Script 'mail_helper' called by obssrc
Hello community,
here is the log from the commit of package xorg-x11-server for openSUSE:Factory
checked in at 2025-11-27 15:18:58
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/xorg-x11-server (Old)
and /work/SRC/openSUSE:Factory/.xorg-x11-server.new.14147 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "xorg-x11-server"
Thu Nov 27 15:18:58 2025 rev:445 rq:1320004 version:21.1.21
Changes:
--------
--- /work/SRC/openSUSE:Factory/xorg-x11-server/xorg-x11-server.changes
2025-10-29 21:04:23.768904585 +0100
+++
/work/SRC/openSUSE:Factory/.xorg-x11-server.new.14147/xorg-x11-server.changes
2025-11-27 15:19:18.567282626 +0100
@@ -1,0 +2,64 @@
+Tue Nov 25 12:36:00 UTC 2025 - Stefan Dirsch <[email protected]>
+
+- Update to version 21.1.21
+ * A bug fix release to address a number of regressions reported in
+ the latest releases [1].
+ The changes being reverted here are part of a series of changes
+ previously backported in the stable branch, yet these are not
+ actual fixes to address bugs found in the stable branch, while
+ those changes introduced regressions with reverse PRIME with
+ the NVIDIA closed-source driver, issues with 10-bit output with
+ the AMDGPU driver and reduced performance with the AMDGPU driver.
+ [1] https://gitlab.freedesktop.org/xorg/xserver/-/issues/1848
+- Changes
+ * Revert "glamor: reject configs using unsupported rgbBits size"
+ * Revert "glamor_egl: add support of GlxVendorLibrary option"
+ * Revert "xorg: initialize glamor provider"
+ * Revert "glamor: Lift the GLX EGL backend from Xwayland"
+ * Revert "glamor: add glvnd_vendor private"
+- supersedes the following patches:
+ * U_CVE-2022-49737-dix-Hold-input-lock-for-AttachDevice.patch
+ * U_CVE-2025-26594-0001-Cursor-Refuse-to-free-the-root-cursor.patch
+ * U_CVE-2025-26594-0002-dix-keep-a-ref-to-the-rootCursor.patch
+ * U_CVE-2025-26595-0001-xkb-Fix-buffer-overflow-in-XkbVModMaskText.patch
+ * U_CVE-2025-26596-0001-xkb-Fix-computation-of-XkbSizeKeySyms.patch
+ * U_CVE-2025-26597-0001-xkb-Fix-buffer-overflow-in-XkbChangeTypesOfKey.patch
+ * U_CVE-2025-26598-0001-Xi-Fix-barrier-device-search.patch
+ *
U_CVE-2025-26599-0001-composite-Handle-failure-to-redirect-in-compRedirect.patch
+ *
U_CVE-2025-26599-0002-composite-initialize-border-clip-even-when-pixmap-al.patch
+ *
U_CVE-2025-26600-0001-dix-Dequeue-pending-events-on-frozen-device-on-remov.patch
+ * U_CVE-2025-26601-0001-sync-Do-not-let-sync-objects-uninitialized.patch
+ * U_CVE-2025-26601-0002-sync-Check-values-before-applying-changes.patch
+ * U_CVE-2025-26601-0003-sync-Do-not-fail-SyncAddTriggerToSyncObject.patch
+ *
U_CVE-2025-26601-0004-sync-Apply-changes-last-in-SyncChangeAlarmAttributes.patch
+ * U_CVE-2025-49175-render-Avoid-0-or-less-animated-cursors.patch
+ * U_CVE-2025-49176-os-Check-for-integer-overflow-on-BigRequest-length.patch
+ * U_CVE-2025-49176-os-Do-not-overflow-the-integer-size-with-BigRequest.patch
+ * U_CVE-2025-49177-xfixes-Check-request-length-for-SetClientDisconnectM.patch
+ * U_CVE-2025-49178-os-Account-for-bytes-to-ignore-when-sharing-input-bu.patch
+ * U_CVE-2025-49179-record-Check-for-overflow-in-RecordSanityCheckRegist.patch
+ * U_CVE-2025-49180-randr-Check-for-overflow-in-RRChangeProviderProperty.patch
+ * U_CVE-2025-49180-xfree86-Check-for-RandR-provider-functions.patch
+ *
bsc1251958_CVE-2025-62229_0001-present-Fix-use-after-free-in-present_create_notifie.patch
+ *
bsc1251959_CVE-2025-62230_0001-xkb-Make-the-RT_XKBCLIENT-resource-private.patch
+ *
bsc1251959_CVE-2025-62230_0002-xkb-Free-the-XKB-resource-when-freeing-XkbInterest.patch
+ *
bsc1251960_CVE-2025-62231_0001-xkb-Prevent-overflow-in-XkbSetCompatMap.patch
+ * u_fbdevhw_kernel6.9_break_fbdev_open.patch
+ * u_modesetting-Fix-dirty-updates-for-sw-rotation.patch
+- refreshed patches
+ * N_Install-Avoid-failure-on-wrapper-installation.patch
+ * N_fix-dpi-values.diff
+ * N_zap_warning_xserver.diff
+ * n_raise_default_clients.patch
+ * n_xorg-wrapper-rename-Xorg.patch
+ * u_01-Improved-ConfineToShape.patch
+ * u_Panning-Set-panning-state-in-xf86RandR12ScreenSetSize.patch
+ * u_Use-better-fallbacks-to-generate-cookies-if-arc4rand.patch
+ * u_xf86-Accept-devices-with-the-kernel-s-efidrm-driver.patch
+ * u_xf86-Accept-devices-with-the-kernel-s-vesadrm-driver.patch
+ * u_xfree86-activate-GPU-screens-on-autobind.patch
+ * u_xorg-server-xdmcp.patch
+ * u_xorg-wrapper-build-Build-position-independent-code.patch
+ * xorg-x11-server-byte-order.patch
+
+-------------------------------------------------------------------
Old:
----
U_CVE-2022-49737-dix-Hold-input-lock-for-AttachDevice.patch
U_CVE-2025-26594-0001-Cursor-Refuse-to-free-the-root-cursor.patch
U_CVE-2025-26594-0002-dix-keep-a-ref-to-the-rootCursor.patch
U_CVE-2025-26595-0001-xkb-Fix-buffer-overflow-in-XkbVModMaskText.patch
