From nobody Thu Oct 30 19:06:30 2025 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=pass(p=none dis=none) header.from=gmail.com ARC-Seal: i=1; a=rsa-sha256; t=1753779169; cv=none; d=zohomail.com; s=zohoarc; b=dkmACwaLx/6gpSSh6NbUmseNnVDInUSqsFbcVKRgys68f0cKpdt3v6BB/PWun9mAMOjihHyzGJ9HauizyRfPvbwgqKP8PO+X0KoakeaCYQsOElSfraEAq3xGfQH1LJ+cxtkEnNhqiCFebsuzTsWy+evOjHRGfQsb/VJbgT+WYyI= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1753779169; h=Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=kpKdhuPFHZzNA1oxnqzr6HIQt3R5lrFjm83AAIpDVog=; b=mlWAG4Us/P0FEgeq2uOg3LN08t7v5XI34O7lqyg8IXHXiSqk1xnK3+k/JkZ1PLBF9oa01AUniD43Vw4jslm792XP9iA1c4VuLKwx0/TK2ibrSwxf9by+fJhq2/OSCymTBeNyl1m7swDUH6JAnk5PQTyuKvPH3vNSSKRryQ//sS0= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=pass header.from= (p=none dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1753779168955421.2292799003627; Tue, 29 Jul 2025 01:52:48 -0700 (PDT) Received: from list by lists.xenproject.org with outflank-mailman.1062242.1427890 (Exim 4.92) (envelope-from ) id 1ugg4X-0006Pu-5a; Tue, 29 Jul 2025 08:52:33 +0000 Received: by outflank-mailman (output) from mailman id 1062242.1427890; Tue, 29 Jul 2025 08:52:33 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1ugg4X-0006Pn-2J; Tue, 29 Jul 2025 08:52:33 +0000 Received: by outflank-mailman (input) for mailman id 1062242; Tue, 29 Jul 2025 08:52:31 +0000 Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254] helo=se1-gles-sth1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1ugg4V-0006C0-Kc for xen-devel@lists.xenproject.org; Tue, 29 Jul 2025 08:52:31 +0000 Received: from mail-lf1-x136.google.com (mail-lf1-x136.google.com [2a00:1450:4864:20::136]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS id 5c685540-6c59-11f0-a31e-13f23c93f187; Tue, 29 Jul 2025 10:52:30 +0200 (CEST) Received: by mail-lf1-x136.google.com with SMTP id 2adb3069b0e04-5562838ce68so4655192e87.2 for ; Tue, 29 Jul 2025 01:52:30 -0700 (PDT) Received: from yp-VivoBook-ASUSLaptop-M1503QA-M1503QA.. ([95.67.15.120]) by smtp.gmail.com with ESMTPSA id 2adb3069b0e04-55b63375ca4sm1584998e87.124.2025.07.29.01.52.28 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 29 Jul 2025 01:52:28 -0700 (PDT) X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 5c685540-6c59-11f0-a31e-13f23c93f187 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1753779150; x=1754383950; darn=lists.xenproject.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=kpKdhuPFHZzNA1oxnqzr6HIQt3R5lrFjm83AAIpDVog=; b=gw6BVp9VnUr/wa26N0omMtSdjrOiq6u+mF3Vmd0n13tfZko4rFD4JGZseQCJEWOp44 qAHe1PGKe9afynkra/D7zaLCaLN1BP7EkVTXhqavxiqf6xQSULYRWjUpdOk8H47CQel0 e7y66LZ05lNu2RHgVWrUajfCNx6mh52sQQAAJ/6JlrpMygvRnU1aUM2JYf1eEhgzPFFQ MKhm/+O5CRzaf8pmkWxpuBWiJoSTUKLQn+zNuu0JeX6dPxGqqsx0NGjSA4i8NHbekcYh OYAdW/n6cDCxSkijz0Nr97Cwkjg8y0tiHv0aPjRcI5g5ev1PbgFLpAoL8GgG+AubpoqI DErg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1753779150; x=1754383950; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=kpKdhuPFHZzNA1oxnqzr6HIQt3R5lrFjm83AAIpDVog=; b=F9tuuF+K/rvTUEWd2T1TyA/sSKR4GmjYschhWUikV7PgkwhK/+LgvFeo0Xogxlz0Ta 3crcOWXVCVcpSzsBxePz4VhMMDgY4BfosmtYXvMl0VrhpNOLWWTJPQq9vAHPDVmUOgey rbVXhxo4Y59ROrdWO/kccQJoOAHgpMkcjK+rYdutYrAulps2wxFryYZZ+3ND9EmAZHmw 4dNy5GIFnneFSeGDch67jsg10MN7Q5+ZvgrLgVb/4X7hwkTJMiIysCJa+M1Vc0YP0Qxy iWveJzZFkFylDJj6EyawxGAuVzpTpzaNORXBNIo2OAoEA6FiJwndjesbYVG5me/43Pzt +6Tg== X-Gm-Message-State: AOJu0YzYfcQzYprfHNxYZlPfYi/pehnaf240dOPU4D+wHLyFWnpgP5sP 0YBGDOArDJLetCaFCmCVzINlBHKl+yxUtVhk69Za9Xwqk+ouaY5tJmHlJjbkiA== X-Gm-Gg: ASbGncsGxFN8XknkH1A0s3t9YnYDkJGrv5njbZgu6yHvNNhLmTor9JoN15zQvAqZrl2 lVi3PzsL0Ejx+8om07R90caW1ItTVH1P4V3ifb4oncg1ocMLC6mFrUVepMwKJYzhnY4hz+b56LR vTwy8Ymmq2ktdhLDul+yccrPEQ5u1V4det5kgCD9eJs4+bdH4RYvLMGXwTYjjIXwcv2HCEIO1GX mbz71nuvfvX1gHHzoWKHEPp+yl6J+SE52DcB88aVYuJ6fN9PNFpybMaQzQUX2JQSStqw+AJUw2e YXXMKd8/IbZTBt6XrqMyDXALXAFzkCeh33lb8Js/CV4PhMaMmSH2YSPHBR3pzINZsiaou+/2EAk WOiJJgy+ngrIIsUF0yHxxeWz0waKT2ZIqW+TpbNAvOJp5qjZkIDM1J8z6qbTpjw== X-Google-Smtp-Source: AGHT+IE1SNHS+vq6TV4Mz4fvBAP49zSjvKDSYnm+lYChgBQrH/WtqD7cLXteVGSft536lhPs6ZUPGw== X-Received: by 2002:a05:6512:3b27:b0:553:2311:e1f6 with SMTP id 2adb3069b0e04-55b5f5108e1mr3486360e87.49.1753779149711; Tue, 29 Jul 2025 01:52:29 -0700 (PDT) From: Mykola Kvach To: xen-devel@lists.xenproject.org Cc: Mykola Kvach , Stefano Stabellini , Julien Grall , Bertrand Marquis , Michal Orzel , Volodymyr Babchuk , Andrew Cooper , Anthony PERARD , Jan Beulich , =?