Hello community,

here is the log from the commit of package xen for openSUSE:Factory checked in 
at 2018-12-10 12:27:01
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/xen (Old)
 and      /work/SRC/openSUSE:Factory/.xen.new.19453 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "xen"

Mon Dec 10 12:27:01 2018 rev:258 rq:654117 version:4.11.1_02

Changes:
--------
--- /work/SRC/openSUSE:Factory/xen/xen.changes  2018-12-03 10:04:29.840033854 
+0100
+++ /work/SRC/openSUSE:Factory/.xen.new.19453/xen.changes       2018-12-10 
12:27:04.798602401 +0100
@@ -1,0 +2,82 @@
+Tue Dec  4 13:19:21 MST 2018 - carn...@suse.com
+
+- Update to Xen 4.11.1 bug fix release (bsc#1027519)
+  xen-4.11.1-testing-src.tar.bz2
+- 5b505d59-tools-xentop-replace-use-of-deprecated-vwprintw.patch
+  replaces xen.2b50cdbc444c637575580dcfa6c9525a84d5cc62.patch
+- 5b76ec82-libxl-arm-Fix-build-on-arm64-acpi-w-gcc-8.2.patch
+  replaces xen.b8f33431f3dd23fb43a879f4bdb4283fdc9465ad.patch
+- Drop the following patches contained in the new tarball
+  5b34b8fe-VMX-defer-vmx_vmcs_exit-as-long-as-possible.patch
+  5b3cab8e-1-VMX-MSR_DEBUGCTL-handling.patch
+  5b3cab8e-2-VMX-improve-MSR-load-save-API.patch
+  5b3cab8e-3-VMX-cleanup-MSR-load-save-infra.patch
+  5b3cab8f-1-VMX-factor-out-locate_msr_entry.patch
+  5b3cab8f-2-VMX-remote-access-to-MSR-lists.patch
+  5b3cab8f-3-VMX-improve-LBR-MSR-handling.patch
+  5b3cab8f-4-VMX-pass-MSR-value-into-vmx_msr_add.patch
+  5b3cab8f-5-VMX-load-only-guest-MSR-entries.patch
+  5b3f8fa5-port-array_index_nospec-from-Linux.patch
+  5b4321f6-x86-correctly-set-nonlazy_xstate_used-when-loading-full-state.patch
+  5b4488e7-x86-spec-ctrl-cmdline-handling.patch
+  5b471517-page_alloc-correct-first_dirty-calc-in-block-merging.patch
+  5b4c9a60-allow-cpu_down-to-be-called-earlier.patch
+  5b4db308-SVM-fix-cleanup-svm_inject_event.patch
+  5b5040c3-cpupools-fix-state-when-downing-a-CPU-failed.patch
+  5b5040f2-x86-AMD-distinguish-CU-from-HT.patch
+  5b505fe5-VMX-fix-find-msr-build.patch
+  5b508775-1-x86-distinguish-CPU-offlining-and-removal.patch
+  5b508775-2-x86-possibly-bring-up-all-CPUs.patch
+  5b508775-3-x86-cmdline-opt-to-avoid-use-of-secondary-HTs.patch
+  5b508ce8-VMX-dont-clobber-dr6-while-debug-state-is-lazy.patch
+  5b50df16-1-x86-xstate-use-guest-CPUID-policy.patch
+  5b50df16-2-x86-make-xstate-calculation-errors-more-obvious.patch
+  5b56feb1-hvm-Disallow-unknown-MSR_EFER-bits.patch
+  5b56feb2-spec-ctrl-Fix-the-parsing-of-xpti--on-fixed-Intel-hardware.patch
+  5b62ca93-VMX-avoid-hitting-BUG_ON.patch
+  5b6d84ac-x86-fix-improve-vlapic-read-write.patch
+  5b6d8ce2-x86-XPTI-parsing.patch
+  5b72fbbe-ARM-disable-grant-table-v2.patch
+  5b72fbbe-oxenstored-eval-order.patch
+  5b72fbbe-vtx-Fix-the-checking-for-unknown-invalid-MSR_DEBUGCTL-bits.patch
+  5b72fbbf-1-spec-ctrl-Calculate-safe-PTE-addresses-for-L1TF-mitigations.patch
+  
5b72fbbf-2-spec-ctrl-Introduce-an-option-to-control-L1TF-mitigation-for-PV-guests.patch
+  5b72fbbf-3-shadow-Infrastructure-to-force-a-PV-guest-into-shadow-mode.patch
+  5b72fbbf-4-mm-Plumbing-to-allow-any-PTE-update-to-fail-with--ERESTART.patch
+  
5b72fbbf-5-pv-Force-a-guest-into-shadow-mode-when-it-writes-an-L1TF-vulnerable-PTE.patch
+  5b72fbbf-6-spec-ctrl-CPUID-MSR-definitions-for-L1D_FLUSH.patch
+  5b72fbbf-7-msr-Virtualise-MSR_FLUSH_CMD-for-guests.patch
+  
5b72fbbf-8-spec-ctrl-Introduce-an-option-to-control-L1D_FLUSH-for-HVM-HAP-guests.patch
+  5b72fbbf-x86-Make-spec-ctrl-no-a-global-disable-of-all-mitigations.patch
+  5b72fbbf-xl.conf-Add-global-affinity-masks.patch
+  5b74190e-x86-hvm-ioreq-MMIO-range-check-honor-DF.patch
+  5b752762-x86-hvm-emul-rep-IO-should-not-cross-GFN-boundaries.patch
+  5b75afef-x86-setup-avoid-OoB-E820-lookup.patch
+  5b76b780-rangeset-inquiry-functions-tolerate-NULL.patch
+  5b83c654-VT-d-dmar-iommu-mem-leak-fix.patch
+  5b8d5832-x86-assorted-array_index_nospec-insertions.patch
+  5ba11ed4-credit2-fix-moving-CPUs-between-cpupools.patch
+  5bacae4b-x86-boot-allocate-extra-module-slot.patch
+  5bae44ce-x86-silence-false-log-messages.patch
+  5bb60c12-x86-split-opt_xpti.patch
+  5bb60c4f-x86-split-opt_pv_l1tf.patch
+  5bb60c74-x86-fix-xpti-and-pv-l1tf.patch
+  5bcf0722-x86-boot-enable-NMIs.patch
+  5bd076e9-dombuilder-init-vcpu-debug-regs-correctly.patch
+  5bd076e9-x86-boot-init-debug-regs-correctly.patch
+  5bd076e9-x86-init-vcpu-debug-regs-correctly.patch
+  
5bd0e0cf-vvmx-Disallow-the-use-of-VT-x-instructions-when-nested-virt-is-disabled.patch
+  5bd0e11b-x86-disallow-VT-x-insns-without-nested-virt.patch
+  5bd85bfd-x86-fix-crash-on-xl-set-parameter-pcid.patch
+  5be2a308-x86-extend-get_platform_badpages.patch
+  5be2a354-x86-work-around-HLE-host-lockup-erratum.patch
+  xsa275-1.patch
+  xsa275-2.patch
+  xsa276-1.patch
+  xsa276-2.patch
+  xsa277.patch
+  xsa279.patch
+  xsa280-1.patch
+  xsa280-2.patch
+
+-------------------------------------------------------------------
@@ -52,0 +135,7 @@
+
+-------------------------------------------------------------------
+Tue Nov  6 08:33:59 MST 2018 - carn...@suse.com
+
+- bsc#1114405 - VUL-0: CVE-2018-18883: xen: Nested VT-x usable even
+  when disabled (XSA-278)
+  
5bd0e0cf-vvmx-Disallow-the-use-of-VT-x-instructions-when-nested-virt-is-disabled.patch

Old:
----
  5b34b8fe-VMX-defer-vmx_vmcs_exit-as-long-as-possible.patch
  5b3cab8e-1-VMX-MSR_DEBUGCTL-handling.patch
  5b3cab8e-2-VMX-improve-MSR-load-save-API.patch
  5b3cab8e-3-VMX-cleanup-MSR-load-save-infra.patch
  5b3cab8f-1-VMX-factor-out-locate_msr_entry.patch
  5b3cab8f-2-VMX-remote-access-to-MSR-lists.patch
  5b3cab8f-3-VMX-improve-LBR-MSR-handling.patch
  5b3cab8f-4-VMX-pass-MSR-value-into-vmx_msr_add.patch
  5b3cab8f-5-VMX-load-only-guest-MSR-entries.patch
  5b3f8fa5-port-array_index_nospec-from-Linux.patch
  5b4321f6-x86-correctly-set-nonlazy_xstate_used-when-loading-full-state.patch
  5b4488e7-x86-spec-ctrl-cmdline-handling.patch
  5b471517-page_alloc-correct-first_dirty-calc-in-block-merging.patch
  5b4c9a60-allow-cpu_down-to-be-called-earlier.patch
  5b4db308-SVM-fix-cleanup-svm_inject_event.patch
  5b5040c3-cpupools-fix-state-when-downing-a-CPU-failed.patch
  5b5040f2-x86-AMD-distinguish-CU-from-HT.patch
  5b505fe5-VMX-fix-find-msr-build.patch
  5b508775-1-x86-distinguish-CPU-offlining-and-removal.patch
  5b508775-2-x86-possibly-bring-up-all-CPUs.patch
  5b508775-3-x86-cmdline-opt-to-avoid-use-of-secondary-HTs.patch
  5b508ce8-VMX-dont-clobber-dr6-while-debug-state-is-lazy.patch
  5b50df16-1-x86-xstate-use-guest-CPUID-policy.patch
  5b50df16-2-x86-make-xstate-calculation-errors-more-obvious.patch
  5b56feb1-hvm-Disallow-unknown-MSR_EFER-bits.patch
  5b56feb2-spec-ctrl-Fix-the-parsing-of-xpti--on-fixed-Intel-hardware.patch
  5b62ca93-VMX-avoid-hitting-BUG_ON.patch
  5b6d84ac-x86-fix-improve-vlapic-read-write.patch
  5b6d8ce2-x86-XPTI-parsing.patch
  5b72fbbe-ARM-disable-grant-table-v2.patch
  5b72fbbe-oxenstored-eval-order.patch
  5b72fbbe-vtx-Fix-the-checking-for-unknown-invalid-MSR_DEBUGCTL-bits.patch
  5b72fbbf-1-spec-ctrl-Calculate-safe-PTE-addresses-for-L1TF-mitigations.patch
  
5b72fbbf-2-spec-ctrl-Introduce-an-option-to-control-L1TF-mitigation-for-PV-guests.patch
  5b72fbbf-3-shadow-Infrastructure-to-force-a-PV-guest-into-shadow-mode.patch
  5b72fbbf-4-mm-Plumbing-to-allow-any-PTE-update-to-fail-with--ERESTART.patch
  
5b72fbbf-5-pv-Force-a-guest-into-shadow-mode-when-it-writes-an-L1TF-vulnerable-PTE.patch
  5b72fbbf-6-spec-ctrl-CPUID-MSR-definitions-for-L1D_FLUSH.patch
  5b72fbbf-7-msr-Virtualise-MSR_FLUSH_CMD-for-guests.patch
  