U_CVE-2025-26596-0001-xkb-Fix-computation-of-XkbSizeKeySyms.patch
U_CVE-2025-26597-0001-xkb-Fix-buffer-overflow-in-XkbChangeTypesOfKey.patch
U_CVE-2025-26598-0001-Xi-Fix-barrier-device-search.patch
U_CVE-2025-26599-0001-composite-Handle-failure-to-redirect-in-compRedirect.patch
U_CVE-2025-26599-0002-composite-initialize-border-clip-even-when-pixmap-al.patch
U_CVE-2025-26600-0001-dix-Dequeue-pending-events-on-frozen-device-on-remov.patch
U_CVE-2025-26601-0001-sync-Do-not-let-sync-objects-uninitialized.patch
U_CVE-2025-26601-0002-sync-Check-values-before-applying-changes.patch
U_CVE-2025-26601-0003-sync-Do-not-fail-SyncAddTriggerToSyncObject.patch
U_CVE-2025-26601-0004-sync-Apply-changes-last-in-SyncChangeAlarmAttributes.patch
U_CVE-2025-49175-render-Avoid-0-or-less-animated-cursors.patch
U_CVE-2025-49176-os-Check-for-integer-overflow-on-BigRequest-length.patch
U_CVE-2025-49176-os-Do-not-overflow-the-integer-size-with-BigRequest.patch
U_CVE-2025-49177-xfixes-Check-request-length-for-SetClientDisconnectM.patch
U_CVE-2025-49178-os-Account-for-bytes-to-ignore-when-sharing-input-bu.patch
U_CVE-2025-49179-record-Check-for-overflow-in-RecordSanityCheckRegist.patch
U_CVE-2025-49180-randr-Check-for-overflow-in-RRChangeProviderProperty.patch
U_CVE-2025-49180-xfree86-Check-for-RandR-provider-functions.patch
bsc1251958_CVE-2025-62229_0001-present-Fix-use-after-free-in-present_create_notifie.patch
bsc1251959_CVE-2025-62230_0001-xkb-Make-the-RT_XKBCLIENT-resource-private.patch
bsc1251959_CVE-2025-62230_0002-xkb-Free-the-XKB-resource-when-freeing-XkbInterest.patch
bsc1251960_CVE-2025-62231_0001-xkb-Prevent-overflow-in-XkbSetCompatMap.patch
u_fbdevhw_kernel6.9_break_fbdev_open.patch
u_modesetting-Fix-dirty-updates-for-sw-rotation.patch
xorg-server-21.1.15.tar.xz
xorg-server-21.1.15.tar.xz.sig
New:
----
xorg-server-21.1.21.tar.xz
xorg-server-21.1.21.tar.xz.sig
----------(Old B)----------
Old:- supersedes the following patches:
* U_CVE-2022-49737-dix-Hold-input-lock-for-AttachDevice.patch
* U_CVE-2025-26594-0001-Cursor-Refuse-to-free-the-root-cursor.patch
Old: * U_CVE-2022-49737-dix-Hold-input-lock-for-AttachDevice.patch
* U_CVE-2025-26594-0001-Cursor-Refuse-to-free-the-root-cursor.patch
* U_CVE-2025-26594-0002-dix-keep-a-ref-to-the-rootCursor.patch
Old: * U_CVE-2025-26594-0001-Cursor-Refuse-to-free-the-root-cursor.patch
* U_CVE-2025-26594-0002-dix-keep-a-ref-to-the-rootCursor.patch
* U_CVE-2025-26595-0001-xkb-Fix-buffer-overflow-in-XkbVModMaskText.patch
Old: * U_CVE-2025-26594-0002-dix-keep-a-ref-to-the-rootCursor.patch
* U_CVE-2025-26595-0001-xkb-Fix-buffer-overflow-in-XkbVModMaskText.patch
* U_CVE-2025-26596-0001-xkb-Fix-computation-of-XkbSizeKeySyms.patch
Old: * U_CVE-2025-26595-0001-xkb-Fix-buffer-overflow-in-XkbVModMaskText.patch
* U_CVE-2025-26596-0001-xkb-Fix-computation-of-XkbSizeKeySyms.patch
* U_CVE-2025-26597-0001-xkb-Fix-buffer-overflow-in-XkbChangeTypesOfKey.patch
Old: * U_CVE-2025-26596-0001-xkb-Fix-computation-of-XkbSizeKeySyms.patch
* U_CVE-2025-26597-0001-xkb-Fix-buffer-overflow-in-XkbChangeTypesOfKey.patch
* U_CVE-2025-26598-0001-Xi-Fix-barrier-device-search.patch
Old: *
U_CVE-2025-26597-0001-xkb-Fix-buffer-overflow-in-XkbChangeTypesOfKey.patch
* U_CVE-2025-26598-0001-Xi-Fix-barrier-device-search.patch
*
U_CVE-2025-26599-0001-composite-Handle-failure-to-redirect-in-compRedirect.patch
Old: * U_CVE-2025-26598-0001-Xi-Fix-barrier-device-search.patch
*
U_CVE-2025-26599-0001-composite-Handle-failure-to-redirect-in-compRedirect.patch
*
U_CVE-2025-26599-0002-composite-initialize-border-clip-even-when-pixmap-al.patch
Old: *
U_CVE-2025-26599-0001-composite-Handle-failure-to-redirect-in-compRedirect.patch
*
U_CVE-2025-26599-0002-composite-initialize-border-clip-even-when-pixmap-al.patch
*
U_CVE-2025-26600-0001-dix-Dequeue-pending-events-on-frozen-device-on-remov.patch
Old: *
U_CVE-2025-26599-0002-composite-initialize-border-clip-even-when-pixmap-al.patch
*
U_CVE-2025-26600-0001-dix-Dequeue-pending-events-on-frozen-device-on-remov.patch
* U_CVE-2025-26601-0001-sync-Do-not-let-sync-objects-uninitialized.patch
Old: *
U_CVE-2025-26600-0001-dix-Dequeue-pending-events-on-frozen-device-on-remov.patch
* U_CVE-2025-26601-0001-sync-Do-not-let-sync-objects-uninitialized.patch
* U_CVE-2025-26601-0002-sync-Check-values-before-applying-changes.patch
Old: * U_CVE-2025-26601-0001-sync-Do-not-let-sync-objects-uninitialized.patch
* U_CVE-2025-26601-0002-sync-Check-values-before-applying-changes.patch
* U_CVE-2025-26601-0003-sync-Do-not-fail-SyncAddTriggerToSyncObject.patch
Old: * U_CVE-2025-26601-0002-sync-Check-values-before-applying-changes.patch
* U_CVE-2025-26601-0003-sync-Do-not-fail-SyncAddTriggerToSyncObject.patch
*
U_CVE-2025-26601-0004-sync-Apply-changes-last-in-SyncChangeAlarmAttributes.patch
Old: *
