Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.
Sign upUpdating to Xen 4.8.3-8 does not take effect #3924
Comments
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
esote
commented
May 24, 2018
|
Pinging @marmarek |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
|
Do you have |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
esote
May 24, 2018
Yes,
# tree
.
├── BOOT
│ ├── BOOTX64.cfg
│ ├── BOOTX64.efi
│ ├── initramfs-4.14.35-1.pvops.qubes.x86_64.img
│ ├── initramfs-4.14.41-1.pvops.qubes.x86_64.img
│ ├── vmlinuz-4.14.35-1.pvops.qubes.x86_64
│ ├── vmlinuz-4.14.41-1.pvops.qubes.x86_64
│ ├── xen-4.8.3.efi
│ └── xen.cfg.anacbak
└── qubes
├── initramfs-4.14.35-1.pvops.qubes.x86_64.img
├── initramfs-4.14.41-1.pvops.qubes.x86_64.img
├── vmlinuz-4.14.35-1.pvops.qubes.x86_64
├── vmlinuz-4.14.41-1.pvops.qubes.x86_64
├── xen-4.8.3.efi
├── xen.cfg
├── xen.cfg.anacbak
└── xen.efi
xen-4.8.3.efi is different than xen.efi (and likewise BOOTX64.efi), They are nearly the same size (xen-4.8.3.efi is very slightly larger).
./BOOT:
total 61012
-rwx------ 1 root root 871 May 23 15:01 BOOTX64.cfg
-rwx------ 1 root root 2074224 May 23 15:01 BOOTX64.efi
-rwx------ 1 root root 23018390 May 23 15:01 initramfs-4.14.35-1.pvops.qubes.x86_64.img
-rwx------ 1 root root 23018865 May 23 15:01 initramfs-4.14.41-1.pvops.qubes.x86_64.img
-rwx------ 1 root root 6133696 May 23 15:01 vmlinuz-4.14.35-1.pvops.qubes.x86_64
-rwx------ 1 root root 6137408 May 23 15:01 vmlinuz-4.14.41-1.pvops.qubes.x86_64
-rwx------ 1 root root 2078490 May 23 15:01 xen-4.8.3.efi
-rwx------ 1 root root 0 May 23 15:01 xen.cfg.anacbak
./qubes:
total 61012
-rwx------ 1 root root 23018390 May 22 19:24 initramfs-4.14.35-1.pvops.qubes.x86_64.img
-rwx------ 1 root root 23018865 May 23 14:53 initramfs-4.14.41-1.pvops.qubes.x86_64.img
-rwx------ 1 root root 6133696 May 14 17:55 vmlinuz-4.14.35-1.pvops.qubes.x86_64
-rwx------ 1 root root 6137408 May 23 14:53 vmlinuz-4.14.41-1.pvops.qubes.x86_64
-rwx------ 1 root root 2078490 May 23 09:58 xen-4.8.3.efi
-rwx------ 1 root root 871 May 23 14:53 xen.cfg
-rwx------ 1 root root 0 Apr 21 22:56 xen.cfg.anacbak
-rwx------ 1 root root 2074224 Apr 21 22:56 xen.efi
Should I copy xen-4.8.3.efi to xen.efi (and to BOOTX64.efi)?
esote
commented
May 24, 2018
•
|
Yes,
Should I copy |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
May 24, 2018
Member
Ok, so I guess the xen-4.8.3.efi is the new one - you can override the one you use with it and check.
It looks like the instruction in that uefi workaround needs to be updated about which file should be copied.
|
Ok, so I guess the |
andrewdavidwong
changed the title from
Updating to Xen 4.8.3-8 does not take affect
to
Updating to Xen 4.8.3-8 does not take effect
May 24, 2018
andrewdavidwong
added
bug
C: xen
labels
May 24, 2018
andrewdavidwong
added this to the Release 4.0 updates milestone
May 24, 2018
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
esote
May 24, 2018
@marmarek That's worked, I now see "Xen 4.8.3-8.fc25". I agree, the documentation should note the xen-*.efi file. I am now seeing "XPTI: enabled" in xl dmesg, indicating Xen's meltdown protection.
Thanks for your help.
esote
commented
May 24, 2018
|
@marmarek That's worked, I now see "Xen 4.8.3-8.fc25". I agree, the documentation should note the Thanks for your help. |
esote
closed this
May 24, 2018
andrewdavidwong
reopened this
May 24, 2018
andrewdavidwong
added
C: doc
task
and removed
C: xen
bug
labels
May 24, 2018
andrewdavidwong
modified the milestones:
Release 4.0 updates,
Documentation/website
May 24, 2018
andrewdavidwong
added
the
help wanted
label
May 24, 2018
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
andrewdavidwong
May 24, 2018
Member
That's worked, I now see "Xen 4.8.3-8.fc25". I agree, the documentation should note the
xen-*.efifile. I am now seeing "XPTI: enabled" inxl dmesg, indicating Xen's meltdown protection.
Please consider submitting a PR. (I would just fix it myself, but I don't understand how you think the documentation should be changed, since it already mentions /boot/efi/EFI/BOOT/xen.efi.)
Edit: Ah, after reading the comments above, I see that it's something about having to perform a copying step that isn't mentioned in the documentation in addition to the renaming step that is already mentioned. Still, I think you're in the best position to add the missing information in the way that makes the most sense, since you just did it. I would still have to make a lot of (potentially wrong) assumptions to simulate your experience.
Please consider submitting a PR. (I would just fix it myself, but I don't understand how you think the documentation should be changed, since it already mentions Edit: Ah, after reading the comments above, I see that it's something about having to perform a copying step that isn't mentioned in the documentation in addition to the renaming step that is already mentioned. Still, I think you're in the best position to add the missing information in the way that makes the most sense, since you just did it. I would still have to make a lot of (potentially wrong) assumptions to simulate your experience. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
esote
commented
May 24, 2018
•
|
@andrewdavidwong Will do, it will notify below when I've submitted the PR. |
esote commentedMay 24, 2018
Qubes OS version:
R4
Affected component(s):
Xen
Steps to reproduce the behavior:
Expected behavior:
xl dmesgshows Xen 4.8.3-8Actual behavior:
Updated using the current-testing repo using
sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing. Xen and a few other packages were updated.dnfreports Xen is 4.8.3-8 whilexl dmesgreports Xen is 4.8.3-3. As such, I cannot test the new Xen update (ie for issue #3689).General notes:
Continuing from discussion on issue #3689.
Related issues: