commit xen for openSUSE:Leap:15.2:Update

2020-10-30 Thread root
Hello community,

here is the log from the commit of package xen for openSUSE:Leap:15.2:Update 
checked in at 2020-10-31 00:23:25

Comparing /work/SRC/openSUSE:Leap:15.2:Update/xen (Old)
 and  /work/SRC/openSUSE:Leap:15.2:Update/.xen.new.3463 (New)


Package is "xen"

Sat Oct 31 00:23:25 2020 rev:4 rq:844482 version:unknown

Changes:

New Changes file:

NO CHANGES FILE!!!



Other differences:
--
++ _link ++
--- /var/tmp/diff_new_pack.llkN8G/_old  2020-10-31 00:23:34.807629301 +0100
+++ /var/tmp/diff_new_pack.llkN8G/_new  2020-10-31 00:23:34.807629301 +0100
@@ -1 +1 @@
-
+




commit xen for openSUSE:Leap:15.2:Update

2020-10-03 Thread root
Hello community,

here is the log from the commit of package xen for openSUSE:Leap:15.2:Update 
checked in at 2020-10-04 06:23:33

Comparing /work/SRC/openSUSE:Leap:15.2:Update/xen (Old)
 and  /work/SRC/openSUSE:Leap:15.2:Update/.xen.new.4249 (New)


Package is "xen"

Sun Oct  4 06:23:33 2020 rev:3 rq:838858 version:unknown

Changes:

New Changes file:

NO CHANGES FILE!!!



Other differences:
--
++ _link ++
--- /var/tmp/diff_new_pack.O3gFn0/_old  2020-10-04 06:23:43.631356048 +0200
+++ /var/tmp/diff_new_pack.O3gFn0/_new  2020-10-04 06:23:43.631356048 +0200
@@ -1 +1 @@
-
+




commit xen for openSUSE:Leap:15.2:Update

2020-08-12 Thread root
Hello community,

here is the log from the commit of package xen for openSUSE:Leap:15.2:Update 
checked in at 2020-08-12 12:23:40

Comparing /work/SRC/openSUSE:Leap:15.2:Update/xen (Old)
 and  /work/SRC/openSUSE:Leap:15.2:Update/.xen.new.3399 (New)


Package is "xen"

Wed Aug 12 12:23:40 2020 rev:2 rq:824768 version:unknown

Changes:

New Changes file:

NO CHANGES FILE!!!



Other differences:
--
++ _link ++
--- /var/tmp/diff_new_pack.nm2MTd/_old  2020-08-12 12:27:10.156137860 +0200
+++ /var/tmp/diff_new_pack.nm2MTd/_new  2020-08-12 12:27:10.156137860 +0200
@@ -1 +1 @@
-
+




commit xen for openSUSE:Leap:15.2

2020-06-10 Thread root
Hello community,

here is the log from the commit of package xen for openSUSE:Leap:15.2 checked 
in at 2020-06-10 16:49:50

Comparing /work/SRC/openSUSE:Leap:15.2/xen (Old)
 and  /work/SRC/openSUSE:Leap:15.2/.xen.new.3606 (New)


Package is "xen"

Wed Jun 10 16:49:50 2020 rev:86 rq:813020 version:4.13.1_02

Changes:

