Cookies op Tweakers

Tweakers is onderdeel van DPG Media en maakt gebruik van cookies, JavaScript en vergelijkbare technologie om je onder andere een optimale gebruikerservaring te bieden. Ook kan Tweakers hierdoor het gedrag van bezoekers vastleggen en analyseren. Door gebruik te maken van deze website, of door op 'Cookies accepteren' te klikken, geef je toestemming voor het gebruik van cookies. Wil je meer informatie over cookies en hoe ze worden gebruikt? Bekijk dan ons cookiebeleid.

Meer informatie

Software-update: Xen 4.10.2 / 4.9.3

Xen is een baremetal-hypervisor voor het x86- en ARMv7/v8-platform, en laat diverse besturingssystemen gelijktijdig op één systeem draaien zonder de prestaties drastisch te beïnvloeden. Voor meer informatie over Xen en de bijbehorende community verwijzen we naar deze en deze pagina. Op dit moment worden alleen Linux, NetBSD en FreeBSD als hostsystemen ondersteund, maar men is druk bezig om ook andere besturingssystemen volledig te ondersteunen. De ontwikkelaars hebben versies 4.10.2 en 4.9.3 uitgebracht, met de volgende aankondigingen:

Xen Project 4.10.2

We are pleased to announce the release of Xen 4.10.2. This is available immediately from its git repository or from this download page. This release contains the following bug-fixes and improvements in the Xen Project hypervisor:
  • 0c1d5b68e2: update Xen version to 4.10.2
  • 4266e4c7d3: x86: assorted array_index_nospec() insertions
  • 74a95386d4: VT-d/dmar: iommu mem leak fix
  • b75228ccc3: rangeset: make inquiry functions tolerate NULL inputs
  • 24bc2e31b2: x86/setup: Avoid OoB E820 lookup when calculating the L1TF safe address
  • bd993a7b4e: x86/hvm/ioreq: MMIO range checking completely ignores direction flag
  • e0a20e7c5c: x86/vlapic: Bugfixes and improvements to vlapic_{read,write}()
  • 713f3b1294: x86/vmx: Avoid hitting BUG_ON() after EPTP-related domain_crash()
  • 017f85220f: tools: prepend to PKG_CONFIG_PATH when configuring qemu
  • bf1b7f5b9b: libxl: start pvqemu when 9pfs is requested
  • fe50b33b07: x86: write to correct variable in parse_pv_l1tf()
  • 13e85a6dbc: xl.conf: Add global affinity masks
  • fac0731d75: x86: Make "spec-ctrl=no" a global disable of all mitigations
  • ed933041a8: x86/spec-ctrl: Introduce an option to control L1D_FLUSH for HVM HAP guests
  • ef71d13e7f: x86/msr: Virtualise MSR_FLUSH_CMD for guests
  • 80dd3f52be: x86/spec-ctrl: CPUID/MSR definitions for L1D_FLUSH
  • c67a8b808a: x86/pv: Force a guest into shadow mode when it writes an L1TF-vulnerable PTE
  • 85d133b90d: x86/mm: Plumbing to allow any PTE update to fail with -ERESTART
  • d46374d794: x86/shadow: Infrastructure to force a PV guest into shadow mode
  • 614fd2558f: x86/spec-ctrl: Introduce an option to control L1TF mitigation for PV guests
  • 684fb8c7c4: x86/spec-ctrl: Calculate safe PTE addresses for L1TF mitigations
  • 56d5138060: tools/oxenstored: Make evaluation order explicit
  • 924a5ee8c0: x86/vtx: Fix the checking for unknown/invalid MSR_DEBUGCTL bits
  • 5fd0bb322d: ARM: disable grant table v2
  • 9e7ee9478d: common/gnttab: Introduce command line feature controls
  • 0de39f36b7: VMX: fix vmx_{find,del}_msr() build
  • 6504045842: x86/vmx: Support load-only guest MSR list entries
  • b4d669064f: x86/vmx: Pass an MSR value into vmx_msr_add()
  • 09b6924ec6: x86/vmx: Improvements to LBR MSR handling
  • 2450f34870: x86/vmx: Support remote access to the MSR lists
  • 227da39d8f: x86/vmx: Factor locate_msr_entry() out of vmx_find_msr() and vmx_add_msr()
  • 07a9be73c7: x86/vmx: Internal cleanup for MSR load/save infrastructure
  • dcca8f0234: x86/vmx: API improvements for MSR load/save infrastructure
  • 8af1a797de: x86/vmx: Defer vmx_vmcs_exit() as long as possible in construct_vmcs()
  • 93017a6b0d: x86/vmx: Fix handing of MSR_DEBUGCTL on VMExit
  • 6e57d28086: x86/spec-ctrl: Yet more fixes for xpti= parsing
  • 87c83af333: x86/spec-ctrl: Fix the parsing of xpti= on fixed Intel hardware
  • b07c76fece: x86/hvm: Disallow unknown MSR_EFER bits
  • 541a105ada: x86/xstate: Make errors in xstate calculations more obvious by crashing the domain
  • 6f6207fac5: x86/xstate: Use a guests CPUID policy, rather than allowing all features
  • 6feafd89d2: x86/vmx: Don't clobber %dr6 while debugging state is lazy
  • 01eb262d5e: x86: command line option to avoid use of secondary hyper-threads
  • 512d3e7828: x86: possibly bring up all CPUs even if not all are supposed to be used
  • 74f437f054: x86: distinguish CPU offlining from CPU removal
  • 371149b69b: x86/AMD: distinguish compute units from hyper-threads
  • 3607213d2c: cpupools: fix state when downing a CPU failed
  • 714552510a: x86/svm Fixes and cleanup to svm_inject_event()
  • 498716e253: allow cpu_down() to be called earlier
  • fab92fcf44: xen: oprofile/nmi_int.c: Drop unwanted sexual reference
  • bc1289f1e7: mm/page_alloc: correct first_dirty calculations during block merging
