1 |
commit: 65b200c42b344d8aba791abea0f568b448fadee1 |
2 |
Author: Aric Belsito <lluixhi <AT> gmail <DOT> com> |
3 |
AuthorDate: Sat May 6 21:26:01 2017 +0000 |
4 |
Commit: Aric Belsito <lluixhi <AT> gmail <DOT> com> |
5 |
CommitDate: Sat May 6 21:26:01 2017 +0000 |
6 |
URL: https://gitweb.gentoo.org/proj/musl.git/commit/?id=65b200c4 |
7 |
|
8 |
app-emulation/qemu: version bump to 2.9.0-r53 |
9 |
|
10 |
app-emulation/qemu/Manifest | 14 +-- |
11 |
.../qemu/files/qemu-2.8.0-CVE-2017-2615.patch | 48 --------- |
12 |
.../qemu/files/qemu-2.8.0-CVE-2017-2620.patch | 56 ---------- |
13 |
.../qemu/files/qemu-2.8.0-CVE-2017-2630.patch | 22 ---- |
14 |
.../qemu/files/qemu-2.8.0-CVE-2017-5667.patch | 37 ------- |
15 |
.../qemu/files/qemu-2.8.0-CVE-2017-5931.patch | 46 -------- |
16 |
.../qemu/files/qemu-2.8.0-CVE-2017-6058.patch | 112 -------------------- |
17 |
app-emulation/qemu/qemu-2.8.1-r2.ebuild | 2 +- |
18 |
app-emulation/qemu/qemu-2.9.0-r1.ebuild | 1 + |
19 |
...qemu-2.8.0-r10.ebuild => qemu-2.9.0-r53.ebuild} | 117 +++++++++++---------- |
20 |
10 files changed, 69 insertions(+), 386 deletions(-) |
21 |
|
22 |
diff --git a/app-emulation/qemu/Manifest b/app-emulation/qemu/Manifest |
23 |
index e305941..2de0792 100644 |
24 |
--- a/app-emulation/qemu/Manifest |
25 |
+++ b/app-emulation/qemu/Manifest |
26 |
@@ -9,22 +9,16 @@ AUX qemu-2.8.0-CVE-2016-10028.patch 1384 SHA256 25a9f2b2014bbcbb008683211503716a |
27 |
AUX qemu-2.8.0-CVE-2016-10155.patch 1558 SHA256 53c20d983847a716f3f708c50ffbeb9d44fd8718f39d86556ae44394d1b2a624 SHA512 4ebfba87927c9f58fe1a0aa05b5850d391698617ce7c3e002d3adfd981ed8c23d35a6863e14f52264576dda31f84dc25421d2f930547f82ccfde126137d91aea WHIRLPOOL 44366afdf52eed47c28a6e9cec1ee7c613b5bac6441cf4f7bf29b30ef6ec7504e72a2d8c873a949e46f1cfd3055a407b673d6151802ab3c957cde8faaed20903 |
28 |
AUX qemu-2.8.0-CVE-2016-9908.patch 1166 SHA256 22ef4999a3daf3c46a3c90ca20fb131545d4d0befeff7c3ca870585a3e03b7b7 SHA512 c46abda3a5b1a68c7c2e5236f8e424f4569a28ba2aea9b8ec32467e55b535492da6e4702d4758a5721f1bf222f7f2554a5e4c9a190781d60c40202a5291dcf49 WHIRLPOOL aa8087350770ecbb60049e3269ddf9d68258657ef6a088b562e344056689e578a390328dde9c5d2b5024e7fa03995b571295a1d64943d9b3882cf0c5f833dbd8 |
29 |
AUX qemu-2.8.0-CVE-2016-9912.patch 1307 SHA256 e3eac321492a9ef42d88b04877511255c3731a9bb029d7c6ab2da0aa8f09e2d8 SHA512 f9ba4f167334d9b934c37fbed21ded8b3d71e5bdbdb1f15f81d4423b0790bfa127637155d5863b563fa974f1421c4ace1f2a4e3e81e3ae3d6045b2083210b103 WHIRLPOOL 7aa8dab7b6462f142365d274e6131ca1630c396e36c851cb562c081c4243c58e2ae22cf682e51145af08befcaba395254c765cf56112a6c177e1c9a18ffb5926 |
30 |
-AUX qemu-2.8.0-CVE-2017-2615.patch 1720 SHA256 33f3f81ff8e5dacfc4f33dd48bd7833843c209f6d2bd5b3102cc5694ad85a593 SHA512 32063428286a49a12daa481ba87f1b09be6504bf24c5759aacf88ef436312a890dfe44d08457d8b426f86ce7680700d32fb21a255a6db8eb512e612c16770d36 WHIRLPOOL 9f1eed6c6c3eeb1e8991d1aa82e12a004c223bdd635ec48e433ca93d054aa3dfb5986fe01e36df157ef20c685e07595eebdf5fe16ed7cf9034e1c9ddf8304dbb |
31 |
-AUX qemu-2.8.0-CVE-2017-2620.patch 1879 SHA256 dc898ad08d83b5a904a68513784ec009d4e19373ec9170e58d0695cf733b1bbd SHA512 4c0cba0b7abf4923f8c4720ffe8aad98cf8a4cddfa9fdf1418a5895f107bd186599f4d8a87290e9459a425e4ac464663a6d500bf016f459cb81dbd7fbc8121cb WHIRLPOOL 8c2cb5c6a8cee9c1d44fe0e03b3f8f56de4f8a8515acdda4458610f543f2e2cf6bac2161b9a8128e3aaf0c65716d5a85a9caf7041fdc05ab7e222c87568a4d68 |
32 |
-AUX qemu-2.8.0-CVE-2017-2630.patch 681 SHA256 72c675456d02f188b1ccc680fb237900d32d315272d1b3b6c3caad08bc8130e2 SHA512 1dc5006455a06a83799094afab1ec4f2f3808174530f71d234d165275af3b11160bcf6c041c8e9e3138de7bd6ec4b7810b4532c496c018f0aa71716f2d437faa WHIRLPOOL 27c7835c00f5ad368921ae8c2251cc3eaef3f018242c42517f03102129368f85b99b144f4a3eb53e546352965e6a7f031f7545237e5334ee524059d461d29a8f |
33 |
AUX qemu-2.8.0-CVE-2017-5525-1.patch 1625 SHA256 88e253c306761017d66dca5b72184f89cebf3b617db7bc0e4b27025757a66181 SHA512 a7f82374ec4e264b065be7ba63c197d93fee230d68819bf68a0a67c84f89182d0cc0a42b9aadf53a8a903d640dacc55392174c7820379e92ad0e35c86c35a2dd WHIRLPOOL 63e192dc0e075139f18aee2d0541c75021852a7d7251321ca8fe7f9b793c72786a6aab878e308931289eab3c07c3cbbc8ad32b67de1193f85b672e16a8372495 |
34 |
AUX qemu-2.8.0-CVE-2017-5525-2.patch 1664 SHA256 ab03a1cff62164090133f0dbace9724302e806a808b18d64628d12f0bd9abad6 SHA512 ac1d89331c3fc4d0ef7af411a12654329057676e9f016cb9a4a46dc9b4e01092c17af33d095f3104e71094ae585a35a8276a98560dd97f8d045e0b9fd2f0069f WHIRLPOOL 20457d7fe5b3842c0c601068dba410586fc4b4c7fce81ba3ee436a6cfec3b1b950797d6ca9a2a573fef21a29421f8c04a34d1dfefe0b7ade03a6ca51d16d99cb |
35 |
AUX qemu-2.8.0-CVE-2017-5552.patch 1481 SHA256 26616f16434b3aff65b1cd1ce82c6abdfbd44da8a047a5a32b1e07755c9a3e1b SHA512 3c3f5027be3bfe56c1445004bd28536e11f606cc6787fcefad3da267eb3e11b61110c8a4700fd9d6f95ce50f10a2678b2bc6f950297b949b837882a68901d6e5 WHIRLPOOL ca93726b8a0567f68fac634eef1e88c997c1e959cafb33bc6ba8871d9021591bb61be6b3635d3fac111e1e177dbbff939c93580d7f0824e752b378dbc38fbc45 |
36 |
AUX qemu-2.8.0-CVE-2017-5578.patch 1084 SHA256 a7639fc84377b23ebc55dbb1c6d8c53bb2e6230be03b2efba78108257058d8b4 SHA512 8d160d56a94ec9380640badcab29fdd05f2f665377febd1b7e71a9c619d9db963eaa74cf74a2e0287fd2f6e2a7d4bce0f8e4281b3b0292347eece52b7344243b WHIRLPOOL efd3238bf720a1051a41ea621601afeea7546cc7e48d4a7f23bc0b3277bee368bb259a2735e6290b4609e78a1e54e29fe1ba7b088824284787faddc84491d876 |
37 |
