Your message dated Sun, 18 Sep 2022 16:32:08 +0000
with message-id <e1ozxde-00domi...@fasolo.debian.org>
and subject line Bug#1017944: fixed in grub2 2.06-3~deb11u2
has caused the Debian Bug report #1017944,
regarding grub-xen-host: 2.06-3 crashes PV guests in early boot
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1017944: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1017944
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: grub-xen-host
Version: 2.06-3

When used as `kernel` for a PV guest, the VM fails to boot immediately:

# xl dmesg
root@hypervisor:~# xl dmesg -c
(XEN) printk: 3 messages suppressed.
(XEN) d163v0 Unhandled page fault fault/trap [#14, ec=0003]
(XEN) Pagetable walk from 000000000062702c:
(XEN)  L4[0x000] = 000000081a023067 0000000000000623
(XEN)  L3[0x000] = 000000081a024067 0000000000000624
(XEN)  L2[0x003] = 000000081a028067 0000000000000628
(XEN)  L1[0x027] = 001000081a027025 0000000000000627
(XEN) domain_crash_sync called from entry.S: fault at ffff82d04030330e 
x86_64/entry.S#create_bounce_frame+0x135/0x157
(XEN) Domain 163 (vcpu#0) crashed on cpu#2:
(XEN) ----[ Xen-4.14.5  x86_64  debug=n   Not tainted ]----
(XEN) CPU:    2
(XEN) RIP:    e033:[<000000000041f42f>]
(XEN) RFLAGS: 0000000000000282   EM: 1   CONTEXT: pv guest (d163v0)
(XEN) rax: 0000000000000080   rbx: 0000000000000000   rcx: 0000000000000000
(XEN) rdx: 0000000000000000   rsi: 000000000061f000   rdi: 0000000000000000
(XEN) rbp: 0000000000000000   rsp: 0000000000629fc0   r8:  0000000000000000
(XEN) r9:  0000000000000000   r10: 0000000000000000   r11: 0000000000000000
(XEN) r12: 0000000000000000   r13: 0000000000000000   r14: 0000000000000000
(XEN) r15: 0000000000000000   cr0: 0000000080050033   cr4: 0000000000162660
(XEN) cr3: 000000081a022000   cr2: 000000000062702c
(XEN) fsb: 0000000000000000   gsb: 0000000000000000   gss: 0000000000000000
(XEN) ds: 0000   es: 0000   fs: 0000   gs: 0000   ss: e02b   cs: e033
(XEN) Guest stack trace from rsp=0000000000629fc0:
(XEN)    0000000000000000 0000000000000000 0000000000000003 000000000041f42f
(XEN)    000000010000e030 0000000000010082 000000000062a000 000000000000e02b
(XEN)    0000000000000080 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000080 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000

Probably, the important bit here is:

        (XEN) d163v0 Unhandled page fault fault/trap [#14, ec=0003]

in conjunction with:

        (XEN) RIP:    e033:[<000000000041f42f>]

which I couldn't get to yield something using `addr2line`, but maybe I'm just 
doing something wrong here.

Booting "regularly" with linux/ramdisk/extra arguments and grub-xen-host 
2.04-20 works as expected.

Interestingly, grub-xen-bin 2.06-3 _inside_ the DomU doesn't cause any issues 
(even in conjunction with 2.04-20 on the host's side); It's only when used as a 
stub from the Dom0 side.

This behavior is reproducible on Debian 11.4, Kernel 5.10.0-17-amd64 and Xen 
4.14.5+24-g87d90d511c-1 on an Intel Xeon E3-1225 v3 based box. My DomUs are 
also running Debian with the same general package versions, however, this 
doesn't seem to be relevant fot this bug as an "empty" guest leads to the same 
result.

--- End Message ---
--- Begin Message ---
Source: grub2
Source-Version: 2.06-3~deb11u2
Done: Steve McIntyre <93...@debian.org>

We believe that the bug you reported is fixed in the latest version of
grub2, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1017...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Steve McIntyre <93...@debian.org> (supplier of updated grub2 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Wed, 14 Sep 2022 23:40:50 +0100
Source: grub2
Architecture: source
Version: 2.06-3~deb11u2
Distribution: bullseye
Urgency: high
Maintainer: GRUB Maintainers <pkg-grub-de...@alioth-lists.debian.net>
Changed-By: Steve McIntyre <93...@debian.org>
Closes: 1017944
Changes:
 grub2 (2.06-3~deb11u2) bullseye; urgency=high
 .
   [ Steve McIntyre ]
   * Don't strip Xen binaries so they work again. Closes: #1017944.
     Thanks to Valentin Kleibel for the patch.
Checksums-Sha1:
 d97c1e72a1bc9d81f43fbacaa233309153d874c0 7125 grub2_2.06-3~deb11u2.dsc
 fd7d57837c28e5998793cb2dde157643eec05f7d 1084520 
grub2_2.06-3~deb11u2.debian.tar.xz
 401bf55f7e4f6a5360e12ae41b0f677192c56f6f 13787 
grub2_2.06-3~deb11u2_source.buildinfo
Checksums-Sha256:
 6fbd4f585a29a638a7c77888d3e0824c19e823d8c8e12a751f455154aa440819 7125 
grub2_2.06-3~deb11u2.dsc
 41fd3ddc8f0b27a6e0dfa6e5110154c14dc814f0683449149ec4d9785ff84b6d 1084520 
grub2_2.06-3~deb11u2.debian.tar.xz
 4bd52fe38f1dae3b89e8300f7cd983175b110473b5855792bc136dca716e10ec 13787 
grub2_2.06-3~deb11u2_source.buildinfo
Files:
 6be34ae91c5140eca00cf8937d6f3e39 7125 admin optional grub2_2.06-3~deb11u2.dsc
 d939196b70ce8e8f9999f7bba8f93dff 1084520 admin optional 
grub2_2.06-3~deb11u2.debian.tar.xz
 1e6ceca65d0ebe80541bbde858d3a011 13787 admin optional 
grub2_2.06-3~deb11u2_source.buildinfo

-----BEGIN PGP SIGNATURE-----

iQJFBAEBCAAvFiEEzrtSMB1hfpEDkP4WWHl5VzRCaE4FAmMnClQRHDkzc2FtQGRl
Ymlhbi5vcmcACgkQWHl5VzRCaE60/Q//SPjcFGR/oWHEv3TnKxZ4t8A/3usH8gcK
fcEEau3Y9r4VxGi0/5p3W32VexhajO2fVZrKCc6SWkzfsTjMJojElu/kaxdm8WoF
ppgXm9cZ8l/HGpZHmUIkBPT5NEQGErLK34TuRSkGjOYB/C2VnPiO9pMh+ZiHEahb
ong9Ey+i5k4lXzzvts8YP+HDo2IjlAWZmnZcN3H0Cv568CxJ/RsTl3y7064xtlU0
XWsCjctp8EogpXIFQmtZceJ7DQXNBED/sIOssAm6GQ15bpbdFU+n5LYWiXNWxcqZ
PNGdjP63tTEAHLEDC3AdKAvC3sdWyA5AjJ5GbBX+0mnn4Vi1d8zGshyOX0dk+DHq
tWuvQ/6tO+WBqxZ98vIl6QdAmaRCKgpW4HVBjt4w77RPUgyozb9UKiSWGHEWVncA
v/ifg51ZWzaFQcKj93R2nIGEsi9pFKXKrO0fCDg6YQClCP9VUyRtV3fQV3/6NEMu
AuFMjITiG3YQ9/ledei5Ig7e9Zo1eNXROa2OIKS8hMgAIGLIQmakSnVPpkVafCLf
T4TSRuQ0gCECbExnjdEcdNqC9ezfJ3YCcU1Qdr6ewQKmy3C2W/ze4IhSg34NGt0+
gKVepEHb2kA4HalnFTGTrRQliR/nCE2GeqHgfVr0xU+8QNx2hVRDtPt7AVueEMZg
x4Jb+nXvSVE=
=wBaQ
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to