Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

xen-libs-4.13.0_04-1.1 RPM for i586

From OpenSuSE Tumbleweed for i586

Name: xen-libs Distribution: openSUSE Tumbleweed
Version: 4.13.0_04 Vendor: openSUSE
Release: 1.1 Build date: Tue Dec 24 01:37:02 2019
Group: System/Kernel Build host: build36
Size: 1882416 Source RPM: xen-4.13.0_04-1.1.src.rpm
Packager: https://bugs.opensuse.org
Url: http://www.cl.cam.ac.uk/Research/SRG/netos/xen/
Summary: Xen Virtualization: Libraries
Xen is a virtual machine monitor for x86 that supports execution of
multiple guest operating systems with unprecedented levels of
performance and resource isolation.

This package contains the libraries used to interact with the Xen
virtual machine monitor.

In addition to this package you need to install kernel-xen, xen and
xen-tools to use Xen.


Authors:
--------
    Ian Pratt <ian.pratt@cl.cam.ac.uk>

Provides

Requires

License

GPL-2.0-only

Changelog

* Wed Dec 18 2019 carnold@suse.com
  - bsc#1159320 - Xen logrotate file needs updated
    logrotate.conf
* Wed Dec 18 2019 carnold@suse.com
  - Update to Xen 4.13.0 FCS release
    xen-4.13.0-testing-src.tar.bz2
    * Core Scheduling (contributed by SUSE)
    * Branch hardening to mitigate against Spectre v1 (contributed by Citrix)
    * Late uCode loading (contributed by Intel)
    * Improved live-patching build tools (contributed by AWS)
    * OP-TEE support (contributed by EPAM)
    * Renesas R-CAR IPMMU-VMSA driver (contributed by EPAM)
    * Dom0-less passthrough and ImageBuilder (contributed by XILINX)
    * Support for new Hardware
* Tue Dec 03 2019 carnold@suse.com
  - Update to Xen 4.13.0 RC4 release
    xen-4.13.0-testing-src.tar.bz2
  - Rebase libxl.pvscsi.patch
* Mon Nov 25 2019 carnold@suse.com
  - Update to Xen 4.13.0 RC3 release
    xen-4.13.0-testing-src.tar.bz2
  - Drop python38-build.patch
* Tue Nov 12 2019 carnold@suse.com
  - Update to Xen 4.13.0 RC2 release
    xen-4.13.0-testing-src.tar.bz2
* Tue Oct 29 2019 Matej Cepl <mcepl@suse.com>
  - Add python38-build.patch fixing build with Python 3.8 (add
    - -embed to python-config call)
* Mon Oct 14 2019 carnold@suse.com
  - Update to Xen 4.13.0 RC1 release
    xen-4.13.0-testing-src.tar.bz2
  - Drop patches contained in new tarball or invalid
    5ca7660f-x86-entry-drop-unused-includes.patch
    5cab2a6b-x86-ACPI-also-parse-AMD-tables-early.patch
    5cab2ab7-x86-IOMMU-introduce-init-ops.patch
    5cab2ae8-x86-IOMMU-abstract-iommu_supports_eim.patch
    5cab2b4e-x86-IOMMU-abstract-iommu_enable_x2apic_IR.patch
    5cab2b95-x86-IOMMU-initialize-iommu_ops-in.patch
    5cac9a4b-x86-IOMMU-abstract-adjust_vtd_irq_affinities.patch
    5cdeac7f-AMD-IOMMU-adjust-IOMMU-list-head-init.patch
    5cf8da09-adjust-sysdom-creation-call-earlier-on-x86.patch
    5d0cf4e4-AMD-IOMMU-initialize-IRQ-tasklet-once.patch
    5d149bb0-AMD-IOMMU-dont-add-IOMMUs.patch
    5d1b3fab-AMD-IOMMU-restrict-feature-logging.patch
    5d358508-x86-IRQ-desc-affinity-represents-request.patch
    5d358534-x86-IRQ-consolidate-arch-cpu_mask-use.patch
    5d358a67-AMD-IOMMU-pass-IOMMU-to-iterate_ivrs_entries-cb.patch
    5d358a92-AMD-IOMMU-pass-IOMMU-to-amd_iommu_alloc_intremap_table.patch
    5d39811c-x86-IOMMU-dont-restrict-IRQ-affinities.patch
    5d417813-AMD-IOMMU-bitfield-extended-features.patch
    5d417838-AMD-IOMMU-bitfield-control-reg.patch
    5d41785b-AMD-IOMMU-bitfield-IRTE.patch
    5d41787e-AMD-IOMMU-pass-IOMMU-to-gfu-intremap-entry.patch
    5d4178ad-AMD-IOMMU-128bit-non-guest-APIC-IRTE.patch
    5d4178fc-AMD-IOMMU-split-amd_iommu_init_one.patch
    5d41793f-AMD-IOMMU-allow-enabling-without-IRQ.patch
    5d417a16-AMD-IOMMU-adjust-IRQ-setup-for-x2APIC.patch
    5d417ab6-AMD-IOMMU-enable-x2APIC-mode.patch
    5d417b38-AMD-IOMMU-correct-IRTE-updating.patch
    5d417b6a-AMD-IOMMU-dont-needlessly-log-headers.patch
    5d419d49-x86-spec-ctrl-report-proper-status.patch
    5d43253c-x86-ucode-always-collect_cpu_info-at-boot.patch
    5d4a9d25-AMD-IOMMU-drop-not-found-message.patch
    5d4aa36f-x86-apic-enable-x2APIC-mode-earlier.patch
    5d4afa7a-credit2-fix-memory-leak.patch
    5d4d850a-introduce-bss-percpu-page-aligned.patch
    5d516531-x86-xpti-dont-leak-TSS-adjacent-data.patch
    5d5bf475-x86-PV-fix-handling-of-iommu-mappings.patch
    5d6524ca-x86-mm-correctly-init-M2P-entries.patch
    5d67ceaf-x86-properly-gate-PKU-clearing.patch
    5d70bfba-x86-shadow-dont-enable-with-too-small-allocation.patch
    5d779811-x86-fix-CPUID7-0-eax-levelling-MSR.patch
    5d77b40f-fix-hvm_all_ioreq_servers_add_vcpu-cleanup.patch
    5d80e7c0-AMD-IOMMU-free-shared-IRT-once.patch
    5d80e80d-AMD-IOMMU-valid-flag-for-IVRS-mappings.patch
    5d80e82e-AMD-IOMMU-alloc_intremap_table-callers-handle-errors.patch
    5d80e857-x86-PCI-read-MSI-X-table-entry-count-early.patch
    5d80ea13-vpci-honor-read-only-devices.patch
    5d89d8d9-libxc-x86-avoid-overflow-in-CPUID-APIC-ID.patch
    5d8b715f-ACPI-cpuidle-bump-max-num-of-states.patch
    5d8b72e5-AMD-IOMMU-dont-blindly-alloc-intremap-tables.patch
    5d8b730e-AMD-IOMMU-phantom-funcs-share-intremap-tables.patch
    5d8b733b-x86-PCI-read-max-MSI-vector-count-early.patch
    5d8b736d-AMD-IOMMU-replace-INTREMAP_ENTRIES.patch
    5d8b7393-AMD-IOMMU-restrict-intremap-table-sizes.patch
    5d9ee2a8-AMD-IOMMU-alloc-1-devtab-per-PCI-seg.patch
    5d9ee2f0-AMD-IOMMU-allocate_buffer-avoid-memset.patch
    5d9ee312-AMD-IOMMU-prefill-all-DTEs.patch
    CVE-2014-0222-blktap-qcow1-validate-l2-table-size.patch
    blktap2-no-uninit.patch
    libxl.prepare-environment-for-domcreate_stream_done.patch
    pygrub-python3-conversion.patch
    fix-xenpvnetboot.patch
* Thu Oct 10 2019 carnold@suse.com
  - bsc#1135799 - Partner-L3: Xen crashes on AMD ROME based machines
    5d9ee2a8-AMD-IOMMU-alloc-1-devtab-per-PCI-seg.patch
    5d9ee2f0-AMD-IOMMU-allocate_buffer-avoid-memset.patch
    5d9ee312-AMD-IOMMU-prefill-all-DTEs.patch
* Wed Oct 02 2019 ohering@suse.de
  - bsc#1120095 - add code to change LIBXL_HOTPLUG_TIMEOUT at runtime
    The included README has details about the impact of this change
    libxl.LIBXL_HOTPLUG_TIMEOUT.patch
* Mon Sep 30 2019 carnold@suse.com
  - bsc#1135799 - Partner-L3: Xen crashes on AMD ROME based machines
    5ca7660f-x86-entry-drop-unused-includes.patch
    5cf8da09-adjust-sysdom-creation-call-earlier-on-x86.patch
    5cab2a6b-x86-ACPI-also-parse-AMD-tables-early.patch
    5cab2ab7-x86-IOMMU-introduce-init-ops.patch
    5cab2ae8-x86-IOMMU-abstract-iommu_supports_eim.patch
    5cab2b4e-x86-IOMMU-abstract-iommu_enable_x2apic_IR.patch
    5cab2b95-x86-IOMMU-initialize-iommu_ops-in.patch
    5cac9a4b-x86-IOMMU-abstract-adjust_vtd_irq_affinities.patch
    5cdeac7f-AMD-IOMMU-adjust-IOMMU-list-head-init.patch
    5d0cf4e4-AMD-IOMMU-initialize-IRQ-tasklet-once.patch
    5d149bb0-AMD-IOMMU-dont-add-IOMMUs.patch
    5d1b3fab-AMD-IOMMU-restrict-feature-logging.patch
    5d358508-x86-IRQ-desc-affinity-represents-request.patch
    5d358534-x86-IRQ-consolidate-arch-cpu_mask-use.patch
    5d358a67-AMD-IOMMU-pass-IOMMU-to-iterate_ivrs_entries-cb.patch
    5d358a92-AMD-IOMMU-pass-IOMMU-to-amd_iommu_alloc_intremap_table.patch
    5d39811c-x86-IOMMU-dont-restrict-IRQ-affinities.patch
    5d417813-AMD-IOMMU-bitfield-extended-features.patch
    5d417838-AMD-IOMMU-bitfield-control-reg.patch
    5d41785b-AMD-IOMMU-bitfield-IRTE.patch
    5d41787e-AMD-IOMMU-pass-IOMMU-to-gfu-intremap-entry.patch
    5d4178ad-AMD-IOMMU-128bit-non-guest-APIC-IRTE.patch
    5d4178fc-AMD-IOMMU-split-amd_iommu_init_one.patch
    5d41793f-AMD-IOMMU-allow-enabling-without-IRQ.patch
    5d417a16-AMD-IOMMU-adjust-IRQ-setup-for-x2APIC.patch
    5d417ab6-AMD-IOMMU-enable-x2APIC-mode.patch
    5d417b38-AMD-IOMMU-correct-IRTE-updating.patch
    5d417b6a-AMD-IOMMU-dont-needlessly-log-headers.patch
    5d4a9d25-AMD-IOMMU-drop-not-found-message.patch
    5d80e7c0-AMD-IOMMU-free-shared-IRT-once.patch
    5d80e80d-AMD-IOMMU-valid-flag-for-IVRS-mappings.patch
    5d80e82e-AMD-IOMMU-alloc_intremap_table-callers-handle-errors.patch
    5d80e857-x86-PCI-read-MSI-X-table-entry-count-early.patch
    5d8b72e5-AMD-IOMMU-dont-blindly-alloc-intremap-tables.patch
    5d8b730e-AMD-IOMMU-phantom-funcs-share-intremap-tables.patch
    5d8b733b-x86-PCI-read-max-MSI-vector-count-early.patch
    5d8b736d-AMD-IOMMU-replace-INTREMAP_ENTRIES.patch
