f196fa2c00
- bnc#573881 - /usr/lib64/xen/bin/qemu-dm is a broken link - Update to changeset 20840 RC1+ for sle11-sp1 beta3. - bnc#569581 - SuSEfirewall2 should handle rules. Disable handle_iptable in vif-bridge script vif-bridge-no-iptables.patch - bnc#569577 - /etc/modprove.d/xen_pvdrivers, installed by xen-kmp-default, to ../xen_pvdrivers.conf - bnc#536176 - Xen panic when using iommu after updating hypervisor 19380-vtd-feature-check.patch - bnc#530959 - virsh autostart doesn't work Fixing this libvirt bug also required fixing xend's op_pincpu method with upstream c/s 19580 19580-xend-pincpu.patch - bnc#534146 - Xen: Fix SRAT check for discontig memory 20120-x86-srat-check-discontig.patch - bnc#491081 - Xen time goes backwards x3950M2 - disable module build for ec2 correctly to fix build (at the suse_kernel_module_package macro) runs - Upstream bugfixes from Jan. 19896-32on64-arg-xlat.patch 19960-show-page-walk.patch 19945-pae-xen-l2-entries.patch 19953-x86-fsgs-base.patch 19931-gnttblop-preempt.patch 19885-kexec-gdt-switch.patch 19894-shadow-resync-fastpath-race.patch - hvperv shim patches no longer require being applied conditionally - bnc#520234 - npiv does not work with XEN in SLE11 Update block-npiv - bnc#496033 - Support for creating NPIV ports without starting vm block-npiv-common.sh block-npiv-vport Update block-npiv - bnc#500043 - Fix access to NPIV disk from HVM vm Update xen-qemu-iscsi-fix.patch - Don't build the KMPs for the ec2 kernel. - Upstream fixes from Jan Beulich 19606-hvm-x2apic-cpuid.patch 19734-vtd-gcmd-submit.patch 19752-vtd-srtp-sirtp-flush.patch 19753-vtd-reg-write-lock.patch 19764-hvm-domain-lock-leak.patch 19765-hvm-post-restore-vcpu-state.patch 19767-hvm-port80-inhibit.patch 19768-x86-dom0-stack-dump.patch 19770-x86-amd-s3-resume.patch 19801-x86-p2m-2mb-hap-only.patch 19815-vtd-kill-correct-timer.patch - Patch from Jan Beulich to aid in debugging bnc#509911 gnttblop-preempt.patch - bnc#515220 - qemu-img-xen snapshot Segmentation fault qemu-img-snapshot.patch update - Upstream fixes from Jan Beulich. 19474-32on64-S3.patch 19490-log-dirty.patch 19492-sched-timer-non-idle.patch 19493-hvm-io-intercept-count.patch 19505-x86_64-clear-cr1.patch 19519-domctl-deadlock.patch 19523-32on64-restore-p2m.patch 19555-ept-live-migration.patch 19557-amd-iommu-ioapic-remap.patch 19560-x86-flush-tlb-empty-mask.patch 19571-x86-numa-shift.patch 19578-hvm-load-ldt-first.patch 19592-vmx-exit-reason-perfc-size.patch 19595-hvm-set-callback-irq-level.patch 19597-x86-ioport-quirks-BL2xx.patch 19602-vtd-multi-ioapic-remap.patch 19631-x86-frametable-map.patch 19653-hvm-vcpuid-range-checks.patch - bnc#382112 - Caps lock not being passed to vm correctly. capslock_enable.patch - bnc#506833 - Use pidof in xend and xendomains init scripts - bnc#484778 - XEN: PXE boot of FV domU using non-Realtek NIC fails enable_more_nic_pxe.patch cross-migrate.patch - bnc#390961 - cross-migration of a VM causes it to become unresponsive (remains paused after migration) - Patches taken to fix the xenctx tool. The fixed version of this tool is needed to debug bnc#502735. 18962-xc_translate_foreign_address.patch 18963-xenctx.patch 19168-hvm-domctl.patch 19169-remove-declare-bitmap.patch 19170-libxc.patch 19171-xenctx.patch 19450-xc_translate_foreign_address.patch -bnc#503782 - Using converted vmdk image does not work ioemu-tapdisk-compat-QEMU_IMG.patch - bnc#474738 - adding CD drive to VM guest makes it unbootable. parse_boot_disk.patch - bnc#495300 - L3: Xen unable to PXE boot Windows based DomU's 18545-hvm-gpxe-rom.patch, 18548-hvm-gpxe-rom.patch - bnc#459836 - Fix rtc_timeoffset when localtime=0 xend-timeoffset.patch - bnc#497440 - xmclone.sh script incorrectly handles networking for SLE11. - bnc#477890 - VM becomes unresponsive after applying snapshot - bnc#494892 - Update xend-domain-lock.patch to flock the lock file. - bnc#439639 - SVVP Test 273 System - Sleep Stress With IO" fails Turned off s3/s4 sleep states for HVM guests. - bnc#468169 - fix domUloader to umount the mounted device mapper target in dom0 when install a sles10 guest with disk = /dev/disk/by_path - bnc#488490 - domUloader can't handle block device names with ':' - bnc#486244 - vms fail to start after reboot when using qcow2 - bnc#490835 - VTd errata on Cantiga chipset 19230-vtd-mobile-series4-chipset.patch - bnc#482515 - Missing dependency in xen.spec - Additional upstream bug fix patches from Jan Beulich. 19132-page-list-mfn-links.patch 19134-fold-shadow-page-info.patch 19135-next-shadow-mfn.patch 19136-page-info-rearrange.patch 19156-page-list-simplify.patch 19161-pv-ldt-handling.patch 19162-page-info-no-cpumask.patch 19216-msix-fixmap.patch 19268-page-get-owner.patch 19293-vcpu-migration-delay.patch 19391-vpmu-double-free.patch 19415-vtd-dom0-s3.patch - Imported numerous upstream bug fix patches. 19083-memory-is-conventional-fix.patch 19097-M2P-table-1G-page-mappings.patch 19137-lock-domain-page-list.patch 19140-init-heap-pages-max-order.patch 19167-recover-pat-value-s3-resume.patch 19172-irq-to-vector.patch 19173-pci-passthrough-fix.patch 19176-free-irq-shutdown-fix.patch 19190-pciif-typo-fix.patch 19204-allow-old-images-restore.patch 19232-xend-exception-fix.patch 19239-ioapic-s3-suspend-fix.patch 19240-ioapic-s3-suspend-fix.patch 19242-xenstored-use-after-free-fix.patch 19259-ignore-shutdown-deferrals.patch 19266-19365-event-channel-access-fix.patch 19275-19296-schedular-deadlock-fixes.patch 19276-cpu-selection-allocation-fix.patch 19302-passthrough-pt-irq-time-out.patch 19313-hvmemul-read-msr-fix.patch 19317-vram-tracking-fix.patch 19335-apic-s3-resume-error-fix.patch 19353-amd-migration-fix.patch 19354-amd-migration-fix.patch 19371-in-sync-L1s-writable.patch 19372-2-on-3-shadow-mode-fix.patch 19377-xend-vnclisten.patch 19400-ensure-ltr-execute.patch 19410-virt-to-maddr-fix.patch - bnc#483565 - Fix block-iscsi script. Updated block-iscsi and xen-domUloader.diff - bnc#465814 - Mouse stops responding when wheel is used in Windows VM. mouse-wheel-roll.patch (James Song) - bnc#470704 - save/restore of windows VM throws off the mouse tracking. usb-save-restore.patch (James Song) - bnc#436629 - Use global vnc-listen setting specified in xend configuration file. xend-vnclisten.patch - bnc#482623 - Fix pygrub to append user-supplied 'extra' args to kernel args. 19234_pygrub.patch - bnc#481161 upgrade - sles10sp2 to sles11 upgrade keeps xen-tools-ioemu OBS-URL: https://build.opensuse.org/package/show/Virtualization/xen?expand=0&rev=28
190 lines
6.6 KiB
Diff
190 lines
6.6 KiB
Diff
Index: xen-4.0.0-testing/tools/misc/miniterm/miniterm.c
|
|
===================================================================
|
|
--- xen-4.0.0-testing.orig/tools/misc/miniterm/miniterm.c
