Branch: refs/heads/master
  Home:   https://github.com/siemens/jailhouse
  Commit: efbf1f64ceaeac42a64b2109b6b3a9cdbc6d4065
      
https://github.com/siemens/jailhouse/commit/efbf1f64ceaeac42a64b2109b6b3a9cdbc6d4065
  Author: Jan Kiszka <[email protected]>
  Date:   2017-07-23 (Sun, 23 Jul 2017)

  Changed paths:
    M Kbuild
    M hypervisor/Makefile
    M hypervisor/arch/arm-common/Kbuild
    M hypervisor/arch/x86/Kbuild
    M inmates/lib/arm/Makefile.lib
    M inmates/lib/arm64/Makefile.lib

  Log Message:
  -----------
  core, inmates: Fix CONFIG var leaks from Linux

This logically reverts ee56c6d71a4e: While exporting our config vars
from the top level worked fine, kbuild seems to pull in the kernel's
variables on each subdir recursion. E.g., CONFIG_ARM_GIC_V3 can leak
this way from Linux where it has different semantics and will break
GICv2 targets.

Fix this by including config.mk in each makefile that makes use of
config vars and is in a separate subdir.

config.mk is generated unconditionally. So remove the optional inclusion
in hypervisor/Makefile at this chance.

Signed-off-by: Jan Kiszka <[email protected]>


  Commit: 09794ad9d497b2b76869741653ac78a5501d8512
      
https://github.com/siemens/jailhouse/commit/09794ad9d497b2b76869741653ac78a5501d8512
  Author: Jan Kiszka <[email protected]>
  Date:   2017-07-23 (Sun, 23 Jul 2017)

  Changed paths:
    M driver/pci.c

  Log Message:
  -----------
  driver: Add recognition of GIVv3 to vPCI registration

On GICv3 systems, match against this interrupt controller in order to
hook up the virtual PCI host controller.

Signed-off-by: Jan Kiszka <[email protected]>


  Commit: 0d6d5c661889baba9e480c67e34969c3aedcd68c
      
https://github.com/siemens/jailhouse/commit/0d6d5c661889baba9e480c67e34969c3aedcd68c
  Author: Jan Kiszka <[email protected]>
  Date:   2017-07-23 (Sun, 23 Jul 2017)

  Changed paths:
    M inmates/lib/arm/include/mach.h
    M inmates/lib/arm64/include/mach.h

  Log Message:
  -----------
  inmates: arm, arm64: Pull out common TIMER_IRQ definition

So far, all SoCs provide us IRQ 27 as timer interrupt. Let's see if
there will ever be a difference, but it will remain the minority for
quite a while then.

Signed-off-by: Jan Kiszka <[email protected]>


  Commit: 2389d9b3392c4adac3c9cb31f8dc2c2e96177292
      
https://github.com/siemens/jailhouse/commit/2389d9b3392c4adac3c9cb31f8dc2c2e96177292
  Author: Göktürk Yüksek <[email protected]>
  Date:   2017-08-03 (Thu, 03 Aug 2017)

  Changed paths:
    M driver/main.c

  Log Message:
  -----------
  driver: handle a NULL pointer reference on the error path

In the function jailhouse_hypervisor_enable(), jumping to the label
error_unmap results in a call to jailhouse_free_firmware() which
releases hypervisor_mem_res and sets it to NULL. However, the
execution proceeds to the label error_release_memreg and tries to
access hypervisor_mem_res->start, which triggers a NULL pointer
reference.

Fix the problem for explicitly checking against the NULL pointer.

Signed-off-by: Göktürk Yüksek <[email protected]>
[Jan: tune wording of comment]
Signed-off-by: Jan Kiszka <[email protected]>


  Commit: e2fa9ffd158812aa4c1a267d62f00cf4202e23c1
      
https://github.com/siemens/jailhouse/commit/e2fa9ffd158812aa4c1a267d62f00cf4202e23c1
  Author: Gustavo Lima Chaves <[email protected]>
  Date:   2017-08-03 (Thu, 03 Aug 2017)

  Changed paths:
    M tools/jailhouse-config-create
    M tools/root-cell-config.c.tmpl

  Log Message:
  -----------
  tools: config-create: Use number of int sources for vtd int limit

We were sticking to hardcoded 256 entries there. We now scale better
for systems with more PCI device entries.

Signed-off-by: Gustavo Lima Chaves <[email protected]>
Signed-off-by: Jan Kiszka <[email protected]>


  Commit: 607251b44397666a3cbbf859d784dccf20aba016
      
https://github.com/siemens/jailhouse/commit/607251b44397666a3cbbf859d784dccf20aba016
  Author: Claudio Scordino <[email protected]>
  Date:   2017-08-19 (Sat, 19 Aug 2017)

  Changed paths:
    M inmates/lib/arm-common/Makefile.lib
    M inmates/lib/arm-common/gic-v2.c
    M inmates/lib/arm-common/gic.c
    M inmates/lib/arm-common/include/gic.h
    M inmates/lib/arm-common/include/inmate.h
    M inmates/lib/arm-common/include/uart.h
    M inmates/lib/arm-common/printk.c
    M inmates/lib/arm-common/timer.c
    M inmates/lib/arm-common/uart-8250.c
    M inmates/lib/arm-common/uart-jailhouse.c
    M inmates/lib/arm-common/uart-pl011.c
    M inmates/lib/arm-common/uart-xuartps.c
    M inmates/lib/arm/Makefile
    M inmates/lib/arm/Makefile.lib
    M inmates/lib/arm/gic-v3.c
    M inmates/lib/arm/header.S
    M inmates/lib/arm/include/arch/gic.h
    M inmates/lib/arm/include/arch/inmate.h
    M inmates/lib/arm/include/mach.h
    M inmates/lib/arm/inmate.lds.S
    M inmates/lib/arm64/Makefile
    M inmates/lib/arm64/Makefile.lib
    M inmates/lib/arm64/header.S
    M inmates/lib/arm64/include/arch/gic.h
    M inmates/lib/arm64/include/arch/inmate.h
    M inmates/lib/arm64/include/mach.h
    M inmates/lib/arm64/inmate.lds.S
    M inmates/lib/cmdline.c
    M inmates/lib/inmate_common.h
    M inmates/lib/pci.c
    M inmates/lib/string.c
    M inmates/lib/x86/Makefile
    M inmates/lib/x86/Makefile.lib
    M inmates/lib/x86/header-32.S
    M inmates/lib/x86/header.S
    M inmates/lib/x86/hypercall.c
    M inmates/lib/x86/inmate.h
    M inmates/lib/x86/inmate.lds
    M inmates/lib/x86/int.c
    M inmates/lib/x86/ioapic.c
    M inmates/lib/x86/mem.c
    M inmates/lib/x86/pci.c
    M inmates/lib/x86/printk.c
    M inmates/lib/x86/smp.c
    M inmates/lib/x86/timing.c

  Log Message:
  -----------
  Provide the inmate library under BSD-2 license too.

This patch does not introduce any functional change, but "only" deals
with copyright and license aspects.

The rationale is simply that, as was already stated in COPYING, cell
inmates, AKA guests, are not derived work of Jailhouse, even if written
exclusively to run in its special environment. The inmate library
provides a set of functionalities to let inmates run on Jailhouse.
In order to avoid that people need to rewrite such library, possibly
introducing bugs or incompatibilities this way, we should rather enable
the reuse of the "official" one. Thus, it should be provided also under a
permissive license. BSD 2-clause is a well-established and easy-to-deal
with license, already used for the Jailhouse headers.

All required contributors to the affected code have signed-off to
confirm that they agree with this relicensing. Commits 98000ec9e5da
("inmate: x86: fixup apic_freq to be unsigned long") and 314922e8bb72
("inmates/lib: cmdline.c") are trival changes/removals and do not block
the relicensing.

Signed-off-by: Claudio Scordino <[email protected]>
Signed-off-by: Jean-Philippe Brucker <[email protected]>
Signed-off-by: Valentine Sinitsyn <[email protected]>
Signed-off-by: ShengYan Penguin <[email protected]>
Signed-off-by: Ralf Ramsauer <[email protected]>
Signed-off-by: Andreas Kölbl <[email protected]>
Signed-off-by: Vitaly Andrianov <[email protected]>
Signed-off-by: Antonios Motakis <[email protected]>
Signed-off-by: Jan Kiszka <[email protected]> (for all Siemens commits)


  Commit: eb88624ba9ea1ff5a821b949e20652b46bd29a8d
      
https://github.com/siemens/jailhouse/commit/eb88624ba9ea1ff5a821b949e20652b46bd29a8d
  Author: Ralf Ramsauer <[email protected]>
  Date:   2017-08-22 (Tue, 22 Aug 2017)

  Changed paths:
    M configs/jetson-tk1.c

  Log Message:
  -----------
  configs: TK1: Add XUSB_DEV and XUSB_PADCTL regions

Those regions must be mapped to the root cell if a XUSB device is
connected.

Signed-off-by: Ralf Ramsauer <[email protected]>
Signed-off-by: Jan Kiszka <[email protected]>


  Commit: 61f738d2740bb967f69565ff68a2e3329a4b869d
      
https://github.com/siemens/jailhouse/commit/61f738d2740bb967f69565ff68a2e3329a4b869d
  Author: Jan Kiszka <[email protected]>
  Date:   2017-08-25 (Fri, 25 Aug 2017)

  Changed paths:
    M Documentation/hypervisor-interfaces.txt
    M configs/e1000-demo.c
    M configs/ioapic-demo.c
    M configs/ivshmem-demo.c
    M configs/linux-x86-demo.c
    M configs/pci-demo.c
    M configs/smp-demo.c
    M configs/tiny-demo.c

  Log Message:
  -----------
  docs, configs: Make passive comm region read-only

Specify in the docs and implement in the configuration files that cells
with passive comm regions have only read access to it. This avoids that
a passive cell, i.e. one that should also not be able to prevent
configuration changes, can block them by declaring itself "running/
locked".

Instead of checking in the hypervisor that a cell config does not permit
writes to passive comm regions, we should eventually validate this
offline via a config checker.

Reported-by: Gustavo Lima Chaves <[email protected]>
Signed-off-by: Jan Kiszka <[email protected]>


Compare: 
https://github.com/siemens/jailhouse/compare/7ef4b98ebe04...61f738d2740b

-- 
You received this message because you are subscribed to the Google Groups 
"Jailhouse" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/d/optout.

Reply via email to