    5d8b7393-AMD-IOMMU-restrict-intremap-table-sizes.patch
  - bsc#1145240 - [Migration]Can't pre-allocate 1 shadow pages
    5d70bfba-x86-shadow-dont-enable-with-too-small-allocation.patch
  - bsc#1137717 - [HPS Bug] Unable to install Windows Server 2016
    with 2 CPUs setting (or above) under SLES12 SP4 Xen Server on AMD
    ROME platform
    5d89d8d9-libxc-x86-avoid-overflow-in-CPUID-APIC-ID.patch
  - Upstream bug fixes (bsc#1027519)
    5d67ceaf-x86-properly-gate-PKU-clearing.patch
    5d779811-x86-fix-CPUID7-0-eax-levelling-MSR.patch
    5d77b40f-fix-hvm_all_ioreq_servers_add_vcpu-cleanup.patch
    5d80ea13-vpci-honor-read-only-devices.patch
    5d8b715f-ACPI-cpuidle-bump-max-num-of-states.patch
* Fri Sep 27 2019 ohering@suse.de
  - bsc#1145774 - Libivrtd segfaults when trying to live migrate a VM
    Fix crash in an error path of libxl_domain_suspend with
    libxl.helper_done-crash.patch
* Wed Aug 28 2019 carnold@suse.com
  - Upstream bug fixes (bsc#1027519)
    5d419d49-x86-spec-ctrl-report-proper-status.patch
    5d43253c-x86-ucode-always-collect_cpu_info-at-boot.patch
    5d4aa36f-x86-apic-enable-x2APIC-mode-earlier.patch
    5d4afa7a-credit2-fix-memory-leak.patch
    5d4d850a-introduce-bss-percpu-page-aligned.patch
    5d516531-x86-xpti-dont-leak-TSS-adjacent-data.patch
    5d5bf475-x86-PV-fix-handling-of-iommu-mappings.patch
    5d6524ca-x86-mm-correctly-init-M2P-entries.patch
  - Drop 5d419d49-x86-spec-ctrl-facilities-report-wrong-status.patch
* Wed Aug 28 2019 ohering@suse.de
  - Preserve modified files which used to be marked as %config,
    rename file.rpmsave to file
* Fri Aug 09 2019 carnold@suse.com
  - Update to Xen 4.12.1 bug fix release (bsc#1027519)
    xen-4.12.1-testing-src.tar.bz2
  - Drop patches contained in new tarball
    5c87b644-IOMMU-leave-enabled-for-kexec-crash.patch
    5c87b6a2-x86-HVM-dont-crash-guest-in-find_mmio_cache.patch
    5c87b6c8-drop-arch_evtchn_inject.patch
    5c87b6e8-avoid-atomic-rmw-accesses-in-map_vcpu_info.patch
    5c87e6d1-x86-TSX-controls-for-RTM-force-abort-mode.patch
    5c8f752c-x86-e820-build-with-gcc9.patch
    5c8fb92d-x86-HVM-split-linear-reads-and-writes.patch
    5c8fb951-x86-HVM-finish-IOREQs-correctly-on-completion.patch
    5c8fc6c0-x86-MSR-shorten-ARCH_CAPABILITIES.patch
    5c8fc6c0-x86-SC-retpoline-safety-calculations-for-eIBRS.patch
    5c9e63c5-credit2-SMT-idle-handling.patch
    5ca46b68-x86emul-no-GPR-update-upon-AVX-gather-failures.patch
    5ca773d1-x86emul-dont-read-mask-reg-without-AVX512F.patch
    5cab1f66-timers-fix-memory-leak-with-cpu-plug.patch
    5cac6cba-vmx-Fixup-removals-of-MSR-load-save-list-entries.patch
    5cd921fb-trace-fix-build-with-gcc9.patch
    5cd9224b-AMD-IOMMU-disable-upon-init-fail.patch
    5cd922c5-x86-MTRR-recalc-p2mt-when-iocaps.patch
    5cd9230f-VMX-correctly-get-GS_SHADOW-for-current.patch
    5cd926d0-bitmap_fill-zero-sized.patch
    5cd92724-drivers-video-drop-constraints.patch
    5cd93a69-x86-MSR_INTEL_CORE_THREAD_COUNT.patch
    5cd93a69-x86-boot-detect-Intel-SMT-correctly.patch
    5cd93a69-x86-spec-ctrl-reposition-XPTI-parsing.patch
    5cd981ff-x86-IRQ-tracing-avoid-UB-or-worse.patch
    5cdad090-x86-spec-ctrl-CPUID-MSR-definitions-for-MDS.patch
    5cdad090-x86-spec-ctrl-infrastructure-for-VERW-flush.patch
    5cdad090-x86-spec-ctrl-misc-non-functional-cleanup.patch
    5cdad090-x86-spec-ctrl-opts-to-control-VERW-flush.patch
    5cdeb9fd-sched-fix-csched2_deinit_pdata.patch
    5ce7a92f-x86-IO-APIC-fix-build-with-gcc9.patch
    5cf0f6a4-x86-vhpet-resume-avoid-small-diff.patch
    5cf16e51-x86-spec-ctrl-Knights-retpoline-safe.patch
    5d03a0c4-1-Arm-add-an-isb-before-reading-CNTPCT_EL0.patch
    5d03a0c4-2-gnttab-rework-prototype-of-set_status.patch
    5d03a0c4-3-Arm64-rewrite-bitops-in-C.patch
    5d03a0c4-4-Arm32-rewrite-bitops-in-C.patch
    5d03a0c4-5-Arm-bitops-consolidate-prototypes.patch
    5d03a0c4-6-Arm64-cmpxchg-simplify.patch
    5d03a0c4-7-Arm32-cmpxchg-simplify.patch
    5d03a0c4-8-Arm-bitops-helpers-with-timeout.patch
    5d03a0c4-9-Arm-cmpxchg-helper-with-timeout.patch
    5d03a0c4-A-Arm-turn-on-SILO-mode-by-default.patch
    5d03a0c4-B-bitops-guest-helpers.patch
    5d03a0c4-C-cmpxchg-guest-helpers.patch
    5d03a0c4-D-use-guest-atomics-helpers.patch
    5d03a0c4-E-Arm-add-perf-counters-in-guest-atomic-helpers.patch
    5d03a0c4-F-Arm-protect-gnttab_clear_flag.patch
  - Refreshed patches
    libxl.pvscsi.patch
* Thu Aug 01 2019 carnold@suse.com
  - bsc#1143563 - Speculative mitigation facilities report wrong status
    5d419d49-x86-spec-ctrl-facilities-report-wrong-status.patch
* Wed Jul 17 2019 ohering@suse.de
  - Update xen-dom0-modules.service (bsc#1137251)
    Map backend module names from pvops and xenlinux kernels to a
    module alias. This avoids errors from modprobe about unknown
    modules. Ignore a few xenlinux modules that lack aliases.
* Mon Jul 15 2019 carnold@suse.com
  - Gcc9 warnings seem to be cleared up with upstream fixes.
    Drop gcc9-ignore-warnings.patch
* Tue Jun 25 2019 carnold@suse.com
  - bsc#1138563 - L3: xenpvnetboot improperly ported to Python 3
    fix-xenpvnetboot.patch
* Mon Jun 24 2019 ohering@suse.de
  - Move /etc/modprobe.d/xen_loop.conf to /lib/modprobe.d/xen_loop.conf
* Mon Jun 24 2019 ohering@suse.de
  - Remove /etc/xen/xenapiusers and /etc/pam.d/xen-api
* Fri Jun 21 2019 ohering@suse.de
  - Remove all upstream provided files in /etc/xen
    They are not required at runtime. The host admin is now
    responsible if he really needs anything in this subdirectory.
* Fri Jun 21 2019 ohering@suse.de
  - In our effort to make /etc fully admin controlled, move /etc/xen/scripts
    to libexec/xen/scripts with xen-tools.etc_pollution.patch
* Wed Jun 19 2019 ohering@suse.de
  - Move /etc/bash_completion.d/xl.sh to %{_datadir}/bash-completion/completions
* Mon Jun 17 2019 carnold@suse.com
  - bsc#1138294 - VUL-0: CVE-2019-17349: XSA-295: Unlimited Arm
    Atomics Operations
    5d03a0c4-1-Arm-add-an-isb-before-reading-CNTPCT_EL0.patch
    5d03a0c4-2-gnttab-rework-prototype-of-set_status.patch
    5d03a0c4-3-Arm64-rewrite-bitops-in-C.patch
    5d03a0c4-4-Arm32-rewrite-bitops-in-C.patch
    5d03a0c4-5-Arm-bitops-consolidate-prototypes.patch
    5d03a0c4-6-Arm64-cmpxchg-simplify.patch
    5d03a0c4-7-Arm32-cmpxchg-simplify.patch
    5d03a0c4-8-Arm-bitops-helpers-with-timeout.patch
    5d03a0c4-9-Arm-cmpxchg-helper-with-timeout.patch
    5d03a0c4-A-Arm-turn-on-SILO-mode-by-default.patch
    5d03a0c4-B-bitops-guest-helpers.patch
    5d03a0c4-C-cmpxchg-guest-helpers.patch
    5d03a0c4-D-use-guest-atomics-helpers.patch
    5d03a0c4-E-Arm-add-perf-counters-in-guest-atomic-helpers.patch
    5d03a0c4-F-Arm-protect-gnttab_clear_flag.patch
  - Upstream bug fixes (bsc#1027519)
    5c87b6c8-drop-arch_evtchn_inject.patch
    5c87b6e8-avoid-atomic-rmw-accesses-in-map_vcpu_info.patch
    5cd921fb-trace-fix-build-with-gcc9.patch
    5cd9224b-AMD-IOMMU-disable-upon-init-fail.patch
    5cd922c5-x86-MTRR-recalc-p2mt-when-iocaps.patch
    5cd9230f-VMX-correctly-get-GS_SHADOW-for-current.patch
    5cd926d0-bitmap_fill-zero-sized.patch
    5cd92724-drivers-video-drop-constraints.patch
    5cd93a69-x86-spec-ctrl-reposition-XPTI-parsing.patch (Replaces xsa297-0a.patch)
    5cd93a69-x86-MSR_INTEL_CORE_THREAD_COUNT.patch (Replaces xsa297-0b.patch)
    5cd93a69-x86-boot-detect-Intel-SMT-correctly.patch (Replaces xsa297-0c.patch)
    5cdad090-x86-spec-ctrl-misc-non-functional-cleanup.patch (Replaces xsa297-0d.patch)
    5cdad090-x86-spec-ctrl-CPUID-MSR-definitions-for-MDS.patch (Replaces xsa297-1.patch)
    5cdad090-x86-spec-ctrl-infrastructure-for-VERW-flush.patch (Replaces xsa297-2.patch)
    5cdad090-x86-spec-ctrl-opts-to-control-VERW-flush.patch (Replaces xsa297-3.patch)
    5cd981ff-x86-IRQ-tracing-avoid-UB-or-worse.patch
    5cdeb9fd-sched-fix-csched2_deinit_pdata.patch
    5ce7a92f-x86-IO-APIC-fix-build-with-gcc9.patch
    5cf0f6a4-x86-vhpet-resume-avoid-small-diff.patch
    5cf16e51-x86-spec-ctrl-Knights-retpoline-safe.patch
* Fri Jun 14 2019 carnold@suse.com
  - Fix some outdated information in the readme
    README.SUSE
* Tue Jun 11 2019 Jim Fehlig <jfehlig@suse.com>
  - spec: xen-tools: require matching version of xen package
    bsc#1137471
* Fri May 17 2019 ohering@suse.de
  - Remove two stale patches
    xen.build-compare.man.patch
    xenpaging.doc.patch
