All of lore.kernel.org
 help / color / mirror / Atom feed
* [PATCH v2 0/3] xen: Update recipes for xen and xen-tools
@ 2023-01-06 14:46 Michal Orzel
  2023-01-06 14:46 ` [PATCH v2 1/3] xen: Bump SRCREV of 4.16 recipes to 4.16.3 Michal Orzel
                   ` (3 more replies)
  0 siblings, 4 replies; 10+ messages in thread
From: Michal Orzel @ 2023-01-06 14:46 UTC (permalink / raw)
  To: meta-virtualization
  Cc: christopher.w.clark, bertrand.marquis, stefano.stabellini,
	stewart.hildebrand, bruce.ashfield, Michal Orzel

This patch series:
 - updates the 4.16 recipes to the latest 4.16.3 release,
 - adds 4.17 recipes, fixes conflicts and updates master,
 - bumps default version to 4.17.

Tested by building all the available Xen versions on qemu{arm64/x86-64} and
running them using runqemu.

Michal Orzel (3):
  xen: Bump SRCREV of 4.16 recipes to 4.16.3
  xen: Add recipes for stable Xen 4.17 release and update master
  xen: Bump default version to 4.17 stable

 .../include/meta-virt-default-versions.inc    |   4 +-
 .../files/xen-fix-gcc12-build-issues.patch    | 433 ------------------
 recipes-extended/xen/xen-tools.inc            |   3 +
 recipes-extended/xen/xen-tools_4.16.bb        |   5 +-
 recipes-extended/xen/xen-tools_4.17.bb        |  19 +
 recipes-extended/xen/xen-tools_git.bb         |   8 +-
 recipes-extended/xen/xen_4.16.bb              |   5 +-
 recipes-extended/xen/xen_4.17.bb              |  19 +
 recipes-extended/xen/xen_git.bb               |   8 +-
 9 files changed, 55 insertions(+), 449 deletions(-)
 delete mode 100644 recipes-extended/xen/files/xen-fix-gcc12-build-issues.patch
 create mode 100644 recipes-extended/xen/xen-tools_4.17.bb
 create mode 100644 recipes-extended/xen/xen_4.17.bb

-- 
2.25.1



^ permalink raw reply	[flat|nested] 10+ messages in thread

* [PATCH v2 1/3] xen: Bump SRCREV of 4.16 recipes to 4.16.3
  2023-01-06 14:46 [PATCH v2 0/3] xen: Update recipes for xen and xen-tools Michal Orzel
@ 2023-01-06 14:46 ` Michal Orzel
  2023-01-09  6:35   ` Christopher Clark
  2023-01-06 14:46 ` [PATCH v2 2/3] xen: Add recipes for stable Xen 4.17 release and update master Michal Orzel
                   ` (2 subsequent siblings)
  3 siblings, 1 reply; 10+ messages in thread
From: Michal Orzel @ 2023-01-06 14:46 UTC (permalink / raw)
  To: meta-virtualization
  Cc: christopher.w.clark, bertrand.marquis, stefano.stabellini,
	stewart.hildebrand, bruce.ashfield, Michal Orzel

Update 4.16 recipes to use the latest 4.16.3 release.
Also, remove the GCC 12 fix patch as it seems to be no longer needed.

Signed-off-by: Michal Orzel <michal.orzel@amd.com>
---
Changes in v2:
 - none
---
 .../files/xen-fix-gcc12-build-issues.patch    | 433 ------------------
 recipes-extended/xen/xen-tools_4.16.bb        |   5 +-
 recipes-extended/xen/xen_4.16.bb              |   5 +-
 3 files changed, 4 insertions(+), 439 deletions(-)
 delete mode 100644 recipes-extended/xen/files/xen-fix-gcc12-build-issues.patch

