Port-xen archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: Xen 4.11 packages



On Thu, Jul 26, 2018 at 05:16:49PM +0300, Andreas Gustafsson wrote:
> Manuel Bouyer wrote:
> > Yesterday I commited packages for Xen 4.11.0.
> > patch-zz-JBeulich was not included to the branch so it's still here.
> > In addition this doesn't fix the hypervisor panic, so I added a
> > workaround (patch-zz-bouyer).
> 
> Thank you!
> 
> I ran some automated tests using 7.1.2, 8.0, and -current dom0s
> and domUs, and there were no crashes:
> 
>   http://www.gson.org/netbsd/bugs/xen/results/2018-07-25/index.html
> 
> I did see some messages like the following on the console, are they
> something to worry about?
> 
>   (XEN) d5v0 Hit #DB in Xen context: e008:ffff82d08037ab30 [overflow], stk 0000:ffff8300df487f78, dr6 ffff0ff0

I don't think so. From Andrew Cooper on xen-devel ml, when I posted a
similar console output:
"I presume you're running a XSA-263 (MovSS) exploit in testing"

Actually we're not, but I guess some of our tests are doing something
very close. I don't know what it's about exactly.

-- 
Manuel Bouyer <bouyer%antioche.eu.org@localhost>
     NetBSD: 26 ans d'experience feront toujours la difference
--


Home | Main Index | Thread Index | Old Index