Your message dated Sat, 07 Oct 2017 11:47:42 +0000 with message-id <[email protected]> and subject line Bug#872257: fixed in qemu 1:2.8+dfsg-6+deb9u3 has caused the Debian Bug report #872257, regarding qemu-system-x86: /usr/bin/qemu-system-i386 eats slowly but surely all the Dom0 memory to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [email protected] immediately.) -- 872257: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=872257 Debian Bug Tracking System Contact [email protected] with problems
--- Begin Message ---Package: qemu-system-x86 Version: 1:2.8+dfsg-6+deb9u2 Severity: normal Dear Maintainer, *** Reporter, please consider answering these questions, where appropriate *** * What led up to the situation? Upgrade to last stable version. And restart VM. * What exactly did you do (or not do) that was effective (or ineffective)? Restart DomU. Reboot server. * What was the outcome of this action? Nothing. * What outcome did you expect instead? Don't eat all the Dom0 memory... *** End of the template - remove these template lines *** -- System Information: Debian Release: 9.1 APT prefers stable APT policy: (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 4.9.0-3-amd64 (SMP w/2 CPU cores) Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8), LANGUAGE=fr_FR.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) Versions of packages qemu-system-x86 depends on: ii ipxe-qemu 1.0.0+git-20161027.b991c67-1 ii libaio1 0.3.110-3 ii libasound2 1.1.3-5 ii libbluetooth3 5.43-2 ii libbrlapi0.6 5.4-7 ii libc6 2.24-11+deb9u1 ii libcacard0 1:2.5.0-3 ii libfdt1 1.4.2-1 ii libgcc1 1:6.3.0-18 ii libglib2.0-0 2.50.3-2 ii libgnutls30 3.5.8-5+deb9u2 ii libjpeg62-turbo 1:1.5.1-2 ii libncursesw5 6.0+20161126-1 ii libnettle6 3.3-1+b1 ii libnuma1 2.0.11-2.1 ii libpixman-1-0 0.34.0-1 ii libpng16-16 1.6.28-1 ii libpulse0 10.0-1+deb9u1 ii libsasl2-2 2.1.27~101-g0780600+dfsg-3 ii libsdl1.2debian 1.2.15+dfsg1-4 ii libseccomp2 2.3.1-2.1 ii libspice-server1 0.12.8-2.1+deb9u1 ii libtinfo5 6.0+20161126-1 ii libusb-1.0-0 2:1.0.21-1 ii libusbredirparser1 0.7.1-1 ii libvdeplug2 2.3.2+r586-2.1 ii libx11-6 2:1.6.4-3 ii libxen-4.8 4.8.1-1+deb9u1 ii libxenstore3.0 4.8.1-1+deb9u1 ii qemu-system-common 1:2.8+dfsg-6+deb9u2 ii seabios 1.10.2-1 ii zlib1g 1:1.2.8.dfsg-5 Versions of packages qemu-system-x86 recommends: ii qemu-utils 1:2.8+dfsg-6+deb9u2 Versions of packages qemu-system-x86 suggests: ii kmod 23-2 pn ovmf <none> pn qemu-block-extra <none> pn samba <none> pn sgabios <none> pn vde2 <none> -- no debconf information When I downgrade to the previous versions, "qemu-system-i386" don't eats all memory.
