Your message dated Sat, 30 Aug 2008 07:52:21 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#410807: fixed in user-mode-linux 2.6.18-1um-2etch.22etch1
has caused the Debian Bug report #410807,
regarding linux-image-2.6.18-3-xen-amd64: Kernel BUG at 
drivers/xen/core/evtchn.c:481
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
410807: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=410807
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: linux-image-2.6.18-3-xen-amd64
Version: 2.6.18-7
Severity: important

Mar  7 18:40:04 hoplite kernel: Kernel BUG at drivers/xen/core/evtchn.c:481
Mar  7 18:40:04 hoplite kernel: invalid opcode: 0000 [1] SMP
Mar  7 18:40:04 hoplite kernel: CPU 1
Mar  7 18:40:04 hoplite kernel: Modules linked in: xt_physdev bridge ipv6 
ipt_REJECT ipt_LOG xt_tcpudp xt_state ip_conntrack nfnetlink iptable_filter 
ip_tables x_tables ide_generic ide_disk i2c_amd756 i2c_core serial_core floppy 
amd_rng shpchp pci_hotplug psmouse serio_raw pcspkr evdev ext3 jbd mbcache 
dm_mirror dm_snapshot dm_mod sd_mod ide_cd cdrom generic aic79xx 
scsi_transport_spi 3w_9xxx scsi_mod e1000 ohci_hcd amd74xx ide_core fan
Mar  7 18:40:04 hoplite kernel: Pid: 13, comm: xenwatch Not tainted 
2.6.18-3-xen-amd64 #1
Mar  7 18:40:04 hoplite kernel: RIP: e030:[<ffffffff80360ed8>]  
[<ffffffff80360ed8>] retrigger+0x26/0x3e
Mar  7 18:40:04 hoplite kernel: RSP: e02b:ffff88007494fd88  EFLAGS: 00010046
Mar  7 18:40:04 hoplite kernel: RAX: 0000000000000000 RBX: 0000000000009280 
RCX: ffffffffff578000
Mar  7 18:40:04 hoplite kernel: RDX: 0000000000000046 RSI: ffff88007494fd30 
RDI: 0000000000000125
Mar  7 18:40:04 hoplite kernel: RBP: ffffffff804cd700 R08: ffff8800756e59f0 
R09: ffff88005703cd00
Mar  7 18:40:04 hoplite kernel: R10: ffff88005703c800 R11: ffffffff80360eb2 
R12: 0000000000000125
Mar  7 18:40:04 hoplite kernel: R13: ffffffff804cd73c R14: 0000000000000000 
R15: 0000000000000008
Mar  7 18:40:04 hoplite kernel: FS:  00002b6d52e0b6d0(0000) 
GS:ffffffff804c3080(0000) knlGS:0000000000000000
Mar  7 18:40:04 hoplite kernel: CS:  e033 DS: 0000 ES: 0000
Mar  7 18:40:04 hoplite kernel: Process xenwatch (pid: 13, threadinfo 
ffff88007494e000, task ffff88007492c080)
Mar  7 18:40:04 hoplite kernel: Stack:  ffffffff802a10c7  ffff88005703cd00  
ffff88005703cd00  0000000000000000
Mar  7 18:40:04 hoplite kernel:  ffff88007494fde0  000000000000020b  
ffffffff8036da43  0000000000000000
Mar  7 18:40:04 hoplite kernel:  ffffffff8036debb  ffff88007494fea4
Mar  7 18:40:04 hoplite kernel: Call Trace:
Mar  7 18:40:04 hoplite kernel:  [<ffffffff802a10c7>] enable_irq+0x9d/0xbc
Mar  7 18:40:04 hoplite kernel:  [<ffffffff8036da43>] __netif_up+0xc/0x15
Mar  7 18:40:04 hoplite kernel:  [<ffffffff8036debb>] netif_map+0x2a6/0x2d8
Mar  7 18:40:04 hoplite kernel:  [<ffffffff8035c21c>] bus_for_each_dev+0x61/0x6e
Mar  7 18:40:04 hoplite kernel:  [<ffffffff803666c5>] xenwatch_thread+0x0/0x145
Mar  7 18:40:04 hoplite kernel:  [<ffffffff803666c5>] xenwatch_thread+0x0/0x145
Mar  7 18:40:04 hoplite kernel:  [<ffffffff80368205>] 
frontend_changed+0x2ba/0x4f9
Mar  7 18:40:04 hoplite kernel:  [<ffffffff803666c5>] xenwatch_thread+0x0/0x145
Mar  7 18:40:04 hoplite kernel:  [<ffffffff80290252>] 
keventd_create_kthread+0x0/0x61
Mar  7 18:40:04 hoplite kernel:  [<ffffffff80365ad3>] 
xenwatch_handle_callback+0x15/0x48
Mar  7 18:40:04 hoplite kernel:  [<ffffffff803667f2>] 
xenwatch_thread+0x12d/0x145
Mar  7 18:40:04 hoplite kernel:  [<ffffffff80290415>] 
autoremove_wake_function+0x0/0x2e
Mar  7 18:40:04 hoplite kernel:  [<ffffffff80290252>] 
keventd_create_kthread+0x0/0x61
Mar  7 18:40:04 hoplite kernel:  [<ffffffff803666c5>] xenwatch_thread+0x0/0x145
Mar  7 18:40:04 hoplite kernel:  [<ffffffff8023361f>] kthread+0xd4/0x107
Mar  7 18:40:04 hoplite kernel:  [<ffffffff8025d23c>] child_rip+0xa/0x12
Mar  7 18:40:04 hoplite kernel:  [<ffffffff80290252>] 
keventd_create_kthread+0x0/0x61
Mar  7 18:40:04 hoplite kernel:  [<ffffffff8023354b>] kthread+0x0/0x107
Mar  7 18:40:04 hoplite kernel:  [<ffffffff8025d232>] child_rip+0x0/0x12
Mar  7 18:40:04 hoplite kernel:
Mar  7 18:40:04 hoplite kernel:
Mar  7 18:40:04 hoplite kernel: Code: 0f 0b 68 94 d9 41 80 c2 e1 01 f0 0f ab 91 
00 08 00 00 b8 01
Mar  7 18:40:04 hoplite kernel: RIP  [<ffffffff80360ed8>] retrigger+0x26/0x3e
Mar  7 18:40:04 hoplite kernel:  RSP <ffff88007494fd88>

