meta-virtualization/recipes-extended/xen
Bruce Ashfield c29190ec1e xen: update to 4.20-dev
Bumping xen to version 4.20-dev-288-gc23571fe31, which comprises the following commits:

    57338346f2 x86/IRQ: avoid double unlock in map_domain_pirq()
    1ddc8c1bad CI: Add Ubuntu 22.04 (Jammy) and 24.04 (Noble) testing
    6db222eb1f CI: Refresh Ubuntu Focal container as 20.04-x86_64
    51e5081c6e CI: Refresh Ubuntu Bionic container as 18.04-x86_64
    1ab414b915 CI: Refresh Ubuntu Xenial container as 16.04-x86_64
    e85ff1f1af CI: Refresh OpenSUSE Leap container
    a8bc31be01 CI: Refresh OpenSUSE Tumbleweed container
    1e66e18806 CI: Refresh and upgrade the GCC-IBT container
    248200bd5b CI: Swap to debian for riscv64 build and test
    a507bd7d1f CI: Introduce debian:11/12-riscv64 containers
    d46e4264c3 CI: Refresh bullseye-ppc64le as debian:11-ppc64le
    155c9d7f1b CI: Use debian:12-ppc64le for smoke testing
    a2a0ee0eaf CI: Introduce a debian:12-ppc64le container
    5e1773dc86 CI: Mark Archlinux/x86 as allowing failures
    4b716647f7 CI: Drop Ubuntu Trusty testing
    2617d2f141 CI: Drop Debian Stretch testing
    aabccd1018 CI: Drop Debian Jessie dockerfiles
    83754331a7 CI: Remove useless/misleading randconfig jobs
    3420cc1a50 CI: Fix CONTAINER_UID0=1 scripts/containerize
    5d3e2140bb automation: Use a different ImageBuilder repository URL
    d49ba6bf8f build: Drop xorg-x11 as a build dependency
    47f465d485 build: Drop libiconv as a build dependecy
    cb3a371469 build: Drop openssl as a build dependency
    37810b52d0 tools/libxs: Fix fcntl() invocation in set_cloexec()
    8e7c08a336 stubdom: Remove more leftovers of caml-stubdom
    c4ebeb79d1 CI: Refresh the Coverity Github Action configuration
    64cee18837 build: Fix the version of python checked for by ./configure
    7cc95f4166 build: Regenerate ./configure with Autoconf 2.71
    0d2b87b5ad x86/physdev: Return pirq that irq was already mapped to
    c2a66d0b58 CI: Rework the CentOS7 container
    7878756565 CI: Adjust the usage of inline files
    aa2b6e4d84 CI: Formalise the use of heredocs
    56b77d7db0 build/mkheader: Fix Syntax/DeprecationWarnings
    31618bf80e build/mkheader: Remove C-isms from the code
    5d8c784783 tools/xs-clients: Fix `make clean` rule
    7e3701b6ce xen/vmap: Document the vmap header
    a771e02594 xen/riscv: use .insn with operands to support the older gas
    63c66274d9 xen: Fix XEN_EXTRAVERSION after 4.19-rc1
    fb76e08a8f cmdline: "extra_guest_irqs" is inapplicable to PVH
    1f56accba3 amend 'cmdline: document and enforce "extra_guest_irqs" upper bounds'
    08daa72cdc xen: avoid UB in guest handle field accessors
    d2fe9ab304 x86/entry: don't clear DF when raising #UD for lack of syscall handler
    17f6d398f7 cmdline: document and enforce "extra_guest_irqs" upper bounds
    a2ff677852 tools/libxs: Fix CLOEXEC handling in xs_fileno()
    1957dd6aff tools/libxs: Fix CLOEXEC handling in get_socket()
    bf7c146470 tools/libxs: Fix CLOEXEC handling in get_dev()
    4c3a618b0a tools/dombuilder: Correct the length calculation in xc_dom_alloc_segment()
    9ec74bdb25 xen/common: fix build issue for common/trace.c
    daa90dfea9 pirq_cleanup_check() leaks
    4a73eb4c20 Update Xen version to 4.19-rc
    7584e39986 Config.mk pin QEMU_UPSTREAM_REVISION (prep for Xen 4.19 RC1)
    08f9b1dd9c MAINTAINERS: Step down as maintainer and committer
    6d41f5b9e1 automation/eclair: add deviations agreed in MISRA meetings
    402e473249 x86/traps: address violations of MISRA C Rule 20.7
    bfea273b7b automation/eclair_analysis: clean ECLAIR configuration scripts
    8f5581d7e1 x86/irq: address violations of MISRA C Rule 20.7
    c7e195fac0 automation/eclair_analysis: address violations of MISRA C Rule 20.7
    f39642c308 xen/guest_access: address violations of MISRA rule 20.7
    4929fea7bd xen/self-tests: address violations of MISRA rule 20.7
    0dca0f2b9a automation/eclair: address violations of MISRA C Rule 20.7
    ecadd22a3d CHANGELOG: Add entries related to tracing
    dde20e47af tools/xenalyze: Remove argp_program_bug_address
    188e5f1a80 CHANGELOG.md: Fix indentation of "Removed" section
    4712e3b376 Config.mk: update MiniOS commit
    853f707cd9 automation/eclair_analysis: deviate and|or|xor|not for MISRA C Rule 21.2
    0ac3b175e7 automation/eclair: configure Rule 13.6 and custom service B.UNEVALEFF
    11ea49a3fd gnttab: fix compat query-size handling
    735865f884 xen: re-add type checking to {,__}copy_from_guest_offset()
    93db2f64f3 MAINTAINERS: Update my email address again
    b14dae96c0 x86/pagewalk: Address MISRA R8.3 violation in guest_walk_tables()
    6e07f41b27 common/unlzo: address violation of MISRA C Rule 7.3
    c2f4ea4dc9 automation/eclair: add more guidelines to the monitored set
    5add709cc6 automation/eclair: add deviations of MISRA C Rule 5.5
    912412f97a automation/eclair: add deviation for MISRA C Rule 17.7
    c56f1ef577 xen/arm: static-shmem: request host address to be specified for 1:1 domains
    908407bf2b xen/riscv: Drop legacy __ro_after_init definition
    8c3bb4d8ce xen/gnttab: Perform compat/native gnttab_query_size check
    ebed411e7a xen/xlat: Sort structs per file
    90c1520d4e xen/xlat: Sort out whitespace
    6a17e11993 x86/shadow: Don't leave trace record field uninitialized
    8765783434 x86/shadow: Rework trace_shadow_emulate_other() as sh_trace_gfn_va()
    578066d82b x86/shadow: Introduce sh_trace_gl1e_va()
    2e9f8a734e x86/shadow: Rework trace_shadow_gen() into sh_trace_va()
    ba52b3b624 tools/xl: Open xldevd.log with O_CLOEXEC
    9e7c26ad85 libelf: avoid UB in elf_xen_feature_{get,set}()
    c5746b021e x86/ioapic: Fix signed shifts in io_apic.c
    62071a1c16 livepatch: use appropriate type for buffer offset variables
    e2bb28d621 x86/irq: forward pending interrupts to new destination in fixup_irqs()
    74970165ba tools/libs/light: Fix nic->vlan memory allocation
    f16ac12bd4 hotplug: Restore block-tap phy compatibility
    43d5c5d5f7 xen: avoid UB in guest handle arithmetic
    267122a24c x86/defns: Clean up X86_{XCR0,XSS}_* constants
    71cacfb035 x86/cpuid: Fix handling of XSAVE dynamic leaves
    fdb7e77fea x86/cpu-policy: Simplify recalculate_xstate()
