3f55414718
- Upstream or pending upstream patches from Jan 25587-fix-off-by-one-parsing-error.patch 25616-x86-MCi_CTL-default.patch 25617-vtd-qinval-addr.patch 25688-x86-nr_irqs_gsi.patch - bnc#773393 - VUL-0: CVE-2012-3433: xen: HVM guest destroy p2m teardown host DoS vulnerability CVE-2012-3433-xsa11.patch - bnc#773401 - VUL-1: CVE-2012-3432: xen: HVM guest user mode MMIO emulation DoS 25682-x86-inconsistent-io-state.patch - bnc#762484 - VUL-1: CVE-2012-2625: xen: pv bootloader doesn't check the size of the bzip2 or lzma compressed kernel, leading to denial of service 25589-pygrub-size-limits.patch - Make it build with latest TeXLive 2012 with new package layout OBS-URL: https://build.opensuse.org/package/show/Virtualization/xen?expand=0&rev=196
36 lines
1.3 KiB
Diff
36 lines
1.3 KiB
Diff
changeset: 23906:7bf85c3fd9f0
|
|
user: Olaf Hering <olaf@aepfle.de>
|
|
date: Thu Oct 06 12:33:17 2011 +0100
|
|
files: xen/arch/x86/mm/p2m.c
|
|
description:
|
|
xenpaging: remove confusing comment from p2m_mem_paging_populate
|
|
|
|
Currently there is no way to avoid the double check of the p2mt
|
|
because p2m_mem_paging_populate() is called from many places without
|
|
the p2m_lock held. Upcoming changes will move the function into
|
|
gfn_to_mfn(), so its interface could be changed and the extra
|
|
p2m_lock/get_entry can be removed.
|
|
|
|
Signed-off-by: Olaf Hering <olaf@aepfle.de>
|
|
Acked-by: Tim Deegan <tim@xen.org>
|
|
Committed-by: Tim Deegan <tim@xen.org>
|
|
|
|
|
|
---
|
|
xen/arch/x86/mm/p2m.c | 2 --
|
|
1 file changed, 2 deletions(-)
|
|
|
|
Index: xen-4.1.3-testing/xen/arch/x86/mm/p2m.c
|
|
===================================================================
|
|
--- xen-4.1.3-testing.orig/xen/arch/x86/mm/p2m.c
|
|
+++ xen-4.1.3-testing/xen/arch/x86/mm/p2m.c
|
|
@@ -2967,8 +2967,6 @@ void p2m_mem_paging_populate(struct p2m_
|
|
req.type = MEM_EVENT_TYPE_PAGING;
|
|
|
|
/* Fix p2m mapping */
|
|
- /* XXX: It seems inefficient to have this here, as it's only needed
|
|
- * in one case (ept guest accessing paging out page) */
|
|
p2m_lock(p2m);
|
|
p2m->get_entry(p2m, gfn, &p2mt, &a, p2m_query);
|
|
if ( p2mt == p2m_ram_paged )
|