Hello community, here is the log from the commit of package xen for openSUSE:Factory checked in at 2018-12-10 12:27:01 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/xen (Old) and /work/SRC/openSUSE:Factory/.xen.new.19453 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "xen" Mon Dec 10 12:27:01 2018 rev:258 rq:654117 version:4.11.1_02 Changes: -------- --- /work/SRC/openSUSE:Factory/xen/xen.changes 2018-12-03 10:04:29.840033854 +0100 +++ /work/SRC/openSUSE:Factory/.xen.new.19453/xen.changes 2018-12-10 12:27:04.798602401 +0100 @@ -1,0 +2,82 @@ +Tue Dec 4 13:19:21 MST 2018 - carn...@suse.com + +- Update to Xen 4.11.1 bug fix release (bsc#1027519) + xen-4.11.1-testing-src.tar.bz2 +- 5b505d59-tools-xentop-replace-use-of-deprecated-vwprintw.patch + replaces xen.2b50cdbc444c637575580dcfa6c9525a84d5cc62.patch +- 5b76ec82-libxl-arm-Fix-build-on-arm64-acpi-w-gcc-8.2.patch + replaces xen.b8f33431f3dd23fb43a879f4bdb4283fdc9465ad.patch +- Drop the following patches contained in the new tarball + 5b34b8fe-VMX-defer-vmx_vmcs_exit-as-long-as-possible.patch + 5b3cab8e-1-VMX-MSR_DEBUGCTL-handling.patch + 5b3cab8e-2-VMX-improve-MSR-load-save-API.patch + 5b3cab8e-3-VMX-cleanup-MSR-load-save-infra.patch + 5b3cab8f-1-VMX-factor-out-locate_msr_entry.patch + 5b3cab8f-2-VMX-remote-access-to-MSR-lists.patch + 5b3cab8f-3-VMX-improve-LBR-MSR-handling.patch + 5b3cab8f-4-VMX-pass-MSR-value-into-vmx_msr_add.patch + 5b3cab8f-5-VMX-load-only-guest-MSR-entries.patch + 5b3f8fa5-port-array_index_nospec-from-Linux.patch + 5b4321f6-x86-correctly-set-nonlazy_xstate_used-when-loading-full-state.patch + 5b4488e7-x86-spec-ctrl-cmdline-handling.patch + 5b471517-page_alloc-correct-first_dirty-calc-in-block-merging.patch + 5b4c9a60-allow-cpu_down-to-be-called-earlier.patch + 5b4db308-SVM-fix-cleanup-svm_inject_event.patch + 5b5040c3-cpupools-fix-state-when-downing-a-CPU-failed.patch + 5b5040f2-x86-AMD-distinguish-CU-from-HT.patch + 5b505fe5-VMX-fix-find-msr-build.patch + 5b508775-1-x86-distinguish-CPU-offlining-and-removal.patch + 5b508775-2-x86-possibly-bring-up-all-CPUs.patch + 5b508775-3-x86-cmdline-opt-to-avoid-use-of-secondary-HTs.patch + 5b508ce8-VMX-dont-clobber-dr6-while-debug-state-is-lazy.patch + 5b50df16-1-x86-xstate-use-guest-CPUID-policy.patch + 5b50df16-2-x86-make-xstate-calculation-errors-more-obvious.patch + 5b56feb1-hvm-Disallow-unknown-MSR_EFER-bits.patch + 5b56feb2-spec-ctrl-Fix-the-parsing-of-xpti--on-fixed-Intel-hardware.patch + 5b62ca93-VMX-avoid-hitting-BUG_ON.patch + 5b6d84ac-x86-fix-improve-vlapic-read-write.patch + 5b6d8ce2-x86-XPTI-parsing.patch + 5b72fbbe-ARM-disable-grant-table-v2.patch + 5b72fbbe-oxenstored-eval-order.patch + 5b72fbbe-vtx-Fix-the-checking-for-unknown-invalid-MSR_DEBUGCTL-bits.patch + 5b72fbbf-1-spec-ctrl-Calculate-safe-PTE-addresses-for-L1TF-mitigations.patch + 5b72fbbf-2-spec-ctrl-Introduce-an-option-to-control-L1TF-mitigation-for-PV-guests.patch + 5b72fbbf-3-shadow-Infrastructure-to-force-a-PV-guest-into-shadow-mode.patch + 5b72fbbf-4-mm-Plumbing-to-allow-any-PTE-update-to-fail-with--ERESTART.patch + 5b72fbbf-5-pv-Force-a-guest-into-shadow-mode-when-it-writes-an-L1TF-vulnerable-PTE.patch + 5b72fbbf-6-spec-ctrl-CPUID-MSR-definitions-for-L1D_FLUSH.patch + 5b72fbbf-7-msr-Virtualise-MSR_FLUSH_CMD-for-guests.patch + 5b72fbbf-8-spec-ctrl-Introduce-an-option-to-control-L1D_FLUSH-for-HVM-HAP-guests.patch + 5b72fbbf-x86-Make-spec-ctrl-no-a-global-disable-of-all-mitigations.patch + 5b72fbbf-xl.conf-Add-global-affinity-masks.patch + 5b74190e-x86-hvm-ioreq-MMIO-range-check-honor-DF.patch + 5b752762-x86-hvm-emul-rep-IO-should-not-cross-GFN-boundaries.patch + 5b75afef-x86-setup-avoid-OoB-E820-lookup.patch + 5b76b780-rangeset-inquiry-functions-tolerate-NULL.patch + 5b83c654-VT-d-dmar-iommu-mem-leak-fix.patch + 5b8d5832-x86-assorted-array_index_nospec-insertions.patch + 5ba11ed4-credit2-fix-moving-CPUs-between-cpupools.patch + 5bacae4b-x86-boot-allocate-extra-module-slot.patch + 5bae44ce-x86-silence-false-log-messages.patch + 5bb60c12-x86-split-opt_xpti.patch + 5bb60c4f-x86-split-opt_pv_l1tf.patch + 5bb60c74-x86-fix-xpti-and-pv-l1tf.patch + 5bcf0722-x86-boot-enable-NMIs.patch + 5bd076e9-dombuilder-init-vcpu-debug-regs-correctly.patch + 5bd076e9-x86-boot-init-debug-regs-correctly.patch + 5bd076e9-x86-init-vcpu-debug-regs-correctly.patch + 5bd0e0cf-vvmx-Disallow-the-use-of-VT-x-instructions-when-nested-virt-is-disabled.patch + 5bd0e11b-x86-disallow-VT-x-insns-without-nested-virt.patch + 5bd85bfd-x86-fix-crash-on-xl-set-parameter-pcid.patch + 5be2a308-x86-extend-get_platform_badpages.patch + 5be2a354-x86-work-around-HLE-host-lockup-erratum.patch + xsa275-1.patch + xsa275-2.patch + xsa276-1.patch + xsa276-2.patch + xsa277.patch + xsa279.patch + xsa280-1.patch + xsa280-2.patch + +------------------------------------------------------------------- @@ -52,0 +135,7 @@ + +------------------------------------------------------------------- +Tue Nov 6 08:33:59 MST 2018 - carn...@suse.com + +- bsc#1114405 - VUL-0: CVE-2018-18883: xen: Nested VT-x usable even + when disabled (XSA-278) + 5bd0e0cf-vvmx-Disallow-the-use-of-VT-x-instructions-when-nested-virt-is-disabled.patch Old: ---- 5b34b8fe-VMX-defer-vmx_vmcs_exit-as-long-as-possible.patch 5b3cab8e-1-VMX-MSR_DEBUGCTL-handling.patch 5b3cab8e-2-VMX-improve-MSR-load-save-API.patch 5b3cab8e-3-VMX-cleanup-MSR-load-save-infra.patch 5b3cab8f-1-VMX-factor-out-locate_msr_entry.patch 5b3cab8f-2-VMX-remote-access-to-MSR-lists.patch 5b3cab8f-3-VMX-improve-LBR-MSR-handling.patch 5b3cab8f-4-VMX-pass-MSR-value-into-vmx_msr_add.patch 5b3cab8f-5-VMX-load-only-guest-MSR-entries.patch 5b3f8fa5-port-array_index_nospec-from-Linux.patch 5b4321f6-x86-correctly-set-nonlazy_xstate_used-when-loading-full-state.patch 5b4488e7-x86-spec-ctrl-cmdline-handling.patch 5b471517-page_alloc-correct-first_dirty-calc-in-block-merging.patch 5b4c9a60-allow-cpu_down-to-be-called-earlier.patch 5b4db308-SVM-fix-cleanup-svm_inject_event.patch 5b5040c3-cpupools-fix-state-when-downing-a-CPU-failed.patch 5b5040f2-x86-AMD-distinguish-CU-from-HT.patch 5b505fe5-VMX-fix-find-msr-build.patch 5b508775-1-x86-distinguish-CPU-offlining-and-removal.patch 5b508775-2-x86-possibly-bring-up-all-CPUs.patch 5b508775-3-x86-cmdline-opt-to-avoid-use-of-secondary-HTs.patch 5b508ce8-VMX-dont-clobber-dr6-while-debug-state-is-lazy.patch 5b50df16-1-x86-xstate-use-guest-CPUID-policy.patch 5b50df16-2-x86-make-xstate-calculation-errors-more-obvious.patch 5b56feb1-hvm-Disallow-unknown-MSR_EFER-bits.patch 5b56feb2-spec-ctrl-Fix-the-parsing-of-xpti--on-fixed-Intel-hardware.patch 5b62ca93-VMX-avoid-hitting-BUG_ON.patch 5b6d84ac-x86-fix-improve-vlapic-read-write.patch 5b6d8ce2-x86-XPTI-parsing.patch 5b72fbbe-ARM-disable-grant-table-v2.patch 5b72fbbe-oxenstored-eval-order.patch 5b72fbbe-vtx-Fix-the-checking-for-unknown-invalid-MSR_DEBUGCTL-bits.patch 5b72fbbf-1-spec-ctrl-Calculate-safe-PTE-addresses-for-L1TF-mitigations.patch 5b72fbbf-2-spec-ctrl-Introduce-an-option-to-control-L1TF-mitigation-for-PV-guests.patch 5b72fbbf-3-shadow-Infrastructure-to-force-a-PV-guest-into-shadow-mode.patch 5b72fbbf-4-mm-Plumbing-to-allow-any-PTE-update-to-fail-with--ERESTART.patch 5b72fbbf-5-pv-Force-a-guest-into-shadow-mode-when-it-writes-an-L1TF-vulnerable-PTE.patch 5b72fbbf-6-spec-ctrl-CPUID-MSR-definitions-for-L1D_FLUSH.patch 5b72fbbf-7-msr-Virtualise-MSR_FLUSH_CMD-for-guests.patch 5b72fbbf-8-spec-ctrl-Introduce-an-option-to-control-L1D_FLUSH-for-HVM-HAP-guests.patch 5b72fbbf-x86-Make-spec-ctrl-no-a-global-disable-of-all-mitigations.patch 5b72fbbf-xl.conf-Add-global-affinity-masks.patch 5b74190e-x86-hvm-ioreq-MMIO-range-check-honor-DF.patch 5b752762-x86-hvm-emul-rep-IO-should-not-cross-GFN-boundaries.patch 5b75afef-x86-setup-avoid-OoB-E820-lookup.patch 5b76b780-rangeset-inquiry-functions-tolerate-NULL.patch 5b83c654-VT-d-dmar-iommu-mem-leak-fix.patch 5b8d5832-x86-assorted-array_index_nospec-insertions.patch 5ba11ed4-credit2-fix-moving-CPUs-between-cpupools.patch 5bacae4b-x86-boot-allocate-extra-module-slot.patch 5bae44ce-x86-silence-false-log-messages.patch 5bb60c12-x86-split-opt_xpti.patch 5bb60c4f-x86-split-opt_pv_l1tf.patch 5bb60c74-x86-fix-xpti-and-pv-l1tf.patch 5bcf0722-x86-boot-enable-NMIs.patch 5bd076e9-dombuilder-init-vcpu-debug-regs-correctly.patch 5bd076e9-x86-boot-init-debug-regs-correctly.patch 5bd076e9-x86-init-vcpu-debug-regs-correctly.patch 5bd0e11b-x86-disallow-VT-x-insns-without-nested-virt.patch 5bd85bfd-x86-fix-crash-on-xl-set-parameter-pcid.patch 5be2a308-x86-extend-get_platform_badpages.patch 5be2a354-x86-work-around-HLE-host-lockup-erratum.patch xen-4.11.0-testing-src.tar.bz2 xen.2b50cdbc444c637575580dcfa6c9525a84d5cc62.patch xen.b8f33431f3dd23fb43a879f4bdb4283fdc9465ad.patch xsa275-1.patch xsa275-2.patch xsa276-1.patch xsa276-2.patch xsa277.patch xsa279.patch xsa280-1.patch xsa280-2.patch New: ---- 5b505d59-tools-xentop-replace-use-of-deprecated-vwprintw.patch 5b76ec82-libxl-arm-Fix-build-on-arm64-acpi-w-gcc-8.2.patch xen-4.11.1-testing-src.tar.bz2 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ xen.spec ++++++ --- /var/tmp/diff_new_pack.JePiLb/_old 2018-12-10 12:27:06.654600548 +0100 +++ /var/tmp/diff_new_pack.JePiLb/_new 2018-12-10 12:27:06.654600548 +0100 @@ -25,7 +25,7 @@ Name: xen ExclusiveArch: %ix86 x86_64 %arm aarch64 %define changeset 35349 -%define xen_build_dir xen-4.11.0-testing +%define xen_build_dir xen-4.11.1-testing # %define with_gdbsx 0 %define with_dom0_support 0 @@ -127,12 +127,12 @@ BuildRequires: pesign-obs-integration %endif -Version: 4.11.0_09 +Version: 4.11.1_02 Release: 0 Summary: Xen Virtualization: Hypervisor (aka VMM aka Microkernel) License: GPL-2.0 Group: System/Kernel -Source0: xen-4.11.0-testing-src.tar.bz2 +Source0: xen-4.11.1-testing-src.tar.bz2 Source1: stubdom.tar.bz2 Source5: ipxe.tar.bz2 Source6: mini-os.tar.bz2 @@ -162,85 +162,15 @@ # For xen-libs Source99: baselibs.conf # Upstream patches -Patch1: 5b3f8fa5-port-array_index_nospec-from-Linux.patch -Patch2: 5b4488e7-x86-spec-ctrl-cmdline-handling.patch -Patch3: 5b471517-page_alloc-correct-first_dirty-calc-in-block-merging.patch -Patch4: 5b4c9a60-allow-cpu_down-to-be-called-earlier.patch -Patch5: 5b4db308-SVM-fix-cleanup-svm_inject_event.patch -Patch6: 5b5040c3-cpupools-fix-state-when-downing-a-CPU-failed.patch -Patch7: 5b5040f2-x86-AMD-distinguish-CU-from-HT.patch -Patch8: 5b508775-1-x86-distinguish-CPU-offlining-and-removal.patch -Patch9: 5b508775-2-x86-possibly-bring-up-all-CPUs.patch -Patch10: 5b508775-3-x86-cmdline-opt-to-avoid-use-of-secondary-HTs.patch -Patch11: 5b508ce8-VMX-dont-clobber-dr6-while-debug-state-is-lazy.patch -Patch12: 5b50df16-1-x86-xstate-use-guest-CPUID-policy.patch -Patch13: 5b50df16-2-x86-make-xstate-calculation-errors-more-obvious.patch -Patch14: 5b34b8fe-VMX-defer-vmx_vmcs_exit-as-long-as-possible.patch -Patch15: 5b3cab8e-1-VMX-MSR_DEBUGCTL-handling.patch -Patch16: 5b3cab8e-2-VMX-improve-MSR-load-save-API.patch -Patch17: 5b3cab8e-3-VMX-cleanup-MSR-load-save-infra.patch -Patch18: 5b3cab8f-1-VMX-factor-out-locate_msr_entry.patch -Patch19: 5b3cab8f-2-VMX-remote-access-to-MSR-lists.patch -Patch20: 5b3cab8f-3-VMX-improve-LBR-MSR-handling.patch -Patch21: 5b3cab8f-4-VMX-pass-MSR-value-into-vmx_msr_add.patch -Patch22: 5b3cab8f-5-VMX-load-only-guest-MSR-entries.patch -Patch23: 5b4321f6-x86-correctly-set-nonlazy_xstate_used-when-loading-full-state.patch -Patch24: 5b505fe5-VMX-fix-find-msr-build.patch -Patch25: 5b56feb1-hvm-Disallow-unknown-MSR_EFER-bits.patch -Patch26: 