AMD

AMD 12.10 Feature: Xen Recommended Patches

Bug #1009098 reported by David Harmon
10
This bug affects 1 person
Affects Status Importance Assigned to Milestone
AMD
Fix Released
Undecided
James M. Leddy
xen (Ubuntu)
Fix Released
Undecided
Unassigned
Tags: patch

Related branches

Revision history for this message
Tim Gardner (timg-tpi) wrote :

osrc.amd.com cannot be resolved to an IP address.

Changed in xen (Ubuntu):
status: New → Incomplete
Revision history for this message
Kim Naru (kim-naru) wrote :
Revision history for this message
Kim Naru (kim-naru) wrote :

I should have include the following on top of the previous comment; nonetheless here it is :

AMD Xen Patches for Xen 4.1.3 Tree

This page contains the necessary patches for Xen 4.1.3 to enable (or better support) AMD CPUs up to Orochi-C. We split the patches into two categories: recommended and optional. Recommended patches are needed for bug fixes, new feature support, or better performance.

Changed in xen (Ubuntu):
status: Incomplete → Confirmed
Changed in amd:
status: New → Confirmed
assignee: nobody → James M. Leddy (jm-leddy)
Revision history for this message
Stefan Bader (smb) wrote :

Started an attempt on applying the patches:

http://xenbits.xen.org/hg/xen-unstable.hg/rev/a06e6cdeafe3 -> is already included.

http://xenbits.xen.org/hg/xen-unstable.hg/rev/eae25241d571

Patch above does not apply cleanly and in the area of microcode update there are a few places I would not want to change without more research.

The set of ATS patches also do often not apply cleanly. Right now I somehow applied them but the differences in code have the risk of getting it wrong.

Revision history for this message
Stefan Bader (smb) wrote :

Looking again with a fresh mind it looks like the OSVW patch actually can be made to apply but the set of patches for the ATS feature I would rather not include as they seem to depend on some PCI config space rework from Xen-4.2.

Instead of just adding them to the current Xen version in Quantal, I actually merged against the latest Debian unstable version (which moves us from a pre-4.1.3 to a real 4.1.3 version). This would also have the benefit of several CVEs being fixed by that move. I gave the resulting build on amd64 a quick test of booting on my AMD test machine and starting a HVM guest via libvirt and a PVM guest via xm commands. The PVM guest I also saved and restored via xm. Hopefully that was enough to ensure no regressions were introduced.

Revision history for this message
Stefan Bader (smb) wrote :
Revision history for this message
Stefan Bader (smb) wrote :
security vulnerability: yes → no
visibility: private → public
tags: added: patch
Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package xen - 4.1.3-3ubuntu1

---------------
xen (4.1.3-3ubuntu1) quantal; urgency=low

  * Merge from Debian unstable. Remaining changes:
    - libxenstore3.0: Conflict and replaces libxen3.
    - libxen-dev: Conflict and replaces libxen3-dev.
    - xenstore-utils: Conflict and replaces libxen3.
    - xen-utils-4.1: Conflict and replaces libxen3, python-xen-3.3,
      and xen-utils-4.1.
    - Change depend back to ipxe as we do not have ipxe-qemu.
    - etherboot: Change the config back to include the 8086100e.rom
    - Dropped:
      - Make sure the LDFLAGS value passed is suitable for use by ld
        rather than gcc. Right now there seem to be no LDFLAGS passed.
  * Backported AMD specific improvements from upstream Xen (LP: #1009098):
    - svm: Do not intercept RDTSC(P) when TSC scaling is supported by hardware
    - x86: Use deep C states for off-lined CPUs
    - x86/AMD: Add support for AMD's OSVW feature in guests.
    - hvm: vpmu: Enable HVM VPMU for AMD Family 12h and 14h processors
 -- Stefan Bader <email address hidden> Thu, 27 Sep 2012 21:27:44 +0200

Changed in xen (Ubuntu):
status: Confirmed → Fix Released
Changed in amd:
status: Confirmed → Fix Released
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.