Your message dated Sun, 18 Sep 2022 14:37:07 +0000 with message-id <e1ozvpv-00d7pj...@fasolo.debian.org> and subject line Bug#1017944: fixed in grub2 2.06-4 has caused the Debian Bug report #1017944, regarding grub-xen-host: 2.06-3 crashes PV guests in early boot to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 1017944: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1017944 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
--- Begin Message ---Package: grub-xen-host Version: 2.06-3 When used as `kernel` for a PV guest, the VM fails to boot immediately: # xl dmesg root@hypervisor:~# xl dmesg -c (XEN) printk: 3 messages suppressed. (XEN) d163v0 Unhandled page fault fault/trap [#14, ec=0003] (XEN) Pagetable walk from 000000000062702c: (XEN) L4[0x000] = 000000081a023067 0000000000000623 (XEN) L3[0x000] = 000000081a024067 0000000000000624 (XEN) L2[0x003] = 000000081a028067 0000000000000628 (XEN) L1[0x027] = 001000081a027025 0000000000000627 (XEN) domain_crash_sync called from entry.S: fault at ffff82d04030330e x86_64/entry.S#create_bounce_frame+0x135/0x157 (XEN) Domain 163 (vcpu#0) crashed on cpu#2: (XEN) ----[ Xen-4.14.5 x86_64 debug=n Not tainted ]---- (XEN) CPU: 2 (XEN) RIP: e033:[<000000000041f42f>] (XEN) RFLAGS: 0000000000000282 EM: 1 CONTEXT: pv guest (d163v0) (XEN) rax: 0000000000000080 rbx: 0000000000000000 rcx: 0000000000000000 (XEN) rdx: 0000000000000000 rsi: 000000000061f000 rdi: 0000000000000000 (XEN) rbp: 0000000000000000 rsp: 0000000000629fc0 r8: 0000000000000000 (XEN) r9: 0000000000000000 r10: 0000000000000000 r11: 0000000000000000 (XEN) r12: 0000000000000000 r13: 0000000000000000 r14: 0000000000000000 (XEN) r15: 0000000000000000 cr0: 0000000080050033 cr4: 0000000000162660 (XEN) cr3: 000000081a022000 cr2: 000000000062702c (XEN) fsb: 0000000000000000 gsb: 0000000000000000 gss: 0000000000000000 (XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: e02b cs: e033 (XEN) Guest stack trace from rsp=0000000000629fc0: (XEN) 0000000000000000 0000000000000000 0000000000000003 000000000041f42f (XEN) 000000010000e030 0000000000010082 000000000062a000 000000000000e02b (XEN) 0000000000000080 0000000000000000 0000000000000000 0000000000000000 (XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000 (XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000 (XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000 (XEN) 0000000000000080 0000000000000000 0000000000000000 0000000000000000 (XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000 (XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000 (XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000 (XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000 (XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000 (XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000 (XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000 (XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000 (XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000 (XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000 (XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000 (XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000 (XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000 Probably, the important bit here is: (XEN) d163v0 Unhandled page fault fault/trap [#14, ec=0003] in conjunction with: (XEN) RIP: e033:[<000000000041f42f>] which I couldn't get to yield something using `addr2line`, but maybe I'm just doing something wrong here. Booting "regularly" with linux/ramdisk/extra arguments and grub-xen-host 2.04-20 works as expected. Interestingly, grub-xen-bin 2.06-3 _inside_ the DomU doesn't cause any issues (even in conjunction with 2.04-20 on the host's side); It's only when used as a stub from the Dom0 side. This behavior is reproducible on Debian 11.4, Kernel 5.10.0-17-amd64 and Xen 4.14.5+24-g87d90d511c-1 on an Intel Xeon E3-1225 v3 based box. My DomUs are also running Debian with the same general package versions, however, this doesn't seem to be relevant fot this bug as an "empty" guest leads to the same result.
--- End Message ---
--- Begin Message ---Source: grub2 Source-Version: 2.06-4 Done: Steve McIntyre <93...@debian.org> We believe that the bug you reported is fixed in the latest version of grub2, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 1017...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Steve McIntyre <93...@debian.org> (supplier of updated grub2 package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Format: 1.8 Date: Wed, 14 Sep 2022 22:35:49 +0100 Source: grub2 Architecture: source Version: 2.06-4 Distribution: unstable Urgency: high Maintainer: GRUB Maintainers <pkg-grub-de...@alioth-lists.debian.net> Changed-By: Steve McIntyre <93...@debian.org> Closes: 1008106 1009336 1013698 1013797 1013962 1017944 Changes: grub2 (2.06-4) unstable; urgency=high . [ Steve McIntyre ] * Updated the 2.06-3 changelog to mention closure of CVE-2022-28736 * Add a commented-out GRUB_DISABLE_OS_PROBER section to /etc/default/grub to make it easier for users to turn os-prober back on if they want it. Closes: #1013797, #1009336 * Add smbios to the signed grub efi images. Closes: #1008106 * Add serial to the signed grub efi images. Closes: #1013962 * grub2-common: Remove dependency on install-info, it's apparently not needed. Closes: #1013698 * Don't strip Xen binaries so they work again. Closes: #1017944. Thanks to Valentin Kleibel for the patch. Checksums-Sha1: 11bee9a6c8fbc00e2f28044e861bef70c5f5636a 7093 grub2_2.06-4.dsc f2400c1d9398667be230a7e295588cc0af930dc3 1084340 grub2_2.06-4.debian.tar.xz 81cf69445a9d1d5bd3030a9446c53b0df7cd31ec 12971 grub2_2.06-4_source.buildinfo Checksums-Sha256: beb7be47022f6b942f7e2ec58eaada775faf332437f3459d9230f2dc6d75d1b0 7093 grub2_2.06-4.dsc 7cad8235ff6fe534bd72be892dcda5815356c9b8245930f7aec0b1ba1aff9410 1084340 grub2_2.06-4.debian.tar.xz 87cf4ca3727615d716d79c9d0a2cbbc54e36ece0ab4a8dea9cf85796d5520444 12971 grub2_2.06-4_source.buildinfo Files: daec2a48a2a66b69f5db352f6b8b704e 7093 admin optional grub2_2.06-4.dsc 4858255163650249492f2b1739e530d4 1084340 admin optional grub2_2.06-4.debian.tar.xz 365e6a2dcc4bab218a32e10012cafbb2 12971 admin optional grub2_2.06-4_source.buildinfo -----BEGIN PGP SIGNATURE----- iQJFBAEBCAAvFiEEzrtSMB1hfpEDkP4WWHl5VzRCaE4FAmMnCjkRHDkzc2FtQGRl Ymlhbi5vcmcACgkQWHl5VzRCaE5BLQ//XbPvHqtx+8mSH+IvphkVG/WAQTBFs7CN cuwc60WUZSImwaZZC7CvGXGrZHKIHAUC6qdh6XoFfoSkPo8CNxUlRdtxmlkX8rtZ gPoIvHfkK1oiTy6HCxJC0asbuJnrTtr30HyVJJeC/TQsWDA92GlSzN1ZrZkuBuO+ AlYNuSjIVLPHvFfKfELGNEUzntSN6jWSIxZpoiXJOQDFVJHlaxMrewUUYKnSp5o6 awJ7c0x5EJgPGAW0FCn/bsBteRYrvp0yTjqJ14pKPvV9mopR01UevpIVUGUP1Pdd 7lOTsyFGwI1vF+husWKZ1ODK52gCIj9WBw+kE39OzUxLgJ9BuDEC35/BZZEMdfRL v8oCZOvEbflu/maVSmpgBq3uvLycCwV4zYA4ORU5eu8p5KpoYSnFgTX8bXkGuVD8 9emzLIe6IpV4oEEUgwMGRuUQ3U+H+wLEi3E07k4iKzJiInasDUPS/o2eHQMrPUwD t1ka3akuD2t6s9O8PEE+wv2/ZsJ9ww/VwBlNQdbahyAz/vwgyV5fTwBNzNO9KjLA Tn/wdI8s6W4rIdvK8PReR3CFuF6Vzq/6NngPmUC4mC2o2gcN6CDRezxc6CLZVi4t RKGT0z9/MINzYzEu3ZIZFzpaKzAvKYZyrZAI+uI6o3PJi/hlA4rlFfa+xlsxIOlP hFDcEFegpxA= =w7vb -----END PGP SIGNATURE-----
--- End Message ---