commit xen for openSUSE:Leap:15.2:Update
Hello community, here is the log from the commit of package xen for openSUSE:Leap:15.2:Update checked in at 2020-10-31 00:23:25 Comparing /work/SRC/openSUSE:Leap:15.2:Update/xen (Old) and /work/SRC/openSUSE:Leap:15.2:Update/.xen.new.3463 (New) Package is "xen" Sat Oct 31 00:23:25 2020 rev:4 rq:844482 version:unknown Changes: New Changes file: NO CHANGES FILE!!! Other differences: -- ++ _link ++ --- /var/tmp/diff_new_pack.llkN8G/_old 2020-10-31 00:23:34.807629301 +0100 +++ /var/tmp/diff_new_pack.llkN8G/_new 2020-10-31 00:23:34.807629301 +0100 @@ -1 +1 @@ - +
commit xen for openSUSE:Leap:15.2:Update
Hello community, here is the log from the commit of package xen for openSUSE:Leap:15.2:Update checked in at 2020-10-04 06:23:33 Comparing /work/SRC/openSUSE:Leap:15.2:Update/xen (Old) and /work/SRC/openSUSE:Leap:15.2:Update/.xen.new.4249 (New) Package is "xen" Sun Oct 4 06:23:33 2020 rev:3 rq:838858 version:unknown Changes: New Changes file: NO CHANGES FILE!!! Other differences: -- ++ _link ++ --- /var/tmp/diff_new_pack.O3gFn0/_old 2020-10-04 06:23:43.631356048 +0200 +++ /var/tmp/diff_new_pack.O3gFn0/_new 2020-10-04 06:23:43.631356048 +0200 @@ -1 +1 @@ - +
commit xen for openSUSE:Leap:15.2:Update
Hello community, here is the log from the commit of package xen for openSUSE:Leap:15.2:Update checked in at 2020-08-12 12:23:40 Comparing /work/SRC/openSUSE:Leap:15.2:Update/xen (Old) and /work/SRC/openSUSE:Leap:15.2:Update/.xen.new.3399 (New) Package is "xen" Wed Aug 12 12:23:40 2020 rev:2 rq:824768 version:unknown Changes: New Changes file: NO CHANGES FILE!!! Other differences: -- ++ _link ++ --- /var/tmp/diff_new_pack.nm2MTd/_old 2020-08-12 12:27:10.156137860 +0200 +++ /var/tmp/diff_new_pack.nm2MTd/_new 2020-08-12 12:27:10.156137860 +0200 @@ -1 +1 @@ - +
commit xen for openSUSE:Leap:15.2
Hello community, here is the log from the commit of package xen for openSUSE:Leap:15.2 checked in at 2020-06-10 16:49:50 Comparing /work/SRC/openSUSE:Leap:15.2/xen (Old) and /work/SRC/openSUSE:Leap:15.2/.xen.new.3606 (New) Package is "xen" Wed Jun 10 16:49:50 2020 rev:86 rq:813020 version:4.13.1_02 Changes: --- /work/SRC/openSUSE:Leap:15.2/xen/xen.changes2020-04-21 19:08:03.992055245 +0200 +++ /work/SRC/openSUSE:Leap:15.2/.xen.new.3606/xen.changes 2020-06-10 16:49:53.724357469 +0200 @@ -1,0 +2,66 @@ +Thu May 28 08:35:20 MDT 2020 - carn...@suse.com + +- bsc#1172205 - VUL-0: CVE-2020-0543: xen: Special Register Buffer + Data Sampling (SRBDS) aka "CrossTalk" (XSA-320) + xsa320-1.patch + xsa320-2.patch + +--- +Mon May 18 10:55:26 MDT 2020 - carn...@suse.com + +- Update to Xen 4.13.1 bug fix release (bsc#1027519) + xen-4.13.1-testing-src.tar.bz2 + 5eb51be6-cpupool-fix-removing-cpu-from-pool.patch + 5eb51caa-sched-vcpu-pause-flags-atomic.patch + 5ec2a760-x86-determine-MXCSR-mask-always.patch +- Drop patches contained in new tarball + 5de65f84-gnttab-map-always-do-IOMMU-part.patch + 5de65fc4-x86-avoid-HPET-use-on-certain-Intel.patch + 5e15e03d-sched-fix-S3-resume-with-smt=0.patch + 5e16fb6a-x86-clear-per-cpu-stub-page-info.patch + 5e1da013-IRQ-u16-is-too-narrow-for-evtchn.patch + 5e1dcedd-Arm-place-speculation-barrier-after-ERET.patch + 5e21ce98-x86-time-update-TSC-stamp-after-deep-C-state.patch + 5e286cce-VT-d-dont-pass-bridges-to-domain_context_mapping_one.patch + 5e318cd4-x86-apic-fix-disabling-LVT0.patch + 5e344c11-x86-HVM-relinquish-resources-from-domain_destroy.patch + 5e3bd385-EFI-recheck-variable-name-strings.patch + 5e3bd3d1-EFI-dont-leak-heap-VIA-XEN_EFI_get_next_variable_name.patch + 5e3bd3f8-xmalloc-guard-against-overflow.patch + 5e46e090-x86-smp-reset-x2apic_enabled-in-smp_send_stop.patch + 5e4c00ef-VT-d-check-full-RMRR-for-E820-reserved.patch + 5e4d4f5b-sched-fix-get_cpu_idle_time-with-core-sched.patch + 5e4e614d-x86-spec-ctrl-no-xen-also-disables-branch-hardening.patch + 5e4ec20e-x86-virtualise-MSR_PLATFORM_ID-properly.patch + 5e5e7188-fix-error-path-in-cpupool_unassign_cpu_start.patch + 5e6f53dd-AMD-IOMMU-fix-off-by-one-get_paging_mode.patch + 5e7a371c-sched-fix-cpu-onlining-with-core-sched.patch + 5e7c90cf-sched-fix-cpu-offlining-with-core-sched.patch + 5e7cfb29-x86-ucode-AMD-fix-assert-in-compare_patch.patch + 5e7cfb29-x86-ucode-fix-error-paths-in-apply_microcode.patch + 5e7dd83b-libx86-CPUID-fix-not-just-leaf-7.patch + 5e7dfbf6-x86-ucode-AMD-potential-buffer-overrun-equiv-tab.patch + 5e846cce-x86-HVM-fix-AMD-ECS-handling-for-Fam10.patch + 5e84905c-x86-ucode-AMD-fix-more-potential-buffer-overruns.patch + 5e86f7b7-credit2-avoid-vCPUs-with-lower-creds-than-idle.patch + 5e86f7fd-credit2-fix-credit-too-few-resets.patch + 5e876b0f-tools-xenstore-fix-use-after-free-in-xenstored.patch + 5e95ad61-xenoprof-clear-buffer-intended-to-be-shared-with-guests.patch + 5e95ad8f-xenoprof-limit-consumption-of-shared-buffer-data.patch + 5e95ae77-Add-missing-memory-barrier-in-the-unlock-path-of-rwlock.patch + 5e95af5e-xen-gnttab-Fix-error-path-in-map_grant_ref.patch + 5e95afb8-gnttab-fix-GNTTABOP_copy-continuation-handling.patch + +--- +Wed May 13 21:07:29 UTC 2020 - James Fehlig + +- spec: Remove invocation of autogen.sh +- spec: Recommend qemu-ovmf-x86_64 to provide UEFI firmwares + +--- +Wed May 13 09:56:49 MDT 2020 - carn...@suse.com + +- bsc#1170968 - GCC 10: xen build fails on i586 + gcc10-fixes.patch + +--- @@ -43,0 +110,7 @@ + +--- +Wed Mar 25 18:18:18 UTC 2020 - oher...@suse.de + +- bsc#1167608 - unbound limit for max_event_channels + domUs with many vcpus and/or resources fail to start + libxl.max_event_channels.patch Old: 5de65f84-gnttab-map-always-do-IOMMU-part.patch 5de65fc4-x86-avoid-HPET-use-on-certain-Intel.patch 5e15e03d-sched-fix-S3-resume-with-smt=0.patch 5e16fb6a-x86-clear-per-cpu-stub-page-info.patch 5e1da013-IRQ-u16-is-too-narrow-for-evtchn.patch 5e1dcedd-Arm-place-speculation-barrier-after-ERET.patch 5e21ce98-x86-time-update-TSC-stamp-after-deep-C-state.patch 5e286cce-VT-d-dont-pass-bridges-to-domain_context_mapping_one.patch 5e318cd4-x86-apic-fix-disabling-LVT0.patch 5e344c11-x86-HVM-relinquish-resources-from-domain_destroy.patch 5e3bd385-EFI-recheck-variable-name-strings.patch 5e3bd3d1-EFI-dont-leak-heap-VIA-XEN_EFI_get_next_variable_name.patch 5e3bd3f8-xmalloc-guard-against-overflow.patch
commit xen for openSUSE:Leap:15.2
Hello community, here is the log from the commit of package xen for openSUSE:Leap:15.2 checked in at 2020-04-21 19:06:36 Comparing /work/SRC/openSUSE:Leap:15.2/xen (Old) and /work/SRC/openSUSE:Leap:15.2/.xen.new.2738 (New) Package is "xen" Tue Apr 21 19:06:36 2020 rev:85 rq:795132 version:4.13.0_12 Changes: --- /work/SRC/openSUSE:Leap:15.2/xen/xen.changes2020-03-31 07:21:35.758377870 +0200 +++ /work/SRC/openSUSE:Leap:15.2/.xen.new.2738/xen.changes 2020-04-21 19:08:03.992055245 +0200 @@ -1,0 +2,44 @@ +Tue Apr 14 11:06:08 MDT 2020 - carn...@suse.com + +- bsc#1169392 - VUL-0: CVE-2020-11742: xen: Bad continuation + handling in GNTTABOP_copy (XSA-318) + 5e95afb8-gnttab-fix-GNTTABOP_copy-continuation-handling.patch + +--- +Mon Apr 6 12:01:45 MDT 2020 - carn...@suse.com + +- bsc#1168140 - VUL-0: CVE-2020-11740, CVE-2020-11741: xen: XSA-313 + multiple xenoprof issues + 5e95ad61-xenoprof-clear-buffer-intended-to-be-shared-with-guests.patch + 5e95ad8f-xenoprof-limit-consumption-of-shared-buffer-data.patch +- bsc#1168142 - VUL-0: CVE-2020-11739: xen: XSA-314 - Missing + memory barriers in read-write unlock paths + 5e95ae77-Add-missing-memory-barrier-in-the-unlock-path-of-rwlock.patch +- bsc#1168143 - VUL-0: CVE-2020-11743: xen: XSA-316 - Bad error + path in GNTTABOP_map_grant + 5e95af5e-xen-gnttab-Fix-error-path-in-map_grant_ref.patch +- bsc#1167152 - L3: Xenstored Crashed during VM install Need Core + analyzed + 5e876b0f-tools-xenstore-fix-use-after-free-in-xenstored.patch +- bsc#1165206 - Xen 4.12 DomU hang / freeze / stall / NMI watchdog + bug soft lockup CPU #0 stuck under high load / upstream with + workaround. See also bsc#1134506 + 5e86f7b7-credit2-avoid-vCPUs-with-lower-creds-than-idle.patch + 5e86f7fd-credit2-fix-credit-too-few-resets.patch +- Drop for upstream solution (bsc#1165206) + 01-xen-credit2-avoid-vcpus-to.patch + default-to-credit1-scheduler.patch +- Upstream bug fixes (bsc#1027519) + 5e4ec20e-x86-virtualise-MSR_PLATFORM_ID-properly.patch + 5e5e7188-fix-error-path-in-cpupool_unassign_cpu_start.patch + 5e6f53dd-AMD-IOMMU-fix-off-by-one-get_paging_mode.patch + 5e7a371c-sched-fix-cpu-onlining-with-core-sched.patch + 5e7c90cf-sched-fix-cpu-offlining-with-core-sched.patch + 5e7cfb29-x86-ucode-AMD-fix-assert-in-compare_patch.patch + 5e7cfb29-x86-ucode-fix-error-paths-in-apply_microcode.patch + 5e7dd83b-libx86-CPUID-fix-not-just-leaf-7.patch + 5e7dfbf6-x86-ucode-AMD-potential-buffer-overrun-equiv-tab.patch + 5e846cce-x86-HVM-fix-AMD-ECS-handling-for-Fam10.patch + 5e84905c-x86-ucode-AMD-fix-more-potential-buffer-overruns.patch + +--- Old: 01-xen-credit2-avoid-vcpus-to.patch default-to-credit1-scheduler.patch New: 5e4ec20e-x86-virtualise-MSR_PLATFORM_ID-properly.patch 5e5e7188-fix-error-path-in-cpupool_unassign_cpu_start.patch 5e6f53dd-AMD-IOMMU-fix-off-by-one-get_paging_mode.patch 5e7a371c-sched-fix-cpu-onlining-with-core-sched.patch 5e7c90cf-sched-fix-cpu-offlining-with-core-sched.patch 5e7cfb29-x86-ucode-AMD-fix-assert-in-compare_patch.patch 5e7cfb29-x86-ucode-fix-error-paths-in-apply_microcode.patch 5e7dd83b-libx86-CPUID-fix-not-just-leaf-7.patch 5e7dfbf6-x86-ucode-AMD-potential-buffer-overrun-equiv-tab.patch 5e846cce-x86-HVM-fix-AMD-ECS-handling-for-Fam10.patch 5e84905c-x86-ucode-AMD-fix-more-potential-buffer-overruns.patch 5e86f7b7-credit2-avoid-vCPUs-with-lower-creds-than-idle.patch 5e86f7fd-credit2-fix-credit-too-few-resets.patch 5e876b0f-tools-xenstore-fix-use-after-free-in-xenstored.patch 5e95ad61-xenoprof-clear-buffer-intended-to-be-shared-with-guests.patch 5e95ad8f-xenoprof-limit-consumption-of-shared-buffer-data.patch 5e95ae77-Add-missing-memory-barrier-in-the-unlock-path-of-rwlock.patch 5e95af5e-xen-gnttab-Fix-error-path-in-map_grant_ref.patch 5e95afb8-gnttab-fix-GNTTABOP_copy-continuation-handling.patch Other differences: -- ++ xen.spec ++ --- /var/tmp/diff_new_pack.fJyATU/_old 2020-04-21 19:08:06.032059398 +0200 +++ /var/tmp/diff_new_pack.fJyATU/_new 2020-04-21 19:08:06.036059407 +0200 @@ -1,7 +1,7 @@ # # spec file for package xen # -# Copyright (c) 2020 SUSE LLC +# Copyright (c) 2020 SUSE LINUX GmbH, Nuernberg, Germany. # # All modifications and additions to the file contributed by third parties # remain the property of their copyright owners, unless otherwise agreed @@ -127,7 +127,7 @@ BuildRequires: pesign-obs-integration %endif -Version:4.13.0_11 +Version:4.13.0_12 Release:0 Summary:Xen Virtualization: Hypervisor (aka VMM aka Microkernel) License:
commit xen for openSUSE:Leap:15.2
Hello community, here is the log from the commit of package xen for openSUSE:Leap:15.2 checked in at 2020-03-31 07:21:34 Comparing /work/SRC/openSUSE:Leap:15.2/xen (Old) and /work/SRC/openSUSE:Leap:15.2/.xen.new.3160 (New) Package is "xen" Tue Mar 31 07:21:34 2020 rev:84 rq:789168 version:4.13.0_11 Changes: --- /work/SRC/openSUSE:Leap:15.2/xen/xen.changes2020-03-15 07:11:22.688963962 +0100 +++ /work/SRC/openSUSE:Leap:15.2/.xen.new.3160/xen.changes 2020-03-31 07:21:35.758377870 +0200 @@ -1,0 +2,14 @@ +Wed Mar 18 17:00:34 UTC 2020 - oher...@suse.de + +- bsc#1161480 - Fix xl shutdown for HVM without PV drivers + add libxl.libxl__domain_pvcontrol.patch + +--- +Thu Mar 12 07:57:53 MDT 2020 - carn...@suse.com + +- bsc#1165206 - Xen 4.12 DomU hang / freeze / stall / NMI watchdog + bug soft lockup CPU #0 stuck under high load / upstream with + workaround. See also bsc#1134506 + 01-xen-credit2-avoid-vcpus-to.patch + +--- New: 01-xen-credit2-avoid-vcpus-to.patch libxl.libxl__domain_pvcontrol.patch Other differences: -- ++ xen.spec ++ --- /var/tmp/diff_new_pack.spoBt7/_old 2020-03-31 07:21:43.026381025 +0200 +++ /var/tmp/diff_new_pack.spoBt7/_new 2020-03-31 07:21:43.030381027 +0200 @@ -1,7 +1,7 @@ # # spec file for package xen # -# Copyright (c) 2020 SUSE LINUX GmbH, Nuernberg, Germany. +# Copyright (c) 2020 SUSE LLC # # All modifications and additions to the file contributed by third parties # remain the property of their copyright owners, unless otherwise agreed @@ -127,7 +127,7 @@ BuildRequires: pesign-obs-integration %endif -Version:4.13.0_10 +Version:4.13.0_11 Release:0 Summary:Xen Virtualization: Hypervisor (aka VMM aka Microkernel) License:GPL-2.0-only @@ -200,6 +200,7 @@ Patch422: stubdom-have-iovec.patch Patch423: vif-route.patch Patch424: gcc10-fixes.patch +Patch425: 01-xen-credit2-avoid-vcpus-to.patch # Other bug fixes or features Patch451: xenconsole-no-multiple-connections.patch Patch452: hibernate.patch @@ -216,6 +217,7 @@ Patch465: xen.libxl.dmmd.patch Patch466: libxl.set-migration-constraints-from-cmdline.patch Patch467: xenstore-run-in-studomain.patch +Patch468: libxl.libxl__domain_pvcontrol.patch Patch469: libxl.helper_done-crash.patch Patch470: libxl.LIBXL_HOTPLUG_TIMEOUT.patch # python3 conversion patches @@ -443,6 +445,7 @@ %patch422 -p1 %patch423 -p1 %patch424 -p1 +%patch425 -p1 # Other bug fixes or features %patch451 -p1 %patch452 -p1 @@ -459,6 +462,7 @@ %patch465 -p1 %patch466 -p1 %patch467 -p1 +%patch468 -p1 %patch469 -p1 %patch470 -p1 # python3 conversion patches ++ 01-xen-credit2-avoid-vcpus-to.patch ++ commit 149b5880db78648318b23623c93c6e4f91ad1e87 Author: Dario Faggioli Date: Wed Mar 11 19:13:59 2020 +0100 xen: credit2: avoid vCPUs to ever reach lower credits than idle There have been report of stalls of guest vCPUs, when Credit2 was used. It seemed like these vCPUs were not getting scheduled for very long time, even under light load conditions (e.g., during dom0 boot). Investigations led to the discovery that --although rarely-- it can happen that a vCPU manages to run for very long timeslices. In Credit2, this means that, when runtime accounting happens, the vCPU will lose a large quantity of credits. This in turn may lead to the vCPU having less credits than the idle vCPUs (-2^30). At this point, the scheduler will pick the idle vCPU, instead of the ready to run vCPU, for a few "epochs", which often times is enough for the guest kernel to think the vCPU is not responding and crashing. An example of this situation is shown here. In fact, we can see d0v1 sitting in the runqueue while all the CPUs are idle, as it has -1254238270 credits, which is smaller than -2^30 = −1073741824: (XEN) Runqueue 0: (XEN) ncpus = 28 (XEN) cpus = 0-27 (XEN) max_weight = 256 (XEN) pick_bias = 22 (XEN) instload = 1 (XEN) aveload= 293391 (~111%) (XEN) idlers: 00,,,,,,0fff (XEN) tickled: 00,,,,,, (XEN) fully idle cores: 00,,,,,,0fff [...] (XEN) Runqueue 0: (XEN) CPU[00] runq=0, sibling=00,..., core=00,... (XEN) CPU[01] runq=0,
commit xen for openSUSE:Leap:15.2
Hello community, here is the log from the commit of package xen for openSUSE:Leap:15.2 checked in at 2020-03-15 07:11:06 Comparing /work/SRC/openSUSE:Leap:15.2/xen (Old) and /work/SRC/openSUSE:Leap:15.2/.xen.new.3160 (New) Package is "xen" Sun Mar 15 07:11:06 2020 rev:83 rq:784266 version:4.13.0_10 Changes: --- /work/SRC/openSUSE:Leap:15.2/xen/xen.changes2020-03-01 08:51:36.397301028 +0100 +++ /work/SRC/openSUSE:Leap:15.2/.xen.new.3160/xen.changes 2020-03-15 07:11:22.688963962 +0100 @@ -1,0 +2,14 @@ +Tue Mar 10 07:41:34 MDT 2020 - carn...@suse.com + +- bsc#1158414 - GCC 10: xen build fails + gcc10-fixes.patch + +--- +Wed Mar 4 13:28:17 MST 2020 - carn...@suse.com + +- bsc#1165206 - Xen 4.12 DomU hang / freeze / stall / NMI watchdog + bug soft lockup CPU #0 stuck under high load / upstream with + workaround. See also bsc#1134506 + default-to-credit1-scheduler.patch + +--- New: default-to-credit1-scheduler.patch gcc10-fixes.patch Other differences: -- ++ xen.spec ++ --- /var/tmp/diff_new_pack.Z8Wee2/_old 2020-03-15 07:11:26.616966313 +0100 +++ /var/tmp/diff_new_pack.Z8Wee2/_new 2020-03-15 07:11:26.620966316 +0100 @@ -127,7 +127,7 @@ BuildRequires: pesign-obs-integration %endif -Version:4.13.0_08 +Version:4.13.0_10 Release:0 Summary:Xen Virtualization: Hypervisor (aka VMM aka Microkernel) License:GPL-2.0-only @@ -194,10 +194,12 @@ Patch407: replace-obsolete-network-configuration-commands-in-s.patch Patch408: disable-building-pv-shim.patch Patch409: xenstore-launch.patch +Patch410: default-to-credit1-scheduler.patch # Needs to go upstream Patch420: suspend_evtchn_lock.patch Patch422: stubdom-have-iovec.patch Patch423: vif-route.patch +Patch424: gcc10-fixes.patch # Other bug fixes or features Patch451: xenconsole-no-multiple-connections.patch Patch452: hibernate.patch @@ -435,10 +437,12 @@ %patch407 -p1 %patch408 -p1 %patch409 -p1 +%patch410 -p1 # Needs to go upstream %patch420 -p1 %patch422 -p1 %patch423 -p1 +%patch424 -p1 # Other bug fixes or features %patch451 -p1 %patch452 -p1 ++ default-to-credit1-scheduler.patch ++ References: bsc#1165206, bsc#1134506 Switch the default scheduler back to the original credit scheduler. This action reverses the commit referenced below. From: George Dunlap george.dun...@citrix.com Mon Oct 29 14:51:51 2018 + Subject: Make credit2 the default scheduler Date: Mon Oct 29 14:58:34 2018 +: Git: dafd936dddbd7978d4131275ad1112f64457bf64 --- xen-4.13.0-testing.orig/xen/common/Kconfig +++ xen-4.13.0-testing/xen/common/Kconfig @@ -319,7 +319,7 @@ config SCHED_NULL choice prompt "Default Scheduler?" - default SCHED_CREDIT2_DEFAULT + default SCHED_CREDIT_DEFAULT config SCHED_CREDIT_DEFAULT bool "Credit Scheduler" if SCHED_CREDIT @@ -340,7 +340,7 @@ config SCHED_DEFAULT default "rtds" if SCHED_RTDS_DEFAULT default "arinc653" if SCHED_ARINC653_DEFAULT default "null" if SCHED_NULL_DEFAULT - default "credit2" + default "credit" endmenu ++ gcc10-fixes.patch ++ References: bsc#1158414 For libxlu_pci.c libxlu_pci.c: In function 'xlu_pci_parse_bdf': libxlu_pci.c:32:18: error: 'func' may be used uninitialized in this function [-Werror=maybe-uninitialized] 32 | pcidev->func = func; | ~^~ libxlu_pci.c:51:29: note: 'func' was declared here 51 | unsigned dom, bus, dev, func, vslot = 0; | ^~~~ libxlu_pci.c:31:17: error: 'dev' may be used uninitialized in this function [-Werror=maybe-uninitialized] 31 | pcidev->dev = dev; | ^ libxlu_pci.c:51:24: note: 'dev' was declared here 51 | unsigned dom, bus, dev, func, vslot = 0; |^~~ libxlu_pci.c:30:17: error: 'bus' may be used uninitialized in this function [-Werror=maybe-uninitialized] 30 | pcidev->bus = bus; | ^ libxlu_pci.c:51:19: note: 'bus' was declared here 51 | unsigned dom, bus, dev, func, vslot = 0; | ^~~ libxlu_pci.c:29:20: error: 'dom' may be used uninitialized in this function [-Werror=maybe-uninitialized] 29 | pcidev->domain = domain; | ~~~^~~~ libxlu_pci.c:51:14: note: 'dom' was declared here 51 | unsigned dom, bus, dev, func, vslot = 0; | ^~~ For kdd.c kdd.c: In function 'kdd_tx': kdd.c:408:30: error: array subscript
commit xen for openSUSE:Leap:15.2
Hello community, here is the log from the commit of package xen for openSUSE:Leap:15.2 checked in at 2020-03-01 08:51:20 Comparing /work/SRC/openSUSE:Leap:15.2/xen (Old) and /work/SRC/openSUSE:Leap:15.2/.xen.new.26092 (New) Package is "xen" Sun Mar 1 08:51:20 2020 rev:82 rq:779734 version:4.13.0_08 Changes: --- /work/SRC/openSUSE:Leap:15.2/xen/xen.changes2020-02-10 16:41:56.355723879 +0100 +++ /work/SRC/openSUSE:Leap:15.2/.xen.new.26092/xen.changes 2020-03-01 08:51:36.397301028 +0100 @@ -1,0 +2,48 @@ +Thu Feb 20 08:18:37 MST 2020 - carn...@suse.com + +- bsc#1160932 - VUL-0: xen: XSA-312 v1: arm: a CPU may speculate + past the ERET instruction + 5e1dcedd-Arm-place-speculation-barrier-after-ERET.patch +- bsc#1164425 - x86: "spec-ctrl=no-xen" should also disable branch + hardening + 5e4e614d-x86-spec-ctrl-no-xen-also-disables-branch-hardening.patch +- Upstream bug fixes (bsc#1027519) + 5e21ce98-x86-time-update-TSC-stamp-after-deep-C-state.patch + 5e286cce-VT-d-dont-pass-bridges-to-domain_context_mapping_one.patch + 5e318cd4-x86-apic-fix-disabling-LVT0.patch + 5e344c11-x86-HVM-relinquish-resources-from-domain_destroy.patch + 5e3bd385-EFI-recheck-variable-name-strings.patch + 5e3bd3d1-EFI-dont-leak-heap-VIA-XEN_EFI_get_next_variable_name.patch + 5e3bd3f8-xmalloc-guard-against-overflow.patch + 5e46e090-x86-smp-reset-x2apic_enabled-in-smp_send_stop.patch + 5e4c00ef-VT-d-check-full-RMRR-for-E820-reserved.patch + 5e4d4f5b-sched-fix-get_cpu_idle_time-with-core-sched.patch + +--- +Tue Feb 18 18:18:18 UTC 2020 - oher...@suse.de + +- bsc#1159755 - use fixed qemu-3.1 machine type for HVM + This must be done in qemu to preserve PCI layout + remove libxl.lock-qemu-machine-for-hvm.patch + +--- +Fri Feb 7 12:37:35 UTC 2020 - oher...@suse.de + +- jsc#SLE-10183 - script to calculate cpuid= mask + add helper script from https://github.com/twizted/xen_maskcalc + domUs may be migrated between different cpus from the same vendor + if their visible cpuid value has incompatible feature bits masked. + +--- +Wed Feb 5 15:16:06 UTC 2020 - oher...@suse.de + +- jsc#SLE-10172, bsc#1055731 - handle degraded raid for xendomains + add helper script and systemd service from + https://github.com/luizluca/xen-tools-xendomains-wait-disk + in new sub package xen-tools-xendomains-wait-disk + See included README for usage instructions + xendomains-wait-disks.LICENSE + xendomains-wait-disks.README.md + xendomains-wait-disks.sh + +--- Old: libxl.lock-qemu-machine-for-hvm.patch New: 5e1dcedd-Arm-place-speculation-barrier-after-ERET.patch 5e21ce98-x86-time-update-TSC-stamp-after-deep-C-state.patch 5e286cce-VT-d-dont-pass-bridges-to-domain_context_mapping_one.patch 5e318cd4-x86-apic-fix-disabling-LVT0.patch 5e344c11-x86-HVM-relinquish-resources-from-domain_destroy.patch 5e3bd385-EFI-recheck-variable-name-strings.patch 5e3bd3d1-EFI-dont-leak-heap-VIA-XEN_EFI_get_next_variable_name.patch 5e3bd3f8-xmalloc-guard-against-overflow.patch 5e46e090-x86-smp-reset-x2apic_enabled-in-smp_send_stop.patch 5e4c00ef-VT-d-check-full-RMRR-for-E820-reserved.patch 5e4d4f5b-sched-fix-get_cpu_idle_time-with-core-sched.patch 5e4e614d-x86-spec-ctrl-no-xen-also-disables-branch-hardening.patch xen_maskcalc.py xendomains-wait-disks.LICENSE xendomains-wait-disks.README.md xendomains-wait-disks.sh Other differences: -- ++ xen.spec ++ --- /var/tmp/diff_new_pack.HIeYzB/_old 2020-03-01 08:51:38.245304704 +0100 +++ /var/tmp/diff_new_pack.HIeYzB/_new 2020-03-01 08:51:38.253304720 +0100 @@ -127,7 +127,7 @@ BuildRequires: pesign-obs-integration %endif -Version:4.13.0_06 +Version:4.13.0_08 Release:0 Summary:Xen Virtualization: Hypervisor (aka VMM aka Microkernel) License:GPL-2.0-only @@ -159,6 +159,10 @@ Source41: xencommons.service Source42: xen-dom0-modules.service Source57: xen-utils-0.1.tar.bz2 +Source10172:xendomains-wait-disks.sh +Source10173:xendomains-wait-disks.LICENSE +Source10174:xendomains-wait-disks.README.md +Source10183:xen_maskcalc.py # For xen-libs Source99: baselibs.conf # Upstream patches @@ -167,6 +171,18 @@ Patch3: 5e15e03d-sched-fix-S3-resume-with-smt=0.patch Patch4: 5e16fb6a-x86-clear-per-cpu-stub-page-info.patch Patch5: 5e1da013-IRQ-u16-is-too-narrow-for-evtchn.patch +Patch6: 5e1dcedd-Arm-place-speculation-barrier-after-ERET.patch
commit xen for openSUSE:Leap:15.2
Hello community, here is the log from the commit of package xen for openSUSE:Leap:15.2 checked in at 2020-02-10 16:41:38 Comparing /work/SRC/openSUSE:Leap:15.2/xen (Old) and /work/SRC/openSUSE:Leap:15.2/.xen.new.26092 (New) Package is "xen" Mon Feb 10 16:41:38 2020 rev:81 rq:768894 version:4.13.0_06 Changes: --- /work/SRC/openSUSE:Leap:15.2/xen/xen.changes2020-01-15 16:30:10.692812759 +0100 +++ /work/SRC/openSUSE:Leap:15.2/.xen.new.26092/xen.changes 2020-02-10 16:41:56.355723879 +0100 @@ -1,0 +2,25 @@ +Tue Jan 28 14:10:38 UTC 2020 - oher...@suse.de + +- bsc#1159755 - use fixed qemu-3.1 machine type for HVM + qemu4 introduced incompatible changes in pc-i440fx, which revealed + a design bug in 'xenfv'. Live migration from domUs started with + qemu versions prior qemu4 can not be received with qemu4+. + libxl.lock-qemu-machine-for-hvm.patch + +--- +Tue Jan 14 09:19:31 MST 2020 - carn...@suse.com + +- Upstream bug fixes (bsc#1027519) + 5de65f84-gnttab-map-always-do-IOMMU-part.patch + 5de65fc4-x86-avoid-HPET-use-on-certain-Intel.patch + 5e15e03d-sched-fix-S3-resume-with-smt=0.patch + 5e16fb6a-x86-clear-per-cpu-stub-page-info.patch + 5e1da013-IRQ-u16-is-too-narrow-for-evtchn.patch + +--- +Wed Jan 8 11:43:04 UTC 2020 - Dominique Leuenberger + +- BuildRequire pkgconfig(libsystemd) instead of systemd-devel: + Allow OBS to shortcut through the -mini flavors. + +--- New: 5de65f84-gnttab-map-always-do-IOMMU-part.patch 5de65fc4-x86-avoid-HPET-use-on-certain-Intel.patch 5e15e03d-sched-fix-S3-resume-with-smt=0.patch 5e16fb6a-x86-clear-per-cpu-stub-page-info.patch 5e1da013-IRQ-u16-is-too-narrow-for-evtchn.patch libxl.lock-qemu-machine-for-hvm.patch Other differences: -- ++ xen.spec ++ --- /var/tmp/diff_new_pack.ovxjuJ/_old 2020-02-10 16:41:57.775724880 +0100 +++ /var/tmp/diff_new_pack.ovxjuJ/_new 2020-02-10 16:41:57.775724880 +0100 @@ -1,7 +1,7 @@ # # spec file for package xen # -# Copyright (c) 2019 SUSE LINUX GmbH, Nuernberg, Germany. +# Copyright (c) 2020 SUSE LINUX GmbH, Nuernberg, Germany. # # All modifications and additions to the file contributed by third parties # remain the property of their copyright owners, unless otherwise agreed @@ -60,7 +60,7 @@ %define with_gcc48 0 %define _fwdefdir /etc/sysconfig/SuSEfirewall2.d/services %systemd_requires -BuildRequires: systemd-devel +BuildRequires: pkgconfig(libsystemd) %define with_systemd_modules_load %{_prefix}/lib/modules-load.d PreReq: %fillup_prereq %ifarch %arm aarch64 @@ -108,8 +108,8 @@ BuildRequires: acpica BuildRequires: openssl-devel BuildRequires: python3-devel -BuildRequires: systemd BuildRequires: xz-devel +BuildRequires: pkgconfig(systemd) %ifarch x86_64 BuildRequires: gcc-32bit BuildRequires: gcc-c++ @@ -127,7 +127,7 @@ BuildRequires: pesign-obs-integration %endif -Version:4.13.0_04 +Version:4.13.0_06 Release:0 Summary:Xen Virtualization: Hypervisor (aka VMM aka Microkernel) License:GPL-2.0-only @@ -162,6 +162,11 @@ # For xen-libs Source99: baselibs.conf # Upstream patches +Patch1: 5de65f84-gnttab-map-always-do-IOMMU-part.patch +Patch2: 5de65fc4-x86-avoid-HPET-use-on-certain-Intel.patch +Patch3: 5e15e03d-sched-fix-S3-resume-with-smt=0.patch +Patch4: 5e16fb6a-x86-clear-per-cpu-stub-page-info.patch +Patch5: 5e1da013-IRQ-u16-is-too-narrow-for-evtchn.patch # Our platform specific patches Patch400: xen-destdir.patch Patch401: vif-bridge-no-iptables.patch @@ -193,6 +198,7 @@ Patch465: xen.libxl.dmmd.patch Patch466: libxl.set-migration-constraints-from-cmdline.patch Patch467: xenstore-run-in-studomain.patch +Patch468: libxl.lock-qemu-machine-for-hvm.patch Patch469: libxl.helper_done-crash.patch Patch470: libxl.LIBXL_HOTPLUG_TIMEOUT.patch # python3 conversion patches @@ -356,6 +362,11 @@ %prep %setup -q -n %xen_build_dir -a 1 -a 5 -a 6 -a 57 # Upstream patches +%patch1 -p1 +%patch2 -p1 +%patch3 -p1 +%patch4 -p1 +%patch5 -p1 # Our platform specific patches %patch400 -p1 %patch401 -p1 @@ -387,6 +398,7 @@ %patch465 -p1 %patch466 -p1 %patch467 -p1 +%patch468 -p1 %patch469 -p1 %patch470 -p1 # python3 conversion patches ++ 5de65f84-gnttab-map-always-do-IOMMU-part.patch ++ # Commit 921f1f42260c7967bf18f8a143d39511d163c421 # Date 2019-12-03 14:13:40 +0100 # Author Jan Beulich # Committer Jan Beulich gnttab: make sure grant map operations don't skip their IOMMU part