Hello community,
here is the log from the commit of package xen for openSUSE:Factory checked in at 2018-12-10 12:27:01
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/xen (Old)
and /work/SRC/openSUSE:Factory/.xen.new.19453 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "xen"
Mon Dec 10 12:27:01 2018 rev:258 rq:654117 version:4.11.1_02
Changes:
--------
--- /work/SRC/openSUSE:Factory/xen/xen.changes 2018-12-03 10:04:29.840033854 +0100
+++ /work/SRC/openSUSE:Factory/.xen.new.19453/xen.changes 2018-12-10 12:27:04.798602401 +0100
@@ -1,0 +2,82 @@
+Tue Dec 4 13:19:21 MST 2018 - carnold@suse.com
+
+- Update to Xen 4.11.1 bug fix release (bsc#1027519)
+ xen-4.11.1-testing-src.tar.bz2
+- 5b505d59-tools-xentop-replace-use-of-deprecated-vwprintw.patch
+ replaces xen.2b50cdbc444c637575580dcfa6c9525a84d5cc62.patch
+- 5b76ec82-libxl-arm-Fix-build-on-arm64-acpi-w-gcc-8.2.patch
+ replaces xen.b8f33431f3dd23fb43a879f4bdb4283fdc9465ad.patch
+- Drop the following patches contained in the new tarball
+ 5b34b8fe-VMX-defer-vmx_vmcs_exit-as-long-as-possible.patch
+ 5b3cab8e-1-VMX-MSR_DEBUGCTL-handling.patch
+ 5b3cab8e-2-VMX-improve-MSR-load-save-API.patch
+ 5b3cab8e-3-VMX-cleanup-MSR-load-save-infra.patch
+ 5b3cab8f-1-VMX-factor-out-locate_msr_entry.patch
+ 5b3cab8f-2-VMX-remote-access-to-MSR-lists.patch
+ 5b3cab8f-3-VMX-improve-LBR-MSR-handling.patch
+ 5b3cab8f-4-VMX-pass-MSR-value-into-vmx_msr_add.patch
+ 5b3cab8f-5-VMX-load-only-guest-MSR-entries.patch
+ 5b3f8fa5-port-array_index_nospec-from-Linux.patch
+ 5b4321f6-x86-correctly-set-nonlazy_xstate_used-when-loading-full-state.patch
+ 5b4488e7-x86-spec-ctrl-cmdline-handling.patch
+ 5b471517-page_alloc-correct-first_dirty-calc-in-block-merging.patch
+ 5b4c9a60-allow-cpu_down-to-be-called-earlier.patch
+ 5b4db308-SVM-fix-cleanup-svm_inject_event.patch
+ 5b5040c3-cpupools-fix-state-when-downing-a-CPU-failed.patch
+ 5b5040f2-x86-AMD-distinguish-CU-from-HT.patch
+ 5b505fe5-VMX-fix-find-msr-build.patch
+ 5b508775-1-x86-distinguish-CPU-offlining-and-removal.patch
+ 5b508775-2-x86-possibly-bring-up-all-CPUs.patch
+ 5b508775-3-x86-cmdline-opt-to-avoid-use-of-secondary-HTs.patch
+ 5b508ce8-VMX-dont-clobber-dr6-while-debug-state-is-lazy.patch
+ 5b50df16-1-x86-xstate-use-guest-CPUID-policy.patch
+ 5b50df16-2-x86-make-xstate-calculation-errors-more-obvious.patch
+ 5b56feb1-hvm-Disallow-unknown-MSR_EFER-bits.patch
+ 5b56feb2-spec-ctrl-Fix-the-parsing-of-xpti--on-fixed-Intel-hardware.patch
+ 5b62ca93-VMX-avoid-hitting-BUG_ON.patch
+ 5b6d84ac-x86-fix-improve-vlapic-read-write.patch
+ 5b6d8ce2-x86-XPTI-parsing.patch
+ 5b72fbbe-ARM-disable-grant-table-v2.patch
+ 5b72fbbe-oxenstored-eval-order.patch
+ 5b72fbbe-vtx-Fix-the-checking-for-unknown-invalid-MSR_DEBUGCTL-bits.patch
+ 5b72fbbf-1-spec-ctrl-Calculate-safe-PTE-addresses-for-L1TF-mitigations.patch
+ 5b72fbbf-2-spec-ctrl-Introduce-an-option-to-control-L1TF-mitigation-for-PV-guests.patch
+ 5b72fbbf-3-shadow-Infrastructure-to-force-a-PV-guest-into-shadow-mode.patch
+ 5b72fbbf-4-mm-Plumbing-to-allow-any-PTE-update-to-fail-with--ERESTART.patch
+ 5b72fbbf-5-pv-Force-a-guest-into-shadow-mode-when-it-writes-an-L1TF-vulnerable-PTE.patch
+ 5b72fbbf-6-spec-ctrl-CPUID-MSR-definitions-for-L1D_FLUSH.patch
+ 5b72fbbf-7-msr-Virtualise-MSR_FLUSH_CMD-for-guests.patch
+ 5b72fbbf-8-spec-ctrl-Introduce-an-option-to-control-L1D_FLUSH-for-HVM-HAP-guests.patch
+ 5b72fbbf-x86-Make-spec-ctrl-no-a-global-disable-of-all-mitigations.patch
+ 5b72fbbf-xl.conf-Add-global-affinity-masks.patch
+ 5b74190e-x86-hvm-ioreq-MMIO-range-check-honor-DF.patch
+ 5b752762-x86-hvm-emul-rep-IO-should-not-cross-GFN-boundaries.patch
+ 5b75afef-x86-setup-avoid-OoB-E820-lookup.patch
+ 5b76b780-rangeset-inquiry-functions-tolerate-NULL.patch
+ 5b83c654-VT-d-dmar-iommu-mem-leak-fix.patch
+ 5b8d5832-x86-assorted-array_index_nospec-insertions.patch
+ 5ba11ed4-credit2-fix-moving-CPUs-between-cpupools.patch
+ 5bacae4b-x86-boot-allocate-extra-module-slot.patch
+ 5bae44ce-x86-silence-false-log-messages.patch
+ 5bb60c12-x86-split-opt_xpti.patch
+ 5bb60c4f-x86-split-opt_pv_l1tf.patch
+ 5bb60c74-x86-fix-xpti-and-pv-l1tf.patch
+ 5bcf0722-x86-boot-enable-NMIs.patch
+ 5bd076e9-dombuilder-init-vcpu-debug-regs-correctly.patch
+ 5bd076e9-x86-boot-init-debug-regs-correctly.patch
+ 5bd076e9-x86-init-vcpu-debug-regs-correctly.patch
+ 5bd0e0cf-vvmx-Disallow-the-use-of-VT-x-instructions-when-nested-virt-is-disabled.patch
+ 5bd0e11b-x86-disallow-VT-x-insns-without-nested-virt.patch
+ 5bd85bfd-x86-fix-crash-on-xl-set-parameter-pcid.patch
+ 5be2a308-x86-extend-get_platform_badpages.patch
+ 5be2a354-x86-work-around-HLE-host-lockup-erratum.patch
+ xsa275-1.patch
+ xsa275-2.patch
+ xsa276-1.patch
+ xsa276-2.patch
+ xsa277.patch
+ xsa279.patch
+ xsa280-1.patch
+ xsa280-2.patch
+
+-------------------------------------------------------------------
@@ -52,0 +135,7 @@
+
+-------------------------------------------------------------------
+Tue Nov 6 08:33:59 MST 2018 - carnold@suse.com
+
+- bsc#1114405 - VUL-0: CVE-2018-18883: xen: Nested VT-x usable even
+ when disabled (XSA-278)
+ 5bd0e0cf-vvmx-Disallow-the-use-of-VT-x-instructions-when-nested-virt-is-disabled.patch
Old:
----
5b34b8fe-VMX-defer-vmx_vmcs_exit-as-long-as-possible.patch
5b3cab8e-1-VMX-MSR_DEBUGCTL-handling.patch
5b3cab8e-2-VMX-improve-MSR-load-save-API.patch
5b3cab8e-3-VMX-cleanup-MSR-load-save-infra.patch
5b3cab8f-1-VMX-factor-out-locate_msr_entry.patch
5b3cab8f-2-VMX-remote-access-to-MSR-lists.patch
5b3cab8f-3-VMX-improve-LBR-MSR-handling.patch
5b3cab8f-4-VMX-pass-MSR-value-into-vmx_msr_add.patch
5b3cab8f-5-VMX-load-only-guest-MSR-entries.patch
5b3f8fa5-port-array_index_nospec-from-Linux.patch
5b4321f6-x86-correctly-set-nonlazy_xstate_used-when-loading-full-state.patch
5b4488e7-x86-spec-ctrl-cmdline-handling.patch
5b471517-page_alloc-correct-first_dirty-calc-in-block-merging.patch
5b4c9a60-allow-cpu_down-to-be-called-earlier.patch
5b4db308-SVM-fix-cleanup-svm_inject_event.patch
5b5040c3-cpupools-fix-state-when-downing-a-CPU-failed.patch
5b5040f2-x86-AMD-distinguish-CU-from-HT.patch
5b505fe5-VMX-fix-find-msr-build.patch
5b508775-1-x86-distinguish-CPU-offlining-and-removal.patch
5b508775-2-x86-possibly-bring-up-all-CPUs.patch
5b508775-3-x86-cmdline-opt-to-avoid-use-of-secondary-HTs.patch
5b508ce8-VMX-dont-clobber-dr6-while-debug-state-is-lazy.patch
5b50df16-1-x86-xstate-use-guest-CPUID-policy.patch
5b50df16-2-x86-make-xstate-calculation-errors-more-obvious.patch
5b56feb1-hvm-Disallow-unknown-MSR_EFER-bits.patch
5b56feb2-spec-ctrl-Fix-the-parsing-of-xpti--on-fixed-Intel-hardware.patch
5b62ca93-VMX-avoid-hitting-BUG_ON.patch
5b6d84ac-x86-fix-improve-vlapic-read-write.patch
5b6d8ce2-x86-XPTI-parsing.patch
5b72fbbe-ARM-disable-grant-table-v2.patch
5b72fbbe-oxenstored-eval-order.patch
5b72fbbe-vtx-Fix-the-checking-for-unknown-invalid-MSR_DEBUGCTL-bits.patch
5b72fbbf-1-spec-ctrl-Calculate-safe-PTE-addresses-for-L1TF-mitigations.patch
5b72fbbf-2-spec-ctrl-Introduce-an-option-to-control-L1TF-mitigation-for-PV-guests.patch
5b72fbbf-3-shadow-Infrastructure-to-force-a-PV-guest-into-shadow-mode.patch
5b72fbbf-4-mm-Plumbing-to-allow-any-PTE-update-to-fail-with--ERESTART.patch
5b72fbbf-5-pv-Force-a-guest-into-shadow-mode-when-it-writes-an-L1TF-vulnerable-PTE.patch
5b72fbbf-6-spec-ctrl-CPUID-MSR-definitions-for-L1D_FLUSH.patch
5b72fbbf-7-msr-Virtualise-MSR_FLUSH_CMD-for-guests.patch
5b72fbbf-8-spec-ctrl-Introduce-an-option-to-control-L1D_FLUSH-for-HVM-HAP-guests.patch
5b72fbbf-x86-Make-spec-ctrl-no-a-global-disable-of-all-mitigations.patch
5b72fbbf-xl.conf-Add-global-affinity-masks.patch
5b74190e-x86-hvm-ioreq-MMIO-range-check-honor-DF.patch
5b752762-x86-hvm-emul-rep-IO-should-not-cross-GFN-boundaries.patch
5b75afef-x86-setup-avoid-OoB-E820-lookup.patch
5b76b780-rangeset-inquiry-functions-tolerate-NULL.patch
5b83c654-VT-d-dmar-iommu-mem-leak-fix.patch
5b8d5832-x86-assorted-array_index_nospec-insertions.patch
5ba11ed4-credit2-fix-moving-CPUs-between-cpupools.patch
5bacae4b-x86-boot-allocate-extra-module-slot.patch
5bae44ce-x86-silence-false-log-messages.patch
5bb60c12-x86-split-opt_xpti.patch
5bb60c4f-x86-split-opt_pv_l1tf.patch
5bb60c74-x86-fix-xpti-and-pv-l1tf.patch
5bcf0722-x86-boot-enable-NMIs.patch
5bd076e9-dombuilder-init-vcpu-debug-regs-correctly.patch
5bd076e9-x86-boot-init-debug-regs-correctly.patch
5bd076e9-x86-init-vcpu-debug-regs-correctly.patch
5bd0e11b-x86-disallow-VT-x-insns-without-nested-virt.patch
5bd85bfd-x86-fix-crash-on-xl-set-parameter-pcid.patch
5be2a308-x86-extend-get_platform_badpages.patch
5be2a354-x86-work-around-HLE-host-lockup-erratum.patch
xen-4.11.0-testing-src.tar.bz2
xen.2b50cdbc444c637575580dcfa6c9525a84d5cc62.patch
xen.b8f33431f3dd23fb43a879f4bdb4283fdc9465ad.patch
xsa275-1.patch
xsa275-2.patch
xsa276-1.patch
xsa276-2.patch
xsa277.patch
xsa279.patch
xsa280-1.patch
xsa280-2.patch
New:
----
5b505d59-tools-xentop-replace-use-of-deprecated-vwprintw.patch
5b76ec82-libxl-arm-Fix-build-on-arm64-acpi-w-gcc-8.2.patch
xen-4.11.1-testing-src.tar.bz2
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Other differences:
------------------
++++++ xen.spec ++++++
--- /var/tmp/diff_new_pack.JePiLb/_old 2018-12-10 12:27:06.654600548 +0100
+++ /var/tmp/diff_new_pack.JePiLb/_new 2018-12-10 12:27:06.654600548 +0100
@@ -25,7 +25,7 @@
Name: xen
ExclusiveArch: %ix86 x86_64 %arm aarch64
%define changeset 35349
-%define xen_build_dir xen-4.11.0-testing
+%define xen_build_dir xen-4.11.1-testing
#
%define with_gdbsx 0
%define with_dom0_support 0
@@ -127,12 +127,12 @@
BuildRequires: pesign-obs-integration
%endif
-Version: 4.11.0_09
+Version: 4.11.1_02
Release: 0
Summary: Xen Virtualization: Hypervisor (aka VMM aka Microkernel)
License: GPL-2.0
Group: System/Kernel
-Source0: xen-4.11.0-testing-src.tar.bz2
+Source0: xen-4.11.1-testing-src.tar.bz2
Source1: stubdom.tar.bz2
Source5: ipxe.tar.bz2
Source6: mini-os.tar.bz2
@@ -162,85 +162,15 @@
# For xen-libs
Source99: baselibs.conf
# Upstream patches
-Patch1: 5b3f8fa5-port-array_index_nospec-from-Linux.patch
-Patch2: 5b4488e7-x86-spec-ctrl-cmdline-handling.patch
-Patch3: 5b471517-page_alloc-correct-first_dirty-calc-in-block-merging.patch
-Patch4: 5b4c9a60-allow-cpu_down-to-be-called-earlier.patch
-Patch5: 5b4db308-SVM-fix-cleanup-svm_inject_event.patch
-Patch6: 5b5040c3-cpupools-fix-state-when-downing-a-CPU-failed.patch
-Patch7: 5b5040f2-x86-AMD-distinguish-CU-from-HT.patch
-Patch8: 5b508775-1-x86-distinguish-CPU-offlining-and-removal.patch
-Patch9: 5b508775-2-x86-possibly-bring-up-all-CPUs.patch
-Patch10: 5b508775-3-x86-cmdline-opt-to-avoid-use-of-secondary-HTs.patch
-Patch11: 5b508ce8-VMX-dont-clobber-dr6-while-debug-state-is-lazy.patch
-Patch12: 5b50df16-1-x86-xstate-use-guest-CPUID-policy.patch
-Patch13: 5b50df16-2-x86-make-xstate-calculation-errors-more-obvious.patch
-Patch14: 5b34b8fe-VMX-defer-vmx_vmcs_exit-as-long-as-possible.patch
-Patch15: 5b3cab8e-1-VMX-MSR_DEBUGCTL-handling.patch
-Patch16: 5b3cab8e-2-VMX-improve-MSR-load-save-API.patch
-Patch17: 5b3cab8e-3-VMX-cleanup-MSR-load-save-infra.patch
-Patch18: 5b3cab8f-1-VMX-factor-out-locate_msr_entry.patch
-Patch19: 5b3cab8f-2-VMX-remote-access-to-MSR-lists.patch
-Patch20: 5b3cab8f-3-VMX-improve-LBR-MSR-handling.patch
-Patch21: 5b3cab8f-4-VMX-pass-MSR-value-into-vmx_msr_add.patch
-Patch22: 5b3cab8f-5-VMX-load-only-guest-MSR-entries.patch
-Patch23: 5b4321f6-x86-correctly-set-nonlazy_xstate_used-when-loading-full-state.patch
-Patch24: 5b505fe5-VMX-fix-find-msr-build.patch
-Patch25: 5b56feb1-hvm-Disallow-unknown-MSR_EFER-bits.patch
-Patch26: 5b56feb2-spec-ctrl-Fix-the-parsing-of-xpti--on-fixed-Intel-hardware.patch
-Patch27: 5b62ca93-VMX-avoid-hitting-BUG_ON.patch
-Patch28: 5b6d84ac-x86-fix-improve-vlapic-read-write.patch
-Patch29: 5b6d8ce2-x86-XPTI-parsing.patch
-Patch30: 5b72fbbe-ARM-disable-grant-table-v2.patch
-Patch31: 5b72fbbe-oxenstored-eval-order.patch
-Patch32: 5b72fbbe-vtx-Fix-the-checking-for-unknown-invalid-MSR_DEBUGCTL-bits.patch
-Patch33: 5b72fbbf-1-spec-ctrl-Calculate-safe-PTE-addresses-for-L1TF-mitigations.patch
-Patch34: 5b72fbbf-2-spec-ctrl-Introduce-an-option-to-control-L1TF-mitigation-for-PV-guests.patch
-Patch35: 5b72fbbf-3-shadow-Infrastructure-to-force-a-PV-guest-into-shadow-mode.patch
-Patch36: 5b72fbbf-4-mm-Plumbing-to-allow-any-PTE-update-to-fail-with--ERESTART.patch
-Patch37: 5b72fbbf-5-pv-Force-a-guest-into-shadow-mode-when-it-writes-an-L1TF-vulnerable-PTE.patch
-Patch38: 5b72fbbf-6-spec-ctrl-CPUID-MSR-definitions-for-L1D_FLUSH.patch
-Patch39: 5b72fbbf-7-msr-Virtualise-MSR_FLUSH_CMD-for-guests.patch
-Patch40: 5b72fbbf-8-spec-ctrl-Introduce-an-option-to-control-L1D_FLUSH-for-HVM-HAP-guests.patch
-Patch41: 5b72fbbf-x86-Make-spec-ctrl-no-a-global-disable-of-all-mitigations.patch
-Patch42: 5b72fbbf-xl.conf-Add-global-affinity-masks.patch
-Patch43: 5b74190e-x86-hvm-ioreq-MMIO-range-check-honor-DF.patch
-Patch44: 5b752762-x86-hvm-emul-rep-IO-should-not-cross-GFN-boundaries.patch
-Patch45: 5b75afef-x86-setup-avoid-OoB-E820-lookup.patch
-Patch46: 5b76b780-rangeset-inquiry-functions-tolerate-NULL.patch
-Patch47: 5b83c654-VT-d-dmar-iommu-mem-leak-fix.patch
-Patch48: 5b8d5832-x86-assorted-array_index_nospec-insertions.patch
-Patch49: 5b8fae26-tools-libxl-correct-vcpu-affinity-output-with-sparse-physical-cpu-map.patch
-Patch50: 5b8fae26-xen-fill-topology-info-for-all-present-cpus.patch
-Patch51: 5b8fb5af-tools-xl-refuse-to-set-number-of-vcpus-to-0-via-xl-vcpu-set.patch
-Patch52: 5b9784ad-x86-HVM-drop-hvm_fetch_from_guest_linear.patch
-Patch53: 5b9784d2-x86-HVM-add-known_gla-helper.patch
-Patch54: 5b9784f2-x86-HVM-split-page-straddling-accesses.patch
-Patch55: 5ba11ed4-credit2-fix-moving-CPUs-between-cpupools.patch
-Patch56: 5bacae4b-x86-boot-allocate-extra-module-slot.patch
-Patch57: 5bae44ce-x86-silence-false-log-messages.patch
-Patch58: 5bb60c12-x86-split-opt_xpti.patch
-Patch59: 5bb60c4f-x86-split-opt_pv_l1tf.patch
-Patch60: 5bb60c74-x86-fix-xpti-and-pv-l1tf.patch
-Patch61: 5bcf0722-x86-boot-enable-NMIs.patch
-Patch62: 5bd076e9-x86-boot-init-debug-regs-correctly.patch
-Patch63: 5bd076e9-x86-init-vcpu-debug-regs-correctly.patch
-Patch64: 5bd076e9-dombuilder-init-vcpu-debug-regs-correctly.patch
-Patch65: 5bd0e11b-x86-disallow-VT-x-insns-without-nested-virt.patch
-Patch66: 5bd85bfd-x86-fix-crash-on-xl-set-parameter-pcid.patch
-Patch67: 5bdc31d5-VMX-fix-vmx_handle_eoi.patch
-Patch68: 5be2a308-x86-extend-get_platform_badpages.patch
-Patch69: 5be2a354-x86-work-around-HLE-host-lockup-erratum.patch
-Patch70: xsa275-1.patch
-Patch71: xsa275-2.patch
-Patch72: xsa276-1.patch
-Patch73: xsa276-2.patch
-Patch74: xsa277.patch
-Patch75: xsa279.patch
-Patch76: xsa280-1.patch
-Patch77: xsa280-2.patch
-Patch78: xen.b8f33431f3dd23fb43a879f4bdb4283fdc9465ad.patch
-Patch79: xen.2b50cdbc444c637575580dcfa6c9525a84d5cc62.patch
+Patch1: 5b505d59-tools-xentop-replace-use-of-deprecated-vwprintw.patch
+Patch2: 5b76ec82-libxl-arm-Fix-build-on-arm64-acpi-w-gcc-8.2.patch
+Patch3: 5b8fae26-tools-libxl-correct-vcpu-affinity-output-with-sparse-physical-cpu-map.patch
+Patch4: 5b8fae26-xen-fill-topology-info-for-all-present-cpus.patch
+Patch5: 5b8fb5af-tools-xl-refuse-to-set-number-of-vcpus-to-0-via-xl-vcpu-set.patch
+Patch6: 5b9784ad-x86-HVM-drop-hvm_fetch_from_guest_linear.patch
+Patch7: 5b9784d2-x86-HVM-add-known_gla-helper.patch
+Patch8: 5b9784f2-x86-HVM-split-page-straddling-accesses.patch
+Patch9: 5bdc31d5-VMX-fix-vmx_handle_eoi.patch
# Our platform specific patches
Patch400: xen-destdir.patch
Patch401: vif-bridge-no-iptables.patch
@@ -445,76 +375,6 @@
%patch7 -p1
%patch8 -p1
%patch9 -p1
-%patch10 -p1
-%patch11 -p1
-%patch12 -p1
-%patch13 -p1
-%patch14 -p1
-%patch15 -p1
-%patch16 -p1
-%patch17 -p1
-%patch18 -p1
-%patch19 -p1
-%patch20 -p1
-%patch21 -p1
-%patch22 -p1
-%patch23 -p1
-%patch24 -p1
-%patch25 -p1
-%patch26 -p1
-%patch27 -p1
-%patch28 -p1
-%patch29 -p1
-%patch30 -p1
-%patch31 -p1
-%patch32 -p1
-%patch33 -p1
-%patch34 -p1
-%patch35 -p1
-%patch36 -p1
-%patch37 -p1
-%patch38 -p1
-%patch39 -p1
-%patch40 -p1
-%patch41 -p1
-%patch42 -p1
-%patch43 -p1
-%patch44 -p1
-%patch45 -p1
-%patch46 -p1
-%patch47 -p1
-%patch48 -p1
-%patch49 -p1
-%patch50 -p1
-%patch51 -p1
-%patch52 -p1
-%patch53 -p1
-%patch54 -p1
-%patch55 -p1
-%patch56 -p1
-%patch57 -p1
-%patch58 -p1
-%patch59 -p1
-%patch60 -p1
-%patch61 -p1
-%patch62 -p1
-%patch63 -p1
-%patch64 -p1
-%patch65 -p1
-%patch66 -p1
-%patch67 -p1
-%patch68 -p1
-%patch69 -p1
-%patch70 -p1
-%patch71 -p1
-%patch72 -p1
-%patch73 -p1
-%patch74 -p1
-%patch75 -p1
-%patch76 -p1
-%patch77 -p1
-%patch78 -p1
-%patch79 -p1
# Our platform specific patches
%patch400 -p1
%patch401 -p1
++++++ 5b505d59-tools-xentop-replace-use-of-deprecated-vwprintw.patch ++++++
Subject: tools/xentop : replace use of deprecated vwprintw
From: Christopher Clark christopher.w.clark@gmail.com Wed Jul 18 15:22:17 2018 -0700
Date: Thu Jul 19 10:43:53 2018 +0100:
Git: 2b50cdbc444c637575580dcfa6c9525a84d5cc62
gcc-8.1 complains:
| xentop.c: In function 'print':
| xentop.c:304:4: error: 'vwprintw' is deprecated [-Werror=deprecated-declarations]
| vwprintw(stdscr, (curses_str_t)fmt, args);
| ^~~~~~~~
vw_printw (note the underscore) is a non-deprecated alternative.
Signed-off-by: Christopher Clark