xen debdiff
Hello,
Raphael Hertzog asked me to post the debdiff of the Ubuntu package I am
working on here.
He had some concerns with using the Ubuntu version like this. In
particular Ubuntu does some things differently with respect to init.d
scripts, has a different changelog, and there are some changes other
changes here that may not be security related.
He probably does have some valid points.
As a result it might be better to continue my previous efforts of
porting the security fixes to the version of Xen in Debian wheezy.
On the other hand the version in Ubuntu is tried and tested and possibly
less risk of me breaking something.
Or I could just leave xen for now and let somebody more experienced with
Xen take over.
What do other people hear think?
debdiff xen_4.1.4-3+deb7u9.dsc xen_4.1.6.1-1+deb7u1.dsc | filterdiff --include='xen-4.1.4/debian/*' --exclude='xen-4.1.4/debian/patches/*'
--
Brian May <brian@linuxpenguins.xyz>
https://linuxpenguins.xyz/brian/
diff -Nru xen-4.1.4/debian/bin/gencontrol.py xen-4.1.6.1/debian/bin/gencontrol.py
--- xen-4.1.4/debian/bin/gencontrol.py 2012-07-27 20:53:03.000000000 +1000
+++ xen-4.1.6.1/debian/bin/gencontrol.py 2015-08-31 23:30:31.000000000 +1000
@@ -3,20 +3,15 @@
import os, sys
sys.path.append(os.path.join(sys.path[0], "../lib/python"))
-from debian_xen.debian import VersionXen
+from debian_xen.debian import VersionXen, PackageFieldList
from debian_linux.config import ConfigCoreHierarchy
-from debian_linux.debian import Changelog, PackageArchitecture
+from debian_linux.debian import Changelog
from debian_linux.gencontrol import Gencontrol as Base
from debian_linux.utils import Templates
class Gencontrol(Base):
- config_schema = {
- 'description': {
- }
- }
-
def __init__(self):
- super(Gencontrol, self).__init__(ConfigCoreHierarchy(self.config_schema, ["debian/arch"]), Templates(["debian/templates"]))
+ super(Gencontrol, self).__init__(ConfigCoreHierarchy(["debian/arch"]), Templates(["debian/templates"]))
self.process_changelog()
def do_main_setup(self, vars, makeflags, extra):
@@ -44,9 +39,9 @@
else:
packages.append(package)
- arches = package.setdefault('Architecture', PackageArchitecture())
+ arches = package.setdefault('Architecture', PackageFieldList())
if 'all' not in arches:
- arches.add(arch)
+ arches.append(arch)
package_utils_name = packages_utils[0]['Package']
@@ -58,7 +53,7 @@
cmds_build = ["$(MAKE) -f debian/rules.real build-arch %s" % makeflags]
cmds_setup = ["$(MAKE) -f debian/rules.real setup-arch %s" % makeflags]
makefile.add('binary-arch_%s_real' % arch, cmds = cmds_binary_arch)
- makefile.add('build-arch_%s_real' % arch, cmds = cmds_build)
+ makefile.add('build_%s_real' % arch, cmds = cmds_build)
makefile.add('setup_%s_real' % arch, cmds = cmds_setup)
def do_flavour_setup(self, vars, makeflags, arch, featureset, flavour, extra):
@@ -76,27 +71,22 @@
def do_flavour_packages(self, packages, makefile, arch, featureset, flavour, vars, makeflags, extra):
hypervisor = self.templates["control.hypervisor"]
- system_latest = self.templates["control.system.latest"]
if not vars.has_key('desc'):
vars['desc'] = ''
packages_own = []
packages_own.extend(self.process_packages(hypervisor, vars))
- packages_dummy = self.process_packages(system_latest, vars)
- for package in packages_own + packages_dummy:
+ for package in packages_own:
name = package['Package']
- package.setdefault('Architecture', PackageArchitecture()).add(arch)
- if name in packages:
+ if packages.has_key(name):
package = packages.get(name)
+ package['Architecture'].append(arch)
else:
+ package['Architecture'] = [arch]
packages.append(package)
- arches = package.setdefault('Architecture', PackageArchitecture())
- if 'all' not in arches:
- arches.add(arch)
-
package_name = packages_own[0]['Package']
for i in ('postinst', 'postrm'):
@@ -106,11 +96,8 @@
cmds_binary_arch = ["$(MAKE) -f debian/rules.real binary-arch-flavour %s" % makeflags]
cmds_build = ["$(MAKE) -f debian/rules.real build-flavour %s" % makeflags]
cmds_setup = ["$(MAKE) -f debian/rules.real setup-flavour %s" % makeflags]
-
- cmds_binary_arch += ["$(MAKE) -f debian/rules.real install-dummy DH_OPTIONS='%s' %s" % (u' '.join([u"-p%s" % i['Package'] for i in packages_dummy]), makeflags)]
-
makefile.add("binary-arch_%s_%s_%s" % (arch, featureset, flavour), cmds = cmds_binary_arch)
- makefile.add("build-arch_%s_%s_%s" % (arch, featureset, flavour), cmds = cmds_build)
+ makefile.add("build_%s_%s_%s" % (arch, featureset, flavour), cmds = cmds_build)
makefile.add("setup_%s_%s_%s" % (arch, featureset, flavour), cmds = cmds_setup)
def process_changelog(self):
diff -Nru xen-4.1.4/debian/changelog xen-4.1.6.1/debian/changelog
--- xen-4.1.4/debian/changelog 2015-10-31 17:08:50.000000000 +1100
+++ xen-4.1.6.1/debian/changelog 2016-05-02 17:23:33.000000000 +1000
@@ -1,367 +1,549 @@
-xen (4.1.4-3+deb7u9) wheezy-security; urgency=high
+xen (4.1.6.1-1+deb7u1) wheezy-security; urgency=medium
- * Non-maintainer upload by the Security Team.
- * Add CVE-2015-7835-xsa148.patch patch.
- CVE-2015-7835: x86: Uncontrolled creation of large page mappings by PV
- guests.
-
- -- Salvatore Bonaccorso <carnil@debian.org> Sat, 31 Oct 2015 07:08:27 +0100
-
-xen (4.1.4-3+deb7u8) wheezy-security; urgency=low
-
- * Security upload.
- * CVE-2015-3209 (XSA 135)
- - qemu pcnet emulation fix
- * CVE-2015-4164 (XSA 136)
- - x86/traps: loop in the correct direction in compat_iret()
- * CVE-2015-4103 (XSA 128)
- - Potential unintended writes to host MSI message data field via qemu
- * CVE-2015-4104 (XSA 129)
- - PCI MSI mask bits inadvertently exposed to guests
- * CVE-2015-4105 (XSA 130)
- - Guest triggerable qemu MSI-X pass-through error messages
- * CVE-2015-3340 (XSA 132)
- - Information leak through XEN_DOMCTL_gettscinfo
- * CVE-2015-4106 (XSA 131)
- - Unmediated PCI register access in qemu
-
- -- Guido Trotter <ultrotter@debian.org> Fri, 12 Jun 2015 13:09:44 +0000
-
-xen (4.1.4-3+deb7u6) wheezy-security; urgency=low
-
- * CVE-2015-3456
-
- -- Moritz Muehlenhoff <jmm@debian.org> Sat, 16 May 2015 11:57:44 +0000
-
-xen (4.1.4-3+deb7u5) wheezy-security; urgency=low
-
- * Security upload.
- * Apply fix for Xen Security Advisory 121 (CVE-2015-2044)
- * Apply fix for Xen Security Advisory 122 (CVE-2015-2045)
- * Apply fix for Xen Security Advisory 123 (CVE unknown)
-
- -- Guido Trotter <ultrotter@debian.org> Wed, 05 Mar 2015 13:36:37 +0200
-
-xen (4.1.4-3+deb7u4) wheezy-security; urgency=low
-
- * Security upload.
- * Apply fix for Xen Security Advisory 109 (CVE-2014-8594)
- * Apply fix for Xen Security Advisory 110 (CVE-2014-8595)
- * Apply fix for Xen Security Advisory 111 (CVE-2014-8866)
- * Apply fix for Xen Security Advisory 112 (CVE-2014-8867)
- * Apply fix for Xen Security Advisory 113 (CVE-2014-9030)
-
- -- Guido Trotter <ultrotter@debian.org> Wed, 21 Jan 2015 13:50:48 +0200
-
-xen (4.1.4-3+deb7u3) wheezy-security; urgency=low
-
- * Security upload.
- * Apply fix for Xen Security Advisory 108 (CVE-2014-7188)
- * Apply fix for Xen Security Advisory 104 (CVE-2014-7154)
- * Apply fix for Xen Security Advisory 105 (CVE-2014-7155)
- * Apply fix for Xen Security Advisory 106 (CVE-2014-7156)
- * Apply fix for Xen Security Advisory 56 (CVE-2013-2072)
-
- -- Guido Trotter <ultrotter@debian.org> Mon, 29 Sep 2014 15:52:19 +0300
-
-xen (4.1.4-3+deb7u2) wheezy-security; urgency=high
-
- * Security upload.
- * Apply fix for Xen Security Advisory 52 (CVE-2013-2076)
- * Apply fix for Xen Security Advisory 53 (CVE-2013-2077)
- * Apply fix for Xen Security Advisory 54 (CVE-2013-2078)
- * Apply fix for Xen Security Advisory 55
- (CVE-2013-2194, CVE-2013-2195, CVE-2013-2196)
- * Apply fix for Xen Security Advisory 57 (CVE-2013-2211)
- * Apply fix for Xen Security Advisory 58 (CVE-2013-1432)
- * Apply fix for Xen Security Advisory 61 (CVE-2013-4329)
- * Apply fix for Xen Security Advisory 62 (CVE-2013-1442)
- * Apply fix for Xen Security Advisory 63 (CVE-2013-4355)
- * Apply fix for Xen Security Advisory 66 (CVE-2013-4361)
- * Apply fix for Xen Security Advisory 67 (CVE-2013-4368)
- * Apply fix for Xen Security Advisory 73 (CVE-2013-4494)
- * Apply fix for Xen Security Advisory 74 (CVE-2013-4553)
- * Apply fix for Xen Security Advisory 88 (CVE-2014-1950)
- * Apply fix for Xen Security Advisory 89 (CVE-2014-2599)
- * Apply fix for Xen Security Advisory 92 (CVE-2014-3124)
- * Apply fix for Xen Security Advisory 100 (CVE-2014-4021)
+ * Port of Ubuntu version to Wheezy, fixes:
+ * CVE-2015-2152 / XSA-119
+ * CVE-2015-2752 / XSA-125
+ * CVE-2015-2756 / XSA-126
+ * CVE-2015-3259 / XSA-137
+ * CVE-2015-5165 / XSA-140
+ * CVE-2015-5307 / XSA-156
+ * CVE-2015-7504 / XSA-162 (not in Debian security tracker)
+ * CVE-2015-7969 / XSA-149
+ * CVE-2015-7970 / XSA-150
+ * CVE-2015-7971 / XSA-152
+ * CVE-2015-7972 / XSA-153
+ * CVE-2015-8339, CVE-2015-8340 / XSA-159
+ * CVE-2015-8550 / XSA-155
+ * CVE-2015-8104 / XSA-156
+ * CVE-2015-8554 / XSA-164
+ * CVE-2015-8555 / XSA-165
+ * TEMP-0000000-CE3B44 / XSA-166
+ * CVE-2016-1570 / XSA-167
+ * CVE-2016-1571 / XSA-168
+ * CVE-2016-2270 / XSA-154
+ * CVE-2016-2271 / XSA-170
+ * Add ipxe-qemu and texlive-latex-extra to build dependancies.
+ * Remove tools-firmware-etherboot-fix-e1000.patch as we don't have
+ 8086100e.rom file.
+
+ -- Brian May <bam@debian.org> Tue, 22 Mar 2016 08:59:41 +1100
+
+xen (4.1.6.1-0ubuntu0.12.04.10) precise-security; urgency=low
+
+ * Applying Xen Security Advisories:
+ - CVE-2016-2270 / XSA-154
+ * x86: make get_page_from_l1e() return a proper error code
+ * x86: make mod_l1_entry() return a proper error code
+ * x86/mm: fix mod_l1_entry() return value when encountering r/o MMIO
+ page
+ * x86: enforce consistent cachability of MMIO mappings
+ - CVE-2016-1570 / XSA-167
+ * x86/mm: PV superpage handling lacks sanity checks
+ - CVE-2016-1571 / XSA-168
+ * x86/VMX: prevent INVVPID failure due to non-canonical guest address
+ - CVE-2015-8615 / XSA-169
+ * x86: make debug output consistent in hvm_set_callback_via
+ - CVE-2016-2271 / XSA-170
+ * x86/VMX: sanitize rIP before re-entering guest
+
+ -- Stefan Bader <stefan.bader@canonical.com> Thu, 25 Feb 2016 09:25:57 +0100
+
+xen (4.1.6.1-0ubuntu0.12.04.8) precise-security; urgency=low
+
+ * Applying Xen Security Advisories:
+ - CVE-2015-8550 / XSA-155
+ * blkif: Avoid double access to src->nr_segments
+ * xenfb: avoid reading twice the same fields from the shared page
+ * xen: Add RING_COPY_REQUEST()
+ * blktap2: Use RING_COPY_REQUEST
+ - CVE-2015-8339, CVE-2015-8340 / XSA-159
+ * memory: fix XENMEM_exchange error handling
+ - CVE-2015-7504 / XSA-162
+ * net: pcnet: add check to validate receive data size
+ - CVE-2015-8554 / XSA-164
+ * MSI-X: avoid array overrun upon MSI-X table writes
+ - CVE-2015-8555 / XSA-165
+ * x86: don't leak ST(n)/XMMn values to domains first using them
+ - CVE-2015-???? / XSA-166
+ * x86/HVM: avoid reading ioreq state more than once
+
+ -- Stefan Bader <stefan.bader@canonical.com> Wed, 16 Dec 2015 18:27:20 +0100
+
+xen (4.1.6.1-0ubuntu0.12.04.7) precise-security; urgency=low
+
+ * Applying Xen Security Advisories:
+ - CVE-2015-7835 / XSA-148
+ * x86: guard against undue super page PTE creation
+ - CVE-2015-7969 / XSA-149
+ * xen: free domain's vcpu array
+ - CVE-2015-7970 / XSA-150
+ * x86/PoD: Eager sweep for zeroed pages
+ - CVE-2015-7969 / XSA-151
+ * xenoprof: free domain's vcpu array
+ - CVE-2015-7971 / XSA-152
+ * x86: rate-limit logging in do_xen{oprof,pmu}_op()
+ - CVE-2015-7972 / XSA-153
+ * libxl: adjust PoD target by memory fudge, too
+ - CVE-2015-5307 / XSA-156
+ * x86/HVM: always intercept #AC and #DB
+
+ -- Stefan Bader <stefan.bader@canonical.com> Mon, 23 Nov 2015 11:57:02 +0100
+
+xen (4.1.6.1-0ubuntu0.12.04.6) precise-security; urgency=low
+
+ * Applying Xen Security Advisories:
+ - CVE-2014-5146 / XSA-097
+ * Combine hap/shadow and log_dirty_log
+ * x86/mm/hap: Adjust vram tracking to play nicely with log-dirty.
+ * x86/paging: make log-dirty operations preemptible
+ - CVE-2015-2752 / XSA-125
+ * Limit XEN_DOMCTL_memory_mapping hypercall to only process up to 64
+ GFNs (or less)
+ - CVE-2015-2756 / XSA-126 (QEMU traditional)
+ * xen: limit guest control of PCI command register
+ - CVE-2015-4103 / XSA-128
+ * properly gate host writes of modified PCI CFG contents
+ - CVE-2015-4104 / XSA-129
+ * xen: don't allow guest to control MSI mask register
+ - CVE-2015-4105 / XSA-130
+ * xen/MSI-X: disable logging by default
+ - CVE-2015-4106 / XSA-131
+ * xen/MSI: don't open-code pass-through of enable bit modifications
+ * xen/pt: consolidate PM capability emu_mask
+ * xen/pt: correctly handle PM status bit
+ * xen/pt: split out calculation of throughable mask in PCI config space
+ handling
+ * xen/pt: mark all PCIe capability bits read-only
+ * xen/pt: mark reserved bits in PCI config space fields
+ * xen/pt: add a few PCI config space field descriptions
+ * xen/pt: unknown PCI config space fields should be read-only
+ - CVE-2015-3340 / XSA-132
+ * domctl/sysctl: don't leak hypervisor stack to toolstacks
+ - CVE-2015-3456 / XSA-133
+ * qemut: fdc: force the fifo access to be in bounds of the
+ allocated buffer
+ - CVE-2015-3209 / XSA-135
+ * pcnet: fix Negative array index read
+ * pcnet: force the buffer access to be in bounds during tx
+ - CVE-2015-4164 / XSA-136
+ * x86/traps: loop in the correct direction in compat_iret()
+ - CVE-2015-3259 / XSA-137
+ * xl: Sane handling of extra config file arguments
+ - CVE-2015-5154 / XSA-138
+ * ide: Check array bounds before writing to io_buffer
+ * ide: Clear DRQ after handling all expected accesses
+ - CVE-2015-5165 / XSA-140
+ * rtl8139: avoid nested ifs in IP header parsing
+ * rtl8139: drop tautologous if (ip) {...} statement
+ * rtl8139: skip offload on short Ethernet/IP header
+ * rtl8139: check IP Header Length field
+ * rtl8139: check IP Total Length field
+ * rtl8139: skip offload on short TCP header
+ * rtl8139: check TCP Data Offset field
+
+ -- Stefan Bader <stefan.bader@canonical.com> Wed, 01 Apr 2015 16:38:31 +0200
+
+xen (4.1.6.1-0ubuntu0.12.04.5) precise-security; urgency=low
+
+ * Applying Xen Security Advisories:
+ - CVE-2015-2152 / XSA-119
+ * tools: libxl: Explicitly disable graphics backends on qemu
+ cmdline
+ - CVE-2015-2044 / XSA-121
+ * x86/HVM: return all ones on wrong-sized reads of system device I/O
+ ports
+ - CVE-2015-2045 / XSA-122
+ * pre-fill structures for certain HYPERVISOR_xen_version sub-ops
+ - CVE-2015-2151 / XSA-123
+ * x86emul: fully ignore segment override for register-only operations
+
+ -- Stefan Bader <stefan.bader@canonical.com> Wed, 04 Mar 2015 10:59:53 +0100
+
+xen (4.1.6.1-0ubuntu0.12.04.4) precise-security; urgency=low
+
+ * Applying Xen Security Advisories:
+ - CVE-2014-8594 / XSA-109
+ * x86: don't allow page table updates on non-PV page tables in
+ do_mmu_update()
+ - CVE-2014-8595 / XSA-110
+ * x86emul: enforce privilege level restrictions when loading CS
+ - CVE-2014-8866 / XSA-111
+ * x86: limit checks in hypercall_xlat_continuation() to actual arguments
+ - CVE-2014-8867 / XSA-112
+ * x86/HVM: confine internally handled MMIO to solitary regions
+ - CVE-2014-9030 / XSA-113
+ * x86/mm: fix a reference counting error in MMU_MACHPHYS_UPDATE
+
+ -- Stefan Bader <stefan.bader@canonical.com> Fri, 21 Nov 2014 15:29:19 +0100
+
+xen (4.1.6.1-0ubuntu0.12.04.3) precise-security; urgency=low
+
+ * Applying Xen Security Advisories:
+ - CVE-2014-7154 / XSA-104
+ * x86/shadow: fix race condition sampling the dirty vram state
+ - CVE-2014-7155 / XSA-105
+ * x86/emulate: check cpl for all privileged instructions
+ - CVE-2014-7156 / XSA-106
+ * x86emul: only emulate software interrupt injection for real mode
+ - CVE-2014-7188 / XSA-108
+ * x86/HVM: properly bound x2APIC MSR range
+
+ -- Stefan Bader <stefan.bader@canonical.com> Mon, 29 Sep 2014 20:00:39 +0200
+
+xen (4.1.6.1-0ubuntu0.12.04.2) precise-security; urgency=low
+
+ * Applying Xen Security Advisories:
+ - CVE-2013-2599 / XSA-89
+ * x86: enforce preemption in HVM_set_mem_access / p2m_set_mem_access()
+ - CVE-2014-3124 / XSA-92
+ * x86/HVM: restrict HVMOP_set_mem_type
+ - CVE-2014-4021 / XSA-100
+ * page-alloc: scrub pages used by hypervisor upon freeing
+
+ -- Stefan Bader <stefan.bader@canonical.com> Tue, 29 Jul 2014 15:05:23 +0200
+
+xen (4.1.6.1-0ubuntu0.12.04.1) precise-proposed; urgency=low
+
+ * Updating to lastest upstream stable release (LP: #1293993).
+ * Update to upstream 4.1.6.1 (4.1.6 failed to build and was skipped):
+ - Replacing the following security changes by upstream versions:
+ * CVE-2013-1918 / XSA-45, CVE-2013-1952 / XSA-49,
+ CVE-2013-2076 / XSA-52, CVE-2013-2077 / XSA-53,
+ CVE-2013-2078 / XSA-54, CVE-2013-2194, CVE-2013-2195,
+ CVE-2013-2196 / XSA-55, CVE-2013-2072 / XSA-56,
+ CVE-2013-2211 / XSA-57, CVE-2013-1432 / XSA-58,
+ XSA-61
+ - Bug fixes:
+ * addressing a regression from the fix for XSA-21
+ * addressing a regression from the fix for XSA-46
+ * bug fixes to low level system state handling, including certain
+ hardware errata workarounds
+ * Purged unused patches from debian/patches:
+ - xen-backport-per-device-vector-map.patch
+ - xen-introduce-xzalloc.patch
+
+ -- Stefan Bader <stefan.bader@canonical.com> Fri, 14 Mar 2014 13:55:27 +0100
+
+xen (4.1.5-0ubuntu0.12.04.3) precise-security; urgency=low
+
+ * Applying Xen Security Advisories:
+ - CVE-2014-1892, CVE-2014-1893 / XSA-84
+ * flask: restrict allocations done by hypercall interface
+ - CVE-2014-1666 / XSA-87
+ * x86: PHYSDEVOP_{prepare,release}_msix are privileged
+ - CVE-2014-1950 / XSA-88
+ * libxc: Fix out-of-memory error handling in xc_cpupool_getinfo()
+
+ -- Stefan Bader <stefan.bader@canonical.com> Mon, 17 Feb 2014 16:33:25 +0100
+
+xen (4.1.5-0ubuntu0.12.04.2) precise-security; urgency=low
+
+ * Applying Xen Security Advisories:
+ - CVE-2013-1432 / XSA-58
+ * Page reference counting error due to XSA-45/CVE-2013-1918 fixes
+ - CVE-2013-4329 / XSA-61
+ * libxl partially sets up HVM passthrough even with disabled iommu
+ - CVE-2013-1442 / XSA-62
+ * Information leak on AVX and/or LWP capable CPUs
+ - CVE-2013-4355 / XSA-63
+ - CVE-2013-4361 / XSA-66
+ Information leak through fbld instruction emulation
+ - CVE-2013-4368 / XSA-67
+ * Information leak through outs instruction emulation
+ - CVE-2013-4370 / XSA-69
+ * misplaced free in ocaml xc_vcpu_getaffinity stub
+ - CVE-2013-4416 / XSA-72
+ * ocaml xenstored mishandles oversized message replies
+ - CVE-2013-4494 / XSA-73
+ * Lock order reversal between page allocation and grant table locks
+ - CVE-2013-4553 / XSA-74
+ * Lock order reversal between page_alloc_lock and mm_rwlock
+ - CVE-2013-4554 / XSA-76
+ * Hypercalls exposed to privilege rings 1 and 2 of HVM guests
+ - CVE-2013-6885 / XSA-82
+ * Guest triggerable AMD CPU erratum may cause host hang
+
+ -- Stefan Bader <stefan.bader@canonical.com> Mon, 09 Dec 2013 19:32:56 +0100
+
+xen (4.1.5-0ubuntu0.12.04.1) precise-proposed; urgency=low
+
+ * Updating to lastest upstream stable release (LP: #1180396).
+ * Update to upstream 4.1.5:
+ - Replacing the following security changes by upstream versions:
+ * CVE-2012-5634 / XSA-33, CVE-2013-0153 / XSA-36,
+ CVE-2013-0215 / XSA-38, CVE-2012-6075 / XSA-41,
+ CVE-2013-1917 / XSA-44, CVE-2013-1919 / XSA-46,
+ CVE-2013-1920 / XSA-47, CVE-2013-1964 / XSA-50
+ - Bug fixes:
+ * ACPI APEI/ERST finally working on production systems
+ * Bug fixes for other low level system state handling
+ * Support for xz compressed Dom0 and DomU kernels
+ * Update to upstream 4.1.4:
+ - Replacing the following security changes by upstream versions:
+ * CVE-2012-3494 / XSA-12, CVE-2012-3495 / XSA-13,
+ CVE-2012-3496 / XSA-14, CVE-2012-3498 / XSA-16,
+ CVE-2012-3515 / XSA-17, CVE-2012-4411 / XSA-19,
+ CVE-2012-4535 / XSA-20, CVE-2012-4536 / XSA-21,
+ CVE-2012-4537 / XSA-22, CVE-2012-4538 / XSA-23,
+ CVE-2012-4539 / XSA-24, CVE-2012-4544 / XSA-25,
+ CVE-2012-2625 / XSA-25, CVE-2012-5510 / XSA-26,
+ CVE-2012-5511 / XSA-27, CVE-2012-5512 / XSA-28,
+ CVE-2012-5513 / XSA-29, CVE-2012-5514 / XSA-30,
+ CVE-2012-5515 / XSA-31
+ - Bug fixes:
+ * A fix for a long standing time management issue
+ * Bug fixes for S3 (suspend to RAM) handling
+ * Bug fixes for other low level system state handling
+ * Update to upstream 4.1.3:
+ - Replacing the following security changes by upstream versions:
+ * CVE-2012-0217 / XSA-7, CVE-2012-0218 / XSA-8,
+ CVE-2012-2934 / XSA-9, CVE-2012-3432 / XSA-10,
+ CVE-2012-3433 / XSA-11
+ - Bug fixes:
+ * Updates for the latest Intel/AMD CPU revisions
+ * Bug fixes and improvements to the libxl tool stack
+ * Bug fixes for IOMMU handling (device passthrough to HVM guests)
+ * Bug fixes for host kexec/kdump
+ * Dropping the following patches previously added as they are included
+ in the upstream stable release:
+ - upstream-24883-adcd6ab160fa.patch
+ - xen-introduce-xzalloc.patch
+ - xen-backport-per-device-vector-map.patch
+ - 0008-vmx-Simplify-cr0-update-handling-by-deferring-cr4-ch.patch
+ - 0009-VMX-disable-SMEP-feature-when-guest-is-in-non-paging.patch
+ - 0010-VMX-Always-disable-SMEP-when-guest-is-in-non-paging-.patch
+ * Fix translation import problem caused by duplicate message ID
+ (LP: #1176209).
+ - tools-xm-fix-duplicate-msgid.patch
+
+ -- Stefan Bader <stefan.bader@canonical.com> Fri, 21 Jun 2013 14:55:54 +0200
+
+xen (4.1.2-2ubuntu2.10) precise-security; urgency=low
+
+ * Applying Xen Security Advisories
+ - CVE-2013-2194, CVE-2013-2195, CVE-2013-2196 / XSA55
+ * libelf: abolish libelf-relocate.c
+ * libxc: introduce xc_dom_seg_to_ptr_pages
+ * libxc: Fix range checking in xc_dom_pfn_to_ptr etc.
+ * libelf: abolish elf_sval and elf_access_signed
+ * libelf/xc_dom_load_elf_symtab: Do not use "syms" uninitialised
+ * libelf: introduce macros for memory access and pointer handling
+ * tools/xcutils/readnotes: adjust print_l1_mfn_valid_note
+ * libelf: check nul-terminated strings properly
+ * libelf: check all pointer accesses
+ * libelf: Check pointer references in elf_is_elfbinary
+ * libelf: Make all callers call elf_check_broken
+ * libelf: use C99 bool for booleans
+ * libelf: use only unsigned integers
+ * libxc: Introduce xc_bitops.h
+ * libelf: check loops for running away
+ * libelf: abolish obsolete macros
+ * libxc: Add range checking to xc_dom_binloader
+ * libxc: check failure of xc_dom_*_to_ptr, xc_map_foreign_range
+ * libxc: check return values from malloc
+ * libxc: range checks in xc_dom_p2m_host and _guest
+ * libxc: check blob size before proceeding in xc_dom_check_gzip
+ - CVE-XXXX-XXXX / XSA57
+ * libxl: Restrict permissions on PV console device xenstore nodes
+
+ -- Stefan Bader <stefan.bader@canonical.com> Fri, 21 Jun 2013 14:52:44 +0200
+
+xen (4.1.2-2ubuntu2.9) precise-security; urgency=low
+
+ * Applying Xen Security Advisories:
+ - CVE-2013-1918 / XSA-45
+ * x86: make vcpu_destroy_pagetables() preemptible
+ * x86: make new_guest_cr3() preemptible
+ * x86: make MMUEXT_NEW_USER_BASEPTR preemptible
+ * x86: make vcpu_reset() preemptible
+ * x86: make arch_set_info_guest() preemptible
+ * x86: make page table unpinning preemptible
+ * x86: make page table handling error paths preemptible
+ - CVE-2013-1952 / XSA-49
+ * VT-d: don't permit SVT_NO_VERIFY entries for known device types
+ - CVE-2013-1964 / XSA-50
+ * Fix rcu domain locking for transitive grants
+ - CVE-2013-2076 / XSA-52
+ * x86/xsave: fix information leak on AMD CPUs
+ - CVE-2013-2077 / XSA-53
+ * x86/xsave: recover from faults on XRSTOR
+ - CVE-2013-2078 / XSA-54
+ * x86/xsave: properly check guest input to XSETBV
+ - CVE-2013-2072 / XSA-56
+ * libxc: limit cpu values when setting vcpu affinity
+
+ -- Stefan Bader <stefan.bader@canonical.com> Thu, 06 Jun 2013 16:06:34 +0200
+
+xen (4.1.2-2ubuntu2.8) precise-security; urgency=low
+
+ * Applying Xen Security Advisories:
+ - CVE-2013-1917 / XSA-44
+ x86: clear EFLAGS.NT in SYSENTER entry path
+ - CVE-2013-1919 / XSA-46
+ x86: fix various issues with handling guest IRQs
+ - CVE-2013-1920 / XSA-47
+ defer event channel bucket pointer store until after XSM checks
+
+ -- Stefan Bader <stefan.bader@canonical.com> Thu, 11 Apr 2013 17:18:46 +0200
+
+xen (4.1.2-2ubuntu2.7) precise-proposed; urgency=low
+
+ * Fix HVM VCPUs getting stuck on boot when host supports SMEP (LP: #1157757)
+ - 0008-vmx-Simplify-cr0-update-handling-by-deferring-cr4-ch.patch
+ - 0009-VMX-disable-SMEP-feature-when-guest-is-in-non-paging.patch
+ - 0010-VMX-Always-disable-SMEP-when-guest-is-in-non-paging-.patch
+
+ -- Stefan Bader <stefan.bader@canonical.com> Mon, 08 Apr 2013 17:53:45 +0200
+
+xen (4.1.2-2ubuntu2.6) precise-security; urgency=low
+
+ * Applying Xen Security Advisories:
+ - ACPI: acpi_table_parse() should return handler's error code
+ CVE-2013-0153 / XSA-36
+ - oxenstored incorrect handling of certain Xenbus ring states
+ CVE-2013-0215 / XSA-38
+ * xen-introduce-xzalloc.patch
+ Cherry-picked from upstream xen stable-4.1 as prerequisite for XSA-36
+ * xen-backport-per-device-vector-map.patch
+ Cherry-picked from upstream xen stable-4.1 as prerequisite for XSA-36
+ Also fixes issues on AMD systems which could cause Dom0 to loose disks
+ under heavy I/O (because PCI-E devices could use the same IOAPIC vector
+ as the SMBus).
+
+ -- Stefan Bader <stefan.bader@canonical.com> Wed, 30 Jan 2013 12:36:41 +0100
+
+xen (4.1.2-2ubuntu2.5) precise-security; urgency=low
+
+ * Applying Xen Security Advisory:
+ - VT-d: fix interrupt remapping source validation for devices behind
+ legacy bridges
+ CVE-2012-5634
+ * Applying qemu security fixes:
+ - e1000: Discard packets that are too long if !SBP and !LPE
+ CVE-2012-6075
+ - Discard packets longer than 16384 when !SBP to match the hardware
+ behavior.
+ CVE-2012-6075
+
+ -- Stefan Bader <stefan.bader@canonical.com> Mon, 07 Jan 2013 18:58:27 +0100
+
+xen (4.1.2-2ubuntu2.4) precise-security; urgency=low
+
+ * SECURITY UPDATE: denial of service via MMIO regions
+ - debian/patches/CVE-2012-3432.patch: don't leave emulator in an
+ inconsistent state in xen/arch/x86/hvm/io.c.
+ - CVE-2012-3432
+ * SECURITY UPDATE: denial of service via excessive shared page search
+ time during the p2m teardown
+ - debian/patches/CVE-2012-3433.patch: only check for shared pages while
+ any exist on teardown in xen/arch/x86/mm/p2m.c.
+ - CVE-2012-3433
+ * SECURITY UPDATE: denial of service via DR7 reserved bits
+ - debian/patches/CVE-2012-3494.patch: write upper 32 bits as zeros in
+ xen/include/asm-x86/debugreg.h.
+ - CVE-2012-3494
+ * SECURITY UPDATE: denial of service and possible privilege escalation
+ via physdev_get_free_pirq hypercall.
+ - debian/patches/CVE-2012-3495.patch: handle out-of-pirq condition
+ correctly in xen/arch/x86/physdev.c.
+ - CVE-2012-3495
+ * SECURITY UPDATE: denial of service via via invalid flags
+ - debian/patches/CVE-2012-3496.patch: Don't BUG_ON() PoD operations on
+ a non-translated guest in xen/arch/x86/mm/p2m.c.
+ - CVE-2012-3496
+ * SECURITY UPDATE: denial of service and possibly hypervisor memory
+ disclosure via PHYSDEVOP_map_pirq
+ - debian/patches/CVE-2012-3498.patch: add validation before using in
+ xen/arch/x86/physdev.c.
+ - CVE-2012-3498
+ * SECURITY UPDATE: privilege escalation via crafted escape VT100 sequence
+ - debian/patches/CVE-2012-3515.patch: bounds check whenever changing
+ the cursor due to an escape code in qemu/console.c.
+ - CVE-2012-3515
+ * SECURITY UPDATE: host info disclosure via qemu monitor
+ - debian/patches/CVE-2012-4411.patch: disable qemu monitor by default
+ in qemu/vl.c.
+ - CVE-2012-4411
+
+ -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Tue, 11 Dec 2012 10:13:24 -0500
+
+xen (4.1.2-2ubuntu2.3) precise-security; urgency=low
+
+ * Applying Xen Security fixes (LP: #1086801, #1086875)
+ - VCPU/timers: Prevent overflow in calculations, leading to DoS
+ vulnerability
+ CVE-2012-4535
+ - x86/physdev: Range check pirq parameter from guests
+ CVE-2012-4536
+ - x86/physmap: Prevent incorrect updates of m2p mappings
+ CVE-2012-4537
+ - xen/mm/shadow: check toplevel pagetables are present before unhooking
+ them
+ CVE-2012-4538
+ - compat/gnttab: Prevent infinite loop in compat code
+ CVE-2012-4539
+ - libxc: builder: limit maximum size of kernel/ramdisk
+ CVE-2012-4544
+ - gnttab: fix releasing of memory upon switches between versions
+ CVE-2012-5510
+ - hvm: Limit the size of large HVM op batches
+ CVE-2012-5511
+ - x86/HVM: range check xen_hvm_set_mem_access.hvmmem_access before use
+ CVE-2012-5512
+ - xen: add missing guest address range checks to XENMEM_exchange handlers
+ CVE-2012-5513
+ - xen: fix error handling of guest_physmap_mark_populate_on_demand()
+ CVE-2012-5514
+ - memop: limit guest specified extent order
+ CVE-2012-5515
+
+ -- Stefan Bader <stefan.bader@canonical.com> Wed, 05 Dec 2012 15:04:25 +0100
+
+xen (4.1.2-2ubuntu2.2) precise-proposed; urgency=low
+
+ * upstream-24883:adcd6ab160fa
+ x86/mm: Don't check for invalid bits in non-present PTEs.
+ Cherry-pick from xen-4.1 unstable to fix corrupted page table issues
+ observed on 32 bit guests (LP: #1023365).
+
+ -- Stefan Bader <stefan.bader@canonical.com> Tue, 10 Jul 2012 19:48:15 +0200
+
+xen (4.1.2-2ubuntu2.1) precise-security; urgency=low
+
+ * x86-64: detect processors subject to AMD erratum #121 and refuse to boot
+ CVE-2006-0744
+ * x86_64: Do not execute sysret with a non-canonical return address
+ CVE-2012-0218
+ * x86-64: fix #GP generation in assembly code
+ CVE-2012-0217
+
+ -- Stefan Bader <stefan.bader@canonical.com> Wed, 06 Jun 2012 13:59:39 +0200
+
+xen (4.1.2-2ubuntu2) precise; urgency=low
+
+ * etherboot: Change the config back to include the 8086100e.rom
+ (LP: #948333)
+
+ -- Stefan Bader <stefan.bader@canonical.com> Tue, 06 Mar 2012 20:58:14 +0100
+
+xen (4.1.2-2ubuntu1) precise; urgency=low
+
+ * Merge from Debian testing. Remaining changes:
+ - libxenstore3.0: Conflict and replaces libxen3.
+ - libxen-dev: Conflict and replaces libxen3-dev.
+ - xenstore-utils: Conflict and replaces libxen3.
+ - xen-utils-4.1: Conflict and replaces libxen3, python-xen-3.3,
+ and xen-utils-4.1.
+ - Make sure the LDFLAGS value passed is suitable for use by ld
+ rather than gcc.
+ - Dropped:
+ - debian/patches/upstream-23044:d4ca456c0c25
+ - debian/patches/upstream-23104:1976adbf2b80
+ - debian/patches/upstream-changeset-23146.patch
+ - debian/patches/upstream-changeset-23147.patch
+ - debian/patches/xen-pirq-resubmit-irq.patch
- -- Guido Trotter <ultrotter@debian.org> Sun, 17 Aug 2014 10:39:32 +0300
-
-xen (4.1.4-3+deb7u1) wheezy-security; urgency=high
-
- * Non-maintainer upload by the Security Team.
-
- [ Bastian Blank ]
- * Make several long runing operations preemptible.
- CVE-2013-1918
- * Fix source validation for VT-d interrupt remapping.
- CVE-2013-1952
-
- -- Salvatore Bonaccorso <carnil@debian.org> Sat, 04 May 2013 10:41:13 +0200
-
-xen (4.1.4-3) unstable; urgency=high
-
- * Fix return from SYSENTER.
- CVE-2013-1917
- * Fix various problems with guest interrupt handling.
- CVE-2013-1919
- * Only save pointer after access checks.
- CVE-2013-1920
- * Fix domain locking for transitive grants.
- CVE-2013-1964
-
- -- Bastian Blank <waldi@debian.org> Fri, 19 Apr 2013 13:01:57 +0200
-
-xen (4.1.4-2) unstable; urgency=low
-
- * Use pre-device interrupt remapping mode per default. Fix removing old
- remappings.
- CVE-2013-0153
-
- -- Bastian Blank <waldi@debian.org> Wed, 06 Feb 2013 13:04:52 +0100
-
-xen (4.1.4-1) unstable; urgency=low
-
- * New upstream release.
- - Disable process-context identifier support in newer CPUs for all
- domains.
- - Add workarounds for AMD errata.
- - Don't allow any non-canonical addresses.
- - Use Multiboot memory map if BIOS emulation does not provide one.
- - Fix several problems in tmem.
- CVE-2012-3497
- - Fix error handling in domain creation.
- - Adjust locking and interrupt handling during S3 resume.
- - Tighten more resource and memory range checks.
- - Reset performance counters. (closes: #698651)
- - Remove special-case for first IO-APIC.
- - Fix MSI handling for HVM domains. (closes: #695123)
- - Revert cache value of disks in HVM domains.
-
- -- Bastian Blank <waldi@debian.org> Thu, 31 Jan 2013 15:44:50 +0100
-
-xen (4.1.3-8) unstable; urgency=high
-
- * Fix error in VT-d interrupt remapping source validation.
- CVE-2012-5634
- * Fix buffer overflow in qemu e1000 emulation.
- CVE-2012-6075
- * Update patch, mention second CVE.
- CVE-2012-5511, CVE-2012-6333
-
- -- Bastian Blank <waldi@debian.org> Sat, 19 Jan 2013 13:55:07 +0100
-
-xen (4.1.3-7) unstable; urgency=low
-
- * Fix clock jump due to incorrect annotated inline assembler.
- (closes: #599161)
- * Add support for XZ compressed Linux kernels to hypervisor and userspace
- based loaders, it is needed for any Linux kernels newer then Wheezy.
- (closes: #695056)
-
- -- Bastian Blank <waldi@debian.org> Tue, 11 Dec 2012 18:54:59 +0100
-
-xen (4.1.3-6) unstable; urgency=high
-
- * Fix error handling in physical to machine memory mapping.
- CVE-2012-5514
-
- -- Bastian Blank <waldi@debian.org> Tue, 04 Dec 2012 10:51:43 +0100
-
-xen (4.1.3-5) unstable; urgency=high
-
- * Fix state corruption due to incomplete grant table switch.
- CVE-2012-5510
- * Check range of arguments to several HVM operations.
- CVE-2012-5511, CVE-2012-6333
- * Check array index before using it in HVM memory operation.
- CVE-2012-5512
- * Check memory range in memory exchange operation.
- CVE-2012-5513
- * Don't allow too large memory size and avoid busy looping.
- CVE-2012-5515
-
- -- Bastian Blank <waldi@debian.org> Mon, 03 Dec 2012 19:37:38 +0100
-
-xen (4.1.3-4) unstable; urgency=high
-
- * Use linux 3.2.0-4 stuff.
- * Fix overflow in timer calculations.
- CVE-2012-4535
- * Check value of physical interrupts parameter before using it.
- CVE-2012-4536
- * Error out on incorrect memory mapping updates.
- CVE-2012-4537
- * Check if toplevel page tables are present.
- CVE-2012-4538
- * Fix infinite loop in compatibility code.
- CVE-2012-4539
- * Limit maximum kernel and ramdisk size.
- CVE-2012-2625, CVE-2012-4544
-
- -- Bastian Blank <waldi@debian.org> Tue, 20 Nov 2012 15:51:01 +0100
-
-xen (4.1.3-3) unstable; urgency=low
-
- * Xen domain init script:
- - Make sure Open vSwitch is started before any domain.
- - Properly handle and show output of failed migration and save.
- - Ask all domains to shut down before checking them.
-
- -- Bastian Blank <waldi@debian.org> Tue, 18 Sep 2012 13:26:32 +0200
-
-xen (4.1.3-2) unstable; urgency=medium
-
- * Don't allow writing reserved bits in debug register.
- CVE-2012-3494
- * Fix error handling in interrupt assignment.
- CVE-2012-3495
- * Don't trigger bug messages on invalid flags.
- CVE-2012-3496
- * Check array bounds in interrupt assignment.
- CVE-2012-3498
- * Properly check bounds while setting the cursor in qemu.
- CVE-2012-3515
- * Disable monitor in qemu by default.
- CVE-2012-4411
-
- -- Bastian Blank <waldi@debian.org> Fri, 07 Sep 2012 19:41:46 +0200
-
-xen (4.1.3-1) unstable; urgency=medium
-
- * New upstream release: (closes: #683286)
- - Don't leave the x86 emulation in a bad state. (closes: #683279)
- CVE-2012-3432
- - Only check for shared pages while any exist on teardown.
- CVE-2012-3433
- - Fix error handling for unexpected conditions.
- - Update CPUID masking to latest Intel spec.
- - Allow large ACPI ids.
- - Fix IOMMU support for PCI-to-PCIe bridges.
- - Disallow access to some sensitive IO-ports.
- - Fix wrong address in IOTLB.
- - Fix deadlock on CPUs without working cpufreq driver.
- - Use uncached disk access in qemu.
- - Fix buffer size on emulated e1000 device in qemu.
- * Fixup broken and remove applied patches.
-
- -- Bastian Blank <waldi@debian.org> Fri, 17 Aug 2012 11:25:02 +0200
-
-xen (4.1.3~rc1+hg-20120614.a9c0a89c08f2-5) unstable; urgency=low
-
- [ Ian Campbell ]
- * Set tap device MAC addresses to fe:ff:ff:ff:ff:ff (Closes: #671018)
- * Only run xendomains initscript if toolstack is xl or xm (Closes: #680528)
-
- [ Bastian Blank ]
- * Actually build-depend on new enough version of dpkg-dev.
- * Add xen-sytem-* meta-packages. We are finally in a position to do
- automatic upgrades and this package is missing. (closes: #681376)
-
- -- Bastian Blank <waldi@debian.org> Sat, 28 Jul 2012 10:23:26 +0200
-
-xen (4.1.3~rc1+hg-20120614.a9c0a89c08f2-4) unstable; urgency=low
-
- * Add Build-Using info to xen-utils package.
- * Fix build-arch target.
-
- -- Bastian Blank <waldi@debian.org> Sun, 01 Jul 2012 19:52:30 +0200
-
-xen (4.1.3~rc1+hg-20120614.a9c0a89c08f2-3) unstable; urgency=low
-
- * Remove /usr/lib/xen-default. It breaks systems if xenstored is not
- compatible.
- * Fix init script usage.
- * Fix udev rules for emulated network devices:
- - Force names of emulated network devices to a predictable name.
-
- -- Bastian Blank <waldi@debian.org> Sun, 01 Jul 2012 16:59:04 +0200
-
-xen (4.1.3~rc1+hg-20120614.a9c0a89c08f2-2) unstable; urgency=low
-
- * Fix pointer missmatch in interrupt functions. Fixes build on i386.
-
- -- Bastian Blank <waldi@debian.org> Fri, 15 Jun 2012 18:00:51 +0200
-
-xen (4.1.3~rc1+hg-20120614.a9c0a89c08f2-1) unstable; urgency=low
-
- * New upstream snapshot.
- - Fix privilege escalation and syscall/sysenter DoS while using
- non-canonical addresses by untrusted PV guests. (closes: #677221)
- CVE-2012-0217
- CVE-2012-0218
- - Disable Xen on CPUs affected by AMD Erratum #121. PV guests can
- cause a DoS of the host.
- CVE-2012-2934
- * Don't fail if standard toolstacks are not available. (closes: #677244)
-
- -- Bastian Blank <waldi@debian.org> Thu, 14 Jun 2012 17:06:25 +0200
-
-xen (4.1.2-7) unstable; urgency=low
-
- * Really use ucf.
- * Update init script dependencies:
- - Start $syslog before xen.
- - Start drbd and iscsi before xendomains. (closes: #626356)
- - Start corosync and heartbeat after xendomains.
- * Remove /var/log/xen on purge. (closes: #656216)
-
- -- Bastian Blank <waldi@debian.org> Tue, 22 May 2012 10:44:41 +0200
-
-xen (4.1.2-6) unstable; urgency=low
-
- * Fix generation of architectures for hypervisor packages.
- * Remove information about loop devices, it is incorrect. (closes: #503044)
- * Update xendomains init script:
- - Create directory for domain images only root readable. (closes: #596048)
- - Add missing sanity checks for variables. (closes: #671750)
- - Remove not longer supported config options.
- - Don't fail if no config is available.
- - Remove extra output if domain was restored.
-
- -- Bastian Blank <waldi@debian.org> Sun, 06 May 2012 20:07:41 +0200
-
-xen (4.1.2-5) unstable; urgency=low
-
- * Actually force init script rename. (closes: #669341)
- * Fix long output from xl.
- * Move complete init script setup.
- * Rewrite xendomains init script:
- - Use LSB output functions.
- - Make output more clear.
- - Use xen toolstack wrapper.
- - Use a python script to properly read domain details.
- * Set name for Domain-0.
-
- -- Bastian Blank <waldi@debian.org> Mon, 23 Apr 2012 11:56:45 +0200
-
-xen (4.1.2-4) unstable; urgency=low
-
- [ Bastian Blank ]
- * Build-depend on ipxe-qemu instead of ipxe. (closes: #665070)
- * Don't longer use a4wide latex package.
- * Use ucf for /etc/default/xen.
- * Remove handling for old udev rules link and xenstored directory.
- * Rename xend init script to xen.
-
- [ Lionel Elie Mamane ]
- * Fix toolstack script to work with old dash. (closes: #648029)
-
- -- Bastian Blank <waldi@debian.org> Mon, 16 Apr 2012 08:47:29 +0000
-
-xen (4.1.2-3) unstable; urgency=low
-
- * Merge xen-common source package.
- * Remove xend wrapper, it should not be called by users.
- * Support xl in init script.
- * Restart xen daemons on upgrade.
- * Restart and stop xenconsoled in init script.
- * Load xen-gntdev module.
- * Create /var/lib/xen. (closes: #658101)
- * Cleanup udev rules. (closes: #657745)
-
- -- Bastian Blank <waldi@debian.org> Wed, 01 Feb 2012 19:28:28 +0100
+ -- Chuck Short <zulcss@ubuntu.com> Thu, 22 Dec 2011 04:53:35 +0000
xen (4.1.2-2) unstable; urgency=low
@@ -384,6 +566,24 @@
-- Bastian Blank <waldi@debian.org> Sat, 26 Nov 2011 18:28:06 +0100
+xen (4.1.1-3ubuntu1) precise; urgency=low
+
+ * Merge from Debian testing. Remaining changes:
+ - libxenstore3.0: Conflict and replaces libxen3.
+ - libxen-dev: Conflict and replaces libxen3-dev.
+ - xenstore-utils: Conflict and replaces libxen3.
+ - xen-utils-4.1: Conflict and replaces libxen3, python-xen-3.3,
+ and xen-utils-4.1.
+ - Make sure the LDFLAGS value passed is suitable for use by ld
+ rather than gcc.
+ - debian/patches/upstream-changeset-23146.patch,
+ debian/patches/upstream-changeset-23147.patch: Fix booting with hvm
+ domU. (LP: #832207)
+ - debian/patches/xen-pirq-resubmit-irq.patch: Retrigger pirq events
+ when asserted while processing. (LP: #854829)
+
+ -- Chuck Short <zulcss@ubuntu.com> Sun, 06 Nov 2011 05:51:08 +0000
+
xen (4.1.1-3) unstable; urgency=low
[ Julien Danjou ]
@@ -398,12 +598,69 @@
-- Bastian Blank <waldi@debian.org> Wed, 26 Oct 2011 14:42:33 +0200
+xen (4.1.1-2ubuntu4.1) oneiric-proposed; urgency=low
+
+ * debian/patches/xen-pirq-resubmit-irq.patch: Retrigger
+ pirq events when asserted while processing. Thanks to Stefan Bader
+ (LP: #854829)
+
+ -- Chuck Short <zulcss@ubuntu.com> Mon, 10 Oct 2011 19:30:09 -0400
+
+xen (4.1.1-2ubuntu4) oneiric; urgency=low
+
+ * Rebuild to drop build records on armel and powerpc. LP: #823714.
+
+ -- Matthias Klose <doko@ubuntu.com> Thu, 06 Oct 2011 14:15:35 +0200
+
+xen (4.1.1-2ubuntu2) oneiric; urgency=low
+
+ * Clean up patches.
+ * debian/patches/upstream-changeset-23146.patch,
+ debian/patches/upstream-changeset-23147.patch: Fix booting with hvm
+ domU. (LP: #832207)
+
+ -- Chuck Short <zulcss@ubuntu.com> Thu, 01 Sep 2011 13:13:47 -0400
+
+xen (4.1.1-2ubuntu1) oneiric; urgency=low
+
+ * Merge from debian unstable. Remaining changes:
+ - libxenstore3.0: Conflict and replaces libxen3.
+ - libxen-dev: Conflict and replaces libxen3-dev.
+ - xenstore-utils: Conflict and replaces libxen3.
+ - xen-utils-4.1: Conflict and replaces libxen3, python-xen-3.3,
+ and xen-utils-4.1.
+ + Make sure the LDFLAGS value passed is suitable for use by ld
+ rather than gcc.
+
+ -- Chuck Short <zulcss@ubuntu.com> Thu, 11 Aug 2011 14:18:41 +0000
+
xen (4.1.1-2) unstable; urgency=low
* Fix hvmloader with gcc 4.6.
-- Bastian Blank <waldi@debian.org> Fri, 05 Aug 2011 23:58:36 +0200
+xen (4.1.1-1ubuntu1) oneiric; urgency=low
+
+ * Merge from debian unstable. Remaining changes:
+ + Xen 3.3 -> Xen 4.1 migration:
+ - libxenstore3.0: Conflict and replaces libxen3.
+ - libxen-dev: Conflict and replaces libxen3-dev.
+ - xenstore-utils: Conflict and replaces libxen3.
+ - xen-utils-4.1: Conflict and replaces libxen3, python-xen-3.3,
+ and xen-utils-4.1.
+ + Make sure the LDFLAGS value passed is suitable for use by ld
+ rather than gcc.
+ + Dropped upstream patches:
+ - debian/patches/disable-unused-but-not-set-error.patch:
+ Applied upstream.
+ - debian/patches/xc-dom-restore-set-but-not-used.patch:
+ Applied upstream.
+ - debian/patches/xc-dom-restore-set-but-not-used.patch:
+ Applied upstream.
+
+ -- Chuck Short <zulcss@ubuntu.com> Tue, 19 Jul 2011 00:11:08 +0000
+
xen (4.1.1-1) unstable; urgency=low
* New upstream release.
@@ -412,6 +669,43 @@
-- Bastian Blank <waldi@debian.org> Mon, 18 Jul 2011 19:38:38 +0200
+xen (4.1.0-3ubuntu4) oneiric; urgency=low
+
+ * Fix xen 3.3 -> xen 4.1 migration.
+
+ -- Chuck Short <zulcss@ubuntu.com> Sat, 04 Jun 2011 15:37:17 -0400
+
+xen (4.1.0-3ubuntu3) oneiric; urgency=low
+
+ * debian/control: Use python2.7 as a build dependency.
+
+ -- Chuck Short <zulcss@ubuntu.com> Tue, 31 May 2011 14:50:03 -0400
+
+xen (4.1.0-3ubuntu2) oneiric; urgency=low
+
+ * debian/control:
+ + Move to python 2.7.
+ + Xen 3.3 -> Xen4.1 migration:
+ - libxenstore3.0: Conflict and replaces libxen3.
+ - libxen-dev: Conflict and replaces libxen3-dev.
+ - xenstore-tuils: Conflict and replaces libxen3
+ - xen-utils-4.1: Confflict and replaces libxen3, python-xen3.3,
+ and xen-utils-3.3
+
+ -- Chuck Short <zulcss@ubuntu.com> Tue, 31 May 2011 13:15:08 -0400
+
+xen (4.1.0-3ubuntu1) oneiric; urgency=low
+
+ * Make sure the LDFLAGS value passed is suitable for use by ld,
+ rather than gcc.
+ * Import a set of gcc 4.6 related build fixes from upstream hg.
+ (disable-unused-but-not-set-error.patch,
+ ioapic-uninitialised-variables.patch,
+ patches/xc-dom-restore-set-but-not-used.patch,
+ xc-tmem-set-but-not-used.patch)
+
+ -- Soren Hansen <soren@ubuntu.com> Thu, 26 May 2011 14:27:18 +0200
+
xen (4.1.0-3) unstable; urgency=low
* Add ghostscript to build-deps.
@@ -1033,3 +1327,4 @@
* Initial version.
-- Adam Heath <doogie@brainfood.com> Tue, 02 Mar 2004 13:21:52 -0600
+
diff -Nru xen-4.1.4/debian/control xen-4.1.6.1/debian/control
--- xen-4.1.4/debian/control 2013-05-02 22:31:50.000000000 +1000
+++ xen-4.1.6.1/debian/control 2016-05-02 17:32:58.000000000 +1000
@@ -4,8 +4,8 @@
Maintainer: Debian Xen Team <pkg-xen-devel@lists.alioth.debian.org>
Uploaders: Guido Trotter <ultrotter@debian.org>, Bastian Blank <waldi@debian.org>
Standards-Version: 3.9.2
-Build-Depends: debhelper (>> 7), dpkg-dev (>= 1.16.0~), lsb-release, python-dev, bcc, gcc-multilib, e2fslibs-dev, iasl, ipxe-qemu, libaio-dev, libgnutls-dev, liblzma-dev, libncurses5-dev, libpci-dev, pkg-config, uuid-dev, zlib1g-dev, ocaml-nox, dh-ocaml, ocaml-findlib
-Build-Depends-Indep: graphviz, ghostscript, texlive-fonts-recommended, texlive-font-utils, texlive-latex-recommended
+Build-Depends: debhelper (>> 7), lsb-release, python-dev, bcc, gcc-multilib, e2fslibs-dev, iasl, ipxe, libaio-dev, libgnutls-dev, liblzma-dev, libncurses5-dev, libpci-dev, pkg-config, uuid-dev, zlib1g-dev, ocaml-nox, dh-ocaml, ocaml-findlib, ipxe-qemu
+Build-Depends-Indep: graphviz, ghostscript, texlive-fonts-recommended, texlive-font-utils, texlive-latex-recommended, texlive-latex-extra
XS-Python-Version: current
Package: xen-docs-4.1
@@ -28,6 +28,8 @@
Architecture: amd64 i386
Section: libs
Depends: ${shlibs:Depends}, ${misc:Depends}
+Replaces: libxen3 (<= 3.3.0-1ubuntu12)
+Conflicts: libxen3 (<= 3.3.0-1ubuntu12)
Description: Xenstore communications library for Xen
This package contains the public libxenstore.
@@ -35,6 +37,8 @@
Architecture: amd64 i386
Section: libdevel
Depends: libxen-4.1 (= ${binary:Version}), libxenstore3.0 (= ${binary:Version}), ${misc:Depends}
+Replaces: libxen3-dev (<= 3.3.0-1ubuntu12)
+Conflicts: libxen3-dev (<= 3.3.0-1ubuntu12)
Description: Public headers and libs for Xen
This package contains the public headers and static libraries for Xen.
@@ -42,8 +46,8 @@
Architecture: amd64 i386
Section: admin
Depends: ${shlibs:Depends}, ${misc:Depends}
-Replaces: xen-utils-common (<= 3.1.0-1)
-Conflicts: xen-utils-common (<= 3.1.0-1)
+Replaces: xen-utils-common (<= 3.1.0-1), libxen3 (<= 3.3.0-1ubuntu12)
+Conflicts: xen-utils-common (<= 3.1.0-1), libxen3 (<= 3.3.0-1ubuntu12)
Description: Xenstore utilities for Xen
This package contains the Xenstore utilities.
@@ -65,23 +69,17 @@
This package contains the ocaml findlib packages for compiling
applications that are designed to control the Xen hypervisor.
-Package: xen-utils-common
-Architecture: all
-Depends: gawk, lsb-base, python, udev, xenstore-utils, ${misc:Depends}
-Description: Xen administrative tools - common files
- The userspace tools to manage a system virtualized through the Xen virtual
- machine monitor.
-
Package: xen-utils-4.1
Architecture: amd64 i386
Provides: xen-utils
-Depends: ${shlibs:Depends}, ${misc:Depends}, ${python:Depends}, xen-utils-common (>= ${source:Version})
+Depends: ${shlibs:Depends}, ${misc:Depends}, ${python:Depends}, xen-utils-common (>= 3.4.2-4)
Recommends: bridge-utils, libc6-xen [i386], xen-hypervisor-4.1, qemu-keymaps, qemu-utils
Suggests: xen-docs-4.1
+Replaces: xen-utils-3.3 (<= 3.3.0-1ubuntu12), libxen3 (<= 3.3.0-1ubuntu12), python-xen-3.3 (<= 3.3.0-1ubuntu12)
+Conflicts: xen-utils-3.3 (<= 3.3.0-1ubuntu12), libxen3 (<= 3.3.0-1ubuntu12), python-xen-3.3 (<= 3.3.0-1ubuntu12)
Description: XEN administrative tools
The userspace tools to manage a system virtualized through the XEN virtual
machine monitor.
-Built-Using: ${misc:Built-Using}
Package: xen-hypervisor-4.1-amd64
Architecture: amd64 i386
@@ -98,14 +96,6 @@
kernel specifically crafted to work as the Domain 0, mediating hardware
access for XEN itself.
-Package: xen-system-amd64
-Architecture: amd64 i386
-Provides: xen-system
-Depends: xen-hypervisor-4.1-amd64, xen-utils-4.1, ${misc:Depends}
-Description: Xen System on AMD64 (meta-package)
- This package depends on the latest Xen hypervisor for use on AMD64 and the
- Xen utils.
-
Package: xen-hypervisor-4.1-i386
Architecture: i386
Provides: xen-hypervisor, xen-hypervisor-4.1, xen-hypervisor-i386
@@ -121,11 +111,3 @@
kernel specifically crafted to work as the Domain 0, mediating hardware
access for XEN itself.
-Package: xen-system-i386
-Architecture: i386
-Provides: xen-system
-Depends: xen-hypervisor-4.1-i386, xen-utils-4.1, ${misc:Depends}
-Description: Xen System on i386 (meta-package)
- This package depends on the latest Xen hypervisor for use on i386 and the
- Xen utils.