U_CVE-2025-26601-0003-sync-Do-not-fail-SyncAddTriggerToSyncObject.patch
*
U_CVE-2025-26601-0004-sync-Apply-changes-last-in-SyncChangeAlarmAttributes.patch
* U_CVE-2025-49175-render-Avoid-0-or-less-animated-cursors.patch
Old: *
U_CVE-2025-26601-0004-sync-Apply-changes-last-in-SyncChangeAlarmAttributes.patch
* U_CVE-2025-49175-render-Avoid-0-or-less-animated-cursors.patch
* U_CVE-2025-49176-os-Check-for-integer-overflow-on-BigRequest-length.patch
Old: * U_CVE-2025-49175-render-Avoid-0-or-less-animated-cursors.patch
* U_CVE-2025-49176-os-Check-for-integer-overflow-on-BigRequest-length.patch
* U_CVE-2025-49176-os-Do-not-overflow-the-integer-size-with-BigRequest.patch
Old: *
U_CVE-2025-49176-os-Check-for-integer-overflow-on-BigRequest-length.patch
* U_CVE-2025-49176-os-Do-not-overflow-the-integer-size-with-BigRequest.patch
* U_CVE-2025-49177-xfixes-Check-request-length-for-SetClientDisconnectM.patch
Old: *
U_CVE-2025-49176-os-Do-not-overflow-the-integer-size-with-BigRequest.patch
* U_CVE-2025-49177-xfixes-Check-request-length-for-SetClientDisconnectM.patch
* U_CVE-2025-49178-os-Account-for-bytes-to-ignore-when-sharing-input-bu.patch
Old: *
U_CVE-2025-49177-xfixes-Check-request-length-for-SetClientDisconnectM.patch
* U_CVE-2025-49178-os-Account-for-bytes-to-ignore-when-sharing-input-bu.patch
* U_CVE-2025-49179-record-Check-for-overflow-in-RecordSanityCheckRegist.patch
Old: *
U_CVE-2025-49178-os-Account-for-bytes-to-ignore-when-sharing-input-bu.patch
* U_CVE-2025-49179-record-Check-for-overflow-in-RecordSanityCheckRegist.patch
* U_CVE-2025-49180-randr-Check-for-overflow-in-RRChangeProviderProperty.patch
Old: *
U_CVE-2025-49179-record-Check-for-overflow-in-RecordSanityCheckRegist.patch
* U_CVE-2025-49180-randr-Check-for-overflow-in-RRChangeProviderProperty.patch
* U_CVE-2025-49180-xfree86-Check-for-RandR-provider-functions.patch
Old: *
U_CVE-2025-49180-randr-Check-for-overflow-in-RRChangeProviderProperty.patch
* U_CVE-2025-49180-xfree86-Check-for-RandR-provider-functions.patch
*
bsc1251958_CVE-2025-62229_0001-present-Fix-use-after-free-in-present_create_notifie.patch
Old: * U_CVE-2025-49180-xfree86-Check-for-RandR-provider-functions.patch
*
bsc1251958_CVE-2025-62229_0001-present-Fix-use-after-free-in-present_create_notifie.patch
*
bsc1251959_CVE-2025-62230_0001-xkb-Make-the-RT_XKBCLIENT-resource-private.patch
Old: *
bsc1251958_CVE-2025-62229_0001-present-Fix-use-after-free-in-present_create_notifie.patch
*
bsc1251959_CVE-2025-62230_0001-xkb-Make-the-RT_XKBCLIENT-resource-private.patch
*
bsc1251959_CVE-2025-62230_0002-xkb-Free-the-XKB-resource-when-freeing-XkbInterest.patch
Old: *
bsc1251959_CVE-2025-62230_0001-xkb-Make-the-RT_XKBCLIENT-resource-private.patch
*
bsc1251959_CVE-2025-62230_0002-xkb-Free-the-XKB-resource-when-freeing-XkbInterest.patch
* bsc1251960_CVE-2025-62231_0001-xkb-Prevent-overflow-in-XkbSetCompatMap.patch
Old: *
bsc1251959_CVE-2025-62230_0002-xkb-Free-the-XKB-resource-when-freeing-XkbInterest.patch
* bsc1251960_CVE-2025-62231_0001-xkb-Prevent-overflow-in-XkbSetCompatMap.patch
* u_fbdevhw_kernel6.9_break_fbdev_open.patch
Old: *
bsc1251960_CVE-2025-62231_0001-xkb-Prevent-overflow-in-XkbSetCompatMap.patch
* u_fbdevhw_kernel6.9_break_fbdev_open.patch
* u_modesetting-Fix-dirty-updates-for-sw-rotation.patch
Old: * u_fbdevhw_kernel6.9_break_fbdev_open.patch
* u_modesetting-Fix-dirty-updates-for-sw-rotation.patch
- refreshed patches
----------(Old E)----------
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Other differences:
------------------
++++++ xorg-x11-server.spec ++++++
--- /var/tmp/diff_new_pack.XNoAyp/_old 2025-11-27 15:19:20.207351787 +0100
+++ /var/tmp/diff_new_pack.XNoAyp/_new 2025-11-27 15:19:20.207351787 +0100
@@ -36,7 +36,7 @@
%endif
Name: xorg-x11-server
-Version: 21.1.15
+Version: 21.1.21
Release: 0
URL: http://xorg.freedesktop.org/
Summary: X
@@ -230,8 +230,6 @@
Patch1900: u_no-lto-for-tests.patch
-Patch1910: u_modesetting-Fix-dirty-updates-for-sw-rotation.patch
-
Patch1920: u_xf86-Accept-devices-with-the-hyperv_drm-driver.patch
Patch1921: u_xf86-Accept-devices-with-the-kernels-ofdrm-driver.patch
Patch1922: u_xf86-Accept-devices-with-the-kernel-s-efidrm-driver.patch
@@ -241,37 +239,8 @@
Patch1960: u_sync-pci-ids-with-Mesa.patch
-Patch2000: u_fbdevhw_kernel6.9_break_fbdev_open.patch
-
Patch1218176: u_miCloseScreen_check_for_null_pScreen_dev_private.patch
-Patch1237451:
U_CVE-2025-26594-0001-Cursor-Refuse-to-free-the-root-cursor.patch
-Patch1237452: U_CVE-2025-26594-0002-dix-keep-a-ref-to-the-rootCursor.patch
-Patch1237453:
U_CVE-2025-26595-0001-xkb-Fix-buffer-overflow-in-XkbVModMaskText.patch
-Patch1237454:
U_CVE-2025-26596-0001-xkb-Fix-computation-of-XkbSizeKeySyms.patch
-Patch1237455:
U_CVE-2025-26597-0001-xkb-Fix-buffer-overflow-in-XkbChangeTypesOfKey.patch
-Patch1237456: U_CVE-2025-26598-0001-Xi-Fix-barrier-device-search.patch
-Patch1237457:
U_CVE-2025-26599-0001-composite-Handle-failure-to-redirect-in-compRedirect.patch
-Patch1237458:
U_CVE-2025-26599-0002-composite-initialize-border-clip-even-when-pixmap-al.patch
-Patch1237459:
U_CVE-2025-26600-0001-dix-Dequeue-pending-events-on-frozen-device-on-remov.patch
-Patch1237460:
U_CVE-2025-26601-0001-sync-Do-not-let-sync-objects-uninitialized.patch
-Patch1237461:
U_CVE-2025-26601-0002-sync-Check-values-before-applying-changes.patch
-Patch1237462:
U_CVE-2025-26601-0003-sync-Do-not-fail-SyncAddTriggerToSyncObject.patch
-Patch1237463:
U_CVE-2025-26601-0004-sync-Apply-changes-last-in-SyncChangeAlarmAttributes.patch
-Patch1239750: U_CVE-2022-49737-dix-Hold-input-lock-for-AttachDevice.patch
-Patch1244082: U_CVE-2025-49175-render-Avoid-0-or-less-animated-cursors.patch
-Patch1244084:
U_CVE-2025-49176-os-Do-not-overflow-the-integer-size-with-BigRequest.patch
-Patch1244085:
U_CVE-2025-49177-xfixes-Check-request-length-for-SetClientDisconnectM.patch
-Patch1244087:
U_CVE-2025-49178-os-Account-for-bytes-to-ignore-when-sharing-input-bu.patch
-Patch1244089:
U_CVE-2025-49179-record-Check-for-overflow-in-RecordSanityCheckRegist.patch
-Patch1244090:
U_CVE-2025-49180-randr-Check-for-overflow-in-RRChangeProviderProperty.patch
-Patch1244091:
U_CVE-2025-49180-xfree86-Check-for-RandR-provider-functions.patch
-Patch1244092:
U_CVE-2025-49176-os-Check-for-integer-overflow-on-BigRequest-length.patch
-Patch1251958:
bsc1251958_CVE-2025-62229_0001-present-Fix-use-after-free-in-present_create_notifie.patch
-Patch1251959:
bsc1251959_CVE-2025-62230_0001-xkb-Make-the-RT_XKBCLIENT-resource-private.patch
-Patch1251960:
bsc1251959_CVE-2025-62230_0002-xkb-Free-the-XKB-resource-when-freeing-XkbInterest.patch
-Patch1251961:
bsc1251960_CVE-2025-62231_0001-xkb-Prevent-overflow-in-XkbSetCompatMap.patch
-
%description
This package contains the X.Org Server.
@@ -415,47 +384,15 @@
%patch -P 1401 -p1
%patch -P 1503 -p1
%patch -P 1900 -p1
-%patch -P 1910 -p1
%patch -P 1920 -p1
%patch -P 1921 -p1
%patch -P 1922 -p1
%patch -P 1923 -p1
%patch -P 1930 -p1
%patch -P 1960 -p1
-%patch -P 2000 -p1
%patch -P 1218176 -p1
-%patch -P 1237451 -p1
-%patch -P 1237452 -p1
-%patch -P 1237453 -p1
-%patch -P 1237454 -p1
-%patch -P 1237455 -p1
-%patch -P 1237456 -p1
-%patch -P 1237457 -p1
-%patch -P 1237458 -p1
-%patch -P 1237459 -p1
-%patch -P 1237460 -p1
-%patch -P 1237461 -p1
-%patch -P 1237462 -p1
-%patch -P 1237463 -p1
-
-%patch -P 1239750 -p1
-
-%patch -P 1244082 -p1
-%patch -P 1244084 -p1
-%patch -P 1244085 -p1
-%patch -P 1244087 -p1
-%patch -P 1244089 -p1
-%patch -P 1244090 -p1
-%patch -P 1244091 -p1
-%patch -P 1244092 -p1
-
-%patch -P 1251958 -p1
-%patch -P 1251959 -p1
-%patch -P 1251960 -p1
-%patch -P 1251961 -p1
-
%build
# We have some -z now related errors during X default startup (boo#1197994):
# - when loading modesetting: gbm_bo_get_plane_count
++++++ N_Install-Avoid-failure-on-wrapper-installation.patch ++++++
--- /var/tmp/diff_new_pack.XNoAyp/_old 2025-11-27 15:19:20.251353642 +0100
+++ /var/tmp/diff_new_pack.XNoAyp/_new 2025-11-27 15:19:20.255353811 +0100
@@ -14,11 +14,11 @@
hw/xfree86/Makefile.am | 7 ++++---
1 file changed, 4 insertions(+), 3 deletions(-)
-Index: xorg-server-1.20.5/hw/xfree86/Makefile.am
+Index: xorg-server-21.1.21/hw/xfree86/Makefile.am
===================================================================
---- xorg-server-1.20.5.orig/hw/xfree86/Makefile.am
-+++ xorg-server-1.20.5/hw/xfree86/Makefile.am
-@@ -113,9 +113,10 @@ if INSTALL_SETUID
+--- xorg-server-21.1.21.orig/hw/xfree86/Makefile.am
++++ xorg-server-21.1.21/hw/xfree86/Makefile.am
+@@ -110,9 +110,10 @@ if INSTALL_SETUID
endif
if SUID_WRAPPER
$(MKDIR_P) $(DESTDIR)$(SUID_WRAPPER_DIR)
++++++ N_fix-dpi-values.diff ++++++
--- /var/tmp/diff_new_pack.XNoAyp/_old 2025-11-27 15:19:20.275354654 +0100
+++ /var/tmp/diff_new_pack.XNoAyp/_new 2025-11-27 15:19:20.279354823 +0100
@@ -6,7 +6,7 @@
===================================================================
--- hw/xfree86/common/xf86Helper.c.orig
+++ hw/xfree86/common/xf86Helper.c
-@@ -875,12 +875,22 @@ xf86SetDpi(ScrnInfoPtr pScrn, int x, int
+@@ -877,12 +877,22 @@ xf86SetDpi(ScrnInfoPtr pScrn, int x, int
else if (pScrn->widthmm > 0 || pScrn->heightmm > 0) {
from = X_CONFIG;
if (pScrn->widthmm > 0) {
@@ -33,7 +33,7 @@
}
if (pScrn->xDpi > 0 && pScrn->yDpi <= 0)
pScrn->yDpi = pScrn->xDpi;
-@@ -919,12 +929,22 @@ xf86SetDpi(ScrnInfoPtr pScrn, int x, int
+@@ -921,12 +931,22 @@ xf86SetDpi(ScrnInfoPtr pScrn, int x, int
pScrn->widthmm = ddcWidthmm;
pScrn->heightmm = ddcHeightmm;
if (pScrn->widthmm > 0) {
++++++ N_zap_warning_xserver.diff ++++++
--- /var/tmp/diff_new_pack.XNoAyp/_old 2025-11-27 15:19:20.303355835 +0100
+++ /var/tmp/diff_new_pack.XNoAyp/_new 2025-11-27 15:19:20.307356004 +0100
@@ -8,10 +8,10 @@
within 2 seconds.