5b56feb2-spec-ctrl-Fix-the-parsing-of-xpti--on-fixed-Intel-hardware.patch -Patch27: 5b62ca93-VMX-avoid-hitting-BUG_ON.patch -Patch28: 5b6d84ac-x86-fix-improve-vlapic-read-write.patch -Patch29: 5b6d8ce2-x86-XPTI-parsing.patch -Patch30: 5b72fbbe-ARM-disable-grant-table-v2.patch -Patch31: 5b72fbbe-oxenstored-eval-order.patch -Patch32: 5b72fbbe-vtx-Fix-the-checking-for-unknown-invalid-MSR_DEBUGCTL-bits.patch -Patch33: 5b72fbbf-1-spec-ctrl-Calculate-safe-PTE-addresses-for-L1TF-mitigations.patch -Patch34: 5b72fbbf-2-spec-ctrl-Introduce-an-option-to-control-L1TF-mitigation-for-PV-guests.patch -Patch35: 5b72fbbf-3-shadow-Infrastructure-to-force-a-PV-guest-into-shadow-mode.patch -Patch36: 5b72fbbf-4-mm-Plumbing-to-allow-any-PTE-update-to-fail-with--ERESTART.patch -Patch37: 5b72fbbf-5-pv-Force-a-guest-into-shadow-mode-when-it-writes-an-L1TF-vulnerable-PTE.patch -Patch38: 5b72fbbf-6-spec-ctrl-CPUID-MSR-definitions-for-L1D_FLUSH.patch -Patch39: 5b72fbbf-7-msr-Virtualise-MSR_FLUSH_CMD-for-guests.patch -Patch40: 5b72fbbf-8-spec-ctrl-Introduce-an-option-to-control-L1D_FLUSH-for-HVM-HAP-guests.patch -Patch41: 5b72fbbf-x86-Make-spec-ctrl-no-a-global-disable-of-all-mitigations.patch -Patch42: 5b72fbbf-xl.conf-Add-global-affinity-masks.patch -Patch43: 5b74190e-x86-hvm-ioreq-MMIO-range-check-honor-DF.patch -Patch44: 5b752762-x86-hvm-emul-rep-IO-should-not-cross-GFN-boundaries.patch -Patch45: 5b75afef-x86-setup-avoid-OoB-E820-lookup.patch -Patch46: 5b76b780-rangeset-inquiry-functions-tolerate-NULL.patch -Patch47: 5b83c654-VT-d-dmar-iommu-mem-leak-fix.patch -Patch48: 5b8d5832-x86-assorted-array_index_nospec-insertions.patch -Patch49: 5b8fae26-tools-libxl-correct-vcpu-affinity-output-with-sparse-physical-cpu-map.patch -Patch50: 5b8fae26-xen-fill-topology-info-for-all-present-cpus.patch -Patch51: 5b8fb5af-tools-xl-refuse-to-set-number-of-vcpus-to-0-via-xl-vcpu-set.patch -Patch52: 5b9784ad-x86-HVM-drop-hvm_fetch_from_guest_linear.patch -Patch53: 5b9784d2-x86-HVM-add-known_gla-helper.patch -Patch54: 5b9784f2-x86-HVM-split-page-straddling-accesses.patch -Patch55: 5ba11ed4-credit2-fix-moving-CPUs-between-cpupools.patch -Patch56: 5bacae4b-x86-boot-allocate-extra-module-slot.patch -Patch57: 5bae44ce-x86-silence-false-log-messages.patch -Patch58: 5bb60c12-x86-split-opt_xpti.patch -Patch59: 5bb60c4f-x86-split-opt_pv_l1tf.patch -Patch60: 5bb60c74-x86-fix-xpti-and-pv-l1tf.patch -Patch61: 5bcf0722-x86-boot-enable-NMIs.patch -Patch62: 5bd076e9-x86-boot-init-debug-regs-correctly.patch -Patch63: 5bd076e9-x86-init-vcpu-debug-regs-correctly.patch -Patch64: 5bd076e9-dombuilder-init-vcpu-debug-regs-correctly.patch -Patch65: 5bd0e11b-x86-disallow-VT-x-insns-without-nested-virt.patch -Patch66: 5bd85bfd-x86-fix-crash-on-xl-set-parameter-pcid.patch -Patch67: 5bdc31d5-VMX-fix-vmx_handle_eoi.patch -Patch68: 5be2a308-x86-extend-get_platform_badpages.patch -Patch69: 5be2a354-x86-work-around-HLE-host-lockup-erratum.patch -Patch70: xsa275-1.patch -Patch71: xsa275-2.patch -Patch72: xsa276-1.patch -Patch73: xsa276-2.patch -Patch74: xsa277.patch -Patch75: xsa279.patch -Patch76: xsa280-1.patch -Patch77: xsa280-2.patch -Patch78: xen.b8f33431f3dd23fb43a879f4bdb4283fdc9465ad.patch -Patch79: xen.2b50cdbc444c637575580dcfa6c9525a84d5cc62.patch +Patch1: 5b505d59-tools-xentop-replace-use-of-deprecated-vwprintw.patch +Patch2: 5b76ec82-libxl-arm-Fix-build-on-arm64-acpi-w-gcc-8.2.patch +Patch3: 5b8fae26-tools-libxl-correct-vcpu-affinity-output-with-sparse-physical-cpu-map.patch +Patch4: 5b8fae26-xen-fill-topology-info-for-all-present-cpus.patch +Patch5: 5b8fb5af-tools-xl-refuse-to-set-number-of-vcpus-to-0-via-xl-vcpu-set.patch +Patch6: 5b9784ad-x86-HVM-drop-hvm_fetch_from_guest_linear.patch +Patch7: 5b9784d2-x86-HVM-add-known_gla-helper.patch +Patch8: 5b9784f2-x86-HVM-split-page-straddling-accesses.patch +Patch9: 5bdc31d5-VMX-fix-vmx_handle_eoi.patch # Our platform specific patches Patch400: xen-destdir.patch Patch401: vif-bridge-no-iptables.patch @@ -445,76 +375,6 @@ %patch7 -p1 %patch8 -p1 %patch9 -p1 -%patch10 -p1 -%patch11 -p1 -%patch12 -p1 -%patch13 -p1 -%patch14 -p1 -%patch15 -p1 -%patch16 -p1 -%patch17 -p1 -%patch18 -p1 -%patch19 -p1 -%patch20 -p1 -%patch21 -p1 -%patch22 -p1 -%patch23 -p1 -%patch24 -p1 -%patch25 -p1 -%patch26 -p1 -%patch27 -p1 -%patch28 -p1 -%patch29 -p1 -%patch30 -p1 -%patch31 -p1 -%patch32 -p1 -%patch33 -p1 -%patch34 -p1 -%patch35 -p1 -%patch36 -p1 -%patch37 -p1 -%patch38 -p1 -%patch39 -p1 -%patch40 -p1 -%patch41 -p1 -%patch42 -p1 -%patch43 -p1 -%patch44 -p1 -%patch45 -p1 -%patch46 -p1 -%patch47 -p1 -%patch48 -p1 -%patch49 -p1 -%patch50 -p1 -%patch51 -p1 -%patch52 -p1 -%patch53 -p1 -%patch54 -p1 -%patch55 -p1 -%patch56 -p1 -%patch57 -p1 -%patch58 -p1 -%patch59 -p1 -%patch60 -p1 -%patch61 -p1 -%patch62 -p1 -%patch63 -p1 -%patch64 -p1 -%patch65 -p1 -%patch66 -p1 -%patch67 -p1 -%patch68 -p1 -%patch69 -p1 -%patch70 -p1 -%patch71 -p1 -%patch72 -p1 -%patch73 -p1 -%patch74 -p1 -%patch75 -p1 -%patch76 -p1 -%patch77 -p1 -%patch78 -p1 -%patch79 -p1 # Our platform specific patches %patch400 -p1 %patch401 -p1 ++++++ 5b505d59-tools-xentop-replace-use-of-deprecated-vwprintw.patch ++++++ Subject: tools/xentop : replace use of deprecated vwprintw From: Christopher Clark christopher.w.cl...@gmail.com Wed Jul 18 15:22:17 2018 -0700 Date: Thu Jul 19 10:43:53 2018 +0100: Git: 2b50cdbc444c637575580dcfa6c9525a84d5cc62 gcc-8.1 complains: | xentop.c: In function 'print': | xentop.c:304:4: error: 'vwprintw' is deprecated [-Werror=deprecated-declarations] | vwprintw(stdscr, (curses_str_t)fmt, args); | ^~~~~~~~ vw_printw (note the underscore) is a non-deprecated alternative. Signed-off-by: Christopher Clark <christopher.cla...@baesystems.com> Acked-by: Wei Liu <wei.l...