5b72fbbf-8-spec-ctrl-Introduce-an-option-to-control-L1D_FLUSH-for-HVM-HAP-guests.patch
  5b72fbbf-x86-Make-spec-ctrl-no-a-global-disable-of-all-mitigations.patch
  5b72fbbf-xl.conf-Add-global-affinity-masks.patch
  5b74190e-x86-hvm-ioreq-MMIO-range-check-honor-DF.patch
  5b752762-x86-hvm-emul-rep-IO-should-not-cross-GFN-boundaries.patch
  5b75afef-x86-setup-avoid-OoB-E820-lookup.patch
  5b76b780-rangeset-inquiry-functions-tolerate-NULL.patch
  5b83c654-VT-d-dmar-iommu-mem-leak-fix.patch
  5b8d5832-x86-assorted-array_index_nospec-insertions.patch
  5ba11ed4-credit2-fix-moving-CPUs-between-cpupools.patch
  5bacae4b-x86-boot-allocate-extra-module-slot.patch
  5bae44ce-x86-silence-false-log-messages.patch
  5bb60c12-x86-split-opt_xpti.patch
  5bb60c4f-x86-split-opt_pv_l1tf.patch
  5bb60c74-x86-fix-xpti-and-pv-l1tf.patch
  5bcf0722-x86-boot-enable-NMIs.patch
  5bd076e9-dombuilder-init-vcpu-debug-regs-correctly.patch
  5bd076e9-x86-boot-init-debug-regs-correctly.patch
  5bd076e9-x86-init-vcpu-debug-regs-correctly.patch
  5bd0e11b-x86-disallow-VT-x-insns-without-nested-virt.patch
  5bd85bfd-x86-fix-crash-on-xl-set-parameter-pcid.patch
  5be2a308-x86-extend-get_platform_badpages.patch
  5be2a354-x86-work-around-HLE-host-lockup-erratum.patch
  xen-4.11.0-testing-src.tar.bz2
  xen.2b50cdbc444c637575580dcfa6c9525a84d5cc62.patch
  xen.b8f33431f3dd23fb43a879f4bdb4283fdc9465ad.patch
  xsa275-1.patch
  xsa275-2.patch
  xsa276-1.patch
  xsa276-2.patch
  xsa277.patch
  xsa279.patch
  xsa280-1.patch
  xsa280-2.patch

New:
----
  5b505d59-tools-xentop-replace-use-of-deprecated-vwprintw.patch
  5b76ec82-libxl-arm-Fix-build-on-arm64-acpi-w-gcc-8.2.patch
  xen-4.11.1-testing-src.tar.bz2

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ xen.spec ++++++
--- /var/tmp/diff_new_pack.JePiLb/_old  2018-12-10 12:27:06.654600548 +0100
+++ /var/tmp/diff_new_pack.JePiLb/_new  2018-12-10 12:27:06.654600548 +0100
@@ -25,7 +25,7 @@
 Name:           xen
 ExclusiveArch:  %ix86 x86_64 %arm aarch64
 %define changeset 35349
-%define xen_build_dir xen-4.11.0-testing
+%define xen_build_dir xen-4.11.1-testing
 #
 %define with_gdbsx 0
 %define with_dom0_support 0
@@ -127,12 +127,12 @@
 BuildRequires:  pesign-obs-integration
 %endif
 
-Version:        4.11.0_09
+Version:        4.11.1_02
 Release:        0
 Summary:        Xen Virtualization: Hypervisor (aka VMM aka Microkernel)
 License:        GPL-2.0
 Group:          System/Kernel
-Source0:        xen-4.11.0-testing-src.tar.bz2
+Source0:        xen-4.11.1-testing-src.tar.bz2
 Source1:        stubdom.tar.bz2
 Source5:        ipxe.tar.bz2
 Source6:        mini-os.tar.bz2
@@ -162,85 +162,15 @@
 # For xen-libs
 Source99:       baselibs.conf
 # Upstream patches
-Patch1:         5b3f8fa5-port-array_index_nospec-from-Linux.patch
-Patch2:         5b4488e7-x86-spec-ctrl-cmdline-handling.patch
-Patch3:         
5b471517-page_alloc-correct-first_dirty-calc-in-block-merging.patch
-Patch4:         5b4c9a60-allow-cpu_down-to-be-called-earlier.patch
-Patch5:         5b4db308-SVM-fix-cleanup-svm_inject_event.patch
-Patch6:         5b5040c3-cpupools-fix-state-when-downing-a-CPU-failed.patch
-Patch7:         5b5040f2-x86-AMD-distinguish-CU-from-HT.patch
-Patch8:         5b508775-1-x86-distinguish-CPU-offlining-and-removal.patch
-Patch9:         5b508775-2-x86-possibly-bring-up-all-CPUs.patch
-Patch10:        5b508775-3-x86-cmdline-opt-to-avoid-use-of-secondary-HTs.patch
-Patch11:        5b508ce8-VMX-dont-clobber-dr6-while-debug-state-is-lazy.patch
-Patch12:        5b50df16-1-x86-xstate-use-guest-CPUID-policy.patch
-Patch13:        
5b50df16-2-x86-make-xstate-calculation-errors-more-obvious.patch
-Patch14:        5b34b8fe-VMX-defer-vmx_vmcs_exit-as-long-as-possible.patch
-Patch15:        5b3cab8e-1-VMX-MSR_DEBUGCTL-handling.patch
-Patch16:        5b3cab8e-2-VMX-improve-MSR-load-save-API.patch
-Patch17:        5b3cab8e-3-VMX-cleanup-MSR-load-save-infra.patch
-Patch18:        5b3cab8f-1-VMX-factor-out-locate_msr_entry.patch
-Patch19:        5b3cab8f-2-VMX-remote-access-to-MSR-lists.patch
-Patch20:        5b3cab8f-3-VMX-improve-LBR-MSR-handling.patch
-Patch21:        5b3cab8f-4-VMX-pass-MSR-value-into-vmx_msr_add.patch
-Patch22:        5b3cab8f-5-VMX-load-only-guest-MSR-entries.patch
-Patch23:        
5b4321f6-x86-correctly-set-nonlazy_xstate_used-when-loading-full-state.patch
-Patch24:        5b505fe5-VMX-fix-find-msr-build.patch
-Patch25:        5b56feb1-hvm-Disallow-unknown-MSR_EFER-bits.patch
-Patch26:        
5b56feb2-spec-ctrl-Fix-the-parsing-of-xpti--on-fixed-Intel-hardware.patch
-Patch27:        5b62ca93-VMX-avoid-hitting-BUG_ON.patch
-Patch28:        5b6d84ac-x86-fix-improve-vlapic-read-write.patch
-Patch29:        5b6d8ce2-x86-XPTI-parsing.patch
-Patch30:        5b72fbbe-ARM-disable-grant-table-v2.patch
-Patch31:        5b72fbbe-oxenstored-eval-order.patch