This can be enabled with a new option flag "ZapWarning"
-Index: xorg-server-21.1.0/hw/xfree86/common/xf86Config.c
+Index: xorg-server-21.1.21/hw/xfree86/common/xf86Config.c
===================================================================
---- xorg-server-21.1.0.orig/hw/xfree86/common/xf86Config.c
-+++ xorg-server-21.1.0/hw/xfree86/common/xf86Config.c
+--- xorg-server-21.1.21.orig/hw/xfree86/common/xf86Config.c
++++ xorg-server-21.1.21/hw/xfree86/common/xf86Config.c
@@ -621,6 +621,7 @@ configFiles(XF86ConfFilesPtr fileconf)
typedef enum {
FLAG_DONTVTSWITCH,
@@ -20,7 +20,7 @@
FLAG_DONTZOOM,
FLAG_DISABLEVIDMODE,
FLAG_ALLOWNONLOCAL,
-@@ -657,6 +658,8 @@ static OptionInfoRec FlagOptions[] = {
+@@ -658,6 +659,8 @@ static OptionInfoRec FlagOptions[] = {
{0}, FALSE},
{FLAG_DONTZAP, "DontZap", OPTV_BOOLEAN,
{0}, FALSE},
@@ -29,7 +29,7 @@
{FLAG_DONTZOOM, "DontZoom", OPTV_BOOLEAN,
{0}, FALSE},
{FLAG_DISABLEVIDMODE, "DisableVidModeExtension", OPTV_BOOLEAN,
-@@ -739,6 +742,7 @@ configServerFlags(XF86ConfFlagsPtr flags
+@@ -742,6 +745,7 @@ configServerFlags(XF86ConfFlagsPtr flags
xf86GetOptValBool(FlagOptions, FLAG_DONTVTSWITCH, &xf86Info.dontVTSwitch);
xf86GetOptValBool(FlagOptions, FLAG_DONTZAP, &xf86Info.dontZap);
@@ -37,10 +37,10 @@
xf86GetOptValBool(FlagOptions, FLAG_DONTZOOM, &xf86Info.dontZoom);
xf86GetOptValBool(FlagOptions, FLAG_IGNORE_ABI, &xf86Info.ignoreABI);
-Index: xorg-server-21.1.0/hw/xfree86/common/xf86Events.c
+Index: xorg-server-21.1.21/hw/xfree86/common/xf86Events.c
===================================================================
---- xorg-server-21.1.0.orig/hw/xfree86/common/xf86Events.c
-+++ xorg-server-21.1.0/hw/xfree86/common/xf86Events.c
+--- xorg-server-21.1.21.orig/hw/xfree86/common/xf86Events.c
++++ xorg-server-21.1.21/hw/xfree86/common/xf86Events.c
@@ -158,10 +158,22 @@ xf86ProcessActionEvent(ActionEvent actio
DebugF("ProcessActionEvent(%d,%p)\n", (int) action, arg);
switch (action) {
@@ -67,10 +67,10 @@
break;
case ACTION_NEXT_MODE:
if (!xf86Info.dontZoom)
-Index: xorg-server-21.1.0/hw/xfree86/common/xf86Globals.c
+Index: xorg-server-21.1.21/hw/xfree86/common/xf86Globals.c
===================================================================
---- xorg-server-21.1.0.orig/hw/xfree86/common/xf86Globals.c
-+++ xorg-server-21.1.0/hw/xfree86/common/xf86Globals.c
+--- xorg-server-21.1.21.orig/hw/xfree86/common/xf86Globals.c
++++ xorg-server-21.1.21/hw/xfree86/common/xf86Globals.c
@@ -107,6 +107,7 @@ xf86InfoRec xf86Info = {
.autoVTSwitch = TRUE,
.ShareVTs = FALSE,
@@ -79,10 +79,10 @@
.dontZoom = FALSE,
.currentScreen = NULL,
#ifdef CSRG_BASED
-Index: xorg-server-21.1.0/hw/xfree86/common/xf86Privstr.h
+Index: xorg-server-21.1.21/hw/xfree86/common/xf86Privstr.h
===================================================================
---- xorg-server-21.1.0.orig/hw/xfree86/common/xf86Privstr.h
-+++ xorg-server-21.1.0/hw/xfree86/common/xf86Privstr.h
+--- xorg-server-21.1.21.orig/hw/xfree86/common/xf86Privstr.h
++++ xorg-server-21.1.21/hw/xfree86/common/xf86Privstr.h
@@ -62,6 +62,7 @@ typedef struct {
Bool autoVTSwitch;
Bool ShareVTs;
++++++ n_raise_default_clients.patch ++++++
--- /var/tmp/diff_new_pack.XNoAyp/_old 2025-11-27 15:19:20.355358028 +0100
+++ /var/tmp/diff_new_pack.XNoAyp/_new 2025-11-27 15:19:20.363358365 +0100
@@ -11,8 +11,10 @@
https://plug-discuss.phxlinux.narkive.com/BWkQ7Xez/xorg-maximum-number-of-clients-reached
it appears other distros are also doing that.
---- xorg-server-21.1.3.orig/include/misc.h
-+++ xorg-server-21.1.3/include/misc.h
+Index: xorg-server-21.1.21/include/misc.h
+===================================================================
+--- xorg-server-21.1.21.orig/include/misc.h
++++ xorg-server-21.1.21/include/misc.h
@@ -88,7 +88,7 @@ OF THIS SOFTWARE.
#define MAXGPUSCREENS 16
#endif
@@ -22,9 +24,11 @@
#define MAXEXTENSIONS 128
#define MAXFORMATS 8
#ifndef MAXDEVICES
---- xorg-server-21.1.3.orig/man/Xserver.man
-+++ xorg-server-21.1.3/man/Xserver.man
-@@ -317,9 +317,9 @@ A value of zero makes the stack size as
+Index: xorg-server-21.1.21/man/Xserver.man
+===================================================================
+--- xorg-server-21.1.21.orig/man/Xserver.man
++++ xorg-server-21.1.21/man/Xserver.man
+@@ -324,9 +324,9 @@ A value of zero makes the stack size as
of \-1 leaves the stack space limit unchanged.
.TP 8
.B \-maxclients
++++++ n_xorg-wrapper-rename-Xorg.patch ++++++
--- /var/tmp/diff_new_pack.XNoAyp/_old 2025-11-27 15:19:20.383359208 +0100
+++ /var/tmp/diff_new_pack.XNoAyp/_new 2025-11-27 15:19:20.387359378 +0100
@@ -1,6 +1,8 @@
---- xserver-1.20.9/hw/xfree86/xorg-wrapper.c.old 2020-09-24
03:16:27.270885000 +0200
-+++ xserver-1.20.9/hw/xfree86/xorg-wrapper.c 2020-09-24 03:18:42.047597000
+0200
-@@ -375,7 +375,7 @@ int main(int argc, char *argv[])
+Index: xorg-server-21.1.21/hw/xfree86/xorg-wrapper.c
+===================================================================
+--- xorg-server-21.1.21.orig/hw/xfree86/xorg-wrapper.c
++++ xorg-server-21.1.21/hw/xfree86/xorg-wrapper.c
+@@ -373,7 +373,7 @@ int main(int argc, char *argv[])
}
}
@@ -9,9 +11,11 @@
/* Check if the server is executable by our real uid */
if (access(buf, X_OK) != 0) {
---- xserver-1.20.9/hw/xfree86/Xorg.sh.in.orig 2020-09-24 03:36:20.690412000
+0200
-+++ xserver-1.20.9/hw/xfree86/Xorg.sh.in 2020-09-24 03:36:37.594497000
+0200
-@@ -7,5 +7,5 @@
+Index: xorg-server-21.1.21/hw/xfree86/Xorg.sh.in
+===================================================================
+--- xorg-server-21.1.21.orig/hw/xfree86/Xorg.sh.in
++++ xorg-server-21.1.21/hw/xfree86/Xorg.sh.in
+@@ -7,5 +7,5 @@ basedir=@SUID_WRAPPER_DIR@
if [ -x "$basedir"/Xorg.wrap ]; then
exec "$basedir"/Xorg.wrap "$@"
else
++++++ u_01-Improved-ConfineToShape.patch ++++++
--- /var/tmp/diff_new_pack.XNoAyp/_old 2025-11-27 15:19:20.427361064 +0100
+++ /var/tmp/diff_new_pack.XNoAyp/_new 2025-11-27 15:19:20.431361233 +0100
@@ -15,11 +15,11 @@
dix/events.c | 74 ++++++++++++++++++++++++++++++++++++++++--------------------
1 file changed, 50 insertions(+), 24 deletions(-)
-diff --git a/dix/events.c b/dix/events.c
-index efaf91d..5244781 100644
---- a/dix/events.c
-+++ b/dix/events.c
-@@ -666,37 +666,63 @@ SetCriticalEvent(int event)
+Index: xorg-server-21.1.21/dix/events.c
+===================================================================
+--- xorg-server-21.1.21.orig/dix/events.c
++++ xorg-server-21.1.21/dix/events.c
+@@ -682,37 +682,63 @@ SetCriticalEvent(int event)
criticalEvents[event >> 3] |= 1 << (event & 7);
}
++++++ u_Panning-Set-panning-state-in-xf86RandR12ScreenSetSize.patch ++++++
--- /var/tmp/diff_new_pack.XNoAyp/_old 2025-11-27 15:19:20.455362245 +0100
+++ /var/tmp/diff_new_pack.XNoAyp/_new 2025-11-27 15:19:20.455362245 +0100
@@ -16,11 +16,11 @@
hw/xfree86/modes/xf86RandR12.c | 3 +++
1 file changed, 3 insertions(+)
-Index: xorg-server-1.20.5/hw/xfree86/modes/xf86RandR12.c
+Index: xorg-server-21.1.21/hw/xfree86/modes/xf86RandR12.c
===================================================================
---- xorg-server-1.20.5.orig/hw/xfree86/modes/xf86RandR12.c
-+++ xorg-server-1.20.5/hw/xfree86/modes/xf86RandR12.c
-@@ -685,6 +685,7 @@ xf86RandR12ScreenSetSize(ScreenPtr pScre
+--- xorg-server-21.1.21.orig/hw/xfree86/modes/xf86RandR12.c
++++ xorg-server-21.1.21/hw/xfree86/modes/xf86RandR12.c
+@@ -684,6 +684,7 @@ xf86RandR12ScreenSetSize(ScreenPtr pScre
WindowPtr pRoot = pScreen->root;
PixmapPtr pScrnPix;
Bool ret = FALSE;
@@ -28,7 +28,7 @@
int c;
if (randrp->virtualX == -1 || randrp->virtualY == -1) {
-@@ -713,6 +714,7 @@ xf86RandR12ScreenSetSize(ScreenPtr pScre
+@@ -712,6 +713,7 @@ xf86RandR12ScreenSetSize(ScreenPtr pScre
if (crtc->panningTrackingArea.y2 > crtc->panningTrackingArea.y1)
crtc->panningTrackingArea.y2 += height - pScreen->height;
xf86RandR13VerifyPanningArea(crtc, width, height);
@@ -36,7 +36,7 @@
xf86RandR13Pan(crtc, randrp->pointerX, randrp->pointerY);
}
}
-@@ -722,6 +724,7 @@ xf86RandR12ScreenSetSize(ScreenPtr pScre
+@@ -721,6 +723,7 @@ xf86RandR12ScreenSetSize(ScreenPtr pScre
pScreen->height = pScrnPix->drawable.height = height;
randrp->mmWidth = pScreen->mmWidth = mmWidth;
randrp->mmHeight = pScreen->mmHeight = mmHeight;
++++++ u_Use-better-fallbacks-to-generate-cookies-if-arc4rand.patch ++++++
--- /var/tmp/diff_new_pack.XNoAyp/_old 2025-11-27 15:19:20.471362920 +0100
+++ /var/tmp/diff_new_pack.XNoAyp/_new 2025-11-27 15:19:20.475363088 +0100
@@ -24,10 +24,10 @@
os/auth.c | 138 ++++++++++++++++++++++++++++++++++++++++++++++--
3 files changed, 141 insertions(+), 7 deletions(-)
-Index: xorg-server-21.1.9/configure.ac
+Index: xorg-server-21.1.21/configure.ac
===================================================================
---- xorg-server-21.1.9.orig/configure.ac
-+++ xorg-server-21.1.9/configure.ac
+--- xorg-server-21.1.21.orig/configure.ac
++++ xorg-server-21.1.21/configure.ac
@@ -132,7 +132,7 @@ AM_CONDITIONAL(SPECIAL_DTRACE_OBJECTS, [
AC_HEADER_DIRENT
AC_HEADER_STDC
@@ -37,10 +37,10 @@
dnl Checks for typedefs, structures, and compiler characteristics.