-- System Information:
Debian Release: 4.0
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-3-xen-amd64
Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1)

Versions of packages linux-image-2.6.18-3-xen-amd64 depends on:
ii  e2fsprog 1.39+1.40-WIP-2006.11.14+dfsg-1 ext2 file system utilities and lib
ii  initramf 0.85e                           tools for generating an initramfs
ii  linux-mo 2.6.18-7                        Linux 2.6.18 modules on AMD64

linux-image-2.6.18-3-xen-amd64 recommends no packages.

-- no debconf information


--- End Message ---
--- Begin Message ---
Source: user-mode-linux
Source-Version: 2.6.18-1um-2etch.22etch1

We believe that the bug you reported is fixed in the latest version of
user-mode-linux, which is due to be installed in the Debian FTP archive:

user-mode-linux_2.6.18-1um-2etch.22etch1.diff.gz
  to 
pool/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.22etch1.diff.gz
user-mode-linux_2.6.18-1um-2etch.22etch1.dsc
  to pool/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.22etch1.dsc
user-mode-linux_2.6.18-1um-2etch.22etch1_i386.deb
  to 
pool/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.22etch1_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
dann frazier <[EMAIL PROTECTED]> (supplier of updated user-mode-linux package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Wed,  6 Aug 2008 00:40:06 -0600
Source: user-mode-linux
Binary: user-mode-linux
Architecture: source i386
Version: 2.6.18-1um-2etch.22etch1
Distribution: stable-security
Urgency: high
Maintainer: User Mode Linux Maintainers <[EMAIL PROTECTED]>
Changed-By: dann frazier <[EMAIL PROTECTED]>
Description: 
 user-mode-linux - User-mode Linux (kernel)
Closes: 410807 479773
Changes: 
 user-mode-linux (2.6.18-1um-2etch.22etch1) stable-security; urgency=high
 .
   * Rebuild against linux-source-2.6.18_2.6.18.dfsg.1-22etch1:
     * bugfix/sctp-make-sure-n-sizeof-does-not-overflow.patch
       [SECURITY] Fix potential overflow condition in
       sctp_getsockopt_local_addrs_old
       See CVE-2008-2826
     * bugfix/esp-iv-in-linear-part-of-skb.patch
       [SECURITY] Avoid tripping BUG() in IPsec code when the first fragment
       of an ESP packet does not contain the entire ESP header and IV
       See CVE-2007-6282
     * bugfix/amd64-fix-zeroing-on-exception-in-copy_user.patch
       [SECURITY] [amd64] Fix potential information leak when a copy
       operation fails by properly zeroing out destination memory
       See CVE-2008-2729
     * bugfix/tty-fix-for-tty-operations-bugs.patch
       [SECURITY] Fix issues with tty operation handling in various drivers
       See CVE-2008-2812
     * bugfix/check-privileges-before-setting-mount-propagation.patch
       [SECURITY] Check CAP_SYS_ADMIN when changing mountpoint type
       See CVE-2008-2931
     * bugfix/x86-fix-copy_user.patch
       [SECURITY][amd64] Fix memory leak in the copy_user routine, see #490910.
       See CVE-2008-0598
   * Changes from 2.6.18.dfsg.1-22:
     * Merge in changes from 2.6.18.dfsg.1-18etch6
     * 3w-9xxx: Add 3ware 9690SA Backport (closes: #479773)
     * Backport http://xenbits.xensource.com/xen-unstable.hg?rev/914304b3a3da,
       fixing kernel BUG at drivers/xen/core/evtchn.c:481 (closes: #410807).
   * Changes from 2.6.18.dfsg.1-18etch6
     * bugfix/dccp-feature-length-check.patch
       [SECURITY] Validate feature length to avoid heap overflow
       See CVE-2008-2358
     * bugfix/asn1-ber-decoding-checks.patch
       [SECURITY] Validate lengths in ASN.1 decoding code to avoid
       heap overflow
       See CVE-2008-1673
Files: 
 5cb0d6498fdb81826ae87ed1505d3617 892 misc extra 
user-mode-linux_2.6.18-1um-2etch.22etch1.dsc
 03ca670996b8db498c46da96c6769b9a 17971 misc extra 
user-mode-linux_2.6.18-1um-2etch.22etch1.diff.gz
 4bad5f3d2a7179063d0a7e696def9402 25590314 misc extra 
user-mode-linux_2.6.18-1um-2etch.22etch1_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFImU2chuANDBmkLRkRAq4FAJ4s1q9ehR7dnPQR6B67fII6pIYXYQCggC+Q
lokeCWmRRKjMjzOclRHBElA=
=GPb1
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to