Hi Jan,
On Tue, Jul 29, 2025 at 10:56 AM Jan Beulich wrote:
>
> On 28.07.2025 20:40, Mykola Kvach wrote:
> > From: Mykola Kvach
> >
> > Add domain_{lock,unlock} in the XEN_DOMCTL_setvcpucontext operation
> > for protecting arch_set_info_guest.
> >
> > This aligns with the locking pattern used by
From: Volodymyr Babchuk
Implement suspend and resume callbacks for the SCIF UART driver,
enabled when CONFIG_SYSTEM_SUSPEND is set. This allows proper
handling of UART state across system suspend/resume cycles.
Tested on Renesas R-Car H3 Starter Kit.
Signed-off-by: Volodymyr Babchuk
Signed-off
On Tue, Aug 05, 2025 at 04:15:28PM +0200, Roger Pau Monné wrote:
> On Wed, Jul 30, 2025 at 05:41:00PM +, dm...@proton.me wrote:
> > From: Denis Mukhin
> >
> > Introduce some basic infrastructure for doing domain ID allocation unit
> > tests,
> > and add a few tests that ensure correctness of
With hyperlaunch, a domU can start before its console ring is connected
by xenconsoled. With nothing emptying the ring, it can quickly fill
during boot. In domU_write_console(), __write_console() returns 0 when
the ring is full. This loops spins until xenconsoled starts emptying
the ring:
On Tue, Aug 05, 2025 at 03:38:37PM +0200, Roger Pau Monné wrote:
> On Wed, Jul 30, 2025 at 05:40:54PM +, dm...@proton.me wrote:
> > From: Denis Mukhin
> >
> > Currently, there are two different domain ID allocation implementations:
> >
> > 1) Sequential IDs allocation in dom0less Arm code ba
From: Denis Mukhin
Introduce domain_console for grouping data structures used for integrating
domain's diagnostic console with Xen's console driver.
Group all pbuf-related data structures under domain_console. Rename the moved
fields to plain .buf, .idx and .lock names, since all uses of the fi
The recent failure affected only glibc-based systems, so do the test on
Debian too.
Signed-off-by: Marek Marczykowski-Górecki
---
automation/gitlab-ci/test.yaml | 19 +++
1 file changed, 19 insertions(+)
diff --git a/automation/gitlab-ci/test.yaml b/automation/gitlab-ci/test.yam
Setup a simple two domU system. One with network backend, running
xendriverdomain service, and one with frontend, trying to ping the
backend.
Contrary to other similar tests, use disk image instead of initrd, to
allow bigger rootfs without adding more RAM (for both dom0 and domU).
But keep using p
This is intended to detect issues like recent xl devd crash in domU.
Pipeline:
https://gitlab.com/xen-project/people/marmarek/xen/-/pipelines/1970971528
I did checked that indeed it fails with the fix reverted - that's why the
second patch - Alpine version did not detected that regression.
Requi
On Thu, Aug 07, 2025 at 02:03:07AM +0200, Marek Marczykowski-Górecki wrote:
> Will be used as dom0/domU in some tests.
>
> Install OpenRC and setup it to start /etc/local.d/ scripts so tests
> don't need different cases for Alpine and Debian.
Looks like this one did not reached the list:
: host
On 2025-08-05 03:59, Jan Beulich wrote:
While it is correct that in shim-exclusive mode log-dirty handling is
all unreachable code, the present conditional still isn't correct: In a
HVM=n and SHADOW_PAGING=n configuration log-dirty code also is all
unreachable (and hence violating Misra rule 2.1)
On Wed, Aug 06, 2025 at 03:26:30PM -0300, Jason Gunthorpe wrote:
> On Mon, Aug 04, 2025 at 03:42:37PM +0300, Leon Romanovsky wrote:
> > +void debug_dma_map_phys(struct device *dev, phys_addr_t phys, size_t size,
> > + int direction, dma_addr_t dma_addr, unsigned long attrs)
> > {
> >
On Mon, Aug 04, 2025 at 03:42:39PM +0300, Leon Romanovsky wrote:
> diff --git a/drivers/iommu/dma-iommu.c b/drivers/iommu/dma-iommu.c
> index 399838c17b705..11c5d5f8c0981 100644
> --- a/drivers/iommu/dma-iommu.c
> +++ b/drivers/iommu/dma-iommu.c
> @@ -1190,11 +1190,9 @@ static inline size_t iova_un
On Mon, Aug 04, 2025 at 03:42:37PM +0300, Leon Romanovsky wrote:
> +void debug_dma_map_phys(struct device *dev, phys_addr_t phys, size_t size,
> + int direction, dma_addr_t dma_addr, unsigned long attrs)
> {
> struct dma_debug_entry *entry;
Should this patch should also absorb d
On Mon, Aug 04, 2025 at 03:42:36PM +0300, Leon Romanovsky wrote:
> From: Leon Romanovsky
>
> Make sure that CPU is not synced if MMIO path is taken.