  • 4ccf3974c8: x86/spec-ctrl: command line handling adjustments
  • 381fdae3f0: x86: correctly set nonlazy_xstate_used when loading full state
  • d976fe5bf0: xen: Port the array_index_nospec() infrastructure from Linux
  • a645331a9f: x86/EFI: further correct FPU state handling around runtime calls
  • c2202404d3: x86/HVM: attempts to emulate FPU insns need to set fpu_initialised
  • 78a86a7c2a: x86/EFI: fix FPU state handling around runtime calls
  • 6e0e45a963: x86/VT-x: Fix printing of EFER in vmcs_dump_vcpu()
  • b81a8bf199: x86/traps: Fix error handling of the pv %dr7 shadow state
  • de578bc4c3: x86/CPUID: don't override tool stack decision to hide STIBP
  • 3bd7966eba: x86: correct default_xen_spec_ctrl calculation
  • dd07d3e25c: libxc/x86/PV: don't hand through CPUID leaf 0x80000008 as is
  • b5e9f1e674: x86: guard against #NM
  • e0da0d9170: x86/HVM: don't cause #NM to be raised in Xen
  • 23081587da: libxl: restore passing "readonly=" to qemu for SCSI disks
  • b2444d2f81: libxl: qemu_disk_scsi_drive_string: Break out common parts of disk config
  • 42219af0df: x86: Refine checks in #DB handler for faulting conditions
  • 1d5a9ecce1: x86/mm: don't bypass preemption checks
  • eeb15764ad: x86/HVM: account for fully eager FPU mode in emulation
  • 4b9dc6d0e6: x86/spec-ctrl: Mitigations for LazyFPU
  • 52447b36f1: x86: Support fully eager FPU context switching
  • 7b35e7807c: xen/x86: use PCID feature
  • 8d48204c6d: xen/x86: add some cr3 helpers
  • b3a7f2f2fe: xen/x86: convert pv_guest_cr4_to_real_cr4() to a function
  • fb781023a4: xen/x86: use flag byte for decision whether xen_cr3 is valid
  • 245eaee519: xen/x86: disable global pages for domains with XPTI active
  • 18833a8830: xen/x86: use invpcid for flushing the TLB
  • 72e5b163a2: xen/x86: support per-domain flag for xpti
  • 27a4161bf0: xen/x86: add a function for modifying cr3
  • 23114db6ff: x86/xpti: avoid copying L4 page table contents when possible
  • 6300cdd7c2: x86: invpcid support
  • 2a0913ede5: x86: move invocations of hvm_flush_guest_tlbs()
  • daaf3dd430: x86/XPTI: fix S3 resume (and CPU offlining in general)
  • c2b84e7cc4: x86/msr: Virtualise MSR_SPEC_CTRL.SSBD for guests to use
  • 908ddbbe5d: x86/Intel: Mitigations for GPZ SP4 - Speculative Store Bypass
  • c75bbf1d87: x86/AMD: Mitigations for GPZ SP4 - Speculative Store Bypass
  • e9dc0a6654: x86/spec_ctrl: Introduce a new `spec-ctrl=` command line argument to replace `bti=`
  • 470daefec2: x86/cpuid: Improvements to guest policies for speculative sidechannel features
  • c9fdfbb478: x86/spec_ctrl: Explicitly set Xen's default MSR_SPEC_CTRL value
  • 49aebf4728: x86/spec_ctrl: Split X86_FEATURE_SC_MSR into PV and HVM variants
  • 48ad1ab669: x86/spec_ctrl: Elide MSR_SPEC_CTRL handling in idle context when possible
  • 98a285cb51: x86/spec_ctrl: Rename bits of infrastructure to avoid NATIVE and VMEXIT
  • cb2a83ff0d: x86/spec_ctrl: Fold the XEN_IBRS_{SET,CLEAR} ALTERNATIVES together
  • 51b7b5d631: x86/spec_ctrl: Merge bti_ist_info and use_shadow_spec_ctrl into spec_ctrl_flags
  • 840d6833fc: x86/spec_ctrl: Express Xen's choice of MSR_SPEC_CTRL value as a variable
  • ec50d21cbf: x86/spec_ctrl: Read MSR_ARCH_CAPABILITIES only once
  • a0355180b6: viridian: fix cpuid leaf 0x40000003
  • 8342e3f30a: libacpi: fixes for iasl >= 20180427
  • aaf66de7c5: x86/pv: Hide more EFER bits from PV guests
  • 7e21b75a21: x86: fix return value checks of set_guest_{machinecheck,nmi}_trapbounce
  • f155f55356: xen/schedule: Fix races in vcpu migration
  • 3a903b354c: xen: Introduce vcpu_sleep_nosync_locked()
  • 2e2f337085: x86/SVM: Fix intercepted {RD,WR}MSR for the SYS{CALL,ENTER} MSRs
  • 850e5adf4b: xpti: fix bug in double fault handling
  • 13fa2a464f: x86/HVM: never retain emulated insn cache when exiting back to guest
  • ade8f98917: x86/HPET: fix race triggering ASSERT(cpu < nr_cpu_ids)
  • a7f8880adc: x86/spec_ctrl: Updates to retpoline-safety decision making
  • 3bb756be2b: x86/pv: Introduce and use x86emul_write_dr()
  • 1aa630599d: x86/pv: Introduce and use x86emul_read_dr()
  • d93ae631a4: x86: suppress BTI mitigations around S3 suspend/resume
  • 6b8d820bbe: x86: correct ordering of operations during S3 resume
  • f253feb3fe: update Xen version to 4.10.2-pre
  • 25e0657ed4: x86/HVM: guard against emulator driving ioreq state in weird ways
  • 31c78e9ca3: x86/vpt: add support for IO-APIC routed interrupts
  • 07b6f42623: x86/traps: Fix handling of #DB exceptions in hypervisor context
  • 373d49693a: x86/traps: Use an Interrupt Stack Table for #DB
  • 9abae6f7a8: x86/pv: Move exception injection into {,compat_}test_all_events()
  • abe5fb9218: x86/traps: Fix %dr6 handing in #DB handler
This release also contains changes to qemu-upstream, whose changelogs we do not list here as it contains many changes that are not directly releated to the Xen Project Hypervisor and thus this release.

