similar to: Bug#490409: xen-3: diff for NMU version 3.2.1-2.1

Displaying 19 results from an estimated 19 matches similar to: "Bug#490409: xen-3: diff for NMU version 3.2.1-2.1"

2012 Nov 13
4
[PATCH] qemu-stubdom: prevent useless medium change
qemu-stubdom was stripping the prefix from the "params" xenstore key in xenstore_parse_domain_config, which was then saved stripped in a variable. In xenstore_process_event we compare the "param" from xenstore (not stripped) with the stripped "param" saved in the variable, which leads to a medium change (even if there isn't any), since we are comparing something
2008 Jul 01
1
[PATCH] qemu-xen: Fix extendable images
Hi Ian, I''m not completely sure about this one. The question is what you really wanted to achieve with that BLOCK_DRIVER_FLAG_EXTENDABLE thing. I suspect that you just put it into the wrong struct accidentally (bdrv_host_device instead of bdrv_raw), but I might be wrong. Changing it allows me to use qcow2 images through tap:ioemu again - in fact, I think it fixes extendable images in
2009 Jul 15
0
Bug#536175: Bug#536175: Bug#536176: xen-utils-3.4: trying xen-3.4 once breaks xen-3.2 (?)
Here is a patch to the Debian xen-3 3.4.0-1 package that reenables ioemu. I have been using it for the last four weeks. (I understand there are reasons this cannot go into Debian yet, but hopefully it will be useful to people that depend on running HVMs today.) Anders -------------- next part -------------- --- xen-3/debian/changelog +++ xen-3/debian/changelog @@ -1,3 +1,10 @@ +xen-3
2012 Dec 13
0
[xen-unstable test] 14682: regressions - FAIL
flight 14682 xen-unstable real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/14682/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-winxpsp3 8 guest-saverestore fail REGR. vs. 14678 test-amd64-amd64-xl-qemut-winxpsp3 12 guest-localmigrate/x10 fail REGR. vs. 14678 test-amd64-amd64-xl-qemuu-win7-amd64
2008 Jul 12
3
Bug#490409: CVE-2008-2004: privilege escalation
Package: xen-3 Severity: grave Tags: security Justification: user security hole Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for xen-3. CVE-2008-2004[0]: | The drive_init function in QEMU 0.9.1 determines the format of a raw | disk image based on the header, which allows local guest users to read | arbitrary files on the host by modifying the header to identify
2008 Dec 09
3
Problems with getting correct id from query involving two tables
I have a query that is intended to find all "transfers" based on a condition the uses a second table. In the controller, it looks like this: def find_protocols @transfers = Transfer.find(:all, :from => "transfers, protocols", :conditions => "transfers.protocol_id = protocols.id AND protocols.name = \"#{params[:protocol]}\"") respond_to do
2006 Sep 12
5
32E (64bit) VMX keyboard is out of control, if given an addition ''hde''
Hi, This issue only happens on my IA32E VMX domain. IA32 VMX domain is okay. I am trying VBD disk in IA32E VMX domain. I used following disk configuration to create an IA32E VMX domain. disk = [ ''file:/mnt/disk1.img,hda,w'', ''file:/mnt/disk2.img,hde,w'' ] After creating VMX, its keyboard can not be used properly. For example, if pressing
2007 Apr 13
0
qcow-create buffer overflow?
