Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package xorg-x11-server for openSUSE:Factory 
checked in at 2025-11-27 15:18:58
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/xorg-x11-server (Old)
 and      /work/SRC/openSUSE:Factory/.xorg-x11-server.new.14147 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "xorg-x11-server"

Thu Nov 27 15:18:58 2025 rev:445 rq:1320004 version:21.1.21

Changes:
--------
--- /work/SRC/openSUSE:Factory/xorg-x11-server/xorg-x11-server.changes  
2025-10-29 21:04:23.768904585 +0100
+++ 
/work/SRC/openSUSE:Factory/.xorg-x11-server.new.14147/xorg-x11-server.changes   
    2025-11-27 15:19:18.567282626 +0100
@@ -1,0 +2,64 @@
+Tue Nov 25 12:36:00 UTC 2025 - Stefan Dirsch <[email protected]>
+
+- Update to version 21.1.21
+  * A bug fix release to address a number of regressions reported in
+    the latest releases [1].
+    The changes being reverted here are part of a series of changes
+    previously backported in the stable branch, yet these are not
+    actual fixes to address bugs found in the stable branch, while
+    those changes introduced regressions with reverse PRIME with
+    the NVIDIA closed-source driver, issues with 10-bit output with
+    the AMDGPU driver and reduced performance with the AMDGPU driver.
+    [1] https://gitlab.freedesktop.org/xorg/xserver/-/issues/1848
+- Changes
+  * Revert "glamor: reject configs using unsupported rgbBits size"
+  * Revert "glamor_egl: add support of GlxVendorLibrary option"
+  * Revert "xorg: initialize glamor provider"
+  * Revert "glamor: Lift the GLX EGL backend from Xwayland"
+  * Revert "glamor: add glvnd_vendor private"
+- supersedes the following patches:
+  * U_CVE-2022-49737-dix-Hold-input-lock-for-AttachDevice.patch
+  * U_CVE-2025-26594-0001-Cursor-Refuse-to-free-the-root-cursor.patch
+  * U_CVE-2025-26594-0002-dix-keep-a-ref-to-the-rootCursor.patch
+  * U_CVE-2025-26595-0001-xkb-Fix-buffer-overflow-in-XkbVModMaskText.patch
+  * U_CVE-2025-26596-0001-xkb-Fix-computation-of-XkbSizeKeySyms.patch
+  * U_CVE-2025-26597-0001-xkb-Fix-buffer-overflow-in-XkbChangeTypesOfKey.patch
+  * U_CVE-2025-26598-0001-Xi-Fix-barrier-device-search.patch
+  * 
U_CVE-2025-26599-0001-composite-Handle-failure-to-redirect-in-compRedirect.patch
+  * 
U_CVE-2025-26599-0002-composite-initialize-border-clip-even-when-pixmap-al.patch
+  * 
U_CVE-2025-26600-0001-dix-Dequeue-pending-events-on-frozen-device-on-remov.patch
+  * U_CVE-2025-26601-0001-sync-Do-not-let-sync-objects-uninitialized.patch
+  * U_CVE-2025-26601-0002-sync-Check-values-before-applying-changes.patch
+  * U_CVE-2025-26601-0003-sync-Do-not-fail-SyncAddTriggerToSyncObject.patch
+  * 
U_CVE-2025-26601-0004-sync-Apply-changes-last-in-SyncChangeAlarmAttributes.patch
+  * U_CVE-2025-49175-render-Avoid-0-or-less-animated-cursors.patch
+  * U_CVE-2025-49176-os-Check-for-integer-overflow-on-BigRequest-length.patch
+  * U_CVE-2025-49176-os-Do-not-overflow-the-integer-size-with-BigRequest.patch
+  * U_CVE-2025-49177-xfixes-Check-request-length-for-SetClientDisconnectM.patch
+  * U_CVE-2025-49178-os-Account-for-bytes-to-ignore-when-sharing-input-bu.patch
+  * U_CVE-2025-49179-record-Check-for-overflow-in-RecordSanityCheckRegist.patch
+  * U_CVE-2025-49180-randr-Check-for-overflow-in-RRChangeProviderProperty.patch
+  * U_CVE-2025-49180-xfree86-Check-for-RandR-provider-functions.patch
+  * 
bsc1251958_CVE-2025-62229_0001-present-Fix-use-after-free-in-present_create_notifie.patch
+  * 
bsc1251959_CVE-2025-62230_0001-xkb-Make-the-RT_XKBCLIENT-resource-private.patch
+  * 
bsc1251959_CVE-2025-62230_0002-xkb-Free-the-XKB-resource-when-freeing-XkbInterest.patch
+  * 
bsc1251960_CVE-2025-62231_0001-xkb-Prevent-overflow-in-XkbSetCompatMap.patch
+  * u_fbdevhw_kernel6.9_break_fbdev_open.patch
+  * u_modesetting-Fix-dirty-updates-for-sw-rotation.patch
+- refreshed patches
+  * N_Install-Avoid-failure-on-wrapper-installation.patch
+  * N_fix-dpi-values.diff
+  * N_zap_warning_xserver.diff
+  * n_raise_default_clients.patch
+  * n_xorg-wrapper-rename-Xorg.patch
+  * u_01-Improved-ConfineToShape.patch
+  * u_Panning-Set-panning-state-in-xf86RandR12ScreenSetSize.patch
+  * u_Use-better-fallbacks-to-generate-cookies-if-arc4rand.patch
+  * u_xf86-Accept-devices-with-the-kernel-s-efidrm-driver.patch
+  * u_xf86-Accept-devices-with-the-kernel-s-vesadrm-driver.patch
+  * u_xfree86-activate-GPU-screens-on-autobind.patch
+  * u_xorg-server-xdmcp.patch
+  * u_xorg-wrapper-build-Build-position-independent-code.patch
+  * xorg-x11-server-byte-order.patch
+
+-------------------------------------------------------------------

Old:
----
  U_CVE-2022-49737-dix-Hold-input-lock-for-AttachDevice.patch
  U_CVE-2025-26594-0001-Cursor-Refuse-to-free-the-root-cursor.patch
  U_CVE-2025-26594-0002-dix-keep-a-ref-to-the-rootCursor.patch
  U_CVE-2025-26595-0001-xkb-Fix-buffer-overflow-in-XkbVModMaskText.patch
  U_CVE-2025-26596-0001-xkb-Fix-computation-of-XkbSizeKeySyms.patch
  U_CVE-2025-26597-0001-xkb-Fix-buffer-overflow-in-XkbChangeTypesOfKey.patch
  U_CVE-2025-26598-0001-Xi-Fix-barrier-device-search.patch
  
U_CVE-2025-26599-0001-composite-Handle-failure-to-redirect-in-compRedirect.patch
  
U_CVE-2025-26599-0002-composite-initialize-border-clip-even-when-pixmap-al.patch
  
U_CVE-2025-26600-0001-dix-Dequeue-pending-events-on-frozen-device-on-remov.patch
  U_CVE-2025-26601-0001-sync-Do-not-let-sync-objects-uninitialized.patch
  U_CVE-2025-26601-0002-sync-Check-values-before-applying-changes.patch
  U_CVE-2025-26601-0003-sync-Do-not-fail-SyncAddTriggerToSyncObject.patch
  
U_CVE-2025-26601-0004-sync-Apply-changes-last-in-SyncChangeAlarmAttributes.patch
  U_CVE-2025-49175-render-Avoid-0-or-less-animated-cursors.patch
  U_CVE-2025-49176-os-Check-for-integer-overflow-on-BigRequest-length.patch
  U_CVE-2025-49176-os-Do-not-overflow-the-integer-size-with-BigRequest.patch
  U_CVE-2025-49177-xfixes-Check-request-length-for-SetClientDisconnectM.patch
  U_CVE-2025-49178-os-Account-for-bytes-to-ignore-when-sharing-input-bu.patch
  U_CVE-2025-49179-record-Check-for-overflow-in-RecordSanityCheckRegist.patch
  U_CVE-2025-49180-randr-Check-for-overflow-in-RRChangeProviderProperty.patch
  U_CVE-2025-49180-xfree86-Check-for-RandR-provider-functions.patch
  
bsc1251958_CVE-2025-62229_0001-present-Fix-use-after-free-in-present_create_notifie.patch
  
bsc1251959_CVE-2025-62230_0001-xkb-Make-the-RT_XKBCLIENT-resource-private.patch
  
bsc1251959_CVE-2025-62230_0002-xkb-Free-the-XKB-resource-when-freeing-XkbInterest.patch
  bsc1251960_CVE-2025-62231_0001-xkb-Prevent-overflow-in-XkbSetCompatMap.patch
  u_fbdevhw_kernel6.9_break_fbdev_open.patch
  u_modesetting-Fix-dirty-updates-for-sw-rotation.patch
  xorg-server-21.1.15.tar.xz
  xorg-server-21.1.15.tar.xz.sig

New:
----
  xorg-server-21.1.21.tar.xz
  xorg-server-21.1.21.tar.xz.sig

----------(Old B)----------
  Old:- supersedes the following patches:
  * U_CVE-2022-49737-dix-Hold-input-lock-for-AttachDevice.patch
  * U_CVE-2025-26594-0001-Cursor-Refuse-to-free-the-root-cursor.patch
  Old:  * U_CVE-2022-49737-dix-Hold-input-lock-for-AttachDevice.patch
  * U_CVE-2025-26594-0001-Cursor-Refuse-to-free-the-root-cursor.patch
  * U_CVE-2025-26594-0002-dix-keep-a-ref-to-the-rootCursor.patch
  Old:  * U_CVE-2025-26594-0001-Cursor-Refuse-to-free-the-root-cursor.patch
  * U_CVE-2025-26594-0002-dix-keep-a-ref-to-the-rootCursor.patch
  * U_CVE-2025-26595-0001-xkb-Fix-buffer-overflow-in-XkbVModMaskText.patch
  Old:  * U_CVE-2025-26594-0002-dix-keep-a-ref-to-the-rootCursor.patch
  * U_CVE-2025-26595-0001-xkb-Fix-buffer-overflow-in-XkbVModMaskText.patch
  * U_CVE-2025-26596-0001-xkb-Fix-computation-of-XkbSizeKeySyms.patch
  Old:  * U_CVE-2025-26595-0001-xkb-Fix-buffer-overflow-in-XkbVModMaskText.patch
  * U_CVE-2025-26596-0001-xkb-Fix-computation-of-XkbSizeKeySyms.patch
  * U_CVE-2025-26597-0001-xkb-Fix-buffer-overflow-in-XkbChangeTypesOfKey.patch
  Old:  * U_CVE-2025-26596-0001-xkb-Fix-computation-of-XkbSizeKeySyms.patch
  * U_CVE-2025-26597-0001-xkb-Fix-buffer-overflow-in-XkbChangeTypesOfKey.patch
  * U_CVE-2025-26598-0001-Xi-Fix-barrier-device-search.patch
  Old:  * 
U_CVE-2025-26597-0001-xkb-Fix-buffer-overflow-in-XkbChangeTypesOfKey.patch
  * U_CVE-2025-26598-0001-Xi-Fix-barrier-device-search.patch
  * 
U_CVE-2025-26599-0001-composite-Handle-failure-to-redirect-in-compRedirect.patch
  Old:  * U_CVE-2025-26598-0001-Xi-Fix-barrier-device-search.patch
  * 
U_CVE-2025-26599-0001-composite-Handle-failure-to-redirect-in-compRedirect.patch
  * 
U_CVE-2025-26599-0002-composite-initialize-border-clip-even-when-pixmap-al.patch
  Old:  * 
U_CVE-2025-26599-0001-composite-Handle-failure-to-redirect-in-compRedirect.patch
  * 
U_CVE-2025-26599-0002-composite-initialize-border-clip-even-when-pixmap-al.patch
  * 
U_CVE-2025-26600-0001-dix-Dequeue-pending-events-on-frozen-device-on-remov.patch
  Old:  * 
U_CVE-2025-26599-0002-composite-initialize-border-clip-even-when-pixmap-al.patch
  * 
U_CVE-2025-26600-0001-dix-Dequeue-pending-events-on-frozen-device-on-remov.patch
  * U_CVE-2025-26601-0001-sync-Do-not-let-sync-objects-uninitialized.patch
  Old:  * 
U_CVE-2025-26600-0001-dix-Dequeue-pending-events-on-frozen-device-on-remov.patch
  * U_CVE-2025-26601-0001-sync-Do-not-let-sync-objects-uninitialized.patch
  * U_CVE-2025-26601-0002-sync-Check-values-before-applying-changes.patch
  Old:  * U_CVE-2025-26601-0001-sync-Do-not-let-sync-objects-uninitialized.patch
  * U_CVE-2025-26601-0002-sync-Check-values-before-applying-changes.patch
  * U_CVE-2025-26601-0003-sync-Do-not-fail-SyncAddTriggerToSyncObject.patch
  Old:  * U_CVE-2025-26601-0002-sync-Check-values-before-applying-changes.patch
  * U_CVE-2025-26601-0003-sync-Do-not-fail-SyncAddTriggerToSyncObject.patch
  * 
U_CVE-2025-26601-0004-sync-Apply-changes-last-in-SyncChangeAlarmAttributes.patch
  Old:  * 
U_CVE-2025-26601-0003-sync-Do-not-fail-SyncAddTriggerToSyncObject.patch
  * 
U_CVE-2025-26601-0004-sync-Apply-changes-last-in-SyncChangeAlarmAttributes.patch
  * U_CVE-2025-49175-render-Avoid-0-or-less-animated-cursors.patch
  Old:  * 
U_CVE-2025-26601-0004-sync-Apply-changes-last-in-SyncChangeAlarmAttributes.patch
  * U_CVE-2025-49175-render-Avoid-0-or-less-animated-cursors.patch
  * U_CVE-2025-49176-os-Check-for-integer-overflow-on-BigRequest-length.patch
  Old:  * U_CVE-2025-49175-render-Avoid-0-or-less-animated-cursors.patch
  * U_CVE-2025-49176-os-Check-for-integer-overflow-on-BigRequest-length.patch
  * U_CVE-2025-49176-os-Do-not-overflow-the-integer-size-with-BigRequest.patch
  Old:  * 
U_CVE-2025-49176-os-Check-for-integer-overflow-on-BigRequest-length.patch
  * U_CVE-2025-49176-os-Do-not-overflow-the-integer-size-with-BigRequest.patch
  * U_CVE-2025-49177-xfixes-Check-request-length-for-SetClientDisconnectM.patch
  Old:  * 
U_CVE-2025-49176-os-Do-not-overflow-the-integer-size-with-BigRequest.patch
  * U_CVE-2025-49177-xfixes-Check-request-length-for-SetClientDisconnectM.patch
  * U_CVE-2025-49178-os-Account-for-bytes-to-ignore-when-sharing-input-bu.patch
  Old:  * 
U_CVE-2025-49177-xfixes-Check-request-length-for-SetClientDisconnectM.patch
  * U_CVE-2025-49178-os-Account-for-bytes-to-ignore-when-sharing-input-bu.patch
  * U_CVE-2025-49179-record-Check-for-overflow-in-RecordSanityCheckRegist.patch
  Old:  * 
U_CVE-2025-49178-os-Account-for-bytes-to-ignore-when-sharing-input-bu.patch
  * U_CVE-2025-49179-record-Check-for-overflow-in-RecordSanityCheckRegist.patch
  * U_CVE-2025-49180-randr-Check-for-overflow-in-RRChangeProviderProperty.patch
  Old:  * 
U_CVE-2025-49179-record-Check-for-overflow-in-RecordSanityCheckRegist.patch
  * U_CVE-2025-49180-randr-Check-for-overflow-in-RRChangeProviderProperty.patch
  * U_CVE-2025-49180-xfree86-Check-for-RandR-provider-functions.patch
  Old:  * 
U_CVE-2025-49180-randr-Check-for-overflow-in-RRChangeProviderProperty.patch
  * U_CVE-2025-49180-xfree86-Check-for-RandR-provider-functions.patch
  * 
bsc1251958_CVE-2025-62229_0001-present-Fix-use-after-free-in-present_create_notifie.patch
  Old:  * U_CVE-2025-49180-xfree86-Check-for-RandR-provider-functions.patch
  * 
bsc1251958_CVE-2025-62229_0001-present-Fix-use-after-free-in-present_create_notifie.patch
  * 
bsc1251959_CVE-2025-62230_0001-xkb-Make-the-RT_XKBCLIENT-resource-private.patch
  Old:  * 
bsc1251958_CVE-2025-62229_0001-present-Fix-use-after-free-in-present_create_notifie.patch
  * 
bsc1251959_CVE-2025-62230_0001-xkb-Make-the-RT_XKBCLIENT-resource-private.patch
  * 
bsc1251959_CVE-2025-62230_0002-xkb-Free-the-XKB-resource-when-freeing-XkbInterest.patch
  Old:  * 
bsc1251959_CVE-2025-62230_0001-xkb-Make-the-RT_XKBCLIENT-resource-private.patch
  * 
bsc1251959_CVE-2025-62230_0002-xkb-Free-the-XKB-resource-when-freeing-XkbInterest.patch
  * bsc1251960_CVE-2025-62231_0001-xkb-Prevent-overflow-in-XkbSetCompatMap.patch
  Old:  * 
bsc1251959_CVE-2025-62230_0002-xkb-Free-the-XKB-resource-when-freeing-XkbInterest.patch
  * bsc1251960_CVE-2025-62231_0001-xkb-Prevent-overflow-in-XkbSetCompatMap.patch
  * u_fbdevhw_kernel6.9_break_fbdev_open.patch
  Old:  * 
bsc1251960_CVE-2025-62231_0001-xkb-Prevent-overflow-in-XkbSetCompatMap.patch
  * u_fbdevhw_kernel6.9_break_fbdev_open.patch
  * u_modesetting-Fix-dirty-updates-for-sw-rotation.patch
  Old:  * u_fbdevhw_kernel6.9_break_fbdev_open.patch
  * u_modesetting-Fix-dirty-updates-for-sw-rotation.patch
- refreshed patches
----------(Old E)----------

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ xorg-x11-server.spec ++++++
--- /var/tmp/diff_new_pack.XNoAyp/_old  2025-11-27 15:19:20.207351787 +0100
+++ /var/tmp/diff_new_pack.XNoAyp/_new  2025-11-27 15:19:20.207351787 +0100
@@ -36,7 +36,7 @@
 %endif
 
 Name:           xorg-x11-server
-Version:        21.1.15
+Version:        21.1.21
 Release:        0
 URL:            http://xorg.freedesktop.org/
 Summary:        X
@@ -230,8 +230,6 @@
 
 Patch1900:      u_no-lto-for-tests.patch
 
-Patch1910:      u_modesetting-Fix-dirty-updates-for-sw-rotation.patch
-
 Patch1920:      u_xf86-Accept-devices-with-the-hyperv_drm-driver.patch
 Patch1921:      u_xf86-Accept-devices-with-the-kernels-ofdrm-driver.patch
 Patch1922:      u_xf86-Accept-devices-with-the-kernel-s-efidrm-driver.patch
@@ -241,37 +239,8 @@
 
 Patch1960:      u_sync-pci-ids-with-Mesa.patch
 
-Patch2000:      u_fbdevhw_kernel6.9_break_fbdev_open.patch
-
 Patch1218176:   u_miCloseScreen_check_for_null_pScreen_dev_private.patch
 
-Patch1237451:   
U_CVE-2025-26594-0001-Cursor-Refuse-to-free-the-root-cursor.patch
-Patch1237452:   U_CVE-2025-26594-0002-dix-keep-a-ref-to-the-rootCursor.patch
-Patch1237453:   
U_CVE-2025-26595-0001-xkb-Fix-buffer-overflow-in-XkbVModMaskText.patch
-Patch1237454:   
U_CVE-2025-26596-0001-xkb-Fix-computation-of-XkbSizeKeySyms.patch
-Patch1237455:   
U_CVE-2025-26597-0001-xkb-Fix-buffer-overflow-in-XkbChangeTypesOfKey.patch
-Patch1237456:   U_CVE-2025-26598-0001-Xi-Fix-barrier-device-search.patch
-Patch1237457:   
U_CVE-2025-26599-0001-composite-Handle-failure-to-redirect-in-compRedirect.patch
-Patch1237458:   
U_CVE-2025-26599-0002-composite-initialize-border-clip-even-when-pixmap-al.patch
-Patch1237459:   
U_CVE-2025-26600-0001-dix-Dequeue-pending-events-on-frozen-device-on-remov.patch
-Patch1237460:   
U_CVE-2025-26601-0001-sync-Do-not-let-sync-objects-uninitialized.patch
-Patch1237461:   
U_CVE-2025-26601-0002-sync-Check-values-before-applying-changes.patch
-Patch1237462:   
U_CVE-2025-26601-0003-sync-Do-not-fail-SyncAddTriggerToSyncObject.patch
-Patch1237463:   
U_CVE-2025-26601-0004-sync-Apply-changes-last-in-SyncChangeAlarmAttributes.patch
-Patch1239750:   U_CVE-2022-49737-dix-Hold-input-lock-for-AttachDevice.patch
-Patch1244082:   U_CVE-2025-49175-render-Avoid-0-or-less-animated-cursors.patch
-Patch1244084:   
U_CVE-2025-49176-os-Do-not-overflow-the-integer-size-with-BigRequest.patch
-Patch1244085:   
U_CVE-2025-49177-xfixes-Check-request-length-for-SetClientDisconnectM.patch
-Patch1244087:   
U_CVE-2025-49178-os-Account-for-bytes-to-ignore-when-sharing-input-bu.patch
-Patch1244089:   
U_CVE-2025-49179-record-Check-for-overflow-in-RecordSanityCheckRegist.patch
-Patch1244090:   
U_CVE-2025-49180-randr-Check-for-overflow-in-RRChangeProviderProperty.patch
-Patch1244091:   
U_CVE-2025-49180-xfree86-Check-for-RandR-provider-functions.patch
-Patch1244092:   
U_CVE-2025-49176-os-Check-for-integer-overflow-on-BigRequest-length.patch
-Patch1251958:   
bsc1251958_CVE-2025-62229_0001-present-Fix-use-after-free-in-present_create_notifie.patch
-Patch1251959:   
bsc1251959_CVE-2025-62230_0001-xkb-Make-the-RT_XKBCLIENT-resource-private.patch
-Patch1251960:   
bsc1251959_CVE-2025-62230_0002-xkb-Free-the-XKB-resource-when-freeing-XkbInterest.patch
-Patch1251961:   
bsc1251960_CVE-2025-62231_0001-xkb-Prevent-overflow-in-XkbSetCompatMap.patch
-
 %description
 This package contains the X.Org Server.
 
@@ -415,47 +384,15 @@
 %patch -P 1401 -p1
 %patch -P 1503 -p1
 %patch -P 1900 -p1
-%patch -P 1910 -p1
 %patch -P 1920 -p1
 %patch -P 1921 -p1
 %patch -P 1922 -p1
 %patch -P 1923 -p1
 %patch -P 1930 -p1
 %patch -P 1960 -p1
-%patch -P 2000 -p1
 
 %patch -P 1218176 -p1
 
-%patch -P 1237451 -p1
-%patch -P 1237452 -p1
-%patch -P 1237453 -p1
-%patch -P 1237454 -p1
-%patch -P 1237455 -p1
-%patch -P 1237456 -p1
-%patch -P 1237457 -p1
-%patch -P 1237458 -p1
-%patch -P 1237459 -p1
-%patch -P 1237460 -p1
-%patch -P 1237461 -p1
-%patch -P 1237462 -p1
-%patch -P 1237463 -p1
-
-%patch -P 1239750 -p1
-
-%patch -P 1244082 -p1
-%patch -P 1244084 -p1
-%patch -P 1244085 -p1
-%patch -P 1244087 -p1
-%patch -P 1244089 -p1
-%patch -P 1244090 -p1
-%patch -P 1244091 -p1
-%patch -P 1244092 -p1
-
-%patch -P 1251958 -p1
-%patch -P 1251959 -p1
-%patch -P 1251960 -p1
-%patch -P 1251961 -p1
-
 %build
 # We have some -z now related errors during X default startup (boo#1197994):
 # - when loading modesetting: gbm_bo_get_plane_count

++++++ N_Install-Avoid-failure-on-wrapper-installation.patch ++++++
--- /var/tmp/diff_new_pack.XNoAyp/_old  2025-11-27 15:19:20.251353642 +0100
+++ /var/tmp/diff_new_pack.XNoAyp/_new  2025-11-27 15:19:20.255353811 +0100
@@ -14,11 +14,11 @@
  hw/xfree86/Makefile.am | 7 ++++---
  1 file changed, 4 insertions(+), 3 deletions(-)
 
-Index: xorg-server-1.20.5/hw/xfree86/Makefile.am
+Index: xorg-server-21.1.21/hw/xfree86/Makefile.am
 ===================================================================
---- xorg-server-1.20.5.orig/hw/xfree86/Makefile.am
-+++ xorg-server-1.20.5/hw/xfree86/Makefile.am
-@@ -113,9 +113,10 @@ if INSTALL_SETUID
+--- xorg-server-21.1.21.orig/hw/xfree86/Makefile.am
++++ xorg-server-21.1.21/hw/xfree86/Makefile.am
+@@ -110,9 +110,10 @@ if INSTALL_SETUID
  endif
  if SUID_WRAPPER
        $(MKDIR_P) $(DESTDIR)$(SUID_WRAPPER_DIR)

++++++ N_fix-dpi-values.diff ++++++
--- /var/tmp/diff_new_pack.XNoAyp/_old  2025-11-27 15:19:20.275354654 +0100
+++ /var/tmp/diff_new_pack.XNoAyp/_new  2025-11-27 15:19:20.279354823 +0100
@@ -6,7 +6,7 @@
 ===================================================================
 --- hw/xfree86/common/xf86Helper.c.orig
 +++ hw/xfree86/common/xf86Helper.c
-@@ -875,12 +875,22 @@ xf86SetDpi(ScrnInfoPtr pScrn, int x, int
+@@ -877,12 +877,22 @@ xf86SetDpi(ScrnInfoPtr pScrn, int x, int
      else if (pScrn->widthmm > 0 || pScrn->heightmm > 0) {
          from = X_CONFIG;
          if (pScrn->widthmm > 0) {
@@ -33,7 +33,7 @@
          }
          if (pScrn->xDpi > 0 && pScrn->yDpi <= 0)
              pScrn->yDpi = pScrn->xDpi;
-@@ -919,12 +929,22 @@ xf86SetDpi(ScrnInfoPtr pScrn, int x, int
+@@ -921,12 +931,22 @@ xf86SetDpi(ScrnInfoPtr pScrn, int x, int
          pScrn->widthmm = ddcWidthmm;
          pScrn->heightmm = ddcHeightmm;
          if (pScrn->widthmm > 0) {

++++++ N_zap_warning_xserver.diff ++++++
--- /var/tmp/diff_new_pack.XNoAyp/_old  2025-11-27 15:19:20.303355835 +0100
+++ /var/tmp/diff_new_pack.XNoAyp/_new  2025-11-27 15:19:20.307356004 +0100
@@ -8,10 +8,10 @@
 within 2 seconds.
 This can be enabled with a new option flag "ZapWarning"
 
-Index: xorg-server-21.1.0/hw/xfree86/common/xf86Config.c
+Index: xorg-server-21.1.21/hw/xfree86/common/xf86Config.c
 ===================================================================
---- xorg-server-21.1.0.orig/hw/xfree86/common/xf86Config.c
-+++ xorg-server-21.1.0/hw/xfree86/common/xf86Config.c
+--- xorg-server-21.1.21.orig/hw/xfree86/common/xf86Config.c
++++ xorg-server-21.1.21/hw/xfree86/common/xf86Config.c
 @@ -621,6 +621,7 @@ configFiles(XF86ConfFilesPtr fileconf)
  typedef enum {
      FLAG_DONTVTSWITCH,
@@ -20,7 +20,7 @@
      FLAG_DONTZOOM,
      FLAG_DISABLEVIDMODE,
      FLAG_ALLOWNONLOCAL,
-@@ -657,6 +658,8 @@ static OptionInfoRec FlagOptions[] = {
+@@ -658,6 +659,8 @@ static OptionInfoRec FlagOptions[] = {
       {0}, FALSE},
      {FLAG_DONTZAP, "DontZap", OPTV_BOOLEAN,
       {0}, FALSE},
@@ -29,7 +29,7 @@
      {FLAG_DONTZOOM, "DontZoom", OPTV_BOOLEAN,
       {0}, FALSE},
      {FLAG_DISABLEVIDMODE, "DisableVidModeExtension", OPTV_BOOLEAN,
-@@ -739,6 +742,7 @@ configServerFlags(XF86ConfFlagsPtr flags
+@@ -742,6 +745,7 @@ configServerFlags(XF86ConfFlagsPtr flags
  
      xf86GetOptValBool(FlagOptions, FLAG_DONTVTSWITCH, &xf86Info.dontVTSwitch);
      xf86GetOptValBool(FlagOptions, FLAG_DONTZAP, &xf86Info.dontZap);
@@ -37,10 +37,10 @@
      xf86GetOptValBool(FlagOptions, FLAG_DONTZOOM, &xf86Info.dontZoom);
  
      xf86GetOptValBool(FlagOptions, FLAG_IGNORE_ABI, &xf86Info.ignoreABI);
-Index: xorg-server-21.1.0/hw/xfree86/common/xf86Events.c
+Index: xorg-server-21.1.21/hw/xfree86/common/xf86Events.c
 ===================================================================
---- xorg-server-21.1.0.orig/hw/xfree86/common/xf86Events.c
-+++ xorg-server-21.1.0/hw/xfree86/common/xf86Events.c
+--- xorg-server-21.1.21.orig/hw/xfree86/common/xf86Events.c
++++ xorg-server-21.1.21/hw/xfree86/common/xf86Events.c
 @@ -158,10 +158,22 @@ xf86ProcessActionEvent(ActionEvent actio
      DebugF("ProcessActionEvent(%d,%p)\n", (int) action, arg);
      switch (action) {
@@ -67,10 +67,10 @@
          break;
      case ACTION_NEXT_MODE:
          if (!xf86Info.dontZoom)
-Index: xorg-server-21.1.0/hw/xfree86/common/xf86Globals.c
+Index: xorg-server-21.1.21/hw/xfree86/common/xf86Globals.c
 ===================================================================
---- xorg-server-21.1.0.orig/hw/xfree86/common/xf86Globals.c
-+++ xorg-server-21.1.0/hw/xfree86/common/xf86Globals.c
+--- xorg-server-21.1.21.orig/hw/xfree86/common/xf86Globals.c
++++ xorg-server-21.1.21/hw/xfree86/common/xf86Globals.c
 @@ -107,6 +107,7 @@ xf86InfoRec xf86Info = {
      .autoVTSwitch = TRUE,
      .ShareVTs = FALSE,
@@ -79,10 +79,10 @@
      .dontZoom = FALSE,
      .currentScreen = NULL,
  #ifdef CSRG_BASED
-Index: xorg-server-21.1.0/hw/xfree86/common/xf86Privstr.h
+Index: xorg-server-21.1.21/hw/xfree86/common/xf86Privstr.h
 ===================================================================
---- xorg-server-21.1.0.orig/hw/xfree86/common/xf86Privstr.h
-+++ xorg-server-21.1.0/hw/xfree86/common/xf86Privstr.h
+--- xorg-server-21.1.21.orig/hw/xfree86/common/xf86Privstr.h
++++ xorg-server-21.1.21/hw/xfree86/common/xf86Privstr.h
 @@ -62,6 +62,7 @@ typedef struct {
      Bool autoVTSwitch;
      Bool ShareVTs;

++++++ n_raise_default_clients.patch ++++++
--- /var/tmp/diff_new_pack.XNoAyp/_old  2025-11-27 15:19:20.355358028 +0100
+++ /var/tmp/diff_new_pack.XNoAyp/_new  2025-11-27 15:19:20.363358365 +0100
@@ -11,8 +11,10 @@
 
https://plug-discuss.phxlinux.narkive.com/BWkQ7Xez/xorg-maximum-number-of-clients-reached
 it appears other distros are also doing that.
 
---- xorg-server-21.1.3.orig/include/misc.h
-+++ xorg-server-21.1.3/include/misc.h
+Index: xorg-server-21.1.21/include/misc.h
+===================================================================
+--- xorg-server-21.1.21.orig/include/misc.h
++++ xorg-server-21.1.21/include/misc.h
 @@ -88,7 +88,7 @@ OF THIS SOFTWARE.
  #define MAXGPUSCREENS 16
  #endif
@@ -22,9 +24,11 @@
  #define MAXEXTENSIONS   128
  #define MAXFORMATS    8
  #ifndef MAXDEVICES
---- xorg-server-21.1.3.orig/man/Xserver.man
-+++ xorg-server-21.1.3/man/Xserver.man
-@@ -317,9 +317,9 @@ A value of zero makes the stack size as
+Index: xorg-server-21.1.21/man/Xserver.man
+===================================================================
+--- xorg-server-21.1.21.orig/man/Xserver.man
++++ xorg-server-21.1.21/man/Xserver.man
+@@ -324,9 +324,9 @@ A value of zero makes the stack size as
  of \-1 leaves the stack space limit unchanged.
  .TP 8
  .B \-maxclients

++++++ n_xorg-wrapper-rename-Xorg.patch ++++++
--- /var/tmp/diff_new_pack.XNoAyp/_old  2025-11-27 15:19:20.383359208 +0100
+++ /var/tmp/diff_new_pack.XNoAyp/_new  2025-11-27 15:19:20.387359378 +0100
@@ -1,6 +1,8 @@
---- xserver-1.20.9/hw/xfree86/xorg-wrapper.c.old       2020-09-24 
03:16:27.270885000 +0200
-+++ xserver-1.20.9/hw/xfree86/xorg-wrapper.c   2020-09-24 03:18:42.047597000 
+0200
-@@ -375,7 +375,7 @@ int main(int argc, char *argv[])
+Index: xorg-server-21.1.21/hw/xfree86/xorg-wrapper.c
+===================================================================
+--- xorg-server-21.1.21.orig/hw/xfree86/xorg-wrapper.c
++++ xorg-server-21.1.21/hw/xfree86/xorg-wrapper.c
+@@ -373,7 +373,7 @@ int main(int argc, char *argv[])
          }
      }
  
@@ -9,9 +11,11 @@
  
      /* Check if the server is executable by our real uid */
      if (access(buf, X_OK) != 0) {
---- xserver-1.20.9/hw/xfree86/Xorg.sh.in.orig  2020-09-24 03:36:20.690412000 
+0200
-+++ xserver-1.20.9/hw/xfree86/Xorg.sh.in       2020-09-24 03:36:37.594497000 
+0200
-@@ -7,5 +7,5 @@
+Index: xorg-server-21.1.21/hw/xfree86/Xorg.sh.in
+===================================================================
+--- xorg-server-21.1.21.orig/hw/xfree86/Xorg.sh.in
++++ xorg-server-21.1.21/hw/xfree86/Xorg.sh.in
+@@ -7,5 +7,5 @@ basedir=@SUID_WRAPPER_DIR@
  if [ -x "$basedir"/Xorg.wrap ]; then
        exec "$basedir"/Xorg.wrap "$@"
  else

++++++ u_01-Improved-ConfineToShape.patch ++++++
--- /var/tmp/diff_new_pack.XNoAyp/_old  2025-11-27 15:19:20.427361064 +0100
+++ /var/tmp/diff_new_pack.XNoAyp/_new  2025-11-27 15:19:20.431361233 +0100
@@ -15,11 +15,11 @@
  dix/events.c | 74 ++++++++++++++++++++++++++++++++++++++++--------------------
  1 file changed, 50 insertions(+), 24 deletions(-)
 
-diff --git a/dix/events.c b/dix/events.c
-index efaf91d..5244781 100644
---- a/dix/events.c
-+++ b/dix/events.c
-@@ -666,37 +666,63 @@ SetCriticalEvent(int event)
+Index: xorg-server-21.1.21/dix/events.c
+===================================================================
+--- xorg-server-21.1.21.orig/dix/events.c
++++ xorg-server-21.1.21/dix/events.c
+@@ -682,37 +682,63 @@ SetCriticalEvent(int event)
      criticalEvents[event >> 3] |= 1 << (event & 7);
  }
  

++++++ u_Panning-Set-panning-state-in-xf86RandR12ScreenSetSize.patch ++++++
--- /var/tmp/diff_new_pack.XNoAyp/_old  2025-11-27 15:19:20.455362245 +0100
+++ /var/tmp/diff_new_pack.XNoAyp/_new  2025-11-27 15:19:20.455362245 +0100
@@ -16,11 +16,11 @@
  hw/xfree86/modes/xf86RandR12.c | 3 +++
  1 file changed, 3 insertions(+)
 
-Index: xorg-server-1.20.5/hw/xfree86/modes/xf86RandR12.c
+Index: xorg-server-21.1.21/hw/xfree86/modes/xf86RandR12.c
 ===================================================================
---- xorg-server-1.20.5.orig/hw/xfree86/modes/xf86RandR12.c
-+++ xorg-server-1.20.5/hw/xfree86/modes/xf86RandR12.c
-@@ -685,6 +685,7 @@ xf86RandR12ScreenSetSize(ScreenPtr pScre
+--- xorg-server-21.1.21.orig/hw/xfree86/modes/xf86RandR12.c
++++ xorg-server-21.1.21/hw/xfree86/modes/xf86RandR12.c
+@@ -684,6 +684,7 @@ xf86RandR12ScreenSetSize(ScreenPtr pScre
      WindowPtr pRoot = pScreen->root;
      PixmapPtr pScrnPix;
      Bool ret = FALSE;
@@ -28,7 +28,7 @@
      int c;
  
      if (randrp->virtualX == -1 || randrp->virtualY == -1) {
-@@ -713,6 +714,7 @@ xf86RandR12ScreenSetSize(ScreenPtr pScre
+@@ -712,6 +713,7 @@ xf86RandR12ScreenSetSize(ScreenPtr pScre
              if (crtc->panningTrackingArea.y2 > crtc->panningTrackingArea.y1)
                  crtc->panningTrackingArea.y2 += height - pScreen->height;
              xf86RandR13VerifyPanningArea(crtc, width, height);
@@ -36,7 +36,7 @@
              xf86RandR13Pan(crtc, randrp->pointerX, randrp->pointerY);
          }
      }
-@@ -722,6 +724,7 @@ xf86RandR12ScreenSetSize(ScreenPtr pScre
+@@ -721,6 +723,7 @@ xf86RandR12ScreenSetSize(ScreenPtr pScre
      pScreen->height = pScrnPix->drawable.height = height;
      randrp->mmWidth = pScreen->mmWidth = mmWidth;
      randrp->mmHeight = pScreen->mmHeight = mmHeight;

++++++ u_Use-better-fallbacks-to-generate-cookies-if-arc4rand.patch ++++++
--- /var/tmp/diff_new_pack.XNoAyp/_old  2025-11-27 15:19:20.471362920 +0100
+++ /var/tmp/diff_new_pack.XNoAyp/_new  2025-11-27 15:19:20.475363088 +0100
@@ -24,10 +24,10 @@
  os/auth.c               | 138 ++++++++++++++++++++++++++++++++++++++++++++++--
  3 files changed, 141 insertions(+), 7 deletions(-)
 
-Index: xorg-server-21.1.9/configure.ac
+Index: xorg-server-21.1.21/configure.ac
 ===================================================================
---- xorg-server-21.1.9.orig/configure.ac
-+++ xorg-server-21.1.9/configure.ac
+--- xorg-server-21.1.21.orig/configure.ac
++++ xorg-server-21.1.21/configure.ac
 @@ -132,7 +132,7 @@ AM_CONDITIONAL(SPECIAL_DTRACE_OBJECTS, [
  AC_HEADER_DIRENT
  AC_HEADER_STDC
@@ -37,10 +37,10 @@
  
  dnl Checks for typedefs, structures, and compiler characteristics.
  AC_C_CONST
-Index: xorg-server-21.1.9/include/dix-config.h.in
+Index: xorg-server-21.1.21/include/dix-config.h.in
 ===================================================================
---- xorg-server-21.1.9.orig/include/dix-config.h.in
-+++ xorg-server-21.1.9/include/dix-config.h.in
+--- xorg-server-21.1.21.orig/include/dix-config.h.in
++++ xorg-server-21.1.21/include/dix-config.h.in
 @@ -149,6 +149,9 @@
  /* Define to 1 if you have the `arc4random_buf' function. */
  #undef HAVE_ARC4RANDOM_BUF
@@ -51,7 +51,7 @@
  /* Define to use libc SHA1 functions */
  #undef HAVE_SHA1_IN_LIBC
  
-@@ -226,6 +229,9 @@
+@@ -229,6 +232,9 @@
  /* Define to 1 if you have the <sys/utsname.h> header file. */
  #undef HAVE_SYS_UTSNAME_H
  
@@ -61,10 +61,10 @@
  /* Define to 1 if you have the `timingsafe_memcmp' function. */
  #undef HAVE_TIMINGSAFE_MEMCMP
  
-Index: xorg-server-21.1.9/os/auth.c
+Index: xorg-server-21.1.21/os/auth.c
 ===================================================================
---- xorg-server-21.1.9.orig/os/auth.c
-+++ xorg-server-21.1.9/os/auth.c
+--- xorg-server-21.1.21.orig/os/auth.c
++++ xorg-server-21.1.21/os/auth.c
 @@ -34,6 +34,10 @@ from The Open Group.
  #ifdef HAVE_DIX_CONFIG_H
  #include <dix-config.h>

++++++ u_xf86-Accept-devices-with-the-kernel-s-efidrm-driver.patch ++++++
--- /var/tmp/diff_new_pack.XNoAyp/_old  2025-11-27 15:19:20.527365281 +0100
+++ /var/tmp/diff_new_pack.XNoAyp/_new  2025-11-27 15:19:20.535365619 +0100
@@ -13,11 +13,11 @@
  hw/xfree86/common/xf86platformBus.c | 3 +++
  1 file changed, 3 insertions(+)
 
-diff --git a/hw/xfree86/common/xf86platformBus.c 
b/hw/xfree86/common/xf86platformBus.c
-index dbae465fc..0fa8ade20 100644
---- a/hw/xfree86/common/xf86platformBus.c
-+++ b/hw/xfree86/common/xf86platformBus.c
-@@ -580,6 +580,9 @@ xf86platformProbeDev(DriverPtr drvp)
+Index: xorg-server-21.1.21/hw/xfree86/common/xf86platformBus.c
+===================================================================
+--- xorg-server-21.1.21.orig/hw/xfree86/common/xf86platformBus.c
++++ xorg-server-21.1.21/hw/xfree86/common/xf86platformBus.c
+@@ -560,6 +560,9 @@ xf86platformProbeDev(DriverPtr drvp)
                  if (ServerIsNotSeat0()) {
                      break;
                  } else {
@@ -27,7 +27,4 @@
                      /* Accept the device if the driver is hyperv_drm */
                      if (strcmp(xf86_platform_devices[j].attribs->driver, 
"hyperv_drm") == 0)
                          break;
--- 
-2.49.0
-
 

++++++ u_xf86-Accept-devices-with-the-kernel-s-vesadrm-driver.patch ++++++
--- /var/tmp/diff_new_pack.XNoAyp/_old  2025-11-27 15:19:20.551366294 +0100
+++ /var/tmp/diff_new_pack.XNoAyp/_new  2025-11-27 15:19:20.559366630 +0100
@@ -13,11 +13,11 @@
  hw/xfree86/common/xf86platformBus.c | 3 +++
  1 file changed, 3 insertions(+)
 
-diff --git a/hw/xfree86/common/xf86platformBus.c 
b/hw/xfree86/common/xf86platformBus.c
-index 0fa8ade20..3df1b2812 100644
---- a/hw/xfree86/common/xf86platformBus.c
-+++ b/hw/xfree86/common/xf86platformBus.c
-@@ -592,6 +592,9 @@ xf86platformProbeDev(DriverPtr drvp)
+Index: xorg-server-21.1.21/hw/xfree86/common/xf86platformBus.c
+===================================================================
+--- xorg-server-21.1.21.orig/hw/xfree86/common/xf86platformBus.c
++++ xorg-server-21.1.21/hw/xfree86/common/xf86platformBus.c
+@@ -572,6 +572,9 @@ xf86platformProbeDev(DriverPtr drvp)
                      /* Accept the device if the driver is simpledrm */
                      if (strcmp(xf86_platform_devices[j].attribs->driver, 
"simpledrm") == 0)
                          break;
@@ -27,7 +27,4 @@
                  }
  
                  if (xf86IsPrimaryPlatform(&xf86_platform_devices[j]))
--- 
-2.49.0
-
 

++++++ u_xfree86-activate-GPU-screens-on-autobind.patch ++++++
--- /var/tmp/diff_new_pack.XNoAyp/_old  2025-11-27 15:19:20.583367643 +0100
+++ /var/tmp/diff_new_pack.XNoAyp/_new  2025-11-27 15:19:20.587367812 +0100
@@ -14,10 +14,10 @@
  include/dix.h                |   2 +
  3 files changed, 191 insertions(+)
 
-diff --git a/dix/main.c b/dix/main.c
-index bfc8addbe..c7b8ed49e 100644
---- a/dix/main.c
-+++ b/dix/main.c
+Index: xorg-server-21.1.21/dix/main.c
+===================================================================
+--- xorg-server-21.1.21.orig/dix/main.c
++++ xorg-server-21.1.21/dix/main.c
 @@ -121,6 +121,8 @@ extern void Dispatch(void);
  
  CallbackListPtr RootWindowFinalizeCallback = NULL;
@@ -27,7 +27,7 @@
  int
  dix_main(int argc, char *argv[], char *envp[])
  {
-@@ -242,6 +244,8 @@ dix_main(int argc, char *argv[], char *envp[])
+@@ -244,6 +246,8 @@ dix_main(int argc, char *argv[], char *e
          for (i = 0; i < screenInfo.numScreens; i++)
              InitRootWindow(screenInfo.screens[i]->root);
  
@@ -36,20 +36,20 @@
          InitCoreDevices();
          InitInput(argc, argv);
          InitAndStartDevices();
-diff --git a/hw/xfree86/common/xf86Init.c b/hw/xfree86/common/xf86Init.c
-index 380288ca4..9839cb19c 100644
---- a/hw/xfree86/common/xf86Init.c
-+++ b/hw/xfree86/common/xf86Init.c
-@@ -204,6 +204,9 @@ xf86HasTTYs(void)
- #endif
+Index: xorg-server-21.1.21/hw/xfree86/common/xf86Init.c
+===================================================================
+--- xorg-server-21.1.21.orig/hw/xfree86/common/xf86Init.c
++++ xorg-server-21.1.21/hw/xfree86/common/xf86Init.c
+@@ -205,6 +205,9 @@ xf86HasTTYs(void)
  }
  
-+static void
+ static void
 +xf86AutoConfigProviderOutputs(CallbackListPtr *pcbl, void *data, void 
*call_data);
 +
- static void
++static void
  xf86AutoConfigOutputDevices(void)
  {
+     int i;
 @@ -217,6 +220,8 @@ xf86AutoConfigOutputDevices(void)
          RRProviderAutoConfigGpuScreen(xf86ScrnToScreen(xf86GPUScreens[i]),
                                        xf86ScrnToScreen(xf86Screens[scrnum]));
@@ -59,7 +59,7 @@
  }
  
  static void
-@@ -258,6 +263,189 @@ AddVTAtoms(CallbackListPtr *pcbl, void *data, void 
*screen)
+@@ -258,6 +263,189 @@ AddVTAtoms(CallbackListPtr *pcbl, void *
                     "Failed to register VT properties\n");
  }
  
@@ -249,10 +249,10 @@
  static Bool
  xf86ScreenInit(ScreenPtr pScreen, int argc, char **argv)
  {
-diff --git a/include/dix.h b/include/dix.h
-index 0dcd09b65..ecc73d1d9 100644
---- a/include/dix.h
-+++ b/include/dix.h
+Index: xorg-server-21.1.21/include/dix.h
+===================================================================
+--- xorg-server-21.1.21.orig/include/dix.h
++++ xorg-server-21.1.21/include/dix.h
 @@ -620,6 +620,8 @@ typedef struct {
  
  extern _X_EXPORT CallbackListPtr RootWindowFinalizeCallback;
@@ -262,7 +262,4 @@
  extern int
  XItoCoreType(int xi_type);
  extern Bool
--- 
-2.25.1
-
 

++++++ u_xorg-server-xdmcp.patch ++++++
--- /var/tmp/diff_new_pack.XNoAyp/_old  2025-11-27 15:19:20.603368487 +0100
+++ /var/tmp/diff_new_pack.XNoAyp/_new  2025-11-27 15:19:20.611368823 +0100
@@ -12,11 +12,11 @@
 Even if this seems to be the wrong place to fix this it seems to be
 easier than fixing all display servers.
 
-Index: xorg-server-1.20.5/os/access.c
+Index: xorg-server-21.1.21/os/access.c
 ===================================================================
---- xorg-server-1.20.5.orig/os/access.c
-+++ xorg-server-1.20.5/os/access.c
-@@ -827,7 +827,9 @@ DefineSelf(int fd)
+--- xorg-server-21.1.21.orig/os/access.c
++++ xorg-server-21.1.21/os/access.c
+@@ -830,7 +830,9 @@ DefineSelf(int fd)
  
              /*
               * ignore 'localhost' entries as they're not useful
@@ -27,7 +27,7 @@
               */
              if (ifr->ifa_flags & IFF_LOOPBACK)
                  continue;
-@@ -848,6 +850,14 @@ DefineSelf(int fd)
+@@ -851,6 +853,14 @@ DefineSelf(int fd)
              else if (family == FamilyInternet6 &&
                       IN6_IS_ADDR_LOOPBACK((struct in6_addr *) addr))
                  continue;

++++++ u_xorg-wrapper-build-Build-position-independent-code.patch ++++++
--- /var/tmp/diff_new_pack.XNoAyp/_old  2025-11-27 15:19:20.639370004 +0100
+++ /var/tmp/diff_new_pack.XNoAyp/_new  2025-11-27 15:19:20.643370173 +0100
@@ -10,11 +10,11 @@
  hw/xfree86/Makefile.am | 1 +
  1 file changed, 1 insertion(+)
 
-Index: xorg-server-1.20.5/hw/xfree86/Makefile.am
+Index: xorg-server-21.1.21/hw/xfree86/Makefile.am
 ===================================================================
---- xorg-server-1.20.5.orig/hw/xfree86/Makefile.am
-+++ xorg-server-1.20.5/hw/xfree86/Makefile.am
-@@ -92,6 +92,7 @@ if SUID_WRAPPER
+--- xorg-server-21.1.21.orig/hw/xfree86/Makefile.am
++++ xorg-server-21.1.21/hw/xfree86/Makefile.am
+@@ -89,6 +89,7 @@ if SUID_WRAPPER
  wrapexecdir = $(SUID_WRAPPER_DIR)
  wrapexec_PROGRAMS = Xorg.wrap
  Xorg_wrap_SOURCES = xorg-wrapper.c

++++++ xorg-server-21.1.15.tar.xz -> xorg-server-21.1.21.tar.xz ++++++
++++ 25771 lines of diff (skipped)

++++++ xorg-x11-server-byte-order.patch ++++++
--- /var/tmp/diff_new_pack.XNoAyp/_old  2025-11-27 15:19:22.823462106 +0100
+++ /var/tmp/diff_new_pack.XNoAyp/_new  2025-11-27 15:19:22.835462612 +0100
@@ -11,11 +11,11 @@
  include/xorg-server.h.in |    1 +
  2 files changed, 2 insertions(+)
 
-Index: xorg-server-1.20.5/include/dix-config.h.in
+Index: xorg-server-21.1.21/include/dix-config.h.in
 ===================================================================
---- xorg-server-1.20.5.orig/include/dix-config.h.in
-+++ xorg-server-1.20.5/include/dix-config.h.in
-@@ -487,6 +487,7 @@
+--- xorg-server-21.1.21.orig/include/dix-config.h.in
++++ xorg-server-21.1.21/include/dix-config.h.in
+@@ -484,6 +484,7 @@
  
  /* byte order */
  #undef X_BYTE_ORDER
@@ -23,10 +23,10 @@
  
  /* Listen on TCP socket */
  #undef LISTEN_TCP
-Index: xorg-server-1.20.5/include/xorg-server.h.in
+Index: xorg-server-21.1.21/include/xorg-server.h.in
 ===================================================================
---- xorg-server-1.20.5.orig/include/xorg-server.h.in
-+++ xorg-server-1.20.5/include/xorg-server.h.in
+--- xorg-server-21.1.21.orig/include/xorg-server.h.in
++++ xorg-server-21.1.21/include/xorg-server.h.in
 @@ -218,5 +218,6 @@
  
  /* byte order */

Reply via email to