Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

xen-libs-32bit-4.13.0_04-lp152.1.2 RPM for x86_64

From OpenSuSE Leap 15.2 for x86_64

Name: xen-libs-32bit Distribution: openSUSE Leap 15.2
Version: 4.13.0_04 Vendor: openSUSE
Release: lp152.1.2 Build date: Tue Dec 31 15:34:40 2019
Group: System/Kernel Build host: lamb19
Size: 1796544 Source RPM: xen-4.13.0_04-lp152.1.2.src.rpm
Packager: https://bugs.opensuse.org
Url: http://www.cl.cam.ac.uk/Research/SRG/netos/xen/
Summary: Xen Virtualization: Libraries
Xen is a virtual machine monitor for x86 that supports execution of
multiple guest operating systems with unprecedented levels of
performance and resource isolation.

This package contains the libraries used to interact with the Xen
virtual machine monitor.

In addition to this package you need to install kernel-xen, xen and
xen-tools to use Xen.


Authors:
--------
    Ian Pratt <ian.pratt@cl.cam.ac.uk>

Provides

Requires

License

GPL-2.0-only

Changelog

* Wed Dec 18 2019 carnold@suse.com
  - bsc#1159320 - Xen logrotate file needs updated
    logrotate.conf
* Wed Dec 18 2019 carnold@suse.com
  - Update to Xen 4.13.0 FCS release
    xen-4.13.0-testing-src.tar.bz2
    * Core Scheduling (contributed by SUSE)
    * Branch hardening to mitigate against Spectre v1 (contributed by Citrix)
    * Late uCode loading (contributed by Intel)
    * Improved live-patching build tools (contributed by AWS)
    * OP-TEE support (contributed by EPAM)
    * Renesas R-CAR IPMMU-VMSA driver (contributed by EPAM)
    * Dom0-less passthrough and ImageBuilder (contributed by XILINX)
    * Support for new Hardware
* Tue Dec 03 2019 carnold@suse.com
  - Update to Xen 4.13.0 RC4 release
    xen-4.13.0-testing-src.tar.bz2
  - Rebase libxl.pvscsi.patch
* Mon Nov 25 2019 carnold@suse.com
  - Update to Xen 4.13.0 RC3 release
    xen-4.13.0-testing-src.tar.bz2
  - Drop python38-build.patch
* Tue Nov 12 2019 carnold@suse.com
  - Update to Xen 4.13.0 RC2 release
    xen-4.13.0-testing-src.tar.bz2
* Tue Oct 29 2019 Matej Cepl <mcepl@suse.com>
  - Add python38-build.patch fixing build with Python 3.8 (add
    - -embed to python-config call)
* Mon Oct 14 2019 carnold@suse.com
  - Update to Xen 4.13.0 RC1 release
    xen-4.13.0-testing-src.tar.bz2
  - Drop patches contained in new tarball or invalid
    5ca7660f-x86-entry-drop-unused-includes.patch
    5cab2a6b-x86-ACPI-also-parse-AMD-tables-early.patch
    5cab2ab7-x86-IOMMU-introduce-init-ops.patch
    5cab2ae8-x86-IOMMU-abstract-iommu_supports_eim.patch
    5cab2b4e-x86-IOMMU-abstract-iommu_enable_x2apic_IR.patch
    5cab2b95-x86-IOMMU-initialize-iommu_ops-in.patch
    5cac9a4b-x86-IOMMU-abstract-adjust_vtd_irq_affinities.patch
    5cdeac7f-AMD-IOMMU-adjust-IOMMU-list-head-init.patch
    5cf8da09-adjust-sysdom-creation-call-earlier-on-x86.patch
    5d0cf4e4-AMD-IOMMU-initialize-IRQ-tasklet-once.patch
    5d149bb0-AMD-IOMMU-dont-add-IOMMUs.patch
    5d1b3fab-AMD-IOMMU-restrict-feature-logging.patch
    5d358508-x86-IRQ-desc-affinity-represents-request.patch
    5d358534-x86-IRQ-consolidate-arch-cpu_mask-use.patch
    5d358a67-AMD-IOMMU-pass-IOMMU-to-iterate_ivrs_entries-cb.patch
    5d358a92-AMD-IOMMU-pass-IOMMU-to-amd_iommu_alloc_intremap_table.patch
    5d39811c-x86-IOMMU-dont-restrict-IRQ-affinities.patch
    5d417813-AMD-IOMMU-bitfield-extended-features.patch
    5d417838-AMD-IOMMU-bitfield-control-reg.patch
    5d41785b-AMD-IOMMU-bitfield-IRTE.patch
    5d41787e-AMD-IOMMU-pass-IOMMU-to-gfu-intremap-entry.patch
    5d4178ad-AMD-IOMMU-128bit-non-guest-APIC-IRTE.patch
    5d4178fc-AMD-IOMMU-split-amd_iommu_init_one.patch
    5d41793f-AMD-IOMMU-allow-enabling-without-IRQ.patch
    5d417a16-AMD-IOMMU-adjust-IRQ-setup-for-x2APIC.patch
    5d417ab6-AMD-IOMMU-enable-x2APIC-mode.patch
    5d417b38-AMD-IOMMU-correct-IRTE-updating.patch
    5d417b6a-AMD-IOMMU-dont-needlessly-log-headers.patch
    5d419d49-x86-spec-ctrl-report-proper-status.patch
    5d43253c-x86-ucode-always-collect_cpu_info-at-boot.patch
    5d4a9d25-AMD-IOMMU-drop-not-found-message.patch
    5d4aa36f-x86-apic-enable-x2APIC-mode-earlier.patch
    5d4afa7a-credit2-fix-memory-leak.patch
    5d4d850a-introduce-bss-percpu-page-aligned.patch
    5d516531-x86-xpti-dont-leak-TSS-adjacent-data.patch
    5d5bf475-x86-PV-fix-handling-of-iommu-mappings.patch
    5d6524ca-x86-mm-correctly-init-M2P-entries.patch
    5d67ceaf-x86-properly-gate-PKU-clearing.patch
    5d70bfba-x86-shadow-dont-enable-with-too-small-allocation.patch
    5d779811-x86-fix-CPUID7-0-eax-levelling-MSR.patch
    5d77b40f-fix-hvm_all_ioreq_servers_add_vcpu-cleanup.patch
    5d80e7c0-AMD-IOMMU-free-shared-IRT-once.patch
    5d80e80d-AMD-IOMMU-valid-flag-for-IVRS-mappings.patch
    5d80e82e-AMD-IOMMU-alloc_intremap_table-callers-handle-errors.patch
    5d80e857-x86-PCI-read-MSI-X-table-entry-count-early.patch
    5d80ea13-vpci-honor-read-only-devices.patch
    5d89d8d9-libxc-x86-avoid-overflow-in-CPUID-APIC-ID.patch
    5d8b715f-ACPI-cpuidle-bump-max-num-of-states.patch
    5d8b72e5-AMD-IOMMU-dont-blindly-alloc-intremap-tables.patch
    5d8b730e-AMD-IOMMU-phantom-funcs-share-intremap-tables.patch
    5d8b733b-x86-PCI-read-max-MSI-vector-count-early.patch
    5d8b736d-AMD-IOMMU-replace-INTREMAP_ENTRIES.patch
    5d8b7393-AMD-IOMMU-restrict-intremap-table-sizes.patch
    5d9ee2a8-AMD-IOMMU-alloc-1-devtab-per-PCI-seg.patch
    5d9ee2f0-AMD-IOMMU-allocate_buffer-avoid-memset.patch
    5d9ee312-AMD-IOMMU-prefill-all-DTEs.patch
    CVE-2014-0222-blktap-qcow1-validate-l2-table-size.patch
    blktap2-no-uninit.patch
    libxl.prepare-environment-for-domcreate_stream_done.patch
    pygrub-python3-conversion.patch
    fix-xenpvnetboot.patch
* Thu Oct 10 2019 carnold@suse.com
  - bsc#1135799 - Partner-L3: Xen crashes on AMD ROME based machines
    5d9ee2a8-AMD-IOMMU-alloc-1-devtab-per-PCI-seg.patch
    5d9ee2f0-AMD-IOMMU-allocate_buffer-avoid-memset.patch
    5d9ee312-AMD-IOMMU-prefill-all-DTEs.patch
* Wed Oct 02 2019 ohering@suse.de
  - bsc#1120095 - add code to change LIBXL_HOTPLUG_TIMEOUT at runtime
    The included README has details about the impact of this change
    libxl.LIBXL_HOTPLUG_TIMEOUT.patch
* Mon Sep 30 2019 carnold@suse.com
  - bsc#1135799 - Partner-L3: Xen crashes on AMD ROME based machines
    5ca7660f-x86-entry-drop-unused-includes.patch
    5cf8da09-adjust-sysdom-creation-call-earlier-on-x86.patch
    5cab2a6b-x86-ACPI-also-parse-AMD-tables-early.patch
    5cab2ab7-x86-IOMMU-introduce-init-ops.patch
    5cab2ae8-x86-IOMMU-abstract-iommu_supports_eim.patch
    5cab2b4e-x86-IOMMU-abstract-iommu_enable_x2apic_IR.patch
    5cab2b95-x86-IOMMU-initialize-iommu_ops-in.patch
    5cac9a4b-x86-IOMMU-abstract-adjust_vtd_irq_affinities.patch
    5cdeac7f-AMD-IOMMU-adjust-IOMMU-list-head-init.patch
    5d0cf4e4-AMD-IOMMU-initialize-IRQ-tasklet-once.patch
    5d149bb0-AMD-IOMMU-dont-add-IOMMUs.patch
    5d1b3fab-AMD-IOMMU-restrict-feature-logging.patch
    5d358508-x86-IRQ-desc-affinity-represents-request.patch
    5d358534-x86-IRQ-consolidate-arch-cpu_mask-use.patch
    5d358a67-AMD-IOMMU-pass-IOMMU-to-iterate_ivrs_entries-cb.patch
    5d358a92-AMD-IOMMU-pass-IOMMU-to-amd_iommu_alloc_intremap_table.patch
    5d39811c-x86-IOMMU-dont-restrict-IRQ-affinities.patch
    5d417813-AMD-IOMMU-bitfield-extended-features.patch
    5d417838-AMD-IOMMU-bitfield-control-reg.patch
    5d41785b-AMD-IOMMU-bitfield-IRTE.patch
    5d41787e-AMD-IOMMU-pass-IOMMU-to-gfu-intremap-entry.patch
    5d4178ad-AMD-IOMMU-128bit-non-guest-APIC-IRTE.patch
    5d4178fc-AMD-IOMMU-split-amd_iommu_init_one.patch
    5d41793f-AMD-IOMMU-allow-enabling-without-IRQ.patch
    5d417a16-AMD-IOMMU-adjust-IRQ-setup-for-x2APIC.patch
    5d417ab6-AMD-IOMMU-enable-x2APIC-mode.patch
    5d417b38-AMD-IOMMU-correct-IRTE-updating.patch
    5d417b6a-AMD-IOMMU-dont-needlessly-log-headers.patch
    5d4a9d25-AMD-IOMMU-drop-not-found-message.patch
    5d80e7c0-AMD-IOMMU-free-shared-IRT-once.patch
    5d80e80d-AMD-IOMMU-valid-flag-for-IVRS-mappings.patch
    5d80e82e-AMD-IOMMU-alloc_intremap_table-callers-handle-errors.patch
    5d80e857-x86-PCI-read-MSI-X-table-entry-count-early.patch
    5d8b72e5-AMD-IOMMU-dont-blindly-alloc-intremap-tables.patch
    5d8b730e-AMD-IOMMU-phantom-funcs-share-intremap-tables.patch
    5d8b733b-x86-PCI-read-max-MSI-vector-count-early.patch
    5d8b736d-AMD-IOMMU-replace-INTREMAP_ENTRIES.patch
    5d8b7393-AMD-IOMMU-restrict-intremap-table-sizes.patch
  - bsc#1145240 - [Migration]Can't pre-allocate 1 shadow pages
    5d70bfba-x86-shadow-dont-enable-with-too-small-allocation.patch
  - bsc#1137717 - [HPS Bug] Unable to install Windows Server 2016
    with 2 CPUs setting (or above) under SLES12 SP4 Xen Server on AMD
    ROME platform
    5d89d8d9-libxc-x86-avoid-overflow-in-CPUID-APIC-ID.patch
  - Upstream bug fixes (bsc#1027519)
    5d67ceaf-x86-properly-gate-PKU-clearing.patch
    5d779811-x86-fix-CPUID7-0-eax-levelling-MSR.patch
    5d77b40f-fix-hvm_all_ioreq_servers_add_vcpu-cleanup.patch
    5d80ea13-vpci-honor-read-only-devices.patch
    5d8b715f-ACPI-cpuidle-bump-max-num-of-states.patch
* Fri Sep 27 2019 ohering@suse.de
  - bsc#1145774 - Libivrtd segfaults when trying to live migrate a VM
    Fix crash in an error path of libxl_domain_suspend with
    libxl.helper_done-crash.patch
* Wed Aug 28 2019 carnold@suse.com
  - Upstream bug fixes (bsc#1027519)
    5d419d49-x86-spec-ctrl-report-proper-status.patch
    5d43253c-x86-ucode-always-collect_cpu_info-at-boot.patch
    5d4aa36f-x86-apic-enable-x2APIC-mode-earlier.patch
    5d4afa7a-credit2-fix-memory-leak.patch
    5d4d850a-introduce-bss-percpu-page-aligned.patch
    5d516531-x86-xpti-dont-leak-TSS-adjacent-data.patch
    5d5bf475-x86-PV-fix-handling-of-iommu-mappings.patch
    5d6524ca-x86-mm-correctly-init-M2P-entries.patch
  - Drop 5d419d49-x86-spec-ctrl-facilities-report-wrong-status.patch
* Wed Aug 28 2019 ohering@suse.de
  - Preserve modified files which used to be marked as %config,
    rename file.rpmsave to file
* Fri Aug 09 2019 carnold@suse.com
  - Update to Xen 4.12.1 bug fix release (bsc#1027519)
    xen-4.12.1-testing-src.tar.bz2
  - Drop patches contained in new tarball
    5c87b644-IOMMU-leave-enabled-for-kexec-crash.patch
    5c87b6a2-x86-HVM-dont-crash-guest-in-find_mmio_cache.patch
    5c87b6c8-drop-arch_evtchn_inject.patch
    5c87b6e8-avoid-atomic-rmw-accesses-in-map_vcpu_info.patch
    5c87e6d1-x86-TSX-controls-for-RTM-force-abort-mode.patch
    5c8f752c-x86-e820-build-with-gcc9.patch
    5c8fb92d-x86-HVM-split-linear-reads-and-writes.patch
    5c8fb951-x86-HVM-finish-IOREQs-correctly-on-completion.patch
    5c8fc6c0-x86-MSR-shorten-ARCH_CAPABILITIES.patch
    5c8fc6c0-x86-SC-retpoline-safety-calculations-for-eIBRS.patch
    5c9e63c5-credit2-SMT-idle-handling.patch
    5ca46b68-x86emul-no-GPR-update-upon-AVX-gather-failures.patch
    5ca773d1-x86emul-dont-read-mask-reg-without-AVX512F.patch
    5cab1f66-timers-fix-memory-leak-with-cpu-plug.patch
    5cac6cba-vmx-Fixup-removals-of-MSR-load-save-list-entries.patch
    5cd921fb-trace-fix-build-with-gcc9.patch
    5cd9224b-AMD-IOMMU-disable-upon-init-fail.patch
    5cd922c5-x86-MTRR-recalc-p2mt-when-iocaps.patch
    5cd9230f-VMX-correctly-get-GS_SHADOW-for-current.patch
    5cd926d0-bitmap_fill-zero-sized.patch
    5cd92724-drivers-video-drop-constraints.patch
    5cd93a69-x86-MSR_INTEL_CORE_THREAD_COUNT.patch
    5cd93a69-x86-boot-detect-Intel-SMT-correctly.patch
    5cd93a69-x86-spec-ctrl-reposition-XPTI-parsing.patch
    5cd981ff-x86-IRQ-tracing-avoid-UB-or-worse.patch
    5cdad090-x86-spec-ctrl-CPUID-MSR-definitions-for-MDS.patch
    5cdad090-x86-spec-ctrl-infrastructure-for-VERW-flush.patch
    5cdad090-x86-spec-ctrl-misc-non-functional-cleanup.patch
    5cdad090-x86-spec-ctrl-opts-to-control-VERW-flush.patch
    5cdeb9fd-sched-fix-csched2_deinit_pdata.patch
    5ce7a92f-x86-IO-APIC-fix-build-with-gcc9.patch
    5cf0f6a4-x86-vhpet-resume-avoid-small-diff.patch
    5cf16e51-x86-spec-ctrl-Knights-retpoline-safe.patch
    5d03a0c4-1-Arm-add-an-isb-before-reading-CNTPCT_EL0.patch
    5d03a0c4-2-gnttab-rework-prototype-of-set_status.patch
    5d03a0c4-3-Arm64-rewrite-bitops-in-C.patch
    5d03a0c4-4-Arm32-rewrite-bitops-in-C.patch
    5d03a0c4-5-Arm-bitops-consolidate-prototypes.patch
    5d03a0c4-6-Arm64-cmpxchg-simplify.patch
    5d03a0c4-7-Arm32-cmpxchg-simplify.patch
    5d03a0c4-8-Arm-bitops-helpers-with-timeout.patch
    5d03a0c4-9-Arm-cmpxchg-helper-with-timeout.patch
    5d03a0c4-A-Arm-turn-on-SILO-mode-by-default.patch
    5d03a0c4-B-bitops-guest-helpers.patch
    5d03a0c4-C-cmpxchg-guest-helpers.patch
    5d03a0c4-D-use-guest-atomics-helpers.patch
    5d03a0c4-E-Arm-add-perf-counters-in-guest-atomic-helpers.patch
    5d03a0c4-F-Arm-protect-gnttab_clear_flag.patch
  - Refreshed patches
    libxl.pvscsi.patch
* Thu Aug 01 2019 carnold@suse.com
  - bsc#1143563 - Speculative mitigation facilities report wrong status
    5d419d49-x86-spec-ctrl-facilities-report-wrong-status.patch
* Wed Jul 17 2019 ohering@suse.de
  - Update xen-dom0-modules.service (bsc#1137251)
    Map backend module names from pvops and xenlinux kernels to a
    module alias. This avoids errors from modprobe about unknown
    modules. Ignore a few xenlinux modules that lack aliases.
* Mon Jul 15 2019 carnold@suse.com
  - Gcc9 warnings seem to be cleared up with upstream fixes.
    Drop gcc9-ignore-warnings.patch
* Tue Jun 25 2019 carnold@suse.com
  - bsc#1138563 - L3: xenpvnetboot improperly ported to Python 3
    fix-xenpvnetboot.patch
* Mon Jun 24 2019 ohering@suse.de
  - Move /etc/modprobe.d/xen_loop.conf to /lib/modprobe.d/xen_loop.conf
* Mon Jun 24 2019 ohering@suse.de
  - Remove /etc/xen/xenapiusers and /etc/pam.d/xen-api
* Fri Jun 21 2019 ohering@suse.de
  - Remove all upstream provided files in /etc/xen
    They are not required at runtime. The host admin is now
    responsible if he really needs anything in this subdirectory.
* Fri Jun 21 2019 ohering@suse.de
  - In our effort to make /etc fully admin controlled, move /etc/xen/scripts
    to libexec/xen/scripts with xen-tools.etc_pollution.patch
* Wed Jun 19 2019 ohering@suse.de
  - Move /etc/bash_completion.d/xl.sh to %{_datadir}/bash-completion/completions
* Mon Jun 17 2019 carnold@suse.com
  - bsc#1138294 - VUL-0: CVE-2019-17349: XSA-295: Unlimited Arm
    Atomics Operations
    5d03a0c4-1-Arm-add-an-isb-before-reading-CNTPCT_EL0.patch
    5d03a0c4-2-gnttab-rework-prototype-of-set_status.patch
    5d03a0c4-3-Arm64-rewrite-bitops-in-C.patch
    5d03a0c4-4-Arm32-rewrite-bitops-in-C.patch
    5d03a0c4-5-Arm-bitops-consolidate-prototypes.patch
    5d03a0c4-6-Arm64-cmpxchg-simplify.patch
    5d03a0c4-7-Arm32-cmpxchg-simplify.patch
    5d03a0c4-8-Arm-bitops-helpers-with-timeout.patch
    5d03a0c4-9-Arm-cmpxchg-helper-with-timeout.patch
    5d03a0c4-A-Arm-turn-on-SILO-mode-by-default.patch
    5d03a0c4-B-bitops-guest-helpers.patch
    5d03a0c4-C-cmpxchg-guest-helpers.patch
    5d03a0c4-D-use-guest-atomics-helpers.patch
    5d03a0c4-E-Arm-add-perf-counters-in-guest-atomic-helpers.patch
    5d03a0c4-F-Arm-protect-gnttab_clear_flag.patch
  - Upstream bug fixes (bsc#1027519)
    5c87b6c8-drop-arch_evtchn_inject.patch
    5c87b6e8-avoid-atomic-rmw-accesses-in-map_vcpu_info.patch
    5cd921fb-trace-fix-build-with-gcc9.patch
    5cd9224b-AMD-IOMMU-disable-upon-init-fail.patch
    5cd922c5-x86-MTRR-recalc-p2mt-when-iocaps.patch
    5cd9230f-VMX-correctly-get-GS_SHADOW-for-current.patch
    5cd926d0-bitmap_fill-zero-sized.patch
    5cd92724-drivers-video-drop-constraints.patch
    5cd93a69-x86-spec-ctrl-reposition-XPTI-parsing.patch (Replaces xsa297-0a.patch)
    5cd93a69-x86-MSR_INTEL_CORE_THREAD_COUNT.patch (Replaces xsa297-0b.patch)
    5cd93a69-x86-boot-detect-Intel-SMT-correctly.patch (Replaces xsa297-0c.patch)
    5cdad090-x86-spec-ctrl-misc-non-functional-cleanup.patch (Replaces xsa297-0d.patch)
    5cdad090-x86-spec-ctrl-CPUID-MSR-definitions-for-MDS.patch (Replaces xsa297-1.patch)
    5cdad090-x86-spec-ctrl-infrastructure-for-VERW-flush.patch (Replaces xsa297-2.patch)
    5cdad090-x86-spec-ctrl-opts-to-control-VERW-flush.patch (Replaces xsa297-3.patch)
    5cd981ff-x86-IRQ-tracing-avoid-UB-or-worse.patch
    5cdeb9fd-sched-fix-csched2_deinit_pdata.patch
    5ce7a92f-x86-IO-APIC-fix-build-with-gcc9.patch
    5cf0f6a4-x86-vhpet-resume-avoid-small-diff.patch
    5cf16e51-x86-spec-ctrl-Knights-retpoline-safe.patch
* Fri Jun 14 2019 carnold@suse.com
  - Fix some outdated information in the readme
    README.SUSE
* Tue Jun 11 2019 Jim Fehlig <jfehlig@suse.com>
  - spec: xen-tools: require matching version of xen package
    bsc#1137471
* Fri May 17 2019 ohering@suse.de
  - Remove two stale patches
    xen.build-compare.man.patch
    xenpaging.doc.patch
* Tue May 14 2019 Martin Liška <mliska@suse.cz>
  - Disable LTO (boo#1133296).
* Mon May 13 2019 ohering@suse.de
  - Remove arm32 from ExclusiveArch to fix build
* Mon Apr 29 2019 carnold@suse.com
  - bsc#1111331 - VUL-0: CPU issues Q2 2019 aka "Group 4".
    CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091
    xsa297-0a.patch
    xsa297-0b.patch
    xsa297-0c.patch
    xsa297-0d.patch
    xsa297-1.patch
    xsa297-2.patch
    xsa297-3.patch
  - Update 5cab1f66-timers-fix-memory-leak-with-cpu-plug.patch and
    drop 5cac6219-xen-cpu-Fix-ARM-build-following-cs-597fbb8.patch
    Refresh 5cac6cba-vmx-Fixup-removals-of-MSR-load-save-list-entries.patch
* Wed Apr 17 2019 carnold@suse.com
  - bsc#1131811 - [XEN] internal error: libxenlight failed to create
    new domain. This patch is a workaround for a systemd issue. See
    patch header for additional comments.
    xenstore-launch.patch
* Thu Apr 11 2019 carnold@suse.com
  - bsc#1125378 - [xen][pygrub] Can not restore sle11sp4 pv guest
    after upgrading host from sle11sp4 to sle15sp1
    pygrub-python3-conversion.patch
  - Fix "TypeError: virDomainDefineXML() argument 2 must be str or
    None, not bytes" when converting VMs from using the xm/xend
    toolstack to the libxl/libvirt toolstack. (bsc#1123378)
    xen2libvirt.py
* Mon Apr 08 2019 carnold@suse.com
  - bsc#1124560 - Fully virtualized guests crash on boot
    5cac6cba-vmx-Fixup-removals-of-MSR-load-save-list-entries.patch
  - bsc#1121391 - GCC 9: xen build fails
    5c8f752c-x86-e820-build-with-gcc9.patch
  - Upstream bug fixes (bsc#1027519)
    5c87b644-IOMMU-leave-enabled-for-kexec-crash.patch
    5c87b6a2-x86-HVM-dont-crash-guest-in-find_mmio_cache.patch
    5c87e6d1-x86-TSX-controls-for-RTM-force-abort-mode.patch
    5c8fb92d-x86-HVM-split-linear-reads-and-writes.patch
    5c8fb951-x86-HVM-finish-IOREQs-correctly-on-completion.patch
    5c8fc6c0-x86-MSR-shorten-ARCH_CAPABILITIES.patch
    5c8fc6c0-x86-SC-retpoline-safety-calculations-for-eIBRS.patch
    5c9e63c5-credit2-SMT-idle-handling.patch
    5ca46b68-x86emul-no-GPR-update-upon-AVX-gather-failures.patch
    5ca773d1-x86emul-dont-read-mask-reg-without-AVX512F.patch
    5cab1f66-timers-fix-memory-leak-with-cpu-plug.patch
    5cac6219-xen-cpu-Fix-ARM-build-following-cs-597fbb8.patch
* Thu Apr 04 2019 ohering@suse.de
  - Install pkgconfig files into libdir instead of datadir
* Tue Apr 02 2019 carnold@suse.com
  - Update to Xen 4.12.0 FCS release (fate#325107, fate#323901)
    xen-4.12.0-testing-src.tar.bz2
    * HVM/PVH and PV only Hypervisor: The Xen 4.12 release separates
      the HVM/PVH and PV code paths in Xen and provides KCONFIG
      options to build a PV only or HVM/PVH only hypervisor.
    * QEMU Deprivilege (DM_RESTRICT): In Xen 4.12, this feature has
      been vastly improved.
    * Argo - Hypervisor-Mediated data eXchange: Argo is a new inter-
      domain communication mechanism.
    * Improvements to Virtual Machine Introspection: The VMI subsystem
      which allows detection of 0-day vulnerabilities has seen many
      functional and performance improvements.
    * Credit 2 Scheduler: The Credit2 scheduler is now the Xen Project
      default scheduler.
    * PVH Support: Grub2 boot support has been added to Xen and Grub2.
    * PVH Dom0: PVH Dom0 support has now been upgraded from experimental
      to tech preview.
    * The Xen 4.12 upgrade also includes improved IOMMU mapping code,
      which is designed to significantly improve the startup times of
      AMD EPYC based systems.
    * The upgrade also features Automatic Dom0 Sizing which allows the
      setting of Dom0 memory size as a percentage of host memory (e.g.
      10%) or with an offset (e.g. 1G+10%).
* Tue Mar 26 2019 carnold@suse.com
  - bsc#1130485 - Please drop Requires on multipath-tools in
    xen-tools. Now using Recommends multipath-tools.
    xen.spec
* Mon Mar 25 2019 carnold@suse.com
  - Update to Xen 4.12.0 RC7 release (fate#325107, fate#323901)
    xen-4.12.0-testing-src.tar.bz2
* Wed Mar 20 2019 carnold@suse.com
  - Update to Xen 4.12.0 RC6 release (fate#325107, fate#323901)
    xen-4.12.0-testing-src.tar.bz2
* Fri Mar 15 2019 ohering@suse.de
  - bsc#1026236 - add Xen cmdline option "suse_vtsc_tolerance" to
    avoid TSC emulation for HVM domUs if their expected frequency
    does not match exactly the frequency of the receiving host
    xen.bug1026236.suse_vtsc_tolerance.patch
* Mon Mar 11 2019 carnold@suse.com
  - Update to Xen 4.12.0 RC5 release (fate#325107, fate#323901)
    xen-4.12.0-testing-src.tar.bz2
* Mon Mar 11 2019 carnold@suse.com
  - jsc#SLE-3059 - Disable Xen auto-ballooning
  - Add CONFIG_DOM0_MEM to the spec file for managing dom0 memory.
    xen.spec
  - Disable autoballooning in xl.con
    xl-conf-disable-autoballoon.patch
* Thu Mar 07 2019 ohering@suse.de
  - Update gcc9-ignore-warnings.patch to fix build in SLE12
* Thu Mar 07 2019 ohering@suse.de
  - bsc#1126325 - fix crash in libxl in error path
    Setup of grant_tables and other variables may fail
    libxl.prepare-environment-for-domcreate_stream_done.patch
* Wed Mar 06 2019 carnold@suse.com
  - bsc#1127620 - Documentation for the xl configuration file allows
    for firmware=pvgrub64 but we don't ship pvgrub64.
    Create a link from grub.xen to pvgrub64
    xen.spec
* Mon Mar 04 2019 carnold@suse.com
  - Update to Xen 4.12.0 RC4 release (fate#325107, fate#323901)
    xen-4.12.0-testing-src.tar.bz2
  - Tarball also contains additional post RC4 security fixes for
    Xen Security Advisories 287, 288, and 290 through 294.
* Tue Feb 19 2019 carnold@suse.com
  - Update to Xen 4.12.0 RC3 release (fate#325107, fate#323901)
    xen-4.12.0-testing-src.tar.bz2
* Mon Feb 04 2019 carnold@suse.com
  - Update to Xen 4.12.0 RC2 release (fate#325107, fate#323901)
    xen-4.12.0-testing-src.tar.bz2
* Fri Jan 25 2019 carnold@suse.com
  - bsc#1121391 - GCC 9: xen build fails
    gcc9-ignore-warnings.patch
* Thu Jan 24 2019 carnold@suse.com
  - bsc#1122563 - Virtualization/xen: Bug no Xen on boot, missing
    /proc/xen, after 4.11 -> 4.12 upgrade on X86_64/efi.
    Keep xen.efi in /usr/lib64/efi for booting older distros.
    xen.spec
* Fri Jan 18 2019 carnold@suse.com
  - fate#326960: Package grub2 as noarch.
    As part of the effort to have a unified bootloader across
    architectures, modify the xen.spec file to move the Xen efi files
    to /usr/share/efi/$(uname -m) from /usr/lib64/efi.
* Wed Jan 16 2019 carnold@suse.com
  - Update to Xen 4.12.0 RC1 release (fate#325107, fate#323901)
    xen-4.12.0-testing-src.tar.bz2
  - Drop
    5b505d59-tools-xentop-replace-use-of-deprecated-vwprintw.patch
    5b76ec82-libxl-arm-Fix-build-on-arm64-acpi-w-gcc-8.2.patch
    5b8fae26-tools-libxl-correct-vcpu-affinity-output-with-sparse-physical-cpu-map.patch
    5b8fae26-xen-fill-topology-info-for-all-present-cpus.patch
    5b8fb5af-tools-xl-refuse-to-set-number-of-vcpus-to-0-via-xl-vcpu-set.patch
    5b9784ad-x86-HVM-drop-hvm_fetch_from_guest_linear.patch
    5b9784d2-x86-HVM-add-known_gla-helper.patch
    5b9784f2-x86-HVM-split-page-straddling-accesses.patch
    5bdc31d5-VMX-fix-vmx_handle_eoi.patch
    gcc8-fix-array-warning-on-i586.patch
    gcc8-fix-format-warning-on-i586.patch
    gcc8-inlining-failed.patch
    xen.bug1079730.patch
* Tue Jan 15 2019 carnold@suse.com
  - bsc#1121960 - xen: sync with Factory
    xen.spec
    xen.changes
* Sat Jan 12 2019 Jan Engelhardt <jengelh@inai.de>
  - Replace old $RPM_* shell vars.
  - Run fdupes for all architectures, and not crossing
    subvolume boundaries.
* Thu Jan 10 2019 Guillaume GARDET <guillaume.gardet@opensuse.org>
  - Do not run %fdupes on aarch64 to avoid the hardlink-across-partition
    rpmlint error
* Tue Jan 08 2019 Guillaume GARDET <guillaume.gardet@opensuse.org>
  - Require qemu-seabios only on x86* as it is not available on non-x86
    systems
* Thu Dec 27 2018 Bernhard Wiedemann <bwiedemann@suse.com>
  - Avoid creating dangling symlinks (bsc#1116524)
    This reverts the revert of tmp_build.patch
* Tue Dec 04 2018 carnold@suse.com
  - Update to Xen 4.11.1 bug fix release (bsc#1027519)
    xen-4.11.1-testing-src.tar.bz2
  - 5b505d59-tools-xentop-replace-use-of-deprecated-vwprintw.patch
    replaces xen.2b50cdbc444c637575580dcfa6c9525a84d5cc62.patch
  - 5b76ec82-libxl-arm-Fix-build-on-arm64-acpi-w-gcc-8.2.patch
    replaces xen.b8f33431f3dd23fb43a879f4bdb4283fdc9465ad.patch
  - Drop the following patches contained in the new tarball
    5b34b8fe-VMX-defer-vmx_vmcs_exit-as-long-as-possible.patch
    5b3cab8e-1-VMX-MSR_DEBUGCTL-handling.patch
    5b3cab8e-2-VMX-improve-MSR-load-save-API.patch
    5b3cab8e-3-VMX-cleanup-MSR-load-save-infra.patch
    5b3cab8f-1-VMX-factor-out-locate_msr_entry.patch
    5b3cab8f-2-VMX-remote-access-to-MSR-lists.patch
    5b3cab8f-3-VMX-improve-LBR-MSR-handling.patch
    5b3cab8f-4-VMX-pass-MSR-value-into-vmx_msr_add.patch
    5b3cab8f-5-VMX-load-only-guest-MSR-entries.patch
    5b3f8fa5-port-array_index_nospec-from-Linux.patch
    5b4321f6-x86-correctly-set-nonlazy_xstate_used-when-loading-full-state.patch
    5b4488e7-x86-spec-ctrl-cmdline-handling.patch
    5b471517-page_alloc-correct-first_dirty-calc-in-block-merging.patch
    5b4c9a60-allow-cpu_down-to-be-called-earlier.patch
    5b4db308-SVM-fix-cleanup-svm_inject_event.patch
    5b5040c3-cpupools-fix-state-when-downing-a-CPU-failed.patch
    5b5040f2-x86-AMD-distinguish-CU-from-HT.patch
    5b505fe5-VMX-fix-find-msr-build.patch
    5b508775-1-x86-distinguish-CPU-offlining-and-removal.patch
    5b508775-2-x86-possibly-bring-up-all-CPUs.patch
    5b508775-3-x86-cmdline-opt-to-avoid-use-of-secondary-HTs.patch
    5b508ce8-VMX-dont-clobber-dr6-while-debug-state-is-lazy.patch
    5b50df16-1-x86-xstate-use-guest-CPUID-policy.patch
    5b50df16-2-x86-make-xstate-calculation-errors-more-obvious.patch
    5b56feb1-hvm-Disallow-unknown-MSR_EFER-bits.patch
    5b56feb2-spec-ctrl-Fix-the-parsing-of-xpti--on-fixed-Intel-hardware.patch
    5b62ca93-VMX-avoid-hitting-BUG_ON.patch
    5b6d84ac-x86-fix-improve-vlapic-read-write.patch
    5b6d8ce2-x86-XPTI-parsing.patch
    5b72fbbe-ARM-disable-grant-table-v2.patch
    5b72fbbe-oxenstored-eval-order.patch
    5b72fbbe-vtx-Fix-the-checking-for-unknown-invalid-MSR_DEBUGCTL-bits.patch
    5b72fbbf-1-spec-ctrl-Calculate-safe-PTE-addresses-for-L1TF-mitigations.patch
    5b72fbbf-2-spec-ctrl-Introduce-an-option-to-control-L1TF-mitigation-for-PV-guests.patch
    5b72fbbf-3-shadow-Infrastructure-to-force-a-PV-guest-into-shadow-mode.patch
    5b72fbbf-4-mm-Plumbing-to-allow-any-PTE-update-to-fail-with--ERESTART.patch
    5b72fbbf-5-pv-Force-a-guest-into-shadow-mode-when-it-writes-an-L1TF-vulnerable-PTE.patch
    5b72fbbf-6-spec-ctrl-CPUID-MSR-definitions-for-L1D_FLUSH.patch
    5b72fbbf-7-msr-Virtualise-MSR_FLUSH_CMD-for-guests.patch
    5b72fbbf-8-spec-ctrl-Introduce-an-option-to-control-L1D_FLUSH-for-HVM-HAP-guests.patch
    5b72fbbf-x86-Make-spec-ctrl-no-a-global-disable-of-all-mitigations.patch
    5b72fbbf-xl.conf-Add-global-affinity-masks.patch
    5b74190e-x86-hvm-ioreq-MMIO-range-check-honor-DF.patch
    5b752762-x86-hvm-emul-rep-IO-should-not-cross-GFN-boundaries.patch
    5b75afef-x86-setup-avoid-OoB-E820-lookup.patch
    5b76b780-rangeset-inquiry-functions-tolerate-NULL.patch
    5b83c654-VT-d-dmar-iommu-mem-leak-fix.patch
    5b8d5832-x86-assorted-array_index_nospec-insertions.patch
    5ba11ed4-credit2-fix-moving-CPUs-between-cpupools.patch
    5bacae4b-x86-boot-allocate-extra-module-slot.patch
    5bae44ce-x86-silence-false-log-messages.patch
    5bb60c12-x86-split-opt_xpti.patch
    5bb60c4f-x86-split-opt_pv_l1tf.patch
    5bb60c74-x86-fix-xpti-and-pv-l1tf.patch
    5bcf0722-x86-boot-enable-NMIs.patch
    5bd076e9-dombuilder-init-vcpu-debug-regs-correctly.patch
    5bd076e9-x86-boot-init-debug-regs-correctly.patch
    5bd076e9-x86-init-vcpu-debug-regs-correctly.patch
    5bd0e0cf-vvmx-Disallow-the-use-of-VT-x-instructions-when-nested-virt-is-disabled.patch
    5bd0e11b-x86-disallow-VT-x-insns-without-nested-virt.patch
    5bd85bfd-x86-fix-crash-on-xl-set-parameter-pcid.patch
    5be2a308-x86-extend-get_platform_badpages.patch
    5be2a354-x86-work-around-HLE-host-lockup-erratum.patch
    xsa275-1.patch
    xsa275-2.patch
    xsa276-1.patch
    xsa276-2.patch
    xsa277.patch
    xsa279.patch
    xsa280-1.patch
    xsa280-2.patch
* Wed Nov 21 2018 carnold@suse.com
  - bsc#1116524 - Package xen-tools-4.11.0_09-2.1.x86_64 broken:
    Missing /bin/domu-xenstore.  This was broken because "make
    package build reproducible" change. (boo#1047218, boo#1062303)
    This fix reverses the change to this patch.
    tmp_build.patch
* Mon Nov 12 2018 carnold@suse.com
  - bsc#1115040 - VUL-0: CVE-2018-19961 CVE-2018-19962: xen:
    insufficient TLB flushing / improper large page mappings with AMD
    IOMMUs (XSA-275)
    xsa275-1.patch
    xsa275-2.patch
  - bsc#1115043 - VUL-0: CVE-2018-19963: xen: resource accounting
    issues in x86 IOREQ server handling (XSA-276)
    xsa276-1.patch
    xsa276-2.patch
  - bsc#1115044 - VUL-0: CVE-2018-19964: xen: x86: incorrect error
    handling for guest p2m page removals (XSA-277)
    xsa277.patch
  - bsc#1114405 - VUL-0: CVE-2018-18883: xen: Nested VT-x usable even
    when disabled (XSA-278)
    5bd0e11b-x86-disallow-VT-x-insns-without-nested-virt.patch
  - bsc#1115045 - VUL-0: xen: CVE-2018-19965: x86: DoS from attempting
    to use INVPCID with a non-canonical addresses (XSA-279)
    xsa279.patch
  - bsc#1115047 - VUL-0: CVE-2018-19966: xen: Fix for XSA-240
    conflicts with shadow paging (XSA-280)
    xsa280-1.patch
    xsa280-2.patch
  - bsc#1114988 - VUL-0: CVE-2018-19967: xen: guest use of HLE
    constructs may lock up host (XSA-282)
    5be2a308-x86-extend-get_platform_badpages.patch
    5be2a354-x86-work-around-HLE-host-lockup-erratum.patch
  - bsc#1108940 - L3: XEN SLE12-SP1 domU hang on SLE12-SP3 HV
    5bdc31d5-VMX-fix-vmx_handle_eoi.patch
  - Upstream bug fixes (bsc#1027519)
    5b752762-x86-hvm-emul-rep-IO-should-not-cross-GFN-boundaries.patch
    5ba11ed4-credit2-fix-moving-CPUs-between-cpupools.patch
    5bacae4b-x86-boot-allocate-extra-module-slot.patch
    5bae44ce-x86-silence-false-log-messages.patch
    5bb60c12-x86-split-opt_xpti.patch
    5bb60c4f-x86-split-opt_pv_l1tf.patch
    5bb60c74-x86-fix-xpti-and-pv-l1tf.patch
    5bcf0722-x86-boot-enable-NMIs.patch
    5bd076e9-dombuilder-init-vcpu-debug-regs-correctly.patch
    5bd076e9-x86-boot-init-debug-regs-correctly.patch
    5bd076e9-x86-init-vcpu-debug-regs-correctly.patch
    5bd85bfd-x86-fix-crash-on-xl-set-parameter-pcid.patch
* Tue Nov 06 2018 carnold@suse.com
  - bsc#1114405 - VUL-0: CVE-2018-18883: xen: Nested VT-x usable even
    when disabled (XSA-278)
    5bd0e0cf-vvmx-Disallow-the-use-of-VT-x-instructions-when-nested-virt-is-disabled.patch
* Wed Oct 24 2018 ohering@suse.de
  - Use SMBIOS_REL_DATE instead of SMBIOS_DATE for reproducible binaries
* Wed Oct 24 2018 Bernhard Wiedemann <bwiedemann@suse.com>
  - make package build reproducible (boo#1047218, boo#1062303)
    * Set SMBIOS_REL_DATE
    * Update tmp_build.patch to use SHA instead of random build-id
    * Add reproducible.patch to use --no-insert-timestamp
* Sun Oct 14 2018 ohering@suse.de
  - Building with ncurses 6.1 will fail without
    xen.2b50cdbc444c637575580dcfa6c9525a84d5cc62.patch
  - Building libxl acpi support on aarch64 with gcc 8.2 will fail without
    xen.b8f33431f3dd23fb43a879f4bdb4283fdc9465ad.patch
* Tue Sep 11 2018 carnold@suse.com
  - bsc#1106263 - L3: The affinity reporting via 'xl vcpu-list' is
    apparently broken
    5b8fae26-tools-libxl-correct-vcpu-affinity-output-with-sparse-physical-cpu-map.patch
    5b8fae26-xen-fill-topology-info-for-all-present-cpus.patch
    5b8fb5af-tools-xl-refuse-to-set-number-of-vcpus-to-0-via-xl-vcpu-set.patch
* Tue Sep 11 2018 carnold@suse.com
  - bsc#1094508 - L3: Kernel oops in fs/dcache.c called by
    d_materialise_unique()
    5b9784ad-x86-HVM-drop-hvm_fetch_from_guest_linear.patch
    5b9784d2-x86-HVM-add-known_gla-helper.patch
    5b9784f2-x86-HVM-split-page-straddling-accesses.patch
  - bsc#1103279 - (CVE-2018-15470) VUL-0: CVE-2018-15470: xen:
    oxenstored does not apply quota-maxentity (XSA-272)
    5b72fbbe-oxenstored-eval-order.patch
  - bsc#1103275 - (CVE-2018-15469) VUL-0: CVE-2018-15469: xen: Use of
    v2 grant tables may cause crash on ARM (XSA-268)
    5b72fbbe-ARM-disable-grant-table-v2.patch
  - Upstream patches from Jan (bsc#1027519)
    5b6d84ac-x86-fix-improve-vlapic-read-write.patch
    5b74190e-x86-hvm-ioreq-MMIO-range-check-honor-DF.patch
    5b75afef-x86-setup-avoid-OoB-E820-lookup.patch
    5b76b780-rangeset-inquiry-functions-tolerate-NULL.patch
    5b83c654-VT-d-dmar-iommu-mem-leak-fix.patch
    5b8d5832-x86-assorted-array_index_nospec-insertions.patch
  - Drop 5b741962-x86-write-to-correct-variable-in-parse_pv_l1tf.patch
* Tue Aug 28 2018 carnold@suse.com
  - bsc#1078292 - rpmbuild -ba SPECS/xen.spec with xen-4.9.1 failed
    xen.spec
* Fri Aug 17 2018 carnold@suse.com
  - bsc#1091107 - VUL-0: CVE-2018-3646: xen: L1 Terminal Fault -VMM
    (XSA-273)
    5b72fbbf-1-spec-ctrl-Calculate-safe-PTE-addresses-for-L1TF-mitigations.patch
    5b72fbbf-2-spec-ctrl-Introduce-an-option-to-control-L1TF-mitigation-for-PV-guests.patch
    5b72fbbf-3-shadow-Infrastructure-to-force-a-PV-guest-into-shadow-mode.patch
    5b72fbbf-4-mm-Plumbing-to-allow-any-PTE-update-to-fail-with--ERESTART.patch
    5b72fbbf-5-pv-Force-a-guest-into-shadow-mode-when-it-writes-an-L1TF-vulnerable-PTE.patch
    5b72fbbf-6-spec-ctrl-CPUID-MSR-definitions-for-L1D_FLUSH.patch
    5b72fbbf-7-msr-Virtualise-MSR_FLUSH_CMD-for-guests.patch
    5b72fbbf-8-spec-ctrl-Introduce-an-option-to-control-L1D_FLUSH-for-HVM-HAP-guests.patch
  - bsc#1103276 - VUL-0: CVE-2018-15468: xen: x86: Incorrect
    MSR_DEBUGCTL handling lets guests enable BTS (XSA-269)
    5b72fbbe-vtx-Fix-the-checking-for-unknown-invalid-MSR_DEBUGCTL-bits.patch
  - Upstream prereq patches for XSA-273 and other upstream fixes
    (bsc#1027519)
    5b34b8fe-VMX-defer-vmx_vmcs_exit-as-long-as-possible.patch
    5b3cab8e-1-VMX-MSR_DEBUGCTL-handling.patch
    5b3cab8e-2-VMX-improve-MSR-load-save-API.patch
    5b3cab8e-3-VMX-cleanup-MSR-load-save-infra.patch
    5b3cab8f-1-VMX-factor-out-locate_msr_entry.patch
    5b3cab8f-2-VMX-remote-access-to-MSR-lists.patch
    5b3cab8f-3-VMX-improve-LBR-MSR-handling.patch
    5b3cab8f-4-VMX-pass-MSR-value-into-vmx_msr_add.patch
    5b3cab8f-5-VMX-load-only-guest-MSR-entries.patch
    5b4321f6-x86-correctly-set-nonlazy_xstate_used-when-loading-full-state.patch
    5b505fe5-VMX-fix-find-msr-build.patch
    5b56feb1-hvm-Disallow-unknown-MSR_EFER-bits.patch
    5b56feb2-spec-ctrl-Fix-the-parsing-of-xpti--on-fixed-Intel-hardware.patch
    5b62ca93-VMX-avoid-hitting-BUG_ON.patch
    5b6d8ce2-x86-XPTI-parsing.patch
    5b72fbbf-x86-Make-spec-ctrl-no-a-global-disable-of-all-mitigations.patch
    5b72fbbf-xl.conf-Add-global-affinity-masks.patch
    5b741962-x86-write-to-correct-variable-in-parse_pv_l1tf.patch
* Tue Jul 24 2018 carnold@suse.com
  - Upstream patches from Jan (bsc#1027519)
    5b3f8fa5-port-array_index_nospec-from-Linux.patch
    5b4488e7-x86-spec-ctrl-cmdline-handling.patch
    5b471517-page_alloc-correct-first_dirty-calc-in-block-merging.patch
    5b4c9a60-allow-cpu_down-to-be-called-earlier.patch
    5b4db308-SVM-fix-cleanup-svm_inject_event.patch
    5b5040c3-cpupools-fix-state-when-downing-a-CPU-failed.patch
    5b5040f2-x86-AMD-distinguish-CU-from-HT.patch
    5b508775-1-x86-distinguish-CPU-offlining-and-removal.patch
    5b508775-2-x86-possibly-bring-up-all-CPUs.patch
    5b508775-3-x86-cmdline-opt-to-avoid-use-of-secondary-HTs.patch
    5b508ce8-VMX-dont-clobber-dr6-while-debug-state-is-lazy.patch
    5b50df16-1-x86-xstate-use-guest-CPUID-policy.patch
    5b50df16-2-x86-make-xstate-calculation-errors-more-obvious.patch
    gcc8-fix-format-warning-on-i586.patch
    gcc8-fix-array-warning-on-i586.patch
  - Drop xen.fuzz-_FORTIFY_SOURCE.patch
    gcc8-fix-warning-on-i586.patch
* Mon Jul 09 2018 carnold@suse.com
  - Update to Xen 4.11.0 FCS (fate#325202, fate#325123)
    xen-4.11.0-testing-src.tar.bz2
    disable-building-pv-shim.patch
  - Dropped patches
    5a33a12f-domctl-improve-locking-during-domain-destruction.patch
    5a6703cb-x86-move-invocations-of-hvm_flush_guest_tlbs.patch
    5a79d7ed-libxc-packed-initrd-dont-fail-domain-creation.patch
    5a9985bd-x86-invpcid-support.patch
    5ac72a48-gcc8.patch
    5ac72a5f-gcc8.patch
    5ac72a64-gcc8.patch
    5ac72a69-gcc8.patch
    5ac72a6e-gcc8.patch
    5ac72a74-gcc8.patch
    5ac72a7b-gcc8.patch
    5ad4923e-x86-correct-S3-resume-ordering.patch
    5ad49293-x86-suppress-BTI-mitigations-around-S3.patch
    5ad600d4-x86-pv-introduce-x86emul_read_dr.patch
    5ad600d4-x86-pv-introduce-x86emul_write_dr.patch
    5ad8c3a7-x86-spec_ctrl-update-retpoline-decision-making.patch
    5adda097-x86-HPET-fix-race-triggering-ASSERT.patch
    5adda0d5-x86-HVM-never-retain-emulated-insn-cache.patch
    5adde9ed-xpti-fix-double-fault-handling.patch
    5ae06fad-SVM-fix-intercepts-for-SYS-CALL-ENTER-MSRs.patch
    5ae31917-x86-cpuidle-init-stats-lock-once.patch
    5aeaeae4-introduce-vcpu_sleep_nosync_locked.patch
    5aeaeaf0-sched-fix-races-in-vcpu-migration.patch
    5aeb2c57-x86-retval-checks-of-set-guest-trapbounce.patch
    5aec7393-1-x86-xpti-avoid-copy.patch
    5aec7393-2-x86-xpti-write-cr3.patch
    5aec744a-3-x86-xpti-per-domain-flag.patch
    5aec744a-4-x86-xpti-use-invpcid.patch
    5aec744a-5-x86-xpti-no-global-pages.patch
    5aec744a-6-x86-xpti-cr3-valid-flag.patch
    5aec744a-7-x86-xpti-pv_guest_cr4_to_real_cr4.patch
    5aec744b-8-x86-xpti-cr3-helpers.patch
    5aec74a8-9-x86-xpti-use-pcid.patch
    5af1daa9-1-x86-traps-fix-dr6-handing-in-DB-handler.patch
    5af1daa9-2-x86-pv-move-exception-injection-into-test_all_events.patch
    5af1daa9-3-x86-traps-use-IST-for-DB.patch
    5af1daa9-4-x86-traps-fix-handling-of-DB-in-hypervisor-context.patch
    5af1daa9-x86-HVM-guard-against-bogus-emulator-ioreq-state.patch
    5af1daa9-x86-vpt-support-IO-APIC-routed-intr.patch
    5af97999-viridian-cpuid-leaf-40000003.patch
    5afc13ae-1-x86-read-MSR_ARCH_CAPABILITIES-once.patch
    5afc13ae-2-x86-express-Xen-SPEC_CTRL-choice-as-variable.patch
    5afc13ae-3-x86-merge-bti_ist_info-use_shadow_spec_ctrl.patch
    5afc13ae-4-x86-fold-XEN_IBRS-ALTERNATIVES.patch
    5afc13ae-5-x86-rename-bits-of-spec_ctrl-infrastructure.patch
    5afc13ae-6-x86-elide-MSR_SPEC_CTRL-handling-in-idle.patch
    5afc13ae-7-x86-split-X86_FEATURE_SC_MSR.patch
    5afc13ae-8-x86-explicitly-set-Xen-default-SPEC_CTRL.patch
    5afc13ae-9-x86-cpuid-improve-guest-policies-for-speculative.patch
    5afc13ae-A-x86-introduce-spec-ctrl-cmdline-opt.patch
    5b02c786-x86-AMD-mitigations-for-GPZ-SP4.patch
    5b02c786-x86-Intel-mitigations-for-GPZ-SP4.patch
    5b02c786-x86-msr-virtualise-SPEC_CTRL-SSBD.patch
    5b0bc9da-x86-XPTI-fix-S3-resume.patch
    5b0d2286-libxc-x86-PV-dont-hand-through-CPUID-leaf-0x80000008.patch
    5b0d2d91-x86-suppress-sync-when-XPTI-off.patch
    5b0d2dbc-x86-correct-default_xen_spec_ctrl.patch
    5b0d2ddc-x86-CPUID-dont-override-tool-stack-hidden-STIBP.patch
    5b150ef9-x86-fix-error-handling-of-pv-dr7-shadow.patch
    5b21825d-1-x86-support-fully-eager-FPU-context-switching.patch
    5b21825d-2-x86-spec-ctrl-mitigations-for-LazyFPU.patch
    5b238b92-x86-HVM-account-for-fully-eager-FPU.patch
    5b2b7172-x86-EFI-fix-FPU-state-handling-around-runtime-calls.patch
    5b31e004-x86-HVM-emul-attempts-FPU-set-fpu_initialised.patch
    5b323e3c-x86-EFI-fix-FPU-state-handling-around-runtime-calls.patch
    5b34882d-x86-mm-dont-bypass-preemption-checks.patch
    5b348874-x86-refine-checks-in-DB-handler.patch
    5b348897-libxl-qemu_disk_scsi_drive_string-break-out-common.patch
    5b3488a2-libxl-restore-passing-ro-to-qemu-for-SCSI-disks.patch
    5b34891a-x86-HVM-dont-cause-NM-to-be-raised.patch
    5b348954-x86-guard-against-NM.patch
    libxl.Add-a-version-check-of-QEMU-for-QMP-commands.patch
    libxl.LIBXL_DESTROY_TIMEOUT.patch
    libxl.qmp-Tell-QEMU-about-live-migration-or-snapshot.patch
    xen_fix_build_with_acpica_20180427_and_new_packages.patch
* Wed Jul 04 2018 trenn@suse.de
  - Submit upstream patch libacpi: fixes for iasl >= 20180427
    git commit 858dbaaeda33b05c1ac80aea0ba9a03924e09005
    xen_fix_build_with_acpica_20180427_and_new_packages.patch
    This is needed for acpica package to get updated in our build service
* Fri Jun 29 2018 carnold@suse.com
  - Upstream patches from Jan (bsc#1027519)
    5b02c786-x86-AMD-mitigations-for-GPZ-SP4.patch (Replaces Spectre-v4-1.patch)
    5b02c786-x86-Intel-mitigations-for-GPZ-SP4.patch (Replaces Spectre-v4-2.patch)
    5b02c786-x86-msr-virtualise-SPEC_CTRL-SSBD.patch (Replaces Spectre-v4-3.patch)
    5b0bc9da-x86-XPTI-fix-S3-resume.patch
    5b0d2286-libxc-x86-PV-dont-hand-through-CPUID-leaf-0x80000008.patch
    5b0d2d91-x86-suppress-sync-when-XPTI-off.patch
    5b0d2dbc-x86-correct-default_xen_spec_ctrl.patch
    5b0d2ddc-x86-CPUID-dont-override-tool-stack-hidden-STIBP.patch
    5b150ef9-x86-fix-error-handling-of-pv-dr7-shadow.patch
    5b21825d-1-x86-support-fully-eager-FPU-context-switching.patch (Replaces xsa267-1.patch)
    5b21825d-2-x86-spec-ctrl-mitigations-for-LazyFPU.patch (Replaces xsa267-2.patch)
    5b238b92-x86-HVM-account-for-fully-eager-FPU.patch
    5b2b7172-x86-EFI-fix-FPU-state-handling-around-runtime-calls.patch
    5b31e004-x86-HVM-emul-attempts-FPU-set-fpu_initialised.patch
    5b323e3c-x86-EFI-fix-FPU-state-handling-around-runtime-calls.patch
    5b34882d-x86-mm-dont-bypass-preemption-checks.patch (Replaces xsa264.patch)
    5b348874-x86-refine-checks-in-DB-handler.patch (Replaces xsa265.patch)
    5b348897-libxl-qemu_disk_scsi_drive_string-break-out-common.patch (Replaces xsa266-1-<>.patch)
    5b3488a2-libxl-restore-passing-ro-to-qemu-for-SCSI-disks.patch (Replaces xsa266-2-<>.patch)
    5b34891a-x86-HVM-dont-cause-NM-to-be-raised.patch
    5b348954-x86-guard-against-NM.patch
* Mon Jun 25 2018 ohering@suse.de
  - Fix more build gcc8 related failures with xen.fuzz-_FORTIFY_SOURCE.patch
* Mon Jun 25 2018 ohering@suse.de
  - bsc#1098403 - fix regression introduced by changes for bsc#1079730
    a PV domU without qcow2 and/or vfb has no qemu attached.
    Ignore QMP errors for PV domUs to handle PV domUs with and without
    an attached qemu-xen.
    xen.bug1079730.patch
* Mon Jun 18 2018 carnold@suse.com
  - bsc#1097521 - VUL-0: CVE-2018-12891: xen: preemption checks
    bypassed in x86 PV MM handling (XSA-264)
    xsa264.patch
  - bsc#1097522 - VUL-0: CVE-2018-12893: xen: x86: #DB exception
    safety check can be triggered by a guest (XSA-265)
    xsa265.patch
  - bsc#1097523 - VUL-0: CVE-2018-12892: xen: libxl fails to honour
    readonly flag on HVM emulated SCSI disks (XSA-266)
    xsa266-1-libxl-qemu_disk_scsi_drive_string-Break-out-common-p.patch
    xsa266-2-libxl-restore-passing-readonly-to-qemu-for-SCSI-disk.patch
* Wed Jun 13 2018 carnold@suse.com
  - bsc#1095242 - VUL-0: CVE-2018-3665: xen: Lazy FP Save/Restore
    (XSA-267)
    xsa267-1.patch
    xsa267-2.patch
* Fri Jun 01 2018 carnold@suse.com
  - bsc#1092543 - GCC 8: xen build fails
    gcc8-fix-warning-on-i586.patch
* Fri May 18 2018 carnold@suse.com
  - bsc#1092631 - VUL-0: CVE-2018-3639: xen: V4 – Speculative Store
    Bypass aka "Memory Disambiguation" (XSA-263)
    5ad4923e-x86-correct-S3-resume-ordering.patch
    5ad49293-x86-suppress-BTI-mitigations-around-S3.patch
    5afc13ae-1-x86-read-MSR_ARCH_CAPABILITIES-once.patch
    5afc13ae-2-x86-express-Xen-SPEC_CTRL-choice-as-variable.patch
    5afc13ae-3-x86-merge-bti_ist_info-use_shadow_spec_ctrl.patch
    5afc13ae-4-x86-fold-XEN_IBRS-ALTERNATIVES.patch
    5afc13ae-5-x86-rename-bits-of-spec_ctrl-infrastructure.patch
    5afc13ae-6-x86-elide-MSR_SPEC_CTRL-handling-in-idle.patch
    5afc13ae-7-x86-split-X86_FEATURE_SC_MSR.patch
    5afc13ae-8-x86-explicitly-set-Xen-default-SPEC_CTRL.patch
    5afc13ae-9-x86-cpuid-improve-guest-policies-for-speculative.patch
    5afc13ae-A-x86-introduce-spec-ctrl-cmdline-opt.patch
    Spectre-v4-1.patch
    Spectre-v4-2.patch
    Spectre-v4-3.patch
* Thu May 17 2018 ohering@suse.de
  - Always call qemus xen-save-devices-state in suspend/resume to
    fix migration with qcow2 images (bsc#1079730)
    libxl.Add-a-version-check-of-QEMU-for-QMP-commands.patch
    libxl.qmp-Tell-QEMU-about-live-migration-or-snapshot.patch
    xen.bug1079730.patch
* Wed May 16 2018 carnold@suse.com
  - bsc#1087289 - L3: Xen BUG at sched_credit.c:1663
    5aeaeae4-introduce-vcpu_sleep_nosync_locked.patch
    5aeaeaf0-sched-fix-races-in-vcpu-migration.patch
  - Upstream patches from Jan (bsc#1027519)
    5ad600d4-x86-pv-introduce-x86emul_read_dr.patch
    5ad600d4-x86-pv-introduce-x86emul_write_dr.patch
    5ad8c3a7-x86-spec_ctrl-update-retpoline-decision-making.patch
    5adda097-x86-HPET-fix-race-triggering-ASSERT.patch
    5adda0d5-x86-HVM-never-retain-emulated-insn-cache.patch
    5ae06fad-SVM-fix-intercepts-for-SYS-CALL-ENTER-MSRs.patch
    5ae31917-x86-cpuidle-init-stats-lock-once.patch
    5aeb2c57-x86-retval-checks-of-set-guest-trapbounce.patch
    5af1daa9-1-x86-traps-fix-dr6-handing-in-DB-handler.patch (Replaces xsa260-1.patch)
    5af1daa9-2-x86-pv-move-exception-injection-into-test_all_events.patch (Replaces xsa260-2.patch)
    5af1daa9-3-x86-traps-use-IST-for-DB.patch (Replaces xsa260-3.patch)
    5af1daa9-4-x86-traps-fix-handling-of-DB-in-hypervisor-context.patch (Replaces xsa260-4.patch)
    5af1daa9-x86-HVM-guard-against-bogus-emulator-ioreq-state.patch (Replaces xsa262.patch)
    5af1daa9-x86-vpt-support-IO-APIC-routed-intr.patch (Replaces xsa261.patch)
    5af97999-viridian-cpuid-leaf-40000003.patch
* Fri May 11 2018 carnold@suse.com
  - Fixes related to Page Table Isolation (XPTI). bsc#1074562 XSA-254
    5a6703cb-x86-move-invocations-of-hvm_flush_guest_tlbs.patch
    5a9985bd-x86-invpcid-support.patch
    5adde9ed-xpti-fix-double-fault-handling.patch
    5aec7393-1-x86-xpti-avoid-copy.patch
    5aec7393-2-x86-xpti-write-cr3.patch
    5aec744a-3-x86-xpti-per-domain-flag.patch
    5aec744a-4-x86-xpti-use-invpcid.patch
    5aec744a-5-x86-xpti-no-global-pages.patch
    5aec744a-6-x86-xpti-cr3-valid-flag.patch
    5aec744a-7-x86-xpti-pv_guest_cr4_to_real_cr4.patch
    5aec744b-8-x86-xpti-cr3-helpers.patch
    5aec74a8-9-x86-xpti-use-pcid.patch
* Wed May 09 2018 carnold@suse.com
  - bsc#1092543 - GCC 8: xen build fails
    5ac72a48-gcc8.patch
    5ac72a5f-gcc8.patch
    5ac72a64-gcc8.patch
    5ac72a69-gcc8.patch
    5ac72a6e-gcc8.patch
    5ac72a74-gcc8.patch
    5ac72a7b-gcc8.patch
    gcc8-inlining-failed.patch
* Tue May 08 2018 carnold@suse.com
  - Update to Xen 4.10.1 bug fix release (bsc#1027519)
    xen-4.10.1-testing-src.tar.bz2
    disable-building-pv-shim.patch
  - Drop the following patches contained in the new tarball
    5a21a77e-x86-pv-construct-d0v0s-GDT-properly.patch
    5a2fda0d-x86-mb2-avoid-Xen-when-looking-for-module-crashkernel-pos.patch
    5a2ffc1f-x86-mm-drop-bogus-paging-mode-assertion.patch
    5a313972-x86-microcode-add-support-for-AMD-Fam17.patch
    5a32bd79-x86-vmx-dont-use-hvm_inject_hw_exception-in-.patch
    5a4caa5e-x86-IRQ-conditionally-preserve-access-perm.patch
    5a4caa8c-x86-E820-don-t-overrun-array.patch
    5a4e2bca-x86-free-msr_vcpu_policy-during-destruction.patch
    5a4e2c2c-x86-upcall-inject-spurious-event-after-setting-vector.patch
    5a4fd893-1-x86-break-out-alternative-asm-into-separate-header.patch
    5a4fd893-2-x86-introduce-ALTERNATIVE_2-macros.patch
    5a4fd893-3-x86-hvm-rename-update_guest_vendor-to-cpuid_policy_changed.patch
    5a4fd893-4-x86-introduce-cpuid_policy_updated.patch
    5a4fd893-5-x86-entry-remove-partial-cpu_user_regs.patch
    5a4fd894-1-x86-rearrange-RESTORE_ALL-to-restore-in-stack-order.patch
    5a4fd894-2-x86-hvm-use-SAVE_ALL-after-VMExit.patch
    5a4fd894-3-x86-erase-guest-GPRs-on-entry-to-Xen.patch
    5a4fd894-4-clarifications-to-wait-infrastructure.patch
    5a534c78-x86-dont-use-incorrect-CPUID-values-for-topology.patch
    5a5cb24c-x86-mm-always-set-_PAGE_ACCESSED-on-L4-updates.patch
    5a5e2cff-x86-Meltdown-band-aid.patch
    5a5e2d73-x86-Meltdown-band-aid-conditional.patch
    5a5e3a4e-1-x86-support-compiling-with-indirect-branch-thunks.patch
    5a5e3a4e-2-x86-support-indirect-thunks-from-asm.patch
    5a5e3a4e-3-x86-report-speculative-mitigation-details.patch
    5a5e3a4e-4-x86-AMD-set-lfence-as-Dispatch-Serialising.patch
    5a5e3a4e-5-x86-introduce-alternative-indirect-thunks.patch
    5a5e3a4e-6-x86-definitions-for-Indirect-Branch-Controls.patch
    5a5e3a4e-7-x86-cmdline-opt-to-disable-IBRS-IBPB-STIBP.patch
    5a5e459c-1-x86-SVM-offer-CPUID-faulting-to-AMD-HVM-guests.patch
    5a5e459c-2-x86-report-domain-id-on-CPUID.patch
    5a68bc16-x86-acpi-process-softirqs-logging-Cx.patch
    5a69c0b9-x86-fix-GET_STACK_END.patch
    5a6b36cd-1-x86-cpuid-handling-of-IBRS-IBPB-STIBP-and-IBRS-for-guests.patch
    5a6b36cd-2-x86-msr-emulation-of-SPEC_CTRL-PRED_CMD.patch
    5a6b36cd-3-x86-migrate-MSR_SPEC_CTRL.patch
    5a6b36cd-4-x86-hvm-permit-direct-access-to-SPEC_CTRL-PRED_CMD.patch
    5a6b36cd-5-x86-use-SPEC_CTRL-on-entry.patch
    5a6b36cd-6-x86-clobber-RSB-RAS-on-entry.patch
    5a6b36cd-7-x86-no-alternatives-in-NMI-MC-paths.patch
    5a6b36cd-8-x86-boot-calculate-best-BTI-mitigation.patch
    5a6b36cd-9-x86-issue-speculation-barrier.patch
    5a6b36cd-A-x86-offer-Indirect-Branch-Controls-to-guests.patch
    5a6b36cd-B-x86-clear-SPEC_CTRL-while-idle.patch
    5a7b1bdd-x86-reduce-Meltdown-band-aid-IPI-overhead.patch
    5a843807-x86-spec_ctrl-fix-bugs-in-SPEC_CTRL_ENTRY_FROM_INTR_IST.patch
    5a856a2b-x86-emul-fix-64bit-decoding-of-segment-overrides.patch
    5a856a2b-x86-use-32bit-xors-for-clearing-GPRs.patch
    5a856a2b-x86-xpti-hide-almost-all-of-Xen-image-mappings.patch
    5a8be788-x86-nmi-start-NMI-watchdog-on-CPU0-after-SMP.patch
    5a95373b-x86-PV-avoid-leaking-other-guests-MSR_TSC_AUX.patch
    5a95571f-memory-dont-implicitly-unpin-in-decrease-res.patch
    5a95576c-gnttab-ARM-dont-corrupt-shared-GFN-array.patch
    5a955800-gnttab-dont-free-status-pages-on-ver-change.patch
    5a955854-x86-disallow-HVM-creation-without-LAPIC-emul.patch
    5a956747-x86-HVM-dont-give-wrong-impression-of-WRMSR-success.patch
    5a9eb7f1-x86-xpti-dont-map-stack-guard-pages.patch
    5a9eb85c-x86-slightly-reduce-XPTI-overhead.patch
    5a9eb890-x86-remove-CR-reads-from-exit-to-guest-path.patch
    5aa2b6b9-cpufreq-ondemand-CPU-offlining-race.patch
    5aaa9878-x86-vlapic-clear-TMR-bit-for-edge-triggered-intr.patch
    xsa258.patch
    xsa259.patch
* Wed Apr 25 2018 carnold@suse.com
  - bsc#1090820 - VUL-0: CVE-2018-8897: xen: x86: mishandling of
    debug exceptions (XSA-260)
    xsa260-1.patch
    xsa260-2.patch
    xsa260-3.patch
    xsa260-4.patch
  - bsc#1090822 - VUL-0: CVE-2018-10982: xen: x86 vHPET interrupt
    injection errors (XSA-261)
    xsa261.patch
  - bsc#1090823 - VUL-0: CVE-2018-10981: xen: qemu may drive Xen into
    unbounded loop (XSA-262)
    xsa262.patch
* Mon Apr 16 2018 carnold@suse.com
  - bsc#1089152 - VUL-0: CVE-2018-10472: xen: Information leak via
    crafted user-supplied CDROM (XSA-258)
    xsa258.patch
  - bsc#1089635 - VUL-0: CVE-2018-10471: xen: x86: PV guest may crash
    Xen with XPTI (XSA-259)
    xsa259.patch
* Wed Mar 28 2018 ohering@suse.de
  - Preserve xen-syms from xen-dbg.gz to allow processing vmcores
    with crash(1) (bsc#1087251)
* Mon Mar 26 2018 carnold@suse.com
  - Upstream patches from Jan (bsc#1027519) and fixes related to
    Page Table Isolation (XPTI). See also bsc#1074562 XSA-254
    5a856a2b-x86-xpti-hide-almost-all-of-Xen-image-mappings.patch
    5a9eb7f1-x86-xpti-dont-map-stack-guard-pages.patch
    5a9eb85c-x86-slightly-reduce-XPTI-overhead.patch
    5a9eb890-x86-remove-CR-reads-from-exit-to-guest-path.patch
    5aa2b6b9-cpufreq-ondemand-CPU-offlining-race.patch
    5aaa9878-x86-vlapic-clear-TMR-bit-for-edge-triggered-intr.patch
* Thu Mar 01 2018 carnold@suse.com
  - bsc#1072834 - Xen HVM: unchecked MSR access error: RDMSR from
    0xc90 at rIP: 0xffffffff93061456 (native_read_msr+0x6/0x30)
    5a956747-x86-HVM-dont-give-wrong-impression-of-WRMSR-success.patch
  - Upstream patches from Jan (bsc#1027519)
    5a79d7ed-libxc-packed-initrd-dont-fail-domain-creation.patch
    5a7b1bdd-x86-reduce-Meltdown-band-aid-IPI-overhead.patch
    5a843807-x86-spec_ctrl-fix-bugs-in-SPEC_CTRL_ENTRY_FROM_INTR_IST.patch
    5a856a2b-x86-emul-fix-64bit-decoding-of-segment-overrides.patch
    5a856a2b-x86-use-32bit-xors-for-clearing-GPRs.patch
    5a8be788-x86-nmi-start-NMI-watchdog-on-CPU0-after-SMP.patch
    5a95373b-x86-PV-avoid-leaking-other-guests-MSR_TSC_AUX.patch
    5a95571f-memory-dont-implicitly-unpin-in-decrease-res.patch (Replaces xsa252.patch)
    5a95576c-gnttab-ARM-dont-corrupt-shared-GFN-array.patch (Replaces xsa255-1.patch)
    5a955800-gnttab-dont-free-status-pages-on-ver-change.patch (Replaces xsa255-2.patch)
    5a955854-x86-disallow-HVM-creation-without-LAPIC-emul.patch (Replaces xsa256.patch)
  - Drop
    xsa252.patch
    xsa255-1.patch
    xsa255-2.patch
    xsa256.patch
* Mon Feb 12 2018 carnold@suse.com
  - bsc#1080635 - VUL-0: CVE-2018-7540: xen: DoS via non-preemptable
    L3/L4 pagetable freeing (XSA-252)
    xsa252.patch
  - bsc#1080662 - VUL-0: CVE-2018-7541: xen: grant table v2 -> v1
    transition may crash Xen (XSA-255)
    xsa255-1.patch
    xsa255-2.patch
  - bsc#1080634 - VUL-0: CVE-2018-7542: xen: x86 PVH guest without
    LAPIC may DoS the host (XSA-256)
    xsa256.patch
* Fri Feb 09 2018 ohering@suse.de
  - Remove stale systemd presets code for 13.2 and older
* Fri Feb 09 2018 ohering@suse.de
  - fate#324965 - add script, udev rule and systemd service to watch
    for vcpu online/offline events in a HVM domU
    They are triggered via xl vcpu-set domU N
* Fri Feb 09 2018 ohering@suse.de
  - Replace hardcoded xen with Name tag when refering to subpkgs
* Fri Feb 09 2018 ohering@suse.de
  - Make sure tools and tools-domU require libs from the very same build
* Wed Feb 07 2018 jfehlig@suse.com
  - tools-domU: Add support for qemu guest agent. New files
    80-xen-channel-setup.rules and xen-channel-setup.sh configure a
    xen-pv-channel for use by the guest agent
    FATE#324963
* Wed Feb 07 2018 ohering@suse.de
  - Remove outdated /etc/xen/README*
* Mon Jan 29 2018 carnold@suse.com
  - bsc#1073961 - VUL-0: CVE-2018-5244: xen: x86: memory leak with
    MSR emulation (XSA-253)
    5a4e2bca-x86-free-msr_vcpu_policy-during-destruction.patch
  - bsc#1074562 - VUL-0: CVE-2017-5753,CVE-2017-5715,CVE-2017-5754
    xen: Information leak via side effects of speculative execution
    (XSA-254). Includes Spectre v2 mitigation.
    5a4caa5e-x86-IRQ-conditionally-preserve-access-perm.patch
    5a4caa8c-x86-E820-don-t-overrun-array.patch
    5a4e2c2c-x86-upcall-inject-spurious-event-after-setting-vector.patch
    5a4fd893-1-x86-break-out-alternative-asm-into-separate-header.patch
    5a4fd893-2-x86-introduce-ALTERNATIVE_2-macros.patch
    5a4fd893-3-x86-hvm-rename-update_guest_vendor-to-cpuid_policy_changed.patch
    5a4fd893-4-x86-introduce-cpuid_policy_updated.patch
    5a4fd893-5-x86-entry-remove-partial-cpu_user_regs.patch
    5a4fd894-1-x86-rearrange-RESTORE_ALL-to-restore-in-stack-order.patch
    5a4fd894-2-x86-hvm-use-SAVE_ALL-after-VMExit.patch
    5a4fd894-3-x86-erase-guest-GPRs-on-entry-to-Xen.patch
    5a4fd894-4-clarifications-to-wait-infrastructure.patch
    5a534c78-x86-dont-use-incorrect-CPUID-values-for-topology.patch
    5a5cb24c-x86-mm-always-set-_PAGE_ACCESSED-on-L4-updates.patch
    5a5e2cff-x86-Meltdown-band-aid.patch
    5a5e2d73-x86-Meltdown-band-aid-conditional.patch
    5a5e3a4e-1-x86-support-compiling-with-indirect-branch-thunks.patch
    5a5e3a4e-2-x86-support-indirect-thunks-from-asm.patch
    5a5e3a4e-3-x86-report-speculative-mitigation-details.patch
    5a5e3a4e-4-x86-AMD-set-lfence-as-Dispatch-Serialising.patch
    5a5e3a4e-5-x86-introduce-alternative-indirect-thunks.patch
    5a5e3a4e-6-x86-definitions-for-Indirect-Branch-Controls.patch
    5a5e3a4e-7-x86-cmdline-opt-to-disable-IBRS-IBPB-STIBP.patch
    5a5e459c-1-x86-SVM-offer-CPUID-faulting-to-AMD-HVM-guests.patch
    5a5e459c-2-x86-report-domain-id-on-CPUID.patch
    5a68bc16-x86-acpi-process-softirqs-logging-Cx.patch
    5a69c0b9-x86-fix-GET_STACK_END.patch
    5a6b36cd-1-x86-cpuid-handling-of-IBRS-IBPB-STIBP-and-IBRS-for-guests.patch
    5a6b36cd-2-x86-msr-emulation-of-SPEC_CTRL-PRED_CMD.patch
    5a6b36cd-3-x86-migrate-MSR_SPEC_CTRL.patch
    5a6b36cd-4-x86-hvm-permit-direct-access-to-SPEC_CTRL-PRED_CMD.patch
    5a6b36cd-5-x86-use-SPEC_CTRL-on-entry.patch
    5a6b36cd-6-x86-clobber-RSB-RAS-on-entry.patch
    5a6b36cd-7-x86-no-alternatives-in-NMI-MC-paths.patch
    5a6b36cd-8-x86-boot-calculate-best-BTI-mitigation.patch
    5a6b36cd-9-x86-issue-speculation-barrier.patch
    5a6b36cd-A-x86-offer-Indirect-Branch-Controls-to-guests.patch
    5a6b36cd-B-x86-clear-SPEC_CTRL-while-idle.patch
* Fri Jan 26 2018 carnold@suse.com
  - Fix python3 deprecated atoi call (bsc#1067224)
    pygrub-python3-conversion.patch
  - Drop xenmon-python3-conversion.patch
* Wed Jan 10 2018 ohering@suse.de
  - bsc#1067317 - pass cache=writeback|unsafe|directsync to qemu,
    depending on the libxl disk settings
    libxl.add-option-to-disable-disk-cache-flushes-in-qdisk.patch
* Mon Jan 08 2018 ohering@suse.de
  - Remove libxl.LIBXL_DESTROY_TIMEOUT.debug.patch
* Fri Jan 05 2018 carnold@suse.com
  - bsc#1067224 - xen-tools have hard dependency on Python 2
    build-python3-conversion.patch
    bin-python3-conversion.patch
* Wed Dec 20 2017 carnold@suse.com
  - bsc#1070165 - xen crashes after aborted localhost migration
    5a2ffc1f-x86-mm-drop-bogus-paging-mode-assertion.patch
  - bsc#1035442 - L3: libxl: error: libxl.c:1676:devices_destroy_cb:
    libxl__devices_destroy failed
    5a33a12f-domctl-improve-locking-during-domain-destruction.patch
  - Upstream patches from Jan (bsc#1027519)
    5a21a77e-x86-pv-construct-d0v0s-GDT-properly.patch
    5a2fda0d-x86-mb2-avoid-Xen-when-looking-for-module-crashkernel-pos.patch
    5a313972-x86-microcode-add-support-for-AMD-Fam17.patch
    5a32bd79-x86-vmx-dont-use-hvm_inject_hw_exception-in-.patch
* Wed Dec 13 2017 carnold@suse.com
  - Update to Xen 4.10.0 FCS (fate#321394, fate#322686)
    xen-4.10.0-testing-src.tar.bz2
* Mon Dec 11 2017 ohering@suse.de
  - Rebuild initrd if xen-tools-domU is updated
* Tue Dec 05 2017 carnold@suse.com
  - Update to Xen 4.10.0-rc8 (fate#321394, fate#322686)
    xen-4.10.0-testing-src.tar.bz2
* Tue Nov 28 2017 ohering@suse.de
  - Increase the value of LIBXL_DESTROY_TIMEOUT from 10 to 100 seconds
    If many domUs shutdown in parallel the backends can not keep up
    Add some debug output to track how long backend shutdown takes (bsc#1035442)
    libxl.LIBXL_DESTROY_TIMEOUT.patch
    libxl.LIBXL_DESTROY_TIMEOUT.debug.patch
* Tue Nov 28 2017 ohering@suse.de
  - Adjust xenstore-run-in-studomain.patch to change the defaults
    in the code instead of changing the sysconfig template, to also
    cover the upgrade case
* Fri Nov 24 2017 carnold@suse.com
  - Update to Xen 4.10.0-rc6 (fate#321394, fate#322686)
    xen-4.10.0-testing-src.tar.bz2
* Fri Nov 24 2017 ohering@suse.de
  - Since xen switched to Kconfig, building a debug hypervisor
    was done by default. Adjust make logic to build a non-debug
    hypervisor by default, and continue to provide one as xen-dbg.gz
* Fri Nov 24 2017 ohering@suse.de
  - fate#316614: set migration constraints from cmdline
    fix libxl.set-migration-constraints-from-cmdline.patch for xen-4.10
* Thu Nov 23 2017 ohering@suse.de
  - Document the suse-diskcache-disable-flush option in
    xl-disk-configuration(5) (bsc#879425,bsc#1067317)
* Thu Nov 23 2017 rbrown@suse.com
  - Replace references to /var/adm/fillup-templates with new
    %_fillupdir macro (boo#1069468)
* Thu Nov 16 2017 carnold@suse.com
  - Update to Xen 4.10.0-rc5 (fate#321394, fate#322686)
    xen-4.10.0-testing-src.tar.bz2
  - fate#323663 - Run Xenstore in stubdomain
    xenstore-run-in-studomain.patch
* Thu Nov 09 2017 carnold@suse.com
  - bsc#1067224 - xen-tools have hard dependency on Python 2
    pygrub-python3-conversion.patch
    xenmon-python3-conversion.patch
    migration-python3-conversion.patch
    xnloader.py
    xen2libvirt.py
* Wed Nov 08 2017 ohering@suse.de
  - Remove xendriverdomain.service (bsc#1065185)
    Driver domains must be configured manually with custom .service file
* Thu Nov 02 2017 carnold@suse.com
  - Update to Xen 4.10.0-rc3 (fate#321394, fate#322686)
    xen-4.10.0-testing-src.tar.bz2
  - Drop 59f31268-libxc-remove-stale-error-check-for-domain-size.patch
* Thu Nov 02 2017 ohering@suse.de
  - Adjust xen-dom0-modules.service to ignore errors (bsc#1065187)
* Fri Oct 27 2017 carnold@suse.com
  - fate#324052 Support migration of Xen HVM domains larger than 1TB
    59f31268-libxc-remove-stale-error-check-for-domain-size.patch
* Wed Oct 25 2017 carnold@suse.com
  - Update to Xen 4.10.0-rc2 (fate#321394, fate#322686)
    xen-4.10.0-testing-src.tar.bz2
* Mon Oct 16 2017 carnold@suse.com
  - Update to Xen 4.10.0-rc1 (fate#321394, fate#322686)
    xen-4.10.0-testing-src.tar.bz2
  - Drop patches included in new tarball
    592fd5f0-stop_machine-fill-result-only-in-case-of-error.patch
    596f257e-x86-fix-hvmemul_insn_fetch.patch
    5982fd99-VT-d-don-t-panic-warn-on-iommu-no-igfx.patch
    598c3630-VT-d-PI-disable-when-CPU-side-PI-is-off.patch
    598c3706-cpufreq-only-stop-ondemand-governor-if-started.patch
    5992f1e5-x86-grant-disallow-misaligned-PTEs.patch
    5992f20d-gnttab-split-maptrack-lock-to-make-it-useful-again.patch
    5992f233-gnttab-correct-pin-status-fixup-for-copy.patch
    59958e76-gnttab-dont-use-possibly-unbounded-tail-calls.patch
    59958ebf-gnttab-fix-transitive-grant-handling.patch
    59958edd-gnttab-avoid-spurious-maptrack-handle-alloc-failures.patch
    599da329-arm-mm-release-grant-lock-on-xatp1-error-paths.patch
    59a01223-x86-check-for-alloc-errors-in-modify_xen_mappings.patch
    59a0130c-x86-efi-dont-write-relocs-in-efi_arch_relocate_image-1st-pass.patch
    59a9221f-VT-d-use-correct-BDF-for-VF-to-search-VT-d-unit.patch
    59ae9177-x86-emul-fix-handling-of-unimplemented-Grp7-insns.patch
    59aec335-x86emul-correct-VEX-W-handling-for-VPINSRD.patch
    59aec375-x86emul-correct-VEX-L-handling-for-VCVTx2SI.patch
    59afcea0-x86-introduce-and-use-setup_force_cpu_cap.patch
    59b2a7f2-x86-HVM-correct-repeat-count-update-linear-phys.patch
    59b7d664-mm-make-sure-node-is-less-than-MAX_NUMNODES.patch
    59b7d69b-grant_table-fix-GNTTABOP_cache_flush-handling.patch
    59b7d6c8-xenstore-dont-unlink-connection-object-twice.patch
    59b7d6d9-gnttab-also-validate-PTE-perms-upon-destroy-replace.patch
    gcc7-arm.patch
    gcc7-mini-os.patch
* Tue Oct 03 2017 carnold@suse.com
  - bsc#1061084 - VUL-0: xen: page type reference leak on x86
    (XSA-242)
    xsa242.patch
  - bsc#1061086 - VUL-0: xen: x86: Incorrect handling of self-linear
    shadow mappings with translated guests (XSA-243)
    xsa243.patch
  - bsc#1061087 - VUL-0: xen: x86: Incorrect handling of IST settings
    during CPU hotplug (XSA-244)
    xsa244.patch
* Mon Oct 02 2017 carnold@suse.com
  - bsc#1061077 - VUL-0: xen: DMOP map/unmap missing argument checks
    (XSA-238)
    xsa238.patch
  - bsc#1061080 - VUL-0: xen: hypervisor stack leak in x86 I/O
    intercept code (XSA-239)
    xsa239.patch
  - bsc#1061081 - VUL-0: xen: Unlimited recursion in linear pagetable
    de-typing (XSA-240)
    xsa240-1.patch
    xsa240-2.patch
  - bsc#1061082 - VUL-0: xen: Stale TLB entry due to page type
    release race (XSA-241)
    xsa241.patch
* Fri Sep 29 2017 carnold@suse.com
  - bsc#1061075 - VUL-0: xen: pin count / page reference race in
    grant table code (XSA-236)
    xsa236.patch
  - bsc#1061076 - VUL-0: xen: multiple MSI mapping issues on x86
    (XSA-237)
    xsa237-1.patch
    xsa237-2.patch
    xsa237-3.patch
    xsa237-4.patch
    xsa237-5.patch
* Tue Sep 26 2017 carnold@suse.com
  - bsc#1056278 - VUL-0: xen: Missing NUMA node parameter
    verification (XSA-231)
    59b7d664-mm-make-sure-node-is-less-than-MAX_NUMNODES.patch
  - bsc#1056280 - VUL-0: xen: Missing check for grant table (XSA-232)
    59b7d69b-grant_table-fix-GNTTABOP_cache_flush-handling.patch
  - bsc#1056281 - VUL-0: xen: cxenstored: Race in domain cleanup
    (XSA-233)
    59b7d6c8-xenstore-dont-unlink-connection-object-twice.patch
  - bsc#1056282 - VUL-0: xen: insufficient grant unmapping checks for
    x86 PV guests (XSA-234)
    59b7d6d9-gnttab-also-validate-PTE-perms-upon-destroy-replace.patch
  - bsc#1055321 - VUL-0: xen: add-to-physmap error paths fail to
    release lock on ARM (XSA-235)
    599da329-arm-mm-release-grant-lock-on-xatp1-error-paths.patch
  - Upstream patches from Jan (bsc#1027519)
    59a01223-x86-check-for-alloc-errors-in-modify_xen_mappings.patch
    59a0130c-x86-efi-dont-write-relocs-in-efi_arch_relocate_image-1st-pass.patch
    59a9221f-VT-d-use-correct-BDF-for-VF-to-search-VT-d-unit.patch
    59ae9177-x86-emul-fix-handling-of-unimplemented-Grp7-insns.patch
    59aec335-x86emul-correct-VEX-W-handling-for-VPINSRD.patch
    59aec375-x86emul-correct-VEX-L-handling-for-VCVTx2SI.patch
    59afcea0-x86-introduce-and-use-setup_force_cpu_cap.patch
    59b2a7f2-x86-HVM-correct-repeat-count-update-linear-phys.patch
  - Dropped gcc7-xen.patch
* Thu Sep 07 2017 carnold@suse.com
  - bsc#1057358 - Cannot Boot into SLES12.3 with Xen hypervisor when
    Secure Boot is Enabled
    xen.spec
* Tue Sep 05 2017 ohering@suse.de
  - bsc#1055695 - XEN: 11SP4 and 12SP3 HVM guests can not be restored
    update from v6 to v9 to cover more cases for ballooned domUs
    libxc.sr.superpage.patch
* Mon Aug 28 2017 ohering@suse.de
  - bsc#1026236 - remove suse_vtsc_tolerance= cmdline option for Xen
    drop the patch because it is not upstream acceptable
    remove xen.suse_vtsc_tolerance.patch
* Sat Aug 26 2017 ohering@suse.de
  - bsc#1055695 - XEN: 11SP4 and 12SP3 HVM guests can not be restored
    after the save using xl stack
    libxc.sr.superpage.patch
* Tue Aug 22 2017 ohering@suse.de
  - Unignore gcc-PIE
    the toolstack disables PIE for firmware builds as needed
* Mon Aug 21 2017 carnold@suse.com
  - Upstream patches from Jan (bsc#1027519)
    592fd5f0-stop_machine-fill-result-only-in-case-of-error.patch
    596f257e-x86-fix-hvmemul_insn_fetch.patch
    5982fd99-VT-d-don-t-panic-warn-on-iommu-no-igfx.patch
    598c3630-VT-d-PI-disable-when-CPU-side-PI-is-off.patch
    598c3706-cpufreq-only-stop-ondemand-governor-if-started.patch
    5992f1e5-x86-grant-disallow-misaligned-PTEs.patch (Replaces xsa227.patch)
    5992f20d-gnttab-split-maptrack-lock-to-make-it-useful-again.patch (Replaces xsa228.patch)
    5992f233-gnttab-correct-pin-status-fixup-for-copy.patch (Replaces xsa230.patch)
    59958e76-gnttab-dont-use-possibly-unbounded-tail-calls.patch (Replaces xsa226-1.patch)
    59958ebf-gnttab-fix-transitive-grant-handling.patch (Replaces xsa226-2.patch)
    59958edd-gnttab-avoid-spurious-maptrack-handle-alloc-failures.patch
* Wed Aug 16 2017 carnold@suse.com
  - bsc#1044974 - xen-tools require python-pam
    xen.spec
* Fri Aug 11 2017 carnold@suse.com
  - Clean up spec file errors and a few warnings. (bsc#1027519)
  - Removed conditional 'with_systemd' and some old deprecated
    'sles_version' checks.
    xen.spec
* Thu Aug 10 2017 jfehlig@suse.com
  - Remove use of brctl utiltiy from supportconfig plugin
    FATE#323639
* Thu Aug 10 2017 ohering@suse.de
  - Use upstream variant of mini-os __udivmoddi4 change
    gcc7-mini-os.patch
* Wed Aug 09 2017 carnold@suse.com
  - fate#323639 Move bridge-utils to legacy
    replace-obsolete-network-configuration-commands-in-s.patch
* Tue Aug 08 2017 carnold@suse.com
  - bsc#1052686 - VUL-0: xen: grant_table: possibly premature
    clearing of GTF_writing / GTF_reading (XSA-230)
    xsa230.patch
* Mon Aug 07 2017 ohering@suse.de
  - bsc#1035231 - migration of HVM domU does not use superpages
    on destination dom0
    libxc.sr.superpage.patch
* Thu Aug 03 2017 carnold@suse.com
  - bsc#1051787 - VUL-0: CVE-2017-12135: xen: possibly unbounded
    recursion in grant table code (XSA-226)
    xsa226-1.patch
    xsa226-2.patch
  - bsc#1051788 - VUL-0: CVE-2017-12137: xen: x86: PV privilege
    escalation via map_grant_ref (XSA-227)
    xsa227.patch
  - bsc#1051789 - VUL-0: CVE-2017-12136: xen: grant_table: Race
    conditions with maptrack free list handling (XSA-228)
    xsa228.patch
* Tue Aug 01 2017 jfehlig@suse.com
  - Add a supportconfig plugin
    xen-supportconfig
    FATE#323661
* Tue Jul 25 2017 ohering@suse.de
  - bsc#1026236 - add suse_vtsc_tolerance= cmdline option for Xen
    To avoid emulation of TSC access from a domU after live migration
    add a global tolerance for the measured host kHz
    xen.suse_vtsc_tolerance.patch
* Thu Jul 20 2017 carnold@suse.com
  - fate#323662 Drop qemu-dm from xen-tools package
    The following tarball and patches have been removed
    qemu-xen-traditional-dir-remote.tar.bz2
    VNC-Support-for-ExtendedKeyEvent-client-message.patch
    0001-net-move-the-tap-buffer-into-TAPState.patch
    0002-net-increase-tap-buffer-size.patch
    0003-e1000-fix-access-4-bytes-beyond-buffer-end.patch
    0004-e1000-secrc-support.patch
    0005-e1000-multi-buffer-packet-support.patch
    0006-e1000-clear-EOP-for-multi-buffer-descriptors.patch
    0007-e1000-verify-we-have-buffers-upfront.patch
    0008-e1000-check-buffer-availability.patch
    CVE-2013-4533-qemut-pxa2xx-buffer-overrun-on-incoming-migration.patch
    CVE-2013-4534-qemut-openpic-buffer-overrun-on-incoming-migration.patch
    CVE-2013-4537-qemut-ssi-sd-fix-buffer-overrun-on-invalid-state-load.patch
    CVE-2013-4538-qemut-ssd0323-fix-buffer-overun-on-invalid-state.patch
    CVE-2013-4539-qemut-tsc210x-fix-buffer-overrun-on-invalid-state-load.patch
    CVE-2014-0222-qemut-qcow1-validate-l2-table-size.patch
    CVE-2014-3640-qemut-slirp-NULL-pointer-deref-in-sosendto.patch
    CVE-2015-4037-qemut-smb-config-dir-name.patch
    CVE-2015-5154-qemut-fix-START-STOP-UNIT-command-completion.patch
    CVE-2015-5278-qemut-Infinite-loop-in-ne2000_receive-function.patch
    CVE-2015-6815-qemut-e1000-fix-infinite-loop.patch
    CVE-2015-7512-qemut-net-pcnet-buffer-overflow-in-non-loopback-mode.patch
    CVE-2015-8345-qemut-eepro100-infinite-loop-fix.patch
    CVE-2015-8504-qemut-vnc-avoid-floating-point-exception.patch
    CVE-2016-1714-qemut-fw_cfg-add-check-to-validate-current-entry-value.patch
    CVE-2016-1981-qemut-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch
    CVE-2016-2391-qemut-usb-null-pointer-dereference-in-ohci-module.patch
    CVE-2016-2841-qemut-ne2000-infinite-loop-in-ne2000_receive.patch
    CVE-2016-4439-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-esp_reg_write.patch
    CVE-2016-4441-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-get_cmd.patch
    CVE-2016-5238-qemut-scsi-esp-OOB-write-when-using-non-DMA-mode-in-get_cmd.patch
    CVE-2016-5338-qemut-scsi-esp-OOB-rw-access-while-processing-ESP_FIFO.patch
    CVE-2016-6351-qemut-scsi-esp-make-cmdbuf-big-enough-for-maximum-CDB-size.patch
    CVE-2016-7908-qemut-net-Infinite-loop-in-mcf_fec_do_tx.patch
    CVE-2016-7909-qemut-net-pcnet-infinite-loop-in-pcnet_rdra_addr.patch
    CVE-2016-8667-qemut-dma-rc4030-divide-by-zero-error-in-set_next_tick.patch
    CVE-2016-8669-qemut-char-divide-by-zero-error-in-serial_update_parameters.patch
    CVE-2016-8910-qemut-net-rtl8139-infinite-loop-while-transmit-in-Cplus-mode.patch
    CVE-2016-9921-qemut-display-cirrus_vga-divide-by-zero-in-cirrus_do_copy.patch
    CVE-2017-6505-qemut-usb-an-infinite-loop-issue-in-ohci_service_ed_list.patch
    CVE-2017-8309-qemut-audio-host-memory-leakage-via-capture-buffer.patch
    CVE-2017-9330-qemut-usb-ohci-infinite-loop-due-to-incorrect-return-value.patch
    blktap.patch
    cdrom-removable.patch
    xen-qemu-iscsi-fix.patch
    qemu-security-etch1.patch
    xen-disable-qemu-monitor.patch
    xen-hvm-default-bridge.patch
    qemu-ifup-set-mtu.patch
    ioemu-vnc-resize.patch
    capslock_enable.patch
    altgr_2.patch
    log-guest-console.patch
    bdrv_open2_fix_flags.patch
    bdrv_open2_flags_2.patch
    ioemu-7615-qcow2-fix-alloc_cluster_link_l2.patch
    qemu-dm-segfault.patch
    bdrv_default_rwflag.patch
    kernel-boot-hvm.patch
    ioemu-watchdog-support.patch
    ioemu-watchdog-linkage.patch
    ioemu-watchdog-ib700-timer.patch
    ioemu-hvm-pv-support.patch
    pvdrv_emulation_control.patch
    ioemu-disable-scsi.patch
    ioemu-disable-emulated-ide-if-pv.patch
    xenpaging.qemu.flush-cache.patch
    ioemu-devicemodel-include.patch
  - Cleanup spec file and remove unused KMP patches
    kmp_filelist
    supported_module.patch
    xen_pvonhvm.xen_emul_unplug.patch
* Mon Jul 17 2017 carnold@suse.com
  - bsc#1002573 - Optimize LVM functions in block-dmmd
    block-dmmd
* Fri Jul 14 2017 ohering@suse.de
  - Record initial Xen dmesg in /var/log/xen/xen-boot.log for
    supportconfig. Keep previous log in /var/log/xen/xen-boot.prev.log
* Fri Jul 14 2017 ohering@suse.de
  - Remove storytelling from description in xen.rpm
* Wed Jun 28 2017 carnold@suse.com
  - Update to Xen 4.9.0 FCS (fate#321394, fate#323108)
    xen-4.9.0-testing-src.tar.bz2
* Wed Jun 21 2017 carnold@suse.com
  - Update block-dmmd script (bsc#1002573)
    block-dmmd
* Tue Jun 20 2017 carnold@suse.com
  - Update to Xen 4.9.0-rc8+ (fate#321394, fate#323108)
    xen-4.9.0-testing-src.tar.bz2
    gcc7-arm.patch
  - Drop gcc7-error-xenpmd.patch
* Mon Jun 05 2017 carnold@suse.com
  - Update to Xen 4.9.0-rc8 (fate#321394, fate#323108)
    xen-4.9.0-testing-src.tar.bz2
* Thu Jun 01 2017 carnold@suse.com
  - bsc#1042160 - VUL-1: CVE-2017-9330: xen: usb: ohci: infinite loop
    due to incorrect return value
    CVE-2017-9330-qemut-usb-ohci-infinite-loop-due-to-incorrect-return-value.patch
* Tue May 30 2017 carnold@suse.com
  - bsc#1037243 - VUL-1: CVE-2017-8309: xen: audio: host memory
    leakage via capture buffer
    CVE-2017-8309-qemut-audio-host-memory-leakage-via-capture-buffer.patch
* Fri May 26 2017 carnold@suse.com
  - Update to Xen 4.9.0-rc7 (fate#321394, fate#323108)
    xen-4.9.0-testing-src.tar.bz2
* Mon May 22 2017 carnold@suse.com
  - Update to Xen 4.9.0-rc6 (fate#321394, fate#323108)
    xen-4.9.0-testing-src.tar.bz2
* Thu May 18 2017 carnold@suse.com
  - bsc#1031343 - xen fails to build with GCC 7
    gcc7-mini-os.patch
    gcc7-xen.patch
* Wed May 17 2017 carnold@suse.com
  - bsc#1031343 - xen fails to build with GCC 7
    gcc7-error-xenpmd.patch
* Tue May 16 2017 carnold@suse.com
  - Update to Xen 4.9.0-rc5 (fate#321394, fate#323108)
    xen-4.9.0-testing-src.tar.bz2
  - Drop xen-tools-pkgconfig-xenlight.patch
* Wed May 10 2017 carnold@suse.com
  - bsc#1037779 - xen breaks kexec-tools build
    xen-tools-pkgconfig-xenlight.patch
* Tue May 09 2017 carnold@suse.com
  - Update to Xen 4.9.0-rc4 (fate#321394, fate#323108)
    xen-4.9.0-testing-src.tar.bz2
* Tue May 02 2017 carnold@suse.com
  - bsc#1036146 - sles12sp2 xen VM dumps core to wrong path
    xen.spec
* Fri Apr 28 2017 carnold@suse.com
  - Update to Xen 4.9.0-rc3 (fate#321394, fate#323108)
    xen-4.9.0-testing-src.tar.bz2
    aarch64-maybe-uninitialized.patch
* Fri Apr 21 2017 carnold@suse.com
  - Update to Xen 4.9.0-rc2 (fate#321394, fate#323108)
    xen-4.9.0-testing-src.tar.bz2
* Wed Apr 19 2017 carnold@suse.com
  - Update to Xen 4.9.0-rc1 (fate#321394, fate#323108)
    xen-4.9.0-testing-src.tar.bz2
    ioemu-devicemodel-include.patch
  - Dropped patches contained in new tarball
    xen-4.8.0-testing-src.tar.bz2
    0001-xenstore-let-write_node-and-some-callers-return-errn.patch
    0002-xenstore-undo-function-rename.patch
    0003-xenstore-rework-of-transaction-handling.patch
    584806ce-x86emul-correct-PUSHF-POPF.patch
    584fc649-fix-determining-when-domain-creation-is-complete.patch
    58510c06-x86emul-CMPXCHGnB-ignore-prefixes.patch
    58510cac-x86emul-MOVNTI-no-REP-prefixes.patch
    58526ccc-x86emul-64bit-ignore-most-segment-bases-in-align-check.patch
    5853ed37-VT-d-correct-dma_msi_set_affinity.patch
    5853ee07-x86emul-CMPXCHG16B-aligned-operand.patch
    58580060-x86-emul-correct-SYSCALL-eflags-handling.patch
    585aa3c5-x86-force-EFLAGS-IF-on-upon-exit-to-PV.patch
    585aa407-x86-HVM-NULL-check-before-using-VMFUNC-hook.patch
    585bd5fe-x86-emul-correct-VMFUNC-return-value-handling.patch
    586ba81c-x86-cpu-dont-update-this_cpu-for-guest-get_cpu_vendor.patch
    587d04d6-x86-xstate-fix-array-overrun-with-LWP.patch
    587de4a9-x86emul-VEX-B-ignored-in-compat-mode.patch
    5882129d-x86emul-LOCK-check-adjustments.patch
    58821300-x86-segment-attribute-handling.patch
    58873c1f-x86emul-correct-FPU-stub-asm-constraints.patch
    58873c80-x86-hvm-do-not-set-msr_tsc_adjust-on-.patch
    5887888f-credit2-fix-shutdown-suspend-with-cpupools.patch
    5887888f-credit2-never-consider-CPUs-outside-of-pool.patch
    5887888f-credit2-use-the-correct-scratch-cpumask.patch
    5888b1b3-x86-emulate-dont-assume-addr_size-32-implies-protmode.patch
    5899cbd9-EPT-allow-wrcomb-MMIO-mappings-again.patch
    589b3272-libxl-dont-segfault-when-creating-domain-with-invalid-pvusb-device.patch
    58a44771-IOMMU-always-call-teardown-callback.patch
    58a48ccc-x86-fix-p2m_flush_table-for-non-nested.patch
    58a59f4b-libxl-correct-xenstore-entry-for-empty-cdrom.patch
    58a70d94-VMX-fix-VMCS-race-on-cswitch-paths.patch
    58ac1f3f-VMX-dont-leak-host-syscall-MSRs.patch
    58b5a2de-x86-correct-Xens-idea-of-its-memory-layout.patch
    58b6fd42-credit2-always-mark-a-tickled-pCPU-as-tickled.patch
    58b6fd42-credit2-dont-miss-accounting-during-credit-reset.patch
    58cbf682-x86-EFI-avoid-overrunning-mb_modules.patch
    58cf9200-x86-EFI-avoid-IOMMU-faults-on-tail-gap.patch
    58cf9260-x86-EFI-avoid-Xen-when-looking-for-mod-kexec-pos.patch
    58cf9277-x86-time-dont-use-vTSC-if-host-guest-freqs-match.patch
    58d25ea2-xenstore-add-missing-checks-for-allocation-failure.patch
    58d91365-sched-dont-call-wrong-hook-via-VCPU2OP.patch
    CVE-2017-2615-qemut-display-cirrus-oob-access-while-doing-bitblt-copy-backward-mode.patch
    CVE-2017-2620-xsa209-qemut-cirrus_bitblt_cputovideo-does-not-check-if-memory-region-safe.patch
    glibc-2.25-compatibility-fix.patch
    xs-09-add_change_node-params.patch
    xs-10-call-add_change_node.patch
    xs-11-tdb-record-header.patch
    xs-12-node-gen-count.patch
    xs-13-read-directory-part-support.patch
    xs-14-command-array.patch
    xs-15-command-return-val.patch
    xs-16-function-static.patch
    xs-17-arg-parsing.patch
    xs-18-default-buffer.patch
    xs-19-handle-alloc-failures.patch
    xs-20-tdb-version.patch
    xs-21-empty-tdb-database.patch
    xs-22-reopen_log-fix.patch
    xs-23-XS_DEBUG-rename.patch
    xs-24-xenstored_control.patch
    xs-25-control-enhance.patch
    xs-26-log-control.patch
    xs-27-memory-report.patch
    xs-28-remove-talloc-report.patch
    xs-29-define-off_t.patch
    xsa206-0001-xenstored-apply-a-write-transaction-rate-limit.patch
    xsa206-0002-xenstored-Log-when-the-write-transaction-rate-limit.patch
* Wed Apr 05 2017 carnold@suse.com
  - bsc#1022703 - Xen HVM guest with OVMF hangs with unattached CDRom
    58a59f4b-libxl-correct-xenstore-entry-for-empty-cdrom.patch
* Wed Mar 29 2017 jfehlig@suse.com
  - bsc#1015348 - L3: libvirtd does not start during boot
    suse-xendomains-service.patch
* Wed Mar 22 2017 carnold@suse.com
  - bsc#1014136 - Partner-L3: kdump can't dump a kernel on SLES12-SP2
    with Xen hypervisor.
    58cf9260-x86-EFI-avoid-Xen-when-looking-for-mod-kexec-pos.patch
  - bsc#1026236 - L3: Paravirtualized vs. fully virtualized migration
    - latter one much faster
    58cf9277-x86-time-dont-use-vTSC-if-host-guest-freqs-match.patch
  - Upstream patch from Jan
    58cbf682-x86-EFI-avoid-overrunning-mb_modules.patch
    58cf9200-x86-EFI-avoid-IOMMU-faults-on-tail-gap.patch
    58d91365-sched-dont-call-wrong-hook-via-VCPU2OP.patch
* Mon Mar 20 2017 carnold@suse.com
  - bsc#1022555 - L3: Timeout in "execution of /etc/xen/scripts/block
    add"
    58d25ea2-xenstore-add-missing-checks-for-allocation-failure.patch
    0001-xenstore-let-write_node-and-some-callers-return-errn.patch
    0002-xenstore-undo-function-rename.patch
    0003-xenstore-rework-of-transaction-handling.patch
  - bsc#1030144 - VUL-0: xen: xenstore denial of service via repeated
    update (XSA-206)
    xsa206-0001-xenstored-apply-a-write-transaction-rate-limit.patch
    xsa206-0002-xenstored-Log-when-the-write-transaction-rate-limit.patch
  - bsc#1029827 - Forward port xenstored
    xs-09-add_change_node-params.patch
    xs-10-call-add_change_node.patch
    xs-11-tdb-record-header.patch
    xs-12-node-gen-count.patch
    xs-13-read-directory-part-support.patch
    xs-14-command-array.patch
    xs-15-command-return-val.patch
    xs-16-function-static.patch
    xs-17-arg-parsing.patch
    xs-18-default-buffer.patch
    xs-19-handle-alloc-failures.patch
    xs-20-tdb-version.patch
    xs-21-empty-tdb-database.patch
    xs-22-reopen_log-fix.patch
    xs-23-XS_DEBUG-rename.patch
    xs-24-xenstored_control.patch
    xs-25-control-enhance.patch
    xs-26-log-control.patch
    xs-27-memory-report.patch
    xs-28-remove-talloc-report.patch
    xs-29-define-off_t.patch
* Mon Mar 13 2017 ohering@suse.de
  - bsc#1029128 - fix make xen to really produce xen.efi with gcc48
* Wed Mar 08 2017 carnold@suse.com
  - bsc#1028235 - VUL-0: CVE-2017-6505: xen: qemu: usb: an infinite
    loop issue in ohci_service_ed_list
    CVE-2017-6505-qemut-usb-an-infinite-loop-issue-in-ohci_service_ed_list.patch
  - Upstream patches from Jan (bsc#1027519)
    5887888f-credit2-fix-shutdown-suspend-with-cpupools.patch
    5887888f-credit2-use-the-correct-scratch-cpumask.patch
    5899cbd9-EPT-allow-wrcomb-MMIO-mappings-again.patch
    589b3272-libxl-dont-segfault-when-creating-domain-with-invalid-pvusb-device.patch
    58a44771-IOMMU-always-call-teardown-callback.patch
    58a48ccc-x86-fix-p2m_flush_table-for-non-nested.patch
    58a70d94-VMX-fix-VMCS-race-on-cswitch-paths.patch
    58ac1f3f-VMX-dont-leak-host-syscall-MSRs.patch
    58b5a2de-x86-correct-Xens-idea-of-its-memory-layout.patch
    58b6fd42-credit2-always-mark-a-tickled-pCPU-as-tickled.patch
    58b6fd42-credit2-dont-miss-accounting-during-credit-reset.patch
* Thu Mar 02 2017 carnold@suse.com
  - bsc#1027654 - XEN fails to build against glibc 2.25
    glibc-2.25-compatibility-fix.patch
    libxl.pvscsi.patch
* Thu Feb 16 2017 ohering@suse.de
  - fate#316613: Refresh and enable libxl.pvscsi.patch
* Fri Feb 10 2017 carnold@suse.com
  - bsc#1024834 - VUL-0: CVE-2017-2620: xen: cirrus_bitblt_cputovideo
    does not check if memory region is safe (XSA-209)
    CVE-2017-2620-xsa209-qemut-cirrus_bitblt_cputovideo-does-not-check-if-memory-region-safe.patch
* Wed Feb 08 2017 carnold@suse.com
  - bsc#1023948 - [pvusb][sles12sp3][openqa] Segmentation fault
    happened when adding usbctrl devices via xl
    589b3272-libxl-dont-segfault-when-creating-domain-with-invalid-pvusb-device.patch
* Thu Feb 02 2017 carnold@suse.com
  - Upstream patches from Jan (bsc#1027519)
    587d04d6-x86-xstate-fix-array-overrun-with-LWP.patch
    587de4a9-x86emul-VEX-B-ignored-in-compat-mode.patch
    5882129d-x86emul-LOCK-check-adjustments.patch
    58821300-x86-segment-attribute-handling.patch
    58873c1f-x86emul-correct-FPU-stub-asm-constraints.patch
    58873c80-x86-hvm-do-not-set-msr_tsc_adjust-on-.patch
    5887888f-credit2-use-the-correct-scratch-cpumask.patch
    5887888f-credit2-never-consider-CPUs-outside-of-pool.patch
    5887888f-credit2-fix-shutdown-suspend-with-cpupools.patch
    5888b1b3-x86-emulate-dont-assume-addr_size-32-implies-protmode.patch
* Wed Feb 01 2017 carnold@suse.com
  - bsc#1023004 - VUL-0: CVE-2017-2615: qemu: display: cirrus: oob
    access while doing bitblt copy backward mode
    CVE-2017-2615-qemut-display-cirrus-oob-access-while-doing-bitblt-copy-backward-mode.patch
* Thu Jan 26 2017 carnold@suse.com
  - fate#322313 and fate#322150 require the acpica package ported to
    aarch64 which Xen 4.8 needs to build. Temporarily disable aarch64
    until these fates are complete.
    xen.spec
* Wed Jan 25 2017 carnold@suse.com
  - bsc#1021952 - Virutalization/xen: Bug xen-tools missing
    /usr/bin/domu-xenstore; guests fail to launch
    tmp_build.patch
    xen.spec
* Wed Jan 18 2017 ohering@suse.de
  - No systemd presets for 42.3+ and SLE12SP3+ (bsc#1012842)
* Thu Jan 12 2017 carnold@suse.com
  - bsc#1007224 - broken symlinks in /usr/share/doc/packages/xen/misc/
    xen.spec
* Mon Jan 09 2017 carnold@suse.com
  - 585aa3c5-x86-force-EFLAGS-IF-on-upon-exit-to-PV.patch
    Replaces xsa202.patch (bsc#1014298)
  - 585aa407-x86-HVM-NULL-check-before-using-VMFUNC-hook.patch
    Replaces xsa203.patch (bsc#1014300)
  - 58580060-x86-emul-correct-SYSCALL-eflags-handling.patch
    Replaces xsa204.patch (bsc#1016340)
  - Upstream patches from Jan
    58526ccc-x86emul-64bit-ignore-most-segment-bases-in-align-check.patch
    5853ed37-VT-d-correct-dma_msi_set_affinity.patch
    5853ee07-x86emul-CMPXCHG16B-aligned-operand.patch
    585bd5fe-x86-emul-correct-VMFUNC-return-value-handling.patch
    586ba81c-x86-cpu-dont-update-this_cpu-for-guest-get_cpu_vendor.patch
* Wed Jan 04 2017 carnold@suse.com
  - bsc#1015169 - VUL-0: CVE-2016-9921, CVE-2016-9922: xen: qemu:
    display: cirrus_vga: a divide by zero in cirrus_do_copy
    CVE-2016-9921-qemut-display-cirrus_vga-divide-by-zero-in-cirrus_do_copy.patch
* Mon Dec 19 2016 carnold@suse.com
  - bsc#1016340 - VUL-0: CVE-2016-10013: xen: x86: Mishandling of
    SYSCALL singlestep during emulation (XSA-204)
    xsa204.patch
* Thu Dec 15 2016 carnold@suse.com
  - bsc#1012651 - VUL-0: CVE-2016-9932: xen: x86 CMPXCHG8B emulation
    fails to ignore operand size override (XSA-200)
    58510c06-x86emul-CMPXCHGnB-ignore-prefixes.patch
* Wed Dec 14 2016 carnold@suse.com
  - bsc#1014298 - VUL-0: CVE-2016-10024: xen: x86 PV guests may be
    able to mask interrupts (XSA-202)
    xsa202.patch
  - bsc#1014300 - VUL-0: CVE-2016-10025: xen: x86: missing NULL
    pointer check in VMFUNC emulation (XSA-203)
    xsa203.patch
  - Upstream patches from Jan
    584806ce-x86emul-correct-PUSHF-POPF.patch
    584fc649-fix-determining-when-domain-creation-is-complete.patch
    58510c06-x86emul-CMPXCHGnB-ignore-prefixes.patch
    58510cac-x86emul-MOVNTI-no-REP-prefixes.patch
* Mon Dec 05 2016 carnold@suse.com
  - Update to Xen 4.8 FCS
    xen-4.8.0-testing-src.tar.bz2
  - Dropped
    xen-4.7.1-testing-src.tar.bz2
    0001-libxc-Rework-extra-module-initialisation.patch
    0002-libxc-Prepare-a-start-info-structure-for-hvmloader.patch
    0003-configure-define-SEABIOS_PATH-and-OVMF_PATH.patch
    0004-firmware-makefile-install-BIOS-blob.patch
    0005-libxl-Load-guest-BIOS-from-file.patch
    0006-xen-Move-the-hvm_start_info-C-representation-from-li.patch
    0007-hvmloader-Grab-the-hvm_start_info-pointer.patch
    0008-hvmloader-Locate-the-BIOS-blob.patch
    0009-hvmloader-Check-modules-whereabouts-in-perform_tests.patch
    0010-hvmloader-Load-SeaBIOS-from-hvm_start_info-modules.patch
    0011-hvmloader-Load-OVMF-from-modules.patch
    0012-hvmloader-Specific-bios_load-function-required.patch
    0013-hvmloader-Always-build-in-SeaBIOS-and-OVMF-loader.patch
    0014-configure-do-not-depend-on-SEABIOS_PATH-or-OVMF_PATH.patch
    57580bbd-kexec-allow-relaxed-placement-via-cmdline.patch
    576001df-x86-time-use-local-stamp-in-TSC-calibration-fast-path.patch
    5769106e-x86-generate-assembler-equates-for-synthesized.patch
    57a1e603-x86-time-adjust-local-system-time-initialization.patch
    57a1e64c-x86-time-introduce-and-use-rdtsc_ordered.patch
    57a2f6ac-x86-time-calibrate-TSC-against-platform-timer.patch
    57a30261-x86-support-newer-Intel-CPU-models.patch
    5810a9cc-x86-emul-Correct-decoding-of-SReg3-operands.patch
    581b2c3b-x86-emul-reject-LGDT-LIDT-with-non-canonical-addresses.patch
    581b647a-x86emul-L-S-G-I-DT-ignore-opsz-overrides-in-64-bit-mode.patch
    58249392-x86-svm-dont-clobber-eax-edx-if-RDMSR-intercept-fails.patch
    582c35d6-x86-vmx-correct-long-mode-check-in-vmx_cpuid_intercept.patch
    582c35ee-x86-traps-dont-call-hvm_hypervisor_cpuid_leaf-for-PV.patch
    58343dc2-x86-hvm-Fix-the-handling-of-non-present-segments.patch
    58343df8-x86-HVM-dont-load-LDTR-with-VM86-mode-attrs-during-task-switch.patch
    58343e24-x86-PV-writes-of-fs-and-gs-base-MSRs-require-canonical-addresses.patch
    58343e9e-libelf-fix-stack-memory-leak-when-loading-32-bit-symbol-tables.patch
    58343ec2-x86emul-fix-huge-bit-offset-handling.patch
    58343f29-x86-emul-correct-the-IDT-entry-calculation-in-inject_swint.patch
    58343f44-x86-svm-fix-injection-of-software-interrupts.patch
    58343f79-pygrub-Properly-quote-results-when-returning-them-to-the-caller.patch
    CVE-2016-9381-xsa197-qemut.patch
    CVE-2016-9637-xsa199-qemut.patch
* Tue Nov 22 2016 carnold@suse.com
  - bsc#1011652 - VUL-0: xen: qemu ioport array overflow
    CVE-2016-9637-xsa199-qemut.patch
* Fri Nov 18 2016 carnold@suse.com
  - bsc#1009100 - VUL-0: CVE-2016-9386: XSA-191: xen: x86 null
    segments not always treated as unusable
    58343dc2-x86-hvm-Fix-the-handling-of-non-present-segments.patch
  - bsc#1009103 - VUL-0: CVE-2016-9382: XSA-192: xen: x86 task switch
    to VM86 mode mis-handled
    58343df8-x86-HVM-dont-load-LDTR-with-VM86-mode-attrs-during-task-switch.patch
  - bsc#1009104 - VUL-0: CVE-2016-9385: XSA-193: xen: x86 segment base
    write emulation lacking canonical address checks
    58343e24-x86-PV-writes-of-fs-and-gs-base-MSRs-require-canonical-addresses.patch
  - bsc#1009105 - VUL-0: CVE-2016-9384: XSA-194: xen: guest 32-bit
    ELF symbol table load leaking host data
    58343e9e-libelf-fix-stack-memory-leak-when-loading-32-bit-symbol-tables.patch
  - bsc#1009107 - VUL-0: CVE-2016-9383: XSA-195: xen: x86 64-bit bit
    test instruction emulation broken
    58343ec2-x86emul-fix-huge-bit-offset-handling.patch
  - bsc#1009108 - VUL-0: CVE-2016-9377,CVE-2016-9378: XSA-196: xen:
    x86 software interrupt injection mis-handled
    58343f29-x86-emul-correct-the-IDT-entry-calculation-in-inject_swint.patch
    58343f44-x86-svm-fix-injection-of-software-interrupts.patch
  - bsc#1009109 - VUL-0: CVE-2016-9381: XSA-197: xen: qemu incautious
    about shared ring processing
    CVE-2016-9381-xsa197-qemut.patch
  - bsc#1009111 - VUL-0: CVE-2016-9379,CVE-2016-9380: XSA-198: xen:
    delimiter injection vulnerabilities in pygrub
    58343f79-pygrub-Properly-quote-results-when-returning-them-to-the-caller.patch
  - Upstream patches from Jan
    581b2c3b-x86-emul-reject-LGDT-LIDT-with-non-canonical-addresses.patch
    581b647a-x86emul-L-S-G-I-DT-ignore-opsz-overrides-in-64-bit-mode.patch
    58249392-x86-svm-dont-clobber-eax-edx-if-RDMSR-intercept-fails.patch
    582c35d6-x86-vmx-correct-long-mode-check-in-vmx_cpuid_intercept.patch
    582c35ee-x86-traps-dont-call-hvm_hypervisor_cpuid_leaf-for-PV.patch
* Tue Nov 15 2016 carnold@suse.com
  - Update to Xen Version 4.7.1
    xen-4.7.1-testing-src.tar.bz2
  - Dropped patches contained in new tarball
    xen-4.7.0-testing-src.tar.bz2
    575e9ca0-nested-vmx-Validate-host-VMX-MSRs-before-accessing-them.patch
    57640448-xen-sched-use-default-scheduler-upon-an-invalid-sched.patch
    57973099-have-schedulers-revise-initial-placement.patch
    579730e6-remove-buggy-initial-placement-algorithm.patch
    57976073-x86-remove-unsafe-bits-from-mod_lN_entry-fastpath.patch
    57976078-x86-avoid-SMAP-violation-in-compat_create_bounce_frame.patch
    57ac6316-don-t-restrict-DMA-heap-to-node-0.patch
    57b71fc5-x86-EFI-don-t-apply-relocations-to-l-2-3-_bootmap.patch
    57b7447b-dont-permit-guest-to-populate-PoD-pages-for-itself.patch
    57c4412b-x86-HVM-add-guarding-logic-for-VMX-specific-code.patch
    57c57f73-libxc-correct-max_pfn-calculation-for-saving-domain.patch
    57c805bf-x86-levelling-restrict-non-architectural-OSXSAVE-handling.patch
    57c805c1-x86-levelling-pass-vcpu-to-ctxt_switch_levelling.patch
    57c805c3-x86-levelling-provide-architectural-OSXSAVE-handling.patch
    57c82be2-x86-32on64-adjust-call-gate-emulation.patch
    57c93e52-fix-error-in-libxl_device_usbdev_list.patch
    57c96df3-credit1-fix-a-race-when-picking-initial-pCPU.patch
    57c96e2c-x86-correct-PT_NOTE-file-position.patch
    57cfed43-VMX-correct-feature-checks-for-MPX-and-XSAVES.patch
    57d1563d-x86-32on64-don-t-allow-recursive-page-tables-from-L3.patch
    57d15679-x86-emulate-Correct-boundary-interactions-of-emulated-insns.patch
    57d1569a-x86-shadow-Avoid-overflowing-sh_ctxt-seg_reg.patch
    57d18642-hvm-fep-Allow-test-insns-crossing-1-0-boundary.patch
    57d18642-x86-segment-Bounds-check-accesses-to-emulation-ctxt-seg_reg.patch
    57d7ca5f-x86-domctl-fix-TOCTOU-race-in-XEN_DOMCTL_getvcpuextstate.patch
    57d7ca64-x86-domctl-fix-migration-of-guests-not-using-xsave.patch
    57da8883-credit1-fix-mask-to-be-used-for-tickling.patch
    57da8883-credit2-properly-schedule-migration-of-running-vcpu.patch
    57dfb1c5-x86-Intel-hide-CPUID-faulting-capability-from-guests.patch
    57e93e1d-x86emul-correct-loading-of-ss.patch
    57e93e4a-x86emul-don-t-allow-null-selector-for-LTR.patch
    57e93e89-x86-AMD-apply-erratum-665-workaround.patch
    57ee6cbc-credit1-return-time-remaining-to-limit-as-next-timeslice.patch
    57f3a8ee-x86emul-honor-guest-CR0-TS-and-CR0-EM.patch
    57fb6a91-x86-defer-not-present-segment-checks.patch
    5800c51d-x86-hvm-Clobber-cs-L-when-LME-becomes-set.patch
    5800caec-x86emul-fix-pushing-of-selector-registers.patch
    5800cb06-x86-Viridian-don-t-depend-on-undefined-register-state.patch
    580e29f9-x86-MISALIGNSSE-feature-depends-on-SSE.patch
    57dfb2ff-x86-Intel-Broadwell-no-PKG_C8-10_RESIDENCY-MSRs.patch
* Mon Nov 07 2016 carnold@suse.com
  - bsc#1004981 - Xen RPM doesn't contain debug hypervisor for EFI
    systems
    xen.spec
* Thu Nov 03 2016 carnold@suse.com
  - bsc#1000106 - VUL-0: CVE-2016-7777: xen: CR0.TS and CR0.EM not
    always honored for x86 HVM guests (XSA-190)
    57f3a8ee-x86emul-honor-guest-CR0-TS-and-CR0-EM.patch
  - bsc#996191 - [XEN][acpi]residency -n 88 -c will cause xen panic
    on broadwell-ep
    57dfb2ff-x86-Intel-Broadwell-no-PKG_C8-10_RESIDENCY-MSRs.patch
  - Upstream patches from Jan
    57d7ca5f-x86-domctl-fix-TOCTOU-race-in-XEN_DOMCTL_getvcpuextstate.patch
    57d7ca64-x86-domctl-fix-migration-of-guests-not-using-xsave.patch
    57da8883-credit1-fix-mask-to-be-used-for-tickling.patch
    57da8883-credit2-properly-schedule-migration-of-running-vcpu.patch
    57dfb1c5-x86-Intel-hide-CPUID-faulting-capability-from-guests.patch
    57e93e1d-x86emul-correct-loading-of-ss.patch
    57e93e4a-x86emul-don-t-allow-null-selector-for-LTR.patch
    57e93e89-x86-AMD-apply-erratum-665-workaround.patch
    57ee6cbc-credit1-return-time-remaining-to-limit-as-next-timeslice.patch
    57fb6a91-x86-defer-not-present-segment-checks.patch
    5800c51d-x86-hvm-Clobber-cs-L-when-LME-becomes-set.patch
    5800caec-x86emul-fix-pushing-of-selector-registers.patch
    5800cb06-x86-Viridian-don-t-depend-on-undefined-register-state.patch
    580e29f9-x86-MISALIGNSSE-feature-depends-on-SSE.patch
    5810a9cc-x86-emul-Correct-decoding-of-SReg3-operands.patch
* Wed Nov 02 2016 carnold@suse.com
  - bsc#1007941 - Xen tools limit the number of vcpus to 256 when the
    system has 384
    xen-arch-kconfig-nr_cpus.patch
* Tue Nov 01 2016 carnold@suse.com
  - bsc#1007157 - VUL-0: CVE-2016-8910: xen: net: rtl8139: infinite
    loop while transmit in C+ mode
    CVE-2016-8910-qemut-net-rtl8139-infinite-loop-while-transmit-in-Cplus-mode.patch
* Mon Oct 17 2016 carnold@suse.com
  - bsc#1005004 - CVE-2016-8667: xen: dma: rc4030 divide by zero
    error in set_next_tick
    CVE-2016-8667-qemut-dma-rc4030-divide-by-zero-error-in-set_next_tick.patch
  - bsc#1005005 - VUL-0: CVE-2016-8669: xen: char: divide by zero
    error in serial_update_parameters
    CVE-2016-8669-qemut-char-divide-by-zero-error-in-serial_update_parameters.patch
* Wed Oct 05 2016 carnold@suse.com
  - bsc#1003030 - VUL-0: CVE-2016-7908: xen: net: Infinite loop in
    mcf_fec_do_tx
    CVE-2016-7908-qemut-net-Infinite-loop-in-mcf_fec_do_tx.patch
  - bsc#1003032 - VUL-0: CVE-2016-7909: xen: net: pcnet: infinite
    loop in pcnet_rdra_addr
    CVE-2016-7909-qemut-net-pcnet-infinite-loop-in-pcnet_rdra_addr.patch
* Mon Sep 12 2016 carnold@suse.com
  - bsc#995785 - VUL-0: CVE-2016-7092: xen: x86: Disallow L3
    recursive pagetable for 32-bit PV guests (XSA-185)
    57d1563d-x86-32on64-don-t-allow-recursive-page-tables-from-L3.patch
  - bsc#995789 - VUL-0: CVE-2016-7093: xen: x86: Mishandling of
    instruction pointer truncation during emulation (XSA-186)
    57d15679-x86-emulate-Correct-boundary-interactions-of-emulated-insns.patch
    57d18642-hvm-fep-Allow-test-insns-crossing-1-0-boundary.patch
  - bsc#995792 - VUL-0: CVE-2016-7094: xen: x86 HVM: Overflow of
    sh_ctxt->seg_reg[] (XSA-187)
    57d1569a-x86-shadow-Avoid-overflowing-sh_ctxt-seg_reg.patch
    57d18642-x86-segment-Bounds-check-accesses-to-emulation-ctxt-seg_reg.patch
  - bsc#991934 - xen hypervisor crash in csched_acct
    57c96df3-credit1-fix-a-race-when-picking-initial-pCPU.patch
  - Upstream patches from Jan
    57c4412b-x86-HVM-add-guarding-logic-for-VMX-specific-code.patch
    57c57f73-libxc-correct-max_pfn-calculation-for-saving-domain.patch
    57c805bf-x86-levelling-restrict-non-architectural-OSXSAVE-handling.patch
    57c805c1-x86-levelling-pass-vcpu-to-ctxt_switch_levelling.patch
    57c805c3-x86-levelling-provide-architectural-OSXSAVE-handling.patch
    57c82be2-x86-32on64-adjust-call-gate-emulation.patch
    57c96e2c-x86-correct-PT_NOTE-file-position.patch
    57cfed43-VMX-correct-feature-checks-for-MPX-and-XSAVES.patch
* Mon Sep 12 2016 ohering@suse.de
  - bsc#979002 - add 60-persistent-xvd.rules and helper script
    also to initrd, add the relevant dracut helper
* Mon Sep 05 2016 ohering@suse.de
  - bnc#953518 - unplug also SCSI disks in qemu-xen-traditional for
    upstream unplug protocol
* Fri Sep 02 2016 carnold@suse.com
  - bsc#989679 - [pvusb feature] USB device not found when
    'virsh detach-device guest usb.xml'
    57c93e52-fix-error-in-libxl_device_usbdev_list.patch
* Tue Aug 23 2016 carnold@suse.com
  - bsc#992224 - [HPS Bug] During boot of Xen Hypervisor, Failed to
    get contiguous memory for DMA from Xen
    57ac6316-don-t-restrict-DMA-heap-to-node-0.patch
  - bsc#978755 - xen uefi systems fail to boot
  - bsc#983697 - SLES12 SP2 Xen UEFI mode cannot boot
    57b71fc5-x86-EFI-don-t-apply-relocations-to-l-2-3-_bootmap.patch
  - Upstream patch from Jan
    57b7447b-dont-permit-guest-to-populate-PoD-pages-for-itself.patch
* Mon Aug 08 2016 jfehlig@suse.com
  - spec: to stay compatible with the in-tree qemu-xen binary, use
    /usr/bin/qemu-system-i386 instead of /usr/bin/qemu-system-x86_64
    bsc#986164
* Thu Aug 04 2016 carnold@suse.com
  - bsc#970135 - new virtualization project clock test randomly fails
    on Xen
    576001df-x86-time-use-local-stamp-in-TSC-calibration-fast-path.patch
    5769106e-x86-generate-assembler-equates-for-synthesized.patch
    57a1e603-x86-time-adjust-local-system-time-initialization.patch
    57a1e64c-x86-time-introduce-and-use-rdtsc_ordered.patch
    57a2f6ac-x86-time-calibrate-TSC-against-platform-timer.patch
  - bsc#991934 - xen hypervisor crash in csched_acct
    57973099-have-schedulers-revise-initial-placement.patch
    579730e6-remove-buggy-initial-placement-algorithm.patch
  - bsc#988675 - VUL-0: CVE-2016-6258: xen: x86: Privilege escalation
    in PV guests (XSA-182)
    57976073-x86-remove-unsafe-bits-from-mod_lN_entry-fastpath.patch
  - bsc#988676 - VUL-0: CVE-2016-6259: xen: x86: Missing SMAP
    whitelisting in 32-bit exception / event delivery (XSA-183)
    57976078-x86-avoid-SMAP-violation-in-compat_create_bounce_frame.patch
  - Upstream patches from Jan
    57a30261-x86-support-newer-Intel-CPU-models.patch
* Mon Aug 01 2016 carnold@suse.com
  - bsc#985503 - vif-route broken
    vif-route.patch
* Thu Jul 28 2016 carnold@suse.com
  - bsc#978413 - PV guest upgrade from sles11sp4 to sles12sp2 alpha3
    failed on sles11sp4 xen host.
    pygrub-handle-one-line-menu-entries.patch
* Wed Jul 27 2016 carnold@suse.com
  - bsc#990843 - VUL-1: CVE-2016-6351: xen: qemu: scsi: esp: OOB
    write access in esp_do_dma
    CVE-2016-6351-qemut-scsi-esp-make-cmdbuf-big-enough-for-maximum-CDB-size.patch
* Thu Jun 23 2016 carnold@suse.com
  - bsc#900418 - Dump cannot be performed on SLES12 XEN
    57580bbd-kexec-allow-relaxed-placement-via-cmdline.patch
  - Upstream patches from Jan
    575e9ca0-nested-vmx-Validate-host-VMX-MSRs-before-accessing-them.patch
    57640448-xen-sched-use-default-scheduler-upon-an-invalid-sched.patch
* Tue Jun 21 2016 carnold@suse.com
  - fate#319989 - Update to Xen 4.7 FCS
    xen-4.7.0-testing-src.tar.bz2
  - Drop CVE-2014-3672-qemut-xsa180.patch
* Thu Jun 16 2016 carnold@suse.com
  - bsc#954872 - script block-dmmd not working as expected - libxl:
    error: libxl_dm.c (Additional fixes)
    block-dmmd
* Fri Jun 10 2016 ohering@suse.de
  - Convert with_stubdom into build_conditional to allow adjusting
    via prjconf
  - Convert with_debug into build_conditional to allow adjusting
    via prjconf
* Fri Jun 10 2016 ohering@suse.de
  - bsc#979002 - add 60-persistent-xvd.rules and helper script to
    xen-tools-domU to simplify transition to pvops based kernels
* Fri Jun 10 2016 ohering@suse.de
  - Convert with_oxenstored into build_conditional to allow
    adjusting via prjconf (fate#320836)
* Thu Jun 09 2016 carnold@suse.com
  - bsc#983984 - VUL-0: CVE-2016-5338: xen: qemu: scsi: esp: OOB r/w
    access while processing ESP_FIFO
    CVE-2016-5338-qemut-scsi-esp-OOB-rw-access-while-processing-ESP_FIFO.patch
  - bsc#982960 - VUL-0: CVE-2016-5238: xen: qemu: scsi: esp: OOB
    write when using non-DMA mode in get_cmd
    CVE-2016-5238-qemut-scsi-esp-OOB-write-when-using-non-DMA-mode-in-get_cmd.patch
* Tue Jun 07 2016 carnold@suse.com
  - fate#319989 - Update to Xen 4.7 RC5
    xen-4.7.0-testing-src.tar.bz2
* Wed May 25 2016 carnold@suse.com
  - fate#319989 - Update to Xen 4.7 RC4
    xen-4.7.0-testing-src.tar.bz2
  - Dropped
    xen.pkgconfig-4.7.patch
    xsa164.patch
* Mon May 23 2016 carnold@suse.com
  - bsc#981264 - VUL-0: CVE-2014-3672: xen: Unrestricted qemu logging
    (XSA-180)
    CVE-2014-3672-qemut-xsa180.patch
* Thu May 19 2016 carnold@suse.com
  - bsc#980724 - VUL-0: CVE-2016-4441: Qemu: scsi: esp: OOB write
    while writing to 's->cmdbuf' in get_cmd
    CVE-2016-4441-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-get_cmd.patch
  - bsc#980716 - VUL-0: CVE-2016-4439: xen: scsi: esp: OOB write
    while writing to 's->cmdbuf' in esp_reg_write
    CVE-2016-4439-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-esp_reg_write.patch
* Tue May 17 2016 carnold@suse.com
  - fate#319989 - Update to Xen 4.7 RC3
    xen-4.7.0-testing-src.tar.bz2
  - Dropped
    libxl-remove-cdrom-cachemode.patch
    x86-PoD-only-reclaim-if-needed.patch
    gcc6-warnings-as-errors.patch
* Wed May 11 2016 carnold@suse.com
  - bsc#954872 - script block-dmmd not working as expected - libxl:
    error: libxl_dm.c (another modification)
    block-dmmd
* Tue May 10 2016 carnold@suse.com
  - fate#319989 - Update to Xen 4.7 RC2
    xen-4.7.0-testing-src.tar.bz2
* Tue May 10 2016 carnold@suse.com
  - bsc#961600 - L3: poor performance when Xen HVM domU configured
    with max memory > current memory
    x86-PoD-only-reclaim-if-needed.patch
* Fri May 06 2016 ohering@suse.de
  - Mark SONAMEs and pkgconfig as xen 4.7
    xen.pkgconfig-4.7.patch
* Tue May 03 2016 jfehlig@suse.com
  - bsc#977329 - Xen: Cannot boot HVM guests with empty cdrom
    libxl-remove-cdrom-cachemode.patch
* Tue May 03 2016 carnold@suse.com
  - fate#319989 - Update to Xen 4.7 RC1
    xen-4.7.0-testing-src.tar.bz2
* Tue May 03 2016 ohering@suse.de
  - fate#316614: set migration constraints from cmdline
    restore libxl.set-migration-constraints-from-cmdline.patch
* Tue May 03 2016 ohering@suse.de
  - Remove obsolete patch for xen-kmp
    magic_ioport_compat.patch
* Tue May 03 2016 ohering@suse.de
  - fate#316613: update to v12
    libxl.pvscsi.patch
* Fri Apr 29 2016 carnold@suse.com
  - Update to the latest Xen 4.7 pre-release c2994f86
    Drop libxl.migrate-legacy-stream-read.patch
* Fri Apr 15 2016 ohering@suse.de
  - bnc#972756 - Can't migrate HVM guest from SLES12SP1 Xen host
    to SLES12SP2 Alpha 1 host using xl migrate
    libxl.migrate-legacy-stream-read.patch
* Fri Apr 01 2016 jfehlig@suse.com
  - Add patches from proposed upstream series to load BIOS's from
    the toolstack instead of embedding in hvmloader
    http://lists.xenproject.org/archives/html/xen-devel/2016-03/msg01626.html
    0001-libxc-Rework-extra-module-initialisation.patch,
    0002-libxc-Prepare-a-start-info-structure-for-hvmloader.patch,
    0003-configure-define-SEABIOS_PATH-and-OVMF_PATH.patch,
    0004-firmware-makefile-install-BIOS-blob.patch,
    0005-libxl-Load-guest-BIOS-from-file.patch,
    0006-xen-Move-the-hvm_start_info-C-representation-from-li.patch,
    0007-hvmloader-Grab-the-hvm_start_info-pointer.patch,
    0008-hvmloader-Locate-the-BIOS-blob.patch,
    0009-hvmloader-Check-modules-whereabouts-in-perform_tests.patch,
    0010-hvmloader-Load-SeaBIOS-from-hvm_start_info-modules.patch,
    0011-hvmloader-Load-OVMF-from-modules.patch,
    0012-hvmloader-Specific-bios_load-function-required.patch,
    0013-hvmloader-Always-build-in-SeaBIOS-and-OVMF-loader.patch,
    0014-configure-do-not-depend-on-SEABIOS_PATH-or-OVMF_PATH.patch
  - Enable support for UEFI on x86_64 using the ovmf-x86_64-ms.bin
    firmware from qemu-ovmf-x86_64. The firmware is preloaded with
    Microsoft keys to more closely resemble firmware on real hardware
    FATE#320490
* Fri Mar 25 2016 carnold@suse.com
  - fate#319989: Update to Xen 4.7 (pre-release)
    xen-4.7.0-testing-src.tar.bz2
  - Dropped:
    xen-4.6.1-testing-src.tar.bz2
    55f7f9d2-libxl-slightly-refine-pci-assignable-add-remove-handling.patch
    5628fc67-libxl-No-emulated-disk-driver-for-xvdX-disk.patch
    5644b756-x86-HVM-don-t-inject-DB-with-error-code.patch
    5649bcbe-libxl-relax-readonly-check-introduced-by-XSA-142-fix.patch
    hotplug-Linux-block-performance-fix.patch
    set-mtu-from-bridge-for-tap-interface.patch
    xendomains-libvirtd-conflict.patch
    xsa154.patch
    xsa155-xen-0001-xen-Add-RING_COPY_REQUEST.patch
    xsa155-xen-0002-blktap2-Use-RING_COPY_REQUEST.patch
    xsa155-xen-0003-libvchan-Read-prod-cons-only-once.patch
    xsa170.patch
* Tue Mar 22 2016 jfehlig@suse.com
  - Use system SeaBIOS instead of building/installing another one
    FATE#320638
    Dropped files:
    seabios-dir-remote.tar.bz2
    xen-c99-fix.patch
    xen.build-compare.seabios.patch
* Wed Mar 16 2016 jfehlig@suse.com
  - spec: drop BuildRequires that were only needed for qemu-xen
* Fri Mar 04 2016 carnold@suse.com
  - bsc#969377 - xen does not build with GCC 6
    ipxe-use-rpm-opt-flags.patch
    gcc6-warnings-as-errors.patch
* Thu Mar 03 2016 carnold@suse.com
  - bsc#969351 - VUL-0: CVE-2016-2841: xen: net: ne2000: infinite
    loop in ne2000_receive
    CVE-2016-2841-qemut-ne2000-infinite-loop-in-ne2000_receive.patch
  - Drop xsa154-fix.patch
* Wed Mar 02 2016 jfehlig@suse.com
  - Use system qemu instead of building/installing yet another qemu
    FATE#320638
  - Dropped files
    qemu-xen-dir-remote.tar.bz2
    CVE-2014-0222-qemuu-qcow1-validate-l2-table-size.patch
    CVE-2015-1779-qemuu-incrementally-decode-websocket-frames.patch
    CVE-2015-1779-qemuu-limit-size-of-HTTP-headers-from-websockets-clients.patch
    CVE-2015-4037-qemuu-smb-config-dir-name.patch
    CVE-2015-7512-qemuu-net-pcnet-buffer-overflow-in-non-loopback-mode.patch
    CVE-2015-7549-qemuu-pci-null-pointer-dereference-issue.patch
    CVE-2015-8345-qemuu-eepro100-infinite-loop-fix.patch
    CVE-2015-8504-qemuu-vnc-avoid-floating-point-exception.patch
    CVE-2015-8558-qemuu-usb-infinite-loop-in-ehci_advance_state-results-in-DoS.patch
    CVE-2015-8568-qemuu-net-vmxnet3-avoid-memory-leakage-in-activate_device.patch
    CVE-2015-8613-qemuu-scsi-initialise-info-object-with-appropriate-size.patch
    CVE-2015-8743-qemuu-ne2000-OOB-memory-access-in-ioport-rw-functions.patch
    CVE-2015-8744-qemuu-net-vmxnet3-incorrect-l2-header-validation-leads-to-crash.patch
    CVE-2015-8745-qemuu-net-vmxnet3-read-IMR-registers-instead-of-assert.patch
    CVE-2016-1568-qemuu-ide-ahci-reset-ncq-object-to-unused-on-error.patch
    CVE-2016-1714-qemuu-fw_cfg-add-check-to-validate-current-entry-value.patch
    CVE-2014-7815-qemut-vnc-sanitize-bits_per_pixel-from-the-client.patch
    CVE-2016-1981-qemuu-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch
    CVE-2016-2538-qemuu-usb-integer-overflow-in-remote-NDIS-message-handling.patch
    CVE-2015-8619-qemuu-stack-based-OOB-write-in-hmp_sendkey-routine.patch
    qemu-xen-enable-spice-support.patch
    qemu-xen-upstream-qdisk-cache-unsafe.patch
    tigervnc-long-press.patch
    xsa162-qemuu.patch
* Mon Feb 29 2016 carnold@suse.com
  - bsc#962321 - VUL-0: CVE-2016-1922: xen: i386: null pointer
    dereference in vapic_write()
    CVE-2016-1922-qemuu-i386-null-pointer-dereference-in-vapic_write.patch
* Wed Feb 24 2016 carnold@suse.com
  - bsc#968004 - VUL-0: CVE-2016-2538: xen: usb: integer overflow in
    remote NDIS control message handling
    CVE-2016-2538-qemuu-usb-integer-overflow-in-remote-NDIS-message-handling.patch
* Thu Feb 18 2016 carnold@suse.com
  - bsc#954872 - L3: script block-dmmd not working as expected -
    libxl: error: libxl_dm.c
    block-dmmd
  - Update libxl to recognize dmmd and npiv prefix in disk spec
    xen.libxl.dmmd.patch
* Wed Feb 17 2016 carnold@suse.com
  - bsc#967101 - VUL-0: CVE-2016-2391: xen: usb: multiple eof_timers
    in ohci module leads to null pointer dereference
    CVE-2016-2391-qemuu-usb-null-pointer-dereference-in-ohci-module.patch
    CVE-2016-2391-qemut-usb-null-pointer-dereference-in-ohci-module.patch
  - bsc#967090 - VUL-0: CVE-2016-2392: xen: usb: null pointer
    dereference in remote NDIS control message handling
    CVE-2016-2392-qemuu-usb-null-pointer-dereference-in-NDIS-message-handling.patch
* Thu Feb 11 2016 carnold@suse.com
  - Update to Xen Version 4.6.1
    xen-4.6.1-testing-src.tar.bz2
  - Dropped patches now contained in tarball or unnecessary
    xen-4.6.0-testing-src.tar.bz2
    5604f239-x86-PV-properly-populate-descriptor-tables.patch
    561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-it-is-zero.patch
    561d2046-VT-d-use-proper-error-codes-in-iommu_enable_x2apic_IR.patch
    561d20a0-x86-hide-MWAITX-from-PV-domains.patch
    561e3283-x86-NUMA-fix-SRAT-table-processor-entry-parsing-and-consumption.patch
    5632118e-arm-Support-hypercall_create_continuation-for-multicall.patch
    56321222-arm-rate-limit-logging-from-unimplemented-PHYSDEVOP-and-HVMOP.patch
    56321249-arm-handle-races-between-relinquish_memory-and-free_domheap_pages.patch
    5632127b-x86-guard-against-undue-super-page-PTE-creation.patch
    5632129c-free-domain-s-vcpu-array.patch
    563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch
    563212e4-xenoprof-free-domain-s-vcpu-array.patch
    563212ff-x86-rate-limit-logging-in-do_xen-oprof-pmu-_op.patch
    56323737-libxl-adjust-PoD-target-by-memory-fudge-too.patch
    56377442-x86-PoD-Make-p2m_pod_empty_cache-restartable.patch
    5641ceec-x86-HVM-always-intercept-AC-and-DB.patch
    56549f24-x86-vPMU-document-as-unsupported.patch
    5677f350-x86-make-debug-output-consistent-in-hvm_set_callback_via.patch
    xsa155-qemut-qdisk-double-access.patch
    xsa155-qemut-xenfb.patch
    xsa155-qemuu-qdisk-double-access.patch
    xsa155-qemuu-xenfb.patch
    xsa159.patch
    xsa160.patch
    xsa162-qemut.patch
    xsa165.patch
    xsa166.patch
    xsa167.patch
    xsa168.patch
* Fri Feb 05 2016 carnold@suse.com
  - bsc#965315 - VUL-0: CVE-2016-2270: xen: x86: inconsistent
    cachability flags on guest mappings (XSA-154)
    xsa154.patch
  - bsc#965317 - VUL-0: CVE-2016-2271: xen: VMX: guest user mode may
    crash guest with non-canonical RIP (XSA-170)
    xsa170.patch
* Fri Feb 05 2016 carnold@suse.com
  - bsc#965269 - VUL-1: CVE-2015-8619: xen: stack based OOB write in
    hmp_sendkey routine
    CVE-2015-8619-qemuu-stack-based-OOB-write-in-hmp_sendkey-routine.patch
* Thu Feb 04 2016 carnold@suse.com
  - bsc#965156 - VUL-0: CVE-2015-6855: xen: ide: divide by zero issue
    CVE-2015-6855-qemuu-ide-divide-by-zero-issue.patch
  - bsc#965112 - VUL-0: CVE-2014-3640: xen: slirp: NULL pointer deref
    in sosendto()
    CVE-2014-3640-qemut-slirp-NULL-pointer-deref-in-sosendto.patch
* Wed Feb 03 2016 carnold@suse.com
  - bsc#964947 - VUL-0: CVE-2015-5278: xen: Infinite loop in
    ne2000_receive() function
    CVE-2015-5278-qemut-Infinite-loop-in-ne2000_receive-function.patch
  - bsc#956832 - VUL-0: CVE-2015-8345: xen: qemu: net: eepro100:
    infinite loop in processing command block list
    CVE-2015-8345-qemuu-eepro100-infinite-loop-fix.patch
    CVE-2015-8345-qemut-eepro100-infinite-loop-fix.patch
* Tue Feb 02 2016 carnold@suse.com
  - bsc#964644 - VUL-0: CVE-2013-4533: xen pxa2xx: buffer overrun on
    incoming migration
    CVE-2013-4533-qemut-pxa2xx-buffer-overrun-on-incoming-migration.patch
  - bsc#964925 - VUL-0: CVE-2014-0222: xen: qcow1: validate L2 table
    size to avoid integer overflows
    CVE-2014-0222-blktap-qcow1-validate-l2-table-size.patch
  - Dropped CVE-2014-0222-qemuu-qcow1-validate-l2-table-size.patch
* Mon Feb 01 2016 carnold@suse.com
  - bsc#964415 - VUL-1: CVE-2016-2198: xen: usb: ehci null pointer
    dereference in ehci_caps_write
    CVE-2016-2198-qemuu-usb-ehci-null-pointer-dereference-in-ehci_caps_write.patch
  - bsc#964452 - VUL-0: CVE-2013-4534: xen: openpic: buffer overrun
    on incoming migration
    CVE-2013-4534-qemut-openpic-buffer-overrun-on-incoming-migration.patch
* Wed Jan 27 2016 carnold@suse.com
  - bsc#963783 - VUL-1: CVE-2016-1981: xen: net: e1000 infinite loop
    in start_xmit and e1000_receive_iov routines
    CVE-2016-1981-qemuu-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch
    CVE-2016-1981-qemut-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch
* Wed Jan 20 2016 carnold@suse.com
  - bsc#962758 - VUL-0: CVE-2013-4539: xen: tsc210x: buffer overrun
    on invalid state load
    CVE-2013-4539-qemut-tsc210x-fix-buffer-overrun-on-invalid-state-load.patch
* Tue Jan 19 2016 carnold@suse.com
  - bsc#962632 - VUL-0: CVE-2015-1779: xen: vnc: insufficient
    resource limiting in VNC websockets decoder
    CVE-2015-1779-qemuu-limit-size-of-HTTP-headers-from-websockets-clients.patch
    CVE-2015-1779-qemuu-incrementally-decode-websocket-frames.patch
  - bsc#962642 - VUL-0: CVE-2013-4537: xen: ssi-sd: buffer overrun on
    invalid state load
    CVE-2013-4537-qemut-ssi-sd-fix-buffer-overrun-on-invalid-state-load.patch
  - bsc#962627 - VUL-0: CVE-2014-7815: xen: vnc: insufficient
    bits_per_pixel from the client sanitization
    CVE-2014-7815-qemut-vnc-sanitize-bits_per_pixel-from-the-client.patch
* Mon Jan 18 2016 carnold@suse.com
  - bsc#962335 - VUL-0: CVE-2013-4538: xen: ssd0323: fix buffer
    overun on invalid state
    CVE-2013-4538-qemut-ssd0323-fix-buffer-overun-on-invalid-state.patch
  - bsc#962360 - VUL-0: CVE-2015-7512: xen: net: pcnet: buffer
    overflow in non-loopback mode
    CVE-2015-7512-qemuu-net-pcnet-buffer-overflow-in-non-loopback-mode.patch
    CVE-2015-7512-qemut-net-pcnet-buffer-overflow-in-non-loopback-mode.patch
* Wed Jan 13 2016 carnold@suse.com
  - bsc#961692 - VUL-0: CVE-2016-1714: xen: nvram: OOB r/w access in
    processing firmware configurations
    CVE-2016-1714-qemuu-fw_cfg-add-check-to-validate-current-entry-value.patch
    CVE-2016-1714-qemut-fw_cfg-add-check-to-validate-current-entry-value.patch
* Mon Jan 11 2016 carnold@suse.com
  - bsc#961358 - VUL-0: CVE-2015-8613: xen: qemu: scsi: stack based
    buffer overflow in megasas_ctrl_get_info
    CVE-2015-8613-qemuu-scsi-initialise-info-object-with-appropriate-size.patch
  - bsc#961332 - VUL-0: CVE-2016-1568: xen: Qemu: ide: ahci
    use-after-free vulnerability in aio port commands
    CVE-2016-1568-qemuu-ide-ahci-reset-ncq-object-to-unused-on-error.patch
* Thu Jan 07 2016 carnold@suse.com
  - bsc#959695 - missing docs for xen
    xen.spec
* Wed Jan 06 2016 carnold@suse.com
  - bsc#960862 - VUL-0: CVE-2016-1571: xen: VMX: intercept issue with
    INVLPG on non-canonical address (XSA-168)
    xsa168.patch
  - bsc#960861 - VUL-0: CVE-2016-1570: xen: PV superpage
    functionality missing sanity checks (XSA-167)
    xsa167.patch
  - bsc#960836 - VUL-0: CVE-2015-8744: xen: net: vmxnet3: incorrect
    l2 header validation leads to a crash via assert(2) call
    CVE-2015-8744-qemuu-net-vmxnet3-incorrect-l2-header-validation-leads-to-crash.patch
* Tue Jan 05 2016 carnold@suse.com
  - bsc#960707 - VUL-0: CVE-2015-8745: xen: reading IMR registers
    leads to a crash via assert(2) call
    CVE-2015-8745-qemuu-net-vmxnet3-read-IMR-registers-instead-of-assert.patch
  - bsc#960726 - VUL-0: CVE-2015-8743: xen: ne2000: OOB memory access
    in ioport r/w functions
    CVE-2015-8743-qemuu-ne2000-OOB-memory-access-in-ioport-rw-functions.patch
* Mon Jan 04 2016 carnold@suse.com
  - bsc#960093 - VUL-0: CVE-2015-8615: xen: x86: unintentional
    logging upon guest changing callback method (XSA-169)
    5677f350-x86-make-debug-output-consistent-in-hvm_set_callback_via.patch
* Mon Dec 21 2015 ohering@suse.de
  - Adjust xen-dom0-modules.service to run Before xenstored.service
    instead of proc-xen.mount to workaround a bug in systemd "design"
    (bnc#959845)
* Wed Dec 16 2015 carnold@suse.com
  - bsc#959387 - VUL-0: CVE-2015-8568 CVE-2015-8567: xen: qemu: net:
    vmxnet3: host memory leakage
    CVE-2015-8568-qemuu-net-vmxnet3-avoid-memory-leakage-in-activate_device.patch
* Mon Dec 14 2015 carnold@suse.com
  - bsc#957988 - VUL-0: CVE-2015-8550: xen: paravirtualized drivers
    incautious about shared memory contents (XSA-155)
    xsa155-xen-0001-xen-Add-RING_COPY_REQUEST.patch
    xsa155-xen-0002-blktap2-Use-RING_COPY_REQUEST.patch
    xsa155-xen-0003-libvchan-Read-prod-cons-only-once.patch
    xsa155-qemuu-qdisk-double-access.patch
    xsa155-qemut-qdisk-double-access.patch
    xsa155-qemuu-xenfb.patch
    xsa155-qemut-xenfb.patch
  - bsc#959006 - VUL-0: CVE-2015-8558: xen: qemu: usb: infinite loop
    in ehci_advance_state results in DoS
    CVE-2015-8558-qemuu-usb-infinite-loop-in-ehci_advance_state-results-in-DoS.patch
  - bsc#958918 - VUL-0: CVE-2015-7549: xen: qemu pci: null pointer
    dereference issue
    CVE-2015-7549-qemuu-pci-null-pointer-dereference-issue.patch
  - bsc#958493 - VUL-0: CVE-2015-8504: xen: qemu: ui: vnc: avoid
    floating point exception
    CVE-2015-8504-qemuu-vnc-avoid-floating-point-exception.patch
    CVE-2015-8504-qemut-vnc-avoid-floating-point-exception.patch
  - bsc#958007 - VUL-0: CVE-2015-8554: xen: qemu-dm buffer overrun in
    MSI-X handling (XSA-164)
    xsa164.patch
  - bsc#958009 - VUL-0: CVE-2015-8555: xen: information leak in
    legacy x86 FPU/XMM initialization (XSA-165)
    xsa165.patch
  - bsc#958523 - VUL-0: xen: ioreq handling possibly susceptible to
    multiple read issue (XSA-166)
    xsa166.patch
* Fri Nov 27 2015 carnold@suse.com
  - bsc#956832 - VUL-0: CVE-2015-8345: xen: qemu: net: eepro100:
    infinite loop in processing command block list
    CVE-2015-8345-qemuu-eepro100-infinite-loop-fix.patch
    CVE-2015-8345-qemut-eepro100-infinite-loop-fix.patch
  - Upstream patches from Jan
    56377442-x86-PoD-Make-p2m_pod_empty_cache-restartable.patch
    5641ceec-x86-HVM-always-intercept-AC-and-DB.patch (Replaces CVE-2015-5307-xsa156.patch)
    5644b756-x86-HVM-don-t-inject-DB-with-error-code.patch
    56544a57-VMX-fix-adjust-trap-injection.patch
    56546ab2-sched-fix-insert_vcpu-locking.patch
* Wed Nov 25 2015 carnold@suse.com
  - bsc#956592 - VUL-0: xen: virtual PMU is unsupported (XSA-163)
    56549f24-x86-vPMU-document-as-unsupported.patch
  - bsc#956408 - VUL-0: CVE-2015-8339, CVE-2015-8340: xen:
    XENMEM_exchange error handling issues (XSA-159)
    xsa159.patch
  - bsc#956409 - VUL-0: CVE-2015-8341: xen: libxl leak of pv kernel
    and initrd on error (XSA-160)
    xsa160.patch
  - bsc#956411 - VUL-0: CVE-2015-7504: xen: heap buffer overflow
    vulnerability in pcnet emulator (XSA-162)
    xsa162-qemuu.patch
    xsa162-qemut.patch
  - bsc#947165 - VUL-0: CVE-2015-7311: xen: libxl fails to honour
    readonly flag on disks with qemu-xen (xsa-142)
    5628fc67-libxl-No-emulated-disk-driver-for-xvdX-disk.patch
    5649bcbe-libxl-relax-readonly-check-introduced-by-XSA-142-fix.patch
* Tue Nov 24 2015 carnold@suse.com
  - fate#315712: XEN: Use the PVOPS kernel
    Turn off building the KMPs now that we are using the pvops kernel
    xen.spec
* Thu Nov 19 2015 carnold@suse.com
  - Upstream patches from Jan
    561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-it-is-zero.patch
    561d20a0-x86-hide-MWAITX-from-PV-domains.patch
    561e3283-x86-NUMA-fix-SRAT-table-processor-entry-parsing-and-consumption.patch
    5632118e-arm-Support-hypercall_create_continuation-for-multicall.patch
    56321222-arm-rate-limit-logging-from-unimplemented-PHYSDEVOP-and-HVMOP.patch
    56321249-arm-handle-races-between-relinquish_memory-and-free_domheap_pages.patch
    5632127b-x86-guard-against-undue-super-page-PTE-creation.patch
    5632129c-free-domain-s-vcpu-array.patch (Replaces CVE-2015-7969-xsa149.patch)
    563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch
    563212e4-xenoprof-free-domain-s-vcpu-array.patch
    563212ff-x86-rate-limit-logging-in-do_xen-oprof-pmu-_op.patch
    56323737-libxl-adjust-PoD-target-by-memory-fudge-too.patch
    56377442-x86-PoD-Make-p2m_pod_empty_cache-restartable.patch
    5641ceec-x86-HVM-always-intercept-AC-and-DB.patch (Replaces CVE-2015-5307-xsa156.patch)
    5644b756-x86-HVM-don-t-inject-DB-with-error-code.patch
  - Dropped 55b0a2db-x86-MSI-track-guest-masking.patch
* Thu Nov 19 2015 ohering@suse.de
  - Use upstream variants of block-iscsi and block-nbd
* Thu Nov 19 2015 ohering@suse.de
  - Remove xenalyze.hg, its part of xen-4.6
* Tue Nov 10 2015 carnold@suse.com
  - Update to Xen Version 4.6.0
    xen-4.6.0-testing-src.tar.bz2
    mini-os.tar.bz2
    blktap2-no-uninit.patch
    stubdom-have-iovec.patch
  - Renamed
    xsa149.patch to CVE-2015-7969-xsa149.patch
  - Dropped patches now contained in tarball or unnecessary
    xen-4.5.2-testing-src.tar.bz2
    54c2553c-grant-table-use-uint16_t-consistently-for-offset-and-length.patch
    54ca33bc-grant-table-refactor-grant-copy-to-reduce-duplicate-code.patch
    54ca340e-grant-table-defer-releasing-pages-acquired-in-a-grant-copy.patch
    54f4985f-libxl-fix-libvirtd-double-free.patch
    55103616-vm-assist-prepare-for-discontiguous-used-bit-numbers.patch
    551ac326-xentop-add-support-for-qdisk.patch
    552d0fd2-x86-hvm-don-t-include-asm-spinlock-h.patch
    552d0fe8-x86-mtrr-include-asm-atomic.h.patch
    552d293b-x86-vMSI-X-honor-all-mask-requests.patch
    552d2966-x86-vMSI-X-add-valid-bits-for-read-acceleration.patch
    5537a4d8-libxl-use-DEBUG-log-level-instead-of-INFO.patch
    5548e903-domctl-don-t-truncate-XEN_DOMCTL_max_mem-requests.patch
    5548e95d-x86-allow-to-suppress-M2P-user-mode-exposure.patch
    554c7aee-x86-provide-arch_fetch_and_add.patch
    554c7b00-arm-provide-arch_fetch_and_add.patch
    554cc211-libxl-add-qxl.patch 55534b0a-x86-provide-add_sized.patch
    55534b25-arm-provide-add_sized.patch
    5555a4f8-use-ticket-locks-for-spin-locks.patch
    5555a5b9-x86-arm-remove-asm-spinlock-h.patch
    5555a8ec-introduce-non-contiguous-allocation.patch
    556d973f-unmodified-drivers-tolerate-IRQF_DISABLED-being-undefined.patch
    5576f143-x86-adjust-PV-I-O-emulation-functions-types.patch
    55795a52-x86-vMSI-X-support-qword-MMIO-access.patch
    557eb55f-gnttab-per-active-entry-locking.patch
    557eb5b6-gnttab-introduce-maptrack-lock.patch
    557eb620-gnttab-make-the-grant-table-lock-a-read-write-lock.patch
    557ffab8-evtchn-factor-out-freeing-an-event-channel.patch
    5582bf43-evtchn-simplify-port_is_valid.patch
    5582bf81-evtchn-remove-the-locking-when-unmasking-an-event-channel.patch
    5583d9c5-x86-MSI-X-cleanup.patch
    5583da09-x86-MSI-track-host-and-guest-masking-separately.patch
    5583da64-gnttab-use-per-VCPU-maptrack-free-lists.patch
    5583da8c-gnttab-steal-maptrack-entries-from-other-VCPUs.patch
    5587d711-evtchn-clear-xen_consumer-when-clearing-state.patch
    5587d779-evtchn-defer-freeing-struct-evtchn-s-until-evtchn_destroy_final.patch
    5587d7b7-evtchn-use-a-per-event-channel-lock-for-sending-events.patch
    5587d7e2-evtchn-pad-struct-evtchn-to-64-bytes.patch
    55b0a218-x86-PCI-CFG-write-intercept.patch
    55b0a255-x86-MSI-X-maskall.patch 55b0a283-x86-MSI-X-teardown.patch
    55b0a2ab-x86-MSI-X-enable.patch blktapctrl-close-fifos.patch
    blktapctrl-default-to-ioemu.patch blktapctrl-disable-debug-printf.patch
    blktap-no-uninit.patch blktap-pv-cdrom.patch build-tapdisk-ioemu.patch
    ioemu-bdrv-open-CACHE_WB.patch ioemu-blktap-barriers.patch
    ioemu-blktap-fv-init.patch ioemu-blktap-image-format.patch
    ioemu-blktap-zero-size.patch libxl.set-migration-constraints-from-cmdline.patch
    local_attach_support_for_phy.patch pci-attach-fix.patch
    qemu-xen-upstream-megasas-buildtime.patch tapdisk-ioemu-logfile.patch
    tapdisk-ioemu-shutdown-fix.patch udev-rules.patch xen.build-compare.ipxe.patch
    xen.build-compare.mini-os.patch xen.build-compare.smbiosdate.patch
    xen.build-compare.vgabios.patch xen.build-compare.xen_compile_h.patch
    xl-coredump-file-location.patch
* Thu Nov 05 2015 carnold@suse.com
  - bsc#954405 - VUL-0: CVE-2015-8104: Xen: guest to host DoS by
    triggering an infinite loop in microcode via #DB exception
  - bsc#954018 - VUL-0: CVE-2015-5307: xen: x86: CPU lockup during
    fault delivery (XSA-156)
    CVE-2015-5307-xsa156.patch
* Wed Nov 04 2015 carnold@suse.com
  - Update to Xen 4.5.2
    xen-4.5.2-testing-src.tar.bz2
  - Drop the following
    xen-4.5.1-testing-src.tar.bz2
    552d0f49-x86-traps-identify-the-vcpu-in-context-when-dumping-regs.patch
    5576f178-kexec-add-more-pages-to-v1-environment.patch
    55780be1-x86-EFI-adjust-EFI_MEMORY_WP-handling-for-spec-version-2.5.patch
    558bfaa0-x86-traps-avoid-using-current-too-early.patch
    5592a116-nested-EPT-fix-the-handling-of-nested-EPT.patch
    559b9dd6-x86-p2m-ept-don-t-unmap-in-use-EPT-pagetable.patch
    559bc633-x86-cpupool-clear-proper-cpu_valid-bit-on-CPU-teardown.patch
    559bc64e-credit1-properly-deal-with-CPUs-not-in-any-pool.patch
    559bc87f-x86-hvmloader-avoid-data-corruption-with-xenstore-rw.patch
    559bdde5-pull-in-latest-linux-earlycpio.patch
    55a62eb0-xl-correct-handling-of-extra_config-in-main_cpupoolcreate.patch
    55a66a1e-make-rangeset_report_ranges-report-all-ranges.patch
    55a77e4f-dmar-device-scope-mem-leak-fix.patch
    55c1d83d-x86-gdt-Drop-write-only-xalloc-d-array.patch
    55c3232b-x86-mm-Make-hap-shadow-teardown-preemptible.patch
    55dc78e9-x86-amd_ucode-skip-updates-for-final-levels.patch
    55df2f76-IOMMU-skip-domains-without-page-tables-when-dumping.patch
    55e43fd8-x86-NUMA-fix-setup_node.patch
    55e43ff8-x86-NUMA-don-t-account-hotplug-regions.patch
    55e593f1-x86-NUMA-make-init_node_heap-respect-Xen-heap-limit.patch
    55f2e438-x86-hvm-fix-saved-pmtimer-and-hpet-values.patch
    55f9345b-x86-MSI-fail-if-no-hardware-support.patch
    5604f2e6-vt-d-fix-IM-bit-mask-and-unmask-of-FECTL_REG.patch
    560a4af9-x86-EPT-tighten-conditions-of-IOMMU-mapping-updates.patch
    560a7c36-x86-p2m-pt-delay-freeing-of-intermediate-page-tables.patch
    560a7c53-x86-p2m-pt-ignore-pt-share-flag-for-shadow-mode-guests.patch
    560bd926-credit1-fix-tickling-when-it-happens-from-a-remote-pCPU.patch
    560e6d34-x86-p2m-pt-tighten-conditions-of-IOMMU-mapping-updates.patch
    561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-0.patch
    561d20a0-x86-hide-MWAITX-from-PV-domains.patch
    561e3283-x86-NUMA-fix-SRAT-table-processor-entry-handling.patch
    563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch
    CVE-2015-4106-xsa131-9.patch CVE-2015-3259-xsa137.patch
    CVE-2015-7311-xsa142.patch CVE-2015-7835-xsa148.patch
    xsa139-qemuu.patch xsa140-qemuu-1.patch xsa140-qemuu-2.patch
    xsa140-qemuu-3.patch xsa140-qemuu-4.patch xsa140-qemuu-5.patch
    xsa140-qemuu-6.patch xsa140-qemuu-7.patch xsa140-qemut-1.patch
    xsa140-qemut-2.patch xsa140-qemut-3.patch xsa140-qemut-4.patch
    xsa140-qemut-5.patch xsa140-qemut-6.patch xsa140-qemut-7.patch
    xsa151.patch xsa152.patch xsa153-libxl.patch
    CVE-2015-5154-qemuu-check-array-bounds-before-writing-to-io_buffer.patch
    CVE-2015-5154-qemuu-fix-START-STOP-UNIT-command-completion.patch
    CVE-2015-5154-qemuu-clear-DRQ-after-handling-all-expected-accesses.patch
    CVE-2015-5154-qemut-check-array-bounds-before-writing-to-io_buffer.patch
    CVE-2015-5154-qemut-clear-DRQ-after-handling-all-expected-accesses.patch
    CVE-2015-6815-qemuu-e1000-fix-infinite-loop.patch
    CVE-2015-5239-qemuu-limit-client_cut_text-msg-payload-size.patch
    CVE-2015-5239-qemut-limit-client_cut_text-msg-payload-size.patch"
* Mon Nov 02 2015 carnold@suse.com
  - bsc#950704 - CVE-2015-7970 VUL-1: xen: x86: Long latency
    populate-on-demand operation is not preemptible (XSA-150)
    563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch
* Wed Oct 28 2015 carnold@suse.com
  - Upstream patches from Jan
    5604f239-x86-PV-properly-populate-descriptor-tables.patch
    561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-0.patch
    561d2046-VT-d-use-proper-error-codes-in-iommu_enable_x2apic_IR.patch
    561d20a0-x86-hide-MWAITX-from-PV-domains.patch
    561e3283-x86-NUMA-fix-SRAT-table-processor-entry-handling.patch
* Fri Oct 23 2015 carnold@suse.com
  - bsc#951845 - VUL-0: CVE-2015-7972: xen: x86: populate-on-demand
    balloon size inaccuracy can crash guests (XSA-153)
    xsa153-libxl.patch
* Fri Oct 16 2015 carnold@suse.com
  - bsc#950703 - VUL-1: CVE-2015-7969: xen: leak of main per-domain
    vcpu pointer array (DoS) (XSA-149)
    xsa149.patch
  - bsc#950705 - VUL-1: CVE-2015-7969: xen: x86: leak of per-domain
    profiling-related vcpu pointer array (DoS) (XSA-151)
    xsa151.patch
  - bsc#950706 - VUL-0: CVE-2015-7971: xen: x86: some pmu and
    profiling hypercalls log without rate limiting (XSA-152)
    xsa152.patch
  - Dropped
    55dc7937-x86-IO-APIC-don-t-create-pIRQ-mapping-from-masked-RTE.patch
    5604f239-x86-PV-properly-populate-descriptor-tables.patch
* Thu Oct 15 2015 carnold@suse.com
  - bsc#932267 - VUL-1: CVE-2015-4037: qemu,kvm,xen: insecure
    temporary file use in /net/slirp.c
    CVE-2015-4037-qemuu-smb-config-dir-name.patch
    CVE-2015-4037-qemut-smb-config-dir-name.patch
  - bsc#877642 - VUL-0: CVE-2014-0222: qemu: qcow1: validate L2 table
    size to avoid integer overflows
    CVE-2014-0222-qemuu-qcow1-validate-l2-table-size.patch
    CVE-2014-0222-qemut-qcow1-validate-l2-table-size.patch
* Wed Oct 14 2015 carnold@suse.com
  - bsc#950367 - VUL-0: CVE-2015-7835: xen: x86: Uncontrolled
    creation of large page mappings by PV guests (XSA-148)
    CVE-2015-7835-xsa148.patch
* Tue Oct 06 2015 jfehlig@suse.com
  - bsc#949138 - Setting vcpu affinity under Xen causes libvirtd
    abort
    54f4985f-libxl-fix-libvirtd-double-free.patch
* Tue Oct 06 2015 carnold@suse.com
  - bsc#949046 - Increase %suse_version in SP1 to 1316
    xen.spec
  - Update README.SUSE detailing dom0 ballooning recommendations
* Mon Oct 05 2015 carnold@suse.com
  - bsc#945167 - Running command ’ xl pci-assignable-add 03:10.1’
    secondly show errors
    55f7f9d2-libxl-slightly-refine-pci-assignable-add-remove-handling.patch
  - Upstream patches from Jan
    55f2e438-x86-hvm-fix-saved-pmtimer-and-hpet-values.patch
    55f9345b-x86-MSI-fail-if-no-hardware-support.patch
    5604f239-x86-PV-properly-populate-descriptor-tables.patch
    5604f2e6-vt-d-fix-IM-bit-mask-and-unmask-of-FECTL_REG.patch
    560a4af9-x86-EPT-tighten-conditions-of-IOMMU-mapping-updates.patch
    560a7c36-x86-p2m-pt-delay-freeing-of-intermediate-page-tables.patch
    560a7c53-x86-p2m-pt-ignore-pt-share-flag-for-shadow-mode-guests.patch
    560bd926-credit1-fix-tickling-when-it-happens-from-a-remote-pCPU.patch
    560e6d34-x86-p2m-pt-tighten-conditions-of-IOMMU-mapping-updates.patch
* Fri Oct 02 2015 mlatimer@suse.com
  - bsc#941074 - VmError: Device 51728 (vbd) could not be connected.
    Hotplug scripts not working.
    hotplug-Linux-block-performance-fix.patch
* Wed Sep 23 2015 carnold@suse.com
  - bsc#947165 - VUL-0: CVE-2015-7311: xen: libxl fails to honour
    readonly flag on disks with qemu-xen (xsa-142)
    CVE-2015-7311-xsa142.patch
* Wed Sep 16 2015 cyliu@suse.com
  - bsc#945165 - Xl pci-attach show error with kernel of SLES 12 sp1
    pci-attach-fix.patch
* Tue Sep 15 2015 jfehlig@suse.com
  - bsc#945164 - Xl destroy show error with kernel of SLES 12 sp1
    5537a4d8-libxl-use-DEBUG-log-level-instead-of-INFO.patch
* Wed Sep 09 2015 carnold@suse.com
  - Upstream patches from Jan
    55dc78e9-x86-amd_ucode-skip-updates-for-final-levels.patch
    55dc7937-x86-IO-APIC-don-t-create-pIRQ-mapping-from-masked-RTE.patch
    55df2f76-IOMMU-skip-domains-without-page-tables-when-dumping.patch
    55e43fd8-x86-NUMA-fix-setup_node.patch
    55e43ff8-x86-NUMA-don-t-account-hotplug-regions.patch
    55e593f1-x86-NUMA-make-init_node_heap-respect-Xen-heap-limit.patch
    54c2553c-grant-table-use-uint16_t-consistently-for-offset-and-length.patch
    54ca33bc-grant-table-refactor-grant-copy-to-reduce-duplicate-code.patch
    54ca340e-grant-table-defer-releasing-pages-acquired-in-a-grant-copy.patch
* Tue Sep 08 2015 carnold@suse.com
  - bsc#944463 - VUL-0: CVE-2015-5239: qemu-kvm: Integer overflow in
    vnc_client_read() and protocol_client_msg()
    CVE-2015-5239-qemuu-limit-client_cut_text-msg-payload-size.patch
    CVE-2015-5239-qemut-limit-client_cut_text-msg-payload-size.patch
  - bsc#944697 - VUL-1: CVE-2015-6815: qemu: net: e1000: infinite
    loop issue
    CVE-2015-6815-qemuu-e1000-fix-infinite-loop.patch
    CVE-2015-6815-qemut-e1000-fix-infinite-loop.patch
* Wed Aug 26 2015 carnold@suse.com
  - bnc#935634 - VUL-0: CVE-2015-3259: xen: XSA-137: xl command line
    config handling stack overflow
    55a62eb0-xl-correct-handling-of-extra_config-in-main_cpupoolcreate.patch
* Tue Aug 18 2015 carnold@suse.com
  - bsc#907514 - Bus fatal error & sles12 sudden reboot has been
    observed
  - bsc#910258 - SLES12 Xen host crashes with FATAL NMI after
    shutdown of guest with VT-d NIC
  - bsc#918984 - Bus fatal error & sles11-SP4 sudden reboot has been
    observed
  - bsc#923967 - Partner-L3: Bus fatal error & sles11-SP3 sudden
    reboot has been observed
    552d293b-x86-vMSI-X-honor-all-mask-requests.patch
    552d2966-x86-vMSI-X-add-valid-bits-for-read-acceleration.patch
    5576f143-x86-adjust-PV-I-O-emulation-functions-types.patch
    55795a52-x86-vMSI-X-support-qword-MMIO-access.patch
    5583d9c5-x86-MSI-X-cleanup.patch
    5583da09-x86-MSI-track-host-and-guest-masking-separately.patch
    55b0a218-x86-PCI-CFG-write-intercept.patch
    55b0a255-x86-MSI-X-maskall.patch
    55b0a283-x86-MSI-X-teardown.patch
    55b0a2ab-x86-MSI-X-enable.patch
    55b0a2db-x86-MSI-track-guest-masking.patch
  - Upstream patches from Jan
    552d0f49-x86-traps-identify-the-vcpu-in-context-when-dumping-regs.patch
    559bc633-x86-cpupool-clear-proper-cpu_valid-bit-on-CPU-teardown.patch
    559bc64e-credit1-properly-deal-with-CPUs-not-in-any-pool.patch
    559bc87f-x86-hvmloader-avoid-data-corruption-with-xenstore-rw.patch
    55a66a1e-make-rangeset_report_ranges-report-all-ranges.patch
    55a77e4f-dmar-device-scope-mem-leak-fix.patch
    55c1d83d-x86-gdt-Drop-write-only-xalloc-d-array.patch
    55c3232b-x86-mm-Make-hap-shadow-teardown-preemptible.patch
  - Dropped for upstream version
    x86-MSI-mask.patch
    x86-MSI-pv-unmask.patch
    x86-MSI-X-enable.patch
    x86-MSI-X-maskall.patch
    x86-MSI-X-teardown.patch
    x86-pci_cfg_okay.patch
    x86-PCI-CFG-write-intercept.patch
* Tue Jul 28 2015 carnold@suse.com
  - bsc#939712 - VUL-0: XSA-140: QEMU leak of uninitialized heap
    memory in rtl8139 device model
    xsa140-qemuu-1.patch
    xsa140-qemuu-2.patch
    xsa140-qemuu-3.patch
    xsa140-qemuu-4.patch
    xsa140-qemuu-5.patch
    xsa140-qemuu-6.patch
    xsa140-qemuu-7.patch
    xsa140-qemut-1.patch
    xsa140-qemut-2.patch
    xsa140-qemut-3.patch
    xsa140-qemut-4.patch
    xsa140-qemut-5.patch
    xsa140-qemut-6.patch
    xsa140-qemut-7.patch
  - bsc#939709 - VUL-0: XSA-139: xen: Use after free in QEMU/Xen
    block unplug protocol
    xsa139-qemuu.patch
* Tue Jul 21 2015 ohering@suse.de
  - bsc#937371 - xen vm's running after reboot
    xendomains-libvirtd-conflict.patch
* Thu Jul 16 2015 carnold@suse.com
  - bsc#938344 - VUL-0: CVE-2015-5154: qemu,kvm,xen: host code
    execution via IDE subsystem CD-ROM
    CVE-2015-5154-qemuu-check-array-bounds-before-writing-to-io_buffer.patch
    CVE-2015-5154-qemut-check-array-bounds-before-writing-to-io_buffer.patch
    CVE-2015-5154-qemuu-fix-START-STOP-UNIT-command-completion.patch
    CVE-2015-5154-qemut-fix-START-STOP-UNIT-command-completion.patch
    CVE-2015-5154-qemuu-clear-DRQ-after-handling-all-expected-accesses.patch
    CVE-2015-5154-qemut-clear-DRQ-after-handling-all-expected-accesses.patch
* Wed Jul 15 2015 ohering@suse.de
  - Remove xendomains.service from systemd preset file because it
    conflicts with libvirt-guests.service (bnc#937371)
    Its up to the admin to run systemctl enable xendomains.service
* Wed Jul 08 2015 carnold@suse.com
  - bnc#935634 - VUL-0: CVE-2015-3259: xen: XSA-137: xl command line
    config handling stack overflow
    CVE-2015-3259-xsa137.patch
  - Upstream patches from Jan
    558bfaa0-x86-traps-avoid-using-current-too-early.patch
    5592a116-nested-EPT-fix-the-handling-of-nested-EPT.patch
    559b9dd6-x86-p2m-ept-don-t-unmap-in-use-EPT-pagetable.patch
    559bdde5-pull-in-latest-linux-earlycpio.patch
  - Upstream patches from Jan pending review
    552d0fd2-x86-hvm-don-t-include-asm-spinlock-h.patch
    552d0fe8-x86-mtrr-include-asm-atomic.h.patch
    552d293b-x86-vMSI-X-honor-all-mask-requests.patch
    552d2966-x86-vMSI-X-add-valid-bits-for-read-acceleration.patch
    554c7aee-x86-provide-arch_fetch_and_add.patch
    554c7b00-arm-provide-arch_fetch_and_add.patch
    55534b0a-x86-provide-add_sized.patch
    55534b25-arm-provide-add_sized.patch
    5555a4f8-use-ticket-locks-for-spin-locks.patch
    5555a5b9-x86-arm-remove-asm-spinlock-h.patch
    5555a8ec-introduce-non-contiguous-allocation.patch
    55795a52-x86-vMSI-X-support-qword-MMIO-access.patch
    557eb55f-gnttab-per-active-entry-locking.patch
    557eb5b6-gnttab-introduce-maptrack-lock.patch
    557eb620-gnttab-make-the-grant-table-lock-a-read-write-lock.patch
    557ffab8-evtchn-factor-out-freeing-an-event-channel.patch
    5582bf43-evtchn-simplify-port_is_valid.patch
    5582bf81-evtchn-remove-the-locking-when-unmasking-an-event-channel.patch
    5583d9c5-x86-MSI-X-cleanup.patch
    5583da09-x86-MSI-track-host-and-guest-masking-separately.patch
    5583da64-gnttab-use-per-VCPU-maptrack-free-lists.patch
    5583da8c-gnttab-steal-maptrack-entries-from-other-VCPUs.patch
    5587d711-evtchn-clear-xen_consumer-when-clearing-state.patch
    5587d779-evtchn-defer-freeing-struct-evtchn-s-until-evtchn_destroy_final.patch
    5587d7b7-evtchn-use-a-per-event-channel-lock-for-sending-events.patch
    5587d7e2-evtchn-pad-struct-evtchn-to-64-bytes.patch
    x86-MSI-pv-unmask.patch
    x86-pci_cfg_okay.patch
    x86-PCI-CFG-write-intercept.patch
    x86-MSI-X-maskall.patch
    x86-MSI-X-teardown.patch
    x86-MSI-X-enable.patch
    x86-MSI-mask.patch
* Tue Jul 07 2015 ohering@suse.de
  - Adjust more places to use br0 instead of xenbr0
* Tue Jun 30 2015 carnold@suse.com
  - bnc#936516 - xen fails to build with kernel update(4.1.0 from
    stable)
    556d973f-unmodified-drivers-tolerate-IRQF_DISABLED-being-undefined.patch
* Fri Jun 26 2015 carnold@suse.com
  - Update to Xen Version 4.5.1 FCS (fate#315675)
    xen-4.5.1-testing-src.tar.bz2
  - Dropped patches now contained in tarball
    556c2cf2-x86-don-t-crash-mapping-a-page-using-EFI-rt-page-tables.patch
    556d9718-efi-fix-allocation-problems-if-ExitBootServices-fails.patch
    556eabf7-x86-apic-Disable-the-LAPIC-later-in-smp_send_stop.patch
    556eac15-x86-crash-don-t-use-set_fixmap-in-the-crash-path.patch
    55780aaa-efi-avoid-calling-boot-services-after-ExitBootServices.patch
    55780aff-x86-EFI-fix-EFI_MEMORY_WP-handling.patch
    55780b43-EFI-early-add-mapbs-to-map-EfiBootServices-Code-Data.patch
    55780b97-EFI-support-default-attributes-to-map-Runtime-service-areas.patch
    5513b458-allow-reboot-overrides-when-running-under-EFI.patch
    5513b4d1-dont-apply-reboot-quirks-if-reboot-set-by-user.patch
    5576f178-kexec-add-more-pages-to-v1-environment.patch
    5535f633-dont-leak-hypervisor-stack-to-toolstacks.patch
    CVE-2015-3456-xsa133-qemuu.patch
    CVE-2015-3456-xsa133-qemut.patch
    qemu-MSI-X-enable-maskall.patch
    qemu-MSI-X-latch-writes.patch
    x86-MSI-X-guest-mask.patch
* Thu Jun 25 2015 jfehlig@suse.com
  - Replace 5124efbe-add-qxl-support.patch with the variant that
    finally made it upstream, 554cc211-libxl-add-qxl.patch
* Wed Jun 10 2015 carnold@suse.com
  - bsc#931627 - VUL-0: CVE-2015-4105: XSA-130: xen: Guest triggerable
    qemu MSI-X pass-through error messages
    qemu-MSI-X-latch-writes.patch
  - bsc#907514 - Bus fatal error & sles12 sudden reboot has been observed
  - bsc#910258 - SLES12 Xen host crashes with FATAL NMI after shutdown
    of guest with VT-d NIC
  - bsc#918984 - Bus fatal error & sles11-SP4 sudden reboot has been
    observed
  - bsc#923967 - Partner-L3: Bus fatal error & sles11-SP3 sudden reboot
    has been observed
    x86-MSI-X-teardown.patch
    x86-MSI-X-enable.patch
    x86-MSI-X-guest-mask.patch
    x86-MSI-X-maskall.patch
    qemu-MSI-X-enable-maskall.patch
  - Upstream patches from Jan
    55780aaa-efi-avoid-calling-boot-services-after-ExitBootServices.patch
    55780aff-x86-EFI-fix-EFI_MEMORY_WP-handling.patch
    55780b43-EFI-early-add-mapbs-to-map-EfiBootServices-Code-Data.patch
    55780b97-EFI-support-default-attributes-to-map-Runtime-service-areas.patch
    55780be1-x86-EFI-adjust-EFI_MEMORY_WP-handling-for-spec-version-2.5.patch
    55103616-vm-assist-prepare-for-discontiguous-used-bit-numbers.patch
    5548e95d-x86-allow-to-suppress-M2P-user-mode-exposure.patch
  - Dropped the following patches now contained in the tarball
    xen-no-array-bounds.patch CVE-2015-4103-xsa128.patch
    CVE-2015-4104-xsa129.patch CVE-2015-4105-xsa130.patch
    CVE-2015-4106-xsa131-1.patch CVE-2015-4106-xsa131-2.patch
    CVE-2015-4106-xsa131-3.patch CVE-2015-4106-xsa131-4.patch
    CVE-2015-4106-xsa131-5.patch CVE-2015-4106-xsa131-6.patch
    CVE-2015-4106-xsa131-7.patch CVE-2015-4106-xsa131-8.patch
* Wed Jun 03 2015 carnold@suse.com
  - Update to Xen 4.5.1 RC2
  - bsc#931628 - VUL-0: CVE-2015-4106: XSA-131: xen: Unmediated PCI
    register access in qemu
    CVE-2015-4106-xsa131-1.patch
    CVE-2015-4106-xsa131-2.patch
    CVE-2015-4106-xsa131-3.patch
    CVE-2015-4106-xsa131-4.patch
    CVE-2015-4106-xsa131-5.patch
    CVE-2015-4106-xsa131-6.patch
    CVE-2015-4106-xsa131-7.patch
    CVE-2015-4106-xsa131-8.patch
    CVE-2015-4106-xsa131-9.patch
  - bsc#931627 - VUL-0: CVE-2015-4105: XSA-130: xen: Guest triggerable
    qemu MSI-X pass-through error messages
    CVE-2015-4105-xsa130.patch
  - bsc#931626 - VUL-0: CVE-2015-4104: XSA-129: xen: PCI MSI mask
    bits inadvertently exposed to guests
    CVE-2015-4104-xsa129.patch
  - bsc#931625 - VUL-0: CVE-2015-4103: XSA-128: xen: Potential
    unintended writes to host MSI message data field via qemu
    CVE-2015-4103-xsa128.patch
  - Upstream patches from Jan
    5548e903-domctl-don-t-truncate-XEN_DOMCTL_max_mem-requests.patch
    556c2cf2-x86-don-t-crash-mapping-a-page-using-EFI-rt-page-tables.patch
    556d9718-efi-fix-allocation-problems-if-ExitBootServices-fails.patch
    556d973f-unmodified-drivers-tolerate-IRQF_DISABLED-being-undefined.patch
    556eabf7-x86-apic-Disable-the-LAPIC-later-in-smp_send_stop.patch
    556eac15-x86-crash-don-t-use-set_fixmap-in-the-crash-path.patch
* Wed May 20 2015 ohering@suse.de
  - Add DefaultDependencies=no to xen-dom0-modules.service because
    it has to run before proc-xen.mount
* Tue May 19 2015 carnold@suse.com
  - Update to Xen 4.5.1 RC1
* Fri May 15 2015 ohering@suse.de
  - Update blktap-no-uninit.patch to work with gcc-4.5
* Mon May 11 2015 carnold@suse.com
  - bsc#927967 - VUL-0: CVE-2015-3340: xen: Information leak through
    XEN_DOMCTL_gettscinfo (XSA-132)
    5535f633-dont-leak-hypervisor-stack-to-toolstacks.patch
* Thu May 07 2015 carnold@suse.com
  - bnc#929339 - VUL-0: CVE-2015-3456: qemu kvm xen: VENOM qemu
    floppy driver host code execution
    CVE-2015-3456-xsa133-qemuu.patch
    CVE-2015-3456-xsa133-qemut.patch
* Mon Apr 27 2015 carnold@suse.com
  - bsc#928783 - Reboot failure; Request backport of upstream Xen
    patch to 4.5.0, or update pkgs to 4.5.1
    5513b458-allow-reboot-overrides-when-running-under-EFI.patch
    5513b4d1-dont-apply-reboot-quirks-if-reboot-set-by-user.patch
* Tue Apr 21 2015 ohering@suse.de
  - bnc#927750 - Avoid errors reported by system-modules-load.service
* Wed Apr 08 2015 rguenther@suse.com
  - Add xen-no-array-bounds.patch and blktap-no-uninit.patch to selectively
    turn errors back to warnings to fix build with GCC 5.
  - Amend xen.stubdom.newlib.patch to pull in declaration of strcmp to
    avoid implicit-fortify-decl rpmlint error.
  - Fix quoting of __SMBIOS_DATE__ in xen.build-compare.smbiosdate.patch.
* Fri Apr 03 2015 carnold@suse.com
  - xentop: Fix memory leak on read failure
    551ac326-xentop-add-support-for-qdisk.patch
* Tue Mar 31 2015 carnold@suse.com
  - Dropped xentop-add-support-for-qdisk.patch in favor of upstream
    version
    551ac326-xentop-add-support-for-qdisk.patch
* Mon Mar 16 2015 carnold@suse.com
  - Enable spice support in qemu for x86_64
    5124efbe-add-qxl-support.patch
    qemu-xen-enable-spice-support.patch
* Thu Mar 12 2015 rguenther@suse.com
  - Add xen-c99-fix.patch to remove pointless inline specifier on
    function declarations which break build with a C99 compiler which
    GCC 5 is by default. (bsc#921994)
  - Add ipxe-no-error-logical-not-parentheses.patch to supply
    - Wno-logical-not-parentheses to the ipxe build to fix
    breakage with GCC 5. (bsc#921994)
* Wed Mar 11 2015 carnold@suse.com
  - bnc#921842 - Xentop doesn't display disk statistics for VMs using
    qdisks
    xentop-add-support-for-qdisk.patch
* Tue Feb 24 2015 meissner@suse.com
  - Disable the PIE enablement done for Factory, as the XEN code
    is not buildable with PIE and it does not make much sense
    to build the hypervisor code with it.
* Tue Feb 17 2015 carnold@suse.com
  - bnc#918169 - XEN fixes required to work with Kernel 3.19.0
    xen.spec
* Tue Feb 10 2015 ohering@suse.de
  - Package xen.changes because its referenced in xen.spec
* Wed Jan 28 2015 carnold@suse.com
  - Update seabios to rel-1.7.5 which is the correct version for
    Xen 4.5
* Wed Jan 14 2015 carnold@suse.com
  - Update to Xen 4.5.0 FCS
* Wed Jan 14 2015 ohering@suse.de
  - Include systemd presets in 13.2 and older
* Mon Jan 12 2015 ohering@suse.de
  - bnc#897352 - Enable xencommons/xendomains only during fresh install
  - disable restart on upgrade because the toolstack is not restartable
* Tue Dec 16 2014 ohering@suse.de
  - adjust seabios, vgabios, stubdom and hvmloader build to reduce
    build-compare noise
    xen.build-compare.mini-os.patch
    xen.build-compare.smbiosdate.patch
    xen.build-compare.ipxe.patch
    xen.build-compare.vgabios.patch
    xen.build-compare.seabios.patch
    xen.build-compare.man.patch
* Mon Dec 15 2014 carnold@suse.com
  - Update to Xen 4.5.0 RC4
* Wed Dec 10 2014 ohering@suse.de
  - Remove xend specific if-up scripts
    Recording bridge slaves is a generic task which should be handled
    by generic network code
* Tue Dec 09 2014 ohering@suse.de
  - Use systemd features from upstream
    requires updated systemd-presets-branding package
* Thu Dec 04 2014 carnold@suse.com
  - Update to Xen 4.5.0 RC3
* Thu Dec 04 2014 ohering@suse.de
  - Set GIT, WGET and FTP to /bin/false
* Wed Dec 03 2014 ohering@suse.de
  - Use new configure features instead of make variables
    xen.stubdom.newlib.patch
* Wed Nov 19 2014 ohering@suse.de
  - adjust docs and xen build to reduce build-compare noise
    xen.build-compare.doc_html.patch
    xen.build-compare.xen_compile_h.patch
* Mon Nov 17 2014 ohering@suse.de
  - Drop trailing B_CNT from XEN_EXTRAVERSION to reduce build-compare noise
* Tue Nov 11 2014 carnold@suse.com
  - Update to Xen 4.5.0 RC2
* Thu Oct 23 2014 carnold@suse.com
  - Update to Xen 4.5.0 RC1
    xen-4.5.0-testing-src.tar.bz2
  - Remove all patches now contained in the new tarball
    xen-4.4.1-testing-src.tar.bz2
    5315a3bb-x86-don-t-propagate-acpi_skip_timer_override-do-Dom0.patch
    5315a43a-x86-ACPI-also-print-address-space-for-PM1x-fields.patch
    53299d8f-xenconsole-reset-tty-on-failure.patch
    53299d8f-xenconsole-tolerate-tty-errors.patch
    5346a7a0-x86-AMD-support-further-feature-masking-MSRs.patch
    53563ea4-x86-MSI-drop-workaround-for-insecure-Dom0-kernels.patch
    537c9c77-libxc-check-return-values-on-mmap-and-madvise.patch
    537cd0b0-hvmloader-also-cover-PCI-MMIO-ranges-above-4G-with-UC-MTRR-ranges.patch
    537cd0cc-hvmloader-PA-range-0xfc000000-0xffffffff-should-be-UC.patch
    539ebe62-x86-EFI-improve-boot-time-diagnostics.patch
    53aac342-x86-HVM-consolidate-and-sanitize-CR4-guest-reserved-bit-determination.patch
    53c9151b-Fix-xl-vncviewer-accesses-port-0-by-any-invalid-domid.patch
    53d124e7-fix-list_domain_details-check-config-data-length-0.patch
    53dba447-x86-ACPI-allow-CMOS-RTC-use-even-when-ACPI-says-there-is-none.patch
    53df727b-x86-HVM-extend-LAPIC-shortcuts-around-P2M-lookups.patch
    53e8be5f-x86-vHPET-use-rwlock-instead-of-simple-one.patch
    53f737b1-VMX-fix-DebugCtl-MSR-clearing.patch
    53f7386d-x86-irq-process-softirqs-in-irq-keyhandlers.patch
    53fcebab-xen-pass-kernel-initrd-to-qemu.patch
    53ff3659-x86-consolidate-boolean-inputs-in-hvm-and-p2m.patch
    53ff36ae-x86-hvm-treat-non-insn-fetch-NPF-also-as-read-violations.patch
    53ff36d5-x86-mem_event-deliver-gla-fault-EPT-violation-information.patch
    53ff3716-x86-ats-Disable-Address-Translation-Services-by-default.patch
    53ff3899-x86-NMI-allow-processing-unknown-NMIs-with-watchdog.patch
    54005472-EPT-utilize-GLA-GPA-translation-known-for-certain-faults.patch
    540effe6-evtchn-check-control-block-exists-when-using-FIFO-based-events.patch
    540f2624-x86-idle-add-barriers-to-CLFLUSH-workaround.patch
    541825dc-VMX-don-t-leave-x2APIC-MSR-intercepts-disabled.patch
    541ad385-x86-suppress-event-check-IPI-to-MWAITing-CPUs.patch
    541ad3ca-x86-HVM-batch-vCPU-wakeups.patch
    541ad81a-VT-d-suppress-UR-signaling-for-further-desktop-chipsets.patch
    54216833-x86-shadow-fix-race-when-sampling-dirty-vram-state.patch
    54216882-x86-emulate-check-cpl-for-all-privileged-instructions.patch
    542168ae-x86emul-only-emulate-swint-injection-for-real-mode.patch
    54228a37-x86-EFI-fix-freeing-of-uninitialized-pointer.patch
    5423e61c-x86emul-fix-SYSCALL-SYSENTER-SYSEXIT-emulation.patch
    5424057f-x86-HVM-fix-miscellaneous-aspects-of-x2APIC-emulation.patch
    542405b4-x86-HVM-fix-ID-handling-of-x2APIC-emulation.patch
    542bf997-x86-HVM-properly-bound-x2APIC-MSR-range.patch
    54325cc0-x86-MSI-fix-MSI-X-case-of-freeing-IRQ.patch
    54325d2f-x86-restore-reserving-of-IO-APIC-pages-in-XENMEM_machine_memory_map-output.patch
    54325d95-don-t-allow-Dom0-access-to-IOMMUs-MMIO-pages.patch
    54325ecc-AMD-guest_iommu-properly-disable-guest-iommu-support.patch
    54325f3c-x86-paging-make-log-dirty-operations-preemptible.patch
    54379e6d-x86-vlapic-don-t-silently-accept-bad-vectors.patch
    CVE-2013-4540-qemu.patch qemu-support-xen-hvm-direct-kernel-boot.patch
    qemu-xen-upstream-blkif-discard.patch change-vnc-passwd.patch
    libxc-pass-errno-to-callers-of-xc_domain_save.patch
    libxl.honor-more-top-level-vfb-options.patch
    libxl.add-option-for-discard-support-to-xl-disk-conf.patch
    libxl.introduce-an-option-to-disable-the-non-O_DIRECT-workaround.patch
    x86-dom-print.patch x86-extra-trap-info.patch tmp_build.patch
    xl-check-for-libvirt-managed-domain.patch disable-wget-check.patch
  - Xend/xm is no longer supported and is not part of the upstream code. Remove
    all xend/xm specific patches, configs, and scripts
    xen-xmexample.patch bridge-opensuse.patch xmexample.disks xmclone.sh
    init.xend xend-relocation.sh xend.service xend-relocation-server.fw
    domUloader.py xmexample.domUloader xmexample.disks
    bridge-vlan.patch bridge-bonding.patch bridge-record-creation.patch
    network-nat-open-SuSEfirewall2-FORWARD.patch
    xend-set-migration-constraints-from-cmdline.patch
    xen.migrate.tools-xend_move_assert_to_exception_block.patch
    xend-pvscsi-recognize-also-SCSI-CDROM-devices.patch
    xend-config.patch xend-max-free-mem.patch xend-hvm-default-pae.patch
    xend-vif-route-ifup.patch xend-xenapi-console-protocol.patch xend-core-dump-loc.patch
    xend-xen-api-auth.patch xend-checkpoint-rename.patch xend-xm-save-check-file.patch
    xend-xm-create-xflag.patch xend-domu-usb-controller.patch xend-devid-or-name.patch
    xend-migration-domname-fix.patch xend-del_usb_xend_entry.patch xend-xen-domUloader.patch
    xend-multi-xvdp.patch xend-check_device_status.patch xend-change_home_server.patch
    xend-minimum-restart-time.patch xend-disable-internal-logrotate.patch xend-config-enable-dump-comment.patch
    xend-tools-watchdog-support.patch xend-console-port-restore.patch xend-vcpu-affinity-fix.patch
    xend-migration-bridge-check.patch xend-managed-pci-device.patch xend-hvm-firmware-passthrough.patch
    xend-cpuinfo-model-name.patch xend-xm-reboot-fix.patch xend-domain-lock.patch
    xend-domain-lock-sfex.patch xend-32on64-extra-mem.patch xend-hv_extid_compatibility.patch
    xend-xenpaging.autostart.patch xend-remove-xm-deprecation-warning.patch libxen_permissive.patch
    tmp-initscript-modprobe.patch init.xendomains xendomains.service
    xen-watchdog.service xen-updown.sh
* Thu Oct 16 2014 carnold@suse.com
  - bnc#901317 - L3: increase limit domUloader to 32MB
    domUloader.py
* Tue Oct 14 2014 carnold@suse.com
  - bnc#898772 - SLES 12 RC3 - XEN Host crashes when assigning non-VF
    device (SR-IOV) to guest
    54325cc0-x86-MSI-fix-MSI-X-case-of-freeing-IRQ.patch
  - bnc#882089 - Windows 2012 R2 fails to boot up with greater than
    60 vcpus
    54325ecc-AMD-guest_iommu-properly-disable-guest-iommu-support.patch
  - bnc#826717 - VUL-0: CVE-2013-3495: XSA-59: xen: Intel VT-d
    Interrupt Remapping engines can be evaded by native NMI interrupts
    541ad81a-VT-d-suppress-UR-signaling-for-further-desktop-chipsets.patch
  - Upstream patches from Jan
    540effe6-evtchn-check-control-block-exists-when-using-FIFO-based-events.patch (Replaces xsa107.patch)
    54216833-x86-shadow-fix-race-when-sampling-dirty-vram-state.patch (Replaces xsa104.patch)
    54216882-x86-emulate-check-cpl-for-all-privileged-instructions.patch (Replaces xsa105.patch)
    542168ae-x86emul-only-emulate-swint-injection-for-real-mode.patch (Replaces xsa106.patch)
    54228a37-x86-EFI-fix-freeing-of-uninitialized-pointer.patch
    5423e61c-x86emul-fix-SYSCALL-SYSENTER-SYSEXIT-emulation.patch
    5424057f-x86-HVM-fix-miscellaneous-aspects-of-x2APIC-emulation.patch
    542405b4-x86-HVM-fix-ID-handling-of-x2APIC-emulation.patch
    542bf997-x86-HVM-properly-bound-x2APIC-MSR-range.patch (Replaces xsa108.patch)
    54325d2f-x86-restore-reserving-of-IO-APIC-pages-in-XENMEM_machine_memory_map-output.patch
    54325d95-don-t-allow-Dom0-access-to-IOMMUs-MMIO-pages.patch
    54325f3c-x86-paging-make-log-dirty-operations-preemptible.patch (Replaces xsa97.patch)
    54379e6d-x86-vlapic-don-t-silently-accept-bad-vectors.patch

