- remove xen.migrate.tools_notify_restore_to_hangup_during_migration_--abort_if_busy.patch It changed migration protocol and upstream wants a different solution - bnc#802221 - fix xenpaging readd xenpaging.qemu.flush-cache.patch - Upstream patches from Jan 26891-x86-S3-Fix-cpu-pool-scheduling-after-suspend-resume.patch 26930-x86-EFI-fix-runtime-call-status-for-compat-mode-Dom0.patch - Additional fix for bnc#816159 CVE-2013-1918-xsa45-followup.patch - bnc#817068 - Xen guest with >1 sr-iov vf won't start xen-managed-pci-device.patch - Update to Xen 4.2.2 c/s 26064 The following recent security patches are included in the tarball CVE-2013-0151-xsa34.patch (bnc#797285) CVE-2012-6075-xsa41.patch (bnc#797523) CVE-2013-1917-xsa44.patch (bnc#813673) CVE-2013-1919-xsa46.patch (bnc#813675) - Upstream patch from Jan 26902-x86-EFI-pass-boot-services-variable-info-to-runtime-code.patch - bnc#816159 - VUL-0: xen: CVE-2013-1918: XSA-45: Several long latency operations are not preemptible CVE-2013-1918-xsa45-1-vcpu-destroy-pagetables-preemptible.patch OBS-URL: https://build.opensuse.org/package/show/Virtualization/xen?expand=0&rev=237
64 lines
2.5 KiB
Diff
64 lines
2.5 KiB
Diff
--- a/xen/arch/x86/x86_32/entry.S
|
|
+++ b/xen/arch/x86/x86_32/entry.S
|
|
@@ -410,8 +410,10 @@ UNLIKELY_END(bounce_vm86_3)
|
|
_ASM_EXTABLE(.Lft24, domain_crash_synchronous)
|
|
_ASM_EXTABLE(.Lft25, domain_crash_synchronous)
|
|
|
|
+.section .rodata, "a", @progbits
|
|
domain_crash_synchronous_string:
|
|
.asciz "domain_crash_sync called from entry.S (%lx)\n"
|
|
+.previous
|
|
|
|
domain_crash_synchronous:
|
|
pushl $domain_crash_synchronous_string
|
|
--- a/xen/arch/x86/x86_64/entry.S
|
|
+++ b/xen/arch/x86/x86_64/entry.S
|
|
@@ -435,22 +435,35 @@ UNLIKELY_END(bounce_failsafe)
|
|
jz domain_crash_synchronous
|
|
movq %rax,UREGS_rip+8(%rsp)
|
|
ret
|
|
- _ASM_EXTABLE(.Lft2, domain_crash_synchronous)
|
|
- _ASM_EXTABLE(.Lft3, domain_crash_synchronous)
|
|
- _ASM_EXTABLE(.Lft4, domain_crash_synchronous)
|
|
- _ASM_EXTABLE(.Lft5, domain_crash_synchronous)
|
|
- _ASM_EXTABLE(.Lft6, domain_crash_synchronous)
|
|
- _ASM_EXTABLE(.Lft7, domain_crash_synchronous)
|
|
- _ASM_EXTABLE(.Lft8, domain_crash_synchronous)
|
|
- _ASM_EXTABLE(.Lft9, domain_crash_synchronous)
|
|
- _ASM_EXTABLE(.Lft10, domain_crash_synchronous)
|
|
- _ASM_EXTABLE(.Lft11, domain_crash_synchronous)
|
|
- _ASM_EXTABLE(.Lft12, domain_crash_synchronous)
|
|
- _ASM_EXTABLE(.Lft13, domain_crash_synchronous)
|
|
+ _ASM_EXTABLE(.Lft2, domain_crash_page_fault_32)
|
|
+ _ASM_EXTABLE(.Lft3, domain_crash_page_fault_24)
|
|
+ _ASM_EXTABLE(.Lft4, domain_crash_page_fault_8)
|
|
+ _ASM_EXTABLE(.Lft5, domain_crash_page_fault_16)
|
|
+ _ASM_EXTABLE(.Lft6, domain_crash_page_fault)
|
|
+ _ASM_EXTABLE(.Lft7, domain_crash_page_fault)
|
|
+ _ASM_EXTABLE(.Lft8, domain_crash_page_fault_24)
|
|
+ _ASM_EXTABLE(.Lft9, domain_crash_page_fault_16)
|
|
+ _ASM_EXTABLE(.Lft10, domain_crash_page_fault_8)
|
|
+ _ASM_EXTABLE(.Lft11, domain_crash_page_fault)
|
|
+ _ASM_EXTABLE(.Lft12, domain_crash_page_fault_8)
|
|
+ _ASM_EXTABLE(.Lft13, domain_crash_page_fault)
|
|
|
|
+.section .rodata, "a", @progbits
|
|
domain_crash_synchronous_string:
|
|
.asciz "domain_crash_sync called from entry.S\n"
|
|
+.previous
|
|
|
|
+domain_crash_page_fault_32:
|
|
+ addq $8,%rsi
|
|
+domain_crash_page_fault_24:
|
|
+ addq $8,%rsi
|
|
+domain_crash_page_fault_16:
|
|
+ addq $8,%rsi
|
|
+domain_crash_page_fault_8:
|
|
+ addq $8,%rsi
|
|
+domain_crash_page_fault:
|
|
+ movq %rsi,%rdi
|
|
+ call show_page_walk
|
|
ENTRY(domain_crash_synchronous)
|
|
# Get out of the guest-save area of the stack.
|
|
GET_CPUINFO_FIELD(CPUINFO_guest_cpu_user_regs,%rax)
|