Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package xen for openSUSE:Factory checked in at 2022-04-16 00:12:55 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/xen (Old) and /work/SRC/openSUSE:Factory/.xen.new.1941 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "xen" Sat Apr 16 00:12:55 2022 rev:316 rq:969996 version:4.16.1_02 Changes: -------- --- /work/SRC/openSUSE:Factory/xen/xen.changes 2022-04-08 00:27:01.482789653 +0200 +++ /work/SRC/openSUSE:Factory/.xen.new.1941/xen.changes 2022-04-16 00:13:02.953552960 +0200 @@ -1,0 +2,77 @@ +Wed Apr 13 08:54:02 MDT 2022 - carn...@suse.com + +- Update to Xen 4.16.1 bug fix release (bsc#1027519) + xen-4.16.1-testing-src.tar.bz2 +- Drop patches contained in new tarball + 61b31d5c-x86-restrict-all-but-self-IPI.patch + 61b88e78-x86-CPUID-TSXLDTRK-definition.patch + 61bc429f-revert-hvmloader-PA-range-should-be-UC.patch + 61d5687a-x86-spec-ctrl-opt_srb_lock-default.patch + 61d6ea2d-VT-d-split-domid-map-cleanup-check-into-a-function.patch + 61d6ea7b-VT-d-dont-leak-domid-mapping-on-error-path.patch + 61e0296a-x86-time-calibration-relative-counts.patch + 61e029c8-x86-time-TSC-freq-calibration-accuracy.patch + 61e02a1c-libxl-PCI-PV-hotplug-stubdom-coldplug.patch + 61e98e88-x86-introduce-get-set-reg-infra.patch + 61e98e89-x86-MSR-split-SPEC_CTRL-handling.patch + 61e98e8a-x86-spec-ctrl-drop-ENTRY-EXIT-HVM.patch + 61e98e8b-VT-x-SPEC_CTRL-NMI-race-condition.patch + 61eaaa23-x86-get-set-reg-infra-build.patch + 61efec1d-Arm-P2M-always-clear-entry-on-mapping-removal.patch + 61efec4d-gnttab-only-decrement-refcounter-on-final-unmap.patch + 61efec96-IOMMU-x86-stop-pirq-iteration-immediately-on-error.patch + 61f2d886-x86-CPUID-disentangle-new-leaves-logic.patch + 61f2d887-x86-CPUID-leaf-7-1-EBX-infra.patch + 61f2dd76-x86-SPEC_CTRL-migration-compatibility.patch + 61f7b2af-libxl-dont-touch-nr_vcpus_out-if-listing.patch + 61f933a4-x86-cpuid-advertise-SSB_NO.patch + 61f933a5-x86-drop-use_spec_ctrl-boolean.patch + 61f933a6-x86-new-has_spec_ctrl-boolean.patch + 61f933a7-x86-dont-use-spec_ctrl-enter-exit-for-S3.patch + 61f933a8-x86-SPEC_CTRL-record-last-write.patch + 61f933a9-x86-SPEC_CTRL-use-common-logic-for-AMD.patch + 61f933aa-SVM-SPEC_CTRL-entry-exit-logic.patch + 61f933ab-x86-AMD-SPEC_CTRL-infra.patch + 61f933ac-SVM-enable-MSR_SPEC_CTRL-for-guests.patch + 61f946a2-VMX-drop-SPEC_CTRL-load-on-VMEntry.patch + 6202afa3-x86-clean-up-MSR_MCU_OPT_CTRL-handling.patch + 6202afa4-x86-TSX-move-has_rtm_always_abort.patch + 6202afa5-x86-TSX-cope-with-deprecation-on-WHL-R-CFL-R.patch + 6202afa7-x86-CPUID-leaf-7-2-EDX-infra.patch + 6202afa8-x86-Intel-PSFD-for-guests.patch + 62278667-Arm-introduce-new-processors.patch + 62278668-Arm-move-errata-CSV2-check-earlier.patch + 62278669-Arm-add-ECBHB-and-CLEARBHB-ID-fields.patch + 6227866a-Arm-Spectre-BHB-handling.patch + 6227866b-Arm-allow-SMCCC_ARCH_WORKAROUND_3-use.patch + 6227866c-x86-AMD-cease-using-thunk-lfence.patch + 6229ba46-VT-d-drop-undue-address-of-from-check_cleanup_domid_map.patch + 624ebcef-VT-d-dont-needlessly-look-up-DID.patch + 624ebd3b-VT-d-avoid-NULL-deref-on-dcmo-error-paths.patch + 624ebd74-VT-d-avoid-infinite-recursion-on-dcmo-error-path.patch + xsa397.patch + xsa399.patch + xsa400-01.patch + xsa400-02.patch + xsa400-03.patch + xsa400-04.patch + xsa400-05.patch + xsa400-06.patch + xsa400-07.patch + xsa400-08.patch + xsa400-09.patch + xsa400-10.patch + xsa400-11.patch + xsa400-12.patch + +------------------------------------------------------------------- +Fri Apr 8 12:00:00 CEST 2022 - jbeul...@suse.com + +- bsc#1197426 - VUL-0: CVE-2022-26358,CVE-2022-26359, + CVE-2022-26360,CVE-2022-26361: xen: IOMMU: RMRR (VT-d) and unity + map (AMD-Vi) handling issues (XSA-400) + 624ebcef-VT-d-dont-needlessly-look-up-DID.patch + 624ebd3b-VT-d-avoid-NULL-deref-on-dcmo-error-paths.patch + 624ebd74-VT-d-avoid-infinite-recursion-on-dcmo-error-path.patch + +------------------------------------------------------------------- Old: ---- 61b31d5c-x86-restrict-all-but-self-IPI.patch 61b88e78-x86-CPUID-TSXLDTRK-definition.patch 61bc429f-revert-hvmloader-PA-range-should-be-UC.patch 61d5687a-x86-spec-ctrl-opt_srb_lock-default.patch 61d6ea2d-VT-d-split-domid-map-cleanup-check-into-a-function.patch 61d6ea7b-VT-d-dont-leak-domid-mapping-on-error-path.patch 61e0296a-x86-time-calibration-relative-counts.patch 61e029c8-x86-time-TSC-freq-calibration-accuracy.patch 61e02a1c-libxl-PCI-PV-hotplug-stubdom-coldplug.patch 61e98e88-x86-introduce-get-set-reg-infra.patch 61e98e89-x86-MSR-split-SPEC_CTRL-handling.patch 61e98e8a-x86-spec-ctrl-drop-ENTRY-EXIT-HVM.patch 61e98e8b-VT-x-SPEC_CTRL-NMI-race-condition.patch 61eaaa23-x86-get-set-reg-infra-build.patch 61efec1d-Arm-P2M-always-clear-entry-on-mapping-removal.patch 61efec4d-gnttab-only-decrement-refcounter-on-final-unmap.patch 61efec96-IOMMU-x86-stop-pirq-iteration-immediately-on-error.patch 61f2d886-x86-CPUID-disentangle-new-leaves-logic.patch 61f2d887-x86-CPUID-leaf-7-1-EBX-infra.patch 61f2dd76-x86-SPEC_CTRL-migration-compatibility.patch 61f7b2af-libxl-dont-touch-nr_vcpus_out-if-listing.patch 61f933a4-x86-cpuid-advertise-SSB_NO.patch 61f933a5-x86-drop-use_spec_ctrl-boolean.patch 61f933a6-x86-new-has_spec_ctrl-boolean.patch 61f933a7-x86-dont-use-spec_ctrl-enter-exit-for-S3.patch 61f933a8-x86-SPEC_CTRL-record-last-write.patch 61f933a9-x86-SPEC_CTRL-use-common-logic-for-AMD.patch 61f933aa-SVM-SPEC_CTRL-entry-exit-logic.patch 61f933ab-x86-AMD-SPEC_CTRL-infra.patch 61f933ac-SVM-enable-MSR_SPEC_CTRL-for-guests.patch 61f946a2-VMX-drop-SPEC_CTRL-load-on-VMEntry.patch 6202afa3-x86-clean-up-MSR_MCU_OPT_CTRL-handling.patch 6202afa4-x86-TSX-move-has_rtm_always_abort.patch 6202afa5-x86-TSX-cope-with-deprecation-on-WHL-R-CFL-R.patch 6202afa7-x86-CPUID-leaf-7-2-EDX-infra.patch 6202afa8-x86-Intel-PSFD-for-guests.patch 62278667-Arm-introduce-new-processors.patch 62278668-Arm-move-errata-CSV2-check-earlier.patch 62278669-Arm-add-ECBHB-and-CLEARBHB-ID-fields.patch 6227866a-Arm-Spectre-BHB-handling.patch 6227866b-Arm-allow-SMCCC_ARCH_WORKAROUND_3-use.patch 6227866c-x86-AMD-cease-using-thunk-lfence.patch 6229ba46-VT-d-drop-undue-address-of-from-check_cleanup_domid_map.patch xen-4.16.0-testing-src.tar.bz2 xsa397.patch xsa399.patch xsa400-01.patch xsa400-02.patch xsa400-03.patch xsa400-04.patch xsa400-05.patch xsa400-06.patch xsa400-07.patch xsa400-08.patch xsa400-09.patch xsa400-10.patch xsa400-11.patch xsa400-12.patch New: ---- xen-4.16.1-testing-src.tar.bz2 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ xen.spec ++++++ --- /var/tmp/diff_new_pack.VmSxm2/_old 2022-04-16 00:13:06.485557675 +0200 +++ /var/tmp/diff_new_pack.VmSxm2/_new 2022-04-16 00:13:06.489557681 +0200 @@ -28,7 +28,7 @@ Name: xen ExclusiveArch: %ix86 x86_64 aarch64 -%define xen_build_dir xen-4.16.0-testing +%define xen_build_dir xen-4.16.1-testing # %define with_gdbsx 0 %define with_dom0_support 0 @@ -119,12 +119,12 @@ %endif Provides: installhint(reboot-needed) -Version: 4.16.0_08 +Version: 4.16.1_02 Release: 0 Summary: Xen Virtualization: Hypervisor (aka VMM aka Microkernel) License: GPL-2.0-only Group: System/Kernel -Source0: xen-4.16.0-testing-src.tar.bz2 +Source0: xen-4.16.1-testing-src.tar.bz2 Source1: stubdom.tar.bz2 Source2: mini-os.tar.bz2 Source3: xen-utils-0.1.tar.bz2 @@ -155,64 +155,7 @@ # For xen-libs Source99: baselibs.conf # Upstream patches -Patch1: 61b31d5c-x86-restrict-all-but-self-IPI.patch -Patch2: 61b88e78-x86-CPUID-TSXLDTRK-definition.patch -Patch3: 61bc429f-revert-hvmloader-PA-range-should-be-UC.patch -Patch4: 61d5687a-x86-spec-ctrl-opt_srb_lock-default.patch -Patch5: 61e0296a-x86-time-calibration-relative-counts.patch -Patch6: 61e029c8-x86-time-TSC-freq-calibration-accuracy.patch -Patch7: 61e02a1c-libxl-PCI-PV-hotplug-stubdom-coldplug.patch -Patch8: 61e98e88-x86-introduce-get-set-reg-infra.patch -Patch9: 61e98e89-x86-MSR-split-SPEC_CTRL-handling.patch -Patch10: 61e98e8a-x86-spec-ctrl-drop-ENTRY-EXIT-HVM.patch -Patch11: 61e98e8b-VT-x-SPEC_CTRL-NMI-race-condition.patch -Patch12: 61eaaa23-x86-get-set-reg-infra-build.patch -Patch13: 61efec1d-Arm-P2M-always-clear-entry-on-mapping-removal.patch -Patch14: 61efec4d-gnttab-only-decrement-refcounter-on-final-unmap.patch -Patch15: 61efec96-IOMMU-x86-stop-pirq-iteration-immediately-on-error.patch -Patch16: 61f2d886-x86-CPUID-disentangle-new-leaves-logic.patch -Patch17: 61f2d887-x86-CPUID-leaf-7-1-EBX-infra.patch -Patch18: 61f2dd76-x86-SPEC_CTRL-migration-compatibility.patch -Patch19: 61f7b2af-libxl-dont-touch-nr_vcpus_out-if-listing.patch -Patch20: 