Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package xen for openSUSE:Factory checked in 
at 2022-04-16 00:12:55
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/xen (Old)
 and      /work/SRC/openSUSE:Factory/.xen.new.1941 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "xen"

Sat Apr 16 00:12:55 2022 rev:316 rq:969996 version:4.16.1_02

Changes:
--------
--- /work/SRC/openSUSE:Factory/xen/xen.changes  2022-04-08 00:27:01.482789653 
+0200
+++ /work/SRC/openSUSE:Factory/.xen.new.1941/xen.changes        2022-04-16 
00:13:02.953552960 +0200
@@ -1,0 +2,77 @@
+Wed Apr 13 08:54:02 MDT 2022 - carn...@suse.com
+
+- Update to Xen 4.16.1 bug fix release (bsc#1027519)
+  xen-4.16.1-testing-src.tar.bz2
+- Drop patches contained in new tarball
+  61b31d5c-x86-restrict-all-but-self-IPI.patch
+  61b88e78-x86-CPUID-TSXLDTRK-definition.patch
+  61bc429f-revert-hvmloader-PA-range-should-be-UC.patch
+  61d5687a-x86-spec-ctrl-opt_srb_lock-default.patch
+  61d6ea2d-VT-d-split-domid-map-cleanup-check-into-a-function.patch
+  61d6ea7b-VT-d-dont-leak-domid-mapping-on-error-path.patch
+  61e0296a-x86-time-calibration-relative-counts.patch
+  61e029c8-x86-time-TSC-freq-calibration-accuracy.patch
+  61e02a1c-libxl-PCI-PV-hotplug-stubdom-coldplug.patch
+  61e98e88-x86-introduce-get-set-reg-infra.patch
+  61e98e89-x86-MSR-split-SPEC_CTRL-handling.patch
+  61e98e8a-x86-spec-ctrl-drop-ENTRY-EXIT-HVM.patch
+  61e98e8b-VT-x-SPEC_CTRL-NMI-race-condition.patch
+  61eaaa23-x86-get-set-reg-infra-build.patch
+  61efec1d-Arm-P2M-always-clear-entry-on-mapping-removal.patch
+  61efec4d-gnttab-only-decrement-refcounter-on-final-unmap.patch
+  61efec96-IOMMU-x86-stop-pirq-iteration-immediately-on-error.patch
+  61f2d886-x86-CPUID-disentangle-new-leaves-logic.patch
+  61f2d887-x86-CPUID-leaf-7-1-EBX-infra.patch
+  61f2dd76-x86-SPEC_CTRL-migration-compatibility.patch
+  61f7b2af-libxl-dont-touch-nr_vcpus_out-if-listing.patch
+  61f933a4-x86-cpuid-advertise-SSB_NO.patch
+  61f933a5-x86-drop-use_spec_ctrl-boolean.patch
+  61f933a6-x86-new-has_spec_ctrl-boolean.patch
+  61f933a7-x86-dont-use-spec_ctrl-enter-exit-for-S3.patch
+  61f933a8-x86-SPEC_CTRL-record-last-write.patch
+  61f933a9-x86-SPEC_CTRL-use-common-logic-for-AMD.patch
+  61f933aa-SVM-SPEC_CTRL-entry-exit-logic.patch
+  61f933ab-x86-AMD-SPEC_CTRL-infra.patch
+  61f933ac-SVM-enable-MSR_SPEC_CTRL-for-guests.patch
+  61f946a2-VMX-drop-SPEC_CTRL-load-on-VMEntry.patch
+  6202afa3-x86-clean-up-MSR_MCU_OPT_CTRL-handling.patch
+  6202afa4-x86-TSX-move-has_rtm_always_abort.patch
+  6202afa5-x86-TSX-cope-with-deprecation-on-WHL-R-CFL-R.patch
+  6202afa7-x86-CPUID-leaf-7-2-EDX-infra.patch
+  6202afa8-x86-Intel-PSFD-for-guests.patch
+  62278667-Arm-introduce-new-processors.patch
+  62278668-Arm-move-errata-CSV2-check-earlier.patch
+  62278669-Arm-add-ECBHB-and-CLEARBHB-ID-fields.patch
+  6227866a-Arm-Spectre-BHB-handling.patch
+  6227866b-Arm-allow-SMCCC_ARCH_WORKAROUND_3-use.patch
+  6227866c-x86-AMD-cease-using-thunk-lfence.patch
+  6229ba46-VT-d-drop-undue-address-of-from-check_cleanup_domid_map.patch
+  624ebcef-VT-d-dont-needlessly-look-up-DID.patch
+  624ebd3b-VT-d-avoid-NULL-deref-on-dcmo-error-paths.patch
+  624ebd74-VT-d-avoid-infinite-recursion-on-dcmo-error-path.patch
+  xsa397.patch
+  xsa399.patch
+  xsa400-01.patch
+  xsa400-02.patch
+  xsa400-03.patch
+  xsa400-04.patch
+  xsa400-05.patch
+  xsa400-06.patch
+  xsa400-07.patch
+  xsa400-08.patch
+  xsa400-09.patch
+  xsa400-10.patch
+  xsa400-11.patch
+  xsa400-12.patch
+
+-------------------------------------------------------------------
+Fri Apr  8 12:00:00 CEST 2022 - jbeul...@suse.com
+
+- bsc#1197426 - VUL-0: CVE-2022-26358,CVE-2022-26359,
+  CVE-2022-26360,CVE-2022-26361: xen: IOMMU: RMRR (VT-d) and unity
+  map (AMD-Vi) handling issues (XSA-400)
+  624ebcef-VT-d-dont-needlessly-look-up-DID.patch
+  624ebd3b-VT-d-avoid-NULL-deref-on-dcmo-error-paths.patch
+  624ebd74-VT-d-avoid-infinite-recursion-on-dcmo-error-path.patch
+
+-------------------------------------------------------------------