Let's elaborate..
Implement DMA_ATTR_MMIO for dma_iova_link().
This will replace the hacky use of DMA_ATTR_SKIP_CPU_SYNC to avoid
touching the po
On Mon, Aug 04, 2025 at 03:42:35PM +0300, Leon Romanovsky wrote:
> From: Leon Romanovsky
>
> This patch introduces the DMA_ATTR_MMIO attribute to mark DMA buffers
> that reside in memory-mapped I/O (MMIO) regions, such as device BARs
> exposed through the host bridge, which are accessible for pee
On Wed, Aug 06, 2025 at 05:06:24PM +0200, Roger Pau Monné wrote:
> On Thu, Jul 31, 2025 at 07:22:06PM +, dm...@proton.me wrote:
> > From: Denis Mukhin
> Overall I agree for Jan it would be better if this patch could be
> split into somehow smaller units. Is this something feasible? We
> don
On 06/08/2025 5:55 pm, Andrew Cooper wrote:
> A toolstack is expected to use XEN_DOMCTL_hypercall_init where applicable to
> construct a new guest, but is absolutely not expected to use it against
> itself. Kernels have a stable ABI for accessing the same functionality, via
> MSR 0x4000.
>
> F
On 8/1/25 01:32, Nicola Vetrini wrote:
> On 2025-07-31 22:43, Dmytro Prokopchuk1 wrote:
>> MISRA C Rule 5.5 states: "Identifiers shall be distinct from macro
>> names".
>>
>> Update ECLAIR configuration to deviate clashes: specify the macros that
>> should be ignored. Update deviations.rst and r
A toolstack is expected to use XEN_DOMCTL_hypercall_init where applicable to
construct a new guest, but is absolutely not expected to use it against
itself. Kernels have a stable ABI for accessing the same functionality, via
MSR 0x4000.
Found when auditing hypercalls for Host UEFI-SecureBoot
Hi Bertrand,
On Thu, Jul 17, 2025 at 1:11 PM Bertrand Marquis
wrote:
>
> Create a CONFIG_FFA_VM_TO_VM parameter to activate FFA communication
> between VMs.
> When activated list VMs in the system with FF-A support in part_info_get.
>
> When VM to VM is activated, Xen will be tainted as Insecure
On 8/6/25 12:24, Oleksii Kurochko wrote:
>
> On 8/6/25 2:05 PM, Jan Beulich wrote:
>> On 06.08.2025 13:33, Oleksii Kurochko wrote:
>>> On 8/4/25 5:19 PM, Jan Beulich wrote:
On 31.07.2025 17:58, Oleksii Kurochko wrote:
> @@ -148,6 +149,8 @@ void __init noreturn start_xen(unsigned long
>>>
On 8/6/25 2:05 PM, Jan Beulich wrote:
On 06.08.2025 13:33, Oleksii Kurochko wrote:
On 8/4/25 5:19 PM, Jan Beulich wrote:
On 31.07.2025 17:58, Oleksii Kurochko wrote:
@@ -148,6 +149,8 @@ void __init noreturn start_xen(unsigned long bootcpu_id,
console_init_postirq();
+vmid_i
On 31.07.2025 17:58, Oleksii Kurochko wrote:
> --- a/xen/arch/riscv/include/asm/p2m.h
> +++ b/xen/arch/riscv/include/asm/p2m.h
> @@ -79,10 +79,20 @@ typedef enum {
> p2m_ext_storage,/* Following types'll be stored outsude PTE bits: */
> p2m_grant_map_rw, /* Read/write grant mapping
On Thu, Jul 31, 2025 at 07:22:06PM +, dm...@proton.me wrote:
> From: Denis Mukhin
>
> Add initial in-hypervisor emulator for NS8250/NS16x50-compatible UARTs under
> CONFIG_VUART_NS16550 for x86 port of Xen.
