- Upstream patches from Jan
5281fad4-numa-sched-leave-node-affinity-alone-if-not-in-auto-mode.patch 52820823-nested-SVM-adjust-guest-handling-of-structure-mappings.patch 52820863-VMX-don-t-crash-processing-d-debug-key.patch 5282492f-x86-eliminate-has_arch_mmios.patch 52864df2-credit-Update-other-parameters-when-setting-tslice_ms.patch 52864f30-fix-leaking-of-v-cpu_affinity_saved-on-domain-destruction.patch 5289d225-nested-VMX-don-t-ignore-mapping-errors.patch 528a0eb0-x86-consider-modules-when-cutting-off-memory.patch 528f606c-x86-hvm-reset-TSC-to-0-after-domain-resume-from-S3.patch 528f609c-x86-crash-disable-the-watchdog-NMIs-on-the-crashing-cpu.patch 52932418-x86-xsave-fix-nonlazy-state-handling.patch - Add missing requires to pciutils package for xend-tools - bnc#851749 - Xen service file does not call xend properly xend.service - bnc#851386 - VUL-0: xen: XSA-78: Insufficient TLB flushing in VT-d (iommu) code 528a0e5b-TLB-flushing-in-dma_pte_clear_one.patch - bnc#849667 - VUL-0: xen: XSA-74: Lock order reversal between page_alloc_lock and mm_rwlock CVE-2013-4553-xsa74.patch - bnc#849665 - VUL-0: CVE-2013-4551: xen: XSA-75: Host crash due to guest VMX instruction execution 52809208-nested-VMX-VMLANUCH-VMRESUME-emulation-must-check-permission-1st.patch - bnc#849668 - VUL-0: xen: XSA-76: Hypercalls exposed to privilege rings 1 and 2 of HVM guests OBS-URL: https://build.opensuse.org/package/show/Virtualization/xen?expand=0&rev=279
This commit is contained in:
committed by
Git OBS Bridge
parent
731bb529f3
commit
a11c33863f
176
xen.spec
176
xen.spec
@@ -15,13 +15,12 @@
|
||||
# Please submit bugfixes or comments via http://bugs.opensuse.org/
|
||||
#
|
||||
|
||||
|
||||
Name: xen
|
||||
ExclusiveArch: %ix86 x86_64 %arm aarch64
|
||||
%define xvers 4.3
|
||||
%define xvermaj 4
|
||||
%define changeset 27204
|
||||
%define xen_build_dir xen-4.3.0-testing
|
||||
%define changeset 27302
|
||||
%define xen_build_dir xen-4.3.1-testing
|
||||
%ifarch %arm aarch64
|
||||
%define with_kmp 0
|
||||
%define with_stubdom 0
|
||||
@@ -139,13 +138,13 @@ BuildRequires: xorg-x11
|
||||
BuildRequires: lndir
|
||||
%endif
|
||||
%endif
|
||||
Version: 4.3.0_14
|
||||
Version: 4.3.1_02
|
||||
Release: 0
|
||||
PreReq: %insserv_prereq %fillup_prereq
|
||||
Summary: Xen Virtualization: Hypervisor (aka VMM aka Microkernel)
|
||||
License: GPL-2.0+
|
||||
Group: System/Kernel
|
||||
Source0: xen-4.3.0-testing-src.tar.bz2
|
||||
Source0: xen-4.3.1-testing-src.tar.bz2
|
||||
Source1: stubdom.tar.bz2
|
||||
Source2: qemu-xen-traditional-dir-remote.tar.bz2
|
||||
Source3: qemu-xen-dir-remote.tar.bz2
|
||||
@@ -194,87 +193,40 @@ Source99: baselibs.conf
|
||||
# http://xenbits.xensource.com/ext/xenalyze
|
||||
Source20000: xenalyze.hg.tar.bz2
|
||||
# Upstream patches
|
||||
Patch1: 51d277a3-x86-don-t-pass-negative-time-to-gtime_to_gtsc-try-2.patch
|
||||
Patch2: 51d27807-iommu-amd-Fix-logic-for-clearing-the-IOMMU-interrupt-bits.patch
|
||||
Patch3: 51d27841-iommu-amd-Workaround-for-erratum-787.patch
|
||||
Patch4: 51d5334e-x86-mm-Ensure-useful-progress-in-alloc_l2_table.patch
|
||||
Patch5: 51daa074-Revert-hvmloader-always-include-HPET-table.patch
|
||||
Patch6: 51dd155c-adjust-x86-EFI-build.patch
|
||||
Patch7: 51e517e6-AMD-IOMMU-allocate-IRTEs.patch
|
||||
Patch8: 51e5183f-AMD-IOMMU-untie-remap-and-vector-maps.patch
|
||||
Patch9: 51e63d80-x86-cpuidle-Change-logging-for-unknown-APIC-IDs.patch
|
||||
Patch10: 51e63df6-VMX-fix-interaction-of-APIC-V-and-Viridian-emulation.patch
|
||||
Patch11: 51e6540d-x86-don-t-use-destroy_xen_mappings-for-vunmap.patch
|
||||
Patch12: 51e7963f-x86-time-Update-wallclock-in-shared-info-when-altering-domain-time-offset.patch
|
||||
Patch13: 51ffd577-fix-off-by-one-mistakes-in-vm_alloc.patch
|
||||
Patch14: 51ffd5fd-x86-refine-FPU-selector-handling-code-for-XSAVEOPT.patch
|
||||
Patch15: 520114bb-Nested-VMX-Flush-TLBs-and-Caches-if-paging-mode-changed.patch
|
||||
Patch16: 520119fc-xen-conring-Write-to-console-ring-even-if-console-lock-is-busted.patch
|
||||
Patch17: 520a24f6-x86-AMD-Fix-nested-svm-crash-due-to-assertion-in-__virt_to_maddr.patch
|
||||
Patch18: 520a2570-x86-AMD-Inject-GP-instead-of-UD-when-unable-to-map-vmcb.patch
|
||||
Patch19: 520a2705-watchdog-crash-Always-disable-watchdog-in-console_force_unlock.patch
|
||||
Patch20: 520a5504-VMX-add-boot-parameter-to-enable-disable-APIC-v-dynamically.patch
|
||||
Patch21: 520b4b60-VT-d-protect-against-bogus-information-coming-from-BIOS.patch
|
||||
Patch22: 520b4bda-x86-MTRR-fix-range-check-in-mtrr_add_page.patch
|
||||
Patch23: 520cb8b6-x86-time-fix-check-for-negative-time-in-__update_vcpu_system_time.patch
|
||||
Patch24: 52146070-ACPI-fix-acpi_os_map_memory.patch
|
||||
Patch25: 5214d26a-VT-d-warn-about-CFI-being-enabled-by-firmware.patch
|
||||
Patch26: 5215d094-Nested-VMX-Check-whether-interrupt-is-blocked-by-TPR.patch
|
||||
Patch27: 5215d0c5-Nested-VMX-Force-check-ISR-when-L2-is-running.patch
|
||||
Patch28: 5215d135-Nested-VMX-Clear-APIC-v-control-bit-in-vmcs02.patch
|
||||
Patch29: 5215d2d5-Nested-VMX-Update-APIC-v-RVI-SVI-when-vmexit-to-L1.patch
|
||||
Patch30: 5215d8b0-Correct-X2-APIC-HVM-emulation.patch
|
||||
Patch31: 521c6d4a-x86-don-t-allow-Dom0-access-to-the-MSI-address-range.patch
|
||||
Patch32: 521c6d6c-x86-don-t-allow-Dom0-access-to-the-HT-address-range.patch
|
||||
Patch33: 521c6e23-x86-Intel-add-support-for-Haswell-CPU-models.patch
|
||||
Patch34: 521db25f-Fix-inactive-timer-list-corruption-on-second-S3-resume.patch
|
||||
Patch35: 521e1156-x86-AVX-instruction-emulation-fixes.patch
|
||||
Patch36: 521ef8d9-AMD-IOMMU-add-missing-checks.patch
|
||||
Patch37: 52205a7d-hvmloader-smbios-Correctly-count-the-number-of-tables-written.patch
|
||||
Patch38: 52205a90-public-hvm_xs_strings.h-Fix-ABI-regression-for-OEM-SMBios-strings.patch
|
||||
Patch39: 52205e27-x86-xsave-initialization-improvements.patch
|
||||
Patch40: 5226020f-xend-handle-extended-PCI-configuration-space-when-saving-state.patch
|
||||
Patch41: 52260214-xend-fix-file-descriptor-leak-in-pci-utilities.patch
|
||||
Patch42: 52285317-hvmloader-fix-SeaBIOS-interface.patch
|
||||
Patch43: 522d896b-x86-EFI-properly-handle-run-time-memory-regions-outside-the-1-1-map.patch
|
||||
Patch44: 522d8a1f-x86-allow-guest-to-set-clear-MSI-X-mask-bit-try-2.patch
|
||||
Patch45: 522dc044-xmalloc-make-whole-pages-xfree-clear-the-order-field-ab-used-by-xmalloc.patch
|
||||
Patch46: 522dc0e6-x86-xsave-fix-migration-from-xsave-capable-to-xsave-incapable-host.patch
|
||||
Patch47: 522f2f9f-Nested-VMX-Clear-bit-31-of-IA32_VMX_BASIC-MSR.patch
|
||||
Patch48: 522f37b2-sched-arinc653-check-for-guest-data-transfer-failures.patch
|
||||
Patch49: 523172d5-x86-fix-memory-cut-off-when-using-PFN-compression.patch
|
||||
Patch50: 5231e090-libxc-x86-fix-page-table-creation-for-huge-guests.patch
|
||||
Patch51: 5231f00c-cpufreq-missing-check-of-copy_from_guest.patch
|
||||
Patch52: 523304b6-x86-machine_restart-must-not-call-acpi_dmar_reinstate-twice.patch
|
||||
Patch53: 5239a064-x86-HVM-fix-failure-path-in-hvm_vcpu_initialise.patch
|
||||
Patch54: 5239a076-VMX-fix-failure-path-in-construct_vmcs.patch
|
||||
Patch55: 523c0ed4-x86-HVM-properly-handle-wide-MMIO.patch
|
||||
Patch56: 523c1758-sched_credit-filter-node-affinity-mask-against-online-cpus.patch
|
||||
Patch57: 523c1834-unmodified_drivers-enable-unplug-per-default.patch
|
||||
Patch58: 523ff393-x86-HVM-linear-address-must-be-canonical-for-the-whole-accessed-range.patch
|
||||
Patch59: 523ff3e2-x86-HVM-refuse-doing-string-operations-in-certain-situations.patch
|
||||
Patch60: 5242a1b5-x86-xsave-initialize-extended-register-state-when-guests-enable-it.patch
|
||||
Patch61: 52496bea-x86-properly-handle-hvm_copy_from_guest_-phys-virt-errors.patch
|
||||
Patch62: 52496c11-x86-mm-shadow-Fix-initialization-of-PV-shadow-L4-tables.patch
|
||||
Patch63: 52496c32-x86-properly-set-up-fbld-emulation-operand-address.patch
|
||||
Patch64: 52497c6c-x86-don-t-blindly-create-L3-tables-for-the-direct-map.patch
|
||||
Patch65: 524e971b-x86-idle-Fix-get_cpu_idle_time-s-interaction-with-offline-pcpus.patch
|
||||
Patch66: 524e9762-x86-percpu-Force-INVALID_PERCPU_AREA-to-non-canonical.patch