* Tue May 14 2019 Martin Liška <mliska@suse.cz>
  - Disable LTO (boo#1133296).
* Mon May 13 2019 ohering@suse.de
  - Remove arm32 from ExclusiveArch to fix build
* Mon Apr 29 2019 carnold@suse.com
  - bsc#1111331 - VUL-0: CPU issues Q2 2019 aka "Group 4".
    CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091
    xsa297-0a.patch
    xsa297-0b.patch
    xsa297-0c.patch
    xsa297-0d.patch
    xsa297-1.patch
    xsa297-2.patch
    xsa297-3.patch
  - Update 5cab1f66-timers-fix-memory-leak-with-cpu-plug.patch and
    drop 5cac6219-xen-cpu-Fix-ARM-build-following-cs-597fbb8.patch
    Refresh 5cac6cba-vmx-Fixup-removals-of-MSR-load-save-list-entries.patch
* Wed Apr 17 2019 carnold@suse.com
  - bsc#1131811 - [XEN] internal error: libxenlight failed to create
    new domain. This patch is a workaround for a systemd issue. See
    patch header for additional comments.
    xenstore-launch.patch
* Thu Apr 11 2019 carnold@suse.com
  - bsc#1125378 - [xen][pygrub] Can not restore sle11sp4 pv guest
    after upgrading host from sle11sp4 to sle15sp1
    pygrub-python3-conversion.patch
  - Fix "TypeError: virDomainDefineXML() argument 2 must be str or
    None, not bytes" when converting VMs from using the xm/xend
    toolstack to the libxl/libvirt toolstack. (bsc#1123378)
    xen2libvirt.py
* Mon Apr 08 2019 carnold@suse.com
  - bsc#1124560 - Fully virtualized guests crash on boot
    5cac6cba-vmx-Fixup-removals-of-MSR-load-save-list-entries.patch
  - bsc#1121391 - GCC 9: xen build fails
    5c8f752c-x86-e820-build-with-gcc9.patch
  - Upstream bug fixes (bsc#1027519)
    5c87b644-IOMMU-leave-enabled-for-kexec-crash.patch
    5c87b6a2-x86-HVM-dont-crash-guest-in-find_mmio_cache.patch
    5c87e6d1-x86-TSX-controls-for-RTM-force-abort-mode.patch
    5c8fb92d-x86-HVM-split-linear-reads-and-writes.patch
    5c8fb951-x86-HVM-finish-IOREQs-correctly-on-completion.patch
    5c8fc6c0-x86-MSR-shorten-ARCH_CAPABILITIES.patch
    5c8fc6c0-x86-SC-retpoline-safety-calculations-for-eIBRS.patch
    5c9e63c5-credit2-SMT-idle-handling.patch
    5ca46b68-x86emul-no-GPR-update-upon-AVX-gather-failures.patch
    5ca773d1-x86emul-dont-read-mask-reg-without-AVX512F.patch
    5cab1f66-timers-fix-memory-leak-with-cpu-plug.patch
    5cac6219-xen-cpu-Fix-ARM-build-following-cs-597fbb8.patch
* Thu Apr 04 2019 ohering@suse.de
  - Install pkgconfig files into libdir instead of datadir
* Tue Apr 02 2019 carnold@suse.com
  - Update to Xen 4.12.0 FCS release (fate#325107, fate#323901)
    xen-4.12.0-testing-src.tar.bz2
    * HVM/PVH and PV only Hypervisor: The Xen 4.12 release separates
      the HVM/PVH and PV code paths in Xen and provides KCONFIG
      options to build a PV only or HVM/PVH only hypervisor.
    * QEMU Deprivilege (DM_RESTRICT): In Xen 4.12, this feature has
      been vastly improved.
    * Argo - Hypervisor-Mediated data eXchange: Argo is a new inter-
      domain communication mechanism.
    * Improvements to Virtual Machine Introspection: The VMI subsystem
      which allows detection of 0-day vulnerabilities has seen many
      functional and performance improvements.
    * Credit 2 Scheduler: The Credit2 scheduler is now the Xen Project
      default scheduler.
    * PVH Support: Grub2 boot support has been added to Xen and Grub2.
    * PVH Dom0: PVH Dom0 support has now been upgraded from experimental
      to tech preview.
    * The Xen 4.12 upgrade also includes improved IOMMU mapping code,
      which is designed to significantly improve the startup times of
      AMD EPYC based systems.
    * The upgrade also features Automatic Dom0 Sizing which allows the
      setting of Dom0 memory size as a percentage of host memory (e.g.
      10%) or with an offset (e.g. 1G+10%).
* Tue Mar 26 2019 carnold@suse.com
  - bsc#1130485 - Please drop Requires on multipath-tools in
    xen-tools. Now using Recommends multipath-tools.
    xen.spec
* Mon Mar 25 2019 carnold@suse.com
  - Update to Xen 4.12.0 RC7 release (fate#325107, fate#323901)
    xen-4.12.0-testing-src.tar.bz2
* Wed Mar 20 2019 carnold@suse.com
  - Update to Xen 4.12.0 RC6 release (fate#325107, fate#323901)
    xen-4.12.0-testing-src.tar.bz2
* Fri Mar 15 2019 ohering@suse.de
  - bsc#1026236 - add Xen cmdline option "suse_vtsc_tolerance" to
    avoid TSC emulation for HVM domUs if their expected frequency
    does not match exactly the frequency of the receiving host
    xen.bug1026236.suse_vtsc_tolerance.patch
* Mon Mar 11 2019 carnold@suse.com
  - Update to Xen 4.12.0 RC5 release (fate#325107, fate#323901)
    xen-4.12.0-testing-src.tar.bz2
* Mon Mar 11 2019 carnold@suse.com
  - jsc#SLE-3059 - Disable Xen auto-ballooning
  - Add CONFIG_DOM0_MEM to the spec file for managing dom0 memory.
    xen.spec
  - Disable autoballooning in xl.con
    xl-conf-disable-autoballoon.patch
* Thu Mar 07 2019 ohering@suse.de
  - Update gcc9-ignore-warnings.patch to fix build in SLE12
* Thu Mar 07 2019 ohering@suse.de
  - bsc#1126325 - fix crash in libxl in error path
    Setup of grant_tables and other variables may fail
    libxl.prepare-environment-for-domcreate_stream_done.patch
* Wed Mar 06 2019 carnold@suse.com
  - bsc#1127620 - Documentation for the xl configuration file allows
    for firmware=pvgrub64 but we don't ship pvgrub64.
    Create a link from grub.xen to pvgrub64
    xen.spec
* Mon Mar 04 2019 carnold@suse.com
  - Update to Xen 4.12.0 RC4 release (fate#325107, fate#323901)
    xen-4.12.0-testing-src.tar.bz2
  - Tarball also contains additional post RC4 security fixes for
    Xen Security Advisories 287, 288, and 290 through 294.
* Tue Feb 19 2019 carnold@suse.com
  - Update to Xen 4.12.0 RC3 release (fate#325107, fate#323901)
    xen-4.12.0-testing-src.tar.bz2
* Mon Feb 04 2019 carnold@suse.com
  - Update to Xen 4.12.0 RC2 release (fate#325107, fate#323901)
    xen-4.12.0-testing-src.tar.bz2
* Fri Jan 25 2019 carnold@suse.com
  - bsc#1121391 - GCC 9: xen build fails
    gcc9-ignore-warnings.patch
* Thu Jan 24 2019 carnold@suse.com
  - bsc#1122563 - Virtualization/xen: Bug no Xen on boot, missing
    /proc/xen, after 4.11 -> 4.12 upgrade on X86_64/efi.
    Keep xen.efi in /usr/lib64/efi for booting older distros.
    xen.spec
* Fri Jan 18 2019 carnold@suse.com
  - fate#326960: Package grub2 as noarch.
    As part of the effort to have a unified bootloader across
    architectures, modify the xen.spec file to move the Xen efi files
    to /usr/share/efi/$(uname -m) from /usr/lib64/efi.
* Wed Jan 16 2019 carnold@suse.com
  - Update to Xen 4.12.0 RC1 release (fate#325107, fate#323901)
    xen-4.12.0-testing-src.tar.bz2
  - Drop
    5b505d59-tools-xentop-replace-use-of-deprecated-vwprintw.patch
    5b76ec82-libxl-arm-Fix-build-on-arm64-acpi-w-gcc-8.2.patch
    5b8fae26-tools-libxl-correct-vcpu-affinity-output-with-sparse-physical-cpu-map.patch
    5b8fae26-xen-fill-topology-info-for-all-present-cpus.patch
    5b8fb5af-tools-xl-refuse-to-set-number-of-vcpus-to-0-via-xl-vcpu-set.patch
    5b9784ad-x86-HVM-drop-hvm_fetch_from_guest_linear.patch
    5b9784d2-x86-HVM-add-known_gla-helper.patch
    5b9784f2-x86-HVM-split-page-straddling-accesses.patch
    5bdc31d5-VMX-fix-vmx_handle_eoi.patch
    gcc8-fix-array-warning-on-i586.patch
    gcc8-fix-format-warning-on-i586.patch
    gcc8-inlining-failed.patch
    xen.bug1079730.patch
* Tue Jan 15 2019 carnold@suse.com
  - bsc#1121960 - xen: sync with Factory
    xen.spec
    xen.changes
* Sat Jan 12 2019 Jan Engelhardt <jengelh@inai.de>
  - Replace old $RPM_* shell vars.
  - Run fdupes for all architectures, and not crossing
    subvolume boundaries.
* Thu Jan 10 2019 Guillaume GARDET <guillaume.gardet@opensuse.org>
  - Do not run %fdupes on aarch64 to avoid the hardlink-across-partition
    rpmlint error
* Tue Jan 08 2019 Guillaume GARDET <guillaume.gardet@opensuse.org>
  - Require qemu-seabios only on x86* as it is not available on non-x86
    systems
* Thu Dec 27 2018 Bernhard Wiedemann <bwiedemann@suse.com>
  - Avoid creating dangling symlinks (bsc#1116524)
    This reverts the revert of tmp_build.patch
* Tue Dec 04 2018 carnold@suse.com
  - Update to Xen 4.11.1 bug fix release (bsc#1027519)
    xen-4.11.1-testing-src.tar.bz2
  - 5b505d59-tools-xentop-replace-use-of-deprecated-vwprintw.patch
    replaces xen.2b50cdbc444c637575580dcfa6c9525a84d5cc62.patch
  - 5b76ec82-libxl-arm-Fix-build-on-arm64-acpi-w-gcc-8.2.patch
    replaces xen.b8f33431f3dd23fb43a879f4bdb4283fdc9465ad.patch
  - Drop the following patches contained in the new tarball
    5b34b8fe-VMX-defer-vmx_vmcs_exit-as-long-as-possible.patch
    5b3cab8e-1-VMX-MSR_DEBUGCTL-handling.patch
    5b3cab8e-2-VMX-improve-MSR-load-save-API.patch
    5b3cab8e-3-VMX-cleanup-MSR-load-save-infra.patch
    5b3cab8f-1-VMX-factor-out-locate_msr_entry.patch
    5b3cab8f-2-VMX-remote-access-to-MSR-lists.patch
    5b3cab8f-3-VMX-improve-LBR-MSR-handling.patch
    5b3cab8f-4-VMX-pass-MSR-value-into-vmx_msr_add.patch
    5b3cab8f-5-VMX-load-only-guest-MSR-entries.patch
    5b3f8fa5-port-array_index_nospec-from-Linux.patch
    5b4321f6-x86-correctly-set-nonlazy_xstate_used-when-loading-full-state.patch
    5b4488e7-x86-spec-ctrl-cmdline-handling.patch
    5b471517-page_alloc-correct-first_dirty-calc-in-block-merging.patch
    5b4c9a60-allow-cpu_down-to-be-called-earlier.patch
    5b4db308-SVM-fix-cleanup-svm_inject_event.patch
    5b5040c3-cpupools-fix-state-when-downing-a-CPU-failed.patch
    5b5040f2-x86-AMD-distinguish-CU-from-HT.patch
    5b505fe5-VMX-fix-find-msr-build.patch
    5b508775-1-x86-distinguish-CPU-offlining-and-removal.patch
    5b508775-2-x86-possibly-bring-up-all-CPUs.patch
    5b508775-3-x86-cmdline-opt-to-avoid-use-of-secondary-HTs.patch
    5b508ce8-VMX-dont-clobber-dr6-while-debug-state-is-lazy.patch
    5b50df16-1-x86-xstate-use-guest-CPUID-policy.patch
    5b50df16-2-x86-make-xstate-calculation-errors-more-obvious.patch
    5b56feb1-hvm-Disallow-unknown-MSR_EFER-bits.patch
    5b56feb2-spec-ctrl-Fix-the-parsing-of-xpti--on-fixed-Intel-hardware.patch
    5b62ca93-VMX-avoid-hitting-BUG_ON.patch
    5b6d84ac-x86-fix-improve-vlapic-read-write.patch
    5b6d8ce2-x86-XPTI-parsing.patch
    5b72fbbe-ARM-disable-grant-table-v2.patch
    5b72fbbe-oxenstored-eval-order.patch
    5b72fbbe-vtx-Fix-the-checking-for-unknown-invalid-MSR_DEBUGCTL-bits.patch
    5b72fbbf-1-spec-ctrl-Calculate-safe-PTE-addresses-for-L1TF-mitigations.patch
    5b72fbbf-2-spec-ctrl-Introduce-an-option-to-control-L1TF-mitigation-for-PV-guests.patch
    5b72fbbf-3-shadow-Infrastructure-to-force-a-PV-guest-into-shadow-mode.patch
    5b72fbbf-4-mm-Plumbing-to-allow-any-PTE-update-to-fail-with--ERESTART.patch
    5b72fbbf-5-pv-Force-a-guest-into-shadow-mode-when-it-writes-an-L1TF-vulnerable-PTE.patch
    5b72fbbf-6-spec-ctrl-CPUID-MSR-definitions-for-L1D_FLUSH.patch
    5b72fbbf-7-msr-Virtualise-MSR_FLUSH_CMD-for-guests.patch
    5b72fbbf-8-spec-ctrl-Introduce-an-option-to-control-L1D_FLUSH-for-HVM-HAP-guests.patch
    5b72fbbf-x86-Make-spec-ctrl-no-a-global-disable-of-all-mitigations.patch
    5b72fbbf-xl.conf-Add-global-affinity-masks.patch
    5b74190e-x86-hvm-ioreq-MMIO-range-check-honor-DF.patch
    5b752762-x86-hvm-emul-rep-IO-should-not-cross-GFN-boundaries.patch
    5b75afef-x86-setup-avoid-OoB-E820-lookup.patch
    5b76b780-rangeset-inquiry-functions-tolerate-NULL.patch
    5b83c654-VT-d-dmar-iommu-mem-leak-fix.patch
    5b8d5832-x86-assorted-array_index_nospec-insertions.patch
    5ba11ed4-credit2-fix-moving-CPUs-between-cpupools.patch
    5bacae4b-x86-boot-allocate-extra-module-slot.patch
    5bae44ce-x86-silence-false-log-messages.patch
    5bb60c12-x86-split-opt_xpti.patch
    5bb60c4f-x86-split-opt_pv_l1tf.patch
    5bb60c74-x86-fix-xpti-and-pv-l1tf.patch
    5bcf0722-x86-boot-enable-NMIs.patch
    5bd076e9-dombuilder-init-vcpu-debug-regs-correctly.patch
    5bd076e9-x86-boot-init-debug-regs-correctly.patch
    5bd076e9-x86-init-vcpu-debug-regs-correctly.patch
    5bd0e0cf-vvmx-Disallow-the-use-of-VT-x-instructions-when-nested-virt-is-disabled.patch
    5bd0e11b-x86-disallow-VT-x-insns-without-nested-virt.patch
    5bd85bfd-x86-fix-crash-on-xl-set-parameter-pcid.patch
    5be2a308-x86-extend-get_platform_badpages.patch
    5be2a354-x86-work-around-HLE-host-lockup-erratum.patch
    xsa275-1.patch
    xsa275-2.patch
    xsa276-1.patch
    xsa276-2.patch
    xsa277.patch
    xsa279.patch
    xsa280-1.patch
    xsa280-2.patch
* Wed Nov 21 2018 carnold@suse.com
  - bsc#1116524 - Package xen-tools-4.11.0_09-2.1.x86_64 broken:
    Missing /bin/domu-xenstore.  This was broken because "make
    package build reproducible" change. (boo#1047218, boo#1062303)
    This fix reverses the change to this patch.
    tmp_build.patch
* Mon Nov 12 2018 carnold@suse.com
  - bsc#1115040 - VUL-0: CVE-2018-19961 CVE-2018-19962: xen:
    insufficient TLB flushing / improper large page mappings with AMD
    IOMMUs (XSA-275)
    xsa275-1.patch
    xsa275-2.patch
  - bsc#1115043 - VUL-0: CVE-2018-19963: xen: resource accounting
    issues in x86 IOREQ server handling (XSA-276)
    xsa276-1.patch
    xsa276-2.patch
  - bsc#1115044 - VUL-0: CVE-2018-19964: xen: x86: incorrect error
    handling for guest p2m page removals (XSA-277)
    xsa277.patch
  - bsc#1114405 - VUL-0: CVE-2018-18883: xen: Nested VT-x usable even
    when disabled (XSA-278)
    5bd0e11b-x86-disallow-VT-x-insns-without-nested-virt.patch
  - bsc#1115045 - VUL-0: xen: CVE-2018-19965: x86: DoS from attempting
    to use INVPCID with a non-canonical addresses (XSA-279)
    xsa279.patch
  - bsc#1115047 - VUL-0: CVE-2018-19966: xen: Fix for XSA-240
    conflicts with shadow paging (XSA-280)
    xsa280-1.patch
    xsa280-2.patch
  - bsc#1114988 - VUL-0: CVE-2018-19967: xen: guest use of HLE
    constructs may lock up host (XSA-282)
    5be2a308-x86-extend-get_platform_badpages.patch
    5be2a354-x86-work-around-HLE-host-lockup-erratum.patch
  - bsc#1108940 - L3: XEN SLE12-SP1 domU hang on SLE12-SP3 HV
    5bdc31d5-VMX-fix-vmx_handle_eoi.patch
  - Upstream bug fixes (bsc#1027519)
    5b752762-x86-hvm-emul-rep-IO-should-not-cross-GFN-boundaries.patch
    5ba11ed4-credit2-fix-moving-CPUs-between-cpupools.patch
    5bacae4b-x86-boot-allocate-extra-module-slot.patch
    5bae44ce-x86-silence-false-log-messages.patch
    5bb60c12-x86-split-opt_xpti.patch
    5bb60c4f-x86-split-opt_pv_l1tf.patch
    5bb60c74-x86-fix-xpti-and-pv-l1tf.patch
    5bcf0722-x86-boot-enable-NMIs.patch
    5bd076e9-dombuilder-init-vcpu-debug-regs-correctly.patch
    5bd076e9-x86-boot-init-debug-regs-correctly.patch
    5bd076e9-x86-init-vcpu-debug-regs-correctly.patch
    5bd85bfd-x86-fix-crash-on-xl-set-parameter-pcid.patch
* Tue Nov 06 2018 carnold@suse.com
  - bsc#1114405 - VUL-0: CVE-2018-18883: xen: Nested VT-x usable even
    when disabled (XSA-278)
    5bd0e0cf-vvmx-Disallow-the-use-of-VT-x-instructions-when-nested-virt-is-disabled.patch
* Wed Oct 24 2018 ohering@suse.de
  - Use SMBIOS_REL_DATE instead of SMBIOS_DATE for reproducible binaries
* Wed Oct 24 2018 Bernhard Wiedemann <bwiedemann@suse.com>
  - make package build reproducible (boo#1047218, boo#1062303)
    * Set SMBIOS_REL_DATE
    * Update tmp_build.patch to use SHA instead of random build-id
    * Add reproducible.patch to use --no-insert-timestamp
* Sun Oct 14 2018 ohering@suse.de
  - Building with ncurses 6.1 will fail without
    xen.2b50cdbc444c637575580dcfa6c9525a84d5cc62.patch
  - Building libxl acpi support on aarch64 with gcc 8.2 will fail without
    xen.b8f33431f3dd23fb43a879f4bdb4283fdc9465ad.patch
* Tue Sep 11 2018 carnold@suse.com
  - bsc#1106263 - L3: The affinity reporting via 'xl vcpu-list' is
    apparently broken
    5b8fae26-tools-libxl-correct-vcpu-affinity-output-with-sparse-physical-cpu-map.patch
    5b8fae26-xen-fill-topology-info-for-all-present-cpus.patch
    5b8fb5af-tools-xl-refuse-to-set-number-of-vcpus-to-0-via-xl-vcpu-set.patch
* Tue Sep 11 2018 carnold@suse.com
  - bsc#1094508 - L3: Kernel oops in fs/dcache.c called by
    d_materialise_unique()
    5b9784ad-x86-HVM-drop-hvm_fetch_from_guest_linear.patch
    5b9784d2-x86-HVM-add-known_gla-helper.patch
    5b9784f2-x86-HVM-split-page-straddling-accesses.patch
  - bsc#1103279 - (CVE-2018-15470) VUL-0: CVE-2018-15470: xen:
    oxenstored does not apply quota-maxentity (XSA-272)
    5b72fbbe-oxenstored-eval-order.patch
  - bsc#1103275 - (CVE-2018-15469) VUL-0: CVE-2018-15469: xen: Use of
    v2 grant tables may cause crash on ARM (XSA-268)
    5b72fbbe-ARM-disable-grant-table-v2.patch
  - Upstream patches from Jan (bsc#1027519)
    5b6d84ac-x86-fix-improve-vlapic-read-write.patch
    5b74190e-x86-hvm-ioreq-MMIO-range-check-honor-DF.patch
    5b75afef-x86-setup-avoid-OoB-E820-lookup.patch
    5b76b780-rangeset-inquiry-functions-tolerate-NULL.patch
