Branch: refs/heads/next
Home: https://github.com/siemens/jailhouse
Commit: 1aa592b331f20e7ab4e2738b7893cea4aa8beed5
https://github.com/siemens/jailhouse/commit/1aa592b331f20e7ab4e2738b7893cea4aa8beed5
Author: Jan Kiszka <[email protected]>
Date: 2020-10-01 (Thu, 01 Oct 2020)
Changed paths:
M tools/jailhouse-config-create
Log Message:
-----------
pyjailhouse: Do not fail on missing date for DebugConsole
All readouts are optional, but then they will return empty strings.
Converting them to integer will raise ValueError. Catch that and ignore
it - we won't have DebugConsole information then, as desired.
Signed-off-by: Jan Kiszka <[email protected]>
Commit: 5d07cefe6dd8c8532ad2317b5e87d5133b7c9559
https://github.com/siemens/jailhouse/commit/5d07cefe6dd8c8532ad2317b5e87d5133b7c9559
Author: Jan Kiszka <[email protected]>
Date: 2020-10-01 (Thu, 01 Oct 2020)
Changed paths:
M pyjailhouse/sysfs_parser.py
Log Message:
-----------
pyjailhouse: sysfs_parser: Fix regions_split_by_kernel corner cases
If the kernel is at the beginning or at the end of a region,
before_kernel or after_kernel could stay None, and adding a NoneType
object to the regions will make other parts unhappy. Better construct a
list without any None elements.
Signed-off-by: Jan Kiszka <[email protected]>
Commit: edf77fd38dab4c09ed982d232d2b7feb8db15cf1
https://github.com/siemens/jailhouse/commit/edf77fd38dab4c09ed982d232d2b7feb8db15cf1
Author: Jan Kiszka <[email protected]>
Date: 2020-10-01 (Thu, 01 Oct 2020)
Changed paths:
M hypervisor/arch/x86/vtd.c
Log Message:
-----------
x86: vtd: Fix interpretation of redirection hint
Reading the KVM code of Linux and re-reading the spec, multiple times,
it became clear the RH only controls whether one or all CPUs of a
potential target group should be addressed. If it's set only one is
chosen, via lowest-prio, but that is done by the hardware. For us, its
state does not matter. We always consider a multicast scenario, thus
simply ignore the state of this bit.
This fixes startup errors when DH=1 and RH=0 of the kind
FATAL: Unsupported MSI/MSI-X state, device ...
Signed-off-by: Jan Kiszka <[email protected]>
Commit: 522ab60f408c7a61daa93f0ce25ae9da32ae5f10
https://github.com/siemens/jailhouse/commit/522ab60f408c7a61daa93f0ce25ae9da32ae5f10
Author: Jan Kiszka <[email protected]>
Date: 2020-10-01 (Thu, 01 Oct 2020)
Changed paths:
M include/jailhouse/cell-config.h
Log Message:
-----------
ivshmem: Expand MSI-X region to full page
It's a bit wasteful, but the alternative can be that the guest moves the
region close to a physical one, and then we need to start configuring
sub-page dispatching. That is first of all a source for mistakes
(specifically in combination with generated configs), and it may even be
suboptimal in case exceeding, full-page access on that physical region
would have been safe.
Signed-off-by: Jan Kiszka <[email protected]>
Compare:
https://github.com/siemens/jailhouse/compare/42f0f9dfff8d...522ab60f408c
--
You received this message because you are subscribed to the Google Groups
"Jailhouse" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to [email protected].
To view this discussion on the web visit
https://groups.google.com/d/msgid/jailhouse-dev/siemens/jailhouse/push/refs/heads/next/42f0f9-522ab6%40github.com.