AC_C_CONST
-Index: xorg-server-21.1.9/include/dix-config.h.in
+Index: xorg-server-21.1.21/include/dix-config.h.in
===================================================================
---- xorg-server-21.1.9.orig/include/dix-config.h.in
-+++ xorg-server-21.1.9/include/dix-config.h.in
+--- xorg-server-21.1.21.orig/include/dix-config.h.in
++++ xorg-server-21.1.21/include/dix-config.h.in
@@ -149,6 +149,9 @@
/* Define to 1 if you have the `arc4random_buf' function. */
#undef HAVE_ARC4RANDOM_BUF
@@ -51,7 +51,7 @@
/* Define to use libc SHA1 functions */
#undef HAVE_SHA1_IN_LIBC
-@@ -226,6 +229,9 @@
+@@ -229,6 +232,9 @@
/* Define to 1 if you have the <sys/utsname.h> header file. */
#undef HAVE_SYS_UTSNAME_H
@@ -61,10 +61,10 @@
/* Define to 1 if you have the `timingsafe_memcmp' function. */
#undef HAVE_TIMINGSAFE_MEMCMP
-Index: xorg-server-21.1.9/os/auth.c
+Index: xorg-server-21.1.21/os/auth.c
===================================================================
---- xorg-server-21.1.9.orig/os/auth.c
-+++ xorg-server-21.1.9/os/auth.c
+--- xorg-server-21.1.21.orig/os/auth.c
++++ xorg-server-21.1.21/os/auth.c
@@ -34,6 +34,10 @@ from The Open Group.
#ifdef HAVE_DIX_CONFIG_H
#include <dix-config.h>
++++++ u_xf86-Accept-devices-with-the-kernel-s-efidrm-driver.patch ++++++
--- /var/tmp/diff_new_pack.XNoAyp/_old 2025-11-27 15:19:20.527365281 +0100
+++ /var/tmp/diff_new_pack.XNoAyp/_new 2025-11-27 15:19:20.535365619 +0100
@@ -13,11 +13,11 @@
hw/xfree86/common/xf86platformBus.c | 3 +++
1 file changed, 3 insertions(+)
-diff --git a/hw/xfree86/common/xf86platformBus.c
b/hw/xfree86/common/xf86platformBus.c
-index dbae465fc..0fa8ade20 100644
---- a/hw/xfree86/common/xf86platformBus.c
-+++ b/hw/xfree86/common/xf86platformBus.c
-@@ -580,6 +580,9 @@ xf86platformProbeDev(DriverPtr drvp)
+Index: xorg-server-21.1.21/hw/xfree86/common/xf86platformBus.c
+===================================================================
+--- xorg-server-21.1.21.orig/hw/xfree86/common/xf86platformBus.c
++++ xorg-server-21.1.21/hw/xfree86/common/xf86platformBus.c
+@@ -560,6 +560,9 @@ xf86platformProbeDev(DriverPtr drvp)
if (ServerIsNotSeat0()) {
break;
} else {
@@ -27,7 +27,4 @@
/* Accept the device if the driver is hyperv_drm */
if (strcmp(xf86_platform_devices[j].attribs->driver,
"hyperv_drm") == 0)
break;
---
-2.49.0
-
++++++ u_xf86-Accept-devices-with-the-kernel-s-vesadrm-driver.patch ++++++
--- /var/tmp/diff_new_pack.XNoAyp/_old 2025-11-27 15:19:20.551366294 +0100
+++ /var/tmp/diff_new_pack.XNoAyp/_new 2025-11-27 15:19:20.559366630 +0100
@@ -13,11 +13,11 @@
hw/xfree86/common/xf86platformBus.c | 3 +++
1 file changed, 3 insertions(+)
-diff --git a/hw/xfree86/common/xf86platformBus.c
b/hw/xfree86/common/xf86platformBus.c
-index 0fa8ade20..3df1b2812 100644
---- a/hw/xfree86/common/xf86platformBus.c
-+++ b/hw/xfree86/common/xf86platformBus.c
-@@ -592,6 +592,9 @@ xf86platformProbeDev(DriverPtr drvp)
+Index: xorg-server-21.1.21/hw/xfree86/common/xf86platformBus.c
+===================================================================
+--- xorg-server-21.1.21.orig/hw/xfree86/common/xf86platformBus.c
++++ xorg-server-21.1.21/hw/xfree86/common/xf86platformBus.c
+@@ -572,6 +572,9 @@ xf86platformProbeDev(DriverPtr drvp)
/* Accept the device if the driver is simpledrm */
if (strcmp(xf86_platform_devices[j].attribs->driver,
"simpledrm") == 0)
break;
@@ -27,7 +27,4 @@
}
if (xf86IsPrimaryPlatform(&xf86_platform_devices[j]))
---
-2.49.0
-
++++++ u_xfree86-activate-GPU-screens-on-autobind.patch ++++++
--- /var/tmp/diff_new_pack.XNoAyp/_old 2025-11-27 15:19:20.583367643 +0100
+++ /var/tmp/diff_new_pack.XNoAyp/_new 2025-11-27 15:19:20.587367812 +0100
@@ -14,10 +14,10 @@
include/dix.h | 2 +
3 files changed, 191 insertions(+)
-diff --git a/dix/main.c b/dix/main.c
-index bfc8addbe..c7b8ed49e 100644
---- a/dix/main.c
-+++ b/dix/main.c
+Index: xorg-server-21.1.21/dix/main.c
+===================================================================
+--- xorg-server-21.1.21.orig/dix/main.c
++++ xorg-server-21.1.21/dix/main.c
@@ -121,6 +121,8 @@ extern void Dispatch(void);
CallbackListPtr RootWindowFinalizeCallback = NULL;
@@ -27,7 +27,7 @@
int
dix_main(int argc, char *argv[], char *envp[])
{
-@@ -242,6 +244,8 @@ dix_main(int argc, char *argv[], char *envp[])
+@@ -244,6 +246,8 @@ dix_main(int argc, char *argv[], char *e
for (i = 0; i < screenInfo.numScreens; i++)
InitRootWindow(screenInfo.screens[i]->root);
@@ -36,20 +36,20 @@
InitCoreDevices();
InitInput(argc, argv);
InitAndStartDevices();
-diff --git a/hw/xfree86/common/xf86Init.c b/hw/xfree86/common/xf86Init.c
-index 380288ca4..9839cb19c 100644
---- a/hw/xfree86/common/xf86Init.c
-+++ b/hw/xfree86/common/xf86Init.c