    5b83c654-VT-d-dmar-iommu-mem-leak-fix.patch
    5b8d5832-x86-assorted-array_index_nospec-insertions.patch
  - Drop 5b741962-x86-write-to-correct-variable-in-parse_pv_l1tf.patch
* Tue Aug 28 2018 carnold@suse.com
  - bsc#1078292 - rpmbuild -ba SPECS/xen.spec with xen-4.9.1 failed
    xen.spec
* Fri Aug 17 2018 carnold@suse.com
  - bsc#1091107 - VUL-0: CVE-2018-3646: xen: L1 Terminal Fault -VMM
    (XSA-273)
    5b72fbbf-1-spec-ctrl-Calculate-safe-PTE-addresses-for-L1TF-mitigations.patch
    5b72fbbf-2-spec-ctrl-Introduce-an-option-to-control-L1TF-mitigation-for-PV-guests.patch
    5b72fbbf-3-shadow-Infrastructure-to-force-a-PV-guest-into-shadow-mode.patch
    5b72fbbf-4-mm-Plumbing-to-allow-any-PTE-update-to-fail-with--ERESTART.patch
    5b72fbbf-5-pv-Force-a-guest-into-shadow-mode-when-it-writes-an-L1TF-vulnerable-PTE.patch
    5b72fbbf-6-spec-ctrl-CPUID-MSR-definitions-for-L1D_FLUSH.patch
    5b72fbbf-7-msr-Virtualise-MSR_FLUSH_CMD-for-guests.patch
    5b72fbbf-8-spec-ctrl-Introduce-an-option-to-control-L1D_FLUSH-for-HVM-HAP-guests.patch
  - bsc#1103276 - VUL-0: CVE-2018-15468: xen: x86: Incorrect
    MSR_DEBUGCTL handling lets guests enable BTS (XSA-269)
    5b72fbbe-vtx-Fix-the-checking-for-unknown-invalid-MSR_DEBUGCTL-bits.patch
  - Upstream prereq patches for XSA-273 and other upstream fixes
    (bsc#1027519)
    5b34b8fe-VMX-defer-vmx_vmcs_exit-as-long-as-possible.patch
    5b3cab8e-1-VMX-MSR_DEBUGCTL-handling.patch
    5b3cab8e-2-VMX-improve-MSR-load-save-API.patch
    5b3cab8e-3-VMX-cleanup-MSR-load-save-infra.patch
    5b3cab8f-1-VMX-factor-out-locate_msr_entry.patch
    5b3cab8f-2-VMX-remote-access-to-MSR-lists.patch
    5b3cab8f-3-VMX-improve-LBR-MSR-handling.patch
    5b3cab8f-4-VMX-pass-MSR-value-into-vmx_msr_add.patch
    5b3cab8f-5-VMX-load-only-guest-MSR-entries.patch
    5b4321f6-x86-correctly-set-nonlazy_xstate_used-when-loading-full-state.patch
    5b505fe5-VMX-fix-find-msr-build.patch
    5b56feb1-hvm-Disallow-unknown-MSR_EFER-bits.patch
    5b56feb2-spec-ctrl-Fix-the-parsing-of-xpti--on-fixed-Intel-hardware.patch
    5b62ca93-VMX-avoid-hitting-BUG_ON.patch
    5b6d8ce2-x86-XPTI-parsing.patch
    5b72fbbf-x86-Make-spec-ctrl-no-a-global-disable-of-all-mitigations.patch
    5b72fbbf-xl.conf-Add-global-affinity-masks.patch
    5b741962-x86-write-to-correct-variable-in-parse_pv_l1tf.patch
* Tue Jul 24 2018 carnold@suse.com
  - Upstream patches from Jan (bsc#1027519)
    5b3f8fa5-port-array_index_nospec-from-Linux.patch
    5b4488e7-x86-spec-ctrl-cmdline-handling.patch
    5b471517-page_alloc-correct-first_dirty-calc-in-block-merging.patch
    5b4c9a60-allow-cpu_down-to-be-called-earlier.patch
    5b4db308-SVM-fix-cleanup-svm_inject_event.patch
    5b5040c3-cpupools-fix-state-when-downing-a-CPU-failed.patch
    5b5040f2-x86-AMD-distinguish-CU-from-HT.patch
    5b508775-1-x86-distinguish-CPU-offlining-and-removal.patch
    5b508775-2-x86-possibly-bring-up-all-CPUs.patch
    5b508775-3-x86-cmdline-opt-to-avoid-use-of-secondary-HTs.patch
    5b508ce8-VMX-dont-clobber-dr6-while-debug-state-is-lazy.patch
    5b50df16-1-x86-xstate-use-guest-CPUID-policy.patch
    5b50df16-2-x86-make-xstate-calculation-errors-more-obvious.patch
    gcc8-fix-format-warning-on-i586.patch
    gcc8-fix-array-warning-on-i586.patch
  - Drop xen.fuzz-_FORTIFY_SOURCE.patch
    gcc8-fix-warning-on-i586.patch
* Mon Jul 09 2018 carnold@suse.com
  - Update to Xen 4.11.0 FCS (fate#325202, fate#325123)
    xen-4.11.0-testing-src.tar.bz2
    disable-building-pv-shim.patch
  - Dropped patches
    5a33a12f-domctl-improve-locking-during-domain-destruction.patch
    5a6703cb-x86-move-invocations-of-hvm_flush_guest_tlbs.patch
    5a79d7ed-libxc-packed-initrd-dont-fail-domain-creation.patch
    5a9985bd-x86-invpcid-support.patch
    5ac72a48-gcc8.patch
    5ac72a5f-gcc8.patch
    5ac72a64-gcc8.patch
    5ac72a69-gcc8.patch
    5ac72a6e-gcc8.patch
    5ac72a74-gcc8.patch
    5ac72a7b-gcc8.patch
    5ad4923e-x86-correct-S3-resume-ordering.patch
    5ad49293-x86-suppress-BTI-mitigations-around-S3.patch
    5ad600d4-x86-pv-introduce-x86emul_read_dr.patch
    5ad600d4-x86-pv-introduce-x86emul_write_dr.patch
    5ad8c3a7-x86-spec_ctrl-update-retpoline-decision-making.patch
    5adda097-x86-HPET-fix-race-triggering-ASSERT.patch
    5adda0d5-x86-HVM-never-retain-emulated-insn-cache.patch
    5adde9ed-xpti-fix-double-fault-handling.patch
    5ae06fad-SVM-fix-intercepts-for-SYS-CALL-ENTER-MSRs.patch
    5ae31917-x86-cpuidle-init-stats-lock-once.patch
    5aeaeae4-introduce-vcpu_sleep_nosync_locked.patch
    5aeaeaf0-sched-fix-races-in-vcpu-migration.patch
    5aeb2c57-x86-retval-checks-of-set-guest-trapbounce.patch
    5aec7393-1-x86-xpti-avoid-copy.patch
    5aec7393-2-x86-xpti-write-cr3.patch
    5aec744a-3-x86-xpti-per-domain-flag.patch
    5aec744a-4-x86-xpti-use-invpcid.patch
    5aec744a-5-x86-xpti-no-global-pages.patch
    5aec744a-6-x86-xpti-cr3-valid-flag.patch
    5aec744a-7-x86-xpti-pv_guest_cr4_to_real_cr4.patch
    5aec744b-8-x86-xpti-cr3-helpers.patch
    5aec74a8-9-x86-xpti-use-pcid.patch
    5af1daa9-1-x86-traps-fix-dr6-handing-in-DB-handler.patch
    5af1daa9-2-x86-pv-move-exception-injection-into-test_all_events.patch
    5af1daa9-3-x86-traps-use-IST-for-DB.patch
    5af1daa9-4-x86-traps-fix-handling-of-DB-in-hypervisor-context.patch
    5af1daa9-x86-HVM-guard-against-bogus-emulator-ioreq-state.patch
    5af1daa9-x86-vpt-support-IO-APIC-routed-intr.patch
    5af97999-viridian-cpuid-leaf-40000003.patch
    5afc13ae-1-x86-read-MSR_ARCH_CAPABILITIES-once.patch
    5afc13ae-2-x86-express-Xen-SPEC_CTRL-choice-as-variable.patch
    5afc13ae-3-x86-merge-bti_ist_info-use_shadow_spec_ctrl.patch
    5afc13ae-4-x86-fold-XEN_IBRS-ALTERNATIVES.patch
    5afc13ae-5-x86-rename-bits-of-spec_ctrl-infrastructure.patch
    5afc13ae-6-x86-elide-MSR_SPEC_CTRL-handling-in-idle.patch
    5afc13ae-7-x86-split-X86_FEATURE_SC_MSR.patch
    5afc13ae-8-x86-explicitly-set-Xen-default-SPEC_CTRL.patch
    5afc13ae-9-x86-cpuid-improve-guest-policies-for-speculative.patch
    5afc13ae-A-x86-introduce-spec-ctrl-cmdline-opt.patch
    5b02c786-x86-AMD-mitigations-for-GPZ-SP4.patch
    5b02c786-x86-Intel-mitigations-for-GPZ-SP4.patch
    5b02c786-x86-msr-virtualise-SPEC_CTRL-SSBD.patch
    5b0bc9da-x86-XPTI-fix-S3-resume.patch
    5b0d2286-libxc-x86-PV-dont-hand-through-CPUID-leaf-0x80000008.patch
    5b0d2d91-x86-suppress-sync-when-XPTI-off.patch
    5b0d2dbc-x86-correct-default_xen_spec_ctrl.patch
    5b0d2ddc-x86-CPUID-dont-override-tool-stack-hidden-STIBP.patch
    5b150ef9-x86-fix-error-handling-of-pv-dr7-shadow.patch
    5b21825d-1-x86-support-fully-eager-FPU-context-switching.patch
    5b21825d-2-x86-spec-ctrl-mitigations-for-LazyFPU.patch
    5b238b92-x86-HVM-account-for-fully-eager-FPU.patch
    5b2b7172-x86-EFI-fix-FPU-state-handling-around-runtime-calls.patch
    5b31e004-x86-HVM-emul-attempts-FPU-set-fpu_initialised.patch
    5b323e3c-x86-EFI-fix-FPU-state-handling-around-runtime-calls.patch
    5b34882d-x86-mm-dont-bypass-preemption-checks.patch
    5b348874-x86-refine-checks-in-DB-handler.patch
    5b348897-libxl-qemu_disk_scsi_drive_string-break-out-common.patch
    5b3488a2-libxl-restore-passing-ro-to-qemu-for-SCSI-disks.patch
    5b34891a-x86-HVM-dont-cause-NM-to-be-raised.patch
    5b348954-x86-guard-against-NM.patch
    libxl.Add-a-version-check-of-QEMU-for-QMP-commands.patch
    libxl.LIBXL_DESTROY_TIMEOUT.patch
    libxl.qmp-Tell-QEMU-about-live-migration-or-snapshot.patch
    xen_fix_build_with_acpica_20180427_and_new_packages.patch
* Wed Jul 04 2018 trenn@suse.de
  - Submit upstream patch libacpi: fixes for iasl >= 20180427
    git commit 858dbaaeda33b05c1ac80aea0ba9a03924e09005
    xen_fix_build_with_acpica_20180427_and_new_packages.patch
    This is needed for acpica package to get updated in our build service
* Fri Jun 29 2018 carnold@suse.com
  - Upstream patches from Jan (bsc#1027519)
    5b02c786-x86-AMD-mitigations-for-GPZ-SP4.patch (Replaces Spectre-v4-1.patch)
    5b02c786-x86-Intel-mitigations-for-GPZ-SP4.patch (Replaces Spectre-v4-2.patch)
    5b02c786-x86-msr-virtualise-SPEC_CTRL-SSBD.patch (Replaces Spectre-v4-3.patch)
    5b0bc9da-x86-XPTI-fix-S3-resume.patch
    5b0d2286-libxc-x86-PV-dont-hand-through-CPUID-leaf-0x80000008.patch
    5b0d2d91-x86-suppress-sync-when-XPTI-off.patch
    5b0d2dbc-x86-correct-default_xen_spec_ctrl.patch
