xen-ocaml-devel-4.5.3-8.fc22$>$*ǔΚ`,w>8?d  I  .>DL  $   k    {      1( Z8 dr9,r:YDrGpHIHXdYl\]^zb*deflt uvw xxCxen-ocaml-devel4.5.38.fc22Ocaml development libraries for Xen toolsThis package contains libraries for developing ocaml tools to manage Xen virtual machines.W_buildhw-06.phx2.fedoraproject.orgFedora ProjectFedora ProjectGPLv2+ and LGPLv2+ and BSDFedora ProjectDevelopment/Librarieshttp://xen.org/linuxi686m0lo;d (YbSg!D}HW_W_W_W_W_W_W_W_W_W_W_W_W_W_W_W_W_W_W_W_W_W_W_W_W_W_W_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-4.5.3-8.fc22.src.rpmxen-ocaml-develxen-ocaml-devel(x86-32)    rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)xen-ocaml3.0.4-14.6.0-14.0-15.2-14.5.3-8.fc224.12.0.1W_WRWI@W;W1@W0{W@VVn@Vm@V`VvVrVii@Vf@Vd#@VA@V9@V3[VVZVV@VU@U@UWU@UU@U@UU@U@UUx&Un@UmUSP$P!@P1@P@P @P @O/@O:O@O@O@OvOX@OX@ON@ON@O?O2cO1@O*zO#@OO yN=@N^N$@NN]N @NGN&@MM@MM@MOMF@MD@MBLML@L*@LLzKLuLV@LMxLL'@LH2LL @L@K K J@J0@J^@J J|@Jyt@JmJ|J+@IV@I@I@II@I1IsIeIHI1.HH@Ht@Hd@Hb3@HRa@HE2@H*@GPGPG Gs@G@GG G@G@GGGaGY5GQLG,bG!G FIFIFFFF@F@F@FuFnFVFLCF9F7+F5@F5@F5@F0@F0@F-@F-@EEWEEE3@E3@EE@E&E@E#@E#@E E@E@EgEgE@E~E-@E-@DfDfD@D@D}D,@DDDD@DГD@D@D@DDDDD{D5D5DDA@DDDDW@DDD[>@DP@DO`DN@DDDD uD $@D $@D@D@DD;@CC.C@C@CCCCC@CQ@CQ@CCh@CCCáC@C}@C@Cx|@Cu@Cs6@CqCqCqCX@C)b@C%mC 'C CB@BB@BBlB_BOBN@BK@BGB.@B*B(MB&@Bp@B*@BBAo@Ao@A4A@A@AAn@A(@A@A@A@A@Michael Young - 4.5.3-8Michael Young - 4.5.3-7Michael Young - 4.5.3-6Michael Young - 4.5.3-5Michael Young - 4.5.3-4Michael Young - 4.5.3-3Michael Young - 4.5.3-2Michael Young - 4.5.3-1Michael Young - 4.5.2-10Michael Young - 4.5.2-9Michael Young - 4.5.2-8Michael Young - 4.5.2-7Michael Young - 4.5.2-6Michael Young - 4.5.2-5Michael Young - 4.5.2-4Michael Young - 4.5.2-3Michael Young - 4.5.2-2Michael Young - 4.5.2-1Michael Young - 4.5.1-14Michael Young - 4.5.1-13Michael Young - 4.5.1-12Michael Young - 4.5.1-11Michael Young - 4.5.1-10Michael Young - 4.5.1-9Michael Young - 4.5.1-8Michael Young - 4.5.1-7Michael Young - 4.5.1-6Michael Young - 4.5.1-5Richard W.M. Jones - 4.5.1-4Michael Young - 4.5.1-3Michael Young - 4.5.1-2Michael Young - 4.5.1-1Richard W.M. Jones - 4.5.0-13Fedora Release Engineering - 4.5.0-12Michael Young Michael Young - 4.5.0-11Michael Young - 4.5.0-10.1Michael Young - 4.5.0-10Michael Young - 4.5.0-9Michael Young - 4.5.0-8Michael Young - 4.5.0-7Michael Young - 4.5.0-6Michael Young - 4.5.0-5Michael Young - 4.5.0-4Michael Young - 4.5.0-3Michael Young - 4.5.0-2Michael Young - 4.5.0-1Michael Young - 4.4.1-12Michael Young - 4.4.1-11Michael Young - 4.4.1-10Michael Young - 4.4.1-9Michael Young - 4.4.1-8Michael Young - 4.4.1-7Michael Young - 4.4.1-6Michael Young - 4.4.1-5Michael Young - 4.4.1-4Michael Young - 4.4.1-3Michael Young - 4.4.1-2Michael Young - 4.4.1-1Richard W.M. Jones - 4.4.0-14Richard W.M. Jones - 4.4.0-13Richard W.M. Jones - 4.4.0-12Fedora Release Engineering - 4.4.0-11Michael Young - 4.4.0-10Richard W.M. Jones - 4.4.0-9Michael Young - 4.4.0-8Michael Young - 4.4.0-7Michael Young - 4.4.0-6Fedora Release Engineering - 4.4.0-5Michael Young - 4.4.0-4Michael Young - 4.4.0-3Michael Young - 4.4.0-2Michael Young - 4.4.0-1Michael Young - 4.3.2-1Michael Young - 4.3.1-10Michael Young - 4.3.1-9Michael Young - 4.3.1-8Michael Young - 4.3.1-7Michael Young - 4.3.1-6Michael Young - 4.3.1-5Michael Young - 4.3.1-4Michael Young - 4.3.1-3Michael Young - 4.3.1-2Michael Young - 4.3.1-1Michael Young - 4.3.0-10Michael Young - 4.3.0-9Michael Young - 4.3.0-8Michael Young - 4.3.0-7Michael Young - 4.3.0-6Richard W.M. Jones - 4.3.0-5Fedora Release Engineering - 4.3.0-4Michael Young - 4.3.0-2 4.3.0-3Michael Young - 4.3.0-1Michael Young - 4.2.2-10Michael Young - 4.2.2-9Michael Young - 4.2.2-8Michael Young - 4.2.2-7Michael Young - 4.2.2-6Michael Young - 4.2.2-5Michael Young - 4.2.2-4Michael Young - 4.2.2-3Michael Young - 4.2.2-2Michael Young - 4.2.2-1Michael Young - 4.2.1-10Michael Young - 4.2.1-9Michael Young - 4.2.1-8Michael Young - 4.2.1-7Michael Young - 4.2.1-6Michael Young Michael Young - 4.2.1-5Michael Young - 4.2.1-4Michael Young - 4.2.1-3Michael Young - 4.2.1-2Michael Young - 4.2.1-1Richard W.M. Jones - 4.2.0-7Michael Young - 4.2.0-6Michael Young - 4.2.0-5Michael Young - 4.2.0-4Michael Young - 4.2.0-3Michael Young - 4.2.0-2Michael Young - 4.2.0-1Michael Young - 4.1.3-6Michael Young - 4.1.3-5Michael Young - 4.1.3-4Michael Young - 4.1.3-3Michael Young - 4.1.3-1 4.1.3-2Michael Young - 4.1.2-25Michael Young - 4.1.2-24Michael Young - 4.1.2-23Michael Young - 4.1.2-22Fedora Release Engineering - 4.1.2-21Michael Young - 4.1.2-20Michael Young - 4.1.2-19Michael Young - 4.1.2-18Michael Young - 4.1.2-16 4.1.2-17Michael Young - 4.1.2-15Michael Young - 4.1.2-14Michael Young - 4.1.2-13Michael Young - 4.1.2-12Michael Young - 4.1.2-11Michael Young - 4.1.2-10Michael Young - 4.1.2-9Michael Young - 4.1.2-8Michael Young - 4.1.2-7Michael Young - 4.1.2-6Michael Young - 4.1.2-5Michael Young - 4.1.2-4Michael Young - 4.1.2-3Michael Young - 4.1.2-2Michael Young - 4.1.2-1Michael Young - 4.1.1-8Michael Young - 4.1.1-7Michael Young - 4.1.1-5 4.1.1-6Michael Young - 4.1.1-4Michael Young - 4.1.1-3Michael Young - 4.1.1-2Michael Young - 4.1.1-1Michael Young - 4.1.0-2Michael Young - 4.1.0-1Michael Young - 4.1.0-0.1.rc8Fedora Release Engineering - 4.0.1-10Michael Young - 4.0.1-9Michael Young - 4.0.1-8Michael Young - 4.0.1-7Michael Young - 4.0.1-6Michael Young - 4.0.1-5jkeating - 4.0.1-4Michael Young - 4.0.1-3Michael Young - 4.0.1-2Michael Young - 4.0.1-1Michael Young - 4.0.0-5Michael Young Michael Young - 4.0.0-4David Malcolm - 4.0.0-3Michael Young - 4.0.0-2Michael Young - 4.0.0-1Michael Young - 3.4.3-1Gerd Hoffmann - 3.4.2-2Gerd Hoffmann - 3.4.2-1Justin M. Forbes - 3.4.1-5Gerd Hoffmann - 3.4.1-4Gerd Hoffmann - 3.4.1-3Gerd Hoffmann - 3.4.1-2Gerd Hoffmann - 3.4.1-1Gerd Hoffmann - 3.4.0-4Fedora Release Engineering - 3.4.0-3Gerd Hoffmann - 3.4.0-2Gerd Hoffmann - 3.4.0-1Gerd Hoffmann - 3.3.1-11Gerd Hoffmann - 3.3.1-9Gerd Hoffmann - 3.3.1-7Gerd Hoffmann - 3.3.1-6Gerd Hoffmann - 3.3.1-5Gerd Hoffmann - 3.3.1-3Tomas Mraz - 3.3.1-2Gerd Hoffmann - 3.3.1-1Gerd Hoffmann - 3.3.0-2Ignacio Vazquez-Abrams - 3.3.0-1.1Daniel P. Berrange - 3.3.0-1.fc10Mark McLoughlin - 3.2.0-17.fc10Daniel P. Berrange - 3.2.0-16.fc10Markus Armbruster - 3.2.0-15.fc10Daniel P. Berrange - 3.2.0-14.fc10Markus Armbruster - 3.2.0-13.fc10Daniel P. Berrange - 3.2.0-12.fc10Markus Armbruster - 3.2.0-11.fc10Daniel P. Berrange - 3.2.0-10.fc9Daniel P. Berrange - 3.2.0-9.fc9Daniel P. Berrange - 3.2.0-8.fc9Mark McLoughlin - 3.2.0-7.fc9Daniel P. Berrange - 3.2.0-6.fc9Daniel P. Berrange - 3.2.0-5.fc9Daniel P. Berrange - 3.2.0-4.fc9Daniel P. Berrange - 3.2.0-3.fc9Daniel P. Berrange - 3.2.0-2.fc9Daniel P. Berrange - 3.2.0-1.fc9Daniel P. Berrange - 3.2.0-0.fc9.rc5.dev16701.1Daniel P. Berrange - 3.1.2-3.fc9Release Engineering - 3.1.2-2.fc9Daniel P. Berrange - 3.1.2-1.fc9Daniel P. Berrange - 3.1.0-14.fc9Daniel P. Berrange - 3.1.0-13.fc9Daniel P. Berrange - 3.1.0-12.fc8Daniel P. Berrange - 3.1.0-11.fc8Chris Lalancette - 3.1.0-10.fc8Daniel P. Berrange - 3.1.0-9.fc8Daniel P. Berrange - 3.1.0-8.fc8Daniel P. Berrange - 3.1.0-7.fc8Daniel P. Berrange - 3.1.0-6.fc8Daniel P. Berrange - 3.1.0-5.fc8Daniel P. Berrange - 3.1.0-4.fc8Markus Armbruster - 3.1.0-3.fc8Daniel P. Berrange - 3.1.0-2.fc8Daniel P. Berrange - 3.1.0-1.fc8Daniel P. Berrange - 3.1.0-0.rc7.2.fc7Daniel P. Berrange - 3.1.0-0.rc7.1.fc7Daniel