Your message dated Fri, 19 Mar 2021 23:02:10 +0000
with message-id <[email protected]>
and subject line Bug#984495: fixed in systemd 241-7~deb10u7
has caused the Debian Bug report #984495,
regarding systemd segfault soon after daemon-reload
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
984495: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=984495
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: systemd
Version: 241-7~deb10u4
Severity: important
Tags: upstream patch

Dear Maintainer,

A user of Cumulus Linux 4, which uses some Debian Buster packages
including systemd, reported a systemd crash:

2021-03-03T20:59:58.426342+00:00 <hostname> systemd[1]: Reloading.
2021-03-03T20:59:58.459909+00:00 <hostname> kernel: [ 4344.314153] systemd[1]: 
segfault at 50 ip 000055d419ce7080 sp 00007ffcecb91850 error 4 in 
systemd[55d419c8c000+b1000]
2021-03-03T20:59:58.459955+00:00 <hostname> kernel: [ 4344.326055] Code: 45 8c 
48 8b 4d 90 c7 45 88 00 00 00 00 48 8b 94 c7 a0 04 00 00 48 89 85 70 ff ff ff 
48 89 c8 48 39 d1 74 15 31 c9 0f 1f 40 00 <48> 8b 40 50 83 c1 01 48 39 c2 75 f4 
89 4d 88 48 8b 45 90 48 8
b 58
2021-03-03T20:59:58.472662+00:00 <hostname> kernel: [ 4344.359412] systemd: 37 
output lines suppressed due to ratelimiting
2021-03-03T20:59:58.472295+00:00 <hostname> systemd[1]: Caught <SEGV>, dumped 
core as pid 20486.
2021-03-03T20:59:58.495229+00:00 <hostname> systemd[1]: Freezing execution.

The core file shows the following information:
(gdb) info stack
#0  0x00007f9ac0f4ea97 in kill () from /lib/x86_64-linux-gnu/libc.so.6
#1  0x000055d419d3c4f6 in crash (sig=11) at ../src/core/main.c:197
#2  <signal handler called>
#3  service_exec_command_index (current=0x55d41ab219f0, 
id=_SERVICE_EXEC_COMMAND_INVALID,
    u=0x55d41ab20980) at ../src/core/service.c:2442
#4  service_serialize_exec_command (u=u@entry=0x55d41ab20980, 
f=f@entry=0x55d41ac0cab0,
    command=0x55d41ab219f0) at ../src/core/service.c:2470
#5  0x000055d419ce7557 in service_serialize (u=0x55d41ab20980, f=0x55d41ac0cab0,
    fds=0x55d41ab59460) at ../src/core/service.c:2534
#6  0x000055d419cff0ed in unit_serialize (serialize_jobs=255, 
fds=0x55d41ab59460,
    f=0x55d41ac0cab0, u=0x55d41ab20980) at ../src/core/unit.h:582
#7  manager_serialize (m=0x55d41aaa54a0, f=<optimized out>, fds=0x55d41ab59460,
    switching_root=false) at ../src/core/manager.c:3208
#8  0x000055d419d3963d in manager_reload (m=0x55d41aaa54a0) at 
../src/core/manager.c:3486
#9  invoke_main_loop (m=0x55d41aaa54a0, ret_reexecute=<optimized out>,
    ret_retval=<optimized out>, ret_shutdown_verb=0x7ffcecb91b48, 
ret_fds=0x7ffcecb91b38,
    ret_switch_root_dir=0x7ffcecb91b58, ret_switch_root_init=0x7ffcecb91b50,
    ret_error_message=0x7ffcecb91b40) at ../src/core/main.c:1873
#10 0x000055d419c91c06 in main (argc=1, argv=<optimized out>) at 
../src/core/main.c:2625

Given "id=_SERVICE_EXEC_COMMAND_INVALID" in frame #3, this seems to
match the following reports:
https://bugzilla.redhat.com/show_bug.cgi?id=1829867
https://github.com/systemd/systemd/issues/15356

The problem in the above reports was fixed upstream in the following
pull request
https://github.com/systemd/systemd/pull/15546
and especially in commit
e9da62b18a core: make sure to restore the control command id, too (v246-rc1)

I've checked that there is no patch backporting this commit in the
latest version of the systemd package in Buster, 241-7~deb10u6. Would
you consider adding this commit?