61f933a4-x86-cpuid-advertise-SSB_NO.patch -Patch21: 61f933a5-x86-drop-use_spec_ctrl-boolean.patch -Patch22: 61f933a6-x86-new-has_spec_ctrl-boolean.patch -Patch23: 61f933a7-x86-dont-use-spec_ctrl-enter-exit-for-S3.patch -Patch24: 61f933a8-x86-SPEC_CTRL-record-last-write.patch -Patch25: 61f933a9-x86-SPEC_CTRL-use-common-logic-for-AMD.patch -Patch26: 61f933aa-SVM-SPEC_CTRL-entry-exit-logic.patch -Patch27: 61f933ab-x86-AMD-SPEC_CTRL-infra.patch -Patch28: 61f933ac-SVM-enable-MSR_SPEC_CTRL-for-guests.patch -Patch29: 61f946a2-VMX-drop-SPEC_CTRL-load-on-VMEntry.patch -Patch30: 6202afa3-x86-clean-up-MSR_MCU_OPT_CTRL-handling.patch -Patch31: 6202afa4-x86-TSX-move-has_rtm_always_abort.patch -Patch32: 6202afa5-x86-TSX-cope-with-deprecation-on-WHL-R-CFL-R.patch -Patch33: 6202afa7-x86-CPUID-leaf-7-2-EDX-infra.patch -Patch34: 6202afa8-x86-Intel-PSFD-for-guests.patch -Patch35: 62278667-Arm-introduce-new-processors.patch -Patch36: 62278668-Arm-move-errata-CSV2-check-earlier.patch -Patch37: 62278669-Arm-add-ECBHB-and-CLEARBHB-ID-fields.patch -Patch38: 6227866a-Arm-Spectre-BHB-handling.patch -Patch39: 6227866b-Arm-allow-SMCCC_ARCH_WORKAROUND_3-use.patch -Patch40: 6227866c-x86-AMD-cease-using-thunk-lfence.patch -Patch41: 61d6ea2d-VT-d-split-domid-map-cleanup-check-into-a-function.patch -Patch42: 61d6ea7b-VT-d-dont-leak-domid-mapping-on-error-path.patch -Patch43: 6229ba46-VT-d-drop-undue-address-of-from-check_cleanup_domid_map.patch # EMBARGOED security fixes -Patch97: xsa397.patch -Patch99: xsa399.patch -Patch101: xsa400-01.patch -Patch102: xsa400-02.patch -Patch103: xsa400-03.patch -Patch104: xsa400-04.patch -Patch105: xsa400-05.patch -Patch106: xsa400-06.patch -Patch107: xsa400-07.patch -Patch108: xsa400-08.patch -Patch109: xsa400-09.patch -Patch110: xsa400-10.patch -Patch111: xsa400-11.patch -Patch112: xsa400-12.patch # libxc Patch301: libxc-bitmap-long.patch Patch302: libxc-sr-xl-migration-debug.patch ++++++ gcc12-fixes.patch ++++++ --- /var/tmp/diff_new_pack.VmSxm2/_old 2022-04-16 00:13:06.617557852 +0200 +++ /var/tmp/diff_new_pack.VmSxm2/_new 2022-04-16 00:13:06.621557857 +0200 @@ -13,8 +13,10 @@ xen/include/asm-x86/paging.h ---- a/xen/drivers/passthrough/amd/iommu_intr.c -+++ b/xen/drivers/passthrough/amd/iommu_intr.c +Index: xen-4.16.1-testing/xen/drivers/passthrough/amd/iommu_intr.c +=================================================================== +--- xen-4.16.1-testing.orig/xen/drivers/passthrough/amd/iommu_intr.c ++++ xen-4.16.1-testing/xen/drivers/passthrough/amd/iommu_intr.c @@ -23,6 +23,10 @@ #include "iommu.h" @@ -26,8 +28,10 @@ union irte32 { uint32_t raw; struct { ---- a/xen/drivers/passthrough/x86/hvm.c -+++ b/xen/drivers/passthrough/x86/hvm.c +Index: xen-4.16.1-testing/xen/drivers/passthrough/x86/hvm.c +=================================================================== +--- xen-4.16.1-testing.orig/xen/drivers/passthrough/x86/hvm.c ++++ xen-4.16.1-testing/xen/drivers/passthrough/x86/hvm.c @@ -901,6 +901,9 @@ static void __hvm_dpci_eoi(struct domain hvm_pirq_eoi(pirq); } @@ -38,8 +42,10 @@ static void hvm_gsi_eoi(struct domain *d, unsigned int gsi) { struct pirq *pirq = pirq_info(d, gsi); ---- a/xen/common/domctl.c -+++ b/xen/common/domctl.c +Index: xen-4.16.1-testing/xen/common/domctl.c +=================================================================== +--- xen-4.16.1-testing.orig/xen/common/domctl.c ++++ xen-4.16.1-testing/xen/common/domctl.c @@ -32,6 +32,10 @@ #include <public/domctl.h> #include <xsm/xsm.h> @@ -51,8 +57,10 @@ static DEFINE_SPINLOCK(domctl_lock); static int nodemask_to_xenctl_bitmap(struct xenctl_bitmap *xenctl_nodemap, ---- a/xen/common/efi/boot.c -+++ b/xen/common/efi/boot.c +Index: xen-4.16.1-testing/xen/common/efi/boot.c +=================================================================== +--- xen-4.16.1-testing.orig/xen/common/efi/boot.c ++++ xen-4.16.1-testing/xen/common/efi/boot.c @@ -31,6 +31,10 @@ #undef __ASSEMBLY__ #endif @@ -64,8 +72,10 @@ #define EFI_REVISION(major, minor) (((major) << 16) | (minor)) #define SMBIOS3_TABLE_GUID \ ---- a/xen/common/xmalloc_tlsf.c -+++ b/xen/common/xmalloc_tlsf.c +Index: xen-4.16.1-testing/xen/common/xmalloc_tlsf.c +=================================================================== +--- xen-4.16.1-testing.orig/xen/common/xmalloc_tlsf.c ++++ xen-4.16.1-testing/xen/common/xmalloc_tlsf.c @@ -28,6 +28,10 @@ #include <xen/pfn.h> #include <asm/time.h> @@ -77,8 +87,10 @@ #define MAX_POOL_NAME_LEN 16 /* Some IMPORTANT TLSF parameters */ ---- a/xen/common/memory.c -+++ b/xen/common/memory.c +Index: xen-4.16.1-testing/xen/common/memory.c +=================================================================== +--- xen-4.16.1-testing.orig/xen/common/memory.c ++++ xen-4.16.1-testing/xen/common/memory.c @@ -35,6 +35,10 @@ #include <asm/guest.h> #endif @@ -90,8 +102,10 @@ struct memop_args { /* INPUT */ struct domain *domain; /* Domain to be affected. */ ---- a/xen/common/page_alloc.c -+++ b/xen/common/page_alloc.c +Index: xen-4.16.1-testing/xen/common/page_alloc.c +=================================================================== +--- xen-4.16.1-testing.orig/xen/common/page_alloc.c ++++ xen-4.16.1-testing/xen/common/page_alloc.c @@ -155,6 +155,10 @@ #define PGC_reserved 0 #endif @@ -111,8 +125,10 @@ /* * Following rules applied for page offline: * Once a page is broken, it can't be assigned anymore ---- a/xen/common/vmap.c -+++ b/xen/common/vmap.c +Index: xen-4.16.1-testing/xen/common/vmap.c +=================================================================== +--- xen-4.16.1-testing.orig/xen/common/vmap.c ++++ xen-4.16.1-testing/xen/common/vmap.c @@ -9,6 +9,10 @@ #include <xen/vmap.h> #include <asm/page.h> @@ -124,8 +140,10 @@ static DEFINE_SPINLOCK(vm_lock); static void *__read_mostly vm_base[VMAP_REGION_NR]; #define vm_bitmap(x) ((unsigned long *)vm_base[x]) ---- a/xen/include/asm-x86/paging.h -+++ b/xen/include/asm-x86/paging.h +Index: xen-4.16.1-testing/xen/include/asm-x86/paging.h +=================================================================== +--- xen-4.16.1-testing.orig/xen/include/asm-x86/paging.h ++++ xen-4.16.1-testing/xen/include/asm-x86/paging.h @@ -32,6 +32,10 @@ #include <asm/flushtlb.h> #include <asm/domain.h> @@ -137,9 +155,11 @@ /***************************************************************************** * Macros to tell which paging mode a domain is in */ ---- a/xen/arch/x86/x86_64/traps.c -+++ b/xen/arch/x86/x86_64/traps.c -@@ -24,6 +24,9 @@ +Index: xen-4.16.1-testing/xen/arch/x86/x86_64/traps.c +=================================================================== +--- xen-4.16.1-testing.orig/xen/arch/x86/x86_64/traps.c ++++ xen-4.16.1-testing/xen/arch/x86/x86_64/traps.c +@@ -25,6 +25,9 @@ #include <asm/hvm/hvm.h> #include <asm/hvm/support.h> @@ -149,8 +169,10 @@ static void print_xen_info(void) { ---- a/xen/arch/x86/cpu/mcheck/mcaction.c -+++ b/xen/arch/x86/cpu/mcheck/mcaction.c +Index: xen-4.16.1-testing/xen/arch/x86/cpu/mcheck/mcaction.c +=================================================================== +--- xen-4.16.1-testing.orig/xen/arch/x86/cpu/mcheck/mcaction.c ++++ xen-4.16.1-testing/xen/arch/x86/cpu/mcheck/mcaction.c @@ -4,6 +4,10 @@ #include "vmce.h" #include "mce.h" @@ -162,8 +184,10 @@ static struct mcinfo_recovery * mci_action_add_pageoffline(int bank, struct mc_info *mi, mfn_t mfn, uint32_t status) ---- a/xen/arch/x86/cpu/mcheck/mce.c -+++ b/xen/arch/x86/cpu/mcheck/mce.c +Index: xen-4.16.1-testing/xen/arch/x86/cpu/mcheck/mce.c +=================================================================== +--- xen-4.16.1-testing.orig/xen/arch/x86/cpu/mcheck/mce.c ++++ xen-4.16.1-testing/xen/arch/x86/cpu/mcheck/mce.c @@ -30,6 +30,10 @@ #include "util.h" #include "vmce.h" @@ -175,8 +199,10 @@ bool __read_mostly opt_mce = true; boolean_param("mce", opt_mce); bool __read_mostly mce_broadcast; ---- a/xen/arch/x86/hvm/hvm.c -+++ b/xen/arch/x86/hvm/hvm.c +Index: xen-4.16.1-testing/xen/arch/x86/hvm/hvm.c +=================================================================== +--- xen-4.16.1-testing.orig/xen/arch/x86/hvm/hvm.c ++++ xen-4.16.1-testing/xen/arch/x86/hvm/hvm.c @@ -81,6 +81,10 @@ #include <compat/hvm/hvm_op.h> @@ -188,8 +214,10 @@ bool_t __read_mostly hvm_enabled; #ifdef DBG_LEVEL_0 ---- a/xen/arch/x86/pv/dom0_build.c -+++ b/xen/arch/x86/pv/dom0_build.c +Index: xen-4.16.1-testing/xen/arch/x86/pv/dom0_build.c +=================================================================== +--- xen-4.16.1-testing.orig/xen/arch/x86/pv/dom0_build.c ++++ xen-4.16.1-testing/xen/arch/x86/pv/dom0_build.c @@ -22,6 +22,10 @@ #include <asm/pv/mm.h> #include <asm/setup.h> @@ -201,8 +229,10 @@ /* Allow ring-3 access in long mode as guest cannot use ring 1 ... */ #define BASE_PROT (_PAGE_PRESENT|_PAGE_RW|_PAGE_ACCESSED|_PAGE_USER) #define L1_PROT (BASE_PROT|_PAGE_GUEST_KERNEL) ---- a/xen/arch/x86/pv/ro-page-fault.c -+++ b/xen/arch/x86/pv/ro-page-fault.c +Index: xen-4.16.1-testing/xen/arch/x86/pv/ro-page-fault.c +=================================================================== +--- xen-4.16.1-testing.orig/xen/arch/x86/pv/ro-page-fault.c ++++ xen-4.16.1-testing/xen/arch/x86/pv/ro-page-fault.c @@ -26,6 +26,10 @@ #include "emulate.h" #include "mm.h" @@ -214,9 +244,11 @@ /********************* * Writable Pagetables */ ---- a/xen/arch/x86/pv/emul-priv-op.c -+++ b/xen/arch/x86/pv/emul-priv-op.c -@@ -39,6 +39,10 @@ +Index: xen-4.16.1-testing/xen/arch/x86/pv/emul-priv-op.c +=================================================================== +--- xen-4.16.1-testing.orig/xen/arch/x86/pv/emul-priv-op.c ++++ xen-4.16.1-testing/xen/arch/x86/pv/emul-priv-op.c +@@ -40,6 +40,10 @@ #include "emulate.h" #include "mm.h" @@ -227,8 +259,10 @@ struct priv_op_ctxt { struct x86_emulate_ctxt ctxt; struct { ---- a/xen/arch/x86/pv/mm.c -+++ b/xen/arch/x86/pv/mm.c +Index: xen-4.16.1-testing/xen/arch/x86/pv/mm.c +=================================================================== +--- xen-4.16.1-testing.orig/xen/arch/x86/pv/mm.c ++++ xen-4.16.1-testing/xen/arch/x86/pv/mm.c @@ -26,6 +26,10 @@ #include "mm.h" @@ -240,8 +274,10 @@ /* * Get a mapping of a PV guest's l1e for this linear address. The return * pointer should be unmapped using unmap_domain_page(). ---- a/xen/arch/x86/domain_page.c -+++ b/xen/arch/x86/domain_page.c +Index: xen-4.16.1-testing/xen/arch/x86/domain_page.c +=================================================================== +--- xen-4.16.1-testing.orig/xen/arch/x86/domain_page.c ++++ xen-4.16.1-testing/xen/arch/x86/domain_page.c @@ -18,6 +18,10 @@ #include <asm/hardirq.h> #include <asm/setup.h> @@ -253,8 +289,10 @@ static DEFINE_PER_CPU(struct vcpu *, override); static inline struct vcpu *mapcache_current_vcpu(void) ---- a/xen/arch/x86/mm/shadow/private.h -+++ b/xen/arch/x86/mm/shadow/private.h +Index: xen-4.16.1-testing/xen/arch/x86/mm/shadow/private.h +=================================================================== +--- xen-4.16.1-testing.orig/xen/arch/x86/mm/shadow/private.h ++++ xen-4.16.1-testing/xen/arch/x86/mm/shadow/private.h @@ -33,6 +33,10 @@ #include "../mm-locks.h" @@ -266,8 +304,10 @@ /****************************************************************************** * Levels of self-test and paranoia */ ---- a/xen/arch/x86/mm/hap/hap.c -+++ b/xen/arch/x86/mm/hap/hap.c +Index: xen-4.16.1-testing/xen/arch/x86/mm/hap/hap.c +=================================================================== +--- xen-4.16.1-testing.orig/xen/arch/x86/mm/hap/hap.c ++++ xen-4.16.1-testing/xen/arch/x86/mm/hap/hap.c @@ -42,6 +42,10 @@ #include "private.h" @@ -279,8 +319,10 @@ /************************************************/ /* HAP VRAM TRACKING SUPPORT */ /************************************************/ ---- a/xen/arch/x86/mm/p2m-pod.c -+++ b/xen/arch/x86/mm/p2m-pod.c +Index: xen-4.16.1-testing/xen/arch/x86/mm/p2m-pod.c +=================================================================== +--- xen-4.16.1-testing.orig/xen/arch/x86/mm/p2m-pod.c ++++ xen-4.16.1-testing/xen/arch/x86/mm/p2m-pod.c @@ -31,6 +31,10 @@ #include "mm-locks.h" @@ -292,8 +334,10 @@ #define superpage_aligned(_x) (((_x)&(SUPERPAGE_PAGES-1))==0) /* Enforce lock ordering when grabbing the "external" page_alloc lock */ ---- a/xen/arch/x86/mm/p2m-ept.c -+++ b/xen/arch/x86/mm/p2m-ept.c +Index: xen-4.16.1-testing/xen/arch/x86/mm/p2m-ept.c +=================================================================== +--- xen-4.16.1-testing.orig/xen/arch/x86/mm/p2m-ept.c ++++ xen-4.16.1-testing/xen/arch/x86/mm/p2m-ept.c @@ -36,6 +36,10 @@ #include "mm-locks.h" @@ -305,8 +349,10 @@ #define atomic_read_ept_entry(__pepte) \ ( (ept_entry_t) { .epte = read_atomic(&(__pepte)->epte) } ) ---- a/xen/arch/x86/mm/p2m.c -+++ b/xen/arch/x86/mm/p2m.c +Index: xen-4.16.1-testing/xen/arch/x86/mm/p2m.c +=================================================================== +--- xen-4.16.1-testing.orig/xen/arch/x86/mm/p2m.c ++++ xen-4.16.1-testing/xen/arch/x86/mm/p2m.c @@ -44,6 +44,10 @@ #include "mm-locks.h" @@ -318,8 +364,10 @@ /* Override macro from asm/page.h to make work with mfn_t */ #undef virt_to_mfn #define virt_to_mfn(v) _mfn(__virt_to_mfn(v)) ---- a/xen/arch/x86/tboot.c -+++ b/xen/arch/x86/tboot.c +Index: xen-4.16.1-testing/xen/arch/x86/tboot.c +=================================================================== +--- xen-4.16.1-testing.orig/xen/arch/x86/tboot.c ++++ xen-4.16.1-testing/xen/arch/x86/tboot.c @@ -16,6 +16,10 @@ #include <asm/setup.h> #include <crypto/vmac.h> @@ -331,8 +379,10 @@ /* tboot=<physical address of shared page> */ static unsigned long __initdata opt_tboot_pa; integer_param("tboot", opt_tboot_pa); ---- a/tools/firmware/hvmloader/ovmf.c -+++ b/tools/firmware/hvmloader/ovmf.c +Index: xen-4.16.1-testing/tools/firmware/hvmloader/ovmf.c +=================================================================== +--- xen-4.16.1-testing.orig/tools/firmware/hvmloader/ovmf.c ++++ xen-4.16.1-testing/tools/firmware/hvmloader/ovmf.c @@ -34,6 +34,11 @@ #include <xen/hvm/ioreq.h> #include <xen/memory.h> @@ -345,8 +395,10 @@ #define OVMF_MAXOFFSET 0x000FFFFFULL #define OVMF_END 0x100000000ULL #define LOWCHUNK_BEGIN 0x000F0000 ---- a/tools/firmware/hvmloader/seabios.c -+++ b/tools/firmware/hvmloader/seabios.c +Index: xen-4.16.1-testing/tools/firmware/hvmloader/seabios.c +=================================================================== +--- xen-4.16.1-testing.orig/tools/firmware/hvmloader/seabios.c ++++ xen-4.16.1-testing/tools/firmware/hvmloader/seabios.c @@ -29,6 +29,11 @@ #include <acpi2_0.h> #include <libacpi.h> @@ -359,8 +411,10 @@ struct seabios_info { char signature[14]; /* XenHVMSeaBIOS\0 */ uint8_t length; /* Length of this struct */ ---- a/tools/firmware/hvmloader/util.c -+++ b/tools/firmware/hvmloader/util.c +Index: xen-4.16.1-testing/tools/firmware/hvmloader/util.c +=================================================================== +--- xen-4.16.1-testing.orig/tools/firmware/hvmloader/util.c ++++ xen-4.16.1-testing/tools/firmware/hvmloader/util.c @@ -31,6 +31,10 @@ #include <xen/hvm/hvm_xs_strings.h> #include <xen/hvm/params.h> ++++++ libxl.pvscsi.patch ++++++ --- /var/tmp/diff_new_pack.VmSxm2/_old 2022-04-16 00:13:06.717557986 +0200 +++ /var/tmp/diff_new_pack.VmSxm2/_new 2022-04-16 00:13:06.721557991 +0200 @@ -34,10 +34,10 @@ tools/libxl/xl_cmdtable.c | 15 16 files changed, 2326 insertions(+), 4 deletions(-) -Index: xen-4.16.0-testing/docs/man/xl.cfg.5.pod.in +Index: xen-4.16.1-testing/docs/man/xl.cfg.5.pod.in =================================================================== ---- xen-4.16.0-testing.orig/docs/man/xl.cfg.5.pod.in -+++ xen-4.16.0-testing/docs/man/xl.cfg.5.pod.in +--- xen-4.16.1-testing.orig/docs/man/xl.cfg.5.pod.in ++++ xen-4.16.1-testing/docs/man/xl.cfg.5.pod.in @@ -800,6 +800,62 @@ frontend to backend. It can be used as a For more information about the protocol, see https://xenbits.xenproject.org/docs/unstable/misc/pvcalls.html. @@ -101,10 +101,10 @@ =item B<vfb=[ "VFB_SPEC_STRING", "VFB_SPEC_STRING", ...]> Specifies the paravirtual framebuffer devices which should be supplied -Index: xen-4.16.0-testing/docs/man/xl.1.pod.in +Index: xen-4.16.1-testing/docs/man/xl.1.pod.in =================================================================== ---- xen-4.16.0-testing.orig/docs/man/xl.1.pod.in -+++ xen-4.16.0-testing/docs/man/xl.1.pod.in +--- xen-4.16.1-testing.orig/docs/man/xl.1.pod.in ++++ xen-4.16.1-testing/docs/man/xl.1.pod.in @@ -1610,6 +1610,24 @@ List virtual network interfaces for a do =back @@ -130,10 +130,10 @@ =head1 PCI PASS-THROUGH =over 4 -Index: xen-4.16.0-testing/tools/libs/light/Makefile +Index: xen-4.16.1-testing/tools/libs/light/Makefile =================================================================== ---- xen-4.16.0-testing.orig/tools/libs/light/Makefile -+++ xen-4.16.0-testing/tools/libs/light/Makefile +--- xen-4.16.1-testing.orig/tools/libs/light/Makefile ++++ xen-4.16.1-testing/tools/libs/light/Makefile @@ -78,6 +78,7 @@ SRCS-y += libxl.c SRCS-y += libxl_create.c SRCS-y += libxl_dm.c @@ -142,10 +142,10 @@ SRCS-y += libxl_dom.c SRCS-y += libxl_exec.c SRCS-y += libxl_xshelp.c -Index: xen-4.16.0-testing/tools/libs/util/Makefile +Index: xen-4.16.1-testing/tools/libs/util/Makefile =================================================================== ---- xen-4.16.0-testing.orig/tools/libs/util/Makefile -+++ xen-4.16.0-testing/tools/libs/util/Makefile +--- xen-4.16.1-testing.orig/tools/libs/util/Makefile ++++ xen-4.16.1-testing/tools/libs/util/Makefile @@ -8,6 +8,7 @@ SRCS-y += libxlu_disk_l.c SRCS-y += libxlu_disk.c SRCS-y += libxlu_vif.c @@ -154,10 +154,10 @@ CFLAGS += -Wno-format-zero-length -Wmissing-declarations \ -Wno-declaration-after-statement -Wformat-nonliteral -Index: xen-4.16.0-testing/tools/include/libxl.h +Index: xen-4.16.1-testing/tools/include/libxl.h =================================================================== ---- xen-4.16.0-testing.orig/tools/include/libxl.h -+++ xen-4.16.0-testing/tools/include/libxl.h +--- xen-4.16.1-testing.orig/tools/include/libxl.h ++++ xen-4.16.1-testing/tools/include/libxl.h @@ -1243,6 +1243,13 @@ void libxl_mac_copy(libxl_ctx *ctx, libx #define LIBXL_HAVE_PCITOPOLOGY 1 @@ -214,10 +214,10 @@ /* Virtual TPMs */ int libxl_device_vtpm_add(libxl_ctx *ctx, uint32_t domid, libxl_device_vtpm *vtpm, const libxl_asyncop_how *ao_how) -Index: xen-4.16.0-testing/tools/libs/light/libxl_create.c +Index: xen-4.16.1-testing/tools/libs/light/libxl_create.c =================================================================== ---- xen-4.16.0-testing.orig/tools/libs/light/libxl_create.c -+++ xen-4.16.0-testing/tools/libs/light/libxl_create.c +--- xen-4.16.1-testing.orig/tools/libs/light/libxl_create.c ++++ xen-4.16.1-testing/tools/libs/light/libxl_create.c @@ -1846,6 +1846,7 @@ const libxl__device_type *device_type_tb &libxl__disk_devtype, &libxl__nic_devtype, @@ -226,10 +226,10 @@ &libxl__usbctrl_devtype, &libxl__usbdev_devtype, &libxl__pci_devtype, -Index: xen-4.16.0-testing/tools/libs/light/libxl_internal.h +Index: xen-4.16.1-testing/tools/libs/light/libxl_internal.h =================================================================== ---- xen-4.16.0-testing.orig/tools/libs/light/libxl_internal.h -+++ xen-4.16.0-testing/tools/libs/light/libxl_internal.h +--- xen-4.16.1-testing.orig/tools/libs/light/libxl_internal.h ++++ xen-4.16.1-testing/tools/libs/light/libxl_internal.h @@ -4006,6 +4006,7 @@ extern const libxl__device_type libxl__v extern const libxl__device_type libxl__disk_devtype; extern const libxl__device_type libxl__nic_devtype; @@ -238,10 +238,10 @@ extern const libxl__device_type libxl__usbctrl_devtype; extern const libxl__device_type libxl__usbdev_devtype; extern const libxl__device_type libxl__pci_devtype; -Index: xen-4.16.0-testing/tools/libs/light/libxl_types.idl +Index: xen-4.16.1-testing/tools/libs/light/libxl_types.idl =================================================================== ---- xen-4.16.0-testing.orig/tools/libs/light/libxl_types.idl -+++ xen-4.16.0-testing/tools/libs/light/libxl_types.idl +--- xen-4.16.1-testing.orig/tools/libs/light/libxl_types.idl ++++ xen-4.16.1-testing/tools/libs/light/libxl_types.idl @@ -950,6 +950,43 @@ libxl_device_vsnd = Struct("device_vsnd" ("pcms", Array(libxl_vsnd_pcm, "num_vsnd_pcms")) ]) @@ -316,10 +316,10 @@ libxl_vtpminfo = Struct("vtpminfo", [ ("backend", string), ("backend_id", uint32), -Index: xen-4.16.0-testing/tools/libs/light/libxl_types_internal.idl +Index: xen-4.16.1-testing/tools/libs/light/libxl_types_internal.idl =================================================================== ---- xen-4.16.0-testing.orig/tools/libs/light/libxl_types_internal.idl -+++ xen-4.16.0-testing/tools/libs/light/libxl_types_internal.idl +--- xen-4.16.1-testing.orig/tools/libs/light/libxl_types_internal.idl ++++ xen-4.16.1-testing/tools/libs/light/libxl_types_internal.idl @@ -32,6 +32,7 @@ libxl__device_kind = Enumeration("device (14, "PVCALLS"), (15, "VSND"), @@ -328,10 +328,10 @@ ]) libxl__console_backend = Enumeration("console_backend", [ -Index: xen-4.16.0-testing/tools/libs/light/libxl_vscsi.c +Index: xen-4.16.1-testing/tools/libs/light/libxl_vscsi.c =================================================================== --- /dev/null -+++ xen-4.16.0-testing/tools/libs/light/libxl_vscsi.c ++++ xen-4.16.1-testing/tools/libs/light/libxl_vscsi.c @@ -0,0 +1,1185 @@ +/* + * Copyright (C) 2016 SUSE Linux GmbH @@ -1518,10 +1518,10 @@ + * indent-tabs-mode: nil + * End: + */ -Index: xen-4.16.0-testing/tools/libs/util/libxlu_vscsi.c +Index: xen-4.16.1-testing/tools/libs/util/libxlu_vscsi.c =================================================================== --- /dev/null -+++ xen-4.16.0-testing/tools/libs/util/libxlu_vscsi.c ++++ xen-4.16.1-testing/tools/libs/util/libxlu_vscsi.c @@ -0,0 +1,669 @@ +/* + * libxlu_vscsi.c - xl configuration file parsing: setup and helper functions @@ -2192,10 +2192,10 @@ + return ERROR_INVAL; +} +#endif -Index: xen-4.16.0-testing/tools/include/libxlutil.h +Index: xen-4.16.1-testing/tools/include/libxlutil.h =================================================================== ---- xen-4.16.0-testing.orig/tools/include/libxlutil.h -+++ xen-4.16.0-testing/tools/include/libxlutil.h +--- xen-4.16.1-testing.orig/tools/include/libxlutil.h ++++ xen-4.16.1-testing/tools/include/libxlutil.h @@ -131,6 +131,25 @@ int xlu_rdm_parse(XLU_Config *cfg, libxl int xlu_vif_parse_rate(XLU_Config *cfg, const char *rate, libxl_device_nic *nic); @@ -2222,10 +2222,10 @@ #endif /* LIBXLUTIL_H */ /* -Index: xen-4.16.0-testing/tools/xl/Makefile +Index: xen-4.16.1-testing/tools/xl/Makefile =================================================================== ---- xen-4.16.0-testing.orig/tools/xl/Makefile -+++ xen-4.16.0-testing/tools/xl/Makefile +--- xen-4.16.1-testing.orig/tools/xl/Makefile ++++ xen-4.16.1-testing/tools/xl/Makefile @@ -19,7 +19,7 @@ CFLAGS_XL += -Wshadow XL_OBJS-$(CONFIG_X86) = xl_psr.o XL_OBJS = xl.o xl_cmdtable.o xl_sxp.o xl_utils.o $(XL_OBJS-y) @@ -2235,10 +2235,10 @@ XL_OBJS += xl_sched.o xl_pci.o xl_vcpu.o xl_cdrom.o xl_mem.o XL_OBJS += xl_info.o xl_console.o xl_misc.o XL_OBJS += xl_vmcontrol.o xl_saverestore.o xl_migrate.o -Index: xen-4.16.0-testing/tools/xl/xl.h +Index: xen-4.16.1-testing/tools/xl/xl.h =================================================================== ---- xen-4.16.0-testing.orig/tools/xl/xl.h -+++ xen-4.16.0-testing/tools/xl/xl.h +--- xen-4.16.1-testing.orig/tools/xl/xl.h ++++ xen-4.16.1-testing/tools/xl/xl.h @@ -166,6 +166,9 @@ int main_channellist(int argc, char **ar int main_blockattach(int argc, char **argv); int main_blocklist(int argc, char **argv); @@ -2249,10 +2249,10 @@ int main_vtpmattach(int argc, char **argv); int main_vtpmlist(int argc, char **argv); int main_vtpmdetach(int argc, char **argv); -Index: xen-4.16.0-testing/tools/xl/xl_parse.c +Index: xen-4.16.1-testing/tools/xl/xl_parse.c =================================================================== ---- xen-4.16.0-testing.orig/tools/xl/xl_parse.c -+++ xen-4.16.0-testing/tools/xl/xl_parse.c +--- xen-4.16.1-testing.orig/tools/xl/xl_parse.c ++++ xen-4.16.1-testing/tools/xl/xl_parse.c @@ -1214,7 +1214,8 @@ void parse_config_data(const char *confi long l, vcpus = 0; XLU_Config *config; @@ -2263,7 +2263,7 @@ XLU_ConfigList *channels, *ioports, *irqs, *iomem, *viridian, *dtdevs, *mca_caps; int num_ioports, num_irqs, num_iomem, num_cpus, num_viridian, num_mca_caps; -@@ -2060,6 +2061,17 @@ void parse_config_data(const char *confi +@@ -2086,6 +2087,17 @@ void parse_config_data(const char *confi } } @@ -2281,10 +2281,10 @@ if (!xlu_cfg_get_list(config, "vtpm", &vtpms, 0, 0)) { d_config->num_vtpms = 0; d_config->vtpms = NULL; -Index: xen-4.16.0-testing/tools/xl/xl_vscsi.c +Index: xen-4.16.1-testing/tools/xl/xl_vscsi.c =================================================================== --- /dev/null -+++ xen-4.16.0-testing/tools/xl/xl_vscsi.c ++++ xen-4.16.1-testing/tools/xl/xl_vscsi.c @@ -0,0 +1,229 @@ +/* + * Copyright 2009-2017 Citrix Ltd and other contributors @@ -2515,10 +2515,10 @@ + return !!rc; +} + -Index: xen-4.16.0-testing/tools/xl/xl_cmdtable.c +Index: xen-4.16.1-testing/tools/xl/xl_cmdtable.c =================================================================== ---- xen-4.16.0-testing.orig/tools/xl/xl_cmdtable.c -+++ xen-4.16.0-testing/tools/xl/xl_cmdtable.c +--- xen-4.16.1-testing.orig/tools/xl/xl_cmdtable.c ++++ xen-4.16.1-testing/tools/xl/xl_cmdtable.c @@ -382,6 +382,21 @@ const struct cmd_spec cmd_table[] = { "[option] <Domain> <DevId>", "-f, --force do not wait for the domain to release the device" ++++++ xen-4.16.0-testing-src.tar.bz2 -> xen-4.16.1-testing-src.tar.bz2 ++++++ ++++ 7692 lines of diff (skipped)