[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#644604: marked as done (linux-image-2.6.32-5-xen-amd64: Console hangs on PV guest with Xen 4.1.1)



Your message dated Mon, 16 Jan 2012 22:32:09 +0000
with message-id <E1Rmv61-0003Qu-1V@franck.debian.org>
and subject line Bug#644604: fixed in user-mode-linux 2.6.32-1um-4+39squeeze1
has caused the Debian Bug report #644604,
regarding linux-image-2.6.32-5-xen-amd64: Console hangs on PV guest with Xen 4.1.1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
644604: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=644604
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: linux-2.6
Version: 2.6.32-38
Severity: normal

Hi,
when using this kernel or linux-image-2.6.32-5-amd64 as a PV guest on Xen 4.1.1 the console is broken after suspend/resume or migration.

Steps to reproduce:

xm save squeeze squeeze.img
xm restore squeeze.img
xm console squeeze

The console won't accept any keyboard input but will still print kernel
messages. The machine is also still pingable. Ssh login still works but there also
no input possible after login.

The problem doesn't show up with 2.6.32-35 so this is a regression.
Cheers,
 -- Guido


-- Package-specific info:
** Version:
Linux version 2.6.32-5-xen-amd64 (Debian 2.6.32-38) (ben@decadent.org.uk) (gcc version 4.3.5 (Debian 4.3.5-4) ) #1 SMP Mon Oct 3 07:53:54 UTC 2011

** Command line:
root=/dev/xvda2 ro  quiet 

** Not tainted

** Kernel log:
[    0.004000] CPU 0/0x3 -> Node 0
[    0.004000] CPU: Unsupported number of siblings 16
[    0.004000] Performance Events: unsupported p6 CPU model 42 no PMU driver, software events only.
[    0.004000] SMP alternatives: switching to UP code
[    0.004000] Freeing SMP alternatives: 28k freed
[    0.004045]   alloc irq_desc for 510 on node -1
[    0.004047]   alloc kstat_irqs on node -1
[    0.004053]   alloc irq_desc for 509 on node -1
[    0.004055]   alloc kstat_irqs on node -1
[    0.004059]   alloc irq_desc for 508 on node -1
[    0.004060]   alloc kstat_irqs on node -1
[    0.004063]   alloc irq_desc for 507 on node -1
[    0.004065]   alloc kstat_irqs on node -1
[    0.004133] Brought up 1 CPUs
[    0.004145] CPU0 attaching NULL sched-domain.
[    0.004218] devtmpfs: initialized
[    0.007158] Grant table initialized
[    0.007160] regulator: core version 0.5
[    0.007212] NET: Registered protocol family 16
[    0.007264]   alloc irq_desc for 506 on node -1
[    0.007267]   alloc kstat_irqs on node -1
[    0.007983] PCI: setting up Xen PCI frontend stub
[    0.008365] bio: create slab <bio-0> at 0
[    0.008411] ACPI: Interpreter disabled.
[    0.008433] xen_balloon: Initialising balloon driver with page order 0.
[    0.008465] vgaarb: loaded
[    0.008505] PCI: System does not support PCI
[    0.008506] PCI: System does not support PCI
[    0.008560] Switching to clocksource xen
[    0.009446] pnp: PnP ACPI: disabled
[    0.009591] NET: Registered protocol family 2
[    0.009636] IP route cache hash table entries: 1024 (order: 1, 8192 bytes)
[    0.009767] TCP established hash table entries: 4096 (order: 4, 65536 bytes)
[    0.009787] TCP bind hash table entries: 4096 (order: 4, 65536 bytes)
[    0.009795] TCP: Hash tables configured (established 4096 bind 4096)
[    0.009797] TCP reno registered
[    0.009832] NET: Registered protocol family 1
[    0.009864] Unpacking initramfs...
[    0.025607] Freeing initrd memory: 26592k freed
[    0.030698] platform rtc_cmos: registered platform RTC device (no PNP device found)
[    0.030848] audit: initializing netlink socket (disabled)
[    0.030857] type=2000 audit(1317988583.088:1): initialized
[    0.033242] HugeTLB registered 2 MB page size, pre-allocated 0 pages
[    0.034361] VFS: Disk quotas dquot_6.5.2
[    0.034406] Dquot-cache hash table entries: 512 (order 0, 4096 bytes)
[    0.034477] msgmni has been set to 236
[    0.034653] alg: No test for stdrng (krng)
[    0.034707] Block layer SCSI generic (bsg) driver version 0.4 loaded (major 253)
[    0.034710] io scheduler noop registered
[    0.034712] io scheduler anticipatory registered
[    0.034715] io scheduler deadline registered
[    0.034740] io scheduler cfq registered (default)
[    0.037690] registering netback
[    0.038625]   alloc irq_desc for 505 on node -1
[    0.038627]   alloc kstat_irqs on node -1
[    0.038779] Linux agpgart interface v0.103
[    0.038800] Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled
[    0.038934] input: Macintosh mouse button emulation as /devices/virtual/input/input0
[    0.038966] PNP: No PS/2 controller found. Probing ports directly.
[    0.039775] i8042.c: No controller found.
[    0.039822] mice: PS/2 mouse device common for all mice
[    0.039878] rtc_cmos rtc_cmos: rtc core: registered rtc_cmos as rtc0
[    0.039914] cpuidle: using governor ladder
[    0.039916] cpuidle: using governor menu
[    0.039921] No iBFT detected.
[    0.040097] TCP cubic registered
[    0.040175] NET: Registered protocol family 10
[    0.040585] Mobile IPv6
[    0.040587] NET: Registered protocol family 17
[    0.040640] PM: Resume from disk failed.
[    0.040650] registered taskstats version 1
[    0.040657] XENBUS: Device with no driver: device/console/0
[    0.040659] XENBUS: Device with no driver: device/vbd/51714
[    0.040660] XENBUS: Device with no driver: device/vbd/51713
[    0.040662] XENBUS: Device with no driver: device/vif/0
[    0.040674] /build/buildd-linux-2.6_2.6.32-38-amd64-bk66e4/linux-2.6-2.6.32/debian/build/source_amd64_xen/drivers/rtc/hctosys.c: unable to open rtc device (rtc0)
[    0.040694] Initalizing network drop monitor service
[    0.040741] Freeing unused kernel memory: 604k freed
[    0.040836] Write protecting the kernel read-only data: 4332k
[    0.068184] udev[46]: starting version 164
[    0.112231] Initialising Xen virtual ethernet driver.
[    0.112330]   alloc irq_desc for 504 on node -1
[    0.112333]   alloc kstat_irqs on node -1
[    0.114921]   alloc irq_desc for 503 on node -1
[    0.114925]   alloc kstat_irqs on node -1
[    0.122987] blkfront: xvda2: barriers enabled
[    0.127428]   alloc irq_desc for 502 on node -1
[    0.127432]   alloc kstat_irqs on node -1
[    0.138905] blkfront: xvda1: barriers enabled
[    0.338608] EXT3-fs: INFO: recovery required on readonly filesystem.
[    0.338611] EXT3-fs: write access will be enabled during recovery.
[    0.383458] kjournald starting.  Commit interval 5 seconds
[    0.383472] EXT3-fs: recovery complete.
[    0.383571] EXT3-fs: mounted filesystem with ordered data mode.
[    0.683011] udev[156]: starting version 164
[    0.753052] input: PC Speaker as /devices/platform/pcspkr/input/input1
[    0.826029] Error: Driver 'pcspkr' is already registered, aborting...
[    0.896608] Adding 131064k swap on /dev/xvda1.  Priority:-1 extents:1 across:131064k SS
[    0.945999] EXT3 FS on xvda2, internal journal
[   11.732075] eth0: no IPv6 routers present