P. Berrange - 3.0.5-0.rc4.4.fc7Daniel P. Berrange - 3.0.5-0.rc4.3.fc7Daniel P. Berrange - 3.0.5-0.rc4.2.fc7Daniel P. Berrange - 3.0.5-0.rc4.1.fc7Daniel P. Berrange - 3.0.5-0.rc3.14934.2.fc7Daniel P. Berrange - 3.0.5-0.rc3.14934.1.fc7Daniel P. Berrange - 3.0.5-0.rc2.14889.2.fc7Daniel P. Berrange - 3.0.5-0.rc2.14889.1.fc7Daniel P. Berrange - 3.0.4-9.fc7Daniel P. Berrange - 3.0.4-8.fc7Daniel P. Berrange - 3.0.4-7.fc7Daniel P. Berrange - 3.0.4-6.fc7Daniel P. Berrange - 3.0.4-5.fc7Daniel P. Berrange - 3.0.4-4.fc7Daniel P. Berrange - 3.0.4-3.fc7Daniel P. Berrange - 3.0.4-2.fc7Daniel P. Berrange - 3.0.4-1Jeremy Katz - 3.0.3-3Jeremy Katz - 3.0.3-2Daniel P. Berrange - 3.0.3-1Jeremy Katz - 3.0.2-44Stephen C. Tweedie - 3.0.2-43Daniel P. Berrange - 3.0.2-42Stephen C. Tweedie - 3.0.2-41Stephen C. Tweedie - 3.0.2-40Daniel Berrange - 3.0.2-39Jeremy Katz - 3.0.2-38Daniel P. Berrange - 3.0.2-37Stephen C. Tweedie - 3.0.2-36Stephen C. Tweedie - 3.0.2-35Stephen C. Tweedie - 3.0.2-34Jeremy Katz - 3.0.2-33Juan Quintela - 3.0.2-31Jeremy Katz - 3.0.2-31Jeremy Katz - 3.0.2-30Jeremy Katz - 3.0.2-29Jeremy Katz - 3.0.2-28Jeremy Katz - 3.0.2-27Jeremy Katz - 3.0.2-26Jeremy Katz - 3.0.2-25Jeremy Katz - 3.0.2-24Jeremy Katz - 3.0.2-23Jeremy Katz - 3.0.2-22Rik van Riel - 3.0.2-21Jeremy Katz - 3.0.2-20Jeremy Katz - 3.0.2-19Jeremy Katz - 3.0.2-18Mark McLoughlin - 3.0.2-17Mark McLoughlin 3.0.2-16Daniel Veillard - 3.0.2-15Stephen C. Tweedie - 3.0.2-14Stephen C. Tweedie - 3.0.2-13Daniel Veillard - 3.0.2-12Jeremy Katz - 3.0.2-11Jeremy Katz - 3.0.2-10Jeremy Katz - 3.0.2-9Jeremy Katz - 3.0.2-8Daniel Veillard - 3.0.2-7Stephen C. Tweedie - 3.0.2-6Stephen C. Tweedie - 3.0.2-5Jeremy Katz - 3.0.2-4Daniel Veillard - 3.0.2-3Jeremy Katz - 3.0.2-2Jeremy Katz - 3.0.2-1Daniel Veillard - 3.0.1-5Jeremy Katz - 3.0.1-4Jeremy Katz - 3.0.1-3Stephen Tweedie - 3.0.1-2Jeremy Katz - 3.0.1-1Stephen Tweedie - 3.0.1-0.20060301.fc5.3Rik van Riel - 3.0.1-0.20060301.fc5.2Stephen Tweedie - 3.0.1-0.20060301.fc5.1Stephen Tweedie - 3.0.1-0.20060228.fc5.1Jeremy Katz - 3.0.1-0.20060208.fc5.3Jeremy Katz - 3.0.1-0.20060208.fc5.2Jeremy Katz - 3.0.1-0.20060208.fc5.1Jeremy Katz - 3.0.1-0.20060208.fc5Jeremy Katz - 3.0-0.20060130.fc5.6Jeremy Katz - 3.0-0.20060130.fc5.5Jeremy Katz - 3.0-0.20060130.fc5.4Jesse Keating - 3.0-0.20060130.fc5.3.1Bill Nottingham 3.0-0.20060130.fc5.3Bill Nottingham 3.0-0.20060130.fc5.2 - 3.0-0.20060130.fc5.1 - 3.0-0.20060130.fc5Jeremy Katz - 3.0-0.20060110.fc5.5Bill Nottingham - 3.0-0.20060110.fc5.4Jeremy Katz - 3.0-0.20060110.fc5.3 - 3.0-0.20060110.fc5.1Jesse Keating - 3.0-0.20051206.fc5.2Juan Quintela - 3.0-0.20051206.fc5.1Daniel Veillard - 3.0-0.20051109.fc5.4Jeremy Katz - 3.0-0.20051109.fc5.3Jeremy Katz Jeremy Katz - 3.0-0.20051109.fc5.2Jeremy Katz - 3.0-0.20051109.fc5.1Jeremy Katz - 3.0-0.20051109.fc5Jeremy Katz - 3.0-0.20051108.fc5Jeremy Katz - 3.0-0.20051021.fc5Jeremy Katz - 3.0-0.20050912.fc5.1Rik van Riel 3.0-0.20050912.fc5Rik van Riel 3.0-0.20050908Rik van Riel 2-20050823Rik van Riel 2-20050726Rik van Riel 2-20050530Rik van Riel 2-20050522Rik van Riel 2-20050520Rik van Riel 2-20050519Rik van Riel 2-20050424Jeremy Katz Rik van Riel 2-20050403Rik van Riel 2-20050402Rik van Riel 2-20050331Rik van Riel 2-20050328Rik van Riel 2-20050308Rik van Riel 2-20050305Rik van Riel 2-20050303Rik van Riel 2-20050303Rik van Riel 2-20050222Rik van Riel 2-20050219Rik van Riel 2-20050218Rik van Riel 2-20050207Rik van Riel 2-20050201.1Rik van Riel 2-20050201Jeremy Katz Rik van Riel - 2-20050124Jeremy Katz - 2-20050114Rik van Riel Rik van Riel Rik van Riel Rik van Riel Rik van Riel Rik van Riel Che- Qemu: scsi: esp: OOB r/w access while processing ESP_FIFO [CVE-2016-5338] (#1343323) - Qemu: scsi: megasas: information leakage in megasas_ctrl_get_info [CVE-2016-5337] (#1343909)- fix for CVE-2016-2858 doesn't build with qemu-xen enabled - Unsanitised guest input in libxl device handling code [XSA-175, CVE-2016-4962] (#1342132) - Unsanitised driver domain input in libxl device handling [XSA-178, CVE-2016-4963] (#1342131) - arm: Host crash caused by VMID exhaust [XSA-181] (#1342530) - Qemu: display: vmsvga: out-of-bounds read in vmsvga_fifo_read_raw() routine [CVE-2016-4454] (#1340741) - Qemu: display: vmsvga: infinite loop in vmsvga_fifo_run() routine [CVE-2016-4453] (#1340746) - Qemu: scsi: esp: OOB write when using non-DMA mode in get_cmd [CVE-2016-5238] (#1341931)- cleaner way to set kernel module load list - Unrestricted qemu logging [XSA-180, CVE-2014-3672] (#1339125) - Qemu: scsi: esp: OOB write while writing to 's->cmdbuf' in esp_reg_write [CVE-2016-4439] (#1337502) - Qemu: scsi: esp: OOB write while writing to 's->cmdbuf' in get_cmd [CVE-2016-4441] (#1337505) - Qemu: scsi: megasas: out-of-bounds write while setting controller properties [CVE-2016-5106] (#1339578) - Qemu: scsi: megasas: stack information leakage while reading configuration [CVE-2016-5105] (#1339583)- in systemd only try to load kernel modules that are in Fedora (#1291089) - x86 software guest page walk PS bit handling flaw [XSA-176, CVE-2016-4480] (#1332657)- create link to /usr/bin/qemu-system-i386 from /usr/lib/xen/bin for back compatibility and for virt-manager (#1334554) (#1299745) - cleaner fix for XSA-179 on qemu-xen-traditional- qemu-kvm: Integer overflow in SDL when creating too wide screen (#1330513) - QEMU: Banked access to VGA memory (VBE) uses inconsistent bounds checks [XSA-179, CVE-2016-3710, CVE-2016-3712] (#1334346) (#1334343)- x86 shadow pagetables: address width overflow [XSA-173, CVE-2016-3960] (#1328118) - Qemu: net: buffer overflow in stellaris_enet emulator [CVE-2016-4001] (#1325886) - Qemu: net: buffer overflow in MIPSnet emulator [CVE-2016-4002] (#1326084) - qemu: Infinite loop vulnerability in usb_ehci using siTD process [CVE-2016-4037] (#1328081) (supercedes CVE-2015-8558 patch)- update to 4.5.3 adjust xen.use.fedora.ipxe.patch remove patches for issues now fixed upstream renumber patches- broken AMD FPU FIP/FDP/FOP leak workaround [XSA-172, CVE-2016-3158, CVE-2016-3159] (#1321944)- Qemu: nvram: OOB r/w access in processing firmware configurations CVE-2016-1714 (#1296080) - Qemu: i386: null pointer dereference in vapic_write() CVE-2016-1922 (#1292767) - qemu: Stack-based buffer overflow in megasas_ctrl_get_info CVE-2015-8613 (#1293305) - qemu-kvm: Infinite loop and out-of-bounds transfer start in start_xmit() and e1000_receive_iov() CVE-2016-1981 (#1299996) - Qemu: usb ehci out-of-bounds read in ehci_process_itd (#1300235) - Qemu: usb: ehci null pointer dereference in ehci_caps_write CVE-2016-2198 (#1303135) - Qemu: net: ne2000: infinite loop in ne2000_receive CVE-2016-2841 (#1304048) - Qemu: usb: integer overflow in remote NDIS control message handling CVE-2016-2538 (#1305816) - Qemu: usb: null pointer dereference in remote NDIS control message handling CVE-2016-2392 (#1307116) - Qemu: usb: multiple eof_timers in ohci module leads to null pointer dereference CVE-2016-2391 (#1308882) - Qemu: net: out of bounds read in net_checksum_calculate() CVE-2016-2857 (#1309565) - Qemu: OOB access in address_space_rw leads to segmentation fault CVE-2015-8817 CVE-2015-8818 (#1313273) - Qemu: rng-random: arbitrary stack based allocation leading to corruption CVE-2016-2858 (#1314678)- x86: inconsistent cachability flags on guest mappings [XSA-154, CVE-2016-2270] (#1309324) - VMX: guest user mode may crash guest with non-canonical RIP [XSA-170, CVE-2016-2271] (#1309323)- PV superpage functionality missing sanity checks [XSA-167, CVE-2016-1570] (#1300345) - VMX: intercept issue with INVLPG on non-canonical address [XSA-168, CVE-2016-1571] (#1300342) - Qemu: pci: null pointer dereference issue CVE-2015-7549 (#1291139) - qemu: DoS by infinite loop in ehci_advance_state CVE-2015-8558 (#1291310) - qemu: Heap-based buffer overrun during VM migration CVE-2015-8666 (#1294028) - Qemu: net: vmxnet3: incorrect l2 header validation leads to a crash via assert(2) call CVE-2015-8744 (#1295441) - qemu: Support reading IMR registers on bar0 CVE-2015-8745 (#1295443) - Qemu: net: vmxnet3: host memory leakage CVE-2015-8567 CVE-2015-8568 (#1289817) - Qemu: net: ne2000: OOB memory access in ioport r/w functions CVE-2015-8743 (#1294788)- four security updates (#1292439) paravirtualized drivers incautious about shared memory contents [XSA-155, CVE-2015-8550] qemu-dm buffer overrun in MSI-X handling [XSA-164, CVE-2015-8554] information leak in legacy x86 FPU/XMM initialization [XSA-165, CVE-2015-8555] ioreq handling possibly susceptible to multiple read issue [XSA-166]- eepro100: Prevent two endless loops [CVE-2015-8345] (#1285215) - pcnet: fix rx buffer overflow [CVE-2015-7512] (#1286563) - ui: vnc: avoid floating point exception [CVE-2015-8504] (#1289544) - additional patch for [XSA-158, CVE-2015-8338]- three security updates (#1289568) long running memory operations on ARM [XSA-158, CVE-2015-8338] XENMEM_exchange error handling issues [XSA-159, CVE-2015-8339, CVE-2015-8340] libxl leak of pv kernel and initrd on error [XSA-160, CVE-2015-8341]- heap buffer overflow vulnerability in pcnet emulator [XSA-162, CVE-2015-7504] (#1286544) - virtual PMU is unsupported [XSA-163] (#1285351)- x86: CPU lockup during exception delivery [XSA-156, CVE-2015-5307, CVE-2015-8104] (#1279689, #1279690) - silence 2 macro in comment warnings- update to 4.5.2 adjust xen.use.fedora.ipxe.patch remove patches for issues now fixed upstream renumber patches- nine security updates (#1276344) arm: Host crash when preempting a multicall [XSA-145, CVE-2015-7812] arm: various unimplemented hypercalls log without rate limiting [XSA-146, CVE-2015-7813] arm: Race between domain destruction and memory allocation decrease [XSA-147, CVE-2015-7814] x86: Uncontrolled creation of large page mappings by PV guests [XSA-148, CVE-2015-7835] leak of main per-domain vcpu pointer array [XSA-149, CVE-2015-7969] x86: Long latency populate-on-demand operation is not preemptible [XSA-150, CVE-2015-7970] x86: leak of per-domain profiling-related vcpu pointer array [XSA-151, CVE-2015-7969] x86: some pmu and profiling hypercalls log without rate limiting [XSA-152, CVE-2015-7971] x86: populate-on-demand balloon size inaccuracy can crash guests [XSA-153, CVE-2015-7972]- patch CVE-2015-7295 for qemu-xen-traditional as well- Qemu: net: virtio-net possible remote DoS [CVE-2015-7295] (#1264392)- create a symbolic link so libvirt VMs from xen 4.0 to 4.4 can still find qemu-dm (#1268176), (#1248843)- ide: fix ATAPI command permissions [CVE-2015-6855] (#1261792)- ui/vnc: limit client_cut_text msg payload size [CVE-2015-5239] (#1259504) - e1000: Avoid infinite loop in processing transmit descriptor [CVE-2015-6815] (#1260224) - net: add checks to validate ring buffer pointers [CVE-2015-5279] (#1263278) - net: avoid infinite loop when receiving packets [CVE-2015-5278] (#1263281) - qemu buffer overflow in virtio-serial [CVE-2015-5745] (#1251354)- libxl fails to honour readonly flag on disks with qemu-xen [XSA-142, CVE-2015-7311] (#1257893) (final patch version)- printk is not rate-limited in xenmem_add_to_physmap_one (ARM) [XSA-141, CVE-2015-6654]- Use after free in QEMU/Xen block unplug protocol [XSA-139, CVE-2015-5166] (#1249757) - QEMU leak of uninitialized heap memory in rtl8139 device model [XSA-140, CVE-2015-5165] (#1249756)- QEMU heap overflow flaw while processing certain ATAPI commands. [XSA-138, CVE-2015-5154] (#1247142) - try again to fix xen-qemu-dom0-disk-backend.service (#1242246)- OCaml 4.02.3 rebuild.- correct qemu location in xen-qemu-dom0-disk-backend.service (#1242246) - rebuild efi grub.cfg if it is present (#1239309) - re-enable remus by building with libnl3 - modify gnutls use in line with Fedora's crypto policies (#1179352)- xl command line config handling stack overflow [XSA-137, CVE-2015-3259]- update to 4.5.1 adjust xen.use.fedora.ipxe.patch and xen.fedora.systemd.patch remove patches for issues now fixed upstream renumber patches- Rebuild for ocaml-4.02.2.- Rebuilt for https://fedoraproject.org/wiki/Fedora_23_Mass_Rebuild- gcc 5 bug is fixed so remove workaround- stubs-32.h is back, so revert to previous behaviour - Heap overflow in QEMU PCNET controller, allowing guest->host escape [XSA-135, CVE-2015-3209] (#1230537) - GNTTABOP_swap_grant_ref operation misbehavior [XSA-134, CVE-2015-4163] - vulnerability in the iret hypercall handler [XSA-136, CVE-2015-4164]- stubs-32.h has gone from rawhide, put it back manually- replace deprecated gnutls use in qemu-xen-traditional based on qemu-xen patches - work around a gcc 5 bug - Potential unintended writes to host MSI message data field via qemu [XSA-128, CVE-2015-4103] (#1227627) - PCI MSI mask bits inadvertently exposed to guests [XSA-129, CVE-2015-4104] (#1227628) - Guest triggerable qemu MSI-X pass-through error messages [XSA-130, CVE-2015-4105] (#1227629) - Unmediated PCI register access in qemu [XSA-131, CVE-2015-4106] (#1227631)- Privilege escalation via emulated floppy disk drive [XSA-133, CVE-2015-3456] (#1221153)- Information leak through XEN_DOMCTL_gettscinfo [XSA-132, CVE-2015-3340] (#1214037)- Long latency MMIO mapping operations are not preemptible [XSA-125, CVE-2015-2752] (#1207741) - Unmediated PCI command register access in qemu [XSA-126, CVE-2015-2756] (#1307738) - Certain domctl operations may be abused to lock up the host [XSA-127, CVE-2015-2751] (#1207739)- Additional patch for XSA-98 on arm64- HVM qemu unexpectedly enabling emulated VGA graphics backends [XSA-119, CVE-2015-2152] (#1201365)- Hypervisor memory corruption due to x86 emulator flaw [XSA-123, CVE-2015-2151] (#1200398)- Information leak via internal x86 system device emulation [XSA-121, CVE-2015-2044] - Information leak through version information hypercall [XSA-122, CVE-2015-2045] - fix a typo in xen.fedora.systemd.patch- arm: vgic-v2: GICD_SGIR is not properly emulated [XSA-117, CVE-2015-0268] - allow certain warnings with gcc5 that would otherwise be treated as errors- update to 4.5.0 xend has gone, so remove references to xend in spec file, sources and patches remove patches for issues now fixed upstream adjust some patches due to other code changes adjust spec file for renamed xenpolicy files set prefix back to /usr (default is now /usr/local) use upstream systemd files with patches for Fedora and selinux sysconfig for systemd is now in xencommons file for x86_64, files in /usr/lib64/xen/bin have moved to /usr/lib/xen/bin remus isn't built upstream systemd support needs systemd-devel to build replace new uint32 with uint32_t in ocaml file for ocaml-4.02.0 stop oxenstored failing when selinux is enforcing re-number patches - enable building pngs from fig files which is working again - fix oxenstored.service preset preuninstall script - arm: vgic: incorrect rate limiting of guest triggered logging [XSA-118, CVE-2015-1563] (#1187153)- xen crash due to use after free on hvm guest teardown [XSA-116, CVE-2015-0361] (#1179221)- fix xendomains issue introduced by xl migrate --debug patch- p2m lock starvation [XSA-114, CVE-2014-9065] - fix build with --without xsm- Excessive checking in compatibility mode hypercall argument translation [XSA-111, CVE-2014-8866] - Insufficient bounding of "REP MOVS" to MMIO emulated inside the hypervisor [XSA-112, CVE-2014-8867] - fix segfaults and failures in xl migrate --debug (#1166461)- Guest effectable page reference leak in MMU_MACHPHYS_UPDATE handling [XSA-113, CVE-2014-9030] (#1166914)- Insufficient restrictions on certain MMU update hypercalls [XSA-109, CVE-2014-8594] (#1165205) - Missing privilege level checks in x86 emulation of far branches [XSA-110, CVE-2014-8595] (#1165204) - Add fix for CVE-2014-0150 to qemu-dm, though it probably isn't exploitable from xen (#1086776)- Improper MSR range used for x2APIC emulation [XSA-108, CVE-2014-7188] (#1148465)- xen support is in 256k seabios binary when it exists (#1146260)- Race condition in HVMOP_track_dirty_vram [XSA-104, CVE-2014-7154] (#1145736) - Missing privilege level checks in x86 HLT, LGDT, LIDT, and LMSW emulation [XSA-105, CVE-2014-7155] (#1145737) - Missing privilege level checks in x86 emulation of software interrupts [XSA-106, CVE-2014-7156] (#1145738)- disable building pngs from fig files which is currently broken in rawhide- Mishandling of uninitialised FIFO-based event channel control blocks [XSA-107, CVE-2014-6268] (#1140287) - delete a patch file that was dropped in the last update- update to xen-4.4.1 remove patches for fixes that are now included - replace uint32 with uint32_t in ocaml file for ocaml-4.02.0- Bump release and rebuild.- ocaml-4.02.0 final rebuild.- ocaml-4.02.0+rc1 rebuild.- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_22_Mass_Rebuild- Long latency virtual-mmu operations are not preemptible [XSA-97, CVE-2014-5146]- ocaml-4.02.0-0.8.git10e45753.fc22 rebuild.- rebuild for ocaml update- Hypervisor heap contents leaked to guest [XSA-100, CVE-2014-4021] (#1110316) with extra patch to avoid regression- Fix two %if line typos in the spec file - Vulnerabilities in HVM MSI injection [XSA-96, CVE-2014-3967,CVE-2014-3968] (#1104583)- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild- add systemd preset support (#1094938)- HVMOP_set_mem_type allows invalid P2M entries to be created [XSA-92, CVE-2014-3124] (#1093315) - change -Wmaybe-uninitialized errors into warnings for gcc 4.9.0 - fix a couple of -Wmaybe-uninitialized cases- HVMOP_set_mem_access is not preemptible [XSA-89, CVE-2014-2599] (#1080425)- update to xen-4.4.0 - adjust xend.selinux.fixes.patch and xen-initscript.patch as xend has moved - don't build xend unless --with xend is specified - use --with-system-seabios option instead of xen.use.fedora.seabios.patch - update xen.use.fedora.ipxe.patch patch - replace qemu-xen.tradonly.patch with --with-system-qemu= option pointing to Fedora's qemu-system-i386 - adjust xen.xsm.enable.patch and remove bits that are are no longer needed - blktapctrl is no longer built, remove related files - adjust files to be packaged; xsview has gone, add xen-mfndump and xenstore man pages - add another xenstore-write to xenstored.service and oxenstored.service - Add xen.console.fix.patch to fix issues running pygrub- update to xen-4.3.2 includes fix for "Excessive time to disable caching with HVM guests with PCI passthrough" [XSA-60, CVE-2013-2212] (#987914) - remove patches that are now included- use-after-free in xc_cpupool_getinfo() under memory pressure [XSA-88, CVE-2014-1950] (#1064491)- integer overflow in several XSM/Flask hypercalls [XSA-84, CVE-2014-1891, CVE-2014-1892, CVE-2014-1893, CVE-2014-1894] Off-by-one error in FLASK_AVC_CACHESTAT hypercall [XSA-85, CVE-2014-1895] libvchan failure handling malicious ring indexes [XSA-86, CVE-2014-1896] (#1062335)- PHYSDEVOP_{prepare,release}_msix exposed to unprivileged pv guests [XSA-87, CVE-2014-1666] (#1058398)- Out-of-memory condition yielding memory corruption during IRQ setup [XSA-83, CVE-2014-1642] (#1057142)- Disaggregated domain management security status update [XSA-77] - IOMMU TLB flushing may be inadvertently suppressed [XSA-80, CVE-2013-6400] (#1040024)- HVM guest triggerable AMD CPU erratum may cause host hang [XSA-82, CVE-2013-6885]- Lock order reversal between page_alloc_lock and mm_rwlock [XSA-74, CVE-2013-4553] (#1034925) - Hypercalls exposed to privilege rings 1 and 2 of HVM guests [XSA-76, CVE-2013-4554] (#1034923)- Insufficient TLB flushing in VT-d (iommu) code [XSA-78, CVE-2013-6375] (#1033149)- Host crash due to HVM guest VMX instruction execution [XSA-75, CVE-2013-4551] (#1029055)- update to xen-4.3.1 - Lock order reversal between page allocation and grant table locks [XSA-73, CVE-2013-4494] (#1026248)- ocaml xenstored mishandles oversized message replies [XSA-72, CVE-2013-4416] (#1024450)- systemd changes to allow oxenstored to be used instead of xenstored (#1022640)- security fixes (#1017843) Information leak through outs instruction emulation in 64-bit PV guests [XSA-67, CVE-2013-4368] possible null dereference when parsing vif ratelimiting info [XSA-68, CVE-2013-4369] misplaced free in ocaml xc_vcpu_getaffinity stub [XSA-69, CVE-2013-4370] use-after-free in libxl_list_cpupool under memory pressure [XSA-70, CVE-2013-4371] qemu disk backend (qdisk) resource leak (Fedora doesn't build this qemu) [XSA-71, CVE-2013-4375]- Set "Domain-0" label in xenstored.service systemd file to match xencommons init.d script. - security fixes (#1013748) Information leaks to HVM guests through I/O instruction emulation [XSA-63, CVE-2013-4355] Memory accessible by 64-bit PV guests under live migration [XSA-64, CVE-2013-4356] Information leak to HVM guests through fbld instruction emulation [XSA-66, CVE-2013-4361]- Information leak on AVX and/or LWP capable CPUs [XSA-62, CVE-2013-1442] (#1012056)- Rebuild for OCaml 4.01.0.- Rebuilt for https://fedoraproject.org/wiki/Fedora_20_Mass_Rebuild- build a 64-bit hypervisor on ix86- update to xen-4.3.0 - rebase xen.use.fedora.ipxe.patch - remove patches that are now included or no longer needed - add polarssl source needed for stubdom build - remove references to ia64 in spec file (dropped upstream) - don't build hypervisor on ix86 (dropped upstream) - tools want wget (or ftp) to build - build XSM FLASK support into hypervisor with policy file - add xencov_split and xencov to files packaged, remove pdf docs - tidy up rpm scripts and stop enabling systemctl services on upgrade now sysv is gone from Fedora - re-number patches- XSA-45/CVE-2013-1918 breaks page reference counting [XSA-58, CVE-2013-1432] (#978383) - let pygrub handle set default="${next_entry}" line in F19 (#978036) - libxl: Set vfb and vkb devid if not done so by the caller (#977987)- add upstream patch for PCI passthrough problems after XSA-46 (#977310)- xenstore permissions not set correctly by libxl [XSA-57, CVE-2013-2211] (#976779)- Revised fixes for [XSA-55, CVE-2013-2194 CVE-2013-2195 CVE-2013-2196] (#970640)- Information leak on XSAVE/XRSTOR capable AMD CPUs [XSA-52, CVE-2013-2076] (#970206) - Hypervisor crash due to missing exception recovery on XRSTOR [XSA-53, CVE-2013-2077] (#970204) - Hypervisor crash due to missing exception recovery on XSETBV [XSA-54, CVE-2013-2078] (#970202) - Multiple vulnerabilities in libelf PV kernel handling [XSA-55] (#970640)- xend toolstack doesn't check bounds for VCPU affinity [XSA-56, CVE-2013-2072] (#964241)- xen-devel should require libuuid-devel (#962833) - pygrub menu items can include too much text (#958524)- PV guests can use non-preemptible long latency operations to mount a denial of service attack on the whole system [XSA-45, CVE-2013-1918] (#958918) - malicious guests can inject interrupts through bridge devices to mount a denial of service attack on the whole system [XSA-49, CVE-2013-1952] (#958919)- fix further man page issues to allow building on F19 and F20- update to xen-4.2.2 includes fixes for [XSA-48, CVE-2013-1922] (Fedora doesn't use the affected code) passed through IRQs or PCI devices might allow denial of service attack [XSA-46, CVE-2013-1919] (#953568) SYSENTER in 32-bit PV guests on 64-bit xen can crash hypervisor [XSA-44, CVE-2013-1917] (#953569) - remove patches that are included in 4.2.2 - look for libxl-save-helper in the right place - fix xl list -l output when built with yajl2 - allow xendomains to work with xl saved images- make xendomains systemd script executable and update it from init.d version (#919705) - Potential use of freed memory in event channel operations [XSA-47, CVE-2013-1920]- patch for [XSA-36, CVE-2013-0153] can cause boot time crash- patch for [XSA-38, CVE-2013-0215] was flawed- BuildRequires for texlive-kpathsea-bin wasn't needed - correct gcc 4.8 fixes and follow suggestions upstream- guest using oxenstored can crash host or exhaust memory [XSA-38, CVE-2013-0215] (#907888) - guest using AMD-Vi for PCI passthrough can cause denial of service [XSA-36, CVE-2013-0153] (#910914) - add some fixes for code which gcc 4.8 complains about - additional BuildRequires are now needed for pod2text and pod2man also texlive-kpathsea-bin for mktexfmt- correct disabling of xendomains.service on uninstall- nested virtualization on 32-bit guest can crash host [XSA-34, CVE-2013-0151] also nested HVM on guest can cause host to run out of memory [XSA-35, CVE-2013-0152] (#902792) - restore status option to xend which is used by libvirt (#893699)- Buffer overflow when processing large packets in qemu e1000 device driver [XSA-41, CVE-2012-6075] (#910845)- fix some format errors in xl.cfg.pod.5 to allow build on F19- VT-d interrupt remapping source validation flaw [XSA-33, CVE-2012-5634] (#893568) - pv guests can crash xen when xen built with debug=y (included for completeness - Fedora builds have debug=n) [XSA-37, CVE-2013-0154]- update to xen-4.2.1 - remove patches that are included in 4.2.1 - rebase xen.fedora.efi.build.patch- Rebuild for OCaml fix (RHBZ#877128).- 6 security fixes A guest can cause xen to crash [XSA-26, CVE-2012-5510] (#883082) An HVM guest can cause xen to run slowly or crash [XSA-27, CVE-2012-5511] (#883084) A PV guest can cause xen to crash and might be able escalate privileges [XSA-29, CVE-2012-5513] (#883088) An HVM guest can cause xen to hang [XSA-30, CVE-2012-5514] (#883091) A guest can cause xen to hang [XSA-31, CVE-2012-5515] (#883092) A PV guest can cause xen to crash and might be able escalate privileges [XSA-32, CVE-2012-5525] (#883094)- two build fixes for Fedora 19 - add texlive-ntgclass package to fix build- 4 security fixes A guest can block a cpu by setting a bad VCPU deadline [XSA 20, CVE-2012-4535] (#876198) HVM guest can exhaust p2m table crashing xen [XSA 22, CVE-2012-4537] (#876203) PAE HVM guest can crash hypervisor [XSA-23, CVE-2012-4538] (#876205) 32-bit PV guest on 64-bit hypervisor can cause an hypervisor infinite loop [XSA-24, CVE-2012-4539] (#876207) - texlive-2012 is now in Fedora 18- texlive-2012 isn't in Fedora 18 yet- limit the size of guest kernels and ramdisks to avoid running out of memeory on dom0 during guest boot [XSA-25, CVE-2012-4544] (#870414)- update to xen-4.2.0 - rebase xen-net-disable-iptables-on-bridge.patch pygrubfix.patch - remove patches that are now upstream or with alternatives upstream - use ipxe and seabios from seabios-bin and ipxe-roms-qemu packages - xen tools now need ./configure to be run (x86_64 needs libdir set) - don't build upstream qemu version - amend list of files in package - relocate xenpaging add /etc/xen/xlexample* oxenstored.conf /usr/include/xenstore-compat/* xenstore-stubdom.gz xen-lowmemd xen-ringwatch xl.1.gz xl.cfg.5.gz xl.conf.5.gz xlcpupool.cfg.5.gz - use a tmpfiles.d file to create /run/xen on boot - add BuildRequires for yajl-devel and graphviz - build an efi boot image where it is supported - adjust texlive changes so spec file still works on Fedora 17- add font packages to build requires due to 2012 version of texlive in F19 - use build requires of texlive-latex instead of tetex-latex which it obsoletes- rebuild for ocaml update- disable qemu monitor by default [XSA-19, CVE-2012-4411] (#855141)- 5 security fixes a malicious 64-bit PV guest can crash the dom0 [XSA-12, CVE-2012-3494] (#854585) a malicious crash might be able to crash the dom0 or escalate privileges [XSA-13, CVE-2012-3495] (#854589) a malicious PV guest can crash the dom0 [XSA-14, CVE-2012-3496] (#854590) a malicious HVM guest can crash the dom0 and might be able to read hypervisor or guest memory [XSA-16, CVE-2012-3498] (#854593) an HVM guest could use VT100 escape sequences to escalate privileges to that of the qemu process [XSA-17, CVE-2012-3515] (#854599)- update to 4.1.3 includes fix for untrusted HVM guest can cause the dom0 to hang or crash [XSA-11, CVE-2012-3433] (#843582) - remove patches that are now upstream - remove some unnecessary compile fixes - adjust upstream-23936:cdb34816a40a-rework for backported fix for upstream-23940:187d59e32a58 - replace pygrub.size.limits.patch with upstreamed version - fix for (#845444) broke xend under systemd- remove some unnecessary cache flushing that slow things down - change python options on xend to reduce selinux problems (#845444)- in rare circumstances an unprivileged user can crash an HVM guest [XSA-10,CVE-2012-3432] (#843766)- add a patch to remove a dependency on PyXML and Require python-lxml instead of PyXML (#842843)- adjust systemd service files not to report failures when running without a hypervisor or when xendomains.service doesn't find anything to start- Rebuilt for https://fedoraproject.org/wiki/Fedora_18_Mass_Rebuild- Apply three security patches 64-bit PV guest privilege escalation vulnerability [CVE-2012-0217] guest denial of service on syscall/sysenter exception generation [CVE-2012-0218] PV guest host Denial of Service [CVE-2012-2934]- adjust xend.service systemd file to avoid selinux problems- Enable xenconsoled by default under systemd (#829732)- make pygrub cope better with big files from guest (#818412 CVE-2012-2625) - add patch from 4.1.3-rc2-pre to build on F17/8- Make the udev tap rule more specific as it breaks openvpn (#812421) - don't try setuid in xend if we don't need to so selinux is happier- /var/lib/xenstored mount has wrong selinux permissions in latest Fedora - load xen-acpi-processor module (kernel 3.4 onwards) if present- fix a packaging error- fix an error in an rpm script from the sysv configuration removal - migrate xendomains script to systemd- put the systemd