Hello community,

here is the log from the commit of package xen for openSUSE:Factory checked in 
at 2020-06-04 17:50:22
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/xen (Old)
 and      /work/SRC/openSUSE:Factory/.xen.new.3606 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "xen"

Thu Jun  4 17:50:22 2020 rev:285 rq:808027 version:4.13.1_02

Changes:
--------
--- /work/SRC/openSUSE:Factory/xen/xen.changes  2020-05-14 23:23:55.080866217 
+0200
+++ /work/SRC/openSUSE:Factory/.xen.new.3606/xen.changes        2020-06-04 
17:50:50.619962048 +0200
@@ -1,0 +2,52 @@
+Mon May 18 10:55:26 MDT 2020 - carn...@suse.com
+
+- Update to Xen 4.13.1 bug fix release (bsc#1027519)
+  xen-4.13.1-testing-src.tar.bz2
+  5eb51be6-cpupool-fix-removing-cpu-from-pool.patch
+  5eb51caa-sched-vcpu-pause-flags-atomic.patch
+  5ec2a760-x86-determine-MXCSR-mask-always.patch
+- Drop patches contained in new tarball
+  5de65f84-gnttab-map-always-do-IOMMU-part.patch
+  5de65fc4-x86-avoid-HPET-use-on-certain-Intel.patch
+  5e15e03d-sched-fix-S3-resume-with-smt=0.patch
+  5e16fb6a-x86-clear-per-cpu-stub-page-info.patch
+  5e1da013-IRQ-u16-is-too-narrow-for-evtchn.patch
+  5e1dcedd-Arm-place-speculation-barrier-after-ERET.patch
+  5e21ce98-x86-time-update-TSC-stamp-after-deep-C-state.patch
+  5e286cce-VT-d-dont-pass-bridges-to-domain_context_mapping_one.patch
+  5e318cd4-x86-apic-fix-disabling-LVT0.patch
+  5e344c11-x86-HVM-relinquish-resources-from-domain_destroy.patch
+  5e3bd385-EFI-recheck-variable-name-strings.patch
+  5e3bd3d1-EFI-dont-leak-heap-VIA-XEN_EFI_get_next_variable_name.patch
+  5e3bd3f8-xmalloc-guard-against-overflow.patch
+  5e46e090-x86-smp-reset-x2apic_enabled-in-smp_send_stop.patch
+  5e4c00ef-VT-d-check-full-RMRR-for-E820-reserved.patch
+  5e4d4f5b-sched-fix-get_cpu_idle_time-with-core-sched.patch
+  5e4e614d-x86-spec-ctrl-no-xen-also-disables-branch-hardening.patch
+  5e4ec20e-x86-virtualise-MSR_PLATFORM_ID-properly.patch
+  5e5e7188-fix-error-path-in-cpupool_unassign_cpu_start.patch
+  5e6f53dd-AMD-IOMMU-fix-off-by-one-get_paging_mode.patch
+  5e7a371c-sched-fix-cpu-onlining-with-core-sched.patch
+  5e7c90cf-sched-fix-cpu-offlining-with-core-sched.patch
+  5e7cfb29-x86-ucode-AMD-fix-assert-in-compare_patch.patch
+  5e7cfb29-x86-ucode-fix-error-paths-in-apply_microcode.patch
+  5e7dd83b-libx86-CPUID-fix-not-just-leaf-7.patch
+  5e7dfbf6-x86-ucode-AMD-potential-buffer-overrun-equiv-tab.patch
+  5e846cce-x86-HVM-fix-AMD-ECS-handling-for-Fam10.patch
+  5e84905c-x86-ucode-AMD-fix-more-potential-buffer-overruns.patch
+  5e86f7b7-credit2-avoid-vCPUs-with-lower-creds-than-idle.patch
+  5e86f7fd-credit2-fix-credit-too-few-resets.patch
+  5e876b0f-tools-xenstore-fix-use-after-free-in-xenstored.patch
+  5e95ad61-xenoprof-clear-buffer-intended-to-be-shared-with-guests.patch
+  5e95ad8f-xenoprof-limit-consumption-of-shared-buffer-data.patch
+  5e95ae77-Add-missing-memory-barrier-in-the-unlock-path-of-rwlock.patch
+  5e95af5e-xen-gnttab-Fix-error-path-in-map_grant_ref.patch
+  5e95afb8-gnttab-fix-GNTTABOP_copy-continuation-handling.patch
+
+-------------------------------------------------------------------
+Wed May 13 21:07:29 UTC 2020 - James Fehlig <jfeh...@suse.com>
+
+- spec: Remove invocation of autogen.sh
+- spec: Recommend qemu-ovmf-x86_64 to provide UEFI firmwares
+
+-------------------------------------------------------------------