--- /work/SRC/openSUSE:Leap:15.2/xen/xen.changes2020-04-21 
19:08:03.992055245 +0200
+++ /work/SRC/openSUSE:Leap:15.2/.xen.new.3606/xen.changes  2020-06-10 
16:49:53.724357469 +0200
@@ -1,0 +2,66 @@
+Thu May 28 08:35:20 MDT 2020 - carn...@suse.com
+
+- bsc#1172205 - VUL-0: CVE-2020-0543: xen: Special Register Buffer
+  Data Sampling (SRBDS) aka "CrossTalk" (XSA-320)
+  xsa320-1.patch
+  xsa320-2.patch
+
+---
+Mon May 18 10:55:26 MDT 2020 - carn...@suse.com
+
+- Update to Xen 4.13.1 bug fix release (bsc#1027519)
+  xen-4.13.1-testing-src.tar.bz2
+  5eb51be6-cpupool-fix-removing-cpu-from-pool.patch
+  5eb51caa-sched-vcpu-pause-flags-atomic.patch
+  5ec2a760-x86-determine-MXCSR-mask-always.patch
+- Drop patches contained in new tarball
+  5de65f84-gnttab-map-always-do-IOMMU-part.patch
+  5de65fc4-x86-avoid-HPET-use-on-certain-Intel.patch
+  5e15e03d-sched-fix-S3-resume-with-smt=0.patch
+  5e16fb6a-x86-clear-per-cpu-stub-page-info.patch
+  5e1da013-IRQ-u16-is-too-narrow-for-evtchn.patch
+  5e1dcedd-Arm-place-speculation-barrier-after-ERET.patch
+  5e21ce98-x86-time-update-TSC-stamp-after-deep-C-state.patch
+  5e286cce-VT-d-dont-pass-bridges-to-domain_context_mapping_one.patch
+  5e318cd4-x86-apic-fix-disabling-LVT0.patch
+  5e344c11-x86-HVM-relinquish-resources-from-domain_destroy.patch
+  5e3bd385-EFI-recheck-variable-name-strings.patch
+  5e3bd3d1-EFI-dont-leak-heap-VIA-XEN_EFI_get_next_variable_name.patch
+  5e3bd3f8-xmalloc-guard-against-overflow.patch
+  5e46e090-x86-smp-reset-x2apic_enabled-in-smp_send_stop.patch
+  5e4c00ef-VT-d-check-full-RMRR-for-E820-reserved.patch
+  5e4d4f5b-sched-fix-get_cpu_idle_time-with-core-sched.patch
+  5e4e614d-x86-spec-ctrl-no-xen-also-disables-branch-hardening.patch
+  5e4ec20e-x86-virtualise-MSR_PLATFORM_ID-properly.patch
+  5e5e7188-fix-error-path-in-cpupool_unassign_cpu_start.patch
+  5e6f53dd-AMD-IOMMU-fix-off-by-one-get_paging_mode.patch
+  5e7a371c-sched-fix-cpu-onlining-with-core-sched.patch
+  5e7c90cf-sched-fix-cpu-offlining-with-core-sched.patch
+  5e7cfb29-x86-ucode-AMD-fix-assert-in-compare_patch.patch
+  5e7cfb29-x86-ucode-fix-error-paths-in-apply_microcode.patch
+  5e7dd83b-libx86-CPUID-fix-not-just-leaf-7.patch
+  5e7dfbf6-x86-ucode-AMD-potential-buffer-overrun-equiv-tab.patch
+  5e846cce-x86-HVM-fix-AMD-ECS-handling-for-Fam10.patch
+  5e84905c-x86-ucode-AMD-fix-more-potential-buffer-overruns.patch
+  5e86f7b7-credit2-avoid-vCPUs-with-lower-creds-than-idle.patch
+  5e86f7fd-credit2-fix-credit-too-few-resets.patch
+  5e876b0f-tools-xenstore-fix-use-after-free-in-xenstored.patch
+  5e95ad61-xenoprof-clear-buffer-intended-to-be-shared-with-guests.patch
+  5e95ad8f-xenoprof-limit-consumption-of-shared-buffer-data.patch
+  5e95ae77-Add-missing-memory-barrier-in-the-unlock-path-of-rwlock.patch
+  5e95af5e-xen-gnttab-Fix-error-path-in-map_grant_ref.patch
+  5e95afb8-gnttab-fix-GNTTABOP_copy-continuation-handling.patch
+
+---
+Wed May 13 21:07:29 UTC 2020 - James Fehlig 
+
+- spec: Remove invocation of autogen.sh
+- spec: Recommend qemu-ovmf-x86_64 to provide UEFI firmwares
+
+---
+Wed May 13 09:56:49 MDT 2020 - carn...@suse.com
+
+- bsc#1170968 - GCC 10: xen build fails on i586
+  gcc10-fixes.patch
+
+---
@@ -43,0 +110,7 @@
+
+---
+Wed Mar 25 18:18:18 UTC 2020 - oher...@suse.de
+
+- bsc#1167608 - unbound limit for max_event_channels
+  domUs with many vcpus and/or resources fail to start
+  libxl.max_event_channels.patch

Old:

  5de65f84-gnttab-map-always-do-IOMMU-part.patch
  5de65fc4-x86-avoid-HPET-use-on-certain-Intel.patch
  5e15e03d-sched-fix-S3-resume-with-smt=0.patch
  5e16fb6a-x86-clear-per-cpu-stub-page-info.patch
  5e1da013-IRQ-u16-is-too-narrow-for-evtchn.patch
  5e1dcedd-Arm-place-speculation-barrier-after-ERET.patch
  5e21ce98-x86-time-update-TSC-stamp-after-deep-C-state.patch
  5e286cce-VT-d-dont-pass-bridges-to-domain_context_mapping_one.patch
  5e318cd4-x86-apic-fix-disabling-LVT0.patch
  5e344c11-x86-HVM-relinquish-resources-from-domain_destroy.patch
  5e3bd385-EFI-recheck-variable-name-strings.patch
  5e3bd3d1-EFI-dont-leak-heap-VIA-XEN_EFI_get_next_variable_name.patch
  5e3bd3f8-xmalloc-guard-against-overflow.patch
  

commit xen for openSUSE:Leap:15.2

2020-04-21 Thread root
Hello community,

here is the log from the commit of package xen for openSUSE:Leap:15.2 checked 
in at 2020-04-21 19:06:36

Comparing /work/SRC/openSUSE:Leap:15.2/xen (Old)
 and  /work/SRC/openSUSE:Leap:15.2/.xen.new.2738 (New)


Package is "xen"

Tue Apr 21 19:06:36 2020 rev:85 rq:795132 version:4.13.0_12

Changes:

--- /work/SRC/openSUSE:Leap:15.2/xen/xen.changes2020-03-31 
07:21:35.758377870 +0200
+++ /work/SRC/openSUSE:Leap:15.2/.xen.new.2738/xen.changes  2020-04-21 
19:08:03.992055245 +0200
@@ -1,0 +2,44 @@
+Tue Apr 14 11:06:08 MDT 2020 - carn...@suse.com
+
+- bsc#1169392 - VUL-0: CVE-2020-11742: xen: Bad continuation
+  handling in GNTTABOP_copy (XSA-318)
+  5e95afb8-gnttab-fix-GNTTABOP_copy-continuation-handling.patch
+
+---
+Mon Apr  6 12:01:45 MDT 2020 - carn...@suse.com
+
+- bsc#1168140 - VUL-0: CVE-2020-11740, CVE-2020-11741: xen: XSA-313
+  multiple xenoprof issues
+  5e95ad61-xenoprof-clear-buffer-intended-to-be-shared-with-guests.patch
+  5e95ad8f-xenoprof-limit-consumption-of-shared-buffer-data.patch
+- bsc#1168142 - VUL-0: CVE-2020-11739: xen: XSA-314 - Missing
+  memory barriers in read-write unlock paths
+  5e95ae77-Add-missing-memory-barrier-in-the-unlock-path-of-rwlock.patch
+- bsc#1168143 - VUL-0: CVE-2020-11743: xen: XSA-316 - Bad error
+  path in GNTTABOP_map_grant
+  5e95af5e-xen-gnttab-Fix-error-path-in-map_grant_ref.patch
+- bsc#1167152 - L3: Xenstored Crashed during VM install Need Core
+  analyzed
+  5e876b0f-tools-xenstore-fix-use-after-free-in-xenstored.patch
+- bsc#1165206 - Xen 4.12 DomU hang / freeze / stall / NMI watchdog
+  bug soft lockup CPU #0 stuck under high load / upstream with
+  workaround. See also bsc#1134506
+  5e86f7b7-credit2-avoid-vCPUs-with-lower-creds-than-idle.patch
+  5e86f7fd-credit2-fix-credit-too-few-resets.patch
+- Drop for upstream solution (bsc#1165206)
+  01-xen-credit2-avoid-vcpus-to.patch
+  default-to-credit1-scheduler.patch
+- Upstream bug fixes (bsc#1027519)
+  5e4ec20e-x86-virtualise-MSR_PLATFORM_ID-properly.patch
+  5e5e7188-fix-error-path-in-cpupool_unassign_cpu_start.patch
+  5e6f53dd-AMD-IOMMU-fix-off-by-one-get_paging_mode.patch
+  5e7a371c-sched-fix-cpu-onlining-with-core-sched.patch
+  5e7c90cf-sched-fix-cpu-offlining-with-core-sched.patch
+  5e7cfb29-x86-ucode-AMD-fix-assert-in-compare_patch.patch
+  5e7cfb29-x86-ucode-fix-error-paths-in-apply_microcode.patch
+  5e7dd83b-libx86-CPUID-fix-not-just-leaf-7.patch
+  5e7dfbf6-x86-ucode-AMD-potential-buffer-overrun-equiv-tab.patch
+  5e846cce-x86-HVM-fix-AMD-ECS-handling-for-Fam10.patch
+  5e84905c-x86-ucode-AMD-fix-more-potential-buffer-overruns.patch
+
+---

Old:

  01-xen-credit2-avoid-vcpus-to.patch
  default-to-credit1-scheduler.patch

New:

  5e4ec20e-x86-virtualise-MSR_PLATFORM_ID-properly.patch
  5e5e7188-fix-error-path-in-cpupool_unassign_cpu_start.patch
  5e6f53dd-AMD-IOMMU-fix-off-by-one-get_paging_mode.patch
  5e7a371c-sched-fix-cpu-onlining-with-core-sched.patch
  5e7c90cf-sched-fix-cpu-offlining-with-core-sched.patch
  5e7cfb29-x86-ucode-AMD-fix-assert-in-compare_patch.patch
  5e7cfb29-x86-ucode-fix-error-paths-in-apply_microcode.patch
  5e7dd83b-libx86-CPUID-fix-not-just-leaf-7.patch
  5e7dfbf6-x86-ucode-AMD-potential-buffer-overrun-equiv-tab.patch
  5e846cce-x86-HVM-fix-AMD-ECS-handling-for-Fam10.patch
  5e84905c-x86-ucode-AMD-fix-more-potential-buffer-overruns.patch
  5e86f7b7-credit2-avoid-vCPUs-with-lower-creds-than-idle.patch
  5e86f7fd-credit2-fix-credit-too-few-resets.patch
  5e876b0f-tools-xenstore-fix-use-after-free-in-xenstored.patch
  5e95ad61-xenoprof-clear-buffer-intended-to-be-shared-with-guests.patch
  5e95ad8f-xenoprof-limit-consumption-of-shared-buffer-data.patch
  5e95ae77-Add-missing-memory-barrier-in-the-unlock-path-of-rwlock.patch
  5e95af5e-xen-gnttab-Fix-error-path-in-map_grant_ref.patch
  5e95afb8-gnttab-fix-GNTTABOP_copy-continuation-handling.patch



Other differences:
--
++ xen.spec ++
--- /var/tmp/diff_new_pack.fJyATU/_old  2020-04-21 19:08:06.032059398 +0200
+++ /var/tmp/diff_new_pack.fJyATU/_new  2020-04-21 19:08:06.036059407 +0200
@@ -1,7 +1,7 @@
 #
 # spec file for package xen
 #
-# Copyright (c) 2020 SUSE LLC
+# Copyright (c) 2020 SUSE LINUX GmbH, Nuernberg, Germany.
 #
 # All modifications and additions to the file contributed by third parties
 # remain the property of their copyright owners, unless otherwise agreed
@@ -127,7 +127,7 @@
 BuildRequires:  pesign-obs-integration
 %endif
 
-Version:4.13.0_11
+Version:4.13.0_12
 Release:0
 Summary:Xen Virtualization: Hypervisor (aka VMM aka Microkernel)
 License:

commit xen for openSUSE:Leap:15.2

2020-03-30 Thread root
Hello community,

here is the log from the commit of package xen for openSUSE:Leap:15.2 checked 
in at 2020-03-31 07:21:34

Comparing /work/SRC/openSUSE:Leap:15.2/xen (Old)
 and  /work/SRC/openSUSE:Leap:15.2/.xen.new.3160 (New)


Package is "xen"

Tue Mar 31 07:21:34 2020 rev:84 rq:789168 version:4.13.0_11

Changes:

--- /work/SRC/openSUSE:Leap:15.2/xen/xen.changes2020-03-15 
07:11:22.688963962 +0100
+++ /work/SRC/openSUSE:Leap:15.2/.xen.new.3160/xen.changes  2020-03-31 
07:21:35.758377870 +0200
@@ -1,0 +2,14 @@
+Wed Mar 18 17:00:34 UTC 2020 - oher...@suse.de
+
+- bsc#1161480 - Fix xl shutdown for HVM without PV drivers
+  add libxl.libxl__domain_pvcontrol.patch
+
+---
+Thu Mar 12 07:57:53 MDT 2020 - carn...@suse.com
+
+- bsc#1165206 - Xen 4.12 DomU hang / freeze / stall / NMI watchdog
+  bug soft lockup CPU #0 stuck under high load / upstream with
+  workaround. See also bsc#1134506
+  01-xen-credit2-avoid-vcpus-to.patch
+
+---

New:

  01-xen-credit2-avoid-vcpus-to.patch
  libxl.libxl__domain_pvcontrol.patch



Other differences:
--
++ xen.spec ++
--- /var/tmp/diff_new_pack.spoBt7/_old  2020-03-31 07:21:43.026381025 +0200
+++ /var/tmp/diff_new_pack.spoBt7/_new  2020-03-31 07:21:43.030381027 +0200
@@ -1,7 +1,7 @@
 #
 # spec file for package xen
 #
-# Copyright (c) 2020 SUSE LINUX GmbH, Nuernberg, Germany.
+# Copyright (c) 2020 SUSE LLC
 #
 # All modifications and additions to the file contributed by third parties
 # remain the property of their copyright owners, unless otherwise agreed
@@ -127,7 +127,7 @@
 BuildRequires:  pesign-obs-integration
 %endif
 
-Version:4.13.0_10
+Version:4.13.0_11
 Release:0
 Summary:Xen Virtualization: Hypervisor (aka VMM aka Microkernel)
 License:GPL-2.0-only
@@ -200,6 +200,7 @@
 Patch422:   stubdom-have-iovec.patch
 Patch423:   vif-route.patch
 Patch424:   gcc10-fixes.patch
+Patch425:   01-xen-credit2-avoid-vcpus-to.patch
 # Other bug fixes or features
 Patch451:   xenconsole-no-multiple-connections.patch
 Patch452:   hibernate.patch
@@ -216,6 +217,7 @@
 Patch465:   xen.libxl.dmmd.patch
 Patch466:   libxl.set-migration-constraints-from-cmdline.patch
 Patch467:   xenstore-run-in-studomain.patch
+Patch468:   libxl.libxl__domain_pvcontrol.patch
 Patch469:   libxl.helper_done-crash.patch
 Patch470:   libxl.LIBXL_HOTPLUG_TIMEOUT.patch
 # python3 conversion patches
@@ -443,6 +445,7 @@
 %patch422 -p1
 %patch423 -p1
 %patch424 -p1
+%patch425 -p1
 # Other bug fixes or features
 %patch451 -p1
 %patch452 -p1
@@ -459,6 +462,7 @@
 %patch465 -p1
 %patch466 -p1
 %patch467 -p1
+%patch468 -p1
 %patch469 -p1
 %patch470 -p1
 # python3 conversion patches

++ 01-xen-credit2-avoid-vcpus-to.patch ++
commit 149b5880db78648318b23623c93c6e4f91ad1e87
Author: Dario Faggioli 
Date:   Wed Mar 11 19:13:59 2020 +0100

xen: credit2: avoid vCPUs to ever reach lower credits than idle

There have been report of stalls of guest vCPUs, when Credit2 was used.
It seemed like these vCPUs were not getting scheduled for very long
time, even under light load conditions (e.g., during dom0 boot).