    5b0d2ddc-x86-CPUID-dont-override-tool-stack-hidden-STIBP.patch
    5b150ef9-x86-fix-error-handling-of-pv-dr7-shadow.patch
    5b21825d-1-x86-support-fully-eager-FPU-context-switching.patch (Replaces xsa267-1.patch)
    5b21825d-2-x86-spec-ctrl-mitigations-for-LazyFPU.patch (Replaces xsa267-2.patch)
    5b238b92-x86-HVM-account-for-fully-eager-FPU.patch
    5b2b7172-x86-EFI-fix-FPU-state-handling-around-runtime-calls.patch
    5b31e004-x86-HVM-emul-attempts-FPU-set-fpu_initialised.patch
    5b323e3c-x86-EFI-fix-FPU-state-handling-around-runtime-calls.patch
    5b34882d-x86-mm-dont-bypass-preemption-checks.patch (Replaces xsa264.patch)
    5b348874-x86-refine-checks-in-DB-handler.patch (Replaces xsa265.patch)
    5b348897-libxl-qemu_disk_scsi_drive_string-break-out-common.patch (Replaces xsa266-1-<>.patch)
    5b3488a2-libxl-restore-passing-ro-to-qemu-for-SCSI-disks.patch (Replaces xsa266-2-<>.patch)
    5b34891a-x86-HVM-dont-cause-NM-to-be-raised.patch
    5b348954-x86-guard-against-NM.patch
* Mon Jun 25 2018 ohering@suse.de
  - Fix more build gcc8 related failures with xen.fuzz-_FORTIFY_SOURCE.patch
* Mon Jun 25 2018 ohering@suse.de
  - bsc#1098403 - fix regression introduced by changes for bsc#1079730
    a PV domU without qcow2 and/or vfb has no qemu attached.
    Ignore QMP errors for PV domUs to handle PV domUs with and without
    an attached qemu-xen.
    xen.bug1079730.patch
* Mon Jun 18 2018 carnold@suse.com
  - bsc#1097521 - VUL-0: CVE-2018-12891: xen: preemption checks
    bypassed in x86 PV MM handling (XSA-264)
    xsa264.patch
  - bsc#1097522 - VUL-0: CVE-2018-12893: xen: x86: #DB exception
    safety check can be triggered by a guest (XSA-265)
    xsa265.patch
  - bsc#1097523 - VUL-0: CVE-2018-12892: xen: libxl fails to honour
    readonly flag on HVM emulated SCSI disks (XSA-266)
    xsa266-1-libxl-qemu_disk_scsi_drive_string-Break-out-common-p.patch
    xsa266-2-libxl-restore-passing-readonly-to-qemu-for-SCSI-disk.patch
* Wed Jun 13 2018 carnold@suse.com
  - bsc#1095242 - VUL-0: CVE-2018-3665: xen: Lazy FP Save/Restore
    (XSA-267)
    xsa267-1.patch
    xsa267-2.patch
* Fri Jun 01 2018 carnold@suse.com
  - bsc#1092543 - GCC 8: xen build fails
    gcc8-fix-warning-on-i586.patch
* Fri May 18 2018 carnold@suse.com
  - bsc#1092631 - VUL-0: CVE-2018-3639: xen: V4 – Speculative Store
    Bypass aka "Memory Disambiguation" (XSA-263)
    5ad4923e-x86-correct-S3-resume-ordering.patch
    5ad49293-x86-suppress-BTI-mitigations-around-S3.patch
    5afc13ae-1-x86-read-MSR_ARCH_CAPABILITIES-once.patch
    5afc13ae-2-x86-express-Xen-SPEC_CTRL-choice-as-variable.patch
    5afc13ae-3-x86-merge-bti_ist_info-use_shadow_spec_ctrl.patch
    5afc13ae-4-x86-fold-XEN_IBRS-ALTERNATIVES.patch
    5afc13ae-5-x86-rename-bits-of-spec_ctrl-infrastructure.patch
    5afc13ae-6-x86-elide-MSR_SPEC_CTRL-handling-in-idle.patch
    5afc13ae-7-x86-split-X86_FEATURE_SC_MSR.patch
    5afc13ae-8-x86-explicitly-set-Xen-default-SPEC_CTRL.patch
    5afc13ae-9-x86-cpuid-improve-guest-policies-for-speculative.patch
    5afc13ae-A-x86-introduce-spec-ctrl-cmdline-opt.patch
    Spectre-v4-1.patch
    Spectre-v4-2.patch
    Spectre-v4-3.patch
* Thu May 17 2018 ohering@suse.de
  - Always call qemus xen-save-devices-state in suspend/resume to
    fix migration with qcow2 images (bsc#1079730)
    libxl.Add-a-version-check-of-QEMU-for-QMP-commands.patch
    libxl.qmp-Tell-QEMU-about-live-migration-or-snapshot.patch
    xen.bug1079730.patch
* Wed May 16 2018 carnold@suse.com
  - bsc#1087289 - L3: Xen BUG at sched_credit.c:1663
    5aeaeae4-introduce-vcpu_sleep_nosync_locked.patch
    5aeaeaf0-sched-fix-races-in-vcpu-migration.patch
  - Upstream patches from Jan (bsc#1027519)
    5ad600d4-x86-pv-introduce-x86emul_read_dr.patch
    5ad600d4-x86-pv-introduce-x86emul_write_dr.patch
    5ad8c3a7-x86-spec_ctrl-update-retpoline-decision-making.patch
    5adda097-x86-HPET-fix-race-triggering-ASSERT.patch
    5adda0d5-x86-HVM-never-retain-emulated-insn-cache.patch
    5ae06fad-SVM-fix-intercepts-for-SYS-CALL-ENTER-MSRs.patch
    5ae31917-x86-cpuidle-init-stats-lock-once.patch
    5aeb2c57-x86-retval-checks-of-set-guest-trapbounce.patch
    5af1daa9-1-x86-traps-fix-dr6-handing-in-DB-handler.patch (Replaces xsa260-1.patch)
    5af1daa9-2-x86-pv-move-exception-injection-into-test_all_events.patch (Replaces xsa260-2.patch)
    5af1daa9-3-x86-traps-use-IST-for-DB.patch (Replaces xsa260-3.patch)
    5af1daa9-4-x86-traps-fix-handling-of-DB-in-hypervisor-context.patch (Replaces xsa260-4.patch)
    5af1daa9-x86-HVM-guard-against-bogus-emulator-ioreq-state.patch (Replaces xsa262.patch)
    5af1daa9-x86-vpt-support-IO-APIC-routed-intr.patch (Replaces xsa261.patch)
    5af97999-viridian-cpuid-leaf-40000003.patch
* Fri May 11 2018 carnold@suse.com
  - Fixes related to Page Table Isolation (XPTI). bsc#1074562 XSA-254
    5a6703cb-x86-move-invocations-of-hvm_flush_guest_tlbs.patch
    5a9985bd-x86-invpcid-support.patch
    5adde9ed-xpti-fix-double-fault-handling.patch
    5aec7393-1-x86-xpti-avoid-copy.patch
    5aec7393-2-x86-xpti-write-cr3.patch
    5aec744a-3-x86-xpti-per-domain-flag.patch
    5aec744a-4-x86-xpti-use-invpcid.patch
    5aec744a-5-x86-xpti-no-global-pages.patch
    5aec744a-6-x86-xpti-cr3-valid-flag.patch
    5aec744a-7-x86-xpti-pv_guest_cr4_to_real_cr4.patch
    5aec744b-8-x86-xpti-cr3-helpers.patch
    5aec74a8-9-x86-xpti-use-pcid.patch
* Wed May 09 2018 carnold@suse.com
  - bsc#1092543 - GCC 8: xen build fails
    5ac72a48-gcc8.patch
    5ac72a5f-gcc8.patch
    5ac72a64-gcc8.patch
    5ac72a69-gcc8.patch
    5ac72a6e-gcc8.patch
    5ac72a74-gcc8.patch
    5ac72a7b-gcc8.patch
    gcc8-inlining-failed.patch
* Tue May 08 2018 carnold@suse.com
  - Update to Xen 4.10.1 bug fix release (bsc#1027519)
    xen-4.10.1-testing-src.tar.bz2
    disable-building-pv-shim.patch
  - Drop the following patches contained in the new tarball
    5a21a77e-x86-pv-construct-d0v0s-GDT-properly.patch
    5a2fda0d-x86-mb2-avoid-Xen-when-looking-for-module-crashkernel-pos.patch
    5a2ffc1f-x86-mm-drop-bogus-paging-mode-assertion.patch
    5a313972-x86-microcode-add-support-for-AMD-Fam17.patch
    5a32bd79-x86-vmx-dont-use-hvm_inject_hw_exception-in-.patch
    5a4caa5e-x86-IRQ-conditionally-preserve-access-perm.patch
    5a4caa8c-x86-E820-don-t-overrun-array.patch
    5a4e2bca-x86-free-msr_vcpu_policy-during-destruction.patch
    5a4e2c2c-x86-upcall-inject-spurious-event-after-setting-vector.patch
    5a4fd893-1-x86-break-out-alternative-asm-into-separate-header.patch
    5a4fd893-2-x86-introduce-ALTERNATIVE_2-macros.patch
    5a4fd893-3-x86-hvm-rename-update_guest_vendor-to-cpuid_policy_changed.patch
    5a4fd893-4-x86-introduce-cpuid_policy_updated.patch
    5a4fd893-5-x86-entry-remove-partial-cpu_user_regs.patch
    5a4fd894-1-x86-rearrange-RESTORE_ALL-to-restore-in-stack-order.patch
    5a4fd894-2-x86-hvm-use-SAVE_ALL-after-VMExit.patch
    5a4fd894-3-x86-erase-guest-GPRs-on-entry-to-Xen.patch
    5a4fd894-4-clarifications-to-wait-infrastructure.patch
    5a534c78-x86-dont-use-incorrect-CPUID-values-for-topology.patch
    5a5cb24c-x86-mm-always-set-_PAGE_ACCESSED-on-L4-updates.patch
    5a5e2cff-x86-Meltdown-band-aid.patch
    5a5e2d73-x86-Meltdown-band-aid-conditional.patch
    5a5e3a4e-1-x86-support-compiling-with-indirect-branch-thunks.patch
    5a5e3a4e-2-x86-support-indirect-thunks-from-asm.patch
    5a5e3a4e-3-x86-report-speculative-mitigation-details.patch
    5a5e3a4e-4-x86-AMD-set-lfence-as-Dispatch-Serialising.patch
    5a5e3a4e-5-x86-introduce-alternative-indirect-thunks.patch
    5a5e3a4e-6-x86-definitions-for-Indirect-Branch-Controls.patch
    5a5e3a4e-7-x86-cmdline-opt-to-disable-IBRS-IBPB-STIBP.patch
    5a5e459c-1-x86-SVM-offer-CPUID-faulting-to-AMD-HVM-guests.patch
    5a5e459c-2-x86-report-domain-id-on-CPUID.patch
    5a68bc16-x86-acpi-process-softirqs-logging-Cx.patch
    5a69c0b9-x86-fix-GET_STACK_END.patch
    5a6b36cd-1-x86-cpuid-handling-of-IBRS-IBPB-STIBP-and-IBRS-for-guests.patch
    5a6b36cd-2-x86-msr-emulation-of-SPEC_CTRL-PRED_CMD.patch
    5a6b36cd-3-x86-migrate-MSR_SPEC_CTRL.patch
    5a6b36cd-4-x86-hvm-permit-direct-access-to-SPEC_CTRL-PRED_CMD.patch
    5a6b36cd-5-x86-use-SPEC_CTRL-on-entry.patch
    5a6b36cd-6-x86-clobber-RSB-RAS-on-entry.patch
    5a6b36cd-7-x86-no-alternatives-in-NMI-MC-paths.patch