|
||||
Patch67: 524e983e-Nested-VMX-check-VMX-capability-before-read-VMX-related-MSRs.patch
|
||||
Patch68: 524e98b1-Nested-VMX-fix-IA32_VMX_CR4_FIXED1-msr-emulation.patch
|
||||
Patch69: 524e9dc0-xsm-forbid-PV-guest-console-reads.patch
|
||||
Patch70: 5256a979-x86-check-segment-descriptor-read-result-in-64-bit-OUTS-emulation.patch
|
||||
Patch71: 5256be57-libxl-fix-vif-rate-parsing.patch
|
||||
Patch72: 5256be84-tools-ocaml-fix-erroneous-free-of-cpumap-in-stub_xc_vcpu_getaffinity.patch
|
||||
Patch73: 5256be92-libxl-fix-out-of-memory-error-handling-in-libxl_list_cpupool.patch
|
||||
Patch74: 5257a89a-x86-correct-LDT-checks.patch
|
||||
Patch75: 5257a8e7-x86-add-address-validity-check-to-guest_map_l1e.patch
|
||||
Patch76: 5257a944-x86-check-for-canonical-address-before-doing-page-walks.patch
|
||||
Patch77: 525b95f4-scheduler-adjust-internal-locking-interface.patch
|
||||
Patch78: 525b9617-sched-fix-race-between-sched_move_domain-and-vcpu_wake.patch
|
||||
Patch79: 525e69e8-credit-unpause-parked-vcpu-before-destroying-it.patch
|
||||
Patch80: 525faf5e-x86-print-relevant-tail-part-of-filename-for-warnings-and-crashes.patch
|
||||
Patch7100: CVE-2013-4375-xsa71.patch
|
||||
Patch1: 51e517e6-AMD-IOMMU-allocate-IRTEs.patch
|
||||
Patch2: 51e5183f-AMD-IOMMU-untie-remap-and-vector-maps.patch
|
||||
Patch3: 51e63df6-VMX-fix-interaction-of-APIC-V-and-Viridian-emulation.patch
|
||||
Patch4: 521c6d6c-x86-don-t-allow-Dom0-access-to-the-HT-address-range.patch
|
||||
Patch5: 525b95f4-scheduler-adjust-internal-locking-interface.patch
|
||||
Patch6: 525b9617-sched-fix-race-between-sched_move_domain-and-vcpu_wake.patch
|
||||
Patch7: 525e69e8-credit-unpause-parked-vcpu-before-destroying-it.patch
|
||||
Patch8: 525faf5e-x86-print-relevant-tail-part-of-filename-for-warnings-and-crashes.patch
|
||||
Patch9: 52654798-x86-xsave-also-save-restore-XCR0-across-suspend-ACPI-S3.patch
|
||||
Patch10: 526e43d4-x86-refine-address-validity-checks-before-accessing-page-tables.patch
|
||||
Patch11: 526f786a-fix-locking-in-cpu_disable_scheduler.patch
|
||||
Patch12: 5277639c-gnttab-correct-locking-order-reversal.patch
|
||||
Patch13: 5277646c-x86-ACPI-x2APIC-guard-against-out-of-range-ACPI-or-APIC-IDs.patch
|
||||
Patch14: 5277a134-x86-make-sure-memory-block-is-RAM-before-passing-to-the-allocator.patch
|
||||
Patch15: 5278f7f9-x86-HVM-32-bit-IN-result-must-be-zero-extended-to-64-bits.patch
|
||||
Patch16: 527a0a05-call-sched_destroy_domain-before-cpupool_rm_domain.patch
|
||||
Patch17: 527cb7d2-x86-hvm-fix-restart-of-RTC-periodic-timer-with-vpt_align-1.patch
|
||||
Patch18: 527cb820-x86-EFI-make-trampoline-allocation-more-flexible.patch
|
||||
Patch19: 52809208-nested-VMX-VMLANUCH-VMRESUME-emulation-must-check-permission-1st.patch
|
||||
Patch20: 5280aae0-x86-idle-reduce-contention-on-ACPI-register-accesses.patch
|
||||
Patch21: 5281fad4-numa-sched-leave-node-affinity-alone-if-not-in-auto-mode.patch
|
||||
Patch22: 52820823-nested-SVM-adjust-guest-handling-of-structure-mappings.patch
|
||||
Patch23: 52820863-VMX-don-t-crash-processing-d-debug-key.patch
|
||||
Patch24: 5282492f-x86-eliminate-has_arch_mmios.patch
|
||||
Patch25: 52864df2-credit-Update-other-parameters-when-setting-tslice_ms.patch
|
||||
Patch26: 52864f30-fix-leaking-of-v-cpu_affinity_saved-on-domain-destruction.patch
|
||||
Patch27: 5289d225-nested-VMX-don-t-ignore-mapping-errors.patch
|
||||
Patch28: 528a0e5b-TLB-flushing-in-dma_pte_clear_one.patch
|
||||
Patch29: 528a0eb0-x86-consider-modules-when-cutting-off-memory.patch
|
||||
Patch30: 528f606c-x86-hvm-reset-TSC-to-0-after-domain-resume-from-S3.patch
|
||||
Patch31: 528f609c-x86-crash-disable-the-watchdog-NMIs-on-the-crashing-cpu.patch
|
||||
Patch32: 52932418-x86-xsave-fix-nonlazy-state-handling.patch
|
||||
Patch7400: CVE-2013-4553-xsa74.patch
|
||||
Patch7600: CVE-2013-4554-xsa76.patch
|
||||
# Upstream qemu patches
|
||||
# Our patches
|
||||
Patch301: xen-destdir.patch
|
||||
@@ -438,6 +390,7 @@ Authors:
|
||||
%package xend-tools
|
||||
Summary: Xen Virtualization: Control tools for domain 0
|
||||
Group: System/Kernel
|
||||
Requires: pciutils
|
||||
Requires: python
|
||||
Requires: python-curses
|
||||
Requires: python-lxml
|
||||
@@ -598,55 +551,8 @@ Authors
|
||||
%patch30 -p1
|
||||
%patch31 -p1
|
||||
%patch32 -p1
|
||||
%patch33 -p1
|
||||
%patch34 -p1
|
||||
%patch35 -p1
|
||||
%patch36 -p1
|
||||
%patch37 -p1
|
||||
%patch38 -p1
|
||||
%patch39 -p1
|
||||
%patch40 -p1
|
||||
%patch41 -p1
|
||||
%patch42 -p1
|
||||
%patch43 -p1
|
||||
%patch44 -p1
|
||||
%patch45 -p1
|
||||
%patch46 -p1
|
||||
%patch47 -p1
|
||||
%patch48 -p1
|
||||
%patch49 -p1
|
||||
%patch50 -p1
|
||||
%patch51 -p1
|
||||
%patch52 -p1
|
||||
%patch53 -p1
|
||||
%patch54 -p1
|
||||
%patch55 -p1
|
||||
%patch56 -p1
|
||||
%patch57 -p1
|
||||
%patch58 -p1
|
||||
%patch59 -p1
|
||||
%patch60 -p1
|
||||
%patch61 -p1
|
||||
%patch62 -p1
|
||||
%patch63 -p1
|
||||
%patch64 -p1
|
||||
%patch65 -p1
|
||||
%patch66 -p1
|
||||
%patch67 -p1
|
||||
%patch68 -p1
|
||||
%patch69 -p1
|
||||
%patch70 -p1
|
||||
%patch71 -p1
|
||||
%patch72 -p1
|
||||
%patch73 -p1
|
||||
%patch74 -p1
|
||||
%patch75 -p1
|
||||
%patch76 -p1
|
||||
%patch77 -p1
|
||||
%patch78 -p1
|
||||
%patch79 -p1
|
||||
%patch80 -p1
|
||||
%patch7100 -p1
|
||||
%patch7400 -p1
|
||||
%patch7600 -p1
|
||||
%patch301 -p1
|
||||
%patch302 -p1
|
||||
%patch303 -p1
|
||||
|
Reference in New Issue
Block a user