-
diff -Nru xen-4.1.4/debian/control.md5sum xen-4.1.6.1/debian/control.md5sum
--- xen-4.1.4/debian/control.md5sum 2013-05-05 00:29:11.000000000 +1000
+++ xen-4.1.6.1/debian/control.md5sum 2015-08-31 23:30:31.000000000 +1000
@@ -1,15 +1,14 @@
-462cf1d25b0b7f86b996031f90ca8e14 debian/changelog
-2cfc80dad0da6ef5789993726da25549 debian/bin/gencontrol.py
+945c50f5d792aabd3d5fb8ec115e755b debian/changelog
+b3af632f6a5401d938c7fdca94cfe191 debian/bin/gencontrol.py
667edd28bcda9cd243bb69c78e452aad debian/templates/control.hypervisor.in
-4106f2621fc4dad25c0d6569b51cbce3 debian/templates/control.main.in
-e002d8023a39cc8beb8d345b8c99f695 debian/templates/control.source.in
-fe9f3e8a9c9b716f7b4c5b7d7aec3128 debian/templates/control.system.latest.in
-d8a4fc67d96fd893d002d956dcf8c220 debian/templates/control.utils.in
+488d0275f9f540a5b70aa099f3915285 debian/templates/control.main.in
+f97ed3503f8a9dabaf1c0b36c57cf525 debian/templates/control.source.in
+92c32bf7b0389c47b11d05885f605750 debian/templates/control.utils.in
a15fa64ce6deead28d33c1581b14dba7 debian/templates/xen-hypervisor.postinst.in
22492e0565a4754b5e008ca7cac871da debian/templates/xen-hypervisor.postrm.in
dcabf82578122540e0534f72750698d5 debian/templates/xen-utils.lintian-overrides.in
-03f63e67cf2d915bfbb535f8c9d9e2e4 debian/templates/xen-utils.postinst.in
-b6acd21c3924e6ec6f9c547afbbc7d9e debian/templates/xen-utils.prerm.in
+de69fbeefaec8cd21073546beae98e53 debian/templates/xen-utils.postinst.in
+157d1c2c87b4d3d3e6e9a439242b9cac debian/templates/xen-utils.prerm.in
2f0cc6973a228e4002e5b89f756e3d58 debian/arch/defines
7eec83f6c765a660ebaeb80dc4b433ad debian/arch/amd64/defines
5441af74c3b47034f0efb0226b9c3723 debian/arch/i386/defines
diff -Nru xen-4.1.4/debian/lib/python/debian_xen/debian.py xen-4.1.6.1/debian/lib/python/debian_xen/debian.py
--- xen-4.1.4/debian/lib/python/debian_xen/debian.py 2012-06-14 21:14:36.000000000 +1000
+++ xen-4.1.6.1/debian/lib/python/debian_xen/debian.py 2015-08-31 23:30:31.000000000 +1000
@@ -1,5 +1,6 @@
import re
-from debian_linux.debian import Version
+from debian_linux.debian import Version, PackageFieldList
+from debian_linux.debian import PackageFieldList as _PackageFieldList
class VersionXen(Version):
@@ -8,17 +9,12 @@
(?P<version>
\d+\.\d+
)
+\.\d+
(?:
- \.\d+
- (?:
- ~rc\d+
- )?
- (?:
- \+hg-\d+.[a-z0-9]+
- )?
+ \+hg\d+
|
- ~hg-\d+.[a-z0-9]+
-)
+ ~rc\d+
+)?
-
(?:[^-]+)
$
@@ -33,3 +29,8 @@
d = match.groupdict()
self.xen_version = d['version']
+
+class PackageFieldList(_PackageFieldList):
+ def __init__(self, value=None):
+ if value:
+ super(self, PackageFieldList).__init__(value)
diff -Nru xen-4.1.4/debian/.pc/.quilt_patches xen-4.1.6.1/debian/.pc/.quilt_patches
--- xen-4.1.4/debian/.pc/.quilt_patches 2015-03-05 02:48:30.000000000 +1100
+++ xen-4.1.6.1/debian/.pc/.quilt_patches 1970-01-01 10:00:00.000000000 +1000
@@ -1 +0,0 @@
-patches
diff -Nru xen-4.1.4/debian/.pc/.quilt_series xen-4.1.6.1/debian/.pc/.quilt_series
--- xen-4.1.4/debian/.pc/.quilt_series 2015-03-05 02:48:30.000000000 +1100
+++ xen-4.1.6.1/debian/.pc/.quilt_series 1970-01-01 10:00:00.000000000 +1000
@@ -1 +0,0 @@
-series
diff -Nru xen-4.1.4/debian/.pc/.version xen-4.1.6.1/debian/.pc/.version
--- xen-4.1.4/debian/.pc/.version 2015-03-05 02:48:30.000000000 +1100
+++ xen-4.1.6.1/debian/.pc/.version 1970-01-01 10:00:00.000000000 +1000
@@ -1 +0,0 @@
-2
diff -Nru xen-4.1.4/debian/rules xen-4.1.6.1/debian/rules
--- xen-4.1.4/debian/rules 2012-07-01 23:27:28.000000000 +1000
+++ xen-4.1.6.1/debian/rules 2015-08-31 23:30:31.000000000 +1000
@@ -3,6 +3,11 @@
# Uncomment this to turn on verbose mode.
#export DH_VERBOSE=1
+# Ubuntu passes a default LDFLAGS value of -Wl,-Bsymbolic-functions
+# Xen passed LDFLAGS directly to ld (not through gcc), so this fails.
+# We should update this if the default LDFLAGS is changed.
+LDFLAGS = -Bsymbolic-functions
+
DEB_HOST_ARCH := $(shell dpkg-architecture -qDEB_HOST_ARCH)
DEB_BUILD_ARCH := $(shell dpkg-architecture -qDEB_BUILD_ARCH)
@@ -24,11 +29,11 @@
build: debian/control $(STAMPS_DIR)/build-base
$(STAMPS_DIR)/build-base: $(STAMPS_DIR)/setup-base
dh_testdir
- $(MAKE) -f debian/rules.gen build-arch_$(DEB_HOST_ARCH)
+ $(MAKE) -f debian/rules.gen build_$(DEB_HOST_ARCH)
@$(stamp)
maintainerclean:
- rm -f debian/control* debian/rules.gen debian/xen-hypervisor-* debian/xen-utils-[0-9]*
+ rm -f debian/control* debian/rules.gen debian/xen-hypervisor-* debian/xen-utils-*
rm -rf $(filter-out .svn debian, $(wildcard * .[^.]*))
clean: debian/control
diff -Nru xen-4.1.4/debian/rules.defs xen-4.1.6.1/debian/rules.defs
--- xen-4.1.4/debian/rules.defs 2012-11-20 04:08:44.000000000 +1100
+++ xen-4.1.6.1/debian/rules.defs 2015-08-31 23:30:31.000000000 +1000
@@ -1,4 +1,4 @@
-KERNELVERSION := 3.2.0-4
+KERNELVERSION := 3.1.0-1
BUILD_DIR = debian/build
STAMPS_DIR = debian/stamps
TEMPLATES_DIR = debian/templates
diff -Nru xen-4.1.4/debian/rules.gen xen-4.1.6.1/debian/rules.gen
--- xen-4.1.4/debian/rules.gen 2013-05-02 22:31:50.000000000 +1000
+++ xen-4.1.6.1/debian/rules.gen 2015-08-31 23:30:31.000000000 +1000
@@ -5,7 +5,6 @@
binary-arch_amd64_none_amd64:: binary-arch_amd64_none_amd64_real
binary-arch_amd64_none_amd64::
$(MAKE) -f debian/rules.real binary-arch-flavour ARCH='amd64' FEATURESET='none' FLAVOUR='amd64' VERSION='4.1' XEN_ARCH='x86_64'
- $(MAKE) -f debian/rules.real install-dummy DH_OPTIONS='-pxen-system-amd64' ARCH='amd64' FEATURESET='none' FLAVOUR='amd64' VERSION='4.1' XEN_ARCH='x86_64'
binary-arch_amd64_none_amd64_real:
binary-arch_amd64_none_real:
binary-arch_amd64_real::
@@ -15,43 +14,39 @@
binary-arch_i386_none_amd64:: binary-arch_i386_none_amd64_real
binary-arch_i386_none_amd64::
$(MAKE) -f debian/rules.real binary-arch-flavour ARCH='i386' FEATURESET='none' FLAVOUR='amd64' VERSION='4.1' XEN_ARCH='x86_64'
- $(MAKE) -f debian/rules.real install-dummy DH_OPTIONS='-pxen-system-amd64' ARCH='i386' FEATURESET='none' FLAVOUR='amd64' VERSION='4.1' XEN_ARCH='x86_64'
binary-arch_i386_none_amd64_real:
binary-arch_i386_none_i386:: binary-arch_i386_none_i386_real
binary-arch_i386_none_i386::
$(MAKE) -f debian/rules.real binary-arch-flavour ARCH='i386' FEATURESET='none' FLAVOUR='i386' VERSION='4.1' XEN_ARCH='x86_32'
- $(MAKE) -f debian/rules.real install-dummy DH_OPTIONS='-pxen-system-i386' ARCH='i386' FEATURESET='none' FLAVOUR='i386' VERSION='4.1' XEN_ARCH='x86_32'
binary-arch_i386_none_i386_real:
binary-arch_i386_none_real:
binary-arch_i386_real::
$(MAKE) -f debian/rules.real binary-arch-arch ARCH='i386' VERSION='4.1' XEN_ARCH='x86_32'
binary-indep::
$(MAKE) -f debian/rules.real binary-indep VERSION='4.1'
-build-arch: build-arch_amd64 build-arch_i386
-build-arch_amd64: build-arch_amd64_none build-arch_amd64_real
-build-arch_amd64_none: build-arch_amd64_none_amd64 build-arch_amd64_none_real
-build-arch_amd64_none_amd64:: build-arch_amd64_none_amd64_real
-build-arch_amd64_none_amd64::
+build: build_amd64 build_i386
+build_amd64: build_amd64_none build_amd64_real
+build_amd64_none: build_amd64_none_amd64 build_amd64_none_real
+build_amd64_none_amd64:: build_amd64_none_amd64_real
+build_amd64_none_amd64::
$(MAKE) -f debian/rules.real build-flavour ARCH='amd64' FEATURESET='none' FLAVOUR='amd64' VERSION='4.1' XEN_ARCH='x86_64'
-build-arch_amd64_none_amd64_real:
-build-arch_amd64_none_real:
-build-arch_amd64_real::
+build_amd64_none_amd64_real:
+build_amd64_none_real:
+build_amd64_real::
$(MAKE) -f debian/rules.real build-arch ARCH='amd64' VERSION='4.1' XEN_ARCH='x86_64'
-build-arch_i386: build-arch_i386_none build-arch_i386_real
-build-arch_i386_none: build-arch_i386_none_amd64 build-arch_i386_none_i386 build-arch_i386_none_real
-build-arch_i386_none_amd64:: build-arch_i386_none_amd64_real
-build-arch_i386_none_amd64::
+build_i386: build_i386_none build_i386_real
+build_i386_none: build_i386_none_amd64 build_i386_none_i386 build_i386_none_real
+build_i386_none_amd64:: build_i386_none_amd64_real
+build_i386_none_amd64::
$(MAKE) -f debian/rules.real build-flavour ARCH='i386' FEATURESET='none' FLAVOUR='amd64' VERSION='4.1' XEN_ARCH='x86_64'
-build-arch_i386_none_amd64_real:
-build-arch_i386_none_i386:: build-arch_i386_none_i386_real
-build-arch_i386_none_i386::
+build_i386_none_amd64_real:
+build_i386_none_i386:: build_i386_none_i386_real
+build_i386_none_i386::
$(MAKE) -f debian/rules.real build-flavour ARCH='i386' FEATURESET='none' FLAVOUR='i386' VERSION='4.1' XEN_ARCH='x86_32'
-build-arch_i386_none_i386_real:
-build-arch_i386_none_real:
-build-arch_i386_real::
+build_i386_none_i386_real:
+build_i386_none_real:
+build_i386_real::
$(MAKE) -f debian/rules.real build-arch ARCH='i386' VERSION='4.1' XEN_ARCH='x86_32'
-build-indep::
- $(MAKE) -f debian/rules.real build-indep VERSION='4.1'
setup: setup_amd64 setup_i386
setup_amd64: setup_amd64_none setup_amd64_real
setup_amd64_none: setup_amd64_none_amd64 setup_amd64_none_real
@@ -75,3 +70,18 @@
setup_i386_none_real:
setup_i386_real::
$(MAKE) -f debian/rules.real setup-arch ARCH='i386' VERSION='4.1' XEN_ARCH='x86_32'
+source: source_amd64 source_i386
+source_amd64: source_amd64_none source_amd64_real
+source_amd64_none: source_amd64_none_amd64 source_amd64_none_real
+source_amd64_none_amd64: source_amd64_none_amd64_real
+source_amd64_none_amd64_real:
+source_amd64_none_real:
+source_amd64_real:
+source_i386: source_i386_none source_i386_real
+source_i386_none: source_i386_none_amd64 source_i386_none_i386 source_i386_none_real
+source_i386_none_amd64: source_i386_none_amd64_real
+source_i386_none_amd64_real:
+source_i386_none_i386: source_i386_none_i386_real
+source_i386_none_i386_real:
+source_i386_none_real:
+source_i386_real:
diff -Nru xen-4.1.4/debian/rules.real xen-4.1.6.1/debian/rules.real
--- xen-4.1.4/debian/rules.real 2012-07-27 20:29:06.000000000 +1000
+++ xen-4.1.6.1/debian/rules.real 2015-08-31 23:30:31.000000000 +1000
@@ -25,7 +25,6 @@
binary-arch-flavour: install-hypervisor_$(ARCH)_$(FLAVOUR)
binary-indep: install-docs
-binary-indep: install-utils-common
build-arch: $(STAMPS_DIR)/build-utils_$(ARCH)
build-flavour: $(STAMPS_DIR)/build-hypervisor_$(ARCH)_$(FLAVOUR)
@@ -94,22 +93,9 @@
strip --remove-section=.comment --remove-section=.note $(INSTALL_DIR)/usr/lib/xen*/boot/*
touch $@
-$(STAMPS_DIR)/install-utils-common: DIR = $(BUILD_DIR)/build-docs
-$(STAMPS_DIR)/install-utils-common: INSTALL_DIR = $(BUILD_DIR)/install-utils-common
-$(STAMPS_DIR)/install-utils-common: export DESTDIR = $(CURDIR)/$(INSTALL_DIR)
-$(STAMPS_DIR)/install-utils-common: $(STAMPS_DIR)/build-docs
- @rm -rf $(INSTALL_DIR)
- +$(MAKE_CLEAN) -C $(SOURCE_DIR)/tools/examples install-configs
- +$(MAKE_CLEAN) -C $(SOURCE_DIR)/tools/hotplug/common install-scripts
- +$(MAKE_CLEAN) -C $(SOURCE_DIR)/tools/hotplug/Linux install-udev install-scripts UDEV_RULES_DIR=/lib/udev
- +$(MAKE_CLEAN) -C debian/scripts install
- touch $@
-
install-base:
dh_installchangelogs -XChangelog
- dh_installdirs
dh_installdocs
- dh_installexamples
dh_compress
dh_fixperms
dh_installdeb
@@ -117,12 +103,6 @@
dh_md5sums
dh_builddeb
-install-dummy:
- dh_testdir
- dh_testroot
- dh_prep
- +$(MAKE_SELF) install-base
-
install-docs: SOURCE_DIR = $(BUILD_DIR)/build-docs
install-docs: DIR = $(BUILD_DIR)/install-docs
install-docs: PACKAGE_NAME = xen-docs-$(VERSION)
@@ -227,30 +207,12 @@
install -D -m644 debian/xen-utils.README.Debian $(PACKAGE_DIR)/usr/share/doc/$(PACKAGE_NAME)/README.Debian
install -D -m644 debian/xen-utils-$(VERSION).lintian-overrides $(PACKAGE_DIR)/usr/share/lintian/overrides/$(PACKAGE_NAME)
dh_install --sourcedir=$(DIR) usr/lib/xen-$(VERSION)
- ( echo -n "misc:Built-Using="; dpkg-query -f='$${source:Package} (= $${source:Version}), ' -W ipxe-qemu; echo ) >> debian/$(PACKAGE_NAME).substvars
dh_python2 -V$(shell pyversions -rv) /usr/lib/xen-$(VERSION)
dh_strip
dh_makeshlibs -V
dh_shlibdeps
+$(MAKE_SELF) install-base
-install-utils-common: SOURCE_DIR = $(BUILD_DIR)/build-docs
-install-utils-common: DIR = $(BUILD_DIR)/install-utils-common
-install-utils-common: PACKAGE_NAME = xen-utils-common
-install-utils-common: DH_OPTIONS = -p$(PACKAGE_NAME)
-install-utils-common: $(STAMPS_DIR)/install-utils-common
- dh_testdir
- dh_testroot
- dh_prep
- dh_install -X .svn --sourcedir=$(DIR)
- dh_installinit --name xen -- defaults 20 21
- dh_installinit --name xend
- dh_installinit --name xendomains --no-start -- defaults 21 20
- dh_installman $(SOURCE_DIR)/docs/man1/* $(SOURCE_DIR)/docs/man5/*
- dh_link
- dh_ucf
- +$(MAKE_SELF) install-base
-
install-xenstore-utils_$(ARCH): DIR = $(BUILD_DIR)/install-utils_$(ARCH)
install-xenstore-utils_$(ARCH): PACKAGE_NAME = xenstore-utils
install-xenstore-utils_$(ARCH): DH_OPTIONS = -p$(PACKAGE_NAME)
diff -Nru xen-4.1.4/debian/scripts/Makefile xen-4.1.6.1/debian/scripts/Makefile
--- xen-4.1.4/debian/scripts/Makefile 2012-04-23 05:21:25.000000000 +1000
+++ xen-4.1.6.1/debian/scripts/Makefile 1970-01-01 10:00:00.000000000 +1000
@@ -1,53 +0,0 @@
-ETC_SCRIPTS = \
- qemu-ifup
-
-GLOBAL_SCRIPTS = \
- xen
-
-GLOBAL_TOOLSTACK_LINKS = \
- xl \
- xm
-
-GLOBAL_TOOLSTACK_WRAPPER = xen-toolstack-wrapper
-
-GLOBAL_UTILS_LINKS = \
- cpuperf-perfcntr \
- cpuperf-xen \
- xenperf \
- xenpm \
- xentop \
- xentrace \
- xentrace_format \
- xentrace_setmask \
- xentrace_setsize
-
-GLOBAL_UTILS_WRAPPER = xen-utils-wrapper
-
-PRIVATE_SCRIPTS = \
- xen-dir \
- xen-init-list \
- xen-toolstack \
- xen-version \
- $(GLOBAL_TOOLSTACK_WRAPPER) \
- $(GLOBAL_UTILS_WRAPPER)
-
-ETC_SCRIPTS_DIR = /etc/xen/scripts
-GLOBAL_SCRIPTS_DIR = /usr/sbin
-PRIVATE_SCRIPTS_DIR = /usr/lib/xen-common/bin
-
-install:
- install -d $(DESTDIR)$(ETC_SCRIPTS_DIR)
- install $(ETC_SCRIPTS) $(DESTDIR)$(ETC_SCRIPTS_DIR)
- install -d $(DESTDIR)$(GLOBAL_SCRIPTS_DIR)
- install $(GLOBAL_SCRIPTS) $(DESTDIR)$(GLOBAL_SCRIPTS_DIR)
- @for i in $(GLOBAL_TOOLSTACK_LINKS); do \
- echo ln -s $(PRIVATE_SCRIPTS_DIR)/$(GLOBAL_TOOLSTACK_WRAPPER) $(DESTDIR)$(GLOBAL_SCRIPTS_DIR)/$$i; \
- ln -s $(PRIVATE_SCRIPTS_DIR)/$(GLOBAL_TOOLSTACK_WRAPPER) $(DESTDIR)$(GLOBAL_SCRIPTS_DIR)/$$i || exit 1; \
- done
- @for i in $(GLOBAL_UTILS_LINKS); do \
- echo ln -s $(PRIVATE_SCRIPTS_DIR)/$(GLOBAL_UTILS_WRAPPER) $(DESTDIR)$(GLOBAL_SCRIPTS_DIR)/$$i; \
- ln -s $(PRIVATE_SCRIPTS_DIR)/$(GLOBAL_UTILS_WRAPPER) $(DESTDIR)$(GLOBAL_SCRIPTS_DIR)/$$i || exit 1; \
- done
- install -d $(DESTDIR)$(PRIVATE_SCRIPTS_DIR)
- install $(PRIVATE_SCRIPTS) $(DESTDIR)$(PRIVATE_SCRIPTS_DIR)
-
diff -Nru xen-4.1.4/debian/scripts/qemu-ifup xen-4.1.6.1/debian/scripts/qemu-ifup
--- xen-4.1.4/debian/scripts/qemu-ifup 2012-07-13 09:28:23.000000000 +1000
+++ xen-4.1.6.1/debian/scripts/qemu-ifup 1970-01-01 10:00:00.000000000 +1000
@@ -1,13 +0,0 @@
-#!/bin/sh
-
-echo -c 'config qemu network with xen bridge for '
-echo $*
-
-# Initialise a dummy MAC address. We choose the numerically
-# largest non-broadcast address to prevent the address getting
-# stolen by an Ethernet bridge for STP purposes.
