Bug#687731: marked as done (Stable update for xen)

2013-01-19 Thread Debian Bug Tracking System
Your message dated Sat, 19 Jan 2013 15:17:32 +0100
with message-id <20130119141732.gk5...@radis.cristau.org>
and subject line Re: Bug#687731: Stable update for xen
has caused the Debian Bug report #687731,
regarding Stable update for xen
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
687731: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=687731
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
User: release.debian@packages.debian.org
Usertags: pu squeeze
Control: submitter -1 Bastian Blank 

On Sat, 2012-06-30 at 13:24 +0200, Julien Cristau wrote:
> On Thu, Jun 14, 2012 at 21:09:48 +0200, Bastian Blank wrote:
> 
> > On Thu, Jun 14, 2012 at 07:55:21PM +0100, Adam D. Barratt wrote:
> > > On Thu, 2012-06-14 at 20:51 +0200, Bastian Blank wrote:
> > > > I'd like to fix an boot error of Xen on several newer machines in
> > > > stable.
> > > I'm assuming this is fixed in at least unstable already, given the dates
> > > of the commits referenced in the bug report?
> > 
> > It is included in 4.1.0.
> > 
> > > Please could we have a full source debdiff for the proposed package,
> > > against the package currently in stable?
> > 
> > Sure.
> > 
> This should probably be rebased on top of -5.2.

Filing as a bug to improve the chances of it not getting missed (again).

Regards,

Adam
--- End Message ---
--- Begin Message ---
On Sat, Sep 15, 2012 at 14:35:44 +0100, Adam D. Barratt wrote:

> Filing as a bug to improve the chances of it not getting missed (again).
> 
14:09 < jcristau> should #687731 be closed?
14:18 < adsb> if no-one cares about it getting fixed, maybe. istr the diff not 
  really being reviewable
14:28 < jcristau> aiui waldi doesn't...
15:15 < waldi> jcristau: no, i don't. i stopped careing after the security 
   debacle

Closing.

Cheers,
Julien


signature.asc
Description: Digital signature
--- End Message ---


Processed: Re: Stable update for xen

2012-09-15 Thread Debian Bug Tracking System
Processing control commands:

> submitter -1 Bastian Blank 
Bug #687731 [release.debian.org] Stable update for xen
Changed Bug submitter to 'Bastian Blank ' from '"Adam D. 
Barratt" '

-- 
687731: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=687731
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.b.134771623827904.transcr...@bugs.debian.org



Bug#687731: Stable update for xen

2012-09-15 Thread Adam D. Barratt
Package: release.debian.org
User: release.debian@packages.debian.org
Usertags: pu squeeze
Control: submitter -1 Bastian Blank 

On Sat, 2012-06-30 at 13:24 +0200, Julien Cristau wrote:
> On Thu, Jun 14, 2012 at 21:09:48 +0200, Bastian Blank wrote:
> 
> > On Thu, Jun 14, 2012 at 07:55:21PM +0100, Adam D. Barratt wrote:
> > > On Thu, 2012-06-14 at 20:51 +0200, Bastian Blank wrote:
> > > > I'd like to fix an boot error of Xen on several newer machines in
> > > > stable.
> > > I'm assuming this is fixed in at least unstable already, given the dates
> > > of the commits referenced in the bug report?
> > 
> > It is included in 4.1.0.
> > 
> > > Please could we have a full source debdiff for the proposed package,
> > > against the package currently in stable?
> > 
> > Sure.
> > 
> This should probably be rebased on top of -5.2.

Filing as a bug to improve the chances of it not getting missed (again).

Regards,

Adam


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/1347716144.28617.51.ca...@jacala.jungle.funky-badger.org



Re: Stable update for xen

2012-06-30 Thread Julien Cristau
On Thu, Jun 14, 2012 at 21:09:48 +0200, Bastian Blank wrote:

> On Thu, Jun 14, 2012 at 07:55:21PM +0100, Adam D. Barratt wrote:
> > On Thu, 2012-06-14 at 20:51 +0200, Bastian Blank wrote:
> > > I'd like to fix an boot error of Xen on several newer machines in
> > > stable.
> > I'm assuming this is fixed in at least unstable already, given the dates
> > of the commits referenced in the bug report?
> 
> It is included in 4.1.0.
> 
> > Please could we have a full source debdiff for the proposed package,
> > against the package currently in stable?
> 
> Sure.
> 
This should probably be rebased on top of -5.2.

Cheers,
Julien


signature.asc
Description: Digital signature


Re: Stable update for xen

2012-06-14 Thread Bastian Blank
On Thu, Jun 14, 2012 at 07:55:21PM +0100, Adam D. Barratt wrote:
> On Thu, 2012-06-14 at 20:51 +0200, Bastian Blank wrote:
> > I'd like to fix an boot error of Xen on several newer machines in
> > stable.
> I'm assuming this is fixed in at least unstable already, given the dates
> of the commits referenced in the bug report?

