Bug 126913
Summary: | single-stepping sigreturn appears to execute two insns on ia64 | ||||||
---|---|---|---|---|---|---|---|
Product: | Red Hat Enterprise Linux 3 | Reporter: | Andrew Cagney <cagney> | ||||
Component: | kernel | Assignee: | Anil S Keshavamurthy <akeshava> | ||||
Status: | CLOSED WONTFIX | QA Contact: | Brian Brock <bbrock> | ||||
Severity: | medium | Docs Contact: | |||||
Priority: | medium | ||||||
Version: | 3.0 | CC: | bjorn.helgaas, dhowells, dwmw2, ezannoni, grgustaf, jbaron, jjohnstn, jparadis, mingo, peterm, petrides, riel, roland | ||||
Target Milestone: | --- | ||||||
Target Release: | --- | ||||||
Hardware: | ia64 | ||||||
OS: | Linux | ||||||
Whiteboard: | |||||||
Fixed In Version: | Doc Type: | Bug Fix | |||||
Doc Text: | Story Points: | --- | |||||
Clone Of: | Environment: | ||||||
Last Closed: | 2007-10-19 19:23:18 UTC | Type: | --- | ||||
Regression: | --- | Mount Type: | --- | ||||
Documentation: | --- | CRM: | |||||
Verified Versions: | Category: | --- | |||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
Cloudforms Team: | --- | Target Upstream Version: | |||||
Embargoed: | |||||||
Bug Depends On: | 126095 | ||||||
Bug Blocks: | 125157, 126089 | ||||||
Attachments: |
|
Description
Andrew Cagney
2004-06-28 23:35:22 UTC
Created attachment 101494 [details]
Program that throws/catches a sigsegv
Jason, this looks related to bug #126699, but since this one is being reported on a different architecture, I won't close it as a dup (in case the fixes need to be kept separate). Larry Wodman has asked HP for help with this Bug. Therefore opening this bugzilla to HP-Confidential group as well as RH-Development. -----Original Message----- From: Helgaas, Bjorn Sent: Tuesday, September 14, 2004 9:17 AM To: Pherigo, Suzanne S Subject: Fwd: HP RHEL3 update features I don't know anything about the defects Larry mentions, and I don't have permissions to read the bugzilla entries. Do you have any information? ---------- Forwarded Message ---------- Subject: HP RHEL3 update features Date: Tuesday 14 September 2004 9:01 am From: Larry Woodman <lwoodman> To: Bjorn Helgaas <bjorn.helgaas> Cc: Peter Martuccelli <peterm>, Tim Burke <tburke> Hi Bjorn, we are looking at a couple IA64 features from HP for RHEL3 that, quite frankly,wont get done in the RHEL3-U4 timeframe unless you guys can help us out. Can you takea look at these two bugs and 1.) determine if they are important enough to be implemented by the end of September and 2.) implement them if they really are important. 1.) Bug 126095: GDB can't examine / write to ia64 signal trampoline (aka gate page) 2.) Bug 126913: single-stepping sigreturn appears to execute two in sns on ia64 Thanks, Larry Bjorn Helgass of HP replies: Did HP put these on some must-fix list or something? I haven't found anyone here who knows about them, so I don't have any information that says they're urgent. Seems like the easiest way to proceed is to try to reproduce it on a current upstream kernel. If you can, more people will be interested in helping to fix it. If you can't, then you've narrowed down the places to look. An (untested) fix for this problem has just been committed to the RHEL3 U4 patch pool this evening (in kernel version 2.4.21-21.EL). An errata has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on the solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHBA-2004-550.html According to test results shown to me by jeff (now that it is possible to examine memory) this bug is occuring in rhel3. Jeff, can you attach the testresults and confirm this. are there any additional test results, as mentioned in comment #10? This bug is filed against RHEL 3, which is in maintenance phase. During the maintenance phase, only security errata and select mission critical bug fixes will be released for enterprise products. Since this bug does not meet that criteria, it is now being closed. For more information of the RHEL errata support policy, please visit: http://www.redhat.com/security/updates/errata/ If you feel this bug is indeed mission critical, please contact your support representative. You may be asked to provide detailed information on how this bug is affecting you. |