| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
| |
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Bumping xen to version RELEASE-4.17.3-53-g0ebd2e49bc, which comprises the following commits:
0ebd2e49bc x86: protect conditional lock taking from speculative execution
074b4c8987 x86/mm: add speculation barriers to open coded locks
2cc5e57be6 locking: attempt to ensure lock wrappers are always inline
468a368b2e percpu-rwlock: introduce support for blocking speculation into critical regions
7454dad6ee rwlock: introduce support for blocking speculation into critical regions
9d2f136328 x86/spinlock: introduce support for blocking speculation into critical regions
0a53565f18 xen: Swap order of actions in the FREE*() macros
bf70ce8b34 x86/paging: Delete update_cr3()'s do_locking parameter
d85481135d x86/spec-ctrl: Mitigation Register File Data Sampling
6663430b44 x86/spec-ctrl: VERW-handling adjustments
d55d52961d x86/spec-ctrl: Rename VERW related options
76af773de5 x86/spec-ctrl: Perform VERW flushing later in exit paths
77f2bec134 x86/vmx: Perform VERW flushing later in the VMExit path
abc43cf5a6 x86: Resync intel-family.h from Linux
e691f99f17 x86/entry: Introduce EFRAME_* constants
1f94117bec x86/mm: fix detection of last L1 entry in modify_xen_mappings_lite()
1e9808227c hvmloader/PCI: skip huge BARs in certain calculations
54dacb5c02 x86/cpu-policy: Allow for levelling of VERW side effects
2f49d9f89c x86/altcall: always use a temporary parameter stashing variable
c4ee68eda9 libxl: Fix segfault in device_model_spawn_outcome
a59106b276 xen/livepatch: properly build the noapply and norevert tests
5564323f64 xen/livepatch: fix norevert test attempt to open-code revert
c54cf903b0 xen/livepatch: search for symbols in all loaded payloads
b11917de0c xen/livepatch: register livepatch regions when loaded
0ce25b46ab x86/spec: do not print thunk option selection if not built-in
693455c3c3 x86/spec: fix INDIRECT_THUNK option to only be set when build-enabled
76ea2aab36 x86/spec: print the built-in SPECULATIVE_HARDEN_* options
b75bee1832 xen/sched: Fix UB shift in compat_set_timer_op()
9c0d518eb8 x86/HVM: hide SVM/VMX when their enabling is prohibited by firmware
6cbccc4071 xen/arm: Fix UBSAN failure in start_xen()
49f7760237 x86: account for shadow stack in exception-from-stub recovery
9165001081 x86/spec: fix BRANCH_HARDEN option to only be set when build-enabled
1aafe054e7 x86/altcall: use a union as register type for function parameters on clang
229e8a72ee xen/cmdline: fix printf format specifier in no_config_param()
f6b1279254 xen/livepatch: fix norevert test hook setup typo
16f2e47eb1 x86emul: add missing EVEX.R' checks
ea86997727 build: make sure build fails when running kconfig fails
b974528073 libxl: Disable relocating memory for qemu-xen in stubdomain too
1330a5fe44 build: Replace `which` with `command -v`
b3ae0e6201 x86/HVM: tidy state on hvmemul_map_linear_addr()'s error path
415f770d23 x86/hvm: Fix fast singlestep state persistence
463aaf3fbf amd-vi: fix IVMD memory type checks
61da71968e tools/xentop: fix sorting bug for some columns
091466ba55 x86/p2m-pt: fix off by one in entry check assert
afb85cf1e8 lib{fdt,elf}: move lib{fdt,elf}-temp.o and their deps to $(targets)
7bd612727d x86/vmx: Disallow the use of inactivity states
eca5416f9b x86/vmx: Fix IRQ handling for EXIT_REASON_INIT
d0ad2cc5ea x86/intel: ensure Global Performance Counter Control is setup correctly
0ef1fb43dd CirrusCI: drop FreeBSD 12
abcc32f063 x86/amd: Extend CPU erratum #1474 fix to more affected models
6b1864afc1 VT-d: Fix "else" vs "#endif" misplacement
f9e1ed51bd pci: fail device assignment if phantom functions cannot be assigned
4f6e9d4327 update Xen version to 4.17.4-pre
949a4aad41 update Xen version to 4.17.3
958706fd2e xen/arm: page: Avoid pointer overflow on cache clean & invalidate
e2caee491a xen/sched: fix sched_move_domain()
4000522008 Only compile the hypervisor with -Wdeclaration-after-statement
83ae677d2a x86/x2apic: introduce a mixed physical/cluster mode
6eb98dda5c xen/domain: fix error path in domain_create()
5d01aa7ad5 xen/sched: fix adding offline cpu to cpupool
7d8bd64e11 x86emul: avoid triggering event related assertions
4923450c0e tools/xg: Fix potential memory leak in cpu policy getters/setters
eac655d6be xen/x86: In x2APIC mode, derive LDR from APIC ID
e3c1ffb2a3 livepatch: do not use .livepatch.funcs section to store internal state
32c3403e4c x86/mem_sharing: Release domain if we are not able to enable memory sharing
e1f9cb16e2 xen/sched: fix sched_move_domain()
28f44b603f xen/grant: Fix build in PV_SHIM
0527bab090 x86/spec-ctrl: Add SRSO whitepaper URL
c635c17fde x86/i8259: do not assume interrupts always target CPU0
d10db37b78 x86/x2apic: remove usage of ACPI_FADT_APIC_CLUSTER
267ac3c592 x86/pv-shim: fix grant table operations for 32-bit guests
4bd2c8c8b9 x86/mem_sharing: add missing m2p entry when mapping shared_info page
011d20a69c docs: Fix IOMMU command line docs some more
bb13e63143 x86: support data operand independent timing mode
40685f9283 iommu/vt-d: fix SAGAW capability parsing
ee4ce01198 iommu: fix quarantine mode command line documentation
f6996645d2 x86/pvh: fix identity mapping of low 1MB
e1275e58c7 x86/amd: Address AMD erratum #1485
1a94fc132a x86: Add bit definitions for Automatic IBRS
7eb2a4eba1 tools/pygrub: Fix pygrub's --entry flag for python3
65e1f3d289 cxenstored: wait until after reset to notify dom0less domains
6384cdf0c3 x86: Clarify that only 5 hypercall parameters are supported
2e87f3a03a docs/sphinx: Switch hypercall-abi.rst to named footnotes
4f43614a89 x86/amd: do not expose HWCR.TscFreqSel to guests
0311ff4a2c x86/spec-ctrl: Remove conditional IRQs-on-ness for INT $0x80/0x82 paths
b7a1e10539 iommu/amd-vi: use correct level for quarantine domain page tables
0b56bed864 x86/pv: Correct the auditing of guest breakpoint addresses
3f8b444072 x86/svm: Fix asymmetry with AMD DR MASK context switching
46d00dbf4c libxl: limit bootloader execution in restricted mode
42bf49d74b libxl: add support for running bootloader in restricted mode
f5e211654e tools/pygrub: Deprivilege pygrub
8ee19246ad tools/libfsimage: Export a new function to preload all plugins
3797742067 tools/pygrub: Open the output files earlier
e7059f16f7 tools/pygrub: Small refactors
8a584126ea tools/pygrub: Remove unnecessary hypercall
eb4efdac4c libfsimage/xfs: Add compile-time check to libfsimage
78143c5336 libfsimage/xfs: Sanity-check the superblock during mounts
f1cd620cc3 libfsimage/xfs: Amend mask32lo() to allow the value 32
d665c6690e libfsimage/xfs: Remove dead code
0d8f9f7f27 iommu/amd-vi: flush IOMMU TLB when flushing the DTE
c4e05c97f5 tools/xenstored: domain_entry_fix(): Handle conflicting transaction
90c540c589 x86/shadow: defer releasing of PV's top-level shadow reference
9ac2f49f5f x86/spec-ctrl: Mitigate the Zen1 DIV leakage
19ee1e1faa x86/amd: Introduce is_zen{1,2}_uarch() predicates
2e2c3efcfc x86/spec-ctrl: Issue VERW during IST exit to Xen
e4a71bc0da x86/entry: Track the IST-ness of an entry for the exit paths
5f7efd47c8 x86/entry: Adjust restore_all_xen to hold stack_end in %r14
ba023e93d0 x86/spec-ctrl: Improve all SPEC_CTRL_{ENTER,EXIT}_* comments
3952c73bdb x86/spec-ctrl: Turn the remaining SPEC_CTRL_{ENTRY,EXIT}_* into asm macros
84690fb82c x86/spec-ctrl: Fold DO_SPEC_CTRL_EXIT_TO_XEN into it's single user
dc28aba565 x86/spec-ctrl: Fix confusion between SPEC_CTRL_EXIT_TO_XEN{,_IST}
d2d2dcae87 x86/AMD: extend Zenbleed check to models "good" ucode isn't known for
d31e5b2a9c xen/arm: page: Handle cache flush of an element at the top of the address space
699de51274 x86/irq: fix reporting of spurious i8259 interrupts
8be85d8c0d x86/vmx: Revert "x86/VMX: sanitize rIP before re-entering guest"
a939e953cd x86/svm: Fix valid condition in svm_get_pending_event()
7ca58fbef4 tboot: Disable CET at shutdown
0429822978 libxl: slightly correct JSON generation of CPU policy
ba360fbb64 build: correct gas --noexecstack check
5116fe12d8 x86/iommu: pass full IO-APIC RTE for remapping table update
e08e7330c5 iommu/vtd: rename io_apic_read_remap_rte() local variable
1bd4523d69 x86/ioapic: RTE modifications must use ioapic_write_entry
a885649098 x86/ioapic: add a raw field to RTE struct
d0cdd34dd8 x86/ioapic: sanitize IO-APIC pins before enabling lapic LVTERR/ESR
f04295dd80 xenalyze: Handle start-of-day ->RUNNING transitions
e5f9987d5f x86/head: check base address alignment
7b5155a79e xen/vcpu: ignore VCPU_SSHOTTMR_future
052a8d24bc tools/vchan: Fix -Wsingle-bit-bitfield-constant-conversion
f00d563095 CI: Resync FreeBSD config with staging
e418a77295 rombios: Remove the use of egrep
24487fec3b rombios: Avoid using K&R function syntax
ae1045c429 rombios: Work around GCC issue 99578
37f1d68fa3 x86emul: rework wrapping of libc functions in test and fuzzing harnesses
476d2624ec Config.mk: evaluate XEN_COMPILE_ARCH and XEN_OS immediately
a1f68fb567 build: evaluate XEN_BUILD_* and XEN_DOMAIN immediately
36e84ea02e build: remove TARGET_ARCH, a duplicate of SRCARCH
56076ef445 build: remove TARGET_SUBARCH, a duplicate of ARCH
1c3927f8f6 build: define ARCH and SRCARCH later
8d84be5b55 libxl: Use XEN_LIB_DIR to store bootloader from pygrub
7d88979849 x86: fix build with old gcc after CPU policy changes
2f337a04bf update Xen version to 4.17.3-pre
322a20add0 Update Xen to version 4.17.2
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
|
|
|
|
|
|
|
|
| |
Update Xen and tools 4.17 recipes to use the latest 4.17.2 release.
Remove no longer needed solaris syntax patch.
Signed-off-by: Michal Orzel <michal.orzel@amd.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
|
|
|
|
|
|
|
|
|
| |
bitbake has been enhanced such that SRCPV is no longer needed in
PV to handle updating git hashes and task signatures.
We can simplify our PV by dropping SRCPV
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
|
|
|
|
|
|
| |
Signed-off-by: Khem Raj <raj.khem@gmail.com>
Cc: Alexandre Belloni <alexandre.belloni@bootlin.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
|
|
|
|
|
| |
Signed-off-by: Christopher Clark <christopher.w.clark@gmail.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Bumping xen to version RELEASE-4.17.0-89-ge4a5fb9227, which comprises the following commits:
e4a5fb9227 CI: Remove llvm-8 from the Debian Stretch container
435a1e5e8f automation: Remove non-debug x86_32 build jobs
8c414bab30 automation: Remove CentOS 7.2 containers and builds
e3b23da4a1 automation: Switch arm32 cross builds to run on arm64
4c0d792675 CI: Drop automation/configs/
7758cd57e0 ns16550: correct name/value pair parsing for PCI port/bridge
85100ed78c vpci/msix: handle accesses adjacent to the MSI-X table
3506935824 include: don't mention stub headers more than once in a make rule
7f55774489 x86/ucode: Fix error paths control_thread_fn()
f6a3e93b37 x86/vmx: Don't spuriously crash the domain when INIT is received
11c8ef59b9 x86/shadow: Fix build with no PG_log_dirty
00aa5c93d1 x86/nospec: Fix evaluate_nospec() code generation under Clang
6f2d89d681 x86/shadow: fix and improve sh_page_has_multiple_shadows()
33b1c8cd86 VT-d: fix iommu=no-igfx if the IOMMU scope contains fake device(s)
3c85fb7b65 AMD/IOMMU: without XT, x2APIC needs to be forced into physical mode
3eac216e6e libacpi: fix PCI hotplug AML
7082d656ae bunzip: work around gcc13 warning
f971f5c531 VT-d: constrain IGD check
d84612ecab x86/altp2m: help gcc13 to avoid it emitting a warning
b5409f4e4d core-parking: fix build with gcc12 and NR_CPUS=1
b4dad09bb2 x86/spec-ctrl: Add BHI controls to userspace components
244d39fb13 tools/xenmon: Fix xenmon.py for with python3.x
651ffe2c78 tools/python: change 's#' size type for Python >= 3.10
b745ff3011 x86/vmx: implement Notify VM Exit
27abea1ba6 x86/vmx: introduce helper to set VMX_INTR_SHADOW_NMI
83f12e4eaf x86/vmx: implement VMExit based guest Bus Lock detection
a730e4d119 x86/spec-ctrl: Defer CR4_PV32_RESTORE on the cstar_enter path
a2a915b396 x86/HVM: serialize pinned cache attribute list manipulation
d0cb66d59a x86/HVM: bound number of pinned cache attribute regions
f8f8f07880 x86/shadow: account for log-dirty mode when pre-allocating
ec5b058d2a x86/ucode/AMD: late load the patch on every logical thread
fa8250f192 libs/guest: Fix leak on realloc failure in backup_ptes()
01f85d835b libs/guest: Fix resource leaks in xc_core_arch_map_p2m_tree_rw()
53bd16bcc0 tools: Use PKG_CONFIG_FILE instead of PKG_CONFIG variable
b10cf1561a xen: Fix Clang -Wunicode diagnostic when building asm-macros
837bdc6eb2 xen: Work around Clang-IAS macro \@ expansion bug
e8f28e129d x86: perform mem_sharing teardown before paging teardown
e9a7942f6c x86/ucode/AMD: apply the patch early on every logical thread
46c104cce0 build: make FILE symbol paths consistent
74b76704fd credit2: respect credit2_runqueue=all when arranging runqueues
8202b9cf84 x86/shskt: Disable CET-SS on parts susceptible to fractured updates
cdc23d47ad x86/cpuid: Infrastructure for leaves 7:1{ecx,edx}
c622b8ace9 libs/util: Fix parallel build between flex/bison and CC rules
aaf74a532c automation: Remove clang-8 from Debian unstable container
3685e754e6 x86/spec-ctrl: Mitigate Cross-Thread Return Address Predictions
587823eca1 tools/ocaml/libs: Fix memory/resource leaks with caml_alloc_custom()
bf935b1ff7 tools/ocaml/xc: Don't reference Abstract_Tag objects with the GC lock released
afdcc10856 tools/ocaml/xc: Fix binding for xc_domain_assign_device()
021b82cc0c tools/ocaml/evtchn: Don't reference Custom objects with the GC lock released
5797b798a5 tools/ocaml/libs: Allocate the correct amount of memory for Abstract_tag
2c21e1bee6 tools/ocaml/libs: Don't declare stubs as taking void
e74d868b48 tools/oxenstored: validate config file before live update
f0e653fb4a tools/ocaml/xb: Drop Xs_ring.write
7d516fc876 tools/ocaml/xb,mmap: Use Data_abstract_val wrapper
5d8f9cfa16 tools/ocaml/xenctrl: Use larger chunksize in domain_getinfolist
03f545b6cf tools/ocaml/xenctrl: Make domain_getinfolist tail recursive
3dae50283d libxl: fix guest kexec - skip cpuid policy
d012788137 ns16550: fix an incorrect assignment to uart->io_size
819a5d4ed8 build: fix building flask headers before descending in flask/ss/
2d74e7035b x86/shadow: fix PAE check for top-level table unshadowing
e904d8ae01 x86/vmx: Support for CPUs without model-specific LBR
5e3250258a x86/vmx: Calculate model-specific LBRs once at start of day
c871e05e13 include/compat: produce stubs for headers not otherwise generated
1d7a388e7b tools: Fix build with recent QEMU, use "--enable-trace-backends"
a470a83c36 x86/S3: Restore Xen's MSR_PAT value on S3 resume
2f8851c37f Revert "tools/xenstore: simplify loop handling connection I/O"
c4972a4272 tools/oxenstored: Render backtraces more nicely in Syslog
91a9ac6e9b tools/oxenstored/syslog: Avoid potential NULL dereference
e13a9a2146 tools/oxenstored: Set uncaught exception handler
991b512f5f tools/oxenstored: Log live update issues at warning level
f02171b663 tools/oxenstored: Keep /dev/xen/evtchn open across live update
4b418768ef tools/oxenstored: Rework Domain evtchn handling to use port_pair
a20daa7ffd tools/oxenstored: Implement Domain.rebind_evtchn
fd0d9b0597 tools/oxenstored: Rename some 'port' variables to 'remote_port'
bc5cc00868 tools/oxenstored: Bind the DOM_EXC VIRQ in in Event.init()
0929960173 tools/oxenstored: Style fixes to Domain
c7cf603836 tools/ocaml/evtchn: Extend the init() binding with a cloexec flag
24d9dc2ae2 tools/ocaml/evtchn: Add binding for xenevtchn_fdopen()
d11528a993 tools/ocaml/evtchn: OCaml 5 support, fix potential resource leak
2e8d7a08bc tools/oxenstored: Fix incorrect scope after an if statement
a7a26da0b5 x86/time: prevent overflow with high frequency TSCs
1dcc9b6dfe EFI: relocate the ESRT when booting via multiboot2
c3e37c60fb ioreq_broadcast(): accept partial broadcast success
26f39b3d70 x86/HVM: don't mark evtchn upcall vector as pending when vLAPIC is disabled
5810edc049 x86/Viridian: don't mark IRQ vectors as pending when vLAPIC is disabled
54bb56e128 x86/HVM: don't mark external IRQs as pending when vLAPIC is disabled
b7b34bd66a x86/pvh: do not forward MADT Local APIC NMI structures to dom0
9cbc04a95f x86/irq: do not release irq until all cleanup is done
0b999fa2ea update Xen version to 4.17.1-pre
11560248ff Use EfiACPIReclaimMemory for ESRT
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
It has been reported that xen can fail to build with the
following error:
| In file included from xsm/flask/ss/services.c:46:
| ./xsm/flask/include/avc.h:18:10: fatal error: av_permissions.h: No
such file or directory
| 18 | #include "av_permissions.h"
| | ^~~~~~~~~~~~~~~~~~
This fix has been proposed upstream:
https://lore.kernel.org/xen-devel/20230120133626.55680-1-anthony.perard@citrix.com/T/#u
It doesn't break our build, so we include it for stress testing.
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
|
|
Add recipes for xen and tools for the newly released 4.17 version and
take the opportunity to update master recipes.
Reflect 4.17 tools changes in xen-tools.inc:
- add test-paging-mempool to test package,
- add init-dom0less script to xl package,
- add localstatedir to xencommons package (this is needed as from 4.17
onwards, there is no /var/lib/xenstored resulting in /var being
installed but not shipped in any package).
Reviewed-by: Christopher Clark <christopher.w.clark@gmail.com>
Signed-off-by: Michal Orzel <michal.orzel@amd.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
|