-Patch32:        
5b72fbbe-vtx-Fix-the-checking-for-unknown-invalid-MSR_DEBUGCTL-bits.patch
-Patch33:        
5b72fbbf-1-spec-ctrl-Calculate-safe-PTE-addresses-for-L1TF-mitigations.patch
-Patch34:        
5b72fbbf-2-spec-ctrl-Introduce-an-option-to-control-L1TF-mitigation-for-PV-guests.patch
-Patch35:        
5b72fbbf-3-shadow-Infrastructure-to-force-a-PV-guest-into-shadow-mode.patch
-Patch36:        
5b72fbbf-4-mm-Plumbing-to-allow-any-PTE-update-to-fail-with--ERESTART.patch
-Patch37:        
5b72fbbf-5-pv-Force-a-guest-into-shadow-mode-when-it-writes-an-L1TF-vulnerable-PTE.patch
-Patch38:        5b72fbbf-6-spec-ctrl-CPUID-MSR-definitions-for-L1D_FLUSH.patch
-Patch39:        5b72fbbf-7-msr-Virtualise-MSR_FLUSH_CMD-for-guests.patch
-Patch40:        
5b72fbbf-8-spec-ctrl-Introduce-an-option-to-control-L1D_FLUSH-for-HVM-HAP-guests.patch
-Patch41:        
5b72fbbf-x86-Make-spec-ctrl-no-a-global-disable-of-all-mitigations.patch
-Patch42:        5b72fbbf-xl.conf-Add-global-affinity-masks.patch
-Patch43:        5b74190e-x86-hvm-ioreq-MMIO-range-check-honor-DF.patch
-Patch44:        
5b752762-x86-hvm-emul-rep-IO-should-not-cross-GFN-boundaries.patch
-Patch45:        5b75afef-x86-setup-avoid-OoB-E820-lookup.patch
-Patch46:        5b76b780-rangeset-inquiry-functions-tolerate-NULL.patch
-Patch47:        5b83c654-VT-d-dmar-iommu-mem-leak-fix.patch
-Patch48:        5b8d5832-x86-assorted-array_index_nospec-insertions.patch
-Patch49:        
5b8fae26-tools-libxl-correct-vcpu-affinity-output-with-sparse-physical-cpu-map.patch
-Patch50:        5b8fae26-xen-fill-topology-info-for-all-present-cpus.patch
-Patch51:        
5b8fb5af-tools-xl-refuse-to-set-number-of-vcpus-to-0-via-xl-vcpu-set.patch
-Patch52:        5b9784ad-x86-HVM-drop-hvm_fetch_from_guest_linear.patch
-Patch53:        5b9784d2-x86-HVM-add-known_gla-helper.patch
-Patch54:        5b9784f2-x86-HVM-split-page-straddling-accesses.patch
-Patch55:        5ba11ed4-credit2-fix-moving-CPUs-between-cpupools.patch
-Patch56:        5bacae4b-x86-boot-allocate-extra-module-slot.patch
-Patch57:        5bae44ce-x86-silence-false-log-messages.patch
-Patch58:        5bb60c12-x86-split-opt_xpti.patch
-Patch59:        5bb60c4f-x86-split-opt_pv_l1tf.patch
-Patch60:        5bb60c74-x86-fix-xpti-and-pv-l1tf.patch
-Patch61:        5bcf0722-x86-boot-enable-NMIs.patch
-Patch62:        5bd076e9-x86-boot-init-debug-regs-correctly.patch
-Patch63:        5bd076e9-x86-init-vcpu-debug-regs-correctly.patch
-Patch64:        5bd076e9-dombuilder-init-vcpu-debug-regs-correctly.patch