We recommend all users of the 4.10 stable series to update to this latest point release.

Xen Project 4.9.3

We are pleased to announce the release of Xen 4.9.3. This is available immediately from its git repository or from this download page. This release contains the following bug-fixes and improvements in the Xen Project hypervisor:
  • 062052a149: update Xen version to 4.9.3
  • ca65ce2b52: x86: assorted array_index_nospec() insertions
  • 792130b9d2: VT-d/dmar: iommu mem leak fix
  • a6100f3ede: rangeset: make inquiry functions tolerate NULL inputs
  • 09cdeaeb60: x86/setup: Avoid OoB E820 lookup when calculating the L1TF safe address
  • e9192cd9ac: x86/hvm/ioreq: MMIO range checking completely ignores direction flag
  • 1f399b907f: x86/vlapic: Bugfixes and improvements to vlapic_{read,write}()
  • 5bb24b2792: x86/vmx: Avoid hitting BUG_ON() after EPTP-related domain_crash()
  • 71e51140fd: libxl: start pvqemu when 9pfs is requested
  • 6c9d139cdd: x86: write to correct variable in parse_pv_l1tf()
  • 14f90aaef8: xl.conf: Add global affinity masks
  • c95088f090: x86: Make "spec-ctrl=no" a global disable of all mitigations
  • cac6aa015c: x86/spec-ctrl: Introduce an option to control L1D_FLUSH for HVM HAP guests
  • fd86a3c856: x86/msr: Virtualise MSR_FLUSH_CMD for guests
  • e06752e2d6: x86/spec-ctrl: CPUID/MSR definitions for L1D_FLUSH
  • f73c777042: x86/pv: Force a guest into shadow mode when it writes an L1TF-vulnerable PTE
  • a5d7667a38: x86/mm: Plumbing to allow any PTE update to fail with -ERESTART
  • 4704d590fa: x86/shadow: Infrastructure to force a PV guest into shadow mode
  • 3ad78aaa4c: x86/spec-ctrl: Introduce an option to control L1TF mitigation for PV guests
  • a060b6981a: x86/spec-ctrl: Calculate safe PTE addresses for L1TF mitigations
  • ac3d572887: tools/oxenstored: Make evaluation order explicit
  • 8231311a84: x86/vtx: Fix the checking for unknown/invalid MSR_DEBUGCTL bits
  • ab34a43113: ARM: disable grant table v2
  • 023da62e97: common/gnttab: Introduce command line feature controls
  • 01b624b2ba: VMX: fix vmx_{find,del}_msr() build
  • c4fda1dc82: x86/vmx: Support load-only guest MSR list entries
  • 946badcb64: x86/vmx: Pass an MSR value into vmx_msr_add()
  • db356a429b: x86/vmx: Improvements to LBR MSR handling
  • 0c9baf6f15: x86/vmx: Support remote access to the MSR lists
  • c847824d73: x86/vmx: Factor locate_msr_entry() out of vmx_find_msr() and vmx_add_msr()
  • 66a3e680c8: x86/vmx: Internal cleanup for MSR load/save infrastructure
  • ec321585e4: x86/vmx: API improvements for MSR load/save infrastructure
  • 6522c1c222: x86/vmx: Defer vmx_vmcs_exit() as long as possible in construct_vmcs()
  • 284c60132e: x86/vmx: Fix handing of MSR_DEBUGCTL on VMExit
  • 3d2dc31f05: x86/spec-ctrl: Yet more fixes for xpti= parsing
  • a1b223b756: x86/spec-ctrl: Fix the parsing of xpti= on fixed Intel hardware
  • a894c9dcbd: x86/hvm: Disallow unknown MSR_EFER bits
  • d86688164d: x86/xstate: Make errors in xstate calculations more obvious by crashing the domain
  • 819e114e39: x86/xstate: Use a guests CPUID policy, rather than allowing all features
  • c6055c559c: x86/vmx: Don't clobber %dr6 while debugging state is lazy
  • cc15a7b4f1: x86: command line option to avoid use of secondary hyper-threads
  • 15124d9f00: x86: possibly bring up all CPUs even if not all are supposed to be used
  • 7f4a82d1d6: x86: distinguish CPU offlining from CPU removal
  • e40bfc1095: x86/AMD: distinguish compute units from hyper-threads
  • 53b22ad8bf: cpupools: fix state when downing a CPU failed
  • ec3030fa39: x86/svm Fixes and cleanup to svm_inject_event()
  • 84dd17473d: allow cpu_down() to be called earlier
  • c4d86c6f5e: xen: oprofile/nmi_int.c: Drop unwanted sexual reference
  • a6ac51a246: x86/spec-ctrl: command line handling adjustments
  • 514785c474: x86: correctly set nonlazy_xstate_used when loading full state
  • f904bddef0: xen: Port the array_index_nospec() infrastructure from Linux
  • 036006fb22: cmdline: fix parse_boolean() for NULL incoming end pointer
  • f5c692acb8: tools: prepend to PKG_CONFIG_PATH when configuring qemu
  • 612ff3c145: x86/EFI: further correct FPU state handling around runtime calls
  • 555ef37033: x86/HVM: attempts to emulate FPU insns need to set fpu_initialised
  • e76d0f7c65: x86/EFI: fix FPU state handling around runtime calls
  • 19f4f879d2: x86/VT-x: Fix printing of EFER in vmcs_dump_vcpu()
  • c4cb7d3b0b: x86/traps: Fix error handling of the pv %dr7 shadow state
  • 8cdaac2d39: x86/CPUID: don't override tool stack decision to hide STIBP
  • 7fbbedd164: x86: correct default_xen_spec_ctrl calculation
  • 46863c67f1: libxc/x86/PV: don't hand through CPUID leaf 0x80000008 as is
  • 041844ba7a: x86: guard against #NM
  • 0a9c2bdc2d: x86/HVM: don't cause #NM to be raised in Xen
  • 5d92007ce6: libxl: restore passing "readonly=" to qemu for SCSI disks
  • c257e35a2e: libxl: qemu_disk_scsi_drive_string: Break out common parts of disk config
  • ad08a1bec4: x86: Refine checks in #DB handler for faulting conditions
  • c50b1f68ff: x86/mm: don't bypass preemption checks
  • 238007d6fa: x86/HVM: account for fully eager FPU mode in emulation
  • 0b1904c475: x86/spec-ctrl: Mitigations for LazyFPU
  • 859fc55704: x86: Support fully eager FPU context switching
  • 1c6b8f23b9: x86: don't enable XPTI on idle domain
  • f51d3681a8: xen/x86: use PCID feature
  • 8689cd1c6a: xen/x86: add some cr3 helpers
  • fc72347820: xen/x86: convert pv_guest_cr4_to_real_cr4() to a function
  • 27b0dcd1f7: xen/x86: use flag byte for decision whether xen_cr3 is valid
  • 8d874a8b57: xen/x86: disable global pages for domains with XPTI active
  • 1284b9082f: xen/x86: use invpcid for flushing the TLB
  • 12259ff59c: xen/x86: support per-domain flag for xpti
  • 516ac8a982: xen/x86: add a function for modifying cr3
  • ed217c98b0: x86/xpti: avoid copying L4 page table contents when possible
  • 11eb72e820: x86/msr: Virtualise MSR_SPEC_CTRL.SSBD for guests to use
  • 3f85ebbea0: x86/Intel: Mitigations for GPZ SP4 - Speculative Store Bypass
  • 1ed34667b1: x86/AMD: Mitigations for GPZ SP4 - Speculative Store Bypass
  • 37c3cb4e73: x86: invpcid support
  • 2aca1d7f00: x86: move invocations of hvm_flush_guest_tlbs()
  • 22a6433be0: x86/XPTI: fix S3 resume (and CPU offlining in general)
  • 8a29d83d42: x86/spec_ctrl: Introduce a new `spec-ctrl=` command line argument to replace `bti=`
