Your message dated Wed, 28 Sep 2022 20:52:28 +0000
with message-id <[email protected]>
and subject line Bug#1020787: fixed in xen 4.16.2-2
has caused the Debian Bug report #1020787,
regarding Xen: After updating to 5.19 kernel the VMs are started without XSAVE
CPU flags
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
1020787: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1020787
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: src:linux
Version: 5.19.11-1
Severity: important
Dear Maintainer,
I have a XEN hypervisor running with some VMs (everything based on Debian).
After updating to the Kernel to 5.19 (from 5.18.0-4), some
binaries are falling to execute. If the VMs are started with Kernel 5.18.0-4
they are running fine.
One example is wget which results in this kernel log:
[ 366.744374] traps: wget[3327] trap invalid opcode ip:7fcabc94fb0a
sp:7fffdd212c80 error:0 in libgnutls.so.30.34.1[7fcabc837000+12f000]
After googling a little I found this stackoverflow problem report:
https://stackoverflow.com/questions/65676095/illegal-instruction-core-dumped-after-packages-upgrade-on-centos-8
And indeed there is some difference in /proc/cpuinfo:
5.19:
flags : fpu de tsc msr pae mce cx8 apic sep mca cmov pat clflush mmx
fxsr sse sse2 ss ht syscall nx rdtscp lm constant_tsc rep_good nopl cpuid
tsc_known_freq pni pclmulqdq ssse3 cx16 sse4_1 sse4_2 movbe popcnt aes f16c
rdrand hypervisor lahf_lm abm 3dnowprefetch cpuid_fault ssbd ibrs ibpb stibp
fsgsbase bmi1 bmi2 erms rdseed adx clflushopt md_clear
5.18:
flags : fpu de tsc msr pae mce cx8 apic sep mca cmov pat clflush mmx
fxsr sse sse2 ss ht syscall nx rdtscp lm constant_tsc rep_good nopl cpuid
tsc_known_freq pni pclmulqdq ssse3 fma cx16 sse4_1 sse4_2 movbe popcnt aes
xsave avx f16c rdrand hypervisor lahf_lm abm 3dnowprefetch cpuid_fault ssbd
ibrs ibpb stibp fsgsbase bmi1 avx2 bmi2 erms rdseed adx clflushopt xsaveopt
xsavec xgetbv1 md_clear
So the flags for "fma xsave avx2 bmi2 xsaveopt xsavec xgetbv1 md_clear" are
missing, which might result in gnutls failures.
regards
Patrick
-- Package-specific info:
** Version:
Linux version 5.19.0-2-amd64 ([email protected]) (gcc-11 (Debian
11.3.0-6) 11.3.0, GNU ld (GNU Binutils for Debian) 2.38.90.20220713) #1 SMP
PREEMPT_DYNAMIC Debian 5.19.11-1 (2022-09-24)
** Command line:
root=/dev/xvda1 lockd.nlm_tcpport=61053 lockd.nlm_udpport=61053 ipv6.disable=1
net.ifnames=0 xen_blkfront.max_queues=3
** Tainted: W (512)
* kernel issued warning
** Kernel log:
[ 366.744374] traps: wget[3327] trap invalid opcode ip:7fcabc94fb0a
sp:7fffdd212c80 error:0 in libgnutls.so.30.34.1[7fcabc837000+12f000]
** Model information
** Loaded modules:
tls
nft_chain_nat
xt_MASQUERADE
nf_nat
ipt_REJECT
nf_reject_ipv4
xt_owner
xt_mac
xt_conntrack
nf_conntrack
nf_defrag_ipv6
nf_defrag_ipv4
xt_multiport
nft_limit
xt_tcpudp
xt_LOG
nf_log_syslog
xt_limit
nft_compat
nf_tables
libcrc32c
nfnetlink
sunrpc
binfmt_misc
intel_rapl_msr
intel_rapl_common
intel_pmc_core_pltdrv
intel_pmc_core
ghash_clmulni_intel
aesni_intel
crypto_simd
cryptd
cfg80211
rfkill
evdev
pcspkr
drm
fuse
configfs
ip_tables
x_tables
autofs4