Old:
----
  61b31d5c-x86-restrict-all-but-self-IPI.patch
  61b88e78-x86-CPUID-TSXLDTRK-definition.patch
  61bc429f-revert-hvmloader-PA-range-should-be-UC.patch
  61d5687a-x86-spec-ctrl-opt_srb_lock-default.patch
  61d6ea2d-VT-d-split-domid-map-cleanup-check-into-a-function.patch
  61d6ea7b-VT-d-dont-leak-domid-mapping-on-error-path.patch
  61e0296a-x86-time-calibration-relative-counts.patch
  61e029c8-x86-time-TSC-freq-calibration-accuracy.patch
  61e02a1c-libxl-PCI-PV-hotplug-stubdom-coldplug.patch
  61e98e88-x86-introduce-get-set-reg-infra.patch
  61e98e89-x86-MSR-split-SPEC_CTRL-handling.patch
  61e98e8a-x86-spec-ctrl-drop-ENTRY-EXIT-HVM.patch
  61e98e8b-VT-x-SPEC_CTRL-NMI-race-condition.patch
  61eaaa23-x86-get-set-reg-infra-build.patch
  61efec1d-Arm-P2M-always-clear-entry-on-mapping-removal.patch
  61efec4d-gnttab-only-decrement-refcounter-on-final-unmap.patch
  61efec96-IOMMU-x86-stop-pirq-iteration-immediately-on-error.patch
  61f2d886-x86-CPUID-disentangle-new-leaves-logic.patch
  61f2d887-x86-CPUID-leaf-7-1-EBX-infra.patch
  61f2dd76-x86-SPEC_CTRL-migration-compatibility.patch
  61f7b2af-libxl-dont-touch-nr_vcpus_out-if-listing.patch
  61f933a4-x86-cpuid-advertise-SSB_NO.patch
  61f933a5-x86-drop-use_spec_ctrl-boolean.patch
  61f933a6-x86-new-has_spec_ctrl-boolean.patch
  61f933a7-x86-dont-use-spec_ctrl-enter-exit-for-S3.patch
  61f933a8-x86-SPEC_CTRL-record-last-write.patch
  61f933a9-x86-SPEC_CTRL-use-common-logic-for-AMD.patch
  61f933aa-SVM-SPEC_CTRL-entry-exit-logic.patch
  61f933ab-x86-AMD-SPEC_CTRL-infra.patch
  61f933ac-SVM-enable-MSR_SPEC_CTRL-for-guests.patch
  61f946a2-VMX-drop-SPEC_CTRL-load-on-VMEntry.patch
  6202afa3-x86-clean-up-MSR_MCU_OPT_CTRL-handling.patch
  6202afa4-x86-TSX-move-has_rtm_always_abort.patch
  6202afa5-x86-TSX-cope-with-deprecation-on-WHL-R-CFL-R.patch
  6202afa7-x86-CPUID-leaf-7-2-EDX-infra.patch
  6202afa8-x86-Intel-PSFD-for-guests.patch
  62278667-Arm-introduce-new-processors.patch
  62278668-Arm-move-errata-CSV2-check-earlier.patch
  62278669-Arm-add-ECBHB-and-CLEARBHB-ID-fields.patch
  6227866a-Arm-Spectre-BHB-handling.patch
  6227866b-Arm-allow-SMCCC_ARCH_WORKAROUND_3-use.patch
  6227866c-x86-AMD-cease-using-thunk-lfence.patch
  6229ba46-VT-d-drop-undue-address-of-from-check_cleanup_domid_map.patch
  xen-4.16.0-testing-src.tar.bz2
  xsa397.patch
  xsa399.patch
  xsa400-01.patch
  xsa400-02.patch
  xsa400-03.patch
  xsa400-04.patch
  xsa400-05.patch
  xsa400-06.patch
  xsa400-07.patch
  xsa400-08.patch
  xsa400-09.patch
  xsa400-10.patch
  xsa400-11.patch
  xsa400-12.patch

New:
----
  xen-4.16.1-testing-src.tar.bz2

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ xen.spec ++++++
--- /var/tmp/diff_new_pack.VmSxm2/_old  2022-04-16 00:13:06.485557675 +0200
+++ /var/tmp/diff_new_pack.VmSxm2/_new  2022-04-16 00:13:06.489557681 +0200
@@ -28,7 +28,7 @@
 
 Name:           xen
 ExclusiveArch:  %ix86 x86_64 aarch64
-%define xen_build_dir xen-4.16.0-testing
+%define xen_build_dir xen-4.16.1-testing
 #
 %define with_gdbsx 0
 %define with_dom0_support 0
@@ -119,12 +119,12 @@
 %endif
 Provides:       installhint(reboot-needed)
 
