Your message dated Sat, 30 Aug 2008 07:52:21 +0000 with message-id <[EMAIL PROTECTED]> and subject line Bug#410807: fixed in user-mode-linux 2.6.18-1um-2etch.22etch1 has caused the Debian Bug report #410807, regarding linux-image-2.6.18-4-xen-686: machine stops responding on P III Xeon 3GHz to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [EMAIL PROTECTED] immediately.) -- 410807: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=410807 Debian Bug Tracking System Contact [EMAIL PROTECTED] with problems
--- Begin Message ---Package: linux-image-2.6.18-4-xen-686 Version: 2.6.18.dfsg.1-12 Severity: critical Justification: breaks the whole system ------------[ cut here ]------------ kernel BUG at drivers/xen/core/evtchn.c:481! invalid opcode: 0000 [#1] SMP Modules linked in: xt_physdev bridge netloop iptable_filter ip_tables x_tables ipv6 ide_disk psmouse i2c_i801 serio_raw parport_pc parport i2c_core serial_core e7xxx_edac edac_mc rtc floppy pcspkr shpchp pci_hotplug evdev sg ext3 jbd mbcache dm_mirror dm_snapshot dm_mod sd_mod ide_cd cdrom uhci_hcd e1000 megaraid_mbox megaraid_mm aic79xx scsi_transport_spi scsi_mod piix generic ide_core usbcore thermal processor fan CPU: 1 EIP: 0061:[<c020c13a>] Not tainted VLI EFLAGS: 00010046 (2.6.18-4-xen-686 #1) EIP is at retrigger+0x1f/0x35 eax: 00000000 ebx: 02080000 ecx: 00000036 edx: f55f6000 esi: c0318920 edi: 0000011d ebp: 00000000 esp: c039feb0 ds: 007b es: 007b ss: 0069 Process xenwatch (pid: 17, ti=c039e000 task=c0ea7550 task.ti=c039e000) Stack: c013b259 c0318920 0000011d c0318948 c013afaf ecf912c0 00000000 00000000 ecf912c0 c02170e0 00000000 c02174c0 c021064f 00000010 00000000 0000020c 0000020b 00000000 00000000 ecb20576 c02e67a4 ee4be000 00000000 00000002 Call Trace: [<c013b259>] check_irq_resend+0x41/0x48 [<c013afaf>] enable_irq+0x72/0x87 [<c02170e0>] __netif_up+0xb/0x13 [<c02174c0>] netif_map+0x247/0x26f [<c021064f>] xs_talkv+0xe3/0x128 [<c0210998>] xenbus_read+0x34/0x3b [<c0210d5a>] xenbus_scanf+0x18/0x4d [<c0216b51>] frontend_changed+0x29f/0x4a8 [<c0211d38>] otherend_changed+0x74/0x79 [<c02104d2>] xenwatch_handle_callback+0x12/0x44 [<c0210f17>] xenwatch_thread+0x105/0x11b [<c012b6e5>] autoremove_wake_function+0x0/0x2d [<c0210e12>] xenwatch_thread+0x0/0x11b [<c012b619>] kthread+0xc0/0xeb [<c012b559>] kthread+0x0/0xeb [<c010293d>] kernel_thread_helper+0x5/0xb Code: ee 85 f6 75 96 58 5a 5b 5e 5f 5d c3 0f b7 0c 85 40 b8 37 c0 8b 15 84 19 2d c0 85 c9 74 1d 0f a3 8a 80 08 00 00 19 c0 85 c0 75 08 <0f> 0b e1 01 b2 1a 2b c0 f0 0f ab 8a 00 08 00 00 b8 01 00 00 00 EIP: [<c020c13a>] retrigger+0x1f/0x35 SS:ESP 0069:c039feb0 P III Xeon. 3GB RAM -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.18-4-xen-686 Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1) Versions of packages linux-image-2.6.18-4-xen-686 depends on: ii initramfs-tools 0.85f tools for generating an initramfs ii linux-modules-2.6.18-4- 2.6.18.dfsg.1-12 Linux 2.6.18 modules on i686 Versions of packages linux-image-2.6.18-4-xen-686 recommends: ii libc6-xen 2.5-7 GNU C Library: Shared libraries [X -- no debconf information
--- End Message ---