Files

/usr/lib/libxencall.so.1
/usr/lib/libxencall.so.1.2
/usr/lib/libxenctrl.so.4.13
/usr/lib/libxenctrl.so.4.13.0
/usr/lib/libxendevicemodel.so.1
/usr/lib/libxendevicemodel.so.1.3
/usr/lib/libxenevtchn.so.1
/usr/lib/libxenevtchn.so.1.1
/usr/lib/libxenforeignmemory.so.1
/usr/lib/libxenforeignmemory.so.1.3
/usr/lib/libxenfsimage.so.4.13
/usr/lib/libxenfsimage.so.4.13.0
/usr/lib/libxengnttab.so.1
/usr/lib/libxengnttab.so.1.2
/usr/lib/libxenguest.so.4.13
/usr/lib/libxenguest.so.4.13.0
/usr/lib/libxenlight.so.4.13
/usr/lib/libxenlight.so.4.13.0
/usr/lib/libxenstat.so.4.13
/usr/lib/libxenstat.so.4.13.0
/usr/lib/libxenstore.so.3.0
/usr/lib/libxenstore.so.3.0.3
/usr/lib/libxentoolcore.so.1
/usr/lib/libxentoolcore.so.1.0
/usr/lib/libxentoollog.so.1
/usr/lib/libxentoollog.so.1.0
/usr/lib/libxenvchan.so.4.13
/usr/lib/libxenvchan.so.4.13.0
/usr/lib/libxlutil.so.4.13
/usr/lib/libxlutil.so.4.13.0
/usr/lib/xenfsimage
/usr/lib/xenfsimage/ext2fs
/usr/lib/xenfsimage/ext2fs/fsimage.so
/usr/lib/xenfsimage/fat
/usr/lib/xenfsimage/fat/fsimage.so
/usr/lib/xenfsimage/iso9660
/usr/lib/xenfsimage/iso9660/fsimage.so
/usr/lib/xenfsimage/reiserfs
/usr/lib/xenfsimage/reiserfs/fsimage.so
/usr/lib/xenfsimage/ufs
/usr/lib/xenfsimage/ufs/fsimage.so
/usr/lib/xenfsimage/xfs
/usr/lib/xenfsimage/xfs/fsimage.so
/usr/lib/xenfsimage/zfs
/usr/lib/xenfsimage/zfs/fsimage.so


Generated by rpm2html 1.8.1

Fabrice Bellet, Fri Jan 10 23:46:48 2020