diff --git a/recipes-extended/xen/files/xen-fix-gcc12-build-issues.patch b/recipes-extended/xen/files/xen-fix-gcc12-build-issues.patch
deleted file mode 100644
index 6cdd312db110..000000000000
--- a/recipes-extended/xen/files/xen-fix-gcc12-build-issues.patch
+++ /dev/null
@@ -1,433 +0,0 @@
-References: bsc#1196545
-
-Compiling against gcc12.
-
-Many of the failures are -Werror=array-bounds where macros
-from mm.h are being used. Common Examples are,
-include/asm/mm.h:528:61: error: array subscript 0 is outside array bounds of 'long unsigned int[0]' [-Werror=array-bounds]
-include/xen/mm.h:287:21: error: array subscript [0, 288230376151711743] is outside array bounds of 'struct page_info[0]' [-Werror=array-bounds]
-
-There are also several other headers that generate array-bounds macro failures.
-The pragmas to override are mostly in '.c' files with the exception of,
-xen/arch/x86/mm/shadow/private.h
-xen/include/asm-x86/paging.h
-
-[Upstream-Status: imported from: https://build.opensuse.org/package/view_file/openSUSE:Factory/xen/gcc12-fixes.patch?expand=1]
-
-Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
-
-
-Index: xen-4.16.1-testing/xen/drivers/passthrough/amd/iommu_intr.c
-===================================================================
---- xen-4.16.1-testing.orig/xen/drivers/passthrough/amd/iommu_intr.c
-+++ xen-4.16.1-testing/xen/drivers/passthrough/amd/iommu_intr.c
-@@ -23,6 +23,10 @@
- 
- #include "iommu.h"
- 
-+#if __GNUC__ >= 12
-+#pragma GCC diagnostic ignored "-Warray-bounds"
-+#endif
-+
- union irte32 {
-     uint32_t raw;
-     struct {
-Index: xen-4.16.1-testing/xen/drivers/passthrough/x86/hvm.c
-===================================================================
---- xen-4.16.1-testing.orig/xen/drivers/passthrough/x86/hvm.c
-+++ xen-4.16.1-testing/xen/drivers/passthrough/x86/hvm.c
-@@ -901,6 +901,9 @@ static void __hvm_dpci_eoi(struct domain
-     hvm_pirq_eoi(pirq);
- }
- 
-+#if __GNUC__ >= 12
-+#pragma GCC diagnostic ignored "-Waddress"
-+#endif
- static void hvm_gsi_eoi(struct domain *d, unsigned int gsi)
- {
-     struct pirq *pirq = pirq_info(d, gsi);
-Index: xen-4.16.1-testing/xen/common/domctl.c
-===================================================================
---- xen-4.16.1-testing.orig/xen/common/domctl.c
-+++ xen-4.16.1-testing/xen/common/domctl.c
-@@ -32,6 +32,10 @@
- #include <public/domctl.h>
- #include <xsm/xsm.h>
- 
-+#if __GNUC__ >= 12
-+#pragma GCC diagnostic ignored "-Warray-bounds"
-+#endif
-+
- static DEFINE_SPINLOCK(domctl_lock);
- 
- static int nodemask_to_xenctl_bitmap(struct xenctl_bitmap *xenctl_nodemap,
-Index: xen-4.16.1-testing/xen/common/efi/boot.c
-===================================================================
---- xen-4.16.1-testing.orig/xen/common/efi/boot.c
-+++ xen-4.16.1-testing/xen/common/efi/boot.c
-@@ -31,6 +31,10 @@
- #undef __ASSEMBLY__
- #endif
- 
-+#if __GNUC__ >= 12
-+#pragma GCC diagnostic ignored "-Warray-bounds"
-+#endif
-+
- #define EFI_REVISION(major, minor) (((major) << 16) | (minor))
- 
- #define SMBIOS3_TABLE_GUID \
-Index: xen-4.16.1-testing/xen/common/xmalloc_tlsf.c
-===================================================================
---- xen-4.16.1-testing.orig/xen/common/xmalloc_tlsf.c
-+++ xen-4.16.1-testing/xen/common/xmalloc_tlsf.c
-@@ -28,6 +28,10 @@
- #include <xen/pfn.h>
- #include <asm/time.h>
- 
-+#if __GNUC__ >= 12
-+#pragma GCC diagnostic ignored "-Warray-bounds"
-+#endif
-+
- #define MAX_POOL_NAME_LEN       16
- 
- /* Some IMPORTANT TLSF parameters */
-Index: xen-4.16.1-testing/xen/common/memory.c
-===================================================================
---- xen-4.16.1-testing.orig/xen/common/memory.c
-+++ xen-4.16.1-testing/xen/common/memory.c
-@@ -35,6 +35,10 @@
- #include <asm/guest.h>
- #endif
- 
-+#if __GNUC__ >= 12
-+#pragma GCC diagnostic ignored "-Warray-bounds"
-+#endif
-+
- struct memop_args {
-     /* INPUT */
-     struct domain *domain;     /* Domain to be affected. */
-Index: xen-4.16.1-testing/xen/common/page_alloc.c
-===================================================================
---- xen-4.16.1-testing.orig/xen/common/page_alloc.c
-+++ xen-4.16.1-testing/xen/common/page_alloc.c
-@@ -155,6 +155,10 @@
- #define PGC_reserved 0
- #endif
- 
-+#if __GNUC__ >= 12
-+#pragma GCC diagnostic ignored "-Warray-bounds"
-+#endif
-+
- /*
-  * Comma-separated list of hexadecimal page numbers containing bad bytes.
-  * e.g. 'badpage=0x3f45,0x8a321'.
-@@ -1529,6 +1533,7 @@ static void free_heap_pages(
- }
- 
- 
-+
- /*
-  * Following rules applied for page offline:
-  * Once a page is broken, it can't be assigned anymore
-Index: xen-4.16.1-testing/xen/common/vmap.c
-===================================================================
---- xen-4.16.1-testing.orig/xen/common/vmap.c
-+++ xen-4.16.1-testing/xen/common/vmap.c
-@@ -9,6 +9,10 @@
- #include <xen/vmap.h>
- #include <asm/page.h>
- 
-+#if __GNUC__ >= 12
-+#pragma GCC diagnostic ignored "-Warray-bounds"
-+#endif
-+
- static DEFINE_SPINLOCK(vm_lock);
- static void *__read_mostly vm_base[VMAP_REGION_NR];
- #define vm_bitmap(x) ((unsigned long *)vm_base[x])
-Index: xen-4.16.1-testing/xen/include/asm-x86/paging.h
-===================================================================
---- xen-4.16.1-testing.orig/xen/include/asm-x86/paging.h
-+++ xen-4.16.1-testing/xen/include/asm-x86/paging.h
-@@ -32,6 +32,10 @@
- #include <asm/flushtlb.h>
- #include <asm/domain.h>
- 
-+#if __GNUC__ >= 12
-+#pragma GCC diagnostic ignored "-Warray-bounds"
-+#endif
-+
- /*****************************************************************************
-  * Macros to tell which paging mode a domain is in */
- 
-Index: xen-4.16.1-testing/xen/arch/x86/x86_64/traps.c
-===================================================================
---- xen-4.16.1-testing.orig/xen/arch/x86/x86_64/traps.c
-+++ xen-4.16.1-testing/xen/arch/x86/x86_64/traps.c
-@@ -25,6 +25,9 @@
- #include <asm/hvm/hvm.h>
- #include <asm/hvm/support.h>
- 
-+#if __GNUC__ >= 12
-+#pragma GCC diagnostic ignored "-Warray-bounds"
-+#endif
- 
- static void print_xen_info(void)
- {
-Index: xen-4.16.1-testing/xen/arch/x86/cpu/mcheck/mcaction.c
-===================================================================
---- xen-4.16.1-testing.orig/xen/arch/x86/cpu/mcheck/mcaction.c
-+++ xen-4.16.1-testing/xen/arch/x86/cpu/mcheck/mcaction.c
-@@ -4,6 +4,10 @@
- #include "vmce.h"
- #include "mce.h"
- 
-+#if __GNUC__ >= 12
-+#pragma GCC diagnostic ignored "-Warray-bounds"
-+#endif
-+
- static struct mcinfo_recovery *
- mci_action_add_pageoffline(int bank, struct mc_info *mi,
-                            mfn_t mfn, uint32_t status)
-Index: xen-4.16.1-testing/xen/arch/x86/cpu/mcheck/mce.c
-===================================================================
---- xen-4.16.1-testing.orig/xen/arch/x86/cpu/mcheck/mce.c
-+++ xen-4.16.1-testing/xen/arch/x86/cpu/mcheck/mce.c
-@@ -30,6 +30,10 @@
- #include "util.h"
- #include "vmce.h"
- 
-+#if __GNUC__ >= 12
-+#pragma GCC diagnostic ignored "-Warray-bounds"
-+#endif
-+
- bool __read_mostly opt_mce = true;
- boolean_param("mce", opt_mce);
- bool __read_mostly mce_broadcast;
-Index: xen-4.16.1-testing/xen/arch/x86/hvm/hvm.c
-===================================================================
---- xen-4.16.1-testing.orig/xen/arch/x86/hvm/hvm.c
-+++ xen-4.16.1-testing/xen/arch/x86/hvm/hvm.c
-@@ -81,6 +81,10 @@
- 
- #include <compat/hvm/hvm_op.h>
- 
-+#if __GNUC__ >= 12
-+#pragma GCC diagnostic ignored "-Warray-bounds"
-+#endif
-+
- bool_t __read_mostly hvm_enabled;
- 
- #ifdef DBG_LEVEL_0
-Index: xen-4.16.1-testing/xen/arch/x86/pv/dom0_build.c
-===================================================================
---- xen-4.16.1-testing.orig/xen/arch/x86/pv/dom0_build.c
-+++ xen-4.16.1-testing/xen/arch/x86/pv/dom0_build.c
-@@ -22,6 +22,10 @@
- #include <asm/pv/mm.h>
- #include <asm/setup.h>
- 
-+#if __GNUC__ >= 12
-+#pragma GCC diagnostic ignored "-Warray-bounds"
-+#endif
-+
- /* Allow ring-3 access in long mode as guest cannot use ring 1 ... */
- #define BASE_PROT (_PAGE_PRESENT|_PAGE_RW|_PAGE_ACCESSED|_PAGE_USER)
- #define L1_PROT (BASE_PROT|_PAGE_GUEST_KERNEL)
-Index: xen-4.16.1-testing/xen/arch/x86/pv/ro-page-fault.c
-===================================================================
---- xen-4.16.1-testing.orig/xen/arch/x86/pv/ro-page-fault.c
-+++ xen-4.16.1-testing/xen/arch/x86/pv/ro-page-fault.c
-@@ -26,6 +26,10 @@
- #include "emulate.h"
- #include "mm.h"
- 
-+#if __GNUC__ >= 12
-+#pragma GCC diagnostic ignored "-Warray-bounds"
-+#endif
-+
- /*********************
-  * Writable Pagetables
-  */
-Index: xen-4.16.1-testing/xen/arch/x86/pv/emul-priv-op.c
-===================================================================
---- xen-4.16.1-testing.orig/xen/arch/x86/pv/emul-priv-op.c
-+++ xen-4.16.1-testing/xen/arch/x86/pv/emul-priv-op.c
-@@ -40,6 +40,10 @@
- #include "emulate.h"
- #include "mm.h"
- 
-+#if __GNUC__ >= 12
-+#pragma GCC diagnostic ignored "-Warray-bounds"
-+#endif
-+
- struct priv_op_ctxt {
-     struct x86_emulate_ctxt ctxt;
-     struct {
-Index: xen-4.16.1-testing/xen/arch/x86/pv/mm.c
-===================================================================
---- xen-4.16.1-testing.orig/xen/arch/x86/pv/mm.c
-+++ xen-4.16.1-testing/xen/arch/x86/pv/mm.c
-@@ -26,6 +26,10 @@
- 
- #include "mm.h"
- 
-+#if __GNUC__ >= 12
-+#pragma GCC diagnostic ignored "-Warray-bounds"
-+#endif
-+
- /*
-  * Get a mapping of a PV guest's l1e for this linear address.  The return
-  * pointer should be unmapped using unmap_domain_page().
-Index: xen-4.16.1-testing/xen/arch/x86/domain_page.c
-===================================================================
---- xen-4.16.1-testing.orig/xen/arch/x86/domain_page.c
-+++ xen-4.16.1-testing/xen/arch/x86/domain_page.c
-@@ -18,6 +18,10 @@
- #include <asm/hardirq.h>
- #include <asm/setup.h>
- 
-+#if __GNUC__ >= 12
-+#pragma GCC diagnostic ignored "-Warray-bounds"
-+#endif
-+
- static DEFINE_PER_CPU(struct vcpu *, override);
- 
- static inline struct vcpu *mapcache_current_vcpu(void)
-Index: xen-4.16.1-testing/xen/arch/x86/mm/shadow/private.h
-===================================================================
---- xen-4.16.1-testing.orig/xen/arch/x86/mm/shadow/private.h
-+++ xen-4.16.1-testing/xen/arch/x86/mm/shadow/private.h
-@@ -33,6 +33,10 @@
- 
- #include "../mm-locks.h"
- 
-+#if __GNUC__ >= 12
-+#pragma GCC diagnostic ignored "-Warray-bounds"
-+#endif
-+
- /******************************************************************************
-  * Levels of self-test and paranoia
-  */
-Index: xen-4.16.1-testing/xen/arch/x86/mm/hap/hap.c
-===================================================================
---- xen-4.16.1-testing.orig/xen/arch/x86/mm/hap/hap.c
-+++ xen-4.16.1-testing/xen/arch/x86/mm/hap/hap.c
-@@ -42,6 +42,10 @@
- 
- #include "private.h"
- 
-+#if __GNUC__ >= 12
-+#pragma GCC diagnostic ignored "-Warray-bounds"
-+#endif
-+
- /************************************************/
- /*          HAP VRAM TRACKING SUPPORT           */
- /************************************************/
-Index: xen-4.16.1-testing/xen/arch/x86/mm/p2m-pod.c
-===================================================================
---- xen-4.16.1-testing.orig/xen/arch/x86/mm/p2m-pod.c
-+++ xen-4.16.1-testing/xen/arch/x86/mm/p2m-pod.c
-@@ -31,6 +31,10 @@
- 
- #include "mm-locks.h"
- 
-+#if __GNUC__ >= 12
-+#pragma GCC diagnostic ignored "-Warray-bounds"
-+#endif
-+
- #define superpage_aligned(_x)  (((_x)&(SUPERPAGE_PAGES-1))==0)
- 
- /* Enforce lock ordering when grabbing the "external" page_alloc lock */
-Index: xen-4.16.1-testing/xen/arch/x86/mm/p2m-ept.c
-===================================================================
---- xen-4.16.1-testing.orig/xen/arch/x86/mm/p2m-ept.c
-+++ xen-4.16.1-testing/xen/arch/x86/mm/p2m-ept.c
-@@ -36,6 +36,10 @@
- 
- #include "mm-locks.h"
- 
-+#if __GNUC__ >= 12
-+#pragma GCC diagnostic ignored "-Warray-bounds"
-+#endif
-+
- #define atomic_read_ept_entry(__pepte)                              \
-     ( (ept_entry_t) { .epte = read_atomic(&(__pepte)->epte) } )
- 
-Index: xen-4.16.1-testing/xen/arch/x86/mm/p2m.c
-===================================================================
---- xen-4.16.1-testing.orig/xen/arch/x86/mm/p2m.c
-+++ xen-4.16.1-testing/xen/arch/x86/mm/p2m.c
-@@ -44,6 +44,10 @@
- 
- #include "mm-locks.h"
- 
-+#if __GNUC__ >= 12
-+#pragma GCC diagnostic ignored "-Warray-bounds"
-+#endif
-+
- /* Override macro from asm/page.h to make work with mfn_t */
- #undef virt_to_mfn
- #define virt_to_mfn(v) _mfn(__virt_to_mfn(v))
-Index: xen-4.16.1-testing/xen/arch/x86/tboot.c
-===================================================================
---- xen-4.16.1-testing.orig/xen/arch/x86/tboot.c
-+++ xen-4.16.1-testing/xen/arch/x86/tboot.c
-@@ -16,6 +16,10 @@
- #include <asm/setup.h>
- #include <crypto/vmac.h>
- 
-+#if __GNUC__ >= 12
-+#pragma GCC diagnostic ignored "-Warray-bounds"
-+#endif
-+
- /* tboot=<physical address of shared page> */
- static unsigned long __initdata opt_tboot_pa;
- integer_param("tboot", opt_tboot_pa);
-Index: xen-4.16.1-testing/tools/firmware/hvmloader/ovmf.c
-===================================================================
---- xen-4.16.1-testing.orig/tools/firmware/hvmloader/ovmf.c
-+++ xen-4.16.1-testing/tools/firmware/hvmloader/ovmf.c
-@@ -34,6 +34,11 @@
- #include <xen/hvm/ioreq.h>
- #include <xen/memory.h>
- 
-+#if __GNUC__ >= 12
-+#pragma GCC diagnostic ignored "-Warray-bounds"
-+#pragma GCC diagnostic ignored "-Wstringop-overflow"
-+#endif
-+
- #define OVMF_MAXOFFSET          0x000FFFFFULL
- #define OVMF_END                0x100000000ULL
- #define LOWCHUNK_BEGIN          0x000F0000
-Index: xen-4.16.1-testing/tools/firmware/hvmloader/seabios.c
-===================================================================
---- xen-4.16.1-testing.orig/tools/firmware/hvmloader/seabios.c
-+++ xen-4.16.1-testing/tools/firmware/hvmloader/seabios.c
-@@ -29,6 +29,11 @@
- #include <acpi2_0.h>
- #include <libacpi.h>
- 
-+#if __GNUC__ >= 12
-+#pragma GCC diagnostic ignored "-Warray-bounds"
-+#pragma GCC diagnostic ignored "-Wstringop-overflow"
-+#endif
-+
- struct seabios_info {
-     char signature[14]; /* XenHVMSeaBIOS\0 */
-     uint8_t length;     /* Length of this struct */
-Index: xen-4.16.1-testing/tools/firmware/hvmloader/util.c
-===================================================================
---- xen-4.16.1-testing.orig/tools/firmware/hvmloader/util.c
-+++ xen-4.16.1-testing/tools/firmware/hvmloader/util.c
-@@ -31,6 +31,10 @@
- #include <xen/hvm/hvm_xs_strings.h>
- #include <xen/hvm/params.h>
- 
-+#if __GNUC__ >= 12
-+#pragma GCC diagnostic ignored "-Warray-bounds"
-+#endif
-+
- /*
-  * Check whether there exists overlap in the specified memory range.
-  * Returns true if exists, else returns false.
-
diff --git a/recipes-extended/xen/xen-tools_4.16.bb b/recipes-extended/xen/xen-tools_4.16.bb
index 2200a5a44abe..b5e555e6eabb 100644
--- a/recipes-extended/xen/xen-tools_4.16.bb
+++ b/recipes-extended/xen/xen-tools_4.16.bb
@@ -1,5 +1,5 @@
-# xen 4.16.2 release sha
-SRCREV ?= "cea5ed49bb5716698a11312a3f38bc8865cd1e67"
+# xen 4.16.3 release sha
+SRCREV ?= "556c2e817c9cf23b675eb4eaa2dc091f7bb3039f"
 