** Model information
not available

** Loaded modules:
Module                  Size  Used by
snd_pcm                60535  0 
snd_timer              15598  1 snd_pcm
snd                    46526  2 snd_pcm,snd_timer
soundcore               4598  1 snd
snd_page_alloc          6249  1 snd_pcm
evdev                   7352  0 
pcspkr                  1699  0 
ext3                  106710  1 
jbd                    37205  1 ext3
mbcache                 5050  1 ext3
xen_netfront           16257  0 
xen_blkfront            9435  2 

** Network interface configuration:
** PCI devices:
not available

** USB devices:
not available


-- System Information:
Debian Release: 6.0.2
  APT prefers proposed-updates
  APT policy: (500, 'proposed-updates'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.32-5-xen-amd64 (SMP w/1 CPU core)
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)
Shell: /bin/sh linked to /bin/dash

Versions of packages linux-image-2.6.32-5-xen-amd64 depends on:
ii  debconf [debconf-2.0]         1.5.36.1   Debian configuration management sy
ii  initramfs-tools               0.98.8     tools for generating an initramfs
ii  linux-base                    2.6.32-38  Linux image base package
ii  module-init-tools             3.12-1     tools for managing Linux kernel mo

Versions of packages linux-image-2.6.32-5-xen-amd64 recommends:
ii  firmware-linux-free           2.6.32-35  Binary firmware for various driver

Versions of packages linux-image-2.6.32-5-xen-amd64 suggests:
pn  grub                          <none>     (no description available)
pn  linux-doc-2.6.32              <none>     (no description available)

Versions of packages linux-image-2.6.32-5-xen-amd64 is related to:
pn  firmware-bnx2                 <none>     (no description available)
pn  firmware-bnx2x                <none>     (no description available)
pn  firmware-ipw2x00              <none>     (no description available)
pn  firmware-ivtv                 <none>     (no description available)
pn  firmware-iwlwifi              <none>     (no description available)
pn  firmware-linux                <none>     (no description available)
pn  firmware-linux-nonfree        <none>     (no description available)
pn  firmware-qlogic               <none>     (no description available)
pn  firmware-ralink               <none>     (no description available)
pn  xen-hypervisor                <none>     (no description available)

