Commit Graph

  • 4703bb7319 - Update libxl.set-migration-constraints-from-cmdline.patch Remove code which handled --max_factor. The total amount of transferred data is no indicator to trigger the final stop+copy. This should have been removed during upgrade to Xen 4.7. Fix off-by-one in --max_iters, it caused one additional copy cycle. Reduce default value of --max_iters from 5 to 2. The workload within domU will continue to produce dirty pages. It is unreasonable to expect any slowdown during migration. Now there is one initial copy of all memory, one instead of four iteration for dirty memory, and a final copy iteration prior move. Olaf Hering 2021-01-05 11:09:08 +00:00
  • 70c5303d3a Bump the version Charles Arnold 2021-01-04 15:53:57 +00:00
  • 031979743b - Pass --with-rundir to configure to get rid of /var/run Charles Arnold 2021-01-04 15:50:19 +00:00
  • cdab46b9fe Accepting request 856892 from Virtualization Dominique Leuenberger 2020-12-21 09:22:13 +00:00
  • 5b395dd57b - Update to Xen 4.14.1 bug fix release (bsc#1027519) xen-4.14.1-testing-src.tar.bz2 Contains the following recent security fixes bsc#1179516 XSA-359 - CVE-2020-29571 bsc#1179514 XSA-358 - CVE-2020-29570 bsc#1179513 XSA-356 - CVE-2020-29567 bsc#1178963 XSA-355 - CVE-2020-29040 bsc#1178591 XSA-351 - CVE-2020-28368 bsc#1179506 XSA-348 - CVE-2020-29566 bsc#1179502 XSA-325 - CVE-2020-29483 bsc#1179501 XSA-324 - CVE-2020-29484 bsc#1179498 XSA-322 - CVE-2020-29481 bsc#1179496 XSA-115 - CVE-2020-29480 - Dropped patches contained in new tarball 5f1a9916-x86-S3-put-data-sregs-into-known-state.patch 5f21b9fd-x86-cpuid-APIC-bit-clearing.patch 5f479d9e-x86-begin-to-support-MSR_ARCH_CAPS.patch 5f4cf06e-x86-Dom0-expose-MSR_ARCH_CAPS.patch 5f4cf96a-x86-PV-fix-SEGBASE_GS_USER_SEL.patch 5f560c42-x86-PV-64bit-segbase-consistency.patch 5f560c42-x86-PV-rewrite-segment-ctxt-switch.patch 5f5b6b7a-hypfs-fix-custom-param-writes.patch 5f607915-x86-HVM-more-consistent-IO-completion.patch 5f6a002d-x86-PV-handle-MSR_MISC_ENABLE-correctly.patch 5f6a0049-memory-dont-skip-RCU-unlock-in-acquire_resource.patch 5f6a0067-x86-vPT-fix-race-when-migrating-timers.patch 5f6a008e-x86-MSI-drop-read_msi_msg.patch 5f6a00aa-x86-MSI-X-restrict-reading-of-PBA-bases.patch 5f6a00c4-evtchn-relax-port_is_valid.patch 5f6a00df-x86-PV-avoid-double-exception-injection.patch Charles Arnold 2020-12-17 19:10:57 +00:00
  • 18ed570c93 Fix the 32bit build Charles Arnold 2020-12-14 22:01:47 +00:00
  • 44f0208b3e - boo#1029961 - Move files in xen-tools-domU to /usr/bin from /bin xen-destdir.patch Drop tmp_build.patch Charles Arnold 2020-12-14 21:26:44 +00:00
  • 922e50d266 Revert last change Charles Arnold 2020-12-08 04:05:33 +00:00
  • 414cf6e6dd - boo#1029961 - Move files in xen-tools-domU to /usr/bin from /bin tmp_build.patch xen.spec Charles Arnold 2020-12-07 22:25:56 +00:00
  • 57b00d714c Accepting request 847616 from Virtualization Dominique Leuenberger 2020-11-12 21:32:50 +00:00
  • 5029961bf9 - bsc#1178591 - VUL-0: xen: Intel RAPL sidechannel attack aka PLATYPUS attack aka XSA-351 xsa351-1.patch xsa351-2.patch xsa351-3.patch Charles Arnold 2020-11-10 21:15:52 +00:00
  • 392de60d84 Accepting request 844630 from Virtualization Dominique Leuenberger 2020-11-02 08:38:21 +00:00
  • e5facb124e Fix changelog entry Replaces 5f6a0674-xen-evtchn-Add-missing-barriers-when-accessing-allocating-an-event-channel.patch Charles Arnold 2020-10-28 16:00:02 +00:00
  • 009a429236 - Upstream bug fixes (bsc#1027519) 5f479d9e-x86-begin-to-support-MSR_ARCH_CAPS.patch 5f4cf06e-x86-Dom0-expose-MSR_ARCH_CAPS.patch 5f4cf96a-x86-PV-fix-SEGBASE_GS_USER_SEL.patch 5f560c42-x86-PV-rewrite-segment-ctxt-switch.patch 5f5b6b7a-hypfs-fix-custom-param-writes.patch 5f607915-x86-HVM-more-consistent-IO-completion.patch 5f6cfb5b-x86-PV-dont-GP-for-SYSENTER-with-NT-set.patch 5f6cfb5b-x86-PV-dont-clobber-NT-on-return-to-guest.patch 5f71a21e-x86-S3-fix-shadow-stack-resume.patch 5f76ca65-evtchn-Flask-prealloc-for-send.patch 5f76caaf-evtchn-FIFO-use-stable-fields.patch 5f897c25-x86-traps-fix-read_registers-for-DF.patch 5f897c7b-x86-smpboot-restrict-memguard_guard_stack.patch - Renamed patches 5f560c42-x86-PV-64bit-segbase-consistency.patch Replaces 5f5b6951-x86-PV-64bit-segbase-consistency.patch 5f6a002d-x86-PV-handle-MSR_MISC_ENABLE-correctly.patch Replaces 5f6a05a0-pv-Handle-the-Intel-specific-MSR_MISC_ENABLE-correctly.patch 5f6a0049-memory-dont-skip-RCU-unlock-in-acquire_resource.patch Replaces 5f6a05b7-xen-memory-Dont-skip-the-RCU-unlock-path-in-acquire_resource.patch 5f6a0067-x86-vPT-fix-race-when-migrating-timers.patch Replaces 5f6a05dd-vpt-fix-race-when-migrating-timers-between-vCPUs.patch 5f6a008e-x86-MSI-drop-read_msi_msg.patch Replaces 5f6a05fa-msi-get-rid-of-read_msi_msg.patch 5f6a00aa-x86-MSI-X-restrict-reading-of-PBA-bases.patch Replaces 5f6a061a-MSI-X-restrict-reading-of-table-PBA-bases-from-BARs.patch 5f6a00c4-evtchn-relax-port_is_valid.patch Replaces 5f6a062c-evtchn-relax-port_is_valid.patch 5f6a00df-x86-PV-avoid-double-exception-injection.patch Charles Arnold 2020-10-21 17:23:06 +00:00
  • 1d8f66d4a8 Accepting request 836146 from Virtualization Dominique Leuenberger 2020-09-25 14:21:02 +00:00
  • 849d3f7881 - bsc#1176339 - VUL-0: CVE-2020-25602: xen: x86 pv: Crash when handling guest access to MSR_MISC_ENABLE (XSA-333) 5f6a05a0-pv-Handle-the-Intel-specific-MSR_MISC_ENABLE-correctly.patch - bsc#1176341 - VUL-0: CVE-2020-25598: xen: Missing unlock in XENMEM_acquire_resource error path (XSA-334) 5f6a05b7-xen-memory-Dont-skip-the-RCU-unlock-path-in-acquire_resource.patch - bsc#1176343 - VUL-0: CVE-2020-25604: xen: race when migrating timers between x86 HVM vCPU-s (XSA-336) 5f6a05dd-vpt-fix-race-when-migrating-timers-between-vCPUs.patch - bsc#1176344 - VUL-0: CVE-2020-25595: xen: PCI passthrough code reading back hardware registers (XSA-337) 5f6a05fa-msi-get-rid-of-read_msi_msg.patch 5f6a061a-MSI-X-restrict-reading-of-table-PBA-bases-from-BARs.patch - bsc#1176346 - VUL-0: CVE-2020-25597: xen: once valid event channels may not turn invalid (XSA-338) 5f6a062c-evtchn-relax-port_is_valid.patch - bsc#1176345 - VUL-0: CVE-2020-25596: xen: x86 pv guest kernel DoS via SYSENTER (XSA-339) 5f6a065c-pv-Avoid-double-exception-injection.patch - bsc#1176347 - VUL-0: CVE-2020-25603: xen: Missing barrier barriers when accessing/allocating an event channel (XSA-340) 5f6a0674-xen-evtchn-Add-missing-barriers-when-accessing-allocating-an-event-channel.patch - bsc#1176348 - VUL-0: CVE-2020-25600: xen: out of bounds event channels available to 32-bit x86 domains (XSA-342) 5f6a068e-evtchn-x86-enforce-correct-upper-limit-for-32-bit-guests.patch - bsc#1176349 - VUL-0: CVE-2020-25599: xen: races with evtchn_reset() (XSA-343) 5f6a06be-evtchn-evtchn_reset-shouldnt-succeed-with-still-open-ports.patch 5f6a06e0-evtchn-convert-per-channel-lock-to-be-IRQ-safe.patch 5f6a06f2-evtchn-address-races-with-evtchn_reset.patch Charles Arnold 2020-09-22 17:23:10 +00:00
  • d37ab499cc One more fix for aarch64 Charles Arnold 2020-09-21 21:48:32 +00:00
  • 5ed908119e - Fix problems in xen.spec with building on aarch64 Charles Arnold 2020-09-21 20:07:14 +00:00
  • 0014396ea7 Accepting request 834358 from Virtualization Dominique Leuenberger 2020-09-18 12:26:58 +00:00
  • 794c14cecb - Revert previous libexec change for qemu compat wrapper The path is used in existing domU.xml files in the emulator field - Escape some % chars in xen.spec, they have to appear verbatim Charles Arnold 2020-09-14 17:27:26 +00:00
  • a9b33f606b Accepting request 831266 from Virtualization Dominique Leuenberger 2020-09-05 21:56:59 +00:00
  • 670298a6b7 - jsc#SLE-15926 - Dev: XEN: drop netware support Dropped the following patches pygrub-netware-xnloader.patch xnloader.py Refreshed pygrub-boot-legacy-sles.patch Charles Arnold 2020-09-02 20:15:57 +00:00
  • 19b501b7fd Fix copyright string Charles Arnold 2020-09-01 17:29:01 +00:00
  • 6ce6a7dc0a Update copyright string to SUSE LLC Charles Arnold 2020-09-01 16:58:44 +00:00
  • d2cc9ae963 Accepting request 831108 from home:Guillaume_G:branches:openSUSE:Factory:ARM Charles Arnold 2020-09-01 16:36:21 +00:00
  • 0ccf84301e Accepting request 824549 from Virtualization Dominique Leuenberger 2020-08-06 15:31:00 +00:00
  • 8e8909e21f Accepting request 824546 from home:gmbr3:Active Charles Arnold 2020-08-05 20:49:36 +00:00
  • ca36e8b5e8 - Upstream bug fixes (bsc#1027519) 5f1a9916-x86-S3-put-data-sregs-into-known-state.patch 5f21b9fd-x86-cpuid-APIC-bit-clearing.patch Charles Arnold 2020-08-03 12:49:32 +00:00
  • 66154d7b0c Update the Version string Charles Arnold 2020-07-30 22:28:25 +00:00
  • 8d6eb3a142 - Update to Xen 4.14.0 FCS release xen-4.14.0-testing-src.tar.bz2 * Linux stubdomains (contributed by QUBES OS) * Control-flow Enforcement Technology (CET) Shadow Stack support (contributed by Citrix) * Lightweight VM fork for fuzzing / introspection. (contributed by Intel) * Livepatch: buildid and hotpatch stack requirements * CONFIG_PV32 * Hypervisor FS support * Running Xen as a Hyper-V Guest * Domain ID randomization, persistence across save / restore * Golang binding autogeneration * KDD support for Windows 7, 8.x and 10 - Dropped patches contained in new tarball 5eb51be6-cpupool-fix-removing-cpu-from-pool.patch 5eb51caa-sched-vcpu-pause-flags-atomic.patch 5ec2a760-x86-determine-MXCSR-mask-always.patch 5ec50b05-x86-idle-rework-C6-EOI-workaround.patch 5ec7dcaa-x86-dont-enter-C6-with-in-service-intr.patch 5ec7dcf6-x86-dont-enter-C3-C6-with-errata.patch 5ec82237-x86-extend-ISR-C6-workaround-to-Haswell.patch 5ece1b91-x86-clear-RDRAND-CPUID-bit-on-AMD-fam-15-16.patch 5ece8ac4-x86-load_system_tables-NMI-MC-safe.patch 5ed69804-x86-ucode-fix-start-end-update.patch 5eda60cb-SVM-split-recalc-NPT-fault-handling.patch 5edf6ad8-ioreq-pending-emulation-server-destruction-race.patch 5edfbbea-x86-spec-ctrl-CPUID-MSR-defs-for-SRBDS.patch 5edfbbea-x86-spec-ctrl-mitigate-SRBDS.patch 5ee24d0e-x86-spec-ctrl-document-SRBDS-workaround.patch xsa317.patch xsa319.patch Charles Arnold 2020-07-27 12:20:05 +00:00
  • f820a7deba Accepting request 820049 from Virtualization Dominique Leuenberger 2020-07-14 05:44:00 +00:00
  • e4a80fc1b2 - bsc#1173376 - VUL-0: CVE-2020-15566: xen: XSA-317 - Incorrect error handling in event channel port allocation - bsc#1173377 - VUL-0: CVE-2020-15563: xen: XSA-319 - inverted code paths in x86 dirty VRAM tracking - bsc#1173378 - VUL-0: CVE-2020-15565: xen: XSA-321 - insufficient cache write- back under VT-d - bsc#1173380 - VUL-0: CVE-2020-15567: xen: XSA-328 - non-atomic modification of live EPT PTE Charles Arnold 2020-07-08 15:58:08 +00:00
  • d79479bd9f - Add libxc.migrate_tracking.patch to track live migrations unconditionally in logfiles, especially in libvirt. This will track how long a domU was suspended during transit. Charles Arnold 2020-07-08 15:41:35 +00:00
  • 31986bd7f9 Accepting request 813013 from Virtualization Dominique Leuenberger 2020-06-11 12:46:57 +00:00
  • bdd22d961e - bsc#1172205 - VUL-0: CVE-2020-0543: xen: Special Register Buffer Data Sampling (SRBDS) aka "CrossTalk" (XSA-320) xsa320-1.patch xsa320-2.patch Charles Arnold 2020-06-09 17:17:25 +00:00
  • 883ecbf720 Accepting request 812654 from home:gmbr3:branches:Base:System3 Charles Arnold 2020-06-08 19:46:01 +00:00