-@@ -204,6 +204,9 @@ xf86HasTTYs(void)
- #endif
+Index: xorg-server-21.1.21/hw/xfree86/common/xf86Init.c
+===================================================================
+--- xorg-server-21.1.21.orig/hw/xfree86/common/xf86Init.c
++++ xorg-server-21.1.21/hw/xfree86/common/xf86Init.c
+@@ -205,6 +205,9 @@ xf86HasTTYs(void)
}
-+static void
+ static void
+xf86AutoConfigProviderOutputs(CallbackListPtr *pcbl, void *data, void
*call_data);
+
- static void
++static void
xf86AutoConfigOutputDevices(void)
{
+ int i;
@@ -217,6 +220,8 @@ xf86AutoConfigOutputDevices(void)
RRProviderAutoConfigGpuScreen(xf86ScrnToScreen(xf86GPUScreens[i]),
xf86ScrnToScreen(xf86Screens[scrnum]));
@@ -59,7 +59,7 @@
}
static void
-@@ -258,6 +263,189 @@ AddVTAtoms(CallbackListPtr *pcbl, void *data, void
*screen)
+@@ -258,6 +263,189 @@ AddVTAtoms(CallbackListPtr *pcbl, void *
"Failed to register VT properties\n");
}
@@ -249,10 +249,10 @@
static Bool
xf86ScreenInit(ScreenPtr pScreen, int argc, char **argv)
{
-diff --git a/include/dix.h b/include/dix.h
-index 0dcd09b65..ecc73d1d9 100644
---- a/include/dix.h
-+++ b/include/dix.h
+Index: xorg-server-21.1.21/include/dix.h
+===================================================================
+--- xorg-server-21.1.21.orig/include/dix.h
++++ xorg-server-21.1.21/include/dix.h
@@ -620,6 +620,8 @@ typedef struct {
extern _X_EXPORT CallbackListPtr RootWindowFinalizeCallback;
@@ -262,7 +262,4 @@
extern int
XItoCoreType(int xi_type);
extern Bool
---
-2.25.1
-
++++++ u_xorg-server-xdmcp.patch ++++++
--- /var/tmp/diff_new_pack.XNoAyp/_old 2025-11-27 15:19:20.603368487 +0100
+++ /var/tmp/diff_new_pack.XNoAyp/_new 2025-11-27 15:19:20.611368823 +0100
@@ -12,11 +12,11 @@
Even if this seems to be the wrong place to fix this it seems to be
easier than fixing all display servers.
-Index: xorg-server-1.20.5/os/access.c
+Index: xorg-server-21.1.21/os/access.c
===================================================================
---- xorg-server-1.20.5.orig/os/access.c
-+++ xorg-server-1.20.5/os/access.c
-@@ -827,7 +827,9 @@ DefineSelf(int fd)
+--- xorg-server-21.1.21.orig/os/access.c
++++ xorg-server-21.1.21/os/access.c
+@@ -830,7 +830,9 @@ DefineSelf(int fd)
/*
* ignore 'localhost' entries as they're not useful
@@ -27,7 +27,7 @@
*/
if (ifr->ifa_flags & IFF_LOOPBACK)
continue;
-@@ -848,6 +850,14 @@ DefineSelf(int fd)
+@@ -851,6 +853,14 @@ DefineSelf(int fd)
else if (family == FamilyInternet6 &&
IN6_IS_ADDR_LOOPBACK((struct in6_addr *) addr))
continue;
++++++ u_xorg-wrapper-build-Build-position-independent-code.patch ++++++
--- /var/tmp/diff_new_pack.XNoAyp/_old 2025-11-27 15:19:20.639370004 +0100
+++ /var/tmp/diff_new_pack.XNoAyp/_new 2025-11-27 15:19:20.643370173 +0100
@@ -10,11 +10,11 @@
hw/xfree86/Makefile.am | 1 +
1 file changed, 1 insertion(+)
-Index: xorg-server-1.20.5/hw/xfree86/Makefile.am
+Index: xorg-server-21.1.21/hw/xfree86/Makefile.am
===================================================================
---- xorg-server-1.20.5.orig/hw/xfree86/Makefile.am
-+++ xorg-server-1.20.5/hw/xfree86/Makefile.am
-@@ -92,6 +92,7 @@ if SUID_WRAPPER
+--- xorg-server-21.1.21.orig/hw/xfree86/Makefile.am
++++ xorg-server-21.1.21/hw/xfree86/Makefile.am
+@@ -89,6 +89,7 @@ if SUID_WRAPPER
wrapexecdir = $(SUID_WRAPPER_DIR)
wrapexec_PROGRAMS = Xorg.wrap
Xorg_wrap_SOURCES = xorg-wrapper.c
++++++ xorg-server-21.1.15.tar.xz -> xorg-server-21.1.21.tar.xz ++++++
++++ 25771 lines of diff (skipped)
++++++ xorg-x11-server-byte-order.patch ++++++
--- /var/tmp/diff_new_pack.XNoAyp/_old 2025-11-27 15:19:22.823462106 +0100
+++ /var/tmp/diff_new_pack.XNoAyp/_new 2025-11-27 15:19:22.835462612 +0100
@@ -11,11 +11,11 @@
include/xorg-server.h.in | 1 +
2 files changed, 2 insertions(+)
-Index: xorg-server-1.20.5/include/dix-config.h.in
+Index: xorg-server-21.1.21/include/dix-config.h.in
===================================================================
---- xorg-server-1.20.5.orig/include/dix-config.h.in
-+++ xorg-server-1.20.5/include/dix-config.h.in
-@@ -487,6 +487,7 @@
+--- xorg-server-21.1.21.orig/include/dix-config.h.in
++++ xorg-server-21.1.21/include/dix-config.h.in
+@@ -484,6 +484,7 @@
/* byte order */
#undef X_BYTE_ORDER
@@ -23,10 +23,10 @@
/* Listen on TCP socket */
#undef LISTEN_TCP
-Index: xorg-server-1.20.5/include/xorg-server.h.in
+Index: xorg-server-21.1.21/include/xorg-server.h.in
===================================================================
---- xorg-server-1.20.5.orig/include/xorg-server.h.in
-+++ xorg-server-1.20.5/include/xorg-server.h.in
+--- xorg-server-21.1.21.orig/include/xorg-server.h.in
++++ xorg-server-21.1.21/include/xorg-server.h.in
@@ -218,5 +218,6 @@
/* byte order */