-# (FE:FF:FF:FF:FF:FF)
-ip link set $1 address fe:ff:ff:ff:ff:ff || true
-
-ifconfig $1 0.0.0.0 up
-brctl addif $2 $1
diff -Nru xen-4.1.4/debian/scripts/xen xen-4.1.6.1/debian/scripts/xen
--- xen-4.1.4/debian/scripts/xen 2011-10-27 09:54:29.000000000 +1100
+++ xen-4.1.6.1/debian/scripts/xen 1970-01-01 10:00:00.000000000 +1000
@@ -1,6 +0,0 @@
-#!/bin/sh -e
-
-COMMAND="$(basename $0)"
-TOOLSTACK=$(. /usr/lib/xen-common/bin/xen-toolstack); RET=$?; [ $RET -eq 0 ] || exit $RET
-
-exec "$TOOLSTACK" "$@"
diff -Nru xen-4.1.4/debian/scripts/xen-dir xen-4.1.6.1/debian/scripts/xen-dir
--- xen-4.1.4/debian/scripts/xen-dir 2012-06-18 07:53:54.000000000 +1000
+++ xen-4.1.6.1/debian/scripts/xen-dir 1970-01-01 10:00:00.000000000 +1000
@@ -1,10 +0,0 @@
-#!/bin/sh -e
-
-VERSION=$(. /usr/lib/xen-common/bin/xen-version); RET=$?; [ $RET -eq 0 ] || exit $RET
-
-if [ -d "/usr/lib/xen-$VERSION" ]; then
- echo "/usr/lib/xen-$VERSION"
-else
- echo "ERROR: Can't find version $VERSION of xen utils, bailing out!" >&2
- exit 127
-fi
diff -Nru xen-4.1.4/debian/scripts/xen-init-list xen-4.1.6.1/debian/scripts/xen-init-list
--- xen-4.1.4/debian/scripts/xen-init-list 2012-04-23 08:47:00.000000000 +1000
+++ xen-4.1.6.1/debian/scripts/xen-init-list 1970-01-01 10:00:00.000000000 +1000
@@ -1,46 +0,0 @@
-#!/usr/bin/python
-
-import re
-import subprocess
-
-
-class SXPParser(object):
- tokenizer_rules = r""" (?P<open> \( ) | (?P<close> \) ) | (?P<whitespace> \s+ ) | [^()^\s]+ """
- tokenizer_re = re.compile(tokenizer_rules, re.X)
-
- def __init__(self):
- self.stack = []
- self.data = []
-
- def __call__(self, input):
- for match in self.tokenizer_re.finditer(input):
- if match.group('open'):
- self.stack.append([])
- elif match.group('close'):
- top = self.stack.pop()
- if self.stack:
- self.stack[-1].append(top)
- else:
- self.data.append(top)
- elif match.group('whitespace'):
- pass
- else:
- if self.stack:
- self.stack[-1].append(match.group())
- return self.data
-
-
-if __name__ == '__main__':
- p = subprocess.check_output(('xen', 'list', '-l'))
- s = SXPParser()(p)
- for i in s:
- if i and i[0] == 'domain':
- try:
- data = dict(j for j in i if len(j) == 2)
- domid = int(data['domid'])
- name = data['name']
- if domid == 0:
- continue
- print domid, name
- except (KeyError, ValueError) as e:
- pass
diff -Nru xen-4.1.4/debian/scripts/xen-toolstack xen-4.1.6.1/debian/scripts/xen-toolstack
--- xen-4.1.4/debian/scripts/xen-toolstack 2012-06-14 22:10:04.000000000 +1000
+++ xen-4.1.6.1/debian/scripts/xen-toolstack 1970-01-01 10:00:00.000000000 +1000
@@ -1,42 +0,0 @@
-#!/bin/sh -e
-
-configfile=/etc/default/xen
-
-dir=$(. /usr/lib/xen-common/bin/xen-dir); ret=$?; [ $ret -eq 0 ] || exit $ret
-
-check() {
- local PATH
- if [ "$1" = xm ] || [ "$1" = xl ]; then
- PATH="$dir/bin"
- else
- PATH="$dir/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin"
- fi
- command -v "$1" || :
-}
-
-if [ -e $configfile ]; then
- . $configfile || true
-fi
-
-if [ "$TOOLSTACK" ]; then
- cmd=$(check "$TOOLSTACK")
- if [ "$cmd" ]; then
- echo "$cmd"
- else
- echo "WARING: Can't find toolstack $TOOLSTACK, fallback to default!" >&2
- TOOLSTACK=
- fi
-fi
-
-if [ -z "$TOOLSTACK" ]; then
- cmd_xm=$(check xm)
- cmd_xl=$(check xl)
- if [ "$cmd_xm" ]; then
- echo "$cmd_xm"
- elif [ "$cmd_xl" ]; then
- echo "$cmd_xl"
- else
- echo "ERROR: Toolstack not specifed and nothing detected, bailing out!" >&2
- exit 127
- fi
-fi
diff -Nru xen-4.1.4/debian/scripts/xen-toolstack-wrapper xen-4.1.6.1/debian/scripts/xen-toolstack-wrapper
--- xen-4.1.4/debian/scripts/xen-toolstack-wrapper 2011-10-27 10:11:27.000000000 +1100
+++ xen-4.1.6.1/debian/scripts/xen-toolstack-wrapper 1970-01-01 10:00:00.000000000 +1000
@@ -1,11 +0,0 @@
-#!/bin/sh -e
-
-COMMAND="$(basename $0)"
-TOOLSTACK=$(. /usr/lib/xen-common/bin/xen-toolstack); RET=$?; [ $RET -eq 0 ] || exit $RET
-
-if [ "$(basename "$TOOLSTACK")" != "$COMMAND" ]; then
- echo "ERROR: A different toolstack ($(basename "$TOOLSTACK")) have been selected!" >&2
- exit 1
-fi
-
-exec "$TOOLSTACK" "$@"
diff -Nru xen-4.1.4/debian/scripts/xen-utils-wrapper xen-4.1.6.1/debian/scripts/xen-utils-wrapper
--- xen-4.1.4/debian/scripts/xen-utils-wrapper 2011-10-27 09:26:36.000000000 +1100
+++ xen-4.1.6.1/debian/scripts/xen-utils-wrapper 1970-01-01 10:00:00.000000000 +1000
@@ -1,6 +0,0 @@
-#!/bin/sh -e
-
-COMMAND="$(basename $0)"
-DIR=$(/usr/lib/xen-common/bin/xen-dir)
-
-exec "$DIR/bin/$COMMAND" "$@"
diff -Nru xen-4.1.4/debian/scripts/xen-version xen-4.1.6.1/debian/scripts/xen-version
--- xen-4.1.4/debian/scripts/xen-version 2012-07-01 23:29:30.000000000 +1000
+++ xen-4.1.6.1/debian/scripts/xen-version 1970-01-01 10:00:00.000000000 +1000
@@ -1,31 +0,0 @@
-#!/bin/sh -e
-
-error() {
- echo "ERROR: " "$@" >&2
- exit 1
-}
-
-if [ -e "/sys/hypervisor/type" ]; then
- type="$(cat /sys/hypervisor/type)"
- if [ "$type" = xen ]; then
- DIR=/sys/hypervisor/version
- VERSION_EXTRA="$(cat $DIR/extra)"
- if [ "$VERSION_EXTRA" = "-unstable" ]; then
- # Old xen-unstable
- VERSION=unstable
- elif [ "$VERSION_EXTRA" != "${VERSION_EXTRA#-}" ]; then
- # ABI for Lenny and smaller
- VERSION="$(cat $DIR/major).$(cat $DIR/minor)$VERSION_EXTRA"
- else
- VERSION="$(cat $DIR/major).$(cat $DIR/minor)"
- fi
- elif [ -z "$type" ]; then
- error "Can't read hypervisor type from sysfs!"
- else
- error "Hypervisor is not xen but '$type'!"
- fi
-else
- error "Can't find hypervisor information in sysfs!"
-fi
-
-echo "$VERSION"
diff -Nru xen-4.1.4/debian/templates/control.main.in xen-4.1.6.1/debian/templates/control.main.in
--- xen-4.1.4/debian/templates/control.main.in 2012-04-23 07:55:35.000000000 +1000
+++ xen-4.1.6.1/debian/templates/control.main.in 2015-08-31 23:30:31.000000000 +1000
@@ -49,10 +49,3 @@
This package contains the ocaml findlib packages for compiling applications
that are designed to control the Xen hypervisor.
-Package: xen-utils-common
-Architecture: all
-Depends: gawk, lsb-base, python, udev, xenstore-utils, ${misc:Depends}
-Description: Xen administrative tools - common files
- The userspace tools to manage a system virtualized through the Xen virtual
- machine monitor.
-
diff -Nru xen-4.1.4/debian/templates/control.source.in xen-4.1.6.1/debian/templates/control.source.in
--- xen-4.1.4/debian/templates/control.source.in 2012-07-14 22:21:44.000000000 +1000
+++ xen-4.1.6.1/debian/templates/control.source.in 2015-08-31 23:30:31.000000000 +1000
@@ -3,15 +3,13 @@
Maintainer: Debian Xen Team <pkg-xen-devel@lists.alioth.debian.org>
Uploaders: Guido Trotter <ultrotter@debian.org>, Bastian Blank <waldi@debian.org>
Build-Depends:
- debhelper (>> 7),
- dpkg-dev (>= 1.16.0~),
- lsb-release,
+ debhelper (>> 7), lsb-release,
python-dev,
bcc,
gcc-multilib,
e2fslibs-dev,
iasl,
- ipxe-qemu,
+ ipxe,
libaio-dev,
libgnutls-dev,
liblzma-dev,
diff -Nru xen-4.1.4/debian/templates/control.system.latest.in xen-4.1.6.1/debian/templates/control.system.latest.in
--- xen-4.1.4/debian/templates/control.system.latest.in 2012-07-28 18:16:22.000000000 +1000
+++ xen-4.1.6.1/debian/templates/control.system.latest.in 1970-01-01 10:00:00.000000000 +1000
@@ -1,8 +0,0 @@
-Package: xen-system@localversion@
-Depends: xen-hypervisor-@version@@localversion@, xen-utils-@version@, ${misc:Depends}
-Provides: xen-system
-Description: Xen System on @class@ (meta-package)
- This package depends on the latest Xen hypervisor for use on @class@ and the Xen utils.
- .
- @desc@
-
diff -Nru xen-4.1.4/debian/templates/control.utils.in xen-4.1.6.1/debian/templates/control.utils.in
--- xen-4.1.4/debian/templates/control.utils.in 2012-07-27 20:32:22.000000000 +1000
+++ xen-4.1.6.1/debian/templates/control.utils.in 2015-08-31 23:30:31.000000000 +1000
@@ -1,9 +1,8 @@
Package: xen-utils-@version@
-Depends: ${shlibs:Depends}, ${misc:Depends}, ${python:Depends}, xen-utils-common (>= ${source:Version})
+Depends: ${shlibs:Depends}, ${misc:Depends}, ${python:Depends}, xen-utils-common (>= 3.4.2-4)
Recommends: bridge-utils, libc6-xen [i386], xen-hypervisor-@version@, qemu-keymaps, qemu-utils
Provides: xen-utils
Suggests: xen-docs-@version@
-Built-Using: ${misc:Built-Using}
Description: XEN administrative tools
The userspace tools to manage a system virtualized through the XEN virtual
machine monitor.
diff -Nru xen-4.1.4/debian/templates/xen-utils.postinst.in xen-4.1.6.1/debian/templates/xen-utils.postinst.in
--- xen-4.1.4/debian/templates/xen-utils.postinst.in 2012-06-18 07:54:50.000000000 +1000
+++ xen-4.1.6.1/debian/templates/xen-utils.postinst.in 2015-08-31 23:30:31.000000000 +1000
@@ -4,9 +4,9 @@
case "$1" in
configure)
- update-alternatives --remove xen-default /usr/lib/xen-@version@
- if [ -x "/etc/init.d/xen" ]; then
- invoke-rc.d xen start || exit $?
