openSUSE Recommended Update: xen: bugfix update ______________________________________________________________________________ Announcement ID: openSUSE-RU-2013:0589-1 Rating: moderate References: #797014 #802690 #805094 #806736 #809203 Affected Products: openSUSE 12.3 ______________________________________________________________________________ An update that has 5 recommended fixes can now be installed. Description: XEN was updated to fix various bugs: - Load blktap module in xencommons init script. blktap2 doesn't support qcow2, so blktap is needed to support domains with 'tap:qcow2' disk configurations. modified tmp-initscript-modprobe.patch - bnc#809203 - xen.efi isn't signed with SUSE Secure Boot key xen.spec - Fix adding managed PCI device to an inactive domain modified xen-managed-pci-device.patch - bnc#805094 - xen hot plug attach/detach fails modified blktap-pv-cdrom.patch - bnc# 802690 - domain locking can prevent a live migration from completing modified xend-domain-lock.patch - bnc#797014 - no way to control live migrations 26675-tools-xentoollog_update_tty_detection_in_stdiostream_p rogress.patch xen.migrate.tools-xc_print_messages_from_xc_save_with_xc_rep ort.patch xen.migrate.tools-xc_document_printf_calls_in_xc_restore.pat ch xen.migrate.tools-xc_rework_xc_save.cswitch_qemu_logdirty.pa tch xen.migrate.tools_set_migration_constraints_from_cmdline.pat ch xen.migrate.tools_add_xm_migrate_--log_progress_option.patch - Upstream patches from Jan 26585-x86-mm-Take-the-p2m-lock-even-in-shadow-mode.patch 26595-x86-nhvm-properly-clean-up-after-failure-to-set-up-all -vCPU-s.patch 26601-honor-ACPI-v4-FADT-flags.patch 26656-x86-fix-null-pointer-dereference-in-intel_get_extended _msrs.patch 26659-AMD-IOMMU-erratum-746-workaround.patch 26660-x86-fix-CMCI-injection.patch 26672-vmx-fix-handling-of-NMI-VMEXIT.patch 26673-Avoid-stale-pointer-when-moving-domain-to-another-cpup ool.patch 26676-fix-compat-memory-exchange-op-splitting.patch 26677-x86-make-certain-memory-sub-ops-return-valid-values.pa tch 26678-SEDF-avoid-gathering-vCPU-s-on-pCPU0.patch 26679-x86-defer-processing-events-on-the-NMI-exit-path.patch 26683-credit1-Use-atomic-bit-operations-for-the-flags-struct ure.patch 26689-fix-domain-unlocking-in-some-xsm-error-paths.patch - fate#313584: pass bios information to XEN HVM guest xend-hvm-firmware-passthrough.patch - bnc#806736: enabling xentrace crashes hypervisor 26686-xentrace_fix_off-by-one_in_calculate_tbuf_size.patch - update xenalyze to revision 149 Make eip_list output more useful Use correct length when copying record into buffer decode PV_HYPERCALL_SUBCALL events decode PV_HYPERCALL_V2 records Analyze populate-on-demand reclamation patterns Handle 64-bit MMIO Also strip write bit when processing a generic event Make the warnigns in hvm_generic_postprocess more informative Don't warn about switching paging levels unless verbosity>=6 Process NPFs as generic for summary purposes Add HVM_EVENT_VLAPIC Patch Instructions: To install this openSUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 12.3: zypper in -t patch openSUSE-2013-290 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 12.3 (i586 x86_64): xen-debugsource-4.2.1_10-1.4.1 xen-devel-4.2.1_10-1.4.1 xen-kmp-default-4.2.1_10_k3.7.10_1.1-1.4.1 xen-kmp-default-debuginfo-4.2.1_10_k3.7.10_1.1-1.4.1 xen-kmp-desktop-4.2.1_10_k3.7.10_1.1-1.4.1 xen-kmp-desktop-debuginfo-4.2.1_10_k3.7.10_1.1-1.4.1 xen-libs-4.2.1_10-1.4.1 xen-libs-debuginfo-4.2.1_10-1.4.1 xen-tools-domU-4.2.1_10-1.4.1 xen-tools-domU-debuginfo-4.2.1_10-1.4.1 - openSUSE 12.3 (x86_64): xen-4.2.1_10-1.4.1 xen-doc-html-4.2.1_10-1.4.1 xen-doc-pdf-4.2.1_10-1.4.1 xen-libs-32bit-4.2.1_10-1.4.1 xen-libs-debuginfo-32bit-4.2.1_10-1.4.1 xen-tools-4.2.1_10-1.4.1 xen-tools-debuginfo-4.2.1_10-1.4.1 - openSUSE 12.3 (i586): xen-kmp-pae-4.2.1_10_k3.7.10_1.1-1.4.1 xen-kmp-pae-debuginfo-4.2.1_10_k3.7.10_1.1-1.4.1 References: https://bugzilla.novell.com/797014 https://bugzilla.novell.com/802690 https://bugzilla.novell.com/805094 https://bugzilla.novell.com/806736 https://bugzilla.novell.com/809203