-- debconf information:
  linux-image-2.6.32-5-xen-amd64/postinst/depmod-error-initrd-2.6.32-5-xen-amd64: false
  linux-image-2.6.32-5-xen-amd64/postinst/ignoring-do-bootloader-2.6.32-5-xen-amd64:
  linux-image-2.6.32-5-xen-amd64/prerm/removing-running-kernel-2.6.32-5-xen-amd64: true
  linux-image-2.6.32-5-xen-amd64/postinst/missing-firmware-2.6.32-5-xen-amd64:



--- End Message ---
--- Begin Message ---
Source: user-mode-linux
Source-Version: 2.6.32-1um-4+39squeeze1

We believe that the bug you reported is fixed in the latest version of
user-mode-linux, which is due to be installed in the Debian FTP archive:

user-mode-linux_2.6.32-1um-4+39squeeze1.diff.gz
  to main/u/user-mode-linux/user-mode-linux_2.6.32-1um-4+39squeeze1.diff.gz
user-mode-linux_2.6.32-1um-4+39squeeze1.dsc
  to main/u/user-mode-linux/user-mode-linux_2.6.32-1um-4+39squeeze1.dsc
user-mode-linux_2.6.32-1um-4+39squeeze1_amd64.deb
  to main/u/user-mode-linux/user-mode-linux_2.6.32-1um-4+39squeeze1_amd64.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 644604@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
dann frazier <dannf@debian.org> (supplier of updated user-mode-linux package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Mon, 09 Jan 2012 21:17:41 +0100
Source: user-mode-linux
Binary: user-mode-linux
Architecture: source amd64
Version: 2.6.32-1um-4+39squeeze1
Distribution: stable-security
Urgency: high
Maintainer: User Mode Linux Maintainers <pkg-uml-pkgs@lists.alioth.debian.org>
Changed-By: dann frazier <dannf@debian.org>
Description: 
 user-mode-linux - User-mode Linux (kernel)
Closes: 630730 643817 644604 646132
Changes: 
 user-mode-linux (2.6.32-1um-4+39squeeze1) stable-security; urgency=high
 .
   * Rebuild against linux-source-2.6.32 (2.6.32-39squeeze1):
     * Revert "ipv6: make fragment identifications less predictable"
       (Closes: #643817).  This reopens CVE-2011-2699.
     * xen: Revert "xen: Use IRQF_FORCE_RESUME". Fixes live migration regression
       in 2.6.32.42. (Closes: #644604)
     * Really fix bugs in IPv6 forwarding with GRO/GSO (Closes: #630730):
       - e1000e,igb,igbvf,ixgbe: Fix IPv6 GSO type checks
       - ipv6: Add GSO support on forwarding path
     * [powerpc] vserver: Wire up syscall (Closes: #646132)
     * Restrict ioctl forwarding on partitions and logical volumes
       (CVE-2011-4127)
     * xfs: Fix possible memory corruption in xfs_readlink (CVE-2011-4077)
     * KEYS: Fix a NULL pointer deref in the user-defined key type
       (CVE-2011-4110)
     * [x86] KVM: Prevent starting PIT timers in the absence of irqchip support
       (CVE-2011-4622)
     * rose: Add length checks to CALL_REQUEST parsing (CVE-2011-4914)
Checksums-Sha1: 
 a6f7d69f53a6b754371acdc13409a1ca799795c9 2070 user-mode-linux_2.6.32-1um-4+39squeeze1.dsc
 ca3cc034a0887827619885ed26763e76c7729b93 18139 user-mode-linux_2.6.32-1um-4+39squeeze1.diff.gz
 d85517abd1817d4469f70ea8b8bb5a9ae727ddd9 7079036 user-mode-linux_2.6.32-1um-4+39squeeze1_amd64.deb
Checksums-Sha256: 
 14d4dded9aa3344e47a828638118fdc4fd4d13ec0c75337e420dffb16b184313 2070 user-mode-linux_2.6.32-1um-4+39squeeze1.dsc
 f055c0abb2023bd685d4043f6ca2418be4d997109362f191676ab9568378d13f 18139 user-mode-linux_2.6.32-1um-4+39squeeze1.diff.gz
 7e0ce42970fd47103b0760711d11df7dd3a6812e9bd535080fa09fed8c12b3f6 7079036 user-mode-linux_2.6.32-1um-4+39squeeze1_amd64.deb
Files: 
 13bd097b7a9c1a60deb2c69d074451a7 2070 kernel extra user-mode-linux_2.6.32-1um-4+39squeeze1.dsc
 fabd72c60cbe36d8ff066505e203753d 18139 kernel extra user-mode-linux_2.6.32-1um-4+39squeeze1.diff.gz
 9b80381cb184de7ea3d8dbf603326ac6 7079036 kernel extra user-mode-linux_2.6.32-1um-4+39squeeze1_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
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=aToJ
-----END PGP SIGNATURE-----



--- End Message ---

Reply to: