Commit Graph

40 Commits

Author SHA1 Message Date
Martin Jansa
c01273e001 metadata: add whitespace around assignments
With:
https://lists.openembedded.org/g/bitbake-devel/message/17508
there are many WARNINGs from this layer will cover src_uri.inc files
in next commit.

Signed-off-by: Martin Jansa <martin.jansa@gmail.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
2025-04-03 17:56:53 +00:00
Bruce Ashfield
33f916b5f5 xen-tools: make qemu-firmware dependent on vmsep distro feature
Only when vmsep is enabled is qemu-firmware separated out from
the main qemu package. So we should make our dependency conditional
on that feature.

Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
2024-11-18 19:24:22 +00:00
Bruce Ashfield
d2238e7287 xen: enable networking and guest image bundling
The xen host image reference needed signifant work to be
functional for launching and testing Xen domu guests.

Here we add additional tools to the host image, and allow
it to automatically bundle guests if the configuration
is enabled.

We also add systemd networking configuration to create
a xenbr0 which offeres connectivity to the entire reference
system.

See the recipes and the README for details on testing
and bundling.

Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
2024-11-15 19:50:00 +00:00
Bruce Ashfield
3af81200a4 xen: make qemu-system-* configurable
qemu-system-i386 / firmware were added as RDEPENDS to xen.
While this is typically the right choice, we can make those
values defined by a variable in case other layers want to
override the default choice.

While we are at it, we change other references to qemu-system-i386
to allow a complete switch if the variable is changed.

Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
2024-11-15 19:50:00 +00:00
Bruce Ashfield
e6b7e24630 xen: add qemu-system-i386 and bios RDEPENDS
The current RRRECOMMENDS can work, but isn't strong enough
since we explicitly configure system-i386 into 'xl' and
-system requires the bios files.

Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
2024-11-15 19:50:00 +00:00
Bruce Ashfield
a2ca99c420 xen: update to 4.19
Bumping xen to version RELEASE-4.19.0, which comprises the following commits:

    026c9fa297 Set 4.19 version
    df9b8a649f README: make heading say 4.19
    b2d2878ab2 Config.mk: Bump tags to 4.19.0 final
    fe84f5392d CHANGELOG.md: Finalize changes in 4.19 release cycle
    6ce22ee4ba SUPPORT.md: Define support lifetime
    2d7b6170cc hotplug: Restore block-tap phy compatibility (again)
    9d7f7e3444 x86/altcall: fix clang code-gen when using altcall in loop constructs
    5eea879049 CHANGELOG.md: Set release date for 4.19
    7ae9503645 Turn off debug by default
    48acf0fd3e Config.mk: switch to named tags (for stable branch)
    57338346f2 x86/IRQ: avoid double unlock in map_domain_pirq()
    1ddc8c1bad CI: Add Ubuntu 22.04 (Jammy) and 24.04 (Noble) testing
    6db222eb1f CI: Refresh Ubuntu Focal container as 20.04-x86_64
    51e5081c6e CI: Refresh Ubuntu Bionic container as 18.04-x86_64
    1ab414b915 CI: Refresh Ubuntu Xenial container as 16.04-x86_64
    e85ff1f1af CI: Refresh OpenSUSE Leap container
    a8bc31be01 CI: Refresh OpenSUSE Tumbleweed container
    1e66e18806 CI: Refresh and upgrade the GCC-IBT container
    248200bd5b CI: Swap to debian for riscv64 build and test
    a507bd7d1f CI: Introduce debian:11/12-riscv64 containers
    d46e4264c3 CI: Refresh bullseye-ppc64le as debian:11-ppc64le
    155c9d7f1b CI: Use debian:12-ppc64le for smoke testing
    a2a0ee0eaf CI: Introduce a debian:12-ppc64le container
    5e1773dc86 CI: Mark Archlinux/x86 as allowing failures
    4b716647f7 CI: Drop Ubuntu Trusty testing
    2617d2f141 CI: Drop Debian Stretch testing
    aabccd1018 CI: Drop Debian Jessie dockerfiles
    83754331a7 CI: Remove useless/misleading randconfig jobs
    3420cc1a50 CI: Fix CONTAINER_UID0=1 scripts/containerize
    5d3e2140bb automation: Use a different ImageBuilder repository URL
    d49ba6bf8f build: Drop xorg-x11 as a build dependency
    47f465d485 build: Drop libiconv as a build dependecy
    cb3a371469 build: Drop openssl as a build dependency
    37810b52d0 tools/libxs: Fix fcntl() invocation in set_cloexec()
    8e7c08a336 stubdom: Remove more leftovers of caml-stubdom
    c4ebeb79d1 CI: Refresh the Coverity Github Action configuration
    64cee18837 build: Fix the version of python checked for by ./configure
    7cc95f4166 build: Regenerate ./configure with Autoconf 2.71
    0d2b87b5ad x86/physdev: Return pirq that irq was already mapped to
    c2a66d0b58 CI: Rework the CentOS7 container
    7878756565 CI: Adjust the usage of inline files
    aa2b6e4d84 CI: Formalise the use of heredocs
    56b77d7db0 build/mkheader: Fix Syntax/DeprecationWarnings
    31618bf80e build/mkheader: Remove C-isms from the code
    5d8c784783 tools/xs-clients: Fix `make clean` rule
    7e3701b6ce xen/vmap: Document the vmap header
    a771e02594 xen/riscv: use .insn with operands to support the older gas
    63c66274d9 xen: Fix XEN_EXTRAVERSION after 4.19-rc1
    fb76e08a8f cmdline: "extra_guest_irqs" is inapplicable to PVH
    1f56accba3 amend 'cmdline: document and enforce "extra_guest_irqs" upper bounds'
    08daa72cdc xen: avoid UB in guest handle field accessors
    d2fe9ab304 x86/entry: don't clear DF when raising #UD for lack of syscall handler
    17f6d398f7 cmdline: document and enforce "extra_guest_irqs" upper bounds
    a2ff677852 tools/libxs: Fix CLOEXEC handling in xs_fileno()
    1957dd6aff tools/libxs: Fix CLOEXEC handling in get_socket()
    bf7c146470 tools/libxs: Fix CLOEXEC handling in get_dev()
    4c3a618b0a tools/dombuilder: Correct the length calculation in xc_dom_alloc_segment()
    9ec74bdb25 xen/common: fix build issue for common/trace.c
    daa90dfea9 pirq_cleanup_check() leaks
    4a73eb4c20 Update Xen version to 4.19-rc
    7584e39986 Config.mk pin QEMU_UPSTREAM_REVISION (prep for Xen 4.19 RC1)
    08f9b1dd9c MAINTAINERS: Step down as maintainer and committer
    6d41f5b9e1 automation/eclair: add deviations agreed in MISRA meetings
    402e473249 x86/traps: address violations of MISRA C Rule 20.7
    bfea273b7b automation/eclair_analysis: clean ECLAIR configuration scripts
    8f5581d7e1 x86/irq: address violations of MISRA C Rule 20.7
    c7e195fac0 automation/eclair_analysis: address violations of MISRA C Rule 20.7
    f39642c308 xen/guest_access: address violations of MISRA rule 20.7
    4929fea7bd xen/self-tests: address violations of MISRA rule 20.7
    0dca0f2b9a automation/eclair: address violations of MISRA C Rule 20.7
    ecadd22a3d CHANGELOG: Add entries related to tracing
    dde20e47af tools/xenalyze: Remove argp_program_bug_address
    188e5f1a80 CHANGELOG.md: Fix indentation of "Removed" section
    4712e3b376 Config.mk: update MiniOS commit
    853f707cd9 automation/eclair_analysis: deviate and|or|xor|not for MISRA C Rule 21.2
    0ac3b175e7 automation/eclair: configure Rule 13.6 and custom service B.UNEVALEFF
    11ea49a3fd gnttab: fix compat query-size handling
    735865f884 xen: re-add type checking to {,__}copy_from_guest_offset()
    93db2f64f3 MAINTAINERS: Update my email address again
    b14dae96c0 x86/pagewalk: Address MISRA R8.3 violation in guest_walk_tables()
    6e07f41b27 common/unlzo: address violation of MISRA C Rule 7.3
    c2f4ea4dc9 automation/eclair: add more guidelines to the monitored set
    5add709cc6 automation/eclair: add deviations of MISRA C Rule 5.5
    912412f97a automation/eclair: add deviation for MISRA C Rule 17.7
    c56f1ef577 xen/arm: static-shmem: request host address to be specified for 1:1 domains
    908407bf2b xen/riscv: Drop legacy __ro_after_init definition
    8c3bb4d8ce xen/gnttab: Perform compat/native gnttab_query_size check
    ebed411e7a xen/xlat: Sort structs per file
    90c1520d4e xen/xlat: Sort out whitespace
    6a17e11993 x86/shadow: Don't leave trace record field uninitialized
    8765783434 x86/shadow: Rework trace_shadow_emulate_other() as sh_trace_gfn_va()
    578066d82b x86/shadow: Introduce sh_trace_gl1e_va()
    2e9f8a734e x86/shadow: Rework trace_shadow_gen() into sh_trace_va()
    ba52b3b624 tools/xl: Open xldevd.log with O_CLOEXEC
    9e7c26ad85 libelf: avoid UB in elf_xen_feature_{get,set}()
    c5746b021e x86/ioapic: Fix signed shifts in io_apic.c
    62071a1c16 livepatch: use appropriate type for buffer offset variables
    e2bb28d621 x86/irq: forward pending interrupts to new destination in fixup_irqs()
    74970165ba tools/libs/light: Fix nic->vlan memory allocation
    f16ac12bd4 hotplug: Restore block-tap phy compatibility
    43d5c5d5f7 xen: avoid UB in guest handle arithmetic
    267122a24c x86/defns: Clean up X86_{XCR0,XSS}_* constants
    71cacfb035 x86/cpuid: Fix handling of XSAVE dynamic leaves
    fdb7e77fea x86/cpu-policy: Simplify recalculate_xstate()
    df09dfb94d x86/xstate: Rework xstate_ctxt_size() as xstate_uncompressed_size()
    a09022a09e x86/boot: Collect the Raw CPU Policy earlier on boot
    d31a111940 x86/xstate: Cross-check dynamic XSTATE sizes at boot
    9e6dbbe8bf x86/xstate: Fix initialisation of XSS cache
    aba98c8d67 xen/arch: Centralise __read_mostly and __ro_after_init
    82f4809447 xen/irq: Address MISRA Rule 8.3 violation
    efa6e9f15b Revert "xen/arm: Alloc XenStore page for Dom0less DomUs from hypervisor"
    443c488a0b Revert "docs/features/dom0less: Update the late XenStore init protocol"
    988f1c7e1f xen/arm: static-shmem: fix "gbase/pbase used uninitialized" build failure
    53c5c99e87 docs/features/dom0less: Update the late XenStore init protocol
    6f9d90ea94 xen/arm: Alloc XenStore page for Dom0less DomUs from hypervisor
    cb1ddafdc5 xen/arm/static-shmem: Static-shmem should be direct-mapped for direct-mapped domains
    bd59af9970 xen/ubsan: Fix UB in type_descriptor declaration
    369558924a x86/irq: handle moving interrupts in _assign_irq_vector()
    817d1cd627 x86/irq: deal with old_cpu_mask for interrupts in movement in fixup_irqs()
    fa4d026737 x86/Intel: unlock CPUID earlier for the BSP
    77b1ed1d02 automation/eclair_analysis: add more clean MISRA guidelines
    0f0235e9e9 automation/eclair_analysis: address remaining violations of MISRA C Rule 20.12
    8b4243a9b5 xen/docs: Describe static shared memory when host address is not provided
    3deac416a3 xen/arm: Implement the logic for static shared memory from Xen heap
    a21bfc9126 xen/arm: Rework heap page allocation outside allocate_bank_memory
    1544d355b5 xen/arm: Parse xen,shared-mem when host phys address is not provided
    3e2121ce47 xen/p2m: put reference for level 2 superpage
    79a43c8838 xen/arm: Wrap shared memory mapping code in one function
    e90f8d562d xen/arm: Lookup bootinfo shm bank during the mapping
    4fdd8d7556 x86/EPT: drop questionable mfn_valid() from epte_get_entry_emt()
    777c71d313 x86/EPT: avoid marking non-present entries for re-configuring
    5540b94e81 x86/EPT: correct special page checking in epte_get_entry_emt()
    b490f470f5 xen/arm: ffa: support notification
    452551c723 xen/arm: add and call tee_free_domain_ctx()
    dd348eb005 xen/arm: add and call init_tee_secondary()
    67ef3db45a xen/arm: allow dynamically assigned SGI handlers
    282c33cec3 xen/arm: ffa: simplify ffa_handle_mem_share()
    4d2b1b5d69 xen/arm: ffa: use ACCESS_ONCE()
    66e6e47511 xen/arm: ffa: refactor ffa_handle_call()
    401448f2d1 x86/physdev: replace physdev_{,un}map_pirq() checking against DOMID_SELF
    c7564d7366 x86/irq: limit interrupt movement done by fixup_irqs()
    0e8cde5884 x86/irq: describe how the interrupt CPU movement works
    171c52fba5 x86/smp: do not use shorthand IPI destinations in CPU hot{,un}plug contexts
    b0e5352c60 MAINTAINERS: alter EFI section
    d05d97c090 MAINTAINERS: add me as scheduler maintainer
    5ea7f2c9d7 CI: Update FreeBSD to 13.3
    43de96a70f automation: add a test for HVM domU on PVH dom0
    ea1cb444c2 x86/pvh: declare PVH dom0 supported with caveats
    0a5b2ca32c x86/domain: deviate violation of MISRA C Rule 20.12
    e63209d3ba x86/irq: remove offline CPUs from old CPU mask when adjusting move_cleanup_count
    c2d5e63c73 xen: fix MISRA regressions on rule 20.9 and 20.12
    5f7606c048 xen/bitops: Rearrange the top of xen/bitops.h
    04e70af5f2 xen/bitops: Clean up ffs64()/fls64() definitions
    54b10ef6c8 xen/bitops: Implement fls()/flsl() in common logic
    5ed26fc076 xen/bitops: Implement ffsl() in common logic
    989e5f08d3 x86/bitops: Improve arch_ffs() in the general case
    ef1dd8dff4 xen/bitops: Implement ffs() in common logic
    95ddb7e9b0 xen/bitops: Implement generic_ffsl()/generic_flsl() in lib/
    ea59e7d780 xen/bitops: Cleanup and new infrastructure ahead of rearrangements
    1408cf7a28 xen/bitops: Delete find_first_set_bit()
    03147e6837 arch/irq: Centralise no_irq_type
    8aeda4a241 arch/irq: Make irq_ack_none() mandatory
    16884ac6c8 CI: Improve serial handling in qemu-smoke-ppc64le.sh
    2ff6d17bc3 CI: Use a debug build of Xen for the Xilinx HW tests
    1250c73c1a xen/riscv: Update Kconfig in preparation for a full Xen build
    db04be9e7d x86/hvm: allow XENMEM_machine_memory_map
    9a905d7dc6 xen/bitops: Replace find_first_set_bit() with ffs()/ffsl() - 1
    1773a74469 xen/page_alloc: Coerce min(flsl(), foo) expressions to being unsigned
    e807b137f7 ppc/boot: Run constructors on boot
    6ef4fa1e7f tools: (Actually) drop libsystemd as a dependency
    12f9599a3b Partial revert of "x86/MCE: optional build of AMD/Intel MCE code"
    845a60b63b xen/x86: remove foreign mappings from the p2m on teardown
    0291089f6e xen: enable altp2m at create domain domctl
    8ef1e96a04 xen/x86: account number of foreign mappings in the p2m
    0840bc5ea1 xen: Introduce CONFIG_SELF_TESTS
    2bc462f645 x86: address violations of MISRA C Rule 8.4
    19b6e9f914 x86/MCE: optional build of AMD/Intel MCE code
    5effd810c6 x86/MCE: add default switch case in init_nonfatal_mce_checker()
    498a4ded74 x86/intel: move vmce_has_lmce() routine to header
    d27c2835e0 x86/svm: Rework VMCB_ACCESSORS() to use a plain type name
    58b3437bae xen/x86: Address two misc MISRA 17.7 violations
    2d082710f7 xen/x86: Drop useless non-Kconfig CONFIG_* variables
    56d3b24979 xen/lzo: Implement COPY{4,8} using memcpy()
    2d93f78bfe x86/traps: address violation of MISRA C Rule 8.4
    8b977fe572 CHANGELOG: Mention libxl blktap/tapback support
    96af090e33 automation/eclair_analysis: avoid an ECLAIR warning about escaping
    841f437a8b docs/misra: exclude gdbsx from MISRA compliance
    1eba1fe18d automation/eclair_analysis: add already clean rules to the analysis
    4bc8dc01a3 automation/eclair_analysis: set MISRA C Rule 10.2 as clean
    ac572152e5 docs: Add device tree overlay documentation
    2c4fbadf73 tools: Introduce the "xl dt-overlay attach" command
    4c733873b5 xen/arm: Add XEN_DOMCTL_dt_overlay and device attachment to domains
    1c77496bc8 xen/arm/gic: Allow adding interrupt to running VMs
    6f588194d9 tools/arm: Introduce the "nr_spis" xl config entry
    1d2b4f3049 xen/arm, doc: Add a DT property to specify IOMMU for Dom0less domUs
    c8cbc5eb1c tools/xl: Correct the help information and exit code of the dt-overlay command
    2172a01c4c tools/xenalyze: Ignore HVM_EMUL events harder
    320e644616 x86/hvm/trace: Use a different trace type for AMD processors
    701190abb3 xen/arm: Set correct per-cpu cpu_core_mask
    2a40b106e9 tools/xentrace: Remove xentrace_format
    ae26101f6b tools: Drop libsystemd as a dependency
    caf8644826 tools/{c,o}xenstored: Don't link against libsystemd
    78510f3a15 tools: Import stand-alone sd_notify() implementation from systemd
    219cdff3fb LICENSES: Add MIT-0 (MIT No Attribution)
    9e58da32cc xen/arm: mem_access: Conditionally compile mem_access.c
    d6a7fd8303 vpci: add initial support for virtual PCI bus topology
    9c831e429c vpci/header: emulate PCI_COMMAND register for guests
    7db7bd0f31 arm/vpci: honor access size when returning an error
    2c15fa332e x86: detect PIT aliasing on ports other than 0x4[0-3]
    249affc129 x86/PIT: supply and use #define-s
    e6ed98863b xen/riscv: add required things to current.h
    3cd46d4ec8 xen/riscv: introduce atomic.h
    51dabd6312 xen/riscv: introduce cmpxchg.h
    9f482c6a7e xen/x86: Simplify header dependencies in x86/hvm
    212cb5effa iommu/x86: print RMRR/IVMD ranges using full addresses
    3a3111d018 xen/livepatch: make .livepatch.funcs read-only for in-tree tests
    ced21fbb28 x86_64/cpu_idle: address violations of MISRA C Rule 20.7
    1b0b050bd6 x86_64/uaccess: address violations of MISRA C Rule 20.7
    670b7ec65d x86/hvm: address violations of MISRA C Rule 20.7
    1b9311da4b x86/vpmu: address violations of MISRA C Rule 20.7
    bba4eb88fd xen/common/dt-overlay: Fix lock issue when add/remove the device
    24dbf5bd03 x86/p2m: Add braces for better code clarity
    ed1ac3e968 xen/riscv: introduce vm_event_*() functions
    7e036f7e0c xen/riscv: introduce monitor.h
    44b69e9c17 xen/x86: pretty print interrupt CPU affinity masks
    9c5444b01a xen/trace: Drop old trace API
    aa60520cd3 xen/trace: Removal final {__,}trace_var() users in favour of the new API
    26da08059e xen: Switch to new TRACE() API
    d64693df1a xen/sched: Clean up trace handling
    df50666449 xen/rt: Clean up trace handling
    ab8bc19850 xen/credit2: Clean up trace handling
    e978b462ec xen/trace: Introduce new API
    26b122e3bf tools/xen-cpuid: Drop old names
    bbb5c171d7 tools/xen-cpuid: Use automatically generated feature names
    e96fefdb06 tools/xen-cpuid: Rename decodes[] to leaf_info[]
    f79189cb29 x86/gen-cpuid: Minor cleanup
    54aa34fc89 tools/golang: Add missing golang bindings for vlan
    594b22ca5b x86/msi: prevent watchdog triggering when dumping MSI state
    21611c6870 include/ctype.h: fix MISRA R10.2 violation
    53dc37829c xen/arm: Add DT reserve map regions to bootinfo.reserved_mem
    d946787a27 xen/arm64: lib: Use the generic xen/linkage.h macros
    fe1b97d321 xen/arm64: cache: Use the generic xen/linkage.h macros
    c9906bd79e xen/arm64: mmu/head: Add missing code symbol annotations
    8151fe503c xen/arm64: bpi: Add missing code symbol annotations
    fdba3ff11f xen/arm64: debug: Add missing code symbol annotations
    fba250ae60 xen/arm64: head: Add missing code symbol annotations
    78ce1dc625 xen/arm64: sve: Add missing code symbol annotations
    8d92a26a41 xen/arm64: smc: Add missing code symbol annotations
    1125f3529c xen/arm64: entry: Add missing code symbol annotations
    977d98e67c x86/ucode: Further fixes to identify "ucode already up to date"
    ae7584f636 x86/p2m: move altp2m-related code to separate file
    f1fa994d89 x86/MCE: guard {intel/amd}_mcheck_init() calls
    71b5eccbdd x86/MCE: guard access to Intel/AMD-specific MCA MSRs
    a3ec23a940 x86/vpmu: separate amd/intel vPMU code
    6628bacc81 xen/bitops: put __ffs() into linux compatible header
    d0c6114058 x86: detect PIC aliasing on ports other than 0x[2A][01]
    c09960a1a2 x86: allow to suppress port-alias probing
    762a848223 automation/eclair_analysis: deviate macro count_args_ for MISRA Rule 20.7
    7fe9679db9 automation/eclair_analysis: fully deviate MISRA C Rules 21.9 and 21.10
    abd00b037d x86/mtrr: avoid system wide rendezvous when setting AP MTRRs
    0cc01c603f tools/xl: add vlan keyword to vif option
    3bc14e4fa4 tools/libs/light: Add vlan field to libxl_device_nic
    e27fc7d15e tools/xentop: Fix cpu% sort order
    9b7d793889 tools/hvmloader: Further simplify SMP setup
    8a78d89881 x86/cpufreq: Rename cpuid variable/parameters to cpu
    7270fdc7a0 x86: respect mapcache_domain_init() failing
    d104a07524 xen/sched: set all sched_resource data inside locked region for new cpu
    319a5125ca xen/console: fix Rule 10.2 violation
    46aa3031ae docs/misra: add R21.6 R21.9 R21.10 R21.14 R21.15 R21.16
    9110072b76 x86/io: Don't cast away constness in read{b..q}()
    2d8d7481ca Revert "evtchn: refuse EVTCHNOP_status for Xen-bound event channels"
    90a1bc9e82 xen: Use -Wuninitialized and -Winit-self
    0b01395c44 xen: Use -Wflex-array-member-not-at-end when available
    d31d0665f1 automation/eclair_analysis: tag MISRA C Rule 1.1 as clean
    531d3bea5e libxl: Fix handling XenStore errors in device creation
    b2cd07a044 x86/hvm: Allow access to registers on the same page as MSI-X table
    e9607d4061 x86/msi: Extend per-domain/device warning mechanism
    5cc7347b04 libxl: fix population of the online vCPU bitmap for PVH
    996576b965 xen: allow up to 16383 cpus
    b0082b9083 automation/eclair: hide reports coming from adopted code in scheduled analysis
    f4cd14e502 automation/eclair_analysis: amend configuration for some MISRA rules
    93c27d54dd xen/arm: Fix MISRA regression on R1.1, flexible array member not at the end
    1672df9ebd xen/kernel.h: Import __struct_group from Linux
    53959cb830 x86/boot: Refactor pvh_load_kernel() to have an initrd_len local
    49c810e867 x86/boot: Explain how moving mod[0] works
    fcefb2a247 x86/IOMMU: address violations of MISRA C:2012 Rule 14.4
    3d1033c911 automation/eclair: add deviation of MISRA C:2012 Rule 14.4
    14424d90e1 xen/pci: address violations of MISRA C Rule 20.7
    8e22c78e17 xen/unaligned: address violation of MISRA C Rule 20.7
    1dd6b50dc4 x86/hvm: Defer the size calculation in hvm_save_cpu_xsave_states()
    752ec9a9b1 tools/hvmloader: Wake APs with hypercalls rather than INIT+SIPI+SIPI
    754a29cacf tools/hvmloader: Move various helpers to being static inlines
    1c6112b8f5 xen/gunzip: Move crc state into gunzip_state
    7a4483358f xen/gunzip: Move bitbuffer into gunzip_state
    d386a383dd xen/gunzip: Move output count into gunzip_state
    fd273a5690 xen/gunzip: Move input buffer handling into gunzip_state
    461eacc76b xen/gunzip: Move window position into gunzip_state
    02e32883f3 xen/gunzip: Introduce struct gunzip_state and refactor window
    473156eec6 xen/gunzip: don't leak memory on error paths
    648db37a15 x86/ucode: Distinguish "ucode already up to date"
    3c228e24b2 automation/eclair_analysis: unblock pipelines from certain repositories
    0c79b7bc9b automation/eclair_analysis: tag MISRA C Rule 8.2 as clean.
    e8e8afee99 svm: Fix MISRA 8.2 violation
    a2330b51df x86/cpu-policy: Fix migration from Ice Lake to Cascade Lake
    f4f2f3402b tools/libxs: Open /dev/xen/xenbus fds as O_CLOEXEC
    ebab808eb1 x86/platform: correct #undef in compat checking
    d7032b4ca2 AMD/IOMMU: add helper to check whether ATS is to be used for a device
    b5996ab284 VT-d: parse ACPI "SoC Integrated Address Translation Cache Reporting Structure"s
    426dbf404e VT-d: tidy error handling of RMRR parsing
    692f6199bd automation/eclair: add deviation for Rule 16.4
    50a4f7c177 docs/misra: add Terms & Definitions section to rules.rst
    6654248f22 ppc/riscv: fix arch_acquire_resource_check()
    b801ccfe7e drivers/char: address violation of MISRA C Rule 20.7
    04e31583ba VT-d: correct ATS checking for root complex integrated devices
    f95cd010cb xen/Kconfig: Drop the final remnants of ---help---
    2d4ba20559 tools/tests: let test-xenstore exit with non-0 status in case of error
    642005e310 tools/tests: don't let test-xenstore write nodes exceeding default size
    feb9158a62 automation/eclair: make explicit there are no adopted files by default
    7556f46a9b automation: do not allow failure for triggered analyses
    c1aa6fb5f6 automation/eclair: tag Rule 7.2 as clean and temporarily remove Rules 1.1 and 8.2
    9e30bd8f4a x86/cpu-policy: Annotate the accumulated features
    b819bd65f4 revert "x86/mm: re-implement get_page_light() using an atomic increment"
    bf0059282d xen/riscv: improve check-extension() macro
    08e79bba73 xen/x86: Fix Syntax warning in gen-cpuid.py
    647f7e50eb xen/xsm: Wire up get_dom0_console
    abc68e78a3 x86/MCE: guard call to Intel-specific intel_get_extended_msrs()
    64b21662b1 x86/msi: passthrough all MSI-X vector ctrl writes to device model
    be5b08dd6e xen-livepatch: fix --force option comparison
    13893a58e2 xen/spinlock: use correct pointer
    a505890d81 x86/entry: shrink insn size for some of our EFLAGS manipulation
    fd4ff921f7 gzip: clean up comments and fix code alignment
    232ee07c23 arm/vpci: make prefetchable mem 64 bit
    a0e29b3163 CI: Drop glibc-i386 from the build containers
    4edbbcd0c0 automation/eclair: reorganize pipelines
    23cd1207e7 VMX: no open-coding in vmx_get_cpl()
    7ea3a3e44f MAINTAINERS: Update my email address
    656ae8f109 x86/spec: adjust logic that elides lfence
    049ab0b2c9 x86/spec: fix reporting of BHB clearing usage from guest entry points
    6d5111b10e tools/ocaml: Fix warnings in config.ml
    524eee7ce0 x86/hap: Refactor boolean field assignments
    bd5213384b x86/shadow: correct shadow_vcpu_init()'s comment
    9a73b4e210 x86/paging: vCPU host mode is always set
    8c01d0e336 x86/msr: add suffix 'U' to MSR_AMD_CSTATE_CFG macro
    ea3272f845 x86/pci: add suffix 'U' to PCI_CONF_ADDRESS macro
    62a72092a5 livepatch: introduce --force option
    fb2716a191 xen-livepatch: fix parameter name parsing
    4a75f2ffc0 x86/mm: address violations of MISRA C Rule 20.7
    445f66fe00 x86/debugreg: address violation of MISRA C Rule 20.7
    c717d52a5d x86/vhpet: address violations of MISRA C Rule 20.7
    4f900035a4 x86/acpi: address violations of MISRA Rule 20.7
    0440fcad2a x86/pci: address violation of MISRA C Rule 20.7
    489d13da93 xen/spinlock: address violations of MISRA C Rule 20.7
    0d02b75d7c xen/page-defs: address violation of MISRA C Rule 20.7
    8189230d80 libelf: address violations of MISRA C Rule 20.7
    d7c4d59b51 libxl: Support blktap with HVM device model
    76a484193d hotplug: Update block-tap
    31d6b5b4a7 automation: Add arm64 test for running Xen with GICv3
    db49973411 automation: Add arm{64,32} earlyprintk jobs
    c05b97fc7a automation: Drop some of the non-debug variants of the same Arm jobs
    7846f7699f xen/arm: List static shared memory regions as /memory nodes
    51a2b3f109 xen/arm: fix duplicate /reserved-memory node in Dom0
    a0fee882c1 xen/arm: remove shm holes from extended regions
    2b557af192 xen/arm: Reduce struct membank size on static shared memory
    e5816ad4e8 xen/arm: Introduce helper for static memory pages
    9f657d8832 xen/arm: Avoid code duplication in check_reserved_regions_overlap
    b3e66aa1c2 xen/arm: Avoid code duplication in find_unallocated_memory
    e13499b3c4 xen/arm: Conditional compilation of kernel_info.shm_mem member
    2209c1e35b xen/arm: Introduce a generic way to access memory bank structures
    8d5ff14477 xen/arm: Pass struct kernel_info parameter to make_{resv,shm}_memory_node
    6d14a742f8 xen/arm: avoid repetitive checking in process_shm_node
    ab327c8e8b xen/arm: remove stale addr_cells/size_cells in assign_shared_memory
    6c04a0bf2c tools/golang: Run `go vet` as part of the build process
    9c08a88ad0 golang/xenlight: Ensure comments aren't interpreted as docstrings
    27c176d298 tools/golang: When returning pointers, actually allocate structrues
    0d19d3aab0 svm/nestedsvm: Introduce nested capabilities bit
    410ef33439 x86/monitor: allow fast-singlestepping without enabling singlestep monitor
    77e25f0e30 x86/MTRR: correct inadvertently inverted WC check
    f82c43a384 xen: introduce header file with section related symbols
    70d46b51e2 docs/man: Add xenwatchdog manual page
    9c872b5766 tools/misc: Add xenwatchdogd.c copyright notice
    e906bfae48 tools/misc: xenwatchdogd enhancements
    f0fa75c9ea tools/misc: xenwatchdogd: add parse_secs()
    43a0706986 x86/rtc: Avoid UIP flag being set for longer than expected
    cccb7878f3 x86/pvh: zero VGA information
    c3b40c95da x86/video: add boot_video_info offset generation to asm-offsets
    93d6e6efa8 automation/eclair_analysis: substitute deprecated service STD.emptrecd
    bc5827fad1 xen/riscv: check whether the assembler has Zbb extension support
    1fc166d6cd xen/domain: deviate MISRA C Rule 16.2 violation
    480179bc26 x86/PVH: Use unsigned int for dom0 e820 index
    09cb855f33 x86/svm: Add flushbyasid in the supported features
    5495ed0cd2 eclair_analysis: deviate x86 emulator for Rule 16.2
    1d2d283818 xen/riscv: add minimal stuff to page.h to build full Xen
    58798e3f1f xen/riscv: introduce io.h
    5b33845adf xen/ppc: mm-radix: Replace debug printing code with printk
    78d980071a x86/MCE: move intel mcheck init code to separate file
    8763eb782b xen/gzip: Drop huffman code table tracking
    052cf1dcdf xen/gzip: Remove custom memory allocator
    492fe0778b xen/gzip: Drop unused define checks
    489a46c177 x86/emul: Simplify segment override prefix decoding
    4cd66fb56d xen/efi: Rewrite DOS/PE magic checking without memcmp()
    02fbb2d591 docs/misra: mark the gzip folder as adopted code
    2a9a19be13 Revert "public: s/int/int32_t"
    83e081b29e docs: arm: Update where Xen should be loaded in memory
    afab29d088 public: s/int/int32_t
    ad363fb17d docs/misra: add Rule 16.4
    487838f13a docs/misra/rules.rst: add rule 5.5
    c0f890cd9d docs/hypercall-abi: State that the hypercall page is optional
    cfb922bb7d xen/gzip: Colocate gunzip code files
    af4cd0a6a6 altcall: fix __alt_call_maybe_initdata so it's safe for livepatch
    09abf1b61b libxl: devd: Spawn QEMU for 9pfs
    3c7482b73c libxl: Use vkb=[] for HVMs
    2b31a1f055 xen/include: move definition of ASM_INT() to xen/linkage.h
    6cb501e3e6 MAINTAINERS: Update livepatch maintainers
    86c008aa5d tools/misc: xenwatchdogd: add static qualifier
    5d09f8cbdc tools/misc: rework xenwatchdogd signal handling
    0668d35594 tools/misc: xenwatchdogd: use EXIT_* constants
    c304bdf1e7 xen/acpi: Allow xen/acpi.h to be included on non-ACPI archs
    2145512e21 xen/xsm: address violation of MISRA C Rule 16.2
    bbbbd024e8 x86/hvm: address violations of MISRA C Rule 16.2
    eeab8c4619 xen/domctl: address violations of MISRA C Rule 16.2
    f509d39d5b x86/efi: tidy switch statement and address MISRA violation
    24f204748e x86/irq: tidy switch statement and address MISRA violation
    3b51a812e0 x86/cpuid: address violation of MISRA C Rule 16.2
    6af626c1da x86/vlapic: tidy switch statement and address MISRA violation
    478002370c x86/emul: Adjust X86EMUL_OPC_EXT_MASK to placate MISRA
    761358b9eb xen/spinlock: Adjust LOCK_DEBUG_INITVAL to placate MISRA
    e5b93b70d5 xen/vPCI: Remove shadowed variable
    52bde26c1c xen/nospec: Remove unreachable code
    d0a718a45f x86/hvm: Fix Misra Rule 19.1 regression
    d37c184236 xen/virtual-region: Drop setup_virtual_regions()
    038ba305fd xen/virtual-region: Link the list build time
    3434518d05 xen/virtual-region: Rework how bugframe linkage works
    337f11ea73 xen/link: Introduce a common BUGFRAMES definition
    0e7ea8ca5f x86/Kconfig: Introduce CONFIG_{AMD,INTEL} and conditionalise ucode
    2eea952b70 x86/ucode: Move vendor specifics back out of early_microcode_init()
    f48299cad5 docs/misra: document the expected sizes of integer types
    dfc9455b80 MAINTAINERS: Become a reviewer of iMX8Q{M,XP} related patches
    2f85a6d9f5 xen/drivers: imx-lpuart: Replace iMX8QM compatible with iMX8QXP
    71d4356544 xen/arm: Add imx8q{m,x} platform glue
    a9fa825008 x86/entry: Fix build with older toolchains
    d5887c0dec x86/spec-ctrl: Support the "long" BHB loop sequence
    689ad48ce9 x86/spec-ctrl: Wire up the Native-BHI software sequences
    954c983abc x86/spec-ctrl: Software BHB-clearing sequences
    62a1106415 x86/spec-ctrl: Support BHI_DIS_S in order to mitigate BHI
    c94e210592 x86/tsx: Expose RTM_ALWAYS_ABORT to guests
    0b66d7ce3c x86: Drop INDIRECT_JMP
    8e186f98ce x86: Use indirect calls in reset-stack infrastructure
    45dac88e78 x86/spec-ctrl: Widen the {xen,last,default}_spec_ctrl fields
    97c5b8b657 x86/vmx: Add support for virtualize SPEC_CTRL
    40dea83b75 x86/spec-ctrl: Detail the safety properties in SPEC_CTRL_ENTRY_*
    2378d16a93 x86/spec-ctrl: Simplify DO_COND_IBPB
    9607aeb660 x86/spec_ctrl: Hold SCF in %ebx across SPEC_CTRL_ENTRY_{PV,INTR}
    22390697bf x86/entry: Arrange for %r14 to be STACK_END across SPEC_CTRL_ENTRY_FROM_PV
    94896de1a9 x86/spec-ctrl: Rework conditional safety for SPEC_CTRL_ENTRY_*
    c62673c433 x86/spec-ctrl: Rename spec_ctrl_flags to scf
    489d93cd0f x86/spec-ctrl: Fix BTC/SRSO mitigations
    4b3da946ad x86/cpuid: Don't expose {IPRED,RRSBA,BHI}_CTRL to PV guests
    4be1fef1e6 x86/alternatives: fix .init section reference in _apply_alternatives()
    9926e692c4 hypercall_xlat_continuation: Replace BUG_ON with domain_crash
    6a98383b08 x86/HVM: clear upper halves of GPRs upon entry from 32-bit code
    672b26b66e drivers: char: Enable OMAP UART driver for TI K3 devices
    c079823df6 xen/compiler: address violation of MISRA C Rule 20.9
    dfc9fab003 x86/PVH: Support relocatable dom0 kernels
    4d3b8669d8 libelf: Store maximum PHDR p_align
    77b219f915 xen/rwlock: raise the number of possible cpus
    c286bb93d2 xen/spinlock: support higher number of cpus
    0b09531d21 xen/spinlock: let all is_locked and trylock variants return bool
    bfbec024b8 xen/spinlock: split recursive spinlocks from normal ones
    31be78285c xen/spinlock: add missing rspin_is_locked() and rspin_barrier()
    ee1e133125 xen/spinlock: add another function level
    3696a9f27d xen/spinlock: add explicit non-recursive locking functions
    402c2d3e66 MISRA C Rule 17.1 states: "The features of `<stdarg.h>' shall not be used"
    ea33a6e1e3 MISRA C:2012 Rule 17.1 states: The features of `<stdarg.h>' shall not be used
    80d28865e1 automation/eclair: add deviations for Rule 20.7
    6bdb67d19e arm/public: address violations of MISRA C Rule 20.7
    e9b0f8b690 x86: Address MISRA Rule 13.6
    b33f191e3c x86/tsx: Cope with RTM_ALWAYS_ABORT vs RTM mismatch
    270588b9b2 char: lpuart: Drop useless variables from UART structure
    4932163b35 drivers: char: Drop useless suspend/resume stubs in Arm drivers
    6eeb3e86bd vsprintf: address violations of MISRA C:2012 Rule 16.3
    226bdb155b xen/sched: address violations of MISRA C:2012 Rule 16.3
    21e0c8fc0e tools: Move MB/GB() to common-macros.h
    4c41749852 tools/init-xenstore-domain: Replace variable MB() usage
    1e6cd4155d xen/riscv: introduce extension support check by compiler
    7b02b505bb automation: introduce fixed randconfig for RISC-V
    6117179dd9 docs/misra: add 13.6 to rules.rst
    538ab07bad xen/arm: ffa: support FFA_FEATURES
    be75f686eb xen/arm: ffa: separate rxtx buffer routines
    bded3e6467 xen/arm: ffa: separate partition info get routines
    8836867200 xen/arm: ffa: separate memory sharing routines
    bb584ec036 xen/arm: ffa: move common things to ffa_private.h
    b21cbaf6ba xen/arm: ffa: rename functions to use ffa_ prefix
    ac682fbac1 xen/vm-event: address a violation of MISRA C:2012 Rule 16.3
    cde0c58714 xen/evtchn: address a violation of MISRA C:2012 Rule 16.3
    163ea7d9a8 console: address a violation of MISRA C:2012 Rule 16.3
    2c205ce5c0 xen/domctl: address a violation of MISRA C:2012 Rule 16.3
    795c4e367b x86/amd: address violations of MISRA C Rule 20.7
    da88f434bc xen/mm: address violations of MISRA C Rule 20.7
    5811fb4816 x86/hvm: address violations of MISRA C Rule 20.7
    a9b2a72926 x86/vPMU: address violations of MISRA C Rule 20.7
    dd5101a616 drivers/char: mark extra reserved device memory in memory map
    7a09966e7b x86/spec-ctrl: Move __read_mostly data into __ro_after_init
    3c9e76cd87 x86/mm: Refine address alignment checks in modify_xen_mappings_lite()
    8f85af65af tools/oxenstored: Re-format
    0cd50753eb nestedsvm: Disable TscRateMSR
    4f8b0e94d7 x86: Move SVM features exposed to guest into hvm_max_cpu_policy
    e3883336bb xen/efi: efibind: address violations of MISRA C Rule 20.7
    853c71dfbf xen/elfnote: Specify ELF Notes are x86-specific
    7d8c9b4e8d libelf: Expand ELF note printing
    8802230bfa Revert "xen/x86: bzImage parse kernel_alignment"
    f6a4139948 x86/public: address violations of MISRA C Rule 20.7
    a65d9988ad x86/hvm: address violations of Rule 20.7
    e2eeb1b753 xen/page_alloc: address violations of MISRA C Rule 20.7
    cab6de6a95 xen: address MISRA C Rule 20.7 violation in generated hypercall
    7757981d94 xentrace: address violation of MISRA C Rule 20.7
    12a3b90c2a xen/list: address violations of MISRA C Rule 20.7
    6f6de10ade xen/xsm: add parentheses to comply with MISRA C Rule 20.7
    4b60085b6e xen/console: add comment about external console lock helper
    03e484a4f6 x86/vcpu: relax VCPUOP_initialise restriction for non-PV vCPUs
    d654612e98 xen/riscv: add minimal stuff to processor.h to build full Xen
    5095b610df EFI: Introduce inline stub for efi_enabled on !X86 && !ARM
    cbe393b709 Revert "xen/page_alloc: introduce preserved page flags macro"
    ee973396f0 x86/cpuid: More AMD features
    5205bda5f1 x86/p2m: Coding style cleanup
    97b90f9bf2 xen/ppc: Ensure ELF sections' physical load addresses start at 0x0
    10e8d824b7 AMD/IOMMU: drop remaining guest-IOMMU bits too
    cc950c49ae x86/PoD: tie together P2M update and increment of entry count
    f5c2b6da26 xen/page_alloc: introduce page flag to stop buddy merging
    75214d5e53 xen/page_alloc: introduce preserved page flags macro
    6eb13b6b1d tools/xl_parse: remove message for tsc mode string
    eaafbd1134 docs/parse-support-md: Handle BulletList
    188fa82305 xen/vpci: Improve code generation in mask_write()
    131892e0dc x86/boot: Support the watchdog on newer AMD systems
    f658321374 x86/boot: Fix setup_apic_nmi_watchdog() to fail more cleanly
    9e18f33983 x86/boot: Improve the boot watchdog determination of stuck cpus
    d2276b86e5 xen/nospec: Include <xen/stdbool.h>
    d9e709e8c0 xen/wait: address violations of MISRA C Rule 20.7
    239b72d874 xen/notifier: address violations of MISRA C Rule 20.7
    88822d5fbd xen/arm: smmu: address violations of MISRA C Rule 20.7
    8e7207d512 EFI: address violations of MISRA C Rule 20.7
    b51d7f39dc xen/device_tree: address violations of MISRA C Rule 20.7
    9979cc594a x86/cpufeature: add parentheses to comply with Rule 20.7
    a02174c6c8 amd/iommu: clean up unused guest iommu related functions
    b053075d1a xen/spinlock: make struct lock_profile rspinlock_t aware
    cc3e8df542 xen/spinlock: add rspin_[un]lock_irq[save|restore]()
    c9aca2a1f6 xen/spinlock: rename recursive lock functions
    475080b6b2 xen/spinlock: introduce new type for recursive spinlocks
    a97de92e76 IOMMU: store name for extra reserved device memory
    62018f0870 x86/mm: use block_lock_speculation() in _mm_write_lock()
    d92a67b60c xen/sched: address violations of MISRA C Rule 20.7
    f93d8dd519 automation/eclair: allow parameter name "unused"
    a5b90a90ee MAINTAINERS: remove myself from various positions
    ad52857efc MAINTAINERS: drop AMD IOMMU and Intel VT-d sections
    8a8d5c22af perfc: add pseudo-keyword fallthrough
    53b5208de8 x86/svmdebug: Print np, sev and sev_es vmcb bits
    2f09f797ba x86/svm: Drop the suffix _guest from vmcb bit
    d638e304f1 SUPPORT.MD: Fix matrix generation after 43c416d0d819 and 77c39a53cf5b
    77c39a53cf xen/arm: arm32: Add emulation of Debug Data Transfer Registers
    43c416d0d8 xen/arm: arm64: Add emulation of Debug Data Transfer Registers
    bd06cf74fc xen/arm: Introduce CONFIG_PARTIAL_EMULATION and "partial-emulation" cmd option
    af7fed3fdf xen/spinlock: remove misra rule 21.1 violations
    68e008db0c xen: avoid grep fodder define and undef
    70e549fd44 MAINTAINERS: Remove myself from several subsystems
    a6081d0176 x86/svm: Drop the _enabled suffix from vmcb bits
    d2686bf964 xen/compiler: deviate the inline macro for MISRA C Rule 20.4
    3945b61ddb xen/lz4: address violations of MISRA C:2012 Directive 4.10
    ec2587ab4b x86/mtrr: address violations of MISRA C:2012 Directive 4.10
    13a7b0f9f7 restrict concept of pIRQ to x86
    4dc9a8b060 automation/eclair_analysis: deviate certain macros for Rule 20.12
    03cf7ca23e x86: protect conditional lock taking from speculative execution
    42a572a38e x86/mm: add speculation barriers to open coded locks
    197ecd838a locking: attempt to ensure lock wrappers are always inline
    f218daf6d3 percpu-rwlock: introduce support for blocking speculation into critical regions
    a1fb15f616 rwlock: introduce support for blocking speculation into critical regions
    7ef0084418 x86/spinlock: introduce support for blocking speculation into critical regions
    c4f427ec87 xen: Swap order of actions in the FREE*() macros
    fb5b6f6744 x86/spec-ctrl: Mitigation Register File Data Sampling
    1eb91a8a06 x86/spec-ctrl: VERW-handling adjustments
    f7603ca252 x86/spec-ctrl: Rename VERW related options
    0a666cf2cd x86/spec-ctrl: Perform VERW flushing later in exit paths
    475fa20b73 x86/vmx: Perform VERW flushing later in the VMExit path
    7c81558208 x86/mm: fix detection of last L1 entry in modify_xen_mappings_lite()
    1396892d80 xen/ppc: switch PPC to use asm-generic/device.h
    e90089db3f arm/smmu: address some violations of MISRA C Rule 20.7
    acb13d1b81 x86/irq: parenthesize negative constants
    22d0e3487f xen/arm: address some violations of MISRA C Rule 20.7
    d937b2d1ee xen/param: address violations of MISRA C Rule 20.7
    e51649b4c2 xen/include: address violations of MISRA C Rule 20.7
    9106769ea9 xen/spinlock: address violations of MISRA C Rule 20.7
    c44cac2290 xen/x86: bzImage parse kernel_alignment
    bf7a2eaede features.h: Replace hard tabs
    698c35184c xen/domain.h: Centrialize is_domain_direct_mapped()
    8395f275eb MAINTAINERS: drop AMD SVM and Intel VT-x sections
    8ef780a1cf xen/mem-access: ifdef inclusion of <asm/mem_access.h>
    136fff30b3 xen/asm-generic: introduce stub header monitor.h
    ef31ffbc3d automation/eclair: add deviation for MISRA C:2012 Rule 16.6
    90173fc5a2 tools/9pfsd: Fix build error caused by strerror_r
    b52c45b1bd MAINTAINERS: add an entry for tools/9pfsd
    b083b1c393 x86/livepatch: Relax permissions on rodata too
    ef969144a4 xen/virtual-region: Include rodata pointers
    989556c6f8 xen/virtual-region: Rename the start/end fields
    08bb338f09 SUPPORT.md: add xen-9pfsd
    49b664f5bf x86/asm: add commas to further macros definitions/invocations
    4ad4df0964 CHANGELOG: add an entry for 9pfsd
    9249a441c9 x86/asm: add commas to BUILD_BUG_ON
    5daf46b439 Kbuild: simplify as-insn a little
    2f7481d592 x86/EFI: correct compiler probing
    66c8e9b76c tools/xentop: Add VBD3 support to xentop
    f4900d6d69 9pfsd: allow building with old glibc
    e14fece7d4 xen/{RISCV,PPC}/xen.lds: Delete duplicate _erodata definitions
    cd53ee9c41 SUPPORT.md: clarify support of booting 32-bit Xen on ARMv8
    e7b62fcfd9 x86: i387.c cleanup
    57acad12a0 hvmloader/PCI: skip huge BARs in certain calculations
    91ed573391 xen/riscv: introduces acquire, release and full barriers
    cfbcfce494 Argo: don't obtain excess page references
    fc84b4a5a3 xen/tasklet: address violations of MISRA C Rule 20.7
    47fdf9a79f xen/errno: address violations of MISRA C Rule 20.7
    771c4e3963 xen/arm: smmuv3: address violations of MISRA C Rule 20.7
    9174674c3b arch: move array_index_mask_nospec()
    2d514678a3 hvmloader: suppress GNU ld 2.39 warning about RWX load segments
    856664f774 docs/misra/rules.rst: add rule 14.4
    c40bc0576d x86/mm: re-implement get_page_light() using an atomic increment
    de17162caf x86/cpu-policy: Allow for levelling of VERW side effects
    0263dc9069 tests/resource: Fix HVM guest in !SHADOW builds
    e2d8a65225 x86/cpu-policy: Fix visibility of HTT/CMP_LEGACY in max policies
    5420aa165d x86/cpu-policy: Hide x2APIC from PV guests
    efad36f1ba docs/misra/rules.rst: Fix entry for 20.12 rule
    4cac80e226 docs/misra/rules.rst: add rule 16.6 and 20.12
    e1de3a0536 automation/eclair: tag MISRA C:2012 Rule 8.2 as clean
    b87697fc1a automation/eclair: fully deviate MISRA C:2012 Rules 5.7 and 18.7
    635dd1120a pci: fix locking around vPCI removal in pci_remove_device()
    d388673d1b tools/xenstored: have a single do_control_memreport()
    8937d44628 tools/xenstored: support complete log capabilities in stubdom
    2a750fcf7d tools/xenstored: add helpers for filename handling
    0a999849c8 tools/xenstored: mount 9pfs device in stubdom
    254c6f787c stubdom: extend xenstore stubdom configs
    90c0b97e27 config: update Mini-OS commit
    7159164bee xen/riscv: introduce nospec.h
    c20850540a x86/altcall: always use a temporary parameter stashing variable
    c103bb8ad4 x86: remove redundant XEN_SHSTK check from reinit_bsp_stack()
    b36d850c22 docs: Move function and macro properties in docs/misra
    6d05d52940 x86/memsharing: use an atomic add instead of a cmpxchg loop
    d4f3d35f04 libxl: Fix segfault in device_model_spawn_outcome
    54fd7b9974 xen/livepatch: group and document payload hooks
    e579677095 xen/livepatch: properly build the noapply and norevert tests
    cdae267ce1 xen/livepatch: fix norevert test attempt to open-code revert
    d2daa40fb3 xen/livepatch: search for symbols in all loaded payloads
    a57b4074ab xen/livepatch: register livepatch regions when loaded
    195e75371b x86: Resync intel-family.h from Linux
    b2b3d40f9a xen/arm: Fix arm32 build failure when early printk is enabled
    ba0d1a7ced xen/lib: introduce generic find next bit operations
    801c4e7262 tests/vpci: fix unit tests after locking change
    576528a2a7 x86/spec: do not print thunk option selection if not built-in
    8441fa806a x86/spec: fix INDIRECT_THUNK option to only be set when build-enabled
    6e9507f7d5 x86/spec: print the built-in SPECULATIVE_HARDEN_* options
    52ebde3cfa vpci/header: program p2m with guest BAR view
    622bdd9628 vpci/header: handle p2m range sets per BAR
    99eeb2eb0b rangeset: add rangeset_purge() function
    fe62abfcb2 rangeset: add RANGESETF_no_print flag
    8c5bca7074 vpci/header: implement guest BAR register handlers
    e262826159 vpci/header: rework exit path in init_header()
    f20dde9259 vpci: add hooks for PCI device assign/de-assign
    80b0eb095a vpci: restrict unhandled read/write operations for guests
    4f78438b45 vpci: use per-domain PCI lock to protect vpci structure
    cfe3ad6712 x86: re-run exception-from-stub recovery selftests with CET-SS enabled
    91f5f7a915 x86: account for shadow stack in exception-from-stub recovery
    28154a245c x86: document how stub exception recovery works
    7356bb5e47 xen/arm: ffa: reclaim shared memory on guest destroy
    ca7c872c70 xen: introduce Kconfig function alignment option
    84b9617c03 xen/ppc: address violations of MISRA C:2012 Rule 11.8
    150e7a4e79 automation: remove bin86/dev86 from tumbleweed image
    37541208f1 x86/entry: Introduce EFRAME_* constants
    0603a0c092 x86/entry: Simplify expressions in compat_restore_all_guest()
    7d3c91377d x86/entry: Adjustments to "reduce assembly code size of entry points"
    6f1b280876 docs/sphinx: Start an FAQ, and add Kconfig/CET details
    03fb5f503c nestedsvm: Remove bogus debug message from nestedsvm_check_intercepts
    2beef32b42 xen/hvm: Move other hvm_function_table booleans into the caps bitfield
    42b8e78b37 svm: Improve type of cpu_has_svm_feature
    5cd5e3070b xen/hvm: Convert hap_capabilities into a bitfield
    60e00f77a5 x86/spec: fix BRANCH_HARDEN option to only be set when build-enabled
    21051291ad automation: Rework "build-each-commit-gcc" test
    56a9641359 x86: Dom0 "broken ELF" reporting adjustments
    164daecb18 x86/HVM: limit upcall vector related verbosity
    8de3afc0b4 xen: move BUG_ON(), WARN_ON(), ASSERT(), ASSERT_UNREACHABLE() to xen/bug.h
    2ce562b2a4 x86/altcall: use a union as register type for function parameters on clang
    ef101f5251 xen/cmdline: fix printf format specifier in no_config_param()
    001d7fdb55 xen/consoled: drop return value from consoled_guest_rx/tx
    f49fb70d3d x86/hpet: use an atomic add instead of a cmpxchg loop
    f0622dd4fd xen/livepatch: fix norevert test hook setup typo
    92babc88f6 Revert stubdom+xenstore 9pfs changes
    f5e1c527d0 tools/xenstored: have a single do_control_memreport()
    a76f8809f1 tools/xenstored: support complete log capabilities in stubdom
    93892648ff tools/xenstored: add helpers for filename handling
    297a2587e6 tools/xenstored: mount 9pfs device in stubdom
    e21d9dbf44 tools: add 9pfs device to xenstore-stubdom
    0b761781c4 stubdom: extend xenstore stubdom configs
    4287a71f9b tools/xl: support new 9pfs backend xen_9pfsd
    ab5a6b5986 tools/libs/light: add backend type for 9pfs PV devices
    098d868e52 tools/oxenstored: Make Quota.t pure
    b6cf604207 tools/oxenstored: Use Map instead of Hashtbl for quotas
    7e5b662b28 x86/altp2m: p2m_altp2m_get_or_propagate() should honor ap2m->default_access
    98e79be5b6 xen/*/asm-offset: Fix bad copy&paste from x86
    812bdc99f4 xen-analysis.py: Accept deviation comment at the end of the line
    d064b429b6 xen-analysis.py: Substitute only the comment instead of the line
    ddd6696fc6 xen-analysis.py: Use named group for tag regex
    8c5e4ce145 consolidate do_bug_frame() / bug_fn_t
    f75b051f78 x86/APIC: drop regs parameter from direct vector handler functions
    4da40a267a IRQ: drop regs parameter from handler functions
    b31e753fe7 serial: drop serial_[rt]x_interrupt()'s regs parameter
    e1e0579afa PV-shim: drop pv_console_rx()'s regs parameter
    4f09e51027 serial: drop serial_rx_fn's regs parameter
    feb338d843 keyhandler: drop regs parameter from handle_keyregs()
    ba3c8373cd serial: fake IRQ-regs context in poll handlers
    9ee7dc877b x86emul: make run32 test harness goal work again
    cb319824bf x86emul: add missing EVEX.R' checks
    54557ee9b4 x86/uaccess: add attribute noreturn to __{get,put}_user_bad()
    d34e5fa2e8 build: make sure build fails when running kconfig fails
    bb1619ed4f tools/9pfsd: add missing va_end() in fill_data()
    d9fe1d743f Constify some parameters
    512f88a92d xen/riscv: use some asm-generic headers
    a4a790f432 gnttab: fully ignore zero-size copy requests
    97883aa269 libxl: Disable relocating memory for qemu-xen in stubdomain too
    f8791d0fd3 xen/arm: Make hwdom vUART optional feature
    981f722efa xen/asm-generic: fold struct devarch into struct dev
    c0dd41e055 xen/arm: switch Arm to use asm-generic/device.h
    c2263735f5 xen/asm-generic: introduce generic device.h
    c144b9e324 x86: Reduce assembly code size of entry points
    1eb013ef97 libxl: Add "grant_usage" parameter for virtio disk devices
    f93629b18b build: Replace `which` with `command -v`
    4917b9a423 mm: add the __must_check attribute to {gfn,mfn,dfn}_add()
    0441c3acc7 xen/arm: fixmap: Rename the fixmap slots to follow the x86 convention
    78398afae1 tools/xen-9pfsd: add 9pfs read request support
    e93172d57d tools/xen-9pfsd: add 9pfs write request support
    01c569f3fc tools/xen-9pfsd: add 9pfs stat request support
    34449f8cf0 tools/xen-9pfsd: add 9pfs create request support
    052a3a7fd9 tools/xen-9pfsd: add 9pfs clunk request support
    7c0d5f3cac tools/xen-9pfsd: add 9pfs open request support
    9615e40f47 tools/xen-9pfsd: add 9pfs walk request support
    27815b5f8f tools/xen-9pfsd: add 9pfs attach request support
    bcec59cf7f tools/xen-9pfsd: add 9pfs version request support
    7809132b1a tools/xen-9pfsd: add 9pfs response generation support
    8219809423 tools/xen-9pfsd: add transport layer
    d43c72a785 tools/xen-9pfsd: connect to frontend
    c3e583b01b tools: add a new xen 9pfs daemon
    c4d6802d33 docs: add a best practices coding guide
    d9bfc2810e iommu/x86: fix IVMD/RMRR range checker loop increment
    d670c1a38b libxl: Fix comment for LIBXL_HAVE_VMTRACE_BUF_KB
    40da8a7e4b tools: add access macros for unaligned data
    03e08d44c8 tools/xentop: add option to display dom0 first
    d9d4c5a142 libxl: Allow Phy backend for CDROM devices
    4e41947bad libxl: Create empty file for Phy cdrom
    4f2c81d509 xen/riscv: define an address of frame table
    9bb281d328 Argo: drop meaningless mfn_valid() check
    b3bea912a7 docs/misra: add asm-offset.c to exclude-list
    a185f88e98 iommu/vt-d: switch to common RMRR checker
    e45801dea1 iommu/x86: introduce a generic IVMD/RMRR range validity helper
    e72f951df4 x86/HVM: tidy state on hvmemul_map_linear_addr()'s error path
    2fb516157f xen/riscv: introduce event.h
    a541ddadec xen/riscv: introduce time.h
    af46249ad8 xen/riscv: introduce regs.h
    4988704e00 xen/riscv: introduce p2m.h
    6cb8ced1e8 xen/riscv: introduce irq.h
    ebb64781dd xen/riscv: introduce smp.h
    05ff18b4f0 xen/riscv: introduce flushtlb.h
    392c0c871d xen/riscv: introduce setup.h
    f9f339d33f xen: avoid generation of empty asm/iommu.h
    2c162e2f69 xen/riscv: introduce guest_atomics.h
    d42ebc95e2 xen/riscv: introduce cpufeature.h
    4c13f9c3fc xen: add support in public/hvm/save.h for PPC and RISC-V
    6d7d8d2b3e libxl: Add support for blktap vbd3
    cbbca7be4a x86/p2m: make p2m_get_page_from_gfn() handle grant case correctly
    772380f754 eclair: remove wrongly added -eval_file
    897def94b5 x86/hvm: Fix fast singlestep state persistence
    a773adedbd x86/PV32: restore PAE-extended-CR3 logic
    4e5bd87d24 config: update Mini-OS commit
    06024b2619 xen/serial: Drop serial_{put,get}c
    e36c106b0b tools/ocaml: Add missing vmtrace_buf_kb field
    837e5144ac x86: convert misc assembly function annotations
    00ae55ad76 SVM: convert entry point annotations
    e11f576650 xen/arm: Fix UBSAN failure in start_xen()
    f4519ee87e eclair: move function and macro properties outside ECLAIR
    38ae4739d8 xen/ns16550: address violations of MISRA C:2012 Rule 13.1
    e8f1bb803f block-common: Fix same_vm for no targets
    878159bf25 VMX: tertiary execution control infrastructure
    59a69674b5 automation: Switch yocto-qemux86-64 job to run on x86
    57a923bfd9 golang: Regen binding
    02c6ad4515 x86/entry: Reduce assembly instruction size
    80b01e20d0 x86/paging: Use more specific constant
    83afa31358 amd-vi: fix IVMD memory type checks
    8ac8999d70 x86/srat: vmap the pages for acpi_slit
    861d987726 xen/numa: vmap the pages for memnodemap
    f940facaa3 acpi: vmap pages in acpi_os_alloc_memory
    ef0873946c xen/vmap: Introduce vmap_size() and use it
    2213b5a293 setup: Move vm_init() before acpi calls
    1cb7949b37 xen/evtchn: Remove useless assignment in evtchn_alloc_unbound()
    3ce2e1f606 tools/xenstored: map stubdom interface
    097388d520 tools/xenstored: split domain_init()
    5edc819ed5 tools/xenstored: rework ring page (un)map functions
    a3e37f7024 tools/xenstored: get own domid in stubdom case
    e199a30680 tools/xenstored: move all socket handling into posix.c
    aae54458a1 tools/xenstored: move all log-pipe handling into posix.c
    511cc30cf8 tools/xenstored: move systemd handling to posix.c
    e767a98f04 tools/xenstored: add early_init() function
    1c2c7f7901 tools/xenstored: rename xenbus_evtchn()
    9c076988fe tools/helpers: allocate xenstore event channel for xenstore stubdom
    29f17d8374 tools/xentop: fix sorting bug for some columns
    10e0fb655d x86/cpu: Fix mixed tabs/spaces
    9eee78988c xen/bitmap: Deduplicate __bitmap_weight() implementations
    930605f155 x86/ucode: Remove accidentally introduced tabs
    660f8a7501 x86/CPU: convert vendor hook invocations to altcall
    e931edccc5 x86/guest: finish conversion to altcall
    044168fa3a x86: arrange for ENDBR zapping from <vendor>_ctxt_switch_masking()
    3f819af8a7 xen: Remove debugger.h
    d182f9feae x86: Remove gdbstub
    583f1d0950 x86/spec-ctrl: Expose BHI_CTRL to guests
    478e4787fa x86/spec-ctrl: Expose RRSBA_CTRL to guests
    4dd6760706 x86/spec-ctrl: Expose IPRED_CTRL to guests
    c852ca5c05 tools/ocaml: Bump minimum version to OCaml 4.05
    558e84b7ff xen/bitmap: Consistently use unsigned bits values
    4f0b0ffff3 x86/traps: Annotate {l,c}star_enter() as nocall
    fb22c33d17 x86/boot: Add braces in reloc.c
    ae6d4fd876 xen/sched: Fix UB shift in compat_set_timer_op()
    9d701bc9ab x86/hvm: Fix UBSAN failure in do_hvm_op() printk
    8e36c668ca xen: Drop superfluous semi-colons
    4c2d50d586 xen/arm: Properly clean update to init_ttbr and smp_up_cpu
    bc45f20c01 shim: avoid building of vendor IOMMU code
    9916fdff4b IOMMU: iommu_use_hap_pt() implies CONFIG_HVM
    1aee91fe98 xen/page_alloc: introduce init_free_page_fields() helper
    18cd984905 xenpm: Print message for disabled commands
    d3df0f180f x86/PoD: simplify / improve p2m_pod_cache_add()
    cc6ba68edf VT-d: Fix "else" vs "#endif" misplacement
    cb4ecb3cc1 pci: fail device assignment if phantom functions cannot be assigned
    4a7e71aa08 x86/iommu: cleanup unused functions
    0e1bd15a1d x86/iommu: switch hwdom IOMMU to use a rangeset
    79fcc0e9d7 x86/iommu: remove regions not to be mapped
    40a7467702 x86: purge NMI_IO_APIC
    4396761654 x86/APIC: purge {GET,SET}_APIC_DELIVERY_MODE()
    1097878338 NUMA: no need for asm/numa.h when !NUMA
    a75c5aa2b2 xen/vmap: Check the page has been mapped in vm_init_type()
    c378ff8983 x86/entry: fix jump into restore_all_guest without %rbx correctly set
    dbdd7e8df7 xen/arm64: head: Use PRINT_ID() for secondary CPU MMU-off boot code
    9a5114074b arm/smpboot: Move smp_up_cpu to a new section .data.idmap
    5ed59e62c6 arm/mmu: Move init_ttbr to a new section .data.idmap
    b24b540de6 x86/entry: Avoid register spilling in cr4_pv32_restore()
    024e7131be tools: don't expose XENFEAT_hvm_pirqs by default
    72cad62abb x86/hvm: make X86_EMU_USE_PIRQ optional
    cf7fe8b72d x86/ucode: Fix stability of the raw CPU Policy rescan
    052d78fbec pmstat: Limit hypercalls under HWP
    e047b8d0fa x86/entry: replace two GET_CURRENT() uses
    f575f05524 x86/NMI: refine "watchdog stuck" log message
    610775d0dd x86/p2m-pt: fix off by one in entry check assert
    98ae35cab0 x86/entry: Fix ELF metadata for NMI and handle_ist_exception
    55fbecb64e x86/kexec: Drop compatibility_mode_far
    bbf7d6acd3 xen/riscv: introduce guest_access.h
    f132bb5b6b xen/riscv: introduce domain.h
    f67bddf3bc IRQ: generalize [gs]et_irq_regs()
    79519fcfa0 lib{fdt,elf}: move lib{fdt,elf}-temp.o and their deps to $(targets)
    2cfdbd5863 PPC: switch entry point annotations to common model
    4900c939cb tools/binfile: switch to common annotations model
    7015f337a2 RISC-V: annotate entry points with type and size
    ae08d0c304 Arm: annotate entry points with type and size
    9de79317e8 x86: also mark assembler globals hidden
    b3a9037550 x86: annotate entry points with type and size
    df2209f9b7 common: assembly entry point type/size annotations
    85ba4d050f x86/MCE: switch some callback invocations to altcall
    9f58616ddb x86/MCE: separate BSP-only initialization
    1212af3e8c x86/PV: avoid indirect call for I/O emulation quirk hook
    e9e0eb30d4 x86/MTRR: avoid several indirect calls
    1bc07ebcac core-parking: use alternative_call()
    b25607e528 xen: Fold exit paths in find_text_region()
    c30021be30 xen/livepatch: Make check_for_livepatch_work() faster in the common case
    86d0edda34 x86/cpuid: Change cpuid() from a macro to a static inline
    3643bb53a0 x86/vmx: Disallow the use of inactivity states
    d1f8883aeb x86/vmx: Fix IRQ handling for EXIT_REASON_INIT
    6522ef73fd x86/vmx: Collect all empty VMExit cases together
    730d2637a8 x86/HPET: avoid an indirect call
    467ae515ca cpufreq: finish genapic conversion to altcall
    b1cc53753c x86/APIC: finish genapic conversion to altcall
    6bdb965178 x86/intel: ensure Global Performance Counter Control is setup correctly
    f3f6c500e2 xen/arm64: head: Allow to use early printk while on 1:1 mapping
    d5a2ff06b1 xen/arm32: head: Move earlyprintk 'hex' to .rodata.idmap
    c2ce346647 CirrusCI: drop FreeBSD 12
    cd574f3ed8 x86/vPMU: drop regs parameter from interrupt functions
    7a3bd1cbc4 x86/vIRQ: split PCI link load state checking from actual loading
    69c89dd787 x86/vPIC: check values loaded from state save record
    c53013da6f x86/vPIT: check values loaded from state save record
    c3c6e9b8e8 x86/HVM: adjust save/restore hook registration for optional check handler
    5b6cab423c x86/HVM: split restore state checking from state loading
    5e600b4fb9 NUMA: limit first_valid_mfn exposure
    137c08aa07 xen/riscv: introduce system.h
    cef805dce4 x86emul: support SM4
    390777414a x86emul: support SM3
    aa18530282 x86emul: support SHA512
    c8bb7553f2 x86emul: support AVX-VNNI-INT16
    1ec3fe1f66 xen/arm32: head: Improve logging in head.S
    410837189e xen/arm: bootfdt: Harden handling of malformed mem reserve map
    89c384c525 xen/common: Don't dereference overlay_node after checking that it is NULL
    0f9a688f60 xen/arm32: head: Rework how the fixmap and early UART mapping are prepared
    c27c8922f2 x86/iommu: introduce a rangeset to perform hwdom IOMMU setup
    48193fe00a x86/HVM: drop tsc_scaling.setup() hook
    0b5f149338 x86/HVM: hide SVM/VMX when their enabling is prohibited by firmware
    f628fc8d18 VMX: drop vmx_virt_exception and make vmx_vmfunc static
    2467ab2a74 x86/mwait-idle: fix ubsan warning
    cc5a436002 xen/public: add some more 9pfs xenstore paths
    589d8cf146 xen: ifdef inclusion of <asm/grant_table.h> in <xen/grant_table.h>
    42b814b7ff xen/asm-generic: introduce stub header softirq.h
    e2c7111d65 xen/asm-generic: introduce generic div64.h header
    5a3ace21f3 xen/arm: smmu-v3: address violations of MISRA C:2012 Rule 16.3
    49818cde63 xen: remove asm/unaligned.h
    f61685f1fa xen: make include/xen/unaligned.h usable on all architectures
    23db507a01 x86/amd: Extend CPU erratum #1474 fix to more affected models
    b74c735f88 xen/xmalloc: XMEM_POOL_POISON improvements
    3909fb4692 docs/misra: exclude files inherited from ACPI CA from MISRA compliance
    773db8f307 x86/platform: tidy do_platform_op() a little
    6ccd2501b4 x86/mm: use "break" in arch_memory_op()
    8862c7b8b6 pci: introduce per-domain PCI rwlock
    f4d0859da3 pci: msi: pass pdev to pci_enable_msi() function
    94039d97e2 amd-vi: set IOMMU page table levels based on guest reported paddr width
    ad3a4b7c76 x86/p2m: move and rename paging_max_paddr_bits()
    6efc654a0b tools/xg: Reserialise CPU policies with the allocated number of leaves.
    ecabcd0d4e xen/bug: Complete outstanding TODO
    5f7fd392d9 driver/char: Drop run_in_exception_handler() ifdefary
    1fa104ee7a tools/pygrub: Drop compatibility symlink
    e9786ba9ee xen/arm: mmu: address a violations of MISRA C:2012 Rule 16.3
    2750111969 xen/arm: guest_walk: address violations of MISRA C:2012 Rule 16.3
    f1e956cdbf xen/arm: traps: address violations of MISRA C:2012 Rule 16.3
    7d18ab2b9b xen/arm: gic-v3: address violations of MISRA C:2012 Rule 16.3
    18828f00e4 automation/eclair_analysis: fix typo in deviation.
    5171930429 docs/misra/rules.rst: add Rule 17.1
    913a177416 x86/IO-APIC: correct RTE polarity comment
    e6cb988a3d xen/common: address violations of MISRA C:2012 Rule 11.8
    9d8c3bc887 xen: remove unused function ERR_CAST
    23a5fb3df7 xen: add deviations for Rule 11.8
    1fb1d3e77f xen/arm: address violations of MISRA C:2012 Rule 11.8
    725acf8e4d xen/arm: vcpreg: address violation of MISRA C Rule 2.1
    2a0f5a11f2 xen/arm: traps: add ASSERT_UNREACHABLE() where needed
    c877b90928 xen/arm: address MISRA C:2012 Rule 2.1
    51ffb33118 xen: move declaration of first_valid_mfn to xen/numa.h
    fba913a21a docs/misra: add entries to exclude-list
    ed45dd16c4 automation/eclair: update configuration of MISRA C:2012 Rule 5.6
    a128d8da91 automation/eclair: add deviations for MISRA C:2012 Rule 16.3
    1b42304fd1 xen/arm: ffa: return fpi size from FFA_PARTITION_INFO_GET
    05b6368ba0 x86: don't open-code max_page calculation nor pfn_to_paddr()
    11126964d8 automation/eclair_analysis: avoid violation of MISRA Rule 2.1
    bfd52e979d xen/shutdown: address MISRA C:2012 Rule 2.1
    36a05926b0 xen/wait: address violations of MISRA C Rule 11.9
    e66237eb1a x86/hvm: dom0: use helper to get sizeof struct field
    985fe473c0 x86/ioapic: use NULL as a null pointer constant
    0940d34291 xen/hvm: use NULL as a null pointer constant
    3af0a4f922 iommu/vt-d: do not assume page table levels for quarantine domain
    64d32b75e6 x86: allow non-BIGMEM configs to boot on >= 16Tb systems
    0cc74376d6 x86/hvm: address a violation of MISRA C:2012 Rule 11.8
    abdee7b1db x86/boot: address violations of MISRA C:2012 Rule 11.8
    b736154e89 xen/efi: address violations of MISRA C:2012 Rule 11.8
    5fbb3e9da9 xen/arm64: address violations of MISRA C:2012 Rule 11.8
    a57680db1a xen/x86_emulate: address violations of MISRA C:2012 Rule 14.4
    c714b8807b xen/x86: add missing instances of asmlinkage attributes
    c6dbc6df52 xen: fix compilation issue of serial.c
    d2ab1347bd xen: add RISCV support for pmu.h
    fa469c5a86 xen/riscv: add public arch-riscv.h
    a60067f398 docs/misra/rules.rst: add Rule 16.2
    896c191786 automation/eclair_analysis: file exclusion automation
    cad6f9a4c1 smp: move cpu_is_offline() definition
    68e6b7fc11 tools/libs/evtchn: fix locking in Mini-OS
    75571e162b xen/arm: ffa: return FFA_RET_NOT_SUPPORTED on unhandled calls
    a236b74b96 xen/arm: don't pass iommu properties to hwdom for iommu-map
    666e3c294d xen/iommu: address leftover violation of MISRA C:2012 Rule 8.2
    75b6bcbd9e xen/drivers: address violations of MISRA C:2012 Rule 8.2
    76ecfc517d x86/include: address violations of MISRA C:2012 Rule 8.2
    b9905a04e4 xen/compat: address violations of MISRA C:2012 Rule 8.2
    abdbf82448 MAINTAINERS: add me as Mini-OS maintainer
    56c633bc8e xen/riscv: define bug frame tables in xen.lds.S
    a6a8fe0eb1 Revert "xen: make include/xen/unaligned.h usable on all architectures"
    8fe6219d83 Revert "xen: remove asm/unaligned.h"
    7fca0463c7 xen/spinlock: make spinlock initializers more readable
    a77fcbc389 xen/spinlock: reduce lock profile ifdefs
    35431ecb9d xen/arm: smmu: move phys_addr_t definition to linux-compat.h
    889af18eee xen/sched: address MISRA C:2012 Rule 2.1
    f0bb77bf73 AMD/IOMMU: address violations of MISRA C:2012 Rule 8.2
    6d5e94ca7d x86/mm: address violations of MISRA C:2012 Rule 8.2
    fbc8cff877 x86/mm: remove compat_subarch_memory_op()
    431ada87e5 xen/acpi: address violations of MISRA C:2012 Rule 8.2
    190b7f49af xen/arm: page: Avoid pointer overflow on cache clean & invalidate
    0fb4b6b0ea MAINTAINERS: Hand over the release manager role to Oleksii Kurochko
    6619c6f891 xen: remove asm/unaligned.h
    6c4be49503 xen: make include/xen/unaligned.h usable on all architectures
    3e3ff7f9cd xen/arm: set -mno-unaligned-access compiler option for Arm32
    cf40abbc7f tools/xenstored: potentially split trace_io() out message
    1403131596 x86/viridian: make build_assertions static
    f45e488e7b docs/misra/rules.rst: add more rules
    519c7a1d58 xen: address violations of MISRA C:2012 Rule 14.4
    807321b6f3 x86/acpi: remove acpi_pic_sci_set_trigger()
    bc4fe94a69 tools/libs/evtchn: replace assert()s in stubdom with proper locking
    e6e8c5831a Config: Update MiniOS revision
    d2b7c442b4 CODING_STYLE: Add a section of the naming convention
    25147005da xen/sched: do some minor cleanup of sched_move_domain()
    23792cc0f2 xen/sched: fix sched_move_domain()
    02d0a615b3 xen/arm: bootfdt: Check return code of device_tree_for_each_node()
    c4ccad6f3f tools/xenstored: remove the "-R" command line option
    cc6609eed2 tools/xenstored: remove the "-P" command line option
    cddc66b1ea tools/xenstored: remove "-V" command line option
    98f2cb76f6 tools/xenstored: remove "-D" command line parameter
    dbe69e1c85 x86/DMI: adjustments to comply with Misra C:2012 Rule 9.3
    add7046baf Revert "x86/DMI: adjustments to comply with Misra C:2012 Rule 9.3"
    d4bfd38998 xen/hypervisor: Don't use cc-option-add for -Wdeclaration-after-statement
    40be6307ec Only compile the hypervisor with -Wdeclaration-after-statement
    59df285131 x86/DMI: adjustments to comply with Misra C:2012 Rule 9.3
    e4c0489ec5 xen/pci: address violations of MISRA C:2012 Rule 8.2
    24b2672695 x86/mce: address violations of MISRA C:2012 Rule 8.2
    8b0dc4a88f x86/page: address violations of MISRA C:2012 Rule 8.2
    fa9171ed05 config: update Mini-OS commit
    2e5e9ec4ff x86/vPIC: vpic_elcr_mask() master bit 2 control
    634c6e15ac x86/HVM: introduce hvm_get_entry()
    55cd2eaec3 xen/riscv: introduce spinlock.h
    204aa245df xen/riscv:introduce asm/byteorder.h
    3e5672d69f automation/eclair: tag function calls to address violations of MISRA C:2012 Rule 13.1
    1ff6d92938 automation/eclair: add deviations for MISRA C:2012 Rule 5.6
    d97d6a7f08 docs/misra: deviate deliberately unused labels
    4c6142a1ab CI: Fix fallout from adding elfutils-dev to the build container
    01da0aeecd ns16550: remove partial explicit initializer
    948e033031 automation/alpine: add elfutils-dev
    afb2692c47 ubsan: Introduce CONFIG_UBSAN_FATAL to panic on UBSAN failure
    ff11780620 xen/domain: fix error path in domain_create()
    d830b0a7bc xen/vpci: header: filter PCI capabilities
    a3c8fb450a xen/vpci: header: status register handler
    6f7db3e0a0 xen: address violations of MISRA C:2012 Rule 11.8
    3e7a3f08ce bump default SeaBIOS version to 1.16.3
    06e8d65d33 xen/sched: fix adding offline cpu to cpupool
    787d11c5aa x86emul: avoid triggering event related assertions
    93d913c6e6 xen/public: fix flexible array definitions
    80a7669afd x86/p2m: address a violation of MISRA C:2012 Rule 8.3
    f0a00ab1a6 x86/p2m: preparation work for xenmem_add_to_physmap_one()
    525c7c094b xen/arm: Move static event channel feature to a separate module
    1571ff7a98 tools/xg: Fix potential memory leak in cpu policy getters/setters
    02ef46b675 .gitignore: generalize *.new
    cd1a4a5709 docs/misra: add entry to exclude-list.json
    ebd7074dd0 xen/arm: mmu: add headers for missing declarations
    e7c4b68738 xen/serial: address a violation of MISRA C:2012 Rule 8.2
    498c130104 xen/perfc: address a violation of MISRA C:2012 Rule 8.2
    5dc781b4af xen/param: address a violation of MISRA C:2012 Rule 8.2
    13832e2367 xen/kernel: address a violation of MISRA C:2012 Rule 8.2
    80aeb9ccec xen/iommu: address violations of MISRA C:2012 Rule 8.2
    59f31d970f xen/notifier: address violations of MISRA C:2012 Rule 8.2
    24dbf93ebd xen/domain: address violations of MISRA C:2012 Rule 8.2
    def73fc144 automation/eclair: improve scheduled analyses
    e5aba2909c docs/misra: fix a typo in rules.rst
    829b4731df automation: Switch u-boot boot command to bootz for arm32 tests
    f0dd0cd959 docs/misra: add guidance on the format of Dir 4.1 docs for ECLAIR
    ddf664a557 automation/eclair: make the docs for MISRA C:2012 Dir 4.1 visible to ECLAIR
    2f848d3cee arm/bitops: encapsulate violation of MISRA C:2012 Rule 10.1
    902377b690 xen/livepatch: fix livepatch tests
    b3d3267286 cirrus-ci: update FreeBSD versions
    92696bf052 xen/arm64: Move print_reg macro to asm/arm64/macros.h
    7e1f5b68ac xen/asm-generic: introduce generic header altp2m.h
    f1ac700b44 xen/asm-generic: introduce generalized hardirq.h
    7c20d1616d xen/asm-generic: introduce generic header percpu.h
    18f3095654 xen/asm-generic: introduce stub header <asm/random.h>
    f6082c7b6c xen/asm-generic: introduce generic header iocap.h
    2ae2a306f4 xen/asm-generic: introduce generic hypercall.h
    94854f1419 xen/asm-generic: introduce stub header paging.h
    90309854fd xen/x86: In x2APIC mode, derive LDR from APIC ID
    8b15717518 xen/dmi: address a violation of MISRA C:2012 Rule 8.2
    022d7d87cc xen/cpumask: address violations of MISRA C:2012 Rule 8.2
    b0356bc0e0 xen/acpi: address violations of MISRA C:2012 Rule 8.2
    07551414ca xen/console: address violations of MISRA C:2012 Rule 8.2
    84eba1dc6d xen: remove <asm/delay.h>
    72ec070930 xen: replace some occurrences of SAF-1-safe with asmlinkage attribute
    caa221791d domain: add ASSERT to help static analysis tools
    18540a313c arm/dom0less: introduce Kconfig for dom0less feature
    d7d80e7a32 xen/arm: Move static memory build code in separate modules
    8d2c3ab18c arm/dom0less: put dom0less feature code in a separate module
    dcb92d4ef1 xen/arm: Add asm/domain.h include to kernel.h
    4a6962fa7f arm/gicv2: make GICv2 driver and vGICv2 optional
    72d51813d6 x86: amend cpu_has_xen_{ibt,shstk}
    17754972fa x86/atomic: address violations of MISRA C:2012 Rule 11.8
    fc63c0ebef AMD/IOMMU: address violations of MISRA C:2012 Rule 11.8
    fe26cb2dd2 x86/boot/reloc: address violations of MISRA C:2012 Rule 11.8
    09c2fe438d x86/platform_hypercall: address violations of MISRA C:2012 Rule 11.8
    82182ad7b4 livepatch: do not use .livepatch.funcs section to store internal state
    46f2e2c3bc xen/mm: address violations of MISRA C:2012 Rules 8.2 and 8.3
    b82b867a66 x86/mm: preparation work to uniform modify_xen_mappings* interfaces
    fbcec32d6d x86/mem_sharing: Release domain if we are not able to enable memory sharing
    b9eeb19926 x86/mem_sharing: Fix typo in comment
    80c153c48b xen/sort: address violations of MISRA C:2012 Rule 8.2
    a66b02a6b6 x86/vPIC: correct vpic_domain()
    9b3476f13e xen/iommu: use ISOLATE_LSB to wrap a violation of Rule 10.1
    80d72670ad xen/vmap: use ISOLATE_LSB to wrap a violation of Rule 10.1
    de4f3cf327 x86_64/mm: express macro CNT using ISOLATE_LSB
    02d754aa55 xen/pdx: amend definition of PDX_GROUP_COUNT
    f02829592e x86emul/test: fold AVX512VL scatter/gather test blobs with AVX512F ones
    03d6720a4c tools/pygrub: Restrict depriv operation with RLIMIT_AS
    2d63785a8a tools/pygrub: Fix expression before it's copied elsewhere
    de577641cf tools/pygrub: Fix bug in LIMIT_FSIZE env variable override
    c789c7ff7e tools/pygrub: Set mount propagation to private recursively
    16a0e16dab tools/python: add .gitignore file
    9b1972dff5 tools/pygrub: add .gitignore file
    5d4b948169 xen/efi: Drop image_name from efi_arch_handle_cmdline()
    f96e2f6457 xen/MISRA: Remove nonstandard inline keywords
    563193de85 x86/apic: Drop the APIC_MSR_BASE constant
    e39cbf52b1 x86/apic: Drop atomic accessors
    9153b64bea xen: Enable -Wwrite-strings
    b1185ce66c arm/efi: Simplify efi_arch_handle_cmdline()
    ef2071d45b x86/efi: Simplify efi_arch_handle_cmdline()
    858e3bf349 x86/setup: Rework cmdline_cook() to be compatible with -Wwrite-strings
    0dd3231330 x86/setup: Clean up cmdline handling in create_dom0()
    1e2b13bcf0 xen/arm: gicv3: clean up GICD_CTRL write
    8f45862580 xen/xalloc: address violations of MISRA C:2012 Rule 8.2
    382257af0c xen/vmap: address violations of MISRA C:2012 Rule 8.2
    764851a8be xen/serial: address violations of MISRA C:2012 Rule 8.2
    89c1784f5f xen/common: address violations of MISRA C:2012 Rule 8.2
    5c72b54b65 x86: add asmlinkage macro to variables only used in asm code
    3ea5918ead x86/ACPI: constify acpi_enter_sleep argument
    843265ad0b x86/cpuid: enumerate and expose PREFETCHIT{0,1}
    9dfc824590 x86emul: deal with decode failure in predicates test
    c22fe7213c automation: switch to multi-platform images when possible
    3b2ba63994 automation: set architecture in docker files
    b78b4de1c5 automation: update tests to use Debian Bookworm
    b5739330d7 automation: fix jessie/stretch images to use archive.debian.org apt repos
    7440355a29 automation: add Xen timestamps to all tests
    24532be907 automation: remove com1= parameter on QEMU smoke tests
    b576497e3b automation: remove CR characters from serial output
    4b99ce89eb config: update Mini-OS commit
    e536a49754 stubdom: Remove caml-stubdom
    84915b80a9 x86/hvm: Trivial style cleanup in vlapic.c
    0fa916aba8 x86/mm: Fix up bad bool conversion in ept_set_entry()
    820ee3ec4d x86: add deviation for asm-only functions
    10081c2dc5 arm/platforms: Make compatbile with -Wwrite-strings
    6c1d5f6516 arm/duart: make dt_uart_init() compile with -Wwrite-strings
    1a177d4669 x86/setup: Make the loader variable const
    24b1107449 xen: Drop bool_t
    e0d0961f3f xen/treewide: Switch bool_t to bool
    de577618c2 x86/treewide: Switch bool_t to bool
    ee34444712 x86/ioapic: Check 1k alignment for IO-APIC physical addresses
    d9fc66554f x86/traps: More use of nocall
    625f2cc66f x86/entry: Use 32bit XOR in handle_ist_exception
    7e939abca7 xen: Annotate printk() as cold
    71dd0f6e3b x86: Fix XEN_DOMCTL_gdbsx_guestmemio crash
    a1f9490ccc docs/misra: exclude three more files
    707b8b8717 x86/mem_access: make function static
    e7ad219bb2 xen/console: remove stub definition in consoled.h
    8b9e6939a0 x86/vm_event: add missing include for hvm_vm_event_do_resume
    5c7c09f64e x86/grant: switch included header to make declarations visible
    62c84c3031 xen: modify or add declarations for variables where needed
    40acb0c111 SUPPORT.md: change current version to 4.19-unstable
    983aaa533b xenstored: use correct conversion specifier in the tracing function
    c9237aa2cf xen/spinlock: fix coding style issues
    fa2da5bce9 xen/arm32: head Split and move MMU-specific head.S to mmu/head.S
    a9f931e96f xen/arm32: head: Introduce enable_{boot,secondary}_cpu_mm()
    ee0f41fda3 xen/arm: mmu: move MMU specific P2M code to mmu/p2m.{c,h}
    1bf5c104fe xen/arm: Rename init_secondary_pagetables() to prepare_secondary_mm()
    e6bef277d4 xen/arm: Fold pmap and fixmap into MMU system
    672d67f339 xen/arm: Split MMU-specific setup_mm() and related code out
    f661a20aa8 xen/arm: Extract MMU-specific MM code
    ea59db96a4 xen/arm: Fold mmu_init_secondary_cpu() to head.S
    210e83ae56 xen/arm: Split MMU system SMP MM bringup code to mmu/smpboot.c
    1bf8a6aafc xen/arm: Split page table related code to mmu/pt.c
    cfb777791d amd/iommu: fully initialize array in 'flush_command_buffer'
    b264570ba2 x86/sysctl: address a violation of MISRA C:2012 Rule 8.2
    05644bd9d2 x86/platform_hypercall: address violations of MISRA C:2012 Rule 8.2
    168f87f590 x86/physdev: address violations of MISRA C:2012 Rule 8.2
    8976587dc7 x86/pci: address a violation of MISRA C:2012 Rule 8.2
    45402cc136 x86/smp: address a violation of MISRA C:2012 Rule 8.2
    340a75a4f4 x86/vpmu: address a violation of MISRA C:2012 Rule 8.2
    9b1fcb4648 x86/mmconfig: address violations of MISRA C:2012 Rule 8.2
    f5b4c5f537 x86/hvm: address violations of MISRA C:2012 Rule 8.2
    4709ec8291 xen/sched: fix sched_move_domain()
    98758ae489 xen: introduce function type bug_fn_t.
    83e9e30510 automation/eclair: add a deviation for MISRA C:2012 Rule 8.6
    26cdd09801 xen: address violations of Rule 11.9
    71576f8852 automation/eclair: update deviations and accepted guidelines
    a2e8d64c80 xen/string: address violations of MISRA C:2012 Rules 8.2 and 8.3
    ab9558ef5e xen/compat: use BUILD_BUG_ON in CHECK_SIZE macros
    ee409f36b6 xen/types: address Rule 10.1 for DECLARE_BITMAP use
    5b2a570f84 x86/io_apic: address violation of MISRA C:2012 Rule 10.1
    4bee3b9c2c xen: Add deviations for MISRA C:2012 Rule 7.1
    1003608606 xen/x86: address violations of MISRA C:2012 Rule 7.2
    652683e1ae x86/hvm: address violations of MISRA C:2012 Rule 7.2
    ee7bab7912 x86/vmx: address violations of MISRA C:2012 Rule 7.2
    97f8555acb xenstored: print domain id in traces
    6cd046c501 xen/arm: Enlarge identity map space to 10TB
    02df8ada5a xen/arm: Add macro XEN_VM_MAPPING
    9dfcef827c arm32: head: Add missing hunk from previous commit
    9b807e23e7 xen/arm32: head: Replace load_paddr with adr_l when they are equivalent
    046f13a2b3 xen/arm64: head: only use the macro load_paddr() in the MMU code
    c419d2dd35 xen/arm: Skip memory nodes if not enabled
    b739e2067b xen/include: add macro ISOLATE_LSB
    ef8eba3535 x86/hpet: address violations of MISRA C:2012 Rule 8.2
    9c27a730b8 x86/vmce: address violations of MISRA C:2012 Rule 8.2
    dc64ba0c41 x86/mcaction: address a violation of MISRA C:2012 Rule 8.2
    5310230b61 x86/cpuidle: address violations of MISRA C:2012 Rule 8.2
    614417165c x86/domain: address violations of MISRA C:2012 Rule 8.2
    21f6d31ed6 x86/mtrr: address violation of MISRA C:2012 Rule 8.2
    6f3f60b090 x86/mctelem: address violations of MISRA C:2012 Rule 8.2
    fb62aa714d misra: add R21.1 R21.2
    06e484767b docs/misra: add R11.1 R11.2 R11.3 R11.6
    7ad0c774e4 x86/boot: tidy #include-s
    b24a0f3c5e tools: Remove all DECLARE_* op macros in xc
    22b773d5c9 x86/psr: address a violation of MISRA C:2012 Rule 8.3
    fde774154c x86/xstate: address a violation of MISRA C:2012 Rule 8.3
    76fa223438 x86/uaccess: address violations of MISRA C:2012 Rule 8.3
    a48bb129f1 x86/spec-ctrl: Remove conditional IRQs-on-ness for INT $0x80/0x82 paths
    fe1e4668b3 iommu/amd-vi: use correct level for quarantine domain page tables
    fb41228ece docs/sphinx: Fix indexing
    ab03b284b4 docs/sphinx: Fix syntax issues in exclude-list.rst
    93ad5dd974 docs/sphinx: Fix syntax issues in hyperlaunch.rst
    044503f61c docs: Delete kconfig docs to fix licensing violation
    8ee1a332b4 docs/misra: Add missing SPDX tags
    162a1589e3 xen/set_{c,p}x_pminfo: address violations od MISRA C:2012 Rule 8.3
    0e4720655f xen/sched: address violations of MISRA C:2012 Rule 8.2
    ecbe563500 x86/msi: address violations of MISRA C:2012 Rules 8.2 and 8.3
    06719e449f x86/intel: fix indentation
    dec9e02f31 xen: avoid generation of stub <asm/pci.h> header
    d0ea916fcd x86: don't allow Dom0 access to ELCR ports
    bede1c7e3b exclude-list: generalise exclude-list
    d82a8217d5 cppcheck: rework exclusion_file_list.py code
    f3795523dc arm/gic: add missing parameter names and uniform function declarations
    dc79336075 xen/domain_page: address violations of MISRA C:2012 Rule 8.3
    adac94da8b build: Allow setting KBUILD_DEFCONFIG in the environment
    f5ff26da32 xen/arm64: domctl: Avoid unreachable code in subarch_do_domctl()
    ca1279f879 arm/cpufeature: address violations of MISRA C:2012 Rule 8.2
    5704923f94 bitmap: fix nbits signess
    25dc15db92 arm/smmu: address violation of MISRA C:2012 Rule 8.2
    ffe54cd871 arm/domain: address violations of MISRA C:2012 Rule 8.2
    be7f7149c4 arm/vgic-v3: address a violation of MISRA C:2012 Rule 8.2
    a17a2b2073 arm/cmpxchg: address violations of MISRA C:2012 Rule 8.2
    c07e81f646 arm/p2m: address a violation of MISRA C:2012 Rule 8.2
    5d38f3eab0 arm/setup: address violations of MISRA C:2012 Rule 8.2
    49604292b0 arm/smpboot: address violations of MISRA C:2012 Rule 8.2
    4c910b0461 automation/eclair: update accepted and clean guidelines
    78a86b2686 x86/spec-ctrl: Add SRSO whitepaper URL
    fab51099a1 ubsan: Fix pointer overflow error message
    e3c409d59a x86/x2apic: introduce a mixed physical/cluster mode
    de1cc5102b MAINTAINERS: add xen/drivers/char/imx-lpuart.c to ARM section
    1f849edc2f golang: Fix bindings after XSA-443
    1429f9c548 golang: Fixup binding for Arm FF-A
    5ae0a4ad38 AMD/IOMMU: drop tasklet handler forward declaration
    b6c7951f23 x86/hvm/dom0: fix PVH initrd and metadata placement
    86b06295f6 arch: drop get_processor_id()
    ad193a79c2 xenoprof: move asm/ include
    7d46710f08 console: conditionalize console_input_domain()
    ea3dabfb80 x86/PVH: allow Dom0 ELF parsing to be verbose
    9589296e9c build: simplify clean handling of extras directory
    ea083911b1 xen/include: make enum perfcounter anonymous
    7211904e09 docs/misra: add documentation skeleton for MISRA C:2012 Dir 4.1
    202f410721 MAINTAINERS: make Michal Orzel ARM Maintainer
    801b804945 x86/time: Fix UBSAN failure in __update_vcpu_system_time()
    649c190a1f xen/ppc: Implement a basic exception handler
    abb8a88d59 xen/ppc: Add .text.exceptions section for exception vectors
    87f37449d5 x86/i8259: do not assume interrupts always target CPU0
    26a449ce32 x86/x2apic: remove usage of ACPI_FADT_APIC_CLUSTER
    fe0ae3f7dd xen/riscv: introduce identity mapping
    af670c14e8 xen/riscv: introduce function for physical offset calculation
    86266162fc x86: don't allow Dom0 (direct) access to port F0
    306e3dc919 x86/PVH: deny Dom0 access to the ISA DMA controller
    9e2c146c38 x86: don't allow Dom0 access to port 92
    ee3bcf907a x86: don't allow Dom0 access to port CF9
    7b1de98b66 x86/vRTC: minor adjustment to reads from index port
    7befef87cc x86/p2m: address violations of MISRA C:2012 Rules 8.2 and 8.3
    93ec30bc54 x86/pv-shim: fix grant table operations for 32-bit guests
    23eb39acf0 x86/mem_sharing: add missing m2p entry when mapping shared_info page
    cfff187ed5 x86/cpu-policy: Adjust CPUID_MAX_SERIALISED_LEAVES to placate MISRA
    8e74432dd3 xen/spinlock: fix use of 0 as a null pointer constant
    6386f5585c x86/mce: Move MC_NCLASSES into the enum mctelem_class
    a944636478 CHANGELOG.md: Start new 4.19.0 section
    e4fdec09bb CHANGELOG.md: Finalize the 4.18 release date
    bf51f85f20 CHANGELOG: More 4.18 content
    d9c1166078 CHANGELOG: Reformat
    850382254b docs: Fix IOMMU command line docs some more
    df43b54590 automation: fix race condition in adl-suspend test
    9659b2a6d7 Set version to 4.18; return ./autogen.sh
    7f48e34298 Revert "Config.mk pin QEMU_UPSTREAM_REVISION (prep for Xen 4.18 RC1)"
    4294987c7a Set version to 4.19; 4.18 has branched

Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
2024-08-08 15:26:47 +00:00
Bruce Ashfield
03a0378792 xen-tools: adjust recommendations for qemu package splitting
When vmsep is enabled the qemu packages are split based on
meta-virt policy. Detect this distro feature and update our
dependencies accordingly.

Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
2024-04-04 19:57:46 +00:00
Bruce Ashfield
0650f659fd xen: fix virtual RDEPENDS warnings
oe-core has started to warn when virtual/ is used outside of
the DEPENDS (build) context.

We tweak our rprovides/rdepends to use virtual- instead to
avoid the warning:

  WARNING: RDEPENDS is set to virtual/xenstored, the substring 'virtual/' holds no meaning in this context. It is suggested to use the 'virtual-' instead.
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
2024-01-19 14:29:24 +00:00
Bruce Ashfield
4853645ef9 xen-tools: move var-lib-xenstored.mount to be version specific
We adjusted xen-tools in 4.17 to account for /var/lib/xenstored
not being present, but we didn't apply the same adjustment to
the systemd packages.

We move the service packaging to the 4.16 versioned recipe, as
anything newer than that, won't have the .mount file.

Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
2023-01-20 12:16:33 -05:00
Michal Orzel
3581dd56aa xen: Add recipes for stable Xen 4.17 release and update master
Add recipes for xen and tools for the newly released 4.17 version and
take the opportunity to update master recipes.

Reflect 4.17 tools changes in xen-tools.inc:
 - add test-paging-mempool to test package,
 - add init-dom0less script to xl package,
 - add localstatedir to xencommons package (this is needed as from 4.17
   onwards, there is no /var/lib/xenstored resulting in /var being
   installed but not shipped in any package).

Reviewed-by: Christopher Clark <christopher.w.clark@gmail.com>
Signed-off-by: Michal Orzel <michal.orzel@amd.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
2023-01-10 13:58:07 -05:00
Christopher Clark
da1e54ca79 xen, xen-tools: add recommendation for Qemu for non-hvm x86
The Spectre and Meltdown mitigations for Xen run PV guests within
HVM virtual machines, so Qemu is no longer only needed for systems
configured to run HVM guests.

With the split xen hypervisor and tools recipes, the bios dependencies
belong in the tools recipe, so move them and replace the hvm
PACKAGECONFIG option with the recommendation based on target arch.

Signed-off-by: Christopher Clark <christopher.clark@starlab.io>
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
2022-05-09 08:08:20 -04:00
Bruce Ashfield
b9e18c1dae xen-tools: correct xencommons initscript for systemd
commit [xen-tools: don't declare xencommons as an initscript for
systemd] was wrong in an amazing two ways. It has an extranenous
} and it has inverted logic.

The result is that xencommons is not being properly declared as
an initscript for sysvinit, and hence we don't fully boot. It
isn't a problem for most systemd configurations, so we were
booting as the initscript wasn't firing.

Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
2022-05-08 23:22:07 -04:00
Bruce Ashfield
48ef7901ab xen-tools: don't declare xencommons as an initscript for systemd
We previously disabled init.d/xencommons when systemd is the
init system (to fix duplicate initialization of some resources),
but during rootfs install, update-rc.d will look for the script
if xencommons is declared as an initscript package.

We match the installation and only delcare it as an initscript
in a non systemd configuration.

Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
2022-04-21 11:58:56 -04:00
Bruce Ashfield
51e404af98 xen-tools: remove unused systemd/sysvinit files
The commit [ xen: only package xencommon systemd components if systemd
is enabled] attempted to only package init.d scripts for non-systemd
systems (and vice-versa for unit files).

But the xen-tools builds installs the files uncondtionally, so we can
end up with unpackaged files in some configurations. We can test on
the init system and removed the unused versions of the init to avoid
both packging and runtime issues.

Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
2022-04-19 20:11:39 -04:00
Bruce Ashfield
c9554c6937 xen: only package xencommon systemd components if systemd is enabled
We've had reports of both the init.d xencommons and the systemd
services attempting to initialize the console, and breaking boot.

The systemd initialization really only needs to be enabled when
systemd is in DISTRO_FEATURES, and init.d the opposite.

Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
2022-03-21 17:31:29 -04:00
Kamil Dziezyk
44dad5105d xen-tools: Load xen related kernel modules during system boot
This patch changes the location of xen.conf file, that contains list of kernel
modules to be loaded during system boot, to "${nonarch_libdir}". This is done
by removing '--with-systemd-modules-load=' flag from EXTRA_OECONF variable.

Previous path based on "${systemd_unitdir}" was not considered by default by
systemd-modules-load.service.

Reviewed-by: Bertrand Marquis <bertrand.marquis@arm.com>
Acked-by: Christopher Clark <christopher.w.clark@gmail.com>
Signed-off-by: Kamil Dziezyk <kamil.dziezyk@arm.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
2022-01-18 22:43:28 -05:00
Christopher Clark
acdae1d76b xen-tools: upgrade RSUGGESTS to RRECOMMENDS for ifupdown
Xen's networking for guests is typically configured using bridges and
the standalone ifupdown package, which contains a more capable version
of the tool than busybox, is needed to configure them, so:

Increase the recommendation strength from RSUGGESTS to RRECOMMENDS to
bring the package in by default, which fixes networking for images built
with packaging formats that follow RRECOMMENDS but not RSUGGESTS.

I should've paid closer attention to Corey's recommendation for this, so:
Suggested-by: Corey Minyard <cminyard@mvista.com>

Signed-off-by: Christopher Clark <christopher.w.clark@gmail.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
2021-12-16 21:44:59 -05:00
Edward Pickup
03689b86cc xen,xen-tools: update xen to new releases
Update the SHA in recipes for xen and xen-tools to use the latest releases;
update xen 4.14 to xen 4.14.3 release, update xen 4.15 to 4.15.1 release, and
xen 4.16 to the current master version.

Add a comment to each recipe indicating which version of Xen is used in recipe.

Do not apply patches that have been merged/solved in Xen and remove patch files
not needed anymore.

Create a test package to pack new tests introduced in 4.16.

Add a depencency to util-linux-prlimit, as the xen 4.16 x86 requires prlimit,
without this boot of dom0 fails.

Signed-off-by: Edward Pickup <Edward.Pickup@arm.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
2021-11-02 09:57:03 -04:00
Bruce Ashfield
d876cfc5bf global: overrides syntax conversion
OEcore/bitbake are moving to use the clearer ":" as an overrides
separator.

This is pass one of updating the meta-virt recipes to use that
syntax.

This has only been minimally build/runtime tested, more changes
will be required for missed overrides, or incorrect conversions

Note: A recent bitbake is required:

    commit 75fad23fc06c008a03414a1fc288a8614c6af9ca
    Author: Richard Purdie <richard.purdie@linuxfoundation.org>
    Date:   Sun Jul 18 12:59:15 2021 +0100

        bitbake: data_smart/parse: Allow ':' characters in variable/function names

        It is becomming increasingly clear we need to find a way to show what
        is/is not an override in our syntax. We need to do this in a way which
        is clear to users, readable and in a way we can transition to.

        The most effective way I've found to this is to use the ":" charater
        to directly replace "_" where an override is being specified. This
        includes "append", "prepend" and "remove" which are effectively special
        override directives.

        This patch simply adds the character to the parser so bitbake accepts
        the value but maps it back to "_" internally so there is no behaviour
        change.

        This change is simple enough it could potentially be backported to older
        version of bitbake meaning layers using the new syntax/markup could
        work with older releases. Even if other no other changes are accepted
        at this time and we don't backport, it does set us on a path where at
        some point in future we could
        require a more explict syntax.

        I've tested this patch by converting oe-core/meta-yocto to the new
        syntax for overrides (9000+ changes) and then seeing that builds
        continue to work with this patch.

        (Bitbake rev: 0dbbb4547cb2570d2ce607e9a53459df3c0ac284)

        Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>

Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
2021-08-02 17:17:53 -04:00
Christopher Clark
3e128c1bcd xen, xen-tools: fix build and passing of CFLAGS via Xen vars
Ensure that the Xen build system variables EXTRA_CFLAGS_XEN_CORE and
EXTRA_CFLAGS_XEN_TOOLS are passed into the compile steps.

Update the hypervisor compilation to avoid passing in most compile flags
from the build environment via EXTRA_CFLAGS_XEN_CORE -- prefer the
compiler defaults and the flags set by the Xen build system, so only the
debug prefix flags are provided.

Observeration derived from the prior commit e99974aa, so:
Reported-by: Diego Sueiro <diego.sueiro@arm.com>
Signed-off-by: Christopher Clark <christopher.w.clark@gmail.com>
Reviewed-by: Bertrand Marquis <bertrand.marquis@arm.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
2021-07-14 15:33:10 -04:00
Christopher Clark
4d61693058 xen, xen-tools: apply upstream fixes for gcc11 compilation
Apply patches for the tools and hypervisor to Xen 4.15 and the git
recipe and uprev Xen 4.14 to latest stable revision.
Retire the previous -Wno-vla-parameter workaround.

Signed-off-by: Christopher Clark <christopher.w.clark@gmail.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
2021-07-14 15:33:10 -04:00
Diego Sueiro
e99974aa57 xen-tools: Pass -Wno-vla-parameter to workaround when compiling with gcc-11
When compiling xen-tools (4.14 and 4.15) with gcc-11 the following kind of
errors are produced:

linux.c:164:50: error: argument 7 of type 'const xen_pfn_t[]' {aka 'const long unsigned int[]'} declared as an ordinary array [-Werror=vla-parameter]
  164 |                                  const xen_pfn_t arr[/*num*/], int err[/*num*/])
      |                                  ~~~~~~~~~~~~~~~~^~~~~~~~~~~~

Workaround it by passing -Wno-vla-parameter to the compiler.

Signed-off-by: Diego Sueiro <diego.sueiro@arm.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
2021-05-06 16:40:28 -04:00
Christopher Clark
2406c1785d xen-tools: remove multilib build requirement for x86-64
Xen 4.15 added support for standalone x86-64 hvmloader build and
previous commit provided Xen 4.14 backports.

Signed-off-by: Christopher Clark <christopher.w.clark@gmail.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
2021-04-20 17:00:12 -04:00
Bertrand Marquis
8b32646875 xen: Bump SRCREV to 4.14.1 and current master
Bump SRCREV version of xen recipes to use the latest 4.14 release
(4.14.1) and the current status of master.

This allows to remove some patches related to gcc 10 support which have
now been merged in Xen.

Xen-tools is modified to include the latest tools installed with Xen:
- a rename of the bash-completion,
- a new xl example,
- xen-access,
- xen-memshare (only available on x86).

A new patch to fix python and pygrub is added as the makefiles have been
deeply modified in 4.15 which require a new patch (but doing the same).

Signed-off-by: Bertrand Marquis <bertrand.marquis@arm.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
2021-03-04 22:40:57 -05:00
Bertrand Marquis
17660b5e8f xen: Fix python libraries installation on multilib
Fix install path for xen python libraries when multilib configuration is
activated (which is mandatory to compile xen for x86_64).
Depending on the version of Xen, the libraries are installed on lib or
on the nonarch lib directory so add both.

Signed-off-by: Bertrand Marquis <bertrand.marquis@arm.com>
Change-Id: I1f7f81a4e9e1420bce55d1e4bfe03d98ac2c93a3
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
2020-11-14 22:59:03 -05:00
Bertrand Marquis
7a8167fa82 xen: Fix x86_64 xen-tools installation
Python related things are installed in /usr/lib and not /usr/lib64 even
if xen-tools is built for x86_64 with multilib activated.
Use nonarch_libdir variable for all python related files.

Change-Id: I24e4336aaac4477efc5dc7426a6d9e909c98a6af
Signed-off-by: Bertrand Marquis <bertrand.marquis@arm.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
2020-10-15 10:57:16 -04:00
Christopher Clark
0db3901a48 xen, xen-tools: move tools-specific EXTRA_OECONF to xen-tools.inc
Since the hypervisor recipe does not install init scripts, it does not
include update-rc.d.bbclass, which defines INIT_D_DIR; so move the use
of that and systemd and qemu tools-specific configure settings over into
the tools include file. Fix a hardcoded bindir while at it.

Signed-off-by: Christopher Clark <christopher.clark6@baesystems.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
2020-08-02 20:24:07 -04:00
Christopher Clark
5524c6d0fb xen-tools: packaging for new files in Xen 4.14
Signed-off-by: Christopher Clark <christopher.clark6@baesystems.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
2020-07-20 14:47:15 -04:00
Christopher Clark
345505989c xen, xen-tools: update revision to Xen 4.13
Pull to the current tip of the stable 4.13 branch and apply an upstream
4.14-release-acked patch to xen-tools for a compiler warning in kdd.

Signed-off-by: Christopher Clark <christopher.w.clark@gmail.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
2020-07-06 16:25:56 -04:00
Christopher Clark
8af29790ee xen-tools: use non-busybox ifupdown tool if available
Adds: RSUGGESTS_${PN}-scripts-network = "ifupdown"

Signed-off-by: Christopher Clark <christopher.w.clark@gmail.com>
Suggested-by: Corey Minyard <cminyard@mvista.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
2020-07-06 16:25:55 -04:00
Christopher Clark
1e6d9f67ff xen-tools: add RRECOMENDS qemu on ARM and x86 when HVM is enabled
Signed-off-by: Christopher Clark <christopher.w.clark@gmail.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
2020-07-06 16:25:55 -04:00
Martin Jansa
d53fd491d9 xen-tools: fix COMPATIBLE_HOST restriction for i686
* let TARGET_VENDOR to be set to something else than the default:
  meta/conf/bitbake.conf:TARGET_VENDOR = "-oe"
  like other architectures use

Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
2020-03-03 20:03:52 -05:00
Christopher Clark
5591f772fe xen, xen-tools: updates to the deploy task
Amend addtask for deploy in both recipes: add deploy before do_build to
ensure that it completes before the build step stamp is written.
Suggested-by: Bertrand Marquis <bertrand.marquis@arm.com>

Add comments explaining the scheduling of the deploy task to
both the hypervisor and tools recipes.

In the hypervisor build, change deploy to obtain files from ${B} rather
than ${D}, since it allows a bbappend to modify boot binary file
destinations in do_install without breaking do_deploy.

To ensure that a deployed hypervisor has matching tools in any image
being built, add a dependency to make sure that the tools have built and
been staged first:
    do_deploy[depends] += "xen-tools:do_populate_sysroot"

Also add a dependency to ensure that anything that the tools recipe
deploys, such as a XSM policy file, has been deployed first:
    do_deploy[depends] += "xen-tools:do_deploy"

Schedule deploy tasks after populate_sysroot to ensure that deployed
binaries match those staged for inclusion in the image rootfs.

Signed-off-by: Christopher Clark <christopher.clark6@baesystems.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
2020-02-27 16:59:23 -05:00
Christopher Clark
ea94bfc344 xen, xen-tools: remove stubs task and use multilib when necessary
The stubs task was MACHINE-specific due to the OE variables it accessed
which had forced unnecessary rebuild work in OpenXT's multi-MACHINE
builds.

The stubs task was generating a 32-bit header file to satisfy the Xen
tools firmware build to generate the hvmloader binary, which is only
needed on x86-64 targets where HVM-mode guests are enabled.

Remove this header file generation logic and similar in the configure
task, and in the cases where hvmloader is to be built use multilib to
provide a 32-bit sysroot and allow the build to obtain the needed 32-bit
materials from their source: glibc.

Building Xen tools for x86-64 with HVM-guest support enabled now
requires the following to be added to a build conf file
(eg. distro.conf, or local.conf) :

    require conf/multilib.conf
    MULTILIBS = "multilib:lib32"
    DEFAULTTUNE_virtclass-multilib-lib32 = "x86"

Signed-off-by: Christopher Clark <christopher.clark6@baesystems.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
2020-02-27 16:59:23 -05:00
Christopher Clark
a0964e2044 xen, xen-tools: separate COMPATIBLE_HOST for hypervisor and tools
The tools have broader platform compatibility than the hypervisor.

Signed-off-by: Christopher Clark <christopher.clark6@baesystems.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
2020-02-27 16:59:23 -05:00
Christopher Clark
f4eec68635 xen, xen-tools: update recipes for python3
Adds patches for packaged scripts to enable deployment with python3
where they have been ported to python 3 upstream.

setuptools3 inherits distutils3 which modifies ${B}, so cd ${S} is
needed in the do_configure, do_compile and do_install steps.

Remove python 2 dependency from the Xen recipes by adding a new
separate recipe, xen-python2, for packaging the remaining optional
scripts which are yet to be ported to python 3. Package naming in
the separate recipe is chosen to support transition back into the
xen-tools recipe if the scripts are ported later.

Use RSUGGESTS to support inclusion of the xen-python2 scripts in
images that include python 2.

Drop the remus package python dependency since the script was removed
in 2014: commit 5b66f84e37a45038f9e5dae7a5768a5525d1e6ba

Add python3 RDEPENDS needed to run xenmon.

Signed-off-by: Christopher Clark <christopher.clark6@baesystems.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
2020-02-27 16:59:23 -05:00
Christopher Clark
593df044c6 xen-tools: change globbing to fix syntax highlighting
A text editor can interpret /* as the beginning of a comment
and then fail to find the matching */ it expects as a terminator.
This causes it to mishighlight the rest of the file. Avoid this
by using a different matching pattern.

Fixes an annoyance when editing the file. No functional change intended.

Signed-off-by: Christopher Clark <christopher.clark6@baesystems.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
2020-02-27 16:59:23 -05:00
Christopher Clark
fc69b5553a xen: add seabios to RRECOMMENDS of xen-tools when HVM-enabled
Launching HVM guest VMs requires a BIOS firmware binary.

Signed-off-by: Christopher Clark <christopher.clark6@baesystems.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
2020-02-27 16:59:23 -05:00
Christopher Clark
96e287c4b5 xen-tools: move xentrace_setmask into the xentrace package
Signed-off-by: Christopher Clark <christopher.clark6@baesystems.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
2020-02-27 16:59:23 -05:00
Christopher Clark
545461ba2f xen: separate recipes for hypervisor and tools; switch to git as source
This change changes the names of many packages produced: the
xen-tools recipe now builds packages previous built by the xen
recipe, so the package prefix changes from "xen-" to "xen-tools-".
A temporary bbappend is provided for qemu to ease the transition.

Multiple motivations for recipe separation:
- improves efficiency of incremental build and development
- supports building the hypervisor and tools with different toolchains
  and for different architectures

Switch to using a git recipe on the Xen stable branch:
- enables easier tracking of critical XSA security updates applied
  upstream by just advancing SRCREV along the branch
Revision has been set to the tip of the stable-4.12 branch, which
has the one XSA-312 patch applied on top of RELEASE-4.12.2.

The recipe refactor externalizes the block tap components, to enable optional
building of blktap in a separate recipe outside xen-tools, needed by OpenXT.

xenstored is made a virtual package to support switching between
alternative implementations (several exist).

Update xen-image-minimal to install the xen-tools package, which
replaces what was previously xen-base.

Determine the flask policy filename, which is Xen-version specific,
using the same method as the Xen build system.

qemu: update PACKAGECONFIG[xen] for xen package renaming: allows builds
to continue correctly in the meantime while openembedded core and poky
are updated.

OpenXT ticket reference: OXT-1694

Signed-off-by: Christopher Clark <christopher.clark6@baesystems.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
2020-02-27 16:59:23 -05:00