View Bazaar branches
Get this repository:
git clone https://git.launchpad.net/ubuntu/+source/xen
Members of Ubuntu Server Dev import team can upload to this repository. Log in for directions.

Branches

Name Last Modified Last Commit
ubuntu/vivid-updates 2015-12-17 15:20:08 UTC 2015-12-17
Import patches-unapplied version 4.5.0-1ubuntu4.4 to ubuntu/vivid-security

Author: Stefan Bader
Author Date: 2015-12-16 15:09:20 UTC

Import patches-unapplied version 4.5.0-1ubuntu4.4 to ubuntu/vivid-security

Imported using git-ubuntu import.

Changelog parent: 48e30073afa67c3ca5880ec96a12171f57615ebf

New changelog entries:
  * Applying Xen Security Advisories:
    - CVE-2015-8550 / XSA-155
      * xen: Add RING_COPY_REQUEST()
      * blktap2: Use RING_COPY_REQUEST
      * libvchan: Read prod/cons only once.
    - CVE-2015-8338 / XSA-158
      * memory: split and tighten maximum order permitted in memops
    - CVE-2015-8339, CVE-2015-8340 / XSA-159
      * memory: fix XENMEM_exchange error handling
    - CVE-2015-8341 / XSA-160
      * libxl: Fix bootloader-related virtual memory leak on pv
        build failure
    - CVE-2015-8555 / XSA-165
      * x86: don't leak ST(n)/XMMn values to domains first using them
    - CVE-2015-???? / XSA-166
      * x86/HVM: avoid reading ioreq state more than once

applied/ubuntu/vivid-security 2015-12-17 15:20:08 UTC 2015-12-17
Import patches-applied version 4.5.0-1ubuntu4.4 to applied/ubuntu/vivid-security

Author: Stefan Bader
Author Date: 2015-12-16 15:09:20 UTC

Import patches-applied version 4.5.0-1ubuntu4.4 to applied/ubuntu/vivid-security

Imported using git-ubuntu import.

Changelog parent: 8b3c93a08bf650c5078ba8b886f8b5efd8ede53f
Unapplied parent: 20fd5c7b52f4ea2247046665475c599362b9224b

New changelog entries:
  * Applying Xen Security Advisories:
    - CVE-2015-8550 / XSA-155
      * xen: Add RING_COPY_REQUEST()
      * blktap2: Use RING_COPY_REQUEST
      * libvchan: Read prod/cons only once.
    - CVE-2015-8338 / XSA-158
      * memory: split and tighten maximum order permitted in memops
    - CVE-2015-8339, CVE-2015-8340 / XSA-159
      * memory: fix XENMEM_exchange error handling
    - CVE-2015-8341 / XSA-160
      * libxl: Fix bootloader-related virtual memory leak on pv
        build failure
    - CVE-2015-8555 / XSA-165
      * x86: don't leak ST(n)/XMMn values to domains first using them
    - CVE-2015-???? / XSA-166
      * x86/HVM: avoid reading ioreq state more than once

ubuntu/vivid-devel 2015-12-17 15:20:08 UTC 2015-12-17
Import patches-unapplied version 4.5.0-1ubuntu4.4 to ubuntu/vivid-security

Author: Stefan Bader
Author Date: 2015-12-16 15:09:20 UTC

Import patches-unapplied version 4.5.0-1ubuntu4.4 to ubuntu/vivid-security

Imported using git-ubuntu import.

Changelog parent: 48e30073afa67c3ca5880ec96a12171f57615ebf

New changelog entries:
  * Applying Xen Security Advisories:
    - CVE-2015-8550 / XSA-155
      * xen: Add RING_COPY_REQUEST()
      * blktap2: Use RING_COPY_REQUEST
      * libvchan: Read prod/cons only once.
    - CVE-2015-8338 / XSA-158
      * memory: split and tighten maximum order permitted in memops
    - CVE-2015-8339, CVE-2015-8340 / XSA-159
      * memory: fix XENMEM_exchange error handling
    - CVE-2015-8341 / XSA-160
      * libxl: Fix bootloader-related virtual memory leak on pv
        build failure
    - CVE-2015-8555 / XSA-165
      * x86: don't leak ST(n)/XMMn values to domains first using them
    - CVE-2015-???? / XSA-166
      * x86/HVM: avoid reading ioreq state more than once

ubuntu/vivid-security 2015-12-17 15:20:08 UTC 2015-12-17
Import patches-unapplied version 4.5.0-1ubuntu4.4 to ubuntu/vivid-security

Author: Stefan Bader
Author Date: 2015-12-16 15:09:20 UTC

Import patches-unapplied version 4.5.0-1ubuntu4.4 to ubuntu/vivid-security

Imported using git-ubuntu import.

Changelog parent: 48e30073afa67c3ca5880ec96a12171f57615ebf

New changelog entries:
  * Applying Xen Security Advisories:
    - CVE-2015-8550 / XSA-155
      * xen: Add RING_COPY_REQUEST()
      * blktap2: Use RING_COPY_REQUEST
      * libvchan: Read prod/cons only once.
    - CVE-2015-8338 / XSA-158
      * memory: split and tighten maximum order permitted in memops
    - CVE-2015-8339, CVE-2015-8340 / XSA-159
      * memory: fix XENMEM_exchange error handling
    - CVE-2015-8341 / XSA-160
      * libxl: Fix bootloader-related virtual memory leak on pv
        build failure
    - CVE-2015-8555 / XSA-165
      * x86: don't leak ST(n)/XMMn values to domains first using them
    - CVE-2015-???? / XSA-166
      * x86/HVM: avoid reading ioreq state more than once

applied/ubuntu/vivid-devel 2015-12-17 15:20:08 UTC 2015-12-17
Import patches-applied version 4.5.0-1ubuntu4.4 to applied/ubuntu/vivid-security

Author: Stefan Bader
Author Date: 2015-12-16 15:09:20 UTC

Import patches-applied version 4.5.0-1ubuntu4.4 to applied/ubuntu/vivid-security

Imported using git-ubuntu import.

Changelog parent: 8b3c93a08bf650c5078ba8b886f8b5efd8ede53f
Unapplied parent: 20fd5c7b52f4ea2247046665475c599362b9224b

New changelog entries:
  * Applying Xen Security Advisories:
    - CVE-2015-8550 / XSA-155
      * xen: Add RING_COPY_REQUEST()
      * blktap2: Use RING_COPY_REQUEST
      * libvchan: Read prod/cons only once.
    - CVE-2015-8338 / XSA-158
      * memory: split and tighten maximum order permitted in memops
    - CVE-2015-8339, CVE-2015-8340 / XSA-159
      * memory: fix XENMEM_exchange error handling
    - CVE-2015-8341 / XSA-160
      * libxl: Fix bootloader-related virtual memory leak on pv
        build failure
    - CVE-2015-8555 / XSA-165
      * x86: don't leak ST(n)/XMMn values to domains first using them
    - CVE-2015-???? / XSA-166
      * x86/HVM: avoid reading ioreq state more than once

applied/ubuntu/vivid-updates 2015-12-17 15:20:08 UTC 2015-12-17
Import patches-applied version 4.5.0-1ubuntu4.4 to applied/ubuntu/vivid-security

Author: Stefan Bader
Author Date: 2015-12-16 15:09:20 UTC

Import patches-applied version 4.5.0-1ubuntu4.4 to applied/ubuntu/vivid-security

Imported using git-ubuntu import.

Changelog parent: 8b3c93a08bf650c5078ba8b886f8b5efd8ede53f
Unapplied parent: 20fd5c7b52f4ea2247046665475c599362b9224b

New changelog entries:
  * Applying Xen Security Advisories:
    - CVE-2015-8550 / XSA-155
      * xen: Add RING_COPY_REQUEST()
      * blktap2: Use RING_COPY_REQUEST
      * libvchan: Read prod/cons only once.
    - CVE-2015-8338 / XSA-158
      * memory: split and tighten maximum order permitted in memops
    - CVE-2015-8339, CVE-2015-8340 / XSA-159
      * memory: fix XENMEM_exchange error handling
    - CVE-2015-8341 / XSA-160
      * libxl: Fix bootloader-related virtual memory leak on pv
        build failure
    - CVE-2015-8555 / XSA-165
      * x86: don't leak ST(n)/XMMn values to domains first using them
    - CVE-2015-???? / XSA-166
      * x86/HVM: avoid reading ioreq state more than once

ubuntu/wily 2015-09-03 22:13:18 UTC 2015-09-03
Import patches-unapplied version 4.5.1-0ubuntu1 to ubuntu/wily-proposed

Author: Stefan Bader
Author Date: 2015-09-02 14:37:39 UTC

Import patches-unapplied version 4.5.1-0ubuntu1 to ubuntu/wily-proposed

Imported using git-ubuntu import.

Changelog parent: 644f68d93f7b4de29c6cdb46d93c65aa4b73832c

New changelog entries:
  * New upstream stable release (4.5.1)
    - Replacing the following security changes by upstream versions:
      * CVE-2014-3969 / XSA-98 (update),
        CVE-2015-0268 / XSA-117, CVE-2015-1563 / XSA-118,
        CVE-2015-2152 / XSA-119, CVE-2015-2044 / XSA-121,
        CVE-2015-2045 / XSA-122, CVE-2015-2151 / XSA-123,
        CVE-2015-2752 / XSA-125, CVE-2015-2751 / XSA-127
    - Included security changes which where not yet applied:
      * CVE-2015-4163 / XSA-134, CVE-2015-4164 / XSA-136
  * Applying additional Xen Security Advisories:
    - CVE-2015-3259 / XSA-137
      * xl: Sane handling of extra config file arguments
    - CVE-2015-6654 / XSA-141
      * xen/arm: mm: Do not dump the p2m when mapping a foreign gfn

applied/ubuntu/wily-proposed 2015-09-03 22:13:18 UTC 2015-09-03
Import patches-applied version 4.5.1-0ubuntu1 to applied/ubuntu/wily-proposed

Author: Stefan Bader
Author Date: 2015-09-02 14:37:39 UTC

Import patches-applied version 4.5.1-0ubuntu1 to applied/ubuntu/wily-proposed

Imported using git-ubuntu import.

Changelog parent: bedd6174840c18d86554a52b812b2699c0926f83
Unapplied parent: 67aa7e07d875f3106ccc78cbcd04326072ccae3a

New changelog entries:
  * New upstream stable release (4.5.1)
    - Replacing the following security changes by upstream versions:
      * CVE-2014-3969 / XSA-98 (update),
        CVE-2015-0268 / XSA-117, CVE-2015-1563 / XSA-118,
        CVE-2015-2152 / XSA-119, CVE-2015-2044 / XSA-121,
        CVE-2015-2045 / XSA-122, CVE-2015-2151 / XSA-123,
        CVE-2015-2752 / XSA-125, CVE-2015-2751 / XSA-127
    - Included security changes which where not yet applied:
      * CVE-2015-4163 / XSA-134, CVE-2015-4164 / XSA-136
  * Applying additional Xen Security Advisories:
    - CVE-2015-3259 / XSA-137
      * xl: Sane handling of extra config file arguments
    - CVE-2015-6654 / XSA-141
      * xen/arm: mm: Do not dump the p2m when mapping a foreign gfn

ubuntu/wily-proposed 2015-09-03 22:13:18 UTC 2015-09-03
Import patches-unapplied version 4.5.1-0ubuntu1 to ubuntu/wily-proposed

Author: Stefan Bader
Author Date: 2015-09-02 14:37:39 UTC

Import patches-unapplied version 4.5.1-0ubuntu1 to ubuntu/wily-proposed

Imported using git-ubuntu import.

Changelog parent: 644f68d93f7b4de29c6cdb46d93c65aa4b73832c

New changelog entries:
  * New upstream stable release (4.5.1)
    - Replacing the following security changes by upstream versions:
      * CVE-2014-3969 / XSA-98 (update),
        CVE-2015-0268 / XSA-117, CVE-2015-1563 / XSA-118,
        CVE-2015-2152 / XSA-119, CVE-2015-2044 / XSA-121,
        CVE-2015-2045 / XSA-122, CVE-2015-2151 / XSA-123,
        CVE-2015-2752 / XSA-125, CVE-2015-2751 / XSA-127
    - Included security changes which where not yet applied:
      * CVE-2015-4163 / XSA-134, CVE-2015-4164 / XSA-136
  * Applying additional Xen Security Advisories:
    - CVE-2015-3259 / XSA-137
      * xl: Sane handling of extra config file arguments
    - CVE-2015-6654 / XSA-141
      * xen/arm: mm: Do not dump the p2m when mapping a foreign gfn

applied/ubuntu/wily 2015-09-03 22:13:18 UTC 2015-09-03
Import patches-applied version 4.5.1-0ubuntu1 to applied/ubuntu/wily-proposed

Author: Stefan Bader
Author Date: 2015-09-02 14:37:39 UTC

Import patches-applied version 4.5.1-0ubuntu1 to applied/ubuntu/wily-proposed

Imported using git-ubuntu import.

Changelog parent: bedd6174840c18d86554a52b812b2699c0926f83
Unapplied parent: 67aa7e07d875f3106ccc78cbcd04326072ccae3a

New changelog entries:
  * New upstream stable release (4.5.1)
    - Replacing the following security changes by upstream versions:
      * CVE-2014-3969 / XSA-98 (update),
        CVE-2015-0268 / XSA-117, CVE-2015-1563 / XSA-118,
        CVE-2015-2152 / XSA-119, CVE-2015-2044 / XSA-121,
        CVE-2015-2045 / XSA-122, CVE-2015-2151 / XSA-123,
        CVE-2015-2752 / XSA-125, CVE-2015-2751 / XSA-127
    - Included security changes which where not yet applied:
      * CVE-2015-4163 / XSA-134, CVE-2015-4164 / XSA-136
  * Applying additional Xen Security Advisories:
    - CVE-2015-3259 / XSA-137
      * xl: Sane handling of extra config file arguments
    - CVE-2015-6654 / XSA-141
      * xen/arm: mm: Do not dump the p2m when mapping a foreign gfn

applied/ubuntu/utopic-security 2015-05-20 13:48:11 UTC 2015-05-20
Import patches-applied version 4.4.1-0ubuntu0.14.10.6 to applied/ubuntu/utopi...

Author: Stefan Bader
Author Date: 2015-05-13 14:33:47 UTC

Import patches-applied version 4.4.1-0ubuntu0.14.10.6 to applied/ubuntu/utopic-security

Imported using git-ubuntu import.

Changelog parent: 4243d1052065e7d80d179722a3cddc5ae34d9784
Unapplied parent: f23e59112f782f4ecb87824c65b94a9a3e2e6937

New changelog entries:
  * Applying Xen Security Advisories:
    - CVE-2015-3340 / XSA-132
      * domctl/sysctl: don't leak hypervisor stack to toolstacks
    - CVE-2015-3456 / XSA-133
      * qemut: fdc: force the fifo access to be in bounds of the
        allocated buffer

ubuntu/utopic-updates 2015-05-20 13:48:11 UTC 2015-05-20
Import patches-unapplied version 4.4.1-0ubuntu0.14.10.6 to ubuntu/utopic-secu...

Author: Stefan Bader
Author Date: 2015-05-13 14:33:47 UTC

Import patches-unapplied version 4.4.1-0ubuntu0.14.10.6 to ubuntu/utopic-security

Imported using git-ubuntu import.

Changelog parent: e7847f49f3f14c60b61f027a42e341e05f1709c8

New changelog entries:
  * Applying Xen Security Advisories:
    - CVE-2015-3340 / XSA-132
      * domctl/sysctl: don't leak hypervisor stack to toolstacks
    - CVE-2015-3456 / XSA-133
      * qemut: fdc: force the fifo access to be in bounds of the
        allocated buffer

applied/ubuntu/utopic-devel 2015-05-20 13:48:11 UTC 2015-05-20
Import patches-applied version 4.4.1-0ubuntu0.14.10.6 to applied/ubuntu/utopi...

Author: Stefan Bader
Author Date: 2015-05-13 14:33:47 UTC

Import patches-applied version 4.4.1-0ubuntu0.14.10.6 to applied/ubuntu/utopic-security

Imported using git-ubuntu import.

Changelog parent: 4243d1052065e7d80d179722a3cddc5ae34d9784
Unapplied parent: f23e59112f782f4ecb87824c65b94a9a3e2e6937

New changelog entries:
  * Applying Xen Security Advisories:
    - CVE-2015-3340 / XSA-132
      * domctl/sysctl: don't leak hypervisor stack to toolstacks
    - CVE-2015-3456 / XSA-133
      * qemut: fdc: force the fifo access to be in bounds of the
        allocated buffer

ubuntu/utopic-devel 2015-05-20 13:48:11 UTC 2015-05-20
Import patches-unapplied version 4.4.1-0ubuntu0.14.10.6 to ubuntu/utopic-secu...

Author: Stefan Bader
Author Date: 2015-05-13 14:33:47 UTC

Import patches-unapplied version 4.4.1-0ubuntu0.14.10.6 to ubuntu/utopic-security

Imported using git-ubuntu import.

Changelog parent: e7847f49f3f14c60b61f027a42e341e05f1709c8

New changelog entries:
  * Applying Xen Security Advisories:
    - CVE-2015-3340 / XSA-132
      * domctl/sysctl: don't leak hypervisor stack to toolstacks
    - CVE-2015-3456 / XSA-133
      * qemut: fdc: force the fifo access to be in bounds of the
        allocated buffer

ubuntu/utopic-security 2015-05-20 13:48:11 UTC 2015-05-20
Import patches-unapplied version 4.4.1-0ubuntu0.14.10.6 to ubuntu/utopic-secu...

Author: Stefan Bader
Author Date: 2015-05-13 14:33:47 UTC

Import patches-unapplied version 4.4.1-0ubuntu0.14.10.6 to ubuntu/utopic-security

Imported using git-ubuntu import.

Changelog parent: e7847f49f3f14c60b61f027a42e341e05f1709c8

New changelog entries:
  * Applying Xen Security Advisories:
    - CVE-2015-3340 / XSA-132
      * domctl/sysctl: don't leak hypervisor stack to toolstacks
    - CVE-2015-3456 / XSA-133
      * qemut: fdc: force the fifo access to be in bounds of the
        allocated buffer

applied/ubuntu/utopic-updates 2015-05-20 13:48:11 UTC 2015-05-20
Import patches-applied version 4.4.1-0ubuntu0.14.10.6 to applied/ubuntu/utopi...

Author: Stefan Bader
Author Date: 2015-05-13 14:33:47 UTC

Import patches-applied version 4.4.1-0ubuntu0.14.10.6 to applied/ubuntu/utopic-security

Imported using git-ubuntu import.

Changelog parent: 4243d1052065e7d80d179722a3cddc5ae34d9784
Unapplied parent: f23e59112f782f4ecb87824c65b94a9a3e2e6937

New changelog entries:
  * Applying Xen Security Advisories:
    - CVE-2015-3340 / XSA-132
      * domctl/sysctl: don't leak hypervisor stack to toolstacks
    - CVE-2015-3456 / XSA-133
      * qemut: fdc: force the fifo access to be in bounds of the
        allocated buffer

ubuntu/vivid-proposed 2015-04-08 23:03:27 UTC 2015-04-08
Import patches-unapplied version 4.5.0-1ubuntu4 to ubuntu/vivid-proposed

Author: Stefan Bader
Author Date: 2015-04-08 08:10:27 UTC

Import patches-unapplied version 4.5.0-1ubuntu4 to ubuntu/vivid-proposed

Imported using git-ubuntu import.

Changelog parent: 3bf81020feb9c3145ad83652fbdf398e7544f113

New changelog entries:
  * Applying Xen Security Advisories:
    * CVE-2014-3969 / XSA-98 (update)
      - xen: arm: correct arm64 version of gva_to_ma_par
    * CVE-2015-2752 / XSA-125
      - Limit XEN_DOMCTL_memory_mapping hypercall to only process up
        to 64 GFNs (or less)
    * CVE-2015-2751 / XSA-127
      - domctl: don't allow a toolstack domain to call domain_pause() on
        itself

applied/ubuntu/vivid 2015-04-08 23:03:27 UTC 2015-04-08
Import patches-applied version 4.5.0-1ubuntu4 to applied/ubuntu/vivid-proposed

Author: Stefan Bader
Author Date: 2015-04-08 08:10:27 UTC

Import patches-applied version 4.5.0-1ubuntu4 to applied/ubuntu/vivid-proposed

Imported using git-ubuntu import.

Changelog parent: cd685c75bc1302b44ea18b34a61fb6047a3c110a
Unapplied parent: ca4589d765d2a4c81f2f4a6bbfd3b452ed184cb7

New changelog entries:
  * Applying Xen Security Advisories:
    * CVE-2014-3969 / XSA-98 (update)
      - xen: arm: correct arm64 version of gva_to_ma_par
    * CVE-2015-2752 / XSA-125
      - Limit XEN_DOMCTL_memory_mapping hypercall to only process up
        to 64 GFNs (or less)
    * CVE-2015-2751 / XSA-127
      - domctl: don't allow a toolstack domain to call domain_pause() on
        itself

applied/ubuntu/vivid-proposed 2015-04-08 23:03:27 UTC 2015-04-08
Import patches-applied version 4.5.0-1ubuntu4 to applied/ubuntu/vivid-proposed

Author: Stefan Bader
Author Date: 2015-04-08 08:10:27 UTC

Import patches-applied version 4.5.0-1ubuntu4 to applied/ubuntu/vivid-proposed

Imported using git-ubuntu import.

Changelog parent: cd685c75bc1302b44ea18b34a61fb6047a3c110a
Unapplied parent: ca4589d765d2a4c81f2f4a6bbfd3b452ed184cb7

New changelog entries:
  * Applying Xen Security Advisories:
    * CVE-2014-3969 / XSA-98 (update)
      - xen: arm: correct arm64 version of gva_to_ma_par
    * CVE-2015-2752 / XSA-125
      - Limit XEN_DOMCTL_memory_mapping hypercall to only process up
        to 64 GFNs (or less)
    * CVE-2015-2751 / XSA-127
      - domctl: don't allow a toolstack domain to call domain_pause() on
        itself

ubuntu/vivid 2015-04-08 23:03:27 UTC 2015-04-08
Import patches-unapplied version 4.5.0-1ubuntu4 to ubuntu/vivid-proposed

Author: Stefan Bader
Author Date: 2015-04-08 08:10:27 UTC

Import patches-unapplied version 4.5.0-1ubuntu4 to ubuntu/vivid-proposed

Imported using git-ubuntu import.

Changelog parent: 3bf81020feb9c3145ad83652fbdf398e7544f113

New changelog entries:
  * Applying Xen Security Advisories:
    * CVE-2014-3969 / XSA-98 (update)
      - xen: arm: correct arm64 version of gva_to_ma_par
    * CVE-2015-2752 / XSA-125
      - Limit XEN_DOMCTL_memory_mapping hypercall to only process up
        to 64 GFNs (or less)
    * CVE-2015-2751 / XSA-127
      - domctl: don't allow a toolstack domain to call domain_pause() on
        itself

applied/ubuntu/utopic-proposed 2014-12-16 14:23:39 UTC 2014-12-16
Import patches-applied version 4.4.1-0ubuntu0.14.10.3 to applied/ubuntu/utopi...

Author: Stefan Bader
Author Date: 2014-12-11 17:23:20 UTC

Import patches-applied version 4.4.1-0ubuntu0.14.10.3 to applied/ubuntu/utopic-proposed

Imported using git-ubuntu import.

Changelog parent: 549721f5357495dd79f60d7f312f716ba094752d
Unapplied parent: 6ae992e4ddc63eefbc4ce94a77c5a04774ce3952

New changelog entries:
  * d/xen-utils-common.xen.init: Update script to start a QEMU process for
    dom0. (LP: #1396068)

ubuntu/utopic-proposed 2014-12-16 14:23:39 UTC 2014-12-16
Import patches-unapplied version 4.4.1-0ubuntu0.14.10.3 to ubuntu/utopic-prop...

Author: Stefan Bader
Author Date: 2014-12-11 17:23:20 UTC

Import patches-unapplied version 4.4.1-0ubuntu0.14.10.3 to ubuntu/utopic-proposed

Imported using git-ubuntu import.

Changelog parent: 3efe647a6c91330bc41ae511d3bf731516a54d1f

New changelog entries:
  * d/xen-utils-common.xen.init: Update script to start a QEMU process for
    dom0. (LP: #1396068)

applied/ubuntu/utopic 2014-10-07 19:13:37 UTC 2014-10-07
Import patches-applied version 4.4.0-0ubuntu9 to applied/ubuntu/utopic-proposed

Author: Stefan Bader
Author Date: 2014-10-07 09:05:44 UTC

Import patches-applied version 4.4.0-0ubuntu9 to applied/ubuntu/utopic-proposed

Imported using git-ubuntu import.

Changelog parent: 86302e9d514e3997cf232957f91791d01ebc0922
Unapplied parent: 4dc13ded696e1031bb8d9077f0aa407df8fbd500

New changelog entries:
  * debian/scripts/xen-init-list: Modify code to only list domains started
    by the xl command (when using libxl). Also working around a bug in the
    "list -l" command of the xl toolstack which causes it to fail if there
    are domains running which are not created by xl (like via libvirt)
    (LP: #1377960).

ubuntu/utopic 2014-10-07 19:13:37 UTC 2014-10-07
Import patches-unapplied version 4.4.0-0ubuntu9 to ubuntu/utopic-proposed

Author: Stefan Bader
Author Date: 2014-10-07 09:05:44 UTC

Import patches-unapplied version 4.4.0-0ubuntu9 to ubuntu/utopic-proposed

Imported using git-ubuntu import.

Changelog parent: fc351317d4389d6d0c7ff76d6b59a3f1fa9ea8c7

New changelog entries:
  * debian/scripts/xen-init-list: Modify code to only list domains started
    by the xl command (when using libxl). Also working around a bug in the
    "list -l" command of the xl toolstack which causes it to fail if there
    are domains running which are not created by xl (like via libvirt)
    (LP: #1377960).

applied/ubuntu/saucy-updates 2014-07-09 12:58:38 UTC 2014-07-09
Import patches-applied version 4.3.0-1ubuntu1.4 to applied/ubuntu/saucy-security

Author: Stefan Bader
Author Date: 2014-06-24 06:47:00 UTC

Import patches-applied version 4.3.0-1ubuntu1.4 to applied/ubuntu/saucy-security

Imported using git-ubuntu import.

Changelog parent: b7d24eda560a1db804508d8744816234800e5dea
Unapplied parent: 0e48ffdf2deff0ee7df83a57c7d83c629bd22dff

New changelog entries:
  * Applying Xen Security Advisories:
    - CVE-2014-2599 / XSA-89
      * x86: enforce preemption in HVM_set_mem_access / p2m_set_mem_access()
    - CVE-2014-3124 / XSA-92
      * x86/HVM: restrict HVMOP_set_mem_type
    - CVE-2014-3967,CVE-2014-3968 / XSA-96
      * x86/HVM: eliminate vulnerabilities from hvm_inject_msi()
    - CVE-2014-4021 / XSA-100
      * AMD IOMMU: don't free page table prematurely
      * page-alloc: scrub pages used by hypervisor upon freeing

ubuntu/saucy-devel 2014-07-09 12:58:38 UTC 2014-07-09
Import patches-unapplied version 4.3.0-1ubuntu1.4 to ubuntu/saucy-security

Author: Stefan Bader
Author Date: 2014-06-24 06:47:00 UTC

Import patches-unapplied version 4.3.0-1ubuntu1.4 to ubuntu/saucy-security

Imported using git-ubuntu import.

Changelog parent: fb741e98cae2d6ef576a656971824b3e0dcd20ec

New changelog entries:
  * Applying Xen Security Advisories:
    - CVE-2014-2599 / XSA-89
      * x86: enforce preemption in HVM_set_mem_access / p2m_set_mem_access()
    - CVE-2014-3124 / XSA-92
      * x86/HVM: restrict HVMOP_set_mem_type
    - CVE-2014-3967,CVE-2014-3968 / XSA-96
      * x86/HVM: eliminate vulnerabilities from hvm_inject_msi()
    - CVE-2014-4021 / XSA-100
      * AMD IOMMU: don't free page table prematurely
      * page-alloc: scrub pages used by hypervisor upon freeing

applied/ubuntu/saucy-security 2014-07-09 12:58:38 UTC 2014-07-09
Import patches-applied version 4.3.0-1ubuntu1.4 to applied/ubuntu/saucy-security

Author: Stefan Bader
Author Date: 2014-06-24 06:47:00 UTC

Import patches-applied version 4.3.0-1ubuntu1.4 to applied/ubuntu/saucy-security

Imported using git-ubuntu import.

Changelog parent: b7d24eda560a1db804508d8744816234800e5dea
Unapplied parent: 0e48ffdf2deff0ee7df83a57c7d83c629bd22dff

New changelog entries:
  * Applying Xen Security Advisories:
    - CVE-2014-2599 / XSA-89
      * x86: enforce preemption in HVM_set_mem_access / p2m_set_mem_access()
    - CVE-2014-3124 / XSA-92
      * x86/HVM: restrict HVMOP_set_mem_type
    - CVE-2014-3967,CVE-2014-3968 / XSA-96
      * x86/HVM: eliminate vulnerabilities from hvm_inject_msi()
    - CVE-2014-4021 / XSA-100
      * AMD IOMMU: don't free page table prematurely
      * page-alloc: scrub pages used by hypervisor upon freeing

ubuntu/saucy-security 2014-07-09 12:58:38 UTC 2014-07-09
Import patches-unapplied version 4.3.0-1ubuntu1.4 to ubuntu/saucy-security

Author: Stefan Bader
Author Date: 2014-06-24 06:47:00 UTC

Import patches-unapplied version 4.3.0-1ubuntu1.4 to ubuntu/saucy-security

Imported using git-ubuntu import.

Changelog parent: fb741e98cae2d6ef576a656971824b3e0dcd20ec

New changelog entries:
  * Applying Xen Security Advisories:
    - CVE-2014-2599 / XSA-89
      * x86: enforce preemption in HVM_set_mem_access / p2m_set_mem_access()
    - CVE-2014-3124 / XSA-92
      * x86/HVM: restrict HVMOP_set_mem_type
    - CVE-2014-3967,CVE-2014-3968 / XSA-96
      * x86/HVM: eliminate vulnerabilities from hvm_inject_msi()
    - CVE-2014-4021 / XSA-100
      * AMD IOMMU: don't free page table prematurely
      * page-alloc: scrub pages used by hypervisor upon freeing

applied/ubuntu/saucy-devel 2014-07-09 12:58:38 UTC 2014-07-09
Import patches-applied version 4.3.0-1ubuntu1.4 to applied/ubuntu/saucy-security

Author: Stefan Bader
Author Date: 2014-06-24 06:47:00 UTC

Import patches-applied version 4.3.0-1ubuntu1.4 to applied/ubuntu/saucy-security

Imported using git-ubuntu import.

Changelog parent: b7d24eda560a1db804508d8744816234800e5dea
Unapplied parent: 0e48ffdf2deff0ee7df83a57c7d83c629bd22dff

New changelog entries:
  * Applying Xen Security Advisories:
    - CVE-2014-2599 / XSA-89
      * x86: enforce preemption in HVM_set_mem_access / p2m_set_mem_access()
    - CVE-2014-3124 / XSA-92
      * x86/HVM: restrict HVMOP_set_mem_type
    - CVE-2014-3967,CVE-2014-3968 / XSA-96
      * x86/HVM: eliminate vulnerabilities from hvm_inject_msi()
    - CVE-2014-4021 / XSA-100
      * AMD IOMMU: don't free page table prematurely
      * page-alloc: scrub pages used by hypervisor upon freeing

ubuntu/saucy-updates 2014-07-09 12:58:38 UTC 2014-07-09
Import patches-unapplied version 4.3.0-1ubuntu1.4 to ubuntu/saucy-security

Author: Stefan Bader
Author Date: 2014-06-24 06:47:00 UTC

Import patches-unapplied version 4.3.0-1ubuntu1.4 to ubuntu/saucy-security

Imported using git-ubuntu import.

Changelog parent: fb741e98cae2d6ef576a656971824b3e0dcd20ec

New changelog entries:
  * Applying Xen Security Advisories:
    - CVE-2014-2599 / XSA-89
      * x86: enforce preemption in HVM_set_mem_access / p2m_set_mem_access()
    - CVE-2014-3124 / XSA-92
      * x86/HVM: restrict HVMOP_set_mem_type
    - CVE-2014-3967,CVE-2014-3968 / XSA-96
      * x86/HVM: eliminate vulnerabilities from hvm_inject_msi()
    - CVE-2014-4021 / XSA-100
      * AMD IOMMU: don't free page table prematurely
      * page-alloc: scrub pages used by hypervisor upon freeing

applied/ubuntu/precise-proposed 2014-07-09 06:13:30 UTC 2014-07-09
Import patches-applied version 4.1.6.1-0ubuntu0.12.04.1 to applied/ubuntu/pre...

Author: Stefan Bader
Author Date: 2014-03-14 12:55:27 UTC

Import patches-applied version 4.1.6.1-0ubuntu0.12.04.1 to applied/ubuntu/precise-proposed

Imported using git-ubuntu import.

Changelog parent: f15aecc04739b92141c8aa1f2aa13af6c11075bc
Unapplied parent: 4458ce8cc0ccc49c34adcbce386b69c988842f99

New changelog entries:
  * Updating to lastest upstream stable release (LP: #1293993).
  * Update to upstream 4.1.6.1 (4.1.6 failed to build and was skipped):
    - Replacing the following security changes by upstream versions:
      * CVE-2013-1918 / XSA-45, CVE-2013-1952 / XSA-49,
        CVE-2013-2076 / XSA-52, CVE-2013-2077 / XSA-53,
        CVE-2013-2078 / XSA-54, CVE-2013-2194, CVE-2013-2195,
        CVE-2013-2196 / XSA-55, CVE-2013-2072 / XSA-56,
        CVE-2013-2211 / XSA-57, CVE-2013-1432 / XSA-58,
        XSA-61
    - Bug fixes:
      * addressing a regression from the fix for XSA-21
      * addressing a regression from the fix for XSA-46
      * bug fixes to low level system state handling, including certain
        hardware errata workarounds
  * Purged unused patches from debian/patches:
    - xen-backport-per-device-vector-map.patch
    - xen-introduce-xzalloc.patch

ubuntu/precise-proposed 2014-07-09 06:13:30 UTC 2014-07-09
Import patches-unapplied version 4.1.6.1-0ubuntu0.12.04.1 to ubuntu/precise-p...

Author: Stefan Bader
Author Date: 2014-03-14 12:55:27 UTC

Import patches-unapplied version 4.1.6.1-0ubuntu0.12.04.1 to ubuntu/precise-proposed

Imported using git-ubuntu import.

Changelog parent: 820f424a9b9ba76db97fd646fed93c62be5d06a6

New changelog entries:
  * Updating to lastest upstream stable release (LP: #1293993).
  * Update to upstream 4.1.6.1 (4.1.6 failed to build and was skipped):
    - Replacing the following security changes by upstream versions:
      * CVE-2013-1918 / XSA-45, CVE-2013-1952 / XSA-49,
        CVE-2013-2076 / XSA-52, CVE-2013-2077 / XSA-53,
        CVE-2013-2078 / XSA-54, CVE-2013-2194, CVE-2013-2195,
        CVE-2013-2196 / XSA-55, CVE-2013-2072 / XSA-56,
        CVE-2013-2211 / XSA-57, CVE-2013-1432 / XSA-58,
        XSA-61
    - Bug fixes:
      * addressing a regression from the fix for XSA-21
      * addressing a regression from the fix for XSA-46
      * bug fixes to low level system state handling, including certain
        hardware errata workarounds
  * Purged unused patches from debian/patches:
    - xen-backport-per-device-vector-map.patch
    - xen-introduce-xzalloc.patch

ubuntu/trusty 2014-04-14 17:48:21 UTC 2014-04-14
Import patches-unapplied version 4.4.0-0ubuntu5 to ubuntu/trusty-proposed

Author: Stefan Bader
Author Date: 2014-04-11 13:12:47 UTC

Import patches-unapplied version 4.4.0-0ubuntu5 to ubuntu/trusty-proposed

Imported using git-ubuntu import.

Changelog parent: b3773ac1eece69c78833528fb73730af868351d1

New changelog entries:
  * Minimal changes to make arm64 build. It produces packages, whatever
    can be done with those is somebody elses problem.

applied/ubuntu/trusty 2014-04-14 17:48:21 UTC 2014-04-14
Import patches-applied version 4.4.0-0ubuntu5 to applied/ubuntu/trusty-proposed

Author: Stefan Bader
Author Date: 2014-04-11 13:12:47 UTC

Import patches-applied version 4.4.0-0ubuntu5 to applied/ubuntu/trusty-proposed

Imported using git-ubuntu import.

Changelog parent: a3aa758e91a41be3e35c1c29ce59c9db6682eb5e
Unapplied parent: 8bfe15eabde0d1813fe85fe3fd934156c14ff7e9

New changelog entries:
  * Minimal changes to make arm64 build. It produces packages, whatever
    can be done with those is somebody elses problem.

applied/ubuntu/quantal-updates 2014-02-19 18:43:57 UTC 2014-02-19
Import patches-applied version 4.1.5-0ubuntu0.12.10.3 to applied/ubuntu/quant...

Author: Stefan Bader
Author Date: 2014-02-17 15:26:55 UTC

Import patches-applied version 4.1.5-0ubuntu0.12.10.3 to applied/ubuntu/quantal-security

Imported using git-ubuntu import.

Changelog parent: 14c4770b99c73579544b182aee35e351864c44a3
Unapplied parent: 72eeb2905ca6dda96771b589d7938c0861358fae

New changelog entries:
  * Applying Xen Security Advisories:
    - CVE-2014-1892, CVE-2014-1893 / XSA-84
      * flask: restrict allocations done by hypercall interface
    - CVE-2014-1666 / XSA-87
      * x86: PHYSDEVOP_{prepare,release}_msix are privileged
    - CVE-2014-1950 / XSA-88
      * libxc: Fix out-of-memory error handling in xc_cpupool_getinfo()

applied/ubuntu/quantal-security 2014-02-19 18:43:57 UTC 2014-02-19
Import patches-applied version 4.1.5-0ubuntu0.12.10.3 to applied/ubuntu/quant...

Author: Stefan Bader
Author Date: 2014-02-17 15:26:55 UTC

Import patches-applied version 4.1.5-0ubuntu0.12.10.3 to applied/ubuntu/quantal-security

Imported using git-ubuntu import.

Changelog parent: 14c4770b99c73579544b182aee35e351864c44a3
Unapplied parent: 72eeb2905ca6dda96771b589d7938c0861358fae

New changelog entries:
  * Applying Xen Security Advisories:
    - CVE-2014-1892, CVE-2014-1893 / XSA-84
      * flask: restrict allocations done by hypercall interface
    - CVE-2014-1666 / XSA-87
      * x86: PHYSDEVOP_{prepare,release}_msix are privileged
    - CVE-2014-1950 / XSA-88
      * libxc: Fix out-of-memory error handling in xc_cpupool_getinfo()

applied/ubuntu/quantal-devel 2014-02-19 18:43:57 UTC 2014-02-19
Import patches-applied version 4.1.5-0ubuntu0.12.10.3 to applied/ubuntu/quant...

Author: Stefan Bader
Author Date: 2014-02-17 15:26:55 UTC

Import patches-applied version 4.1.5-0ubuntu0.12.10.3 to applied/ubuntu/quantal-security

Imported using git-ubuntu import.

Changelog parent: 14c4770b99c73579544b182aee35e351864c44a3
Unapplied parent: 72eeb2905ca6dda96771b589d7938c0861358fae

New changelog entries:
  * Applying Xen Security Advisories:
    - CVE-2014-1892, CVE-2014-1893 / XSA-84
      * flask: restrict allocations done by hypercall interface
    - CVE-2014-1666 / XSA-87
      * x86: PHYSDEVOP_{prepare,release}_msix are privileged
    - CVE-2014-1950 / XSA-88
      * libxc: Fix out-of-memory error handling in xc_cpupool_getinfo()

ubuntu/quantal-devel 2014-02-19 18:43:57 UTC 2014-02-19
Import patches-unapplied version 4.1.5-0ubuntu0.12.10.3 to ubuntu/quantal-sec...

Author: Stefan Bader
Author Date: 2014-02-17 15:26:55 UTC

Import patches-unapplied version 4.1.5-0ubuntu0.12.10.3 to ubuntu/quantal-security

Imported using git-ubuntu import.

Changelog parent: e5482c5070d94af0e75d3951747de8263446487c

New changelog entries:
  * Applying Xen Security Advisories:
    - CVE-2014-1892, CVE-2014-1893 / XSA-84
      * flask: restrict allocations done by hypercall interface
    - CVE-2014-1666 / XSA-87
      * x86: PHYSDEVOP_{prepare,release}_msix are privileged
    - CVE-2014-1950 / XSA-88
      * libxc: Fix out-of-memory error handling in xc_cpupool_getinfo()

ubuntu/quantal-security 2014-02-19 18:43:57 UTC 2014-02-19
Import patches-unapplied version 4.1.5-0ubuntu0.12.10.3 to ubuntu/quantal-sec...

Author: Stefan Bader
Author Date: 2014-02-17 15:26:55 UTC

Import patches-unapplied version 4.1.5-0ubuntu0.12.10.3 to ubuntu/quantal-security

Imported using git-ubuntu import.

Changelog parent: e5482c5070d94af0e75d3951747de8263446487c

New changelog entries:
  * Applying Xen Security Advisories:
    - CVE-2014-1892, CVE-2014-1893 / XSA-84
      * flask: restrict allocations done by hypercall interface
    - CVE-2014-1666 / XSA-87
      * x86: PHYSDEVOP_{prepare,release}_msix are privileged
    - CVE-2014-1950 / XSA-88
      * libxc: Fix out-of-memory error handling in xc_cpupool_getinfo()

ubuntu/quantal-updates 2014-02-19 18:43:57 UTC 2014-02-19
Import patches-unapplied version 4.1.5-0ubuntu0.12.10.3 to ubuntu/quantal-sec...

Author: Stefan Bader
Author Date: 2014-02-17 15:26:55 UTC

Import patches-unapplied version 4.1.5-0ubuntu0.12.10.3 to ubuntu/quantal-security

Imported using git-ubuntu import.

Changelog parent: e5482c5070d94af0e75d3951747de8263446487c

New changelog entries:
  * Applying Xen Security Advisories:
    - CVE-2014-1892, CVE-2014-1893 / XSA-84
      * flask: restrict allocations done by hypercall interface
    - CVE-2014-1666 / XSA-87
      * x86: PHYSDEVOP_{prepare,release}_msix are privileged
    - CVE-2014-1950 / XSA-88
      * libxc: Fix out-of-memory error handling in xc_cpupool_getinfo()

applied/ubuntu/raring-security 2013-12-17 17:08:27 UTC 2013-12-17
Import patches-applied version 4.2.2-0ubuntu0.13.04.3 to applied/ubuntu/rarin...

Author: Stefan Bader
Author Date: 2013-12-09 18:05:22 UTC

Import patches-applied version 4.2.2-0ubuntu0.13.04.3 to applied/ubuntu/raring-security

Imported using git-ubuntu import.

Changelog parent: 432a7d058f454a8ead16326e333b4adec9ba0493
Unapplied parent: 4a3b28967c1153c24a64bdf30dee3193b0e1cd91

New changelog entries:
  * Applying Xen Security Advisories:
    - CVE-2013-4553 / XSA-74
      * Lock order reversal between page_alloc_lock and mm_rwlock
    - CVE-2013-4551 / XSA-75
      * Host crash due to guest VMX instruction execution
    - CVE-2013-4554 / XSA-76
      * Hypercalls exposed to privilege rings 1 and 2 of HVM guests
    - CVE-2013-6375 / XSA-78
      * Insufficient TLB flushing in VT-d (iommu) code
    - CVE-2013-6400 / XSA-80
      * IOMMU TLB flushing may be inadvertently suppressed
    - CVE-2013-6885 / XSA-82
      * Guest triggerable AMD CPU erratum may cause host hang

ubuntu/raring-devel 2013-12-17 17:08:27 UTC 2013-12-17
Import patches-unapplied version 4.2.2-0ubuntu0.13.04.3 to ubuntu/raring-secu...

Author: Stefan Bader
Author Date: 2013-12-09 18:05:22 UTC

Import patches-unapplied version 4.2.2-0ubuntu0.13.04.3 to ubuntu/raring-security

Imported using git-ubuntu import.

Changelog parent: 4a0409c255b505d3834a453b84ceb761aa796390

New changelog entries:
  * Applying Xen Security Advisories:
    - CVE-2013-4553 / XSA-74
      * Lock order reversal between page_alloc_lock and mm_rwlock
    - CVE-2013-4551 / XSA-75
      * Host crash due to guest VMX instruction execution
    - CVE-2013-4554 / XSA-76
      * Hypercalls exposed to privilege rings 1 and 2 of HVM guests
    - CVE-2013-6375 / XSA-78
      * Insufficient TLB flushing in VT-d (iommu) code
    - CVE-2013-6400 / XSA-80
      * IOMMU TLB flushing may be inadvertently suppressed
    - CVE-2013-6885 / XSA-82
      * Guest triggerable AMD CPU erratum may cause host hang

ubuntu/raring-security 2013-12-17 17:08:27 UTC 2013-12-17
Import patches-unapplied version 4.2.2-0ubuntu0.13.04.3 to ubuntu/raring-secu...

Author: Stefan Bader
Author Date: 2013-12-09 18:05:22 UTC

Import patches-unapplied version 4.2.2-0ubuntu0.13.04.3 to ubuntu/raring-security

Imported using git-ubuntu import.

Changelog parent: 4a0409c255b505d3834a453b84ceb761aa796390

New changelog entries:
  * Applying Xen Security Advisories:
    - CVE-2013-4553 / XSA-74
      * Lock order reversal between page_alloc_lock and mm_rwlock
    - CVE-2013-4551 / XSA-75
      * Host crash due to guest VMX instruction execution
    - CVE-2013-4554 / XSA-76
      * Hypercalls exposed to privilege rings 1 and 2 of HVM guests
    - CVE-2013-6375 / XSA-78
      * Insufficient TLB flushing in VT-d (iommu) code
    - CVE-2013-6400 / XSA-80
      * IOMMU TLB flushing may be inadvertently suppressed
    - CVE-2013-6885 / XSA-82
      * Guest triggerable AMD CPU erratum may cause host hang

ubuntu/raring-updates 2013-12-17 17:08:27 UTC 2013-12-17
Import patches-unapplied version 4.2.2-0ubuntu0.13.04.3 to ubuntu/raring-secu...

Author: Stefan Bader
Author Date: 2013-12-09 18:05:22 UTC

Import patches-unapplied version 4.2.2-0ubuntu0.13.04.3 to ubuntu/raring-security

Imported using git-ubuntu import.

Changelog parent: 4a0409c255b505d3834a453b84ceb761aa796390

New changelog entries:
  * Applying Xen Security Advisories:
    - CVE-2013-4553 / XSA-74
      * Lock order reversal between page_alloc_lock and mm_rwlock
    - CVE-2013-4551 / XSA-75
      * Host crash due to guest VMX instruction execution
    - CVE-2013-4554 / XSA-76
      * Hypercalls exposed to privilege rings 1 and 2 of HVM guests
    - CVE-2013-6375 / XSA-78
      * Insufficient TLB flushing in VT-d (iommu) code
    - CVE-2013-6400 / XSA-80
      * IOMMU TLB flushing may be inadvertently suppressed
    - CVE-2013-6885 / XSA-82
      * Guest triggerable AMD CPU erratum may cause host hang

applied/ubuntu/raring-devel 2013-12-17 17:08:27 UTC 2013-12-17
Import patches-applied version 4.2.2-0ubuntu0.13.04.3 to applied/ubuntu/rarin...

Author: Stefan Bader
Author Date: 2013-12-09 18:05:22 UTC

Import patches-applied version 4.2.2-0ubuntu0.13.04.3 to applied/ubuntu/raring-security

Imported using git-ubuntu import.

Changelog parent: 432a7d058f454a8ead16326e333b4adec9ba0493
Unapplied parent: 4a3b28967c1153c24a64bdf30dee3193b0e1cd91

New changelog entries:
  * Applying Xen Security Advisories:
    - CVE-2013-4553 / XSA-74
      * Lock order reversal between page_alloc_lock and mm_rwlock
    - CVE-2013-4551 / XSA-75
      * Host crash due to guest VMX instruction execution
    - CVE-2013-4554 / XSA-76
      * Hypercalls exposed to privilege rings 1 and 2 of HVM guests
    - CVE-2013-6375 / XSA-78
      * Insufficient TLB flushing in VT-d (iommu) code
    - CVE-2013-6400 / XSA-80
      * IOMMU TLB flushing may be inadvertently suppressed
    - CVE-2013-6885 / XSA-82
      * Guest triggerable AMD CPU erratum may cause host hang

applied/ubuntu/raring-updates 2013-12-17 17:08:27 UTC 2013-12-17
Import patches-applied version 4.2.2-0ubuntu0.13.04.3 to applied/ubuntu/rarin...

Author: Stefan Bader
Author Date: 2013-12-09 18:05:22 UTC

Import patches-applied version 4.2.2-0ubuntu0.13.04.3 to applied/ubuntu/raring-security

Imported using git-ubuntu import.

Changelog parent: 432a7d058f454a8ead16326e333b4adec9ba0493
Unapplied parent: 4a3b28967c1153c24a64bdf30dee3193b0e1cd91

New changelog entries:
  * Applying Xen Security Advisories:
    - CVE-2013-4553 / XSA-74
      * Lock order reversal between page_alloc_lock and mm_rwlock
    - CVE-2013-4551 / XSA-75
      * Host crash due to guest VMX instruction execution
    - CVE-2013-4554 / XSA-76
      * Hypercalls exposed to privilege rings 1 and 2 of HVM guests
    - CVE-2013-6375 / XSA-78
      * Insufficient TLB flushing in VT-d (iommu) code
    - CVE-2013-6400 / XSA-80
      * IOMMU TLB flushing may be inadvertently suppressed
    - CVE-2013-6885 / XSA-82
      * Guest triggerable AMD CPU erratum may cause host hang

applied/ubuntu/quantal-proposed 2013-11-22 09:53:19 UTC 2013-11-22
Import patches-applied version 4.1.5-0ubuntu0.12.10.1 to applied/ubuntu/quant...

Author: Stefan Bader
Author Date: 2013-05-02 20:14:43 UTC

Import patches-applied version 4.1.5-0ubuntu0.12.10.1 to applied/ubuntu/quantal-proposed

Imported using git-ubuntu import.

Changelog parent: ee22b800d222bb4885f3cb1c84cffbefb5af3c5a
Unapplied parent: 472ff5fd641fafb477a848acd09daa752e1159cc

New changelog entries:
  * Updating to lastest upstream stable release (LP: #1180396).
  * Update to upstream 4.1.5:
    - Replacing the following security changes by upstream versions:
      * CVE-2012-5634 / XSA-33, CVE-2013-0153 / XSA-36,
        CVE-2013-0215 / XSA-38, CVE-2012-6075 / XSA-41,
        CVE-2013-1917 / XSA-44, CVE-2013-1919 / XSA-46,
        CVE-2013-1920 / XSA-47, CVE-2013-1964 / XSA-50
    - Bug fixes:
      * ACPI APEI/ERST finally working on production systems
      * Bug fixes for other low level system state handling
      * Support for xz compressed Dom0 and DomU kernels
  * Update to upstream 4.1.4:
    - Replacing the following security changes by upstream versions:
      * CVE-2012-3494 / XSA-12, CVE-2012-3495 / XSA-13,
        CVE-2012-3496 / XSA-14, CVE-2012-3498 / XSA-16,
        CVE-2012-3515 / XSA-17, CVE-2012-4411 / XSA-19,
        CVE-2012-4535 / XSA-20, CVE-2012-4536 / XSA-21,
        CVE-2012-4537 / XSA-22, CVE-2012-4538 / XSA-23,
        CVE-2012-4539 / XSA-24, CVE-2012-4544 / XSA-25,
        CVE-2012-2625 / XSA-25, CVE-2012-5510 / XSA-26,
        CVE-2012-5511 / XSA-27, CVE-2012-5512 / XSA-28,
        CVE-2012-5513 / XSA-29, CVE-2012-5514 / XSA-30,
        CVE-2012-5515 / XSA-31
    - Bug fixes:
      * A fix for a long standing time management issue
      * Bug fixes for S3 (suspend to RAM) handling
      * Bug fixes for other low level system state handling
  * Dropping the following patches previously added as they are included
    in the upstream stable release:
    - 0008-vmx-Simplify-cr0-update-handling-by-deferring-cr4-ch.patch
    - 0009-VMX-disable-SMEP-feature-when-guest-is-in-non-paging.patch
    - 0010-VMX-Always-disable-SMEP-when-guest-is-in-non-paging-.patch
  * Fix translation import problem caused by duplicate message ID
    (LP: #1176209).
    - tools-xm-fix-duplicate-msgid.patch

ubuntu/quantal-proposed 2013-11-22 09:53:19 UTC 2013-11-22
Import patches-unapplied version 4.1.5-0ubuntu0.12.10.1 to ubuntu/quantal-pro...

Author: Stefan Bader
Author Date: 2013-05-02 20:14:43 UTC

Import patches-unapplied version 4.1.5-0ubuntu0.12.10.1 to ubuntu/quantal-proposed

Imported using git-ubuntu import.

Changelog parent: 36782fc13d3f027377b41ce46c19e05935df6b75

New changelog entries:
  * Updating to lastest upstream stable release (LP: #1180396).
  * Update to upstream 4.1.5:
    - Replacing the following security changes by upstream versions:
      * CVE-2012-5634 / XSA-33, CVE-2013-0153 / XSA-36,
        CVE-2013-0215 / XSA-38, CVE-2012-6075 / XSA-41,
        CVE-2013-1917 / XSA-44, CVE-2013-1919 / XSA-46,
        CVE-2013-1920 / XSA-47, CVE-2013-1964 / XSA-50
    - Bug fixes:
      * ACPI APEI/ERST finally working on production systems
      * Bug fixes for other low level system state handling
      * Support for xz compressed Dom0 and DomU kernels
  * Update to upstream 4.1.4:
    - Replacing the following security changes by upstream versions:
      * CVE-2012-3494 / XSA-12, CVE-2012-3495 / XSA-13,
        CVE-2012-3496 / XSA-14, CVE-2012-3498 / XSA-16,
        CVE-2012-3515 / XSA-17, CVE-2012-4411 / XSA-19,
        CVE-2012-4535 / XSA-20, CVE-2012-4536 / XSA-21,
        CVE-2012-4537 / XSA-22, CVE-2012-4538 / XSA-23,
        CVE-2012-4539 / XSA-24, CVE-2012-4544 / XSA-25,
        CVE-2012-2625 / XSA-25, CVE-2012-5510 / XSA-26,
        CVE-2012-5511 / XSA-27, CVE-2012-5512 / XSA-28,
        CVE-2012-5513 / XSA-29, CVE-2012-5514 / XSA-30,
        CVE-2012-5515 / XSA-31
    - Bug fixes:
      * A fix for a long standing time management issue
      * Bug fixes for S3 (suspend to RAM) handling
      * Bug fixes for other low level system state handling
  * Dropping the following patches previously added as they are included
    in the upstream stable release:
    - 0008-vmx-Simplify-cr0-update-handling-by-deferring-cr4-ch.patch
    - 0009-VMX-disable-SMEP-feature-when-guest-is-in-non-paging.patch
    - 0010-VMX-Always-disable-SMEP-when-guest-is-in-non-paging-.patch
  * Fix translation import problem caused by duplicate message ID
    (LP: #1176209).
    - tools-xm-fix-duplicate-msgid.patch

debian/squeeze 2013-10-19 16:50:21 UTC 2013-10-19
Import patches-unapplied version 4.0.1-5.11 to debian/squeeze

Author: Guido Trotter
Author Date: 2013-05-02 14:19:40 UTC

Import patches-unapplied version 4.0.1-5.11 to debian/squeeze

Imported using git-ubuntu import.

Changelog parent: fdb17b141228ebe3cbd584bb019c295172456c3f

New changelog entries:
  * Apply fix for Xen Security Advisory 45 (CVE-2013-1918)
  * Apply fix for Xen Security Advisory 49 (CVE-2013-1952)
  * Apply fix for Xen Security Advisory 50 (CVE-2013-1964)
  * Apply fix for Xen Security Advisory 44 (CVE-2013-1917)
    - x86: clear EFLAGS.NT in SYSENTER entry path
  * Apply fix for Xen Security Advisory 46 (CVE_2013-1919)
    - x86: fix various issues with handling guest IRQs
  * Correct fix for CVE-2012-4544 (Closes: #702046)
  * Non-maintainer upload, previously discussed with Guido.
  * Apply fix for Xen Security Advisory 25 (CVE-2012-4544)
    - libxc: Do not use dom0 physmem as parameter to lzma decoder
    - libxc: builder: limit maximum size of kernel/ramdisk
  * Apply fix for Xen Security Advisory 27 (CVE-2012-5511)
    - hvm: Limit the size of large HVM op batches
    - x86/mm: Fix loop increment in paging_log_dirty_range()
  * Apply fix for Xen Security Advisory 33 (CVE-2012-5634)
    - VT-d: fix interrupt remapping source validation for devices behind legacy
      bridges
  * Apply fix for Xen Security Advisory 36 (CVE-2013-0153)
    - AMD IOMMU: Fix an interrupt remapping issue
    - Backport per-device vector map patches to xen 4.1.3
    - x86: IRQ fix incorrect logic in __clear_irq_vector
    - x86/IRQ: prevent vector sharing within IO-APICs
    - ACPI: acpi_table_parse() should return handler's error code
    - AMD,IOMMU: Clean up old entries in remapping tables when creating new one
    - AMD,IOMMU: Disable IOMMU if SATA Combined mode is on
    - AMD,IOMMU: Make per-device interrupt remapping table default
    - AMD IOMMU: also spot missing IO-APIC entries in IVRS table

applied/debian/squeeze 2013-10-19 16:50:21 UTC 2013-10-19
Import patches-applied version 4.0.1-5.11 to applied/debian/squeeze

Author: Guido Trotter
Author Date: 2013-05-02 14:19:40 UTC

Import patches-applied version 4.0.1-5.11 to applied/debian/squeeze

Imported using git-ubuntu import.

Changelog parent: c0fb3ec84217ad28e1045fcfa4cd62d02b57817f
Unapplied parent: 657fb31cdc328bf696ba8477a0275fff3633b687

New changelog entries:
  * Apply fix for Xen Security Advisory 45 (CVE-2013-1918)
  * Apply fix for Xen Security Advisory 49 (CVE-2013-1952)
  * Apply fix for Xen Security Advisory 50 (CVE-2013-1964)
  * Apply fix for Xen Security Advisory 44 (CVE-2013-1917)
    - x86: clear EFLAGS.NT in SYSENTER entry path
  * Apply fix for Xen Security Advisory 46 (CVE_2013-1919)
    - x86: fix various issues with handling guest IRQs
  * Correct fix for CVE-2012-4544 (Closes: #702046)
  * Non-maintainer upload, previously discussed with Guido.
  * Apply fix for Xen Security Advisory 25 (CVE-2012-4544)
    - libxc: Do not use dom0 physmem as parameter to lzma decoder
    - libxc: builder: limit maximum size of kernel/ramdisk
  * Apply fix for Xen Security Advisory 27 (CVE-2012-5511)
    - hvm: Limit the size of large HVM op batches
    - x86/mm: Fix loop increment in paging_log_dirty_range()
  * Apply fix for Xen Security Advisory 33 (CVE-2012-5634)
    - VT-d: fix interrupt remapping source validation for devices behind legacy
      bridges
  * Apply fix for Xen Security Advisory 36 (CVE-2013-0153)
    - AMD IOMMU: Fix an interrupt remapping issue
    - Backport per-device vector map patches to xen 4.1.3
    - x86: IRQ fix incorrect logic in __clear_irq_vector
    - x86/IRQ: prevent vector sharing within IO-APICs
    - ACPI: acpi_table_parse() should return handler's error code
    - AMD,IOMMU: Clean up old entries in remapping tables when creating new one
    - AMD,IOMMU: Disable IOMMU if SATA Combined mode is on
    - AMD,IOMMU: Make per-device interrupt remapping table default
    - AMD IOMMU: also spot missing IO-APIC entries in IVRS table

ubuntu/saucy 2013-10-02 11:18:20 UTC 2013-10-02
Import patches-unapplied version 4.3.0-1ubuntu1 to ubuntu/saucy-proposed

Author: Stefan Bader
Author Date: 2013-09-27 13:12:17 UTC

Import patches-unapplied version 4.3.0-1ubuntu1 to ubuntu/saucy-proposed

Imported using git-ubuntu import.

Changelog parent: ac783dea95eedc4d02c053626a9af7ce9f1f87ae

New changelog entries:
  * Merge from Debian unstable. Remaining changes:
    - Add armhf to packages (except ocaml related) and create hypervisor
      and system-meta package. Modify build environment to produce Arm
      packages.
      * debian/control
      * debian/rules.gen
      * debian/rules.real
      * debian/patches/ubuntu-tools-armhf-without-ocaml.patch
        Ocaml source fail to build on Arm.
    - Re-introduce xen-hypervisor-amd64 for i386 builds. Otherwise i386
      would be rendered uninstallable.
      * debian/arch/i386/defines
      * debian/control
    - Keep qemu-dm for now (upstream qemu would not support
      migration, yet). Forward-port some patches from the old Debian
      package which still included qemu-dm:
      * debian/patches/qemu-prefix.diff
        Modify LDFLAGS to point to lib dir for qemu-dm.
      * debian/patches/qemu-disable-blktap.diff
        Blktap never went upstream.
      * debian/patches/ubuntu-qemu-disable-qemu-upstream.diff
        We want to use the binary from qemu-system-x86.
      * debian/patches/ubuntu-qemu-upstream-location.patch
        Modify tools to look for qemu-system-i386 in public path.
    - Fixup hvmloader build to find the correct PXE boot roms.
      * ubuntu-tools-firmware-etherboot-kvm-ipxe.diff
    - Add packaging dependency on libxenstore to libxen (otherwise
      libtool fails to find references for libxenlight).
      * debian/rules.real
    - Add migration helper that removes private paths from xend domain
      configs.
      * debian/scripts/Makefile
      * debian/scripts/xend-domain-config-path-strip
      * debian/xen-utils-common.postinst
    - Fix for using ulong instead of unsigned long in gdbsx.
      * debian/patches/toolchain.diff
  * First test for suitable toolstack in xendomains before using the list
    command as that causes the xapi daemon to hang.
    - debian/xen-utils-common.xendomains.init

ubuntu/saucy-proposed 2013-10-02 11:18:20 UTC 2013-10-02
Import patches-unapplied version 4.3.0-1ubuntu1 to ubuntu/saucy-proposed

Author: Stefan Bader
Author Date: 2013-09-27 13:12:17 UTC

Import patches-unapplied version 4.3.0-1ubuntu1 to ubuntu/saucy-proposed

Imported using git-ubuntu import.

Changelog parent: ac783dea95eedc4d02c053626a9af7ce9f1f87ae

New changelog entries:
  * Merge from Debian unstable. Remaining changes:
    - Add armhf to packages (except ocaml related) and create hypervisor
      and system-meta package. Modify build environment to produce Arm
      packages.
      * debian/control
      * debian/rules.gen
      * debian/rules.real
      * debian/patches/ubuntu-tools-armhf-without-ocaml.patch
        Ocaml source fail to build on Arm.
    - Re-introduce xen-hypervisor-amd64 for i386 builds. Otherwise i386
      would be rendered uninstallable.
      * debian/arch/i386/defines
      * debian/control
    - Keep qemu-dm for now (upstream qemu would not support
      migration, yet). Forward-port some patches from the old Debian
      package which still included qemu-dm:
      * debian/patches/qemu-prefix.diff
        Modify LDFLAGS to point to lib dir for qemu-dm.
      * debian/patches/qemu-disable-blktap.diff
        Blktap never went upstream.
      * debian/patches/ubuntu-qemu-disable-qemu-upstream.diff
        We want to use the binary from qemu-system-x86.
      * debian/patches/ubuntu-qemu-upstream-location.patch
        Modify tools to look for qemu-system-i386 in public path.
    - Fixup hvmloader build to find the correct PXE boot roms.
      * ubuntu-tools-firmware-etherboot-kvm-ipxe.diff
    - Add packaging dependency on libxenstore to libxen (otherwise
      libtool fails to find references for libxenlight).
      * debian/rules.real
    - Add migration helper that removes private paths from xend domain
      configs.
      * debian/scripts/Makefile
      * debian/scripts/xend-domain-config-path-strip
      * debian/xen-utils-common.postinst
    - Fix for using ulong instead of unsigned long in gdbsx.
      * debian/patches/toolchain.diff
  * First test for suitable toolstack in xendomains before using the list
    command as that causes the xapi daemon to hang.
    - debian/xen-utils-common.xendomains.init

applied/ubuntu/saucy-proposed 2013-10-02 11:18:20 UTC 2013-10-02
Import patches-applied version 4.3.0-1ubuntu1 to applied/ubuntu/saucy-proposed

Author: Stefan Bader
Author Date: 2013-09-27 13:12:17 UTC

Import patches-applied version 4.3.0-1ubuntu1 to applied/ubuntu/saucy-proposed

Imported using git-ubuntu import.

Changelog parent: 0c770e1f016711d2f64738aa52798ebc71c295f3
Unapplied parent: 5f7914031cbfff9abd73d2d2d982c3efaccb8020

New changelog entries:
  * Merge from Debian unstable. Remaining changes:
    - Add armhf to packages (except ocaml related) and create hypervisor
      and system-meta package. Modify build environment to produce Arm
      packages.
      * debian/control
      * debian/rules.gen
      * debian/rules.real
      * debian/patches/ubuntu-tools-armhf-without-ocaml.patch
        Ocaml source fail to build on Arm.
    - Re-introduce xen-hypervisor-amd64 for i386 builds. Otherwise i386
      would be rendered uninstallable.
      * debian/arch/i386/defines
      * debian/control
    - Keep qemu-dm for now (upstream qemu would not support
      migration, yet). Forward-port some patches from the old Debian
      package which still included qemu-dm:
      * debian/patches/qemu-prefix.diff
        Modify LDFLAGS to point to lib dir for qemu-dm.
      * debian/patches/qemu-disable-blktap.diff
        Blktap never went upstream.
      * debian/patches/ubuntu-qemu-disable-qemu-upstream.diff
        We want to use the binary from qemu-system-x86.
      * debian/patches/ubuntu-qemu-upstream-location.patch
        Modify tools to look for qemu-system-i386 in public path.
    - Fixup hvmloader build to find the correct PXE boot roms.
      * ubuntu-tools-firmware-etherboot-kvm-ipxe.diff
    - Add packaging dependency on libxenstore to libxen (otherwise
      libtool fails to find references for libxenlight).
      * debian/rules.real
    - Add migration helper that removes private paths from xend domain
      configs.
      * debian/scripts/Makefile
      * debian/scripts/xend-domain-config-path-strip
      * debian/xen-utils-common.postinst
    - Fix for using ulong instead of unsigned long in gdbsx.
      * debian/patches/toolchain.diff
  * First test for suitable toolstack in xendomains before using the list
    command as that causes the xapi daemon to hang.
    - debian/xen-utils-common.xendomains.init

applied/ubuntu/saucy 2013-10-02 11:18:20 UTC 2013-10-02
Import patches-applied version 4.3.0-1ubuntu1 to applied/ubuntu/saucy-proposed

Author: Stefan Bader
Author Date: 2013-09-27 13:12:17 UTC

Import patches-applied version 4.3.0-1ubuntu1 to applied/ubuntu/saucy-proposed

Imported using git-ubuntu import.

Changelog parent: 0c770e1f016711d2f64738aa52798ebc71c295f3
Unapplied parent: 5f7914031cbfff9abd73d2d2d982c3efaccb8020

New changelog entries:
  * Merge from Debian unstable. Remaining changes:
    - Add armhf to packages (except ocaml related) and create hypervisor
      and system-meta package. Modify build environment to produce Arm
      packages.
      * debian/control
      * debian/rules.gen
      * debian/rules.real
      * debian/patches/ubuntu-tools-armhf-without-ocaml.patch
        Ocaml source fail to build on Arm.
    - Re-introduce xen-hypervisor-amd64 for i386 builds. Otherwise i386
      would be rendered uninstallable.
      * debian/arch/i386/defines
      * debian/control
    - Keep qemu-dm for now (upstream qemu would not support
      migration, yet). Forward-port some patches from the old Debian
      package which still included qemu-dm:
      * debian/patches/qemu-prefix.diff
        Modify LDFLAGS to point to lib dir for qemu-dm.
      * debian/patches/qemu-disable-blktap.diff
        Blktap never went upstream.
      * debian/patches/ubuntu-qemu-disable-qemu-upstream.diff
        We want to use the binary from qemu-system-x86.
      * debian/patches/ubuntu-qemu-upstream-location.patch
        Modify tools to look for qemu-system-i386 in public path.
    - Fixup hvmloader build to find the correct PXE boot roms.
      * ubuntu-tools-firmware-etherboot-kvm-ipxe.diff
    - Add packaging dependency on libxenstore to libxen (otherwise
      libtool fails to find references for libxenlight).
      * debian/rules.real
    - Add migration helper that removes private paths from xend domain
      configs.
      * debian/scripts/Makefile
      * debian/scripts/xend-domain-config-path-strip
      * debian/xen-utils-common.postinst
    - Fix for using ulong instead of unsigned long in gdbsx.
      * debian/patches/toolchain.diff
  * First test for suitable toolstack in xendomains before using the list
    command as that causes the xapi daemon to hang.
    - debian/xen-utils-common.xendomains.init

ubuntu/raring-proposed 2013-09-19 20:13:25 UTC 2013-09-19
Import patches-unapplied version 4.2.2-0ubuntu0.13.04.1 to ubuntu/raring-prop...

Author: Stefan Bader
Author Date: 2013-08-06 12:26:05 UTC

Import patches-unapplied version 4.2.2-0ubuntu0.13.04.1 to ubuntu/raring-proposed

Imported using git-ubuntu import.

Changelog parent: bb82d03ab06f0a04f99b3b495ece132c84db02c4

New changelog entries:
  * Updating to latest upstream stable release (LP: #1180397).
    - Security patches included which replace existing changes:
      * CVE-2012-5634 / XSA-33, CVE-2013-0151 / XSA-34,
        CVE-2013-0152 / XSA-35, CVE-2013-0153 / XSA-36,
        CVE-2013-0215 / XSA-38, CVE-2012-6075 / XSA-41,
        CVE-2013-1917 / XSA-44, CVE-2013-1919 / XSA-46,
        CVE-2013-1920 / XSA-47
    - Additional security related changes, not included before:
      * CVE-2013-0154 / XSA-37: Hypervisor crash due to incorrect ASSERT
                                (debug build only)
      * CVE-2013-1922 / XSA-48: qemu-nbd format-guessing due to missing
                                format specification
    - Bug fixes
      * ACPI APEI/ERST finally working on production systems
      * Bug fixes for other low level system state handling
      * Bug fixes and improvements to the libxl tool stack
      * Bug fixes to nested virtualization
    - Dropping the following patches previously added as they are included
      in the upstream stable release:
      * 0008-vmx-Simplify-cr0-update-handling-by-deferring-cr4-ch.patch
      * 0009-VMX-disable-SMEP-feature-when-guest-is-in-non-paging.patch
      * 0010-VMX-Always-disable-SMEP-when-guest-is-in-non-paging-.patch

applied/ubuntu/raring-proposed 2013-09-19 20:13:25 UTC 2013-09-19
Import patches-applied version 4.2.2-0ubuntu0.13.04.1 to applied/ubuntu/rarin...

Author: Stefan Bader
Author Date: 2013-08-06 12:26:05 UTC

Import patches-applied version 4.2.2-0ubuntu0.13.04.1 to applied/ubuntu/raring-proposed

Imported using git-ubuntu import.

Changelog parent: 5988cd7afa790bdb1d8fb88d3715418c89cbc77d
Unapplied parent: 57a666acc83c1d869fa5e9810e03b5bc858e351f

New changelog entries:
  * Updating to latest upstream stable release (LP: #1180397).
    - Security patches included which replace existing changes:
      * CVE-2012-5634 / XSA-33, CVE-2013-0151 / XSA-34,
        CVE-2013-0152 / XSA-35, CVE-2013-0153 / XSA-36,
        CVE-2013-0215 / XSA-38, CVE-2012-6075 / XSA-41,
        CVE-2013-1917 / XSA-44, CVE-2013-1919 / XSA-46,
        CVE-2013-1920 / XSA-47
    - Additional security related changes, not included before:
      * CVE-2013-0154 / XSA-37: Hypervisor crash due to incorrect ASSERT
                                (debug build only)
      * CVE-2013-1922 / XSA-48: qemu-nbd format-guessing due to missing
                                format specification
    - Bug fixes
      * ACPI APEI/ERST finally working on production systems
      * Bug fixes for other low level system state handling
      * Bug fixes and improvements to the libxl tool stack
      * Bug fixes to nested virtualization
    - Dropping the following patches previously added as they are included
      in the upstream stable release:
      * 0008-vmx-Simplify-cr0-update-handling-by-deferring-cr4-ch.patch
      * 0009-VMX-disable-SMEP-feature-when-guest-is-in-non-paging.patch
      * 0010-VMX-Always-disable-SMEP-when-guest-is-in-non-paging-.patch

ubuntu/raring 2013-04-08 18:33:15 UTC 2013-04-08
Import patches-unapplied version 4.2.1-0ubuntu3 to ubuntu/raring-proposed

Author: Stefan Bader
Author Date: 2013-04-05 14:39:45 UTC

Import patches-unapplied version 4.2.1-0ubuntu3 to ubuntu/raring-proposed

Imported using git-ubuntu import.

Changelog parent: 96fdbea7c647b11cdf5eccaca13253d65e492399

New changelog entries:
  * Fix FTBS on i386
    - 0007-x86-Fix-i386-virtual-apic.patch
  * Fix HVM VCPUs getting stuck on boot when host supports SMEP (LP: #1157757)
    - 0008-vmx-Simplify-cr0-update-handling-by-deferring-cr4-ch.patch
    - 0009-VMX-disable-SMEP-feature-when-guest-is-in-non-paging.patch
    - 0010-VMX-Always-disable-SMEP-when-guest-is-in-non-paging-.patch

applied/ubuntu/raring 2013-04-08 18:33:15 UTC 2013-04-08
Import patches-applied version 4.2.1-0ubuntu3 to applied/ubuntu/raring-proposed

Author: Stefan Bader
Author Date: 2013-04-05 14:39:45 UTC

Import patches-applied version 4.2.1-0ubuntu3 to applied/ubuntu/raring-proposed

Imported using git-ubuntu import.

Changelog parent: fe434765fd2ef96eff1e78a40970d478dd886538
Unapplied parent: 8515303cd3c1ad7fc688bad85b390dd0bb80367b

New changelog entries:
  * Fix FTBS on i386
    - 0007-x86-Fix-i386-virtual-apic.patch
  * Fix HVM VCPUs getting stuck on boot when host supports SMEP (LP: #1157757)
    - 0008-vmx-Simplify-cr0-update-handling-by-deferring-cr4-ch.patch
    - 0009-VMX-disable-SMEP-feature-when-guest-is-in-non-paging.patch
    - 0010-VMX-Always-disable-SMEP-when-guest-is-in-non-paging-.patch

applied/ubuntu/oneiric-devel 2013-02-05 13:33:16 UTC 2013-02-05
Import patches-applied version 4.1.1-2ubuntu4.6 to applied/ubuntu/oneiric-sec...

Author: Stefan Bader
Author Date: 2013-01-30 12:37:48 UTC

Import patches-applied version 4.1.1-2ubuntu4.6 to applied/ubuntu/oneiric-security

Imported using git-ubuntu import.

Changelog parent: 44fe36989d3a8b54a29819a08f6bebd56092e55a
Unapplied parent: c75224c0f866d9bd9b21b2ca8628ffce1be3b4d3

New changelog entries:
  * Applying Xen Security Advisories:
    - ACPI: acpi_table_parse() should return handler's error code
      CVE-2013-0153 / XSA-36
    - oxenstored incorrect handling of certain Xenbus ring states
      CVE-2013-0215 / XSA-38
  * xen-introduce-xzalloc.patch
    Cherry-picked from upstream xen stable-4.1 as prerequisite for XSA-36
  * xen-backport-per-device-vector-map.patch
    Cherry-picked from upstream xen stable-4.1 as prerequisite for XSA-36
    Also fixes issues on AMD systems which could cause Dom0 to loose disks
    under heavy I/O (because PCI-E devices could use the same IOAPIC vector
    as the SMBus).

ubuntu/oneiric-devel 2013-02-05 13:33:16 UTC 2013-02-05
Import patches-unapplied version 4.1.1-2ubuntu4.6 to ubuntu/oneiric-security

Author: Stefan Bader
Author Date: 2013-01-30 12:37:48 UTC

Import patches-unapplied version 4.1.1-2ubuntu4.6 to ubuntu/oneiric-security

Imported using git-ubuntu import.

Changelog parent: b90e416fe5cdca476bbf340ad2767ff690a9e48a

New changelog entries:
  * Applying Xen Security Advisories:
    - ACPI: acpi_table_parse() should return handler's error code
      CVE-2013-0153 / XSA-36
    - oxenstored incorrect handling of certain Xenbus ring states
      CVE-2013-0215 / XSA-38
  * xen-introduce-xzalloc.patch
    Cherry-picked from upstream xen stable-4.1 as prerequisite for XSA-36
  * xen-backport-per-device-vector-map.patch
    Cherry-picked from upstream xen stable-4.1 as prerequisite for XSA-36
    Also fixes issues on AMD systems which could cause Dom0 to loose disks
    under heavy I/O (because PCI-E devices could use the same IOAPIC vector
    as the SMBus).

ubuntu/oneiric-security 2013-02-05 13:33:16 UTC 2013-02-05
Import patches-unapplied version 4.1.1-2ubuntu4.6 to ubuntu/oneiric-security

Author: Stefan Bader
Author Date: 2013-01-30 12:37:48 UTC

Import patches-unapplied version 4.1.1-2ubuntu4.6 to ubuntu/oneiric-security

Imported using git-ubuntu import.

Changelog parent: b90e416fe5cdca476bbf340ad2767ff690a9e48a

New changelog entries:
  * Applying Xen Security Advisories:
    - ACPI: acpi_table_parse() should return handler's error code
      CVE-2013-0153 / XSA-36
    - oxenstored incorrect handling of certain Xenbus ring states
      CVE-2013-0215 / XSA-38
  * xen-introduce-xzalloc.patch
    Cherry-picked from upstream xen stable-4.1 as prerequisite for XSA-36
  * xen-backport-per-device-vector-map.patch
    Cherry-picked from upstream xen stable-4.1 as prerequisite for XSA-36
    Also fixes issues on AMD systems which could cause Dom0 to loose disks
    under heavy I/O (because PCI-E devices could use the same IOAPIC vector
    as the SMBus).

applied/ubuntu/oneiric-updates 2013-02-05 13:33:16 UTC 2013-02-05
Import patches-applied version 4.1.1-2ubuntu4.6 to applied/ubuntu/oneiric-sec...

Author: Stefan Bader
Author Date: 2013-01-30 12:37:48 UTC

Import patches-applied version 4.1.1-2ubuntu4.6 to applied/ubuntu/oneiric-security

Imported using git-ubuntu import.

Changelog parent: 44fe36989d3a8b54a29819a08f6bebd56092e55a
Unapplied parent: c75224c0f866d9bd9b21b2ca8628ffce1be3b4d3

New changelog entries:
  * Applying Xen Security Advisories:
    - ACPI: acpi_table_parse() should return handler's error code
      CVE-2013-0153 / XSA-36
    - oxenstored incorrect handling of certain Xenbus ring states
      CVE-2013-0215 / XSA-38
  * xen-introduce-xzalloc.patch
    Cherry-picked from upstream xen stable-4.1 as prerequisite for XSA-36
  * xen-backport-per-device-vector-map.patch
    Cherry-picked from upstream xen stable-4.1 as prerequisite for XSA-36
    Also fixes issues on AMD systems which could cause Dom0 to loose disks
    under heavy I/O (because PCI-E devices could use the same IOAPIC vector
    as the SMBus).

applied/ubuntu/oneiric-security 2013-02-05 13:33:16 UTC 2013-02-05
Import patches-applied version 4.1.1-2ubuntu4.6 to applied/ubuntu/oneiric-sec...

Author: Stefan Bader
Author Date: 2013-01-30 12:37:48 UTC

Import patches-applied version 4.1.1-2ubuntu4.6 to applied/ubuntu/oneiric-security

Imported using git-ubuntu import.

Changelog parent: 44fe36989d3a8b54a29819a08f6bebd56092e55a
Unapplied parent: c75224c0f866d9bd9b21b2ca8628ffce1be3b4d3

New changelog entries:
  * Applying Xen Security Advisories:
    - ACPI: acpi_table_parse() should return handler's error code
      CVE-2013-0153 / XSA-36
    - oxenstored incorrect handling of certain Xenbus ring states
      CVE-2013-0215 / XSA-38
  * xen-introduce-xzalloc.patch
    Cherry-picked from upstream xen stable-4.1 as prerequisite for XSA-36
  * xen-backport-per-device-vector-map.patch
    Cherry-picked from upstream xen stable-4.1 as prerequisite for XSA-36
    Also fixes issues on AMD systems which could cause Dom0 to loose disks
    under heavy I/O (because PCI-E devices could use the same IOAPIC vector
    as the SMBus).

ubuntu/oneiric-updates 2013-02-05 13:33:16 UTC 2013-02-05
Import patches-unapplied version 4.1.1-2ubuntu4.6 to ubuntu/oneiric-security

Author: Stefan Bader
Author Date: 2013-01-30 12:37:48 UTC

Import patches-unapplied version 4.1.1-2ubuntu4.6 to ubuntu/oneiric-security

Imported using git-ubuntu import.

Changelog parent: b90e416fe5cdca476bbf340ad2767ff690a9e48a

New changelog entries:
  * Applying Xen Security Advisories:
    - ACPI: acpi_table_parse() should return handler's error code
      CVE-2013-0153 / XSA-36
    - oxenstored incorrect handling of certain Xenbus ring states
      CVE-2013-0215 / XSA-38
  * xen-introduce-xzalloc.patch
    Cherry-picked from upstream xen stable-4.1 as prerequisite for XSA-36
  * xen-backport-per-device-vector-map.patch
    Cherry-picked from upstream xen stable-4.1 as prerequisite for XSA-36
    Also fixes issues on AMD systems which could cause Dom0 to loose disks
    under heavy I/O (because PCI-E devices could use the same IOAPIC vector
    as the SMBus).

applied/ubuntu/quantal 2012-10-02 10:34:17 UTC 2012-10-02
Import patches-applied version 4.1.3-3ubuntu1 to applied/ubuntu/quantal

Author: Stefan Bader
Author Date: 2012-09-27 19:27:44 UTC

Import patches-applied version 4.1.3-3ubuntu1 to applied/ubuntu/quantal

Imported using git-ubuntu import.

Changelog parent: a460de98d11d51d9c8d29aaae2c49686aa4202c2
Unapplied parent: 4bf5cf9a8476815ebf0806accd4339d1ec3325e4

New changelog entries:
  * Merge from Debian unstable. Remaining changes:
    - libxenstore3.0: Conflict and replaces libxen3.
    - libxen-dev: Conflict and replaces libxen3-dev.
    - xenstore-utils: Conflict and replaces libxen3.
    - xen-utils-4.1: Conflict and replaces libxen3, python-xen-3.3,
      and xen-utils-4.1.
    - Change depend back to ipxe as we do not have ipxe-qemu.
    - etherboot: Change the config back to include the 8086100e.rom
    - Dropped:
      - Make sure the LDFLAGS value passed is suitable for use by ld
        rather than gcc. Right now there seem to be no LDFLAGS passed.
  * Backported AMD specific improvements from upstream Xen (LP: #1009098):
    - svm: Do not intercept RDTSC(P) when TSC scaling is supported by hardware
    - x86: Use deep C states for off-lined CPUs
    - x86/AMD: Add support for AMD's OSVW feature in guests.
    - hvm: vpmu: Enable HVM VPMU for AMD Family 12h and 14h processors

ubuntu/quantal 2012-10-02 10:34:17 UTC 2012-10-02
Import patches-unapplied version 4.1.3-3ubuntu1 to ubuntu/quantal

Author: Stefan Bader
Author Date: 2012-09-27 19:27:44 UTC

Import patches-unapplied version 4.1.3-3ubuntu1 to ubuntu/quantal

Imported using git-ubuntu import.

Changelog parent: af24820e90b2d207c7ac58eb53558901f629ef43

New changelog entries:
  * Merge from Debian unstable. Remaining changes:
    - libxenstore3.0: Conflict and replaces libxen3.
    - libxen-dev: Conflict and replaces libxen3-dev.
    - xenstore-utils: Conflict and replaces libxen3.
    - xen-utils-4.1: Conflict and replaces libxen3, python-xen-3.3,
      and xen-utils-4.1.
    - Change depend back to ipxe as we do not have ipxe-qemu.
    - etherboot: Change the config back to include the 8086100e.rom
    - Dropped:
      - Make sure the LDFLAGS value passed is suitable for use by ld
        rather than gcc. Right now there seem to be no LDFLAGS passed.
  * Backported AMD specific improvements from upstream Xen (LP: #1009098):
    - svm: Do not intercept RDTSC(P) when TSC scaling is supported by hardware
    - x86: Use deep C states for off-lined CPUs
    - x86/AMD: Add support for AMD's OSVW feature in guests.
    - hvm: vpmu: Enable HVM VPMU for AMD Family 12h and 14h processors

ubuntu/precise 2012-03-08 14:36:53 UTC 2012-03-08
Import patches-unapplied version 4.1.2-2ubuntu2 to ubuntu/precise

Author: Stefan Bader
Author Date: 2012-03-06 19:58:14 UTC

Import patches-unapplied version 4.1.2-2ubuntu2 to ubuntu/precise

Imported using git-ubuntu import.

Changelog parent: fb6152c36925f038c9a83facea8b43df8e1f180f

New changelog entries:
  * etherboot: Change the config back to include the 8086100e.rom
    (LP: #948333)

applied/ubuntu/precise 2012-03-08 14:36:53 UTC 2012-03-08
Import patches-applied version 4.1.2-2ubuntu2 to applied/ubuntu/precise

Author: Stefan Bader
Author Date: 2012-03-06 19:58:14 UTC

Import patches-applied version 4.1.2-2ubuntu2 to applied/ubuntu/precise

Imported using git-ubuntu import.

Changelog parent: 92b36864cce5da96f00d0a73a505f020538a3b72
Unapplied parent: 41517d0f24afa7dc0c3fd7663f0a9a5de152c649

New changelog entries:
  * etherboot: Change the config back to include the 8086100e.rom
    (LP: #948333)

applied/ubuntu/oneiric-proposed 2011-10-11 08:07:42 UTC 2011-10-11
Import patches-applied version 4.1.1-2ubuntu4.1 to applied/ubuntu/oneiric-pro...

Author: Chuck Short
Author Date: 2011-10-10 23:30:09 UTC

Import patches-applied version 4.1.1-2ubuntu4.1 to applied/ubuntu/oneiric-proposed

Imported using git-ubuntu import.

Changelog parent: 3cc5516196fd475130245ef89fa1f18373f48d8b
Unapplied parent: 60186767f88c4230e703fac67157cbad3fb0478c

New changelog entries:
  * debian/patches/xen-pirq-resubmit-irq.patch: Retrigger
    pirq events when asserted while processing. Thanks to Stefan Bader
    (LP: #854829)

ubuntu/oneiric-proposed 2011-10-11 08:07:42 UTC 2011-10-11
Import patches-unapplied version 4.1.1-2ubuntu4.1 to ubuntu/oneiric-proposed

Author: Chuck Short
Author Date: 2011-10-10 23:30:09 UTC

Import patches-unapplied version 4.1.1-2ubuntu4.1 to ubuntu/oneiric-proposed

Imported using git-ubuntu import.

Changelog parent: dfb57255989376e84a40c1a2874ea2b6d4850891

New changelog entries:
  * debian/patches/xen-pirq-resubmit-irq.patch: Retrigger
    pirq events when asserted while processing. Thanks to Stefan Bader
    (LP: #854829)

applied/ubuntu/oneiric 2011-10-06 14:03:40 UTC 2011-10-06
Import patches-applied version 4.1.1-2ubuntu4 to applied/ubuntu/oneiric

Author: Matthias Klose
Author Date: 2011-10-06 12:15:35 UTC

Import patches-applied version 4.1.1-2ubuntu4 to applied/ubuntu/oneiric

Imported using git-ubuntu import.

Changelog parent: d11ed78bb52fadc5033e8d1db471fc91887ec47c
Unapplied parent: ec9ce07bcff0480a7e4a1d3337d0d4d7ecb15b61

New changelog entries:
  * Rebuild to drop build records on armel and powerpc. LP: #823714.

ubuntu/oneiric 2011-10-06 14:03:40 UTC 2011-10-06
Import patches-unapplied version 4.1.1-2ubuntu4 to ubuntu/oneiric

Author: Matthias Klose
Author Date: 2011-10-06 12:15:35 UTC

Import patches-unapplied version 4.1.1-2ubuntu4 to ubuntu/oneiric

Imported using git-ubuntu import.

Changelog parent: 49d3890ca73dccc8f9985f08a9104bb8d82d8758

New changelog entries:
  * Rebuild to drop build records on armel and powerpc. LP: #823714.

ubuntu/dapper-devel 2005-12-21 06:08:45 UTC 2005-12-21
Import patches-unapplied version 2.0.6-1 to ubuntu/breezy

Author: Adam Heath
Author Date: 2005-07-06 17:35:50 UTC

Import patches-unapplied version 2.0.6-1 to ubuntu/breezy

Imported using git-ubuntu import.

Changelog parent: 37cd8f2b24c30970b277807f32bf1bb793dd24aa

New changelog entries:
  * Patches applied upstream: non-xen-init-exit.patch, add-build.patch,
    python-install.patch, disable-html-docs.patch.
  * New upstream released. Closes: #311336.
  * Remove comparison to UML from xen short description. Closes: #317066.
  * Make packages conflicts with 1.2 doc debs. Closes: #304285.
  * Add iproute to xen depends, as it uses /bin/ip. Closes: #300488,
    #317468.
  * Change priority/section to match the overrides file.
  * Mike McCallister <mike+debian@metalogue.com>,
    Tommi Virtanen <tv@debian.org>, Tom Hibbert <tom@nsp.co.nz>:
    Fix missing '.' in update-rc.d call in xen.postinst. Closes: #299384
  * New upstream.
  * Remove pic-lib.patch, tools-misc-TARGETS.patch, and clean-mttr.patch
    as they have been applied upstream(in various forms).
  * xend now starts at priority 20, stops at 21, while xendomains starts
    at 21, and stops at 20.
  * Bah, major booboo. Add /boot to debian/xen.install, so xen.gz will
    get shipped. Reported by Clint Adams <schizo@debian.org>.
  * Fix file overlap(/usr/share/doc/xen/examples/*) between xen and
    xen-docs. Reported by Tupshin Harper <tupshin@tupshin.com>.
  * Fix kernel patch generation. It was broken when I integrated with
    debian's kernel source. I used a symlink, and diff doesn't follow
    those.
  * New upstream.
  * xen.deb can now install on a plain kernel; that is, the init scripts
    exit successfully if /proc/xen/privcmd doesn't exist. This allows
    for dual-boot setups.
  * Manpages do not yet exist xend, xenperf, xensv, xfrd, nor xm. xend
    xfrd are daemons, and take little if any options. I've not had a need
    to use xenperf nor xensv yet. xm has nice built in help(xm help).
  * Upstream now requires either linux 2.4.29, or 2.6.10. Since 2.4.29 is
    not yet in debian, disable the 2.4 patch generation. Closes: #271245.
  * Not certain how the kernel-patch-xen was empty. It's not now, with
    the repackaging. Closes: #272299.
  * Xen no longer produces kernel images, so problems about missing features
    are no longer valid. Closes: #253924.
  * Acknowledge nmu bugs:
    * No longer build-depend on gcc 3.3, as the default gcc works. Closes:
      #243048.
  * Changes from Tommi Virtanen:
    * Added dh-kpatches and libcurl3-dev to Build-Depends.
    * Add /etc/xen/sv/params.py and /etc/xen/xend/params.py.
    * Add xmexample1 and xmexample2 to xen/doc/examples.
  * New upstream. Closes: #280733.
  * Repackaged from scratch.
  * Using unreleased patch management system. See debian/README.build.
    * After extracting the .dsc, there are no special steps needed
    * Those wanting to change the source, use the normal procedures for
      any package, including using interdiff(or other tool) to send a
      patch to me or the bts.
  * No longer try to do anything fancy with regard to the layout of the
    built kernels. Now, only patches are distributed. Please make use of
    the xen support in kernel-package.
  * Early preview release to #debian-devel.
  * NMU
  * Remove gcc-3.2 from Build-Depends as isn't used during build
    (Closes: #243048)

applied/ubuntu/dapper-devel 2005-12-21 06:08:45 UTC 2005-12-21
Import patches-applied version 2.0.6-1 to applied/ubuntu/breezy

Author: Adam Heath
Author Date: 2005-07-06 17:35:50 UTC

Import patches-applied version 2.0.6-1 to applied/ubuntu/breezy

Imported using git-ubuntu import.

Changelog parent: 95d2b283bd2a4577610d1d0553c68ce494c379c7
Unapplied parent: a5c91d3e76675c5eca9a4064eb52a28d34912740

New changelog entries:
  * Patches applied upstream: non-xen-init-exit.patch, add-build.patch,
    python-install.patch, disable-html-docs.patch.
  * New upstream released. Closes: #311336.
  * Remove comparison to UML from xen short description. Closes: #317066.
  * Make packages conflicts with 1.2 doc debs. Closes: #304285.
  * Add iproute to xen depends, as it uses /bin/ip. Closes: #300488,
    #317468.
  * Change priority/section to match the overrides file.
  * Mike McCallister <mike+debian@metalogue.com>,
    Tommi Virtanen <tv@debian.org>, Tom Hibbert <tom@nsp.co.nz>:
    Fix missing '.' in update-rc.d call in xen.postinst. Closes: #299384
  * New upstream.
  * Remove pic-lib.patch, tools-misc-TARGETS.patch, and clean-mttr.patch
    as they have been applied upstream(in various forms).
  * xend now starts at priority 20, stops at 21, while xendomains starts
    at 21, and stops at 20.
  * Bah, major booboo. Add /boot to debian/xen.install, so xen.gz will
    get shipped. Reported by Clint Adams <schizo@debian.org>.
  * Fix file overlap(/usr/share/doc/xen/examples/*) between xen and
    xen-docs. Reported by Tupshin Harper <tupshin@tupshin.com>.
  * Fix kernel patch generation. It was broken when I integrated with
    debian's kernel source. I used a symlink, and diff doesn't follow
    those.
  * New upstream.
  * xen.deb can now install on a plain kernel; that is, the init scripts
    exit successfully if /proc/xen/privcmd doesn't exist. This allows
    for dual-boot setups.
  * Manpages do not yet exist xend, xenperf, xensv, xfrd, nor xm. xend
    xfrd are daemons, and take little if any options. I've not had a need
    to use xenperf nor xensv yet. xm has nice built in help(xm help).
  * Upstream now requires either linux 2.4.29, or 2.6.10. Since 2.4.29 is
    not yet in debian, disable the 2.4 patch generation. Closes: #271245.
  * Not certain how the kernel-patch-xen was empty. It's not now, with
    the repackaging. Closes: #272299.
  * Xen no longer produces kernel images, so problems about missing features
    are no longer valid. Closes: #253924.
  * Acknowledge nmu bugs:
    * No longer build-depend on gcc 3.3, as the default gcc works. Closes:
      #243048.
  * Changes from Tommi Virtanen:
    * Added dh-kpatches and libcurl3-dev to Build-Depends.
    * Add /etc/xen/sv/params.py and /etc/xen/xend/params.py.
    * Add xmexample1 and xmexample2 to xen/doc/examples.
  * New upstream. Closes: #280733.
  * Repackaged from scratch.
  * Using unreleased patch management system. See debian/README.build.
    * After extracting the .dsc, there are no special steps needed
    * Those wanting to change the source, use the normal procedures for
      any package, including using interdiff(or other tool) to send a
      patch to me or the bts.
  * No longer try to do anything fancy with regard to the layout of the
    built kernels. Now, only patches are distributed. Please make use of
    the xen support in kernel-package.
  * Early preview release to #debian-devel.
  * NMU
  * Remove gcc-3.2 from Build-Depends as isn't used during build
    (Closes: #243048)

applied/ubuntu/dapper 2005-12-21 06:08:45 UTC 2005-12-21
Import patches-applied version 2.0.6-1 to applied/ubuntu/breezy

Author: Adam Heath
Author Date: 2005-07-06 17:35:50 UTC

Import patches-applied version 2.0.6-1 to applied/ubuntu/breezy

Imported using git-ubuntu import.

Changelog parent: 95d2b283bd2a4577610d1d0553c68ce494c379c7
Unapplied parent: a5c91d3e76675c5eca9a4064eb52a28d34912740

New changelog entries:
  * Patches applied upstream: non-xen-init-exit.patch, add-build.patch,
    python-install.patch, disable-html-docs.patch.
  * New upstream released. Closes: #311336.
  * Remove comparison to UML from xen short description. Closes: #317066.
  * Make packages conflicts with 1.2 doc debs. Closes: #304285.
  * Add iproute to xen depends, as it uses /bin/ip. Closes: #300488,
    #317468.
  * Change priority/section to match the overrides file.
  * Mike McCallister <mike+debian@metalogue.com>,
    Tommi Virtanen <tv@debian.org>, Tom Hibbert <tom@nsp.co.nz>:
    Fix missing '.' in update-rc.d call in xen.postinst. Closes: #299384
  * New upstream.
  * Remove pic-lib.patch, tools-misc-TARGETS.patch, and clean-mttr.patch
    as they have been applied upstream(in various forms).
  * xend now starts at priority 20, stops at 21, while xendomains starts
    at 21, and stops at 20.
  * Bah, major booboo. Add /boot to debian/xen.install, so xen.gz will
    get shipped. Reported by Clint Adams <schizo@debian.org>.
  * Fix file overlap(/usr/share/doc/xen/examples/*) between xen and
    xen-docs. Reported by Tupshin Harper <tupshin@tupshin.com>.
  * Fix kernel patch generation. It was broken when I integrated with
    debian's kernel source. I used a symlink, and diff doesn't follow
    those.
  * New upstream.
  * xen.deb can now install on a plain kernel; that is, the init scripts
    exit successfully if /proc/xen/privcmd doesn't exist. This allows
    for dual-boot setups.
  * Manpages do not yet exist xend, xenperf, xensv, xfrd, nor xm. xend
    xfrd are daemons, and take little if any options. I've not had a need
    to use xenperf nor xensv yet. xm has nice built in help(xm help).
  * Upstream now requires either linux 2.4.29, or 2.6.10. Since 2.4.29 is
    not yet in debian, disable the 2.4 patch generation. Closes: #271245.
  * Not certain how the kernel-patch-xen was empty. It's not now, with
    the repackaging. Closes: #272299.
  * Xen no longer produces kernel images, so problems about missing features
    are no longer valid. Closes: #253924.
  * Acknowledge nmu bugs:
    * No longer build-depend on gcc 3.3, as the default gcc works. Closes:
      #243048.
  * Changes from Tommi Virtanen:
    * Added dh-kpatches and libcurl3-dev to Build-Depends.
    * Add /etc/xen/sv/params.py and /etc/xen/xend/params.py.
    * Add xmexample1 and xmexample2 to xen/doc/examples.
  * New upstream. Closes: #280733.
  * Repackaged from scratch.
  * Using unreleased patch management system. See debian/README.build.
    * After extracting the .dsc, there are no special steps needed
    * Those wanting to change the source, use the normal procedures for
      any package, including using interdiff(or other tool) to send a
      patch to me or the bts.
  * No longer try to do anything fancy with regard to the layout of the
    built kernels. Now, only patches are distributed. Please make use of
    the xen support in kernel-package.
  * Early preview release to #debian-devel.
  * NMU
  * Remove gcc-3.2 from Build-Depends as isn't used during build
    (Closes: #243048)

applied/ubuntu/breezy-devel 2005-12-21 06:08:45 UTC 2005-12-21
Import patches-applied version 2.0.6-1 to applied/ubuntu/breezy

Author: Adam Heath
Author Date: 2005-07-06 17:35:50 UTC

Import patches-applied version 2.0.6-1 to applied/ubuntu/breezy

Imported using git-ubuntu import.

Changelog parent: 95d2b283bd2a4577610d1d0553c68ce494c379c7
Unapplied parent: a5c91d3e76675c5eca9a4064eb52a28d34912740

New changelog entries:
  * Patches applied upstream: non-xen-init-exit.patch, add-build.patch,
    python-install.patch, disable-html-docs.patch.
  * New upstream released. Closes: #311336.
  * Remove comparison to UML from xen short description. Closes: #317066.
  * Make packages conflicts with 1.2 doc debs. Closes: #304285.
  * Add iproute to xen depends, as it uses /bin/ip. Closes: #300488,
    #317468.
  * Change priority/section to match the overrides file.
  * Mike McCallister <mike+debian@metalogue.com>,
    Tommi Virtanen <tv@debian.org>, Tom Hibbert <tom@nsp.co.nz>:
    Fix missing '.' in update-rc.d call in xen.postinst. Closes: #299384
  * New upstream.
  * Remove pic-lib.patch, tools-misc-TARGETS.patch, and clean-mttr.patch
    as they have been applied upstream(in various forms).
  * xend now starts at priority 20, stops at 21, while xendomains starts
    at 21, and stops at 20.
  * Bah, major booboo. Add /boot to debian/xen.install, so xen.gz will
    get shipped. Reported by Clint Adams <schizo@debian.org>.
  * Fix file overlap(/usr/share/doc/xen/examples/*) between xen and
    xen-docs. Reported by Tupshin Harper <tupshin@tupshin.com>.
  * Fix kernel patch generation. It was broken when I integrated with
    debian's kernel source. I used a symlink, and diff doesn't follow
    those.
  * New upstream.
  * xen.deb can now install on a plain kernel; that is, the init scripts
    exit successfully if /proc/xen/privcmd doesn't exist. This allows
    for dual-boot setups.
  * Manpages do not yet exist xend, xenperf, xensv, xfrd, nor xm. xend
    xfrd are daemons, and take little if any options. I've not had a need
    to use xenperf nor xensv yet. xm has nice built in help(xm help).
  * Upstream now requires either linux 2.4.29, or 2.6.10. Since 2.4.29 is
    not yet in debian, disable the 2.4 patch generation. Closes: #271245.
  * Not certain how the kernel-patch-xen was empty. It's not now, with
    the repackaging. Closes: #272299.
  * Xen no longer produces kernel images, so problems about missing features
    are no longer valid. Closes: #253924.
  * Acknowledge nmu bugs:
    * No longer build-depend on gcc 3.3, as the default gcc works. Closes:
      #243048.
  * Changes from Tommi Virtanen:
    * Added dh-kpatches and libcurl3-dev to Build-Depends.
    * Add /etc/xen/sv/params.py and /etc/xen/xend/params.py.
    * Add xmexample1 and xmexample2 to xen/doc/examples.
  * New upstream. Closes: #280733.
  * Repackaged from scratch.
  * Using unreleased patch management system. See debian/README.build.
    * After extracting the .dsc, there are no special steps needed
    * Those wanting to change the source, use the normal procedures for
      any package, including using interdiff(or other tool) to send a
      patch to me or the bts.
  * No longer try to do anything fancy with regard to the layout of the
    built kernels. Now, only patches are distributed. Please make use of
    the xen support in kernel-package.
  * Early preview release to #debian-devel.
  * NMU
  * Remove gcc-3.2 from Build-Depends as isn't used during build
    (Closes: #243048)

applied/ubuntu/breezy 2005-12-21 06:08:45 UTC 2005-12-21
Import patches-applied version 2.0.6-1 to applied/ubuntu/breezy

Author: Adam Heath
Author Date: 2005-07-06 17:35:50 UTC

Import patches-applied version 2.0.6-1 to applied/ubuntu/breezy

Imported using git-ubuntu import.

Changelog parent: 95d2b283bd2a4577610d1d0553c68ce494c379c7
Unapplied parent: a5c91d3e76675c5eca9a4064eb52a28d34912740

New changelog entries:
  * Patches applied upstream: non-xen-init-exit.patch, add-build.patch,
    python-install.patch, disable-html-docs.patch.
  * New upstream released. Closes: #311336.
  * Remove comparison to UML from xen short description. Closes: #317066.
  * Make packages conflicts with 1.2 doc debs. Closes: #304285.
  * Add iproute to xen depends, as it uses /bin/ip. Closes: #300488,
    #317468.
  * Change priority/section to match the overrides file.
  * Mike McCallister <mike+debian@metalogue.com>,
    Tommi Virtanen <tv@debian.org>, Tom Hibbert <tom@nsp.co.nz>:
    Fix missing '.' in update-rc.d call in xen.postinst. Closes: #299384
  * New upstream.
  * Remove pic-lib.patch, tools-misc-TARGETS.patch, and clean-mttr.patch
    as they have been applied upstream(in various forms).
  * xend now starts at priority 20, stops at 21, while xendomains starts
    at 21, and stops at 20.
  * Bah, major booboo. Add /boot to debian/xen.install, so xen.gz will
    get shipped. Reported by Clint Adams <schizo@debian.org>.
  * Fix file overlap(/usr/share/doc/xen/examples/*) between xen and
    xen-docs. Reported by Tupshin Harper <tupshin@tupshin.com>.
  * Fix kernel patch generation. It was broken when I integrated with
    debian's kernel source. I used a symlink, and diff doesn't follow
    those.
  * New upstream.
  * xen.deb can now install on a plain kernel; that is, the init scripts
    exit successfully if /proc/xen/privcmd doesn't exist. This allows
    for dual-boot setups.
  * Manpages do not yet exist xend, xenperf, xensv, xfrd, nor xm. xend
    xfrd are daemons, and take little if any options. I've not had a need
    to use xenperf nor xensv yet. xm has nice built in help(xm help).
  * Upstream now requires either linux 2.4.29, or 2.6.10. Since 2.4.29 is
    not yet in debian, disable the 2.4 patch generation. Closes: #271245.
  * Not certain how the kernel-patch-xen was empty. It's not now, with
    the repackaging. Closes: #272299.
  * Xen no longer produces kernel images, so problems about missing features
    are no longer valid. Closes: #253924.
  * Acknowledge nmu bugs:
    * No longer build-depend on gcc 3.3, as the default gcc works. Closes:
      #243048.
  * Changes from Tommi Virtanen:
    * Added dh-kpatches and libcurl3-dev to Build-Depends.
    * Add /etc/xen/sv/params.py and /etc/xen/xend/params.py.
    * Add xmexample1 and xmexample2 to xen/doc/examples.
  * New upstream. Closes: #280733.
  * Repackaged from scratch.
  * Using unreleased patch management system. See debian/README.build.
    * After extracting the .dsc, there are no special steps needed
    * Those wanting to change the source, use the normal procedures for
      any package, including using interdiff(or other tool) to send a
      patch to me or the bts.
  * No longer try to do anything fancy with regard to the layout of the
    built kernels. Now, only patches are distributed. Please make use of
    the xen support in kernel-package.
  * Early preview release to #debian-devel.
  * NMU
  * Remove gcc-3.2 from Build-Depends as isn't used during build
    (Closes: #243048)

ubuntu/feisty-devel 2005-12-21 06:08:45 UTC 2005-12-21
Import patches-unapplied version 2.0.6-1 to ubuntu/breezy

Author: Adam Heath
Author Date: 2005-07-06 17:35:50 UTC

Import patches-unapplied version 2.0.6-1 to ubuntu/breezy

Imported using git-ubuntu import.

Changelog parent: 37cd8f2b24c30970b277807f32bf1bb793dd24aa

New changelog entries:
  * Patches applied upstream: non-xen-init-exit.patch, add-build.patch,
    python-install.patch, disable-html-docs.patch.
  * New upstream released. Closes: #311336.
  * Remove comparison to UML from xen short description. Closes: #317066.
  * Make packages conflicts with 1.2 doc debs. Closes: #304285.
  * Add iproute to xen depends, as it uses /bin/ip. Closes: #300488,
    #317468.
  * Change priority/section to match the overrides file.
  * Mike McCallister <mike+debian@metalogue.com>,
    Tommi Virtanen <tv@debian.org>, Tom Hibbert <tom@nsp.co.nz>:
    Fix missing '.' in update-rc.d call in xen.postinst. Closes: #299384
  * New upstream.
  * Remove pic-lib.patch, tools-misc-TARGETS.patch, and clean-mttr.patch
    as they have been applied upstream(in various forms).
  * xend now starts at priority 20, stops at 21, while xendomains starts
    at 21, and stops at 20.
  * Bah, major booboo. Add /boot to debian/xen.install, so xen.gz will
    get shipped. Reported by Clint Adams <schizo@debian.org>.
  * Fix file overlap(/usr/share/doc/xen/examples/*) between xen and
    xen-docs. Reported by Tupshin Harper <tupshin@tupshin.com>.
  * Fix kernel patch generation. It was broken when I integrated with
    debian's kernel source. I used a symlink, and diff doesn't follow
    those.
  * New upstream.
  * xen.deb can now install on a plain kernel; that is, the init scripts
    exit successfully if /proc/xen/privcmd doesn't exist. This allows
    for dual-boot setups.
  * Manpages do not yet exist xend, xenperf, xensv, xfrd, nor xm. xend
    xfrd are daemons, and take little if any options. I've not had a need
    to use xenperf nor xensv yet. xm has nice built in help(xm help).
  * Upstream now requires either linux 2.4.29, or 2.6.10. Since 2.4.29 is
    not yet in debian, disable the 2.4 patch generation. Closes: #271245.
  * Not certain how the kernel-patch-xen was empty. It's not now, with
    the repackaging. Closes: #272299.
  * Xen no longer produces kernel images, so problems about missing features
    are no longer valid. Closes: #253924.
  * Acknowledge nmu bugs:
    * No longer build-depend on gcc 3.3, as the default gcc works. Closes:
      #243048.
  * Changes from Tommi Virtanen:
    * Added dh-kpatches and libcurl3-dev to Build-Depends.
    * Add /etc/xen/sv/params.py and /etc/xen/xend/params.py.
    * Add xmexample1 and xmexample2 to xen/doc/examples.
  * New upstream. Closes: #280733.
  * Repackaged from scratch.
  * Using unreleased patch management system. See debian/README.build.
    * After extracting the .dsc, there are no special steps needed
    * Those wanting to change the source, use the normal procedures for
      any package, including using interdiff(or other tool) to send a
      patch to me or the bts.
  * No longer try to do anything fancy with regard to the layout of the
    built kernels. Now, only patches are distributed. Please make use of
    the xen support in kernel-package.
  * Early preview release to #debian-devel.
  * NMU
  * Remove gcc-3.2 from Build-Depends as isn't used during build
    (Closes: #243048)

ubuntu/feisty 2005-12-21 06:08:45 UTC 2005-12-21
Import patches-unapplied version 2.0.6-1 to ubuntu/breezy

Author: Adam Heath
Author Date: 2005-07-06 17:35:50 UTC

Import patches-unapplied version 2.0.6-1 to ubuntu/breezy

Imported using git-ubuntu import.

