summaryrefslogtreecommitdiffstats
path: root/recipes-extended/xen/files
Commit message (Collapse)AuthorAgeFilesLines
* xen: fix arm64 build with gcc14Bruce Ashfield2024-05-311-0/+68
| | | | | | | | | | | | | | | | gcc14 isn't properly tracking if the irq array index is greater than zero, and hence generates a warning that chains to a build error. This is a temporary patch to ensure that the variable is greater than zero and hence keeps the warning from happening. If it was less than zero, a different way of dealing with it "officially" would be better, but we lack the insight to know what to do in this case (plus, it really isn't less than zero as it has never caused an issue before) Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
* xen-tools/4.18: update to -tipBruce Ashfield2024-03-151-42/+0
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Drop upstreamed patch, otherwise, no other changes. Bumping xen to version RELEASE-4.18.0-71-g4da8ca9cb9, which comprises the following commits: 4da8ca9cb9 x86: protect conditional lock taking from speculative execution e107a8ece7 x86/mm: add speculation barriers to open coded locks 9de8a52b0e locking: attempt to ensure lock wrappers are always inline 5a13c81542 percpu-rwlock: introduce support for blocking speculation into critical regions e7f0f11c88 rwlock: introduce support for blocking speculation into critical regions 1932973ac9 x86/spinlock: introduce support for blocking speculation into critical regions bdda600406 xen: Swap order of actions in the FREE*() macros 908cbd1893 x86/spec-ctrl: Mitigation Register File Data Sampling fb85a8fc91 x86/spec-ctrl: VERW-handling adjustments b7205fc1cb x86/spec-ctrl: Rename VERW related options 95dd34fdbe x86/spec-ctrl: Perform VERW flushing later in exit paths 9f89ec65fb x86/vmx: Perform VERW flushing later in the VMExit path b91c253e81 x86: Resync intel-family.h from Linux fe1869a569 x86/entry: Introduce EFRAME_* constants a96d2d4355 x86/mm: fix detection of last L1 entry in modify_xen_mappings_lite() 4c84fa6cb6 hvmloader/PCI: skip huge BARs in certain calculations fd7cb7a1d0 x86/cpu-policy: Allow for levelling of VERW side effects 75221fb0f8 x86/altcall: always use a temporary parameter stashing variable 267845a838 libxl: Fix segfault in device_model_spawn_outcome e9516b73e7 xen/livepatch: properly build the noapply and norevert tests d81bfc7ff8 xen/livepatch: fix norevert test attempt to open-code revert 50a8f74df7 xen/livepatch: search for symbols in all loaded payloads 5382a6a79c xen/livepatch: register livepatch regions when loaded 7404c25efd x86/spec: do not print thunk option selection if not built-in 09b9db0413 x86/spec: fix INDIRECT_THUNK option to only be set when build-enabled b7f9168878 x86/spec: print the built-in SPECULATIVE_HARDEN_* options 57f1370536 xen/sched: Fix UB shift in compat_set_timer_op() 3e383bb413 x86/HVM: hide SVM/VMX when their enabling is prohibited by firmware 498b3624d0 xen/arm: Fix UBSAN failure in start_xen() 58bb811510 x86: account for shadow stack in exception-from-stub recovery 4d47dca20d x86/spec: fix BRANCH_HARDEN option to only be set when build-enabled 19fd9ff998 x86/altcall: use a union as register type for function parameters on clang f6e5ab5fa7 xen/cmdline: fix printf format specifier in no_config_param() 33a0368d3b xen/livepatch: fix norevert test hook setup typo a751d1321f x86emul: add missing EVEX.R' checks 5fda826414 build: make sure build fails when running kconfig fails 489c2b9ba1 libxl: Disable relocating memory for qemu-xen in stubdomain too 006764b871 build: Replace `which` with `command -v` 59e6ad6597 x86/HVM: tidy state on hvmemul_map_linear_addr()'s error path b51fd78aed x86/hvm: Fix fast singlestep state persistence 16475909ba block-common: Fix same_vm for no targets fa9950a527 amd-vi: fix IVMD memory type checks 184d723e7a tools/xentop: fix sorting bug for some columns b1fdd7d0e4 x86/ucode: Fix stability of the raw CPU Policy rescan 295ab8060d x86/p2m-pt: fix off by one in entry check assert 579a622eb4 lib{fdt,elf}: move lib{fdt,elf}-temp.o and their deps to $(targets) 00550e808c x86/vmx: Disallow the use of inactivity states 4cc0f88c42 x86/vmx: Fix IRQ handling for EXIT_REASON_INIT 6ccf064b0c x86/intel: ensure Global Performance Counter Control is setup correctly b26c30a408 CirrusCI: drop FreeBSD 12 