AUX qemu-2.8.0-CVE-2017-5579.patch 1132 SHA256 df32524c24aa4d7d9166bb5e159ba10023c7777b9583e920bd8590feec433580 SHA512 d4669821ae8e06a31b852a31699aa26421ce5fb6c049573cb6613515da486e390d8ddf71adb4e6c1a45a15bb468bbb45df68cbf5e9388660c9c03866becb9edd WHIRLPOOL 0d5ed483c6e3f849fc4b9568a3af4c086258ef1162a4e11baa65bcf35eeb8a505c8b7de935175fdc53e7284e23eb492a95326cdea6c690283085136cb02d3b7a |
38 |
-AUX qemu-2.8.0-CVE-2017-5667.patch 1497 SHA256 e05e21c45d8c05392215db0bff3e161c68d64b0b9e42add18307346b3a4d4bc3 SHA512 7c518736ac09d6c37fd359a8a503713f1b76d6041038f58e7648bb69251d6039c3449593eb14a5e0f2649d12856964a42d48e4ee0bb9dc664ada2852f9ea3cbd WHIRLPOOL 0e74b2671f148fa9f31674e6dd80634064fb8d24be474eaf9ea1efcb6cf427314da75187a32eed874ea4bde19e8dfc4562d5af06893ce3beeef7de8f902dd698 |
39 |
AUX qemu-2.8.0-CVE-2017-5856.patch 2224 SHA256 92ddbba8c0d21bdae5b11ae064c21da939cbbb1fd0e6aa10477efced6bf9582f SHA512 7e043d8299d67d33c12bf5591f0881029013852df2243c2ea747fc6c4d1d6c0acffbaef7538634a60f8f875da94bb71db3e3a07972de066b7ac5d49e4d3cb906 WHIRLPOOL b5f38b059e4305b352e3807c2b7762fe856d1067431452fbbf991415ad17f25d152225d9e0ea61b5e8175e42abebbb2abdd85ac37f301ac123f81af822ff2f02 |
40 |
AUX qemu-2.8.0-CVE-2017-5857.patch 1326 SHA256 e2150a7cc92b72e3f20506b9c76b40599af8d2366d25bd9b245a0bffa66ad8eb SHA512 d6d000b57f1fb194f9554165621109b364ebdb61416bc07e2283f2d493c33e770d1b63002d62565aae1ac19ed0ad9e572c207341aa1ad023581f349f62158d30 WHIRLPOOL cbe84c67ba9bb368baf2b1842e8c7c1ee3fb720630bcd53fdbdef9e8f3efdb25c1a927d0f65c9d1f6def28defe6997943a7867e8225eb12e395a0811ad3e32a1 |
41 |
AUX qemu-2.8.0-CVE-2017-5898.patch 1412 SHA256 7f44668d51a94d19fcca0f496d8ac798fd654afe25d2998f7d07a148a836ade9 SHA512 2cd9af4957849a5d72dc0f0fbb30852870306ebc0a348cf5951df58d3029d1aae52df9261d2e4a9d7a4f132f78c390af8a049e1f109b324899bccd91e5c10d1f WHIRLPOOL c48e1fe163761880adab990683dc5d54ee31173763f11239ffee7c229bd65a2958a696dede39e7e645860980e2a7c5c6e5873e5db53872ac373d8d2415a167ab |
42 |
-AUX qemu-2.8.0-CVE-2017-5931.patch 1696 SHA256 cdb1ea1306bf00042f13637eef78d3580e34b88c11716e62fad69931eb3d7ac6 SHA512 5b9a00f0964b153df7630655480b646e6615e831fd981642987d8691e9ddd265f64285d0e70c4f536bb370adb03a75548f7258bee8dbc2b7de15a3984fc8421b WHIRLPOOL c6d9440adf57ad1b560da03a455d9bdc3094c952f3c82a5e88fa6f2d0336ab767f0617b2916b68a5e3f5d30293749be40c12dfe93e8b7525fec9b8a453a65123 |
43 |
AUX qemu-2.8.0-CVE-2017-5973.patch 2815 SHA256 206d01053ce678e2c83174b278755e112099f76350aaa765525d344a87365ded SHA512 31b4bd1b8398d8044ace7660a049c492beda83613818a718477257e0bdf922d63423100fd59f2e8411dc952d282a7c405b916ab437b131b31c21dcf65f98edce WHIRLPOOL ea43efbdd5fdc51e1b8b5057fbe50b3911896cbda8437998ca203d34db82524eb42a77440f2490574a48f15ba1c4bbb7d9c40bfb6e99e96278a1d1912ea210a7 |
44 |
AUX qemu-2.8.0-CVE-2017-5987.patch 1889 SHA256 c4f2175970deca9b00bf657e66b8df31a02efce469eec02279a9659b9cb18bb0 SHA512 32708f91edbbb61ac444ee71b97a30138380544389f6265d7cb7aec330ebaaa7ca69844a9462c817fbda117e78748fc4fdeb655e70bcd72ddd8b112fd9619b0d WHIRLPOOL 1aa99740495c0d2a577cf13c47669aeba75ad389394736ce16fde31c91931254820accad85a6d6fee9757595bec3f222413a89fe4ca125913be7ecc97f33b365 |
45 |
-AUX qemu-2.8.0-CVE-2017-6058.patch 3797 SHA256 06c01fcd53dab66af55df164f1616d14847b2a0fd46abe7445b7e3e7b7ee77cf SHA512 1425e7df38cd44903fe78e7728d7eb3df2d8486895f38a87c4e0c63aa5cc4a2b19032d486fcb5676201242039364a1f3d34b256606b5f8ae74028432e6d50286 WHIRLPOOL 9a48c2f00ac146c29163422c10ca62e3065a36752b865b6b9e3408edf019f3585579ac074b5325777e6a405a11d0ce09da33eb6499012377f0c9ef8c52bf2840 |
46 |
AUX qemu-2.8.0-CVE-2017-6505.patch 1481 SHA256 55e3b7e65e519caef4fdd28cccb973613759cce0d67eb64c2093b4f0a4e428e1 SHA512 5326f28a9340f392e4f32e4cd5f58cae0769859e10fd4d201983d40ec6b4d094d6a0cad2638e1e6f3e5228b93af26cc4f4a155e0d94bad89d0ea9b866f535aa7 WHIRLPOOL c88312cd5e779a98c905f175d61400ef7bb59795cc1e0392da0018a158a4c435ffa07f1e6a621db6eea925a0dbb986442eab4f79f956dc1955058fc97670f390 |
47 |
AUX qemu-2.8.0-CVE-2017-7377.patch 1554 SHA256 36fbd8ec9fa7d910fde8b6b8905717b322bd23b50c2b2f925e1a2415ae306755 SHA512 195be1a75340c41aa89614aad8d07f2cf630eb10f3160cb8a86d85371ea9d7dcdbe9d49e9752ac3d6765c8d4c99c845408933b57cf21199f77ba09fcf79a02c8 WHIRLPOOL 8d7677ae3cfe18e34072ef23666c4658553a7d3b564d96e480ae432281d403242f2013d9fb189d473ab9c31def515401d22c04ba8e86d93d0369e95b1e371574 |
48 |
AUX qemu-2.8.0-F_SHLCK-and-F_EXLCK.patch 574 SHA256 d02353daa0ecfe161e938a5e54feab641b901f4a35c8f5831133676a6f53f43f SHA512 6b64750335aae1142ca9132fb766ac2aaeacfcdda0aa0cfca19afc4c3ea3806e30ce603fcec3767e40e84efb0ae8b9a23f21d46c807c13bb646be74f99e13389 WHIRLPOOL 7401c3daf162c71a5a5c3729855fddb5df95609b34c86ea0f4d872c8f132d6ac089cfb35a990af70aef8b7b63fe075a1e2be376b6db09bc70e8d51e48aded354 |
49 |
@@ -36,11 +30,9 @@ AUX qemu-2.9.0-bug616872.patch 2736 SHA256 f2f8910c8e1ce9fc9804f4fbbe978fee20ccb |
50 |
AUX qemu-2.9.0-bug616874.patch 1048 SHA256 23eb5ae64b064e46785ae4f675fbe7c6a353f6688dd154ce98b78a0b7104a2fb SHA512 872fabc4f6eee48dff292297887b8c4a18aa6f8c2f9b7247e325c96e10ef8d72206f269d89c4a4a40ea6ad3e5082db40866b0f386f31716e749fb3a7db89d2dd WHIRLPOOL ddce30f5b22707938c2ba419264a6b731f292f0748e3891c7aa48daaa7a4b204a8bb1b4110fbd7c1836a02605e49e170a4bda6ee9eccdd2570472ff0f63c8d37 |
51 |
AUX qemu-binfmt.initd.head 1445 SHA256 a9b4b1d1ffa82d572c01f14ebfbafb4b3a4c2eb5cad5af62c059f603a9f5a277 SHA512 a735268ae9ac84d8f2f2893bf018ee6de33231fa94a823bd8502b529bb456635c1ab5cf9b440df5ede8e414291f8bf45fc53898c2f3939c50d5ec4ffa554396a WHIRLPOOL 3ec0f916d5928d464fa8416c8eac472cfa01b560bba07642ff7929799918d1c8059ac7368ff5551e6aa993027849de08035d856db7981315d8e4ec470a0f785e |
52 |
AUX qemu-binfmt.initd.tail 245 SHA256 1b765f5212946b73b8e4d92f64d34a9d2e358ef541c02164f6d6dd93cb15e1e7 SHA512 bcca16805f8380d52cc591ea3d65a8f6e5de456730618f6aee301510edb75d235a22d4d7aeed224882210392840adb403eb53234b6cb76a4cb24533852a8b737 WHIRLPOOL 41ddd1751101646e700a6fe4ef879bd4149d646a801f97e40534051895697dcbded06a1edda51457a0d624fbf68442c3e57178a3ee8e683e35368b88d10ba4a4 |
53 |
-DIST qemu-2.8.0-CVE-2016-9602-patches.tar.xz 16264 SHA256 18ac829c6003a3f997db4030a46b422028c58fead158f0c5ffe36ad65acb84e0 SHA512 a56694d1600e4fd1ffd6bbe031a0db226fc5c88306797cc4e42d1dc6127b83d1791cb4e026988b3aad82eab84382e41077ae71e532d1d3489e179730185c0964 WHIRLPOOL 22057b001c478b2b0d97ad70393c973aefc6277d89bb5a1ae03c3c39b5182ddfbe541964761f512ed5735dc442e1f40d0a955ad5b270758e21ce815be86b24bd |
54 |
-DIST qemu-2.8.0.tar.bz2 28368517 SHA256 dafd5d7f649907b6b617b822692f4c82e60cf29bc0fc58bc2036219b591e5e62 SHA512 50f2988d822388ba9fd1bf5dbe68359033ed7432d7f0f9790299f32f63faa6dc72979256b5632ba572d47ee3e74ed40e3e8e331dc6303ec1599f1b4367cb78c2 WHIRLPOOL 0ce4e0539657eb832e4039819e7360c792b6aa41c718f0e0d762f4933217f0d370af94b1d6d9776853575b4a6811d8c85db069bf09d21bd15399ac8b50440ff5 |
55 |
DIST qemu-2.8.1.tar.bz2 28366270 SHA256 018e4c7ed22c220395cf41f835d01505e49d0e579a548bd3d72b03809442bbcd SHA512 0397b4029cdcb77ed053c44b3579a3f34894038e6fc6b4aa88de14515f5a78bf2f41c5e865f37111529f567c85d2f1c4deefae47dde54f76eac79410e5b2bdda WHIRLPOOL c41f53f18fac44efd1c81ba9d95204d23e9a70dc9c21624177be2fe92a327428fd5704b25bc334229fa36ae395fb4c82ba3955db39719c4458343978a4d3141a |
56 |
DIST qemu-2.9.0.tar.bz2 28720490 SHA256 00bfb217b1bb03c7a6c3261b819cfccbfb5a58e3e2ceff546327d271773c6c14 SHA512 4b28966eec0ca44681e35fcfb64a4eaef7c280b8d65c91d03f2efa37f76278fd8c1680e5798c7a30dbfcc8f3c05f4a803f48b8a2dfec3a4181bac079b2a5e422 WHIRLPOOL d79fe89eb271a56aee0cbd328e5f96999176b711afb5683d164b7b99d91e6dd2bfaf6e2ff4cd820a941c94f28116765cb07ffd5809d75c2f9654a67d56bfc0c1 |
57 |
-EBUILD qemu-2.8.0-r10.ebuild 23278 SHA256 c94a06a16fb45995d37e0bfa62dc742601c169156d30b97456d923856693efd1 SHA512 ebd5ea426efc57bb2eb78489049f212e11eb4ab70d23418ad7c04c3161a749ec638edcdd39355107762915c4f13079a3dc1555c58f3d696cd286a9fd6bd25491 WHIRLPOOL 94c220281705e2d6414a7d52b8f93373ae193f0095c88fd76d9e0b10f7a11266e3350d3b354651f87c094a3cf63e12b9374beefb839a1a9f0d17f92732786a01 |
58 |
-EBUILD qemu-2.8.1-r2.ebuild 22909 SHA256 3f2ed4696ccc6136bfb5fc003cb462a327eb29a155b11de3a9879b00e360938f SHA512 8f988bed528668188e2b113fc217130916a3f4837daf55ece21d3af7b7fa9d2230456d09d54c34c84cd69a628680196e0e7187a1bf427730e91e7f0aba7f6762 WHIRLPOOL a9b49900e1cfd02d9826d04289453d54411c051dfddeeb36b18dd00e5db4c7b289b2f8e2e0eee2455cda2df421c15c752063e231bcd3ae4fc911e4b9d0099756 |
59 |
-EBUILD qemu-2.9.0-r1.ebuild 21902 SHA256 30d866abeafb142a1aa2993b7461cbd35925034ab59dcd9f42a5a2dbda41824a SHA512 9b6675586947a2ceff1910bbde1017398ff5a835c50d3c1379166674457f554193d6212ac7ed801e14749e1a7e52f2c280d389385da4ef30b678b8341100e516 WHIRLPOOL e0a2d46e2f6ab03f9b384030e945ae991146b41045b3fc260e4871141162f58f80b3d810d2f47333aeeeadfbf6f626984f866c22f9012a002b8359e0d6497998 |
60 |
+EBUILD qemu-2.8.1-r2.ebuild 22908 SHA256 b21f2820c166fcf91f0be3f8eb323b49d8c8ccebd4c376d9dbcdebbe751bac52 SHA512 3fa48453417e0cfa4d24f11fd5f234ec8790744c65154456328a24641a6f03cffb5b50ecf2bf81388fc18b12b382042e882fa853a09ae2288beb459e8658db5e WHIRLPOOL b5881ff308b91dc53b3115e278d5cd89d5f3f5d69ea7355fea2a048e471da1c4079eb245aa262ab2c19c6d75ddac1770acab3fa1c39d2c6e74cf72d84426e16f |
61 |
+EBUILD qemu-2.9.0-r1.ebuild 21942 SHA256 2c2274d26f203a2a064c35ccabfa8aab374e9c8748d8724ed1534e7c677236db SHA512 91fae1f84c8fb998caa4bb589cd193329e06dd7f833809f0e3986ebe12a265615598ba3182acea59e3e39253ef5d4b6ed4b87912b7d5835f7a458fccea54070b WHIRLPOOL 32543f228bf261b0abda8052e838cbdebef53b511d7006a150168299cc4f75dc9643d9bc344582413a767228bb6c8c863bce95d358d7901f9d60f470f2d19d2d |
62 |
+EBUILD qemu-2.9.0-r53.ebuild 23331 SHA256 3c1fdefe7cdc3bb7baf28782da40dc05239b2bacdf39825d084f563070aa5185 SHA512 923c1628bfef5f645972e90ee855a0ce1060217d8b76ffd51f8bbfd3bbf042ad273b781f9a5c8fc64f7a74410bd8bf2ef1fd975d3348a8d55230008be93afcff WHIRLPOOL 1053b25130a2f0d1da4e46c38886defdebaefbc0fb95743abbcfc82b337075c20a7c9fd494909de86ea25d179c65b2766f221cef418c2a06e127db942aa3ac1d |
63 |
MISC metadata.xml 3794 SHA256 149f7bc9927e13bbf7355972e85df6f9f198dd17fb575a7e516817d6a88018fb SHA512 10f130f225b90dacf8262247d795a247abfdcbf3ad5fbe0693e8d4db79f755984f690cb150a7eb5a8e5d669ce404145c4fbb6b200d6362319be74759fd78b6d3 WHIRLPOOL 6a5e88caeb64387f619a19fecb55c39ccf3c8dcd360523e8d61b80051001c02fe81432c55e40b3f360295b35e9f5a1f707c570baf95cad06d18c4cd484da0ceb |
64 |
|
65 |
diff --git a/app-emulation/qemu/files/qemu-2.8.0-CVE-2017-2615.patch b/app-emulation/qemu/files/qemu-2.8.0-CVE-2017-2615.patch |
66 |
deleted file mode 100644 |
67 |
index f0bba80..0000000 |
68 |
--- a/app-emulation/qemu/files/qemu-2.8.0-CVE-2017-2615.patch |
69 |
+++ /dev/null |
70 |
@@ -1,48 +0,0 @@ |
71 |
-From 62d4c6bd5263bb8413a06c80144fc678df6dfb64 Mon Sep 17 00:00:00 2001 |
72 |
-From: Li Qiang <liqiang6-s@×××.cn> |
73 |
-Date: Wed, 1 Feb 2017 09:35:01 +0100 |
74 |
-Subject: [PATCH] cirrus: fix oob access issue (CVE-2017-2615) |
75 |
- |
76 |
-When doing bitblt copy in backward mode, we should minus the |
77 |
-blt width first just like the adding in the forward mode. This |
78 |
-can avoid the oob access of the front of vga's vram. |
79 |
- |
80 |
-Signed-off-by: Li Qiang <liqiang6-s@×××.cn> |
81 |
- |
82 |
-{ kraxel: with backward blits (negative pitch) addr is the topmost |
83 |
- address, so check it as-is against vram size ] |
84 |
- |
85 |
-Cc: qemu-stable@××××××.org |
86 |
-Cc: P J P <ppandit@××××××.com> |
87 |
-Cc: Laszlo Ersek <lersek@××××××.com> |
88 |
-Cc: Paolo Bonzini <pbonzini@××××××.com> |
89 |
-Cc: Wolfgang Bumiller <w.bumiller@×××××××.com> |
90 |
-Fixes: d3532a0db02296e687711b8cdc7791924efccea0 (CVE-2014-8106) |
91 |
-Signed-off-by: Gerd Hoffmann <kraxel@××××××.com> |
92 |
-Message-id: 1485938101-26602-1-git-send-email-kraxel@××××××.com |
93 |
-Reviewed-by: Laszlo Ersek <lersek@××××××.com> |
94 |
---- |
95 |
- hw/display/cirrus_vga.c | 7 +++---- |
96 |
- 1 file changed, 3 insertions(+), 4 deletions(-) |
97 |
- |
98 |
-diff --git a/hw/display/cirrus_vga.c b/hw/display/cirrus_vga.c |
99 |
-index 7db6409..16f27e8 100644 |
100 |
---- a/hw/display/cirrus_vga.c |
101 |
-+++ b/hw/display/cirrus_vga.c |
102 |
-@@ -274,10 +274,9 @@ static bool blit_region_is_unsafe(struct CirrusVGAState *s, |
103 |
- { |
104 |
- if (pitch < 0) { |
105 |
- int64_t min = addr |
106 |
-- + ((int64_t)s->cirrus_blt_height-1) * pitch; |
107 |
-- int32_t max = addr |
108 |
-- + s->cirrus_blt_width; |
109 |
-- if (min < 0 || max > s->vga.vram_size) { |
110 |
-+ + ((int64_t)s->cirrus_blt_height - 1) * pitch |
111 |
-+ - s->cirrus_blt_width; |
112 |
-+ if (min < -1 || addr >= s->vga.vram_size) { |
113 |
- return true; |
114 |
- } |
115 |
- } else { |
116 |
--- |
117 |
-2.10.2 |
118 |
- |
119 |
|
120 |
diff --git a/app-emulation/qemu/files/qemu-2.8.0-CVE-2017-2620.patch b/app-emulation/qemu/files/qemu-2.8.0-CVE-2017-2620.patch |
121 |
deleted file mode 100644 |
122 |
index e2a9801..0000000 |
123 |
--- a/app-emulation/qemu/files/qemu-2.8.0-CVE-2017-2620.patch |
124 |
+++ /dev/null |
125 |
@@ -1,56 +0,0 @@ |
126 |
-From: Gerd Hoffmann <kraxel@××××××.com> |
127 |
-Subject: [PATCH 3/3] cirrus: add blit_is_unsafe call to cirrus_bitblt_cputovideo |
128 |
- |
129 |
-CIRRUS_BLTMODE_MEMSYSSRC blits do NOT check blit destination |
130 |
-and blit width, at all. Oops. Fix it. |
131 |
- |
132 |
-Security impact: high. |
133 |
- |
134 |
-The missing blit destination check allows to write to host memory. |
135 |
-Basically same as CVE-2014-8106 for the other blit variants. |
136 |
- |
137 |
-The missing blit width check allows to overflow cirrus_bltbuf, |
138 |
-with the attractive target cirrus_srcptr (current cirrus_bltbuf write |
139 |
-position) being located right after cirrus_bltbuf in CirrusVGAState. |
140 |
- |
141 |
-Due to cirrus emulation writing cirrus_bltbuf bytewise the attacker |
142 |
-hasn't full control over cirrus_srcptr though, only one byte can be |
143 |
-changed. Once the first byte has been modified further writes land |
144 |
-elsewhere. |
145 |
- |
146 |
-[ This is CVE-2017-2620 / XSA-209 - Ian Jackson ] |
147 |
- |
148 |
-Signed-off-by: Gerd Hoffmann <kraxel@××××××.com> |
149 |
---- |
150 |
- hw/display/cirrus_vga.c | 8 ++++++++ |
151 |
- 1 file changed, 8 insertions(+) |
152 |
- |
153 |
-diff --git a/hw/display/cirrus_vga.c b/hw/display/cirrus_vga.c |
154 |
-index 0e47cf8..a093dc8 100644 |
155 |
---- a/hw/display/cirrus_vga.c |
156 |
-+++ b/hw/display/cirrus_vga.c |
157 |
-@@ -899,6 +899,10 @@ static int cirrus_bitblt_cputovideo(CirrusVGAState * s) |
158 |
- { |
159 |
- int w; |
160 |
- |
161 |
-+ if (blit_is_unsafe(s)) { |
162 |
-+ return 0; |
163 |
-+ } |
164 |
-+ |
165 |
- s->cirrus_blt_mode &= ~CIRRUS_BLTMODE_MEMSYSSRC; |
166 |
- s->cirrus_srcptr = &s->cirrus_bltbuf[0]; |
167 |
- s->cirrus_srcptr_end = &s->cirrus_bltbuf[0]; |
168 |
-@@ -924,6 +928,10 @@ static int cirrus_bitblt_cputovideo(CirrusVGAState * s) |
169 |
- } |
170 |
- s->cirrus_srccounter = s->cirrus_blt_srcpitch * s->cirrus_blt_height; |
171 |
- } |
172 |
-+ |
173 |
-+ /* the blit_is_unsafe call above should catch this */ |
174 |
-+ assert(s->cirrus_blt_srcpitch <= CIRRUS_BLTBUFSIZE); |
175 |
-+ |
176 |
- s->cirrus_srcptr = s->cirrus_bltbuf; |
177 |
- s->cirrus_srcptr_end = s->cirrus_bltbuf + s->cirrus_blt_srcpitch; |
178 |
- cirrus_update_memory_access(s); |
179 |
--- |
180 |
-1.8.3.1 |
181 |
- |
182 |
|
183 |
diff --git a/app-emulation/qemu/files/qemu-2.8.0-CVE-2017-2630.patch b/app-emulation/qemu/files/qemu-2.8.0-CVE-2017-2630.patch |
184 |
deleted file mode 100644 |
185 |
index 034b322..0000000 |
186 |
--- a/app-emulation/qemu/files/qemu-2.8.0-CVE-2017-2630.patch |
187 |
+++ /dev/null |
188 |
@@ -1,22 +0,0 @@ |
189 |
-Comparison symbol is misused. It may lead to memory corruption. |
190 |
- |
191 |
-Signed-off-by: Vladimir Sementsov-Ogievskiy <address@hidden> |
192 |
---- |
193 |
- nbd/client.c | 2 +- |
194 |
- 1 file changed, 1 insertion(+), 1 deletion(-) |
195 |
- |
196 |
-diff --git a/nbd/client.c b/nbd/client.c |
197 |
-index 6caf6bda6d..351731bc63 100644 |
198 |
---- a/nbd/client.c |
199 |
-+++ b/nbd/client.c |
200 |
-@@ -94,7 +94,7 @@ static ssize_t drop_sync(QIOChannel *ioc, size_t size) |
201 |
- char small[1024]; |
202 |
- char *buffer; |
203 |
- |
204 |
-- buffer = sizeof(small) < size ? small : g_malloc(MIN(65536, size)); |
205 |
-+ buffer = sizeof(small) > size ? small : g_malloc(MIN(65536, size)); |
206 |
- while (size > 0) { |
207 |
- ssize_t count = read_sync(ioc, buffer, MIN(65536, size)); |
208 |
- |
209 |
--- |
210 |
-2.11.0 |
211 |
|
212 |
diff --git a/app-emulation/qemu/files/qemu-2.8.0-CVE-2017-5667.patch b/app-emulation/qemu/files/qemu-2.8.0-CVE-2017-5667.patch |
213 |
deleted file mode 100644 |
214 |
index 93e9c94..0000000 |
215 |
--- a/app-emulation/qemu/files/qemu-2.8.0-CVE-2017-5667.patch |
216 |
+++ /dev/null |
217 |
@@ -1,37 +0,0 @@ |
218 |
-From 42922105beb14c2fc58185ea022b9f72fb5465e9 Mon Sep 17 00:00:00 2001 |
219 |
-From: Prasad J Pandit <pjp@×××××××××××××.org> |
220 |
-Date: Tue, 7 Feb 2017 18:29:59 +0000 |
221 |
-Subject: [PATCH] sd: sdhci: check data length during dma_memory_read |
222 |
- |
223 |
-While doing multi block SDMA transfer in routine |
224 |
-'sdhci_sdma_transfer_multi_blocks', the 's->fifo_buffer' starting |
225 |
-index 'begin' and data length 's->data_count' could end up to be same. |
226 |
-This could lead to an OOB access issue. Correct transfer data length |
227 |
-to avoid it. |
228 |
- |
229 |
-Cc: qemu-stable@××××××.org |
230 |
-Reported-by: Jiang Xin <jiangxin1@××××××.com> |
231 |
-Signed-off-by: Prasad J Pandit <pjp@×××××××××××××.org> |
232 |
-Reviewed-by: Peter Maydell <peter.maydell@××××××.org> |
233 |
-Message-id: 20170130064736.9236-1-ppandit@××××××.com |
234 |
-Signed-off-by: Peter Maydell <peter.maydell@××××××.org> |
235 |
---- |
236 |
- hw/sd/sdhci.c | 2 +- |
237 |
- 1 file changed, 1 insertion(+), 1 deletion(-) |
238 |
- |
239 |
-diff --git a/hw/sd/sdhci.c b/hw/sd/sdhci.c |
240 |
-index 01fbf22..5bd5ab6 100644 |
241 |
---- a/hw/sd/sdhci.c |
242 |
-+++ b/hw/sd/sdhci.c |
243 |
-@@ -536,7 +536,7 @@ static void sdhci_sdma_transfer_multi_blocks(SDHCIState *s) |
244 |
- boundary_count -= block_size - begin; |
245 |
- } |
246 |
- dma_memory_read(&address_space_memory, s->sdmasysad, |
247 |
-- &s->fifo_buffer[begin], s->data_count); |
248 |
-+ &s->fifo_buffer[begin], s->data_count - begin); |
249 |
- s->sdmasysad += s->data_count - begin; |
250 |
- if (s->data_count == block_size) { |
251 |
- for (n = 0; n < block_size; n++) { |
252 |
--- |
253 |
-2.10.2 |
254 |
- |
255 |
|
256 |
diff --git a/app-emulation/qemu/files/qemu-2.8.0-CVE-2017-5931.patch b/app-emulation/qemu/files/qemu-2.8.0-CVE-2017-5931.patch |
257 |
deleted file mode 100644 |
258 |
index f24d557..0000000 |
259 |
--- a/app-emulation/qemu/files/qemu-2.8.0-CVE-2017-5931.patch |
260 |
+++ /dev/null |
261 |
@@ -1,46 +0,0 @@ |
262 |
-From a08aaff811fb194950f79711d2afe5a892ae03a4 Mon Sep 17 00:00:00 2001 |
263 |
-From: Gonglei <arei.gonglei@××××××.com> |
264 |
-Date: Tue, 3 Jan 2017 14:50:03 +0800 |
265 |
-Subject: [PATCH] virtio-crypto: fix possible integer and heap overflow |
266 |
- |
267 |
-Because the 'size_t' type is 4 bytes in 32-bit platform, which |
268 |
-is the same with 'int'. It's easy to make 'max_len' to zero when |
269 |
-integer overflow and then cause heap overflow if 'max_len' is zero. |
270 |
- |
271 |
-Using uint_64 instead of size_t to avoid the integer overflow. |
272 |
- |
273 |
-Cc: qemu-stable@××××××.org |
274 |
-Reported-by: Li Qiang <liqiang6-s@×××.cn> |
275 |
-Signed-off-by: Gonglei <arei.gonglei@××××××.com> |
276 |
-Tested-by: Li Qiang <liqiang6-s@×××.cn> |
277 |
-Reviewed-by: Michael S. Tsirkin <mst@××××××.com> |
278 |
-Signed-off-by: Michael S. Tsirkin <mst@××××××.com> |
279 |
---- |
280 |
- hw/virtio/virtio-crypto.c | 4 ++-- |
281 |
- 1 file changed, 2 insertions(+), 2 deletions(-) |
282 |
- |
283 |
-diff --git a/hw/virtio/virtio-crypto.c b/hw/virtio/virtio-crypto.c |
284 |
-index 2f2467e..c23e1ad 100644 |
285 |
---- a/hw/virtio/virtio-crypto.c |
286 |
-+++ b/hw/virtio/virtio-crypto.c |
287 |
-@@ -416,7 +416,7 @@ virtio_crypto_sym_op_helper(VirtIODevice *vdev, |
288 |
- uint32_t hash_start_src_offset = 0, len_to_hash = 0; |
289 |
- uint32_t cipher_start_src_offset = 0, len_to_cipher = 0; |
290 |
- |
291 |
-- size_t max_len, curr_size = 0; |
292 |
-+ uint64_t max_len, curr_size = 0; |
293 |
- size_t s; |
294 |
- |
295 |
- /* Plain cipher */ |
296 |
-@@ -441,7 +441,7 @@ virtio_crypto_sym_op_helper(VirtIODevice *vdev, |
297 |
- return NULL; |
298 |
- } |
299 |
- |
300 |
-- max_len = iv_len + aad_len + src_len + dst_len + hash_result_len; |
301 |
-+ max_len = (uint64_t)iv_len + aad_len + src_len + dst_len + hash_result_len; |
302 |
- if (unlikely(max_len > vcrypto->conf.max_size)) { |
303 |
- virtio_error(vdev, "virtio-crypto too big length"); |
304 |
- return NULL; |
305 |
--- |
306 |
-2.10.2 |
307 |
- |
308 |
|
309 |
diff --git a/app-emulation/qemu/files/qemu-2.8.0-CVE-2017-6058.patch b/app-emulation/qemu/files/qemu-2.8.0-CVE-2017-6058.patch |
310 |
deleted file mode 100644 |
311 |
index 666c18c..0000000 |
312 |
--- a/app-emulation/qemu/files/qemu-2.8.0-CVE-2017-6058.patch |
313 |
+++ /dev/null |
314 |
@@ -1,112 +0,0 @@ |
315 |
-This patch fixed a problem that was introduced in commit eb700029. |
316 |
- |
317 |
-When net_rx_pkt_attach_iovec() calls eth_strip_vlan() |
318 |
-this can result in pkt->ehdr_buf being overflowed, because |
319 |
-ehdr_buf is only sizeof(struct eth_header) bytes large |
320 |
-but eth_strip_vlan() can write |
321 |
-sizeof(struct eth_header) + sizeof(struct vlan_header) |
322 |
-bytes into it. |
323 |
- |
324 |
-Devices affected by this problem: vmxnet3. |
325 |
- |
326 |
-Reported-by: Peter Maydell <address@hidden> |
327 |
-Signed-off-by: Dmitry Fleytman <address@hidden> |
328 |
---- |
329 |
- hw/net/net_rx_pkt.c | 34 +++++++++++++++++----------------- |
330 |
- 1 file changed, 17 insertions(+), 17 deletions(-) |
331 |
- |
332 |
-diff --git a/hw/net/net_rx_pkt.c b/hw/net/net_rx_pkt.c |
333 |
-index 1019b50..7c0beac 100644 |
334 |
---- a/hw/net/net_rx_pkt.c |
335 |
-+++ b/hw/net/net_rx_pkt.c |
336 |
-@@ -23,13 +23,13 @@ |
337 |
- |
338 |
- struct NetRxPkt { |
339 |
- struct virtio_net_hdr virt_hdr; |
340 |
-- uint8_t ehdr_buf[sizeof(struct eth_header)]; |
341 |
-+ uint8_t ehdr_buf[sizeof(struct eth_header) + sizeof(struct vlan_header)]; |
342 |
- struct iovec *vec; |
343 |
- uint16_t vec_len_total; |
344 |
- uint16_t vec_len; |
345 |
- uint32_t tot_len; |
346 |
- uint16_t tci; |
347 |
-- bool vlan_stripped; |
348 |
-+ size_t ehdr_buf_len; |
349 |
- bool has_virt_hdr; |
350 |
- eth_pkt_types_e packet_type; |
351 |
- |
352 |
-@@ -88,15 +88,13 @@ net_rx_pkt_pull_data(struct NetRxPkt *pkt, |
353 |
- const struct iovec *iov, int iovcnt, |
354 |
- size_t ploff) |
355 |
- { |
356 |
-- if (pkt->vlan_stripped) { |
357 |
-+ if (pkt->ehdr_buf_len) { |
358 |
- net_rx_pkt_iovec_realloc(pkt, iovcnt + 1); |
359 |
- |
360 |
- pkt->vec[0].iov_base = pkt->ehdr_buf; |
361 |
-- pkt->vec[0].iov_len = sizeof(pkt->ehdr_buf); |
362 |
-- |
363 |
-- pkt->tot_len = |
364 |
-- iov_size(iov, iovcnt) - ploff + sizeof(struct eth_header); |
365 |
-+ pkt->vec[0].iov_len = pkt->ehdr_buf_len; |
366 |
- |
367 |
-+ pkt->tot_len = iov_size(iov, iovcnt) - ploff + pkt->ehdr_buf_len; |
368 |
- pkt->vec_len = iov_copy(pkt->vec + 1, pkt->vec_len_total - 1, |
369 |
- iov, iovcnt, ploff, pkt->tot_len); |
370 |
- } else { |
371 |
-@@ -123,11 +121,12 @@ void net_rx_pkt_attach_iovec(struct NetRxPkt *pkt, |
372 |
- uint16_t tci = 0; |
373 |
- uint16_t ploff = iovoff; |
374 |
- assert(pkt); |
375 |
-- pkt->vlan_stripped = false; |
376 |
- |
377 |
- if (strip_vlan) { |
378 |
-- pkt->vlan_stripped = eth_strip_vlan(iov, iovcnt, iovoff, pkt->ehdr_buf, |
379 |
-- &ploff, &tci); |
380 |
-+ pkt->ehdr_buf_len = eth_strip_vlan(iov, iovcnt, iovoff, pkt->ehdr_buf, |
381 |
-+ &ploff, &tci); |
382 |
-+ } else { |
383 |
-+ pkt->ehdr_buf_len = 0; |
384 |
- } |
385 |
- |
386 |
- pkt->tci = tci; |
387 |
-@@ -143,12 +142,13 @@ void net_rx_pkt_attach_iovec_ex(struct NetRxPkt *pkt, |
388 |
- uint16_t tci = 0; |
389 |
- uint16_t ploff = iovoff; |
390 |
- assert(pkt); |
391 |
-- pkt->vlan_stripped = false; |
392 |
- |
393 |
- if (strip_vlan) { |
394 |
-- pkt->vlan_stripped = eth_strip_vlan_ex(iov, iovcnt, iovoff, vet, |
395 |
-- pkt->ehdr_buf, |
396 |
-- &ploff, &tci); |
397 |
-+ pkt->ehdr_buf_len = eth_strip_vlan_ex(iov, iovcnt, iovoff, vet, |
398 |
-+ pkt->ehdr_buf, |
399 |
-+ &ploff, &tci); |
400 |
-+ } else { |
401 |
-+ pkt->ehdr_buf_len = 0; |
402 |
- } |
403 |
- |
404 |
- pkt->tci = tci; |
405 |
-@@ -162,8 +162,8 @@ void net_rx_pkt_dump(struct NetRxPkt *pkt) |
406 |
- NetRxPkt *pkt = (NetRxPkt *)pkt; |
407 |
- assert(pkt); |
408 |
- |
409 |
-- printf("RX PKT: tot_len: %d, vlan_stripped: %d, vlan_tag: %d\n", |
410 |
-- pkt->tot_len, pkt->vlan_stripped, pkt->tci); |
411 |
-+ printf("RX PKT: tot_len: %d, ehdr_buf_len: %lu, vlan_tag: %d\n", |
412 |
-+ pkt->tot_len, pkt->ehdr_buf_len, pkt->tci); |
413 |
- #endif |
414 |
- } |
415 |
- |
416 |
-@@ -426,7 +426,7 @@ bool net_rx_pkt_is_vlan_stripped(struct NetRxPkt *pkt) |
417 |
- { |
418 |
- assert(pkt); |
419 |
- |
420 |
-- return pkt->vlan_stripped; |
421 |
-+ return pkt->ehdr_buf_len ? true : false; |
422 |
- } |
423 |
- |
424 |
- bool net_rx_pkt_has_virt_hdr(struct NetRxPkt *pkt) |
425 |
--- |
426 |
-2.7.4 |
427 |
|
428 |
diff --git a/app-emulation/qemu/qemu-2.8.1-r2.ebuild b/app-emulation/qemu/qemu-2.8.1-r2.ebuild |
429 |
index 682ed1c..ff24476 100644 |
430 |
--- a/app-emulation/qemu/qemu-2.8.1-r2.ebuild |
431 |
+++ b/app-emulation/qemu/qemu-2.8.1-r2.ebuild |
432 |
@@ -17,7 +17,7 @@ if [[ ${PV} = *9999* ]]; then |
433 |
SRC_URI="" |
434 |
else |
435 |
SRC_URI="http://wiki.qemu-project.org/download/${P}.tar.bz2" |
436 |
- KEYWORDS="amd64 ~arm64 ~ppc ~ppc64 ~x86 ~x86-fbsd" |
437 |
+ KEYWORDS="amd64 ~arm64 ~ppc ~ppc64 x86 ~x86-fbsd" |
438 |
fi |
439 |
|
440 |
DESCRIPTION="QEMU + Kernel-based Virtual Machine userland tools" |
441 |
|
442 |
diff --git a/app-emulation/qemu/qemu-2.9.0-r1.ebuild b/app-emulation/qemu/qemu-2.9.0-r1.ebuild |
443 |
index 1851ea8..5cd5be6 100644 |
444 |
--- a/app-emulation/qemu/qemu-2.9.0-r1.ebuild |
445 |
+++ b/app-emulation/qemu/qemu-2.9.0-r1.ebuild |
446 |
@@ -50,6 +50,7 @@ REQUIRED_USE="${PYTHON_REQUIRED_USE} |
447 |
gtk2? ( gtk ) |
448 |
qemu_softmmu_targets_arm? ( fdt ) |
449 |
qemu_softmmu_targets_microblaze? ( fdt ) |
450 |
+ qemu_softmmu_targets_mips64el? ( fdt ) |
451 |
qemu_softmmu_targets_ppc? ( fdt ) |
452 |
qemu_softmmu_targets_ppc64? ( fdt ) |
453 |
sdl2? ( sdl ) |
454 |
|
455 |
diff --git a/app-emulation/qemu/qemu-2.8.0-r10.ebuild b/app-emulation/qemu/qemu-2.9.0-r53.ebuild |
456 |
similarity index 89% |
457 |
rename from app-emulation/qemu/qemu-2.8.0-r10.ebuild |
458 |
rename to app-emulation/qemu/qemu-2.9.0-r53.ebuild |
459 |
index 7a4fa23..0958df4 100644 |
460 |
--- a/app-emulation/qemu/qemu-2.8.0-r10.ebuild |
461 |
+++ b/app-emulation/qemu/qemu-2.9.0-r53.ebuild |
462 |
@@ -8,6 +8,8 @@ PYTHON_REQ_USE="ncurses,readline" |
463 |
|
464 |
PLOCALES="bg de_DE fr_FR hu it tr zh_CN" |
