[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#425373: marked as done (linux-image-2.6.18-3-xen-686: Xen kernel opps)

Your message dated Mon, 15 Feb 2010 20:18:14 +0100
with message-id <20100215191814.GN9624@baikonur.stro.at>
and subject line Re: Xen || vserver troubles
has caused the Debian Bug report #425373,
regarding linux-image-2.6.18-3-xen-686: Xen kernel opps
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org

425373: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=425373
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: linux-image-2.6.18-3-xen-686
Version: 2.6.18-7
Severity: normal


BUG: unable to handle kernel paging request at virtual address c79d00d9
 printing eip:
*pde = ma 03f59067 pa 00f59067
*pte = ma 00000000 pa fffff000
Oops: 0000 [#1]
Modules linked in: xt_tcpudp xt_physdev bridge iptable_filter ip_tables
x_tables button ac battery ipv6 loop rtc parport_pc parport evdev
snd_cmipci gameport snd_pcm snd_page_alloc snd_opl3_lib shpchp snd_timer
snd_hwdep snd_mpu401_uart snd_rawmidi snd_seq_device snd pci_hotplug
soundcore i2c_sis630 i2c_core serial_core sis_agp agpgart floppy pcspkr
ext3 jbd mbcache dm_mirror dm_snapshot dm_mod raid1 md_mod ide_generic
ide_cd cdrom ide_disk sis5513 generic ide_core ohci_hcd usbcore sis900
mii thermal processor fan
CPU:    0
EIP:    0061:[<c79d00d9>]    Not tainted VLI
EFLAGS: 00010286   (2.6.18-3-xen-686 #1) 
EIP is at 0xc79d00d9
eax: 00000000   ebx: c4c200c0   ecx: 00000002   edx: c13a7a98
esi: 00000000   edi: c13a0084   ebp: c33a644c   esp: c4c25f98
ds: 007b   es: 007b   ss: 0069
Process loop101 (pid: 9468, ti=c4c24000 task=c0e53000 task.ti=c4c24000)
Stack: 00001000 00000001 c5f50aa0 00000000 c79d25dc 00000000 00000000
       00000000 00000001 c13a7984 c1019d80 00001000 00001000 a4001000
       c79d227b 00000000 00000000 00000000 c0102941 c13a7984 00000000
Call Trace:
 [<c79d25dc>] do_lo_send_aops+0x0/0x20f [loop]
 [<c79d227b>] loop_thread+0x0/0x361 [loop]
 [<c0102941>] kernel_thread_helper+0x5/0xb
Code:  Bad EIP value.
EIP: [<c79d00d9>] 0xc79d00d9 SS:ESP 0069:c4c25f98

The BUG initially occurred in one of the DomUs and when it had locked up,
I destroyed it and attempted to create it again. That failed and I found
this on Dom0s dmesg output.


-- System Information:
Debian Release: lenny/sid
  APT prefers testing
  APT policy: (650, 'testing'), (600, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)

Kernel: Linux 2.6.18-4-686 (SMP w/1 CPU core)
Locale: LANG=en_AU.UTF-8, LC_CTYPE=en_AU.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

--- End Message ---
--- Begin Message ---
the 2.6.18 linux images from Etch are no longer supported, thus closing
this bug report.  As both Xen or vserver stayed out of tree it is very
unlikely that they improved a lot since.

With modern hardware kvm or lxc (linux containers) are recommended.
if you still haven't upgraded to Lenny please notice that Etch has
no security support any more as of today:

if you can reproduce said bugs with 2.6.32 linux images from
unstable please shout on said box and bug can be reopened:
reportbug -N <bugnr>

thank you for your report.

--- End Message ---

Reply to: