Your message dated Sun, 18 Sep 2022 14:37:07 +0000
with message-id <e1ozvpv-00d7pj...@fasolo.debian.org>
and subject line Bug#1017944: fixed in grub2 2.06-4
has caused the Debian Bug report #1017944,
regarding grub-xen-host: 2.06-3 crashes PV guests in early boot
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1017944: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1017944
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: grub-xen-host
Version: 2.06-3

When used as `kernel` for a PV guest, the VM fails to boot immediately:

# xl dmesg
root@hypervisor:~# xl dmesg -c
(XEN) printk: 3 messages suppressed.
(XEN) d163v0 Unhandled page fault fault/trap [#14, ec=0003]
(XEN) Pagetable walk from 000000000062702c:
(XEN)  L4[0x000] = 000000081a023067 0000000000000623
(XEN)  L3[0x000] = 000000081a024067 0000000000000624
(XEN)  L2[0x003] = 000000081a028067 0000000000000628
(XEN)  L1[0x027] = 001000081a027025 0000000000000627
(XEN) domain_crash_sync called from entry.S: fault at ffff82d04030330e 
x86_64/entry.S#create_bounce_frame+0x135/0x157
(XEN) Domain 163 (vcpu#0) crashed on cpu#2:
(XEN) ----[ Xen-4.14.5  x86_64  debug=n   Not tainted ]----
(XEN) CPU:    2
(XEN) RIP:    e033:[<000000000041f42f>]
(XEN) RFLAGS: 0000000000000282   EM: 1   CONTEXT: pv guest (d163v0)
(XEN) rax: 0000000000000080   rbx: 0000000000000000   rcx: 0000000000000000
(XEN) rdx: 0000000000000000   rsi: 000000000061f000   rdi: 0000000000000000
(XEN) rbp: 0000000000000000   rsp: 0000000000629fc0   r8:  0000000000000000
(XEN) r9:  0000000000000000   r10: 0000000000000000   r11: 0000000000000000
(XEN) r12: 0000000000000000   r13: 0000000000000000   r14: 0000000000000000
(XEN) r15: 0000000000000000   cr0: 0000000080050033   cr4: 0000000000162660
(XEN) cr3: 000000081a022000   cr2: 000000000062702c
(XEN) fsb: 0000000000000000   gsb: 0000000000000000   gss: 0000000000000000
(XEN) ds: 0000   es: 0000   fs: 0000   gs: 0000   ss: e02b   cs: e033
(XEN) Guest stack trace from rsp=0000000000629fc0:
(XEN)    0000000000000000 0000000000000000 0000000000000003 000000000041f42f
(XEN)    000000010000e030 0000000000010082 000000000062a000 000000000000e02b
(XEN)    0000000000000080 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000080 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000

Probably, the important bit here is:

        (XEN) d163v0 Unhandled page fault fault/trap [#14, ec=0003]

in conjunction with:

        (XEN) RIP:    e033:[<000000000041f42f>]

which I couldn't get to yield something using `addr2line`, but maybe I'm just 
doing something wrong here.

Booting "regularly" with linux/ramdisk/extra arguments and grub-xen-host 
2.04-20 works as expected.

Interestingly, grub-xen-bin 2.06-3 _inside_ the DomU doesn't cause any issues 
(even in conjunction with 2.04-20 on the host's side); It's only when used as a 
stub from the Dom0 side.

This behavior is reproducible on Debian 11.4, Kernel 5.10.0-17-amd64 and Xen 
4.14.5+24-g87d90d511c-1 on an Intel Xeon E3-1225 v3 based box. My DomUs are 
also running Debian with the same general package versions, however, this 
doesn't seem to be relevant fot this bug as an "empty" guest leads to the same 
result.

--- End Message ---
--- Begin Message ---
Source: grub2
Source-Version: 2.06-4
Done: Steve McIntyre <93...@debian.org>

We believe that the bug you reported is fixed in the latest version of
grub2, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1017...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Steve McIntyre <93...@debian.org> (supplier of updated grub2 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Wed, 14 Sep 2022 22:35:49 +0100
Source: grub2
Architecture: source
Version: 2.06-4
Distribution: unstable
Urgency: high
Maintainer: GRUB Maintainers <pkg-grub-de...@alioth-lists.debian.net>
Changed-By: Steve McIntyre <93...@debian.org>
Closes: 1008106 1009336 1013698 1013797 1013962 1017944
Changes:
 grub2 (2.06-4) unstable; urgency=high
 .
   [ Steve McIntyre ]
   * Updated the 2.06-3 changelog to mention closure of CVE-2022-28736
   * Add a commented-out GRUB_DISABLE_OS_PROBER section to
     /etc/default/grub to make it easier for users to turn os-prober
     back on if they want it. Closes: #1013797, #1009336
   * Add smbios to the signed grub efi images. Closes: #1008106
   * Add serial to the signed grub efi images. Closes: #1013962
   * grub2-common: Remove dependency on install-info, it's apparently
     not needed. Closes: #1013698
   * Don't strip Xen binaries so they work again. Closes: #1017944.
     Thanks to Valentin Kleibel for the patch.
Checksums-Sha1:
 11bee9a6c8fbc00e2f28044e861bef70c5f5636a 7093 grub2_2.06-4.dsc
 f2400c1d9398667be230a7e295588cc0af930dc3 1084340 grub2_2.06-4.debian.tar.xz
 81cf69445a9d1d5bd3030a9446c53b0df7cd31ec 12971 grub2_2.06-4_source.buildinfo
Checksums-Sha256:
 beb7be47022f6b942f7e2ec58eaada775faf332437f3459d9230f2dc6d75d1b0 7093 
grub2_2.06-4.dsc
 7cad8235ff6fe534bd72be892dcda5815356c9b8245930f7aec0b1ba1aff9410 1084340 
grub2_2.06-4.debian.tar.xz
 87cf4ca3727615d716d79c9d0a2cbbc54e36ece0ab4a8dea9cf85796d5520444 12971 
grub2_2.06-4_source.buildinfo
Files:
 daec2a48a2a66b69f5db352f6b8b704e 7093 admin optional grub2_2.06-4.dsc
 4858255163650249492f2b1739e530d4 1084340 admin optional 
grub2_2.06-4.debian.tar.xz
 365e6a2dcc4bab218a32e10012cafbb2 12971 admin optional 
grub2_2.06-4_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=w7vb
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to