On Thu, Jul 26, 2018 at 05:16:49PM +0300, Andreas Gustafsson wrote:
Manuel Bouyer wrote:
Yesterday I commited packages for Xen 4.11.0.
patch-zz-JBeulich was not included to the branch so it's still here.
In addition this doesn't fix the hypervisor panic, so I added a
workaround (patch-zz-bouyer).
Thank you!
I ran some automated tests using 7.1.2, 8.0, and -current dom0s
and domUs, and there were no crashes:
http://www.gson.org/netbsd/bugs/xen/results/2018-07-25/index.html
I did see some messages like the following on the console, are they
something to worry about?
(XEN) d5v0 Hit #DB in Xen context: e008:ffff82d08037ab30 [overflow], stk 0000:ffff8300df487f78, dr6 ffff0ff0
I don't think so. From Andrew Cooper on xen-devel ml, when I posted a
similar console output:
"I presume you're running a XSA-263 (MovSS) exploit in testing"
Actually we're not, but I guess some of our tests are doing something
very close. I don't know what it's about exactly.