Thank you
-Benjamin

-- Package-specific info:

-- System Information:
Debian Release: 10.5
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.19.0-cl-1-amd64 (SMP w/8 CPU cores)
Kernel taint flags: TAINT_OOT_MODULE
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages systemd depends on:
ii  adduser          3.118
ii  libacl1          2.2.53-4
ii  libapparmor1     2.13.2-10
ii  libaudit1        1:2.8.4-3
ii  libblkid1        2.33.1-0.1
ii  libc6            2.28-10
ii  libcap2          1:2.25-2
ii  libcryptsetup12  2:2.1.0-5+deb10u2
ii  libgcrypt20      1.8.4-5
ii  libgnutls30      3.6.7-4+deb10u5
ii  libgpg-error0    1.35-1
ii  libidn11         1.33-2.2
ii  libip4tc0        1.8.2-3-cl4u4.2.1
ii  libkmod2         26-1
ii  liblz4-1         1.8.3-1
ii  liblzma5         5.2.4-1
ii  libmount1        2.33.1-0.1
ii  libpam0g         1.3.1-5
ii  libseccomp2      2.3.3-4
ii  libselinux1      2.8-1+b1
ii  libsystemd0      241-7~deb10u4
ii  mount            2.33.1-0.1
ii  util-linux       2.33.1-0.1

Versions of packages systemd recommends:
ii  dbus            1.12.20-0+deb10u1
pn  libpam-systemd  <none>

Versions of packages systemd suggests:
pn  policykit-1        <none>
pn  systemd-container  <none>

Versions of packages systemd is related to:
pn  dracut           <none>
ii  initramfs-tools  0.133+deb10u1
ii  udev             241-7~deb10u4

-- Configuration Files:
/etc/systemd/system.conf changed [not included]

-- no debconf information

--- End Message ---
--- Begin Message ---
Source: systemd
Source-Version: 241-7~deb10u7
Done: Michael Biebl <[email protected]>

We believe that the bug you reported is fixed in the latest version of
systemd, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Michael Biebl <[email protected]> (supplier of updated systemd package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Thu, 18 Mar 2021 20:59:14 +0100
Source: systemd
Architecture: source
Version: 241-7~deb10u7
Distribution: buster
Urgency: medium
Maintainer: Debian systemd Maintainers 
<[email protected]>
Changed-By: Michael Biebl <[email protected]>
Closes: 984495 984573
Changes:
 systemd (241-7~deb10u7) buster; urgency=medium
 .
   * core: make sure to restore the control command id, too.
     Fixes a segfault in systemd that can be triggered when both
     daemon-reload and a service restart happen concurrently. (Closes: #984495)
   * seccomp: allow turning off of seccomp filtering via env var.
     Since glibc 2.33 faccessat() is implemented via faccessat2(), which
     is breaking running containers that use such a version of glibc under
     systemd-nspawn in Buster.
     Turning off seccomp filtering via the SYSTEMD_SECCOMP env var makes it
     possible to run such new containers. (Closes: #984573)
Checksums-Sha1:
 a974dececf4fe55ac6c0598bba20812a89849936 4946 systemd_241-7~deb10u7.dsc
 c9ce7a372253f2c861c76b43b156ac78d6fd3547 181896 
systemd_241-7~deb10u7.debian.tar.xz
 9e721e7794c8f014ce31bde785ad21251a266ae6 9288 
systemd_241-7~deb10u7_source.buildinfo
Checksums-Sha256:
 1abfa0f64d2ff59ab43b67dca133c8852cfdfd018ceaf5b661b6a2e4eda9954c 4946 
systemd_241-7~deb10u7.dsc
 b46079f75db2a5e496a2e6e14893e11477a58b8634e0fccbb3f09f9191907806 181896 
systemd_241-7~deb10u7.debian.tar.xz
 6b01478fb975b733ba4eec27ba7aa0840c9fe504fbf01ac399c1d2781b9cf38f 9288 
systemd_241-7~deb10u7_source.buildinfo
Files:
 d809118aa053515c839f1ed6ff30e0ad 4946 admin optional systemd_241-7~deb10u7.dsc
 78a9d5a3302bc5bb7bc91811c86ca90b 181896 admin optional 
systemd_241-7~deb10u7.debian.tar.xz
 6cf7a9141f6929c0a9a5d073cab20dbc 9288 admin optional 
systemd_241-7~deb10u7_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=S3CT
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to