Investigations led to the discovery that --although rarely-- it can
happen that a vCPU manages to run for very long timeslices. In Credit2,
this means that, when runtime accounting happens, the vCPU will lose a
large quantity of credits. This in turn may lead to the vCPU having less
credits than the idle vCPUs (-2^30). At this point, the scheduler will
pick the idle vCPU, instead of the ready to run vCPU, for a few
"epochs", which often times is enough for the guest kernel to think the
vCPU is not responding and crashing.

An example of this situation is shown here. In fact, we can see d0v1
sitting in the runqueue while all the CPUs are idle, as it has
-1254238270 credits, which is smaller than -2^30 = −1073741824:

(XEN) Runqueue 0:
(XEN)   ncpus  = 28
(XEN)   cpus   = 0-27
(XEN)   max_weight = 256
(XEN)   pick_bias  = 22
(XEN)   instload   = 1
(XEN)   aveload= 293391 (~111%)
(XEN)   idlers: 00,,,,,,0fff
(XEN)   tickled: 
00,,,,,,
(XEN)   fully idle cores: 
00,,,,,,0fff
[...]
(XEN) Runqueue 0:
(XEN) CPU[00] runq=0, sibling=00,..., core=00,...
(XEN) CPU[01] runq=0, 

commit xen for openSUSE:Leap:15.2

2020-03-15 Thread root
Hello community,

here is the log from the commit of package xen for openSUSE:Leap:15.2 checked 
in at 2020-03-15 07:11:06

Comparing /work/SRC/openSUSE:Leap:15.2/xen (Old)
 and  /work/SRC/openSUSE:Leap:15.2/.xen.new.3160 (New)


Package is "xen"

Sun Mar 15 07:11:06 2020 rev:83 rq:784266 version:4.13.0_10

Changes:

--- /work/SRC/openSUSE:Leap:15.2/xen/xen.changes2020-03-01 
08:51:36.397301028 +0100
+++ /work/SRC/openSUSE:Leap:15.2/.xen.new.3160/xen.changes  2020-03-15 
07:11:22.688963962 +0100
@@ -1,0 +2,14 @@
+Tue Mar 10 07:41:34 MDT 2020 - carn...@suse.com
+
+- bsc#1158414 - GCC 10: xen build fails
+  gcc10-fixes.patch
+
+---
+Wed Mar  4 13:28:17 MST 2020 - carn...@suse.com
+
+- bsc#1165206 - Xen 4.12 DomU hang / freeze / stall / NMI watchdog
+  bug soft lockup CPU #0 stuck under high load / upstream with
+  workaround. See also bsc#1134506
+  default-to-credit1-scheduler.patch
+
+---

New:

  default-to-credit1-scheduler.patch
  gcc10-fixes.patch



Other differences:
--
++ xen.spec ++
--- /var/tmp/diff_new_pack.Z8Wee2/_old  2020-03-15 07:11:26.616966313 +0100
+++ /var/tmp/diff_new_pack.Z8Wee2/_new  2020-03-15 07:11:26.620966316 +0100
@@ -127,7 +127,7 @@
 BuildRequires:  pesign-obs-integration
 %endif
 
-Version:4.13.0_08
+Version:4.13.0_10
 Release:0
 Summary:Xen Virtualization: Hypervisor (aka VMM aka Microkernel)
 License:GPL-2.0-only
@@ -194,10 +194,12 @@
 Patch407:   replace-obsolete-network-configuration-commands-in-s.patch
 Patch408:   disable-building-pv-shim.patch
 Patch409:   xenstore-launch.patch
+Patch410:   default-to-credit1-scheduler.patch
 # Needs to go upstream
 Patch420:   suspend_evtchn_lock.patch
 Patch422:   stubdom-have-iovec.patch
 Patch423:   vif-route.patch
+Patch424:   gcc10-fixes.patch
 # Other bug fixes or features
 Patch451:   xenconsole-no-multiple-connections.patch
 Patch452:   hibernate.patch
@@ -435,10 +437,12 @@
 %patch407 -p1
 %patch408 -p1
 %patch409 -p1
+%patch410 -p1
 # Needs to go upstream
 %patch420 -p1
 %patch422 -p1
 %patch423 -p1
+%patch424 -p1
 # Other bug fixes or features
 %patch451 -p1
 %patch452 -p1

++ default-to-credit1-scheduler.patch ++
References: bsc#1165206, bsc#1134506

Switch the default scheduler back to the original credit
scheduler. This action reverses the commit referenced below.