@citrix.com> diff --git a/tools/xenstat/xentop/xentop.c b/tools/xenstat/xentop/xentop.c index 2fd2b6742e..c46581062b 100644 --- a/tools/xenstat/xentop/xentop.c +++ b/tools/xenstat/xentop/xentop.c @@ -301,7 +301,7 @@ static void print(const char *fmt, ...) if (!batch) { if((current_row() < lines()-1)) { va_start(args, fmt); - vwprintw(stdscr, (curses_str_t)fmt, args); + vw_printw(stdscr, (curses_str_t)fmt, args); va_end(args); } } else { ++++++ 5b76ec82-libxl-arm-Fix-build-on-arm64-acpi-w-gcc-8.2.patch ++++++ Subject: libxl/arm: Fix build on arm64 + acpi w/ gcc 8.2 From: Christopher Clark christopher.w.cl...@gmail.com Thu Aug 16 13:22:41 2018 -0700 Date: Fri Aug 17 16:40:50 2018 +0100: Git: b8f33431f3dd23fb43a879f4bdb4283fdc9465ad Add zero-padding to #defined ACPI table strings that are copied. Provides sufficient characters to satisfy the length required to fully populate the destination and prevent array-bounds warnings. Add BUILD_BUG_ON sizeof checks for compile-time length checking. Signed-off-by: Christopher Clark <christopher.cla...@baesystems.com> Reviewed-by: Stefano Stabellini <sstabell...@kernel.org> Acked-by: Wei Liu <wei.l...@citrix.com> Index: xen-4.11.1-testing/tools/libxl/libxl_arm_acpi.c =================================================================== --- xen-4.11.1-testing.orig/tools/libxl/libxl_arm_acpi.c +++ xen-4.11.1-testing/tools/libxl/libxl_arm_acpi.c @@ -17,6 +17,7 @@ */ #include "libxl_arm.h" +#include <xen-tools/libs.h> #include <stdint.h> @@ -48,9 +49,9 @@ extern const unsigned char dsdt_anycpu_a _hidden extern const int dsdt_anycpu_arm_len; -#define ACPI_OEM_ID "Xen" -#define ACPI_OEM_TABLE_ID "ARM" -#define ACPI_ASL_COMPILER_ID "XL" +#define ACPI_OEM_ID "Xen\0\0" +#define ACPI_OEM_TABLE_ID "ARM\0\0\0\0" +#define ACPI_ASL_COMPILER_ID "XL\0" enum { RSDP, @@ -190,6 +191,7 @@ static void make_acpi_rsdp(libxl__gc *gc struct acpi_table_rsdp *rsdp = (void *)dom->acpi_modules[0].data + offset; memcpy(rsdp->signature, "RSD PTR ", sizeof(rsdp->signature)); + BUILD_BUG_ON(sizeof(ACPI_OEM_ID) != sizeof(rsdp->oem_id)); memcpy(rsdp->oem_id, ACPI_OEM_ID, sizeof(rsdp->oem_id)); rsdp->length = acpitables[RSDP].size; rsdp->revision = 0x02; @@ -205,9 +207,12 @@ static void make_acpi_header(struct acpi memcpy(h->signature, sig, 4); h->length = len; h->revision = rev; + BUILD_BUG_ON(sizeof(ACPI_OEM_ID) != sizeof(h->oem_id)); memcpy(h->oem_id, ACPI_OEM_ID, sizeof(h->oem_id)); + BUILD_BUG_ON(sizeof(ACPI_OEM_TABLE_ID) != sizeof(h->oem_table_id)); memcpy(h->oem_table_id, ACPI_OEM_TABLE_ID, sizeof(h->oem_table_id)); h->oem_revision = 0; + BUILD_BUG_ON(sizeof(ACPI_ASL_COMPILER_ID) != sizeof(h->asl_compiler_id)); memcpy(h->asl_compiler_id, ACPI_ASL_COMPILER_ID, sizeof(h->asl_compiler_id)); h->asl_compiler_revision = 0; ++++++ xen-4.11.0-testing-src.tar.bz2 -> xen-4.11.1-testing-src.tar.bz2 ++++++ ++++ 6532 lines of diff (skipped)