465 |
|
466 |
+FIRMWARE_ABI_VERSION="2.9.0-r52" |
467 |
+ |
468 |
inherit eutils flag-o-matic linux-info toolchain-funcs multilib python-r1 \ |
469 |
user udev fcaps readme.gentoo-r1 pax-utils l10n |
470 |
|
471 |
@@ -17,13 +19,9 @@ if [[ ${PV} = *9999* ]]; then |
472 |
SRC_URI="" |
473 |
else |
474 |
SRC_URI="http://wiki.qemu-project.org/download/${P}.tar.bz2" |
475 |
- KEYWORDS="amd64 ~arm64 ~ppc ~ppc64 x86 ~x86-fbsd" |
476 |
+ KEYWORDS="~amd64 ~arm64 ~ppc ~ppc64 ~x86 ~x86-fbsd" |
477 |
fi |
478 |
|
479 |
-# bug #606088 |
480 |
-SRC_URI+=" |
481 |
- https://dev.gentoo.org/~tamiko/distfiles/${P}-CVE-2016-9602-patches.tar.xz" |
482 |
- |
483 |
DESCRIPTION="QEMU + Kernel-based Virtual Machine userland tools" |
484 |
HOMEPAGE="http://www.qemu.org http://www.linux-kvm.org" |
485 |
|
486 |
@@ -33,16 +31,16 @@ IUSE="accessibility +aio alsa bluetooth bzip2 +caps +curl debug +fdt |
487 |
glusterfs gnutls gtk gtk2 infiniband iscsi +jpeg kernel_linux |
488 |
kernel_FreeBSD lzo ncurses nfs nls numa opengl +pin-upstream-blobs +png |
489 |
pulseaudio python rbd sasl +seccomp sdl sdl2 selinux smartcard snappy |
490 |
- spice ssh static static-user systemtap tci test +threads usb usbredir |
491 |
- vde +vhost-net virgl virtfs +vnc vte xattr xen xfs" |
492 |
+ spice ssh static static-user systemtap tci test usb usbredir vde |
493 |
+ +vhost-net virgl virtfs +vnc vte xattr xen xfs" |
494 |
|
495 |
COMMON_TARGETS="aarch64 alpha arm cris i386 m68k microblaze microblazeel |
496 |
- mips mips64 mips64el mipsel or32 ppc ppc64 s390x sh4 sh4eb sparc |
497 |
+ mips mips64 mips64el mipsel nios2 or1k ppc ppc64 s390x sh4 sh4eb sparc |
498 |
sparc64 x86_64" |
499 |
IUSE_SOFTMMU_TARGETS="${COMMON_TARGETS} |
500 |
lm32 moxie ppcemb tricore unicore32 xtensa xtensaeb" |
501 |
IUSE_USER_TARGETS="${COMMON_TARGETS} |
502 |
- armeb mipsn32 mipsn32el ppc64abi32 ppc64le sparc32plus tilegx" |
503 |
+ armeb hppa mipsn32 mipsn32el ppc64abi32 ppc64le sparc32plus tilegx" |
504 |
|
505 |
use_softmmu_targets=$(printf ' qemu_softmmu_targets_%s' ${IUSE_SOFTMMU_TARGETS}) |
506 |
use_user_targets=$(printf ' qemu_user_targets_%s' ${IUSE_USER_TARGETS}) |
507 |
@@ -54,6 +52,7 @@ REQUIRED_USE="${PYTHON_REQUIRED_USE} |
508 |
gtk2? ( gtk ) |
509 |
qemu_softmmu_targets_arm? ( fdt ) |
510 |
qemu_softmmu_targets_microblaze? ( fdt ) |
511 |
+ qemu_softmmu_targets_mips64el? ( fdt ) |
512 |
qemu_softmmu_targets_ppc? ( fdt ) |
513 |
qemu_softmmu_targets_ppc64? ( fdt ) |
514 |
sdl2? ( sdl ) |
515 |
@@ -71,7 +70,6 @@ REQUIRED_USE="${PYTHON_REQUIRED_USE} |
516 |
# when available rather than always using the extranl library. |
517 |
ALL_DEPEND=" |
518 |
>=dev-libs/glib-2.0[static-libs(+)] |
519 |
- >=x11-libs/pixman-0.28.0[static-libs(+)] |
520 |
sys-libs/zlib[static-libs(+)] |
521 |
python? ( ${PYTHON_DEPS} ) |
522 |
systemtap? ( dev-util/systemtap ) |
523 |
@@ -80,6 +78,7 @@ ALL_DEPEND=" |
524 |
# Dependencies required for qemu tools (qemu-nbd, qemu-img, qemu-io, ...) |
525 |
# softmmu targets (qemu-system-*). |
526 |
SOFTMMU_TOOLS_DEPEND=" |
527 |
+ >=x11-libs/pixman-0.28.0[static-libs(+)] |
528 |
accessibility? ( |
529 |
app-accessibility/brltty[api] |
530 |
app-accessibility/brltty[static-libs(+)] |
531 |
@@ -153,16 +152,17 @@ SOFTMMU_TOOLS_DEPEND=" |
532 |
xfs? ( sys-fs/xfsprogs[static-libs(+)] )" |
533 |
|
534 |
X86_FIRMWARE_DEPEND=" |
535 |
- >=sys-firmware/ipxe-1.0.0_p20130624 |
536 |
pin-upstream-blobs? ( |
537 |
- ~sys-firmware/seabios-1.10.1 |
538 |
+ ~sys-firmware/edk2-ovmf-2017_pre20170505[binary] |
539 |
+ ~sys-firmware/ipxe-1.0.0_p20160620 |
540 |
+ ~sys-firmware/seabios-1.10.2[binary,seavgabios] |
541 |
~sys-firmware/sgabios-0.1_pre8 |
542 |
- ~sys-firmware/vgabios-0.7a |
543 |
) |
544 |
!pin-upstream-blobs? ( |
545 |
- sys-firmware/seabios |
546 |
+ sys-firmware/edk2-ovmf |
547 |
+ sys-firmware/ipxe |
548 |
+ >=sys-firmware/seabios-1.10.2[seavgabios] |
549 |
sys-firmware/sgabios |
550 |
- sys-firmware/vgabios |
551 |
)" |
552 |
|
553 |
CDEPEND=" |
554 |
@@ -200,30 +200,10 @@ PATCHES=( |
555 |
# gentoo patches |
556 |
"${FILESDIR}"/${PN}-2.5.0-cflags.patch |
557 |
"${FILESDIR}"/${PN}-2.5.0-sysmacros.patch |
558 |
- "${FILESDIR}"/${PN}-2.7.0-CVE-2016-8669-1.patch #597108 |
559 |
- "${FILESDIR}"/${PN}-2.8.0-CVE-2016-9908.patch #601826 |
560 |
- "${FILESDIR}"/${PN}-2.8.0-CVE-2016-9912.patch #602630 |
561 |
- "${FILESDIR}"/${PN}-2.8.0-CVE-2016-10028.patch #603444 |
562 |
- "${FILESDIR}"/${PN}-2.8.0-CVE-2016-10155.patch #606720 |
563 |
- "${FILESDIR}"/${PN}-2.8.0-CVE-2017-2615.patch #608034 |
564 |
- "${FILESDIR}"/${PN}-2.8.0-CVE-2017-2630.patch #609396 |
565 |
- "${FILESDIR}"/${PN}-2.8.0-CVE-2017-5525-1.patch #606264 |
566 |
- "${FILESDIR}"/${PN}-2.8.0-CVE-2017-5525-2.patch |
567 |
- "${FILESDIR}"/${PN}-2.8.0-CVE-2017-5552.patch #606722 |
568 |
- "${FILESDIR}"/${PN}-2.8.0-CVE-2017-5578.patch #607000 |
569 |
- "${FILESDIR}"/${PN}-2.8.0-CVE-2017-5579.patch #607100 |
570 |
- "${FILESDIR}"/${PN}-2.8.0-CVE-2017-5667.patch #607766 |
571 |
- "${FILESDIR}"/${PN}-2.8.0-CVE-2017-5856.patch #608036 |
572 |
- "${FILESDIR}"/${PN}-2.8.0-CVE-2017-5857.patch #608038 |
573 |
- "${FILESDIR}"/${PN}-2.8.0-CVE-2017-5898.patch #608520 |
574 |
- "${FILESDIR}"/${PN}-2.8.0-CVE-2017-5931.patch #608728 |
575 |
- "${FILESDIR}"/${PN}-2.8.0-CVE-2017-5973.patch #609334 |
576 |
- "${FILESDIR}"/${PN}-2.8.0-CVE-2017-5987.patch #609398 |
577 |
- "${FILESDIR}"/${PN}-2.8.0-CVE-2017-6058.patch #609638 |
