Port-xen archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: Xen 4.11 packages
On Thu, Jul 26, 2018 at 05:16:49PM +0300, Andreas Gustafsson wrote:
> Manuel Bouyer wrote:
> > Yesterday I commited packages for Xen 4.11.0.
> > patch-zz-JBeulich was not included to the branch so it's still here.
> > In addition this doesn't fix the hypervisor panic, so I added a
> > workaround (patch-zz-bouyer).
>
> Thank you!
>
> I ran some automated tests using 7.1.2, 8.0, and -current dom0s
> and domUs, and there were no crashes:
>
> http://www.gson.org/netbsd/bugs/xen/results/2018-07-25/index.html
>
> I did see some messages like the following on the console, are they
> something to worry about?
>
> (XEN) d5v0 Hit #DB in Xen context: e008:ffff82d08037ab30 [overflow], stk 0000:ffff8300df487f78, dr6 ffff0ff0
I don't think so. From Andrew Cooper on xen-devel ml, when I posted a
similar console output:
"I presume you're running a XSA-263 (MovSS) exploit in testing"
Actually we're not, but I guess some of our tests are doing something
very close. I don't know what it's about exactly.
--
Manuel Bouyer <bouyer%antioche.eu.org@localhost>
NetBSD: 26 ans d'experience feront toujours la difference
--
Home |
Main Index |
Thread Index |
Old Index