 XEN_REL ?= "4.16"
 XEN_BRANCH ?= "stable-${XEN_REL}"
@@ -7,7 +7,6 @@ XEN_BRANCH ?= "stable-${XEN_REL}"
 SRC_URI = " \
     git://xenbits.xen.org/xen.git;branch=${XEN_BRANCH} \
     file://0001-python-pygrub-pass-DISTUTILS-xen-4.15.patch \
-    file://xen-fix-gcc12-build-issues.patch \
     "
 
 LIC_FILES_CHKSUM ?= "file://COPYING;md5=419739e325a50f3d7b4501338e44a4e5"
diff --git a/recipes-extended/xen/xen_4.16.bb b/recipes-extended/xen/xen_4.16.bb
index 70e1d70e9c29..14a4fa79c5dd 100644
--- a/recipes-extended/xen/xen_4.16.bb
+++ b/recipes-extended/xen/xen_4.16.bb
@@ -1,5 +1,5 @@
-# xen 4.16.2 release sha
-SRCREV ?= "cea5ed49bb5716698a11312a3f38bc8865cd1e67"
+# xen 4.16.3 release sha
+SRCREV ?= "556c2e817c9cf23b675eb4eaa2dc091f7bb3039f"
 
 XEN_REL ?= "4.16"
 XEN_BRANCH ?= "stable-${XEN_REL}"
@@ -7,7 +7,6 @@ XEN_BRANCH ?= "stable-${XEN_REL}"
 SRC_URI = " \
     git://xenbits.xen.org/xen.git;branch=${XEN_BRANCH} \
     file://0001-menuconfig-mconf-cfg-Allow-specification-of-ncurses-location.patch \
-    file://xen-fix-gcc12-build-issues.patch \ 
     "
 
 LIC_FILES_CHKSUM ?= "file://COPYING;md5=419739e325a50f3d7b4501338e44a4e5"
-- 
2.25.1



^ permalink raw reply related	[flat|nested] 10+ messages in thread

* [PATCH v2 2/3] xen: Add recipes for stable Xen 4.17 release and update master
  2023-01-06 14:46 [PATCH v2 0/3] xen: Update recipes for xen and xen-tools Michal Orzel
  2023-01-06 14:46 ` [PATCH v2 1/3] xen: Bump SRCREV of 4.16 recipes to 4.16.3 Michal Orzel
@ 2023-01-06 14:46 ` Michal Orzel
  2023-01-09  6:35   ` Christopher Clark
  2023-01-20 17:18   ` Bruce Ashfield
  2023-01-06 14:46 ` [PATCH v2 3/3] xen: Bump default version to 4.17 stable Michal Orzel
  2023-01-09  6:37 ` [PATCH v2 0/3] xen: Update recipes for xen and xen-tools Christopher Clark
  3 siblings, 2 replies; 10+ messages in thread
From: Michal Orzel @ 2023-01-06 14:46 UTC (permalink / raw)
  To: meta-virtualization
  Cc: christopher.w.clark, bertrand.marquis, stefano.stabellini,
	stewart.hildebrand, bruce.ashfield, Michal Orzel

Add recipes for xen and tools for the newly released 4.17 version and
take the opportunity to update master recipes.

Reflect 4.17 tools changes in xen-tools.inc:
 - add test-paging-mempool to test package,
 - add init-dom0less script to xl package,
 - add localstatedir to xencommons package (this is needed as from 4.17
   onwards, there is no /var/lib/xenstored resulting in /var being
   installed but not shipped in any package).

Signed-off-by: Michal Orzel <michal.orzel@amd.com>
---
Changes in v2:
 - add init-dom0less to xl package
 - add localstatedir to xencommons package
---
 recipes-extended/xen/xen-tools.inc     |  3 +++
 recipes-extended/xen/xen-tools_4.17.bb | 19 +++++++++++++++++++
 recipes-extended/xen/xen-tools_git.bb  |  8 ++++----
 recipes-extended/xen/xen_4.17.bb       | 19 +++++++++++++++++++
 recipes-extended/xen/xen_git.bb        |  8 ++++----
 5 files changed, 49 insertions(+), 8 deletions(-)
 create mode 100644 recipes-extended/xen/xen-tools_4.17.bb
 create mode 100644 recipes-extended/xen/xen_4.17.bb

diff --git a/recipes-extended/xen/xen-tools.inc b/recipes-extended/xen/xen-tools.inc
index d47309a72b1c..95da2bfbb6ce 100644
--- a/recipes-extended/xen/xen-tools.inc
+++ b/recipes-extended/xen/xen-tools.inc
@@ -616,6 +616,7 @@ FILES:${PN}-xl = "\
     ${libdir}/xen/bin/libxl-save-helper \
     ${sbindir}/xl \
     ${libdir}/xen/bin/xen-init-dom0 \
+    ${libdir}/xen/bin/init-dom0less \
     "
 
 FILES:${PN}-xl-examples = "\
@@ -658,6 +659,7 @@ FILES:${PN}-xencommons += "\
     ${@bb.utils.contains('DISTRO_FEATURES', 'systemd', '${systemd_unitdir}/system/xen-init-dom0.service', '', d)} \
     ${@bb.utils.contains('DISTRO_FEATURES', 'systemd', '${systemd_unitdir}/system/xenstored.service', '', d)} \
     ${@bb.utils.contains('DISTRO_FEATURES', 'systemd', '${systemd_unitdir}/system/var-lib-xenstored.mount', '', d)} \
+    ${localstatedir} \
     "
 
 FILES:${PN}-xend += " \
@@ -688,6 +690,7 @@ FILES:${PN}-test += "\
     ${libdir}/xen/bin/test-resource \
     ${libdir}/xen/bin/test-cpu-policy \
     ${libdir}/xen/bin/test-tsx \
+    ${libdir}/xen/bin/test-paging-mempool \
     "
 
 # test-xenstore and test-resource currently only exist in 4.16
diff --git a/recipes-extended/xen/xen-tools_4.17.bb b/recipes-extended/xen/xen-tools_4.17.bb
new file mode 100644
index 000000000000..0f323cb32aac
--- /dev/null
+++ b/recipes-extended/xen/xen-tools_4.17.bb
@@ -0,0 +1,19 @@
+# xen 4.17.0 release sha
+SRCREV ?= "11560248ffda3f00f20bbdf3ae088af474f7f2a3"
+
+XEN_REL ?= "4.17"
+XEN_BRANCH ?= "stable-${XEN_REL}"
+
+SRC_URI = " \
+    git://xenbits.xen.org/xen.git;branch=${XEN_BRANCH} \
+    file://0001-python-pygrub-pass-DISTUTILS-xen-4.15.patch \
+    "
+
+LIC_FILES_CHKSUM ?= "file://COPYING;md5=d1a1e216f80b6d8da95fec897d0dbec9"
+
+PV = "${XEN_REL}+stable${SRCPV}"
+
+S = "${WORKDIR}/git"
+
+require xen.inc
+require xen-tools.inc
diff --git a/recipes-extended/xen/xen-tools_git.bb b/recipes-extended/xen/xen-tools_git.bb
index a450a7d6574a..fd42cf2963b4 100644
--- a/recipes-extended/xen/xen-tools_git.bb
+++ b/recipes-extended/xen/xen-tools_git.bb
@@ -1,7 +1,7 @@
-# master status on 2022-04-05
-SRCREV ?= "14dd241aad8af447680ac73e8579990e2c09c1e7"
+# master status on 2022-12-29
+SRCREV ?= "7eef80e06ed2282bbcec3619d860c6aacb0515d8"
 
-XEN_REL ?= "4.17"
+XEN_REL ?= "4.18"
 XEN_BRANCH ?= "master"
 
 SRC_URI = " \
@@ -9,7 +9,7 @@ SRC_URI = " \
     file://0001-python-pygrub-pass-DISTUTILS-xen-4.15.patch \
     "
 
-LIC_FILES_CHKSUM ?= "file://COPYING;md5=419739e325a50f3d7b4501338e44a4e5"
+LIC_FILES_CHKSUM ?= "file://COPYING;md5=d1a1e216f80b6d8da95fec897d0dbec9"
 
 PV = "${XEN_REL}+git${SRCPV}"
 
diff --git a/recipes-extended/xen/xen_4.17.bb b/recipes-extended/xen/xen_4.17.bb
new file mode 100644
index 000000000000..f35689d4120f
--- /dev/null
+++ b/recipes-extended/xen/xen_4.17.bb
@@ -0,0 +1,19 @@
+# xen 4.17.0 release sha
+SRCREV ?= "11560248ffda3f00f20bbdf3ae088af474f7f2a3"
+
+XEN_REL ?= "4.17"
+XEN_BRANCH ?= "stable-${XEN_REL}"
+
+SRC_URI = " \
+    git://xenbits.xen.org/xen.git;branch=${XEN_BRANCH} \
+    file://0001-menuconfig-mconf-cfg-Allow-specification-of-ncurses-location.patch \
+    "
+
+LIC_FILES_CHKSUM ?= "file://COPYING;md5=d1a1e216f80b6d8da95fec897d0dbec9"
+
+PV = "${XEN_REL}+stable${SRCPV}"
+
+S = "${WORKDIR}/git"
+
+require xen.inc
+require xen-hypervisor.inc
diff --git a/recipes-extended/xen/xen_git.bb b/recipes-extended/xen/xen_git.bb
index ebd1b76ff420..2138424406f9 100644
--- a/recipes-extended/xen/xen_git.bb
+++ b/recipes-extended/xen/xen_git.bb
@@ -1,7 +1,7 @@
-# master status on 2022-04-05
-SRCREV ?= "14dd241aad8af447680ac73e8579990e2c09c1e7"
+# master status on 2022-12-29
+SRCREV ?= "7eef80e06ed2282bbcec3619d860c6aacb0515d8"
 