From: George Dunlap george.dun...@citrix.com Mon Oct 29 14:51:51 2018 +
Subject: Make credit2 the default scheduler
Date: Mon Oct 29 14:58:34 2018 +:
Git: dafd936dddbd7978d4131275ad1112f64457bf64

--- xen-4.13.0-testing.orig/xen/common/Kconfig
+++ xen-4.13.0-testing/xen/common/Kconfig
@@ -319,7 +319,7 @@ config SCHED_NULL
 
 choice
prompt "Default Scheduler?"
-   default SCHED_CREDIT2_DEFAULT
+   default SCHED_CREDIT_DEFAULT
 
config SCHED_CREDIT_DEFAULT
bool "Credit Scheduler" if SCHED_CREDIT
@@ -340,7 +340,7 @@ config SCHED_DEFAULT
default "rtds" if SCHED_RTDS_DEFAULT
default "arinc653" if SCHED_ARINC653_DEFAULT
default "null" if SCHED_NULL_DEFAULT
-   default "credit2"
+   default "credit"
 
 endmenu
 
++ gcc10-fixes.patch ++
References: bsc#1158414

For libxlu_pci.c
libxlu_pci.c: In function 'xlu_pci_parse_bdf':
libxlu_pci.c:32:18: error: 'func' may be used uninitialized in this function 
[-Werror=maybe-uninitialized]
   32 | pcidev->func = func;
  | ~^~
libxlu_pci.c:51:29: note: 'func' was declared here
   51 | unsigned dom, bus, dev, func, vslot = 0;
  | ^~~~
libxlu_pci.c:31:17: error: 'dev' may be used uninitialized in this function 
[-Werror=maybe-uninitialized]
   31 | pcidev->dev = dev;
  | ^
libxlu_pci.c:51:24: note: 'dev' was declared here
   51 | unsigned dom, bus, dev, func, vslot = 0;
  |^~~
libxlu_pci.c:30:17: error: 'bus' may be used uninitialized in this function 
[-Werror=maybe-uninitialized]
   30 | pcidev->bus = bus;
  | ^
libxlu_pci.c:51:19: note: 'bus' was declared here
   51 | unsigned dom, bus, dev, func, vslot = 0;
  |   ^~~
libxlu_pci.c:29:20: error: 'dom' may be used uninitialized in this function 
[-Werror=maybe-uninitialized]
   29 | pcidev->domain = domain;
  | ~~~^~~~
libxlu_pci.c:51:14: note: 'dom' was declared here
   51 | unsigned dom, bus, dev, func, vslot = 0;
  |  ^~~


For kdd.c
kdd.c: In function 'kdd_tx':
kdd.c:408:30: error: array subscript 

commit xen for openSUSE:Leap:15.2

2020-02-29 Thread root
Hello community,

here is the log from the commit of package xen for openSUSE:Leap:15.2 checked 
in at 2020-03-01 08:51:20

Comparing /work/SRC/openSUSE:Leap:15.2/xen (Old)
 and  /work/SRC/openSUSE:Leap:15.2/.xen.new.26092 (New)


Package is "xen"

Sun Mar  1 08:51:20 2020 rev:82 rq:779734 version:4.13.0_08

Changes:

--- /work/SRC/openSUSE:Leap:15.2/xen/xen.changes2020-02-10 
16:41:56.355723879 +0100
+++ /work/SRC/openSUSE:Leap:15.2/.xen.new.26092/xen.changes 2020-03-01 
08:51:36.397301028 +0100
@@ -1,0 +2,48 @@
+Thu Feb 20 08:18:37 MST 2020 - carn...@suse.com
+
+- bsc#1160932 - VUL-0: xen: XSA-312 v1: arm: a CPU may speculate
+  past the ERET instruction 
+  5e1dcedd-Arm-place-speculation-barrier-after-ERET.patch
+- bsc#1164425 - x86: "spec-ctrl=no-xen" should also disable branch
+  hardening
+  5e4e614d-x86-spec-ctrl-no-xen-also-disables-branch-hardening.patch
+- Upstream bug fixes (bsc#1027519)
+  5e21ce98-x86-time-update-TSC-stamp-after-deep-C-state.patch
+  5e286cce-VT-d-dont-pass-bridges-to-domain_context_mapping_one.patch
+  5e318cd4-x86-apic-fix-disabling-LVT0.patch
+  5e344c11-x86-HVM-relinquish-resources-from-domain_destroy.patch
+  5e3bd385-EFI-recheck-variable-name-strings.patch
+  5e3bd3d1-EFI-dont-leak-heap-VIA-XEN_EFI_get_next_variable_name.patch
+  5e3bd3f8-xmalloc-guard-against-overflow.patch
+  5e46e090-x86-smp-reset-x2apic_enabled-in-smp_send_stop.patch
+  5e4c00ef-VT-d-check-full-RMRR-for-E820-reserved.patch
+  5e4d4f5b-sched-fix-get_cpu_idle_time-with-core-sched.patch
+
+---
+Tue Feb 18 18:18:18 UTC 2020 - oher...@suse.de
+
+- bsc#1159755 - use fixed qemu-3.1 machine type for HVM
+  This must be done in qemu to preserve PCI layout
+  remove libxl.lock-qemu-machine-for-hvm.patch
+
+---
+Fri Feb  7 12:37:35 UTC 2020 - oher...@suse.de
+
+- jsc#SLE-10183 - script to calculate cpuid= mask
+  add helper script from https://github.com/twizted/xen_maskcalc
+  domUs may be migrated between different cpus from the same vendor
+  if their visible cpuid value has incompatible feature bits masked.
+
+---
+Wed Feb  5 15:16:06 UTC 2020 - oher...@suse.de
+
+- jsc#SLE-10172, bsc#1055731 - handle degraded raid for xendomains
+  add helper script and systemd service from
+  https://github.com/luizluca/xen-tools-xendomains-wait-disk
+  in new sub package xen-tools-xendomains-wait-disk
+  See included README for usage instructions
+  xendomains-wait-disks.LICENSE
+  xendomains-wait-disks.README.md
+  xendomains-wait-disks.sh
+
+---

Old:

  libxl.lock-qemu-machine-for-hvm.patch

New:

  5e1dcedd-Arm-place-speculation-barrier-after-ERET.patch
  5e21ce98-x86-time-update-TSC-stamp-after-deep-C-state.patch
  5e286cce-VT-d-dont-pass-bridges-to-domain_context_mapping_one.patch
  5e318cd4-x86-apic-fix-disabling-LVT0.patch
  5e344c11-x86-HVM-relinquish-resources-from-domain_destroy.patch
  5e3bd385-EFI-recheck-variable-name-strings.patch
  5e3bd3d1-EFI-dont-leak-heap-VIA-XEN_EFI_get_next_variable_name.patch
  5e3bd3f8-xmalloc-guard-against-overflow.patch
  5e46e090-x86-smp-reset-x2apic_enabled-in-smp_send_stop.patch
  5e4c00ef-VT-d-check-full-RMRR-for-E820-reserved.patch
  5e4d4f5b-sched-fix-get_cpu_idle_time-with-core-sched.patch
  5e4e614d-x86-spec-ctrl-no-xen-also-disables-branch-hardening.patch
  xen_maskcalc.py
  xendomains-wait-disks.LICENSE
  xendomains-wait-disks.README.md
  xendomains-wait-disks.sh



Other differences:
--
++ xen.spec ++
--- /var/tmp/diff_new_pack.HIeYzB/_old  2020-03-01 08:51:38.245304704 +0100
+++ /var/tmp/diff_new_pack.HIeYzB/_new  2020-03-01 08:51:38.253304720 +0100
@@ -127,7 +127,7 @@
 BuildRequires:  pesign-obs-integration
 %endif
 
-Version:4.13.0_06
+Version:4.13.0_08
 Release:0
 Summary:Xen Virtualization: Hypervisor (aka VMM aka Microkernel)
 License:GPL-2.0-only
@@ -159,6 +159,10 @@
 Source41:   xencommons.service
 Source42:   xen-dom0-modules.service
 Source57:   xen-utils-0.1.tar.bz2
+Source10172:xendomains-wait-disks.sh
+Source10173:xendomains-wait-disks.LICENSE
+Source10174:xendomains-wait-disks.README.md
+Source10183:xen_maskcalc.py
 # For xen-libs
 Source99:   baselibs.conf
 # Upstream patches
@@ -167,6 +171,18 @@
 Patch3: 5e15e03d-sched-fix-S3-resume-with-smt=0.patch
 Patch4: 5e16fb6a-x86-clear-per-cpu-stub-page-info.patch
 Patch5: 5e1da013-IRQ-u16-is-too-narrow-for-evtchn.patch
+Patch6: 5e1dcedd-Arm-place-speculation-barrier-after-ERET.patch

commit xen for openSUSE:Leap:15.2

2020-02-10 Thread root
Hello community,

here is the log from the commit of package xen for openSUSE:Leap:15.2 checked 
in at 2020-02-10 16:41:38

Comparing /work/SRC/openSUSE:Leap:15.2/xen (Old)
 and  /work/SRC/openSUSE:Leap:15.2/.xen.new.26092 (New)


Package is "xen"

Mon Feb 10 16:41:38 2020 rev:81 rq:768894 version:4.13.0_06

Changes:

--- /work/SRC/openSUSE:Leap:15.2/xen/xen.changes2020-01-15 
16:30:10.692812759 +0100
+++ /work/SRC/openSUSE:Leap:15.2/.xen.new.26092/xen.changes 2020-02-10 
16:41:56.355723879 +0100
@@ -1,0 +2,25 @@
+Tue Jan 28 14:10:38 UTC 2020 - oher...@suse.de
+
+- bsc#1159755 - use fixed qemu-3.1 machine type for HVM
+  qemu4 introduced incompatible changes in pc-i440fx, which revealed
+  a design bug in 'xenfv'. Live migration from domUs started with
+  qemu versions prior qemu4 can not be received with qemu4+. 
+  libxl.lock-qemu-machine-for-hvm.patch
+
+---
+Tue Jan 14 09:19:31 MST 2020 - carn...@suse.com
+
+- Upstream bug fixes (bsc#1027519)
+  5de65f84-gnttab-map-always-do-IOMMU-part.patch
+  5de65fc4-x86-avoid-HPET-use-on-certain-Intel.patch
+  5e15e03d-sched-fix-S3-resume-with-smt=0.patch
+  5e16fb6a-x86-clear-per-cpu-stub-page-info.patch
+  5e1da013-IRQ-u16-is-too-narrow-for-evtchn.patch
+
+---
+Wed Jan  8 11:43:04 UTC 2020 - Dominique Leuenberger 
+
+- BuildRequire pkgconfig(libsystemd) instead of systemd-devel:
+  Allow OBS to shortcut through the -mini flavors.
+
+---

