Source: xen Version: 4.1.3~rc1+hg-20120614.a9c0a89c08f2-5 Severity: important - x86: Make asmlinkage explicitly a no-op, and avoid usage in arch/x86 Build-fix, done different in Debian. - tools/ocaml: Fix 2 bit-twiddling bugs and an off-by-one Relevant for xcp. - x86_64: Fix off-by-one error setting up the Interrupt Stack Tables Hypervisor code running with wrong stack. Breaks error handling in some cases. - x86/nmi: Fix deadlock in unknown_nmi_error() Deadlocks the hypervisor if an unknown NMI is received. - xen: Fix off-by-one error when parsing command line arguments - tools/pygrub: fix solaris kernel sniff Patched away in the Debian package. - x86: update Intel CPUID masking code to latest spec Allow proper CPUID handling on current Intel CPU. Guests may enable new features and fail. - pm: don't truncate processors' ACPI IDs to 8 bits Allow power-management on unusual configurations or very large systems. - xen, vtd: Fix device check for devices behind PCIe-to-PCI bridges Allows usage of more devices via IOMMU. - x86/cpuidle: add Westmere-EX support to hw residencies reading logic Hardware support. - x86/cpuidle: deny access to the I/O port used for EM_SYSIO - xen: Fix schedule()'s grabbing of the schedule lock - SVM: fix performance decrease with asid assignment - x86/mm: fix mod_l1_entry() return value when encountering r/o MMIO page - x86/PCI: fix guest_io_read() when pci_cfg_ok() denies access - passthrough: fix xsm-related oversight Bastian -- A father doesn't destroy his children. -- Lt. Carolyn Palamas, "Who Mourns for Adonais?", stardate 3468.1.
Debian Bug Tracking System
2012-Aug-17 22:48 UTC
[Pkg-xen-devel] Bug#683286: marked as done (Changes from 4.1.3-rc3)
Your message dated Fri, 17 Aug 2012 22:39:47 +0000 with message-id <E1T2VCl-0002je-Lv at franck.debian.org> and subject line Bug#683286: fixed in xen 4.1.3-1 has caused the Debian Bug report #683286, regarding Changes from 4.1.3-rc3 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner at bugs.debian.org immediately.) -- 683286: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683286 Debian Bug Tracking System Contact owner at bugs.debian.org with problems -------------- next part -------------- An embedded message was scrubbed... From: Bastian Blank <waldi at debian.org> Subject: Changes from 4.1.3-rc3 Date: Mon, 30 Jul 2012 16:38:17 +0200 Size: 3038 URL: <http://lists.alioth.debian.org/pipermail/pkg-xen-devel/attachments/20120817/335e2b69/attachment.mht> -------------- next part -------------- An embedded message was scrubbed... From: Bastian Blank <waldi at debian.org> Subject: Bug#683286: fixed in xen 4.1.3-1 Date: Fri, 17 Aug 2012 22:39:47 +0000 Size: 8698 URL: <http://lists.alioth.debian.org/pipermail/pkg-xen-devel/attachments/20120817/335e2b69/attachment-0001.mht>