[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#414890: marked as done (linux-image-2.6.18-4-xen-686: domU NFS server crashes dom0)



Your message dated Sun, 6 Jul 2008 11:26:50 +0200
with message-id <20080706092650.GD21779@stro.at>
and subject line Re: linux-image-2.6.18-4-xen-686: domU NFS server crashes dom0
has caused the Debian Bug report #414890,
regarding linux-image-2.6.18-4-xen-686: domU NFS server crashes dom0
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
414890: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414890
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: linux-image-2.6.18-4-xen-686
Version: 2.6.18.dfsg.1-11
Severity: normal


Hello. I run a Xen 2.8.18-4 kernel on my server. One of the domU's is an 
NFS file server. When I mount an NFS share on my desktop and upload a 
few gigabyte of information quickly then the entire dom0 on the server 
crashes, leaves a bunch of "Message from syslogd@<mydom0>" on the 
console, hangs and needs to be rebooted.

After the reboot no crash information can be found on the system. 
/var/log/kern.log, /var/log/dmesg.*, /var/log/messages and 
/var/log/xen/xend.log are all clean.

The only way I can think of to capture the crash data is a serial 
console. I don't have one so I don't have a crash log. Sorry :-(

-- System Information:
Debian Release: 4.0
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-4-k7
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)


--- End Message ---
--- Begin Message ---
Version: 2.6.25-1

upstream merged paravirt_ops Xen. it features enhanced netxen
and block modules.

as this code got rewritten old bug no longer apply.
for guest system it is recommend to upgrade to newer xen.
for more infos on upstream merge status see
http://wiki.xensource.com/xenwiki/XenParavirtOps

for latest 2.6.26-rc8 linux images see
http://wiki.debian.org/DebianKernel

thanks for your report.


-- 
maks


--- End Message ---

Reply to: