- bnc#620694 - Xen yast vm-install for existing paravirtualized

disk fails with UnboundLocalError: local variable 'dev_type' 
  referenced before assignment 
  21678-xend-mac-fix.patch

- bnc#586221 - cannot add DomU with USB host controller defined
  domu-usb-controller.patch (Chun Yan Liu)

- Upstream patches from Jan
  21151-trace-bounds-check.patch
  21627-cpuidle-wrap.patch
  21643-vmx-vpmu-pmc-offset.patch
  21682-trace-buffer-range.patch
  21683-vtd-kill-timer-conditional.patch
  21693-memevent-64bit-only.patch
  21695-trace-t_info-readonly.patch
  21698-x86-pirq-range-check.patch
  21699-p2m-query-for-type-change.patch
  21700-32on64-vm86-gpf.patch
  21705-trace-printk.patch
  21706-trace-security.patch
  21712-amd-osvw.patch
  21744-x86-cpufreq-range-check.patch

- bnc #599550 - Xen cannot distinguish the status of 'pause'
  addcommand_domstate.patch

OBS-URL: https://build.opensuse.org/package/show/Virtualization/xen?expand=0&rev=63
This commit is contained in:
Charles Arnold
2010-07-14 22:43:11 +00:00
committed by Git OBS Bridge
parent fef7e33f0a
commit ff4b346ede
35 changed files with 2085 additions and 91 deletions

View File

@@ -71,7 +71,7 @@ Index: xen-4.0.0-testing/xen/arch/x86/hvm/hvm.c
tasklet_kill(&v->arch.hvm_vcpu.assert_evtchn_irq_tasklet);
hvm_vcpu_cacheattr_destroy(v);
vlapic_destroy(v);
@@ -1897,7 +1907,7 @@ void hvm_cpuid(unsigned int input, unsig
@@ -1899,7 +1909,7 @@ void hvm_cpuid(unsigned int input, unsig
return;
if ( cpuid_hypervisor_leaves(input, count, eax, ebx, ecx, edx) )
@@ -80,7 +80,7 @@ Index: xen-4.0.0-testing/xen/arch/x86/hvm/hvm.c
domain_cpuid(v->domain, input, *ecx, eax, ebx, ecx, edx);
@@ -1964,6 +1974,8 @@ void hvm_cpuid(unsigned int input, unsig
@@ -1966,6 +1976,8 @@ void hvm_cpuid(unsigned int input, unsig
*edx &= ~bitmaskof(X86_FEATURE_RDTSCP);
break;
}
@@ -89,7 +89,7 @@ Index: xen-4.0.0-testing/xen/arch/x86/hvm/hvm.c
}
void hvm_rdtsc_intercept(struct cpu_user_regs *regs)
@@ -2064,6 +2076,8 @@ int hvm_msr_read_intercept(struct cpu_us
@@ -2066,6 +2078,8 @@ int hvm_msr_read_intercept(struct cpu_us
break;
/* ret == 0, This is not an MCE MSR, see other MSRs */
else if (!ret)
@@ -98,7 +98,7 @@ Index: xen-4.0.0-testing/xen/arch/x86/hvm/hvm.c
return hvm_funcs.msr_read_intercept(regs);
}
@@ -2162,6 +2176,8 @@ int hvm_msr_write_intercept(struct cpu_u
@@ -2164,6 +2178,8 @@ int hvm_msr_write_intercept(struct cpu_u
else if ( ret )
break;
else if (!ret)
@@ -107,7 +107,7 @@ Index: xen-4.0.0-testing/xen/arch/x86/hvm/hvm.c
return hvm_funcs.msr_write_intercept(regs);
}
@@ -2354,6 +2370,10 @@ int hvm_do_hypercall(struct cpu_user_reg
@@ -2356,6 +2372,10 @@ int hvm_do_hypercall(struct cpu_user_reg
case 0:
break;
}
@@ -118,7 +118,7 @@ Index: xen-4.0.0-testing/xen/arch/x86/hvm/hvm.c
if ( (eax & 0x80000000) && is_viridian_domain(curr->domain) )
return viridian_hypercall(regs);
@@ -2888,6 +2908,18 @@ long do_hvm_op(unsigned long op, XEN_GUE
@@ -2890,6 +2910,18 @@ long do_hvm_op(unsigned long op, XEN_GUE
rc = -EINVAL;
break;