--- Begin Message ---
Package: xen-hypervisor-3.0.3-1-i386-pae
Version: 3.0.3-0-2
Hi!
the error suddenly appeared when rebooting one of the etch instances
using xm reboot <name> on our etch server
DEVIDE:~# DEVIDE kernel: ------------[ cut here ]------------
DEVIDE kernel: CPU: 3
DEVIDE:~# Message from syslogd@DEVIDE at Tue May 8 11:45:27 2007 ...
Message from syslogd@DEVIDE at Tue May 8 11:45:27 2007 ...
DEVIDE:~# DEVIDE kernel: kernel BUG at drivers/xen/core/evtchn.c:481!
DEVIDE:~# Message from syslogd@DEVIDE at Tue May 8 11:45:27 2007 ...
DEVIDE:~# DEVIDE kernel: invalid opcode: 0000 [#1]
DEVIDE:~# Message from syslogd@DEVIDE at Tue May 8 11:45:27 2007 ...
DEVIDE:~# DEVIDE kernel: SMP
DEVIDE:~# Message from syslogd@DEVIDE at Tue May 8 11:45:27 2007 ...
DEVIDE:~# DEVIDE kernel: CPU: 3
DEVIDE:~# Message from syslogd@DEVIDE at Tue May 8 11:45:27 2007 ...
DEVIDE kernel: eax: 00000000 ebx: 02080000 ecx: 0000003f edx: f55f6000
DEVIDE:~# DEVIDE kernel: EIP is at retrigger+0x1f/0x35
DEVIDE:~# Message from syslogd@DEVIDE at Tue May 8 11:45:27 2007 ...
DEVIDE:~# DEVIDE kernel: eax: 00000000 ebx: 02080000 ecx: 0000003f
edx: f55f6000
DEVIDE:~# Message from syslogd@DEVIDE at Tue May 8 11:45:27 2007 ...
DEVIDE:~# DEVIDE kernel: esi: c0318a60 edi: 00000122 ebp: 00000000
esp: c039feb0
DEVIDE:~# Message from syslogd@DEVIDE at Tue May 8 11:45:27 2007 ...
DEVIDE:~# DEVIDE kernel: ds: 007b es: 007b ss: 0069
DEVIDE:~# Message from syslogd@DEVIDE at Tue May 8 11:45:27 2007 ...
DEVIDE:~# DEVIDE kernel: Process xenwatch (pid: 17, ti=c039e000
task=c0d8d550 task.ti=c039e000)
DEVIDE:~# Message from syslogd@DEVIDE at Tue May 8 11:45:27 2007 ...
DEVIDE:~# DEVIDE kernel: Stack: c013b259 c0318a60 00000122 c0318a88
c013afaf d8192ec0 00000000 00000000
DEVIDE:~# Message from syslogd@DEVIDE at Tue May 8 11:45:27 2007 ...
DEVIDE:~# DEVIDE kernel: d8192ec0 c02170f0 00000000 c02174d0
c021065f 00000010 00000000 0000020b
DEVIDE:~# Message from syslogd@DEVIDE at Tue May 8 11:45:27 2007 ...
DEVIDE:~# DEVIDE kernel: 0000020a 00000000 00000000 c8af5235
c02e67a4 ee48c000 00000000 00000002
DEVIDE:~# Message from syslogd@DEVIDE at Tue May 8 11:45:27 2007 ...
DEVIDE:~# DEVIDE kernel: Call Trace:
DEVIDE:~# Message from syslogd@DEVIDE at Tue May 8 11:45:27 2007 ...
DEVIDE:~# DEVIDE kernel: Code: ee 85 f6 75 96 58 5a 5b 5e 5f 5d c3 0f b7
0c 85 40 b8 37 c0 8b 15 84 19 2d c0 85 c9 74 1d 0f a3 8a 80 08 00 00 19
c0 85 c0 75 08 <0f> 0b e1 01 b2 1a 2b c0 f0 0f ab 8a 00 08 00 00 b8 01
00 00 00
DEVIDE:~# Message from syslogd@DEVIDE at Tue May 8 11:45:27 2007 ...