62b3d7f8e4 x86/amd: Extend CPU erratum #1474 fix to more affected models c7ac596a57 VT-d: Fix "else" vs "#endif" misplacement 637da04812 pci: fail device assignment if phantom functions cannot be assigned 1792d1723b x86/x2apic: introduce a mixed physical/cluster mode a4f3f5a62c xen/arm: page: Avoid pointer overflow on cache clean & invalidate 48eb9e9199 xen/sched: fix sched_move_domain() a56d598e13 Only compile the hypervisor with -Wdeclaration-after-statement 25b7f9ed0f xen/domain: fix error path in domain_create() 5ac87c8afd xen/sched: fix adding offline cpu to cpupool 18f900b77b x86emul: avoid triggering event related assertions 3af9d1cbb6 tools/xg: Fix potential memory leak in cpu policy getters/setters 61d032e322 xen/x86: In x2APIC mode, derive LDR from APIC ID 480168fcb3 livepatch: do not use .livepatch.funcs section to store internal state 90a6d82175 x86/mem_sharing: Release domain if we are not able to enable memory sharing 3f9390fea5 xen/sched: fix sched_move_domain() 40bfa9dd57 x86/spec-ctrl: Add SRSO whitepaper URL fcb1016bbd x86/i8259: do not assume interrupts always target CPU0 9e8edd4c75 x86/x2apic: remove usage of ACPI_FADT_APIC_CLUSTER 880e06fdea x86/pv-shim: fix grant table operations for 32-bit guests 52be29df79 x86/mem_sharing: add missing m2p entry when mapping shared_info page 02f8d0adfb update Xen version to 4.18.1-pre d75f1e9b74 SUPPORT.md: Update release notes URL Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
* xen-tools: fix python 3.12 build errorsAlexander Kanavin2023-12-041-0/+42
| | | | | Signed-off-by: Alexander Kanavin <alex@linutronix.de> Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
* xen: Bump SRCREV of 4.17 recipes to 4.17.2Michal Orzel2023-11-271-70/+0
| | | | | | | | Update Xen and tools 4.17 recipes to use the latest 4.17.2 release. Remove no longer needed solaris syntax patch. Signed-off-by: Michal Orzel <michal.orzel@amd.com> Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
* xen: Update arm assembly patch to upstream accepted oneKhem Raj2023-08-121-20/+28
| | | | | Signed-off-by: Khem Raj <raj.khem@gmail.com> Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
* xen: Fix build with gas/2.41Khem Raj2023-08-011-0/+62
| | | | | | Signed-off-by: Khem Raj <raj.khem@gmail.com> Cc: Alexandre Belloni <alexandre.belloni@bootlin.com> Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
* netavark, xen: *.patch: add Upstream-Status to all patchesMartin Jansa2023-06-221-0/+2
| | | | | | | | | | | | | | | | | | | | There is new patch-status QA check in oe-core: https://git.openembedded.org/openembedded-core/commit/?id=76a685bfcf927593eac67157762a53259089ea8a This is temporary work around just to hide _many_ warnings from optional patch-status (if you add it to WARN_QA). This just added Upstream-Status: Pending everywhere without actually investigating what's the proper status. This is just to hide current QA warnings and to catch new .patch files being added without Upstream-Status, but the number of Pending patches is now: Patches in Pending state: 15 (11%) Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com> Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
* xen, xen-tools: Update git recipe revision for gcc 13 compatibilityChristopher Clark2023-05-291-0/+41
| | | | | | | | Adds an update for the python/pygrub environment patch for the current Xen 4.18 development tree. Signed-off-by: Christopher Clark <christopher.w.clark@gmail.com> Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
* xen-tools: add a patch to address failures on 32 bit systems with 64 bit time_tAlexander Kanavin2023-04-121-0/+34
| | | | | Signed-off-by: Alexander Kanavin <alex@linutronix.de> Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
* xen: update to 4.17-tipBruce Ashfield2023-04-121-54/+0
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Bumping xen to version RELEASE-4.17.0-89-ge4a5fb9227, which comprises the following commits: e4a5fb9227 CI: Remove llvm-8 from the Debian Stretch container 435a1e5e8f automation: Remove non-debug x86_32 build jobs 8c414bab30 automation: Remove CentOS 7.2 containers and builds e3b23da4a1 automation: Switch arm32 cross builds to run on arm64 4c0d792675 CI: Drop automation/configs/ 7758cd57e0 ns16550: correct name/value pair parsing for PCI port/bridge 85100ed78c vpci/msix: handle accesses adjacent to the MSI-X table 3506935824 include: don't mention stub headers more than once in a make rule 7f55774489 x86/ucode: Fix error paths control_thread_fn() f6a3e93b37 x86/vmx: Don't spuriously crash the domain when INIT is received 11c8ef59b9 x86/shadow: Fix build with no PG_log_dirty 00aa5c93d1 x86/nospec: Fix evaluate_nospec() code generation under Clang 6f2d89d681 x86/shadow: fix and improve sh_page_has_multiple_shadows() 33b1c8cd86 VT-d: fix iommu=no-igfx if the IOMMU scope contains fake device(s) 3c85fb7b65 AMD/IOMMU: without XT, x2APIC needs to be forced into physical mode 3eac216e6e libacpi: fix PCI hotplug AML 7082d656ae bunzip: work around gcc13 warning f971f5c531 VT-d: constrain IGD check d84612ecab x86/altp2m: help gcc13 to avoid it emitting a warning b5409f4e4d core-parking: fix build with gcc12 and NR_CPUS=1 b4dad09bb2 x86/spec-ctrl: Add BHI controls to userspace components 244d39fb13 tools/xenmon: Fix xenmon.py for with python3.x 651ffe2c78 tools/python: change 's#' size type for Python >= 3.10 b745ff3011 x86/vmx: implement Notify VM Exit 27abea1ba6 x86/vmx: introduce helper to set VMX_INTR_SHADOW_NMI 83f12e4eaf x86/vmx: implement VMExit based guest Bus Lock detection a730e4d119 x86/spec-ctrl: Defer CR4_PV32_RESTORE on the cstar_enter path a2a915b396 x86/HVM: serialize pinned cache attribute list manipulation d0cb66d59a x86/HVM: bound number of pinned cache attribute regions f8f8f07880 x86/shadow: account for log-dirty mode when pre-allocating ec5b058d2a x86/ucode/AMD: late load the patch on every logical thread fa8250f192 libs/guest: Fix leak on realloc failure in backup_ptes() 01f85d835b libs/guest: Fix resource leaks in xc_core_arch_map_p2m_tree_rw() 53bd16bcc0 tools: Use PKG_CONFIG_FILE instead of PKG_CONFIG variable b10cf1561a xen: Fix Clang -Wunicode diagnostic when building asm-macros 837bdc6eb2 xen: Work around Clang-IAS macro \@ expansion bug e8f28e129d x86: perform mem_sharing teardown before paging teardown e9a7942f6c x86/ucode/AMD: apply the patch early on every logical thread 46c104cce0 build: make FILE symbol paths consistent 74b76704fd credit2: respect credit2_runqueue=all when arranging runqueues 8202b9cf84 x86/shskt: Disable CET-SS on parts susceptible to fractured updates cdc23d47ad x86/cpuid: Infrastructure for leaves 7:1{ecx,edx} c622b8ace9 libs/util: Fix parallel build between flex/bison and CC rules aaf74a532c automation: Remove clang-8 from Debian unstable container 3685e754e6 x86/spec-ctrl: Mitigate Cross-Thread Return Address Predictions 587823eca1 tools/ocaml/libs: Fix memory/resource leaks with caml_alloc_custom() bf935b1ff7 tools/ocaml/xc: Don't reference Abstract_Tag objects with the GC lock released afdcc10856 tools/ocaml/xc: Fix binding for xc_domain_assign_device() 021b82cc0c tools/ocaml/evtchn: Don't reference Custom objects with the GC lock released 5797b798a5 tools/ocaml/libs: Allocate the correct amount of memory for Abstract_tag 2c21e1bee6 tools/ocaml/libs: Don't declare stubs as taking void e74d868b48 tools/oxenstored: validate config file before live update f0e653fb4a tools/ocaml/xb: Drop Xs_ring.write 7d516fc876 tools/ocaml/xb,mmap: Use Data_abstract_val wrapper 5d8f9cfa16 tools/ocaml/xenctrl: Use larger chunksize in domain_getinfolist 03f545b6cf tools/ocaml/xenctrl: Make domain_getinfolist tail recursive 3dae50283d libxl: fix guest kexec - skip cpuid policy d012788137 ns16550: fix an incorrect assignment to uart->io_size 819a5d4ed8 build: fix building flask headers before descending in flask/ss/ 2d74e7035b x86/shadow: fix PAE check for top-level table unshadowing e904d8ae01 x86/vmx: Support for CPUs without model-specific LBR 5e3250258a x86/vmx: Calculate model-specific LBRs once at start of day c871e05e13 include/compat: produce stubs for headers not otherwise generated 1d7a388e7b tools: Fix build with recent QEMU, use "--enable-trace-backends" a470a83c36 x86/S3: Restore Xen's MSR_PAT value on S3 resume 2f8851c37f Revert "tools/xenstore: simplify loop handling connection I/O" c4972a4272 tools/oxenstored: Render backtraces more nicely in Syslog 91a9ac6e9b tools/oxenstored/syslog: Avoid potential NULL dereference e13a9a2146 tools/oxenstored: Set uncaught exception handler 991b512f5f tools/oxenstored: Log live update issues at warning level f02171b663 tools/oxenstored: Keep /dev/xen/evtchn open across live update 4b418768ef tools/oxenstored: Rework Domain evtchn handling to use port_pair a20daa7ffd tools/oxenstored: Implement Domain.rebind_evtchn fd0d9b0597 tools/oxenstored: Rename some 'port' variables to 'remote_port' bc5cc00868 tools/oxenstored: Bind the DOM_EXC VIRQ in in Event.init() 0929960173 tools/oxenstored: Style fixes to Domain c7cf603836 tools/ocaml/evtchn: Extend the init() binding with a cloexec flag 24d9dc2ae2 tools/ocaml/evtchn: Add binding for xenevtchn_fdopen() d11528a993 tools/ocaml/evtchn: OCaml 5 support, fix potential resource leak 2e8d7a08bc tools/oxenstored: Fix incorrect scope after an if statement a7a26da0b5 x86/time: prevent overflow with high frequency TSCs 1dcc9b6dfe EFI: relocate the ESRT when booting via multiboot2 c3e37c60fb ioreq_broadcast(): accept partial broadcast success 26f39b3d70 x86/HVM: don't mark evtchn upcall vector as pending when vLAPIC is disabled 5810edc049 x86/Viridian: don't mark IRQ vectors as pending when vLAPIC is disabled 54bb56e128 x86/HVM: don't mark external IRQs as pending when vLAPIC is disabled b7b34bd66a x86/pvh: do not forward MADT Local APIC NMI structures to dom0 9cbc04a95f x86/irq: do not release irq until all cleanup is done 0b999fa2ea update Xen version to 4.17.1-pre 11560248ff Use EfiACPIReclaimMemory for ESRT Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
* xen: fix Upstream-Status formattingMartin Jansa2023-01-273-4/+4
| | | | | Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com> Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
* xen: fix build race conditionBruce Ashfield2023-01-201-0/+54
| | | | | | | | | | | | | | | | | | It has been reported that xen can fail to build with the following error: | In file included from xsm/flask/ss/services.c:46: | ./xsm/flask/include/avc.h:18:10: fatal error: av_permissions.h: No such file or directory | 18 | #include "av_permissions.h" | | ^~~~~~~~~~~~~~~~~~ This fix has been proposed upstream: https://lore.kernel.org/xen-devel/20230120133626.55680-1-anthony.perard@citrix.com/T/#u It doesn't break our build, so we include it for stress testing. Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
* xen: Bump SRCREV of 4.16 recipes to 4.16.3Michal Orzel2023-01-101-433/+0
| | | | | | | | | Update 4.16 recipes to use the latest 4.16.3 release. Also, remove the GCC 12 fix patch as it seems to be no longer needed. Reviewed-by: Christopher Clark <christopher.w.clark@gmail.com> Signed-off-by: Michal Orzel <michal.orzel@amd.com> Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
* xen/4.16: fix gcc 12 buildBruce Ashfield2022-05-091-0/+433
| | | | | | | | | | | There's no fix in the xen repository to fix gcc 12 issues yet, but there is one in the opensuse infrastructure. We import that change from: https://build.opensuse.org/package/view_file/openSUSE:Factory/xen/gcc12-fixes.patch?expand=1 to at least get things building and allow runtime testing against gcc 12. Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
* xen: Remove 4.14 recipes and related patchesMichal Orzel2022-04-203-327/+0
| | | | | | | | | | We shall only have recipes for the last two stable releases, thus get rid of the 4.14 recipes and the corresponding patches. Signed-off-by: Michal Orzel <michal.orzel@arm.com> Reviewed-by: Christopher Clark <christopher.w.clark@gmail.com> Reviewed-by: Bertrand Marquis <bertrand.marquis@arm.com> Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
* xen: drop patch to workaround prelink on aarch64Christopher Clark2021-12-161-50/+0
| | | | | | | | prelink is no longer default enabled and has been recommended to be disabled since OE-core f9719cc1. Signed-off-by: Christopher Clark <christopher.w.clark@gmail.com> Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
* xen,xen-tools: update xen to new releasesEdward Pickup2021-11-023-180/+0
| | | | | | | | | | | | | | | | | | | Update the SHA in recipes for xen and xen-tools to use the latest releases; update xen 4.14 to xen 4.14.3 release, update xen 4.15 to 4.15.1 release, and xen 4.16 to the current master version. Add a comment to each recipe indicating which version of Xen is used in recipe. Do not apply patches that have been merged/solved in Xen and remove patch files not needed anymore. Create a test package to pack new tests introduced in 4.16. Add a depencency to util-linux-prlimit, as the xen 4.16 x86 requires prlimit, without this boot of dom0 fails. Signed-off-by: Edward Pickup <Edward.Pickup@arm.com> Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
* xen, xen-tools: apply workaround for gnu linker error to fix x86 buildChristopher Clark2021-08-271-0/+36
| | | | | | | | Upstream patch applied to each Xen and Xen tools recipe to fix the build of the hypervisor and shim with GNU linker 2.37. Signed-off-by: Christopher Clark <christopher.w.clark@gmail.com> Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
* xen, xen-tools: apply upstream fixes for gcc11 compilationChristopher Clark2021-07-142-0/+144
| | | | | | | | | Apply patches for the tools and hypervisor to Xen 4.15 and the git recipe and uprev Xen 4.14 to latest stable revision. Retire the previous -Wno-vla-parameter workaround. Signed-off-by: Christopher Clark <christopher.w.clark@gmail.com> Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
* xen-tools: add patches for 4.14 to enable dropping multilib buildChristopher Clark2021-04-202-0/+261
| | | | | | | | Backport Xen patches to enable hvmloader to be built without needing 32-bit glibc. Signed-off-by: Christopher Clark <christopher.w.clark@gmail.com> Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
* xen: Bump SRCREV to 4.14.1 and current masterBertrand Marquis2021-03-043-86/+73
| | | | | | | | | | | | | | | | | | | | Bump SRCREV version of xen recipes to use the latest 4.14 release (4.14.1) and the current status of master. This allows to remove some patches related to gcc 10 support which have now been merged in Xen. Xen-tools is modified to include the latest tools installed with Xen: - a rename of the bash-completion, - a new xl example, - xen-access, - xen-memshare (only available on x86). A new patch to fix python and pygrub is added as the makefiles have been deeply modified in 4.15 which require a new patch (but doing the same). Signed-off-by: Bertrand Marquis <bertrand.marquis@arm.com> Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
* xen: Fix xenpmd compilation error on arm32Bertrand Marquis2020-11-141-0/+60
| | | | | | | | | Add patch merged in current Xen master to solve compilation errors on xenmpd when Xen is compiled for arm32. Signed-off-by: Bertrand Marquis <bertrand.marquis@arm.com> Change-Id: Ifd94aa30e1b3a1016156ead395688f594ad2711d Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
* xen: remove fuzz from ncurses patchBruce Ashfield2020-09-021-6/+14
| | | | | | | The ncurses patch was slightly mangled by email, so we devtool refresh it to fix the fuzz warning. Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
* xen: Fix menuconfig and add support for config fragments and diffconfigDiego Sueiro2020-08-271-0/+49
| | | | | | | | | | | | | | | | | This patch introduces the following changes: 1. When building in OE environment the linker path needs to be passed when buildind the Kconfig tool in order to get the menuconfig task properly working. 2. By inheriting cml1.bbclass we can drop some environment variables settings in xen-hypervisor.inc for the menuconfig task, and also be able to search for config fragmens and use the diffconfig task. Also, there is no need to have a custom do_menuconfig task anymore. Change-Id: I8d61ec76d92de7d1613b79edf55b4868fe712334 Signed-off-by: Diego Sueiro <diego.sueiro@arm.com> Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
* xen: upgrade to Xen 4.14 as default and advance the git recipe versionChristopher Clark2020-08-024-205/+0
| | | | | | | | | | | | Release announcement for Xen 4.14: https://lists.xenproject.org/archives/html/xen-devel/2020-07/msg01263.html Make the 4.14 recipe the default preference and advance the git recipe onto the current 4.15 development branch. Retire the patches for the earlier versions. Signed-off-by: Christopher Clark <christopher.clark6@baesystems.com> Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
* xen, xen-tools: add recipes for Xen 4.14Christopher Clark2020-07-202-0/+92
| | | | | | | | | | | | | | | | | | | Add a versioned-suffix pair of recipes for Xen 4.14, allowing selection of which Xen version to build via setting PREFERRED_VERSION. 4.14 is currently still pre-release, so the new recipes for it set DEFAULT_PREFERENCE to -1, and the default for now remains the existing stable version. Forward ports of patches needed for 4.14 are included. Implementation note: since both this version and the git recipe are built from git branches -- important for Xen since significant updates are made available there inbetween point releases -- the recipe includes 'stable' as a string in PV so as to distinguish it from 'git' in the git recipe, and thereby allow PREFERRED_VERSION to select the correct recipe in the situation where both happen to be configured with the same XEN_REL. Signed-off-by: Christopher Clark <christopher.clark6@baesystems.com> Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
* xen-tools: apply kdd tool patchChristopher Clark2020-07-082-12/+39
| | | | | | | | Apply an upstream Xen Release-acked patch to fix kdd debugger and remove the temporary inhibit of Werror on building that tool. Signed-off-by: Christopher Clark <christopher.w.clark@gmail.com> Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
* xen: add patch to fix build on ARM64 with gcc 10.1.0Christopher Clark2020-07-061-0/+50
| | | | | | | | | The newer gcc toolchain won't link due to a missing builtin: __sync_fetch_and_add. Xen is built with -fno-builtin, so add a patch to implement the one required function. Signed-off-by: Christopher Clark <christopher.w.clark@gmail.com> Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
* xen, xen-tools: update revision to Xen 4.13Christopher Clark2020-07-068-1220/+76
| | | | | | | | Pull to the current tip of the stable 4.13 branch and apply an upstream 4.14-release-acked patch to xen-tools for a compiler warning in kdd. Signed-off-by: Christopher Clark <christopher.w.clark@gmail.com> Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
* xen: temporarily inhibit werrorBruce Ashfield2020-06-221-0/+40
| | | | Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
* xen, xen-tools: update recipes for python3Christopher Clark2020-02-277-1/+1224
| | | | | | | | | | | | | | | | | | | | | | | | | Adds patches for packaged scripts to enable deployment with python3 where they have been ported to python 3 upstream. setuptools3 inherits distutils3 which modifies ${B}, so cd ${S} is needed in the do_configure, do_compile and do_install steps. Remove python 2 dependency from the Xen recipes by adding a new separate recipe, xen-python2, for packaging the remaining optional scripts which are yet to be ported to python 3. Package naming in the separate recipe is chosen to support transition back into the xen-tools recipe if the scripts are ported later. Use RSUGGESTS to support inclusion of the xen-python2 scripts in images that include python 2. Drop the remus package python dependency since the script was removed in 2014: commit 5b66f84e37a45038f9e5dae7a5768a5525d1e6ba Add python3 RDEPENDS needed to run xenmon. Signed-off-by: Christopher Clark <christopher.clark6@baesystems.com> Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
* xen: upgrade to 4.12.0Christopher Clark2019-04-185-355/+7
| | | | | Signed-off-by: Christopher Clark <christopher.clark6@baesystems.com> Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
* xen: remove recipes for stubdoms and dependent componentsChristopher Clark2019-04-1815-4017/+0
| | | | | | | | | Retiring these as the components are not in use and work on updating the recipes to build with the OE native tools rather than host tools has been discontinued. Signed-off-by: Christopher Clark <christopher.clark6@baesystems.com> Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
* xen: fix building with BASELIB=lib64Maciej Pijanowski2018-10-221-0/+63
| | | | | | | | | | | | | | | | | | | Many "real" (other then genericx86-64) x86-64 target machine configurations set BASELIB to lib64. For example the intel-corei7-64 or the AMD machines. In such case packaging xen-python fails because items are installed to /usr/lib/, but FILES_xen-python points to package /usr/lib64/ items. Exposing the DISTUTILS variables from OE build makes the python installation somewhat similar to what happens in the distutils class and python items are installed to the /usr/lib64 as expected. Another issue was that the xen-efi package was picking up too much stuff from the /usr/lib64 path on such machines. Being more explicit at least allows to package things correctly. Signed-off-by: Maciej Pijanowski <maciej.pijanowski@3mdeb.com> Signed-off-by: Bruce Ashfield <bruce.ashfield@windriver.com>
* xen: fix build with _FORTIFY_SOURCE, gcc 8.2 and glibc 2.28Christopher Clark2018-09-251-0/+140
| | | | | | | | | | | | | Apply upstream-reviewed patch to fix compilation. Patch reorders header includes to issue a pragma to disable SSE before including any potentially always_inline functions that would use SSE. Also modify the recipe to supply compiler flags via the tools variables where they will get used, necessary as _FORTIFY_SOURCE requires optimization flags to be supplied. Signed-off-by: Christopher Clark <christopher.clark6@baesystems.com> Signed-off-by: Bruce Ashfield <bruce.ashfield@windriver.com>
* xen: fix truncation warning in tools build for ARM 32-bitChristopher Clark2018-08-201-0/+78
| | | | | | | | | Adds xen-tools-xenpmd-snprintf.patch to fix string format compiler truncation warning in xenpmd: assists the compiler by masking the value to provide an obvious low upper bound for the value range. Signed-off-by: Christopher Clark <christopher.clark6@baesystems.com> Signed-off-by: Bruce Ashfield <bruce.ashfield@windriver.com>
* xen: fix build on aarch64 w/ gcc 8.2Christopher Clark2018-08-201-0/+101
| | | | | | | | Adds patch for compatibility with gcc 8.2, to fix string lengths for copied values to prevent array-bounds warnings. Signed-off-by: Christopher Clark <christopher.clark6@baesystems.com> Signed-off-by: Bruce Ashfield <bruce.ashfield@windriver.com>
* xen: remove 4.10.1 recipe and patches no longer requiredChristopher Clark2018-08-027-351/+0
| | | | | Signed-off-by: Christopher Clark <christopher.clark6@baesystem.com> Signed-off-by: Bruce Ashfield <bruce.ashfield@windriver.com>
* xen: remove 4.9.1 recipe and patches no longer requiredChristopher Clark2018-08-027-653/+0
| | | | | Signed-off-by: Christopher Clark <christopher.clark6@baesystems.com> Signed-off-by: Bruce Ashfield <bruce.ashfield@windriver.com>
* xen-vtpm : fix patch fuzz, whitespace-only changeChristopher Clark2018-08-021-4/+4
| | | | | Signed-off-by: Christopher Clark <christopher.clark6@baesystems.com> Signed-off-by: Bruce Ashfield <bruce.ashfield@windriver.com>
* xen-vtpm,mini-os : upgrade to Xen 4.11.0Christopher Clark2018-08-021-43/+0
| | | | | | | | drops the gcc7 compatibility patch -- no longer required as it is present in the upstream version. Signed-off-by: Christopher Clark <christopher.clark6@baesystems.com> Signed-off-by: Bruce Ashfield <bruce.ashfield@windriver.com>
* tpm-emulator: apply patch to fix memcmp defect found by gccChristopher Clark2018-08-021-0/+28
| | | | | | | | | | | | | | | tpm_emulator-0.7.4/tpm/tpm_deprecated.c:437:7: | error: 'memcmp' reading 20 bytes from a region of size 8 | [-Werror=stringop-overflow=] | if (memcmp(&b1, &newAuthLink, sizeof(TPM_HMAC))) { | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Apply patch from Xen: vtpm_TPM_ChangeAuthAsymFinish.patch Signed-off-by: Christopher Clark <christopher.clark6@baesystems.com> Signed-off-by: Bruce Ashfield <bruce.ashfield@windriver.com>
* xen: upgrade to 4.10.1, and apply patches for gcc 8.1 compatibilityChristopher Clark2018-08-029-26/+376
| | | | | | | | | | Adds packaging for new binary: xen-shim. Builds the hypervisor before building the tools to workaround an upstream parallel build bug that causes the shim to be rebuilt during install. Signed-off-by: Christopher Clark <christopher.clark6@baesystems.com> Signed-off-by: Bruce Ashfield <bruce.ashfield@windriver.com>
* xen: TPM Emulator for Xen stubdomsKurt Bodiker2018-05-018-0/+616
| | | | | | | | | | | | | | | | TPM Emulator is a software-based TPM and MTM emulator. This TPM Emulator recipe creates a static library that is cross-compiled against MiniOS, Xen, LWIP, Newlib, PolarSSL, and the stubdom-specific GMP headers and subsequently used during the cross-compilation and linking of the Xen vTPM and vTPM Manager stubdomains. The current Xen source code is hardcoded to fetch a specific version of this package. The patch files originate from the Xen/stubdom source tree. This recipe provides the flexibility to change version or modify the patches. Signed-off-by: Kurt Bodiker <kurt.bodiker@braintrust-us.com> Signed-off-by: Bruce Ashfield <bruce.ashfield@windriver.com>
* xen: PolarSSL recipe and patches for Xen stubdomsKurt Bodiker2018-05-011-0/+64
| | | | | | | | | | | | | | | | PolarSSL (now mbedTLS) is a lightweight SSL library optimized for embedded systems. In the case of Xen stubdomains, we are using MiniOS. This PolarSSL recipe creates a static library that is cross-compiled against MiniOS, Xen, LWIP, and Newlib headers and subsequently used during the cross-compilation and linking of the stubdom specific GMP, TPM Emulator, and the Xen vTPM and vTPM Manager stubdomains. The current Xen source code is hardcoded to fetch a specific version of this package. The patch files originate from the Xen/stubdom source tree. This recipe provides the flexibility to change version or modify the patches. Signed-off-by: Kurt Bodiker <kurt.bodiker@braintrust-us.com> Signed-off-by: Bruce Ashfield <bruce.ashfield@windriver.com>
* xen: Newlib recipe and patches for Xen stubdomsKurt Bodiker2018-05-013-0/+898
| | | | | | | | | | | | | | | Newlib provides a fast, C library optimized for embedded systems. In the case of Xen stubdomains, we are using MiniOS. This Newlib recipe creates static libraries that are cross-compiled against MiniOS, Xen, and LWIP headers and subsequently used during the cross-compilation and linking of PolarSSL, the stubdom specific GMP, TPM Emulator, and the Xen vTPM and vTPM Manager stubdomains. The current Xen source code is hardcoded to fetch a specific version of this package. The patch files originate from the Xen/stubdom source tree. This recipe provides the flexibility to change version or modify the patches. Signed-off-by: Kurt Bodiker <kurt.bodiker@braintrust-us.com> Signed-off-by: Bruce Ashfield <bruce.ashfield@windriver.com>
* xen: Mini-OS source code with make links target appliedKurt Bodiker2018-05-011-0/+43
| | | | | | | | | | | | | | | | | | | | | Mini-OS is a tiny OS kernel distributed with the Xen Project Hypervisor sources. It is mainly used as operating system for stub domains that are used for Dom0 Disaggregation. The Mini-OS source tree is updated and released in coordination with Xen releases. The Mini-OS source tree and architecture-specific symbolic links are required for building the dependencies used to build Xen stubodmains. For convenience, the make links target was executed before packaging. Otherwise, this is a source package. The current build methods for Xen stubdomains require either a source archive which contains the Mini-OS source code or execution of a make target that will fetch the appropriate Mini-OS source tree from it's git repository. This recipe removes the mysticism of relating to the version of Mini-OS being used and it's origins and provides the flexibility to easily changes versions or patch as necessary. Signed-off-by: Kurt Bodiker <kurt.bodiker@braintrust-us.com> Signed-off-by: Bruce Ashfield <bruce.ashfield@windriver.com>
* xen: LWIP source code with patches applied for stubdomsKurt Bodiker2018-05-012-0/+2411
| | | | | | | | | | | | | | | | lwIP is a small implementation of the TCP/IP stack designed for use in embedded systems. This lwIP recipe does not configure nor does it build the product. Instead, this recipe applies the patches normally found in the Xen/stubdom source tree and creates a source package that can be used for cross-compiling for MiniOS. The current Xen source code is hardcoded to fetch a specific version of this package. The patch files originate from the Xen/stubdom source tree. This recipe provides the flexibility to change version or modify the patches. Signed-off-by: Kurt Bodiker <kurt.bodiker@braintrust-us.com> Signed-off-by: Bruce Ashfield <bruce.ashfield@windriver.com>
* xen: for 4.10.0: XSA-253 / CVE-2018-5244 patchChristopher Clark2018-01-121-0/+26
| | | | | | | Fix a memory leak with MSR emulation on x86. Signed-off-by: Christopher Clark <christopher.clark6@baesystems.com> Signed-off-by: Bruce Ashfield <bruce.ashfield@windriver.com>
* xen: upgrade 4.9.x recipe to 4.9.1 and apply XSA/CVE fix patchesChristopher Clark2018-01-128-36/+653
| | | | | | | | | | | | | | | | Upgrade the Xen 4.9.x series recipe to latest 4.9.1 and apply patches for: XSA-245 / CVE-2017-17046 XSA-246 / CVE-2017-17044 XSA-247 / CVE-2017-17045 XSA-248 / CVE-2017-17566 XSA-249 / CVE-2017-17563 XSA-250 / CVE-2017-17564 XSA-251 / CVE-2017-17565 Signed-off-by: Christopher Clark <christopher.clark6@baesystems.com> Signed-off-by: Bruce Ashfield <bruce.ashfield@windriver.com>