It is included in 4.1.0.

> Please could we have a full source debdiff for the proposed package,
> against the package currently in stable?

Sure.

Bastian

-- 
The idea of male and female are universal constants.
-- Kirk, "Metamorphosis", stardate 3219.8
diff -Nru xen-4.0.1/debian/changelog xen-4.0.1/debian/changelog
--- xen-4.0.1/debian/changelog  2011-06-09 20:35:07.0 +0200
+++ xen-4.0.1/debian/changelog  2012-06-14 20:27:57.0 +0200
@@ -1,3 +1,23 @@
+xen (4.0.1-6) UNRELEASED; urgency=low
+
+  [ Ian Campbell ]
+  * Backport fix to remove lowmem 1:1 mapping that fixes boot on some
+classes of machines. (Closes: #649923)
+
+ -- Bastian Blank   Thu, 14 Jun 2012 20:27:03 +0200
+
+xen (4.0.1-5) stable-security; urgency=low
+
+  * Fix privilege escalation and syscall/sysenter DoS while using
+non-canonical addresses by untrusted PV guests.
+CVE-2012-0217
+CVE-2012-0218
+  * Disable Xen on CPUs affected by AMD Erratum #121. PV guests can
+cause a DoS of the host.
+CVE-2012-2934
+
+ -- Bastian Blank   Mon, 11 Jun 2012 18:12:37 +
+
 xen (4.0.1-4) stable-security; urgency=low
 
   * Fix overflows and missing error checks in PV kernel loader.
diff -Nru xen-4.0.1/debian/control.md5sum xen-4.0.1/debian/control.md5sum
--- xen-4.0.1/debian/control.md5sum 2011-06-09 20:36:05.0 +0200
+++ xen-4.0.1/debian/control.md5sum 2012-06-14 20:31:20.0 +0200
@@ -1,4 +1,4 @@
-3207088ea024aa07513e3c44b7d3e1af  debian/changelog
+6a070480a54a79a74d6623a07ff8beb7  debian/changelog
 24f2598a23e30264aea4a983d5d19eec  debian/bin/gencontrol.py
 ee1ccd7bf0932a81ca221cab08347614  debian/templates/control.hypervisor.in
 e4335ab10e217a12328cdf123473ed37  debian/templates/control.main.in
diff -Nru xen-4.0.1/debian/patches/CVE-2012-0217+2012-0218 
xen-4.0.1/debian/patches/CVE-2012-0217+2012-0218
--- xen-4.0.1/debian/patches/CVE-2012-0217+2012-02181970-01-01 
01:00:00.0 +0100
+++ xen-4.0.1/debian/patches/CVE-2012-0217+2012-02182012-06-14 
20:24:30.0 +0200
@@ -0,0 +1,96 @@
+diff -r d8fd425b60d3 xen/arch/x86/x86_64/asm-offsets.c
+--- a/xen/arch/x86/x86_64/asm-offsets.cTue May 01 14:18:46 2012 +0100
 b/xen/arch/x86/x86_64/asm-offsets.cThu May 24 11:18:47 2012 +0100
+@@ -89,6 +89,8 @@ void __dummy__(void)
+arch.guest_context.trap_ctxt[TRAP_gp_fault].address);
+ OFFSET(VCPU_gp_fault_sel, struct vcpu,
+arch.guest_context.trap_ctxt[TRAP_gp_fault].cs);
++OFFSET(VCPU_gp_fault_flags, struct vcpu,
++   arch.guest_context.trap_ctxt[TRAP_gp_fault].flags);
+ OFFSET(VCPU_kernel_sp, struct vcpu, arch.guest_context.kernel_sp);
+ OFFSET(VCPU_kernel_ss, struct vcpu, arch.guest_context.kernel_ss);
+ OFFSET(VCPU_guest_context_flags, struct vcpu, arch.guest_context.flags);
+diff -r d8fd425b60d3 xen/arch/x86/x86_64/compat/entry.S
+--- a/xen/arch/x86/x86_64/compat/entry.S   Tue May 01 14:18:46 2012 +0100
 b/xen/arch/x86/x86_64/compat/entry.S   Thu May 24 11:18:47 2012 +0100
+@@ -227,6 +227,7 @@ 1:  call  compat_create_bounce_frame
+ ENTRY(compat_post_handle_exception)
+ testb $TBF_EXCEPTION,TRAPBOUNCE_flags(%rdx)
+ jzcompat_test_all_events
++.Lcompat_bounce_exception:
+ call  compat_create_bounce_frame
+ movb  $0,TRAPBOUNCE_flags(%rdx)
+ jmp   compat_test_all_events
+@@ -243,14 +244,15 @@ ENTRY(compat_syscall)
+ 1:  movq  %rax,TRAPBOUNCE_eip(%rdx)
+ movw  %si,TRAPBOUNCE_cs(%rdx)
+ movb  %cl,TRAPBOUNCE_flags(%rdx)
+-call  compat_create_bounce_frame
+-jmp   compat_test_all_events
++jmp   .Lcompat_bounce_exception
+ 2:  movl  $TRAP_gp_fault,UREGS_entry_vector(%rsp)
+ subl  $2,UREGS_rip(%rsp)
+ movq  VCPU_gp_fault_addr(%rbx),%rax
+ movzwl VCPU_gp_fault_sel(%rbx),%esi
+-movb  $(TBF_EXCEPTION|TBF_EXCEPTION_ERRCODE|TBF_INTERRUPT),%cl
+ movl  $0,TRAPBOUNCE_error_code(%rdx)
++testb $4,VCPU_gp_fault_flags(%rbx)
++setnz %cl
++leal  TBF_EXCEPTION|TBF_EXCEPTION_ERRCODE(,%rcx,TBF_INTERRUPT),%ecx
+ jmp   1b
+ 
+ ENTRY(compat_sysenter)
+diff -r d8fd425b60d3 xen/arch/x86/x86_64/entry.S
+--- a/xen/arch/x86/x86_64/entry.S  Tue May 01 14:18:46 2012 +0100
 b/xen/arch/x86/x86_64/entry.S  Thu May 24 11:18:47 2012 +0100
+@@ -51,6 +51,13 @@ restore_all_guest:
+ testw $TRAP_syscall,4(%rsp)
+ jziret_exit_to_guest
+ 
++/* Don't use SYSRET path if the return address is not canonical. */
++movq  8(%rsp),%rcx
++sarq  $47,%rcx
++incl  %ecx
++cmpl  $1,%ecx
++