--- Begin Message ---Source: user-mode-linux Source-Version: 2.6.18-1um-2etch.22etch1 We believe that the bug you reported is fixed in the latest version of user-mode-linux, which is due to be installed in the Debian FTP archive: user-mode-linux_2.6.18-1um-2etch.22etch1.diff.gz to pool/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.22etch1.diff.gz user-mode-linux_2.6.18-1um-2etch.22etch1.dsc to pool/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.22etch1.dsc user-mode-linux_2.6.18-1um-2etch.22etch1_i386.deb to pool/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.22etch1_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. dann frazier <[EMAIL PROTECTED]> (supplier of updated user-mode-linux package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Wed, 6 Aug 2008 00:40:06 -0600 Source: user-mode-linux Binary: user-mode-linux Architecture: source i386 Version: 2.6.18-1um-2etch.22etch1 Distribution: stable-security Urgency: high Maintainer: User Mode Linux Maintainers <[EMAIL PROTECTED]> Changed-By: dann frazier <[EMAIL PROTECTED]> Description: user-mode-linux - User-mode Linux (kernel) Closes: 410807 479773 Changes: user-mode-linux (2.6.18-1um-2etch.22etch1) stable-security; urgency=high . * Rebuild against linux-source-2.6.18_2.6.18.dfsg.1-22etch1: * bugfix/sctp-make-sure-n-sizeof-does-not-overflow.patch [SECURITY] Fix potential overflow condition in sctp_getsockopt_local_addrs_old See CVE-2008-2826 * bugfix/esp-iv-in-linear-part-of-skb.patch [SECURITY] Avoid tripping BUG() in IPsec code when the first fragment of an ESP packet does not contain the entire ESP header and IV See CVE-2007-6282 * bugfix/amd64-fix-zeroing-on-exception-in-copy_user.patch [SECURITY] [amd64] Fix potential information leak when a copy operation fails by properly zeroing out destination memory See CVE-2008-2729 * bugfix/tty-fix-for-tty-operations-bugs.patch [SECURITY] Fix issues with tty operation handling in various drivers See CVE-2008-2812 * bugfix/check-privileges-before-setting-mount-propagation.patch [SECURITY] Check CAP_SYS_ADMIN when changing mountpoint type See CVE-2008-2931 * bugfix/x86-fix-copy_user.patch [SECURITY][amd64] Fix memory leak in the copy_user routine, see #490910. See CVE-2008-0598 * Changes from 2.6.18.dfsg.1-22: * Merge in changes from 2.6.18.dfsg.1-18etch6 * 3w-9xxx: Add 3ware 9690SA Backport (closes: #479773) * Backport http://xenbits.xensource.com/xen-unstable.hg?rev/914304b3a3da, fixing kernel BUG at drivers/xen/core/evtchn.c:481 (closes: #410807). * Changes from 2.6.18.dfsg.1-18etch6 * bugfix/dccp-feature-length-check.patch [SECURITY] Validate feature length to avoid heap overflow See CVE-2008-2358 * bugfix/asn1-ber-decoding-checks.patch [SECURITY] Validate lengths in ASN.1 decoding code to avoid heap overflow See CVE-2008-1673 Files: 5cb0d6498fdb81826ae87ed1505d3617 892 misc extra user-mode-linux_2.6.18-1um-2etch.22etch1.dsc 03ca670996b8db498c46da96c6769b9a 17971 misc extra user-mode-linux_2.6.18-1um-2etch.22etch1.diff.gz 4bad5f3d2a7179063d0a7e696def9402 25590314 misc extra user-mode-linux_2.6.18-1um-2etch.22etch1_i386.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iD8DBQFImU2chuANDBmkLRkRAq4FAJ4s1q9ehR7dnPQR6B67fII6pIYXYQCggC+Q lokeCWmRRKjMjzOclRHBElA= =GPb1 -----END PGP SIGNATURE-----
--- End Message ---

