- remove xen.migrate.tools_notify_restore_to_hangup_during_migration_--abort_if_busy.patch It changed migration protocol and upstream wants a different solution - bnc#802221 - fix xenpaging readd xenpaging.qemu.flush-cache.patch - Upstream patches from Jan 26891-x86-S3-Fix-cpu-pool-scheduling-after-suspend-resume.patch 26930-x86-EFI-fix-runtime-call-status-for-compat-mode-Dom0.patch - Additional fix for bnc#816159 CVE-2013-1918-xsa45-followup.patch - bnc#817068 - Xen guest with >1 sr-iov vf won't start xen-managed-pci-device.patch - Update to Xen 4.2.2 c/s 26064 The following recent security patches are included in the tarball CVE-2013-0151-xsa34.patch (bnc#797285) CVE-2012-6075-xsa41.patch (bnc#797523) CVE-2013-1917-xsa44.patch (bnc#813673) CVE-2013-1919-xsa46.patch (bnc#813675) - Upstream patch from Jan 26902-x86-EFI-pass-boot-services-variable-info-to-runtime-code.patch - bnc#816159 - VUL-0: xen: CVE-2013-1918: XSA-45: Several long latency operations are not preemptible CVE-2013-1918-xsa45-1-vcpu-destroy-pagetables-preemptible.patch OBS-URL: https://build.opensuse.org/package/show/Virtualization/xen?expand=0&rev=237
62 lines
2.0 KiB
Diff
62 lines
2.0 KiB
Diff
# HG changeset patch
|
|
# User Jan Beulich <jbeulich@suse.com>
|
|
# Date 1349172840 -7200
|
|
# Node ID 87bf99fad7a9f018530d13213f57610621838085
|
|
# Parent 5fbdbf585f5f2ee9a3e3c75a8a9f9f2cc6eda65c
|
|
x86/Intel: add further support for Ivy Bridge CPU models
|
|
|
|
And some initial Haswell ones at once.
|
|
|
|
Signed-off-by: Jan Beulich <jbeulich@suse.com>
|
|
Acked-by: "Nakajima, Jun" <jun.nakajima@intel.com>
|
|
|
|
Index: xen-4.2.2-testing/xen/arch/x86/acpi/cpu_idle.c
|
|
===================================================================
|
|
--- xen-4.2.2-testing.orig/xen/arch/x86/acpi/cpu_idle.c
|
|
+++ xen-4.2.2-testing/xen/arch/x86/acpi/cpu_idle.c
|
|
@@ -105,11 +105,15 @@ static void do_get_hw_residencies(void *
|
|
|
|
switch ( c->x86_model )
|
|
{
|
|
- /* Ivy bridge */
|
|
- case 0x3A:
|
|
/* Sandy bridge */
|
|
case 0x2A:
|
|
case 0x2D:
|
|
+ /* Ivy bridge */
|
|
+ case 0x3A:
|
|
+ case 0x3E:
|
|
+ /* Haswell */
|
|
+ case 0x3C:
|
|
+ case 0x45:
|
|
GET_PC2_RES(hw_res->pc2);
|
|
GET_CC7_RES(hw_res->cc7);
|
|
/* fall through */
|
|
Index: xen-4.2.2-testing/xen/arch/x86/hvm/vmx/vmx.c
|
|
===================================================================
|
|
--- xen-4.2.2-testing.orig/xen/arch/x86/hvm/vmx/vmx.c
|
|
+++ xen-4.2.2-testing/xen/arch/x86/hvm/vmx/vmx.c
|
|
@@ -1825,7 +1825,9 @@ static const struct lbr_info *last_branc
|
|
/* Sandy Bridge */
|
|
case 42: case 45:
|
|
/* Ivy Bridge */
|
|
- case 58:
|
|
+ case 58: case 62:
|
|
+ /* Haswell */
|
|
+ case 60: case 69:
|
|
return nh_lbr;
|
|
break;
|
|
/* Atom */
|
|
Index: xen-4.2.2-testing/xen/arch/x86/hvm/vmx/vpmu_core2.c
|
|
===================================================================
|
|
--- xen-4.2.2-testing.orig/xen/arch/x86/hvm/vmx/vpmu_core2.c
|
|
+++ xen-4.2.2-testing/xen/arch/x86/hvm/vmx/vpmu_core2.c
|
|
@@ -747,6 +747,7 @@ int vmx_vpmu_initialise(struct vcpu *v,
|
|
case 46:
|
|
case 47:
|
|
case 58:
|
|
+ case 62:
|
|
ret = core2_vpmu_initialise(v, vpmu_flags);
|
|
if ( !ret )
|
|
vpmu->arch_vpmu_ops = &core2_vpmu_ops;
|