For many months now we have been trying to create a file-backed qcow image with the qcow-create code. Each time we try to back a file with a qcow, it screams: *** buffer overflow detected ***: qcow-create terminated Below is the output from two different attempts and information about qcow-create. Any ideas/thoughts/help you can offer? Thank you for your help! -Eric [root@trogdor ~]#
2012 Aug 10
6
qemu-xen-traditional: NOCACHE or CACHE_WB to open disk images for IDE
Hi list, Recently I was debugging L2 guest slow booting issue in nested virtualization environment (both L0 and L1 hypervisors are all Xen). To boot a L2 Linux guest (RHEL6u2), it will need to wait more than 3 minutes after grub loaded, I did some profile, and see guest is doing disk operations by int13 BIOS procedure. Even not consider the nested case, I saw there is a bug reporting normal VM
2009 Jul 01
1
Processed: tagging as pending bugs that are closed by packages in NEW
Processing commands for control at bugs.debian.org: > # Wed Jul 1 08:03:27 UTC 2009 > # Tagging as pending bugs that are closed by packages in NEW > # http://ftp-master.debian.org/new.html > # > # Source package in NEW: xen-3 > tags 490409 + pending Bug#490409: CVE-2008-2004: privilege escalation Tags were: patch security Tags added: pending > # Source package in NEW:
2008 Aug 04
1
Possible problems in your Debian packages
=== xen-3: = 2 bug(s) that should be fixed for the next Debian release: - #391935 <http://bugs.debian.org/391935> Xen trademark might be problematic - #490409 <http://bugs.debian.org/490409> CVE-2008-2004: privilege escalation ------------ interesting stuff probably ends here ------------ This is an automated mail. These mails are sent two times per month. For more information
2012 Aug 21
5
[PATCH 1/2 v1] blkdrv: Add queue limits parameters for sg block drive
This patch adds some queue limit parameters into block drive. And inits them for sg block drive. Some interfaces are also added for accessing them. Signed-off-by: Cong Meng <mc at linux.vnet.ibm.com> --- block/raw-posix.c | 58 +++++++++++++++++++++++++++++++++++++++++++++++++++++ block_int.h | 4 +++ blockdev.c | 15 +++++++++++++ hw/block-common.h | 3 ++ 4 files
2012 Aug 21
5
[PATCH 1/2 v1] blkdrv: Add queue limits parameters for sg block drive
This patch adds some queue limit parameters into block drive. And inits them for sg block drive. Some interfaces are also added for accessing them. Signed-off-by: Cong Meng <mc at linux.vnet.ibm.com> --- block/raw-posix.c | 58 +++++++++++++++++++++++++++++++++++++++++++++++++++++ block_int.h | 4 +++ blockdev.c | 15 +++++++++++++ hw/block-common.h | 3 ++ 4 files
2009 Jun 30
0
xen-3_3.4.0-1_amd64.changes is NEW
libxen-dev_3.4.0-1_amd64.deb to pool/main/x/xen-3/libxen-dev_3.4.0-1_amd64.deb libxenstore3.0_3.4.0-1_amd64.deb to pool/main/x/xen-3/libxenstore3.0_3.4.0-1_amd64.deb xen-3_3.4.0-1.diff.gz to pool/main/x/xen-3/xen-3_3.4.0-1.diff.gz xen-3_3.4.0-1.dsc to pool/main/x/xen-3/xen-3_3.4.0-1.dsc xen-3_3.4.0.orig.tar.gz to pool/main/x/xen-3/xen-3_3.4.0.orig.tar.gz (new)
2008 Jul 01
1
Possible problems in your Debian packages
=== xen-3: = 1 bug(s) that should be fixed for the next Debian release: - #391935 <http://bugs.debian.org/391935> Xen trademark might be problematic ------------ interesting stuff probably ends here ------------ This is an automated mail. These mails are sent two times per month. For more information about these mails, refer to http://wiki.debian.org/qa.debian.org/DdpoByMail We are sorry
2009 Jan 15
2
Has anyone used FaxGateway()
Hi, I've been trying to use the FaxGateway application to send T.38 out over Zaptel using asterisk but I don't seem to be having any luck. I'm executing it in the dialplan like: FaxGateway(Zap/g0/[number]) Has anyone had any luck using this thing and can enlighten me on how it's supposed to be used? Thanks.
2011 Feb 26
1
make world error
This time make world on Ubuntu 10.04 gives following error gcc -O2 -fomit-frame-pointer -m32 -march=i686 -fno-strict-aliasing -std=gnu99 -Wall -Wstrict-prototypes -Wno-unused-value -Wdeclaration-after-statement -D__XEN_TOOLS__ -MMD -MF .fsimage.so.d -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_LARGEFILE_SOURCE -D_LARGEFILE64_SOURCE -mno-tls-direct-seg-refs -I../../../tools/libfsimage/common/
2012 Apr 24
21
no console when using xl toolstack xen 4.1.2
Hello! I was asking for help on the Freenode channel, and I was pointed here. I have a situation where, using xl, I can create a functional PV domU, with or without pv-grub, but I cannot access the console. Firing up xend and using xm works without trouble. Since xend and company is being deprecated, I would like to transition to using the xl toolstack. The system is an Arch Linux system
2007 Oct 24
16
PATCH 0/10: Merge PV framebuffer & console into QEMU
The following series of 10 patches is a merge of the xenfb and xenconsoled functionality into the qemu-dm code. The general approach taken is to have qemu-dm provide two machine types - one for xen paravirt, the other for fullyvirt. For compatability the later is the default. The goals overall are to kill LibVNCServer, remove alot of code duplication and/or parallel impls of the same concepts, and