[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#439149: marked as done (kernel panic linux-image-2.6.18-5-xen-amd64 on xeon at starting multiple domUs)



Your message dated Sat, 30 Aug 2008 07:52:21 +0000
with message-id <E1KZLFt-0005ty-Av@ries.debian.org>
and subject line Bug#410807: fixed in user-mode-linux 2.6.18-1um-2etch.22etch1
has caused the Debian Bug report #410807,
regarding kernel panic linux-image-2.6.18-5-xen-amd64 on xeon at starting multiple domUs
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
410807: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=410807
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: linux-image-2.6-xen-amd64
Version: 2.6.18-5

When I start up multiple domUs (for example the third one)
I get the following kernel panic:

Aug 22 18:22:13 fourty2 kernel: ----------- [cut here ] ---------
[please bite here ] ---------
Aug 22 18:22:13 fourty2 kernel: Kernel BUG at drivers/xen/core/evtchn.c:481
Aug 22 18:22:13 fourty2 kernel: invalid opcode: 0000 [1] SMP
Aug 22 18:22:13 fourty2 kernel: CPU 3
Aug 22 18:22:13 fourty2 kernel: Modules linked in: xt_tcpudp xt_physdev
iptable_filter ip_tables x_tables bridge netloop ipv6 button ac battery
loop psmouse serial_core pcspkr shpchp pci_hotplug serio_raw evdev ext3
jbd mbcache dm_mirror dm_snapshot dm_mod ide_generic ide_cd cdrom usbhid
piix sd_mod generic ide_core uhci_hcd bnx2 ehci_hcd megaraid_sas
scsi_mod fan
Aug 22 18:22:13 fourty2 kernel: Pid: 21, comm: xenwatch Not tainted
2.6.18-5-xen-amd64 #1
Aug 22 18:22:13 fourty2 kernel: RIP: e030:[<ffffffff80360f56>]
[<ffffffff80360f56>] retrigger+0x26/0x3e
Aug 22 18:22:13 fourty2 kernel: RSP: e02b:ffff8800f2a9fd88  EFLAGS: 00010046
Aug 22 18:22:13 fourty2 kernel: RAX: 0000000000000000 RBX:
0000000000008e00 RCX: ffffffffff578000
Aug 22 18:22:13 fourty2 kernel: RDX: 0000000000000030 RSI:
ffff8800f2a9fd30 RDI: 000000000000011c
Aug 22 18:22:13 fourty2 kernel: RBP: ffffffff804ce280 R08:
ffff8800f2933c70 R09: ffff8800ef6fb500
Aug 22 18:22:13 fourty2 kernel: R10: ffff8800ef6fb000 R11:
ffffffff80360f30 R12: 000000000000011c
Aug 22 18:22:13 fourty2 kernel: R13: ffffffff804ce2bc R14:
0000000000000000 R15: 0000000000000008
Aug 22 18:22:13 fourty2 kernel: FS:  00002b19b5c046d0(0000)
GS:ffffffff804c4180(0000) knlGS:0000000000000000
Aug 22 18:22:13 fourty2 kernel: CS:  e033 DS: 0000 ES: 0000
Aug 22 18:22:13 fourty2 kernel: Process xenwatch (pid: 21, threadinfo
ffff8800f2a9e000, task ffff8800f2a77080)
Aug 22 18:22:13 fourty2 kernel: Stack:  ffffffff802a06bc
ffff8800ef6fb500  ffff8800ef6fb500  0000000000000000
Aug 22 18:22:13 fourty2 kernel:  ffff8800f2a9fde0  000000000000020b
ffffffff8036dac1  0000000000000000
Aug 22 18:22:13 fourty2 kernel:  ffffffff8036df39  ffff8800f2a9fea4
Aug 22 18:22:13 fourty2 kernel: Call Trace:
Aug 22 18:22:13 fourty2 kernel:  [<ffffffff802a06bc>] enable_irq+0x9d/0xbc
Aug 22 18:22:13 fourty2 kernel:  [<ffffffff8036dac1>] __netif_up+0xc/0x15
Aug 22 18:22:13 fourty2 kernel:  [<ffffffff8036df39>] netif_map+0x2a6/0x2d8
Aug 22 18:22:13 fourty2 kernel:  [<ffffffff8035c29a>]
bus_for_each_dev+0x61/0x6e
Aug 22 18:22:13 fourty2 kernel:  [<ffffffff80366743>]
xenwatch_thread+0x0/0x145
Aug 22 18:22:13 fourty2 kernel:  [<ffffffff80366743>]
xenwatch_thread+0x0/0x145
Aug 22 18:22:13 fourty2 kernel:  [<ffffffff80368283>]
frontend_changed+0x2ba/0x4f9
Aug 22 18:22:13 fourty2 kernel:  [<ffffffff80366743>]
xenwatch_thread+0x0/0x145
Aug 22 18:22:13 fourty2 kernel:  [<ffffffff8028f847>]
keventd_create_kthread+0x0/0x61
Aug 22 18:22:13 fourty2 kernel:  [<ffffffff80365b51>]
xenwatch_handle_callback+0x15/0x48
Aug 22 18:22:13 fourty2 kernel:  [<ffffffff80366870>]
xenwatch_thread+0x12d/0x145
Aug 22 18:22:13 fourty2 kernel:  [<ffffffff8028fa0a>]
autoremove_wake_function+0x0/0x2e
Aug 22 18:22:13 fourty2 kernel:  [<ffffffff8028f847>]
keventd_create_kthread+0x0/0x61
Aug 22 18:22:13 fourty2 kernel:  [<ffffffff80366743>]
xenwatch_thread+0x0/0x145
Aug 22 18:22:13 fourty2 kernel:  [<ffffffff802334da>] kthread+0xd4/0x107
Aug 22 18:22:13 fourty2 kernel:  [<ffffffff8025c7dc>] child_rip+0xa/0x12
Aug 22 18:22:13 fourty2 kernel:  [<ffffffff8028f847>]
keventd_create_kthread+0x0/0x61
Aug 22 18:22:13 fourty2 kernel:  [<ffffffff80233406>] kthread+0x0/0x107
Aug 22 18:22:13 fourty2 kernel:  [<ffffffff8025c7d2>] child_rip+0x0/0x12
Aug 22 18:22:13 fourty2 kernel:
Aug 22 18:22:13 fourty2 kernel:
Aug 22 18:22:13 fourty2 kernel: Code: 0f 0b 68 94 db 41 80 c2 e1 01 f0
0f ab 91 00 08 00 00 b8 01
Aug 22 18:22:13 fourty2 kernel: RIP  [<ffffffff80360f56>]
retrigger+0x26/0x3e
Aug 22 18:22:13 fourty2 kernel:  RSP <ffff8800f2a9fd88>


