- bsc#970135 - new virtualization project clock test randomly fails
on Xen 576001df-x86-time-use-local-stamp-in-TSC-calibration-fast-path.patch 5769106e-x86-generate-assembler-equates-for-synthesized.patch 57a1e603-x86-time-adjust-local-system-time-initialization.patch 57a1e64c-x86-time-introduce-and-use-rdtsc_ordered.patch 57a2f6ac-x86-time-calibrate-TSC-against-platform-timer.patch - bsc#991934 - xen hypervisor crash in csched_acct 57973099-have-schedulers-revise-initial-placement.patch 579730e6-remove-buggy-initial-placement-algorithm.patch - bsc#988675 - VUL-0: CVE-2016-6258: xen: x86: Privilege escalation in PV guests (XSA-182) 57976073-x86-remove-unsafe-bits-from-mod_lN_entry-fastpath.patch - bsc#988676 - VUL-0: CVE-2016-6259: xen: x86: Missing SMAP whitelisting in 32-bit exception / event delivery (XSA-183) 57976078-x86-avoid-SMAP-violation-in-compat_create_bounce_frame.patch - Upstream patches from Jan 57a30261-x86-support-newer-Intel-CPU-models.patch - bsc#985503 - vif-route broken vif-route.patch OBS-URL: https://build.opensuse.org/package/show/Virtualization/xen?expand=0&rev=445
This commit is contained in:
committed by
Git OBS Bridge
parent
c8a1704907
commit
a89d75605e
28
xen.changes
28
xen.changes
@@ -1,3 +1,31 @@
|
||||
-------------------------------------------------------------------
|
||||
Thu Aug 4 09:12:34 MDT 2016 - carnold@suse.com
|
||||
|
||||
- bsc#970135 - new virtualization project clock test randomly fails
|
||||
on Xen
|
||||
576001df-x86-time-use-local-stamp-in-TSC-calibration-fast-path.patch
|
||||
5769106e-x86-generate-assembler-equates-for-synthesized.patch
|
||||
57a1e603-x86-time-adjust-local-system-time-initialization.patch
|
||||
57a1e64c-x86-time-introduce-and-use-rdtsc_ordered.patch
|
||||
57a2f6ac-x86-time-calibrate-TSC-against-platform-timer.patch
|
||||
- bsc#991934 - xen hypervisor crash in csched_acct
|
||||
57973099-have-schedulers-revise-initial-placement.patch
|
||||
579730e6-remove-buggy-initial-placement-algorithm.patch
|
||||
- bsc#988675 - VUL-0: CVE-2016-6258: xen: x86: Privilege escalation
|
||||
in PV guests (XSA-182)
|
||||
57976073-x86-remove-unsafe-bits-from-mod_lN_entry-fastpath.patch
|
||||
- bsc#988676 - VUL-0: CVE-2016-6259: xen: x86: Missing SMAP
|
||||
whitelisting in 32-bit exception / event delivery (XSA-183)
|
||||
57976078-x86-avoid-SMAP-violation-in-compat_create_bounce_frame.patch
|
||||
- Upstream patches from Jan
|
||||
57a30261-x86-support-newer-Intel-CPU-models.patch
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Aug 1 11:46:22 MDT 2016 - carnold@suse.com
|
||||
|
||||
- bsc#985503 - vif-route broken
|
||||
vif-route.patch
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Jul 28 05:23:12 MDT 2016 - carnold@suse.com
|
||||
|
||||
|
Reference in New Issue
Block a user