Your message dated Tue, 18 Feb 2025 12:30:36 +0000
with message-id <e1tkmkg-004lwz...@fasolo.debian.org>
and subject line Bug#1095435: fixed in linux 6.13.3-1~exp1
has caused the Debian Bug report #1095435,
regarding linux-source-6.1: fixes for XSA-466 (in linux 6.1.121+) can break Xen
PVH domU boot
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
1095435: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095435
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: linux-source-6.1
Version: 6.1.124-1
Severity: critical
Justification: breaks the whole system
Tags: patch
Hi,
It turns out the upstream changes made to fix XSA-466 / CVE-2024-53241
"x86/xen: remove hypercall page" [1] and
"x86/xen: use new hypercall functions instead of hypercall page" [2]
can leave an Xen PVH domU unbootable. These went into Debian in
linux-image-6.1.0-29-amd64 (6.1.123-1) and upstream Linux in 6.1.121,
and also into other kernel series, and mainline.
Juergen Gross has already very helpfully diagnosed this problem and
fixed it with a patch that's been accepted in mainline
"x86/xen: fix xen_hypercall_hvm() to not clobber %rbx" [3]
This bug report is to request this patch be incorporated into the Debian
stable kernel.
It seems quite variable whether systems are affected. Not everyone hits
it, but we (Jump Networks, a VPS hosting provider) have seen it across
multiple versions of Xen and on both Intel and AMD hardware. Symptoms
are PVH domU immediately shutting down before any output from the
kernel, even with earlyprintk=xen and CONFIG_X86_VERBOSE_BOOTUP. The xl
log just shows that the domain shut down.
Appending 'loglvl=all guest_loglvl=all' to the Xen host commandline
produces something more useful in the 'xl dmesg' buffer after a guest
crash, here's some characteristic output for anyone else wanting to know
if they're hitting the same bug (garbled characters in original, and bug
related).
(d38) [ 0.000000] Linux version 6.1.0-29-amd64
(debian-kernel@lists.debian.org) (gcc-12 (Debian 12.2.0-14) 12.2.0, GNU ld (GNU
Binutils for Debian) 2.40) #1 SMP PREEMPT_DYNAMIC Debian 6.1.123-1 (2025-01
(d38) -02)
(d38) @�!��������Linux version 6.1.0-29-amd64 (debian-kernel@lists.debian.org)
(gcc-12 (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40) #1
SMP PREEMPT_DYNAMIC Debian 6.1.123-1 (2025-01-02)
(d38) 2)
(d38) ���Command line: BOOT_IMAGE=/boot/vmlinuz-6.1.0-29-amd64
root=PARTUUID=5650c9f4-01 ro console=tty0 console=hvc0 earlyprintk=xen
net.ifnames=0 consoleblank=0=0
(d38) ���BIOS-provided physical RAM map:p:
(d38) ���BIOS-e820: [mem 0x0000000000000000-0x00000000fbffffff] usablec
(d38) ���BIOS-e820: [mem 0x00000000fc000000-0x00000000fc008fff] ACPI datac
(d38) ���BIOS-e820: [mem 0x00000000feff8000-0x00000000feffffff] reservedc
(d38) ���BIOS-e820: [mem 0x0000000100000000-0x0000000203ffffff] usablec
(d38) �?Ħ����
@Ħ�����AĦ�����AĦ�����AĦ����BĦ����CĦ����@CĦ����DĦ�����DĦ�����DĦ�����DĦ�����DĦ�����DĦ����EĦ����IĦ����IĦ����@IĦ����`IĦ�����JĦ�����JĦ�����JĦ�����JĦ����@KĦ����KĦ�����KĦ��
(d38) ���KĦ�����KĦ�����KĦ����LĦ����LĦ����
LĦ����PLĦ����`LĦ����pLĦ����LĦ����LĦ�����LĦ�����LĦ�����LĦ�����LĦ�����LĦ����MĦ����MĦ����
MĦ����@MĦ����pRĦ����pSĦ����SĦ�����SĦ����UĦ����PUĦ�
(d38)
����UĦ����@Ħ�����Ħ����PĦ����`Ħ�����Ħ����`�Ħ�����Ħ�����Ħ�����Ħ����@�Ħ����`�Ħ����p�Ħ�����Ħ�����Ħ������Ħ������Ħ������Ħ����гĦ�����Ħ����`�Ħ�����Ħ�����Ħ����@�Ħ����P�Ħ����p�Ħ���
(d38) ��Ħ�����Ħ�����Ħ����
�Ħ����0�Ħ����P�Ħ�����Ħ������Ħ����жĦ����0�Ħ�����Ħ������Ħ�����Ħ����p�Ħ����`�Ħ������Ħ����
�Ħ����@�Ħ����PANIC: early exception 0x0e IP 10:ffffffffa5e9606b error 0 c
(d38) r2 0xffffffffa8e00000
Thanks for your help,
Andrew Kanaber
Jump Networks
[1]
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=4c24703978b44d4bb95413a6b85c3254a5fa9bc1
[2]
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=1a2471af32acd00378d07164d025eaf226f337c3
[3]
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/arch/x86/xen/xen-head.S?id=98a5cfd2320966f40fe049a9855f8787f0126825
-- System Information:
Debian Release: 12.9
APT prefers stable-updates
APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 'stable')
Architecture: amd64 (x86_64)
Kernel: Linux 6.1.128 (SMP w/8 CPU threads; PREEMPT)
Locale: LANG=C.UTF-8, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
Versions of packages linux-source-6.1 depends on:
ii binutils 2.40-2
ii xz-utils 5.4.1-0.2
Versions of packages linux-source-6.1 recommends:
ii bc 1.07.1-3+b1
ii bison 2:3.8.2+dfsg-1+b1
ii build-essential 12.9
ii cpio 2.13+dfsg-7.1
ii flex 2.6.4-8.2
ii kmod 30+20221128-1
ii libelf-dev 0.188-2.1
ii libssl-dev 3.0.15-1~deb12u1
ii linux-config-6.1 6.1.124-1
ii rsync 3.2.7-1+deb12u2
Versions of packages linux-source-6.1 suggests:
ii libncurses-dev [ncurses-dev] 6.4-4
pn pkg-config <none>
pn qtbase5-dev <none>
-- no debconf information
--- End Message ---
--- Begin Message ---
Source: linux
Source-Version: 6.13.3-1~exp1
Done: Salvatore Bonaccorso <car...@debian.org>
We believe that the bug you reported is fixed in the latest version of
linux, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 1095...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Salvatore Bonaccorso <car...@debian.org> (supplier of updated linux package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Tue, 18 Feb 2025 12:49:42 +0100
Source: linux
Architecture: source
Version: 6.13.3-1~exp1
Distribution: experimental
Urgency: medium
Maintainer: Debian Kernel Team <debian-kernel@lists.debian.org>
Changed-By: Salvatore Bonaccorso <car...@debian.org>
Closes: 1087807 1088159 1091517 1091858 1093371 1093734 1095232 1095435 1095647
Changes:
linux (6.13.3-1~exp1) experimental; urgency=medium
.
* New upstream stable update:
https://www.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.13.3
- [x86] xen: fix xen_hypercall_hvm() to not clobber %rbx (Closes: #1095435)
- mips/math-emu: fix emulation of the prefx instruction (Closes: #1091858)
.
[ John Paul Adrian Glaubitz ]
* [alpha] Disable CONFIG_COMPACTION to avoid memory corruption
.
[ Yoann Congal ]
* [arm64/rt] Re-enable KVM
.
[ Salvatore Bonaccorso ]
* [mips*] Increase RELOCATION_TABLE_SIZE to 0x00280000 (fixes FTBFS)
* nfsd: validate the nfsd_serv pointer before calling svc_wake_up
(Closes: #1093734)
* [x86] xen: allow larger contiguous memory regions in PV guests
(Closes: #1093371, #1088159, #1087807)
* xen/swiotlb: relax alignment requirements
(Closes: #1093371, #1088159, #1087807)
* USB: Add USB_QUIRK_NO_LPM quirk for sony xperia xz1 smartphone
(Closes: #1091517)
.
[ Bastian Blank ]
* [amd64, arm64] Enable NITRO_ENCLAVES, NSM. (closes: #1095647)
* Enable DEVICE_PRIVATE, DRM_AMDGPU, HSA_AMD, HSA_AMD_SVM.
(closes: #1095232)
* Compress kernel with zstd where supported.
* [arm64, riscv64] Enable EFI_ZBOOT.
* Support zstd for firmware loader, enable FW_LOADER_COMPRESS_ZSTD.
.
[ Luca Boccassi ]
* linux-bpf-dev: mark as MA: same
Checksums-Sha1:
b23f6b8e2b3e6fbfdfb8ec084391afb8fa3b301e 200433 linux_6.13.3-1~exp1.dsc
7e5ed6692f7592c209e845fbe7db84f9223c2290 151518868 linux_6.13.3.orig.tar.xz
53f8daeda01295a384f4849cc23b789bac362463 1545896
linux_6.13.3-1~exp1.debian.tar.xz
2b87a17f2daea6e1f9c16a9fe60c00f13956b821 7093
linux_6.13.3-1~exp1_source.buildinfo
Checksums-Sha256:
c938874612c3253fd3bea1773d3ed672e27fd4ee7be667ffc87f898ac22a5e33 200433
linux_6.13.3-1~exp1.dsc
04c2caa318adc0d7ff5a9071e11a35c6f4bc7ac0b40bc0c2c03e914f2bbc26c5 151518868
linux_6.13.3.orig.tar.xz
a883ab7caa4825b427f6a5bb22a1b6b39cc276a550ed9796c7b9273f632521e8 1545896
linux_6.13.3-1~exp1.debian.tar.xz
c42d7fd06397f78d27dad9a465c1801198f71924f9537ac24017d1221db3442c 7093
linux_6.13.3-1~exp1_source.buildinfo
Files:
db30cecd680b6ed552c2284b96de2db9 200433 kernel optional linux_6.13.3-1~exp1.dsc
0a95cdd823c4277a326688f025b8ed1b 151518868 kernel optional
linux_6.13.3.orig.tar.xz
9a4f07b367c94e7cf1bd849eb00743bf 1545896 kernel optional
linux_6.13.3-1~exp1.debian.tar.xz
37ed453a201ed10e3560a45810241fd4 7093 kernel optional
linux_6.13.3-1~exp1_source.buildinfo
-----BEGIN PGP SIGNATURE-----
iQKmBAEBCgCQFiEERkRAmAjBceBVMd3uBUy48xNDz0QFAme0d+tfFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2
NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQSHGNhcm5pbEBk
ZWJpYW4ub3JnAAoJEAVMuPMTQ89E2ogP+weQttsdyyi5ex4INZijLqnmhCtXl7lL
Td4qHfQ+UWC8WVvqbg3Ng6y5VLXqSIxwdBBfaErXOEqcLR3gpbJxgpDD4yka3tFK
v9Q4CCAQN+c8FLYL0B5CzizxF9kn6dx5CRuiNHl/vWUGaRdU4EClmmtLjHEkGxat
5gKpHsullFTGBIU9onX/rBBbHPJNd2knGPQr43cu2YYclNQWUM8Mq7t5uPtxIp7e
AiBaVruaZtgBKkub1uq1tJZoAS4Va3iZ4T97mB4yT3cL3BKitc6Ny1LDfnWG1wVM
lDdox9DbPsFoi07+j65RCoRPyzTEIvx0ubmXA2scBIPubz7fHXeQko35zV/RrS9I
+A3UsVZFuJRI/dN+U5iHgQ5WdSolfwOVIRL/Nhn5+z5YBEq/tp8B9KOqL+ZsmL+t
b1xnjNl8st8qVt4eP3ck1TsRgycmMcJwYSQYKOh9DWzTByPbxWzGHJyk+5nYg8O4
ov0SO++FujWfgZ9yCeZxBDSa6ADtSk8ig+hDx3/xOGVkFNxXJ0ArW7v1OT+TVw2D
nfZkVa7dr8Q0Z9RP3ftGhW56SvtbwJf7mlbNGRpgsz4C/yOoITF6Jp1eyh9Tvo88
7iaLTN1k4L5tP4OqqFRH12J6iVCnbARYWjFSx+j6fDkQP0FAZVipG/r6zz8aCc/+
KKM0VhwaFaTj
=KfO8
-----END PGP SIGNATURE-----
pgpUXwGFnRZ7Z.pgp
Description: PGP signature
--- End Message ---