![]() Bumping xen to version RELEASE-4.18.2-19-g01f7a3c792, which comprises the following commits: 01f7a3c792 update Xen version to 4.18.3-pre 7cdb1fa2ab x86/mtrr: avoid system wide rendezvous when setting AP MTRRs f3d20dd317 tools/xentop: Fix cpu% sort order dfabab2cd9 x86: respect mapcache_domain_init() failing 3999b675ca xen/sched: set all sched_resource data inside locked region for new cpu 8271f0e8f2 libxl: Fix handling XenStore errors in device creation 9966e54131 libxl: fix population of the online vCPU bitmap for PVH a42c83b202 x86/ucode: Distinguish "ucode already up to date" 0673eae8e5 x86/cpu-policy: Fix migration from Ice Lake to Cascade Lake 2bc52041ca tools/libxs: Open /dev/xen/xenbus fds as O_CLOEXEC a4c5bbb9db VT-d: correct ATS checking for root complex integrated devices 47cf06c09a xen/x86: Fix Syntax warning in gen-cpuid.py 026542c857 xen/xsm: Wire up get_dom0_console f0ff1d9cb9 x86/spec: adjust logic that elides lfence 0b0c7dca70 x86/spec: fix reporting of BHB clearing usage from guest entry points eb7059767c x86/MTRR: correct inadvertently inverted WC check af0e9ba44a x86/rtc: Avoid UIP flag being set for longer than expected 8bdcb0b98b altcall: fix __alt_call_maybe_initdata so it's safe for livepatch 2d38302c33 x86/entry: Fix build with older toolchains d152a04246 Update CHANGELOG.md with 4.18.2 line b2863e468e Update Xen version to 4.18.2 40f2c69ad8 x86/spec-ctrl: Support the "long" BHB loop sequence 9be85b14aa x86/spec-ctrl: Wire up the Native-BHI software sequences 72a357f4fa x86/spec-ctrl: Software BHB-clearing sequences 73a4229807 x86/spec-ctrl: Support BHI_DIS_S in order to mitigate BHI 2be76f2018 x86/tsx: Expose RTM_ALWAYS_ABORT to guests 62844c4415 x86: Drop INDIRECT_JMP 9fd732d18d x86: Use indirect calls in reset-stack infrastructure 40a6795480 x86/spec-ctrl: Widen the {xen,last,default}_spec_ctrl fields fb12e8d8f7 x86/vmx: Add support for virtualize SPEC_CTRL a6cefb2686 x86/spec-ctrl: Detail the safety properties in SPEC_CTRL_ENTRY_* ccc6603b79 x86/spec-ctrl: Simplify DO_COND_IBPB 5b28a4af1f x86/spec_ctrl: Hold SCF in %ebx across SPEC_CTRL_ENTRY_{PV,INTR} 9bc337497c x86/entry: Arrange for %r14 to be STACK_END across SPEC_CTRL_ENTRY_FROM_PV e382cddcc2 x86/spec-ctrl: Rework conditional safety for SPEC_CTRL_ENTRY_* 57e5cab3de x86/spec-ctrl: Rename spec_ctrl_flags to scf 32cdecf1c3 x86/cpuid: Don't expose {IPRED,RRSBA,BHI}_CTRL to PV guests a482be9211 x86/alternatives: fix .init section reference in _apply_alternatives() 855e261337 x86/tsx: Cope with RTM_ALWAYS_ABORT vs RTM mismatch 125b1a7808 x86/spec-ctrl: Move __read_mostly data into __ro_after_init 594dd0920f VMX: tertiary execution control infrastructure 4c2208d06c x86/CPU: convert vendor hook invocations to altcall 8a8c626281 x86/guest: finish conversion to altcall b6fad02a54 x86: arrange for ENDBR zapping from <vendor>_ctxt_switch_masking() 0f6696a780 x86/spec-ctrl: Expose BHI_CTRL to guests a546399829 x86/spec-ctrl: Expose RRSBA_CTRL to guests fa7f2f9a86 x86/spec-ctrl: Expose IPRED_CTRL to guests 1fe30f552a IRQ: generalize [gs]et_irq_regs() f7bd03b608 x86/MCE: switch some callback invocations to altcall 9fdbcd84d3 x86/MCE: separate BSP-only initialization b06cf0701a x86/PV: avoid indirect call for I/O emulation quirk hook a2922d8097 x86/MTRR: avoid several indirect calls 5c5d4eeee4 core-parking: use alternative_call() ba951c5f29 x86/HPET: avoid an indirect call a44c2c9f89 cpufreq: finish conversion to altcall 6b8ee35088 x86/APIC: finish genapic conversion to altcall 6d4055b9a5 x86/spec-ctrl: Fix BTC/SRSO mitigations 1166467ed3 hypercall_xlat_continuation: Replace BUG_ON with domain_crash 429a125dba x86/HVM: clear upper halves of GPRs upon entry from 32-bit code 17cf285d87 tests/resource: Fix HVM guest in !SHADOW builds 5c4aacab17 x86/boot: Support the watchdog on newer AMD systems a790c670bb x86/boot: Improve the boot watchdog determination of stuck cpus d0173bbed1 x86/livepatch: Relax permissions on rodata too 4fc27254de xen/virtual-region: Include rodata pointers 8c13f6c565 xen/virtual-region: Rename the start/end fields b576e09b66 x86/cpu-policy: Fix visibility of HTT/CMP_LEGACY in max policies 03cc579ae3 x86/cpu-policy: Hide x2APIC from PV guests 0a8b92d0a4 tools/oxenstored: Make Quota.t pure 3f3158fc32 tools/oxenstored: Use Map instead of Hashtbl for quotas c9ea3b49a5 x86/PoD: tie together P2M update and increment of entry count cb7b84d3d5 x86/boot: Fix setup_apic_nmi_watchdog() to fail more cleanly 62d9ca19f9 x86/mm: use block_lock_speculation() in _mm_write_lock() 3d67ba0371 update Xen version to 4.18.2-pre ea82c8cdbf update Xen version to 4.18.1 4da8ca9cb9 x86: protect conditional lock taking from speculative execution Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com> |
||
---|---|---|
classes | ||
conf | ||
docs | ||
dynamic-layers | ||
files | ||
lib/oeqa/runtime/cases | ||
recipes-containers | ||
recipes-core | ||
recipes-demo | ||
recipes-devtools | ||
recipes-extended | ||
recipes-graphics/xorg-xserver | ||
recipes-kernel | ||
recipes-networking | ||
scripts | ||
wic | ||
.gitignore | ||
COPYING.MIT | ||
MAINTAINERS | ||
meta-virt-roadmap.txt | ||
README.md | ||
SECURITY.md |
meta-virtualization
This layer provides support for building Xen, KVM, Libvirt, and associated packages necessary for constructing OE-based virtualized solutions.
The bbappend files for some recipes (e.g. linux-yocto) in this layer need to have 'virtualization' in DISTRO_FEATURES to have effect. To enable them, add in configuration file the following line.
DISTRO_FEATURES:append = " virtualization"
If meta-virtualization is included, but virtualization is not enabled as a distro feature a warning is printed at parse time:
You have included the meta-virtualization layer, but
'virtualization' has not been enabled in your DISTRO_FEATURES. Some bbappend files
may not take effect. See the meta-virtualization README for details on enabling
virtualization support.
If you know what you are doing, this warning can be disabled by setting the following variable in your configuration:
SKIP_META_VIRT_SANITY_CHECK = 1
Depending on your use case, there are other distro features in meta-virtualization that may also be enabled:
- xen: enables xen functionality in various packages (kernel, libvirt, etc)
- kvm: enables KVM configurations in the kernel and autoloads modules
- k8s: enables kubernets configurations in the kernel, tools and configuration
- aufs: enables aufs support in docker and linux-yocto
- x11: enable xen and libvirt functionality related to x11
- selinux: enables functionality in libvirt and lxc
- systemd: enable systemd services and unit files (for recipes for support)
- sysvinit: enable sysvinit scripts (for recipes with support)
- seccomp: enable seccomp support for packages that have the capability.
Dependencies
This layer depends on:
URI: git://github.com/openembedded/openembedded-core.git branch: master revision: HEAD prio: default
URI: git://github.com/openembedded/meta-openembedded.git branch: master revision: HEAD layers: meta-oe meta-networking meta-filesystems meta-python
Required for Xen XSM policy: URI: git://git.yoctoproject.org/meta-selinux branch: master revision: HEAD prio: default
Required for Ceph: URI: git://git.yoctoproject.org/meta-cloud-services branch: master revision: HEAD prio: default
Required for cri-o: URI: git://git.yoctoproject.org/meta-selinux branch: master revision: HEAD prio: default
Community / Colaboration
Repository: https://git.yoctoproject.org/cgit/cgit.cgi/meta-virtualization/ Mailing list: https://lists.yoctoproject.org/g/meta-virtualization IRC: libera.chat #meta-virt channel
Maintenance
Send pull requests, patches, comments or questions to meta-virtualization@lists.yoctoproject.org
Maintainer: Bruce Ashfield bruce.ashfield@gmail.com see MAINTAINERS for more specific information
When sending single patches, please using something like: $ git send-email -1 -M --to meta-virtualization@lists.yoctoproject.org --subject-prefix='meta-virtualization][PATCH'
License
All metadata is MIT licensed unless otherwise stated. Source code included in tree for individual recipes is under the LICENSE stated in each recipe (.bb file) unless otherwise stated.