>
> x86 port of Xen lacks vUART facility similar to Arm's SBSA emulator to support
>
On Thu, Jul 31, 2025 at 07:22:12PM +, dm...@proton.me wrote:
> From: Denis Mukhin
>
> Enable UART emulator to be individually configured per HVM-domain.
>
> Signed-off-by: Denis Mukhin
> ---
> Changes since v3:
> - new patch
> ---
> docs/man/xl.cfg.5.pod.in | 9 --
> tool
According to the Arm SMMUv3 spec (ARM IHI 0070), a system may have
SMMU(s) that is/are non-coherent to the PE (processing element). In such
cases, memory accesses from the PE should be either non-cached or be
augmented with manual cache maintenance. SMMU cache coherency is reported
by bit 4 (COHACC
On Thu, Jul 31, 2025 at 07:21:54PM +, dm...@proton.me wrote:
> From: Denis Mukhin
>
> Move IRQ/IOMEM rangesets allocation before arch_domain_create().
>
> That guarantees that arch-specific code could access those rangesets to
> register traps for emulation.
>
> It is necessary for those e
On 2025-07-26 05:23, Julien Grall wrote:
Hi,
On 25/07/2025 15:01, Stewart Hildebrand wrote:
From: Stefano Stabellini
In preparation of exposing vITS to domUs, generalize arm_iommu_map_page
and arm_iommu_unmap_page to allow ITS doorbell mappings with dfn != mfn.
The mfn does not need to be pa
On 06.08.25 07:30, Elliott Mitchell wrote:
Sigh, resending as I lost some of the intended Cc targets when originally
creating the message. Sorry about the duplication for people who have
already seen, but I thought this might be worthy of wider discussion.
I would like to draw the attentio
On 2025-08-06 09:58, Stewart Hildebrand wrote:
On 7/26/25 05:23, Julien Grall wrote:
Hi,
On 25/07/2025 15:01, Stewart Hildebrand wrote:
From: Stefano Stabellini
Up until f9f6b22abf1d "xen/arm: Map ITS doorbell register to IOMMU page
tables" the only caller of iommu_map on ARM was grant_table
On Thu, Jul 31, 2025 at 07:21:49PM +, dm...@proton.me wrote:
> From: Denis Mukhin
>
> Introduce a driver framework to abstract UART emulators in the hypervisor.
>
> That allows for architecture-independent handling of virtual UARTs in the
> console driver and simplifies enabling new UART em
On 06.08.25 11:48, Julien Grall wrote:
Hi Grygorii,
On 06/08/2025 09:19, Grygorii Strashko wrote:
Hi Julien,
On 06.08.25 00:07, Julien Grall wrote:
Hi Grygorii,
On 05/08/2025 20:00, Grygorii Strashko wrote:
From: Grygorii Strashko
Call stack for dom0less hwdom case (1:1) memory:
create
On 7/26/25 05:23, Julien Grall wrote:
> Hi,
>
> On 25/07/2025 15:01, Stewart Hildebrand wrote:
>> From: Stefano Stabellini
>>
>> Up until f9f6b22abf1d "xen/arm: Map ITS doorbell register to IOMMU page
>> tables" the only caller of iommu_map on ARM was grant_table.c which has
>> a specific usage m
On Tue, Aug 05, 2025 at 12:54:31AM +, dm...@proton.me wrote:
> + Cc: Oleskii
>
> On Mon, Aug 04, 2025 at 11:46:36AM +0200, Jan Beulich wrote:
> > On 31.07.2025 21:21, dm...@proton.me wrote:
> > > --- a/xen/include/xen/sched.h
> > > +++ b/xen/include/xen/sched.h
> > > @@ -652,6 +652,8 @@ struct
On Thu, Jul 31, 2025 at 07:21:37PM +, dm...@proton.me wrote:
> x86 port of Xen lacks vUART facility similar to Arm's vpl011 to support x86
> guest OS bring up in the embedded setups.
>
> This patch series introduces initial in-hypervisor emulator for
> NS8250/NS16x50-compatible UARTs under CON
Introduce the following options :-
1. XEN_LOAD - This specifies command to load xen hypervisor binary and device
tree.
2. DOM0_LOAD - This specifies command to load Dom0 binaries.
3. DOMU_LOAD[] - This specifies command to load DomU binaries.
There can be situations where Xen, Dom0 and DomU binari
On 06.08.2025 12:53, Roger Pau Monné wrote:
> On Fri, Aug 01, 2025 at 09:34:42AM +0200, Jan Beulich wrote:
>> On 31.07.2025 23:42, dm...@proton.me wrote:
>>> On Thu, Jul 31, 2025 at 08:54:10AM +0200, Jan Beulich wrote:
On 30.07.2025 20:31, dm...@proton.me wrote:
> On Wed, Jul 30, 2025 at 1
On 06.08.2025 14:01, Oleksii Kurochko wrote:
>
> On 8/5/25 12:40 PM, Jan Beulich wrote:
>> On 31.07.2025 17:58, Oleksii Kurochko wrote:
>>> @@ -30,3 +34,18 @@ int p2m_init(struct domain *d)
>>>
>>> return 0;
>>> }
>>> +
>>> +/*
>>> + * Set the pool of pages to the required number of pag
On 06.08.2025 13:33, Oleksii Kurochko wrote:
> On 8/4/25 5:19 PM, Jan Beulich wrote:
>> On 31.07.2025 17:58, Oleksii Kurochko wrote:
>>> @@ -148,6 +149,8 @@ void __init noreturn start_xen(unsigned long bootcpu_id,
>>>
>>> console_init_postirq();
>>>
>>> +vmid_init();
>> This lives h
On 8/5/25 12:40 PM, Jan Beulich wrote:
On 31.07.2025 17:58, Oleksii Kurochko wrote:
@@ -30,3 +34,18 @@ int p2m_init(struct domain *d)
return 0;
}
+
+/*
+ * Set the pool of pages to the required number of pages.
+ * Returns 0 for success, non-zero for failure.
+ * Call with d->arch.p
On 8/4/25 5:53 PM, Jan Beulich wrote:
On 31.07.2025 17:58, Oleksii Kurochko wrote:
--- a/xen/arch/riscv/include/asm/p2m.h
+++ b/xen/arch/riscv/include/asm/p2m.h
@@ -3,11 +3,45 @@
#define ASM__RISCV__P2M_H
#include
+#include
+#include
+#include
#include
#define paddr_bits
On 8/4/25 5:19 PM, Jan Beulich wrote:
On 31.07.2025 17:58, Oleksii Kurochko wrote:
Current implementation is based on x86's way to allocate VMIDs:
VMIDs partition the physical TLB. In the current implementation VMIDs are
introduced to reduce the number of TLB flushes. Each time the guest
Hi Volodymyr,
I'm currently working with the R-Car H3e board and exploring Xen virtualization
on this platform. While I've found resources related to dom0 and domU
configurations, I'm specifically looking for guidance on building and launching
a full-fledged Linux VM on Xen-beyond the domd set
On Fri, Jul 25, 2025 at 09:24:48PM +, dm...@proton.me wrote:
> From: Denis Mukhin
>
> __printk_ratelimit() is never used outside of the console driver.
> Remove it from the lib.h and merge with the public printk_ratelimit().
>
> Not a functional change.
>
> Signed-off-by: Denis Mukhin
> -
On Fri, Aug 01, 2025 at 09:34:42AM +0200, Jan Beulich wrote:
> On 31.07.2025 23:42, dm...@proton.me wrote:
> > On Thu, Jul 31, 2025 at 08:54:10AM +0200, Jan Beulich wrote:
> >> On 30.07.2025 20:31, dm...@proton.me wrote:
> >>> On Wed, Jul 30, 2025 at 10:12:54AM +0200, Jan Beulich wrote:
> On 3
On Wed, Jul 30, 2025 at 03:13:31AM +, dm...@proton.me wrote:
> From: Denis Mukhin
>
> As it stands, polling timer is kept in the list of timers even after the
> interrupts have been enabled / polling disabled on ns16550-compatible UART.
>
> Ensure polling timer is removed from the timer lis
On Wed, Aug 06, 2025 at 12:36:56PM +0200, Jan Beulich wrote:
> On 06.08.2025 12:23, Marek Marczykowski-Górecki wrote:
> > We've got several reports that S3 reliability recently regressed. We
> > identified it's definitely related to XSA-471 patches, and bisection
> > points at "x86/idle: Remove bro
On 06.08.2025 12:23, Marek Marczykowski-Górecki wrote:
> We've got several reports that S3 reliability recently regressed. We
> identified it's definitely related to XSA-471 patches, and bisection
> points at "x86/idle: Remove broken MWAIT implementation". I don't have
> reliable reproduction steps
On 06.08.2025 10:11, Jan Beulich wrote:
> On 05.08.2025 17:27, Roger Pau Monné wrote:
>> On Tue, Aug 05, 2025 at 02:38:38PM +0200, Jan Beulich wrote:
>>> On 05.08.2025 11:52, Roger Pau Monne wrote:
--- a/xen/arch/x86/mm.c
+++ b/xen/arch/x86/mm.c
@@ -275,7 +275,7 @@ static void __init
Hi,
We've got several reports that S3 reliability recently regressed. We
identified it's definitely related to XSA-471 patches, and bisection
points at "x86/idle: Remove broken MWAIT implementation". I don't have
reliable reproduction steps, so I'm not 100% sure if it's really this
patch, or maybe
From: Grygorii Strashko
Hi,
During review of v1 [1] of this series Julien Grall raised concern that
"If the desire is to make 32-bit domain optional on Arm64.
Then I think it would be better to pass the domain type when the domain is
created (IOW add an extra flags to XEN_DOMCTL_createdomain).
From: Grygorii Strashko
Split is_32bit/64bit_domain() macro implementations between arm64/arm32.
Signed-off-by: Grygorii Strashko
---
v2:
- fix comments related to macro parameters evaluation issues
xen/arch/arm/include/asm/arm32/domain.h | 20 +
xen/arch/arm/include/asm/arm64
From: Grygorii Strashko
Constify is_32/64bit_domain() macro for the case CONFIG_ARM64_AARCH32=n and
so allow compiler to opt out Aarch32 specific code.
Before (CONFIG_ARM64_AARCH32=y):
textdata bss dec hex filename
859212 322404 270880 1452496 1629d0 xen-syms-before
After
From: Grygorii Strashko
Now Arm64 AArch32 guest support is always enabled and built-in while not
all Arm64 platforms supports AArch32 (for exmaple on Armv9A) or this
support might not be needed (Arm64 AArch32 is used quite rarely in embedded
systems). More over, when focusing on safety certificat
From: Grygorii Strashko
Split set_domain_type() between Arm64/Arm32 sub-arches as
set_domain_type() implementation is going to be extended for Arm64.
Signed-off-by: Grygorii Strashko
---
v2:
- no changes, rebase
xen/arch/arm/arm32/Makefile | 1 +
xen/arch/arm/arm32/domain-build.c | 22
On 29/07/2025 10:22, Orzel, Michal wrote:
>
> On 28/07/2025 19:07, Oleksii Moisieiev wrote:
>> This commit introduces a new Kconfig option, `CONFIG_DOM0_BOOT`, to
>> allow for building Xen without support for booting a regular domain (Dom0).
>> This functionality is primarily intended for the ARM
On 2025-08-05 15:22, Nicola Vetrini wrote:
On 2025-08-05 13:49, Dmytro Prokopchuk1 wrote:
On 7/31/25 19:09, Nicola Vetrini wrote:
On 2025-07-31 18:05, Andrew Cooper wrote:
On 31/07/2025 4:58 pm, Jan Beulich wrote:
On 31.07.2025 17:37, Andrew Cooper wrote:
On 31/07/2025 4:16 pm, Dmytro Prokop
On Tue, Aug 05, 2025 at 11:52:54AM +0200, Roger Pau Monne wrote:
> Introduce a set of unit tests for PDX compression. The unit tests contains
> both real and crafted memory maps that are then compressed using the
> selected PDX algorithm. Note the build system for the unit tests has been
> done i
Hi Grygorii,
On 06/08/2025 09:19, Grygorii Strashko wrote:
Hi Julien,
On 06.08.25 00:07, Julien Grall wrote:
Hi Grygorii,
On 05/08/2025 20:00, Grygorii Strashko wrote:
From: Grygorii Strashko
Call stack for dom0less hwdom case (1:1) memory:
create_domUs
|-construct_domU
|-construct_hwdo
On Wed, Aug 06, 2025 at 10:30:53AM +0200, Jan Beulich wrote:
> On 06.08.2025 10:22, Roger Pau Monné wrote:
> > On Tue, Aug 05, 2025 at 10:43:09AM +0200, Jan Beulich wrote:
> >> On 05.08.2025 05:49, Jiqian Chen wrote:
> >>> --- a/xen/drivers/vpci/msix.c
> >>> +++ b/xen/drivers/vpci/msix.c
> >>> @@ -
On 06.08.2025 10:22, Roger Pau Monné wrote:
> On Tue, Aug 05, 2025 at 10:43:09AM +0200, Jan Beulich wrote:
>> On 05.08.2025 05:49, Jiqian Chen wrote:
>>> --- a/xen/drivers/vpci/msix.c
>>> +++ b/xen/drivers/vpci/msix.c
>>> @@ -655,6 +655,48 @@ int vpci_make_msix_hole(const struct pci_dev *pdev)
>>>
On Tue, Aug 05, 2025 at 10:43:09AM +0200, Jan Beulich wrote:
> On 05.08.2025 05:49, Jiqian Chen wrote:
> > --- a/xen/drivers/vpci/msix.c
> > +++ b/xen/drivers/vpci/msix.c
> > @@ -655,6 +655,48 @@ int vpci_make_msix_hole(const struct pci_dev *pdev)
> > return 0;
> > }
> >
> > +static int cf_
Hi Julien,
On 06.08.25 00:07, Julien Grall wrote:
Hi Grygorii,
On 05/08/2025 20:00, Grygorii Strashko wrote:
From: Grygorii Strashko
Call stack for dom0less hwdom case (1:1) memory:
create_domUs
|-construct_domU
|-construct_hwdom()
|-allocate_memory_11()
And allocate_memory_11() use
On 06.08.2025 09:45, Oleksii Kurochko wrote:
> On 8/6/25 8:05 AM, Jan Beulich wrote:
>> Overall: There are very many items on this list, and it seems entirely clear
>> to
>> me that not all of them will make it. I think it would be quite helpful to
>> strip
>> down the set for 4.21 to some realis
On 2025/8/5 23:08, Ada Couprie Diaz wrote:
> Hi Jinjie,
>
> On 29/07/2025 02:54, Jinjie Ruan wrote:
>
>> Since commit a70e9f647f50 ("entry: Split generic entry into generic
>> exception and syscall entry") split the generic entry into generic irq
>> entry and generic syscall entry, it is time
On 05.08.2025 17:27, Roger Pau Monné wrote:
> On Tue, Aug 05, 2025 at 02:38:38PM +0200, Jan Beulich wrote:
>> On 05.08.2025 11:52, Roger Pau Monne wrote:
>>> --- a/xen/arch/x86/mm.c
>>> +++ b/xen/arch/x86/mm.c
>>> @@ -275,7 +275,7 @@ static void __init assign_io_page(struct page_info
>>> *page)
>>
On Tue, Aug 05, 2025 at 10:40:00AM +0200, Jan Beulich wrote:
> On 05.08.2025 10:27, Chen, Jiqian wrote:
> > On 2025/8/5 16:10, Jan Beulich wrote:
> >> On 05.08.2025 05:49, Jiqian Chen wrote:
> >>> When MSI-X initialization fails vPCI will hide the capability, but
> >>> remove of handlers and data w
On 8/6/25 8:05 AM, Jan Beulich wrote:
On 05.08.2025 20:19, Oleksii Kurochko wrote:
* Full list of items : *
= Projects =
== Hypervisor ==
* [4.21] xen/console: cleanup console input switch logic (v5)
- Denis Mukhin
-
https://lore.kernel.org/xen-devel/20250530231841.73386-1-dmuk...@fo
On Tue, Aug 05, 2025 at 11:30:58AM -0400, Jason Andryuk wrote:
> On 2025-08-04 11:41, Jan Beulich wrote:
> > While the logic there covers asymmetric cases, the resulting log
> > messages would likely raise more confusion than clarify anything. Split
> > the BSP action from the AP one, indicating th
70 matches
Mail list logo