-XEN_REL ?= "4.17"
+XEN_REL ?= "4.18"
 XEN_BRANCH ?= "master"
 
 SRC_URI = " \
@@ -9,7 +9,7 @@ SRC_URI = " \
     file://0001-menuconfig-mconf-cfg-Allow-specification-of-ncurses-location.patch \
     "
 
-LIC_FILES_CHKSUM ?= "file://COPYING;md5=419739e325a50f3d7b4501338e44a4e5"
+LIC_FILES_CHKSUM ?= "file://COPYING;md5=d1a1e216f80b6d8da95fec897d0dbec9"
 
 PV = "${XEN_REL}+git${SRCPV}"
 
-- 
2.25.1



^ permalink raw reply related	[flat|nested] 10+ messages in thread

* [PATCH v2 3/3] xen: Bump default version to 4.17 stable
  2023-01-06 14:46 [PATCH v2 0/3] xen: Update recipes for xen and xen-tools Michal Orzel
  2023-01-06 14:46 ` [PATCH v2 1/3] xen: Bump SRCREV of 4.16 recipes to 4.16.3 Michal Orzel
  2023-01-06 14:46 ` [PATCH v2 2/3] xen: Add recipes for stable Xen 4.17 release and update master Michal Orzel
@ 2023-01-06 14:46 ` Michal Orzel
  2023-01-09  6:35   ` Christopher Clark
  2023-01-09  6:37 ` [PATCH v2 0/3] xen: Update recipes for xen and xen-tools Christopher Clark
  3 siblings, 1 reply; 10+ messages in thread
From: Michal Orzel @ 2023-01-06 14:46 UTC (permalink / raw)
  To: meta-virtualization
  Cc: christopher.w.clark, bertrand.marquis, stefano.stabellini,
	stewart.hildebrand, bruce.ashfield, Michal Orzel

Signed-off-by: Michal Orzel <michal.orzel@amd.com>
---
Changes in v2:
 - none
---
 conf/distro/include/meta-virt-default-versions.inc | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/conf/distro/include/meta-virt-default-versions.inc b/conf/distro/include/meta-virt-default-versions.inc
index b2ce0210c05c..388eca90bed4 100644
--- a/conf/distro/include/meta-virt-default-versions.inc
+++ b/conf/distro/include/meta-virt-default-versions.inc
@@ -1,4 +1,4 @@
 # Meta-virtuailization PREFERED_VERSION
 
-PREFERRED_VERSION_xen ?= "4.16+stable%"
-PREFERRED_VERSION_xen-tools ?= "4.16+stable%"
+PREFERRED_VERSION_xen ?= "4.17+stable%"
+PREFERRED_VERSION_xen-tools ?= "4.17+stable%"
-- 
2.25.1



^ permalink raw reply related	[flat|nested] 10+ messages in thread

* Re: [PATCH v2 1/3] xen: Bump SRCREV of 4.16 recipes to 4.16.3
  2023-01-06 14:46 ` [PATCH v2 1/3] xen: Bump SRCREV of 4.16 recipes to 4.16.3 Michal Orzel
@ 2023-01-09  6:35   ` Christopher Clark
  0 siblings, 0 replies; 10+ messages in thread
From: Christopher Clark @ 2023-01-09  6:35 UTC (permalink / raw)
  To: Michal Orzel
  Cc: meta-virtualization, bertrand.marquis, stefano.stabellini,
	stewart.hildebrand, bruce.ashfield

[-- Attachment #1: Type: text/plain, Size: 18102 bytes --]

On Fri, Jan 6, 2023 at 6:46 AM Michal Orzel <michal.orzel@amd.com> wrote:

> Update 4.16 recipes to use the latest 4.16.3 release.
> Also, remove the GCC 12 fix patch as it seems to be no longer needed.
>
> Signed-off-by: Michal Orzel <michal.orzel@amd.com>
>

Reviewed-by: Christopher Clark <christopher.w.clark@gmail.com>

thanks
Christopher



> ---
> Changes in v2:
>  - none
> ---
>  .../files/xen-fix-gcc12-build-issues.patch    | 433 ------------------
>  recipes-extended/xen/xen-tools_4.16.bb        |   5 +-
>  recipes-extended/xen/xen_4.16.bb              |   5 +-
>  3 files changed, 4 insertions(+), 439 deletions(-)
>  delete mode 100644
> recipes-extended/xen/files/xen-fix-gcc12-build-issues.patch
>
> diff --git a/recipes-extended/xen/files/xen-fix-gcc12-build-issues.patch
> b/recipes-extended/xen/files/xen-fix-gcc12-build-issues.patch
> deleted file mode 100644
> index 6cdd312db110..000000000000
> --- a/recipes-extended/xen/files/xen-fix-gcc12-build-issues.patch
> +++ /dev/null
> @@ -1,433 +0,0 @@
> -References: bsc#1196545
> -
> -Compiling against gcc12.
> -
> -Many of the failures are -Werror=array-bounds where macros
> -from mm.h are being used. Common Examples are,
> -include/asm/mm.h:528:61: error: array subscript 0 is outside array bounds
> of 'long unsigned int[0]' [-Werror=array-bounds]
> -include/xen/mm.h:287:21: error: array subscript [0, 288230376151711743]
> is outside array bounds of 'struct page_info[0]' [-Werror=array-bounds]
> -
> -There are also several other headers that generate array-bounds macro
> failures.
> -The pragmas to override are mostly in '.c' files with the exception of,
> -xen/arch/x86/mm/shadow/private.h
> -xen/include/asm-x86/paging.h
> -
> -[Upstream-Status: imported from:
> https://build.opensuse.org/package/view_file/openSUSE:Factory/xen/gcc12-fixes.patch?expand=1
> ]
> -
> -Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
> -
> -
> -Index: xen-4.16.1-testing/xen/drivers/passthrough/amd/iommu_intr.c
> -===================================================================
> ---- xen-4.16.1-testing.orig/xen/drivers/passthrough/amd/iommu_intr.c
> -+++ xen-4.16.1-testing/xen/drivers/passthrough/amd/iommu_intr.c
> -@@ -23,6 +23,10 @@
> -
> - #include "iommu.h"
> -
> -+#if __GNUC__ >= 12
> -+#pragma GCC diagnostic ignored "-Warray-bounds"
> -+#endif
> -+
> - union irte32 {
> -     uint32_t raw;
> -     struct {
> -Index: xen-4.16.1-testing/xen/drivers/passthrough/x86/hvm.c
> -===================================================================
> ---- xen-4.16.1-testing.orig/xen/drivers/passthrough/x86/hvm.c
> -+++ xen-4.16.1-testing/xen/drivers/passthrough/x86/hvm.c
> -@@ -901,6 +901,9 @@ static void __hvm_dpci_eoi(struct domain
> -     hvm_pirq_eoi(pirq);
> - }
> -
> -+#if __GNUC__ >= 12
> -+#pragma GCC diagnostic ignored "-Waddress"
> -+#endif
> - static void hvm_gsi_eoi(struct domain *d, unsigned int gsi)
> - {
> -     struct pirq *pirq = pirq_info(d, gsi);
> -Index: xen-4.16.1-testing/xen/common/domctl.c
> -===================================================================
> ---- xen-4.16.1-testing.orig/xen/common/domctl.c
> -+++ xen-4.16.1-testing/xen/common/domctl.c
> -@@ -32,6 +32,10 @@
> - #include <public/domctl.h>
> - #include <xsm/xsm.h>
> -
> -+#if __GNUC__ >= 12
> -+#pragma GCC diagnostic ignored "-Warray-bounds"
> -+#endif
> -+
> - static DEFINE_SPINLOCK(domctl_lock);
> -
> - static int nodemask_to_xenctl_bitmap(struct xenctl_bitmap
> *xenctl_nodemap,
> -Index: xen-4.16.1-testing/xen/common/efi/boot.c
> -===================================================================
> ---- xen-4.16.1-testing.orig/xen/common/efi/boot.c
> -+++ xen-4.16.1-testing/xen/common/efi/boot.c
> -@@ -31,6 +31,10 @@
> - #undef __ASSEMBLY__
> - #endif
> -
> -+#if __GNUC__ >= 12
> -+#pragma GCC diagnostic ignored "-Warray-bounds"
> -+#endif
> -+
> - #define EFI_REVISION(major, minor) (((major) << 16) | (minor))
> -
> - #define SMBIOS3_TABLE_GUID \
> -Index: xen-4.16.1-testing/xen/common/xmalloc_tlsf.c
> -===================================================================
> ---- xen-4.16.1-testing.orig/xen/common/xmalloc_tlsf.c
> -+++ xen-4.16.1-testing/xen/common/xmalloc_tlsf.c
> -@@ -28,6 +28,10 @@
> - #include <xen/pfn.h>
> - #include <asm/time.h>
> -
> -+#if __GNUC__ >= 12
> -+#pragma GCC diagnostic ignored "-Warray-bounds"
> -+#endif
> -+
> - #define MAX_POOL_NAME_LEN       16
> -
> - /* Some IMPORTANT TLSF parameters */
> -Index: xen-4.16.1-testing/xen/common/memory.c
> -===================================================================
> ---- xen-4.16.1-testing.orig/xen/common/memory.c
> -+++ xen-4.16.1-testing/xen/common/memory.c
> -@@ -35,6 +35,10 @@
> - #include <asm/guest.h>
> - #endif
> -
> -+#if __GNUC__ >= 12
> -+#pragma GCC diagnostic ignored "-Warray-bounds"
> -+#endif
> -+
> - struct memop_args {
> -     /* INPUT */
> -     struct domain *domain;     /* Domain to be affected. */
> -Index: xen-4.16.1-testing/xen/common/page_alloc.c
> -===================================================================
> ---- xen-4.16.1-testing.orig/xen/common/page_alloc.c
> -+++ xen-4.16.1-testing/xen/common/page_alloc.c
> -@@ -155,6 +155,10 @@
> - #define PGC_reserved 0
> - #endif
> -
> -+#if __GNUC__ >= 12
> -+#pragma GCC diagnostic ignored "-Warray-bounds"
> -+#endif
> -+
> - /*
> -  * Comma-separated list of hexadecimal page numbers containing bad bytes.
> -  * e.g. 'badpage=0x3f45,0x8a321'.
> -@@ -1529,6 +1533,7 @@ static void free_heap_pages(
> - }
> -
> -
> -+
> - /*
> -  * Following rules applied for page offline:
> -  * Once a page is broken, it can't be assigned anymore
> -Index: xen-4.16.1-testing/xen/common/vmap.c
> -===================================================================
> ---- xen-4.16.1-testing.orig/xen/common/vmap.c
> -+++ xen-4.16.1-testing/xen/common/vmap.c
> -@@ -9,6 +9,10 @@
> - #include <xen/vmap.h>
> - #include <asm/page.h>
> -
> -+#if __GNUC__ >= 12
> -+#pragma GCC diagnostic ignored "-Warray-bounds"
> -+#endif
> -+
> - static DEFINE_SPINLOCK(vm_lock);
> - static void *__read_mostly vm_base[VMAP_REGION_NR];
> - #define vm_bitmap(x) ((unsigned long *)vm_base[x])
> -Index: xen-4.16.1-testing/xen/include/asm-x86/paging.h
> -===================================================================
> ---- xen-4.16.1-testing.orig/xen/include/asm-x86/paging.h
> -+++ xen-4.16.1-testing/xen/include/asm-x86/paging.h
> -@@ -32,6 +32,10 @@
> - #include <asm/flushtlb.h>
> - #include <asm/domain.h>
> -
> -+#if __GNUC__ >= 12
> -+#pragma GCC diagnostic ignored "-Warray-bounds"
> -+#endif
> -+
> -
> /*****************************************************************************
> -  * Macros to tell which paging mode a domain is in */
> -
> -Index: xen-4.16.1-testing/xen/arch/x86/x86_64/traps.c
> -===================================================================
> ---- xen-4.16.1-testing.orig/xen/arch/x86/x86_64/traps.c
> -+++ xen-4.16.1-testing/xen/arch/x86/x86_64/traps.c
> -@@ -25,6 +25,9 @@
> - #include <asm/hvm/hvm.h>
> - #include <asm/hvm/support.h>
> -
> -+#if __GNUC__ >= 12
> -+#pragma GCC diagnostic ignored "-Warray-bounds"
> -+#endif
> -
> - static void print_xen_info(void)
> - {
> -Index: xen-4.16.1-testing/xen/arch/x86/cpu/mcheck/mcaction.c
> -===================================================================
> ---- xen-4.16.1-testing.orig/xen/arch/x86/cpu/mcheck/mcaction.c
> -+++ xen-4.16.1-testing/xen/arch/x86/cpu/mcheck/mcaction.c
> -@@ -4,6 +4,10 @@
> - #include "vmce.h"
> - #include "mce.h"
> -
> -+#if __GNUC__ >= 12
> -+#pragma GCC diagnostic ignored "-Warray-bounds"
> -+#endif
> -+
> - static struct mcinfo_recovery *
> - mci_action_add_pageoffline(int bank, struct mc_info *mi,
> -                            mfn_t mfn, uint32_t status)
> -Index: xen-4.16.1-testing/xen/arch/x86/cpu/mcheck/mce.c
> -===================================================================
> ---- xen-4.16.1-testing.orig/xen/arch/x86/cpu/mcheck/mce.c
> -+++ xen-4.16.1-testing/xen/arch/x86/cpu/mcheck/mce.c
> -@@ -30,6 +30,10 @@
> - #include "util.h"
> - #include "vmce.h"
> -
> -+#if __GNUC__ >= 12
> -+#pragma GCC diagnostic ignored "-Warray-bounds"
> -+#endif
> -+
> - bool __read_mostly opt_mce = true;
> - boolean_param("mce", opt_mce);
> - bool __read_mostly mce_broadcast;
> -Index: xen-4.16.1-testing/xen/arch/x86/hvm/hvm.c
> -===================================================================
> ---- xen-4.16.1-testing.orig/xen/arch/x86/hvm/hvm.c
> -+++ xen-4.16.1-testing/xen/arch/x86/hvm/hvm.c
> -@@ -81,6 +81,10 @@
> -
> - #include <compat/hvm/hvm_op.h>
> -
> -+#if __GNUC__ >= 12
> -+#pragma GCC diagnostic ignored "-Warray-bounds"
> -+#endif
> -+
> - bool_t __read_mostly hvm_enabled;
> -
> - #ifdef DBG_LEVEL_0
> -Index: xen-4.16.1-testing/xen/arch/x86/pv/dom0_build.c
> -===================================================================
> ---- xen-4.16.1-testing.orig/xen/arch/x86/pv/dom0_build.c
> -+++ xen-4.16.1-testing/xen/arch/x86/pv/dom0_build.c
> -@@ -22,6 +22,10 @@
> - #include <asm/pv/mm.h>
> - #include <asm/setup.h>
> -
> -+#if __GNUC__ >= 12
> -+#pragma GCC diagnostic ignored "-Warray-bounds"
> -+#endif
> -+
> - /* Allow ring-3 access in long mode as guest cannot use ring 1 ... */
> - #define BASE_PROT (_PAGE_PRESENT|_PAGE_RW|_PAGE_ACCESSED|_PAGE_USER)
> - #define L1_PROT (BASE_PROT|_PAGE_GUEST_KERNEL)
> -Index: xen-4.16.1-testing/xen/arch/x86/pv/ro-page-fault.c
> -===================================================================
> ---- xen-4.16.1-testing.orig/xen/arch/x86/pv/ro-page-fault.c
> -+++ xen-4.16.1-testing/xen/arch/x86/pv/ro-page-fault.c
> -@@ -26,6 +26,10 @@
> - #include "emulate.h"
> - #include "mm.h"
> -
> -+#if __GNUC__ >= 12
> -+#pragma GCC diagnostic ignored "-Warray-bounds"
> -+#endif
> -+
> - /*********************
> -  * Writable Pagetables
> -  */
> -Index: xen-4.16.1-testing/xen/arch/x86/pv/emul-priv-op.c
> -===================================================================
> ---- xen-4.16.1-testing.orig/xen/arch/x86/pv/emul-priv-op.c
> -+++ xen-4.16.1-testing/xen/arch/x86/pv/emul-priv-op.c
> -@@ -40,6 +40,10 @@
> - #include "emulate.h"
> - #include "mm.h"
> -
> -+#if __GNUC__ >= 12
> -+#pragma GCC diagnostic ignored "-Warray-bounds"
> -+#endif
> -+
> - struct priv_op_ctxt {
> -     struct x86_emulate_ctxt ctxt;
> -     struct {
> -Index: xen-4.16.1-testing/xen/arch/x86/pv/mm.c
> -===================================================================
> ---- xen-4.16.1-testing.orig/xen/arch/x86/pv/mm.c
> -+++ xen-4.16.1-testing/xen/arch/x86/pv/mm.c
> -@@ -26,6 +26,10 @@
> -
> - #include "mm.h"
> -
> -+#if __GNUC__ >= 12
> -+#pragma GCC diagnostic ignored "-Warray-bounds"
> -+#endif
> -+
> - /*
> -  * Get a mapping of a PV guest's l1e for this linear address.  The return
> -  * pointer should be unmapped using unmap_domain_page().
> -Index: xen-4.16.1-testing/xen/arch/x86/domain_page.c
> -===================================================================
> ---- xen-4.16.1-testing.orig/xen/arch/x86/domain_page.c
> -+++ xen-4.16.1-testing/xen/arch/x86/domain_page.c
> -@@ -18,6 +18,10 @@
> - #include <asm/hardirq.h>
> - #include <asm/setup.h>
> -
> -+#if __GNUC__ >= 12
> -+#pragma GCC diagnostic ignored "-Warray-bounds"
> -+#endif
> -+
> - static DEFINE_PER_CPU(struct vcpu *, override);
> -
> - static inline struct vcpu *mapcache_current_vcpu(void)
> -Index: xen-4.16.1-testing/xen/arch/x86/mm/shadow/private.h
> -===================================================================
> ---- xen-4.16.1-testing.orig/xen/arch/x86/mm/shadow/private.h
> -+++ xen-4.16.1-testing/xen/arch/x86/mm/shadow/private.h
> -@@ -33,6 +33,10 @@
> -
> - #include "../mm-locks.h"
> -
> -+#if __GNUC__ >= 12
> -+#pragma GCC diagnostic ignored "-Warray-bounds"
> -+#endif
> -+
> -
> /******************************************************************************
> -  * Levels of self-test and paranoia
> -  */
> -Index: xen-4.16.1-testing/xen/arch/x86/mm/hap/hap.c
> -===================================================================
> ---- xen-4.16.1-testing.orig/xen/arch/x86/mm/hap/hap.c
> -+++ xen-4.16.1-testing/xen/arch/x86/mm/hap/hap.c
> -@@ -42,6 +42,10 @@
> -
> - #include "private.h"
> -
> -+#if __GNUC__ >= 12
> -+#pragma GCC diagnostic ignored "-Warray-bounds"
> -+#endif
> -+
> - /************************************************/
> - /*          HAP VRAM TRACKING SUPPORT           */
> - /************************************************/
> -Index: xen-4.16.1-testing/xen/arch/x86/mm/p2m-pod.c
> -===================================================================
> ---- xen-4.16.1-testing.orig/xen/arch/x86/mm/p2m-pod.c
> -+++ xen-4.16.1-testing/xen/arch/x86/mm/p2m-pod.c
> -@@ -31,6 +31,10 @@
> -
> - #include "mm-locks.h"
> -
> -+#if __GNUC__ >= 12
> -+#pragma GCC diagnostic ignored "-Warray-bounds"
> -+#endif
> -+
> - #define superpage_aligned(_x)  (((_x)&(SUPERPAGE_PAGES-1))==0)
> -
> - /* Enforce lock ordering when grabbing the "external" page_alloc lock */
> -Index: xen-4.16.1-testing/xen/arch/x86/mm/p2m-ept.c
> -===================================================================
> ---- xen-4.16.1-testing.orig/xen/arch/x86/mm/p2m-ept.c
> -+++ xen-4.16.1-testing/xen/arch/x86/mm/p2m-ept.c
> -@@ -36,6 +36,10 @@
> -
> - #include "mm-locks.h"
> -
> -+#if __GNUC__ >= 12
> -+#pragma GCC diagnostic ignored "-Warray-bounds"
> -+#endif
> -+
> - #define atomic_read_ept_entry(__pepte)                              \
> -     ( (ept_entry_t) { .epte = read_atomic(&(__pepte)->epte) } )
> -
> -Index: xen-4.16.1-testing/xen/arch/x86/mm/p2m.c
> -===================================================================
> ---- xen-4.16.1-testing.orig/xen/arch/x86/mm/p2m.c
> -+++ xen-4.16.1-testing/xen/arch/x86/mm/p2m.c
> -@@ -44,6 +44,10 @@
> -
> - #include "mm-locks.h"
> -
> -+#if __GNUC__ >= 12
> -+#pragma GCC diagnostic ignored "-Warray-bounds"
> -+#endif
> -+
> - /* Override macro from asm/page.h to make work with mfn_t */
> - #undef virt_to_mfn
> - #define virt_to_mfn(v) _mfn(__virt_to_mfn(v))
> -Index: xen-4.16.1-testing/xen/arch/x86/tboot.c
> -===================================================================
> ---- xen-4.16.1-testing.orig/xen/arch/x86/tboot.c
> -+++ xen-4.16.1-testing/xen/arch/x86/tboot.c
> -@@ -16,6 +16,10 @@
> - #include <asm/setup.h>
> - #include <crypto/vmac.h>
> -
> -+#if __GNUC__ >= 12
> -+#pragma GCC diagnostic ignored "-Warray-bounds"
> -+#endif
> -+
> - /* tboot=<physical address of shared page> */
> - static unsigned long __initdata opt_tboot_pa;
> - integer_param("tboot", opt_tboot_pa);
> -Index: xen-4.16.1-testing/tools/firmware/hvmloader/ovmf.c
> -===================================================================
> ---- xen-4.16.1-testing.orig/tools/firmware/hvmloader/ovmf.c
> -+++ xen-4.16.1-testing/tools/firmware/hvmloader/ovmf.c
> -@@ -34,6 +34,11 @@
> - #include <xen/hvm/ioreq.h>
> - #include <xen/memory.h>
> -
> -+#if __GNUC__ >= 12
> -+#pragma GCC diagnostic ignored "-Warray-bounds"
> -+#pragma GCC diagnostic ignored "-Wstringop-overflow"
> -+#endif
> -+
> - #define OVMF_MAXOFFSET          0x000FFFFFULL
> - #define OVMF_END                0x100000000ULL
> - #define LOWCHUNK_BEGIN          0x000F0000
> -Index: xen-4.16.1-testing/tools/firmware/hvmloader/seabios.c
> -===================================================================
> ---- xen-4.16.1-testing.orig/tools/firmware/hvmloader/seabios.c
> -+++ xen-4.16.1-testing/tools/firmware/hvmloader/seabios.c
> -@@ -29,6 +29,11 @@
> - #include <acpi2_0.h>
> - #include <libacpi.h>
> -
> -+#if __GNUC__ >= 12
> -+#pragma GCC diagnostic ignored "-Warray-bounds"
> -+#pragma GCC diagnostic ignored "-Wstringop-overflow"
> -+#endif
> -+
> - struct seabios_info {
> -     char signature[14]; /* XenHVMSeaBIOS\0 */
> -     uint8_t length;     /* Length of this struct */
> -Index: xen-4.16.1-testing/tools/firmware/hvmloader/util.c
> -===================================================================
> ---- xen-4.16.1-testing.orig/tools/firmware/hvmloader/util.c
> -+++ xen-4.16.1-testing/tools/firmware/hvmloader/util.c
> -@@ -31,6 +31,10 @@
> - #include <xen/hvm/hvm_xs_strings.h>
> - #include <xen/hvm/params.h>
> -
> -+#if __GNUC__ >= 12
> -+#pragma GCC diagnostic ignored "-Warray-bounds"
> -+#endif
> -+
> - /*
> -  * Check whether there exists overlap in the specified memory range.
> -  * Returns true if exists, else returns false.
> -
> diff --git a/recipes-extended/xen/xen-tools_4.16.bb
> b/recipes-extended/xen/xen-tools_4.16.bb
> index 2200a5a44abe..b5e555e6eabb 100644
> --- a/recipes-extended/xen/xen-tools_4.16.bb
> +++ b/recipes-extended/xen/xen-tools_4.16.bb
> @@ -1,5 +1,5 @@
> -# xen 4.16.2 release sha
> -SRCREV ?= "cea5ed49bb5716698a11312a3f38bc8865cd1e67"
> +# xen 4.16.3 release sha
> +SRCREV ?= "556c2e817c9cf23b675eb4eaa2dc091f7bb3039f"
>
>  XEN_REL ?= "4.16"
>  XEN_BRANCH ?= "stable-${XEN_REL}"
> @@ -7,7 +7,6 @@ XEN_BRANCH ?= "stable-${XEN_REL}"
>  SRC_URI = " \
>      git://xenbits.xen.org/xen.git;branch=${XEN_BRANCH}
> <http://xenbits.xen.org/xen.git;branch=$%7BXEN_BRANCH%7D> \
>      file://0001-python-pygrub-pass-DISTUTILS-xen-4.15.patch \
> -    file://xen-fix-gcc12-build-issues.patch \
>      "
>
>  LIC_FILES_CHKSUM ?= "file://COPYING;md5=419739e325a50f3d7b4501338e44a4e5"
> diff --git a/recipes-extended/xen/xen_4.16.bb b/recipes-extended/xen/
> xen_4.16.bb
> index 70e1d70e9c29..14a4fa79c5dd 100644
> --- a/recipes-extended/xen/xen_4.16.bb
> +++ b/recipes-extended/xen/xen_4.16.bb
> @@ -1,5 +1,5 @@
> -# xen 4.16.2 release sha
> -SRCREV ?= "cea5ed49bb5716698a11312a3f38bc8865cd1e67"
> +# xen 4.16.3 release sha
> +SRCREV ?= "556c2e817c9cf23b675eb4eaa2dc091f7bb3039f"
>
>  XEN_REL ?= "4.16"
>  XEN_BRANCH ?= "stable-${XEN_REL}"
> @@ -7,7 +7,6 @@ XEN_BRANCH ?= "stable-${XEN_REL}"
>  SRC_URI = " \
>      git://xenbits.xen.org/xen.git;branch=${XEN_BRANCH}
> <http://xenbits.xen.org/xen.git;branch=$%7BXEN_BRANCH%7D> \
>
>  file://0001-menuconfig-mconf-cfg-Allow-specification-of-ncurses-location.patch
> \
> -    file://xen-fix-gcc12-build-issues.patch \
>      "
>
>  LIC_FILES_CHKSUM ?= "file://COPYING;md5=419739e325a50f3d7b4501338e44a4e5"
> --
> 2.25.1
>
>

[-- Attachment #2: Type: text/html, Size: 22311 bytes --]

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: [PATCH v2 2/3] xen: Add recipes for stable Xen 4.17 release and update master
  2023-01-06 14:46 ` [PATCH v2 2/3] xen: Add recipes for stable Xen 4.17 release and update master Michal Orzel
@ 2023-01-09  6:35   ` Christopher Clark
  2023-01-20 17:18   ` Bruce Ashfield
  1 sibling, 0 replies; 10+ messages in thread
From: Christopher Clark @ 2023-01-09  6:35 UTC (permalink / raw)
  To: Michal Orzel
  Cc: meta-virtualization, bertrand.marquis, stefano.stabellini,
	stewart.hildebrand, bruce.ashfield

[-- Attachment #1: Type: text/plain, Size: 5715 bytes --]

On Fri, Jan 6, 2023 at 6:46 AM Michal Orzel <michal.orzel@amd.com> wrote:

> Add recipes for xen and tools for the newly released 4.17 version and
> take the opportunity to update master recipes.
>
> Reflect 4.17 tools changes in xen-tools.inc:
>  - add test-paging-mempool to test package,
>  - add init-dom0less script to xl package,
>  - add localstatedir to xencommons package (this is needed as from 4.17
>    onwards, there is no /var/lib/xenstored resulting in /var being
>    installed but not shipped in any package).
>
> Signed-off-by: Michal Orzel <michal.orzel@amd.com>
>

Reviewed-by: Christopher Clark <christopher.w.clark@gmail.com>

thanks
Christopher




> ---
> Changes in v2:
>  - add init-dom0less to xl package
>  - add localstatedir to xencommons package
> ---
>  recipes-extended/xen/xen-tools.inc     |  3 +++
>  recipes-extended/xen/xen-tools_4.17.bb | 19 +++++++++++++++++++
>  recipes-extended/xen/xen-tools_git.bb  |  8 ++++----
>  recipes-extended/xen/xen_4.17.bb       | 19 +++++++++++++++++++
>  recipes-extended/xen/xen_git.bb        |  8 ++++----
>  5 files changed, 49 insertions(+), 8 deletions(-)
>  create mode 100644 recipes-extended/xen/xen-tools_4.17.bb
>  create mode 100644 recipes-extended/xen/xen_4.17.bb
>
> diff --git a/recipes-extended/xen/xen-tools.inc
> b/recipes-extended/xen/xen-tools.inc
> index d47309a72b1c..95da2bfbb6ce 100644
> --- a/recipes-extended/xen/xen-tools.inc
> +++ b/recipes-extended/xen/xen-tools.inc
> @@ -616,6 +616,7 @@ FILES:${PN}-xl = "\
>      ${libdir}/xen/bin/libxl-save-helper \
>      ${sbindir}/xl \
>      ${libdir}/xen/bin/xen-init-dom0 \
> +    ${libdir}/xen/bin/init-dom0less \
>      "
>
>  FILES:${PN}-xl-examples = "\
> @@ -658,6 +659,7 @@ FILES:${PN}-xencommons += "\
>      ${@bb.utils.contains('DISTRO_FEATURES', 'systemd',
> '${systemd_unitdir}/system/xen-init-dom0.service', '', d)} \
>      ${@bb.utils.contains('DISTRO_FEATURES', 'systemd',
> '${systemd_unitdir}/system/xenstored.service', '', d)} \
>      ${@bb.utils.contains('DISTRO_FEATURES', 'systemd',
> '${systemd_unitdir}/system/var-lib-xenstored.mount', '', d)} \
> +    ${localstatedir} \
>      "
>
>  FILES:${PN}-xend += " \
> @@ -688,6 +690,7 @@ FILES:${PN}-test += "\
>      ${libdir}/xen/bin/test-resource \
>      ${libdir}/xen/bin/test-cpu-policy \
>      ${libdir}/xen/bin/test-tsx \
> +    ${libdir}/xen/bin/test-paging-mempool \
>      "
>
>  # test-xenstore and test-resource currently only exist in 4.16
> diff --git a/recipes-extended/xen/xen-tools_4.17.bb
> b/recipes-extended/xen/xen-tools_4.17.bb
> new file mode 100644
> index 000000000000..0f323cb32aac
> --- /dev/null
> +++ b/recipes-extended/xen/xen-tools_4.17.bb
> @@ -0,0 +1,19 @@
> +# xen 4.17.0 release sha
> +SRCREV ?= "11560248ffda3f00f20bbdf3ae088af474f7f2a3"
> +
> +XEN_REL ?= "4.17"
> +XEN_BRANCH ?= "stable-${XEN_REL}"
> +
> +SRC_URI = " \
> +    git://xenbits.xen.org/xen.git;branch=${XEN_BRANCH}
> <http://xenbits.xen.org/xen.git;branch=$%7BXEN_BRANCH%7D> \
> +    file://0001-python-pygrub-pass-DISTUTILS-xen-4.15.patch \
> +    "
> +
> +LIC_FILES_CHKSUM ?= "file://COPYING;md5=d1a1e216f80b6d8da95fec897d0dbec9"
> +
> +PV = "${XEN_REL}+stable${SRCPV}"
> +
> +S = "${WORKDIR}/git"
> +
> +require xen.inc
> +require xen-tools.inc
> diff --git a/recipes-extended/xen/xen-tools_git.bb b/recipes-extended/xen/
> xen-tools_git.bb
> index a450a7d6574a..fd42cf2963b4 100644
> --- a/recipes-extended/xen/xen-tools_git.bb
> +++ b/recipes-extended/xen/xen-tools_git.bb
> @@ -1,7 +1,7 @@
> -# master status on 2022-04-05
> -SRCREV ?= "14dd241aad8af447680ac73e8579990e2c09c1e7"
> +# master status on 2022-12-29
> +SRCREV ?= "7eef80e06ed2282bbcec3619d860c6aacb0515d8"
>
> -XEN_REL ?= "4.17"
> +XEN_REL ?= "4.18"
>  XEN_BRANCH ?= "master"
>
>  SRC_URI = " \
> @@ -9,7 +9,7 @@ SRC_URI = " \
>      file://0001-python-pygrub-pass-DISTUTILS-xen-4.15.patch \
>      "
>
> -LIC_FILES_CHKSUM ?= "file://COPYING;md5=419739e325a50f3d7b4501338e44a4e5"
> +LIC_FILES_CHKSUM ?= "file://COPYING;md5=d1a1e216f80b6d8da95fec897d0dbec9"
>
>  PV = "${XEN_REL}+git${SRCPV}"
>
> diff --git a/recipes-extended/xen/xen_4.17.bb b/recipes-extended/xen/
> xen_4.17.bb
> new file mode 100644
> index 000000000000..f35689d4120f
> --- /dev/null
> +++ b/recipes-extended/xen/xen_4.17.bb
> @@ -0,0 +1,19 @@
> +# xen 4.17.0 release sha
> +SRCREV ?= "11560248ffda3f00f20bbdf3ae088af474f7f2a3"
> +
> +XEN_REL ?= "4.17"
> +XEN_BRANCH ?= "stable-${XEN_REL}"
> +
> +SRC_URI = " \
> +    git://xenbits.xen.org/xen.git;branch=${XEN_BRANCH}
> <http://xenbits.xen.org/xen.git;branch=$%7BXEN_BRANCH%7D> \
> +
> file://0001-menuconfig-mconf-cfg-Allow-specification-of-ncurses-location.patch
> \
> +    "
> +
> +LIC_FILES_CHKSUM ?= "file://COPYING;md5=d1a1e216f80b6d8da95fec897d0dbec9"
> +
> +PV = "${XEN_REL}+stable${SRCPV}"
> +
> +S = "${WORKDIR}/git"
> +
> +require xen.inc
> +require xen-hypervisor.inc
> diff --git a/recipes-extended/xen/xen_git.bb b/recipes-extended/xen/
> xen_git.bb
> index ebd1b76ff420..2138424406f9 100644
> --- a/recipes-extended/xen/xen_git.bb
> +++ b/recipes-extended/xen/xen_git.bb
> @@ -1,7 +1,7 @@
> -# master status on 2022-04-05
> -SRCREV ?= "14dd241aad8af447680ac73e8579990e2c09c1e7"
> +# master status on 2022-12-29
> +SRCREV ?= "7eef80e06ed2282bbcec3619d860c6aacb0515d8"
>
> -XEN_REL ?= "4.17"
> +XEN_REL ?= "4.18"
>  XEN_BRANCH ?= "master"
>
>  SRC_URI = " \
> @@ -9,7 +9,7 @@ SRC_URI = " \
>
>  file://0001-menuconfig-mconf-cfg-Allow-specification-of-ncurses-location.patch
> \
>      "
>
> -LIC_FILES_CHKSUM ?= "file://COPYING;md5=419739e325a50f3d7b4501338e44a4e5"
> +LIC_FILES_CHKSUM ?= "file://COPYING;md5=d1a1e216f80b6d8da95fec897d0dbec9"
>
>  PV = "${XEN_REL}+git${SRCPV}"
>
> --
> 2.25.1
>
>

[-- Attachment #2: Type: text/html, Size: 8859 bytes --]

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: [PATCH v2 3/3] xen: Bump default version to 4.17 stable
  2023-01-06 14:46 ` [PATCH v2 3/3] xen: Bump default version to 4.17 stable Michal Orzel
@ 2023-01-09  6:35   ` Christopher Clark
  0 siblings, 0 replies; 10+ messages in thread
From: Christopher Clark @ 2023-01-09  6:35 UTC (permalink / raw)
  To: Michal Orzel
  Cc: meta-virtualization, bertrand.marquis, stefano.stabellini,
	stewart.hildebrand, bruce.ashfield

[-- Attachment #1: Type: text/plain, Size: 918 bytes --]

On Fri, Jan 6, 2023 at 6:46 AM Michal Orzel <michal.orzel@amd.com> wrote:

> Signed-off-by: Michal Orzel <michal.orzel@amd.com>
>

Reviewed-by: Christopher Clark <christopher.w.clark@gmail.com>

thanks
Christopher



> ---
> Changes in v2:
>  - none
> ---
>  conf/distro/include/meta-virt-default-versions.inc | 4 ++--
>  1 file changed, 2 insertions(+), 2 deletions(-)
>
> diff --git a/conf/distro/include/meta-virt-default-versions.inc
> b/conf/distro/include/meta-virt-default-versions.inc
> index b2ce0210c05c..388eca90bed4 100644
> --- a/conf/distro/include/meta-virt-default-versions.inc
> +++ b/conf/distro/include/meta-virt-default-versions.inc
> @@ -1,4 +1,4 @@
>  # Meta-virtuailization PREFERED_VERSION
>
> -PREFERRED_VERSION_xen ?= "4.16+stable%"
> -PREFERRED_VERSION_xen-tools ?= "4.16+stable%"
> +PREFERRED_VERSION_xen ?= "4.17+stable%"
> +PREFERRED_VERSION_xen-tools ?= "4.17+stable%"
> --
> 2.25.1
>
>

[-- Attachment #2: Type: text/html, Size: 1671 bytes --]

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: [PATCH v2 0/3] xen: Update recipes for xen and xen-tools
  2023-01-06 14:46 [PATCH v2 0/3] xen: Update recipes for xen and xen-tools Michal Orzel
                   ` (2 preceding siblings ...)
  2023-01-06 14:46 ` [PATCH v2 3/3] xen: Bump default version to 4.17 stable Michal Orzel
@ 2023-01-09  6:37 ` Christopher Clark
  3 siblings, 0 replies; 10+ messages in thread
From: Christopher Clark @ 2023-01-09  6:37 UTC (permalink / raw)
  To: Michal Orzel
  Cc: meta-virtualization, bertrand.marquis, stefano.stabellini,
	stewart.hildebrand, bruce.ashfield

[-- Attachment #1: Type: text/plain, Size: 1438 bytes --]

On Fri, Jan 6, 2023 at 6:46 AM Michal Orzel <michal.orzel@amd.com> wrote:

> This patch series:
>  - updates the 4.16 recipes to the latest 4.16.3 release,
>  - adds 4.17 recipes, fixes conflicts and updates master,
>  - bumps default version to 4.17.
>
> Tested by building all the available Xen versions on qemu{arm64/x86-64} and
> running them using runqemu.
>

Thanks for including testing - appreciated. The series is good.

Christopher



>
> Michal Orzel (3):
>   xen: Bump SRCREV of 4.16 recipes to 4.16.3
>   xen: Add recipes for stable Xen 4.17 release and update master
>   xen: Bump default version to 4.17 stable
>
>  .../include/meta-virt-default-versions.inc    |   4 +-
>  .../files/xen-fix-gcc12-build-issues.patch    | 433 ------------------
>  recipes-extended/xen/xen-tools.inc            |   3 +
>  recipes-extended/xen/xen-tools_4.16.bb        |   5 +-
>  recipes-extended/xen/xen-tools_4.17.bb        |  19 +
>  recipes-extended/xen/xen-tools_git.bb         |   8 +-
>  recipes-extended/xen/xen_4.16.bb              |   5 +-
>  recipes-extended/xen/xen_4.17.bb              |  19 +
>  recipes-extended/xen/xen_git.bb               |   8 +-
>  9 files changed, 55 insertions(+), 449 deletions(-)
>  delete mode 100644
> recipes-extended/xen/files/xen-fix-gcc12-build-issues.patch
>  create mode 100644 recipes-extended/xen/xen-tools_4.17.bb
>  create mode 100644 recipes-extended/xen/xen_4.17.bb
>
> --
> 2.25.1
>
>

[-- Attachment #2: Type: text/html, Size: 2670 bytes --]

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: [PATCH v2 2/3] xen: Add recipes for stable Xen 4.17 release and update master
  2023-01-06 14:46 ` [PATCH v2 2/3] xen: Add recipes for stable Xen 4.17 release and update master Michal Orzel
  2023-01-09  6:35   ` Christopher Clark
@ 2023-01-20 17:18   ` Bruce Ashfield
  1 sibling, 0 replies; 10+ messages in thread
From: Bruce Ashfield @ 2023-01-20 17:18 UTC (permalink / raw)
  To: Michal Orzel
  Cc: meta-virtualization, christopher.w.clark, bertrand.marquis,
	stefano.stabellini, stewart.hildebrand

On Fri, Jan 6, 2023 at 9:46 AM Michal Orzel <michal.orzel@amd.com> wrote:
>
> Add recipes for xen and tools for the newly released 4.17 version and
> take the opportunity to update master recipes.
>
> Reflect 4.17 tools changes in xen-tools.inc:
>  - add test-paging-mempool to test package,
>  - add init-dom0less script to xl package,
>  - add localstatedir to xencommons package (this is needed as from 4.17
>    onwards, there is no /var/lib/xenstored resulting in /var being
>    installed but not shipped in any package).

It looks like not a whole lot of folks are building 4.17 with systemd
as the init system.

I ran into a packaging area with the xenstored.mount packaging (it
isn't present in 4.17 as you noted in this commit).

I've moved that systemd package to the 4.16 versioned recipe and
pushed it to master.

Bruce

>
> Signed-off-by: Michal Orzel <michal.orzel@amd.com>
> ---
> Changes in v2:
>  - add init-dom0less to xl package
>  - add localstatedir to xencommons package
> ---
>  recipes-extended/xen/xen-tools.inc     |  3 +++
>  recipes-extended/xen/xen-tools_4.17.bb | 19 +++++++++++++++++++
>  recipes-extended/xen/xen-tools_git.bb  |  8 ++++----
>  recipes-extended/xen/xen_4.17.bb       | 19 +++++++++++++++++++
>  recipes-extended/xen/xen_git.bb        |  8 ++++----
>  5 files changed, 49 insertions(+), 8 deletions(-)
>  create mode 100644 recipes-extended/xen/xen-tools_4.17.bb
>  create mode 100644 recipes-extended/xen/xen_4.17.bb
>
> diff --git a/recipes-extended/xen/xen-tools.inc b/recipes-extended/xen/xen-tools.inc
> index d47309a72b1c..95da2bfbb6ce 100644
> --- a/recipes-extended/xen/xen-tools.inc
> +++ b/recipes-extended/xen/xen-tools.inc
> @@ -616,6 +616,7 @@ FILES:${PN}-xl = "\
>      ${libdir}/xen/bin/libxl-save-helper \
>      ${sbindir}/xl \
>      ${libdir}/xen/bin/xen-init-dom0 \
> +    ${libdir}/xen/bin/init-dom0less \
>      "
>
>  FILES:${PN}-xl-examples = "\
> @@ -658,6 +659,7 @@ FILES:${PN}-xencommons += "\
>      ${@bb.utils.contains('DISTRO_FEATURES', 'systemd', '${systemd_unitdir}/system/xen-init-dom0.service', '', d)} \
>      ${@bb.utils.contains('DISTRO_FEATURES', 'systemd', '${systemd_unitdir}/system/xenstored.service', '', d)} \
>      ${@bb.utils.contains('DISTRO_FEATURES', 'systemd', '${systemd_unitdir}/system/var-lib-xenstored.mount', '', d)} \
> +    ${localstatedir} \
>      "
>
>  FILES:${PN}-xend += " \
> @@ -688,6 +690,7 @@ FILES:${PN}-test += "\
>      ${libdir}/xen/bin/test-resource \
>      ${libdir}/xen/bin/test-cpu-policy \
>      ${libdir}/xen/bin/test-tsx \
> +    ${libdir}/xen/bin/test-paging-mempool \
>      "
>
>  # test-xenstore and test-resource currently only exist in 4.16
> diff --git a/recipes-extended/xen/xen-tools_4.17.bb b/recipes-extended/xen/xen-tools_4.17.bb
> new file mode 100644
> index 000000000000..0f323cb32aac
> --- /dev/null
> +++ b/recipes-extended/xen/xen-tools_4.17.bb
> @@ -0,0 +1,19 @@
> +# xen 4.17.0 release sha
> +SRCREV ?= "11560248ffda3f00f20bbdf3ae088af474f7f2a3"
> +
> +XEN_REL ?= "4.17"
> +XEN_BRANCH ?= "stable-${XEN_REL}"
> +
> +SRC_URI = " \
> +    git://xenbits.xen.org/xen.git;branch=${XEN_BRANCH} \
> +    file://0001-python-pygrub-pass-DISTUTILS-xen-4.15.patch \
> +    "
> +
> +LIC_FILES_CHKSUM ?= "file://COPYING;md5=d1a1e216f80b6d8da95fec897d0dbec9"
> +
> +PV = "${XEN_REL}+stable${SRCPV}"
> +
> +S = "${WORKDIR}/git"
> +
> +require xen.inc
> +require xen-tools.inc
> diff --git a/recipes-extended/xen/xen-tools_git.bb b/recipes-extended/xen/xen-tools_git.bb
> index a450a7d6574a..fd42cf2963b4 100644
> --- a/recipes-extended/xen/xen-tools_git.bb
> +++ b/recipes-extended/xen/xen-tools_git.bb
> @@ -1,7 +1,7 @@
> -# master status on 2022-04-05
> -SRCREV ?= "14dd241aad8af447680ac73e8579990e2c09c1e7"
> +# master status on 2022-12-29
> +SRCREV ?= "7eef80e06ed2282bbcec3619d860c6aacb0515d8"
>
> -XEN_REL ?= "4.17"
> +XEN_REL ?= "4.18"
>  XEN_BRANCH ?= "master"
>
>  SRC_URI = " \
> @@ -9,7 +9,7 @@ SRC_URI = " \
>      file://0001-python-pygrub-pass-DISTUTILS-xen-4.15.patch \
>      "
>
> -LIC_FILES_CHKSUM ?= "file://COPYING;md5=419739e325a50f3d7b4501338e44a4e5"
> +LIC_FILES_CHKSUM ?= "file://COPYING;md5=d1a1e216f80b6d8da95fec897d0dbec9"
>
>  PV = "${XEN_REL}+git${SRCPV}"
>
> diff --git a/recipes-extended/xen/xen_4.17.bb b/recipes-extended/xen/xen_4.17.bb
> new file mode 100644
> index 000000000000..f35689d4120f
> --- /dev/null
> +++ b/recipes-extended/xen/xen_4.17.bb
> @@ -0,0 +1,19 @@
> +# xen 4.17.0 release sha
> +SRCREV ?= "11560248ffda3f00f20bbdf3ae088af474f7f2a3"
> +
> +XEN_REL ?= "4.17"
> +XEN_BRANCH ?= "stable-${XEN_REL}"
> +
> +SRC_URI = " \
> +    git://xenbits.xen.org/xen.git;branch=${XEN_BRANCH} \
> +    file://0001-menuconfig-mconf-cfg-Allow-specification-of-ncurses-location.patch \
> +    "
> +
> +LIC_FILES_CHKSUM ?= "file://COPYING;md5=d1a1e216f80b6d8da95fec897d0dbec9"
> +
> +PV = "${XEN_REL}+stable${SRCPV}"
> +
> +S = "${WORKDIR}/git"
> +
> +require xen.inc
> +require xen-hypervisor.inc
> diff --git a/recipes-extended/xen/xen_git.bb b/recipes-extended/xen/xen_git.bb
> index ebd1b76ff420..2138424406f9 100644
> --- a/recipes-extended/xen/xen_git.bb
> +++ b/recipes-extended/xen/xen_git.bb
> @@ -1,7 +1,7 @@
> -# master status on 2022-04-05
> -SRCREV ?= "14dd241aad8af447680ac73e8579990e2c09c1e7"
> +# master status on 2022-12-29
> +SRCREV ?= "7eef80e06ed2282bbcec3619d860c6aacb0515d8"
>
> -XEN_REL ?= "4.17"
> +XEN_REL ?= "4.18"
>  XEN_BRANCH ?= "master"
>
>  SRC_URI = " \
> @@ -9,7 +9,7 @@ SRC_URI = " \
>      file://0001-menuconfig-mconf-cfg-Allow-specification-of-ncurses-location.patch \
>      "
>
> -LIC_FILES_CHKSUM ?= "file://COPYING;md5=419739e325a50f3d7b4501338e44a4e5"
> +LIC_FILES_CHKSUM ?= "file://COPYING;md5=d1a1e216f80b6d8da95fec897d0dbec9"
>
>  PV = "${XEN_REL}+git${SRCPV}"
>
> --
> 2.25.1
>


-- 
- Thou shalt not follow the NULL pointer, for chaos and madness await
thee at its end
- "Use the force Harry" - Gandalf, Star Trek II


^ permalink raw reply	[flat|nested] 10+ messages in thread

* [PATCH v2 0/3] xen: Update recipes for xen and xen-tools
@ 2022-04-19  9:07 Michal Orzel
  0 siblings, 0 replies; 10+ messages in thread
From: Michal Orzel @ 2022-04-19  9:07 UTC (permalink / raw)
  To: meta-virtualization; +Cc: christopher.w.clark, cardoe, bertrand.marquis, nd

Before the next Yocto release, Xen recipes need to be updated.
This patch series:
- updates 4.15 recipes (4.15.2)
- introduces 4.16 recipes (4.16.1)
- removes 4.14 recipes

v2 bumps SRCREV of 4.16 recipes to 4.16.1 as it was released a few days ago.
v2 adds R-by from Christopher and Bertrand to all the patches.

Michal Orzel (3):
  xen: Bump SRCREV of 4.15 recipes to 4.15.2
  xen: Add recipes for stable Xen 4.16 release and update master
  xen: Remove 4.14 recipes and related patches

 .../include/meta-virt-default-versions.inc    |   4 +-
 ...-stand-alone-set-of-headers-Xen-4.14.patch | 178 ------------------
 ...ython-pygrub-pass-DISTUTILS-xen-4.14.patch |  66 -------
 ...d-firmware-as-ffreestanding-Xen-4.14.patch |  83 --------
 recipes-extended/xen/xen-tools_4.14.bb        |  21 ---
 recipes-extended/xen/xen-tools_4.15.bb        |   4 +-
 recipes-extended/xen/xen-tools_4.16.bb        |  19 ++
 recipes-extended/xen/xen-tools_git.bb         |   6 +-
 recipes-extended/xen/xen_4.15.bb              |   4 +-
 .../xen/{xen_4.14.bb => xen_4.16.bb}          |   6 +-
 recipes-extended/xen/xen_git.bb               |   6 +-
 11 files changed, 34 insertions(+), 363 deletions(-)
 delete mode 100644 recipes-extended/xen/files/0001-firmware-provide-a-stand-alone-set-of-headers-Xen-4.14.patch
 delete mode 100644 recipes-extended/xen/files/0001-python-pygrub-pass-DISTUTILS-xen-4.14.patch
 delete mode 100644 recipes-extended/xen/files/0001-tools-firmware-Build-firmware-as-ffreestanding-Xen-4.14.patch
 delete mode 100644 recipes-extended/xen/xen-tools_4.14.bb
 create mode 100644 recipes-extended/xen/xen-tools_4.16.bb
 rename recipes-extended/xen/{xen_4.14.bb => xen_4.16.bb} (79%)

-- 
2.25.1



^ permalink raw reply	[flat|nested] 10+ messages in thread

end of thread, other threads:[~2023-01-20 17:18 UTC | newest]

Thread overview: 10+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2023-01-06 14:46 [PATCH v2 0/3] xen: Update recipes for xen and xen-tools Michal Orzel
2023-01-06 14:46 ` [PATCH v2 1/3] xen: Bump SRCREV of 4.16 recipes to 4.16.3 Michal Orzel
2023-01-09  6:35   ` Christopher Clark
2023-01-06 14:46 ` [PATCH v2 2/3] xen: Add recipes for stable Xen 4.17 release and update master Michal Orzel
2023-01-09  6:35   ` Christopher Clark
2023-01-20 17:18   ` Bruce Ashfield
2023-01-06 14:46 ` [PATCH v2 3/3] xen: Bump default version to 4.17 stable Michal Orzel
2023-01-09  6:35   ` Christopher Clark
2023-01-09  6:37 ` [PATCH v2 0/3] xen: Update recipes for xen and xen-tools Christopher Clark
  -- strict thread matches above, loose matches on Subject: below --
2022-04-19  9:07 Michal Orzel

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.