@ glibc (2.7-16) unstable; urgency=low - * patches/any/submitted-rpcgen-makefile.diff: new patch to fix fancy -Makefile filename when using rpcgen -a. Closes: bug#503182. + * patches/any/cvs-rpcgen-makefile.diff: new patch from upstream to fix +fancy Makefile filename when using rpcgen -a. Closes: bug#503182. - -- Aurelien Jarno [EMAIL PROTECTED] Thu, 23 Oct 2008 15:39:04 +0200 + -- Aurelien Jarno [EMAIL PROTECTED] Mon, 03 Nov 2008 23:00:07 +0100 glibc (2.7-15) unstable; urgency=low Added: glibc-package/trunk/debian/patches/any/cvs-rpcgen-makefile.diff === --- glibc-package/trunk/debian/patches/any/cvs-rpcgen-makefile.diff (rev 0) +++ glibc-package/trunk/debian/patches/any/cvs-rpcgen-makefile.diff 2008-11-03 22:24:44 UTC (rev 3184) @@ -0,0 +1,22 @@ +2008-10-31 Ulrich Drepper [EMAIL PROTECTED] + + [BZ #6974] + * sunrpc/rpc_main.c (mkfile_output): Properly handle filename + without dot. Properly terminate the string with a null byte. + Based on a patch by Aurelien Jarno [EMAIL PROTECTED]. + +--- a/sunrpc/rpc_main.c b/sunrpc/rpc_main.c +@@ -995,7 +995,11 @@ mkfile_output (struct commandline *cmd) + abort (); + temp = rindex (cmd-infile, '.'); + cp = stpcpy (mkfilename, Makefile.); +- strncpy (cp, cmd-infile, (temp - cmd-infile)); ++ if (temp != NULL) ++ *((char *) stpncpy (cp, cmd-infile, temp - cmd-infile)) = '\0'; ++ else ++ stpcpy (cp, cmd-infile); ++ + } + else + mkfilename = (char *) cmd-outfile; Deleted: glibc-package/trunk/debian/patches/any/submitted-rpcgen-makefile.diff === --- glibc-package/trunk/debian/patches/any/submitted-rpcgen-makefile.diff 2008-11-03 07:19:39 UTC (rev 3183) +++ glibc-package/trunk/debian/patches/any/submitted-rpcgen-makefile.diff 2008-11-03 22:24:44 UTC (rev 3184) @@ -1,23 +0,0 @@ -2008-10-23 Aurelien Jarno [EMAIL PROTECTED] - -* sunrpc/rpc_main.c(mkfile_output): Properly handle filename - without dot. Properly terminate the string with a null byte. - -diff a/sunrpc/rpc_main.c b/sunrpc/rpc_main.c a/sunrpc/rpc_main.c -+++ b/sunrpc/rpc_main.c -@@ -995,7 +995,13 @@ mkfile_output (struct commandline *cmd) - abort (); - temp = rindex (cmd-infile, '.'); - cp = stpcpy (mkfilename, Makefile.); -- strncpy (cp, cmd-infile, (temp - cmd-infile)); -+ if (temp) -+ { -+strncpy (cp, cmd-infile, (temp - cmd-infile)); -+cp[temp - cmd-infile] = '\0'; -+ } -+ else -+ strcpy (cp, cmd-infile); - } - else - mkfilename = (char *) cmd-outfile; Modified: glibc-package/trunk/debian/patches/series === --- glibc-package/trunk/debian/patches/series 2008-11-03 07:19:39 UTC (rev 3183) +++ glibc-package/trunk/debian/patches/series 2008-11-03 22:24:44 UTC (rev 3184) @@ -168,6 +168,7 @@ any/cvs-regex_anchor.diff any/cvs-sunrpc_rpc_thread.diff any/cvs-strerror_r.diff +any/cvs-rpcgen-makefile.diff any/local-notls.diff -p0 any/local-asserth-decls.diff -p0 any/local-bashisms.diff -p0 @@ -225,4 +226,3 @@ #any/submitted-fileops-and-signals.diff any/local-missing-linux_types.h.diff any/submitted-user_h.diff -p1 -any/submitted-rpcgen-makefile.diff -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: tagging 503182
Processing commands for [EMAIL PROTECTED]: # Automatically generated email from bts, devscripts version 2.9.26 tags 503182 + pending Bug#503182: libc6-dev: rpcgen -a generate truncated Makefile file name Tags were: pending Tags added: pending End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#468793: Bug#479952: Bug#468793: tokyocabinet - FTBFS: pthread_mutex_lock.c:71: __pthread_mutex_lock: Assertion `mutex-__data.__owner == 0' failed.