+ update-alternatives --install /usr/lib/xen-default xen-default /usr/lib/xen-@version@ 1 || true
+ if [ -x "/etc/init.d/xend" ]; then
+ invoke-rc.d xend start || exit $?
fi
;;
diff -Nru xen-4.1.4/debian/templates/xen-utils.prerm.in xen-4.1.6.1/debian/templates/xen-utils.prerm.in
--- xen-4.1.4/debian/templates/xen-utils.prerm.in 2012-06-18 07:54:50.000000000 +1000
+++ xen-4.1.6.1/debian/templates/xen-utils.prerm.in 2015-08-31 23:30:31.000000000 +1000
@@ -3,10 +3,16 @@
set -e
case "$1" in
- remove|upgrade)
+ remove)
update-alternatives --remove xen-default /usr/lib/xen-@version@
- if [ -x "/etc/init.d/xen" ]; then
- invoke-rc.d xen stop || exit $?
+ if [ -x "/etc/init.d/xend" ]; then
+ invoke-rc.d xend stop || exit $?
+ fi
+ ;;
+
+ upgrade)
+ if [ -x "/etc/init.d/xend" ]; then
+ invoke-rc.d xend stop || exit $?
fi
;;
diff -Nru xen-4.1.4/debian/tree/xen-utils-common/usr/share/xen-utils-common/default.xen xen-4.1.6.1/debian/tree/xen-utils-common/usr/share/xen-utils-common/default.xen
--- xen-4.1.4/debian/tree/xen-utils-common/usr/share/xen-utils-common/default.xen 2012-04-14 21:57:42.000000000 +1000
+++ xen-4.1.6.1/debian/tree/xen-utils-common/usr/share/xen-utils-common/default.xen 1970-01-01 10:00:00.000000000 +1000
@@ -1,7 +0,0 @@
-# Configuration for Xen system
-# ----------------------------
-
-# There exists several tool stacks to configure a Xen system.
-# …
-# Attention: You need to reboot after changing this!
-TOOLSTACK=
diff -Nru xen-4.1.4/debian/xen-utils-4.1.postinst xen-4.1.6.1/debian/xen-utils-4.1.postinst
--- xen-4.1.4/debian/xen-utils-4.1.postinst 2013-05-02 22:31:50.000000000 +1000
+++ xen-4.1.6.1/debian/xen-utils-4.1.postinst 2015-08-31 23:30:31.000000000 +1000
@@ -4,9 +4,9 @@
case "$1" in
configure)
- update-alternatives --remove xen-default /usr/lib/xen-4.1
- if [ -x "/etc/init.d/xen" ]; then
- invoke-rc.d xen start || exit $?
+ update-alternatives --install /usr/lib/xen-default xen-default /usr/lib/xen-4.1 1 || true
+ if [ -x "/etc/init.d/xend" ]; then
+ invoke-rc.d xend start || exit $?
fi
;;
diff -Nru xen-4.1.4/debian/xen-utils-4.1.prerm xen-4.1.6.1/debian/xen-utils-4.1.prerm
--- xen-4.1.4/debian/xen-utils-4.1.prerm 2013-05-02 22:31:50.000000000 +1000
+++ xen-4.1.6.1/debian/xen-utils-4.1.prerm 2015-08-31 23:30:31.000000000 +1000
@@ -3,10 +3,16 @@
set -e
case "$1" in
- remove|upgrade)
+ remove)
update-alternatives --remove xen-default /usr/lib/xen-4.1
- if [ -x "/etc/init.d/xen" ]; then
- invoke-rc.d xen stop || exit $?
+ if [ -x "/etc/init.d/xend" ]; then
+ invoke-rc.d xend stop || exit $?
+ fi
+ ;;
+
+ upgrade)
+ if [ -x "/etc/init.d/xend" ]; then
+ invoke-rc.d xend stop || exit $?
fi
;;
diff -Nru xen-4.1.4/debian/xen-utils-common.dirs xen-4.1.6.1/debian/xen-utils-common.dirs
--- xen-4.1.4/debian/xen-utils-common.dirs 2012-02-02 05:25:56.000000000 +1100
+++ xen-4.1.6.1/debian/xen-utils-common.dirs 1970-01-01 10:00:00.000000000 +1000
@@ -1 +0,0 @@
-var/lib/xen
diff -Nru xen-4.1.4/debian/xen-utils-common.examples xen-4.1.6.1/debian/xen-utils-common.examples
--- xen-4.1.4/debian/xen-utils-common.examples 2012-02-01 00:09:30.000000000 +1100
+++ xen-4.1.6.1/debian/xen-utils-common.examples 1970-01-01 10:00:00.000000000 +1000
@@ -1,2 +0,0 @@
-debian/tmp/etc/xen/cpupool*
-debian/tmp/etc/xen/xm*
diff -Nru xen-4.1.4/debian/xen-utils-common.install xen-4.1.6.1/debian/xen-utils-common.install
--- xen-4.1.4/debian/xen-utils-common.install 2012-04-14 21:57:42.000000000 +1000
+++ xen-4.1.6.1/debian/xen-utils-common.install 1970-01-01 10:00:00.000000000 +1000
@@ -1,7 +0,0 @@
-etc/xen/scripts
-etc/xen/xl*
-etc/xen/xend*
-lib/udev/rules.d/*.rules
-usr/lib/xen-common
-usr/sbin
-../../tree/xen-utils-common/* /
diff -Nru xen-4.1.4/debian/xen-utils-common.postinst xen-4.1.6.1/debian/xen-utils-common.postinst
--- xen-4.1.4/debian/xen-utils-common.postinst 2012-04-14 22:25:29.000000000 +1000
+++ xen-4.1.6.1/debian/xen-utils-common.postinst 1970-01-01 10:00:00.000000000 +1000
@@ -1,23 +0,0 @@
-#!/bin/sh
-
-set -e
-
-case "$1" in
-configure)
- install -d -m 2750 -g adm /var/log/xen
- ;;
-
-abort-upgrade|abort-remove|abort-deconfigure)
- ;;
-
-*)
- echo "postinst called with unknown argument \`$1'" >&2
- exit 1
- ;;
-esac
-
-dpkg-maintscript-helper mv_conffile /etc/init.d/xend /etc/init.d/xen 4.1.2-4~ -- "$@"
-
-#DEBHELPER#
-
-exit 0
diff -Nru xen-4.1.4/debian/xen-utils-common.postrm xen-4.1.6.1/debian/xen-utils-common.postrm
--- xen-4.1.4/debian/xen-utils-common.postrm 2012-05-22 18:25:12.000000000 +1000
+++ xen-4.1.6.1/debian/xen-utils-common.postrm 1970-01-01 10:00:00.000000000 +1000
@@ -1,23 +0,0 @@
-#!/bin/sh
-
-set -e
-
-case "$1" in
-purge)
- rmdir --ignore-fail-on-non-empty /var/log/xen
- ;;
-
-remove|upgrade|failed-upgrade|abort-install|abort-upgrade|disappear)
- ;;
-
-*)
- echo "postrm called with unknown argument \`$1'" >&2
- exit
- ;;
-esac
-
-dpkg-maintscript-helper mv_conffile /etc/init.d/xend /etc/init.d/xen 4.1.2-4~ -- "$@"
-
-#DEBHELPER#
-
-exit 0
diff -Nru xen-4.1.4/debian/xen-utils-common.preinst xen-4.1.6.1/debian/xen-utils-common.preinst
--- xen-4.1.4/debian/xen-utils-common.preinst 2012-04-19 18:54:54.000000000 +1000
+++ xen-4.1.6.1/debian/xen-utils-common.preinst 1970-01-01 10:00:00.000000000 +1000
@@ -1,23 +0,0 @@
-#!/bin/sh
-
-set -e
-
-case "$1" in
-install|upgrade)
- ;;
-
-abort-upgrade)
- ;;
-
-*)
- echo "preinst called with unknown argument \`$1'" >&2
- exit 1
- ;;
-esac
-
-dpkg-maintscript-helper mv_conffile /etc/init.d/xend /etc/init.d/xen 4.1.2-4~ -- "$@"
-update-rc.d -f xend remove >/dev/null
-
-#DEBHELPER#
-
-exit 0
diff -Nru xen-4.1.4/debian/xen-utils-common.README.Debian xen-4.1.6.1/debian/xen-utils-common.README.Debian
--- xen-4.1.4/debian/xen-utils-common.README.Debian 2012-05-07 00:11:29.000000000 +1000
+++ xen-4.1.6.1/debian/xen-utils-common.README.Debian 1970-01-01 10:00:00.000000000 +1000
@@ -1,29 +0,0 @@
-Xen for Debian
-==============
-
-Config behaviour
-----------------
-
-The Debian packages changes the behaviour of some config options.
-
-The options "kernel", "initrd" and "loader" searches in the Xen private boot
-directory (/usr/lib/xen-$version/boot) first. "bootloader" and "device_model"
-also searches the Xen private bin directory (/usr/lib/xen-$version/bin). This
-means that the following entries will properly find anything:
- loader = 'hvmloader'
- bootloader = 'pygrub'
-
-Network setup
--------------
-
-The Debian package of Xen don't change the network setup in any way. This
-differs from the upstream version, which overwrites the main network card
-(eth0) with a bridge setup and may break the network at this point..
-
-To setup a bridge please follow the instructions in the manpage for
-bridge-utils-interfaces(5).
-
-You can also change the /etc/xen/xend-config.sxp file and re-enable the Xen
-included network setup by adding
- (network-script network-bridge)
-to the file. But please note that this may or may not work.
diff -Nru xen-4.1.4/debian/xen-utils-common.ucf xen-4.1.6.1/debian/xen-utils-common.ucf
--- xen-4.1.4/debian/xen-utils-common.ucf 2012-05-19 00:51:16.000000000 +1000
+++ xen-4.1.6.1/debian/xen-utils-common.ucf 1970-01-01 10:00:00.000000000 +1000
@@ -1 +0,0 @@
-/usr/share/xen-utils-common/default.xen /etc/default/xen
diff -Nru xen-4.1.4/debian/xen-utils-common.xend.default xen-4.1.6.1/debian/xen-utils-common.xend.default
--- xen-4.1.4/debian/xen-utils-common.xend.default 2012-02-01 00:09:30.000000000 +1100
+++ xen-4.1.6.1/debian/xen-utils-common.xend.default 1970-01-01 10:00:00.000000000 +1000
@@ -1,2 +0,0 @@
-XENCONSOLED_ARGS=
-XENSTORED_ARGS=
diff -Nru xen-4.1.4/debian/xen-utils-common.xendomains.default xen-4.1.6.1/debian/xen-utils-common.xendomains.default
--- xen-4.1.4/debian/xen-utils-common.xendomains.default 2012-05-07 03:45:09.000000000 +1000
+++ xen-4.1.6.1/debian/xen-utils-common.xendomains.default 1970-01-01 10:00:00.000000000 +1000
@@ -1,60 +0,0 @@
-# The xendomains script can send SysRq requests to domains on shutdown.
-# If you don't want to MIGRATE, SAVE, or SHUTDOWN, this may be a possibility
-# to do a quick and dirty shutdown ("s e i u o") or at least sync the disks
-# of the domains ("s").
-#
-# XENDOMAINS_SYSRQ=
-
-# Set this to a non-empty string if you want to migrate virtual machines
-# on shutdown. The string will be passed to the xm migrate DOMID command
-# as is: It should contain the target IP address of the physical machine
-# to migrate to and optionally parameters like --live. Leave empty if
-# you don't want to try virtual machine relocation on shutdown.
-# If migration succeeds, neither SAVE nor SHUTDOWN will be executed for
-# that domain.
-#
-# XENDOMAINS_MIGRATE=
-
-# Directory to save running domains to when the system (dom0) is
-# shut down. Will also be used to restore domains from if # XENDOMAINS_RESTORE
-# is set (see below). Leave empty to disable domain saving on shutdown
-# (e.g. because you rather shut domains down).
-# If domain saving does succeed, SHUTDOWN will not be executed.
-#
-XENDOMAINS_SAVE=/var/lib/xen/save
-
-# This variable determines whether saved domains from XENDOMAINS_SAVE
-# will be restored on system startup.
-#
-XENDOMAINS_RESTORE=true
-
-# This variable sets the directory where domains configurations
-# are stored that should be started on system startup automatically.
-# Leave empty if you don't want to start domains automatically
-# (or just don't place any xen domain config files in that dir).
-# Note that the script tries to be clever if both RESTORE and AUTO are
-# set: It will first restore saved domains and then only start domains
-# in AUTO which are not running yet.
-# Note that the name matching is somewhat fuzzy.
-#
-XENDOMAINS_AUTO=/etc/xen/auto
-
-# On xendomains stop, a number of xm commands (xm migrate, save, shutdown,
-# shutdown --all) may be executed. In the worst case, these commands may
-# stall forever, which will prevent a successful shutdown of the machine.
-# If this variable is non-zero, the script will set up a watchdog timer
-# for every of these xm commands and time it out after the number of seconds
-# specified by this variable.
-# Note that SHUTDOWN_ALL will not be called if no virtual machines or only
-# zombies are still running, so you don't need to enable this timeout just
-# for the zombie case.
-# The setting should be large enough to make sure that migrate/save/shutdown
-# can succeed. If you do live migrations, keep in mind that live migration
-# of a 1GB machine over Gigabit ethernet may actually take something like
-# 100s (assuming that live migration uses 10% of the network # bandwidth).
-# Depending on the virtual machine, a shutdown may also require a significant
-# amount of time. So better setup this variable to a huge number and hope the
-# watchdog never fires.
-#
-XENDOMAINS_STOP_MAXWAIT=300
-
diff -Nru xen-4.1.4/debian/xen-utils-common.xendomains.init xen-4.1.6.1/debian/xen-utils-common.xendomains.init
--- xen-4.1.4/debian/xen-utils-common.xendomains.init 2012-09-18 21:16:06.000000000 +1000
+++ xen-4.1.6.1/debian/xen-utils-common.xendomains.init 1970-01-01 10:00:00.000000000 +1000
@@ -1,228 +0,0 @@
-#!/bin/bash
-### BEGIN INIT INFO
-# Provides: xendomains
-# Required-Start: $syslog $remote_fs xen
-# Required-Stop: $syslog $remote_fs xen
-# Should-Start: drbd iscsi openvswitch-switch
-# Should-Stop: drbd iscsi openvswitch-switch
-# X-Start-Before: corosync heartbeat
-# X-Stop-After: corosync heartbeat
-# Default-Start: 2 3 4 5
-# Default-Stop: 0 1 6
-# Short-Description: Start/stop secondary xen domains
-# Description: Start / stop domains automatically when domain 0
-# boots / shuts down.
-### END INIT INFO
-
-. /lib/init/vars.sh
-. /lib/lsb/init-functions
-
-xen list &> /dev/null
-if test $? -ne 0
-then
- exit 0;
-fi
-
-TOOLSTACK=$(/usr/lib/xen-common/bin/xen-toolstack 2>/dev/null)
-if [ $? -ne 0 ]; then
- log_warning_msg "No usable Xen toolstack selected"
- exit 0
-fi
-if [ "$(basename "$TOOLSTACK")" != xm ] && [ "$(basename "$TOOLSTACK")" != xl ]; then
- exit 0
-fi
-
-if ! [ -e /proc/xen/privcmd ]; then
- exit 0
-fi
-
-[ -r /etc/default/xendomains ] && . /etc/default/xendomains
-
-shopt -s nullglob
-
-check_config_name()
-{
- xen create --quiet --dryrun --defconfig "$1" | sed -n 's/^.*(name \(.*\))$/\1/p'
-}
-
-check_running()
-{
- xen domid "$1" > /dev/null 2>&1
- return $?