-Patch65:        5bd0e11b-x86-disallow-VT-x-insns-without-nested-virt.patch
-Patch66:        5bd85bfd-x86-fix-crash-on-xl-set-parameter-pcid.patch
-Patch67:        5bdc31d5-VMX-fix-vmx_handle_eoi.patch
-Patch68:        5be2a308-x86-extend-get_platform_badpages.patch
-Patch69:        5be2a354-x86-work-around-HLE-host-lockup-erratum.patch
-Patch70:        xsa275-1.patch
-Patch71:        xsa275-2.patch
-Patch72:        xsa276-1.patch
-Patch73:        xsa276-2.patch
-Patch74:        xsa277.patch
-Patch75:        xsa279.patch
-Patch76:        xsa280-1.patch
-Patch77:        xsa280-2.patch
-Patch78:        xen.b8f33431f3dd23fb43a879f4bdb4283fdc9465ad.patch
-Patch79:        xen.2b50cdbc444c637575580dcfa6c9525a84d5cc62.patch
+Patch1:         5b505d59-tools-xentop-replace-use-of-deprecated-vwprintw.patch
+Patch2:         5b76ec82-libxl-arm-Fix-build-on-arm64-acpi-w-gcc-8.2.patch
+Patch3:         
5b8fae26-tools-libxl-correct-vcpu-affinity-output-with-sparse-physical-cpu-map.patch
+Patch4:         5b8fae26-xen-fill-topology-info-for-all-present-cpus.patch
+Patch5:         
5b8fb5af-tools-xl-refuse-to-set-number-of-vcpus-to-0-via-xl-vcpu-set.patch
+Patch6:         5b9784ad-x86-HVM-drop-hvm_fetch_from_guest_linear.patch
+Patch7:         5b9784d2-x86-HVM-add-known_gla-helper.patch
+Patch8:         5b9784f2-x86-HVM-split-page-straddling-accesses.patch
+Patch9:         5bdc31d5-VMX-fix-vmx_handle_eoi.patch
 # Our platform specific patches
 Patch400:       xen-destdir.patch
 Patch401:       vif-bridge-no-iptables.patch
@@ -445,76 +375,6 @@
 %patch7 -p1
 %patch8 -p1
 %patch9 -p1
-%patch10 -p1
-%patch11 -p1
-%patch12 -p1
-%patch13 -p1
-%patch14 -p1
-%patch15 -p1
-%patch16 -p1
-%patch17 -p1
-%patch18 -p1
-%patch19 -p1
-%patch20 -p1
-%patch21 -p1
-%patch22 -p1
-%patch23 -p1
-%patch24 -p1
-%patch25 -p1
-%patch26 -p1
-%patch27 -p1
-%patch28 -p1
-%patch29 -p1
-%patch30 -p1
-%patch31 -p1
-%patch32 -p1
-%patch33 -p1
-%patch34 -p1
-%patch35 -p1
-%patch36 -p1
-%patch37 -p1
-%patch38 -p1
-%patch39 -p1
-%patch40 -p1
-%patch41 -p1
-%patch42 -p1
-%patch43 -p1
-%patch44 -p1
-%patch45 -p1
-%patch46 -p1
-%patch47 -p1
-%patch48 -p1
-%patch49 -p1
-%patch50 -p1
-%patch51 -p1
-%patch52 -p1
-%patch53 -p1
-%patch54 -p1
-%patch55 -p1
-%patch56 -p1
-%patch57 -p1
-%patch58 -p1
-%patch59 -p1
-%patch60 -p1
-%patch61 -p1
-%patch62 -p1
-%patch63 -p1
-%patch64 -p1
-%patch65 -p1
-%patch66 -p1
-%patch67 -p1
-%patch68 -p1
-%patch69 -p1
-%patch70 -p1
-%patch71 -p1
-%patch72 -p1
-%patch73 -p1
-%patch74 -p1
-%patch75 -p1
-%patch76 -p1
-%patch77 -p1
-%patch78 -p1
-%patch79 -p1
 # Our platform specific patches
 %patch400 -p1
 %patch401 -p1