with version 2.6.18-4 everything works fine.
here my cat /proc/cpuinfo:

fourty2:/var/log# cat /proc/cpuinfo
processor       : 0
vendor_id       : GenuineIntel
cpu family      : 6
model           : 15
model name      : Intel(R) Xeon(R) CPU            5120  @ 1.86GHz
stepping        : 6
cpu MHz         : 1862.119
cache size      : 4096 KB
physical id     : 0
siblings        : 1
core id         : 0
cpu cores       : 1
fpu             : yes
fpu_exception   : yes
cpuid level     : 10
wp              : yes
flags           : fpu tsc msr pae mce cx8 apic mtrr mca cmov pat pse36
clflush dts acpi mmx fxsr sse sse2 ss ht tm syscall nx lm constant_tsc
pni monitor ds_cpl vmx est tm2 cx16 xtpr lahf_lm
bogomips        : 4656.34
clflush size    : 64
cache_alignment : 64
address sizes   : 36 bits physical, 48 bits virtual
power management:

processor       : 1
vendor_id       : GenuineIntel
cpu family      : 6
model           : 15
model name      : Intel(R) Xeon(R) CPU            5120  @ 1.86GHz
stepping        : 6
cpu MHz         : 1862.119
cache size      : 4096 KB
physical id     : 1
siblings        : 1
core id         : 0
cpu cores       : 1
fpu             : yes
fpu_exception   : yes
cpuid level     : 10
wp              : yes
flags           : fpu tsc msr pae mce cx8 apic mtrr mca cmov pat pse36
clflush dts acpi mmx fxsr sse sse2 ss ht tm syscall nx lm constant_tsc
pni monitor ds_cpl vmx est tm2 cx16 xtpr lahf_lm
bogomips        : 4656.34
clflush size    : 64
cache_alignment : 64
address sizes   : 36 bits physical, 48 bits virtual
power management:

processor       : 2
vendor_id       : GenuineIntel
cpu family      : 6
model           : 15
model name      : Intel(R) Xeon(R) CPU            5120  @ 1.86GHz
stepping        : 6
cpu MHz         : 1862.119
cache size      : 4096 KB
physical id     : 2
siblings        : 1
core id         : 0
cpu cores       : 1
fpu             : yes
fpu_exception   : yes
cpuid level     : 10
wp              : yes
flags           : fpu tsc msr pae mce cx8 apic mtrr mca cmov pat pse36
clflush dts acpi mmx fxsr sse sse2 ss ht tm syscall nx lm constant_tsc
pni monitor ds_cpl vmx est tm2 cx16 xtpr lahf_lm
bogomips        : 4656.34
clflush size    : 64
cache_alignment : 64
address sizes   : 36 bits physical, 48 bits virtual
power management:

processor       : 3
vendor_id       : GenuineIntel
cpu family      : 6
model           : 15
model name      : Intel(R) Xeon(R) CPU            5120  @ 1.86GHz
stepping        : 6
cpu MHz         : 1862.119
cache size      : 4096 KB
physical id     : 3
siblings        : 1
core id         : 0
cpu cores       : 1
fpu             : yes
fpu_exception   : yes
cpuid level     : 10
wp              : yes
flags           : fpu tsc msr pae mce cx8 apic mtrr mca cmov pat pse36
clflush dts acpi mmx fxsr sse sse2 ss ht tm syscall nx lm constant_tsc
pni monitor ds_cpl vmx est tm2 cx16 xtpr lahf_lm
bogomips        : 4656.34
clflush size    : 64
cache_alignment : 64
address sizes   : 36 bits physical, 48 bits virtual
power management:




