![]() Bumping xen to version 4.20-dev-288-gc23571fe31, which comprises the following commits: 57338346f2 x86/IRQ: avoid double unlock in map_domain_pirq() 1ddc8c1bad CI: Add Ubuntu 22.04 (Jammy) and 24.04 (Noble) testing 6db222eb1f CI: Refresh Ubuntu Focal container as 20.04-x86_64 51e5081c6e CI: Refresh Ubuntu Bionic container as 18.04-x86_64 1ab414b915 CI: Refresh Ubuntu Xenial container as 16.04-x86_64 e85ff1f1af CI: Refresh OpenSUSE Leap container a8bc31be01 CI: Refresh OpenSUSE Tumbleweed container 1e66e18806 CI: Refresh and upgrade the GCC-IBT container 248200bd5b CI: Swap to debian for riscv64 build and test a507bd7d1f CI: Introduce debian:11/12-riscv64 containers d46e4264c3 CI: Refresh bullseye-ppc64le as debian:11-ppc64le 155c9d7f1b CI: Use debian:12-ppc64le for smoke testing a2a0ee0eaf CI: Introduce a debian:12-ppc64le container 5e1773dc86 CI: Mark Archlinux/x86 as allowing failures 4b716647f7 CI: Drop Ubuntu Trusty testing 2617d2f141 CI: Drop Debian Stretch testing aabccd1018 CI: Drop Debian Jessie dockerfiles 83754331a7 CI: Remove useless/misleading randconfig jobs 3420cc1a50 CI: Fix CONTAINER_UID0=1 scripts/containerize 5d3e2140bb automation: Use a different ImageBuilder repository URL d49ba6bf8f build: Drop xorg-x11 as a build dependency 47f465d485 build: Drop libiconv as a build dependecy cb3a371469 build: Drop openssl as a build dependency 37810b52d0 tools/libxs: Fix fcntl() invocation in set_cloexec() 8e7c08a336 stubdom: Remove more leftovers of caml-stubdom c4ebeb79d1 CI: Refresh the Coverity Github Action configuration 64cee18837 build: Fix the version of python checked for by ./configure 7cc95f4166 build: Regenerate ./configure with Autoconf 2.71 0d2b87b5ad x86/physdev: Return pirq that irq was already mapped to c2a66d0b58 CI: Rework the CentOS7 container 7878756565 CI: Adjust the usage of inline files aa2b6e4d84 CI: Formalise the use of heredocs 56b77d7db0 build/mkheader: Fix Syntax/DeprecationWarnings 31618bf80e build/mkheader: Remove C-isms from the code 5d8c784783 tools/xs-clients: Fix `make clean` rule 7e3701b6ce xen/vmap: Document the vmap header a771e02594 xen/riscv: use .insn with operands to support the older gas 63c66274d9 xen: Fix XEN_EXTRAVERSION after 4.19-rc1 fb76e08a8f cmdline: "extra_guest_irqs" is inapplicable to PVH 1f56accba3 amend 'cmdline: document and enforce "extra_guest_irqs" upper bounds' 08daa72cdc xen: avoid UB in guest handle field accessors d2fe9ab304 x86/entry: don't clear DF when raising #UD for lack of syscall handler 17f6d398f7 cmdline: document and enforce "extra_guest_irqs" upper bounds a2ff677852 tools/libxs: Fix CLOEXEC handling in xs_fileno() 1957dd6aff tools/libxs: Fix CLOEXEC handling in get_socket() bf7c146470 tools/libxs: Fix CLOEXEC handling in get_dev() 4c3a618b0a tools/dombuilder: Correct the length calculation in xc_dom_alloc_segment() 9ec74bdb25 xen/common: fix build issue for common/trace.c daa90dfea9 pirq_cleanup_check() leaks 4a73eb4c20 Update Xen version to 4.19-rc 7584e39986 Config.mk pin QEMU_UPSTREAM_REVISION (prep for Xen 4.19 RC1) 08f9b1dd9c MAINTAINERS: Step down as maintainer and committer 6d41f5b9e1 automation/eclair: add deviations agreed in MISRA meetings 402e473249 x86/traps: address violations of MISRA C Rule 20.7 bfea273b7b automation/eclair_analysis: clean ECLAIR configuration scripts 8f5581d7e1 x86/irq: address violations of MISRA C Rule 20.7 c7e195fac0 automation/eclair_analysis: address violations of MISRA C Rule 20.7 f39642c308 xen/guest_access: address violations of MISRA rule 20.7 4929fea7bd xen/self-tests: address violations of MISRA rule 20.7 0dca0f2b9a automation/eclair: address violations of MISRA C Rule 20.7 ecadd22a3d CHANGELOG: Add entries related to tracing dde20e47af tools/xenalyze: Remove argp_program_bug_address 188e5f1a80 CHANGELOG.md: Fix indentation of "Removed" section 4712e3b376 Config.mk: update MiniOS commit 853f707cd9 automation/eclair_analysis: deviate and|or|xor|not for MISRA C Rule 21.2 0ac3b175e7 automation/eclair: configure Rule 13.6 and custom service B.UNEVALEFF 11ea49a3fd gnttab: fix compat query-size handling 735865f884 xen: re-add type checking to {,__}copy_from_guest_offset() 93db2f64f3 MAINTAINERS: Update my email address again b14dae96c0 x86/pagewalk: Address MISRA R8.3 violation in guest_walk_tables() 6e07f41b27 common/unlzo: address violation of MISRA C Rule 7.3 c2f4ea4dc9 automation/eclair: add more guidelines to the monitored set 5add709cc6 automation/eclair: add deviations of MISRA C Rule 5.5 912412f97a automation/eclair: add deviation for MISRA C Rule 17.7 c56f1ef577 xen/arm: static-shmem: request host address to be specified for 1:1 domains 908407bf2b xen/riscv: Drop legacy __ro_after_init definition 8c3bb4d8ce xen/gnttab: Perform compat/native gnttab_query_size check ebed411e7a xen/xlat: Sort structs per file 90c1520d4e xen/xlat: Sort out whitespace 6a17e11993 x86/shadow: Don't leave