-Version:        4.16.0_08
+Version:        4.16.1_02
 Release:        0
 Summary:        Xen Virtualization: Hypervisor (aka VMM aka Microkernel)
 License:        GPL-2.0-only
 Group:          System/Kernel
-Source0:        xen-4.16.0-testing-src.tar.bz2
+Source0:        xen-4.16.1-testing-src.tar.bz2
 Source1:        stubdom.tar.bz2
 Source2:        mini-os.tar.bz2
 Source3:        xen-utils-0.1.tar.bz2
@@ -155,64 +155,7 @@
 # For xen-libs
 Source99:       baselibs.conf
 # Upstream patches
-Patch1:         61b31d5c-x86-restrict-all-but-self-IPI.patch
-Patch2:         61b88e78-x86-CPUID-TSXLDTRK-definition.patch
-Patch3:         61bc429f-revert-hvmloader-PA-range-should-be-UC.patch
-Patch4:         61d5687a-x86-spec-ctrl-opt_srb_lock-default.patch
-Patch5:         61e0296a-x86-time-calibration-relative-counts.patch
-Patch6:         61e029c8-x86-time-TSC-freq-calibration-accuracy.patch
-Patch7:         61e02a1c-libxl-PCI-PV-hotplug-stubdom-coldplug.patch
-Patch8:         61e98e88-x86-introduce-get-set-reg-infra.patch
-Patch9:         61e98e89-x86-MSR-split-SPEC_CTRL-handling.patch
-Patch10:        61e98e8a-x86-spec-ctrl-drop-ENTRY-EXIT-HVM.patch
-Patch11:        61e98e8b-VT-x-SPEC_CTRL-NMI-race-condition.patch
-Patch12:        61eaaa23-x86-get-set-reg-infra-build.patch
-Patch13:        61efec1d-Arm-P2M-always-clear-entry-on-mapping-removal.patch
-Patch14:        61efec4d-gnttab-only-decrement-refcounter-on-final-unmap.patch
-Patch15:        
61efec96-IOMMU-x86-stop-pirq-iteration-immediately-on-error.patch
-Patch16:        61f2d886-x86-CPUID-disentangle-new-leaves-logic.patch
-Patch17:        61f2d887-x86-CPUID-leaf-7-1-EBX-infra.patch
-Patch18:        61f2dd76-x86-SPEC_CTRL-migration-compatibility.patch
-Patch19:        61f7b2af-libxl-dont-touch-nr_vcpus_out-if-listing.patch
-Patch20:        61f933a4-x86-cpuid-advertise-SSB_NO.patch
-Patch21:        61f933a5-x86-drop-use_spec_ctrl-boolean.patch
-Patch22:        61f933a6-x86-new-has_spec_ctrl-boolean.patch
-Patch23:        61f933a7-x86-dont-use-spec_ctrl-enter-exit-for-S3.patch
-Patch24:        61f933a8-x86-SPEC_CTRL-record-last-write.patch
-Patch25:        61f933a9-x86-SPEC_CTRL-use-common-logic-for-AMD.patch
-Patch26:        61f933aa-SVM-SPEC_CTRL-entry-exit-logic.patch
-Patch27:        61f933ab-x86-AMD-SPEC_CTRL-infra.patch
-Patch28:        61f933ac-SVM-enable-MSR_SPEC_CTRL-for-guests.patch
-Patch29:        61f946a2-VMX-drop-SPEC_CTRL-load-on-VMEntry.patch
-Patch30:        6202afa3-x86-clean-up-MSR_MCU_OPT_CTRL-handling.patch
-Patch31:        6202afa4-x86-TSX-move-has_rtm_always_abort.patch
-Patch32:        6202afa5-x86-TSX-cope-with-deprecation-on-WHL-R-CFL-R.patch
-Patch33:        6202afa7-x86-CPUID-leaf-7-2-EDX-infra.patch
-Patch34:        6202afa8-x86-Intel-PSFD-for-guests.patch
-Patch35:        62278667-Arm-introduce-new-processors.patch
-Patch36:        62278668-Arm-move-errata-CSV2-check-earlier.patch
-Patch37:        62278669-Arm-add-ECBHB-and-CLEARBHB-ID-fields.patch
-Patch38:        6227866a-Arm-Spectre-BHB-handling.patch
-Patch39:        6227866b-Arm-allow-SMCCC_ARCH_WORKAROUND_3-use.patch
-Patch40:        6227866c-x86-AMD-cease-using-thunk-lfence.patch
-Patch41:        
61d6ea2d-VT-d-split-domid-map-cleanup-check-into-a-function.patch
-Patch42:        61d6ea7b-VT-d-dont-leak-domid-mapping-on-error-path.patch
-Patch43:        
6229ba46-VT-d-drop-undue-address-of-from-check_cleanup_domid_map.patch
 # EMBARGOED security fixes
-Patch97:        xsa397.patch
-Patch99:        xsa399.patch
-Patch101:       xsa400-01.patch
-Patch102:       xsa400-02.patch
-Patch103:       xsa400-03.patch
-Patch104:       xsa400-04.patch
-Patch105:       xsa400-05.patch
-Patch106:       xsa400-06.patch
-Patch107:       xsa400-07.patch
-Patch108:       xsa400-08.patch
-Patch109:       xsa400-09.patch
-Patch110:       xsa400-10.patch
-Patch111:       xsa400-11.patch
-Patch112:       xsa400-12.patch
 # libxc
 Patch301:       libxc-bitmap-long.patch
 Patch302:       libxc-sr-xl-migration-debug.patch

++++++ gcc12-fixes.patch ++++++
--- /var/tmp/diff_new_pack.VmSxm2/_old  2022-04-16 00:13:06.617557852 +0200
+++ /var/tmp/diff_new_pack.VmSxm2/_new  2022-04-16 00:13:06.621557857 +0200
@@ -13,8 +13,10 @@
 xen/include/asm-x86/paging.h
 
 
---- a/xen/drivers/passthrough/amd/iommu_intr.c
-+++ b/xen/drivers/passthrough/amd/iommu_intr.c
+Index: xen-4.16.1-testing/xen/drivers/passthrough/amd/iommu_intr.c
+===================================================================
+--- xen-4.16.1-testing.orig/xen/drivers/passthrough/amd/iommu_intr.c
++++ xen-4.16.1-testing/xen/drivers/passthrough/amd/iommu_intr.c
 @@ -23,6 +23,10 @@
  
  #include "iommu.h"
@@ -26,8 +28,10 @@
  union irte32 {
      uint32_t raw;
      struct {
---- a/xen/drivers/passthrough/x86/hvm.c
-+++ b/xen/drivers/passthrough/x86/hvm.c
+Index: xen-4.16.1-testing/xen/drivers/passthrough/x86/hvm.c
+===================================================================
+--- xen-4.16.1-testing.orig/xen/drivers/passthrough/x86/hvm.c
++++ xen-4.16.1-testing/xen/drivers/passthrough/x86/hvm.c
 @@ -901,6 +901,9 @@ static void __hvm_dpci_eoi(struct domain
      hvm_pirq_eoi(pirq);
  }
@@ -38,8 +42,10 @@
  static void hvm_gsi_eoi(struct domain *d, unsigned int gsi)
  {
      struct pirq *pirq = pirq_info(d, gsi);
---- a/xen/common/domctl.c
-+++ b/xen/common/domctl.c
+Index: xen-4.16.1-testing/xen/common/domctl.c
+===================================================================
+--- xen-4.16.1-testing.orig/xen/common/domctl.c
++++ xen-4.16.1-testing/xen/common/domctl.c
 @@ -32,6 +32,10 @@
  #include <public/domctl.h>
  #include <xsm/xsm.h>
@@ -51,8 +57,10 @@
  static DEFINE_SPINLOCK(domctl_lock);
  
  static int nodemask_to_xenctl_bitmap(struct xenctl_bitmap *xenctl_nodemap,
---- a/xen/common/efi/boot.c
-+++ b/xen/common/efi/boot.c
+Index: xen-4.16.1-testing/xen/common/efi/boot.c
+===================================================================
+--- xen-4.16.1-testing.orig/xen/common/efi/boot.c
++++ xen-4.16.1-testing/xen/common/efi/boot.c
 @@ -31,6 +31,10 @@
  #undef __ASSEMBLY__
  #endif
@@ -64,8 +72,10 @@
  #define EFI_REVISION(major, minor) (((major) << 16) | (minor))
  
  #define SMBIOS3_TABLE_GUID \
---- a/xen/common/xmalloc_tlsf.c
-+++ b/xen/common/xmalloc_tlsf.c
+Index: xen-4.16.1-testing/xen/common/xmalloc_tlsf.c
+===================================================================
+--- xen-4.16.1-testing.orig/xen/common/xmalloc_tlsf.c
++++ xen-4.16.1-testing/xen/common/xmalloc_tlsf.c
 @@ -28,6 +28,10 @@
  #include <xen/pfn.h>
  #include <asm/time.h>
@@ -77,8 +87,10 @@
  #define MAX_POOL_NAME_LEN       16
  
  /* Some IMPORTANT TLSF parameters */
---- a/xen/common/memory.c
-+++ b/xen/common/memory.c
+Index: xen-4.16.1-testing/xen/common/memory.c
+===================================================================
+--- xen-4.16.1-testing.orig/xen/common/memory.c
++++ xen-4.16.1-testing/xen/common/memory.c
 @@ -35,6 +35,10 @@
  #include <asm/guest.h>
  #endif
@@ -90,8 +102,10 @@
  struct memop_args {
      /* INPUT */
      struct domain *domain;     /* Domain to be affected. */
---- a/xen/common/page_alloc.c
-+++ b/xen/common/page_alloc.c
+Index: xen-4.16.1-testing/xen/common/page_alloc.c
+===================================================================
+--- xen-4.16.1-testing.orig/xen/common/page_alloc.c
++++ xen-4.16.1-testing/xen/common/page_alloc.c
 @@ -155,6 +155,10 @@
  #define PGC_reserved 0
  #endif
@@ -111,8 +125,10 @@
  /*
   * Following rules applied for page offline:
   * Once a page is broken, it can't be assigned anymore
---- a/xen/common/vmap.c
-+++ b/xen/common/vmap.c
+Index: xen-4.16.1-testing/xen/common/vmap.c
+===================================================================
+--- xen-4.16.1-testing.orig/xen/common/vmap.c
++++ xen-4.16.1-testing/xen/common/vmap.c
 @@ -9,6 +9,10 @@
  #include <xen/vmap.h>
  #include <asm/page.h>
@@ -124,8 +140,10 @@
  static DEFINE_SPINLOCK(vm_lock);
  static void *__read_mostly vm_base[VMAP_REGION_NR];
  #define vm_bitmap(x) ((unsigned long *)vm_base[x])
---- a/xen/include/asm-x86/paging.h
-+++ b/xen/include/asm-x86/paging.h
+Index: xen-4.16.1-testing/xen/include/asm-x86/paging.h
+===================================================================
+--- xen-4.16.1-testing.orig/xen/include/asm-x86/paging.h
++++ xen-4.16.1-testing/xen/include/asm-x86/paging.h
 @@ -32,6 +32,10 @@
  #include <asm/flushtlb.h>
  #include <asm/domain.h>
@@ -137,9 +155,11 @@
  /*****************************************************************************
   * Macros to tell which paging mode a domain is in */
  
---- a/xen/arch/x86/x86_64/traps.c
-+++ b/xen/arch/x86/x86_64/traps.c
-@@ -24,6 +24,9 @@
+Index: xen-4.16.1-testing/xen/arch/x86/x86_64/traps.c
+===================================================================
+--- xen-4.16.1-testing.orig/xen/arch/x86/x86_64/traps.c
++++ xen-4.16.1-testing/xen/arch/x86/x86_64/traps.c
+@@ -25,6 +25,9 @@
  #include <asm/hvm/hvm.h>
  #include <asm/hvm/support.h>
  
@@ -149,8 +169,10 @@
  
  static void print_xen_info(void)
  {
---- a/xen/arch/x86/cpu/mcheck/mcaction.c
-+++ b/xen/arch/x86/cpu/mcheck/mcaction.c
+Index: xen-4.16.1-testing/xen/arch/x86/cpu/mcheck/mcaction.c
+===================================================================
+--- xen-4.16.1-testing.orig/xen/arch/x86/cpu/mcheck/mcaction.c
++++ xen-4.16.1-testing/xen/arch/x86/cpu/mcheck/mcaction.c
 @@ -4,6 +4,10 @@
  #include "vmce.h"
  #include "mce.h"
@@ -162,8 +184,10 @@
  static struct mcinfo_recovery *
  mci_action_add_pageoffline(int bank, struct mc_info *mi,
                             mfn_t mfn, uint32_t status)
---- a/xen/arch/x86/cpu/mcheck/mce.c
-+++ b/xen/arch/x86/cpu/mcheck/mce.c
+Index: xen-4.16.1-testing/xen/arch/x86/cpu/mcheck/mce.c
+===================================================================
+--- xen-4.16.1-testing.orig/xen/arch/x86/cpu/mcheck/mce.c
++++ xen-4.16.1-testing/xen/arch/x86/cpu/mcheck/mce.c
 @@ -30,6 +30,10 @@
  #include "util.h"
  #include "vmce.h"
@@ -175,8 +199,10 @@
  bool __read_mostly opt_mce = true;
  boolean_param("mce", opt_mce);
  bool __read_mostly mce_broadcast;
---- a/xen/arch/x86/hvm/hvm.c
-+++ b/xen/arch/x86/hvm/hvm.c
+Index: xen-4.16.1-testing/xen/arch/x86/hvm/hvm.c
+===================================================================
+--- xen-4.16.1-testing.orig/xen/arch/x86/hvm/hvm.c
++++ xen-4.16.1-testing/xen/arch/x86/hvm/hvm.c
 @@ -81,6 +81,10 @@
  
