Your message dated Sat, 30 Aug 2008 07:52:21 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#410807: fixed in user-mode-linux 2.6.18-1um-2etch.22etch1
has caused the Debian Bug report #410807,
regarding xen-linux-system-2.6.18-5-xen-amd64: Starting domU results in kernel
panic
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)
--
410807: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=410807
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: xen-linux-system-2.6.18-5-xen-amd64
Version: 2.6.18.dfsg.1-13etch2
Severity: critical
Justification: breaks the whole system
On a dual-processor, quad-core Xeon system, after running successfully for a
few days, I created and then started another domU (the 4th one, I think),
resulting in a kernel panic requiring a hard reset.
After changing dom0-cpus to 1, this problem has not reoccurred. However, using
1 core out of 8 makes this workaround pretty worthless.
Syslog:
Sep 17 12:49:43 xen1 kernel: Kernel BUG at drivers/xen/core/evtchn.c:481
Sep 17 12:49:43 xen1 kernel: invalid opcode: 0000 [1] SMP
Sep 17 12:49:43 xen1 kernel: CPU 1
Sep 17 12:49:43 xen1 kernel: Modules linked in: xt_tcpudp xt_physdev
iptable_filter ip_tables x_tables bridge netloop button ac battery ipv6
w83627hf w83781d hwmon_vid i2c_isa loop psmouse i2c_i801 serial_core serio_raw
i2c_core evdev pcspkr shpchp pci_hotplug ext3 jbd mbcache dm_mirror dm_snapshot
dm_mod raid1 md_mod ide_generic sd_mod ide_cd cdrom ata_piix piix libata
scsi_mod floppy generic ide_core ehci_hcd uhci_hcd e1000 fan
Sep 17 12:49:43 xen1 kernel: Pid: 37, comm: xenwatch Not tainted
2.6.18-5-xen-amd64 #1
Sep 17 12:49:43 xen1 kernel: RIP: e030:[<ffffffff80360ee3>]
[<ffffffff80360ee3>] retrigger+0x26/0x3e
Sep 17 12:49:43 xen1 kernel: RSP: e02b:ffff8801ef5bfd88 EFLAGS: 00010046
Sep 17 12:49:43 xen1 kernel: RAX: 0000000000000000 RBX: 0000000000009280 RCX:
ffffffffff578000
Sep 17 12:49:43 xen1 kernel: RDX: 0000000000000037 RSI: ffff8801ef5bfd30 RDI:
0000000000000125
Sep 17 12:49:43 xen1 kernel: RBP: ffffffff804ce700 R08: ffff8801ef4eeef0 R09:
ffff88017e5f2500
Sep 17 12:49:43 xen1 kernel: R10: ffff88017e5f2000 R11: ffffffff80360ebd R12:
0000000000000125
Sep 17 12:49:43 xen1 kernel: R13: ffffffff804ce73c R14: 0000000000000000 R15:
0000000000000008
Sep 17 12:49:43 xen1 kernel: FS: 00002ab373747510(0000)
GS:ffffffff804c4080(0000) knlGS:0000000000000000
Sep 17 12:49:43 xen1 kernel: CS: e033 DS: 0000 ES: 0000
Sep 17 12:49:43 xen1 kernel: Process xenwatch (pid: 37, threadinfo
ffff8801ef5be000, task ffff8801ef59c080)
Sep 17 12:49:43 xen1 kernel: Stack: ffffffff802a0646 ffff88017e5f2500
ffff88017e5f2500 0000000000000000
Sep 17 12:49:43 xen1 kernel: ffff8801ef5bfde0 000000000000020b
ffffffff8036da4e 0000000000000000
Sep 17 12:49:43 xen1 kernel: ffffffff8036dec6 ffff8801ef5bfea4
Sep 17 12:49:43 xen1 kernel: Call Trace:
Sep 17 12:49:43 xen1 kernel: [<ffffffff802a0646>] enable_irq+0x9d/0xbc
Sep 17 12:49:43 xen1 kernel: [<ffffffff8036da4e>] __netif_up+0xc/0x15
Sep 17 12:49:43 xen1 kernel: [<ffffffff8036dec6>] netif_map+0x2a6/0x2d8
Sep 17 12:49:43 xen1 kernel: [<ffffffff8035c227>] bus_for_each_dev+0x61/0x6e
Sep 17 12:49:43 xen1 kernel: [<ffffffff803666d0>] xenwatch_thread+0x0/0x145
Sep 17 12:49:43 xen1 kernel: [<ffffffff803666d0>] xenwatch_thread+0x0/0x145
Sep 17 12:49:43 xen1 kernel: [<ffffffff80368210>] frontend_changed+0x2ba/0x4f9
Sep 17 12:49:43 xen1 kernel: [<ffffffff803666d0>] xenwatch_thread+0x0/0x145
Sep 17 12:49:43 xen1 kernel: [<ffffffff8028f837>]
keventd_create_kthread+0x0/0x61
Sep 17 12:49:43 xen1 kernel: [<ffffffff80365ade>]
xenwatch_handle_callback+0x15/0x48
Sep 17 12:49:43 xen1 kernel: [<ffffffff803667fd>] xenwatch_thread+0x12d/0x145
Sep 17 12:49:43 xen1 kernel: [<ffffffff8028f9fa>]
autoremove_wake_function+0x0/0x2e
Sep 17 12:49:43 xen1 kernel: [<ffffffff8028f837>]
keventd_create_kthread+0x0/0x61
Sep 17 12:49:43 xen1 kernel: [<ffffffff803666d0>] xenwatch_thread+0x0/0x145
Sep 17 12:49:43 xen1 kernel: [<ffffffff802334da>] kthread+0xd4/0x107
Sep 17 12:49:43 xen1 kernel: [<ffffffff8025c7d8>] child_rip+0xa/0x12
Sep 17 12:49:43 xen1 kernel: [<ffffffff8028f837>]
keventd_create_kthread+0x0/0x61
Sep 17 12:49:43 xen1 kernel: [<ffffffff80233406>] kthread+0x0/0x107
Sep 17 12:49:43 xen1 kernel: [<ffffffff8025c7ce>] child_rip+0x0/0x12
Sep 17 12:49:43 xen1 kernel:
Sep 17 12:49:43 xen1 kernel:
Sep 17 12:49:43 xen1 kernel: Code: 0f 0b 68 74 db 41 80 c2 e1 01 f0 0f ab 91 00
08 00 00 b8 01
Sep 17 12:49:43 xen1 kernel: RIP [<ffffffff80360ee3>] retrigger+0x26/0x3e
Sep 17 12:49:43 xen1 kernel: RSP <ffff8801ef5bfd88>
-- System Information:
Debian Release: etch/sid
APT prefers stable
APT policy: (500, 'stable')
Architecture: amd64 (x86_64)
Shell: /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-5-xen-amd64
Locale: LANG=en_NZ, LC_CTYPE=en_NZ (charmap=ISO-8859-1)
Versions of packages xen-linux-system-2.6.18-5-xen-amd64 depends on:
ii linux-image-2.6.18 2.6.18.dfsg.1-13etch2 Linux 2.6.18 image on AMD64
ii xen-hypervisor-3.0 3.0.3-0-2 The Xen Hypervisor on AMD64
xen-linux-system-2.6.18-5-xen-amd64 recommends no packages.