trace record field uninitialized 8765783434 x86/shadow: Rework trace_shadow_emulate_other() as sh_trace_gfn_va() 578066d82b x86/shadow: Introduce sh_trace_gl1e_va() 2e9f8a734e x86/shadow: Rework trace_shadow_gen() into sh_trace_va() ba52b3b624 tools/xl: Open xldevd.log with O_CLOEXEC 9e7c26ad85 libelf: avoid UB in elf_xen_feature_{get,set}() c5746b021e x86/ioapic: Fix signed shifts in io_apic.c 62071a1c16 livepatch: use appropriate type for buffer offset variables e2bb28d621 x86/irq: forward pending interrupts to new destination in fixup_irqs() 74970165ba tools/libs/light: Fix nic->vlan memory allocation f16ac12bd4 hotplug: Restore block-tap phy compatibility 43d5c5d5f7 xen: avoid UB in guest handle arithmetic 267122a24c x86/defns: Clean up X86_{XCR0,XSS}_* constants 71cacfb035 x86/cpuid: Fix handling of XSAVE dynamic leaves fdb7e77fea x86/cpu-policy: Simplify recalculate_xstate() df09dfb94d x86/xstate: Rework xstate_ctxt_size() as xstate_uncompressed_size() a09022a09e x86/boot: Collect the Raw CPU Policy earlier on boot d31a111940 x86/xstate: Cross-check dynamic XSTATE sizes at boot 9e6dbbe8bf x86/xstate: Fix initialisation of XSS cache aba98c8d67 xen/arch: Centralise __read_mostly and __ro_after_init 82f4809447 xen/irq: Address MISRA Rule 8.3 violation efa6e9f15b Revert "xen/arm: Alloc XenStore page for Dom0less DomUs from hypervisor" 443c488a0b Revert "docs/features/dom0less: Update the late XenStore init protocol" 988f1c7e1f xen/arm: static-shmem: fix "gbase/pbase used uninitialized" build failure 53c5c99e87 docs/features/dom0less: Update the late XenStore init protocol 6f9d90ea94 xen/arm: Alloc XenStore page for Dom0less DomUs from hypervisor cb1ddafdc5 xen/arm/static-shmem: Static-shmem should be direct-mapped for direct-mapped domains bd59af9970 xen/ubsan: Fix UB in type_descriptor declaration 369558924a x86/irq: handle moving interrupts in _assign_irq_vector() 817d1cd627 x86/irq: deal with old_cpu_mask for interrupts in movement in fixup_irqs() fa4d026737 x86/Intel: unlock CPUID earlier for the BSP 77b1ed1d02 automation/eclair_analysis: add more clean MISRA guidelines 0f0235e9e9 automation/eclair_analysis: address remaining violations of MISRA C Rule 20.12 8b4243a9b5 xen/docs: Describe static shared memory when host address is not provided 3deac416a3 xen/arm: Implement the logic for static shared memory from Xen heap a21bfc9126 xen/arm: Rework heap page allocation outside allocate_bank_memory 1544d355b5 xen/arm: Parse xen,shared-mem when host phys address is not provided 3e2121ce47 xen/p2m: put reference for level 2 superpage 79a43c8838 xen/arm: Wrap shared memory mapping code in one function e90f8d562d xen/arm: Lookup bootinfo shm bank during the mapping 4fdd8d7556 x86/EPT: drop questionable mfn_valid() from epte_get_entry_emt() 777c71d313 x86/EPT: avoid marking non-present entries for re-configuring 5540b94e81 x86/EPT: correct special page checking in epte_get_entry_emt() b490f470f5 xen/arm: ffa: support notification 452551c723 xen/arm: add and call tee_free_domain_ctx() dd348eb005 xen/arm: add and call init_tee_secondary() 67ef3db45a xen/arm: allow dynamically assigned SGI handlers 282c33cec3 xen/arm: ffa: simplify ffa_handle_mem_share() 4d2b1b5d69 xen/arm: ffa: use ACCESS_ONCE() 66e6e47511 xen/arm: ffa: refactor ffa_handle_call() 401448f2d1 x86/physdev: replace physdev_{,un}map_pirq() checking against DOMID_SELF c7564d7366 x86/irq: limit interrupt movement done by fixup_irqs() 0e8cde5884 x86/irq: describe how the interrupt CPU movement works 171c52fba5 x86/smp: do not use shorthand IPI destinations in CPU hot{,un}plug contexts b0e5352c60 MAINTAINERS: alter EFI section d05d97c090 MAINTAINERS: add me as scheduler maintainer 5ea7f2c9d7 CI: Update FreeBSD to 13.3 43de96a70f automation: add a test for HVM domU on PVH dom0 ea1cb444c2 x86/pvh: declare PVH dom0 supported with caveats 0a5b2ca32c x86/domain: deviate violation of MISRA C Rule 20.12 e63209d3ba x86/irq: remove offline CPUs from old CPU mask when adjusting move_cleanup_count c2d5e63c73 xen: fix MISRA regressions on rule 20.9 and 20.12 5f7606c048 xen/bitops: Rearrange the top of xen/bitops.h 04e70af5f2 xen/bitops: Clean up ffs64()/fls64() definitions 54b10ef6c8 xen/bitops: Implement fls()/flsl() in common logic 5ed26fc076 xen/bitops: Implement ffsl() in common logic 989e5f08d3 x86/bitops: Improve arch_ffs() in the general case ef1dd8dff4 xen/bitops: Implement ffs() in common logic 95ddb7e9b0 xen/bitops: Implement generic_ffsl()/generic_flsl() in lib/ ea59e7d780 xen/bitops: Cleanup and new infrastructure ahead of rearrangements 1408cf7a28 xen/bitops: Delete find_first_set_bit() 03147e6837 arch/irq: Centralise no_irq_type 8aeda4a241 arch/irq: Make irq_ack_none() mandatory 16884ac6c8 CI: Improve serial handling in qemu-smoke-ppc64le.sh 2ff6d17bc3 CI: Use a debug build of Xen for the Xilinx HW tests 1250c73c1a xen/riscv: Update Kconfig in preparation for a full Xen build db04be9e7d x86/hvm: allow XENMEM_machine_memory_map 9a905d7dc6 xen/bitops: Replace find_first_set_bit() with ffs()/ffsl() - 1 1773a74469 xen/page_alloc: Coerce min(flsl(), foo) expressions to being unsigned e807b137f7 ppc/boot: Run constructors on boot 6ef4fa1e7f tools: (Actually) drop libsystemd as a dependency 12f9599a3b Partial revert of "x86/MCE: optional build of AMD/Intel MCE code" 845a60b63b xen/x86: remove foreign mappings from the p2m on teardown 0291089f6e xen: enable altp2m at create domain domctl 8ef1e96a04 xen/x86: account number of foreign mappings in the p2m 0840bc5ea1 xen: Introduce CONFIG_SELF_TESTS 2bc462f645 x86: address violations of MISRA C Rule 8.4 19b6e9f914 x86/MCE: optional build of AMD/Intel MCE code 5effd810c6 x86/MCE: add default switch case in init_nonfatal_mce_checker() 498a4ded74 x86/intel: move vmce_has_lmce() routine to header d27c2835e0 x86/svm: Rework VMCB_ACCESSORS() to use a plain type name 58b3437bae xen/x86: Address two misc MISRA 17.7 violations 2d082710f7 xen/x86: Drop useless non-Kconfig CONFIG_* variables 56d3b24979 xen/lzo: Implement COPY{4,8} using memcpy() 2d93f78bfe x86/traps: address violation of MISRA C Rule 8.4 8b977fe572 CHANGELOG: Mention libxl blktap/tapback support 96af090e33 automation/eclair_analysis: avoid an ECLAIR warning about escaping 841f437a8b docs/misra: exclude gdbsx from MISRA compliance 1eba1fe18d automation/eclair_analysis: add already clean rules to the analysis 4bc8dc01a3 automation/eclair_analysis: set MISRA C Rule 10.2 as clean ac572152e5 docs: Add device tree overlay documentation 2c4fbadf73 tools: Introduce the "xl dt-overlay attach" command 4c733873b5 xen/arm: Add XEN_DOMCTL_dt_overlay and device attachment to domains 1c77496bc8 xen/arm/gic: Allow adding interrupt to running VMs 6f588194d9 tools/arm: Introduce the "nr_spis" xl config entry 1d2b4f3049 xen/arm, doc: Add a DT property to specify IOMMU for Dom0less domUs c8cbc5eb1c tools/xl: Correct the help information and exit code of the dt-overlay command 2172a01c4c tools/xenalyze: Ignore HVM_EMUL events harder 320e644616 x86/hvm/trace: Use a different trace type for AMD processors 701190abb3 xen/arm: Set correct per-cpu cpu_core_mask 2a40b106e9 tools/xentrace: Remove xentrace_format ae26101f6b tools: Drop libsystemd as a dependency caf8644826 tools/{c,o}xenstored: Don't link against libsystemd 78510f3a15 tools: Import stand-alone sd_notify() implementation from systemd 219cdff3fb LICENSES: Add MIT-0 (MIT No Attribution) 9e58da32cc xen/arm: mem_access: Conditionally compile mem_access.c d6a7fd8303 vpci: add initial support for virtual PCI bus topology 9c831e429c vpci/header: emulate PCI_COMMAND register for guests 7db7bd0f31 arm/vpci: honor access size when returning an error 2c15fa332e x86: detect PIT aliasing on ports other than 0x4[0-3] 249affc129 x86/PIT: supply and use #define-s e6ed98863b xen/riscv: add required things to current.h 3cd46d4ec8 xen/riscv: introduce atomic.h 51dabd6312 xen/riscv: introduce cmpxchg.h 9f482c6a7e xen/x86: Simplify header dependencies in x86/hvm 212cb5effa iommu/x86: print RMRR/IVMD ranges using full addresses 3a3111d018 xen/livepatch: make .livepatch.funcs read-only for in-tree tests ced21fbb28 x86_64/cpu_idle: address violations of MISRA C Rule 20.7 1b0b050bd6 x86_64/uaccess: address violations of MISRA C Rule 20.7 670b7ec65d x86/hvm: address violations of MISRA C Rule 20.7 1b9311da4b x86/vpmu: address violations of MISRA C Rule 20.7 bba4eb88fd xen/common/dt-overlay: Fix lock issue when add/remove the device 24dbf5bd03 x86/p2m: Add braces for better code clarity ed1ac3e968 xen/riscv: introduce vm_event_*() functions 7e036f7e0c xen/riscv: introduce monitor.h 44b69e9c17 xen/x86: pretty print interrupt CPU affinity masks 9c5444b01a xen/trace: Drop old trace API aa60520cd3 xen/trace: Removal final {__,}trace_var() users in favour of the new API 26da08059e xen: Switch to new TRACE() API d64693df1a xen/sched: Clean up trace handling df50666449 xen/rt: Clean up trace handling ab8bc19850 xen/credit2: Clean up trace handling e978b462ec xen/trace: Introduce new API 26b122e3bf tools/xen-cpuid: Drop old names bbb5c171d7 tools/xen-cpuid: Use automatically generated feature names e96fefdb06 tools/xen-cpuid: Rename decodes[] to leaf_info[] f79189cb29 x86/gen-cpuid: Minor cleanup 54aa34fc89 tools/golang: Add missing golang bindings for vlan 594b22ca5b x86/msi: prevent watchdog triggering when dumping MSI state 21611c6870 include/ctype.h: fix MISRA R10.2 violation 53dc37829c xen/arm: Add DT reserve map regions to bootinfo.reserved_mem d946787a27 xen/arm64: lib: Use the generic xen/linkage.h macros fe1b97d321 xen/arm64: cache: Use the generic xen/linkage.h macros c9906bd79e xen/arm64: mmu/head: Add missing code symbol annotations 8151fe503c xen/arm64: bpi: Add missing code symbol annotations fdba3ff11f xen/arm64: debug: Add missing code symbol annotations fba250ae60 xen/arm64: head: Add missing code symbol annotations 78ce1dc625 xen/arm64: sve: Add missing code symbol annotations 8d92a26a41 xen/arm64: smc: Add missing code symbol annotations 1125f3529c xen/arm64: entry: Add missing code symbol annotations 977d98e67c x86/ucode: Further fixes to identify "ucode already up to date" ae7584f636 x86/p2m: move altp2m-related code to separate file f1fa994d89 x86/MCE: guard {intel/amd}_mcheck_init() calls 71b5eccbdd x86/MCE: guard access to Intel/AMD-specific MCA MSRs a3ec23a940 x86/vpmu: separate amd/intel vPMU code 6628bacc81 xen/bitops: put __ffs() into linux compatible header d0c6114058 x86: detect PIC aliasing on ports other than 0x[2A][01] c09960a1a2 x86: allow to suppress port-alias probing 762a848223 automation/eclair_analysis: deviate macro count_args_ for MISRA Rule 20.7 7fe9679db9 automation/eclair_analysis: fully deviate MISRA C Rules 21.9 and 21.10 abd00b037d x86/mtrr: avoid system wide rendezvous when setting AP MTRRs 0cc01c603f tools/xl: add vlan keyword to vif option 3bc14e4fa4 tools/libs/light: Add vlan field to libxl_device_nic e27fc7d15e tools/xentop: Fix cpu% sort order 9b7d793889 tools/hvmloader: Further simplify SMP setup 8a78d89881 x86/cpufreq: Rename cpuid variable/parameters to cpu 7270fdc7a0 x86: respect mapcache_domain_init() failing d104a07524 xen/sched: set all sched_resource data inside locked region for new cpu 319a5125ca xen/console: fix Rule 10.2 violation 46aa3031ae docs/misra: add R21.6 R21.9 R21.10 R21.14 R21.15 R21.16 9110072b76 x86/io: Don't cast away constness in read{b..q}() 2d8d7481ca Revert "evtchn: refuse EVTCHNOP_status for Xen-bound event channels" 90a1bc9e82 xen: Use -Wuninitialized and -Winit-self 0b01395c44 xen: Use -Wflex-array-member-not-at-end when available d31d0665f1 automation/eclair_analysis: tag MISRA C Rule 1.1 as clean 531d3bea5e libxl: Fix handling XenStore errors in device creation b2cd07a044 x86/hvm: Allow access to registers on the same page as MSI-X table e9607d4061 x86/msi: Extend per-domain/device warning mechanism 5cc7347b04 libxl: fix population of the online vCPU bitmap for PVH 996576b965 xen: allow up to 16383 cpus b0082b9083 automation/eclair: hide reports coming from adopted code in scheduled analysis f4cd14e502 automation/eclair_analysis: amend configuration for some MISRA rules 93c27d54dd xen/arm: Fix MISRA regression on R1.1, flexible array member not at the end 1672df9ebd xen/kernel.h: Import __struct_group from Linux 53959cb830 x86/boot: Refactor pvh_load_kernel() to have an initrd_len local 49c810e867 x86/boot: Explain how moving mod[0] works fcefb2a247 x86/IOMMU: address violations of MISRA C:2012 Rule 14.4 3d1033c911 automation/eclair: add deviation of MISRA C:2012 Rule 14.4 14424d90e1 xen/pci: address violations of MISRA C Rule 20.7 8e22c78e17 xen/unaligned: address violation of MISRA C Rule 20.7 1dd6b50dc4 x86/hvm: Defer the size calculation in hvm_save_cpu_xsave_states() 752ec9a9b1 tools/hvmloader: Wake APs with hypercalls rather than INIT+SIPI+SIPI 754a29cacf tools/hvmloader: Move various helpers to being static inlines 1c6112b8f5 xen/gunzip: Move crc state into gunzip_state 7a4483358f xen/gunzip: Move bitbuffer into gunzip_state d386a383dd xen/gunzip: Move output count into gunzip_state fd273a5690 xen/gunzip: Move input buffer handling into gunzip_state 461eacc76b xen/gunzip: Move window position into gunzip_state 02e32883f3 xen/gunzip: Introduce struct gunzip_state and refactor window 473156eec6 xen/gunzip: don't leak memory on error paths 648db37a15 x86/ucode: Distinguish "ucode already up to date" 3c228e24b2 automation/eclair_analysis: unblock pipelines from certain repositories 0c79b7bc9b automation/eclair_analysis: tag MISRA C Rule 8.2 as clean. e8e8afee99 svm: Fix MISRA 8.2 violation a2330b51df x86/cpu-policy: Fix migration from Ice Lake to Cascade Lake f4f2f3402b tools/libxs: Open /dev/xen/xenbus fds as O_CLOEXEC ebab808eb1 x86/platform: correct #undef in compat checking d7032b4ca2 AMD/IOMMU: add helper to check whether ATS is to be used for a device b5996ab284 VT-d: parse ACPI "SoC Integrated Address Translation Cache Reporting Structure"s 426dbf404e VT-d: tidy error handling of RMRR parsing 692f6199bd automation/eclair: add deviation for Rule 16.4 50a4f7c177 docs/misra: add Terms & Definitions section to rules.rst 6654248f22 ppc/riscv: fix arch_acquire_resource_check() b801ccfe7e drivers/char: address violation of MISRA C Rule 20.7 04e31583ba VT-d: correct ATS checking for root complex integrated devices f95cd010cb xen/Kconfig: Drop the final remnants of ---help--- 2d4ba20559 tools/tests: let test-xenstore exit with non-0 status in case of error 642005e310 tools/tests: don't let test-xenstore write nodes exceeding default size feb9158a62 automation/eclair: make explicit there are no adopted files by default 7556f46a9b automation: do not allow failure for triggered analyses c1aa6fb5f6 