Branch: refs/heads/master
  Home:   https://github.com/siemens/jailhouse
  Commit: f7604e0b4beda5985aceebe50228c3e14abe4d0b
      
https://github.com/siemens/jailhouse/commit/f7604e0b4beda5985aceebe50228c3e14abe4d0b
  Author: Jan Kiszka <[email protected]>
  Date:   2019-06-06 (Thu, 06 Jun 2019)

  Changed paths:
    M hypervisor/arch/x86/vtd.c

  Log Message:
  -----------
  x86: vtd: Use proper MMIO_ERROR instead of -1

No functional change as the value stays the same.

Signed-off-by: Jan Kiszka <[email protected]>


  Commit: d07b0dcba4837e2f5cc9799d777a32b1ab5f7936
      
https://github.com/siemens/jailhouse/commit/d07b0dcba4837e2f5cc9799d777a32b1ab5f7936
  Author: Andrej Utz <[email protected]>
  Date:   2019-06-07 (Fri, 07 Jun 2019)

  Changed paths:
    M pyjailhouse/sysfs_parser.py

  Log Message:
  -----------
  pyjailhouse: sysfs_parser: fix IVDM memory region definition

Second parameter to MemRegion must be its end (inclusive).

Fixes: 5fe206927c05 ("tools: Implement ACPI IVRS table parser")
Signed-off-by: Andrej Utz <[email protected]>
Signed-off-by: Jan Kiszka <[email protected]>


  Commit: 8c5b95c43a8c41a2f648a8d3b0b95533916cca17
      
https://github.com/siemens/jailhouse/commit/8c5b95c43a8c41a2f648a8d3b0b95533916cca17
  Author: Ralf Ramsauer <[email protected]>
  Date:   2019-06-07 (Fri, 07 Jun 2019)

  Changed paths:
    M hypervisor/arch/x86/include/asm/mmio.h
    M hypervisor/arch/x86/mmio.c
    M hypervisor/arch/x86/vcpu.c
    M inmates/tests/x86/mmio-access-32.c
    M inmates/tests/x86/mmio-access.c

  Log Message:
  -----------
  x86: mmio: fix accidental clears of bits in registers

We trap certain MMIO accesses and need to emulate their access.

On x86, a 32-bit read will clear bits 32-63 of a register.

Inconsistently, on x86, 16-bit and 8-bit reads must not clear high bits.
Jailhouse erroneously cleared those bits. Prevent this by applying a
preserved mask that keeps bits alive.

Add tests that check correct behaviour.

Signed-off-by: Ralf Ramsauer <[email protected]>
[Jan: dropped redundant EXPECT_EQUAL]
Signed-off-by: Jan Kiszka <[email protected]>


  Commit: a39be9c3499f51a05dedf5b8612cee42f82db659
      
https://github.com/siemens/jailhouse/commit/a39be9c3499f51a05dedf5b8612cee42f82db659
  Author: Ralf Ramsauer <[email protected]>
  Date:   2019-06-07 (Fri, 07 Jun 2019)

  Changed paths:
    M hypervisor/arch/x86/mmio.c

  Log Message:
  -----------
  x86: mmio: move flags to struct parse_context

We can easier pass them around if flags are stored in struct
parse_context.

Just a preparation, no functional change so far.

Signed-off-by: Ralf Ramsauer <[email protected]>
Signed-off-by: Jan Kiszka <[email protected]>


  Commit: 96157677dfbb37cc112e4384bbd4c585f9d98af6
      
https://github.com/siemens/jailhouse/commit/96157677dfbb37cc112e4384bbd4c585f9d98af6
  Author: Ralf Ramsauer <[email protected]>
  Date:   2019-06-07 (Fri, 07 Jun 2019)

  Changed paths:
    M hypervisor/arch/x86/include/asm/processor.h
    M hypervisor/arch/x86/mmio.c
    M inmates/tests/x86/mmio-access-32.c
    M inmates/tests/x86/mmio-access.c

  Log Message:
  -----------
  x86: mmio: add support for 0x66 operand prefix

mov (%rax), %ax is a 16-bit data MOV_FROM_MEM that will emit
0x66 0x8b 0x00.

0x66 is the operand-size override prefix which we currently do not support.

We should support it, as we can find this opcode, for example, for some
mmconfig space access from Linux (e.g., pci_generic_config_read).

This also adds appropriate mmio-access tests.

Tested in QEMU virtual target.

Signed-off-by: Ralf Ramsauer <[email protected]>
[Jan: dropped redundant EXPECT_EQUAL, adjusted ebx->rax addressing, tuned 
comment]
Signed-off-by: Jan Kiszka <[email protected]>


Compare: 
https://github.com/siemens/jailhouse/compare/0c3e5eb67e17...96157677dfbb

-- 
You received this message because you are subscribed to the Google Groups 
"Jailhouse" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/jailhouse-dev/siemens/jailhouse/push/refs/heads/master/0c3e5e-961576%40github.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to