  • 8f9df4d49c Accepting request 808027 from Virtualization Dominique Leuenberger 2020-06-04 15:50:22 +00:00
  • e331788b19 - Update to Xen 4.13.1 bug fix release (bsc#1027519) xen-4.13.1-testing-src.tar.bz2 5eb51be6-cpupool-fix-removing-cpu-from-pool.patch 5eb51caa-sched-vcpu-pause-flags-atomic.patch 5ec2a760-x86-determine-MXCSR-mask-always.patch - Drop patches contained in new tarball 5de65f84-gnttab-map-always-do-IOMMU-part.patch 5de65fc4-x86-avoid-HPET-use-on-certain-Intel.patch 5e15e03d-sched-fix-S3-resume-with-smt=0.patch 5e16fb6a-x86-clear-per-cpu-stub-page-info.patch 5e1da013-IRQ-u16-is-too-narrow-for-evtchn.patch 5e1dcedd-Arm-place-speculation-barrier-after-ERET.patch 5e21ce98-x86-time-update-TSC-stamp-after-deep-C-state.patch 5e286cce-VT-d-dont-pass-bridges-to-domain_context_mapping_one.patch 5e318cd4-x86-apic-fix-disabling-LVT0.patch 5e344c11-x86-HVM-relinquish-resources-from-domain_destroy.patch 5e3bd385-EFI-recheck-variable-name-strings.patch 5e3bd3d1-EFI-dont-leak-heap-VIA-XEN_EFI_get_next_variable_name.patch 5e3bd3f8-xmalloc-guard-against-overflow.patch 5e46e090-x86-smp-reset-x2apic_enabled-in-smp_send_stop.patch 5e4c00ef-VT-d-check-full-RMRR-for-E820-reserved.patch 5e4d4f5b-sched-fix-get_cpu_idle_time-with-core-sched.patch 5e4e614d-x86-spec-ctrl-no-xen-also-disables-branch-hardening.patch 5e4ec20e-x86-virtualise-MSR_PLATFORM_ID-properly.patch 5e5e7188-fix-error-path-in-cpupool_unassign_cpu_start.patch 5e6f53dd-AMD-IOMMU-fix-off-by-one-get_paging_mode.patch 5e7a371c-sched-fix-cpu-onlining-with-core-sched.patch 5e7c90cf-sched-fix-cpu-offlining-with-core-sched.patch 5e7cfb29-x86-ucode-AMD-fix-assert-in-compare_patch.patch 5e7cfb29-x86-ucode-fix-error-paths-in-apply_microcode.patch Charles Arnold 2020-05-21 15:57:57 +00:00
  • cc66a41691 Accepting request 805360 from Virtualization Dominique Leuenberger 2020-05-14 21:23:50 +00:00
  • fcfc137e0c - bsc#1170968 - GCC 10: xen build fails on i586 gcc10-fixes.patch Charles Arnold 2020-05-13 16:17:54 +00:00
  • e1a8bacbe5 Accepting request 794376 from Virtualization Dominique Leuenberger 2020-04-17 22:27:30 +00:00
  • ced8b2279e - bsc#1168142 - VUL-0: CVE-2020-11739: xen: XSA-314 - Missing - bsc#1168143 - VUL-0: CVE-2020-11743: xen: XSA-316 - Bad error Charles Arnold 2020-04-15 17:23:49 +00:00
  • 2305e0ad56 - bsc#1169392 - VUL-0: CVE-2020-11742: xen: Bad continuation handling in GNTTABOP_copy (XSA-318) 5e95afb8-gnttab-fix-GNTTABOP_copy-continuation-handling.patch Charles Arnold 2020-04-14 18:55:11 +00:00
  • 76f17b0d65 Accepting request 788324 from Virtualization Dominique Leuenberger 2020-03-27 20:55:25 +00:00
  • 5e6165226a - bsc#1161480 - Fix xl shutdown for HVM without PV drivers add libxl.libxl__domain_pvcontrol.patch Charles Arnold 2020-03-25 17:44:51 +00:00
  • e524dff8a9 Accepting request 783535 from Virtualization Dominique Leuenberger 2020-03-14 08:53:55 +00:00
  • f7a6d03cc0 - bsc#1158414 - GCC 10: xen build fails gcc10-fixes.patch Charles Arnold 2020-03-10 16:37:38 +00:00
  • 8c9dff2a58 Accepting request 777747 from Virtualization Dominique Leuenberger 2020-02-25 15:01:56 +00:00
  • a09ab46aae Fix aarch64 build Charles Arnold 2020-02-20 17:05:52 +00:00
  • da9cbde438 - bsc#1160932 - VUL-0: xen: XSA-312 v1: arm: a CPU may speculate past the ERET instruction 5e1dcedd-Arm-place-speculation-barrier-after-ERET.patch - bsc#1164425 - x86: "spec-ctrl=no-xen" should also disable branch hardening 5e4e614d-x86-spec-ctrl-no-xen-also-disables-branch-hardening.patch - Upstream bug fixes (bsc#1027519) 5e21ce98-x86-time-update-TSC-stamp-after-deep-C-state.patch 5e286cce-VT-d-dont-pass-bridges-to-domain_context_mapping_one.patch 5e318cd4-x86-apic-fix-disabling-LVT0.patch 5e344c11-x86-HVM-relinquish-resources-from-domain_destroy.patch 5e3bd385-EFI-recheck-variable-name-strings.patch 5e3bd3d1-EFI-dont-leak-heap-VIA-XEN_EFI_get_next_variable_name.patch 5e3bd3f8-xmalloc-guard-against-overflow.patch 5e46e090-x86-smp-reset-x2apic_enabled-in-smp_send_stop.patch 5e4c00ef-VT-d-check-full-RMRR-for-E820-reserved.patch 5e4d4f5b-sched-fix-get_cpu_idle_time-with-core-sched.patch Charles Arnold 2020-02-20 16:11:23 +00:00
