8292994238
logging upon guest changing callback method (XSA-169) 5677f350-x86-make-debug-output-consistent-in-hvm_set_callback_via.patch - bsc#959387 - VUL-0: CVE-2015-8568 CVE-2015-8567: xen: qemu: net: vmxnet3: host memory leakage CVE-2015-8568-qemuu-net-vmxnet3-avoid-memory-leakage-in-activate_device.patch - bsc#957988 - VUL-0: CVE-2015-8550: xen: paravirtualized drivers incautious about shared memory contents (XSA-155) xsa155-xen-0001-xen-Add-RING_COPY_REQUEST.patch xsa155-xen-0002-blktap2-Use-RING_COPY_REQUEST.patch xsa155-xen-0003-libvchan-Read-prod-cons-only-once.patch xsa155-qemuu-qdisk-double-access.patch xsa155-qemut-qdisk-double-access.patch xsa155-qemuu-xenfb.patch xsa155-qemut-xenfb.patch - bsc#959006 - VUL-0: CVE-2015-8558: xen: qemu: usb: infinite loop in ehci_advance_state results in DoS CVE-2015-8558-qemuu-usb-infinite-loop-in-ehci_advance_state-results-in-DoS.patch - bsc#958918 - VUL-0: CVE-2015-7549: xen: qemu pci: null pointer dereference issue CVE-2015-7549-qemuu-pci-null-pointer-dereference-issue.patch - bsc#958493 - VUL-0: CVE-2015-8504: xen: qemu: ui: vnc: avoid floating point exception CVE-2015-8504-qemuu-vnc-avoid-floating-point-exception.patch CVE-2015-8504-qemut-vnc-avoid-floating-point-exception.patch - bsc#958007 - VUL-0: CVE-2015-8554: xen: qemu-dm buffer overrun in MSI-X handling (XSA-164) xsa164.patch OBS-URL: https://build.opensuse.org/package/show/Virtualization/xen?expand=0&rev=393
26 lines
995 B
Diff
26 lines
995 B
Diff
# Commit c03480cf5c4e96fb4afb2237ad0a3cac7162564a
|
|
# Date 2015-11-24 18:32:20 +0100
|
|
# Author Jan Beulich <jbeulich@suse.com>
|
|
# Committer Jan Beulich <jbeulich@suse.com>
|
|
x86/vPMU: document as unsupported
|
|
|
|
This is XSA-163.
|
|
|
|
Signed-off-by: Jan Beulich <jbeulich@suse.com>
|
|
|
|
Index: xen-4.6.0-testing/docs/misc/xen-command-line.markdown
|
|
===================================================================
|
|
--- xen-4.6.0-testing.orig/docs/misc/xen-command-line.markdown
|
|
+++ xen-4.6.0-testing/docs/misc/xen-command-line.markdown
|
|
@@ -1463,8 +1463,8 @@ feature is switched on on Intel processo
|
|
Note that if **watchdog** option is also specified vpmu will be turned off.
|
|
|
|
*Warning:*
|
|
-As the BTS virtualisation is not 100% safe and because of the nehalem quirk
|
|
-don't use the vpmu flag on production systems with Intel cpus!
|
|
+As the virtualisation is not 100% safe, don't use the vpmu flag on
|
|
+production systems (see http://xenbits.xen.org/xsa/advisory-163.html)!
|
|
|
|
### watchdog
|
|
> `= force | <boolean>`
|