Old:
----
  5de65f84-gnttab-map-always-do-IOMMU-part.patch
  5de65fc4-x86-avoid-HPET-use-on-certain-Intel.patch
  5e15e03d-sched-fix-S3-resume-with-smt=0.patch
  5e16fb6a-x86-clear-per-cpu-stub-page-info.patch
  5e1da013-IRQ-u16-is-too-narrow-for-evtchn.patch
  5e1dcedd-Arm-place-speculation-barrier-after-ERET.patch
  5e21ce98-x86-time-update-TSC-stamp-after-deep-C-state.patch
  5e286cce-VT-d-dont-pass-bridges-to-domain_context_mapping_one.patch
  5e318cd4-x86-apic-fix-disabling-LVT0.patch
  5e344c11-x86-HVM-relinquish-resources-from-domain_destroy.patch
  5e3bd385-EFI-recheck-variable-name-strings.patch
  5e3bd3d1-EFI-dont-leak-heap-VIA-XEN_EFI_get_next_variable_name.patch
  5e3bd3f8-xmalloc-guard-against-overflow.patch
  5e46e090-x86-smp-reset-x2apic_enabled-in-smp_send_stop.patch
  5e4c00ef-VT-d-check-full-RMRR-for-E820-reserved.patch
  5e4d4f5b-sched-fix-get_cpu_idle_time-with-core-sched.patch
  5e4e614d-x86-spec-ctrl-no-xen-also-disables-branch-hardening.patch
  5e4ec20e-x86-virtualise-MSR_PLATFORM_ID-properly.patch
  5e5e7188-fix-error-path-in-cpupool_unassign_cpu_start.patch
  5e6f53dd-AMD-IOMMU-fix-off-by-one-get_paging_mode.patch
  5e7a371c-sched-fix-cpu-onlining-with-core-sched.patch
  5e7c90cf-sched-fix-cpu-offlining-with-core-sched.patch
  5e7cfb29-x86-ucode-AMD-fix-assert-in-compare_patch.patch
  5e7cfb29-x86-ucode-fix-error-paths-in-apply_microcode.patch
  5e7dd83b-libx86-CPUID-fix-not-just-leaf-7.patch
  5e7dfbf6-x86-ucode-AMD-potential-buffer-overrun-equiv-tab.patch
  5e846cce-x86-HVM-fix-AMD-ECS-handling-for-Fam10.patch
  5e84905c-x86-ucode-AMD-fix-more-potential-buffer-overruns.patch
  5e86f7b7-credit2-avoid-vCPUs-with-lower-creds-than-idle.patch
  5e86f7fd-credit2-fix-credit-too-few-resets.patch
  5e876b0f-tools-xenstore-fix-use-after-free-in-xenstored.patch
  5e95ad61-xenoprof-clear-buffer-intended-to-be-shared-with-guests.patch
  5e95ad8f-xenoprof-limit-consumption-of-shared-buffer-data.patch
  5e95ae77-Add-missing-memory-barrier-in-the-unlock-path-of-rwlock.patch
  5e95af5e-xen-gnttab-Fix-error-path-in-map_grant_ref.patch
  5e95afb8-gnttab-fix-GNTTABOP_copy-continuation-handling.patch
  xen-4.13.0-testing-src.tar.bz2

New:
----
  5eb51be6-cpupool-fix-removing-cpu-from-pool.patch
  5eb51caa-sched-vcpu-pause-flags-atomic.patch
  5ec2a760-x86-determine-MXCSR-mask-always.patch
  xen-4.13.1-testing-src.tar.bz2

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ xen.spec ++++++
--- /var/tmp/diff_new_pack.X5Vlxs/_old  2020-06-04 17:50:52.835969099 +0200
+++ /var/tmp/diff_new_pack.X5Vlxs/_new  2020-06-04 17:50:52.839969112 +0200
@@ -25,7 +25,7 @@
 Name:           xen
 ExclusiveArch:  %ix86 x86_64 aarch64
 %define changeset 40162
-%define xen_build_dir xen-4.13.0-testing
+%define xen_build_dir xen-4.13.1-testing
 #
 %define with_gdbsx 0
 %define with_dom0_support 0
@@ -70,10 +70,6 @@
 BuildRequires:  libfdt1-devel
 %endif
 %endif
-# JWF: Until Anthony's series to load BIOS via toolstack is merged,
-# autoconf is needed by autogen.sh.
-# http://lists.xenproject.org/archives/html/xen-devel/2016-03/msg01626.html
-BuildRequires:  autoconf >= 2.67
 BuildRequires:  bison
 BuildRequires:  fdupes
 %if 0%{?suse_version} > 1315
@@ -127,12 +123,12 @@
 BuildRequires:  pesign-obs-integration
 %endif
 