--- End Message ---
--- Begin Message ---
Source: user-mode-linux
Source-Version: 2.6.18-1um-2etch.22etch1

We believe that the bug you reported is fixed in the latest version of
user-mode-linux, which is due to be installed in the Debian FTP archive:

user-mode-linux_2.6.18-1um-2etch.22etch1.diff.gz
  to pool/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.22etch1.diff.gz
user-mode-linux_2.6.18-1um-2etch.22etch1.dsc
  to pool/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.22etch1.dsc
user-mode-linux_2.6.18-1um-2etch.22etch1_i386.deb
  to pool/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.22etch1_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 410807@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
dann frazier <dannf@debian.org> (supplier of updated user-mode-linux package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Wed,  6 Aug 2008 00:40:06 -0600
Source: user-mode-linux
Binary: user-mode-linux
Architecture: source i386
Version: 2.6.18-1um-2etch.22etch1
Distribution: stable-security
Urgency: high
Maintainer: User Mode Linux Maintainers <pkg-uml-pkgs@lists.alioth.debian.org>
Changed-By: dann frazier <dannf@debian.org>
Description: 
 user-mode-linux - User-mode Linux (kernel)
Closes: 410807 479773
Changes: 
 user-mode-linux (2.6.18-1um-2etch.22etch1) stable-security; urgency=high
 .
   * Rebuild against linux-source-2.6.18_2.6.18.dfsg.1-22etch1:
     * bugfix/sctp-make-sure-n-sizeof-does-not-overflow.patch
       [SECURITY] Fix potential overflow condition in
       sctp_getsockopt_local_addrs_old
       See CVE-2008-2826
     * bugfix/esp-iv-in-linear-part-of-skb.patch
       [SECURITY] Avoid tripping BUG() in IPsec code when the first fragment
       of an ESP packet does not contain the entire ESP header and IV
       See CVE-2007-6282
     * bugfix/amd64-fix-zeroing-on-exception-in-copy_user.patch
       [SECURITY] [amd64] Fix potential information leak when a copy
       operation fails by properly zeroing out destination memory
       See CVE-2008-2729
     * bugfix/tty-fix-for-tty-operations-bugs.patch
       [SECURITY] Fix issues with tty operation handling in various drivers
       See CVE-2008-2812
     * bugfix/check-privileges-before-setting-mount-propagation.patch
       [SECURITY] Check CAP_SYS_ADMIN when changing mountpoint type
       See CVE-2008-2931
     * bugfix/x86-fix-copy_user.patch
       [SECURITY][amd64] Fix memory leak in the copy_user routine, see #490910.
       See CVE-2008-0598
   * Changes from 2.6.18.dfsg.1-22:
     * Merge in changes from 2.6.18.dfsg.1-18etch6
     * 3w-9xxx: Add 3ware 9690SA Backport (closes: #479773)
     * Backport http://xenbits.xensource.com/xen-unstable.hg?rev/914304b3a3da,
       fixing kernel BUG at drivers/xen/core/evtchn.c:481 (closes: #410807).
   * Changes from 2.6.18.dfsg.1-18etch6
     * bugfix/dccp-feature-length-check.patch
       [SECURITY] Validate feature length to avoid heap overflow
       See CVE-2008-2358
     * bugfix/asn1-ber-decoding-checks.patch
       [SECURITY] Validate lengths in ASN.1 decoding code to avoid
       heap overflow
       See CVE-2008-1673
Files: 
 5cb0d6498fdb81826ae87ed1505d3617 892 misc extra user-mode-linux_2.6.18-1um-2etch.22etch1.dsc
 03ca670996b8db498c46da96c6769b9a 17971 misc extra user-mode-linux_2.6.18-1um-2etch.22etch1.diff.gz
 4bad5f3d2a7179063d0a7e696def9402 25590314 misc extra user-mode-linux_2.6.18-1um-2etch.22etch1_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFImU2chuANDBmkLRkRAq4FAJ4s1q9ehR7dnPQR6B67fII6pIYXYQCggC+Q
lokeCWmRRKjMjzOclRHBElA=
=GPb1
-----END PGP SIGNATURE-----



--- End Message ---

Reply to: