Commit Graph

  • 95031aabfd - bsc#954405 - VUL-0: CVE-2015-8104: Xen: guest to host DoS by triggering an infinite loop in microcode via #DB exception Charles Arnold 2015-11-10 22:14:51 +00:00
  • 049cbb66b1 - bsc#954405 - VUL-0: CVE-2015-8104: Xen: guest to host DoS by triggering an infinite loop in microcode via #DB exception Charles Arnold 2015-11-10 22:14:51 +00:00
  • 31b1f3b60a - bsc#954018 - VUL-0: CVE-2015-5307: xen: x86: CPU lockup during fault delivery (XSA-156) CVE-2015-5307-xsa156.patch Charles Arnold 2015-11-10 21:44:14 +00:00
  • 73c81150d2 - bsc#954018 - VUL-0: CVE-2015-5307: xen: x86: CPU lockup during fault delivery (XSA-156) CVE-2015-5307-xsa156.patch Charles Arnold 2015-11-10 21:44:14 +00:00
  • f158f55e6a - Update to Xen 4.5.2 xen-4.5.2-testing-src.tar.bz2 - Drop the following xen-4.5.1-testing-src.tar.bz2 552d0f49-x86-traps-identify-the-vcpu-in-context-when-dumping-regs.patch 5576f178-kexec-add-more-pages-to-v1-environment.patch 55780be1-x86-EFI-adjust-EFI_MEMORY_WP-handling-for-spec-version-2.5.patch 558bfaa0-x86-traps-avoid-using-current-too-early.patch 5592a116-nested-EPT-fix-the-handling-of-nested-EPT.patch 559b9dd6-x86-p2m-ept-don-t-unmap-in-use-EPT-pagetable.patch 559bc633-x86-cpupool-clear-proper-cpu_valid-bit-on-CPU-teardown.patch 559bc64e-credit1-properly-deal-with-CPUs-not-in-any-pool.patch 559bc87f-x86-hvmloader-avoid-data-corruption-with-xenstore-rw.patch 559bdde5-pull-in-latest-linux-earlycpio.patch 55a62eb0-xl-correct-handling-of-extra_config-in-main_cpupoolcreate.patch 55a66a1e-make-rangeset_report_ranges-report-all-ranges.patch 55a77e4f-dmar-device-scope-mem-leak-fix.patch 55c1d83d-x86-gdt-Drop-write-only-xalloc-d-array.patch 55c3232b-x86-mm-Make-hap-shadow-teardown-preemptible.patch 55dc78e9-x86-amd_ucode-skip-updates-for-final-levels.patch 55df2f76-IOMMU-skip-domains-without-page-tables-when-dumping.patch 55e43fd8-x86-NUMA-fix-setup_node.patch 55e43ff8-x86-NUMA-don-t-account-hotplug-regions.patch 55e593f1-x86-NUMA-make-init_node_heap-respect-Xen-heap-limit.patch 55f2e438-x86-hvm-fix-saved-pmtimer-and-hpet-values.patch 55f9345b-x86-MSI-fail-if-no-hardware-support.patch 5604f2e6-vt-d-fix-IM-bit-mask-and-unmask-of-FECTL_REG.patch 560a4af9-x86-EPT-tighten-conditions-of-IOMMU-mapping-updates.patch 560a7c36-x86-p2m-pt-delay-freeing-of-intermediate-page-tables.patch 560a7c53-x86-p2m-pt-ignore-pt-share-flag-for-shadow-mode-guests.patch Charles Arnold 2015-11-04 20:30:31 +00:00
  • 0d862dbdc8 - Update to Xen 4.5.2 xen-4.5.2-testing-src.tar.bz2 - Drop the following xen-4.5.1-testing-src.tar.bz2 552d0f49-x86-traps-identify-the-vcpu-in-context-when-dumping-regs.patch 5576f178-kexec-add-more-pages-to-v1-environment.patch 55780be1-x86-EFI-adjust-EFI_MEMORY_WP-handling-for-spec-version-2.5.patch 558bfaa0-x86-traps-avoid-using-current-too-early.patch 5592a116-nested-EPT-fix-the-handling-of-nested-EPT.patch 559b9dd6-x86-p2m-ept-don-t-unmap-in-use-EPT-pagetable.patch 559bc633-x86-cpupool-clear-proper-cpu_valid-bit-on-CPU-teardown.patch 559bc64e-credit1-properly-deal-with-CPUs-not-in-any-pool.patch 559bc87f-x86-hvmloader-avoid-data-corruption-with-xenstore-rw.patch 559bdde5-pull-in-latest-linux-earlycpio.patch 55a62eb0-xl-correct-handling-of-extra_config-in-main_cpupoolcreate.patch 55a66a1e-make-rangeset_report_ranges-report-all-ranges.patch 55a77e4f-dmar-device-scope-mem-leak-fix.patch 55c1d83d-x86-gdt-Drop-write-only-xalloc-d-array.patch 55c3232b-x86-mm-Make-hap-shadow-teardown-preemptible.patch 55dc78e9-x86-amd_ucode-skip-updates-for-final-levels.patch 55df2f76-IOMMU-skip-domains-without-page-tables-when-dumping.patch 55e43fd8-x86-NUMA-fix-setup_node.patch 55e43ff8-x86-NUMA-don-t-account-hotplug-regions.patch 55e593f1-x86-NUMA-make-init_node_heap-respect-Xen-heap-limit.patch 55f2e438-x86-hvm-fix-saved-pmtimer-and-hpet-values.patch 55f9345b-x86-MSI-fail-if-no-hardware-support.patch 5604f2e6-vt-d-fix-IM-bit-mask-and-unmask-of-FECTL_REG.patch 560a4af9-x86-EPT-tighten-conditions-of-IOMMU-mapping-updates.patch 560a7c36-x86-p2m-pt-delay-freeing-of-intermediate-page-tables.patch 560a7c53-x86-p2m-pt-ignore-pt-share-flag-for-shadow-mode-guests.patch Charles Arnold 2015-11-04 20:30:31 +00:00
  • 07093f71ba Accepting request 341719 from Virtualization Dominique Leuenberger 2015-11-02 11:54:41 +00:00
  • a7bf4abcc6 Accepting request 341719 from Virtualization Dominique Leuenberger 2015-11-02 11:54:41 +00:00
  • 9e9b5acb9c - Upstream patches from Jan 5604f239-x86-PV-properly-populate-descriptor-tables.patch 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-0.patch 561d2046-VT-d-use-proper-error-codes-in-iommu_enable_x2apic_IR.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-handling.patch Charles Arnold 2015-10-29 22:28:05 +00:00
  • 315234ea8b - Upstream patches from Jan 5604f239-x86-PV-properly-populate-descriptor-tables.patch 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-0.patch 561d2046-VT-d-use-proper-error-codes-in-iommu_enable_x2apic_IR.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-handling.patch Charles Arnold 2015-10-29 22:28:05 +00:00
  • 665337e320 Accepting request 336854 from Virtualization Dominique Leuenberger 2015-10-14 14:43:18 +00:00
  • ed761e500e Accepting request 336854 from Virtualization Dominique Leuenberger 2015-10-14 14:43:18 +00:00
  • 0883ce22a7 - bsc#949138 - Setting vcpu affinity under Xen causes libvirtd abort 54f4985f-libxl-fix-libvirtd-double-free.patch Charles Arnold 2015-10-06 21:17:42 +00:00
  • 448fc7ac04 - bsc#949138 - Setting vcpu affinity under Xen causes libvirtd abort 54f4985f-libxl-fix-libvirtd-double-free.patch Charles Arnold 2015-10-06 21:17:42 +00:00
  • 47432a5a67 - Update README.SUSE detailing dom0 ballooning recommendations Charles Arnold 2015-10-06 18:53:58 +00:00
  • 9a2e5c28c3 - Update README.SUSE detailing dom0 ballooning recommendations Charles Arnold 2015-10-06 18:53:58 +00:00
  • 19d8f590f0 - bsc#949046 - Increase %suse_version in SP1 to 1316 xen.spec Charles Arnold 2015-10-06 15:11:48 +00:00
  • e2b4f0679d - bsc#949046 - Increase %suse_version in SP1 to 1316 xen.spec Charles Arnold 2015-10-06 15:11:48 +00:00
  • 5e4d27a750 Accepting request 331845 from Virtualization Stephan Kulow 2015-09-24 05:16:58 +00:00
  • be608e3250 Accepting request 331845 from Virtualization Stephan Kulow 2015-09-24 05:16:58 +00:00
