3f55414718
- Upstream or pending upstream patches from Jan 25587-fix-off-by-one-parsing-error.patch 25616-x86-MCi_CTL-default.patch 25617-vtd-qinval-addr.patch 25688-x86-nr_irqs_gsi.patch - bnc#773393 - VUL-0: CVE-2012-3433: xen: HVM guest destroy p2m teardown host DoS vulnerability CVE-2012-3433-xsa11.patch - bnc#773401 - VUL-1: CVE-2012-3432: xen: HVM guest user mode MMIO emulation DoS 25682-x86-inconsistent-io-state.patch - bnc#762484 - VUL-1: CVE-2012-2625: xen: pv bootloader doesn't check the size of the bzip2 or lzma compressed kernel, leading to denial of service 25589-pygrub-size-limits.patch - Make it build with latest TeXLive 2012 with new package layout OBS-URL: https://build.opensuse.org/package/show/Virtualization/xen?expand=0&rev=196
64 lines
2.3 KiB
Diff
64 lines
2.3 KiB
Diff
References: bnc#719700
|
|
|
|
# HG changeset patch
|
|
# User Jan Beulich <jbeulich@suse.com>
|
|
# Date 1321018008 -3600
|
|
# Node ID 69f8b6f4c29cb2fb2d11e27c391090f543e6b393
|
|
# Parent 8b08b2166aa82e7df0b1fa620ed57078810f8c12
|
|
x86/amd-ucode: further turn down verbosity
|
|
|
|
Turn up the log level on various (mostly debug-only) messages.
|
|
|
|
Signed-off-by: Jan Beulich <jbeulich@suse.com>
|
|
Acked-by: Keir Fraser <keir@xen.org>
|
|
|
|
Index: xen-4.1.3-testing/xen/arch/x86/microcode_amd.c
|
|
===================================================================
|
|
--- xen-4.1.3-testing.orig/xen/arch/x86/microcode_amd.c
|
|
+++ xen-4.1.3-testing/xen/arch/x86/microcode_amd.c
|
|
@@ -59,7 +59,7 @@ static int collect_cpu_info(int cpu, str
|
|
|
|
rdmsrl(MSR_AMD_PATCHLEVEL, csig->rev);
|
|
|
|
- printk(KERN_INFO "microcode: collect_cpu_info: patch_id=0x%x\n",
|
|
+ printk(KERN_DEBUG "microcode: collect_cpu_info: patch_id=0x%x\n",
|
|
csig->rev);
|
|
|
|
return 0;
|
|
@@ -96,7 +96,7 @@ static int microcode_fits(const struct m
|
|
|
|
if ( (mc_header->processor_rev_id) != equiv_cpu_id )
|
|
{
|
|
- printk(KERN_INFO "microcode: CPU%d patch does not match "
|
|
+ printk(KERN_DEBUG "microcode: CPU%d patch does not match "
|
|
"(patch is %x, cpu base id is %x) \n",
|
|
cpu, mc_header->processor_rev_id, equiv_cpu_id);
|
|
return -EINVAL;
|
|
@@ -105,7 +105,7 @@ static int microcode_fits(const struct m
|
|
if ( mc_header->patch_id <= uci->cpu_sig.rev )
|
|
return 0;
|
|
|
|
- printk(KERN_INFO "microcode: CPU%d found a matching microcode "
|
|
+ printk(KERN_DEBUG "microcode: CPU%d found a matching microcode "
|
|
"update with version 0x%x (current=0x%x)\n",
|
|
cpu, mc_header->patch_id, uci->cpu_sig.rev);
|
|
|
|
@@ -148,7 +148,7 @@ static int apply_microcode(int cpu)
|
|
return -EIO;
|
|
}
|
|
|
|
- printk("microcode: CPU%d updated from revision "
|
|
+ printk(KERN_INFO "microcode: CPU%d updated from revision "
|
|
"0x%x to 0x%x \n",
|
|
cpu, uci->cpu_sig.rev, hdr->patch_id);
|
|
|
|
@@ -179,7 +179,7 @@ static int get_next_ucode_from_buffer_am
|
|
return -EINVAL;
|
|
}
|
|
|
|
- printk(KERN_INFO "microcode: size %lu, total_size %u, offset %ld\n",
|
|
+ printk(KERN_DEBUG "microcode: size %lu, total_size %u, offset %ld\n",
|
|
bufsize, mpbuf->len, off);
|
|
|
|
if ( (off + mpbuf->len) > bufsize )
|