automation/eclair: tag Rule 7.2 as clean and temporarily remove Rules 1.1 and 8.2 9e30bd8f4a x86/cpu-policy: Annotate the accumulated features b819bd65f4 revert "x86/mm: re-implement get_page_light() using an atomic increment" bf0059282d xen/riscv: improve check-extension() macro 08e79bba73 xen/x86: Fix Syntax warning in gen-cpuid.py 647f7e50eb xen/xsm: Wire up get_dom0_console abc68e78a3 x86/MCE: guard call to Intel-specific intel_get_extended_msrs() 64b21662b1 x86/msi: passthrough all MSI-X vector ctrl writes to device model be5b08dd6e xen-livepatch: fix --force option comparison 13893a58e2 xen/spinlock: use correct pointer a505890d81 x86/entry: shrink insn size for some of our EFLAGS manipulation fd4ff921f7 gzip: clean up comments and fix code alignment 232ee07c23 arm/vpci: make prefetchable mem 64 bit a0e29b3163 CI: Drop glibc-i386 from the build containers 4edbbcd0c0 automation/eclair: reorganize pipelines 23cd1207e7 VMX: no open-coding in vmx_get_cpl() 7ea3a3e44f MAINTAINERS: Update my email address 656ae8f109 x86/spec: adjust logic that elides lfence 049ab0b2c9 x86/spec: fix reporting of BHB clearing usage from guest entry points 6d5111b10e tools/ocaml: Fix warnings in config.ml 524eee7ce0 x86/hap: Refactor boolean field assignments bd5213384b x86/shadow: correct shadow_vcpu_init()'s comment 9a73b4e210 x86/paging: vCPU host mode is always set 8c01d0e336 x86/msr: add suffix 'U' to MSR_AMD_CSTATE_CFG macro ea3272f845 x86/pci: add suffix 'U' to PCI_CONF_ADDRESS macro 62a72092a5 livepatch: introduce --force option fb2716a191 xen-livepatch: fix parameter name parsing 4a75f2ffc0 x86/mm: address violations of MISRA C Rule 20.7 445f66fe00 x86/debugreg: address violation of MISRA C Rule 20.7 c717d52a5d x86/vhpet: address violations of MISRA C Rule 20.7 4f900035a4 x86/acpi: address violations of MISRA Rule 20.7 0440fcad2a x86/pci: address violation of MISRA C Rule 20.7 489d13da93 xen/spinlock: address violations of MISRA C Rule 20.7 0d02b75d7c xen/page-defs: address violation of MISRA C Rule 20.7 8189230d80 libelf: address violations of MISRA C Rule 20.7 d7c4d59b51 libxl: Support blktap with HVM device model 76a484193d hotplug: Update block-tap 31d6b5b4a7 automation: Add arm64 test for running Xen with GICv3 db49973411 automation: Add arm{64,32} earlyprintk jobs c05b97fc7a automation: Drop some of the non-debug variants of the same Arm jobs 7846f7699f xen/arm: List static shared memory regions as /memory nodes 51a2b3f109 xen/arm: fix duplicate /reserved-memory node in Dom0 a0fee882c1 xen/arm: remove shm holes from extended regions 2b557af192 xen/arm: Reduce struct membank size on static shared memory e5816ad4e8 xen/arm: Introduce helper for static memory pages 9f657d8832 xen/arm: Avoid code duplication in check_reserved_regions_overlap b3e66aa1c2 xen/arm: Avoid code duplication in find_unallocated_memory e13499b3c4 xen/arm: Conditional compilation of kernel_info.shm_mem member 2209c1e35b xen/arm: Introduce a generic way to access memory bank structures 8d5ff14477 xen/arm: Pass struct kernel_info parameter to make_{resv,shm}_memory_node 6d14a742f8 xen/arm: avoid repetitive checking in process_shm_node ab327c8e8b xen/arm: remove stale addr_cells/size_cells in assign_shared_memory 6c04a0bf2c tools/golang: Run `go vet` as part of the build process 9c08a88ad0 golang/xenlight: Ensure comments aren't interpreted as docstrings 27c176d298 tools/golang: When returning pointers, actually allocate structrues 0d19d3aab0 svm/nestedsvm: Introduce nested capabilities bit 410ef33439 x86/monitor: allow fast-singlestepping without enabling singlestep monitor 77e25f0e30 x86/MTRR: correct inadvertently inverted WC check f82c43a384 xen: introduce header file with section related symbols 70d46b51e2 docs/man: Add xenwatchdog manual page 9c872b5766 tools/misc: Add xenwatchdogd.c copyright notice e906bfae48 tools/misc: xenwatchdogd enhancements f0fa75c9ea tools/misc: xenwatchdogd: add parse_secs() 43a0706986 x86/rtc: Avoid UIP flag being set for longer than expected cccb7878f3 x86/pvh: zero VGA information c3b40c95da x86/video: add boot_video_info offset generation to asm-offsets 93d6e6efa8 automation/eclair_analysis: substitute deprecated service STD.emptrecd bc5827fad1 xen/riscv: check whether the assembler has Zbb extension support 1fc166d6cd xen/domain: deviate MISRA C Rule 16.2 violation 480179bc26 x86/PVH: Use unsigned int for dom0 e820 index 09cb855f33 x86/svm: Add flushbyasid in the supported features 5495ed0cd2 eclair_analysis: deviate x86 emulator for Rule 16.2 1d2d283818 xen/riscv: add minimal stuff to page.h to build full Xen 58798e3f1f xen/riscv: introduce io.h 5b33845adf xen/ppc: mm-radix: Replace debug printing code with printk 78d980071a x86/MCE: move intel mcheck init code to separate file 8763eb782b xen/gzip: Drop huffman code table tracking 052cf1dcdf xen/gzip: Remove custom memory allocator 492fe0778b xen/gzip: Drop unused define checks 489a46c177 x86/emul: Simplify segment override prefix decoding 4cd66fb56d xen/efi: Rewrite DOS/PE magic checking without memcmp() 02fbb2d591 docs/misra: mark the gzip folder as adopted code 2a9a19be13 Revert "public: s/int/int32_t" 83e081b29e docs: arm: Update where Xen should be loaded in memory afab29d088 public: s/int/int32_t ad363fb17d docs/misra: add Rule 16.4 487838f13a docs/misra/rules.rst: add rule 5.5 c0f890cd9d docs/hypercall-abi: State that the hypercall page is optional cfb922bb7d xen/gzip: Colocate gunzip code files af4cd0a6a6 altcall: fix __alt_call_maybe_initdata so it's safe for livepatch 09abf1b61b libxl: devd: Spawn QEMU for 9pfs 3c7482b73c libxl: Use vkb=[] for HVMs 2b31a1f055 xen/include: move definition of ASM_INT() to xen/linkage.h 6cb501e3e6 MAINTAINERS: Update livepatch maintainers 86c008aa5d tools/misc: xenwatchdogd: add static qualifier 5d09f8cbdc tools/misc: rework xenwatchdogd signal handling 0668d35594 tools/misc: xenwatchdogd: use EXIT_* constants c304bdf1e7 xen/acpi: Allow xen/acpi.h to be included on non-ACPI archs 2145512e21 xen/xsm: address violation of MISRA C Rule 16.2 bbbbd024e8 x86/hvm: address violations of MISRA C Rule 16.2 eeab8c4619 xen/domctl: address violations of MISRA C Rule 16.2 f509d39d5b x86/efi: tidy switch statement and address MISRA violation 24f204748e x86/irq: tidy switch statement and address MISRA violation 3b51a812e0 x86/cpuid: address violation of MISRA C Rule 16.2 6af626c1da x86/vlapic: tidy switch statement and address MISRA violation 478002370c x86/emul: Adjust X86EMUL_OPC_EXT_MASK to placate MISRA 761358b9eb xen/spinlock: Adjust LOCK_DEBUG_INITVAL to placate MISRA e5b93b70d5 xen/vPCI: Remove shadowed variable 52bde26c1c xen/nospec: Remove unreachable code d0a718a45f x86/hvm: Fix Misra Rule 19.1 regression d37c184236 xen/virtual-region: Drop setup_virtual_regions() 038ba305fd xen/virtual-region: Link the list build time 3434518d05 xen/virtual-region: Rework how bugframe linkage works 337f11ea73 xen/link: Introduce a common BUGFRAMES definition 0e7ea8ca5f x86/Kconfig: Introduce CONFIG_{AMD,INTEL} and conditionalise ucode 2eea952b70 x86/ucode: Move vendor specifics back out of early_microcode_init() f48299cad5 docs/misra: document the expected sizes of integer types dfc9455b80 MAINTAINERS: Become a reviewer of iMX8Q{M,XP} related patches 2f85a6d9f5 xen/drivers: imx-lpuart: Replace iMX8QM compatible with iMX8QXP 71d4356544 xen/arm: Add imx8q{m,x} platform glue a9fa825008 x86/entry: Fix build with older toolchains d5887c0dec x86/spec-ctrl: Support the "long" BHB loop sequence 689ad48ce9 x86/spec-ctrl: Wire up the Native-BHI software sequences 954c983abc x86/spec-ctrl: Software BHB-clearing sequences 62a1106415 x86/spec-ctrl: Support BHI_DIS_S in order to mitigate BHI c94e210592 x86/tsx: Expose RTM_ALWAYS_ABORT to guests 0b66d7ce3c x86: Drop INDIRECT_JMP 8e186f98ce x86: Use indirect calls in reset-stack infrastructure 45dac88e78 x86/spec-ctrl: Widen the {xen,last,default}_spec_ctrl fields 97c5b8b657 x86/vmx: Add support for virtualize SPEC_CTRL 40dea83b75 x86/spec-ctrl: Detail the safety properties in SPEC_CTRL_ENTRY_* 2378d16a93 x86/spec-ctrl: Simplify DO_COND_IBPB 9607aeb660 x86/spec_ctrl: Hold SCF in %ebx across SPEC_CTRL_ENTRY_{PV,INTR} 22390697bf x86/entry: Arrange for %r14 to be STACK_END across SPEC_CTRL_ENTRY_FROM_PV 94896de1a9 x86/spec-ctrl: Rework conditional safety for SPEC_CTRL_ENTRY_* c62673c433 x86/spec-ctrl: Rename spec_ctrl_flags to scf 489d93cd0f x86/spec-ctrl: Fix BTC/SRSO mitigations 4b3da946ad x86/cpuid: Don't expose {IPRED,RRSBA,BHI}_CTRL to PV guests 4be1fef1e6 x86/alternatives: fix .init section reference in _apply_alternatives() 9926e692c4 hypercall_xlat_continuation: Replace BUG_ON with domain_crash 6a98383b08 x86/HVM: clear upper halves of GPRs upon entry from 32-bit code 672b26b66e drivers: char: Enable OMAP UART driver for TI K3 devices c079823df6 xen/compiler: address violation of MISRA C Rule 20.9 dfc9fab003 x86/PVH: Support relocatable dom0 kernels 4d3b8669d8 libelf: Store maximum PHDR p_align 77b219f915 xen/rwlock: raise the number of possible cpus c286bb93d2 xen/spinlock: support higher number of cpus 0b09531d21 xen/spinlock: let all is_locked and trylock variants return bool bfbec024b8 xen/spinlock: split recursive spinlocks from normal ones 31be78285c xen/spinlock: add missing rspin_is_locked() and rspin_barrier() ee1e133125 xen/spinlock: add another function level 3696a9f27d xen/spinlock: add explicit non-recursive locking functions 402c2d3e66 MISRA C Rule 17.1 states: "The features of `<stdarg.h>' shall not be used" ea33a6e1e3 MISRA C:2012 Rule 17.1 states: The features of `<stdarg.h>' shall not be used 80d28865e1 automation/eclair: add deviations for Rule 20.7 6bdb67d19e arm/public: address violations of MISRA C Rule 20.7 e9b0f8b690 x86: Address MISRA Rule 13.6 b33f191e3c x86/tsx: Cope with RTM_ALWAYS_ABORT vs RTM mismatch 270588b9b2 char: lpuart: Drop useless variables from UART structure 4932163b35 drivers: char: Drop useless suspend/resume stubs in Arm drivers 6eeb3e86bd vsprintf: address violations of MISRA C:2012 Rule 16.3 226bdb155b xen/sched: address violations of MISRA C:2012 Rule 16.3 21e0c8fc0e tools: Move MB/GB() to common-macros.h 4c41749852 tools/init-xenstore-domain: Replace variable MB() usage 1e6cd4155d xen/riscv: introduce extension support check by compiler 7b02b505bb automation: introduce fixed randconfig for RISC-V 6117179dd9 docs/misra: add 13.6 to rules.rst 538ab07bad xen/arm: ffa: support FFA_FEATURES be75f686eb xen/arm: ffa: separate rxtx buffer routines bded3e6467 xen/arm: ffa: separate partition info get routines 8836867200 xen/arm: ffa: separate memory sharing routines bb584ec036 xen/arm: ffa: move common things to ffa_private.h b21cbaf6ba xen/arm: ffa: rename functions to use ffa_ prefix ac682fbac1 xen/vm-event: address a violation of MISRA C:2012 Rule 16.3 cde0c58714 xen/evtchn: address a violation of MISRA C:2012 Rule 16.3 163ea7d9a8 console: address a violation of MISRA C:2012 Rule 16.3 2c205ce5c0 xen/domctl: address a violation of MISRA C:2012 Rule 16.3 795c4e367b x86/amd: address violations of MISRA C Rule 20.7 da88f434bc xen/mm: address violations of MISRA C Rule 20.7 5811fb4816 x86/hvm: address violations of MISRA C Rule 20.7 a9b2a72926 x86/vPMU: address violations of MISRA C Rule 20.7 dd5101a616 drivers/char: mark extra reserved device memory in memory map 7a09966e7b x86/spec-ctrl: Move __read_mostly data into __ro_after_init 3c9e76cd87 x86/mm: Refine address alignment checks in modify_xen_mappings_lite() 8f85af65af tools/oxenstored: Re-format 0cd50753eb nestedsvm: Disable TscRateMSR 4f8b0e94d7 x86: Move SVM features exposed to guest into hvm_max_cpu_policy e3883336bb xen/efi: efibind: address violations of MISRA C Rule 20.7 853c71dfbf xen/elfnote: Specify ELF Notes are x86-specific 7d8c9b4e8d libelf: Expand ELF note printing 8802230bfa Revert "xen/x86: bzImage parse kernel_alignment" f6a4139948 x86/public: address violations of MISRA C Rule 20.7 a65d9988ad x86/hvm: address violations of Rule 20.7 e2eeb1b753 xen/page_alloc: address violations of MISRA C Rule 20.7 cab6de6a95 xen: address MISRA C Rule 20.7 violation in generated hypercall 7757981d94 xentrace: address violation of MISRA C Rule 20.7 12a3b90c2a xen/list: address violations of MISRA C Rule 20.7 6f6de10ade xen/xsm: add parentheses to comply with MISRA C Rule 20.7 4b60085b6e xen/console: add comment about external console lock helper 03e484a4f6 x86/vcpu: relax VCPUOP_initialise restriction for non-PV vCPUs d654612e98 xen/riscv: add minimal stuff to processor.h to build full Xen 5095b610df EFI: Introduce inline stub for efi_enabled on !X86 && !ARM cbe393b709 Revert "xen/page_alloc: introduce preserved page flags macro" ee973396f0 x86/cpuid: More AMD features 5205bda5f1 x86/p2m: Coding style cleanup 97b90f9bf2 xen/ppc: Ensure ELF sections' physical load addresses start at 0x0 10e8d824b7 AMD/IOMMU: drop remaining guest-IOMMU bits too cc950c49ae x86/PoD: tie together P2M update and increment of entry count f5c2b6da26 xen/page_alloc: introduce page flag to stop buddy merging 75214d5e53 xen/page_alloc: introduce preserved page flags macro 6eb13b6b1d tools/xl_parse: remove message for tsc mode string eaafbd1134 docs/parse-support-md: Handle BulletList 188fa82305 xen/vpci: Improve code generation in mask_write() 131892e0dc x86/boot: Support the watchdog on newer AMD systems f658321374 x86/boot: Fix setup_apic_nmi_watchdog() to fail more cleanly 9e18f33983 x86/boot: Improve the boot watchdog determination of stuck cpus d2276b86e5 xen/nospec: Include <xen/stdbool.h> d9e709e8c0 xen/wait: address violations of MISRA C Rule 20.7 239b72d874 xen/notifier: address violations of MISRA C Rule 20.7 88822d5fbd xen/arm: smmu: address violations of MISRA C Rule 20.7 8e7207d512 EFI: address violations of MISRA C Rule 20.7 b51d7f39dc xen/device_tree: address violations of MISRA C Rule 20.7 9979cc594a x86/cpufeature: add parentheses to comply with Rule 20.7 a02174c6c8 amd/iommu: clean up unused guest iommu related functions b053075d1a xen/spinlock: make struct lock_profile rspinlock_t aware cc3e8df542 xen/spinlock: add rspin_[un]lock_irq[save|restore]() c9aca2a1f6 xen/spinlock: rename recursive lock functions 475080b6b2 xen/spinlock: introduce new type for recursive spinlocks a97de92e76 IOMMU: store name for extra reserved device memory 62018f0870 x86/mm: use block_lock_speculation() in _mm_write_lock() d92a67b60c xen/sched: address violations of MISRA C Rule 20.7 f93d8dd519 automation/eclair: allow parameter name "unused" a5b90a90ee MAINTAINERS: remove myself from various positions ad52857efc MAINTAINERS: drop AMD IOMMU and Intel VT-d sections 8a8d5c22af perfc: add pseudo-keyword fallthrough 53b5208de8 x86/svmdebug: Print np, sev and sev_es vmcb bits 2f09f797ba x86/svm: Drop the suffix _guest from vmcb bit d638e304f1 SUPPORT.MD: Fix matrix generation after 43c416d0d819 and 77c39a53cf5b 77c39a53cf xen/arm: arm32: Add emulation of Debug Data Transfer Registers 43c416d0d8 xen/arm: arm64: Add emulation of Debug Data Transfer Registers bd06cf74fc xen/arm: Introduce CONFIG_PARTIAL_EMULATION and "partial-emulation" cmd option af7fed3fdf xen/spinlock: remove misra rule 21.1 violations 68e008db0c xen: avoid grep fodder define and undef 70e549fd44 MAINTAINERS: Remove myself from several subsystems a6081d0176 x86/svm: Drop the _enabled suffix from vmcb bits d2686bf964 xen/compiler: deviate the inline macro for MISRA C Rule 20.4 3945b61ddb xen/lz4: address violations of MISRA C:2012 Directive 4.10 ec2587ab4b x86/mtrr: address violations of MISRA C:2012 Directive 4.10 13a7b0f9f7 restrict concept of pIRQ to x86 4dc9a8b060 automation/eclair_analysis: deviate certain macros for Rule 20.12 Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com> |
||
---|---|---|
.. | ||
files | ||
README | ||
README.test | ||
xen_4.18.bb | ||
xen_4.19.bb | ||
xen_git.bb | ||
xen-arch.inc | ||
xen-blktap.inc | ||
xen-hypervisor.inc | ||
xen-tools_4.18.bb | ||
xen-tools_4.19.bb | ||
xen-tools_git.bb | ||
xen-tools.inc | ||
xen.inc | ||
xtf_git.bb |
Xen
For any issues with the Xen recipes please make sure you CC: christopher.w.clark@gmail.com cardoe@gentoo.org
configuring the hypervisor
Since 4.7.0 Xen supports using Kconfig to configure the hypervisor. Similarly to how the recipe for busybox works, you can provide a .config as a defconfig to override the default configuration of the hypervisor. The easiest way for you to take advantage of this is to create a .config for Xen and then copy it to your Yocto layer as 'defconfig' inside of 'recipes-extended/xen/files/' and then create a bbappend adding 'file://defconfig' to your SRC_URI.
To generate your own .config file for Xen, you can use the interactive menuconfig via bitbake:
bitbake xen -c menuconfig
Select the config settings that you want and Save the file. If you save it to the default ".config" file when prompted by menuconfig, you can find it in the 'xen' subdirectory of the build tree.
Configuration fragments are also supported. To use them you need to list the .cfg files in the SRC_URI.
security patches
The base recipe does not include security fixes that the Xen community releases as XSAs (http://xenbits.xen.org/xsa/). The easiest way to include those is to drop patches in 'recipes-extened/xen/files' and create a bbappend adding those patches to SRC_URI and they will be applied. Alternatively, you can override the SRC_URI to a git repo you provide that contains the patches.
recipe maintenance
Xen version update
The following rules shall be followed to define which versions of Xen have recipes in meta-virtualization:
-
Before a Yocto release meta-virtualization shall have recipes for:
-
the latest stable major version of Xen, and
-
the current version of the Xen master branch (known as the git recipes)
-
In addition, there may also be recipes included for the previous stable major version of Xen, in the case where the latest stable major version is new and the prior stable major version of Xen is to be the preferred version for the Yocto release
-
-
On Yocto LTS and the latest stable Yocto release branch, the preferred Xen major version that is present when the Yocto release is issued must stay supported and the recipes shall be regularly updated to follow updates available in the Xen stable branch for that Xen major release.
-
On Yocto LTS and the latest stable Yocto release branch, the recipes for the latest Xen major version shall also be regularly updated to follow updates available in the Xen stable branch for that Xen major release.
-
On the master / in-development Yocto branch, new Xen recipes shall be added when there is a new Xen major release.
-
depending on the timing of the next Yocto release, the new recipes may be preferred, or the prior major version recipes may remain preferred until after the Yocto release
-
the recipes for the previous Xen stable major version shall be removed from the branch when it is no longer the preferred Xen version
-
-
On Yocto LTS and the latest stable Yocto release branch, new Xen recipes shall be added when there is a new Xen major release.
-
The preferred version of the Xen recipes shall always stay at the same Xen major version once a Yocto release has been issued, and shall receive regular updates to track the stable Xen branch of that Xen release.
-
When new Xen recipes are added to a Yocto branch for a new Xen major version, then any older Xen recipes present, except for the original preferred version recipes, shall be marked as not updated anymore by adding a comment inside the recipes. The older recipes will not receive any build tests or be updated to follow the Xen branch.
-