    df09dfb94d x86/xstate: Rework xstate_ctxt_size() as xstate_uncompressed_size()
    a09022a09e x86/boot: Collect the Raw CPU Policy earlier on boot
    d31a111940 x86/xstate: Cross-check dynamic XSTATE sizes at boot
    9e6dbbe8bf x86/xstate: Fix initialisation of XSS cache
    aba98c8d67 xen/arch: Centralise __read_mostly and __ro_after_init
    82f4809447 xen/irq: Address MISRA Rule 8.3 violation
    efa6e9f15b Revert "xen/arm: Alloc XenStore page for Dom0less DomUs from hypervisor"
    443c488a0b Revert "docs/features/dom0less: Update the late XenStore init protocol"
    988f1c7e1f xen/arm: static-shmem: fix "gbase/pbase used uninitialized" build failure
    53c5c99e87 docs/features/dom0less: Update the late XenStore init protocol
    6f9d90ea94 xen/arm: Alloc XenStore page for Dom0less DomUs from hypervisor
    cb1ddafdc5 xen/arm/static-shmem: Static-shmem should be direct-mapped for direct-mapped domains
    bd59af9970 xen/ubsan: Fix UB in type_descriptor declaration
    369558924a x86/irq: handle moving interrupts in _assign_irq_vector()
    817d1cd627 x86/irq: deal with old_cpu_mask for interrupts in movement in fixup_irqs()
    fa4d026737 x86/Intel: unlock CPUID earlier for the BSP
    77b1ed1d02 automation/eclair_analysis: add more clean MISRA guidelines
    0f0235e9e9 automation/eclair_analysis: address remaining violations of MISRA C Rule 20.12
    8b4243a9b5 xen/docs: Describe static shared memory when host address is not provided
    3deac416a3 xen/arm: Implement the logic for static shared memory from Xen heap
    a21bfc9126 xen/arm: Rework heap page allocation outside allocate_bank_memory
    1544d355b5 xen/arm: Parse xen,shared-mem when host phys address is not provided
    3e2121ce47 xen/p2m: put reference for level 2 superpage
    79a43c8838 xen/arm: Wrap shared memory mapping code in one function
    e90f8d562d xen/arm: Lookup bootinfo shm bank during the mapping
    4fdd8d7556 x86/EPT: drop questionable mfn_valid() from epte_get_entry_emt()
    777c71d313 x86/EPT: avoid marking non-present entries for re-configuring
    5540b94e81 x86/EPT: correct special page checking in epte_get_entry_emt()
    b490f470f5 xen/arm: ffa: support notification
    452551c723 xen/arm: add and call tee_free_domain_ctx()
    dd348eb005 xen/arm: add and call init_tee_secondary()
    67ef3db45a xen/arm: allow dynamically assigned SGI handlers
    282c33cec3 xen/arm: ffa: simplify ffa_handle_mem_share()
    4d2b1b5d69 xen/arm: ffa: use ACCESS_ONCE()
    66e6e47511 xen/arm: ffa: refactor ffa_handle_call()
    401448f2d1 x86/physdev: replace physdev_{,un}map_pirq() checking against DOMID_SELF
    c7564d7366 x86/irq: limit interrupt movement done by fixup_irqs()
    0e8cde5884 x86/irq: describe how the interrupt CPU movement works
    171c52fba5 x86/smp: do not use shorthand IPI destinations in CPU hot{,un}plug contexts
    b0e5352c60 MAINTAINERS: alter EFI section
    d05d97c090 MAINTAINERS: add me as scheduler maintainer
    5ea7f2c9d7 CI: Update FreeBSD to 13.3
    43de96a70f automation: add a test for HVM domU on PVH dom0
    ea1cb444c2 x86/pvh: declare PVH dom0 supported with caveats
    0a5b2ca32c x86/domain: deviate violation of MISRA C Rule 20.12
    e63209d3ba x86/irq: remove offline CPUs from old CPU mask when adjusting move_cleanup_count
    c2d5e63c73 xen: fix MISRA regressions on rule 20.9 and 20.12
    5f7606c048 xen/bitops: Rearrange the top of xen/bitops.h
    04e70af5f2 xen/bitops: Clean up ffs64()/fls64() definitions
    54b10ef6c8 xen/bitops: Implement fls()/flsl() in common logic
    5ed26fc076 xen/bitops: Implement ffsl() in common logic
    989e5f08d3 x86/bitops: Improve arch_ffs() in the general case
    ef1dd8dff4 xen/bitops: Implement ffs() in common logic
    95ddb7e9b0 xen/bitops: Implement generic_ffsl()/generic_flsl() in lib/
    ea59e7d780 xen/bitops: Cleanup and new infrastructure ahead of rearrangements
    1408cf7a28 xen/bitops: Delete find_first_set_bit()
    03147e6837 arch/irq: Centralise no_irq_type
    8aeda4a241 arch/irq: Make irq_ack_none() mandatory
    16884ac6c8 CI: Improve serial handling in qemu-smoke-ppc64le.sh
    2ff6d17bc3 CI: Use a debug build of Xen for the Xilinx HW tests
    1250c73c1a xen/riscv: Update Kconfig in preparation for a full Xen build
    db04be9e7d x86/hvm: allow XENMEM_machine_memory_map
    9a905d7dc6 xen/bitops: Replace find_first_set_bit() with ffs()/ffsl() - 1
    1773a74469 xen/page_alloc: Coerce min(flsl(), foo) expressions to being unsigned
    e807b137f7 ppc/boot: Run constructors on boot
    6ef4fa1e7f tools: (Actually) drop libsystemd as a dependency
    12f9599a3b Partial revert of "x86/MCE: optional build of AMD/Intel MCE code"
    845a60b63b xen/x86: remove foreign mappings from the p2m on teardown
    0291089f6e xen: enable altp2m at create domain domctl
    8ef1e96a04 xen/x86: account number of foreign mappings in the p2m
    0840bc5ea1 xen: Introduce CONFIG_SELF_TESTS
    2bc462f645 x86: address violations of MISRA C Rule 8.4
    19b6e9f914 x86/MCE: optional build of AMD/Intel MCE code
    5effd810c6 x86/MCE: add default switch case in init_nonfatal_mce_checker()
    498a4ded74 x86/intel: move vmce_has_lmce() routine to header
    d27c2835e0 x86/svm: Rework VMCB_ACCESSORS() to use a plain type name
    58b3437bae xen/x86: Address two misc MISRA 17.7 violations
    2d082710f7 xen/x86: Drop useless non-Kconfig CONFIG_* variables
    56d3b24979 xen/lzo: Implement COPY{4,8} using memcpy()
    2d93f78bfe x86/traps: address violation of MISRA C Rule 8.4
    8b977fe572 CHANGELOG: Mention libxl blktap/tapback support
    96af090e33 automation/eclair_analysis: avoid an ECLAIR warning about escaping
    841f437a8b docs/misra: exclude gdbsx from MISRA compliance
    1eba1fe18d automation/eclair_analysis: add already clean rules to the analysis
    4bc8dc01a3 automation/eclair_analysis: set MISRA C Rule 10.2 as clean
    ac572152e5 docs: Add device tree overlay documentation
    2c4fbadf73 tools: Introduce the "xl dt-overlay attach" command
    4c733873b5 xen/arm: Add XEN_DOMCTL_dt_overlay and device attachment to domains
    1c77496bc8 xen/arm/gic: Allow adding interrupt to running VMs
    6f588194d9 tools/arm: Introduce the "nr_spis" xl config entry
    1d2b4f3049 xen/arm, doc: Add a DT property to specify IOMMU for Dom0less domUs
    c8cbc5eb1c tools/xl: Correct the help information and exit code of the dt-overlay command
    2172a01c4c tools/xenalyze: Ignore HVM_EMUL events harder
    320e644616 x86/hvm/trace: Use a different trace type for AMD processors
    701190abb3 xen/arm: Set correct per-cpu cpu_core_mask
    2a40b106e9 tools/xentrace: Remove xentrace_format
    ae26101f6b tools: Drop libsystemd as a dependency
    caf8644826 tools/{c,o}xenstored: Don't link against libsystemd
    78510f3a15 tools: Import stand-alone sd_notify() implementation from systemd
    219cdff3fb LICENSES: Add MIT-0 (MIT No Attribution)
    9e58da32cc xen/arm: mem_access: Conditionally compile mem_access.c
    d6a7fd8303 vpci: add initial support for virtual PCI bus topology
    9c831e429c vpci/header: emulate PCI_COMMAND register for guests
    7db7bd0f31 arm/vpci: honor access size when returning an error
    2c15fa332e x86: detect PIT aliasing on ports other than 0x4[0-3]
    249affc129 x86/PIT: supply and use #define-s
    e6ed98863b xen/riscv: add required things to current.h
    3cd46d4ec8 xen/riscv: introduce atomic.h
    51dabd6312 xen/riscv: introduce cmpxchg.h
    9f482c6a7e xen/x86: Simplify header dependencies in x86/hvm
    212cb5effa iommu/x86: print RMRR/IVMD ranges using full addresses
    3a3111d018 xen/livepatch: make .livepatch.funcs read-only for in-tree tests
    ced21fbb28 x86_64/cpu_idle: address violations of MISRA C Rule 20.7
    1b0b050bd6 x86_64/uaccess: address violations of MISRA C Rule 20.7
    670b7ec65d x86/hvm: address violations of MISRA C Rule 20.7
    1b9311da4b x86/vpmu: address violations of MISRA C Rule 20.7
    bba4eb88fd xen/common/dt-overlay: Fix lock issue when add/remove the device
    24dbf5bd03 x86/p2m: Add braces for better code clarity
    ed1ac3e968 xen/riscv: introduce vm_event_*() functions
    7e036f7e0c xen/riscv: introduce monitor.h
    44b69e9c17 xen/x86: pretty print interrupt CPU affinity masks
    9c5444b01a xen/trace: Drop old trace API
    aa60520cd3 xen/trace: Removal final {__,}trace_var() users in favour of the new API
    26da08059e xen: Switch to new TRACE() API
    d64693df1a xen/sched: Clean up trace handling
    df50666449 xen/rt: Clean up trace handling
    ab8bc19850 xen/credit2: Clean up trace handling
    e978b462ec xen/trace: Introduce new API
    26b122e3bf tools/xen-cpuid: Drop old names
    bbb5c171d7 tools/xen-cpuid: Use automatically generated feature names
    e96fefdb06 tools/xen-cpuid: Rename decodes[] to leaf_info[]
    f79189cb29 x86/gen-cpuid: Minor cleanup
    54aa34fc89 tools/golang: Add missing golang bindings for vlan
    594b22ca5b x86/msi: prevent watchdog triggering when dumping MSI state
    21611c6870 include/ctype.h: fix MISRA R10.2 violation
    53dc37829c xen/arm: Add DT reserve map regions to bootinfo.reserved_mem
    d946787a27 xen/arm64: lib: Use the generic xen/linkage.h macros
    fe1b97d321 xen/arm64: cache: Use the generic xen/linkage.h macros
    c9906bd79e xen/arm64: mmu/head: Add missing code symbol annotations
    8151fe503c xen/arm64: bpi: Add missing code symbol annotations
    fdba3ff11f xen/arm64: debug: Add missing code symbol annotations
    fba250ae60 xen/arm64: head: Add missing code symbol annotations
    78ce1dc625 xen/arm64: sve: Add missing code symbol annotations
    8d92a26a41 xen/arm64: smc: Add missing code symbol annotations
    1125f3529c xen/arm64: entry: Add missing code symbol annotations
    977d98e67c x86/ucode: Further fixes to identify "ucode already up to date"
    ae7584f636 x86/p2m: move altp2m-related code to separate file
    f1fa994d89 x86/MCE: guard {intel/amd}_mcheck_init() calls
    71b5eccbdd x86/MCE: guard access to Intel/AMD-specific MCA MSRs
    a3ec23a940 x86/vpmu: separate amd/intel vPMU code
    6628bacc81 xen/bitops: put __ffs() into linux compatible header
    d0c6114058 x86: detect PIC aliasing on ports other than 0x[2A][01]
    c09960a1a2 x86: allow to suppress port-alias probing
    762a848223 automation/eclair_analysis: deviate macro count_args_ for MISRA Rule 20.7
    7fe9679db9 automation/eclair_analysis: fully deviate MISRA C Rules 21.9 and 21.10
    abd00b037d x86/mtrr: avoid system wide rendezvous when setting AP MTRRs
    0cc01c603f tools/xl: add vlan keyword to vif option
    3bc14e4fa4 tools/libs/light: Add vlan field to libxl_device_nic
    e27fc7d15e tools/xentop: Fix cpu% sort order
    9b7d793889 tools/hvmloader: Further simplify SMP setup
    8a78d89881 x86/cpufreq: Rename cpuid variable/parameters to cpu
    7270fdc7a0 x86: respect mapcache_domain_init() failing
    d104a07524 xen/sched: set all sched_resource data inside locked region for new cpu
    319a5125ca xen/console: fix Rule 10.2 violation
    46aa3031ae docs/misra: add R21.6 R21.9 R21.10 R21.14 R21.15 R21.16
    9110072b76 x86/io: Don't cast away constness in read{b..q}()
    2d8d7481ca Revert "evtchn: refuse EVTCHNOP_status for Xen-bound event channels"
    90a1bc9e82 xen: Use -Wuninitialized and -Winit-self
    0b01395c44 xen: Use -Wflex-array-member-not-at-end when available
    d31d0665f1 automation/eclair_analysis: tag MISRA C Rule 1.1 as clean
    531d3bea5e libxl: Fix handling XenStore errors in device creation
    b2cd07a044 x86/hvm: Allow access to registers on the same page as MSI-X table
    e9607d4061 x86/msi: Extend per-domain/device warning mechanism
    5cc7347b04 libxl: fix population of the online vCPU bitmap for PVH
    996576b965 xen: allow up to 16383 cpus
    b0082b9083 automation/eclair: hide reports coming from adopted code in scheduled analysis
    f4cd14e502 automation/eclair_analysis: amend configuration for some MISRA rules
    93c27d54dd xen/arm: Fix MISRA regression on R1.1, flexible array member not at the end
    1672df9ebd xen/kernel.h: Import __struct_group from Linux
    53959cb830 x86/boot: Refactor pvh_load_kernel() to have an initrd_len local
    49c810e867 x86/boot: Explain how moving mod[0] works
    fcefb2a247 x86/IOMMU: address violations of MISRA C:2012 Rule 14.4
    3d1033c911 automation/eclair: add deviation of MISRA C:2012 Rule 14.4
    14424d90e1 xen/pci: address violations of MISRA C Rule 20.7
    8e22c78e17 xen/unaligned: address violation of MISRA C Rule 20.7
    1dd6b50dc4 x86/hvm: Defer the size calculation in hvm_save_cpu_xsave_states()
    752ec9a9b1 tools/hvmloader: Wake APs with hypercalls rather than INIT+SIPI+SIPI
    754a29cacf tools/hvmloader: Move various helpers to being static inlines
    1c6112b8f5 xen/gunzip: Move crc state into gunzip_state
    7a4483358f xen/gunzip: Move bitbuffer into gunzip_state
    d386a383dd xen/gunzip: Move output count into gunzip_state
    fd273a5690 xen/gunzip: Move input buffer handling into gunzip_state
    461eacc76b xen/gunzip: Move window position into gunzip_state
    02e32883f3 xen/gunzip: Introduce struct gunzip_state and refactor window
    473156eec6 xen/gunzip: don't leak memory on error paths
    648db37a15 x86/ucode: Distinguish "ucode already up to date"
    3c228e24b2 automation/eclair_analysis: unblock pipelines from certain repositories
    0c79b7bc9b automation/eclair_analysis: tag MISRA C Rule 8.2 as clean.
    e8e8afee99 svm: Fix MISRA 8.2 violation
    a2330b51df x86/cpu-policy: Fix migration from Ice Lake to Cascade Lake
    f4f2f3402b tools/libxs: Open /dev/xen/xenbus fds as O_CLOEXEC
    ebab808eb1 x86/platform: correct #undef in compat checking
    d7032b4ca2 AMD/IOMMU: add helper to check whether ATS is to be used for a device
    b5996ab284 VT-d: parse ACPI "SoC Integrated Address Translation Cache Reporting Structure"s
    426dbf404e VT-d: tidy error handling of RMRR parsing
    692f6199bd automation/eclair: add deviation for Rule 16.4
    50a4f7c177 docs/misra: add Terms & Definitions section to rules.rst
    6654248f22 ppc/riscv: fix arch_acquire_resource_check()
    b801ccfe7e drivers/char: address violation of MISRA C Rule 20.7
    04e31583ba VT-d: correct ATS checking for root complex integrated devices
    f95cd010cb xen/Kconfig: Drop the final remnants of ---help---
    2d4ba20559 tools/tests: let test-xenstore exit with non-0 status in case of error
    642005e310 tools/tests: don't let test-xenstore write nodes exceeding default size
    feb9158a62 automation/eclair: make explicit there are no adopted files by default
    7556f46a9b automation: do not allow failure for triggered analyses
    c1aa6fb5f6 automation/eclair: tag Rule 7.2 as clean and temporarily remove Rules 1.1 and 8.2
    9e30bd8f4a x86/cpu-policy: Annotate the accumulated features
    b819bd65f4 revert "x86/mm: re-implement get_page_light() using an atomic increment"
    bf0059282d xen/riscv: improve check-extension() macro
    08e79bba73 xen/x86: Fix Syntax warning in gen-cpuid.py
    647f7e50eb xen/xsm: Wire up get_dom0_console
    abc68e78a3 x86/MCE: guard call to Intel-specific intel_get_extended_msrs()
    64b21662b1 x86/msi: passthrough all MSI-X vector ctrl writes to device model
    be5b08dd6e xen-livepatch: fix --force option comparison
    13893a58e2 xen/spinlock: use correct pointer
    a505890d81 x86/entry: shrink insn size for some of our EFLAGS manipulation
    fd4ff921f7 gzip: clean up comments and fix code alignment
    232ee07c23 arm/vpci: make prefetchable mem 64 bit
    a0e29b3163 CI: Drop glibc-i386 from the build containers
    4edbbcd0c0 automation/eclair: reorganize pipelines
    23cd1207e7 VMX: no open-coding in vmx_get_cpl()
    7ea3a3e44f MAINTAINERS: Update my email address
    656ae8f109 x86/spec: adjust logic that elides lfence
    049ab0b2c9 x86/spec: fix reporting of BHB clearing usage from guest entry points
    6d5111b10e tools/ocaml: Fix warnings in config.ml
    524eee7ce0 x86/hap: Refactor boolean field assignments
    bd5213384b x86/shadow: correct shadow_vcpu_init()'s comment
    9a73b4e210 x86/paging: vCPU host mode is always set
    8c01d0e336 x86/msr: add suffix 'U' to MSR_AMD_CSTATE_CFG macro
    ea3272f845 x86/pci: add suffix 'U' to PCI_CONF_ADDRESS macro
    62a72092a5 livepatch: introduce --force option
    fb2716a191 xen-livepatch: fix parameter name parsing
    4a75f2ffc0 x86/mm: address violations of MISRA C Rule 20.7
    445f66fe00 x86/debugreg: address violation of MISRA C Rule 20.7
    c717d52a5d x86/vhpet: address violations of MISRA C Rule 20.7
    4f900035a4 x86/acpi: address violations of MISRA Rule 20.7
    0440fcad2a x86/pci: address violation of MISRA C Rule 20.7
    489d13da93 xen/spinlock: address violations of MISRA C Rule 20.7
    0d02b75d7c xen/page-defs: address violation of MISRA C Rule 20.7
    8189230d80 libelf: address violations of MISRA C Rule 20.7
    d7c4d59b51 libxl: Support blktap with HVM device model
    76a484193d hotplug: Update block-tap
    31d6b5b4a7 automation: Add arm64 test for running Xen with GICv3
    db49973411 automation: Add arm{64,32} earlyprintk jobs
    c05b97fc7a automation: Drop some of the non-debug variants of the same Arm jobs
    7846f7699f xen/arm: List static shared memory regions as /memory nodes
    51a2b3f109 xen/arm: fix duplicate /reserved-memory node in Dom0
    a0fee882c1 xen/arm: remove shm holes from extended regions
    2b557af192 xen/arm: Reduce struct membank size on static shared memory
    e5816ad4e8 xen/arm: Introduce helper for static memory pages
    9f657d8832 xen/arm: Avoid code duplication in check_reserved_regions_overlap
    b3e66aa1c2 xen/arm: Avoid code duplication in find_unallocated_memory
    e13499b3c4 xen/arm: Conditional compilation of kernel_info.shm_mem member
    2209c1e35b xen/arm: Introduce a generic way to access memory bank structures
    8d5ff14477 xen/arm: Pass struct kernel_info parameter to make_{resv,shm}_memory_node
    6d14a742f8 xen/arm: avoid repetitive checking in process_shm_node
    ab327c8e8b xen/arm: remove stale addr_cells/size_cells in assign_shared_memory
    6c04a0bf2c tools/golang: Run `go vet` as part of the build process
    9c08a88ad0 golang/xenlight: Ensure comments aren't interpreted as docstrings
    27c176d298 tools/golang: When returning pointers, actually allocate structrues
    0d19d3aab0 svm/nestedsvm: Introduce nested capabilities bit
    410ef33439 x86/monitor: allow fast-singlestepping without enabling singlestep monitor
    77e25f0e30 x86/MTRR: correct inadvertently inverted WC check
    f82c43a384 xen: introduce header file with section related symbols
    70d46b51e2 docs/man: Add xenwatchdog manual page
    9c872b5766 tools/misc: Add xenwatchdogd.c copyright notice
    e906bfae48 tools/misc: xenwatchdogd enhancements
