Your message dated Tue, 01 May 2007 21:02:02 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#420708: fixed in kernel-patch-openvz 028.18.2
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: kernel-patch-openvz
Version: 028.18.1
Severity: important


-- System Information:
Debian Release: lenny/sid
  APT prefers testing-proposed-updates
  APT policy: (500, 'testing-proposed-updates'), (500, 'testing')
Architecture: i386 (i686)

Kernel: Linux 2.6.18vz001 (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages kernel-patch-openvz depends on:
ii  bash                          3.1dfsg-8  The GNU Bourne Again SHell
ii  grep-dctrl                    2.9.3      Grep Debian package information - 
ii  patch                         2.5.9-4    Apply a diff file to an original

kernel-patch-openvz recommends no packages.

-- no debconf information

This occurs sometimes during boot. I notice the bug when I log into KDE and 
get a message stating that the dbus system is not started. VZ init.d script 
is disabled and no virtual systems are during system boot.

This is the report in dmesg:

------------[ cut here ]------------
kernel BUG at drivers/cpufreq/cpufreq_userspace.c:138!
invalid opcode: 0000 [#1]
SMP
Modules linked in: cpufreq_ondemand cpufreq_userspace cpufreq_powersave 
speedstep_centrino freq_table rfcomm l2cap bluetooth ppdev parport_pc lp 
parport button ac battery xt_mac xt_tcpudp ip6table_filter ip6_tables 
xt_state xt_pkttype iptable_raw xt_CLASSIFY xt_CONNMARK xt_MARK xt_length 
xt_connmark xt_physdev bridge xt_policy xt_multiport xt_conntrack 
iptable_mangle ipt_ULOG ipt_TTL ipt_ttl ipt_TOS ipt_tos ipt_TCPMSS ipt_SAME 
ipt_REJECT ipt_REDIRECT ipt_recent ipt_owner ipt_NETMAP ipt_MASQUERADE 
ipt_LOG ipt_iprange ipt_hashlimit ipt_ECN ipt_ecn ipt_DSCP ipt_dscp 
ipt_CLUSTERIP ipt_ah ipt_addrtype ip_nat_irc ip_nat_tftp ip_nat_ftp 
ip_conntrack_irc ip_conntrack_tftp ip_conntrack_ftp iptable_nat ip_nat 
ip_conntrack nfnetlink iptable_filter ip_tables x_tables dummy ipv6 nls_utf8 
hfsplus dm_snapshot dm_mirror dm_mod fuse sbp2 loop snd_hda_intel 
snd_hda_codec snd_pcm_oss snd_mixer_oss snd_pcm snd_timer i2c_i801 rtc snd 
wlan_scan_sta intel_agp agpgart i2c_core pcspkr ath_rate_sample ath_pci wlan 
sky2 uvcvideo videodev v4l1_compat v4l2_common soundcore snd_page_alloc 
ath_hal joydev tsdev evdev eth1394 ext3 jbd mbcache ide_generic usb_storage 
sd_mod usbhid ide_cd cdrom ata_piix libata scsi_mod ohci1394 ieee1394 piix 
generic ide_core uhci_hcd ehci_hcd usbcore thermal processor fan
CPU:    1, VCPU: 0.0
EIP:    0060:[<f929304d>]    Tainted:  P      VLI
EFLAGS: 00010246   (2.6.18vz001 #2)
EIP is at cpufreq_governor_userspace+0x3e/0x13f [cpufreq_userspace]
eax: ffffffff   ebx: f6bfb880   ecx: ffffffea   edx: 00000000
esi: 00000000   edi: ffffffea   ebp: f6bfb880   esp: f6635e2c
ds: 007b   es: 007b   ss: 0068
Process powersaved (pid: 18562, veid: 0, ti=f6634000 task=f7f74df0 
task.ti=f6634000)
Stack: f6bfb880 00000001 c02155f9 f6635e60 00000000 c02e08e0 c0215740 f9293d40
       f6bfb8ac f6bfb880 f6635f2c c0216080 0000000a 00000001 00000002 00000000
       001e8480 000f4240 00002710 000f4240 001e8480 00000000 00000000 f9293d40
 Call Trace:
 [<c02155f9>] __cpufreq_governor+0x3f/0xb9
 [<c0215740>] __cpufreq_set_policy+0xcd/0x100
 [<c0216080>] store_scaling_governor+0x13e/0x17d
 [<c0215903>] handle_update+0x0/0x5
 [<c01b0065>] cfq_kick_queue+0x7c/0x80
 [<c0215f42>] store_scaling_governor+0x0/0x17d
 [<c0215ba9>] store+0x2e/0x3e
 [<c01970c1>] sysfs_write_file+0x91/0xb9
 [<c0197030>] sysfs_write_file+0x0/0xb9
 [<c016107b>] vfs_write+0x83/0x125
 [<c01616c7>] sys_write+0x3c/0x9e
 [<c0102987>] syscall_call+0x7/0xb
Code: 0f 84 c4 00 00 00 31 c9 4a 0f 85 18 01 00 00 0f a3 35 10 96 31 c0 19 c0 
b9 ea ff ff ff 85 c0 0f 84 02 01 00 00 83 7b 20 00 75 0b <0f> 0b 66 b8 8a 00 
b8 0a 32 29 f9 b8 60 3d 29 f9 e8 d3 c0 fe c6
EIP: [<f929304d>] cpufreq_governor_userspace+0x3e/0x13f [cpufreq_userspace] 
SS:ESP 0068:f6635e2c
[drm] Initialized drm 1.0.1 20051102