-Version:        4.13.0_12
+Version:        4.13.1_02
 Release:        0
 Summary:        Xen Virtualization: Hypervisor (aka VMM aka Microkernel)
 License:        GPL-2.0-only
 Group:          System/Kernel
-Source0:        xen-4.13.0-testing-src.tar.bz2
+Source0:        xen-4.13.1-testing-src.tar.bz2
 Source1:        stubdom.tar.bz2
 Source5:        ipxe.tar.bz2
 Source6:        mini-os.tar.bz2
@@ -166,42 +162,9 @@
 # For xen-libs
 Source99:       baselibs.conf
 # Upstream patches
-Patch1:         5de65f84-gnttab-map-always-do-IOMMU-part.patch
-Patch2:         5de65fc4-x86-avoid-HPET-use-on-certain-Intel.patch
-Patch3:         5e15e03d-sched-fix-S3-resume-with-smt=0.patch
-Patch4:         5e16fb6a-x86-clear-per-cpu-stub-page-info.patch
-Patch5:         5e1da013-IRQ-u16-is-too-narrow-for-evtchn.patch
-Patch6:         5e1dcedd-Arm-place-speculation-barrier-after-ERET.patch
-Patch7:         5e21ce98-x86-time-update-TSC-stamp-after-deep-C-state.patch
-Patch8:         
5e286cce-VT-d-dont-pass-bridges-to-domain_context_mapping_one.patch
-Patch9:         5e318cd4-x86-apic-fix-disabling-LVT0.patch
-Patch10:        5e344c11-x86-HVM-relinquish-resources-from-domain_destroy.patch
-Patch11:        5e3bd385-EFI-recheck-variable-name-strings.patch
-Patch12:        
5e3bd3d1-EFI-dont-leak-heap-VIA-XEN_EFI_get_next_variable_name.patch
-Patch13:        5e3bd3f8-xmalloc-guard-against-overflow.patch
-Patch14:        5e46e090-x86-smp-reset-x2apic_enabled-in-smp_send_stop.patch
-Patch15:        5e4c00ef-VT-d-check-full-RMRR-for-E820-reserved.patch
-Patch16:        5e4d4f5b-sched-fix-get_cpu_idle_time-with-core-sched.patch
-Patch17:        
5e4e614d-x86-spec-ctrl-no-xen-also-disables-branch-hardening.patch
-Patch18:        5e4ec20e-x86-virtualise-MSR_PLATFORM_ID-properly.patch
-Patch19:        5e5e7188-fix-error-path-in-cpupool_unassign_cpu_start.patch
-Patch20:        5e6f53dd-AMD-IOMMU-fix-off-by-one-get_paging_mode.patch
-Patch21:        5e7a371c-sched-fix-cpu-onlining-with-core-sched.patch
-Patch22:        5e7c90cf-sched-fix-cpu-offlining-with-core-sched.patch
-Patch23:        5e7cfb29-x86-ucode-AMD-fix-assert-in-compare_patch.patch
-Patch24:        5e7cfb29-x86-ucode-fix-error-paths-in-apply_microcode.patch
-Patch25:        5e7dd83b-libx86-CPUID-fix-not-just-leaf-7.patch
-Patch26:        5e7dfbf6-x86-ucode-AMD-potential-buffer-overrun-equiv-tab.patch
-Patch27:        5e846cce-x86-HVM-fix-AMD-ECS-handling-for-Fam10.patch
-Patch28:        5e84905c-x86-ucode-AMD-fix-more-potential-buffer-overruns.patch
-Patch29:        5e86f7b7-credit2-avoid-vCPUs-with-lower-creds-than-idle.patch
-Patch30:        5e86f7fd-credit2-fix-credit-too-few-resets.patch
-Patch31:        5e876b0f-tools-xenstore-fix-use-after-free-in-xenstored.patch
-Patch32:        
5e95ad61-xenoprof-clear-buffer-intended-to-be-shared-with-guests.patch
-Patch33:        5e95ad8f-xenoprof-limit-consumption-of-shared-buffer-data.patch
-Patch34:        
5e95ae77-Add-missing-memory-barrier-in-the-unlock-path-of-rwlock.patch
-Patch35:        5e95af5e-xen-gnttab-Fix-error-path-in-map_grant_ref.patch
-Patch36:        5e95afb8-gnttab-fix-GNTTABOP_copy-continuation-handling.patch
+Patch1:         5eb51be6-cpupool-fix-removing-cpu-from-pool.patch
+Patch2:         5eb51caa-sched-vcpu-pause-flags-atomic.patch
+Patch3:         5ec2a760-x86-determine-MXCSR-mask-always.patch
 # Our platform specific patches
 Patch400:       xen-destdir.patch
 Patch401:       vif-bridge-no-iptables.patch
@@ -297,8 +260,7 @@
 %if 0%{?suse_version} >= 1315
 Requires:       grub2-x86_64-xen
 %endif
-# Uncomment when ovmf is supported
-#Requires:       qemu-ovmf-x86_64
+Recommends:     qemu-ovmf-x86_64
 Requires:       qemu-x86
 %endif
 %ifarch %arm aarch64
@@ -431,39 +393,6 @@
 %patch1 -p1
 %patch2 -p1
 %patch3 -p1
-%patch4 -p1
-%patch5 -p1
-%patch6 -p1
-%patch7 -p1
-%patch8 -p1
-%patch9 -p1
-%patch10 -p1
-%patch11 -p1
-%patch12 -p1
-%patch13 -p1
-%patch14 -p1
-%patch15 -p1
-%patch16 -p1
-%patch17 -p1
-%patch18 -p1
-%patch19 -p1
-%patch20 -p1
-%patch21 -p1
-%patch22 -p1
-%patch23 -p1
-%patch24 -p1
-%patch25 -p1
-%patch26 -p1
-%patch27 -p1
-%patch28 -p1
-%patch29 -p1
-%patch30 -p1
-%patch31 -p1
-%patch32 -p1
-%patch33 -p1
-%patch34 -p1
-%patch35 -p1
-%patch36 -p1
 # Our platform specific patches
 %patch400 -p1
 %patch401 -p1
@@ -517,9 +446,6 @@
 
 %build
 %define _lto_cflags %{nil}
-# JWF: Anthony's series to load BIOS from toolstack requires autogen.sh.
-# http://lists.xenproject.org/archives/html/xen-devel/2016-03/msg01626.html
-./autogen.sh
 
 # we control the version info of this package
 # to gain control of filename of xen.gz

++++++ 5eb51be6-cpupool-fix-removing-cpu-from-pool.patch ++++++
# Commit 498d73647fa17d9eb7a67d2e9bdccac6b438e559
# Date 2020-05-08 10:44:22 +0200
# Author Juergen Gross <jgr...@suse.com>
# Committer Jan Beulich <jbeul...@suse.com>
cpupool: fix removing cpu from a cpupool

Commit cb563d7665f2 ("xen/sched: support core scheduling for moving
cpus to/from cpupools") introduced a regression when trying to remove
an offline cpu from a cpupool, as the system would crash in this
situation.

Fix that by testing the cpu to be online.

Fixes: cb563d7665f2 ("xen/sched: support core scheduling for moving cpus 
to/from cpupools")
Signed-off-by: Juergen Gross <jgr...@suse.com>
Acked-by: Dario Faggioli <dfaggi...@suse.com>

--- a/xen/common/cpupool.c
+++ b/xen/common/cpupool.c
@@ -519,6 +519,9 @@ static int cpupool_unassign_cpu(struct c
     debugtrace_printk("cpupool_unassign_cpu(pool=%d,cpu=%d)\n",
                       c->cpupool_id, cpu);
 
+    if ( !cpu_online(cpu) )
+        return -EINVAL;
+
     master_cpu = sched_get_resource_cpu(cpu);
     ret = cpupool_unassign_cpu_start(c, master_cpu);
     if ( ret )
++++++ 5eb51caa-sched-vcpu-pause-flags-atomic.patch ++++++
# Commit e0d92d9bd7997c6bcda17a19aba4f3957dd1a2e9
# Date 2020-05-08 10:47:38 +0200
# Author Juergen Gross <jgr...@suse.com>
# Committer Jan Beulich <jbeul...@suse.com>
sched: always modify vcpu pause flags atomically

credit2 is currently modifying the pause flags of vcpus non-atomically
via sched_set_pause_flags() and sched_clear_pause_flags(). This is
dangerous as there are cases where the paus flags are modified without
any lock held.

So drop the non-atomic pause flag modification functions and rename the
atomic ones dropping the _atomic suffix.

Fixes: a76255b4266516 ("xen/sched: make credit2 scheduler vcpu agnostic.")
Signed-off-by: Juergen Gross <jgr...@suse.com>
Reviewed-by: Dario Faggioli <dfaggi...@suse.com>

--- a/xen/common/sched_credit.c
+++ b/xen/common/sched_credit.c
@@ -452,7 +452,7 @@ static inline void __runq_tickle(struct
                     SCHED_UNIT_STAT_CRANK(cur, kicked_away);
                     SCHED_UNIT_STAT_CRANK(cur, migrate_r);
                     SCHED_STAT_CRANK(migrate_kicked_away);
-                    sched_set_pause_flags_atomic(cur->unit, _VPF_migrating);
+                    sched_set_pause_flags(cur->unit, _VPF_migrating);
                 }
                 /* Tickle cpu anyway, to let new preempt cur. */
                 SCHED_STAT_CRANK(tickled_busy_cpu);
@@ -983,7 +983,7 @@ csched_unit_acct(struct csched_private *
         {
             SCHED_UNIT_STAT_CRANK(svc, migrate_r);
             SCHED_STAT_CRANK(migrate_running);
-            sched_set_pause_flags_atomic(currunit, _VPF_migrating);
+            sched_set_pause_flags(currunit, _VPF_migrating);
             /*
              * As we are about to tickle cpu, we should clear its bit in
              * idlers. But, if we are here, it means there is someone running
--- a/xen/include/xen/sched-if.h
+++ b/xen/include/xen/sched-if.h
@@ -175,7 +175,7 @@ static inline void sched_set_pause_flags
     struct vcpu *v;
 
     for_each_sched_unit_vcpu ( unit, v )
-        __set_bit(bit, &v->pause_flags);
+        set_bit(bit, &v->pause_flags);
 }
 
 /* Clear a bit in pause_flags of all vcpus of a unit. */
@@ -184,26 +184,6 @@ static inline void sched_clear_pause_fla
 {
     struct vcpu *v;
 
-    for_each_sched_unit_vcpu ( unit, v )
-        __clear_bit(bit, &v->pause_flags);
-}
-
-/* Set a bit in pause_flags of all vcpus of a unit via atomic updates. */
-static inline void sched_set_pause_flags_atomic(struct sched_unit *unit,
-                                                unsigned int bit)
-{
-    struct vcpu *v;
-
-    for_each_sched_unit_vcpu ( unit, v )
-        set_bit(bit, &v->pause_flags);
-}
-
-/* Clear a bit in pause_flags of all vcpus of a unit via atomic updates. */
-static inline void sched_clear_pause_flags_atomic(struct sched_unit *unit,
-                                                  unsigned int bit)
-{
-    struct vcpu *v;
-
     for_each_sched_unit_vcpu ( unit, v )
         clear_bit(bit, &v->pause_flags);
 }
++++++ 5ec2a760-x86-determine-MXCSR-mask-always.patch ++++++
# Commit 2b532519d64e653a6bbfd9eefed6040a09c8876d
# Date 2020-05-18 17:18:56 +0200
# Author Jan Beulich <jbeul...@suse.com>
# Committer Jan Beulich <jbeul...@suse.com>
x86: determine MXCSR mask in all cases

For its use(s) by the emulator to be correct in all cases, the filling
of the variable needs to be independent of XSAVE availability. As
there's no suitable function in i387.c to put the logic in, keep it in
xstate_init(), arrange for the function to be called unconditionally,
and pull the logic ahead of all return paths there.

Fixes: 9a4496a35b20 ("x86emul: support {,V}{LD,ST}MXCSR")
Signed-off-by: Jan Beulich <jbeul...@suse.com>
Reviewed-by: Andrew Cooper <andrew.coop...@citrix.com>

--- a/xen/arch/x86/cpu/common.c
+++ b/xen/arch/x86/cpu/common.c
@@ -487,8 +487,7 @@ void identify_cpu(struct cpuinfo_x86 *c)
 
        /* Now the feature flags better reflect actual CPU features! */
 
-       if ( cpu_has_xsave )
-               xstate_init(c);
+       xstate_init(c);
 
 #ifdef NOISY_CAPS
        printk(KERN_DEBUG "CPU: After all inits, caps:");
--- a/xen/arch/x86/xstate.c
+++ b/xen/arch/x86/xstate.c
@@ -587,6 +587,18 @@ void xstate_init(struct cpuinfo_x86 *c)
     u32 eax, ebx, ecx, edx;
     u64 feature_mask;
 