--- End Message ---
--- Begin Message ---Source: qemu Source-Version: 1:2.8+dfsg-6+deb9u3 We believe that the bug you reported is fixed in the latest version of qemu, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [email protected], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Michael Tokarev <[email protected]> (supplier of updated qemu package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [email protected]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Format: 1.8 Date: Mon, 02 Oct 2017 16:11:47 +0300 Source: qemu Binary: qemu qemu-system qemu-block-extra qemu-system-common qemu-system-misc qemu-system-arm qemu-system-mips qemu-system-ppc qemu-system-sparc qemu-system-x86 qemu-user qemu-user-static qemu-user-binfmt qemu-utils qemu-guest-agent qemu-kvm Architecture: source Version: 1:2.8+dfsg-6+deb9u3 Distribution: stretch-security Urgency: high Maintainer: Debian QEMU Team <[email protected]> Changed-By: Michael Tokarev <[email protected]> Description: qemu - fast processor emulator qemu-block-extra - extra block backend modules for qemu-system and qemu-utils qemu-guest-agent - Guest-side qemu-system agent qemu-kvm - QEMU Full virtualization on x86 hardware qemu-system - QEMU full system emulation binaries qemu-system-arm - QEMU full system emulation binaries (arm) qemu-system-common - QEMU full system emulation binaries (common files) qemu-system-mips - QEMU full system emulation binaries (mips) qemu-system-misc - QEMU full system emulation binaries (miscellaneous) qemu-system-ppc - QEMU full system emulation binaries (ppc) qemu-system-sparc - QEMU full system emulation binaries (sparc) qemu-system-x86 - QEMU full system emulation binaries (x86) qemu-user - QEMU user mode emulation binaries qemu-user-binfmt - QEMU user mode binfmt registration for qemu-user qemu-user-static - QEMU user mode emulation binaries (static version) qemu-utils - QEMU utilities Closes: 864219 869945 871648 871702 872257 873849 873851 873875 874606 Changes: qemu (1:2.8+dfsg-6+deb9u3) stretch-security; urgency=high . * xhci-dont-kick-in-xhci_submit-and-xhci_fire_ctl_transfer.patch This is a pre-required patch for the next patch to work right. Closes: #869945 * xhci-guard-xhci_kick_epctx-against-recursive-calls-CVE-2017-9375.patch After applying previous patch, this one can be applied again Closes: #864219, CVE-2017-9375 * ide-do-not-flush-empty-CDROM-drives-CVE-2017-12809.patch Closes: #873849, CVE-2017-12809 * vga-stop-passing-pointers-to-vga_draw_line-functions-CVE-2017-13672.patch Closes: #873851, CVE-2017-13672 * multiboot-validate-multiboot-header-address-values-CVE-2017-14167.patch Closes: #874606, CVE-2017-14167 * slirp-fix-clearing-ifq_so-from-pending-packets-CVE-2017-13711.patch Closes: #873875, CVE-2017-13711 * exec-add-lock-parameter-to-qemu_ram_ptr_length.patch upstream patch fixing memory leak after exec-use-qemu_ram_ptr_length-to-access-guest-ram-CVE-2017-11334.patch Closes: #871648, #871702, #872257 Checksums-Sha1: 86b9489c5f1d443c84bc4973fd9071d913737a9c 5579 qemu_2.8+dfsg-6+deb9u3.dsc 58ba5aa2e6562d59d113820dba69aacb050eb59c 130256 qemu_2.8+dfsg-6+deb9u3.debian.tar.xz 1ca8bb7235b37b4f7b2634913b92bac3ae084c94 10818 qemu_2.8+dfsg-6+deb9u3_source.buildinfo Checksums-Sha256: 1328b57741bba1ee5f8ab5e5ab2e7a3a0eb78791151d72fd48de8226b3ebb85d 5579 qemu_2.8+dfsg-6+deb9u3.dsc ef24cad8ee55f4ceb7a9b52de81ec61e8386249b921f656438ef939a4979a419 130256 qemu_2.8+dfsg-6+deb9u3.debian.tar.xz 2e61af972fe8525142ac3b63f1145d77e015c38cb459e7329a9e0094a5b579d7 10818 qemu_2.8+dfsg-6+deb9u3_source.buildinfo Files: a76e0dc92a5e609f23deaae8fddc18ca 5579 otherosfs optional qemu_2.8+dfsg-6+deb9u3.dsc 8010d49ac95ca2fa07faa682a5d967dd 130256 otherosfs optional qemu_2.8+dfsg-6+deb9u3.debian.tar.xz a8357f2c157e24c2f2003bc1c287951d 10818 otherosfs optional qemu_2.8+dfsg-6+deb9u3_source.buildinfo -----BEGIN PGP SIGNATURE----- iQFDBAEBCAAtFiEEe3O61ovnosKJMUsicBtPaxppPlkFAlnSO10PHG1qdEB0bHMu bXNrLnJ1AAoJEHAbT2saaT5ZA+8H/jZGNDjA1sUInHuHWJFr0pFLO8L3iKeKmZzj P5bXARMqBRIIzOvUKTv0DTqFr3L1ablR0ooviZXDOvAKEUXBeWuuUyndeETm9y8/ T/H6Utr6pGD6ToNn36ev5qYLjabtSis+W9YRMlSYqZAjvoNTPhPPuiscl/NjqzOg OpZfs9kS1r4glmvygv1D6JD6iWSuPLUsWEH1aNnDe7LPOdbAFo3snF5zh7JKuMus jTBafv1X5Z/bUZ6lL31BcVr2zGhjD9qaH/X7eYMVD9O160J1fCnvZBKOh29nRo1d NaesLFXtn/mF7p26d8Xl5HivVLuS/R4V0aSfY0y2xq5wFC6LiAg= =H33i -----END PGP SIGNATURE-----
--- End Message ---

