Bug#453253: marked as done (linux-2.6.18-5-xen-686: kernel BUG at drivers/xen/core/evtchn.c:481!)
Your message dated Sat, 30 Aug 2008 07:52:21 +0000
with message-id <E1KZLFt-0005ty-Av@ries.debian.org>
and subject line Bug#410807: fixed in user-mode-linux 2.6.18-1um-2etch.22etch1
has caused the Debian Bug report #410807,
regarding linux-2.6.18-5-xen-686: kernel BUG at drivers/xen/core/evtchn.c:481!
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)
--
410807: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=410807
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: linux-2.6.18-5-xen-686: kernel BUG at drivers/xen/core/evtchn.c:481!
- From: Peter de Zwart <peter.de.zwart@dot.com.au>
- Date: Wed, 28 Nov 2007 13:31:18 +1100
- Message-id: <20071128023118.6577.9447.reportbug@mrstabby.office.dot.net.au>
Package: linux-2.6.18-5-xen-686
Severity: critical
Justification: breaks unrelated software
When shutting down a Xen DomU, the following intermittantly happens:
mrstabby kernel: EIP: [<c020c222>] retrigger+0x1f/0x35 SS:ESP 0069:c039feb0
Nov 28 13:09:16 mrstabby kernel: ------------[ cut here ]------------
Nov 28 13:09:16 mrstabby kernel: kernel BUG at drivers/xen/core/evtchn.c:481!
Nov 28 13:09:16 mrstabby kernel: invalid opcode: 0000 [#1]
Nov 28 13:09:16 mrstabby kernel: SMP
Nov 28 13:09:16 mrstabby kernel: Modules linked in: xt_physdev iptable_filter ip_tables x_tables bridge netloop ipv6 button ac battery ext2 mbcache loop tsdev ide_floppy floppy joydev rtc pcspkr psmouse e752x_edac serial_core serio_raw edac_mc shpchp pci_hotplug evdev sg xfs dm_mirror dm_snapshot dm_mod ide_cd cdrom sd_mod usbhid siimage generic uhci_hcd ide_core megaraid_mbox scsi_mod megaraid_mm e1000 ehci_hcd usbcore thermal processor fan
Nov 28 13:09:16 mrstabby kernel: CPU: 2
Nov 28 13:09:16 mrstabby kernel: EIP: 0061:[<c020c222>] Not tainted VLI
Nov 28 13:09:16 mrstabby kernel: EFLAGS: 00010046 (2.6.18-5-xen-686 #1)
Nov 28 13:09:16 mrstabby kernel: EIP is at retrigger+0x1f/0x35
Nov 28 13:09:17 mrstabby kernel: eax: 00000000 ebx: 02080000 ecx: 0000002a edx: f55f6000
Nov 28 13:09:17 mrstabby kernel: esi: c0317760 edi: 00000116 ebp: 00000000 esp: c039feb0
Nov 28 13:09:17 mrstabby kernel: ds: 007b es: 007b ss: 0069
Nov 28 13:09:17 mrstabby kernel: Process xenwatch (pid: 17, ti=c039e000 task=c0ea2550 task.ti=c039e000)
Nov 28 13:09:17 mrstabby kernel: Stack: c013b201 c0317760 00000116 c0317788 c013af57 d1c1c6c0 00000000 00000000
Nov 28 13:09:17 mrstabby kernel: d1c1c6c0 c02171c8 00000000 c02175a8 c0210737 00000010 00000000 0000020b
Nov 28 13:09:17 mrstabby kernel: 0000020a 00000000 00000000 c057c4b6 c02e57a4 f0860000 00000000 00000002
Nov 28 13:09:17 mrstabby kernel: Call Trace:
Nov 28 13:09:17 mrstabby kernel: [<c013b201>] check_irq_resend+0x41/0x48
Nov 28 13:09:17 mrstabby kernel: [<c013af57>] enable_irq+0x72/0x87
Nov 28 13:09:17 mrstabby kernel: [<c02171c8>] __netif_up+0xb/0x13
Nov 28 13:09:17 mrstabby kernel: [<c02175a8>] netif_map+0x247/0x26f
Nov 28 13:09:17 mrstabby kernel: [<c0210737>] xs_talkv+0xe3/0x128
Nov 28 13:09:17 mrstabby kernel: [<c0210a80>] xenbus_read+0x34/0x3b
Nov 28 13:09:17 mrstabby kernel: [<c0210e42>] xenbus_scanf+0x18/0x4d
Nov 28 13:09:17 mrstabby kernel: [<c0216c39>] frontend_changed+0x29f/0x4a8
Nov 28 13:09:17 mrstabby kernel: [<c0211e20>] otherend_changed+0x74/0x79
Nov 28 13:09:17 mrstabby kernel: [<c02105ba>] xenwatch_handle_callback+0x12/0x44
Nov 28 13:09:17 mrstabby kernel: [<c0210fff>] xenwatch_thread+0x105/0x11b
Nov 28 13:09:17 mrstabby kernel: [<c012b6f9>] autoremove_wake_function+0x0/0x2d
Nov 28 13:09:17 mrstabby kernel: [<c0210efa>] xenwatch_thread+0x0/0x11b
Nov 28 13:09:17 mrstabby kernel: [<c012b62d>] kthread+0xc0/0xeb
Nov 28 13:09:17 mrstabby kernel: [<c012b56d>] kthread+0x0/0xeb
Nov 28 13:09:17 mrstabby kernel: [<c010293d>] kernel_thread_helper+0x5/0xb
Nov 28 13:09:17 mrstabby kernel: Code: ee 85 f6 75 96 58 5a 5b 5e 5f 5d c3 0f b7 0c 85 40 98 37 c0 8b 15 84 09 2d c0 85 c9 74 1d 0f a3 8a 80 08 00 00 19 c0 85 c0 75 08 <0f> 0b e1 01 92 0a 2b c0 f0 0f ab 8a 00 08 00 00 b8 01 00 00 00
Nov 28 13:09:17 mrstabby kernel: EIP: [<c020c222>] retrigger+0x1f/0x35 SS:ESP 0069:c039feb0
The kernel then panics.