  • a24454ae30 - bsc#1159755 - use fixed qemu-3.1 machine type for HVM This must be done in qemu to preserve PCI layout remove libxl.lock-qemu-machine-for-hvm.patch Charles Arnold 2020-02-19 15:39:05 +00:00
  • 56d0524d7e Accepting request 768357 from Virtualization Dominique Leuenberger 2020-02-03 10:11:34 +00:00
  • b5a2c0b293 - bsc#1159755 - use fixed qemu-3.1 machine type for HVM qemu4 introduced incompatible changes in pc-i440fx, which revealed a design bug in 'xenfv'. Live migration from domUs started with qemu versions prior qemu4 can not be received with qemu4+. libxl.lock-qemu-machine-for-hvm.patch Charles Arnold 2020-01-28 15:37:34 +00:00
  • 637b14a1aa Accepting request 761890 from Virtualization Dominique Leuenberger 2020-01-11 13:37:34 +00:00
  • cffb9bfd4e Accepting request 761824 from home:dimstar:Factory Charles Arnold 2020-01-08 15:43:24 +00:00
  • ef36a96ad6 Accepting request 758031 from Virtualization Dominique Leuenberger 2019-12-23 21:36:33 +00:00
  • 26ac67152b - bsc#1159320 - Xen logrotate file needs updated logrotate.conf Charles Arnold 2019-12-18 17:28:30 +00:00
  • 52c91c7df4 Update the version Charles Arnold 2019-12-18 16:05:24 +00:00
  • f0779d9aad - Update to Xen 4.13.0 FCS release xen-4.13.0-testing-src.tar.bz2 * Core Scheduling (contributed by SUSE) * Branch hardening to mitigate against Spectre v1 (contributed by Citrix) * Late uCode loading (contributed by Intel) * Improved live-patching build tools (contributed by AWS) * OP-TEE support (contributed by EPAM) * Renesas R-CAR IPMMU-VMSA driver (contributed by EPAM) * Dom0-less passthrough and ImageBuilder (contributed by XILINX) * Support for new Hardware Charles Arnold 2019-12-18 15:26:28 +00:00
  • 5bff5a3c3f - Update to Xen 4.13.0 RC4 release xen-4.13.0-testing-src.tar.bz2 - Rebase libxl.pvscsi.patch Charles Arnold 2019-12-03 17:00:42 +00:00
  • 6d46a17396 Accepting request 751119 from Virtualization Dominique Leuenberger 2019-12-02 10:31:12 +00:00
  • 689dbac764 - Update to Xen 4.13.0 RC3 release xen-4.13.0-testing-src.tar.bz2 - Drop python38-build.patch Charles Arnold 2019-11-25 18:19:31 +00:00
  • 5f569a17c1 Accepting request 748496 from Virtualization Dominique Leuenberger 2019-11-18 19:02:37 +00:00
  • 82eb20b8f5 - Update to Xen 4.13.0 RC2 release xen-4.13.0-testing-src.tar.bz2 Charles Arnold 2019-11-12 15:53:57 +00:00
  • bfa43811df Accepting request 743878 from Virtualization Dominique Leuenberger 2019-11-03 10:18:21 +00:00
  • a6e78e2647 Accepting request 743874 from home:mcepl:branches:Virtualization Charles Arnold 2019-10-29 16:43:57 +00:00
  • 1d9835d88f Accepting request 741160 from Virtualization Dominique Leuenberger 2019-10-22 13:40:58 +00:00
  • b7ccf358ae Fix call to RuntimeError Charles Arnold 2019-10-17 20:35:42 +00:00
  • 38240c8a64 Sync Factory and SLE15-SP2 - Drop 5d419d49-x86-spec-ctrl-facilities-report-wrong-status.patch Charles Arnold 2019-10-17 19:08:38 +00:00
  • 923e7c6606 - Update to Xen 4.13.0 RC1 release xen-4.13.0-testing-src.tar.bz2 - Drop patches contained in new tarball or invalid 5ca7660f-x86-entry-drop-unused-includes.patch 5cab2a6b-x86-ACPI-also-parse-AMD-tables-early.patch 5cab2ab7-x86-IOMMU-introduce-init-ops.patch 5cab2ae8-x86-IOMMU-abstract-iommu_supports_eim.patch 5cab2b4e-x86-IOMMU-abstract-iommu_enable_x2apic_IR.patch 5cab2b95-x86-IOMMU-initialize-iommu_ops-in.patch 5cac9a4b-x86-IOMMU-abstract-adjust_vtd_irq_affinities.patch 5cdeac7f-AMD-IOMMU-adjust-IOMMU-list-head-init.patch 5cf8da09-adjust-sysdom-creation-call-earlier-on-x86.patch 5d0cf4e4-AMD-IOMMU-initialize-IRQ-tasklet-once.patch 5d149bb0-AMD-IOMMU-dont-add-IOMMUs.patch 5d1b3fab-AMD-IOMMU-restrict-feature-logging.patch 5d358508-x86-IRQ-desc-affinity-represents-request.patch 5d358534-x86-IRQ-consolidate-arch-cpu_mask-use.patch 5d358a67-AMD-IOMMU-pass-IOMMU-to-iterate_ivrs_entries-cb.patch 5d358a92-AMD-IOMMU-pass-IOMMU-to-amd_iommu_alloc_intremap_table.patch 5d39811c-x86-IOMMU-dont-restrict-IRQ-affinities.patch 5d417813-AMD-IOMMU-bitfield-extended-features.patch 5d417838-AMD-IOMMU-bitfield-control-reg.patch 5d41785b-AMD-IOMMU-bitfield-IRTE.patch 5d41787e-AMD-IOMMU-pass-IOMMU-to-gfu-intremap-entry.patch 5d4178ad-AMD-IOMMU-128bit-non-guest-APIC-IRTE.patch 5d4178fc-AMD-IOMMU-split-amd_iommu_init_one.patch 5d41793f-AMD-IOMMU-allow-enabling-without-IRQ.patch 5d417a16-AMD-IOMMU-adjust-IRQ-setup-for-x2APIC.patch 5d417ab6-AMD-IOMMU-enable-x2APIC-mode.patch 5d417b38-AMD-IOMMU-correct-IRTE-updating.patch Charles Arnold 2019-10-16 22:56:25 +00:00
  • afbf879760 Revert previous submission. It needs more testing. Charles Arnold 2019-10-14 22:30:09 +00:00
  • c436315a5b xen-ucode is not aarch64 Charles Arnold 2019-10-14 21:25:43 +00:00
  • 99c6fbbb88 - Update to Xen 4.13.0 RC1 release xen-4.13.0-testing-src.tar.bz2 - Drop patches contained in new tarball or invalid 5ca7660f-x86-entry-drop-unused-includes.patch 5cab2a6b-x86-ACPI-also-parse-AMD-tables-early.patch 5cab2ab7-x86-IOMMU-introduce-init-ops.patch 5cab2ae8-x86-IOMMU-abstract-iommu_supports_eim.patch 5cab2b4e-x86-IOMMU-abstract-iommu_enable_x2apic_IR.patch 5cab2b95-x86-IOMMU-initialize-iommu_ops-in.patch 5cac9a4b-x86-IOMMU-abstract-adjust_vtd_irq_affinities.patch 5cdeac7f-AMD-IOMMU-adjust-IOMMU-list-head-init.patch 5cf8da09-adjust-sysdom-creation-call-earlier-on-x86.patch 5d0cf4e4-AMD-IOMMU-initialize-IRQ-tasklet-once.patch 5d149bb0-AMD-IOMMU-dont-add-IOMMUs.patch 5d1b3fab-AMD-IOMMU-restrict-feature-logging.patch 5d358508-x86-IRQ-desc-affinity-represents-request.patch 5d358534-x86-IRQ-consolidate-arch-cpu_mask-use.patch 5d358a67-AMD-IOMMU-pass-IOMMU-to-iterate_ivrs_entries-cb.patch 5d358a92-AMD-IOMMU-pass-IOMMU-to-amd_iommu_alloc_intremap_table.patch 5d39811c-x86-IOMMU-dont-restrict-IRQ-affinities.patch 5d417813-AMD-IOMMU-bitfield-extended-features.patch 5d417838-AMD-IOMMU-bitfield-control-reg.patch 5d41785b-AMD-IOMMU-bitfield-IRTE.patch 5d41787e-AMD-IOMMU-pass-IOMMU-to-gfu-intremap-entry.patch 5d4178ad-AMD-IOMMU-128bit-non-guest-APIC-IRTE.patch 5d4178fc-AMD-IOMMU-split-amd_iommu_init_one.patch 5d41793f-AMD-IOMMU-allow-enabling-without-IRQ.patch 5d417a16-AMD-IOMMU-adjust-IRQ-setup-for-x2APIC.patch 5d417ab6-AMD-IOMMU-enable-x2APIC-mode.patch 5d417b38-AMD-IOMMU-correct-IRTE-updating.patch Charles Arnold 2019-10-14 21:13:36 +00:00
  • e70a162e41 Accepting request 737541 from Virtualization Dominique Leuenberger 2019-10-14 12:53:06 +00:00
  • 812fabfcac Accepting request 734420 from Virtualization Dominique Leuenberger 2019-10-05 14:18:48 +00:00
  • 7e40ffa1ff - bsc#1120095 - add code to change LIBXL_HOTPLUG_TIMEOUT at runtime The included README has details about the impact of this change libxl.LIBXL_HOTPLUG_TIMEOUT.patch Charles Arnold 2019-10-04 14:28:54 +00:00
