SHA256
1
0
forked from pool/xen

Commit Graph

  • 6f0d0a87b3 Accepting request 1198569 from Virtualization devel Ana Guerrero 2024-09-05 13:46:07 +00:00
  • 2abbb72d88 - Fix build on aarch64 with gcc14 (bsc#1225953) 66d02b69-Arm64-adjust-irq_to_desc-to-fix-build-with-gcc14.patch Charles Arnold 2024-09-03 14:20:44 +00:00
  • 9354acf081 - Fix build on aarch64 with gcc14: * 99f942f3-fix-aarch64.patch Charles Arnold 2024-09-03 14:15:48 +00:00
  • 0a29acb5b0 Accepting request 427084 from Virtualization factory Dominique Leuenberger 2016-09-17 12:34:14 +00:00
  • 9dfb7389ff Wait to enable ovmf until after Leap 42.2 updated. Charles Arnold 2016-09-14 22:36:48 +00:00
  • a03dd2362e Need to keep qemu-ovmf-x86_64 enabled Charles Arnold 2016-09-14 22:34:49 +00:00
  • da53445dea - bsc#995785 - VUL-0: CVE-2016-7092: xen: x86: Disallow L3 recursive pagetable for 32-bit PV guests (XSA-185) 57d1563d-x86-32on64-don-t-allow-recursive-page-tables-from-L3.patch - bsc#995789 - VUL-0: CVE-2016-7093: xen: x86: Mishandling of instruction pointer truncation during emulation (XSA-186) 57d15679-x86-emulate-Correct-boundary-interactions-of-emulated-insns.patch 57d18642-hvm-fep-Allow-test-insns-crossing-1-0-boundary.patch - bsc#995792 - VUL-0: CVE-2016-7094: xen: x86 HVM: Overflow of sh_ctxt->seg_reg[] (XSA-187) 57d1569a-x86-shadow-Avoid-overflowing-sh_ctxt-seg_reg.patch 57d18642-x86-segment-Bounds-check-accesses-to-emulation-ctxt-seg_reg.patch - bsc#991934 - xen hypervisor crash in csched_acct 57c96df3-credit1-fix-a-race-when-picking-initial-pCPU.patch - Upstream patches from Jan 57c4412b-x86-HVM-add-guarding-logic-for-VMX-specific-code.patch 57c57f73-libxc-correct-max_pfn-calculation-for-saving-domain.patch 57c805bf-x86-levelling-restrict-non-architectural-OSXSAVE-handling.patch 57c805c1-x86-levelling-pass-vcpu-to-ctxt_switch_levelling.patch 57c805c3-x86-levelling-provide-architectural-OSXSAVE-handling.patch 57c82be2-x86-32on64-adjust-call-gate-emulation.patch 57c96e2c-x86-correct-PT_NOTE-file-position.patch 57cfed43-VMX-correct-feature-checks-for-MPX-and-XSAVES.patch Charles Arnold 2016-09-12 18:08:38 +00:00
  • ea9d7028da - bsc#979002 - add 60-persistent-xvd.rules and helper script also to initrd, add the relevant dracut helper Olaf Hering 2016-09-12 13:29:42 +00:00
  • 20a8641d32 Accepting request 421370 from Virtualization Dominique Leuenberger 2016-08-26 21:14:40 +00:00
  • a9e5d7ffae - bsc#992224 - [HPS Bug] During boot of Xen Hypervisor, Failed to get contiguous memory for DMA from Xen 57ac6316-don-t-restrict-DMA-heap-to-node-0.patch - bsc#978755 - xen uefi systems fail to boot - bsc#983697 - SLES12 SP2 Xen UEFI mode cannot boot 57b71fc5-x86-EFI-don-t-apply-relocations-to-l-2-3-_bootmap.patch - Upstream patch from Jan 57b7447b-dont-permit-guest-to-populate-PoD-pages-for-itself.patch Charles Arnold 2016-08-23 16:38:35 +00:00
  • 9ef41ccbb5 Accepting request 417003 from Virtualization Dominique Leuenberger 2016-08-10 17:54:53 +00:00
  • a89d75605e - bsc#970135 - new virtualization project clock test randomly fails on Xen 576001df-x86-time-use-local-stamp-in-TSC-calibration-fast-path.patch 5769106e-x86-generate-assembler-equates-for-synthesized.patch 57a1e603-x86-time-adjust-local-system-time-initialization.patch 57a1e64c-x86-time-introduce-and-use-rdtsc_ordered.patch 57a2f6ac-x86-time-calibrate-TSC-against-platform-timer.patch - bsc#991934 - xen hypervisor crash in csched_acct 57973099-have-schedulers-revise-initial-placement.patch 579730e6-remove-buggy-initial-placement-algorithm.patch - bsc#988675 - VUL-0: CVE-2016-6258: xen: x86: Privilege escalation in PV guests (XSA-182) 57976073-x86-remove-unsafe-bits-from-mod_lN_entry-fastpath.patch - bsc#988676 - VUL-0: CVE-2016-6259: xen: x86: Missing SMAP whitelisting in 32-bit exception / event delivery (XSA-183) 57976078-x86-avoid-SMAP-violation-in-compat_create_bounce_frame.patch - Upstream patches from Jan 57a30261-x86-support-newer-Intel-CPU-models.patch Charles Arnold 2016-08-04 19:26:11 +00:00
  • c8a1704907 - bsc#978413 - PV guest upgrade from sles11sp4 to sles12sp2 alpha3 failed on sles11sp4 xen host. pygrub-handle-one-line-menu-entries.patch Charles Arnold 2016-07-29 21:59:43 +00:00
  • 4eb86128ec Accepting request 405743 from Virtualization Dominique Leuenberger 2016-07-01 07:55:45 +00:00
  • 5859155d6b - bsc#900418 - Dump cannot be performed on SLES12 XEN 57580bbd-kexec-allow-relaxed-placement-via-cmdline.patch - Upstream patches from Jan 575e9ca0-nested-vmx-Validate-host-VMX-MSRs-before-accessing-them.patch 57640448-xen-sched-use-default-scheduler-upon-an-invalid-sched.patch Charles Arnold 2016-06-23 17:52:49 +00:00
  • 82ff4f51e5 - bsc#954872 - script block-dmmd not working as expected - libxl: error: libxl_dm.c (Additional fixes) block-dmmd Charles Arnold 2016-06-21 14:56:06 +00:00
  • fe96474232 - fate#319989 - Update to Xen 4.7 FCS Charles Arnold 2016-06-21 14:46:28 +00:00
  • 5a38fd93da - fate#319989 - Update to Xen 4.7 RC6 xen-4.7.0-testing-src.tar.bz2 - Drop CVE-2014-3672-qemut-xsa180.patch via prjconf via prjconf - Update to the latest Xen 4.7 pre-release c2994f86 Charles Arnold 2016-06-16 17:54:29 +00:00
  • 3ed5aef207 Accepting request 400898 from Virtualization Dominique Leuenberger 2016-06-14 21:05:49 +00:00
  • bece3c5621 Add fate number to comment via prjconf (fate#320836) via prjconf (fate#320836) Charles Arnold 2016-06-13 16:20:25 +00:00
  • 14bcab8770 - Convert with_stubdom into build_conditional to allow adjusting via prjconf - Convert with_debug into build_conditional to allow adjusting via prjconf Olaf Hering 2016-06-13 15:52:20 +00:00
  • 28ce061413 - bsc#983984 - VUL-0: CVE-2016-5338: xen: qemu: scsi: esp: OOB r/w access while processing ESP_FIFO CVE-2016-5338-qemut-scsi-esp-OOB-rw-access-while-processing-ESP_FIFO.patch - bsc#982960 - VUL-0: CVE-2016-5238: xen: qemu: scsi: esp: OOB write when using non-DMA mode in get_cmd CVE-2016-5238-qemut-scsi-esp-OOB-write-when-using-non-DMA-mode-in-get_cmd.patch Charles Arnold 2016-06-09 22:06:26 +00:00
  • 6f47abb900 - fate#319989 - Update to Xen 4.7 RC4 xen-4.7.0-testing-src.tar.bz2 - Dropped xen.pkgconfig-4.7.patch xsa164.patch Charles Arnold 2016-05-26 19:33:01 +00:00
  • 1fed24fd43 - bsc#981264 - VUL-0: CVE-2014-3672: xen: Unrestricted qemu logging (XSA-180) CVE-2014-3672-qemut-xsa180.patch Charles Arnold 2016-05-24 14:34:11 +00:00
  • 10a6644014 - bsc#980724 - VUL-0: CVE-2016-4441: Qemu: scsi: esp: OOB write while writing to 's->cmdbuf' in get_cmd CVE-2016-4441-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-get_cmd.patch - bsc#980716 - VUL-0: CVE-2016-4439: xen: scsi: esp: OOB write while writing to 's->cmdbuf' in esp_reg_write CVE-2016-4439-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-esp_reg_write.patch Charles Arnold 2016-05-23 20:09:30 +00:00