  • 14a2ad68fa: x86/cpuid: Improvements to guest policies for speculative sidechannel features
  • c6d09b283f: x86/spec_ctrl: Explicitly set Xen's default MSR_SPEC_CTRL value
  • e5de99368a: x86/spec_ctrl: Split X86_FEATURE_SC_MSR into PV and HVM variants
  • c2029b462e: x86/spec_ctrl: Elide MSR_SPEC_CTRL handling in idle context when possible
  • 5633efa934: x86/spec_ctrl: Rename bits of infrastructure to avoid NATIVE and VMEXIT
  • 13cb0c24ee: x86/spec_ctrl: Fold the XEN_IBRS_{SET,CLEAR} ALTERNATIVES together
  • da140c640c: x86/spec_ctrl: Merge bti_ist_info and use_shadow_spec_ctrl into spec_ctrl_flags
  • 39ab89dea9: x86/spec_ctrl: Express Xen's choice of MSR_SPEC_CTRL value as a variable
  • a29695c888: x86/spec_ctrl: Read MSR_ARCH_CAPABILITIES only once
  • 74fa9552c1: viridian: fix cpuid leaf 0x40000003
  • b3277ca638: libacpi: fixes for iasl >= 20180427
  • cf264ebdee: x86/pv: Hide more EFER bits from PV guests
  • 809d5432ac: xen/schedule: Fix races in vcpu migration
  • 002ea4d14a: xen: Introduce vcpu_sleep_nosync_locked()
  • 1f183b5abe: x86/cpuidle: don't init stats lock more than once
  • 150cdd9912: x86/SVM: Fix intercepted {RD,WR}MSR for the SYS{CALL,ENTER} MSRs
  • f7889b33a9: xpti: fix bug in double fault handling
  • 903f2f6418: x86/HVM: never retain emulated insn cache when exiting back to guest
  • 4bbed1cfe0: x86/HPET: fix race triggering ASSERT(cpu < nr_cpu_ids)
  • 2303a9d660: x86/spec_ctrl: Updates to retpoline-safety decision making
  • d674b6ea01: x86/pv: Introduce and use x86emul_write_dr()
  • 52fa2f7d62: x86/pv: Introduce and use x86emul_read_dr()
  • 62bd851a44: x86: suppress BTI mitigations around S3 suspend/resume
  • c06ec81b29: x86: correct ordering of operations during S3 resume
  • dbb06d3bfc: x86/HVM: guard against emulator driving ioreq state in weird ways
  • 24fa3fa310: x86/vpt: add support for IO-APIC routed interrupts
  • b9b5a03111: x86/traps: Fix handling of #DB exceptions in hypervisor context
  • 35a71c61a3: x86/traps: Use an Interrupt Stack Table for #DB
  • b844573da0: x86/pv: Move exception injection into {,compat_}test_all_events()
  • 48dd5431f8: x86/traps: Fix %dr6 handing in #DB handler
  • 7866e115f9: x86: fix slow int80 path after XPTI additions
  • db7accf8d9: libxl: Specify format of inserted cdrom
  • 921bff4ea7: x86/msr: Correct the emulation behaviour of MSR_PRED_CMD
  • c147505114: x86/VT-x: Fix determination of EFER.LMA in vmcs_dump_vcpu()
  • dc527ffb2b: x86/HVM: suppress I/O completion for port output
  • 781e23a4fc: x86/pv: Fix up erroneous segments for 32bit syscall entry
  • 72ca5804d0: x86/XPTI: reduce .text.entry
  • 47d41f6885: x86: log XPTI enabled status
  • 7a590155c5: x86: disable XPTI when RDCL_NO
  • 259bee90d1: x86/pv: Fix the handing of writes to %dr7
  • 6d4c4f0646: x86/spec_ctrl: Fix several bugs in SPEC_CTRL_ENTRY_FROM_INTR_IST
  • 3e010f5874: update Xen version to 4.9.3-pre
We recommend all users of the 4.9 stable series to update to this latest point release.
Versienummer 4.10.2 / 4.9.3
Releasestatus Final
Besturingssystemen Linux, BSD
Website Xen Project
Download https://www.xenproject.org/downloads/xen-archives/xen-project-410-series/xen-4102.html
Licentietype Voorwaarden (GNU/BSD/etc.)

Door Japke Rosink

Meukposter

27-09-2018 • 12:00

3 Linkedin

Bron: Xen Project

Update-historie

04-'21 Xen 4.15.0 5
11-'20 Xen 4.13.2 / 4.12.4 0
01-'20 Xen 4.12.2 3
04-'19 Xen 4.12.0 14
03-'19 Xen 4.10.3 / 4.9.4 0
12-'18 Xen 4.11.1 / 4.8.5 7
09-'18 Xen 4.10.2 / 4.9.3 3
07-'18 Xen 4.8.4 9
07-'18 Xen 4.11.0 0
07-'18 Xen 4.7.6 1
Meer historie

Reacties (3)

Wijzig sortering
fab92fcf44: xen: oprofile/nmi_int.c: Drop unwanted sexual reference

WTF? :)
Hilarisch

"We walk a thin line between law and rape here."

Is dus weggehaald uit de comments. Snap wel wat ie zegt daar gezien de rest van de comment.

Op dit item kan niet meer gereageerd worden.


Nintendo Switch (OLED model) Apple iPhone 13 LG G1 Google Pixel 6 Call of Duty: Vanguard Samsung Galaxy S21 5G Apple iPad Pro (2021) 11" Wi-Fi, 8GB ram Nintendo Switch Lite

Tweakers vormt samen met Hardware Info, AutoTrack, Gaspedaal.nl, Nationale Vacaturebank, Intermediair en Independer DPG Online Services B.V.
Alle rechten voorbehouden © 1998 - 2022 Hosting door True