Reference: bsc#960093 CVE-2015-8615 XSA-169 Subject: x86: make debug output consistent in hvm_set_callback_via From: Malcolm Crossley malcolm.crossley@citrix.com Mon Dec 21 13:40:48 2015 +0100 Date: Mon Dec 21 13:40:48 2015 +0100: Git: 5c1048565ba5b240f47203bdb67572bee73d639e The unconditional printks in the switch statement of the hvm_set_callback_via function results in Xen log spam in non debug versions of Xen. The printks are for debug output only so conditionally compile the entire switch statement on debug versions of Xen only. This is XSA-169. Signed-off-by: Malcolm Crossley Reviewed-by: Jan Beulich Acked-by: Ian Campbell Index: xen-4.6.0-testing/xen/arch/x86/hvm/irq.c =================================================================== --- xen-4.6.0-testing.orig/xen/arch/x86/hvm/irq.c +++ xen-4.6.0-testing/xen/arch/x86/hvm/irq.c @@ -382,7 +382,8 @@ void hvm_set_callback_via(struct domain spin_unlock(&d->arch.hvm_domain.irq_lock); - dprintk(XENLOG_G_INFO, "Dom%u callback via changed to ", d->domain_id); +#ifndef NDEBUG + printk(XENLOG_G_INFO "Dom%u callback via changed to ", d->domain_id); switch ( via_type ) { case HVMIRQ_callback_gsi: @@ -398,6 +399,7 @@ void hvm_set_callback_via(struct domain printk("None\n"); break; } +#endif } struct hvm_intack hvm_vcpu_has_pending_irq(struct vcpu *v)