-
-
Notifications
You must be signed in to change notification settings - Fork 50
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fix guest memory corruption caused by hvmloader #172
Conversation
This should be sent to xen-devel mailing list first. Given the support status of qemu-traditional, it shouldn't be a controversial change. |
openQArun |
OpenQA test summaryComplete test suite and dependencies: https://openqa.qubes-os.org/tests/overview?distri=qubesos&version=4.2&build=2023120205-4.2&flavor=kernel New failures, excluding unstableCompared to: https://openqa.qubes-os.org/tests/overview?distri=qubesos&version=4.2&build=2023112922-4.2&flavor=kernel
Failed tests4 failures
Fixed failuresCompared to: https://openqa.qubes-os.org/tests/86627#dependencies 26 fixed
Unstable tests
|
for the moment I got no answer ( https://lists.xenproject.org/archives/html/xen-devel/2023-12/msg00133.html ) |
Anyway I can help test this? I think this is related to this issue with R4.2 |
https://lists.xenproject.org/archives/html/xen-devel/2023-12/msg01499.html ( @Garbage4F , I do not think that both issues are related. You could try to use "nvidia-open" driver instead of "nvidia", that is what I use on R4.2 for GPU passthrough ) |
Since #175 is merged, this one is not needed anymore. |
The xen hvmloader is relocating memory and overwritting some part of guest memory.
It seem to be a known issue in xen since the behavior is documented in the source code, so idk if it should be reported to the xen project.
I tested this patch on my setup for a few days, saw no issues yet, and it fixed QubesOS/qubes-issues#4321