Port-xen archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: Xen 4.11 packages



Le 26/07/2018 à 18:10, Manuel Bouyer a écrit :
On Thu, Jul 26, 2018 at 05:16:49PM +0300, Andreas Gustafsson wrote:
Manuel Bouyer wrote:
Yesterday I commited packages for Xen 4.11.0.
patch-zz-JBeulich was not included to the branch so it's still here.
In addition this doesn't fix the hypervisor panic, so I added a
workaround (patch-zz-bouyer).

Thank you!

I ran some automated tests using 7.1.2, 8.0, and -current dom0s
and domUs, and there were no crashes:

   http://www.gson.org/netbsd/bugs/xen/results/2018-07-25/index.html

I did see some messages like the following on the console, are they
something to worry about?

   (XEN) d5v0 Hit #DB in Xen context: e008:ffff82d08037ab30 [overflow], stk 0000:ffff8300df487f78, dr6 ffff0ff0

I don't think so. From Andrew Cooper on xen-devel ml, when I posted a
similar console output:
"I presume you're running a XSA-263 (MovSS) exploit in testing"

Actually we're not, but I guess some of our tests are doing something
very close. I don't know what it's about exactly.

We do have an ATF test that exploits MovSS, to verify our mitigation. So
that's likely the reason.


Home | Main Index | Thread Index | Old Index