New:

  5de65f84-gnttab-map-always-do-IOMMU-part.patch
  5de65fc4-x86-avoid-HPET-use-on-certain-Intel.patch
  5e15e03d-sched-fix-S3-resume-with-smt=0.patch
  5e16fb6a-x86-clear-per-cpu-stub-page-info.patch
  5e1da013-IRQ-u16-is-too-narrow-for-evtchn.patch
  libxl.lock-qemu-machine-for-hvm.patch



Other differences:
--
++ xen.spec ++
--- /var/tmp/diff_new_pack.ovxjuJ/_old  2020-02-10 16:41:57.775724880 +0100
+++ /var/tmp/diff_new_pack.ovxjuJ/_new  2020-02-10 16:41:57.775724880 +0100
@@ -1,7 +1,7 @@
 #
 # spec file for package xen
 #
-# Copyright (c) 2019 SUSE LINUX GmbH, Nuernberg, Germany.
+# Copyright (c) 2020 SUSE LINUX GmbH, Nuernberg, Germany.
 #
 # All modifications and additions to the file contributed by third parties
 # remain the property of their copyright owners, unless otherwise agreed
@@ -60,7 +60,7 @@
 %define with_gcc48 0
 %define _fwdefdir /etc/sysconfig/SuSEfirewall2.d/services
 %systemd_requires
-BuildRequires:  systemd-devel
+BuildRequires:  pkgconfig(libsystemd)
 %define with_systemd_modules_load %{_prefix}/lib/modules-load.d
 PreReq: %fillup_prereq
 %ifarch %arm aarch64
@@ -108,8 +108,8 @@
 BuildRequires:  acpica
 BuildRequires:  openssl-devel
 BuildRequires:  python3-devel
-BuildRequires:  systemd
 BuildRequires:  xz-devel
+BuildRequires:  pkgconfig(systemd)
 %ifarch x86_64
 BuildRequires:  gcc-32bit
 BuildRequires:  gcc-c++
@@ -127,7 +127,7 @@
 BuildRequires:  pesign-obs-integration
 %endif
 
-Version:4.13.0_04
+Version:4.13.0_06
 Release:0
 Summary:Xen Virtualization: Hypervisor (aka VMM aka Microkernel)
 License:GPL-2.0-only
@@ -162,6 +162,11 @@
 # For xen-libs
 Source99:   baselibs.conf
 # Upstream patches
+Patch1: 5de65f84-gnttab-map-always-do-IOMMU-part.patch
+Patch2: 5de65fc4-x86-avoid-HPET-use-on-certain-Intel.patch
+Patch3: 5e15e03d-sched-fix-S3-resume-with-smt=0.patch
+Patch4: 5e16fb6a-x86-clear-per-cpu-stub-page-info.patch
+Patch5: 5e1da013-IRQ-u16-is-too-narrow-for-evtchn.patch
 # Our platform specific patches
 Patch400:   xen-destdir.patch
 Patch401:   vif-bridge-no-iptables.patch
@@ -193,6 +198,7 @@
 Patch465:   xen.libxl.dmmd.patch
 Patch466:   libxl.set-migration-constraints-from-cmdline.patch
 Patch467:   xenstore-run-in-studomain.patch
+Patch468:   libxl.lock-qemu-machine-for-hvm.patch
 Patch469:   libxl.helper_done-crash.patch
 Patch470:   libxl.LIBXL_HOTPLUG_TIMEOUT.patch
 # python3 conversion patches
@@ -356,6 +362,11 @@
 %prep
 %setup -q -n %xen_build_dir -a 1 -a 5 -a 6 -a 57
 # Upstream patches
+%patch1 -p1
+%patch2 -p1
+%patch3 -p1
+%patch4 -p1
+%patch5 -p1
 # Our platform specific patches
 %patch400 -p1
 %patch401 -p1
@@ -387,6 +398,7 @@
 %patch465 -p1
 %patch466 -p1
 %patch467 -p1
+%patch468 -p1
 %patch469 -p1
 %patch470 -p1
 # python3 conversion patches

++ 5de65f84-gnttab-map-always-do-IOMMU-part.patch ++
# Commit 921f1f42260c7967bf18f8a143d39511d163c421
# Date 2019-12-03 14:13:40 +0100
# Author Jan Beulich 
# Committer Jan Beulich 
gnttab: make sure grant map operations don't skip their IOMMU part