  • a1872b6afd - bsc#1135799 - Partner-L3: Xen crashes on AMD ROME based machines 5ca7660f-x86-entry-drop-unused-includes.patch 5cf8da09-adjust-sysdom-creation-call-earlier-on-x86.patch 5cab2a6b-x86-ACPI-also-parse-AMD-tables-early.patch 5cab2ab7-x86-IOMMU-introduce-init-ops.patch 5cab2ae8-x86-IOMMU-abstract-iommu_supports_eim.patch 5cab2b4e-x86-IOMMU-abstract-iommu_enable_x2apic_IR.patch 5cab2b95-x86-IOMMU-initialize-iommu_ops-in.patch 5cac9a4b-x86-IOMMU-abstract-adjust_vtd_irq_affinities.patch 5cdeac7f-AMD-IOMMU-adjust-IOMMU-list-head-init.patch 5d0cf4e4-AMD-IOMMU-initialize-IRQ-tasklet-once.patch 5d149bb0-AMD-IOMMU-dont-add-IOMMUs.patch 5d1b3fab-AMD-IOMMU-restrict-feature-logging.patch 5d358508-x86-IRQ-desc-affinity-represents-request.patch 5d358534-x86-IRQ-consolidate-arch-cpu_mask-use.patch 5d358a67-AMD-IOMMU-pass-IOMMU-to-iterate_ivrs_entries-cb.patch 5d358a92-AMD-IOMMU-pass-IOMMU-to-amd_iommu_alloc_intremap_table.patch 5d39811c-x86-IOMMU-dont-restrict-IRQ-affinities.patch 5d417813-AMD-IOMMU-bitfield-extended-features.patch 5d417838-AMD-IOMMU-bitfield-control-reg.patch 5d41785b-AMD-IOMMU-bitfield-IRTE.patch 5d41787e-AMD-IOMMU-pass-IOMMU-to-gfu-intremap-entry.patch 5d4178ad-AMD-IOMMU-128bit-non-guest-APIC-IRTE.patch 5d4178fc-AMD-IOMMU-split-amd_iommu_init_one.patch 5d41793f-AMD-IOMMU-allow-enabling-without-IRQ.patch 5d417a16-AMD-IOMMU-adjust-IRQ-setup-for-x2APIC.patch 5d417ab6-AMD-IOMMU-enable-x2APIC-mode.patch 5d417b38-AMD-IOMMU-correct-IRTE-updating.patch 5d417b6a-AMD-IOMMU-dont-needlessly-log-headers.patch 5d4a9d25-AMD-IOMMU-drop-not-found-message.patch Charles Arnold 2019-09-30 17:40:10 +00:00
  • 3c8840dde1 Accepting request 728544 from Virtualization Dominique Leuenberger 2019-09-11 08:22:29 +00:00
  • cee835ba6a - Upstream bug fixes (bsc#1027519) 5d419d49-x86-spec-ctrl-report-proper-status.patch 5d43253c-x86-ucode-always-collect_cpu_info-at-boot.patch 5d4aa36f-x86-apic-enable-x2APIC-mode-earlier.patch 5d4afa7a-credit2-fix-memory-leak.patch 5d4d850a-introduce-bss-percpu-page-aligned.patch 5d516531-x86-xpti-dont-leak-TSS-adjacent-data.patch 5d5bf475-x86-PV-fix-handling-of-iommu-mappings.patch 5d6524ca-x86-mm-correctly-init-M2P-entries.patch Charles Arnold 2019-08-29 15:04:42 +00:00
  • efa2725c42 - Preserve modified files which used to be marked as %config, rename file.rpmsave to file Olaf Hering 2019-08-28 11:33:50 +00:00
  • 53d72fe3c5 Accepting request 724162 from Virtualization Dominique Leuenberger 2019-08-19 18:48:41 +00:00
  • 0727a5be39 - Update to Xen 4.12.1 bug fix release (bsc#1027519) xen-4.12.1-testing-src.tar.bz2 - Drop patches contained in new tarball 5c87b644-IOMMU-leave-enabled-for-kexec-crash.patch 5c87b6a2-x86-HVM-dont-crash-guest-in-find_mmio_cache.patch 5c87b6c8-drop-arch_evtchn_inject.patch 5c87b6e8-avoid-atomic-rmw-accesses-in-map_vcpu_info.patch 5c87e6d1-x86-TSX-controls-for-RTM-force-abort-mode.patch 5c8f752c-x86-e820-build-with-gcc9.patch 5c8fb92d-x86-HVM-split-linear-reads-and-writes.patch 5c8fb951-x86-HVM-finish-IOREQs-correctly-on-completion.patch 5c8fc6c0-x86-MSR-shorten-ARCH_CAPABILITIES.patch 5c8fc6c0-x86-SC-retpoline-safety-calculations-for-eIBRS.patch 5c9e63c5-credit2-SMT-idle-handling.patch 5ca46b68-x86emul-no-GPR-update-upon-AVX-gather-failures.patch 5ca773d1-x86emul-dont-read-mask-reg-without-AVX512F.patch 5cab1f66-timers-fix-memory-leak-with-cpu-plug.patch 5cac6cba-vmx-Fixup-removals-of-MSR-load-save-list-entries.patch 5cd921fb-trace-fix-build-with-gcc9.patch 5cd9224b-AMD-IOMMU-disable-upon-init-fail.patch 5cd922c5-x86-MTRR-recalc-p2mt-when-iocaps.patch 5cd9230f-VMX-correctly-get-GS_SHADOW-for-current.patch 5cd926d0-bitmap_fill-zero-sized.patch 5cd92724-drivers-video-drop-constraints.patch 5cd93a69-x86-MSR_INTEL_CORE_THREAD_COUNT.patch 5cd93a69-x86-boot-detect-Intel-SMT-correctly.patch 5cd93a69-x86-spec-ctrl-reposition-XPTI-parsing.patch 5cd981ff-x86-IRQ-tracing-avoid-UB-or-worse.patch 5cdad090-x86-spec-ctrl-CPUID-MSR-definitions-for-MDS.patch 5cdad090-x86-spec-ctrl-infrastructure-for-VERW-flush.patch Charles Arnold 2019-08-09 16:44:54 +00:00
  • 1bc73d7045 Accepting request 720120 from Virtualization Dominique Leuenberger 2019-08-07 11:54:53 +00:00