-}
-
-timeout_coproc()
-{
- local TIMEOUT=$1
- shift
-
- coproc "$@" 2>&1 1>/dev/null
-
- local COPROC_OUT
- exec {COPROC_OUT}<&"${COPROC[0]}"
- local PID="$COPROC_PID"
-
- for no in $(seq 0 $TIMEOUT); do
- if [ -z "$COPROC_PID" ]; then break; fi
- sleep 1
- log_action_cont_msg
- done
-
- kill -INT "$COPROC_PID" >/dev/null 2>&1
- wait $PID
- local rc=$?
- log_action_end_msg $rc
-
- [ $rc -gt 0 ] && cat <&$COPROC_OUT
- exec <&$COPROC_OUT-
-}
-
-timeout_domain()
-{
- name="$1"
- TIMEOUT="$2"
- for no in $(seq 0 $TIMEOUT); do
- if ! check_running "$name"; then return 0; fi
- sleep 1
- log_action_cont_msg
- done
- return 1
-}
-
-do_start_restore()
-{
- [ -n "$XENDOMAINS_SAVE" ] || return
- [ -d "$XENDOMAINS_SAVE" ] || return
- [ -n "$XENDOMAINS_RESTORE" ] || return
-
- for file in $XENDOMAINS_SAVE/*; do
- if [ -f $file ] ; then
- name="${file##*/}"
- log_action_begin_msg "Restoring Xen domain $name (from $file)"
-
- out=$(xen restore "$file" 2>&1 1>/dev/null)
- case "$?" in
- 0)
- rm "$file"
- domains[$name]='started'
- log_action_end_msg 0
- ;;
- *)
- domains[$name]='failed'
- log_action_end_msg 1
- echo "$out"
- ;;
- esac
- fi
- done
-}
-
-do_start_auto()
-{
- [ -n "$XENDOMAINS_AUTO" ] || return
- [ -d "$XENDOMAINS_AUTO" ] || return
-
- for file in $XENDOMAINS_AUTO/*; do
- name="$(check_config_name $file)"
-
- if [ "${domains[$name]}" = started ]; then
- :
- elif check_running "$name"; then
- log_action_msg "Xen domain $name already running"
- else
- log_action_begin_msg "Starting Xen domain $name (from $file)"
-
- if [ "${domains[$name]}" = failed ]; then
- log_action_end_msg 1 "restore failed"
- else
- out=$(xen create --quiet --defconfig "$file" 2>&1 1>/dev/null)
- case "$?" in
- 0)
- log_action_end_msg 0
- ;;
- *)
- log_action_end_msg 1
- echo "$out"
- ;;
- esac
- fi
- fi
- done
-}
-
-do_start()
-{
- declare -A domains
-
- do_start_restore
- do_start_auto
-}
-
-do_stop_migrate()
-{
- [ -n "$XENDOMAINS_MIGRATE" ] || return
-
- while read id name rest; do
- log_action_begin_msg "Migrating Xen domain $name ($id)"
- (timeout_coproc "$XENDOMAINS_STOP_MAXWAIT" xen migrate $id $XENDOMAINS_MIGRATE)
- done < <(/usr/lib/xen-common/bin/xen-init-list)
-}
-
-do_stop_save()
-{
- [ -n "$XENDOMAINS_SAVE" ] || return
- [ -d "$XENDOMAINS_SAVE" ] || mkdir -m 0700 -p "$XENDOMAINS_SAVE"
-
- while read id name rest; do
- log_action_begin_msg "Saving Xen domain $name ($id)"
- (timeout_coproc "$XENDOMAINS_STOP_MAXWAIT" xen save $id $XENDOMAINS_SAVE/$name)
- done < <(/usr/lib/xen-common/bin/xen-init-list)
-}
-
-do_stop_shutdown()
-{
- while read id name rest; do
- log_action_begin_msg "Shutting down Xen domain $name ($id)"
- xen shutdown $id 2>&1 1>/dev/null
- log_action_end_msg $?
- done < <(/usr/lib/xen-common/bin/xen-init-list)
- while read id name rest; do
- log_action_begin_msg "Waiting for Xen domain $name ($id) to shut down"
- timeout_domain "$name" "$XENDOMAINS_STOP_MAXWAIT"
- log_action_end_msg $?
- done < <(/usr/lib/xen-common/bin/xen-init-list)
-}
-
-do_stop()
-{
- do_stop_migrate
- do_stop_save
- do_stop_shutdown
-}
-
-case "$1" in
- start)
- do_start
- ;;
-
- stop)
- do_stop
- ;;
-
- restart)
- do_stop
- do_start
- ;;
-
- reload|force-reload)
- do_stop
- do_start
- ;;
-
- *)
- echo "Usage: $0 {start|stop|restart|reload|force-reload}"
- exit 3
- ;;
-esac
-
-exit 0
diff -Nru xen-4.1.4/debian/xen-utils-common.xen.init xen-4.1.6.1/debian/xen-utils-common.xen.init
--- xen-4.1.4/debian/xen-utils-common.xen.init 2012-05-22 18:22:34.000000000 +1000
+++ xen-4.1.6.1/debian/xen-utils-common.xen.init 1970-01-01 10:00:00.000000000 +1000
@@ -1,269 +0,0 @@
-#!/bin/sh
-### BEGIN INIT INFO
-# Provides: xen xend
-# Required-Start: $syslog $remote_fs
-# Required-Stop: $syslog $remote_fs
-# Default-Start: 2 3 4 5
-# Default-Stop: 0 1 6
-# Short-Description: Xen daemons
-# Description: Xen daemons
-### END INIT INFO
-
-. /lib/init/vars.sh
-. /lib/lsb/init-functions
-
-# Default variables
-XENSTORED_DIR="/var/run/xenstored"
-
-[ -r /etc/default/xen ] && . /etc/default/xen
-[ -r /etc/default/xend ] && . /etc/default/xend
-
-PATH=/sbin:/bin:/usr/sbin:/usr/bin
-DESC="Xen daemons"
-
-ROOT=$(/usr/lib/xen-common/bin/xen-dir 2>/dev/null)
-if [ $? -ne 0 ]; then
- log_warning_msg "Not running within Xen or no compatible utils"
- exit 0
-fi
-TOOLSTACK=$(/usr/lib/xen-common/bin/xen-toolstack 2>/dev/null)
-if [ $? -ne 0 ]; then
- log_warning_msg "No usable Xen toolstack selected"
- exit 0
-fi
-
-[ -e "$ROOT"/bin/xend ] && XEND="$ROOT"/bin/xend
-XENCONSOLED="$ROOT"/bin/xenconsoled
-XENCONSOLED_PIDFILE="/var/run/xenconsoled.pid"
-XENSTORED="$ROOT"/bin/xenstored
-XENSTORED_PIDFILE="/var/run/xenstore.pid"
-
-modules_setup()
-{
- modprobe xenfs 2>/dev/null
- modprobe xen-evtchn 2>/dev/null
- modprobe xen-gntdev 2>/dev/null
-}
-
-xenfs_setup()
-{
- [ -e "/proc/xen/capabilities" ] && return 0
- log_progress_msg "xenfs"
- [ -d "/proc/xen" ] || return 1
- mount -t xenfs xenfs /proc/xen || return 1
- return 0
-}
-
-capability_check()
-{
- [ -e "/proc/xen/capabilities" ] || return 1
- grep -q "control_d" /proc/xen/capabilities || return 1
- return 0
-}
-
-xend_start()
-{
- if [ -z "$XEND" ] || [ "$(basename "$TOOLSTACK")" != xm ]; then
- return 0
- fi
-
- log_progress_msg "xend"
- xend_start_real
- return $?
-}
-
-xend_stop()
-{
- if [ -z "$XEND" ] || [ "$(basename "$TOOLSTACK")" != xm ]; then
- return 0
- fi
-
- log_progress_msg "xend"
- xend_stop_real
- return $?
-}
-
-xend_restart()
-{
- if [ -z "$XEND" ] || [ "$(basename "$TOOLSTACK")" != xm ]; then
- return 0
- fi
-
- log_progress_msg "xend"
- xend_stop_real
- case "$?" in
- 0|1)
- xend_start_real
- case "$?" in
- 0) ;;
- *) return 2 ;;
- esac
- ;;
- *) return 2 ;;
- esac
- return 0
-}
-
-xend_start_real()
-{
- $XEND status && return 1
- $XEND start || return 2
-
- i=0
- while [ $i -lt 10 ]; do
- $XEND status && return 0 || true
- i=$(($i + 1))
- sleep 1
- done
- return 2
-}
-
-xend_stop_real()
-{
- log_progress_msg "xend"
- $XEND status || return 0
- $XEND stop || return 1
-}
-
-xenconsoled_start()
-{
- log_progress_msg "xenconsoled"
- xenconsoled_start_real
- return $?
-}
-
-xenconsoled_stop()
-{
- log_progress_msg "xenconsoled"
- xenconsoled_stop_real
- return $?
-}
-
-xenconsoled_restart()
-{
- log_progress_msg "xenconsoled"
- xenconsoled_stop_real
- case "$?" in
- 0|1)
- xenconsoled_start_real
- case "$?" in
- 0) ;;
- *) return 2 ;;
- esac
- ;;
- *) return 2 ;;
- esac
- return 0
-}
-
-xenconsoled_start_real()
-{
- start-stop-daemon --start --quiet --pidfile "$XENCONSOLED_PIDFILE" --exec "$XENCONSOLED" --test > /dev/null \
- || return 1
- start-stop-daemon --start --quiet --pidfile "$XENCONSOLED_PIDFILE" --exec "$XENCONSOLED" -- \
- $XENCONSOLED_ARGS --pid-file="$XENCONSOLED_PIDFILE" \
- || return 2
-}
-
-xenconsoled_stop_real()
-{
- start-stop-daemon --stop --quiet --retry=TERM/30/KILL/5 --pidfile "$XENCONSOLED_PIDFILE" --name xenconsoled
- RETVAL="$?"
- [ "$RETVAL" = 2 ] && return 2
- start-stop-daemon --stop --quiet --oknodo --retry=0/30/KILL/5 --exec "$XENCONSOLED"
- [ "$?" = 2 ] && return 2
- rm -f $PIDFILE
- return "$RETVAL"
-}
-
-xenstored_start()
-{
- log_progress_msg "xenstored"
- start-stop-daemon --start --quiet --pidfile "$XENSTORED_PIDFILE" --exec "$XENSTORED" --test > /dev/null \
- || return 1
- [ -d "$XENSTORED_DIR" ] || mkdir -p "$XENSTORED_DIR"
- export XENSTORED_ROOTDIR="$XENSTORED_DIR"
- start-stop-daemon --start --quiet --pidfile "$XENSTORED_PIDFILE" --exec "$XENSTORED" -- \
- $XENSTORED_ARGS --pid-file="$XENSTORED_PIDFILE" \
- || return 2
- xenstore-write "/local/domain/0/name" "Domain-0"
-}
-
-case "$1" in
- start)
- log_daemon_msg "Starting $DESC"
- modules_setup
- xenfs_setup
- case "$?" in
- 0) ;;
- *) log_end_msg 1; exit ;;
- esac
- capability_check
- case "$?" in
- 0) ;;
- *) log_end_msg 255; exit ;;
- esac
- xenstored_start
- case "$?" in
- 0|1) ;;
- *) log_end_msg 1; exit ;;
- esac
- xenconsoled_start
- case "$?" in
- 0|1) ;;
- *) log_end_msg 1; exit ;;
- esac
- xend_start
- case "$?" in
- 0|1) ;;
- *) log_end_msg 1; exit ;;
- esac
- log_end_msg 0
- ;;
- stop)
- capability_check
- case "$?" in
- 0) ;;
- *) exit ;;
- esac
- log_daemon_msg "Stopping $DESC"
- ret=0
- xend_stop
- case "$?" in
- 0|1) ;;
- *) ret=1 ;;
- esac
- xenconsoled_stop
- case "$?" in
- 0|1) ;;
- *) ret=1 ;;
- esac
- log_end_msg $ret
- ;;
- restart|force-reload)
- capability_check
- case "$?" in
- 0) ;;
- *) exit ;;
- esac
- log_daemon_msg "Restarting $DESC"
- ret=0
- xend_restart
- case "$?" in
- 0|1) ;;
- *) ret=1 ;;
- esac
- xenconsoled_restart
- case "$?" in
- 0|1) ;;
- *) ret=1 ;;
- esac
- log_end_msg $ret
- ;;
- *)
- echo "Usage: $0 {start|stop|restart|force-reload}" >&2
- exit 3
- ;;
-esac
-
-exit 0
Binary files /tmp/brian/kYDs4mmeZM/xen-4.1.4/qemu/pc-bios/bamboo.dtb and /tmp/brian/_UaX_e3_TP/xen-4.1.6.1/qemu/pc-bios/bamboo.dtb differ
Binary files /tmp/brian/kYDs4mmeZM/xen-4.1.4/qemu/pc-bios/bios.bin and /tmp/brian/_UaX_e3_TP/xen-4.1.6.1/qemu/pc-bios/bios.bin differ
Binary files /tmp/brian/kYDs4mmeZM/xen-4.1.4/qemu/pc-bios/mpc8544ds.dtb and /tmp/brian/_UaX_e3_TP/xen-4.1.6.1/qemu/pc-bios/mpc8544ds.dtb differ
Binary files /tmp/brian/kYDs4mmeZM/xen-4.1.4/qemu/pc-bios/openbios-ppc and /tmp/brian/_UaX_e3_TP/xen-4.1.6.1/qemu/pc-bios/openbios-ppc differ
Binary files /tmp/brian/kYDs4mmeZM/xen-4.1.4/qemu/pc-bios/openbios-sparc32 and /tmp/brian/_UaX_e3_TP/xen-4.1.6.1/qemu/pc-bios/openbios-sparc32 differ
Binary files /tmp/brian/kYDs4mmeZM/xen-4.1.4/qemu/pc-bios/openbios-sparc64 and /tmp/brian/_UaX_e3_TP/xen-4.1.6.1/qemu/pc-bios/openbios-sparc64 differ
Binary files /tmp/brian/kYDs4mmeZM/xen-4.1.4/qemu/pc-bios/ppc_rom.bin and /tmp/brian/_UaX_e3_TP/xen-4.1.6.1/qemu/pc-bios/ppc_rom.bin differ
Binary files /tmp/brian/kYDs4mmeZM/xen-4.1.4/qemu/pc-bios/pxe-e1000.bin and /tmp/brian/_UaX_e3_TP/xen-4.1.6.1/qemu/pc-bios/pxe-e1000.bin differ
Binary files /tmp/brian/kYDs4mmeZM/xen-4.1.4/qemu/pc-bios/pxe-ne2k_pci.bin and /tmp/brian/_UaX_e3_TP/xen-4.1.6.1/qemu/pc-bios/pxe-ne2k_pci.bin differ
Binary files /tmp/brian/kYDs4mmeZM/xen-4.1.4/qemu/pc-bios/pxe-pcnet.bin and /tmp/brian/_UaX_e3_TP/xen-4.1.6.1/qemu/pc-bios/pxe-pcnet.bin differ
Binary files /tmp/brian/kYDs4mmeZM/xen-4.1.4/qemu/pc-bios/pxe-rtl8139.bin and /tmp/brian/_UaX_e3_TP/xen-4.1.6.1/qemu/pc-bios/pxe-rtl8139.bin differ
Binary files /tmp/brian/kYDs4mmeZM/xen-4.1.4/qemu/pc-bios/vgabios.bin and /tmp/brian/_UaX_e3_TP/xen-4.1.6.1/qemu/pc-bios/vgabios.bin differ
Binary files /tmp/brian/kYDs4mmeZM/xen-4.1.4/qemu/pc-bios/vgabios-cirrus.bin and /tmp/brian/_UaX_e3_TP/xen-4.1.6.1/qemu/pc-bios/vgabios-cirrus.bin differ
Binary files /tmp/brian/kYDs4mmeZM/xen-4.1.4/qemu/pc-bios/video.x and /tmp/brian/_UaX_e3_TP/xen-4.1.6.1/qemu/pc-bios/video.x differ
Reply to: