Your message dated Tue, 23 Aug 2022 12:34:36 +0000 with message-id <[email protected]> and subject line Bug#1016547: fixed in xen 4.16.2-1 has caused the Debian Bug report #1016547, regarding /etc/default/grub.d/xen.cfg: Extraneous output line causes error message at boot to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [email protected] immediately.) -- 1016547: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016547 Debian Bug Tracking System Contact [email protected] with problems
--- Begin Message ---Package: xen-hypervisor-common Version: 4.14.5+24-g87d90d511c-1 Severity: minor File: /etc/default/grub.d/xen.cfg Dear Maintainer, When invoked via grub-mkconfig, xen.cfg outputs this as its first line: Including Xen overrides from /etc/default/grub.d/xen.cfg The output of grub-mkconfig is expected to be redirected into a grub.cfg file. Grub will read the grub.cfg at boot. Unfortunately, "Including" is not a valid grub command. So when booting, grub emits this error message before displaying its menu: error: can't find command `Including'. The error message is obscured very quickly. It does not affect functionality in any way. It requires booting on a VERY slow machine in order to read the error message at all. If I add a '#' to the start of the "Including", the resulting grub config file boots with no error. echo "#Including Xen overrides from /etc/default/grub.d/xen.cfg" I'm not sure if this line was intended to go into the generated config file as a comment, or if it was intended to be shown to the user while grub-mkconfig is running. I have observed this and tested my fix against version 4.14.5+24-g87d90d511c-1 of xen-hypervisor-common. I have also checked with the debian git at https://salsa.debian.org/xen-team/debian-xen/-/blob/master/debian/tree/xen-hypervisor-common/etc/default/grub.d/xen.cfg. This line has not changed in a very long time. I can also duplicate the behavior using grub-emu, with the output redirected to a file. I am running devuan, and originally reported this to their BTS but was redirected to debian. So my version number does not match. Apologies for that. Thanks for your time. -Mag -- System Information: Debian Release: 10.0 Architecture: amd64 (x86_64) Kernel: Linux 5.10.0-16-amd64 (SMP w/2 CPU threads) Locale: LANG=C, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE not set Shell: /bin/sh linked to /bin/dash Init: sysvinit (via /sbin/init) LSM: AppArmor: enabled -- Configuration Files: /etc/default/grub.d/xen.cfg changed: echo "#Including Xen overrides from /etc/default/grub.d/xen.cfg" XEN_OVERRIDE_GRUB_DEFAULT=0 if [ "$XEN_OVERRIDE_GRUB_DEFAULT" = "" ]; then echo "WARNING: GRUB_DEFAULT changed to boot into Xen by default!" echo " Edit /etc/default/grub.d/xen.cfg to avoid this warning." XEN_OVERRIDE_GRUB_DEFAULT=1 fi if [ "$XEN_OVERRIDE_GRUB_DEFAULT" = "1" ]; then GRUB_DEFAULT=$( \ printf "$(gettext "%s, with Xen hypervisor")" \ "$GRUB_DISTRIBUTOR GNU/Linux") fi -- no debconf information
--- End Message ---
--- Begin Message ---Source: xen Source-Version: 4.16.2-1 Done: Hans van Kranenburg <[email protected]> We believe that the bug you reported is fixed in the latest version of xen, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [email protected], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Hans van Kranenburg <[email protected]> (supplier of updated xen package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [email protected]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Tue, 23 Aug 2022 13:25:38 +0200 Source: xen Architecture: source Version: 4.16.2-1 Distribution: unstable Urgency: medium Maintainer: Debian Xen Team <[email protected]> Changed-By: Hans van Kranenburg <[email protected]> Closes: 1016547 Changes: xen (4.16.2-1) unstable; urgency=medium . * Update to new upstream version 4.16.2, which also contains security fixes for the following issues: - x86 pv: Race condition in typeref acquisition XSA-401 CVE-2022-26362 - x86 pv: Insufficient care with non-coherent mappings XSA-402 CVE-2022-26363 CVE-2022-26364 - Linux disk/nic frontends data leaks XSA-403 CVE-2022-26365 CVE-2022-33740 CVE-2022-33741 CVE-2022-33742 Note that this XSA also contains patches that have to be applied to the Linux kernel to make use of the new mitigations. - x86: MMIO Stale Data vulnerabilities XSA-404 CVE-2022-21123 CVE-2022-21125 CVE-2022-21166 - Retbleed - arbitrary speculative code execution with return instructions XSA-407 CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 - insufficient TLB flush for x86 PV guests in shadow mode XSA-408 CVE-2022-33745 * Note that the following XSA are not listed, because... - XSA-405 and XSA-406 have patches for the Linux kernel. * d/.../grub.d/xen.cfg: Redirect output when running grub-mkconfig so that we do not wrongly cause text to end up being part of the generated grub configuration. (Closes: #1016547) * Clean up lintian overrides that are reported as unused. * Move comments about lintian overrides above the override line itself, instead of being below, as instructed by the lintian documentation. * Deal with formatting changes in lintian output, which invalidate overrides we have. Also see Debian bug #1007002 for more information. Checksums-Sha1: 2b21c23d167a70d4bad230e7775c089c25ade2f5 4023 xen_4.16.2-1.dsc 8429ab579b54b1d0facb4df5498c759de58919ed 4556972 xen_4.16.2.orig.tar.xz e58013df0fd1f3b61fbe72dd73b5510a6b770ac4 131140 xen_4.16.2-1.debian.tar.xz Checksums-Sha256: e4d48ea5bef0d3d421e34c096d686e98fb9825eccd3c2c74fb103bd92bc6f607 4023 xen_4.16.2-1.dsc 515da24b898af97254047c415a61bc9729f5c029a45e7dc9e33ba73783853a6e 4556972 xen_4.16.2.orig.tar.xz f84e19fc31174d148d273fd895eee837cf92fef9551c6bd290eac88119b02829 131140 xen_4.16.2-1.debian.tar.xz Files: 82eb13205e1f88678bac633c8b0761ca 4023 admin optional xen_4.16.2-1.dsc 2b6ac9d570ad75d81d1e7cd47815ec10 4556972 admin optional xen_4.16.2.orig.tar.xz bdeefd802fa6657cb04f3af669c2966a 131140 admin optional xen_4.16.2-1.debian.tar.xz -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEESWyddwNaG9637koYssHfcmNhX2wFAmMExwkACgkQssHfcmNh X2xxZw/+LYk7IOm0LSIipreu6mKrKOv/PQji6Llz3lw8eC9lElAiOhh3A7U5OMcS DWimSpcxchP44mVlGK4T2PgTA4mEa3MpX968URmY2ExUPqJhV7lD6HYoG1v3PSu6 EP8u6iedOzQAi32SB3f11CqlE64dfE9s6+2zBIhjkLnn/mF8HW/JNmul2N7YzaPJ 7+gDEfxBifFO/JtmRt4mboXiGmDmhpI7wp9g40bHEBCPxomrq3ohGxnYpG3hXj0X pM7F5jwoBvGEL/rr0XHTaz8zMZoFeNyIBZJ9BzdGmKu4CGKkC+hALn3P1wyrbq/u 5h0E3s7Gt8247mPiqVUJRCjNSI102urOUq95Uy/N5YV99UsdEMdJugJvmvtOngOC p9O2M5al1Uw3dRb+NCQzg0DyZd9aOWcYvjGnmMFLQzU0LEylCFF6OGjy+1/yk7nd 8RE95n513Iyuo22SkkAAvbmx1Ycg+WlvsFWFnofvbRnztlYeFtmcQoz9/sx6Z/9H JgWMxCl9WHxEcBDpJBMsEDUvaRIIwd1fOYU+mYabKVZbueCZKjI6qNVdEg2tn/bX OolDvVy3r2Cc9NWb+w7WjIWuLcMzaAjH+PMGnHLQMEz6kWL56jYgehA//2il9VOX kOu1PG0noTC4F0pi95qhzrdRrf/ILfVmvgUfi0aQV8/xOoexbws= =+O5y -----END PGP SIGNATURE-----
--- End Message ---