Re: Stable update for xen

2012-06-14 Thread Adam D. Barratt
On Thu, 2012-06-14 at 20:51 +0200, Bastian Blank wrote:
> I'd like to fix an boot error of Xen on several newer machines in
> stable.

I'm assuming this is fixed in at least unstable already, given the dates
of the commits referenced in the bug report?

> xen (4.0.1-6) UNRELEASED; urgency=low
> 
>   [ Ian Campbell ]
>   * Backport fix to remove lowmem 1:1 mapping that fixes boot on some
> classes of machines. (Closes: #649923)

Please could we have a full source debdiff for the proposed package,
against the package currently in stable?

Regards,

Adam


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/1339700121.19699.6.ca...@jacala.jungle.funky-badger.org



Stable update for xen

2012-06-14 Thread Bastian Blank
Hi

I'd like to fix an boot error of Xen on several newer machines in
stable.

xen (4.0.1-6) UNRELEASED; urgency=low

  [ Ian Campbell ]
  * Backport fix to remove lowmem 1:1 mapping that fixes boot on some
classes of machines. (Closes: #649923)

 -- Bastian Blank   Thu, 14 Jun 2012 20:27:03 +0200

Bastian

-- 
Even historians fail to learn from history -- they repeat the same mistakes.
-- John Gill, "Patterns of Force", stardate 2534.7
diff -Nru xen-4.0.1/debian/changelog xen-4.0.1/debian/changelog
--- xen-4.0.1/debian/changelog  2012-06-12 11:37:47.0 +0200
+++ xen-4.0.1/debian/changelog  2012-06-14 20:27:57.0 +0200
@@ -1,3 +1,11 @@
+xen (4.0.1-6) UNRELEASED; urgency=low
+
+  [ Ian Campbell ]
+  * Backport fix to remove lowmem 1:1 mapping that fixes boot on some
+classes of machines. (Closes: #649923)
+
+ -- Bastian Blank   Thu, 14 Jun 2012 20:27:03 +0200
+
 xen (4.0.1-5) stable-security; urgency=low
 