-- 




--- End Message ---
--- Begin Message ---
Source: kernel-patch-openvz
Source-Version: 028.18.2

We believe that the bug you reported is fixed in the latest version of
kernel-patch-openvz, which is due to be installed in the Debian FTP archive:

kernel-patch-openvz_028.18.2.dsc
  to pool/main/k/kernel-patch-openvz/kernel-patch-openvz_028.18.2.dsc
kernel-patch-openvz_028.18.2.tar.gz
  to pool/main/k/kernel-patch-openvz/kernel-patch-openvz_028.18.2.tar.gz
kernel-patch-openvz_028.18.2_all.deb
  to pool/main/k/kernel-patch-openvz/kernel-patch-openvz_028.18.2_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Ola Lundqvist <[EMAIL PROTECTED]> (supplier of updated kernel-patch-openvz 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Mon, 30 Apr 2007 17:39:18 +0200
Source: kernel-patch-openvz
Binary: kernel-patch-openvz
Architecture: source all
Version: 028.18.2
Distribution: unstable
Urgency: low
Maintainer: Ola Lundqvist <[EMAIL PROTECTED]>
Changed-By: Ola Lundqvist <[EMAIL PROTECTED]>
Description: 
 kernel-patch-openvz - server virtualization solution - kernel patch
Closes: 420708
Changes: 
 kernel-patch-openvz (028.18.2) unstable; urgency=low
 .
   * Applied patch for (Closes: #420708) oops bug. Thanks to
     Alexey Dobriyan <[EMAIL PROTECTED]> for the fix and to
     Joao Sousa <[EMAIL PROTECTED]> for good help.
   * Correction to make it compile on ia64.
Files: 
 331ad03b3364c7bb97b06224c4228ff5 578 devel extra 
kernel-patch-openvz_028.18.2.dsc
 c0f660d2666aeaab21e48b906cf00fef 1579986 devel extra 
kernel-patch-openvz_028.18.2.tar.gz
 28d3a50aff6b216b5655efc9532534e5 1584926 devel extra 
kernel-patch-openvz_028.18.2_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFGN6e5GKGxzw/lPdkRAnbZAJwMo+yFq8X9L4j/rccsjkyB05XD3wCeIwtY
Pu5XRh6X4YDbTgIA/67LQsA=
=1LQW
-----END PGP SIGNATURE-----


--- End Message ---

Reply via email to