files back in the right place- clean up systemd and sysv configuration including removal of migrated sysv files for fc17+- move xen-watchdog to systemd- relocate systemd files for fc17+- move xend and xenconsoled to systemd- Fix buffer overflow in e1000 emulation for HVM guests [CVE-2012-0029]- Start building xen's ocaml libraries if appropriate unless --without ocaml was specified - add some backported patches from xen unstable (via Debian) for some ocaml tidying and fixes- actually apply the xend-pci-loop.patch - compile fixes for gcc-4.7- Add xend-pci-loop.patch to stop xend crashing with weird PCI cards (#767742) - avoid a backtrace if xend can't log to the standard file or a temporary directory (part of #741042)- Fix lost interrupts on emulated devices - stop xend crashing if its state files are empty at start up - avoid a python backtrace if xend is run on bare metal - update grub2 configuration after the old hypervisor has gone - move blktapctrl to systemd - Drop obsolete dom0-kernel.repo file- update to 4.1.2 remove upstream patches xen-4.1-testing.23104 and xen-4.1-testing.23112- more pygrub improvements for grub2 on guest- make pygrub work better with GPT partitions and grub2 on guest- improve systemd functionality- lsb header fixes - xenconsoled shutdown needs xenstored to be running - partial migration to systemd to fix shutdown delays - update grub2 configuration after hypervisor updates- untrusted guest controlling PCI[E] device can lock up host CPU [CVE-2011-3131]- clean up patch to solve a problem with hvmloader compiled with gcc 4.6- update to 4.1.1 includes various bugfixes and fix for [CVE-2011-1898] guest with pci passthrough can gain privileged access to base domain - remove upstream cve-2011-1583-4.1.patch- Overflows in kernel decompression can allow root on xen PV guest to gain privileged access to base domain, or access to xen configuration info. Lack of error checking could allow DoS attack from guest [CVE-2011-1583] - Don't require /usr/bin/qemu-nbd as it isn't used at present.- update to 4.1.0 final- update to 4.1.0-rc8 release candidate - create xen-4.1.0-rc8.tar.xz file from git/hg repositories - rebase xen-initscript.patch xen-dumpdir.patch xen-net-disable-iptables-on-bridge.patch localgcc45fix.patch sysconfig.xenstored init.xenstored - remove unnecessary or conflicting xen-xenstore-cli.patch localpy27fixes.patch xen.irq.fixes.patch xen.xsave.disable.patch xen.8259afix.patch localcleanups.patch libpermfixes.patch - add patch to allow pygrub to work with single partitions with boot sectors - create ipxe-git-v1.0.0.tar.gz from http://git.ipxe.org/ipxe.git to avoid downloading at build time - no need to move udev rules or init scripts as now created in the right place - amend list of files shipped - remove fs-backend add init.d scripts xen-watchdog xencommons add config files xencommons xl.conf cpupool add programs kdd tap-ctl xen-hptool xen-hvmcrash xenwatchdogd- Rebuilt for https://fedoraproject.org/wiki/Fedora_15_Mass_Rebuild- Make libraries executable so that rpm gets dependencies right- Temporarily turn off some compile options so it will build on rawhide- ghost directories in /var/run (#656724) - minor fixes to /usr/share/doc/xen-doc-4.?.?/misc/network_setup.txt (#653159) /etc/xen/scripts/network-route, /etc/xen/scripts/vif-common.sh (#669747) and /etc/sysconfig/modules/xen.modules (#656536)- add upstream xen patch xen.8259afix.patch to fix boot panic "IO-APIC + timer doesn't work!" (#642108)- add ext4 support for pvgrub (grub-ext4-support.patch from grub-0.97-66.fc14)- Rebuilt for gcc bug 634757- create symlink for qemu-dm on x86_64 for compatibility with 3.4 - apply some patches destined for 4.0.2 add some irq fixes disable xsave which causes problems for HVM- fix compile problems on Fedora 15, I suspect due to gcc 4.5.1- update to 4.0.1 release - many bug fixes - xen-dev-create-cleanup.patch no longer needed - remove part of localgcc45fix.patch no longer needed - package new files /etc/bash_completion.d/xl.sh and /usr/sbin/gdbsx - add patch to get xm and xend working with python 2.7- add newer module names and xen-gntdev to xen.modules - Update dom0-kernel.repo file to use repos.fedorapeople.org location- create a xen-licenses package to satisfy revised the Fedora Licensing Guidelines- fix gcc 4.5 compile problems- Rebuilt for https://fedoraproject.org/wiki/Features/Python_2.7/MassRebuild- add patch to remove some old device creation code that doesn't work with the latest pvops kernels- update to 4.0.0 release - rebase xen-initscript.patch and xen-dumpdir.patch patches - adjust spec file for files added to or removed from the packages - add new build dependencies libuuid-devel and iasl- update to 3.4.3 release including support for latest pv_ops kernels (possibly incomplete) should fix build problems (#565063) and crashes (#545307) - replace Prereq: with Requires: in spec file - drop static libraries (#556101)- adapt module load script to evtchn.ko -> xen-evtchn.ko rename.- update to 3.4.2 release. - drop backport patches.- add PyXML to dependencies. (#496135) - Take ownership of {_libdir}/fs (#521806)- add e2fsprogs-devel to build dependencies.- swap bzip2+xz linux kernel compression support patches. - backport one more bugfix (videoram option).- backport bzip2+xz linux kernel compression support. - backport a few bugfixes.- update to 3.4.1 release.- Kill info files. No xen docs, just standard gnu stuff. - kill -Werror in tools/libxc to fix build.- Rebuilt for https://fedoraproject.org/wiki/Fedora_12_Mass_Rebuild- rename info files to fix conflict with binutils. - add install-info calls for the doc subpackage. - un-parallelize doc build.- update to version 3.4.0. - cleanup specfile, add doc subpackage.- fix python 2.6 warnings.- fix xen.modules init script for pv_ops kernel. - stick rpm release tag into XEN_VENDORVERSION. - use i386 i486 i586 i686 pentium3 pentium4 athlon geode macro in ExclusiveArch. - keep blktapctrl turned off by default.- fix xenstored init script for pv_ops kernel.- fix xenstored crash. - backport qemu-unplug patch.- fix gcc44 build (broken constrain in inline asm). - fix ExclusiveArch- backport bzImage support for dom0 builder.- rebuild with new openssl- update to xen 3.3.1 release.- build and package stub domains (pvgrub, ioemu). - backport unstable fixes for pv_ops dom0.- Rebuild for Python 2.6- Update to xen 3.3.0 release- Enable xen-hypervisor build - Backport support for booting DomU from bzImage - Re-diff all patches for zero fuzz- Remove bogus ia64 hypercall arg (rhbz #433921)- Re-enable QEMU image format auto-detection, without the security loopholes- Rebuild for GNU TLS ABI change- Correctly limit PVFB size (CVE-2008-1952)- Move /var/run/xend into xen-runtime for pygrub (rhbz #442052)- Disable QEMU image format auto-detection (CVE-2008-2004) - Fix PVFB to validate frame buffer description (CVE-2008-1943)- Fix block device checks for extendable disk formats- Let XenD setup QEMU logfile (rhbz #435164) - Fix PVFB use of event channel filehandle- Fix block device extents check (rhbz #433560)- Restore some network-bridge patches lost during 3.2.0 rebase- Fixed xenstore-ls to automatically use xenstored socket as needed- Fix timer mode parameter handling for HVM - Temporarily disable all Latex docs due to texlive problems (rhbz #431327)- Add a xen-runtime subpackage to allow use of Xen without XenD - Split init script out to one script per daemon - Remove unused / broken / obsolete tools- Remove legacy dependancy on python-virtinst- Added XSM header files to -devel RPM- Updated to 3.2.0 final release- Rebase to Xen 3.2 rc5 changeset 16701- Re-factor to make it easier to test dev trees in RPMs - Include hypervisor build if doing a dev RPM- Rebuild for deps- Upgrade to 3.1.2 bugfix release- Disable network-bridge script since it conflicts with NetworkManager which is now on by default- Fixed xenbaked tmpfile flaw (CVE-2007-3919)- Pull in QEMU BIOS boot menu patch from KVM package - Fix QEMU patch for locating x509 certificates based on command line args - Add XenD config options for TLS x509 certificate setup- Fixed rtl8139 checksum calculation for Vista (rhbz #308201)- QEmu NE2000 overflow check - CVE-2007-1321 - Pygrub guest escape - CVE-2007-4993- Fix generation of manual pages (rhbz #250791) - Really fix FC-6 32-on-64 guests- Make 32-bit FC-6 guest PVFB work on x86_64 host- Re-add support for back-compat FC6 PVFB support - Fix handling of explicit port numbers (rhbz #279581)- Don't clobber the VIF type attribute in FV guests (rhbz #296061)- Added dep on openssl for blktap-qcow- Switch PVFB over to use QEMU - Backport QEMU VNC security patches for TLS/x509- Put guest's native protocol ABI into xenstore, to provide for older kernels running 32-on-64. - VNC keymap fixes - Fix race conditions in LibVNCServer on client disconnect- Remove patch which kills VNC monitor - Fix HVM save/restore file path to be /var/lib/xen instead of /tmp - Don't spawn a bogus xen-vncfb daemon for HVM guests - Add persistent logging of hypervisor & guest consoles - Add /etc/sysconfig/xen to allow admin choice of logging options - Re-write Xen startup to use standard init script functions - Add logrotate configuration for all xen related logs- Updated to official 3.1.0 tar.gz - Fixed data corruption from VNC client disconnect (bz 241303)- Ensure xen-vncfb processes are cleanedup if guest quits (bz 240406) - Tear down guest if device hotplug fails- Updated to 3.1.0 rc7, changeset 15021 (upstream renumbered from 3.0.5)- Fix op_save RPC API- Added BR on gettext- Redo failed build.- Updated to 3.0.5 rc4, changeset 14993 - Reduce number of xenstore transactions used for listing domains - Hack to pre-balloon 2 MB for PV guests as well as HVM- Fixed display of bootloader menu with xm create -c - Added modprobe for both xenblktap & blktap to deal with rename issues - Hack to pre-balloon 10 MB for HVM guests- Updated to 3.0.5 rc3, changeset 14934 - Fixed networking for service xend restart & minor IPv6 tweak- Fixed vfb/vkbd device startup race- Updated to xen 3.0.5 rc2, changeset 14889 - Remove use of netloop from network-bridge script - Add backcompat support to vif-bridge script to translate xenbrN to ethN- Disable access to QEMU monitor over VNC (CVE-2007-0998, bz 230295)- Close QEMU file handles when running network script- Fix interaction of bootloader with blktap (bz 230702) - Ensure PVFB daemon terminates if domain doesn't startup (bz 230634)- Setup readonly loop devices for readonly disks - Extended error reporting for hotplug scripts - Pass all 8 mouse buttons from VNC through to kernel- Don't run the pvfb daemons for HVM guests (bz 225413) - Fix handling of vnclisten parameter for HVM guests- Fix pygrub memory corruption- Added PVFB back compat for FC5/6 guests- Ensure the arch-x86 header files are included in xen-devel package - Bring back patch to move /var/xen/dump to /var/lib/xen/dump - Make /var/log/xen mode 0700- Upgrade to official xen-3.0.4_1 release tarball- fix the build- rebuild for python 2.5- Pull in the official 3.0.3 tarball of xen (changeset 11774). - Add patches for VNC password authentication (bz 203196) - Switch /etc/xen directory to be mode 0700 because the config files can contain plain text passwords (bz 203196) - Change the package dependency to python-virtinst to reflect the package name change. - Fix str-2-int cast of VNC port for paravirt framebuffer (bz 211193)- fix having "many" kernels in pygrub- Fix SMBIOS tables for SVM guests [danpb] (bug 207501)- Added vnclisten patches to make VNC only listen on localhost out of the box, configurable by 'vnclisten' parameter (bz 203196)- Update to xen-3.0.3-testing changeset 11633- Workaround blktap/xenstore startup race - Add udev rules for xen blktap devices (srostedt) - Add support for dynamic blktap device nodes (srostedt) - Fixes for infinite dom0 cpu usage with blktap - Fix xm not to die on malformed "tap:" blkif config string - Enable blktap on kernels without epoll-for-aio support. - Load the blktap module automatically at startup - Reenable blktapctrl- Disable paravirt framebuffer server side rendered cursor (bz 206313) - Ignore SIGPIPE in paravirt framebuffer daemon to avoid terminating on client disconnects while writing data (bz 208025)- Fix cursor in pygrub (#208041)- Removed obsolete scary warnings in package description- Add Requires: kpartx for dom0 access to domU data- Don't strip qemu-dm early, so that we get proper debuginfo (danpb) - Fix compile problem with latest glibc- Update to xen-unstable changeset 11539 - Threading fixes for libVNCserver (danpb)- update pvfb patch based on upstream feedback- re-enable ia64.- update to changeset 11405- fix pvfb for x86_64- update libvncserver to hopefully fix problems with vnc clients disconnecting- fix a typo- add support for paravirt framebuffer- update to xen-unstable cs 11251 - clean up patches some - disable ia64 as it doesn't currently build- make initscript not spew on non-xen kernels (#202945)- remove copy of xenguest-install from this package, require python-xeninst (the new home of xenguest-install)- add patch to fix rtl8139 in FV, switch it back to the default nic - add necessary ia64 patches (#201040) - build on ia64- add patch to fix net devices for HVM guests- make sure disk IO from HVM guests actually hits disk (#198851)- don't start blktapctrl for now - fix HVM guest creation in xenguest-install - make sure log files have the right SELinux label- fix libblktap symlinks (#199820) - make libxenstore executable (#197316) - version libxenstore (markmc)- include /var/xen/dump in file list - load blkbk, netbk and netloop when xend starts - update to cs 10712 - avoid file conflicts with qemu (#199759)- libxenstore is unversioned, so make xen-libs own it rather than xen-devel- Fix network-bridge error (#199414)- desactivating the relocation server in xend conf by default and add a warning text about it.