Bug 456218 - kernel: serial open/close loop disables irq [rhel-5.3]
kernel: serial open/close loop disables irq [rhel-5.3]
Status: CLOSED ERRATA
Product: Red Hat Enterprise Linux 5
Classification: Red Hat
Component: kernel (Show other bugs)
5.3
All Linux
low Severity low
: rc
: ---
Assigned To: Eugene Teo (Security Response)
Martin Jenner
:
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2008-07-22 05:51 EDT by Eugene Teo (Security Response)
Modified: 2009-01-20 15:22 EST (History)
2 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2009-01-20 15:22:39 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)
Upstream patch for this issue (1.20 KB, patch)
2008-07-22 05:55 EDT, Eugene Teo (Security Response)
no flags Details | Diff
Proposed backported patch (955 bytes, patch)
2008-07-22 05:59 EDT, Eugene Teo (Security Response)
no flags Details | Diff
Reproducer (255 bytes, text/plain)
2008-07-22 06:00 EDT, Eugene Teo (Security Response)
no flags Details

  None (edit)
Description Eugene Teo (Security Response) 2008-07-22 05:51:49 EDT
A Debian user reported that a simple program that repeatedly opens and closes a
serial device will eventually cause an irq line to be disabled.

References:
http://bugzilla.kernel.org/show_bug.cgi?id=7750
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=404815
Comment 2 Eugene Teo (Security Response) 2008-07-22 05:55:50 EDT
Created attachment 312322 [details]
Upstream patch for this issue
Comment 3 Eugene Teo (Security Response) 2008-07-22 05:59:10 EDT
Created attachment 312323 [details]
Proposed backported patch
Comment 4 Eugene Teo (Security Response) 2008-07-22 06:00:13 EDT
Created attachment 312324 [details]
Reproducer

Source: http://bugzilla.kernel.org/attachment.cgi?id=9958&action=view
Comment 5 Eugene Teo (Security Response) 2008-07-22 06:09:14 EDT
The bug is reported to be reproducible if the kernel is compiled with
CONFIG_PREEMPT_NONE=y. I have tested this on rhel-4, and rhel-5, but without
success. On rhel-5, the kernel is compiled with CONFIG_PREEMPT_VOLUNTARY=y, and
/dev/ttyS* are not accessible to local unprivileged users (unless you are in
uucp group for /dev/ttyS[1-3]). Let's get it fixed anyway.
Comment 7 RHEL Product and Program Management 2008-07-22 09:31:48 EDT
This request was evaluated by Red Hat Product Management for inclusion in a Red
Hat Enterprise Linux maintenance release.  Product Management has requested
further review of this request by Red Hat Engineering, for potential
inclusion in a Red Hat Enterprise Linux Update release for currently deployed
products.  This request is not yet committed for inclusion in an Update
release.
Comment 8 Don Zickus 2008-07-25 16:26:56 EDT
in kernel-2.6.18-100.el5
You can download this test kernel from http://people.redhat.com/dzickus/el5
Comment 12 errata-xmlrpc 2009-01-20 15:22:39 EST
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on therefore solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.

http://rhn.redhat.com/errata/RHSA-2009-0225.html

Note You need to log in before you can comment on or make changes to this bug.