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= Subject: [PATCH v7 1/4] xen/arm: Implement PSCI SYSTEM_SUSPEND call for guests Date: Tue, 29 Jul 2025 11:52:11 +0300 Message-ID: <45e670391c37ab54f721b6576a41ded2e543d6db.1753778926.git.mykola_kvach@epam.com> X-Mailer: git-send-email 2.48.1 In-Reply-To: References: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-ZohoMail-DKIM: pass (identity @gmail.com) X-ZM-MESSAGEID: 1753779170759116600 Content-Type: text/plain; charset="utf-8" From: Mykola Kvach This patch adds support for the PSCI SYSTEM_SUSPEND function in the vPSCI (virtual PSCI) interface, allowing guests to request suspend via the PSCI v1.0 SYSTEM_SUSPEND call (both 32-bit and 64-bit variants). The implementation: - Adds SYSTEM_SUSPEND function IDs to PSCI definitions - Implements trapping and handling of SYSTEM_SUSPEND in vPSCI - Allows only non-hardware domains to invoke SYSTEM_SUSPEND; for the hardware domain, PSCI_NOT_SUPPORTED is returned to avoid halting the system in hwdom_shutdown() called from domain_shutdown - Ensures all secondary VCPUs of the calling domain are offline before allowing suspend due to PSCI spec Usage: For Linux-based guests, suspend can be initiated with: echo mem > /sys/power/state or via: systemctl suspend Resuming the guest is performed from control domain using: xl resume Signed-off-by: Mykola Kvach --- Changes in V7: - add proper locking - minor changes after code review Changes in V6: - skip execution of ctxt_switch_from for vcpu that is in paused domain - add implementation of domain_resume without domain_pause - add helper function to determine if vcpu is suspended or not - ignore upper 32 bits of argument values when the domain is 64-bit and calls the SMC32 SYSTEM_SUSPEND function - cosmetic changes after review Changes in V5: - don't use standby mode, restore execution in a provided by guest point - move checking that all CPUs, except current one, are offline to after pausing the vCPUs - provide ret status from arch_domain_shutdown and handle it in domain_shutdown - adjust VPSCI_NR_FUNCS to reflect the number of newly added PSCI functions Changes in V4: Dropped all changes related to watchdog, domain is marked as shutting down in domain_shutdown and watchdog timeout handler won't trigger because of it. Previous versions included code to manage Xen watchdog timers during suspen= d, but this was removed. When a guest OS starts the Xen watchdog (either via t= he kernel driver or xenwatchdogd), it is responsible for managing that state across suspend/resume. On Linux, the Xen kernel driver properly stops the watchdog during suspend. However, when xenwatchdogd is used instead, suspend handling is incomplete, potentially leading to watchdog-triggered resets on resume. Xen leaves watchdog handling to the guest OS and its services. Dropped all changes related to VCPU context, because instead domain_shutdown is used, so we don't need any extra changes for suspending domain. Changes in V3: Dropped all domain flags and related code (which touched common functions l= ike vcpu_unblock), keeping only the necessary changes for Xen suspend/resume, i= .e. suspend/resume is now fully supported only for the hardware domain. Proper support for domU suspend/resume will be added in a future patch. This patch does not yet include VCPU context reset or domain context restoration in VCPU. --- xen/arch/arm/domain.c | 3 + xen/arch/arm/include/asm/perfc_defn.h | 1 + xen/arch/arm/include/asm/psci.h | 2 + xen/arch/arm/include/asm/vpsci.h | 2 +- xen/arch/arm/vpsci.c | 104 ++++++++++++++++++++++---- xen/common/domain.c | 25 +++++-- xen/include/xen/sched.h | 7 ++ 7 files changed, 122 insertions(+), 22 deletions(-) diff --git a/xen/arch/arm/domain.c b/xen/arch/arm/domain.c index 310c578909..451b468755 100644 --- a/xen/arch/arm/domain.c +++ b/xen/arch/arm/domain.c @@ -90,6 +90,9 @@ static void ctxt_switch_from(struct vcpu *p) if ( is_idle_vcpu(p) ) return; =20 + if ( test_bit(_VPF_suspended, &p->pause_flags) ) + return; + p2m_save_state(p); =20 /* CP 15 */ diff --git a/xen/arch/arm/include/asm/perfc_defn.h b/xen/arch/arm/include/a= sm/perfc_defn.h index effd25b69e..8dfcac7e3b 100644 --- a/xen/arch/arm/include/asm/perfc_defn.h +++ b/xen/arch/arm/include/asm/perfc_defn.h @@ -33,6 +33,7 @@ PERFCOUNTER(vpsci_system_reset, "vpsci: system_res= et") PERFCOUNTER(vpsci_cpu_suspend, "vpsci: cpu_suspend") PERFCOUNTER(vpsci_cpu_affinity_info, "vpsci: cpu_affinity_info") PERFCOUNTER(vpsci_features, "vpsci: features") +PERFCOUNTER(vpsci_system_suspend, "vpsci: system_suspend") =20 PERFCOUNTER(vcpu_kick, "vcpu: notify other vcpu") =20 diff --git a/xen/arch/arm/include/asm/psci.h b/xen/arch/arm/include/asm/psc= i.h index 4780972621..48a93e6b79 100644 --- a/xen/arch/arm/include/asm/psci.h +++ b/xen/arch/arm/include/asm/psci.h @@ -47,10 +47,12 @@ void call_psci_system_reset(void); #define PSCI_0_2_FN32_SYSTEM_OFF PSCI_0_2_FN32(8) #define PSCI_0_2_FN32_SYSTEM_RESET PSCI_0_2_FN32(9) #define