Gentoo Archives: gentoo-commits

From: Aric Belsito <lluixhi@×××××.com>
To: gentoo-commits@l.g.o
Subject: [gentoo-commits] proj/musl:master commit in: app-emulation/qemu/files/, app-emulation/qemu/
Date: Sat, 06 May 2017 21:27:00
Message-Id: 1494105961.65b200c42b344d8aba791abea0f568b448fadee1.lluixhi@gentoo
1 commit: 65b200c42b344d8aba791abea0f568b448fadee1
2 Author: Aric Belsito <lluixhi <AT> gmail <DOT> com>
3 AuthorDate: Sat May 6 21:26:01 2017 +0000
4 Commit: Aric Belsito <lluixhi <AT> gmail <DOT> com>
5 CommitDate: Sat May 6 21:26:01 2017 +0000
6 URL: https://gitweb.gentoo.org/proj/musl.git/commit/?id=65b200c4
7
8 app-emulation/qemu: version bump to 2.9.0-r53
9
10 app-emulation/qemu/Manifest | 14 +--
11 .../qemu/files/qemu-2.8.0-CVE-2017-2615.patch | 48 ---------
12 .../qemu/files/qemu-2.8.0-CVE-2017-2620.patch | 56 ----------
13 .../qemu/files/qemu-2.8.0-CVE-2017-2630.patch | 22 ----
14 .../qemu/files/qemu-2.8.0-CVE-2017-5667.patch | 37 -------
15 .../qemu/files/qemu-2.8.0-CVE-2017-5931.patch | 46 --------
16 .../qemu/files/qemu-2.8.0-CVE-2017-6058.patch | 112 --------------------
17 app-emulation/qemu/qemu-2.8.1-r2.ebuild | 2 +-
18 app-emulation/qemu/qemu-2.9.0-r1.ebuild | 1 +
19 ...qemu-2.8.0-r10.ebuild => qemu-2.9.0-r53.ebuild} | 117 +++++++++++----------
20 10 files changed, 69 insertions(+), 386 deletions(-)
21
22 diff --git a/app-emulation/qemu/Manifest b/app-emulation/qemu/Manifest
23 index e305941..2de0792 100644
24 --- a/app-emulation/qemu/Manifest
25 +++ b/app-emulation/qemu/Manifest
26 @@ -9,22 +9,16 @@ AUX qemu-2.8.0-CVE-2016-10028.patch 1384 SHA256 25a9f2b2014bbcbb008683211503716a
27 AUX qemu-2.8.0-CVE-2016-10155.patch 1558 SHA256 53c20d983847a716f3f708c50ffbeb9d44fd8718f39d86556ae44394d1b2a624 SHA512 4ebfba87927c9f58fe1a0aa05b5850d391698617ce7c3e002d3adfd981ed8c23d35a6863e14f52264576dda31f84dc25421d2f930547f82ccfde126137d91aea WHIRLPOOL 44366afdf52eed47c28a6e9cec1ee7c613b5bac6441cf4f7bf29b30ef6ec7504e72a2d8c873a949e46f1cfd3055a407b673d6151802ab3c957cde8faaed20903
28 AUX qemu-2.8.0-CVE-2016-9908.patch 1166 SHA256 22ef4999a3daf3c46a3c90ca20fb131545d4d0befeff7c3ca870585a3e03b7b7 SHA512 c46abda3a5b1a68c7c2e5236f8e424f4569a28ba2aea9b8ec32467e55b535492da6e4702d4758a5721f1bf222f7f2554a5e4c9a190781d60c40202a5291dcf49 WHIRLPOOL aa8087350770ecbb60049e3269ddf9d68258657ef6a088b562e344056689e578a390328dde9c5d2b5024e7fa03995b571295a1d64943d9b3882cf0c5f833dbd8
29 AUX qemu-2.8.0-CVE-2016-9912.patch 1307 SHA256 e3eac321492a9ef42d88b04877511255c3731a9bb029d7c6ab2da0aa8f09e2d8 SHA512 f9ba4f167334d9b934c37fbed21ded8b3d71e5bdbdb1f15f81d4423b0790bfa127637155d5863b563fa974f1421c4ace1f2a4e3e81e3ae3d6045b2083210b103 WHIRLPOOL 7aa8dab7b6462f142365d274e6131ca1630c396e36c851cb562c081c4243c58e2ae22cf682e51145af08befcaba395254c765cf56112a6c177e1c9a18ffb5926
30 -AUX qemu-2.8.0-CVE-2017-2615.patch 1720 SHA256 33f3f81ff8e5dacfc4f33dd48bd7833843c209f6d2bd5b3102cc5694ad85a593 SHA512 32063428286a49a12daa481ba87f1b09be6504bf24c5759aacf88ef436312a890dfe44d08457d8b426f86ce7680700d32fb21a255a6db8eb512e612c16770d36 WHIRLPOOL 9f1eed6c6c3eeb1e8991d1aa82e12a004c223bdd635ec48e433ca93d054aa3dfb5986fe01e36df157ef20c685e07595eebdf5fe16ed7cf9034e1c9ddf8304dbb
31 -AUX qemu-2.8.0-CVE-2017-2620.patch 1879 SHA256 dc898ad08d83b5a904a68513784ec009d4e19373ec9170e58d0695cf733b1bbd SHA512 4c0cba0b7abf4923f8c4720ffe8aad98cf8a4cddfa9fdf1418a5895f107bd186599f4d8a87290e9459a425e4ac464663a6d500bf016f459cb81dbd7fbc8121cb WHIRLPOOL 8c2cb5c6a8cee9c1d44fe0e03b3f8f56de4f8a8515acdda4458610f543f2e2cf6bac2161b9a8128e3aaf0c65716d5a85a9caf7041fdc05ab7e222c87568a4d68
32 -AUX qemu-2.8.0-CVE-2017-2630.patch 681 SHA256 72c675456d02f188b1ccc680fb237900d32d315272d1b3b6c3caad08bc8130e2 SHA512 1dc5006455a06a83799094afab1ec4f2f3808174530f71d234d165275af3b11160bcf6c041c8e9e3138de7bd6ec4b7810b4532c496c018f0aa71716f2d437faa WHIRLPOOL 27c7835c00f5ad368921ae8c2251cc3eaef3f018242c42517f03102129368f85b99b144f4a3eb53e546352965e6a7f031f7545237e5334ee524059d461d29a8f
33 AUX qemu-2.8.0-CVE-2017-5525-1.patch 1625 SHA256 88e253c306761017d66dca5b72184f89cebf3b617db7bc0e4b27025757a66181 SHA512 a7f82374ec4e264b065be7ba63c197d93fee230d68819bf68a0a67c84f89182d0cc0a42b9aadf53a8a903d640dacc55392174c7820379e92ad0e35c86c35a2dd WHIRLPOOL 63e192dc0e075139f18aee2d0541c75021852a7d7251321ca8fe7f9b793c72786a6aab878e308931289eab3c07c3cbbc8ad32b67de1193f85b672e16a8372495
34 AUX qemu-2.8.0-CVE-2017-5525-2.patch 1664 SHA256 ab03a1cff62164090133f0dbace9724302e806a808b18d64628d12f0bd9abad6 SHA512 ac1d89331c3fc4d0ef7af411a12654329057676e9f016cb9a4a46dc9b4e01092c17af33d095f3104e71094ae585a35a8276a98560dd97f8d045e0b9fd2f0069f WHIRLPOOL 20457d7fe5b3842c0c601068dba410586fc4b4c7fce81ba3ee436a6cfec3b1b950797d6ca9a2a573fef21a29421f8c04a34d1dfefe0b7ade03a6ca51d16d99cb