On Mon, Nov 03, 2008 at 10:59:28AM +0100, Martin Schwidefsky wrote: On Thu, 2008-10-30 at 14:12 +0100, Pierre Habouzit wrote: On Thu, Oct 30, 2008 at 12:44:35PM +, Martin Schwidefsky wrote: On Mon, 2008-10-27 at 19:59 +0100, Julien Danjou wrote: At 1225129482 time_t, Moritz Muehlenhoff wrote: Maybe we could forward this bug to Martin Schwidefsky [EMAIL PROTECTED], who is the glibc s390 maintainer and who works for IBM on the s390 Linux port. Why not. Martin, do you have any clue about bug #479952? http://bugs.debian.org/479952 This does look familiar, I've seen this some years ago with broken locking primivites in the nptl lowlevellock implementation. Could you check your copy of glibc to verify if the locking inline assemblies in nptl/sysdeps/unix/sysv/linux/s390/lowlevellock.h all have the memory clobber? This has been the bug last time. Just for information I'm currently on travel and will read my mail only randomly. They all have the memory constraint. In the meantime Michael Matz from Novell found the problem: the __lll_lock Funktion uses atomic_compare_and_exchange_bool_acq which uses the __arch_compare_and_exchange_val_32_acq function which does NOT have a memory clobber. The patch below should fix the problem I confirm that it works, thanks a lot! -- .''`. Aurelien Jarno | GPG: 1024D/F1BCDB73 : :' : Debian developer | Electrical Engineer `. `' [EMAIL PROTECTED] | [EMAIL PROTECTED] `-people.debian.org/~aurel32 | www.aurel32.net -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: tagging 479952
Processing commands for [EMAIL PROTECTED]: # Automatically generated email from bts, devscripts version 2.9.26 tags 479952 + pending Bug#479952: libc6/s390 - __pthread_mutex_lock: Assertion `mutex-__data.__owner == 0' failed. There were no tags set. Tags added: pending End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: tagging 468793
Processing commands for [EMAIL PROTECTED]: # Automatically generated email from bts, devscripts version 2.9.26 tags 468793 + pending Bug#468793: tokyocabinet - FTBFS: pthread_mutex_lock.c:71: __pthread_mutex_lock: Assertion `mutex-__data.__owner == 0' failed. Tags were: help Tags added: pending End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: tagging 495007
Processing commands for [EMAIL PROTECTED]: # Automatically generated email from bts, devscripts version 2.9.26 tags 495007 + pending Bug#495007: libc6: getaddrinfo_a causes SetFault in amd64 version Tags were: patch Tags added: pending End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
r3185 - in glibc-package/trunk/debian: . patches patches/s390
Author: aurel32 Date: 2008-11-03 23:39:41 + (Mon, 03 Nov 2008) New Revision: 3185 Added: glibc-package/trunk/debian/patches/s390/local-atomic.diff Modified: glibc-package/trunk/debian/changelog glibc-package/trunk/debian/patches/series Log: * patches/s390/local-atomic.diff: new patch from Michael Matz to fix atomic lock on s390. Closes: bug#468793, bug#479952. Modified: glibc-package/trunk/debian/changelog === --- glibc-package/trunk/debian/changelog2008-11-03 22:24:44 UTC (rev 3184) +++ glibc-package/trunk/debian/changelog2008-11-03 23:39:41 UTC (rev 3185) @@ -2,6 +2,8 @@ * patches/any/cvs-rpcgen-makefile.diff: new patch from upstream to fix fancy Makefile filename when using rpcgen -a. Closes: bug#503182. + * patches/s390/local-atomic.diff: new patch from Michael Matz to fix +atomic lock on s390. Closes: bug#468793, bug#479952. -- Aurelien Jarno [EMAIL PROTECTED] Mon, 03 Nov 2008 23:00:07 +0100 Added: glibc-package/trunk/debian/patches/s390/local-atomic.diff === --- glibc-package/trunk/debian/patches/s390/local-atomic.diff (rev 0) +++ glibc-package/trunk/debian/patches/s390/local-atomic.diff 2008-11-03 23:39:41 UTC (rev 3185) @@ -0,0 +1,21 @@ +--- a/sysdeps/s390/bits/atomic.h b/sysdeps/s390/bits/atomic.h +@@ -56,7 +56,7 @@ typedef uintmax_t uatomic_max_t; + __typeof (*mem) __archold = (oldval); \ + __asm __volatile (cs %0,%2,%1\ + : +d (__archold), =Q (*__archmem) \ +- : d (newval), m (*__archmem) : cc ); \ ++ : d (newval), m (*__archmem) : cc, memory ); \ + __archold; }) + + #ifdef __s390x__ +@@ -65,7 +65,8 @@ typedef uintmax_t uatomic_max_t; + __typeof (*mem) __archold = (oldval); \ + __asm __volatile (csg %0,%2,%1 \ + : +d (__archold), =Q (*__archmem) \ +- : d ((long) (newval)), m (*__archmem) : cc );\ ++ : d ((long) (newval)), m (*__archmem) \ ++ : cc, memory );\ + __archold; }) + #else + /* For 31 bit we do not really need 64-bit compare-and-exchange. We can Modified: glibc-package/trunk/debian/patches/series === --- glibc-package/trunk/debian/patches/series 2008-11-03 22:24:44 UTC (rev 3184) +++ glibc-package/trunk/debian/patches/series 2008-11-03 23:39:41 UTC (rev 3185) @@ -132,6 +132,7 @@ powerpc/local-sysconf.diff +s390/local-atomic.diff -p1 s390/submitted-nexttowardf.diff -p1 sh4/local-fpscr_values.diff -p0 -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
r3186 - in glibc-package/trunk/debian: . patches patches/any
Author: aurel32 Date: 2008-11-03 23:44:05 + (Mon, 03 Nov 2008) New Revision: 3186 Added: glibc-package/trunk/debian/patches/any/cvs-gai-stacksize.diff Modified: glibc-package/trunk/debian/changelog glibc-package/trunk/debian/patches/series Log: * patches/any/cvs-gai-stacksize.diff new patch from upstream to fix getaddrinfo_a segfaults. Closes: bug#495007. Modified: glibc-package/trunk/debian/changelog === --- glibc-package/trunk/debian/changelog2008-11-03 23:39:41 UTC (rev 3185) +++ glibc-package/trunk/debian/changelog2008-11-03 23:44:05 UTC (rev 3186) @@ -4,8 +4,10 @@ fancy Makefile filename when using rpcgen -a. Closes: bug#503182. * patches/s390/local-atomic.diff: new patch from Michael Matz to fix atomic lock on s390. Closes: bug#468793, bug#479952. + * patches/any/cvs-gai-stacksize.diff new patch from upstream to fix +getaddrinfo_a segfaults. Closes: bug#495007. - -- Aurelien Jarno [EMAIL PROTECTED] Mon, 03 Nov 2008 23:00:07 +0100 + -- Aurelien Jarno [EMAIL PROTECTED] Tue, 04 Nov 2008 00:43:00 +0100 glibc (2.7-15) unstable; urgency=low Added: glibc-package/trunk/debian/patches/any/cvs-gai-stacksize.diff === --- glibc-package/trunk/debian/patches/any/cvs-gai-stacksize.diff (rev 0) +++ glibc-package/trunk/debian/patches/any/cvs-gai-stacksize.diff 2008-11-03 23:44:05 UTC (rev 3186) @@ -0,0 +1,17 @@ +2008-10-31 Ulrich Drepper [EMAIL PROTECTED] + + [BZ #6843] + * sysdeps/pthread/gai_misc.h (__gai_create_helper_thread): + Increase stack size for helper thread. + +--- a/nptl/sysdeps/pthread/gai_misc.h b/nptl/sysdeps/pthread/gai_misc.h +@@ -97,7 +97,7 @@ __gai_create_helper_thread (pthread_t *threadp, void *(*tf) (void *), + pthread_attr_setdetachstate (attr, PTHREAD_CREATE_DETACHED); + + /* The helper thread needs only very little resources. */ +- (void) pthread_attr_setstacksize (attr, PTHREAD_STACK_MIN); ++ (void) pthread_attr_setstacksize (attr, 4 * PTHREAD_STACK_MIN); + + /* Block all signals in the helper thread. To do this thoroughly we + temporarily have to block all signals here. */ Modified: glibc-package/trunk/debian/patches/series === --- glibc-package/trunk/debian/patches/series 2008-11-03 23:39:41 UTC (rev 3185) +++ glibc-package/trunk/debian/patches/series 2008-11-03 23:44:05 UTC (rev 3186) @@ -170,6 +170,7 @@ any/cvs-sunrpc_rpc_thread.diff any/cvs-strerror_r.diff any/cvs-rpcgen-makefile.diff +any/cvs-gai-stacksize.diff any/local-notls.diff -p0 any/local-asserth-decls.diff -p0 any/local-bashisms.diff -p0 -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#468793: tokyocabinet - FTBFS: pthread_mutex_lock.c:71: __pthread_mutex_lock: Assertion `mutex-__data.__owner == 0' failed.
On Sun, Oct 19, 2008 at 04:48:26PM +0200, Pierre Habouzit wrote: Not that I'm aware of, and it's probably a bug in s390 assembly, and actually not a tokyocabinet bug _at all_. So unless upstream knows s390 assembly... I don't think he can help a lot :) For future reference, the hercules package contains an s390 emulator which might suffice for such things. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]