    5a6b36cd-8-x86-boot-calculate-best-BTI-mitigation.patch
    5a6b36cd-9-x86-issue-speculation-barrier.patch
    5a6b36cd-A-x86-offer-Indirect-Branch-Controls-to-guests.patch
    5a6b36cd-B-x86-clear-SPEC_CTRL-while-idle.patch
    5a7b1bdd-x86-reduce-Meltdown-band-aid-IPI-overhead.patch
    5a843807-x86-spec_ctrl-fix-bugs-in-SPEC_CTRL_ENTRY_FROM_INTR_IST.patch
    5a856a2b-x86-emul-fix-64bit-decoding-of-segment-overrides.patch
    5a856a2b-x86-use-32bit-xors-for-clearing-GPRs.patch
    5a856a2b-x86-xpti-hide-almost-all-of-Xen-image-mappings.patch
    5a8be788-x86-nmi-start-NMI-watchdog-on-CPU0-after-SMP.patch
    5a95373b-x86-PV-avoid-leaking-other-guests-MSR_TSC_AUX.patch
    5a95571f-memory-dont-implicitly-unpin-in-decrease-res.patch
    5a95576c-gnttab-ARM-dont-corrupt-shared-GFN-array.patch
    5a955800-gnttab-dont-free-status-pages-on-ver-change.patch
    5a955854-x86-disallow-HVM-creation-without-LAPIC-emul.patch
    5a956747-x86-HVM-dont-give-wrong-impression-of-WRMSR-success.patch
    5a9eb7f1-x86-xpti-dont-map-stack-guard-pages.patch
    5a9eb85c-x86-slightly-reduce-XPTI-overhead.patch
    5a9eb890-x86-remove-CR-reads-from-exit-to-guest-path.patch
    5aa2b6b9-cpufreq-ondemand-CPU-offlining-race.patch
    5aaa9878-x86-vlapic-clear-TMR-bit-for-edge-triggered-intr.patch
    xsa258.patch
    xsa259.patch
* Wed Apr 25 2018 carnold@suse.com
  - bsc#1090820 - VUL-0: CVE-2018-8897: xen: x86: mishandling of
    debug exceptions (XSA-260)
    xsa260-1.patch
    xsa260-2.patch
    xsa260-3.patch
    xsa260-4.patch
  - bsc#1090822 - VUL-0: CVE-2018-10982: xen: x86 vHPET interrupt
    injection errors (XSA-261)
    xsa261.patch
  - bsc#1090823 - VUL-0: CVE-2018-10981: xen: qemu may drive Xen into
    unbounded loop (XSA-262)
    xsa262.patch
* Mon Apr 16 2018 carnold@suse.com
  - bsc#1089152 - VUL-0: CVE-2018-10472: xen: Information leak via
    crafted user-supplied CDROM (XSA-258)
    xsa258.patch
  - bsc#1089635 - VUL-0: CVE-2018-10471: xen: x86: PV guest may crash
    Xen with XPTI (XSA-259)
    xsa259.patch
* Wed Mar 28 2018 ohering@suse.de
  - Preserve xen-syms from xen-dbg.gz to allow processing vmcores
    with crash(1) (bsc#1087251)
* Mon Mar 26 2018 carnold@suse.com
  - Upstream patches from Jan (bsc#1027519) and fixes related to
    Page Table Isolation (XPTI). See also bsc#1074562 XSA-254
    5a856a2b-x86-xpti-hide-almost-all-of-Xen-image-mappings.patch
    5a9eb7f1-x86-xpti-dont-map-stack-guard-pages.patch
    5a9eb85c-x86-slightly-reduce-XPTI-overhead.patch
    5a9eb890-x86-remove-CR-reads-from-exit-to-guest-path.patch
    5aa2b6b9-cpufreq-ondemand-CPU-offlining-race.patch
    5aaa9878-x86-vlapic-clear-TMR-bit-for-edge-triggered-intr.patch
* Thu Mar 01 2018 carnold@suse.com
  - bsc#1072834 - Xen HVM: unchecked MSR access error: RDMSR from
    0xc90 at rIP: 0xffffffff93061456 (native_read_msr+0x6/0x30)
    5a956747-x86-HVM-dont-give-wrong-impression-of-WRMSR-success.patch
  - Upstream patches from Jan (bsc#1027519)
    5a79d7ed-libxc-packed-initrd-dont-fail-domain-creation.patch
    5a7b1bdd-x86-reduce-Meltdown-band-aid-IPI-overhead.patch
    5a843807-x86-spec_ctrl-fix-bugs-in-SPEC_CTRL_ENTRY_FROM_INTR_IST.patch
    5a856a2b-x86-emul-fix-64bit-decoding-of-segment-overrides.patch
    5a856a2b-x86-use-32bit-xors-for-clearing-GPRs.patch
    5a8be788-x86-nmi-start-NMI-watchdog-on-CPU0-after-SMP.patch
    5a95373b-x86-PV-avoid-leaking-other-guests-MSR_TSC_AUX.patch
    5a95571f-memory-dont-implicitly-unpin-in-decrease-res.patch (Replaces xsa252.patch)
    5a95576c-gnttab-ARM-dont-corrupt-shared-GFN-array.patch (Replaces xsa255-1.patch)
    5a955800-gnttab-dont-free-status-pages-on-ver-change.patch (Replaces xsa255-2.patch)
    5a955854-x86-disallow-HVM-creation-without-LAPIC-emul.patch (Replaces xsa256.patch)
  - Drop
    xsa252.patch
    xsa255-1.patch
    xsa255-2.patch
    xsa256.patch
* Mon Feb 12 2018 carnold@suse.com
  - bsc#1080635 - VUL-0: CVE-2018-7540: xen: DoS via non-preemptable
    L3/L4 pagetable freeing (XSA-252)
    xsa252.patch
  - bsc#1080662 - VUL-0: CVE-2018-7541: xen: grant table v2 -> v1
    transition may crash Xen (XSA-255)
    xsa255-1.patch
    xsa255-2.patch
  - bsc#1080634 - VUL-0: CVE-2018-7542: xen: x86 PVH guest without
    LAPIC may DoS the host (XSA-256)
    xsa256.patch
* Fri Feb 09 2018 ohering@suse.de
  - Remove stale systemd presets code for 13.2 and older
* Fri Feb 09 2018 ohering@suse.de
  - fate#324965 - add script, udev rule and systemd service to watch
    for vcpu online/offline events in a HVM domU
    They are triggered via xl vcpu-set domU N
* Fri Feb 09 2018 ohering@suse.de
  - Replace hardcoded xen with Name tag when refering to subpkgs
* Fri Feb 09 2018 ohering@suse.de
  - Make sure tools and tools-domU require libs from the very same build
* Wed Feb 07 2018 jfehlig@suse.com
  - tools-domU: Add support for qemu guest agent. New files
    80-xen-channel-setup.rules and xen-channel-setup.sh configure a
    xen-pv-channel for use by the guest agent
    FATE#324963
* Wed Feb 07 2018 ohering@suse.de
  - Remove outdated /etc/xen/README*
* Mon Jan 29 2018 carnold@suse.com
  - bsc#1073961 - VUL-0: CVE-2018-5244: xen: x86: memory leak with
    MSR emulation (XSA-253)
    5a4e2bca-x86-free-msr_vcpu_policy-during-destruction.patch
  - bsc#1074562 - VUL-0: CVE-2017-5753,CVE-2017-5715,CVE-2017-5754
    xen: Information leak via side effects of speculative execution
    (XSA-254). Includes Spectre v2 mitigation.
    5a4caa5e-x86-IRQ-conditionally-preserve-access-perm.patch
    5a4caa8c-x86-E820-don-t-overrun-array.patch
    5a4e2c2c-x86-upcall-inject-spurious-event-after-setting-vector.patch
    5a4fd893-1-x86-break-out-alternative-asm-into-separate-header.patch
    5a4fd893-2-x86-introduce-ALTERNATIVE_2-macros.patch
    5a4fd893-3-x86-hvm-rename-update_guest_vendor-to-cpuid_policy_changed.patch
    5a4fd893-4-x86-introduce-cpuid_policy_updated.patch
    5a4fd893-5-x86-entry-remove-partial-cpu_user_regs.patch
    5a4fd894-1-x86-rearrange-RESTORE_ALL-to-restore-in-stack-order.patch
    5a4fd894-2-x86-hvm-use-SAVE_ALL-after-VMExit.patch
    5a4fd894-3-x86-erase-guest-GPRs-on-entry-to-Xen.patch
    5a4fd894-4-clarifications-to-wait-infrastructure.patch
    5a534c78-x86-dont-use-incorrect-CPUID-values-for-topology.patch
    5a5cb24c-x86-mm-always-set-_PAGE_ACCESSED-on-L4-updates.patch
    5a5e2cff-x86-Meltdown-band-aid.patch
    5a5e2d73-x86-Meltdown-band-aid-conditional.patch
    5a5e3a4e-1-x86-support-compiling-with-indirect-branch-thunks.patch
    5a5e3a4e-2-x86-support-indirect-thunks-from-asm.patch
    5a5e3a4e-3-x86-report-speculative-mitigation-details.patch
    5a5e3a4e-4-x86-AMD-set-lfence-as-Dispatch-Serialising.patch
    5a5e3a4e-5-x86-introduce-alternative-indirect-thunks.patch
    5a5e3a4e-6-x86-definitions-for-Indirect-Branch-Controls.patch
    5a5e3a4e-7-x86-cmdline-opt-to-disable-IBRS-IBPB-STIBP.patch
    5a5e459c-1-x86-SVM-offer-CPUID-faulting-to-AMD-HVM-guests.patch
    5a5e459c-2-x86-report-domain-id-on-CPUID.patch
    5a68bc16-x86-acpi-process-softirqs-logging-Cx.patch
    5a69c0b9-x86-fix-GET_STACK_END.patch
    5a6b36cd-1-x86-cpuid-handling-of-IBRS-IBPB-STIBP-and-IBRS-for-guests.patch
    5a6b36cd-2-x86-msr-emulation-of-SPEC_CTRL-PRED_CMD.patch
    5a6b36cd-3-x86-migrate-MSR_SPEC_CTRL.patch
    5a6b36cd-4-x86-hvm-permit-direct-access-to-SPEC_CTRL-PRED_CMD.patch
    5a6b36cd-5-x86-use-SPEC_CTRL-on-entry.patch
    5a6b36cd-6-x86-clobber-RSB-RAS-on-entry.patch
    5a6b36cd-7-x86-no-alternatives-in-NMI-MC-paths.patch
    5a6b36cd-8-x86-boot-calculate-best-BTI-mitigation.patch
    5a6b36cd-9-x86-issue-speculation-barrier.patch
    5a6b36cd-A-x86-offer-Indirect-Branch-Controls-to-guests.patch
    5a6b36cd-B-x86-clear-SPEC_CTRL-while-idle.patch
* Fri Jan 26 2018 carnold@suse.com
  - Fix python3 deprecated atoi call (bsc#1067224)
    pygrub-python3-conversion.patch
  - Drop xenmon-python3-conversion.patch
* Wed Jan 10 2018 ohering@suse.de
  - bsc#1067317 - pass cache=writeback|unsafe|directsync to qemu,
    depending on the libxl disk settings
    libxl.add-option-to-disable-disk-cache-flushes-in-qdisk.patch
* Mon Jan 08 2018 ohering@suse.de
  - Remove libxl.LIBXL_DESTROY_TIMEOUT.debug.patch
* Fri Jan 05 2018 carnold@suse.com
  - bsc#1067224 - xen-tools have hard dependency on Python 2
    build-python3-conversion.patch
    bin-python3-conversion.patch