35 AUX qemu-2.8.0-CVE-2017-5552.patch 1481 SHA256 26616f16434b3aff65b1cd1ce82c6abdfbd44da8a047a5a32b1e07755c9a3e1b SHA512 3c3f5027be3bfe56c1445004bd28536e11f606cc6787fcefad3da267eb3e11b61110c8a4700fd9d6f95ce50f10a2678b2bc6f950297b949b837882a68901d6e5 WHIRLPOOL ca93726b8a0567f68fac634eef1e88c997c1e959cafb33bc6ba8871d9021591bb61be6b3635d3fac111e1e177dbbff939c93580d7f0824e752b378dbc38fbc45
36 AUX qemu-2.8.0-CVE-2017-5578.patch 1084 SHA256 a7639fc84377b23ebc55dbb1c6d8c53bb2e6230be03b2efba78108257058d8b4 SHA512 8d160d56a94ec9380640badcab29fdd05f2f665377febd1b7e71a9c619d9db963eaa74cf74a2e0287fd2f6e2a7d4bce0f8e4281b3b0292347eece52b7344243b WHIRLPOOL efd3238bf720a1051a41ea621601afeea7546cc7e48d4a7f23bc0b3277bee368bb259a2735e6290b4609e78a1e54e29fe1ba7b088824284787faddc84491d876
37 AUX qemu-2.8.0-CVE-2017-5579.patch 1132 SHA256 df32524c24aa4d7d9166bb5e159ba10023c7777b9583e920bd8590feec433580 SHA512 d4669821ae8e06a31b852a31699aa26421ce5fb6c049573cb6613515da486e390d8ddf71adb4e6c1a45a15bb468bbb45df68cbf5e9388660c9c03866becb9edd WHIRLPOOL 0d5ed483c6e3f849fc4b9568a3af4c086258ef1162a4e11baa65bcf35eeb8a505c8b7de935175fdc53e7284e23eb492a95326cdea6c690283085136cb02d3b7a
38 -AUX qemu-2.8.0-CVE-2017-5667.patch 1497 SHA256 e05e21c45d8c05392215db0bff3e161c68d64b0b9e42add18307346b3a4d4bc3 SHA512 7c518736ac09d6c37fd359a8a503713f1b76d6041038f58e7648bb69251d6039c3449593eb14a5e0f2649d12856964a42d48e4ee0bb9dc664ada2852f9ea3cbd WHIRLPOOL 0e74b2671f148fa9f31674e6dd80634064fb8d24be474eaf9ea1efcb6cf427314da75187a32eed874ea4bde19e8dfc4562d5af06893ce3beeef7de8f902dd698
39 AUX qemu-2.8.0-CVE-2017-5856.patch 2224 SHA256 92ddbba8c0d21bdae5b11ae064c21da939cbbb1fd0e6aa10477efced6bf9582f SHA512 7e043d8299d67d33c12bf5591f0881029013852df2243c2ea747fc6c4d1d6c0acffbaef7538634a60f8f875da94bb71db3e3a07972de066b7ac5d49e4d3cb906 WHIRLPOOL b5f38b059e4305b352e3807c2b7762fe856d1067431452fbbf991415ad17f25d152225d9e0ea61b5e8175e42abebbb2abdd85ac37f301ac123f81af822ff2f02
40 AUX qemu-2.8.0-CVE-2017-5857.patch 1326 SHA256 e2150a7cc92b72e3f20506b9c76b40599af8d2366d25bd9b245a0bffa66ad8eb SHA512 d6d000b57f1fb194f9554165621109b364ebdb61416bc07e2283f2d493c33e770d1b63002d62565aae1ac19ed0ad9e572c207341aa1ad023581f349f62158d30 WHIRLPOOL cbe84c67ba9bb368baf2b1842e8c7c1ee3fb720630bcd53fdbdef9e8f3efdb25c1a927d0f65c9d1f6def28defe6997943a7867e8225eb12e395a0811ad3e32a1
41 AUX qemu-2.8.0-CVE-2017-5898.patch 1412 SHA256 7f44668d51a94d19fcca0f496d8ac798fd654afe25d2998f7d07a148a836ade9 SHA512 2cd9af4957849a5d72dc0f0fbb30852870306ebc0a348cf5951df58d3029d1aae52df9261d2e4a9d7a4f132f78c390af8a049e1f109b324899bccd91e5c10d1f WHIRLPOOL c48e1fe163761880adab990683dc5d54ee31173763f11239ffee7c229bd65a2958a696dede39e7e645860980e2a7c5c6e5873e5db53872ac373d8d2415a167ab
42 -AUX qemu-2.8.0-CVE-2017-5931.patch 1696 SHA256 cdb1ea1306bf00042f13637eef78d3580e34b88c11716e62fad69931eb3d7ac6 SHA512 5b9a00f0964b153df7630655480b646e6615e831fd981642987d8691e9ddd265f64285d0e70c4f536bb370adb03a75548f7258bee8dbc2b7de15a3984fc8421b WHIRLPOOL c6d9440adf57ad1b560da03a455d9bdc3094c952f3c82a5e88fa6f2d0336ab767f0617b2916b68a5e3f5d30293749be40c12dfe93e8b7525fec9b8a453a65123
43 AUX qemu-2.8.0-CVE-2017-5973.patch 2815 SHA256 206d01053ce678e2c83174b278755e112099f76350aaa765525d344a87365ded SHA512 31b4bd1b8398d8044ace7660a049c492beda83613818a718477257e0bdf922d63423100fd59f2e8411dc952d282a7c405b916ab437b131b31c21dcf65f98edce WHIRLPOOL ea43efbdd5fdc51e1b8b5057fbe50b3911896cbda8437998ca203d34db82524eb42a77440f2490574a48f15ba1c4bbb7d9c40bfb6e99e96278a1d1912ea210a7
44 AUX qemu-2.8.0-CVE-2017-5987.patch 1889 SHA256 c4f2175970deca9b00bf657e66b8df31a02efce469eec02279a9659b9cb18bb0 SHA512 32708f91edbbb61ac444ee71b97a30138380544389f6265d7cb7aec330ebaaa7ca69844a9462c817fbda117e78748fc4fdeb655e70bcd72ddd8b112fd9619b0d WHIRLPOOL 1aa99740495c0d2a577cf13c47669aeba75ad389394736ce16fde31c91931254820accad85a6d6fee9757595bec3f222413a89fe4ca125913be7ecc97f33b365
45 -AUX qemu-2.8.0-CVE-2017-6058.patch 3797 SHA256 06c01fcd53dab66af55df164f1616d14847b2a0fd46abe7445b7e3e7b7ee77cf SHA512 1425e7df38cd44903fe78e7728d7eb3df2d8486895f38a87c4e0c63aa5cc4a2b19032d486fcb5676201242039364a1f3d34b256606b5f8ae74028432e6d50286 WHIRLPOOL 9a48c2f00ac146c29163422c10ca62e3065a36752b865b6b9e3408edf019f3585579ac074b5325777e6a405a11d0ce09da33eb6499012377f0c9ef8c52bf2840
46 AUX qemu-2.8.0-CVE-2017-6505.patch 1481 SHA256 55e3b7e65e519caef4fdd28cccb973613759cce0d67eb64c2093b4f0a4e428e1 SHA512 5326f28a9340f392e4f32e4cd5f58cae0769859e10fd4d201983d40ec6b4d094d6a0cad2638e1e6f3e5228b93af26cc4f4a155e0d94bad89d0ea9b866f535aa7 WHIRLPOOL c88312cd5e779a98c905f175d61400ef7bb59795cc1e0392da0018a158a4c435ffa07f1e6a621db6eea925a0dbb986442eab4f79f956dc1955058fc97670f390