  • fc38776ff1 Bump the Version number Charles Arnold 2019-07-24 20:26:07 +00:00
  • 26fe199b46 - Update xen-dom0-modules.service (bsc#1137251) Map backend module names from pvops and xenlinux kernels to a module alias. This avoids errors from modprobe about unknown modules. Ignore a few xenlinux modules that lack aliases. Charles Arnold 2019-07-24 20:25:31 +00:00
  • 40a03ec704 Accepting request 710678 from Virtualization Dominique Leuenberger 2019-06-22 09:04:29 +00:00
  • 4dfa1f6bd7 - spec: xen-tools: require matching version of xen package bsc#1137471 Charles Arnold 2019-06-11 21:49:05 +00:00
  • 6c41e4f99c Accepting request 702959 from Virtualization Dominique Leuenberger 2019-05-17 21:39:15 +00:00
  • f1e8440202 - Remove arm32 from ExclusiveArch to fix build Charles Arnold 2019-05-14 18:39:26 +00:00
  • 836b453c89 Accepting request 702870 from home:marxin:branches:Virtualization Charles Arnold 2019-05-14 16:54:22 +00:00
  • 6b7b4aa05d Accepting request 695298 from Virtualization Dominique Leuenberger 2019-04-18 11:57:59 +00:00
  • 41e0c70a86 - bsc#1131811 - [XEN] internal error: libxenlight failed to create new domain. This patch is a workaround for a systemd issue. See patch header for additional comments. xenstore-launch.patch Charles Arnold 2019-04-17 15:25:43 +00:00
  • 7f5e9ac6fc Replace VMX-del_msr-accounting.patch with 5cac6cba-vmx-Fixup-removals-of-MSR-load-save-list-entries.patch Charles Arnold 2019-04-15 19:36:38 +00:00
  • 4b95a4f612 Patch to fix ARM build 5cac6219-xen-cpu-Fix-ARM-build-following-cs-597fbb8.patch Charles Arnold 2019-04-15 16:15:51 +00:00
  • 6bfe669909 - bsc#1125378 - [xen][pygrub] Can not restore sle11sp4 pv guest after upgrading host from sle11sp4 to sle15sp1 pygrub-python3-conversion.patch - Fix "TypeError: virDomainDefineXML() argument 2 must be str or None, not bytes" when converting VMs from using the xm/xend toolstack to the libxl/libvirt toolstack. (bsc#1123378) xen2libvirt.py Charles Arnold 2019-04-12 17:12:41 +00:00
  • 960912abbc Accepting request 690700 from Virtualization Dominique Leuenberger 2019-04-04 10:05:32 +00:00
  • c0458c2eb8 - Update to Xen 4.12.0 FCS release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2 * HVM/PVH and PV only Hypervisor: The Xen 4.12 release separates the HVM/PVH and PV code paths in Xen and provides KCONFIG options to build a PV only or HVM/PVH only hypervisor. * QEMU Deprivilege (DM_RESTRICT): In Xen 4.12, this feature has been vastly improved. * Argo - Hypervisor-Mediated data eXchange: Argo is a new inter- domain communication mechanism. * Improvements to Virtual Machine Introspection: The VMI subsystem which allows detection of 0-day vulnerabilities has seen many functional and performance improvements. * Credit 2 Scheduler: The Credit2 scheduler is now the Xen Project default scheduler. * PVH Support: Grub2 boot support has been added to Xen and Grub2. * PVH Dom0: PVH Dom0 support has now been upgraded from experimental to tech preview. * The Xen 4.12 upgrade also includes improved IOMMU mapping code, which is designed to significantly improve the startup times of AMD EPYC based systems. * The upgrade also features Automatic Dom0 Sizing which allows the setting of Dom0 memory size as a percentage of host memory (e.g. 10%) or with an offset (e.g. 1G+10%). Charles Arnold 2019-04-02 14:42:44 +00:00
  • 555142e2dd Accepting request 688873 from Virtualization Dominique Leuenberger 2019-04-01 10:33:37 +00:00
  • ccd6d81562 - bsc#1130485 - Please drop Requires on multipath-tools in xen-tools. Now using Recommends multipath-tools. xen.spec Charles Arnold 2019-03-26 19:07:24 +00:00
  • 6a1afafb02 - Update to Xen 4.12.0 RC7 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2 Charles Arnold 2019-03-25 14:19:13 +00:00