-- no debconf information
--- End Message ---
--- Begin Message ---
Source: user-mode-linux
Source-Version: 2.6.18-1um-2etch.22etch1
We believe that the bug you reported is fixed in the latest version of
user-mode-linux, which is due to be installed in the Debian FTP archive:
user-mode-linux_2.6.18-1um-2etch.22etch1.diff.gz
to
pool/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.22etch1.diff.gz
user-mode-linux_2.6.18-1um-2etch.22etch1.dsc
to pool/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.22etch1.dsc
user-mode-linux_2.6.18-1um-2etch.22etch1_i386.deb
to
pool/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.22etch1_i386.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
dann frazier <[EMAIL PROTECTED]> (supplier of updated user-mode-linux package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Wed, 6 Aug 2008 00:40:06 -0600
Source: user-mode-linux
Binary: user-mode-linux
Architecture: source i386
Version: 2.6.18-1um-2etch.22etch1
Distribution: stable-security
Urgency: high
Maintainer: User Mode Linux Maintainers <[EMAIL PROTECTED]>
Changed-By: dann frazier <[EMAIL PROTECTED]>
Description:
user-mode-linux - User-mode Linux (kernel)
Closes: 410807 479773
Changes:
user-mode-linux (2.6.18-1um-2etch.22etch1) stable-security; urgency=high
.
* Rebuild against linux-source-2.6.18_2.6.18.dfsg.1-22etch1:
* bugfix/sctp-make-sure-n-sizeof-does-not-overflow.patch
[SECURITY] Fix potential overflow condition in
sctp_getsockopt_local_addrs_old
See CVE-2008-2826
* bugfix/esp-iv-in-linear-part-of-skb.patch
[SECURITY] Avoid tripping BUG() in IPsec code when the first fragment
of an ESP packet does not contain the entire ESP header and IV
See CVE-2007-6282
* bugfix/amd64-fix-zeroing-on-exception-in-copy_user.patch
[SECURITY] [amd64] Fix potential information leak when a copy
operation fails by properly zeroing out destination memory
See CVE-2008-2729
* bugfix/tty-fix-for-tty-operations-bugs.patch
[SECURITY] Fix issues with tty operation handling in various drivers
See CVE-2008-2812
* bugfix/check-privileges-before-setting-mount-propagation.patch
[SECURITY] Check CAP_SYS_ADMIN when changing mountpoint type
See CVE-2008-2931
* bugfix/x86-fix-copy_user.patch
[SECURITY][amd64] Fix memory leak in the copy_user routine, see #490910.
See CVE-2008-0598
* Changes from 2.6.18.dfsg.1-22:
* Merge in changes from 2.6.18.dfsg.1-18etch6
* 3w-9xxx: Add 3ware 9690SA Backport (closes: #479773)
* Backport http://xenbits.xensource.com/xen-unstable.hg?rev/914304b3a3da,
fixing kernel BUG at drivers/xen/core/evtchn.c:481 (closes: #410807).
* Changes from 2.6.18.dfsg.1-18etch6
* bugfix/dccp-feature-length-check.patch
[SECURITY] Validate feature length to avoid heap overflow
See CVE-2008-2358
* bugfix/asn1-ber-decoding-checks.patch
[SECURITY] Validate lengths in ASN.1 decoding code to avoid
heap overflow
See CVE-2008-1673
Files:
5cb0d6498fdb81826ae87ed1505d3617 892 misc extra
user-mode-linux_2.6.18-1um-2etch.22etch1.dsc
03ca670996b8db498c46da96c6769b9a 17971 misc extra
user-mode-linux_2.6.18-1um-2etch.22etch1.diff.gz
4bad5f3d2a7179063d0a7e696def9402 25590314 misc extra
user-mode-linux_2.6.18-1um-2etch.22etch1_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iD8DBQFImU2chuANDBmkLRkRAq4FAJ4s1q9ehR7dnPQR6B67fII6pIYXYQCggC+Q
lokeCWmRRKjMjzOclRHBElA=
=GPb1
-----END PGP SIGNATURE-----
--- End Message ---