+    if ( bsp )
+    {
+        static typeof(current->arch.xsave_area->fpu_sse) __initdata ctxt;
+
+        asm ( "fxsave %0" : "=m" (ctxt) );
+        if ( ctxt.mxcsr_mask )
+            mxcsr_mask = ctxt.mxcsr_mask;
+    }
+
+    if ( !cpu_has_xsave )
+        return;
+
     if ( (bsp && !use_xsave) ||
          boot_cpu_data.cpuid_level < XSTATE_CPUID )
     {
@@ -610,8 +622,6 @@ void xstate_init(struct cpuinfo_x86 *c)
 
     if ( bsp )
     {
-        static typeof(current->arch.xsave_area->fpu_sse) __initdata ctxt;
-
         xfeature_mask = feature_mask;
         /*
          * xsave_cntxt_size is the max size required by enabled features.
@@ -620,10 +630,6 @@ void xstate_init(struct cpuinfo_x86 *c)
         xsave_cntxt_size = _xstate_ctxt_size(feature_mask);
         printk("xstate: size: %#x and states: %#"PRIx64"\n",
                xsave_cntxt_size, xfeature_mask);
-
-        asm ( "fxsave %0" : "=m" (ctxt) );
-        if ( ctxt.mxcsr_mask )
-            mxcsr_mask = ctxt.mxcsr_mask;
     }
     else
     {
++++++ libxc.sr.superpage.patch ++++++
--- /var/tmp/diff_new_pack.X5Vlxs/_old  2020-06-04 17:50:53.067969837 +0200
+++ /var/tmp/diff_new_pack.X5Vlxs/_new  2020-06-04 17:50:53.071969850 +0200
@@ -12,10 +12,10 @@
 must be freed on the receiving side to avoid over-allocation.
 
 The existing code for x86_pv is moved unmodified into its own file.
-Index: xen-4.12.0-testing/tools/libxc/xc_dom_x86.c
+Index: xen-4.13.1-testing/tools/libxc/xc_dom_x86.c
 ===================================================================
---- xen-4.12.0-testing.orig/tools/libxc/xc_dom_x86.c
-+++ xen-4.12.0-testing/tools/libxc/xc_dom_x86.c
+--- xen-4.13.1-testing.orig/tools/libxc/xc_dom_x86.c
++++ xen-4.13.1-testing/tools/libxc/xc_dom_x86.c
 @@ -45,11 +45,6 @@
  
  #define SUPERPAGE_BATCH_SIZE 512
@@ -28,10 +28,10 @@
  #define X86_CR0_PE 0x01
  #define X86_CR0_ET 0x10
  
-Index: xen-4.12.0-testing/tools/libxc/xc_private.h
+Index: xen-4.13.1-testing/tools/libxc/xc_private.h
 ===================================================================
---- xen-4.12.0-testing.orig/tools/libxc/xc_private.h
-+++ xen-4.12.0-testing/tools/libxc/xc_private.h
+--- xen-4.13.1-testing.orig/tools/libxc/xc_private.h
++++ xen-4.13.1-testing/tools/libxc/xc_private.h
 @@ -71,6 +71,11 @@ struct iovec {
  #define DECLARE_FLASK_OP struct xen_flask_op op
  #define DECLARE_PLATFORM_OP struct xen_platform_op platform_op
@@ -44,10 +44,10 @@
  #undef PAGE_SHIFT
  #undef PAGE_SIZE
  #undef PAGE_MASK
-Index: xen-4.12.0-testing/tools/libxc/xc_sr_common.c
+Index: xen-4.13.1-testing/tools/libxc/xc_sr_common.c
 ===================================================================
---- xen-4.12.0-testing.orig/tools/libxc/xc_sr_common.c
-+++ xen-4.12.0-testing/tools/libxc/xc_sr_common.c
+--- xen-4.13.1-testing.orig/tools/libxc/xc_sr_common.c
++++ xen-4.13.1-testing/tools/libxc/xc_sr_common.c
 @@ -156,6 +156,47 @@ static void __attribute__((unused)) buil
  }
  
@@ -96,10 +96,10 @@
   * Local variables:
   * mode: C
   * c-file-style: "BSD"
-Index: xen-4.12.0-testing/tools/libxc/xc_sr_common.h
+Index: xen-4.13.1-testing/tools/libxc/xc_sr_common.h
 ===================================================================
---- xen-4.12.0-testing.orig/tools/libxc/xc_sr_common.h
-+++ xen-4.12.0-testing/tools/libxc/xc_sr_common.h
+--- xen-4.13.1-testing.orig/tools/libxc/xc_sr_common.h
++++ xen-4.13.1-testing/tools/libxc/xc_sr_common.h
 @@ -140,6 +140,16 @@ struct xc_sr_restore_ops
      int (*setup)(struct xc_sr_context *ctx);
  