-- System Information:
Debian Release: 4.0
APT prefers stable
APT policy: (500, 'stable')
Architecture: i386 (i686)
Shell: /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-5-xen-686
Locale: LANG=en_AU.UTF-8, LC_CTYPE=en_AU.UTF-8 (charmap=UTF-8)
--- End Message ---
--- Begin Message ---
- To: 410807-close@bugs.debian.org
- Subject: Bug#410807: fixed in user-mode-linux 2.6.18-1um-2etch.22etch1
- From: dann frazier <dannf@debian.org>
- Date: Sat, 30 Aug 2008 07:52:21 +0000
- Message-id: <E1KZLFt-0005ty-Av@ries.debian.org>
Source: user-mode-linux
Source-Version: 2.6.18-1um-2etch.22etch1
We believe that the bug you reported is fixed in the latest version of
user-mode-linux, which is due to be installed in the Debian FTP archive:
user-mode-linux_2.6.18-1um-2etch.22etch1.diff.gz
to pool/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.22etch1.diff.gz
user-mode-linux_2.6.18-1um-2etch.22etch1.dsc
to pool/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.22etch1.dsc
user-mode-linux_2.6.18-1um-2etch.22etch1_i386.deb
to pool/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.22etch1_i386.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 410807@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
dann frazier <dannf@debian.org> (supplier of updated user-mode-linux package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Wed, 6 Aug 2008 00:40:06 -0600
Source: user-mode-linux
Binary: user-mode-linux
Architecture: source i386
Version: 2.6.18-1um-2etch.22etch1
Distribution: stable-security
Urgency: high
Maintainer: User Mode Linux Maintainers <pkg-uml-pkgs@lists.alioth.debian.org>
Changed-By: dann frazier <dannf@debian.org>
Description:
user-mode-linux - User-mode Linux (kernel)
Closes: 410807 479773
Changes:
user-mode-linux (2.6.18-1um-2etch.22etch1) stable-security; urgency=high
.
* Rebuild against linux-source-2.6.18_2.6.18.dfsg.1-22etch1:
* bugfix/sctp-make-sure-n-sizeof-does-not-overflow.patch
[SECURITY] Fix potential overflow condition in
sctp_getsockopt_local_addrs_old
See CVE-2008-2826
* bugfix/esp-iv-in-linear-part-of-skb.patch
[SECURITY] Avoid tripping BUG() in IPsec code when the first fragment
of an ESP packet does not contain the entire ESP header and IV
See CVE-2007-6282
* bugfix/amd64-fix-zeroing-on-exception-in-copy_user.patch
[SECURITY] [amd64] Fix potential information leak when a copy
operation fails by properly zeroing out destination memory
See CVE-2008-2729
* bugfix/tty-fix-for-tty-operations-bugs.patch
[SECURITY] Fix issues with tty operation handling in various drivers
See CVE-2008-2812
* bugfix/check-privileges-before-setting-mount-propagation.patch
[SECURITY] Check CAP_SYS_ADMIN when changing mountpoint type
See CVE-2008-2931
* bugfix/x86-fix-copy_user.patch
[SECURITY][amd64] Fix memory leak in the copy_user routine, see #490910.
See CVE-2008-0598
* Changes from 2.6.18.dfsg.1-22:
* Merge in changes from 2.6.18.dfsg.1-18etch6
* 3w-9xxx: Add 3ware 9690SA Backport (closes: #479773)
* Backport http://xenbits.xensource.com/xen-unstable.hg?rev/914304b3a3da,
fixing kernel BUG at drivers/xen/core/evtchn.c:481 (closes: #410807).
* Changes from 2.6.18.dfsg.1-18etch6
* bugfix/dccp-feature-length-check.patch
[SECURITY] Validate feature length to avoid heap overflow
See CVE-2008-2358
* bugfix/asn1-ber-decoding-checks.patch
[SECURITY] Validate lengths in ASN.1 decoding code to avoid
heap overflow
See CVE-2008-1673
Files:
5cb0d6498fdb81826ae87ed1505d3617 892 misc extra user-mode-linux_2.6.18-1um-2etch.22etch1.dsc
03ca670996b8db498c46da96c6769b9a 17971 misc extra user-mode-linux_2.6.18-1um-2etch.22etch1.diff.gz
4bad5f3d2a7179063d0a7e696def9402 25590314 misc extra user-mode-linux_2.6.18-1um-2etch.22etch1_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iD8DBQFImU2chuANDBmkLRkRAq4FAJ4s1q9ehR7dnPQR6B67fII6pIYXYQCggC+Q
lokeCWmRRKjMjzOclRHBElA=
=GPb1
-----END PGP SIGNATURE-----
--- End Message ---
Reply to: