Hello community,
here is the log from the commit of package xen for openSUSE:Factory checked in at 2017-11-03 16:22:52
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/xen (Old)
and /work/SRC/openSUSE:Factory/.xen.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "xen"
Fri Nov 3 16:22:52 2017 rev:236 rq:538517 version:4.10.0_01
Changes:
--------
--- /work/SRC/openSUSE:Factory/xen/xen.changes 2017-10-17 01:49:56.645669334 +0200
+++ /work/SRC/openSUSE:Factory/.xen.new/xen.changes 2017-11-03 16:23:00.656227202 +0100
@@ -1,0 +2,103 @@
+Thu Nov 2 14:14:02 MDT 2017 - carnold@suse.com
+
+- Update to Xen 4.10.0-rc3 (fate#321394, fate#322686)
+ xen-4.10.0-testing-src.tar.bz2
+- Drop 59f31268-libxc-remove-stale-error-check-for-domain-size.patch
+
+-------------------------------------------------------------------
+Thu Nov 2 11:36:27 UTC 2017 - ohering@suse.de
+
+- Adjust xen-dom0-modules.service to ignore errors (bsc#1065187)
+
+-------------------------------------------------------------------
+Fri Oct 27 07:48:55 MDT 2017 - carnold@suse.com
+
+- fate#324052 Support migration of Xen HVM domains larger than 1TB
+ 59f31268-libxc-remove-stale-error-check-for-domain-size.patch
+
+-------------------------------------------------------------------
+Wed Oct 25 16:26:33 MDT 2017 - carnold@suse.com
+
+- Update to Xen 4.10.0-rc2 (fate#321394, fate#322686)
+ xen-4.10.0-testing-src.tar.bz2
+- Drop until further notice
+ libxl.set-migration-constraints-from-cmdline.patch
+
+-------------------------------------------------------------------
+Mon Oct 16 09:34:23 MDT 2017 - carnold@suse.com
+
+- Update to Xen 4.10.0-rc1 (fate#321394, fate#322686)
+ xen-4.10.0-testing-src.tar.bz2
+- Drop patches included in new tarball
+ 592fd5f0-stop_machine-fill-result-only-in-case-of-error.patch
+ 596f257e-x86-fix-hvmemul_insn_fetch.patch
+ 5982fd99-VT-d-don-t-panic-warn-on-iommu-no-igfx.patch
+ 598c3630-VT-d-PI-disable-when-CPU-side-PI-is-off.patch
+ 598c3706-cpufreq-only-stop-ondemand-governor-if-started.patch
+ 5992f1e5-x86-grant-disallow-misaligned-PTEs.patch
+ 5992f20d-gnttab-split-maptrack-lock-to-make-it-useful-again.patch
+ 5992f233-gnttab-correct-pin-status-fixup-for-copy.patch
+ 59958e76-gnttab-dont-use-possibly-unbounded-tail-calls.patch
+ 59958ebf-gnttab-fix-transitive-grant-handling.patch
+ 59958edd-gnttab-avoid-spurious-maptrack-handle-alloc-failures.patch
+ 599da329-arm-mm-release-grant-lock-on-xatp1-error-paths.patch
+ 59a01223-x86-check-for-alloc-errors-in-modify_xen_mappings.patch
+ 59a0130c-x86-efi-dont-write-relocs-in-efi_arch_relocate_image-1st-pass.patch
+ 59a9221f-VT-d-use-correct-BDF-for-VF-to-search-VT-d-unit.patch
+ 59ae9177-x86-emul-fix-handling-of-unimplemented-Grp7-insns.patch
+ 59aec335-x86emul-correct-VEX-W-handling-for-VPINSRD.patch
+ 59aec375-x86emul-correct-VEX-L-handling-for-VCVTx2SI.patch
+ 59afcea0-x86-introduce-and-use-setup_force_cpu_cap.patch
+ 59b2a7f2-x86-HVM-correct-repeat-count-update-linear-phys.patch
+ 59b7d664-mm-make-sure-node-is-less-than-MAX_NUMNODES.patch
+ 59b7d69b-grant_table-fix-GNTTABOP_cache_flush-handling.patch
+ 59b7d6c8-xenstore-dont-unlink-connection-object-twice.patch
+ 59b7d6d9-gnttab-also-validate-PTE-perms-upon-destroy-replace.patch
+ gcc7-arm.patch
+ gcc7-mini-os.patch
+
+-------------------------------------------------------------------
+Tue Oct 3 09:03:57 MDT 2017 - carnold@suse.com
+
+- bsc#1061084 - VUL-0: xen: page type reference leak on x86
+ (XSA-242)
+ xsa242.patch
+- bsc#1061086 - VUL-0: xen: x86: Incorrect handling of self-linear
+ shadow mappings with translated guests (XSA-243)
+ xsa243.patch
+- bsc#1061087 - VUL-0: xen: x86: Incorrect handling of IST settings
+ during CPU hotplug (XSA-244)
+ xsa244.patch
+
+-------------------------------------------------------------------
+Mon Oct 2 13:26:08 MDT 2017 - carnold@suse.com
+
+- bsc#1061077 - VUL-0: xen: DMOP map/unmap missing argument checks
+ (XSA-238)
+ xsa238.patch
+- bsc#1061080 - VUL-0: xen: hypervisor stack leak in x86 I/O
+ intercept code (XSA-239)
+ xsa239.patch
+- bsc#1061081 - VUL-0: xen: Unlimited recursion in linear pagetable
+ de-typing (XSA-240)
+ xsa240-1.patch
+ xsa240-2.patch
+- bsc#1061082 - VUL-0: xen: Stale TLB entry due to page type
+ release race (XSA-241)
+ xsa241.patch
+
+-------------------------------------------------------------------
+Fri Sep 29 10:57:35 MDT 2017 - carnold@suse.com
+
+- bsc#1061075 - VUL-0: xen: pin count / page reference race in
+ grant table code (XSA-236)
+ xsa236.patch
+- bsc#1061076 - VUL-0: xen: multiple MSI mapping issues on x86
+ (XSA-237)
+ xsa237-1.patch
+ xsa237-2.patch
+ xsa237-3.patch
+ xsa237-4.patch
+ xsa237-5.patch
+
+-------------------------------------------------------------------
Old:
----
592fd5f0-stop_machine-fill-result-only-in-case-of-error.patch
596f257e-x86-fix-hvmemul_insn_fetch.patch
5982fd99-VT-d-don-t-panic-warn-on-iommu-no-igfx.patch
598c3630-VT-d-PI-disable-when-CPU-side-PI-is-off.patch
598c3706-cpufreq-only-stop-ondemand-governor-if-started.patch
5992f1e5-x86-grant-disallow-misaligned-PTEs.patch
5992f20d-gnttab-split-maptrack-lock-to-make-it-useful-again.patch
5992f233-gnttab-correct-pin-status-fixup-for-copy.patch
59958e76-gnttab-dont-use-possibly-unbounded-tail-calls.patch
59958ebf-gnttab-fix-transitive-grant-handling.patch
59958edd-gnttab-avoid-spurious-maptrack-handle-alloc-failures.patch
599da329-arm-mm-release-grant-lock-on-xatp1-error-paths.patch
59a01223-x86-check-for-alloc-errors-in-modify_xen_mappings.patch
59a0130c-x86-efi-dont-write-relocs-in-efi_arch_relocate_image-1st-pass.patch
59a9221f-VT-d-use-correct-BDF-for-VF-to-search-VT-d-unit.patch
59ae9177-x86-emul-fix-handling-of-unimplemented-Grp7-insns.patch
59aec335-x86emul-correct-VEX-W-handling-for-VPINSRD.patch
59aec375-x86emul-correct-VEX-L-handling-for-VCVTx2SI.patch
59afcea0-x86-introduce-and-use-setup_force_cpu_cap.patch
59b2a7f2-x86-HVM-correct-repeat-count-update-linear-phys.patch
59b7d664-mm-make-sure-node-is-less-than-MAX_NUMNODES.patch
59b7d69b-grant_table-fix-GNTTABOP_cache_flush-handling.patch
59b7d6c8-xenstore-dont-unlink-connection-object-twice.patch
59b7d6d9-gnttab-also-validate-PTE-perms-upon-destroy-replace.patch
gcc7-arm.patch
gcc7-mini-os.patch
libxl.set-migration-constraints-from-cmdline.patch
xen-4.9.0-testing-src.tar.bz2
New:
----
xen-4.10.0-testing-src.tar.bz2
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Other differences:
------------------
++++++ xen.spec ++++++
--- /var/tmp/diff_new_pack.vE8JNr/_old 2017-11-03 16:23:03.496123841 +0100
+++ /var/tmp/diff_new_pack.vE8JNr/_new 2017-11-03 16:23:03.496123841 +0100
@@ -21,7 +21,7 @@
Name: xen
ExclusiveArch: %ix86 x86_64 %arm aarch64
%define changeset 35349
-%define xen_build_dir xen-4.9.0-testing
+%define xen_build_dir xen-4.10.0-testing
#
%define with_gdbsx 0
%define with_dom0_support 0
@@ -126,12 +126,12 @@
BuildRequires: pesign-obs-integration
%endif
-Version: 4.9.0_50
+Version: 4.10.0_01
Release: 0
Summary: Xen Virtualization: Hypervisor (aka VMM aka Microkernel)
License: GPL-2.0
Group: System/Kernel
-Source0: xen-4.9.0-testing-src.tar.bz2
+Source0: xen-4.10.0-testing-src.tar.bz2
Source1: stubdom.tar.bz2
Source5: ipxe.tar.bz2
Source6: mini-os.tar.bz2
@@ -161,30 +161,6 @@
# For xen-libs
Source99: baselibs.conf
# Upstream patches
-Patch1: 592fd5f0-stop_machine-fill-result-only-in-case-of-error.patch
-Patch2: 596f257e-x86-fix-hvmemul_insn_fetch.patch
-Patch3: 5982fd99-VT-d-don-t-panic-warn-on-iommu-no-igfx.patch
-Patch4: 598c3630-VT-d-PI-disable-when-CPU-side-PI-is-off.patch
-Patch5: 598c3706-cpufreq-only-stop-ondemand-governor-if-started.patch
-Patch6: 5992f1e5-x86-grant-disallow-misaligned-PTEs.patch
-Patch7: 5992f20d-gnttab-split-maptrack-lock-to-make-it-useful-again.patch
-Patch8: 5992f233-gnttab-correct-pin-status-fixup-for-copy.patch
-Patch9: 59958e76-gnttab-dont-use-possibly-unbounded-tail-calls.patch
-Patch10: 59958ebf-gnttab-fix-transitive-grant-handling.patch
-Patch11: 59958edd-gnttab-avoid-spurious-maptrack-handle-alloc-failures.patch
-Patch12: 599da329-arm-mm-release-grant-lock-on-xatp1-error-paths.patch
-Patch13: 59a01223-x86-check-for-alloc-errors-in-modify_xen_mappings.patch
-Patch14: 59a0130c-x86-efi-dont-write-relocs-in-efi_arch_relocate_image-1st-pass.patch
-Patch15: 59a9221f-VT-d-use-correct-BDF-for-VF-to-search-VT-d-unit.patch
-Patch16: 59ae9177-x86-emul-fix-handling-of-unimplemented-Grp7-insns.patch
-Patch17: 59aec335-x86emul-correct-VEX-W-handling-for-VPINSRD.patch
-Patch18: 59aec375-x86emul-correct-VEX-L-handling-for-VCVTx2SI.patch
-Patch19: 59afcea0-x86-introduce-and-use-setup_force_cpu_cap.patch
-Patch20: 59b2a7f2-x86-HVM-correct-repeat-count-update-linear-phys.patch
-Patch21: 59b7d664-mm-make-sure-node-is-less-than-MAX_NUMNODES.patch
-Patch22: 59b7d69b-grant_table-fix-GNTTABOP_cache_flush-handling.patch
-Patch23: 59b7d6c8-xenstore-dont-unlink-connection-object-twice.patch
-Patch24: 59b7d6d9-gnttab-also-validate-PTE-perms-upon-destroy-replace.patch
# Our platform specific patches
Patch400: xen-destdir.patch
Patch401: vif-bridge-no-iptables.patch
@@ -198,8 +174,6 @@
Patch421: xenpaging.doc.patch
Patch422: stubdom-have-iovec.patch
Patch423: vif-route.patch
-Patch424: gcc7-mini-os.patch
-Patch425: gcc7-arm.patch
# Other bug fixes or features
Patch451: xenconsole-no-multiple-connections.patch
Patch452: hibernate.patch
@@ -211,12 +185,11 @@
Patch458: aarch64-rename-PSR_MODE_ELxx-to-match-linux-headers.patch
Patch459: aarch64-maybe-uninitialized.patch
Patch460: CVE-2014-0222-blktap-qcow1-validate-l2-table-size.patch
-Patch461: libxl.pvscsi.patch
-Patch462: xen.libxl.dmmd.patch
+Patch461: blktap2-no-uninit.patch
+Patch462: libxc.sr.superpage.patch
Patch463: libxl.add-option-to-disable-disk-cache-flushes-in-qdisk.patch
-Patch464: blktap2-no-uninit.patch
-Patch465: libxl.set-migration-constraints-from-cmdline.patch
-Patch467: libxc.sr.superpage.patch
+Patch464: libxl.pvscsi.patch
+Patch465: xen.libxl.dmmd.patch
# Hypervisor and PV driver Patches
Patch601: x86-ioapic-ack-default.patch
Patch602: x86-cpufreq-report.patch
@@ -369,30 +342,6 @@
%prep
%setup -q -n %xen_build_dir -a 1 -a 5 -a 6 -a 57
# Upstream patches
-%patch1 -p1
-%patch2 -p1
-%patch3 -p1
-%patch4 -p1
-%patch5 -p1
-%patch6 -p1
-%patch7 -p1
-%patch8 -p1
-%patch9 -p1
-%patch10 -p1
-%patch11 -p1
-%patch12 -p1
-%patch13 -p1
-%patch14 -p1
-%patch15 -p1
-%patch16 -p1
-%patch17 -p1
-%patch18 -p1
-%patch19 -p1
-%patch20 -p1
-%patch21 -p1
-%patch22 -p1
-%patch23 -p1
-%patch24 -p1
# Our platform specific patches
%patch400 -p1
%patch401 -p1
@@ -406,8 +355,6 @@
%patch421 -p1
%patch422 -p1
%patch423 -p1
-%patch424 -p1
-%patch425 -p1
# Other bug fixes or features
%patch451 -p1
%patch452 -p1
@@ -418,14 +365,12 @@
%patch457 -p1
%patch458 -p1
%patch459 -p1
-# libxl.pvscsi.patch
%patch460 -p1
%patch461 -p1
%patch462 -p1
%patch463 -p1
%patch464 -p1
%patch465 -p1
-%patch467 -p1
# Hypervisor and PV driver Patches
%patch601 -p1
%patch602 -p1
@@ -754,7 +699,7 @@
`"
for mod in $mods
do
- echo "ExecStart=-/usr/bin/env modprobe $mod" >> $RPM_BUILD_ROOT%{_unitdir}/${bn}
+ echo "ExecStart=-/bin/sh -c 'modprobe $mod || :'" >> $RPM_BUILD_ROOT%{_unitdir}/${bn}
done
rm -rfv $RPM_BUILD_ROOT%{_initddir}
install -m644 %SOURCE35 $RPM_BUILD_ROOT/var/adm/fillup-templates/sysconfig.pciback
@@ -847,7 +792,7 @@
%ifarch x86_64
/usr/bin/xen-cpuid
%endif
-/usr/sbin/tap*
+#/usr/sbin/tap*
/usr/sbin/xenbaked
/usr/sbin/xenconsoled
/usr/sbin/xencov
@@ -864,10 +809,10 @@
/usr/sbin/xentrace_setsize
/usr/sbin/xentrace_setmask
/usr/sbin/xenwatchdogd
-/usr/sbin/lock-util
-/usr/sbin/td-util
-/usr/sbin/vhd-update
-/usr/sbin/vhd-util
+#/usr/sbin/lock-util
+#/usr/sbin/td-util
+#/usr/sbin/vhd-update
+#/usr/sbin/vhd-util
/usr/sbin/flask-get-bool
/usr/sbin/flask-getenforce
/usr/sbin/flask-label-pci
@@ -890,6 +835,7 @@
/usr/sbin/xen-destroy
/usr/sbin/xen-bugtool
/usr/sbin/xen-livepatch
+/usr/sbin/xen-diag
%dir %attr(700,root,root) /etc/xen
%dir /etc/xen/scripts
/etc/xen/scripts/block*
@@ -1037,7 +983,7 @@
/usr/include/*
%{_datadir}/pkgconfig/xenlight.pc
%{_datadir}/pkgconfig/xlutil.pc
-%{_datadir}/pkgconfig/xenblktapctl.pc
+#%{_datadir}/pkgconfig/xenblktapctl.pc
%{_datadir}/pkgconfig/xencall.pc
%{_datadir}/pkgconfig/xencontrol.pc
%{_datadir}/pkgconfig/xendevicemodel.pc
@@ -1047,6 +993,7 @@
%{_datadir}/pkgconfig/xenguest.pc
%{_datadir}/pkgconfig/xenstat.pc
%{_datadir}/pkgconfig/xenstore.pc
+%{_datadir}/pkgconfig/xentoolcore.pc
%{_datadir}/pkgconfig/xentoollog.pc
%{_datadir}/pkgconfig/xenvchan.pc
++++++ ipxe.tar.bz2 ++++++
Binary files old/tools/firmware/etherboot/ipxe.tar.gz and new/tools/firmware/etherboot/ipxe.tar.gz differ
++++++ libxc.sr.superpage.patch ++++++
--- /var/tmp/diff_new_pack.vE8JNr/_old 2017-11-03 16:23:04.220097491 +0100
+++ /var/tmp/diff_new_pack.vE8JNr/_new 2017-11-03 16:23:04.220097491 +0100
@@ -12,8 +12,10 @@
must be freed on the receiving side to avoid over-allocation.
The existing code for x86_pv is moved unmodified into its own file.
---- a/tools/libxc/xc_dom_x86.c
-+++ b/tools/libxc/xc_dom_x86.c
+Index: xen-4.10.0-testing/tools/libxc/xc_dom_x86.c
+===================================================================
+--- xen-4.10.0-testing.orig/tools/libxc/xc_dom_x86.c
++++ xen-4.10.0-testing/tools/libxc/xc_dom_x86.c
@@ -43,11 +43,6 @@
#define SUPERPAGE_BATCH_SIZE 512
@@ -26,8 +28,10 @@
#define X86_CR0_PE 0x01
#define X86_CR0_ET 0x10
---- a/tools/libxc/xc_private.h
-+++ b/tools/libxc/xc_private.h
+Index: xen-4.10.0-testing/tools/libxc/xc_private.h
+===================================================================
+--- xen-4.10.0-testing.orig/tools/libxc/xc_private.h
++++ xen-4.10.0-testing/tools/libxc/xc_private.h
@@ -69,6 +69,11 @@ struct iovec {
#define DECLARE_FLASK_OP struct xen_flask_op op
#define DECLARE_PLATFORM_OP struct xen_platform_op platform_op
@@ -40,8 +44,10 @@
#undef PAGE_SHIFT
#undef PAGE_SIZE
#undef PAGE_MASK
---- a/tools/libxc/xc_sr_common.c
-+++ b/tools/libxc/xc_sr_common.c
+Index: xen-4.10.0-testing/tools/libxc/xc_sr_common.c
+===================================================================
+--- xen-4.10.0-testing.orig/tools/libxc/xc_sr_common.c
++++ xen-4.10.0-testing/tools/libxc/xc_sr_common.c
@@ -156,6 +156,47 @@ static void __attribute__((unused)) buil
}
@@ -90,8 +96,10 @@
* Local variables:
* mode: C
* c-file-style: "BSD"
---- a/tools/libxc/xc_sr_common.h
-+++ b/tools/libxc/xc_sr_common.h
+Index: xen-4.10.0-testing/tools/libxc/xc_sr_common.h
+===================================================================
+--- xen-4.10.0-testing.orig/tools/libxc/xc_sr_common.h
++++ xen-4.10.0-testing/tools/libxc/xc_sr_common.h
@@ -140,6 +140,16 @@ struct xc_sr_restore_ops
int (*setup)(struct xc_sr_context *ctx);
@@ -122,7 +130,7 @@
struct xc_sr_context
{
xc_interface *xch;
-@@ -219,6 +235,8 @@ struct xc_sr_context
+@@ -216,6 +232,8 @@ struct xc_sr_context
int send_back_fd;
unsigned long p2m_size;
@@ -131,8 +139,8 @@
xc_hypercall_buffer_t dirty_bitmap_hbuf;
/* From Image Header. */
-@@ -256,8 +274,7 @@ struct xc_sr_context
- domid_t xenstore_domid, console_domid;
+@@ -253,8 +271,7 @@ struct xc_sr_context
+ uint32_t xenstore_domid, console_domid;
/* Bitmap of currently populated PFNs during restore. */
- unsigned long *populated_pfns;
@@ -141,7 +149,7 @@
/* Sender has invoked verify mode on the stream. */
bool verify;
-@@ -332,6 +349,12 @@ struct xc_sr_context
+@@ -329,6 +346,12 @@ struct xc_sr_context
/* HVM context blob. */
void *context;
size_t contextsz;
@@ -154,7 +162,7 @@
} restore;
};
} x86_hvm;
-@@ -344,6 +367,69 @@ extern struct xc_sr_save_ops save_ops_x8
+@@ -341,6 +364,69 @@ extern struct xc_sr_save_ops save_ops_x8
extern struct xc_sr_restore_ops restore_ops_x86_pv;
extern struct xc_sr_restore_ops restore_ops_x86_hvm;
@@ -224,7 +232,7 @@
struct xc_sr_record
{
uint32_t type;
-@@ -392,14 +478,6 @@ static inline int write_record(struct xc
+@@ -389,14 +475,6 @@ static inline int write_record(struct xc
*/
int read_record(struct xc_sr_context *ctx, int fd, struct xc_sr_record *rec);
@@ -239,8 +247,10 @@
#endif
/*
* Local variables:
---- a/tools/libxc/xc_sr_restore.c
-+++ b/tools/libxc/xc_sr_restore.c
+Index: xen-4.10.0-testing/tools/libxc/xc_sr_restore.c
+===================================================================
+--- xen-4.10.0-testing.orig/tools/libxc/xc_sr_restore.c
++++ xen-4.10.0-testing/tools/libxc/xc_sr_restore.c
@@ -69,132 +69,6 @@ static int read_headers(struct xc_sr_con
}
@@ -405,7 +415,7 @@
if ( ctx->restore.ops.cleanup(ctx) )
PERROR("Failed to clean up");
}
-@@ -887,7 +759,12 @@ int xc_domain_restore(xc_interface *xch,
+@@ -886,7 +758,12 @@ int xc_domain_restore(xc_interface *xch,
return -1;
}
@@ -418,8 +428,10 @@
if ( ctx.dominfo.hvm )
{
---- a/tools/libxc/xc_sr_restore_x86_hvm.c
-+++ b/tools/libxc/xc_sr_restore_x86_hvm.c
+Index: xen-4.10.0-testing/tools/libxc/xc_sr_restore_x86_hvm.c
+===================================================================
+--- xen-4.10.0-testing.orig/tools/libxc/xc_sr_restore_x86_hvm.c
++++ xen-4.10.0-testing/tools/libxc/xc_sr_restore_x86_hvm.c
@@ -135,6 +135,8 @@ static int x86_hvm_localise_page(struct
static int x86_hvm_setup(struct xc_sr_context *ctx)
{
@@ -429,9 +441,9 @@
if ( ctx->restore.guest_type != DHDR_TYPE_X86_HVM )
{
-@@ -149,7 +151,30 @@ static int x86_hvm_setup(struct xc_sr_co
- return -1;
+@@ -158,7 +160,30 @@ static int x86_hvm_setup(struct xc_sr_co
}
+ #endif
+ bm = &ctx->x86_hvm.restore.attempted_1g;
+ bits = (ctx->restore.p2m_size >> SUPERPAGE_1GB_SHIFT) + 1;
@@ -460,7 +472,7 @@
}
/*
-@@ -224,10 +249,325 @@ static int x86_hvm_stream_complete(struc
+@@ -233,10 +258,325 @@ static int x86_hvm_stream_complete(struc
static int x86_hvm_cleanup(struct xc_sr_context *ctx)
{
free(ctx->x86_hvm.restore.context);
@@ -786,7 +798,7 @@
struct xc_sr_restore_ops restore_ops_x86_hvm =
{
.pfn_is_valid = x86_hvm_pfn_is_valid,
-@@ -236,6 +576,7 @@ struct xc_sr_restore_ops restore_ops_x86
+@@ -245,6 +585,7 @@ struct xc_sr_restore_ops restore_ops_x86
.set_page_type = x86_hvm_set_page_type,
.localise_page = x86_hvm_localise_page,
.setup = x86_hvm_setup,
@@ -794,8 +806,10 @@
.process_record = x86_hvm_process_record,
.stream_complete = x86_hvm_stream_complete,
.cleanup = x86_hvm_cleanup,
---- a/tools/libxc/xc_sr_restore_x86_pv.c
-+++ b/tools/libxc/xc_sr_restore_x86_pv.c
+Index: xen-4.10.0-testing/tools/libxc/xc_sr_restore_x86_pv.c
+===================================================================
+--- xen-4.10.0-testing.orig/tools/libxc/xc_sr_restore_x86_pv.c
++++ xen-4.10.0-testing/tools/libxc/xc_sr_restore_x86_pv.c
@@ -937,6 +937,75 @@ static void x86_pv_set_gfn(struct xc_sr_
}
++++++ libxl.add-option-to-disable-disk-cache-flushes-in-qdisk.patch ++++++
--- /var/tmp/diff_new_pack.vE8JNr/_old 2017-11-03 16:23:04.232097055 +0100
+++ /var/tmp/diff_new_pack.vE8JNr/_new 2017-11-03 16:23:04.232097055 +0100
@@ -7,11 +7,11 @@
tools/libxl/libxlu_disk_l.l | 1 +
5 files changed, 18 insertions(+), 1 deletion(-)
-Index: xen-4.9.0-testing/tools/libxl/libxl_disk.c
+Index: xen-4.10.0-testing/tools/libxl/libxl_disk.c
===================================================================
---- xen-4.9.0-testing.orig/tools/libxl/libxl_disk.c
-+++ xen-4.9.0-testing/tools/libxl/libxl_disk.c
-@@ -411,6 +411,8 @@ static void device_disk_add(libxl__egc *
+--- xen-4.10.0-testing.orig/tools/libxl/libxl_disk.c
++++ xen-4.10.0-testing/tools/libxl/libxl_disk.c
+@@ -406,6 +406,8 @@ static void device_disk_add(libxl__egc *
flexarray_append_pair(back, "discard-enable",
libxl_defbool_val(disk->discard_enable) ?
"1" : "0");
@@ -20,12 +20,12 @@
flexarray_append(front, "backend-id");
flexarray_append(front, GCSPRINTF("%d", disk->backend_domid));
-Index: xen-4.9.0-testing/tools/libxl/libxl.h
+Index: xen-4.10.0-testing/tools/libxl/libxl.h
===================================================================
---- xen-4.9.0-testing.orig/tools/libxl/libxl.h
-+++ xen-4.9.0-testing/tools/libxl/libxl.h
-@@ -306,6 +306,18 @@
- #define LIBXL_HAVE_BUILDINFO_HVM_ACPI_LAPTOP_SLATE 1
+--- xen-4.10.0-testing.orig/tools/libxl/libxl.h
++++ xen-4.10.0-testing/tools/libxl/libxl.h
+@@ -348,6 +348,18 @@
+ #define LIBXL_HAVE_BUILDINFO_BOOTLOADER_ARGS 1
/*
+ * The libxl_device_disk has no way to indicate that cache=unsafe is
@@ -43,10 +43,10 @@
* libxl ABI compatibility
*
* The only guarantee which libxl makes regarding ABI compatibility
-Index: xen-4.9.0-testing/tools/libxl/libxlu_disk.c
+Index: xen-4.10.0-testing/tools/libxl/libxlu_disk.c
===================================================================
---- xen-4.9.0-testing.orig/tools/libxl/libxlu_disk.c
-+++ xen-4.9.0-testing/tools/libxl/libxlu_disk.c
+--- xen-4.10.0-testing.orig/tools/libxl/libxlu_disk.c
++++ xen-4.10.0-testing/tools/libxl/libxlu_disk.c
@@ -79,6 +79,8 @@ int xlu_disk_parse(XLU_Config *cfg,
if (!disk->pdev_path || !strcmp(disk->pdev_path, ""))
disk->format = LIBXL_DISK_FORMAT_EMPTY;
@@ -56,10 +56,10 @@
if (!disk->vdev) {
xlu__disk_err(&dpc,0, "no vdev specified");
-Index: xen-4.9.0-testing/tools/libxl/libxlu_disk_i.h
+Index: xen-4.10.0-testing/tools/libxl/libxlu_disk_i.h
===================================================================
---- xen-4.9.0-testing.orig/tools/libxl/libxlu_disk_i.h
-+++ xen-4.9.0-testing/tools/libxl/libxlu_disk_i.h
+--- xen-4.10.0-testing.orig/tools/libxl/libxlu_disk_i.h
++++ xen-4.10.0-testing/tools/libxl/libxlu_disk_i.h
@@ -10,7 +10,7 @@ typedef struct {
void *scanner;
YY_BUFFER_STATE buf;
@@ -69,10 +69,10 @@
const char *spec;
} DiskParseContext;
-Index: xen-4.9.0-testing/tools/libxl/libxlu_disk_l.l
+Index: xen-4.10.0-testing/tools/libxl/libxlu_disk_l.l
===================================================================
---- xen-4.9.0-testing.orig/tools/libxl/libxlu_disk_l.l
-+++ xen-4.9.0-testing/tools/libxl/libxlu_disk_l.l
+--- xen-4.10.0-testing.orig/tools/libxl/libxlu_disk_l.l
++++ xen-4.10.0-testing/tools/libxl/libxlu_disk_l.l
@@ -196,6 +196,7 @@ colo-port=[^,]*,? { STRIP(','); setcolop
colo-export=[^,]*,? { STRIP(','); SAVESTRING("colo-export", colo_export, FROMEQUALS); }
active-disk=[^,]*,? { STRIP(','); SAVESTRING("active-disk", active_disk, FROMEQUALS); }
++++++ libxl.pvscsi.patch ++++++
--- /var/tmp/diff_new_pack.vE8JNr/_old 2017-11-03 16:23:04.244096618 +0100
+++ /var/tmp/diff_new_pack.vE8JNr/_new 2017-11-03 16:23:04.248096472 +0100
@@ -34,11 +34,11 @@
tools/libxl/xl_cmdtable.c | 15
16 files changed, 2326 insertions(+), 4 deletions(-)
-Index: xen-4.9.0-testing/docs/man/xl.cfg.pod.5.in
+Index: xen-4.10.0-testing/docs/man/xl.cfg.pod.5.in
===================================================================
---- xen-4.9.0-testing.orig/docs/man/xl.cfg.pod.5.in
-+++ xen-4.9.0-testing/docs/man/xl.cfg.pod.5.in
-@@ -550,6 +550,62 @@ Specify the backend domain name or id, d
+--- xen-4.10.0-testing.orig/docs/man/xl.cfg.pod.5.in
++++ xen-4.10.0-testing/docs/man/xl.cfg.pod.5.in
+@@ -650,6 +650,62 @@ Specify the backend domain name or id, d
=back
@@ -101,11 +101,11 @@
=item B