- Compile fix: don't #include - Update to xen-unstable cset 10675 - Remove internal libvncserver build, new qemu device model has its own one now. - Change default FV NIC model from rtl8139 to ne2k_pci until the former works better- bump libvirt requires to 0.1.2 - drop xend httpd localhost server and use the unix socket instead- split into main packages + -libs and -devel subpackages for #198260 - add patch from jfautley to allow specifying other bridge for xenguest-install (#198097)- make xenguest-install work with relative paths to disk images (markmc, #197518)- own /var/run/xend for selinux (#196456, #195952)- fix syntax error in xenguest-install- more initscript patch to report status #184452- Add BuildRequires: for gnu/stubs-32.h so that x86_64 builds pick up glibc32 correctly- Rebase to xen-unstable cset 10278- update to new snapshot (changeset 9925)- xen.h now requires xen-compat.h, install it too- -m64 patch isn't needed anymore either- update to post 3.0.2 snapshot (changeset: 9744:1ad06bd6832d) - stop applying patches that are upstreamed - add patches for bootloader to run on all domain creations - make xenguest-install create a persistent uuid - use libvirt for domain creation in xenguest-install, slightly improve error handling- augment the close on exec patch with the fix for #188361- add udev rule so that /dev/xen/evtchn gets created properly - make pygrub not use /tmp for SELinux - make xenguest-install actually unmount its nfs share. also, don't use /tmp- set /proc/xen/privcmd and /var/log/xend-debug.log as close on exec to avoid SELinux problems - give better feedback on invalid urls (#184176)- Use kva mmap to find the xenstore page (upstream xen-unstable cset 9130)- fix xenguest-install so that it uses phy: for block devices instead of forcing them over loopback. - change package versioning to be a little more accurate- Remove unneeded CFLAGS spec file hack- fix 64 bit CFLAGS issue with vmxloader and hvmloader- Update to xen-unstable cset 9022- Update to xen-unstable cset 9015- add patch to ensure we get a unique fifo for boot loader (#182328) - don't try to read the whole disk if we can't find a partition table with pygrub - fix restarting of domains (#179677)- fix -h conflict for xenguest-isntall- turn on http listener so you can do things with libvir as a user- update to current hg snapshot for HVM support - update xenguest-install for hvm changes. allow hvm on svm hardware - fix a few little xenguest-install bugs- add a hack to fix VMX guests with video to balloon enough (#180375)- fix build for new udev- patch from David Lutterkort to pass macaddr (-m) to xenguest-install - rework xenguest-install a bit so that it can be used for creating fully-virtualized guests as well as paravirt. Run with --help for more details (or follow the prompts) - add more docs (noticed by Andrew Puch)- rebuilt for new gcc4.1 snapshot and glibc changes- disable iptables/ip6tables/arptables on bridging when bringing up a Xen bridge. If complicated filtering is needed that uses this, custom firewalls will be needed. (#177794)- use the default network device, don't hardcode eth0- Add xenguest-install.py in /usr/sbin- Update to xen-unstable from 20060130 (cset 8705)- buildrequire dev86 so that vmx firmware gets built - include a copy of libvncserver and build vmx device models against it- only put the udev rules in one place- move xsls to xenstore-ls to not conflict (#171863)- Update to xen-unstable from 20060110 (cset 8526)- rebuilt- 20051206 version (should be 3.0.0). - Remove xen-bootloader fixes (integrated upstream).- adding missing headers for libxenctrl and libxenstore - use libX11-devel build require instead of xorg-x11-devel- change default dom0 min-mem to 256M so that dom0 will try to balloon down- buildrequire ncurses-devel (reported by Justin Dearing)- actually enable the initscripts- udev rules moved- update to current -unstable - add patches to fix pygrub- update to current -unstable- update to current -unstable- doesn't require twisted anymore- add /var/{lib,run}/xenstored to the %files section (#167496, #167121) - upgrade to today's Xen snapshot - some small build fixes for x86_64 - enable x86_64 builds- explicitly call /usr/sbin/xend from initscript (#167407) - add xenstored directories to spec file (#167496, #167121) - misc gcc4 fixes - spec file cleanups (#161191) - upgrade to today's Xen snapshot - change the version to 3.0-0. (real 3.0 release will be 3.0-1)- upgrade to today's Xen snapshot- upgrade to a known-working newer Xen, now that execshield works again- create /var/lib/xen/xen-db/migrate directory so "xm save" works (#158895)- change default display method for VMX domains to SDL- qemu device model for VMX- apply some VMX related bugfixes- upgrade to last night's snapshot- patch manpath instead of moving in specfile. patch sent upstream - install to native python path instead of /usr/lib/python - other misc specfile duplication cleanup- fix context switch between vcpus in same domain, vcpus > cpus works again- move initscripts to /etc/rc.d/init.d (Florian La Roche) (#153188) - ship only PDF documentation, not the PS or tex duplicates- upgrade to new xen hypervisor - minor gcc4 compile fix- do not yet upgrade to new hypervisor ;) - add barrier to fix SMP boot bug - add tags target - add zlib-devel build requires (#150952)- upgrade to last night's snapshot - new compile fix patch- the gcc4 compile patches are now upstream - upgrade to last night's snapshot, drop patches locally- finally got everything to compile with gcc4 -Wall -Werror- upgrade to last night's Xen-unstable snapshot - drop printf warnings patch, which is upstream now- upgraded to last night's Xen snapshot - compile warning fixes are now upstream, drop patch- fix more compile warnings - fix the fwrite return check- upgrade to last night's Xen snapshot - a kernel upgrade is needed to run this Xen, the hypervisor interface changed slightly - comment out unused debugging function in plan9 domain builder that was giving compile errors with -Werror- upgrade to last night's Xen snapshot- move everything to /var/lib/xen- upgrade to new upstream Xen snapshot- add buildreqs on python-devel and xorg-x11-devel (strange AT nsk.no-ip.org)- fix /etc/xen/scripts/network to not break with ipv6 (also sent upstream)- update to new snap - python-twisted is its own package now - files are in /usr/lib/python now as well, ugh.- add segment fixup patch from xen tree - fix %files list for python-twisted- grab newer snapshot, that does start up - add /var/xen/xend-db/{domain,vnet} to %files section- upgrade to new snapshot of xen-unstable- build python-twisted as a subpackage - update to latest upstream Xen snapshot- grab new Xen tarball (with wednesday's patch already included) - transfig is a buildrequire, add it to the spec file- fix up Che's spec file a little bit - create patch to build just Xen, not the kernels- initial rpm release 4.5.3-8.fc224.5.3-8.fc22libxenbus_stubs.axenbus.axenbus.cmxxenbus.cmxalibxenctrl_stubs.axenctrl.axenctrl.cmxxenctrl.cmxalibxeneventchn_stubs.axeneventchn.axeneventchn.cmxxeneventchn.cmxalibxenlight_stubs.axenlight.axenlight.cmxxenlight.cmxalibxenmmap_stubs.axenmmap.axenmmap.cmxxenmmap.cmxaxenstore.axenstore.cmxxenstore.cmxalibxentoollog_stubs.axentoollog.axentoollog.cmxxentoollog.cmxa/usr/lib/ocaml/xenbus//usr/lib/ocaml/xenctrl//usr/lib/ocaml/xeneventchn//usr/lib/ocaml/xenlight//usr/lib/ocaml/xenmmap//usr/lib/ocaml/xenstore//usr/lib/ocaml/xentoollog/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tablesdrpmxz2i686-redhat-linux-gnucurrent ar archive?7zXZ !#,<]"k%=!;:br[M7fʭqFް#WCq*1C& %vr `_'ħ e:,bNYĚ9\0xU3PL\ f~ivh[RL=4Me/< o͓cWD.v0 ;ӏo"38*vĤs:qw7TDbL6'_;8BQ /wDP.`6ql?6J"y3 s˟_:_)g,}UAɼ/V{Y3Aj.(X8w\ tc/`:6@mF$|OMuR'%` 5O!{-0˿nrܼ}ut05۞G-;9W\ lQ_s!}Vbl1;7xJ$/ΰdE Pz%` iZ}*'kjV'3^3:ASGDjIceO^ XC>A.G'K4ve0 Y{hEB?8=JtHi"+EnYS~v~01^x薿@K\G^xm-ÑkpIDAkBh\cR (d4,|XL/!Ct 4~j_dĸ-xێrOXv bo 뇅)iՙxfh}\bِ,+o26ز)Ӊ[sVOL?bLz>^oD3"oX|jQ!OWц( um=ơƒpIpGa&i\,"O@t|l ȱhHƳk lI@MxTɨF`B.F^D}{zrZ1g~٪vmoL>v6aS/_ ےш}jz7Wlb Z.T|Eyr ck/@tr7[9U0ki0&|١ q-pdߗN2/kWX#O -?Lq YZ