  • e932e0a863 - bsc#945165 - Xl pci-attach show error with kernel of SLES 12 sp1 pci-attach-fix.patch Charles Arnold 2015-09-17 17:45:05 +00:00
  • 64d7204ef8 - bsc#945165 - Xl pci-attach show error with kernel of SLES 12 sp1 pci-attach-fix.patch Charles Arnold 2015-09-17 17:45:05 +00:00
  • 4a5ee0f11d - bsc#945164 - Xl destroy show error with kernel of SLES 12 sp1 5537a4d8-libxl-use-DEBUG-log-level-instead-of-INFO.patch Charles Arnold 2015-09-16 16:29:39 +00:00
  • 53c194ff58 - bsc#945164 - Xl destroy show error with kernel of SLES 12 sp1 5537a4d8-libxl-use-DEBUG-log-level-instead-of-INFO.patch Charles Arnold 2015-09-16 16:29:39 +00:00
  • 3e3107a7e2 Accepting request 327613 from Virtualization Dominique Leuenberger 2015-08-31 20:57:42 +00:00
  • 0d941a0768 Accepting request 327613 from Virtualization Dominique Leuenberger 2015-08-31 20:57:42 +00:00
  • 8724a18868 - bnc#935634 - VUL-0: CVE-2015-3259: xen: XSA-137: xl command line config handling stack overflow 55a62eb0-xl-correct-handling-of-extra_config-in-main_cpupoolcreate.patch Charles Arnold 2015-08-26 22:28:15 +00:00
  • 923a6f6a80 - bnc#935634 - VUL-0: CVE-2015-3259: xen: XSA-137: xl command line config handling stack overflow 55a62eb0-xl-correct-handling-of-extra_config-in-main_cpupoolcreate.patch Charles Arnold 2015-08-26 22:28:15 +00:00
  • 8a538a5164 Accepting request 324179 from Virtualization Dominique Leuenberger 2015-08-21 06:24:24 +00:00
  • 85e58474fc Accepting request 324179 from Virtualization Dominique Leuenberger 2015-08-21 06:24:24 +00:00
  • b5fb5e90fb - bsc#939712 - VUL-0: XSA-140: QEMU leak of uninitialized heap memory in rtl8139 device model xsa140-qemuu-1.patch xsa140-qemuu-2.patch xsa140-qemuu-3.patch xsa140-qemuu-4.patch xsa140-qemuu-5.patch xsa140-qemuu-6.patch xsa140-qemuu-7.patch xsa140-qemut-1.patch xsa140-qemut-2.patch xsa140-qemut-3.patch xsa140-qemut-4.patch xsa140-qemut-5.patch xsa140-qemut-6.patch xsa140-qemut-7.patch - bsc#939709 - VUL-0: XSA-139: xen: Use after free in QEMU/Xen block unplug protocol xsa139-qemuu.patch Charles Arnold 2015-08-11 22:49:00 +00:00
  • 84b1a5bd9e - bsc#939712 - VUL-0: XSA-140: QEMU leak of uninitialized heap memory in rtl8139 device model xsa140-qemuu-1.patch xsa140-qemuu-2.patch xsa140-qemuu-3.patch xsa140-qemuu-4.patch xsa140-qemuu-5.patch xsa140-qemuu-6.patch xsa140-qemuu-7.patch xsa140-qemut-1.patch xsa140-qemut-2.patch xsa140-qemut-3.patch xsa140-qemut-4.patch xsa140-qemut-5.patch xsa140-qemut-6.patch xsa140-qemut-7.patch - bsc#939709 - VUL-0: XSA-139: xen: Use after free in QEMU/Xen block unplug protocol xsa139-qemuu.patch Charles Arnold 2015-08-11 22:49:00 +00:00
  • 04bf80ef61 Accepting request 315889 from Virtualization Stephan Kulow 2015-07-16 15:15:52 +00:00
  • 21374576ef Accepting request 315889 from Virtualization Stephan Kulow 2015-07-16 15:15:52 +00:00
  • 763b78040d - bnc#935634 - VUL-0: CVE-2015-3259: xen: XSA-137: xl command line config handling stack overflow CVE-2015-3259-xsa137.patch - Upstream patches from Jan 558bfaa0-x86-traps-avoid-using-current-too-early.patch 5592a116-nested-EPT-fix-the-handling-of-nested-EPT.patch 559b9dd6-x86-p2m-ept-don-t-unmap-in-use-EPT-pagetable.patch 559bdde5-pull-in-latest-linux-earlycpio.patch - Upstream patches from Jan pending review 552d0fd2-x86-hvm-don-t-include-asm-spinlock-h.patch 552d0fe8-x86-mtrr-include-asm-atomic.h.patch 552d293b-x86-vMSI-X-honor-all-mask-requests.patch 552d2966-x86-vMSI-X-add-valid-bits-for-read-acceleration.patch 554c7aee-x86-provide-arch_fetch_and_add.patch 554c7b00-arm-provide-arch_fetch_and_add.patch 55534b0a-x86-provide-add_sized.patch 55534b25-arm-provide-add_sized.patch 5555a4f8-use-ticket-locks-for-spin-locks.patch 5555a5b9-x86-arm-remove-asm-spinlock-h.patch 5555a8ec-introduce-non-contiguous-allocation.patch 55795a52-x86-vMSI-X-support-qword-MMIO-access.patch 557eb55f-gnttab-per-active-entry-locking.patch 557eb5b6-gnttab-introduce-maptrack-lock.patch 557eb620-gnttab-make-the-grant-table-lock-a-read-write-lock.patch 557ffab8-evtchn-factor-out-freeing-an-event-channel.patch 5582bf43-evtchn-simplify-port_is_valid.patch 5582bf81-evtchn-remove-the-locking-when-unmasking-an-event-channel.patch 5583d9c5-x86-MSI-X-cleanup.patch 5583da09-x86-MSI-track-host-and-guest-masking-separately.patch 5583da64-gnttab-use-per-VCPU-maptrack-free-lists.patch Charles Arnold 2015-07-10 15:21:29 +00:00
  • 59fbe11394 - bnc#935634 - VUL-0: CVE-2015-3259: xen: XSA-137: xl command line config handling stack overflow CVE-2015-3259-xsa137.patch - Upstream patches from Jan 558bfaa0-x86-traps-avoid-using-current-too-early.patch 5592a116-nested-EPT-fix-the-handling-of-nested-EPT.patch 559b9dd6-x86-p2m-ept-don-t-unmap-in-use-EPT-pagetable.patch 559bdde5-pull-in-latest-linux-earlycpio.patch - Upstream patches from Jan pending review 552d0fd2-x86-hvm-don-t-include-asm-spinlock-h.patch 552d0fe8-x86-mtrr-include-asm-atomic.h.patch 552d293b-x86-vMSI-X-honor-all-mask-requests.patch 552d2966-x86-vMSI-X-add-valid-bits-for-read-acceleration.patch 554c7aee-x86-provide-arch_fetch_and_add.patch 554c7b00-arm-provide-arch_fetch_and_add.patch 55534b0a-x86-provide-add_sized.patch 55534b25-arm-provide-add_sized.patch 5555a4f8-use-ticket-locks-for-spin-locks.patch 5555a5b9-x86-arm-remove-asm-spinlock-h.patch 5555a8ec-introduce-non-contiguous-allocation.patch 55795a52-x86-vMSI-X-support-qword-MMIO-access.patch 557eb55f-gnttab-per-active-entry-locking.patch 557eb5b6-gnttab-introduce-maptrack-lock.patch 557eb620-gnttab-make-the-grant-table-lock-a-read-write-lock.patch 557ffab8-evtchn-factor-out-freeing-an-event-channel.patch 5582bf43-evtchn-simplify-port_is_valid.patch 5582bf81-evtchn-remove-the-locking-when-unmasking-an-event-channel.patch 5583d9c5-x86-MSI-X-cleanup.patch 5583da09-x86-MSI-track-host-and-guest-masking-separately.patch 5583da64-gnttab-use-per-VCPU-maptrack-free-lists.patch Charles Arnold 2015-07-10 15:21:29 +00:00
  • 8126f47de2 Accepting request 314536 from Virtualization Stephan Kulow 2015-07-05 15:50:48 +00:00
  • 8cafccafa2 Accepting request 314536 from Virtualization Stephan Kulow 2015-07-05 15:50:48 +00:00
  • d9b8b1278d Add dropped patches to changelog 5513b458-allow-reboot-overrides-when-running-under-EFI.patch 5513b4d1-dont-apply-reboot-quirks-if-reboot-set-by-user.patch 5576f178-kexec-add-more-pages-to-v1-environment.patch 5535f633-dont-leak-hypervisor-stack-to-toolstacks.patch CVE-2015-3456-xsa133-qemuu.patch CVE-2015-3456-xsa133-qemut.patch Charles Arnold 2015-06-30 15:10:33 +00:00
  • 2a1b9f9fe0 Add dropped patches to changelog 5513b458-allow-reboot-overrides-when-running-under-EFI.patch 5513b4d1-dont-apply-reboot-quirks-if-reboot-set-by-user.patch 5576f178-kexec-add-more-pages-to-v1-environment.patch 5535f633-dont-leak-hypervisor-stack-to-toolstacks.patch CVE-2015-3456-xsa133-qemuu.patch CVE-2015-3456-xsa133-qemut.patch Charles Arnold 2015-06-30 15:10:33 +00:00
  • 7d5bf1323b stable) 556d973f-unmodified-drivers-tolerate-IRQF_DISABLED-being-undefined.patch Charles Arnold 2015-06-30 14:29:21 +00:00
  • de86e7951e stable) 556d973f-unmodified-drivers-tolerate-IRQF_DISABLED-being-undefined.patch Charles Arnold 2015-06-30 14:29:21 +00:00
  • ed69c775a4 - bnc#936516 - xen fails to build with kernel update(4.1.0 from stable) - Fixed with update to Xen 4.5.1 Charles Arnold 2015-06-30 14:25:04 +00:00
  • eb41b6165a - bnc#936516 - xen fails to build with kernel update(4.1.0 from stable) - Fixed with update to Xen 4.5.1 Charles Arnold 2015-06-30 14:25:04 +00:00
  • 97a0425e04 - Update to Xen Version 4.5.1 FCS (fate#315675) xen-4.5.1-testing-src.tar.bz2 - Dropped patches now contained in tarball 556c2cf2-x86-don-t-crash-mapping-a-page-using-EFI-rt-page-tables.patch 556d9718-efi-fix-allocation-problems-if-ExitBootServices-fails.patch 556eabf7-x86-apic-Disable-the-LAPIC-later-in-smp_send_stop.patch 556eac15-x86-crash-don-t-use-set_fixmap-in-the-crash-path.patch 55780aaa-efi-avoid-calling-boot-services-after-ExitBootServices.patch 55780aff-x86-EFI-fix-EFI_MEMORY_WP-handling.patch 55780b43-EFI-early-add-mapbs-to-map-EfiBootServices-Code-Data.patch 55780b97-EFI-support-default-attributes-to-map-Runtime-service-areas.patch Charles Arnold 2015-06-30 14:23:29 +00:00
  • 2f49982b4b - Update to Xen Version 4.5.1 FCS (fate#315675) xen-4.5.1-testing-src.tar.bz2 - Dropped patches now contained in tarball 556c2cf2-x86-don-t-crash-mapping-a-page-using-EFI-rt-page-tables.patch 556d9718-efi-fix-allocation-problems-if-ExitBootServices-fails.patch 556eabf7-x86-apic-Disable-the-LAPIC-later-in-smp_send_stop.patch 556eac15-x86-crash-don-t-use-set_fixmap-in-the-crash-path.patch 55780aaa-efi-avoid-calling-boot-services-after-ExitBootServices.patch 55780aff-x86-EFI-fix-EFI_MEMORY_WP-handling.patch 55780b43-EFI-early-add-mapbs-to-map-EfiBootServices-Code-Data.patch 55780b97-EFI-support-default-attributes-to-map-Runtime-service-areas.patch Charles Arnold 2015-06-30 14:23:29 +00:00
  • 1da2128aba Accepting request 307039 from Virtualization Stephan Kulow 2015-05-16 05:12:45 +00:00
  • 3d81c63aea Accepting request 307039 from Virtualization Stephan Kulow 2015-05-16 05:12:45 +00:00
  • 2668ab806b - bsc#927967 - VUL-0: CVE-2015-3340: xen: Information leak through XEN_DOMCTL_gettscinfo (XSA-132) 5535f633-dont-leak-hypervisor-stack-to-toolstacks.patch Charles Arnold 2015-05-13 15:28:16 +00:00
  • 573ddbb6cd - bsc#927967 - VUL-0: CVE-2015-3340: xen: Information leak through XEN_DOMCTL_gettscinfo (XSA-132) 5535f633-dont-leak-hypervisor-stack-to-toolstacks.patch Charles Arnold 2015-05-13 15:28:16 +00:00
  • 54a99563cd Accepting request 305344 from Virtualization Dominique Leuenberger 2015-05-06 09:17:21 +00:00
  • 19aa7bc13e Accepting request 305344 from Virtualization Dominique Leuenberger 2015-05-06 09:17:21 +00:00
  • a8d0abb1da - bsc#928783 - Reboot failure; Request backport of upstream Xen patch to 4.5.0, or update pkgs to 4.5.1 5513b458-allow-reboot-overrides-when-running-under-EFI.patch 5513b4d1-dont-apply-reboot-quirks-if-reboot-set-by-user.patch Charles Arnold 2015-04-27 16:20:15 +00:00
  • 068ddde0a0 - bsc#928783 - Reboot failure; Request backport of upstream Xen patch to 4.5.0, or update pkgs to 4.5.1 5513b458-allow-reboot-overrides-when-running-under-EFI.patch 5513b4d1-dont-apply-reboot-quirks-if-reboot-set-by-user.patch Charles Arnold 2015-04-27 16:20:15 +00:00
  • 35e73086a7 - bnc#927750 - Avoid errors reported by system-modules-load.service Olaf Hering 2015-04-21 12:25:48 +00:00
  • 5255b46940 - bnc#927750 - Avoid errors reported by system-modules-load.service Olaf Hering 2015-04-21 12:25:48 +00:00
  • d821012b31 Accepting request 294977 from Virtualization Dominique Leuenberger 2015-04-11 22:08:41 +00:00
  • 0f82bf1837 Accepting request 294977 from Virtualization Dominique Leuenberger 2015-04-11 22:08:41 +00:00
  • b6d9f3c173 Accepting request 294943 from home:rguenther:branches:Virtualization Charles Arnold 2015-04-08 14:03:12 +00:00
  • ee701d29d4 Accepting request 294943 from home:rguenther:branches:Virtualization Charles Arnold 2015-04-08 14:03:12 +00:00
  • f2549d444b GCC 5 is by default. (bsc#921994) breakage with GCC 5. (bsc#921994) Charles Arnold 2015-04-07 16:57:44 +00:00
  • 12c9fe4992 GCC 5 is by default. (bsc#921994) breakage with GCC 5. (bsc#921994) Charles Arnold 2015-04-07 16:57:44 +00:00
  • c05f69363f Merge with SR#290432 and xentop fixes Charles Arnold 2015-04-07 15:28:04 +00:00
  • 0ede487624 Merge with SR#290432 and xentop fixes Charles Arnold 2015-04-07 15:28:04 +00:00
  • f7e27d5f03 Accepting request 292894 from Virtualization Dominique Leuenberger 2015-03-30 17:31:25 +00:00
  • d645cadc33 Accepting request 292894 from Virtualization Dominique Leuenberger 2015-03-30 17:31:25 +00:00
  • 6c53f9313d Add patch to changelog qemu-xen-enable-spice-support.patch Charles Arnold 2015-03-17 22:03:39 +00:00
  • 3baa359bb8 Add patch to changelog qemu-xen-enable-spice-support.patch Charles Arnold 2015-03-17 22:03:39 +00:00
  • f79fb3183f Don't try to build with spice on SLE11 Charles Arnold 2015-03-17 21:47:42 +00:00
  • 3287874701 Don't try to build with spice on SLE11 Charles Arnold 2015-03-17 21:47:42 +00:00
  • 54fee29628 5124efbe-add-qxl-support.patch Charles Arnold 2015-03-16 23:29:59 +00:00
  • 8e751900c3 5124efbe-add-qxl-support.patch Charles Arnold 2015-03-16 23:29:59 +00:00
  • e2823d1bba - Enable spice support in qemu for x86_64 Charles Arnold 2015-03-16 21:23:13 +00:00
  • ae68153c27 - Enable spice support in qemu for x86_64 Charles Arnold 2015-03-16 21:23:13 +00:00
  • d7880d0813 Only enable spice for x86_64, ix86 Charles Arnold 2015-03-16 18:14:31 +00:00
  • 003bbee477 Only enable spice for x86_64, ix86 Charles Arnold 2015-03-16 18:14:31 +00:00
  • 2465d17539 - Enable spice support in qemu Charles Arnold 2015-03-16 17:03:34 +00:00
  • ab9a2c89a6 - Enable spice support in qemu Charles Arnold 2015-03-16 17:03:34 +00:00
  • 79d0e0dc13 Accepting request 288683 from Virtualization Dominique Leuenberger 2015-03-09 09:00:11 +00:00
  • 62a723ee6e Accepting request 288683 from Virtualization Dominique Leuenberger 2015-03-09 09:00:11 +00:00
  • 3585004ba4 Accepting request 288627 from home:msmeissn:branches:Virtualization Charles Arnold 2015-03-03 15:10:48 +00:00
  • 725e9957b7 Accepting request 288627 from home:msmeissn:branches:Virtualization Charles Arnold 2015-03-03 15:10:48 +00:00
  • 62368c197d Accepting request 286540 from Virtualization Dominique Leuenberger 2015-02-18 19:36:09 +00:00
  • b652befba5 Accepting request 286540 from Virtualization Dominique Leuenberger 2015-02-18 19:36:09 +00:00
  • d6127aeafb Fix bnc#918169 the way it should be. Charles Arnold 2015-02-17 19:02:27 +00:00
  • 2e1696854c Fix bnc#918169 the way it should be. Charles Arnold 2015-02-17 19:02:27 +00:00
  • b295f20e8f - bnc#918169 - XEN fixes required to work with Kernel 3.19.0 xen.spec Charles Arnold 2015-02-17 17:52:51 +00:00
  • 82c8e62610 - bnc#918169 - XEN fixes required to work with Kernel 3.19.0 xen.spec Charles Arnold 2015-02-17 17:52:51 +00:00
  • 43d9f67c01 Accepting request 286028 from Virtualization Stephan Kulow 2015-02-16 14:25:00 +00:00
  • bf56145987 Accepting request 286028 from Virtualization Stephan Kulow 2015-02-16 14:25:00 +00:00
  • 1eaaf6d1c9 - Update seabios to rel-1.7.5 which is the correct version for Xen 4.5 Charles Arnold 2015-02-06 21:22:24 +00:00
  • c05f58de99 - Update seabios to rel-1.7.5 which is the correct version for Xen 4.5 Charles Arnold 2015-02-06 21:22:24 +00:00
  • 15d5080f29 Accepting request 283518 from Virtualization Dominique Leuenberger 2015-02-04 08:31:06 +00:00
  • 4872b10002 Accepting request 283518 from Virtualization Dominique Leuenberger 2015-02-04 08:31:06 +00:00
  • f2059e051a Update change log with missing dropped patches/files Also set the Version string to _02 x86-dom-print.patch x86-extra-trap-info.patch tmp_build.patch xl-check-for-libvirt-managed-domain.patch disable-wget-check.patch tmp-initscript-modprobe.patch init.xendomains xendomains.service xen-watchdog.service xen-updown.sh Charles Arnold 2015-01-27 15:49:18 +00:00
  • 2e62440f86 Update change log with missing dropped patches/files Also set the Version string to _02 x86-dom-print.patch x86-extra-trap-info.patch tmp_build.patch xl-check-for-libvirt-managed-domain.patch disable-wget-check.patch tmp-initscript-modprobe.patch init.xendomains xendomains.service xen-watchdog.service xen-updown.sh Charles Arnold 2015-01-27 15:49:18 +00:00
  • 033fe1d1d9 Install correct Source as xencommons.service Olaf Hering 2015-01-20 14:00:18 +00:00
  • 340eb8b056 Install correct Source as xencommons.service Olaf Hering 2015-01-20 14:00:18 +00:00
  • abf8af324b - Update to Xen 4.5.0 FCS Charles Arnold 2015-01-14 20:58:52 +00:00
  • 07eb8b7e34 - Update to Xen 4.5.0 FCS Charles Arnold 2015-01-14 20:58:52 +00:00