ext4
crc16
mbcache
jbd2
crc32c_generic
tun
xen_netfront
xen_blkfront
crct10dif_pclmul
crct10dif_common
crc32_pclmul
crc32c_intel
** PCI devices:
** USB devices:
not available
-- System Information:
Debian Release: bookworm/sid
APT prefers unstable
APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)
Kernel: Linux 5.19.0-2-amd64 (SMP w/4 CPU threads; PREEMPT)
Kernel taint flags: TAINT_WARN
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled
Versions of packages linux-image-5.19.0-2-amd64 depends on:
ii initramfs-tools [linux-initramfs-tool] 0.142
ii kmod 30+20220630-3
ii linux-base 4.9
Versions of packages linux-image-5.19.0-2-amd64 recommends:
ii apparmor 3.0.7-1
ii firmware-linux-free 20200122-1
Versions of packages linux-image-5.19.0-2-amd64 suggests:
pn debian-kernel-handbook <none>
pn grub-pc | grub-efi-amd64 | extlinux <none>
pn linux-doc-5.19 <none>
Versions of packages linux-image-5.19.0-2-amd64 is related to:
ii firmware-amd-graphics 20210818-1
pn firmware-atheros <none>
pn firmware-bnx2 <none>
pn firmware-bnx2x <none>
pn firmware-brcm80211 <none>
pn firmware-cavium <none>
pn firmware-intel-sound <none>
pn firmware-intelwimax <none>
pn firmware-ipw2x00 <none>
pn firmware-ivtv <none>
pn firmware-iwlwifi <none>
pn firmware-libertas <none>
ii firmware-linux-nonfree 20210818-1
ii firmware-misc-nonfree 20210818-1
pn firmware-myricom <none>
pn firmware-netxen <none>
pn firmware-qlogic <none>
pn firmware-realtek <none>
pn firmware-samsung <none>
pn firmware-siano <none>
pn firmware-ti-connectivity <none>
pn xen-hypervisor <none>
-- no debconf information
--- End Message ---
--- Begin Message ---
Source: xen
Source-Version: 4.16.2-2
Done: Hans van Kranenburg <[email protected]>
We believe that the bug you reported is fixed in the latest version of
xen, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Hans van Kranenburg <[email protected]> (supplier of updated xen package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Wed, 28 Sep 2022 19:03:14 +0200
Source: xen
Architecture: source
Version: 4.16.2-2
Distribution: unstable
Urgency: medium
Maintainer: Debian Xen Team <[email protected]>
Changed-By: Hans van Kranenburg <[email protected]>
Closes: 1020787
Changes:
xen (4.16.2-2) unstable; urgency=medium
.
* debian/control: Add libzstd-dev as Build-Depends
* Pick upstream commit c3bd0b83ea ("x86/CPUID: surface suitable value in EBX
of XSTATE subleaf 1") to fix compatibility with Linux 5.19.
(Closes: #1020787)
Checksums-Sha1:
cb2d5bcdbacb87116e5df5cd2412f59b0e67c335 4036 xen_4.16.2-2.dsc
d7c9c71fd3a355dfa2377585fcf11fdb279eaaa2 131936 xen_4.16.2-2.debian.tar.xz
Checksums-Sha256:
baba41addc1288e34b54738d6a4085e1e2e09f15fd4962ff143c69129a9f24f1 4036
xen_4.16.2-2.dsc
235ace3ebddc2d5329faaaf025f92bd08947d6e6b5dc32ead2d9d23129a14aa8 131936
xen_4.16.2-2.debian.tar.xz
Files:
fcb6a563093a1bf55721dc8130bd9106 4036 admin optional xen_4.16.2-2.dsc
f6c0160c28fcfe1d081a8e1af376f02b 131936 admin optional
xen_4.16.2-2.debian.tar.xz
-----BEGIN PGP SIGNATURE-----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=R7BT
-----END PGP SIGNATURE-----
--- End Message ---