| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
gcc14 isn't properly tracking if the irq array index is
greater than zero, and hence generates a warning that
chains to a build error.
This is a temporary patch to ensure that the variable
is greater than zero and hence keeps the warning from
happening. If it was less than zero, a different way
of dealing with it "officially" would be better, but we
lack the insight to know what to do in this case (plus,
it really isn't less than zero as it has never caused
an issue before)
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Drop upstreamed patch, otherwise, no other changes.
Bumping xen to version RELEASE-4.18.0-71-g4da8ca9cb9, which comprises the following commits:
4da8ca9cb9 x86: protect conditional lock taking from speculative execution
e107a8ece7 x86/mm: add speculation barriers to open coded locks
9de8a52b0e locking: attempt to ensure lock wrappers are always inline
5a13c81542 percpu-rwlock: introduce support for blocking speculation into critical regions
e7f0f11c88 rwlock: introduce support for blocking speculation into critical regions
1932973ac9 x86/spinlock: introduce support for blocking speculation into critical regions
bdda600406 xen: Swap order of actions in the FREE*() macros
908cbd1893 x86/spec-ctrl: Mitigation Register File Data Sampling
fb85a8fc91 x86/spec-ctrl: VERW-handling adjustments
b7205fc1cb x86/spec-ctrl: Rename VERW related options
95dd34fdbe x86/spec-ctrl: Perform VERW flushing later in exit paths
9f89ec65fb x86/vmx: Perform VERW flushing later in the VMExit path
b91c253e81 x86: Resync intel-family.h from Linux
fe1869a569 x86/entry: Introduce EFRAME_* constants
a96d2d4355 x86/mm: fix detection of last L1 entry in modify_xen_mappings_lite()
4c84fa6cb6 hvmloader/PCI: skip huge BARs in certain calculations
fd7cb7a1d0 x86/cpu-policy: Allow for levelling of VERW side effects
75221fb0f8 x86/altcall: always use a temporary parameter stashing variable
267845a838 libxl: Fix segfault in device_model_spawn_outcome
e9516b73e7 xen/livepatch: properly build the noapply and norevert tests
d81bfc7ff8 xen/livepatch: fix norevert test attempt to open-code revert
50a8f74df7 xen/livepatch: search for symbols in all loaded payloads
5382a6a79c xen/livepatch: register livepatch regions when loaded
7404c25efd x86/spec: do not print thunk option selection if not built-in
09b9db0413 x86/spec: fix INDIRECT_THUNK option to only be set when build-enabled
b7f9168878 x86/spec: print the built-in SPECULATIVE_HARDEN_* options
57f1370536 xen/sched: Fix UB shift in compat_set_timer_op()
3e383bb413 x86/HVM: hide SVM/VMX when their enabling is prohibited by firmware
498b3624d0 xen/arm: Fix UBSAN failure in start_xen()
58bb811510 x86: account for shadow stack in exception-from-stub recovery
4d47dca20d x86/spec: fix BRANCH_HARDEN option to only be set when build-enabled
19fd9ff998 x86/altcall: use a union as register type for function parameters on clang
f6e5ab5fa7 xen/cmdline: fix printf format specifier in no_config_param()
33a0368d3b xen/livepatch: fix norevert test hook setup typo
a751d1321f x86emul: add missing EVEX.R' checks
5fda826414 build: make sure build fails when running kconfig fails
489c2b9ba1 libxl: Disable relocating memory for qemu-xen in stubdomain too
006764b871 build: Replace `which` with `command -v`
59e6ad6597 x86/HVM: tidy state on hvmemul_map_linear_addr()'s error path
b51fd78aed x86/hvm: Fix fast singlestep state persistence
