[Pkg-xen-devel] Bug#1032480: xen: Important cherry-picks for bookworm/updates

Elliott Mitchell ehem+debian at m5p.com
Sun Mar 19 02:26:12 GMT 2023


On Tue, Mar 07, 2023 at 01:13:56PM -0800, Elliott Mitchell wrote:
> 
> ad15a0a8ca2515d8ac58edfc0bc1d3719219cb77
> x86/time: prevent overflow with high frequency TSCs

Okay, looks like this one had already been grabbed.  Sorry for the way
too late alert.  Thanks for staying on top of what was happening with
upstream Xen.


> I haven't found a patch for the other one yet.  There is some issue with
> the latest generation which needs "x2apic=false" on Xen's command-line
> in order to get interrupts to domain 0.  I'm guessing the latest from AMD
> broke the PIC emulation.
> 
> If this isn't actually patched yet, I suspect it soon will be.  I haven't
> observed anything on xen-devel, so perhaps the workaround was found too
> quickly to get noticed as urgent.

This one though looks potentially more and less serious.  The workaround
is simpler than the above ("x2apic=false" on Xen's command-line, instead
of "tsc_mode = 1" for *every* VM).  Yet the underlying problem could be
more severe.


-- 
(\___(\___(\______          --=> 8-) EHM <=--          ______/)___/)___/)
 \BS (    |         ehem+sigmsg at m5p.com  PGP 87145445         |    )   /
  \_CS\   |  _____  -O #include <stddisclaimer.h> O-   _____  |   /  _/
8A19\___\_|_/58D2 7E3D DDF4 7BA6 <-PGP-> 41D1 B375 37D0 8714\_|_/___/5445



More information about the Pkg-xen-devel mailing list