On Tue, 15 Oct 2024 14:20:02 +0400 Mariam Arutunian
wrote:
> Package: libxen
> Version: 4.17.3
> Severity: normal
> X-Debbugs-Cc: mariamarutun...@gmail.com
>
> Dear Maintainer,
> A vulnerability identified as CVE-2014-4608 was discovered and fixed
in LZO decompressor in the Linux kernel with the f
On 12/02/2024 5:27 pm, zithro wrote:
> Hey all,
>
> the Debian project is focused on the "2038 time_t" switch.
> So the maintainers of the Debian Xen package must ensure that all
> imported Xen code conforms to the new Debian standards.
>
> I was asked by Andrew
On 10/03/2019 23:12, Hans van Kranenburg wrote:
> On 3/10/19 11:03 PM, Andrew Cooper wrote:
>> On 10/03/2019 21:35, Hans van Kranenburg wrote:
>>> [...]
>>>
>>> Using dom0_mem=2GiB,max:4GiB instead of dom0_mem=2GiB,max:2GiB (which I
>>> started
On 10/03/2019 21:35, Hans van Kranenburg wrote:
> found -1 4.19.20-1
> thanks
>
> Hi,
>
> Reviving a thing from Jan 2017 here. I don't have this thread in my
> mailbox, so no inline quotes.
>
> I just installed some HP z820 workstation and rebooted it into Xen
> 4.11.1+26-g87f51bf366-3 with linux 4
On 16/05/17 10:54, Jan Beulich wrote:
On 16.05.17 at 05:47, wrote:
>> On Mon, May 15, 2017 at 02:02:53AM -0600, Jan Beulich wrote:
>> On 14.05.17 at 00:36, wrote:
I haven't yet done as much experimentation as Andreas Pflug has, but I
can confirm I'm also running into this bug w
On 17/03/17 03:05, Boris Ostrovsky wrote:
>
>
> On 03/16/2017 08:18 PM, Ben Hutchings wrote:
>> On Thu, 2017-03-16 at 21:49 +, Andrew Cooper wrote:
>>> On 16/03/2017 21:05, Ben Hutchings wrote:
>>>> On Thu, 2017-03-16 at 00:50 +, Ben Hutchings wrote:
>
On 16/03/2017 21:05, Ben Hutchings wrote:
> On Thu, 2017-03-16 at 00:50 +, Ben Hutchings wrote:
>> On Wed, 2017-03-15 at 22:24 +, Ben Hutchings wrote:
>>> Control: retitle -1 [xen] x86/mm: Found insecure W+X mapping
>>> Control: tag -1 upstream confirmed
>>> Control: found -1 4.9.13-1
>>>
>
o post to linux-kernel saying "this patch
>>> fixes such-and-such". You should:
> ...
>> I see. This is not something I've done before, but I'd be willing to
>> give it a go.
>>
>> But, I am not the author of these two patches. That's David V
wanring) so use tabs and while
> there remove the whitespace inside the if as Linux does.
>
> [0] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=812166
>
> Signed-off-by: Ian Campbell
> Cc: Christoph Egger
> Cc: Liu Jinsong
Reviewed-by: Andrew Cooper
On 04/09/14 15:25, Ian Campbell wrote:
> On Thu, 2014-09-04 at 15:15 +0100, Ian Jackson wrote:
>> Colin Watson writes ("Re: Bug#759018: [PATCH RFC] Provide prebuilt grub-xen
>> binaries for host (dom0) use"):
>> ...
>>> There is also the question of whether the guest-side name should mention
>>> G
On 16/05/14 11:08, Jan Beulich wrote:
On 16.05.14 at 10:58, wrote:
>> So it seems like dom0 is unable to (correctly) bind to some hardware
>> interrupts. I wonder if these messages from Xen's dmesg are relevant.
>> (XEN) Not enabling x2APIC: depends on iommu_supports_eim.
>> (XEN) I/O virtual
dition.
~Andrew
>
> Cheers,
> Ian.
>
> [0] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=665433
>
--
Andrew Cooper - Dom0 Kernel Engineer, Citrix XenServer
T: +44 (0)1223 225 900, http://www.citrix.com
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.
12 matches
Mail list logo