++++++ 5b505d59-tools-xentop-replace-use-of-deprecated-vwprintw.patch ++++++
Subject: tools/xentop : replace use of deprecated vwprintw
From: Christopher Clark christopher.w.cl...@gmail.com Wed Jul 18 15:22:17 2018 
-0700
Date: Thu Jul 19 10:43:53 2018 +0100:
Git: 2b50cdbc444c637575580dcfa6c9525a84d5cc62

gcc-8.1 complains:

| xentop.c: In function 'print':
| xentop.c:304:4: error: 'vwprintw' is deprecated 
[-Werror=deprecated-declarations]
|     vwprintw(stdscr, (curses_str_t)fmt, args);
|     ^~~~~~~~

vw_printw (note the underscore) is a non-deprecated alternative.

Signed-off-by: Christopher Clark <christopher.cla...@baesystems.com>
Acked-by: Wei Liu <wei.l...@citrix.com>

diff --git a/tools/xenstat/xentop/xentop.c b/tools/xenstat/xentop/xentop.c
index 2fd2b6742e..c46581062b 100644
--- a/tools/xenstat/xentop/xentop.c
+++ b/tools/xenstat/xentop/xentop.c
@@ -301,7 +301,7 @@ static void print(const char *fmt, ...)
        if (!batch) {
                if((current_row() < lines()-1)) {
                        va_start(args, fmt);
-                       vwprintw(stdscr, (curses_str_t)fmt, args);
+                       vw_printw(stdscr, (curses_str_t)fmt, args);
                        va_end(args);
                }
        } else {
++++++ 5b76ec82-libxl-arm-Fix-build-on-arm64-acpi-w-gcc-8.2.patch ++++++
Subject: libxl/arm: Fix build on arm64 + acpi w/ gcc 8.2
From: Christopher Clark christopher.w.cl...@gmail.com Thu Aug 16 13:22:41 2018 
-0700
Date: Fri Aug 17 16:40:50 2018 +0100:
Git: b8f33431f3dd23fb43a879f4bdb4283fdc9465ad

Add zero-padding to #defined ACPI table strings that are copied.
Provides sufficient characters to satisfy the length required to
fully populate the destination and prevent array-bounds warnings.
Add BUILD_BUG_ON sizeof checks for compile-time length checking.

Signed-off-by: Christopher Clark <christopher.cla...@baesystems.com>
Reviewed-by: Stefano Stabellini <sstabell...@kernel.org>
Acked-by: Wei Liu <wei.l...@citrix.com>

Index: xen-4.11.1-testing/tools/libxl/libxl_arm_acpi.c
===================================================================
--- xen-4.11.1-testing.orig/tools/libxl/libxl_arm_acpi.c
+++ xen-4.11.1-testing/tools/libxl/libxl_arm_acpi.c
@@ -17,6 +17,7 @@
  */
 
 #include "libxl_arm.h"
+#include <xen-tools/libs.h>
 
 #include <stdint.h>
 
@@ -48,9 +49,9 @@ extern const unsigned char dsdt_anycpu_a
 _hidden
 extern const int dsdt_anycpu_arm_len;
 
-#define ACPI_OEM_ID "Xen"
-#define ACPI_OEM_TABLE_ID "ARM"
-#define ACPI_ASL_COMPILER_ID "XL"
+#define ACPI_OEM_ID "Xen\0\0"
+#define ACPI_OEM_TABLE_ID "ARM\0\0\0\0"
+#define ACPI_ASL_COMPILER_ID "XL\0"
 
 enum {
     RSDP,
@@ -190,6 +191,7 @@ static void make_acpi_rsdp(libxl__gc *gc
     struct acpi_table_rsdp *rsdp = (void *)dom->acpi_modules[0].data + offset;
 
     memcpy(rsdp->signature, "RSD PTR ", sizeof(rsdp->signature));
+    BUILD_BUG_ON(sizeof(ACPI_OEM_ID) != sizeof(rsdp->oem_id));
     memcpy(rsdp->oem_id, ACPI_OEM_ID, sizeof(rsdp->oem_id));
     rsdp->length = acpitables[RSDP].size;
     rsdp->revision = 0x02;
@@ -205,9 +207,12 @@ static void make_acpi_header(struct acpi
     memcpy(h->signature, sig, 4);
     h->length = len;
     h->revision = rev;
+    BUILD_BUG_ON(sizeof(ACPI_OEM_ID) != sizeof(h->oem_id));
     memcpy(h->oem_id, ACPI_OEM_ID, sizeof(h->oem_id));
+    BUILD_BUG_ON(sizeof(ACPI_OEM_TABLE_ID) != sizeof(h->oem_table_id));
     memcpy(h->oem_table_id, ACPI_OEM_TABLE_ID, sizeof(h->oem_table_id));
     h->oem_revision = 0;
+    BUILD_BUG_ON(sizeof(ACPI_ASL_COMPILER_ID) != sizeof(h->asl_compiler_id));
     memcpy(h->asl_compiler_id, ACPI_ASL_COMPILER_ID,
            sizeof(h->asl_compiler_id));
     h->asl_compiler_revision = 0;
++++++ xen-4.11.0-testing-src.tar.bz2 -> xen-4.11.1-testing-src.tar.bz2 ++++++
++++ 6532 lines of diff (skipped)


Reply via email to