Changelog parent: 37cd8f2b24c30970b277807f32bf1bb793dd24aa

New changelog entries:
  * Patches applied upstream: non-xen-init-exit.patch, add-build.patch,
    python-install.patch, disable-html-docs.patch.
  * New upstream released. Closes: #311336.
  * Remove comparison to UML from xen short description. Closes: #317066.
  * Make packages conflicts with 1.2 doc debs. Closes: #304285.
  * Add iproute to xen depends, as it uses /bin/ip. Closes: #300488,
    #317468.
  * Change priority/section to match the overrides file.
  * Mike McCallister <mike+debian@metalogue.com>,
    Tommi Virtanen <tv@debian.org>, Tom Hibbert <tom@nsp.co.nz>:
    Fix missing '.' in update-rc.d call in xen.postinst. Closes: #299384
  * New upstream.
  * Remove pic-lib.patch, tools-misc-TARGETS.patch, and clean-mttr.patch
    as they have been applied upstream(in various forms).
  * xend now starts at priority 20, stops at 21, while xendomains starts
    at 21, and stops at 20.
  * Bah, major booboo. Add /boot to debian/xen.install, so xen.gz will
    get shipped. Reported by Clint Adams <schizo@debian.org>.
  * Fix file overlap(/usr/share/doc/xen/examples/*) between xen and
    xen-docs. Reported by Tupshin Harper <tupshin@tupshin.com>.
  * Fix kernel patch generation. It was broken when I integrated with
    debian's kernel source. I used a symlink, and diff doesn't follow
    those.
  * New upstream.
  * xen.deb can now install on a plain kernel; that is, the init scripts
    exit successfully if /proc/xen/privcmd doesn't exist. This allows
    for dual-boot setups.
  * Manpages do not yet exist xend, xenperf, xensv, xfrd, nor xm. xend
    xfrd are daemons, and take little if any options. I've not had a need
    to use xenperf nor xensv yet. xm has nice built in help(xm help).
  * Upstream now requires either linux 2.4.29, or 2.6.10. Since 2.4.29 is
    not yet in debian, disable the 2.4 patch generation. Closes: #271245.
  * Not certain how the kernel-patch-xen was empty. It's not now, with
    the repackaging. Closes: #272299.
  * Xen no longer produces kernel images, so problems about missing features
    are no longer valid. Closes: #253924.
  * Acknowledge nmu bugs:
    * No longer build-depend on gcc 3.3, as the default gcc works. Closes:
      #243048.
  * Changes from Tommi Virtanen:
    * Added dh-kpatches and libcurl3-dev to Build-Depends.
    * Add /etc/xen/sv/params.py and /etc/xen/xend/params.py.
    * Add xmexample1 and xmexample2 to xen/doc/examples.
  * New upstream. Closes: #280733.
  * Repackaged from scratch.
  * Using unreleased patch management system. See debian/README.build.
    * After extracting the .dsc, there are no special steps needed
    * Those wanting to change the source, use the normal procedures for
      any package, including using interdiff(or other tool) to send a
      patch to me or the bts.
  * No longer try to do anything fancy with regard to the layout of the
    built kernels. Now, only patches are distributed. Please make use of
    the xen support in kernel-package.
  * Early preview release to #debian-devel.
  * NMU
  * Remove gcc-3.2 from Build-Depends as isn't used during build
    (Closes: #243048)

ubuntu/breezy 2005-12-21 06:08:45 UTC 2005-12-21
Import patches-unapplied version 2.0.6-1 to ubuntu/breezy

Author: Adam Heath
Author Date: 2005-07-06 17:35:50 UTC

Import patches-unapplied version 2.0.6-1 to ubuntu/breezy

Imported using git-ubuntu import.

Changelog parent: 37cd8f2b24c30970b277807f32bf1bb793dd24aa

New changelog entries:
  * Patches applied upstream: non-xen-init-exit.patch, add-build.patch,
    python-install.patch, disable-html-docs.patch.
  * New upstream released. Closes: #311336.
  * Remove comparison to UML from xen short description. Closes: #317066.
  * Make packages conflicts with 1.2 doc debs. Closes: #304285.
  * Add iproute to xen depends, as it uses /bin/ip. Closes: #300488,
    #317468.
  * Change priority/section to match the overrides file.
  * Mike McCallister <mike+debian@metalogue.com>,
    Tommi Virtanen <tv@debian.org>, Tom Hibbert <tom@nsp.co.nz>:
    Fix missing '.' in update-rc.d call in xen.postinst. Closes: #299384
  * New upstream.
  * Remove pic-lib.patch, tools-misc-TARGETS.patch, and clean-mttr.patch
    as they have been applied upstream(in various forms).
  * xend now starts at priority 20, stops at 21, while xendomains starts
    at 21, and stops at 20.
  * Bah, major booboo. Add /boot to debian/xen.install, so xen.gz will
    get shipped. Reported by Clint Adams <schizo@debian.org>.
  * Fix file overlap(/usr/share/doc/xen/examples/*) between xen and
    xen-docs. Reported by Tupshin Harper <tupshin@tupshin.com>.
  * Fix kernel patch generation. It was broken when I integrated with
    debian's kernel source. I used a symlink, and diff doesn't follow
    those.
  * New upstream.
  * xen.deb can now install on a plain kernel; that is, the init scripts
    exit successfully if /proc/xen/privcmd doesn't exist. This allows
    for dual-boot setups.
  * Manpages do not yet exist xend, xenperf, xensv, xfrd, nor xm. xend
    xfrd are daemons, and take little if any options. I've not had a need
    to use xenperf nor xensv yet. xm has nice built in help(xm help).
  * Upstream now requires either linux 2.4.29, or 2.6.10. Since 2.4.29 is
    not yet in debian, disable the 2.4 patch generation. Closes: #271245.
  * Not certain how the kernel-patch-xen was empty. It's not now, with
    the repackaging. Closes: #272299.
  * Xen no longer produces kernel images, so problems about missing features
    are no longer valid. Closes: #253924.
  * Acknowledge nmu bugs:
    * No longer build-depend on gcc 3.3, as the default gcc works. Closes:
      #243048.
  * Changes from Tommi Virtanen:
    * Added dh-kpatches and libcurl3-dev to Build-Depends.
    * Add /etc/xen/sv/params.py and /etc/xen/xend/params.py.
    * Add xmexample1 and xmexample2 to xen/doc/examples.
  * New upstream. Closes: #280733.
  * Repackaged from scratch.
  * Using unreleased patch management system. See debian/README.build.
    * After extracting the .dsc, there are no special steps needed
    * Those wanting to change the source, use the normal procedures for
      any package, including using interdiff(or other tool) to send a
      patch to me or the bts.
  * No longer try to do anything fancy with regard to the layout of the
    built kernels. Now, only patches are distributed. Please make use of
    the xen support in kernel-package.
  * Early preview release to #debian-devel.
  * NMU
  * Remove gcc-3.2 from Build-Depends as isn't used during build
    (Closes: #243048)

ubuntu/breezy-devel 2005-12-21 06:08:45 UTC 2005-12-21
Import patches-unapplied version 2.0.6-1 to ubuntu/breezy

Author: Adam Heath
Author Date: 2005-07-06 17:35:50 UTC

Import patches-unapplied version 2.0.6-1 to ubuntu/breezy

Imported using git-ubuntu import.

Changelog parent: 37cd8f2b24c30970b277807f32bf1bb793dd24aa

New changelog entries:
  * Patches applied upstream: non-xen-init-exit.patch, add-build.patch,
    python-install.patch, disable-html-docs.patch.
  * New upstream released. Closes: #311336.
  * Remove comparison to UML from xen short description. Closes: #317066.
  * Make packages conflicts with 1.2 doc debs. Closes: #304285.
  * Add iproute to xen depends, as it uses /bin/ip. Closes: #300488,
    #317468.
  * Change priority/section to match the overrides file.
  * Mike McCallister <mike+debian@metalogue.com>,
    Tommi Virtanen <tv@debian.org>, Tom Hibbert <tom@nsp.co.nz>:
    Fix missing '.' in update-rc.d call in xen.postinst. Closes: #299384
  * New upstream.
  * Remove pic-lib.patch, tools-misc-TARGETS.patch, and clean-mttr.patch
    as they have been applied upstream(in various forms).
  * xend now starts at priority 20, stops at 21, while xendomains starts
    at 21, and stops at 20.
  * Bah, major booboo. Add /boot to debian/xen.install, so xen.gz will
    get shipped. Reported by Clint Adams <schizo@debian.org>.
  * Fix file overlap(/usr/share/doc/xen/examples/*) between xen and
    xen-docs. Reported by Tupshin Harper <tupshin@tupshin.com>.
  * Fix kernel patch generation. It was broken when I integrated with
    debian's kernel source. I used a symlink, and diff doesn't follow
    those.
  * New upstream.
  * xen.deb can now install on a plain kernel; that is, the init scripts
    exit successfully if /proc/xen/privcmd doesn't exist. This allows
    for dual-boot setups.
  * Manpages do not yet exist xend, xenperf, xensv, xfrd, nor xm. xend
    xfrd are daemons, and take little if any options. I've not had a need
    to use xenperf nor xensv yet. xm has nice built in help(xm help).
  * Upstream now requires either linux 2.4.29, or 2.6.10. Since 2.4.29 is
    not yet in debian, disable the 2.4 patch generation. Closes: #271245.
  * Not certain how the kernel-patch-xen was empty. It's not now, with
    the repackaging. Closes: #272299.
  * Xen no longer produces kernel images, so problems about missing features
    are no longer valid. Closes: #253924.
  * Acknowledge nmu bugs:
    * No longer build-depend on gcc 3.3, as the default gcc works. Closes:
      #243048.
  * Changes from Tommi Virtanen:
    * Added dh-kpatches and libcurl3-dev to Build-Depends.
    * Add /etc/xen/sv/params.py and /etc/xen/xend/params.py.
    * Add xmexample1 and xmexample2 to xen/doc/examples.
  * New upstream. Closes: #280733.
  * Repackaged from scratch.
  * Using unreleased patch management system. See debian/README.build.
    * After extracting the .dsc, there are no special steps needed
    * Those wanting to change the source, use the normal procedures for
      any package, including using interdiff(or other tool) to send a
      patch to me or the bts.
  * No longer try to do anything fancy with regard to the layout of the
    built kernels. Now, only patches are distributed. Please make use of
    the xen support in kernel-package.
  * Early preview release to #debian-devel.
  * NMU
  * Remove gcc-3.2 from Build-Depends as isn't used during build
    (Closes: #243048)

ubuntu/edgy-devel 2005-12-21 06:08:45 UTC 2005-12-21
Import patches-unapplied version 2.0.6-1 to ubuntu/breezy

Author: Adam Heath
Author Date: 2005-07-06 17:35:50 UTC

Import patches-unapplied version 2.0.6-1 to ubuntu/breezy

Imported using git-ubuntu import.

Changelog parent: 37cd8f2b24c30970b277807f32bf1bb793dd24aa

New changelog entries:
  * Patches applied upstream: non-xen-init-exit.patch, add-build.patch,
    python-install.patch, disable-html-docs.patch.
  * New upstream released. Closes: #311336.
  * Remove comparison to UML from xen short description. Closes: #317066.
  * Make packages conflicts with 1.2 doc debs. Closes: #304285.
  * Add iproute to xen depends, as it uses /bin/ip. Closes: #300488,
    #317468.
  * Change priority/section to match the overrides file.
  * Mike McCallister <mike+debian@metalogue.com>,
    Tommi Virtanen <tv@debian.org>, Tom Hibbert <tom@nsp.co.nz>:
    Fix missing '.' in update-rc.d call in xen.postinst. Closes: #299384
  * New upstream.
  * Remove pic-lib.patch, tools-misc-TARGETS.patch, and clean-mttr.patch
    as they have been applied upstream(in various forms).
  * xend now starts at priority 20, stops at 21, while xendomains starts
    at 21, and stops at 20.
  * Bah, major booboo. Add /boot to debian/xen.install, so xen.gz will
    get shipped. Reported by Clint Adams <schizo@debian.org>.
  * Fix file overlap(/usr/share/doc/xen/examples/*) between xen and
    xen-docs. Reported by Tupshin Harper <tupshin@tupshin.com>.
  * Fix kernel patch generation. It was broken when I integrated with
    debian's kernel source. I used a symlink, and diff doesn't follow
    those.
  * New upstream.
  * xen.deb can now install on a plain kernel; that is, the init scripts
    exit successfully if /proc/xen/privcmd doesn't exist. This allows
    for dual-boot setups.
  * Manpages do not yet exist xend, xenperf, xensv, xfrd, nor xm. xend
    xfrd are daemons, and take little if any options. I've not had a need
    to use xenperf nor xensv yet. xm has nice built in help(xm help).
  * Upstream now requires either linux 2.4.29, or 2.6.10. Since 2.4.29 is
    not yet in debian, disable the 2.4 patch generation. Closes: #271245.
  * Not certain how the kernel-patch-xen was empty. It's not now, with
    the repackaging. Closes: #272299.
  * Xen no longer produces kernel images, so problems about missing features
    are no longer valid. Closes: #253924.
  * Acknowledge nmu bugs:
    * No longer build-depend on gcc 3.3, as the default gcc works. Closes:
      #243048.
  * Changes from Tommi Virtanen:
    * Added dh-kpatches and libcurl3-dev to Build-Depends.
    * Add /etc/xen/sv/params.py and /etc/xen/xend/params.py.
    * Add xmexample1 and xmexample2 to xen/doc/examples.
  * New upstream. Closes: #280733.
  * Repackaged from scratch.
  * Using unreleased patch management system. See debian/README.build.
    * After extracting the .dsc, there are no special steps needed
    * Those wanting to change the source, use the normal procedures for
      any package, including using interdiff(or other tool) to send a
      patch to me or the bts.
  * No longer try to do anything fancy with regard to the layout of the
    built kernels. Now, only patches are distributed. Please make use of
    the xen support in kernel-package.
  * Early preview release to #debian-devel.
  * NMU
  * Remove gcc-3.2 from Build-Depends as isn't used during build
    (Closes: #243048)

ubuntu/edgy 2005-12-21 06:08:45 UTC 2005-12-21
Import patches-unapplied version 2.0.6-1 to ubuntu/breezy

Author: Adam Heath
Author Date: 2005-07-06 17:35:50 UTC

Import patches-unapplied version 2.0.6-1 to ubuntu/breezy

Imported using git-ubuntu import.

Changelog parent: 37cd8f2b24c30970b277807f32bf1bb793dd24aa

New changelog entries:
  * Patches applied upstream: non-xen-init-exit.patch, add-build.patch,
    python-install.patch, disable-html-docs.patch.
  * New upstream released. Closes: #311336.
  * Remove comparison to UML from xen short description. Closes: #317066.
  * Make packages conflicts with 1.2 doc debs. Closes: #304285.
  * Add iproute to xen depends, as it uses /bin/ip. Closes: #300488,
    #317468.
  * Change priority/section to match the overrides file.
  * Mike McCallister <mike+debian@metalogue.com>,
    Tommi Virtanen <tv@debian.org>, Tom Hibbert <tom@nsp.co.nz>:
    Fix missing '.' in update-rc.d call in xen.postinst. Closes: #299384
  * New upstream.
  * Remove pic-lib.patch, tools-misc-TARGETS.patch, and clean-mttr.patch
    as they have been applied upstream(in various forms).
  * xend now starts at priority 20, stops at 21, while xendomains starts
    at 21, and stops at 20.
  * Bah, major booboo. Add /boot to debian/xen.install, so xen.gz will
    get shipped. Reported by Clint Adams <schizo@debian.org>.
  * Fix file overlap(/usr/share/doc/xen/examples/*) between xen and
    xen-docs. Reported by Tupshin Harper <tupshin@tupshin.com>.
  * Fix kernel patch generation. It was broken when I integrated with
    debian's kernel source. I used a symlink, and diff doesn't follow
    those.
  * New upstream.
  * xen.deb can now install on a plain kernel; that is, the init scripts
    exit successfully if /proc/xen/privcmd doesn't exist. This allows
    for dual-boot setups.
  * Manpages do not yet exist xend, xenperf, xensv, xfrd, nor xm. xend
    xfrd are daemons, and take little if any options. I've not had a need
    to use xenperf nor xensv yet. xm has nice built in help(xm help).
  * Upstream now requires either linux 2.4.29, or 2.6.10. Since 2.4.29 is
    not yet in debian, disable the 2.4 patch generation. Closes: #271245.
  * Not certain how the kernel-patch-xen was empty. It's not now, with
    the repackaging. Closes: #272299.
  * Xen no longer produces kernel images, so problems about missing features
    are no longer valid. Closes: #253924.
  * Acknowledge nmu bugs:
    * No longer build-depend on gcc 3.3, as the default gcc works. Closes:
      #243048.
  * Changes from Tommi Virtanen:
    * Added dh-kpatches and libcurl3-dev to Build-Depends.
    * Add /etc/xen/sv/params.py and /etc/xen/xend/params.py.
    * Add xmexample1 and xmexample2 to xen/doc/examples.
  * New upstream. Closes: #280733.
  * Repackaged from scratch.
  * Using unreleased patch management system. See debian/README.build.
    * After extracting the .dsc, there are no special steps needed
    * Those wanting to change the source, use the normal procedures for
      any package, including using interdiff(or other tool) to send a
      patch to me or the bts.
  * No longer try to do anything fancy with regard to the layout of the
    built kernels. Now, only patches are distributed. Please make use of
    the xen support in kernel-package.
  * Early preview release to #debian-devel.
  * NMU
  * Remove gcc-3.2 from Build-Depends as isn't used during build
    (Closes: #243048)

ubuntu/dapper 2005-12-21 06:08:45 UTC 2005-12-21
Import patches-unapplied version 2.0.6-1 to ubuntu/breezy

Author: Adam Heath
Author Date: 2005-07-06 17:35:50 UTC

Import patches-unapplied version 2.0.6-1 to ubuntu/breezy

Imported using git-ubuntu import.