47 AUX qemu-2.8.0-CVE-2017-7377.patch 1554 SHA256 36fbd8ec9fa7d910fde8b6b8905717b322bd23b50c2b2f925e1a2415ae306755 SHA512 195be1a75340c41aa89614aad8d07f2cf630eb10f3160cb8a86d85371ea9d7dcdbe9d49e9752ac3d6765c8d4c99c845408933b57cf21199f77ba09fcf79a02c8 WHIRLPOOL 8d7677ae3cfe18e34072ef23666c4658553a7d3b564d96e480ae432281d403242f2013d9fb189d473ab9c31def515401d22c04ba8e86d93d0369e95b1e371574
48 AUX qemu-2.8.0-F_SHLCK-and-F_EXLCK.patch 574 SHA256 d02353daa0ecfe161e938a5e54feab641b901f4a35c8f5831133676a6f53f43f SHA512 6b64750335aae1142ca9132fb766ac2aaeacfcdda0aa0cfca19afc4c3ea3806e30ce603fcec3767e40e84efb0ae8b9a23f21d46c807c13bb646be74f99e13389 WHIRLPOOL 7401c3daf162c71a5a5c3729855fddb5df95609b34c86ea0f4d872c8f132d6ac089cfb35a990af70aef8b7b63fe075a1e2be376b6db09bc70e8d51e48aded354
49 @@ -36,11 +30,9 @@ AUX qemu-2.9.0-bug616872.patch 2736 SHA256 f2f8910c8e1ce9fc9804f4fbbe978fee20ccb
50 AUX qemu-2.9.0-bug616874.patch 1048 SHA256 23eb5ae64b064e46785ae4f675fbe7c6a353f6688dd154ce98b78a0b7104a2fb SHA512 872fabc4f6eee48dff292297887b8c4a18aa6f8c2f9b7247e325c96e10ef8d72206f269d89c4a4a40ea6ad3e5082db40866b0f386f31716e749fb3a7db89d2dd WHIRLPOOL ddce30f5b22707938c2ba419264a6b731f292f0748e3891c7aa48daaa7a4b204a8bb1b4110fbd7c1836a02605e49e170a4bda6ee9eccdd2570472ff0f63c8d37
51 AUX qemu-binfmt.initd.head 1445 SHA256 a9b4b1d1ffa82d572c01f14ebfbafb4b3a4c2eb5cad5af62c059f603a9f5a277 SHA512 a735268ae9ac84d8f2f2893bf018ee6de33231fa94a823bd8502b529bb456635c1ab5cf9b440df5ede8e414291f8bf45fc53898c2f3939c50d5ec4ffa554396a WHIRLPOOL 3ec0f916d5928d464fa8416c8eac472cfa01b560bba07642ff7929799918d1c8059ac7368ff5551e6aa993027849de08035d856db7981315d8e4ec470a0f785e
52 AUX qemu-binfmt.initd.tail 245 SHA256 1b765f5212946b73b8e4d92f64d34a9d2e358ef541c02164f6d6dd93cb15e1e7 SHA512 bcca16805f8380d52cc591ea3d65a8f6e5de456730618f6aee301510edb75d235a22d4d7aeed224882210392840adb403eb53234b6cb76a4cb24533852a8b737 WHIRLPOOL 41ddd1751101646e700a6fe4ef879bd4149d646a801f97e40534051895697dcbded06a1edda51457a0d624fbf68442c3e57178a3ee8e683e35368b88d10ba4a4
53 -DIST qemu-2.8.0-CVE-2016-9602-patches.tar.xz 16264 SHA256 18ac829c6003a3f997db4030a46b422028c58fead158f0c5ffe36ad65acb84e0 SHA512 a56694d1600e4fd1ffd6bbe031a0db226fc5c88306797cc4e42d1dc6127b83d1791cb4e026988b3aad82eab84382e41077ae71e532d1d3489e179730185c0964 WHIRLPOOL 22057b001c478b2b0d97ad70393c973aefc6277d89bb5a1ae03c3c39b5182ddfbe541964761f512ed5735dc442e1f40d0a955ad5b270758e21ce815be86b24bd
54 -DIST qemu-2.8.0.tar.bz2 28368517 SHA256 dafd5d7f649907b6b617b822692f4c82e60cf29bc0fc58bc2036219b591e5e62 SHA512 50f2988d822388ba9fd1bf5dbe68359033ed7432d7f0f9790299f32f63faa6dc72979256b5632ba572d47ee3e74ed40e3e8e331dc6303ec1599f1b4367cb78c2 WHIRLPOOL 0ce4e0539657eb832e4039819e7360c792b6aa41c718f0e0d762f4933217f0d370af94b1d6d9776853575b4a6811d8c85db069bf09d21bd15399ac8b50440ff5
55 DIST qemu-2.8.1.tar.bz2 28366270 SHA256 018e4c7ed22c220395cf41f835d01505e49d0e579a548bd3d72b03809442bbcd SHA512 0397b4029cdcb77ed053c44b3579a3f34894038e6fc6b4aa88de14515f5a78bf2f41c5e865f37111529f567c85d2f1c4deefae47dde54f76eac79410e5b2bdda WHIRLPOOL c41f53f18fac44efd1c81ba9d95204d23e9a70dc9c21624177be2fe92a327428fd5704b25bc334229fa36ae395fb4c82ba3955db39719c4458343978a4d3141a
56 DIST qemu-2.9.0.tar.bz2 28720490 SHA256 00bfb217b1bb03c7a6c3261b819cfccbfb5a58e3e2ceff546327d271773c6c14 SHA512 4b28966eec0ca44681e35fcfb64a4eaef7c280b8d65c91d03f2efa37f76278fd8c1680e5798c7a30dbfcc8f3c05f4a803f48b8a2dfec3a4181bac079b2a5e422 WHIRLPOOL d79fe89eb271a56aee0cbd328e5f96999176b711afb5683d164b7b99d91e6dd2bfaf6e2ff4cd820a941c94f28116765cb07ffd5809d75c2f9654a67d56bfc0c1
57 -EBUILD qemu-2.8.0-r10.ebuild 23278 SHA256 c94a06a16fb45995d37e0bfa62dc742601c169156d30b97456d923856693efd1 SHA512 ebd5ea426efc57bb2eb78489049f212e11eb4ab70d23418ad7c04c3161a749ec638edcdd39355107762915c4f13079a3dc1555c58f3d696cd286a9fd6bd25491 WHIRLPOOL 94c220281705e2d6414a7d52b8f93373ae193f0095c88fd76d9e0b10f7a11266e3350d3b354651f87c094a3cf63e12b9374beefb839a1a9f0d17f92732786a01
58 -EBUILD qemu-2.8.1-r2.ebuild 22909 SHA256 3f2ed4696ccc6136bfb5fc003cb462a327eb29a155b11de3a9879b00e360938f SHA512 8f988bed528668188e2b113fc217130916a3f4837daf55ece21d3af7b7fa9d2230456d09d54c34c84cd69a628680196e0e7187a1bf427730e91e7f0aba7f6762 WHIRLPOOL a9b49900e1cfd02d9826d04289453d54411c051dfddeeb36b18dd00e5db4c7b289b2f8e2e0eee2455cda2df421c15c752063e231bcd3ae4fc911e4b9d0099756
59 -EBUILD qemu-2.9.0-r1.ebuild 21902 SHA256 30d866abeafb142a1aa2993b7461cbd35925034ab59dcd9f42a5a2dbda41824a SHA512 9b6675586947a2ceff1910bbde1017398ff5a835c50d3c1379166674457f554193d6212ac7ed801e14749e1a7e52f2c280d389385da4ef30b678b8341100e516 WHIRLPOOL e0a2d46e2f6ab03f9b384030e945ae991146b41045b3fc260e4871141162f58f80b3d810d2f47333aeeeadfbf6f626984f866c22f9012a002b8359e0d6497998