Files

/usr/lib/libxencall.so.1
/usr/lib/libxencall.so.1.2
/usr/lib/libxenctrl.so.4.13
/usr/lib/libxenctrl.so.4.13.0
/usr/lib/libxendevicemodel.so.1
/usr/lib/libxendevicemodel.so.1.3
/usr/lib/libxenevtchn.so.1
/usr/lib/libxenevtchn.so.1.1
/usr/lib/libxenforeignmemory.so.1
/usr/lib/libxenforeignmemory.so.1.3
/usr/lib/libxenfsimage.so.4.13
/usr/lib/libxenfsimage.so.4.13.0
/usr/lib/libxengnttab.so.1
/usr/lib/libxengnttab.so.1.2
/usr/lib/libxenguest.so.4.13
/usr/lib/libxenguest.so.4.13.0
/usr/lib/libxenlight.so.4.13
/usr/lib/libxenlight.so.4.13.0
/usr/lib/libxenstat.so.4.13
/usr/lib/libxenstat.so.4.13.0
/usr/lib/libxenstore.so.3.0
/usr/lib/libxenstore.so.3.0.3
/usr/lib/libxentoolcore.so.1
/usr/lib/libxentoolcore.so.1.0
/usr/lib/libxentoollog.so.1
/usr/lib/libxentoollog.so.1.0
/usr/lib/libxenvchan.so.4.13
/usr/lib/libxenvchan.so.4.13.0
/usr/lib/libxlutil.so.4.13
/usr/lib/libxlutil.so.4.13.0
/usr/lib/xenfsimage
/usr/lib/xenfsimage/ext2fs
/usr/lib/xenfsimage/ext2fs/fsimage.so
/usr/lib/xenfsimage/fat
/usr/lib/xenfsimage/fat/fsimage.so
/usr/lib/xenfsimage/iso9660
/usr/lib/xenfsimage/iso9660/fsimage.so
/usr/lib/xenfsimage/reiserfs
/usr/lib/xenfsimage/reiserfs/fsimage.so
/usr/lib/xenfsimage/ufs
/usr/lib/xenfsimage/ufs/fsimage.so
/usr/lib/xenfsimage/xfs
/usr/lib/xenfsimage/xfs/fsimage.so
/usr/lib/xenfsimage/zfs
/usr/lib/xenfsimage/zfs/fsimage.so


Generated by rpm2html 1.8.1

Fabrice Bellet, Sun Jan 12 23:46:27 2020