16475909ba block-common: Fix same_vm for no targets
fa9950a527 amd-vi: fix IVMD memory type checks
184d723e7a tools/xentop: fix sorting bug for some columns
b1fdd7d0e4 x86/ucode: Fix stability of the raw CPU Policy rescan
295ab8060d x86/p2m-pt: fix off by one in entry check assert
579a622eb4 lib{fdt,elf}: move lib{fdt,elf}-temp.o and their deps to $(targets)
00550e808c x86/vmx: Disallow the use of inactivity states
4cc0f88c42 x86/vmx: Fix IRQ handling for EXIT_REASON_INIT
6ccf064b0c x86/intel: ensure Global Performance Counter Control is setup correctly
b26c30a408 CirrusCI: drop FreeBSD 12
62b3d7f8e4 x86/amd: Extend CPU erratum #1474 fix to more affected models
c7ac596a57 VT-d: Fix "else" vs "#endif" misplacement
637da04812 pci: fail device assignment if phantom functions cannot be assigned
1792d1723b x86/x2apic: introduce a mixed physical/cluster mode
a4f3f5a62c xen/arm: page: Avoid pointer overflow on cache clean & invalidate
48eb9e9199 xen/sched: fix sched_move_domain()
a56d598e13 Only compile the hypervisor with -Wdeclaration-after-statement
25b7f9ed0f xen/domain: fix error path in domain_create()
5ac87c8afd xen/sched: fix adding offline cpu to cpupool
18f900b77b x86emul: avoid triggering event related assertions
3af9d1cbb6 tools/xg: Fix potential memory leak in cpu policy getters/setters
61d032e322 xen/x86: In x2APIC mode, derive LDR from APIC ID
480168fcb3 livepatch: do not use .livepatch.funcs section to store internal state
90a6d82175 x86/mem_sharing: Release domain if we are not able to enable memory sharing
3f9390fea5 xen/sched: fix sched_move_domain()
40bfa9dd57 x86/spec-ctrl: Add SRSO whitepaper URL
fcb1016bbd x86/i8259: do not assume interrupts always target CPU0
9e8edd4c75 x86/x2apic: remove usage of ACPI_FADT_APIC_CLUSTER
880e06fdea x86/pv-shim: fix grant table operations for 32-bit guests
52be29df79 x86/mem_sharing: add missing m2p entry when mapping shared_info page
02f8d0adfb update Xen version to 4.18.1-pre
d75f1e9b74 SUPPORT.md: Update release notes URL
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
|
|
|
|
|
| |
Signed-off-by: Alexander Kanavin <alex@linutronix.de>
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
|
|
|
|
|
|
|
|
| |
Update Xen and tools 4.17 recipes to use the latest 4.17.2 release.
Remove no longer needed solaris syntax patch.
Signed-off-by: Michal Orzel <michal.orzel@amd.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
|
|
|
|
|
| |
Signed-off-by: Khem Raj <raj.khem@gmail.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
|
|
|
|
|
|
| |
Signed-off-by: Khem Raj <raj.khem@gmail.com>
Cc: Alexandre Belloni <alexandre.belloni@bootlin.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
There is new patch-status QA check in oe-core:
https://git.openembedded.org/openembedded-core/commit/?id=76a685bfcf927593eac67157762a53259089ea8a
This is temporary work around just to hide _many_ warnings from
optional patch-status (if you add it to WARN_QA).
This just added
Upstream-Status: Pending
everywhere without actually investigating what's the proper status.
This is just to hide current QA warnings and to catch new .patch files being
added without Upstream-Status, but the number of Pending patches is now:
Patches in Pending state: 15 (11%)
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
|
|
|
|
|
|
|
|
| |
Adds an update for the python/pygrub environment patch for the current
Xen 4.18 development tree.
Signed-off-by: Christopher Clark <christopher.w.clark@gmail.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
|
|
|
|
|
| |
Signed-off-by: Alexander Kanavin <alex@linutronix.de>
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Bumping xen to version RELEASE-4.17.0-89-ge4a5fb9227, which comprises the following commits:
e4a5fb9227 CI: Remove llvm-8 from the Debian Stretch container
435a1e5e8f automation: Remove non-debug x86_32 build jobs
8c414bab30 automation: Remove CentOS 7.2 containers and builds
e3b23da4a1 automation: Switch arm32 cross builds to run on arm64
4c0d792675 CI: Drop automation/configs/
7758cd57e0 ns16550: correct name/value pair parsing for PCI port/bridge
85100ed78c vpci/msix: handle accesses adjacent to the MSI-X table
3506935824 include: don't mention stub headers more than once in a make rule
7f55774489 x86/ucode: Fix error paths control_thread_fn()
f6a3e93b37 x86/vmx: Don't spuriously crash the domain when INIT is received
11c8ef59b9 x86/shadow: Fix build with no PG_log_dirty
00aa5c93d1 x86/nospec: Fix evaluate_nospec() code generation under Clang
6f2d89d681 x86/shadow: fix and improve sh_page_has_multiple_shadows()
33b1c8cd86 VT-d: fix iommu=no-igfx if the IOMMU scope contains fake device(s)
3c85fb7b65 AMD/IOMMU: without XT, x2APIC needs to be forced into physical mode
3eac216e6e libacpi: fix PCI hotplug AML
7082d656ae bunzip: work around gcc13 warning
f971f5c531 VT-d: constrain IGD check
d84612ecab x86/altp2m: help gcc13 to avoid it emitting a warning
b5409f4e4d core-parking: fix build with gcc12 and NR_CPUS=1
b4dad09bb2 x86/spec-ctrl: Add BHI controls to userspace components
244d39fb13 tools/xenmon: Fix xenmon.py for with python3.x
651ffe2c78 tools/python: change 's#' size type for Python >= 3.10
b745ff3011 x86/vmx: implement Notify VM Exit
27abea1ba6 x86/vmx: introduce helper to set VMX_INTR_SHADOW_NMI
83f12e4eaf x86/vmx: implement VMExit based guest Bus Lock detection
a730e4d119 x86/spec-ctrl: Defer CR4_PV32_RESTORE on the cstar_enter path
a2a915b396 x86/HVM: serialize pinned cache attribute list manipulation
d0cb66d59a x86/HVM: bound number of pinned cache attribute regions
f8f8f07880 x86/shadow: account for log-dirty mode when pre-allocating
ec5b058d2a x86/ucode/AMD: late load the patch on every logical thread
fa8250f192 libs/guest: Fix leak on realloc failure in backup_ptes()
01f85d835b libs/guest: Fix resource leaks in xc_core_arch_map_p2m_tree_rw()
53bd16bcc0 tools: Use PKG_CONFIG_FILE instead of PKG_CONFIG variable
b10cf1561a xen: Fix Clang -Wunicode diagnostic when building asm-macros
837bdc6eb2 xen: Work around Clang-IAS macro \@ expansion bug
e8f28e129d x86: perform mem_sharing teardown before paging teardown
e9a7942f6c x86/ucode/AMD: apply the patch early on every logical thread
46c104cce0 build: make FILE symbol paths consistent
74b76704fd credit2: respect credit2_runqueue=all when arranging runqueues
8202b9cf84 x86/shskt: Disable CET-SS on parts susceptible to fractured updates
cdc23d47ad x86/cpuid: Infrastructure for leaves 7:1{ecx,edx}
c622b8ace9 libs/util: Fix parallel build between flex/bison and CC rules
aaf74a532c automation: Remove clang-8 from Debian unstable container
3685e754e6 x86/spec-ctrl: Mitigate Cross-Thread Return Address Predictions
587823eca1 tools/ocaml/libs: Fix memory/resource leaks with caml_alloc_custom()
bf935b1ff7 tools/ocaml/xc: Don't reference Abstract_Tag objects with the GC lock released
afdcc10856 tools/ocaml/xc: Fix binding for xc_domain_assign_device()
021b82cc0c tools/ocaml/evtchn: Don't reference Custom objects with the GC lock released
5797b798a5 tools/ocaml/libs: Allocate the correct amount of memory for Abstract_tag
2c21e1bee6 tools/ocaml/libs: Don't declare stubs as taking void
e74d868b48 tools/oxenstored: validate config file before live update
f0e653fb4a tools/ocaml/xb: Drop Xs_ring.write
7d516fc876 tools/ocaml/xb,mmap: Use Data_abstract_val wrapper
5d8f9cfa16 tools/ocaml/xenctrl: Use larger chunksize in domain_getinfolist
03f545b6cf tools/ocaml/xenctrl: Make domain_getinfolist tail recursive
3dae50283d libxl: fix guest kexec - skip cpuid policy
d012788137 ns16550: fix an incorrect assignment to uart->io_size
819a5d4ed8 build: fix building flask headers before descending in flask/ss/
2d74e7035b x86/shadow: fix PAE check for top-level table unshadowing
e904d8ae01 x86/vmx: Support for CPUs without model-specific LBR
5e3250258a x86/vmx: Calculate model-specific LBRs once at start of day
c871e05e13 include/compat: produce stubs for headers not otherwise generated
1d7a388e7b tools: Fix build with recent QEMU, use "--enable-trace-backends"
a470a83c36 x86/S3: Restore Xen's MSR_PAT value on S3 resume
2f8851c37f Revert "tools/xenstore: simplify loop handling connection I/O"
c4972a4272 tools/oxenstored: Render backtraces more nicely in Syslog
91a9ac6e9b tools/oxenstored/syslog: Avoid potential NULL dereference
e13a9a2146 tools/oxenstored: Set uncaught exception handler
991b512f5f tools/oxenstored: Log live update issues at warning level
f02171b663 tools/oxenstored: Keep /dev/xen/evtchn open across live update
4b418768ef tools/oxenstored: Rework Domain evtchn handling to use port_pair
a20daa7ffd tools/oxenstored: Implement Domain.rebind_evtchn
fd0d9b0597 tools/oxenstored: Rename some 'port' variables to 'remote_port'
bc5cc00868 tools/oxenstored: Bind the DOM_EXC VIRQ in in Event.init()
0929960173 tools/oxenstored: Style fixes to Domain
c7cf603836 tools/ocaml/evtchn: Extend the init() binding with a cloexec flag
24d9dc2ae2 tools/ocaml/evtchn: Add binding for xenevtchn_fdopen()
d11528a993 tools/ocaml/evtchn: OCaml 5 support, fix potential resource leak
2e8d7a08bc tools/oxenstored: Fix incorrect scope after an if statement
a7a26da0b5 x86/time: prevent overflow with high frequency TSCs
1dcc9b6dfe EFI: relocate the ESRT when booting via multiboot2
c3e37c60fb ioreq_broadcast(): accept partial broadcast success
26f39b3d70 x86/HVM: don't mark evtchn upcall vector as pending when vLAPIC is disabled
5810edc049 x86/Viridian: don't mark IRQ vectors as pending when vLAPIC is disabled
54bb56e128 x86/HVM: don't mark external IRQs as pending when vLAPIC is disabled
b7b34bd66a x86/pvh: do not forward MADT Local APIC NMI structures to dom0
9cbc04a95f x86/irq: do not release irq until all cleanup is done
0b999fa2ea update Xen version to 4.17.1-pre
11560248ff Use EfiACPIReclaimMemory for ESRT
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
|
|
|
|
|
| |
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
It has been reported that xen can fail to build with the
following error:
| In file included from xsm/flask/ss/services.c:46:
| ./xsm/flask/include/avc.h:18:10: fatal error: av_permissions.h: No
such file or directory
| 18 | #include "av_permissions.h"
| | ^~~~~~~~~~~~~~~~~~
This fix has been proposed upstream:
https://lore.kernel.org/xen-devel/20230120133626.55680-1-anthony.perard@citrix.com/T/#u
It doesn't break our build, so we include it for stress testing.
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
|
|
|
|
|
|
|
|
|
| |
Update 4.16 recipes to use the latest 4.16.3 release.
Also, remove the GCC 12 fix patch as it seems to be no longer needed.
Reviewed-by: Christopher Clark <christopher.w.clark@gmail.com>
Signed-off-by: Michal Orzel <michal.orzel@amd.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
|
|
|
|
|
|
|
|
|
|
|
| |
There's no fix in the xen repository to fix gcc 12 issues yet, but
there is one in the opensuse infrastructure.
We import that change from: https://build.opensuse.org/package/view_file/openSUSE:Factory/xen/gcc12-fixes.patch?expand=1
to at least get things building and allow runtime testing against gcc
12.
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
|
|
|
|
|
|
|
|
|
|
| |
We shall only have recipes for the last two stable releases, thus
get rid of the 4.14 recipes and the corresponding patches.
Signed-off-by: Michal Orzel <michal.orzel@arm.com>
Reviewed-by: Christopher Clark <christopher.w.clark@gmail.com>
Reviewed-by: Bertrand Marquis <bertrand.marquis@arm.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
|
|
|
|
|
|
|
|
| |
prelink is no longer default enabled and has been recommended to be
disabled since OE-core f9719cc1.
Signed-off-by: Christopher Clark <christopher.w.clark@gmail.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Update the SHA in recipes for xen and xen-tools to use the latest releases;
update xen 4.14 to xen 4.14.3 release, update xen 4.15 to 4.15.1 release, and
xen 4.16 to the current master version.
Add a comment to each recipe indicating which version of Xen is used in recipe.
Do not apply patches that have been merged/solved in Xen and remove patch files
not needed anymore.
Create a test package to pack new tests introduced in 4.16.
Add a depencency to util-linux-prlimit, as the xen 4.16 x86 requires prlimit,
without this boot of dom0 fails.
Signed-off-by: Edward Pickup <Edward.Pickup@arm.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
|
|
|
|
|
|
|
|
| |
Upstream patch applied to each Xen and Xen tools recipe to fix the build
of the hypervisor and shim with GNU linker 2.37.
Signed-off-by: Christopher Clark <christopher.w.clark@gmail.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
|
|
|
|
|
|
|
|
|
| |
Apply patches for the tools and hypervisor to Xen 4.15 and the git
recipe and uprev Xen 4.14 to latest stable revision.
Retire the previous -Wno-vla-parameter workaround.
Signed-off-by: Christopher Clark <christopher.w.clark@gmail.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
|
|
|
|
|
|
|
|
| |
Backport Xen patches to enable hvmloader to be built without needing
32-bit glibc.
Signed-off-by: Christopher Clark <christopher.w.clark@gmail.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Bump SRCREV version of xen recipes to use the latest 4.14 release
(4.14.1) and the current status of master.
This allows to remove some patches related to gcc 10 support which have
now been merged in Xen.
Xen-tools is modified to include the latest tools installed with Xen:
- a rename of the bash-completion,
- a new xl example,
- xen-access,
- xen-memshare (only available on x86).
A new patch to fix python and pygrub is added as the makefiles have been
deeply modified in 4.15 which require a new patch (but doing the same).
Signed-off-by: Bertrand Marquis <bertrand.marquis@arm.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
|
|
|
|
|
|
|
|
|
| |
Add patch merged in current Xen master to solve compilation errors on
xenmpd when Xen is compiled for arm32.
Signed-off-by: Bertrand Marquis <bertrand.marquis@arm.com>
Change-Id: Ifd94aa30e1b3a1016156ead395688f594ad2711d
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
|
|
|
|
|
|
|
| |
The ncurses patch was slightly mangled by email, so we devtool
refresh it to fix the fuzz warning.
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
This patch introduces the following changes:
1. When building in OE environment the linker path needs to be passed when
buildind the Kconfig tool in order to get the menuconfig task properly
working.
2. By inheriting cml1.bbclass we can drop some environment variables
settings in xen-hypervisor.inc for the menuconfig task, and also be
able to search for config fragmens and use the diffconfig task. Also,
there is no need to have a custom do_menuconfig task anymore.
Change-Id: I8d61ec76d92de7d1613b79edf55b4868fe712334
Signed-off-by: Diego Sueiro <diego.sueiro@arm.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
|
|
|
|
|
|
|
|
|
|
|
|
| |
Release announcement for Xen 4.14:
https://lists.xenproject.org/archives/html/xen-devel/2020-07/msg01263.html
Make the 4.14 recipe the default preference and advance the git recipe
onto the current 4.15 development branch. Retire the patches for the
earlier versions.
Signed-off-by: Christopher Clark <christopher.clark6@baesystems.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Add a versioned-suffix pair of recipes for Xen 4.14, allowing selection
of which Xen version to build via setting PREFERRED_VERSION.
4.14 is currently still pre-release, so the new recipes for it set
DEFAULT_PREFERENCE to -1, and the default for now remains the existing
stable version. Forward ports of patches needed for 4.14 are included.
Implementation note: since both this version and the git recipe are
built from git branches -- important for Xen since significant updates
are made available there inbetween point releases -- the recipe includes
'stable' as a string in PV so as to distinguish it from 'git' in the git
recipe, and thereby allow PREFERRED_VERSION to select the correct recipe
in the situation where both happen to be configured with the same XEN_REL.
Signed-off-by: Christopher Clark <christopher.clark6@baesystems.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
|
|
|
|
|
|
|
|
| |
Apply an upstream Xen Release-acked patch to fix kdd debugger
and remove the temporary inhibit of Werror on building that tool.
Signed-off-by: Christopher Clark <christopher.w.clark@gmail.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
|
|
|
|
|
|
|
|
|
| |
The newer gcc toolchain won't link due to a missing builtin:
__sync_fetch_and_add. Xen is built with -fno-builtin, so add a
patch to implement the one required function.
Signed-off-by: Christopher Clark <christopher.w.clark@gmail.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
|
|
|
|
|
|
|
|
| |
Pull to the current tip of the stable 4.13 branch and apply an upstream
4.14-release-acked patch to xen-tools for a compiler warning in kdd.
Signed-off-by: Christopher Clark <christopher.w.clark@gmail.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
|
|
|
|
| |
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Adds patches for packaged scripts to enable deployment with python3
where they have been ported to python 3 upstream.
setuptools3 inherits distutils3 which modifies ${B}, so cd ${S} is
needed in the do_configure, do_compile and do_install steps.
Remove python 2 dependency from the Xen recipes by adding a new
separate recipe, xen-python2, for packaging the remaining optional
scripts which are yet to be ported to python 3. Package naming in
the separate recipe is chosen to support transition back into the
xen-tools recipe if the scripts are ported later.
Use RSUGGESTS to support inclusion of the xen-python2 scripts in
images that include python 2.
Drop the remus package python dependency since the script was removed
in 2014: commit 5b66f84e37a45038f9e5dae7a5768a5525d1e6ba
Add python3 RDEPENDS needed to run xenmon.
Signed-off-by: Christopher Clark <christopher.clark6@baesystems.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
|
|
|
|
|
| |
Signed-off-by: Christopher Clark <christopher.clark6@baesystems.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
|
|
|
|
|
|
|
|
|
| |
Retiring these as the components are not in use and work on updating
the recipes to build with the OE native tools rather than host tools
has been discontinued.
Signed-off-by: Christopher Clark <christopher.clark6@baesystems.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Many "real" (other then genericx86-64) x86-64 target machine configurations
set BASELIB to lib64. For example the intel-corei7-64 or the AMD
machines.
In such case packaging xen-python fails because items are
installed to /usr/lib/, but FILES_xen-python points to package
/usr/lib64/ items. Exposing the DISTUTILS variables from OE build makes
the python installation somewhat similar to what happens in the distutils
class and python items are installed to the /usr/lib64 as expected.
Another issue was that the xen-efi package was picking up too much stuff
from the /usr/lib64 path on such machines. Being more explicit at least
allows to package things correctly.
Signed-off-by: Maciej Pijanowski <maciej.pijanowski@3mdeb.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@windriver.com>
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Apply upstream-reviewed patch to fix compilation.
Patch reorders header includes to issue a pragma to disable SSE before
including any potentially always_inline functions that would use SSE.
Also modify the recipe to supply compiler flags via the tools variables where
they will get used, necessary as _FORTIFY_SOURCE requires optimization flags to
be supplied.
Signed-off-by: Christopher Clark <christopher.clark6@baesystems.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@windriver.com>
|
|
|
|
|
|
|
|
|
| |
Adds xen-tools-xenpmd-snprintf.patch to fix string format compiler
truncation warning in xenpmd: assists the compiler by masking the
value to provide an obvious low upper bound for the value range.
Signed-off-by: Christopher Clark <christopher.clark6@baesystems.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@windriver.com>
|
|
|
|
|
|
|
|
| |
Adds patch for compatibility with gcc 8.2, to fix string lengths
for copied values to prevent array-bounds warnings.
Signed-off-by: Christopher Clark <christopher.clark6@baesystems.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@windriver.com>
|
|
|
|
|
| |
Signed-off-by: Christopher Clark <christopher.clark6@baesystem.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@windriver.com>
|
|
|
|
|
| |
Signed-off-by: Christopher Clark <christopher.clark6@baesystems.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@windriver.com>
|
|
|
|
|
| |
Signed-off-by: Christopher Clark <christopher.clark6@baesystems.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@windriver.com>
|
|
|
|
|
|
|
|
| |
drops the gcc7 compatibility patch -- no longer required as
it is present in the upstream version.
Signed-off-by: Christopher Clark <christopher.clark6@baesystems.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@windriver.com>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
| tpm_emulator-0.7.4/tpm/tpm_deprecated.c:437:7:
| error: 'memcmp' reading 20 bytes from a region of size 8
| [-Werror=stringop-overflow=]
| if (memcmp(&b1, &newAuthLink, sizeof(TPM_HMAC))) {
| ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Apply patch from Xen: vtpm_TPM_ChangeAuthAsymFinish.patch
Signed-off-by: Christopher Clark <christopher.clark6@baesystems.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@windriver.com>
|
|
|
|
|
|
|
|
|
|
| |
Adds packaging for new binary: xen-shim.
Builds the hypervisor before building the tools to workaround an upstream
parallel build bug that causes the shim to be rebuilt during install.
Signed-off-by: Christopher Clark <christopher.clark6@baesystems.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@windriver.com>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
TPM Emulator is a software-based TPM and MTM emulator. This TPM Emulator
recipe creates a static library that is cross-compiled against MiniOS,
Xen, LWIP, Newlib, PolarSSL, and the stubdom-specific GMP headers and
subsequently used during the cross-compilation and linking of the Xen
vTPM and vTPM Manager stubdomains.
The current Xen source code is hardcoded to fetch a specific version of
this package. The patch files originate from the Xen/stubdom source
tree. This recipe provides the flexibility to change version or modify
the patches.
Signed-off-by: Kurt Bodiker <kurt.bodiker@braintrust-us.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@windriver.com>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
PolarSSL (now mbedTLS) is a lightweight SSL library optimized for
embedded systems. In the case of Xen stubdomains, we are using MiniOS.
This PolarSSL recipe creates a static library that is cross-compiled
against MiniOS, Xen, LWIP, and Newlib headers and subsequently used
during the cross-compilation and linking of the stubdom specific GMP,
TPM Emulator, and the Xen vTPM and vTPM Manager stubdomains. The
current Xen source code is hardcoded to fetch a specific version of this
package. The patch files originate from the Xen/stubdom source tree.
This recipe provides the flexibility to change version or modify the
patches.
Signed-off-by: Kurt Bodiker <kurt.bodiker@braintrust-us.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@windriver.com>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Newlib provides a fast, C library optimized for embedded systems. In the
case of Xen stubdomains, we are using MiniOS. This Newlib recipe creates
static libraries that are cross-compiled against MiniOS, Xen, and LWIP
headers and subsequently used during the cross-compilation and linking
of PolarSSL, the stubdom specific GMP, TPM Emulator, and the Xen vTPM
and vTPM Manager stubdomains. The current Xen source code is hardcoded
to fetch a specific version of this package. The patch files originate
from the Xen/stubdom source tree. This recipe provides the flexibility
to change version or modify the patches.
Signed-off-by: Kurt Bodiker <kurt.bodiker@braintrust-us.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@windriver.com>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Mini-OS is a tiny OS kernel distributed with the Xen Project Hypervisor
sources. It is mainly used as operating system for stub domains that are
used for Dom0 Disaggregation.
The Mini-OS source tree is updated and released in coordination with Xen
releases. The Mini-OS source tree and architecture-specific symbolic
links are required for building the dependencies used to build Xen
stubodmains. For convenience, the make links target was executed before
packaging. Otherwise, this is a source package. The current build
methods for Xen stubdomains require either a source archive which
contains the Mini-OS source code or execution of a make target that will
fetch the appropriate Mini-OS source tree from it's git repository. This
recipe removes the mysticism of relating to the version of Mini-OS being
used and it's origins and provides the flexibility to easily changes
versions or patch as necessary.
Signed-off-by: Kurt Bodiker <kurt.bodiker@braintrust-us.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@windriver.com>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
lwIP is a small implementation of the TCP/IP stack designed for use in
embedded systems. This lwIP recipe does not configure nor does it build
the product. Instead, this recipe applies the patches normally found in
the Xen/stubdom source tree and creates a source package that can be
used for cross-compiling for MiniOS.
The current Xen source code is hardcoded to fetch a specific version of
this package. The patch files originate from the Xen/stubdom source
tree. This recipe provides the flexibility to change version or modify
the patches.
Signed-off-by: Kurt Bodiker <kurt.bodiker@braintrust-us.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@windriver.com>
|
|
|
|
|
|
|
| |
Fix a memory leak with MSR emulation on x86.
Signed-off-by: Christopher Clark <christopher.clark6@baesystems.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@windriver.com>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Upgrade the Xen 4.9.x series recipe to latest 4.9.1
and apply patches for:
XSA-245 / CVE-2017-17046
XSA-246 / CVE-2017-17044
XSA-247 / CVE-2017-17045
XSA-248 / CVE-2017-17566
XSA-249 / CVE-2017-17563
XSA-250 / CVE-2017-17564
XSA-251 / CVE-2017-17565
Signed-off-by: Christopher Clark <christopher.clark6@baesystems.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@windriver.com>
|