  #include <compat/hvm/hvm_op.h>
@@ -188,8 +214,10 @@
  bool_t __read_mostly hvm_enabled;
  
  #ifdef DBG_LEVEL_0
---- a/xen/arch/x86/pv/dom0_build.c
-+++ b/xen/arch/x86/pv/dom0_build.c
+Index: xen-4.16.1-testing/xen/arch/x86/pv/dom0_build.c
+===================================================================
+--- xen-4.16.1-testing.orig/xen/arch/x86/pv/dom0_build.c
++++ xen-4.16.1-testing/xen/arch/x86/pv/dom0_build.c
 @@ -22,6 +22,10 @@
  #include <asm/pv/mm.h>
  #include <asm/setup.h>
@@ -201,8 +229,10 @@
  /* Allow ring-3 access in long mode as guest cannot use ring 1 ... */
  #define BASE_PROT (_PAGE_PRESENT|_PAGE_RW|_PAGE_ACCESSED|_PAGE_USER)
  #define L1_PROT (BASE_PROT|_PAGE_GUEST_KERNEL)
---- a/xen/arch/x86/pv/ro-page-fault.c
-+++ b/xen/arch/x86/pv/ro-page-fault.c
+Index: xen-4.16.1-testing/xen/arch/x86/pv/ro-page-fault.c
+===================================================================
+--- xen-4.16.1-testing.orig/xen/arch/x86/pv/ro-page-fault.c
++++ xen-4.16.1-testing/xen/arch/x86/pv/ro-page-fault.c
 @@ -26,6 +26,10 @@
  #include "emulate.h"
  #include "mm.h"
@@ -214,9 +244,11 @@
  /*********************
   * Writable Pagetables
   */
---- a/xen/arch/x86/pv/emul-priv-op.c
-+++ b/xen/arch/x86/pv/emul-priv-op.c
-@@ -39,6 +39,10 @@
+Index: xen-4.16.1-testing/xen/arch/x86/pv/emul-priv-op.c
+===================================================================
+--- xen-4.16.1-testing.orig/xen/arch/x86/pv/emul-priv-op.c
++++ xen-4.16.1-testing/xen/arch/x86/pv/emul-priv-op.c
+@@ -40,6 +40,10 @@
  #include "emulate.h"
  #include "mm.h"
  
@@ -227,8 +259,10 @@
  struct priv_op_ctxt {
      struct x86_emulate_ctxt ctxt;
      struct {
---- a/xen/arch/x86/pv/mm.c
-+++ b/xen/arch/x86/pv/mm.c
+Index: xen-4.16.1-testing/xen/arch/x86/pv/mm.c
+===================================================================
+--- xen-4.16.1-testing.orig/xen/arch/x86/pv/mm.c
++++ xen-4.16.1-testing/xen/arch/x86/pv/mm.c
 @@ -26,6 +26,10 @@
  
  #include "mm.h"
@@ -240,8 +274,10 @@
  /*
   * Get a mapping of a PV guest's l1e for this linear address.  The return
   * pointer should be unmapped using unmap_domain_page().
---- a/xen/arch/x86/domain_page.c
-+++ b/xen/arch/x86/domain_page.c
+Index: xen-4.16.1-testing/xen/arch/x86/domain_page.c
+===================================================================
+--- xen-4.16.1-testing.orig/xen/arch/x86/domain_page.c
++++ xen-4.16.1-testing/xen/arch/x86/domain_page.c
 @@ -18,6 +18,10 @@
  #include <asm/hardirq.h>
  #include <asm/setup.h>
@@ -253,8 +289,10 @@
  static DEFINE_PER_CPU(struct vcpu *, override);
  
  static inline struct vcpu *mapcache_current_vcpu(void)
---- a/xen/arch/x86/mm/shadow/private.h
-+++ b/xen/arch/x86/mm/shadow/private.h
+Index: xen-4.16.1-testing/xen/arch/x86/mm/shadow/private.h
+===================================================================
+--- xen-4.16.1-testing.orig/xen/arch/x86/mm/shadow/private.h
++++ xen-4.16.1-testing/xen/arch/x86/mm/shadow/private.h
 @@ -33,6 +33,10 @@
  
  #include "../mm-locks.h"
@@ -266,8 +304,10 @@
  
/******************************************************************************
   * Levels of self-test and paranoia
   */
---- a/xen/arch/x86/mm/hap/hap.c
-+++ b/xen/arch/x86/mm/hap/hap.c
+Index: xen-4.16.1-testing/xen/arch/x86/mm/hap/hap.c
+===================================================================
+--- xen-4.16.1-testing.orig/xen/arch/x86/mm/hap/hap.c
++++ xen-4.16.1-testing/xen/arch/x86/mm/hap/hap.c
 @@ -42,6 +42,10 @@
  
  #include "private.h"
@@ -279,8 +319,10 @@
  /************************************************/
  /*          HAP VRAM TRACKING SUPPORT           */
  /************************************************/
---- a/xen/arch/x86/mm/p2m-pod.c
-+++ b/xen/arch/x86/mm/p2m-pod.c
+Index: xen-4.16.1-testing/xen/arch/x86/mm/p2m-pod.c
+===================================================================
+--- xen-4.16.1-testing.orig/xen/arch/x86/mm/p2m-pod.c
++++ xen-4.16.1-testing/xen/arch/x86/mm/p2m-pod.c
 @@ -31,6 +31,10 @@
  
  #include "mm-locks.h"
@@ -292,8 +334,10 @@
  #define superpage_aligned(_x)  (((_x)&(SUPERPAGE_PAGES-1))==0)
  
  /* Enforce lock ordering when grabbing the "external" page_alloc lock */
---- a/xen/arch/x86/mm/p2m-ept.c
-+++ b/xen/arch/x86/mm/p2m-ept.c
+Index: xen-4.16.1-testing/xen/arch/x86/mm/p2m-ept.c
+===================================================================
+--- xen-4.16.1-testing.orig/xen/arch/x86/mm/p2m-ept.c
++++ xen-4.16.1-testing/xen/arch/x86/mm/p2m-ept.c
 @@ -36,6 +36,10 @@
  
