3f55414718
- Upstream or pending upstream patches from Jan 25587-fix-off-by-one-parsing-error.patch 25616-x86-MCi_CTL-default.patch 25617-vtd-qinval-addr.patch 25688-x86-nr_irqs_gsi.patch - bnc#773393 - VUL-0: CVE-2012-3433: xen: HVM guest destroy p2m teardown host DoS vulnerability CVE-2012-3433-xsa11.patch - bnc#773401 - VUL-1: CVE-2012-3432: xen: HVM guest user mode MMIO emulation DoS 25682-x86-inconsistent-io-state.patch - bnc#762484 - VUL-1: CVE-2012-2625: xen: pv bootloader doesn't check the size of the bzip2 or lzma compressed kernel, leading to denial of service 25589-pygrub-size-limits.patch - Make it build with latest TeXLive 2012 with new package layout OBS-URL: https://build.opensuse.org/package/show/Virtualization/xen?expand=0&rev=196
28 lines
809 B
Diff
28 lines
809 B
Diff
# HG changeset patch
|
|
# User Keir Fraser <keir@xen.org>
|
|
# Date 1301132521 0
|
|
# Node ID 48dac730a93b27ff60a340564e9a7afd7f9385f4
|
|
# Parent 8f001d864fefac689b7662bc9979eaddf4fd6e9c
|
|
x86: __pirq_guest_eoi() must check it is called for a fully
|
|
guest-bound irq before accessing desc->action.
|
|
|
|
Signed-off-by: Keir Fraser <keir@xen.org>
|
|
|
|
Index: xen-4.1.3-testing/xen/arch/x86/irq.c
|
|
===================================================================
|
|
--- xen-4.1.3-testing.orig/xen/arch/x86/irq.c
|
|
+++ xen-4.1.3-testing/xen/arch/x86/irq.c
|
|
@@ -1143,6 +1143,12 @@ static void __pirq_guest_eoi(struct doma
|
|
return;
|
|
}
|
|
|
|
+ if ( !(desc->status & IRQ_GUEST) )
|
|
+ {
|
|
+ spin_unlock_irq(&desc->lock);
|
|
+ return;
|
|
+ }
|
|
+
|
|
action = (irq_guest_action_t *)desc->action;
|
|
irq = desc - irq_desc;
|
|
|