578 |
- "${FILESDIR}"/${PN}-2.8.0-CVE-2017-2620.patch #609206 |
579 |
- "${FILESDIR}"/${PN}-2.8.0-CVE-2017-6505.patch #612220 |
580 |
- "${FILESDIR}"/${PN}-2.8.0-CVE-2017-7377.patch #614744 |
581 |
- "${S}-CVE-2016-9602-patches" |
582 |
+ "${FILESDIR}"/${PN}-2.9.0-bug616870.patch |
583 |
+ "${FILESDIR}"/${PN}-2.9.0-bug616872.patch |
584 |
+ "${FILESDIR}"/${PN}-2.9.0-bug616874.patch |
585 |
+ "${FILESDIR}"/${PN}-2.9.0-CVE-2017-8112.patch |
586 |
) |
587 |
|
588 |
STRIP_MASK="/usr/share/qemu/palcode-clipper" |
589 |
@@ -246,7 +226,7 @@ QA_WX_LOAD="usr/bin/qemu-i386 |
590 |
usr/bin/qemu-microblazeel |
591 |
usr/bin/qemu-mips |
592 |
usr/bin/qemu-mipsel |
593 |
- usr/bin/qemu-or32 |
594 |
+ usr/bin/qemu-or1k |
595 |
usr/bin/qemu-ppc |
596 |
usr/bin/qemu-ppc64 |
597 |
usr/bin/qemu-ppc64abi32 |
598 |
@@ -703,9 +683,6 @@ src_install() { |
599 |
insinto "/etc/qemu" |
600 |
doins "${FILESDIR}/bridge.conf" |
601 |
|
602 |
- # Remove the docdir placed qmp-commands.txt |
603 |
- mv "${ED}/usr/share/doc/${PF}/html/qmp-commands.txt" "${S}/docs/" || die |
604 |
- |
605 |
cd "${S}" |
606 |
dodoc Changelog MAINTAINERS docs/specs/pci-ids.txt |
607 |
newdoc pc-bios/README README.pc-bios |
608 |
@@ -714,22 +691,26 @@ src_install() { |
609 |
if [[ -n ${softmmu_targets} ]]; then |
610 |
# Remove SeaBIOS since we're using the SeaBIOS packaged one |
611 |
rm "${ED}/usr/share/qemu/bios.bin" |
612 |
+ rm "${ED}/usr/share/qemu/bios-256k.bin" |
613 |
if use qemu_softmmu_targets_x86_64 || use qemu_softmmu_targets_i386; then |
614 |
dosym ../seabios/bios.bin /usr/share/qemu/bios.bin |
615 |
+ dosym ../seabios/bios-256k.bin /usr/share/qemu/bios-256k.bin |
616 |
fi |
617 |
|
618 |
- # Remove vgabios since we're using the vgabios packaged one |
619 |
+ # Remove vgabios since we're using the seavgabios packaged one |
620 |
rm "${ED}/usr/share/qemu/vgabios.bin" |
621 |
rm "${ED}/usr/share/qemu/vgabios-cirrus.bin" |
622 |
rm "${ED}/usr/share/qemu/vgabios-qxl.bin" |
623 |
rm "${ED}/usr/share/qemu/vgabios-stdvga.bin" |
624 |
+ rm "${ED}/usr/share/qemu/vgabios-virtio.bin" |
625 |
rm "${ED}/usr/share/qemu/vgabios-vmware.bin" |
626 |
if use qemu_softmmu_targets_x86_64 || use qemu_softmmu_targets_i386; then |
627 |
- dosym ../vgabios/vgabios.bin /usr/share/qemu/vgabios.bin |
628 |
- dosym ../vgabios/vgabios-cirrus.bin /usr/share/qemu/vgabios-cirrus.bin |
629 |
- dosym ../vgabios/vgabios-qxl.bin /usr/share/qemu/vgabios-qxl.bin |
630 |
- dosym ../vgabios/vgabios-stdvga.bin /usr/share/qemu/vgabios-stdvga.bin |
631 |
- dosym ../vgabios/vgabios-vmware.bin /usr/share/qemu/vgabios-vmware.bin |
632 |
+ dosym ../seavgabios/vgabios-isavga.bin /usr/share/qemu/vgabios.bin |
633 |
+ dosym ../seavgabios/vgabios-cirrus.bin /usr/share/qemu/vgabios-cirrus.bin |
634 |
+ dosym ../seavgabios/vgabios-qxl.bin /usr/share/qemu/vgabios-qxl.bin |
635 |
+ dosym ../seavgabios/vgabios-stdvga.bin /usr/share/qemu/vgabios-stdvga.bin |
636 |
+ dosym ../seavgabios/vgabios-virtio.bin /usr/share/qemu/vgabios-virtio.bin |
637 |
+ dosym ../seavgabios/vgabios-vmware.bin /usr/share/qemu/vgabios-vmware.bin |
638 |
fi |
639 |
|
640 |
# Remove sgabios since we're using the sgabios packaged one |
641 |
@@ -754,20 +735,50 @@ src_install() { |
642 |
readme.gentoo_create_doc |
643 |
} |
644 |
|
645 |
-pkg_postinst() { |
646 |
- DISABLE_AUTOFORMATTING=true |
647 |
- readme.gentoo_print_elog |
648 |
+firmware_abi_change() { |
649 |
+ local pv |
650 |
+ for pv in ${REPLACING_VERSIONS}; do |
651 |
+ if ! version_is_at_least ${FIRMWARE_ABI_VERSION} ${pv}; then |
652 |
+ return 0 |
653 |
+ fi |
654 |
+ done |
655 |
+ return 1 |
656 |
+} |
657 |
|
658 |
+pkg_postinst() { |
659 |
if [[ -n ${softmmu_targets} ]] && use kernel_linux; then |
660 |
udev_reload |
661 |
fi |
662 |
|
663 |
fcaps cap_net_admin /usr/libexec/qemu-bridge-helper |
664 |
+ |
665 |
+ DISABLE_AUTOFORMATTING=true |
666 |
+ readme.gentoo_print_elog |
667 |
+ |
668 |
+ if use pin-upstream-blobs && firmware_abi_change; then |
669 |
+ ewarn "This version of qemu pins new versions of firmware blobs:" |
670 |
+ ewarn " $(best_version sys-firmware/edk2-ovmf)" |
671 |
+ ewarn " $(best_version sys-firmware/ipxe)" |
672 |
+ ewarn " $(best_version sys-firmware/seabios)" |
673 |
+ ewarn " $(best_version sys-firmware/sgabios)" |
674 |
+ ewarn "This might break resume of hibernated guests (started with a different" |
675 |
+ ewarn "firmware version) and live migration to/from qemu versions with different" |
676 |
+ ewarn "firmware. Please (cold) restart all running guests. For functional" |
677 |
+ ewarn "guest migration ensure that all" |
678 |
+ ewarn "hosts run at least" |
679 |
+ ewarn " app-emulation/qemu-${FIRMWARE_ABI_VERSION}." |
680 |
+ fi |
681 |
} |
682 |
|
683 |
pkg_info() { |
684 |
echo "Using:" |
685 |
echo " $(best_version app-emulation/spice-protocol)" |
686 |
+ echo " $(best_version sys-firmware/edk2-ovmf)" |
687 |
+ if has_version 'sys-firmware/edk2-ovmf[binary]'; then |
688 |
+ echo " USE=binary" |
689 |
+ else |
690 |
+ echo " USE=''" |
691 |
+ fi |
692 |
echo " $(best_version sys-firmware/ipxe)" |
693 |
echo " $(best_version sys-firmware/seabios)" |
694 |
if has_version 'sys-firmware/seabios[binary]'; then |
695 |
@@ -775,5 +786,5 @@ pkg_info() { |
696 |
else |
697 |
echo " USE=''" |
698 |
fi |
699 |
- echo " $(best_version sys-firmware/vgabios)" |
700 |
+ echo " $(best_version sys-firmware/sgabios)" |
701 |
} |