    f0fa75c9ea tools/misc: xenwatchdogd: add parse_secs()
    43a0706986 x86/rtc: Avoid UIP flag being set for longer than expected
    cccb7878f3 x86/pvh: zero VGA information
    c3b40c95da x86/video: add boot_video_info offset generation to asm-offsets
    93d6e6efa8 automation/eclair_analysis: substitute deprecated service STD.emptrecd
    bc5827fad1 xen/riscv: check whether the assembler has Zbb extension support
    1fc166d6cd xen/domain: deviate MISRA C Rule 16.2 violation
    480179bc26 x86/PVH: Use unsigned int for dom0 e820 index
    09cb855f33 x86/svm: Add flushbyasid in the supported features
    5495ed0cd2 eclair_analysis: deviate x86 emulator for Rule 16.2
    1d2d283818 xen/riscv: add minimal stuff to page.h to build full Xen
    58798e3f1f xen/riscv: introduce io.h
    5b33845adf xen/ppc: mm-radix: Replace debug printing code with printk
    78d980071a x86/MCE: move intel mcheck init code to separate file
    8763eb782b xen/gzip: Drop huffman code table tracking
    052cf1dcdf xen/gzip: Remove custom memory allocator
    492fe0778b xen/gzip: Drop unused define checks
    489a46c177 x86/emul: Simplify segment override prefix decoding
    4cd66fb56d xen/efi: Rewrite DOS/PE magic checking without memcmp()
    02fbb2d591 docs/misra: mark the gzip folder as adopted code
    2a9a19be13 Revert "public: s/int/int32_t"
    83e081b29e docs: arm: Update where Xen should be loaded in memory
    afab29d088 public: s/int/int32_t
    ad363fb17d docs/misra: add Rule 16.4
    487838f13a docs/misra/rules.rst: add rule 5.5
    c0f890cd9d docs/hypercall-abi: State that the hypercall page is optional
    cfb922bb7d xen/gzip: Colocate gunzip code files
    af4cd0a6a6 altcall: fix __alt_call_maybe_initdata so it's safe for livepatch
    09abf1b61b libxl: devd: Spawn QEMU for 9pfs
    3c7482b73c libxl: Use vkb=[] for HVMs
    2b31a1f055 xen/include: move definition of ASM_INT() to xen/linkage.h
    6cb501e3e6 MAINTAINERS: Update livepatch maintainers
    86c008aa5d tools/misc: xenwatchdogd: add static qualifier
    5d09f8cbdc tools/misc: rework xenwatchdogd signal handling
    0668d35594 tools/misc: xenwatchdogd: use EXIT_* constants
    c304bdf1e7 xen/acpi: Allow xen/acpi.h to be included on non-ACPI archs
    2145512e21 xen/xsm: address violation of MISRA C Rule 16.2
    bbbbd024e8 x86/hvm: address violations of MISRA C Rule 16.2
    eeab8c4619 xen/domctl: address violations of MISRA C Rule 16.2
    f509d39d5b x86/efi: tidy switch statement and address MISRA violation
    24f204748e x86/irq: tidy switch statement and address MISRA violation
    3b51a812e0 x86/cpuid: address violation of MISRA C Rule 16.2
    6af626c1da x86/vlapic: tidy switch statement and address MISRA violation
    478002370c x86/emul: Adjust X86EMUL_OPC_EXT_MASK to placate MISRA
    761358b9eb xen/spinlock: Adjust LOCK_DEBUG_INITVAL to placate MISRA
    e5b93b70d5 xen/vPCI: Remove shadowed variable
    52bde26c1c xen/nospec: Remove unreachable code
    d0a718a45f x86/hvm: Fix Misra Rule 19.1 regression
    d37c184236 xen/virtual-region: Drop setup_virtual_regions()
    038ba305fd xen/virtual-region: Link the list build time
    3434518d05 xen/virtual-region: Rework how bugframe linkage works
    337f11ea73 xen/link: Introduce a common BUGFRAMES definition
    0e7ea8ca5f x86/Kconfig: Introduce CONFIG_{AMD,INTEL} and conditionalise ucode
    2eea952b70 x86/ucode: Move vendor specifics back out of early_microcode_init()
    f48299cad5 docs/misra: document the expected sizes of integer types
    dfc9455b80 MAINTAINERS: Become a reviewer of iMX8Q{M,XP} related patches
    2f85a6d9f5 xen/drivers: imx-lpuart: Replace iMX8QM compatible with iMX8QXP
    71d4356544 xen/arm: Add imx8q{m,x} platform glue
    a9fa825008 x86/entry: Fix build with older toolchains
    d5887c0dec x86/spec-ctrl: Support the "long" BHB loop sequence
    689ad48ce9 x86/spec-ctrl: Wire up the Native-BHI software sequences
    954c983abc x86/spec-ctrl: Software BHB-clearing sequences
    62a1106415 x86/spec-ctrl: Support BHI_DIS_S in order to mitigate BHI
    c94e210592 x86/tsx: Expose RTM_ALWAYS_ABORT to guests
    0b66d7ce3c x86: Drop INDIRECT_JMP
    8e186f98ce x86: Use indirect calls in reset-stack infrastructure
    45dac88e78 x86/spec-ctrl: Widen the {xen,last,default}_spec_ctrl fields
    97c5b8b657 x86/vmx: Add support for virtualize SPEC_CTRL
    40dea83b75 x86/spec-ctrl: Detail the safety properties in SPEC_CTRL_ENTRY_*
    2378d16a93 x86/spec-ctrl: Simplify DO_COND_IBPB
    9607aeb660 x86/spec_ctrl: Hold SCF in %ebx across SPEC_CTRL_ENTRY_{PV,INTR}
    22390697bf x86/entry: Arrange for %r14 to be STACK_END across SPEC_CTRL_ENTRY_FROM_PV
    94896de1a9 x86/spec-ctrl: Rework conditional safety for SPEC_CTRL_ENTRY_*
    c62673c433 x86/spec-ctrl: Rename spec_ctrl_flags to scf
    489d93cd0f x86/spec-ctrl: Fix BTC/SRSO mitigations
    4b3da946ad x86/cpuid: Don't expose {IPRED,RRSBA,BHI}_CTRL to PV guests
    4be1fef1e6 x86/alternatives: fix .init section reference in _apply_alternatives()
    9926e692c4 hypercall_xlat_continuation: Replace BUG_ON with domain_crash
    6a98383b08 x86/HVM: clear upper halves of GPRs upon entry from 32-bit code
    672b26b66e drivers: char: Enable OMAP UART driver for TI K3 devices
    c079823df6 xen/compiler: address violation of MISRA C Rule 20.9
    dfc9fab003 x86/PVH: Support relocatable dom0 kernels
    4d3b8669d8 libelf: Store maximum PHDR p_align
    77b219f915 xen/rwlock: raise the number of possible cpus
    c286bb93d2 xen/spinlock: support higher number of cpus
    0b09531d21 xen/spinlock: let all is_locked and trylock variants return bool
    bfbec024b8 xen/spinlock: split recursive spinlocks from normal ones
    31be78285c xen/spinlock: add missing rspin_is_locked() and rspin_barrier()
    ee1e133125 xen/spinlock: add another function level
    3696a9f27d xen/spinlock: add explicit non-recursive locking functions
    402c2d3e66 MISRA C Rule 17.1 states: "The features of `<stdarg.h>' shall not be used"
    ea33a6e1e3 MISRA C:2012 Rule 17.1 states: The features of `<stdarg.h>' shall not be used
    80d28865e1 automation/eclair: add deviations for Rule 20.7
    6bdb67d19e arm/public: address violations of MISRA C Rule 20.7
    e9b0f8b690 x86: Address MISRA Rule 13.6
