Go to file
Bruce Ashfield fd55e2a13b xen: update to 4.18-tip
Bumping xen to version RELEASE-4.18.2-19-g01f7a3c792, which comprises the following commits:

    01f7a3c792 update Xen version to 4.18.3-pre
    7cdb1fa2ab x86/mtrr: avoid system wide rendezvous when setting AP MTRRs
    f3d20dd317 tools/xentop: Fix cpu% sort order
    dfabab2cd9 x86: respect mapcache_domain_init() failing
    3999b675ca xen/sched: set all sched_resource data inside locked region for new cpu
    8271f0e8f2 libxl: Fix handling XenStore errors in device creation
    9966e54131 libxl: fix population of the online vCPU bitmap for PVH
    a42c83b202 x86/ucode: Distinguish "ucode already up to date"
    0673eae8e5 x86/cpu-policy: Fix migration from Ice Lake to Cascade Lake
    2bc52041ca tools/libxs: Open /dev/xen/xenbus fds as O_CLOEXEC
    a4c5bbb9db VT-d: correct ATS checking for root complex integrated devices
    47cf06c09a xen/x86: Fix Syntax warning in gen-cpuid.py
    026542c857 xen/xsm: Wire up get_dom0_console
    f0ff1d9cb9 x86/spec: adjust logic that elides lfence
    0b0c7dca70 x86/spec: fix reporting of BHB clearing usage from guest entry points
    eb7059767c x86/MTRR: correct inadvertently inverted WC check
    af0e9ba44a x86/rtc: Avoid UIP flag being set for longer than expected
    8bdcb0b98b altcall: fix __alt_call_maybe_initdata so it's safe for livepatch
    2d38302c33 x86/entry: Fix build with older toolchains
    d152a04246 Update CHANGELOG.md with 4.18.2 line
    b2863e468e Update Xen version to 4.18.2
    40f2c69ad8 x86/spec-ctrl: Support the "long" BHB loop sequence
    9be85b14aa x86/spec-ctrl: Wire up the Native-BHI software sequences
    72a357f4fa x86/spec-ctrl: Software BHB-clearing sequences
    73a4229807 x86/spec-ctrl: Support BHI_DIS_S in order to mitigate BHI
    2be76f2018 x86/tsx: Expose RTM_ALWAYS_ABORT to guests
    62844c4415 x86: Drop INDIRECT_JMP
    9fd732d18d x86: Use indirect calls in reset-stack infrastructure
    40a6795480 x86/spec-ctrl: Widen the {xen,last,default}_spec_ctrl fields
    fb12e8d8f7 x86/vmx: Add support for virtualize SPEC_CTRL
    a6cefb2686 x86/spec-ctrl: Detail the safety properties in SPEC_CTRL_ENTRY_*
    ccc6603b79 x86/spec-ctrl: Simplify DO_COND_IBPB
    5b28a4af1f x86/spec_ctrl: Hold SCF in %ebx across SPEC_CTRL_ENTRY_{PV,INTR}
    9bc337497c x86/entry: Arrange for %r14 to be STACK_END across SPEC_CTRL_ENTRY_FROM_PV
    e382cddcc2 x86/spec-ctrl: Rework conditional safety for SPEC_CTRL_ENTRY_*
    57e5cab3de x86/spec-ctrl: Rename spec_ctrl_flags to scf
    32cdecf1c3 x86/cpuid: Don't expose {IPRED,RRSBA,BHI}_CTRL to PV guests
    a482be9211 x86/alternatives: fix .init section reference in _apply_alternatives()
    855e261337 x86/tsx: Cope with RTM_ALWAYS_ABORT vs RTM mismatch
    125b1a7808 x86/spec-ctrl: Move __read_mostly data into __ro_after_init
    594dd0920f VMX: tertiary execution control infrastructure
    4c2208d06c x86/CPU: convert vendor hook invocations to altcall
    8a8c626281 x86/guest: finish conversion to altcall
    b6fad02a54 x86: arrange for ENDBR zapping from <vendor>_ctxt_switch_masking()
    0f6696a780 x86/spec-ctrl: Expose BHI_CTRL to guests
    a546399829 x86/spec-ctrl: Expose RRSBA_CTRL to guests
    fa7f2f9a86 x86/spec-ctrl: Expose IPRED_CTRL to guests
    1fe30f552a IRQ: generalize [gs]et_irq_regs()
    f7bd03b608 x86/MCE: switch some callback invocations to altcall
    9fdbcd84d3 x86/MCE: separate BSP-only initialization
    b06cf0701a x86/PV: avoid indirect call for I/O emulation quirk hook
    a2922d8097 x86/MTRR: avoid several indirect calls
    5c5d4eeee4 core-parking: use alternative_call()
    ba951c5f29 x86/HPET: avoid an indirect call
    a44c2c9f89 cpufreq: finish conversion to altcall
    6b8ee35088 x86/APIC: finish genapic conversion to altcall
    6d4055b9a5 x86/spec-ctrl: Fix BTC/SRSO mitigations
    1166467ed3 hypercall_xlat_continuation: Replace BUG_ON with domain_crash
    429a125dba x86/HVM: clear upper halves of GPRs upon entry from 32-bit code
    17cf285d87 tests/resource: Fix HVM guest in !SHADOW builds
    5c4aacab17 x86/boot: Support the watchdog on newer AMD systems
    a790c670bb x86/boot: Improve the boot watchdog determination of stuck cpus
    d0173bbed1 x86/livepatch: Relax permissions on rodata too
    4fc27254de xen/virtual-region: Include rodata pointers
    8c13f6c565 xen/virtual-region: Rename the start/end fields
    b576e09b66 x86/cpu-policy: Fix visibility of HTT/CMP_LEGACY in max policies
    03cc579ae3 x86/cpu-policy: Hide x2APIC from PV guests
    0a8b92d0a4 tools/oxenstored: Make Quota.t pure
    3f3158fc32 tools/oxenstored: Use Map instead of Hashtbl for quotas
    c9ea3b49a5 x86/PoD: tie together P2M update and increment of entry count
    cb7b84d3d5 x86/boot: Fix setup_apic_nmi_watchdog() to fail more cleanly
    62d9ca19f9 x86/mm: use block_lock_speculation() in _mm_write_lock()
    3d67ba0371 update Xen version to 4.18.2-pre
    ea82c8cdbf update Xen version to 4.18.1
    4da8ca9cb9 x86: protect conditional lock taking from speculative execution

Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
2024-05-31 13:38:28 +00:00
classes classes: add depreciated warning bbclass 2024-03-15 17:17:19 +00:00
conf layer: set compatibility to styhead 2024-05-29 13:16:56 +00:00
docs podman: Add support for rootless mode 2022-07-15 17:11:58 -04:00
dynamic-layers xen-boot-cmd.inc: Fix initrd boot issue with 6.6 kernel 2024-02-22 17:15:22 +00:00
files fs-perms-nagios.txt: add perms conf file 2018-09-06 12:45:17 -04:00
lib/oeqa/runtime/cases xtf: add testimage integration to run XTF test cases in OEQA 2021-09-02 16:36:23 -04:00
recipes-containers lxc: update to v6.0.0 2024-05-29 13:23:51 +00:00
recipes-core runv: drop recipe 2024-05-29 16:03:19 +00:00
recipes-demo helloworkd-flask: convert WORKDIR references to UNPACKDIR 2024-05-29 13:16:56 +00:00
recipes-devtools yq: adapt SRC_URI to include destsuffix=${GO_SRCURI_DESTSUFFIX} 2024-05-29 13:16:56 +00:00
recipes-extended xen: update to 4.18-tip 2024-05-31 13:38:28 +00:00
recipes-graphics/xorg-xserver global: overrides syntax conversion 2021-08-02 17:17:53 -04:00
recipes-kernel kernel: fix fragment path 2024-05-29 13:16:56 +00:00
recipes-networking ovs: convert WORKDIR references to UNPACKDIR 2024-05-29 13:23:51 +00:00
scripts oe-go-mod-autogen: clarify need to update main SRCREV 2023-11-06 16:21:12 +00:00
wic xen: use bzImage for boot (instead of vmlinux) 2024-03-21 23:15:13 +00:00
.gitignore buildah: add seccomp and ipv6 to REQUIRED_DISTRO_FEATURES 2023-04-12 13:10:11 -04:00
COPYING.MIT Initial meta-xen layer documentation. 2012-06-21 15:51:11 -06:00
MAINTAINERS MAINTAINERS: add xtf and the raspberry pi dynamic layer for Xen 2021-12-16 21:45:00 -05:00
meta-virt-roadmap.txt docs: roadmap: add missing workflow items 2019-10-28 11:56:10 -04:00
README.md docs/README: drop meta-oe priority recommendation 2024-04-04 19:57:46 +00:00
SECURITY.md docs: add SECURITY.md and rename README.md 2023-11-06 16:21:12 +00:00

meta-virtualization

This layer provides support for building Xen, KVM, Libvirt, and associated packages necessary for constructing OE-based virtualized solutions.

The bbappend files for some recipes (e.g. linux-yocto) in this layer need to have 'virtualization' in DISTRO_FEATURES to have effect. To enable them, add in configuration file the following line.

DISTRO_FEATURES:append = " virtualization"

If meta-virtualization is included, but virtualization is not enabled as a distro feature a warning is printed at parse time:

You have included the meta-virtualization layer, but
'virtualization' has not been enabled in your DISTRO_FEATURES. Some bbappend files
may not take effect. See the meta-virtualization README for details on enabling
virtualization support.

If you know what you are doing, this warning can be disabled by setting the following variable in your configuration:

SKIP_META_VIRT_SANITY_CHECK = 1

Depending on your use case, there are other distro features in meta-virtualization that may also be enabled:

  • xen: enables xen functionality in various packages (kernel, libvirt, etc)
  • kvm: enables KVM configurations in the kernel and autoloads modules
  • k8s: enables kubernets configurations in the kernel, tools and configuration
  • aufs: enables aufs support in docker and linux-yocto
  • x11: enable xen and libvirt functionality related to x11
  • selinux: enables functionality in libvirt and lxc
  • systemd: enable systemd services and unit files (for recipes for support)
  • sysvinit: enable sysvinit scripts (for recipes with support)
  • seccomp: enable seccomp support for packages that have the capability.

Dependencies

This layer depends on:

URI: git://github.com/openembedded/openembedded-core.git branch: master revision: HEAD prio: default

URI: git://github.com/openembedded/meta-openembedded.git branch: master revision: HEAD layers: meta-oe meta-networking meta-filesystems meta-python

Required for Xen XSM policy: URI: git://git.yoctoproject.org/meta-selinux branch: master revision: HEAD prio: default

Required for Ceph: URI: git://git.yoctoproject.org/meta-cloud-services branch: master revision: HEAD prio: default

Required for cri-o: URI: git://git.yoctoproject.org/meta-selinux branch: master revision: HEAD prio: default

Community / Colaboration

Repository: https://git.yoctoproject.org/cgit/cgit.cgi/meta-virtualization/ Mailing list: https://lists.yoctoproject.org/g/meta-virtualization IRC: libera.chat #meta-virt channel

Maintenance

Send pull requests, patches, comments or questions to meta-virtualization@lists.yoctoproject.org

Maintainer: Bruce Ashfield bruce.ashfield@gmail.com see MAINTAINERS for more specific information

When sending single patches, please using something like: $ git send-email -1 -M --to meta-virtualization@lists.yoctoproject.org --subject-prefix='meta-virtualization][PATCH'

License

All metadata is MIT licensed unless otherwise stated. Source code included in tree for individual recipes is under the LICENSE stated in each recipe (.bb file) unless otherwise stated.