   * Fix privilege escalation and syscall/sysenter DoS while using
diff -Nru xen-4.0.1/debian/control.md5sum xen-4.0.1/debian/control.md5sum
--- xen-4.0.1/debian/control.md5sum 2012-06-12 11:40:53.0 +0200
+++ xen-4.0.1/debian/control.md5sum 2012-06-14 20:31:20.0 +0200
@@ -1,4 +1,4 @@
-e4419cdb21f9d69ca0ba7c65513b4315  debian/changelog
+6a070480a54a79a74d6623a07ff8beb7  debian/changelog
 24f2598a23e30264aea4a983d5d19eec  debian/bin/gencontrol.py
 ee1ccd7bf0932a81ca221cab08347614  debian/templates/control.hypervisor.in
 e4335ab10e217a12328cdf123473ed37  debian/templates/control.main.in
diff -Nru xen-4.0.1/debian/patches/series xen-4.0.1/debian/patches/series
--- xen-4.0.1/debian/patches/series 2012-06-12 10:02:17.0 +0200
+++ xen-4.0.1/debian/patches/series 2012-06-14 20:26:44.0 +0200
@@ -71,5 +71,6 @@
 upstream-21461:ee088a0b5cb8-CVE-2011-1166
 upstream-21482:c2adc059e931-CVE-2011-1583
 upstream-21485:b85a9e58ec3a-CVE-2011-1898
+upstream-22375:426f3a265784
 CVE-2012-0217+2012-0218
 CVE-2012-2934
diff -Nru xen-4.0.1/debian/patches/upstream-22375:426f3a265784 
xen-4.0.1/debian/patches/upstream-22375:426f3a265784
--- xen-4.0.1/debian/patches/upstream-22375:426f3a2657841970-01-01 
01:00:00.0 +0100
+++ xen-4.0.1/debian/patches/upstream-22375:426f3a2657842012-06-14 
20:26:16.0 +0200
@@ -0,0 +1,1094 @@
+# HG changeset patch
+# User Keir Fraser 
+# Date 1289303389 0
+# Node ID 426f3a2657844cec77ce0043b0408b0887fafa41
+# Parent  9997a1418633c92286189b33f701ecbac2a98ccd
+x86: do away with the boot time low-memory 1:1 mapping
+
+By doing so, we're no longer restricted to be able to place all boot
+loader modules into the low 1Gb/4Gb (32-/64-bit) of memory, nor is
+there a dependency anymore on where the boot loader places the
+modules.
+
+We're also no longer restricted to copy the modules into a place below
+4Gb, nor to put them all together into a single piece of memory.
+
+Further it allows even the 32-bit Dom0 kernel to be loaded anywhere in
+physical memory (except if it doesn't support PAE-above-4G).
+
+Signed-off-by: Jan Beulich 
+
+Index: xen-4.0.1/xen/arch/x86/boot/Makefile
+===
+--- xen-4.0.1.orig/xen/arch/x86/boot/Makefile  2010-08-29 17:13:22.0 
+0200
 xen-4.0.1/xen/arch/x86/boot/Makefile   2011-11-25 16:24:33.0 
+0100
+@@ -4,6 +4,6 @@
+ 
+ BOOT_TRAMPOLINE := $(shell sed -n 
's,^\#define[[:space:]]\{1\,\}BOOT_TRAMPOLINE[[:space:]]\{1\,\},,p' 
$(BASEDIR)/include/asm-x86/config.h)
+ %.S: %.c
+-  RELOC=$(BOOT_TRAMPOLINE) XEN_BITSPERLONG=$(patsubst 
x86_%,%,$(TARGET_SUBARCH)) $(MAKE) -f build32.mk $@
++  RELOC=$(BOOT_TRAMPOLINE) $(MAKE) -f build32.mk $@
+ 
+ reloc.S: $(BASEDIR)/include/asm-x86/config.h
+Index: xen-4.0.1/xen/arch/x86/boot/build32.mk
+===
+--- xen-4.0.1.orig/xen/arch/x86/boot/build32.mk2010-08-29 
17:13:22.0 +0200
 xen-4.0.1/xen/arch/x86/boot/build32.mk 2011-11-25 16:24:33.0 
+0100
+@@ -19,6 +19,6 @@
+   $(LD) $(LDFLAGS_DIRECT) -N -Ttext $(RELOC) -o $@ $<
+ 
+ %.o: %.c
+-  $(CC) $(CFLAGS) -DXEN_BITSPERLONG=$(XEN_BITSPERLONG) -c $< -o $@
++  $(CC) $(CFLAGS) -c $< -o $@
+ 
+ reloc.o: $(BASEDIR)/include/asm-x86/config.h
+Index: xen-4.0.1/xen/arch/x86/boot/head.S
+===
+--- xen-4.0.1.orig/xen/arch/x86/boot/head.S2010-08-29 17:13:22.0 
+0200
 xen-4.0.1/xen/arch/x86/boot/head.S 2011-11-25 16:24:33.0 +0100
+@@ -110,12 +110,15 @@
+ /* Initialise L2 identity-map and xen page table entries (16MB). */
+ mov $sym_phys(l2_identmap),%edi
+ mov $sym_phys(l2_xenmap),%esi
++mov $sym_phys(l2_bootmap),%edx
+ mov $0x1e3,%eax  /* PRESENT+RW+A+D+2MB+GLOBAL */
+ mov $8,%ecx
+ 1:  mov %eax,(%edi)
+ add $8,%edi
+