@@ -247,10 +247,10 @@
  #endif
  /*
   * Local variables:
-Index: xen-4.12.0-testing/tools/libxc/xc_sr_restore.c
+Index: xen-4.13.1-testing/tools/libxc/xc_sr_restore.c
 ===================================================================
---- xen-4.12.0-testing.orig/tools/libxc/xc_sr_restore.c
-+++ xen-4.12.0-testing/tools/libxc/xc_sr_restore.c
+--- xen-4.13.1-testing.orig/tools/libxc/xc_sr_restore.c
++++ xen-4.13.1-testing/tools/libxc/xc_sr_restore.c
 @@ -69,132 +69,6 @@ static int read_headers(struct xc_sr_con
  }
  
@@ -428,10 +428,10 @@
  
      if ( ctx.dominfo.hvm )
      {
-Index: xen-4.12.0-testing/tools/libxc/xc_sr_restore_x86_hvm.c
+Index: xen-4.13.1-testing/tools/libxc/xc_sr_restore_x86_hvm.c
 ===================================================================
---- xen-4.12.0-testing.orig/tools/libxc/xc_sr_restore_x86_hvm.c
-+++ xen-4.12.0-testing/tools/libxc/xc_sr_restore_x86_hvm.c
+--- xen-4.13.1-testing.orig/tools/libxc/xc_sr_restore_x86_hvm.c
++++ xen-4.13.1-testing/tools/libxc/xc_sr_restore_x86_hvm.c
 @@ -135,6 +135,8 @@ static int x86_hvm_localise_page(struct
  static int x86_hvm_setup(struct xc_sr_context *ctx)
  {
@@ -806,11 +806,11 @@
      .process_record  = x86_hvm_process_record,
      .stream_complete = x86_hvm_stream_complete,
      .cleanup         = x86_hvm_cleanup,
-Index: xen-4.12.0-testing/tools/libxc/xc_sr_restore_x86_pv.c
+Index: xen-4.13.1-testing/tools/libxc/xc_sr_restore_x86_pv.c
 ===================================================================
---- xen-4.12.0-testing.orig/tools/libxc/xc_sr_restore_x86_pv.c
-+++ xen-4.12.0-testing/tools/libxc/xc_sr_restore_x86_pv.c
-@@ -938,6 +938,75 @@ static void x86_pv_set_gfn(struct xc_sr_
+--- xen-4.13.1-testing.orig/tools/libxc/xc_sr_restore_x86_pv.c
++++ xen-4.13.1-testing/tools/libxc/xc_sr_restore_x86_pv.c
+@@ -960,6 +960,75 @@ static void x86_pv_set_gfn(struct xc_sr_
  }
  
  /*
@@ -886,7 +886,7 @@
   * restore_ops function.  Convert pfns back to mfns in pagetables.  Possibly
   * needs to populate new frames if a PTE is found referring to a frame which
   * hasn't yet been seen from PAGE_DATA records.
-@@ -981,7 +1050,7 @@ static int x86_pv_localise_page(struct x
+@@ -1003,7 +1072,7 @@ static int x86_pv_localise_page(struct x
          }
      }
  
@@ -895,7 +895,7 @@
          return -1;
  
      for ( i = 0; i < (PAGE_SIZE / sizeof(uint64_t)); ++i )
-@@ -1161,6 +1230,7 @@ struct xc_sr_restore_ops restore_ops_x86
+@@ -1183,6 +1252,7 @@ struct xc_sr_restore_ops restore_ops_x86
      .set_gfn         = x86_pv_set_gfn,
      .localise_page   = x86_pv_localise_page,
      .setup           = x86_pv_setup,

++++++ libxl.libxl__domain_pvcontrol.patch ++++++
--- /var/tmp/diff_new_pack.X5Vlxs/_old  2020-06-04 17:50:53.087969901 +0200
+++ /var/tmp/diff_new_pack.X5Vlxs/_new  2020-06-04 17:50:53.087969901 +0200
@@ -11,18 +11,11 @@
  tools/libxl/libxl_domain.c | 3 +++
  1 file changed, 3 insertions(+)
 
---- a/tools/libxl/libxl_domain.c
-+++ b/tools/libxl/libxl_domain.c
-@@ -765,24 +765,27 @@ char * libxl__domain_pvcontrol_read(libxl__gc *gc, 
xs_transaction_t t,
- 
- int libxl__domain_pvcontrol(libxl__egc *egc, libxl__xswait_state *pvcontrol,
-                             domid_t domid, const char *cmd)
- {
-     STATE_AO_GC(pvcontrol->ao);
-     const char *shutdown_path;
-     int rc;
- 
-     rc = libxl__domain_pvcontrol_available(gc, domid);
+Index: xen-4.13.1-testing/tools/libxl/libxl_domain.c
+===================================================================
+--- xen-4.13.1-testing.orig/tools/libxl/libxl_domain.c
++++ xen-4.13.1-testing/tools/libxl/libxl_domain.c
+@@ -795,6 +795,9 @@ int libxl__domain_pvcontrol(libxl__egc *
      if (rc < 0)
          return rc;
  
@@ -32,12 +25,3 @@
      shutdown_path = libxl__domain_pvcontrol_xspath(gc, domid);
      if (!shutdown_path)
          return ERROR_FAIL;
- 
-     rc = libxl__xs_printf(gc, XBT_NULL, shutdown_path, "%s", cmd);
-     if (rc)
-         return rc;
- 
-     pvcontrol->path = shutdown_path;
-     pvcontrol->what = GCSPRINTF("guest acknowledgement of %s request", cmd);
-     pvcontrol->timeout_ms = 60 * 1000;
-     rc = libxl__xswait_start(gc, pvcontrol);

++++++ xen-4.13.0-testing-src.tar.bz2 -> xen-4.13.1-testing-src.tar.bz2 ++++++
++++ 4421 lines of diff (skipped)

++++++ xen.bug1026236.suse_vtsc_tolerance.patch ++++++
--- /var/tmp/diff_new_pack.X5Vlxs/_old  2020-06-04 17:50:57.023982425 +0200
+++ /var/tmp/diff_new_pack.X5Vlxs/_new  2020-06-04 17:50:57.027982438 +0200
@@ -8,8 +8,10 @@
 the hostadmin to decide how much tolerance all running domUs can
 actually handle. The default is zero tolerance.
 
---- a/xen/arch/x86/time.c
-+++ b/xen/arch/x86/time.c
+Index: xen-4.13.1-testing/xen/arch/x86/time.c
+===================================================================
+--- xen-4.13.1-testing.orig/xen/arch/x86/time.c
++++ xen-4.13.1-testing/xen/arch/x86/time.c
 @@ -43,6 +43,9 @@
  static char __initdata opt_clocksource[10];
  string_param("clocksource", opt_clocksource);
@@ -20,7 +22,7 @@
  unsigned long __read_mostly cpu_khz;  /* CPU clock frequency in kHz. */
  DEFINE_SPINLOCK(rtc_lock);
  unsigned long pit0_ticks;
-@@ -2229,6 +2232,7 @@ int tsc_set_info(struct domain *d,
+@@ -2230,6 +2233,7 @@ int tsc_set_info(struct domain *d,
  
      switch ( tsc_mode )
      {
@@ -28,7 +30,7 @@
      case TSC_MODE_DEFAULT:
      case TSC_MODE_ALWAYS_EMULATE:
          d->arch.vtsc_offset = get_s_time() - elapsed_nsec;
-@@ -2242,8 +2246,26 @@ int tsc_set_info(struct domain *d,
+@@ -2243,8 +2247,26 @@ int tsc_set_info(struct domain *d,
           * When a guest is created, gtsc_khz is passed in as zero, making
           * d->arch.tsc_khz == cpu_khz. Thus no need to check incarnation.
           */

++++++ xen.build-compare.doc_html.patch ++++++
--- /var/tmp/diff_new_pack.X5Vlxs/_old  2020-06-04 17:50:57.035982464 +0200
+++ /var/tmp/diff_new_pack.X5Vlxs/_new  2020-06-04 17:50:57.039982476 +0200
@@ -5,11 +5,11 @@
  docs/Makefile |    6 +++---
  1 file changed, 3 insertions(+), 3 deletions(-)
 
-Index: xen-4.13.0-testing/docs/Makefile
+Index: xen-4.13.1-testing/docs/Makefile
 ===================================================================
---- xen-4.13.0-testing.orig/docs/Makefile
-+++ xen-4.13.0-testing/docs/Makefile
-@@ -188,7 +188,7 @@ uninstall: uninstall-man-pages uninstall
+--- xen-4.13.1-testing.orig/docs/Makefile
++++ xen-4.13.1-testing/docs/Makefile
+@@ -191,7 +191,7 @@ uninstall: uninstall-man-pages uninstall
  
  # Individual file build targets
  html/index.html: $(DOC_HTML) $(CURDIR)/gen-html-index INDEX
@@ -18,7 +18,7 @@
  
  html/%.txt: %.txt
        @$(INSTALL_DIR) $(@D)
-@@ -203,8 +203,8 @@ html/hypercall/%/index.html: $(CURDIR)/x
+@@ -206,8 +206,8 @@ html/hypercall/%/index.html: $(CURDIR)/x
        $(INSTALL_DIR) $(@D)
        $(PERL) -w $(CURDIR)/xen-headers -O $(@D) \
                -T 'arch-$* - Xen public headers' \


Reply via email to