60 +EBUILD qemu-2.8.1-r2.ebuild 22908 SHA256 b21f2820c166fcf91f0be3f8eb323b49d8c8ccebd4c376d9dbcdebbe751bac52 SHA512 3fa48453417e0cfa4d24f11fd5f234ec8790744c65154456328a24641a6f03cffb5b50ecf2bf81388fc18b12b382042e882fa853a09ae2288beb459e8658db5e WHIRLPOOL b5881ff308b91dc53b3115e278d5cd89d5f3f5d69ea7355fea2a048e471da1c4079eb245aa262ab2c19c6d75ddac1770acab3fa1c39d2c6e74cf72d84426e16f
61 +EBUILD qemu-2.9.0-r1.ebuild 21942 SHA256 2c2274d26f203a2a064c35ccabfa8aab374e9c8748d8724ed1534e7c677236db SHA512 91fae1f84c8fb998caa4bb589cd193329e06dd7f833809f0e3986ebe12a265615598ba3182acea59e3e39253ef5d4b6ed4b87912b7d5835f7a458fccea54070b WHIRLPOOL 32543f228bf261b0abda8052e838cbdebef53b511d7006a150168299cc4f75dc9643d9bc344582413a767228bb6c8c863bce95d358d7901f9d60f470f2d19d2d
62 +EBUILD qemu-2.9.0-r53.ebuild 23331 SHA256 3c1fdefe7cdc3bb7baf28782da40dc05239b2bacdf39825d084f563070aa5185 SHA512 923c1628bfef5f645972e90ee855a0ce1060217d8b76ffd51f8bbfd3bbf042ad273b781f9a5c8fc64f7a74410bd8bf2ef1fd975d3348a8d55230008be93afcff WHIRLPOOL 1053b25130a2f0d1da4e46c38886defdebaefbc0fb95743abbcfc82b337075c20a7c9fd494909de86ea25d179c65b2766f221cef418c2a06e127db942aa3ac1d
63 MISC metadata.xml 3794 SHA256 149f7bc9927e13bbf7355972e85df6f9f198dd17fb575a7e516817d6a88018fb SHA512 10f130f225b90dacf8262247d795a247abfdcbf3ad5fbe0693e8d4db79f755984f690cb150a7eb5a8e5d669ce404145c4fbb6b200d6362319be74759fd78b6d3 WHIRLPOOL 6a5e88caeb64387f619a19fecb55c39ccf3c8dcd360523e8d61b80051001c02fe81432c55e40b3f360295b35e9f5a1f707c570baf95cad06d18c4cd484da0ceb
64
65 diff --git a/app-emulation/qemu/files/qemu-2.8.0-CVE-2017-2615.patch b/app-emulation/qemu/files/qemu-2.8.0-CVE-2017-2615.patch
66 deleted file mode 100644
67 index f0bba80..0000000
68 --- a/app-emulation/qemu/files/qemu-2.8.0-CVE-2017-2615.patch
69 +++ /dev/null
70 @@ -1,48 +0,0 @@
71 -From 62d4c6bd5263bb8413a06c80144fc678df6dfb64 Mon Sep 17 00:00:00 2001
72 -From: Li Qiang <liqiang6-s@×××.cn>
73 -Date: Wed, 1 Feb 2017 09:35:01 +0100
74 -Subject: [PATCH] cirrus: fix oob access issue (CVE-2017-2615)
75 -
76 -When doing bitblt copy in backward mode, we should minus the
77 -blt width first just like the adding in the forward mode. This
78 -can avoid the oob access of the front of vga's vram.
79 -
80 -Signed-off-by: Li Qiang <liqiang6-s@×××.cn>
81 -
82 -{ kraxel: with backward blits (negative pitch) addr is the topmost
83 - address, so check it as-is against vram size ]
84 -
85 -Cc: qemu-stable@××××××.org
86 -Cc: P J P <ppandit@××××××.com>
87 -Cc: Laszlo Ersek <lersek@××××××.com>
88 -Cc: Paolo Bonzini <pbonzini@××××××.com>
89 -Cc: Wolfgang Bumiller <w.bumiller@×××××××.com>
90 -Fixes: d3532a0db02296e687711b8cdc7791924efccea0 (CVE-2014-8106)
91 -Signed-off-by: Gerd Hoffmann <kraxel@××××××.com>
92 -Message-id: 1485938101-26602-1-git-send-email-kraxel@××××××.com
93 -Reviewed-by: Laszlo Ersek <lersek@××××××.com>
94 ----
95 - hw/display/cirrus_vga.c | 7 +++----
96 - 1 file changed, 3 insertions(+), 4 deletions(-)
97 -
98 -diff --git a/hw/display/cirrus_vga.c b/hw/display/cirrus_vga.c
99 -index 7db6409..16f27e8 100644
100 ---- a/hw/display/cirrus_vga.c
101 -+++ b/hw/display/cirrus_vga.c
102 -@@ -274,10 +274,9 @@ static bool blit_region_is_unsafe(struct CirrusVGAState *s,
103 - {
104 - if (pitch < 0) {
105 - int64_t min = addr
106 -- + ((int64_t)s->cirrus_blt_height-1) * pitch;
107 -- int32_t max = addr
108 -- + s->cirrus_blt_width;
109 -- if (min < 0 || max > s->vga.vram_size) {
110 -+ + ((int64_t)s->cirrus_blt_height - 1) * pitch
111 -+ - s->cirrus_blt_width;
112 -+ if (min < -1 || addr >= s->vga.vram_size) {
113 - return true;
114 - }
115 - } else {
116 ---
117 -2.10.2
118 -
119
120 diff --git a/app-emulation/qemu/files/qemu-2.8.0-CVE-2017-2620.patch b/app-emulation/qemu/files/qemu-2.8.0-CVE-2017-2620.patch
121 deleted file mode 100644
122 index e2a9801..0000000
123 --- a/app-emulation/qemu/files/qemu-2.8.0-CVE-2017-2620.patch
124 +++ /dev/null
125 @@ -1,56 +0,0 @@
126 -From: Gerd Hoffmann <kraxel@××××××.com>
127 -Subject: [PATCH 3/3] cirrus: add blit_is_unsafe call to cirrus_bitblt_cputovideo
128 -
129 -CIRRUS_BLTMODE_MEMSYSSRC blits do NOT check blit destination
130 -and blit width, at all. Oops. Fix it.
131 -
132 -Security impact: high.
133 -
134 -The missing blit destination check allows to write to host memory.
135 -Basically same as CVE-2014-8106 for the other blit variants.
136 -
137 -The missing blit width check allows to overflow cirrus_bltbuf,
138 -with the attractive target cirrus_srcptr (current cirrus_bltbuf write
139 -position) being located right after cirrus_bltbuf in CirrusVGAState.
140 -
141 -Due to cirrus emulation writing cirrus_bltbuf bytewise the attacker
142 -hasn't full control over cirrus_srcptr though, only one byte can be
143 -changed. Once the first byte has been modified further writes land
144 -elsewhere.
145 -
146 -[ This is CVE-2017-2620 / XSA-209 - Ian Jackson ]
147 -
148 -Signed-off-by: Gerd Hoffmann <kraxel@××××××.com>
149 ----
150 - hw/display/cirrus_vga.c | 8 ++++++++
151 - 1 file changed, 8 insertions(+)
152 -
153 -diff --git a/hw/display/cirrus_vga.c b/hw/display/cirrus_vga.c
154 -index 0e47cf8..a093dc8 100644
155 ---- a/hw/display/cirrus_vga.c
156 -+++ b/hw/display/cirrus_vga.c
157 -@@ -899,6 +899,10 @@ static int cirrus_bitblt_cputovideo(CirrusVGAState * s)
158 - {
159 - int w;
160 -
161 -+ if (blit_is_unsafe(s)) {
162 -+ return 0;
163 -+ }
164 -+
165 - s->cirrus_blt_mode &= ~CIRRUS_BLTMODE_MEMSYSSRC;
166 - s->cirrus_srcptr = &s->cirrus_bltbuf[0];
167 - s->cirrus_srcptr_end = &s->cirrus_bltbuf[0];
168 -@@ -924,6 +928,10 @@ static int cirrus_bitblt_cputovideo(CirrusVGAState * s)
169 - }
170 - s->cirrus_srccounter = s->cirrus_blt_srcpitch * s->cirrus_blt_height;
171 - }
172 -+
173 -+ /* the blit_is_unsafe call above should catch this */
174 -+ assert(s->cirrus_blt_srcpitch <= CIRRUS_BLTBUFSIZE);
175 -+
176 - s->cirrus_srcptr = s->cirrus_bltbuf;
177 - s->cirrus_srcptr_end = s->cirrus_bltbuf + s->cirrus_blt_srcpitch;
178 - cirrus_update_memory_access(s);
179 ---
180 -1.8.3.1
181 -
182
183 diff --git a/app-emulation/qemu/files/qemu-2.8.0-CVE-2017-2630.patch b/app-emulation/qemu/files/qemu-2.8.0-CVE-2017-2630.patch
184 deleted file mode 100644
185 index 034b322..0000000
186 --- a/app-emulation/qemu/files/qemu-2.8.0-CVE-2017-2630.patch
187 +++ /dev/null
188 @@ -1,22 +0,0 @@
189 -Comparison symbol is misused. It may lead to memory corruption.
190 -
191 -Signed-off-by: Vladimir Sementsov-Ogievskiy <address@hidden>
192 ----
193 - nbd/client.c | 2 +-
194 - 1 file changed, 1 insertion(+), 1 deletion(-)
195 -
196 -diff --git a/nbd/client.c b/nbd/client.c
197 -index 6caf6bda6d..351731bc63 100644
198 ---- a/nbd/client.c
199 -+++ b/nbd/client.c
200 -@@ -94,7 +94,7 @@ static ssize_t drop_sync(QIOChannel *ioc, size_t size)
201 - char small[1024];
202 - char *buffer;
203 -
204 -- buffer = sizeof(small) < size ? small : g_malloc(MIN(65536, size));
205 -+ buffer = sizeof(small) > size ? small : g_malloc(MIN(65536, size));
206 - while (size > 0) {
207 - ssize_t count = read_sync(ioc, buffer, MIN(65536, size));
208 -
209 ---
210 -2.11.0
211
212 diff --git a/app-emulation/qemu/files/qemu-2.8.0-CVE-2017-5667.patch b/app-emulation/qemu/files/qemu-2.8.0-CVE-2017-5667.patch
213 deleted file mode 100644
214 index 93e9c94..0000000
215 --- a/app-emulation/qemu/files/qemu-2.8.0-CVE-2017-5667.patch
216 +++ /dev/null
217 @@ -1,37 +0,0 @@
218 -From 42922105beb14c2fc58185ea022b9f72fb5465e9 Mon Sep 17 00:00:00 2001
219 -From: Prasad J Pandit <pjp@×××××××××××××.org>
220 -Date: Tue, 7 Feb 2017 18:29:59 +0000
221 -Subject: [PATCH] sd: sdhci: check data length during dma_memory_read
222 -
223 -While doing multi block SDMA transfer in routine
224 -'sdhci_sdma_transfer_multi_blocks', the 's->fifo_buffer' starting
225 -index 'begin' and data length 's->data_count' could end up to be same.
226 -This could lead to an OOB access issue. Correct transfer data length
227 -to avoid it.
228 -
229 -Cc: qemu-stable@××××××.org
230 -Reported-by: Jiang Xin <jiangxin1@××××××.com>
231 -Signed-off-by: Prasad J Pandit <pjp@×××××××××××××.org>
232 -Reviewed-by: Peter Maydell <peter.maydell@××××××.org>
233 -Message-id: 20170130064736.9236-1-ppandit@××××××.com
234 -Signed-off-by: Peter Maydell <peter.maydell@××××××.org>
235 ----
236 - hw/sd/sdhci.c | 2 +-
237 - 1 file changed, 1 insertion(+), 1 deletion(-)
238 -
239 -diff --git a/hw/sd/sdhci.c b/hw/sd/sdhci.c
240 -index 01fbf22..5bd5ab6 100644
241 ---- a/hw/sd/sdhci.c
242 -+++ b/hw/sd/sdhci.c
243 -@@ -536,7 +536,7 @@ static void sdhci_sdma_transfer_multi_blocks(SDHCIState *s)
244 - boundary_count -= block_size - begin;
245 - }
246 - dma_memory_read(&address_space_memory, s->sdmasysad,
247 -- &s->fifo_buffer[begin], s->data_count);
248 -+ &s->fifo_buffer[begin], s->data_count - begin);
249 - s->sdmasysad += s->data_count - begin;
250 - if (s->data_count == block_size) {
251 - for (n = 0; n < block_size; n++) {
252 ---
253 -2.10.2
254 -
255
256 diff --git a/app-emulation/qemu/files/qemu-2.8.0-CVE-2017-5931.patch b/app-emulation/qemu/files/qemu-2.8.0-CVE-2017-5931.patch
257 deleted file mode 100644
258 index f24d557..0000000
259 --- a/app-emulation/qemu/files/qemu-2.8.0-CVE-2017-5931.patch
260 +++ /dev/null
261 @@ -1,46 +0,0 @@
262 -From a08aaff811fb194950f79711d2afe5a892ae03a4 Mon Sep 17 00:00:00 2001
263 -From: Gonglei <arei.gonglei@××××××.com>
264 -Date: Tue, 3 Jan 2017 14:50:03 +0800
265 -Subject: [PATCH] virtio-crypto: fix possible integer and heap overflow
266 -
267 -Because the 'size_t' type is 4 bytes in 32-bit platform, which
268 -is the same with 'int'. It's easy to make 'max_len' to zero when
269 -integer overflow and then cause heap overflow if 'max_len' is zero.
270 -
271 -Using uint_64 instead of size_t to avoid the integer overflow.
272 -
273 -Cc: qemu-stable@××××××.org
274 -Reported-by: Li Qiang <liqiang6-s@×××.cn>
275 -Signed-off-by: Gonglei <arei.gonglei@××××××.com>
276 -Tested-by: Li Qiang <liqiang6-s@×××.cn>
277 -Reviewed-by: Michael S. Tsirkin <mst@××××××.com>
278 -Signed-off-by: Michael S. Tsirkin <mst@××××××.com>
279 ----
280 - hw/virtio/virtio-crypto.c | 4 ++--
281 - 1 file changed, 2 insertions(+), 2 deletions(-)
282 -
283 -diff --git a/hw/virtio/virtio-crypto.c b/hw/virtio/virtio-crypto.c
284 -index 2f2467e..c23e1ad 100644
285 ---- a/hw/virtio/virtio-crypto.c
286 -+++ b/hw/virtio/virtio-crypto.c
287 -@@ -416,7 +416,7 @@ virtio_crypto_sym_op_helper(VirtIODevice *vdev,
288 - uint32_t hash_start_src_offset = 0, len_to_hash = 0;
289 - uint32_t cipher_start_src_offset = 0, len_to_cipher = 0;
290 -
291 -- size_t max_len, curr_size = 0;
292 -+ uint64_t max_len, curr_size = 0;
293 - size_t s;
294 -
295 - /* Plain cipher */
296 -@@ -441,7 +441,7 @@ virtio_crypto_sym_op_helper(VirtIODevice *vdev,
297 - return NULL;
298 - }
299 -
300 -- max_len = iv_len + aad_len + src_len + dst_len + hash_result_len;
301 -+ max_len = (uint64_t)iv_len + aad_len + src_len + dst_len + hash_result_len;
302 - if (unlikely(max_len > vcrypto->conf.max_size)) {
303 - virtio_error(vdev, "virtio-crypto too big length");
304 - return NULL;
305 ---
306 -2.10.2
307 -
308
309 diff --git a/app-emulation/qemu/files/qemu-2.8.0-CVE-2017-6058.patch b/app-emulation/qemu/files/qemu-2.8.0-CVE-2017-6058.patch
310 deleted file mode 100644
311 index 666c18c..0000000
312 --- a/app-emulation/qemu/files/qemu-2.8.0-CVE-2017-6058.patch
313 +++ /dev/null
314 @@ -1,112 +0,0 @@
315 -This patch fixed a problem that was introduced in commit eb700029.