    b33f191e3c x86/tsx: Cope with RTM_ALWAYS_ABORT vs RTM mismatch
    270588b9b2 char: lpuart: Drop useless variables from UART structure
    4932163b35 drivers: char: Drop useless suspend/resume stubs in Arm drivers
    6eeb3e86bd vsprintf: address violations of MISRA C:2012 Rule 16.3
    226bdb155b xen/sched: address violations of MISRA C:2012 Rule 16.3
    21e0c8fc0e tools: Move MB/GB() to common-macros.h
    4c41749852 tools/init-xenstore-domain: Replace variable MB() usage
    1e6cd4155d xen/riscv: introduce extension support check by compiler
    7b02b505bb automation: introduce fixed randconfig for RISC-V
    6117179dd9 docs/misra: add 13.6 to rules.rst
    538ab07bad xen/arm: ffa: support FFA_FEATURES
    be75f686eb xen/arm: ffa: separate rxtx buffer routines
    bded3e6467 xen/arm: ffa: separate partition info get routines
    8836867200 xen/arm: ffa: separate memory sharing routines
    bb584ec036 xen/arm: ffa: move common things to ffa_private.h
    b21cbaf6ba xen/arm: ffa: rename functions to use ffa_ prefix
    ac682fbac1 xen/vm-event: address a violation of MISRA C:2012 Rule 16.3
    cde0c58714 xen/evtchn: address a violation of MISRA C:2012 Rule 16.3
    163ea7d9a8 console: address a violation of MISRA C:2012 Rule 16.3
    2c205ce5c0 xen/domctl: address a violation of MISRA C:2012 Rule 16.3
    795c4e367b x86/amd: address violations of MISRA C Rule 20.7
    da88f434bc xen/mm: address violations of MISRA C Rule 20.7
    5811fb4816 x86/hvm: address violations of MISRA C Rule 20.7
    a9b2a72926 x86/vPMU: address violations of MISRA C Rule 20.7
    dd5101a616 drivers/char: mark extra reserved device memory in memory map
    7a09966e7b x86/spec-ctrl: Move __read_mostly data into __ro_after_init
    3c9e76cd87 x86/mm: Refine address alignment checks in modify_xen_mappings_lite()
    8f85af65af tools/oxenstored: Re-format
    0cd50753eb nestedsvm: Disable TscRateMSR
    4f8b0e94d7 x86: Move SVM features exposed to guest into hvm_max_cpu_policy
    e3883336bb xen/efi: efibind: address violations of MISRA C Rule 20.7
    853c71dfbf xen/elfnote: Specify ELF Notes are x86-specific
    7d8c9b4e8d libelf: Expand ELF note printing
    8802230bfa Revert "xen/x86: bzImage parse kernel_alignment"
    f6a4139948 x86/public: address violations of MISRA C Rule 20.7
    a65d9988ad x86/hvm: address violations of Rule 20.7
    e2eeb1b753 xen/page_alloc: address violations of MISRA C Rule 20.7
    cab6de6a95 xen: address MISRA C Rule 20.7 violation in generated hypercall
    7757981d94 xentrace: address violation of MISRA C Rule 20.7
    12a3b90c2a xen/list: address violations of MISRA C Rule 20.7
    6f6de10ade xen/xsm: add parentheses to comply with MISRA C Rule 20.7
    4b60085b6e xen/console: add comment about external console lock helper
    03e484a4f6 x86/vcpu: relax VCPUOP_initialise restriction for non-PV vCPUs
    d654612e98 xen/riscv: add minimal stuff to processor.h to build full Xen
    5095b610df EFI: Introduce inline stub for efi_enabled on !X86 && !ARM
    cbe393b709 Revert "xen/page_alloc: introduce preserved page flags macro"
    ee973396f0 x86/cpuid: More AMD features
    5205bda5f1 x86/p2m: Coding style cleanup
    97b90f9bf2 xen/ppc: Ensure ELF sections' physical load addresses start at 0x0
    10e8d824b7 AMD/IOMMU: drop remaining guest-IOMMU bits too
    cc950c49ae x86/PoD: tie together P2M update and increment of entry count
    f5c2b6da26 xen/page_alloc: introduce page flag to stop buddy merging
    75214d5e53 xen/page_alloc: introduce preserved page flags macro
    6eb13b6b1d tools/xl_parse: remove message for tsc mode string
    eaafbd1134 docs/parse-support-md: Handle BulletList
    188fa82305 xen/vpci: Improve code generation in mask_write()
    131892e0dc x86/boot: Support the watchdog on newer AMD systems
    f658321374 x86/boot: Fix setup_apic_nmi_watchdog() to fail more cleanly
    9e18f33983 x86/boot: Improve the boot watchdog determination of stuck cpus
    d2276b86e5 xen/nospec: Include <xen/stdbool.h>
    d9e709e8c0 xen/wait: address violations of MISRA C Rule 20.7
    239b72d874 xen/notifier: address violations of MISRA C Rule 20.7
    88822d5fbd xen/arm: smmu: address violations of MISRA C Rule 20.7
    8e7207d512 EFI: address violations of MISRA C Rule 20.7
    b51d7f39dc xen/device_tree: address violations of MISRA C Rule 20.7
    9979cc594a x86/cpufeature: add parentheses to comply with Rule 20.7
    a02174c6c8 amd/iommu: clean up unused guest iommu related functions
    b053075d1a xen/spinlock: make struct lock_profile rspinlock_t aware
    cc3e8df542 xen/spinlock: add rspin_[un]lock_irq[save|restore]()
    c9aca2a1f6 xen/spinlock: rename recursive lock functions
    475080b6b2 xen/spinlock: introduce new type for recursive spinlocks
    a97de92e76 IOMMU: store name for extra reserved device memory
    62018f0870 x86/mm: use block_lock_speculation() in _mm_write_lock()
    d92a67b60c xen/sched: address violations of MISRA C Rule 20.7
    f93d8dd519 automation/eclair: allow parameter name "unused"
    a5b90a90ee MAINTAINERS: remove myself from various positions
    ad52857efc MAINTAINERS: drop AMD IOMMU and Intel VT-d sections
    8a8d5c22af perfc: add pseudo-keyword fallthrough
    53b5208de8 x86/svmdebug: Print np, sev and sev_es vmcb bits
    2f09f797ba x86/svm: Drop the suffix _guest from vmcb bit
    d638e304f1 SUPPORT.MD: Fix matrix generation after 43c416d0d819 and 77c39a53cf5b
    77c39a53cf xen/arm: arm32: Add emulation of Debug Data Transfer Registers
    43c416d0d8 xen/arm: arm64: Add emulation of Debug Data Transfer Registers
    bd06cf74fc xen/arm: Introduce CONFIG_PARTIAL_EMULATION and "partial-emulation" cmd option
    af7fed3fdf xen/spinlock: remove misra rule 21.1 violations
    68e008db0c xen: avoid grep fodder define and undef
    70e549fd44 MAINTAINERS: Remove myself from several subsystems
    a6081d0176 x86/svm: Drop the _enabled suffix from vmcb bits
    d2686bf964 xen/compiler: deviate the inline macro for MISRA C Rule 20.4
    3945b61ddb xen/lz4: address violations of MISRA C:2012 Directive 4.10
    ec2587ab4b x86/mtrr: address violations of MISRA C:2012 Directive 4.10
    13a7b0f9f7 restrict concept of pIRQ to x86
    4dc9a8b060 automation/eclair_analysis: deviate certain macros for Rule 20.12

Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
2024-10-03 01:28:52 +00:00
..
files xen: update to 4.19 2024-08-08 15:26:47 +00:00
README xen, xen-tools: Document the version update process in README 2021-04-18 20:19:28 -04:00
README.test xen: update to 4.18-tip 2024-05-31 13:38:28 +00:00
xen_4.18.bb xen: fix arm64 build with gcc14 2024-05-31 16:20:17 +00:00
xen_4.19.bb xen: update to 4.19 2024-08-08 15:26:47 +00:00
xen_git.bb xen: update to 4.20-dev 2024-10-03 01:28:52 +00:00
xen-arch.inc Remove True option to getVar calls 2017-01-03 10:28:33 -05:00
xen-blktap.inc xen: fix virtual RDEPENDS warnings 2024-01-19 14:29:24 +00:00
xen-hypervisor.inc xen: Override CC and CPP in make command line 2022-03-10 14:42:22 -05:00
xen-tools_4.18.bb xen-tools/4.18: update to -tip 2024-03-15 17:17:20 +00:00
xen-tools_4.19.bb xen: update to 4.19 2024-08-08 15:26:47 +00:00
xen-tools_git.bb xen: update to 4.20-dev 2024-10-03 01:28:52 +00:00
xen-tools.inc xen: update to 4.19 2024-08-08 15:26:47 +00:00
xen.inc xen: force usage of gcc 2023-01-27 10:32:06 -05:00
xtf_git.bb recipes/classes/scripts: Drop SRCPV usage 2023-08-24 01:38:21 +00:00

Xen

For any issues with the Xen recipes please make sure you CC: christopher.w.clark@gmail.com cardoe@gentoo.org

configuring the hypervisor

Since 4.7.0 Xen supports using Kconfig to configure the hypervisor. Similarly to how the recipe for busybox works, you can provide a .config as a defconfig to override the default configuration of the hypervisor. The easiest way for you to take advantage of this is to create a .config for Xen and then copy it to your Yocto layer as 'defconfig' inside of 'recipes-extended/xen/files/' and then create a bbappend adding 'file://defconfig' to your SRC_URI.

To generate your own .config file for Xen, you can use the interactive menuconfig via bitbake:

bitbake xen -c menuconfig

Select the config settings that you want and Save the file. If you save it to the default ".config" file when prompted by menuconfig, you can find it in the 'xen' subdirectory of the build tree.

Configuration fragments are also supported. To use them you need to list the .cfg files in the SRC_URI.

security patches

The base recipe does not include security fixes that the Xen community releases as XSAs (http://xenbits.xen.org/xsa/). The easiest way to include those is to drop patches in 'recipes-extened/xen/files' and create a bbappend adding those patches to SRC_URI and they will be applied. Alternatively, you can override the SRC_URI to a git repo you provide that contains the patches.

recipe maintenance

Xen version update

The following rules shall be followed to define which versions of Xen have recipes in meta-virtualization:

  • Before a Yocto release meta-virtualization shall have recipes for:

    • the latest stable major version of Xen, and

    • the current version of the Xen master branch (known as the git recipes)

    • In addition, there may also be recipes included for the previous stable major version of Xen, in the case where the latest stable major version is new and the prior stable major version of Xen is to be the preferred version for the Yocto release

  • On Yocto LTS and the latest stable Yocto release branch, the preferred Xen major version that is present when the Yocto release is issued must stay supported and the recipes shall be regularly updated to follow updates available in the Xen stable branch for that Xen major release.

  • On Yocto LTS and the latest stable Yocto release branch, the recipes for the latest Xen major version shall also be regularly updated to follow updates available in the Xen stable branch for that Xen major release.

  • On the master / in-development Yocto branch, new Xen recipes shall be added when there is a new Xen major release.

    • depending on the timing of the next Yocto release, the new recipes may be preferred, or the prior major version recipes may remain preferred until after the Yocto release

    • the recipes for the previous Xen stable major version shall be removed from the branch when it is no longer the preferred Xen version

  • On Yocto LTS and the latest stable Yocto release branch, new Xen recipes shall be added when there is a new Xen major release.

    • The preferred version of the Xen recipes shall always stay at the same Xen major version once a Yocto release has been issued, and shall receive regular updates to track the stable Xen branch of that Xen release.

    • When new Xen recipes are added to a Yocto branch for a new Xen major version, then any older Xen recipes present, except for the original preferred version recipes, shall be marked as not updated anymore by adding a comment inside the recipes. The older recipes will not receive any build tests or be updated to follow the Xen branch.