[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH] x86-64: refine the XSA-9 fix


  • To: Olaf Hering <olaf@xxxxxxxxx>, Keir Fraser <keir@xxxxxxx>
  • From: Keir Fraser <keir.xen@xxxxxxxxx>
  • Date: Fri, 17 Aug 2012 16:48:22 +0100
  • Cc: Jan Beulich <JBeulich@xxxxxxxx>, xen-devel <xen-devel@xxxxxxxxxxxxx>
  • Delivery-date: Fri, 17 Aug 2012 15:48:59 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xen.org>
  • Thread-index: Ac18j7rQ2+dwkjB/P0WQYEAJ5jDPZQ==
  • Thread-topic: [Xen-devel] [PATCH] x86-64: refine the XSA-9 fix

On 17/08/2012 16:11, "Olaf Hering" <olaf@xxxxxxxxx> wrote:

> On Mon, Jun 18, Keir Fraser wrote:
> 
>> On 13/06/2012 11:04, "Jan Beulich" <JBeulich@xxxxxxxx> wrote:
>> 
>>> Our product management wasn't happy with the "solution" for XSA-9, and
>>> demanded that customer systems must continue to boot. Rather than
>>> having our and perhaps other distros carry non-trivial patches, allow
>>> for more fine grained control (panic on boot, deny guest creation, or
>>> merely warn) by means of a single line change.
>> 
>> All this seems to allow is to boot but not create domU-s. Which seems a bit
>> pointless.
> 
> Refusing to boot into dom0 with no good reason is a good way to lose
> remote control of a system without serial console. Not funny.
> 
> Fortunately I booted and tested with sles11 Xen first before ruining the
> box with plain xen-unstable.
> 
> So, please apply this patch and remove the panic() from
> ./xen/arch/x86/cpu/amd.c

Okay, that's a good argument for that patch.

 -- Keir

> Olaf



_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.