Activity log for bug #237724

Date Who What changed Old value New value Message
2008-06-05 19:27:15 mturilli bug added bug
2008-06-14 09:12:23 mturilli linux: status New Confirmed
2008-08-29 01:51:11 Leann Ogasawara bug added subscriber Leann Ogasawara
2008-10-16 16:32:46 Ralph Janke linux: status Confirmed Incomplete
2008-10-16 16:32:46 Ralph Janke linux: statusexplanation The Intrepid Ibex 8.10 Beta release was most recently announced - http://www.ubuntu.com/testing/intrepid/beta . It contains the 2.6.27 Ubuntu kernel. It would be great if you could test and verify if this is still an issue. The status is being set to Incomplete until we receive further feedback. Thanks.
2009-01-08 17:47:35 Leann Ogasawara linux: status Incomplete Won't Fix
2009-01-08 17:47:35 Leann Ogasawara linux: statusexplanation The Intrepid Ibex 8.10 Beta release was most recently announced - http://www.ubuntu.com/testing/intrepid/beta . It contains the 2.6.27 Ubuntu kernel. It would be great if you could test and verify if this is still an issue. The status is being set to Incomplete until we receive further feedback. Thanks.
2009-01-24 00:08:45 James Troup bug added subscriber The Canonical Sysadmins
2009-01-24 00:13:24 James Troup linux: status Won't Fix Confirmed
2009-02-05 01:26:00 James Troup bug added attachment 'interdiff' (Patch to fix mono on Xen 64-bit hardy)
2009-02-05 09:19:31 Chris Coulson linux: status Confirmed Triaged
2009-02-05 09:19:31 Chris Coulson linux: importance Undecided High
2009-02-05 09:19:31 Chris Coulson linux: statusexplanation Thanks for the patch James. The bug should probablt be fixed in Jaunty (if it is still a problem there) before porting the patch to the older releases. Could someone test if this is still an issue in Intrepid and Jaunty, or if it is Hardy specific? Which kernel do the PPA build daemons run, as it would be really great to get this fixed there?
2009-02-11 20:11:23 James Troup linux: assignee stefan-bader-canonical
2009-02-11 20:11:23 James Troup linux: statusexplanation Thanks for the patch James. The bug should probablt be fixed in Jaunty (if it is still a problem there) before porting the patch to the older releases. Could someone test if this is still an issue in Intrepid and Jaunty, or if it is Hardy specific? Which kernel do the PPA build daemons run, as it would be really great to get this fixed there?
2009-02-11 20:15:44 Tim Gardner linux: status Triaged In Progress
2009-02-11 20:15:44 Tim Gardner linux: assignee stefan-bader-canonical
2009-02-11 20:16:24 Tim Gardner linux: assignee stefan-bader-canonical
2009-02-11 20:16:24 Tim Gardner linux: milestone ubuntu-8.04.3
2009-02-13 17:06:14 Stefan Bader linux: status New Fix Committed
2009-02-13 17:06:14 Stefan Bader linux: assignee stefan-bader-canonical
2009-02-13 17:06:14 Stefan Bader linux: importance Undecided High
2009-02-13 17:06:14 Stefan Bader linux: statusexplanation Fix committed to Hardy http://kernel.ubuntu.com/git?p=ubuntu/ubuntu-hardy.git;a=commitdiff;h=6b2514fb662158f2def03a618c5c671c95f636a8
2009-02-13 17:06:14 Stefan Bader linux: milestone ubuntu-8.04.3
2009-02-13 17:06:57 Stefan Bader linux: status In Progress Invalid
2009-02-13 17:06:57 Stefan Bader linux: milestone ubuntu-8.04.3
2009-02-13 17:07:29 Stefan Bader bug added subscriber Ubuntu Stable Release Updates Team
2009-02-18 16:56:54 Stefan Bader description Binary package hint: linux-image-2.6.24-18-xen Description: Ubuntu 8.04 Release: 8.04 linux-image-2.6.24-18-xen: Installed: 2.6.24-18.32 Mono applications exit with the following error: TYPE: 1 ** ** ERROR:(mini-amd64.c:192):amd64_patch: assertion failed: (amd64_is_imm32 (disp)) Further investigation indicates that linux-image-2.6.24-18-xen does not obey to the MAP_32BIT flag. Here a relevant portion of the strace of a failing mono app (f-spot): mmap(NULL, 2113464, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7f0c1f62f000 mmap(NULL, 2132968, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7f0c1f426000 mmap(NULL, 2881032, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7f0c1f166000 mmap(NULL, 2109728, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7f0c1ef62000 mmap(NULL, 2208624, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7f0c1ed46000 mmap(NULL, 2621672, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7f0c1eac5000 mmap(NULL, 3543672, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7f0c1e763000 mmap(NULL, 2209176, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7f0c1e547000 mmap(NULL, 2249472, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7f0c1e321000 mmap(NULL, 