  #include "mm-locks.h"
@@ -305,8 +349,10 @@
  #define atomic_read_ept_entry(__pepte)                              \
      ( (ept_entry_t) { .epte = read_atomic(&(__pepte)->epte) } )
  
---- a/xen/arch/x86/mm/p2m.c
-+++ b/xen/arch/x86/mm/p2m.c
+Index: xen-4.16.1-testing/xen/arch/x86/mm/p2m.c
+===================================================================
+--- xen-4.16.1-testing.orig/xen/arch/x86/mm/p2m.c
++++ xen-4.16.1-testing/xen/arch/x86/mm/p2m.c
 @@ -44,6 +44,10 @@
  
  #include "mm-locks.h"
@@ -318,8 +364,10 @@
  /* Override macro from asm/page.h to make work with mfn_t */
  #undef virt_to_mfn
  #define virt_to_mfn(v) _mfn(__virt_to_mfn(v))
---- a/xen/arch/x86/tboot.c
-+++ b/xen/arch/x86/tboot.c
+Index: xen-4.16.1-testing/xen/arch/x86/tboot.c
+===================================================================
+--- xen-4.16.1-testing.orig/xen/arch/x86/tboot.c
++++ xen-4.16.1-testing/xen/arch/x86/tboot.c
 @@ -16,6 +16,10 @@
  #include <asm/setup.h>
  #include <crypto/vmac.h>
@@ -331,8 +379,10 @@
  /* tboot=<physical address of shared page> */
  static unsigned long __initdata opt_tboot_pa;
  integer_param("tboot", opt_tboot_pa);
---- a/tools/firmware/hvmloader/ovmf.c
-+++ b/tools/firmware/hvmloader/ovmf.c
+Index: xen-4.16.1-testing/tools/firmware/hvmloader/ovmf.c
+===================================================================
+--- xen-4.16.1-testing.orig/tools/firmware/hvmloader/ovmf.c
++++ xen-4.16.1-testing/tools/firmware/hvmloader/ovmf.c
 @@ -34,6 +34,11 @@
  #include <xen/hvm/ioreq.h>
  #include <xen/memory.h>
@@ -345,8 +395,10 @@
  #define OVMF_MAXOFFSET          0x000FFFFFULL
  #define OVMF_END                0x100000000ULL
  #define LOWCHUNK_BEGIN          0x000F0000
---- a/tools/firmware/hvmloader/seabios.c
-+++ b/tools/firmware/hvmloader/seabios.c
+Index: xen-4.16.1-testing/tools/firmware/hvmloader/seabios.c
+===================================================================
+--- xen-4.16.1-testing.orig/tools/firmware/hvmloader/seabios.c
++++ xen-4.16.1-testing/tools/firmware/hvmloader/seabios.c
 @@ -29,6 +29,11 @@
  #include <acpi2_0.h>
  #include <libacpi.h>
@@ -359,8 +411,10 @@
  struct seabios_info {
      char signature[14]; /* XenHVMSeaBIOS\0 */
      uint8_t length;     /* Length of this struct */
---- a/tools/firmware/hvmloader/util.c
-+++ b/tools/firmware/hvmloader/util.c
+Index: xen-4.16.1-testing/tools/firmware/hvmloader/util.c
+===================================================================
+--- xen-4.16.1-testing.orig/tools/firmware/hvmloader/util.c
++++ xen-4.16.1-testing/tools/firmware/hvmloader/util.c
 @@ -31,6 +31,10 @@
  #include <xen/hvm/hvm_xs_strings.h>
  #include <xen/hvm/params.h>

++++++ libxl.pvscsi.patch ++++++
--- /var/tmp/diff_new_pack.VmSxm2/_old  2022-04-16 00:13:06.717557986 +0200
+++ /var/tmp/diff_new_pack.VmSxm2/_new  2022-04-16 00:13:06.721557991 +0200
@@ -34,10 +34,10 @@
  tools/libxl/xl_cmdtable.c            |   15 
  16 files changed, 2326 insertions(+), 4 deletions(-)
 
-Index: xen-4.16.0-testing/docs/man/xl.cfg.5.pod.in
+Index: xen-4.16.1-testing/docs/man/xl.cfg.5.pod.in
 ===================================================================
---- xen-4.16.0-testing.orig/docs/man/xl.cfg.5.pod.in
-+++ xen-4.16.0-testing/docs/man/xl.cfg.5.pod.in
+--- xen-4.16.1-testing.orig/docs/man/xl.cfg.5.pod.in
++++ xen-4.16.1-testing/docs/man/xl.cfg.5.pod.in
 @@ -800,6 +800,62 @@ frontend to backend. It can be used as a
  For more information about the protocol, see
  https://xenbits.xenproject.org/docs/unstable/misc/pvcalls.html.
@@ -101,10 +101,10 @@
  =item B<vfb=[ "VFB_SPEC_STRING", "VFB_SPEC_STRING", ...]>
  
  Specifies the paravirtual framebuffer devices which should be supplied
-Index: xen-4.16.0-testing/docs/man/xl.1.pod.in
+Index: xen-4.16.1-testing/docs/man/xl.1.pod.in
 ===================================================================
---- xen-4.16.0-testing.orig/docs/man/xl.1.pod.in
-+++ xen-4.16.0-testing/docs/man/xl.1.pod.in
+--- xen-4.16.1-testing.orig/docs/man/xl.1.pod.in
++++ xen-4.16.1-testing/docs/man/xl.1.pod.in
 @@ -1610,6 +1610,24 @@ List virtual network interfaces for a do
  