316 -
317 -When net_rx_pkt_attach_iovec() calls eth_strip_vlan()
318 -this can result in pkt->ehdr_buf being overflowed, because
319 -ehdr_buf is only sizeof(struct eth_header) bytes large
320 -but eth_strip_vlan() can write
321 -sizeof(struct eth_header) + sizeof(struct vlan_header)
322 -bytes into it.
323 -
324 -Devices affected by this problem: vmxnet3.
325 -
326 -Reported-by: Peter Maydell <address@hidden>
327 -Signed-off-by: Dmitry Fleytman <address@hidden>
328 ----
329 - hw/net/net_rx_pkt.c | 34 +++++++++++++++++-----------------
330 - 1 file changed, 17 insertions(+), 17 deletions(-)
331 -
332 -diff --git a/hw/net/net_rx_pkt.c b/hw/net/net_rx_pkt.c
333 -index 1019b50..7c0beac 100644
334 ---- a/hw/net/net_rx_pkt.c
335 -+++ b/hw/net/net_rx_pkt.c
336 -@@ -23,13 +23,13 @@
337 -
338 - struct NetRxPkt {
339 - struct virtio_net_hdr virt_hdr;
340 -- uint8_t ehdr_buf[sizeof(struct eth_header)];
341 -+ uint8_t ehdr_buf[sizeof(struct eth_header) + sizeof(struct vlan_header)];
342 - struct iovec *vec;
343 - uint16_t vec_len_total;
344 - uint16_t vec_len;
345 - uint32_t tot_len;
346 - uint16_t tci;
347 -- bool vlan_stripped;
348 -+ size_t ehdr_buf_len;
349 - bool has_virt_hdr;
350 - eth_pkt_types_e packet_type;
351 -
352 -@@ -88,15 +88,13 @@ net_rx_pkt_pull_data(struct NetRxPkt *pkt,
353 - const struct iovec *iov, int iovcnt,
354 - size_t ploff)
355 - {
356 -- if (pkt->vlan_stripped) {
357 -+ if (pkt->ehdr_buf_len) {
358 - net_rx_pkt_iovec_realloc(pkt, iovcnt + 1);
359 -
360 - pkt->vec[0].iov_base = pkt->ehdr_buf;
361 -- pkt->vec[0].iov_len = sizeof(pkt->ehdr_buf);
362 --
363 -- pkt->tot_len =
364 -- iov_size(iov, iovcnt) - ploff + sizeof(struct eth_header);
365 -+ pkt->vec[0].iov_len = pkt->ehdr_buf_len;
366 -
367 -+ pkt->tot_len = iov_size(iov, iovcnt) - ploff + pkt->ehdr_buf_len;
368 - pkt->vec_len = iov_copy(pkt->vec + 1, pkt->vec_len_total - 1,
369 - iov, iovcnt, ploff, pkt->tot_len);
370 - } else {
371 -@@ -123,11 +121,12 @@ void net_rx_pkt_attach_iovec(struct NetRxPkt *pkt,
372 - uint16_t tci = 0;
373 - uint16_t ploff = iovoff;
374 - assert(pkt);
375 -- pkt->vlan_stripped = false;
376 -
377 - if (strip_vlan) {
378 -- pkt->vlan_stripped = eth_strip_vlan(iov, iovcnt, iovoff, pkt->ehdr_buf,
379 -- &ploff, &tci);
380 -+ pkt->ehdr_buf_len = eth_strip_vlan(iov, iovcnt, iovoff, pkt->ehdr_buf,
381 -+ &ploff, &tci);
382 -+ } else {
383 -+ pkt->ehdr_buf_len = 0;
384 - }
385 -
386 - pkt->tci = tci;
387 -@@ -143,12 +142,13 @@ void net_rx_pkt_attach_iovec_ex(struct NetRxPkt *pkt,
388 - uint16_t tci = 0;
389 - uint16_t ploff = iovoff;
390 - assert(pkt);
391 -- pkt->vlan_stripped = false;
392 -
393 - if (strip_vlan) {
394 -- pkt->vlan_stripped = eth_strip_vlan_ex(iov, iovcnt, iovoff, vet,
395 -- pkt->ehdr_buf,
396 -- &ploff, &tci);
397 -+ pkt->ehdr_buf_len = eth_strip_vlan_ex(iov, iovcnt, iovoff, vet,
398 -+ pkt->ehdr_buf,
399 -+ &ploff, &tci);
400 -+ } else {
401 -+ pkt->ehdr_buf_len = 0;
402 - }
403 -
404 - pkt->tci = tci;
405 -@@ -162,8 +162,8 @@ void net_rx_pkt_dump(struct NetRxPkt *pkt)
406 - NetRxPkt *pkt = (NetRxPkt *)pkt;
407 - assert(pkt);
408 -
409 -- printf("RX PKT: tot_len: %d, vlan_stripped: %d, vlan_tag: %d\n",
410 -- pkt->tot_len, pkt->vlan_stripped, pkt->tci);
411 -+ printf("RX PKT: tot_len: %d, ehdr_buf_len: %lu, vlan_tag: %d\n",
412 -+ pkt->tot_len, pkt->ehdr_buf_len, pkt->tci);
413 - #endif
414 - }
415 -
416 -@@ -426,7 +426,7 @@ bool net_rx_pkt_is_vlan_stripped(struct NetRxPkt *pkt)
417 - {
418 - assert(pkt);
419 -
420 -- return pkt->vlan_stripped;
421 -+ return pkt->ehdr_buf_len ? true : false;
422 - }
423 -
424 - bool net_rx_pkt_has_virt_hdr(struct NetRxPkt *pkt)
425 ---
426 -2.7.4
427
428 diff --git a/app-emulation/qemu/qemu-2.8.1-r2.ebuild b/app-emulation/qemu/qemu-2.8.1-r2.ebuild
429 index 682ed1c..ff24476 100644
430 --- a/app-emulation/qemu/qemu-2.8.1-r2.ebuild
431 +++ b/app-emulation/qemu/qemu-2.8.1-r2.ebuild
432 @@ -17,7 +17,7 @@ if [[ ${PV} = *9999* ]]; then
433 SRC_URI=""
434 else
435 SRC_URI="http://wiki.qemu-project.org/download/${P}.tar.bz2"
436 - KEYWORDS="amd64 ~arm64 ~ppc ~ppc64 ~x86 ~x86-fbsd"
437 + KEYWORDS="amd64 ~arm64 ~ppc ~ppc64 x86 ~x86-fbsd"
438 fi
439
440 DESCRIPTION="QEMU + Kernel-based Virtual Machine userland tools"
441
442 diff --git a/app-emulation/qemu/qemu-2.9.0-r1.ebuild b/app-emulation/qemu/qemu-2.9.0-r1.ebuild
443 index 1851ea8..5cd5be6 100644
444 --- a/app-emulation/qemu/qemu-2.9.0-r1.ebuild
445 +++ b/app-emulation/qemu/qemu-2.9.0-r1.ebuild
446 @@ -50,6 +50,7 @@ REQUIRED_USE="${PYTHON_REQUIRED_USE}
447 gtk2? ( gtk )
448 qemu_softmmu_targets_arm? ( fdt )
449 qemu_softmmu_targets_microblaze? ( fdt )
450 + qemu_softmmu_targets_mips64el? ( fdt )
451 qemu_softmmu_targets_ppc? ( fdt )
452 qemu_softmmu_targets_ppc64? ( fdt )
453 sdl2? ( sdl )
454
455 diff --git a/app-emulation/qemu/qemu-2.8.0-r10.ebuild b/app-emulation/qemu/qemu-2.9.0-r53.ebuild
456 similarity index 89%
457 rename from app-emulation/qemu/qemu-2.8.0-r10.ebuild
458 rename to app-emulation/qemu/qemu-2.9.0-r53.ebuild
459 index 7a4fa23..0958df4 100644