65536, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_ANONYMOUS|0x40, -1, 0) = 0x7f0c1f903000 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ mmap(NULL, 16384, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f0c1f8cf000 mmap(NULL, 2131184, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7f0c1df1e000 mmap(NULL, 2198224, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7f0c1dd05000 mmap(NULL, 2139352, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7f0c1dafa000 mmap(NULL, 2143528, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7f0c1d8ee000 mmap(NULL, 65536, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_ANONYMOUS|0x40, -1, 0) = 0x7f0c1f8af000 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ mmap(NULL, 2151816, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7f0c1d110000 SRU justification: Impact: The 64bit XEN kernel does not honour the MAP_32BIT flag. This reason for this is a change that removed the arch_get_unmapped_area_topdown() function from the code (probably to resolve a defined twice error) Fix: attached patch to restore the architecture specific function and to define ARCH_HAVE_UNMAPPED_AREA_TOPDOWN Testcase: running mono applications on 64bit XEN kernels. Binary package hint: linux-image-2.6.24-18-xen Description: Ubuntu 8.04 Release: 8.04 linux-image-2.6.24-18-xen: Installed: 2.6.24-18.32 Mono applications exit with the following error: TYPE: 1 ** ** ERROR:(mini-amd64.c:192):amd64_patch: assertion failed: (amd64_is_imm32 (disp)) Further investigation indicates that linux-image-2.6.24-18-xen does not obey to the MAP_32BIT flag. Here a relevant portion of the strace of a failing mono app (f-spot): mmap(NULL, 2113464, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7f0c1f62f000 mmap(NULL, 2132968, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7f0c1f426000 mmap(NULL, 2881032, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7f0c1f166000 mmap(NULL, 2109728, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7f0c1ef62000 mmap(NULL, 2208624, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7f0c1ed46000 mmap(NULL, 2621672, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7f0c1eac5000 mmap(NULL, 3543672, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7f0c1e763000 mmap(NULL, 2209176, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7f0c1e547000 mmap(NULL, 2249472, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7f0c1e321000 mmap(NULL, 65536, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_ANONYMOUS|0x40, -1, 0) = 0x7f0c1f903000 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ mmap(NULL, 16384, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f0c1f8cf000 mmap(NULL, 2131184, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7f0c1df1e000 mmap(NULL, 2198224, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7f0c1dd05000 mmap(NULL, 2139352, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7f0c1dafa000 mmap(NULL, 2143528, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7f0c1d8ee000 mmap(NULL, 65536, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_ANONYMOUS|0x40, -1, 0) = 0x7f0c1f8af000 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ mmap(NULL, 2151816, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7f0c1d110000
2009-02-19 02:19:26 Steve Langasek bug added subscriber SRU Verification
2009-03-15 15:37:45 Celso Providelo launchpad-buildd: assignee adconrad
2009-03-15 15:37:45 Celso Providelo launchpad-buildd: statusexplanation What's the plan for upgrading our buildds ?
2009-03-25 19:34:08 Adam Conrad launchpad-buildd: status New Fix Released
2009-05-04 09:35:17 Launchpad Janitor linux (Ubuntu Hardy): status Fix Committed Fix Released
2009-05-04 09:35:17 Launchpad Janitor cve linked 2008-4307
2009-05-04 09:35:17 Launchpad Janitor cve linked 2008-6107
2009-05-04 09:35:17 Launchpad Janitor cve linked 2009-0028
2009-05-04 09:35:17 Launchpad Janitor cve linked 2009-0031
2009-05-04 09:35:17 Launchpad Janitor cve linked 2009-0065
2009-05-04 09:35:17 Launchpad Janitor cve linked 2009-0269
2009-05-04 09:35:17 Launchpad Janitor cve linked 2009-0322
2009-05-04 09:35:17 Launchpad Janitor cve linked 2009-0675
2009-05-04 09:35:17 Launchpad Janitor cve linked 2009-0676
2009-05-04 09:35:17 Launchpad Janitor cve linked 2009-0745
2009-05-04 09:35:17 Launchpad Janitor cve linked 2009-0746
2009-05-04 09:35:17 Launchpad Janitor cve linked 2009-0834
2009-05-04 09:35:17 Launchpad Janitor cve linked 2009-0835
2009-05-04 09:35:17 Launchpad Janitor cve linked 2009-0859
2009-05-04 09:35:17 Launchpad Janitor cve linked 2009-1046