  • 4f50b78353 - fate#319989 - Update to Xen 4.7 RC3 xen-4.7.0-testing-src.tar.bz2 - Dropped libxl-remove-cdrom-cachemode.patch x86-PoD-only-reclaim-if-needed.patch gcc6-warnings-as-errors.patch Charles Arnold 2016-05-17 16:48:17 +00:00
  • f0be2374a0 - fate#319989 - Update to Xen 4.7 RC2 xen-4.7.0-testing-src.tar.bz2 Charles Arnold 2016-05-10 22:03:52 +00:00
  • 66b4cba252 - fate#319989 - Update to Xen 4.7 RC1 Charles Arnold 2016-05-06 14:22:43 +00:00
  • 25d4901211 - Mark SONAMEs and pkgconfig as xen 4.7 xen.pkgconfig-4.7.patch Olaf Hering 2016-05-06 11:49:59 +00:00
  • b658abd60f - bsc#977329 - Xen: Cannot boot HVM guests with empty cdrom libxl-remove-cdrom-cachemode.patch Charles Arnold 2016-05-04 22:34:20 +00:00
  • eb83ba8f31 - Update to Xen 4.7 RC1 xen-4.7.0-testing-src.tar.bz2 Charles Arnold 2016-05-03 17:07:53 +00:00
  • ad4da5f656 - fate#316614: set migration constraints from cmdline restore libxl.set-migration-constraints-from-cmdline.patch Olaf Hering 2016-05-03 13:58:22 +00:00
  • 8581c7370b Require at least autoconf 2.67 Olaf Hering 2016-05-03 08:51:29 +00:00
  • e3bf008636 - fate#316613: update to v12 libxl.pvscsi.patch Olaf Hering 2016-05-03 07:45:05 +00:00
  • 6739a9c3f5 - Update to the latest Xen 4.7 pre-release c2994f86 (fate#319989) Charles Arnold 2016-04-29 22:59:30 +00:00
  • f07bdefddb Fix with_oxenstored flag to package things correctly Charles Arnold 2016-04-27 18:28:08 +00:00
  • 71a94eb539 - Update to the latest Xen 4.7 pre-release f3a7ca02 (fate#319989) Drop libxl.migrate-legacy-stream-read.patch Charles Arnold 2016-04-19 16:54:05 +00:00
  • b35f1092d6 - bnc#972756 - Can't migrate HVM guest from SLES12SP1 Xen host to SLES12SP2 Alpha 1 host using xl migrate libxl.migrate-legacy-stream-read.patch Olaf Hering 2016-04-15 09:37:54 +00:00
  • 4e1888481a xen-cpuid is dom0-only Olaf Hering 2016-04-14 12:34:00 +00:00
  • 7dfc774710 xen-cpuid is x86-only Olaf Hering 2016-04-14 10:41:52 +00:00
  • 92ed83b0e8 - Add patches from proposed upstream series to load BIOS's from the toolstack instead of embedding in hvmloader http://lists.xenproject.org/archives/html/xen-devel/2016-03/msg01626.html 0001-libxc-Rework-extra-module-initialisation.patch, 0002-libxc-Prepare-a-start-info-structure-for-hvmloader.patch, 0003-configure-define-SEABIOS_PATH-and-OVMF_PATH.patch, 0004-firmware-makefile-install-BIOS-blob.patch, 0005-libxl-Load-guest-BIOS-from-file.patch, 0006-xen-Move-the-hvm_start_info-C-representation-from-li.patch, 0007-hvmloader-Grab-the-hvm_start_info-pointer.patch, 0008-hvmloader-Locate-the-BIOS-blob.patch, 0009-hvmloader-Check-modules-whereabouts-in-perform_tests.patch, 0010-hvmloader-Load-SeaBIOS-from-hvm_start_info-modules.patch, 0011-hvmloader-Load-OVMF-from-modules.patch, 0012-hvmloader-Specific-bios_load-function-required.patch, 0013-hvmloader-Always-build-in-SeaBIOS-and-OVMF-loader.patch, 0014-configure-do-not-depend-on-SEABIOS_PATH-or-OVMF_PATH.patch - Enable support for UEFI on x86_64 using the ovmf-x86_64-ms.bin firmware from qemu-ovmf-x86_64. The firmware is preloaded with Microsoft keys to more closely resemble firmware on real hardware FATE#320490 Charles Arnold 2016-04-13 19:43:10 +00:00
  • 429a42ebfe - fate#319989: Update to Xen 4.7 (pre-release) Charles Arnold 2016-03-28 22:57:09 +00:00
