Branch: refs/heads/master
Home: https://github.com/siemens/jailhouse
Commit: c6a7818400d7cedda0d083374a88fd10bb6f30a7
https://github.com/siemens/jailhouse/commit/c6a7818400d7cedda0d083374a88fd10bb6f30a7
Author: Jan Kiszka <[email protected]>
Date: 2018-09-27 (Thu, 27 Sep 2018)
Changed paths:
M tools/jailhouse-config-create
Log Message:
-----------
tools: config-create: Adjust defaults to qemu-x86 setup
This allows to reuse the existing inmate configs more easily. 6M of
hypervisor memory is much less than before but should only be a problem
on very large or very old (no VT-d hugepages) systems, so it's
practically fine.
Signed-off-by: Jan Kiszka <[email protected]>
Commit: 06e3ecb5eefc4b199e0a60cb246fedea330caa21
https://github.com/siemens/jailhouse/commit/06e3ecb5eefc4b199e0a60cb246fedea330caa21
Author: Jan Kiszka <[email protected]>
Date: 2018-10-01 (Mon, 01 Oct 2018)
Changed paths:
A configs/arm64/dts/inmate-macchiatobin.dts
A configs/arm64/macchiatobin-gic-demo.c
A configs/arm64/macchiatobin-linux-demo.c
A configs/arm64/macchiatobin.c
Log Message:
-----------
configs: Add support for MACCHIATObin board
Add configs for the Marvell Armada 8040-based MACCHIATObin board.
As we set the pci_domain to 1 and the upstream kernel does not
initialize linux,pci-domain, we need a patch to the DTB for the time
being.
MSI support should eventually be possible as well, but we still with
INTx for the virtual shmem devices for now.
Signed-off-by: Jan Kiszka <[email protected]>
Commit: dd6269a94a50d091d5a76fe4011e5fc491e5bcc6
https://github.com/siemens/jailhouse/commit/dd6269a94a50d091d5a76fe4011e5fc491e5bcc6
Author: Jan Kiszka <[email protected]>
Date: 2018-10-08 (Mon, 08 Oct 2018)
Changed paths:
M driver/cell.c
Log Message:
-----------
driver: x86: Catch unsupported assignment of CPU 0 to non-root cells
Due to the way how CPU 0 is offlined on x86, we cannot "steal" it from
the root cell and give it to a different owner. Catch any configuration
that tries to do so and reject this attempt.
Signed-off-by: Jan Kiszka <[email protected]>
Commit: e20fe893a8a6b3108f06c96fd505732fd52aeda0
https://github.com/siemens/jailhouse/commit/e20fe893a8a6b3108f06c96fd505732fd52aeda0
Author: Jan Kiszka <[email protected]>
Date: 2018-10-08 (Mon, 08 Oct 2018)
Changed paths:
M hypervisor/arch/x86/apic.c
Log Message:
-----------
x86: Clarify and improve rejection of NMI IPIs
While technically doable, re-injecting NMIs from the hypervisor into a
guest is far from being simple. On Intel, we need to take care of
various cases where injection could have failed. On AMD, it even takes
single-stepping over the IRET instruction in order to get to the end of
an NMI-blocking window.
So, remove the to-do note, replacing it with a hint that NMI IPIs will
likely remain unsupported for a longer time. At this chance augment the
printed message with the target CPU of the IPI. This may help to
correlate the effect of a missing NMI or the reason for the injection
(stalled CPU).
Signed-off-by: Jan Kiszka <[email protected]>
Commit: 6f119f396d1bbe87c8ccccd66e8fd4c0669f53b5
https://github.com/siemens/jailhouse/commit/6f119f396d1bbe87c8ccccd66e8fd4c0669f53b5
Author: Claudio Scordino <[email protected]>
Date: 2018-10-10 (Wed, 10 Oct 2018)
Changed paths:
M inmates/demos/x86/apic-demo.c
M inmates/lib/x86/include/inmate.h
M inmates/lib/x86/timing.c
Log Message:
-----------
tsc_read() renamed tsc_read_ns() to avoid misunderstandings.
Signed-off-by: Claudio Scordino <[email protected]>
Signed-off-by: Jan Kiszka <[email protected]>
Commit: 56b2d1d1580b34720f379aede731e7d2ea80d876
https://github.com/siemens/jailhouse/commit/56b2d1d1580b34720f379aede731e7d2ea80d876
Author: Jan Kiszka <[email protected]>
Date: 2018-10-11 (Thu, 11 Oct 2018)
Changed paths:
M driver/sysfs.c
M hypervisor/arch/x86/svm.c
M hypervisor/arch/x86/vmx.c
M include/arch/x86/asm/jailhouse_hypercall.h
Log Message:
-----------
x86, driver: Prepare for finer-grained MSR exist statistics
We will add separate counters for specific frequent MSR accesses.
Prepare by reordering renaming the existing existing counter to
"MSR_OTHER".
Signed-off-by: Jan Kiszka <[email protected]>
Commit: 4bdff00afea92067fee356629f21e25710ad9ae8
https://github.com/siemens/jailhouse/commit/4bdff00afea92067fee356629f21e25710ad9ae8
Author: Jan Kiszka <[email protected]>
Date: 2018-10-11 (Thu, 11 Oct 2018)
Changed paths:
M hypervisor/arch/x86/vmx.c
Log Message:
-----------
x86: vmx: Use local variable for stats in vcpu_handle_exit
Shortens lines and makes it more readable as well.
Signed-off-by: Jan Kiszka <[email protected]>
Commit: 3e9c91302ee5114284227e298883c1098f91001f
https://github.com/siemens/jailhouse/commit/3e9c91302ee5114284227e298883c1098f91001f
Author: Jan Kiszka <[email protected]>
Date: 2018-10-11 (Thu, 11 Oct 2018)
Changed paths:
M hypervisor/arch/x86/apic.c
M hypervisor/arch/x86/svm.c
M hypervisor/arch/x86/vcpu.c
M hypervisor/arch/x86/vmx.c
Log Message:
-----------
x86: Push MSR statistic down to the dispatching points
This is another step in preparing more fine-grained statistics.
Signed-off-by: Jan Kiszka <[email protected]>
Commit: 2482bffc3e130546570299626f50d7b90574ef94
https://github.com/siemens/jailhouse/commit/2482bffc3e130546570299626f50d7b90574ef94
Author: Jan Kiszka <[email protected]>
Date: 2018-10-11 (Thu, 11 Oct 2018)
Changed paths:
M driver/sysfs.c
M hypervisor/arch/x86/apic.c
M include/arch/x86/asm/jailhouse_hypercall.h
Log Message:
-----------
x86, driver: Add MSR_X2APIC_ISR exit counter
ICR accesses are a frequent source of vmexits for multicore cells
when the communicate via IPIs between the cores. Account for these exits
separately.
Signed-off-by: Jan Kiszka <[email protected]>
Commit: 20b7d8d3423aa264caac932e759e97b0ca65b376
https://github.com/siemens/jailhouse/commit/20b7d8d3423aa264caac932e759e97b0ca65b376
Author: Jan Kiszka <[email protected]>
Date: 2018-10-11 (Thu, 11 Oct 2018)
Changed paths:
M tools/jailhouse-cell-stats
Log Message:
-----------
tools: cell-stats: Filter on statistic entries
We are going to add CPU directories, so we need to be stricter with what
we consider a statistic entry.
Signed-off-by: Jan Kiszka <[email protected]>
Commit: 44e19da09b6614146bec15ff1529359dddb02b0c
https://github.com/siemens/jailhouse/commit/44e19da09b6614146bec15ff1529359dddb02b0c
Author: Jan Kiszka <[email protected]>
Date: 2018-10-12 (Fri, 12 Oct 2018)
Changed paths:
M driver/cell.h
M driver/sysfs.c
Log Message:
-----------
driver: Prepare for per-cpu statistics
This refactors the sysfs statistics code so that we can later add
per-CPU counters under the <cell-id>/statistics/ path. Primarily, this
means switching from a attribute group to a kobject for statistics.
Signed-off-by: Jan Kiszka <[email protected]>
Commit: d02306997a69533ad893b11161eb3310ddacac50
https://github.com/siemens/jailhouse/commit/d02306997a69533ad893b11161eb3310ddacac50
Author: Jan Kiszka <[email protected]>
Date: 2018-10-15 (Mon, 15 Oct 2018)
Changed paths:
M Documentation/sysfs-entries.txt
M driver/cell.c
M driver/cell.h
M driver/sysfs.c
Log Message:
-----------
driver: Add per-cpu statistics
The hypervisor already provides us the counter CPU-specific, we just
need to expose them separated, in addition to the existing accumulated
representation. This helps to identify hypervisor interferences in
multicore cells that use core-specific workload.
The CPU-specific statistics are created for all CPUs during root cell
setup as separate kobjects. When a non-root cell is create the kobjects
associated with those CPUs that this cell is assigned are simply moved
from the root cell to the new one. On non-root cell destruction, the
kobjects are moved back. They are truly destroyed on root cell
tear-down.
Signed-off-by: Jan Kiszka <[email protected]>
Commit: d8ea8a43a1a74d5b34afeb4a473cc942ee867abc
https://github.com/siemens/jailhouse/commit/d8ea8a43a1a74d5b34afeb4a473cc942ee867abc
Author: Jan Kiszka <[email protected]>
Date: 2018-10-15 (Mon, 15 Oct 2018)
Changed paths:
M tools/jailhouse-cell-stats
Log Message:
-----------
tools: cell-stats: Visualize also CPU-specific statistics
Add a mode to step through the cell CPUs and display CPU-specific
statistics, just like the overall sum that is shown by default.
Signed-off-by: Jan Kiszka <[email protected]>
Commit: a977f90e4c27e71e831449ea0df4ea386f1c65c0
https://github.com/siemens/jailhouse/commit/a977f90e4c27e71e831449ea0df4ea386f1c65c0
Author: Jan Kiszka <[email protected]>
Date: 2018-10-17 (Wed, 17 Oct 2018)
Changed paths:
M hypervisor/arch/x86/svm.c
M hypervisor/arch/x86/vmx.c
Log Message:
-----------
x86: Fix CONFIG_CRASH_CELL_ON_PANIC
As it is not enabled by default, this became silently broken.
Fixes: 13c472715e29 ("core: Move failed into public per-cpu section")
Signed-off-by: Jan Kiszka <[email protected]>
Commit: 0ef181543fcc3ff47f5f6f502ff88d351304feca
https://github.com/siemens/jailhouse/commit/0ef181543fcc3ff47f5f6f502ff88d351304feca
Author: Ralf Ramsauer <[email protected]>
Date: 2018-10-21 (Sun, 21 Oct 2018)
Changed paths:
M driver/sysfs.c
M hypervisor/arch/arm-common/smccc.c
M include/arch/arm/asm/jailhouse_hypercall.h
M include/arch/arm64/asm/jailhouse_hypercall.h
Log Message:
-----------
arm-common: account for SMC exits
Statistics on ARM currently has some imbalances: the total number of
exits doesn't equal the sum of the fine granular exit counters: we
aren't accounting for SMCCC exits.
Fix this by adding a new statistic counter for SMCCC.
PSCI exits are already accounted inside psci_dispatch(), move SMCCC
accounting to the dispatcher routine handle_smc().
Fixes: 7688e96c815b ("arm-common: Rework handling of SMC")
Signed-off-by: Ralf Ramsauer <[email protected]>
Signed-off-by: Jan Kiszka <[email protected]>
Compare:
https://github.com/siemens/jailhouse/compare/f596aa7355bc...0ef181543fcc
**NOTE:** This service has been marked for deprecation:
https://developer.github.com/changes/2018-04-25-github-services-deprecation/
Functionality will be removed from GitHub.com on January 31st, 2019.
--
You received this message because you are subscribed to the Google Groups
"Jailhouse" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to [email protected].
For more options, visit https://groups.google.com/d/optout.