|
|
+++ xen-4.0.0-testing/tools/misc/miniterm/miniterm.c
|
|
@@ -157,7 +157,7 @@ int main(int argc, char **argv)
|
|
case 0:
|
|
close(1); /* stdout not needed */
|
|
for ( c = (char)getchar(); c != ENDMINITERM; c = (char)getchar() )
|
|
- write(fd,&c,1);
|
|
+ if (write(fd,&c,1)) ;
|
|
tcsetattr(fd,TCSANOW,&oldsertio);
|
|
tcsetattr(0,TCSANOW,&oldstdtio);
|
|
close(fd);
|
|
@@ -169,19 +169,19 @@ int main(int argc, char **argv)
|
|
close(fd);
|
|
exit(-1);
|
|
default:
|
|
- write(1, start_str, strlen(start_str));
|
|
+ if (write(1, start_str, strlen(start_str))) ;
|
|
close(0); /* stdin not needed */
|
|
sa.sa_handler = child_handler;
|
|
sa.sa_flags = 0;
|
|
sigaction(SIGCHLD,&sa,NULL); /* handle dying child */
|
|
while ( !stop )
|
|
{
|
|
- read(fd,&c,1); /* modem */
|
|
+ if (read(fd,&c,1)) ; /* modem */
|
|
c = (char)c;
|
|
- write(1,&c,1); /* stdout */
|
|
+ if (write(1,&c,1)) ; /* stdout */
|
|
}
|
|
wait(NULL); /* wait for child to die or it will become a zombie */
|
|
- write(1, end_str, strlen(end_str));
|
|
+ if (write(1, end_str, strlen(end_str))) ;
|
|
break;
|
|
}
|
|
|
|
Index: xen-4.0.0-testing/tools/libxc/xc_dom_elfloader.c
|
|
===================================================================
|
|
--- xen-4.0.0-testing.orig/tools/libxc/xc_dom_elfloader.c
|
|
+++ xen-4.0.0-testing/tools/libxc/xc_dom_elfloader.c
|
|
@@ -193,8 +193,9 @@ static int xc_dom_load_elf_symtab(struct
|
|
|
|
if ( load )
|
|
{
|
|
+ void * dst = (void*)elf_section_start(&syms, shdr);
|
|
shdr2 = elf_shdr_by_index(elf, h);
|
|
- memcpy((void*)elf_section_start(&syms, shdr),
|
|
+ memcpy(dst,
|
|
elf_section_start(elf, shdr2),
|
|
size);
|
|
}
|
|
Index: xen-4.0.0-testing/tools/xenstore/Makefile
|
|
===================================================================
|
|
--- xen-4.0.0-testing.orig/tools/xenstore/Makefile
|
|
+++ xen-4.0.0-testing/tools/xenstore/Makefile
|
|
@@ -4,7 +4,7 @@ include $(XEN_ROOT)/tools/Rules.mk
|
|
MAJOR = 3.0
|
|
MINOR = 0
|
|
|
|
-CFLAGS += -Werror
|
|
+CFLAGS += -Werror -fno-strict-aliasing
|
|
CFLAGS += -I.
|
|
CFLAGS += $(CFLAGS_libxenctrl)
|
|
|
|
Index: xen-4.0.0-testing/tools/xenstore/xenstored_core.c
|
|
===================================================================
|
|
--- xen-4.0.0-testing.orig/tools/xenstore/xenstored_core.c
|
|
+++ xen-4.0.0-testing/tools/xenstore/xenstored_core.c
|
|
@@ -77,8 +77,8 @@ static void check_store(void);
|
|
|
|
int quota_nb_entry_per_domain = 1000;
|
|
int quota_nb_watch_per_domain = 128;
|
|
-int quota_max_entry_size = 2048; /* 2K */
|
|
-int quota_max_transaction = 10;
|
|
+unsigned int quota_max_entry_size = 2048; /* 2K */
|
|
+unsigned int quota_max_transaction = 10;
|
|
|
|
TDB_CONTEXT *tdb_context(struct connection *conn)
|
|
{
|
|
@@ -1786,10 +1786,10 @@ int main(int argc, char *argv[])
|
|
remove_local = false;
|
|
break;
|
|
case 'S':
|
|
- quota_max_entry_size = strtol(optarg, NULL, 10);
|
|
+ quota_max_entry_size = strtoul(optarg, NULL, 10);
|
|
break;
|
|
case 't':
|
|
- quota_max_transaction = strtol(optarg, NULL, 10);
|
|
+ quota_max_transaction = strtoul(optarg, NULL, 10);
|
|
break;
|
|
case 'T':
|
|
tracefile = optarg;
|
|
Index: xen-4.0.0-testing/tools/xenstore/xenstored_domain.c
|
|
===================================================================
|
|
--- xen-4.0.0-testing.orig/tools/xenstore/xenstored_domain.c
|
|
+++ xen-4.0.0-testing/tools/xenstore/xenstored_domain.c
|
|
@@ -212,7 +212,7 @@ void handle_event(void)
|
|
{
|
|
evtchn_port_t port;
|
|
|
|
- if ((port = xc_evtchn_pending(xce_handle)) == -1)
|
|
+ if ((port = xc_evtchn_pending(xce_handle)) == (evtchn_port_t)-1)
|
|
barf_perror("Failed to read from event fd");
|
|
|
|
if (port == virq_port)
|
|
@@ -561,7 +561,7 @@ static int dom0_init(void)
|
|
struct domain *dom0;
|
|
|
|
port = xenbus_evtchn();
|
|
- if (port == -1)
|
|
+ if (port == (evtchn_port_t)-1)
|
|
return -1;
|
|
|
|
dom0 = new_domain(NULL, 0, port);
|
|
Index: xen-4.0.0-testing/tools/xenstore/xenstored_transaction.c
|
|
===================================================================
|
|
--- xen-4.0.0-testing.orig/tools/xenstore/xenstored_transaction.c
|
|
+++ xen-4.0.0-testing/tools/xenstore/xenstored_transaction.c
|
|
@@ -82,7 +82,7 @@ struct transaction
|
|
struct list_head changed_domains;
|
|
};
|
|
|
|
-extern int quota_max_transaction;
|
|
+extern unsigned int quota_max_transaction;
|
|
static unsigned int generation;
|
|
|
|
/* Return tdb context to use for this connection. */
|
|
Index: xen-4.0.0-testing/tools/xenstore/xenstore_client.c
|
|
===================================================================
|
|
--- xen-4.0.0-testing.orig/tools/xenstore/xenstore_client.c
|
|
+++ xen-4.0.0-testing/tools/xenstore/xenstore_client.c
|
|
@@ -251,7 +251,7 @@ do_chmod(char *path, struct xs_permissio
|
|
char **xsval = xs_directory(xsh, xth, path, &xsval_n);
|
|
|
|
if (xsval) {
|
|
- int i;
|
|
+ unsigned int i;
|
|
for (i = 0; i < xsval_n; i++) {
|
|
snprintf(buf, MAX_PATH_LEN, "%s/%s", path, xsval[i]);
|
|
|
|
Index: xen-4.0.0-testing/tools/libxen/src/xen_common.c
|
|
===================================================================
|
|
--- xen-4.0.0-testing.orig/tools/libxen/src/xen_common.c
|
|
+++ xen-4.0.0-testing/tools/libxen/src/xen_common.c
|
|
@@ -1057,6 +1057,8 @@ static size_t size_of_member(const abstr
|
|
default:
|
|
assert(false);
|
|
}
|
|
+
|
|
+ return 0; /* prevents a compiler warning */
|
|
}
|
|
|
|
|
|
@@ -1568,6 +1570,8 @@ get_val_as_string(const struct abstract_
|
|
default:
|
|
assert(false);
|
|
}
|
|
+
|
|
+ return NULL; /* prevents a compiler warning */
|
|
}
|
|
|
|
|
|
Index: xen-4.0.0-testing/tools/blktap2/drivers/block-remus.c
|
|
===================================================================
|
|
--- xen-4.0.0-testing.orig/tools/blktap2/drivers/block-remus.c
|
|
+++ xen-4.0.0-testing/tools/blktap2/drivers/block-remus.c
|
|
@@ -1578,7 +1578,7 @@ static int tdremus_open(td_driver_t *dri
|
|
td_flag_t flags)
|
|
{
|
|
struct tdremus_state *s = (struct tdremus_state *)driver->data;
|
|
- int rc;
|
|
+ int rc = 0;
|
|
|
|
RPRINTF("opening %s\n", name);
|
|
|
|
Index: xen-4.0.0-testing/tools/libxl/Makefile
|
|
===================================================================
|
|
--- xen-4.0.0-testing.orig/tools/libxl/Makefile
|
|
+++ xen-4.0.0-testing/tools/libxl/Makefile
|
|
@@ -50,7 +50,7 @@ xl.o: $(LIBCONFIG_OUTPUT)/libconfig.so x
|
|
$(CC) $(CFLAGS) -I$(LIBCONFIG_SOURCE) -c xl.c
|
|
|
|
$(CLIENTS): xl.o libxenlight.so $(LIBCONFIG_OUTPUT)/libconfig.so
|
|
- $(CC) $(LDFLAGS) -o $@ $< $(LIBS) -L . -lxenlight -L$(LIBCONFIG_OUTPUT) -lconfig
|
|
+ $(CC) $(LDFLAGS) -o $@ $< -L . -lxenlight $(LIBS) -L$(LIBCONFIG_OUTPUT) -lconfig
|
|
|
|
.PHONY: install
|
|
install: all
|