Changelog parent: 37cd8f2b24c30970b277807f32bf1bb793dd24aa

New changelog entries:
  * Patches applied upstream: non-xen-init-exit.patch, add-build.patch,
    python-install.patch, disable-html-docs.patch.
  * New upstream released. Closes: #311336.
  * Remove comparison to UML from xen short description. Closes: #317066.
  * Make packages conflicts with 1.2 doc debs. Closes: #304285.
  * Add iproute to xen depends, as it uses /bin/ip. Closes: #300488,
    #317468.
  * Change priority/section to match the overrides file.
  * Mike McCallister <mike+debian@metalogue.com>,
    Tommi Virtanen <tv@debian.org>, Tom Hibbert <tom@nsp.co.nz>:
    Fix missing '.' in update-rc.d call in xen.postinst. Closes: #299384
  * New upstream.
  * Remove pic-lib.patch, tools-misc-TARGETS.patch, and clean-mttr.patch
    as they have been applied upstream(in various forms).
  * xend now starts at priority 20, stops at 21, while xendomains starts
    at 21, and stops at 20.
  * Bah, major booboo. Add /boot to debian/xen.install, so xen.gz will
    get shipped. Reported by Clint Adams <schizo@debian.org>.
  * Fix file overlap(/usr/share/doc/xen/examples/*) between xen and
    xen-docs. Reported by Tupshin Harper <tupshin@tupshin.com>.
  * Fix kernel patch generation. It was broken when I integrated with
    debian's kernel source. I used a symlink, and diff doesn't follow
    those.
  * New upstream.
  * xen.deb can now install on a plain kernel; that is, the init scripts
    exit successfully if /proc/xen/privcmd doesn't exist. This allows
    for dual-boot setups.
  * Manpages do not yet exist xend, xenperf, xensv, xfrd, nor xm. xend
    xfrd are daemons, and take little if any options. I've not had a need
    to use xenperf nor xensv yet. xm has nice built in help(xm help).
  * Upstream now requires either linux 2.4.29, or 2.6.10. Since 2.4.29 is
    not yet in debian, disable the 2.4 patch generation. Closes: #271245.
  * Not certain how the kernel-patch-xen was empty. It's not now, with
    the repackaging. Closes: #272299.
  * Xen no longer produces kernel images, so problems about missing features
    are no longer valid. Closes: #253924.
  * Acknowledge nmu bugs:
    * No longer build-depend on gcc 3.3, as the default gcc works. Closes:
      #243048.
  * Changes from Tommi Virtanen:
    * Added dh-kpatches and libcurl3-dev to Build-Depends.
    * Add /etc/xen/sv/params.py and /etc/xen/xend/params.py.
    * Add xmexample1 and xmexample2 to xen/doc/examples.
  * New upstream. Closes: #280733.
  * Repackaged from scratch.
  * Using unreleased patch management system. See debian/README.build.
    * After extracting the .dsc, there are no special steps needed
    * Those wanting to change the source, use the normal procedures for
      any package, including using interdiff(or other tool) to send a
      patch to me or the bts.
  * No longer try to do anything fancy with regard to the layout of the
    built kernels. Now, only patches are distributed. Please make use of
    the xen support in kernel-package.
  * Early preview release to #debian-devel.
  * NMU
  * Remove gcc-3.2 from Build-Depends as isn't used during build
    (Closes: #243048)

applied/ubuntu/feisty-devel 2005-12-21 06:08:45 UTC 2005-12-21
Import patches-applied version 2.0.6-1 to applied/ubuntu/breezy

Author: Adam Heath
Author Date: 2005-07-06 17:35:50 UTC

Import patches-applied version 2.0.6-1 to applied/ubuntu/breezy

Imported using git-ubuntu import.

Changelog parent: 95d2b283bd2a4577610d1d0553c68ce494c379c7
Unapplied parent: a5c91d3e76675c5eca9a4064eb52a28d34912740

New changelog entries:
  * Patches applied upstream: non-xen-init-exit.patch, add-build.patch,
    python-install.patch, disable-html-docs.patch.
  * New upstream released. Closes: #311336.
  * Remove comparison to UML from xen short description. Closes: #317066.
  * Make packages conflicts with 1.2 doc debs. Closes: #304285.
  * Add iproute to xen depends, as it uses /bin/ip. Closes: #300488,
    #317468.
  * Change priority/section to match the overrides file.
  * Mike McCallister <mike+debian@metalogue.com>,
    Tommi Virtanen <tv@debian.org>, Tom Hibbert <tom@nsp.co.nz>:
    Fix missing '.' in update-rc.d call in xen.postinst. Closes: #299384
  * New upstream.
  * Remove pic-lib.patch, tools-misc-TARGETS.patch, and clean-mttr.patch
    as they have been applied upstream(in various forms).
  * xend now starts at priority 20, stops at 21, while xendomains starts
    at 21, and stops at 20.
  * Bah, major booboo. Add /boot to debian/xen.install, so xen.gz will
    get shipped. Reported by Clint Adams <schizo@debian.org>.
  * Fix file overlap(/usr/share/doc/xen/examples/*) between xen and
    xen-docs. Reported by Tupshin Harper <tupshin@tupshin.com>.
  * Fix kernel patch generation. It was broken when I integrated with
    debian's kernel source. I used a symlink, and diff doesn't follow
    those.
  * New upstream.
  * xen.deb can now install on a plain kernel; that is, the init scripts
    exit successfully if /proc/xen/privcmd doesn't exist. This allows
    for dual-boot setups.
  * Manpages do not yet exist xend, xenperf, xensv, xfrd, nor xm. xend
    xfrd are daemons, and take little if any options. I've not had a need
    to use xenperf nor xensv yet. xm has nice built in help(xm help).
  * Upstream now requires either linux 2.4.29, or 2.6.10. Since 2.4.29 is
    not yet in debian, disable the 2.4 patch generation. Closes: #271245.
  * Not certain how the kernel-patch-xen was empty. It's not now, with
    the repackaging. Closes: #272299.
  * Xen no longer produces kernel images, so problems about missing features
    are no longer valid. Closes: #253924.
  * Acknowledge nmu bugs:
    * No longer build-depend on gcc 3.3, as the default gcc works. Closes:
      #243048.
  * Changes from Tommi Virtanen:
    * Added dh-kpatches and libcurl3-dev to Build-Depends.
    * Add /etc/xen/sv/params.py and /etc/xen/xend/params.py.
    * Add xmexample1 and xmexample2 to xen/doc/examples.
  * New upstream. Closes: #280733.
  * Repackaged from scratch.
  * Using unreleased patch management system. See debian/README.build.
    * After extracting the .dsc, there are no special steps needed
    * Those wanting to change the source, use the normal procedures for
      any package, including using interdiff(or other tool) to send a
      patch to me or the bts.
  * No longer try to do anything fancy with regard to the layout of the
    built kernels. Now, only patches are distributed. Please make use of
    the xen support in kernel-package.
  * Early preview release to #debian-devel.
  * NMU
  * Remove gcc-3.2 from Build-Depends as isn't used during build
    (Closes: #243048)

applied/ubuntu/feisty 2005-12-21 06:08:45 UTC 2005-12-21
Import patches-applied version 2.0.6-1 to applied/ubuntu/breezy

Author: Adam Heath
Author Date: 2005-07-06 17:35:50 UTC

Import patches-applied version 2.0.6-1 to applied/ubuntu/breezy

Imported using git-ubuntu import.

Changelog parent: 95d2b283bd2a4577610d1d0553c68ce494c379c7
Unapplied parent: a5c91d3e76675c5eca9a4064eb52a28d34912740

New changelog entries:
  * Patches applied upstream: non-xen-init-exit.patch, add-build.patch,
    python-install.patch, disable-html-docs.patch.
  * New upstream released. Closes: #311336.
  * Remove comparison to UML from xen short description. Closes: #317066.
  * Make packages conflicts with 1.2 doc debs. Closes: #304285.
  * Add iproute to xen depends, as it uses /bin/ip. Closes: #300488,
    #317468.
  * Change priority/section to match the overrides file.
  * Mike McCallister <mike+debian@metalogue.com>,
    Tommi Virtanen <tv@debian.org>, Tom Hibbert <tom@nsp.co.nz>:
    Fix missing '.' in update-rc.d call in xen.postinst. Closes: #299384
  * New upstream.
  * Remove pic-lib.patch, tools-misc-TARGETS.patch, and clean-mttr.patch
    as they have been applied upstream(in various forms).
  * xend now starts at priority 20, stops at 21, while xendomains starts
    at 21, and stops at 20.
  * Bah, major booboo. Add /boot to debian/xen.install, so xen.gz will
    get shipped. Reported by Clint Adams <schizo@debian.org>.
  * Fix file overlap(/usr/share/doc/xen/examples/*) between xen and
    xen-docs. Reported by Tupshin Harper <tupshin@tupshin.com>.
  * Fix kernel patch generation. It was broken when I integrated with
    debian's kernel source. I used a symlink, and diff doesn't follow
    those.
  * New upstream.
  * xen.deb can now install on a plain kernel; that is, the init scripts
    exit successfully if /proc/xen/privcmd doesn't exist. This allows
    for dual-boot setups.
  * Manpages do not yet exist xend, xenperf, xensv, xfrd, nor xm. xend
    xfrd are daemons, and take little if any options. I've not had a need
    to use xenperf nor xensv yet. xm has nice built in help(xm help).
  * Upstream now requires either linux 2.4.29, or 2.6.10. Since 2.4.29 is
    not yet in debian, disable the 2.4 patch generation. Closes: #271245.
  * Not certain how the kernel-patch-xen was empty. It's not now, with
    the repackaging. Closes: #272299.
  * Xen no longer produces kernel images, so problems about missing features
    are no longer valid. Closes: #253924.
  * Acknowledge nmu bugs:
    * No longer build-depend on gcc 3.3, as the default gcc works. Closes:
      #243048.
  * Changes from Tommi Virtanen:
    * Added dh-kpatches and libcurl3-dev to Build-Depends.
    * Add /etc/xen/sv/params.py and /etc/xen/xend/params.py.
    * Add xmexample1 and xmexample2 to xen/doc/examples.
  * New upstream. Closes: #280733.
  * Repackaged from scratch.
  * Using unreleased patch management system. See debian/README.build.
    * After extracting the .dsc, there are no special steps needed
    * Those wanting to change the source, use the normal procedures for
      any package, including using interdiff(or other tool) to send a
      patch to me or the bts.
  * No longer try to do anything fancy with regard to the layout of the
    built kernels. Now, only patches are distributed. Please make use of
    the xen support in kernel-package.
  * Early preview release to #debian-devel.
  * NMU
  * Remove gcc-3.2 from Build-Depends as isn't used during build
    (Closes: #243048)

applied/ubuntu/edgy-devel 2005-12-21 06:08:45 UTC 2005-12-21
Import patches-applied version 2.0.6-1 to applied/ubuntu/breezy

Author: Adam Heath
Author Date: 2005-07-06 17:35:50 UTC

Import patches-applied version 2.0.6-1 to applied/ubuntu/breezy

Imported using git-ubuntu import.

Changelog parent: 95d2b283bd2a4577610d1d0553c68ce494c379c7
Unapplied parent: a5c91d3e76675c5eca9a4064eb52a28d34912740

New changelog entries:
  * Patches applied upstream: non-xen-init-exit.patch, add-build.patch,
    python-install.patch, disable-html-docs.patch.
  * New upstream released. Closes: #311336.
  * Remove comparison to UML from xen short description. Closes: #317066.
  * Make packages conflicts with 1.2 doc debs. Closes: #304285.
  * Add iproute to xen depends, as it uses /bin/ip. Closes: #300488,
    #317468.
  * Change priority/section to match the overrides file.
  * Mike McCallister <mike+debian@metalogue.com>,
    Tommi Virtanen <tv@debian.org>, Tom Hibbert <tom@nsp.co.nz>:
    Fix missing '.' in update-rc.d call in xen.postinst. Closes: #299384
  * New upstream.
  * Remove pic-lib.patch, tools-misc-TARGETS.patch, and clean-mttr.patch
    as they have been applied upstream(in various forms).
  * xend now starts at priority 20, stops at 21, while xendomains starts
    at 21, and stops at 20.
  * Bah, major booboo. Add /boot to debian/xen.install, so xen.gz will
    get shipped. Reported by Clint Adams <schizo@debian.org>.
  * Fix file overlap(/usr/share/doc/xen/examples/*) between xen and
    xen-docs. Reported by Tupshin Harper <tupshin@tupshin.com>.
  * Fix kernel patch generation. It was broken when I integrated with
    debian's kernel source. I used a symlink, and diff doesn't follow
    those.
  * New upstream.
  * xen.deb can now install on a plain kernel; that is, the init scripts
    exit successfully if /proc/xen/privcmd doesn't exist. This allows
    for dual-boot setups.
  * Manpages do not yet exist xend, xenperf, xensv, xfrd, nor xm. xend
    xfrd are daemons, and take little if any options. I've not had a need
    to use xenperf nor xensv yet. xm has nice built in help(xm help).
  * Upstream now requires either linux 2.4.29, or 2.6.10. Since 2.4.29 is
    not yet in debian, disable the 2.4 patch generation. Closes: #271245.
  * Not certain how the kernel-patch-xen was empty. It's not now, with
    the repackaging. Closes: #272299.
  * Xen no longer produces kernel images, so problems about missing features
    are no longer valid. Closes: #253924.
  * Acknowledge nmu bugs:
    * No longer build-depend on gcc 3.3, as the default gcc works. Closes:
      #243048.
  * Changes from Tommi Virtanen:
    * Added dh-kpatches and libcurl3-dev to Build-Depends.
    * Add /etc/xen/sv/params.py and /etc/xen/xend/params.py.
    * Add xmexample1 and xmexample2 to xen/doc/examples.
  * New upstream. Closes: #280733.
  * Repackaged from scratch.
  * Using unreleased patch management system. See debian/README.build.
    * After extracting the .dsc, there are no special steps needed
    * Those wanting to change the source, use the normal procedures for
      any package, including using interdiff(or other tool) to send a
      patch to me or the bts.
  * No longer try to do anything fancy with regard to the layout of the
    built kernels. Now, only patches are distributed. Please make use of
    the xen support in kernel-package.
  * Early preview release to #debian-devel.
  * NMU
  * Remove gcc-3.2 from Build-Depends as isn't used during build
    (Closes: #243048)

applied/ubuntu/edgy 2005-12-21 06:08:45 UTC 2005-12-21
Import patches-applied version 2.0.6-1 to applied/ubuntu/breezy

Author: Adam Heath
Author Date: 2005-07-06 17:35:50 UTC

Import patches-applied version 2.0.6-1 to applied/ubuntu/breezy

Imported using git-ubuntu import.

Changelog parent: 95d2b283bd2a4577610d1d0553c68ce494c379c7
Unapplied parent: a5c91d3e76675c5eca9a4064eb52a28d34912740

New changelog entries:
  * Patches applied upstream: non-xen-init-exit.patch, add-build.patch,
    python-install.patch, disable-html-docs.patch.
  * New upstream released. Closes: #311336.
  * Remove comparison to UML from xen short description. Closes: #317066.
  * Make packages conflicts with 1.2 doc debs. Closes: #304285.
  * Add iproute to xen depends, as it uses /bin/ip. Closes: #300488,
    #317468.
  * Change priority/section to match the overrides file.
  * Mike McCallister <mike+debian@metalogue.com>,
    Tommi Virtanen <tv@debian.org>, Tom Hibbert <tom@nsp.co.nz>:
    Fix missing '.' in update-rc.d call in xen.postinst. Closes: #299384
  * New upstream.
  * Remove pic-lib.patch, tools-misc-TARGETS.patch, and clean-mttr.patch
    as they have been applied upstream(in various forms).
  * xend now starts at priority 20, stops at 21, while xendomains starts
    at 21, and stops at 20.
  * Bah, major booboo. Add /boot to debian/xen.install, so xen.gz will
    get shipped. Reported by Clint Adams <schizo@debian.org>.
  * Fix file overlap(/usr/share/doc/xen/examples/*) between xen and
    xen-docs. Reported by Tupshin Harper <tupshin@tupshin.com>.
  * Fix kernel patch generation. It was broken when I integrated with
    debian's kernel source. I used a symlink, and diff doesn't follow
    those.
  * New upstream.
  * xen.deb can now install on a plain kernel; that is, the init scripts
    exit successfully if /proc/xen/privcmd doesn't exist. This allows
    for dual-boot setups.
  * Manpages do not yet exist xend, xenperf, xensv, xfrd, nor xm. xend
    xfrd are daemons, and take little if any options. I've not had a need
    to use xenperf nor xensv yet. xm has nice built in help(xm help).
  * Upstream now requires either linux 2.4.29, or 2.6.10. Since 2.4.29 is
    not yet in debian, disable the 2.4 patch generation. Closes: #271245.
  * Not certain how the kernel-patch-xen was empty. It's not now, with
    the repackaging. Closes: #272299.
  * Xen no longer produces kernel images, so problems about missing features
    are no longer valid. Closes: #253924.
  * Acknowledge nmu bugs:
    * No longer build-depend on gcc 3.3, as the default gcc works. Closes:
      #243048.
  * Changes from Tommi Virtanen:
    * Added dh-kpatches and libcurl3-dev to Build-Depends.
    * Add /etc/xen/sv/params.py and /etc/xen/xend/params.py.
    * Add xmexample1 and xmexample2 to xen/doc/examples.
  * New upstream. Closes: #280733.
  * Repackaged from scratch.
  * Using unreleased patch management system. See debian/README.build.
    * After extracting the .dsc, there are no special steps needed
    * Those wanting to change the source, use the normal procedures for
      any package, including using interdiff(or other tool) to send a
      patch to me or the bts.
  * No longer try to do anything fancy with regard to the layout of the
    built kernels. Now, only patches are distributed. Please make use of
    the xen support in kernel-package.
  * Early preview release to #debian-devel.
  * NMU
  * Remove gcc-3.2 from Build-Depends as isn't used during build
    (Closes: #243048)

ubuntu/warty 2005-12-20 16:06:07 UTC 2005-12-20
Import patches-unapplied version 1.2-4 to ubuntu/warty

Author: Adam Heath
Author Date: 2004-03-26 23:36:41 UTC

Import patches-unapplied version 1.2-4 to ubuntu/warty

Imported using git-ubuntu import.

applied/ubuntu/warty 2005-12-20 16:06:07 UTC 2005-12-20
Import patches-applied version 1.2-4 to applied/ubuntu/warty

Author: Adam Heath
Author Date: 2004-03-26 23:36:41 UTC

Import patches-applied version 1.2-4 to applied/ubuntu/warty

Imported using git-ubuntu import.

Unapplied parent: 37cd8f2b24c30970b277807f32bf1bb793dd24aa

applied/ubuntu/warty-devel 2005-12-20 16:06:07 UTC 2005-12-20
Import patches-applied version 1.2-4 to applied/ubuntu/warty

Author: Adam Heath
Author Date: 2004-03-26 23:36:41 UTC

Import patches-applied version 1.2-4 to applied/ubuntu/warty

Imported using git-ubuntu import.

Unapplied parent: 37cd8f2b24c30970b277807f32bf1bb793dd24aa

ubuntu/warty-devel 2005-12-20 16:06:07 UTC 2005-12-20
Import patches-unapplied version 1.2-4 to ubuntu/warty

Author: Adam Heath
Author Date: 2004-03-26 23:36:41 UTC

Import patches-unapplied version 1.2-4 to ubuntu/warty

Imported using git-ubuntu import.

101192 of 192 results

Other repositories

Name Last Modified
lp:ubuntu/+source/xen 2019-10-18
lp:~ubuntu-virt/ubuntu/+source/xen 2019-08-12
12 of 2 results
You can't create new repositories for xen in Ubuntu.