  • f18f683ba6 - Update to Xen 4.7 pre-release xen-4.7.0-testing-src.tar.bz2 - Dropped: xen-4.6.1-testing-src.tar.bz2 55f7f9d2-libxl-slightly-refine-pci-assignable-add-remove-handling.patch 5628fc67-libxl-No-emulated-disk-driver-for-xvdX-disk.patch 5644b756-x86-HVM-don-t-inject-DB-with-error-code.patch 5649bcbe-libxl-relax-readonly-check-introduced-by-XSA-142-fix.patch hotplug-Linux-block-performance-fix.patch set-mtu-from-bridge-for-tap-interface.patch xendomains-libvirtd-conflict.patch xsa154.patch xsa155-xen-0001-xen-Add-RING_COPY_REQUEST.patch xsa155-xen-0002-blktap2-Use-RING_COPY_REQUEST.patch xsa155-xen-0003-libvchan-Read-prod-cons-only-once.patch xsa170.patch Charles Arnold 2016-03-25 22:10:02 +00:00
  • 321d8bf36d - Use system SeaBIOS instead of building/installing another one FATE#320638 Dropped files: seabios-dir-remote.tar.bz2 xen-c99-fix.patch xen.build-compare.seabios.patch Charles Arnold 2016-03-23 20:51:29 +00:00
  • 8a7690aef7 Accepting request 366222 from Virtualization Dominique Leuenberger 2016-03-07 12:22:56 +00:00
  • a954e08dfb - bsc#969377 - xen does not build with GCC 6 ipxe-use-rpm-opt-flags.patch gcc6-warnings-as-errors.patch Charles Arnold 2016-03-04 23:20:29 +00:00
  • e1fd44e3dc CVE-2016-1981-qemuu-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch CVE-2016-2538-qemuu-usb-integer-overflow-in-remote-NDIS-message-handling.patch CVE-2015-8619-qemuu-stack-based-OOB-write-in-hmp_sendkey-routine.patch xsa162-qemuu.patch Charles Arnold 2016-03-03 23:46:38 +00:00
  • 34e227c51f - Drop xsa154-fix.patch Charles Arnold 2016-03-03 23:37:42 +00:00
  • b87fe0a367 - bsc#969351 - VUL-0: CVE-2016-2841: xen: net: ne2000: infinite loop in ne2000_receive CVE-2016-2841-qemut-ne2000-infinite-loop-in-ne2000_receive.patch Charles Arnold 2016-03-03 22:36:20 +00:00
  • 6636a216d1 - bsc#969125 - VUL-0: CVE-2015-8817: xen: OOB access in address_space_rw leads to segmentation fault (I) CVE-2015-8817-qemuu-OOB-access-in-address_space_rw-leads-to-segmentation-fault.patch - bsc#969126 - VUL-0: CVE-2015-8818: xen: OOB access in address_space_rw leads to segmentation fault (II) CVE-2015-8818-qemuu-OOB-access-in-address_space_rw-leads-to-segmentation-fault.patch Charles Arnold 2016-03-02 22:05:55 +00:00
  • a6308422ce qemu_new_timer should be using vm_clock, not QEMU_CLOCK_VIRTUAL in the old qemu Charles Arnold 2016-03-02 17:40:10 +00:00
  • 2e153fae6c Accepting request 362063 from Virtualization Dominique Leuenberger 2016-03-02 13:20:57 +00:00
  • 95d1280885 - bsc#962321 - VUL-0: CVE-2016-1922: xen: i386: null pointer dereference in vapic_write() CVE-2016-1922-qemuu-i386-null-pointer-dereference-in-vapic_write.patch CVE-2016-2391-qemut-usb-null-pointer-dereference-in-ohci-module.patch - bsc#965112 - VUL-0: CVE-2014-3640: xen: slirp: NULL pointer deref in sosendto() CVE-2014-3640-qemut-slirp-NULL-pointer-deref-in-sosendto.patch Charles Arnold 2016-03-01 21:45:58 +00:00
  • 5ef52f56fd - bsc#968004 - VUL-0: CVE-2016-2538: xen: usb: integer overflow in remote NDIS control message handling CVE-2016-2538-qemuu-usb-integer-overflow-in-remote-NDIS-message-handling.patch - Update libxl to recognize dmmd and npiv prefix in disk spec xen.libxl.dmmd.patch Charles Arnold 2016-02-26 20:09:00 +00:00
  • 0123f6c927 Accepting request 360572 from Virtualization Dominique Leuenberger 2016-02-25 20:55:47 +00:00
  • 4f6abaa92b - bsc#954872 - L3: script block-dmmd not working as expected - libxl: error: libxl_dm.c block-dmmd Charles Arnold 2016-02-22 20:37:58 +00:00
  • 077467ba5e Remove redundant entry Charles Arnold 2016-02-12 20:43:48 +00:00
  • 31905d81fa - Update to Xen Version 4.6.1 xen-4.6.1-testing-src.tar.bz2 - Dropped patches now contained in tarball or unnecessary xen-4.6.0-testing-src.tar.bz2 5604f239-x86-PV-properly-populate-descriptor-tables.patch 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-it-is-zero.patch 561d2046-VT-d-use-proper-error-codes-in-iommu_enable_x2apic_IR.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-parsing-and-consumption.patch 5632118e-arm-Support-hypercall_create_continuation-for-multicall.patch 56321222-arm-rate-limit-logging-from-unimplemented-PHYSDEVOP-and-HVMOP.patch 56321249-arm-handle-races-between-relinquish_memory-and-free_domheap_pages.patch 5632127b-x86-guard-against-undue-super-page-PTE-creation.patch 5632129c-free-domain-s-vcpu-array.patch 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch 563212e4-xenoprof-free-domain-s-vcpu-array.patch 563212ff-x86-rate-limit-logging-in-do_xen-oprof-pmu-_op.patch 56323737-libxl-adjust-PoD-target-by-memory-fudge-too.patch 56377442-x86-PoD-Make-p2m_pod_empty_cache-restartable.patch 5641ceec-x86-HVM-always-intercept-AC-and-DB.patch 56549f24-x86-vPMU-document-as-unsupported.patch 5677f350-x86-make-debug-output-consistent-in-hvm_set_callback_via.patch xen-4.6.0-testing-src.tar.bz2 xsa155-qemut-qdisk-double-access.patch xsa155-qemut-xenfb.patch xsa155-qemuu-qdisk-double-access.patch xsa155-qemuu-xenfb.patch xsa159.patch xsa160.patch xsa162-qemut.patch Charles Arnold 2016-02-12 16:58:27 +00:00
  • 7cfddca5f7 Accepting request 357628 from Virtualization Dominique Leuenberger 2016-02-07 08:22:39 +00:00
  • 9b39a3d650 - bsc#964947 - VUL-0: CVE-2015-5278: xen: Infinite loop in ne2000_receive() function CVE-2015-5278-qemut-Infinite-loop-in-ne2000_receive-function.patch - bsc#956832 - VUL-0: CVE-2015-8345: xen: qemu: net: eepro100: infinite loop in processing command block list CVE-2015-8345-qemuu-eepro100-infinite-loop-fix.patch CVE-2015-8345-qemut-eepro100-infinite-loop-fix.patch Charles Arnold 2016-02-03 21:39:15 +00:00
  • fbfd58d3a2 - bsc#963783 - VUL-1: CVE-2016-1981: xen: net: e1000 infinite loop in start_xmit and e1000_receive_iov routines CVE-2016-1981-qemuu-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch CVE-2016-1981-qemut-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch Charles Arnold 2016-01-27 20:31:39 +00:00
  • 39134eb9d2 - bsc#962758 - VUL-0: CVE-2013-4539: xen: tsc210x: buffer overrun on invalid state load CVE-2013-4539-qemut-tsc210x-fix-buffer-overrun-on-invalid-state-load.patch Charles Arnold 2016-01-20 16:26:32 +00:00
  • 8c964aac93 Accepting request 351972 from Virtualization Dominique Leuenberger 2016-01-08 14:21:56 +00:00
  • 8292994238 - bsc#960093 - VUL-0: CVE-2015-8615: xen: x86: unintentional logging upon guest changing callback method (XSA-169) 5677f350-x86-make-debug-output-consistent-in-hvm_set_callback_via.patch Charles Arnold 2016-01-04 22:25:00 +00:00
  • c45b4428d2 Accepting request 351046 from Virtualization Dominique Leuenberger 2016-01-01 18:46:52 +00:00
  • 881e6522ea - Adjust xen-dom0-modules.service to run Before xenstored.service instead of proc-xen.mount to workaround a bug in systemd "design" (bnc#959845) Olaf Hering 2015-12-21 09:15:12 +00:00
  • 32bf53107e Accepting request 346076 from Virtualization Dominique Leuenberger 2015-12-18 20:53:23 +00:00
  • c608e23838 - fate#315712: XEN: Use the PVOPS kernel Turn off building the KMPs now that we are using the pvops kernel xen.spec Charles Arnold 2015-11-24 15:48:21 +00:00
  • b086a62192 Don't try to package xenalyze for 32bit build Charles Arnold 2015-11-11 20:28:12 +00:00
  • 047483513a - Update to Xen Version 4.6.0 xen-4.6.0-testing-src.tar.bz2 mini-os.tar.bz2 blktap2-no-uninit.patch stubdom-have-iovec.patch - Renamed xsa149.patch to CVE-2015-7969-xsa149.patch - Dropped patches now contained in tarball or unnecessary xen-4.5.2-testing-src.tar.bz2 54c2553c-grant-table-use-uint16_t-consistently-for-offset-and-length.patch 54ca33bc-grant-table-refactor-grant-copy-to-reduce-duplicate-code.patch 54ca340e-grant-table-defer-releasing-pages-acquired-in-a-grant-copy.patch 54f4985f-libxl-fix-libvirtd-double-free.patch 55103616-vm-assist-prepare-for-discontiguous-used-bit-numbers.patch 551ac326-xentop-add-support-for-qdisk.patch 552d0fd2-x86-hvm-don-t-include-asm-spinlock-h.patch 552d0fe8-x86-mtrr-include-asm-atomic.h.patch 552d293b-x86-vMSI-X-honor-all-mask-requests.patch 552d2966-x86-vMSI-X-add-valid-bits-for-read-acceleration.patch 5537a4d8-libxl-use-DEBUG-log-level-instead-of-INFO.patch 5548e903-domctl-don-t-truncate-XEN_DOMCTL_max_mem-requests.patch 5548e95d-x86-allow-to-suppress-M2P-user-mode-exposure.patch 554c7aee-x86-provide-arch_fetch_and_add.patch 554c7b00-arm-provide-arch_fetch_and_add.patch 554cc211-libxl-add-qxl.patch 55534b0a-x86-provide-add_sized.patch 55534b25-arm-provide-add_sized.patch 5555a4f8-use-ticket-locks-for-spin-locks.patch 5555a5b9-x86-arm-remove-asm-spinlock-h.patch 5555a8ec-introduce-non-contiguous-allocation.patch 556d973f-unmodified-drivers-tolerate-IRQF_DISABLED-being-undefined.patch Charles Arnold 2015-11-11 17:04:52 +00:00
  • 95031aabfd - bsc#954405 - VUL-0: CVE-2015-8104: Xen: guest to host DoS by triggering an infinite loop in microcode via #DB exception Charles Arnold 2015-11-10 22:14:51 +00:00
  • 31b1f3b60a - bsc#954018 - VUL-0: CVE-2015-5307: xen: x86: CPU lockup during fault delivery (XSA-156) CVE-2015-5307-xsa156.patch Charles Arnold 2015-11-10 21:44:14 +00:00
  • f158f55e6a - Update to Xen 4.5.2 xen-4.5.2-testing-src.tar.bz2 - Drop the following xen-4.5.1-testing-src.tar.bz2 552d0f49-x86-traps-identify-the-vcpu-in-context-when-dumping-regs.patch 5576f178-kexec-add-more-pages-to-v1-environment.patch 55780be1-x86-EFI-adjust-EFI_MEMORY_WP-handling-for-spec-version-2.5.patch 558bfaa0-x86-traps-avoid-using-current-too-early.patch 5592a116-nested-EPT-fix-the-handling-of-nested-EPT.patch 559b9dd6-x86-p2m-ept-don-t-unmap-in-use-EPT-pagetable.patch 559bc633-x86-cpupool-clear-proper-cpu_valid-bit-on-CPU-teardown.patch 559bc64e-credit1-properly-deal-with-CPUs-not-in-any-pool.patch 559bc87f-x86-hvmloader-avoid-data-corruption-with-xenstore-rw.patch 559bdde5-pull-in-latest-linux-earlycpio.patch 55a62eb0-xl-correct-handling-of-extra_config-in-main_cpupoolcreate.patch 55a66a1e-make-rangeset_report_ranges-report-all-ranges.patch 55a77e4f-dmar-device-scope-mem-leak-fix.patch 55c1d83d-x86-gdt-Drop-write-only-xalloc-d-array.patch 55c3232b-x86-mm-Make-hap-shadow-teardown-preemptible.patch 55dc78e9-x86-amd_ucode-skip-updates-for-final-levels.patch 55df2f76-IOMMU-skip-domains-without-page-tables-when-dumping.patch 55e43fd8-x86-NUMA-fix-setup_node.patch 55e43ff8-x86-NUMA-don-t-account-hotplug-regions.patch 55e593f1-x86-NUMA-make-init_node_heap-respect-Xen-heap-limit.patch 55f2e438-x86-hvm-fix-saved-pmtimer-and-hpet-values.patch 55f9345b-x86-MSI-fail-if-no-hardware-support.patch 5604f2e6-vt-d-fix-IM-bit-mask-and-unmask-of-FECTL_REG.patch 560a4af9-x86-EPT-tighten-conditions-of-IOMMU-mapping-updates.patch 560a7c36-x86-p2m-pt-delay-freeing-of-intermediate-page-tables.patch 560a7c53-x86-p2m-pt-ignore-pt-share-flag-for-shadow-mode-guests.patch Charles Arnold 2015-11-04 20:30:31 +00:00
  • 07093f71ba Accepting request 341719 from Virtualization Dominique Leuenberger 2015-11-02 11:54:41 +00:00
  • 9e9b5acb9c - Upstream patches from Jan 5604f239-x86-PV-properly-populate-descriptor-tables.patch 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-0.patch 561d2046-VT-d-use-proper-error-codes-in-iommu_enable_x2apic_IR.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-handling.patch Charles Arnold 2015-10-29 22:28:05 +00:00
  • 665337e320 Accepting request 336854 from Virtualization Dominique Leuenberger 2015-10-14 14:43:18 +00:00
  • 0883ce22a7 - bsc#949138 - Setting vcpu affinity under Xen causes libvirtd abort 54f4985f-libxl-fix-libvirtd-double-free.patch Charles Arnold 2015-10-06 21:17:42 +00:00
  • 47432a5a67 - Update README.SUSE detailing dom0 ballooning recommendations Charles Arnold 2015-10-06 18:53:58 +00:00
  • 19d8f590f0 - bsc#949046 - Increase %suse_version in SP1 to 1316 xen.spec Charles Arnold 2015-10-06 15:11:48 +00:00
  • 5e4d27a750 Accepting request 331845 from Virtualization Stephan Kulow 2015-09-24 05:16:58 +00:00
  • e932e0a863 - bsc#945165 - Xl pci-attach show error with kernel of SLES 12 sp1 pci-attach-fix.patch Charles Arnold 2015-09-17 17:45:05 +00:00
  • 4a5ee0f11d - bsc#945164 - Xl destroy show error with kernel of SLES 12 sp1 5537a4d8-libxl-use-DEBUG-log-level-instead-of-INFO.patch Charles Arnold 2015-09-16 16:29:39 +00:00
  • 3e3107a7e2 Accepting request 327613 from Virtualization Dominique Leuenberger 2015-08-31 20:57:42 +00:00
  • 8724a18868 - bnc#935634 - VUL-0: CVE-2015-3259: xen: XSA-137: xl command line config handling stack overflow 55a62eb0-xl-correct-handling-of-extra_config-in-main_cpupoolcreate.patch Charles Arnold 2015-08-26 22:28:15 +00:00
  • 8a538a5164 Accepting request 324179 from Virtualization Dominique Leuenberger 2015-08-21 06:24:24 +00:00
  • b5fb5e90fb - bsc#939712 - VUL-0: XSA-140: QEMU leak of uninitialized heap memory in rtl8139 device model xsa140-qemuu-1.patch xsa140-qemuu-2.patch xsa140-qemuu-3.patch xsa140-qemuu-4.patch xsa140-qemuu-5.patch xsa140-qemuu-6.patch xsa140-qemuu-7.patch xsa140-qemut-1.patch xsa140-qemut-2.patch xsa140-qemut-3.patch xsa140-qemut-4.patch xsa140-qemut-5.patch xsa140-qemut-6.patch xsa140-qemut-7.patch - bsc#939709 - VUL-0: XSA-139: xen: Use after free in QEMU/Xen block unplug protocol xsa139-qemuu.patch Charles Arnold 2015-08-11 22:49:00 +00:00
  • 04bf80ef61 Accepting request 315889 from Virtualization Stephan Kulow 2015-07-16 15:15:52 +00:00
  • 763b78040d - bnc#935634 - VUL-0: CVE-2015-3259: xen: XSA-137: xl command line config handling stack overflow CVE-2015-3259-xsa137.patch - Upstream patches from Jan 558bfaa0-x86-traps-avoid-using-current-too-early.patch 5592a116-nested-EPT-fix-the-handling-of-nested-EPT.patch 559b9dd6-x86-p2m-ept-don-t-unmap-in-use-EPT-pagetable.patch 559bdde5-pull-in-latest-linux-earlycpio.patch - Upstream patches from Jan pending review 552d0fd2-x86-hvm-don-t-include-asm-spinlock-h.patch 552d0fe8-x86-mtrr-include-asm-atomic.h.patch 552d293b-x86-vMSI-X-honor-all-mask-requests.patch 552d2966-x86-vMSI-X-add-valid-bits-for-read-acceleration.patch 554c7aee-x86-provide-arch_fetch_and_add.patch 554c7b00-arm-provide-arch_fetch_and_add.patch 55534b0a-x86-provide-add_sized.patch 55534b25-arm-provide-add_sized.patch 5555a4f8-use-ticket-locks-for-spin-locks.patch 5555a5b9-x86-arm-remove-asm-spinlock-h.patch 5555a8ec-introduce-non-contiguous-allocation.patch 55795a52-x86-vMSI-X-support-qword-MMIO-access.patch 557eb55f-gnttab-per-active-entry-locking.patch 557eb5b6-gnttab-introduce-maptrack-lock.patch 557eb620-gnttab-make-the-grant-table-lock-a-read-write-lock.patch 557ffab8-evtchn-factor-out-freeing-an-event-channel.patch 5582bf43-evtchn-simplify-port_is_valid.patch 5582bf81-evtchn-remove-the-locking-when-unmasking-an-event-channel.patch 5583d9c5-x86-MSI-X-cleanup.patch 5583da09-x86-MSI-track-host-and-guest-masking-separately.patch 5583da64-gnttab-use-per-VCPU-maptrack-free-lists.patch Charles Arnold 2015-07-10 15:21:29 +00:00
  • 8126f47de2 Accepting request 314536 from Virtualization Stephan Kulow 2015-07-05 15:50:48 +00:00
  • d9b8b1278d Add dropped patches to changelog 5513b458-allow-reboot-overrides-when-running-under-EFI.patch 5513b4d1-dont-apply-reboot-quirks-if-reboot-set-by-user.patch 5576f178-kexec-add-more-pages-to-v1-environment.patch 5535f633-dont-leak-hypervisor-stack-to-toolstacks.patch CVE-2015-3456-xsa133-qemuu.patch CVE-2015-3456-xsa133-qemut.patch Charles Arnold 2015-06-30 15:10:33 +00:00
  • 7d5bf1323b stable) 556d973f-unmodified-drivers-tolerate-IRQF_DISABLED-being-undefined.patch Charles Arnold 2015-06-30 14:29:21 +00:00
  • ed69c775a4 - bnc#936516 - xen fails to build with kernel update(4.1.0 from stable) - Fixed with update to Xen 4.5.1 Charles Arnold 2015-06-30 14:25:04 +00:00
  • 97a0425e04 - Update to Xen Version 4.5.1 FCS (fate#315675) xen-4.5.1-testing-src.tar.bz2 - Dropped patches now contained in tarball 556c2cf2-x86-don-t-crash-mapping-a-page-using-EFI-rt-page-tables.patch 556d9718-efi-fix-allocation-problems-if-ExitBootServices-fails.patch 556eabf7-x86-apic-Disable-the-LAPIC-later-in-smp_send_stop.patch 556eac15-x86-crash-don-t-use-set_fixmap-in-the-crash-path.patch 55780aaa-efi-avoid-calling-boot-services-after-ExitBootServices.patch 55780aff-x86-EFI-fix-EFI_MEMORY_WP-handling.patch 55780b43-EFI-early-add-mapbs-to-map-EfiBootServices-Code-Data.patch 55780b97-EFI-support-default-attributes-to-map-Runtime-service-areas.patch Charles Arnold 2015-06-30 14:23:29 +00:00
  • 1da2128aba Accepting request 307039 from Virtualization Stephan Kulow 2015-05-16 05:12:45 +00:00
  • 2668ab806b - bsc#927967 - VUL-0: CVE-2015-3340: xen: Information leak through XEN_DOMCTL_gettscinfo (XSA-132) 5535f633-dont-leak-hypervisor-stack-to-toolstacks.patch Charles Arnold 2015-05-13 15:28:16 +00:00
  • 54a99563cd Accepting request 305344 from Virtualization Dominique Leuenberger 2015-05-06 09:17:21 +00:00
  • a8d0abb1da - bsc#928783 - Reboot failure; Request backport of upstream Xen patch to 4.5.0, or update pkgs to 4.5.1 5513b458-allow-reboot-overrides-when-running-under-EFI.patch 5513b4d1-dont-apply-reboot-quirks-if-reboot-set-by-user.patch Charles Arnold 2015-04-27 16:20:15 +00:00
  • 35e73086a7 - bnc#927750 - Avoid errors reported by system-modules-load.service Olaf Hering 2015-04-21 12:25:48 +00:00
  • d821012b31 Accepting request 294977 from Virtualization Dominique Leuenberger 2015-04-11 22:08:41 +00:00
  • b6d9f3c173 Accepting request 294943 from home:rguenther:branches:Virtualization Charles Arnold 2015-04-08 14:03:12 +00:00