Bug 453928
Summary: | Recusrive scping of files from one Xen domain to another (on another physical server) causes a panic | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 4 | Reporter: | John Burnham <jpb15> |
Component: | kernel-xen | Assignee: | Andrew Jones <drjones> |
Status: | CLOSED INSUFFICIENT_DATA | QA Contact: | Martin Jenner <mjenner> |
Severity: | high | Docs Contact: | |
Priority: | low | ||
Version: | 4.6 | CC: | clalance, drjones, rick.beldin, tom, xen-maint |
Target Milestone: | rc | ||
Target Release: | --- | ||
Hardware: | x86_64 | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2009-08-07 13:17:26 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | |||
Bug Blocks: | 458302 |
Description
John Burnham
2008-07-03 09:59:52 UTC
The list of patches that went in between 2.6.9-67.0.7 and 2.6.9-67.0.15 are: * Tue Apr 22 2008 Vitaly Mayatskikh <vmayatsk> [2.6.9-67.0.15] -fix kabi breakage in 67.0.14 * Tue Apr 22 2008 Vitaly Mayatskikh <vmayatsk> [2.6.9-67.0.14] -fs: serialize file access for dnotify (Alexander Viro) [443437] {CVE-2008-1669} -update: fix race condition in dnotify (Alexander Viro) [439756] {CVE-2008-1375} * Wed Apr 16 2008 Vitaly Mayatskikh <vmayatsk> [2.6.9-67.0.13] -Revert: Add HP DL580 G5 to bfsort whitelist (Tony Camuso) [437976] * Mon Apr 14 2008 Vitaly Mayatskikh <vmayatsk> [2.6.9-67.0.12] -fs: fix race condition in dnotify (Alexander Viro) [439756] {CVE-2008-1375} * Wed Apr 9 2008 Vitaly Mayatskikh <vmayatsk> [2.6.9-67.0.11] -nfs: High vm pagecache reclaim latency on systems with large highmem to lowmem ratio fix (Larry Woodman) [438345] -nfs: Fix nfs read performance regression. Introduce a new tunable (Larry Woodman) [438477] -Retry: check to see if agp is valid before reporting aperture size warnings (Brian Maly) [392771 431897] -Ensure IV is in linear part of the skb to avoid BUG due to OOB access (Thomas Graf) [427245] {CVE-2007-6282} -fix unprivileged crash on x86_64 cs corruption (Jarod Wilson) [439786] {CVE-2008-1615} * Wed Mar 19 2008 Vitaly Mayatskikh <vmayatsk> [2.6.9-67.0.10] -update: do not return zero in mmap (Vitaly Mayatskikh) [400811] -neofb: avoid overwriting fb_info fields (Vitaly Mayatskikh) [430251] -[NET] link_watch: always schedule urgent events (Don Dutile) [436102] -nlm: fix a client side race on blocking locks (Jeff Layton) [436129] -nlm: cleanup for blocked locks (Jeff Layton) [436129] -Add HP DL580 G5 to bfsort whitelist (Tony Camuso) [437976] -nfs: Discard pagecache data for dirs on denty_iput (Jeff Layton) [437788] * Wed Mar 12 2008 Vitaly Mayatskikh <vmayatsk> [2.6.9-67.0.9] -[NET] link_watch: handle jiffies wraparound (Vince Worthington) [436749] -libata: un-blacklist hitachi drives to enable NCQ (David Milburn) [436499] -libata: sata_nv may send commands with duplicate tags (David Milburn) [436499] * Fri Mar 7 2008 Vitaly Mayatskikh <vmayatsk> [2.6.9-67.0.8] -Insufficient range checks in fault handlers with mremap (Vitaly Mayatskikh) [428968] {CVE-2008-0007} -[MOXA] buffer overflow in moxa driver (Vitaly Mayatskikh) [423131] {CVE-2005-0504} -Fix unix stream socket recv race condition (Hideo AOKI) [435122] Interestingly, none of them are xen-specific, so one of these other ones must have caused the breakage. We'll have to look further to see what is going on. Chris Lalancette I'm unable to recreate this. I've scp'ed entire file systems under a load using the kernel versions listed above. I've tried both with and without nfs - even though it doesn't look like nfs was involved based on the "modules linked in" line of the panic. Since this is an old bug I'm guessing it's not being seen any more, at least not on later kernels. I'm going to close for now as insufficient data. If anybody can recreate this reliably then they can reopen it. I'll be happy to work with them to create bisections using some of the patches listed in c#2, i.e. what touches the call trace, or otherwise looks suspicious. Also, on reopening we should get the hardware details and full VM config. |