PSCI_1_0_FN32_PSCI_FEATURES PSCI_0_2_FN32(10) +#define PSCI_1_0_FN32_SYSTEM_SUSPEND PSCI_0_2_FN32(14) =20 #define PSCI_0_2_FN64_CPU_SUSPEND PSCI_0_2_FN64(1) #define PSCI_0_2_FN64_CPU_ON PSCI_0_2_FN64(3) #define PSCI_0_2_FN64_AFFINITY_INFO PSCI_0_2_FN64(4) +#define PSCI_1_0_FN64_SYSTEM_SUSPEND PSCI_0_2_FN64(14) =20 /* PSCI v0.2 affinity level state returned by AFFINITY_INFO */ #define PSCI_0_2_AFFINITY_LEVEL_ON 0 diff --git a/xen/arch/arm/include/asm/vpsci.h b/xen/arch/arm/include/asm/vp= sci.h index 0cca5e6830..69d40f9d7f 100644 --- a/xen/arch/arm/include/asm/vpsci.h +++ b/xen/arch/arm/include/asm/vpsci.h @@ -23,7 +23,7 @@ #include =20 /* Number of function implemented by virtual PSCI (only 0.2 or later) */ -#define VPSCI_NR_FUNCS 12 +#define VPSCI_NR_FUNCS 14 =20 /* Functions handle PSCI calls from the guests */ bool do_vpsci_0_1_call(struct cpu_user_regs *regs, uint32_t fid); diff --git a/xen/arch/arm/vpsci.c b/xen/arch/arm/vpsci.c index 7ba9ccd94b..c8f74fd28b 100644 --- a/xen/arch/arm/vpsci.c +++ b/xen/arch/arm/vpsci.c @@ -10,28 +10,18 @@ =20 #include =20 -static int do_common_cpu_on(register_t target_cpu, register_t entry_point, - register_t context_id) +static int do_setup_vcpu_ctx(struct vcpu *v, register_t entry_point, + register_t context_id) { - struct vcpu *v; struct domain *d =3D current->domain; struct vcpu_guest_context *ctxt; int rc; bool is_thumb =3D entry_point & 1; - register_t vcpuid; - - vcpuid =3D vaffinity_to_vcpuid(target_cpu); - - if ( (v =3D domain_vcpu(d, vcpuid)) =3D=3D NULL ) - return PSCI_INVALID_PARAMETERS; =20 /* THUMB set is not allowed with 64-bit domain */ if ( is_64bit_domain(d) && is_thumb ) return PSCI_INVALID_ADDRESS; =20 - if ( !test_bit(_VPF_down, &v->pause_flags) ) - return PSCI_ALREADY_ON; - if ( (ctxt =3D alloc_vcpu_guest_context()) =3D=3D NULL ) return PSCI_DENIED; =20 @@ -78,11 +68,32 @@ static int do_common_cpu_on(register_t target_cpu, regi= ster_t entry_point, if ( rc < 0 ) return PSCI_DENIED; =20 - vcpu_wake(v); - return PSCI_SUCCESS; } =20 +static int do_common_cpu_on(register_t target_cpu, register_t entry_point, + register_t context_id) +{ + int rc; + struct vcpu *v; + struct domain *d =3D current->domain; + register_t vcpuid; + + vcpuid =3D vaffinity_to_vcpuid(target_cpu); + + if ( (v =3D domain_vcpu(d, vcpuid)) =3D=3D NULL ) + return PSCI_INVALID_PARAMETERS; + + if ( !test_bit(_VPF_down, &v->pause_flags) ) + return PSCI_ALREADY_ON; + + rc =3D do_setup_vcpu_ctx(v, entry_point, context_id); + if ( rc =3D=3D PSCI_SUCCESS ) + vcpu_wake(v); + + return rc; +} + static int32_t do_psci_cpu_on(uint32_t vcpuid, register_t entry_point) { int32_t ret; @@ -197,6 +208,51 @@ static void do_psci_0_2_system_reset(void) domain_shutdown(d,SHUTDOWN_reboot); } =20 +static int32_t do_psci_1_0_system_suspend(register_t epoint, register_t ci= d) +{ + int32_t rc; + struct vcpu *v; + struct domain *d =3D current->domain; + + /* SYSTEM_SUSPEND is not supported for the hardware domain yet */ + if ( is_hardware_domain(d) ) + return PSCI_NOT_SUPPORTED; + + domain_lock(d); + + /* Ensure that all CPUs other than the calling one are offline */ + for_each_vcpu ( d, v ) + { + if ( v !=3D current && is_vcpu_online(v) ) + { + rc =3D PSCI_DENIED; + goto exit_unlock; + } + } + + rc =3D do_setup_vcpu_ctx(current, epoint, cid); + if ( rc !=3D PSCI_SUCCESS ) + goto exit_unlock; + + rc =3D domain_shutdown(d, SHUTDOWN_suspend) ? + PSCI_INTERNAL_FAILURE : PSCI_SUCCESS; + if ( rc !=3D PSCI_SUCCESS ) + { + domain_resume_nopause(d); + goto exit_unlock; + } + + set_bit(_VPF_suspended, ¤t->pause_flags); + + dprintk(XENLOG_INFO, + "Dom %u: SYSTEM_SUSPEND requested, epoint=3D%#lx, cid=3D%#lx\n= ", + d->domain_id, epoint, cid); + + exit_unlock: + domain_unlock(d); + return rc; +} + static int32_t do_psci_1_0_features(uint32_t psci_func_id) { /* /!\ Ordered by function ID and not name */ @@ -214,6 +270,8 @@ static int32_t do_psci_1_0_features(uint32_t psci_func_= id) case PSCI_0_2_FN32_SYSTEM_OFF: case PSCI_0_2_FN32_SYSTEM_RESET: case PSCI_1_0_FN32_PSCI_FEATURES: + case PSCI_1_0_FN32_SYSTEM_SUSPEND: + case PSCI_1_0_FN64_SYSTEM_SUSPEND: case ARM_SMCCC_VERSION_FID: return 0; default: @@ -344,6 +402,24 @@ bool do_vpsci_0_2_call(struct cpu_user_regs *regs, uin= t32_t fid) return true; } =20 + case PSCI_1_0_FN32_SYSTEM_SUSPEND: + case PSCI_1_0_FN64_SYSTEM_SUSPEND: + { + register_t epoint =3D PSCI_ARG(regs, 1); + register_t cid =3D PSCI_ARG(regs, 2); + + if ( is_64bit_domain(current->domain) && + fid =3D=3D PSCI_1_0_FN32_SYSTEM_SUSPEND ) + { + epoint &=3D GENMASK(31, 0); + cid &=3D GENMASK(31, 0); + } + + perfc_incr(vpsci_system_suspend); + PSCI_SET_RESULT(regs, do_psci_1_0_system_suspend(epoint, cid)); + return true; + } + default: return false; } diff --git a/xen/common/domain.c b/xen/common/domain.c index 3c65cca5b0..bd698dfc0f 100644 --- a/xen/common/domain.c +++ b/xen/common/domain.c @@ -1334,16 +1334,15 @@ int domain_shutdown(struct domain *d, u8 reason) return 0; } =20 -void domain_resume(struct domain *d) +#ifdef CONFIG_ARM +void domain_resume_nopause(struct domain *d) +#else +static void domain_resume_nopause(struct domain *d) +#endif { struct vcpu *v; =20 - /* - * Some code paths assume that shutdown status does not get reset under - * their feet (e.g., some assertions make this assumption). - */ - domain_pause(d); - + domain_lock(d); spin_lock(&d->shutdown_lock); =20 d->is_shutting_down =3D d->is_shut_down =3D 0; @@ -1351,13 +1350,25 @@ void domain_resume(struct domain *d) =20 for_each_vcpu ( d, v ) { + clear_bit(_VPF_suspended, &v->pause_flags); + if ( v->paused_for_shutdown ) vcpu_unpause(v); v->paused_for_shutdown =3D 0; } =20 spin_unlock(&d->shutdown_lock); + domain_unlock(d); +} =20 +void domain_resume(struct domain *d) +{ + /* + * Some code paths assume that shutdown status does not get reset under + * their feet (e.g., some assertions make this assumption). + */ + domain_pause(d); + domain_resume_nopause(d); domain_unpause(d); } =20 diff --git a/xen/include/xen/sched.h b/xen/include/xen/sched.h index fe53d4fab7..5647a15c84 100644 --- a/xen/include/xen/sched.h +++ b/xen/include/xen/sched.h @@ -814,6 +814,9 @@ void domain_destroy(struct domain *d); int domain_kill(struct domain *d); int domain_shutdown(struct domain *d, u8 reason); void domain_resume(struct domain *d); +#ifdef CONFIG_ARM +void domain_resume_nopause(struct domain *d); +#endif =20 int domain_soft_reset(struct domain *d, bool resuming); =20 @@ -1010,6 +1013,10 @@ static inline struct domain *next_domain_in_cpupool( /* VCPU is parked. */ #define _VPF_parked 8 #define VPF_parked (1UL<<_VPF_parked) +/* VCPU is suspended. */ +#define _VPF_suspended 9 +#define VPF_suspended (1UL<<_VPF_suspended) + =20 static inline bool vcpu_runnable(const struct vcpu *v) { --=20 2.48.1 From nobody Thu Oct 30 19:06:30 2025 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=pass(p=none dis=none) header.from=gmail.com ARC-Seal: i=1; a=rsa-sha256; t=1753779168; cv=none; d=zohomail.com; s=zohoarc; b=ZDJTZmMhHFnW369MFbx6EAaBe06JFHtO9mrQtqya5vSA+V/tvIePpJEgFkVakm7eK0Ifs9y95Zf4FzcMlAUlj6eFXjNyMnkOeyjIgp6nzJAVI32z1ELJ8SKkdWS5ni9C3rXHVn8LsNvh3r85BZEsyN9TgG9gxVkJW/tlU/oMDsU= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1753779168; h=Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=h+sWQJKeBDFdiPLTp8aPAqIiX1r4WoXR6KMm4vOtk3U=; b=HpzG5auUdljtLPTkqKgv9pN7xHHAh9Wwp5OUNzDx11AM9vUFeFY0tvV/Jg5TOSHoKGIIJfDLdozkgn9ugP+QOeSRPTLMSubsV74zGKMIT4rNsAHXPwQkQXsWAlmGkMYQjsXEl1WEd2jCJPYtn8hA6juz587TZw40d4iOXBF7TgI= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=pass header.from= (p=none dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1753779168619518.7603318456139; Tue, 29 Jul 2025 01:52:48 -0700 (PDT) Received: from list by lists.xenproject.org with outflank-mailman.1062243.1427894 (Exim 4.92) (envelope-from ) id 1ugg4X-0006Su-Bc; Tue, 29 Jul 2025 08:52:33 +0000 Received: by outflank-mailman (output) from mailman id 1062243.1427894; Tue, 29 Jul 2025 08:52:33 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1ugg4X-0006Rh-8Z; Tue, 29 Jul 2025 08:52:33 +0000 Received: by outflank-mailman (input) for mailman id 1062243; Tue, 29 Jul 2025 08:52:32 +0000 Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254] helo=se1-gles-sth1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1ugg4W-0006C0-6y for xen-devel@lists.xenproject.org; Tue, 29 Jul 2025 08:52:32 +0000 Received: from mail-lf1-x12b.google.com (mail-lf1-x12b.google.com [2a00:1450:4864:20::12b]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS id 5cd43c03-6c59-11f0-a31e-13f23c93f187; Tue, 29 Jul 2025 10:52:31 +0200 (CEST) Received: by mail-lf1-x12b.google.com with SMTP id 2adb3069b0e04-553ba7f11cbso5731660e87.1 for ; Tue, 29 Jul 2025 01:52:31 -0700 (PDT) Received: from yp-VivoBook-ASUSLaptop-M1503QA-M1503QA.. ([95.67.15.120]) by smtp.gmail.com with ESMTPSA id 2adb3069b0e04-55b63375ca4sm1584998e87.124.2025.07.29.01.52.29 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 29 Jul 2025 01:52:30 -0700 (PDT) X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 5cd43c03-6c59-11f0-a31e-13f23c93f187 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1753779151; x=1754383951; darn=lists.xenproject.