xen-libs-32bit-4.9.4_04-40.1<>,\/=„33fV3hBk3{3#+X}As/4"g[:)4X"dc #D}2r٪^3@6ڌ%xqA77 !{qڍBʻnp{_{q6hp>M@U/ΔP/6/g$']0Ci'GM ԩ=X)#$W2]+:8(?8d  =  %3cip/</ / / / /  ,/ / /  / :::(,84l9"l:^cl>iGt/H0/I/XY\/]/^"l b#c#d$Je$Of$Tl$Vu$h/v%$w2P/x3 /y3Cxen-libs-32bit4.9.4_0440.1Xen Virtualization: LibrariesXen is a virtual machine monitor for x86 that supports execution of multiple guest operating systems with unprecedented levels of performance and resource isolation. This package contains the libraries used to interact with the Xen virtual machine monitor. In addition to this package you need to install kernel-xen, xen and xen-tools to use Xen. Authors: -------- Ian Pratt \build78[openSUSE Leap 42.3openSUSEGPL-2.0http://bugs.opensuse.orgSystem/Kernelhttp://www.cl.cam.ac.uk/Research/SRG/netos/xen/linuxx86_64/sbin/ldconfig%%%5%5g v6TP%@5%%5  Pvf&06'hAAAAAAAA\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\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.so.1.0.0libfsimage.so.1.0.0libvhd.so.1.0.0libxencall.so.1.0libxenctrl.so.4.9.0libxendevicemodel.so.1.0libxenevtchn.so.1.0libxenforeignmemory.so.1.1libxengnttab.so.1.1libxenguest.so.4.9.0libxenlight.so.4.9.0libxenstat.so.0.0libxenstore.so.3.0.3libxentoollog.so.1.0libxenvchan.so.4.9.0libxlutil.so.4.9.0rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootxen-4.9.4_04-40.1.src.rpmfsimage.solibblktapctl.so.1.0libfsimage.so.1.0libfsimage.so.1.0(libfsimage.so.1.0)libvhd.so.1.0libxencall.so.1libxencall.so.1(VERS_1.0)libxenctrl.so.4.9libxendevicemodel.so.1libxendevicemodel.so.1(VERS_1.0)libxenevtchn.so.1libxenevtchn.so.1(VERS_1.0)libxenforeignmemory.so.1libxenforeignmemory.so.1(VERS_1.0)libxenforeignmemory.so.1(VERS_1.1)libxengnttab.so.1libxengnttab.so.1(VERS_1.0)libxengnttab.so.1(VERS_1.1)libxenguest.so.4.9libxenlight.so.4.9libxenstat.so.0libxenstore.so.3.0libxentoollog.so.1libxentoollog.so.1(VERS_1.0)libxenvchan.so.4.9libxlutil.so.4.9xen-libs-32bitxen-libs-32bit(x86-32)@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@   /bin/shlibblktapctl.so.1.0libbz2.so.1libc.so.6libc.so.6(GLIBC_2.0)libc.so.6(GLIBC_2.1)libc.so.6(GLIBC_2.1.2)libc.so.6(GLIBC_2.1.3)libc.so.6(GLIBC_2.15)libc.so.6(GLIBC_2.17)libc.so.6(GLIBC_2.2)libc.so.6(GLIBC_2.2.3)libc.so.6(GLIBC_2.3)libc.so.6(GLIBC_2.3.2)libc.so.6(GLIBC_2.3.3)libc.so.6(GLIBC_2.3.4)libc.so.6(GLIBC_2.4)libc.so.6(GLIBC_2.7)libc.so.6(GLIBC_2.8)libfsimage.so.1.0libfsimage.so.1.0(libfsimage.so.1.0)liblzma.so.5liblzma.so.5(XZ_5.0)libnl-3.so.200libnl-3.so.200(libnl_3)libnl-route-3.so.200libnl-route-3.so.200(libnl_3)libpthread.so.0libpthread.so.0(GLIBC_2.0)libpthread.so.0(GLIBC_2.1)libpthread.so.0(GLIBC_2.2)libpthread.so.0(GLIBC_2.3.2)libpthread.so.0(GLIBC_2.3.3)libutil.so.1libutil.so.1(GLIBC_2.0)libuuid.so.1libuuid.so.1(UUID_1.0)libxencall.so.1libxencall.so.1(VERS_1.0)libxenctrl.so.4.9libxendevicemodel.so.1libxendevicemodel.so.1(VERS_1.0)libxenevtchn.so.1libxenevtchn.so.1(VERS_1.0)libxenforeignmemory.so.1libxenforeignmemory.so.1(VERS_1.0)libxengnttab.so.1libxengnttab.so.1(VERS_1.0)libxenguest.so.4.9libxenlight.so.4.9libxenstore.so.3.0libxentoollog.so.1libxentoollog.so.1(VERS_1.0)libyajl.so.2libz.so.1rpmlib(CompressedFileNames)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsLzma)3.0.4-14.0-14.4.6-14.11.2\-@\\e\+@\\Y@\\~d\w@\u*@\n\mA@\f\Q\P@@\5@\@[[[@[;@[[t[Q@[@[9@[qr[i[[ @[:['[!@[Z@Z@ZZZmZZԐ@ZlZZZ2@Z@ZZ}@Z}@Zp^@Zk@Z]@Z]@ZV@Z7Z1@Z/ZOZ@ZZ ,@YY@Y@Y{Y*@Y5YA@Y4YYYYYbY@YJYYV@Y@YYw2YlYh@Yh@Yh@YTYS@YJ_YI@Y5GY0Y-^Y(Y"YY;@YYY@YtY.X@XQ@X@XۡXg@X@X@X@X @X@X@X@X@XXX@XXXwoXs{@XlXWXRXQ4@XEVX43@X.@X*X lX&X@XX@W@W֘W֘W^@WiW:Wt@W.@W9WW@Wk@Wi,@WbWZWZWZWYZ@WV@WEWBW=W;W3W1@W1@W,@W(W(W(W(W(W#LWVbV(@V3VJVxV'@VV2V͛@VŲ@V`VwVVV=@VV@VHV@VvV%@VV<@V@VS@VV@V^VwVqR@Vn@VXEVUVTQ@VMVMVMVA@V;DV9@V7P@V0V*!@V V@VCVVVf@VqV@UYU@U@UUݪ@U@UnU4@UUK@UU@UU>U@Ux&Un@U\w@U[%UUUPUKSU>$U6;U%@UU@UUU.@TgT-@TT@TZ@TZ@T@TT@T5T@TLTLT~@Tl@Ti@Ta@THT?@T=@T9T5'@T.T*@T*@T)IT @TwTT=@TT@T@T_Tk@S@SSj@Sہ@S@S׌S@S˯@S@S.SSSS\Sh@SS@S[S~@S~@S~@S~@S{CSuSpSl@ShS[SXSI*SE6@S=M@S=M@S=M@S;S:@S5d@S4S)S L@SS@Sc@S SRRRR@R@R@RR3@R3@RR@R>R>RJ@R@R@RlR@RRx@R&RΏ@RTR@R@RG@RG@RRRRRRw@RrF@RfhRe@RL RJ@RIgRB@RB@R-@R%@R @R @R @R @RC@RZ@R@R@R Q@QY@QQQ@Qֵ@Q)@Q@QQQ@Q(@QQ?@QxQ'@QQQ@Q@QIQU@Q@Q~`Q~`Qw@Qq1Qo@QkQkQ]k@QZ@QQQAQAQ=@Q=@Q=@Q9Q8@Q5@Q4Q/FQ$Q#i@Q#i@Q"Q@Q@QEQ@Q @Q @QsQ"@P@PP@PDP@P @P @P @P @PPPP@P@P|@P6@P@PP@PoP)P@P5@P5@P@P@P}L@P{PyWPtPr@Pr@PnPnPnPnPnPiPaP`K@PYPXb@PWPIPG>P?UP.patch) 5b3488a2-libxl-restore-passing-ro-to-qemu-for-SCSI-disks.patch (Replaces xsa266-2-<>.patch) 5b348954-x86-guard-against-NM.patch x86-XPTI-no-idle-dom.patch- bsc#1097521 - VUL-0: CVE-2018-12891: xen: preemption checks bypassed in x86 PV MM handling (XSA-264) xsa264.patch - bsc#1097522 - VUL-0: CVE-2018-12893: xen: x86: #DB exception safety check can be triggered by a guest (XSA-265) xsa265.patch - bsc#1097523 - VUL-0: CVE-2018-12892: xen: libxl fails to honour readonly flag on HVM emulated SCSI disks (XSA-266) xsa266-1-libxl-qemu_disk_scsi_drive_string-Break-out-common-p.patch xsa266-2-libxl-restore-passing-readonly-to-qemu-for-SCSI-disk.patch- bsc#1095242 - VUL-0: CVE-2018-3665: xen: Lazy FP Save/Restore (XSA-267) xsa267-1.patch xsa267-2.patch- bsc#1096224 - VUL-0: CVE-2018-11806: xen: slirp: heap buffer overflow while reassembling fragmented datagrams CVE-2018-11806-qemut-slirp-correct-size-computation-while-concatenating-mbuf.patch- bsc#1092631 - VUL-0: CVE-2018-3639: xen: V4 – Speculative Store Bypass aka "Memory Disambiguation" 5ad4923e-x86-correct-S3-resume-ordering.patch 5ad49293-x86-suppress-BTI-mitigations-around-S3.patch 5afc13ae-1-x86-read-MSR_ARCH_CAPABILITIES-once.patch 5afc13ae-2-x86-express-Xen-SPEC_CTRL-choice-as-variable.patch 5afc13ae-3-x86-merge-bti_ist_info-use_shadow_spec_ctrl.patch 5afc13ae-4-x86-fold-XEN_IBRS-ALTERNATIVES.patch 5afc13ae-5-x86-rename-bits-of-spec_ctrl-infrastructure.patch 5afc13ae-6-x86-elide-MSR_SPEC_CTRL-handling-in-idle.patch 5afc13ae-7-x86-split-X86_FEATURE_SC_MSR.patch 5afc13ae-8-x86-explicitly-set-Xen-default-SPEC_CTRL.patch 5afc13ae-9-x86-cpuid-improve-guest-policies-for-speculative.patch 5afc13ae-A-x86-introduce-spec-ctrl-cmdline-opt.patch Spectre-v4-1.patch Spectre-v4-2.patch Spectre-v4-3.patch- bsc#1087289 - L3: Xen BUG at sched_credit.c:1663 5aeaeae4-introduce-vcpu_sleep_nosync_locked.patch 5aeaeaf0-sched-fix-races-in-vcpu-migration.patch - Upstream patches from Jan (bsc#1027519) 5af1daa9-1-x86-traps-fix-dr6-handing-in-DB-handler.patch (Replaces xsa260-1.patch) 5af1daa9-2-x86-pv-move-exception-injection-into-test_all_events.patch (Replaces xsa260-2.patch) 5af1daa9-3-x86-traps-use-IST-for-DB.patch (Replaces xsa260-3.patch) 5af1daa9-4-x86-traps-fix-handling-of-DB-in-hypervisor-context.patch (Replaces xsa260-4.patch) 5af1daa9-x86-HVM-guard-against-bogus-emulator-ioreq-state.patch (Replaces xsa262.patch) 5af1daa9-x86-vpt-support-IO-APIC-routed-intr.patch (Replaces xsa261.patch) 5af97999-viridian-cpuid-leaf-40000003.patch- Fixes related to Page Table Isolation (XPTI). bsc#1074562 XSA-254 5a6703cb-x86-move-invocations-of-hvm_flush_guest_tlbs.patch 5a9985bd-x86-invpcid-support.patch 5aec7393-1-x86-xpti-avoid-copy.patch 5aec7393-2-x86-xpti-write-cr3.patch 5aec744a-3-x86-xpti-per-domain-flag.patch 5aec744a-4-x86-xpti-use-invpcid.patch 5aec744a-5-x86-xpti-no-global-pages.patch 5aec744a-6-x86-xpti-cr3-valid-flag.patch 5aec744a-7-x86-xpti-pv_guest_cr4_to_real_cr4.patch 5aec744b-8-x86-xpti-cr3-helpers.patch 5aec74a8-9-x86-xpti-use-pcid.patch- Upstream patches from Jan (bsc#1027519) 5ad600d4-x86-pv-introduce-x86emul_read_dr.patch 5ad600d4-x86-pv-introduce-x86emul_write_dr.patch 5ad8c3a7-x86-spec_ctrl-update-retpoline-decision-making.patch 5adda097-x86-HPET-fix-race-triggering-ASSERT.patch 5adda0d5-x86-HVM-never-retain-emulated-insn-cache.patch 5adde9ed-xpti-fix-double-fault-handling.patch 5ae06fad-SVM-fix-intercepts-for-SYS-CALL-ENTER-MSRs.patch 5ae076d7-libxl-specify-format-of-inserted-cdrom.patch (Replaces xsa258.patch) 5ae0770d-x86-fix-slow-int80-path-after-XPTI.patch (Replaces xsa259.patch) 5ae31917-x86-cpuidle-init-stats-lock-once.patch- bsc#1090820 - VUL-0: CVE-2018-8897: xen: x86: mishandling of debug exceptions (XSA-260) xsa260-1.patch xsa260-2.patch xsa260-3.patch xsa260-4.patch - bsc#1090822 - VUL-0: CVE-2018-10982: xen: x86 vHPET interrupt injection errors (XSA-261) xsa261.patch - bsc#1090823 - VUL-0: CVE-2018-10981: xen: qemu may drive Xen into unbounded loop (XSA-262) xsa262.patch- Upstream patches from Jan (bsc#1027519) 5abcf445-x86-pv-fix-handing-of-writes-to-dr7.patch 5ac63737-x86-disable-XPTI-when-RDCL_NO.patch 5ac63737-x86-log-XPTI-enabled-status.patch 5ac63737-x86-XPTI-reduce-text-entry.patch 5acb58a2-x86-pv-fix-segs-for-32bit-syscall.patch 5acdca70-x86-HVM-suppress-IO-completion-for-port-output.patch 5acdde3f-VT-x-fix-determination-of-EFER-LMA-in-vmcs_dump_vcpu.patch 5ad4948b-x86-correct-MSR_PRED_CMD-emulation.patch- bsc#1089152 - VUL-0: CVE-2018-10472: xen: Information leak via crafted user-supplied CDROM (XSA-258) xsa258.patch - bsc#1089635 - VUL-0: CVE-2018-10471: xen: x86: PV guest may crash Xen with XPTI (XSA-259) xsa259.patch- bsc#1087252: update built-in defaults for xenstored in stubdom, keep default to run xenstored as daemon in dom0 xenstored-run-in-stubdomain.patch- Update to Xen 4.9.2 bug fix only release (bsc#1027519) xen-4.9.2-testing-src.tar.bz2 - Drop 59930079-gnttab-correct-error-handling-for-gnttab_setup_table.patch 5a140ba6-libxc-fix-restoration-of-PV-MSRs-after-migrate.patch 5a140ba6-x86-hvm-dont-corrupt-context-stream-writing-MSR-record.patch 5a16a51e-sync-CPU-state-upon-final-domain-destruction.patch 5a1d528b-x86-pod-prevent-infinite-loop-when-shattering-large-pages.patch 5a1d52cf-p2m-check-if-removing-p2m-entry-actually-worked.patch 5a1d52e6-p2m-check-return-of-p2m_set_entry-when-decreasing-.patch 5a1d5312-x86-replace-bad-ASSERT-in-xatp1.patch 5a1d5333-x86-check-paging-mode-earlier-in-xatp1.patch 5a1d5350-improve-xatpb-address-checking.patch 5a219aec-x86-avoid-migrate-vCPU-corruption-with-CPUID-faulting.patch 5a219aec-x86-hvm-fix-interaction-between-int-and-ext-emul.patch 5a21a77e-x86-pv-construct-d0v0s-GDT-properly.patch 5a2fd946-x86-dont-wrongly-trigger-linear-pgt-assertion.patch 5a2fd984-x86-mm-dont-wrongly-set-page-ownership.patch 5a2fd9a9-x86-shadow-fix-refcount-overflow-check.patch 5a2fd9c9-x86-shadow-fix-ref-counting-error-handling.patch 5a2fd9e9-x86-paging-dont-wrongly-BUG-finding-SHARED_M2P_ENTRY.patch 5a2fda0d-x86-mb2-avoid-Xen-when-looking-for-module-crashkernel-pos.patch 5a2ffc1f-x86-mm-drop-bogus-paging-mode-assertion.patch 5a313972-x86-microcode-add-support-for-AMD-Fam17.patch 5a32bd79-x86-vmx-dont-use-hvm_inject_hw_exception-in-.patch 5a4caa5e-x86-IRQ-conditionally-preserve-access-perm.patch 5a4caa8c-x86-E820-don-t-overrun-array.patch 5a4e2c2c-x86-upcall-inject-spurious-event-after-setting-vector.patch 5a4fd893-1-x86-break-out-alternative-asm-into-separate-header.patch 5a4fd893-2-x86-introduce-ALTERNATIVE_2-macros.patch 5a4fd893-3-x86-hvm-rename-update_guest_vendor-to-cpuid_policy_changed.patch 5a4fd893-4-x86-introduce-cpuid_policy_updated.patch 5a4fd893-5-x86-entry-remove-partial-cpu_user_regs.patch 5a4fd894-1-x86-rearrange-RESTORE_ALL-to-restore-in-stack-order.patch 5a4fd894-2-x86-hvm-use-SAVE_ALL-after-VMExit.patch 5a4fd894-3-x86-erase-guest-GPRs-on-entry-to-Xen.patch 5a4fd894-4-clarifications-to-wait-infrastructure.patch 5a534c78-x86-dont-use-incorrect-CPUID-values-for-topology.patch 5a5cb24c-x86-mm-always-set-_PAGE_ACCESSED-on-L4-updates.patch 5a5e2cff-x86-Meltdown-band-aid.patch 5a5e2d73-x86-Meltdown-band-aid-conditional.patch 5a5e3a4e-1-x86-support-compiling-with-indirect-branch-thunks.patch 5a5e3a4e-2-x86-support-indirect-thunks-from-asm.patch 5a5e3a4e-3-x86-report-speculative-mitigation-details.patch 5a5e3a4e-4-x86-AMD-set-lfence-as-Dispatch-Serialising.patch 5a5e3a4e-5-x86-introduce-alternative-indirect-thunks.patch 5a5e3a4e-6-x86-definitions-for-Indirect-Branch-Controls.patch 5a5e3a4e-7-x86-cmdline-opt-to-disable-IBRS-IBPB-STIBP.patch 5a68bc16-x86-acpi-process-softirqs-logging-Cx.patch 5a69c0b9-x86-fix-GET_STACK_END.patch 5a6b36cd-1-x86-cpuid-handling-of-IBRS-IBPB-STIBP-and-IBRS-for-guests.patch 5a6b36cd-2-x86-msr-emulation-of-SPEC_CTRL-PRED_CMD.patch 5a6b36cd-3-x86-migrate-MSR_SPEC_CTRL.patch 5a6b36cd-4-x86-hvm-permit-direct-access-to-SPEC_CTRL-PRED_CMD.patch 5a6b36cd-5-x86-use-SPEC_CTRL-on-entry.patch 5a6b36cd-6-x86-clobber-RSB-RAS-on-entry.patch 5a6b36cd-7-x86-no-alternatives-in-NMI-MC-paths.patch 5a6b36cd-8-x86-boot-calculate-best-BTI-mitigation.patch 5a6b36cd-9-x86-issue-speculation-barrier.patch 5a6b36cd-A-x86-offer-Indirect-Branch-Controls-to-guests.patch 5a6b36cd-B-x86-clear-SPEC_CTRL-while-idle.patch 5a7b1bdd-x86-reduce-Meltdown-band-aid-IPI-overhead.patch 5a856a2b-x86-emul-fix-64bit-decoding-of-segment-overrides.patch 5a856a2b-x86-use-32bit-xors-for-clearing-GPRs.patch 5a8be788-x86-nmi-start-NMI-watchdog-on-CPU0-after-SMP.patch 5a95373b-x86-PV-avoid-leaking-other-guests-MSR_TSC_AUX.patch 5a95571f-memory-dont-implicitly-unpin-in-decrease-res.patch 5a95576c-gnttab-ARM-dont-corrupt-shared-GFN-array.patch 5a955800-gnttab-dont-free-status-pages-on-ver-change.patch 5a955854-x86-disallow-HVM-creation-without-LAPIC-emul.patch 5a956747-x86-HVM-dont-give-wrong-impression-of-WRMSR-success.patch xsa254-x86-reduce-Meltdown-overhead-a-little-further.patch- Preserve xen-syms from xen-dbg.gz to allow processing vmcores with crash(1) (bsc#1087251)- Since xen switched to Kconfig, building a non-debug hypervisor was done by default in a release branch. Adjust make logic to build a non-debug hypervisor as xen.gz, and continue to provide a debug binary as xen-dbg.gz- bsc#1072834 - Xen HVM: unchecked MSR access error: RDMSR from 0xc90 at rIP: 0xffffffff93061456 (native_read_msr+0x6/0x30) 5a956747-x86-HVM-dont-give-wrong-impression-of-WRMSR-success.patch - Upstream patches from Jan (bsc#1027519) 5a140ba6-libxc-fix-restoration-of-PV-MSRs-after-migrate.patch 5a79d7ed-libxc-packed-initrd-dont-fail-domain-creation.patch 5a7b1bdd-x86-reduce-Meltdown-band-aid-IPI-overhead.patch 5a843807-x86-spec_ctrl-fix-bugs-in-SPEC_CTRL_ENTRY_FROM_INTR_IST.patch 5a856a2b-x86-emul-fix-64bit-decoding-of-segment-overrides.patch 5a856a2b-x86-use-32bit-xors-for-clearing-GPRs.patch 5a8be788-x86-nmi-start-NMI-watchdog-on-CPU0-after-SMP.patch 5a95373b-x86-PV-avoid-leaking-other-guests-MSR_TSC_AUX.patch 5a95571f-memory-dont-implicitly-unpin-in-decrease-res.patch (Replaces xsa252.patch) 5a95576c-gnttab-ARM-dont-corrupt-shared-GFN-array.patch (Replaces xsa255-1.patch) 5a955800-gnttab-dont-free-status-pages-on-ver-change.patch (Replaces xsa255-2.patch) 5a955854-x86-disallow-HVM-creation-without-LAPIC-emul.patch (Replaces xsa256.patch) - Drop libxc-suppress-ramdisk-unzip.patch xsa252.patch xsa254-x86-reduce-Meltdown-IPI-overhead.patch xsa255-1.patch xsa255-2.patch xsa256.patch- bsc#1080635 - VUL-0: CVE-2018-7540: xen: DoS via non-preemptable L3/L4 pagetable freeing (XSA-252) xsa252.patch - bsc#1080662 - VUL-0: CVE-2018-7541: xen: grant table v2 -> v1 transition may crash Xen (XSA-255) xsa255-1.patch xsa255-2.patch - bsc#1080634 - VUL-0: CVE-2018-7542: xen: x86 PVH guest without LAPIC may DoS the host (XSA-256) xsa256.patch- fate#324965 - add script, udev rule and systemd service to watch for vcpu online/offline events in a HVM domU They are triggered via xl vcpu-set domU N- Make sure tools and tools-domU require libs from the very same build- bsc#1074562 - VUL-0: CVE-2017-5753,CVE-2017-5715,CVE-2017-5754 xen: Information leak via side effects of speculative execution (XSA-254). Includes Spectre v2 mitigation. 5a4fd893-1-x86-break-out-alternative-asm-into-separate-header.patch 5a4fd893-2-x86-introduce-ALTERNATIVE_2-macros.patch 5a4fd893-3-x86-hvm-rename-update_guest_vendor-to-cpuid_policy_changed.patch 5a4fd893-4-x86-introduce-cpuid_policy_updated.patch 5a4fd893-5-x86-entry-remove-partial-cpu_user_regs.patch 5a4fd894-1-x86-rearrange-RESTORE_ALL-to-restore-in-stack-order.patch 5a4fd894-2-x86-hvm-use-SAVE_ALL-after-VMExit.patch 5a4fd894-3-x86-erase-guest-GPRs-on-entry-to-Xen.patch 5a4fd894-4-clarifications-to-wait-infrastructure.patch 5a5e2cff-x86-Meltdown-band-aid.patch 5a5e2d73-x86-Meltdown-band-aid-conditional.patch 5a5e3a4e-1-x86-support-compiling-with-indirect-branch-thunks.patch 5a5e3a4e-2-x86-support-indirect-thunks-from-asm.patch 5a5e3a4e-3-x86-report-speculative-mitigation-details.patch 5a5e3a4e-4-x86-AMD-set-lfence-as-Dispatch-Serialising.patch 5a5e3a4e-5-x86-introduce-alternative-indirect-thunks.patch 5a5e3a4e-6-x86-definitions-for-Indirect-Branch-Controls.patch 5a5e3a4e-7-x86-cmdline-opt-to-disable-IBRS-IBPB-STIBP.patch 5a6b36cd-1-x86-cpuid-handling-of-IBRS-IBPB-STIBP-and-IBRS-for-guests.patch 5a6b36cd-2-x86-msr-emulation-of-SPEC_CTRL-PRED_CMD.patch 5a6b36cd-3-x86-migrate-MSR_SPEC_CTRL.patch 5a6b36cd-4-x86-hvm-permit-direct-access-to-SPEC_CTRL-PRED_CMD.patch 5a6b36cd-5-x86-use-SPEC_CTRL-on-entry.patch 5a6b36cd-6-x86-clobber-RSB-RAS-on-entry.patch 5a6b36cd-7-x86-no-alternatives-in-NMI-MC-paths.patch 5a6b36cd-8-x86-boot-calculate-best-BTI-mitigation.patch 5a6b36cd-9-x86-issue-speculation-barrier.patch 5a6b36cd-A-x86-offer-Indirect-Branch-Controls-to-guests.patch 5a6b36cd-B-x86-clear-SPEC_CTRL-while-idle.patch - Upstream patches from Jan (bsc#1027519) 59930079-gnttab-correct-error-handling-for-gnttab_setup_table.patch 5a140ba6-x86-hvm-dont-corrupt-context-stream-writing-MSR-record.patch 5a1d528b-x86-pod-prevent-infinite-loop-when-shattering-large-pages.patch (Replaces xsa246.patch) 5a1d52cf-p2m-check-if-removing-p2m-entry-actually-worked.patch (Replaces xsa247-1.patch) 5a1d52e6-p2m-check-return-of-p2m_set_entry-when-decreasing-.patch (Replaces xsa247-2.patch) 5a1d5312-x86-replace-bad-ASSERT-in-xatp1.patch 5a1d5333-x86-check-paging-mode-earlier-in-xatp1.patch 5a1d5350-improve-xatpb-address-checking.patch 5a219aec-x86-avoid-migrate-vCPU-corruption-with-CPUID-faulting.patch 5a219aec-x86-hvm-fix-interaction-between-int-and-ext-emul.patch 5a21a77e-x86-pv-construct-d0v0s-GDT-properly.patch 5a2fd946-x86-dont-wrongly-trigger-linear-pgt-assertion.patch 5a2fd984-x86-mm-dont-wrongly-set-page-ownership.patch (Replaces xsa248.patch) 5a2fd9a9-x86-shadow-fix-refcount-overflow-check.patch (Replaces xsa249.patch) 5a2fd9c9-x86-shadow-fix-ref-counting-error-handling.patch (Replaces xsa250.patch) 5a2fd9e9-x86-paging-dont-wrongly-BUG-finding-SHARED_M2P_ENTRY.patch (Replaces xsa251.patch) 5a2fda0d-x86-mb2-avoid-Xen-when-looking-for-module-crashkernel-pos.patch 5a2ffc1f-x86-mm-drop-bogus-paging-mode-assertion.patch 5a313972-x86-microcode-add-support-for-AMD-Fam17.patch 5a32bd79-x86-vmx-dont-use-hvm_inject_hw_exception-in-.patch 5a33a12f-domctl-improve-locking-during-domain-destruction.patch 5a4caa5e-x86-IRQ-conditionally-preserve-access-perm.patch 5a4caa8c-x86-E820-don-t-overrun-array.patch 5a4e2c2c-x86-upcall-inject-spurious-event-after-setting-vector.patch 5a534c78-x86-dont-use-incorrect-CPUID-values-for-topology.patch 5a68bc16-x86-acpi-process-softirqs-logging-Cx.patch 5a69c0b9-x86-fix-GET_STACK_END.patch - Dropped or replaced patches 5a2fdb99-x86-dont-wrongly-trigger-linear-page-table-assertion-2.patch 5a4fd893-x86-entry-remove-partial-cpu_user_regs.patch x86-PV-shadow-L4-optional.patch x86-PV-shadow-L4.patch xsa246.patch xsa247-1.patch xsa247-2.patch xsa248.patch xsa249.patch xsa250.patch xsa251.patch- bsc#1074562 - VUL-0: xen: Information leak via side effects of speculative execution (XSA-254) xsa254-x86-reduce-Meltdown-overhead-a-little-further.patch xsa254-x86-reduce-Meltdown-IPI-overhead.patch- bsc#1076116 - VUL-1: CVE-2018-5683: xen: Qemu: Out-of-bounds read in vga_draw_text routine CVE-2018-5683-qemut-out-of-bounds-read-in-vga_draw_text-routine.patch - bsc#1076180 - VUL-1: CVE-2017-18030: xen: qemu: Out-of-bounds access in cirrus_invalidate_region routine CVE-2017-18030-qemut-out-of-bounds-access-in-cirrus_invalidate_region-routine.patch- bsc#1074562 - VUL-0: xen: Information leak via side effects of speculative execution (XSA-254) 5a4fd893-x86-entry-remove-partial-cpu_user_regs.patch 5a5cb24c-x86-mm-always-set-_PAGE_ACCESSED-on-L4-updates.patch x86-PV-shadow-L4.patch x86-PV-shadow-L4-optional.patch- bsc#1067317 - pass cache=writeback|unsafe|directsync to qemu, depending on the libxl disk settings libxl.add-option-to-disable-disk-cache-flushes-in-qdisk.patch- bsc#1068032 - VUL-0: side channel attacks qemut-add-support-for-cpuid-MSR_IA32_SPEC_CTRL.patch- Increase the value of LIBXL_DESTROY_TIMEOUT from 10 to 100 seconds If many domUs shutdown in parallel the backends can not keep up Add some debug output to track how long backend shutdown takes (bsc#1035442) libxl.LIBXL_DESTROY_TIMEOUT.patch- bsc#1061081 - VUL-0: CVE-2017-15595: xen: Unlimited recursion in linear pagetable de-typing (XSA-240) 5a2fdb99-x86-dont-wrongly-trigger-linear-page-table-assertion-2.patch- bsc#1070158 - VUL-0: CVE-2017-17566: xen: x86 PV guests may gain access to internally used pages (XSA-248) xsa248.patch - bsc#1070159 - VUL-0: CVE-2017-17563: xen: broken x86 shadow mode refcount overflow check (XSA-249) xsa249.patch - bsc#1070160 - VUL-0: CVE-2017-17564: xen: improper x86 shadow mode refcount error handling (XSA-250) xsa250.patch - bsc#1070163 - VUL-0: CVE-2017-17565: xen: improper bug check in x86 log-dirty handling (XSA-251) xsa251.patch- bsc#1051729 - Invalid symlinks after install of sles12sp2 xen.spec - Upstream patch from Jan (bsc#1027519) 5a16a51e-sync-CPU-state-upon-final-domain-destruction.patch- Update to Xen 4.9.1 bug fix only release (bsc#1027519) xen-4.9.1-testing-src.tar.bz2 - Drop patches contained in new tarball 592fd5f0-stop_machine-fill-result-only-in-case-of-error.patch 596f257e-x86-fix-hvmemul_insn_fetch.patch 5982fd99-VT-d-don-t-panic-warn-on-iommu-no-igfx.patch 598c3630-VT-d-PI-disable-when-CPU-side-PI-is-off.patch 598c3706-cpufreq-only-stop-ondemand-governor-if-started.patch 5992f1e5-x86-grant-disallow-misaligned-PTEs.patch 5992f20d-gnttab-split-maptrack-lock-to-make-it-useful-again.patch 5992f233-gnttab-correct-pin-status-fixup-for-copy.patch 59958e76-gnttab-dont-use-possibly-unbounded-tail-calls.patch 59958ebf-gnttab-fix-transitive-grant-handling.patch 59958edd-gnttab-avoid-spurious-maptrack-handle-alloc-failures.patch 599da329-arm-mm-release-grant-lock-on-xatp1-error-paths.patch 59a01223-x86-check-for-alloc-errors-in-modify_xen_mappings.patch 59a0130c-x86-efi-dont-write-relocs-in-efi_arch_relocate_image-1st-pass.patch 59a9221f-VT-d-use-correct-BDF-for-VF-to-search-VT-d-unit.patch 59ae9177-x86-emul-fix-handling-of-unimplemented-Grp7-insns.patch 59aec335-x86emul-correct-VEX-W-handling-for-VPINSRD.patch 59aec375-x86emul-correct-VEX-L-handling-for-VCVTx2SI.patch 59afcea0-x86-introduce-and-use-setup_force_cpu_cap.patch 59b2a7f2-x86-HVM-correct-repeat-count-update-linear-phys.patch 59b7d664-mm-make-sure-node-is-less-than-MAX_NUMNODES.patch 59b7d69b-grant_table-fix-GNTTABOP_cache_flush-handling.patch 59b7d6c8-xenstore-dont-unlink-connection-object-twice.patch 59b7d6d9-gnttab-also-validate-PTE-perms-upon-destroy-replace.patch gcc7-arm.patch xsa236.patch xsa237-1.patch xsa237-2.patch xsa237-3.patch xsa237-4.patch xsa237-5.patch xsa238.patch xsa239.patch xsa240-1.patch xsa240-2.patch xsa241.patch xsa242.patch xsa243.patch xsa244.patch- bsc#1068187 - VUL-0: xen: x86: infinite loop due to missing PoD error checking (XSA-246) xsa246.patch - bsc#1068191 - VUL-0: xen: Missing p2m error checking in PoD code (XSA-247) xsa247-1.patch xsa247-2.patch- fate#324052 Support migration of Xen HVM domains larger than 1TB 59f31268-libxc-remove-stale-error-check-for-domain-size.patch- bsc#1055047 - virt-install --initrd-inject option does not work in Xen environments libxc-suppress-ramdisk-unzip.patch - bsc#1063123 - VUL-1: CVE-2017-15289: xen cirrus: OOB access issue in mode4and5 write functions CVE-2017-15289-qemut-cirrus-OOB-access-issue-in-mode4and5-write-functions.patch- bsc#1059777 - VUL-1: CVE-2017-5526: xen: audio: memory leakage in es1370 device CVE-2017-5526-qemut-audio-memory-leakage-in-es1370-device.patch- bsc#1061084 - VUL-0: CVE-2017-15593: xen: page type reference leak on x86 (XSA-242) xsa242.patch - bsc#1061086 - VUL-0: CVE-2017-15592: xen: x86: Incorrect handling of self-linear shadow mappings with translated guests (XSA-243) xsa243.patch - bsc#1061087 - VUL-0: CVE-2017-15594: xen: x86: Incorrect handling of IST settings during CPU hotplug (XSA-244) xsa244.patch- bsc#1061077 - VUL-0: CVE-2017-15591: xen: DMOP map/unmap missing argument checks (XSA-238) xsa238.patch - bsc#1061080 - VUL-0: CVE-2017-15589: xen: hypervisor stack leak in x86 I/O intercept code (XSA-239) xsa239.patch - bsc#1061081 - VUL-0: CVE-2017-15595: xen: Unlimited recursion in linear pagetable de-typing (XSA-240) xsa240-1.patch xsa240-2.patch - bsc#1061082 - VUL-0: CVE-2017-15588: xen: Stale TLB entry due to page type release race (XSA-241) xsa241.patch- bsc#1061075 - VUL-0: CVE-2017-15597: xen: pin count / page reference race in grant table code (XSA-236) xsa236.patch - bsc#1061076 - VUL-0: CVE-2017-15590: xen: multiple MSI mapping issues on x86 (XSA-237) xsa237-1.patch xsa237-2.patch xsa237-3.patch xsa237-4.patch xsa237-5.patch- bsc#1055321 - VUL-0: xen: add-to-physmap error paths fail to release lock on ARM (XSA-235) 599da329-arm-mm-release-grant-lock-on-xatp1-error-paths.patch - Upstream patches from Jan (bsc#1027519) 59b7d664-mm-make-sure-node-is-less-than-MAX_NUMNODES.patch (Replaces xsa231.patch 59b7d69b-grant_table-fix-GNTTABOP_cache_flush-handling.patch (Replaces xsa232.patch) 59b7d6c8-xenstore-dont-unlink-connection-object-twice.patch (Replaces xsa233.patch) 59b7d6d9-gnttab-also-validate-PTE-perms-upon-destroy-replace.patch (Replaces xsa234.patch) 59a01223-x86-check-for-alloc-errors-in-modify_xen_mappings.patch 59a0130c-x86-efi-dont-write-relocs-in-efi_arch_relocate_image-1st-pass.patch 59a9221f-VT-d-use-correct-BDF-for-VF-to-search-VT-d-unit.patch 59ae9177-x86-emul-fix-handling-of-unimplemented-Grp7-insns.patch 59aec335-x86emul-correct-VEX-W-handling-for-VPINSRD.patch 59aec375-x86emul-correct-VEX-L-handling-for-VCVTx2SI.patch 59afcea0-x86-introduce-and-use-setup_force_cpu_cap.patch 59b2a7f2-x86-HVM-correct-repeat-count-update-linear-phys.patch - Dropped gcc7-xen.patch- bsc#1057358 - Cannot Boot into SLES12.3 with Xen hypervisor when Secure Boot is Enabled xen.spec- Upstream patch from Juergen (bsc#1027519) 59a98d3e-libxc-increase-maximum-migration-stream-record-length.patch- bsc#1055695 - XEN: 11SP4 and 12SP3 HVM guests can not be restored update from v6 to v9 to cover more cases for ballooned domUs libxc.sr.superpage.patch- bsc#1056278 - VUL-0: CVE-2017-14316: xen: Missing NUMA node parameter verification (XSA-231) xsa231.patch - bsc#1056280 - VUL-0: CVE-2017-14318: xen: Missing check for grant table (XSA-232) xsa232.patch - bsc#1056281 - VUL-0: CVE-2017-14317: xen: cxenstored: Race in domain cleanup (XSA-233) xsa233.patch - bsc#1056282 - VUL-0: CVE-2017-14319: xen: insufficient grant unmapping checks for x86 PV guests (XSA-234) xsa234.patch- bsc#1026236 - remove suse_vtsc_tolerance= cmdline option for Xen drop the patch because it is not upstream acceptable remove xen.suse_vtsc_tolerance.patch- bsc#1055695 - XEN: 11SP4 and 12SP3 HVM guests can not be restored after the save using xl stack libxc.sr.superpage.patch- Upstream patches from Jan (bsc#1027519) 592fd5f0-stop_machine-fill-result-only-in-case-of-error.patch 596f257e-x86-fix-hvmemul_insn_fetch.patch 5982fd99-VT-d-don-t-panic-warn-on-iommu-no-igfx.patch 598c3630-VT-d-PI-disable-when-CPU-side-PI-is-off.patch 598c3706-cpufreq-only-stop-ondemand-governor-if-started.patch 5992f1e5-x86-grant-disallow-misaligned-PTEs.patch (Replaces xsa227.patch) 5992f20d-gnttab-split-maptrack-lock-to-make-it-useful-again.patch (Replaces xsa228.patch) 5992f233-gnttab-correct-pin-status-fixup-for-copy.patch (Replaces xsa230.patch) 59958e76-gnttab-dont-use-possibly-unbounded-tail-calls.patch (Replaces xsa226-1.patch) 59958ebf-gnttab-fix-transitive-grant-handling.patch (Replaces xsa226-2.patch) 59958edd-gnttab-avoid-spurious-maptrack-handle-alloc-failures.patch- Use upstream variant of mini-os __udivmoddi4 change gcc7-mini-os.patch- bsc#1052686 - VUL-0: CVE-2017-12855: xen: grant_table: possibly premature clearing of GTF_writing / GTF_reading (XSA-230) xsa230.patch- bsc#1035231 - migration of HVM domU does not use superpages on destination dom0 libxc.sr.superpage.patch- bsc#1051787 - VUL-0: CVE-2017-12135: xen: possibly unbounded recursion in grant table code (XSA-226) xsa226-1.patch xsa226-2.patch - bsc#1051788 - VUL-0: CVE-2017-12137: xen: x86: PV privilege escalation via map_grant_ref (XSA-227) xsa227.patch - bsc#1051789 - VUL-0: CVE-2017-12136: xen: grant_table: Race conditions with maptrack free list handling (XSA-228) xsa228.patch- bsc#1049578 - VUL-1: CVE-2017-11434: xen: slirp: out-of-bounds read while parsing dhcp options CVE-2017-11434-qemut-slirp-out-of-bounds-read-while-parsing-dhcp-options.patch- bsc#1026236 - add suse_vtsc_tolerance= cmdline option for Xen To avoid emulation of TSC access from a domU after live migration add a global tolerance for the measured host kHz xen.suse_vtsc_tolerance.patch- bsc#1002573 - Optimize LVM functions in block-dmmd block-dmmd- Record initial Xen dmesg in /var/log/xen/xen-boot.log for supportconfig. Keep previous log in /var/log/xen/xen-boot.prev.log- Remove storytelling from description in xen.rpm- Add pandoc (on opensuse) to get all manpages- bsc#1046637 - VUL-0: CVE-2017-10664: xen: qemu-nbd: server breaks with SIGPIPE upon client abort CVE-2017-10664-qemut-nbd-ignore-sigpipe.patch- Update to Xen 4.9.0 FCS (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- Update block-dmmd script (bsc#1002573) block-dmmd- Update to Xen 4.9.0-rc8+ (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2 gcc7-arm.patch - Drop gcc7-error-xenpmd.patch- Update to Xen 4.9.0-rc8 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- bsc#1042160 - VUL-1: CVE-2017-9330: xen: usb: ohci: infinite loop due to incorrect return value CVE-2017-9330-qemut-usb-ohci-infinite-loop-due-to-incorrect-return-value.patch- bsc#1037243 - VUL-1: CVE-2017-8309: xen: audio: host memory leakage via capture buffer CVE-2017-8309-qemut-audio-host-memory-leakage-via-capture-buffer.patch- Update to Xen 4.9.0-rc7 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- Update to Xen 4.9.0-rc6 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- bsc#1031343 - xen fails to build with GCC 7 gcc7-mini-os.patch gcc7-xen.patch- bsc#1031343 - xen fails to build with GCC 7 gcc7-error-xenpmd.patch- Update to Xen 4.9.0-rc5 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2 - Drop xen-tools-pkgconfig-xenlight.patch- bsc#1037779 - xen breaks kexec-tools build xen-tools-pkgconfig-xenlight.patch- Update to Xen 4.9.0-rc4 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- bsc#1036146 - sles12sp2 xen VM dumps core to wrong path xen.spec- Update to Xen 4.9.0-rc3 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2 aarch64-maybe-uninitialized.patch- Update to Xen 4.9.0-rc2 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- Update to Xen 4.9.0-rc1 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2 ioemu-devicemodel-include.patch - Dropped patches contained in new tarball xen-4.8.0-testing-src.tar.bz2 0001-xenstore-let-write_node-and-some-callers-return-errn.patch 0002-xenstore-undo-function-rename.patch 0003-xenstore-rework-of-transaction-handling.patch 584806ce-x86emul-correct-PUSHF-POPF.patch 584fc649-fix-determining-when-domain-creation-is-complete.patch 58510c06-x86emul-CMPXCHGnB-ignore-prefixes.patch 58510cac-x86emul-MOVNTI-no-REP-prefixes.patch 58526ccc-x86emul-64bit-ignore-most-segment-bases-in-align-check.patch 5853ed37-VT-d-correct-dma_msi_set_affinity.patch 5853ee07-x86emul-CMPXCHG16B-aligned-operand.patch 58580060-x86-emul-correct-SYSCALL-eflags-handling.patch 585aa3c5-x86-force-EFLAGS-IF-on-upon-exit-to-PV.patch 585aa407-x86-HVM-NULL-check-before-using-VMFUNC-hook.patch 585bd5fe-x86-emul-correct-VMFUNC-return-value-handling.patch 586ba81c-x86-cpu-dont-update-this_cpu-for-guest-get_cpu_vendor.patch 587d04d6-x86-xstate-fix-array-overrun-with-LWP.patch 587de4a9-x86emul-VEX-B-ignored-in-compat-mode.patch 5882129d-x86emul-LOCK-check-adjustments.patch 58821300-x86-segment-attribute-handling.patch 58873c1f-x86emul-correct-FPU-stub-asm-constraints.patch 58873c80-x86-hvm-do-not-set-msr_tsc_adjust-on-.patch 5887888f-credit2-fix-shutdown-suspend-with-cpupools.patch 5887888f-credit2-never-consider-CPUs-outside-of-pool.patch 5887888f-credit2-use-the-correct-scratch-cpumask.patch 5888b1b3-x86-emulate-dont-assume-addr_size-32-implies-protmode.patch 5899cbd9-EPT-allow-wrcomb-MMIO-mappings-again.patch 589b3272-libxl-dont-segfault-when-creating-domain-with-invalid-pvusb-device.patch 58a44771-IOMMU-always-call-teardown-callback.patch 58a48ccc-x86-fix-p2m_flush_table-for-non-nested.patch 58a59f4b-libxl-correct-xenstore-entry-for-empty-cdrom.patch 58a70d94-VMX-fix-VMCS-race-on-cswitch-paths.patch 58ac1f3f-VMX-dont-leak-host-syscall-MSRs.patch 58b5a2de-x86-correct-Xens-idea-of-its-memory-layout.patch 58b6fd42-credit2-always-mark-a-tickled-pCPU-as-tickled.patch 58b6fd42-credit2-dont-miss-accounting-during-credit-reset.patch 58cbf682-x86-EFI-avoid-overrunning-mb_modules.patch 58cf9200-x86-EFI-avoid-IOMMU-faults-on-tail-gap.patch 58cf9260-x86-EFI-avoid-Xen-when-looking-for-mod-kexec-pos.patch 58cf9277-x86-time-dont-use-vTSC-if-host-guest-freqs-match.patch 58d25ea2-xenstore-add-missing-checks-for-allocation-failure.patch 58d91365-sched-dont-call-wrong-hook-via-VCPU2OP.patch CVE-2017-2615-qemut-display-cirrus-oob-access-while-doing-bitblt-copy-backward-mode.patch CVE-2017-2620-xsa209-qemut-cirrus_bitblt_cputovideo-does-not-check-if-memory-region-safe.patch glibc-2.25-compatibility-fix.patch xs-09-add_change_node-params.patch xs-10-call-add_change_node.patch xs-11-tdb-record-header.patch xs-12-node-gen-count.patch xs-13-read-directory-part-support.patch xs-14-command-array.patch xs-15-command-return-val.patch xs-16-function-static.patch xs-17-arg-parsing.patch xs-18-default-buffer.patch xs-19-handle-alloc-failures.patch xs-20-tdb-version.patch xs-21-empty-tdb-database.patch xs-22-reopen_log-fix.patch xs-23-XS_DEBUG-rename.patch xs-24-xenstored_control.patch xs-25-control-enhance.patch xs-26-log-control.patch xs-27-memory-report.patch xs-28-remove-talloc-report.patch xs-29-define-off_t.patch xsa206-0001-xenstored-apply-a-write-transaction-rate-limit.patch xsa206-0002-xenstored-Log-when-the-write-transaction-rate-limit.patch- bsc#1022703 - Xen HVM guest with OVMF hangs with unattached CDRom 58a59f4b-libxl-correct-xenstore-entry-for-empty-cdrom.patch- bsc#1015348 - L3: libvirtd does not start during boot suse-xendomains-service.patch- bsc#1014136 - Partner-L3: kdump can't dump a kernel on SLES12-SP2 with Xen hypervisor. 58cf9260-x86-EFI-avoid-Xen-when-looking-for-mod-kexec-pos.patch - bsc#1026236 - L3: Paravirtualized vs. fully virtualized migration - latter one much faster 58cf9277-x86-time-dont-use-vTSC-if-host-guest-freqs-match.patch - Upstream patch from Jan 58cbf682-x86-EFI-avoid-overrunning-mb_modules.patch 58cf9200-x86-EFI-avoid-IOMMU-faults-on-tail-gap.patch 58d91365-sched-dont-call-wrong-hook-via-VCPU2OP.patch- bsc#1022555 - L3: Timeout in "execution of /etc/xen/scripts/block add" 58d25ea2-xenstore-add-missing-checks-for-allocation-failure.patch 0001-xenstore-let-write_node-and-some-callers-return-errn.patch 0002-xenstore-undo-function-rename.patch 0003-xenstore-rework-of-transaction-handling.patch - bsc#1030144 - VUL-0: xen: xenstore denial of service via repeated update (XSA-206) xsa206-0001-xenstored-apply-a-write-transaction-rate-limit.patch xsa206-0002-xenstored-Log-when-the-write-transaction-rate-limit.patch - bsc#1029827 - Forward port xenstored xs-09-add_change_node-params.patch xs-10-call-add_change_node.patch xs-11-tdb-record-header.patch xs-12-node-gen-count.patch xs-13-read-directory-part-support.patch xs-14-command-array.patch xs-15-command-return-val.patch xs-16-function-static.patch xs-17-arg-parsing.patch xs-18-default-buffer.patch xs-19-handle-alloc-failures.patch xs-20-tdb-version.patch xs-21-empty-tdb-database.patch xs-22-reopen_log-fix.patch xs-23-XS_DEBUG-rename.patch xs-24-xenstored_control.patch xs-25-control-enhance.patch xs-26-log-control.patch xs-27-memory-report.patch xs-28-remove-talloc-report.patch xs-29-define-off_t.patch- bsc#1029128 - fix make xen to really produce xen.efi with gcc48- bsc#1028235 - VUL-0: CVE-2017-6505: xen: qemu: usb: an infinite loop issue in ohci_service_ed_list CVE-2017-6505-qemut-usb-an-infinite-loop-issue-in-ohci_service_ed_list.patch - Upstream patches from Jan (bsc#1027519) 5887888f-credit2-fix-shutdown-suspend-with-cpupools.patch 5887888f-credit2-use-the-correct-scratch-cpumask.patch 5899cbd9-EPT-allow-wrcomb-MMIO-mappings-again.patch 589b3272-libxl-dont-segfault-when-creating-domain-with-invalid-pvusb-device.patch 58a44771-IOMMU-always-call-teardown-callback.patch 58a48ccc-x86-fix-p2m_flush_table-for-non-nested.patch 58a70d94-VMX-fix-VMCS-race-on-cswitch-paths.patch 58ac1f3f-VMX-dont-leak-host-syscall-MSRs.patch 58b5a2de-x86-correct-Xens-idea-of-its-memory-layout.patch 58b6fd42-credit2-always-mark-a-tickled-pCPU-as-tickled.patch 58b6fd42-credit2-dont-miss-accounting-during-credit-reset.patch- bsc#1027654 - XEN fails to build against glibc 2.25 glibc-2.25-compatibility-fix.patch libxl.pvscsi.patch- fate#316613: Refresh and enable libxl.pvscsi.patch- bsc#1024834 - VUL-0: CVE-2017-2620: xen: cirrus_bitblt_cputovideo does not check if memory region is safe (XSA-209) CVE-2017-2620-xsa209-qemut-cirrus_bitblt_cputovideo-does-not-check-if-memory-region-safe.patch- bsc#1023948 - [pvusb][sles12sp3][openqa] Segmentation fault happened when adding usbctrl devices via xl 589b3272-libxl-dont-segfault-when-creating-domain-with-invalid-pvusb-device.patch- Upstream patches from Jan (bsc#1027519) 587d04d6-x86-xstate-fix-array-overrun-with-LWP.patch 587de4a9-x86emul-VEX-B-ignored-in-compat-mode.patch 5882129d-x86emul-LOCK-check-adjustments.patch 58821300-x86-segment-attribute-handling.patch 58873c1f-x86emul-correct-FPU-stub-asm-constraints.patch 58873c80-x86-hvm-do-not-set-msr_tsc_adjust-on-.patch 5887888f-credit2-use-the-correct-scratch-cpumask.patch 5887888f-credit2-never-consider-CPUs-outside-of-pool.patch 5887888f-credit2-fix-shutdown-suspend-with-cpupools.patch 5888b1b3-x86-emulate-dont-assume-addr_size-32-implies-protmode.patch- bsc#1023004 - VUL-0: CVE-2017-2615: qemu: display: cirrus: oob access while doing bitblt copy backward mode CVE-2017-2615-qemut-display-cirrus-oob-access-while-doing-bitblt-copy-backward-mode.patch- fate#322313 and fate#322150 require the acpica package ported to aarch64 which Xen 4.8 needs to build. Temporarily disable aarch64 until these fates are complete. xen.spec- bsc#1021952 - Virutalization/xen: Bug xen-tools missing /usr/bin/domu-xenstore; guests fail to launch tmp_build.patch xen.spec- No systemd presets for 42.3+ and SLE12SP3+ (bsc#1012842)- bsc#1007224 - broken symlinks in /usr/share/doc/packages/xen/misc/ xen.spec- 585aa3c5-x86-force-EFLAGS-IF-on-upon-exit-to-PV.patch Replaces xsa202.patch (bsc#1014298) - 585aa407-x86-HVM-NULL-check-before-using-VMFUNC-hook.patch Replaces xsa203.patch (bsc#1014300) - 58580060-x86-emul-correct-SYSCALL-eflags-handling.patch Replaces xsa204.patch (bsc#1016340) - Upstream patches from Jan 58526ccc-x86emul-64bit-ignore-most-segment-bases-in-align-check.patch 5853ed37-VT-d-correct-dma_msi_set_affinity.patch 5853ee07-x86emul-CMPXCHG16B-aligned-operand.patch 585bd5fe-x86-emul-correct-VMFUNC-return-value-handling.patch 586ba81c-x86-cpu-dont-update-this_cpu-for-guest-get_cpu_vendor.patch- bsc#1015169 - VUL-0: CVE-2016-9921, CVE-2016-9922: xen: qemu: display: cirrus_vga: a divide by zero in cirrus_do_copy CVE-2016-9921-qemut-display-cirrus_vga-divide-by-zero-in-cirrus_do_copy.patch- bsc#1016340 - VUL-0: CVE-2016-10013: xen: x86: Mishandling of SYSCALL singlestep during emulation (XSA-204) xsa204.patch- bsc#1012651 - VUL-0: CVE-2016-9932: xen: x86 CMPXCHG8B emulation fails to ignore operand size override (XSA-200) 58510c06-x86emul-CMPXCHGnB-ignore-prefixes.patch- bsc#1014298 - VUL-0: CVE-2016-10024: xen: x86 PV guests may be able to mask interrupts (XSA-202) xsa202.patch - bsc#1014300 - VUL-0: CVE-2016-10025: xen: x86: missing NULL pointer check in VMFUNC emulation (XSA-203) xsa203.patch - Upstream patches from Jan 584806ce-x86emul-correct-PUSHF-POPF.patch 584fc649-fix-determining-when-domain-creation-is-complete.patch 58510c06-x86emul-CMPXCHGnB-ignore-prefixes.patch 58510cac-x86emul-MOVNTI-no-REP-prefixes.patch- Update to Xen 4.8 FCS xen-4.8.0-testing-src.tar.bz2 - Dropped xen-4.7.1-testing-src.tar.bz2 0001-libxc-Rework-extra-module-initialisation.patch 0002-libxc-Prepare-a-start-info-structure-for-hvmloader.patch 0003-configure-define-SEABIOS_PATH-and-OVMF_PATH.patch 0004-firmware-makefile-install-BIOS-blob.patch 0005-libxl-Load-guest-BIOS-from-file.patch 0006-xen-Move-the-hvm_start_info-C-representation-from-li.patch 0007-hvmloader-Grab-the-hvm_start_info-pointer.patch 0008-hvmloader-Locate-the-BIOS-blob.patch 0009-hvmloader-Check-modules-whereabouts-in-perform_tests.patch 0010-hvmloader-Load-SeaBIOS-from-hvm_start_info-modules.patch 0011-hvmloader-Load-OVMF-from-modules.patch 0012-hvmloader-Specific-bios_load-function-required.patch 0013-hvmloader-Always-build-in-SeaBIOS-and-OVMF-loader.patch 0014-configure-do-not-depend-on-SEABIOS_PATH-or-OVMF_PATH.patch 57580bbd-kexec-allow-relaxed-placement-via-cmdline.patch 576001df-x86-time-use-local-stamp-in-TSC-calibration-fast-path.patch 5769106e-x86-generate-assembler-equates-for-synthesized.patch 57a1e603-x86-time-adjust-local-system-time-initialization.patch 57a1e64c-x86-time-introduce-and-use-rdtsc_ordered.patch 57a2f6ac-x86-time-calibrate-TSC-against-platform-timer.patch 57a30261-x86-support-newer-Intel-CPU-models.patch 5810a9cc-x86-emul-Correct-decoding-of-SReg3-operands.patch 581b2c3b-x86-emul-reject-LGDT-LIDT-with-non-canonical-addresses.patch 581b647a-x86emul-L-S-G-I-DT-ignore-opsz-overrides-in-64-bit-mode.patch 58249392-x86-svm-dont-clobber-eax-edx-if-RDMSR-intercept-fails.patch 582c35d6-x86-vmx-correct-long-mode-check-in-vmx_cpuid_intercept.patch 582c35ee-x86-traps-dont-call-hvm_hypervisor_cpuid_leaf-for-PV.patch 58343dc2-x86-hvm-Fix-the-handling-of-non-present-segments.patch 58343df8-x86-HVM-dont-load-LDTR-with-VM86-mode-attrs-during-task-switch.patch 58343e24-x86-PV-writes-of-fs-and-gs-base-MSRs-require-canonical-addresses.patch 58343e9e-libelf-fix-stack-memory-leak-when-loading-32-bit-symbol-tables.patch 58343ec2-x86emul-fix-huge-bit-offset-handling.patch 58343f29-x86-emul-correct-the-IDT-entry-calculation-in-inject_swint.patch 58343f44-x86-svm-fix-injection-of-software-interrupts.patch 58343f79-pygrub-Properly-quote-results-when-returning-them-to-the-caller.patch CVE-2016-9381-xsa197-qemut.patch CVE-2016-9637-xsa199-qemut.patch- bsc#1011652 - VUL-0: xen: qemu ioport array overflow CVE-2016-9637-xsa199-qemut.patch- bsc#1009100 - VUL-0: CVE-2016-9386: XSA-191: xen: x86 null segments not always treated as unusable 58343dc2-x86-hvm-Fix-the-handling-of-non-present-segments.patch - bsc#1009103 - VUL-0: CVE-2016-9382: XSA-192: xen: x86 task switch to VM86 mode mis-handled 58343df8-x86-HVM-dont-load-LDTR-with-VM86-mode-attrs-during-task-switch.patch - bsc#1009104 - VUL-0: CVE-2016-9385: XSA-193: xen: x86 segment base write emulation lacking canonical address checks 58343e24-x86-PV-writes-of-fs-and-gs-base-MSRs-require-canonical-addresses.patch - bsc#1009105 - VUL-0: CVE-2016-9384: XSA-194: xen: guest 32-bit ELF symbol table load leaking host data 58343e9e-libelf-fix-stack-memory-leak-when-loading-32-bit-symbol-tables.patch - bsc#1009107 - VUL-0: CVE-2016-9383: XSA-195: xen: x86 64-bit bit test instruction emulation broken 58343ec2-x86emul-fix-huge-bit-offset-handling.patch - bsc#1009108 - VUL-0: CVE-2016-9377,CVE-2016-9378: XSA-196: xen: x86 software interrupt injection mis-handled 58343f29-x86-emul-correct-the-IDT-entry-calculation-in-inject_swint.patch 58343f44-x86-svm-fix-injection-of-software-interrupts.patch - bsc#1009109 - VUL-0: CVE-2016-9381: XSA-197: xen: qemu incautious about shared ring processing CVE-2016-9381-xsa197-qemut.patch - bsc#1009111 - VUL-0: CVE-2016-9379,CVE-2016-9380: XSA-198: xen: delimiter injection vulnerabilities in pygrub 58343f79-pygrub-Properly-quote-results-when-returning-them-to-the-caller.patch - Upstream patches from Jan 581b2c3b-x86-emul-reject-LGDT-LIDT-with-non-canonical-addresses.patch 581b647a-x86emul-L-S-G-I-DT-ignore-opsz-overrides-in-64-bit-mode.patch 58249392-x86-svm-dont-clobber-eax-edx-if-RDMSR-intercept-fails.patch 582c35d6-x86-vmx-correct-long-mode-check-in-vmx_cpuid_intercept.patch 582c35ee-x86-traps-dont-call-hvm_hypervisor_cpuid_leaf-for-PV.patch- Update to Xen Version 4.7.1 xen-4.7.1-testing-src.tar.bz2 - Dropped patches contained in new tarball xen-4.7.0-testing-src.tar.bz2 575e9ca0-nested-vmx-Validate-host-VMX-MSRs-before-accessing-them.patch 57640448-xen-sched-use-default-scheduler-upon-an-invalid-sched.patch 57973099-have-schedulers-revise-initial-placement.patch 579730e6-remove-buggy-initial-placement-algorithm.patch 57976073-x86-remove-unsafe-bits-from-mod_lN_entry-fastpath.patch 57976078-x86-avoid-SMAP-violation-in-compat_create_bounce_frame.patch 57ac6316-don-t-restrict-DMA-heap-to-node-0.patch 57b71fc5-x86-EFI-don-t-apply-relocations-to-l-2-3-_bootmap.patch 57b7447b-dont-permit-guest-to-populate-PoD-pages-for-itself.patch 57c4412b-x86-HVM-add-guarding-logic-for-VMX-specific-code.patch 57c57f73-libxc-correct-max_pfn-calculation-for-saving-domain.patch 57c805bf-x86-levelling-restrict-non-architectural-OSXSAVE-handling.patch 57c805c1-x86-levelling-pass-vcpu-to-ctxt_switch_levelling.patch 57c805c3-x86-levelling-provide-architectural-OSXSAVE-handling.patch 57c82be2-x86-32on64-adjust-call-gate-emulation.patch 57c93e52-fix-error-in-libxl_device_usbdev_list.patch 57c96df3-credit1-fix-a-race-when-picking-initial-pCPU.patch 57c96e2c-x86-correct-PT_NOTE-file-position.patch 57cfed43-VMX-correct-feature-checks-for-MPX-and-XSAVES.patch 57d1563d-x86-32on64-don-t-allow-recursive-page-tables-from-L3.patch 57d15679-x86-emulate-Correct-boundary-interactions-of-emulated-insns.patch 57d1569a-x86-shadow-Avoid-overflowing-sh_ctxt-seg_reg.patch 57d18642-hvm-fep-Allow-test-insns-crossing-1-0-boundary.patch 57d18642-x86-segment-Bounds-check-accesses-to-emulation-ctxt-seg_reg.patch 57d7ca5f-x86-domctl-fix-TOCTOU-race-in-XEN_DOMCTL_getvcpuextstate.patch 57d7ca64-x86-domctl-fix-migration-of-guests-not-using-xsave.patch 57da8883-credit1-fix-mask-to-be-used-for-tickling.patch 57da8883-credit2-properly-schedule-migration-of-running-vcpu.patch 57dfb1c5-x86-Intel-hide-CPUID-faulting-capability-from-guests.patch 57e93e1d-x86emul-correct-loading-of-ss.patch 57e93e4a-x86emul-don-t-allow-null-selector-for-LTR.patch 57e93e89-x86-AMD-apply-erratum-665-workaround.patch 57ee6cbc-credit1-return-time-remaining-to-limit-as-next-timeslice.patch 57f3a8ee-x86emul-honor-guest-CR0-TS-and-CR0-EM.patch 57fb6a91-x86-defer-not-present-segment-checks.patch 5800c51d-x86-hvm-Clobber-cs-L-when-LME-becomes-set.patch 5800caec-x86emul-fix-pushing-of-selector-registers.patch 5800cb06-x86-Viridian-don-t-depend-on-undefined-register-state.patch 580e29f9-x86-MISALIGNSSE-feature-depends-on-SSE.patch 57dfb2ff-x86-Intel-Broadwell-no-PKG_C8-10_RESIDENCY-MSRs.patch- bsc#1004981 - Xen RPM doesn't contain debug hypervisor for EFI systems xen.spec- bsc#1000106 - VUL-0: CVE-2016-7777: xen: CR0.TS and CR0.EM not always honored for x86 HVM guests (XSA-190) 57f3a8ee-x86emul-honor-guest-CR0-TS-and-CR0-EM.patch - bsc#996191 - [XEN][acpi]residency -n 88 -c will cause xen panic on broadwell-ep 57dfb2ff-x86-Intel-Broadwell-no-PKG_C8-10_RESIDENCY-MSRs.patch - Upstream patches from Jan 57d7ca5f-x86-domctl-fix-TOCTOU-race-in-XEN_DOMCTL_getvcpuextstate.patch 57d7ca64-x86-domctl-fix-migration-of-guests-not-using-xsave.patch 57da8883-credit1-fix-mask-to-be-used-for-tickling.patch 57da8883-credit2-properly-schedule-migration-of-running-vcpu.patch 57dfb1c5-x86-Intel-hide-CPUID-faulting-capability-from-guests.patch 57e93e1d-x86emul-correct-loading-of-ss.patch 57e93e4a-x86emul-don-t-allow-null-selector-for-LTR.patch 57e93e89-x86-AMD-apply-erratum-665-workaround.patch 57ee6cbc-credit1-return-time-remaining-to-limit-as-next-timeslice.patch 57fb6a91-x86-defer-not-present-segment-checks.patch 5800c51d-x86-hvm-Clobber-cs-L-when-LME-becomes-set.patch 5800caec-x86emul-fix-pushing-of-selector-registers.patch 5800cb06-x86-Viridian-don-t-depend-on-undefined-register-state.patch 580e29f9-x86-MISALIGNSSE-feature-depends-on-SSE.patch 5810a9cc-x86-emul-Correct-decoding-of-SReg3-operands.patch- bsc#1007941 - Xen tools limit the number of vcpus to 256 when the system has 384 xen-arch-kconfig-nr_cpus.patch- bsc#1007157 - VUL-0: CVE-2016-8910: xen: net: rtl8139: infinite loop while transmit in C+ mode CVE-2016-8910-qemut-net-rtl8139-infinite-loop-while-transmit-in-Cplus-mode.patch- bsc#1005004 - CVE-2016-8667: xen: dma: rc4030 divide by zero error in set_next_tick CVE-2016-8667-qemut-dma-rc4030-divide-by-zero-error-in-set_next_tick.patch - bsc#1005005 - VUL-0: CVE-2016-8669: xen: char: divide by zero error in serial_update_parameters CVE-2016-8669-qemut-char-divide-by-zero-error-in-serial_update_parameters.patch- bsc#1003030 - VUL-0: CVE-2016-7908: xen: net: Infinite loop in mcf_fec_do_tx CVE-2016-7908-qemut-net-Infinite-loop-in-mcf_fec_do_tx.patch - bsc#1003032 - VUL-0: CVE-2016-7909: xen: net: pcnet: infinite loop in pcnet_rdra_addr CVE-2016-7909-qemut-net-pcnet-infinite-loop-in-pcnet_rdra_addr.patch- bsc#995785 - VUL-0: CVE-2016-7092: xen: x86: Disallow L3 recursive pagetable for 32-bit PV guests (XSA-185) 57d1563d-x86-32on64-don-t-allow-recursive-page-tables-from-L3.patch - bsc#995789 - VUL-0: CVE-2016-7093: xen: x86: Mishandling of instruction pointer truncation during emulation (XSA-186) 57d15679-x86-emulate-Correct-boundary-interactions-of-emulated-insns.patch 57d18642-hvm-fep-Allow-test-insns-crossing-1-0-boundary.patch - bsc#995792 - VUL-0: CVE-2016-7094: xen: x86 HVM: Overflow of sh_ctxt->seg_reg[] (XSA-187) 57d1569a-x86-shadow-Avoid-overflowing-sh_ctxt-seg_reg.patch 57d18642-x86-segment-Bounds-check-accesses-to-emulation-ctxt-seg_reg.patch - bsc#991934 - xen hypervisor crash in csched_acct 57c96df3-credit1-fix-a-race-when-picking-initial-pCPU.patch - Upstream patches from Jan 57c4412b-x86-HVM-add-guarding-logic-for-VMX-specific-code.patch 57c57f73-libxc-correct-max_pfn-calculation-for-saving-domain.patch 57c805bf-x86-levelling-restrict-non-architectural-OSXSAVE-handling.patch 57c805c1-x86-levelling-pass-vcpu-to-ctxt_switch_levelling.patch 57c805c3-x86-levelling-provide-architectural-OSXSAVE-handling.patch 57c82be2-x86-32on64-adjust-call-gate-emulation.patch 57c96e2c-x86-correct-PT_NOTE-file-position.patch 57cfed43-VMX-correct-feature-checks-for-MPX-and-XSAVES.patch- bsc#979002 - add 60-persistent-xvd.rules and helper script also to initrd, add the relevant dracut helper- bnc#953518 - unplug also SCSI disks in qemu-xen-traditional for upstream unplug protocol- bsc#989679 - [pvusb feature] USB device not found when 'virsh detach-device guest usb.xml' 57c93e52-fix-error-in-libxl_device_usbdev_list.patch- bsc#992224 - [HPS Bug] During boot of Xen Hypervisor, Failed to get contiguous memory for DMA from Xen 57ac6316-don-t-restrict-DMA-heap-to-node-0.patch - bsc#978755 - xen uefi systems fail to boot - bsc#983697 - SLES12 SP2 Xen UEFI mode cannot boot 57b71fc5-x86-EFI-don-t-apply-relocations-to-l-2-3-_bootmap.patch - Upstream patch from Jan 57b7447b-dont-permit-guest-to-populate-PoD-pages-for-itself.patch- spec: to stay compatible with the in-tree qemu-xen binary, use /usr/bin/qemu-system-i386 instead of /usr/bin/qemu-system-x86_64 bsc#986164- bsc#970135 - new virtualization project clock test randomly fails on Xen 576001df-x86-time-use-local-stamp-in-TSC-calibration-fast-path.patch 5769106e-x86-generate-assembler-equates-for-synthesized.patch 57a1e603-x86-time-adjust-local-system-time-initialization.patch 57a1e64c-x86-time-introduce-and-use-rdtsc_ordered.patch 57a2f6ac-x86-time-calibrate-TSC-against-platform-timer.patch - bsc#991934 - xen hypervisor crash in csched_acct 57973099-have-schedulers-revise-initial-placement.patch 579730e6-remove-buggy-initial-placement-algorithm.patch - bsc#988675 - VUL-0: CVE-2016-6258: xen: x86: Privilege escalation in PV guests (XSA-182) 57976073-x86-remove-unsafe-bits-from-mod_lN_entry-fastpath.patch - bsc#988676 - VUL-0: CVE-2016-6259: xen: x86: Missing SMAP whitelisting in 32-bit exception / event delivery (XSA-183) 57976078-x86-avoid-SMAP-violation-in-compat_create_bounce_frame.patch - Upstream patches from Jan 57a30261-x86-support-newer-Intel-CPU-models.patch- bsc#985503 - vif-route broken vif-route.patch- bsc#978413 - PV guest upgrade from sles11sp4 to sles12sp2 alpha3 failed on sles11sp4 xen host. pygrub-handle-one-line-menu-entries.patch- bsc#990843 - VUL-1: CVE-2016-6351: xen: qemu: scsi: esp: OOB write access in esp_do_dma CVE-2016-6351-qemut-scsi-esp-make-cmdbuf-big-enough-for-maximum-CDB-size.patch- bsc#900418 - Dump cannot be performed on SLES12 XEN 57580bbd-kexec-allow-relaxed-placement-via-cmdline.patch - Upstream patches from Jan 575e9ca0-nested-vmx-Validate-host-VMX-MSRs-before-accessing-them.patch 57640448-xen-sched-use-default-scheduler-upon-an-invalid-sched.patch- fate#319989 - Update to Xen 4.7 FCS xen-4.7.0-testing-src.tar.bz2 - Drop CVE-2014-3672-qemut-xsa180.patch- bsc#954872 - script block-dmmd not working as expected - libxl: error: libxl_dm.c (Additional fixes) block-dmmd- Convert with_stubdom into build_conditional to allow adjusting via prjconf - Convert with_debug into build_conditional to allow adjusting via prjconf- bsc#979002 - add 60-persistent-xvd.rules and helper script to xen-tools-domU to simplify transition to pvops based kernels- Convert with_oxenstored into build_conditional to allow adjusting via prjconf (fate#320836)- bsc#983984 - VUL-0: CVE-2016-5338: xen: qemu: scsi: esp: OOB r/w access while processing ESP_FIFO CVE-2016-5338-qemut-scsi-esp-OOB-rw-access-while-processing-ESP_FIFO.patch - bsc#982960 - VUL-0: CVE-2016-5238: xen: qemu: scsi: esp: OOB write when using non-DMA mode in get_cmd CVE-2016-5238-qemut-scsi-esp-OOB-write-when-using-non-DMA-mode-in-get_cmd.patch- fate#319989 - Update to Xen 4.7 RC5 xen-4.7.0-testing-src.tar.bz2- fate#319989 - Update to Xen 4.7 RC4 xen-4.7.0-testing-src.tar.bz2 - Dropped xen.pkgconfig-4.7.patch xsa164.patch- bsc#981264 - VUL-0: CVE-2014-3672: xen: Unrestricted qemu logging (XSA-180) CVE-2014-3672-qemut-xsa180.patch- bsc#980724 - VUL-0: CVE-2016-4441: Qemu: scsi: esp: OOB write while writing to 's->cmdbuf' in get_cmd CVE-2016-4441-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-get_cmd.patch - bsc#980716 - VUL-0: CVE-2016-4439: xen: scsi: esp: OOB write while writing to 's->cmdbuf' in esp_reg_write CVE-2016-4439-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-esp_reg_write.patch- fate#319989 - Update to Xen 4.7 RC3 xen-4.7.0-testing-src.tar.bz2 - Dropped libxl-remove-cdrom-cachemode.patch x86-PoD-only-reclaim-if-needed.patch gcc6-warnings-as-errors.patch- bsc#954872 - script block-dmmd not working as expected - libxl: error: libxl_dm.c (another modification) block-dmmd- fate#319989 - Update to Xen 4.7 RC2 xen-4.7.0-testing-src.tar.bz2- bsc#961600 - L3: poor performance when Xen HVM domU configured with max memory > current memory x86-PoD-only-reclaim-if-needed.patch- Mark SONAMEs and pkgconfig as xen 4.7 xen.pkgconfig-4.7.patch- bsc#977329 - Xen: Cannot boot HVM guests with empty cdrom libxl-remove-cdrom-cachemode.patch- fate#319989 - Update to Xen 4.7 RC1 xen-4.7.0-testing-src.tar.bz2- fate#316614: set migration constraints from cmdline restore libxl.set-migration-constraints-from-cmdline.patch- Remove obsolete patch for xen-kmp magic_ioport_compat.patch- fate#316613: update to v12 libxl.pvscsi.patch- Update to the latest Xen 4.7 pre-release c2994f86 Drop libxl.migrate-legacy-stream-read.patch- bnc#972756 - Can't migrate HVM guest from SLES12SP1 Xen host to SLES12SP2 Alpha 1 host using xl migrate libxl.migrate-legacy-stream-read.patch- Add patches from proposed upstream series to load BIOS's from the toolstack instead of embedding in hvmloader http://lists.xenproject.org/archives/html/xen-devel/2016-03/msg01626.html 0001-libxc-Rework-extra-module-initialisation.patch, 0002-libxc-Prepare-a-start-info-structure-for-hvmloader.patch, 0003-configure-define-SEABIOS_PATH-and-OVMF_PATH.patch, 0004-firmware-makefile-install-BIOS-blob.patch, 0005-libxl-Load-guest-BIOS-from-file.patch, 0006-xen-Move-the-hvm_start_info-C-representation-from-li.patch, 0007-hvmloader-Grab-the-hvm_start_info-pointer.patch, 0008-hvmloader-Locate-the-BIOS-blob.patch, 0009-hvmloader-Check-modules-whereabouts-in-perform_tests.patch, 0010-hvmloader-Load-SeaBIOS-from-hvm_start_info-modules.patch, 0011-hvmloader-Load-OVMF-from-modules.patch, 0012-hvmloader-Specific-bios_load-function-required.patch, 0013-hvmloader-Always-build-in-SeaBIOS-and-OVMF-loader.patch, 0014-configure-do-not-depend-on-SEABIOS_PATH-or-OVMF_PATH.patch - Enable support for UEFI on x86_64 using the ovmf-x86_64-ms.bin firmware from qemu-ovmf-x86_64. The firmware is preloaded with Microsoft keys to more closely resemble firmware on real hardware FATE#320490- fate#319989: Update to Xen 4.7 (pre-release) xen-4.7.0-testing-src.tar.bz2 - Dropped: xen-4.6.1-testing-src.tar.bz2 55f7f9d2-libxl-slightly-refine-pci-assignable-add-remove-handling.patch 5628fc67-libxl-No-emulated-disk-driver-for-xvdX-disk.patch 5644b756-x86-HVM-don-t-inject-DB-with-error-code.patch 5649bcbe-libxl-relax-readonly-check-introduced-by-XSA-142-fix.patch hotplug-Linux-block-performance-fix.patch set-mtu-from-bridge-for-tap-interface.patch xendomains-libvirtd-conflict.patch xsa154.patch xsa155-xen-0001-xen-Add-RING_COPY_REQUEST.patch xsa155-xen-0002-blktap2-Use-RING_COPY_REQUEST.patch xsa155-xen-0003-libvchan-Read-prod-cons-only-once.patch xsa170.patch- Use system SeaBIOS instead of building/installing another one FATE#320638 Dropped files: seabios-dir-remote.tar.bz2 xen-c99-fix.patch xen.build-compare.seabios.patch- spec: drop BuildRequires that were only needed for qemu-xen- bsc#969377 - xen does not build with GCC 6 ipxe-use-rpm-opt-flags.patch gcc6-warnings-as-errors.patch- bsc#969351 - VUL-0: CVE-2016-2841: xen: net: ne2000: infinite loop in ne2000_receive CVE-2016-2841-qemut-ne2000-infinite-loop-in-ne2000_receive.patch - Drop xsa154-fix.patch- Use system qemu instead of building/installing yet another qemu FATE#320638 - Dropped files qemu-xen-dir-remote.tar.bz2 CVE-2014-0222-qemuu-qcow1-validate-l2-table-size.patch CVE-2015-1779-qemuu-incrementally-decode-websocket-frames.patch CVE-2015-1779-qemuu-limit-size-of-HTTP-headers-from-websockets-clients.patch CVE-2015-4037-qemuu-smb-config-dir-name.patch CVE-2015-7512-qemuu-net-pcnet-buffer-overflow-in-non-loopback-mode.patch CVE-2015-7549-qemuu-pci-null-pointer-dereference-issue.patch CVE-2015-8345-qemuu-eepro100-infinite-loop-fix.patch CVE-2015-8504-qemuu-vnc-avoid-floating-point-exception.patch CVE-2015-8558-qemuu-usb-infinite-loop-in-ehci_advance_state-results-in-DoS.patch CVE-2015-8568-qemuu-net-vmxnet3-avoid-memory-leakage-in-activate_device.patch CVE-2015-8613-qemuu-scsi-initialise-info-object-with-appropriate-size.patch CVE-2015-8743-qemuu-ne2000-OOB-memory-access-in-ioport-rw-functions.patch CVE-2015-8744-qemuu-net-vmxnet3-incorrect-l2-header-validation-leads-to-crash.patch CVE-2015-8745-qemuu-net-vmxnet3-read-IMR-registers-instead-of-assert.patch CVE-2016-1568-qemuu-ide-ahci-reset-ncq-object-to-unused-on-error.patch CVE-2016-1714-qemuu-fw_cfg-add-check-to-validate-current-entry-value.patch CVE-2014-7815-qemut-vnc-sanitize-bits_per_pixel-from-the-client.patch CVE-2016-1981-qemuu-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch CVE-2016-2538-qemuu-usb-integer-overflow-in-remote-NDIS-message-handling.patch CVE-2015-8619-qemuu-stack-based-OOB-write-in-hmp_sendkey-routine.patch qemu-xen-enable-spice-support.patch qemu-xen-upstream-qdisk-cache-unsafe.patch tigervnc-long-press.patch xsa162-qemuu.patch- bsc#962321 - VUL-0: CVE-2016-1922: xen: i386: null pointer dereference in vapic_write() CVE-2016-1922-qemuu-i386-null-pointer-dereference-in-vapic_write.patch- bsc#968004 - VUL-0: CVE-2016-2538: xen: usb: integer overflow in remote NDIS control message handling CVE-2016-2538-qemuu-usb-integer-overflow-in-remote-NDIS-message-handling.patch- bsc#954872 - L3: script block-dmmd not working as expected - libxl: error: libxl_dm.c block-dmmd - Update libxl to recognize dmmd and npiv prefix in disk spec xen.libxl.dmmd.patch- bsc#967101 - VUL-0: CVE-2016-2391: xen: usb: multiple eof_timers in ohci module leads to null pointer dereference CVE-2016-2391-qemuu-usb-null-pointer-dereference-in-ohci-module.patch CVE-2016-2391-qemut-usb-null-pointer-dereference-in-ohci-module.patch - bsc#967090 - VUL-0: CVE-2016-2392: xen: usb: null pointer dereference in remote NDIS control message handling CVE-2016-2392-qemuu-usb-null-pointer-dereference-in-NDIS-message-handling.patch- Update to Xen Version 4.6.1 xen-4.6.1-testing-src.tar.bz2 - Dropped patches now contained in tarball or unnecessary xen-4.6.0-testing-src.tar.bz2 5604f239-x86-PV-properly-populate-descriptor-tables.patch 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-it-is-zero.patch 561d2046-VT-d-use-proper-error-codes-in-iommu_enable_x2apic_IR.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-parsing-and-consumption.patch 5632118e-arm-Support-hypercall_create_continuation-for-multicall.patch 56321222-arm-rate-limit-logging-from-unimplemented-PHYSDEVOP-and-HVMOP.patch 56321249-arm-handle-races-between-relinquish_memory-and-free_domheap_pages.patch 5632127b-x86-guard-against-undue-super-page-PTE-creation.patch 5632129c-free-domain-s-vcpu-array.patch 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch 563212e4-xenoprof-free-domain-s-vcpu-array.patch 563212ff-x86-rate-limit-logging-in-do_xen-oprof-pmu-_op.patch 56323737-libxl-adjust-PoD-target-by-memory-fudge-too.patch 56377442-x86-PoD-Make-p2m_pod_empty_cache-restartable.patch 5641ceec-x86-HVM-always-intercept-AC-and-DB.patch 56549f24-x86-vPMU-document-as-unsupported.patch 5677f350-x86-make-debug-output-consistent-in-hvm_set_callback_via.patch xsa155-qemut-qdisk-double-access.patch xsa155-qemut-xenfb.patch xsa155-qemuu-qdisk-double-access.patch xsa155-qemuu-xenfb.patch xsa159.patch xsa160.patch xsa162-qemut.patch xsa165.patch xsa166.patch xsa167.patch xsa168.patch- bsc#965315 - VUL-0: CVE-2016-2270: xen: x86: inconsistent cachability flags on guest mappings (XSA-154) xsa154.patch - bsc#965317 - VUL-0: CVE-2016-2271: xen: VMX: guest user mode may crash guest with non-canonical RIP (XSA-170) xsa170.patch- bsc#965269 - VUL-1: CVE-2015-8619: xen: stack based OOB write in hmp_sendkey routine CVE-2015-8619-qemuu-stack-based-OOB-write-in-hmp_sendkey-routine.patch- bsc#965156 - VUL-0: CVE-2015-6855: xen: ide: divide by zero issue CVE-2015-6855-qemuu-ide-divide-by-zero-issue.patch - bsc#965112 - VUL-0: CVE-2014-3640: xen: slirp: NULL pointer deref in sosendto() CVE-2014-3640-qemut-slirp-NULL-pointer-deref-in-sosendto.patch- bsc#964947 - VUL-0: CVE-2015-5278: xen: Infinite loop in ne2000_receive() function CVE-2015-5278-qemut-Infinite-loop-in-ne2000_receive-function.patch - bsc#956832 - VUL-0: CVE-2015-8345: xen: qemu: net: eepro100: infinite loop in processing command block list CVE-2015-8345-qemuu-eepro100-infinite-loop-fix.patch CVE-2015-8345-qemut-eepro100-infinite-loop-fix.patch- bsc#964644 - VUL-0: CVE-2013-4533: xen pxa2xx: buffer overrun on incoming migration CVE-2013-4533-qemut-pxa2xx-buffer-overrun-on-incoming-migration.patch - bsc#964925 - VUL-0: CVE-2014-0222: xen: qcow1: validate L2 table size to avoid integer overflows CVE-2014-0222-blktap-qcow1-validate-l2-table-size.patch - Dropped CVE-2014-0222-qemuu-qcow1-validate-l2-table-size.patch- bsc#964415 - VUL-1: CVE-2016-2198: xen: usb: ehci null pointer dereference in ehci_caps_write CVE-2016-2198-qemuu-usb-ehci-null-pointer-dereference-in-ehci_caps_write.patch - bsc#964452 - VUL-0: CVE-2013-4534: xen: openpic: buffer overrun on incoming migration CVE-2013-4534-qemut-openpic-buffer-overrun-on-incoming-migration.patch- bsc#963783 - VUL-1: CVE-2016-1981: xen: net: e1000 infinite loop in start_xmit and e1000_receive_iov routines CVE-2016-1981-qemuu-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch CVE-2016-1981-qemut-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch- bsc#962758 - VUL-0: CVE-2013-4539: xen: tsc210x: buffer overrun on invalid state load CVE-2013-4539-qemut-tsc210x-fix-buffer-overrun-on-invalid-state-load.patch- bsc#962632 - VUL-0: CVE-2015-1779: xen: vnc: insufficient resource limiting in VNC websockets decoder CVE-2015-1779-qemuu-limit-size-of-HTTP-headers-from-websockets-clients.patch CVE-2015-1779-qemuu-incrementally-decode-websocket-frames.patch - bsc#962642 - VUL-0: CVE-2013-4537: xen: ssi-sd: buffer overrun on invalid state load CVE-2013-4537-qemut-ssi-sd-fix-buffer-overrun-on-invalid-state-load.patch - bsc#962627 - VUL-0: CVE-2014-7815: xen: vnc: insufficient bits_per_pixel from the client sanitization CVE-2014-7815-qemut-vnc-sanitize-bits_per_pixel-from-the-client.patch- bsc#962335 - VUL-0: CVE-2013-4538: xen: ssd0323: fix buffer overun on invalid state CVE-2013-4538-qemut-ssd0323-fix-buffer-overun-on-invalid-state.patch - bsc#962360 - VUL-0: CVE-2015-7512: xen: net: pcnet: buffer overflow in non-loopback mode CVE-2015-7512-qemuu-net-pcnet-buffer-overflow-in-non-loopback-mode.patch CVE-2015-7512-qemut-net-pcnet-buffer-overflow-in-non-loopback-mode.patch- bsc#961692 - VUL-0: CVE-2016-1714: xen: nvram: OOB r/w access in processing firmware configurations CVE-2016-1714-qemuu-fw_cfg-add-check-to-validate-current-entry-value.patch CVE-2016-1714-qemut-fw_cfg-add-check-to-validate-current-entry-value.patch- bsc#961358 - VUL-0: CVE-2015-8613: xen: qemu: scsi: stack based buffer overflow in megasas_ctrl_get_info CVE-2015-8613-qemuu-scsi-initialise-info-object-with-appropriate-size.patch - bsc#961332 - VUL-0: CVE-2016-1568: xen: Qemu: ide: ahci use-after-free vulnerability in aio port commands CVE-2016-1568-qemuu-ide-ahci-reset-ncq-object-to-unused-on-error.patch- bsc#959695 - missing docs for xen xen.spec- bsc#960862 - VUL-0: CVE-2016-1571: xen: VMX: intercept issue with INVLPG on non-canonical address (XSA-168) xsa168.patch - bsc#960861 - VUL-0: CVE-2016-1570: xen: PV superpage functionality missing sanity checks (XSA-167) xsa167.patch - bsc#960836 - VUL-0: CVE-2015-8744: xen: net: vmxnet3: incorrect l2 header validation leads to a crash via assert(2) call CVE-2015-8744-qemuu-net-vmxnet3-incorrect-l2-header-validation-leads-to-crash.patch- bsc#960707 - VUL-0: CVE-2015-8745: xen: reading IMR registers leads to a crash via assert(2) call CVE-2015-8745-qemuu-net-vmxnet3-read-IMR-registers-instead-of-assert.patch - bsc#960726 - VUL-0: CVE-2015-8743: xen: ne2000: OOB memory access in ioport r/w functions CVE-2015-8743-qemuu-ne2000-OOB-memory-access-in-ioport-rw-functions.patch- bsc#960093 - VUL-0: CVE-2015-8615: xen: x86: unintentional logging upon guest changing callback method (XSA-169) 5677f350-x86-make-debug-output-consistent-in-hvm_set_callback_via.patch- Adjust xen-dom0-modules.service to run Before xenstored.service instead of proc-xen.mount to workaround a bug in systemd "design" (bnc#959845)- bsc#959387 - VUL-0: CVE-2015-8568 CVE-2015-8567: xen: qemu: net: vmxnet3: host memory leakage CVE-2015-8568-qemuu-net-vmxnet3-avoid-memory-leakage-in-activate_device.patch- bsc#957988 - VUL-0: CVE-2015-8550: xen: paravirtualized drivers incautious about shared memory contents (XSA-155) xsa155-xen-0001-xen-Add-RING_COPY_REQUEST.patch xsa155-xen-0002-blktap2-Use-RING_COPY_REQUEST.patch xsa155-xen-0003-libvchan-Read-prod-cons-only-once.patch xsa155-qemuu-qdisk-double-access.patch xsa155-qemut-qdisk-double-access.patch xsa155-qemuu-xenfb.patch xsa155-qemut-xenfb.patch - bsc#959006 - VUL-0: CVE-2015-8558: xen: qemu: usb: infinite loop in ehci_advance_state results in DoS CVE-2015-8558-qemuu-usb-infinite-loop-in-ehci_advance_state-results-in-DoS.patch - bsc#958918 - VUL-0: CVE-2015-7549: xen: qemu pci: null pointer dereference issue CVE-2015-7549-qemuu-pci-null-pointer-dereference-issue.patch - bsc#958493 - VUL-0: CVE-2015-8504: xen: qemu: ui: vnc: avoid floating point exception CVE-2015-8504-qemuu-vnc-avoid-floating-point-exception.patch CVE-2015-8504-qemut-vnc-avoid-floating-point-exception.patch - bsc#958007 - VUL-0: CVE-2015-8554: xen: qemu-dm buffer overrun in MSI-X handling (XSA-164) xsa164.patch - bsc#958009 - VUL-0: CVE-2015-8555: xen: information leak in legacy x86 FPU/XMM initialization (XSA-165) xsa165.patch - bsc#958523 - VUL-0: xen: ioreq handling possibly susceptible to multiple read issue (XSA-166) xsa166.patch- bsc#956832 - VUL-0: CVE-2015-8345: xen: qemu: net: eepro100: infinite loop in processing command block list CVE-2015-8345-qemuu-eepro100-infinite-loop-fix.patch CVE-2015-8345-qemut-eepro100-infinite-loop-fix.patch - Upstream patches from Jan 56377442-x86-PoD-Make-p2m_pod_empty_cache-restartable.patch 5641ceec-x86-HVM-always-intercept-AC-and-DB.patch (Replaces CVE-2015-5307-xsa156.patch) 5644b756-x86-HVM-don-t-inject-DB-with-error-code.patch 56544a57-VMX-fix-adjust-trap-injection.patch 56546ab2-sched-fix-insert_vcpu-locking.patch- bsc#956592 - VUL-0: xen: virtual PMU is unsupported (XSA-163) 56549f24-x86-vPMU-document-as-unsupported.patch - bsc#956408 - VUL-0: CVE-2015-8339, CVE-2015-8340: xen: XENMEM_exchange error handling issues (XSA-159) xsa159.patch - bsc#956409 - VUL-0: CVE-2015-8341: xen: libxl leak of pv kernel and initrd on error (XSA-160) xsa160.patch - bsc#956411 - VUL-0: CVE-2015-7504: xen: heap buffer overflow vulnerability in pcnet emulator (XSA-162) xsa162-qemuu.patch xsa162-qemut.patch - bsc#947165 - VUL-0: CVE-2015-7311: xen: libxl fails to honour readonly flag on disks with qemu-xen (xsa-142) 5628fc67-libxl-No-emulated-disk-driver-for-xvdX-disk.patch 5649bcbe-libxl-relax-readonly-check-introduced-by-XSA-142-fix.patch- fate#315712: XEN: Use the PVOPS kernel Turn off building the KMPs now that we are using the pvops kernel xen.spec- Upstream patches from Jan 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-it-is-zero.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-parsing-and-consumption.patch 5632118e-arm-Support-hypercall_create_continuation-for-multicall.patch 56321222-arm-rate-limit-logging-from-unimplemented-PHYSDEVOP-and-HVMOP.patch 56321249-arm-handle-races-between-relinquish_memory-and-free_domheap_pages.patch 5632127b-x86-guard-against-undue-super-page-PTE-creation.patch 5632129c-free-domain-s-vcpu-array.patch (Replaces CVE-2015-7969-xsa149.patch) 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch 563212e4-xenoprof-free-domain-s-vcpu-array.patch 563212ff-x86-rate-limit-logging-in-do_xen-oprof-pmu-_op.patch 56323737-libxl-adjust-PoD-target-by-memory-fudge-too.patch 56377442-x86-PoD-Make-p2m_pod_empty_cache-restartable.patch 5641ceec-x86-HVM-always-intercept-AC-and-DB.patch (Replaces CVE-2015-5307-xsa156.patch) 5644b756-x86-HVM-don-t-inject-DB-with-error-code.patch - Dropped 55b0a2db-x86-MSI-track-guest-masking.patch- Use upstream variants of block-iscsi and block-nbd- Remove xenalyze.hg, its part of xen-4.6- Update to Xen Version 4.6.0 xen-4.6.0-testing-src.tar.bz2 mini-os.tar.bz2 blktap2-no-uninit.patch stubdom-have-iovec.patch - Renamed xsa149.patch to CVE-2015-7969-xsa149.patch - Dropped patches now contained in tarball or unnecessary xen-4.5.2-testing-src.tar.bz2 54c2553c-grant-table-use-uint16_t-consistently-for-offset-and-length.patch 54ca33bc-grant-table-refactor-grant-copy-to-reduce-duplicate-code.patch 54ca340e-grant-table-defer-releasing-pages-acquired-in-a-grant-copy.patch 54f4985f-libxl-fix-libvirtd-double-free.patch 55103616-vm-assist-prepare-for-discontiguous-used-bit-numbers.patch 551ac326-xentop-add-support-for-qdisk.patch 552d0fd2-x86-hvm-don-t-include-asm-spinlock-h.patch 552d0fe8-x86-mtrr-include-asm-atomic.h.patch 552d293b-x86-vMSI-X-honor-all-mask-requests.patch 552d2966-x86-vMSI-X-add-valid-bits-for-read-acceleration.patch 5537a4d8-libxl-use-DEBUG-log-level-instead-of-INFO.patch 5548e903-domctl-don-t-truncate-XEN_DOMCTL_max_mem-requests.patch 5548e95d-x86-allow-to-suppress-M2P-user-mode-exposure.patch 554c7aee-x86-provide-arch_fetch_and_add.patch 554c7b00-arm-provide-arch_fetch_and_add.patch 554cc211-libxl-add-qxl.patch 55534b0a-x86-provide-add_sized.patch 55534b25-arm-provide-add_sized.patch 5555a4f8-use-ticket-locks-for-spin-locks.patch 5555a5b9-x86-arm-remove-asm-spinlock-h.patch 5555a8ec-introduce-non-contiguous-allocation.patch 556d973f-unmodified-drivers-tolerate-IRQF_DISABLED-being-undefined.patch 5576f143-x86-adjust-PV-I-O-emulation-functions-types.patch 55795a52-x86-vMSI-X-support-qword-MMIO-access.patch 557eb55f-gnttab-per-active-entry-locking.patch 557eb5b6-gnttab-introduce-maptrack-lock.patch 557eb620-gnttab-make-the-grant-table-lock-a-read-write-lock.patch 557ffab8-evtchn-factor-out-freeing-an-event-channel.patch 5582bf43-evtchn-simplify-port_is_valid.patch 5582bf81-evtchn-remove-the-locking-when-unmasking-an-event-channel.patch 5583d9c5-x86-MSI-X-cleanup.patch 5583da09-x86-MSI-track-host-and-guest-masking-separately.patch 5583da64-gnttab-use-per-VCPU-maptrack-free-lists.patch 5583da8c-gnttab-steal-maptrack-entries-from-other-VCPUs.patch 5587d711-evtchn-clear-xen_consumer-when-clearing-state.patch 5587d779-evtchn-defer-freeing-struct-evtchn-s-until-evtchn_destroy_final.patch 5587d7b7-evtchn-use-a-per-event-channel-lock-for-sending-events.patch 5587d7e2-evtchn-pad-struct-evtchn-to-64-bytes.patch 55b0a218-x86-PCI-CFG-write-intercept.patch 55b0a255-x86-MSI-X-maskall.patch 55b0a283-x86-MSI-X-teardown.patch 55b0a2ab-x86-MSI-X-enable.patch blktapctrl-close-fifos.patch blktapctrl-default-to-ioemu.patch blktapctrl-disable-debug-printf.patch blktap-no-uninit.patch blktap-pv-cdrom.patch build-tapdisk-ioemu.patch ioemu-bdrv-open-CACHE_WB.patch ioemu-blktap-barriers.patch ioemu-blktap-fv-init.patch ioemu-blktap-image-format.patch ioemu-blktap-zero-size.patch libxl.set-migration-constraints-from-cmdline.patch local_attach_support_for_phy.patch pci-attach-fix.patch qemu-xen-upstream-megasas-buildtime.patch tapdisk-ioemu-logfile.patch tapdisk-ioemu-shutdown-fix.patch udev-rules.patch xen.build-compare.ipxe.patch xen.build-compare.mini-os.patch xen.build-compare.smbiosdate.patch xen.build-compare.vgabios.patch xen.build-compare.xen_compile_h.patch xl-coredump-file-location.patch- bsc#954405 - VUL-0: CVE-2015-8104: Xen: guest to host DoS by triggering an infinite loop in microcode via #DB exception - bsc#954018 - VUL-0: CVE-2015-5307: xen: x86: CPU lockup during fault delivery (XSA-156) CVE-2015-5307-xsa156.patch- Update to Xen 4.5.2 xen-4.5.2-testing-src.tar.bz2 - Drop the following xen-4.5.1-testing-src.tar.bz2 552d0f49-x86-traps-identify-the-vcpu-in-context-when-dumping-regs.patch 5576f178-kexec-add-more-pages-to-v1-environment.patch 55780be1-x86-EFI-adjust-EFI_MEMORY_WP-handling-for-spec-version-2.5.patch 558bfaa0-x86-traps-avoid-using-current-too-early.patch 5592a116-nested-EPT-fix-the-handling-of-nested-EPT.patch 559b9dd6-x86-p2m-ept-don-t-unmap-in-use-EPT-pagetable.patch 559bc633-x86-cpupool-clear-proper-cpu_valid-bit-on-CPU-teardown.patch 559bc64e-credit1-properly-deal-with-CPUs-not-in-any-pool.patch 559bc87f-x86-hvmloader-avoid-data-corruption-with-xenstore-rw.patch 559bdde5-pull-in-latest-linux-earlycpio.patch 55a62eb0-xl-correct-handling-of-extra_config-in-main_cpupoolcreate.patch 55a66a1e-make-rangeset_report_ranges-report-all-ranges.patch 55a77e4f-dmar-device-scope-mem-leak-fix.patch 55c1d83d-x86-gdt-Drop-write-only-xalloc-d-array.patch 55c3232b-x86-mm-Make-hap-shadow-teardown-preemptible.patch 55dc78e9-x86-amd_ucode-skip-updates-for-final-levels.patch 55df2f76-IOMMU-skip-domains-without-page-tables-when-dumping.patch 55e43fd8-x86-NUMA-fix-setup_node.patch 55e43ff8-x86-NUMA-don-t-account-hotplug-regions.patch 55e593f1-x86-NUMA-make-init_node_heap-respect-Xen-heap-limit.patch 55f2e438-x86-hvm-fix-saved-pmtimer-and-hpet-values.patch 55f9345b-x86-MSI-fail-if-no-hardware-support.patch 5604f2e6-vt-d-fix-IM-bit-mask-and-unmask-of-FECTL_REG.patch 560a4af9-x86-EPT-tighten-conditions-of-IOMMU-mapping-updates.patch 560a7c36-x86-p2m-pt-delay-freeing-of-intermediate-page-tables.patch 560a7c53-x86-p2m-pt-ignore-pt-share-flag-for-shadow-mode-guests.patch 560bd926-credit1-fix-tickling-when-it-happens-from-a-remote-pCPU.patch 560e6d34-x86-p2m-pt-tighten-conditions-of-IOMMU-mapping-updates.patch 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-0.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-handling.patch 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch CVE-2015-4106-xsa131-9.patch CVE-2015-3259-xsa137.patch CVE-2015-7311-xsa142.patch CVE-2015-7835-xsa148.patch xsa139-qemuu.patch xsa140-qemuu-1.patch xsa140-qemuu-2.patch xsa140-qemuu-3.patch xsa140-qemuu-4.patch xsa140-qemuu-5.patch xsa140-qemuu-6.patch xsa140-qemuu-7.patch xsa140-qemut-1.patch xsa140-qemut-2.patch xsa140-qemut-3.patch xsa140-qemut-4.patch xsa140-qemut-5.patch xsa140-qemut-6.patch xsa140-qemut-7.patch xsa151.patch xsa152.patch xsa153-libxl.patch CVE-2015-5154-qemuu-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemuu-fix-START-STOP-UNIT-command-completion.patch CVE-2015-5154-qemuu-clear-DRQ-after-handling-all-expected-accesses.patch CVE-2015-5154-qemut-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemut-clear-DRQ-after-handling-all-expected-accesses.patch CVE-2015-6815-qemuu-e1000-fix-infinite-loop.patch CVE-2015-5239-qemuu-limit-client_cut_text-msg-payload-size.patch CVE-2015-5239-qemut-limit-client_cut_text-msg-payload-size.patch"- bsc#950704 - CVE-2015-7970 VUL-1: xen: x86: Long latency populate-on-demand operation is not preemptible (XSA-150) 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch- Upstream patches from Jan 5604f239-x86-PV-properly-populate-descriptor-tables.patch 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-0.patch 561d2046-VT-d-use-proper-error-codes-in-iommu_enable_x2apic_IR.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-handling.patch- bsc#951845 - VUL-0: CVE-2015-7972: xen: x86: populate-on-demand balloon size inaccuracy can crash guests (XSA-153) xsa153-libxl.patch- bsc#950703 - VUL-1: CVE-2015-7969: xen: leak of main per-domain vcpu pointer array (DoS) (XSA-149) xsa149.patch - bsc#950705 - VUL-1: CVE-2015-7969: xen: x86: leak of per-domain profiling-related vcpu pointer array (DoS) (XSA-151) xsa151.patch - bsc#950706 - VUL-0: CVE-2015-7971: xen: x86: some pmu and profiling hypercalls log without rate limiting (XSA-152) xsa152.patch - Dropped 55dc7937-x86-IO-APIC-don-t-create-pIRQ-mapping-from-masked-RTE.patch 5604f239-x86-PV-properly-populate-descriptor-tables.patch- bsc#932267 - VUL-1: CVE-2015-4037: qemu,kvm,xen: insecure temporary file use in /net/slirp.c CVE-2015-4037-qemuu-smb-config-dir-name.patch CVE-2015-4037-qemut-smb-config-dir-name.patch - bsc#877642 - VUL-0: CVE-2014-0222: qemu: qcow1: validate L2 table size to avoid integer overflows CVE-2014-0222-qemuu-qcow1-validate-l2-table-size.patch CVE-2014-0222-qemut-qcow1-validate-l2-table-size.patch- bsc#950367 - VUL-0: CVE-2015-7835: xen: x86: Uncontrolled creation of large page mappings by PV guests (XSA-148) CVE-2015-7835-xsa148.patch- bsc#949138 - Setting vcpu affinity under Xen causes libvirtd abort 54f4985f-libxl-fix-libvirtd-double-free.patch- bsc#949046 - Increase %suse_version in SP1 to 1316 xen.spec - Update README.SUSE detailing dom0 ballooning recommendations- bsc#945167 - Running command ’ xl pci-assignable-add 03:10.1’ secondly show errors 55f7f9d2-libxl-slightly-refine-pci-assignable-add-remove-handling.patch - Upstream patches from Jan 55f2e438-x86-hvm-fix-saved-pmtimer-and-hpet-values.patch 55f9345b-x86-MSI-fail-if-no-hardware-support.patch 5604f239-x86-PV-properly-populate-descriptor-tables.patch 5604f2e6-vt-d-fix-IM-bit-mask-and-unmask-of-FECTL_REG.patch 560a4af9-x86-EPT-tighten-conditions-of-IOMMU-mapping-updates.patch 560a7c36-x86-p2m-pt-delay-freeing-of-intermediate-page-tables.patch 560a7c53-x86-p2m-pt-ignore-pt-share-flag-for-shadow-mode-guests.patch 560bd926-credit1-fix-tickling-when-it-happens-from-a-remote-pCPU.patch 560e6d34-x86-p2m-pt-tighten-conditions-of-IOMMU-mapping-updates.patch- bsc#941074 - VmError: Device 51728 (vbd) could not be connected. Hotplug scripts not working. hotplug-Linux-block-performance-fix.patch- bsc#947165 - VUL-0: CVE-2015-7311: xen: libxl fails to honour readonly flag on disks with qemu-xen (xsa-142) CVE-2015-7311-xsa142.patch- bsc#945165 - Xl pci-attach show error with kernel of SLES 12 sp1 pci-attach-fix.patch- bsc#945164 - Xl destroy show error with kernel of SLES 12 sp1 5537a4d8-libxl-use-DEBUG-log-level-instead-of-INFO.patch- Upstream patches from Jan 55dc78e9-x86-amd_ucode-skip-updates-for-final-levels.patch 55dc7937-x86-IO-APIC-don-t-create-pIRQ-mapping-from-masked-RTE.patch 55df2f76-IOMMU-skip-domains-without-page-tables-when-dumping.patch 55e43fd8-x86-NUMA-fix-setup_node.patch 55e43ff8-x86-NUMA-don-t-account-hotplug-regions.patch 55e593f1-x86-NUMA-make-init_node_heap-respect-Xen-heap-limit.patch 54c2553c-grant-table-use-uint16_t-consistently-for-offset-and-length.patch 54ca33bc-grant-table-refactor-grant-copy-to-reduce-duplicate-code.patch 54ca340e-grant-table-defer-releasing-pages-acquired-in-a-grant-copy.patch- bsc#944463 - VUL-0: CVE-2015-5239: qemu-kvm: Integer overflow in vnc_client_read() and protocol_client_msg() CVE-2015-5239-qemuu-limit-client_cut_text-msg-payload-size.patch CVE-2015-5239-qemut-limit-client_cut_text-msg-payload-size.patch - bsc#944697 - VUL-1: CVE-2015-6815: qemu: net: e1000: infinite loop issue CVE-2015-6815-qemuu-e1000-fix-infinite-loop.patch CVE-2015-6815-qemut-e1000-fix-infinite-loop.patch- bnc#935634 - VUL-0: CVE-2015-3259: xen: XSA-137: xl command line config handling stack overflow 55a62eb0-xl-correct-handling-of-extra_config-in-main_cpupoolcreate.patch- bsc#907514 - Bus fatal error & sles12 sudden reboot has been observed - bsc#910258 - SLES12 Xen host crashes with FATAL NMI after shutdown of guest with VT-d NIC - bsc#918984 - Bus fatal error & sles11-SP4 sudden reboot has been observed - bsc#923967 - Partner-L3: Bus fatal error & sles11-SP3 sudden reboot has been observed 552d293b-x86-vMSI-X-honor-all-mask-requests.patch 552d2966-x86-vMSI-X-add-valid-bits-for-read-acceleration.patch 5576f143-x86-adjust-PV-I-O-emulation-functions-types.patch 55795a52-x86-vMSI-X-support-qword-MMIO-access.patch 5583d9c5-x86-MSI-X-cleanup.patch 5583da09-x86-MSI-track-host-and-guest-masking-separately.patch 55b0a218-x86-PCI-CFG-write-intercept.patch 55b0a255-x86-MSI-X-maskall.patch 55b0a283-x86-MSI-X-teardown.patch 55b0a2ab-x86-MSI-X-enable.patch 55b0a2db-x86-MSI-track-guest-masking.patch - Upstream patches from Jan 552d0f49-x86-traps-identify-the-vcpu-in-context-when-dumping-regs.patch 559bc633-x86-cpupool-clear-proper-cpu_valid-bit-on-CPU-teardown.patch 559bc64e-credit1-properly-deal-with-CPUs-not-in-any-pool.patch 559bc87f-x86-hvmloader-avoid-data-corruption-with-xenstore-rw.patch 55a66a1e-make-rangeset_report_ranges-report-all-ranges.patch 55a77e4f-dmar-device-scope-mem-leak-fix.patch 55c1d83d-x86-gdt-Drop-write-only-xalloc-d-array.patch 55c3232b-x86-mm-Make-hap-shadow-teardown-preemptible.patch - Dropped for upstream version x86-MSI-mask.patch x86-MSI-pv-unmask.patch x86-MSI-X-enable.patch x86-MSI-X-maskall.patch x86-MSI-X-teardown.patch x86-pci_cfg_okay.patch x86-PCI-CFG-write-intercept.patch- bsc#939712 - VUL-0: XSA-140: QEMU leak of uninitialized heap memory in rtl8139 device model xsa140-qemuu-1.patch xsa140-qemuu-2.patch xsa140-qemuu-3.patch xsa140-qemuu-4.patch xsa140-qemuu-5.patch xsa140-qemuu-6.patch xsa140-qemuu-7.patch xsa140-qemut-1.patch xsa140-qemut-2.patch xsa140-qemut-3.patch xsa140-qemut-4.patch xsa140-qemut-5.patch xsa140-qemut-6.patch xsa140-qemut-7.patch - bsc#939709 - VUL-0: XSA-139: xen: Use after free in QEMU/Xen block unplug protocol xsa139-qemuu.patch- bsc#937371 - xen vm's running after reboot xendomains-libvirtd-conflict.patch- bsc#938344 - VUL-0: CVE-2015-5154: qemu,kvm,xen: host code execution via IDE subsystem CD-ROM CVE-2015-5154-qemuu-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemut-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemuu-fix-START-STOP-UNIT-command-completion.patch CVE-2015-5154-qemut-fix-START-STOP-UNIT-command-completion.patch CVE-2015-5154-qemuu-clear-DRQ-after-handling-all-expected-accesses.patch CVE-2015-5154-qemut-clear-DRQ-after-handling-all-expected-accesses.patch- Remove xendomains.service from systemd preset file because it conflicts with libvirt-guests.service (bnc#937371) Its up to the admin to run systemctl enable xendomains.service- bnc#935634 - VUL-0: CVE-2015-3259: xen: XSA-137: xl command line config handling stack overflow CVE-2015-3259-xsa137.patch - Upstream patches from Jan 558bfaa0-x86-traps-avoid-using-current-too-early.patch 5592a116-nested-EPT-fix-the-handling-of-nested-EPT.patch 559b9dd6-x86-p2m-ept-don-t-unmap-in-use-EPT-pagetable.patch 559bdde5-pull-in-latest-linux-earlycpio.patch - Upstream patches from Jan pending review 552d0fd2-x86-hvm-don-t-include-asm-spinlock-h.patch 552d0fe8-x86-mtrr-include-asm-atomic.h.patch 552d293b-x86-vMSI-X-honor-all-mask-requests.patch 552d2966-x86-vMSI-X-add-valid-bits-for-read-acceleration.patch 554c7aee-x86-provide-arch_fetch_and_add.patch 554c7b00-arm-provide-arch_fetch_and_add.patch 55534b0a-x86-provide-add_sized.patch 55534b25-arm-provide-add_sized.patch 5555a4f8-use-ticket-locks-for-spin-locks.patch 5555a5b9-x86-arm-remove-asm-spinlock-h.patch 5555a8ec-introduce-non-contiguous-allocation.patch 55795a52-x86-vMSI-X-support-qword-MMIO-access.patch 557eb55f-gnttab-per-active-entry-locking.patch 557eb5b6-gnttab-introduce-maptrack-lock.patch 557eb620-gnttab-make-the-grant-table-lock-a-read-write-lock.patch 557ffab8-evtchn-factor-out-freeing-an-event-channel.patch 5582bf43-evtchn-simplify-port_is_valid.patch 5582bf81-evtchn-remove-the-locking-when-unmasking-an-event-channel.patch 5583d9c5-x86-MSI-X-cleanup.patch 5583da09-x86-MSI-track-host-and-guest-masking-separately.patch 5583da64-gnttab-use-per-VCPU-maptrack-free-lists.patch 5583da8c-gnttab-steal-maptrack-entries-from-other-VCPUs.patch 5587d711-evtchn-clear-xen_consumer-when-clearing-state.patch 5587d779-evtchn-defer-freeing-struct-evtchn-s-until-evtchn_destroy_final.patch 5587d7b7-evtchn-use-a-per-event-channel-lock-for-sending-events.patch 5587d7e2-evtchn-pad-struct-evtchn-to-64-bytes.patch x86-MSI-pv-unmask.patch x86-pci_cfg_okay.patch x86-PCI-CFG-write-intercept.patch x86-MSI-X-maskall.patch x86-MSI-X-teardown.patch x86-MSI-X-enable.patch x86-MSI-mask.patch- Adjust more places to use br0 instead of xenbr0- bnc#936516 - xen fails to build with kernel update(4.1.0 from stable) 556d973f-unmodified-drivers-tolerate-IRQF_DISABLED-being-undefined.patch- Update to Xen Version 4.5.1 FCS (fate#315675) xen-4.5.1-testing-src.tar.bz2 - Dropped patches now contained in tarball 556c2cf2-x86-don-t-crash-mapping-a-page-using-EFI-rt-page-tables.patch 556d9718-efi-fix-allocation-problems-if-ExitBootServices-fails.patch 556eabf7-x86-apic-Disable-the-LAPIC-later-in-smp_send_stop.patch 556eac15-x86-crash-don-t-use-set_fixmap-in-the-crash-path.patch 55780aaa-efi-avoid-calling-boot-services-after-ExitBootServices.patch 55780aff-x86-EFI-fix-EFI_MEMORY_WP-handling.patch 55780b43-EFI-early-add-mapbs-to-map-EfiBootServices-Code-Data.patch 55780b97-EFI-support-default-attributes-to-map-Runtime-service-areas.patch 5513b458-allow-reboot-overrides-when-running-under-EFI.patch 5513b4d1-dont-apply-reboot-quirks-if-reboot-set-by-user.patch 5576f178-kexec-add-more-pages-to-v1-environment.patch 5535f633-dont-leak-hypervisor-stack-to-toolstacks.patch CVE-2015-3456-xsa133-qemuu.patch CVE-2015-3456-xsa133-qemut.patch qemu-MSI-X-enable-maskall.patch qemu-MSI-X-latch-writes.patch x86-MSI-X-guest-mask.patch- Replace 5124efbe-add-qxl-support.patch with the variant that finally made it upstream, 554cc211-libxl-add-qxl.patch- bsc#931627 - VUL-0: CVE-2015-4105: XSA-130: xen: Guest triggerable qemu MSI-X pass-through error messages qemu-MSI-X-latch-writes.patch - bsc#907514 - Bus fatal error & sles12 sudden reboot has been observed - bsc#910258 - SLES12 Xen host crashes with FATAL NMI after shutdown of guest with VT-d NIC - bsc#918984 - Bus fatal error & sles11-SP4 sudden reboot has been observed - bsc#923967 - Partner-L3: Bus fatal error & sles11-SP3 sudden reboot has been observed x86-MSI-X-teardown.patch x86-MSI-X-enable.patch x86-MSI-X-guest-mask.patch x86-MSI-X-maskall.patch qemu-MSI-X-enable-maskall.patch - Upstream patches from Jan 55780aaa-efi-avoid-calling-boot-services-after-ExitBootServices.patch 55780aff-x86-EFI-fix-EFI_MEMORY_WP-handling.patch 55780b43-EFI-early-add-mapbs-to-map-EfiBootServices-Code-Data.patch 55780b97-EFI-support-default-attributes-to-map-Runtime-service-areas.patch 55780be1-x86-EFI-adjust-EFI_MEMORY_WP-handling-for-spec-version-2.5.patch 55103616-vm-assist-prepare-for-discontiguous-used-bit-numbers.patch 5548e95d-x86-allow-to-suppress-M2P-user-mode-exposure.patch - Dropped the following patches now contained in the tarball xen-no-array-bounds.patch CVE-2015-4103-xsa128.patch CVE-2015-4104-xsa129.patch CVE-2015-4105-xsa130.patch CVE-2015-4106-xsa131-1.patch CVE-2015-4106-xsa131-2.patch CVE-2015-4106-xsa131-3.patch CVE-2015-4106-xsa131-4.patch CVE-2015-4106-xsa131-5.patch CVE-2015-4106-xsa131-6.patch CVE-2015-4106-xsa131-7.patch CVE-2015-4106-xsa131-8.patch- Update to Xen 4.5.1 RC2 - bsc#931628 - VUL-0: CVE-2015-4106: XSA-131: xen: Unmediated PCI register access in qemu CVE-2015-4106-xsa131-1.patch CVE-2015-4106-xsa131-2.patch CVE-2015-4106-xsa131-3.patch CVE-2015-4106-xsa131-4.patch CVE-2015-4106-xsa131-5.patch CVE-2015-4106-xsa131-6.patch CVE-2015-4106-xsa131-7.patch CVE-2015-4106-xsa131-8.patch CVE-2015-4106-xsa131-9.patch - bsc#931627 - VUL-0: CVE-2015-4105: XSA-130: xen: Guest triggerable qemu MSI-X pass-through error messages CVE-2015-4105-xsa130.patch - bsc#931626 - VUL-0: CVE-2015-4104: XSA-129: xen: PCI MSI mask bits inadvertently exposed to guests CVE-2015-4104-xsa129.patch - bsc#931625 - VUL-0: CVE-2015-4103: XSA-128: xen: Potential unintended writes to host MSI message data field via qemu CVE-2015-4103-xsa128.patch - Upstream patches from Jan 5548e903-domctl-don-t-truncate-XEN_DOMCTL_max_mem-requests.patch 556c2cf2-x86-don-t-crash-mapping-a-page-using-EFI-rt-page-tables.patch 556d9718-efi-fix-allocation-problems-if-ExitBootServices-fails.patch 556d973f-unmodified-drivers-tolerate-IRQF_DISABLED-being-undefined.patch 556eabf7-x86-apic-Disable-the-LAPIC-later-in-smp_send_stop.patch 556eac15-x86-crash-don-t-use-set_fixmap-in-the-crash-path.patch- Add DefaultDependencies=no to xen-dom0-modules.service because it has to run before proc-xen.mount- Update to Xen 4.5.1 RC1- Update blktap-no-uninit.patch to work with gcc-4.5- bsc#927967 - VUL-0: CVE-2015-3340: xen: Information leak through XEN_DOMCTL_gettscinfo (XSA-132) 5535f633-dont-leak-hypervisor-stack-to-toolstacks.patch- bnc#929339 - VUL-0: CVE-2015-3456: qemu kvm xen: VENOM qemu floppy driver host code execution CVE-2015-3456-xsa133-qemuu.patch CVE-2015-3456-xsa133-qemut.patch- bsc#928783 - Reboot failure; Request backport of upstream Xen patch to 4.5.0, or update pkgs to 4.5.1 5513b458-allow-reboot-overrides-when-running-under-EFI.patch 5513b4d1-dont-apply-reboot-quirks-if-reboot-set-by-user.patch- bnc#927750 - Avoid errors reported by system-modules-load.service- Add xen-no-array-bounds.patch and blktap-no-uninit.patch to selectively turn errors back to warnings to fix build with GCC 5. - Amend xen.stubdom.newlib.patch to pull in declaration of strcmp to avoid implicit-fortify-decl rpmlint error. - Fix quoting of __SMBIOS_DATE__ in xen.build-compare.smbiosdate.patch.- xentop: Fix memory leak on read failure 551ac326-xentop-add-support-for-qdisk.patch- Dropped xentop-add-support-for-qdisk.patch in favor of upstream version 551ac326-xentop-add-support-for-qdisk.patch- Enable spice support in qemu for x86_64 5124efbe-add-qxl-support.patch qemu-xen-enable-spice-support.patch- Add xen-c99-fix.patch to remove pointless inline specifier on function declarations which break build with a C99 compiler which GCC 5 is by default. (bsc#921994) - Add ipxe-no-error-logical-not-parentheses.patch to supply - Wno-logical-not-parentheses to the ipxe build to fix breakage with GCC 5. (bsc#921994)- bnc#921842 - Xentop doesn't display disk statistics for VMs using qdisks xentop-add-support-for-qdisk.patch- Disable the PIE enablement done for Factory, as the XEN code is not buildable with PIE and it does not make much sense to build the hypervisor code with it.- bnc#918169 - XEN fixes required to work with Kernel 3.19.0 xen.spec- Package xen.changes because its referenced in xen.spec- Update seabios to rel-1.7.5 which is the correct version for Xen 4.5- Update to Xen 4.5.0 FCS- Include systemd presets in 13.2 and older- bnc#897352 - Enable xencommons/xendomains only during fresh install - disable restart on upgrade because the toolstack is not restartable- adjust seabios, vgabios, stubdom and hvmloader build to reduce build-compare noise xen.build-compare.mini-os.patch xen.build-compare.smbiosdate.patch xen.build-compare.ipxe.patch xen.build-compare.vgabios.patch xen.build-compare.seabios.patch xen.build-compare.man.patch- Update to Xen 4.5.0 RC4- Remove xend specific if-up scripts Recording bridge slaves is a generic task which should be handled by generic network code- Use systemd features from upstream requires updated systemd-presets-branding package- Update to Xen 4.5.0 RC3- Set GIT, WGET and FTP to /bin/false- Use new configure features instead of make variables xen.stubdom.newlib.patch- adjust docs and xen build to reduce build-compare noise xen.build-compare.doc_html.patch xen.build-compare.xen_compile_h.patch- Drop trailing B_CNT from XEN_EXTRAVERSION to reduce build-compare noise- Update to Xen 4.5.0 RC2- Update to Xen 4.5.0 RC1 xen-4.5.0-testing-src.tar.bz2 - Remove all patches now contained in the new tarball xen-4.4.1-testing-src.tar.bz2 5315a3bb-x86-don-t-propagate-acpi_skip_timer_override-do-Dom0.patch 5315a43a-x86-ACPI-also-print-address-space-for-PM1x-fields.patch 53299d8f-xenconsole-reset-tty-on-failure.patch 53299d8f-xenconsole-tolerate-tty-errors.patch 5346a7a0-x86-AMD-support-further-feature-masking-MSRs.patch 53563ea4-x86-MSI-drop-workaround-for-insecure-Dom0-kernels.patch 537c9c77-libxc-check-return-values-on-mmap-and-madvise.patch 537cd0b0-hvmloader-also-cover-PCI-MMIO-ranges-above-4G-with-UC-MTRR-ranges.patch 537cd0cc-hvmloader-PA-range-0xfc000000-0xffffffff-should-be-UC.patch 539ebe62-x86-EFI-improve-boot-time-diagnostics.patch 53aac342-x86-HVM-consolidate-and-sanitize-CR4-guest-reserved-bit-determination.patch 53c9151b-Fix-xl-vncviewer-accesses-port-0-by-any-invalid-domid.patch 53d124e7-fix-list_domain_details-check-config-data-length-0.patch 53dba447-x86-ACPI-allow-CMOS-RTC-use-even-when-ACPI-says-there-is-none.patch 53df727b-x86-HVM-extend-LAPIC-shortcuts-around-P2M-lookups.patch 53e8be5f-x86-vHPET-use-rwlock-instead-of-simple-one.patch 53f737b1-VMX-fix-DebugCtl-MSR-clearing.patch 53f7386d-x86-irq-process-softirqs-in-irq-keyhandlers.patch 53fcebab-xen-pass-kernel-initrd-to-qemu.patch 53ff3659-x86-consolidate-boolean-inputs-in-hvm-and-p2m.patch 53ff36ae-x86-hvm-treat-non-insn-fetch-NPF-also-as-read-violations.patch 53ff36d5-x86-mem_event-deliver-gla-fault-EPT-violation-information.patch 53ff3716-x86-ats-Disable-Address-Translation-Services-by-default.patch 53ff3899-x86-NMI-allow-processing-unknown-NMIs-with-watchdog.patch 54005472-EPT-utilize-GLA-GPA-translation-known-for-certain-faults.patch 540effe6-evtchn-check-control-block-exists-when-using-FIFO-based-events.patch 540f2624-x86-idle-add-barriers-to-CLFLUSH-workaround.patch 541825dc-VMX-don-t-leave-x2APIC-MSR-intercepts-disabled.patch 541ad385-x86-suppress-event-check-IPI-to-MWAITing-CPUs.patch 541ad3ca-x86-HVM-batch-vCPU-wakeups.patch 541ad81a-VT-d-suppress-UR-signaling-for-further-desktop-chipsets.patch 54216833-x86-shadow-fix-race-when-sampling-dirty-vram-state.patch 54216882-x86-emulate-check-cpl-for-all-privileged-instructions.patch 542168ae-x86emul-only-emulate-swint-injection-for-real-mode.patch 54228a37-x86-EFI-fix-freeing-of-uninitialized-pointer.patch 5423e61c-x86emul-fix-SYSCALL-SYSENTER-SYSEXIT-emulation.patch 5424057f-x86-HVM-fix-miscellaneous-aspects-of-x2APIC-emulation.patch 542405b4-x86-HVM-fix-ID-handling-of-x2APIC-emulation.patch 542bf997-x86-HVM-properly-bound-x2APIC-MSR-range.patch 54325cc0-x86-MSI-fix-MSI-X-case-of-freeing-IRQ.patch 54325d2f-x86-restore-reserving-of-IO-APIC-pages-in-XENMEM_machine_memory_map-output.patch 54325d95-don-t-allow-Dom0-access-to-IOMMUs-MMIO-pages.patch 54325ecc-AMD-guest_iommu-properly-disable-guest-iommu-support.patch 54325f3c-x86-paging-make-log-dirty-operations-preemptible.patch 54379e6d-x86-vlapic-don-t-silently-accept-bad-vectors.patch CVE-2013-4540-qemu.patch qemu-support-xen-hvm-direct-kernel-boot.patch qemu-xen-upstream-blkif-discard.patch change-vnc-passwd.patch libxc-pass-errno-to-callers-of-xc_domain_save.patch libxl.honor-more-top-level-vfb-options.patch libxl.add-option-for-discard-support-to-xl-disk-conf.patch libxl.introduce-an-option-to-disable-the-non-O_DIRECT-workaround.patch x86-dom-print.patch x86-extra-trap-info.patch tmp_build.patch xl-check-for-libvirt-managed-domain.patch disable-wget-check.patch - Xend/xm is no longer supported and is not part of the upstream code. Remove all xend/xm specific patches, configs, and scripts xen-xmexample.patch bridge-opensuse.patch xmexample.disks xmclone.sh init.xend xend-relocation.sh xend.service xend-relocation-server.fw domUloader.py xmexample.domUloader xmexample.disks bridge-vlan.patch bridge-bonding.patch bridge-record-creation.patch network-nat-open-SuSEfirewall2-FORWARD.patch xend-set-migration-constraints-from-cmdline.patch xen.migrate.tools-xend_move_assert_to_exception_block.patch xend-pvscsi-recognize-also-SCSI-CDROM-devices.patch xend-config.patch xend-max-free-mem.patch xend-hvm-default-pae.patch xend-vif-route-ifup.patch xend-xenapi-console-protocol.patch xend-core-dump-loc.patch xend-xen-api-auth.patch xend-checkpoint-rename.patch xend-xm-save-check-file.patch xend-xm-create-xflag.patch xend-domu-usb-controller.patch xend-devid-or-name.patch xend-migration-domname-fix.patch xend-del_usb_xend_entry.patch xend-xen-domUloader.patch xend-multi-xvdp.patch xend-check_device_status.patch xend-change_home_server.patch xend-minimum-restart-time.patch xend-disable-internal-logrotate.patch xend-config-enable-dump-comment.patch xend-tools-watchdog-support.patch xend-console-port-restore.patch xend-vcpu-affinity-fix.patch xend-migration-bridge-check.patch xend-managed-pci-device.patch xend-hvm-firmware-passthrough.patch xend-cpuinfo-model-name.patch xend-xm-reboot-fix.patch xend-domain-lock.patch xend-domain-lock-sfex.patch xend-32on64-extra-mem.patch xend-hv_extid_compatibility.patch xend-xenpaging.autostart.patch xend-remove-xm-deprecation-warning.patch libxen_permissive.patch tmp-initscript-modprobe.patch init.xendomains xendomains.service xen-watchdog.service xen-updown.sh- bnc#901317 - L3: increase limit domUloader to 32MB domUloader.py- bnc#898772 - SLES 12 RC3 - XEN Host crashes when assigning non-VF device (SR-IOV) to guest 54325cc0-x86-MSI-fix-MSI-X-case-of-freeing-IRQ.patch - bnc#882089 - Windows 2012 R2 fails to boot up with greater than 60 vcpus 54325ecc-AMD-guest_iommu-properly-disable-guest-iommu-support.patch - bnc#826717 - VUL-0: CVE-2013-3495: XSA-59: xen: Intel VT-d Interrupt Remapping engines can be evaded by native NMI interrupts 541ad81a-VT-d-suppress-UR-signaling-for-further-desktop-chipsets.patch - Upstream patches from Jan 540effe6-evtchn-check-control-block-exists-when-using-FIFO-based-events.patch (Replaces xsa107.patch) 54216833-x86-shadow-fix-race-when-sampling-dirty-vram-state.patch (Replaces xsa104.patch) 54216882-x86-emulate-check-cpl-for-all-privileged-instructions.patch (Replaces xsa105.patch) 542168ae-x86emul-only-emulate-swint-injection-for-real-mode.patch (Replaces xsa106.patch) 54228a37-x86-EFI-fix-freeing-of-uninitialized-pointer.patch 5423e61c-x86emul-fix-SYSCALL-SYSENTER-SYSEXIT-emulation.patch 5424057f-x86-HVM-fix-miscellaneous-aspects-of-x2APIC-emulation.patch 542405b4-x86-HVM-fix-ID-handling-of-x2APIC-emulation.patch 542bf997-x86-HVM-properly-bound-x2APIC-MSR-range.patch (Replaces xsa108.patch) 54325d2f-x86-restore-reserving-of-IO-APIC-pages-in-XENMEM_machine_memory_map-output.patch 54325d95-don-t-allow-Dom0-access-to-IOMMUs-MMIO-pages.patch 54325f3c-x86-paging-make-log-dirty-operations-preemptible.patch (Replaces xsa97.patch) 54379e6d-x86-vlapic-don-t-silently-accept-bad-vectors.patch- restrict requires on grub2-x86_64-xen to x86_64 hosts- bsc#900292 - xl: change default dump directory xl-coredump-file-location.patch- Update xen2libvirt.py to better detect and handle file formats- bnc#889526 - VUL-0: CVE-2014-5146, CVE-2014-5149: xen: XSA-97 Long latency virtual-mmu operations are not preemptible xsa97.patch - bnc#882089 - Windows 2012 R2 fails to boot up with greater than 60 vcpus 541ad385-x86-suppress-event-check-IPI-to-MWAITing-CPUs.patch 541ad3ca-x86-HVM-batch-vCPU-wakeups.patch - Upstream patches from Jan 540f2624-x86-idle-add-barriers-to-CLFLUSH-workaround.patch 541825dc-VMX-don-t-leave-x2APIC-MSR-intercepts-disabled.patch- bnc#897657 - VUL-0: CVE-2014-7188: xen: XSA-108 Improper MSR range used for x2APIC emulation xsa108.patch- bnc#897906 - libxc: check return values on mmap() and madvise() on xc_alloc_hypercall_buffer() 537c9c77-libxc-check-return-values-on-mmap-and-madvise.patch- bnc#897614 - Virtualization/xen: Bug `xen-tools` uninstallable; grub2-x86_64-xen dependency not available xen.spec- More cleanup of README.SUSE- Update xen patch with upstream patch so that latest libvirt patch can work. (bnc#896044) + 53fcebab-xen-pass-kernel-initrd-to-qemu.patch - xen-pass-kernel-initrd-to-qemu.patch- bnc#895804 - VUL-0: CVE-2014-6268: xen: XSA-107: Mishandling of uninitialised FIFO-based event channel control blocks xsa107.patch - bnc#895802 - VUL-0: CVE-2014-7156: xen: XSA-106: Missing privilege level checks in x86 emulation of software interrupts xsa106.patch - bnc#895799 - VUL-0: CVE-2014-7155: xen: XSA-105: Missing privilege level checks in x86 HLT, LGDT, LIDT, and LMSW emulation xsa105.patch - bnc#895798 - VUL-0: CVE-2014-7154: xen: XSA-104: Race condition in HVMOP_track_dirty_vram xsa104.patch- bnc#882405 - Only one key-press event was generated while holding a key before key-release in pv guests through xl vncviewer tigervnc-long-press.patch- Update to Xen Version 4.4.1 FCS xen-4.4.1-testing-src.tar.bz2 - Dropped patches now contained in tarball 53d7b781-x86-cpu-undo-BIOS-CPUID-max_leaf-limit-earlier.patch 53df71c7-lz4-check-for-underruns.patch 53e47d6b-x86_emulate-properly-do-IP-updates-and-other-side-effects.patch- bnc#882089 - Windows 2012 R2 fails to boot up with greater than 60 vcpus 53df727b-x86-HVM-extend-LAPIC-shortcuts-around-P2M-lookups.patch 53e8be5f-x86-vHPET-use-rwlock-instead-of-simple-one.patch 53ff3659-x86-consolidate-boolean-inputs-in-hvm-and-p2m.patch 53ff36ae-x86-hvm-treat-non-insn-fetch-NPF-also-as-read-violations.patch 53ff36d5-x86-mem_event-deliver-gla-fault-EPT-violation-information.patch 54005472-EPT-utilize-GLA-GPA-translation-known-for-certain-faults.patch - Upstream patches from Jan 53f737b1-VMX-fix-DebugCtl-MSR-clearing.patch 53f7386d-x86-irq-process-softirqs-in-irq-keyhandlers.patch 53ff3716-x86-ats-Disable-Address-Translation-Services-by-default.patch 53ff3899-x86-NMI-allow-processing-unknown-NMIs-with-watchdog.patch- bnc#864801 - VUL-0: CVE-2013-4540: qemu: zaurus: buffer overrun on invalid state load CVE-2013-4540-qemu.patch- Update README.SUSE with additional debug help- bnc#883112 - Xen Panic during boot "System without CMOS RTC must be booted from EFI" 53dba447-x86-ACPI-allow-CMOS-RTC-use-even-when-ACPI-says-there-is-none.patch - Upstream patches from Jan 53d7b781-x86-cpu-undo-BIOS-CPUID-max_leaf-limit-earlier.patch 53df71c7-lz4-check-for-underruns.patch 53df727b-x86-HVM-extend-LAPIC-shortcuts-around-P2M-lookups.patch 53e47d6b-x86_emulate-properly-do-IP-updates-and-other-side-effects.patch- Update to Xen Version 4.4.1-rc2 xen-4.4.1-testing-src.tar.bz2 - Dropped the following upstream patches and xen-4.4.0-testing-src.tar.bz2 537b5ede-move-domain-to-cpupool0-before-destroying-it.patch 5327190a-x86-Intel-work-around-Xeon-7400-series-erratum-AAI65.patch 534bdf47-x86-HAP-also-flush-TLB-when-altering-a-present-1G-or-intermediate-entry.patch 535a354b-passthrough-allow-to-suppress-SERR-and-PERR-signaling.patch 53636ebf-x86-fix-guest-CPUID-handling.patch 5347b524-evtchn-eliminate-64k-ports-limitation.patch 53a040c6-page-alloc-scrub-pages-used-by-hypervisor-upon-freeing.patch 53a1990a-IOMMU-prevent-VT-d-device-IOTLB-operations-on-wrong-IOMMU.patch 53732f4f-x86-MCE-bypass-uninitialized-vcpu-in-vMCE-injection.patch 531dc0e2-xmalloc-handle-correctly-page-allocation-when-align-size.patch 5331917d-x86-enforce-preemption-in-HVM_set_mem_access-p2m_set_mem_access.patch 531d8e09-x86-HVM-fix-memory-type-merging-in-epte_get_entry_emt.patch 538ee637-ACPI-Prevent-acpi_table_entries-from-falling-into-a-infinite-loop.patch 535a34eb-VT-d-suppress-UR-signaling-for-server-chipsets.patch 535e31bc-x86-HVM-correct-the-SMEP-logic-for-HVM_CR0_GUEST_RESERVED_BITS.patch 53859956-timers-set-the-deadline-more-accurately.patch 53636978-hvm_set_ioreq_page-releases-wrong-page-in-error-path.patch 535a3516-VT-d-suppress-UR-signaling-for-desktop-chipsets.patch 53cfdcc7-avoid-crash-when-doing-shutdown-with-active-cpupools.patch 5383175e-VT-d-fix-mask-applied-to-DMIBAR-in-desktop-chipset-XSA-59-workaround.patch 531d8e34-x86-HVM-consolidate-passthrough-handling-in-epte_get_entry_emt.patch 532fff53-x86-fix-determination-of-bit-count-for-struct-domain-allocations.patch 5357baff-x86-add-missing-break-in-dom0_pit_access.patch 530c54c3-x86-mce-Reduce-boot-time-logspam.patch 5383167d-ACPI-ERST-fix-table-mapping.patch 5390927f-x86-fix-reboot-shutdown-with-running-HVM-guests.patch 530b27fd-x86-MCE-Fix-race-condition-in-mctelem_reserve.patch 53709b77-Nested-VMX-load-current_vmcs-only-when-it-exists.patch 5396d818-avoid-crash-on-HVM-domain-destroy-with-PCI-passthrough.patch 531d8fd0-kexec-identify-which-cpu-the-kexec-image-is-being-executed-on.patch 5385956b-x86-don-t-use-VA-for-cache-flush-when-also-flushing-TLB.patch 539ec004-x86-mce-don-t-spam-the-console-with-CPUx-Temperature-z.patch 53909259-x86-domctl-two-functional-fixes-to-XEN_DOMCTL_-gs-etvcpuextstate.patch 53859549-AMD-IOMMU-don-t-free-page-table-prematurely.patch 533d413b-x86-mm-fix-checks-against-max_mapped_pfn.patch 535fa503-x86-HVM-restrict-HVMOP_set_mem_type.patch 53271880-VT-d-fix-RMRR-handling.patch 5390917a-VT-d-honor-APEI-firmware-first-mode-in-XSA-59-workaround-code.patch 538dcada-x86-HVM-eliminate-vulnerabilities-from-hvm_inject_msi.patch 53455585-x86-AMD-feature-masking-is-unavailable-on-Fam11.patch 537b5e50-VT-d-apply-quirks-at-device-setup-time-rather-than-only-at-boot.patch 53a199d7-x86-EFI-allow-FPU-XMM-use-in-runtime-service-functions.patch 53cfddaf-x86-mem_event-validate-the-response-vcpu_id-before-acting-on-it.patch 53b16cd4-VT-d-ATS-correct-and-clean-up-dev_invalidate_iotlb.patch 53cfdde4-x86-mem_event-prevent-underflow-of-vcpu-pause-counts.patch 53356c1e-x86-HVM-correct-CPUID-leaf-80000008-handling.patch 534bbd90-x86-nested-HAP-don-t-BUG-on-legitimate-error.patch 530b28c5-x86-MSI-don-t-risk-division-by-zero.patch 5396e805-x86-HVM-refine-SMEP-test-in-HVM_CR4_GUEST_RESERVED_BITS.patch 5370e03b-pygrub-fix-error-handling-if-no-valid-partitions-are-found.patch 5321b257-x86-make-hypercall-preemption-checks-consistent.patch 5321b20b-common-make-hypercall-preemption-checks-consistent.patch 538c338f-x86-amd_ucode-flip-revision-numbers-in-printk.patch 537b5e79-VT-d-extend-error-report-masking-workaround-to-newer-chipsets.patch 531d8db1-x86-hvm-refine-the-judgment-on-IDENT_PT-for-EMT.patch 53b56de1-properly-reference-count-DOMCTL_-un-pausedomain-hypercalls.patch 530b2880-Nested-VMX-update-nested-paging-mode-on-vmexit.patch 533ad1ee-VMX-fix-PAT-value-seen-by-guest.patch 53206661-pygrub-support-linux16-and-initrd16.patch 5315a254-IOMMU-generalize-and-correct-softirq-processing.patch- bnc#820873 - The "long" option doesn't work with "xl list" 53d124e7-fix-list_domain_details-check-config-data-length-0.patch- bnc#888996 - Package 'xen-tool' contains 'SuSE' spelling in a filename and/or SPEC file Renamed README.SuSE -> README.SUSE Modified files: xen.spec, boot.local.xenU, init.pciback xend-config.patch, xend-vif-route-ifup.patch- bnc#882673 - Dom0 memory should enforce a minimum memory size (e.g. dom0_mem=min:512M) xen.spec (Mike Latimer)- Upstream patches from Jan 5347b524-evtchn-eliminate-64k-ports-limitation.patch 53aac342-x86-HVM-consolidate-and-sanitize-CR4-guest-reserved-bit-determination.patch 53b16cd4-VT-d-ATS-correct-and-clean-up-dev_invalidate_iotlb.patch 53b56de1-properly-reference-count-DOMCTL_-un-pausedomain-hypercalls.patch 53cfdcc7-avoid-crash-when-doing-shutdown-with-active-cpupools.patch 53cfddaf-x86-mem_event-validate-the-response-vcpu_id-before-acting-on-it.patch 53cfdde4-x86-mem_event-prevent-underflow-of-vcpu-pause-counts.patch- bnc#886801 - xl vncviewer: The first domu can be accessed by any id 53c9151b-Fix-xl-vncviewer-accesses-port-0-by-any-invalid-domid.patch- Upstream pygrub bug fix 5370e03b-pygrub-fix-error-handling-if-no-valid-partitions-are-found.patch- Fix pygrub to handle old 32 bit VMs pygrub-boot-legacy-sles.patch (Mike Latimer)- Remove xen-vmresync utility. It is an old Platespin Orchestrate utility that should have never been included in the Xen package. Updated xen.spec- Rework xen-destroy utility included in xen-utils bnc#885292 and bnc#886063 Updated xen-utils-0.1.tar.bz2- bnc#886063 - Xen monitor fails (xl list --long output different from xm list --long output) - bnc#885292 - VirtualDomain: pid_status does not know how to check status on SLE12 Re-enable building xen-utils for sle12 and include xen-list and xen-destroy in the xen-tools package for HA. xen.spec- bnc#882127 - Xen kernel panics on booting SLES12 Beta 8 53a199d7-x86-EFI-allow-FPU-XMM-use-in-runtime-service-functions.patch - Upstream patches from Jan 538c338f-x86-amd_ucode-flip-revision-numbers-in-printk.patch 538ee637-ACPI-Prevent-acpi_table_entries-from-falling-into-a-infinite-loop.patch 5390917a-VT-d-honor-APEI-firmware-first-mode-in-XSA-59-workaround-code.patch 53909259-x86-domctl-two-functional-fixes-to-XEN_DOMCTL_-gs-etvcpuextstate.patch 5390927f-x86-fix-reboot-shutdown-with-running-HVM-guests.patch 5396d818-avoid-crash-on-HVM-domain-destroy-with-PCI-passthrough.patch 5396e805-x86-HVM-refine-SMEP-test-in-HVM_CR4_GUEST_RESERVED_BITS.patch 539ebe62-x86-EFI-improve-boot-time-diagnostics.patch 539ec004-x86-mce-don-t-spam-the-console-with-CPUx-Temperature-z.patch 53a040c6-page-alloc-scrub-pages-used-by-hypervisor-upon-freeing.patch (replaces xsa100.patch) 53a1990a-IOMMU-prevent-VT-d-device-IOTLB-operations-on-wrong-IOMMU.patch- Replace 'domUloader' with 'pygrub' when converting or importing Xen domains into libvirt with xen2libvirt. domUloader is no longer provided in xen-tools. Modified: xen2libvirt.py- fate#310956: Support Direct Kernel Boot for FV guests patches would go to upstream: qemu side: qemu-support-xen-hvm-direct-kernel-boot.patch xen side: xen-pass-kernel-initrd-to-qemu.patch- Modify how we check for libvirt managed domains xl-check-for-libvirt-managed-domain.patch- bnc#880751 - VUL-0: xen: Hypervisor heap contents leaked to guests xsa100.patch - bnc#878841 - VUL-0: XSA-96: Xen: Vulnerabilities in HVM MSI injection 538dcada-x86-HVM-eliminate-vulnerabilities-from-hvm_inject_msi.patch - Upstream patches from Jan 537cd0b0-hvmloader-also-cover-PCI-MMIO-ranges-above-4G-with-UC-MTRR-ranges.patch 537cd0cc-hvmloader-PA-range-0xfc000000-0xffffffff-should-be-UC.patch 5383167d-ACPI-ERST-fix-table-mapping.patch 5383175e-VT-d-fix-mask-applied-to-DMIBAR-in-desktop-chipset-XSA-59-workaround.patch 53859549-AMD-IOMMU-don-t-free-page-table-prematurely.patch 5385956b-x86-don-t-use-VA-for-cache-flush-when-also-flushing-TLB.patch 53859956-timers-set-the-deadline-more-accurately.patch- bnc#879425: handle cache=unsafe from libvirt to disable flush in qdisk libxl.add-option-to-disable-disk-cache-flushes-in-qdisk.patch qemu-xen-upstream-qdisk-cache-unsafe.patch- libxl: introduce an option for disabling the non-O_DIRECT workaround recognize direct-io-safe in domU.cfg diskspec libxl.introduce-an-option-to-disable-the-non-O_DIRECT-workaround.patch- fate#316071: add discard support for file backed storage (qdisk) update patch to allow more values in overloaded ->readwrite member- bnc#826717 - VUL-0: CVE-2013-3495: XSA-59: xen: Intel VT-d Interrupt Remapping engines can be evaded by native NMI interrupts 537b5e50-VT-d-apply-quirks-at-device-setup-time-rather-than-only-at-boot.patch 537b5e79-VT-d-extend-error-report-masking-workaround-to-newer-chipsets.patch - Upstream patches from Jan 53709b77-Nested-VMX-load-current_vmcs-only-when-it-exists.patch 53732f4f-x86-MCE-bypass-uninitialized-vcpu-in-vMCE-injection.patch 537b5ede-move-domain-to-cpupool0-before-destroying-it.patch- Update README.SuSE with information on the toolstack change- fate#316071: add discard support for file backed storage (qdisk) update to recognize option discard/no-discard instead of discard=0,1 to match upstream change- fate#316613: Implement pvscsi in xl/libxl libxl.pvscsi.patch- bnc#875668 - VUL-0: CVE-2014-3124: xen: XSA-92: HVMOP_set_mem_type allows invalid P2M entries to be created 535fa503-x86-HVM-restrict-HVMOP_set_mem_type.patch (replaces xsa92.patch) - bnc#826717 - VUL-0: CVE-2013-3495: XSA-59: xen: Intel VT-d Interrupt Remapping engines can be evaded by native NMI interrupts 535a34eb-VT-d-suppress-UR-signaling-for-server-chipsets.patch 535a3516-VT-d-suppress-UR-signaling-for-desktop-chipsets.patch - Upstream patches from Jan 535a354b-passthrough-allow-to-suppress-SERR-and-PERR-signaling.patch 535e31bc-x86-HVM-correct-the-SMEP-logic-for-HVM_CR0_GUEST_RESERVED_BITS.patch 53636978-hvm_set_ioreq_page-releases-wrong-page-in-error-path.patch 53636ebf-x86-fix-guest-CPUID-handling.patch- Fix pygrub to handle VM with no grub/menu.lst file. - Don't use /var/run/xend/boot for temporary boot directory pygrub-boot-legacy-sles.patch- When the xl command is used, check to see if the domain being modified is managed by libvirt and print warning if it is. xl-check-for-libvirt-managed-domain.patch- Upstream patches from Jan 53455585-x86-AMD-feature-masking-is-unavailable-on-Fam11.patch 5346a7a0-x86-AMD-support-further-feature-masking-MSRs.patch 534bbd90-x86-nested-HAP-don-t-BUG-on-legitimate-error.patch 534bdf47-x86-HAP-also-flush-TLB-when-altering-a-present-1G-or-intermediate-entry.patch 53563ea4-x86-MSI-drop-workaround-for-insecure-Dom0-kernels.patch 5357baff-x86-add-missing-break-in-dom0_pit_access.patch - XSA-92 xsa92.patch- Add # needssslcertforbuild to use the project's certificate when building in a home project. (bnc#872354)- Upstream patches from Jan 53356c1e-x86-HVM-correct-CPUID-leaf-80000008-handling.patch 533ad1ee-VMX-fix-PAT-value-seen-by-guest.patch 533d413b-x86-mm-fix-checks-against-max_mapped_pfn.patch- bnc#862608 - SLES 11 SP3 vm-install should get RHEL 7 support when released 53206661-pygrub-support-linux16-and-initrd16.patch - Upstream bug fixes 53299d8f-xenconsole-reset-tty-on-failure.patch 53299d8f-xenconsole-tolerate-tty-errors.patch- fix build for armv7l and aarch64- Remove compiletime strings from qemu-upstream qemu-xen-upstream-megasas-buildtime.patch- bnc#871546 - KMPs are not signed in SUSE:SLE-12:GA? xen.spec- Upstream patches from Jan 532fff53-x86-fix-determination-of-bit-count-for-struct-domain-allocations.patch 5331917d-x86-enforce-preemption-in-HVM_set_mem_access-p2m_set_mem_access.patch - Drop xsa89.patch for upstream version (see bnc#867910, 5331917d-x86-enforce...)- bnc#863821 - Xen unable to boot paravirtualized VMs installed with btrfs. Add 'Requires: grub2-x86_64-xen' to xen-tools. - Restore soft links for qemu-system-i386 and qemu-dm - Cleanup inconsistency in which version of qemu-system-i386 is being used (Xen vs qemu-x86). Use only Xen's version. xen.spec- Add conditionals for SLE12 when defining xend and max_cpus xen.spec- Upstream patches from Jan 5321b20b-common-make-hypercall-preemption-checks-consistent.patch 5321b257-x86-make-hypercall-preemption-checks-consistent.patch 53271880-VT-d-fix-RMRR-handling.patch 5327190a-x86-Intel-work-around-Xeon-7400-series-erratum-AAI65.patch - Dropped the following as now part of 5321b257 5310bac3-mm-ensure-useful-progress-in-decrease_reservation.patch- bnc#867910 - VUL-0: EMBARGOED: xen: XSA-89: HVMOP_set_mem_access is not preemptible xsa89.patch - Upstream patches from Jan 530b27fd-x86-MCE-Fix-race-condition-in-mctelem_reserve.patch 530b2880-Nested-VMX-update-nested-paging-mode-on-vmexit.patch 530b28c5-x86-MSI-don-t-risk-division-by-zero.patch 530c54c3-x86-mce-Reduce-boot-time-logspam.patch 5310bac3-mm-ensure-useful-progress-in-decrease_reservation.patch 5315a254-IOMMU-generalize-and-correct-softirq-processing.patch 5315a3bb-x86-don-t-propagate-acpi_skip_timer_override-do-Dom0.patch 5315a43a-x86-ACPI-also-print-address-space-for-PM1x-fields.patch 531d8db1-x86-hvm-refine-the-judgment-on-IDENT_PT-for-EMT.patch 531d8e09-x86-HVM-fix-memory-type-merging-in-epte_get_entry_emt.patch 531d8e34-x86-HVM-consolidate-passthrough-handling-in-epte_get_entry_emt.patch 531d8fd0-kexec-identify-which-cpu-the-kexec-image-is-being-executed-on.patch 531dc0e2-xmalloc-handle-correctly-page-allocation-when-align-size.patch- Add conversion tool for migrating xend/xm managed VMs to libvirt xen2libvirt.py (Jim Fehlig)- Update to Xen 4.4.0 FCS- bnc#865682 - Local attach support for PHY backends using scripts local_attach_support_for_phy.patch- bnc#798770 - Improve multipath support for npiv devices block-npiv block-npiv-common.sh- honor global keymap= option in libxl libxl.honor-more-top-level-vfb-options.patch- Update to c/s 28381 to include libxl fork and event fixes for libvirt xen-4.4.0-testing-src.tar.bz2- bnc#863297: xend/pvscsi: recognize also SCSI CDROM devices xend-pvscsi-recognize-also-SCSI-CDROM-devices.patch- fate#316614: set migration constraints from cmdline fix xl migrate to print the actual error string libxc-pass-errno-to-callers-of-xc_domain_save.patch- Include additional help docs for xl in xen-tools - Apply all patches including those for unpackaged xend xen.spec- fate#316614: set migration constraints from cmdline split existing changes into libxl and xend part added libxl.set-migration-constraints-from-cmdline.patch added xend-set-migration-constraints-from-cmdline.patch removed xen.migrate.tools_add_xm_migrate_--log_progress_option.patch removed xen.migrate.tools_set_number_of_dirty_pages_during_migration.patch removed xen.migrate.tools_set_migration_constraints_from_cmdline.patch- Enable ix86 32bit build for xen-libs to be built to support xen-tools-domU on 32bit VMs and also vhostmd running in 32bit VMs- Enable blktapctrl when qemu-traditional is required to satisfy build dependencies. Remove binaries after build if xend is disabled- update ifarch usage in xen.spec to cover also arm - blktapctrl is used only by xend - fix xend-tools-xend sub pkg handling - default to gcc47 for sles11sp3 builds - remove all latex packages from BuildRequires - aarch64-rename-PSR_MODE_ELxx-to-match-linux-headers.patch- add arch dependent install suffix for /boot/xen files- Set max_cpus==4 for non-x86_64 builds- Update to Xen 4.4.0 RC3 c/s 28321- Add flex and bison to BuildRequires, needed by previous patch- fate#316071: add discard support for file backed storage (qdisk) libxl.add-option-for-discard-support-to-xl-disk-conf.patch- On platforms where xend is still supported don't output a deprecation warning when using xm. xend-remove-xm-deprecation-warning.patch- Changed License to GPL-2.0 (from GPL-2.0+)- Dropped xen-changeset.patch. It is no longer needed.- BuildRequire libfdt1-devel on ARM- fate#311487: remove modprobe.conf files for autoloading of pv-on-hvm files. Rely on core kernel to skip initialization of emulated hardware Handle xen_emul_unplug= from xenlinux based core kernel-default xen_pvonhvm.xen_emul_unplug.patch Dropped xen_pvdrivers.conf- Fix the spec file to build for old distros The xm/xend toolstack will continue to be contained in xen-tools for older openSUSE and sles distros but it will be contained in xend-tools for os13.x- fate#316071: add discard support for file backed storage (qdisk) to qemu-upstream, enabled unconditionally qemu-xen-upstream-blkif-discard.patch- Update to Xen 4.4.0 RC2 c/s 28287- Restore 32bit ix86 support in spec file for kmps and domU tools - Restore a few missing xend patches xend-config-enable-dump-comment.patch xend-tools-watchdog-support.patch xend-vif-route-ifup.patch- fate#315692: XEN: Include Xen version 4.4 in SLES-12 Update to Xen 4.4.0 RC1 c/s 28233 - Drop 32bit support from spec file - Dropped numerous patches now included in the tarball- gcc-32bit pulls in the right gcc bits, so better buildrequire that- Upstream patches from Jan 5281fad4-numa-sched-leave-node-affinity-alone-if-not-in-auto-mode.patch 52820823-nested-SVM-adjust-guest-handling-of-structure-mappings.patch 52820863-VMX-don-t-crash-processing-d-debug-key.patch 5282492f-x86-eliminate-has_arch_mmios.patch 52864df2-credit-Update-other-parameters-when-setting-tslice_ms.patch 52864f30-fix-leaking-of-v-cpu_affinity_saved-on-domain-destruction.patch 5289d225-nested-VMX-don-t-ignore-mapping-errors.patch 528a0eb0-x86-consider-modules-when-cutting-off-memory.patch 528f606c-x86-hvm-reset-TSC-to-0-after-domain-resume-from-S3.patch 528f609c-x86-crash-disable-the-watchdog-NMIs-on-the-crashing-cpu.patch 52932418-x86-xsave-fix-nonlazy-state-handling.patch- bnc#851749 - Xen service file does not call xend properly xend.service- Add missing requires to pciutils package for xend-tools- bnc#851386 - VUL-0: xen: XSA-78: Insufficient TLB flushing in VT-d (iommu) code 528a0e5b-TLB-flushing-in-dma_pte_clear_one.patch- Make -devel package depend on libuuid-devel, since libxl.h includes uuid.h- bnc#849667 - VUL-0: xen: XSA-74: Lock order reversal between page_alloc_lock and mm_rwlock CVE-2013-4553-xsa74.patch - bnc#849665 - VUL-0: CVE-2013-4551: xen: XSA-75: Host crash due to guest VMX instruction execution 52809208-nested-VMX-VMLANUCH-VMRESUME-emulation-must-check-permission-1st.patch - bnc#849668 - VUL-0: xen: XSA-76: Hypercalls exposed to privilege rings 1 and 2 of HVM guests CVE-2013-4554-xsa76.patch - Upstream patches from Jan 52654798-x86-xsave-also-save-restore-XCR0-across-suspend-ACPI-S3.patch 526e43d4-x86-refine-address-validity-checks-before-accessing-page-tables.patch 526f786a-fix-locking-in-cpu_disable_scheduler.patch 5277646c-x86-ACPI-x2APIC-guard-against-out-of-range-ACPI-or-APIC-IDs.patch 5277a134-x86-make-sure-memory-block-is-RAM-before-passing-to-the-allocator.patch 5278f7f9-x86-HVM-32-bit-IN-result-must-be-zero-extended-to-64-bits.patch 527a0a05-call-sched_destroy_domain-before-cpupool_rm_domain.patch 527cb7d2-x86-hvm-fix-restart-of-RTC-periodic-timer-with-vpt_align-1.patch 527cb820-x86-EFI-make-trampoline-allocation-more-flexible.patch 5280aae0-x86-idle-reduce-contention-on-ACPI-register-accesses.patch- bnc#848657 - VUL-0: xen: CVE-2013-4494: XSA-73: Lock order reversal between page allocation and grant table locks 5277639c-gnttab-correct-locking-order-reversal.patch- Update to Xen 4.3.1- domUloader can no longer be used with the xl toolstack to boot sles10. Patch pygrub to get the kernel and initrd from the image. pygrub-boot-legacy-sles.patch- bnc#842515 - VUL-0: CVE-2013-4375: XSA-71: xen: qemu disk backend (qdisk) resource leak CVE-2013-4375-xsa71.patch - bnc#845520 - VUL-0: CVE-2013-4416: xen: ocaml xenstored mishandles oversized message replies CVE-2013-4416-xsa72.patch - Upstream patches from Jan 52496bea-x86-properly-handle-hvm_copy_from_guest_-phys-virt-errors.patch (Replaces CVE-2013-4355-xsa63.patch) 52496c11-x86-mm-shadow-Fix-initialization-of-PV-shadow-L4-tables.patch (Replaces CVE-2013-4356-xsa64.patch) 52496c32-x86-properly-set-up-fbld-emulation-operand-address.patch (Replaces CVE-2013-4361-xsa66.patch) 52497c6c-x86-don-t-blindly-create-L3-tables-for-the-direct-map.patch 524e971b-x86-idle-Fix-get_cpu_idle_time-s-interaction-with-offline-pcpus.patch 524e9762-x86-percpu-Force-INVALID_PERCPU_AREA-to-non-canonical.patch 524e983e-Nested-VMX-check-VMX-capability-before-read-VMX-related-MSRs.patch 524e98b1-Nested-VMX-fix-IA32_VMX_CR4_FIXED1-msr-emulation.patch 524e9dc0-xsm-forbid-PV-guest-console-reads.patch 5256a979-x86-check-segment-descriptor-read-result-in-64-bit-OUTS-emulation.patch 5256be57-libxl-fix-vif-rate-parsing.patch 5256be84-tools-ocaml-fix-erroneous-free-of-cpumap-in-stub_xc_vcpu_getaffinity.patch 5256be92-libxl-fix-out-of-memory-error-handling-in-libxl_list_cpupool.patch 5257a89a-x86-correct-LDT-checks.patch 5257a8e7-x86-add-address-validity-check-to-guest_map_l1e.patch 5257a944-x86-check-for-canonical-address-before-doing-page-walks.patch 525b95f4-scheduler-adjust-internal-locking-interface.patch 525b9617-sched-fix-race-between-sched_move_domain-and-vcpu_wake.patch 525e69e8-credit-unpause-parked-vcpu-before-destroying-it.patch 525faf5e-x86-print-relevant-tail-part-of-filename-for-warnings-and-crashes.patch- Improvements to block-dmmd script bnc#828623- bnc#840196 - L3: MTU size on Dom0 gets reset when booting DomU with e1000 device set-mtu-from-bridge-for-tap-interface.patch- bnc#839596 - VUL-0: CVE-2013-1442: XSA-62: xen: Information leak on AVX and/or LWP capable CPUs 5242a1b5-x86-xsave-initialize-extended-register-state-when-guests-enable-it.patch - bnc#840592 - VUL-0: CVE-2013-4355: XSA-63: xen: Information leaks through I/O instruction emulation CVE-2013-4355-xsa63.patch - bnc#840593 - VUL-0: CVE-2013-4356: XSA-64: xen: Memory accessible by 64-bit PV guests under live migration CVE-2013-4356-xsa64.patch - bnc#841766 - VUL-1: CVE-2013-4361: XSA-66: xen: Information leak through fbld instruction emulation CVE-2013-4361-xsa66.patch - bnc#833796 - L3: Xen: migration broken from xsave-capable to xsave-incapable host 52205e27-x86-xsave-initialization-improvements.patch 522dc0e6-x86-xsave-fix-migration-from-xsave-capable-to-xsave-incapable-host.patch - bnc#839600 - [HP BCS SLES11 Bug]: In HP’s UEFI x86_64 platform and sles11sp3 with xen environment, xen hypervisor will panic on multiple blades nPar. 523172d5-x86-fix-memory-cut-off-when-using-PFN-compression.patch - bnc#833251 - [HP BCS SLES11 Bug]: In HP’s UEFI x86_64 platform and with xen environment, in booting stage ,xen hypervisor will panic. 522d896b-x86-EFI-properly-handle-run-time-memory-regions-outside-the-1-1-map.patch - bnc#834751 - [HP BCS SLES11 Bug]: In xen, “shutdown –y 0 –h” cannot power off system 522d896b-x86-EFI-properly-handle-run-time-memory-regions-outside-the-1-1-map.patch - Upstream patches from Jan 520119fc-xen-conring-Write-to-console-ring-even-if-console-lock-is-busted.patch 520a2705-watchdog-crash-Always-disable-watchdog-in-console_force_unlock.patch 522d8a1f-x86-allow-guest-to-set-clear-MSI-X-mask-bit-try-2.patch 522dc044-xmalloc-make-whole-pages-xfree-clear-the-order-field-ab-used-by-xmalloc.patch 522f2f9f-Nested-VMX-Clear-bit-31-of-IA32_VMX_BASIC-MSR.patch 522f37b2-sched-arinc653-check-for-guest-data-transfer-failures.patch 5231e090-libxc-x86-fix-page-table-creation-for-huge-guests.patch 5231f00c-cpufreq-missing-check-of-copy_from_guest.patch 523304b6-x86-machine_restart-must-not-call-acpi_dmar_reinstate-twice.patch 5239a064-x86-HVM-fix-failure-path-in-hvm_vcpu_initialise.patch 5239a076-VMX-fix-failure-path-in-construct_vmcs.patch 523c0ed4-x86-HVM-properly-handle-wide-MMIO.patch 523c1758-sched_credit-filter-node-affinity-mask-against-online-cpus.patch 523ff393-x86-HVM-linear-address-must-be-canonical-for-the-whole-accessed-range.patch 523ff3e2-x86-HVM-refuse-doing-string-operations-in-certain-situations.patch- Use upstream version of unplugging in PVonHVM guests add 523c1834-unmodified_drivers-enable-unplug-per-default.patch remove disable_emulated_device.patch- fate#315714 - Support pvUSB in Xen HVM guests, add xen-usb.ko- Upstream patches from Jan 521c6d4a-x86-don-t-allow-Dom0-access-to-the-MSI-address-range.patch 521c6d6c-x86-don-t-allow-Dom0-access-to-the-HT-address-range.patch 521c6e23-x86-Intel-add-support-for-Haswell-CPU-models.patch 521db25f-Fix-inactive-timer-list-corruption-on-second-S3-resume.patch 521e1156-x86-AVX-instruction-emulation-fixes.patch 521ef8d9-AMD-IOMMU-add-missing-checks.patch 52205a7d-hvmloader-smbios-Correctly-count-the-number-of-tables-written.patch 52205a90-public-hvm_xs_strings.h-Fix-ABI-regression-for-OEM-SMBios-strings.patch 52205e27-x86-xsave-initialization-improvements.patch 5226020f-xend-handle-extended-PCI-configuration-space-when-saving-state.patch 52260214-xend-fix-file-descriptor-leak-in-pci-utilities.patch 52285317-hvmloader-fix-SeaBIOS-interface.patch- bnc#837585 - xen* pkg update DISables `xencommons` and `xendomains` systemd services xen.spec- remove unneeded patch, autoload is handled by PCI device, without PCI device xen_platform_pci would not work anyway xen.sles11sp1.fate311487.xen_platform_pci.dmistring.patch- Update our xen-3.0.4 version of unplug code in qemu-trad add comments about the usage of the code rename handler function reenable handlers for writing/reading from emulated PCI device- Change unplugging of emulated devices in PVonHVM guests Since 3.0.4 xen-platform-pci.ko triggerd the unplug by writing to the PCI space of the emulated PCI device. 3.3 introduced an official unplug protocol. The option to unplug wit the official protocol is disabled per default. Remove our version and enable the unplug via official protocol- Upstream patches from Jan 51e517e6-AMD-IOMMU-allocate-IRTEs.patch 51e5183f-AMD-IOMMU-untie-remap-and-vector-maps.patch 51e63df6-VMX-fix-interaction-of-APIC-V-and-Viridian-emulation.patch 52146070-ACPI-fix-acpi_os_map_memory.patch 5214d26a-VT-d-warn-about-CFI-being-enabled-by-firmware.patch 5215d094-Nested-VMX-Check-whether-interrupt-is-blocked-by-TPR.patch 5215d0c5-Nested-VMX-Force-check-ISR-when-L2-is-running.patch 5215d135-Nested-VMX-Clear-APIC-v-control-bit-in-vmcs02.patch 5215d2d5-Nested-VMX-Update-APIC-v-RVI-SVI-when-vmexit-to-L1.patch 5215d8b0-Correct-X2-APIC-HVM-emulation.patch - Dropped 520d417d-xen-Add-stdbool.h-workaround-for-BSD.patch- bnc#836239 - SLES 11 SP3 Xen security patch does not automatically update UEFI boot binary xen.spec- Upstream patches from Jan 51d5334e-x86-mm-Ensure-useful-progress-in-alloc_l2_table.patch 51dd155c-adjust-x86-EFI-build.patch 51e63d80-x86-cpuidle-Change-logging-for-unknown-APIC-IDs.patch 51e6540d-x86-don-t-use-destroy_xen_mappings-for-vunmap.patch 51e7963f-x86-time-Update-wallclock-in-shared-info-when-altering-domain-time-offset.patch 51ffd577-fix-off-by-one-mistakes-in-vm_alloc.patch 51ffd5fd-x86-refine-FPU-selector-handling-code-for-XSAVEOPT.patch 520114bb-Nested-VMX-Flush-TLBs-and-Caches-if-paging-mode-changed.patch 520a5504-VMX-add-boot-parameter-to-enable-disable-APIC-v-dynamically.patch 520a24f6-x86-AMD-Fix-nested-svm-crash-due-to-assertion-in-__virt_to_maddr.patch 520a2570-x86-AMD-Inject-GP-instead-of-UD-when-unable-to-map-vmcb.patch 520b4b60-VT-d-protect-against-bogus-information-coming-from-BIOS.patch 520b4bda-x86-MTRR-fix-range-check-in-mtrr_add_page.patch 520cb8b6-x86-time-fix-check-for-negative-time-in-__update_vcpu_system_time.patch 520d417d-xen-Add-stdbool.h-workaround-for-BSD.patch- The xencommons.service file handles the starting of xenstored and xenconsoled. Drop the following services files as unecessary. Update xendomains.service to reflect these changes. xenstored.service xenconsoled.service blktapctrl.service- Add xencommons.service to xendomains.service 'After' tag xendomains.service- Change the default bridge in xl.conf from xenbr0 to just br0 xl-conf-default-bridge.patch - Add network.target to xendomains.service 'After' tag xendomains.service- Spec file cleanups xen.spec - Renamed xend-sysconfig.patch to xencommons-sysconfig.patch- Added support for systemd with the following service files xenstored.service blktapctrl.service xend.service xenconsoled.service xen-watchdog.service xendomains.service xencommons.service- Upstream patches from Jan 51d277a3-x86-don-t-pass-negative-time-to-gtime_to_gtsc-try-2.patch 51d27807-iommu-amd-Fix-logic-for-clearing-the-IOMMU-interrupt-bits.patch 51d27841-iommu-amd-Workaround-for-erratum-787.patch 51daa074-Revert-hvmloader-always-include-HPET-table.patch- Dropped deprecated or unnecessary patches pvdrv-import-shared-info.patch minios-fixups.patch- Update to Xen 4.3.0 FCS- Enable ARM targets for Xen- Update to Xen 4.3.0-rc6- Update to Xen 4.3.0-rc5- Update to Xen 4.3.0-rc4- Fix xen-utils compiler time warnings xen-utils-0.1.tar.bz2- Enable building the KMPs xen.spec- Update to Xen 4.3.0-rc3- bnc#801663 - performance of mirror lvm unsuitable for production block-dmmd- Update to Xen 4.3.0-rc2- The xend toolstack is now deprecated and unsupported. Consolidate all xend and traditional qemu patches into one patch file. Rename '.diff' patches to '.patch' and reoder others. xend-traditional-qemu.patch- Create a xend-tools package for the legacy xend toolstack and traditional qemu files.- Update to Xen 4.3.0-rc1 c/s 27068 Drop all upstream changeset patches now included in 4.3 tarball - Removed the doc-pdf RPM as there are no more PDFs to include since the docs/xen-api sources were dropped.- bnc#818183 - VUL-0: xen: CVE-2013-2007: XSA-51: qga set umask 0077 when daemonizing CVE-2013-2007-xsa51-1.patch CVE-2013-2007-xsa51-2.patch- add lndir to BuildRequires- remove xen.migrate.tools_notify_restore_to_hangup_during_migration_--abort_if_busy.patch It changed migration protocol and upstream wants a different solution- bnc#802221 - fix xenpaging readd xenpaging.qemu.flush-cache.patch- bnc#808269 - Fully Virtualized Windows VM install is failed on Ivy Bridge platforms with Xen kernel 26754-hvm-Improve-APIC-INIT-SIPI-emulation.patch- Upstream patches from Jan 26891-x86-S3-Fix-cpu-pool-scheduling-after-suspend-resume.patch 26930-x86-EFI-fix-runtime-call-status-for-compat-mode-Dom0.patch - Additional fix for bnc#816159 CVE-2013-1918-xsa45-followup.patch- bnc#817068 - Xen guest with >1 sr-iov vf won't start xen-managed-pci-device.patch- Update to Xen 4.2.2 c/s 26064 The following recent security patches are included in the tarball CVE-2013-0151-xsa34.patch (bnc#797285) CVE-2012-6075-xsa41.patch (bnc#797523) CVE-2013-1917-xsa44.patch (bnc#813673) CVE-2013-1919-xsa46.patch (bnc#813675)- Upstream patch from Jan 26902-x86-EFI-pass-boot-services-variable-info-to-runtime-code.patch- bnc#816159 - VUL-0: xen: CVE-2013-1918: XSA-45: Several long latency operations are not preemptible CVE-2013-1918-xsa45-1-vcpu-destroy-pagetables-preemptible.patch CVE-2013-1918-xsa45-2-new-guest-cr3-preemptible.patch CVE-2013-1918-xsa45-3-new-user-base-preemptible.patch CVE-2013-1918-xsa45-4-vcpu-reset-preemptible.patch CVE-2013-1918-xsa45-5-set-info-guest-preemptible.patch CVE-2013-1918-xsa45-6-unpin-preemptible.patch CVE-2013-1918-xsa45-7-mm-error-paths-preemptible.patch - bnc#816163 - VUL-0: xen: CVE-2013-1952: XSA-49: VT-d interrupt remapping source validation flaw for bridges CVE-2013-1952-xsa49.patch- bnc#809662 - can't use pv-grub to start domU (pygrub does work) xen.spec- bnc#814709 - Unable to create XEN virtual machines in SLED 11 SP2 on Kyoto xend-cpuinfo-model-name.patch- bnc#813673 - VUL-0: CVE-2013-1917: xen: Xen PV DoS vulnerability with SYSENTER CVE-2013-1917-xsa44.patch - bnc#813675 - VUL-0: CVE-2013-1919: xen: Several access permission issues with IRQs for unprivileged guests CVE-2013-1919-xsa46.patch - bnc#814059 - VUL-1: xen: qemu-nbd format-guessing due to missing format specification CVE-2013-1922-xsa48.patch - Upstream patches from Jan 26749-x86-reserve-pages-when-SandyBridge-integrated-graphics.patch 26751-x86-EFI-permit-setting-variable-with-non-zero-attributes.patch 26765-hvm-Clean-up-vlapic_reg_write-error-propagation.patch 26770-x86-irq_move_cleanup_interrupt-must-ignore-legacy-vectors.patch 26771-x86-S3-Restore-broken-vcpu-affinity-on-resume.patch 26772-VMX-Always-disable-SMEP-when-guest-is-in-non-paging-mode.patch 26773-x86-mm-shadow-spurious-warning-when-unmapping-xenheap-pages.patch 26774-defer-event-channel-bucket-pointer-store-until-after-XSM-checks.patch 26799-x86-don-t-pass-negative-time-to-gtime_to_gtsc.patch- bnc#813156 - IndentationError in XendCheckpoint.py xend-domain-lock.patch- bnc#797014 - no way to control live migrations - bnc#803712 - after live migration rcu_sched_state detected stalls xen.migrate.tools-xend_move_assert_to_exception_block.patch xen.migrate.tools-libxc_print_stats_if_migration_is_aborted.patch xen.migrate.tools_set_number_of_dirty_pages_during_migration.patch xen.migrate.tools_notify_restore_to_hangup_during_migration_--abort_if_busy.patch- bnc#811764 - XEN (hypervisor or kernel) has a problem with EFI variable services x86-EFI-set-variable-permit-attrs.patch - Upstream patches from Jan 26060-ACPI-ERST-table-size-checks.patch 26692-x86-fully-protect-MSI-X-table-from-PV-guest-accesses.patch 26702-powernow-add-fixups-for-AMD-P-state-figures.patch 26704-x86-MCA-suppress-bank-clearing-for-certain-injected-events.patch (bnc#805579) 26731-AMD-IOMMU-Process-softirqs-while-building-dom0-iommu-mappings.patch 26733-VT-d-Enumerate-IOMMUs-when-listing-capabilities.patch 26734-ACPI-ERST-Name-table-in-otherwise-opaque-error-messages.patch 26736-ACPI-APEI-Unlock-apei_iomaps_lock-on-error-path.patch 26737-ACPI-APEI-Add-apei_exec_run_optional.patch 26742-IOMMU-properly-check-whether-interrupt-remapping-is-enabled.patch 26743-VT-d-deal-with-5500-5520-X58-errata.patch (bnc#801910) 26744-AMD-IOMMU-allow-disabling-only-interrupt-remapping.patch- Load blktap module in xencommons init script. blktap2 doesn't support qcow2, so blktap is needed to support domains with 'tap:qcow2' disk configurations. modified tmp-initscript-modprobe.patch- bnc#809203 - xen.efi isn't signed with SUSE Secure Boot key xen.spec- Fix adding managed PCI device to an inactive domain modified xen-managed-pci-device.patch- bnc#805094 - xen hot plug attach/detach fails modified blktap-pv-cdrom.patch- bnc# 802690 - domain locking can prevent a live migration from completing modified xend-domain-lock.patch- bnc#797014 - no way to control live migrations 26675-tools-xentoollog_update_tty_detection_in_stdiostream_progress.patch xen.migrate.tools-xc_print_messages_from_xc_save_with_xc_report.patch xen.migrate.tools-xc_document_printf_calls_in_xc_restore.patch xen.migrate.tools-xc_rework_xc_save.cswitch_qemu_logdirty.patch xen.migrate.tools_set_migration_constraints_from_cmdline.patch xen.migrate.tools_add_xm_migrate_--log_progress_option.patch- Upstream patches from Jan 26585-x86-mm-Take-the-p2m-lock-even-in-shadow-mode.patch 26595-x86-nhvm-properly-clean-up-after-failure-to-set-up-all-vCPU-s.patch 26601-honor-ACPI-v4-FADT-flags.patch 26656-x86-fix-null-pointer-dereference-in-intel_get_extended_msrs.patch 26659-AMD-IOMMU-erratum-746-workaround.patch 26660-x86-fix-CMCI-injection.patch 26672-vmx-fix-handling-of-NMI-VMEXIT.patch 26673-Avoid-stale-pointer-when-moving-domain-to-another-cpupool.patch 26676-fix-compat-memory-exchange-op-splitting.patch 26677-x86-make-certain-memory-sub-ops-return-valid-values.patch 26678-SEDF-avoid-gathering-vCPU-s-on-pCPU0.patch 26679-x86-defer-processing-events-on-the-NMI-exit-path.patch 26683-credit1-Use-atomic-bit-operations-for-the-flags-structure.patch 26689-fix-domain-unlocking-in-some-xsm-error-paths.patch- fate#313584: pass bios information to XEN HVM guest xend-hvm-firmware-passthrough.patch- bnc#806736: enabling xentrace crashes hypervisor 26686-xentrace_fix_off-by-one_in_calculate_tbuf_size.patch- update xenalyze to revision 149 Make eip_list output more useful Use correct length when copying record into buffer decode PV_HYPERCALL_SUBCALL events decode PV_HYPERCALL_V2 records Analyze populate-on-demand reclamation patterns Handle 64-bit MMIO Also strip write bit when processing a generic event Make the warnigns in hvm_generic_postprocess more informative Don't warn about switching paging levels unless verbosity>=6 Process NPFs as generic for summary purposes Add HVM_EVENT_VLAPIC- Add upstream patch to fix vfb/vkb initialization in libxl 26369-libxl-devid.patch- fate##313584: pass bios information to XEN HVM guest 26554-hvm-firmware-passthrough.patch 26555-hvm-firmware-passthrough.patch 26556-hvm-firmware-passthrough.patch- Upstream patches from Jan 26516-ACPI-parse-table-retval.patch (Replaces CVE-2013-0153-xsa36.patch) 26517-AMD-IOMMU-clear-irtes.patch (Replaces CVE-2013-0153-xsa36.patch) 26518-AMD-IOMMU-disable-if-SATA-combined-mode.patch (Replaces CVE-2013-0153-xsa36.patch) 26519-AMD-IOMMU-perdev-intremap-default.patch (Replaces CVE-2013-0153-xsa36.patch) 26526-pvdrv-no-devinit.patch 26529-gcc48-build-fix.patch 26531-AMD-IOMMU-IVHD-special-missing.patch (Replaces CVE-2013-0153-xsa36.patch) 26532-AMD-IOMMU-phantom-MSI.patch 26536-xenoprof-div-by-0.patch 26576-x86-APICV-migration.patch 26577-x86-APICV-x2APIC.patch 26578-AMD-IOMMU-replace-BUG_ON.patch- bnc#797014 - no way to control live migrations 26547-tools-xc_fix_logic_error_in_stdiostream_progress.patch 26548-tools-xc_handle_tty_output_differently_in_stdiostream_progress.patch 26549-tools-xc_turn_XCFLAGS_*_into_shifts.patch 26550-tools-xc_restore_logging_in_xc_save.patch 26551-tools-xc_log_pid_in_xc_save-xc_restore_output.patch- Set $BRP_PESIGN_FILES in the %install section so that modules are signed in the buildservice (fate#314552).- PVonHVM: __devinit was removed in linux-3.8- Add 'managed' PCI passthrough support to xend, allowing support for the same through libvirt xen-managed-pci-device.patch FATE#313570- Upstream patches from Jan 26287-sched-credit-pick-idle.patch 26340-VT-d-intremap-verify-legacy-bridge.patch (Replaces CVE-2012-5634-xsa33.patch) 26370-libxc-x86-initial-mapping-fit.patch 26395-x86-FPU-context-conditional.patch 26404-x86-forward-both-NMI-kinds.patch 26418-x86-trampoline-consider-multiboot.patch 26427-x86-AMD-enable-WC+.patch 26428-x86-HVM-RTC-update.patch 26440-x86-forward-SERR.patch 26443-ACPI-zap-DMAR.patch 26444-x86-nHVM-no-self-enable.patch (Replaces CVE-2013-0152-xsa35.patch) 26501-VMX-simplify-CR0-update.patch 26502-VMX-disable-SMEP-when-not-paging.patch- bnc#800275 - VUL-0: XSA-36: CVE-2013-0153: xen: interrupt remap entries shared and old ones not cleared on AMD IOMMUs CVE-2013-0153-xsa36.patch- Add # needssslcertforbuild to the specfile, to make the UEFI signing certificate available during build (fate#314511, fate#314552).- bnc#798188 - Add $network to xend initscript dependencies- Add upstream patches to fix libxl bugs. These patches have already been posted for inclusion in xen-4.2-testing. 25912-partial-libxl.patch 26372-tools-paths.patch 26468-libxl-race.patch 26469-libxl-race.patch- bnc#797285 - VUL-0: Xen: XSA-34 (CVE-2013-0151) - nested virtualization on 32-bit exposes host crash CVE-2013-0151-xsa34.patch - bnc#797287 - VUL-0: Xen: XSA-35 (CVE-2013-0152) - Nested HVM exposes host to being driven out of memory by guest CVE-2013-0152-xsa35.patch- bnc#793717 - NetWare will not boot on Xen 4.2 xnloader.py domUloader.py pygrub-netware-xnloader.patch Removed reverse-24757-use-grant-references.patch- bnc#797523 - VUL-1: CVE-2012-6075: qemu / kvm-qemu: e1000 overflows under some conditions CVE-2012-6075-xsa41.patch- Mask the floating point exceptions for guests like NetWare on machines that support XSAVE. x86-fpu-context-conditional.patch- fate##313584: pass bios information to XEN HVM guest 26341-hvm-firmware-passthrough.patch 26342-hvm-firmware-passthrough.patch 26343-hvm-firmware-passthrough.patch 26344-hvm-firmware-passthrough.patch- bnc#787169 - L3: Marvell 88SE9125 disk controller not detecting disk in Xen kernel 26133-IOMMU-defer-BM-disable.patch 26324-IOMMU-assign-params.patch 26325-IOMMU-add-remove-params.patch 26326-VT-d-context-map-params.patch 26327-AMD-IOMMU-flush-params.patch 26328-IOMMU-pdev-type.patch 26329-IOMMU-phantom-dev.patch 26330-VT-d-phantom-MSI.patch 26331-IOMMU-phantom-dev-quirk.patch - Upstream patches from Jan 26294-x86-AMD-Fam15-way-access-filter.patch 26320-IOMMU-domctl-assign-seg.patch 26332-x86-compat-show-guest-stack-mfn.patch 26333-x86-get_page_type-assert.patch- bnc#794316 - VUL-0: CVE-2012-5634: xen: VT-d interrupt remapping source validation flaw (XSA-33) CVE-2012-5634-xsa33.patch- Update to Xen 4.2.1 c/s 25952- Upstream patches from Jan 26195-x86-compat-atp-gmfn-range-cont.patch 26196-ACPI-set-PDC-bits-rc.patch 26200-IOMMU-debug-verbose.patch 26203-x86-HAP-dirty-vram-leak.patch 26229-gnttab-version-switch.patch (Replaces CVE-2012-5510-xsa26.patch) 26230-x86-HVM-limit-batches.patch (Replaces CVE-2012-5511-xsa27.patch) 26231-memory-exchange-checks.patch (Replaces CVE-2012-5513-xsa29.patch) 26232-x86-mark-PoD-error-path.patch (Replaces CVE-2012-5514-xsa30.patch) 26233-memop-order-checks.patch (Replaces CVE-2012-5515-xsa31.patch) 26234-x86-page-from-gfn-pv.patch (Replaces CVE-2012-5525-xsa32.patch) 26235-IOMMU-ATS-max-queue-depth.patch 26252-VMX-nested-rflags.patch 26253-VMX-nested-rdtsc.patch 26254-VMX-nested-dr.patch 26255-VMX-nested-ia32e-mode.patch 26258-VMX-nested-intr-delivery.patch 26260-x86-mmuext-errors.patch 26262-x86-EFI-secure-shim.patch 26266-sched-ratelimit-check.patch 26272-x86-EFI-makefile-cflags-filter.patch- bnc#757525 - domain destroyed on live migration with missing vif on target machine xen-migration-bridge-check.patch- NetWare will not boot or install on Xen 4.2 reverse-24757-use-grant-references.patch- fate#313222 - xenstore-chmod should support 256 permissions 26189-xenstore-chmod.patch- bnc#789945 - VUL-0: CVE-2012-5510: xen: Grant table version switch list corruption vulnerability (XSA-26) CVE-2012-5510-xsa26.patch - bnc#789944 - VUL-0: CVE-2012-5511: xen: Several HVM operations do not validate the range of their inputs (XSA-27) CVE-2012-5511-xsa27.patch - bnc#789951 - VUL-0: CVE-2012-5513: xen: XENMEM_exchange may overwrite hypervisor memory (XSA-29) CVE-2012-5513-xsa29.patch - bnc#789948 - VUL-0: CVE-2012-5514: xen: Missing unlock in guest_physmap_mark_populate_on_demand() (XSA-30) CVE-2012-5514-xsa30.patch - bnc#789950 - VUL-0: CVE-2012-5515: xen: Several memory hypercall operations allow invalid extent order values (XSA-31) CVE-2012-5515-xsa31.patch - bnc#789952 - VUL-0: CVE-2012-5525: xen: Several hypercalls do not validate input GFNs (XSA-32) CVE-2012-5525-xsa32.patch - Upstream patches from Jan 26129-ACPI-BGRT-invalidate.patch 26132-tmem-save-NULL-check.patch 26134-x86-shadow-invlpg-check.patch 26139-cpumap-masking.patch 26148-vcpu-timer-overflow.patch (Replaces CVE-2012-4535-xsa20.patch) 26149-x86-p2m-physmap-error-path.patch (Replaces CVE-2012-4537-xsa22.patch) 26150-x86-shadow-unhook-toplevel-check.patch (Replaces CVE-2012-4538-xsa23.patch) 26151-gnttab-compat-get-status-frames.patch (Replaces CVE-2012-4539-xsa24.patch) 26179-PCI-find-next-cap.patch 26183-x86-HPET-masking.patch 26188-x86-time-scale-asm.patch- remove obsolete pv-driver-build.patch to fix build- Fix build with glibc 2.17: add patch xen-glibc217.patch, fix configure for librt.- bnc#777628 - guest "disappears" after live migration Updated block-dmmd script- Fix exception in balloon.py and osdep.py xen-max-free-mem.diff- fate#311966: Fix XEN VNC implementation to correctly map keyboard layouts VNC-Support-for-ExtendedKeyEvent-client-message.patch- fate#310510 - fix xenpaging restore changes to integrate paging into xm/xend xenpaging.autostart.patch xenpaging.doc.patch- bnc#787163 - VUL-0: CVE-2012-4544: xen: Domain builder Out-of- memory due to malicious kernel/ramdisk (XSA 25) CVE-2012-4544-xsa25.patch - bnc#779212 - VUL-0: CVE-2012-4411: XEN / qemu: guest administrator can access qemu monitor console (XSA-19) CVE-2012-4411-xsa19.patch- bnc#786516 - VUL-0: CVE-2012-4535: xen: Timer overflow DoS vulnerability CVE-2012-4535-xsa20.patch - bnc#786518 - VUL-0: CVE-2012-4536: xen: pirq range check DoS vulnerability CVE-2012-4536-xsa21.patch - bnc#786517 - VUL-0: CVE-2012-4537: xen: Memory mapping failure DoS vulnerability CVE-2012-4537-xsa22.patch - bnc#786519 - VUL-0: CVE-2012-4538: xen: Unhooking empty PAE entries DoS vulnerability CVE-2012-4538-xsa23.patch - bnc#786520 - VUL-0: CVE-2012-4539: xen: Grant table hypercall infinite loop DoS vulnerability CVE-2012-4539-xsa24.patch - bnc#784087 - L3: Xen BUG at io_apic.c:129 26102-x86-IOAPIC-legacy-not-first.patch- Upstream patches from Jan 25920-x86-APICV-enable.patch 25921-x86-APICV-delivery.patch 25922-x86-APICV-x2APIC.patch 25957-x86-TSC-adjust-HVM.patch 25958-x86-TSC-adjust-sr.patch 25959-x86-TSC-adjust-expose.patch 25975-x86-IvyBridge.patch 25984-SVM-nested-paging-mode.patch 26054-x86-AMD-perf-ctr-init.patch 26055-x86-oprof-hvm-mode.patch 26056-page-alloc-flush-filter.patch 26061-x86-oprof-counter-range.patch 26062-ACPI-ERST-move-data.patch 26063-x86-HPET-affinity-lock.patch 26095-SVM-nested-leak.patch 26096-SVM-nested-vmexit-emul.patch 26098-perfc-build.patch- handle possible asprintf failures in log-guest-console.patch- bnc#694863 - kexec fails in xen 26093-hvm_handle_PoD_and_grant_pages_in_HVMOP_get_mem_type.patch- fate#312709: Pygrub needs to know which entry to select 26114-pygrub-list-entries.patch- merge changes fron xen-unstable, obsolete our changes 26077-stubdom_fix_compile_errors_in_grub.patch 26078-hotplug-Linux_remove_hotplug_support_rely_on_udev_instead.patch 26079-hotplug-Linux_close_lockfd_after_lock_attempt.patch 26081-stubdom_fix_rpmlint_warning_spurious-executable-perm.patch 26082-blktap2-libvhd_fix_rpmlint_warning_spurious-executable-perm.patch 26083-blktap_fix_rpmlint_warning_spurious-executable-perm.patch 26084-hotplug_install_hotplugpath.sh_as_data_file.patch 26085-stubdom_install_stubdompath.sh_as_data_file.patch 26086-hotplug-Linux_correct_sysconfig_tag_in_xendomains.patch 26087-hotplug-Linux_install_sysconfig_files_as_data_files.patch 26088-tools_xend_fix_wrong_condition_check_for_xml_file.patch- fate#311966: Fix XEN VNC implementation to correctly map keyboard layouts VNC-Support-for-ExtendedKeyEvent-client-message.patch- workaround bash bug in locking.sh:claim_lock, close fd- fix incorrect self-provides/obsoletes of xen-tools-ioemu- bnc#783847 - Virtualization/xen: Bug Xen 4.2 'xendomins' init script incorrectly Requires 'xend' service when using 'xl' toolstack init.xendomains- bnc#782835 - Xen HVM Guest fails (errors) to launch on Opensuse 12.2 + Xen 4.2 + 'xl' toolstack xen-pygrub-grub-args.patch- backport parallel build support for stubdom - rename 5 patches which were merged upstream- remove more obsolete changes: CFLAGS passing to qemu-traditional, PYTHON_PREFIX_ARG handling and pygrub installation- update blktap-pv-cdrom.patch handle allocation errors in asprintf to fix compile errors handle value returned from xs_read properly remove casts from void pointers- update xenalyze to revision 138 Fix dump time calculation overflow move struct record_info into a header correctly display of count of HW events update trace.h to match xen-unstable Remove vestigal HW_IRQ trace records Remove decode of PV_UPDATE_VA_MAPPING automatically generate dependencies Get rid of redundant hvm dump_header Introduce more efficient read mechanism Eliminate unnecessary cycles_to_time calculation Rework math to remove two 64-bit divisions Enable -O2 optimization level Remove --dump-cooked Remove spurious dump_header construction Improve record-sorting algorithm Use long to cast into and out of pointers Make max_active_pcpu calculation smarter Optimize pcpu_string Enable more cr3 output Sort cr3 enumerated values by start time Add option to skip vga range in MMIO enumeration Handle MMIO records from different vmexits Relocate pio and mmio enumaration structs to their own sub-struct Handle new hvm_event traces Introduce generic summary functionality Function-ize setting of h->post_process Reorganize cr trace handling Allow several summary handlers to register on a single vmexit Get rid of all tabs in xenalyze.c Handle new IRQ tracing Decrease verbosity Print exit reason number if no string is available Fix minor summary issue Add string for TPR_BELOW_THRESHOLD Raise MAX_CPUS to 256 cpus. Add --report-pcpu option to report physical cpu utilization. increase MAX_CPUS Handle RUNSTATE_INIT in domain_runstate calculation- update RPM_OPT_FLAGS handling in spec file pass EXTRA_CFLAGS via environment- remove obsolete xencommons-proc-xen.patch- Upstream patches from Jan 25927-x86-domctl-ioport-mapping-range.patch 25929-tmem-restore-pool-version.patch 25931-x86-domctl-iomem-mapping-checks.patch 25940-x86-S3-flush-cache.patch 25952-x86-MMIO-remap-permissions.patch 25961-x86-HPET-interrupts.patch 25962-x86-assign-irq-vector-old.patch 25965-x86-ucode-Intel-resume.patch- pygrub: always append --args 25941-pygrub_always_append_--args.patch- use BuildRequires: gcc46 only in sles11sp2 or 12.1 to fix build in 11.4- Upstream patches from Jan 25833-32on64-bogus-pt_base-adjust.patch 25835-adjust-rcu-lock-domain.patch 25836-VT-d-S3-MSI-resume.patch 25850-tmem-xsa-15-1.patch 25851-tmem-xsa-15-2.patch 25852-tmem-xsa-15-3.patch 25853-tmem-xsa-15-4.patch 25854-tmem-xsa-15-5.patch 25855-tmem-xsa-15-6.patch 25856-tmem-xsa-15-7.patch 25857-tmem-xsa-15-8.patch 25858-tmem-xsa-15-9.patch 25859-tmem-missing-break.patch 25860-tmem-cleanup.patch 25861-x86-early-fixmap.patch 25862-sercon-non-com.patch 25863-sercon-ehci-dbgp.patch 25864-sercon-unused.patch 25866-sercon-ns16550-pci-irq.patch 25867-sercon-ns16550-parse.patch 25874-x86-EFI-chain-cfg.patch 25909-xenpm-consistent.patch- Fixed the 32bit build.- Update to Xen 4.2.0 FCS c/s 25844- unmodified_drivers: handle IRQF_SAMPLE_RANDOM, it was removed in 3.6-rc1- bnc#778105 - first XEN-PV VM fails to spawn xend: Increase wait time for disk to appear in host bootloader Modified existing xen-domUloader.diff- Disable the snapshot patches. Snapshot only supported the qcow2 image format which was poorly implemented qemu 0.10.2. Snapshot support may be restored in the future when the newer upstream qemu is used by Xen.- bnc#776995 - attaching scsi control luns with pvscsi - xend/pvscsi: fix passing of SCSI control LUNs xen-bug776995-pvscsi-no-devname.patch - xend/pvscsi: fix usage of persistant device names for SCSI devices xen-bug776995-pvscsi-persistent-names.patch - xend/pvscsi: update sysfs parser for Linux 3.0 xen-bug776995-pvscsi-sysfs-parser.patch- Update to Xen 4.2.0 RC3+ c/s 25779- Update to Xen 4.2.0 RC2+ c/s 25765-bnc#766284 - compiled-in ata_piix driver issues with PVonHVM guests Update xen_pvdrivers.conf to match not only libata but also ata_piix This avoids IO errors in the piix driver caused by unplugged hardware- Update to Xen 4.1.3 c/s 23336- Upstream or pending upstream patches from Jan 25587-fix-off-by-one-parsing-error.patch 25616-x86-MCi_CTL-default.patch 25617-vtd-qinval-addr.patch 25688-x86-nr_irqs_gsi.patch- Build all files with optimization (fortify source does not work with -O0).- bnc#773393 - VUL-0: CVE-2012-3433: xen: HVM guest destroy p2m teardown host DoS vulnerability CVE-2012-3433-xsa11.patch - bnc#773401 - VUL-1: CVE-2012-3432: xen: HVM guest user mode MMIO emulation DoS 25682-x86-inconsistent-io-state.patch- bnc#762484 - VUL-1: CVE-2012-2625: xen: pv bootloader doesn't check the size of the bzip2 or lzma compressed kernel, leading to denial of service 25589-pygrub-size-limits.patch- Make it build with latest TeXLive 2012 with new package layout- bnc#767273 - unsupported /var/lock/subsys is still used by xendomains init.xendomains- bnc#766283 - opensuse 12.2 pv guests can not start after installation due to lack of grub2 support in the host 24000-pygrub-grub2.patch 24001-pygrub-grub2.patch 24002-pygrub-grub2.patch- Upstream pygrub patches for grub2 support and fixes 23686-pygrub-solaris.patch 23697-pygrub-grub2.patch 23944-pygrub-debug.patch 23998-pygrub-GPT.patch 23999-pygrub-grub2.patch 24064-pygrub-HybridISO.patch 24401-pygrub-scrolling.patch 24402-pygrub-edit-fix.patch 24460-pygrub-extlinux.patch 24706-pygrub-extlinux.patch- Revised version of security patch and an additional patch for bnc#764077 x86_64-AMD-erratum-121.patch x86_64-allow-unsafe-adjust.patch- remove dummy asm/smp-processor-id.h- removed dummy xenapi.tex which was added because of bnc#750679 (see the below entry dated "Mon Apr 2 13:07:20 CEST 2012") because "ps2pdf xenapi.ps xenapi.pdf" failed only for Ghostscript version 9.04 (now we have Ghostscript 9.05).- bnc#764077 - VUL-0: EMBARGOED: xen: XSA-9: denial of service on older AMD systems x86_64-AMD-erratum-121.patch - Revised version of security patch for bnc#757537 x86_64-sysret-canonical.patch- Upstream patches from Jan 25242-x86_64-hotplug-compat-m2p.patch 25247-SVM-no-rdtsc-intercept.patch 25267-x86-text-unlikely.patch 25269-x86-vMCE-addr-misc-write.patch 25271-x86_64-IST-index.patch 25327-pvdrv-no-asm-system-h.patch- add dummy asm/smp-processor-id.h for kernel-source 3.4-rcX- remove inclusion of asm/system.h from platform-pci.c- Upstream patches from Jan 25168-x86-memset-size.patch 25191-x86-tdt-delta-calculation.patch 25195-x86-cpuidle-C2-no-flush-or-bm-check.patch 25196-x86-HAP-PAT-sr.patch 25200-x86_64-trap-bounce-flags.patch- bnc#757537 - VUL-0: xen: CVE-2012-0217 PV guest escalation x86_64-sysret-canonical.patch - bnc#757970 - VUL-1: xen: guest denial of service on syscall GPF generation x86_64-trap-bounce-flags.patch- Upstream patches from Jan 25098-x86-emul-lock-UD.patch 25101-x86-hpet-disable.patch ioemu-9877-MSI-X-device-cleanup.patch- bnc#750679 - "ps2pdf xenapi.ps xenapi.pdf" fails for user abuild in Factory add dummy xenapi.tex until ghostscript is fixed- remove vcd.o rule from PVonHVM Makefile, not needed anymore- bnc#753165 - xen/scripts/network-bridge wont create bridge bridge-bonding.diff- Upstream patches from Jan 24950-gnttab-copy-mapped.patch 24970-x86-cpuidle-deny-port-access.patch 24996-x86-cpuidle-array-overrun.patch 25041-tapdisk2-create-init-name.patch- use BuildRequires: gcc46 only in sles11sp2 to avoid issues when gcc47 and newer is the distro default- bnc#745880 - cpuid setting is not preserved across xend restarts xend-cpuid.patch- Rename 2XXXX-vif-bridge.patch -> vif-bridge-tap-fix.patch- bnc#747331 - XEN: standard "newburn" kernel QA stress test on guest (+ smartd on Dom0?) freezes the guest 24883-x86-guest-walk-not-present.patch - bnc#745367 - MCE bank handling during migration 24781-x86-vmce-mcg_ctl.patch 24886-x86-vmce-mcg_ctl-default.patch 24887-x86-vmce-sr.patch - bnc#744771 - L3: VM with passed through PCI card fails to reboot under dom0 load 24888-pci-release-devices.patch - Upstream patches from Jan 24517-VT-d-fault-softirq.patch 24527-AMD-Vi-fault-softirq.patch 24535-x86-vMSI-misc.patch 24615-VESA-lfb-flush.patch 24690-x86-PCI-SERR-no-deadlock.patch 24701-gnttab-map-grant-ref-recovery.patch 24742-gnttab-misc.patch 24780-x86-paging-use-clear_guest.patch 24805-x86-MSI-X-dom0-ro.patch ioemu-9869-MSI-X-init.patch ioemu-9873-MSI-X-fix-unregister_iomem.patch- add BuildRequires: libuuid-devel- bnc#746702 - Xen HVM DomU crash during Windows Server 2008 R2 install, when maxmem > memory README.SuSE- bnc#745005 - Update vif configuration examples in xmexample* Updated xen-xmexample.diff- bnc#743414 - using vifname is ignored when defining a xen virtual interface with xl/libxl 24459-libxl-vifname.patch- bnc#740165 - VUL-0: kvm: qemu heap overflow in e1000 device emulation (applicable to Xen qemu - CVE-2012-0029) cve-2012-0029-qemu-xen-unstable.patch- bnc#744014 - blank screen in SLES11 SP2 guest with a VF statically assigned ioemu-MSI-X-fix-unregister_iomem.patch - Upstream patches from Jan 24453-x86-vIRQ-IRR-TMR-race.patch 24456-x86-emul-lea.patch- fate#310510 - fix xenpaging 24586-x86-mm_Properly_account_for_paged_out_pages.patch 24609-tools-libxc_handle_fallback_in_linux_privcmd_map_foreign_bulk_properly.patch 24610-xenpaging_make_file_op_largefile_aware.patch xen-unstable.misc.linux_privcmd_map_foreign_bulk.retry_paged.patch xenpaging.speedup-page-out.resume_pages.find_next_bit_set.patch xenpaging.speedup-page-out.evict_pages.free_slot_stack.patch xenpaging.speedup-page-out.policy_choose_victim.patch update xenpaging.error-handling.patch, flush qemu cache not so often- fate#310510 - fix xenpaging 24566-tools-libxc_fix_error_handling_in_xc_mem_paging_load.patch- fate#310510 - fix xenpaging 24466-libxc_Only_retry_mapping_pages_when_ENOENT_is_returned.patch- The xen kmp packages fail on the 09-check-packaged-twice script. Rename xen_pvdrivers.conf to xen_pvdrivers-.conf- fate#310510 - fix xenpaging xenpaging.speedup-page-in.gfn_to_slot.patch- bnc#739585 - L3: Xen block-attach fails after repeated attach/detach blktap-close-fifos.patch blktap-disable-debug-printf.patch- bnc#741159 - Fix default setting of XENSTORED_ROOTDIR in xencommons init script xencommons-xenstored-root.patch- bnc#740625 - xen: cannot interact with xend after upgrade (SLES) - bnc#738694 - xen: cannot interact with xend after upgrade (os12.1) - Other README changes included. README.SuSE- bnc#694863 - kexec fails in xen 24478-libxl_add_feature_flag_to_xenstore_for_XS_RESET_WATCHES.patch- fate#310510 - fix xenpaging xenpaging.speedup-page-out.patch- bnc#735806 - VF doesn't work after hot-plug for many times 24448-x86-pt-irq-leak.patch - Upstream patches from Jan 24261-x86-cpuidle-Westmere-EX.patch 24417-amd-erratum-573.patch 24429-mceinj-tool.patch 24447-x86-TXT-INIT-SIPI-delay.patch ioemu-9868-MSI-X.patch- bnc#732884 - remove private runlevel 4 from init scripts xen.no-default-runlevel-4.patch- bnc#727515 - Fragmented packets hang network boot of HVM guest ipxe-gcc45-warnings.patch ipxe-ipv4-fragment.patch ipxe-enable-nics.patch- fate#310510 - fix xenpaging update xenpaging.autostart.patch, make changes with mem-swap-target permanent update xenpaging.doc.patch, mention issues with live migration- fate#310510 - fix xenpaging add xenpaging.evict_mmap_readonly.patch update xenpaging.error-handling.patch, reduce debug output- bnc#736824 - Microcode patches for AMD's 15h processors panic the system 24189-x86-p2m-pod-locking.patch 24412-x86-AMD-errata-model-shift.patch 24411-x86-ucode-AMD-Fam15.patch- bnc#711219 - SR-IOV VF doesn't work in SLES11 sp2 guest 24357-firmware-no-_PS0-_PS3.patch - Upstream patches from Jan 24153-x86-emul-feature-checks.patch 24275-x86-emul-lzcnt.patch 24277-x86-dom0-features.patch 24278-x86-dom0-no-PCID.patch 24282-x86-log-dirty-bitmap-leak.patch 24359-x86-domU-features.patch 24360-x86-pv-domU-no-PCID.patch 24389-amd-fam10-gart-tlb-walk-err.patch 24391-x86-pcpu-version.patch- bnc#729208 - xenpaging=-1 doesn't work xenpaging.doc.patch- fate#310510 - fix xenpaging readd xenpaging.qemu.flush-cache.patch- bnc#732782 - L3: xm create hangs when maxmen value is enclosed in "quotes" xm-create-maxmem.patch- Upstream patches / changes from Jan Added 24358-kexec-compat-overflow.patch Removed 24341-x86-64-mmcfg_remove___initdata_annotation_overlooked_in_23749e8d1c8f074ba.patch Removed 24345-tools-libxc_Fix_x86_32_build_breakage_in_previous_changeset..patch- fate#310510 - fix xenpaging 24178-debug_Add_domain-vcpu_pause_count_info_to_d_key..patch Use wait queues for paging, improve foreign mappings. xenpaging.versioned-interface.patch xenpaging.mmap-before-nominate.patch xenpaging.p2m_is_paged.patch xenpaging.evict_fail_fast_forward.patch xenpaging.error-handling.patch xenpaging.mem_event-use-wait_queue.patch xenpaging.waitqueue-paging.patch Remove obsolete patch, not needed with wait queue usage xenpaging.HVMCOPY_gfn_paged_out.patch- fate#310510 - fix xenpaging Fix incorrect backport, remove double memset, use xzalloc 24171-x86waitqueue_Allocate_whole_page_for_shadow_stack..patch- fate#310510 - fix xenpaging fix typo in nominate, use lock instead of double unlock 23905-xenpaging_fix_locking_in_p2m_mem_paging_functions.patch- fate#310510 - fix xenpaging 24327-After_preparing_a_page_for_page-in_allow_immediate_fill-in_of_the_page_contents.patch 24328-Tools_Libxc_wrappers_to_automatically_fill_in_page_oud_page_contents_on_prepare.patch 24329-Teach_xenpaging_to_use_the_new_and_non-racy_xc_mem_paging_load_interface.patch- bnc#734826 - xm rename doesn't work anymore Updated xend-migration-domname-fix.patch- fate#310510 - fix xenpaging 24269-mem_event_move_mem_event_domain_out_of_struct_domain.patch 24270-Free_d-mem_event_on_domain_destruction..patch- fate#310510 - fix xenpaging 24318-x86-mm_Fix_checks_during_foreign_mapping_of_paged_pages.patch- fate#310510 - fix xenpaging 23949-constify_vcpu_set_affinitys_second_parameter.patch- fate#310510 - fix xenpaging 24105-xenpaging_compare_domain_pointer_in_p2m_mem_paging_populate.patch 24106-mem_event_check_capabilities_only_once.patch- fate#310510 - fix xenpaging 24272-xenpaging_Fix_c-s_235070a29c8c3ddf7_update_machine_to_phys_mapping_during_page_deallocation.patch- bnc#727081 - xend domains don't work anymore since update from 12.1 beta to 12.1 RC 1 24344-tools-x86_64_Fix_cpuid_inline_asm_to_not_clobber_stacks_red_zone.patch 24345-tools-libxc_Fix_x86_32_build_breakage_in_previous_changeset..patch- bnc#733449 - Panic in mcfg_ioremap when booting xen-dbg.gz on Xeon E3-1230 24341-x86-64-mmcfg_remove___initdata_annotation_overlooked_in_23749e8d1c8f074ba.patch- fate#310510 - fix xenpaging backport waitqueue changes from xen-unstable 24104-waitqueue_Double_size_of_x86_shadow_stack..patch 24171-x86waitqueue_Allocate_whole_page_for_shadow_stack..patch 24195-waitqueue_Detect_saved-stack_overflow_and_crash_the_guest..patch 24196-waitqueue_Reorder_prepare_to_wait_so_that_vcpu_is_definitely_on_the.patch 24197-x86-waitqueue_Because_we_have_per-cpu_stacks_we_must_wake_up_on_teh.patch 24231-waitqueue_Implement_wake_up_nroneall..patch 24232-waitqueue_Hold_a_reference_to_a_domain_on_a_waitqueue..patch- fate#310510 - fix xenpaging 24227-xenpaging_restrict_pagefile_permissions.patch- fate#310510 - fix xenpaging merge upstream version of our existing patches: 24218-libxc_add_bitmap_clear_function.patch remove old versions: xenpaging.bitmap_clear.patch- fate#310510 - fix xenpaging merge upstream version of our existing patches: 24138-xenpaging_munmap_all_pages_after_page-in.patch 24208-xenpaging_remove_filename_from_comment.patch 24209-xenpaging_remove_obsolete_comment_in_resume_path.patch 24210-xenpaging_use_PERROR_to_print_errno.patch 24211-xenpaging_simplify_file_op.patch 24212-xenpaging_print_gfn_in_failure_case.patch 24213-xenpaging_update_xenpaging_init.patch 24214-xenpaging_remove_xc_dominfo_t_from_paging_t.patch 24215-xenpaging_track_the_number_of_paged-out_pages.patch 24216-xenpaging_move_page_add-resume_loops_into_its_own_function..patch 24217-xenpaging_improve_mainloop_exit_handling.patch 24219-xenpaging_retry_unpageable_gfns.patch 24220-xenpaging_install_into_LIBEXEC_dir.patch 24221-xenpaging_add_XEN_PAGING_DIR_-_libxl_xenpaging_dir_path.patch 24222-xenpaging_use_guests_tot_pages_as_working_target.patch 24223-xenpaging_watch_the_guests_memory-target-tot_pages_xenstore_value.patch 24224-xenpaging_add_cmdline_interface_for_pager.patch 24225-xenpaging_improve_policy_mru_list_handling.patch 24226-xenpaging_add_debug_to_show_received_watch_event..patch remove old versions: xenpaging.XEN_PAGING_DIR.patch xenpaging.add_evict_pages.patch xenpaging.cmdline-interface.patch xenpaging.encapsulate_domain_info.patch xenpaging.file_op-return-code.patch xenpaging.install-to-libexec.patch xenpaging.low_target_policy_nomru.patch xenpaging.main-loop-exit-handling.patch xenpaging.misleading-comment.patch xenpaging.page_in-munmap-size.patch xenpaging.print-gfn.patch xenpaging.record-numer-paged-out-pages.patch xenpaging.reset-uncomsumed.patch xenpaging.stale-comments.patch xenpaging.target-tot_pages.patch xenpaging.use-PERROR.patch xenpaging.watch-target-tot_pages.patch xenpaging.watch_event-DPRINTF.patch xenpaging.xc_interface_open-comment.patch- bnc#733348 - Use 'xm' in various scripts if xend is running. Modified xmclone.sh and xen-updown.sh - Only emit xl warning when xend is running and -f (force) flag is not specified. Modified disable-xl-when-using-xend.patch- Upstream patches from Jan 24190-hap-log-dirty-disable-rc.patch 24193-hap-track-dirty-vram-rc.patch 24201-x86-pcpu-platform-op.patch- Upstream patches from Jan 23900-xzalloc.patch 24144-cpufreq-turbo-crash.patch 24148-shadow-pgt-dying-op-performance.patch 24155-x86-ioapic-EOI-after-migration.patch 24156-x86-ioapic-shared-vectors.patch 24157-x86-xstate-init.patch 24168-x86-vioapic-clear-remote_irr.patch- submit fixes for bnc#649209 and bnc#711892 xl-create-pv-with-qcow2-img.patch update suspend_evtchn_lock.patch- Update trace.c, merge patches from upstream 23050-xentrace_dynamic_tracebuffer_allocation.patch 23091-xentrace_fix_t_info_pages_calculation..patch 23092-xentrace_print_calculated_numbers_in_calculate_tbuf_size.patch 23093-xentrace_remove_gdprintk_usage_since_they_are_not_in_guest_context.patch 23094-xentrace_update_comments.patch 23095-xentrace_use_consistent_printk_prefix.patch 23128-xentrace_correct_formula_to_calculate_t_info_pages.patch 23129-xentrace_remove_unneeded_debug_printk.patch 23173-xentrace_Move_register_cpu_notifier_call_into_boot-time_init..patch 23239-xentrace_correct_overflow_check_for_number_of_per-cpu_trace_pages.patch 23308-xentrace_Move_the_global_variable_t_info_first_offset_into_calculate_tbuf_size.patch 23309-xentrace_Mark_data_size___read_mostly_because_its_only_written_once.patch 23310-xentrace_Remove_unneeded_cast_when_assigning_pointer_value_to_dst.patch 23404-xentrace_reduce_trace_buffer_size_to_something_mfn_offset_can_reach.patch 23405-xentrace_fix_type_of_offset_to_avoid_ouf-of-bounds_access.patch 23406-xentrace_update___insert_record_to_copy_the_trace_record_to_individual_mfns.patch 23407-xentrace_allocate_non-contiguous_per-cpu_trace_buffers.patch 23643-xentrace_Allow_tracing_to_be_enabled_at_boot.patch 23719-xentrace_update___trace_var_comment.patch Remove old patches: xen-unstable.xentrace.dynamic_tbuf.patch xen-unstable.xentrace.empty_t_info_pages.patch xen-unstable.xentrace.verbose.patch xen-unstable.xentrace.no_gdprintk.patch xen-unstable.xentrace.comments.patch xen-unstable.xentrace.printk_prefix.patch xen-unstable.xentrace.remove_debug_printk.patch xen-unstable.xentrace.t_info_pages-formula.patch xen-unstable.xentrace.register_cpu_notifier-boot_time.patch xen-unstable.xentrace.t_info_page-overflow.patch xen-unstable.xentrace.t_info_first_offset.patch xen-unstable.xentrace.data_size__read_mostly.patch xen-unstable.xentrace.__insert_record-dst-type.patch- Upstream patches from Jan 24116-x86-continuation-cancel.patch 24123-x86-cpuidle-quiesce.patch 24124-x86-microcode-amd-quiesce.patch 24137-revert-23666.patch 24xxx-shadow-pgt-dying-op-performance.patch- bnc#722738 - xm cpupool-create errors out xen-cpupool-xl-config-format.patch- Fix broken build when building docs 23819-make-docs.patch- bnc#720054 - Prevent vif-bridge from adding user-created tap interfaces to a bridge 2XXXX-vif-bridge.patch- bnc#713503 - DOM0 filesystem commit 23752-x86-shared-IRQ-vector-maps.patch 23754-AMD-perdev-vector-map.patch- fate#310510 - fix xenpaging This change reverses the task of xenpaging. Before this change a fixed number of pages was paged out. With this change the guest will not have access to more than the given number of pages at the same time. The xenpaging= config option is replaced by actmem= A new xm mem-swap-target is added. The xenpaging binary is moved to /usr/lib/xen/bin/ xenpaging.HVMCOPY_gfn_paged_out.patch xenpaging.XEN_PAGING_DIR.patch xenpaging.add_evict_pages.patch xenpaging.bitmap_clear.patch xenpaging.cmdline-interface.patch xenpaging.encapsulate_domain_info.patch xenpaging.file_op-return-code.patch xenpaging.guest-memusage.patch xenpaging.install-to-libexec.patch xenpaging.low_target_policy_nomru.patch xenpaging.main-loop-exit-handling.patch xenpaging.misleading-comment.patch xenpaging.page_in-munmap-size.patch xenpaging.print-gfn.patch xenpaging.record-numer-paged-out-pages.patch xenpaging.reset-uncomsumed.patch xenpaging.stale-comments.patch xenpaging.target-tot_pages.patch xenpaging.use-PERROR.patch xenpaging.watch-target-tot_pages.patch xenpaging.watch_event-DPRINTF.patch xenpaging.xc_interface_open-comment.patch- xen.spec: update filelist package /usr/lib*/xen with wildcard to pickup new files remove duplicate /usr/sbin/xen-list from filelist- bnc#725169 - xen-4.0.2_21511_03-0.5.3: bootup hangs 23993-x86-microcode-amd-fix-23871.patch- Update to Xen 4.1.2 FCS c/s 23174- bnc#720054 - Fix syntax error introduced during recent adjustment of Xen's tap udev rule. Updated udev-rules.patch- fate#310510 - fix xenpaging Merge paging related fixes from xen-unstable: 23506-x86_Disable_set_gpfn_from_mfn_until_m2p_table_is_allocated..patch 23507-xenpaging_update_machine_to_phys_mapping_during_page_deallocation.patch 23509-x86_32_Fix_build_Define_machine_to_phys_mapping_valid.patch 23562-xenpaging_remove_unused_spinlock_in_pager.patch 23576-x86_show_page_walk_also_for_early_page_faults.patch 23577-tools_merge_several_bitop_functions_into_xc_bitops.h.patch 23578-xenpaging_add_xs_handle_to_struct_xenpaging.patch 23579-xenpaging_drop_xc.c_remove_ASSERT.patch 23580-xenpaging_drop_xc.c_remove_xc_platform_info_t.patch 23581-xenpaging_drop_xc.c_remove_xc_wait_for_event.patch 23582-xenpaging_drop_xc.c_move_xc_mem_paging_flush_ioemu_cache.patch 23583-xenpaging_drop_xc.c_move_xc_wait_for_event_or_timeout.patch 23584-xenpaging_drop_xc.c_remove_xc_files.patch 23585-xenpaging_correct_dropping_of_pages_to_avoid_full_ring_buffer.patch 23586-xenpaging_do_not_bounce_p2mt_back_to_the_hypervisor.patch 23587-xenpaging_remove_srand_call.patch 23588-xenpaging_remove_return_values_from_functions_that_can_not_fail.patch 23589-xenpaging_catch_xc_mem_paging_resume_errors.patch 23590-xenpaging_remove_local_domain_id_variable.patch 23591-xenpaging_move_num_pages_into_xenpaging_struct.patch 23592-xenpaging_start_paging_in_the_middle_of_gfn_range.patch 23593-xenpaging_pass_integer_to_xenpaging_populate_page.patch 23594-xenpaging_add_helper_function_for_unlinking_pagefile.patch 23595-xenpaging_add_watch_thread_to_catch_guest_shutdown.patch 23596-xenpaging_implement_stopping_of_pager_by_sending_SIGTERM-SIGINT.patch 23597-xenpaging_remove_private_mem_event.h.patch 23599-tools_fix_build_after_recent_xenpaging_changes.patch 23817-mem_event_add_ref_counting_for_free_requestslots.patch 23818-mem_event_use_mem_event_mark_and_pause_in_mem_event_check_ring.patch 23827-xenpaging_use_batch_of_pages_during_final_page-in.patch 23841-mem_event_pass_mem_event_domain_pointer_to_mem_event_functions.patch 23842-mem_event_use_different_ringbuffers_for_share_paging_and_access.patch 23874-xenpaging_track_number_of_paged_pages_in_struct_domain.patch 23904-xenpaging_use_p2m-get_entry_in_p2m_mem_paging_functions.patch 23905-xenpaging_fix_locking_in_p2m_mem_paging_functions.patch 23906-xenpaging_remove_confusing_comment_from_p2m_mem_paging_populate.patch 23908-p2m_query-modify_p2mt_with_p2m_lock_held.patch 23943-xenpaging_clear_page_content_after_evict.patch 23953-xenpaging_handle_evict_failures.patch 23978-xenpaging_check_p2mt_in_p2m_mem_paging_functions.patch 23979-xenpaging_document_p2m_mem_paging_functions.patch 23980-xenpaging_disallow_paging_in_a_PoD_guest.patch Remove obsolete patches: x86-show-page-walk-early.patch xenpaging.23817-mem_event_check_ring.patch xenpaging.catch-xc_mem_paging_resume-error.patch xenpaging.guest_remove_page.slow_path.patch xenpaging.mem_event-no-p2mt.patch xenpaging.no-srand.patch xenpaging.return-void.patch xenpaging.xenpaging_populate_page-gfn.patch- xen.spec: use changeset number as patch number for upstream patches- do not use runlevel 4 in init scripts, it makes it impossible to "insserv xend" on 12.1- Upstream patches from Jan 23955-x86-pv-cpuid-xsave.patch 23957-cpufreq-error-paths.patch- Upstream patches from Jan 23933-pt-bus2bridge-update.patch 23726-x86-intel-flexmigration-v2.patch 23925-x86-AMD-ARAT-Fam12.patch 23246-x86-xsave-enable.patch 23897-x86-mce-offline-again.patch- Update to Xen 4.1.2_rc3 c/s 23171- bnc#720054 - Changed /etc/udev/rules.d/40-xen.rules to not run Xen's vif-bridge script when not running Xen. This is not a solution to the bug but an improvement in the rules regardless. Updated udev-rules.patch- Upstream patches from Jan 23868-vtd-RMRR-validation.patch 23871-x86-microcode-amd-silent.patch 23898-cc-option-grep.patch- Add pciback init script and sysconf file, giving users a simple mechanism to configure pciback. init.pciback sysconfig.pciback- update scripts to use xl -f, or xm if xend is running: xen-updown.sh, init.xendomains, xmclone.sh- bnc#694863 - kexec fails in xen xenstored: allow guest to shutdown all its watches/transactions xenstored.XS_RESET_WATCHES.patch- Upstream patches from Jan 23843-scheduler-switch.patch 23846-x86-TSC-check.patch 23848-vmx-conditional-off.patch 23853-x86-pv-cpuid-xsave.patch- fate#310510 - fix xenpaging mem_event: add ref counting for free requestslots xenpaging.23817-mem_event_check_ring.patch- bnc#717650 - Unable to start VM - Update to Xen 4.1.2_rc2 c/s 23152- bnc#716695 - domUs using tap devices will not start updated multi-xvdp.patch- Upstream patches from Jan 23803-intel-pmu-models.patch 23800-x86_64-guest-addr-range.patch 23795-intel-ich10-quirk.patch 23804-x86-IPI-counts.patch- bnc#706106 - Inconsistent reporting of VM names during migration xend-migration-domname-fix.patch- bnc#712823 - L3:Xen guest does not start reliable when rebooted xend-vcpu-affinity-fix.patch- Upstream patches from Jan 23725-pci-add-device.patch 23762-iommu-fault-bm-off.patch 23763-pci-multi-seg-x2apic-vtd-no-crash.patch 23765-x86-irq-vector-leak.patch 23766-x86-msi-vf-bars.patch 23771-x86-ioapic-clear-pin.patch 23772-x86-trampoline.patch 23774-x86_64-EFI-EDD.patch 23776-x86-kexec-hpet-legacy-bcast-disable.patch 23781-pm-wide-ACPI-ids.patch 23782-x86-ioapic-clear-irr.patch 23783-ACPI-set-_PDC-bits.patch- Include gcc46 only when its available (>11.4 && >sles11sp1)- bnc#711943 - [xl] Fail to create multi-guests with NIC assigned 23685-libxl-segfault-fix.patch- libxenlight and legacy xend toolstack should not be used together. If xend is running, print a warning and exit xl. Add a '-f' (force) option to xl to override this behavior. disable-xl-when-using-xend.patch bnc#707664- Upstream patches from Jan 23732-sedf.patch 23735-guest-dom0-cap.patch 23746-vtd-cleanup-timers.patch 23747-mmcfg-base-address.patch 23749-mmcfg-reservation.patch- bnc#704160 - crm resource migrate fails with xen machines update snapshot-xend.patch - bnc#706574 - xm console DomUName hang after "xm save/restore" of PVM on the latest Xen xend-console-port-restore.patch- update xencommons script to run only when needed xencommons-proc-xen.patch- Upstream patches from Jan 23726-x86-intel-flexmigration.patch 23706-fix-20892.patch 23723-x86-CMOS-lock.patch 23676-x86_64-image-map-bounds.patch 23724-x86-smpboot-x2apic.patch- hotplug.losetup.patch correct dev:inode detection, stat returns major:minor without leading zeros, while losetup -a includes trailing zeros- fate#310635: xen npiv multipath support update block-npiv* scripts for testing- Fixes for EFI support x86-EFI-discard-comment.patch- fate#309894: Xen needs to correctly understand family 15h CPU topology - fate#311376: EFI support in SP2 - fate#311529: Native UEFI booting under Xen (installation) 23074-pfn.h.patch 23571-vtd-fault-verbosity.patch 23574-x86-dom0-compressed-ELF.patch 23575-x86-DMI.patch 23610-x86-topology-info.patch 23611-amd-fam15-topology.patch 23613-EFI-headers.patch 23614-x86_64-EFI-boot.patch 23615-x86_64-EFI-runtime.patch 23616-x86_64-EFI-MPS.patch- Mark xen-scsi.ko supported (bnc#582265, fate#309459).- fate#310308: Hypervisor assisted watchdog driver ioemu-watchdog-support.patch ioemu-watchdog-linkage.patch ioemu-watchdog-ib700-timer.patch tools-watchdog-support.patch- bnc#702025 - VUL-0: xen: VT-d (PCI passthrough) MSI trap injection (CVE-2011-1898) Fixed in Xen version 4.1.1- fate#310956: Support Direct Kernel Boot for FV guests kernel-boot-hvm.patch- fate#310316: Support change vnc password while vm is running change-vnc-passwd.patch - fate#310325: Support get domU console log from Dom0 log-guest-console.patch- fate#311487: remove modprobe.conf files for autoloading of Xen and Hyper-V drivers xen.sles11sp1.fate311487.xen_platform_pci.dmistring.patch add dmi modalias to xen-platform-pci.ko- fate#308532: [NONCODE] Remove XEN 32-bit Hypervisor Modify ExclusiveArch in xen.spec to build only x86_64- fate#309900 - Add Xen support for SVM Decode Assist in AMD family 15h - fate#309902 - Add Xen support for AMD family 12h processors - fate#309903 - Add Xen support for AMD family 14h processors - fate#309906 - Add Xen support for performance event counters in AMD family 15h- fate#309893: Add Xen support for AMD family 15h processors - fate#309901: Add Xen support for SVM TSC scaling in AMD family 15h - fate#311951: Ivy Bridge: XEN support for Supervisor Mode Execution Protection (SMEP) 23437-amd-fam15-TSC-scaling.patch 23462-libxc-cpu-feature.patch 23481-x86-SMEP.patch 23504-x86-SMEP-hvm.patch 23505-x86-cpu-add-arg-check.patch 23508-vmx-proc-based-ctls-probe.patch 23510-hvm-cpuid-DRNG.patch 23511-amd-fam15-no-flush-for-C3.patch 23516-cpuid-ERMS.patch 23538-hvm-pio-emul-no-host-crash.patch 23539-hvm-cpuid-FSGSBASE.patch 23543-x86_64-maddr_to_virt-assertion.patch 23546-fucomip.patch- Fix libxc reentrancy issues 23383-libxc-rm-static-vars.patch- fate#310957 - Update to Xen 4.1.1 FCS c/s 23079- fate#311000 - Extend Xen domain lock framework to support more alternative xend-domain-lock-sfex.patch- fate#311371 - Enhance yast to configure live migration for Xen and KVM add firewall service file for xen-tools- Add man page for xen-list utility updated xen-utils-0.1.tar.bz2- Upstream patches from Jan 23233-hvm-cr-access.patch 23234-svm-decode-assist-base.patch 23235-svm-decode-assist-crs.patch 23236-svm-decode-assist-invlpg.patch 23238-svm-decode-assist-insn-fetch.patch 23303-cpufreq-misc.patch 23304-amd-oprofile-strings.patch 23305-amd-fam15-xenoprof.patch 23306-amd-fam15-vpmu.patch 23334-amd-fam12+14-vpmu.patch 23338-vtd-force-intremap.patch- fate#310957 - Update to Xen 4.1.1-rc1 c/s 23064- xentrace: dynamic tracebuffer allocation xen-unstable.xentrace.dynamic_tbuf.patch xen-unstable.xentrace.empty_t_info_pages.patch xen-unstable.xentrace.verbose.patch xen-unstable.xentrace.no_gdprintk.patch xen-unstable.xentrace.comments.patch xen-unstable.xentrace.printk_prefix.patch xen-unstable.xentrace.remove_debug_printk.patch xen-unstable.xentrace.t_info_pages-formula.patch xen-unstable.xentrace.register_cpu_notifier-boot_time.patch xen-unstable.xentrace.t_info_page-overflow.patch xen-unstable.xentrace.t_info_first_offset.patch xen-unstable.xentrace.data_size__read_mostly.patch xen-unstable.xentrace.__insert_record-dst-type.patch- fate#310510 - fix xenpaging update xenpaging patches for xen 4.1 xenpaging.guest_remove_page.slow_path.patch xenpaging.mem_event-no-p2mt.patch xenpaging.no-srand.patch xenpaging.return-void.patch xenpaging.catch-xc_mem_paging_resume-error.patch xenpaging.xenpaging_populate_page-gfn.patch xenpaging.autostart.patch- bnc#670465 - When connecting to Xen guest through vncviewer mouse tracking is off. - Upstream patch 23298-hvmop-get-mem-type.patch replaces xen.sles11sp1.bug684297.HVMOP_get_mem_type.patch - Upstream patches from Jan 23333-hvm-32bit-compat-hypercalls.patch 23337-vtd-malicious-msi-filter.patch 23338-vtd-force-intremap.patch (CVE-2011-1898) 23341-x86-ioapic-write-entry.patch 23343-vtd-error-path-leaks.patch- bnc#684305 - on_crash is being ignored with kdump now working in HVM xend-config-enable-dump-comment.patch- disable xend's logrotation for xend.log, use included logrotate.conf- bnc#684297 - HVM taking too long to dump vmcore xen.sles11sp1.bug684297.HVMOP_get_mem_type.patch new hvm_op hyper call option xen.sles11sp1.bug684297.xen_oldmem_pfn_is_ram.patch Use new Xen HVMOP_get_mem_type hvmop hypercall option and new Linux kernel register_oldmem_pfn_is_ram interface. (depends on two kernel-source changes)- Update to Xen 4.1.1-rc1-pre c/s 23051- Numerous cleanups when compiling with the unused-but-set-variable flag enabled and warnings equal to errors. xen-warnings-unused.diff- Add a 'long' option to xen-list utility Updated xen-utils-0.1.tar.bz2- bnc#691256 - move modprobe of xen backend modules from xend to xencommons initscript tmp-initscript-modprobe.patch- bnc#691738 - Xen does not find device create with npiv block xen-qemu-iscsi-fix.patch- Upstream patches from Jan 22998-x86-get_page_from_l1e-retcode.patch 22999-x86-mod_l1_entry-retcode.patch 23000-x86-mod_l2_entry-retcode.patch 23096-x86-hpet-no-cpumask_lock.patch 23099-x86-rwlock-scalability.patch 23103-x86-pirq-guest-eoi-check.patch 23127-vtd-bios-settings.patch 23153-x86-amd-clear-DramModEn.patch 23154-x86-amd-iorr-no-rdwr.patch 23199-amd-iommu-unmapped-intr-fault.patch 23200-amd-iommu-intremap-sync.patch 23228-x86-conditional-write_tsc.patch- bnc#691238 - L3: question on behaviour change xm list snapshot-xend.patch- update xenalyze to revision 98 * Unify setting of vcpu data type * Unify record size checks * Fix cr3_switch not to access hvm struct before it's initialized - add xenalyze.gcc46.patch to fix unused-but-set-variable errors- bnc#688473 - VUL-0: potential buffer overflow in tools cve-2011-1583-4.0.patch- hotplug.losetup.patch correct dev:inode detection and use variable expansion- bnc#623680 - xen kernel freezes during boot when processor module is loaded 23228-x86-conditional-write_tsc.patch - bnc#680824 - dom0 can't recognize boot disk when IOMMU is enabled 23200-amd-iommu-intremap-sync.patch - Upstream patches from Jan 23127-vtd-bios-settings.patch 23153-x86-amd-clear-DramModEn.patch 23154-x86-amd-iorr-no-rdwr.patch 23199-amd-iommu-unmapped-intr-fault.patch- bnc#685189: update vif-route-ifup.patch to use correct variable after upstream commit 22910:d4bc41a8cecb- bnc#688519: correct indention in xend-domain-lock.patch- bnc#687981 - L3: mistyping model type when defining VIF crashes VM xend-validate-nic-model.patch- bnc#685338: Fix porting of xend-domain-lock.patch- update scripts to use xl instead of xm: xen-updown.sh, init.xendomains, xmclone.sh- disable xend in openSuSE > 11.4 the xl command is the replacement for the xm command- mark runlevel scripts as config to preserve local changes by admin or dev during package update- enable xencommons runlevel script during upgrade if xend was already enabled- call /sbin/ldconfig directly in xen-libs post install scripts- Upstream patches from Jan 23103-x86-pirq-guest-eoi-check.patch 23030-x86-hpet-init.patch 23061-amd-iommu-resume.patch 23127-vtd-bios-settings.patch- add baselibs.conf as libvirt uses 32bit libraries- Remus support is enabled for now.- Enable support for kernel decompression for gzip, bzip2, and LZMA so that kernels compressed with any of these methods can be launched- Update to Xen 4.1 FCS- fix xentrace.dynamic_sized_tbuf.patch the default case did not work, correct size calculation- Update to c/s 23010 Xen 4.1 rc8- use _smp_mflags instead of jobs, jobs is not expanded everywhere- bnc#681302 - xm create -x returns "ImportError: No module named ext" xm-create-xflag.patch- bnc#675817 - Kernel panic when creating HVM guests on AMD platforms with XSAVE 22462-x86-xsave-init-common.patch- bnc#679344 - Xen: multi-vCPU pv guest may crash host 23034-x86-arch_set_info_guest-DoS.patch - bnc#678871 - dom0 hangs long time when starting hvm guests with memory >= 64GB 22780-pod-preempt.patch - bnc#675363 - Random lockups with kernel-xen. Possibly graphics related 22997-x86-map_pages_to_xen-check.patch - Upstream patches from Jan 22949-x86-nmi-pci-serr.patch 22992-x86-fiop-m32i.patch 22996-x86-alloc_xen_pagetable-no-BUG.patch 23020-x86-cpuidle-ordering.patch 23039-csched-constrain-cpu.patch- Fix xen-utils to cope with xen-unstable c/s 21483- bnc#678229 - restore of sles HVM fails 22873-svm-sr-32bit-sysenter-msrs.patch- xz-devel is available since 11.2, make it optional for SLES11SP1- Fix /vm/uuid xenstore leak on tapdisk2 device cleanup 22499-xen-hotplug-cleanup.patch- Upstream patches from Jan 22872-amd-iommu-pci-reattach.patch 22879-hvm-no-self-set-mem-type.patch 22899-x86-tighten-msr-permissions.patch 22915-x86-hpet-msi-s3.patch 22947-amd-k8-mce-init-all-msrs.patch- bnc#672833 - xen-tools bug causing problems with Ubuntu 10.10 under Xen 4. 22238-pygrub-grub2-fix.patch- bnc#665610 - xm console > 1 to same VM messes up both consoles Upstream rejected due to portability concern, see http://lists.xensource.com/archives/html/xen-devel/2011-02/msg00942.html xenconsole-no-multiple-connections.patch- Enable support for kernel decompression for gzip, bzip2, and LZMA so that kernels compressed with any of these methods can be launched.- bnc#651822 - xm snapshot-xxx scripts lead to an XP SP3 HVM domU to chkdsk Make sure we only apply the snapshot once, and the changes made after snapshot-apply hit the disk.- Update to Xen 4.1.0 c/s 22861- bnc#658569 - SLES 11 SP1 dom0 iptables gives lots of physdev messages 22385-vif-common.patch- update xenalyze, more 64bit fixes- allocate xentrace buffer metadata based on requested tbuf_size xentrace.dynamic_sized_tbuf.patch- fate#310510 - fix xenpaging xenpaging.runtime_mru_size.patch - specify policy mru size at runtime xenpaging.no_domain_id.patch - reduce memory usage in pager- bnc#625394 - set vif mtu from bridge mtu if kernel supports it vif-bridge.mtu.patch- fate#310510 - fix xenpaging xenpaging.autostart_delay.patch - decouple create/destroycreateXenPaging from _create/_removeDevices - change xenpaging variable from int to str - init xenpaging variable to 0 if xenpaging is not in config file to avoid string None coming from sxp file- Update to Xen 4.0.2 rc2-pre, changeset 21443- bnc#633573 - System fail to boot after running several warm reboot tests 22749-vtd-workarounds.patch - Upstream patches from Jan 22744-ept-pod-locking.patch 22777-vtd-ats-fixes.patch 22781-pod-hap-logdirty.patch 22782-x86-emul-smsw.patch 22789-i386-no-x2apic.patch 22790-svm-resume-migrate-pirqs.patch 22816-x86-pirq-drop-priv-check.patch- Don't pass the deprecataed extid parameter to xc.hvm_build- bnc#658704 - SLES11 SP1 Xen boot panic in x2apic mode 22707-x2apic-preenabled-check.patch - bnc#641419 - L3: Xen: qemu-dm reports "xc_map_foreign_batch: mmap failed: Cannot allocate memory" 7434-qemu-rlimit-as.patch - Additional or upstream patches from Jan 22693-fam10-mmio-conf-base-protect.patch 22694-x86_64-no-weak.patch 22708-xenctx-misc.patch 21432-4.0-cpu-boot-failure.patch 22645-amd-flush-filter.patch qemu-fix-7433.patch- Maintain compatibility with the extid flag even though it is deprecated for both legacy and sxp config files. hv_extid_compatibility.patch- bnc#649209-improve suspend eventchn lock suspend_evtchn_lock.patch- Removed the hyper-v shim patches in favor of using the upstream version.- bnc#641419 - L3: Xen: qemu-dm reports "xc_map_foreign_batch: mmap failed: Cannot allocate memory" qemu-rlimit-as.patch- Upstream c/s 7433 to replace qemu_altgr_more.patch 7433-qemu-altgr.patch- bnc#661931 - Fix fd leak in xenstore library 21344-4.0-testing-xenstore-fd-leak.patch- bnc#656369 - g5plus: sles11sp1 xen crash with 8 socket x2apic preenabled 21989-x2apic-resume.patch 22475-x2apic-cleanup.patch 22535-x2apic-preenabled.patch - bnc#658163 - maintenance release - Nehalem system cannot boot into xen with maintenance release installed 22504-iommu-dom0-holes.patch 22506-x86-iommu-dom0-estimate.patch - bnc#658704 - SLES11 SP1 Xen boot panic in x2apic mode 21810-x2apic-acpi.patch - Upstream patches from Jan 22470-vlapic-tick-loss.patch 22484-vlapic-tmcct-periodic.patch 22526-ept-access-once.patch 22533-x86-32bit-apicid.patch 22534-x86-max-local-apic.patch 22538-keyhandler-relax.patch 22540-32on64-hypercall-debug.patch 22549-vtd-map-page-leak.patch 22574-ept-skip-validation.patch 22632-vtd-print-entries.patch- bnc#661298 - maintenance release candidate - Windows VMs reboot too fast, triggering failsafe xen-minimum-restart-time.patch- bnc#659070 - Fail to input '|' in en-us keyboard qemu_altgr_more.patch- bnc#659466 - XEN drbd block device type not working on SLES 11 SP1 20158-revert.patch- Revert changes made to snapshot-xend.patch and snapshot-ioemu-restore.patch made on 2010-11-19. The changes were intended to fix bnc#651822, but testing revealed additional changes were needed to completely resolve the bug. bnc#651822 will be fixed in a subsequent maintenance release.- bnc#654543 - PV guest won't unplug the IDE disk created by qemu-dm a dirty hack, only add the device to drives_table[] if we are FV domU, that will be unplugged anyway if a PV driver is loaded later. ioemu-disable-emulated-ide-if-pv.patch- Upstream patch to replace xenfb_32bpp.patch 7426-xenfb-depth.patch- bnc#651822 make sure we only apply the snapshot once, and the changes made after snapshot-apply hit the disk. snapshot-xend.patch snapshot-without-pv-fix.patch- fate#310510 - fix xenpaging xenpaging.HVMCOPY_gfn_paged_out.patch - remove incorrect and unneeded cleanup from do_memory_op subfunctions add mainline tag to merged patches- bnc#613584 - If available, use kpartx '-f' option in domUloader- bnc#659872 - xend: Do no release domain lock on checkpoint operation.- Upstream patches from Jan 22431-p2m-remove-bug-check.patch 22448-x86_64-gdt-ldt-fault-filter.patch 22466-x86-sis-apic-bug.patch 22451-hvm-cap-clobber.patch 22388-x2apic-panic.patch 22452-x86-irq-migrate-directed-eoi.patch- bnc#658163 - maintenance release - Nehalem system cannot boot into xen with maintenance release installed iommu-dom0-holes.patch x86-iommu-dom0-estimate.patch- bnc#659085 - physical host is rebooted with unknown reason Regression: Remove the patch 22071-ept-get-entry-lock.patch- Removed 7410-qemu-alt-gr.patch and altgr_2.patch. It causes a regression (see bnc#659070)- make stubdom build optional- pass -j N to stubdom build- add xenalzye from http://xenbits.xensource.com/ext/xenalyze.hg- hotplug-block-losetup-a.patch allow hardlinked blockdevices - fate#310510 - fix xenpaging xenpaging.paging_prep_enomem.patch - retry page-in if guest is temporary out-of-memory xenpaging.print-arguments.patch - print arguments passed to xenpaging xenpaging.machine_to_phys_mapping.patch - invalidate array during page deallocation xenpaging.autostart_delay.patch - fold xenpaging.enabled.patch into this patch - set xenpaging_delay to 0.0 to start xenpaging right away- bnc#654591 - SLES11 SP0->Sp1 regression? (Xen, HVMs, NPIV) Fixed xen-qemu-iscsi-fix.patch- blktap2 patch - fix problem that blktap2 device info not cleared when block-attach fail. blktap2.patch- bnc#655438 - Using performance counter in domU on Nehalem cpus 22417-vpmu-nehalem.patch - Upstream patches from Jan 22389-amd-iommu-decls.patch 22416-acpi-check-mwait.patch 22431-p2m-remove-bug-check.patch- bnc#656245 - VUL-1: hypervisor: application or kernel in any pv Xen domain can crash Xen x86_64-gdt-ldt-fault-filter.patch- bnc#654050 - Python: a crasher bug in pyexpat - upstream patch needs backporting 22235-lxml-validator.patch- bnc#628729 - Add a small, fast alternative to 'xm list' for enumerating active domains. xen-list is a C program that uses libxenstore and libxenctl directly, bypassing the python toolstack. xen-utils-0.1.tar.bz2- bnc#628729 - Add a small, fast alternative to 'xm list' for enumerating active domains. xen-list is a C program that uses libxenstore and libxenctl directly, bypassing the python toolstack. xen-utils-0.1.tar.bz2- bnc#651822 - xm snapshot-xxx scripts lead to an XP SP3 HVM domU to chkdsk snapshot-xend.patch snapshot-ioemu-restore.patch- bnc#651957 - Xen: vm-install failed to start xenpaging.enabled.patch- fate#310510 - fix xenpaging xenpaging.signal_handling.patch - unlink pagefile in signal handler- Upstream patch for python 2.7 compatibility 22045-python27-compat.patch- bnc#641144 - FV Xen VM running windows or linux cannot write to virtual floppy drive bdrv_default_rwflag.patch- fate#310510 - fix xenpaging xenpaging.optimize_p2m_mem_paging_populate.patch xenpaging.HVMCOPY_gfn_paged_out.patch- bnc#649864 - automatic numa cpu placement of xen conflicts with cpupools 22326-cpu-pools-numa-placement.patch- fate#310510 - fix xenpaging xenpaging.populate_only_if_paged.patch - revert logic, populate needs to happen unconditionally xenpaging.p2m_mem_paging_populate_if_p2m_ram_paged.patch - invalidate current mfn only if gfn is not in flight or done xenpaging.mem_event_check_ring-free_requests.patch - print info only if 1 instead of 2 slots are free xenpaging.guest_remove_page.patch - check mfn before usage in resume function xenpaging.machine_to_phys_mapping.patch - check mfn before usage in resume function- bnc#552115 - Remove target discovery in block-iscsi modified block-iscsi script- bnc#649277 - Fix pci passthru in xend interface used by libvirt 22369-xend-pci-passthru-fix.patch- bnc#642078 - xm snapshot-create causes qemu-dm to SEGV snapshot-without-pv-fix.patch- fate#310510 - fix xenpaging xenpaging.num_pages_equal_max_pages.patch- bnc#647681 - L3: Passthrough of certain PCI device broken after SLES 11 to SP1 upgrade - bnc#650871 - Regression in Xen PCI Passthrough 22348-vtd-check-secbus-devfn.patch - Upstream patches from Jan 22223-vtd-workarounds.patch (bnc#652935) 22231-x86-pv-ucode-msr-intel.patch 22232-x86-64-lahf-lm-bios-workaround.patch 22280-kexec.patch 22337-vtd-scan-single-func.patch- bnc#497149 - SLES11 64bit Xen - SLES11 64bit HVM guest has corrupt text console stdvga-cache.patch- fate#310510 - fix xenpaging xenpaging.page_already_populated.patch xenpaging.notify_policy_only_once.patch xenpaging.guest_remove_page.patch xenpaging.machine_to_phys_mapping.patch remove xenpaging.memory_op.patch, retry loops are not needed- bnc#474789 - xen-tools 3.3 rpm misses pv-grub - PV-GRUB replaces PyGrub to boot domU images safely: it runs the regular grub inside the created domain itself and uses regular domU facilities to read the disk / fetch files from network etc.; it eventually loads the PV kernel and chain-boots it.- fate#310510 - fix xenpaging xenpaging.doc.patch - add /var/lib/xen/xenpaging directory- Some cleanup in the APIC handling code in the HyperV shim. hv_apic.patch- fate#310510 - fix xenpaging xenpaging.memory_op.patch, correct delay handling in retry loop- bnc#640370 - VM graphic console in VNC is corrupted xenfb_32bpp.patch- fate#310510 - fix xenpaging xenpaging.autostart_delay.patch delay start of xenpaging 7 seconds for smooth BIOS startup- fate#310510 - fix xenpaging xenpaging.tools_xenpaging_cleanup.patch- fate#310510 - fix xenpaging xenpaging.mem_event_check_ring-free_requests.patch- install /etc/xen/examples/xentrace_formats.txt to get human readable tracedata if xenalyze is not used- fate#310510 - fix xenpaging xenpaging.autostart_delay.patch xenpaging.blacklist.patch xenpaging.MRU_SIZE.patch remove xenpaging.hacks.patch, realmode works- Upstream patches from Jan including fixes for the following bugs bnc#583568 - Xen kernel is not booting bnc#615206 - Xen kernel fails to boot with IO-APIC problem bnc#640773 - Xen kernel crashing right after grub bnc#643477 - issues with PCI hotplug/hotunplug to Xen driver domain 22222-x86-timer-extint.patch 22214-x86-msr-misc-enable.patch 22213-x86-xsave-cpuid-check.patch 22194-tmem-check-pv-mfn.patch 22177-i386-irq-safe-map_domain_page.patch 22175-x86-irq-enter-exit.patch 22174-x86-pmtimer-accuracy.patch 22160-Intel-C6-EOI.patch 22159-notify-evtchn-dying.patch 22157-x86-debug-key-i.patch- fate#310510 - fix xenpaging xenpaging.signal_handling.patch xenpaging.autostart.patch xenpaging.hacks.patch- rename xenpaging.XENMEM_decrease_reservation.patch to xenpaging.memory_op.patch- bnc#632956 - fix VNC altgr-insert behavior 7410-qemu-alt-gr.patch altgr_2.patch- bnc#618087 - VNC view won't stay connected to fully virtualized Linux Xen VMs modified ioemu-vnc-resize.patch- bnc#639546 - Dom-U deleted after introduction of the parameter "change_home_server False" in the VM configuration change_home_server.patch- bnc#641859 - block-dmmd script does not handle the configuration when only MD is used modified block-dmmd script- fate#310510 - fix xenpaging xenpaging.populate_only_if_paged.patch- bnc#640773 - Xen kernel crashing right after grub 21894-intel-unmask-cpuid.patch - Upstream patch from Jan 22148-serial-irq-dest.patch- bnc#628719 - improve check_device_status to handle HA cases check_device_status.patch- bnc#628719 - multi-xvdp mutli-xvdp.patch- fate#310510 - fix xenpaging xenpaging.XENMEM_decrease_reservation.patch xenpaging.xenpaging_init.patch xenpaging.policy_linear.patch- bnc#632956 - fix VNC altgr-insert behavior 7410-qemu-alt-gr.patch altgr_2.patch- fate#310510 - fix xenpaging xenpaging.pageout_policy.patch xenpaging.xs_daemon_close.patch xenpaging.pagefile.patch xenpaging.mem_paging_tool_qemu_flush_cache.patch xenpaging.get_paged_frame.patch xenpaging.notify_via_xen_event_channel.patch- bnc#636231 - XEN: Unable to disconnect/remove CDROM drive from VM xend-devid-or-name.patch- Upstream patches from Jan 22019-x86-cpuidle-online-check.patch 22051-x86-forced-EOI.patch 22067-x86-irq-domain.patch 22068-vtd-irte-RH-bit.patch 22071-ept-get-entry-lock.patch 22084-x86-xsave-off.patch- bnc#638465 - hypervisor panic in memory handling 22135-heap-lock.patch- Update to Xen 4.0.1. This is a bug fix release.- bnc#635380 - Fix pygrub Grub2 support See update to Xen 4.0.1 for fixes- bnc#628701 - Improve performance when activate/deactivate dmmd devices modified block-dmmd script- bnc#628701 - Fix qemu-dm handling of dmmd devices modified xen-qemu-iscsi-fix.patch- bnc#626262 - Populate-on-demand memory problem on xen with hvm guest 21971-pod-accounting.patch- bnc#584204 - xm usb-list broken usb-list.patch- bnc#625520 - TP-L3: NMI cannot be triggered for xen kernel 21926-x86-pv-NMI-inject.patch- bnc#613529 - TP-L3: kdump kernel hangs when crash was initiated from xen kernel 21886-kexec-shutdown.patch- Upstream Intel patches to improve X2APIC handling. 21716-iommu-alloc.patch 21717-ir-qi.patch 21718-x2apic-logic.patch- bnc#623833 - Error in Xend-API method VM_set_actions_after_crash 21866-xenapi.patch- bnc#625003 - Fix vm config options coredump-{restart,destroy} Added hunk to xm-create-xflag.patch- bnc#605186 - Squelch harmless error messages in block-iscsi- bnc#623438 - Add ability to control SCSI device path scanning in xend 21847-pscsi.patch- Enable the packaging of create.dtd. This is needed for when xm is configured to use xenapi.- bnc#624285 - TP-L3: xen rdtsc emulation reports wrong frequency 21445-x86-tsc-handling-cleanups-v2.patch- bnc#623201 - drbd xvd will fail in new xen4 packages due to wrong popen2 arguments in blkif.py popen2-argument-fix.patch- bnc#620694 - Xen yast vm-install for existing paravirtualized disk fails with UnboundLocalError: local variable 'dev_type' referenced before assignment 21678-xend-mac-fix.patch- bnc#586221 - cannot add DomU with USB host controller defined domu-usb-controller.patch (Chun Yan Liu)- Upstream patches from Jan 21151-trace-bounds-check.patch 21627-cpuidle-wrap.patch 21643-vmx-vpmu-pmc-offset.patch 21682-trace-buffer-range.patch 21683-vtd-kill-timer-conditional.patch 21693-memevent-64bit-only.patch 21695-trace-t_info-readonly.patch 21698-x86-pirq-range-check.patch 21699-p2m-query-for-type-change.patch 21700-32on64-vm86-gpf.patch 21705-trace-printk.patch 21706-trace-security.patch 21712-amd-osvw.patch 21744-x86-cpufreq-range-check.patch 21933-vtd-ioapic-write.patch 21953-msi-enable.patch- bnc#599550 - Xen cannot distinguish the status of 'pause' 21723-get-domu-state.patch- bnc#604611 - Do not store vif device details when vif config contains invalid mac address. 21653-xend-mac-addr.patch- linux pvdrv: generalize location of autoconf.h Fixes error because of missing autoconf.h when building os11.2 Factory.- bnc#609153 - xm migrate localhost -l fails on Windows VMs 21615-dont-save-xen-heap-pages.patch - Upstream fixes from Jan 21446-iommu-graceful-generic-fail.patch 21453-shadow-avoid-remove-all-after-teardown.patch 21456-compat-hvm-addr-check.patch 21492-x86-pirq-unbind.patch 21526-x86-nehalem-cpuid-mask.patch 21620-x86-signed-domain-irq.patch- bnc#612189 - Clear APIC Timer Initial Count Register when masking timer interrupt 21542-amd-erratum-411.patch- bnc#610658 - XEN: PXE boot fails for fully virtualized guests - e1000 virtual nic. (see also bnc#484778) enable_more_nic_pxe.patch- bnc#608191 - /var/adm/fillup-templates/sysconfig.xend from package xen-tools is no valid sysconfig file xend-sysconfig.patch- bnc#608194 - /etc/xen/* config files are not packaged with noreplace- bnc#569744 - SLE HVM guest clock/timezone is incorrect after reboot 21460-xend-timeoffset.patch- bnc#606882 - Allow spaces in vbd path names 21459-block-script.patch- bnc#591799 - The status of Caps Lock is incorrect in domU capslock_enable.patch- Upstream fixes from Jan including a fix for Intel's ATS issue 21435-vmx-retain-global-controls.patch 21406-x86-microcode-quiet.patch 21421-vts-ats-enabling.patch- bnc#607219 - AMD Erratum 383 workaround for Xen 21408-amd-erratum-383.patch- Added modprobe of evtchn to init.xend. The kernel will also need to build evtchn as a module for this to be meaningful.- bnc#603008 - On an 8 Socket Nehalem-EX system, the fix for 593536 causes a hang during network setup. - Upstream patches from Jan. 21360-x86-mce-polling-disabled-init.patch 21372-x86-cross-cpu-wait.patch 21331-svm-vintr-during-nmi.patch 21333-xentrace-t_info-size.patch 21340-vtd-dom0-mapping-latency.patch 21346-x86-platform-timer-wrap.patch 21373-dummy-domain-io-caps.patch- bnc#605182 - /etc/xen/scripts/xen-hotplug-cleanup: line 24: [: !