DEVIDE:~# DEVIDE kernel: EIP: [<c020c14a>] retrigger+0x1f/0x35 SS:ESP
0069:c039feb0
--- End Message ---
--- Begin Message ---
- To: 410807-close@bugs.debian.org
- Subject: Bug#410807: fixed in user-mode-linux 2.6.18-1um-2etch.22etch1
- From: dann frazier <dannf@debian.org>
- Date: Sat, 30 Aug 2008 07:52:21 +0000
- Message-id: <E1KZLFt-0005ty-Av@ries.debian.org>
Source: user-mode-linux
Source-Version: 2.6.18-1um-2etch.22etch1
We believe that the bug you reported is fixed in the latest version of
user-mode-linux, which is due to be installed in the Debian FTP archive:
user-mode-linux_2.6.18-1um-2etch.22etch1.diff.gz
to pool/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.22etch1.diff.gz
user-mode-linux_2.6.18-1um-2etch.22etch1.dsc
to pool/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.22etch1.dsc
user-mode-linux_2.6.18-1um-2etch.22etch1_i386.deb
to pool/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.22etch1_i386.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 410807@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
dann frazier <dannf@debian.org> (supplier of updated user-mode-linux package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Wed, 6 Aug 2008 00:40:06 -0600
Source: user-mode-linux
Binary: user-mode-linux
Architecture: source i386
Version: 2.6.18-1um-2etch.22etch1
Distribution: stable-security
Urgency: high
Maintainer: User Mode Linux Maintainers <pkg-uml-pkgs@lists.alioth.debian.org>
Changed-By: dann frazier <dannf@debian.org>
Description:
user-mode-linux - User-mode Linux (kernel)
Closes: 410807 479773
Changes:
user-mode-linux (2.6.18-1um-2etch.22etch1) stable-security; urgency=high
.
* Rebuild against linux-source-2.6.18_2.6.18.dfsg.1-22etch1:
* bugfix/sctp-make-sure-n-sizeof-does-not-overflow.patch
[SECURITY] Fix potential overflow condition in
sctp_getsockopt_local_addrs_old
See CVE-2008-2826
* bugfix/esp-iv-in-linear-part-of-skb.patch
[SECURITY] Avoid tripping BUG() in IPsec code when the first fragment
of an ESP packet does not contain the entire ESP header and IV
See CVE-2007-6282
* bugfix/amd64-fix-zeroing-on-exception-in-copy_user.patch
[SECURITY] [amd64] Fix potential information leak when a copy
operation fails by properly zeroing out destination memory
See CVE-2008-2729
* bugfix/tty-fix-for-tty-operations-bugs.patch
[SECURITY] Fix issues with tty operation handling in various drivers
See CVE-2008-2812
* bugfix/check-privileges-before-setting-mount-propagation.patch
[SECURITY] Check CAP_SYS_ADMIN when changing mountpoint type
See CVE-2008-2931
* bugfix/x86-fix-copy_user.patch
[SECURITY][amd64] Fix memory leak in the copy_user routine, see #490910.
See CVE-2008-0598
* Changes from 2.6.18.dfsg.1-22:
* Merge in changes from 2.6.18.dfsg.1-18etch6
* 3w-9xxx: Add 3ware 9690SA Backport (closes: #479773)
* Backport http://xenbits.xensource.com/xen-unstable.hg?rev/914304b3a3da,
fixing kernel BUG at drivers/xen/core/evtchn.c:481 (closes: #410807).
* Changes from 2.6.18.dfsg.1-18etch6
* bugfix/dccp-feature-length-check.patch
[SECURITY] Validate feature length to avoid heap overflow
See CVE-2008-2358
* bugfix/asn1-ber-decoding-checks.patch
[SECURITY] Validate lengths in ASN.1 decoding code to avoid
heap overflow
See CVE-2008-1673
Files:
5cb0d6498fdb81826ae87ed1505d3617 892 misc extra user-mode-linux_2.6.18-1um-2etch.22etch1.dsc
03ca670996b8db498c46da96c6769b9a 17971 misc extra user-mode-linux_2.6.18-1um-2etch.22etch1.diff.gz
4bad5f3d2a7179063d0a7e696def9402 25590314 misc extra user-mode-linux_2.6.18-1um-2etch.22etch1_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iD8DBQFImU2chuANDBmkLRkRAq4FAJ4s1q9ehR7dnPQR6B67fII6pIYXYQCggC+Q
lokeCWmRRKjMjzOclRHBElA=
=GPb1
-----END PGP SIGNATURE-----
--- End Message ---