  =back
@@ -130,10 +130,10 @@
  =head1 PCI PASS-THROUGH
  
  =over 4
-Index: xen-4.16.0-testing/tools/libs/light/Makefile
+Index: xen-4.16.1-testing/tools/libs/light/Makefile
 ===================================================================
---- xen-4.16.0-testing.orig/tools/libs/light/Makefile
-+++ xen-4.16.0-testing/tools/libs/light/Makefile
+--- xen-4.16.1-testing.orig/tools/libs/light/Makefile
++++ xen-4.16.1-testing/tools/libs/light/Makefile
 @@ -78,6 +78,7 @@ SRCS-y += libxl.c
  SRCS-y += libxl_create.c
  SRCS-y += libxl_dm.c
@@ -142,10 +142,10 @@
  SRCS-y += libxl_dom.c
  SRCS-y += libxl_exec.c
  SRCS-y += libxl_xshelp.c
-Index: xen-4.16.0-testing/tools/libs/util/Makefile
+Index: xen-4.16.1-testing/tools/libs/util/Makefile
 ===================================================================
---- xen-4.16.0-testing.orig/tools/libs/util/Makefile
-+++ xen-4.16.0-testing/tools/libs/util/Makefile
+--- xen-4.16.1-testing.orig/tools/libs/util/Makefile
++++ xen-4.16.1-testing/tools/libs/util/Makefile
 @@ -8,6 +8,7 @@ SRCS-y += libxlu_disk_l.c
  SRCS-y += libxlu_disk.c
  SRCS-y += libxlu_vif.c
@@ -154,10 +154,10 @@
  
  CFLAGS += -Wno-format-zero-length -Wmissing-declarations \
        -Wno-declaration-after-statement -Wformat-nonliteral
-Index: xen-4.16.0-testing/tools/include/libxl.h
+Index: xen-4.16.1-testing/tools/include/libxl.h
 ===================================================================
---- xen-4.16.0-testing.orig/tools/include/libxl.h
-+++ xen-4.16.0-testing/tools/include/libxl.h
+--- xen-4.16.1-testing.orig/tools/include/libxl.h
++++ xen-4.16.1-testing/tools/include/libxl.h
 @@ -1243,6 +1243,13 @@ void libxl_mac_copy(libxl_ctx *ctx, libx
  #define LIBXL_HAVE_PCITOPOLOGY 1
  
@@ -214,10 +214,10 @@
  /* Virtual TPMs */
  int libxl_device_vtpm_add(libxl_ctx *ctx, uint32_t domid, libxl_device_vtpm 
*vtpm,
                            const libxl_asyncop_how *ao_how)
-Index: xen-4.16.0-testing/tools/libs/light/libxl_create.c
+Index: xen-4.16.1-testing/tools/libs/light/libxl_create.c
 ===================================================================
---- xen-4.16.0-testing.orig/tools/libs/light/libxl_create.c
-+++ xen-4.16.0-testing/tools/libs/light/libxl_create.c
+--- xen-4.16.1-testing.orig/tools/libs/light/libxl_create.c
++++ xen-4.16.1-testing/tools/libs/light/libxl_create.c
 @@ -1846,6 +1846,7 @@ const libxl__device_type *device_type_tb
      &libxl__disk_devtype,
      &libxl__nic_devtype,
@@ -226,10 +226,10 @@
      &libxl__usbctrl_devtype,
      &libxl__usbdev_devtype,
      &libxl__pci_devtype,
-Index: xen-4.16.0-testing/tools/libs/light/libxl_internal.h
+Index: xen-4.16.1-testing/tools/libs/light/libxl_internal.h
 ===================================================================
---- xen-4.16.0-testing.orig/tools/libs/light/libxl_internal.h
-+++ xen-4.16.0-testing/tools/libs/light/libxl_internal.h
+--- xen-4.16.1-testing.orig/tools/libs/light/libxl_internal.h
++++ xen-4.16.1-testing/tools/libs/light/libxl_internal.h
 @@ -4006,6 +4006,7 @@ extern const libxl__device_type libxl__v
  extern const libxl__device_type libxl__disk_devtype;
  extern const libxl__device_type libxl__nic_devtype;
@@ -238,10 +238,10 @@
  extern const libxl__device_type libxl__usbctrl_devtype;
  extern const libxl__device_type libxl__usbdev_devtype;
  extern const libxl__device_type libxl__pci_devtype;
-Index: xen-4.16.0-testing/tools/libs/light/libxl_types.idl
+Index: xen-4.16.1-testing/tools/libs/light/libxl_types.idl
 ===================================================================
---- xen-4.16.0-testing.orig/tools/libs/light/libxl_types.idl
-+++ xen-4.16.0-testing/tools/libs/light/libxl_types.idl
+--- xen-4.16.1-testing.orig/tools/libs/light/libxl_types.idl
++++ xen-4.16.1-testing/tools/libs/light/libxl_types.idl
 @@ -950,6 +950,43 @@ libxl_device_vsnd = Struct("device_vsnd"
      ("pcms", Array(libxl_vsnd_pcm, "num_vsnd_pcms"))
      ])
@@ -316,10 +316,10 @@
  libxl_vtpminfo = Struct("vtpminfo", [
      ("backend", string),
      ("backend_id", uint32),
-Index: xen-4.16.0-testing/tools/libs/light/libxl_types_internal.idl
+Index: xen-4.16.1-testing/tools/libs/light/libxl_types_internal.idl
 ===================================================================
---- xen-4.16.0-testing.orig/tools/libs/light/libxl_types_internal.idl
-+++ xen-4.16.0-testing/tools/libs/light/libxl_types_internal.idl
+--- xen-4.16.1-testing.orig/tools/libs/light/libxl_types_internal.idl
++++ xen-4.16.1-testing/tools/libs/light/libxl_types_internal.idl
 @@ -32,6 +32,7 @@ libxl__device_kind = Enumeration("device
      (14, "PVCALLS"),
      (15, "VSND"),
@@ -328,10 +328,10 @@
      ])
  
  libxl__console_backend = Enumeration("console_backend", [
-Index: xen-4.16.0-testing/tools/libs/light/libxl_vscsi.c
+Index: xen-4.16.1-testing/tools/libs/light/libxl_vscsi.c
 ===================================================================
 --- /dev/null
-+++ xen-4.16.0-testing/tools/libs/light/libxl_vscsi.c
++++ xen-4.16.1-testing/tools/libs/light/libxl_vscsi.c
 @@ -0,0 +1,1185 @@
 +/*
 + * Copyright (C) 2016      SUSE Linux GmbH
@@ -1518,10 +1518,10 @@
 + * indent-tabs-mode: nil
 + * End:
 + */
-Index: xen-4.16.0-testing/tools/libs/util/libxlu_vscsi.c
+Index: xen-4.16.1-testing/tools/libs/util/libxlu_vscsi.c
 ===================================================================
 --- /dev/null
-+++ xen-4.16.0-testing/tools/libs/util/libxlu_vscsi.c
++++ xen-4.16.1-testing/tools/libs/util/libxlu_vscsi.c
 @@ -0,0 +1,669 @@
 +/*
 + * libxlu_vscsi.c - xl configuration file parsing: setup and helper functions
@@ -2192,10 +2192,10 @@
 +    return ERROR_INVAL;
 +}
 +#endif
-Index: xen-4.16.0-testing/tools/include/libxlutil.h
+Index: xen-4.16.1-testing/tools/include/libxlutil.h
 ===================================================================
---- xen-4.16.0-testing.orig/tools/include/libxlutil.h
-+++ xen-4.16.0-testing/tools/include/libxlutil.h
+--- xen-4.16.1-testing.orig/tools/include/libxlutil.h
++++ xen-4.16.1-testing/tools/include/libxlutil.h
 @@ -131,6 +131,25 @@ int xlu_rdm_parse(XLU_Config *cfg, libxl
  int xlu_vif_parse_rate(XLU_Config *cfg, const char *rate,
                         libxl_device_nic *nic);
@@ -2222,10 +2222,10 @@
  #endif /* LIBXLUTIL_H */
  
  /*
-Index: xen-4.16.0-testing/tools/xl/Makefile
+Index: xen-4.16.1-testing/tools/xl/Makefile
 ===================================================================
---- xen-4.16.0-testing.orig/tools/xl/Makefile
-+++ xen-4.16.0-testing/tools/xl/Makefile
+--- xen-4.16.1-testing.orig/tools/xl/Makefile
++++ xen-4.16.1-testing/tools/xl/Makefile
 @@ -19,7 +19,7 @@ CFLAGS_XL += -Wshadow
  XL_OBJS-$(CONFIG_X86) = xl_psr.o
  XL_OBJS = xl.o xl_cmdtable.o xl_sxp.o xl_utils.o $(XL_OBJS-y)
@@ -2235,10 +2235,10 @@
  XL_OBJS += xl_sched.o xl_pci.o xl_vcpu.o xl_cdrom.o xl_mem.o
  XL_OBJS += xl_info.o xl_console.o xl_misc.o
  XL_OBJS += xl_vmcontrol.o xl_saverestore.o xl_migrate.o
-Index: xen-4.16.0-testing/tools/xl/xl.h
+Index: xen-4.16.1-testing/tools/xl/xl.h
 ===================================================================
---- xen-4.16.0-testing.orig/tools/xl/xl.h
-+++ xen-4.16.0-testing/tools/xl/xl.h
+--- xen-4.16.1-testing.orig/tools/xl/xl.h
++++ xen-4.16.1-testing/tools/xl/xl.h
 @@ -166,6 +166,9 @@ int main_channellist(int argc, char **ar
  int main_blockattach(int argc, char **argv);
  int main_blocklist(int argc, char **argv);
@@ -2249,10 +2249,10 @@
  int main_vtpmattach(int argc, char **argv);
  int main_vtpmlist(int argc, char **argv);
  int main_vtpmdetach(int argc, char **argv);
-Index: xen-4.16.0-testing/tools/xl/xl_parse.c
+Index: xen-4.16.1-testing/tools/xl/xl_parse.c
 ===================================================================
---- xen-4.16.0-testing.orig/tools/xl/xl_parse.c
-+++ xen-4.16.0-testing/tools/xl/xl_parse.c
+--- xen-4.16.1-testing.orig/tools/xl/xl_parse.c
++++ xen-4.16.1-testing/tools/xl/xl_parse.c
 @@ -1214,7 +1214,8 @@ void parse_config_data(const char *confi
      long l, vcpus = 0;
      XLU_Config *config;
@@ -2263,7 +2263,7 @@
      XLU_ConfigList *channels, *ioports, *irqs, *iomem, *viridian, *dtdevs,
                     *mca_caps;
      int num_ioports, num_irqs, num_iomem, num_cpus, num_viridian, 
num_mca_caps;
-@@ -2060,6 +2061,17 @@ void parse_config_data(const char *confi
+@@ -2086,6 +2087,17 @@ void parse_config_data(const char *confi
          }
      }
  
@@ -2281,10 +2281,10 @@
      if (!xlu_cfg_get_list(config, "vtpm", &vtpms, 0, 0)) {
          d_config->num_vtpms = 0;
          d_config->vtpms = NULL;
-Index: xen-4.16.0-testing/tools/xl/xl_vscsi.c
+Index: xen-4.16.1-testing/tools/xl/xl_vscsi.c
 ===================================================================
 --- /dev/null
-+++ xen-4.16.0-testing/tools/xl/xl_vscsi.c
++++ xen-4.16.1-testing/tools/xl/xl_vscsi.c
 @@ -0,0 +1,229 @@
 +/*
 + * Copyright 2009-2017 Citrix Ltd and other contributors
@@ -2515,10 +2515,10 @@
 +    return !!rc;
 +}
 +
-Index: xen-4.16.0-testing/tools/xl/xl_cmdtable.c
+Index: xen-4.16.1-testing/tools/xl/xl_cmdtable.c
 ===================================================================
---- xen-4.16.0-testing.orig/tools/xl/xl_cmdtable.c
-+++ xen-4.16.0-testing/tools/xl/xl_cmdtable.c
+--- xen-4.16.1-testing.orig/tools/xl/xl_cmdtable.c
++++ xen-4.16.1-testing/tools/xl/xl_cmdtable.c
 @@ -382,6 +382,21 @@ const struct cmd_spec cmd_table[] = {
        "[option] <Domain> <DevId>",
        "-f, --force        do not wait for the domain to release the device"

++++++ xen-4.16.0-testing-src.tar.bz2 -> xen-4.16.1-testing-src.tar.bz2 ++++++
++++ 7692 lines of diff (skipped)

Reply via email to