460 --- a/app-emulation/qemu/qemu-2.8.0-r10.ebuild
461 +++ b/app-emulation/qemu/qemu-2.9.0-r53.ebuild
462 @@ -8,6 +8,8 @@ PYTHON_REQ_USE="ncurses,readline"
463
464 PLOCALES="bg de_DE fr_FR hu it tr zh_CN"
465
466 +FIRMWARE_ABI_VERSION="2.9.0-r52"
467 +
468 inherit eutils flag-o-matic linux-info toolchain-funcs multilib python-r1 \
469 user udev fcaps readme.gentoo-r1 pax-utils l10n
470
471 @@ -17,13 +19,9 @@ if [[ ${PV} = *9999* ]]; then
472 SRC_URI=""
473 else
474 SRC_URI="http://wiki.qemu-project.org/download/${P}.tar.bz2"
475 - KEYWORDS="amd64 ~arm64 ~ppc ~ppc64 x86 ~x86-fbsd"
476 + KEYWORDS="~amd64 ~arm64 ~ppc ~ppc64 ~x86 ~x86-fbsd"
477 fi
478
479 -# bug #606088
480 -SRC_URI+="
481 - https://dev.gentoo.org/~tamiko/distfiles/${P}-CVE-2016-9602-patches.tar.xz"
482 -
483 DESCRIPTION="QEMU + Kernel-based Virtual Machine userland tools"
484 HOMEPAGE="http://www.qemu.org http://www.linux-kvm.org"
485
486 @@ -33,16 +31,16 @@ IUSE="accessibility +aio alsa bluetooth bzip2 +caps +curl debug +fdt
487 glusterfs gnutls gtk gtk2 infiniband iscsi +jpeg kernel_linux
488 kernel_FreeBSD lzo ncurses nfs nls numa opengl +pin-upstream-blobs +png
489 pulseaudio python rbd sasl +seccomp sdl sdl2 selinux smartcard snappy
490 - spice ssh static static-user systemtap tci test +threads usb usbredir
491 - vde +vhost-net virgl virtfs +vnc vte xattr xen xfs"
492 + spice ssh static static-user systemtap tci test usb usbredir vde
493 + +vhost-net virgl virtfs +vnc vte xattr xen xfs"
494
495 COMMON_TARGETS="aarch64 alpha arm cris i386 m68k microblaze microblazeel
496 - mips mips64 mips64el mipsel or32 ppc ppc64 s390x sh4 sh4eb sparc
497 + mips mips64 mips64el mipsel nios2 or1k ppc ppc64 s390x sh4 sh4eb sparc
498 sparc64 x86_64"
499 IUSE_SOFTMMU_TARGETS="${COMMON_TARGETS}
500 lm32 moxie ppcemb tricore unicore32 xtensa xtensaeb"
501 IUSE_USER_TARGETS="${COMMON_TARGETS}
502 - armeb mipsn32 mipsn32el ppc64abi32 ppc64le sparc32plus tilegx"
503 + armeb hppa mipsn32 mipsn32el ppc64abi32 ppc64le sparc32plus tilegx"
504
505 use_softmmu_targets=$(printf ' qemu_softmmu_targets_%s' ${IUSE_SOFTMMU_TARGETS})
506 use_user_targets=$(printf ' qemu_user_targets_%s' ${IUSE_USER_TARGETS})
507 @@ -54,6 +52,7 @@ REQUIRED_USE="${PYTHON_REQUIRED_USE}
508 gtk2? ( gtk )
509 qemu_softmmu_targets_arm? ( fdt )
510 qemu_softmmu_targets_microblaze? ( fdt )
511 + qemu_softmmu_targets_mips64el? ( fdt )
512 qemu_softmmu_targets_ppc? ( fdt )
513 qemu_softmmu_targets_ppc64? ( fdt )
514 sdl2? ( sdl )
515 @@ -71,7 +70,6 @@ REQUIRED_USE="${PYTHON_REQUIRED_USE}
516 # when available rather than always using the extranl library.
517 ALL_DEPEND="
518 >=dev-libs/glib-2.0[static-libs(+)]
519 - >=x11-libs/pixman-0.28.0[static-libs(+)]
520 sys-libs/zlib[static-libs(+)]
521 python? ( ${PYTHON_DEPS} )
522 systemtap? ( dev-util/systemtap )
523 @@ -80,6 +78,7 @@ ALL_DEPEND="
524 # Dependencies required for qemu tools (qemu-nbd, qemu-img, qemu-io, ...)
525 # softmmu targets (qemu-system-*).
526 SOFTMMU_TOOLS_DEPEND="
527 + >=x11-libs/pixman-0.28.0[static-libs(+)]
528 accessibility? (
529 app-accessibility/brltty[api]
530 app-accessibility/brltty[static-libs(+)]
531 @@ -153,16 +152,17 @@ SOFTMMU_TOOLS_DEPEND="
532 xfs? ( sys-fs/xfsprogs[static-libs(+)] )"
533
534 X86_FIRMWARE_DEPEND="
535 - >=sys-firmware/ipxe-1.0.0_p20130624
536 pin-upstream-blobs? (
537 - ~sys-firmware/seabios-1.10.1
538 + ~sys-firmware/edk2-ovmf-2017_pre20170505[binary]
539 + ~sys-firmware/ipxe-1.0.0_p20160620
540 + ~sys-firmware/seabios-1.10.2[binary,seavgabios]
541 ~sys-firmware/sgabios-0.1_pre8
542 - ~sys-firmware/vgabios-0.7a
543 )
544 !pin-upstream-blobs? (
545 - sys-firmware/seabios
546 + sys-firmware/edk2-ovmf
547 + sys-firmware/ipxe
548 + >=sys-firmware/seabios-1.10.2[seavgabios]
549 sys-firmware/sgabios
550 - sys-firmware/vgabios
551 )"
552
553 CDEPEND="
554 @@ -200,30 +200,10 @@ PATCHES=(
555 # gentoo patches
556 "${FILESDIR}"/${PN}-2.5.0-cflags.patch
557 "${FILESDIR}"/${PN}-2.5.0-sysmacros.patch
558 - "${FILESDIR}"/${PN}-2.7.0-CVE-2016-8669-1.patch #597108
559 - "${FILESDIR}"/${PN}-2.8.0-CVE-2016-9908.patch #601826
560 - "${FILESDIR}"/${PN}-2.8.0-CVE-2016-9912.patch #602630
561 - "${FILESDIR}"/${PN}-2.8.0-CVE-2016-10028.patch #603444
562 - "${FILESDIR}"/${PN}-2.8.0-CVE-2016-10155.patch #606720
563 - "${FILESDIR}"/${PN}-2.8.0-CVE-2017-2615.patch #608034
564 - "${FILESDIR}"/${PN}-2.8.0-CVE-2017-2630.patch #609396
565 - "${FILESDIR}"/${PN}-2.8.0-CVE-2017-5525-1.patch #606264
566 - "${FILESDIR}"/${PN}-2.8.0-CVE-2017-5525-2.patch
567 - "${FILESDIR}"/${PN}-2.8.0-CVE-2017-5552.patch #606722
568 - "${FILESDIR}"/${PN}-2.8.0-CVE-2017-5578.patch #607000
569 - "${FILESDIR}"/${PN}-2.8.0-CVE-2017-5579.patch #607100
570 - "${FILESDIR}"/${PN}-2.8.0-CVE-2017-5667.patch #607766
571 - "${FILESDIR}"/${PN}-2.8.0-CVE-2017-5856.patch #608036
572 - "${FILESDIR}"/${PN}-2.8.0-CVE-2017-5857.patch #608038
573 - "${FILESDIR}"/${PN}-2.8.0-CVE-2017-5898.patch #608520
574 - "${FILESDIR}"/${PN}-2.8.0-CVE-2017-5931.patch #608728
575 - "${FILESDIR}"/${PN}-2.8.0-CVE-2017-5973.patch #609334