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=h+sWQJKeBDFdiPLTp8aPAqIiX1r4WoXR6KMm4vOtk3U=; b=Pq6kqr6sVBRdRK8V6d7GaMVREcMFoitMcgbGv+yMDi1jPomNBtBIK3Sqmspzq6SJDw foVyEOZp5A9D2bl1T8CSGGEiLuGcVLJoW505ZeHUatQlAO5VemrQy3JzAe0S1A2LNaEY 8xagiUDwz/82ZN10fQuHVDdZ6sx4QtjAWOnwARajpzCwv4j0f8jFA9oQxFxCGXt/8d/U at1rtoR14GP0bzgo1VMn6/g4ao/KDXIhq2W+UgoUdHXX8Tu6xiQnc/PH7P2+at7l3emd 2XgQdDk8U6G0eG0yqLLP/9mWGPaAufzpT9P+qy1L3grHWu5o83mJRyhHXK1dcVi9eQrN sXPA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1753779151; x=1754383951; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=h+sWQJKeBDFdiPLTp8aPAqIiX1r4WoXR6KMm4vOtk3U=; b=Z11bn0CHnCI4UN6Zjd84Hm/8HxmiAoL0Yax/ZMWk0T5kzADcNoLmygi0koa197Gf1a X4qdfJsH2GG5Hd/Mhz3nfGwuJmE2ug0GL1/HIiQICg+hYBIVA6wfrwwFgY5+OSEmrD/t 1djINsZcr/7CvWxRtUrE5POanFLMo+J2ruDPNKTcAgj8PazMW0TuMEd9/6v1i3E+NoIt EVQfzmcLGHp8+yl2lYUYEIljbgmMES7k60wXyd6EFoqrLQ8Z25cHDflMp+uGpiGJMj5q da0omQB5M74KL2/VzUfWEHJTVJMa2UG5YJceCR54mp0lsw6q825cTUW3+rYjRCMk4inB 1r7Q== X-Gm-Message-State: AOJu0Yz3XlvBdT5lJxp0rASwqGesGmcn5/MltzJhzcLF4rz3fOROC9qq Hce0GLzwUGUhH1Y8IG9vYgYWRtgXdxE4JYUsy7cN7g6IBOJ4en+4Xo3UOX6Lig== X-Gm-Gg: ASbGncsU1N1drwTiOYDvMUxqV9l1gJNfZMmQ1SCmXY6So5uSzBty1GCv0mmZ2vFCyIw ZHiejv8553vO6KktH8Hs8/B4Wu9rjYu5wmUNvKSu2jA2c8+1bhmLsq9qp0q3hc5Kbqkgge34UFd SUHCAovAhVMPA7b2WyeBWuiADJrvqboF2U86j0VdmY3ZxsKHwhgpJsZviOySlyRf/rkjUDcP7Si EpHGUMoCHEa3Ho0dOCvHC0nqIJn6Rkke1zxg8YrYIDyPmVH/6OjyLgDx3YMftIFCuWhK6TOZIpX rJIu9cdykPh3AIp4JVCUHBYo2A8JQYcJSJktDbzwNJKX6spDug8to4mRjadU/hukq0bf+Jn+OkV RG5ITfeuSMs3/Qkr1iqK3xAmg/H9HnvEAB2G5Y+TsBw1xpOBPrAY5VUbZsHExukTbjYRo/KsD X-Google-Smtp-Source: AGHT+IHOmZXLHkYG+xZYnthWDLlRakbFM8nUItbevJL3N6gcww1XX+UgFct4ylmqMR6B7g4R4YZ0nw== X-Received: by 2002:a05:6512:a8e:b0:553:2dce:3aad with SMTP id 2adb3069b0e04-55b5f3cf7c3mr3959045e87.7.1753779150596; Tue, 29 Jul 2025 01:52:30 -0700 (PDT) From: Mykola Kvach To: xen-devel@lists.xenproject.org Cc: Mykola Kvach , Anthony PERARD , Juergen Gross Subject: [PATCH v7 2/4] tools/xl: Allow compilation of 'xl resume' command on Arm Date: Tue, 29 Jul 2025 11:52:12 +0300 Message-ID: <1394ced0f1268244bfe4875152874f3f8ee0378a.1753778926.git.mykola_kvach@epam.com> X-Mailer: git-send-email 2.48.1 In-Reply-To: References: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-ZohoMail-DKIM: pass (identity @gmail.com) X-ZM-MESSAGEID: 1753779170602116600 Content-Type: text/plain; charset="utf-8" From: Mykola Kvach The "xl resume" command was previously excluded from Arm builds because system suspend/resume (e.g., SYSTEM_SUSPEND via vPSCI) was not implemented. On x86, this command is used for resume. This change enables compilation of `xl resume` on Arm regardless of the underlying implementation status, making the tool available for testing and future feature support. The relevant libxl infrastructure and handler functions are already present and usable. Note: This does not imply full system suspend/resume support on Arm. The `xl suspend` command still does not work on Arm platforms. Signed-off-by: Mykola Kvach Acked-by: Anthony PERARD --- Changes in v7: - dropped renaming of LIBXL_HAVE_NO_SUSPEND_RESUME macro Changes in v6: - Renamed macro from LIBXL_HAVE_NO_SUSPEND_RESUME to LIBXL_HAVE_NO_SUSPEND to better reflect the scope of this change - Applied cosmetic changes based on review feedback --- tools/include/libxl.h | 1 - tools/xl/xl.h | 4 ++-- tools/xl/xl_cmdtable.c | 4 ++-- tools/xl/xl_migrate.c | 2 +- tools/xl/xl_saverestore.c | 2 +- tools/xl/xl_vmcontrol.c | 12 ++++++------ 6 files changed, 12 insertions(+), 13 deletions(-) diff --git a/tools/include/libxl.h b/tools/include/libxl.h index d6b6e5d2dd..94fc0354be 100644 --- a/tools/include/libxl.h +++ b/tools/include/libxl.h @@ -1134,7 +1134,6 @@ typedef struct libxl__ctx libxl_ctx; * restoring or migrating a domain. In this case the related functions * should be expected to return failure. That is: * - libxl_domain_suspend - * - libxl_domain_resume * - libxl_domain_remus_start */ #if defined(__arm__) || defined(__aarch64__) diff --git a/tools/xl/xl.h b/tools/xl/xl.h index 45745f0dbb..9233b73f85 100644 --- a/tools/xl/xl.h +++ b/tools/xl/xl.h @@ -65,7 +65,7 @@ static const char migrate_permission_to_go[]=3D "domain is yours, you are cleared to unpause"; static const char migrate_report[]=3D "my copy unpause results are as follows"; -#endif +#endif /* !LIBXL_HAVE_NO_SUSPEND_RESUME */ =20 /* followed by one byte: * 0: everything went well, domain is running @@ -130,8 +130,8 @@ int main_migrate_receive(int argc, char **argv); int main_save(int argc, char **argv); int main_migrate(int argc, char **argv); int main_suspend(int argc, char **argv); +#endif /* !LIBXL_HAVE_NO_SUSPEND_RESUME */ int main_resume(int argc, char **argv); -#endif int main_dump_core(int argc, char **argv); int main_pause(int argc, char **argv); int main_unpause(int argc, char **argv); diff --git a/tools/xl/xl_cmdtable.c b/tools/xl/xl_cmdtable.c index 06a0039718..bcb2d233cc 100644 --- a/tools/xl/xl_cmdtable.c +++ b/tools/xl/xl_cmdtable.c @@ -198,12 +198,12 @@ const struct cmd_spec cmd_table[] =3D { "Suspend a domain to RAM", "", }, +#endif /* !LIBXL_HAVE_NO_SUSPEND_RESUME */ { "resume", &main_resume, 0, 1, "Resume a domain from RAM", "", }, -#endif { "dump-core", &main_dump_core, 0, 1, "Core dump a domain", @@ -548,7 +548,7 @@ const struct cmd_spec cmd_table[] =3D { " checkpoint must be disabled.\n" "-p Use COLO userspace proxy." }, -#endif +#endif /* !LIBXL_HAVE_NO_SUSPEND_RESUME */ { "devd", &main_devd, 0, 1, "Daemon that listens for devices and launches backends", diff --git a/tools/xl/xl_migrate.c b/tools/xl/xl_migrate.c index b8594f44a5..4b4a379aa1 100644 --- a/tools/xl/xl_migrate.c +++ b/tools/xl/xl_migrate.c @@ -767,7 +767,7 @@ int main_remus(int argc, char **argv) close(send_fd); return EXIT_FAILURE; } -#endif +#endif /* !LIBXL_HAVE_NO_SUSPEND_RESUME */ =20 =20 /* diff --git a/tools/xl/xl_saverestore.c b/tools/xl/xl_saverestore.c index 953d791d1a..747094ec7b 100644 --- a/tools/xl/xl_saverestore.c +++ b/tools/xl/xl_saverestore.c @@ -270,7 +270,7 @@ int main_save(int argc, char **argv) return EXIT_SUCCESS; } =20 -#endif /* LIBXL_HAVE_NO_SUSPEND_RESUME */ +#endif /* !LIBXL_HAVE_NO_SUSPEND_RESUME */ =20 =20 =20 diff --git a/tools/xl/xl_vmcontrol.c b/tools/xl/xl_vmcontrol.c index c813732838..93766f631b 100644 --- a/tools/xl/xl_vmcontrol.c +++ b/tools/xl/xl_vmcontrol.c @@ -38,11 +38,6 @@ static void suspend_domain(uint32_t domid) libxl_domain_suspend_only(ctx, domid, NULL); } =20 -static void resume_domain(uint32_t domid) -{ - libxl_domain_resume(ctx, domid, 1, NULL); -} - int main_suspend(int argc, char **argv) { int opt; @@ -55,6 +50,12 @@ int main_suspend(int argc, char **argv) =20 return EXIT_SUCCESS; } +#endif /* !LIBXL_HAVE_NO_SUSPEND_RESUME */ + +static void resume_domain(uint32_t domid) +{ + libxl_domain_resume(ctx, domid, 1, NULL); +} =20 int main_resume(int argc, char **argv) { @@ -68,7 +69,6 @@ int main_resume(int argc, char **argv) =20 return EXIT_SUCCESS; } -#endif =20 static void pause_domain(uint32_t domid) { --=20 2.48.1 From nobody Thu Oct 30 19:06:30 2025 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=pass(p=none dis=none) header.from=gmail.com ARC-Seal: i=1; a=rsa-sha256; t=1753779171; cv=none; d=zohomail.com; s=zohoarc; b=R9b16BoEeYBKZY/phuyEcEaRenPvKiON+ZgTFwob/IoZdLF8ByBcAQxE3K906Jq4DR/30Yiqvxxx3SAQmO6/3whRMIOjSwUeOXm0P4rKaX4rLxeNY6HsZMjsGTKPOxWgeZ7VXBCSEXyDS31qEaJI0fcQ1eIS2dSXqy1AmFEO/xM= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1753779171; h=Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=gDyBEr2C8bHK7ao0mUQj4cm53R0gNtsq0NOW3g9oj/Q=; b=B7v9BowMfaUiuDPX/bnuxPrbchA9yxYfAKQ0y5n5j0Yl2U4YhqYt9tWLVxKzUMi8aNRNvBrCXzJBkW9+mp/N/ZhY2E93CfeP/yeU/aHI/qm+K1pZKXN4Co6llPzcbYTIY9AbvVxvbRTjGqp+9utDmXxJD5J916xMVsclcAJl+iM= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=pass header.from= (p=none dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1753779171685671.4808283577931; Tue, 29 Jul 2025 01:52:51 -0700 (PDT) Received: from list by lists.xenproject.org with outflank-mailman.1062244.1427911 (Exim 4.92) (envelope-from ) id 1ugg4Y-0006u6-Pa; Tue, 29 Jul 2025 08:52:34 +0000 Received: by outflank-mailman (output) from mailman id 1062244.1427911; Tue, 29 Jul 2025 08:52:34 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1ugg4Y-0006tw-N3; Tue, 29 Jul 2025 08:52:34 +0000 Received: by outflank-mailman (input) for mailman id 1062244; Tue, 29 Jul 2025 08:52:33 +0000 Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254] helo=se1-gles-sth1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1ugg4X-0006C0-7l for xen-devel@lists.xenproject.org; Tue, 29 Jul 2025 08:52:33 +0000 Received: from mail-lf1-x134.google.com (mail-lf1-x134.google.com [2a00:1450:4864:20::134]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS id 5d854c66-6c59-11f0-a31e-13f23c93f187; Tue, 29 Jul 2025 10:52:32 +0200 (CEST) Received: by mail-lf1-x134.google.com with SMTP id 2adb3069b0e04-553d52cb80dso753938e87.1 for ; Tue, 29 Jul 2025 01:52:32 -0700 (PDT) Received: from yp-VivoBook-ASUSLaptop-M1503QA-M1503QA.. ([95.67.15.120]) by smtp.gmail.com with ESMTPSA id 2adb3069b0e04-55b63375ca4sm1584998e87.124.2025.07.29.01.52.30 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 29 Jul 2025 01:52:31 -0700 (PDT) X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 5d854c66-6c59-11f0-a31e-13f23c93f187 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1753779152; x=1754383952; darn=lists.xenproject.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=gDyBEr2C8bHK7ao0mUQj4cm53R0gNtsq0NOW3g9oj/Q=; b=db156OoRdO7FLd0Qparg/NbLUPz/jB1wrZBPGAs5B/QPOeHVj7r1uAZIcSQpH0ZQKX HjPavgFll/IgwpYUuI0xFVNJnoT/rEFy0pVOBxGsUAC5Gv4c8JfzR/MT4MltJVIhArlB o/qkP/im+HDYtNb7iUd+2ROCNUmvdiG133ydTkbt8oKfrCW87ClDeOjaFYkwaR35UGKZ L+zAcBVvEsFJjR2zGzmB/ys5vCr/MiY801lUEcV6WE4bab2ZjY4Q6/Q3OAZF5gaJBbpq Hwl/KESTrttWgjBLei8pnXhs2O66IXBaDtMqtwgbcHDsPfhseMyILEedtPReO0HGrwz3 +b+g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1753779152; x=1754383952; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=gDyBEr2C8bHK7ao0mUQj4cm53R0gNtsq0NOW3g9oj/Q=; b=uEPTFBhR7toO/LLDhwJ0ayP6nJtmGvfIO3lRVo/0WNJe2y8OGCAkARqt/K0TCvF0qA xGx6qaEi2xOdWMkWY/NerH+EIZf+izO12dVWFFU+eTuVMKTEAhsWZXSfC3ZojU0FnphR KdLa3rr25O1C0kTk4LIz4kwEml4vVjbC0u5LQgzalB44GLKdR80SvIvxWwdwkQkjBinO ulwSRMkTnLU41xLnjMrAqkG92D0nm+3mEW3tO/cYd/Bu6C934uMk27WqtWUREIG+DRCu FRq6BexjlObOqJtmQygHd/MY1YdH+OohOkSi9Zfp+l2EcQS4Wnu1W0BMAnOoYKqa4avo FA2A== X-Gm-Message-State: AOJu0YwbJ5esrGpEfMYzYHQBMspMElb5+ZJuyrJX9KT2X+0o4rmN/d0m nJYSgwxWJaK1ScziTFub/LKY7zXGP8u19ABIhADjGl7B6PGSHMgeolsoL7KhyQ== X-Gm-Gg: ASbGncu0sf9AhvXwblVw+BAOw++StA0W56lVdESVVn7aIxTNhDHHwdyB8pxUTGVV+Uv MJWapMA/x5M5p+8U66ghu2ZMTthgnF0Y7AJJFv6Hlh2zLXFn2Fft4x5VvjqLCjPltiUWA400q/E ewTKecUnqA01/+1Bda1Ii/tzupUJZrkrmplV5XWPkY73/35WMRNY6M8nQfVDWh1iVfLYXKYC6GM WQxe94KS6DaFBCNZOiPZVlEE+5vpKJQ/HGnPW/D7YFUhCZ+xuA3bFdro2hFVh8npD+tr1bJOr5G WhTVWAjBmOmg3C9CafqyRlZQPFcibNoaQgcQO6cov1lmiFqkmtkQtuXbi7fLclS1JGeAWVRJ+f6 s4DMY+m6SJS85Fyyz7NAZ8FexLDLXA/YSmAM7myM0gYdeziJ1oMQCHTxX39HFkw== X-Google-Smtp-Source: AGHT+IG00e5CNOhPm9nLcQAujxigG0NIrDKy/rNQ+T8MbM+PLgKf+X7db2inhj3Dd/YEfcDWdGqfMQ== X-Received: by 2002:a05:6512:68e:b0:554:e7ce:97f8 with SMTP id 2adb3069b0e04-55b744c4993mr699034e87.15.1753779151767; Tue, 29 Jul 2025 01:52:31 -0700 (PDT) From: Mykola Kvach To: xen-devel@lists.xenproject.org Cc: Mykola Kvach , Andrew Cooper , Anthony PERARD , Michal Orzel , Jan Beulich , Julien Grall , =?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= , Stefano Stabellini Subject: [PATCH v7 3/4] SUPPORT.md: Document PSCI SYSTEM_SUSPEND support for guests Date: Tue, 29 Jul 2025 11:52:13 +0300 Message-ID: X-Mailer: git-send-email 2.48.1 In-Reply-To: References: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-ZohoMail-DKIM: pass (identity @gmail.com) X-ZM-MESSAGEID: 1753779172344116600 Content-Type: text/plain; charset="utf-8" From: Mykola Kvach Add a new entry under the "Virtual Hardware, QEMU" section documenting support for the optional PSCI SYSTEM_SUSPEND function exposed to guests. This function is available via the virtual PSCI (vPSCI) interface and allows guest domains (domUs) to initiate system suspend operations. The feature is currently marked as Experimental. Signed-off-by: Mykola Kvach --- Changes in v6: - Dropped the generic guest PSCI support entry (merged in a separate patch) - This patch now documents only the SYSTEM_SUSPEND optional function - Reworded commit message to match the final form after rebase Changes in v5: - Dropped ARM/PSCI entry: this refers to internal use of PSCI SMC calls, which is not relevant for SUPPORT.md - Added a dedicated entry for PSCI SYSTEM_SUSPEND instead of generic guest PSCI info; guest PSCI support was documented in a separate patch --- SUPPORT.md | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/SUPPORT.md b/SUPPORT.md index 6a82a92189..b5ab049b52 100644 --- a/SUPPORT.md +++ b/SUPPORT.md @@ -962,8 +962,9 @@ Emulated PSCI interface exposed to guests. We support a= ll mandatory functions of PSCI 1.1. See below for the list of optional PSCI call implemented and their status. =20 - Status, Mandatory: Supported - Status, MIGRATE_INFO_TYPE: Supported + Status, Mandatory: Supported + Status, MIGRATE_INFO_TYPE: Supported + Status, SYSTEM_SUSPEND: Experimental =20 ## Virtual Hardware, QEMU =20 --=20 2.48.1 From nobody Thu Oct 30 19:06:30 2025 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=pass(p=none dis=none) header.from=gmail.com ARC-Seal: i=1; a=rsa-sha256; t=1753779180; cv=none; d=zohomail.com; s=zohoarc; b=GeG+PLWwyizs8ylGegTsElTiBXn5SvfcvnVeyCINU7VYBtlxhZqVuiv1t6ikxZnP+/AVBcButdbfMmKNo1EHcfwrONvCtr7cL4OAGo2dmp/b2mBtsxcfSJ+RqBB+8nXRiHFkq6VZvUqDZrJrKMf3yloX5KhvWWUJHfZrvSr+E+Y= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1753779180; h=Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=rSXErmgf4mUOU3w7XCCgpOwuZwNZDieNzbmZWIHlqM8=; b=WHhFiDcg9JNkpHNKFQFp/YbaD9Ld0EpYYnHWx4v110jaUAFJseEDsQrm4nBQwgRm/Wqx5oqpAVG/oW4Tsp2tdOBmIixiDOcQyZpMgT9S3r6d7VORyHMGu79U/e4V3mvUyDcsU3YNvioSTkknDWdBwK5Kq+2ljM/7gyJnhcLIqKM= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=pass header.from= (p=none dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 17537791806681.6350891109768781; Tue, 29 Jul 2025 01:53:00 -0700 (PDT) Received: from list by lists.xenproject.org with outflank-mailman.1062245.1427921 (Exim 4.92) (envelope-from ) id 1ugg4b-0007Bj-1v; Tue, 29 Jul 2025 08:52:37 +0000 Received: by outflank-mailman (output) from mailman id 1062245.1427921; Tue, 29 Jul 2025 08:52:37 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1ugg4a-0007Bc-UW; Tue, 29 Jul 2025 08:52:36 +0000 Received: by outflank-mailman (input) for mailman id 1062245; Tue, 29 Jul 2025 08:52:35 +0000 Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50] helo=se1-gles-flk1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1ugg4Z-00075I-Ti for xen-devel@lists.xenproject.org; Tue, 29 Jul 2025 08:52:35 +0000 Received: from mail-lf1-x12d.google.com (mail-lf1-x12d.google.com [2a00:1450:4864:20::12d]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS id 5e372bc4-6c59-11f0-b895-0df219b8e170; Tue, 29 Jul 2025 10:52:33 +0200 (CEST) Received: by mail-lf1-x12d.google.com with SMTP id 2adb3069b0e04-55b733911b3so1040285e87.2 for ; Tue, 29 Jul 2025 01:52:33 -0700 (PDT) Received: from yp-VivoBook-ASUSLaptop-M1503QA-M1503QA.. ([95.67.15.120]) by smtp.gmail.com with ESMTPSA id 2adb3069b0e04-55b63375ca4sm1584998e87.124.2025.07.29.01.52.31 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 29 Jul 2025 01:52:32 -0700 (PDT) X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 5e372bc4-6c59-11f0-b895-0df219b8e170 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1753779153; x=1754383953; darn=lists.xenproject.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=rSXErmgf4mUOU3w7XCCgpOwuZwNZDieNzbmZWIHlqM8=; b=FWpw/sNe1LUUND+8CKzzN7rP+oGFAmKVUYXAb8DTPkOFPktjEm0CiOXAu7sNNS9FNM uWpxY+8euK6jDT8fColMPtdYwa01DhtWQfv499eGWAO6JzDIiCbIXlJ2aMkfL5+SZXsm L+m9oSA8JJKtVpUIyu/Nut1VxNg7AyQ1bPd3p9+bMRAnd7zHtvP2bdvIDlRxY4f64MV2 JUhOGxYhtav6kYIcxKUO6ZapKVrBARgQp6wsrQLr3PGupELqiE16O0KoZUd4GNuk1ndm C3ALBVxdDZOLSzAyhnhZtiVDaK7VzIblV5KsMaldpklG9Wy6wYOxl5K1dInZft1wdVVG hMaw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1753779153; x=1754383953; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=rSXErmgf4mUOU3w7XCCgpOwuZwNZDieNzbmZWIHlqM8=; b=np00Dg1AomeavtSO39xuLNR1SiEHB5h2jakJdPZhXvyBBIf+y+UShGf6sUICv8oPAz pUEbA3uiQ/Iz+DKnPd8I7cAmkD2NS6glyBzKcxI1C/A+ME8tNvT+wCLkT5V9+f27McqX mpGAWSRtKKeO6rQLtHEM8Fwpb6pIj0ykXeCLdvm6lWww8q6i0av4+I3uZF9ZHrXO2L2c Bd4UBiXPIFeMykKvgvJMzVJ7FOMpFoJNhFEDQt7CfVQsdsfba7ePpPYxsEljU/OZY3vI xXnqwdH6KcCoN9PPrzFByktKVrdlr76Jbz+B16/b2e7T+d03CVWiBBFUDA2zRrVArYFt elyQ== X-Gm-Message-State: AOJu0YytyiTqu0cuUV/XPffKul2nyeyR+BJzPSSSUDzIzL0R1FY8J1rI ke0anQSovGu7E4pzyXtawNm1NvVNhuAlo6ODQJiSvpVlam8vxH68iJroJWeS7A== X-Gm-Gg: ASbGncuhM45kc3xQ5C655sMTFToWv9jc0L8tSKpLGeMFW1UTjg7qm5ALmg9so5g+UR6 l72M0RFMTgOxCbEdG3qqTrt4l7l2ADHqmhLM9JrLYZUBLOxoJgMsfpNFfEbkK766aXn8DlYdHBh FpHPRZZxXQ5/BCaRw2vn5t0QyU3RPtZFNGvWJTtIykpBmgLPdh5W6ktycRiUynnFMZlvijKztuR 4q2ZM6ctfEESOZsBxizzivrJEWhIKlC2GZZ0vEE2lERSLgYHLEXrPW/GK4v13u7cxD3NlA9A9zg P/Pasb5LDC4oSSJnR5BXNO119wD3Dmhz7wCe87nNH9URvg41bbJchJtcviSuFDSmiBrIeu+tvEc b15QHctwj5Jrzrbf5s1uuJsYWWk4WG6dQzbQ7vAeU4pXE7+GWUvSUVnYlA9/n5A== X-Google-Smtp-Source: AGHT+IF6w5gsunns7764OjENAOmyO5T/IsPbA7xb8k1thAzsi3X2jQ/bFGEcEysq2J003+/40r6OHg== X-Received: by 2002:a05:6512:3ca1:b0:54f:bdfe:ece5 with SMTP id 2adb3069b0e04-55b5f3ec228mr4252695e87.14.1753779152948; Tue, 29 Jul 2025 01:52:32 -0700 (PDT) From: Mykola Kvach To: xen-devel@lists.xenproject.org Cc: Mykola Kvach , Oleksii Kurochko , Community Manager Subject: [PATCH v7 4/4] CHANGELOG: Document guest suspend/resume to RAM support on Arm Date: Tue, 29 Jul 2025 11:52:14 +0300 Message-ID: <09514e4eaf0ed23d890a864953bb1c87d2cce03d.1753778926.git.mykola_kvach@epam.com> X-Mailer: git-send-email 2.48.1 In-Reply-To: References: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-ZohoMail-DKIM: pass (identity @gmail.com) X-ZM-MESSAGEID: 1753779182555116600 Content-Type: text/plain; charset="utf-8" From: Mykola Kvach Mention the newly added support for guest suspend and resume to/from RAM via vPSCI on Arm platforms. This support is limited to non-hardware domain guests. Signed-off-by: Mykola Kvach Acked-by: Oleksii Kurochko --- Chnages in v6: - removed reduntand explanation that thi support added for both arm32 and arm64. Changes in v5: - adjustments to the commit title and message - expanded the changelog entry to include more context about suspend/resume support introduced in this patch series --- CHANGELOG.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/CHANGELOG.md b/CHANGELOG.md index 5f31ca08fe..7e42ca9b59 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -29,6 +29,8 @@ The format is based on [Keep a Changelog](https://keepach= angelog.com/en/1.0.0/) =20 - On Arm: - Ability to enable stack protector + - Support for guest suspend and resume to/from RAM via vPSCI. + Applies only to non-hardware domain guests. =20 ### Removed - On x86: --=20 2.48.1