=: unary operator expected 21129-xen-hotplug-cleanup.patch- bnc#599929 - Hot add/remove Kawela NIC device over 500 times will cause guest domain crash passthrough-hotplug-segfault.patch- bnc#603583 - Fix migration of domUs using tapdisk devices 21317-xend-blkif-util-tap2.patch suse-disable-tap2-default.patch- Match upstreams cpu pools switch from domctl to sysctl - Upstream replacements for two of our custom patches (to ease applying further backports) - Fixed dump-exec-state.patch (could previously hang the system, as could - with lower probability - the un-patched implementation)- bnc#593536 - xen hypervisor takes very long to initialize Dom0 on 128 CPUs and 256Gb 21272-x86-dom0-alloc-performance.patch 21266-vmx-disabled-check.patch 21271-x86-cache-flush-global.patch- bnc#558815 - using multiple npiv luns with same wwpn/wwnn broken - bnc#601104 - Xen /etc/xen/scripts/block-npiv script fails when accessing multiple disks using NPIV block-npiv- bnc#595124 - VT-d can not be enabled on 32PAE Xen on Nehalem-EX platform 21234-x86-bad-srat-clear-pxm2node.patch bnc#585371 - kdump fails to load with xen: locate_hole failed 21235-crashkernel-advanced.patch- bnc#588918 - Attaching a U-disk to domain's failed by "xm usb-attach" init.xend- bnc#596442 - Preserve device config on domain start failure xend-preserve-devs.patch- bnc#597770 - insserv reports a loop between xendomains and openais. Remove openais from Should-Start in xendomains script.- bnc#569194 - Tools-side fixes for tapdisk protocol specification blktap-script.patch ioemu-subtype.patch Modified xen-domUloader.diff- Upstream bug fixes from Jan 21089-x86-startup-irq-from-setup-gsi.patch 21109-x86-cpu-hotplug.patch 21150-shadow-race.patch 21160-sysctl-debug-keys.patch- Updated to Xen 4.0.0 FCS, changeset 21091- Change default lock dir (when domain locking is enabled) to /var/lib/xen/images/vm_locks - Support SXP config files in xendomains script- Update to changeset 21087 Xen 4.0.0 RC9.- Update to changeset 21075 Xen 4.0.0 RC8.- bnc#584210 - xm usb-hc-destroy does not remove entry from xend del_usb_xend_entry.patch- Update to changeset 21057 Xen 4.0.0 RC7.-Fix bnc#466899 - numa enabled xen fails to start/create vms adjust_vcpuaffinity_more_cpu.patch- Update to changeset 21022 Xen 4.0.0 RC6.- bnc#586510 - cpupool fixes cpu-pools-update.patch- bnc#582645 - Xen stuck, mptbase driver attempting to reset config request- Update to changeset 20990 Xen 4.0.0 RC5.- bnc#556939 - Improve device map cleanup code in domUloader- bnc# 578910 - xm block-detach does not cleanup xenstore hotplug-cleanup-fix.patch- bnc#579361 - Windows Server 2003 cannot wake up from stand by in sp1 hibernate.patch- fate#308852: XEN CPU Pools cpupools-core.patch cpupools-core-fixup.patch keyhandler-alternative.patch cpu-pools-libxc.patch cpu-pools-python.patch cpu-pools-libxen.patch cpu-pools-xmtest.patch cpu-pools-docs.patch- bnc#558760: Disable scsi devices when PV drivers are loaded.- Update to changeset 20951 Xen 4.0.0 RC4 for sle11-sp1 beta5.- bnc#572146 - SLES11 SP1 beta 2 Xen - BUG: soft lockup - CPU#31 stuck for 61s! [kstop/31:4512] cpuidle-hint-v3.patch- Update to changeset 20900 RC2+ for sle11-sp1 beta4.- bnc#573376 - OS reboot while create DomU with Windows CD- bnc#573881 - /usr/lib64/xen/bin/qemu-dm is a broken link- Update to changeset 20840 RC1+ for sle11-sp1 beta3.- bnc#569581 - SuSEfirewall2 should handle rules. Disable handle_iptable in vif-bridge script vif-bridge-no-iptables.patch- bnc#569577 - /etc/modprove.d/xen_pvdrivers, installed by xen-kmp-default, to ../xen_pvdrivers.conf- bnc#564406 - Make the new PV drivers work with older hosts that do not understand the new PV driver protocol.- Upstream Xen version renamed to 4.0.0 in changeset 20624 & 20625.- fate#307594: HP-MCBS: XEN: support NR_CPUS=256 This is a spec file change (xen.spec)- bnc#555152 - "NAME" column in xentop (SLES11) output limited to 10 characters unlike SLES10 The update to c/s 20572 includes this fix (at c/s 20567).- Modify xen-paths.diff- Merge xend-tap-fix.patch to xen-domUloader.diff remove part of it which accepted by upstream- Load gntdev module in xend init script similar to blkbk, netbk, etc.- Backport dmmd from sles11/xen block-dmmd xen-qemu-iscsi-fix.patch xen.spec- Fix regression when create_vbd for tap xend-tap-fix.patch- Temporarily disable libxl because of libconfig dependency.- fate#302864 domUloader support lvm in disk domUloader.py Note: for test in Beta1, if not good, remove it- fate#302864 domUloader support fs on whole disk domUloader.py- Turn KMPs back on now that kernel side fix is checked in.- fate#304415 VMM: ability to switch networking mode Add vif-route-ifup to handle routed configurations using sysconfig scripts. vif-route-ifup.patch- fate#307540 USB for Xen VMs usb-add.patch- fate#305545 XEN extra descriptive field within xenstore add_des.patch- Update to Xen version 3.5.0 for the following features. fate#304226 XEN: FlexMigration feature of VT-x2 support fate#305004 Add SR-IOV PF and VF drivers to Vt-d enabled Xen fate#306830 T states in Xen controlling by MSR fate#306832 Fix for xen panic on new processors fate#306833 Westmere and Nehalem-EX: Add support for Pause Loop exiting feature for Xen fate#306835 Xen: server virtual power management enhacement fate#306837 VT-d2 - PCI SIG ATS support fate#306872 Xen: Node manager support P/T-states change when Vt-d enable fate#306873 Xen: SMP guest live migration may fail with hap=1 on NHM fate#306875 Westmere: LT-SX (Xen) fate#306891 RAS features for Xen: Add support for Machine Check and CPU/Memory online/offline features fate#307322 1GB page support in Xen fate#307324 Xen IOMMU support- bnc#541945 - xm create -x command does not work in SLES 10 SP2 or SLES 11 xm-create-xflag.patch- Minor enhancement to xen-updown.sh sysconfig hook- Add patch ioemu-bdrv-open-CACHE_WB.patch for install guest on tapdisk very very slow.- Add temporary workaround for race between xend writing and qemu-dm reading from xenstore. The issue is preventing PV domUs from booting as they have no backend console. qemu-retry-be-status.patch - bnc#520234 - npiv does not work with XEN Update block-npiv - bnc#496033 - Support for creating NPIV ports without starting vm block-npiv-common.sh block-npiv-vport Update block-npiv - bnc#500043 - Fix access to NPIV disk from HVM vm Update xen-qemu-iscsi-fix.patch- bnc#513921 - Xen doesn't work get an eror when starting the install processes or starting a pervious installed DomU 20125-xc-parse-tuple-fix.patch- bnc#536176 - Xen panic when using iommu after updating hypervisor 19380-vtd-feature-check.patch- bnc#530959 - virsh autostart doesn't work Fixing this libvirt bug also required fixing xend's op_pincpu method with upstream c/s 19580 19580-xend-pincpu.patch- bnc#534146 - Xen: Fix SRAT check for discontig memory 20120-x86-srat-check-discontig.patch- bnc#491081 - Xen time goes backwards x3950M2 20112-x86-dom0-boot-run-timers.patch- disable module build for ec2 correctly to fix build (at the suse_kernel_module_package macro)- bnc#524071 - implemented workaround for a windows7 bug. hv_win7_eoi_bug.patch- bnc#524180 - xend memory leak resulting in long garbage collector runs 20013-xend-memleak.patch- Upstream bugfixes from Jan. 19896-32on64-arg-xlat.patch 19960-show-page-walk.patch 19945-pae-xen-l2-entries.patch 19953-x86-fsgs-base.patch 19931-gnttblop-preempt.patch 19885-kexec-gdt-switch.patch 19894-shadow-resync-fastpath-race.patch - hvperv shim patches no longer require being applied conditionally- bnc#520234 - npiv does not work with XEN in SLE11 Update block-npiv - bnc#496033 - Support for creating NPIV ports without starting vm block-npiv-common.sh block-npiv-vport Update block-npiv - bnc#500043 - Fix access to NPIV disk from HVM vm Update xen-qemu-iscsi-fix.patch- Don't build the KMPs for the ec2 kernel.- Upstream fixes from Jan Beulich 19606-hvm-x2apic-cpuid.patch 19734-vtd-gcmd-submit.patch 19752-vtd-srtp-sirtp-flush.patch 19753-vtd-reg-write-lock.patch 19764-hvm-domain-lock-leak.patch 19765-hvm-post-restore-vcpu-state.patch 19767-hvm-port80-inhibit.patch 19768-x86-dom0-stack-dump.patch 19770-x86-amd-s3-resume.patch 19801-x86-p2m-2mb-hap-only.patch 19815-vtd-kill-correct-timer.patch - Patch from Jan Beulich to aid in debugging bnc#509911 gnttblop-preempt.patch- bnc#515220 - qemu-img-xen snapshot Segmentation fault qemu-img-snapshot.patch update- bnc#504491 - drop write data when set read only disk in xen config bdrv_open2_fix_flags.patch bdrv_open2_flags_2.patch- Upstream fixes from Jan Beulich. 19474-32on64-S3.patch 19490-log-dirty.patch 19492-sched-timer-non-idle.patch 19493-hvm-io-intercept-count.patch 19505-x86_64-clear-cr1.patch 19519-domctl-deadlock.patch 19523-32on64-restore-p2m.patch 19555-ept-live-migration.patch 19557-amd-iommu-ioapic-remap.patch 19560-x86-flush-tlb-empty-mask.patch 19571-x86-numa-shift.patch 19578-hvm-load-ldt-first.patch 19592-vmx-exit-reason-perfc-size.patch 19595-hvm-set-callback-irq-level.patch 19597-x86-ioport-quirks-BL2xx.patch 19602-vtd-multi-ioapic-remap.patch 19631-x86-frametable-map.patch 19653-hvm-vcpuid-range-checks.patch- bnc#382112 - Caps lock not being passed to vm correctly. capslock_enable.patch- bnc#506833 - Use pidof in xend and xendomains init scripts- bnc#484778 - XEN: PXE boot of FV domU using non-Realtek NIC fails enable_more_nic_pxe.patchcross-migrate.patch - bnc#390961 - cross-migration of a VM causes it to become unresponsive (remains paused after migration)- Patches taken to fix the xenctx tool. The fixed version of this tool is needed to debug bnc#502735. 18962-xc_translate_foreign_address.patch 18963-xenctx.patch 19168-hvm-domctl.patch 19169-remove-declare-bitmap.patch 19170-libxc.patch 19171-xenctx.patch 19450-xc_translate_foreign_address.patch-bnc#485770 - check exsit file for save and snapshot-create xm-save-check-file.patch snapshot-xend.patch-bnc#503782 - Using converted vmdk image does not work ioemu-tapdisk-compat-QEMU_IMG.patch- bnc#503332 - Remove useless qcow tools /usr/sbin/{qcow-create,img2qcow,qcow2raw} from xen-tools package.- bnc#474738 - adding CD drive to VM guest makes it unbootable. parse_boot_disk.patch- bnc#477892 - snapshot windows can't accomplish. snapshot-xend.patch- bnc#495300 - L3: Xen unable to PXE boot Windows based DomU's 18545-hvm-gpxe-rom.patch, 18548-hvm-gpxe-rom.patch- bnc#459836 - Fix rtc_timeoffset when localtime=0 xend-timeoffset.patch- bnc#497440 - xmclone.sh script incorrectly handles networking for SLE11.- bnc#477890 - VM becomes unresponsive after applying snapshot- bnc#494892 - Update xend-domain-lock.patch to flock the lock file.- bnc#439639 - SVVP Test 273 System - Sleep Stress With IO" fails Turned off s3/s4 sleep states for HVM guests.- bnc#468169 - fix domUloader to umount the mounted device mapper target in dom0 when install a sles10 guest with disk = /dev/disk/by_path- bnc#488490 - domUloader can't handle block device names with ':' - bnc#486244 - vms fail to start after reboot when using qcow2- bnc#490835 - VTd errata on Cantiga chipset 19230-vtd-mobile-series4-chipset.patch- bnc#482515 - Missing dependency in xen.spec- Additional upstream bug fix patches from Jan Beulich. 19132-page-list-mfn-links.patch 19134-fold-shadow-page-info.patch 19135-next-shadow-mfn.patch 19136-page-info-rearrange.patch 19156-page-list-simplify.patch 19161-pv-ldt-handling.patch 19162-page-info-no-cpumask.patch 19216-msix-fixmap.patch 19268-page-get-owner.patch 19293-vcpu-migration-delay.patch 19391-vpmu-double-free.patch 19415-vtd-dom0-s3.patch- Imported numerous upstream bug fix patches. 19083-memory-is-conventional-fix.patch 19097-M2P-table-1G-page-mappings.patch 19137-lock-domain-page-list.patch 19140-init-heap-pages-max-order.patch 19167-recover-pat-value-s3-resume.patch 19172-irq-to-vector.patch 19173-pci-passthrough-fix.patch 19176-free-irq-shutdown-fix.patch 19190-pciif-typo-fix.patch 19204-allow-old-images-restore.patch 19232-xend-exception-fix.patch 19239-ioapic-s3-suspend-fix.patch 19240-ioapic-s3-suspend-fix.patch 19242-xenstored-use-after-free-fix.patch 19259-ignore-shutdown-deferrals.patch 19266-19365-event-channel-access-fix.patch 19275-19296-schedular-deadlock-fixes.patch 19276-cpu-selection-allocation-fix.patch 19302-passthrough-pt-irq-time-out.patch 19313-hvmemul-read-msr-fix.patch 19317-vram-tracking-fix.patch 19335-apic-s3-resume-error-fix.patch 19353-amd-migration-fix.patch 19354-amd-migration-fix.patch 19371-in-sync-L1s-writable.patch 19372-2-on-3-shadow-mode-fix.patch 19377-xend-vnclisten.patch 19400-ensure-ltr-execute.patch 19410-virt-to-maddr-fix.patch- bnc#483565 - Fix block-iscsi script. Updated block-iscsi and xen-domUloader.diff- bnc#465814 - Mouse stops responding when wheel is used in Windows VM. mouse-wheel-roll.patch (James Song) - bnc#470704 - save/restore of windows VM throws off the mouse tracking. usb-save-restore.patch (James Song)- bnc#436629 - Use global vnc-listen setting specified in xend configuration file. xend-vnclisten.patch - bnc#482623 - Fix pygrub to append user-supplied 'extra' args to kernel args. 19234_pygrub.patch- bnc#481161 upgrade - sles10sp2 to sles11 upgrade keeps xen-tools-ioemu- Don't load 8139* driver if xen-vnif works [bnc#480164]/bin/sh  !"#$%&'()*+,-./4.9.4_04-40.14.9.4_04-40.1fsext2fsfsimage.sofatfsimage.soiso9660fsimage.soreiserfsfsimage.soufsfsimage.soxfsfsimage.sozfsfsimage.solibblktapctl.so.1.0libblktapctl.so.1.0.0libfsimage.so.1.0libfsimage.so.1.0.0libvhd.so.1.0libvhd.so.1.0.0libxencall.so.1libxencall.so.1.0libxenctrl.so.4.9libxenctrl.so.4.9.0libxendevicemodel.so.1libxendevicemodel.so.1.0libxenevtchn.so.1libxenevtchn.so.1.0libxenforeignmemory.so.1libxenforeignmemory.so.1.1libxengnttab.so.1libxengnttab.so.1.1libxenguest.so.4.9libxenguest.so.4.9.0libxenlight.so.4.9libxenlight.so.4.9.0libxenstat.so.0libxenstat.so.0.0libxenstore.so.3.0libxenstore.so.3.0.3libxentoollog.so.1libxentoollog.so.1.0libxenvchan.so.4.9libxenvchan.so.4.9.0libxlutil.so.4.9libxlutil.so.4.9.0/usr/lib//usr/lib/fs//usr/lib/fs/ext2fs//usr/lib/fs/fat//usr/lib/fs/iso9660//usr/lib/fs/reiserfs//usr/lib/fs/ufs//usr/lib/fs/xfs//usr/lib/fs/zfs/-fomit-frame-pointer -fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:10217/openSUSE_Leap_42.3_Update/59b06c524ef521499eb53d856b053327-xen.openSUSE_Leap_42.3_Updatedrpmlzma5x86_64-suse-linux     directoryELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=f932fbe54db27d916c493a85a369a6e7fd4fc3d1, strippedELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=96676517a2d0444d66a5175f175be16c463f9d83, strippedELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=aaa47a2ff96266afad2928988abd6af4d7816696, strippedELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=29af40d01753ce2ec717506ab962994795d90289, strippedELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=a36b7c96d132deb88d08f5846d60d16ba78322ad, strippedELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=555e00b948ce6844c95428b283a7b6651f8ccf1a, strippedELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=64ced353cbc0a49bdfcab29022e660408be9a205, strippedELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=4b7e3f893ac8676ffc5422dbc8228885e9c70fe8, strippedELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=76b951fb279d7da61310f6a5a656c85af28f6a87, strippedELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=40fa8b7c68e631dd3860443b79a83fbf47aebaad, strippedELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=5c38c1ceb9285a136d78de2b1b3b180ca65ff2b1, strippedELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=1912f51b912fcd7e552fd6993c27b1227df53af3, strippedELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=a199985a61db90b20192871d2f51aee5e5acca8d, strippedELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=50b68bfb42aad6e62358ed11fb726bcc020940f9, strippedELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=b18d1e63b63c94d18d3d193a98c08997b7229aa3, strippedELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=d1da23d60c08e20f2e144a269f3e28ec11995c53, strippedELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=8af485c178b05cea34e8877102c6f99c8ab7cbc9, strippedELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=3c8895648a18f47e84f5327ecc5a8741957bdadc, strippedELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=e66137343b39dff9400a0b555bce6dd6c6fac948, strippedELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=633aec5ebb64ef4f0422f0020361ddfb6ffda66f, strippedELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=dc87b10097dd07d0a0d2822c8b4f3b05738d08ec, strippedELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=fd821ab9cd7fb7e49f8bbec953ca7274fcc1124f, strippedELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=d7ed3fd6d75eed7dd614c37b1aaf81fb23ce2ac6, stripped &.8BMZe|    $  PR RRRRRRRPR RRRRRPR RRRRRPRR RRRRRPR RRRRRPRR RRRRRPRR RRRRRRRPRRRR RRRRRPPR RRRRRRRRPR R RRR RRRRR$R#RPPR4RRRRRR3RRPR4R/R&RR RRRRR+R-R)RRR3R*R.R%R,R(RRP PRRR4R&RRR3R%RRP P R4RRRR3RP PP RRR4RRRRR3RRPPPR4RRRRR3RPR+RRR RRRRRRRR6R*R'RPR4R+R"RRR$RRRRRRRR RRR R RRR RR3R*R'R0R2RR!R#RRR5RRPR RRRRRRR2R'R5RPR RRRRRRR RRRRRPPRRRRPR/RRRRR+R2R.R*RPRRR R RRRRRRR1RR?`]"k%=!P.z(N!]BP'<[wYj~졺:hEՓ1*M\6c&cu:֤wj&mk 4)#UuLlS$,>=UOuJ)Ae/LVmrZv7&=ݾ SېqO tAJA$I|Ty5Jx=r"k7pz9 qHu,+z69f,}i0,2CܡoIn燓KwF?0 yBP&kQ7p9`')Ɗe"1 %*1Z0.t8\*K*ݩ;vߣV6=Q>n@Q yU1"GAhhhgw.u03W=KbXy1æK`fFf #+uB'M.)ȗ˥]-6ġ (\oE㓂WmV!Y:"\lvD^”AQ5fEF$o^@y=jՈ~z PZw-c;LfW 'ekSWBb'j q7ud<d7[K =o83Q'zok{T!% z(:s;ѰCI8+aOٺpg}\05uEY7g1Y؈z1{,o\_ga ^ ,( 3w)Rh}c|6g5J/td++iYI;͗2`б"I݌FZJW+}ca!NX-AiH> bZTw>iͪ~|qgZW&=g- ᴦTy& hhFQt1_P''_}>gwF+ ꣊pX/rߨ#*u˜R1&+K-iKZ#2d Oj8u8Ya_ g` [$N2t>.MFʋ_Dugf+;.a|PE3챳_0[bt4M'"j66ij1*kyn΁+q|ZX}[zO˳sb$=HQpv ~96{-JB1Cm1hV9ڰU*=8 in5!}a; o@+Dkm qvD?v&@r,(*b/ apۮɪ\@z+͛?Z&r<8`wr_B uRnZcqMcDӅ/؟ '?f3wWLv fx|ZQ9؄ոr+[FMЈXsI&٬Ow\Q@lrfW. ]oA.M΀=6[pl̼h+W8fq %(h4@ ٯ@y%p/$?sC5Y\ {ps><̗jpA{^ O`cLA!SpvUP8}[qiVۘENZxt*16 oZI߫kxH?w3P8}k^ >4%Y/#,1HTԦg\K0wPPk~Xd*BLs7ڐ\D <6u-h@=GXR>|``BҲ~'4fM8[ WD"h.!iXぽJָ@ 'n8ʶYCb09z~=4D1C XM)4{ gnRA%g81@h=a2W-"UNix0@ӊ.*6Du"5N}l;؄Wx}G;]UcTA-K-cY|.9-o0X)UI\Y?!(Ź=/A ?P(j]&1~)|Å3RA{RB`amZgW)j{<6櫊c't`5H A`͟`ZVM$l(JK`̕t[Vo KlҊ2^J9ݱOȃR=ɪ3 Hԧw>wWء*]P)}iV6V8HJ9M%eҍnhM~*eJ.~BiUFޫ[&-'1x сX<ѶY6m~O/1#d\)A2_ě.>}_FbX¹J鵎=%x CFle|fDIs]gޚacֽuCi#C%bMlZFF)qoPo^/o=Xz+oܝ(=¿wj/Q:j. vN$N"Uvvnk~=27ę}AZ2_<nnL|$jNBP4aU-,HuwDGZիeJ^0JM6*o_iL*:y/|'p8ҒK+$ܺ_ңI?[ U^̷(0aRf"BmTN$$:n rQDy "4B頕i9XmO{o*hP3=ciW3𼑋+Q|TAmncFǵJz0 kLVhRrsW_dw #%uNV "֖Cf\z zL#̘gZf,bS!-2处UErKR6ZNgb3anCB} ?۝ yyl-srYfdOi X+^)#ImoDW;y.t7j)dp)đ(mܻ L $CjdqSmZXG3/0n品6 zM.RVD\y\ĥYOUNXeYe (\Wy ɶg+Z!CD{ѝc, 0G4}9" }qSre\ @icip5Q.DP `r-rM} {2]:/ӸpۤϮ,җo*e'{Nm|owH\t.lZJuXvcW&M;~`)^r> J`>o*+Mn!(r?S9Ըa\)fgu;?zl`Ug'K[ ̚>BZ`rR8ڷHx}ondreHd؊|*bYa, Y_oz^Tu/"T|;lR3nQNYQt>lӗ^^˶[#||n 1OuDY$,Ck`x7e٫In"zR`;l wdm(+1 >r+`C=jTer;:ѣ0&|Ò!Ppʏ>{W^57$A\܈{J{=#`"K(ȁyLN9 9FNk֋9%Ҋ.BEhuSvX K-)0^.crȗ'ܖG!]At99Z}\#XpO'v&tfB#P|F>h IIx#V h n1\$Cl"5fNE툌̎ xM֝H@{+oꤠ5׍!P!:"ѩU0/ d%)Ϳ6 /PJh/'I9Ն""L,2GMH2n|Yۋ`ړ (ZB׽}%1 PULw[3rL}|q1/eX=s؆95o<q{LHhKs^֭[ /O R,/= s'g鍳@f¦/teK# '&d#nBъ$tsa8 eqK4:Vew%Hs]2eU]z&gOYxFgQVtB AEs8J)rC6SW_@o/!R#xw"BԠȘyTrϻ,YHZ>@ڧ_PpJ X|f)@=^/|MŻR!,u[s 1qXlM) G]1?(]#boԯ' CÆ93 d?/*J%=+K.wI0KA1asp!)Nx:Ro\e-3K[,> /Lb)z`*1Y)p1,k>/As*CO sf&ųuW t6KŁ*ۃr,yHHo[c\򧉨KVXLǬ^T91c=ERedI.ˠ/>,'y =A_Q:|"CO:q@S1;IeBvkhYū5BY~{H-`}m3gZ0\CIE8KqSK;LiөUg>- 䚝GiƤV*;Ez-ۺw>Ra }zP['@ɑI@$k+Ui .LuK1`e!q&~bԒj!<q(KN^VK94mb6]\>Pr=Vgqcjt=f 4\-C8ÏbCНxȶ0J(=kޏmکIOm6˘;7y)]ov{,crbXLllݲc)Y5eҮ(B -)#)+$59YXO8|~Y㷠8ty@>2{\QEAgMWq)wFAkO܊Eg@:N#3{KwNj@,'@֙ ٹq3" K߱c9F3ߎ@Җǻ:F  I+U_J92+~ *{tj$7uaÿYIx%a&ّȥ)j;HzUK&P T|!(U.50F&!'AN"ݍ-|ܰ^EK-,^r/dr5T6$IjGD),\G,XWt4hC2iX}MWzB:{mj?lKO0sN4qk4۝s9>ӥm WǸ 94=O %j<ņSht5(TlQ_$o;\8X!7fSرpjwV9 1u3ٝGr9%losN>ԉJpNdJ+~jWhoٿ>>w# YLRxu? ҝSXטb2»[\^,~n$݂A4q{j; ZkuO>tS#J HESwG%IEpЗ& \w:\vQI'&/(HƥBPN{ģ РDgr˪yeU0WZxmNǶ7Xh]g #|oUOYGxлLg>#̵{^DYxF{w xO3h;6DF' WcM˙c #O23j[ڏ69NBWCWH2̎ )Ae.JmԐB4 _OGauS'tf31LZ!ӟKVEњ*W׀Jax@h.|?QHVц\u 'piO6q0&gqd& 8+0f2=MҸ8xm0] |=*3`խ\MchJb2G1/HmK4VYcRyo'Vj{McS}kٓr KD'ՅqgdH`U*k\&w2x ,UKb\YcXWyIkޒ4({H*1Ĺx5I,eVٻlDj>lh~ ad # ǂNy9 tu#m^@5yo~6]+/%MZ~Y>,wJyh mfl.ⵁyXwYh-!hgcрJlgLkaEO ZNtzu._'}7__x'Ԙq,:]>$?q49Y]is7TA01pPU¾8Ju.XSKr(Ҧ9JRH::m  Jb#c, ,h/|XQ!5ao1E)Jib@WoFFO4.\ɀwƋ"0l-^+ {0(XmC~c0oXA)nzGaiHKqA<ܫa؃iG"tH O.ҥF E^{J29R)".Gydiь/?x*& C9)Aʍ#q-EK㔣[Ӎ͖\Po0v1Lz/jPi51fEmMBiĹ?` YpMEZ+,F>F,չl*~=APM\>5iZ"ԈTr)DR:n|DÚ0U.0wС] uM7"7H^ɡK7]z>#]VXt^-+}~1渙XE4.Vڪz`KoKՆ.)F΂J=˸tE=ȟVcV~0LޑH~ċ|33.nLoYȡ!9*L;%mAGFD)T]sw tQmW{2e;:5eiqAv2̮AbG0i&uٚ'GK".KF.v^p֫%ZԮ E8v ʪ߁3FmTd 64$귲TfDI"jad֤XqV tgRΌn6*S>VM+}w+s5C]ExSO EM&oιS|u. HoSl[^+IIu%iHP5mES ҳ̱sZT\*Qzf8%#5pUXIiC3/`bl_ Ga,I/>e#*R"/fH52?LL GSA[0di@aӧ (k-&Upz#\=P"#ܣkWeƒn.%Q8Q'ؙW-FA2E%aҀpZ̟FQ> 1r7o 'r0\]e^_[q‰ L\E2vX#o9^"`&t7>U甫}f$[T=aM \==UpS%[;ifJ i#o7#ۢ0wT#@'t= )^ f[-IcnR6;!L,\ꙣ0$iISB\A%ؽƩHOȆa+:M_iy܏&MOo#lc{l^n}bЧA;:(Gg1d>r%ei)ܼ0j[{]VA"c- T5}>撁Mck:⡫mV\ot7kS ÷d=WU`6]^'o;@cz'ؤezLG@0sU|\-^Ƹq-RM,t]y<>G8qPq]O[V{sXX;ȇ8Lg1ģ|@ǑN?kUtdB'[@ +0җQi{D^4_H$+L]{}яQIjTY3#UB=:b4{ Nd~fV*6(.1o#sOltkg丏ALNYGI~etbT?-WˌdyIAgݱeXGLO-wN ؟,՝gn:-*Q+h/Jq9Ll@.=`K9ncQprlu/hjr, Úg+@BCn CoWwi B(-bQ "wgǒd' /szY-Gx֊&'X:K&*1 ԞL0*AYT[H[K9|~ Uu*K-g3BTh<ͳKk5 3<ʀ>܈y;@lt&X L10Hɨ]Jl6W}$0O!JWbZzAE#lE܏p!fMX:p,1}!UC~EQNՀ^*{Q~^;j, wnm]8(RJߵm5Pn+sǡ^haʺ^^<?s]Ԓ\ ] _^N0Z4l{3˝SoFvIXT]\̋).r:@ʔˇ@As91!\c= φ;WRȼqrT,l $c@MwazrQy,6-ʦ2":O?Z&‚^[n{$4r~Osܐڢ>YP Mxaf(;DF;$e>%d7~xߕooF _DH|YȸI~IzYw7lE?gK#^mt^ط@!g* 5253DL)Z."SǝLey4$c\|alaAI5^w&|-5$RP ᒟ-tBkYBS ?^0yms \*7!\9%#ᛷVԌ~>iO_T/vVِ,=p1wOmcA&s5) "fU22.PTa+_<7[*:^{2XhxQ"̵vrҍ?/t5&  BH`3ػFC!4coŁn^|mwY/`6-妯!`4(\hOPZ0-lDR^qc@W[1:x}}}ZX8jW/>|Q56Uq/7X=|jtH3/!<$l*}D ol/Iwan"6ʣf@ M0VN/M8[Oʼn*NY!nr#mC2$vF 0iIIJ48mLYro5C2_c@I<~ZwN*v&d\=VW0OWٵ%[[AB6fHzBŰ!A;ׁO70}l{e%@Njb[Tf!$5Ώh2;YhיL#XL=2To;:\)n(:޷;Ôb%bBP<{[mBdW,}FYQ`Cs.5.EŅ|pk@2[-+vȘ15>z?]1Ê 65D;^0W$Kl:`T5;d9;hz,2 $ٰtŁwpp|2E44Tie~'LNOHf.ZqQwI}/q:˳O[գ?Zy.aF(!sd<ǚ6k:X|d5< )Q&m Xй&fθ~ ;QbXsa[7Tq+=ULp[oDxP]c8K P' h#mqoZꍐU:LoFQf!3r:yQݵ jԱ9[ŵOO2/l#v?[4>j85&DU:g%~D#Vf蘝,|ֆ ;[7S|*K xG ¢.?4>9Fyh<+' Efת%Ȑ_m0a̔F+#iM+EhB@vR̪ xLCJR:ZDY( IG /ڼQc,W:̘cR߸?LP}|.r1 me>x&UR:1J%$UIVr얮Af5gǷ#@4D u p}q:C삼$זDPycLjRK8z ÂL_*9ݘ@+jǥaY* |orI}0뭛hUttBL|,kxQy/G㙣Nf:.WHlH3x j[tk .>^;a,>^3j?xpҫ$ ege{7w@#Q5{N©RL|dbuS/$TLbΫg^PByQ=:G/b .t[|ێnnĹ}3 GP RSZ*&F6 :*%IgƝv(\밎R _Xg0c<&,qNJ)%Qf#/SBZyɝGޘs4&9(5փdwwt6$Rt<.1z/S0;w$#a5, 1*Y*a`fWPֻCσpmnx\n3Ne'e7CgeC xz^RMX_^G{wWK俚r'DuA^Hq(o~+1?3:rc3gr'd|H/FHx++oH:] O9M)}fÐL #zIeskjyy ۉPZt 3.VLcT%bvLҶC^QI(EjalkC]c`{tY޵rΔ,O@),99&0J.Y.}1vW̪_Y?m> 6p *ZCB]Fj5[׀aΘ\89נ5#pR޹t Mx;٥#,S3Uĕ}Y,cHef3hu³~_]~HѷyFMk-H]!eUxho*Gw> S, Ad_^D<VD!̑IॢW.&7d{~?wPY-K"zHjƙ4Ť<' 26~BwI+u>n9X ЫL)uQW`.dMfljZثl RZ(鳚}Roa4=Hw;(jQ 7FQ=1=d864ֳMQY,oݖ~w_}PjX *Ow'd,d3fůIx3;\uD^{7 V7艆&K&ǚGXnƅc53dlI R*,OŦ<`VHna%5 w!}M{T$RlI(NmphNdV_E o\4+bY9WSf8)+ zё f)cdfoT*nh3IR73\lIys_p6Nր-1f3 ^k(! ulE5ٝXh[q/?H ȫ&=4W߿I<8R>ti77q=]KXe0bnV?bAzb>}eKeI:51EPB\BŗkPGhvwptƺ[.ll\`*bBt,(moS Tws7|3Y+za"F2)B&З"{t%#PRtSaQT2ή"[-/2(Oáq6yXksx1| JA2@2}%7x8l2h^&=CEUoaH0 º>d 2m?AtR'Q @Vi?u PeA'ﲼOQ¬ˍ 4%U$$7iJAe9R ·B`9_ * WkUP~BdNY^JheuRM9D p$ǮDVBWyGbk YHT1s3HZGj!(a àU=QQmH z S\SqpEÏ'["t1zmOvtU@)[$$nfZ,E6$[aҭ;`l>ghzEd 5ޚ3hp+V?n6,f\f!;皢702gY E?r.~ͬ\++GNAz]cY'^P Vj7[͡2)`k<@ ɓ>050w ;F$0 AS@{~O>N-_RJٿB);XJEi-wsٚZګqh2Y \s 5 L>l+z"#_@P#equ_3gE/,OB gS{7<8XY6*X6d=4d Y\i'(b<^nBܥMړ+`(%(O`]87dE2_`ein,1p!:; Y3V@ų\R!|dE)❰ZmTyx@trzP&Έ!ǜ*왻Gx0L°5(WFmøɭ~m:hYb1/R@d7RN-//!Y&Zf- PP_}?^ Q>]\­KGM]1 U֬{ 2.**vzMniNcN#'shilab,qc/聴VՑ\:0cry<[čt0\γ fQ{>Q YB@TVJY̷{4 DHlPvqYGZDҝ," @'< _;d5rxhZiz$rCS}&}ߞ[7Ȣ56LܣʒL@"| _`ui5§ HZ&)֢ʹ',dH#\VaH+DSß^ͣ|*bl>Vʐpy1(.6-LgKNR pQQJ;*_.yH&Spvŕjec@qB" zj܂5r<͌$GyB^Gu6?/~ouaac_a %~|;BxU(WB[a>ȭ~ 5d@!JyI %>ηMviɕ"`Ovu"VXx&+yiJs_7͊,~s'öܰM ~04u;}&"nZI&3a~\YW,?1I:"ef!96al @V* 3(a,gOh Xa? i[4TͨSÌ:7 Cl Ks6 e Yڮ3C( :0<Ӊ./}v7+ P0m7-Ssmo镽!SQ*6zYBt0ٔVH [gүL^H)EWxeCyQ`D6F59i-P'+;=Iqd{k*6P64=Y@Rn%i3؏!C?fbNֵD eQyl3*C\? ~SP;]nXqv1yիsظ~L]Fq NT$} M}h7jɓ2VS{scJFG[?Y*VqA/A%aO< /f3dH(}~4*ăƼt5Ĉd֎fNTl9){U2rs#8uv%r_)"*N*cI>X=5P{pH 3`+g;`zAȝ]AKo5(l`8ErˮǶa-Vo`֔CSW =cVЏ@+͛3+@Z@d0R?ALw@܋c.lzu v<#bC5=n7˒_ '+F$Ҏ~(:+vEoK-TyVĘ̣+-w (Y"#K#Ż&?+6} 2z:8m]."J-i0/O+] 6l~wcpz|7Fp5\8@UO=ˡq2U-iA16Yũƛ1si:?Q8p2hw s%"Y<IUPˎ4cnϬi"b]:9^v/ % })5QѼ>S+;2ѝJK?3m)g,>l̈0mNv&%Z!F9;F2 !&ݗR^83&bZ Vh$N'19P j[z +#?|MCwҡUn5=g `@ZJm &r"p)Afɻ!.P:o0Tqd7'[ 55V}>Ġ>9O~)8{o3mjClJ4:RZ F4.y\qجf^# q_{&o)!Lu:e̖ߩЙ N4!mfEޞLZH4 nia@d7;ʇN-_XLLՅ][hjY >=*J_C>O.,yܯ Ɋ~BJK]JNcdfyZzC(eΆ!w1Ndu?#UiaC7 uG r)7bkQP 7ziw6^d85!@᳚E4$o%ʨRTYT"Bc`zt !?-En)bG\g)|HϷ*XY{˫xXiavnq[`5=Ag[E5_F6C}=*ݏirhb:u@(JfFsj(^:DK Z$a%bHOlqjXrۿ0߰>.[\q!(>\(BzL*.*ub{S[Scޣmj Y4JkPsDȨb}JvO zR paeJLuU3KKyCl`O+ E<1!eŎ\,ZA23|7T-#L.'U)j*Ա?9.e [A[X(}LMf;?3;0*rXM\Œ^(%iSOUlIZC,HksKKК*Nl*Exq;x2+`YFNq8x (ieE-2g>9!JW\'C "8flsHqk%MAt!O] p@7Th 0T;:T9c9x1VG&fnX~Dd|Ҡs'x`XA"*|q5?#yoJ(|a: EIriؕd&eDFs챠>Qן+VӠݛBJF۸8l&=LJv_ZV#2 Wou'.2<Յl/ }(7# %'iBy~1 i<| fEduBwDq9L yӼ&6iio tғ\m%JZ}O;~/ u%:úM!GXL7Ԫ<7LG9)—.3Z¥cS5Xxm{T7nS/_;Y)/ {EG]`*5A77Ҩ ]Kb5$IGNcs -Ck׈]>+,oh:zp`8jHGF%E_UL(kd%?ykp;8YitM9El1MO&QK00?ii:Uu~ߦvI8 qG`4_X2`} Iގb36s5jV.[d;hsW=Bg[Kb&…fxK,flPWWFӱL(Iw3\!_Bx?6/3_@VS8} ̥ۉػ _`zW̠-%)ͫ.Gm(RVuB[!RP?v0m܋{MlI {dB"0U.1 wپ܋A- 7 g_ݭ%X*|fqy|~ɠA]^~GӍIftP(1kf&G^| |ݠLL(0@)7<DWE{ف8ژ149q% MQ ViDAI%8Qb eF.-F’%gEfxaΆ;.Yr㢬B4{.Y/7q]!%\ƕp zǗTC~u1#י[i7UnK6L9rzQ|PؤmBsLngI1F! i~s:]Дoj"LX4dfxt+D}IIPt ĭKǹ@Ig&ib1#X͗O5*$`;6of2}P0o\m As{ѧQ% xT %ن(oan۶ҔzgAG ]Zr{I-OK0,|n#ǹ&]ZP Kc_lv=vnnHY|JpWS+\Kɮ<`?°&rQD-1bWK2G~ג nHuᗕ;9-LTdPQ~@HIS5jwJHZ_-bj3cgFj,|@x 0\d#(10Ql/)ɬY1>km* hcBmcHsHn S3ULykK̽e \UR젵 A k@Őed_D:`C)YJbHj<ۓNŶj,x h; a;W^T@diBGs4I}`mM|=t˽~,$#N9"MTkʥWhzr@V'LƉ)BgQ̫8ѕm0۳ 2>cVc&\.h ɗÄ0_T:jBPCnvK<4O92&4 /ڛ>Q.\}MkK!L@#]RRQ>n3f uFg|dK,y7J`ĜP cWpnmP ={4{]&YǙ kR9+u`EM&}+蘕Ss#E_:f} 7b7`x9{{ǍaQm X.n{sCcŁOO[6De ꆝ<0 [pSubSeu1[tHiQǨC<ۓ|}۪{E+mv'pt ڍ$bmW&Ε +jǏ>w?!}Fw\I!}׉H`*؎;vr#A1jZ`mRl)TY+bہlM$Z=Ni{!.9(Zл63y*%n.GcQ#ڈe OGбDWɍ}J1={p8P {lډ@ŰA*!$[ֽp{#Cm3 CI[[]:cP9cME_=zġcAl\[x͢I?=2*f25[8W=MiXpK#ZȣGH`.dA`=u_&4]3MWr@a-Pp,z/!' PnbVC !LǏwz?V*&8o&4xqK4#<Ƕ֎o煆y{w5\"|h(&X]L5oxdt*I|6?l8󝡈$ NF5l0$# =W'$}D$#̐[w3Ľh})aMz$*5Ԫ+W}/WmgVIZ;Zr%kioT@! j y;ĕqCֹ0spՒ h,5.  N_gȇo64}icK:6AzAN{uDbTNM 0]GH)+񃸴QCmC}̔nب^RΕ~>uN1R'ę\R@g@͊u"%0H\eܲ|!U/!J۵xk]yƉ^ 8m*`!5Ļ]^UR>Y=' }Qyn ,& o)_K%Q+(aٶ@7E04z#n  IS ,`k@W4ױȻSF)ؾ7G2w3Su\• r8C8E,*vNF-kH-߃^(AsrkGX_/!9$f̷ d فh&so)| 8dZ7|+Q@O۲I= ~mpOYBԟ 3;|x˳ܞp_f*Ƹe!;EDLckB{ubÅ}=עGI9Rʊ9Au)O%DE跉}^^n[+D6U[ mb>;l3I7hYTJHBz?Gj s!I Fa9ύo2vRh>ǫVALפK9~Eg.~{?@m/mu]e: uƌ\b͗ijm'T_A&:io:H1w[^[/^q$O5Vg-ܫwAJEdjM3' }.;iF -GL;XɎ H*ɒn;wR'aȩSF +MB"PqC$N#Czk%5'avA2j#,ZI.ZGp_x'P(,~}TJDLA/$$ljбH4/:pqdb鑠(|dj ְT v\3jImxΕJC60t%*aOތGf^_ O΁ C}'F%5#A @Y~ѵm yUp]gĆ (OH0ED͸NARa svHU ?g7%vu NYaQ#=Hm!,~k,\;Ȗ[ހ~ a#H K^^2yy\8>>7A8of-Lmdy\KmKeG;fZvMLGZn={>_ 7C]f=^` &2͢'gɾ 2#" HZls ۏ^ؘCf7.t֓7PF-d(m4M J x .ךrĄO%e97uH`+ˤZ>ytl)[Ox P$L ד~Jf8Vv vcZfx|s(xZUTE)S6a(Iv(:WVX~Գ8&Uא yx1qJy8}uMnЁϿ7|9tpHMcIPPMϳ59~8%1|ū0 |_Ň{s.vǾ|b%pGHղ/*ʾd N֒4igOVO5ybTS4Vq Q.0T}t`'Bvϭe Ky _%u t #%&o1<=<7eiXc2L^m]ϠGM_wpopرjӍkBe@!JG$< 8X(pI^p^H 橳p7`{y?TƤ1F݂ B%Ll̕ e=IHP(m$IK"0(6g ! y>``4둲 CvSY%pE$@xێT e]ЃZ/PdI: c(Py0a <஢9YVTJE1}wEs K]3(`-]s}/j p1id)ڬv3BWQ:@YuWQ=I,gWѷX뤮_̍X)GC{ۂ?e98~A4e Jh^;ޯY^b6'6,\=Ԛ?Na[w9GMsKo12]96L ͍K[qfz8bqLGYjl<e=)CSfNz,_FB-:|غmOc/du*na7DhR3αVN8pxTꄡm 7CT@ -}?z.DȰI ߲ctͣ!Ajs,,cw[ 1n AkW#lK.M}N0t_ZL2cF`JN8c^~ ׃DNJdv!z& $m4b~k)_Qnѷ=5n!ƢM#jWE{Q|s5,纎 gu-nIeq7Ali~!k35"H#JLj7XPn(yO# !;ϣ=ϥ4kORNp|F$h{LeC<- ꯬Ei^Bd;8TAAE_3%GXCoeGoqҎxFA2I7_oUx(dSʒfrcL.<5"rG\0AbbPl7Hhz/d+o) ێuh u4T'}LԂ WUw0uz1V2_.ˇsj# &f6f"43ig2{=2޷`73^~,h<'}8?_hDԡ ʹKFi,۴Z~egwcU*dqQDKǸ- JJbE q@܂d5'wtݑ+<"~^~@vQl&JT(dbPS&ǐ؛/ S*1O?V՞>qxdJ=S|dBj x&K"#+|<<yp"Llm}MQLТ{'(7%/~ٳR0RTu~;f:k+,Ӹ.3:z8ka9#*dw;+fLxYfTizvu֜L.GJpgwMピI9D/lOR027gNjf{ ocֺ˯ @@|߉(g0LUŝ+jV݇-;BCR*C^K~ubc DPZThuܸjnb _ xۣLs>riᎁυ&%yQf57nq vܥO?dCBޝGٿS5кqC[S6 4cVx>[kmG) o]ަf´5=3 .se]Q,؀zW3gV5T!/uj26x된g gfJdW<\luyK%VI ,clUqӅ|6 bq}6 $ ?>6;r4^/y;אj'jV26,RŭKmZ'|)$&sD)t,#m_l"B#]Αc$Y`ɳWuK976H|7tj p3OB6]i@ i$[gv@5:n_T$-I<ˠ񁏉*16%^e1F]q+=TH1\ypu:9^AGmxk jB~E!'M=??OW #@ kŖ j2e݉HNDŷcRGkvހ#UٟJZZtl7\ ϽG8RC߈I9#6.zfUGKg:)VZ/6)i9Q,PҠ2i6cqq'6S4`7/X(̚U[,lЈoU@е~8dzYBۑmhnSDZП7*\ PݨT@8+ -ϣW0bCף2qt(09(}?i]Om;NJ/L-vWl8k`4N+E}K]<=udCBNѲD-+}A&ȉKWbGv3*W?fr>gb]OW -l|CZO@[1sUԮ;$GbQm_#y^C 4#ӄ +BOȰS–_Ѻ- npOKf.l.4?-*m%,}җO(-"HO{s<.m.}f݋3a7NeN[]j *:U*4ͬ:8ǻVڏy,t)MKh DaNnjCIeA;w-`3#w_e$; Y؞geзY.bAtmZ8Qm#Xѣ+M)J|5*}vk,`hHݛo03;9_i0HfVO:9pGU&͘]%~LKt !9ehy J;N8Zx3ԁ0Lx$guωwE?]btИ O|Ud}T1pxSLh|16/jp6/ e!ߕ> f䱠;[2% e F﨎]j ld;_k@D|##ߡh,A[DO8<&"{GNTy[b2mEVRj#}"?pd"I_=^4NA ctNOsJ[[ QBttkԧ2X2Lk&Kb~0x+H, \=0o{ ͣRzPej.ߪ `e9BAH=BܖO %\Ԃ6l}"A#UrFO`1Hh >lt?0ƆaLzίqt\T}roZW0}qu]lDž1յbv+6G/F &ngMs7ֱgyͪ0i^VTykĒLRjM(T;g.TeZA궆x|Ճf|sEؾ[oС-?م ͞-K?L\Mqdo#S@tђE Ր|0f|.ϩ ]v:1 wtUI[:=l|%lٖK[g6WGapg83$;~sCy Q lj*ӨO4| LI/3=o)ʔz阦CQ"h;}V}\>bqK)ָLЛkodN7 gub`__E~o1TpCRYIq]=r$Ѵ!PtvPaVzpCxNUQO ?!\tq岩l(+3x|}yo ,G}*/mPFF)S.ouI jь;+OdaD rf(ʺyhUNdNZuEq @ii<6&hVTn(-jP%иhe$Uah7 _-2sM(-:zBvUZZDQ:]Ћ()G2FLGYZN9XKOOڋey]s+X2a'c^(zV?Kf7blogaZp>Nb "8G1W@3xP IZQt5b+3 ispS;`"e꾞r_' aJuj KuD^E*m]v$ 0FqG{.잽;{F^lCΫ㵂KT˥svu#p5ɟJVY%eš:mJߚ3Pp,lqk W)d6SP1Vz]mU\ٻa uPnlZ+(XN|zI GR5RwR[@ y zѣ~-v w`!Bw}ʴ p$mQ斮BFEY*K_[5S#lPmi /%eqCX AyAqx'-fk?{}z++lŊ(7)i {Kw*J!T~ƫ:vD܂W("YkL8* % ~p5݉p*sಝy-4lVq$x EU`{v]8mjw2? d6>A#-kRk* _tW4_I) zSI&\=8BZc㩉1IQ@8-q#ԍH~.HE(?=%6U 撁=jN3PRYhXhxg$ R> P$J¿MgƄyӍ 2b9C0;YS ^{D4|'+YWy =E[ 5E7齥^J iiO>JN->WGq&RW,QcB":d7opK"xҨ"LG2QXzn QLXyz9gm5F Ww9ͦ%I˞jqH@g@: ܞ0mPWwML;%an'~jXMPDXn xS8zF\ցxM 9[۵aז^lq|zG5_o@Y4} MW!b븫mqWn Dk`Mߗ`/flX/#![Y(>|2Voʣ_Pc|g'R=WuwgR qױ.yf6>bX/>@-m8 aťC&ly~Gzo&g=D$;5~q~RbOhZ&Ek4(0ClۜWM~J6nV3s < 7@a{Wq(B[\tҷB?S~CVF jΏo\[W] LTipCz 'UE x-z58vGDїnqKyJ3dqSrn!Hu{{ tٮn ɦEjS.+ `w vuȀXޅ`ѻVZqH5?>*0%E(צR,^#JW$IY̜zmFȕ|VPq?OitxBV;*zvD0 fhdX#`n>̪4\ﺠCcwXal2S θ (csxF/PnJLK ;\.vsl\ 5~QQZ06\{D/rxb@4.H(WxK#\]$ݧ X _ұvv[fЖg!'[.`U$lsf0 u%;KTNҠn'=Dֳg2-P@z B-D#z(05Ԟ|09B*-RCڲesJi8>:ϐp$mU9XI=#){勴T\HXVω㾆Kd0Ħ">qIi.ܠ vZ8lO,W[ХW RRze3Py?m9A~Y,:f:Ox`)3ɢAe 2B@J:q*7[59^+eEZ:=4&8 LH XewNFDR8"_u4v^x+hu] i[]-njenD9AEeFCx/^5.ԉ_ |M2N]m/-A wyёnS u*mh*&"K$RfՌAAg1a )Gu?P rJkn*4)Ⱦ~n=9 N V l0U5ˉ-˲-8_k|mf2'f|/q%?W UĻ]=uvq;8.Ɉ 逗djyhۿM`'TcbiGlG02/|' ,#Lh-_Inz;^S\dgIYB=kj; Y@__U.CW53w3`Xwqkge C6'U@:>III] >//LtF