576 - "${FILESDIR}"/${PN}-2.8.0-CVE-2017-5987.patch #609398
577 - "${FILESDIR}"/${PN}-2.8.0-CVE-2017-6058.patch #609638
578 - "${FILESDIR}"/${PN}-2.8.0-CVE-2017-2620.patch #609206
579 - "${FILESDIR}"/${PN}-2.8.0-CVE-2017-6505.patch #612220
580 - "${FILESDIR}"/${PN}-2.8.0-CVE-2017-7377.patch #614744
581 - "${S}-CVE-2016-9602-patches"
582 + "${FILESDIR}"/${PN}-2.9.0-bug616870.patch
583 + "${FILESDIR}"/${PN}-2.9.0-bug616872.patch
584 + "${FILESDIR}"/${PN}-2.9.0-bug616874.patch
585 + "${FILESDIR}"/${PN}-2.9.0-CVE-2017-8112.patch
586 )
587
588 STRIP_MASK="/usr/share/qemu/palcode-clipper"
589 @@ -246,7 +226,7 @@ QA_WX_LOAD="usr/bin/qemu-i386
590 usr/bin/qemu-microblazeel
591 usr/bin/qemu-mips
592 usr/bin/qemu-mipsel
593 - usr/bin/qemu-or32
594 + usr/bin/qemu-or1k
595 usr/bin/qemu-ppc
596 usr/bin/qemu-ppc64
597 usr/bin/qemu-ppc64abi32
598 @@ -703,9 +683,6 @@ src_install() {
599 insinto "/etc/qemu"
600 doins "${FILESDIR}/bridge.conf"
601
602 - # Remove the docdir placed qmp-commands.txt
603 - mv "${ED}/usr/share/doc/${PF}/html/qmp-commands.txt" "${S}/docs/" || die
604 -
605 cd "${S}"
606 dodoc Changelog MAINTAINERS docs/specs/pci-ids.txt
607 newdoc pc-bios/README README.pc-bios
608 @@ -714,22 +691,26 @@ src_install() {
609 if [[ -n ${softmmu_targets} ]]; then
610 # Remove SeaBIOS since we're using the SeaBIOS packaged one
611 rm "${ED}/usr/share/qemu/bios.bin"
612 + rm "${ED}/usr/share/qemu/bios-256k.bin"
613 if use qemu_softmmu_targets_x86_64 || use qemu_softmmu_targets_i386; then
614 dosym ../seabios/bios.bin /usr/share/qemu/bios.bin
615 + dosym ../seabios/bios-256k.bin /usr/share/qemu/bios-256k.bin
616 fi
617
618 - # Remove vgabios since we're using the vgabios packaged one
619 + # Remove vgabios since we're using the seavgabios packaged one
620 rm "${ED}/usr/share/qemu/vgabios.bin"
621 rm "${ED}/usr/share/qemu/vgabios-cirrus.bin"
622 rm "${ED}/usr/share/qemu/vgabios-qxl.bin"
623 rm "${ED}/usr/share/qemu/vgabios-stdvga.bin"
624 + rm "${ED}/usr/share/qemu/vgabios-virtio.bin"
625 rm "${ED}/usr/share/qemu/vgabios-vmware.bin"
626 if use qemu_softmmu_targets_x86_64 || use qemu_softmmu_targets_i386; then
627 - dosym ../vgabios/vgabios.bin /usr/share/qemu/vgabios.bin
628 - dosym ../vgabios/vgabios-cirrus.bin /usr/share/qemu/vgabios-cirrus.bin
629 - dosym ../vgabios/vgabios-qxl.bin /usr/share/qemu/vgabios-qxl.bin
630 - dosym ../vgabios/vgabios-stdvga.bin /usr/share/qemu/vgabios-stdvga.bin
631 - dosym ../vgabios/vgabios-vmware.bin /usr/share/qemu/vgabios-vmware.bin
632 + dosym ../seavgabios/vgabios-isavga.bin /usr/share/qemu/vgabios.bin
633 + dosym ../seavgabios/vgabios-cirrus.bin /usr/share/qemu/vgabios-cirrus.bin
634 + dosym ../seavgabios/vgabios-qxl.bin /usr/share/qemu/vgabios-qxl.bin
635 + dosym ../seavgabios/vgabios-stdvga.bin /usr/share/qemu/vgabios-stdvga.bin
636 + dosym ../seavgabios/vgabios-virtio.bin /usr/share/qemu/vgabios-virtio.bin
637 + dosym ../seavgabios/vgabios-vmware.bin /usr/share/qemu/vgabios-vmware.bin
638 fi
639
640 # Remove sgabios since we're using the sgabios packaged one
641 @@ -754,20 +735,50 @@ src_install() {
642 readme.gentoo_create_doc
643 }
644
645 -pkg_postinst() {
646 - DISABLE_AUTOFORMATTING=true
647 - readme.gentoo_print_elog
648 +firmware_abi_change() {
649 + local pv
650 + for pv in ${REPLACING_VERSIONS}; do
651 + if ! version_is_at_least ${FIRMWARE_ABI_VERSION} ${pv}; then
652 + return 0
653 + fi
654 + done
655 + return 1
656 +}
657
658 +pkg_postinst() {
659 if [[ -n ${softmmu_targets} ]] && use kernel_linux; then
660 udev_reload
661 fi
662
663 fcaps cap_net_admin /usr/libexec/qemu-bridge-helper
664 +
665 + DISABLE_AUTOFORMATTING=true
666 + readme.gentoo_print_elog
667 +
668 + if use pin-upstream-blobs && firmware_abi_change; then
669 + ewarn "This version of qemu pins new versions of firmware blobs:"
670 + ewarn " $(best_version sys-firmware/edk2-ovmf)"
671 + ewarn " $(best_version sys-firmware/ipxe)"
672 + ewarn " $(best_version sys-firmware/seabios)"
673 + ewarn " $(best_version sys-firmware/sgabios)"
674 + ewarn "This might break resume of hibernated guests (started with a different"
675 + ewarn "firmware version) and live migration to/from qemu versions with different"
676 + ewarn "firmware. Please (cold) restart all running guests. For functional"
677 + ewarn "guest migration ensure that all"
678 + ewarn "hosts run at least"
679 + ewarn " app-emulation/qemu-${FIRMWARE_ABI_VERSION}."
680 + fi
681 }
682
683 pkg_info() {
684 echo "Using:"
685 echo " $(best_version app-emulation/spice-protocol)"
686 + echo " $(best_version sys-firmware/edk2-ovmf)"
687 + if has_version 'sys-firmware/edk2-ovmf[binary]'; then
688 + echo " USE=binary"
689 + else
690 + echo " USE=''"
691 + fi
692 echo " $(best_version sys-firmware/ipxe)"
693 echo " $(best_version sys-firmware/seabios)"
694 if has_version 'sys-firmware/seabios[binary]'; then
695 @@ -775,5 +786,5 @@ pkg_info() {
696 else
697 echo " USE=''"
698 fi
699 - echo " $(best_version sys-firmware/vgabios)"
700 + echo " $(best_version sys-firmware/sgabios)"
701 }